OXIESEC PANEL
- Current Dir:
/
/
snap
/
core24
/
988
/
usr
/
lib
/
cryptsetup
/
scripts
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/04/2025 04:37:50 PM
rwxr-xr-x
📄
decrypt_derived
1.08 KB
06/05/2024 01:46:49 PM
rwxr-xr-x
📄
decrypt_gnupg
570 bytes
06/05/2024 01:46:49 PM
rwxr-xr-x
📄
decrypt_gnupg-sc
953 bytes
06/05/2024 01:46:49 PM
rwxr-xr-x
📄
decrypt_keyctl
1.99 KB
06/05/2024 01:46:49 PM
rwxr-xr-x
📄
decrypt_opensc
1.36 KB
06/05/2024 01:46:49 PM
rwxr-xr-x
📄
decrypt_ssl
347 bytes
06/05/2024 01:46:49 PM
rwxr-xr-x
📄
passdev
14.3 KB
11/14/2024 03:44:47 AM
rwxr-xr-x
Editing: decrypt_gnupg-sc
Close
#!/bin/sh if [ -d "/cryptroot/gnupghome" ]; then export GNUPGHOME="/cryptroot/gnupghome" fi run_gpg() { gpg --no-options --trust-model=always "$@" } decrypt_gpg () { local console _ if ! GPG_TTY="$(tty)"; then read console _ </proc/consoles GPG_TTY="/dev/$console" fi export GPG_TTY if ! run_gpg --decrypt -- "$1"; then return 1 fi return 0 } # `gpg-connect-agent LEARN /bye` is another (lighter) way, but it's # harder to retrieve the return code if ! run_gpg --batch --quiet --no-tty --card-status >/dev/null; then echo "Please insert OpenPGP SmartCard..." >&2 until run_gpg --batch --quiet --no-tty --card-status; do sleep 1 done >/dev/null 2>&1 fi if [ ! -x /usr/bin/gpg ]; then echo "$0: /usr/bin/gpg is not available" >&2 exit 1 fi if [ -z "$1" ] || [ ! -f "$1" ]; then echo "$0: missing key as argument" >&2 exit 1 fi decrypt_gpg "$1" exit $?