aboutsummaryrefslogtreecommitdiff
path: root/man/fscrypt.8.md
diff options
context:
space:
mode:
Diffstat (limited to 'man/fscrypt.8.md')
-rw-r--r--man/fscrypt.8.md270
1 files changed, 135 insertions, 135 deletions
diff --git a/man/fscrypt.8.md b/man/fscrypt.8.md
index 0005458..3994636 100644
--- a/man/fscrypt.8.md
+++ b/man/fscrypt.8.md
@@ -1,136 +1,136 @@
-fscrypt(8) -- manage linux filesystem encryption
-================================================
-
-## SYNOPSIS
-
-**fscrypt** _command_ [arguments] [command options] [`--quiet` | `--verbose`]
-
-**fscrypt** [_command_] `--help`
-
-**fscrypt** `--version`
-
-## DESCRIPTION
-
-TODO
-
-## WARNINGS
-
-TODO
-
-## ALTERNATIVE TOOLS
-
-**fscrypt** only manages native filesystem encryption. The encryption tools
-below may suit your needs better.
-
-**fscryptctl**(8) also manages filesystem encryption, but it does so through a
-very low-level interface. It applies policy identifiers to directories, and
-provisions keys into the kernel keyring. If you want to manage key derivation,
-key rotation, metadata, and PAM integration yourself, this is a more lightweight
-alternative.
-
-Dm-crypt encrypts an entire block device with a single master key. dm-crypt can
-be used with or without **fscrypt**. All filesystem data (including all
-filesystem metadata) is encrypted with this single key when using dm-crypt,
-while **fscrypt** only encrypts the filenames and file contents in a specified
-directory. See **cryptsetup**(8) for more information.
-
-It is possible to use both dm-crypt and **fscrypt** simultaneously, giving the
-protections and benefits of both. One example of a reasonable setup could
-involve using dm-crypt with a TPM or Secure boot key, while using **fscrypt**
-on the contents of a home directory. This would still encrypt the entire drive,
-but would also tie the encryption of a user's personal documents to their
-passphrase. However, this may cause a decrease in your performance, as file
-contents can be encrypted twice.
-
-eCryptfs is another form of filesystem encryption on Linux; it encrypts a
-filesystem directory with some key or passphrase. eCryptfs sits on top of an
-existing filesystem. This makes eCryptfs an alternative choice if your
-filesystem or kernel does not support native filesystem encryption. See
-**ecryptfs**(7) for more information.
-
-## REQUIREMENTS
-
-TODO
-
-## OVERVIEW
-
-TODO: Protectors, Policies, Keyring
-
-## COMMANDS
-
-**fscrypt** has multiple _command_ values, each of which can be used with the
-common options (in this page) and command-specific options (found in the
-below pages).
-
-* **fscrypt-enable**(8):
- Enable encryption on an ext4 filesystem.
-* **fscrypt-setup**(8):
- Create necessary global or per-filesystem files.
-* **fscrypt-encrypt**(8):
- Start encrypting an empty directory.
-* **fscrypt-unlock**(8):
- Unlock an encrypted directory.
-* **fscrypt-purge**(8):
- Remove the keys for an encrypted directory.
-* **fscrypt-status**(8):
- Print the status of the system, a filesystem, or a file.
-* **fscrypt-metadata**(8):
- Manipulate the policy or protector metadata. **Warning:** this is an
- _expert_ command that can easily cause data loss. Use with care.
-
-## OPTIONS
-
-* `--help`:
- Show the help text for fscrypt, using the man pages if possible.
-* `--version`:
- Show the version and copyright information.
-* `--verbose`:
- Print additional debug messages to standard output.
-* `--quiet`:
- Print nothing to standard output except for errors. Select the default for
- any options that would normally show a prompt.
-
-## RETURN VALUES
-
-On success, all **fscrypt** commands return 0. On failure, commands will return
-1 and print the corresponding cause of failure to stderr.
-
-## EXAMPLES
-
-TODO
-
-```bash
-# Create the global configuration file. Nothing else needs root.
->>>>> sudo fscrypt setup
-Create "/etc/fscrypt.conf"? [Y/n] y
-Customizing passphrase hashing difficulty for this system...
-Created global config file at "/etc/fscrypt.conf".
-```
-
-## BUGS
-
-Any bugs, problems, or design discussion relating to **fscrypt** should be
-raised in the
-[Github Issue Tracker](https://github.com/google/fscrypt/issues/new).
-
-**IMPORTANT:** Any significant security issues should **NOT** be reported in
-the public issue tracker. Practice responsible disclosure by emailing
-<joerichey@google.com> and <tyhicks@canonical.com> directly.
-
-## AUTHOR
-
-Joe Richey <joerichey94@gmail.com>
-
-## COPYRIGHT
-
-Copyright 2017 Google Inc. under the [Apache 2.0 License](https://www.apache.org/licenses/LICENSE-2.0).
-
-## SEE ALSO
-
-**fscrypt-enable**(8) **fscrypt-setup**(8) **fscrypt-encrypt**(8)
-**fscrypt-unlock**(8) **fscrypt-purge**(8) **fscrypt-status**(8)
-**fscrypt-metadata**(8) **fscrypt-config**(8) **pam_fscrypt**(8)
-**fscryptctl**(8)
-
-[**fscrypt**'s upstream repository](https://github.com/google/fscrypt) contains FAQs, known issues, longer examples, and information about building,
+fscrypt(8) -- manage linux filesystem encryption
+================================================
+
+## SYNOPSIS
+
+**fscrypt** _command_ [arguments] [command options] [`--quiet` | `--verbose`]
+
+**fscrypt** [_command_] `--help`
+
+**fscrypt** `--version`
+
+## DESCRIPTION
+
+TODO
+
+## WARNINGS
+
+TODO
+
+## ALTERNATIVE TOOLS
+
+**fscrypt** only manages native filesystem encryption. The encryption tools
+below may suit your needs better.
+
+**fscryptctl**(8) also manages filesystem encryption, but it does so through a
+very low-level interface. It applies policy identifiers to directories, and
+provisions keys into the kernel keyring. If you want to manage key derivation,
+key rotation, metadata, and PAM integration yourself, this is a more lightweight
+alternative.
+
+Dm-crypt encrypts an entire block device with a single master key. dm-crypt can
+be used with or without **fscrypt**. All filesystem data (including all
+filesystem metadata) is encrypted with this single key when using dm-crypt,
+while **fscrypt** only encrypts the filenames and file contents in a specified
+directory. See **cryptsetup**(8) for more information.
+
+It is possible to use both dm-crypt and **fscrypt** simultaneously, giving the
+protections and benefits of both. One example of a reasonable setup could
+involve using dm-crypt with a TPM or Secure boot key, while using **fscrypt**
+on the contents of a home directory. This would still encrypt the entire drive,
+but would also tie the encryption of a user's personal documents to their
+passphrase. However, this may cause a decrease in your performance, as file
+contents can be encrypted twice.
+
+eCryptfs is another form of filesystem encryption on Linux; it encrypts a
+filesystem directory with some key or passphrase. eCryptfs sits on top of an
+existing filesystem. This makes eCryptfs an alternative choice if your
+filesystem or kernel does not support native filesystem encryption. See
+**ecryptfs**(7) for more information.
+
+## REQUIREMENTS
+
+TODO
+
+## OVERVIEW
+
+TODO: Protectors, Policies, Keyring
+
+## COMMANDS
+
+**fscrypt** has multiple _command_ values, each of which can be used with the
+common options (in this page) and command-specific options (found in the
+below pages).
+
+* **fscrypt-enable**(8):
+ Enable encryption on an ext4 filesystem.
+* **fscrypt-setup**(8):
+ Create necessary global or per-filesystem files.
+* **fscrypt-encrypt**(8):
+ Start encrypting an empty directory.
+* **fscrypt-unlock**(8):
+ Unlock an encrypted directory.
+* **fscrypt-purge**(8):
+ Remove the keys for an encrypted directory.
+* **fscrypt-status**(8):
+ Print the status of the system, a filesystem, or a file.
+* **fscrypt-metadata**(8):
+ Manipulate the policy or protector metadata. **Warning:** this is an
+ _expert_ command that can easily cause data loss. Use with care.
+
+## OPTIONS
+
+* `--help`:
+ Show the help text for fscrypt, using the man pages if possible.
+* `--version`:
+ Show the version and copyright information.
+* `--verbose`:
+ Print additional debug messages to standard output.
+* `--quiet`:
+ Print nothing to standard output except for errors. Select the default for
+ any options that would normally show a prompt.
+
+## RETURN VALUES
+
+On success, all **fscrypt** commands return 0. On failure, commands will return
+1 and print the corresponding cause of failure to stderr.
+
+## EXAMPLES
+
+TODO
+
+```bash
+# Create the global configuration file. Nothing else needs root.
+>>>>> sudo fscrypt setup
+Create "/etc/fscrypt.conf"? [Y/n] y
+Customizing passphrase hashing difficulty for this system...
+Created global config file at "/etc/fscrypt.conf".
+```
+
+## BUGS
+
+Any bugs, problems, or design discussion relating to **fscrypt** should be
+raised in the
+[Github Issue Tracker](https://github.com/google/fscrypt/issues/new).
+
+**IMPORTANT:** Any significant security issues should **NOT** be reported in
+the public issue tracker. Practice responsible disclosure by emailing
+<joerichey@google.com> and <tyhicks@canonical.com> directly.
+
+## AUTHOR
+
+Joe Richey <joerichey94@gmail.com>
+
+## COPYRIGHT
+
+Copyright 2017 Google Inc. under the [Apache 2.0 License](https://www.apache.org/licenses/LICENSE-2.0).
+
+## SEE ALSO
+
+**fscrypt-enable**(8) **fscrypt-setup**(8) **fscrypt-encrypt**(8)
+**fscrypt-unlock**(8) **fscrypt-purge**(8) **fscrypt-status**(8)
+**fscrypt-metadata**(8) **fscrypt-config**(8) **pam_fscrypt**(8)
+**fscryptctl**(8)
+
+[**fscrypt**'s upstream repository](https://github.com/google/fscrypt) contains FAQs, known issues, longer examples, and information about building,
testing, and contributing to **fscrypt**. \ No newline at end of file