Private
Server IP : 195.201.23.43  /  Your IP : 3.15.189.95
Web Server : Apache
System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64
User : kdecoratie ( 1041)
PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/doc/cryptsetup/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /usr/share/doc/cryptsetup/v2.2.2-ReleaseNotes
Cryptsetup 2.2.2 Release Notes
==============================
Stable bug-fix release.

All users of cryptsetup 2.1 and 2.2 should upgrade to this version.

Changes since version 2.2.1
~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Print error message if a keyslot open failed for a different reason
  than wrong passwords (for example there is not enough memory).
  Only an exit code was present in this case.

* The progress function switches unit sizes (B/s to GiB/s) according
  to the actual speed. Also, it properly calculates speed in the case
  of a resumed reencryption operation.

* The --version now supports short -V short option and better handles
  common option priorities.

* If cryptsetup wipes signatures during format actions through blkid,
  it also prints signature device offsets.

* Compilation now properly uses LTLIBINTL gettext setting in Makefiles.

* Device-mapper backend now supports new DM_GET_TARGET_VERSION ioctl
  (available since Linux kernel 5.4).
  This should help to detect some kernel/userspace incompatibilities
  earlier later after a failed device activation.

* Fixes LUKS2 reencryption on systems without kernel keyring.

* Fixes unlocking prompt for partitions mapped through loop devices
  (to properly show the backing device).

* For LUKS2 decryption, a device is now marked for deferred removal
  to be automatically deactivated.

* Reencryption now limits hotzone size to be maximal 1 GiB or 1/4
  system memory (if lower).

* Reencryption now retains activation flags during online reencryption.

* Reencryption now allows LUKS2 device to activate device right after
  LUKS2 encryption is initialized through optional active device name
  for cryptsetup reencrypt --encrypt command.
  This could help with automated encryption during boot.

  NOTE: It means that part of the device is still not encrypted during
  activation. Use with care!

* Fixes failure in resize and plain format activation if activated device
  size was not aligned to underlying logical device size.

* Fixes conversion to LUKS2 format with detached header if a detached
  header size was smaller than the expected aligned LUKS1 header size.
Private