Hi! Just a simple question: If I do: dd if=/dev/zero of=foobar bs=1M count=50 dd if=/dev/urandom of=keyfile bs=32 count=1 cryptsetup create asd ./foobar --cipher=aes-cbc-essiv:sha256 --key-file key or cryptsetup create asd ./foobar --cipher=aes-cbc Enter Passphrase: .......... work fine. But if I do cryptsetup create asd ./encrypted --cipher=aes-cbc --key-file key I get device-mapper: reload ioctl on failed: Invalid argument For sure, cbc-essiv generates the initialization vector itself. But how does the second command get its IV? cryptsetup create asd ./foobar --cipher=aes-cbc Does it derive the IV from the passphrase? And why does cryptsetup create asd ./foobar --cipher=aes-cbc --key-file key not work? (No IV for cbc?) Thanks a lot! Ralf Ramsauer
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt