On Tue, Jun 13, 2006 at 04:00:08PM +0400, Maxim Timofeyev wrote: > For some reason it is impossible to create crypto fs... > > # for i in aes anubis arc4 blowfish cast5 cast6 crypto_null deflate des khazad > md4 md5 michael_mic serpent sha1 sha256 sha512 tcrypt tea twofish wp512; do > modprobe $i; done > > # echo 123 | losetup -e sha1 -k 128 -p 0 /dev/loop0 /dev/md4 > ioctl: LOOP_SET_STATUS: Invalid argument, requested cipher or key length (128 > bits) not supported by kernel You're doing something weird. SHA-1 is a message digest (hashing) algorithm, you can't use it as the cipher for encrypting a filesystem. Also, most of the time you should not be specifying an explicit key size (the -k option). Once you choose a cipher, there are only a few or even a single valid key size for that cipher. If you try to specify another (invalid) key size, you will get an error message such as the above. -- Alexander Peslyak <solar at openwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments
This archive was generated by hypermail 2.1.3 : Thu Jun 15 2006 - 08:28:22 PDT