Advertisement
Guest User

crypt-error

a guest
Dec 18th, 2020
38
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.71 KB | None | 0 0
  1. osmc@osmc-ss:~$ sudo cryptsetup --debug luksOpen /dev/sda2 encrypt-data
  2. # cryptsetup 2.1.0 processing "cryptsetup --debug luksOpen /dev/sda2 encrypt-data"
  3. # Running command open.
  4. # Locking memory.
  5. # Installing SIGINT/SIGTERM handler.
  6. # Unblocking interruption on signal.
  7. # Allocating context for crypt device /dev/sda2.
  8. # Trying to open and read device /dev/sda2 with direct-io.
  9. # Initialising device-mapper backend library.
  10. # Trying to load any crypt type from device /dev/sda2.
  11. # Crypto backend (OpenSSL 1.1.1d 10 Sep 2019) initialized in cryptsetup library version 2.1.0.
  12. # Detected kernel Linux 3.14.29-160-osmc aarch64.
  13. # Loading LUKS2 header (repair disabled).
  14. # Opening lock resource file /run/cryptsetup/L_8:2
  15. # Acquiring read lock for device /dev/sda2.
  16. # Verifying read lock handle for device /dev/sda2.
  17. # Device /dev/sda2 READ lock taken.
  18. # Trying to read primary LUKS2 header at offset 0x0.
  19. # Opening locked device /dev/sda2
  20. # Veryfing locked device handle (bdev)
  21. # LUKS2 header version 2 of size 16384 bytes, checksum sha256.
  22. # Checksum:743234ab18d6847d7b7b2972297dcd890e86edb7ee5d8367cf0616c1da0d241e (on-disk)
  23. # Checksum:743234ab18d6847d7b7b2972297dcd890e86edb7ee5d8367cf0616c1da0d241e (in-memory)
  24. # Trying to read secondary LUKS2 header at offset 0x4000.
  25. # Opening locked device /dev/sda2
  26. # Veryfing locked device handle (bdev)
  27. # LUKS2 header version 2 of size 16384 bytes, checksum sha256.
  28. # Checksum:f1422171c3949e00778c2abae8da5fad96550d952921db759f8b04b815463625 (on-disk)
  29. # Checksum:f1422171c3949e00778c2abae8da5fad96550d952921db759f8b04b815463625 (in-memory)
  30. # Device size 1120219955200, offset 16777216.
  31. # Device /dev/sda2 READ lock released.
  32. # Not enough physical memory detected, PBKDF max memory decreased from 1048576kB to 882060kB.
  33. # PBKDF argon2i, hash sha256, time_ms 2000 (iterations 0), max_memory_kb 882060, parallel_threads 4.
  34. # Activating volume encrypt-data using token -1.
  35. # Interactive passphrase entry requested.
  36. Enter passphrase for /dev/sda2:
  37. # Activating volume encrypt-data [keyslot -1] using passphrase.
  38. # dm version [ opencount flush ] [16384] (*1)
  39. # dm versions [ opencount flush ] [16384] (*1)
  40. # Detected dm-ioctl version 4.27.0.
  41. # Detected dm-crypt version 1.13.0.
  42. # Device-mapper backend running with UDEV support enabled.
  43. # dm status encrypt-data [ opencount noflush ] [16384] (*1)
  44. # Keyslot 0 priority 1 != 2 (required), skipped.
  45. # Trying to open LUKS2 keyslot 0.
  46. # Reading keyslot area [0x8000].
  47. # Userspace crypto wrapper cannot use aes-xts-plain64 (-95).
  48. # Keyslot 0 (luks2) open failed with -95.
  49. # Releasing crypt device /dev/sda2 context.
  50. # Releasing device-mapper backend.
  51. # Unlocking memory.
  52. Command failed with code -1 (wrong or missing parameters).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement