From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mBSeKCZ96Mcv for ; Sat, 11 Feb 2012 11:33:59 +0100 (CET) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mail.saout.de (Postfix) with ESMTP for ; Sat, 11 Feb 2012 11:33:58 +0100 (CET) Message-ID: <4F364412.2010107@redhat.com> Date: Sat, 11 Feb 2012 11:33:54 +0100 From: Milan Broz MIME-Version: 1.0 References: <4F358681.9060506@redhat.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [dm-crypt] Unlocking volume using master key List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: anirudh takkallapally Cc: dm-crypt@saout.de On 02/11/2012 12:21 AM, anirudh takkallapally wrote: > Ok cool, thanks for the quick response. > > i am compiling cryptsetup, so can i am guessing i will be able to call > libcryptsetup API. It was quicker to implement it than explain:) Try upstream git now, see this commit http://code.google.com/p/cryptsetup/source/detail?r=d54204564519682881e9a125dd37e3c39502ebfa# Basically, if you have volume key somewhere in file, you can not only use it to format cryptsetup luksFormat --master-key-file but you can also open device using it now cryptsetup luksOpen --master-key-file Obviously, you are responsible that VK is generated properly (enough entropy etc) and that you store VK file safely (anyone can map device using this file without passphrase knowledge). Use at your own risk :-) (I will release 1.4.2 version perhaps soon.) Thanks, Milan