summaryrefslogtreecommitdiffstats
path: root/templates/man1/systemd-cryptenroll.1.pot
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--templates/man1/systemd-cryptenroll.1.pot211
1 files changed, 192 insertions, 19 deletions
diff --git a/templates/man1/systemd-cryptenroll.1.pot b/templates/man1/systemd-cryptenroll.1.pot
index d31f3bae..12d63dd8 100644
--- a/templates/man1/systemd-cryptenroll.1.pot
+++ b/templates/man1/systemd-cryptenroll.1.pot
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
-"POT-Creation-Date: 2024-03-01 17:10+0100\n"
+"POT-Creation-Date: 2024-06-01 06:26+0200\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -24,7 +24,7 @@ msgid "SYSTEMD-CRYPTENROLL"
msgstr ""
#. type: TH
-#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: archlinux fedora-40 mageia-cauldron
#, no-wrap
msgid "systemd 255"
msgstr ""
@@ -84,8 +84,7 @@ msgid ""
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid ""
"PKCS#11 security tokens and smartcards that may carry an RSA key pair (e\\&."
"g\\&. various YubiKeys)"
@@ -597,8 +596,7 @@ msgid "LIMITATIONS"
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid ""
"Note that currently when enrolling a new key of one of the five supported "
"types listed above, it is required to first provide a passphrase, a recovery "
@@ -610,8 +608,7 @@ msgid ""
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid ""
"Also note that support for enrolling multiple FIDO2 tokens is currently "
"limited\\&. When multiple FIDO2 tokens are enrolled, B<systemd-cryptseup> "
@@ -770,8 +767,7 @@ msgid "B<--pkcs11-token-uri=>I<URI>"
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid ""
"Enroll a PKCS#11 security token or smartcard (e\\&.g\\&. a YubiKey)\\&. "
"Expects a PKCS#11 smartcard URI referring to the token\\&. Alternatively the "
@@ -831,8 +827,7 @@ msgid ""
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid "Note that your authenticator may not support some algorithms\\&."
msgstr ""
@@ -1061,8 +1056,7 @@ msgid "This should not be changed unless you know what you are doing\\&."
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid "B<--tpm2-pcrs=> [PCR...]"
msgstr ""
@@ -1134,8 +1128,7 @@ msgid ""
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid ""
"B<--tpm2-public-key=> [PATH], B<--tpm2-public-key-pcrs=> [PCR...], B<--tpm2-"
"signature=> [PATH]"
@@ -1189,7 +1182,7 @@ msgid ""
msgstr ""
#. type: Plain text
-#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: archlinux fedora-40 mageia-cauldron
msgid "B<--tpm2-pcrlock=> [PATH]"
msgstr ""
@@ -1204,8 +1197,7 @@ msgid ""
msgstr ""
#. type: Plain text
-#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
-#: mageia-cauldron
+#: archlinux debian-bookworm fedora-40 mageia-cauldron
msgid "B<--wipe-slot=> [SLOT...]"
msgstr ""
@@ -1390,3 +1382,184 @@ msgid ""
"only\\&. If an empty string is specified, binds the enrollment to no PCRs at "
"all\\&. See the table above for a list of available PCRs\\&."
msgstr ""
+
+#. type: TH
+#: debian-unstable fedora-rawhide
+#, no-wrap
+msgid "systemd 256~rc3"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"PKCS#11 security tokens and smartcards that may carry an RSA or EC key pair "
+"(e\\&.g\\&. various YubiKeys)"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"B<systemd-cryptsetup> operates on the device backing /var/ if no device is "
+"specified explicitly, and no wipe operation is requested\\&. (Note that in "
+"the typical case where /var/ is on the same file system as the root file "
+"system, this hence enrolls a key into the backing device of the root file "
+"system\\&.)"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"Note that currently when enrolling a new key of one of the five supported "
+"types listed above, it is required to first provide a passphrase, a recovery "
+"key, a FIDO2 token, or a TPM2 key\\&. It\\*(Aqs currently not supported to "
+"unlock a device with a PKCS#11 key in order to enroll a new PKCS#11 key\\&. "
+"Thus, if in future key roll-over is desired it\\*(Aqs generally recommended "
+"to ensure a passphrase, a recovery key, a FIDO2 token, or a TPM2 key is "
+"always enrolled\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"Also note that support for enrolling multiple FIDO2 tokens is currently "
+"limited\\&. When multiple FIDO2 tokens are enrolled, B<systemd-cryptsetup> "
+"will perform pre-flight requests to attempt to identify which of the "
+"enrolled tokens are currently plugged in\\&. However, this is not possible "
+"for FIDO2 tokens with user verification (UV, usually via biometrics), in "
+"which case it will fall back to attempting each enrolled token one by "
+"one\\&. This will result in multiple prompts for PIN and user "
+"verification\\&. This limitation does not apply to PKCS#11 tokens\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "B<--unlock-tpm2-device=>I<PATH>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"Use a TPM2 device instead of a password/passhprase read from stdin to unlock "
+"the volume\\&. Expects a device node path referring to the TPM2 chip (e\\&."
+"g\\&. /dev/tpmrm0)\\&. Alternatively the special value \"auto\" may be "
+"specified, in order to automatically determine the device node of a "
+"currently discovered TPM2 device (of which there must be exactly one)\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "Added in version 256\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"Enroll a PKCS#11 security token or smartcard (e\\&.g\\&. a YubiKey)\\&. "
+"Expects a PKCS#11 URI that allows finding an X\\&.509 certificate or a "
+"public key on the token\\&. The URI must also be suitable to find a related "
+"private key after changing the type of object in it\\&. Alternatively the "
+"special value \"auto\" may be specified, in order to automatically determine "
+"the suitable URI if a single security token containing a single key pair is "
+"plugged in\\&. The special value \"list\" may be used to enumerate all "
+"suitable PKCS#11 tokens currently plugged in\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"The PKCS#11 token must contain an RSA or EC key pair which will be used to "
+"unlock a LUKS2 volume\\&. For RSA, a randomly generated volume key is "
+"encrypted with a public key in the token, and stored in the LUKS2 JSON token "
+"header area\\&. To unlock a volume, the stored encrypted volume key will be "
+"decrypted with a private key in the token\\&. For ECC, ECDH algorithm is "
+"used: we generate a pair of EC keys in the same EC group, then derive a "
+"shared secret using the generated private key and the public key in the "
+"token\\&. The derived shared secret is used as a volume key\\&. The "
+"generated public key is stored in the LUKS2 JSON token header area\\&. The "
+"generated private key is erased\\&. To unlock a volume, we derive the shared "
+"secret with the stored public key and a private key in the token\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"Note that your authenticator may choose not to support some algorithms\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "B<--tpm2-pcrs=>I<PCR>I<[+PCR\\&.\\&.\\&.]>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"B<--tpm2-public-key=>I<PATH>, B<--tpm2-public-key-pcrs=>I<PCR>I<[+PCR\\&.\\&."
+"\\&.]>, B<--tpm2-signature=>I<PATH>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "B<--tpm2-pcrlock=>I<PATH>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "B<--wipe-slot=>I<SLOT>I<[,SLOT\\&.\\&.\\&.]>"
+msgstr ""
+
+#. type: SH
+#: debian-unstable fedora-rawhide
+#, no-wrap
+msgid "CREDENTIALS"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"B<systemd-cryptenroll> supports the service credentials logic as implemented "
+"by I<ImportCredential=>/I<LoadCredential=>/I<SetCredential=> (see B<systemd."
+"exec>(5) for details)\\&. The following credentials are used when passed in:"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "I<cryptenroll\\&.passphrase>, I<cryptenroll\\&.new-passphrase>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"May contain the passphrase to unlock the volume with/to newly enroll\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "I<cryptenroll\\&.tpm2-pin>, I<cryptenroll\\&.new-tpm2-pin>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "May contain the TPM2 PIN to unlock the volume with/to newly enroll\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "I<cryptenroll\\&.fido2-pin>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "If a FIDO2 token is enrolled this may contain the PIN of the token\\&."
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid "I<cryptenroll\\&.pkcs11-pin>"
+msgstr ""
+
+#. type: Plain text
+#: debian-unstable fedora-rawhide
+msgid ""
+"If a PKCS#11 token is enrolled this may contain the PIN of the token\\&."
+msgstr ""