summaryrefslogtreecommitdiffstats
path: root/man
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-17 08:38:45 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-17 08:38:45 +0000
commit435fbf74bfdf383db1238633326be558ef2d3ff2 (patch)
treea372c8e3c5f2fe60e812d5f6a73ce54872139ee2 /man
parentReleasing progress-linux version 2:2.7.1-1~progress7.99u1. (diff)
downloadcryptsetup-435fbf74bfdf383db1238633326be558ef2d3ff2.tar.xz
cryptsetup-435fbf74bfdf383db1238633326be558ef2d3ff2.zip
Merging upstream version 2:2.7.2.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'man')
-rw-r--r--man/common_options.adoc15
1 files changed, 15 insertions, 0 deletions
diff --git a/man/common_options.adoc b/man/common_options.adoc
index 5c11309..841929b 100644
--- a/man/common_options.adoc
+++ b/man/common_options.adoc
@@ -332,11 +332,26 @@ Format LUKS2 device with dm-crypt encryption stacked on top HW based encryption
on SED OPAL locking range. This option enables both SW and HW based data encryption.
endif::[]
+ifdef::ACTION_ERASE[]
+*--hw-opal-factory-reset*::
+Erase *ALL* data on the OPAL self-encrypted device, regardless of the partition it is ran on, if any,
+and does not require a valid LUKS2 header to be present on the device to run. After providing
+correct PSID via interactive prompt or via *--key-file* parameter the device is erased.
+endif::[]
+
ifdef::ACTION_LUKSFORMAT[]
*--hw-opal-only*::
Format LUKS2 device with HW based encryption configured on SED OPAL locking range only. LUKS2
format only manages locking range unlock key. This option enables HW based data encryption managed
by SED OPAL drive only.
++
+*NOTE*: Please note that with OPAL-only (--hw-opal-only) encryption,
+the configured OPAL administrator PIN (passphrase) allows unlocking
+all configured locking ranges without LUKS keyslot decryption
+(without knowledge of LUKS passphrase).
+Because of many observed problems with compatibility, cryptsetup
+currently DOES NOT use OPAL single-user mode, which would allow such
+decoupling of OPAL admin PIN access.
endif::[]
ifdef::ACTION_REENCRYPT[]