"Hannes R. Boehm" wrote: > Why can't I read cryptoloop devices with loop-AES (and the other way round) [snip] > I can neither read cryptoloop devices with loop-AES nor loop-AES devices with cryptoapi. > Both use AES256 encryption with the same plaintext password. If I am right, they > use both the same plaintext to key funciton and both use 512 byte blocksize. When you are using loop-AES, and specify "-H rmd160" option to losetup, or "-o phash=rmd160" option to mount, losetup and mount programs use RIPE-MD160 to hash your password, and as such is 100% compatible with cryptoapi 512-byte-IV versions. > Can I decrypt loop-XY with any other AES implementation like this ? > cat /dev/hdc99 | ase-generic -d > file At least this will create unencrypted version of your filesystem. losetup -e AES256 /dev/loop0 /dev/hdc99 dd if=/dev/loop0 of=file bs=64k losetup -d /dev/loop0 > is there another way to decrypt without the use of neither loop-AES/cryptoloop > (only using the function to extract the key from the plaintext) Yes. 50 lines of C code linked with AES and hash-function libraries should do be able to do it. Regards, Jari Ruusu <jari.ruusu@pp.inet.fi> - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/