The SRK is the parent of all keys used by the chip, so every user on
the box will have a need to load it
On Tue, Jun 10, 2008 at 1:56 PM, Steve Ensley <[EMAIL PROTECTED]> wrote:
> Yep. 0's didn't work, but null password did. Thanx.
>
> Can you help me understand why this would be an expected,
Yep. 0's didn't work, but null password did. Thanx.
Can you help me understand why this would be an expected, or even
acceptable behaviour? Or for that matter why the tools have the
'known password' options. Seems like setting the passwords to widely
known ones runs counter to the whole point
Hmm, ecryptfs_generate_tpm_key may rely on a known SRK password. Try
setting it to all zero's or a hash of zero bytes using tpm-tools and
try again...
Kent
On Tue, Jun 10, 2008 at 11:59 AM, Steve Ensley <[EMAIL PROTECTED]> wrote:
> trying to test tpm support on a new motherboard we are evaluatin