Hello community, here is the log from the commit of package cryptsetup for openSUSE:Factory checked in at Tue Dec 28 23:57:45 CET 2010. -------- --- cryptsetup/cryptsetup.changes 2010-11-30 16:07:41.000000000 +0100 +++ /mounts/work_src_done/STABLE/cryptsetup/cryptsetup.changes 2010-12-20 14:44:02.000000000 +0100 @@ -1,0 +2,86 @@ +Mon Dec 20 13:01:54 UTC 2010 - lnussel@suse.de + +- new version 1.2.0 + * Add selection of random/urandom number generator for luksFormat + (option --use-random and --use-urandom). + + * Fix luksRemoveKey to not ask for remaining keyslot passphrase, + only for removed one. + + * No longer support luksDelKey (replaced with luksKillSlot). + * if you want to remove particular passphrase, use luksKeyRemove + * if you want to remove particular keyslot, use luksKillSlot + + Note that in batch mode luksKillSlot allows removing of any keyslot + without question, in normal mode requires passphrase or keyfile from + other keyslot. + + * Default alignment for device (if not overridden by topology info) + is now (multiple of) *1MiB*. + This reflects trends in storage technologies and aligns to the same + defaults for partitions and volume management. + + * Allow explicit UUID setting in luksFormat and allow change it later + in luksUUID (--uuid parameter). + + * All commands using key file now allows limited read from keyfile using + --keyfile-size and --new-keyfile-size parameters (in bytes). + + This change also disallows overloading of --key-size parameter which + is now exclusively used for key size specification (in bits.) + + * luksFormat using pre-generated master key now properly allows + using key file (only passphrase was allowed prior to this update). + + * Add --dump-master-key option for luksDump to perform volume (master) + key dump. Note that printed information allows accessing device without + passphrase so it must be stored encrypted. + + This operation is useful for simple Key Escrow function (volume key and + encryption parameters printed on paper on safe place). + + This operation requires passphrase or key file. + + * The reload command is no longer supported. + (Use dmsetup reload instead if needed. There is no real use for this + function except explicit data corruption:-) + + * Cryptsetup now properly checks if underlying device is in use and + disallows *luksFormat*, luksOpen and create commands on open + (e.g. already mapped or mounted) device. + + * Option --non-exclusive (already deprecated) is removed. + +Libcryptsetup API additions: + + * new functions + * crypt_get_type() - explicit query to crypt device context type + * crypt_resize() - new resize command using context + * crypt_keyslot_max() - helper to get number of supported keyslots + * crypt_get_active_device() - get active device info + * crypt_set/get_rng_type() - random/urandom RNG setting + * crypt_set_uuid() - explicit UUID change of existing device + * crypt_get_device_name() - get underlying device name + + * Fix optional password callback handling. + + * Allow to activate by internally cached volume key immediately after + crypt_format() without active slot (for temporary devices with + on-disk metadata) + + * libcryptsetup is binary compatible with 1.1.x release and still + supports legacy API calls + + * cryptsetup binary now uses only new API calls. + + * Static compilation of both library (--enable-static) and cryptsetup + binary (--enable-static-cryptsetup) is now properly implemented by common + libtool logic. + + Prior to this it produced miscompiled dynamic cryptsetup binary with + statically linked libcryptsetup. + + The static binary is compiled as src/cryptsetup.static in parallel + with dynamic build if requested. + +------------------------------------------------------------------- calling whatdependson for head-i586 Old: ---- cryptsetup-1.1.3.tar.bz2 cryptsetup-1.1.3.tar.bz2.asc New: ---- cryptsetup-1.2.0.tar.bz2 cryptsetup-1.2.0.tar.bz2.asc ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cryptsetup.spec ++++++ --- /var/tmp/diff_new_pack.ZmPl7B/_old 2010-12-28 23:57:22.000000000 +0100 +++ /var/tmp/diff_new_pack.ZmPl7B/_new 2010-12-28 23:57:22.000000000 +0100 @@ -1,5 +1,5 @@ # -# spec file for package cryptsetup (Version 1.1.3) +# spec file for package cryptsetup (Version 1.2.0) # # Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany. # @@ -29,8 +29,8 @@ License: GPLv2+ Group: System/Base AutoReqProv: on -Version: 1.1.3 -Release: 3 +Version: 1.2.0 +Release: 1 Summary: Set Up dm-crypt Based Encrypted Block Devices Source: http://cryptsetup.googlecode.com/files/cryptsetup-%{version}.tar.bz2 Source1: http://cryptsetup.googlecode.com/files/cryptsetup-%{version}.tar.bz2.asc @@ -153,7 +153,7 @@ %install make install DESTDIR=$RPM_BUILD_ROOT -# move devel stuff to %{libdir} +# move devel stuff to %%{libdir} rm -f $RPM_BUILD_ROOT/%{_lib}/libcryptsetup.so mkdir -p $RPM_BUILD_ROOT%{_libdir} ln -s /%{_lib}/libcryptsetup.so.1 $RPM_BUILD_ROOT%{_libdir}/libcryptsetup.so @@ -224,8 +224,7 @@ %files -n libcryptsetup1 %defattr(-,root,root) -/%_lib/libcryptsetup.so.1 -/%_lib/libcryptsetup.so.1.0.0 +/%_lib/libcryptsetup.so.1* %files -n libcryptsetup-devel %defattr(-,root,root) ++++++ cryptsetup-1.1.3.tar.bz2 -> cryptsetup-1.2.0.tar.bz2 ++++++ ++++ 27271 lines of diff (skipped) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun... -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org