Provided by: tpm2-initramfs-tool_0.2.2-2_amd64
Overview
This tool using the tpm2-tss ⟨https://github.com/tpm2-software/tpm2-tss⟩ software stack. Its purpose is to generate/seal/unseal the FDE encrypytion key into the TPM persistent object using TPM2 ESAPI.
Name
tpm2-initramfs-tool(1) - Tool used in initramfs to seal/unseal FDE key to the TPM.
Build and install instructions
Standard installation using $ ./bootstrap $ ./configure $ make $ sudo make install
Usage
$ ./tpm2-initramfs-tool seal -T device:/dev/tpm0 Generate and seal the key to TPM with the default policy on PCR7 in SHA256 bank. $ ./tpm2-initramfs-tool unseal -T device:/dev/tpm0 Unseal the key to TPM with the default policy on PCR7 in SHA256 bank. $ ./tpm2-initramfs-tool seal --pcrs 0,2,4,7 --banks SHA1,SHA256 -T device:/dev/tpmrm0 Generate and seal the key to TPM with the policy on PCR0,PCR2,PCR4,PCR7 in both SHA1 and SHA256 bank. $ ./tpm2-initramfs-tool unseal --pcrs 0,2,4,7 --banks SHA1,SHA256 -T device:/dev/tpmrm0 Unseal the key to TPM with the policy on PCR0,PCR2,PCR4,PCR7 in both SHA1 and SHA256 bank. $ ./tpm2-initramfs-tool seal --data "DATA SEALED" -P 0x81000004 -T device:/dev/tpmrm0 Seal the string "DATA SEALED" to the persistent object address 0x81000004 with the default policy on PCR7 in SHA256 bank.
Tests and Code Coverage
Install lcov and configure with --enable-code-coverage $ ./configure --enable-code-coverage $ make check-code-coverage
Notice
Everytime you re-seal the new key it will overwrite the old persistent object.