Back to cryptsetup PTS page

Accepted cryptsetup 2:1.7.2-1 (source amd64) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 05 Oct 2016 20:53:09 +0200
Source: cryptsetup
Binary: cryptsetup cryptsetup-bin libcryptsetup4 libcryptsetup-dev cryptsetup-udeb libcryptsetup4-udeb
Architecture: source amd64
Version: 2:1.7.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>
Changed-By: Jonas Meurer <mejo@debian.org>
Description:
 cryptsetup - disk encryption support - startup scripts
 cryptsetup-bin - disk encryption support - command line tools
 cryptsetup-udeb - disk encryption support - commandline tools (udeb) (udeb)
 libcryptsetup-dev - disk encryption support - development files
 libcryptsetup4 - disk encryption support - shared library
 libcryptsetup4-udeb - disk encryption support - shared library (udeb) (udeb)
Closes: 776409 783393 810227 811456 811545 811559 827263 835158 839352
Changes:
 cryptsetup (2:1.7.2-1) unstable; urgency=medium
 .
   [ Jonas Meurer ]
   * new upstream release 1.7.2. Highlights include:
     - code now uses kernel crypto API backend according to new changes
       introduced in mainline kernel. (in 1.7.1)
     - cryptsetup now allows special "-" (standard input) keyfile handling
       even for TCRYPT (TrueCrypt and VeraCrypt compatible) devices. (in 1.7.1)
     - Support activation options for error handling modes in Linux kernel
       dm-verity module. (in 1.7.2)
   * debian/cryptdisks.functions: use '--key-file=-' again with the tcrypt
     extension, now that upstream issue #269 is fixed.
   * migrate the packaging repository from SVN to Git:
     - debian/control: Update Vcs-* fields to point to the new git repository.
     - debian/README.source: document new repository structure and release
       handling.
   * debian/README.Debian, debian/NEWS: minor typo fixes.
   * debian/rules: run pod2man --release="$(DEB_VERSION). (Closes: #839352)
 .
   [ Guilhem Moulin ]
   * debian/control: add self to uploaders.
   * debian/cryptdisks.functions: when iterating through the crypttab, don't
     abort after the first disk that fails to be closed.  Regression introduced
     2:1.7.0-1 when the filed is sourced under 'set -e'.
   * debian/cryptdisks.functions: stop using `seq` since cryptsetup doesn't
     depend on busybox.  Instead, try again after 1, 2, 4, 8 and 16s when an
     encrypted disk cannot be closed. (Closes: #811456)
   * debian/cryptsetup.maintscript: add a "rm_conffile" directive to remove
     conffile /etc/bash_completion.d/cryptdisks, obsolete since 2:1.7.0-1.
     (Closes: #810227)
   * debian/README.initramfs: fix typo s/initramfs-update/update-initramfs/.
     Thanks, Stuart Prescott. (Closes: #827263)
   * debian/rules: Add 'hardening=+pie' to DEB_BUILD_MAINT_OPTIONS to compile
     ELF executables as PIEs.
   * debian/control: Bump Standards-Version to 3.9.8 (no changes necessary).
   * debian/cryptsetup.lintian-overrides: Remove unused lintian override
     init.d-script-does-not-source-init-functions.
   * Use /etc/crytsetup-initramfs/conf-hook for initramfs hook script
     configuration.  For backward compatibility setting CRYPTSETUP and
     KEYFILE_PATTERN in /etc/initramfs-tools/initramfs.conf is still supported
     for now, but causes the hook to print a warning.
     This is done following the initramfs-tools maintainers' request (see
     #807527) that hook and boot script configuration files be stored outside
     the /etc/initramfs-tools directory. (Closes: #783393)
   * Print a warning when private key material is to be included in the
     initramfs image (ie, if $KEYFILE_PATTERN is not empty), and the image is
     created with a permissive mode.
   * Add Indonesian debconf templates translation.  Thanks, Izharul Haq for the
     patch. (Closes: #835158)
   * debian/initramfs/cryptroot-hook: Avoid leading space in $rootdevs,
     $resumedevs, etc.
   * Support unlocking devices at initramfs stage using a key file stored on
     the encrypted root FS.  Note however that resume devices won't be unlocked
     this way since the resume boot script is currently run before mounting the
     root FS. (Closes: #776409)
   * debian/initramfs/cryptroot-hook: Avoid undesired effects for target or
     device names containing non-alphanumeric characters such as "." or "-":
     + replace `grep "^$x\b"` by `awk -vx="$x" '$1==x {print}'`; and
     + replace `echo "$x"` by printf '%s' "$x" when the argument might start
       with a dash.
   * debian/initramfs/cryptroot-{hook,script}, debian/cryptdisks.functions:
     ensure slash characters "/" from device labels are escaped when
     constructing symlinks under /dev/disk/by-label.
   * debian/scripts/decrypt_gnupg:
     + Remove --no-mdc-warning to display a warning if the MDC integrity
       protection is missing.
     + Replace "GnuPG key" by "gpg-encrypted key" in messages and
       documentation.
   * debian/initramfs/cryptgnupg-hook: Add support for multiple devices
     encrypted using a gpg-encrypted key.
   * debian/README.gnupg: Indicate that not the only the gpg-encrypted key for
     the root FS is copied onto the initramfs, but also the ones for all
     devices that need to be unlocked at initramfs stage.
   * debian/initramfs/cryptroot-hook: Fix bug for device label starting with
     "UUID=".
 .
   [ Helmut Grohne ]
   * libcryptsetup-dev: move the .pc file to a multiarch location such that
     cross-pkg-config can find it. (closes: #811545)
   * Fix FTCBFS: Use host arch compiler for askpass as well. (closes: #811559)
Checksums-Sha1:
 a16b1e31746a64104dd84eec91cf52d3cac74573 2651 cryptsetup_1.7.2-1.dsc
 86bd478c2654e81e072a82fd1ba3ee206654b131 1089312 cryptsetup_1.7.2.orig.tar.gz
 4f6b69cb1b5e95f84403b310a27591165715e0da 87368 cryptsetup_1.7.2-1.debian.tar.xz
 938dc8d15212a7db6e1ceb90ef17fc6b7ee3be03 112704 cryptsetup-bin-dbgsym_1.7.2-1_amd64.deb
 d60213ab8fee7176c603904f490a339d1702f6f9 214394 cryptsetup-bin_1.7.2-1_amd64.deb
 ea7eb1389f793760d17ae7982c0905e0fd01c69e 17066 cryptsetup-dbgsym_1.7.2-1_amd64.deb
 6b242146ef8f05af5025d25b37fc23a662db2487 38898 cryptsetup-udeb_1.7.2-1_amd64.udeb
 59ab5be944537a01e0882f91517386cf5882c1ce 168166 cryptsetup_1.7.2-1_amd64.deb
 ae3a14cfeb624a7c6c2120b1d6e834d98e3a1cc4 52706 libcryptsetup-dev_1.7.2-1_amd64.deb
 f2a107cbc87836ffd98880f4a775700235b92b56 174826 libcryptsetup4-dbgsym_1.7.2-1_amd64.deb
 2cf0a2b8a277e7d02365f171c571786d3e29cec0 65778 libcryptsetup4-udeb_1.7.2-1_amd64.udeb
 d520f7d25609e4720cdc2886b547faddfca2fa8f 106430 libcryptsetup4_1.7.2-1_amd64.deb
Checksums-Sha256:
 fb70de4cc25ebc8e12fbf74cd33de8ff553a3943124f1624d517107f7a2f143c 2651 cryptsetup_1.7.2-1.dsc
 28583176e3858795042f5aafe93afe8aea8b8c787c958fe3343cb1ce66074504 1089312 cryptsetup_1.7.2.orig.tar.gz
 efbf3560ebc58eb376f128a4567b67b21bda2947294fb644ad7707954826e401 87368 cryptsetup_1.7.2-1.debian.tar.xz
 8dbf94421708686fdfdbd9c02a4061a52893749d58977fd4c676f1463a62a8cb 112704 cryptsetup-bin-dbgsym_1.7.2-1_amd64.deb
 caa64a59fa57a7db7a25479e75058cbdc704b4e64eae8f74e665491cd8cdf313 214394 cryptsetup-bin_1.7.2-1_amd64.deb
 49ca8004151c547b860164a9f2ae1158ac8226c0a316fa4850c370b3694da4a1 17066 cryptsetup-dbgsym_1.7.2-1_amd64.deb
 62fcb6287fd114914feadb7c8f6f09c11ba6b151aca7277946aa259035c1c1cc 38898 cryptsetup-udeb_1.7.2-1_amd64.udeb
 ad0946ff746b30262226cd3a0f02eae9bab7f065a17ca9b30c752d2ebe6b5a23 168166 cryptsetup_1.7.2-1_amd64.deb
 eb4ab8671a180f9e628b1797298529e984eb92d2885845e0edbad14473564da3 52706 libcryptsetup-dev_1.7.2-1_amd64.deb
 4da6b445438e7460ff6e077198eaa1f168d5bde328844cecb91cbc47b653987f 174826 libcryptsetup4-dbgsym_1.7.2-1_amd64.deb
 6423a882ee2784121a8ad51b8b16aa058b239d689604046577ca8777ced960c4 65778 libcryptsetup4-udeb_1.7.2-1_amd64.udeb
 95f44525220e8b3c3fb0830955f1f37255888a0cce322903857bf0aa6fce786b 106430 libcryptsetup4_1.7.2-1_amd64.deb
Files:
 6376f3258704fd57aa0d55c4fd471790 2651 admin optional cryptsetup_1.7.2-1.dsc
 32a0f219751365019150e1eeb668e105 1089312 admin optional cryptsetup_1.7.2.orig.tar.gz
 f836d72cb54ffbc51ea4b982bf2fdeca 87368 admin optional cryptsetup_1.7.2-1.debian.tar.xz
 aa764defb06aa6582c03a8c4544a8c39 112704 debug extra cryptsetup-bin-dbgsym_1.7.2-1_amd64.deb
 54ffe4a6cc20ea3b8ceb3b25a3e4d123 214394 admin optional cryptsetup-bin_1.7.2-1_amd64.deb
 a59eb6ffe0ee032c6a159f69714fd7a3 17066 debug extra cryptsetup-dbgsym_1.7.2-1_amd64.deb
 7302cc6811c9ac884e66075d9a49f5d3 38898 debian-installer optional cryptsetup-udeb_1.7.2-1_amd64.udeb
 712b78bc2a4d3d6bb2acd3cce88c69f2 168166 admin optional cryptsetup_1.7.2-1_amd64.deb
 1fdec4b333e52daa1bf1d97d482d88a0 52706 libdevel optional libcryptsetup-dev_1.7.2-1_amd64.deb
 d17072ababfcc87af4ffdab4b8e57d84 174826 debug extra libcryptsetup4-dbgsym_1.7.2-1_amd64.deb
 607d370a20f9e8a3af9019776d758cf4 65778 debian-installer optional libcryptsetup4-udeb_1.7.2-1_amd64.udeb
 7ec3e48183ccc4120efb9f4dca90b33d 106430 libs optional libcryptsetup4_1.7.2-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=KV5a
-----END PGP SIGNATURE-----