static void help(const char *aCmd) { logCmdHelp(aCmd); logCmdOption("-i, --infile FILE", _("Filename containing the secret data used to revoke the EK.")); }
static void help(const char* aCmd) { logCmdHelp(aCmd); logCmdOption("-x, --use-hex", _("Use hex encoding for TPM owner secret")); logCmdOption("-z, --well-known", _("Use TSS_WELL_KNOWN_SECRET (20 zero bytes) as the owner secret.")); }
static void help(const char *aCmd) { logCmdHelp(aCmd); logUnicodeCmdOption(); logCmdOption("-f, --force", _("Use physical presence authorization.")); logCmdOption("-z, --well-known", _("Use 20 bytes of zeros (TSS_WELL_KNOWN_SECRET) as the TPM secret authorization data")); }
/* * usageCallback * Display command usage information. */ void usageCallback( const char *a_pszCmd ) { logCmdHelp( a_pszCmd ); logCmdOption( "-k, --token STRING", _("Use STRING to identify the label of the PKCS#11 token to be used") ); logCmdOption( "-y, --yes", _("Reply 'yes' to the clear TPM token prompt") ); }
static void help(const char *aCmd) { logCmdHelp(aCmd); logUnicodeCmdOption(); logCmdOption("-o, --owner", _("Change the owner password.")); logCmdOption("-s, --srk", _("Change the SRK password.")); logCmdOption("-g, --original_password_unicode", _("Use TSS UNICODE encoding for original password to comply with applications using TSS popup boxes")); logCmdOption("-n, --new_password_unicode", _("Use TSS UNICODE encoding for new password to comply with applications using TSS popup boxes")); logCmdOption("-z, --well-known", _("Change password to a new one when current owner password is a secret of all zeros (20 bytes of zeros). It must be specified which password (owner, SRK or both) to change")); logCmdOption("-r, --set-well-known", _("Change password to a secret of all zeros (20 bytes of zeros). It must be specified which password (owner, SRK or both) to change")); }
static void help(const char *aCmd) { logCmdHelp(aCmd); logUnicodeCmdOption(); logCmdOption("-a, --allow", _("Allow SRK read access using SRK auth")); logCmdOption("-s, --status", _("Display current status")); logCmdOption("-r, --restrict", _("Restrict SRK read to owner only")); logCmdOption("-z, --well-known", _("Use 20 bytes of zeros (TSS_WELL_KNOWN_SECRET) as the TPM secret authorization data")); }
static void help(const char *aCmd) { logCmdHelp(aCmd); logCmdOption("-r, --revocable", _("Creates a revocable EK instead of the default non-revocable one. Requires [-g -o] or [-i]")); logCmdOption("-i, --infile FILE", _("Filename containing the secret data used to revoke the EK.")); logCmdOption("-g, --generate-secret", _("Generates a 20 Bytes secret that is used to revoke the EK. Requires [-o]")); logCmdOption("-o, --outfile FILE", _("Filename to write the secret data generated to revoke the EK.")); }
static void help(const char *aCmd) { logCmdHelp(aCmd); logCmdOption("-i, --infile FILE", _ ("Filename containing key to seal. Default is STDIN.")); logCmdOption("-o, --outfile FILE", _ ("Filename to write sealed key to. Default is STDOUT.")); logCmdOption("-p, --pcr NUMBER", _ ("PCR to seal data to. Default is none. This option can be specified multiple times to choose more than one PCR.")); logCmdOption("-z, --well-known", _("Use TSS_WELL_KNOWN_SECRET as the SRK secret.")); logCmdOption("-u, --unicode", _("Use TSS UNICODE encoding for the SRK password to comply with applications using TSS popup boxes")); }
static void help(const char* aCmd) { logCmdHelp(aCmd); logUnicodeCmdOption(); logCmdOption("-y, --owner-well-known", _("Use 20 bytes of zeros (TSS_WELL_KNOWN_SECRET) as the " "TPM owner secret")); logCmdOption("-z, --data-well-known", _("Use 20 bytes of zeros (TSS_WELL_KNOWN_SECRET) as the " "NVRAM area's secret")); logOwnerPassCmdOption(); logCmdOption("-a, --pwda", _("NVRAM area password")); logNVIndexCmdOption(); logCmdOption("-s, --size", _("Size of the NVRAM area")); logCmdOption("-p, --permissions", _("Permissions of the NVRAM area")); displayStringsAndValues(permvalues, " "); }