1TCPLAY(8)                 BSD System Manager's Manual                TCPLAY(8)
2

NAME

4     tcplay — tool to manage TrueCrypt volumes
5

SYNOPSIS

7     tcplay -c -d device [-g] [-z] [-a pbkdf_hash] [-b cipher]
8            [-f keyfile_hidden] [-k keyfile] [-x pbkdf_hash] [-y cipher]
9     tcplay -i -d device [-e] [-f keyfile_hidden] [-k keyfile]
10            [-s system_device]
11     tcplay -m mapping -d device [-e] [-f keyfile_hidden] [-k keyfile]
12            [-s system_device]
13     tcplay -h | -v
14

DESCRIPTION

16     The tcplay utility provides full support for creating and opening/mapping
17     TrueCrypt-compatible volumes.  It supports the following commands, each
18     with a set of options detailed further below:
19
20     -c, --create
21             Create a new encrypted TrueCrypt volume on the device specified
22             by --device.
23
24     -h, --help
25             Print help message and exit.
26
27     -i, --info
28             Print out information about the encrypted device specified by
29             --device.
30
31     -m mapping, --map=mapping
32             Map the encrypted TrueCrypt volume on the device specified by
33             --device as a dm(4) mapping called mapping.
34
35     -v, --version
36             Print version message and exit.
37
38     Options common to all commands are:
39
40     -d device, --device=device
41             Specifies the disk device on which the TrueCrypt volume
42             resides/will reside.  This option is mandatory for all commands.
43
44     -f keyfile_hidden, --keyfile-hidden=keyfile_hidden
45             Specifies a keyfile to use in addition to the passphrase when
46             either creating a hidden volume or when protecting a hidden vol‐
47             ume while mapping or querying the outer volume.  If you only
48             intend to map a hidden volume, the --keyfile option has to be
49             used.  This option can appear multiple times; if so, multiple
50             keyfiles will be used.
51
52     -k keyfile, --keyfile=keyfile
53             Specifies a keyfile to use in addition to the passphrase.  This
54             option can appear multiple times; if so, multiple keyfiles will
55             be used.
56
57     Additional options for the --create command are:
58
59     -a pbkdf_hash, --pbkdf-prf=pbkdf_hash
60             Specifies which hash algorithm to use for the PBKDF2 password
61             derivation.  To see which algorithms are supported, specify
62             --pbkdf-prf=help.
63
64     -b cipher, --cipher=cipher
65             Specifies which cipher algorithm or cascade of ciphers to use to
66             encrypt the new volume.  To see which algorithms are supported,
67             specify --cipher=help.
68
69     -g, --hidden
70             Specifies that the newly created volume will contain a hidden
71             volume.  The keyfiles applied to the passphrase for the hidden
72             volume are those specified by --keyfile-hidden.  The user will be
73             prompted for the size of the hidden volume interactively.
74
75     -x pbkdf_hash, --pbkdf-prf-hidden=pbkdf_hash
76             Specifies which hash algorithm to use for the PBKDF2 password
77             derivation for the hidden volume.  Only valid in conjunction with
78             --hidden.  If no algorithm is specified, the same as for the
79             outer volume will be used.  To see which algorithms are sup‐
80             ported, specify --pbkdf-prf-hidden=help.
81
82     -y cipher, --cipher-hidden=cipher
83             Specifies which cipher algorithm or cascade of ciphers to use to
84             encrypt the hidden volume on the new TrueCrypt volume.  Only
85             valid in conjunction with --hidden.  If no cipher is specified,
86             the same as for the outer volume will be used.  To see which
87             algorithms are supported, specify --cipher-hidden=help.
88
89     -z, --insecure-erase
90             Skips the secure erase of the disk.  Use this option carefully as
91             it is a security risk!
92
93     Additional options for the --info and --map commands are:
94
95     -e, --protect-hidden
96             Specifies that an outer volume will be queried or mapped, but its
97             reported size will be adjusted accordingly to the size of the
98             hidden volume contained in it.  Both the hidden volume and outer
99             volume passphrase and keyfiles will be required.
100
101     -s system_device, --system-encryption=system_device
102             This option is required if you are attempting to access a device
103             that uses system encryption, for example an encrypted Windows
104             system partition.  The --device option will point at the actual
105             encrypted partition, while the system_device argument will point
106             to the parent device (i.e. underlying physical disk) of the
107             encrypted partition.
108

EXAMPLES

110     Create a new TrueCrypt volume on /dev/vn0 using the cipher cascade of AES
111     and Twofish and the Whirlpool hash algorithm for PBKDF2 password deriva‐
112     tion and two keyfiles, one.key and two.key:
113
114           tcplay --create --device=/dev/vn0
115           --cipher=AES-256-XTS,TWOFISH-256-XTS --pbkdf-prf=whirlpool
116           --keyfile=one.key --keyfile=two.key
117
118     Map the outer volume on the TrueCrypt volume on /dev/vn0 as truecrypt1,
119     but protect the hidden volume, using the keyfile hidden.key, from being
120     overwritten:
121
122           tcplay --map=truecrypt1 --device=/dev/vn0 --protect-hidden
123           --keyfile-hidden=hidden.key
124
125     Map the hidden volume on the TrueCrypt volume on /dev/vn0 as truecrypt2,
126     using the keyfile hidden.key:
127
128           tcplay --map=truecrypt2 --device=/dev/vn0 --keyfile=hidden.key
129
130     Map and mount the volume in the file secvol on Linux:
131
132           losetup /dev/loop1 secvol
133
134           tcplay --map=secv --device=/dev/loop1
135
136           mount /dev/mapper/secv /mnt
137
138     Similarly on DragonFly:
139
140           vnconfig vn1 secvol
141
142           tcplay --map=secv --device=/dev/vn1
143
144           mount /dev/mapper/secv /mnt
145

SEE ALSO

147     crypttab(5), cryptsetup(8)
148

HISTORY

150     The tcplay utility appeared in DragonFly 2.11.
151

AUTHORS

153     Alex Hornung
154
155BSD                              July 5, 2011                              BSD
Impressum