aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/libmagic/magic/Magdir/luks
blob: 16042517a3323773bb5dd53afbb4d0dfdcfc5932 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
#------------------------------------------------------------------------------
# $File: luks,v 1.5 2022/09/07 11:23:44 christos Exp $
# luks:  file(1) magic for Linux Unified Key Setup
# URL:		https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup
#		http://fileformats.archiveteam.org/wiki/LUKS
# From:	Anthon van der Neut <anthon@mnt.org>
# Update:	Joerg Jenderek
# Note:		verfied by command like `cryptsetup luksDump /dev/sda3`

0	string		LUKS\xba\xbe	LUKS encrypted file,
# https://reposcope.com/mimetype/application/x-raw-disk-image
!:mime	application/x-raw-disk-image
#!:mime	application/x-luks-volume
# img is the generic extension; no suffix for partitions; luksVolumeHeaderBackUp via zuluCrypt
!:ext	/luks/img/luksVolumeHeaderBackUp
# version like: 1 2
>6	beshort		x		ver %d
# test for version 1 variant
>6	beshort		1
>>0			use		luks-v1
# test for version 2 variant
>6	beshort		>1
>>0			use		luks-v2
# Reference:	https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/LUKS_docs/on-disk-format.pdf
#		http://mark0.net/download/triddefs_xml.7z/defs/l/luks.trid.xml
# display information about LUKS version 1
0	name		luks-v1
# cipher-name like: aes twofish
>8	string		x		[%s,
# cipher-mode like: xts-plain64 cbc-essiv
>40	string		x		%s,
# hash specification like: sha256 sha1 ripemd160
>72	string		x		%s]
>168	string		x		UUID: %s
# NEW PART!
# payload-offset; start offset of the bulk data
>104	 ubelong	x		\b, at %#x data
# key-bytes; number of key bytes; key-bytes*8=MK-bits
>108	 ubelong	x		\b, %u key bytes
# mk-digest[20]; master key checksum from PBKDF2
>112	ubequad		x		\b, MK digest %#16.16llx
>>120	ubequad		x		\b%16.16llx
>>128	ubelong		x		\b%8.8x
# mk-digest-salt[32]; salt parameter for master key PBKDF2
>132	ubequad		x		\b, MK salt %#16.16llx
>>140	ubequad		x		\b%16.16llx
>>148	ubequad		x		\b%16.16llx
>>156	ubequad		x		\b%16.16llx
# mk-digest-iter; iterations parameter for master key PBKDF2
>164	ubelong		x		\b, %u MK iterations
# key slot 1
>208	ubelong		=0x00AC71F3	\b; slot #0
>>208			use		luks-slot
# key slot 2
>256	ubelong		=0x00AC71F3	\b; slot #1
>>256			use		luks-slot
# key slot 3
>304	ubelong		=0x00AC71F3	\b; slot #2
>>304			use		luks-slot
# key slot 4
>352	ubelong		=0x00AC71F3	\b; slot #3
>>352			use		luks-slot
# key slot 5
>400	ubelong		=0x00AC71F3	\b; slot #4
>>400			use		luks-slot
# key slot 6
>448	ubelong		=0x00AC71F3	\b; slot #5
>>448			use		luks-slot
# key slot 7
>496	ubelong		=0x00AC71F3	\b; slot #6
>>496			use		luks-slot
# key slot 8
>544	ubelong		=0x00AC71F3	\b; slot #7
>>544			use		luks-slot
# Reference:	https://gitlab.com/cryptsetup/LUKS2-docs/-/raw/master/luks2_doc_wip.pdf
#		http://mark0.net/download/triddefs_xml.7z/defs/l/luks2.trid.xml
# display information about LUKS version 2
0	name		luks-v2
# hdr_size; size including JSON area called Metadata area by cryptsetup with value like: 16384
>8	ubequad		x		\b, header size %llu
# possible check for MAGIC_2ND after header 
#>(8.Q) 	 string		SKUL\xba\xbe	\b, 2nd_HEADER_OK
# seqid; sequence ID, increased on update; called Epoch by cryptsetup with value like: 3 4 8 10
>16	ubequad		x		\b, ID %llu
# label[48]; optional ASCII label or empty; called Label by cryptsetup with value like: "LUKS2_EXT4_ROOT"
>24	string		>\0		\b, label %s
# csum_alg[32]; checksum algorithm like: sha256 sha1 sha512 wirlpool ripemd160
>72	string		x		\b, algo %s
# salt[64]; salt , unique for every header
>104	ubequad		x		\b, salt %#llx...
# uuid[40]; UID of device as string like: 242256c6-396e-4a35-af5f-5b70cb7af9a7
>168	string		x		\b, UUID: %-.40s
# subsystem[48]; optional owner subsystem label or empty
>208	string		>\0		\b, sub label %-.48s
# hdr_offset; offset from device start [ bytes ] like: 0
>256	ubequad		!0		\b, offset %llx
# char _padding [184]; must be zeroed
#>264	ubequad		x		\b, padding %#16.16llx
#>440	ubequad		x		\b...%16.16llx
# csum[64]; header checksum
>448	ubequad		x		\b, crc %#llx...
# char _padding4096 [7*512];  Padding , must be zeroed
#>512	ubequad		x		\b, more padding %#16.16llx
#>4088	ubequad		x		\b...%16.16llx
# JSON text data terminated by the zero character; unused remainder empty and filled with zeroes like:
# {"keyslots":{"0":{"type":"luks2","key_size":64,"af":{"type":"luks1","stripes":4000,"hash":"sha256"},"area":{"type":"raw","offse"
>0x1000	string		x		\b, at 0x1000 %s
#>0x1000	indirect	x
# display information (like active) about LUKS1 slot
0	name		luks-slot
# state of keyslot; 0x00AC71F3~active 0x0000DEAD~inactive
#>0	ubelong		x		\b, status %#8.8x
>0	ubelong		=0x00AC71F3	active
>0	ubelong		=0x0000DEAD	inactive
# iteration parameter for PBKDF2
#>4	ubelong		x		\b, %u iterations
# salt parameter for PBKDF2
#>8	ubequad		x		\b, salt %#16.16llx
#>>16	ubequad		x		\b%16.16llx
#>>24	ubequad		x		\b%16.16llx
#>>32	ubequad		x		\b%16.16llx
# start sector of key material like: 8 0x200 0x3f8 0x5f0 0xdd0
>40	ubelong		x		\b, %#x material offset
# number of anti-forensic stripes like: 4000
>44	ubelong		!4000		\b, %u stripes