-
fcf7824b · tests: legacy reencrypt tests
- ... and 4 more commits. Compare fd351abc...fcf7824b
-
de2f07b8 · Do not try to load LUKS2 header if backup_file is LUKS1.
-
fd351abc · Do not try to load LUKS2 header if backup_file is LUKS1.
-
30a42bfd · tests: legacy reencrypt tests
- ... and 6 more commits. Compare a72ac7b7...30a42bfd
-
cc5c9115 · Do not allow resize if device size is not aligned to sector size.
-
8dc35a79 · Enable to use system libargon2.
- ... and 1 more commit. Compare 59e6b33c...8dc35a79
I have implemented --enable-libargon2 option (for now in wip-luks2), see https://gitlab.com/cryptsetup/cryptsetup/commit/a72ac7b720055703b7c2490139...
If there is a reason, bundling library make sense....
-
82ceb61b · Do not allow resize if device size is not aligned to sector size.
LUKS2 can define encryption per-slot. We still use compatible keyslot digest, but in LUKS2 in now stores the full hash length (except when converte...
Unaligned keyslots in fact help to AF to fucntion. We will not support old AF with anything different than 4000 stripes, I hope one day there we wi...
We have two copies of visible metadata now in LUKS2. It still does not cover keyslot binary data, but that need some new algorithm that combines fo...
Cryptsetup2 (LUSK2) now have Argon2i/Argon2id support, please try it....