stpm-exfiltrate(1) | stpm-exfiltrate(1) |
stpm-exfiltrate - Extract key from TPM chip
stpm-exfiltrate [ -hOps ] -k key file
stpm-exfiltrate extracts a key that is otherwise protected by the TPM chip. This only works if the key is "migratable" (meaning it was generated in software), and the TPM owner password is known.
This is why you should generate keys in hardware (the default) with stpm-keygen and not use its -S option.
stpm-exfiltrate -k ~/.simple-tpm-pk11/my.key Enter owner password: blah blah [ ... key data here ...]
stpm-exfiltrate -p -k ~/.simple-tpm-pk11/my.key Enter owner password: blah blah Enter key PIN: my secret password here [ ... key data here ...]
stpm-exfiltrate -sp -k ~/.simple-tpm-pk11/my.key Enter owner password: blah blah Enter key PIN: my secret password here Enter SRK PIN: 12345678 [ ... key data here ...]
Most errors will probably be related to interacting with the TPM chip. Resetting the TPM chip and taking ownership should take care of most of them. See the TPM-TROUBLESHOOTING section of simple-tpm-pk11(7).
simple-tpm-pk11(7), stpm-sign(1), stpm-keygen.
Simple-TPM-PK11 was written By Thomas Habets <habets@google.com> / <thomas@habets.se>.
git clone https://github.com/ThomasHabets/simple-tpm-pk11.git
16th Febrary, 2014 | simple-tpm-pk11 |