diff --git a/man/cryptsetup-reencrypt.8 b/man/cryptsetup-reencrypt.8 index 76136ed5..5fff96aa 100644 --- a/man/cryptsetup-reencrypt.8 +++ b/man/cryptsetup-reencrypt.8 @@ -139,7 +139,7 @@ This means that last sectors on the original device will be lost, ciphertext data will be effectively shifted by specified number of sectors. -It can be usefull if you e.g. added some space to underlying +It can be useful if you e.g. added some space to underlying partition (so last sectors contains no data). For units suffix see \-\-device-size parameter description. @@ -160,7 +160,7 @@ WARNING: This is destructive operation and cannot be reverted. .B "\-\-use-directio" Use direct-io (O_DIRECT) for all read/write data operations. -Usefull if direct-io operations perform better than normal buffered +Useful if direct-io operations perform better than normal buffered operations (e.g. in virtual environments). .TP .B "\-\-use-fsync" @@ -187,7 +187,7 @@ Reencrypt /dev/sdb1 (change volume key) cryptsetup-reencrypt /dev/sdb1 .TP Reencrypt and also change cipher and cipher mode -cryptsetup-reencrypt /dev/sdb1 -c aes-xts-plain64 +cryptsetup-reencrypt /dev/sdb1 \-c aes-xts-plain64 .TP Add LUKS encryption to not yet encrypted device @@ -196,9 +196,9 @@ Or alternatively shrink filesystem in advance. .br Here we need 4096 512-bytes sectors (enough for 2x128 bit key). -fdisk -u /dev/sdb # move sdb1 partition end + 4096 sectors +fdisk \-u /dev/sdb # move sdb1 partition end + 4096 sectors -cryptsetup-reencrypt /dev/sdb1 --new --reduce-device-size 4096 +cryptsetup-reencrypt /dev/sdb1 \-\-new \-\-reduce-device-size 4096 .SH REPORTING BUGS Report bugs, including ones in the documentation, on diff --git a/man/cryptsetup.8 b/man/cryptsetup.8 index ea529a29..5e663dfa 100644 --- a/man/cryptsetup.8 +++ b/man/cryptsetup.8 @@ -131,7 +131,7 @@ Opens (creates a mapping with) backed by device . \-\-key-file, \-\-keyfile-offset, \-\-key-size, \-\-offset, \-\-skip, \-\-size, \-\-readonly, \-\-shared, \-\-allow-discards] -Example: 'cryptsetup open --type plain /dev/sda10 e1' maps the raw +Example: 'cryptsetup open \-\-type plain /dev/sda10 e1' maps the raw encrypted device /dev/sda10 to the mapped (decrypted) device /dev/mapper/e1, which can then be mounted, fsck-ed or have a filesystem created on it. @@ -248,7 +248,7 @@ as positional argument or via \-\-key-file. \fBWARNING:\fR If you read the passphrase from stdin (without further argument or with '-' as argument -to \-\-key\-file), batch-mode (-q) will be implicitely +to \-\-key\-file), batch-mode (\-q) will be implicitely switched on and no warning will be given when you remove the last remaining passphrase from a LUKS container. Removing the last passphrase makes the LUKS container permanently @@ -292,7 +292,7 @@ passphrase makes a LUKS container permanently inaccessible. \fBWARNING:\fR If you read the passphrase from stdin (without further argument or with '-' as argument -to \-\-key-file), batch-mode (-q) will be implicitely +to \-\-key-file), batch-mode (\-q) will be implicitely switched on and no warning will be given when you remove the last remaining passphrase from a LUKS container. Removing the last passphrase makes the LUKS container permanently @@ -438,7 +438,7 @@ device, not image in file), then only this partition is mapped. If you have whole TCRYPT device as a file image and you want to map multiple partition encrypted with system encryption, please create loopback mapping -with partitions first (\fBlosetup -P\fR, see \fPlosetup(8)\fR man page for more info), +with partitions first (\fBlosetup \-P\fR, see \fPlosetup(8)\fR man page for more info), and use loop partition as the device parameter. If you use whole base device as parameter, one device for the whole system @@ -657,7 +657,7 @@ master key which will compromise security. For \fIluksAddKey\fR this allows adding a new passphrase without having to know an exiting one. -For \fIopen\fR this allows to open the LUKS device +For \fIopen\fR this allows one to open the LUKS device without giving a passphrase. .TP .B "\-\-dump\-master\-key" @@ -807,7 +807,7 @@ mapping name is not mandatory if this option is used). .TP .B "\-\-header\fR " Use a detached (separated) metadata device or file where the -LUKS header is stored. This options allows to store ciphertext +LUKS header is stored. This options allows one to store ciphertext and LUKS header on different devices. This option is only relevant for LUKS devices and can be diff --git a/src/cryptsetup_reencrypt.c b/src/cryptsetup_reencrypt.c index f4f48ea5..b0e04ff2 100644 --- a/src/cryptsetup_reencrypt.c +++ b/src/cryptsetup_reencrypt.c @@ -1161,7 +1161,7 @@ int main(int argc, const char **argv) { "tries", 'T', POPT_ARG_INT, &opt_tries, 0, N_("How often the input of the passphrase can be retried"), NULL }, { "use-random", '\0', POPT_ARG_NONE, &opt_random, 0, N_("Use /dev/random for generating volume key."), NULL }, { "use-urandom", '\0', POPT_ARG_NONE, &opt_urandom, 0, N_("Use /dev/urandom for generating volume key."), NULL }, - { "use-directio", '\0', POPT_ARG_NONE, &opt_directio, 0, N_("Use direct-io when accesing devices."), NULL }, + { "use-directio", '\0', POPT_ARG_NONE, &opt_directio, 0, N_("Use direct-io when accessing devices."), NULL }, { "use-fsync", '\0', POPT_ARG_NONE, &opt_fsync, 0, N_("Use fsync after each block."), NULL }, { "write-log", '\0', POPT_ARG_NONE, &opt_write_log, 0, N_("Update log file after every block."), NULL }, { "key-slot", 'S', POPT_ARG_INT, &opt_key_slot, 0, N_("Use only this slot (others will be disabled)."), NULL },