X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fcrypttab.xml;h=c563851f213cba66de40b0fedb684e513c5d1adf;hb=8a96d94e4c33173d1426b7e0a6325405804ba224;hp=fae39e71b0bed06a5eb6410dd605c03f246b78d4;hpb=fa7abba2328eb2d23a7e27708f86f5013059ddcf;p=elogind.git
diff --git a/man/crypttab.xml b/man/crypttab.xml
index fae39e71b..c563851f2 100644
--- a/man/crypttab.xml
+++ b/man/crypttab.xml
@@ -163,6 +163,20 @@
given by the key size.
+
+ key-slot=
+
+ Specifies the key slot to
+ compare the passphrase or key against.
+ If the key slot does not match the given
+ passphrase or key, but another would, the
+ setup of the device will fail regardless.
+ This implies luks. See
+ cryptsetup8
+ for possible values. The default is to try
+ all key slots in sequential order.
+
+
luks
@@ -291,14 +305,7 @@
Use TrueCrypt in system
encryption mode. This implies
- tcrypt.
-
- Please note that when using this mode, the
- whole device needs to be given in the second
- field instead of the partition. For example: if
- /dev/sda2 is the system
- encrypted TrueCrypt patition, /dev/sda
- has to be given.
+ tcrypt.
@@ -363,8 +370,6 @@
swap /dev/sda7 /dev/urandom swap
truecrypt /dev/sda2 /etc/container_password tcrypt
hidden /mnt/tc_hidden /null tcrypt-hidden,tcrypt-keyfile=/etc/keyfile
- Note that the default hash algorithm is ripemd160. If you use your system
- in FIPS mode, please specify supported hash algorithm (e.g.: hash=sha1).