mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-06 00:10:04 +01:00
36 lines
1.5 KiB
Plaintext
36 lines
1.5 KiB
Plaintext
= cryptsetup-luksKillSlot(8)
|
|
:doctype: manpage
|
|
:manmanual: Maintenance Commands
|
|
:mansource: cryptsetup {release-version}
|
|
:man-linkstyle: pass:[blue R < >]
|
|
:COMMON_OPTIONS:
|
|
:ACTION_LUKSKILLSLOT:
|
|
|
|
== Name
|
|
|
|
cryptsetup-luksKillSlot - wipe a keyslot from the LUKS device
|
|
|
|
== SYNOPSIS
|
|
|
|
*cryptsetup _luksKillSlot_ [<options>] <device> <number>*
|
|
|
|
== DESCRIPTION
|
|
|
|
Wipe the keyslot with the number from the LUKS device.
|
|
|
|
Except running in batch-mode (-q), a remaining passphrase must be supplied, either interactively or via --key-file.
|
|
This command can remove the last remaining keyslot, but requires an interactive confirmation when doing so.
|
|
Removing the last passphrase makes a LUKS container permanently inaccessible.
|
|
|
|
If you read the passphrase from stdin (without further argument or with '-' as an argument to --key-file), batch-mode (-q) will be implicitly switched on and no warning will be given when you remove the last remaining passphrase from a LUKS container.
|
|
Removing the last passphrase makes the LUKS container permanently inaccessible.
|
|
|
|
If no passphrase is provided (on stdin or through --key-file argument) and batch-mode (-q) is active, the keyslot is removed without any other warning.
|
|
|
|
This operation removes only the key in a particular keyslot; it does not wipe any encrypted data.
|
|
|
|
*<options>* can be [--key-file, --keyfile-offset, --keyfile-size, --header, --disable-locks, --type, --verify-passphrase, --timeout].
|
|
|
|
include::man/common_options.adoc[]
|
|
include::man/common_footer.adoc[]
|