aboutsummaryrefslogtreecommitdiff
path: root/man
diff options
context:
space:
mode:
Diffstat (limited to 'man')
-rw-r--r--man/fscrypt-config.8.md18
-rw-r--r--man/fscrypt-enable.8.md18
-rw-r--r--man/fscrypt-encrypt.8.md24
-rw-r--r--man/fscrypt-metadata.8.md18
-rw-r--r--man/fscrypt-purge.8.md18
-rw-r--r--man/fscrypt-setup.8.md22
-rw-r--r--man/fscrypt-status.8.md26
-rw-r--r--man/fscrypt-unlock.8.md20
-rw-r--r--man/fscrypt.8.md270
-rw-r--r--man/pam_fscrypt.8.md18
10 files changed, 226 insertions, 226 deletions
diff --git a/man/fscrypt-config.8.md b/man/fscrypt-config.8.md
index a592088..502226a 100644
--- a/man/fscrypt-config.8.md
+++ b/man/fscrypt-config.8.md
@@ -1,10 +1,10 @@
-fscrypt-config(8) -- configuration file for fscrypt
-===================================================
-
-## SYNOPSIS
-
-`/etc/fscrypt.conf`
-
-## DESCRIPTION
-
+fscrypt-config(8) -- configuration file for fscrypt
+===================================================
+
+## SYNOPSIS
+
+`/etc/fscrypt.conf`
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt-enable.8.md b/man/fscrypt-enable.8.md
index d3a7132..283ac49 100644
--- a/man/fscrypt-enable.8.md
+++ b/man/fscrypt-enable.8.md
@@ -1,10 +1,10 @@
-fscrypt-enable(8) -- enable/disable ext4 filesystem encryption
-==============================================================
-
-## SYNOPSIS
-
-**fscrypt enable** _mountpoint_ [`--disable`] [`--force`]
-
-## DESCRIPTION
-
+fscrypt-enable(8) -- enable/disable ext4 filesystem encryption
+==============================================================
+
+## SYNOPSIS
+
+**fscrypt enable** _mountpoint_ [`--disable`] [`--force`]
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt-encrypt.8.md b/man/fscrypt-encrypt.8.md
index 7d2d8ef..ada7781 100644
--- a/man/fscrypt-encrypt.8.md
+++ b/man/fscrypt-encrypt.8.md
@@ -1,13 +1,13 @@
-fscrypt-encrypt(8) -- start encrypting an empty directory with fscrypt
-======================================================================
-
-## SYNOPSIS
-
-**fscrypt encrypt** _directory_
- [`--source`=_source_ [`--name`=_name_]]
- [`--protector`=_mountpoint:id_ [`--policy`=_mountpoint:id_]]
- [`--key`=_file_] [`--user`=username] [`--skip-unlock`]
-
-## DESCRIPTION
-
+fscrypt-encrypt(8) -- start encrypting an empty directory with fscrypt
+======================================================================
+
+## SYNOPSIS
+
+**fscrypt encrypt** _directory_
+ [`--source`=_source_ [`--name`=_name_]]
+ [`--protector`=_mountpoint:id_ [`--policy`=_mountpoint:id_]]
+ [`--key`=_file_] [`--user`=username] [`--skip-unlock`]
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt-metadata.8.md b/man/fscrypt-metadata.8.md
index da84ccc..8e772a2 100644
--- a/man/fscrypt-metadata.8.md
+++ b/man/fscrypt-metadata.8.md
@@ -1,10 +1,10 @@
-fscrypt-metadata(8) -- manipulate fscrypt policy or protector metadata
-======================================================================
-
-## SYNOPSIS
-
-TODO many to list
-
-## DESCRIPTION
-
+fscrypt-metadata(8) -- manipulate fscrypt policy or protector metadata
+======================================================================
+
+## SYNOPSIS
+
+TODO many to list
+
+## DESCRIPTION
+
TODO warning \ No newline at end of file
diff --git a/man/fscrypt-purge.8.md b/man/fscrypt-purge.8.md
index c171fb6..0711ab4 100644
--- a/man/fscrypt-purge.8.md
+++ b/man/fscrypt-purge.8.md
@@ -1,10 +1,10 @@
-fscrypt-purge(8) -- remove fscrypt keys for an encrypted directory
-==================================================================
-
-## SYNOPSIS
-
-**fscrypt purge** _mountpoint_ [`--drop-caches=false`] [`--user`=username] [`--force`]
-
-## DESCRIPTION
-
+fscrypt-purge(8) -- remove fscrypt keys for an encrypted directory
+==================================================================
+
+## SYNOPSIS
+
+**fscrypt purge** _mountpoint_ [`--drop-caches=false`] [`--user`=username] [`--force`]
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt-setup.8.md b/man/fscrypt-setup.8.md
index 7c160f2..5a1b14d 100644
--- a/man/fscrypt-setup.8.md
+++ b/man/fscrypt-setup.8.md
@@ -1,12 +1,12 @@
-fscrypt-unlock(8) -- setup a system or filesystem to use fscrypt
-================================================================
-
-## SYNOPSIS
-
-**fscrypt setup** [`--time`=_time_] [`--legacy`] [`--force`]
-
-**fscrypt setup** _directory_ [`--force`]
-
-## DESCRIPTION
-
+fscrypt-unlock(8) -- setup a system or filesystem to use fscrypt
+================================================================
+
+## SYNOPSIS
+
+**fscrypt setup** [`--time`=_time_] [`--legacy`] [`--force`]
+
+**fscrypt setup** _directory_ [`--force`]
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt-status.8.md b/man/fscrypt-status.8.md
index f43d469..de36834 100644
--- a/man/fscrypt-status.8.md
+++ b/man/fscrypt-status.8.md
@@ -1,14 +1,14 @@
-fscrypt-status(8) -- print the status of fscrypt
-================================================
-
-## SYNOPSIS
-
-**fscrypt status**
-
-**fscrypt status** _mountpoint_
-
-**fscrypt status** _file_
-
-## DESCRIPTION
-
+fscrypt-status(8) -- print the status of fscrypt
+================================================
+
+## SYNOPSIS
+
+**fscrypt status**
+
+**fscrypt status** _mountpoint_
+
+**fscrypt status** _file_
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt-unlock.8.md b/man/fscrypt-unlock.8.md
index 436ef73..5c2df25 100644
--- a/man/fscrypt-unlock.8.md
+++ b/man/fscrypt-unlock.8.md
@@ -1,11 +1,11 @@
-fscrypt-unlock(8) -- unlock a directory encrypted with fscrypt
-==============================================================
-
-## SYNOPSIS
-
-**fscrypt unlock** _directory_ [`--protector`=_mountpoint:id_]
- [`--key`=_file_] [`--user`=_username_]
-
-## DESCRIPTION
-
+fscrypt-unlock(8) -- unlock a directory encrypted with fscrypt
+==============================================================
+
+## SYNOPSIS
+
+**fscrypt unlock** _directory_ [`--protector`=_mountpoint:id_]
+ [`--key`=_file_] [`--user`=_username_]
+
+## DESCRIPTION
+
TODO \ No newline at end of file
diff --git a/man/fscrypt.8.md b/man/fscrypt.8.md
index 0005458..3994636 100644
--- a/man/fscrypt.8.md
+++ b/man/fscrypt.8.md
@@ -1,136 +1,136 @@
-fscrypt(8) -- manage linux filesystem encryption
-================================================
-
-## SYNOPSIS
-
-**fscrypt** _command_ [arguments] [command options] [`--quiet` | `--verbose`]
-
-**fscrypt** [_command_] `--help`
-
-**fscrypt** `--version`
-
-## DESCRIPTION
-
-TODO
-
-## WARNINGS
-
-TODO
-
-## ALTERNATIVE TOOLS
-
-**fscrypt** only manages native filesystem encryption. The encryption tools
-below may suit your needs better.
-
-**fscryptctl**(8) also manages filesystem encryption, but it does so through a
-very low-level interface. It applies policy identifiers to directories, and
-provisions keys into the kernel keyring. If you want to manage key derivation,
-key rotation, metadata, and PAM integration yourself, this is a more lightweight
-alternative.
-
-Dm-crypt encrypts an entire block device with a single master key. dm-crypt can
-be used with or without **fscrypt**. All filesystem data (including all
-filesystem metadata) is encrypted with this single key when using dm-crypt,
-while **fscrypt** only encrypts the filenames and file contents in a specified
-directory. See **cryptsetup**(8) for more information.
-
-It is possible to use both dm-crypt and **fscrypt** simultaneously, giving the
-protections and benefits of both. One example of a reasonable setup could
-involve using dm-crypt with a TPM or Secure boot key, while using **fscrypt**
-on the contents of a home directory. This would still encrypt the entire drive,
-but would also tie the encryption of a user's personal documents to their
-passphrase. However, this may cause a decrease in your performance, as file
-contents can be encrypted twice.
-
-eCryptfs is another form of filesystem encryption on Linux; it encrypts a
-filesystem directory with some key or passphrase. eCryptfs sits on top of an
-existing filesystem. This makes eCryptfs an alternative choice if your
-filesystem or kernel does not support native filesystem encryption. See
-**ecryptfs**(7) for more information.
-
-## REQUIREMENTS
-
-TODO
-
-## OVERVIEW
-
-TODO: Protectors, Policies, Keyring
-
-## COMMANDS
-
-**fscrypt** has multiple _command_ values, each of which can be used with the
-common options (in this page) and command-specific options (found in the
-below pages).
-
-* **fscrypt-enable**(8):
- Enable encryption on an ext4 filesystem.
-* **fscrypt-setup**(8):
- Create necessary global or per-filesystem files.
-* **fscrypt-encrypt**(8):
- Start encrypting an empty directory.
-* **fscrypt-unlock**(8):
- Unlock an encrypted directory.
-* **fscrypt-purge**(8):
- Remove the keys for an encrypted directory.
-* **fscrypt-status**(8):
- Print the status of the system, a filesystem, or a file.
-* **fscrypt-metadata**(8):
- Manipulate the policy or protector metadata. **Warning:** this is an
- _expert_ command that can easily cause data loss. Use with care.
-
-## OPTIONS
-
-* `--help`:
- Show the help text for fscrypt, using the man pages if possible.
-* `--version`:
- Show the version and copyright information.
-* `--verbose`:
- Print additional debug messages to standard output.
-* `--quiet`:
- Print nothing to standard output except for errors. Select the default for
- any options that would normally show a prompt.
-
-## RETURN VALUES
-
-On success, all **fscrypt** commands return 0. On failure, commands will return
-1 and print the corresponding cause of failure to stderr.
-
-## EXAMPLES
-
-TODO
-
-```bash
-# Create the global configuration file. Nothing else needs root.
->>>>> sudo fscrypt setup
-Create "/etc/fscrypt.conf"? [Y/n] y
-Customizing passphrase hashing difficulty for this system...
-Created global config file at "/etc/fscrypt.conf".
-```
-
-## BUGS
-
-Any bugs, problems, or design discussion relating to **fscrypt** should be
-raised in the
-[Github Issue Tracker](https://github.com/google/fscrypt/issues/new).
-
-**IMPORTANT:** Any significant security issues should **NOT** be reported in
-the public issue tracker. Practice responsible disclosure by emailing
-<joerichey@google.com> and <tyhicks@canonical.com> directly.
-
-## AUTHOR
-
-Joe Richey <joerichey94@gmail.com>
-
-## COPYRIGHT
-
-Copyright 2017 Google Inc. under the [Apache 2.0 License](https://www.apache.org/licenses/LICENSE-2.0).
-
-## SEE ALSO
-
-**fscrypt-enable**(8) **fscrypt-setup**(8) **fscrypt-encrypt**(8)
-**fscrypt-unlock**(8) **fscrypt-purge**(8) **fscrypt-status**(8)
-**fscrypt-metadata**(8) **fscrypt-config**(8) **pam_fscrypt**(8)
-**fscryptctl**(8)
-
-[**fscrypt**'s upstream repository](https://github.com/google/fscrypt) contains FAQs, known issues, longer examples, and information about building,
+fscrypt(8) -- manage linux filesystem encryption
+================================================
+
+## SYNOPSIS
+
+**fscrypt** _command_ [arguments] [command options] [`--quiet` | `--verbose`]
+
+**fscrypt** [_command_] `--help`
+
+**fscrypt** `--version`
+
+## DESCRIPTION
+
+TODO
+
+## WARNINGS
+
+TODO
+
+## ALTERNATIVE TOOLS
+
+**fscrypt** only manages native filesystem encryption. The encryption tools
+below may suit your needs better.
+
+**fscryptctl**(8) also manages filesystem encryption, but it does so through a
+very low-level interface. It applies policy identifiers to directories, and
+provisions keys into the kernel keyring. If you want to manage key derivation,
+key rotation, metadata, and PAM integration yourself, this is a more lightweight
+alternative.
+
+Dm-crypt encrypts an entire block device with a single master key. dm-crypt can
+be used with or without **fscrypt**. All filesystem data (including all
+filesystem metadata) is encrypted with this single key when using dm-crypt,
+while **fscrypt** only encrypts the filenames and file contents in a specified
+directory. See **cryptsetup**(8) for more information.
+
+It is possible to use both dm-crypt and **fscrypt** simultaneously, giving the
+protections and benefits of both. One example of a reasonable setup could
+involve using dm-crypt with a TPM or Secure boot key, while using **fscrypt**
+on the contents of a home directory. This would still encrypt the entire drive,
+but would also tie the encryption of a user's personal documents to their
+passphrase. However, this may cause a decrease in your performance, as file
+contents can be encrypted twice.
+
+eCryptfs is another form of filesystem encryption on Linux; it encrypts a
+filesystem directory with some key or passphrase. eCryptfs sits on top of an
+existing filesystem. This makes eCryptfs an alternative choice if your
+filesystem or kernel does not support native filesystem encryption. See
+**ecryptfs**(7) for more information.
+
+## REQUIREMENTS
+
+TODO
+
+## OVERVIEW
+
+TODO: Protectors, Policies, Keyring
+
+## COMMANDS
+
+**fscrypt** has multiple _command_ values, each of which can be used with the
+common options (in this page) and command-specific options (found in the
+below pages).
+
+* **fscrypt-enable**(8):
+ Enable encryption on an ext4 filesystem.
+* **fscrypt-setup**(8):
+ Create necessary global or per-filesystem files.
+* **fscrypt-encrypt**(8):
+ Start encrypting an empty directory.
+* **fscrypt-unlock**(8):
+ Unlock an encrypted directory.
+* **fscrypt-purge**(8):
+ Remove the keys for an encrypted directory.
+* **fscrypt-status**(8):
+ Print the status of the system, a filesystem, or a file.
+* **fscrypt-metadata**(8):
+ Manipulate the policy or protector metadata. **Warning:** this is an
+ _expert_ command that can easily cause data loss. Use with care.
+
+## OPTIONS
+
+* `--help`:
+ Show the help text for fscrypt, using the man pages if possible.
+* `--version`:
+ Show the version and copyright information.
+* `--verbose`:
+ Print additional debug messages to standard output.
+* `--quiet`:
+ Print nothing to standard output except for errors. Select the default for
+ any options that would normally show a prompt.
+
+## RETURN VALUES
+
+On success, all **fscrypt** commands return 0. On failure, commands will return
+1 and print the corresponding cause of failure to stderr.
+
+## EXAMPLES
+
+TODO
+
+```bash
+# Create the global configuration file. Nothing else needs root.
+>>>>> sudo fscrypt setup
+Create "/etc/fscrypt.conf"? [Y/n] y
+Customizing passphrase hashing difficulty for this system...
+Created global config file at "/etc/fscrypt.conf".
+```
+
+## BUGS
+
+Any bugs, problems, or design discussion relating to **fscrypt** should be
+raised in the
+[Github Issue Tracker](https://github.com/google/fscrypt/issues/new).
+
+**IMPORTANT:** Any significant security issues should **NOT** be reported in
+the public issue tracker. Practice responsible disclosure by emailing
+<joerichey@google.com> and <tyhicks@canonical.com> directly.
+
+## AUTHOR
+
+Joe Richey <joerichey94@gmail.com>
+
+## COPYRIGHT
+
+Copyright 2017 Google Inc. under the [Apache 2.0 License](https://www.apache.org/licenses/LICENSE-2.0).
+
+## SEE ALSO
+
+**fscrypt-enable**(8) **fscrypt-setup**(8) **fscrypt-encrypt**(8)
+**fscrypt-unlock**(8) **fscrypt-purge**(8) **fscrypt-status**(8)
+**fscrypt-metadata**(8) **fscrypt-config**(8) **pam_fscrypt**(8)
+**fscryptctl**(8)
+
+[**fscrypt**'s upstream repository](https://github.com/google/fscrypt) contains FAQs, known issues, longer examples, and information about building,
testing, and contributing to **fscrypt**. \ No newline at end of file
diff --git a/man/pam_fscrypt.8.md b/man/pam_fscrypt.8.md
index 7d02ddb..897b5f8 100644
--- a/man/pam_fscrypt.8.md
+++ b/man/pam_fscrypt.8.md
@@ -1,10 +1,10 @@
-pam_fscrypt(8) -- PAM module for fscrypt
-========================================
-
-## SYNOPSIS
-
-**pam_fscrypt.so** [`drop_caches`] [`lock_policies`] [`debug`]
-
-## DESCRIPTION
-
+pam_fscrypt(8) -- PAM module for fscrypt
+========================================
+
+## SYNOPSIS
+
+**pam_fscrypt.so** [`drop_caches`] [`lock_policies`] [`debug`]
+
+## DESCRIPTION
+
TODO \ No newline at end of file