Skip to content

Commit

Permalink
rename tpm2.0-tools to tpm2-tools
Browse files Browse the repository at this point in the history
tpm2.0-tools was renamed to tpm2-tools to get rid of:
1. Periods in names
2. Confusion with a version of the software and not the tpm
3. Consistent naming conventions with tpm2-abrmd and tpm2-TSS.
4. Matches the package name in RPM.

Rename all occurances and ensure that travis links work.

Signed-off-by: William Roberts <william.c.roberts@intel.com>
  • Loading branch information
William Roberts committed Aug 3, 2017
1 parent eac9927 commit 9603e05
Show file tree
Hide file tree
Showing 50 changed files with 63 additions and 63 deletions.
4 changes: 2 additions & 2 deletions .ci/travis-build-and-run-tests.sh
Expand Up @@ -40,7 +40,7 @@ make -j$(nproc)
make -j$(nproc) check
# no clean here, keep artifacts for system testing

# Move out of build back to the tpm2.0-tools directory
# Move out of build back to the tpm2-tools directory
popd

# Switch over to the test directory
Expand All @@ -49,7 +49,7 @@ pushd ./test/system
# Run the tests on ALL device TCTIs configuration
PATH=$(pwd)/../../build/tools:${PATH} ./test_all.sh

# done go back to tpm2.0-tools directory
# done go back to tpm2-tools directory
popd

exit 0
2 changes: 1 addition & 1 deletion .travis.yml
Expand Up @@ -12,7 +12,7 @@ compiler:
addons:
coverity_scan:
project:
name: "01org/tpm2.0-tools"
name: "01org/tpm2-tools"
description: "Build submitted via Travis CI"
notification_email: william.c.roberts@intel.com
build_command_prepend: "./bootstrap && ./configure && make clean"
Expand Down
2 changes: 1 addition & 1 deletion AUTHORS
@@ -1,4 +1,4 @@
The tpm2.0-tools project was created by Gang Wei at Intel Inc.
The tpm2-tools project was created by Gang Wei at Intel Inc.

A list of MUCH-APPRECIATED contributors follows. If you are not on this list
but feel you should be, please contact the current maintainer(s).
Expand Down
2 changes: 1 addition & 1 deletion CHANGELOG
Expand Up @@ -23,7 +23,7 @@ next
* Numerous cleanups and minor bug fixes.

v2.0 - 2017-03-29
* Tracked on the milestone: https://github.com/01org/tpm2.0-tools/milestone/2
* Tracked on the milestone: https://github.com/01org/tpm2-tools/milestone/2
* Reworked all the tools to support configurable TCTIs, based on build time
configuration, one can specify the tcti via the --tcti (-T) option to all
tools.
Expand Down
2 changes: 1 addition & 1 deletion CONTRIBUTING
@@ -1,6 +1,6 @@
Guidelines for submitting bugs:
All non security bugs can be filed on the Issues tracker:
https://github.com/01org/tpm2.0-tools/issues
https://github.com/01org/tpm2-tools/issues

Security sensitive bugs should be emailed to a maintainer or to Intel
via the guidelines here:
Expand Down
8 changes: 4 additions & 4 deletions INSTALL
@@ -1,4 +1,4 @@
To build and install the tpm2.0-tools software the following software is required:
To build and install the tpm2-tools software the following software is required:
GNU Autoconf
GNU Automake
GNU Libtool
Expand All @@ -10,10 +10,10 @@ TPM2.0 TSS SAPI library and header files
OpenSSL library and header files
Curl library and header files

To obtain the tpm2.0-tools sources you must clone them as below:
git clone https://github.com/01org/tpm2.0-tools
To obtain the tpm2-tools sources you must clone them as below:
git clone https://github.com/01org/tpm2-tools

To compile tpm2.0-tools execute the following commands from the root of the
To compile tpm2-tools execute the following commands from the root of the
source directory:
$ ./bootstrap
$ ./configure
Expand Down
12 changes: 6 additions & 6 deletions README.md
@@ -1,21 +1,21 @@
[![Build Status](https://travis-ci.org/01org/tpm2.0-tools.svg?branch=master)](https://travis-ci.org/01org/tpm2.0-tools)
<a href="https://scan.coverity.com/projects/01org-tpm2-0-tools">
[![Build Status](https://travis-ci.org/01org/tpm2-tools.svg?branch=master)](https://travis-ci.org/01org/tpm2-tools)
<a href="https://scan.coverity.com/projects/01org-tpm2-tools">
<img alt="Coverity Scan Build Status"
src="https://scan.coverity.com/projects/13105/badge.svg"/>
</a>

**This site contains the code for the TPM (Trusted Platform Module) 2.0 tools based on TPM2.0-TSS**

## News
* Release 2.1.0 is now available: https://github.com/01org/tpm2.0-tools/releases/tag/2.1.0
* Release 2.1.0 is now available: https://github.com/01org/tpm2-tools/releases/tag/2.1.0
* A mailing list now exists for support: https://lists.01.org/mailman/listinfo/tpm2
* CVE-2017-7524 - Where an HMAC authorization uses the tpm to perform the hmac calculation. This results in a disclosure of the password to
the tpm where the user would not expect it. It appears likely unreachable in the current code base. This has been fixed on releases greater than version 1.1.1.

## Build and Installation instructions:
Instructions for building and installing the tpm2.0-tools are provided in the [INSTALL](https://github.com/01org/tpm2.0-tools/blob/master/INSTALL) file.
Instructions for building and installing the tpm2-tools are provided in the [INSTALL](https://github.com/01org/tpm2-tools/blob/master/INSTALL) file.

**For more details on this code and how to use it, the [manual](https://github.com/01org/tpm2.0-tools/blob/master/manual) file is a good place to start.**
**For more details on this code and how to use it, the [manual](https://github.com/01org/tpm2-tools/blob/master/manual) file is a good place to start.**

## Support
Please use the mailing list at https://lists.01.org/mailman/listinfo/tpm2 for general questions. The Issue Tracker on
Expand All @@ -25,5 +25,5 @@ github should be reserved for actual feature requests or bugs.
TPM 2.0 specifications can be found at [Trusted Computing Group](http://www.trustedcomputinggroup.org/).

## Contributing
Instructions for contributing to the project are provided in the [CONTRIBUTING](https://github.com/01org/tpm2.0-tools/blob/master/CONTRIBUTING) file.
Instructions for contributing to the project are provided in the [CONTRIBUTING](https://github.com/01org/tpm2-tools/blob/master/CONTRIBUTING) file.

6 changes: 3 additions & 3 deletions RELEASE
Expand Up @@ -8,7 +8,7 @@ using a -rc suffix (starting with rc0), signed, pushed to github, and marked und
rc series.

An example can be found here:
* https://github.com/01org/tpm2.0-tools/releases/tag/2.1.0-rc0
* https://github.com/01org/tpm2-tools/releases/tag/2.1.0-rc0

Release candidates will also be announced on the mailing list. When a rc has gone 1
week without new changes, a release will be conducted.
Expand Down Expand Up @@ -60,14 +60,14 @@ $ git tag -a [your-name-here]-pub [object SHA]

Make sure you push that tag:
$ git push origin [your-name-here]-pub
NOTE: this assumes origin is the tpm2.0-tools official repo.
NOTE: this assumes origin is the tpm2-tools official repo.

After that, you can sign tags:
$ git tag --sign [signed-tag-name]

Push the tag to the repo:
$ git push origin [signed-tag-name]
NOTE: this assumes origin is the tpm2.0-tools official repo.
NOTE: this assumes origin is the tpm2-tools official repo.

A lot of this git/gpg information was edited from:
https://blog.thesoftwarecraft.com/2013/03/signing-git-tags.html
2 changes: 1 addition & 1 deletion configure.ac
@@ -1,4 +1,4 @@
AC_INIT([tpm2.0-tools],
AC_INIT([tpm2-tools],
[m4_esyscmd_s([git describe --tags --always --dirty])])
AC_CONFIG_MACRO_DIR([m4])
AC_PROG_CC
Expand Down
2 changes: 1 addition & 1 deletion lib/tpm2_alg_util.h
Expand Up @@ -9,7 +9,7 @@
* The TSS has a bug where it was missing algs 0x27 trough 0x29.
* see: https://github.com/01org/TPM2.0-TSS/issues/476
* per https://trustedcomputinggroup.org/wp-content/uploads/TCG_Algorithm_Registry_Rev_1.24.pdf
* FIXME: https://github.com/01org/tpm2.0-tools/issues/375
* FIXME: https://github.com/01org/tpm2-tools/issues/375
*/
#ifndef ALG_SHA3_256_VALUE
#define ALG_SHA3_256_VALUE 0x27
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_activatecredential.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_activatecredential 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_activatecredential 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_activatecredential\ - Verify that the given content is protected with given keyHandle for given
handle, and then decrypt and return the secret, if any passwd option is
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_akparse.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_akparse 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_akparse 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_akparse\ - parse the algorithm and key values in TPM2B_PUBLIC struct which input via
file inputFile, and output the key into file akKeyFile.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_certify.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_certify 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_certify 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_certify\ - prove that an object with a specific Name is loaded in the TPM. By certifying
that the object is loaded, the TPM warrants that a public area with a given
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_create.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_create 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_create 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_create\ - create an object that can be loaded into a TPM using tpm2_load. The object
will need to be loaded before it may be used.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_createpolicy.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_createpolicy 8 "February 2017" Intel "tpm2.0-tools"
.TH tpm2_createpolicy 8 "February 2017" Intel "tpm2-tools"
.SH NAME
tpm2_createpolicy\ - Creates simple assertion authorization policies based on multiple pcr indices values across multiple enabled banks.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_createprimary.8.in
Expand Up @@ -27,7 +27,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.

.TH tpm2_createprimary 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_createprimary 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_createprimary \- Create a primary key under a primary seed or a temporary primary key under the TPM_RH_NULL hierarchy.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_dictionarylockout.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_dictionarylockout 8 "February 2017" Intel "tpm2.0-tools"
.TH tpm2_dictionarylockout 8 "February 2017" Intel "tpm2-tools"
.SH NAME
tpm2_dictionarylockout\ - setup dictionary-attack-lockout parameters or clear dictionary-attack-lockout state, if any passwd option is missing, assume NULL.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_dump_capability.8.in
Expand Up @@ -27,7 +27,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.

.TH tpm2_dump_capability 8 "NOVEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_dump_capability 8 "NOVEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_dump_capability \- Display TPM capabilities in a human readable form.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_encryptdecrypt.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_encryptdecrypt 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_encryptdecrypt 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_encryptdecrypt\ - performs symmetric encryption or decryption. keyHandle shall reference a
symmetric cipher object.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_evictcontrol.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_evictcontrol 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_evictcontrol 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_evictcontrol\ - allows a transient object to be made persistent or a persistent object to
be evicted.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_getmanufec.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_getmanufec 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_getmanufec 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_getmanufec\ - Retrieve the Endorsement Credential Certificate for the TPM endorsement key from the TPM manufacturer's endorsement certificate hosting server
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_getpubak.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_getpubak 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_getpubak 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_getpubak\ - Generate attestation key with given algorithm under endorsement hierarchy,
make it persistent with given ak handle, and return pub AK and AK name,
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_getpubek.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_getpubek 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_getpubek 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_getpubek\ - Generate TCG profile compliant endorsement key(endorsement hierarchy primary
object), make it persistent with give ek handle, and return public EK, if any
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_getrandom.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_getrandom 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_getrandom 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_getrandom\ - returns the next SIZE octets from the random number generator.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_hash.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_hash 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_hash 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_hash\ - performs a hash operation on a data buffer and returns the results. If the
results of the hash will be used in a signing operation that uses a restricted
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_hmac.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_hmac 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_hmac 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_hmac\ - performs an HMAC on the supplied data using the indicated hash algorithm. The
caller shall provide proper authorization for use of handle.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_listpersistent.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_listpersistent 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_listpersistent 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_listpersistent\ - display all defined persistent objects.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_load.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_load 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_load 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_load\ - load objects into the TPM, both pub/priv portion are needed.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_loadexternal.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_loadexternal 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_loadexternal 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_loadexternal\ - load an object that is not a Protected Object into the TPM. The command allows
loading of a public area or both a public and a sensitive area.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_makecredential.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_makecredential 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_makecredential 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_makecredential\ - Use the given tpm public key to protect the given secret which are used to
encrypt the AK cert.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_nvdefine.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_nvdefine 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_nvdefine 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_nvdefine\ - Define NV index with given auth value, if passwd not given, assume NULL
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_nvlist.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_nvlist 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_nvlist 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_nvlist\ - display all defined NV indices.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_nvread.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_nvread 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_nvread 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_nvread\ - read content from NV index, if any passwd option is missing, assume NULL.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_nvreadlock.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_nvreadlock 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_nvreadlock 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_nvreadlock\ - lock the NV index for further reads until the machine is restarted
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_nvrelease.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_nvrelease 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_nvrelease 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_nvrelease\ - release NV index, if any passwd option is missing, assume NULL.
.SH SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_nvwrite.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_nvwrite 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_nvwrite 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_nvwrite\ - write content from a file to a specified index, if any passwd option is
missing, assume NULL.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_pcrlist.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_pcrlist 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_pcrlist 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_pcrlist\ - display all PCR values in given algorithm with -g, display given PCR values
in given algorithms with -L, or if no algorithm is given, output all algs.
Expand Down
2 changes: 1 addition & 1 deletion man/tpm2_quote.8.in
Expand Up @@ -26,7 +26,7 @@
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH tpm2_quote 8 "DECEMBER 2016" Intel "tpm2.0-tools"
.TH tpm2_quote 8 "DECEMBER 2016" Intel "tpm2-tools"
.SH NAME
tpm2_quote\ - Provide quote and signature for given list of PCRs in given algorithm/banks.
.SH SYNOPSIS
Expand Down

0 comments on commit 9603e05

Please sign in to comment.