Compare commits

...

3 Commits

Author SHA256 Message Date
bdd111b886 V8.00.000.2025.06.17
All checks were successful
🛡️ Shell Script Linting / 🛡️ Shell Script Linting (push) Successful in 57s
Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
2025-09-05 17:27:47 +02:00
77f82d18eb Merge remote-tracking branch 'origin/master' 2025-09-05 17:26:47 +02:00
35f659b08a V8.00.000.2025.06.17
Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
2025-09-05 17:26:41 +02:00
2 changed files with 4 additions and 2 deletions

View File

@@ -34,7 +34,7 @@ recipe:
time: 256 # The number of milliseconds to spend with PBKDF passphrase processing.
name: "ciss.2025.gpt.btrfs.ephemeral.non-raid.256GiB.rescue"
nuke: true # Activates Nuke-Mechanism in '/etc/crypttab' keyscript and via dropbear SSH forced command.
nuke_rounds: 8192 # SHA512 KDF Rounds for Nuke Passphrase. If omitted, the default value is '8,388,608'.
nuke_rounds: 16384 # SHA512 KDF Rounds for Nuke Passphrase. If omitted, the default value is '8,388,608'.
raid: # mdadm RAID settings only (not yet supported).
enable: false
disks:

View File

@@ -39,6 +39,8 @@ nuke_passphrase() {
' "${DIR_CNF}/preseed.yaml" | head -n1
)"
do_log "debug" "file_only" "0105() var_nuke_rounds: ${var_nuke_rounds}"
[[ ! -f "${var_nuke_pwd_file}" ]] && return 0
guard_trace on
@@ -60,7 +62,7 @@ nuke_passphrase() {
declare -grx VAR_NUKE_HASH="${var_temp_nuke_hash}"
unset var_temp_nuke_hash var_temp_plain_nuke_pwd
do_log "debug" "file_only" "0105() NUKE hash starts with: ${VAR_NUKE_HASH:0:32}..."
do_log "debug" "file_only" "0105() NUKE hash starts with: [${VAR_NUKE_HASH:0:32}...]"
guard_dir && return 0
}