On 10/2/06, Erik Tews <[EMAIL PROTECTED]> wrote:
Am Sonntag, den 01.10.2006, 23:42 -0500 schrieb Travis H.:
> Anyone have any information on how to develop TPM software?
http://tpm4java.datenzone.de/
Using this lib, you need less than 10 lines of java-code for doing some
simp
Am Donnerstag, den 05.10.2006, 16:25 -0500 schrieb Travis H.:
> On 10/2/06, Erik Tews <[EMAIL PROTECTED]> wrote:
> > Am Sonntag, den 01.10.2006, 23:42 -0500 schrieb Travis H.:
> > > Anyone have any information on how to develop TPM software?
> > http://tpm4java.datenzone.de/
>
On 10/5/06, Erik Tews <[EMAIL PROTECTED]> wrote:
First, you need a system with tpm. I assume you are running linux. Then
you boot your linux-kernel and an initrd using the trusted grub
bootloader. Your bios will report the checksum of trusted grub to the
tpm before giving control to your grub boo
--
Travis H. wrote:
> Actually, encoding lengths of other fields in a
> protocol is probably the easiest way to introduce a
> remotely-exploitable vulnerability (typically buffer
> overflow). I'm going to have to side with the "no
> redundancy means no inconsistencies possible" argument
> her
Does anyone know if the OpenSSL PKCS #7 functions support AES and SHA-2?
(I assuming OpenSSL 0.9.7 or later.)
Thanks,
- Alex
--
Alex Alten
Alten Security Engineering, Inc.
[EMAIL PROTECTED]
-
The Cryptography Mailing List
U