Commit Graph

243 Commits

Author SHA256 Message Date
Dominique Leuenberger
a9f0d82fe4 Accepting request 915495 from security
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/915495
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=115
2021-09-02 21:20:08 +00:00
cddcbab746 - As YaST passes necessary parameters to cryptsetup anyway, we do
not necessarily need to take grub into consideration. So back to
  Argon2 to see how it goes.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=175
2021-08-25 13:47:31 +00:00
002330efa3 update
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=174
2021-08-23 05:09:18 +00:00
9b4f111a1b add feature reference
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=173
2021-08-12 13:00:47 +00:00
c25748051d - need to use PBKDF2 by default for LUKS2 as grub can't decrypt when
using Argon.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=172
2021-08-03 13:44:07 +00:00
db71e925b5 merge
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=171
2021-08-02 15:43:50 +00:00
8d2c1398f0 - crypsetup 2.4.0~rc1
* External LUKS token plugins
  * Experimental SSH token
  * Default LUKS2 PBKDF is now Argon2id
  * Increase minimal memory cost for Argon2 benchmark to 64MiB.
  * Autodetect optimal encryption sector size on LUKS2 format.
  * Use VeraCrypt option by default and add --disable-veracrypt option.
  * Support --hash and --cipher to limit opening time for TCRYPT type
  * Fixed default OpenSSL crypt backend support for OpenSSL3.
  * integritysetup: add integrity-recalculate-reset flag.
  * cryptsetup: retains keyslot number in luksChangeKey for LUKS2.
  * Fix cryptsetup resize using LUKS2 tokens.
  * Add close --deferred and --cancel-deferred options.
  * Rewritten command-line option parsing to avoid libpopt arguments
    memory leaks.
  * Add --test-args option.
- switch to LUKS2 default format

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=170
2021-08-02 15:10:27 +00:00
Dominique Leuenberger
2ca5e2b515 Accepting request 903414 from security
- cryptsetup 2.3.6:
  * integritysetup: Fix possible dm-integrity mapping table truncation.
  * cryptsetup: Backup header can be used to activate TCRYPT device.
    Use --header option to specify the header.
  * cryptsetup: Avoid LUKS2 decryption without detached header.
    This feature will be added later and is currently not supported.
  * Additional fixes and workarounds for common warnings produced
    by some static analysis tools (like gcc-11 analyzer) and additional
    code hardening.
  * Fix standalone libintl detection for compiled tests.
  * Add Blake2b and Blake2s hash support for crypto backends.
    Kernel and gcrypt crypto backend support all variants.
    OpenSSL supports only Blake2b-512 and Blake2s-256.
    Crypto backend supports kernel notation e.g. "blake2b-512".

OBS-URL: https://build.opensuse.org/request/show/903414
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=114
2021-07-04 20:10:04 +00:00
45054f2786 - cryptsetup 2.3.6:
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=169
2021-07-01 12:55:11 +00:00
Richard Brown
5920c59684 Accepting request 879091 from security
OBS-URL: https://build.opensuse.org/request/show/879091
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=113
2021-03-16 14:42:41 +00:00
8725925458 Accepting request 878732 from home:AndreasStieger:branches:security
cryptsetup 2.3.5

OBS-URL: https://build.opensuse.org/request/show/878732
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=167
2021-03-15 07:59:10 +00:00
Dominique Leuenberger
f540257485 Accepting request 853733 from security
- SLE marker: implements jsc#SLE-5911, bsc#116558, jsc#SLE-145149

OBS-URL: https://build.opensuse.org/request/show/853733
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=112
2020-12-08 12:23:17 +00:00
d173fab52a typo
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=165
2020-12-08 12:03:55 +00:00
9197d62a77 - SLE marker: implements jsc#SLE-5911, bsc#116558, jsc#SLE-145149
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=164
2020-12-08 08:53:32 +00:00
Dominique Leuenberger
8fc7ca0b5c Accepting request 849585 from security
- prepare usrmerge (boo#1029961) (forwarded request 849583 from lnussel)

OBS-URL: https://build.opensuse.org/request/show/849585
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=111
2020-11-23 15:38:36 +00:00
c6c715c2f5 Accepting request 849583 from home:lnussel:usrmove
- prepare usrmerge (boo#1029961)

OBS-URL: https://build.opensuse.org/request/show/849583
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=162
2020-11-20 09:26:02 +00:00
Dominique Leuenberger
f349d69df6 Accepting request 832027 from security
OBS-URL: https://build.opensuse.org/request/show/832027
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=110
2020-09-08 20:44:25 +00:00
d9929bafef Accepting request 832026 from home:lnussel:branches:security
- Update to 2.3.4:
  * Fix a possible out-of-bounds memory write while validating LUKS2 data
    segments metadata (CVE-2020-14382, boo#1176128).
  * Ignore reported optimal IO size if not aligned to minimal page size.
  * Added support for new no_read/write_wrokqueue dm-crypt options (kernel 5.9).
  * Added support panic_on_corruption option for dm-verity devices (kernel 5.9).
  * Support --master-key-file option for online LUKS2 reencryption
  * Always return EEXIST error code if a device already exists.
  * Fix a problem in integritysetup if a hash algorithm has dash in the name.
  * Fix crypto backend to properly handle ECB mode.
  * TrueCrypt/VeraCrypt compatible mode now supports the activation of devices
    with a larger sector.
  * LUKS2: Do not create excessively large headers.
  * Fix unspecified sector size for BitLocker compatible mode.
  * Fix reading key data size in metadata for BitLocker compatible mode.

OBS-URL: https://build.opensuse.org/request/show/832026
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=160
2020-09-04 08:13:03 +00:00
Dominique Leuenberger
e7c9a9bb28 Accepting request 810247 from security
OBS-URL: https://build.opensuse.org/request/show/810247
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=109
2020-06-03 18:29:42 +00:00
91d92afad9 Accepting request 810023 from home:AndreasStieger:branches:security
cryptsetup 2.3.3

OBS-URL: https://build.opensuse.org/request/show/810023
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=158
2020-05-29 15:01:56 +00:00
Dominique Leuenberger
26eae3b3c3 Accepting request 790921 from security
- Split translations to -lang package
- New version to 2.3.1
  * Support VeraCrypt 128 bytes passwords.
    VeraCrypt now allows passwords of maximal length 128 bytes
    (compared to legacy TrueCrypt where it was limited by 64 bytes).
  * Strip extra newline from BitLocker recovery keys
    There might be a trailing newline added by the text editor when
    the recovery passphrase was passed using the --key-file option.
  * Detect separate libiconv library.
    It should fix compilation issues on distributions with iconv
    implemented in a separate library.
  * Various fixes and workarounds to build on old Linux distributions.
  * Split lines with hexadecimal digest printing for large key-sizes.
  * Do not wipe the device with no integrity profile.
    With --integrity none we performed useless full device wipe.
  * Workaround for dm-integrity kernel table bug.
    Some kernels show an invalid dm-integrity mapping table
    if superblock contains the "recalculate" bit. This causes
    integritysetup to not recognize the dm-integrity device.
    Integritysetup now specifies kernel options such a way that
    even on unpatched kernels mapping table is correct.
  * Print error message if LUKS1 keyslot cannot be processed.
    If the crypto backend is missing support for hash algorithms
    used in PBKDF2, the error message was not visible.
  * Properly align LUKS2 keyslots area on conversion.
    If the LUKS1 payload offset (data offset) is not aligned
    to 4 KiB boundary, new LUKS2 keyslots area in now aligned properly.
  * Validate LUKS2 earlier on conversion to not corrupt the device
    if binary keyslots areas metadata are not correct.

OBS-URL: https://build.opensuse.org/request/show/790921
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=108
2020-04-05 18:49:04 +00:00
7b6ff2d0f5 - Split translations to -lang package
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=156
2020-04-02 14:37:41 +00:00
8873d8f729 - New version to 2.3.1
* Support VeraCrypt 128 bytes passwords.
    VeraCrypt now allows passwords of maximal length 128 bytes
    (compared to legacy TrueCrypt where it was limited by 64 bytes).
  * Strip extra newline from BitLocker recovery keys
    There might be a trailing newline added by the text editor when
    the recovery passphrase was passed using the --key-file option.
  * Detect separate libiconv library.
    It should fix compilation issues on distributions with iconv
    implemented in a separate library.
  * Various fixes and workarounds to build on old Linux distributions.
  * Split lines with hexadecimal digest printing for large key-sizes.
  * Do not wipe the device with no integrity profile.
    With --integrity none we performed useless full device wipe.
  * Workaround for dm-integrity kernel table bug.
    Some kernels show an invalid dm-integrity mapping table
    if superblock contains the "recalculate" bit. This causes
    integritysetup to not recognize the dm-integrity device.
    Integritysetup now specifies kernel options such a way that
    even on unpatched kernels mapping table is correct.
  * Print error message if LUKS1 keyslot cannot be processed.
    If the crypto backend is missing support for hash algorithms
    used in PBKDF2, the error message was not visible.
  * Properly align LUKS2 keyslots area on conversion.
    If the LUKS1 payload offset (data offset) is not aligned
    to 4 KiB boundary, new LUKS2 keyslots area in now aligned properly.
  * Validate LUKS2 earlier on conversion to not corrupt the device
    if binary keyslots areas metadata are not correct.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=155
2020-04-02 14:27:54 +00:00
Dominique Leuenberger
7252bcb7bd Accepting request 770054 from security
OBS-URL: https://build.opensuse.org/request/show/770054
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=107
2020-02-09 20:02:18 +00:00
c833c93fcf Accepting request 769866 from home:polslinux:branches:security
- Update to 2.3.0 (include release notes for 2.2.0)
  * BITLK (Windows BitLocker compatible) device access
  * Veritysetup now supports activation with additional PKCS7 signature
    of root hash through --root-hash-signature option.
  * Integritysetup now calculates hash integrity size according to algorithm
    instead of requiring an explicit tag size.
  * Integritysetup now supports fixed padding for dm-integrity devices.
  * A lot of fixes to online LUKS2 reecryption.
  * Add crypt_resume_by_volume_key() function to libcryptsetup.
    If a user has a volume key available, the LUKS device can be resumed
    directly using the provided volume key.
    No keyslot derivation is needed, only the key digest is checked.
  * Implement active device suspend info.
    Add CRYPT_ACTIVATE_SUSPENDED bit to crypt_get_active_device() flags
    that informs the caller that device is suspended (luksSuspend).
  * Allow --test-passphrase for a detached header.
    Before this fix, we required a data device specified on the command
    line even though it was not necessary for the passphrase check.
  * Allow --key-file option in legacy offline encryption.
    The option was ignored for LUKS1 encryption initialization.
  * Export memory safe functions.
    To make developing of some extensions simpler, we now export
    functions to handle memory with proper wipe on deallocation.
  * Fail crypt_keyslot_get_pbkdf for inactive LUKS1 keyslot.
  * Add optional global serialization lock for memory hard PBKDF.
  * Abort conversion to LUKS1 with incompatible sector size that is
    not supported in LUKS1.
  * Report error (-ENOENT) if no LUKS keyslots are available. User can now
    distinguish between a wrong passphrase and no keyslot available.
  * Fix a possible segfault in detached header handling (double free).
  * Add integritysetup support for bitmap mode introduced in Linux kernel 5.2.
  * The libcryptsetup now keeps all file descriptors to underlying device
    open during the whole lifetime of crypt device context to avoid excessive
    scanning in udev (udev run scan on every descriptor close).
  * The luksDump command now prints more info for reencryption keyslot
    (when a device is in-reencryption).
  * New --device-size parameter is supported for LUKS2 reencryption.
  * New --resume-only parameter is supported for LUKS2 reencryption.
  * The repair command now tries LUKS2 reencryption recovery if needed.
  * If reencryption device is a file image, an interactive dialog now
    asks if reencryption should be run safely in offline mode
    (if autodetection of active devices failed).
  * Fix activation through a token where dm-crypt volume key was not
    set through keyring (but using old device-mapper table parameter mode).
  * Online reencryption can now retain all keyslots (if all passphrases
    are provided). Note that keyslot numbers will change in this case.
  * Allow volume key file to be used if no LUKS2 keyslots are present.
  * Print a warning if online reencrypt is called over LUKS1 (not supported).
  * Fix TCRYPT KDF failure in FIPS mode.
  * Remove FIPS mode restriction for crypt_volume_key_get.
  * Reduce keyslots area size in luksFormat when the header device is too small.
  * Make resize action accept --device-size parameter (supports units suffix).

OBS-URL: https://build.opensuse.org/request/show/769866
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=153
2020-02-04 16:53:39 +00:00
Dominique Leuenberger
f33f765a5e Accepting request 755886 from security
OBS-URL: https://build.opensuse.org/request/show/755886
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=106
2019-12-17 12:29:09 +00:00
6a28f3c770 Accepting request 739355 from home:vitezslav_cizek:branches:security
- Create a weak dependency cycle between libcryptsetup and
  libcryptsetup-hmac to make sure they are installed together
  (bsc#1090768)

OBS-URL: https://build.opensuse.org/request/show/739355
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=151
2019-12-11 15:11:37 +00:00
Dominique Leuenberger
1590108120 Accepting request 701789 from security
retrofit bug number

OBS-URL: https://build.opensuse.org/request/show/701789
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=105
2019-05-14 11:29:48 +00:00
a86aef0410 retrofit bug number for sle
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=149
2019-05-09 11:56:46 +00:00
Yuchen Lin
277dfb964c Accepting request 677121 from security
OBS-URL: https://build.opensuse.org/request/show/677121
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=104
2019-02-20 13:08:36 +00:00
b860f84edd Accepting request 676570 from home:jengelh:branches:security
- Use noun phrase in summary.

OBS-URL: https://build.opensuse.org/request/show/676570
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=147
2019-02-18 12:27:45 +00:00
901c97104c - New version 2.1.0
* The default size of the LUKS2 header is increased to 16 MB.
    It includes metadata and the area used for binary keyslots;
    it means that LUKS header backup is now 16MB in size.
  * Cryptsetup now doubles LUKS default key size if XTS mode is used
    (XTS mode uses two internal keys). This does not apply if key size
    is explicitly specified on the command line and it does not apply
    for the plain mode.
    This fixes a confusion with AES and 256bit key in XTS mode where
    code used AES128 and not AES256 as often expected.
  * Default cryptographic backend used for LUKS header processing is now
    OpenSSL. For years, OpenSSL provided better performance for PBKDF.
  * The Python bindings are no longer supported and the code was removed
    from cryptsetup distribution. Please use the libblockdev project
    that already covers most of the libcryptsetup functionality
    including LUKS2.
  * Cryptsetup now allows using --offset option also for luksFormat.
  * Cryptsetup now supports new refresh action (that is the alias for
    "open --refresh").
  * Integritysetup now supports mode with detached data device through
    new --data-device option.
- 2.1.0 would use LUKS2 as default, we stay with LUKS1 for now until
  someone has time to evaluate the fallout from switching to LUKS2.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=146
2019-02-15 14:36:10 +00:00
Dominique Leuenberger
96adeab889 Accepting request 645684 from security
OBS-URL: https://build.opensuse.org/request/show/645684
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=103
2018-11-06 14:25:37 +00:00
3dd02a4dcc Accepting request 645498 from home:lnussel:branches:security
- Suggest hmac package (boo#1090768)
- remove old upgrade hack for upgrades from 12.1
- New version 2.0.5
  Changes since version 2.0.4
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  * Wipe full header areas (including unused) during LUKS format.
    Since this version, the whole area up to the data offset is zeroed,
    and subsequently, all keyslots areas are wiped with random data.
    This ensures that no remaining old data remains in the LUKS header
    areas, but it could slow down format operation on some devices.
    Previously only first 4k (or 32k for LUKS2) and the used keyslot
    was overwritten in the format operation.
  * Several fixes to error messages that were unintentionally replaced
    in previous versions with a silent exit code.
    More descriptive error messages were added, including error
    messages if
     - a device is unusable (not a block device, no access, etc.),
     - a LUKS device is not detected,
     - LUKS header load code detects unsupported version,
     - a keyslot decryption fails (also happens in the cipher check),
     - converting an inactive keyslot.
  * Device activation fails if data area overlaps with LUKS header.
  * Code now uses explicit_bzero to wipe memory if available
    (instead of own implementation).
  * Additional VeraCrypt modes are now supported, including Camellia
    and Kuznyechik symmetric ciphers (and cipher chains) and Streebog
    hash function. These were introduced in a recent VeraCrypt upstream.
    Note that Kuznyechik requires out-of-tree kernel module and
    Streebog hash function is available only with the gcrypt cryptographic
    backend for now.

OBS-URL: https://build.opensuse.org/request/show/645498
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=144
2018-10-31 08:59:56 +00:00
Dominique Leuenberger
873a55aadc Accepting request 630730 from security
- New version 2.0.4
  Changes since version 2.0.3
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  * Use the libblkid (blockid) library to detect foreign signatures
    on a device before LUKS format and LUKS2 auto-recovery.
    This change fixes an unexpected recovery using the secondary
    LUKS2 header after a device was already overwritten with
    another format (filesystem or LVM physical volume).
    LUKS2 will not recreate a primary header if it detects a valid
    foreign signature. In this situation, a user must always
    use cryptsetup repair command for the recovery.
    Note that libcryptsetup and utilities are now linked to libblkid
    as a new dependence.
    To compile code without blockid support (strongly discouraged),
    use --disable-blkid configure switch.
  * Add prompt for format and repair actions in cryptsetup and
    integritysetup if foreign signatures are detected on the device
    through the blockid library.
    After the confirmation, all known signatures are then wiped as
    part of the format or repair procedure.
  * Print consistent verbose message about keyslot and token numbers.
    For keyslot actions: Key slot <number> unlocked/created/removed.
    For token actions: Token <number> created/removed.
  * Print error, if a non-existent token is tried to be removed.
  * Add support for LUKS2 token definition export and import.
    The token command now can export/import customized token JSON file
    directly from command line. See the man page for more details.
  * Add support for new dm-integrity superblock version 2.
  * Add an error message when nothing was read from a key file.
  * Update cryptsetup man pages, including --type option usage.

OBS-URL: https://build.opensuse.org/request/show/630730
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=102
2018-08-28 07:22:31 +00:00
405535408f fix
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=142
2018-08-21 09:23:54 +00:00
b9976bf5b8 - New version 2.0.4
Changes since version 2.0.3
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  * Use the libblkid (blockid) library to detect foreign signatures
    on a device before LUKS format and LUKS2 auto-recovery.
    This change fixes an unexpected recovery using the secondary
    LUKS2 header after a device was already overwritten with
    another format (filesystem or LVM physical volume).
    LUKS2 will not recreate a primary header if it detects a valid
    foreign signature. In this situation, a user must always
    use cryptsetup repair command for the recovery.
    Note that libcryptsetup and utilities are now linked to libblkid
    as a new dependence.
    To compile code without blockid support (strongly discouraged),
    use --disable-blkid configure switch.
  * Add prompt for format and repair actions in cryptsetup and
    integritysetup if foreign signatures are detected on the device
    through the blockid library.
    After the confirmation, all known signatures are then wiped as
    part of the format or repair procedure.
  * Print consistent verbose message about keyslot and token numbers.
    For keyslot actions: Key slot <number> unlocked/created/removed.
    For token actions: Token <number> created/removed.
  * Print error, if a non-existent token is tried to be removed.
  * Add support for LUKS2 token definition export and import.
    The token command now can export/import customized token JSON file
    directly from command line. See the man page for more details.
  * Add support for new dm-integrity superblock version 2.
  * Add an error message when nothing was read from a key file.
  * Update cryptsetup man pages, including --type option usage.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=141
2018-08-21 07:44:40 +00:00
Dominique Leuenberger
7375ef6f52 Accepting request 574742 from security
OBS-URL: https://build.opensuse.org/request/show/574742
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=101
2018-02-13 09:25:18 +00:00
6a3a5ab46f Accepting request 574741 from home:AndreasStieger:branches:security
untested 2.0.1

OBS-URL: https://build.opensuse.org/request/show/574741
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=139
2018-02-09 15:48:12 +00:00
Dominique Leuenberger
d2aa865791 Accepting request 562805 from security
- Update to version 2.0.0:
  * Add support for new on-disk LUKS2 format
  * Enable to use system libargon2 instead of bundled version
  * Install tmpfiles.d configuration for LUKS2 locking directory
  * New command integritysetup: support for the new dm-integrity kernel target
  * Support for larger sector sizes for crypt devices
  * Miscellaneous fixes and improvements

OBS-URL: https://build.opensuse.org/request/show/562805
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=100
2018-01-31 18:48:16 +00:00
d84b0a491a OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=137 2018-01-09 09:48:53 +00:00
7cb1ae6064 Accepting request 561151 from home:archie172:branches:security
- Update to version 2.0.0:
  * Add support for new on-disk LUKS2 format
  * Enable to use system libargon2 instead of bundled version
  * Install tmpfiles.d configuration for LUKS2 locking directory
  * New command integritysetup: support for the new dm-integrity kernel target
  * Support for larger sector sizes for crypt devices
  * Miscellaneous fixes and improvements

OBS-URL: https://build.opensuse.org/request/show/561151
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=136
2018-01-09 08:52:58 +00:00
Dominique Leuenberger
e2bd3202b3 Accepting request 492821 from security
1

OBS-URL: https://build.opensuse.org/request/show/492821
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=99
2017-05-10 18:34:03 +00:00
04c288cc69 Accepting request 492031 from home:pluskalm:branches:security
- Update to version 1.7.5:
  * Fixes to luksFormat to properly support recent kernel running
    in FIPS mode.
  * Fixes accesses to unaligned hidden legacy TrueCrypt header.
  * Fixes to optional dracut ramdisk scripts for offline
    re-encryption on initial boot.

OBS-URL: https://build.opensuse.org/request/show/492031
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=134
2017-05-04 09:42:46 +00:00
Yuchen Lin
d82cae9dac Accepting request 481749 from security
1

OBS-URL: https://build.opensuse.org/request/show/481749
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=98
2017-04-07 12:17:28 +00:00
96565497db Accepting request 480910 from home:pluskalm:branches:security
- Update to version 1.7.4:

OBS-URL: https://build.opensuse.org/request/show/480910
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=132
2017-03-21 11:44:43 +00:00
Dominique Leuenberger
47cacbabc0 Accepting request 423052 from security
1

OBS-URL: https://build.opensuse.org/request/show/423052
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=97
2016-08-28 10:17:20 +00:00
Alexander Naumov
5b2dc6e33d Accepting request 422113 from home:Alexander_Naumov:branches:security
Update to version 1.7.2

OBS-URL: https://build.opensuse.org/request/show/422113
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=130
2016-08-26 11:48:47 +00:00
Dominique Leuenberger
8d993e85ec Accepting request 357344 from security
1

OBS-URL: https://build.opensuse.org/request/show/357344
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cryptsetup?expand=0&rev=96
2016-02-12 10:20:59 +00:00
4f8e236159 Accepting request 352690 from home:benoit_monin:branches:security
update to 1.7.0

OBS-URL: https://build.opensuse.org/request/show/352690
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=128
2016-02-02 11:57:35 +00:00