Package: cryptsetup; Maintainer for cryptsetup is Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>; Source for cryptsetup is src:cryptsetup (PTS, buildd, popcon).
Reported by: Adam Lee <adam8157@gmail.com>
Date: Tue, 1 May 2012 12:54:01 UTC
Severity: wishlist
Found in version cryptsetup/2:1.4.1-3
Fixed in version cryptsetup/2:1.4.3-3
Done: Jonas Meurer <mejo@debian.org>
Bug is archived. No further changes may be made.
View this report as an mbox folder, status mbox, maintainer mbox
Report forwarded
to debian-bugs-dist@lists.debian.org, adam8157@gmail.com, Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>:
Bug#671037; Package cryptsetup.
(Tue, 01 May 2012 12:54:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Adam Lee <adam8157@gmail.com>:
New Bug report received and forwarded. Copy sent to adam8157@gmail.com, Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>.
(Tue, 01 May 2012 12:54:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: cryptsetup Version: 2:1.4.1-3 Severity: important Hi, I use LVM over LUKS, I got the warning below when I run `update-initramfs -u` after the target name changed. cryptsetup: WARNING: invalid line in /etc/crypttab for sys - cryptsetup: WARNING: invalid line in /etc/crypttab for sys - And reboot failed(BTW, `ln -s /dev/dm-0 /dev/mapper/NEWNAME` dosen't work). Yes, I found a way(by which I changed the name from sda2_crypt to sys and successfully boot): 0, enter another system(like livecd) 1, luksOpen with the new name, change the target name to the new one 2, chroot into it(now, the living target name is the same as it in conf) 3, update-initramfs -u 4, reboot IMO, the func "add_device" in /usr/share/initramfs-tools/hooks/cryptroot should not get root options from target, it should get those options from source. -- Package-specific info: -- /proc/cmdline BOOT_IMAGE=/vmlinuz-3.2.0-2-amd64 root=/dev/mapper/sys-root ro quiet -- /etc/crypttab # <target name> <source device> <key file> <options> sys /dev/sda2 none luks -- /etc/fstab # /etc/fstab: static file system information. # # Use 'blkid' to print the universally unique identifier for a # device; this may be used with UUID= as a more robust way to name devices # that works even if disks are added and removed. See fstab(5). # # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc defaults 0 0 /dev/sda1 /boot ext4 defaults 0 2 /dev/mapper/sys-swap none swap sw 0 0 /dev/mapper/sys-root / ext4 errors=remount-ro 0 1 /dev/mapper/sys-home /home ext4 defaults 0 2 /dev/scd0 /media/cdrom0 udf,iso9660 user,noauto 0 0 -- lsmod Module Size Used by pci_stub 12429 1 vboxpci 19066 0 vboxnetadp 13155 0 vboxnetflt 23571 0 vboxdrv 190057 3 vboxnetflt,vboxnetadp,vboxpci tun 18337 2 fuse 61981 1 nfsd 211858 2 nfs 312191 0 nfs_acl 12511 2 nfs,nfsd auth_rpcgss 37143 2 nfs,nfsd fscache 36739 1 nfs lockd 67328 2 nfs,nfsd sunrpc 173671 6 lockd,auth_rpcgss,nfs_acl,nfs,nfsd cpufreq_conservative 13147 4 acpi_cpufreq 12935 1 mperf 12453 1 acpi_cpufreq loop 22641 0 firewire_sbp2 17993 0 snd_hda_codec_hdmi 30783 4 arc4 12458 2 snd_hda_codec_conexant 45199 1 iwlwifi 166657 0 snd_hda_intel 26345 1 snd_hda_codec 78031 3 snd_hda_intel,snd_hda_codec_conexant,snd_hda_codec_hdmi snd_hwdep 13186 1 snd_hda_codec snd_pcm_oss 41081 0 mac80211 192768 1 iwlwifi snd_mixer_oss 17916 2 snd_pcm_oss snd_pcm 63900 4 snd_pcm_oss,snd_hda_codec,snd_hda_intel,snd_hda_codec_hdmi snd_page_alloc 13003 2 snd_pcm,snd_hda_intel snd_seq_midi 12848 0 snd_seq_midi_event 13316 1 snd_seq_midi cfg80211 137140 2 mac80211,iwlwifi snd_rawmidi 23060 1 snd_seq_midi joydev 17266 0 thinkpad_acpi 61270 0 snd_seq 45093 2 snd_seq_midi_event,snd_seq_midi iTCO_wdt 17081 0 nouveau 545197 2 ttm 48725 1 nouveau drm_kms_helper 27227 1 nouveau drm 167670 4 drm_kms_helper,ttm,nouveau i2c_i801 16870 0 nvram 13049 1 thinkpad_acpi snd_seq_device 13176 3 snd_seq,snd_rawmidi,snd_seq_midi rfkill 19012 2 thinkpad_acpi,cfg80211 snd_timer 22917 2 snd_seq,snd_pcm i2c_algo_bit 12841 1 nouveau snd 52850 13 snd_timer,snd_seq_device,snd_seq,thinkpad_acpi,snd_rawmidi,snd_pcm,snd_mixer_oss,snd_pcm_oss,snd_hwdep,snd_hda_codec,snd_hda_intel,snd_hda_codec_conexant,snd_hda_codec_hdmi i2c_core 23876 5 i2c_algo_bit,i2c_i801,drm,drm_kms_helper,nouveau tpm_tis 17454 0 tpm 17862 1 tpm_tis psmouse 64455 0 iTCO_vendor_support 12704 1 iTCO_wdt intel_ips 17603 0 soundcore 13065 2 snd mxm_wmi 12473 1 nouveau wmi 13243 1 mxm_wmi tpm_bios 12948 1 tpm serio_raw 12931 0 evdev 17562 17 pcspkr 12579 0 battery 13109 0 button 12937 1 nouveau video 17628 1 nouveau ac 12624 0 processor 28106 1 acpi_cpufreq power_supply 13475 2 ac,battery ext4 350411 3 crc16 12343 1 ext4 jbd2 62015 1 ext4 mbcache 13065 1 ext4 sha256_generic 16797 2 aesni_intel 50667 13 cryptd 14517 5 aesni_intel aes_x86_64 16796 1 aesni_intel aes_generic 33026 2 aes_x86_64,aesni_intel cbc 12754 0 dm_crypt 22586 1 dm_mod 63545 12 dm_crypt sr_mod 21899 0 sd_mod 36136 3 cdrom 35401 1 sr_mod crc_t10dif 12348 1 sd_mod sdhci_pci 17976 0 sdhci 27053 1 sdhci_pci mmc_core 72460 2 sdhci,sdhci_pci ahci 24997 2 libahci 22860 1 ahci firewire_ohci 35772 0 ehci_hcd 40215 0 firewire_core 48407 2 firewire_ohci,firewire_sbp2 e1000e 124918 0 thermal 17383 0 thermal_sys 18040 3 thermal,processor,video crc_itu_t 12347 1 firewire_core libata 140589 2 libahci,ahci scsi_mod 162458 4 libata,sd_mod,sr_mod,firewire_sbp2 usbcore 128498 2 ehci_hcd usb_common 12354 1 usbcore -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages cryptsetup depends on: ii debconf [debconf-2.0] 1.5.42 ii dmsetup 2:1.02.67-2 ii libc6 2.13-31 ii libcryptsetup4 2:1.4.1-3 ii libpopt0 1.16-3 cryptsetup recommends no packages. Versions of packages cryptsetup suggests: ii busybox 1:1.19.3-7 ii dosfstools 3.0.12-1 ii initramfs-tools [linux-initramfs-tool] 0.102 ii liblocale-gettext-perl 1.05-7+b1 ii udev 175-3.1 -- debconf information: cryptsetup/prerm_active_mappings: true
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>:
Bug#671037; Package cryptsetup.
(Fri, 08 Jun 2012 11:09:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Jonas Meurer <jonas@freesources.org>:
Extra info received and forwarded to list. Copy sent to Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>.
(Fri, 08 Jun 2012 11:09:52 GMT) (full text, mbox, link).
Message #10 received at 671037@bugs.debian.org (full text, mbox, reply):
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 severity 671037 wishlist thanks Hey Adam, you're right, there's no easy way to rename the target name of your encrypted rootfs without breaking initramfs stuff. Unfortunately there's no easy way to implement support for it either. The function add_device() in cryptroot initramfs hook script uses the target name for a reason, only target device is available from /etc/fstab. And one could as well argument the other way around: currently it's easier to change the source device after moving to another disk/partition, that would be more complicated if the source device was source for information in add_device(). To be honest, I don't consider renaming target name a important feature. Feel free to provide patches that implement support for it if you disagree. Another option would be to document the limitation and your workaround in README.Debian. What do you think about that? Regards, jonas Am 01.05.2012 14:51, schrieb Adam Lee: > Package: cryptsetup Version: 2:1.4.1-3 Severity: important > > Hi, > > I use LVM over LUKS, I got the warning below when I run > `update-initramfs -u` after the target name changed. > > cryptsetup: WARNING: invalid line in /etc/crypttab for sys - > cryptsetup: WARNING: invalid line in /etc/crypttab for sys - > > And reboot failed(BTW, `ln -s /dev/dm-0 /dev/mapper/NEWNAME` > dosen't work). > > Yes, I found a way(by which I changed the name from sda2_crypt to > sys and successfully boot): > > 0, enter another system(like livecd) 1, luksOpen with the new name, > change the target name to the new one 2, chroot into it(now, the > living target name is the same as it in conf) 3, update-initramfs > -u 4, reboot > > IMO, the func "add_device" in > /usr/share/initramfs-tools/hooks/cryptroot should not get root > options from target, it should get those options from source. > > > -- Package-specific info: -- /proc/cmdline > BOOT_IMAGE=/vmlinuz-3.2.0-2-amd64 root=/dev/mapper/sys-root ro > quiet > > -- /etc/crypttab # <target name> <source device> <key file> > <options> sys /dev/sda2 none luks > > -- /etc/fstab # /etc/fstab: static file system information. # # Use > 'blkid' to print the universally unique identifier for a # device; > this may be used with UUID= as a more robust way to name devices # > that works even if disks are added and removed. See fstab(5). # # > <file system> <mount point> <type> <options> <dump> > <pass> proc /proc proc defaults 0 > 0 /dev/sda1 /boot ext4 defaults 0 > 2 /dev/mapper/sys-swap none swap sw 0 > 0 /dev/mapper/sys-root / ext4 errors=remount-ro 0 > 1 /dev/mapper/sys-home /home ext4 defaults 0 > 2 /dev/scd0 /media/cdrom0 udf,iso9660 user,noauto 0 > 0 > > -- lsmod Module Size Used by pci_stub > 12429 1 vboxpci 19066 0 vboxnetadp > 13155 0 vboxnetflt 23571 0 vboxdrv > 190057 3 vboxnetflt,vboxnetadp,vboxpci tun > 18337 2 fuse 61981 1 nfsd > 211858 2 nfs 312191 0 nfs_acl > 12511 2 nfs,nfsd auth_rpcgss 37143 2 nfs,nfsd fscache > 36739 1 nfs lockd 67328 2 nfs,nfsd sunrpc > 173671 6 lockd,auth_rpcgss,nfs_acl,nfs,nfsd cpufreq_conservative > 13147 4 acpi_cpufreq 12935 1 mperf > 12453 1 acpi_cpufreq loop 22641 0 firewire_sbp2 > 17993 0 snd_hda_codec_hdmi 30783 4 arc4 > 12458 2 snd_hda_codec_conexant 45199 1 iwlwifi > 166657 0 snd_hda_intel 26345 1 snd_hda_codec > 78031 3 snd_hda_intel,snd_hda_codec_conexant,snd_hda_codec_hdmi > snd_hwdep 13186 1 snd_hda_codec snd_pcm_oss > 41081 0 mac80211 192768 1 iwlwifi snd_mixer_oss > 17916 2 snd_pcm_oss snd_pcm 63900 4 > snd_pcm_oss,snd_hda_codec,snd_hda_intel,snd_hda_codec_hdmi > snd_page_alloc 13003 2 snd_pcm,snd_hda_intel snd_seq_midi > 12848 0 snd_seq_midi_event 13316 1 snd_seq_midi cfg80211 > 137140 2 mac80211,iwlwifi snd_rawmidi 23060 1 > snd_seq_midi joydev 17266 0 thinkpad_acpi > 61270 0 snd_seq 45093 2 > snd_seq_midi_event,snd_seq_midi iTCO_wdt 17081 0 > nouveau 545197 2 ttm 48725 1 > nouveau drm_kms_helper 27227 1 nouveau drm > 167670 4 drm_kms_helper,ttm,nouveau i2c_i801 16870 > 0 nvram 13049 1 thinkpad_acpi snd_seq_device > 13176 3 snd_seq,snd_rawmidi,snd_seq_midi rfkill > 19012 2 thinkpad_acpi,cfg80211 snd_timer 22917 2 > snd_seq,snd_pcm i2c_algo_bit 12841 1 nouveau snd > 52850 13 > snd_timer,snd_seq_device,snd_seq,thinkpad_acpi,snd_rawmidi,snd_pcm,snd_mixer_oss,snd_pcm_oss,snd_hwdep,snd_hda_codec,snd_hda_intel,snd_hda_codec_conexant,snd_hda_codec_hdmi > > i2c_core 23876 5 i2c_algo_bit,i2c_i801,drm,drm_kms_helper,nouveau > tpm_tis 17454 0 tpm 17862 1 > tpm_tis psmouse 64455 0 iTCO_vendor_support > 12704 1 iTCO_wdt intel_ips 17603 0 soundcore > 13065 2 snd mxm_wmi 12473 1 nouveau wmi > 13243 1 mxm_wmi tpm_bios 12948 1 tpm serio_raw > 12931 0 evdev 17562 17 pcspkr > 12579 0 battery 13109 0 button > 12937 1 nouveau video 17628 1 nouveau ac > 12624 0 processor 28106 1 acpi_cpufreq power_supply > 13475 2 ac,battery ext4 350411 3 crc16 > 12343 1 ext4 jbd2 62015 1 ext4 mbcache > 13065 1 ext4 sha256_generic 16797 2 aesni_intel > 50667 13 cryptd 14517 5 aesni_intel aes_x86_64 > 16796 1 aesni_intel aes_generic 33026 2 > aes_x86_64,aesni_intel cbc 12754 0 dm_crypt > 22586 1 dm_mod 63545 12 dm_crypt sr_mod > 21899 0 sd_mod 36136 3 cdrom > 35401 1 sr_mod crc_t10dif 12348 1 sd_mod sdhci_pci > 17976 0 sdhci 27053 1 sdhci_pci mmc_core > 72460 2 sdhci,sdhci_pci ahci 24997 2 libahci > 22860 1 ahci firewire_ohci 35772 0 ehci_hcd > 40215 0 firewire_core 48407 2 > firewire_ohci,firewire_sbp2 e1000e 124918 0 thermal > 17383 0 thermal_sys 18040 3 thermal,processor,video > crc_itu_t 12347 1 firewire_core libata > 140589 2 libahci,ahci scsi_mod 162458 4 > libata,sd_mod,sr_mod,firewire_sbp2 usbcore 128498 2 > ehci_hcd usb_common 12354 1 usbcore > > > -- System Information: Debian Release: wheezy/sid APT prefers > unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, > 'experimental') Architecture: amd64 (x86_64) > > Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores) Locale: > LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: > /bin/sh linked to /bin/dash > > Versions of packages cryptsetup depends on: ii debconf > [debconf-2.0] 1.5.42 ii dmsetup 2:1.02.67-2 ii > libc6 2.13-31 ii libcryptsetup4 > 2:1.4.1-3 ii libpopt0 1.16-3 > > cryptsetup recommends no packages. > > Versions of packages cryptsetup suggests: ii busybox > 1:1.19.3-7 ii dosfstools 3.0.12-1 ii > initramfs-tools [linux-initramfs-tool] 0.102 ii > liblocale-gettext-perl 1.05-7+b1 ii udev > 175-3.1 > > -- debconf information: cryptsetup/prerm_active_mappings: true > > > > _______________________________________________ > pkg-cryptsetup-devel mailing list > pkg-cryptsetup-devel@lists.alioth.debian.org > http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-cryptsetup-devel > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJP0c2OAAoJEFJi5/9JEEn+fywQAL7oJv/m/wJdWCLP6yqpL3M5 TCl1okK+MTqr08emxfZkLOSIK5dvd2tWBOWdDsM4/jhdvDdMxlX1BTJIYAlesO5y DvClMemBhxJRdtQ3b83smV8Xm9e78ZH4FvqvqNuNDwY/gx7OmAXAtCos9DFeaBZA KVJSm/7WhFZ61gRAiL/KTTRtSYqpTLwavXUuiwR1oYmJNGH9BEz/rnMQH6RgWEox g/4L4UFpVGjWpr/A+wyEAgKrtOYNtNYHoofTingzqy9smfwd1WzYEWvlYMfw2/MD W53AYY2rqwrDE0F2tb7rUTSwtKEFiC/BPFVBpo+NiADdWuHxfSlR7rrdmwTzKvnG GQp2GooPMRdMtP+ply2yM2GU+iYG1lYbqY8UMUAB6pBQCM330csd16Zi8sW/diIw aL4tmLP5lfmp7VGT5ox5212aYx8Zol54+/GTbFYw5bCX4b2AFzs6xV5gYuCAyhBv Am1pF+WWfQbopne87PqiCH9uW40TNYs1oBgLLMGpQTwXBSm+fYTmddojl2UNQRJD VUtJ89bZfmnWhsHeveeX9DRWb3+J5XKzylSiShxixBnrrK30tgQegtylNfqLChEs EzMHjxzMyiLQAq1cibo2aeqdRYyaOgfYeV60bNhAfTIfWaWfIJ+G5+cE60Ia/S5/ M5xM/Vwp6kNgmdV6t7MT =6P5S -----END PGP SIGNATURE-----
Severity set to 'wishlist' from 'important'
Request was from Jonas Meurer <jonas@freesources.org>
to control@bugs.debian.org.
(Fri, 08 Jun 2012 11:10:12 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>:
Bug#671037; Package cryptsetup.
(Sun, 10 Jun 2012 14:47:52 GMT) (full text, mbox, link).
Acknowledgement sent
to Adam Lee <adam8157@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>.
(Sun, 10 Jun 2012 14:48:24 GMT) (full text, mbox, link).
Message #17 received at 671037@bugs.debian.org (full text, mbox, reply):
On Fri, Jun 08, 2012 at 12:01:59PM +0200, Jonas Meurer wrote: > severity 671037 wishlist > thanks > > Hey Adam, > > you're right, there's no easy way to rename the target name of your > encrypted rootfs without breaking initramfs stuff. Unfortunately > there's no easy way to implement support for it either. > > The function add_device() in cryptroot initramfs hook script uses the > target name for a reason, only target device is available from /etc/fstab. > > And one could as well argument the other way around: currently it's > easier to change the source device after moving to another > disk/partition, that would be more complicated if the source device > was source for information in add_device(). > > To be honest, I don't consider renaming target name a important > feature. Feel free to provide patches that implement support for it if > you disagree. I agree this is not a important feature. Will try to implement. > Another option would be to document the limitation and your workaround > in README.Debian. What do you think about that? My workaround is dangerous, maybe just adding this problem to the know issues of crypttab manpage is better.
Added tag(s) pending.
Request was from Jonas Meurer <mejo@debian.org>
to control@bugs.debian.org.
(Thu, 01 Nov 2012 13:30:13 GMT) (full text, mbox, link).
Reply sent
to Jonas Meurer <mejo@debian.org>:
You have taken responsibility.
(Fri, 02 Nov 2012 11:21:07 GMT) (full text, mbox, link).
Notification sent
to Adam Lee <adam8157@gmail.com>:
Bug acknowledged by developer.
(Fri, 02 Nov 2012 11:21:07 GMT) (full text, mbox, link).
Message #24 received at 671037-close@bugs.debian.org (full text, mbox, reply):
Source: cryptsetup
Source-Version: 2:1.4.3-3
We believe that the bug you reported is fixed in the latest version of
cryptsetup, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 671037@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jonas Meurer <mejo@debian.org> (supplier of updated cryptsetup package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Thu, 01 Nov 2012 15:34:09 +0100
Source: cryptsetup
Binary: cryptsetup cryptsetup-bin libcryptsetup4 libcryptsetup-dev cryptsetup-udeb libcryptsetup4-udeb
Architecture: source amd64
Version: 2:1.4.3-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel@lists.alioth.debian.org>
Changed-By: Jonas Meurer <mejo@debian.org>
Description:
cryptsetup - disk encryption support - startup scripts
cryptsetup-bin - disk encryption support - command line tools
cryptsetup-udeb - disk encryption support - commandline tools (udeb) (udeb)
libcryptsetup-dev - disk encryption support - development files
libcryptsetup4 - disk encryption support - shared library
libcryptsetup4-udeb - disk encryption support - shared library (udeb) (udeb)
Closes: 671037 684086 685762 688786 689722 690784 691517
Changes:
cryptsetup (2:1.4.3-3) unstable; urgency=medium
.
* add recommends for 'kbd, console-setup' to cryptsetup package. Both are
necessary to support local keymap in initramfs. Thanks to Raphaël Hertzog
for the bugreport. (closes: #689722)
* move suggestion for 'initramfs-tools (>= 0.91) | linux-initramfs-tool,
busybox' to recommends. Both are required for encrypted root fs.
* remove suggestion for udev, most debian systems have it installed anyway.
* mention option to use UUID=<luks_uuid> for source device in crypttab(5).
Thanks to Felicitus for the bug report. (closes: #688786)
* add a paragraph in README.initramfs: Describe, why renaming the target
name is not supported for encrypted root devices. Thanks to Adam Lee for
bugreport and proposed workaround for this limitation. (closes: #671037)
* fix keyfile permission checks in cryptdisks init scripts to follow
symlinks. Thanks to intrigeri for the bugreport. (closes: #691517)
* fix owner group check for keyfile in cryptdisks init scripts to really
check owner group.
* update debconf translations:
- brasilian portuguese, thanks to Adriano Rafael Gomes. (closes: #685762)
- japanese, thanks to victory. (closes: #690784)
* fix typo in manpages: s/passphase/passphrase. Thanks to Milan Broz for
the bugreport. (closes: #684086)
Checksums-Sha1:
93575a06c93c548922e51d1f48a0873d4cb8ea0e 2539 cryptsetup_1.4.3-3.dsc
89fbed733e369993c34a1d0900314f1d66361cc5 94764 cryptsetup_1.4.3-3.debian.tar.gz
c763c4bcd8702c66c898b9c56366df8a0a678f3f 127596 cryptsetup_1.4.3-3_amd64.deb
c403bcda1f4c44031b7930b53cb9ca2640aaf0c0 153274 cryptsetup-bin_1.4.3-3_amd64.deb
e0f6ed339d642104579140f0fbaf409e8eb0a11d 93916 libcryptsetup4_1.4.3-3_amd64.deb
dab4a051b0238c3a091578e04b6b7bdcf9b6f5f7 52426 libcryptsetup-dev_1.4.3-3_amd64.deb
b0b1f7a2944054d49c1b8d165341d1f52f9b83dc 30628 cryptsetup-udeb_1.4.3-3_amd64.udeb
438bd28f2c5e6ebc8fa0efc77f32cddc6a1fe41a 42634 libcryptsetup4-udeb_1.4.3-3_amd64.udeb
Checksums-Sha256:
a187b73c8e0868b2198ddca1d14d94e350905206ab288d67c6a9e0860ce4d26a 2539 cryptsetup_1.4.3-3.dsc
664d9670419c9895c95a1a1f76fc7e508dca78aa6ccec73a2262d50922b15ee4 94764 cryptsetup_1.4.3-3.debian.tar.gz
2c74aafaf13b7aa3e569b0d89d0c0e466af940f10b73c58e1386a6cc1a3655e1 127596 cryptsetup_1.4.3-3_amd64.deb
da3ca0e6d571824127c582d1eb8cd6c68b588ed867c4875e214e73d9f8357487 153274 cryptsetup-bin_1.4.3-3_amd64.deb
79df0924787253303dd9c3fe7bb863af8f6e52afdbee40dd1a9c43d652e58754 93916 libcryptsetup4_1.4.3-3_amd64.deb
94814deba27e329f5dee647cd16efbcda336e4262eeacedbcbd9c6bfab0bf95b 52426 libcryptsetup-dev_1.4.3-3_amd64.deb
1f919a69c433794c7ec99b3abb12b95c0929cc26a4f10385c70750b2a74d6cc3 30628 cryptsetup-udeb_1.4.3-3_amd64.udeb
2707f22ffa966f1f78748fcd9045cfa4b1acbda18104f067e965fab70ab9b8ac 42634 libcryptsetup4-udeb_1.4.3-3_amd64.udeb
Files:
eee01b35ff4fa3f096098e36e701fb35 2539 admin optional cryptsetup_1.4.3-3.dsc
d74acdbd31fcfab6cd4c9db483d6c72f 94764 admin optional cryptsetup_1.4.3-3.debian.tar.gz
d14f6a69a1d31748c9993e4ce1ebeac8 127596 admin optional cryptsetup_1.4.3-3_amd64.deb
252b26ca1b930ff9927a24b0bb92c453 153274 admin optional cryptsetup-bin_1.4.3-3_amd64.deb
0114f968f66ead9d731bea3f49d00720 93916 libs optional libcryptsetup4_1.4.3-3_amd64.deb
3565910234e675ef378de854599ebbdc 52426 libdevel optional libcryptsetup-dev_1.4.3-3_amd64.deb
32e81d502aee4177fdcc1b7e7b6f89fa 30628 debian-installer optional cryptsetup-udeb_1.4.3-3_amd64.udeb
82d4c78e917878ff2f054496f7cf93bd 42634 debian-installer optional libcryptsetup4-udeb_1.4.3-3_amd64.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=y0nU
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sat, 01 Dec 2012 07:27:21 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.