Could you post the /etc/crypto line, minus any hashed password or key info, and the directory contents of /dev/mapper/ and /proc/crypto/ and the results of "lsmod | grep dm_".
The fstab entry should look like this:
Code:
/dev/mapper/cr_cryptfile /home/jschiwal/cryptdir ext3 acl,user_xattr,noauto 0 0
There should be a line in crypttab that starts with the crypto device name. That is the device to use in /etc/fstab.
The example I posted is a loop crypto device.
It is the device part that you got wrong. However, reiser isn't supported by SuSE anymore so you might want to use a different filesystem.
If you make yourself the owner of the mounted filesystem, and add the options "noauto,user" for the options, you can mount it yourself without using sudo. Change the permissions to rwx------. Now you can even put the mount command in ~/.profile to mount it when you login.
You are encrypting a partition and not a file, but I think that the you want to look in /dev/mapper/ for the device. ( I wan't willing to repartition my drive to test that out )