['systemd-creds', '1', [], ''],
['systemd-cryptenroll', '1', [], 'HAVE_LIBCRYPTSETUP'],
['systemd-cryptsetup-generator', '8', [], 'HAVE_LIBCRYPTSETUP'],
- ['systemd-cryptsetup@.service',
+ ['systemd-cryptsetup',
'8',
- ['systemd-cryptsetup'],
+ ['systemd-cryptsetup@.service'],
'HAVE_LIBCRYPTSETUP'],
['systemd-debug-generator', '8', [], ''],
['systemd-delta', '1', [], ''],
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
<!-- SPDX-License-Identifier: LGPL-2.1-or-later -->
-<refentry id="systemd-cryptsetup@.service" conditional='HAVE_LIBCRYPTSETUP'>
+<refentry id="systemd-cryptsetup" conditional='HAVE_LIBCRYPTSETUP'>
<refentryinfo>
- <title>systemd-cryptsetup@.service</title>
+ <title>systemd-cryptsetup</title>
<productname>systemd</productname>
</refentryinfo>
<refmeta>
- <refentrytitle>systemd-cryptsetup@.service</refentrytitle>
+ <refentrytitle>systemd-cryptsetup</refentrytitle>
<manvolnum>8</manvolnum>
</refmeta>
<refnamediv>
+ <refname>systemd-cryptsetup</refname>
<refname>systemd-cryptsetup@.service</refname>
<!-- <refname>system-systemd\x2dcryptsetup.slice</refname> — this causes meson to go haywire because it
thinks this is a (windows) path. Let's just not create the alias for this name, and only include it
in the synopsis. -->
- <refname>systemd-cryptsetup</refname>
<refpurpose>Full disk decryption logic</refpurpose>
</refnamediv>
<refsynopsisdiv>
+ <cmdsynopsis>
+ <command>systemd-cryptsetup</command>
+ <arg choice="opt" rep="repeat">OPTIONS</arg>
+ <arg choice="plain">attach</arg>
+ <arg choice="plain">VOLUME</arg>
+ <arg choice="plain">SOURCE-DEVICE</arg>
+ <arg choice="opt">KEY-FILE</arg>
+ <arg choice="opt">CONFIG</arg>
+ </cmdsynopsis>
+
+ <cmdsynopsis>
+ <command>systemd-cryptsetup</command>
+ <arg choice="opt" rep="repeat">OPTIONS</arg>
+ <arg choice="plain">detach</arg>
+ <arg choice="plain">VOLUME</arg>
+ </cmdsynopsis>
+
<para><filename>systemd-cryptsetup@.service</filename></para>
<para><filename>system-systemd\x2dcryptsetup.slice</filename></para>
- <para><filename>systemd-cryptsetup</filename></para>
</refsynopsisdiv>
<refsect1>
<title>Description</title>
- <para><filename>systemd-cryptsetup@.service</filename> is a service responsible for setting up encrypted
- block devices. It is instantiated for each device that requires decryption for access.</para>
+ <para><filename>systemd-cryptsetup</filename> is used to set up (with <command>attach</command>) and tear
+ down (with <command>detach</command>) access to an encrypted block device. It is primarily used via
+ <filename>systemd-cryptsetup@.service</filename> during early boot, but may also be be called manually.
+ The positional arguments <parameter>VOLUME</parameter>, <parameter>SOURCEDEVICE</parameter>,
+ <parameter>KEY-FILE</parameter>, and <parameter>CRYPTTAB-OPTIONS</parameter> have the same meaning as the
+ fields in <citerefentry><refentrytitle>crypttab</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+ </para>
+
+ <para><filename>systemd-cryptsetup@.service</filename> is a service responsible for providing access to
+ encrypted block devices. It is instantiated for each device that requires decryption.</para>
<para><filename>systemd-cryptsetup@.service</filename> instances are part of the
<filename>system-systemd\x2dcryptsetup.slice</filename> slice, which is destroyed only very late in the
translated into <filename>systemd-cryptsetup@.service</filename> units by
<citerefentry><refentrytitle>systemd-cryptsetup-generator</refentrytitle><manvolnum>8</manvolnum></citerefentry>.</para>
- <para>In order to unlock a volume a password or binary key is
- required. <filename>systemd-cryptsetup@.service</filename> tries to acquire a suitable password or binary
- key via the following mechanisms, tried in order:</para>
+ <para>In order to unlock a volume a password or binary key is required.
+ <filename>systemd-cryptsetup@.service</filename> tries to acquire a suitable password or binary key via
+ the following mechanisms, tried in order:</para>
<orderedlist>
<listitem><para>If a key file is explicitly configured (via the third column in
too, if a PKCS#11/FIDO2/TPM2 token/device is configured, any key found this way is decrypted before
use.</para></listitem>
- <listitem><para>If the <varname>try-empty-password</varname> option is specified it is then attempted
- to unlock the volume with an empty password.</para></listitem>
+ <listitem><para>If the <varname>try-empty-password</varname> option is specified then unlocking the
+ volume with an empty password is attempted.</para></listitem>
<listitem><para>The kernel keyring is then checked for a suitable cached password from previous
attempts.</para></listitem>