summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
Diffstat (limited to 'docs')
-rw-r--r--docs/ChangeLog.old16
-rw-r--r--docs/doxygen_index2
-rw-r--r--docs/v1.6.3-ReleaseNotes50
-rw-r--r--docs/v1.6.4-ReleaseNotes57
-rw-r--r--docs/v1.6.5-ReleaseNotes54
-rw-r--r--docs/v1.6.6-ReleaseNotes29
-rw-r--r--docs/v1.6.7-ReleaseNotes84
7 files changed, 9 insertions, 283 deletions
diff --git a/docs/ChangeLog.old b/docs/ChangeLog.old
index e51d362..970c25d 100644
--- a/docs/ChangeLog.old
+++ b/docs/ChangeLog.old
@@ -834,16 +834,16 @@
* lib/utils.c: Add read|write_blockwise functions, to use in
O_DIRECT file accesses.
-2004-03-11 Thursday 15:52 Jana Saout <jana@saout.de>
+2004-03-11 Thursday 15:52 Christophe Saout <christophe@saout.de>
* lib/blockdev.h: BLKGETSIZE64 really uses size_t as third
argument, the rest is wrong.
-2004-03-10 Wednesday 17:50 Jana Saout <jana@saout.de>
+2004-03-10 Wednesday 17:50 Christophe Saout <christophe@saout.de>
* lib/: libcryptsetup.h, libdevmapper.c: Small fixes.
-2004-03-09 Tuesday 21:41 Jana Saout <jana@saout.de>
+2004-03-09 Tuesday 21:41 Christophe Saout <christophe@saout.de>
* lib/internal.h, lib/libcryptsetup.h, lib/libdevmapper.c,
lib/setup.c, po/de.po, src/cryptsetup.c: Added internal flags to
@@ -851,7 +851,7 @@
add a function to free the memory. Also add a readonly flag to
libcryptsetup.
-2004-03-09 Tuesday 16:03 Jana Saout <jana@saout.de>
+2004-03-09 Tuesday 16:03 Christophe Saout <christophe@saout.de>
* ChangeLog, configure.in, setup-gettext, lib/Makefile.am,
lib/backends.c, lib/blockdev.h, lib/gcrypt.c, lib/internal.h,
@@ -859,7 +859,7 @@
lib/utils.c, po/de.po, src/Makefile.am, src/cryptsetup.c: More
reorganization work.
-2004-03-08 Monday 01:38 Jana Saout <jana@saout.de>
+2004-03-08 Monday 01:38 Christophe Saout <christophe@saout.de>
* ChangeLog, Makefile.am, acinclude.m4, configure.in,
lib/Makefile.am, lib/backends.c, lib/blockdev.h, lib/gcrypt.c,
@@ -867,19 +867,19 @@
src/Makefile.am: BLKGETSIZE64 fixes and started modularity
enhancements
-2004-03-04 Thursday 21:06 Jana Saout <jana@saout.de>
+2004-03-04 Thursday 21:06 Christophe Saout <christophe@saout.de>
* Makefile.am, po/de.po, src/cryptsetup.c, src/cryptsetup.h: First
backward compatible working version.
-2004-03-04 Thursday 00:42 Jana Saout <jana@saout.de>
+2004-03-04 Thursday 00:42 Christophe Saout <christophe@saout.de>
* NEWS, AUTHORS, ChangeLog, Makefile.am, README, autogen.sh,
configure.in, setup-gettext, po/ChangeLog, po/LINGUAS,
po/POTFILES.in, po/de.po, src/cryptsetup.c, src/cryptsetup.h,
src/Makefile.am (utags: initial): Initial checkin.
-2004-03-04 Thursday 00:42 Jana Saout <jana@saout.de>
+2004-03-04 Thursday 00:42 Christophe Saout <christophe@saout.de>
* NEWS, AUTHORS, ChangeLog, Makefile.am, README, autogen.sh,
configure.in, setup-gettext, po/ChangeLog, po/LINGUAS,
diff --git a/docs/doxygen_index b/docs/doxygen_index
index ec394ad..3bca941 100644
--- a/docs/doxygen_index
+++ b/docs/doxygen_index
@@ -56,7 +56,7 @@
* in a persistent way on the device. Keyslot area is an array beyond LUKS header, where
* volume key is stored in the encrypted form using user input passphrase. For more info about
* LUKS keyslots and how it's actually protected, please look at
- * <A HREF="https://gitlab.com/cryptsetup/cryptsetup/wikis/Specification">LUKS specification</A>.
+ * <A HREF="http://code.google.com/p/cryptsetup/wiki/Specification">LUKS specification</A>.
* There are two basic methods to create a new keyslot:
*
* @subsection ckeyslot_vol crypt_keyslot_add_by_volume_key()
diff --git a/docs/v1.6.3-ReleaseNotes b/docs/v1.6.3-ReleaseNotes
deleted file mode 100644
index 24254b8..0000000
--- a/docs/v1.6.3-ReleaseNotes
+++ /dev/null
@@ -1,50 +0,0 @@
-Cryptsetup 1.6.3 Release Notes
-==============================
-
-Changes since version 1.6.2
-
-* Fix cryptsetup reencryption tool to work properly
- with devices using 4kB sectors.
-
-* Always use page size if running through loop device,
- this fixes failures for external LUKS header and
- filesystem requiring 4kB block size.
-
-* Fix TCRYPT system encryption mapping for multiple partitions.
- Since this commit, one can use partition directly as device parameter.
- If you need to activate such partition from image in file,
- please first use map partitioned loop device (losetup -P)
- on image.
- (Cryptsetup require partition offsets visible in kernel sysfs
- in this mode.)
-
-* Support activation of old TrueCrypt containers using CBC mode
- and whitening (created in TrueCrypt version < 4.1).
- This requires Linux kernel 3.13 or later.
- (Containers with cascade CBC ciphers are not supported.)
-
-* Properly display keys in dump --dump-master-key command
- for TrueCrypt CBC containers.
-
-* Rewrite cipher benchmark loop which was unreliable
- on very fast machines.
-
-* Add warning if LUKS device was activated using non-cryptsetup
- library which did not set UUID properly (e.g. cryptmount).
- (Some commands, like luksSuspend, are not available then.)
-
-* Support length limitation also for plain (no hash) length.
- This can be used for mapping problematic cryptosystems which
- wipes some key (losetup sometimes set last 32 byte to zero,
- which can be now configured as --hash plain:31 parameter).
-
-* Fix hash limit if parameter is not a number.
- (The whole key was set to zero instead of command failure.)
-
-* Unify --key-slot behavior in cryptsetup_reencrypt tool.
-
-* Update dracut example scripts for system reencryption on first boot.
-
-* Add command line option --tcrypt-backup to access TCRYPT backup header.
-
-* Fix static compilation with OpenSSL.
diff --git a/docs/v1.6.4-ReleaseNotes b/docs/v1.6.4-ReleaseNotes
deleted file mode 100644
index ebc71cb..0000000
--- a/docs/v1.6.4-ReleaseNotes
+++ /dev/null
@@ -1,57 +0,0 @@
-Cryptsetup 1.6.4 Release Notes
-==============================
-
-Changes since version 1.6.3
-
-* Implement new erase (with alias luksErase) command.
-
- The erase cryptsetup command can be used to permanently erase
- all keyslots and make the LUKS container inaccessible.
- (The only way to unlock such device is to use LUKS header backup
- created before erase command was used.)
-
- You do not need to provide any password for this operation.
-
- This operation is irreversible.
-
-* Add internal "whirlpool_gcryptbug hash" for accessing flawed
- Whirlpool hash in gcrypt (requires gcrypt 1.6.1 or above).
-
- The gcrypt version of Whirlpool hash algorithm was flawed in some
- situations.
-
- This means that if you used Whirlpool in LUKS header and upgraded
- to new gcrypt library your LUKS container become inaccessible.
-
- Please refer to cryptsetup FAQ for detail how to fix this situation.
-
-* Allow to use --disable-gcrypt-pbkdf2 during configuration
- to force use internal PBKDF2 code.
-
-* Require gcrypt 1.6.1 for imported implementation of PBKDF2
- (PBKDF2 in gcrypt 1.6.0 is too slow).
-
-* Add --keep-key to cryptsetup-reencrypt.
-
- This allows change of LUKS header hash (and iteration count) without
- the need to reencrypt the whole data area.
- (Reencryption of LUKS header only without master key change.)
-
-* By default verify new passphrase in luksChangeKey and luksAddKey
- commands (if input is from terminal).
-
-* Fix memory leak in Nettle crypto backend.
-
-* Support --tries option even for TCRYPT devices in cryptsetup.
-
-* Support --allow-discards option even for TCRYPT devices.
- (Note that this could destroy hidden volume and it is not suggested
- by original TrueCrypt security model.)
-
-* Link against -lrt for clock_gettime to fix undefined reference
- to clock_gettime error (introduced in 1.6.2).
-
-* Fix misleading error message when some algorithms are not available.
-
-* Count system time in PBKDF2 benchmark if kernel returns no self usage info.
- (Workaround to broken getrusage() syscall with some hypervisors.)
diff --git a/docs/v1.6.5-ReleaseNotes b/docs/v1.6.5-ReleaseNotes
deleted file mode 100644
index dc9f525..0000000
--- a/docs/v1.6.5-ReleaseNotes
+++ /dev/null
@@ -1,54 +0,0 @@
-Cryptsetup 1.6.5 Release Notes
-==============================
-
-Changes since version 1.6.4
-
-* Allow LUKS header operation handling without requiring root privilege.
- It means that you can manipulate with keyslots as a regular user, only
- write access to device (or image) is required.
-
- This requires kernel crypto wrapper (similar to TrueCrypt device handling)
- to be available (CRYPTO_USER_API_SKCIPHER kernel option).
- If this kernel interface is not available, code fallbacks to old temporary
- keyslot device creation (where root privilege is required).
-
- Note that activation, deactivation, resize and suspend operations still
- need root privilege (limitation of kernel device-mapper backend).
-
-* Fix internal PBKDF2 key derivation function implementation for alternative
- crypto backends (kernel, NSS) which do not support PBKDF2 directly and have
- issues with longer HMAC keys.
-
- This fixes the problem for long keyfiles where either calculation is too slow
- (because of internal rehashing in every iteration) or there is a limit
- (kernel backend seems to not support HMAC key longer than 20480 bytes).
-
- (Note that for recent version of gcrypt, nettle or openssl the internal
- PBKDF2 code is not compiled in and crypto library internal functions are
- used instead.)
-
-* Support for Python3 for simple Python binding.
- Python >= 2.6 is now required. You can set Python compiled version by setting
- --with-python_version configure option (together with --enable-python).
-
-* Use internal PBKDF2 in Nettle library for Nettle crypto backend.
- Cryptsetup compilation requires Nettle >= 2.6 (if using Nettle crypto backend).
-
-* Allow simple status of crypt device without providing metadata header.
- The command "cryptsetup status" will print basic info, even if you
- do not provide detached header argument.
-
-* Allow to specify ECB mode in cryptsetup benchmark.
-
-* Add some LUKS images for regression testing.
- Note that if image with Whirlpool fails, the most probable cause is that
- you have old gcrypt library with flawed whirlpool hash.
- Read FAQ section 8.3 for more info.
-
-Cryptsetup API NOTE:
-The direct terminal handling for passphrase entry will be removed from
-libcryptsetup in next major version (application should handle it itself).
-
-It means that you have to always either provide password in buffer or set
-your own password callback function trhough crypt_set_password_callback().
-See API documentation (or libcryptsetup.h) for more info.
diff --git a/docs/v1.6.6-ReleaseNotes b/docs/v1.6.6-ReleaseNotes
deleted file mode 100644
index 9d1fbee..0000000
--- a/docs/v1.6.6-ReleaseNotes
+++ /dev/null
@@ -1,29 +0,0 @@
-Cryptsetup 1.6.6 Release Notes
-==============================
-
-Changes since version 1.6.5
-
-* LUKS: Fix keyslot device access for devices which
- do not support direct IO operations. (Regression in 1.6.5.)
-
-* LUKS: Fallback to old temporary keyslot device mapping method
- if hash (for ESSIV) is not supported by userspace crypto
- library. (Regression in 1.6.5.)
-
-* Properly activate device with discard (TRIM for SSDs)
- if requested even if dm_crypt module is not yet loaded.
- Only if discard is not supported by the old kernel then
- the discard option is ignored.
-
-* Fix some static analysis build warnings (scan-build).
-
-* Report crypto lib version only once (and always add kernel
- version) in debug output.
-
-Cryptsetup API NOTE:
-The direct terminal handling for passphrase entry will be removed from
-libcryptsetup in next major version (application should handle it itself).
-
-It means that you have to always either provide password in buffer or set
-your own password callback function through crypt_set_password_callback().
-See API documentation (or libcryptsetup.h) for more info.
diff --git a/docs/v1.6.7-ReleaseNotes b/docs/v1.6.7-ReleaseNotes
deleted file mode 100644
index edb73e5..0000000
--- a/docs/v1.6.7-ReleaseNotes
+++ /dev/null
@@ -1,84 +0,0 @@
-Cryptsetup 1.6.7 Release Notes
-==============================
-
-Changes since version 1.6.6
-
-* Cryptsetup git and wiki are now hosted on GitLab.
- https://gitlab.com/cryptsetup/cryptsetup
-
- Repository of stable releases remains on kernel.org site
- https://www.kernel.org/pub/linux/utils/cryptsetup/
-
- For more info please see README file.
-
-* Cryptsetup TCRYPT mode now supports VeraCrypt devices (TrueCrypt extension).
-
- The VeraCrypt extension only increases iteration count for the key
- derivation function (on-disk format is the same as TrueCrypt format).
-
- Note that unlocking of a VeraCrypt device can take very long time if used
- on slow machines.
-
- To use this extension, add --veracrypt option, for example
- cryptsetup open --type tcrypt --veracrypt <container> <name>
-
- For use through libcryptsetup, just add CRYPT_TCRYPT_VERA_MODES flag.
-
-* Support keyfile-offset and keyfile-size options even for plain volumes.
-
-* Support keyfile option for luksAddKey if the master key is specified.
-
-* For historic reasons, hashing in the plain mode is not used
- if keyfile is specified (with exception of --key-file=-).
- Print a warning if these parameters are ignored.
-
-* Support permanent device decryption for cryptsetup-reencrypt.
- To remove LUKS encryption from a device, you can now use --decrypt option.
-
-* Allow to use --header option in all LUKS commands.
- The --header always takes precedence over positional device argument.
-
-* Allow luksSuspend without need to specify a detached header.
-
-* Detect if O_DIRECT is usable on a device allocation.
- There are some strange storage stack configurations which wrongly allows
- to open devices with direct-io but fails on all IO operations later.
-
- Cryptsetup now tries to read the device first sector to ensure it can use
- direct-io.
-
-* Add low-level performance options tuning for dmcrypt (for Linux 4.0 and later).
-
- Linux kernel 4.0 contains rewritten dmcrypt code which tries to better utilize
- encryption on parallel CPU cores.
-
- While tests show that this change increases performance on most configurations,
- dmcrypt now provides some switches to change its new behavior.
-
- You can use them (per-device) with these cryptsetup switches:
- --perf-same_cpu_crypt
- --perf-submit_from_crypt_cpus
-
- Please use these only in the case of serious performance problems.
- Refer to the cryptsetup man page and dm-crypt documentation
- (for same_cpu_crypt and submit_from_crypt_cpus options).
- https://gitlab.com/cryptsetup/cryptsetup/wikis/DMCrypt
-
-* Get rid of libfipscheck library.
- (Note that this option was used only for Red Hat and derived distributions.)
- With recent FIPS changes we do not need to link to this FIPS monster anymore.
- Also drop some no longer needed FIPS mode checks.
-
-* Many fixes and clarifications to man pages.
-
-* Prevent compiler to optimize-out zeroing of buffers for on-stack variables.
-
-* Fix a crash if non-GNU strerror_r is used.
-
-Cryptsetup API NOTE:
-The direct terminal handling for passphrase entry will be removed from
-libcryptsetup in next major version (application should handle it itself).
-
-It means that you have to always either provide password in buffer or set
-your own password callback function through crypt_set_password_callback().
-See API documentation (or libcryptsetup.h) for more info.