Blob Blame History Raw
.\" DO NOT MODIFY THIS FILE!  It was generated by help2man 1.47.4.
.TH SEDUTIL-CLI "8" "May 2017" "sedutil-cli 1.12" "System Administration Utilities"
.SH NAME
sedutil-cli \- manage self-encrypting drives
.SH SYNOPSIS
.B sedutil\-cli
[\fI\,ACTION\/\fR] [\fI\,OPTION\/\fR]... [\fI\,DEVICE\/\fR]
.SH DESCRIPTION
A utility to manage self encrypting drives that conform
to the Trusted Computing Group OPAL 2.0 SSC specification.
.TP
\fB\-v\fR
increase verbosity, one to five v's
.TP
\fB\-n\fR
no password hashing. Passwords will be sent in clear text!
.TP
\fBACTIONS:\fR
.TP
\fB\-\-scan\fR
Scans the devices on the system, identifying Opal compliant devices
.TP
\fB\-\-query\fR <device>
Display the Discovery 0 response of a device
.TP
\fB\-\-isValidSED\fR <device>
Verify whether the given device is SED or not
.TP
\fB\-\-listLockingRanges\fR <password> <device>
List all Locking Ranges
.TP
\fB\-\-listLockingRange\fR <0...n> <password> <device>
List all Locking Ranges, 0 = GLobal 1..n  = LRn
.TP
\fB\-\-eraseLockingRange\fR <0...n> <password> <device>
Erase a Locking Range, 0 = GLobal 1..n  = LRn
.TP
\fB\-\-setupLockingRange\fR <0...n> <RangeStart> <RangeLength> <password> <device>
Setup a new Locking Range, 0 = GLobal 1..n  = LRn
.TP
\fB\-\-initialSetup\fR <SIDpassword> <device>
Setup the device for use with sedutil.  <SIDpassword> is new SID and Admin1 password
.TP
\fB\-\-setSIDPassword\fR <SIDpassword> <newSIDpassword> <device>
Change the SID password
.TP
\fB\-\-setAdmin1Pwd\fR <Admin1password> <newAdmin1password> <device>
Change the Admin1 password
.TP
\fB\-\-setPassword\fR <oldpassword, "" for MSID> <userid> <newpassword> <device>
Change the Enterprise password for userid "EraseMaster" or "BandMaster<n>", 0 <= n <= 1023
.TP
\fB\-\-setLockingRange\fR <0...n> <RW|RO|LK> <Admin1password> <device>
Set the status of a Locking Range, 0 = GLobal 1..n  = LRn
.TP
\fB\-\-enableLockingRange\fR <0...n> <Admin1password> <device>
Enable a Locking Range, 0 = GLobal 1..n  = LRn
.TP
\fB\-\-disableLockingRange\fR <0...n> <Admin1password> <device>
Disable a Locking Range, 0 = GLobal 1..n  = LRn
.TP
\fB\-\-setMBREnable\fR <on|off> <Admin1password> <device>
Enable|Disable MBR shadowing
.TP
\fB\-\-setMBRDone\fR <on|off> <Admin1password> <device>
set|unset MBRDone
.TP
\fB\-\-loadPBAimage\fR <Admin1password> <file> <device>
Write <file> to MBR Shadow area
.TP
\fB\-\-revertTPer\fR <SIDpassword> <device>
set the device back to factory defaults.  This **ERASES ALL DATA**
.TP
\fB\-\-revertNoErase\fR <Admin1password> <device>
deactivate the Locking SP without erasing the data on GLOBAL RANGE *ONLY*
.TP
\fB\-\-yesIreallywanttoERASEALLmydatausingthePSID\fR <PSID> <device>
revert the device using the PSID *ERASING* *ALL* the data
.TP
\fB\-\-printDefaultPassword\fR <device>
print MSID
.SH EXAMPLES
sedutil\-cli \fB\-\-scan\fR
.PP
sedutil\-cli \fB\-\-query\fR \fI\,/dev/sdc\/\fP
.PP
sedutil\-cli \fB\-\-yesIreallywanttoERASEALLmydatausingthePSID\fR <PSIDALLCAPSNODASHED> \fI\,/dev/sdc\/\fP
.PP
sedutil\-cli \fB\-\-initialSetup\fR <newSIDpassword> \fI\,/dev/sdc\/\fP
.SH COPYRIGHT
sedutil v1.12 Copyright 2014\-2016 Bright Plaza Inc. <drivetrust@drivetrust.com>
.SH SEE ALSO
See further documentation in /usr/share/doc/sedutil