-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge git://git.kernel.org/pub/scm/linux/kernel/git/agk/linux-2.6-dm
* git://git.kernel.org/pub/scm/linux/kernel/git/agk/linux-2.6-dm: (24 commits) dm crypt: add documentation dm: remove md argument from specific_minor dm table: remove unused dm_create_error_table dm table: drop void suspend_targets return dm: unplug queues in threads dm raid1: use timer dm: move include files dm kcopyd: rename dm: expose macros dm kcopyd: remove redundant client counting dm kcopyd: private mempool dm kcopyd: per device dm log: make module use tracking internal dm log: move register functions dm log: clean interface dm kcopyd: clean interface dm io: clean interface dm io: rename error to error_bits dm snapshot: store pointer to target instance dm log: move dirty region log code into separate module ...
- Loading branch information
Showing
17 changed files
with
659 additions
and
600 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
dm-crypt | ||
========= | ||
|
||
Device-Mapper's "crypt" target provides transparent encryption of block devices | ||
using the kernel crypto API. | ||
|
||
Parameters: <cipher> <key> <iv_offset> <device path> <offset> | ||
|
||
<cipher> | ||
Encryption cipher and an optional IV generation mode. | ||
(In format cipher-chainmode-ivopts:ivmode). | ||
Examples: | ||
des | ||
aes-cbc-essiv:sha256 | ||
twofish-ecb | ||
|
||
/proc/crypto contains supported crypto modes | ||
|
||
<key> | ||
Key used for encryption. It is encoded as a hexadecimal number. | ||
You can only use key sizes that are valid for the selected cipher. | ||
|
||
<iv_offset> | ||
The IV offset is a sector count that is added to the sector number | ||
before creating the IV. | ||
|
||
<device path> | ||
This is the device that is going to be used as backend and contains the | ||
encrypted data. You can specify it as a path like /dev/xxx or a device | ||
number <major>:<minor>. | ||
|
||
<offset> | ||
Starting sector within the device where the encrypted data begins. | ||
|
||
Example scripts | ||
=============== | ||
LUKS (Linux Unified Key Setup) is now the preferred way to set up disk | ||
encryption with dm-crypt using the 'cryptsetup' utility, see | ||
http://luks.endorphin.org/ | ||
|
||
[[ | ||
#!/bin/sh | ||
# Create a crypt device using dmsetup | ||
dmsetup create crypt1 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 babebabebabebabebabebabebabebabe 0 $1 0" | ||
]] | ||
|
||
[[ | ||
#!/bin/sh | ||
# Create a crypt device using cryptsetup and LUKS header with default cipher | ||
cryptsetup luksFormat $1 | ||
cryptsetup luksOpen $1 crypt1 | ||
]] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.