On 10/06/2007 Marcin Garski wrote: > During testing of various ciphers I have probably found some bug in > cryptsetup-luks. My box is Fedora 7 with cryptsetup-luks 1.0.3. > > Steps to reproduce: > 1. cryptsetup luksFormat -c aes-lrw-benbi -s 384 /dev/sdxx > 2. cryptsetup luksOpen /dev/sdxx enc > > 3. *** stack smashing detected ***: cryptsetup terminated Hello Marcin, I just tried to reproduce this bug with cryptsetup 1.0.5 on a debian/unstable machine with kernel 2.6.21, but i wasn't successful: # cryptsetup luksFormat -c aes-lrw-benbi -s 384 /dev/vg00/test WARNING! ======== This will overwrite data on /dev/vg00/test irrevocably. Are you sure? (Type uppercase yes): YES Enter LUKS passphrase: Verify passphrase: Command successful. # cryptsetup luksOpen /dev/vg00/test crypt_test Enter LUKS passphrase: key slot 0 unlocked. Command successful. Maybe you should try again with cryptsetup 1.0.5 and check your kernel version. greetings, jonas --------------------------------------------------------------------- dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx