Apache/2.4.7 (Ubuntu) Linux sman1baleendah 3.13.0-24-generic #46-Ubuntu SMP Thu Apr 10 19:11:08 UTC 2014 x86_64 uid=33(www-data) gid=33(www-data) groups=33(www-data) safemode : OFF MySQL: ON | Perl: ON | cURL: OFF | WGet: ON > / lib / cryptsetup / scripts / | server ip : 172.67.156.115 your ip : 172.69.7.142 H O M E |
Filename | /lib/cryptsetup/scripts/decrypt_derived |
Size | 1.19 kb |
Permission | rwxr-xr-x |
Owner | root : root |
Create time | 27-Apr-2025 10:01 |
Last modified | 02-Nov-2013 01:50 |
Last accessed | 05-Jul-2025 18:10 |
Actions | edit | rename | delete | download (gzip) |
View | text | code | image |
#!/bin/sh
# WARNING: If you use the decrypt_derived keyscript for devices with
# persistent data (i.e. not swap or temp devices), then you will lose
# access to that data permanently if something damages the LUKS header
# of the LUKS device you derive from. The same applies if you luksFormat
# the device, even if you use the same passphrase(s). A LUKS header
# backup, or better a backup of the data on the derived device may be
# a good idea. See the Cryptsetup FAQ on how to do this right.
countlines() {
local IFS input count tmp
input="$1"
count=0
IFS='
'
for tmp in $input; do
count=$(( $count + 1 ))
done
echo $count
}
if [ -z "$1" ]; then
echo "$0: must be executed with a crypto device as argument" >&2
exit 1
fi
if ! device=$(dmsetup --showkeys table 2>/dev/null | grep "^$1:"); then
echo "$0: failed to find $1 in dmtable" >&2
exit 1
fi
if [ -z "$device" ]; then
echo "$0: device $1 doesn't exist" >&2
exit 1
fi
count=$(countlines "$device")
if [ $count -ne 1 ]; then
echo "$0: more than one device match $1" >&2
exit 1
fi
eval set -- $device
type="$4"
key="$6"
if [ "$type" != "crypt" ]; then
echo "$0: device $1 is not a crypto device" >&2
exit 1
fi
echo -n "$key"
exit 0
# WARNING: If you use the decrypt_derived keyscript for devices with
# persistent data (i.e. not swap or temp devices), then you will lose
# access to that data permanently if something damages the LUKS header
# of the LUKS device you derive from. The same applies if you luksFormat
# the device, even if you use the same passphrase(s). A LUKS header
# backup, or better a backup of the data on the derived device may be
# a good idea. See the Cryptsetup FAQ on how to do this right.
countlines() {
local IFS input count tmp
input="$1"
count=0
IFS='
'
for tmp in $input; do
count=$(( $count + 1 ))
done
echo $count
}
if [ -z "$1" ]; then
echo "$0: must be executed with a crypto device as argument" >&2
exit 1
fi
if ! device=$(dmsetup --showkeys table 2>/dev/null | grep "^$1:"); then
echo "$0: failed to find $1 in dmtable" >&2
exit 1
fi
if [ -z "$device" ]; then
echo "$0: device $1 doesn't exist" >&2
exit 1
fi
count=$(countlines "$device")
if [ $count -ne 1 ]; then
echo "$0: more than one device match $1" >&2
exit 1
fi
eval set -- $device
type="$4"
key="$6"
if [ "$type" != "crypt" ]; then
echo "$0: device $1 is not a crypto device" >&2
exit 1
fi
echo -n "$key"
exit 0