summaryrefslogtreecommitdiffstats
path: root/upstream/opensuse-tumbleweed/man1/grub2-protect.1
diff options
context:
space:
mode:
Diffstat (limited to 'upstream/opensuse-tumbleweed/man1/grub2-protect.1')
-rw-r--r--upstream/opensuse-tumbleweed/man1/grub2-protect.185
1 files changed, 85 insertions, 0 deletions
diff --git a/upstream/opensuse-tumbleweed/man1/grub2-protect.1 b/upstream/opensuse-tumbleweed/man1/grub2-protect.1
new file mode 100644
index 00000000..f4bea4d7
--- /dev/null
+++ b/upstream/opensuse-tumbleweed/man1/grub2-protect.1
@@ -0,0 +1,85 @@
+.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.49.3.
+.TH GRUB-PROTECT "1" "May 2024" "GRUB2 2.12" "User Commands"
+.SH NAME
+grub-protect \- protect a disk key with a key protector
+.SH SYNOPSIS
+.B grub-protect
+[\fI\,OPTION\/\fR...]
+.SH DESCRIPTION
+grub-protect helps to pretect a disk encryption key with a specified key protector.
+.PP
+Protect a cleartext key using a GRUB key protector that can retrieve the key
+during boot to unlock fully\-encrypted disks automatically.
+.TP
+\fB\-a\fR, \fB\-\-action\fR=\fI\,add\/\fR|remove
+Add or remove a key protector to or from a key.
+.TP
+\fB\-p\fR, \fB\-\-protector\fR=\fI\,tpm2\/\fR
+Key protector to use (only tpm2 is currently
+supported).
+.TP
+\fB\-\-tpm2\-asymmetric\fR=\fI\,TYPE\/\fR The type of SRK: RSA (RSA2048), RSA3072, RSA4096,
+and ECC (ECC_NIST_P256). (default: ECC)
+.TP
+\fB\-\-tpm2\-bank\fR=\fI\,ALG\/\fR
+Bank of PCRs used to authorize key release: SHA1,
+SHA256, SHA384, or SHA512. (default: SHA256)
+.TP
+\fB\-\-tpm2\-device\fR=\fI\,FILE\/\fR
+Path to the TPM2 device. (default: \fI\,/dev/tpm0\/\fP)
+.TP
+\fB\-\-tpm2\-evict\fR
+Evict a previously persisted SRK from the TPM, if
+any.
+.TP
+\fB\-\-tpm2\-keyfile\fR=\fI\,FILE\/\fR
+Path to a file that contains the cleartext key to
+protect.
+.TP
+\fB\-\-tpm2\-outfile\fR=\fI\,FILE\/\fR
+Path to the file that will contain the key after
+sealing (must be accessible to GRUB during boot).
+.TP
+\fB\-\-tpm2\-pcrs\fR=\fI\,0[\/\fR,1]...
+Comma\-separated list of PCRs used to authorize
+key release e.g., '7,11'. Please be aware that
+PCR 0~7 are used by the firmware and the
+measurement result may change after a firmware
+update (for baremetal systems) or a package
+(OVMF/SeaBIOS/SLOF) update in the VM host. This
+may lead tothe failure of key unsealing.
+(default: 7)
+.TP
+\fB\-\-tpm2\-srk\fR=\fI\,NUM\/\fR
+The SRK handle if the SRK is to be made
+persistent.
+.TP
+\fB\-\-tpm2key\fR
+Use TPM 2.0 Key File format instead of the raw
+format.
+.TP
+\-?, \fB\-\-help\fR
+give this help list
+.TP
+\fB\-\-usage\fR
+give a short usage message
+.TP
+\fB\-V\fR, \fB\-\-version\fR
+print program version
+.PP
+Mandatory or optional arguments to long options are also mandatory or optional
+for any corresponding short options.
+.SH "REPORTING BUGS"
+Report bugs to <bug\-grub@gnu.org>.
+.SH "SEE ALSO"
+The full documentation for
+.B grub-protect
+is maintained as a Texinfo manual. If the
+.B info
+and
+.B grub-protect
+programs are properly installed at your site, the command
+.IP
+.B info grub-protect
+.PP
+should give you access to the complete manual.