You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I encrypted an 64GB flash drive with my Win10, and I wanna use it on my Nvidia Jetson Nano that uses Ubuntu.
So i installed the Dislocker and tried to decrypt the drive on the Ubuntu with the following command:
Tue Dec 27 13:32:03 2022 [DEBUG] ==========================[ VMK ]=========================
Tue Dec 27 13:32:03 2022 [DEBUG] Total datum size: 0x002c (44) bytes
Tue Dec 27 13:32:03 2022 [DEBUG] Datum entry type: 0
Tue Dec 27 13:32:03 2022 [DEBUG] `--> ENTRY TYPE UNKNOWN 1
Tue Dec 27 13:32:03 2022 [DEBUG] Datum value type: 1
Tue Dec 27 13:32:03 2022 [DEBUG] `--> KEY -- Total size header: 12 -- Nested datum: no
Tue Dec 27 13:32:03 2022 [DEBUG] Status: 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfe1a00 (0x4 bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] Unknown:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 00 00
Tue Dec 27 13:32:03 2022 [DEBUG] Algo: VMK (0x2003)
Tue Dec 27 13:32:03 2022 [DEBUG] Key:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 fc ea d3 c2 35 e3 fd 1b-62 82 4d c3 48 44 79 97
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000010 d6 57 6f d4 b2 2d 4c 5d-1a dd c4 8e f9 13 13 a1
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1a00
Tue Dec 27 13:32:03 2022 [DEBUG] ==========================================================
Tue Dec 27 13:32:03 2022 [INFO] Used user password decryption method
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfde570
Tue Dec 27 13:32:03 2022 [DEBUG] Entering get_next_datum...
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0x18, 0xf, 0xf, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0x3e, 0x7, 0x2, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0xe0, 0x2, 0x8, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0xd0, 0x2, 0x8, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0x40, 0x3, 0x5, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] Going out of get_next_datum
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0x2c, 0, 0x1, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0x2c, 0, 0x1, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfe1a20 (0x20 bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfe1d00 (0x1c bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] }--------[ Data passed to aes_ccm_encrypt_decrypt ]--------{
Tue Dec 27 13:32:03 2022 [DEBUG] -- Nonce:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 02 80 60 5d eb 19 d9 01-02 00 00 00
Tue Dec 27 13:32:03 2022 [DEBUG] -- Input buffer:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 1f 22 1f fe 5b d9 30 05-b0 2b 43 ff c2 99 95 28
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000010 a7 97 1d 1c 9a ef 99 8b-fb 37 0e 94
Tue Dec 27 13:32:03 2022 [DEBUG] -- MAC:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 69 86 69 99 0a 76 d7 ff-34 e9 ea 47 48 ed 6e 6b
Tue Dec 27 13:32:03 2022 [DEBUG] }----------------------------------------------------------{
Tue Dec 27 13:32:03 2022 [DEBUG] Entering aes_ccm_encrypt_decrypt...
Tue Dec 27 13:32:03 2022 [DEBUG] Tmp buffer:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 2c 4e 2d 1e 43 67 35 09-24 5e 61 1a 38 1a 3f 7b
Tue Dec 27 13:32:03 2022 [DEBUG] Input:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 69 86 69 99 0a 76 d7 ff-34 e9 ea 47 48 ed 6e 6b
Tue Dec 27 13:32:03 2022 [DEBUG] Output:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 45 c8 44 87 49 11 e2 f6-10 b7 8b 5d 70 f7 51 10
Tue Dec 27 13:32:03 2022 [DEBUG] Input length: 28, loop: 1
Tue Dec 27 13:32:03 2022 [DEBUG] Input length remain: 12
Tue Dec 27 13:32:03 2022 [DEBUG] Ending aes_ccm_encrypt_decrypt successfully!
Tue Dec 27 13:32:03 2022 [DEBUG] Entering aes_ccm_compute_unencrypted_tag...
Tue Dec 27 13:32:03 2022 [DEBUG] Buffer:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 1c 00 00 00 01 00 01 00-02 80 00 00 09 f7 12 f5
Tue Dec 27 13:32:03 2022 [DEBUG] Internal IV:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 7b e0 45 a1 7a 5f b0 4e-db 80 2d 61 45 1e 9b 10
Tue Dec 27 13:32:03 2022 [DEBUG] Ending aes_ccm_compute_unencrypted_tag successfully!
Tue Dec 27 13:32:03 2022 [DEBUG] Looking if MACs match...
Tue Dec 27 13:32:03 2022 [DEBUG] They are just below:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 45 c8 44 87 49 11 e2 f6-10 b7 8b 5d 70 f7 51 10
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 45 c8 44 87 49 11 e2 f6-10 b7 8b 5d 70 f7 51 10
Tue Dec 27 13:32:03 2022 [DEBUG] Ok, they match!
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1a20
Tue Dec 27 13:32:03 2022 [DEBUG] =========================[ FVEK ]=========================
Tue Dec 27 13:32:03 2022 [DEBUG] Total datum size: 0x001c (28) bytes
Tue Dec 27 13:32:03 2022 [DEBUG] Datum entry type: 0
Tue Dec 27 13:32:03 2022 [DEBUG] `--> ENTRY TYPE UNKNOWN 1
Tue Dec 27 13:32:03 2022 [DEBUG] Datum value type: 1
Tue Dec 27 13:32:03 2022 [DEBUG] `--> KEY -- Total size header: 12 -- Nested datum: no
Tue Dec 27 13:32:03 2022 [DEBUG] Status: 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfde570 (0x13 bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] Unknown:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 00 00
Tue Dec 27 13:32:03 2022 [DEBUG] Algo: AES-128-NODIFFUSER (0x8002)
Tue Dec 27 13:32:03 2022 [DEBUG] Key:
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 09 f7 12 f5 76 9e 2a 02-f5 5e b1 93 4f 9b c0 1a
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfde570
Tue Dec 27 13:32:03 2022 [DEBUG] ==========================================================
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfe1d30 (0x498 bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] Header safe: 0x1c, 0, 0x1, 0x1
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfde570 (0x10 bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] FVEK -----------------------------------------------------
Tue Dec 27 13:32:03 2022 [DEBUG] 0x00000000 09 f7 12 f5 76 9e 2a 02-f5 5e b1 93 4f 9b c0 1a
Tue Dec 27 13:32:03 2022 [DEBUG] ----------------------------------------------------------
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfde570
Tue Dec 27 13:32:03 2022 [DEBUG] New memory allocation at 0x557bfe21d0 (0x200 bytes allocated)
Tue Dec 27 13:32:03 2022 [DEBUG] Fixing sector (7): from 0 to 0x3c0000
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe21d0
Tue Dec 27 13:32:03 2022 [ERROR] Can't initialize the volume's size
Tue Dec 27 13:32:03 2022 [CRITICAL] Can't prepare the crypt structure. Abort.
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1cc0
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1d00
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1d30
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfde340
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1730
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1670
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfe1690
Tue Dec 27 13:32:03 2022 [DEBUG] Freeing pointer at address 0x557bfde550
Tue Dec 27 13:32:03 2022 [DEBUG] Trying to close fd #3...
I am sure the command and the directories are alright, since it can actually read the drive.
But it got stuck on the "Can't initialize the volume's size".
Is there any way to specify the volume's size during the decryption? Or am i missing any step before the decryption?
Any hints or tips would be gratefully appreciated!
Thanks in advance for the help!
The text was updated successfully, but these errors were encountered:
Hi,
I encrypted an 64GB flash drive with my Win10, and I wanna use it on my Nvidia Jetson Nano that uses Ubuntu.
So i installed the Dislocker and tried to decrypt the drive on the Ubuntu with the following command:
sudo dislocker -vvvvv /dev/sda1 -upassword -- /media/decrypt
and then it gave me the following error:
I am sure the command and the directories are alright, since it can actually read the drive.
But it got stuck on the "Can't initialize the volume's size".
Is there any way to specify the volume's size during the decryption? Or am i missing any step before the decryption?
Any hints or tips would be gratefully appreciated!
Thanks in advance for the help!
The text was updated successfully, but these errors were encountered: