diff options
Diffstat (limited to '')
-rw-r--r-- | templates/man1/systemd-cryptenroll.1.pot | 1392 |
1 files changed, 1392 insertions, 0 deletions
diff --git a/templates/man1/systemd-cryptenroll.1.pot b/templates/man1/systemd-cryptenroll.1.pot new file mode 100644 index 00000000..d31f3bae --- /dev/null +++ b/templates/man1/systemd-cryptenroll.1.pot @@ -0,0 +1,1392 @@ +# SOME DESCRIPTIVE TITLE +# Copyright (C) YEAR Free Software Foundation, Inc. +# This file is distributed under the same license as the PACKAGE package. +# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR. +# +#, fuzzy +msgid "" +msgstr "" +"Project-Id-Version: PACKAGE VERSION\n" +"POT-Creation-Date: 2024-03-01 17:10+0100\n" +"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" + +#. type: TH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "SYSTEMD-CRYPTENROLL" +msgstr "" + +#. type: TH +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "systemd 255" +msgstr "" + +#. type: TH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "systemd-cryptenroll" +msgstr "" + +#. ----------------------------------------------------------------- +#. * MAIN CONTENT STARTS HERE * +#. ----------------------------------------------------------------- +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "NAME" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"systemd-cryptenroll - Enroll PKCS#11, FIDO2, TPM2 token/devices to LUKS2 " +"encrypted volumes" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "SYNOPSIS" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "B<systemd-cryptenroll> [OPTIONS...] [DEVICE]" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "DESCRIPTION" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"B<systemd-cryptenroll> is a tool for enrolling hardware security tokens and " +"devices into a LUKS2 encrypted volume, which may then be used to unlock the " +"volume during boot\\&. Specifically, it supports tokens and credentials of " +"the following kind to be enrolled:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"PKCS#11 security tokens and smartcards that may carry an RSA key pair (e\\&." +"g\\&. various YubiKeys)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"FIDO2 security tokens that implement the \"hmac-secret\" extension (most " +"FIDO2 keys, including YubiKeys)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "TPM2 security devices" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Regular passphrases" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Recovery keys\\&. These are similar to regular passphrases, however are " +"randomly generated on the computer and thus generally have higher entropy " +"than user-chosen passphrases\\&. Their character set has been designed to " +"ensure they are easy to type in, while having high entropy\\&. They may also " +"be scanned off screen using QR codes\\&. Recovery keys may be used for " +"unlocking LUKS2 volumes wherever passphrases are accepted\\&. They are " +"intended to be used in combination with an enrolled hardware security token, " +"as a recovery option when the token is lost\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"In addition, the tool may be used to enumerate currently enrolled security " +"tokens and wipe a subset of them\\&. The latter may be combined with the " +"enrollment operation of a new security token, in order to update or replace " +"enrollments\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"The tool supports only LUKS2 volumes, as it stores token meta-information in " +"the LUKS2 JSON token area, which is not available in other encryption " +"formats\\&." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "TPM2 PCRs and policies" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"PCRs allow binding of the encryption of secrets to specific software " +"versions and system state, so that the enrolled key is only accessible (may " +"be \"unsealed\") if specific trusted software and/or configuration is " +"used\\&. Such bindings may be created with the option B<--tpm2-pcrs=> " +"described below\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Secrets may also be bound indirectly: a signed policy for a state of some " +"combination of PCR values is provided, and the secret is bound to the public " +"part of the key used to sign this policy\\&. This means that the owner of a " +"key can generate a sequence of signed policies, for specific software " +"versions and system states, and the secret can be decrypted as long as the " +"machine state matches one of those policies\\&. For example, a vendor may " +"provide such a policy for each kernel+initrd update, allowing users to " +"encrypt secrets so that they can be decrypted when running any kernel+initrd " +"signed by the vendor\\&. Such bindings may be created with the options B<--" +"tpm2-public-key=>, B<--tpm2-public-key-pcrs=>, B<--tpm2-signature=> " +"described below\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"See \\m[blue]B<Linux TPM PCR Registry>\\m[]\\&\\s-2\\u[1]\\d\\s+2 for an " +"authoritative list of PCRs and how they are updated\\&. The table below " +"contains a quick reference, describing in particular the PCRs modified by " +"systemd\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<Table\\ \\&1.\\ \\&Well-known PCR Definitions>" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "PCR" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "name" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Explanation" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid ".T&" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "l l l" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "l l l." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "0" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "platform-code" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Core system firmware executable code; changes on firmware updates" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "1" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "platform-config" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Core system firmware data/host platform configuration; typically contains serial and model numbers, changes on basic hardware/CPU/RAM replacements" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "2" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "external-code" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Extended or pluggable executable code; includes option ROMs on pluggable hardware" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "3" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "external-config" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Extended or pluggable firmware data; includes information about pluggable hardware" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "4" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "boot-loader-code" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Boot loader and additional drivers, PE binaries invoked by the boot loader; changes on boot loader updates\\&. B<sd-stub>(7) measures system extension images read from the ESP here too (see B<systemd-sysext>(8))\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "5" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "boot-loader-config" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "GPT/Partition table; changes when the partitions are added, modified, or removed" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "7" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "secure-boot-policy" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Secure Boot state; changes when UEFI SecureBoot mode is enabled/disabled, or firmware certificates (PK, KEK, db, dbx, \\&...) changes\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "9" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "kernel-initrd" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "The Linux kernel measures all initrds it receives into this PCR\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "10" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "ima" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "The IMA project measures its runtime state into this PCR\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "11" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "kernel-boot" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "B<systemd-stub>(7) measures the ELF kernel image, embedded initrd and other payload of the PE image it is placed in into this PCR\\&. B<systemd-pcrphase.service>(8) measures boot phase strings into this PCR at various milestones of the boot process\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "12" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "kernel-config" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "B<systemd-boot>(7) measures the kernel command line into this PCR\\&. B<systemd-stub>(7) measures any manually specified kernel command line (i\\&.e\\&. a kernel command line that overrides the one embedded in the unified PE image) and loaded credentials into this PCR\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "13" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "sysexts" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "B<systemd-stub>(7) measures any B<systemd-sysext>(8) images it passes to the booted kernel into this PCR\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "14" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "shim-policy" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "The shim project measures its \"MOK\" certificates and hashes into this PCR\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "15" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "system-identity" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "B<systemd-cryptsetup>(8) optionally measures the volume key of activated LUKS volumes into this PCR\\&. B<systemd-pcrmachine.service>(8) measures the B<machine-id>(5) into this PCR\\&. B<systemd-pcrfs@.service>(8) measures mount points, file system UUIDs, labels, partition UUIDs of the root and /var/ filesystems into this PCR\\&." +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "16" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "debug" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Debug" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "23" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "application-support" +msgstr "" + +#. type: tbl table +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "Application Support" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"In general, encrypted volumes would be bound to some combination of PCRs 7, " +"11, and 14 (if shim/MOK is used)\\&. In order to allow firmware and OS " +"version updates, it is typically not advisable to use PCRs such as 0 and 2, " +"since the program code they cover should already be covered indirectly " +"through the certificates measured into PCR 7\\&. Validation through " +"certificates hashes is typically preferable over validation through direct " +"measurements as it is less brittle in context of OS/firmware updates: the " +"measurements will change on every update, but signatures should remain " +"unchanged\\&. See the \\m[blue]B<Linux TPM PCR " +"Registry>\\m[]\\&\\s-2\\u[1]\\d\\s+2 for more discussion\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "LIMITATIONS" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Note that currently when enrolling a new key of one of the five supported " +"types listed above, it is required to first provide a passphrase, a recovery " +"key or a FIDO2 token\\&. It\\*(Aqs currently not supported to unlock a " +"device with a TPM2/PKCS#11 key in order to enroll a new TPM2/PKCS#11 key\\&. " +"Thus, if in future key roll-over is desired it\\*(Aqs generally recommended " +"to ensure a passphrase, a recovery key or a FIDO2 token is always " +"enrolled\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Also note that support for enrolling multiple FIDO2 tokens is currently " +"limited\\&. When multiple FIDO2 tokens are enrolled, B<systemd-cryptseup> " +"will perform pre-flight requests to attempt to identify which of the " +"enrolled tokens are currently plugged in\\&. However, this is not possible " +"for FIDO2 tokens with user verification (UV, usually via biometrics), in " +"which case it will fall back to attempting each enrolled token one by " +"one\\&. This will result in multiple prompts for PIN and user " +"verification\\&. This limitation does not apply to PKCS#11 tokens\\&." +msgstr "" + +#. type: SH +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "COMPATIBILITY" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Security technology both in systemd and in the general industry constantly " +"evolves\\&. In order to provide best security guarantees, the way TPM2, " +"FIDO2, PKCS#11 devices are enrolled is regularly updated in newer versions " +"of systemd\\&. Whenever this happens the following compatibility guarantees " +"are given:" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Old enrollments continue to be supported and may be unlocked with newer " +"versions of B<systemd-cryptsetup@.service>(8)\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The opposite is not guaranteed however: it might not be possible to unlock " +"volumes with enrollments done with a newer version of B<systemd-cryptenroll> " +"with an older version of B<systemd-cryptsetup>\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"That said, it is generally recommended to use matching versions of B<systemd-" +"cryptenroll> and B<systemd-cryptsetup>, since this is best tested and " +"supported\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"It might be advisable to re-enroll existing enrollments to take benefit of " +"newer security features, as they are added to systemd\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "OPTIONS" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "The following options are understood:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--password>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Enroll a regular password/passphrase\\&. This command is mostly equivalent " +"to B<cryptsetup luksAddKey>, however may be combined with B<--wipe-slot=> in " +"one call, see below\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 248\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--recovery-key>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Enroll a recovery key\\&. Recovery keys are mostly identical to passphrases, " +"but are computer-generated instead of being chosen by a human, and thus have " +"a guaranteed high entropy\\&. The key uses a character set that is easy to " +"type in, and may be scanned off screen via a QR code\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--unlock-key-file=>I<PATH>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Use a file instead of a password/passphrase read from stdin to unlock the " +"volume\\&. Expects the PATH to the file containing your key to unlock the " +"volume\\&. Currently there is nothing like B<--key-file-offset=> or B<--key-" +"file-size=> so this file has to only contain the full key\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 252\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--unlock-fido2-device=>I<PATH>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Use a FIDO2 device instead of a password/passphrase read from stdin to " +"unlock the volume\\&. Expects a hidraw device referring to the FIDO2 device " +"(e\\&.g\\&. /dev/hidraw1)\\&. Alternatively the special value \"auto\" may " +"be specified, in order to automatically determine the device node of a " +"currently plugged in security token (of which there must be exactly one)\\&. " +"This automatic discovery is unsupported if B<--fido2-device=> option is also " +"specified\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 253\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--pkcs11-token-uri=>I<URI>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Enroll a PKCS#11 security token or smartcard (e\\&.g\\&. a YubiKey)\\&. " +"Expects a PKCS#11 smartcard URI referring to the token\\&. Alternatively the " +"special value \"auto\" may be specified, in order to automatically determine " +"the URI of a currently plugged in security token (of which there must be " +"exactly one)\\&. The special value \"list\" may be used to enumerate all " +"suitable PKCS#11 tokens currently plugged in\\&. The security token must " +"contain an RSA key pair which is used to encrypt the randomly generated key " +"that is used to unlock the LUKS2 volume\\&. The encrypted key is then stored " +"in the LUKS2 JSON token header area\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"In order to unlock a LUKS2 volume with an enrolled PKCS#11 security token, " +"specify the B<pkcs11-uri=> option in the respective /etc/crypttab line:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "myvolume /dev/sda1 - pkcs11-uri=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"See B<crypttab>(5) for a more comprehensive example of a B<systemd-" +"cryptenroll> invocation and its matching /etc/crypttab line\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--fido2-credential-algorithm=>I<STRING>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Specify COSE algorithm used in credential generation\\&. The default value " +"is \"es256\"\\&. Supported values are \"es256\", \"rs256\" and \"eddsa\"\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"\"es256\" denotes ECDSA over NIST P-256 with SHA-256\\&. \"rs256\" denotes " +"2048-bit RSA with PKCS#1\\&.5 padding and SHA-256\\&. \"eddsa\" denotes " +"EDDSA over Curve25519 with SHA-512\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Note that your authenticator may not support some algorithms\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 251\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--fido2-device=>I<PATH>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Enroll a FIDO2 security token that implements the \"hmac-secret\" extension " +"(e\\&.g\\&. a YubiKey)\\&. Expects a hidraw device referring to the FIDO2 " +"device (e\\&.g\\&. /dev/hidraw1)\\&. Alternatively the special value " +"\"auto\" may be specified, in order to automatically determine the device " +"node of a currently plugged in security token (of which there must be " +"exactly one)\\&. This automatic discovery is unsupported if B<--unlock-fido2-" +"device=> option is also specified\\&. The special value \"list\" may be used " +"to enumerate all suitable FIDO2 tokens currently plugged in\\&. Note that " +"many hardware security tokens that implement FIDO2 also implement the older " +"PKCS#11 standard\\&. Typically FIDO2 is preferable, given it\\*(Aqs simpler " +"to use and more modern\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"In order to unlock a LUKS2 volume with an enrolled FIDO2 security token, " +"specify the B<fido2-device=> option in the respective /etc/crypttab line:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "myvolume /dev/sda1 - fido2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--fido2-with-client-pin=>I<BOOL>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"When enrolling a FIDO2 security token, controls whether to require the user " +"to enter a PIN when unlocking the volume (the FIDO2 \"clientPin\" " +"feature)\\&. Defaults to \"yes\"\\&. (Note: this setting is without effect " +"if the security token does not support the \"clientPin\" feature at all, or " +"does not allow enabling or disabling it\\&.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 249\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--fido2-with-user-presence=>I<BOOL>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"When enrolling a FIDO2 security token, controls whether to require the user " +"to verify presence (tap the token, the FIDO2 \"up\" feature) when unlocking " +"the volume\\&. Defaults to \"yes\"\\&. (Note: this setting is without effect " +"if the security token does not support the \"up\" feature at all, or does " +"not allow enabling or disabling it\\&.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--fido2-with-user-verification=>I<BOOL>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"When enrolling a FIDO2 security token, controls whether to require user " +"verification when unlocking the volume (the FIDO2 \"uv\" feature)\\&. " +"Defaults to \"no\"\\&. (Note: this setting is without effect if the security " +"token does not support the \"uv\" feature at all, or does not allow enabling " +"or disabling it\\&.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--tpm2-device=>I<PATH>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Enroll a TPM2 security chip\\&. Expects a device node path referring to the " +"TPM2 chip (e\\&.g\\&. /dev/tpmrm0)\\&. Alternatively the special value " +"\"auto\" may be specified, in order to automatically determine the device " +"node of a currently discovered TPM2 device (of which there must be exactly " +"one)\\&. The special value \"list\" may be used to enumerate all suitable " +"TPM2 devices currently discovered\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"In order to unlock a LUKS2 volume with an enrolled TPM2 security chip, " +"specify the B<tpm2-device=> option in the respective /etc/crypttab line:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "myvolume /dev/sda1 - tpm2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Use B<--tpm2-pcrs=> (see below) to configure which TPM2 PCR indexes to bind " +"the enrollment to\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "B<--tpm2-device-key=>I<PATH>" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Enroll a TPM2 security chip using its public key\\&. Expects a path " +"referring to the TPM2 public key in TPM2B_PUBLIC format\\&. This cannot be " +"used with B<--tpm2-device=>, as it performs the same operation, but without " +"connecting to the TPM2 security chip; instead the enrollment is calculated " +"using the provided TPM2 key\\&. This is useful in situations where the TPM2 " +"security chip is not available at the time of enrollment\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The key, in most cases, should be the Storage Root Key (SRK) from a local " +"TPM2 security chip\\&. If a key from a different handle (not the SRK) is " +"used, you must specify its handle index using B<--tpm2-seal-key-handle=>\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The B<systemd-tpm2-setup.service>(8) service writes the SRK to /run/systemd/" +"tpm2-srk-public-key\\&.tpm2b_public automatically during boot, in the " +"correct format\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Alternatively, you may use B<systemd-analyze srk> to retrieve the SRK from " +"the TPM2 security chip explicitly\\&. See B<systemd-analyze>(1) for " +"details\\&. Example:" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "systemd-analyze srk E<gt> srk\\&.tpm2b_public\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 255\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "B<--tpm2-seal-key-handle=>I<HANDLE>" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Configures which parent key to use for sealing, using the TPM handle (index) " +"of the key\\&. This is used to \"seal\" (encrypt) a secret and must be used " +"later to \"unseal\" (decrypt) the secret\\&. Expects a hexadecimal 32bit " +"integer, optionally prefixed with \"0x\"\\&. Allowable values are any handle " +"index in the persistent (\"0x81000000\"-\"0x81ffffff\") or transient " +"(\"0x80000000\"-\"0x80ffffff\") ranges\\&. Since transient handles are lost " +"after a TPM reset, and may be flushed during TPM context switching, they " +"should not be used except for very specific use cases, e\\&.g\\&. testing\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The default is the Storage Root Key (SRK) handle index \"0x81000001\"\\&. A " +"value of 0 will use the default\\&. For the SRK handle, a new key will be " +"created and stored in the TPM if one does not already exist; for any other " +"handle, the key must already exist in the TPM at the specified handle " +"index\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "This should not be changed unless you know what you are doing\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--tpm2-pcrs=> [PCR...]" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Configures the TPM2 PCRs (Platform Configuration Registers) to bind to when " +"enrollment is requested via B<--tpm2-device=>\\&. Takes a list of PCR " +"entries, where each entry starts with a name or numeric index in the range " +"0\\&...23, optionally followed by \":\" and a hash algorithm name " +"(specifying the PCR bank), optionally followed by \"=\" and a hash digest " +"value\\&. Multiple PCR entries are separated by \"+\"\\&. If not specified, " +"the default is to use PCR 7 only\\&. If an empty string is specified, binds " +"the enrollment to no PCRs at all\\&. See the table above for a list of " +"available PCRs\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Example: B<--tpm2-pcrs=boot-loader-code+platform-config+boot-loader-config> " +"specifies that PCR registers 4, 1, and 5 should be used\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Example: B<--tpm2-pcrs=7:sha256> specifies that PCR register 7 from the " +"SHA256 bank should be used\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Example: B<--tpm2-pcrs=4:sha1=3a3f780f11a4b49969fcaa80cd6e3957c33b2275> " +"specifies that PCR register 4 from the SHA1 bank should be used, and a hash " +"digest value of 3a3f780f11a4b49969fcaa80cd6e3957c33b2275 will be used " +"instead of reading the current PCR value\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--tpm2-with-pin=>I<BOOL>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"When enrolling a TPM2 device, controls whether to require the user to enter " +"a PIN when unlocking the volume in addition to PCR binding, based on TPM2 " +"policy authentication\\&. Defaults to \"no\"\\&. Despite being called PIN, " +"any character can be used, not just numbers\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Note that incorrect PIN entry when unlocking increments the TPM dictionary " +"attack lockout mechanism, and may lock out users for a prolonged time, " +"depending on its configuration\\&. The lockout mechanism is a global " +"property of the TPM, B<systemd-cryptenroll> does not control or configure " +"the lockout mechanism\\&. You may use tpm2-tss tools to inspect or configure " +"the dictionary attack lockout, with B<tpm2_getcap>(1) and " +"B<tpm2_dictionarylockout>(1) commands, respectively\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"B<--tpm2-public-key=> [PATH], B<--tpm2-public-key-pcrs=> [PCR...], B<--tpm2-" +"signature=> [PATH]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Configures a TPM2 signed PCR policy to bind encryption to\\&. The B<--tpm2-" +"public-key=> option accepts a path to a PEM encoded RSA public key, to bind " +"the encryption to\\&. If this is not specified explicitly, but a file tpm2-" +"pcr-public-key\\&.pem exists in one of the directories /etc/systemd/, /run/" +"systemd/, /usr/lib/systemd/ (searched in this order), it is automatically " +"used\\&. The B<--tpm2-public-key-pcrs=> option takes a list of TPM2 PCR " +"indexes to bind to (same syntax as B<--tpm2-pcrs=> described above)\\&. If " +"not specified defaults to 11 (i\\&.e\\&. this binds the policy to any " +"unified kernel image for which a PCR signature can be provided)\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Note the difference between B<--tpm2-pcrs=> and B<--tpm2-public-key-pcrs=>: " +"the former binds decryption to the current, specific PCR values; the latter " +"binds decryption to any set of PCR values for which a signature by the " +"specified public key can be provided\\&. The latter is hence more useful in " +"scenarios where software updates shell be possible without losing access to " +"all previously encrypted LUKS2 volumes\\&. Like with B<--tpm2-pcrs=>, names " +"defined in the table above can also be used to specify the registers, for " +"instance B<--tpm2-public-key-pcrs=boot-loader-code+system-identity>\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"The B<--tpm2-signature=> option takes a path to a TPM2 PCR signature file as " +"generated by the B<systemd-measure>(1) tool\\&. If this is not specified " +"explicitly, a suitable signature file tpm2-pcr-signature\\&.json is searched " +"for in /etc/systemd/, /run/systemd/, /usr/lib/systemd/ (in this order) and " +"used\\&. If a signature file is specified or found it is used to verify if " +"the volume can be unlocked with it given the current PCR state, before the " +"new slot is written to disk\\&. This is intended as safety net to ensure " +"that access to a volume is not lost if a public key is enrolled for which no " +"valid signature for the current PCR state is available\\&. If the supplied " +"signature does not unlock the current PCR state and public key combination, " +"no slot is enrolled and the operation will fail\\&. If no signature file is " +"specified or found no such safety verification is done\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "B<--tpm2-pcrlock=> [PATH]" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Configures a TPM2 pcrlock policy to bind encryption to\\&. Expects a path to " +"a pcrlock policy file as generated by the B<systemd-pcrlock>(1) tool\\&. If " +"a TPM2 device is enrolled and this option is not used but a file pcrlock\\&." +"json is found in /run/systemd/ or /var/lib/systemd/ it is automatically " +"used\\&. Assign an empty string to turn this behaviour off\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--wipe-slot=> [SLOT...]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"Wipes one or more LUKS2 key slots\\&. Takes a comma separated list of " +"numeric slot indexes, or the special strings \"all\" (for wiping all key " +"slots), \"empty\" (for wiping all key slots that are unlocked by an empty " +"passphrase), \"password\" (for wiping all key slots that are unlocked by a " +"traditional passphrase), \"recovery\" (for wiping all key slots that are " +"unlocked by a recovery key), \"pkcs11\" (for wiping all key slots that are " +"unlocked by a PKCS#11 token), \"fido2\" (for wiping all key slots that are " +"unlocked by a FIDO2 token), \"tpm2\" (for wiping all key slots that are " +"unlocked by a TPM2 chip), or any combination of these strings or numeric " +"indexes, in which case all slots matching either are wiped\\&. As safety " +"precaution an operation that wipes all slots without exception (so that the " +"volume cannot be unlocked at all anymore, unless the volume key is known) is " +"refused\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"This switch may be used alone, in which case only the requested wipe " +"operation is executed\\&. It may also be used in combination with any of the " +"enrollment options listed above, in which case the enrollment is completed " +"first, and only when successful the wipe operation executed \\(em and the " +"newly added slot is always excluded from the wiping\\&. Combining enrollment " +"and slot wiping may thus be used to update existing enrollments:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "systemd-cryptenroll /dev/sda1 --wipe-slot=tpm2 --tpm2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"The above command will enroll the TPM2 chip, and then wipe all previously " +"created TPM2 enrollments on the LUKS2 volume, leaving only the newly created " +"one\\&. Combining wiping and enrollment may also be used to replace " +"enrollments of different types, for example for changing from a PKCS#11 " +"enrollment to a FIDO2 one:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "systemd-cryptenroll /dev/sda1 --wipe-slot=pkcs11 --fido2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Or for replacing an enrolled empty password by TPM2:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "systemd-cryptenroll /dev/sda1 --wipe-slot=empty --tpm2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<-h>, B<--help>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Print a short help text and exit\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "B<--version>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Print a short version string and exit\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "EXIT STATUS" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "On success, 0 is returned, a non-zero failure code otherwise\\&." +msgstr "" + +#. type: SH +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "EXAMPLES" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"B<crypttab>(5) and B<systemd-measure>(1) contain various examples " +"employing B<systemd-cryptenroll>\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "SEE ALSO" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "" +"B<systemd>(1), B<systemd-cryptsetup@.service>(8), B<crypttab>(5), " +"B<cryptsetup>(8), B<systemd-measure>(1)" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "NOTES" +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid " 1." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Linux TPM PCR Registry" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "\\%https://uapi-group.org/specifications/specs/linux_tpm_pcr_registry/" +msgstr "" + +#. type: TH +#: debian-bookworm +#, no-wrap +msgid "systemd 254" +msgstr "" + +#. type: Plain text +#: debian-bookworm +msgid "B<systemd-cryptenroll >B<[OPTIONS...]>B< >B<[DEVICE]>" +msgstr "" + +#. type: Plain text +#: debian-bookworm +msgid "" +"Configures the TPM2 PCRs (Platform Configuration Registers) to bind to when " +"enrollment is requested via B<--tpm2-device=>\\&. Takes a list of PCR names " +"or numeric indices in the range 0\\&...23\\&. Multiple PCR indexes are " +"separated by \"+\"\\&. If not specified, the default is to use PCR 7 " +"only\\&. If an empty string is specified, binds the enrollment to no PCRs at " +"all\\&. See the table above for a list of available PCRs\\&." +msgstr "" |