SHA256
1
0
forked from pool/cryptsetup

- new version 1.1.0

* Detects and use device-mapper udev support if available.
  * Supports device topology detection for data alignment.
  * Fix luksOpen reading of passphrase on stdin (if "-" keyfile specified).
  * Fix isLuks to initialise crypto backend (blkid instead is suggested anyway).
  * Properly initialise crypto backend in header backup/restore commands.
  * Do not verify unlocking passphrase in luksAddKey command.
  * Allow no hash specification in plain device constructor - user can provide volume key directly.
  * Try to use pkgconfig for device mapper library in configuration script.
  * Add some compatibility checks and disable LUKS suspend/resume if not supported.
  * Rearrange tests, "make check" now run all available test for package.
  * Avoid class C++ keyword in library header.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=43
This commit is contained in:
Ludwig Nussel 2010-05-25 14:22:00 +00:00 committed by Git OBS Bridge
parent 1c6028ab0d
commit 099baa5add
6 changed files with 28 additions and 12 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:b343fa6bf3c48b633e68da25e44aebd6a32a3dc21c10604acd6faa04e41f58f3
size 465778

View File

@ -1,7 +0,0 @@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEABECAAYFAktS7HYACgkQf1Jlc7shgi8PwQCfVFwnRLdjn7hILuxXq5TLtmsa
elIAn0VqeFuSEqPg3qu9BqPnmdkoMRzI
=mOAm
-----END PGP SIGNATURE-----

3
cryptsetup-1.1.1.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:a0d07cfc03d3a12d54e68eebb509e6ce45bbd5169ae277256ea7bd165cc246bd
size 477800

View File

@ -0,0 +1,7 @@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEABECAAYFAkv5MTUACgkQf1Jlc7shgi/7NgCffzJroywTA9rBo8SPvHZdpmYo
JOgAoIn6v5wuMlTBDHQ8gLU1RZ4d3xMr
=UWDV
-----END PGP SIGNATURE-----

View File

@ -1,3 +1,19 @@
-------------------------------------------------------------------
Tue May 25 08:11:30 UTC 2010 - lnussel@suse.de
- new version 1.1.0
* Detects and use device-mapper udev support if available.
* Supports device topology detection for data alignment.
* Fix luksOpen reading of passphrase on stdin (if "-" keyfile specified).
* Fix isLuks to initialise crypto backend (blkid instead is suggested anyway).
* Properly initialise crypto backend in header backup/restore commands.
* Do not verify unlocking passphrase in luksAddKey command.
* Allow no hash specification in plain device constructor - user can provide volume key directly.
* Try to use pkgconfig for device mapper library in configuration script.
* Add some compatibility checks and disable LUKS suspend/resume if not supported.
* Rearrange tests, "make check" now run all available test for package.
* Avoid class C++ keyword in library header.
-------------------------------------------------------------------
Tue Mar 9 10:50:00 UTC 2010 - lnussel@suse.de

View File

@ -21,7 +21,7 @@
Name: cryptsetup
Url: http://code.google.com/p/cryptsetup/
BuildRequires: device-mapper-devel e2fsprogs-devel libgcrypt-devel popt-devel
BuildRequires: libselinux-devel
BuildRequires: libselinux-devel pkgconfig
# hashalot version
%define haver 0.3
# boot.crypto version
@ -29,7 +29,7 @@ BuildRequires: libselinux-devel
License: BSD3c(or similar) ; GPLv2 ; GPLv2+
Group: System/Base
AutoReqProv: on
Version: 1.1.0
Version: 1.1.1
Release: 4
Summary: Set Up dm-crypt Based Encrypted Block Devices
Source: http://cryptsetup.googlecode.com/files/cryptsetup-%{version}.tar.bz2