On 21.10.2012, Tvrtko Ursulin wrote: > # cryptsetup --key-file=- luksOpen /luks.file target > Enter passphrase: > device-mapper: reload ioctl on failed: No such file or directory > Failed to setup dm-crypt key mapping for device /dev/loop0. > Check that kernel supports aes-cbc-essiv:sha256 cipher (check syslog for > more info). I bet you miss some of the neccessary crypto-stuff in your .config. I tested your case and have no problems: [root@wildsau htd]# uname -a Linux wildsau.fritha.org 3.6.3-rc1 #1 SMP PREEMPT Sat Oct 20 18:57:04 CEST 2012 x86_64 x86_64 x86_64 GNU/Linux [root@wildsau htd]# cryptsetup luksDump /dev/loop0 LUKS header information for /dev/loop0 Version: 1 Cipher name: aes Cipher mode: cbc-essiv:sha256 Hash spec: sha1 Payload offset: 4096 MK bits: 256 MK digest: 0e 1b a2 0a c3 db f0 16 27 df fb 2a ea e8 2e a9 15 ec f9 6e MK salt: c6 56 f1 f8 38 4a 69 81 42 91 ce e1 3c b4 36 b6 05 9c c1 ee 1a a2 21 ce ec a8 ea f9 84 cf 3e 28 MK iterations: 42125 UUID: 5b894353-1b52-40fa-bc59-4ce5b3795894 Key Slot 0: ENABLED Iterations: 168948 Salt: 77 f7 f5 1b 7e 8c ea 18 1f de fd 1c 9a fd 96 9d f3 6e 76 9f 9d 5f 97 b2 72 9e 83 ff 59 13 1e a9 Key material offset: 8 AF stripes: 4000 Key Slot 1: DISABLED _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt