# crypttab: Mappings for encrypted partitions
#
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
# should use the /dev/mapper/{NAME} paths for encrypted devices.
#
# Each PASSWORD field can be an absolute pathname to a key file (starting
# with a slash) or a literal string that will be used as a passphrase.
# To use special characters in the passphrase, surround it by quotes,
# the usual bash quoting rules apply.
# 
# To create a key file:
#    hashalot -n 32 ripemd160 >/etc/crytfs.key
# or
#    dd if=/dev/urandom of=/etc/cryptfs.key bs=256 count=1
#
# To pass additional options to cryptsetup for non-LUKS partitions, use the
# fourth column.
#
# NOTE: Do not list your root (/) partition here, it must be set up
#       beforehand by the initramfs (/etc/mkinitcpio.conf).


# NAME		SOURCE DEVICE		PASSWORD		OPTIONS
#home		/dev/hda4		mypassword
#data		/dev/hda3		"my \"password\""
#swap		/dev/hda2		/etc/cryptfs.key	-c aes-cbc-essiv:sha256 -h sha256
