diff options
Diffstat (limited to 'roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man')
119 files changed, 3883 insertions, 0 deletions
diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.1 new file mode 100644 index 000000000..a9710fcc0 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssactivatecredential.1 @@ -0,0 +1,41 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH ACTIVATECREDENTIAL "1" "March 2020" "activatecredential 1.3" "User Commands" +.SH NAME +activatecredential \- Runs TPM2 activatecredential +.SH DESCRIPTION +activatecredential +.PP +Runs TPM2_ActivateCredential +.TP +\fB\-ha\fR +activation handle of object associated with the certificate +.TP +\fB\-hk\fR +handle of loaded decryption key +.TP +\fB\-icred\fR +input credential file name +.TP +\fB\-is\fR +secret file name +.TP +[\-pwda +password for activation key (default empty)] +.TP +[\-pwdk +password for decryption key (default empty)] +.TP +[\-ocred +output credential file name (default do not save)] +.TP +\fB\-se[0\-2]\fR +session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.1 new file mode 100644 index 000000000..e3aa6ec97 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertify.1 @@ -0,0 +1,46 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CERTIFY "1" "March 2020" "certify 1.3" "User Commands" +.SH NAME +certify \- Runs TPM2 certify +.SH DESCRIPTION +certify +.PP +Runs TPM2_Certify +.TP +\fB\-ho\fR +object handle +.TP +[\-pwdo +password for object (default empty)] +.TP +\fB\-hk\fR +certifying key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384 sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc, hmac) (default rsa)] +.TP +[\-qd +qualifying data file name] +.TP +[\-os +signature file name (default do not save)] +.TP +[\-oa +attestation output file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.1 new file mode 100644 index 000000000..e267c1a05 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifycreation.1 @@ -0,0 +1,49 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CERTIFYCREATION "1" "March 2020" "certifycreation 1.3" "User Commands" +.SH NAME +certifycreation \- Runs TPM2 certifycreation +.SH DESCRIPTION +certifycreation +.PP +Runs TPM2_CertifyCreation +.TP +\fB\-ho\fR +object handle +.TP +\fB\-hk\fR +certifying key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc) (default rsa)] +.TP +[\-qd +qualifying data file name] +.TP +\fB\-tk\fR +input ticket file name +.TP +\fB\-ch\fR +input creation hash file name +.TP +[\-os +signature file name] (default do not save) +.TP +[\-oa +attestation output file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.1 new file mode 100644 index 000000000..6ce3fbcea --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscertifyx509.1 @@ -0,0 +1,68 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CERTIFYX509 "1" "March 2020" "certifyx509 1.3" "User Commands" +.SH NAME +certifyx509 \- Runs TPM2 certifyx509 +.SH DESCRIPTION +certifyx509 +.PP +Runs TPM2_Certifyx509 +.TP +\fB\-ho\fR +object handle +.TP +[\-pwdo +password for object (default empty)] +.TP +\fB\-hk\fR +certifying key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384 sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc) (default rsa)] +.TP +[\-ku +X509 key usage \- string \- comma separated, no spaces] +.TP +[\-iob +TPMA_OBJECT \- 4 byte hex] +e.g. sign: critical,digitalSignature,keyCertSign,cRLSign (default) +e.g. decrypt: critical,dataEncipherment,keyAgreement,encipherOnly,decipherOnly +e.g. fixedTPM: critical,nonRepudiation +e.g. parent (restrict decrypt): critical,keyEncipherment +.TP +[\-bit +bit in partialCertificate to toggle] +.TP +[\-sub +subject same as issuer for self signed (root) certificate] +.TP +[\-opc +partial certificate file name (default do not save)] +.TP +[\-oa +addedToCertificate file name (default do not save)] +.TP +[\-otbs +signed tbsDigest file name (default do not save)] +.TP +[\-os +signature file name (default do not save)] +.TP +[\-ocert +reconstructed certificate file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.1 new file mode 100644 index 000000000..a106b3476 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangeeps.1 @@ -0,0 +1,16 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CHANGEEPS "1" "March 2020" "changeeps 1.3" "User Commands" +.SH NAME +changeeps \- Runs TPM2 changeeps +.SH DESCRIPTION +changeeps +.PP +Runs TPM2_ChangeEPS +.TP +\fB\-pwda\fR +authorization password (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.1 new file mode 100644 index 000000000..c9d96b002 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsschangepps.1 @@ -0,0 +1,16 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CHANGEPPS "1" "March 2020" "changepps 1.3" "User Commands" +.SH NAME +changepps \- Runs TPM2 changepps +.SH DESCRIPTION +changepps +.PP +Runs TPM2_ChangePPS +.TP +\fB\-pwda\fR +authorization password (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.1 new file mode 100644 index 000000000..a3a8e14cb --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclear.1 @@ -0,0 +1,20 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CLEAR "1" "March 2020" "clear 1.3" "User Commands" +.SH NAME +clear \- Runs TPM2 clear +.SH DESCRIPTION +clear +.PP +Runs TPM2_Clear +.TP +\fB\-hi\fR +authhandle hierarchy (l, p) +l lockout, p platform +.TP +\fB\-pwda\fR +authorization password (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.1 new file mode 100644 index 000000000..85971c3af --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclearcontrol.1 @@ -0,0 +1,23 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CLEARCONTROL "1" "March 2020" "clearcontrol 1.3" "User Commands" +.SH NAME +clearcontrol \- Runs TPM2 clearcontrol +.SH DESCRIPTION +clearcontrol +.PP +Runs TPM2_ClearControl +.TP +\fB\-hi\fR +authhandle hierarchy (l, p) +l lockout, p platform +.TP +\fB\-pwda\fR +authorization password (default empty) +.TP +\fB\-state\fR +0 to disable, 1 to enable (default enable) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.1 new file mode 100644 index 000000000..fe8402b09 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockrateadjust.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CLOCKRATEADJUST "1" "December 2019" "clockrateadjust 1546" "User Commands" +.SH NAME +clockrateadjust \- Runs TPM2 clockrateadjust +.SH DESCRIPTION +clockrateadjust +.PP +Runs TPM2_ClockRateAdjust +.TP +[\-hi +hierarchy auth (p, o) (default p)] +.TP +[\-pwdp +hierarchy password (default empty)] +.TP +[\-adj +rate adjust (default 0)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.1 new file mode 100644 index 000000000..7c0c7d16e --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssclockset.1 @@ -0,0 +1,31 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CLOCKSET "1" "March 2020" "clockset 1.3" "User Commands" +.SH NAME +clockset \- Runs TPM2 clockset +.SH DESCRIPTION +clockset +.PP +Runs TPM2_ClockSet +.TP +\fB\-clock\fR +new clock +.TP +\fB\-iclock\fR +new clock file name +.TP +[\-addsec +seconds to add to new clock] +.TP +\fB\-hi\fR +hierarchy (o, p) (default platform) +.IP +o owner, p platform +.TP +\fB\-pwdp\fR +password for hierarchy (default empty) +.TP +\fB\-se[0\-2]\fR +session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.1 new file mode 100644 index 000000000..5b3b23343 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscommit.1 @@ -0,0 +1,46 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH COMMIT "1" "March 2020" "commit 1.3" "User Commands" +.SH NAME +commit \- Runs TPM2 commit +.SH DESCRIPTION +commit +.PP +Runs TPM2_Commit +.TP +\fB\-hk\fR +key handle +.TP +[\-pt +point input file name (default empty)] +.TP +[\-s2 +s2 input file name (default empty)] +.TP +[\-y2 +y2 input file name (default empty)] +.TP +[\-Kf +K output data file name (default do not save)] +.TP +[\-Lf +output data file name (default do not save)] +.TP +[\-Ef +output data file name (default do not save)] +.TP +[\-cf +output counter file name (default do not save)] +.TP +[\-pwdk +password for key (default empty)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.1 new file mode 100644 index 000000000..6fb9866ac --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextload.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CONTEXTLOAD "1" "March 2020" "contextload 1.3" "User Commands" +.SH NAME +contextload \- Runs TPM2 contextload +.SH DESCRIPTION +contextload +.PP +Runs TPM2_ContextLoad +.TP +\fB\-if\fR +context file name diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.1 new file mode 100644 index 000000000..2f3c6d3da --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscontextsave.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CONTEXTSAVE "1" "March 2020" "contextsave 1.3" "User Commands" +.SH NAME +contextsave \- Runs TPM2 contextsave +.SH DESCRIPTION +contextsave +.PP +Runs TPM2_ContextSave +.TP +\fB\-ha\fR +handle +.TP +[\-of +context file name (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1 new file mode 100644 index 000000000..ba53e19b6 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreate.1 @@ -0,0 +1,127 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CREATE "1" "March 2020" "create 1.3" "User Commands" +.SH NAME +create \- Runs TPM2 create +.SH DESCRIPTION +create +.PP +Runs TPM2_Create +.HP +\fB\-hp\fR parent handle +.IP +[Asymmetric Key Algorithm] +.HP +\fB\-rsa\fR keybits (default) +.IP +(2048 default) +.HP +\fB\-ecc\fR curve +.IP +bnp256 +nistp256 +nistp384 +.IP +Key attributes +.TP +\fB\-bl\fR +data blob for unseal (create only) +requires \fB\-if\fR +.TP +\fB\-den\fR +decryption, (unrestricted, RSA and EC NULL scheme) +.TP +\fB\-deo\fR +decryption, (unrestricted, RSA OAEP, EC NULL scheme) +.TP +\fB\-dee\fR +decryption, (unrestricted, RSA ES, EC NULL scheme) +.TP +\fB\-des\fR +encryption/decryption, AES symmetric +[\-116 for TPM rev 116 compatibility] +.TP +\fB\-st\fR +storage (restricted) +[default for primary keys] +.TP +\fB\-si\fR +unrestricted signing (RSA and EC NULL scheme) +.TP +\fB\-sir\fR +restricted signing (RSA RSASSA, EC ECDSA scheme) +.TP +\fB\-dau\fR +unrestricted ECDAA signing key pair +.TP +\fB\-dar\fR +restricted ECDAA signing key pair +.TP +\fB\-kh\fR +keyed hash (unrestricted, hmac) +.TP +\fB\-khr\fR +keyed hash (restricted, hmac) +.TP +\fB\-dp\fR +derivation parent +.TP +\fB\-gp\fR +general purpose, not storage +.TP +[\-kt +(can be specified more than once)] +f fixedTPM (default for primary keys and derivation parents) +p fixedParent (default for primary keys and derivation parents) +nf no fixedTPM (default for non\-primary keys) +np no fixedParent (default for non\-primary keys) +ed encrypted duplication (default not set) +.TP +[\-da +object subject to DA protection (default no)] +.TP +[\-pol +policy file (default empty)] +.TP +[\-uwa +userWithAuth attribute clear (default set)] +.TP +[\-if +data (inSensitive) file name] +.TP +[\-nalg +name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-halg +scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-pwdp +password for parent key (default empty)] +.TP +[\-opu +public key file name (default do not save)] +.TP +[\-opr +private key file name (default do not save)] +.TP +[\-opem +public key PEM format file name (default do not save)] +.TP +[\-tk +output ticket file name (default do not save)] +.TP +[\-ch +output creation hash file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.1 new file mode 100644 index 000000000..cd5e2a670 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateek.1 @@ -0,0 +1,33 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CREATEEK "1" "March 2020" "createek 1.3" "User Commands" +.SH NAME +createek \- Runs TPM2 createek +.SH DESCRIPTION +createek +.PP +Parses and prints the various EK NV indexes specified by the IWG +Creates a primary key based on the EK NV indexes +.TP +\fB\-te\fR +print EK Template +.TP +\fB\-no\fR +print EK nonce +.TP +\fB\-ce\fR +print EK certificate +.TP +\fB\-cp\fR +CreatePrimary using the EK template and EK nonce. +Validate the EK against the EK certificate +.TP +[\-noflush +Do not flush the primary key after validation] +.TP +[\-root +filename \- validate EK certificate against the root] +filename contains a list of PEM format CA root certificate +filenames, one per line. +The list may contain up to 100 certificates. +.HP +\fB\-alg\fR (rsa or ecc) diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.1 new file mode 100644 index 000000000..9901a3fa4 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateekcert.1 @@ -0,0 +1,40 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CREATEEKCERT "1" "March 2020" "createekcert 1.3" "User Commands" +.SH NAME +createekcert \- Runs TPM2 createekcert +.SH SYNOPSIS +.B createekcert +\fI\,-alg rsa -cakey cakey.pem -capwd rrrr -v\/\fR +.br +.B createekcert +\fI\,-alg ecc -cakey cakeyecc.pem -capwd rrrr -caalg ec -v\/\fR +.SH DESCRIPTION +createekcert +.PP +Provisions an EK certificate, using the default IWG template +E.g., +.TP +[\-pwdp +platform hierarchy password (default empty)] +.TP +\fB\-cakey\fR +CA PEM key file name +.TP +[\-capwd +CA PEM key password (default empty)] +.TP +[\-caalg +CA key algorithm (rsa or ec) (default rsa)] +.TP +[\-alg +(rsa or ecc certificate) (default rsa)] +.TP +[\-noflush +do not flush the primary key] +.TP +[\-of +DER certificate output file name] +.PP +Currently: +.IP +Certificate issuer, subject, and validity are hard coded. diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1 new file mode 100644 index 000000000..0e6d45101 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateloaded.1 @@ -0,0 +1,128 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CREATELOADED "1" "March 2020" "createloaded 1.3" "User Commands" +.SH NAME +createloaded \- Runs TPM2 createloaded +.SH DESCRIPTION +createloaded +.PP +Runs TPM2_CreateLoaded +.HP +\fB\-hp\fR parent handle (can be hierarchy) +.IP +40000001 Owner +4000000c Platform +4000000b Endorsement +.IP +[Asymmetric Key Algorithm] +.HP +\fB\-rsa\fR keybits (default) +.IP +(2048 default) +.HP +\fB\-ecc\fR curve +.IP +bnp256 +nistp256 +nistp384 +.IP +Key attributes +.TP +\fB\-bl\fR +data blob for unseal (create only) +requires \fB\-if\fR +.TP +\fB\-den\fR +decryption, (unrestricted, RSA and EC NULL scheme) +.TP +\fB\-deo\fR +decryption, (unrestricted, RSA OAEP, EC NULL scheme) +.TP +\fB\-dee\fR +decryption, (unrestricted, RSA ES, EC NULL scheme) +.TP +\fB\-des\fR +encryption/decryption, AES symmetric +[\-116 for TPM rev 116 compatibility] +.TP +\fB\-st\fR +storage (restricted) +[default for primary keys] +.TP +\fB\-si\fR +unrestricted signing (RSA and EC NULL scheme) +.TP +\fB\-sir\fR +restricted signing (RSA RSASSA, EC ECDSA scheme) +.TP +\fB\-dau\fR +unrestricted ECDAA signing key pair +.TP +\fB\-dar\fR +restricted ECDAA signing key pair +.TP +\fB\-kh\fR +keyed hash (unrestricted, hmac) +.TP +\fB\-khr\fR +keyed hash (restricted, hmac) +.TP +\fB\-dp\fR +derivation parent +.TP +\fB\-gp\fR +general purpose, not storage +.TP +[\-kt +(can be specified more than once)] +f fixedTPM (default for primary keys and derivation parents) +p fixedParent (default for primary keys and derivation parents) +nf no fixedTPM (default for non\-primary keys) +np no fixedParent (default for non\-primary keys) +ed encrypted duplication (default not set) +.TP +[\-da +object subject to DA protection (default no)] +.TP +[\-pol +policy file (default empty)] +.TP +[\-uwa +userWithAuth attribute clear (default set)] +.TP +[\-if +data (inSensitive) file name] +.TP +[\-nalg +name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-halg +scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-der +object's parent is a derivation parent] +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-pwdp +password for parent key (default empty)] +.TP +[\-opu +public key file name (default do not save)] +.TP +[\-opr +private key file name (default do not save)] +.TP +[\-opem +public key PEM format file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1 new file mode 100644 index 000000000..7aa86c796 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsscreateprimary.1 @@ -0,0 +1,131 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH CREATEPRIMARY "1" "March 2020" "createprimary 1.3" "User Commands" +.SH NAME +createprimary \- Runs TPM2 createprimary +.SH DESCRIPTION +createprimary creates a primary storage key +.PP +Runs TPM2_CreatePrimary +.TP +[\-hi +hierarchy (e, o, p, n) (default null)] +.TP +[\-pwdp +password for hierarchy (default empty)] +.TP +[\-pwdpi +password file name for hierarchy (default empty)] +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-iu +inPublic unique field file (default none)] +.TP +[\-opu +public key file name (default do not save)] +.TP +[\-opem +public key PEM format file name (default do not save)] +.TP +[\-tk +output ticket file name] +.TP +[\-ch +output creation hash file name] +.IP +[Asymmetric Key Algorithm] +.HP +\fB\-rsa\fR keybits (default) +.IP +(2048 default) +.HP +\fB\-ecc\fR curve +.IP +bnp256 +nistp256 +nistp384 +.IP +Key attributes +.TP +\fB\-bl\fR +data blob for unseal (create only) +requires \fB\-if\fR +.TP +\fB\-den\fR +decryption, (unrestricted, RSA and EC NULL scheme) +.TP +\fB\-deo\fR +decryption, (unrestricted, RSA OAEP, EC NULL scheme) +.TP +\fB\-dee\fR +decryption, (unrestricted, RSA ES, EC NULL scheme) +.TP +\fB\-des\fR +encryption/decryption, AES symmetric +[\-116 for TPM rev 116 compatibility] +.TP +\fB\-st\fR +storage (restricted) +[default for primary keys] +.TP +\fB\-si\fR +unrestricted signing (RSA and EC NULL scheme) +.TP +\fB\-sir\fR +restricted signing (RSA RSASSA, EC ECDSA scheme) +.TP +\fB\-dau\fR +unrestricted ECDAA signing key pair +.TP +\fB\-dar\fR +restricted ECDAA signing key pair +.TP +\fB\-kh\fR +keyed hash (unrestricted, hmac) +.TP +\fB\-khr\fR +keyed hash (restricted, hmac) +.TP +\fB\-dp\fR +derivation parent +.TP +\fB\-gp\fR +general purpose, not storage +.TP +[\-kt +(can be specified more than once)] +f fixedTPM (default for primary keys and derivation parents) +p fixedParent (default for primary keys and derivation parents) +nf no fixedTPM (default for non\-primary keys) +np no fixedParent (default for non\-primary keys) +ed encrypted duplication (default not set) +.TP +[\-da +object subject to DA protection (default no)] +.TP +[\-pol +policy file (default empty)] +.TP +[\-uwa +userWithAuth attribute clear (default set)] +.TP +[\-if +data (inSensitive) file name] +.TP +[\-nalg +name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-halg +scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.1 new file mode 100644 index 000000000..0f5ef0581 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattacklockreset.1 @@ -0,0 +1,16 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH DICTIONARYATTACKLOCKRESET "1" "March 2020" "dictionaryattacklockreset 1.3" "User Commands" +.SH NAME +dictionaryattacklockreset \- Runs TPM2 dictionaryattacklockreset +.SH DESCRIPTION +dictionaryattacklockreset +.PP +Runs TPM2_DictionaryAttackLockReset +.TP +[\-pwd +lockout auth password (default empty)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.1 new file mode 100644 index 000000000..8b7d5a6e8 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssdictionaryattackparameters.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH DICTIONARYATTACKPARAMETERS "1" "March 2020" "dictionaryattackparameters 1.3" "User Commands" +.SH NAME +dictionaryattackparameters \- Runs TPM2 dictionaryattackparameters +.SH DESCRIPTION +dictionaryattackparameters +.PP +Runs TPM2_DictionaryAttackParameters +.TP +[\-pwd +lockout auth password (default empty)] +.TP +[\-nmt +new max tries (default 1 try)] +.TP +[\-nrt +new recovery time (default 10 seconds)] +.TP +[\-lr +lockout recovery (default 1 second)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.1 new file mode 100644 index 000000000..c6b63bdcc --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssduplicate.1 @@ -0,0 +1,43 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH DUPLICATE "1" "March 2020" "duplicate 1.3" "User Commands" +.SH NAME +duplicate \- Runs TPM2 duplicate +.SH DESCRIPTION +duplicate +.PP +Runs TPM2_Duplicate +.TP +\fB\-ho\fR +object handle +.TP +[\-pwdo +password for object (default empty)] +.TP +[\-hp +new parent handle (default TPM_RH_NULL)] +.TP +[\-ik +encryption key in file name] +.TP +[\-salg +symmetric algorithm (aes)(default none)] +.TP +[\-oek +encryption key out file name (default do not save)] +.TP +[\-od +duplicate private area file name (default do not save)] +.TP +[\-oss +symmetric seed file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.1 new file mode 100644 index 000000000..00570e5fc --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseccparameters.1 @@ -0,0 +1,16 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH ECCPARAMETERS "1" "March 2020" "eccparameters 1.3" "User Commands" +.SH NAME +eccparameters \- Runs TPM2 eccparameters +.SH DESCRIPTION +eccparameters +.PP +Runs TPM2_ECC_Parameters +.TP +\fB\-cv\fR +curve ID +bnp256 +nistp256 +nistp384 +.IP +[\-of data file, ECC parameters (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.1 new file mode 100644 index 000000000..d25de4d09 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssecephemeral.1 @@ -0,0 +1,20 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH ECEPHEMERAL "1" "March 2020" "ecephemeral 1.3" "User Commands" +.SH NAME +ecephemeral \- Runs TPM2 ecephemeral +.SH DESCRIPTION +ecephmeral +.PP +Runs TPM2_EC_Ephemeral +.TP +\fB\-ecc\fR +curve +bnp256 +nistp256 +nistp384 +.TP +[\-oq +output Q ephemeral public key file name (default do not save)] +.TP +[\-cf +output counter file name (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.1 new file mode 100644 index 000000000..413f86ceb --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssencryptdecrypt.1 @@ -0,0 +1,37 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH ENCRYPTDECRYPT "1" "March 2020" "encryptdecrypt 1.3" "User Commands" +.SH NAME +encryptdecrypt \- Runs TPM2 encryptdecrypt +.SH DESCRIPTION +encryptdecrypt +.PP +Runs TPM2_EncryptDecrypt +.TP +\fB\-hk\fR +key handle +.TP +\fB\-pwdk\fR +password for key (default empty) +.TP +\fB\-d\fR +decrypt (default encrypt) +.TP +\fB\-if\fR +input file name +.TP +[\-of +output file name (default do not save)] +.TP +[\-2 +use TPM2_EncryptDecrypt2] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.1 new file mode 100644 index 000000000..2ff2b42db --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventextend.1 @@ -0,0 +1,29 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH EVENTEXTEND "1" "March 2020" "eventextend 1.3" "User Commands" +.SH NAME +eventextend \- Runs TPM2 eventextend +.SH SYNOPSIS +.B eventextend +\fI\,-if <measurement file> \/\fR[\fI\,-v\/\fR] +.SH DESCRIPTION +Extends a measurement file (binary) into a TPM or simulated PCRs +.TP +\fB\-if\fR +file containing the data to be extended +.TP +[\-nospec +file does not contain spec ID header (useful for incremental test)] +.TP +[\-tpm +extend TPM PCRs] +.TP +[\-sim +calculate simulated PCRs and boot aggregate] +.TP +[\-pcrmax +with \fB\-sim\fR, sets the highest PCR number to be used to calculate the +.IP +boot aggregate (default 7)] +.TP +[\-ns +no space, no text, no newlines] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.1 new file mode 100644 index 000000000..9e1c6be2b --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsseventsequencecomplete.1 @@ -0,0 +1,40 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH EVENTSEQUENCECOMPLETE "1" "March 2020" "eventsequencecomplete 1.3" "User Commands" +.SH NAME +eventsequencecomplete \- Runs TPM2 eventsequencecomplete +.SH DESCRIPTION +eventsequencecomplete +.PP +Runs TPM2_EventSequenceComplete +.TP +[\-ha +pcr handle (default NULL)] +.TP +\fB\-hs\fR +sequence handle +.TP +[\-pwds +password for sequence (default empty)] +.TP +[\-if +input file to be added (default no data)] +.TP +[\-of1 +sha1 output digest file (default do not save)] +.TP +[\-of2 +sha256 output digest file (default do not save)] +.TP +[\-of3 +sha384 output digest file (default do not save)] +.TP +[\-of5 +sha512 output digest file (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.1 new file mode 100644 index 000000000..3e974b1be --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssevictcontrol.1 @@ -0,0 +1,29 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH EVICTCONTROL "1" "March 2020" "evictcontrol 1.3" "User Commands" +.SH NAME +evictcontrol \- Runs TPM2 evictcontrol +.SH DESCRIPTION +evictcontrol +.PP +Runs TPM2_EvictControl +.TP +\fB\-hi\fR +authhandle hierarchy (o, p) +o owner, p platform +.TP +\fB\-ho\fR +object handle +if transient: make persistent, if persistent: flush +.TP +\fB\-hp\fR +persistent handle +owner 81000000 to 817FFFFF +platform 81800000 to 81FFFFFF +.TP +\fB\-pwda\fR +authorization password (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.1 new file mode 100644 index 000000000..76bcba67a --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssflushcontext.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH FLUSHCONTEXT "1" "March 2020" "flushcontext 1.3" "User Commands" +.SH NAME +flushcontext \- Runs TPM2 flushcontext +.SH DESCRIPTION +flushcontext +.PP +Runs TPM2_FlushContext +.TP +\fB\-ha\fR +handle diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.1 new file mode 100644 index 000000000..d4f8e9751 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcapability.1 @@ -0,0 +1,58 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETCAPABILITY "1" "March 2020" "getcapability 1.3" "User Commands" +.SH NAME +getcapability \- Runs TPM2 getcapability +.SH DESCRIPTION +getcapability +.PP +Runs TPM2_GetCapability +.TP +\fB\-cap\fR +capability +.TP +\fB\-pr\fR +property (defaults to 0) +.TP +\fB\-pc\fR +propertyCount (defaults to 64) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +80 +command audit +.TP +\fB\-cap\fR +values +.TP +TPM_CAP_ALGS +0 +.TP +TPM_CAP_HANDLES +1 +.TP +TPM_CAP_COMMANDS +2 +.TP +TPM_CAP_PP_COMMANDS +3 +.TP +TPM_CAP_AUDIT_COMMANDS +4 +.TP +TPM_CAP_PCRS +5 +.TP +TPM_CAP_TPM_PROPERTIES +6 +.TP +TPM_CAP_PCR_PROPERTIES +7 +.TP +TPM_CAP_ECC_CURVES +8 +.TP +TPM_CAP_AUTH_POLICIES +9 diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.1 new file mode 100644 index 000000000..82770116a --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcommandauditdigest.1 @@ -0,0 +1,43 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETCOMMANDAUDITDIGEST "1" "March 2020" "getcommandauditdigest 1.3" "User Commands" +.SH NAME +getcommandauditdigest \- Runs TPM2 getcommandauditdigest +.SH DESCRIPTION +getcommandauditdigest +.PP +Runs TPM2_GetCommandAuditDigest +.TP +[\-pwde +endorsement hierarchy password (default empty)] +.TP +\fB\-hk\fR +signing key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc, hmac) (default rsa)] +.TP +[\-qd +qualifying data file name] +.TP +[\-os +signature file name (default do not save)] +.TP +[\-oa +attestation output file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.1 new file mode 100644 index 000000000..e02e98c49 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetcryptolibrary.1 @@ -0,0 +1,10 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETCRYPTOLIBRARY "1" "March 2020" "getcryptolibrary 1.3" "User Commands" +.SH NAME +getcryptolibrary \- Runs TPM2 getcryptolibrary +.SH DESCRIPTION +getcryptolibrary +.PP +Returns a string indicating the crypto library compiled in. +.PP +This is used within test scripts. diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.1 new file mode 100644 index 000000000..9118144b5 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetrandom.1 @@ -0,0 +1,29 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETRANDOM "1" "March 2020" "getrandom 1.3" "User Commands" +.SH NAME +getrandom \- Runs TPM2 getrandom +.SH DESCRIPTION +getrandom +.PP +Runs TPM2_GetRandom +.TP +\fB\-by\fR +bytes requested +.TP +[\-of +output file, with \fB\-nz\fR, appends nul terminator (default do not save)] +.TP +[\-nz +get random number with no zero bytes (for authorization value)] +.TP +[\-ns +no space, no text, no newlines] +just a string of hexascii suitable for a symmetric key +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.1 new file mode 100644 index 000000000..80ad6fcd9 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgetsessionauditdigest.1 @@ -0,0 +1,46 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETSESSIONAUDITDIGEST "1" "March 2020" "getsessionauditdigest 1.3" "User Commands" +.SH NAME +getsessionauditdigest \- Runs TPM2 getsessionauditdigest +.SH DESCRIPTION +getsessionauditdigest +.PP +Runs TPM2_GetSessionAuditDigest +.TP +[\-pwde +endorsement hierarchy password (default empty)] +.TP +[\-hk +signing key handle] +.TP +[\-pwdk +password for key (default empty)] +.TP +\fB\-hs\fR +audit session handle +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-qd +qualifying data file name] +.TP +[\-os +signature file name (default do not save)] +.TP +[\-oa +attestation output file name (default do not save)] +.TP +[\-od +session digest file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.1 new file mode 100644 index 000000000..324fd58e0 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettestresult.1 @@ -0,0 +1,16 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETTESTRESULT "1" "March 2020" "gettestresult 1.3" "User Commands" +.SH NAME +gettestresult \- Runs TPM2 gettestresult +.SH DESCRIPTION +gettestresult +.PP +Runs TPM2_GetTestResult +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.1 new file mode 100644 index 000000000..c35250c23 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssgettime.1 @@ -0,0 +1,43 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH GETTIME "1" "March 2020" "gettime 1.3" "User Commands" +.SH NAME +gettime \- Runs TPM2 gettime +.SH DESCRIPTION +gettime +.PP +Runs TPM2_GetTime +.TP +\fB\-hk\fR +signing key handle +.TP +[\-pwdk +password for signing key (default empty)] +.TP +[\-pwde +password for endorsement hierarchy (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc, hmac) (default rsa)] +.TP +[\-qd +qualifying data file name] +.TP +[\-os +signature file name (default do not save)] +.TP +[\-oa +attestation output file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.1 new file mode 100644 index 000000000..8d4ba02b2 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshash.1 @@ -0,0 +1,30 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH HASH "1" "March 2020" "hash 1.3" "User Commands" +.SH NAME +hash \- Runs TPM2 hash +.SH DESCRIPTION +hash +.PP +Runs TPM2_Hash +.TP +[\-hi +hierarchy (e, o, p, n) (default null)] +e endorsement, o owner, p platform, n null +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +\fB\-if\fR +input file to be hashed +.TP +\fB\-ic\fR +data string to be hashed +.TP +[\-ns +no space, no text, no newlines] +.TP +[\-oh +hash file name (default do not save)] +.TP +[\-tk +ticket file name (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.1 new file mode 100644 index 000000000..a662389e3 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshashsequencestart.1 @@ -0,0 +1,23 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH HASHSEQUENCESTART "1" "March 2020" "hashsequencestart 1.3" "User Commands" +.SH NAME +hashsequencestart \- Runs TPM2 hashsequencestart +.SH DESCRIPTION +hashsequencestart +.PP +Runs TPM2_HashSequenceStart +.TP +[\-pwda +password for sequence (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512, null) (default sha256)] +null is an event sequence +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.1 new file mode 100644 index 000000000..2ea40c211 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchychangeauth.1 @@ -0,0 +1,32 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH HIERARCHYCHANGEAUTH "1" "March 2020" "hierarchychangeauth 1.3" "User Commands" +.SH NAME +hierarchychangeauth \- Runs TPM2 hierarchychangeauth +.SH DESCRIPTION +hierarchychangeauth +.PP +Runs TPM2_HierarchyChangeAuth +.TP +\fB\-hi\fR +hierarchy (l, e, o, p) +l lockout, e endorsement, o owner, p platform +.TP +\fB\-pwdn\fR +new authorization password (default empty) +.TP +\fB\-pwdni\fR +new authorization password file name (default empty) +.TP +\fB\-pwda\fR +authorization password (default empty) +.TP +\fB\-pwdai\fR +authorization password file name (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.1 new file mode 100644 index 000000000..562bc0941 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshierarchycontrol.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH HIERARCHYCONTROL "1" "March 2020" "hierarchycontrol 1.3" "User Commands" +.SH NAME +hierarchycontrol \- Runs TPM2 hierarchycontrol +.SH DESCRIPTION +hierarchycontrol +.PP +Runs TPM2_HierarchyControl +.TP +\fB\-hi\fR +authhandle hierarchy (e, o, p) +.TP +\fB\-he\fR +enable hierarchy (e, o, p, n) +e endorsement, o owner, p platform, n null +.TP +[\-pwda +authorization password (default empty)] +.IP +[\-state (0 to disable, 1 to enable) (default enable)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.1 new file mode 100644 index 000000000..eecff00a4 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmac.1 @@ -0,0 +1,37 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH HMAC "1" "March 2020" "hmac 1.3" "User Commands" +.SH NAME +hmac \- Runs TPM2 hmac +.SH DESCRIPTION +hmac +.PP +Runs TPM2_HMAC +.TP +\fB\-hk\fR +key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +\fB\-if\fR +input file to be HMACed +.TP +\fB\-ic\fR +data string to be HMACed +.TP +[\-os +hmac file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.1 new file mode 100644 index 000000000..17be09a4c --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsshmacstart.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH HMACSTART "1" "March 2020" "hmacstart 1.3" "User Commands" +.SH NAME +hmacstart \- Runs TPM2 hmacstart +.SH DESCRIPTION +hmacstart +.PP +Runs TPM2_Hmac_Start +.TP +\fB\-hk\fR +key handle +.TP +\fB\-pwdk\fR +password for key (default empty) +.TP +\fB\-pwda\fR +password for sequence (default empty) +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.1 new file mode 100644 index 000000000..fde17c3c7 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimaextend.1 @@ -0,0 +1,37 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH IMAEXTEND "1" "March 2020" "imaextend 1.3" "User Commands" +.SH NAME +imaextend \- Runs TPM2 imaextend +.SH DESCRIPTION +imaextend +.PP +Runs TPM2_PCR_Extend to Extend a SHA\-1 IMA measurement file (binary) into TPM PCRs +The IMA measurement is directly extended into the SHA\-1 bank, and a zero padded +measurement is extended into the SHA\-256 bank +.PP +This handles the case where a zero measurement extends ones into the IMA PCR +.PP +If \fB\-sim\fR is specified, TPM PCRs are not extended. Rather, imaextend extends into +simluated PCRs and traces the result. +.TP +\fB\-if\fR +IMA event log file name +.TP +[\-le +input file is little endian (default big endian)] +.TP +[\-sim +calculate simulated PCRs] +.TP +[\-b +beginning entry (default 0, beginning of log)] +A beginning entry after the end of the log becomes a noop +.TP +[\-e +ending entry (default end of log)] +E.g., \fB\-b\fR 0 \fB\-e\fR 0 sends one entry +.TP +[\-l +time \- run in a continuous loop, with a sleep of 'time' seconds betwteen loops] +The intent is that this be run without specifying \fB\-b\fR and \fB\-e\fR +Afer each pass, the next beginning entry is set to the last entry +1 diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.1 new file mode 100644 index 000000000..212667392 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimport.1 @@ -0,0 +1,43 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH IMPORT "1" "March 2020" "import 1.3" "User Commands" +.SH NAME +import \- Runs TPM2 import +.SH DESCRIPTION +import +.PP +Runs TPM2_Import +.TP +\fB\-hp\fR +parent handle +.TP +[\-pwdp +password for parent (default empty)] +.TP +[\-ik +encryption key in file name] +.TP +\fB\-ipu\fR +object public area file name +.TP +\fB\-id\fR +duplicate file name +.TP +\fB\-iss\fR +symmetric seed file name +.TP +[\-salg +symmetric algorithm (default none)] +.TP +\fB\-opr\fR +private area file name +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.1 new file mode 100644 index 000000000..d0195a9fc --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssimportpem.1 @@ -0,0 +1,66 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH IMPORTPEM "1" "March 2020" "importpem 1.3" "User Commands" +.SH NAME +importpem \- Runs TPM2 importpem +.SH DESCRIPTION +importpem +.PP +Runs TPM2_Import for a PEM key +.TP +\fB\-hp\fR +parent handle +.TP +[\-pwdp +password for parent (default empty)] +.TP +\fB\-ipem\fR +PEM format key pair +.IP +[Asymmetric Key Algorithm] +.TP +[\-rsa +(default)] +.TP +[\-ecc +] +.TP +[\-si +signing (default)] +.TP +[\-scheme +signing scheme (rsassa rsapss) (RSA default RSASSA) (ECC ECDSA)] +.TP +[\-st +storage (NULL scheme)] +.TP +[\-den +decryption, (unrestricted, RSA and ECC NULL scheme) +.TP +[\-pwdk +password for key (default empty)] +.TP +\fB\-opu\fR +public area file name +.TP +\fB\-opr\fR +private area file name +.TP +[\-nalg +name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-halg +scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-pol +policy file (default empty)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.1 new file mode 100644 index 000000000..fb5165e1c --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssload.1 @@ -0,0 +1,31 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH LOAD "1" "March 2020" "load 1.3" "User Commands" +.SH NAME +load \- Runs TPM2 load +.SH DESCRIPTION +load +.PP +Runs TPM2_Load +.TP +\fB\-hp\fR +parent handle +.TP +[\-pwdp +password for parent key (default empty)] +.TP +\fB\-ipu\fR +public key file name +.TP +\fB\-ipr\fR +private key file name +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.1 new file mode 100644 index 000000000..5fa80d723 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssloadexternal.1 @@ -0,0 +1,73 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH LOADEXTERNAL "1" "December 2019" "loadexternal 1546" "User Commands" +.SH NAME +loadexternal \- Runs TPM2 loadexternal +.SH DESCRIPTION +loadexternal +.PP +Runs TPM2_LoadExternal +.TP +[\-hi +hierarchy (e, o, p, n) (default NULL)] +.TP +[\-nalg +name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-halg +scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.IP +[Asymmetric Key Algorithm] +.TP +[\-rsa +(default)] +.TP +[\-ecc +] +.TP +\fB\-ipu\fR +TPM2B_PUBLIC public key file name +.TP +\fB\-ipem\fR +PEM format public key file name +.TP +\fB\-ider\fR +DER format plaintext key pair file name +.TP +[\-pwdk +password for DER key (default empty)] +.TP +[\-uwa +userWithAuth attribute clear (default set)] +.TP +[\-si +signing (default) RSA] +.TP +[\-scheme +for signing key (default RSASSA scheme)] +.IP +rsassa +rsapss +.TP +[\-st +storage (default NULL scheme)] +.TP +[\-den +decryption, (unrestricted, RSA and EC NULL scheme) +.TP +[\-ns +additionally print Name in hex ascii on one line] +Useful to paste into policy +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt +.TP +80 +audit diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.1 new file mode 100644 index 000000000..86cad501b --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssmakecredential.1 @@ -0,0 +1,34 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH MAKECREDENTIAL "1" "March 2020" "makecredential 1.3" "User Commands" +.SH NAME +makecredential \- Runs TPM2 makecredential +.SH DESCRIPTION +makecredential +.PP +Runs TPM2_MakeCredential +.TP +\fB\-ha\fR +handle of encryption key public area +.TP +\fB\-icred\fR +input credential file name +.TP +\fB\-in\fR +object name file name +.TP +[\-ocred +output credential file name (default do not save)] +.TP +[\-os +secret file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle (default NULL) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.1 new file mode 100644 index 000000000..2a3d73cf0 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2getconfig.1 @@ -0,0 +1,19 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NTC2GETCONFIG "1" "March 2020" "ntc2getconfig 1.3" "User Commands" +.SH NAME +ntc2getconfig \- Runs TPM2 ntc2getconfig +.SH DESCRIPTION +ntc2getconfig +.PP +Runs NTC2_GetConfig +.TP +[\-verify +Verify results against System P default (default no verify)] +.TP +[\-verifylocked +Also verify that the preconfig is locked +.IP +(default verify not locked)] +.TP +[\-p8 or \fB\-p9\fR +Verify Nuvoton TPM for P8 or P9] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.1 new file mode 100644 index 000000000..1d28ca233 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2lockconfig.1 @@ -0,0 +1,10 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NTC2LOCKCONFIG "1" "March 2020" "ntc2lockconfig 1.3" "User Commands" +.SH NAME +ntc2lockconfig \- Runs TPM2 ntc2lockconfig +.SH DESCRIPTION +ntc2lockpreconfig +.PP +Runs NTC2_LockPreConfig +.PP +\fB\-lock\fR (required) diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.1 new file mode 100644 index 000000000..01ff67719 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssntc2preconfig.1 @@ -0,0 +1,67 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NTC2PRECONFIG "1" "March 2020" "ntc2preconfig 1.3" "User Commands" +.SH NAME +ntc2preconfig \- Runs TPM2 ntc2preconfig +.SH DESCRIPTION +ntc2preconfig +.PP +Runs NTC2_PreConfig +.TP +\fB\-p8\fR or \fB\-p9\fR +Configure Nuvoton TPM for P8 or P9 +.TP +\fB\-override\fR +permits individual register values, read\-modify\-write +.PP +Values to set, each is a hex byte, (default do not change) +.TP +[\-i2cLoc1_2 +byte] +.TP +[\-i2cLoc3_4 +byte] +.TP +[\-AltCfg +byte] +.TP +[\-Direction +byte] +.TP +[\-PullUp +byte] +.TP +[\-PushPull +byte] +.TP +[\-CFG_A +byte] +.TP +[\-CFG_B +byte] +.TP +[\-CFG_C +byte] +.TP +[\-CFG_D +byte] +.TP +[\-CFG_E +byte] +.TP +[\-CFG_F +byte] +.TP +[\-CFG_G +byte] +.TP +[\-CFG_H +byte] +.TP +[\-CFG_I +byte] +.TP +[\-CFG_J +byte] +.TP +[\-IsValid +byte] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.1 new file mode 100644 index 000000000..6b513f336 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvcertify.1 @@ -0,0 +1,52 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVCERTIFY "1" "March 2020" "nvcertify 1.3" "User Commands" +.SH NAME +nvcertify \- Runs TPM2 nvcertify +.SH DESCRIPTION +nvcertify +.PP +Runs TPM2_NV_Certify +.TP +\fB\-ha\fR +NV index handle +.TP +[\-pwdn +password for NV index (default empty)] +.TP +\fB\-hk\fR +certifying key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc, hmac) (default rsa)] +.TP +\fB\-sz\fR +data size +.TP +[\-off +offset (default 0)] +.TP +[\-os +signature file name (default do not save)] +.TP +[\-oa +attestation output file name (default do not save)] +.TP +[\-od +certified data file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.1 new file mode 100644 index 000000000..76a14da43 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvchangeauth.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVCHANGEAUTH "1" "March 2020" "nvchangeauth 1.3" "User Commands" +.SH NAME +nvchangeauth \- Runs TPM2 nvchangeauth +.SH DESCRIPTION +nvchangeauth +.PP +Runs TPM2_NV_ChangeAuth +.TP +\fB\-ha\fR +NV index handle +.TP +\fB\-pwdo\fR +password (default empty) +.TP +\fB\-pwdn\fR +new password (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1 new file mode 100644 index 000000000..1e979f747 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvdefinespace.1 @@ -0,0 +1,101 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVDEFINESPACE "1" "March 2020" "nvdefinespace 1.3" "User Commands" +.SH NAME +nvdefinespace \- Runs TPM2 nvdefinespace +.SH DESCRIPTION +nvdefinespace +.PP +Runs TPM2_NV_DefineSpace +.TP +\fB\-ha\fR +NV index handle +01xxxxxx +.TP +\fB\-hi\fR +authorizing hierarchy (o, p) +o owner, p platform +p sets PLATFORMCREATE +.TP +[\-pwdp +password for hierarchy (default empty)] +.TP +[\-hia +hierarchy authorization (o, p)(default index authorization)] +.TP +default +AUTHWRITE, AUTHREAD +.TP +o sets +OWNERWRITE, OWNERREAD +.TP +p sets +PPWRITE, PPREAD (platform) +.TP +[\-pwdn +password for NV index (default empty)] +sets AUTHWRITE (if not PIN index), AUTHREAD +.TP +[\-nalg +name algorithm (sha1, sha256, sha384 sha512) (default sha256)] +.TP +[\-sz +data size in decimal (default 0)] +Ignored for other than ordinary index +.TP +[\-ty +index type (o, c, b, e, p, f) (default ordinary)] +ordinary, counter, bits, extend, pin pass, pin fail +.TP +[\-pol +policy file (default empty)] +sets POLICYWRITE, POLICYREAD +.TP +[+at +attributes to add (may be specified more than once)] +.TP +ppw +(PPWRITE) ppr (PPREAD) +.TP +ow +(OWNERWRITE) or (OWNERREAD) +.TP +aw +(AUTHWRITE) ar (AUTHREAD) +.TP +wd +(WRITEDEFINE) gl (GLOBALLOCK) +.TP +rst +(READ_STCLEAR) wst (WRITE_STCLEAR) +.TP +wa +(WRITEALL) ody (ORDERLY) +.TP +pold +(POLICY_DELETE) stc (CLEAR_STCLEAR) +.TP +[\-at +attributes to delete (may be specified more than once)] +.TP +ppw +(PPWRITE) ppr (PPREAD) +.TP +ow +(OWNERWRITE) or (OWNERREAD) +.TP +aw +(AUTHWRITE) ar (AUTHREAD) +.TP +pw +(POLICYWRITE) pr (POLICYREAD) +.TP +da +(NO_DA) (default set) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.1 new file mode 100644 index 000000000..acd37bfe6 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvextend.1 @@ -0,0 +1,28 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVEXTEND "1" "March 2020" "nvextend 1.3" "User Commands" +.SH NAME +nvextend \- Runs TPM2 nvextend +.SH DESCRIPTION +nvextend +.PP +Runs TPM2_NV_Extend +.TP +\fB\-ha\fR +NV index handle +.TP +\fB\-pwdn\fR +password for NV index (default empty) +.TP +\fB\-ic\fR +data string +.TP +\fB\-if\fR +data file +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +20 +command decrypt +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.1 new file mode 100644 index 000000000..bc0b0b15d --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvglobalwritelock.1 @@ -0,0 +1,19 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVGLOBALWRITELOCK "1" "March 2020" "nvglobalwritelock 1.3" "User Commands" +.SH NAME +nvglobalwritelock \- Runs TPM2 nvglobalwritelock +.SH DESCRIPTION +nvglobalwritelock +.PP +Runs TPM2_NV_GlobalWriteLock +.TP +\fB\-hia\fR +hierarchy authorization (o, p) +.TP +[\-pwd +authorization password (default empty)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.1 new file mode 100644 index 000000000..4ce4e21e1 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvincrement.1 @@ -0,0 +1,19 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVINCREMENT "1" "March 2020" "nvincrement 1.3" "User Commands" +.SH NAME +nvincrement \- Runs TPM2 nvincrement +.SH DESCRIPTION +nvincrement +.PP +Runs TPM2_NV_Increment +.TP +\fB\-ha\fR +NV index handle +.TP +\fB\-pwdn\fR +password for NV index (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.1 new file mode 100644 index 000000000..83705c93d --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvread.1 @@ -0,0 +1,50 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVREAD "1" "March 2020" "nvread 1.3" "User Commands" +.SH NAME +nvread \- Runs TPM2 nvread +.SH DESCRIPTION +nvread +.PP +Runs TPM2_NV_Read +.TP +[\-hia +hierarchy authorization (o, p)(default index authorization)] +.TP +\fB\-ha\fR +NV index handle +.TP +[\-pwdn +password for NV index (default empty)] +.TP +[\-sz +data size (default to size of index)] +counter, bits, pin read 8 bytes, extend reads based on hash algorithm +.TP +[\-cert +dumps the certificate +.TP +01c00002 +RSA EK certificate +.TP +01c0000a +ECC EK certificate +.TP +[\-ocert +certificate file name, writes in PEM format +.TP +[\-off +offset (default 0)] +.TP +[\-of +data file (default do not save)] +.TP +[\-id +data values for pinCount and pinLimit verification, (4 bytes each)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.1 new file mode 100644 index 000000000..64781e86d --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadlock.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVREADLOCK "1" "March 2020" "nvreadlock 1.3" "User Commands" +.SH NAME +nvreadlock \- Runs TPM2 nvreadlock +.SH DESCRIPTION +nvreadlock +.PP +Runs TPM2_NV_ReadLock +.TP +[\-hia +hierarchy authorization (o, p)(default index authorization)] +.TP +\fB\-ha\fR +NV index handle +.TP +\fB\-pwdn\fR +password for NV index (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.1 new file mode 100644 index 000000000..0b02f5315 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvreadpublic.1 @@ -0,0 +1,36 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVREADPUBLIC "1" "March 2020" "nvreadpublic 1.3" "User Commands" +.SH NAME +nvreadpublic \- Runs TPM2 nvreadpublic +.SH DESCRIPTION +nvreadpublic +.PP +Runs TPM2_NV_ReadPublic +.TP +\fB\-ha\fR +NV index handle +.TP +[\-nalg +expected name hash algorithm (sha1, sha256, sha384 sha512) +(default no check)] +.TP +[\-opu +NV public file name (default do not save)] +.TP +[\-ns +additionally print Name in hex ascii on one line] +.TP +[\-on +binary format Name file name] +Useful to paste into policy +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +40 +response encrypt +.TP +80 +audit diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.1 new file mode 100644 index 000000000..751700eff --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvsetbits.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVSETBITS "1" "March 2020" "nvsetbits 1.3" "User Commands" +.SH NAME +nvsetbits \- Runs TPM2 nvsetbits +.SH DESCRIPTION +nvsetbits +.PP +Runs TPM2_NV_SetBits +.TP +\fB\-ha\fR +NV index handle +.TP +[\-pwdn +password for NV index (default empty)] +.TP +[\-bit +bit to set, can be specified multiple times] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.1 new file mode 100644 index 000000000..b7cd10c8a --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespace.1 @@ -0,0 +1,23 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVUNDEFINESPACE "1" "March 2020" "nvundefinespace 1.3" "User Commands" +.SH NAME +nvundefinespace \- Runs TPM2 nvundefinespace +.SH DESCRIPTION +nvundefinespace +.PP +Runs TPM2_NV_UndefineSpace +.TP +\fB\-hi\fR +hierarchy (o, p) +o owner, p platform +.TP +\fB\-ha\fR +NV index handle +.TP +\fB\-pwdp\fR +password for hierarchy (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.1 new file mode 100644 index 000000000..6b03a44a1 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvundefinespacespecial.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVUNDEFINESPACESPECIAL "1" "March 2020" "nvundefinespacespecial 1.3" "User Commands" +.SH NAME +nvundefinespacespecial \- Runs TPM2 nvundefinespacespecial +.SH DESCRIPTION +nvundefinespacespecial +.PP +Runs TPM2_NV_UndefineSpaceSpecial +.TP +\fB\-ha\fR +NV index handle +.TP +[\-pwdp +password for platform (default empty)] +.TP +[\-pwdn +password for NV index (default empty)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.1 new file mode 100644 index 000000000..4601a293b --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwrite.1 @@ -0,0 +1,40 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVWRITE "1" "March 2020" "nvwrite 1.3" "User Commands" +.SH NAME +nvwrite \- Runs TPM2 nvwrite +.SH DESCRIPTION +nvwrite +.PP +Runs TPM2_NV_Write +.TP +[\-hia +hierarchy authorization (o, p)(default index authorization)] +.TP +\fB\-ha\fR +NV index handle +.TP +[\-pwdn +authorization password (default empty)] +hierarchy or NV index password +.TP +[\-ic +data string] +.TP +[\-if +data file] +.TP +[\-id +data values, pinPass and pinLimit (4 bytes each)] +if none is specified, a 0 byte write occurs +\fB\-id\fR is normally used for pin pass or pin fail indexes +.TP +[\-off +offset (default 0)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +20 +command decrypt +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.1 new file mode 100644 index 000000000..a43117bc4 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssnvwritelock.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH NVWRITELOCK "1" "March 2020" "nvwritelock 1.3" "User Commands" +.SH NAME +nvwritelock \- Runs TPM2 nvwritelock +.SH DESCRIPTION +nvwritelock +.PP +Runs TPM2_NV_WriteLock +.TP +[\-hia +hierarchy authorization (o, p) (default index authorization)] +.TP +\fB\-ha\fR +NV index handle +.TP +\fB\-pwdn\fR +password for NV index (default empty) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.1 new file mode 100644 index 000000000..97ca7fb05 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssobjectchangeauth.1 @@ -0,0 +1,34 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH OBJECTCHANGEAUTH "1" "March 2020" "objectchangeauth 1.3" "User Commands" +.SH NAME +objectchangeauth \- Runs TPM2 objectchangeauth +.SH DESCRIPTION +objectchangeauth +.PP +Runs TPM2_ObjectChangeAuth +.TP +\fB\-hp\fR +parent handle +.TP +\fB\-ho\fR +object handle +.TP +[\-pwdo +password for object (default empty)] +.TP +[\-pwdn +new password for object (default empty)] +.IP +[\-pwdni new password file for object, nul terminated (default empty)] +[\-opr private key file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.1 new file mode 100644 index 000000000..378e21e14 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrallocate.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PCRALLOCATE "1" "March 2020" "pcrallocate 1.3" "User Commands" +.SH NAME +pcrallocate \- Runs TPM2 pcrallocate +.SH DESCRIPTION +pcrallocate +.PP +Runs TPM2_PCR_Allocate +.PP +Allocates banks for a full set of PCR 0\-23. Not all +hardware TPMs support multiple banks or all algorithms +.TP +[\-pwdp +platform hierarchy password (default empty)] +.TP ++sha1 \fB\-sha1\fR +allocate / deallocate a SHA\-1 bank +.HP ++sha256 \fB\-sha256\fR allocate / deallocate a SHA\-256 bank +.HP ++sha384 \fB\-sha384\fR allocate / deallocate a SHA\-384 bank +.HP ++sha512 \fB\-sha512\fR allocate / deallocate a SHA\-512 bank +.IP +More than one algorithm can be specified diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.1 new file mode 100644 index 000000000..fa5f5449f --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrevent.1 @@ -0,0 +1,29 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PCREVENT "1" "March 2020" "pcrevent 1.3" "User Commands" +.SH NAME +pcrevent \- Runs TPM2 pcrevent +.SH DESCRIPTION +pcrevent +.PP +Runs TPM2_PCR_Event +.TP +\fB\-ha\fR +pcr handle +.TP +\fB\-ic\fR +data string +.TP +\fB\-if\fR +data file +.TP +[\-of1 +sha1 output digest file (default do not save)] +.TP +[\-of2 +sha256 output digest file (default do not save)] +.TP +[\-of3 +sha384 output digest file (default do not save)] +.TP +[\-of5 +sha512 output digest file (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.1 new file mode 100644 index 000000000..fc4ac2c3a --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrextend.1 @@ -0,0 +1,21 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PCREXTEND "1" "March 2020" "pcrextend 1.3" "User Commands" +.SH NAME +pcrextend \- Runs TPM2 pcrextend +.SH DESCRIPTION +pcrextend +.PP +Runs TPM2_PCR_Extend +.TP +\fB\-ha\fR +pcr handle +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +\fB\-halg\fR may be specified more than once +.TP +\fB\-ic\fR +data string, 0 pad appended to halg length +.TP +\fB\-if\fR +data file, 0 pad appended to halg length diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.1 new file mode 100644 index 000000000..53aa8b674 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrread.1 @@ -0,0 +1,36 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PCRREAD "1" "March 2020" "pcrread 1.3" "User Commands" +.SH NAME +pcrread \- Runs TPM2 pcrread +.SH DESCRIPTION +pcrread +.PP +Runs TPM2_PCR_Read +.TP +\fB\-ha\fR +pcr handle +.TP +\fB\-halg\fR +(sha1, sha256, sha384, sha512) (default sha256) +\fB\-halg\fR may be specified more than once +.TP +[\-of +data file for first algorithm specified, in binary] +.TP +[\-ahalg +to extend session audit digest for testing (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-iosad +file for session audit digest testing] +.TP +[\-ns +no space, no text, no newlines] +Used for scripting policy construction +.HP +\fB\-se0\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +80 +audit diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.1 new file mode 100644 index 000000000..0c3b3bad9 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspcrreset.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PCRRESET "1" "March 2020" "pcrreset 1.3" "User Commands" +.SH NAME +pcrreset \- Runs TPM2 pcrreset +.SH DESCRIPTION +pcrreset +.PP +Runs TPM2_PCR_Reset +.TP +\fB\-ha\fR +pcr handle diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.1 new file mode 100644 index 000000000..de353ba5c --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorize.1 @@ -0,0 +1,31 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYAUTHORIZE "1" "March 2020" "policyauthorize 1.3" "User Commands" +.SH NAME +policyauthorize \- Runs TPM2 policyauthorize +.SH DESCRIPTION +policyauthorize +.PP +Runs TPM2_PolicyAuthorize +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-appr\fR +file name of digest of the policy being approved +.TP +[\-pref +policyRef file] (default none) +.TP +\fB\-skn\fR +signing key Name file name +.TP +\fB\-tk\fR +ticket file name +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +20 +command decrypt +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.1 new file mode 100644 index 000000000..a0590a694 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthorizenv.1 @@ -0,0 +1,26 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYAUTHORIZENV "1" "March 2020" "policyauthorizenv 1.3" "User Commands" +.SH NAME +policyauthorizenv \- Runs TPM2 policyauthorizenv +.SH DESCRIPTION +policyauthorizenv +.PP +Runs TPM2_PolicyAuthorizeNV +.TP +[\-hi +hierarchy authHandle (o, p)] +default NV index +.TP +\fB\-ha\fR +NV index handle +.TP +[\-pwda +password for authorization (default empty)] +.TP +\fB\-hs\fR +policy session handle +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.1 new file mode 100644 index 000000000..be7b87b7b --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyauthvalue.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYAUTHVALUE "1" "March 2020" "policyauthvalue 1.3" "User Commands" +.SH NAME +policyauthvalue \- Runs TPM2 policyauthvalue +.SH DESCRIPTION +policyauthvalue +.PP +Runs TPM2_PolicyAuthValue +.TP +\fB\-ha\fR +policy session handle diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.1 new file mode 100644 index 000000000..493958b32 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycommandcode.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYCOMMANDCODE "1" "March 2020" "policycommandcode 1.3" "User Commands" +.SH NAME +policycommandcode \- Runs TPM2 policycommandcode +.SH DESCRIPTION +policycommandcode +.PP +Runs TPM2_PolicyCommandCode +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-cc\fR +command code diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.1 new file mode 100644 index 000000000..5ca6245f3 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycountertimer.1 @@ -0,0 +1,67 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYCOUNTERTIMER "1" "March 2020" "policycountertimer 1.3" "User Commands" +.SH NAME +policycountertimer \- Runs TPM2 policycountertimer +.SH DESCRIPTION +policycountertimer +.PP +Runs TPM2_PolicyCounterTimer +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-ic\fR +data string (operandB) +.TP +\fB\-if\fR +data file (operandB) +.TP +[\-off +offset (default 0)] +.TP +\fB\-op\fR +operation (default A = B) +.TP +0 +A = B +.TP +1 +A != B +.TP +2 +A > B signed +.TP +3 +A > B unsigned +.TP +4 +A < B signed +.TP +5 +A < B unsigned +.TP +6 +A >= B signed +.TP +7 +A >= B unsigned +.TP +8 +A <= B signed +.TP +9 +A <= B unsigned +.TP +A +All bits SET in B are SET in A. ((A&B)=B) +.TP +B +All bits SET in B are CLEAR in A. ((A&B)=0) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.1 new file mode 100644 index 000000000..ce9d50265 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicycphash.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYCPHASH "1" "March 2020" "policycphash 1.3" "User Commands" +.SH NAME +policycphash \- Runs TPM2 policycphash +.SH DESCRIPTION +policycphash +.PP +Runs TPM2_PolicyCpHash +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-cp\fR +cpHash file +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.1 new file mode 100644 index 000000000..f7b5543c5 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyduplicationselect.1 @@ -0,0 +1,28 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYDUPLICATIONSELECT "1" "March 2020" "policyduplicationselect 1.3" "User Commands" +.SH NAME +policyduplicationselect \- Runs TPM2 policyduplicationselect +.SH DESCRIPTION +policyduplicationselect +.PP +Runs TPM2_PolicyDuplicationSelect +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-inpn\fR +new parent Name file +.TP +\fB\-ion\fR +object Name file +.TP +[\-io +include object (default no) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.1 new file mode 100644 index 000000000..a7cb83ee5 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicygetdigest.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYGETDIGEST "1" "March 2020" "policygetdigest 1.3" "User Commands" +.SH NAME +policygetdigest \- Runs TPM2 policygetdigest +.SH DESCRIPTION +policygetdigest +.PP +Runs TPM2_PolicyGetDigest +.TP +\fB\-ha\fR +policy session handle +.TP +[\-of +binary digest file name (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.1 new file mode 100644 index 000000000..cb4476591 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymaker.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYMAKER "1" "March 2020" "policymaker 1.3" "User Commands" +.SH NAME +policymaker \- Runs TPM2 policymaker +.SH DESCRIPTION +policymaker +.TP +[\-halg +hash algorithm (sha1 sha256 sha384 sha512) (default sha256)] +.TP +[\-nz +do not extend starting with zeros, just hash the last line] +.TP +\fB\-if\fR +input policy statements in hex ascii +.TP +[\-of +output file \- policy hash in binary] +.TP +[\-pr +stdout \- policy hash in hex ascii] +.TP +[\-ns +additionally print policy hash in hex ascii on one line] +Useful to paste into policy OR diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.1 new file mode 100644 index 000000000..a4f5d0912 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicymakerpcr.1 @@ -0,0 +1,29 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYMAKERPCR "1" "March 2020" "policymakerpcr 1.3" "User Commands" +.SH NAME +policymakerpcr \- Runs TPM2 policymakerpcr +.SH DESCRIPTION +policymakerpcr +.PP +Creates a policyPCR term suitable for input to policymaker (hex ascii) +.PP +Assumes that the byte mask and PCR values are consistent +.TP +[\-halg +hash algorithm (sha1 sha256 sha384 sha512) (default sha256)] +.TP +\fB\-bm\fR +pcr byte mask in hex, big endian +.IP +e.g. 010000 selects PCR 16 +e.g. ffffff selects all 24 PCRs +.HP +\fB\-if\fR input file \- PCR values, hex ascii, one per line, 24 max +.IP +required unless pcr mask is 0 +.TP +[\-of +output file \- policy hash in binary] +.TP +[\-pr +stdout \- policy hash in hex ascii] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.1 new file mode 100644 index 000000000..e53129193 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynamehash.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYNAMEHASH "1" "March 2020" "policynamehash 1.3" "User Commands" +.SH NAME +policynamehash \- Runs TPM2 policynamehash +.SH DESCRIPTION +policynamehash +.PP +Runs TPM2_PolicyNameHash +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-nh\fR +NameHash file \- TPM2B_DIGEST +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.1 new file mode 100644 index 000000000..aa3b8bba8 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynv.1 @@ -0,0 +1,77 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYNV "1" "March 2020" "policynv 1.3" "User Commands" +.SH NAME +policynv \- Runs TPM2 policynv +.SH DESCRIPTION +policynv +.PP +Runs TPM2_PolicyNV +.TP +[\-hi +hierarchy authHandle (o, p)] +default NV index +.TP +\fB\-ha\fR +NV index handle (operand A) +.TP +[\-pwda +password for authorization (default empty)] +.TP +\fB\-hs\fR +policy session handle +.TP +\fB\-ic\fR +data string (operandB) +.TP +\fB\-if\fR +data file (operandB) +.TP +[\-off +offset (default 0)] +.TP +\fB\-op\fR +operation (default A = B) +.TP +0 +A = B +.TP +1 +A != B +.TP +2 +A > B signed +.TP +3 +A > B unsigned +.TP +4 +A < B signed +.TP +5 +A < B unsigned +.TP +6 +A >= B signed +.TP +7 +A >= B unsigned +.TP +8 +A <= B signed +.TP +9 +A <= B unsigned +.TP +A +All bits SET in B are SET in A. ((A&B)=B) +.TP +B +All bits SET in B are CLEAR in A. ((A&B)=0) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.1 new file mode 100644 index 000000000..d570574ca --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicynvwritten.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYNVWRITTEN "1" "March 2020" "policynvwritten 1.3" "User Commands" +.SH NAME +policynvwritten \- Runs TPM2 policynvwritten +.SH DESCRIPTION +policynvwritten +.PP +Runs TPM2_PolicyNvWritten +.TP +\fB\-hs\fR +policy session handle +.TP +\fB\-ws\fR +written set (y, n) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +80 +audit diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.1 new file mode 100644 index 000000000..100b2203f --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyor.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYOR "1" "March 2020" "policyor 1.3" "User Commands" +.SH NAME +policyor \- Runs TPM2 policyor +.SH DESCRIPTION +policyor +.PP +Runs TPM2_PolicyOR +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-if\fR +policy digest file (2\-8 \fB\-if\fR specifiers required) diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.1 new file mode 100644 index 000000000..de0086333 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypassword.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYPASSWORD "1" "March 2020" "policypassword 1.3" "User Commands" +.SH NAME +policypassword \- Runs TPM2 policypassword +.SH DESCRIPTION +policypassword +.PP +Runs TPM2_PolicyPassword +.TP +\fB\-ha\fR +policy session handle diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.1 new file mode 100644 index 000000000..3cc608c8f --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicypcr.1 @@ -0,0 +1,18 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYPCR "1" "March 2020" "policypcr 1.3" "User Commands" +.SH NAME +policypcr \- Runs TPM2 policypcr +.SH DESCRIPTION +policypcr +.PP +Runs TPM2_PolicyPCR +.TP +\fB\-ha\fR +policy session handle +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +\fB\-bm\fR +pcr mask in hex +e.g., \fB\-bm\fR 10000 is PCR 16, 000001 is PCR 0 diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.1 new file mode 100644 index 000000000..dae60fba5 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyrestart.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYRESTART "1" "March 2020" "policyrestart 1.3" "User Commands" +.SH NAME +policyrestart \- Runs TPM2 policyrestart +.SH DESCRIPTION +policyrestart +.PP +Runs TPM2_PolicyRestart +.TP +\fB\-ha\fR +policy session handle diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.1 new file mode 100644 index 000000000..8c7ba7d2f --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysecret.1 @@ -0,0 +1,46 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYSECRET "1" "March 2020" "policysecret 1.3" "User Commands" +.SH NAME +policysecret \- Runs TPM2 policysecret +.SH DESCRIPTION +policysecret +.PP +Runs TPM2_PolicySecret +.TP +\fB\-ha\fR +authorizing entity handle +.TP +\fB\-hs\fR +policy session handle +.TP +[\-in +nonceTPM file (default none)] +.TP +[\-cp +cpHash file (default none)] +.TP +[\-pref +policyRef file (default none)] +.TP +[\-exp +expiration (default none)] +.TP +[\-pwde +authorizing entity password (default empty)] +.TP +[\-tk +ticket file name] +.TP +[\-to +timeout file name] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.1 new file mode 100644 index 000000000..c0292de72 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicysigned.1 @@ -0,0 +1,46 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYSIGNED "1" "March 2020" "policysigned 1.3" "User Commands" +.SH NAME +policysigned \- Runs TPM2 policysigned +.SH DESCRIPTION +policysigned +.PP +Runs TPM2_PolicySigned +.TP +\fB\-hk\fR +signature verification key handle +.TP +\fB\-ha\fR +policy session handle +.TP +[\-in +nonceTPM file (default none)] +.TP +[\-cp +cpHash file (default none)] +.TP +[\-pref +policyRef file (default none)] +.TP +[\-exp +expiration in decimal (default none)] +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +\fB\-sk\fR +RSA signing key file name (PEM format) +Use this signing key. +.TP +\fB\-is\fR +signature file name +Use this signature from e.g., a smart card or other HSM. +.TP +[\-pwdk +signing key password (default null)] +.TP +[\-tk +ticket file name] +.TP +[\-to +timeout file name] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.1 new file mode 100644 index 000000000..669a83b7f --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicytemplate.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYTEMPLATE "1" "March 2020" "policytemplate 1.3" "User Commands" +.SH NAME +policytemplate \- Runs TPM2 policytemplate +.SH DESCRIPTION +policytemplate +.PP +Runs TPM2_PolicyTemplate +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-te\fR +template file diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.1 new file mode 100644 index 000000000..c078be8a6 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspolicyticket.1 @@ -0,0 +1,30 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POLICYTICKET "1" "March 2020" "policyticket 1.3" "User Commands" +.SH NAME +policyticket \- Runs TPM2 policyticket +.SH DESCRIPTION +policyticket +.PP +Runs TPM2_PolicyTicket +.TP +\fB\-ha\fR +policy session handle +.TP +\fB\-to\fR +timeout file name +.TP +[\-cp +cpHash file (default none)] +.TP +[\-pref +policyRef file (default none)] +.TP +\fB\-na\fR +authName file (not hierarchy) +.TP +\fB\-hi\fR +hierarchy (e, o, p) (authName is hierarchy) +e endorsement, o owner, p platform +.TP +\fB\-tk\fR +ticket file name diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.1 new file mode 100644 index 000000000..439ea1527 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspowerup.1 @@ -0,0 +1,8 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH POWERUP "1" "March 2020" "powerup 1.3" "User Commands" +.SH NAME +powerup \- Runs TPM2 powerup +.SH DESCRIPTION +powerup +.PP +Powers the simulator off and on, and powers up NV diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.1 new file mode 100644 index 000000000..235072933 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssprintattr.1 @@ -0,0 +1,16 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PRINTATTR "1" "March 2020" "printattr 1.3" "User Commands" +.SH NAME +printattr \- Runs TPM2 printattr +.SH DESCRIPTION +printattr +.PP +Prints TPMA attributes as text +.HP +\fB\-ob\fR TPMA_OBJECT +.HP +\fB\-se\fR TPMA_SESSION +.HP +\fB\-st\fR TPMA_STARTUP_CLEAR +.HP +\fB\-nv\fR TPMA_NV diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.1 new file mode 100644 index 000000000..4122ddc64 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsspublicname.1 @@ -0,0 +1,63 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH PUBLICNAME "1" "March 2020" "publicname 1.3" "User Commands" +.SH NAME +publicname \- Runs TPM2 publicname +.SH DESCRIPTION +publicname +.PP +Calculates the public name of an entity. There are times that a policy creator +has TPM, PEM, or DER format information, but does not have access to a TPM. +This utility accepts these inputs and outputs the name in the 'no spaces' +format suitable for pasting into a policy. The binary format is used in the +regression test +.TP +\fB\-invpu\fR +TPM2B_NV_PUBLIC public key file name +.TP +\fB\-ipu\fR +TPM2B_PUBLIC public key file name +.TP +\fB\-ipem\fR +PEM format public key file name +.TP +\fB\-ider\fR +DER format plaintext key pair file name] +.TP +[\-on +binary format Name file name] +.TP +[\-ns +print Name in hexacsii] +.IP +\fB\-pem\fR and \fB\-ider\fR optional arguments +.TP +[\-rsa +(default)] +.TP +[\-ecc +] +.TP +[\-scheme +for signing key (default RSASSA scheme)] +.IP +rsassa +rsapss +null +.TP +[\-nalg +name hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-halg +scheme hash algorithm (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-uwa +userWithAuth attribute clear (default set)] +.TP +[\-si +signing (default) RSA] +.TP +[\-st +storage (default NULL scheme)] +.TP +[\-den +decryption, (unrestricted, RSA and EC NULL scheme) diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.1 new file mode 100644 index 000000000..859fba576 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssquote.1 @@ -0,0 +1,46 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH QUOTE "1" "March 2020" "quote 1.3" "User Commands" +.SH NAME +quote \- Runs TPM2 quote +.SH DESCRIPTION +quote +.PP +Runs TPM2_Quote +.TP +\fB\-hp\fR +pcr handle (may be specified more than once) +.TP +\fB\-hk\fR +quoting key handle +.TP +[\-pwdk +password for quoting key (default empty)] +.TP +[\-halg +for signing (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-palg +for PCR bank selection (sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc, hmac) (default rsa)] +.TP +[\-qd +qualifying data file name] +.TP +[\-os +quote signature file name (default do not save)] +.TP +[\-oa +attestation output file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.1 new file mode 100644 index 000000000..01177121f --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadclock.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH READCLOCK "1" "March 2020" "readclock 1.3" "User Commands" +.SH NAME +readclock \- Runs TPM2 readclock +.SH DESCRIPTION +readclock +.PP +Runs TPM2_ReadClock +.TP +[\-otime +time file name (default do not save)] +.TP +[\-oclock +clock file name (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.1 new file mode 100644 index 000000000..4daa03ce5 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreadpublic.1 @@ -0,0 +1,32 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH READPUBLIC "1" "March 2020" "readpublic 1.3" "User Commands" +.SH NAME +readpublic \- Runs TPM2 readpublic +.SH DESCRIPTION +readpublic +.PP +Runs TPM2_ReadPublic +.TP +\fB\-ho\fR +object handle +.TP +[\-opu +public key file name (default do not save)] +.TP +[\-opem +public key PEM format file name (default do not save)] +.TP +[\-ns +additionally print Name in hex ascii on one line] +Useful to paste into policy +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +40 +response encrypt +.TP +80 +audit diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.1 new file mode 100644 index 000000000..596ca090e --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssreturncode.1 @@ -0,0 +1,9 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH RETURNCODE "1" "March 2020" "returncode 1.3" "User Commands" +.SH NAME +returncode \- Runs TPM2 returncode +.SH SYNOPSIS +.B returncode +\fI\,hex-number\/\fR +.SH DESCRIPTION +Returns the TPM_RC name and text for the return code diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.1 new file mode 100644 index 000000000..ea85e78a0 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrewrap.1 @@ -0,0 +1,43 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH REWRAP "1" "March 2020" "rewrap 1.3" "User Commands" +.SH NAME +rewrap \- Runs TPM2 rewrap +.SH DESCRIPTION +rewrap +.PP +Runs TPM2_Rewrap +.TP +\fB\-ho\fR +handle of object old parent +.TP +[\-pwdo +password for old parent (default empty)] +.TP +\fB\-hn\fR +handle of object new parent +.TP +\fB\-id\fR +duplicate private area file name +.TP +\fB\-in\fR +object name file name +.TP +\fB\-iss\fR +input symmetric seed file name +.TP +[\-od +rewrap private area file name (default do not save)] +.TP +[\-oss +symmetric seed file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.1 new file mode 100644 index 000000000..90b81762b --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsadecrypt.1 @@ -0,0 +1,33 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH RSADECRYPT "1" "March 2020" "rsadecrypt 1.3" "User Commands" +.SH NAME +rsadecrypt \- Runs TPM2 rsadecrypt +.SH DESCRIPTION +rsadecrypt +.PP +Runs TPM2_RSA_Decrypt +.TP +\fB\-hk\fR +key handle +.TP +[\-pwdk +password for key (default empty)[ +.IP +[\-ipwdk password file for key, nul terminated (default empty)] +\fB\-ie\fR encrypt file name +\fB\-od\fR decrypt file name (default do not save) +[\-oid (sha1, sha256, sha384 sha512)] +.IP +optionally add OID and PKCS1 padding to the +encrypt data (demo of signing with arbitrary OID) +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.1 new file mode 100644 index 000000000..507f7145c --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssrsaencrypt.1 @@ -0,0 +1,17 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH RSAENCRYPT "1" "March 2020" "rsaencrypt 1.3" "User Commands" +.SH NAME +rsaencrypt \- Runs TPM2 rsaencrypt +.SH DESCRIPTION +rsaencrypt +.PP +Runs TPM2_RSA_Encrypt +.TP +\fB\-hk\fR +key handle +.TP +\fB\-id\fR +decrypt file name +.TP +[\-oe +encrypt file name (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.1 new file mode 100644 index 000000000..fe10495d7 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequencecomplete.1 @@ -0,0 +1,34 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SEQUENCECOMPLETE "1" "March 2020" "sequencecomplete 1.3" "User Commands" +.SH NAME +sequencecomplete \- Runs TPM2 sequencecomplete +.SH DESCRIPTION +sequencecomplete +.PP +Runs TPM2_SequenceComplete +.TP +\fB\-hs\fR +sequence handle +.TP +[\-pwds +password for sequence (default empty)] +.TP +[\-if +input file to be added (default no data)] +.TP +[\-of +result file name] +.TP +[\-tk +ticket file name] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.1 new file mode 100644 index 000000000..c37376c52 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssequenceupdate.1 @@ -0,0 +1,22 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SEQUENCEUPDATE "1" "March 2020" "sequenceupdate 1.3" "User Commands" +.SH NAME +sequenceupdate \- Runs TPM2 sequenceupdate +.SH DESCRIPTION +sequenceupdate +.PP +Runs TPM2_SequenceUpdate +.TP +\fB\-hs\fR +sequence handle +.TP +[\-pwds +password for sequence (default empty)] +.TP +\fB\-if\fR +input file to be HMACed +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.IP +01 continue +20 command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.1 new file mode 100644 index 000000000..a49fe13a7 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetcommandcodeauditstatus.1 @@ -0,0 +1,31 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SETCOMMANDCODEAUDITSTATUS "1" "March 2020" "setcommandcodeauditstatus 1.3" "User Commands" +.SH NAME +setcommandcodeauditstatus \- Runs TPM2 setcommandcodeauditstatus +.SH DESCRIPTION +setprimarypolicy +.PP +Runs TPM2_SetCommandCodeAuditStatus +.TP +[\-hi +authhandle hierarchy (o, p) (default platform)] +.TP +[\-pwda +authorization password (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512, null) (default null)] +.TP +[\-set +command code to set (may be specified more than once (default none)] +.TP +[\-clr +command code to clear (may be specified more than once (default none)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.1 new file mode 100644 index 000000000..5c888e2d3 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssetprimarypolicy.1 @@ -0,0 +1,28 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SETPRIMARYPOLICY "1" "March 2020" "setprimarypolicy 1.3" "User Commands" +.SH NAME +setprimarypolicy \- Runs TPM2 setprimarypolicy +.SH DESCRIPTION +setprimarypolicy +.PP +Runs TPM2_SetPrimaryPolicy +.TP +[\-hi +authhandle hierarchy (l, e, o, p) (default platform)] +.TP +[\-pwda +authorization password (default empty)] +.TP +[\-pol +policy file (default empty policy)] +.TP +[\-halg +(sha1, sha256) (default null)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.1 new file mode 100644 index 000000000..e40e0032d --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssshutdown.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SHUTDOWN "1" "March 2020" "shutdown 1.3" "User Commands" +.SH NAME +shutdown \- Runs TPM2 shutdown +.SH DESCRIPTION +shutdown +.PP +Runs TPM2_Shutdown +.TP +[\-c +shutdown clear (default)] +.TP +[\-s +shutdown state] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.1 new file mode 100644 index 000000000..a3974cae3 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssign.1 @@ -0,0 +1,48 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SIGN "1" "March 2020" "sign 1.3" "User Commands" +.SH NAME +sign \- Runs TPM2 sign +.SH DESCRIPTION +sign +.PP +Runs TPM2_Sign +.TP +\fB\-hk\fR +key handle +.TP +\fB\-if\fR +input message to hash and sign +.TP +[\-pwdk +password for key (default empty)] +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-salg +signature algorithm (rsa, ecc, hmac) (default rsa)] +.IP +[\-scheme signing scheme (rsassa, rsapss, ecdsa, ecdaa, hmac)] +.IP +(default rsassa, ecdsa, hmac)] +.TP +[\-cf +input counter file (commit count required for ECDAA scheme] +.TP +[\-ipu +public key file name to verify signature (default no verify)] +Verify only supported for RSA now +.TP +[\-os +signature file name (default do not save)] +.TP +[\-tk +ticket file name] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.1 new file mode 100644 index 000000000..97244ddb6 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsssignapp.1 @@ -0,0 +1,15 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH SIGNAPP "1" "March 2020" "signapp 1.3" "User Commands" +.SH NAME +signapp \- Runs TPM2 signapp +.SH DESCRIPTION +signapp +.PP +Runs a TPM2_Sign application, including creating a primary storage key +and creating and loading a signing key +.TP +\fB\-ic\fR +input message to hash and sign +.TP +[\-pwsess +Use a password session, no HMAC or parameter encryption] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.1 new file mode 100644 index 000000000..13ca3365a --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartauthsession.1 @@ -0,0 +1,37 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH STARTAUTHSESSION "1" "March 2020" "startauthsession 1.3" "User Commands" +.SH NAME +startauthsession \- Runs TPM2 startauthsession +.SH DESCRIPTION +startauthsession +.PP +Runs TPM2_StartAuthSession +.HP +\fB\-se\fR +.TP +h +HMAC session +.TP +p +Policy session +.TP +t +Trial policy session +.TP +[\-halg +(sha1, sha256, sha384, sha512) (default sha256)] +.TP +[\-hs +salt handle (default TPM_RH_NULL)] +.TP +[\-bi +bind handle (default TPM_RH_NULL)] +.TP +[\-pwdb +bind password for bind handle (default empty)] +.TP +[\-sym +(xor, aes) symmetric parameter encryption algorithm (default xor)] +.TP +[\-on +nonceTPM file for policy session (default do not save)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.1 new file mode 100644 index 000000000..dae5c9be5 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstartup.1 @@ -0,0 +1,20 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH STARTUP "1" "March 2020" "startup 1.3" "User Commands" +.SH NAME +startup \- Runs TPM2 startup +.SH DESCRIPTION +startup +.PP +Runs TPM2_Startup +.TP +[\-c +startup clear (default)] +.TP +[\-s +startup state] +.TP +[\-st +run TPM2_SelfTest] +.TP +[\-sto +run only TPM2_SelfTest (no startup)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.1 new file mode 100644 index 000000000..53d747424 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssstirrandom.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH STIRRANDOM "1" "March 2020" "stirrandom 1.3" "User Commands" +.SH NAME +stirrandom \- Runs TPM2 stirrandom +.SH DESCRIPTION +stirrandom +.PP +Runs TPM2_StirRandom +.TP +\fB\-if\fR +input file name diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.1 new file mode 100644 index 000000000..d23e3b719 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstimepacket.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH TIMEPACKET "1" "March 2020" "timepacket 1.3" "User Commands" +.SH NAME +timepacket \- Runs TPM2 timepacket +.SH DESCRIPTION +timepacket +.PP +Times the supplied packet +.TP +\fB\-if\fR +packet in hexascii (requires one space at end of packet) +.TP +[\-l +number of loops to time (default 1)] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.1 new file mode 100644 index 000000000..1ceb2373c --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpm2pem.1 @@ -0,0 +1,14 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH TPM2PEM "1" "March 2020" "tpm2pem 1.3" "User Commands" +.SH NAME +tpm2pem \- Runs TPM2 tpm2pem +.SH DESCRIPTION +tpm2pem +.PP +Converts an RSA or EC TPM2B_PUBLIC to PEM +.TP +\fB\-ipu\fR +public key input file in TPM format +.TP +\fB\-opem\fR +public key output file in PEM format diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.1 new file mode 100644 index 000000000..6e000ddf0 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmcmd.1 @@ -0,0 +1,11 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH TPMCMD "1" "March 2020" "tpmcmd 1.3" "User Commands" +.SH NAME +tpmcmd \- Runs TPM2 tpmcmd +.SH DESCRIPTION +tpmcmd +.PP +Sends an in\-band TPM simulator signal +.TP +\fB\-stop\fR +Stop the TPM simulator diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.1 new file mode 100644 index 000000000..14809e116 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsstpmpublic2eccpoint.1 @@ -0,0 +1,17 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH TPMPUBLIC2ECCPOINT "1" "March 2020" "tpmpublic2eccpoint 1.3" "User Commands" +.SH NAME +tpmpublic2eccpoint \- Runs TPM2 tpmpublic2eccpoint +.SH DESCRIPTION +tpmpublic2eccpoint +.PP +Converts an EC TPM2B_PUBLIC to TPM2B_ECC_POINT. The intended use case +is to convert the public key output of certain commands (TPM2_CreatePrimary, +TPM2_Create, TPM2_CreateLoaded, TPM2_ReadPublic) to a format useful for +TPM2_ZGen_2Phase. +.TP +\fB\-ipu\fR +EC public key input file in TPM TPM2B_PUBLIC format +.TP +\fB\-pt\fR +EC public key output file in TPM TPM2B_ECC_POINT format diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.1 new file mode 100644 index 000000000..05442ef6c --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssunseal.1 @@ -0,0 +1,25 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH UNSEAL "1" "March 2020" "unseal 1.3" "User Commands" +.SH NAME +unseal \- Runs TPM2 unseal +.SH DESCRIPTION +unseal +.PP +Runs TPM2_Unseal +.TP +\fB\-ha\fR +sealed data item handle +.TP +[\-pwd +password sealed data item (default empty)] +.TP +[\-of +output data (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +40 +response encrypt diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.1 new file mode 100644 index 000000000..b047325df --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tssverifysignature.1 @@ -0,0 +1,59 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH VERIFYSIGNATURE "1" "March 2020" "verifysignature 1.3" "User Commands" +.SH NAME +verifysignature \- Runs TPM2 verifysignature +.SH DESCRIPTION +verifysignature +.PP +Runs TPM2_VerifySignature and/or verifies using the PEM public key +.TP +\fB\-if\fR +input message file name +.TP +\fB\-ih\fR +input hash file name +.IP +One of \fB\-if\fR, \fB\-ih\fR must be specified +.TP +\fB\-is\fR +signature file name +.TP +[\-raw +signature specified by \fB\-is\fR is in raw format] +(default TPMT_SIGNATURE) +.TP +\fB\-hk\fR +key handle +.TP +\fB\-ipem\fR +public key PEM format file name to verify signature +.TP +\fB\-ihmac\fR +HMAC key in raw binary format file name to verify signature +.IP +One of \fB\-hk\fR, \fB\-ipem\fR, \fB\-ihmac\fR must be specified +.TP +[\-tk +ticket file name (requires \fB\-hk\fR)] +.TP +[\-halg +(sha1, sha256, sha384 sha512) (default sha256)] +.IP +[Asymmetric Key Algorithm] +.TP +[\-rsa +(default)] +.TP +[\-ecc +] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default NULL) +.TP +01 +continue +.TP +20 +command decrypt +.TP +80 +audit diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.1 new file mode 100644 index 000000000..12eb525ef --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsswriteapp.1 @@ -0,0 +1,15 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH WRITEAPP "1" "March 2020" "writeapp 1.3" "User Commands" +.SH NAME +writeapp \- Runs TPM2 writeapp +.SH DESCRIPTION +writeapp +.PP +writeapp is a sample NV write application. Provisions an NV location, +then does two writes with password 'pwd' using a bound, salted +HMAC session using AES CFB parameter encryption. +.PP +Used to test minimal TSS build +.TP +[\-pwsess +Use a password session, no HMAC or parameter encryption] diff --git a/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.1 b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.1 new file mode 100644 index 000000000..c4eff8061 --- /dev/null +++ b/roms/skiboot/libstb/tss2/ibmtpm20tss/utils/man/man1/tsszgen2phase.1 @@ -0,0 +1,47 @@ +.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. +.TH ZGEN2PHASE "1" "March 2020" "zgen2phase 1.3" "User Commands" +.SH NAME +zgen2phase \- Runs TPM2 zgen2phase +.SH DESCRIPTION +zgen2phase +.PP +Runs TPM2_ZGen_2Phase +.TP +\fB\-hk\fR +unrestricted decryption key handle +.TP +[\-pwdk +password for key (default empty)] +.TP +\fB\-qsb\fR +QsB point input file name +.TP +\fB\-qeb\fR +QeB point input file name +.TP +\fB\-cf\fR +counter file name +.TP +[\-scheme +(default ecdh)] +.IP +ecdh +ecmqv +sm2 +.TP +[\-z1 +Z1 output data file name (default do not save)] +.TP +[\-z2 +Z2 output data file name (default do not save)] +.HP +\fB\-se[0\-2]\fR session handle / attributes (default PWAP) +.TP +01 +continue +.TP +20 +command decrypt +.TP +40 +response encrypt |