At Fri, 14 Aug 2009 09:36:09 +0200, Thomas Bächler wrote: > The iterated hashing process used in LUKS' key slots is useful for > (potentially weak) passphrases. However, it is useless if the key slot is > locked with a cryptographically strong key file (like a file created from > /dev/random). There's an option "--iter-time" where you can specify/reduce the iteration count. It's main purpose is well to slow down bruteforce attacks. Don't know if it's that what you're after. _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt