-----------------------------------------------------------------
[*] Emulating binary name: cryptsetup
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract (1/2)
[*] Using CPU config:
[*] Emulating binary: /usr/sbin/cryptsetup
[*] Change permissions +x to /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/./usr/sbin/cryptsetup.
[*] Emulating binary ./usr/sbin/cryptsetup with parameter NONE
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -v
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -V
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -h
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter --help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter --version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
-----------------------------------------------------------------
-----------------------------------------------------------------
[*] Emulating binary name: cryptsetup
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr (2/2)
[*] Using CPU config: 24KEc
[*] Emulating binary: /sbin/cryptsetup
[*] Emulating binary ./sbin/cryptsetup with parameter NONE and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
[--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
[-y|--verify-passphrase] [-d|--key-file=STRING]
[--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
[-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
[--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
[-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
[-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
[-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
[-T|--tries=INT] [--align-payload=SECTORS]
[--header-backup-file=STRING] [--use-random] [--use-urandom]
[--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
[--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
[--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
[--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
[--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
[--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
[--pbkdf=STRING] [--pbkdf-memory=kilobytes]
[--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
[--priority=STRING] [--disable-locks] [--disable-keyring]
[-I|--integrity=STRING] [--integrity-no-journal]
[--integrity-no-wipe] [--token-only] [--token-id=INT]
[--key-description=STRING] [--sector-size=INT] [--persistent]
[--label=STRING] [--subsystem=STRING] [--unbound]
[--json-file=STRING] [--luks2-metadata-size=bytes]
[--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
[--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
[--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
[--resilience=STRING] [--resilience-hash=STRING]
[--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Unknown action.
[*] Emulating binary ./sbin/cryptsetup with parameter -v and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
[--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
[-y|--verify-passphrase] [-d|--key-file=STRING]
[--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
[-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
[--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
[-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
[-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
[-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
[-T|--tries=INT] [--align-payload=SECTORS]
[--header-backup-file=STRING] [--use-random] [--use-urandom]
[--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
[--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
[--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
[--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
[--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
[--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
[--pbkdf=STRING] [--pbkdf-memory=kilobytes]
[--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
[--priority=STRING] [--disable-locks] [--disable-keyring]
[-I|--integrity=STRING] [--integrity-no-journal]
[--integrity-no-wipe] [--token-only] [--token-id=INT]
[--key-description=STRING] [--sector-size=INT] [--persistent]
[--label=STRING] [--subsystem=STRING] [--unbound]
[--json-file=STRING] [--luks2-metadata-size=bytes]
[--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
[--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
[--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
[--resilience=STRING] [--resilience-hash=STRING]
[--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Argument <action> missing.
[*] Emulating binary ./sbin/cryptsetup with parameter -V and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
[--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
[-y|--verify-passphrase] [-d|--key-file=STRING]
[--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
[-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
[--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
[-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
[-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
[-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
[-T|--tries=INT] [--align-payload=SECTORS]
[--header-backup-file=STRING] [--use-random] [--use-urandom]
[--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
[--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
[--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
[--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
[--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
[--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
[--pbkdf=STRING] [--pbkdf-memory=kilobytes]
[--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
[--priority=STRING] [--disable-locks] [--disable-keyring]
[-I|--integrity=STRING] [--integrity-no-journal]
[--integrity-no-wipe] [--token-only] [--token-id=INT]
[--key-description=STRING] [--sector-size=INT] [--persistent]
[--label=STRING] [--subsystem=STRING] [--unbound]
[--json-file=STRING] [--luks2-metadata-size=bytes]
[--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
[--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
[--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
[--resilience=STRING] [--resilience-hash=STRING]
[--active-name=STRING] [OPTION...] <action> <action-specific>
-V: unknown option
[*] Emulating binary ./sbin/cryptsetup with parameter -h and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
[--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
[-y|--verify-passphrase] [-d|--key-file=STRING]
[--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
[-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
[--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
[-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
[-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
[-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
[-T|--tries=INT] [--align-payload=SECTORS]
[--header-backup-file=STRING] [--use-random] [--use-urandom]
[--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
[--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
[--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
[--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
[--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
[--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
[--pbkdf=STRING] [--pbkdf-memory=kilobytes]
[--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
[--priority=STRING] [--disable-locks] [--disable-keyring]
[-I|--integrity=STRING] [--integrity-no-journal]
[--integrity-no-wipe] [--token-only] [--token-id=INT]
[--key-description=STRING] [--sector-size=INT] [--persistent]
[--label=STRING] [--subsystem=STRING] [--unbound]
[--json-file=STRING] [--luks2-metadata-size=bytes]
[--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
[--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
[--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
[--resilience=STRING] [--resilience-hash=STRING]
[--active-name=STRING] [OPTION...] <action> <action-specific>
-h: missing argument
[*] Emulating binary ./sbin/cryptsetup with parameter -help and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
[--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
[-y|--verify-passphrase] [-d|--key-file=STRING]
[--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
[-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
[--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
[-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
[-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
[-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
[-T|--tries=INT] [--align-payload=SECTORS]
[--header-backup-file=STRING] [--use-random] [--use-urandom]
[--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
[--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
[--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
[--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
[--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
[--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
[--pbkdf=STRING] [--pbkdf-memory=kilobytes]
[--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
[--priority=STRING] [--disable-locks] [--disable-keyring]
[-I|--integrity=STRING] [--integrity-no-journal]
[--integrity-no-wipe] [--token-only] [--token-id=INT]
[--key-description=STRING] [--sector-size=INT] [--persistent]
[--label=STRING] [--subsystem=STRING] [--unbound]
[--json-file=STRING] [--luks2-metadata-size=bytes]
[--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
[--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
[--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
[--resilience=STRING] [--resilience-hash=STRING]
[--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Argument <action> missing.
[*] Emulating binary ./sbin/cryptsetup with parameter --help and cpu configuration 24KEc
cryptsetup 2.2.1
Usage: cryptsetup [OPTION...] <action> <action-specific>
--version Print package version
-v, --verbose Shows more detailed error messages
--debug Show debug messages
--debug-json Show debug messages including JSON
metadata
-c, --cipher=STRING The cipher used to encrypt the disk
(see /proc/crypto)
-h, --hash=STRING The hash used to create the encryption
key from the passphrase
-y, --verify-passphrase Verifies the passphrase by asking for
it twice
-d, --key-file=STRING Read the key from a file
--master-key-file=STRING Read the volume (master) key from file.
--dump-master-key Dump volume (master) key instead of
keyslots info
-s, --key-size=BITS The size of the encryption key
-l, --keyfile-size=bytes Limits the read from keyfile
--keyfile-offset=bytes Number of bytes to skip in keyfile
--new-keyfile-size=bytes Limits the read from newly added
keyfile
--new-keyfile-offset=bytes Number of bytes to skip in newly added
keyfile
-S, --key-slot=INT Slot number for new key (default is
first free)
-b, --size=SECTORS The size of the device
--device-size=bytes Use only specified device size (ignore
rest of device). DANGEROUS!
-o, --offset=SECTORS The start offset in the backend device
-p, --skip=SECTORS How many sectors of the encrypted data
to skip at the beginning
-r, --readonly Create a readonly mapping
-q, --batch-mode Do not ask for confirmation
-t, --timeout=secs Timeout for interactive passphrase
prompt (in seconds)
--progress-frequency=secs Progress line update (in seconds)
-T, --tries=INT How often the input of the passphrase
can be retried
--align-payload=SECTORS Align payload at <n> sector boundaries
- for luksFormat
--header-backup-file=STRING File with LUKS header and keyslots
backup
--use-random Use /dev/random for generating volume
key
--use-urandom Use /dev/urandom for generating volume
key
--shared Share device with another
non-overlapping crypt segment
--uuid=STRING UUID for device to use
--allow-discards Allow discards (aka TRIM) requests for
device
--header=STRING Device or file with separated LUKS
header
--test-passphrase Do not activate device, just check
passphrase
--tcrypt-hidden Use hidden header (hidden TCRYPT
device)
--tcrypt-system Device is system TCRYPT drive (with
bootloader)
--tcrypt-backup Use backup (secondary) TCRYPT header
--veracrypt Scan also for VeraCrypt compatible
device
--veracrypt-pim=INT Personal Iteration Multiplier for
VeraCrypt compatible device
--veracrypt-query-pim Query Personal Iteration Multiplier
for VeraCrypt compatible device
-M, --type=STRING Type of device metadata: luks, luks1,
luks2, plain, loopaes, tcrypt
--force-password Disable password quality check (if
enabled)
--perf-same_cpu_crypt Use dm-crypt same_cpu_crypt
performance compatibility option
--perf-submit_from_crypt_cpus Use dm-crypt submit_from_crypt_cpus
performance compatibility option
--deferred Device removal is deferred until the
last user closes it
--serialize-memory-hard-pbkdf Use global lock to serialize memory
hard PBKDF (OOM workaround)
-i, --iter-time=msecs PBKDF iteration time for LUKS (in ms)
--pbkdf=STRING PBKDF algorithm (for LUKS2): argon2i,
argon2id, pbkdf2
--pbkdf-memory=kilobytes PBKDF memory cost limit
--pbkdf-parallel=threads PBKDF parallel cost
--pbkdf-force-iterations=LONG PBKDF iterations cost (forced,
disables benchmark)
--priority=STRING Keyslot priority: ignore, normal,
prefer
--disable-locks Disable locking of on-disk metadata
--disable-keyring Disable loading volume keys via kernel
keyring
-I, --integrity=STRING Data integrity algorithm (LUKS2 only)
--integrity-no-journal Disable journal for integrity device
--integrity-no-wipe Do not wipe device after format
--token-only Do not ask for passphrase if
activation by token fails
--token-id=INT Token number (default: any)
--key-description=STRING Key description
--sector-size=INT Encryption sector size (default: 512
bytes)
--persistent Set activation flags persistent for
device
--label=STRING Set label for the LUKS2 device
--subsystem=STRING Set subsystem label for the LUKS2
device
--unbound Create unbound (no assigned data
segment) LUKS2 keyslot
--json-file=STRING Read or write the json from or to a
file
--luks2-metadata-size=bytes LUKS2 header metadata area size
--luks2-keyslots-size=bytes LUKS2 header keyslots area size
--refresh Refresh (reactivate) device with new
parameters
--keyslot-key-size=BITS LUKS2 keyslot: The size of the
encryption key
--keyslot-cipher=STRING LUKS2 keyslot: The cipher used for
keyslot encryption
--encrypt Encrypt LUKS2 device (in-place
encryption).
--decrypt Decrypt LUKS2 device (remove
encryption).
--init-only Initialize LUKS2 reencryption in
metadata only.
--resume-only Resume initialized LUKS2 reencryption
only.
--reduce-device-size=bytes Reduce data device size (move data
offset). DANGEROUS!
--hotzone-size=bytes Maximal reencryption hotzone size.
--resilience=STRING Reencryption hotzone resilience type
(checksum,journal,none)
--resilience-hash=STRING Reencryption hotzone checksums hash
--active-name=STRING Override device autodetection of dm
device to be reencrypted
Help options:
-?, --help Show this help message
--usage Display brief usage
<action> is one of:
open <device> [--type <type>] [<name>] - open device as <name>
close <name> - close device (remove mapping)
resize <name> - resize active device
status <name> - show device status
benchmark [--cipher <cipher>] - benchmark cipher
repair <device> - try to repair on-disk metadata
reencrypt <device> - reencrypt LUKS2 device
erase <device> - erase all keyslots (remove encryption key)
convert <device> - convert LUKS from/to LUKS2 format
config <device> - set permanent configuration options for LUKS2
luksFormat <device> [<new key file>] - formats a LUKS device
luksAddKey <device> [<new key file>] - add key to LUKS device
luksRemoveKey <device> [<key file>] - removes supplied key or key file from LUKS device
luksChangeKey <device> [<key file>] - changes supplied key or key file of LUKS device
luksConvertKey <device> [<key file>] - converts a key to new pbkdf parameters
luksKillSlot <device> <key slot> - wipes key with number <key slot> from LUKS device
luksUUID <device> - print UUID of LUKS device
isLuks <device> - tests <device> for LUKS partition header
luksDump <device> - dump LUKS partition information
tcryptDump <device> - dump TCRYPT device information
luksSuspend <device> - Suspend LUKS device and wipe key (all IOs are frozen)
luksResume <device> - Resume suspended LUKS device
luksHeaderBackup <device> - Backup LUKS device header and keyslots
luksHeaderRestore <device> - Restore LUKS device header and keyslots
token <add|remove|import|export> <device> - Manipulate LUKS2 tokens
You can also use old <action> syntax aliases:
open: create (plainOpen), luksOpen, loopaesOpen, tcryptOpen
close: remove (plainClose), luksClose, loopaesClose, tcryptClose
<name> is the device to create under /dev/mapper
<device> is the encrypted device
<key slot> is the LUKS key slot number to modify
<key file> optional key file for the new key for luksAddKey action
Default compiled-in metadata format is LUKS1 (for luksFormat action).
Default compiled-in key and passphrase parameters:
Maximum keyfile size: 8192kB, Maximum interactive passphrase length 512 (characters)
Default PBKDF for LUKS1: pbkdf2, iteration time: 2000 (ms)
Default PBKDF for LUKS2: argon2i
Iteration time: 2000, Memory required: 1048576kB, Parallel threads: 4
Default compiled-in device cipher parameters:
loop-AES: aes, Key 256 bits
plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: ripemd160
LUKS: aes-xts-plain64, Key: 256 bits, LUKS header hashing: sha256, RNG: /dev/urandom
LUKS: Default keysize with XTS mode (two internal keys) will be doubled.
[*] Emulating binary ./sbin/cryptsetup with parameter --version and cpu configuration 24KEc
cryptsetup 2.2.1
[*] Emulating binary ./sbin/cryptsetup with parameter version and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
[--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
[-y|--verify-passphrase] [-d|--key-file=STRING]
[--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
[-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
[--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
[-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
[-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
[-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
[-T|--tries=INT] [--align-payload=SECTORS]
[--header-backup-file=STRING] [--use-random] [--use-urandom]
[--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
[--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
[--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
[--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
[--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
[--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
[--pbkdf=STRING] [--pbkdf-memory=kilobytes]
[--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
[--priority=STRING] [--disable-locks] [--disable-keyring]
[-I|--integrity=STRING] [--integrity-no-journal]
[--integrity-no-wipe] [--token-only] [--token-id=INT]
[--key-description=STRING] [--sector-size=INT] [--persistent]
[--label=STRING] [--subsystem=STRING] [--unbound]
[--json-file=STRING] [--luks2-metadata-size=bytes]
[--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
[--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
[--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
[--resilience=STRING] [--resilience-hash=STRING]
[--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Unknown action.
-----------------------------------------------------------------