summaryrefslogtreecommitdiff
path: root/README_CRYPT.TXT
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2022-01-30 20:48:46 +0000
committerEric Hameleers <alien@slackware.com>2022-01-31 08:59:52 +0100
commit84f05e024aee5a7b537c367e56755b48d34f629b (patch)
tree0e418a27513b5e2147f7c3a6b42efa58d270b437 /README_CRYPT.TXT
parent19b9d1bef5eeb7ca5aa3c10f52ab711f987b43ce (diff)
downloadcurrent-84f05e024aee5a7b537c367e56755b48d34f629b.tar.gz
Sun Jan 30 20:48:46 UTC 202220220130204846
a/aaa_libraries-15.0-x86_64-19.txz: Rebuilt. Upgraded: libexpat.so.1.8.4, libjson-c.so.5.1.0 (thanks to peake). ap/at-3.2.4-x86_64-1.txz: Upgraded. d/git-2.35.1-x86_64-1.txz: Upgraded. l/expat-2.4.4-x86_64-1.txz: Upgraded. This update merges the patches we previously applied to expat-2.4.3. l/imagemagick-7.1.0_22-x86_64-1.txz: Upgraded. l/lcms2-2.13-x86_64-1.txz: Upgraded.
Diffstat (limited to 'README_CRYPT.TXT')
-rw-r--r--README_CRYPT.TXT10
1 files changed, 4 insertions, 6 deletions
diff --git a/README_CRYPT.TXT b/README_CRYPT.TXT
index d8e0f365..d7b7fae4 100644
--- a/README_CRYPT.TXT
+++ b/README_CRYPT.TXT
@@ -124,10 +124,9 @@ you can skip this command:
* Prepare the partition for encryption. You will be asked twice to enter
a passphrase. Note that a passphrase is not limited to a single word. The
-passphrase may contain spaces. We will use a key size of 256 bits. The
-default cipher is 'aes', with mode 'cbc-essiv:sha256' which is safe enough.
+passphrase may contain spaces.
- # cryptsetup -s 256 -y luksFormat /dev/sdx2
+ # cryptsetup -y luksFormat /dev/sdx2
You can dump information about the encrypted partition to your console by
running the following command:
@@ -402,10 +401,9 @@ would want to fill your partition with random data first):
* Prepare the partition for encryption. You will be asked twice to enter
a passphrase. Note that a passphrase is not limited to a single word. The
-passphrase may contain spaces. We will use a key size of 256 bits. The
-default cipher is 'aes', with mode 'cbc-essiv:sha256' which is safe enough.
+passphrase may contain spaces.
- # cryptsetup -s 256 -y luksFormat /dev/sdx2
+ # cryptsetup -y luksFormat /dev/sdx2
* Open the encrypted partition so that we can start using the mapped device
which exposes the partition as an unencrypted block device. The command