Re: how the key is generated?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jan 26, 2010 at 4:58 PM, Milan Broz <mbroz@xxxxxxxxxx> wrote:
> On 01/26/2010 09:41 AM, Bai Shuwei wrote:
>> Hello, everyone:
>>     i add one line in the setkey function which is in xts.c file to
>> print the in_key value. I find the key value not same i set in the
>> keyfile by cryptsetup
>>
>>    my command is
>> #   cryptsetup luksFormat -d my_keyfile -c xts-aes-plain -s 256 /dev/loop0
>
> -d is key file for key slot (passphrase), volume (master) key for encryption
> is generated using RNG during luksFormat inside cryptsetup.
>
> You can use pre-generated master key using --master-key-file in cryptsetup 1.1.x
> (but note it reads raw input, not hexa encoding). See man page.
>
> You do not need to modify xts.c btw, try "dmsetup table --showkeys" for active
> dm-crypt mappings to show used volume key.
>
> (and also better use dm-crypt@xxxxxxxx mailing list for questions related to
> userspace cryptsetup)
>
> Milan
> --
> mbroz@xxxxxxxxxx
>

Hi, thanks Milan firstly!
I use "dmsetup table --showkeys" get the bellow information.

disk$ sudo dmsetup table --showkeys /dev/mapper/dsi0
0 2040 crypt aes-xts-plain
3131313131313131313131313131313131313131313131313131313131313131 0 7:0
2056

If i forget the passphase, can i use the above information/key to
recovery my disk?

Best Regards

Bai Shuwei


-- 
Love other people, as same as love yourself!
Don't think all the time, do it by your hands!

E-Mail: baishuwei@xxxxxxxxx
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux