On Wed, 2002-12-11 at 03:50, hackzombie wrote: [..] > 5) Try to use a crypto file: > > # dd if=/dev/urandom of=cryptofile bs=1024 count=50 > > # losetup -e twofish /dev/loop0 ./cryptofile > Available keysizes (bits): 128 192 256 > Keysize: 128 > Password: workplease > Password: workplease > The cipher does not exist, or a cipher module needs to > be loaded into the kernel > ioctl: LOOP_SET_STATUS: Invalid argument > > # lsmod > Module Size Used by Not tainted > cipher-twofish 43072 0 (unused) > loop 7888 0 > cryptoapi 3396 5 [cipher-twofish] > > > What's wrong ? you're missing the cryptoloop module... the glue between loop.c's filter API, and cryptoapi ... cryptoloop is a tarball of its own, http://www.kernel.org/pub/linux/kernel/crypto/v2.4/testing/cryptoloop-0.0.1-pre1.tar.bz2 but you may want to (in case you have 2.4.20) use directly http://www.kernel.org/pub/linux/kernel/crypto/v2.4/testing/patch-int-2.4.20.1.bz2 and http://www.kernel.org/pub/linux/kernel/crypto/v2.4/testing/loop-jari-2.4.20.0.patch which contains the latest versions of crypto{api,loop} in an easy to use patchset and is known to work well; regards, -- Herbert Valerio Riedel / Phone: (EUROPE) +43-1-58801-18840 Email: hvr@hvrlab.org / Finger hvr@gnu.org for GnuPG Public Key GnuPG Key Fingerprint: 7BB9 2D6C D485 CE64 4748 5F65 4981 E064 883F 4142 - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/