forked from pool/cryptsetup
- New version to 2.3.1
* Support VeraCrypt 128 bytes passwords. VeraCrypt now allows passwords of maximal length 128 bytes (compared to legacy TrueCrypt where it was limited by 64 bytes). * Strip extra newline from BitLocker recovery keys There might be a trailing newline added by the text editor when the recovery passphrase was passed using the --key-file option. * Detect separate libiconv library. It should fix compilation issues on distributions with iconv implemented in a separate library. * Various fixes and workarounds to build on old Linux distributions. * Split lines with hexadecimal digest printing for large key-sizes. * Do not wipe the device with no integrity profile. With --integrity none we performed useless full device wipe. * Workaround for dm-integrity kernel table bug. Some kernels show an invalid dm-integrity mapping table if superblock contains the "recalculate" bit. This causes integritysetup to not recognize the dm-integrity device. Integritysetup now specifies kernel options such a way that even on unpatched kernels mapping table is correct. * Print error message if LUKS1 keyslot cannot be processed. If the crypto backend is missing support for hash algorithms used in PBKDF2, the error message was not visible. * Properly align LUKS2 keyslots area on conversion. If the LUKS1 payload offset (data offset) is not aligned to 4 KiB boundary, new LUKS2 keyslots area in now aligned properly. * Validate LUKS2 earlier on conversion to not corrupt the device if binary keyslots areas metadata are not correct. OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=155
This commit is contained in:
parent
c833c93fcf
commit
8873d8f729
@ -1,16 +0,0 @@
|
|||||||
-----BEGIN PGP SIGNATURE-----
|
|
||||||
|
|
||||||
iQIzBAABCAAdFiEEKikYJD/eRmSNBob52bBXe9k+mPwFAl42+b4ACgkQ2bBXe9k+
|
|
||||||
mPyC+w/+JY0R3jpt+iCfDjp/Terjwm+Q1NqOjTJ1pSps9ZzZF5vgqxDqF4IljxNX
|
|
||||||
zM4YtEN9HUUoE0U12FXmFTYlfoD4rj1AzR4Er9oX+P4YlGVQ0dmkGGr9gsmh+mpY
|
|
||||||
m9fZg3jLp+ebhkhIQqMgsUj2xjgQlYoc7hcRcNq9weatLBAidHIdd0JR/0ot2yAS
|
|
||||||
eLRodVOtfMvLDGhatMgwxm+FEXbPbgQXYrOemcqlHYPzKLv6xir9ZsLowZxABRaB
|
|
||||||
41LZ8o6+4VGqpoNA0r4M1XFqcJ0mDYLdLib7uNNFY97A5bZTUEmALuiHOBNdEygG
|
|
||||||
AgBUPnZPJUgSRKmJP4QL2CM6U3si3eNLDwrIjwp0cFtqnZB3bUzGfeu0h/XXSkrV
|
|
||||||
b6Yja7zneZNeWaxz8GWCiZwVVBtM2n7PamdVV4xqQF6GE0o84EkJ91oZBim+a/5B
|
|
||||||
PUOgcctQaYUAKkuvYXVhZQBaL5D4ppBWaFthENZSQ4sSlEILtsz5LYvWq1oMLWkv
|
|
||||||
rZN9lftPd5GqASkTIDQcTNL0GNdJR+P+0kMCNiWOCJzZNzEIk2D6tlyxjnJV8qrk
|
|
||||||
rFcShE9R3dADDJ9Ew+91JRk8C2XSG9gOS29K3fF2Hdnv7nfiTns3dh2V6kz/821W
|
|
||||||
E39CREgh0A67zppzKWyHnH1BayDeREgRA/TatjZWDAZOHWRM+Ig=
|
|
||||||
=cfqp
|
|
||||||
-----END PGP SIGNATURE-----
|
|
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:395690de99509428354d3cd15cf023bed01487e6f1565b2181e013dc847bbc85
|
|
||||||
size 11035660
|
|
16
cryptsetup-2.3.1.tar.sign
Normal file
16
cryptsetup-2.3.1.tar.sign
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
|
||||||
|
iQIzBAABCAAdFiEEKikYJD/eRmSNBob52bBXe9k+mPwFAl5p+RgACgkQ2bBXe9k+
|
||||||
|
mPyBoQ//fK3nWpug0VJpWhxwoe0SOj0x/2CYP9bJAwkT33davLiDkkM0pfvq9Y5L
|
||||||
|
rdbX0JRJemwFwS6V0DuZNDK2b88xEeJpvnNmDWXtKQ2HS9BPNesJJmzgBRY4P06q
|
||||||
|
bwxUvndnDLP7fAZtEMiLQJYCzuLkGwnEQFMh1GLfAM2H8FM9YZYz/HvezTlDTLYi
|
||||||
|
9SJ0iF8UF+VR8jPl3hqGQXkiHPVopvMEhwL9kpP1dJdYmeMFVYH/l+3jQ0Qw5de7
|
||||||
|
YaqEitsKaT/JT236vSfR/RCFEifswbea+fplQE5a0kVuVmAkaEnL65fS1S9+18Ol
|
||||||
|
7Vo/8JaXxN6kjVpBVwn57RpWpGiLYXYjTzOtRrAQx7Q0oX3ycCwnii1TEzDvFcJL
|
||||||
|
aPsZsbNMf6Cgj+iw0htPCoXInaZW52GHIGJc8rR5WKdl3v5Md2vgGV6TTVcMYee+
|
||||||
|
KQ2RuQtiDXC9+4OhfTPZ5Rpxn+Dns9xl0hfsmbRJDH1THJncaX1B/0qN8gHtsvMG
|
||||||
|
/+p9tZ7Ox6EpiIh8CcsyJT83bzgq0FO0Ut8jsh8fM+YKHEISvEFkkGAmykLim/e+
|
||||||
|
ef6aYpkxHoGA+jpwmDaXF0LBPY2jAxs6OQxQwuD9i+BDkyMH1arO/AkRkEMqQMY6
|
||||||
|
2yyVfu6doOVEACX51zZmB3bBvQLUtjPJh/5hS/0InGOP2Nm3lwA=
|
||||||
|
=1LIc
|
||||||
|
-----END PGP SIGNATURE-----
|
3
cryptsetup-2.3.1.tar.xz
Normal file
3
cryptsetup-2.3.1.tar.xz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:92aba4d559a2cf7043faed92e0f22c5addea36bd63f8c039ba5a8f3a159fe7d2
|
||||||
|
size 11041592
|
@ -1,3 +1,35 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Apr 2 14:27:18 UTC 2020 - Ludwig Nussel <lnussel@suse.de>
|
||||||
|
|
||||||
|
- New version to 2.3.1
|
||||||
|
* Support VeraCrypt 128 bytes passwords.
|
||||||
|
VeraCrypt now allows passwords of maximal length 128 bytes
|
||||||
|
(compared to legacy TrueCrypt where it was limited by 64 bytes).
|
||||||
|
* Strip extra newline from BitLocker recovery keys
|
||||||
|
There might be a trailing newline added by the text editor when
|
||||||
|
the recovery passphrase was passed using the --key-file option.
|
||||||
|
* Detect separate libiconv library.
|
||||||
|
It should fix compilation issues on distributions with iconv
|
||||||
|
implemented in a separate library.
|
||||||
|
* Various fixes and workarounds to build on old Linux distributions.
|
||||||
|
* Split lines with hexadecimal digest printing for large key-sizes.
|
||||||
|
* Do not wipe the device with no integrity profile.
|
||||||
|
With --integrity none we performed useless full device wipe.
|
||||||
|
* Workaround for dm-integrity kernel table bug.
|
||||||
|
Some kernels show an invalid dm-integrity mapping table
|
||||||
|
if superblock contains the "recalculate" bit. This causes
|
||||||
|
integritysetup to not recognize the dm-integrity device.
|
||||||
|
Integritysetup now specifies kernel options such a way that
|
||||||
|
even on unpatched kernels mapping table is correct.
|
||||||
|
* Print error message if LUKS1 keyslot cannot be processed.
|
||||||
|
If the crypto backend is missing support for hash algorithms
|
||||||
|
used in PBKDF2, the error message was not visible.
|
||||||
|
* Properly align LUKS2 keyslots area on conversion.
|
||||||
|
If the LUKS1 payload offset (data offset) is not aligned
|
||||||
|
to 4 KiB boundary, new LUKS2 keyslots area in now aligned properly.
|
||||||
|
* Validate LUKS2 earlier on conversion to not corrupt the device
|
||||||
|
if binary keyslots areas metadata are not correct.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Feb 4 07:59:24 UTC 2020 - Paolo Stivanin <info@paolostivanin.com>
|
Tue Feb 4 07:59:24 UTC 2020 - Paolo Stivanin <info@paolostivanin.com>
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Name: cryptsetup2
|
|||||||
%else
|
%else
|
||||||
Name: cryptsetup
|
Name: cryptsetup
|
||||||
%endif
|
%endif
|
||||||
Version: 2.3.0
|
Version: 2.3.1
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Setup program for dm-crypt Based Encrypted Block Devices
|
Summary: Setup program for dm-crypt Based Encrypted Block Devices
|
||||||
License: SUSE-GPL-2.0-with-openssl-exception AND LGPL-2.0-or-later
|
License: SUSE-GPL-2.0-with-openssl-exception AND LGPL-2.0-or-later
|
||||||
|
Loading…
Reference in New Issue
Block a user