8 More Discussions You Might Find Interesting
1. UNIX for Beginners Questions & Answers
How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies
2. UNIX for Advanced & Expert Users
Hi,
I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted.
I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error :
The attempt to convert this system to a trusted system failed.
The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies
3. Linux
Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies
4. Solaris
How to check if a system has Solaris trusted extensions installed or not on a solaris 10 system ? (5 Replies)
Discussion started by: fugitive
5 Replies
5. AIX
I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before".
Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies
6. Virtualization and Cloud Computing
Tim Bass
Thu, 15 Nov 2007 23:55:07 +0000
*I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies
7. HP-UX
I was playing with sam and i turned on the Trusted System feature (UX11i).
Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen.
I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies
8. UNIX for Dummies Questions & Answers
Hello there,
Can someone tell me if you need to make the hosts trusted hosts if you use NIS+?
Thanks,
E (2 Replies)
Discussion started by: eknaap
2 Replies
Tspi_DecodeBER_TssBlob(3) TCG Software Stack Developer's Reference Tspi_DecodeBER_TssBlob(3)
NAME
Tspi_DecodeBER_TssBlob - unwraps a BER-encoded TSS blob.
SYNOPSIS
#include <tss/tspi.h>
TSS_RESULT Tspi_DecodeBER_TssBlob(UINT32 berBlobSize, BYTE* berBlob,
UINT32* blobType, UINT32* rawBlobSize,
BYTE* rawBlob);
DESCRIPTION
Tspi_DecodeBER_TssBlob is used to unwrap a BER-encoded blob in accordance with the ASN.1 data definitions in the Portable Data section of
the Trusted Computing Group Software Stack Specification Version 1.2.
PARAMETERS
berBlobSize
Size of the BER-encoded blob.
berBlob
Pointer to the BER-encoded blob.
blobType
Pointer to the type of blob being unwrapped (refer to the TSS_BLOB_TYPE_* constants).
rawBlobSize
Pointer to the size of the rawBlob buffer. On input this parameter contains a pointer to the maximum size of the supplied rawBlob buffer.
On output this parameter contains a pointer to the actual size of the unwrapped blob. On input, if this parameter points to a value of 0,
then this function will return the size of the buffer required to hold the unwrapped blob without writing to the rawBlob buffer.
Note: The output data must be shorter than the BER-encoding, so berBlobSize is a useful upper limit on rawBlob buffer size.
rawBlob
Pointer to a buffer to hold the unwrapped blob.
RETURN CODES
Tspi_EncodeDER_TssBlob returns TSS_SUCCESS on success, otherwise one of the following values are returned:
TSS_E_BAD_PARAMETER
TSS_E_INTERNAL_ERROR - An error occurred internal to the TSS.
CONFORMING TO
Tspi_DecodeBER_TssBlob conforms to the Trusted Computing Group Software Specification Version 1.2
SEE ALSO
Tspi_DecodeBER_TssBlob(3).
TSS 1.2 2007-06-12 Tspi_DecodeBER_TssBlob(3)