staging.inyokaproject.org

Wie tcplay commands in terminal schreiben?

Status: Ungelöst | Ubuntu-Version: Ubuntu 14.04 (Trusty Tahr)
Antworten |

ubinde

Anmeldungsdatum:
10. September 2010

Beiträge: 169

Ubuntu 14.04 64bit tcplay

info tcplay 1.1 kan mit software center installiert werden.

Da ich tcplay im Menu nicht finden kann, schreibe ich 'tcplay' in terminal.

Dann erscheint eine liste mit commands.

usage: tcplay -c -d device [-g] [-z] [-w] [-a pbkdf_hash] [-b cipher]
              [-f keyfile_hidden] [-k keyfile] [-x pbkdf_hash] [-y cipher]
       tcplay -i -d device [-e] [-f keyfile_hidden] [-k keyfile]
              [-s system_device] [--fde] [--use-backup]
       tcplay -m mapping -d device [-e] [-f keyfile_hidden] [-k keyfile]
              [-s system_device] [--fde] [--use-backup]
       tcplay --modify -d device [-k keyfile] [--new-keyfile=keyfile]
              [--new-pbkdf-prf=pbkdf_hash] [-s system_device] [--fde]
              [--use-backup] [-w]
       tcplay --modify -d device [-k keyfile] --restore-from-backup-hdr [-w]
       tcplay -j mapping
       tcplay -u mapping
       tcplay -h | -v

Valid commands are:
 -c, --create
	 Creates a new TC volume on the device specified by -d or --device.
 -h, --help
	 Print help message and exit.
 -i, --info
	 Gives information about the TC volume specified by -d or --device.
 -j <mapping name>, --info-mapped=<mapping name>
	 Gives information about the mapped TC volume under the given mapping.
 -m <mapping name>, --map=<mapping name>
	 Creates a dm-crypt mapping with the given name for the device
	 specified by -d or --device.
 -u <mapping name>, --unmap=<mapping name>
	 Removes a dm-crypt mapping with the given name.
 --modify
	 Changes the volume's passphrase, keyfile and optionally the hashing
	 function used for the PBKDF password derivation.
 -v, --version
	 Print version message and exit.

Valid options for --create are:
 -a <pbkdf prf algorithm>, --pbkdf-prf=<pbkdf prf algorithm>
	 Specifies which hashing function to use for the PBKDF password
	 derivation when creating a new volume.
	 To see valid options, specify '-a help'.
 -b <cipher>, --cipher=<cipher>
	 Specifies which cipher to use when creating a new TC volume.
	 To see valid options, specify '-b help'.
 -g, --hidden
	 Specifies that the newly created volume will contain a hidden volume.
 -x <pbkdf prf algorithm>, --pbkdf-prf=<pbkdf prf algorithm>
	 Specifies which hashing function to use for the PBKDF password
	 derivation when creating a new hidden volume.  By default, the
	 same as for the outer volume will be used.
	 To see valid options, specify '-x help'.
 -y <cipher>, --cipher=<cipher>
	 Specifies which cipher to use when creating a new hidden volume.
	 By default, the same as for the outer volume will be used.
	 To see valid options, specify '-y help'.
 -z, --insecure-erase
	 Skips the erase of the disk. Possible security hazard.
 -w, --weak-keys
	 Uses a weak source of entropy (urandom) for key material.
	 WARNING: This is a REALLY REALLY bad idea for anything but
	 testing.

Valid options for --modify are:
 --new-keyfile=<key file>
	 Specifies a key file to use for the password derivation, when
	 re-encrypting the header, can appear multiple times.
 --new-pbkdf-prf=<pbkdf prf algorithm>
	 Specifies which hashing function to use for the PBKDF password
	 derivation when re-encrypting the header.
	 To see valid options, specify '-a help'.
 -s <disk path>, --system-encryption=<disk path>
	 Specifies that the disk (e.g. /dev/da0) is using system encryption.
 --fde
	 Specifies that the disk (e.g. /dev/da0) is using full disk encryption.
 --use-backup
	 Uses the backup headers (at the end of the volume) instead of the
	 primary headers. Both normal and backup headers will be modified!
	 This is useful when your primary headers have been corrupted.
 --restore-from-backup-hdr
	 Implies --use-backup, no new PBKDF hashing function, no new keyfiles
	 and no new passphrase.
	 In other words, this will simply restore both headers from the backup
	 header. -w, --weak-keys
	 Uses a weak source of entropy (urandom) for salt material. The
	 key material is not affected, as the master keys are kept intact.
	 WARNING: This is a bad idea for anything but testing.

Valid options for --info and --map are:
 -e, --protect-hidden
	 Protect a hidden volume when mounting the outer volume.
 -s <disk path>, --system-encryption=<disk path>
	 Specifies that the disk (e.g. /dev/da0) is using system encryption.
 --fde
	 Specifies that the disk (e.g. /dev/da0) is using full disk encryption.
 --use-backup
	 Uses the backup headers (at the end of the volume) instead of the
	 primary headers.
	 This is useful when your primary headers have been corrupted.

Valid options common to all commands are:
 -d <device path>, --device=<device path>
	 Specifies the path to the volume to operate on (e.g. /dev/da0s1).
 -f <key file>, --keyfile-hidden=<key file>
	 Specifies a key file to use for the hidden volume password derivation.
	 This option is only valid in combination with -e, --protect-hidden
	 or -g, --hidden.
 -k <key file>, --keyfile=<key file>
	 Specifies a key file to use for the password derivation, can appear
	 multiple times.

Was schreibe ich um truecrypt devices zu finden?

Was schreibe ich um tc files zu finden?

Was schreibe ich um tc device zu mount'en zb sdb1?

Was schreibe ich um tc files zu mount'en?

Gleiche Fragen wie man unmount'ed?

Danke.

Antworten |