[Openpts-users] Running 'ptsc -sz start' failed against an Infineon 1.2 TPM Chip (SLB9635) as 'TPM_E_BAD_ORDINAL'

Back to archive index

Yang, Xiao (Linux) Xiao.****@windr*****
Mon Nov 28 17:48:56 JST 2011


> From: Seiji Munetoh [mailto:seiji****@gmail*****] 
> Sent: Sunday, November 27, 2011 8:37 AM
> To: Yang, Xiao (Linux)
> Cc: openp****@lists*****; 
> trous****@lists*****
> Subject: Re: [Openpts-users] Running 'ptsc -sz start' failed 
> against an Infineon 1.2 TPM Chip (SLB9635) as 'TPM_E_BAD_ORDINAL'
> 
> Hi Edward,
> 
> Ok, I had same error.
> Probably the reason is that this TPM does not support old TPM (v1.1b?)
> behavior.

Hi Seiji,

Exactly, now Wind River and Intel and Infineon's developers all involved.

We got this information from Infineon that their chip (IFX SLB9635) on my
system 'exclusively' support TSS 1.2 spec.

> 
> On Tue, Nov 22, 2011 at 12:47 PM, Yang, Xiao (Linux)
> <Xiao.****@windr*****> wrote:
> >>> TCSD TCS tcs_key.c:242 canILoadThisKey: YES
> >>> TCSD TCS tcsi_key.c:120 LoadKeyByBlob_Internal: 
> Submitting request to the
> >>> TPM
> >>> To TPM: 00 C1 00 00 02 3D 00 00 00 20 40 00 00 00 01 01
> 
> So the TPM_TAG is wrong for TPM_LoadKey command.
> 0xC1 =(TPM_TAG_RQU_COMMAND) must be 0xC2 =(TPM_TAG_RQU_AUTH1_COMMAND)
> 
> I tried  tpm_seal and tpm_unseal (they also use TPM_LoadKey) commands,
>  and they work well.

Yes, I tried tpm_seal/tpm_unseal also, and suceeded.

I noticed the 0xC1 problem once, it doesn't align to TSS spec's
document 'TPM Main-Part 3 Commands_v1.2_rev116_01032011.pdf'.

> OpenPTS uses null secret for the sign key.
> The error probably caused by handling of such auth secret.
> It will take some time to finish the investigation.
> 

OK, that will be greatly appreciated. Thank you for helping.

Best Regards 
Edward.Yang (#7023) 

> regards,
> --
> Seiji
> 
> >>> To TPM: 00 00 00 10 00 00 00 00 00 00 00 00 01 00 01 00
> >>> To TPM: 02 00 00 00 0C 00 00 08 00 00 00 00 02 00 00 00
> >>> To TPM: 00 00 00 00 00 00 00 01 00 C1 04 FE 11 73 A5 59
> >>> To TPM: 4B 38 0D 3E 8C A4 9B AB 5D 47 9E 5D 62 DF 21 89
> >>> To TPM: 20 98 5F 5A 7A 9D DD DD DF AC 29 41 07 1E 86 96
> >>> To TPM: DC EC 26 97 1F D4 E1 74 9E 96 FF 00 0A A1 85 55
> >>> To TPM: 1C FF 20 ED 41 55 9A BE 28 62 14 35 9E 9B 20 CB
> >>> To TPM: AF 6B 97 75 F9 EA 4D D4 76 13 12 44 6D 38 27 42
> >>> To TPM: 01 D1 EE EE 43 02 72 E3 0C B4 FE 42 59 32 F3 39
> >>> To TPM: 7F 88 64 70 6B 2B C4 21 94 6F F3 27 5E 34 2F 9A
> >>> To TPM: D8 98 3E DE B4 21 11 F4 09 52 66 28 7C B1 81 BD
> >>> To TPM: DB 23 08 20 FC DE 7D DE 29 FD 66 05 87 10 37 88
> >>> To TPM: 02 07 D7 10 51 A3 AB 91 98 97 D2 21 1B E6 EC F6
> >>> To TPM: C9 0D 2C E6 11 45 4D 73 2A 1A 00 9D D0 24 E7 0B
> >>> To TPM: 06 DA 03 80 1D 9A 69 44 C6 34 44 12 DB 26 CB 96
> >>> To TPM: 0A A0 13 92 D2 D4 1E 20 C1 0F 32 1E 22 EF 69 EE
> >>> To TPM: 7F AD 27 91 27 FA 7B 48 29 18 A5 5A C8 AD E4 D3
> >>> To TPM: DF 61 42 9D C8 A6 96 09 BF A7 6E 40 41 AB 67 7C
> >>> To TPM: 68 81 29 09 8E 76 8C 04 2B 00 00 01 00 0A 77 DA
> >>> To TPM: 48 EE 14 33 C5 A8 88 14 60 D6 9E 77 48 A0 35 5E
> >>> To TPM: 6A 0E 20 0B 8C 23 DC BA 1A 2B 59 25 03 0E FE 36
> >>> To TPM: 76 8B 44 D4 D5 55 71 AC 30 2E 64 F4 71 7E 8F 07
> >>> To TPM: 5B 33 CB 95 B4 54 80 27 85 96 1B 18 73 D1 FA 72
> >>> To TPM: 4A EE 16 A8 7C 74 CF 42 FD 5A 25 E5 85 03 C2 D9
> >>> To TPM: 61 97 F5 CD 42 75 4E F4 EF BE 95 19 27 5E CB 2D
> >>> To TPM: 5F 3D 5F C8 E5 4A E7 74 E9 58 45 98 4C 73 CB E0
> >>> To TPM: 93 BD 40 3F E8 2F 21 D0 8A 65 B2 EE 4C 8C D8 26
> >>> To TPM: 7D 85 62 C6 E8 C9 04 5A D1 66 8A 6B EA 17 38 F4
> >>> To TPM: C2 0D 4B 25 07 B8 1B A2 E0 92 19 AD BB 00 A9 0F
> >>> To TPM: CD E3 6B 18 3C 9D 0C 5C B2 2C D3 75 27 3C A8 B4
> >>> To TPM: 75 96 68 64 2B 2D 28 F4 CE 9B 86 E3 67 53 86 CF
> >>> To TPM: E6 CD 7F E8 1F 31 E4 13 6F 0E 10 3F 1B 9D 52 C1
> >>> To TPM: A9 3E 63 FA DF 2C 22 46 7F CD 89 51 C9 6B 0F A0
> >>> To TPM: BB 14 E9 B9 7C C4 2B 2E 0E BD 43 F1 73 99 9A 91
> >>> To TPM: 92 77 7C C6 56 0D 9A 6A B0 3C 73 66 3B
> >>> TCSD TDDL tddl.c:171 Calling write to driver
> >>> From TPM: 00 C4 00 00 00 0A 00 00 00 0A
> >>> LOG_RETERR TPM tcsi_key.c:124: 0xa
> >>> TCSD TCS tcsi_key.c:125 LoadKeyByBlob_Internal: 
> UnloadBlob_Header failed:
> >>> rc=0xa
> >>> TCSD TCS tcsi_ps.c:573 TCSP_LoadKeyByUUID_Internal:
> >>> TCSP_LoadKeyByBlob_Internal returned 0xa
> >>> TCSD TCS tcs_ps.c:170 Key NOT loaded by UUID w/ TCS handle: 0x0
> >>> LOG_RETERR TCSD TCS rpc/tcstp/rpc_ps.c:195: 0xca
> >>> TCSD tcsd_threads.c:408 Sending 0x1C bytes back
> >>> ERROR:tss.c:1518 Tspi_Context_LoadKeyByUUID (Key) failed rc=0xa
> >>> ??????????????? UUID[16]=030B3F5C5C4A11E086FD00E04B3894CE
> >>> LOG_DEBUG TSPI rpc/tcstp/rpc_context.c:60 
> RPC_CloseContext_TP: TCS Context:
> >>> 0xa0a11605
> >>> TCSD tcsd_threads.c:381 Rx'd packet
> >>> ERROR:ir.c:2807 quoteTss fail, rc = 0x0010
> >>> ERROR:ir.c:2858 gen IR failed
> >>> ERROR:collector.c:453 selftest() - genIR failed
> >>> INFO:TBD
> >>>
> >>> I have tried simply replace 'TPM_ORDIN_LoadKey' I found 
> in trousers' source
> >>> code to 'TPM_ORDIN_LoadKey2', but didn't work.
> >>> I also have consulted with Infineon's developing team, 
> but they are not
> >>> familiar with neither TrouSerS nor OpenPTS open-source projects.
> >>>
> >>> That's why I turned to this list (found at
> >>> http://sourceforge.jp/projects/openpts/lists/) which I 
> think contains more
> >>> expert about those 2 projects.
> >>>
> >>> Could any one being reading give any suggestions about 
> how to overcome this,
> >>> please ? Thank you in advance.
> >>>
> >>> Best Regards
> >>> Edward.Yang (#7023)
> >>>
> >>>
> >>> _______________________________________________
> >>> Openpts-users mailing list
> >>> Openp****@lists*****
> >>> http://lists.sourceforge.jp/mailman/listinfo/openpts-users
> >>>
> >>>
> >
> 



More information about the Openpts-users mailing list
Back to archive index