3 .\" The DragonFly Project. All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in
13 .\" the documentation and/or other materials provided with the
15 .\" 3. Neither the name of The DragonFly Project nor the names of its
16 .\" contributors may be used to endorse or promote products derived
17 .\" from this software without specific, prior written permission.
19 .\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20 .\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21 .\" LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
22 .\" FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
23 .\" COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
24 .\" INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
25 .\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 .\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
27 .\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
28 .\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
29 .\" OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 .Nd encrypted disk device table
41 file contains a list of the encrypted disk devices of the system. Each
42 encrypted volume is described on a separate line; fields on each line are
43 separated by tabs or spaces.
47 contains the name of the resultant crypto volume device, which will
55 is the underlying device on which the crypto volume resides and must be
56 a full device path to a node in
63 or the full path on the file system to a keyfile to unlock the crypto
67 is specified, the system will prompt for a password during the boot
72 can contain a comma separated list with the following options on
76 .Bl -tag -width keyscript=/script.sh
78 Prompt for the passphrase at most
80 times if the entered passphrase is incorrect.
82 Time out the interactive passphrase prompt after
85 .It Va keyscript=script
86 Run the script pointed at by
88 to get the passphrase. The stdout output of the script will be used as the
89 passphrase instead of showing an interactive prompt.
96 currently only supports LUKS volumes and not raw
101 .Xr dm_target_crypt 4
102 target is not built-in, make sure to set up
106 is not able to autoload the targets before
110 .Bl -tag -width ".Pa /etc/crypttab" -compact
118 The following line specifies a crypto volume without a keyfile, so
119 that a password will be prompted during the boot sequence. Upon
120 successful entry of the password the device
124 .Dl "vol1 /dev/da0s1b none none"
126 The next example is as the one before but using a keyfile on
128 instead of an interactive password prompt.
130 .Dl "vol1 /dev/da0s1b /boot/keyfile.0 none"
132 The last example shows the use of the options. It will ask at most 2 times
133 for a passphrase and time out after 10 seconds.
135 .Dl "vol1 /dev/da0s1b none tries=2,timeout=10"
141 file format appeared in