PNG  IHDR* pHYs+ IDATx]n#; cdLb Ǚ[at¤_:uP}>!Usă cag޿ ֵNu`ݼTâabO7uL&y^wFٝA"l[|ŲHLN밪4*sG3|Dv}?+y߉{OuOAt4Jj.u]Gz*҉sP'VQKbA1u\`& Af;HWj hsO;ogTu uj7S3/QzUr&wS`M$X_L7r2;aE+ώ%vikDA:dR+%KzƉo>eOth$z%: :{WwaQ:wz%4foɹE[9<]#ERINƻv溂E%P1i01 |Jvҗ&{b?9g=^wζXn/lK::90KwrюO\!ջ3uzuGv^;騢wq<Iatv09:tt~hEG`v;3@MNZD.1]L:{ծI3`L(÷ba")Y.iljCɄae#I"1 `3*Bdz>j<fU40⨬%O$3cGt]j%Fߠ_twJ;ABU8vP3uEԑwQ V:h%))LfraqX-ۿX]v-\9I gl8tzX ]ecm)-cgʒ#Uw=Wlێn(0hPP/ӨtQ“&J35 $=]r1{tLuǮ*i0_;NƝ8;-vݏr8+U-kruȕYr0RnC]*ެ(M:]gE;{]tg(#ZJ9y>utRDRMdr9㪩̞zֹb<ģ&wzJM"iI( .ꮅX)Qw:9,i좜\Ԛi7&N0:asϓc];=ΗOӣ APqz93 y $)A*kVHZwBƺnWNaby>XMN*45~ղM6Nvm;A=jֲ.~1}(9`KJ/V F9[=`~[;sRuk]rєT!)iQO)Y$V ی ۤmzWz5IM Zb )ˆC`6 rRa}qNmUfDsWuˤV{ Pݝ'=Kֳbg,UҘVz2ﴻnjNgBb{? ߮tcsͻQuxVCIY۠:(V뺕 ٥2;t`@Fo{Z9`;]wMzU~%UA蛚dI vGq\r82iu +St`cR.6U/M9IENDB`Cryptsetup 2.2.2 Release Notes ============================== Stable bug-fix release. All users of cryptsetup 2.1 and 2.2 should upgrade to this version. Changes since version 2.2.1 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ * Print error message if a keyslot open failed for a different reason than wrong passwords (for example there is not enough memory). Only an exit code was present in this case. * The progress function switches unit sizes (B/s to GiB/s) according to the actual speed. Also, it properly calculates speed in the case of a resumed reencryption operation. * The --version now supports short -V short option and better handles common option priorities. * If cryptsetup wipes signatures during format actions through blkid, it also prints signature device offsets. * Compilation now properly uses LTLIBINTL gettext setting in Makefiles. * Device-mapper backend now supports new DM_GET_TARGET_VERSION ioctl (available since Linux kernel 5.4). This should help to detect some kernel/userspace incompatibilities earlier later after a failed device activation. * Fixes LUKS2 reencryption on systems without kernel keyring. * Fixes unlocking prompt for partitions mapped through loop devices (to properly show the backing device). * For LUKS2 decryption, a device is now marked for deferred removal to be automatically deactivated. * Reencryption now limits hotzone size to be maximal 1 GiB or 1/4 system memory (if lower). * Reencryption now retains activation flags during online reencryption. * Reencryption now allows LUKS2 device to activate device right after LUKS2 encryption is initialized through optional active device name for cryptsetup reencrypt --encrypt command. This could help with automated encryption during boot. NOTE: It means that part of the device is still not encrypted during activation. Use with care! * Fixes failure in resize and plain format activation if activated device size was not aligned to underlying logical device size. * Fixes conversion to LUKS2 format with detached header if a detached header size was smaller than the expected aligned LUKS1 header size.