Cryptsetup-Bin
- cryptsetup-benchmark(8) benchmarks ciphers and KDF
- cryptsetup-bitlkDump(8) dump the header information of a BITLK (BitLocker compatible) device
- cryptsetup-bitlkOpen(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-close(8) removes the existing mapping <name> (and the associated key)
- cryptsetup-config(8) set permanent configuration options (store to LUKS header)
- cryptsetup-convert(8) converts the device between LUKS1 and LUKS2 format
- cryptsetup-create(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-erase(8) erase all keyslots
- cryptsetup-fvault2Dump(8) dump the header information of a FVAULT2 (FileVault2 compatible) device
- cryptsetup-fvault2Open(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-isLuks(8) check if a device is a LUKS device
- cryptsetup-loopaesOpen(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-luksAddKey(8) add a new passphrase
- cryptsetup-luksChangeKey(8) change an existing passphrase
- cryptsetup-luksConvertKey(8) converts an existing LUKS2 keyslot to new PBKDF parameters
- cryptsetup-luksDump(8) dump the header information of a LUKS device
- cryptsetup-luksErase(8) erase all keyslots
- cryptsetup-luksFormat(8) initialize a LUKS partition and set the initial passphrase
- cryptsetup-luksHeaderBackup(8) store a binary backup of the LUKS header and keyslot area
- cryptsetup-luksHeaderRestore(8) restore a binary backup of the LUKS header and keyslot area
- cryptsetup-luksKillSlot(8) wipe a key-slot from the LUKS device
- cryptsetup-luksOpen(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-luksRemoveKey(8) remove the supplied passphrase from the LUKS device
- cryptsetup-luksResume(8) resume a suspended device and reinstate the key
- cryptsetup-luksSuspend(8) suspends an active device and wipes the key
- cryptsetup-luksUUID(8) print or set the UUID of a LUKS device
- cryptsetup-open(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-plainOpen(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-reencrypt(8) reencrypt LUKS encrypted volumes in-place
- cryptsetup-refresh(8) refresh parameters of an active mapping
- cryptsetup-repair(8) repair the device metadata
- cryptsetup-resize(8) resize an active mapping
- cryptsetup-status(8) report the status for a mapping
- cryptsetup-tcryptDump(8) dump the header information of a TCRYPT (TrueCrypt or VeraCrypt compatible) device
- cryptsetup-tcryptOpen(8) open an encrypted device and create a mapping with a specified name
- cryptsetup-token(8) manage LUKS2 tokens
- cryptsetup(8) manage plain dm-crypt, LUKS, and other encrypted volumes
- integritysetup(8) manage dm-integrity (block level integrity) volumes
- veritysetup(8) manage dm-verity (block level verification) volumes