Set Up dm-crypt Based Encrypted Block Devices

Edit Package cryptsetup

cryptsetup is used to conveniently set up dm-crypt based device-mapper
targets. It allows to set up targets to read cryptoloop compatible
volumes as well as LUKS formatted ones. The package additionally
includes support for automatically setting up encrypted volumes at boot
time via the config file /etc/crypttab.

Refresh
Refresh
Source Files
Filename Size Changed
baselibs.conf 0000000037 37 Bytes
cryptsetup-2.5.0.tar.sign 0000000833 833 Bytes
cryptsetup-2.5.0.tar.xz 0011304256 10.8 MB
cryptsetup-rpmlintrc 0000000234 234 Bytes
cryptsetup.changes 0000081023 79.1 KB
cryptsetup.keyring 0000003284 3.21 KB
cryptsetup.spec 0000007955 7.77 KB
Revision 118 (latest revision is 127)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 999047 from Ludwig Nussel's avatar Ludwig Nussel (lnussel) (revision 118)
- cryptsetup 2.5.0:
  * Split manual pages into per-action pages and use AsciiDoc format. 
  * Remove cryptsetup-reencrypt tool from the project and move reencryption
    to already existing "cryptsetup reencrypt" command.
    If you need to emulate the old cryptsetup-reencrypt binary, use simple
    wrappers script running "exec cryptsetup reencrypt $@".
  * LUKS2: implement --decryption option that allows LUKS removal.
  * Fix decryption operation with --active-name option and restrict
    it to be used only with LUKS2.
  * Do not refresh reencryption digest when not needed.
    This should speed up the reencryption resume process.
  * Store proper resilience data in LUKS2 reencrypt initialization.
    Resuming reencryption now does not require specification of resilience
    type parameters if these are the same as during initialization.
  * Properly wipe the unused area after reencryption with datashift in
    the forward direction.
  * Check datashift value against larger sector size.
    For example, it could cause an issue if misaligned 4K sector appears
    during decryption.
  * Do not allow sector size increase reencryption in offline mode.
  * Do not allow dangerous sector size change during reencryption.
  * Ask the user for confirmation before resuming reencryption.
  * Do not resume reencryption with conflicting parameters.
  * Add --force-offline-reencrypt option.
  * Do not allow nested encryption in LUKS reencrypt.
  * Support all options allowed with luksFormat with encrypt action.
  * Add resize action to integritysetup.
  * Remove obsolete dracut plugin reencryption example.
  * Fix possible keyslot area size overflow during conversion to LUKS2.
  * Allow use of --header option for cryptsetup close. (forwarded request 999046 from lnussel)
Comments 0
openSUSE Build Service is sponsored by