diff --git a/doc/spdm_dump.md b/doc/spdm_dump.md index 3985063..7309464 100644 --- a/doc/spdm_dump.md +++ b/doc/spdm_dump.md @@ -23,8 +23,8 @@ This document describes spdm_dump tool. It can be used to parse the SPDM message [-x] (dump message in hex) [--psk ] [--dhe_secret ] - [--req_cap CERT|CHAL| ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK| ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID] - [--rsp_cap CACHE|CERT|CHAL|MEAS_NO_SIG|MEAS_SIG|MEAS_FRESH|ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK|PSK_WITH_CONTEXT|ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID|SET_CERT|CSR|CERT_INSTALL_RESET] + [--req_cap CERT|CHAL| ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK| ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID| EP_INFO_NO_SIG|EP_INFO_SIG| EVENT|MULTI_KEY_ONLY|MULTI_KEY_NEG] + [--rsp_cap CACHE|CERT|CHAL|MEAS_NO_SIG|MEAS_SIG|MEAS_FRESH|ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK|PSK_WITH_CONTEXT|ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID|SET_CERT|CSR|CERT_INSTALL_RESET|EP_INFO_NO_SIG|EP_INFO_SIG|MEL|EVENT|MULTI_KEY_ONLY|MULTI_KEY_NEG|GET_KEY_PAIR_INFO|SET_KEY_PAIR_INFO] [--hash SHA_256|SHA_384|SHA_512|SHA3_256|SHA3_384|SHA3_512|SM3_256] [--meas_spec DMTF] [--meas_hash RAW_BIT|SHA_256|SHA_384|SHA_512|SHA3_256|SHA3_384|SHA3_512|SM3_256] @@ -33,7 +33,7 @@ This document describes spdm_dump tool. It can be used to parse the SPDM message [--dhe FFDHE_2048|FFDHE_3072|FFDHE_4096|SECP_256_R1|SECP_384_R1|SECP_521_R1|SM2_P256] [--aead AES_128_GCM|AES_256_GCM|CHACHA20_POLY1305|SM4_128_GCM] [--key_schedule HMAC_HASH] - [--other_param OPAQUE_FMT_1] + [--other_param OPAQUE_FMT_1|MULTI_KEY_CONN] [--cert_chain_format SPDM|RAW] [--req_cert_chain_slot_id <0~7|0xFF>] [--req_cert_chain ] diff --git a/spdm_dump/spdm_dump.c b/spdm_dump/spdm_dump.c index 91f3142..efa1a20 100644 --- a/spdm_dump/spdm_dump.c +++ b/spdm_dump/spdm_dump.c @@ -223,9 +223,9 @@ void print_usage(void) printf(" [--psk ]\n"); printf(" [--dhe_secret ]\n"); printf( - " [--req_cap CERT|CHAL| ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK| ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID]\n"); + " [--req_cap CERT|CHAL| ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK| ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID| EP_INFO_NO_SIG|EP_INFO_SIG| EVENT|MULTI_KEY_ONLY|MULTI_KEY_NEG]\n"); printf( - " [--rsp_cap CACHE|CERT|CHAL|MEAS_NO_SIG|MEAS_SIG|MEAS_FRESH|ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK|PSK_WITH_CONTEXT|ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID|SET_CERT|CSR|CERT_INSTALL_RESET]\n"); + " [--rsp_cap CACHE|CERT|CHAL|MEAS_NO_SIG|MEAS_SIG|MEAS_FRESH|ENCRYPT|MAC|MUT_AUTH|KEY_EX|PSK|PSK_WITH_CONTEXT|ENCAP|HBEAT|KEY_UPD|HANDSHAKE_IN_CLEAR|PUB_KEY_ID|SET_CERT|CSR|CERT_INSTALL_RESET|EP_INFO_NO_SIG|EP_INFO_SIG|MEL|EVENT|MULTI_KEY_ONLY|MULTI_KEY_NEG|GET_KEY_PAIR_INFO|SET_KEY_PAIR_INFO]\n"); printf(" [--hash SHA_256|SHA_384|SHA_512|SHA3_256|SHA3_384|SHA3_512|SM3_256]\n"); printf(" [--meas_spec DMTF]\n"); printf(" [--meas_hash RAW_BIT|SHA_256|SHA_384|SHA_512|SHA3_256|SHA3_384|SHA3_512|SM3_256]\n"); @@ -237,7 +237,7 @@ void print_usage(void) " [--dhe FFDHE_2048|FFDHE_3072|FFDHE_4096|SECP_256_R1|SECP_384_R1|SECP_521_R1|SM2_P256]\n"); printf(" [--aead AES_128_GCM|AES_256_GCM|CHACHA20_POLY1305|SM4_128_GCM]\n"); printf(" [--key_schedule HMAC_HASH]\n"); - printf(" [--other_param OPAQUE_FMT_1]\n"); + printf(" [--other_param OPAQUE_FMT_1|MULTI_KEY_CONN]\n"); printf(" [--cert_chain_format SPDM|RAW]\n"); printf(" [--req_cert_chain_slot_id <0~7|0xFF>]\n"); printf(" [--req_cert_chain ]\n");