On 08/09/2012 09:57 PM, Michael Gissing wrote: > You can use jTpmTools with jTSS[1] to view, decode, dump and play with a > TPM's NV memory. The nv_decode command is your friend.
I totally forgot about the read_ekcert command. $ jtt read_ekcert -o $OWNER_PW The extracted file is than a well formated x509 certificate. Michael ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel