Path: main.gmane.org!not-for-mail From: Jari Ruusu Newsgroups: gmane.linux.kernel.announce,gmane.linux.cryptography Subject: Announce loop-AES-v2.0b file/swap crypto package Date: Sat, 29 Nov 2003 15:45:20 +0200 Lines: 63 Sender: linux-kernel-announce-owner@vger.kernel.org Approved: news@gmane.org Message-ID: <3FC8A2F0.8C199016@users.sourceforge.net> NNTP-Posting-Host: deer.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Trace: sea.gmane.org 1070114347 26691 80.91.224.253 (29 Nov 2003 13:59:07 GMT) X-Complaints-To: usenet@sea.gmane.org NNTP-Posting-Date: Sat, 29 Nov 2003 13:59:07 +0000 (UTC) Original-X-From: linux-kernel-announce-owner@vger.kernel.org Sat Nov 29 14:59:04 2003 Return-path: Original-Received: from vger.kernel.org ([67.72.78.212]) by deer.gmane.org with esmtp (Exim 3.35 #1 (Debian)) id 1AQ5cm-0001b6-00 for ; Sat, 29 Nov 2003 14:59:04 +0100 Original-Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263768AbTK2Num (ORCPT ); Sat, 29 Nov 2003 08:50:42 -0500 Original-Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263772AbTK2Num (ORCPT ); Sat, 29 Nov 2003 08:50:42 -0500 Original-Received: from jolt.tiscali.fi ([213.173.154.10]:48328 "EHLO jolt.tiscali.fi") by vger.kernel.org with ESMTP id S263768AbTK2Nua (ORCPT ); Sat, 29 Nov 2003 08:50:30 -0500 Original-Received: from surfeu.fi (mailbox.surfeu.fi [213.173.154.4]) by jolt.tiscali.fi (Postfix) with ESMTP id 3AE6216E4A0; Sat, 29 Nov 2003 15:44:37 +0200 (EET) Original-Received: from [213.140.185.186] (account ce6c8edf HELO users.sourceforge.net) by surfeu.fi (CommuniGate Pro SMTP 3.4.1) with ESMTP id 58865964; Sat, 29 Nov 2003 15:45:18 +0200 X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.22aa1 i686) X-Accept-Language: en Original-To: linux-crypto@nl.linux.org Precedence: bulk X-Mailing-List: linux-kernel-announce@vger.kernel.org Xref: main.gmane.org gmane.linux.kernel.announce:88 gmane.linux.cryptography:261 X-Report-Spam: http://spam.gmane.org/gmane.linux.kernel.announce:88 loop-AES changes since previous release: - Added workaround for module naming breakage in recent module-init-tools (2.6 kernels). - loop.c-2.6.patched updated with fixes from 2.6.0-test11 - Added INITIALDELAY setting to build-initrd.sh. This delays /linuxrc mounts to be more compatible with slowly initializing devices. Code from Andreas Voegele. - Added support for struct loop_info64 (2.4 kernels). - Added support for removing offset from IV computations (2.4 and 2.6 kernels). - Added -r option to losetup for read-only mode. - 64 bit loop device/file offset can now be used on 2.4 and later kernels. - Added 64 bit "-s nnn" option to losetup and "-o sizelimit=nnn" option to mount to limit size of loop device. This option works only on 2.4 and later kernels. - Added support for MD5 IV computation and multi-key operation that reduce chances of identical ciphertexts and triggers change to all cipher blocks in 512 byte CBC chain if any bit is changed in the 512 byte CBC chain. MD5 IV is only used in multi-key mode, read losetup -K man page for more details. - Unhashed encryption type, created using ancient loop-AES-v1.0c, now needs 'mount -o phash=unhashed1' or 'losetup -H unhashed1'. - Added support for separate object dir on 2.6.x kernels. - Eliminated highmem io buffer bouncing (2.4 and 2.6 kernels). - Added proper error handling to kernel_thread() error cases (2.4 and 2.6 kernels). bzip2 compressed tarball is here: http://loop-aes.sourceforge.net/loop-AES/loop-AES-v2.0b.tar.bz2 md5sum 1e42495aabb814d71a8bac65b6780474 http://loop-aes.sourceforge.net/loop-AES/loop-AES-v2.0b.tar.bz2.sign Additional ciphers package changes since previous release: - Added workaround for module naming breakage in recent module-init-tools (2.6 kernels). - Switched default loop_serpent.o byte order to correct little endian serpent. Old incorrect big endian serpent disk images can be used with "losetup -I 2" or "mount -o loinit=2" options. - Added support for MD5 IV computation and multi-key operation to loop_serpent.o and loop_twofish.o modules. They reduce chances of identical ciphertexts and trigger change to all cipher blocks in 512 byte CBC chain if any bit is changed in the 512 byte CBC chain. MD5 IV is only used in multi-key mode, read losetup -K man page for more details. - Little endian blowfish tests are now disabled by default. - Added support for separate object dir on 2.6.x kernels. bzip2 compressed tarball is here: http://loop-aes.sourceforge.net/ciphers/ciphers-v2.0b.tar.bz2 md5sum 8a07d3ae4ca7e081b2c44f0dbd5f60df http://loop-aes.sourceforge.net/ciphers/ciphers-v2.0b.tar.bz2.sign -- Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD - To unsubscribe from this list: send the line "unsubscribe linux-kernel-announce" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html