Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
Linux Magazine

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Glossary
MoreInfo
Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
FAQ
Copyright Info
Terms of Use
Privacy Info
Disclaimer
WorkBoard
Thanks
Donations
Advertising
Masthead / Impressum
Your Account

Communication
Feedback
Forums
Private Messages
Surveys

Features
HOWTOs
News Archive
Submit News
Topics
User Articles
Web Links

Google
Google


The Web
linux-tutorial.info

Who's Online
There are currently, 86 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here

  

losetup



SYNOPSIS

       losetup [ -e encryption ] [ -o offset ] [ -t timeout ]
       loop_device file
       losetup [ -d ] loop_device


DESCRIPTION

       losetup is used to associate  loop  devices  with  regular
       files  or  block  devices,  to  detach loop devices and to
       query the status of a loop device. If only the loop_device
       argument  is  given,  the status of the corresponding loop
       device is shown.


OPTIONS

       -d     detach the file or device associated with the spec­
              ified loop device.

       -e encryption
              enable  data encryption. The following keywords are
              recognized:

              NONE   use no encryption (default).
              XOR    use a simple XOR encryption.
              Blowfish
                     use Blowfish encryption. Blowfish encryption
                     is  only  available  if  you  are  using the
                     international kernel and Blowfish encryption
                     has been enabled in the Crypto API.
              Twofish
                     use  Twofish  encryption. Twofish encryption
                     is only  available  if  you  are  using  the
                     international  kernel and Twofish encryption
                     has been enabled in the Crypto API.
              CAST   use CAST encryption. CAST encryption is only
                     available if you are using the international
                     kernel and CAST encryption has been  enabled
                     in the Crypto API.
              DES    use  DES  encryption. DES encryption is only
                     available if the optional  DES  package  has
                     been  added  to  the  kernel. DES encryption
                     uses an additional start value that is  used
                     to   protect  passwords  against  dictionary
                     attacks. Use of DES is deprecated.
              DFC    use DFC encryption. DFC encryption  is  only
                     available if you are using the international
                     kernel and DFC encryption has  been  enabled
                     in the Crypto API.
              IDEA   use IDEA encryption. IDEA encryption is only
                     available if you are using the international
                     kernel  and IDEA encryption has been enabled
                     in the Crypto API.
              MARS   use MARS encryption. MARS encryption is only
                     available if you are using the international
                     has been enabled in the Crypto API.

       -o offset
              the data start is moved offset bytes into the spec­
              ified file or device.

       -t timeout
              make  the  password  prompt  time out after timeout
              seconds have passed by.


RETURN VALUE

       losetup returns 0 on success,  nonzero  on  failure.  When
       losetup displays the status of a loop device, it returns 1
       if the device is not configured and 2 if an error occurred
       which prevented losetup from determining the status of the
       device.


FILES

       /dev/loop0,/dev/loop1,...   loop devices (major=7)
       /proc/cipher/*              available ciphers


EXAMPLE

       If you are using the loadable module  you  must  have  the
       module loaded first with the command

              # insmod loop.o

       The  following commands can be used as an example of using
       the loop device.

              dd if=/dev/zero of=/file bs=1k count=100
              losetup -e blowfish /dev/loop0 /file
              Password :
              mkfs -t ext2 /dev/loop0 100
              mount -t ext2 /dev/loop0 /mnt
               ...
              umount /dev/loop0
              losetup -d /dev/loop0

       If you are using the loadable module you  may  remove  the
       module with the command

              # rmmod loop


RESTRICTIONS

       DES  encryption  is painfully slow. On the other hand, XOR
       is terribly weak. Both are insecure nowadays. Some ciphers
       require a licence for you to be allowed to use them.


BUGS


  




Login
Nickname

Password

Security Code
Security Code
Type Security Code


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!


Amazon Wish List

Did You Know?
You can choose larger fonts by selecting a different themes.


Friends



Tell a Friend About Us

Bookmark and Share



Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.11 Seconds