Suppose I use cryptsetup to initially create an encrypted file, then 'remove' it. Later I want to use the same file again but I accidentally supply an incorrect passphrase (doesn't match the original passphrase). How can I know, in a shell script, that the passphrase was wrong? >From experimenting it appears that even when I give a bad passphrase the file is still created in /dev/mapper and the return code from cryptsetup is 0 so I only find out that the passphrase was wrong when I attempt to access the file. I would like a way to tell cryptsetup to fail completely (don't change anything and return non-zero) if the passphrase is wrong. Is that possible? -- Robert Lummis --------------------------------------------------------------------- dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx