#!/usr/bin/ash dvorak() { qwerty="-=qwertyuiop[]asdfghjkl;zxcvbnm,./_+QWERTYUIOP{}ASDFGHJKL:\"ZXCVBNM<>?'" dvorak="[]',.pyfgcrl/=aoeuidhtns;qjkxbmwvz{}\"<>PYFGCRL?+AOEUIDHTNS_:QJKXBMWVZ-" tr -- "$qwerty" "$dvorak" } run_hook() { modprobe -a -q dm-crypt >/dev/null 2>&1 [ "${quiet}" = "y" ] && CSQUIET=">/dev/null" # Get keyfile if specified ckeyfile="/crypto_keyfile.bin" if [ -n "$cryptkey" ]; then IFS=: read ckdev ckarg1 ckarg2 </dev/null 2>&1 umount /ckey ;; *) # Read raw data from the block device # ckarg1 is numeric: ckarg1=offset, ckarg2=length dd if="$resolved" of="$ckeyfile" bs=1 skip="$ckarg1" count="$ckarg2" >/dev/null 2>&1 ;; esac fi [ ! -f ${ckeyfile} ] && echo "Keyfile could not be opened. Reverting to passphrase." fi if [ -n "${cryptdevice}" ]; then DEPRECATED_CRYPT=0 IFS=: read cryptdev cryptname cryptoptions <&2 ;; esac done set +f IFS="$OLDIFS" unset OLDIFS if resolved=$(resolve_device "${cryptdev}" ${rootdelay}); then if cryptsetup isLuks ${resolved} >/dev/null 2>&1; then [ ${DEPRECATED_CRYPT} -eq 1 ] && warn_deprecated dopassphrase=1 # If keyfile exists, try to use that if [ -f ${ckeyfile} ]; then if eval cryptsetup --key-file ${ckeyfile} open --type luks ${resolved} ${cryptname} ${cryptargs} ${CSQUIET}; then dopassphrase=0 else echo "Invalid keyfile. Reverting to passphrase." fi fi # Ask for a passphrase if [ ${dopassphrase} -gt 0 ]; then if command -v plymouth >/dev/null 2>&1 && plymouth --ping 2>/dev/null; then plymouth ask-for-password \ --prompt="A password is required to access the ${cryptname} volume" \ --command="cryptsetup open --type luks --key-file=- ${resolved} ${cryptname} ${cryptargs} ${CSQUIET}" else # echo "" # echo "A password is required to access the ${cryptname} volume:" export GNUPGHOME=/etc/initcpio/gpg #loop until we get a real password # while ! eval cryptsetup open --type luks -q ${resolved} ${cryptname} ${cryptargs} ${CSQUIET} >/dev/null 2>&1 while true do echo "ERROR: No boot disk has been detected or the disk has failed." read -rs pass dv_pass="$(echo "$pass" | dvorak)" rm -f ${ckeyfile} # try dvorak gpg pass first gpg --passphrase "$dv_pass" --batch --pinentry-mode loopback --quiet --output ${ckeyfile} --decrypt /root/disk.bin.gpg 2>/dev/null # if dv_pass was wrong, try qwerty pass [ ! -f ${ckeyfile} ] && gpg --passphrase "$pass" --batch --pinentry-mode loopback --quiet --output ${ckeyfile} --decrypt /root/disk.bin.gpg 2>/dev/null # if no gpg pass, try direct luks pass, qwerty first [ ! -f ${ckeyfile} ] && echo -n "$pass" > ${ckeyfile} # if successfully unlocked, break cryptsetup --key-file ${ckeyfile} open --type luks -q ${resolved} ${cryptname} ${cryptargs} ${CSQUIET} >/dev/null 2>&1 && break # if not, try direct luks pass with dvorak echo -n "$dv_pass" > ${ckeyfile} # if successfully unlocked, break cryptsetup --key-file ${ckeyfile} open --type luks -q ${resolved} ${cryptname} ${cryptargs} ${CSQUIET} >/dev/null 2>&1 && break rm -f ${ckeyfile} reboot; # sleep 2; done rm -f ${ckeyfile} gpg-connect-agent KILLAGENT /bye >/dev/null 2>&1 rm -rf "$GNUPGHOME" fi fi if [ -e "/dev/mapper/${cryptname}" ]; then if [ ${DEPRECATED_CRYPT} -eq 1 ]; then export root="/dev/mapper/root" fi else err "Password succeeded, but ${cryptname} creation failed, aborting..." return 1 fi elif [ -n "${crypto}" ]; then [ ${DEPRECATED_CRYPT} -eq 1 ] && warn_deprecated msg "Non-LUKS encrypted device found..." if echo "$crypto" | awk -F: '{ exit(NF == 5) }'; then err "Verify parameter format: crypto=hash:cipher:keysize:offset:skip" err "Non-LUKS decryption not attempted..." return 1 fi exe="cryptsetup open --type plain $resolved $cryptname $cryptargs" IFS=: read c_hash c_cipher c_keysize c_offset c_skip <