1. 20 Jan, 2018 1 commit
  2. 18 Jan, 2018 3 commits
  3. 24 Sep, 2017 1 commit
  4. 15 Aug, 2017 1 commit
  5. 06 Aug, 2017 1 commit
    • Milan Broz's avatar
      Change PBKDF interface API. · 0abf57be
      Milan Broz authored
      Prepare API for PBKDF that can set three costs
        - time (similar to iterations in PBKDF2)
        - memory (required memory for memory-hard function)
        - threads (required number of threads/CPUs).
      
      This patch also removes wrongly designed API call
      crypt_benchmark_kdf and replaces it with the new call
      crypt_benchmark_pbkdf.
      
      Two functions for PBKDF per context setting
      are introduced: crypt_set_pbkdf_type and crypt_get_pbkdf_type.
      
      The patch should be backward compatible when using
      crypt_set_iteration_time function (works only for PBKDF2).
      Signed-off-by: Milan Broz's avatarMilan Broz <gmazyland@gmail.com>
      0abf57be
  6. 21 Jun, 2017 1 commit
  7. 28 May, 2017 1 commit
  8. 14 Apr, 2017 1 commit
  9. 12 Mar, 2017 1 commit
  10. 02 Jul, 2016 1 commit
    • Tobias Stoeckmann's avatar
      Avoid integer overflows during memory allocation. · a0587d43
      Tobias Stoeckmann authored
      It is possible to overflow integers during memory allocation with
      insanely large "key bytes" specified in a LUKS header.
      
      Although it could be argued to properly validate LUKS headers while
      parsing them, it's still a good idea to fix any form of possible
      overflow attacks against cryptsetup in these allocation functions.
      a0587d43
  11. 19 Apr, 2016 1 commit
  12. 20 Nov, 2015 3 commits
  13. 26 Aug, 2015 1 commit
  14. 02 Jul, 2015 1 commit
  15. 11 Jan, 2015 1 commit
  16. 01 Oct, 2014 1 commit
  17. 10 Aug, 2014 1 commit
  18. 29 Dec, 2012 1 commit
  19. 21 Dec, 2012 1 commit
  20. 19 Sep, 2012 1 commit
  21. 27 Aug, 2012 2 commits
    • Milan Broz's avatar
      Always zero memory in crypt_safe_alloc. · af2730fe
      Milan Broz authored
      af2730fe
    • Dave Reisner's avatar
      lib/utils_crypt: optimize seek to keyfile-offset · 961682aa
      Dave Reisner authored
      Avoid using unbuffered reads when "seeking" to a keyfile offset. This is
      abysmally slow when the key is hidden at the end of a large device.
      Instead, try to actually call lseek, falling back on reading in chunks
      of BUFSIZ bytes until the desired offset is reached.
      
      Command line:
      
        cryptsetup luksOpen /dev/vdc1 home \
            --keyfile /dev/vdd --keyfile-size 4096 --keyfile-offset 123456789
      
      Before:
      
        real   0m25.589s
        user   0m7.030s
        sys    0m18.479s
      
      After:
      
        real   0m4.464s
        user   0m4.253s
        sys    0m0.157s
      961682aa
  22. 25 Jun, 2012 2 commits
  23. 18 Jun, 2012 1 commit
  24. 26 May, 2012 1 commit
  25. 20 May, 2012 1 commit
  26. 22 Apr, 2012 1 commit
  27. 02 Apr, 2012 1 commit
  28. 29 Mar, 2012 1 commit
  29. 16 Mar, 2012 1 commit
  30. 12 Jan, 2012 1 commit
  31. 02 Nov, 2011 1 commit
  32. 09 Oct, 2011 1 commit
  33. 18 Apr, 2011 1 commit
  34. 25 Mar, 2011 1 commit