mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-12 03:10:08 +01:00
Improve cmd line options man pages related to SED OPAL.
This commit is contained in:
@@ -700,7 +700,7 @@ endif::[]
|
|||||||
|
|
||||||
ifndef::ACTION_BENCHMARK,ACTION_BITLKDUMP[]
|
ifndef::ACTION_BENCHMARK,ACTION_BITLKDUMP[]
|
||||||
*--header <device or file storing the LUKS header>*::
|
*--header <device or file storing the LUKS header>*::
|
||||||
ifndef::ACTION_OPEN[]
|
ifndef::ACTION_OPEN,ACTION_ERASE[]
|
||||||
Use a detached (separated) metadata device or file where the LUKS
|
Use a detached (separated) metadata device or file where the LUKS
|
||||||
header is stored. This option allows one to store ciphertext and LUKS
|
header is stored. This option allows one to store ciphertext and LUKS
|
||||||
header on different devices.
|
header on different devices.
|
||||||
@@ -723,7 +723,7 @@ FAQ for header size calculation.
|
|||||||
The --align-payload option is taken as absolute sector alignment on ciphertext
|
The --align-payload option is taken as absolute sector alignment on ciphertext
|
||||||
device and can be zero.
|
device and can be zero.
|
||||||
endif::[]
|
endif::[]
|
||||||
ifndef::ACTION_LUKSFORMAT,ACTION_OPEN[]
|
ifndef::ACTION_LUKSFORMAT,ACTION_OPEN,ACTION_ERASE[]
|
||||||
For commands that change the LUKS header (e.g. _luksAddKey_),
|
For commands that change the LUKS header (e.g. _luksAddKey_),
|
||||||
specify the device or file with the LUKS header directly as the LUKS
|
specify the device or file with the LUKS header directly as the LUKS
|
||||||
device.
|
device.
|
||||||
@@ -743,6 +743,9 @@ decryption operation continues as if the ordinary detached header was passed.
|
|||||||
*WARNING:* Never put exported header file in a filesystem on top of device
|
*WARNING:* Never put exported header file in a filesystem on top of device
|
||||||
you are about to decrypt! It would cause a deadlock.
|
you are about to decrypt! It would cause a deadlock.
|
||||||
endif::[]
|
endif::[]
|
||||||
|
ifdef::ACTION_ERASE[]
|
||||||
|
Use to specify detached LUKS2 header when erasing HW OPAL enabled data device.
|
||||||
|
endif::[]
|
||||||
endif::[]
|
endif::[]
|
||||||
|
|
||||||
ifdef::ACTION_LUKSHEADERBACKUP,ACTION_LUKSHEADERRESTORE[]
|
ifdef::ACTION_LUKSHEADERBACKUP,ACTION_LUKSHEADERRESTORE[]
|
||||||
@@ -750,6 +753,19 @@ ifdef::ACTION_LUKSHEADERBACKUP,ACTION_LUKSHEADERRESTORE[]
|
|||||||
Specify file with header backup file.
|
Specify file with header backup file.
|
||||||
endif::[]
|
endif::[]
|
||||||
|
|
||||||
|
ifdef::ACTION_LUKSFORMAT[]
|
||||||
|
*--hw-opal*::
|
||||||
|
Format LUKS2 device with dm-crypt encryption stacked on top HW based encryption configured
|
||||||
|
on SED OPAL locking range. This option enables both SW and HW based data encryption.
|
||||||
|
endif::[]
|
||||||
|
|
||||||
|
ifdef::ACTION_LUKSFORMAT[]
|
||||||
|
*--hw-opal-only*::
|
||||||
|
Format LUKS2 device with HW based encryption configured on SED OPAL locking range only. LUKS2
|
||||||
|
format only manages locking range unlock key. This option enables HW based data encryption managed
|
||||||
|
by SED OPAL drive only.
|
||||||
|
endif::[]
|
||||||
|
|
||||||
ifdef::ACTION_REENCRYPT[]
|
ifdef::ACTION_REENCRYPT[]
|
||||||
*--force-offline-reencrypt (LUKS2 only)*::
|
*--force-offline-reencrypt (LUKS2 only)*::
|
||||||
Bypass active device auto-detection and enforce offline reencryption.
|
Bypass active device auto-detection and enforce offline reencryption.
|
||||||
|
|||||||
Reference in New Issue
Block a user