Skip to content

Commit 2cf4c9a

Browse files
committed
man: Avoid forced line breaks where not necessary.
1 parent 360f85d commit 2cf4c9a

File tree

5 files changed

+49
-48
lines changed

5 files changed

+49
-48
lines changed

man/cryptsetup-luksHeaderBackup.8.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,12 @@ cryptsetup-luksHeaderBackup - store a binary backup of the LUKS header and keysl
1616

1717
== DESCRIPTION
1818

19-
Stores a binary backup of the LUKS header and keyslot area. +
20-
*NOTE:* Using '-' as a filename writes the header backup to a file named '-'.
19+
Stores a binary backup of the LUKS header and keyslot area.
2120

2221
*<options>* can be [--header, --header-backup-file, --disable-locks].
2322

23+
*NOTE:* Using '-' as a filename writes the header backup to a file named '-'.
24+
2425
*WARNING:* This backup file and a passphrase valid at the time of backup allow decryption of the LUKS data area, even if the passphrase was later changed or removed from the LUKS device.
2526
Also, note that with a header backup, you lose the ability to wipe the LUKS device securely by just overwriting the header and keyslots.
2627
You must either securely erase all header backups or overwrite the encrypted data area.

man/cryptsetup-luksHeaderRestore.8.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,12 @@ cryptsetup-luksHeaderRestore - restore a binary backup of the LUKS header and ke
1616

1717
== DESCRIPTION
1818

19-
Restores a binary backup of the LUKS header and keyslot area from the specified file. +
20-
*NOTE:* Using '-' as a filename reads the header backup from a file named '-'.
19+
Restores a binary backup of the LUKS header and keyslot area from the specified file.
2120

2221
*<options>* can be [--header, --header-backup-file, --disable-locks].
2322

23+
*NOTE:* Using '-' as a filename reads the header backup from a file named '-'.
24+
2425
*WARNING:* Header and keyslots will be replaced; only the passphrases from the backup will work afterward.
2526

2627
This command requires that the volume key size and data offset of the LUKS header already on the device and the header backup match.

man/cryptsetup-luksUUID.8.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ cryptsetup-luksUUID - print or set the UUID of a LUKS device
1616

1717
== DESCRIPTION
1818

19-
Print the UUID of a LUKS device. +
19+
Print the UUID of a LUKS device.
20+
2021
Set new UUID if --uuid option is specified.
2122

2223
*<options>* can be [--header, --uuid, --type, --disable-locks].

man/cryptsetup-open.8.adoc

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ create <name> <device> (OBSOLETE syntax)
3838

3939
Opens (creates a mapping with) <name> backed by device <device>.
4040

41-
*WARNING:* You should always specify options --cipher, --key-size and (if no keyfile or keyring is used) then also --hash to avoid incompatibility, as default values can differ in older cryptsetup versions. +
41+
*WARNING:* You should always specify options --cipher, --key-size and (if no keyfile or keyring is used) then also --hash to avoid incompatibility, as default values can differ in older cryptsetup versions.
4242

4343
The plain format also allows retrieving a volume key from a kernel keyring specified by --volume-key-keyring.
4444
The key in the kernel keyring must be configured before issuing cryptsetup commands, as cryptsetup does not upload any keys to the keyring in plain mode.
@@ -82,13 +82,11 @@ loopaesOpen <device> <name> --key-file <keyfile> (old syntax)
8282

8383
Opens the loop-AES <device> and sets up a mapping <name>.
8484

85-
If the key file is encrypted with GnuPG, then you have to use --key-file=- and decrypt it before use, e.g., like this: +
86-
gpg --decrypt <keyfile> | cryptsetup loopaesOpen --key-file=- <device>
87-
<name>
85+
If the key file is encrypted with GnuPG, then you have to use --key-file=- and decrypt it before use, e.g., like this:
86+
*gpg --decrypt <keyfile> | cryptsetup loopaesOpen --key-file=- <device> <name>*.
8887

89-
*WARNING:* The loop-AES extension cannot use the direct input of the key file on the real terminal because the keys are separated by end-of-line, and only part of the multi-key file would be read. +
90-
If you need it in script, just use the pipe redirection: +
91-
echo $keyfile | cryptsetup loopaesOpen --key-file=- <device> <name>
88+
*WARNING:* The loop-AES extension cannot use the direct input of the key file on the real terminal because the keys are separated by end-of-line, and only part of the multi-key file would be read.
89+
If you need it in script, just use the pipe redirection: *echo $keyfile | cryptsetup loopaesOpen --key-file=- <device> <name>*.
9290

9391
Use --keyfile-size to specify the proper key length if needed.
9492

man/cryptsetup.8.adoc

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -30,37 +30,37 @@ The following are valid actions for all supported device types.
3030
=== OPEN
3131
*open <device> <name> --type <device_type>*
3232

33-
Opens (creates a mapping with) <name> backed by device <device>. +
33+
Opens (creates a mapping with) <name> backed by device <device>.
3434
See *cryptsetup-open*(8).
3535

3636
=== CLOSE
3737
*close <name>*
3838

39-
Removes the existing mapping <name> and wipes the key from kernel memory. +
39+
Removes the existing mapping <name> and wipes the key from kernel memory.
4040
See *cryptsetup-close*(8).
4141

4242
=== STATUS
4343
*status <name>*
4444

45-
Reports the status for the mapping <name>. +
45+
Reports the status for the mapping <name>.
4646
See *cryptsetup-status*(8).
4747

4848
=== RESIZE
4949
*resize <name>*
5050

51-
Resizes an active mapping <name>. +
51+
Resizes an active mapping <name>.
5252
See *cryptsetup-resize*(8).
5353

5454
=== REFRESH
5555
*refresh <name>*
5656

57-
Refreshes parameters of active mapping <name>. +
57+
Refreshes parameters of active mapping <name>.
5858
See *cryptsetup-refresh*(8).
5959

6060
=== REENCRYPT
6161
*reencrypt <device> or --active-name <name> [<new_name>]*
6262

63-
Run LUKS device reencryption. +
63+
Run LUKS device reencryption.
6464
See *cryptsetup-reencrypt*(8).
6565

6666
== PLAIN MODE
@@ -77,7 +77,7 @@ The following are valid plain device type actions:
7777
*open --type plain <device> <name>* +
7878
create <name> <device> (*OBSOLETE syntax*)
7979

80-
Opens (creates a mapping with) <name> backed by device <device>. +
80+
Opens (creates a mapping with) <name> backed by device <device>.
8181
See *cryptsetup-open*(8).
8282

8383
== LUKS EXTENSION
@@ -109,111 +109,111 @@ The following are valid LUKS actions:
109109
=== FORMAT
110110
*luksFormat <device> [<key file>]*
111111

112-
Initializes a LUKS partition and sets the initial passphrase (for keyslot 0). +
112+
Initializes a LUKS partition and sets the initial passphrase (for keyslot 0).
113113
See *cryptsetup-luksFormat*(8).
114114

115115
=== OPEN
116116
*open --type luks <device> <name>* +
117117
luksOpen <device> <name> (*old syntax*)
118118

119-
Opens the LUKS device <device> and sets up a mapping <name> after successful verification of the supplied passphrase. +
119+
Opens the LUKS device <device> and sets up a mapping <name> after successful verification of the supplied passphrase.
120120
See *cryptsetup-open*(8).
121121

122122
=== SUSPEND
123123
*luksSuspend <name>*
124124

125-
Suspends an active device (all IO operations will block and accesses to the device will wait indefinitely) and wipes the encryption key from kernel memory. +
125+
Suspends an active device (all IO operations will block and accesses to the device will wait indefinitely) and wipes the encryption key from kernel memory.
126126
See *cryptsetup-luksSuspend*(8).
127127

128128
=== RESUME
129129
*luksResume <name>*
130130

131-
Resumes a suspended device and reinstates the encryption key. +
131+
Resumes a suspended device and reinstates the encryption key.
132132
See *cryptsetup-luksResume*(8).
133133

134134
=== ADD KEY
135135
*luksAddKey <device> [<key file with new key>]*
136136

137-
Adds a new passphrase using an existing passphrase. +
137+
Adds a new passphrase using an existing passphrase.
138138
See *cryptsetup-luksAddKey*(8).
139139

140140
=== REMOVE KEY
141141
*luksRemoveKey <device> [<key file with passphrase to be removed>]*
142142

143-
Removes the supplied passphrase from the LUKS device. +
143+
Removes the supplied passphrase from the LUKS device.
144144
See *cryptsetup-luksRemoveKey*(8).
145145

146146
=== CHANGE KEY
147147
*luksChangeKey <device> [<new key file>]*
148148

149-
Changes an existing passphrase. +
149+
Changes an existing passphrase.
150150
See *cryptsetup-luksChangeKey*(8).
151151

152152
=== CONVERT KEY
153153
*luksConvertKey <device>*
154154

155-
Converts an existing LUKS2 keyslot to new PBKDF parameters. +
155+
Converts an existing LUKS2 keyslot to new PBKDF parameters.
156156
See *cryptsetup-luksConvertKey*(8).
157157

158158
=== KILL SLOT
159159
*luksKillSlot <device> <number>*
160160

161-
Wipe the keyslot with the <number> from the LUKS device. +
161+
Wipe the keyslot with the <number> from the LUKS device.
162162
See *cryptsetup-luksKillSlot*(8).
163163

164164
=== ERASE
165165
*erase <device>* +
166166
luksErase <device> (*old syntax*)
167167

168-
Erase all keyslots and make the LUKS container permanently inaccessible. +
168+
Erase all keyslots and make the LUKS container permanently inaccessible.
169169
See *cryptsetup-erase*(8).
170170

171171
=== UUID
172172
*luksUUID <device>*
173173

174-
Print or set the UUID of a LUKS device. +
174+
Print or set the UUID of a LUKS device.
175175
See *cryptsetup-luksUUID*(8).
176176

177177
=== IS LUKS
178178
*isLuks <device>*
179179

180-
Returns true, if <device> is a LUKS device, false otherwise. +
180+
Returns true, if <device> is a LUKS device, false otherwise.
181181
See *cryptsetup-isLuks*(8).
182182

183183
=== DUMP
184184
*luksDump <device>*
185185

186-
Dump the header information of a LUKS device. +
186+
Dump the header information of a LUKS device.
187187
See *cryptsetup-luksDump*(8).
188188

189189
=== HEADER BACKUP
190190
*luksHeaderBackup <device> --header-backup-file <file>*
191191

192-
Stores a binary backup of the LUKS header and keyslot area. +
192+
Stores a binary backup of the LUKS header and keyslot area.
193193
See *cryptsetup-luksHeaderBackup*(8).
194194

195195
=== HEADER RESTORE
196196
*luksHeaderRestore <device> --header-backup-file <file>*
197197

198-
Restores a binary backup of the LUKS header and keyslot area from the specified file. +
198+
Restores a binary backup of the LUKS header and keyslot area from the specified file.
199199
See *cryptsetup-luksHeaderRestore*(8).
200200

201201
=== TOKEN
202202
*token <add|remove|import|export> <device>*
203203

204-
Manipulate token objects used for obtaining passphrases. +
204+
Manipulate token objects used for obtaining passphrases.
205205
See *cryptsetup-token*(8).
206206

207207
=== CONVERT
208208
*convert <device> --type <format>*
209209

210-
Converts the device between LUKS1 and LUKS2 format (if possible). +
210+
Converts the device between LUKS1 and LUKS2 format (if possible).
211211
See *cryptsetup-convert*(8).
212212

213213
=== CONFIG
214214
*config <device>*
215215

216-
Set permanent configuration options (store to LUKS header). +
216+
Set permanent configuration options (store to LUKS header).
217217
See *cryptsetup-config*(8).
218218

219219
== loop-AES EXTENSION
@@ -224,7 +224,7 @@ Cryptsetup supports mapping a loop-AES encrypted partition using a compatibility
224224
*open --type loopaes <device> <name> --key-file <keyfile>* +
225225
loopaesOpen <device> <name> --key-file <keyfile> (*old syntax*)
226226

227-
Opens the loop-AES <device> and sets up a mapping <name>. +
227+
Opens the loop-AES <device> and sets up a mapping <name>.
228228
See *cryptsetup-open*(8).
229229

230230
See also section 7 of the FAQ and http://loop-aes.sourceforge.net[loop-AES] for more information regarding loop-AES.
@@ -268,13 +268,13 @@ The reason is that if there were any protection, it would require some metadata
268268
*open --type tcrypt <device> <name>* +
269269
tcryptOpen_ <device> <name> (*old syntax*)
270270

271-
Opens the TCRYPT (a TrueCrypt-compatible) <device> and sets up a mapping <name>. +
271+
Opens the TCRYPT (a TrueCrypt-compatible) <device> and sets up a mapping <name>.
272272
See *cryptsetup-open*(8).
273273

274274
=== DUMP
275275
*tcryptDump <device>*
276276

277-
Dump the header information of a TCRYPT device. +
277+
Dump the header information of a TCRYPT device.
278278
See *cryptsetup-tcryptDump*(8).
279279

280280
See also https://en.wikipedia.org/wiki/TrueCrypt[TrueCrypt] and https://en.wikipedia.org/wiki/VeraCrypt[VeraCrypt] pages for more information.
@@ -305,13 +305,13 @@ Other unlocking methods (TPM, SmartCard) are not supported.
305305
*open --type bitlk <device> <name>* +
306306
bitlkOpen <device> <name> (*old syntax*)
307307

308-
Opens the BITLK (a BitLocker-compatible) <device> and sets up a mapping <name>. +
308+
Opens the BITLK (a BitLocker-compatible) <device> and sets up a mapping <name>.
309309
See *cryptsetup-open*(8).
310310

311311
=== DUMP
312312
*bitlkDump <device>*
313313

314-
Dump the header information of a BITLK device. +
314+
Dump the header information of a BITLK device.
315315
See *cryptsetup-bitlkDump*(8).
316316

317317
Please note that cryptsetup does not use any Windows BitLocker code; please report all problems related to this compatibility extension to the cryptsetup project.
@@ -338,7 +338,7 @@ Other unlocking methods are not supported.
338338
*open --type fvault2 <device> <name>* +
339339
fvault2Open <device> <name> (*old syntax*)
340340

341-
Opens the FVAULT2 (a FileVault2-compatible) <device> (usually the second partition on the device) and sets up a mapping <name>. +
341+
Opens the FVAULT2 (a FileVault2-compatible) <device> (usually the second partition on the device) and sets up a mapping <name>.
342342
See *cryptsetup-open*(8).
343343

344344
== SED (Self Encrypting Drive) OPAL EXTENSION
@@ -378,13 +378,13 @@ Additionally specify --hw-opal-factory-reset for a FULL factory reset of the dri
378378
*repair <device>*
379379

380380
Tries to repair the device metadata if possible.
381-
Currently supported only for LUKS device type. +
381+
Currently supported only for LUKS device type.
382382
See *cryptsetup-repair*(8).
383383

384384
=== BENCHMARK
385385
*benchmark <options>*
386386

387-
Benchmarks, ciphers and KDF (key derivation function). +
387+
Benchmarks, ciphers and KDF (key derivation function).
388388
See *cryptsetup-benchmark*(8).
389389

390390
== PLAIN DM-CRYPT OR LUKS?
@@ -591,9 +591,9 @@ For LUKS on-disk metadata specification, see https://gitlab.com/cryptsetup/crypt
591591

592592
== AUTHORS
593593

594-
Cryptsetup was originally written by mailto:[email protected][Jana Saout]. +
595-
The LUKS extensions and original man page were written by mailto:[email protected][Clemens Fruhwirth]. +
596-
Man page extensions by mailto:[email protected][Milan Broz]. +
594+
Cryptsetup was originally written by mailto:[email protected][Jana Saout].
595+
The LUKS extensions and original man page were written by mailto:[email protected][Clemens Fruhwirth].
596+
Man page extensions by mailto:[email protected][Milan Broz].
597597
Man page rewrite and extension by mailto:[email protected][Arno Wagner].
598598

599599
include::man/common_footer.adoc[]

0 commit comments

Comments
 (0)