O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Using TPM Keys

This chapter will walk you through creating a key hierarchy using TPM-generated keys. Depending on the environment (corporate, home, and so on), the code provided will most likely not be appropriate as is to suit your needs. However, this chapter will give an example of one way to implement each of the many types of operations you might like to do to create your own TPM key hierarchy.

The code in this chapter and the chapters that follow will make liberal use of external libraries to simplify tasks that the TSS doesn’t provide APIs for natively. This will include symmetric encryption, creating software keys, loading and writing keys to disk, and so on. Two choices for these external libraries are OpenSSL’s libcrypto ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required