diff --git a/boot.crypto-0_200811031303.tar.bz2 b/boot.crypto-0_200811031303.tar.bz2 deleted file mode 100644 index 4928362..0000000 --- a/boot.crypto-0_200811031303.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:9780875034b5037cbcfde267472e85d5d7d2dd86f0517805001f0868e2827a07 -size 13290 diff --git a/boot.crypto-0_200903031625.tar.bz2 b/boot.crypto-0_200903031625.tar.bz2 new file mode 100644 index 0000000..35e5884 --- /dev/null +++ b/boot.crypto-0_200903031625.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a5261f0d9fbb4bd3ba8cebbb50acf34e057494f33dd3cd7fdafb58478fb9504c +size 14275 diff --git a/cryptsetup.changes b/cryptsetup.changes index 6e22c5f..05450c9 100644 --- a/cryptsetup.changes +++ b/cryptsetup.changes @@ -1,3 +1,9 @@ +------------------------------------------------------------------- +Tue Mar 3 16:27:23 CET 2009 - lnussel@suse.de + +- fix boot.crypto doesn't care on tries flag in crypttab (bnc#480741) +- mkinitrd scripts now included in boot.crypto git + ------------------------------------------------------------------- Thu Feb 26 15:34:06 CET 2009 - mhopf@suse.de diff --git a/cryptsetup.spec b/cryptsetup.spec index 7e61f09..fa9e60f 100644 --- a/cryptsetup.spec +++ b/cryptsetup.spec @@ -19,25 +19,23 @@ Name: cryptsetup -Url: http://luks.endorphin.org/dm-crypt +Url: http://code.google.com/p/cryptsetup/ BuildRequires: device-mapper-devel e2fsprogs-devel libgcrypt-devel popt-devel BuildRequires: libselinux-devel # hashalot version %define haver 0.3 # boot.crypto version -%define bcver 0_200811031303 +%define bcver 0_200903031625 License: BSD 3-Clause; GPL v2 only; GPL v2 or later Group: System/Base AutoReqProv: on Version: 1.0.5_SVNr46 -Release: 60 +Release: 61 Summary: Set Up dm-crypt Based Encrypted Block Devices Source: cryptsetup-%{version}.tar.bz2 Source1: hashalot-%haver.tar.bz2 # http://www.suse.de/~lnussel/boot.crypto.git Source2: boot.crypto-%{bcver}.tar.bz2 -Source3: mkinitrd-setup.sh -Source4: mkinitrd-boot.sh # use this to create the tarball from svn Source99: cryptsetup-mktar Patch1: cryptsetup-1.0.5-udevadm.patch @@ -160,10 +158,6 @@ make install DESTDIR=$RPM_BUILD_ROOT popd # remove unwanted symlinks rm -f $RPM_BUILD_ROOT/sbin/{rmd160,sha256,sha384,sha512} -# mkinitrd scriptlets -install -d $RPM_BUILD_ROOT/lib/mkinitrd/scripts -install -m 755 %{SOURCE3} $RPM_BUILD_ROOT/lib/mkinitrd/scripts/setup-luks.sh -install -m 755 %{SOURCE4} $RPM_BUILD_ROOT/lib/mkinitrd/scripts/boot-luks.sh # # boot.crypto make -C ../boot.crypto-* install DESTDIR=$RPM_BUILD_ROOT @@ -227,6 +221,9 @@ rm -rf $RPM_BUILD_ROOT %{_libdir}/libcryptsetup.so %changelog +* Tue Mar 03 2009 lnussel@suse.de +- fix boot.crypto doesn't care on tries flag in crypttab (bnc#480741) +- mkinitrd scripts now included in boot.crypto git * Thu Feb 26 2009 mhopf@suse.de - Fix segfault with oversized hashes (bnc #476290). * Wed Feb 25 2009 jsmeix@suse.de diff --git a/mkinitrd-boot.sh b/mkinitrd-boot.sh deleted file mode 100644 index e822602..0000000 --- a/mkinitrd-boot.sh +++ /dev/null @@ -1,40 +0,0 @@ -#!/bin/bash -#%stage: crypto -#%programs: /sbin/cryptsetup -#%udevmodules: dm-crypt $cryptmodules -#%if: "$root_luks" -o "$luks" -# -##### LUKS (comfortable disk encryption) -## -## This activates a LUKS encrypted partition. -## -## Command line parameters -## ----------------------- -## -## luks a list of luks devices (e.g. xxx) -## luks_xxx the luks device (e.g. /dev/sda) -## - -case $luks_lang in - en*) - # We only support english keyboard layout - ;; - *) - echo "Only english keyboard layout supported." - echo "Please ensure that the password is typed correctly." - ;; -esac - -echo -echo -n "Enter LUKS Passphrase:" -read -s pass -echo - -for curluks in $luks; do - echo $pass | /sbin/cryptsetup luksOpen $(eval echo \$luks_${curluks}) $curluks || \ - /sbin/cryptsetup luksOpen $(eval echo \$luks_${curluks}) $curluks -done - -pass='xxxxxxxxxxxxxxxxxxxx' -unset pass - diff --git a/mkinitrd-setup.sh b/mkinitrd-setup.sh deleted file mode 100644 index 1974fa5..0000000 --- a/mkinitrd-setup.sh +++ /dev/null @@ -1,58 +0,0 @@ -#!/bin/bash -# -#%stage: crypto -# - -if [ -x /sbin/cryptsetup -a -x /sbin/dmsetup ] ; then - luks_blockdev= - luks_add_device="$blockdev $luks_add_device" - # bd holds the device we see the decrypted LUKS partition as - for bd in $luks_add_device ; do - luks_name= - update_blockdev $bd - luks_blockmajor=$blockmajor - luks_blockminor=$blockminor - # luksbd holds the device, LUKS is running on - for luksbd in $(dm_resolvedeps $bd); do # should only be one for luks - [ $? -eq 0 ] || return 1 - update_blockdev $luksbd - if /sbin/cryptsetup isLuks $luksbd 2>/dev/null; then - root_luks=1 - tmp_root_dm=1 # luks needs dm - - luks_name="$(dmsetup -c info -o name --noheadings -j $luks_blockmajor -m $luks_blockminor)" - eval luks_${luks_name}=$(beautify_blockdev ${luksbd}) - save_var luks_${luks_name} - - luks="$luks $luks_name" - luks_blockdev="$luks_blockdev $luksbd" - fi - done - if [ ! "$luks_name" ]; then # no luks found - luks_blockdev="$luks_blockdev $bd" - fi - done - blockdev="$luks_blockdev" -fi - -if [ "$root_luks" ]; then - case $LANG in - en*) - # We only support english keyboard layout currently - ;; - *) - echo "Only english keyboard layout supported." - echo "Please ensure that the password is typed correctly." - luks_lang=$LANG - ;; - esac - for m in $(cat /proc/crypto | grep module | sed 's/^module .*: \(.*\)$/\1/'); do - cryptmodules="$cryptmodules $m" - done -fi - -save_var root_luks # do we have luks? -save_var luks # which names do the luks devices have? -save_var cryptmodules # required kernel modules for crypto setup -save_var luks_lang # original language settings -