Following this post, I am reposting the different question in different threads.
I have successfully created a massflash with generic password and with reencryption enabled with a per device unique key. However, I have created the massflash with an not fused board and a generic eks image. (The sym2_t234.key file and eks.image were generated by the example.sh script).
My question are :
Does the eks.img is related with the disk encryption ? And if yes, what is the role of the eks.img in the disk encryption ?
Is the EKB key the same than the eks.img file ?
To create the eks.img, we use partially the oem_k1 fuse to generate the eks.img. Then in a massflash scenario, we cannot use the oem_k1 fuse value per device.
>> Q1, Q2, Q4
yes, EKS is related with the disk encryption.
as you can see… there’re keys included in the EKS image.
it has two keys, one is the kernel encryption key (sym_t234.key), and another one is the LUKS key (sym2_t234.key) for disk encryption support.
for instance,
>> Q3
the real problem should be… you must enable generic passphrase for the massflash scenario. otherwise, you’ll have unique ECID to enable disk encryption per device.