Re: Cipher block questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Apr 21, 2015 at 10:07:47AM +0200, Milan Broz wrote:


> First, from the cryptsetup log
>   # Userspace crypto wrapper cannot use gost-xts-plain64 (-2).
> it seems that there is some problem with loading of your gost cipher implementation.
>
I relaunch the command into QEMU and I obtain "Userspace crypto wrapper cannot use
gost-xts-plain64 (-95)", and when I try with an algorithm which work fine I have the same
result "Userspace crypto wrapper cannot use aes-xts-plain64 (-95)". So, I don't
know what's the problem or where it came from. I quickly Googled the problem, but nothing.

> What key size you are using in cryptsetup (default is probably 256bit)?

Yes, the key size is 256-bit.

> LRW and XTS modes requires *two* keys in fact (tweaking+encryption).
>
> GOST should use 256bit key, so if you add --key-size 512 to your cryptsetup command
> does it help?

I already tried it, but that doesn't change anything.

--
Jonathan "Coldshell" Thieuleux
Mail : jonathan.thieuleux@xxxxxxxxx
IRC : coldshell [Freenode, OFTC]
Shaarli : https://links.stdcall.me/

"If you write interfaces with more than 4 or 5 function arguments, it's possible that you and I cannot be friends." -- David Miller
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux