Re: Cryptsetup return cade

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jonas Meurer wrote:

try 'cryptsetup --version' to verify that the binary really belongs to
1.0.2+1.0.3-rc3-1.

I can't really do that very easily because it's encapsulated in initrd.

do you use plain dm-crypt ('cryptsetup create') or luks

LUKS.  So it's cryptsetup luksOpen

cryptsetup luksOpen indeed exits with code 255 if you enter a wrong
passphrase. but i tested 1.0.3-1, which is not in debian/unstable yet.

It always used to work. I suspect it's been broken and then fixed but I'm surprised nobody else has noticed.

try
# cryptsetup luksOpen /dev/device name; echo "RETURNCODE: $?"
to see which returncode cryptsetup gives.

if the code is always 0, you should wait for cryptsetup 1.0.3-1 to enter
debian/unstable.

And the useful info....

cryptsetup luksOpen /dev/hda xxx ; echo "RETURNCODE: $?"
Enter LUKS passphrase:
Command failed: No key available with this passphrase.

RETURNCODE: 0

cryptsetup --version
cryptsetup-luks 1.0.3-rc3

Dick


---------------------------------------------------------------------
 - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux