-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TPM 2.0 with Cr50 #626
Comments
there's nothing I can do about the fact that the CR50 is not a full TPM 2.0 implementation. I'm not sure if it's sufficient for what you're asking |
@MrChromebox tpm2-software/tpm2-tools#3434 Blocker for linuxboot/heads#1658 (comment) (TPM released Disk Unlock Key: sealing of secret in nvram fails) |
@tlaurion CR50 is not a fully TPM 2.0 compliant implementation, as per my comment above. I don't think there's anything missing from the firmware init, other TPM 2.0 chips are fine |
tpm2-software/tpm2-tools#3434 (comment) Two secrets are sealed with same policy, one succeeds (TPM totp with tpm2), where sealing TPM disk unlock key in seperate nvram region fails. Two logs provided at linuxboot/heads#1658 (comment) |
@tlaurion again I'm not sure what I can do from the firmware init side, or even what you're asking for. |
tpm2-software/tpm2-tools#3434 (comment) Feature missing from tpm2 implementation, so nothing you can do. |
It would be really convenient having automatic LUKS unlocking with TPM on Chromebooks, but it doesn't work rn. Are there plans for it to be implemented?
The text was updated successfully, but these errors were encountered: