Milan Broz
935e83ebfa
Initialize crypto library before LUKS header load.
...
git-svn-id: https://cryptsetup.googlecode.com/svn/trunk@111 36d66b0a-2a48-0410-832c-cd162a569da5
2009-09-15 15:10:23 +00:00
Milan Broz
74b26c7b8a
* Run performance check for PBKDF2 from LUKS code, do not mix hash algoritms results.
...
* Add ability to provide pre-generated master key and UUID in LUKS header format.
* Add LUKS function to verify master key digest.
* Move key slot manuipulation function into LUKS specific code.
Signed-off-by: Milan Broz <mbroz@redhat.com >
git-svn-id: https://cryptsetup.googlecode.com/svn/trunk@94 36d66b0a-2a48-0410-832c-cd162a569da5
2009-08-30 18:09:34 +00:00
Milan Broz
a0d1056e0f
Fix PBKDF2 speed calculation for large passhrases.
...
- Do not reset key each iteration.
- Fix error path.
git-svn-id: https://cryptsetup.googlecode.com/svn/trunk@84 36d66b0a-2a48-0410-832c-cd162a569da5
2009-08-17 06:28:22 +00:00
Milan Broz
7e7c9c176c
Switch PBKDF2 from internal SHA1 to libgcrypt.
...
Also make hash algorithm not fixed here.
git-svn-id: https://cryptsetup.googlecode.com/svn/trunk@79 36d66b0a-2a48-0410-832c-cd162a569da5
2009-07-30 14:56:59 +00:00
Clemens Fruhwirth
7dc7b90a9b
Initial checking of what was revision 56 on http://luks.endorphin.org/svn/cryptsetup
...
git-svn-id: https://cryptsetup.googlecode.com/svn/trunk@3 36d66b0a-2a48-0410-832c-cd162a569da5
2008-03-22 08:23:35 +00:00