> # cryptsetup luksFormat /dev/loop0 <(cat key1) > # cryptsetup --key-file <(cat key1) luksAddKey /dev/loop0 <(cat key2) > # cryptsetup --key-file <(cat key2) luksOpen /dev/loop0 foo Yes, This works for me as well, but when I change <(cat key1) to <(gpg --decrypt --quiet /media/disk/key1.gpg) it no longer works. I tried some quoting there, but no luck yet. > Btw. piping keyfiles to cryptsetup without using --key-file may be a bad > idea. Iirc at least older versions of cryptsetup did not use the full > keyfile for encryption, e.g. when it contained newline characters. > My experience is that it works. At least I have not had any problems with my 256 bit keys and several different ones at that. I have made at least 6 containers with different keys, and they could be luksOpened. --------------------------------------------------------------------- dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx