File: sedutil-cli.8

package info (click to toggle)
sedutil 1.20.0-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,744 kB
  • sloc: cpp: 8,386; xml: 1,433; sh: 810; ansic: 721; makefile: 110
file content (90 lines) | stat: -rw-r--r-- 3,380 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
.\" Manpage for sedutil-cli.
.TH SEDUTIL\-CLI 8 "18 Feb 2016" "0.12" "sedutil-cli man page"
.SH NAME
sedutil-cli \- util to manage TCG Opal 2.0 self encrypting drives

.SH SYNOPSIS
sedutil\-cli <\-v> <\-n> <action> <options> <device>

.SH DESCRIPTION
sedutil-cli is a utility to manage self encrypting drives that conform
to the Trusted Computing Group (TCG) OPAL 2.0 SSC specification.

In Linux libata.allow_tpm must be set to 1. Either via adding
libata.allow_tpm=1 to the kernel flags at boot time or changing the
contents of /sys/module/libata/parameters/allow_tpm to a from a
"0" to a "1" on a running system.

.SH OPTIONS
.SS General Options
.TP
.IP "\-v (optional)"
increase verbosity, one to five v's
.IP "\-n (optional)"
no password hashing. Passwords will be sent in clear text!

.SS Actions
.IP \-\-scan
Scans the devices on the system identifying Opal compliant devices
.IP "\-\-query <device>"
Display the Discovery 0 response of a device
.IP "\-\-isValidSED <device>"
Verify whether the given device is SED or not
.IP "\-\-listLockingRanges <password> <device>"
List all Locking Ranges
.IP "\-\-listLockingRange <0...n> <password> <device>"
List all Locking Ranges, 0 = GLobal 1..n  = LRn
.IP "\-\-eraseLockingRange <0...n> <password> <device>"
Erase a Locking Range, 0 = GLobal 1..n  = LRn
.IP "\-\-setupLockingRange <0...n> <RangeStart> <RangeLength> <password> <device>"
Setup a new Locking Range, 0 = GLobal 1..n  = LRn
.IP "\-\-initialSetup <SIDpassword> <device>"
Setup the device for use with sedutil, <SIDpassword> is new SID and Admin1 password
.IP "\-\-setSIDPassword <SIDpassword> <newSIDpassword> <device>"
Change the SID password
.IP "\-\-setAdmin1Pwd <Admin1password> <newAdmin1password> <device>"
Change the Admin1 password
.IP "\-\-setPassword <oldpassword, "" for MSID> <userid> <newpassword> <device>"
Change the Enterprise password for userid, "EraseMaster" or "BandMaster<n>", 0 <= n <= 1023
.IP "\-\-setLockingRange <0...n> <RW|RO|LK> <Admin1password> <device>"
Set the status of a Locking Range, 0 = GLobal 1..n  = LRn
.IP "\-\-enableLockingRange <0...n> <Admin1password> <device>"
Enable a Locking Range, 0 = GLobal 1..n  = LRn
.IP "\-\-disableLockingRange <0...n> <Admin1password> <device>"
Disable a Locking Range, 0 = GLobal 1..n  = LRn
.IP "\-\-setMBREnable <on|off> <Admin1password> <device>"
Enable|Disable MBR shadowing
.IP "\-\-setMBRDone <on|off> <Admin1password> <device>"
set|unset MBRDone
.IP "\-\-loadPBAimage <Admin1password> <file> <device>"
Write <file> to MBR Shadow area
.IP "\-\-revertTPer <SIDpassword> <device>"
set the device back to factory defaults.
.B This **ERASES ALL DATA**
.IP "\-\-revertNoErase <Admin1password> <device>"
deactivate the Locking SP without erasing the data on GLOBAL RANGE *ONLY*
.IP "\-\---yesIreallywanttoERASEALLmydatausingthePSID <PSID> <device>"
revert the device using the PSID. 
.B *ERASING* *ALL* the data
.IP "\-\-printDefaultPassword <device>"
print MSID

.SH EXAMPLES
.EX
sedutil-cli --scan
.EE
.EX
sedutil-cli --query /dev/sdc
.EE
.EX
sedutil-cli --yesIreallywanttoERASEALLmydatausingthePSID <PSIDALLCAPSNODASHED> /dev/sdc
.EE
.EX
sedutil-cli --initialSetup <newSIDpassword> /dev/sdc
.EE

.SH BUGS
Sleep (S3) is not supported.

.SH AUTHOR
The tool was developed by Bright Plaza Inc. <drivetrust@drivetrust.com>. This man page was written by Jan Luca Naumann <j.naumann@fu-berlin.de>.