From 84f05e024aee5a7b537c367e56755b48d34f629b Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Sun, 30 Jan 2022 20:48:46 +0000 Subject: Sun Jan 30 20:48:46 UTC 2022 a/aaa_libraries-15.0-x86_64-19.txz: Rebuilt. Upgraded: libexpat.so.1.8.4, libjson-c.so.5.1.0 (thanks to peake). ap/at-3.2.4-x86_64-1.txz: Upgraded. d/git-2.35.1-x86_64-1.txz: Upgraded. l/expat-2.4.4-x86_64-1.txz: Upgraded. This update merges the patches we previously applied to expat-2.4.3. l/imagemagick-7.1.0_22-x86_64-1.txz: Upgraded. l/lcms2-2.13-x86_64-1.txz: Upgraded. --- README_CRYPT.TXT | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) (limited to 'README_CRYPT.TXT') diff --git a/README_CRYPT.TXT b/README_CRYPT.TXT index d8e0f3655..d7b7fae4c 100644 --- a/README_CRYPT.TXT +++ b/README_CRYPT.TXT @@ -124,10 +124,9 @@ you can skip this command: * Prepare the partition for encryption. You will be asked twice to enter a passphrase. Note that a passphrase is not limited to a single word. The -passphrase may contain spaces. We will use a key size of 256 bits. The -default cipher is 'aes', with mode 'cbc-essiv:sha256' which is safe enough. +passphrase may contain spaces. - # cryptsetup -s 256 -y luksFormat /dev/sdx2 + # cryptsetup -y luksFormat /dev/sdx2 You can dump information about the encrypted partition to your console by running the following command: @@ -402,10 +401,9 @@ would want to fill your partition with random data first): * Prepare the partition for encryption. You will be asked twice to enter a passphrase. Note that a passphrase is not limited to a single word. The -passphrase may contain spaces. We will use a key size of 256 bits. The -default cipher is 'aes', with mode 'cbc-essiv:sha256' which is safe enough. +passphrase may contain spaces. - # cryptsetup -s 256 -y luksFormat /dev/sdx2 + # cryptsetup -y luksFormat /dev/sdx2 * Open the encrypted partition so that we can start using the mapped device which exposes the partition as an unencrypted block device. The command -- cgit v1.2.3