Richard Hall wrote: > I also compiled a custom Kernel without the loop device and compiled the > loop-aes loop device that I downloaded from sourceforge. Both gave the > same results of a sucessful execution of the losetup command but with an > unreadable ext2 FS. [snip] > Any help or suggestions would be greatfully acepted. If you are using losetup and mount from loop-AES package, you can specify mainline util-linux compatible key setup like this: losetup -e AES256 -H unhashed2 -p 0 /dev/loop0 /dev/sdb1 </etc/backup/aes.key ^^^^^^^^^^^^ Or kerneli.org compatible key setup like this: losetup -e AES256 -H rmd160 -p 0 /dev/loop0 /dev/sdb1 </etc/backup/aes.key ^^^^^^^^^ -- Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/