Trusted Computing


 
Thread Tools Search this Thread
Special Forums Cybersecurity Trusted Computing
# 1  
Old 06-15-2006
Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.

How many people here have systems that use one form or another of the Trusted Computing Base?

Cheers,

Keith
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Adding an application in trusted computing base

How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies

2. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies

3. Linux

Linux kernel & Trusted Computing

Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies

4. Solaris

Solaris Trusted Extension ?

How to check if a system has Solaris trusted extensions installed or not on a solaris 10 system ? (5 Replies)
Discussion started by: fugitive
5 Replies

5. AIX

Switch off TCB (Trusted Computing Base)

I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before". Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies

6. Virtualization and Cloud Computing

Event Cloud Computing - IBM Turning Data Centers Into ?Computing Cloud?

Tim Bass Thu, 15 Nov 2007 23:55:07 +0000 *I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies

7. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies

8. UNIX for Dummies Questions & Answers

NIS+ and trusted hosts

Hello there, Can someone tell me if you need to make the hosts trusted hosts if you use NIS+? Thanks, E (2 Replies)
Discussion started by: eknaap
2 Replies
Login or Register to Ask a Question
Tspi_DecodeBER_TssBlob(3)			     TCG Software Stack Developer's Reference				 Tspi_DecodeBER_TssBlob(3)

NAME
Tspi_DecodeBER_TssBlob - unwraps a BER-encoded TSS blob. SYNOPSIS
#include <tss/tspi.h> TSS_RESULT Tspi_DecodeBER_TssBlob(UINT32 berBlobSize, BYTE* berBlob, UINT32* blobType, UINT32* rawBlobSize, BYTE* rawBlob); DESCRIPTION
Tspi_DecodeBER_TssBlob is used to unwrap a BER-encoded blob in accordance with the ASN.1 data definitions in the Portable Data section of the Trusted Computing Group Software Stack Specification Version 1.2. PARAMETERS
berBlobSize Size of the BER-encoded blob. berBlob Pointer to the BER-encoded blob. blobType Pointer to the type of blob being unwrapped (refer to the TSS_BLOB_TYPE_* constants). rawBlobSize Pointer to the size of the rawBlob buffer. On input this parameter contains a pointer to the maximum size of the supplied rawBlob buffer. On output this parameter contains a pointer to the actual size of the unwrapped blob. On input, if this parameter points to a value of 0, then this function will return the size of the buffer required to hold the unwrapped blob without writing to the rawBlob buffer. Note: The output data must be shorter than the BER-encoding, so berBlobSize is a useful upper limit on rawBlob buffer size. rawBlob Pointer to a buffer to hold the unwrapped blob. RETURN CODES
Tspi_EncodeDER_TssBlob returns TSS_SUCCESS on success, otherwise one of the following values are returned: TSS_E_BAD_PARAMETER TSS_E_INTERNAL_ERROR - An error occurred internal to the TSS. CONFORMING TO
Tspi_DecodeBER_TssBlob conforms to the Trusted Computing Group Software Specification Version 1.2 SEE ALSO
Tspi_DecodeBER_TssBlob(3). TSS 1.2 2007-06-12 Tspi_DecodeBER_TssBlob(3)