<command>systemd-analyze</command>
<arg choice="opt" rep="repeat">OPTIONS</arg>
<arg choice="plain">srk</arg>
+ <arg choice="opt"><replaceable>>FILE</replaceable></arg>
</cmdsynopsis>
<cmdsynopsis>
<command>systemd-analyze</command>
</refsect2>
<refsect2>
- <title><command>systemd-analyze srk > <replaceable>FILE</replaceable></command></title>
+ <title><command>systemd-analyze srk <optional>><replaceable>FILE</replaceable></optional></command></title>
<para>This command reads the Storage Root Key (SRK) from the TPM2 device, and writes it in marshalled
- TPM2B_PUBLIC format to stdout. Example:</para>
+ TPM2B_PUBLIC format to stdout. The output is non-printable data, so it should be redirected to a file
+ or into a pipe.</para>
- <programlisting>systemd-analyze srk > srk.tpm2b_public</programlisting>
+ <example>
+ <title>Save the Storage Root Key to <filename>srk.tpm2b_public</filename></title>
+
+ <programlisting>systemd-analyze srk >srk.tpm2b_public</programlisting>
+ </example>
</refsect2>
<refsect2>
" fdstore SERVICE... Show file descriptor store contents of service\n"
" image-policy POLICY... Analyze image policy string\n"
" pcrs [PCR...] Show TPM2 PCRs and their names\n"
- " srk > FILE Write TPM2 SRK to stdout\n"
+ " srk [>FILE] Write TPM2 SRK (to FILE)\n"
"\nOptions:\n"
" --recursive-errors=MODE Control which units are verified\n"
" --offline=BOOL Perform a security review on unit file(s)\n"