Provided by: tpm2-initramfs-tool_0.2.1-4_amd64 

Overview
This tool using the tpm2-tss ⟨https://github.com/tpm2-software/tpm2-tss⟩ software stack. Its purpose is
to generate/seal/unseal the FDE encrypytion key into the TPM persistent object using TPM2 ESAPI.
Name
tpm2-initramfs-tool(1) - Tool used in initramfs to seal/unseal FDE key to the TPM.
Build and install instructions
Standard installation using
$ ./bootstrap
$ ./configure
$ make
$ sudo make install
Usage
$ ./tpm2-initramfs-tool seal -T device:/dev/tpm0
Generate and seal the key to TPM with the default policy on PCR7 in SHA256
bank.
$ ./tpm2-initramfs-tool unseal -T device:/dev/tpm0
Unseal the key to TPM with the default policy on PCR7 in SHA256 bank.
$ ./tpm2-initramfs-tool seal --pcrs 0,2,4,7 --banks SHA1,SHA256 -T device:/dev/tpmrm0
Generate and seal the key to TPM with the policy on PCR0,PCR2,PCR4,PCR7 in
both SHA1 and SHA256 bank.
$ ./tpm2-initramfs-tool unseal --pcrs 0,2,4,7 --banks SHA1,SHA256 -T device:/dev/tpmrm0
Unseal the key to TPM with the policy on PCR0,PCR2,PCR4,PCR7 in both SHA1
and SHA256 bank.
$ ./tpm2-initramfs-tool seal --data "DATA SEALED" -P 0x81000004 -T device:/dev/tpmrm0
Seal the string "DATA SEALED" to the persistent object address 0x81000004 with the default
policy on PCR7 in SHA256 bank.
Tests and Code Coverage
Install lcov and configure with --enable-code-coverage
$ ./configure --enable-code-coverage
$ make check-code-coverage
Notice
Everytime you re-seal the new key it will overwrite the old persistent object.
1 tpm2-initramfs-tool | General Commands Manual tpm2-initramfs-tool(1)