From: Jan Rękorajski Date: Fri, 19 Apr 2013 21:05:16 +0000 (+0200) Subject: - package crypttab man page here for interchangability with systemd X-Git-Tag: auto/th/SysVinit-2.88-12 X-Git-Url: http://git.pld-linux.org/?p=packages%2FSysVinit.git;a=commitdiff_plain;h=refs%2Ftags%2Fauto%2Fth%2FSysVinit-2.88-12 - package crypttab man page here for interchangability with systemd - rel 12 --- diff --git a/SysVinit.spec b/SysVinit.spec index 020b5ab..c2ff90b 100644 --- a/SysVinit.spec +++ b/SysVinit.spec @@ -13,13 +13,14 @@ Summary(tr.UTF-8): System V başlatma programı Summary(uk.UTF-8): Програми, що керують базовими системними процесами Name: SysVinit Version: 2.88 -Release: 11 +Release: 12 License: GPL v2+ Group: Base Source0: http://download.savannah.gnu.org/releases/sysvinit/sysvinit-%{version}dsf.tar.bz2 # Source0-md5: 6eda8a97b86e0a6f59dabbf25202aa6f Source1: sysvinit.logrotate Source2: http://www.mif.pg.gda.pl/homepages/ankry/man-PLD/sysvinit-non-english-man-pages.tar.bz2 +Source3: crypttab.5 # Source2-md5: 9ae8a63a4685368fae19707f95475cca Patch0: sysvinit-paths.patch Patch1: sysvinit-bequiet.patch @@ -182,11 +183,16 @@ bzip2 -dc %{SOURCE2} | tar xf - -C $RPM_BUILD_ROOT%{_mandir} cp -a man/intl/* $RPM_BUILD_ROOT%{_mandir} +cp %{SOURCE3} $RPM_BUILD_ROOT%{_mandir}/man5 + # in util-linux rm $RPM_BUILD_ROOT{/bin/mountpoint,%{_mandir}/man1/mountpoint.1*} rm $RPM_BUILD_ROOT{/sbin/sulogin,%{_mandir}/man8/sulogin.8*,%{_mandir}/*/man8/sulogin.8*} rm $RPM_BUILD_ROOT{/usr/bin/utmpdump,%{_mandir}/man1/utmpdump.1*} +# fools rpm-build-macros, don't package this file +:>$RPM_BUILD_ROOT%{_mandir}/man1/utmpdump.1 + %clean rm -rf $RPM_BUILD_ROOT @@ -235,6 +241,7 @@ fi %attr(640,root,root) %ghost /var/log/btmpx %attr(664,root,utmp) %ghost /var/log/wtmpx +%{_mandir}/man5/crypttab.5* %{_mandir}/man5/inittab.5* %{_mandir}/man5/initscript.5* %{_mandir}/man8/bootlogd.8* diff --git a/crypttab.5 b/crypttab.5 new file mode 100644 index 0000000..73bd8ae --- /dev/null +++ b/crypttab.5 @@ -0,0 +1,125 @@ +.\" A man page for /etc/crypttab. +.\" +.\" Copyright (C) 2006 Red Hat, Inc. All rights reserved. +.\" +.\" This copyrighted material is made available to anyone wishing to use, +.\" modify, copy, or redistribute it subject to the terms and conditions of the +.\" GNU General Public License v.2. +.\" +.\" This program is distributed in the hope that it will be useful, but WITHOUT +.\" ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or +.\" FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for +.\" more details. +.\" +.\" You should have received a copy of the GNU General Public License along +.\" with this program; if not, write to the Free Software Foundation, Inc., +.\" 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. +.\" +.\" Author: Miloslav Trmac +.TH crypttab 5 "Jul 2006" + +.SH NAME +/etc/crypttab - encrypted block device table + +.SH DESCRIPTION +The +.B /etc/crypptab +file describes encrypted block devices that are set up during system boot. + +Empty lines and lines starting with the +.B # +character are ignored. +Each of the remaining lines describes one encrypted block device, +fields on the line are delimited by white space. +The first two fields are mandatory, the remaining two are optional. + +The first field contains the +.I name +of the resulting encrypted block device; +the device is set up at +\fB/dev/mapper/\fIname\fR. + +The second field contains a path to the underlying block device. +If the block device contains a LUKS signature, +it is opened as a LUKS encrypted partition; +otherwise it is assumed to be a raw dm-crypt partition. + +The third field specifies the encryption password. +If the field is not present or the password is set to \fBnone\fR, +the password has to be manually entered during system boot. +Otherwise the field is interpreted as a path to a file +containing the encryption password. +For swap encryption +.B /dev/urandom +can be used as the password file; +using +.B /dev/random +may prevent boot completion +if the system does not have enough entropy +to generate a truly random encryption key. + +The fourth field, if present, is a comma-delimited list of options. +The following options are recognized: +.TP +\fBcipher=\fIcipher\fR +Specifies the cipher to use; see +.BR cryptsetup (8) +for possible values and the default value of this option. +A cipher with unpredictable IV values, such as +\fBaes-cbc-essiv:sha256\fR, is recommended. + +.TP +\fBsize=\fIsize\fR +Specifies the key size in bits; see +.BR cryptsetup (8) +for possible values and the default value of this option. + +.TP +\fBhash=\fIhash\fR +Specifies the hash to use for password hashing; see +.BR cryptsetup (8) +for possible values and the default value of this option. + +.TP +\fBverify\fR +If the the encryption password is read from console, +it has to be entered twice (to prevent typos). + +.TP +\fBswap\fR +The encrypted block device will be used as a swap partition, +and will be formatted as a swap partition +after setting up the encrypted block device. +The underlying block device +will be formatted again as an unencrypted swap partition +after destroying the encrypted block device. +(This allows sharing a single swap partition between operating +system installations, +with some of them encrypting the swap partitions and some of them not.) + +\fIWARNING\fR: Using the +.B swap +option will destroy the contents of the named partition during every boot, so +make sure the underlying block device is specified correctly. + +.TP +\fBtmp\fR +The encrypted block device will be prepared for using it as tmp partition: +it will be formatted using +.B mke2fs +and its root directory will be set to mode 01777. +The warning about the +.B swap +option applies here as well. + +.PP +No options can be specified for LUKS encrypted partitions. + +.SH COMPATIBILITY +The +.B /etc/crypptab +file format is based on the Debian cryptsetup package, +and is intended to be compatible. + +.SH SEE ALSO +.BR cryptsetup (8)