Re: [partman-crypto] Trying to understand crypto_do_wipe ( )

2008-09-11 Thread David Härdeman
On Tue, September 9, 2008 08:51, Oei, YC wrote: > If I may ask one more question, slightly tangential, just to check if > I get it now: when I'm setting up a new crypt-device manually, it > should be ok to wipe the disk *after* setting up the crypt_device with > the actual passphrase we will be usi

Re: [partman-crypto] Trying to understand crypto_do_wipe ( )

2008-09-08 Thread Oei, YC
On Mon, Sep 8, 2008 at 1:03 AM, David Härdeman <[EMAIL PROTECTED]> wrote: > > crypto_wipe_device() will first setup a crypt-device using a random > passphrase, then write data to the crypted device. After that is done, the > crypt-device is unmounted and the key is effectively lost and > forgotten.

Re: [partman-crypto] Trying to understand crypto_do_wipe ( )

2008-09-07 Thread David Härdeman
On Sun, Sep 07, 2008 at 12:41:14PM +0100, Oei, YC wrote: I was looking at the code that writes random data to disk as part of setting up an encrypted partition. The main reason I was interested is that it seems to be quite a lot faster than something like "dd if=/dev/urandom of=/dev/sdx", and so

[partman-crypto] Trying to understand crypto_do_wipe ( )

2008-09-07 Thread Oei, YC
Dear all, I was looking at the code that writes random data to disk as part of setting up an encrypted partition. The main reason I was interested is that it seems to be quite a lot faster than something like "dd if=/dev/urandom of=/dev/sdx", and so I wanted to know how it works. However, as far a