On Sun, Jan 07, 2007 at 01:53:08PM +0100, Marcus Better wrote:
David Härdeman wrote:
That would mean that the fstype binary from klibc-utils doesn't
recognize the decrypted device as a suspend image. Could you please
follow the steps in bugs.debian.org/398302

Ok, I played a little with it and think I have found the bug. The crypto script invokes cryptsetup with "-h sha256". If I remove that option (but leave -c and -s as they are), I get a correct fstype (suspend).

On the other hand, it seems that /lib/cryptsetup/cryptdisks.functions creates the mapping without the -h option, and the default hash algorithm is ripemd160 according to the man page.

Cool, could you provide me with the following two files:

/etc/crypttab

/conf/conf.d/cryptroot from the initramfs image, you can get it from a running system by doing:

([EMAIL PROTECTED]:~)$ mkdir test
([EMAIL PROTECTED]:~)$ cd test
([EMAIL PROTECTED]:~/test)$ cp /boot/initrd.img-2.6.19+1 ./image.gz
([EMAIL PROTECTED]:~/test)$ gunzip image.gz
([EMAIL PROTECTED]:~/test)$ cpio -i < image 20301 blocks
([EMAIL PROTECTED]:~/test)$ cat conf/conf.d/cryptroot


Also, as a workaround, try specifying hash=ripemd160 in the relevant entry in the /etc/crypttab file and regenerate the initramfs image.

--
David Härdeman

Reply via email to