* Clemens Fruhwirth <[EMAIL PROTECTED]> [2006-12-29 11:52]:
> Please try the version from subversion
> http://luks.endorphin.org/svn/cryptsetup

With 1.0.4 plus the attached 2 patches from SVN I no longer get any
corruption but I also cannot access my encrypted data.  Is there
anything else I should try?


foobar:~# cryptsetup luksOpen /dev/sda5 x
Enter LUKS passphrase:
device-mapper: table: 254:0: crypt: Device lookup failed
device-mapper: ioctl: error adding target to table
device-mapper: ioctl: device doesn't appear to be in the dev hash table.
Failed to setup dm-crypt key mapping.
Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify 
that /dev/sda5 contains at least 133 sectors.
Failed to read from key storage
Enter LUKS passphrase:
device-mapper: table: 254:0: crypt: Device lookup failed
device-mapper: ioctl: error adding target to table
device-mapper: ioctl: device doesn't appear to be in the dev hash table.
Failed to setup dm-crypt key mapping.
Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify 
that /dev/sda5 contains at least 133 sectors.
Failed to read from key storage
Enter LUKS passphrase:
device-mapper: table: 254:0: crypt: Device lookup failed
device-mapper: ioctl: error adding target to table
device-mapper: ioctl: device doesn't appear to be in the dev hash table.
Failed to setup dm-crypt key mapping.
Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify 
that /dev/sda5 contains at least 133 sectors.
Failed to read from key storage
Command failed: No key available with this passphrase.

foobar:~# cryptsetup luksOpen /dev/sda5 x
Enter LUKS passphrase:
device-mapper: table: 254:0: crypt: Device lookup failed
device-mapper: ioctl: error adding target to table
device-mapper: ioctl: device doesn't appear to be in the dev hash table.
Failed to setup dm-crypt key mapping.
Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify 
that /dev/sda5 contains at least 133 sectors.
Failed to read from key storage
Enter LUKS passphrase:
device-mapper: table: 254:0: crypt: Device lookup failed
device-mapper: ioctl: error adding target to table
device-mapper: ioctl: device doesn't appear to be in the dev hash table.
Failed to setup dm-crypt key mapping.
Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify 
that /dev/sda5 contains at least 133 sectors.
Failed to read from key storage
Enter LUKS passphrase:
device-mapper: table: 254:0: crypt: Device lookup failed
device-mapper: ioctl: error adding target to table
device-mapper: ioctl: device doesn't appear to be in the dev hash table.
Failed to setup dm-crypt key mapping.
Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify 
that /dev/sda5 contains at least 133 sectors.
Failed to read from key storage
Command failed: No key available with this passphrase.

foobar:~#

-- 
Martin Michlmayr
http://www.cyrius.com/
#! /bin/sh /usr/share/dpatch/dpatch-run
## 02_fix_arm.dpatch by Clemens Fruhwirth <[EMAIL PROTECTED]>
##
## DP: Add error checking to read_blockwise for short reads.
## DP: Commit a patch that fixes http://bugs.debian.org/403075

@DPATCH@
Index: lib/utils.c
===================================================================
--- cryptsetup-1.0.4~/lib/utils.c       (revision 1)
+++ cryptsetup-1.0.4/lib/utils.c        (working copy)
@@ -151,8 +151,10 @@
 static int sector_size(int fd) 
 {
        int bsize;
-       ioctl(fd,BLKSSZGET, &bsize);
-       return bsize;
+       if (ioctl(fd,BLKSSZGET, &bsize) < 0)
+               return -EINVAL;
+       else
+               return bsize;
 }
 
 int sector_size_for_device(const char *device)
@@ -171,8 +173,11 @@
        char *padbuf; char *padbuf_base;
        char *buf = (char *)orig_buf;
        int r;
-       int hangover; int solid; int bsize = sector_size(fd);
+       int hangover; int solid; int bsize;
 
+       if ((bsize = sector_size(fd)) < 0)
+               return bsize;
+
        hangover = count % bsize;
        solid = count - hangover;
 
@@ -209,15 +214,20 @@
        char *buf = (char *)orig_buf;
        int r;
        int step;
-       int bsize = sector_size(fd);
+       int bsize;
 
+       if ((bsize = sector_size(fd)) < 0)
+               return bsize;
+
        padbuf = aligned_malloc(&padbuf_base, bsize, bsize);
        if(padbuf == NULL) return -ENOMEM;
 
        while(count) {
                r = read(fd,padbuf,bsize);
-               if(r < 0) goto out;
-               
+               if(r < 0 || r != bsize) {
+                       fprintf(stderr, "read failed in read_blockwise.\n");
+                       goto out;
+               }
                step = count<bsize?count:bsize;
                memcpy(buf,padbuf,step);
                buf += step;
@@ -242,6 +252,9 @@
        int frontHang = offset % bsize;
        int r;
 
+       if (bsize < 0)
+               return bsize;
+
        lseek(fd, offset - frontHang, SEEK_SET);
        if(offset % bsize) {
                int innerCount = count<bsize?count:bsize;
#! /bin/sh /usr/share/dpatch/dpatch-run
## 03_no_header_conv.patch by Clemens Fruhwirth <[EMAIL PROTECTED]>
##
## DP: Kick ancient version header conversion.

@DPATCH@
Index: luks/keymanage.c
===================================================================
--- a/luks/keymanage.c  (revision 19)
+++ b/luks/keymanage.c  (working copy)
@@ -67,14 +67,6 @@
        return mk;
 }
 
-static inline void convert_V99toV991(char const *device, struct luks_phdr 
*hdr) {
-       struct luks_phdr tmp_phdr;
-       fputs(_("automatic header conversion from 0.99 to 0.991 triggered"), 
stderr);
-       hdr->mkDigestIterations = ntohs(htonl(hdr->mkDigestIterations));
-       memcpy(&tmp_phdr, hdr, sizeof(struct luks_phdr));
-       LUKS_write_phdr(device, &tmp_phdr); 
-}
-
 int LUKS_read_phdr(const char *device, struct luks_phdr *hdr)
 {
        int devfd = 0; 
@@ -109,14 +101,6 @@
                        hdr->keyblock[i].passwordIterations = 
ntohl(hdr->keyblock[i].passwordIterations);
                        hdr->keyblock[i].keyMaterialOffset  = 
ntohl(hdr->keyblock[i].keyMaterialOffset);
                        hdr->keyblock[i].stripes            = 
ntohl(hdr->keyblock[i].stripes);
-
-                       if(hdr->keyblock[i].active == LUKS_KEY_DISABLED_OLD) {
-                               hdr->keyblock[i].active = LUKS_KEY_DISABLED;
-                               convert_V99toV991(device, hdr);
-                       } else if(hdr->keyblock[i].active == 
LUKS_KEY_ENABLED_OLD) {
-                               hdr->keyblock[i].active = LUKS_KEY_ENABLED;
-                               convert_V99toV991(device, hdr);
-                       }
                }
        }
 

Reply via email to