mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-17 22:00:07 +01:00
Document new basic commands open/close (and old syntax aliases).
This commit is contained in:
165
man/cryptsetup.8
165
man/cryptsetup.8
@@ -48,33 +48,39 @@ Damaging the LUKS header is something people manage to do with
|
|||||||
surprising frequency. This risk is the result of a trade-off
|
surprising frequency. This risk is the result of a trade-off
|
||||||
between security and safety, as LUKS is designed for fast and
|
between security and safety, as LUKS is designed for fast and
|
||||||
secure wiping by just overwriting header and key-slot area.
|
secure wiping by just overwriting header and key-slot area.
|
||||||
|
.SH BASIC COMMANDS
|
||||||
|
The following are valid actions for all supported device types.
|
||||||
|
|
||||||
.SH PLAIN MODE
|
\fIopen\fR <name> <device> \-\-type <device_type>
|
||||||
Plain dm-crypt encrypts the device sector-by-sector with a
|
|
||||||
single, non-salted hash of the passphrase. No checks
|
|
||||||
are performed, no metadata is used. There is no formatting operation.
|
|
||||||
When the raw device is mapped (created), the usual device operations
|
|
||||||
can be used on the mapped device, including filesystem creation.
|
|
||||||
Mapped devices usually reside in /dev/mapper/<name>.
|
|
||||||
|
|
||||||
There are four operations:
|
|
||||||
|
|
||||||
\fIcreate\fR <name> <device>
|
|
||||||
.IP
|
.IP
|
||||||
Creates a mapping with <name> backed by device <device>.
|
Opens (creates a mapping) with <name> backed by device <device>.
|
||||||
|
|
||||||
\fB<options>\fR can be [\-\-hash, \-\-cipher, \-\-verify-passphrase,
|
Device type can be \fIplain\fR, \fIluks\fR (default), \fIloopaes\fR
|
||||||
\-\-key-file, \-\-keyfile-offset, \-\-key-size, \-\-offset, \-\-skip, \-\-size,
|
or \fItcrypt\fR.
|
||||||
\-\-readonly, \-\-shared, \-\-allow-discards]
|
|
||||||
|
|
||||||
Example: 'cryptsetup create e1 /dev/sda10' maps the raw
|
For backward compatibility there are \fBopen\fR command aliases:
|
||||||
encrypted device /dev/sda10 to the mapped (decrypted) device
|
|
||||||
/dev/mapper/e1, which can then be mounted, fsck-ed or have a
|
\fBcreate\fR: open \-\-type plain <device> <name>\fR switched arguments)
|
||||||
filesystem created on it.
|
.br
|
||||||
|
\fBplainOpen\fR: open \-\-type plain
|
||||||
|
.br
|
||||||
|
\fBluksOpen\fR: open \-\-type luks
|
||||||
|
.br
|
||||||
|
\fBloopaesOpen\fR: open \-\-type loopaes
|
||||||
|
.br
|
||||||
|
\fBtcryptOpen\fR: open \-\-type tcrypt
|
||||||
|
|
||||||
|
\fB<options>\fR are type specific and are described below
|
||||||
|
for individual device types.
|
||||||
.PP
|
.PP
|
||||||
\fIremove\fR <name>
|
\fIclose\fR <name>
|
||||||
.IP
|
.IP
|
||||||
Removes the existing mapping <name> and wipes the key from kernel memory.
|
Removes the existing mapping <name> and wipes the key from kernel memory.
|
||||||
|
|
||||||
|
For backward compatibility there are \fBclose\fR command aliases:
|
||||||
|
\fBremove\fR, \fBplainClose\fR, \fBluksClose\fR, \fBloopaesClose\fR,
|
||||||
|
\fBtcryptClose\fR (all behaves exactly the same, device type is
|
||||||
|
determined automatically from active device).
|
||||||
.PP
|
.PP
|
||||||
\fIstatus\fR <name>
|
\fIstatus\fR <name>
|
||||||
.IP
|
.IP
|
||||||
@@ -88,6 +94,30 @@ If \-\-size (in sectors) is not specified, the size of the
|
|||||||
underlying block device is used. Note that this does not
|
underlying block device is used. Note that this does not
|
||||||
change the raw device geometry, it just changes how many
|
change the raw device geometry, it just changes how many
|
||||||
sectors of the raw device are represented in the mapped device.
|
sectors of the raw device are represented in the mapped device.
|
||||||
|
.SH PLAIN MODE
|
||||||
|
Plain dm-crypt encrypts the device sector-by-sector with a
|
||||||
|
single, non-salted hash of the passphrase. No checks
|
||||||
|
are performed, no metadata is used. There is no formatting operation.
|
||||||
|
When the raw device is mapped (created), the usual device operations
|
||||||
|
can be used on the mapped device, including filesystem creation.
|
||||||
|
Mapped devices usually reside in /dev/mapper/<name>.
|
||||||
|
|
||||||
|
The following are valid plain device type actions:
|
||||||
|
|
||||||
|
\fIopen\fR \-\-type plain <device> <name>
|
||||||
|
.br
|
||||||
|
\fIcreate\fR <name> <device> (\fBOBSOLETE syntax\fR)
|
||||||
|
.IP
|
||||||
|
Creates a mapping with <name> backed by device <device>.
|
||||||
|
|
||||||
|
\fB<options>\fR can be [\-\-hash, \-\-cipher, \-\-verify-passphrase,
|
||||||
|
\-\-key-file, \-\-keyfile-offset, \-\-key-size, \-\-offset, \-\-skip, \-\-size,
|
||||||
|
\-\-readonly, \-\-shared, \-\-allow-discards]
|
||||||
|
|
||||||
|
Example: 'cryptsetup open --type plain /dev/sda10 e1' maps the raw
|
||||||
|
encrypted device /dev/sda10 to the mapped (decrypted) device
|
||||||
|
/dev/mapper/e1, which can then be mounted, fsck-ed or have a
|
||||||
|
filesystem created on it.
|
||||||
.SH LUKS EXTENSION
|
.SH LUKS EXTENSION
|
||||||
LUKS, the Linux Unified Key Setup, is a standard for disk encryption.
|
LUKS, the Linux Unified Key Setup, is a standard for disk encryption.
|
||||||
It adds a standardized header at the start of the device,
|
It adds a standardized header at the start of the device,
|
||||||
@@ -138,7 +168,9 @@ You can only call luksFormat on a LUKS device that is not mapped.
|
|||||||
make all data the old container permanently irretrievable, unless
|
make all data the old container permanently irretrievable, unless
|
||||||
you have a header backup.
|
you have a header backup.
|
||||||
.PP
|
.PP
|
||||||
\fIluksOpen\fR <device> <name>
|
\fIopen\fR \-\-type luks <device> <name>
|
||||||
|
.br
|
||||||
|
\fIluksOpen\fR <device> <name> (\fBold syntax\fR)
|
||||||
.IP
|
.IP
|
||||||
Opens the LUKS device <device> and sets up a mapping <name> after
|
Opens the LUKS device <device> and sets up a mapping <name> after
|
||||||
successful verification of the supplied passphrase.
|
successful verification of the supplied passphrase.
|
||||||
@@ -152,10 +184,6 @@ format UUID=<uuid>, which uses the symlinks in /dev/disk/by-uuid.
|
|||||||
\-\-keyfile-size, \-\-readonly, \-\-test-passphrase,
|
\-\-keyfile-size, \-\-readonly, \-\-test-passphrase,
|
||||||
\-\-allow-discards, \-\-header, \-\-key-slot, \-\-master-key-file].
|
\-\-allow-discards, \-\-header, \-\-key-slot, \-\-master-key-file].
|
||||||
.PP
|
.PP
|
||||||
\fIluksClose\fR <name>
|
|
||||||
.IP
|
|
||||||
identical to \fIremove\fR.
|
|
||||||
.PP
|
|
||||||
\fIluksSuspend\fR <name>
|
\fIluksSuspend\fR <name>
|
||||||
.IP
|
.IP
|
||||||
Suspends an active device (all IO operations will blocked
|
Suspends an active device (all IO operations will blocked
|
||||||
@@ -164,7 +192,7 @@ and wipes the encryption
|
|||||||
key from kernel memory. Needs kernel 2.6.19 or later.
|
key from kernel memory. Needs kernel 2.6.19 or later.
|
||||||
|
|
||||||
After this operation you have to use \fIluksResume\fR to reinstate
|
After this operation you have to use \fIluksResume\fR to reinstate
|
||||||
the encryption key and unblock the device or \fIluksClose\fR to remove
|
the encryption key and unblock the device or \fIclose\fR to remove
|
||||||
the mapped device.
|
the mapped device.
|
||||||
|
|
||||||
\fBWARNING:\fR never suspend the device on which the cryptsetup binary resides.
|
\fBWARNING:\fR never suspend the device on which the cryptsetup binary resides.
|
||||||
@@ -313,23 +341,13 @@ This command requires that the master key size and data offset
|
|||||||
of the LUKS header already on the device and of the header backup
|
of the LUKS header already on the device and of the header backup
|
||||||
match. Alternatively, if there is no LUKS header on the device,
|
match. Alternatively, if there is no LUKS header on the device,
|
||||||
the backup will also be written to it.
|
the backup will also be written to it.
|
||||||
.PP
|
|
||||||
\fIrepair\fR <device>
|
|
||||||
.IP
|
|
||||||
Tries to repair the LUKS device metadata if possible.
|
|
||||||
|
|
||||||
This command is useful to fix some known benign LUKS metadata
|
|
||||||
header corruptions. Only basic corruptions of unused keyslot
|
|
||||||
are fixable. This command will only change the LUKS header, not
|
|
||||||
any key-slot data.
|
|
||||||
|
|
||||||
\fBWARNING:\fR Always create a binary backup of the original
|
|
||||||
header before calling this command.
|
|
||||||
.SH loop-AES EXTENSION
|
.SH loop-AES EXTENSION
|
||||||
cryptsetup supports mapping loop-AES encrypted partition using
|
cryptsetup supports mapping loop-AES encrypted partition using
|
||||||
a compatibility mode.
|
a compatibility mode.
|
||||||
.PP
|
.PP
|
||||||
\fIloopaesOpen\fR <device> <name> \-\-key-file <keyfile>
|
\fIopen\fR \-\-type loopaes <device> <name> \-\-key-file <keyfile>
|
||||||
|
.br
|
||||||
|
\fIloopaesOpen\fR <device> <name> \-\-key-file <keyfile> (\fBold syntax\fR)
|
||||||
.IP
|
.IP
|
||||||
Opens the loop-AES <device> and sets up a mapping <name>.
|
Opens the loop-AES <device> and sets up a mapping <name>.
|
||||||
|
|
||||||
@@ -355,10 +373,6 @@ size).
|
|||||||
\fB<options>\fR can be [\-\-key-file, \-\-key-size, \-\-offset, \-\-skip,
|
\fB<options>\fR can be [\-\-key-file, \-\-key-size, \-\-offset, \-\-skip,
|
||||||
\-\-hash, \-\-readonly, \-\-allow-discards].
|
\-\-hash, \-\-readonly, \-\-allow-discards].
|
||||||
.PP
|
.PP
|
||||||
\fIloopaesClose\fR <name>
|
|
||||||
.IP
|
|
||||||
Identical to \fIremove\fR.
|
|
||||||
.PP
|
|
||||||
See also section 7 of the FAQ and \fBhttp://loop-aes.sourceforge.net\fR
|
See also section 7 of the FAQ and \fBhttp://loop-aes.sourceforge.net\fR
|
||||||
for more information regarding loop-AES.
|
for more information regarding loop-AES.
|
||||||
.SH TCRYPT (TrueCrypt-compatible) EXTENSION
|
.SH TCRYPT (TrueCrypt-compatible) EXTENSION
|
||||||
@@ -386,7 +400,9 @@ and doesn't require superuser privilege.
|
|||||||
To use hidden header (and map hidden device, if available),
|
To use hidden header (and map hidden device, if available),
|
||||||
use \fB\-\-hidden\fR option.
|
use \fB\-\-hidden\fR option.
|
||||||
.PP
|
.PP
|
||||||
\fItcryptOpen\fR <device> <name> \-\-key-file <keyfile>
|
\fIopen\fR \-\-type tcrypt <device> <name>
|
||||||
|
.br
|
||||||
|
\fItcryptOpen\fR <device> <name> (\fBold syntax\fR)
|
||||||
.IP
|
.IP
|
||||||
Opens the TCRYPT (a TrueCrypt-compatible) <device> and sets up a mapping <name>.
|
Opens the TCRYPT (a TrueCrypt-compatible) <device> and sets up a mapping <name>.
|
||||||
|
|
||||||
@@ -414,10 +430,6 @@ to be erased to prevent further access. Use this option carefully.
|
|||||||
The keyfile parameter allows combination of file content with the
|
The keyfile parameter allows combination of file content with the
|
||||||
passphrase and can be repeated.
|
passphrase and can be repeated.
|
||||||
.PP
|
.PP
|
||||||
\fItcryptClose\fR <name>
|
|
||||||
.IP
|
|
||||||
Identical to \fIremove\fR.
|
|
||||||
.PP
|
|
||||||
See also \fBhttp://www.truecrypt.org\fR for more information regarding
|
See also \fBhttp://www.truecrypt.org\fR for more information regarding
|
||||||
TrueCrypt.
|
TrueCrypt.
|
||||||
|
|
||||||
@@ -425,6 +437,19 @@ Please note that cryptsetup does not use TrueCrypt code, please report
|
|||||||
all problems related to this compatibility extension to cryptsetup project.
|
all problems related to this compatibility extension to cryptsetup project.
|
||||||
.SH MISCELLANEOUS
|
.SH MISCELLANEOUS
|
||||||
.PP
|
.PP
|
||||||
|
\fIrepair\fR <device>
|
||||||
|
.IP
|
||||||
|
Tries to repair the device metadata if possible. Currently supported only
|
||||||
|
for LUKS device type.
|
||||||
|
|
||||||
|
This command is useful to fix some known benign LUKS metadata
|
||||||
|
header corruptions. Only basic corruptions of unused keyslot
|
||||||
|
are fixable. This command will only change the LUKS header, not
|
||||||
|
any key-slot data.
|
||||||
|
|
||||||
|
\fBWARNING:\fR Always create a binary backup of the original
|
||||||
|
header before calling this command.
|
||||||
|
.PP
|
||||||
\fIbenchmark\fR <options>
|
\fIbenchmark\fR <options>
|
||||||
.IP
|
.IP
|
||||||
Benchmarks ciphers. Without parameters it tries to measure few common
|
Benchmarks ciphers. Without parameters it tries to measure few common
|
||||||
@@ -450,7 +475,7 @@ Run in debug mode with full diagnostic logs. Debug output
|
|||||||
lines are always prefixed by '#'.
|
lines are always prefixed by '#'.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-hash, \-h \fI<hash-spec>\fR"
|
.B "\-\-hash, \-h \fI<hash-spec>\fR"
|
||||||
Specifies the passphrase hash for \fIcreate\fR and \fIloopaesOpen\fR.
|
Specifies the passphrase hash for \fIopen\fR (for plain and loopaes device types).
|
||||||
|
|
||||||
Specifies the hash used in the LUKS key setup scheme and volume key digest
|
Specifies the hash used in the LUKS key setup scheme and volume key digest
|
||||||
for \fIluksFormat\fR.
|
for \fIluksFormat\fR.
|
||||||
@@ -463,7 +488,7 @@ excludes, e.g., MD5. Do not use a non-crypto hash like
|
|||||||
\fB"crc32"\fR as this breaks security.
|
\fB"crc32"\fR as this breaks security.
|
||||||
|
|
||||||
Values compatible with old version of cryptsetup are
|
Values compatible with old version of cryptsetup are
|
||||||
\fB"ripemd160"\fR for \fIcreate\fR and
|
\fB"ripemd160"\fR for \fIopen \-\-type plain\fR and
|
||||||
\fB"sha1"\fR for \fIluksFormat\fR.
|
\fB"sha1"\fR for \fIluksFormat\fR.
|
||||||
|
|
||||||
Use \fIcryptsetup \-\-help\fR to show the defaults.
|
Use \fIcryptsetup \-\-help\fR to show the defaults.
|
||||||
@@ -550,7 +575,7 @@ header the master key was taken from.
|
|||||||
For \fIluksAddKey\fR this allows adding a new passphrase
|
For \fIluksAddKey\fR this allows adding a new passphrase
|
||||||
without having to know an exiting one.
|
without having to know an exiting one.
|
||||||
|
|
||||||
For \fIluksOpen\fR this allows to open the LUKS device
|
For \fIopen\fR this allows to open the LUKS device
|
||||||
without giving a passphrase.
|
without giving a passphrase.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-dump-master-key"
|
.B "\-\-dump-master-key"
|
||||||
@@ -582,7 +607,7 @@ to specify which key slot is selected for the new key.
|
|||||||
This option can be used for \fIluksFormat\fR,
|
This option can be used for \fIluksFormat\fR,
|
||||||
and \fIluksAddKey\fR.
|
and \fIluksAddKey\fR.
|
||||||
.br
|
.br
|
||||||
In addition, for \fIluksOpen\fR, this option selects a
|
In addition, for \fIopen\fR, this option selects a
|
||||||
specific key-slot to compare the passphrase against.
|
specific key-slot to compare the passphrase against.
|
||||||
If the given passphrase would only match a different key-slot,
|
If the given passphrase would only match a different key-slot,
|
||||||
the operation fails.
|
the operation fails.
|
||||||
@@ -595,23 +620,24 @@ mode used.
|
|||||||
See /proc/crypto for more information. Note that key-size
|
See /proc/crypto for more information. Note that key-size
|
||||||
in /proc/crypto is stated in bytes.
|
in /proc/crypto is stated in bytes.
|
||||||
|
|
||||||
This option can be used for \fIcreate\fR or \fIluksFormat\fR. All
|
This option can be used for \fIopen \-\-type plain\fR or \fIluksFormat\fR.
|
||||||
other LUKS actions will use the key-size specified in the LUKS header.
|
All other LUKS actions will use the key-size specified in the LUKS header.
|
||||||
Use \fIcryptsetup \-\-help\fR to show the compiled-in defaults.
|
Use \fIcryptsetup \-\-help\fR to show the compiled-in defaults.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-size, \-b <number of 512 byte sectors>"
|
.B "\-\-size, \-b <number of 512 byte sectors>"
|
||||||
Force the size of the underlying device in sectors of 512 bytes.
|
Force the size of the underlying device in sectors of 512 bytes.
|
||||||
This option is only relevant for the \fIcreate\fR and \fIresize\fR
|
This option is only relevant for the \fIopen\fR and \fIresize\fR
|
||||||
actions.
|
actions.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-offset, \-o <number of 512 byte sectors>"
|
.B "\-\-offset, \-o <number of 512 byte sectors>"
|
||||||
Start offset in the backend device in 512-byte sectors.
|
Start offset in the backend device in 512-byte sectors.
|
||||||
This option is only relevant for the \fIcreate\fR and \fIloopaesOpen\fR
|
This option is only relevant for the \fIopen\fR action with plain
|
||||||
actions.
|
or loopaes device types.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-skip, \-p <number of 512 byte sectors>"
|
.B "\-\-skip, \-p <number of 512 byte sectors>"
|
||||||
How many sectors of the encrypted data to skip at the beginning.
|
How many sectors of the encrypted data to skip at the beginning.
|
||||||
This option is only relevant for \fIcreate\fR and \fIloopaesOpen\fR action.
|
This option is only relevant for the \fIopen\fR action with plain
|
||||||
|
or loopaes device types.
|
||||||
|
|
||||||
This is different from the \-\-offset options with respect to
|
This is different from the \-\-offset options with respect to
|
||||||
the sector numbers used in IV calculation.
|
the sector numbers used in IV calculation.
|
||||||
@@ -628,7 +654,7 @@ set up a read-only mapping.
|
|||||||
Creates an additional mapping for one common
|
Creates an additional mapping for one common
|
||||||
ciphertext device. Arbitrary mappings are supported.
|
ciphertext device. Arbitrary mappings are supported.
|
||||||
This option is only relevant for the
|
This option is only relevant for the
|
||||||
\fIcreate\fR action. Use \-\-offset, \-\-size and \-\-skip to
|
\fIopen \-\-type plain\fR action. Use \-\-offset, \-\-size and \-\-skip to
|
||||||
specify the mapped area.
|
specify the mapped area.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-iter-time, \-i <number of milliseconds>"
|
.B "\-\-iter-time, \-i <number of milliseconds>"
|
||||||
@@ -646,9 +672,8 @@ the passphrase verification for \fIluksFormat\fR.
|
|||||||
.B "\-\-timeout, \-t <number of seconds>"
|
.B "\-\-timeout, \-t <number of seconds>"
|
||||||
The number of seconds to wait before timeout on passphrase input
|
The number of seconds to wait before timeout on passphrase input
|
||||||
via terminal. It is relevant every time a passphrase is asked,
|
via terminal. It is relevant every time a passphrase is asked,
|
||||||
for example for \fIcreate\fR, \fIluksOpen\fR, \fIluksFormat\fR
|
for example for \fIopen\fR, \fIluksFormat\fR or \fIluksAddKey\fR.
|
||||||
or \fIluksAddKey\fR. It has no effect if used in conjunction
|
It has no effect if used in conjunction with \-\-key-file.
|
||||||
with \-\-key-file.
|
|
||||||
.br
|
.br
|
||||||
This option is useful when the system
|
This option is useful when the system
|
||||||
should not stall if the user does not input a passphrase,
|
should not stall if the user does not input a passphrase,
|
||||||
@@ -659,8 +684,8 @@ which means to wait forever.
|
|||||||
How often the input of the passphrase shall be retried.
|
How often the input of the passphrase shall be retried.
|
||||||
This option is relevant
|
This option is relevant
|
||||||
every time a passphrase is asked, for example for
|
every time a passphrase is asked, for example for
|
||||||
\fIcreate\fR, \fIluksOpen\fR, \fIluksFormat\fR
|
\fIopen\fR, \fIluksFormat\fR or \fIluksAddKey\fR.
|
||||||
or \fIluksAddKey\fR. The default is 3 tries.
|
The default is 3 tries.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-align-payload <number of 512 byte sectors>"
|
.B "\-\-align-payload <number of 512 byte sectors>"
|
||||||
Align payload at a boundary of \fIvalue\fR 512-byte sectors.
|
Align payload at a boundary of \fIvalue\fR 512-byte sectors.
|
||||||
@@ -684,8 +709,7 @@ e.g. 12345678-1234-1234-1234-123456789abc.
|
|||||||
.TP
|
.TP
|
||||||
.B "\-\-allow-discards\fR"
|
.B "\-\-allow-discards\fR"
|
||||||
Allow the use of discard (TRIM) requests for device.
|
Allow the use of discard (TRIM) requests for device.
|
||||||
This option is only relevant for \fIcreate\fR, \fIluksOpen\fR
|
This option is only relevant for \fIopen\fR action.
|
||||||
and \fIloopaesOpen\fR.
|
|
||||||
|
|
||||||
\fBWARNING:\fR This command can have a negative security impact
|
\fBWARNING:\fR This command can have a negative security impact
|
||||||
because it can make filesystem-level operations visible on
|
because it can make filesystem-level operations visible on
|
||||||
@@ -699,7 +723,8 @@ this option is ignored.
|
|||||||
.TP
|
.TP
|
||||||
.B "\-\-test-passphrase\fR"
|
.B "\-\-test-passphrase\fR"
|
||||||
Do not activate device, just verify passphrase.
|
Do not activate device, just verify passphrase.
|
||||||
This option is only relevant for \fIluksOpen\fR.
|
This option is only relevant for \fIopen\fR action (the device
|
||||||
|
mapping name is not mandatory if this option is used).
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-header\fR <device or file storing the LUKS header>"
|
.B "\-\-header\fR <device or file storing the LUKS header>"
|
||||||
Use a detached (separated) metadata device or file where the
|
Use a detached (separated) metadata device or file where the
|
||||||
@@ -707,7 +732,7 @@ LUKS header is stored. This options allows to store ciphertext
|
|||||||
and LUKS header on different devices.
|
and LUKS header on different devices.
|
||||||
|
|
||||||
This option is only relevant for LUKS devices and can be
|
This option is only relevant for LUKS devices and can be
|
||||||
used with the \fIluksFormat\fR, \fIluksOpen\fR, \fIluksSuspend\fR,
|
used with the \fIluksFormat\fR, \fIopen\fR, \fIluksSuspend\fR,
|
||||||
\fIluksResume\fR, \fIstatus\fR and \fIresize\fR commands.
|
\fIluksResume\fR, \fIstatus\fR and \fIresize\fR commands.
|
||||||
|
|
||||||
For \fIluksFormat\fR with a file name as argument to \-\-header,
|
For \fIluksFormat\fR with a file name as argument to \-\-header,
|
||||||
@@ -723,7 +748,7 @@ as absolute sector alignment on ciphertext device and can be zero.
|
|||||||
|
|
||||||
\fBWARNING:\fR There is no check whether the ciphertext device specified
|
\fBWARNING:\fR There is no check whether the ciphertext device specified
|
||||||
actually belongs to the header given. In fact you can specify an
|
actually belongs to the header given. In fact you can specify an
|
||||||
arbitrary device as the ciphertext device for \fIluksOpen\fR
|
arbitrary device as the ciphertext device for \fIopen\fR
|
||||||
with the \-\-header option. Use with care.
|
with the \-\-header option. Use with care.
|
||||||
.TP
|
.TP
|
||||||
.B "\-\-version"
|
.B "\-\-version"
|
||||||
@@ -806,7 +831,7 @@ Whenever a passphrase is added to a LUKS header (luksAddKey, luksFormat),
|
|||||||
the user may specify how much the time the passphrase processing
|
the user may specify how much the time the passphrase processing
|
||||||
should consume. The time is used to determine the iteration count
|
should consume. The time is used to determine the iteration count
|
||||||
for PBKDF2 and higher times will offer better protection for
|
for PBKDF2 and higher times will offer better protection for
|
||||||
low-entropy passphrases, but luksOpen will take longer to
|
low-entropy passphrases, but open will take longer to
|
||||||
complete. For passphrases that have entropy higher than the
|
complete. For passphrases that have entropy higher than the
|
||||||
used key length, higher iteration times will not increase security.
|
used key length, higher iteration times will not increase security.
|
||||||
|
|
||||||
|
|||||||
@@ -1214,7 +1214,7 @@ static struct action_type {
|
|||||||
const char *arg_desc;
|
const char *arg_desc;
|
||||||
const char *desc;
|
const char *desc;
|
||||||
} action_types[] = {
|
} action_types[] = {
|
||||||
{ "open", action_open, 1, 1, N_("<device> [<name>]"),N_("open device as mapping <name>") },
|
{ "open", action_open, 1, 1, N_("<device> [--type <type>] [<name>]"),N_("open device as mapping <name>") },
|
||||||
{ "close", action_close, 1, 1, N_("<name>"), N_("close device (remove mapping)") },
|
{ "close", action_close, 1, 1, N_("<name>"), N_("close device (remove mapping)") },
|
||||||
{ "resize", action_resize, 1, 1, N_("<name>"), N_("resize active device") },
|
{ "resize", action_resize, 1, 1, N_("<name>"), N_("resize active device") },
|
||||||
{ "status", action_status, 1, 0, N_("<name>"), N_("show device status") },
|
{ "status", action_status, 1, 0, N_("<name>"), N_("show device status") },
|
||||||
@@ -1255,6 +1255,10 @@ static void help(poptContext popt_context,
|
|||||||
for(action = action_types; action->type; action++)
|
for(action = action_types; action->type; action++)
|
||||||
log_std("\t%s %s - %s\n", action->type, _(action->arg_desc), _(action->desc));
|
log_std("\t%s %s - %s\n", action->type, _(action->arg_desc), _(action->desc));
|
||||||
|
|
||||||
|
log_std(_("\n"
|
||||||
|
"You can also use old <action> syntax aliases:\n"
|
||||||
|
"\topen: create (plainOpen), luksOpen, loopaesOpen, tcryptOpen\n"
|
||||||
|
"\tclose: remove (plainClose), luksClose, loopaesClose, tcryptClose\n"));
|
||||||
log_std(_("\n"
|
log_std(_("\n"
|
||||||
"<name> is the device to create under %s\n"
|
"<name> is the device to create under %s\n"
|
||||||
"<device> is the encrypted device\n"
|
"<device> is the encrypted device\n"
|
||||||
|
|||||||
Reference in New Issue
Block a user