Milan Broz: > On 11/22/2013 09:38 AM, shmick@xxxxxxxxxx wrote: > >> >> why does luksFormat succeed using a simple short password and fail with >> a more complex, longer one ? >> >> this occurs in parted magic boot cd from 28-02-2013 > > It seems that there is no free download. Sorry, cannot even try it. Ask them. yes i believe the author of that went through some troubles a while back - i was not aware you could not download any version anymore > > It works with upstream build, in fact, maximal interactive password length > can be seen in cryptsetup --help: mind if i ask which distro you were able to successfully luksFormat to in cryptsetup 1.6.2 issuing: cryptsetup --debug --hash sha512 --cipher twofish-xts-plain64 --use-random --key-size 256 --iter-time 2000 luksFormat /dev/md0 what were your compile switches ? > ... > Default compiled-in key and passphrase parameters: > Maximum keyfile size: 8192kB, Maximum interactive passphrase length 512 (characters) > Default PBKDF2 iteration time for LUKS: 1000 (ms) > > Milan > _______________________________________________ > dm-crypt mailing list > dm-crypt@xxxxxxxx > http://www.saout.de/mailman/listinfo/dm-crypt > _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt