This is Xeron Healthcare Corp.****
** **
We are trying to development security system with TPM****
We are using Infineon's TPM in Sony VAIO laptop.****
** **
And we are making MFC based program using tbs.h library provided by MS.****
** **
** **
We succeeded to get Random Value,Read Pubek,Read PCR****
But we have problem with taking ownership.****
Although I created keyhandle using TPM_OIAP, ****
When I execute TPM_TakeOwnership, it returns TPM_Invalid_keyhandle.****
And I'm not sure that I input correctly nonceOdd, ownerAuth. ****
** **
Could you help me know the information about incoming operands to take
ownership?****
Although tbs.h is different from tss.h, I think that basic APIs are same in
tbs.h and tss.h****
So, the way making incoming operands will be same. ****
** **
For reference I attach the incoming operands below.****
** **
BYTE bCmd1[] = {****
0,
0xC2, //
TPM_TAG_RQD_AUTH1_COMMAND****
0, 0, 0,
0, // blob
length in bytes****
0, 0, 0,
13, // TPM API code
(TPM_ORD_ReadPubek)****
0,
5, //
TPM_PROTOCOL_ID****
0, 0, 0,
20, // encOwnerAuthSize****
EncOwnerAuth[0], EncOwnerAuth[1],
EncOwnerAuth[2], EncOwnerAuth[3], // encOwnerAuth****
EncOwnerAuth[4], EncOwnerAuth[5],
EncOwnerAuth[6], EncOwnerAuth[7], ****
EncOwnerAuth[8], EncOwnerAuth[9],
EncOwnerAuth[10], EncOwnerAuth[11], ****
EncOwnerAuth[12], EncOwnerAuth[13],
EncOwnerAuth[14], EncOwnerAuth[15], ****
EncOwnerAuth[16], EncOwnerAuth[17],
EncOwnerAuth[18], EncOwnerAuth[19], ****
0, 0, 0,
20, // encSrkAuthSize****
EncSrkAuth[0], EncSrkAuth[1], EncSrkAuth[2],
EncSrkAuth[3], // encSrkAuth**
**
EncSrkAuth[4], EncSrkAuth[5], EncSrkAuth[6],
EncSrkAuth[7],****
EncSrkAuth[8], EncSrkAuth[9], EncSrkAuth[10],
EncSrkAuth[11],****
EncSrkAuth[12], EncSrkAuth[13], EncSrkAuth[14],
EncSrkAuth[15],****
EncSrkAuth[16], EncSrkAuth[17], EncSrkAuth[18],
EncSrkAuth[19],****
// <srkParams>****
1, 1, 0,
0, // ver****
0,
11, //
keyUsage****
0, 0, 0,
0, //
keyFlags****
0,
// AuthDataUsage****
// <AlgorithmParms>****
0, 0, 0,
1,
// algorithmID****
0,
3,
// encScheme****
0,
1,
// sigScheme****
0, 0, 0,
12, // ParmSize*
***
// parms****
0, 0, 8,
0,
// keyBitLength****
0, 0, 0,
2,
// numPrimes****
0, 0, 0,
0,
// exponentSize****
// <AlgorithmParms> End ****
0, 0, 0,
0,
// PCRInfoSize****
//NULL,
// PCRInfo****
// <TPM_STORE_PUBKEY>****
0, 0, 0,
0, //
KeyLength****
//NULL,
// Key****
0, 0, 0,
0, //
encDataSize****
//NULL,
// encData****
// <srkParms> End****
bAuthHandle[10], bAuthHandle[11],
bAuthHandle[12], bAuthHandle[13], // AuthHandle****
// bAuthHandle[14], bAuthHandle[15],
bAuthHandle[16], bAuthHandle[17], // nonceOdd****
// bAuthHandle[18], bAuthHandle[19],
bAuthHandle[20], bAuthHandle[21],****
// bAuthHandle[22], bAuthHandle[23],
bAuthHandle[24], bAuthHandle[25],****
// bAuthHandle[26], bAuthHandle[27],
bAuthHandle[28], bAuthHandle[29],****
// bAuthHandle[30], bAuthHandle[31],
bAuthHandle[32], bAuthHandle[33],****
0, 1, 2,
3, ****
0, 0, 0, 0,****
0, 0, 0, 0,****
0, 0, 0, 0,****
0, 0, 0, 0,****
****
1,
// continueAuthSession****
** **
EncOwnerAuth[0], EncOwnerAuth[1],
EncOwnerAuth[2], EncOwnerAuth[3], // OwnerAuth****
EncOwnerAuth[4], EncOwnerAuth[5],
EncOwnerAuth[6], EncOwnerAuth[7], ****
EncOwnerAuth[8], EncOwnerAuth[9],
EncOwnerAuth[10], EncOwnerAuth[11], ****
EncOwnerAuth[12], EncOwnerAuth[13],
EncOwnerAuth[14], EncOwnerAuth[15], ****
EncOwnerAuth[16], EncOwnerAuth[17],
EncOwnerAuth[18], EncOwnerAuth[19]****
};****
** **
If you could, Please help us..!****
** **
Sincerly, ****
**
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users