This crate defines data structures to interact with a LUKS2 partition.
examples/dump_header_win.rs for how to use this on windows, reading
from a disk with a GPT.
Recover information that was split antiforensically.
Custom error types.
Global attributes for the LUKS device.
A struct representing a LUKS device.
A LUKS2 header as described here.
The LUKS2 user data integrity protection type, an experimental feature which is only included for parsing compatibility.
JSON metadata for the device as described here.
A token is an object that can describe how to get a passphrase to unlock a particular keyslot. It can also contain additional user-defined JSON metadata. No token types are implemented; this is only included for parsing compatibility.
Information on the allocated area in the binary keyslots area of a
A digest is used to verify that a key decrypted from a keyslot is correct. Digests are assigned to keyslots and segments. If it is not assigned to a segment, then it is a digest for an unbound key. Every keyslot must have one assigned digest. The key digest also specifies the exact key size for the encryption algorithm of the segment.
Stores information on the PBKDF type and parameters of a
A keyslot contains information about stored keys – areas, where binary keyslot data are located, encryption and anti-forensic function used, password-based key derivation function (PBKDF) and related parameters.
The priority of a
A segment contains a definition of encrypted areas on the disk containing user data (in LUKS1 mentioned as the user data payload). For a normal LUKS device, there ist only one data segment present.
The size of a