libcryptsetup-devel-1.0.7-10.1>t  DH`pJܱD/=„2ZyqX!wG-.V2ev$Ʋ&aW*آt|jX+>_14kĀQJZBp+ݨ 6/$ ke,$@Mk˕^T 1ilZTH@(ɴ_*./<zbpڼo!Z%1]H~@0ܧֱQ(VxNS{/N 944ꃀ+[=UlmoEF4!X1Tle4e06f4514d02fd29f4c68ee08e45e9363397e12c6JܱD/=„] A5oĢ|Z;?9IF\" ;u綸2m,f}* 1q:M@] oެo,PlolR3RuE XdHȲCXխ²!b%W ?=GAgR5xGXz)~_V_); ڟmAf(- 3f,O‚jelQ|Ts~9^h?>/&z=Bs4Zb'}$t@J (>80D?04d ! O $,0>G     & HPZd   (8898: P8B.F.G.H.I.X.Y.Z.[.\.].^/b/7c/d0e0 f0l0z0$Clibcryptsetup-devel1.0.710.1Set Up dm-crypt Based Encrypted Block Devicescryptsetup is used to conveniently set up dm-crypt based device-mapper targets. It allows to set up targets to read cryptoloop compatible volumes as well as LUKS formatted ones. The package additionally includes support for automatically setting up encrypted volumes at boot time via the config file /etc/crypttab. Authors: -------- Clemens Fruhwirth Christophe Saout Ben Slusky Jܱ-build24topenSUSE 11.2openSUSEBSD 3-clause (or similar) ; GPL v2 only ; GPL v2 or laterhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://code.google.com/p/cryptsetup/linuxx86_64tJܱ(Jܱ(d2b88b644b8a2707d9edf21ed09d05db/lib64/libcryptsetup.so.0.0.0rootrootrootrootcryptsetup-1.0.7-10.1.src.rpmcryptsetup-devellibcryptsetup-devellibcryptsetup-devel(x86-64)    rpmlib(VersionedDependencies)libcryptsetup0device-mapper-devellibgcrypt-devellibgpg-error-devele2fsprogs-develglibc-develrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-11.0.74.0-13.0.4-14.4.6-14.7.1ĴJ1@JJJ_@JjJ@JJ@Ju@J@J[!J8J0IԨI@II@I2ID@IHYH|@H@HH5@H@H@H H@GGPG@G@GNG1GFҼFҼFzh@Fm9@F` @F\FAFAFAF@f@F@f@F; @F1F-@F @F@EL@Ex@E/Elnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.decoolo@novell.comcoolo@novell.comlnussel@suse.delnussel@suse.delnussel@suse.demhopf@suse.dejsmeix@suse.debwalle@suse.demkoenig@suse.demkoenig@suse.dehare@suse.demkoenig@suse.demkoenig@suse.demkoenig@suse.dehare@suse.demkoenig@suse.demkoenig@suse.demkoenig@suse.demkoenig@suse.delnussel@suse.delnussel@suse.delnussel@suse.demkoenig@suse.delnussel@suse.delnussel@suse.delnussel@suse.demkoenig@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.demkoenig@suse.dedmueller@suse.delnussel@suse.demkoenig@suse.demkoenig@suse.dehvogel@suse.de- boot.crypto: * /lib/udev/vol_id no longer exists, use blkid instead * add space at end of password prompt in initrd * fix autodetetection of root on LVM on LUKS (bnc#528474)- boot.crypto: more changes as agreed with the Debian maintainer: * rename keyscript variable CRYPTTAB_DEVICE to CRYPTTAB_SOURCE * export list of options in CRYPTTAB_OPTIONS- replace patch that quits on EOF with upstream version- actually hash=plain can be used to get raw keyscript output so remove keyscript_raw again- boot.crypto: * don't use hashalot if keyfile is specified * to comply with Debian, keyscripts must only output the password. In order to allow keyscript to use different methods to retrieve a key, add a keyscript_rawkey option. - cryptsetup: * When reading no single byte for the key abort.- boot.crypto: * fix test for keyfile (bnc#540363)- boot.crypto: * 2.6.31 requires the cryptomgr module in the initrd (bnc#535013)- boot.crypto: * uppercase variables exported to keyscript in anticipation of Debian adopting the implementation- boot.crypto: * fix setting options without parameter * infinite retries in initrd * tries=0 means infinite tries * implement retries in the script to make it work with keyscripts and non-luks volumes * keyscript support (fate#302628) * remove the option to fsck the fs as it actually never worked * fix initrd option parsing- new cryptsetup version 1.0.7 * Allow removal of last slot in luksRemoveKey and luksKillSlot. * Reject unsupported --offset and --skip options for luksFormat and update man page. * Various man page fixes. * Set UUID in device-mapper for LUKS devices. * Retain readahead of underlying device. * Display device name when asking for password. * Check device size when loading LUKS header. Remove misleading error message later. * Add error hint if dm-crypt mapping failed. * Use better error messages if device doesn't exist or is already used by other mapping. * Fix make distcheck. * Check if all slots are full during luksAddKey. * Fix segfault in set_error. * Code cleanups, remove precompiled pot files, remove unnecessary files from po directory * Fix uninitialized return value variable in setup.c. * Code cleanups. (thanks to Ivan Stankovic) * Fix wrong output for remaining key at key deletion. * Allow deletion of key slot while other keys have the same key information. * Add missing AM_PROG_CC_C_O to configure.in * Remove duplicate sentence in man page. * Wipe start of device (possible fs signature) before LUKS-formatting. * Do not process configure.in in hidden directories. * Return more descriptive error in case of IO or header format error. * Use remapping to error target instead of calling udevsettle for temporary crypt device. * Check device mapper communication and warn user if device-mapper support missing in kernel. * Fix signal handler to properly close device. * write_lseek_blockwise: declare innerCount outside the if block. * add -Wall to the default CFLAGS. fix some signedness issues. * Error handling improvement. * Add non-exclusive override to interface definition. * Refactor key slot selection into keyslot_from_option.- boot.crypto: * set infinite timeout during 2nd stage (bnc#456004)- boot.crypto: * wait for device before calling luksOpen (bnc#521446)- fix link order- fix compile with glibc 2.10- boot.crypto: * resolve symlinks when searching for loop devices (bnc#490170) * add extra man page tags to avoid FIXME output of docbook * don't pipe password if there's only one device to open * update copyright information * fix spelling and actually stop in pre_stop_hook * introduce initrd option in crypttab (bnc#465711)- boot.crypto: * print dm name instead of physdev (bnc#456664) * make prompt work with infinite timeout (bnc#466405) * implement pre-stop hook (bnc#481870) * remove hardcoded loop device number limit (bnc#481872) * Warn if using a non-absolute path for physdev in crypttab - hashalot: compute hash of empty passphrase if not interactive (bnc#475135)- fix boot.crypto doesn't care on tries flag in crypttab (bnc#480741) - mkinitrd scripts now included in boot.crypto git- Fix segfault with oversized hashes (bnc #476290).- Fixed initrd LUKS password annoyance in mkinitrd-boot.sh and mkinitrd-setup.sh when the same password is used for all partitions. In this case the password is now only asked once (bnc#465711).- Fix LUKS root partition residing on a soft raid (bnc#358341)- boot.crypto-early: explicitly start before boot.localfs- branch off shlib to subpackage libcryptsetup0 - rename cryptsetup-devel to libcryptsetup-devel- Call mkinitrd_setup during %post and %postun (bnc#413709)- enable SELinux support (fate#303662)- boot.crypto: * Fix init script tags- boot.crypto: * Provide some reasonable exit status (bnc#409502)- Include mkinitrd scriptlets.- use /sbin/udevadm settle instead of /sbin/udevsettle (bnc#404875)- load loop module in boot.crypto-early as it might be needed. It is previously initially loaded by boot.localfs.- add support for boot.crypto-early (bnc#355824) needed to encrypt block devices for usage with LVM or MD adds a new option 'noearly' for crypttab, which will skip the device in boot.crypto-early.- update to svn revision 46: * fix out of bound for key index in delKey (bnc#360041) * Add typo fixes to the cryptsetup.8 manpage * Add key-slot patch * Remove O_EXCL requirement for certain LUKS operations * mention luksKillSlot in the manpage- boot.crypto: * check for columns of terminal (bnc#337614) * enhance crypttab manpage (bnc#351061) * check for fs_passno (bnc#345339)- upgrade to svn revision 42 which includes previous patches - boot.crypto: * don't mount read-only as safety check (bnc#345338) * implement precheck scripts * allow restarting of single volumes (bnc#345605) * status query of individual devices (bnc#345605) * add vol_id check script * maintain boot.crypto stuff in revision control and use tarball snapshots of it- upgrade to svn revision 38- add %fillup_prereq and %insserv_prereq to PreReq- upgrade to svn revision 31 * Rename luksDelKey into luksKillSlot * Add luksRemoveKey that queries a given key before removal * Fix segfault in luksOpen. * Add LUKS_device_ready check for most LUKS calls, so that cryptsetup dies before password querying in case a blockdev is unavailable * For LUKS key material access require exclusive access to the underlying device. This will prevent multiple mappings onto a single LUKS device. dm*crypt doesn't feature any syncing capabilities, hence there is no real application for this as it will likely lead to disk corruption. * Add signal handler to keyencryption to free the temporary mapping in case the user hits ctrl-c.- remove /var/run/keymap from previous boot to make /etc/init.d/kbd work (#296409)- run fsck with progressbar (#304750)- run udevsettle to avoid problems with busy temporary device mapper devices [#285478]- rephrase error message (#279169)- rename util-linux-crypto to cryptsetup - remove dmconvert - replace svn snapshot with official 1.0.5 release - don't enable boot.crypto by default- fix segfault when trying to open a non existing device - fix gcc warnings - add Short-Description to boot.crypto - use %find_lang- boot.crypto: implement 'status' - boot.crypto: accept argument to start/stop single devices- hashalot: add timeout option- fix build- boot.crypto: switch off splash screen only when needed - boot.crypto: report status for individual volumes instead of using one global exit status - hashalot: exit unsucessfully on empty passphrase- boot.crypto: sleep a bit longer before overwriting the prompt - boot.crypto: add support for pseed and itercountk options - boot.crypto: skip entries with unsupported/unknown options - hashalot: add support for itercountk- upgrade cryptsetup to current svn revision 30 which includes previous patches. - fix background prompt process not getting killed on ctrl-d in boot.crypto- upgrade cryptsetup to current svn revision 26. Does no longer hang when a file is specified instead of a device. - remove obsolete cryptsetup.sh script - boot.crypto: * drop support for cryptoloop, use cryptsetup also for cryptotab * refactor code and create reusable components for use in cryptotab and crypttab code path * run sulogin only during boot if fsck failed * support crypttab's 'tries' option - add crypttab manpage based on Debian one- add boot.crypto (#257884) - add crypttab and cryptotab as %ghost to filelist- move devel .so link to %{libdir} - run ldconfig, since we have now a shared lib installed- cryptsetup can now link shared since libpopt is no longer under /usr- add patch to support old loop_fish2 key hash method- update cryptsetup to version 1.0.4: * added terminal timeout rewrite * allow user selection of key slot * reading binary keys from stdin using the "-" as key file * fix 64 bit compiler warning issues. * fix getline problem for 64-bit archs.- fix build failure due to missing pthreads- use the LUKS version of cryptsetup - split -devel subpackage for libcryptsetup - remove patches because they are in the new cryptsetup * cryptsetup-0.1-static.patch * cryptsetup-0.1-retval.patch * cryptsetup-0.1-dmi.exists.patch * cryptsetup-0.1-timeout.patch - use man page from the new cryptsetupcryptsetup-develbuild24 1255977261FF1.0.71.0.7-10.11.0.7-10.11.0.7libcryptsetup.hlibcryptsetup.so/usr/include//usr/lib64/-fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.2/standard/ed3b38b8c2f9ff7a066b8e363cfb36df-cryptsetupcpiolzma2x86_64-suse-linuxۑ`V4':4;?] b2sT{XTMtV5i& u, |!qY&&m(?j|R/ݘ>rna {B TY&h3[ױ8J)8 SpW ҸG}OfvRȂ@!9Ƹ ]MC9)Z\Qb?J:zqBJ{ jN &wX4xeΣS{oRHdw"^n.,N9v 3F9(0GD?DF>=4ׄұ & X5Nɯl҂G\~2O7ɸ4d5,-!|T*q`dfY x&kˌ:bsޠe(WB|ID]q㦳qCB( ^svA~=)v詆7q| 61^T?@!i6rsX%Pv(rN&5? K|- !;T :=Zn3Q6 ;̔#G7~Bwe[ +GכIvO>ݺ?#3p|2\0/TdIzwHEIu׳W l#9R[lg4; @Cj! W! 3sXQ4?VwnĎBl_)x#Y/1+GO vGcC m/8^zX