• There are no items in your cart

CAN/CSA-ISO/IEC 11889-2:16

Current
Current

The latest, up-to-date edition.

Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15)
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2016

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Notation
6 Base Types
7 Constants
8 Handles
9 Attribute Structures
10 Interface Types
11 Structure Definitions
12 Algorithm Parameters and Structures
13 Key/Object Complex
14 NV Storage Structures
15 Context Data
16 Creation Data
Annex A (informative) - Algorithm Constants
Annex B (informative) - Implementation Definitions
Bibliography

This part of ISO/IEC 11889 contains the definitions of the constants, flags, structure, and union definitions used to communicate with the TPM.

Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). For brevity, this Standard will be referred to as "CAN/CSA-ISO/IEC 11889-2" throughout. At the time of publication, ISO/IEC 11889-2:2015 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 11889 contains the definitions of the constants, flags, structure, and union definitions used to communicate with the TPM. Values defined in this part of ISO/IEC 11889 are used by the TPM commands defined in ISO/IEC 11899-3 and by the functions in ISO/IEC 11889-4. NOTE The structures in this document are the canonical form of the structures on the interface. All structures are "packed" with no octets of padding between structure elements. The TPM-internal form of the structures is dependent on the processor and compiler for the TPM implementation.

DocumentType
Standard
ISBN
978-1-4883-0491-0
Pages
0
PublisherName
Canadian Standards Association
Status
Current

Standards Relationship
ISO/IEC 11889-2:2015 Identical

ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 11889-3:2015 Information technology Trusted Platform Module Library Part 3: Commands
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11889-4:2015 Information technology Trusted Platform Module Library Part 4: Supporting Routines

View more information
US$238.00
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.