opencryptoki-users Mailing List for openCryptoki (Page 9)
Brought to you by:
ebarretto
You can subscribe to this list here.
2005 |
Jan
|
Feb
|
Mar
|
Apr
(3) |
May
|
Jun
(8) |
Jul
(5) |
Aug
(5) |
Sep
(2) |
Oct
|
Nov
(3) |
Dec
|
---|---|---|---|---|---|---|---|---|---|---|---|---|
2006 |
Jan
(7) |
Feb
(5) |
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
(7) |
Aug
|
Sep
|
Oct
|
Nov
(8) |
Dec
(3) |
2007 |
Jan
(14) |
Feb
|
Mar
|
Apr
(14) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(2) |
Nov
(10) |
Dec
(6) |
2008 |
Jan
(2) |
Feb
|
Mar
(5) |
Apr
(6) |
May
(3) |
Jun
(6) |
Jul
(10) |
Aug
(4) |
Sep
(17) |
Oct
(13) |
Nov
(43) |
Dec
(72) |
2009 |
Jan
(4) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(9) |
Sep
(5) |
Oct
(2) |
Nov
|
Dec
|
2010 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
(23) |
Aug
|
Sep
|
Oct
|
Nov
(9) |
Dec
|
2011 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2012 |
Jan
|
Feb
(15) |
Mar
|
Apr
(1) |
May
(6) |
Jun
(5) |
Jul
|
Aug
(2) |
Sep
(6) |
Oct
|
Nov
(1) |
Dec
|
2013 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(6) |
Sep
|
Oct
|
Nov
|
Dec
|
2016 |
Jan
(1) |
Feb
|
Mar
(1) |
Apr
|
May
(5) |
Jun
(1) |
Jul
|
Aug
|
Sep
(4) |
Oct
(2) |
Nov
|
Dec
|
2017 |
Jan
|
Feb
|
Mar
(2) |
Apr
(1) |
May
(2) |
Jun
(1) |
Jul
|
Aug
|
Sep
(1) |
Oct
(2) |
Nov
(1) |
Dec
|
2018 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
|
2019 |
Jan
(1) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2021 |
Jan
|
Feb
(4) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: David M. <bl...@gm...> - 2007-04-04 04:01:07
|
Hey. I was just wondering if anyone had successfully managed to use opencryptoki with Strongswan? I'm trying to store my x.509 cert/key in the TPM module of my T43p and have Strongswan use it. Currently (according to all the tpmtoken tools) the key/cert are stored successfully, but when I try and get strongswan to use it it keeps claiming the pin is incorrect. strace on tcsd shows no activity with this failed pin attempt, so I'm a bit dubious. I've pinged the strongswan-users list as well, but was just curious if anyone had tried this setup before and had some hints? Thanks, -David |
From: Michal P. <mi...@ic...> - 2007-01-25 08:13:34
|
Sorry, I didn't notice that I sent the mail only to Tom, so here it is... -------- Original Message -------- Subject: Re: [opencryptoki-users] tpmtoken_init, set the SO PIN fail Date: Fri, 19 Jan 2007 14:10:45 +0100 From: Michal Prochazka <mi...@ic...> Reply-To: mi...@ic... To: Tom Lendacky <to...@us...> References: <OF4...@us...> Hi Tom, On Thu, 2007-01-18 at 09:55 -0600, Tom Lendacky wrote: > I'm not sure what is going wrong. I pulled down the openCryptoki from > CVS, > trousers (cvs tag TROUSERS_0_2_8) and tpm-tools and rebuilt and > installed > each of them. I did a tpm_takeownership, specifying an owner password > and NO srk password (just hit enter when prompted - this is a > requirement). > I did a tpmtoken_init and provided new SO and USER passwords. > Everything > finished successfully. > > Try building everything with debugging enabled (all the configure > scripts > should support the --enable-debug flag). Run the trousers daemon in > the > foreground (tcsd -f) and then set PKCS11_API_LOG_DEBUG=1 when > executing > the tpmtoken_init command (ie. at the command prompt enter > PKCS11_API_LOG_DEBUG=1 tpmtoken_init). Be sure your syslog > configuration > will capture daemon facility debug messages. You may want to add a > line > at the top of the /etc/syslog.conf file like > "daemon.debug /var/log/cryptoki" > Post the contents and we'll see if we can't figure out what's going > wrong. Maybe I'm doing something wrong... Is there any documentation of the installation process of the tpm-pkcs11? Is it correct if I have to start the tcsd and pkcsslotd before I can do anything with the tpmtoken tools? Of course I hit enter when I was asked for SRK password. So here are the logs: tcsd -f ------- TCSD svrside.c:268 accepted socket 6 TCSD tcsd_threads.c:196 Rx'd packet TCSD tcsd_wrap.c:4645 Dispatching ordinal 1 TCSD tcsd_wrap.c:323 thread 40800940 servicing a tcs_wrap_OpenContext request TCSD tcsd_threads.c:242 Sending 0x40E bytes back TCSD tcsd_wrap.c:4645 Dispatching ordinal 12 TCSD tcsd_wrap.c:1720 thread 40800940 context a0a79e06: tcs_wrap_LoadKeyByUUID TCS tcskcm.c:546 TCSP_LoadKeyByUUID_Internal: Enter: uuid: 0x406ef7d0 auth? 0x0 *********** TCS cache.c:720 key_mgr_inc_ref_count: TCSD mem_cached handle: 0x40000000 TCS cache.c:686 Key successfully loaded by UUID w/ TCS handle: 0x40000000 TCSD tcsd_threads.c:242 Sending 0x483 bytes back TCSD tcsd_wrap.c:4645 Dispatching ordinal 9 TCSD tcsd_wrap.c:1576 thread 40800940 context a0a79e06: tcs_wrap_GetRegisteredKeyBlob TCS ps/tcsps.c:171 psfile_get_key_by_uuid: Version: 1.1.0.0 TCS ps/tcsps.c:171 psfile_get_key_by_uuid: keyUsage: 0x11 TCS ps/tcsps.c:171 psfile_get_key_by_uuid: keyFlags: 0x0 TCS ps/tcsps.c:171 psfile_get_key_by_uuid: authDatausage: 1 TCS ps/tcsps.c:171 psfile_get_key_by_uuid: pcrInfosize: 0 TCS ps/tcsps.c:171 psfile_get_key_by_uuid: encDataSize: 0 TCSD tcsd_threads.c:242 Sending 0x53D bytes back TCSD tcsd_wrap.c:4645 Dispatching ordinal 44 TCSD tcsd_wrap.c:366 thread 40800940 context a0a79e06: tcs_wrap_GetRandom TCS tcspbg.c:1713 TCSP_GetRandom_Internal: 32 bytes To TPM: 00 C1 00 00 00 0E 00 00 00 46 00 00 00 20 TDDL tddl.c:105 Calling write to driver >From TPM: 00 C4 00 00 00 2E 00 00 00 00 00 00 00 20 AC 06 >From TPM: FF 36 70 76 68 2C CD 4B 39 E6 C1 28 38 15 7D 6E >From TPM: B4 A2 78 4C BD 22 83 38 63 4A 27 58 B8 A6 TCS tcspbg.c:1735 TCSP_GetRandom_Internal: received 32 bytes from the TPM TCSD tcsd_threads.c:242 Sending 0x42E bytes back TCSD tcsd_wrap.c:4645 Dispatching ordinal 23 TCSD tcsd_wrap.c:783 thread 40800940 context a0a79e06: tcs_wrap_OIAP TCS tcspbg.c:180 Entering TCSI_OIAP To TPM: 00 C1 00 00 00 0A 00 00 00 0A TDDL tddl.c:105 Calling write to driver >From TPM: 00 C4 00 00 00 22 00 00 00 00 00 00 00 00 F1 96 >From TPM: F5 5F 60 3C 10 A6 85 F4 6B 8B 77 AF 1E E6 79 46 >From TPM: 2E 0B TCS auth_mgr.c:265 added auth for TCS a0a79e06 TPM 0 TCSD tcsd_threads.c:242 Sending 0x422 bytes back TCSD tcsd_wrap.c:4645 Dispatching ordinal 15 TCSD tcsd_wrap.c:717 thread 40800940 context a0a79e06: tcs_wrap_GetPubkey TCS tcskcm.c:746 Entering Get pub key TCS tcskcm.c:751 Auth Used TCS cache.c:200 ensureKeyIsLoaded: 0x40000000 TCS cache.c:793 mc_get_slot_by_handle: TCSD mem_cached handle: 0x40000000 TCS cache.c:205 keySlot is 40000000 TCS cache.c:972 mc_update_time_stamp: TCSD mem_cached handle: 0x40000000 TCS cache.c:230 ensureKeyIsLoaded: Exit TCS tcskcm.c:763 GetPubKey: handle: 0x40000000, slot: 0x40000000 To TPM: 00 C2 00 00 00 3B 00 00 00 21 40 00 00 00 00 00 To TPM: 00 00 0D 8C A9 33 CE 59 3C C2 FB 6E 85 32 B4 4F To TPM: AA 6C C4 82 B0 DC 00 C3 83 6C E1 C0 CF 8F 81 4A To TPM: D6 EE 81 5D E0 76 E3 F4 69 C9 D5 TDDL tddl.c:105 Calling write to driver >From TPM: 00 C4 00 00 00 0A 00 00 00 0C TCS auth_mgr.c:218 released auth for TCS a0a79e06 TPM 0 TCS auth_mgr.c:92 no threads need to be signaled. TCSD tcsd_threads.c:242 Sending 0x40B bytes back TCSD tcsd_wrap.c:4645 Dispatching ordinal 2 TCSD tcsd_wrap.c:649 thread 40800940 context a0a79e06: tcs_wrap_CloseContext TCS tcscm.c:40 Closing context A0A79E06 TCS cache.c:744 key_mgr_dec_ref_count: decrementing ref cnt for key 0x40000000 TCS tcscm.c:52 Context A0A79E06 closed TCSD tcsd_threads.c:242 Sending 0x40B bytes back TCSD tcsd_threads.c:270 The TSP has closed the socket's connection. Thread exiting. ---------------------------------------------------------------------- syslog: ------- Jan 19 14:05:33 tapio pkcsslotd: Shared memory file is /usr/local/sbin/pkcsslotd Jan 19 14:06:08 tapio openCryptokiModule[2003]: Logging enabled 1 enabled Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_GetFunctionList Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_Initialize Jan 19 14:06:08 tapio openCryptokiModule[2003]: Anchor allocated at 60d9c0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: Shared memory 1af56000 Jan 19 14:06:08 tapio openCryptokiModule[2003]: API_Register MgrProcIndc 2003 pid 0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: DL_Load_and_Init dll_location libpkcs11_tpm.so Jan 19 14:06:08 tapio openCryptokiModule[2003]: DL_LOAD Jan 19 14:06:08 tapio openCryptokiModule[2003]: Empty slot at 0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: return from STDDLL Init = 0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: DL_LOADED Looking for index 0 name libpkcs11_tpm.so Jan 19 14:06:08 tapio openCryptokiModule[2003]: DL_Load_and_Init dll_location libpkcs11_sw.so Jan 19 14:06:08 tapio openCryptokiModule[2003]: DL_LOAD Jan 19 14:06:08 tapio openCryptokiModule[2003]: Empty slot at 1 Jan 19 14:06:08 tapio openCryptokiModule[2003]: return from STDDLL Init = 0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_GetSlotList Jan 19 14:06:08 tapio openCryptokiModule[2003]: Pres 0 Count 0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_GetSlotList Jan 19 14:06:08 tapio openCryptokiModule[2003]: Pres 0 Count 2 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_GetSlotInfo Slot=0 ptr=90eb3cf0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_GetTokenInfo Jan 19 14:06:08 tapio openCryptokiModule[2003]: Slot p = 60da40 id 0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: Calling STDLL Jan 19 14:06:08 tapio openCryptokiModule[2003]: rv 0 CK_TOKEN_INFO Flags 880045 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_InitToken Jan 19 14:06:08 tapio openCryptokiModule[2003]: Called STDLL rv = 0x0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_OpenSession 0 6 0 0 90eb3f38 Jan 19 14:06:08 tapio openCryptokiModule[2003]: Called STDLL rv = 0x0 Jan 19 14:06:08 tapio openCryptokiModule[2003]: C_Login Jan 19 14:06:08 tapio openCryptokiModule[2003]: Called STDLL rv = 0x0 Jan 19 14:06:17 tapio openCryptokiModule[2003]: C_SetPIN Jan 19 14:06:17 tapio openCryptokiModule[2003]: Called STDLL rv = 0x6 Jan 19 14:06:17 tapio openCryptokiModule[2003]: C_CloseSession Jan 19 14:06:17 tapio openCryptokiModule[2003]: Called STDLL rv = 0x0 Jan 19 14:06:17 tapio openCryptokiModule[2003]: C_Finalize Jan 19 14:06:17 tapio openCryptokiModule[2003]: Terminate_All_Process_Sessions Jan 19 14:06:17 tapio openCryptokiModule[2003]: CloseAllSessions Jan 19 14:06:17 tapio openCryptokiModule[2003]: CloseAllSessions OK Jan 19 14:06:17 tapio openCryptokiModule[2003]: CloseAllSessions Jan 19 14:06:17 tapio openCryptokiModule[2003]: CloseAllSessions OK ---------------------------------------------------------------------- tpmtoken_init: -------------- tpmtoken_init LOG_DEBUG TSPI ../tcsd_api/clntside.c:58 Sending TSP packet to host localhost. LOG_DEBUG TSPI ../tcsd_api/clntside.c:74 Connecting to 127.0.0.1 LOG_DEBUG TSPI ../tcsd_api/tcstp.c:277 TCS_OpenContext_RPC_TP: Received TCS Context: 0xa0a79e06 LOG_ERR TPM_STDLL tpm_specific.c:199 ERROR: key with ID="PUBLIC ROOT KEY" not found in the store! LOG_DEBUG TSPI ../tcsd_api/tcstp.c:866 TCSP_LoadKeyByUUID_TP: TCS Context: 0xa0a79e06 LOG_DEBUG TSPI ../tcsd_api/tcstp.c:887 TCSP_LoadKeyByUUID_TP: TCS key handle: 0x40000000 LOG_DEBUG TSPI ../tcsd_api/tcstp.c:761 TCS_GetRegisteredKeyBlob_TP: TCS Context: 0xa0a79e06 LOG_ERR TPM_STDLL tpm_specific.c:199 ERROR: key with ID="PUBLIC ROOT KEY" not found in the store! A new TPM security officer password is needed. The password must be between 6 and 127 characters in length. Enter new password: Confirm password: LOG_DEBUG TSPI ../tcsd_api/tcstp.c:2595 TCSP_GetRandom_TP: TCS Context: 0xa0a79e06 LOG_DEBUG TSPI ../tcsd_api/tcstp.c:1348 TCSP_OIAP_TP: TCS Context: 0xa0a79e06 LOG_DEBUG TSPI obj_policy.c:227 Got a secret: DA 39 A3 EE 5E 6B 4B 0D 32 55 BF EF 95 60 18 90 AF D8 07 09 LOG_DEBUG TSPI ../tcsd_api/tcstp.c:1011 TCSP_GetPubKey_TP: TCS Context: 0xa0a79e06 LOG_ERR TPM_STDLL tpm_specific.c:300 ERROR: Tspi_Key_GetPubKey failed: rc=0xc LOG_ERR TPM_STDLL tpm_specific.c:1075 ERROR: token_wrap_sw_key failed. rc=0xc LOG_ERR TPM_STDLL tpm_specific.c:1731 ERROR: FAILED creating SO tree. ST MSG TPM_STDLL new_host.c:1224 whammy C_SetPIN failed: 0x00000006 (6) LOG_DEBUG TSPI ../tcsd_api/tcstp.c:355 TCS_CloseContext_TP: TCS Context: 0xa0a79e06 I see the "ERROR: Tspi_Key_GetPubKey failed" but I don't know what to do? Thanks in advance. Michal P. -- Michal Prochazka // mi...@ic... Supercomputing Center Brno Institute of Computer Science Masaryk University Botanicka 68a, 60200 Brno, CZ CESNET z.s.p.o. Zikova 4, 16200 Praha 6, CZ -- Michal Prochazka // mi...@ic... Supercomputing Center Brno Institute of Computer Science Masaryk University Botanicka 68a, 60200 Brno, CZ CESNET z.s.p.o. Zikova 4, 16200 Praha 6, CZ |
From: Kent Y. <shp...@gm...> - 2007-01-23 17:43:57
|
Hi Conor, First off, the testcases included with the opencryptoki 2.2.4 tarball are very old. The ones in CVS head should be used. Their build has been tied in with the rest of opencryptoki, and they support pulling the user and SO pins from environment variables (PKCS11_USER_PIN and PKCS11_SO_PIN), which makes running them much easier. Sorry about that. Next, when I comment out the 'return TRUE;' in aes_func.c in the driver directory, which seems to be short circuiting the AES tests, the CBC AES test fails, since a NULL template is being passed in to create the AES key in that case. Looking through these tests, I found 4 general problems: invalid key creation templates, invalid IV sizes, invalid key unwrapping templates and invalid buffer sizes for decrypt operations. I've now fixed these problems and made the AES tests run by default, the fixed code is in CVS. I didn't run into the error you got above, though. Can you tell me if you still get that problem using the CVS testcases? Thanks, Kent On 1/15/07, conor fitzgerald <bou...@ho...> wrote: > Hello > When runnning the aes_func test in testcases/v2.11/ i get the folllowing > error > > do_EncryptAES_ECB... > Looks okay... > Time: 2 msec > do_EncryptAES_CBC... > Looks okay... > Time: 1 msec > do_EncryptAES_Multipart_ECB... > Looks okay... > Time: 2 msec > do_EncryptAES_Multipart_CBC... > Looks okay... > Time: 2 msec > do_EncryptAES_Multipart_CBC_PAD... > Looks okay... > Time: 2 msec > do_WrapUnwrapAES_ECB... > aes_func.c line 1218 Error: C_UnWrapKey #1 returned: 112 > CKR_MECHANISM_INVALID > > All the other tests seem to work fine in this file(when i block out the > WrapUnwrapAes_ECB test) > Has anyone else got this error,any suggestions? > > Also when i run driver testcases in testcases/driver only one function > do_encryptAES_ECB from aes_func is called(when i unblocked the return true > in the main section of aes_func ,a lot oferrors were returned),i assume this > due to above v2.11 aes_func is the deault tests now. > > Conor > > _________________________________________________________________ > The MSN Entertainment Guide to Golden Globes is here. Get all the scoop. > http://tv.msn.com/tv/globes2007/?icid=nctagline2 > > > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > -- Kent Yoder IBM LTC Security Dev. |
From: Kent Y. <shp...@gm...> - 2007-01-19 16:06:05
|
Yep, the same problem that Evan is having with the EK on this 1.2 Atmel TPM, you are having here with the SRK. The trousers TSS 1.2 branch has support for setting the readPubSRK flag though. If you download the trousers TSS 1.2 code from CVS head and run this [1] testcase, it should allow your SRK to be read. [1] http://trousers.cvs.sourceforge.net/trousers/testsuite/tcg/highlevel/tpm/Tspi_TPM_SetStatus05.c?revision=1.3&view=markup Kent On 1/19/07, Tom Lendacky <to...@us...> wrote: > > > Michal Prochazka <mi...@ic...> wrote on 01/19/2007 07:10:42 AM: > > Snip... > > > tcs_wrap_GetPubkey > > TCS tcskcm.c:746 Entering Get pub key > > TCS tcskcm.c:751 Auth Used > > TCS cache.c:200 ensureKeyIsLoaded: 0x40000000 > > TCS cache.c:793 mc_get_slot_by_handle: TCSD mem_cached handle: > > 0x40000000 > > TCS cache.c:205 keySlot is 40000000 > > TCS cache.c:972 mc_update_time_stamp: TCSD mem_cached handle: 0x40000000 > > TCS cache.c:230 ensureKeyIsLoaded: Exit > > TCS tcskcm.c:763 GetPubKey: handle: 0x40000000, slot: 0x40000000 > > To TPM: 00 C2 00 00 00 3B 00 00 00 21 40 00 00 00 00 00 > > To TPM: 00 00 0D 8C A9 33 CE 59 3C C2 FB 6E 85 32 B4 4F > > To TPM: AA 6C C4 82 B0 DC 00 C3 83 6C E1 C0 CF 8F 81 4A > > To TPM: D6 EE 81 5D E0 76 E3 F4 69 C9 D5 > > TDDL tddl.c:105 Calling write to driver > > From TPM: 00 C4 00 00 00 0A 00 00 00 0C > > Snip... > > > LOG_ERR TPM_STDLL tpm_specific.c:300 ERROR: Tspi_Key_GetPubKey failed: > > rc=0xc > > LOG_ERR TPM_STDLL tpm_specific.c:1075 ERROR: token_wrap_sw_key failed. > > rc=0xc > > LOG_ERR TPM_STDLL tpm_specific.c:1731 ERROR: FAILED creating SO tree. > > ST MSG TPM_STDLL new_host.c:1224 whammy > > C_SetPIN failed: 0x00000006 (6) > > LOG_DEBUG TSPI ../tcsd_api/tcstp.c:355 TCS_CloseContext_TP: TCS Context: > > 0xa0a79e06 > > > > > > I see the "ERROR: Tspi_Key_GetPubKey failed" but I don't know what to > > do? > > > > Ok, is this a 1.2 TPM? If that's the case I think I know what the problem > is... With 1.2, the SRK public key cannot be read by default. You must > enable the reading of the SRK public key through the TSS. Sounds like > we need a new command for tpm-tools. > > Kent, does trousers have support for changing this setting for 1.2 TPMs? > What needs to be done? > > Michal, you may have to write a small program to change this TPM flag in > the meantime. Lets see what Kent says. > > Thanks, > Tom > > > Thanks in advance. > > > > Michal P. > > -- > > Michal Prochazka // mi...@ic... > > > > Supercomputing Center Brno > > Institute of Computer Science > > Masaryk University > > Botanicka 68a, 60200 Brno, CZ > > > > CESNET z.s.p.o. > > Zikova 4, 16200 Praha 6, CZ > > > > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > -- Kent Yoder IBM LTC Security Dev. |
From: Tom L. <to...@us...> - 2007-01-19 15:22:49
|
Michal Prochazka <mi...@ic...> wrote on 01/19/2007 07:10:42 AM: Snip... > tcs_wrap_GetPubkey > TCS tcskcm.c:746 Entering Get pub key > TCS tcskcm.c:751 Auth Used > TCS cache.c:200 ensureKeyIsLoaded: 0x40000000 > TCS cache.c:793 mc_get_slot_by_handle: TCSD mem_cached handle: > 0x40000000 > TCS cache.c:205 keySlot is 40000000 > TCS cache.c:972 mc_update_time_stamp: TCSD mem_cached handle: 0x40000000 > TCS cache.c:230 ensureKeyIsLoaded: Exit > TCS tcskcm.c:763 GetPubKey: handle: 0x40000000, slot: 0x40000000 > To TPM: 00 C2 00 00 00 3B 00 00 00 21 40 00 00 00 00 00 > To TPM: 00 00 0D 8C A9 33 CE 59 3C C2 FB 6E 85 32 B4 4F > To TPM: AA 6C C4 82 B0 DC 00 C3 83 6C E1 C0 CF 8F 81 4A > To TPM: D6 EE 81 5D E0 76 E3 F4 69 C9 D5 > TDDL tddl.c:105 Calling write to driver > From TPM: 00 C4 00 00 00 0A 00 00 00 0C Snip... > LOG_ERR TPM_STDLL tpm_specific.c:300 ERROR: Tspi_Key_GetPubKey failed: > rc=0xc > LOG_ERR TPM_STDLL tpm_specific.c:1075 ERROR: token_wrap_sw_key failed. > rc=0xc > LOG_ERR TPM_STDLL tpm_specific.c:1731 ERROR: FAILED creating SO tree. > ST MSG TPM_STDLL new_host.c:1224 whammy > C_SetPIN failed: 0x00000006 (6) > LOG_DEBUG TSPI ../tcsd_api/tcstp.c:355 TCS_CloseContext_TP: TCS Context: > 0xa0a79e06 > > > I see the "ERROR: Tspi_Key_GetPubKey failed" but I don't know what to > do? > Ok, is this a 1.2 TPM? If that's the case I think I know what the problem is... With 1.2, the SRK public key cannot be read by default. You must enable the reading of the SRK public key through the TSS. Sounds like we need a new command for tpm-tools. Kent, does trousers have support for changing this setting for 1.2 TPMs? What needs to be done? Michal, you may have to write a small program to change this TPM flag in the meantime. Lets see what Kent says. Thanks, Tom > Thanks in advance. > > Michal P. > -- > Michal Prochazka // mi...@ic... > > Supercomputing Center Brno > Institute of Computer Science > Masaryk University > Botanicka 68a, 60200 Brno, CZ > > CESNET z.s.p.o. > Zikova 4, 16200 Praha 6, CZ > |
From: Tom L. <to...@us...> - 2007-01-18 15:57:45
|
mi...@ic... wrote on 01/12/2007 03:27:02 PM: > On 1/12/2007, "Tom Lendacky" <to...@us...> wrote: > >mi...@ic...ni.c wrote on 01/12/2007 02:49:51 PM: > > > >> On 1/12/2007, "Tom Lendacky" <to...@us...> wrote: > > > >> >mi...@ic... wrote on 01/12/2007 01:20:41 PM: > >> > > >> >> On 1/12/2007, "Kent Yoder" <shp...@gm...> wrote: > >> >> >Also, there is a known bug which may be affecting you in the 2.2.4 > >> >> >tarball of openCryptoki, in the TPM code. If you're running against > >> >> >trousers 0.2.8+, download the latest openCryptoki from CVS, which has > >> >> >the fix. Let me know if you run into any problems with that code. > >> > > >> >> Hi, > >> > > >> >> thank you for your reply. Yes I'm using latest OpenCryptoki from CVS. > >> >> Where can be found information like the intial SO PIN 87654321? I > >> >> didn't know it. > >> > > >> >> I've tried the initial SO PIN but pkcsconf -c 0 -P returns me: Error > >> >> setting PIN: 0x6 > >> > > >> >> What is the right order of commands? pkcsconf -I -c 0 -P and then > >> >> tpmtoken_init or reverse? > >> > > >> >If you are using tpmtoken_init there is no need to use the pkcsconf > >> >command at all (tpmtoken_init uses the default SO PIN and USER PIN > >> >under the covers for you). One thing you can do to try and reset > >> >everything and start fresh is to stop the pkcsslotd daemon, delete > >> >the tpm token data for your user (either under /var/lib/opencryptoki/tpm > >> >or /usr/local/var/lib/opencryptoki/tpm) and then restart the pkcsslotd > >> >daemon. You should then be able to issue the tpmtoken_init command > >> >and supply new passwords for the SO and USER. > > > >> Hi Tom, > > > >> I've built everything again. But without success. tpmtoken_init is still > >> returning: C_SetPIN failed: 0x00000006 (6) > >> And pkcsconf -c 0 -P is returning: Error setting PIN: 0x6 > > > >> And there is also one strange thing, after OpenCryptoki is built and > >> installed I have to move directory /usr/local/lib/opencryptoki into > >> /usr/local/lib64 because binaies from the OpenCryptoki are looking for > >> libs in lib64 directory. But the configure script from the OpenCryptoki > >> correctly recognize x86_64 architecture. > > > >You'll need to specify the libdir path on the configure command in order > >to get the proper library installation path (automake and autoconf don't > >automatically provide that support). > ok. > >Is your user a member of the pkcs11 group? You need to be a member of > >that group in order to use the PKCS#11 functions. > yes. Because it is test machine I'm trying it as a root. I'm not sure what is going wrong. I pulled down the openCryptoki from CVS, trousers (cvs tag TROUSERS_0_2_8) and tpm-tools and rebuilt and installed each of them. I did a tpm_takeownership, specifying an owner password and NO srk password (just hit enter when prompted - this is a requirement). I did a tpmtoken_init and provided new SO and USER passwords. Everything finished successfully. Try building everything with debugging enabled (all the configure scripts should support the --enable-debug flag). Run the trousers daemon in the foreground (tcsd -f) and then set PKCS11_API_LOG_DEBUG=1 when executing the tpmtoken_init command (ie. at the command prompt enter PKCS11_API_LOG_DEBUG=1 tpmtoken_init). Be sure your syslog configuration will capture daemon facility debug messages. You may want to add a line at the top of the /etc/syslog.conf file like "daemon.debug /var/log/cryptoki" Post the contents and we'll see if we can't figure out what's going wrong. Thanks, Tom > >Thanks > >Tom > > > >> Michal > > > >> >> >On 1/12/07, Kent Yoder <shp...@gm...> wrote: > >> >> >> Hi Michal, > >> >> >> > >> >> >> Did you use the initial default SO PIN, 87654321? > >> >> >> > >> >> >> Kent > >> >> >> > >> >> >> On 1/12/07, Michal Prochazka <mi...@ic...> wrote: > >> >> >> > Hello, > >> >> >> > > >> >> >> > I'm new to this list and also to the TPM platform as well. I have > >> >> >> > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE > >10.2 > >> >> >> > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've > >> >> >> > already taken ownership. Pkcsslotd and tcsd are running but I > >cannot > >> >> >> > do tpmtoken_init. I was asked for SO and user PIN but this > >operation > >> >> >> > ends with C_InitToken failed: 0x000000a0 (160). Also using > >pkcsconf > >> >> >> > -c 0 -P fails it ends with Incorrect PIN Entered even if there > >are > >> >> >> > no PIN set before. > >> >> >> > > >> >> >> > Can someone help me? > >> >> >> > > >> >> >> > Michal > >> >> >> > -- > >> >> >> > Michal Prochazka // mi...@ic... > >> >> >> > > >> >> >> > Supercomputing Center Brno > >> >> >> > Institute of Computer Science > >> >> >> > Masaryk University > >> >> >> > Botanicka 68a, 60200 Brno, CZ > >> >> >> > > >> >> >> > CESNET z.s.p.o. > >> >> >> > Zikova 4, 16200 Praha 6, CZ > >> >> >> > > >> >> >> > > >> >> >> > > >> > >>------------------------------------------------------------------------- > >> >> >> > Take Surveys. Earn Cash. Influence the Future of IT > >> >> >> > Join SourceForge.net's Techsay panel and you'll get the chance > >> >> to share your > >> >> >> > opinions on IT & business topics through brief surveys - and earn > >> >cash > >> >> >> > > >> > >>http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > >> >> >> > > >> >> >> > _______________________________________________ > >> >> >> > opencryptoki-users mailing list > >> >> >> > ope...@li... > >> >> >> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > >> >> >> > > >> >> >> > > >> >> >> > > >> >> >> > > >> >> >> > >> >> >> > >> >> >> -- > >> >> >> Kent Yoder > >> >> >> IBM LTC Security Dev. > >> >> >> > >> >> > > >> >> > > >> >> >-- > >> >> >Kent Yoder > >> >> >IBM LTC Security Dev. > >> > > >> >> > >------------------------------------------------------------------------- > >> >> Take Surveys. Earn Cash. Influence the Future of IT > >> >> Join SourceForge.net's Techsay panel and you'll get the chance to > >share > >> >your > >> >> opinions on IT & business topics through brief surveys - and earn cash > >> >> > >http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > >> >> _______________________________________________ > >> >> opencryptoki-users mailing list > >> >> ope...@li... > >> >> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users) > > > >> ------------------------------------------------------------------------- > >> Take Surveys. Earn Cash. Influence the Future of IT > >> Join SourceForge.net's Techsay panel and you'll get the chance to share > >your > >> opinions on IT & business topics through brief surveys - and earn cash > >> http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > >> _______________________________________________ > >> opencryptoki-users mailing list > >> ope...@li... > >> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users) > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users |
From: conor f. <bou...@ho...> - 2007-01-15 14:07:13
|
Hello When runnning the aes_func test in testcases/v2.11/ i get the folllowing error do_EncryptAES_ECB... Looks okay... Time: 2 msec do_EncryptAES_CBC... Looks okay... Time: 1 msec do_EncryptAES_Multipart_ECB... Looks okay... Time: 2 msec do_EncryptAES_Multipart_CBC... Looks okay... Time: 2 msec do_EncryptAES_Multipart_CBC_PAD... Looks okay... Time: 2 msec do_WrapUnwrapAES_ECB... aes_func.c line 1218 Error: C_UnWrapKey #1 returned: 112 CKR_MECHANISM_INVALID All the other tests seem to work fine in this file(when i block out the WrapUnwrapAes_ECB test) Has anyone else got this error,any suggestions? Also when i run driver testcases in testcases/driver only one function do_encryptAES_ECB from aes_func is called(when i unblocked the return true in the main section of aes_func ,a lot oferrors were returned),i assume this due to above v2.11 aes_func is the deault tests now. Conor _________________________________________________________________ The MSN Entertainment Guide to Golden Globes is here. Get all the scoop. http://tv.msn.com/tv/globes2007/?icid=nctagline2 |
From: Michal P. <mi...@ic...> - 2007-01-12 21:27:07
|
On 1/12/2007, "Tom Lendacky" <to...@us...> wrote: >mi...@ic...ni.c wrote on 01/12/2007 02:49:51 PM: > >> On 1/12/2007, "Tom Lendacky" <to...@us...> wrote: > >> >mi...@ic... wrote on 01/12/2007 01:20:41 PM: >> > >> >> On 1/12/2007, "Kent Yoder" <shp...@gm...> wrote: >> >> >Also, there is a known bug which may be affecting you in the 2.2.4 >> >> >tarball of openCryptoki, in the TPM code. If you're running against >> >> >trousers 0.2.8+, download the latest openCryptoki from CVS, which has >> >> >the fix. Let me know if you run into any problems with that code. >> > >> >> Hi, >> > >> >> thank you for your reply. Yes I'm using latest OpenCryptoki from CVS. >> >> Where can be found information like the intial SO PIN 87654321? I >> >> didn't know it. >> > >> >> I've tried the initial SO PIN but pkcsconf -c 0 -P returns me: Error >> >> setting PIN: 0x6 >> > >> >> What is the right order of commands? pkcsconf -I -c 0 -P and then >> >> tpmtoken_init or reverse? >> > >> >If you are using tpmtoken_init there is no need to use the pkcsconf >> >command at all (tpmtoken_init uses the default SO PIN and USER PIN >> >under the covers for you). One thing you can do to try and reset >> >everything and start fresh is to stop the pkcsslotd daemon, delete >> >the tpm token data for your user (either under /var/lib/opencryptoki/tpm >> >or /usr/local/var/lib/opencryptoki/tpm) and then restart the pkcsslotd >> >daemon. You should then be able to issue the tpmtoken_init command >> >and supply new passwords for the SO and USER. > >> Hi Tom, > >> I've built everything again. But without success. tpmtoken_init is still >> returning: C_SetPIN failed: 0x00000006 (6) >> And pkcsconf -c 0 -P is returning: Error setting PIN: 0x6 > >> And there is also one strange thing, after OpenCryptoki is built and >> installed I have to move directory /usr/local/lib/opencryptoki into >> /usr/local/lib64 because binaies from the OpenCryptoki are looking for >> libs in lib64 directory. But the configure script from the OpenCryptoki >> correctly recognize x86_64 architecture. > >You'll need to specify the libdir path on the configure command in order >to get the proper library installation path (automake and autoconf don't >automatically provide that support). ok. >Is your user a member of the pkcs11 group? You need to be a member of >that group in order to use the PKCS#11 functions. yes. Because it is test machine I'm trying it as a root. >Thanks >Tom > >> Michal > >> >> >On 1/12/07, Kent Yoder <shp...@gm...> wrote: >> >> >> Hi Michal, >> >> >> >> >> >> Did you use the initial default SO PIN, 87654321? >> >> >> >> >> >> Kent >> >> >> >> >> >> On 1/12/07, Michal Prochazka <mi...@ic...> wrote: >> >> >> > Hello, >> >> >> > >> >> >> > I'm new to this list and also to the TPM platform as well. I have >> >> >> > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE >10.2 >> >> >> > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've >> >> >> > already taken ownership. Pkcsslotd and tcsd are running but I >cannot >> >> >> > do tpmtoken_init. I was asked for SO and user PIN but this >operation >> >> >> > ends with C_InitToken failed: 0x000000a0 (160). Also using >pkcsconf >> >> >> > -c 0 -P fails it ends with Incorrect PIN Entered even if there >are >> >> >> > no PIN set before. >> >> >> > >> >> >> > Can someone help me? >> >> >> > >> >> >> > Michal >> >> >> > -- >> >> >> > Michal Prochazka // mi...@ic... >> >> >> > >> >> >> > Supercomputing Center Brno >> >> >> > Institute of Computer Science >> >> >> > Masaryk University >> >> >> > Botanicka 68a, 60200 Brno, CZ >> >> >> > >> >> >> > CESNET z.s.p.o. >> >> >> > Zikova 4, 16200 Praha 6, CZ >> >> >> > >> >> >> > >> >> >> > >> >>------------------------------------------------------------------------- >> >> >> > Take Surveys. Earn Cash. Influence the Future of IT >> >> >> > Join SourceForge.net's Techsay panel and you'll get the chance >> >> to share your >> >> >> > opinions on IT & business topics through brief surveys - and earn >> >cash >> >> >> > >> >>http://www.techsay.com/default.php?page=3Djoin.php&p=3Dsourceforge&CID=3DDE= VDEV >> >> >> > >> >> >> > _______________________________________________ >> >> >> > opencryptoki-users mailing list >> >> >> > ope...@li... >> >> >> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users >> >> >> > >> >> >> > >> >> >> > >> >> >> > >> >> >> >> >> >> >> >> >> -- >> >> >> Kent Yoder >> >> >> IBM LTC Security Dev. >> >> >> >> >> > >> >> > >> >> >-- >> >> >Kent Yoder >> >> >IBM LTC Security Dev. >> > >> >> >------------------------------------------------------------------------- >> >> Take Surveys. Earn Cash. Influence the Future of IT >> >> Join SourceForge.net's Techsay panel and you'll get the chance to >share >> >your >> >> opinions on IT & business topics through brief surveys - and earn cash >> >> >http://www.techsay.com/default.php?page=3Djoin.php&p=3Dsourceforge&CID=3DDEV= DEV >> >> _______________________________________________ >> >> opencryptoki-users mailing list >> >> ope...@li... >> >> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users) > >> ------------------------------------------------------------------------- >> Take Surveys. Earn Cash. Influence the Future of IT >> Join SourceForge.net's Techsay panel and you'll get the chance to share >your >> opinions on IT & business topics through brief surveys - and earn cash >> http://www.techsay.com/default.php?page=3Djoin.php&p=3Dsourceforge&CID=3DD= EVDEV >> _______________________________________________ >> opencryptoki-users mailing list >> ope...@li... >> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users) |
From: Tom L. <to...@us...> - 2007-01-12 21:10:33
|
mi...@ic...ni.c wrote on 01/12/2007 02:49:51 PM: > On 1/12/2007, "Tom Lendacky" <to...@us...> wrote: > >mi...@ic... wrote on 01/12/2007 01:20:41 PM: > > > >> On 1/12/2007, "Kent Yoder" <shp...@gm...> wrote: > >> >Also, there is a known bug which may be affecting you in the 2.2.4 > >> >tarball of openCryptoki, in the TPM code. If you're running against > >> >trousers 0.2.8+, download the latest openCryptoki from CVS, which has > >> >the fix. Let me know if you run into any problems with that code. > > > >> Hi, > > > >> thank you for your reply. Yes I'm using latest OpenCryptoki from CVS. > >> Where can be found information like the intial SO PIN 87654321? I > >> didn't know it. > > > >> I've tried the initial SO PIN but pkcsconf -c 0 -P returns me: Error > >> setting PIN: 0x6 > > > >> What is the right order of commands? pkcsconf -I -c 0 -P and then > >> tpmtoken_init or reverse? > > > >If you are using tpmtoken_init there is no need to use the pkcsconf > >command at all (tpmtoken_init uses the default SO PIN and USER PIN > >under the covers for you). One thing you can do to try and reset > >everything and start fresh is to stop the pkcsslotd daemon, delete > >the tpm token data for your user (either under /var/lib/opencryptoki/tpm > >or /usr/local/var/lib/opencryptoki/tpm) and then restart the pkcsslotd > >daemon. You should then be able to issue the tpmtoken_init command > >and supply new passwords for the SO and USER. > Hi Tom, > I've built everything again. But without success. tpmtoken_init is still > returning: C_SetPIN failed: 0x00000006 (6) > And pkcsconf -c 0 -P is returning: Error setting PIN: 0x6 > And there is also one strange thing, after OpenCryptoki is built and > installed I have to move directory /usr/local/lib/opencryptoki into > /usr/local/lib64 because binaies from the OpenCryptoki are looking for > libs in lib64 directory. But the configure script from the OpenCryptoki > correctly recognize x86_64 architecture. You'll need to specify the libdir path on the configure command in order to get the proper library installation path (automake and autoconf don't automatically provide that support). Is your user a member of the pkcs11 group? You need to be a member of that group in order to use the PKCS#11 functions. Thanks Tom > Michal > >> >On 1/12/07, Kent Yoder <shp...@gm...> wrote: > >> >> Hi Michal, > >> >> > >> >> Did you use the initial default SO PIN, 87654321? > >> >> > >> >> Kent > >> >> > >> >> On 1/12/07, Michal Prochazka <mi...@ic...> wrote: > >> >> > Hello, > >> >> > > >> >> > I'm new to this list and also to the TPM platform as well. I have > >> >> > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 > >> >> > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've > >> >> > already taken ownership. Pkcsslotd and tcsd are running but I cannot > >> >> > do tpmtoken_init. I was asked for SO and user PIN but this operation > >> >> > ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf > >> >> > -c 0 -P fails it ends with Incorrect PIN Entered even if there are > >> >> > no PIN set before. > >> >> > > >> >> > Can someone help me? > >> >> > > >> >> > Michal > >> >> > -- > >> >> > Michal Prochazka // mi...@ic... > >> >> > > >> >> > Supercomputing Center Brno > >> >> > Institute of Computer Science > >> >> > Masaryk University > >> >> > Botanicka 68a, 60200 Brno, CZ > >> >> > > >> >> > CESNET z.s.p.o. > >> >> > Zikova 4, 16200 Praha 6, CZ > >> >> > > >> >> > > >> >> > > >------------------------------------------------------------------------- > >> >> > Take Surveys. Earn Cash. Influence the Future of IT > >> >> > Join SourceForge.net's Techsay panel and you'll get the chance > >> to share your > >> >> > opinions on IT & business topics through brief surveys - and earn > >cash > >> >> > > >http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > >> >> > > >> >> > _______________________________________________ > >> >> > opencryptoki-users mailing list > >> >> > ope...@li... > >> >> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > >> >> > > >> >> > > >> >> > > >> >> > > >> >> > >> >> > >> >> -- > >> >> Kent Yoder > >> >> IBM LTC Security Dev. > >> >> > >> > > >> > > >> >-- > >> >Kent Yoder > >> >IBM LTC Security Dev. > > > >> ------------------------------------------------------------------------- > >> Take Surveys. Earn Cash. Influence the Future of IT > >> Join SourceForge.net's Techsay panel and you'll get the chance to share > >your > >> opinions on IT & business topics through brief surveys - and earn cash > >> http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > >> _______________________________________________ > >> opencryptoki-users mailing list > >> ope...@li... > >> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users) > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users |
From: Michal P. <mi...@ic...> - 2007-01-12 20:49:56
|
On 1/12/2007, "Tom Lendacky" <to...@us...> wrote: >mi...@ic... wrote on 01/12/2007 01:20:41 PM: > >> On 1/12/2007, "Kent Yoder" <shp...@gm...> wrote: >> >Also, there is a known bug which may be affecting you in the 2.2.4 >> >tarball of openCryptoki, in the TPM code. If you're running against >> >trousers 0.2.8+, download the latest openCryptoki from CVS, which has >> >the fix. Let me know if you run into any problems with that code. > >> Hi, > >> thank you for your reply. Yes I'm using latest OpenCryptoki from CVS. >> Where can be found information like the intial SO PIN 87654321? I >> didn't know it. > >> I've tried the initial SO PIN but pkcsconf -c 0 -P returns me: Error >> setting PIN: 0x6 > >> What is the right order of commands? pkcsconf -I -c 0 -P and then >> tpmtoken_init or reverse? > >If you are using tpmtoken_init there is no need to use the pkcsconf >command at all (tpmtoken_init uses the default SO PIN and USER PIN >under the covers for you). One thing you can do to try and reset >everything and start fresh is to stop the pkcsslotd daemon, delete >the tpm token data for your user (either under /var/lib/opencryptoki/tpm >or /usr/local/var/lib/opencryptoki/tpm) and then restart the pkcsslotd >daemon. You should then be able to issue the tpmtoken_init command >and supply new passwords for the SO and USER. Hi Tom, I've built everything again. But without success. tpmtoken_init is still returning: C_SetPIN failed: 0x00000006 (6) And pkcsconf -c 0 -P is returning: Error setting PIN: 0x6 And there is also one strange thing, after OpenCryptoki is built and installed I have to move directory /usr/local/lib/opencryptoki into /usr/local/lib64 because binaies from the OpenCryptoki are looking for libs in lib64 directory. But the configure script from the OpenCryptoki correctly recognize x86_64 architecture. Michal >> >On 1/12/07, Kent Yoder <shp...@gm...> wrote: >> >> Hi Michal, >> >> >> >> Did you use the initial default SO PIN, 87654321? >> >> >> >> Kent >> >> >> >> On 1/12/07, Michal Prochazka <mi...@ic...> wrote: >> >> > Hello, >> >> > >> >> > I'm new to this list and also to the TPM platform as well. I have >> >> > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 >> >> > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've >> >> > already taken ownership. Pkcsslotd and tcsd are running but I cannot >> >> > do tpmtoken_init. I was asked for SO and user PIN but this operation >> >> > ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf >> >> > -c 0 -P fails it ends with Incorrect PIN Entered even if there are >> >> > no PIN set before. >> >> > >> >> > Can someone help me? >> >> > >> >> > Michal >> >> > -- >> >> > Michal Prochazka // mi...@ic... >> >> > >> >> > Supercomputing Center Brno >> >> > Institute of Computer Science >> >> > Masaryk University >> >> > Botanicka 68a, 60200 Brno, CZ >> >> > >> >> > CESNET z.s.p.o. >> >> > Zikova 4, 16200 Praha 6, CZ >> >> > >> >> > >> >> > >------------------------------------------------------------------------- >> >> > Take Surveys. Earn Cash. Influence the Future of IT >> >> > Join SourceForge.net's Techsay panel and you'll get the chance >> to share your >> >> > opinions on IT & business topics through brief surveys - and earn >cash >> >> > >http://www.techsay.com/default.php?page=3Djoin.php&p=3Dsourceforge&CID=3DDEV= DEV >> >> > >> >> > _______________________________________________ >> >> > opencryptoki-users mailing list >> >> > ope...@li... >> >> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users >> >> > >> >> > >> >> > >> >> > >> >> >> >> >> >> -- >> >> Kent Yoder >> >> IBM LTC Security Dev. >> >> >> > >> > >> >-- >> >Kent Yoder >> >IBM LTC Security Dev. > >> ------------------------------------------------------------------------- >> Take Surveys. Earn Cash. Influence the Future of IT >> Join SourceForge.net's Techsay panel and you'll get the chance to share >your >> opinions on IT & business topics through brief surveys - and earn cash >> http://www.techsay.com/default.php?page=3Djoin.php&p=3Dsourceforge&CID=3DD= EVDEV >> _______________________________________________ >> opencryptoki-users mailing list >> ope...@li... >> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users) |
From: Tom L. <to...@us...> - 2007-01-12 20:11:20
|
mi...@ic... wrote on 01/12/2007 01:20:41 PM: > On 1/12/2007, "Kent Yoder" <shp...@gm...> wrote: > >Also, there is a known bug which may be affecting you in the 2.2.4 > >tarball of openCryptoki, in the TPM code. If you're running against > >trousers 0.2.8+, download the latest openCryptoki from CVS, which has > >the fix. Let me know if you run into any problems with that code. > Hi, > thank you for your reply. Yes I'm using latest OpenCryptoki from CVS. > Where can be found information like the intial SO PIN 87654321? I > didn't know it. > I've tried the initial SO PIN but pkcsconf -c 0 -P returns me: Error > setting PIN: 0x6 > What is the right order of commands? pkcsconf -I -c 0 -P and then > tpmtoken_init or reverse? If you are using tpmtoken_init there is no need to use the pkcsconf command at all (tpmtoken_init uses the default SO PIN and USER PIN under the covers for you). One thing you can do to try and reset everything and start fresh is to stop the pkcsslotd daemon, delete the tpm token data for your user (either under /var/lib/opencryptoki/tpm or /usr/local/var/lib/opencryptoki/tpm) and then restart the pkcsslotd daemon. You should then be able to issue the tpmtoken_init command and supply new passwords for the SO and USER. Tom > Thanks in advance, > Michal > > > >On 1/12/07, Kent Yoder <shp...@gm...> wrote: > >> Hi Michal, > >> > >> Did you use the initial default SO PIN, 87654321? > >> > >> Kent > >> > >> On 1/12/07, Michal Prochazka <mi...@ic...> wrote: > >> > Hello, > >> > > >> > I'm new to this list and also to the TPM platform as well. I have > >> > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 > >> > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've > >> > already taken ownership. Pkcsslotd and tcsd are running but I cannot > >> > do tpmtoken_init. I was asked for SO and user PIN but this operation > >> > ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf > >> > -c 0 -P fails it ends with Incorrect PIN Entered even if there are > >> > no PIN set before. > >> > > >> > Can someone help me? > >> > > >> > Michal > >> > -- > >> > Michal Prochazka // mi...@ic... > >> > > >> > Supercomputing Center Brno > >> > Institute of Computer Science > >> > Masaryk University > >> > Botanicka 68a, 60200 Brno, CZ > >> > > >> > CESNET z.s.p.o. > >> > Zikova 4, 16200 Praha 6, CZ > >> > > >> > > >> > ------------------------------------------------------------------------- > >> > Take Surveys. Earn Cash. Influence the Future of IT > >> > Join SourceForge.net's Techsay panel and you'll get the chance > to share your > >> > opinions on IT & business topics through brief surveys - and earn cash > >> > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > >> > > >> > _______________________________________________ > >> > opencryptoki-users mailing list > >> > ope...@li... > >> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > >> > > >> > > >> > > >> > > >> > >> > >> -- > >> Kent Yoder > >> IBM LTC Security Dev. > >> > > > > > >-- > >Kent Yoder > >IBM LTC Security Dev. > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users |
From: Michal P. <mi...@ic...> - 2007-01-12 19:20:53
|
On 1/12/2007, "Kent Yoder" <shp...@gm...> wrote: >Also, there is a known bug which may be affecting you in the 2.2.4 >tarball of openCryptoki, in the TPM code. If you're running against >trousers 0.2.8+, download the latest openCryptoki from CVS, which has >the fix. Let me know if you run into any problems with that code. Hi, thank you for your reply. Yes I'm using latest OpenCryptoki from CVS. Where can be found information like the intial SO PIN 87654321? I didn't know it. I've tried the initial SO PIN but pkcsconf -c 0 -P returns me: Error setting PIN: 0x6 What is the right order of commands? pkcsconf -I -c 0 -P and then tpmtoken_init or reverse? Thanks in advance, Michal > >On 1/12/07, Kent Yoder <shp...@gm...> wrote: >> Hi Michal, >> >> Did you use the initial default SO PIN, 87654321? >> >> Kent >> >> On 1/12/07, Michal Prochazka <mi...@ic...> wrote: >> > Hello, >> > >> > I'm new to this list and also to the TPM platform as well. I have >> > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 >> > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've >> > already taken ownership. Pkcsslotd and tcsd are running but I cannot >> > do tpmtoken_init. I was asked for SO and user PIN but this operation >> > ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf >> > -c 0 -P fails it ends with Incorrect PIN Entered even if there are >> > no PIN set before. >> > >> > Can someone help me? >> > >> > Michal >> > -- >> > Michal Prochazka // mi...@ic... >> > >> > Supercomputing Center Brno >> > Institute of Computer Science >> > Masaryk University >> > Botanicka 68a, 60200 Brno, CZ >> > >> > CESNET z.s.p.o. >> > Zikova 4, 16200 Praha 6, CZ >> > >> > >> > ------------------------------------------------------------------------= - >> > Take Surveys. Earn Cash. Influence the Future of IT >> > Join SourceForge.net's Techsay panel and you'll get the chance to share = your >> > opinions on IT & business topics through brief surveys - and earn cash >> > http://www.techsay.com/default.php?page=3Djoin.php&p=3Dsourceforge&CID= =3DDEVDEV >> > >> > _______________________________________________ >> > opencryptoki-users mailing list >> > ope...@li... >> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users >> > >> > >> > >> > >> >> >> -- >> Kent Yoder >> IBM LTC Security Dev. >> > > >-- >Kent Yoder >IBM LTC Security Dev. |
From: Kent Y. <shp...@gm...> - 2007-01-12 18:51:50
|
Also, there is a known bug which may be affecting you in the 2.2.4 tarball of openCryptoki, in the TPM code. If you're running against trousers 0.2.8+, download the latest openCryptoki from CVS, which has the fix. Let me know if you run into any problems with that code. Kent On 1/12/07, Kent Yoder <shp...@gm...> wrote: > Hi Michal, > > Did you use the initial default SO PIN, 87654321? > > Kent > > On 1/12/07, Michal Prochazka <mi...@ic...> wrote: > > Hello, > > > > I'm new to this list and also to the TPM platform as well. I have > > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 > > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've > > already taken ownership. Pkcsslotd and tcsd are running but I cannot > > do tpmtoken_init. I was asked for SO and user PIN but this operation > > ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf > > -c 0 -P fails it ends with Incorrect PIN Entered even if there are > > no PIN set before. > > > > Can someone help me? > > > > Michal > > -- > > Michal Prochazka // mi...@ic... > > > > Supercomputing Center Brno > > Institute of Computer Science > > Masaryk University > > Botanicka 68a, 60200 Brno, CZ > > > > CESNET z.s.p.o. > > Zikova 4, 16200 Praha 6, CZ > > > > > > ------------------------------------------------------------------------- > > Take Surveys. Earn Cash. Influence the Future of IT > > Join SourceForge.net's Techsay panel and you'll get the chance to share your > > opinions on IT & business topics through brief surveys - and earn cash > > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > > > > _______________________________________________ > > opencryptoki-users mailing list > > ope...@li... > > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > > > > > > > > > -- > Kent Yoder > IBM LTC Security Dev. > -- Kent Yoder IBM LTC Security Dev. |
From: Kent Y. <shp...@gm...> - 2007-01-12 15:52:48
|
Hi Michal, Did you use the initial default SO PIN, 87654321? Kent On 1/12/07, Michal Prochazka <mi...@ic...> wrote: > Hello, > > I'm new to this list and also to the TPM platform as well. I have > Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 > (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've > already taken ownership. Pkcsslotd and tcsd are running but I cannot > do tpmtoken_init. I was asked for SO and user PIN but this operation > ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf > -c 0 -P fails it ends with Incorrect PIN Entered even if there are > no PIN set before. > > Can someone help me? > > Michal > -- > Michal Prochazka // mi...@ic... > > Supercomputing Center Brno > Institute of Computer Science > Masaryk University > Botanicka 68a, 60200 Brno, CZ > > CESNET z.s.p.o. > Zikova 4, 16200 Praha 6, CZ > > > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > > -- Kent Yoder IBM LTC Security Dev. |
From: Michal P. <mi...@ic...> - 2007-01-12 08:43:19
|
Hello, I'm new to this list and also to the TPM platform as well. I have Intel motherboard DQ965GF with TPM STM 19 WP 18 and runs SuSE 10.2 (64 bit) with Xen, Trousers 0.2.8 and OpenCryptoki 2.2.4. I've already taken ownership. Pkcsslotd and tcsd are running but I cannot do tpmtoken_init. I was asked for SO and user PIN but this operation ends with C_InitToken failed: 0x000000a0 (160). Also using pkcsconf -c 0 -P fails it ends with Incorrect PIN Entered even if there are no PIN set before. Can someone help me? Michal -- Michal Prochazka // mi...@ic... Supercomputing Center Brno Institute of Computer Science Masaryk University Botanicka 68a, 60200 Brno, CZ CESNET z.s.p.o. Zikova 4, 16200 Praha 6, CZ |
From: conor f. <bou...@ho...> - 2006-12-18 10:39:49
|
Hello I am currently trying to set up an opencryptoki and openssl,i do not have hardware so i am trying to set up a software emulation enviroment. Has anyone got instructions for such a setup,i have searched the internet but cannnt find instructions or tutorial for this setup i believe the setup should be openssl->PKCS#11 engine->opencryptoki Regards Conor _________________________________________________________________ Get the latest Windows Live Messenger 8.1 Beta version. Join now. http://ideas.live.com |
From: Kent Y. <shp...@gm...> - 2006-12-13 17:06:46
|
Hi Conor, On 12/13/06, conor fitzgerald <bou...@ho...> wrote: > Hello > I have some questions about opencryptoki 2.2.4 > > I want to set up opencryptoki 2.2.4 initialy just to run the provided test > cases in the package,to learn about cryptoki. > > Is it possible to just run opencryptoki 2.2.4 and libica-1.3.8(without > installing SSL). From the opencryptoki 2.2.4 README instructions it seems i > need ibica-1.3.8 and openssl to run opencryptoki 2.2.4. This is fine for non-s390 platforms, but you'll need to have the ICA hardware. OpenSSL will get you a software token, which is usually what experiementers use to start playing with pkcs11. > I have installed opencryptoki 2.2.4 on fedora 4, i run > /usr/lib/pkcs11/methods/pkcs11_startup and > /usr/sbin/pkcsslotd from without error . When i run > /usr/lib/pkcs11/methods/pkcsconf...,i get the following error "Error > initializing the PKCS 11 library" > > I have not installed libICA or openssl packages ,when i use sh ./configure > in the libica-1.3.8 folder > i get the following error"configure error: ****Unable to find > linux/iaioctl.h" > > Any help would be gratefully recieved This is the header file provided by the kernel for the ICA hardware device driver. That device driver is not part of any fedora kernel, only suse has accepted it. You can download it from sourceforge CVS (it requires 2 drivers, leedslite and devica), but these will do you no good without the hardware. If you do have the hardware, let me know and I can help you get it all set up on fedora, otherwise I'd suggest installing OpenSSL. Kent > _________________________________________________________________ > Get the latest Windows Live Messenger 8.1 Beta version.Join now. > http://ideas.live.com > > > > > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > -- Kent Yoder IBM LTC Security Dev. |
From: conor f. <bou...@ho...> - 2006-12-13 16:57:18
|
Hello I have some questions about opencryptoki 2.2.4 I want to set up opencryptoki 2.2.4 initialy just to run the provided test cases in the package,to learn about cryptoki. Is it possible to just run opencryptoki 2.2.4 and libica-1.3.8(without installing SSL). From the opencryptoki 2.2.4 README instructions it seems i need ibica-1.3.8 and openssl to run opencryptoki 2.2.4. I have installed opencryptoki 2.2.4 on fedora 4, i run /usr/lib/pkcs11/methods/pkcs11_startup and /usr/sbin/pkcsslotd from without error . When i run /usr/lib/pkcs11/methods/pkcsconf...,i get the following error "Error initializing the PKCS 11 library" I have not installed libICA or openssl packages ,when i use sh ./configure in the libica-1.3.8 folder i get the following error"configure error: ****Unable to find linux/iaioctl.h" Any help would be gratefully recieved _________________________________________________________________ Get the latest Windows Live Messenger 8.1 Beta version. Join now. http://ideas.live.com |
From: Kent Y. <shp...@gm...> - 2006-11-03 15:33:40
|
QXMgYSB0ZW1wb3Jhcnkgc29sdXRpb24geW91IGNhbiByb2xsIGJhY2sgaWYgeW91J2QgbGlrZSwg YnV0IHRoaXMgbXVzdApiZSBhIGJ1aWxkIHByb2JsZW0uLi4gIFdoZW4geW91IGNvbmZpZ3VyZWQg b3BlbmNyeXB0b2tpLCB3YXMgdGhlIHBhdGgKdG8gdGhlIHRyb3VzZXJzIGhlYWRlcnMgIGluIHlv dXIgQ0ZMQUdTPyAgU29tZXRpbWVzIC91c3IvbG9jYWwvaW5jbHVkZQppcyBub3QgY2hlY2tlZCwg c28gdGhlIGJ1aWxkIG1heSBoYXZlIHNraXBwZWQgdGhlIFRQTSB0b2tlbi4uLgoKS2VudAoKT24g MTEvMy8wNiwgQnVyYWsgT8OQVVogPGJ1cmFrb2d1enNAeWFob28uY29tPiB3cm90ZToKPgo+Cj4g QWZ0ZXIgY29uZmlndXJpbmcgd2l0aCAtLWVuYWJsZS10cG10b2sgLCBpdCBzdGFydGVkIHRvIHNl ZSB0aGUgc29mdCB0b2tlbiBhcyB0b2tlbiAjMS4gSXQgc3RpbGwgZGlkIG5vdCBzdGFydGVkIHRo ZSB0cG0gdG9rZW4uIEkgbWVhbiB0b2tlbiAjMCBpcyB1bm9jY3VwaWVkLiBTaG91bGQgSSByb2xs IGJhY2sgdG8gdGhlIHRyb3VzZXJzIDAuMi43IGluIG9yZGVyIHRvIHVzZSBvcGVuY3J5cHRva2k/ Cj4KPiAgLS0gYnVyYWsoKQo+IChwczogYmYpCj4gTUVUVSBDRU5HICcwNgo+Cj4KPgo+Cj4gLS0t LS0gT3JpZ2luYWwgTWVzc2FnZSAtLS0tCj4gRnJvbTogRGFuaWVsIEggSm9uZXMgPGRhbmpvbmVz QHVzLmlibS5jb20+Cj4gVG86IEJ1cmFrT8SeVVogPGJ1cmFrb2d1enNAeWFob28uY29tPgo+IENj OiBCdXJha0/EnlVaIDxidXJha29ndXpzQHlhaG9vLmNvbT47IG9wZW5jcnlwdG9raS11c2Vyc0Bs aXN0cy5zb3VyY2Vmb3JnZS5uZXQ7IG9wZW5jcnlwdG9raS11c2Vycy1ib3VuY2VzQGxpc3RzLnNv dXJjZWZvcmdlLm5ldDsgS2VudCBZb2RlciA8c2hwZWRvaWthbEBnbWFpbC5jb20+OyBUb20gTGVu ZGFja3kgPHRvbWxAdXMuaWJtLmNvbT4KPiBTZW50OiBUaHVyc2RheSwgIE5vdmVtYmVyIDIsIDIw MDYgNDo1MTo1NCBQTQo+IFN1YmplY3Q6IFJlOiBbb3BlbmNyeXB0b2tpLXVzZXJzXSBPcGVuQ3J5 cHRva2kgMi4yLjQgUHJvYmxlbXMKPgo+Cj4gSGkgQnVyYWssCj4gVGhlIG5ldyBidWlsZCBwcm9j ZXNzIG9ubHkgY3JlYXRlcyB0aGUgc29mdHdhcmUgdG9rZW4gYnkgZGVmYXVsdC4gVG8gYnVpbGQg YSBUUE0gdG9rZW4geW91IG11c3QKPiBleHBsaWNpdGx5IHVzZSB0aGUgLS1lbmFibGUtdHBtdG9r IGNvbmZpZ3VyZSBvcHRpb24uCj4KPiBUaGFua3MsCj4gIERhbiBKb25lcwo+ICBJQk0gTGludXgg VGVjaG5vbG9neSBDZW50ZXIsIFNlY3VyaXR5Cj4gIDUxMi04MzgtMTc5NCAoVC9MIDY3OC0xNzk0 KQo+ICBkYW5qb25lc0B1cy5pYm0uY29tCj4KPgo+Cj4gIEJ1cmFrIE/EnlVaIDxidXJha29ndXpz QHlhaG9vLmNvbT4KPiBTZW50IGJ5OiBvcGVuY3J5cHRva2ktdXNlcnMtYm91bmNlc0BsaXN0cy5z b3VyY2Vmb3JnZS5uZXQKPgo+IDExLzAyLzIwMDYgMDE6NTggQU0KPgo+IFRvIEJ1cmFrIE/EnlVa IDxidXJha29ndXpzQHlhaG9vLmNvbT4sIFRvbSBMZW5kYWNreS9BdXN0aW4vSUJNQElCTVVTLCBL ZW50IFlvZGVyIDxzaHBlZG9pa2FsQGdtYWlsLmNvbT4KPgo+IGNjIG9wZW5jcnlwdG9raS11c2Vy c0BsaXN0cy5zb3VyY2Vmb3JnZS5uZXQsIG9wZW5jcnlwdG9raS11c2Vycy1ib3VuY2VzQGxpc3Rz LnNvdXJjZWZvcmdlLm5ldAo+Cj4gU3ViamVjdCBSZTogW29wZW5jcnlwdG9raS11c2Vyc10gT3Bl bkNyeXB0b2tpIDIuMi40IFByb2JsZW1zCj4KPgo+Cj4KPgo+Cj4KPiBUaGlzIHRpbWUgaXQgZGlk IG5vdCBzdGFydCB0aGUgVFBNIHRva2VuLgo+Cj4gIFtyb290QGR1bmdlb24gb3BlbmNyeXB0b2tp XSMgcGtjc2NvbmYgLXQKPiAgVG9rZW4gIzAgSW5mbzoKPiAgICAgICAgICBMYWJlbDogSUJNIE9T IFBLQ1MjMTEKPiAgICAgICAgICBNYW51ZmFjdHVyZXI6IElCTSBDb3JwLgo+ICAgICAgICAgIE1v ZGVsOiBJQk0gU29mdFRvawo+ICAgICAgICAgIFNlcmlhbCBOdW1iZXI6IDEyMwo+ICAgICAgICAg IEZsYWdzOiAweDg4MDA0NSAoUk5HfExPR0lOX1JFUVVJUkVEfENMT0NLX09OX1RPS0VOfFVTRVJf UElOX1RPX0JFX0NIQU5HRUR8U09fUElOX1RPX0JFX0NIQU5HRUQpCj4gICAgICAgICAgU2Vzc2lv bnM6IC0xLy0xCj4gICAgICAgICAgUi9XIFNlc3Npb25zOiAtMS8tMQo+ICAgICAgICAgIFBJTiBM ZW5ndGg6IDQtOAo+ICAgICAgICAgIFB1YmxpYyBNZW1vcnk6IDB4RkZGRkZGRkYvMHhGRkZGRkZG Rgo+ICAgICAgICAgIFByaXZhdGUgTWVtb3J5OiAweEZGRkZGRkZGLzB4RkZGRkZGRkYKPiAgICAg ICAgICBIYXJkd2FyZSBWZXJzaW9uOiAxLjAKPiAgICAgICAgICBGaXJtd2FyZSBWZXJzaW9uOiAx LjAKPiAgICAgICAgICBUaW1lOiAwOTo1MzoyNSBBTQo+Cj4KPgo+IC0tIGJ1cmFrKCkKPiAgKHBz OiBiZikKPiAgTUVUVSBDRU5HICcwNgo+Cj4KPiAtLS0tLSBPcmlnaW5hbCBNZXNzYWdlIC0tLS0K PiAgRnJvbTogQnVyYWsgT8SeVVogPGJ1cmFrb2d1enNAeWFob28uY29tPgo+ICBUbzogVG9tIExl bmRhY2t5IDx0b21sQHVzLmlibS5jb20+OyBLZW50IFlvZGVyIDxzaHBlZG9pa2FsQGdtYWlsLmNv bT4KPiAgQ2M6IG9wZW5jcnlwdG9raS11c2Vyc0BsaXN0cy5zb3VyY2Vmb3JnZS5uZXQ7IG9wZW5j cnlwdG9raS11c2Vycy1ib3VuY2VzQGxpc3RzLnNvdXJjZWZvcmdlLm5ldAo+ICBTZW50OiBUaHVy c2RheSwgTm92ZW1iZXIgMiwgMjAwNiA5OjMyOjMzIEFNCj4gIFN1YmplY3Q6IFJlOiBbb3BlbmNy eXB0b2tpLXVzZXJzXSBPcGVuQ3J5cHRva2kgMi4yLjQgUHJvYmxlbXMKPgo+IFllcyBJIGFtIHdv cmtpbmcgb24gdHJvdXNlcnMgMC4yLjguIEkgd2lsbCBjaGVjayB0aGUgY29kZSBvbiB0aGUgQ1ZT Lgo+ICBJIGhhdmUgZGVsZXRlZCB0aGUgcm9vdCBkaXJlY3Rvcnkgd2hpY2ggaXMgaW4gdGhlIC91 c3IvbG9jYWwvdmFyL2xpYi9vcGVuY3J5cHRva2kvdHBtIHNldmVyYWwgdGltZXMgYW5kIGVhY2gg dGltZQo+ICBJIGhhdmUgZXhwZXJpZW5jZWQgdGhlIHNhbWUgcHJvYmxlbXMgZWFjaCB0aW1lLgo+ Cj4gIEkgd2lsbCByZXBvcnQgYWdhaW4gYWZ0ZXIgdHJ5aW5nIHRoZSBjdnMgY29kZS4KPgo+ICBU aGFueC4uLgo+Cj4gLS0gYnVyYWsoKQo+ICAocHM6IGJmKQo+ICBNRVRVIENFTkcgJzA2Cj4KPgo+ IC0tLS0tIE9yaWdpbmFsIE1lc3NhZ2UgLS0tLQo+ICBGcm9tOiBUb20gTGVuZGFja3kgPHRvbWxA dXMuaWJtLmNvbT4KPiAgVG86IEtlbnQgWW9kZXIgPHNocGVkb2lrYWxAZ21haWwuY29tPgo+ICBD YzogQnVyYWtPxJ5VWiA8YnVyYWtvZ3V6c0B5YWhvby5jb20+OyBvcGVuY3J5cHRva2ktdXNlcnNA bGlzdHMuc291cmNlZm9yZ2UubmV0OyBvcGVuY3J5cHRva2ktdXNlcnMtYm91bmNlc0BsaXN0cy5z b3VyY2Vmb3JnZS5uZXQKPiAgU2VudDogV2VkbmVzZGF5LCBOb3ZlbWJlciAxLCAyMDA2IDc6NDc6 NTQgUE0KPiAgU3ViamVjdDogUmU6IFtvcGVuY3J5cHRva2ktdXNlcnNdIE9wZW5DcnlwdG9raSAy LjIuNCBQcm9ibGVtcwo+Cj4gc2hwZWRvaWthbEBnbWFpbC5jb20gd3JvdGUgb24gMTEvMDEvMjAw NiAxMDowODowNiBBTToKPgo+ICA+IEhpIEJ1cmFrLAo+Cj4gID4gQXJlIHlvdSB1c2luZyB0cm91 c2VycyAwLjIuOD8gIEl0IGxvb2tzIGxpa2Ugd2UgaGF2ZW4ndCBkb25lIGFuCj4gID4gb3BlbmNy eXB0b2tpIHJlbGVhc2Ugc2luY2UgdGhhdCByZWxlYXNlIG9mIHRyb3VzZXJzLCB3aGljaCBtYXkg YmUKPiAgPiBicmVha2luZyB0aGluZ3MgaGVyZS4gIFRoZSBjb21wYXRpYmlsaXR5IGNvZGUgaXMg aW4gb3BlbmNyeXB0b2tpIENWUywKPiAgPiBwbGVhc2UgdHJ5IHRoYXQgb3V0IGFuZCBzZWUgaWYg aXQgZml4ZXMgdGhpcyBwcm9ibGVtIChpZiB5b3UncmUgb24KPiAgPiB0cm91c2VycyAwLjIuOCku Cj4KPiAgPiBLZW50Cj4KPiAgSW4gYWRkaXRpb24gdG8gd2hhdCBLZW50IGhhcyBzdWdnZXN0ZWQs IG9uY2UgdGhlIHRva2VuIGhhcyBiZWVuCj4gIGluaXRpYWxpemVkIChldmVuIHRob3VnaCB5b3Ug cmVjZWl2ZWQgYSBzZWdmYXVsdCBkdXJpbmcKPiAgdHBtdG9rZW5faW5pdCksIHRoZSAiODc2NTQz MjEiIFBJTiBpcyBubyBsb25nZXIgdmFsaWQuIFlvdSB3aWxsCj4gIG5lZWQgdG8gdXNlIHRoZSBQ SU4vcGFzc3dvcmQgdGhhdCB5b3UgZW50ZXJlZCB3aGVuIHlvdSBleGVjdXRlZAo+ICB0aGUgdHBt dG9rZW5faW5pdCBjb21tYW5kLiAgQWx0ZXJuYXRpdmVseSAoc2luY2UgeW91IGhhdmUgbm8gZGF0 YQo+ICBpbiB0aGUgdG9rZW4geWV0KSwgeW91IGNhbiBnbyB0byAvdmFyL2xpYi9vcGVuY3J5cHRv a2kvdHBtIChvcgo+ICAvdXNyL2xvY2FsL3Zhci9saWIvb3BlbmNyeXB0b2tpL3RwbSBpZiB5b3Ug YnVpbHQgYW5kIGluc3RhbGxlZCB0bwo+ICAvdXNyL2xvY2FsKSBhbmQgcmVtb3ZlIHRoZSBkaXJl Y3RvcnkgdGhhdCBoYXMgeW91ciB1c2VybmFtZSAodGhpcwo+ICBhc3N1bWVzIHRoYXQgeW91IGhh dmUgcm9vdCBhY2Nlc3Mgb2YgY291cnNlKS4KPgo+ICBUaGFua3MsCj4gIFRvbQo+Cj4gID4gT24g MTEvMS8wNiwgQnVyYWsgT8SeVVogPGJ1cmFrb2d1enNAeWFob28uY29tPiB3cm90ZToKPiAgPiA+ Cj4gID4gPiBJIGhhdmUgcHJvYmxlbXMgdXNpbmcgY3J5cHRva2kgdXNpbmcgd2l0aCBUUE0uIE15 IFRQTSBpcyB3b3JraW5nIGZpbmUgSQo+ICBhbQo+ICA+ID4gc3VyZSBhYm91dCBpdC4KPiAgPiA+ IEkgaGF2ZSBhcHBsaWVkIHRoZSBtZXRob2QgbWVudGlvbmVkIGluIHRyb3VzZXJzIGZhcS4gU1JL IGlzIE5VTEwuCj4gID4gPgo+ICA+ID4gW3Jvb3RAZHVuZ2VvbiBvcGVuY3J5cHRva2ldIyB0cG10 b2tlbl9pbml0Cj4gID4gPiBBIG5ldyBUUE0gc2VjdXJpdHkgb2ZmaWNlciBwYXNzd29yZCBpcyBu ZWVkZWQuIFRoZSBwYXNzd29yZCBtdXN0IGJlCj4gIGJldHdlZW4KPiAgPiA+IDYgYW5kIDEyNyBj aGFyYWN0ZXJzIGluIGxlbmd0aC4KPiAgPiA+IEVudGVyIG5ldyBwYXNzd29yZDoKPiAgPiA+IENv bmZpcm0gcGFzc3dvcmQ6Cj4gID4gPiBTZWdtZW50YXRpb24gZmF1bHQKPiAgPiA+IFtyb290QGR1 bmdlb24gb3BlbmNyeXB0b2tpXSMgdHBtdG9rZW5faW5pdAo+ICA+ID4gV2FybmluZzogVGhlIFRQ TSB0b2tlbiBoYXMgYWxyZWFkeSBiZWVuIGluaXRpYWxpemVkLiBSZWluaXRpYWxpemluZyB0aGUK PiAgVFBNCj4gID4gPiB0b2tlbiB3aWxsIGNhdXNlIGFsbCBUUE0gdG9rZW4gZGF0YSB0byBiZSBs b3N0Lgo+ICA+ID4gQ2xlYXIgdGhlIFRQTSB0b2tlbiBkYXRhPyBbeS9OXTogeQo+ICA+ID4gRW50 ZXIgdGhlIFRQTSBzZWN1cml0eSBvZmZpY2VyIHBhc3N3b3JkOgo+ICA+ID4gQ19Jbml0VG9rZW4g ZmFpbGVkOiAweDAwMDAwMGEwICgxNjApCj4gID4gPgo+ICA+ID4gSSBoYXZlIGVudGVyZWQgU08g UElOIGFzIDg3NjU0MzIxLgo+ICA+ID4KPiAgPiA+IFtyb290QGR1bmdlb24gb3BlbmNyeXB0b2tp XSMgcGtjc2NvbmYgLVAgLWMgMAo+ICA+ID4gRW50ZXIgdGhlIFNPIFBJTjogKioqKioqKioKPiAg PiA+IEVudGVyIHRoZSBuZXcgU08gUElOOiAqKioqKioqKgo+ICA+ID4gUmUtZW50ZXIgdGhlIG5l dyBTTyBQSU46ICoqKioqKioqCj4gID4gPiBFcnJvciBzZXR0aW5nIFBJTjogMHg2Cj4gID4gPgo+ ICA+ID4gQnV0IENyeXB0b2tpIGhhcyBzZWVuIG15IFRQTS4KPiAgPiA+IFtyb290QGR1bmdlb24g b3BlbmNyeXB0b2tpXSMgcGtjc2NvbmYgLXMgLXQKPiAgPiA+IFRva2VuICMwIEluZm86Cj4gID4g PiAgICAgICAgIExhYmVsOiBJQk0gUEtDUyMxMSBUUE0gVG9rZW4KPiAgPiA+ICAgICAgICAgTWFu dWZhY3R1cmVyOiBJQk0gQ29ycC4KPiAgPiA+ICAgICAgICAgTW9kZWw6IFRQTSB2MS4xIFRva2Vu Cj4gID4gPiAgICAgICAgIFNlcmlhbCBOdW1iZXI6IDEyMwo+ICA+ID4gICAgICAgICBGbGFnczog MHg5ODA0NDUKPiAgPiA+Cj4gID4KPiAgKFJOR3xMT0dJTl9SRVFVSVJFRHxDTE9DS19PTl9UT0tF TnxUT0tFTl9JTklUSUFMSVpFRHxVU0VSX1BJTl9UT19CRV9DSEFOR0VEfFNPX1BJTl9DT1VOVF9M T1d8U09fUElOX1RPX0JFX0NIQU5HRUQpCj4KPiAgPiA+ICAgICAgICAgU2Vzc2lvbnM6IC0xLy0x Cj4gID4gPiAgICAgICAgIFIvVyBTZXNzaW9uczogLTEvLTEKPiAgPiA+ICAgICAgICAgUElOIExl bmd0aDogNi0xMjcKPiAgPiA+ICAgICAgICAgUHVibGljIE1lbW9yeTogMHhGRkZGRkZGRi8weEZG RkZGRkZGCj4gID4gPiAgICAgICAgIFByaXZhdGUgTWVtb3J5OiAweEZGRkZGRkZGLzB4RkZGRkZG RkYKPiAgPiA+ICAgICAgICAgSGFyZHdhcmUgVmVyc2lvbjogMS4wCj4gID4gPiAgICAgICAgIEZp cm13YXJlIFZlcnNpb246IDEuMAo+ICA+ID4gICAgICAgICBUaW1lOiAwNTo1MjowNiBQTQo+ICA+ ID4gVG9rZW4gIzEgSW5mbzoKPiAgPiA+ICAgICAgICAgTGFiZWw6IElCTSBPUyBQS0NTIzExCj4g ID4gPiAgICAgICAgIE1hbnVmYWN0dXJlcjogSUJNIENvcnAuCj4gID4gPiAgICAgICAgIE1vZGVs OiBJQk0gU29mdFRvawo+ICA+ID4gICAgICAgICBTZXJpYWwgTnVtYmVyOiAxMjMKPiAgPiA+ICAg ICAgICAgRmxhZ3M6IDB4ODgwMDQ1Cj4gID4gPgo+ICA+Cj4gIChSTkd8TE9HSU5fUkVRVUlSRUR8 Q0xPQ0tfT05fVE9LRU58VVNFUl9QSU5fVE9fQkVfQ0hBTkdFRHxTT19QSU5fVE9fQkVfQ0hBTkdF RCkKPgo+ICA+ID4gICAgICAgICBTZXNzaW9uczogLTEvLTEKPiAgPiA+ICAgICAgICAgUi9XIFNl c3Npb25zOiAtMS8tMQo+ICA+ID4gICAgICAgICBQSU4gTGVuZ3RoOiA0LTgKPiAgPiA+ICAgICAg ICAgUHVibGljIE1lbW9yeTogMHhGRkZGRkZGRi8weEZGRkZGRkZGCj4gID4gPiAgICAgICAgIFBy aXZhdGUgTWVtb3J5OiAweEZGRkZGRkZGLzB4RkZGRkZGRkYKPiAgPiA+ICAgICAgICAgSGFyZHdh cmUgVmVyc2lvbjogMS4wCj4gID4gPiAgICAgICAgIEZpcm13YXJlIFZlcnNpb246IDEuMAo+ICA+ ID4gICAgICAgICBUaW1lOiAwNTo1MjowNiBQTQo+ICA+ID4gU2xvdCAjMCBJbmZvCj4gID4gPiAg ICAgICAgIERlc2NyaXB0aW9uOiBMaW51eCAyLjYuMTggTGludXggKFRQTSkKPiAgPiA+ICAgICAg ICAgTWFudWZhY3R1cmVyOiBMaW51eCAyLjYuMTgKPiAgPiA+ICAgICAgICAgRmxhZ3M6IDB4NSAo VE9LRU5fUFJFU0VOVHxIV19TTE9UKQo+ICA+ID4gICAgICAgICBIYXJkd2FyZSBWZXJzaW9uOiAw LjAKPiAgPiA+ICAgICAgICAgRmlybXdhcmUgVmVyc2lvbjogMS4xCj4gID4gPiBTbG90ICMxIElu Zm8KPiAgPiA+ICAgICAgICAgRGVzY3JpcHRpb246IExpbnV4IDIuNi4xOCBMaW51eCAoU29mdCkK PiAgPiA+ICAgICAgICAgTWFudWZhY3R1cmVyOiBMaW51eCAyLjYuMTgKPiAgPiA+ICAgICAgICAg RmxhZ3M6IDB4MSAoVE9LRU5fUFJFU0VOVCkKPiAgPiA+ICAgICAgICAgSGFyZHdhcmUgVmVyc2lv bjogMC4wCj4gID4gPiAgICAgICAgIEZpcm13YXJlIFZlcnNpb246IDEuMQo+ICA+ID4KPiAgPiA+ IERvIHlvdSBoYXZlIGFueSBpZGVhIHdoYXQgaXMgZ29pbmcgb24/IFdoYXQgc2hvdWxkIEkgZG8/ Cj4gID4gPgo+ICA+ID4gVGhhbnggaW4gYWR2YW5jZS4KPiAgPiA+ICAtLSBidXJhaygpCj4gID4g PiAocHM6IGJmKQo+ICA+ID4gTUVUVSBDRU5HICcwNgo+ICA+ID4KPiAgPiA+Cj4gID4gPgo+ICA+ ID4KPiAgLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLQo+ICA+ID4gVXNpbmcgVG9tY2F0IGJ1dCBuZWVkIHRvIGRv IG1vcmU/IE5lZWQgdG8gc3VwcG9ydCB3ZWIgc2VydmljZXMsCj4gIHNlY3VyaXR5Pwo+ICA+ID4g R2V0IHN0dWZmIGRvbmUgcXVpY2tseSB3aXRoIHByZS1pbnRlZ3JhdGVkIHRlY2hub2xvZ3kgdG8g bWFrZSB5b3VyIGpvYgo+ICA+ID4gZWFzaWVyCj4gID4gPiBEb3dubG9hZCBJQk0gV2ViU3BoZXJl IEFwcGxpY2F0aW9uIFNlcnZlciB2LjEuMC4xIGJhc2VkIG9uIEFwYWNoZQo+ICBHZXJvbmltbwo+ ICA+ID4KPiAgaHR0cDovL3NlbC5hcy11cy5mYWxrYWcubmV0L3NlbD9jbWQ9bG5rJmtpZD0xMjA3 MDkmYmlkPTI2MzA1NyZkYXQ9MTIxNjQyCj4gID4gPgo+ICA+ID4gX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPiAgPiA+IG9wZW5jcnlwdG9raS11c2VycyBt YWlsaW5nIGxpc3QKPiAgPiA+IG9wZW5jcnlwdG9raS11c2Vyc0BsaXN0cy5zb3VyY2Vmb3JnZS5u ZXQKPiAgPiA+IGh0dHBzOi8vbGlzdHMuc291cmNlZm9yZ2UubmV0L2xpc3RzL2xpc3RpbmZvL29w ZW5jcnlwdG9raS11c2Vycwo+ICA+ID4KPiAgPiA+Cj4gID4gPgo+Cj4gID4KPiAgPiAtLQo+ICA+ IEtlbnQgWW9kZXIKPiAgPiBJQk0gTFRDIFNlY3VyaXR5IERldi4KPgo+ICA+IC0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0KPiAgPiBVc2luZyBUb21jYXQgYnV0IG5lZWQgdG8gZG8gbW9yZT8gTmVlZCB0byBzdXBw b3J0IHdlYiBzZXJ2aWNlcywgc2VjdXJpdHk/Cj4gID4gR2V0IHN0dWZmIGRvbmUgcXVpY2tseSB3 aXRoIHByZS1pbnRlZ3JhdGVkIHRlY2hub2xvZ3kgdG8gbWFrZSB5b3VyIGpvYgo+ICBlYXNpZXIK PiAgPiBEb3dubG9hZCBJQk0gV2ViU3BoZXJlIEFwcGxpY2F0aW9uIFNlcnZlciB2LjEuMC4xIGJh c2VkIG9uIEFwYWNoZQo+ICBHZXJvbmltbwo+ICA+IGh0dHA6Ly9zZWwuYXMtdXMuZmFsa2FnLm5l dC9zZWw/Y21kPWxuayZraWQ9MTIwNzA5JmJpZD0yNjMwNTcmZGF0PTEyMTY0Mgo+ICA+IF9fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fCj4gID4gb3BlbmNyeXB0 b2tpLXVzZXJzIG1haWxpbmcgbGlzdAo+ICA+IG9wZW5jcnlwdG9raS11c2Vyc0BsaXN0cy5zb3Vy Y2Vmb3JnZS5uZXQKPiAgPiBodHRwczovL2xpc3RzLnNvdXJjZWZvcmdlLm5ldC9saXN0cy9saXN0 aW5mby9vcGVuY3J5cHRva2ktdXNlcnMKPgo+Cj4KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCj4gIFVzaW5n IFRvbWNhdCBidXQgbmVlZCB0byBkbyBtb3JlPyBOZWVkIHRvIHN1cHBvcnQgd2ViIHNlcnZpY2Vz LCBzZWN1cml0eT8KPiAgR2V0IHN0dWZmIGRvbmUgcXVpY2tseSB3aXRoIHByZS1pbnRlZ3JhdGVk IHRlY2hub2xvZ3kgdG8gbWFrZSB5b3VyIGpvYiBlYXNpZXIKPiAgRG93bmxvYWQgSUJNIFdlYlNw aGVyZSBBcHBsaWNhdGlvbiBTZXJ2ZXIgdi4xLjAuMSBiYXNlZCBvbiBBcGFjaGUgR2Vyb25pbW8K PiAgaHR0cDovL3NlbC5hcy11cy5mYWxrYWcubmV0L3NlbD9jbWQ9bG5rJmtpZD0xMjA3MDkmYmlk PTI2MzA1NyZkYXQ9MTIxNjQyCj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX18KPiAgb3BlbmNyeXB0b2tpLXVzZXJzIG1haWxpbmcgbGlzdAo+ICBvcGVuY3J5 cHRva2ktdXNlcnNAbGlzdHMuc291cmNlZm9yZ2UubmV0Cj4gIGh0dHBzOi8vbGlzdHMuc291cmNl Zm9yZ2UubmV0L2xpc3RzL2xpc3RpbmZvL29wZW5jcnlwdG9raS11c2Vycwo+Cj4gLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLQo+ICBVc2luZyBUb21jYXQgYnV0IG5lZWQgdG8gZG8gbW9yZT8gTmVlZCB0byBzdXBw b3J0IHdlYiBzZXJ2aWNlcywgc2VjdXJpdHk/Cj4gIEdldCBzdHVmZiBkb25lIHF1aWNrbHkgd2l0 aCBwcmUtaW50ZWdyYXRlZCB0ZWNobm9sb2d5IHRvIG1ha2UgeW91ciBqb2IgZWFzaWVyCj4gIERv d25sb2FkIElCTSBXZWJTcGhlcmUgQXBwbGljYXRpb24gU2VydmVyIHYuMS4wLjEgYmFzZWQgb24g QXBhY2hlIEdlcm9uaW1vCj4gIGh0dHA6Ly9zZWwuYXMtdXMuZmFsa2FnLm5ldC9zZWw/Y21kPWxu ayZraWQ9MTIwNzA5JmJpZD0yNjMwNTcmZGF0PTEyMTY0Ml9fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fCj4gIG9wZW5jcnlwdG9raS11c2VycyBtYWlsaW5nIGxp c3QKPiAgb3BlbmNyeXB0b2tpLXVzZXJzQGxpc3RzLnNvdXJjZWZvcmdlLm5ldAo+ICBodHRwczov L2xpc3RzLnNvdXJjZWZvcmdlLm5ldC9saXN0cy9saXN0aW5mby9vcGVuY3J5cHRva2ktdXNlcnMK Pgo+Cj4KPgo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KPiBVc2luZyBUb21jYXQgYnV0IG5lZWQgdG8gZG8g bW9yZT8gTmVlZCB0byBzdXBwb3J0IHdlYiBzZXJ2aWNlcywgc2VjdXJpdHk/Cj4gR2V0IHN0dWZm IGRvbmUgcXVpY2tseSB3aXRoIHByZS1pbnRlZ3JhdGVkIHRlY2hub2xvZ3kgdG8gbWFrZSB5b3Vy IGpvYiBlYXNpZXIKPiBEb3dubG9hZCBJQk0gV2ViU3BoZXJlIEFwcGxpY2F0aW9uIFNlcnZlciB2 LjEuMC4xIGJhc2VkIG9uIEFwYWNoZSBHZXJvbmltbwo+IGh0dHA6Ly9zZWwuYXMtdXMuZmFsa2Fn Lm5ldC9zZWw/Y21kPWxuayZraWQ9MTIwNzA5JmJpZD0yNjMwNTcmZGF0PTEyMTY0Mgo+Cj4gX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPiBvcGVuY3J5cHRv a2ktdXNlcnMgbWFpbGluZyBsaXN0Cj4gb3BlbmNyeXB0b2tpLXVzZXJzQGxpc3RzLnNvdXJjZWZv cmdlLm5ldAo+IGh0dHBzOi8vbGlzdHMuc291cmNlZm9yZ2UubmV0L2xpc3RzL2xpc3RpbmZvL29w ZW5jcnlwdG9raS11c2Vycwo+Cj4KPgoKCgotLSAKS2VudCBZb2RlcgpJQk0gTFRDIFNlY3VyaXR5 IERldi4K |
From: <bur...@ya...> - 2006-11-03 07:32:24
|
After configuring with --enable-tpmtok , it started to see the soft token a= s token #1. It still did not started the tpm token. I mean token #0 is unoc= cupied. Should I roll back to the trousers 0.2.7 in order to use opencrypto= ki?=0A =0A-- burak()=0A(ps: bf)=0AMETU CENG '06=0A=0A----- Original Message= ----=0AFrom: Daniel H Jones <dan...@us...>=0ATo: BurakO=D0UZ <burak= og...@ya...>=0ACc: BurakO=D0UZ <bur...@ya...>; opencryptoki-use= rs...@li...; ope...@li...;= Kent Yoder <shp...@gm...>; Tom Lendacky <to...@us...>=0ASent: = Thursday, November 2, 2006 4:51:54 PM=0ASubject: Re: [opencryptoki-users] O= penCryptoki 2.2.4 Problems=0A=0A=0A=0AHi Burak,=0A=0AThe new build process = only creates the=0Asoftware token by default. To build a TPM token you must= =0A=0Aexplicitly use the --enable-tpmtok configure=0Aoption. =0A=0A=0A=0ATh= anks,=0A=0ADan Jones=0A=0AIBM Linux Technology Center, Security=0A=0A512-83= 8-1794 (T/L 678-1794)=0A=0Ad...@us...=0A=0A=0A=0A=0A=0A=0A=0A=0ABu= rak O=D0UZ <bur...@ya...>=0A=0A=0ASent by: opencryptoki-users-bounc= es...@li...=0A11/02/2006 01:58 AM=0A=0A=0A=0A=0A=0ATo=0A=0ABur= ak O=D0UZ <bur...@ya...>,=0ATom Lendacky/Austin/IBM@IBMUS, Kent Yod= er <shp...@gm...>=0A=0A=0Acc=0A=0Ao...@li...urcefo= rge.net,=0Ao...@li...=0A=0A=0ASubject= =0A=0ARe: [opencryptoki-users] OpenCryptoki=0A2.2.4 Problems=0A=0A=0A=0A=0A= =0A=0A=0A=0A=0A=0A=0A=0A=0A=0A=0AThis time it did not start the TPM token.= =0A=0A=0A=0A[root@dungeon opencryptoki]# pkcsconf -t=0A=0AToken #0 Info:=0A= =0A Label: IBM OS PKCS#11=0A=0A Manufacturer: IBM Corp.=0A=0A= Model: IBM SoftTok=0A=0A Serial Number: 123=0A=0A Fla= gs: 0x880045 (RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_TO_BE_CHANGED|SO_P= IN_TO_BE_CHANGED)=0A=0A Sessions: -1/-1=0A=0A R/W Sessions: -= 1/-1=0A=0A PIN Length: 4-8=0A=0A Public Memory: 0xFFFFFFFF/0x= FFFFFFFF=0A=0A Private Memory: 0xFFFFFFFF/0xFFFFFFFF=0A=0A Ha= rdware Version: 1.0=0A=0A Firmware Version: 1.0=0A=0A Time: 0= 9:53:25 AM=0A=0A=0A=0A=0A=0A =0A=0A-- burak()=0A=0A(ps: bf)=0A=0AMETU CENG = '06=0A=0A=0A=0A=0A=0A----- Original Message ----=0A=0AFrom: Burak O=D0UZ <b= ura...@ya...>=0A=0ATo: Tom Lendacky <to...@us...>; Kent Yoder <s= hpe...@gm...>=0A=0ACc: ope...@li...; ope= ncr...@li...=0A=0ASent: Thursday, November= 2, 2006 9:32:33 AM=0A=0ASubject: Re: [opencryptoki-users] OpenCryptoki 2.2= .4 Problems=0A=0A=0A=0AYes I am working on trousers 0.2.8. I will=0Acheck t= he code on the CVS. =0A=0AI have deleted the root directory which is in the= /usr/local/var/lib/opencryptoki/tpm=0Aseveral times and each time =0A=0AI = have experienced the same problems each time. =0A=0A=0A=0AI will report aga= in after trying the cvs code.=0A=0A=0A=0AThanx...=0A=0A =0A=0A-- burak()=0A= =0A(ps: bf)=0A=0AMETU CENG '06=0A=0A=0A=0A=0A=0A----- Original Message ----= =0A=0AFrom: Tom Lendacky <to...@us...>=0A=0ATo: Kent Yoder <shpedoikal@= gmail.com>=0A=0ACc: BurakO=D0UZ <bur...@ya...>; opencryptoki-users@= lists.sourceforge.net;=0Ao...@li...= =0A=0ASent: Wednesday, November 1, 2006 7:47:54 PM=0A=0ASubject: Re: [openc= ryptoki-users] OpenCryptoki 2.2.4 Problems=0A=0A=0A=0As...@gm... = wrote on 11/01/2006=0A10:08:06 AM:=0A=0A=0A=0A> Hi Burak,=0A=0A=0A=0A> Are = you using trousers 0.2.8? It looks like we haven't done=0Aan=0A=0A> opencr= yptoki release since that release of trousers, which may be=0A=0A> breaking= things here. The compatibility code is in opencryptoki=0ACVS,=0A=0A> plea= se try that out and see if it fixes this problem (if you're on=0A=0A> trous= ers 0.2.8).=0A=0A=0A=0A> Kent=0A=0A=0A=0AIn addition to what Kent has sugge= sted, once the token has been=0A=0Ainitialized (even though you received a = segfault during=0A=0Atpmtoken_init), the "87654321" PIN is no longer valid.= You will=0A=0Aneed to use the PIN/password that you entered when you execu= ted=0A=0Athe tpmtoken_init command. Alternatively (since you have no data= =0A=0Ain the token yet), you can go to /var/lib/opencryptoki/tpm (or=0A=0A/= usr/local/var/lib/opencryptoki/tpm if you built and installed to=0A=0A/usr/= local) and remove the directory that has your username (this=0A=0Aassumes t= hat you have root access of course).=0A=0A=0A=0AThanks,=0A=0ATom=0A=0A=0A= =0A> On 11/1/06, Burak O=D0UZ <bur...@ya...> wrote:=0A=0A> >=0A=0A>= > I have problems using cryptoki using with TPM. My TPM is working=0Afine = I=0A=0Aam=0A=0A> > sure about it.=0A=0A> > I have applied the method mentio= ned in trousers faq. SRK is NULL.=0A=0A> >=0A=0A> > [root@dungeon opencrypt= oki]# tpmtoken_init=0A=0A> > A new TPM security officer password is needed.= The password must=0Abe=0A=0Abetween=0A=0A> > 6 and 127 characters in lengt= h.=0A=0A> > Enter new password:=0A=0A> > Confirm password:=0A=0A> > Segment= ation fault=0A=0A> > [root@dungeon opencryptoki]# tpmtoken_init=0A=0A> > Wa= rning: The TPM token has already been initialized. Reinitializing=0Athe=0A= =0ATPM=0A=0A> > token will cause all TPM token data to be lost.=0A=0A> > Cl= ear the TPM token data? [y/N]: y=0A=0A> > Enter the TPM security officer pa= ssword:=0A=0A> > C_InitToken failed: 0x000000a0 (160)=0A=0A> >=0A=0A> > I h= ave entered SO PIN as 87654321.=0A=0A> >=0A=0A> > [root@dungeon opencryptok= i]# pkcsconf -P -c 0=0A=0A> > Enter the SO PIN: ********=0A=0A> > Enter the= new SO PIN: ********=0A=0A> > Re-enter the new SO PIN: ********=0A=0A> > E= rror setting PIN: 0x6=0A=0A> >=0A=0A> > But Cryptoki has seen my TPM.=0A=0A= > > [root@dungeon opencryptoki]# pkcsconf -s -t=0A=0A> > Token #0 Info:=0A= =0A> > Label: IBM PKCS#11 TPM Token=0A=0A> > Manufacturer: = IBM Corp.=0A=0A> > Model: TPM v1.1 Token=0A=0A> > Serial Nu= mber: 123=0A=0A> > Flags: 0x980445=0A=0A> >=0A=0A>=0A=0A(RNG|LOGIN_= REQUIRED|CLOCK_ON_TOKEN|TOKEN_INITIALIZED|USER_PIN_TO_BE_CHANGED|SO_PIN_COU= NT_LOW|SO_PIN_TO_BE_CHANGED)=0A=0A=0A=0A> > Sessions: -1/-1=0A=0A> = > R/W Sessions: -1/-1=0A=0A> > PIN Length: 6-127=0A=0A> > = Public Memory: 0xFFFFFFFF/0xFFFFFFFF=0A=0A> > Private Memory= : 0xFFFFFFFF/0xFFFFFFFF=0A=0A> > Hardware Version: 1.0=0A=0A> > = Firmware Version: 1.0=0A=0A> > Time: 05:52:06 PM=0A=0A> > Toke= n #1 Info:=0A=0A> > Label: IBM OS PKCS#11=0A=0A> > Manufact= urer: IBM Corp.=0A=0A> > Model: IBM SoftTok=0A=0A> > Serial= Number: 123=0A=0A> > Flags: 0x880045=0A=0A> >=0A=0A>=0A=0A(RNG|LOG= IN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_TO_BE_CHANGED|SO_PIN_TO_BE_CHANGED)=0A= =0A=0A=0A> > Sessions: -1/-1=0A=0A> > R/W Sessions: -1/-1= =0A=0A> > PIN Length: 4-8=0A=0A> > Public Memory: 0xFFFFFFF= F/0xFFFFFFFF=0A=0A> > Private Memory: 0xFFFFFFFF/0xFFFFFFFF=0A=0A> = > Hardware Version: 1.0=0A=0A> > Firmware Version: 1.0=0A= =0A> > Time: 05:52:06 PM=0A=0A> > Slot #0 Info=0A=0A> > Des= cription: Linux 2.6.18 Linux (TPM)=0A=0A> > Manufacturer: Linux 2.6= .18=0A=0A> > Flags: 0x5 (TOKEN_PRESENT|HW_SLOT)=0A=0A> > Ha= rdware Version: 0.0=0A=0A> > Firmware Version: 1.1=0A=0A> > Slot #1= Info=0A=0A> > Description: Linux 2.6.18 Linux (Soft)=0A=0A> > = Manufacturer: Linux 2.6.18=0A=0A> > Flags: 0x1 (TOKEN_PRESENT)= =0A=0A> > Hardware Version: 0.0=0A=0A> > Firmware Version: = 1.1=0A=0A> >=0A=0A> > Do you have any idea what is going on? What should I = do?=0A=0A> >=0A=0A> > Thanx in advance.=0A=0A> > -- burak()=0A=0A> > (ps: = bf)=0A=0A> > METU CENG '06=0A=0A> >=0A=0A> >=0A=0A> >=0A=0A> >=0A=0A-------= ------------------------------------------------------------------=0A=0A> >= Using Tomcat but need to do more? Need to support web services,=0A=0Asecur= ity?=0A=0A> > Get stuff done quickly with pre-integrated technology to make= =0Ayour job=0A=0A> > easier=0A=0A> > Download IBM WebSphere Application Ser= ver v.1.0.1 based on Apache=0A=0AGeronimo=0A=0A> >=0A=0Ahttp://sel.as-us.fa= lkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D121642=0A=0A> >=0A= =0A> > _______________________________________________=0A=0A> > opencryptok= i-users mailing list=0A=0A> > ope...@li...=0A= =0A> > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users=0A= =0A> >=0A=0A> >=0A=0A> >=0A=0A=0A=0A>=0A=0A> --=0A=0A> Kent Yoder=0A=0A> IB= M LTC Security Dev.=0A=0A=0A=0A> ------------------------------------------= -------------------------------=0A=0A> Using Tomcat but need to do more? Ne= ed to support web services, security?=0A=0A> Get stuff done quickly with pr= e-integrated technology to make your=0Ajob=0A=0Aeasier=0A=0A> Download IBM = WebSphere Application Server v.1.0.1 based on Apache=0A=0AGeronimo=0A=0A> h= ttp://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D12= 1642=0A=0A> _______________________________________________=0A=0A> opencryp= toki-users mailing list=0A=0A> ope...@li...=0A= =0A> https://lists.sourceforge.net/lists/listinfo/opencryptoki-users=0A=0A= =0A=0A=0A=0A=0A=0A---------------------------------------------------------= ----------------=0A=0AUsing Tomcat but need to do more? Need to support web= services, security?=0A=0AGet stuff done quickly with pre-integrated techno= logy to make your job=0Aeasier=0A=0ADownload IBM WebSphere Application Serv= er v.1.0.1 based on Apache Geronimo=0A=0Ahttp://sel.as-us.falkag.net/sel?cm= d=3Dlnk&kid=3D120709&bid=3D263057&dat=3D121642=0A=0A_______________________= ________________________=0A=0Aopencryptoki-users mailing list=0A=0Aopencryp= tok...@li...=0A=0Ahttps://lists.sourceforge.net/lists/l= istinfo/opencryptoki-users=0A=0A=0A=0A-------------------------------------= ------------------------------------=0A=0AUsing Tomcat but need to do more?= Need to support web services, security?=0A=0AGet stuff done quickly with p= re-integrated technology to make your job=0Aeasier=0A=0ADownload IBM WebSph= ere Application Server v.1.0.1 based on Apache Geronimo=0A=0Ahttp://sel.as-= us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D121642_________= ______________________________________=0A=0Aopencryptoki-users mailing list= =0A=0Ao...@li...=0A=0Ahttps://lists.sourcefor= ge.net/lists/listinfo/opencryptoki-users=0A=0A=0A=0A=0A=0A=0A=0A=0A |
From: Daniel H J. <dan...@us...> - 2006-11-02 14:52:14
|
Hi Burak, The new build process only creates the software token by default. To build = a TPM token you must explicitly use the --enable-tpmtok configure option.=20 Thanks, Dan Jones IBM Linux Technology Center, Security 512-838-1794 (T/L 678-1794) dan...@us... Burak O=D0UZ <bur...@ya...>=20 Sent by: ope...@li... 11/02/2006 01:58 AM To Burak O=D0UZ <bur...@ya...>, Tom Lendacky/Austin/IBM@IBMUS, Kent=20 Yoder <shp...@gm...> cc ope...@li...,=20 ope...@li... Subject Re: [opencryptoki-users] OpenCryptoki 2.2.4 Problems This time it did not start the TPM token. [root@dungeon opencryptoki]# pkcsconf -t Token #0 Info: Label: IBM OS PKCS#11 Manufacturer: IBM Corp. Model: IBM SoftTok Serial Number: 123 Flags: 0x880045=20 (RNG|LOGIN=5FREQUIRED|CLOCK=5FON=5FTOKEN|USER=5FPIN=5FTO=5FBE=5FCHANGED|SO= =5FPIN=5FTO=5FBE=5FCHANGED) Sessions: -1/-1 R/W Sessions: -1/-1 PIN Length: 4-8 Public Memory: 0xFFFFFFFF/0xFFFFFFFF Private Memory: 0xFFFFFFFF/0xFFFFFFFF Hardware Version: 1.0 Firmware Version: 1.0 Time: 09:53:25 AM =20 -- burak() (ps: bf) METU CENG '06 ----- Original Message ---- From: Burak O=D0UZ <bur...@ya...> To: Tom Lendacky <to...@us...>; Kent Yoder <shp...@gm...> Cc: ope...@li...;=20 ope...@li... Sent: Thursday, November 2, 2006 9:32:33 AM Subject: Re: [opencryptoki-users] OpenCryptoki 2.2.4 Problems Yes I am working on trousers 0.2.8. I will check the code on the CVS.=20 I have deleted the root directory which is in the=20 /usr/local/var/lib/opencryptoki/tpm several times and each time=20 I have experienced the same problems each time.=20 I will report again after trying the cvs code. Thanx... =20 -- burak() (ps: bf) METU CENG '06 ----- Original Message ---- From: Tom Lendacky <to...@us...> To: Kent Yoder <shp...@gm...> Cc: BurakO=D0UZ <bur...@ya...>;=20 ope...@li...;=20 ope...@li... Sent: Wednesday, November 1, 2006 7:47:54 PM Subject: Re: [opencryptoki-users] OpenCryptoki 2.2.4 Problems shp...@gm... wrote on 11/01/2006 10:08:06 AM: > Hi Burak, > Are you using trousers 0.2.8? It looks like we haven't done an > opencryptoki release since that release of trousers, which may be > breaking things here. The compatibility code is in opencryptoki CVS, > please try that out and see if it fixes this problem (if you're on > trousers 0.2.8). > Kent In addition to what Kent has suggested, once the token has been initialized (even though you received a segfault during tpmtoken=5Finit), the "87654321" PIN is no longer valid. You will need to use the PIN/password that you entered when you executed the tpmtoken=5Finit command. Alternatively (since you have no data in the token yet), you can go to /var/lib/opencryptoki/tpm (or /usr/local/var/lib/opencryptoki/tpm if you built and installed to /usr/local) and remove the directory that has your username (this assumes that you have root access of course). Thanks, Tom > On 11/1/06, Burak O=D0UZ <bur...@ya...> wrote: > > > > I have problems using cryptoki using with TPM. My TPM is working fine=20 I am > > sure about it. > > I have applied the method mentioned in trousers faq. SRK is NULL. > > > > [root@dungeon opencryptoki]# tpmtoken=5Finit > > A new TPM security officer password is needed. The password must be between > > 6 and 127 characters in length. > > Enter new password: > > Confirm password: > > Segmentation fault > > [root@dungeon opencryptoki]# tpmtoken=5Finit > > Warning: The TPM token has already been initialized. Reinitializing=20 the TPM > > token will cause all TPM token data to be lost. > > Clear the TPM token data? [y/N]: y > > Enter the TPM security officer password: > > C=5FInitToken failed: 0x000000a0 (160) > > > > I have entered SO PIN as 87654321. > > > > [root@dungeon opencryptoki]# pkcsconf -P -c 0 > > Enter the SO PIN: ******** > > Enter the new SO PIN: ******** > > Re-enter the new SO PIN: ******** > > Error setting PIN: 0x6 > > > > But Cryptoki has seen my TPM. > > [root@dungeon opencryptoki]# pkcsconf -s -t > > Token #0 Info: > > Label: IBM PKCS#11 TPM Token > > Manufacturer: IBM Corp. > > Model: TPM v1.1 Token > > Serial Number: 123 > > Flags: 0x980445 > > > (RNG|LOGIN=5FREQUIRED|CLOCK=5FON=5FTOKEN|TOKEN=5FINITIALIZED|USER=5FPIN=5FT= O=5FBE=5FCHANGED|SO=5FPIN=5FCOUNT=5FLOW|SO=5FPIN=5FTO=5FBE=5FCHANGED) > > Sessions: -1/-1 > > R/W Sessions: -1/-1 > > PIN Length: 6-127 > > Public Memory: 0xFFFFFFFF/0xFFFFFFFF > > Private Memory: 0xFFFFFFFF/0xFFFFFFFF > > Hardware Version: 1.0 > > Firmware Version: 1.0 > > Time: 05:52:06 PM > > Token #1 Info: > > Label: IBM OS PKCS#11 > > Manufacturer: IBM Corp. > > Model: IBM SoftTok > > Serial Number: 123 > > Flags: 0x880045 > > > (RNG|LOGIN=5FREQUIRED|CLOCK=5FON=5FTOKEN|USER=5FPIN=5FTO=5FBE=5FCHANGED|SO= =5FPIN=5FTO=5FBE=5FCHANGED) > > Sessions: -1/-1 > > R/W Sessions: -1/-1 > > PIN Length: 4-8 > > Public Memory: 0xFFFFFFFF/0xFFFFFFFF > > Private Memory: 0xFFFFFFFF/0xFFFFFFFF > > Hardware Version: 1.0 > > Firmware Version: 1.0 > > Time: 05:52:06 PM > > Slot #0 Info > > Description: Linux 2.6.18 Linux (TPM) > > Manufacturer: Linux 2.6.18 > > Flags: 0x5 (TOKEN=5FPRESENT|HW=5FSLOT) > > Hardware Version: 0.0 > > Firmware Version: 1.1 > > Slot #1 Info > > Description: Linux 2.6.18 Linux (Soft) > > Manufacturer: Linux 2.6.18 > > Flags: 0x1 (TOKEN=5FPRESENT) > > Hardware Version: 0.0 > > Firmware Version: 1.1 > > > > Do you have any idea what is going on? What should I do? > > > > Thanx in advance. > > -- burak() > > (ps: bf) > > METU CENG '06 > > > > > > > > ------------------------------------------------------------------------- > > Using Tomcat but need to do more? Need to support web services, security? > > Get stuff done quickly with pre-integrated technology to make your job > > easier > > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > > http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D1= 21642 > > > > =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F= =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F > > opencryptoki-users mailing list > > ope...@li... > > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > > > > > > -- > Kent Yoder > IBM LTC Security Dev. >=20 ------------------------------------------------------------------------- > Using Tomcat but need to do more? Need to support web services,=20 security? > Get stuff done quickly with pre-integrated technology to make your job easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat= =3D121642 > =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F= =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job=20 easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D1= 21642 =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F= =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F opencryptoki-users mailing list ope...@li... https://lists.sourceforge.net/lists/listinfo/opencryptoki-users ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job=20 easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D1= 21642 =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F= =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F opencryptoki-users mailing list ope...@li... https://lists.sourceforge.net/lists/listinfo/opencryptoki-users |
From: <bur...@ya...> - 2006-11-02 07:58:44
|
This time it did not start the TPM token.=0A=0A[root@dungeon opencryptoki]#= pkcsconf -t=0AToken #0 Info:=0A Label: IBM OS PKCS#11=0A Man= ufacturer: IBM Corp.=0A Model: IBM SoftTok=0A Serial Number: = 123=0A Flags: 0x880045 (RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_T= O_BE_CHANGED|SO_PIN_TO_BE_CHANGED)=0A Sessions: -1/-1=0A R/W = Sessions: -1/-1=0A PIN Length: 4-8=0A Public Memory: 0xFFFFFF= FF/0xFFFFFFFF=0A Private Memory: 0xFFFFFFFF/0xFFFFFFFF=0A Har= dware Version: 1.0=0A Firmware Version: 1.0=0A Time: 09:53:25= AM=0A=0A=0A =0A-- burak()=0A(ps: bf)=0AMETU CENG '06=0A=0A----- Original M= essage ----=0AFrom: Burak O=D0UZ <bur...@ya...>=0ATo: Tom Lendacky = <to...@us...>; Kent Yoder <shp...@gm...>=0ACc: opencryptoki-use= rs...@li...; ope...@li...= =0ASent: Thursday, November 2, 2006 9:32:33 AM=0ASubject: Re: [opencryptoki= -users] OpenCryptoki 2.2.4 Problems=0A=0AYes I am working on trousers 0.2.8= . I will check the code on the CVS. =0AI have deleted the root directory wh= ich is in the /usr/local/var/lib/opencryptoki/tpm several times and each ti= me =0AI have experienced the same problems each time. =0A=0AI will report a= gain after trying the cvs code.=0A=0AThanx...=0A =0A-- burak()=0A(ps: bf)= =0AMETU CENG '06=0A=0A----- Original Message ----=0AFrom: Tom Lendacky <tom= l...@us...>=0ATo: Kent Yoder <shp...@gm...>=0ACc: BurakO=D0UZ <bu= rak...@ya...>; ope...@li...; opencryptoki= -us...@li...=0ASent: Wednesday,=0A November 1, 2006= 7:47:54 PM=0ASubject: Re: [opencryptoki-users] OpenCryptoki 2.2.4 Problems= =0A=0As...@gm... wrote on 11/01/2006 10:08:06 AM:=0A=0A> Hi Burak= ,=0A=0A> Are you using trousers 0.2.8? It looks like we haven't done an=0A= > opencryptoki release since that release of trousers, which may be=0A> bre= aking things here. The compatibility code is in opencryptoki CVS,=0A> plea= se try that out and see if it fixes this problem (if you're on=0A> trousers= 0.2.8).=0A=0A> Kent=0A=0AIn addition to what Kent has suggested, once the = token has been=0Ainitialized (even though you received a segfault during=0A= tpmtoken_init), the "87654321" PIN is no longer valid. You will=0Aneed to u= se the PIN/password that you entered when you executed=0Athe tpmtoken_init = command. Alternatively (since you have no data=0Ain the token yet), you ca= n go to /var/lib/opencryptoki/tpm=0A (or=0A/usr/local/var/lib/opencryptoki/= tpm if you built and installed to=0A/usr/local) and remove the directory th= at has your username (this=0Aassumes that you have root access of course).= =0A=0AThanks,=0ATom=0A=0A> On 11/1/06, Burak O=D0UZ <bur...@ya...> = wrote:=0A> >=0A> > I have problems using cryptoki using with TPM. My TPM is= working fine I=0Aam=0A> > sure about it.=0A> > I have applied the method m= entioned in trousers faq. SRK is NULL.=0A> >=0A> > [root@dungeon opencrypto= ki]# tpmtoken_init=0A> > A new TPM security officer password is needed. The= password must be=0Abetween=0A> > 6 and 127 characters in length.=0A> > Ent= er new password:=0A> > Confirm password:=0A> > Segmentation fault=0A> > [ro= ot@dungeon opencryptoki]# tpmtoken_init=0A> > Warning: The TPM token has al= ready been initialized. Reinitializing the=0ATPM=0A> > token will cause all= TPM=0A token data to be lost.=0A> > Clear the TPM token data? [y/N]: y=0A>= > Enter the TPM security officer password:=0A> > C_InitToken failed: 0x000= 000a0 (160)=0A> >=0A> > I have entered SO PIN as 87654321.=0A> >=0A> > [roo= t@dungeon opencryptoki]# pkcsconf -P -c 0=0A> > Enter the SO PIN: ********= =0A> > Enter the new SO PIN: ********=0A> > Re-enter the new SO PIN: ******= **=0A> > Error setting PIN: 0x6=0A> >=0A> > But Cryptoki has seen my TPM.= =0A> > [root@dungeon opencryptoki]# pkcsconf -s -t=0A> > Token #0 Info:=0A>= > Label: IBM PKCS#11 TPM Token=0A> > Manufacturer: IBM Cor= p.=0A> > Model: TPM v1.1 Token=0A> > Serial Number: 123=0A>= =0A > Flags: 0x980445=0A> >=0A>=0A(RNG|LOGIN_REQUIRED|CLOCK_ON_TOKE= N|TOKEN_INITIALIZED|USER_PIN_TO_BE_CHANGED|SO_PIN_COUNT_LOW|SO_PIN_TO_BE_CH= ANGED)=0A=0A> > Sessions: -1/-1=0A> > R/W Sessions: -1/-1= =0A> > PIN Length: 6-127=0A> > Public Memory: 0xFFFFFFFF/0x= FFFFFFFF=0A> > Private Memory: 0xFFFFFFFF/0xFFFFFFFF=0A> > = Hardware Version: 1.0=0A> > Firmware Version: 1.0=0A> > Tim= e: 05:52:06 PM=0A> > Token #1 Info:=0A> > Label:=0A IBM OS PKCS#11= =0A> > Manufacturer: IBM Corp.=0A> > Model: IBM SoftTok=0A>= > Serial Number: 123=0A> > Flags: 0x880045=0A> >=0A>=0A(RN= G|LOGIN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_TO_BE_CHANGED|SO_PIN_TO_BE_CHANGED= )=0A=0A> > Sessions: -1/-1=0A> > R/W Sessions: -1/-1=0A> > = PIN Length: 4-8=0A> > Public Memory: 0xFFFFFFFF/0xFFFFFFFF= =0A> > Private Memory: 0xFFFFFFFF/0xFFFFFFFF=0A> > Hardware= Version: 1.0=0A>=0A > Firmware Version: 1.0=0A> > Time: 05= :52:06 PM=0A> > Slot #0 Info=0A> > Description: Linux 2.6.18 Linux = (TPM)=0A> > Manufacturer: Linux 2.6.18=0A> > Flags: 0x5 (TO= KEN_PRESENT|HW_SLOT)=0A> > Hardware Version: 0.0=0A> > Firm= ware Version: 1.1=0A> > Slot #1 Info=0A> > Description: Linux 2.6.1= 8 Linux (Soft)=0A> > Manufacturer: Linux 2.6.18=0A> > Flags= : 0x1 (TOKEN_PRESENT)=0A>=0A > Hardware Version: 0.0=0A> > = Firmware Version: 1.1=0A> >=0A> > Do you have any idea what is going on? Wh= at should I do?=0A> >=0A> > Thanx in advance.=0A> > -- burak()=0A> > (ps: = bf)=0A> > METU CENG '06=0A> >=0A> >=0A> >=0A> >=0A-------------------------= ------------------------------------------------=0A> > Using Tomcat but nee= d to do more? Need to support web services,=0Asecurity?=0A> > Get stuff don= e quickly with pre-integrated technology to make your job=0A> > easier=0A> = > Download IBM WebSphere Application Server v.1.0.1 based on Apache=0AGeron= imo=0A> >=0Ahttp://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D26= 3057&dat=3D121642=0A> >=0A> > _____________________________________________= __=0A> > opencryptoki-users mailing list=0A> > ope...@li...u= rceforge.net=0A> > https://lists.sourceforge.net/lists/listinfo/opencryptok= i-users=0A> >=0A> >=0A> >=0A=0A>=0A> --=0A> Kent Yoder=0A> IBM LTC Security= Dev.=0A=0A> --------------------------------------------------------------= -----------=0A> Using Tomcat but need to do more? Need to support web servi= ces, security?=0A> Get stuff done quickly with pre-integrated technology to= make your job=0Aeasier=0A> Download IBM WebSphere Application Server v.1.0= .1 based on Apache=0AGeronimo=0A>=0A http://sel.as-us.falkag.net/sel?cmd=3D= lnk&kid=3D120709&bid=3D263057&dat=3D121642=0A> ____________________________= ___________________=0A> opencryptoki-users mailing list=0A> opencryptoki-us= er...@li...=0A> https://lists.sourceforge.net/lists/listinfo/= opencryptoki-users=0A=0A=0A=0A=0A=0A=0A=0A---------------------------------= ----------------------------------------=0AUsing Tomcat but need to do more= ? Need to support web services, security?=0AGet stuff done quickly with pre= -integrated technology to make your job easier=0ADownload IBM WebSphere App= lication Server v.1.0.1 based on Apache Geronimo=0Ahttp://sel.as-us.falkag.= net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D121642=0A________________= _______________________________=0Aopencryptoki-users mailing list=0Aopencry= pto...@li...=0Ahttps://lists.sourceforge.net/lists/lis= tinfo/opencryptoki-users=0A=0A=0A=0A=0A=0A=0A |
From: <bur...@ya...> - 2006-11-02 07:32:39
|
Yes I am working on trousers 0.2.8. I will check the code on the CVS. =0AI = have deleted the root directory which is in the /usr/local/var/lib/opencryp= toki/tpm several times and each time =0AI have experienced the same problem= s each time. =0A=0AI will report again after trying the cvs code.=0A=0AThan= x...=0A =0A-- burak()=0A(ps: bf)=0AMETU CENG '06=0A=0A----- Original Messag= e ----=0AFrom: Tom Lendacky <to...@us...>=0ATo: Kent Yoder <shpedoikal@= gmail.com>=0ACc: BurakO=D0UZ <bur...@ya...>; opencryptoki-users@lis= ts.sourceforge.net; ope...@li...=0ASent= : Wednesday, November 1, 2006 7:47:54 PM=0ASubject: Re: [opencryptoki-users= ] OpenCryptoki 2.2.4 Problems=0A=0As...@gm... wrote on 11/01/2006= 10:08:06 AM:=0A=0A> Hi Burak,=0A=0A> Are you using trousers 0.2.8? It loo= ks like we haven't done an=0A> opencryptoki release since that release of t= rousers, which may be=0A> breaking things here. The compatibility code is = in opencryptoki CVS,=0A> please try that out and see if it fixes this probl= em (if you're on=0A> trousers 0.2.8).=0A=0A> Kent=0A=0AIn addition to what = Kent has suggested, once the token has been=0Ainitialized (even though you = received a segfault during=0Atpmtoken_init), the "87654321" PIN is no longe= r valid. You will=0Aneed to use the PIN/password that you entered when you = executed=0Athe tpmtoken_init command. Alternatively (since you have no dat= a=0Ain the token yet), you can go to /var/lib/opencryptoki/tpm (or=0A/usr/l= ocal/var/lib/opencryptoki/tpm if you built and installed to=0A/usr/local) a= nd remove the directory that has your username (this=0Aassumes that you hav= e root access of course).=0A=0AThanks,=0ATom=0A=0A> On 11/1/06, Burak O=D0U= Z <bur...@ya...> wrote:=0A> >=0A> > I have problems using cryptoki = using with TPM. My TPM is working fine I=0Aam=0A> > sure about it.=0A> > I = have applied the method mentioned in trousers faq. SRK is NULL.=0A> >=0A> >= [root@dungeon opencryptoki]# tpmtoken_init=0A> > A new TPM security office= r password is needed. The password must be=0Abetween=0A> > 6 and 127 charac= ters in length.=0A> > Enter new password:=0A> > Confirm password:=0A> > Seg= mentation fault=0A> > [root@dungeon opencryptoki]# tpmtoken_init=0A> > Warn= ing: The TPM token has already been initialized. Reinitializing the=0ATPM= =0A> > token will cause all TPM token data to be lost.=0A> > Clear the TPM = token data? [y/N]: y=0A> > Enter the TPM security officer password:=0A> > C= _InitToken failed: 0x000000a0 (160)=0A> >=0A> > I have entered SO PIN as 87= 654321.=0A> >=0A> > [root@dungeon opencryptoki]# pkcsconf -P -c 0=0A> > Ent= er the SO PIN: ********=0A> > Enter the new SO PIN: ********=0A> > Re-enter= the new SO PIN: ********=0A> > Error setting PIN: 0x6=0A> >=0A> > But Cryp= toki has seen my TPM.=0A> > [root@dungeon opencryptoki]# pkcsconf -s -t=0A>= > Token #0 Info:=0A> > Label: IBM PKCS#11 TPM Token=0A> > = Manufacturer: IBM Corp.=0A> > Model: TPM v1.1 Token=0A> > S= erial Number: 123=0A> > Flags: 0x980445=0A> >=0A>=0A(RNG|LOGIN_REQU= IRED|CLOCK_ON_TOKEN|TOKEN_INITIALIZED|USER_PIN_TO_BE_CHANGED|SO_PIN_COUNT_L= OW|SO_PIN_TO_BE_CHANGED)=0A=0A> > Sessions: -1/-1=0A> > R/W= Sessions: -1/-1=0A> > PIN Length: 6-127=0A> > Public Memor= y: 0xFFFFFFFF/0xFFFFFFFF=0A> > Private Memory: 0xFFFFFFFF/0xFFFFFFF= F=0A> > Hardware Version: 1.0=0A> > Firmware Version: 1.0= =0A> > Time: 05:52:06 PM=0A> > Token #1 Info:=0A> > Label: = IBM OS PKCS#11=0A> > Manufacturer: IBM Corp.=0A> > Model: I= BM SoftTok=0A> > Serial Number: 123=0A> > Flags: 0x880045= =0A> >=0A>=0A(RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_TO_BE_CHANGED|SO_P= IN_TO_BE_CHANGED)=0A=0A> > Sessions: -1/-1=0A> > R/W Sessio= ns: -1/-1=0A> > PIN Length: 4-8=0A> > Public Memory: 0xFFFF= FFFF/0xFFFFFFFF=0A> > Private Memory: 0xFFFFFFFF/0xFFFFFFFF=0A> > = Hardware Version: 1.0=0A> > Firmware Version: 1.0=0A> > = Time: 05:52:06 PM=0A> > Slot #0 Info=0A> > Description: Linux 2= .6.18 Linux (TPM)=0A> > Manufacturer: Linux 2.6.18=0A> > Fl= ags: 0x5 (TOKEN_PRESENT|HW_SLOT)=0A> > Hardware Version: 0.0=0A> > = Firmware Version: 1.1=0A> > Slot #1 Info=0A> > Description:= Linux 2.6.18 Linux (Soft)=0A> > Manufacturer: Linux 2.6.18=0A> > = Flags: 0x1 (TOKEN_PRESENT)=0A> > Hardware Version: 0.0=0A> >= Firmware Version: 1.1=0A> >=0A> > Do you have any idea what is goi= ng on? What should I do?=0A> >=0A> > Thanx in advance.=0A> > -- burak()=0A= > > (ps: bf)=0A> > METU CENG '06=0A> >=0A> >=0A> >=0A> >=0A----------------= ---------------------------------------------------------=0A> > Using Tomca= t but need to do more? Need to support web services,=0Asecurity?=0A> > Get = stuff done quickly with pre-integrated technology to make your job=0A> > ea= sier=0A> > Download IBM WebSphere Application Server v.1.0.1 based on Apach= e=0AGeronimo=0A> >=0Ahttp://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709= &bid=3D263057&dat=3D121642=0A> >=0A> > ____________________________________= ___________=0A> > opencryptoki-users mailing list=0A> > opencryptoki-users@= lists.sourceforge.net=0A> > https://lists.sourceforge.net/lists/listinfo/op= encryptoki-users=0A> >=0A> >=0A> >=0A=0A>=0A> --=0A> Kent Yoder=0A> IBM LTC= Security Dev.=0A=0A> -----------------------------------------------------= --------------------=0A> Using Tomcat but need to do more? Need to support = web services, security?=0A> Get stuff done quickly with pre-integrated tech= nology to make your job=0Aeasier=0A> Download IBM WebSphere Application Ser= ver v.1.0.1 based on Apache=0AGeronimo=0A> http://sel.as-us.falkag.net/sel?= cmd=3Dlnk&kid=3D120709&bid=3D263057&dat=3D121642=0A> ______________________= _________________________=0A> opencryptoki-users mailing list=0A> opencrypt= oki...@li...=0A> https://lists.sourceforge.net/lists/lis= tinfo/opencryptoki-users=0A=0A=0A=0A=0A=0A=0A=0A |
From: Tom L. <to...@us...> - 2006-11-01 17:48:18
|
shp...@gm... wrote on 11/01/2006 10:08:06 AM: > Hi Burak, > Are you using trousers 0.2.8? It looks like we haven't done an > opencryptoki release since that release of trousers, which may be > breaking things here. The compatibility code is in opencryptoki CVS,= > please try that out and see if it fixes this problem (if you're on > trousers 0.2.8). > Kent In addition to what Kent has suggested, once the token has been initialized (even though you received a segfault during tpmtoken_init), the "87654321" PIN is no longer valid. You will need to use the PIN/password that you entered when you executed the tpmtoken_init command. Alternatively (since you have no data in the token yet), you can go to /var/lib/opencryptoki/tpm (or /usr/local/var/lib/opencryptoki/tpm if you built and installed to /usr/local) and remove the directory that has your username (this assumes that you have root access of course). Thanks, Tom > On 11/1/06, Burak O=D0UZ <bur...@ya...> wrote: > > > > I have problems using cryptoki using with TPM. My TPM is working fi= ne I am > > sure about it. > > I have applied the method mentioned in trousers faq. SRK is NULL. > > > > [root@dungeon opencryptoki]# tpmtoken_init > > A new TPM security officer password is needed. The password must be= between > > 6 and 127 characters in length. > > Enter new password: > > Confirm password: > > Segmentation fault > > [root@dungeon opencryptoki]# tpmtoken_init > > Warning: The TPM token has already been initialized. Reinitializing= the TPM > > token will cause all TPM token data to be lost. > > Clear the TPM token data? [y/N]: y > > Enter the TPM security officer password: > > C_InitToken failed: 0x000000a0 (160) > > > > I have entered SO PIN as 87654321. > > > > [root@dungeon opencryptoki]# pkcsconf -P -c 0 > > Enter the SO PIN: ******** > > Enter the new SO PIN: ******** > > Re-enter the new SO PIN: ******** > > Error setting PIN: 0x6 > > > > But Cryptoki has seen my TPM. > > [root@dungeon opencryptoki]# pkcsconf -s -t > > Token #0 Info: > > Label: IBM PKCS#11 TPM Token > > Manufacturer: IBM Corp. > > Model: TPM v1.1 Token > > Serial Number: 123 > > Flags: 0x980445 > > > (RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|TOKEN_INITIALIZED|USER_PIN_TO_BE_CHA= NGED|SO_PIN_COUNT_LOW|SO_PIN_TO_BE_CHANGED) > > Sessions: -1/-1 > > R/W Sessions: -1/-1 > > PIN Length: 6-127 > > Public Memory: 0xFFFFFFFF/0xFFFFFFFF > > Private Memory: 0xFFFFFFFF/0xFFFFFFFF > > Hardware Version: 1.0 > > Firmware Version: 1.0 > > Time: 05:52:06 PM > > Token #1 Info: > > Label: IBM OS PKCS#11 > > Manufacturer: IBM Corp. > > Model: IBM SoftTok > > Serial Number: 123 > > Flags: 0x880045 > > > (RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_TO_BE_CHANGED|SO_PIN_TO_BE_= CHANGED) > > Sessions: -1/-1 > > R/W Sessions: -1/-1 > > PIN Length: 4-8 > > Public Memory: 0xFFFFFFFF/0xFFFFFFFF > > Private Memory: 0xFFFFFFFF/0xFFFFFFFF > > Hardware Version: 1.0 > > Firmware Version: 1.0 > > Time: 05:52:06 PM > > Slot #0 Info > > Description: Linux 2.6.18 Linux (TPM) > > Manufacturer: Linux 2.6.18 > > Flags: 0x5 (TOKEN_PRESENT|HW_SLOT) > > Hardware Version: 0.0 > > Firmware Version: 1.1 > > Slot #1 Info > > Description: Linux 2.6.18 Linux (Soft) > > Manufacturer: Linux 2.6.18 > > Flags: 0x1 (TOKEN_PRESENT) > > Hardware Version: 0.0 > > Firmware Version: 1.1 > > > > Do you have any idea what is going on? What should I do? > > > > Thanx in advance. > > -- burak() > > (ps: bf) > > METU CENG '06 > > > > > > > > -----------------------------------------------------------------------= -- > > Using Tomcat but need to do more? Need to support web services, security? > > Get stuff done quickly with pre-integrated technology to make your = job > > easier > > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > > http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat= =3D121642 > > > > _______________________________________________ > > opencryptoki-users mailing list > > ope...@li... > > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > > > > > > -- > Kent Yoder > IBM LTC Security Dev. > ---------------------------------------------------------------------= ---- > Using Tomcat but need to do more? Need to support web services, secur= ity? > Get stuff done quickly with pre-integrated technology to make your jo= b easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&d= at=3D121642 > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users= |
From: Kent Y. <shp...@gm...> - 2006-11-01 16:08:59
|
Hi Burak, Are you using trousers 0.2.8? It looks like we haven't done an opencryptoki release since that release of trousers, which may be breaking things here. The compatibility code is in opencryptoki CVS, please try that out and see if it fixes this problem (if you're on trousers 0.2.8). Kent On 11/1/06, Burak O=D0UZ <bur...@ya...> wrote: > > I have problems using cryptoki using with TPM. My TPM is working fine I a= m > sure about it. > I have applied the method mentioned in trousers faq. SRK is NULL. > > [root@dungeon opencryptoki]# tpmtoken_init > A new TPM security officer password is needed. The password must be betwe= en > 6 and 127 characters in length. > Enter new password: > Confirm password: > Segmentation fault > [root@dungeon opencryptoki]# tpmtoken_init > Warning: The TPM token has already been initialized. Reinitializing the T= PM > token will cause all TPM token data to be lost. > Clear the TPM token data? [y/N]: y > Enter the TPM security officer password: > C_InitToken failed: 0x000000a0 (160) > > I have entered SO PIN as 87654321. > > [root@dungeon opencryptoki]# pkcsconf -P -c 0 > Enter the SO PIN: ******** > Enter the new SO PIN: ******** > Re-enter the new SO PIN: ******** > Error setting PIN: 0x6 > > But Cryptoki has seen my TPM. > [root@dungeon opencryptoki]# pkcsconf -s -t > Token #0 Info: > Label: IBM PKCS#11 TPM Token > Manufacturer: IBM Corp. > Model: TPM v1.1 Token > Serial Number: 123 > Flags: 0x980445 > (RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|TOKEN_INITIALIZED|USER_PIN_TO_BE_CHANG= ED|SO_PIN_COUNT_LOW|SO_PIN_TO_BE_CHANGED) > Sessions: -1/-1 > R/W Sessions: -1/-1 > PIN Length: 6-127 > Public Memory: 0xFFFFFFFF/0xFFFFFFFF > Private Memory: 0xFFFFFFFF/0xFFFFFFFF > Hardware Version: 1.0 > Firmware Version: 1.0 > Time: 05:52:06 PM > Token #1 Info: > Label: IBM OS PKCS#11 > Manufacturer: IBM Corp. > Model: IBM SoftTok > Serial Number: 123 > Flags: 0x880045 > (RNG|LOGIN_REQUIRED|CLOCK_ON_TOKEN|USER_PIN_TO_BE_CHANGED|SO_PIN_TO_BE_CH= ANGED) > Sessions: -1/-1 > R/W Sessions: -1/-1 > PIN Length: 4-8 > Public Memory: 0xFFFFFFFF/0xFFFFFFFF > Private Memory: 0xFFFFFFFF/0xFFFFFFFF > Hardware Version: 1.0 > Firmware Version: 1.0 > Time: 05:52:06 PM > Slot #0 Info > Description: Linux 2.6.18 Linux (TPM) > Manufacturer: Linux 2.6.18 > Flags: 0x5 (TOKEN_PRESENT|HW_SLOT) > Hardware Version: 0.0 > Firmware Version: 1.1 > Slot #1 Info > Description: Linux 2.6.18 Linux (Soft) > Manufacturer: Linux 2.6.18 > Flags: 0x1 (TOKEN_PRESENT) > Hardware Version: 0.0 > Firmware Version: 1.1 > > Do you have any idea what is going on? What should I do? > > Thanx in advance. > -- burak() > (ps: bf) > METU CENG '06 > > > > ------------------------------------------------------------------------- > Using Tomcat but need to do more? Need to support web services, security? > Get stuff done quickly with pre-integrated technology to make your job > easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronim= o > http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D120709&bid=3D263057&dat= =3D121642 > > _______________________________________________ > opencryptoki-users mailing list > ope...@li... > https://lists.sourceforge.net/lists/listinfo/opencryptoki-users > > > --=20 Kent Yoder IBM LTC Security Dev. |