mirror of
https://github.com/archlinuxarm/PKGBUILDs.git
synced 2025-02-16 23:57:11 +00:00
core/filesystem to 2012.7-1
This commit is contained in:
parent
b9ad2f17c4
commit
023079dc46
2 changed files with 14 additions and 30 deletions
|
@ -1,12 +1,12 @@
|
|||
# $Id: PKGBUILD 162213 2012-06-23 17:56:53Z tomegun $
|
||||
# $Id: PKGBUILD 164225 2012-07-27 22:02:26Z tomegun $
|
||||
# Maintainer: Tom Gundersen <teg@jklm.no>
|
||||
|
||||
# ALARM: Kevin Mihelich <kevin@archlinuxarm.org>
|
||||
# - add our information to os-release
|
||||
|
||||
pkgname=filesystem
|
||||
pkgver=2012.6
|
||||
pkgrel=4.1
|
||||
pkgver=2012.7
|
||||
pkgrel=1
|
||||
pkgdesc='Base filesystem'
|
||||
arch=('any')
|
||||
license=('GPL')
|
||||
|
@ -88,7 +88,7 @@ md5sums=('45940618da782cc391c59f88ab3333c3'
|
|||
'8a9042a2cedf6b6b47eb8973f14289cb'
|
||||
'b8355d9d2782f424f4cedcf682651be0'
|
||||
'ca716f853860199c1286e7939b2f2666'
|
||||
'e5d8323a4dbee7a6d0d2a19cbf4b819f'
|
||||
'1745349eb24ed21b4cfaa6f423bddb76'
|
||||
'7bc65f234dfb6abf24e7c3b03e86f4ff'
|
||||
'd41d8cd98f00b204e9800998ecf8427e'
|
||||
'52db9503314f639b8f47bd9a251a6ea9'
|
||||
|
|
|
@ -1,33 +1,17 @@
|
|||
# crypttab: Mappings for encrypted partitions
|
||||
# crypttab: mappings for encrypted partitions
|
||||
#
|
||||
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
|
||||
# should use the /dev/mapper/{NAME} paths for encrypted devices.
|
||||
# should use the /dev/mapper/<name> paths for encrypted devices.
|
||||
#
|
||||
# Each PASSWORD field can be an absolute pathname to a key file (starting
|
||||
# with a slash, recommended) or a literal string that will be used as
|
||||
# a passphrase. To use special characters in the passphrase, surround it
|
||||
# by quotes, the usual bash quoting rules apply.
|
||||
# There are two special keywords that cannot be used as passphrases:
|
||||
# - ASK ask for a passphrase on boot
|
||||
# - SWAP use a random key and create a swapspace afterwards
|
||||
# WARNING: use the SWAP keyword carefully, as it overwrites the data
|
||||
# on the specified partition
|
||||
#
|
||||
# To create a key file:
|
||||
# hashalot -n 32 ripemd160 >/etc/crytfs.key
|
||||
# or
|
||||
# dd if=/dev/urandom of=/etc/cryptfs.key bs=256 count=1
|
||||
#
|
||||
# To pass additional options to cryptsetup for non-LUKS partitions, use the
|
||||
# fourth column.
|
||||
# The Arch specific syntax has been deprecated, see crypttab(5) for the
|
||||
# new supported syntax.
|
||||
#
|
||||
# NOTE: Do not list your root (/) partition here, it must be set up
|
||||
# beforehand by the initramfs (/etc/mkinitcpio.conf).
|
||||
|
||||
|
||||
# NAME SOURCE DEVICE PASSWORD OPTIONS
|
||||
#home /dev/hda4 mypassword
|
||||
#data1 /dev/hda3 "my \"password\""
|
||||
#data2 /dev/hda5 /etc/cryptfs.key
|
||||
#swap /dev/hdx4 SWAP -c aes-cbc-essiv:sha256 -s 256
|
||||
#vol /dev/hdb7 ASK
|
||||
# <name> <device> <password> <options>
|
||||
# home /dev/hda4 /etc/mypassword1
|
||||
# data1 /dev/hda3 /etc/mypassword2
|
||||
# data2 /dev/hda5 /etc/cryptfs.key
|
||||
# swap /dev/hdx4 /dev/urandom swap,cipher=aes-cbc-essiv:sha256,size=256
|
||||
# vol /dev/hdb7 none
|
||||
|
|
Loading…
Reference in a new issue