All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] Initialization Vector using plain aes-cbc
@ 2012-09-26 13:17 Ralf Ramsauer
  2012-09-26 13:56 ` Milan Broz
  0 siblings, 1 reply; 5+ messages in thread
From: Ralf Ramsauer @ 2012-09-26 13:17 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 804 bytes --]

Hi!

Just a simple question:

If I do:
dd if=/dev/zero of=foobar bs=1M count=50
dd if=/dev/urandom of=keyfile bs=32 count=1

cryptsetup create asd ./foobar --cipher=aes-cbc-essiv:sha256 --key-file key
or
cryptsetup create asd ./foobar --cipher=aes-cbc
Enter Passphrase: ..........

work fine.

But if I do
cryptsetup create asd ./encrypted --cipher=aes-cbc --key-file key
I get
device-mapper: reload ioctl on  failed: Invalid argument

For sure, cbc-essiv generates the initialization vector itself. But how
does the second command
get its IV?
cryptsetup create asd ./foobar --cipher=aes-cbc
Does it derive the IV from the passphrase?

And why does
cryptsetup create asd ./foobar --cipher=aes-cbc --key-file key
not work? (No IV for cbc?)

Thanks a lot!

Ralf Ramsauer


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 897 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2012-09-26 17:02 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-09-26 13:17 [dm-crypt] Initialization Vector using plain aes-cbc Ralf Ramsauer
2012-09-26 13:56 ` Milan Broz
2012-09-26 15:17   ` Ralf Ramsauer
2012-09-26 15:59     ` Milan Broz
2012-09-26 17:02       ` Ralf Ramsauer

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.