hello all, any advice to overcome this? i don't want to change ciphers or other crypto options ive tried both --cipher twofish-xts-plain64 and --cipher aes-xts-plain64 prior i did modprobe relevant ciphers, hashes appart for waiting for zero issues, i also cannot benchmark please see below running from an amd-64 linux mint 13 system 3 disk software raid 5 cryptsetup --debug --hash sha512 --cipher twofish-xts-plain64 --use-random --key-size 256 --iter-time 2000 luksFormat /dev/md0 # cryptsetup 1.6.2 processing "cryptsetup --debug --hash sha512 --cipher twofish-xts-plain64 --use-random --key-size 256 --iter-time 2000 luksFormat /dev/md0" # Running command luksFormat. # Locking memory. # Installing SIGINT/SIGTERM handler. # Unblocking interruption on signal. WARNING! ======== This will overwrite data on /dev/md0 irrevocably. Are you sure? (Type uppercase yes): YES # Allocating crypt device /dev/md0 context. # Trying to open and read device /dev/md0. # Initialising device-mapper backend, UDEV is enabled. # Detected dm-crypt version 1.11.1, dm-ioctl version 4.22.0. # Timeout set to 0 miliseconds. # Iteration time set to 2000 miliseconds. # RNG set to 1 (random). # Interactive passphrase entry requested. Enter passphrase: Verify passphrase: # Formatting device /dev/md0 as type LUKS1. # Initialising gcrypt crypto backend. # Topology: IO (131072/262144), offset = 0; Required alignment is 1048576 bytes. # Generating LUKS header version 1 using hash sha512, twofish, xts-plain64, MK 32 bytes # PBKDF2: 109673 iterations per second using hash sha512. # Data offset 4096, UUID dcdd4e2c-c8c9-4c62-aaf7-e417506c5f44, digest iterations 26750 # Updating LUKS header of size 1024 on device /dev/md0 # Reading LUKS header of size 1024 from device /dev/md0 # Adding new keyslot -1 using volume key. # Calculating data for key slot 0 # Key slot 0 use 107101 password iterations. # Using hash sha512 for AF in key slot 0, 4000 stripes # Updating key slot 0 [0x1000] area on device /dev/md0. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-6322 # Udev cookie 0xd4dac4c (semid 294919) created # Udev cookie 0xd4dac4c (semid 294919) incremented # Udev cookie 0xd4dac4c (semid 294919) incremented # Udev cookie 0xd4dac4c (semid 294919) assigned to dm_task type 0 with flags 0xe # dm create temporary-cryptsetup-6322 CRYPT-TEMP-temporary-cryptsetup-6322 OF [16384] # temporary-cryptsetup-6322: Stacking NODE_ADD (252,0) 0:6 0660 # dm reload temporary-cryptsetup-6322 OF [16384] # dm resume temporary-cryptsetup-6322 OF [16384] # temporary-cryptsetup-6322: Stacking NODE_READ_AHEAD 1024 (flags=1) # Udev cookie 0xd4dac4c (semid 294919) decremented # Udev cookie 0xd4dac4c (semid 294919): Waiting for zero ./configure --with-crypto_backend=openssl --enable-dev-random cryptsetup benchmark # Tests are approximate using memory only (no storage IO). cryptsetup: relocation error: cryptsetup: symbol crypt_benchmark_kdf, version CRYPTSETUP_1.0 not defined in file libcryptsetup.so.4 with link time reference _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt