On 1/30/07, Don Smith <[EMAIL PROTECTED]> wrote:
I looked at the source code. In /src/sys/dev/vnd.c, it has the lines:blf_ecb_encrypt(vnd->sc_keyctx, iv, sizeof(iv)); if (encrypt) blf_cbc_encrypt(vnd->sc_keyctx, iv, addr, bsize); This looks like it encrypts the key using the iv of all zeroes. True, it doesn't add any salt using -k,
the iv is the block number.
but it doesn't look like the user's key is the key that is actually used. I am curious what happens if
it is turned into a key suitable for blowfish to use.
the user enters a key longer than 448 bits. If the user enters a 456 bit key, would the extra 8 bits just be dropped from the key?
the extra is ignored.

