OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
doc
/
cryptsetup
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/10/2024 09:42:49 AM
rwxr-xr-x
📄
AUTHORS
102 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
FAQ.gz
42.41 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
NEWS.Debian.gz
3.57 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
README.Debian.gz
5.05 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
README.gnupg
1.59 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
README.initramfs.gz
4.15 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
README.keyctl
3.04 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
README.openct.gz
2.34 KB
03/18/2018 01:01:08 AM
rw-r--r--
📄
README.opensc.gz
2.23 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
TODO.Debian
3.58 KB
03/18/2018 01:01:09 AM
rw-r--r--
📄
changelog.Debian.gz
2.94 KB
08/03/2020 09:28:48 PM
rw-r--r--
📄
copyright
4.83 KB
03/18/2018 01:01:09 AM
rw-r--r--
📁
examples
-
05/09/2024 07:14:02 AM
rwxr-xr-x
📄
v1.0.7-ReleaseNotes
2.85 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.1.0-ReleaseNotes.gz
2.22 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.1.1-ReleaseNotes
1.75 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.1.2-ReleaseNotes
1.56 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.1.3-ReleaseNotes
482 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.2.0-ReleaseNotes.gz
2.07 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.3.0-ReleaseNotes.gz
2.08 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.3.1-ReleaseNotes
421 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.4.0-ReleaseNotes.gz
2.2 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.4.1-ReleaseNotes
889 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.4.2-ReleaseNotes
1.59 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.4.3-ReleaseNotes
2.3 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.5.0-ReleaseNotes.gz
3.24 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.5.1-ReleaseNotes
1.26 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.0-ReleaseNotes.gz
3.73 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.1-ReleaseNotes
1.02 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.2-ReleaseNotes
985 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.3-ReleaseNotes
1.82 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.4-ReleaseNotes
1.99 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.5-ReleaseNotes
2.42 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.6-ReleaseNotes
1.07 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.7-ReleaseNotes
3.25 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.6.8-ReleaseNotes
2.01 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.7.0-ReleaseNotes
3.03 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.7.1-ReleaseNotes
1.34 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.7.2-ReleaseNotes
1.45 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.7.3-ReleaseNotes
811 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.7.4-ReleaseNotes
657 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v1.7.5-ReleaseNotes
833 bytes
03/07/2018 11:55:54 AM
rw-r--r--
📄
v2.0.0-ReleaseNotes.gz
9.5 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v2.0.1-ReleaseNotes.gz
2.17 KB
03/07/2018 11:55:54 AM
rw-r--r--
📄
v2.0.2-ReleaseNotes.gz
1.95 KB
03/07/2018 11:55:54 AM
rw-r--r--
Editing: v1.7.2-ReleaseNotes
Close
Cryptsetup 1.7.2 Release Notes ============================== Changes since version 1.7.1 * Update LUKS documentation format. Clarify fixed sector size and keyslots alignment. * Support activation options for error handling modes in Linux kernel dm-verity module: --ignore-corruption - dm-verity just logs detected corruption --restart-on-corruption - dm-verity restarts the kernel if corruption is detected If the options above are not specified, default behavior for dm-verity remains. Default is that I/O operation fails with I/O error if corrupted block is detected. --ignore-zero-blocks - Instructs dm-verity to not verify blocks that are expected to contain zeroes and always return zeroes directly instead. NOTE that these options could have security or functional impacts, do not use them without assessing the risks! * Fix help text for cipher benchmark specification (mention --cipher option). * Fix off-by-one error in maximum keyfile size. Allow keyfiles up to compiled-in default and not that value minus one. * Support resume of interrupted decryption in cryptsetup-reencrypt utility. To resume decryption, LUKS device UUID (--uuid option) option must be used. * Do not use direct-io for LUKS header with unaligned keyslots. Such headers were used only by the first cryptsetup-luks-1.0.0 release (2005). * Fix device block size detection to properly work on particular file-based containers over underlying devices with 4k sectors.