hello,
On 16/08/2009 Celejar wrote:
> On Sun, 16 Aug 2009 23:44:44 +0200
> Jonas Meurer wrote:
> > i don't know, but maybe the modprobe in initramfs is a striped down
> > version that doesn't print out errors if the modules don't exist.
>
> Right you are; I experimented, and modprobe doesn't com
On Sun, 16 Aug 2009 23:44:44 +0200
Jonas Meurer wrote:
> On 16/08/2009 Celejar wrote:
> > On Sun, 16 Aug 2009 23:10:58 +0200
> > Jonas Meurer wrote:
> > > so you at least need aes, cbc and sha256 kernel modules.
> >
> > ~$ cat /boot/proc-crypto
> > name : aes
> > driver : aes-gen
On 16/08/2009 Celejar wrote:
> On Sun, 16 Aug 2009 23:10:58 +0200
> Jonas Meurer wrote:
> > so you at least need aes, cbc and sha256 kernel modules.
>
> ~$ cat /boot/proc-crypto
> name : aes
> driver : aes-generic
> module : aes_generic
> priority : 100
> refcnt : 1
On Sun, 16 Aug 2009 23:10:58 +0200
Jonas Meurer wrote:
> hey,
>
> On 16/08/2009 Celejar wrote:
> > ~# cryptsetup luksDump /dev/hda4
> >
> > LUKS header information for /dev/hda4
> >
> > Version:1
> > Cipher name:aes
> > Cipher mode:cbc-essiv:sha256
>
> so you at le
hey,
On 16/08/2009 Celejar wrote:
> ~# cryptsetup luksDump /dev/hda4
>
> LUKS header information for /dev/hda4
>
> Version: 1
> Cipher name: aes
> Cipher mode: cbc-essiv:sha256
so you at least need aes, cbc and sha256 kernel modules.
> > # dmsetup targets
> > # l
On Sun, 16 Aug 2009 20:40:41 +0200
Jonas Meurer wrote:
...
> please paste the output of the following commands:
> # cryptsetup luksDump /dev/hda4
~# cryptsetup luksDump /dev/hda4
LUKS header information for /dev/hda4
Version:1
Cipher name:aes
Cipher mode:cbc-essiv:sha256
Hash
hello,
On 16/08/2009 Celejar wrote:
> This is not really a bug, but it's at least a request for better
> documentation.
>
> I have a standard LUKS volume (created by the Debian installer), using
> aes-cbc-essiv:sha_256. While stock Debian kernels as well as ones that I
> build
> based on the s
Package: cryptsetup
Version: 2:1.0.7-1
Severity: normal
This is not really a bug, but it's at least a request for better documentation.
I have a standard LUKS volume (created by the Debian installer), using
aes-cbc-essiv:sha_256. While stock Debian kernels as well as ones that I build
based on
8 matches
Mail list logo