aboutsummaryrefslogtreecommitdiffstats
path: root/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man
diff options
context:
space:
mode:
Diffstat (limited to 'roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man')
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.141
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.146
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.149
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.168
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.116
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.116
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.120
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.123
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.131
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.146
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1127
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.133
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.140
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1128
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1131
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.116
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.143
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.116
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.120
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.137
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.129
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.140
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.129
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.158
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.143
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.110
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.129
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.146
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.116
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.143
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.130
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.123
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.132
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.137
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.137
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.143
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.166
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.131
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.173
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.134
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.119
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.110
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.167
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.152
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1101
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.128
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.119
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.119
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.150
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.136
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.123
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.140
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.134
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.129
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.121
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.136
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.131
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.126
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.167
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.128
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.129
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.177
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.118
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.146
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.146
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.130
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.18
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.116
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.163
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.146
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.132
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.19
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.143
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.133
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.117
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.134
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.122
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.131
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.128
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.148
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.115
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.137
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.120
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.114
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.111
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.117
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.125
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.159
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.115
-rw-r--r--roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.147
119 files changed, 3883 insertions, 0 deletions
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.1
new file mode 100644
index 000000000..a9710fcc0
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.1
@@ -0,0 +1,41 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH ACTIVATECREDENTIAL "1" "March 2020" "activatecredential 1.3" "User Commands"
+.SH NAME
+activatecredential \- Runs TPM2 activatecredential
+.SH DESCRIPTION
+activatecredential
+.PP
+Runs TPM2_ActivateCredential
+.TP
+\fB\-ha\fR
+activation handle of object associated with the certificate
+.TP
+\fB\-hk\fR
+handle of loaded decryption key
+.TP
+\fB\-icred\fR
+input credential file name
+.TP
+\fB\-is\fR
+secret file name
+.TP
+[\-pwda
+password for activation key (default empty)]
+.TP
+[\-pwdk
+password for decryption key (default empty)]
+.TP
+[\-ocred
+output credential file name (default do not save)]
+.TP
+\fB\-se[0\-2]\fR
+session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.1
new file mode 100644
index 000000000..e3aa6ec97
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.1
@@ -0,0 +1,46 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CERTIFY "1" "March 2020" "certify 1.3" "User Commands"
+.SH NAME
+certify \- Runs TPM2 certify
+.SH DESCRIPTION
+certify
+.PP
+Runs TPM2_Certify
+.TP
+\fB\-ho\fR
+object handle
+.TP
+[\-pwdo
+password for object (default empty)]
+.TP
+\fB\-hk\fR
+certifying key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384 sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc, hmac) (default rsa)]
+.TP
+[\-qd
+qualifying data file name]
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.1
new file mode 100644
index 000000000..e267c1a05
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.1
@@ -0,0 +1,49 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CERTIFYCREATION "1" "March 2020" "certifycreation 1.3" "User Commands"
+.SH NAME
+certifycreation \- Runs TPM2 certifycreation
+.SH DESCRIPTION
+certifycreation
+.PP
+Runs TPM2_CertifyCreation
+.TP
+\fB\-ho\fR
+object handle
+.TP
+\fB\-hk\fR
+certifying key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc) (default rsa)]
+.TP
+[\-qd
+qualifying data file name]
+.TP
+\fB\-tk\fR
+input ticket file name
+.TP
+\fB\-ch\fR
+input creation hash file name
+.TP
+[\-os
+signature file name] (default do not save)
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.1
new file mode 100644
index 000000000..6ce3fbcea
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.1
@@ -0,0 +1,68 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CERTIFYX509 "1" "March 2020" "certifyx509 1.3" "User Commands"
+.SH NAME
+certifyx509 \- Runs TPM2 certifyx509
+.SH DESCRIPTION
+certifyx509
+.PP
+Runs TPM2_Certifyx509
+.TP
+\fB\-ho\fR
+object handle
+.TP
+[\-pwdo
+password for object (default empty)]
+.TP
+\fB\-hk\fR
+certifying key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384 sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc) (default rsa)]
+.TP
+[\-ku
+X509 key usage \- string \- comma separated, no spaces]
+.TP
+[\-iob
+TPMA_OBJECT \- 4 byte hex]
+e.g. sign: critical,digitalSignature,keyCertSign,cRLSign (default)
+e.g. decrypt: critical,dataEncipherment,keyAgreement,encipherOnly,decipherOnly
+e.g. fixedTPM: critical,nonRepudiation
+e.g. parent (restrict decrypt): critical,keyEncipherment
+.TP
+[\-bit
+bit in partialCertificate to toggle]
+.TP
+[\-sub
+subject same as issuer for self signed (root) certificate]
+.TP
+[\-opc
+partial certificate file name (default do not save)]
+.TP
+[\-oa
+addedToCertificate file name (default do not save)]
+.TP
+[\-otbs
+signed tbsDigest file name (default do not save)]
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-ocert
+reconstructed certificate file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.1
new file mode 100644
index 000000000..a106b3476
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.1
@@ -0,0 +1,16 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CHANGEEPS "1" "March 2020" "changeeps 1.3" "User Commands"
+.SH NAME
+changeeps \- Runs TPM2 changeeps
+.SH DESCRIPTION
+changeeps
+.PP
+Runs TPM2_ChangeEPS
+.TP
+\fB\-pwda\fR
+authorization password (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.1
new file mode 100644
index 000000000..c9d96b002
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.1
@@ -0,0 +1,16 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CHANGEPPS "1" "March 2020" "changepps 1.3" "User Commands"
+.SH NAME
+changepps \- Runs TPM2 changepps
+.SH DESCRIPTION
+changepps
+.PP
+Runs TPM2_ChangePPS
+.TP
+\fB\-pwda\fR
+authorization password (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.1
new file mode 100644
index 000000000..a3a8e14cb
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.1
@@ -0,0 +1,20 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CLEAR "1" "March 2020" "clear 1.3" "User Commands"
+.SH NAME
+clear \- Runs TPM2 clear
+.SH DESCRIPTION
+clear
+.PP
+Runs TPM2_Clear
+.TP
+\fB\-hi\fR
+authhandle hierarchy (l, p)
+l lockout, p platform
+.TP
+\fB\-pwda\fR
+authorization password (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.1
new file mode 100644
index 000000000..85971c3af
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.1
@@ -0,0 +1,23 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CLEARCONTROL "1" "March 2020" "clearcontrol 1.3" "User Commands"
+.SH NAME
+clearcontrol \- Runs TPM2 clearcontrol
+.SH DESCRIPTION
+clearcontrol
+.PP
+Runs TPM2_ClearControl
+.TP
+\fB\-hi\fR
+authhandle hierarchy (l, p)
+l lockout, p platform
+.TP
+\fB\-pwda\fR
+authorization password (default empty)
+.TP
+\fB\-state\fR
+0 to disable, 1 to enable (default enable)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.1
new file mode 100644
index 000000000..fe8402b09
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CLOCKRATEADJUST "1" "December 2019" "clockrateadjust 1546" "User Commands"
+.SH NAME
+clockrateadjust \- Runs TPM2 clockrateadjust
+.SH DESCRIPTION
+clockrateadjust
+.PP
+Runs TPM2_ClockRateAdjust
+.TP
+[\-hi
+hierarchy auth (p, o) (default p)]
+.TP
+[\-pwdp
+hierarchy password (default empty)]
+.TP
+[\-adj
+rate adjust (default 0)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.1
new file mode 100644
index 000000000..7c0c7d16e
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.1
@@ -0,0 +1,31 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CLOCKSET "1" "March 2020" "clockset 1.3" "User Commands"
+.SH NAME
+clockset \- Runs TPM2 clockset
+.SH DESCRIPTION
+clockset
+.PP
+Runs TPM2_ClockSet
+.TP
+\fB\-clock\fR
+new clock
+.TP
+\fB\-iclock\fR
+new clock file name
+.TP
+[\-addsec
+seconds to add to new clock]
+.TP
+\fB\-hi\fR
+hierarchy (o, p) (default platform)
+.IP
+o owner, p platform
+.TP
+\fB\-pwdp\fR
+password for hierarchy (default empty)
+.TP
+\fB\-se[0\-2]\fR
+session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.1
new file mode 100644
index 000000000..5b3b23343
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.1
@@ -0,0 +1,46 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH COMMIT "1" "March 2020" "commit 1.3" "User Commands"
+.SH NAME
+commit \- Runs TPM2 commit
+.SH DESCRIPTION
+commit
+.PP
+Runs TPM2_Commit
+.TP
+\fB\-hk\fR
+key handle
+.TP
+[\-pt
+point input file name (default empty)]
+.TP
+[\-s2
+s2 input file name (default empty)]
+.TP
+[\-y2
+y2 input file name (default empty)]
+.TP
+[\-Kf
+K output data file name (default do not save)]
+.TP
+[\-Lf
+output data file name (default do not save)]
+.TP
+[\-Ef
+output data file name (default do not save)]
+.TP
+[\-cf
+output counter file name (default do not save)]
+.TP
+[\-pwdk
+password for key (default empty)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.1
new file mode 100644
index 000000000..6fb9866ac
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CONTEXTLOAD "1" "March 2020" "contextload 1.3" "User Commands"
+.SH NAME
+contextload \- Runs TPM2 contextload
+.SH DESCRIPTION
+contextload
+.PP
+Runs TPM2_ContextLoad
+.TP
+\fB\-if\fR
+context file name
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.1
new file mode 100644
index 000000000..2f3c6d3da
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CONTEXTSAVE "1" "March 2020" "contextsave 1.3" "User Commands"
+.SH NAME
+contextsave \- Runs TPM2 contextsave
+.SH DESCRIPTION
+contextsave
+.PP
+Runs TPM2_ContextSave
+.TP
+\fB\-ha\fR
+handle
+.TP
+[\-of
+context file name (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1
new file mode 100644
index 000000000..ba53e19b6
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1
@@ -0,0 +1,127 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CREATE "1" "March 2020" "create 1.3" "User Commands"
+.SH NAME
+create \- Runs TPM2 create
+.SH DESCRIPTION
+create
+.PP
+Runs TPM2_Create
+.HP
+\fB\-hp\fR parent handle
+.IP
+[Asymmetric Key Algorithm]
+.HP
+\fB\-rsa\fR keybits (default)
+.IP
+(2048 default)
+.HP
+\fB\-ecc\fR curve
+.IP
+bnp256
+nistp256
+nistp384
+.IP
+Key attributes
+.TP
+\fB\-bl\fR
+data blob for unseal (create only)
+requires \fB\-if\fR
+.TP
+\fB\-den\fR
+decryption, (unrestricted, RSA and EC NULL scheme)
+.TP
+\fB\-deo\fR
+decryption, (unrestricted, RSA OAEP, EC NULL scheme)
+.TP
+\fB\-dee\fR
+decryption, (unrestricted, RSA ES, EC NULL scheme)
+.TP
+\fB\-des\fR
+encryption/decryption, AES symmetric
+[\-116 for TPM rev 116 compatibility]
+.TP
+\fB\-st\fR
+storage (restricted)
+[default for primary keys]
+.TP
+\fB\-si\fR
+unrestricted signing (RSA and EC NULL scheme)
+.TP
+\fB\-sir\fR
+restricted signing (RSA RSASSA, EC ECDSA scheme)
+.TP
+\fB\-dau\fR
+unrestricted ECDAA signing key pair
+.TP
+\fB\-dar\fR
+restricted ECDAA signing key pair
+.TP
+\fB\-kh\fR
+keyed hash (unrestricted, hmac)
+.TP
+\fB\-khr\fR
+keyed hash (restricted, hmac)
+.TP
+\fB\-dp\fR
+derivation parent
+.TP
+\fB\-gp\fR
+general purpose, not storage
+.TP
+[\-kt
+(can be specified more than once)]
+f fixedTPM (default for primary keys and derivation parents)
+p fixedParent (default for primary keys and derivation parents)
+nf no fixedTPM (default for non\-primary keys)
+np no fixedParent (default for non\-primary keys)
+ed encrypted duplication (default not set)
+.TP
+[\-da
+object subject to DA protection (default no)]
+.TP
+[\-pol
+policy file (default empty)]
+.TP
+[\-uwa
+userWithAuth attribute clear (default set)]
+.TP
+[\-if
+data (inSensitive) file name]
+.TP
+[\-nalg
+name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-halg
+scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-pwdp
+password for parent key (default empty)]
+.TP
+[\-opu
+public key file name (default do not save)]
+.TP
+[\-opr
+private key file name (default do not save)]
+.TP
+[\-opem
+public key PEM format file name (default do not save)]
+.TP
+[\-tk
+output ticket file name (default do not save)]
+.TP
+[\-ch
+output creation hash file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.1
new file mode 100644
index 000000000..cd5e2a670
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.1
@@ -0,0 +1,33 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CREATEEK "1" "March 2020" "createek 1.3" "User Commands"
+.SH NAME
+createek \- Runs TPM2 createek
+.SH DESCRIPTION
+createek
+.PP
+Parses and prints the various EK NV indexes specified by the IWG
+Creates a primary key based on the EK NV indexes
+.TP
+\fB\-te\fR
+print EK Template
+.TP
+\fB\-no\fR
+print EK nonce
+.TP
+\fB\-ce\fR
+print EK certificate
+.TP
+\fB\-cp\fR
+CreatePrimary using the EK template and EK nonce.
+Validate the EK against the EK certificate
+.TP
+[\-noflush
+Do not flush the primary key after validation]
+.TP
+[\-root
+filename \- validate EK certificate against the root]
+filename contains a list of PEM format CA root certificate
+filenames, one per line.
+The list may contain up to 100 certificates.
+.HP
+\fB\-alg\fR (rsa or ecc)
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.1
new file mode 100644
index 000000000..9901a3fa4
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.1
@@ -0,0 +1,40 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CREATEEKCERT "1" "March 2020" "createekcert 1.3" "User Commands"
+.SH NAME
+createekcert \- Runs TPM2 createekcert
+.SH SYNOPSIS
+.B createekcert
+\fI\,-alg rsa -cakey cakey.pem -capwd rrrr -v\/\fR
+.br
+.B createekcert
+\fI\,-alg ecc -cakey cakeyecc.pem -capwd rrrr -caalg ec -v\/\fR
+.SH DESCRIPTION
+createekcert
+.PP
+Provisions an EK certificate, using the default IWG template
+E.g.,
+.TP
+[\-pwdp
+platform hierarchy password (default empty)]
+.TP
+\fB\-cakey\fR
+CA PEM key file name
+.TP
+[\-capwd
+CA PEM key password (default empty)]
+.TP
+[\-caalg
+CA key algorithm (rsa or ec) (default rsa)]
+.TP
+[\-alg
+(rsa or ecc certificate) (default rsa)]
+.TP
+[\-noflush
+do not flush the primary key]
+.TP
+[\-of
+DER certificate output file name]
+.PP
+Currently:
+.IP
+Certificate issuer, subject, and validity are hard coded.
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1
new file mode 100644
index 000000000..0e6d45101
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1
@@ -0,0 +1,128 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CREATELOADED "1" "March 2020" "createloaded 1.3" "User Commands"
+.SH NAME
+createloaded \- Runs TPM2 createloaded
+.SH DESCRIPTION
+createloaded
+.PP
+Runs TPM2_CreateLoaded
+.HP
+\fB\-hp\fR parent handle (can be hierarchy)
+.IP
+40000001 Owner
+4000000c Platform
+4000000b Endorsement
+.IP
+[Asymmetric Key Algorithm]
+.HP
+\fB\-rsa\fR keybits (default)
+.IP
+(2048 default)
+.HP
+\fB\-ecc\fR curve
+.IP
+bnp256
+nistp256
+nistp384
+.IP
+Key attributes
+.TP
+\fB\-bl\fR
+data blob for unseal (create only)
+requires \fB\-if\fR
+.TP
+\fB\-den\fR
+decryption, (unrestricted, RSA and EC NULL scheme)
+.TP
+\fB\-deo\fR
+decryption, (unrestricted, RSA OAEP, EC NULL scheme)
+.TP
+\fB\-dee\fR
+decryption, (unrestricted, RSA ES, EC NULL scheme)
+.TP
+\fB\-des\fR
+encryption/decryption, AES symmetric
+[\-116 for TPM rev 116 compatibility]
+.TP
+\fB\-st\fR
+storage (restricted)
+[default for primary keys]
+.TP
+\fB\-si\fR
+unrestricted signing (RSA and EC NULL scheme)
+.TP
+\fB\-sir\fR
+restricted signing (RSA RSASSA, EC ECDSA scheme)
+.TP
+\fB\-dau\fR
+unrestricted ECDAA signing key pair
+.TP
+\fB\-dar\fR
+restricted ECDAA signing key pair
+.TP
+\fB\-kh\fR
+keyed hash (unrestricted, hmac)
+.TP
+\fB\-khr\fR
+keyed hash (restricted, hmac)
+.TP
+\fB\-dp\fR
+derivation parent
+.TP
+\fB\-gp\fR
+general purpose, not storage
+.TP
+[\-kt
+(can be specified more than once)]
+f fixedTPM (default for primary keys and derivation parents)
+p fixedParent (default for primary keys and derivation parents)
+nf no fixedTPM (default for non\-primary keys)
+np no fixedParent (default for non\-primary keys)
+ed encrypted duplication (default not set)
+.TP
+[\-da
+object subject to DA protection (default no)]
+.TP
+[\-pol
+policy file (default empty)]
+.TP
+[\-uwa
+userWithAuth attribute clear (default set)]
+.TP
+[\-if
+data (inSensitive) file name]
+.TP
+[\-nalg
+name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-halg
+scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-der
+object's parent is a derivation parent]
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-pwdp
+password for parent key (default empty)]
+.TP
+[\-opu
+public key file name (default do not save)]
+.TP
+[\-opr
+private key file name (default do not save)]
+.TP
+[\-opem
+public key PEM format file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1
new file mode 100644
index 000000000..7aa86c796
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1
@@ -0,0 +1,131 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH CREATEPRIMARY "1" "March 2020" "createprimary 1.3" "User Commands"
+.SH NAME
+createprimary \- Runs TPM2 createprimary
+.SH DESCRIPTION
+createprimary creates a primary storage key
+.PP
+Runs TPM2_CreatePrimary
+.TP
+[\-hi
+hierarchy (e, o, p, n) (default null)]
+.TP
+[\-pwdp
+password for hierarchy (default empty)]
+.TP
+[\-pwdpi
+password file name for hierarchy (default empty)]
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-iu
+inPublic unique field file (default none)]
+.TP
+[\-opu
+public key file name (default do not save)]
+.TP
+[\-opem
+public key PEM format file name (default do not save)]
+.TP
+[\-tk
+output ticket file name]
+.TP
+[\-ch
+output creation hash file name]
+.IP
+[Asymmetric Key Algorithm]
+.HP
+\fB\-rsa\fR keybits (default)
+.IP
+(2048 default)
+.HP
+\fB\-ecc\fR curve
+.IP
+bnp256
+nistp256
+nistp384
+.IP
+Key attributes
+.TP
+\fB\-bl\fR
+data blob for unseal (create only)
+requires \fB\-if\fR
+.TP
+\fB\-den\fR
+decryption, (unrestricted, RSA and EC NULL scheme)
+.TP
+\fB\-deo\fR
+decryption, (unrestricted, RSA OAEP, EC NULL scheme)
+.TP
+\fB\-dee\fR
+decryption, (unrestricted, RSA ES, EC NULL scheme)
+.TP
+\fB\-des\fR
+encryption/decryption, AES symmetric
+[\-116 for TPM rev 116 compatibility]
+.TP
+\fB\-st\fR
+storage (restricted)
+[default for primary keys]
+.TP
+\fB\-si\fR
+unrestricted signing (RSA and EC NULL scheme)
+.TP
+\fB\-sir\fR
+restricted signing (RSA RSASSA, EC ECDSA scheme)
+.TP
+\fB\-dau\fR
+unrestricted ECDAA signing key pair
+.TP
+\fB\-dar\fR
+restricted ECDAA signing key pair
+.TP
+\fB\-kh\fR
+keyed hash (unrestricted, hmac)
+.TP
+\fB\-khr\fR
+keyed hash (restricted, hmac)
+.TP
+\fB\-dp\fR
+derivation parent
+.TP
+\fB\-gp\fR
+general purpose, not storage
+.TP
+[\-kt
+(can be specified more than once)]
+f fixedTPM (default for primary keys and derivation parents)
+p fixedParent (default for primary keys and derivation parents)
+nf no fixedTPM (default for non\-primary keys)
+np no fixedParent (default for non\-primary keys)
+ed encrypted duplication (default not set)
+.TP
+[\-da
+object subject to DA protection (default no)]
+.TP
+[\-pol
+policy file (default empty)]
+.TP
+[\-uwa
+userWithAuth attribute clear (default set)]
+.TP
+[\-if
+data (inSensitive) file name]
+.TP
+[\-nalg
+name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-halg
+scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.1
new file mode 100644
index 000000000..0f5ef0581
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.1
@@ -0,0 +1,16 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH DICTIONARYATTACKLOCKRESET "1" "March 2020" "dictionaryattacklockreset 1.3" "User Commands"
+.SH NAME
+dictionaryattacklockreset \- Runs TPM2 dictionaryattacklockreset
+.SH DESCRIPTION
+dictionaryattacklockreset
+.PP
+Runs TPM2_DictionaryAttackLockReset
+.TP
+[\-pwd
+lockout auth password (default empty)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.1
new file mode 100644
index 000000000..8b7d5a6e8
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH DICTIONARYATTACKPARAMETERS "1" "March 2020" "dictionaryattackparameters 1.3" "User Commands"
+.SH NAME
+dictionaryattackparameters \- Runs TPM2 dictionaryattackparameters
+.SH DESCRIPTION
+dictionaryattackparameters
+.PP
+Runs TPM2_DictionaryAttackParameters
+.TP
+[\-pwd
+lockout auth password (default empty)]
+.TP
+[\-nmt
+new max tries (default 1 try)]
+.TP
+[\-nrt
+new recovery time (default 10 seconds)]
+.TP
+[\-lr
+lockout recovery (default 1 second)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.1
new file mode 100644
index 000000000..c6b63bdcc
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.1
@@ -0,0 +1,43 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH DUPLICATE "1" "March 2020" "duplicate 1.3" "User Commands"
+.SH NAME
+duplicate \- Runs TPM2 duplicate
+.SH DESCRIPTION
+duplicate
+.PP
+Runs TPM2_Duplicate
+.TP
+\fB\-ho\fR
+object handle
+.TP
+[\-pwdo
+password for object (default empty)]
+.TP
+[\-hp
+new parent handle (default TPM_RH_NULL)]
+.TP
+[\-ik
+encryption key in file name]
+.TP
+[\-salg
+symmetric algorithm (aes)(default none)]
+.TP
+[\-oek
+encryption key out file name (default do not save)]
+.TP
+[\-od
+duplicate private area file name (default do not save)]
+.TP
+[\-oss
+symmetric seed file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.1
new file mode 100644
index 000000000..00570e5fc
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.1
@@ -0,0 +1,16 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH ECCPARAMETERS "1" "March 2020" "eccparameters 1.3" "User Commands"
+.SH NAME
+eccparameters \- Runs TPM2 eccparameters
+.SH DESCRIPTION
+eccparameters
+.PP
+Runs TPM2_ECC_Parameters
+.TP
+\fB\-cv\fR
+curve ID
+bnp256
+nistp256
+nistp384
+.IP
+[\-of data file, ECC parameters (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.1
new file mode 100644
index 000000000..d25de4d09
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.1
@@ -0,0 +1,20 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH ECEPHEMERAL "1" "March 2020" "ecephemeral 1.3" "User Commands"
+.SH NAME
+ecephemeral \- Runs TPM2 ecephemeral
+.SH DESCRIPTION
+ecephmeral
+.PP
+Runs TPM2_EC_Ephemeral
+.TP
+\fB\-ecc\fR
+curve
+bnp256
+nistp256
+nistp384
+.TP
+[\-oq
+output Q ephemeral public key file name (default do not save)]
+.TP
+[\-cf
+output counter file name (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.1
new file mode 100644
index 000000000..413f86ceb
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.1
@@ -0,0 +1,37 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH ENCRYPTDECRYPT "1" "March 2020" "encryptdecrypt 1.3" "User Commands"
+.SH NAME
+encryptdecrypt \- Runs TPM2 encryptdecrypt
+.SH DESCRIPTION
+encryptdecrypt
+.PP
+Runs TPM2_EncryptDecrypt
+.TP
+\fB\-hk\fR
+key handle
+.TP
+\fB\-pwdk\fR
+password for key (default empty)
+.TP
+\fB\-d\fR
+decrypt (default encrypt)
+.TP
+\fB\-if\fR
+input file name
+.TP
+[\-of
+output file name (default do not save)]
+.TP
+[\-2
+use TPM2_EncryptDecrypt2]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.1
new file mode 100644
index 000000000..2ff2b42db
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.1
@@ -0,0 +1,29 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH EVENTEXTEND "1" "March 2020" "eventextend 1.3" "User Commands"
+.SH NAME
+eventextend \- Runs TPM2 eventextend
+.SH SYNOPSIS
+.B eventextend
+\fI\,-if <measurement file> \/\fR[\fI\,-v\/\fR]
+.SH DESCRIPTION
+Extends a measurement file (binary) into a TPM or simulated PCRs
+.TP
+\fB\-if\fR
+file containing the data to be extended
+.TP
+[\-nospec
+file does not contain spec ID header (useful for incremental test)]
+.TP
+[\-tpm
+extend TPM PCRs]
+.TP
+[\-sim
+calculate simulated PCRs and boot aggregate]
+.TP
+[\-pcrmax
+with \fB\-sim\fR, sets the highest PCR number to be used to calculate the
+.IP
+boot aggregate (default 7)]
+.TP
+[\-ns
+no space, no text, no newlines]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.1
new file mode 100644
index 000000000..9e1c6be2b
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.1
@@ -0,0 +1,40 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH EVENTSEQUENCECOMPLETE "1" "March 2020" "eventsequencecomplete 1.3" "User Commands"
+.SH NAME
+eventsequencecomplete \- Runs TPM2 eventsequencecomplete
+.SH DESCRIPTION
+eventsequencecomplete
+.PP
+Runs TPM2_EventSequenceComplete
+.TP
+[\-ha
+pcr handle (default NULL)]
+.TP
+\fB\-hs\fR
+sequence handle
+.TP
+[\-pwds
+password for sequence (default empty)]
+.TP
+[\-if
+input file to be added (default no data)]
+.TP
+[\-of1
+sha1 output digest file (default do not save)]
+.TP
+[\-of2
+sha256 output digest file (default do not save)]
+.TP
+[\-of3
+sha384 output digest file (default do not save)]
+.TP
+[\-of5
+sha512 output digest file (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.1
new file mode 100644
index 000000000..3e974b1be
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.1
@@ -0,0 +1,29 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH EVICTCONTROL "1" "March 2020" "evictcontrol 1.3" "User Commands"
+.SH NAME
+evictcontrol \- Runs TPM2 evictcontrol
+.SH DESCRIPTION
+evictcontrol
+.PP
+Runs TPM2_EvictControl
+.TP
+\fB\-hi\fR
+authhandle hierarchy (o, p)
+o owner, p platform
+.TP
+\fB\-ho\fR
+object handle
+if transient: make persistent, if persistent: flush
+.TP
+\fB\-hp\fR
+persistent handle
+owner 81000000 to 817FFFFF
+platform 81800000 to 81FFFFFF
+.TP
+\fB\-pwda\fR
+authorization password (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.1
new file mode 100644
index 000000000..76bcba67a
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH FLUSHCONTEXT "1" "March 2020" "flushcontext 1.3" "User Commands"
+.SH NAME
+flushcontext \- Runs TPM2 flushcontext
+.SH DESCRIPTION
+flushcontext
+.PP
+Runs TPM2_FlushContext
+.TP
+\fB\-ha\fR
+handle
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.1
new file mode 100644
index 000000000..d4f8e9751
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.1
@@ -0,0 +1,58 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETCAPABILITY "1" "March 2020" "getcapability 1.3" "User Commands"
+.SH NAME
+getcapability \- Runs TPM2 getcapability
+.SH DESCRIPTION
+getcapability
+.PP
+Runs TPM2_GetCapability
+.TP
+\fB\-cap\fR
+capability
+.TP
+\fB\-pr\fR
+property (defaults to 0)
+.TP
+\fB\-pc\fR
+propertyCount (defaults to 64)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+80
+command audit
+.TP
+\fB\-cap\fR
+values
+.TP
+TPM_CAP_ALGS
+0
+.TP
+TPM_CAP_HANDLES
+1
+.TP
+TPM_CAP_COMMANDS
+2
+.TP
+TPM_CAP_PP_COMMANDS
+3
+.TP
+TPM_CAP_AUDIT_COMMANDS
+4
+.TP
+TPM_CAP_PCRS
+5
+.TP
+TPM_CAP_TPM_PROPERTIES
+6
+.TP
+TPM_CAP_PCR_PROPERTIES
+7
+.TP
+TPM_CAP_ECC_CURVES
+8
+.TP
+TPM_CAP_AUTH_POLICIES
+9
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.1
new file mode 100644
index 000000000..82770116a
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.1
@@ -0,0 +1,43 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETCOMMANDAUDITDIGEST "1" "March 2020" "getcommandauditdigest 1.3" "User Commands"
+.SH NAME
+getcommandauditdigest \- Runs TPM2 getcommandauditdigest
+.SH DESCRIPTION
+getcommandauditdigest
+.PP
+Runs TPM2_GetCommandAuditDigest
+.TP
+[\-pwde
+endorsement hierarchy password (default empty)]
+.TP
+\fB\-hk\fR
+signing key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc, hmac) (default rsa)]
+.TP
+[\-qd
+qualifying data file name]
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.1
new file mode 100644
index 000000000..e02e98c49
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.1
@@ -0,0 +1,10 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETCRYPTOLIBRARY "1" "March 2020" "getcryptolibrary 1.3" "User Commands"
+.SH NAME
+getcryptolibrary \- Runs TPM2 getcryptolibrary
+.SH DESCRIPTION
+getcryptolibrary
+.PP
+Returns a string indicating the crypto library compiled in.
+.PP
+This is used within test scripts.
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.1
new file mode 100644
index 000000000..9118144b5
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.1
@@ -0,0 +1,29 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETRANDOM "1" "March 2020" "getrandom 1.3" "User Commands"
+.SH NAME
+getrandom \- Runs TPM2 getrandom
+.SH DESCRIPTION
+getrandom
+.PP
+Runs TPM2_GetRandom
+.TP
+\fB\-by\fR
+bytes requested
+.TP
+[\-of
+output file, with \fB\-nz\fR, appends nul terminator (default do not save)]
+.TP
+[\-nz
+get random number with no zero bytes (for authorization value)]
+.TP
+[\-ns
+no space, no text, no newlines]
+just a string of hexascii suitable for a symmetric key
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.1
new file mode 100644
index 000000000..80ad6fcd9
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.1
@@ -0,0 +1,46 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETSESSIONAUDITDIGEST "1" "March 2020" "getsessionauditdigest 1.3" "User Commands"
+.SH NAME
+getsessionauditdigest \- Runs TPM2 getsessionauditdigest
+.SH DESCRIPTION
+getsessionauditdigest
+.PP
+Runs TPM2_GetSessionAuditDigest
+.TP
+[\-pwde
+endorsement hierarchy password (default empty)]
+.TP
+[\-hk
+signing key handle]
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+\fB\-hs\fR
+audit session handle
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-qd
+qualifying data file name]
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.TP
+[\-od
+session digest file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.1
new file mode 100644
index 000000000..324fd58e0
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.1
@@ -0,0 +1,16 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETTESTRESULT "1" "March 2020" "gettestresult 1.3" "User Commands"
+.SH NAME
+gettestresult \- Runs TPM2 gettestresult
+.SH DESCRIPTION
+gettestresult
+.PP
+Runs TPM2_GetTestResult
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.1
new file mode 100644
index 000000000..c35250c23
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.1
@@ -0,0 +1,43 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH GETTIME "1" "March 2020" "gettime 1.3" "User Commands"
+.SH NAME
+gettime \- Runs TPM2 gettime
+.SH DESCRIPTION
+gettime
+.PP
+Runs TPM2_GetTime
+.TP
+\fB\-hk\fR
+signing key handle
+.TP
+[\-pwdk
+password for signing key (default empty)]
+.TP
+[\-pwde
+password for endorsement hierarchy (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc, hmac) (default rsa)]
+.TP
+[\-qd
+qualifying data file name]
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.1
new file mode 100644
index 000000000..8d4ba02b2
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.1
@@ -0,0 +1,30 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH HASH "1" "March 2020" "hash 1.3" "User Commands"
+.SH NAME
+hash \- Runs TPM2 hash
+.SH DESCRIPTION
+hash
+.PP
+Runs TPM2_Hash
+.TP
+[\-hi
+hierarchy (e, o, p, n) (default null)]
+e endorsement, o owner, p platform, n null
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+\fB\-if\fR
+input file to be hashed
+.TP
+\fB\-ic\fR
+data string to be hashed
+.TP
+[\-ns
+no space, no text, no newlines]
+.TP
+[\-oh
+hash file name (default do not save)]
+.TP
+[\-tk
+ticket file name (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.1
new file mode 100644
index 000000000..a662389e3
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.1
@@ -0,0 +1,23 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH HASHSEQUENCESTART "1" "March 2020" "hashsequencestart 1.3" "User Commands"
+.SH NAME
+hashsequencestart \- Runs TPM2 hashsequencestart
+.SH DESCRIPTION
+hashsequencestart
+.PP
+Runs TPM2_HashSequenceStart
+.TP
+[\-pwda
+password for sequence (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512, null) (default sha256)]
+null is an event sequence
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.1
new file mode 100644
index 000000000..2ea40c211
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.1
@@ -0,0 +1,32 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH HIERARCHYCHANGEAUTH "1" "March 2020" "hierarchychangeauth 1.3" "User Commands"
+.SH NAME
+hierarchychangeauth \- Runs TPM2 hierarchychangeauth
+.SH DESCRIPTION
+hierarchychangeauth
+.PP
+Runs TPM2_HierarchyChangeAuth
+.TP
+\fB\-hi\fR
+hierarchy (l, e, o, p)
+l lockout, e endorsement, o owner, p platform
+.TP
+\fB\-pwdn\fR
+new authorization password (default empty)
+.TP
+\fB\-pwdni\fR
+new authorization password file name (default empty)
+.TP
+\fB\-pwda\fR
+authorization password (default empty)
+.TP
+\fB\-pwdai\fR
+authorization password file name (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.1
new file mode 100644
index 000000000..562bc0941
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH HIERARCHYCONTROL "1" "March 2020" "hierarchycontrol 1.3" "User Commands"
+.SH NAME
+hierarchycontrol \- Runs TPM2 hierarchycontrol
+.SH DESCRIPTION
+hierarchycontrol
+.PP
+Runs TPM2_HierarchyControl
+.TP
+\fB\-hi\fR
+authhandle hierarchy (e, o, p)
+.TP
+\fB\-he\fR
+enable hierarchy (e, o, p, n)
+e endorsement, o owner, p platform, n null
+.TP
+[\-pwda
+authorization password (default empty)]
+.IP
+[\-state (0 to disable, 1 to enable) (default enable)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.1
new file mode 100644
index 000000000..eecff00a4
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.1
@@ -0,0 +1,37 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH HMAC "1" "March 2020" "hmac 1.3" "User Commands"
+.SH NAME
+hmac \- Runs TPM2 hmac
+.SH DESCRIPTION
+hmac
+.PP
+Runs TPM2_HMAC
+.TP
+\fB\-hk\fR
+key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+\fB\-if\fR
+input file to be HMACed
+.TP
+\fB\-ic\fR
+data string to be HMACed
+.TP
+[\-os
+hmac file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.1
new file mode 100644
index 000000000..17be09a4c
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH HMACSTART "1" "March 2020" "hmacstart 1.3" "User Commands"
+.SH NAME
+hmacstart \- Runs TPM2 hmacstart
+.SH DESCRIPTION
+hmacstart
+.PP
+Runs TPM2_Hmac_Start
+.TP
+\fB\-hk\fR
+key handle
+.TP
+\fB\-pwdk\fR
+password for key (default empty)
+.TP
+\fB\-pwda\fR
+password for sequence (default empty)
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.1
new file mode 100644
index 000000000..fde17c3c7
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.1
@@ -0,0 +1,37 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH IMAEXTEND "1" "March 2020" "imaextend 1.3" "User Commands"
+.SH NAME
+imaextend \- Runs TPM2 imaextend
+.SH DESCRIPTION
+imaextend
+.PP
+Runs TPM2_PCR_Extend to Extend a SHA\-1 IMA measurement file (binary) into TPM PCRs
+The IMA measurement is directly extended into the SHA\-1 bank, and a zero padded
+measurement is extended into the SHA\-256 bank
+.PP
+This handles the case where a zero measurement extends ones into the IMA PCR
+.PP
+If \fB\-sim\fR is specified, TPM PCRs are not extended. Rather, imaextend extends into
+simluated PCRs and traces the result.
+.TP
+\fB\-if\fR
+IMA event log file name
+.TP
+[\-le
+input file is little endian (default big endian)]
+.TP
+[\-sim
+calculate simulated PCRs]
+.TP
+[\-b
+beginning entry (default 0, beginning of log)]
+A beginning entry after the end of the log becomes a noop
+.TP
+[\-e
+ending entry (default end of log)]
+E.g., \fB\-b\fR 0 \fB\-e\fR 0 sends one entry
+.TP
+[\-l
+time \- run in a continuous loop, with a sleep of 'time' seconds betwteen loops]
+The intent is that this be run without specifying \fB\-b\fR and \fB\-e\fR
+Afer each pass, the next beginning entry is set to the last entry +1
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.1
new file mode 100644
index 000000000..212667392
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.1
@@ -0,0 +1,43 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH IMPORT "1" "March 2020" "import 1.3" "User Commands"
+.SH NAME
+import \- Runs TPM2 import
+.SH DESCRIPTION
+import
+.PP
+Runs TPM2_Import
+.TP
+\fB\-hp\fR
+parent handle
+.TP
+[\-pwdp
+password for parent (default empty)]
+.TP
+[\-ik
+encryption key in file name]
+.TP
+\fB\-ipu\fR
+object public area file name
+.TP
+\fB\-id\fR
+duplicate file name
+.TP
+\fB\-iss\fR
+symmetric seed file name
+.TP
+[\-salg
+symmetric algorithm (default none)]
+.TP
+\fB\-opr\fR
+private area file name
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.1
new file mode 100644
index 000000000..d0195a9fc
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.1
@@ -0,0 +1,66 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH IMPORTPEM "1" "March 2020" "importpem 1.3" "User Commands"
+.SH NAME
+importpem \- Runs TPM2 importpem
+.SH DESCRIPTION
+importpem
+.PP
+Runs TPM2_Import for a PEM key
+.TP
+\fB\-hp\fR
+parent handle
+.TP
+[\-pwdp
+password for parent (default empty)]
+.TP
+\fB\-ipem\fR
+PEM format key pair
+.IP
+[Asymmetric Key Algorithm]
+.TP
+[\-rsa
+(default)]
+.TP
+[\-ecc
+]
+.TP
+[\-si
+signing (default)]
+.TP
+[\-scheme
+signing scheme (rsassa rsapss) (RSA default RSASSA) (ECC ECDSA)]
+.TP
+[\-st
+storage (NULL scheme)]
+.TP
+[\-den
+decryption, (unrestricted, RSA and ECC NULL scheme)
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+\fB\-opu\fR
+public area file name
+.TP
+\fB\-opr\fR
+private area file name
+.TP
+[\-nalg
+name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-halg
+scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-pol
+policy file (default empty)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.1
new file mode 100644
index 000000000..fb5165e1c
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.1
@@ -0,0 +1,31 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH LOAD "1" "March 2020" "load 1.3" "User Commands"
+.SH NAME
+load \- Runs TPM2 load
+.SH DESCRIPTION
+load
+.PP
+Runs TPM2_Load
+.TP
+\fB\-hp\fR
+parent handle
+.TP
+[\-pwdp
+password for parent key (default empty)]
+.TP
+\fB\-ipu\fR
+public key file name
+.TP
+\fB\-ipr\fR
+private key file name
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.1
new file mode 100644
index 000000000..5fa80d723
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.1
@@ -0,0 +1,73 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH LOADEXTERNAL "1" "December 2019" "loadexternal 1546" "User Commands"
+.SH NAME
+loadexternal \- Runs TPM2 loadexternal
+.SH DESCRIPTION
+loadexternal
+.PP
+Runs TPM2_LoadExternal
+.TP
+[\-hi
+hierarchy (e, o, p, n) (default NULL)]
+.TP
+[\-nalg
+name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-halg
+scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.IP
+[Asymmetric Key Algorithm]
+.TP
+[\-rsa
+(default)]
+.TP
+[\-ecc
+]
+.TP
+\fB\-ipu\fR
+TPM2B_PUBLIC public key file name
+.TP
+\fB\-ipem\fR
+PEM format public key file name
+.TP
+\fB\-ider\fR
+DER format plaintext key pair file name
+.TP
+[\-pwdk
+password for DER key (default empty)]
+.TP
+[\-uwa
+userWithAuth attribute clear (default set)]
+.TP
+[\-si
+signing (default) RSA]
+.TP
+[\-scheme
+for signing key (default RSASSA scheme)]
+.IP
+rsassa
+rsapss
+.TP
+[\-st
+storage (default NULL scheme)]
+.TP
+[\-den
+decryption, (unrestricted, RSA and EC NULL scheme)
+.TP
+[\-ns
+additionally print Name in hex ascii on one line]
+Useful to paste into policy
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
+.TP
+80
+audit
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.1
new file mode 100644
index 000000000..86cad501b
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.1
@@ -0,0 +1,34 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH MAKECREDENTIAL "1" "March 2020" "makecredential 1.3" "User Commands"
+.SH NAME
+makecredential \- Runs TPM2 makecredential
+.SH DESCRIPTION
+makecredential
+.PP
+Runs TPM2_MakeCredential
+.TP
+\fB\-ha\fR
+handle of encryption key public area
+.TP
+\fB\-icred\fR
+input credential file name
+.TP
+\fB\-in\fR
+object name file name
+.TP
+[\-ocred
+output credential file name (default do not save)]
+.TP
+[\-os
+secret file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.1
new file mode 100644
index 000000000..2a3d73cf0
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.1
@@ -0,0 +1,19 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NTC2GETCONFIG "1" "March 2020" "ntc2getconfig 1.3" "User Commands"
+.SH NAME
+ntc2getconfig \- Runs TPM2 ntc2getconfig
+.SH DESCRIPTION
+ntc2getconfig
+.PP
+Runs NTC2_GetConfig
+.TP
+[\-verify
+Verify results against System P default (default no verify)]
+.TP
+[\-verifylocked
+Also verify that the preconfig is locked
+.IP
+(default verify not locked)]
+.TP
+[\-p8 or \fB\-p9\fR
+Verify Nuvoton TPM for P8 or P9]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.1
new file mode 100644
index 000000000..1d28ca233
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.1
@@ -0,0 +1,10 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NTC2LOCKCONFIG "1" "March 2020" "ntc2lockconfig 1.3" "User Commands"
+.SH NAME
+ntc2lockconfig \- Runs TPM2 ntc2lockconfig
+.SH DESCRIPTION
+ntc2lockpreconfig
+.PP
+Runs NTC2_LockPreConfig
+.PP
+\fB\-lock\fR (required)
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.1
new file mode 100644
index 000000000..01ff67719
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.1
@@ -0,0 +1,67 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NTC2PRECONFIG "1" "March 2020" "ntc2preconfig 1.3" "User Commands"
+.SH NAME
+ntc2preconfig \- Runs TPM2 ntc2preconfig
+.SH DESCRIPTION
+ntc2preconfig
+.PP
+Runs NTC2_PreConfig
+.TP
+\fB\-p8\fR or \fB\-p9\fR
+Configure Nuvoton TPM for P8 or P9
+.TP
+\fB\-override\fR
+permits individual register values, read\-modify\-write
+.PP
+Values to set, each is a hex byte, (default do not change)
+.TP
+[\-i2cLoc1_2
+byte]
+.TP
+[\-i2cLoc3_4
+byte]
+.TP
+[\-AltCfg
+byte]
+.TP
+[\-Direction
+byte]
+.TP
+[\-PullUp
+byte]
+.TP
+[\-PushPull
+byte]
+.TP
+[\-CFG_A
+byte]
+.TP
+[\-CFG_B
+byte]
+.TP
+[\-CFG_C
+byte]
+.TP
+[\-CFG_D
+byte]
+.TP
+[\-CFG_E
+byte]
+.TP
+[\-CFG_F
+byte]
+.TP
+[\-CFG_G
+byte]
+.TP
+[\-CFG_H
+byte]
+.TP
+[\-CFG_I
+byte]
+.TP
+[\-CFG_J
+byte]
+.TP
+[\-IsValid
+byte]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.1
new file mode 100644
index 000000000..6b513f336
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.1
@@ -0,0 +1,52 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVCERTIFY "1" "March 2020" "nvcertify 1.3" "User Commands"
+.SH NAME
+nvcertify \- Runs TPM2 nvcertify
+.SH DESCRIPTION
+nvcertify
+.PP
+Runs TPM2_NV_Certify
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-pwdn
+password for NV index (default empty)]
+.TP
+\fB\-hk\fR
+certifying key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc, hmac) (default rsa)]
+.TP
+\fB\-sz\fR
+data size
+.TP
+[\-off
+offset (default 0)]
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.TP
+[\-od
+certified data file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.1
new file mode 100644
index 000000000..76a14da43
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVCHANGEAUTH "1" "March 2020" "nvchangeauth 1.3" "User Commands"
+.SH NAME
+nvchangeauth \- Runs TPM2 nvchangeauth
+.SH DESCRIPTION
+nvchangeauth
+.PP
+Runs TPM2_NV_ChangeAuth
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+\fB\-pwdo\fR
+password (default empty)
+.TP
+\fB\-pwdn\fR
+new password (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1
new file mode 100644
index 000000000..1e979f747
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1
@@ -0,0 +1,101 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVDEFINESPACE "1" "March 2020" "nvdefinespace 1.3" "User Commands"
+.SH NAME
+nvdefinespace \- Runs TPM2 nvdefinespace
+.SH DESCRIPTION
+nvdefinespace
+.PP
+Runs TPM2_NV_DefineSpace
+.TP
+\fB\-ha\fR
+NV index handle
+01xxxxxx
+.TP
+\fB\-hi\fR
+authorizing hierarchy (o, p)
+o owner, p platform
+p sets PLATFORMCREATE
+.TP
+[\-pwdp
+password for hierarchy (default empty)]
+.TP
+[\-hia
+hierarchy authorization (o, p)(default index authorization)]
+.TP
+default
+AUTHWRITE, AUTHREAD
+.TP
+o sets
+OWNERWRITE, OWNERREAD
+.TP
+p sets
+PPWRITE, PPREAD (platform)
+.TP
+[\-pwdn
+password for NV index (default empty)]
+sets AUTHWRITE (if not PIN index), AUTHREAD
+.TP
+[\-nalg
+name algorithm (sha1, sha256, sha384 sha512) (default sha256)]
+.TP
+[\-sz
+data size in decimal (default 0)]
+Ignored for other than ordinary index
+.TP
+[\-ty
+index type (o, c, b, e, p, f) (default ordinary)]
+ordinary, counter, bits, extend, pin pass, pin fail
+.TP
+[\-pol
+policy file (default empty)]
+sets POLICYWRITE, POLICYREAD
+.TP
+[+at
+attributes to add (may be specified more than once)]
+.TP
+ppw
+(PPWRITE) ppr (PPREAD)
+.TP
+ow
+(OWNERWRITE) or (OWNERREAD)
+.TP
+aw
+(AUTHWRITE) ar (AUTHREAD)
+.TP
+wd
+(WRITEDEFINE) gl (GLOBALLOCK)
+.TP
+rst
+(READ_STCLEAR) wst (WRITE_STCLEAR)
+.TP
+wa
+(WRITEALL) ody (ORDERLY)
+.TP
+pold
+(POLICY_DELETE) stc (CLEAR_STCLEAR)
+.TP
+[\-at
+attributes to delete (may be specified more than once)]
+.TP
+ppw
+(PPWRITE) ppr (PPREAD)
+.TP
+ow
+(OWNERWRITE) or (OWNERREAD)
+.TP
+aw
+(AUTHWRITE) ar (AUTHREAD)
+.TP
+pw
+(POLICYWRITE) pr (POLICYREAD)
+.TP
+da
+(NO_DA) (default set)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.1
new file mode 100644
index 000000000..acd37bfe6
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.1
@@ -0,0 +1,28 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVEXTEND "1" "March 2020" "nvextend 1.3" "User Commands"
+.SH NAME
+nvextend \- Runs TPM2 nvextend
+.SH DESCRIPTION
+nvextend
+.PP
+Runs TPM2_NV_Extend
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+\fB\-pwdn\fR
+password for NV index (default empty)
+.TP
+\fB\-ic\fR
+data string
+.TP
+\fB\-if\fR
+data file
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+20
+command decrypt
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.1
new file mode 100644
index 000000000..bc0b0b15d
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.1
@@ -0,0 +1,19 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVGLOBALWRITELOCK "1" "March 2020" "nvglobalwritelock 1.3" "User Commands"
+.SH NAME
+nvglobalwritelock \- Runs TPM2 nvglobalwritelock
+.SH DESCRIPTION
+nvglobalwritelock
+.PP
+Runs TPM2_NV_GlobalWriteLock
+.TP
+\fB\-hia\fR
+hierarchy authorization (o, p)
+.TP
+[\-pwd
+authorization password (default empty)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.1
new file mode 100644
index 000000000..4ce4e21e1
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.1
@@ -0,0 +1,19 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVINCREMENT "1" "March 2020" "nvincrement 1.3" "User Commands"
+.SH NAME
+nvincrement \- Runs TPM2 nvincrement
+.SH DESCRIPTION
+nvincrement
+.PP
+Runs TPM2_NV_Increment
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+\fB\-pwdn\fR
+password for NV index (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.1
new file mode 100644
index 000000000..83705c93d
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.1
@@ -0,0 +1,50 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVREAD "1" "March 2020" "nvread 1.3" "User Commands"
+.SH NAME
+nvread \- Runs TPM2 nvread
+.SH DESCRIPTION
+nvread
+.PP
+Runs TPM2_NV_Read
+.TP
+[\-hia
+hierarchy authorization (o, p)(default index authorization)]
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-pwdn
+password for NV index (default empty)]
+.TP
+[\-sz
+data size (default to size of index)]
+counter, bits, pin read 8 bytes, extend reads based on hash algorithm
+.TP
+[\-cert
+dumps the certificate
+.TP
+01c00002
+RSA EK certificate
+.TP
+01c0000a
+ECC EK certificate
+.TP
+[\-ocert
+certificate file name, writes in PEM format
+.TP
+[\-off
+offset (default 0)]
+.TP
+[\-of
+data file (default do not save)]
+.TP
+[\-id
+data values for pinCount and pinLimit verification, (4 bytes each)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.1
new file mode 100644
index 000000000..64781e86d
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVREADLOCK "1" "March 2020" "nvreadlock 1.3" "User Commands"
+.SH NAME
+nvreadlock \- Runs TPM2 nvreadlock
+.SH DESCRIPTION
+nvreadlock
+.PP
+Runs TPM2_NV_ReadLock
+.TP
+[\-hia
+hierarchy authorization (o, p)(default index authorization)]
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+\fB\-pwdn\fR
+password for NV index (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.1
new file mode 100644
index 000000000..0b02f5315
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.1
@@ -0,0 +1,36 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVREADPUBLIC "1" "March 2020" "nvreadpublic 1.3" "User Commands"
+.SH NAME
+nvreadpublic \- Runs TPM2 nvreadpublic
+.SH DESCRIPTION
+nvreadpublic
+.PP
+Runs TPM2_NV_ReadPublic
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-nalg
+expected name hash algorithm (sha1, sha256, sha384 sha512)
+(default no check)]
+.TP
+[\-opu
+NV public file name (default do not save)]
+.TP
+[\-ns
+additionally print Name in hex ascii on one line]
+.TP
+[\-on
+binary format Name file name]
+Useful to paste into policy
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+40
+response encrypt
+.TP
+80
+audit
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.1
new file mode 100644
index 000000000..751700eff
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVSETBITS "1" "March 2020" "nvsetbits 1.3" "User Commands"
+.SH NAME
+nvsetbits \- Runs TPM2 nvsetbits
+.SH DESCRIPTION
+nvsetbits
+.PP
+Runs TPM2_NV_SetBits
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-pwdn
+password for NV index (default empty)]
+.TP
+[\-bit
+bit to set, can be specified multiple times]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.1
new file mode 100644
index 000000000..b7cd10c8a
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.1
@@ -0,0 +1,23 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVUNDEFINESPACE "1" "March 2020" "nvundefinespace 1.3" "User Commands"
+.SH NAME
+nvundefinespace \- Runs TPM2 nvundefinespace
+.SH DESCRIPTION
+nvundefinespace
+.PP
+Runs TPM2_NV_UndefineSpace
+.TP
+\fB\-hi\fR
+hierarchy (o, p)
+o owner, p platform
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+\fB\-pwdp\fR
+password for hierarchy (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.1
new file mode 100644
index 000000000..6b03a44a1
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVUNDEFINESPACESPECIAL "1" "March 2020" "nvundefinespacespecial 1.3" "User Commands"
+.SH NAME
+nvundefinespacespecial \- Runs TPM2 nvundefinespacespecial
+.SH DESCRIPTION
+nvundefinespacespecial
+.PP
+Runs TPM2_NV_UndefineSpaceSpecial
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-pwdp
+password for platform (default empty)]
+.TP
+[\-pwdn
+password for NV index (default empty)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.1
new file mode 100644
index 000000000..4601a293b
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.1
@@ -0,0 +1,40 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVWRITE "1" "March 2020" "nvwrite 1.3" "User Commands"
+.SH NAME
+nvwrite \- Runs TPM2 nvwrite
+.SH DESCRIPTION
+nvwrite
+.PP
+Runs TPM2_NV_Write
+.TP
+[\-hia
+hierarchy authorization (o, p)(default index authorization)]
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-pwdn
+authorization password (default empty)]
+hierarchy or NV index password
+.TP
+[\-ic
+data string]
+.TP
+[\-if
+data file]
+.TP
+[\-id
+data values, pinPass and pinLimit (4 bytes each)]
+if none is specified, a 0 byte write occurs
+\fB\-id\fR is normally used for pin pass or pin fail indexes
+.TP
+[\-off
+offset (default 0)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+20
+command decrypt
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.1
new file mode 100644
index 000000000..a43117bc4
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH NVWRITELOCK "1" "March 2020" "nvwritelock 1.3" "User Commands"
+.SH NAME
+nvwritelock \- Runs TPM2 nvwritelock
+.SH DESCRIPTION
+nvwritelock
+.PP
+Runs TPM2_NV_WriteLock
+.TP
+[\-hia
+hierarchy authorization (o, p) (default index authorization)]
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+\fB\-pwdn\fR
+password for NV index (default empty)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.1
new file mode 100644
index 000000000..97ca7fb05
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.1
@@ -0,0 +1,34 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH OBJECTCHANGEAUTH "1" "March 2020" "objectchangeauth 1.3" "User Commands"
+.SH NAME
+objectchangeauth \- Runs TPM2 objectchangeauth
+.SH DESCRIPTION
+objectchangeauth
+.PP
+Runs TPM2_ObjectChangeAuth
+.TP
+\fB\-hp\fR
+parent handle
+.TP
+\fB\-ho\fR
+object handle
+.TP
+[\-pwdo
+password for object (default empty)]
+.TP
+[\-pwdn
+new password for object (default empty)]
+.IP
+[\-pwdni new password file for object, nul terminated (default empty)]
+[\-opr private key file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.1
new file mode 100644
index 000000000..378e21e14
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PCRALLOCATE "1" "March 2020" "pcrallocate 1.3" "User Commands"
+.SH NAME
+pcrallocate \- Runs TPM2 pcrallocate
+.SH DESCRIPTION
+pcrallocate
+.PP
+Runs TPM2_PCR_Allocate
+.PP
+Allocates banks for a full set of PCR 0\-23. Not all
+hardware TPMs support multiple banks or all algorithms
+.TP
+[\-pwdp
+platform hierarchy password (default empty)]
+.TP
++sha1 \fB\-sha1\fR
+allocate / deallocate a SHA\-1 bank
+.HP
++sha256 \fB\-sha256\fR allocate / deallocate a SHA\-256 bank
+.HP
++sha384 \fB\-sha384\fR allocate / deallocate a SHA\-384 bank
+.HP
++sha512 \fB\-sha512\fR allocate / deallocate a SHA\-512 bank
+.IP
+More than one algorithm can be specified
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.1
new file mode 100644
index 000000000..fa5f5449f
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.1
@@ -0,0 +1,29 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PCREVENT "1" "March 2020" "pcrevent 1.3" "User Commands"
+.SH NAME
+pcrevent \- Runs TPM2 pcrevent
+.SH DESCRIPTION
+pcrevent
+.PP
+Runs TPM2_PCR_Event
+.TP
+\fB\-ha\fR
+pcr handle
+.TP
+\fB\-ic\fR
+data string
+.TP
+\fB\-if\fR
+data file
+.TP
+[\-of1
+sha1 output digest file (default do not save)]
+.TP
+[\-of2
+sha256 output digest file (default do not save)]
+.TP
+[\-of3
+sha384 output digest file (default do not save)]
+.TP
+[\-of5
+sha512 output digest file (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.1
new file mode 100644
index 000000000..fc4ac2c3a
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.1
@@ -0,0 +1,21 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PCREXTEND "1" "March 2020" "pcrextend 1.3" "User Commands"
+.SH NAME
+pcrextend \- Runs TPM2 pcrextend
+.SH DESCRIPTION
+pcrextend
+.PP
+Runs TPM2_PCR_Extend
+.TP
+\fB\-ha\fR
+pcr handle
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+\fB\-halg\fR may be specified more than once
+.TP
+\fB\-ic\fR
+data string, 0 pad appended to halg length
+.TP
+\fB\-if\fR
+data file, 0 pad appended to halg length
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.1
new file mode 100644
index 000000000..53aa8b674
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.1
@@ -0,0 +1,36 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PCRREAD "1" "March 2020" "pcrread 1.3" "User Commands"
+.SH NAME
+pcrread \- Runs TPM2 pcrread
+.SH DESCRIPTION
+pcrread
+.PP
+Runs TPM2_PCR_Read
+.TP
+\fB\-ha\fR
+pcr handle
+.TP
+\fB\-halg\fR
+(sha1, sha256, sha384, sha512) (default sha256)
+\fB\-halg\fR may be specified more than once
+.TP
+[\-of
+data file for first algorithm specified, in binary]
+.TP
+[\-ahalg
+to extend session audit digest for testing (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-iosad
+file for session audit digest testing]
+.TP
+[\-ns
+no space, no text, no newlines]
+Used for scripting policy construction
+.HP
+\fB\-se0\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+80
+audit
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.1
new file mode 100644
index 000000000..0c3b3bad9
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PCRRESET "1" "March 2020" "pcrreset 1.3" "User Commands"
+.SH NAME
+pcrreset \- Runs TPM2 pcrreset
+.SH DESCRIPTION
+pcrreset
+.PP
+Runs TPM2_PCR_Reset
+.TP
+\fB\-ha\fR
+pcr handle
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.1
new file mode 100644
index 000000000..de353ba5c
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.1
@@ -0,0 +1,31 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYAUTHORIZE "1" "March 2020" "policyauthorize 1.3" "User Commands"
+.SH NAME
+policyauthorize \- Runs TPM2 policyauthorize
+.SH DESCRIPTION
+policyauthorize
+.PP
+Runs TPM2_PolicyAuthorize
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-appr\fR
+file name of digest of the policy being approved
+.TP
+[\-pref
+policyRef file] (default none)
+.TP
+\fB\-skn\fR
+signing key Name file name
+.TP
+\fB\-tk\fR
+ticket file name
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+20
+command decrypt
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.1
new file mode 100644
index 000000000..a0590a694
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.1
@@ -0,0 +1,26 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYAUTHORIZENV "1" "March 2020" "policyauthorizenv 1.3" "User Commands"
+.SH NAME
+policyauthorizenv \- Runs TPM2 policyauthorizenv
+.SH DESCRIPTION
+policyauthorizenv
+.PP
+Runs TPM2_PolicyAuthorizeNV
+.TP
+[\-hi
+hierarchy authHandle (o, p)]
+default NV index
+.TP
+\fB\-ha\fR
+NV index handle
+.TP
+[\-pwda
+password for authorization (default empty)]
+.TP
+\fB\-hs\fR
+policy session handle
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.1
new file mode 100644
index 000000000..be7b87b7b
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYAUTHVALUE "1" "March 2020" "policyauthvalue 1.3" "User Commands"
+.SH NAME
+policyauthvalue \- Runs TPM2 policyauthvalue
+.SH DESCRIPTION
+policyauthvalue
+.PP
+Runs TPM2_PolicyAuthValue
+.TP
+\fB\-ha\fR
+policy session handle
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.1
new file mode 100644
index 000000000..493958b32
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYCOMMANDCODE "1" "March 2020" "policycommandcode 1.3" "User Commands"
+.SH NAME
+policycommandcode \- Runs TPM2 policycommandcode
+.SH DESCRIPTION
+policycommandcode
+.PP
+Runs TPM2_PolicyCommandCode
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-cc\fR
+command code
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.1
new file mode 100644
index 000000000..5ca6245f3
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.1
@@ -0,0 +1,67 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYCOUNTERTIMER "1" "March 2020" "policycountertimer 1.3" "User Commands"
+.SH NAME
+policycountertimer \- Runs TPM2 policycountertimer
+.SH DESCRIPTION
+policycountertimer
+.PP
+Runs TPM2_PolicyCounterTimer
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-ic\fR
+data string (operandB)
+.TP
+\fB\-if\fR
+data file (operandB)
+.TP
+[\-off
+offset (default 0)]
+.TP
+\fB\-op\fR
+operation (default A = B)
+.TP
+0
+A = B
+.TP
+1
+A != B
+.TP
+2
+A > B signed
+.TP
+3
+A > B unsigned
+.TP
+4
+A < B signed
+.TP
+5
+A < B unsigned
+.TP
+6
+A >= B signed
+.TP
+7
+A >= B unsigned
+.TP
+8
+A <= B signed
+.TP
+9
+A <= B unsigned
+.TP
+A
+All bits SET in B are SET in A. ((A&B)=B)
+.TP
+B
+All bits SET in B are CLEAR in A. ((A&B)=0)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.1
new file mode 100644
index 000000000..ce9d50265
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYCPHASH "1" "March 2020" "policycphash 1.3" "User Commands"
+.SH NAME
+policycphash \- Runs TPM2 policycphash
+.SH DESCRIPTION
+policycphash
+.PP
+Runs TPM2_PolicyCpHash
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-cp\fR
+cpHash file
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.1
new file mode 100644
index 000000000..f7b5543c5
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.1
@@ -0,0 +1,28 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYDUPLICATIONSELECT "1" "March 2020" "policyduplicationselect 1.3" "User Commands"
+.SH NAME
+policyduplicationselect \- Runs TPM2 policyduplicationselect
+.SH DESCRIPTION
+policyduplicationselect
+.PP
+Runs TPM2_PolicyDuplicationSelect
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-inpn\fR
+new parent Name file
+.TP
+\fB\-ion\fR
+object Name file
+.TP
+[\-io
+include object (default no)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.1
new file mode 100644
index 000000000..a7cb83ee5
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYGETDIGEST "1" "March 2020" "policygetdigest 1.3" "User Commands"
+.SH NAME
+policygetdigest \- Runs TPM2 policygetdigest
+.SH DESCRIPTION
+policygetdigest
+.PP
+Runs TPM2_PolicyGetDigest
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+[\-of
+binary digest file name (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.1
new file mode 100644
index 000000000..cb4476591
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYMAKER "1" "March 2020" "policymaker 1.3" "User Commands"
+.SH NAME
+policymaker \- Runs TPM2 policymaker
+.SH DESCRIPTION
+policymaker
+.TP
+[\-halg
+hash algorithm (sha1 sha256 sha384 sha512) (default sha256)]
+.TP
+[\-nz
+do not extend starting with zeros, just hash the last line]
+.TP
+\fB\-if\fR
+input policy statements in hex ascii
+.TP
+[\-of
+output file \- policy hash in binary]
+.TP
+[\-pr
+stdout \- policy hash in hex ascii]
+.TP
+[\-ns
+additionally print policy hash in hex ascii on one line]
+Useful to paste into policy OR
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.1
new file mode 100644
index 000000000..a4f5d0912
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.1
@@ -0,0 +1,29 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYMAKERPCR "1" "March 2020" "policymakerpcr 1.3" "User Commands"
+.SH NAME
+policymakerpcr \- Runs TPM2 policymakerpcr
+.SH DESCRIPTION
+policymakerpcr
+.PP
+Creates a policyPCR term suitable for input to policymaker (hex ascii)
+.PP
+Assumes that the byte mask and PCR values are consistent
+.TP
+[\-halg
+hash algorithm (sha1 sha256 sha384 sha512) (default sha256)]
+.TP
+\fB\-bm\fR
+pcr byte mask in hex, big endian
+.IP
+e.g. 010000 selects PCR 16
+e.g. ffffff selects all 24 PCRs
+.HP
+\fB\-if\fR input file \- PCR values, hex ascii, one per line, 24 max
+.IP
+required unless pcr mask is 0
+.TP
+[\-of
+output file \- policy hash in binary]
+.TP
+[\-pr
+stdout \- policy hash in hex ascii]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.1
new file mode 100644
index 000000000..e53129193
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYNAMEHASH "1" "March 2020" "policynamehash 1.3" "User Commands"
+.SH NAME
+policynamehash \- Runs TPM2 policynamehash
+.SH DESCRIPTION
+policynamehash
+.PP
+Runs TPM2_PolicyNameHash
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-nh\fR
+NameHash file \- TPM2B_DIGEST
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.1
new file mode 100644
index 000000000..aa3b8bba8
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.1
@@ -0,0 +1,77 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYNV "1" "March 2020" "policynv 1.3" "User Commands"
+.SH NAME
+policynv \- Runs TPM2 policynv
+.SH DESCRIPTION
+policynv
+.PP
+Runs TPM2_PolicyNV
+.TP
+[\-hi
+hierarchy authHandle (o, p)]
+default NV index
+.TP
+\fB\-ha\fR
+NV index handle (operand A)
+.TP
+[\-pwda
+password for authorization (default empty)]
+.TP
+\fB\-hs\fR
+policy session handle
+.TP
+\fB\-ic\fR
+data string (operandB)
+.TP
+\fB\-if\fR
+data file (operandB)
+.TP
+[\-off
+offset (default 0)]
+.TP
+\fB\-op\fR
+operation (default A = B)
+.TP
+0
+A = B
+.TP
+1
+A != B
+.TP
+2
+A > B signed
+.TP
+3
+A > B unsigned
+.TP
+4
+A < B signed
+.TP
+5
+A < B unsigned
+.TP
+6
+A >= B signed
+.TP
+7
+A >= B unsigned
+.TP
+8
+A <= B signed
+.TP
+9
+A <= B unsigned
+.TP
+A
+All bits SET in B are SET in A. ((A&B)=B)
+.TP
+B
+All bits SET in B are CLEAR in A. ((A&B)=0)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.1
new file mode 100644
index 000000000..d570574ca
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYNVWRITTEN "1" "March 2020" "policynvwritten 1.3" "User Commands"
+.SH NAME
+policynvwritten \- Runs TPM2 policynvwritten
+.SH DESCRIPTION
+policynvwritten
+.PP
+Runs TPM2_PolicyNvWritten
+.TP
+\fB\-hs\fR
+policy session handle
+.TP
+\fB\-ws\fR
+written set (y, n)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+80
+audit
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.1
new file mode 100644
index 000000000..100b2203f
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYOR "1" "March 2020" "policyor 1.3" "User Commands"
+.SH NAME
+policyor \- Runs TPM2 policyor
+.SH DESCRIPTION
+policyor
+.PP
+Runs TPM2_PolicyOR
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-if\fR
+policy digest file (2\-8 \fB\-if\fR specifiers required)
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.1
new file mode 100644
index 000000000..de0086333
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYPASSWORD "1" "March 2020" "policypassword 1.3" "User Commands"
+.SH NAME
+policypassword \- Runs TPM2 policypassword
+.SH DESCRIPTION
+policypassword
+.PP
+Runs TPM2_PolicyPassword
+.TP
+\fB\-ha\fR
+policy session handle
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.1
new file mode 100644
index 000000000..3cc608c8f
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.1
@@ -0,0 +1,18 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYPCR "1" "March 2020" "policypcr 1.3" "User Commands"
+.SH NAME
+policypcr \- Runs TPM2 policypcr
+.SH DESCRIPTION
+policypcr
+.PP
+Runs TPM2_PolicyPCR
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+\fB\-bm\fR
+pcr mask in hex
+e.g., \fB\-bm\fR 10000 is PCR 16, 000001 is PCR 0
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.1
new file mode 100644
index 000000000..dae60fba5
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYRESTART "1" "March 2020" "policyrestart 1.3" "User Commands"
+.SH NAME
+policyrestart \- Runs TPM2 policyrestart
+.SH DESCRIPTION
+policyrestart
+.PP
+Runs TPM2_PolicyRestart
+.TP
+\fB\-ha\fR
+policy session handle
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.1
new file mode 100644
index 000000000..8c7ba7d2f
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.1
@@ -0,0 +1,46 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYSECRET "1" "March 2020" "policysecret 1.3" "User Commands"
+.SH NAME
+policysecret \- Runs TPM2 policysecret
+.SH DESCRIPTION
+policysecret
+.PP
+Runs TPM2_PolicySecret
+.TP
+\fB\-ha\fR
+authorizing entity handle
+.TP
+\fB\-hs\fR
+policy session handle
+.TP
+[\-in
+nonceTPM file (default none)]
+.TP
+[\-cp
+cpHash file (default none)]
+.TP
+[\-pref
+policyRef file (default none)]
+.TP
+[\-exp
+expiration (default none)]
+.TP
+[\-pwde
+authorizing entity password (default empty)]
+.TP
+[\-tk
+ticket file name]
+.TP
+[\-to
+timeout file name]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.1
new file mode 100644
index 000000000..c0292de72
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.1
@@ -0,0 +1,46 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYSIGNED "1" "March 2020" "policysigned 1.3" "User Commands"
+.SH NAME
+policysigned \- Runs TPM2 policysigned
+.SH DESCRIPTION
+policysigned
+.PP
+Runs TPM2_PolicySigned
+.TP
+\fB\-hk\fR
+signature verification key handle
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+[\-in
+nonceTPM file (default none)]
+.TP
+[\-cp
+cpHash file (default none)]
+.TP
+[\-pref
+policyRef file (default none)]
+.TP
+[\-exp
+expiration in decimal (default none)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+\fB\-sk\fR
+RSA signing key file name (PEM format)
+Use this signing key.
+.TP
+\fB\-is\fR
+signature file name
+Use this signature from e.g., a smart card or other HSM.
+.TP
+[\-pwdk
+signing key password (default null)]
+.TP
+[\-tk
+ticket file name]
+.TP
+[\-to
+timeout file name]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.1
new file mode 100644
index 000000000..669a83b7f
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYTEMPLATE "1" "March 2020" "policytemplate 1.3" "User Commands"
+.SH NAME
+policytemplate \- Runs TPM2 policytemplate
+.SH DESCRIPTION
+policytemplate
+.PP
+Runs TPM2_PolicyTemplate
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-te\fR
+template file
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.1
new file mode 100644
index 000000000..c078be8a6
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.1
@@ -0,0 +1,30 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POLICYTICKET "1" "March 2020" "policyticket 1.3" "User Commands"
+.SH NAME
+policyticket \- Runs TPM2 policyticket
+.SH DESCRIPTION
+policyticket
+.PP
+Runs TPM2_PolicyTicket
+.TP
+\fB\-ha\fR
+policy session handle
+.TP
+\fB\-to\fR
+timeout file name
+.TP
+[\-cp
+cpHash file (default none)]
+.TP
+[\-pref
+policyRef file (default none)]
+.TP
+\fB\-na\fR
+authName file (not hierarchy)
+.TP
+\fB\-hi\fR
+hierarchy (e, o, p) (authName is hierarchy)
+e endorsement, o owner, p platform
+.TP
+\fB\-tk\fR
+ticket file name
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.1
new file mode 100644
index 000000000..439ea1527
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.1
@@ -0,0 +1,8 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH POWERUP "1" "March 2020" "powerup 1.3" "User Commands"
+.SH NAME
+powerup \- Runs TPM2 powerup
+.SH DESCRIPTION
+powerup
+.PP
+Powers the simulator off and on, and powers up NV
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.1
new file mode 100644
index 000000000..235072933
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.1
@@ -0,0 +1,16 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PRINTATTR "1" "March 2020" "printattr 1.3" "User Commands"
+.SH NAME
+printattr \- Runs TPM2 printattr
+.SH DESCRIPTION
+printattr
+.PP
+Prints TPMA attributes as text
+.HP
+\fB\-ob\fR TPMA_OBJECT
+.HP
+\fB\-se\fR TPMA_SESSION
+.HP
+\fB\-st\fR TPMA_STARTUP_CLEAR
+.HP
+\fB\-nv\fR TPMA_NV
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.1
new file mode 100644
index 000000000..4122ddc64
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.1
@@ -0,0 +1,63 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH PUBLICNAME "1" "March 2020" "publicname 1.3" "User Commands"
+.SH NAME
+publicname \- Runs TPM2 publicname
+.SH DESCRIPTION
+publicname
+.PP
+Calculates the public name of an entity. There are times that a policy creator
+has TPM, PEM, or DER format information, but does not have access to a TPM.
+This utility accepts these inputs and outputs the name in the 'no spaces'
+format suitable for pasting into a policy. The binary format is used in the
+regression test
+.TP
+\fB\-invpu\fR
+TPM2B_NV_PUBLIC public key file name
+.TP
+\fB\-ipu\fR
+TPM2B_PUBLIC public key file name
+.TP
+\fB\-ipem\fR
+PEM format public key file name
+.TP
+\fB\-ider\fR
+DER format plaintext key pair file name]
+.TP
+[\-on
+binary format Name file name]
+.TP
+[\-ns
+print Name in hexacsii]
+.IP
+\fB\-pem\fR and \fB\-ider\fR optional arguments
+.TP
+[\-rsa
+(default)]
+.TP
+[\-ecc
+]
+.TP
+[\-scheme
+for signing key (default RSASSA scheme)]
+.IP
+rsassa
+rsapss
+null
+.TP
+[\-nalg
+name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-halg
+scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-uwa
+userWithAuth attribute clear (default set)]
+.TP
+[\-si
+signing (default) RSA]
+.TP
+[\-st
+storage (default NULL scheme)]
+.TP
+[\-den
+decryption, (unrestricted, RSA and EC NULL scheme)
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.1
new file mode 100644
index 000000000..859fba576
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.1
@@ -0,0 +1,46 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH QUOTE "1" "March 2020" "quote 1.3" "User Commands"
+.SH NAME
+quote \- Runs TPM2 quote
+.SH DESCRIPTION
+quote
+.PP
+Runs TPM2_Quote
+.TP
+\fB\-hp\fR
+pcr handle (may be specified more than once)
+.TP
+\fB\-hk\fR
+quoting key handle
+.TP
+[\-pwdk
+password for quoting key (default empty)]
+.TP
+[\-halg
+for signing (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-palg
+for PCR bank selection (sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc, hmac) (default rsa)]
+.TP
+[\-qd
+qualifying data file name]
+.TP
+[\-os
+quote signature file name (default do not save)]
+.TP
+[\-oa
+attestation output file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.1
new file mode 100644
index 000000000..01177121f
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH READCLOCK "1" "March 2020" "readclock 1.3" "User Commands"
+.SH NAME
+readclock \- Runs TPM2 readclock
+.SH DESCRIPTION
+readclock
+.PP
+Runs TPM2_ReadClock
+.TP
+[\-otime
+time file name (default do not save)]
+.TP
+[\-oclock
+clock file name (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.1
new file mode 100644
index 000000000..4daa03ce5
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.1
@@ -0,0 +1,32 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH READPUBLIC "1" "March 2020" "readpublic 1.3" "User Commands"
+.SH NAME
+readpublic \- Runs TPM2 readpublic
+.SH DESCRIPTION
+readpublic
+.PP
+Runs TPM2_ReadPublic
+.TP
+\fB\-ho\fR
+object handle
+.TP
+[\-opu
+public key file name (default do not save)]
+.TP
+[\-opem
+public key PEM format file name (default do not save)]
+.TP
+[\-ns
+additionally print Name in hex ascii on one line]
+Useful to paste into policy
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+40
+response encrypt
+.TP
+80
+audit
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.1
new file mode 100644
index 000000000..596ca090e
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.1
@@ -0,0 +1,9 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH RETURNCODE "1" "March 2020" "returncode 1.3" "User Commands"
+.SH NAME
+returncode \- Runs TPM2 returncode
+.SH SYNOPSIS
+.B returncode
+\fI\,hex-number\/\fR
+.SH DESCRIPTION
+Returns the TPM_RC name and text for the return code
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.1
new file mode 100644
index 000000000..ea85e78a0
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.1
@@ -0,0 +1,43 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH REWRAP "1" "March 2020" "rewrap 1.3" "User Commands"
+.SH NAME
+rewrap \- Runs TPM2 rewrap
+.SH DESCRIPTION
+rewrap
+.PP
+Runs TPM2_Rewrap
+.TP
+\fB\-ho\fR
+handle of object old parent
+.TP
+[\-pwdo
+password for old parent (default empty)]
+.TP
+\fB\-hn\fR
+handle of object new parent
+.TP
+\fB\-id\fR
+duplicate private area file name
+.TP
+\fB\-in\fR
+object name file name
+.TP
+\fB\-iss\fR
+input symmetric seed file name
+.TP
+[\-od
+rewrap private area file name (default do not save)]
+.TP
+[\-oss
+symmetric seed file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.1
new file mode 100644
index 000000000..90b81762b
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.1
@@ -0,0 +1,33 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH RSADECRYPT "1" "March 2020" "rsadecrypt 1.3" "User Commands"
+.SH NAME
+rsadecrypt \- Runs TPM2 rsadecrypt
+.SH DESCRIPTION
+rsadecrypt
+.PP
+Runs TPM2_RSA_Decrypt
+.TP
+\fB\-hk\fR
+key handle
+.TP
+[\-pwdk
+password for key (default empty)[
+.IP
+[\-ipwdk password file for key, nul terminated (default empty)]
+\fB\-ie\fR encrypt file name
+\fB\-od\fR decrypt file name (default do not save)
+[\-oid (sha1, sha256, sha384 sha512)]
+.IP
+optionally add OID and PKCS1 padding to the
+encrypt data (demo of signing with arbitrary OID)
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.1
new file mode 100644
index 000000000..507f7145c
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.1
@@ -0,0 +1,17 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH RSAENCRYPT "1" "March 2020" "rsaencrypt 1.3" "User Commands"
+.SH NAME
+rsaencrypt \- Runs TPM2 rsaencrypt
+.SH DESCRIPTION
+rsaencrypt
+.PP
+Runs TPM2_RSA_Encrypt
+.TP
+\fB\-hk\fR
+key handle
+.TP
+\fB\-id\fR
+decrypt file name
+.TP
+[\-oe
+encrypt file name (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.1
new file mode 100644
index 000000000..fe10495d7
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.1
@@ -0,0 +1,34 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SEQUENCECOMPLETE "1" "March 2020" "sequencecomplete 1.3" "User Commands"
+.SH NAME
+sequencecomplete \- Runs TPM2 sequencecomplete
+.SH DESCRIPTION
+sequencecomplete
+.PP
+Runs TPM2_SequenceComplete
+.TP
+\fB\-hs\fR
+sequence handle
+.TP
+[\-pwds
+password for sequence (default empty)]
+.TP
+[\-if
+input file to be added (default no data)]
+.TP
+[\-of
+result file name]
+.TP
+[\-tk
+ticket file name]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.1
new file mode 100644
index 000000000..c37376c52
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.1
@@ -0,0 +1,22 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SEQUENCEUPDATE "1" "March 2020" "sequenceupdate 1.3" "User Commands"
+.SH NAME
+sequenceupdate \- Runs TPM2 sequenceupdate
+.SH DESCRIPTION
+sequenceupdate
+.PP
+Runs TPM2_SequenceUpdate
+.TP
+\fB\-hs\fR
+sequence handle
+.TP
+[\-pwds
+password for sequence (default empty)]
+.TP
+\fB\-if\fR
+input file to be HMACed
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.IP
+01 continue
+20 command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.1
new file mode 100644
index 000000000..a49fe13a7
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.1
@@ -0,0 +1,31 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SETCOMMANDCODEAUDITSTATUS "1" "March 2020" "setcommandcodeauditstatus 1.3" "User Commands"
+.SH NAME
+setcommandcodeauditstatus \- Runs TPM2 setcommandcodeauditstatus
+.SH DESCRIPTION
+setprimarypolicy
+.PP
+Runs TPM2_SetCommandCodeAuditStatus
+.TP
+[\-hi
+authhandle hierarchy (o, p) (default platform)]
+.TP
+[\-pwda
+authorization password (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512, null) (default null)]
+.TP
+[\-set
+command code to set (may be specified more than once (default none)]
+.TP
+[\-clr
+command code to clear (may be specified more than once (default none)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.1
new file mode 100644
index 000000000..5c888e2d3
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.1
@@ -0,0 +1,28 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SETPRIMARYPOLICY "1" "March 2020" "setprimarypolicy 1.3" "User Commands"
+.SH NAME
+setprimarypolicy \- Runs TPM2 setprimarypolicy
+.SH DESCRIPTION
+setprimarypolicy
+.PP
+Runs TPM2_SetPrimaryPolicy
+.TP
+[\-hi
+authhandle hierarchy (l, e, o, p) (default platform)]
+.TP
+[\-pwda
+authorization password (default empty)]
+.TP
+[\-pol
+policy file (default empty policy)]
+.TP
+[\-halg
+(sha1, sha256) (default null)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.1
new file mode 100644
index 000000000..e40e0032d
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SHUTDOWN "1" "March 2020" "shutdown 1.3" "User Commands"
+.SH NAME
+shutdown \- Runs TPM2 shutdown
+.SH DESCRIPTION
+shutdown
+.PP
+Runs TPM2_Shutdown
+.TP
+[\-c
+shutdown clear (default)]
+.TP
+[\-s
+shutdown state]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.1
new file mode 100644
index 000000000..a3974cae3
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.1
@@ -0,0 +1,48 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SIGN "1" "March 2020" "sign 1.3" "User Commands"
+.SH NAME
+sign \- Runs TPM2 sign
+.SH DESCRIPTION
+sign
+.PP
+Runs TPM2_Sign
+.TP
+\fB\-hk\fR
+key handle
+.TP
+\fB\-if\fR
+input message to hash and sign
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-salg
+signature algorithm (rsa, ecc, hmac) (default rsa)]
+.IP
+[\-scheme signing scheme (rsassa, rsapss, ecdsa, ecdaa, hmac)]
+.IP
+(default rsassa, ecdsa, hmac)]
+.TP
+[\-cf
+input counter file (commit count required for ECDAA scheme]
+.TP
+[\-ipu
+public key file name to verify signature (default no verify)]
+Verify only supported for RSA now
+.TP
+[\-os
+signature file name (default do not save)]
+.TP
+[\-tk
+ticket file name]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.1
new file mode 100644
index 000000000..97244ddb6
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.1
@@ -0,0 +1,15 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH SIGNAPP "1" "March 2020" "signapp 1.3" "User Commands"
+.SH NAME
+signapp \- Runs TPM2 signapp
+.SH DESCRIPTION
+signapp
+.PP
+Runs a TPM2_Sign application, including creating a primary storage key
+and creating and loading a signing key
+.TP
+\fB\-ic\fR
+input message to hash and sign
+.TP
+[\-pwsess
+Use a password session, no HMAC or parameter encryption]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.1
new file mode 100644
index 000000000..13ca3365a
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.1
@@ -0,0 +1,37 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH STARTAUTHSESSION "1" "March 2020" "startauthsession 1.3" "User Commands"
+.SH NAME
+startauthsession \- Runs TPM2 startauthsession
+.SH DESCRIPTION
+startauthsession
+.PP
+Runs TPM2_StartAuthSession
+.HP
+\fB\-se\fR
+.TP
+h
+HMAC session
+.TP
+p
+Policy session
+.TP
+t
+Trial policy session
+.TP
+[\-halg
+(sha1, sha256, sha384, sha512) (default sha256)]
+.TP
+[\-hs
+salt handle (default TPM_RH_NULL)]
+.TP
+[\-bi
+bind handle (default TPM_RH_NULL)]
+.TP
+[\-pwdb
+bind password for bind handle (default empty)]
+.TP
+[\-sym
+(xor, aes) symmetric parameter encryption algorithm (default xor)]
+.TP
+[\-on
+nonceTPM file for policy session (default do not save)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.1
new file mode 100644
index 000000000..dae5c9be5
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.1
@@ -0,0 +1,20 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH STARTUP "1" "March 2020" "startup 1.3" "User Commands"
+.SH NAME
+startup \- Runs TPM2 startup
+.SH DESCRIPTION
+startup
+.PP
+Runs TPM2_Startup
+.TP
+[\-c
+startup clear (default)]
+.TP
+[\-s
+startup state]
+.TP
+[\-st
+run TPM2_SelfTest]
+.TP
+[\-sto
+run only TPM2_SelfTest (no startup)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.1
new file mode 100644
index 000000000..53d747424
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH STIRRANDOM "1" "March 2020" "stirrandom 1.3" "User Commands"
+.SH NAME
+stirrandom \- Runs TPM2 stirrandom
+.SH DESCRIPTION
+stirrandom
+.PP
+Runs TPM2_StirRandom
+.TP
+\fB\-if\fR
+input file name
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.1
new file mode 100644
index 000000000..d23e3b719
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH TIMEPACKET "1" "March 2020" "timepacket 1.3" "User Commands"
+.SH NAME
+timepacket \- Runs TPM2 timepacket
+.SH DESCRIPTION
+timepacket
+.PP
+Times the supplied packet
+.TP
+\fB\-if\fR
+packet in hexascii (requires one space at end of packet)
+.TP
+[\-l
+number of loops to time (default 1)]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.1
new file mode 100644
index 000000000..1ceb2373c
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.1
@@ -0,0 +1,14 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH TPM2PEM "1" "March 2020" "tpm2pem 1.3" "User Commands"
+.SH NAME
+tpm2pem \- Runs TPM2 tpm2pem
+.SH DESCRIPTION
+tpm2pem
+.PP
+Converts an RSA or EC TPM2B_PUBLIC to PEM
+.TP
+\fB\-ipu\fR
+public key input file in TPM format
+.TP
+\fB\-opem\fR
+public key output file in PEM format
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.1
new file mode 100644
index 000000000..6e000ddf0
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.1
@@ -0,0 +1,11 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH TPMCMD "1" "March 2020" "tpmcmd 1.3" "User Commands"
+.SH NAME
+tpmcmd \- Runs TPM2 tpmcmd
+.SH DESCRIPTION
+tpmcmd
+.PP
+Sends an in\-band TPM simulator signal
+.TP
+\fB\-stop\fR
+Stop the TPM simulator
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.1
new file mode 100644
index 000000000..14809e116
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.1
@@ -0,0 +1,17 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH TPMPUBLIC2ECCPOINT "1" "March 2020" "tpmpublic2eccpoint 1.3" "User Commands"
+.SH NAME
+tpmpublic2eccpoint \- Runs TPM2 tpmpublic2eccpoint
+.SH DESCRIPTION
+tpmpublic2eccpoint
+.PP
+Converts an EC TPM2B_PUBLIC to TPM2B_ECC_POINT. The intended use case
+is to convert the public key output of certain commands (TPM2_CreatePrimary,
+TPM2_Create, TPM2_CreateLoaded, TPM2_ReadPublic) to a format useful for
+TPM2_ZGen_2Phase.
+.TP
+\fB\-ipu\fR
+EC public key input file in TPM TPM2B_PUBLIC format
+.TP
+\fB\-pt\fR
+EC public key output file in TPM TPM2B_ECC_POINT format
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.1
new file mode 100644
index 000000000..05442ef6c
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.1
@@ -0,0 +1,25 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH UNSEAL "1" "March 2020" "unseal 1.3" "User Commands"
+.SH NAME
+unseal \- Runs TPM2 unseal
+.SH DESCRIPTION
+unseal
+.PP
+Runs TPM2_Unseal
+.TP
+\fB\-ha\fR
+sealed data item handle
+.TP
+[\-pwd
+password sealed data item (default empty)]
+.TP
+[\-of
+output data (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+40
+response encrypt
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.1
new file mode 100644
index 000000000..b047325df
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.1
@@ -0,0 +1,59 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH VERIFYSIGNATURE "1" "March 2020" "verifysignature 1.3" "User Commands"
+.SH NAME
+verifysignature \- Runs TPM2 verifysignature
+.SH DESCRIPTION
+verifysignature
+.PP
+Runs TPM2_VerifySignature and/or verifies using the PEM public key
+.TP
+\fB\-if\fR
+input message file name
+.TP
+\fB\-ih\fR
+input hash file name
+.IP
+One of \fB\-if\fR, \fB\-ih\fR must be specified
+.TP
+\fB\-is\fR
+signature file name
+.TP
+[\-raw
+signature specified by \fB\-is\fR is in raw format]
+(default TPMT_SIGNATURE)
+.TP
+\fB\-hk\fR
+key handle
+.TP
+\fB\-ipem\fR
+public key PEM format file name to verify signature
+.TP
+\fB\-ihmac\fR
+HMAC key in raw binary format file name to verify signature
+.IP
+One of \fB\-hk\fR, \fB\-ipem\fR, \fB\-ihmac\fR must be specified
+.TP
+[\-tk
+ticket file name (requires \fB\-hk\fR)]
+.TP
+[\-halg
+(sha1, sha256, sha384 sha512) (default sha256)]
+.IP
+[Asymmetric Key Algorithm]
+.TP
+[\-rsa
+(default)]
+.TP
+[\-ecc
+]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default NULL)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+80
+audit
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.1
new file mode 100644
index 000000000..12eb525ef
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.1
@@ -0,0 +1,15 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH WRITEAPP "1" "March 2020" "writeapp 1.3" "User Commands"
+.SH NAME
+writeapp \- Runs TPM2 writeapp
+.SH DESCRIPTION
+writeapp
+.PP
+writeapp is a sample NV write application. Provisions an NV location,
+then does two writes with password 'pwd' using a bound, salted
+HMAC session using AES CFB parameter encryption.
+.PP
+Used to test minimal TSS build
+.TP
+[\-pwsess
+Use a password session, no HMAC or parameter encryption]
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.1
new file mode 100644
index 000000000..c4eff8061
--- /dev/null
+++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.1
@@ -0,0 +1,47 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6.
+.TH ZGEN2PHASE "1" "March 2020" "zgen2phase 1.3" "User Commands"
+.SH NAME
+zgen2phase \- Runs TPM2 zgen2phase
+.SH DESCRIPTION
+zgen2phase
+.PP
+Runs TPM2_ZGen_2Phase
+.TP
+\fB\-hk\fR
+unrestricted decryption key handle
+.TP
+[\-pwdk
+password for key (default empty)]
+.TP
+\fB\-qsb\fR
+QsB point input file name
+.TP
+\fB\-qeb\fR
+QeB point input file name
+.TP
+\fB\-cf\fR
+counter file name
+.TP
+[\-scheme
+(default ecdh)]
+.IP
+ecdh
+ecmqv
+sm2
+.TP
+[\-z1
+Z1 output data file name (default do not save)]
+.TP
+[\-z2
+Z2 output data file name (default do not save)]
+.HP
+\fB\-se[0\-2]\fR session handle / attributes (default PWAP)
+.TP
+01
+continue
+.TP
+20
+command decrypt
+.TP
+40
+response encrypt