Set Up dm-crypt Based Encrypted Block Devices
cryptsetup is used to conveniently set up dm-crypt based device-mapper
targets. It allows to set up targets to read cryptoloop compatible
volumes as well as LUKS formatted ones. The package additionally
includes support for automatically setting up encrypted volumes at boot
time via the config file /etc/crypttab.
- Developed at security
- Sources inherited from project openSUSE:Factory
-
7
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:zSystems/cryptsetup && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
baselibs.conf | 0000000015 15 Bytes | |
boot.crypto-0_201204171450.tar.bz2 | 0000017520 17.1 KB | |
bug-476290_hashalot-hashlen.diff | 0000000938 938 Bytes | |
cryptsetup-1.4.2.tar.bz2 | 0000787016 769 KB | |
cryptsetup-1.4.2.tar.bz2.asc | 0000000836 836 Bytes | |
cryptsetup-mktar | 0000000329 329 Bytes | |
cryptsetup.changes | 0000031410 30.7 KB | |
cryptsetup.spec | 0000007361 7.19 KB | |
hashalot-0.3.tar.bz2 | 0000068508 66.9 KB | |
hashalot-ctrl-d.diff | 0000000844 844 Bytes | |
hashalot-fixes.diff | 0000001035 1.01 KB | |
hashalot-glibc210.diff | 0000000724 724 Bytes | |
hashalot-libgcrypt.diff | 0000004642 4.53 KB | |
hashalot-manpage.diff | 0000001365 1.33 KB | |
hashalot-timeout.diff | 0000002329 2.27 KB |
Revision 72 (latest revision is 127)
Stephan Kulow (coolo)
accepted
request 114171
from
Ludwig Nussel (lnussel)
(revision 72)
- boot.crypto: * prefer physdev from crypttab * fix non-plymouth use - new version 1.4.2 * Fix header check to support old (cryptsetup 1.0.0) header alignment. (1.4.0) * Add --keyfile-offset and --new-keyfile-offset parameters to API and CLI. * Add repair command and crypt_repair() for known LUKS metadata problems repair. * Allow to specify --align-payload only for luksFormat. * Unify password verification option. * Support password verification with quiet flag if possible. (1.2.0) * Fix retry if entered passphrases (with verify option) do not match. * Support UUID=<LUKS_UUID> format for device specification. * Add --master-key-file option to luksOpen (open using volume key). * Fix use of empty keyfile. * Fix error message for luksClose and detached LUKS header. * Allow --header for status command to get full info with detached header. - boot.crypto: * avoid warning about module 'kernel' (bnc#741468) * incorporate plymouth support
Comments 0