=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== tpm2-tools-4.3.0/.ci/docker-prelude.sh-6- tpm2-tools-4.3.0/.ci/docker-prelude.sh:7:WORKSPACE=`dirname $TRAVIS_BUILD_DIR` tpm2-tools-4.3.0/.ci/docker-prelude.sh-8- ############################################## tpm2-tools-4.3.0/.ci/docker.run-27- # To get line numbers set up the asan symbolizer tpm2-tools-4.3.0/.ci/docker.run:28: clang_version=`$CC --version | head -n 1 | cut -d\ -f 3-3 | cut -d\. -f 1-2` tpm2-tools-4.3.0/.ci/docker.run-29- # Sometimes the version string has an Ubuntu on the front of it and the field ############################################## tpm2-tools-4.3.0/.ci/docker.run-31- if [ $clang_version == "version" ]; then tpm2-tools-4.3.0/.ci/docker.run:32: clang_version=`$CC --version | head -n 1 | cut -d\ -f 4-4 | cut -d\. -f 1-2` tpm2-tools-4.3.0/.ci/docker.run-33- fi ############################################## tpm2-tools-4.3.0/Makefile.am-789- for f in $(EXTRA_DIST_IGNORE); do \ tpm2-tools-4.3.0/Makefile.am:790: rm -rf `find $(distdir) -name $$f`; \ tpm2-tools-4.3.0/Makefile.am-791- done; ############################################## tpm2-tools-4.3.0/man/tpm2_activatecredential.1.md-77-file_size=`stat --printf="%s" ak.name` tpm2-tools-4.3.0/man/tpm2_activatecredential.1.md:78:loaded_key_name=`cat ak.name | xxd -p -c $file_size` tpm2-tools-4.3.0/man/tpm2_activatecredential.1.md-79- ############################################## tpm2-tools-4.3.0/man/tpm2_policycommandcode.1.md-44-for c in `grep TPM2_CC_ ./include/tss2/tss2_tpm2_types.h`; do tpm2-tools-4.3.0/man/tpm2_policycommandcode.1.md:45: n=`echo $c | awk {'print $4'} | sed s/\)// | sed s/0x00000/0x/` tpm2-tools-4.3.0/man/tpm2_policycommandcode.1.md:46: p=`echo $c |awk {'print$2'} | cut -d'_' -f3- | sed s/_//g | tr '[:upper:]' '[:lower:]'` tpm2-tools-4.3.0/man/tpm2_policycommandcode.1.md-47- echo " -$p: $n" ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-encrypt-decrypt.sh-156- tpm2-tools-4.3.0/test/integration/fapi/fapi-encrypt-decrypt.sh:157:if [ "`cat $DECRYPTED_FILE`" != "`cat $PLAIN_TEXT`" ]; then tpm2-tools-4.3.0/test/integration/fapi/fapi-encrypt-decrypt.sh-158- echo "Encryption/Decryption failed" ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-list.sh-27- tpm2-tools-4.3.0/test/integration/fapi/fapi-list.sh:28:if [ `tss2_list --searchPath=$KEY_PATH --pathList=-` != $SIGN_OBJECT ]; then tpm2-tools-4.3.0/test/integration/fapi/fapi-list.sh-29- echo "tss2_list single object failed" ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-nv-write-read.sh-31- tpm2-tools-4.3.0/test/integration/fapi/fapi-nv-write-read.sh:32:if [ `cat $DATA_READ_FILE` != `cat $DATA_WRITE_FILE` ]; then tpm2-tools-4.3.0/test/integration/fapi/fapi-nv-write-read.sh-33- echo "Test without password: Strings are not equal" ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-provision.sh-12- # failure is expected here. Therefore, we need to pass a successful tpm2-tools-4.3.0/test/integration/fapi/fapi-provision.sh:13: # execution in any case tpm2-tools-4.3.0/test/integration/fapi/fapi-provision.sh-14- tss2_delete --path / || true ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-seal-unseal.sh-58- tpm2-tools-4.3.0/test/integration/fapi/fapi-seal-unseal.sh:59:if [ "`xxd $UNSEALED_DATA_FILE`" != "`xxd $SEALED_DATA_FILE`" ]; then tpm2-tools-4.3.0/test/integration/fapi/fapi-seal-unseal.sh-60- echo "Seal/Unseal failed" ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-set-get-description.sh-31- tpm2-tools-4.3.0/test/integration/fapi/fapi-set-get-description.sh:32:if [ `cat $DESCRIPTION_FILE` != "$DESCRIPTION_SET" ]; then tpm2-tools-4.3.0/test/integration/fapi/fapi-set-get-description.sh-33- echo "Descriptions not equal" ############################################## tpm2-tools-4.3.0/test/integration/fapi/fapi-sign-verify.sh-26-tss2_createkey --path $KEY_PATH --type "noDa, sign" --authValue "" tpm2-tools-4.3.0/test/integration/fapi/fapi-sign-verify.sh:27:echo -n `cat $DIGEST_FILE` | tss2_sign --digest - --keyPath $KEY_PATH \ tpm2-tools-4.3.0/test/integration/fapi/fapi-sign-verify.sh-28- --padding "RSA_PSS" --signature $SIGNATURE_FILE --publicKey $PUBLIC_KEY_FILE ############################################## tpm2-tools-4.3.0/test/integration/tests/abrmd_extended-sessions.sh-97- tpm2-tools-4.3.0/test/integration/tests/abrmd_extended-sessions.sh:98:unsealed=`tpm2_unseal -p"session:$file_session_file" -c $file_unseal_key_ctx` tpm2-tools-4.3.0/test/integration/tests/abrmd_extended-sessions.sh-99- ############################################## tpm2-tools-4.3.0/test/integration/tests/abrmd_policycphash.sh-624-tpm2_clear tpm2-tools-4.3.0/test/integration/tests/abrmd_policycphash.sh:625:let clockset=`tpm2_readclock | grep clock | grep -v info | awk '{print $2}'`+100000 tpm2-tools-4.3.0/test/integration/tests/abrmd_policycphash.sh-626-tpm2_setclock -c o $clockset --cphash cp.hash ############################################## tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh-51--L $o_policy_digest file:- tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh:52:unsealed=`tpm2_unseal -p"session:$session_ctx" -c $seal_key_ctx` tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh-53-tpm2_flushcontext $session_ctx ############################################## tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh-67-tpm2_policysecret -S $session_ctx -c $TPM_RH_OWNER -L $o_policy_digest tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh:68:unsealed=`tpm2_unseal -p"session:$session_ctx" -c $seal_key_ctx` tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh-69-tpm2_flushcontext $session_ctx ############################################## tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh-97--q qual.dat tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh:98:unsealed=`tpm2_unseal -p"session:$session_ctx" -c $seal_key_ctx` tpm2-tools-4.3.0/test/integration/tests/abrmd_policysecret.sh-99-tpm2_flushcontext $session_ctx ############################################## tpm2-tools-4.3.0/test/integration/tests/activecredential.sh-41-# Use -c in xxd so there is no line wrapping tpm2-tools-4.3.0/test/integration/tests/activecredential.sh:42:file_size=`ls -l ak.name | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/activecredential.sh:43:loaded_key_name=`cat ak.name | xxd -p -c $file_size` tpm2-tools-4.3.0/test/integration/tests/activecredential.sh-44- ############################################## tpm2-tools-4.3.0/test/integration/tests/attestation.sh-58-getrandom() { tpm2-tools-4.3.0/test/integration/tests/attestation.sh:59: loaded_randomness=`tpm2_getrandom --hex $1` tpm2-tools-4.3.0/test/integration/tests/attestation.sh-60-} ############################################## tpm2-tools-4.3.0/test/integration/tests/attestation.sh-76-# Validate keys (registrar) tpm2-tools-4.3.0/test/integration/tests/attestation.sh:77:file_size=`ls -l $output_ak_pub_name | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/attestation.sh:78:loaded_key_name=`cat $output_ak_pub_name | xxd -p -c $file_size` tpm2-tools-4.3.0/test/integration/tests/attestation.sh-79-tpm2_makecredential -Q -T none -e $output_ek_pub -s $file_input_data \ ############################################## tpm2-tools-4.3.0/test/integration/tests/checkquote.sh-41- tpm2_getrandom -o rand.out $1 tpm2-tools-4.3.0/test/integration/tests/checkquote.sh:42: local file_size=`ls -l rand.out | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/checkquote.sh:43: loaded_randomness=`cat rand.out | xxd -p -c $file_size` tpm2-tools-4.3.0/test/integration/tests/checkquote.sh-44-} ############################################## tpm2-tools-4.3.0/test/integration/tests/getrandom.sh-19-tpm2_getrandom -o random.out 32 tpm2-tools-4.3.0/test/integration/tests/getrandom.sh:20:s=`ls -l random.out | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/getrandom.sh-21-test $s -eq 32 ############################################## tpm2-tools-4.3.0/test/integration/tests/getrandom.sh-24-tpm2_getrandom --hex 4 > random.out tpm2-tools-4.3.0/test/integration/tests/getrandom.sh:25:s=`ls -l random.out | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/getrandom.sh-26-test $s -eq 8 ############################################## tpm2-tools-4.3.0/test/integration/tests/getrandom.sh-31-tpm2_getrandom -Q --hex 4 > random.out tpm2-tools-4.3.0/test/integration/tests/getrandom.sh:32:s=`ls -l random.out | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/getrandom.sh-33-test $s -eq 0 ############################################## tpm2-tools-4.3.0/test/integration/tests/hash.sh-30- tpm2-tools-4.3.0/test/integration/tests/hash.sh:31:expected=`shasum -a 1 $hash_in_file | awk '{print $1}'` tpm2-tools-4.3.0/test/integration/tests/hash.sh:32:actual=`cat $hash_out_file | xxd -p -c 20` tpm2-tools-4.3.0/test/integration/tests/hash.sh-33- ############################################## tpm2-tools-4.3.0/test/integration/tests/hash.sh-42- tpm2-tools-4.3.0/test/integration/tests/hash.sh:43:expected=`shasum -a 256 $hash_in_file | awk '{print $1}'` tpm2-tools-4.3.0/test/integration/tests/hash.sh:44:actual=`cat $hash_out_file | xxd -p -c 32` tpm2-tools-4.3.0/test/integration/tests/hash.sh-45- ############################################## tpm2-tools-4.3.0/test/integration/tests/hash.sh-64-dd if=/dev/urandom of=$hash_in_file bs=2093 count=1 2>/dev/null tpm2-tools-4.3.0/test/integration/tests/hash.sh:65:tpm_hash_val=`tpm2_hash --hex $hash_in_file` tpm2-tools-4.3.0/test/integration/tests/hash.sh:66:sha1sum_val=`shasum -a 1 $hash_in_file | cut -d\ -f 1-2 | tr -d '[:space:]'` tpm2-tools-4.3.0/test/integration/tests/hash.sh-67-if [ "$tpm_hash_val" != "$sha1sum_val" ]; then ############################################## tpm2-tools-4.3.0/test/integration/tests/hmac.sh-96-# verify that silent is indeed silent tpm2-tools-4.3.0/test/integration/tests/hmac.sh:97:stdout=`cat $file_input_data | tpm2_hmac -Q -c $file_hmac_key_ctx` tpm2-tools-4.3.0/test/integration/tests/hmac.sh-98-if [ -n "$stdout" ]; then ############################################## tpm2-tools-4.3.0/test/integration/tests/makecredential.sh-41-# Use -c in xxd so there is no line wrapping tpm2-tools-4.3.0/test/integration/tests/makecredential.sh:42:file_size=`ls -l $output_ak_pub_name | awk {'print $5'}` tpm2-tools-4.3.0/test/integration/tests/makecredential.sh:43:Loadkeyname=`cat $output_ak_pub_name | xxd -p -c $file_size` tpm2-tools-4.3.0/test/integration/tests/makecredential.sh-44- ############################################## tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-33- tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh:34: alg=`echo -n $l | cut -d\: -f 1-1` tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-35- if ! which "$alg"sum >/dev/null 2>&1; then ############################################## tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-39- tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh:40: hash=`echo -n $l | awk {'print $2'}` tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh:41: check=`"$alg"sum $hash_in_file | cut -d' ' -f 1-1` tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-42- if [ "$check" != "$hash" ]; then ############################################## tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-48-tpm2_pcrread sha1:9 > $yaml_out_file tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh:49:old_pcr_value=`yaml_get_kv $yaml_out_file "sha1" "9"` tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-50- ############################################## tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-55-tpm2_pcrread sha1:9 > $yaml_out_file tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh:56:new_pcr_value=`yaml_get_kv $yaml_out_file "sha1" "9"` tpm2-tools-4.3.0/test/integration/tests/pcrevent.sh-57- ############################################## tpm2-tools-4.3.0/test/integration/tests/pcrextend.sh-16-# test a single algorithm based on what is supported tpm2-tools-4.3.0/test/integration/tests/pcrextend.sh:17:for alg in `tpm2_getcap pcrs | grep sha |awk {'print $2'} | awk -F: {'print $1'}`; do tpm2-tools-4.3.0/test/integration/tests/pcrextend.sh-18- ############################################## tpm2-tools-4.3.0/test/integration/tests/unseal.sh-130- tpm2-tools-4.3.0/test/integration/tests/unseal.sh:131:unsealed=`tpm2_unseal -c $file_unseal_key_ctx -p secretpass` tpm2-tools-4.3.0/test/integration/tests/unseal.sh-132- ############################################## tpm2-tools-4.3.0/debian/tests/test-version-9-VERSION_STRING=`tpm2_load -v | sed 's/.*version=["]\([^"]*\)["].*/\1/'` tpm2-tools-4.3.0/debian/tests/test-version:10:PACKAGE_VERSION=`dpkg -s tpm2-tools | grep Version: | sed -e 's/Version: //' | sed -e 's/-[^-]\+$//'` tpm2-tools-4.3.0/debian/tests/test-version-11-