HEX
Server: Apache
System: Linux scp1.abinfocom.com 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
User: confeduphaar (1010)
PHP: 8.1.33
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //usr/share/locale-langpack/en_GB/LC_MESSAGES/cryptsetup.mo
���,�8�%�!�:
@E?�4�-�/)�Y/'=W+�?����:O%�!�:�@
?N4�-�/��!	�	/�	=&
+d
?�
��
	

Auto-detected active dm device '%s' for data device %s.
Cannot initialize crypto RNG backend.Cannot initialize crypto backend.Cannot initialize device-mapper, running as non-root user.Cannot initialize device-mapper. Is dm_mod kernel module loaded?Failed to acquire global memory-hard access serialization lock.Failed to initialize LUKS2 reencryption in metadata.Failed to initialize device signature probes.Failed to initialize reencryption device stack.Header dump with volume key is sensitive information
which allows access to encrypted partition without passphrase.
This dump should be always stored encrypted on safe place.Ignore corruption, log it onlyInitialize LUKS2 reencryption in metadata only.Option --veracrypt is supported only for TCRYPT device type.
Resume initialized LUKS2 reencryption only.Use global lock to serialize memory hard PBKDF (OOM workaround)Wiping device to initialize integrity checksum.
You can interrupt this by pressing CTRL+c (rest of not wiped device will contain invalid checksum).
Project-Id-Version: cryptsetup
Report-Msgid-Bugs-To: FULL NAME <EMAIL@ADDRESS>
PO-Revision-Date: 2020-01-29 12:41+0000
Last-Translator: Andi Chandler <Unknown>
Language-Team: English (United Kingdom) <en_GB@li.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Launchpad-Export-Date: 2022-08-18 12:30+0000
X-Generator: Launchpad (build 87919ae1fbf1142b0e02b80650e6ccf3e775beb3)
Language: en_GB
Auto-detected active dm device >>%s<< for data device %s.
Cannot initialise crypto RNG backend.Cannot initialise crypto backend.Cannot initialise device-mapper, running as non-root user.Cannot initialise device-mapper. Is dm_mod kernel module loaded?Failed to acquire global memory-hard access serialisation lock.Failed to initialise LUKS2 reencryption in metadata.Failed to initialise device signature probes.Failed to initialise reencryption device stack.Header dump with volume key is sensitive information
which allows access to an encrypted partition without a passphrase.
This dump should be always stored encrypted in a safe place.Ignore corruption, just log itInitialise LUKS2 reencryption in metadata only.Option --veracrypt is only supported for TCRYPT device type.
Resume initialised LUKS2 reencryption only.Use global lock to serialise memory hard PBKDF (OOM workaround)Wiping device to initialise integrity checksum.
You can interrupt this by pressing CTRL+c (rest of not wiped device will contain invalid checksum).