I operate privacyca.com and wrote the identity.c program.

Unfortunately there are many things that cause return code 3 from
ActivateIdentity. The TPM is something of a black box and all this
tells you is that there is something it doesn't like.

The Privacy CA encrypts a message in a certain format to the EK. The
TPM decrypts the message using the EK. This is the first place
something could go wrong. Did the EK get communicated to the PCA
correctly? identity.c reads the EK and puts it into a dummy
endorsement certificate for sending to the PCA. Did it read it
correctly? You might print out the EK value read by identity.c and see
if it looks plausible. Should be 256 bytes long for example.

Next the TPM compares a field of the decrypted message to its
calculation of a hash of the AIK public key. If these disagree it also
returns error 3. Conceivably your TPM is calculating this hash
differently for some reason.

There are 2 different message formats that can be encrypted by PCA to
the EK, an old format and a new one. Privacyca.com uses the old
format. Possibly Broadcom's developers only tested with the new
format. If you want, I could try modifying PCA to use the new format,
maybe via some parameter. That might work.

The Trousers test suite (available from cvs) includes a test of
MakeIdentity/ActivateIdentity. You should try running that and see if
it works. I suspect it will fail, which will take privacyca.com out of
the equation. If it succeeds OTOH we can narrow down how PCA differs
from that program. I think this will be your best direction to solve
the problem.

Hal Finney

On Tue, Aug 31, 2010 at 2:03 PM, Kent Yoder <[email protected]> wrote:
> Yeah the keyUsage=0x12 is correct and from my dissection of the
> activate identity blob, it looks ok to me too.
>
> Kent
>
> On Tue, Aug 31, 2010 at 3:35 PM, Stephen Smalley <[email protected]> wrote:
>> On Tue, 2010-08-31 at 14:47 -0500, Kent Yoder wrote:
>>> Ok, thanks for the info.
>>>
>>> The message that packet element 5 doesn't match happens because
>>> TPM_ActivateIdentity can take up to 2 authorization contexts (one for
>>> hIdentKey, the other for the TPM owner), but it would only take 1 if
>>> hIdentKey doesn't require authorization.  When passing the params to
>>> the daemon, it checks the types of each and noticed that only 1 auth
>>> context is there.  When it sees this it knows that the auth context
>>> must be the owner auth (since that's required) and passes it to the
>>> TPM.
>>>
>>> Unfortunately we don't have a broadcom TPM I know of here to test
>>> against, but from reading through the spec, I can take a stab at what
>>> it might be unhappy about.
>>>
>>> The one bad parameter return code I see for this API is when hIdentKey
>>> is not a TPM identity key.  If that's not the case, I'd try using an
>>> hIdentKey that does require auth. Either way should work, regardless
>>> of whether the key requires auth, but this could be a TPM bug.
>>
>> Ok, if I invoke identity with the -p option (to specify an auth for the
>> AIK), then that particular warning about a data type mismatch goes away.
>> But ActivateIdentity still fails in the same manner.  As far as I can
>> see, identity.c is creating a key object with the right flags, and is
>> calling CollateIdentityRequest successfully.  Output from tcsd -f,
>> starting from the MakeIdentity request:
>>
>> TCSD TCS rpc/tcstp/rpc_aik.c:59 tcs_wrap_MakeIdentity: thread 
>> 140012244526864 context a066f101
>> TCSD TCS tcsi_aik.c:57 SRK Auth Used
>> To TPM: 00 C3 00 00 00 BB 00 00 00 79 19 15 C6 0F CC F0
>> To TPM: A3 E4 2E DF 43 80 5E 20 36 B4 3C 7B 92 1E 7E 73
>> To TPM: 22 8D 84 AE 25 88 46 1C 48 C5 64 75 5A 74 A4 06
>> To TPM: 3D 50 01 01 00 00 00 12 00 00 00 04 01 00 00 00
>> To TPM: 01 00 01 00 02 00 00 00 0C 00 00 08 00 00 00 00
>> To TPM: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> To TPM: 00 A7 56 4D 03 FB 04 AC 99 4A 53 88 7E 75 42 8C
>> To TPM: 81 CD 54 62 7C E2 8B F0 00 00 D5 D6 AE 17 D6 7B
>> To TPM: 1F 50 79 12 78 71 4F 7B B3 22 C5 A5 FE C3 71 CB
>> To TPM: 58 92 BA 35 BF C3 0C D7 FA 40 13 CA ED 03 DC CB
>> To TPM: 1C 69 6E 84 1B 8E 00 0C CF 9B 01 5A 30 F8 87 F7
>> To TPM: 3C 3D 1E D7 22 3D 68 14 2D 5B D2
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C6 00 00 03 8F 00 00 00 00 01 01 00 00 00 12
>> >From TPM: 00 00 00 04 01 00 00 00 01 00 01 00 02 00 00 00
>> >From TPM: 0C 00 00 08 00 00 00 00 02 00 00 00 00 00 00 00
>> >From TPM: 00 00 00 01 00 CF 81 F4 24 47 13 C1 48 C8 F8 53
>> >From TPM: 53 DC F9 DA 7A 5B 3C FB 43 FD 4A 6B A2 52 B6 F0
>> >From TPM: 5B 13 9F 09 34 98 CC 30 5D A0 A3 9D A8 CD 4D FE
>> >From TPM: 5A 8F 9E AD 3A 0A 8C B8 F5 A9 7B D9 97 1D 7D BC
>> >From TPM: A7 84 19 59 B8 D3 15 75 59 F0 8A A2 E2 1B 5B EA
>> >From TPM: CF BD 5A 2F E8 75 EB 91 64 6B 76 E5 0D 78 66 4F
>> >From TPM: 1A 6E A1 71 CD 05 5A 3A 6D 69 F0 25 4A 70 21 10
>> >From TPM: 01 BD CF 5E F3 78 0A 16 D2 37 71 E2 64 ED EE 83
>> >From TPM: 87 79 2B CC 66 0A 6C 78 8E 00 66 15 52 F8 AD C5
>> >From TPM: AE 56 75 A8 BD F3 1A F1 BA 69 C7 B1 49 8E 97 C4
>> >From TPM: B2 11 00 B3 70 14 EA 9C 65 6C 74 85 DF 8D 69 5A
>> >From TPM: D2 B7 96 D8 15 30 C3 99 D3 9A DE 72 84 85 28 80
>> >From TPM: 65 9E 71 25 69 1F 07 7B A9 BB 53 9B 4C DB D0 C9
>> >From TPM: DA 8D 23 7E 29 4E D8 1F 28 24 B0 3D 10 31 05 8E
>> >From TPM: 2D 0F 4E B4 95 41 ED E2 8B E5 6E 7A BF C2 A6 18
>> >From TPM: FF EF 26 FA 8B 99 0D 3F 7F 61 1E ED 75 0F D6 78
>> >From TPM: BB 2F 39 54 ED 00 00 01 00 77 FC 56 53 39 2E AE
>> >From TPM: 4F 10 EF 4A 13 E5 AB 90 BA D9 A0 B8 B2 D0 1F 5B
>> >From TPM: 62 46 E2 DD 70 96 CE E0 74 3D A0 5C AA 9A FF 8C
>> >From TPM: 25 AE 54 A6 25 1D FC B5 E1 CD 2C D2 A8 8B 0F FF
>> >From TPM: D9 51 D2 40 FF C3 0E 24 99 3A A4 6E 5E F6 F4 EF
>> >From TPM: 54 BA 6B 82 99 1E FC 47 05 06 77 C5 E9 8D 73 65
>> >From TPM: FD 76 CC D7 82 C3 41 02 73 03 F7 C8 01 FF 7A C9
>> >From TPM: 7C 23 6D EB C8 5C F4 BA 62 91 11 73 34 64 7D 6A
>> >From TPM: 15 70 AF 01 D8 13 E0 3B 22 03 86 3B 68 A0 CE 6B
>> >From TPM: 38 4E 74 1E 36 BF 18 84 97 F3 A4 4A 12 54 60 06
>> >From TPM: 93 12 B3 20 69 6B FF DD F9 6D F0 03 40 EF E0 E0
>> >From TPM: 55 AD E7 49 13 62 E5 36 2A 30 B6 3F 4C CB E6 E2
>> >From TPM: 7A 50 84 53 B6 D7 D3 A3 64 79 0D 8C 7B DB A1 01
>> >From TPM: 2A 49 03 F7 BD 65 C2 6E F7 20 40 C9 0B A8 F4 59
>> >From TPM: 24 5D 22 0F FF 2C 82 71 50 5F 25 FD 28 1F C8 E6
>> >From TPM: 33 A2 41 4B 75 74 66 DD 47 0E 6E DD B5 2F 29 9A
>> >From TPM: 4B 2E 36 52 79 87 74 F5 53 00 00 01 00 89 45 CC
>> >From TPM: 49 D7 8A 2E A9 E5 57 63 E7 33 E1 2F 8A C1 B6 6B
>> >From TPM: 02 22 B8 09 35 18 FF 0D F4 C5 DC AE BC 5D 23 0B
>> >From TPM: 41 5C BB 3C E9 FE 9D EB 0D 90 67 BA E8 D9 0D 8A
>> >From TPM: 81 C9 EB EE D3 F3 22 40 A1 7A 54 16 A3 72 6E 4E
>> >From TPM: 43 14 64 7A 82 0A B5 E2 03 CF 45 63 8C 0C D5 9B
>> >From TPM: 94 28 F7 8C E5 A4 EF 07 52 E7 D3 AE EB F0 EF B7
>> >From TPM: 50 77 9A 20 B5 65 62 83 00 80 7C 49 B3 32 31 4A
>> >From TPM: EE 7C 1D 1A 4B FE 48 B3 BF C3 67 4A C0 0A ED 18
>> >From TPM: CF A1 20 B4 F1 C4 5E 6A D5 D5 6B 3A FA 66 FD 98
>> >From TPM: D9 A8 BD BC AF 8C 0E 43 4E E1 97 1D F2 12 60 D5
>> >From TPM: 27 01 97 10 A1 AE 61 FA 59 7B FA 76 F9 3F B4 E2
>> >From TPM: 4D 73 A1 BB D3 1D 90 EC 0D 5E DD FC EE F7 6A 2B
>> >From TPM: C9 4B 14 09 C6 3A 42 89 13 8E 3F B1 40 72 6A 44
>> >From TPM: 1A 32 D4 96 30 44 2A 83 1D 41 91 25 D4 CC 8E 92
>> >From TPM: C5 4E 3D 94 7B 4A AD 0B 75 A3 8A 3D 97 B1 3B 36
>> >From TPM: 6D F3 C0 14 B9 F2 DA 70 6D 9C 96 6B FD 78 77 E3
>> >From TPM: D7 BE AE 3C 93 3A 44 CB 70 5E 78 2B 14 74 3C 01
>> >From TPM: 0B 00 9D 27 82 5C 70 DC 5C 3F 19 F9 21 9F 99 61
>> >From TPM: 47 DF E7 40 EF D0 45 F4 D4 7C 33 70 C4 25 56 CC
>> >From TPM: 10 61 67 F0 31 4A F2 61 FC 0A 00 E7 BF 7C 26 0C
>> >From TPM: 53 55 AE C9 82 D1 E3 B3 9A 29 0A 6D D7 93 26
>> To TPM: 00 C1 00 00 00 12 00 00 00 BA A7 56 4D 03 00 00
>> To TPM: 00 02
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 22
>> LOG_RETERR TPM tcsi_admin.c:464: 0x22
>> TCSD TCS tcs_auth_mgr.c:287 Tried to close an invalid auth handle: a7564d03
>> TCSD TCS tcs_auth_mgr.c:118 no threads need to be signaled.
>> To TPM: 00 C1 00 00 00 12 00 00 00 BA 71 CB 58 92 00 00
>> To TPM: 00 02
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 22
>> LOG_RETERR TPM tcsi_admin.c:464: 0x22
>> TCSD TCS tcs_auth_mgr.c:287 Tried to close an invalid auth handle: 71cb5892
>> TCSD TCS tcs_auth_mgr.c:118 no threads need to be signaled.
>> TCSD tcsd_threads.c:408 Sending 0x3BD bytes back
>> TCSD tcsd_threads.c:381 Rx'd packet
>> TCSD TCS rpc/tcstp/rpc.c:577 Dispatching ordinal 23
>> TCSD TCS rpc/tcstp/rpc_auth.c:41 tcs_wrap_OIAP: thread 140012244526864 
>> context a066f101
>> TCSD TCS tcsi_auth.c:40 Entering TCSI_OIAP
>> To TPM: 00 C1 00 00 00 0A 00 00 00 0A
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 22 00 00 00 00 BB C8 AD E3 58 DB
>> >From TPM: 0F 29 8A 88 3C E4 1A 2E E6 99 10 6F 73 50 DA 24
>> >From TPM: D9 A1
>> TCSD TCS tcs_auth_mgr.c:383 added auth for TCS a066f101 TPM bbc8ade3
>> TCSD tcsd_threads.c:408 Sending 0x36 bytes back
>> TCSD tcsd_threads.c:381 Rx'd packet
>> TCSD TCS rpc/tcstp/rpc.c:577 Dispatching ordinal 11
>> TCSD TCS rpc/tcstp/rpc_key.c:162 tcs_wrap_LoadKeyByBlob: thread 
>> 140012244526864 context a066f101
>> TCSD TCS tcsi_key.c:76 LoadKeyByBlob_Internal: Enter
>> TCSD TCS tcsi_key.c:77 LoadKeyByBlob_Internal: Version: 1.1.0.0
>> TCSD TCS tcsi_key.c:77 LoadKeyByBlob_Internal: keyUsage: 0x12
>> TCSD TCS tcsi_key.c:77 LoadKeyByBlob_Internal: keyFlags: 0x4
>> TCSD TCS tcsi_key.c:77 LoadKeyByBlob_Internal: authDatausage: 1
>> TCSD TCS tcsi_key.c:77 LoadKeyByBlob_Internal: pcrInfosize: 0
>> TCSD TCS tcsi_key.c:77 LoadKeyByBlob_Internal: encDataSize: 256
>> TCSD TCS tcs_key.c:109 get_slot: calling mc_get_slot_by_handle
>> TCSD TCS tcs_key_mem_cache.c:716 mc_get_slot_by_handle: TCSD mem_cached 
>> handle: 0x40000000
>> TCSD TCS tcsi_key.c:104 LoadKeyByBlob_Internal: calling canILoadThisKey
>> TCSD TCS tcsi_caps_tpm.c:43 Entering Get Cap
>> TCSD TCS tcs_context.c:186 Success: 30000000 is an Internal Context
>> To TPM: 00 C1 00 00 00 2A 00 00 00 65 00 00 00 08 00 00
>> To TPM: 00 18 00 00 00 01 00 01 00 02 00 00 00 0C 00 00
>> To TPM: 08 00 00 00 00 02 00 00 00 00
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0F 00 00 00 00 00 00 00 01 01
>> TCSD TCS tcs_key.c:242 canILoadThisKey: YES
>> TCSD TCS tcsi_key.c:120 LoadKeyByBlob_Internal: Submitting request to the TPM
>> To TPM: 00 C2 00 00 02 6A 00 00 00 41 40 00 00 00 01 01
>> To TPM: 00 00 00 12 00 00 00 04 01 00 00 00 01 00 01 00
>> To TPM: 02 00 00 00 0C 00 00 08 00 00 00 00 02 00 00 00
>> To TPM: 00 00 00 00 00 00 00 01 00 CF 81 F4 24 47 13 C1
>> To TPM: 48 C8 F8 53 53 DC F9 DA 7A 5B 3C FB 43 FD 4A 6B
>> To TPM: A2 52 B6 F0 5B 13 9F 09 34 98 CC 30 5D A0 A3 9D
>> To TPM: A8 CD 4D FE 5A 8F 9E AD 3A 0A 8C B8 F5 A9 7B D9
>> To TPM: 97 1D 7D BC A7 84 19 59 B8 D3 15 75 59 F0 8A A2
>> To TPM: E2 1B 5B EA CF BD 5A 2F E8 75 EB 91 64 6B 76 E5
>> To TPM: 0D 78 66 4F 1A 6E A1 71 CD 05 5A 3A 6D 69 F0 25
>> To TPM: 4A 70 21 10 01 BD CF 5E F3 78 0A 16 D2 37 71 E2
>> To TPM: 64 ED EE 83 87 79 2B CC 66 0A 6C 78 8E 00 66 15
>> To TPM: 52 F8 AD C5 AE 56 75 A8 BD F3 1A F1 BA 69 C7 B1
>> To TPM: 49 8E 97 C4 B2 11 00 B3 70 14 EA 9C 65 6C 74 85
>> To TPM: DF 8D 69 5A D2 B7 96 D8 15 30 C3 99 D3 9A DE 72
>> To TPM: 84 85 28 80 65 9E 71 25 69 1F 07 7B A9 BB 53 9B
>> To TPM: 4C DB D0 C9 DA 8D 23 7E 29 4E D8 1F 28 24 B0 3D
>> To TPM: 10 31 05 8E 2D 0F 4E B4 95 41 ED E2 8B E5 6E 7A
>> To TPM: BF C2 A6 18 FF EF 26 FA 8B 99 0D 3F 7F 61 1E ED
>> To TPM: 75 0F D6 78 BB 2F 39 54 ED 00 00 01 00 77 FC 56
>> To TPM: 53 39 2E AE 4F 10 EF 4A 13 E5 AB 90 BA D9 A0 B8
>> To TPM: B2 D0 1F 5B 62 46 E2 DD 70 96 CE E0 74 3D A0 5C
>> To TPM: AA 9A FF 8C 25 AE 54 A6 25 1D FC B5 E1 CD 2C D2
>> To TPM: A8 8B 0F FF D9 51 D2 40 FF C3 0E 24 99 3A A4 6E
>> To TPM: 5E F6 F4 EF 54 BA 6B 82 99 1E FC 47 05 06 77 C5
>> To TPM: E9 8D 73 65 FD 76 CC D7 82 C3 41 02 73 03 F7 C8
>> To TPM: 01 FF 7A C9 7C 23 6D EB C8 5C F4 BA 62 91 11 73
>> To TPM: 34 64 7D 6A 15 70 AF 01 D8 13 E0 3B 22 03 86 3B
>> To TPM: 68 A0 CE 6B 38 4E 74 1E 36 BF 18 84 97 F3 A4 4A
>> To TPM: 12 54 60 06 93 12 B3 20 69 6B FF DD F9 6D F0 03
>> To TPM: 40 EF E0 E0 55 AD E7 49 13 62 E5 36 2A 30 B6 3F
>> To TPM: 4C CB E6 E2 7A 50 84 53 B6 D7 D3 A3 64 79 0D 8C
>> To TPM: 7B DB A1 01 2A 49 03 F7 BD 65 C2 6E F7 20 40 C9
>> To TPM: 0B A8 F4 59 24 5D 22 0F FF 2C 82 71 50 5F 25 FD
>> To TPM: 28 1F C8 E6 33 A2 41 4B 75 74 66 DD 47 0E 6E DD
>> To TPM: B5 2F 29 9A 4B 2E 36 52 79 87 74 F5 53 BB C8 AD
>> To TPM: E3 75 E9 52 5C 2A C8 6C EE FC 83 F9 82 F7 31 AE
>> To TPM: 93 7E 30 C2 25 00 3A F2 F5 7B DD E6 4F F6 90 04
>> To TPM: 81 15 8F 4F 4B BF 8E 55 87 94
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C5 00 00 00 37 00 00 00 00 27 8E 6D E0 57 9D
>> >From TPM: 38 55 28 4C D5 BA FC AA 8F F2 F2 30 EC DE 14 64
>> >From TPM: B1 C8 00 43 97 89 B6 DC 36 FB AB 7F BA F4 75 04
>> >From TPM: FE 4D DE C5 66 2A E8
>> TCSD TCS tcs_key_mem_cache.c:780 mc_get_handle_by_pub: TCSD mem_cached 
>> handle: 0x40000000
>> TCSD TCS tcs_key_mem_cache.c:794 mc_get_handle_by_pub: returning 
>> NULL_TCS_HANDLE
>> TCSD TCS tcs_key.c:55 add_cache_entry: No existing key handle for this key, 
>> creating new one...
>> TCSD TCS tcs_key.c:58 add_cache_entry: calling mc_add_entry, TCS handle: 
>> 0x22330000, TPM handle 0x278e6de0
>> TCSD TCS tcs_key_mem_cache.c:300 mc_add_entry: TCSD mem_cached handle: 
>> 0x40000000
>> TCSD TCS tcs_key.c:63 add_cache_entry: ctx_mark_key_loaded
>> TCSD TCS tcs_key_mem_cache.c:637 key_mgr_inc_ref_count: TCSD mem_cached 
>> handle: 0x22330000
>> TCSD TCS tcs_key_mem_cache.c:131 TCSD mem_cached handle: 0x22330000
>> TCSD TCS tcs_key_mem_cache.c:131 TCSD mem_cached handle: 0x40000000
>> TCSD TCS tcsi_key.c:141 LoadKeyByBlob_Internal: Key handles for 
>> loadKeyByBlob slot:278E6DE0 tcshandle:22330000
>> To TPM: 00 C1 00 00 00 12 00 00 00 BA BB C8 AD E3 00 00
>> To TPM: 00 02
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 22
>> LOG_RETERR TPM tcsi_admin.c:464: 0x22
>> TCSD TCS tcs_auth_mgr.c:287 Tried to close an invalid auth handle: bbc8ade3
>> TCSD TCS tcs_auth_mgr.c:118 no threads need to be signaled.
>> TCSD tcsd_threads.c:408 Sending 0x50 bytes back
>> TCSD tcsd_threads.c:381 Rx'd packet
>> TCSD TCS rpc/tcstp/rpc.c:577 Dispatching ordinal 23
>> TCSD TCS rpc/tcstp/rpc_auth.c:41 tcs_wrap_OIAP: thread 140012244526864 
>> context a066f101
>> TCSD TCS tcsi_auth.c:40 Entering TCSI_OIAP
>> To TPM: 00 C1 00 00 00 0A 00 00 00 0A
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 22 00 00 00 00 97 85 29 96 6A BD
>> >From TPM: 90 91 2E 85 70 47 45 B0 6D AB 27 95 5C C7 B3 F2
>> >From TPM: 64 C5
>> TCSD TCS tcs_auth_mgr.c:383 added auth for TCS a066f101 TPM 97852996
>> TCSD tcsd_threads.c:408 Sending 0x36 bytes back
>> TCSD tcsd_threads.c:381 Rx'd packet
>> TCSD TCS rpc/tcstp/rpc.c:577 Dispatching ordinal 23
>> TCSD TCS rpc/tcstp/rpc_auth.c:41 tcs_wrap_OIAP: thread 140012244526864 
>> context a066f101
>> TCSD TCS tcsi_auth.c:40 Entering TCSI_OIAP
>> To TPM: 00 C1 00 00 00 0A 00 00 00 0A
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 22 00 00 00 00 8B A5 09 70 34 B3
>> >From TPM: 44 A7 6F 88 80 85 10 1C 5A FC E0 33 E5 05 1A BB
>> >From TPM: 10 23
>> TCSD TCS tcs_auth_mgr.c:383 added auth for TCS a066f101 TPM 8ba50970
>> TCSD tcsd_threads.c:408 Sending 0x36 bytes back
>> TCSD tcsd_threads.c:381 Rx'd packet
>> TCSD TCS rpc/tcstp/rpc.c:577 Dispatching ordinal 30
>> TCSD TCS rpc/tcstp/rpc_aik.c:171 tcs_wrap_ActivateIdentity: thread 
>> 140012244526864 context a066f101
>> TCSD TCS tcsi_aik.c:113 TCSP_ActivateTPMIdentity
>> TCSD TCS tcs_key_mem_cache.c:159 ensureKeyIsLoaded: 0x22330000
>> TCSD TCS tcs_key_mem_cache.c:716 mc_get_slot_by_handle: TCSD mem_cached 
>> handle: 0x22330000
>> TCSD TCS tcs_key_mem_cache.c:167 keySlot is 278E6DE0
>> TCSD TCS tcsi_caps_tpm.c:43 Entering Get Cap
>> TCSD TCS tcs_context.c:186 Success: 30000000 is an Internal Context
>> To TPM: 00 C1 00 00 00 12 00 00 00 65 00 00 00 07 00 00
>> To TPM: 00 00
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 14 00 00 00 00 00 00 00 06 00 01
>> >From TPM: 27 8E 6D E0
>> TCSD TCS tcs_key_mem_cache.c:946 isKeyLoaded: loaded TPM key handle: 
>> 0x278e6de0
>> TCSD TCS tcs_key_mem_cache.c:872 mc_update_time_stamp: TCSD mem_cached 
>> handle: 0x22330000
>> TCSD TCS tcs_key_mem_cache.c:192 ensureKeyIsLoaded: Exit
>> To TPM: 00 C3 00 00 01 6C 00 00 00 7A 27 8E 6D E0 00 00
>> To TPM: 01 00 25 66 9B 1E C2 34 4A C4 9F 86 29 D8 DB AF
>> To TPM: 99 A2 ED C4 0A 7A 99 68 BA 9A 89 7C F1 1F 1E 14
>> To TPM: 2F 10 F2 38 34 93 35 3A 95 DF C8 44 B0 71 5A E1
>> To TPM: 3C 25 2A 4F 19 AB C1 C5 ED DC 77 4B 17 45 9D C8
>> To TPM: 23 42 15 92 45 1B 2C C8 AE CD 2D 52 7D F9 05 B6
>> To TPM: 15 B2 32 D8 7D BE 4B 12 84 8B D8 23 1C 42 D9 57
>> To TPM: 02 8E F7 86 1B 09 01 CF AE EF 44 FA 57 28 40 4A
>> To TPM: 69 4C 66 1B 68 D0 D6 43 0F 50 86 C8 B2 55 EE D8
>> To TPM: 41 9E F6 CA BC E1 18 5B 5E C3 24 6D 62 D5 70 91
>> To TPM: 2C F4 D1 BE 1F 6B C2 8A 0B BD EA 68 FE 06 B6 75
>> To TPM: 16 55 BC E3 02 4F 47 F2 0C 31 0F 04 46 D6 E6 1A
>> To TPM: A8 40 DF CD 49 E0 F6 F9 AF 25 F8 8A 3D D8 01 DE
>> To TPM: 25 21 0D F2 AF 60 CD A0 E6 7F A1 6D 7D 5C 32 6A
>> To TPM: 07 FC 7F F9 3B EF DE 7E D3 13 59 32 F2 10 A5 F1
>> To TPM: 2F 62 62 E0 A9 6E B9 9D F0 95 EA EF CC C1 0A 89
>> To TPM: 32 49 C0 21 9E C9 38 21 47 4F 69 7A 46 76 BA C1
>> To TPM: 63 BC 97 85 29 96 A8 38 46 2C 49 12 43 40 CC 47
>> To TPM: D9 C3 C4 9F 8E 2A F8 FF 50 6C 00 39 D5 BA 19 9A
>> To TPM: 83 F8 66 48 0C F1 F6 2E FF E2 67 7E 9B A5 EA 8B
>> To TPM: A5 09 70 9F 7D 00 0D 85 61 BA 34 5A CA A3 09 C0
>> To TPM: AD 2E 99 E7 E2 CF 86 00 F7 F2 F0 C6 4F E2 2F 60
>> To TPM: E0 36 D9 4A CB 45 F1 EE BA DB DB AC
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 03
>> LOG_RETERR TPM tcsi_aik.c:136: 0x3
>> To TPM: 00 C1 00 00 00 12 00 00 00 BA 97 85 29 96 00 00
>> To TPM: 00 02
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 22
>> LOG_RETERR TPM tcsi_admin.c:464: 0x22
>> TCSD TCS tcs_auth_mgr.c:287 Tried to close an invalid auth handle: 97852996
>> TCSD TCS tcs_auth_mgr.c:118 no threads need to be signaled.
>> To TPM: 00 C1 00 00 00 12 00 00 00 BA 8B A5 09 70 00 00
>> To TPM: 00 02
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 22
>> LOG_RETERR TPM tcsi_admin.c:464: 0x22
>> TCSD TCS tcs_auth_mgr.c:287 Tried to close an invalid auth handle: 8ba50970
>> TCSD TCS tcs_auth_mgr.c:118 no threads need to be signaled.
>> TCSD tcsd_threads.c:408 Sending 0x1C bytes back
>> TCSD TCS rpc/tcstp/rpc.c:68 Socket connection closed.
>> TCSD tcsd_threads.c:420 Thread exiting.
>> TCSD TCS tcsi_context.c:39 Closing context A066F101
>> TCSD TCS tcs_key_mem_cache.c:661 key_mgr_dec_ref_count: decrementing ref cnt 
>> for key 0x22330000
>> TCSD TCS tcs_key_mem_cache.c:661 key_mgr_dec_ref_count: decrementing ref cnt 
>> for key 0x40000000
>> TCSD TCS tcs_key_mem_cache.c:682 key_mgr_ref_count: Key 0x278e6de0 being 
>> freed from TPM
>> TCSD TCS tcs_key.c:255 Entering Evict Key
>> TCSD TCS tcs_key.c:259 internal_EvictByKeySlot: Evicting key using 
>> FlushSpecific for TPM 1.2
>> To TPM: 00 C1 00 00 00 12 00 00 00 BA 27 8E 6D E0 00 00
>> To TPM: 00 01
>> TCSD TDDL tddl.c:171 Calling write to driver
>> >From TPM: 00 C4 00 00 00 0A 00 00 00 00
>> TCSD TCS tcs_key_mem_cache.c:685 key_mgr_ref_count: Key 0x22330000 being 
>> freed
>> TCSD TCS tcsi_context.c:51 Context A066F101 closed
>>
>> --
>> Stephen Smalley
>> National Security Agency
>>
>>
>
> ------------------------------------------------------------------------------
> This SF.net Dev2Dev email is sponsored by:
>
> Show off your parallel programming skills.
> Enter the Intel(R) Threading Challenge 2010.
> http://p.sf.net/sfu/intel-thread-sfd
> _______________________________________________
> TrouSerS-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/trousers-users
>

------------------------------------------------------------------------------
This SF.net Dev2Dev email is sponsored by:

Show off your parallel programming skills.
Enter the Intel(R) Threading Challenge 2010.
http://p.sf.net/sfu/intel-thread-sfd
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to