On Mon, 2023-04-03 at 17:40 -0400, James Bottomley wrote: > This is the last component of encrypted tpm2 session handling that > allows us to verify from userspace that the key derived from the NULL > seed genuinely belongs to the TPM and has not been spoofed. How would you do this in practice with the help of this file? The current description does not make a case to have this file, unless it is supported by an usage example to do what you claim above. BR, Jarkko