aboutsummaryrefslogtreecommitdiffstats
path: root/udev/ykfde
diff options
context:
space:
mode:
authorGravatar Christian Hesse <mail@eworm.de>2014-03-14 14:30:16 +0100
committerGravatar Christian Hesse <mail@eworm.de>2014-03-14 14:30:16 +0100
commitfd3935d721a43141254f86864b195a6a6ceedd77 (patch)
tree018d4b00d0e03684480eb2f7dbd80b7bcd2a0d30 /udev/ykfde
parent68a220bd2148c9544bf946878304a826fceea54a (diff)
downloadmkinitcpio-ykfde-fd3935d721a43141254f86864b195a6a6ceedd77.tar.gz
mkinitcpio-ykfde-fd3935d721a43141254f86864b195a6a6ceedd77.tar.zst
replace scripts with a C program
Diffstat (limited to 'udev/ykfde')
-rwxr-xr-xudev/ykfde17
1 files changed, 0 insertions, 17 deletions
diff --git a/udev/ykfde b/udev/ykfde
deleted file mode 100755
index 4d3af57..0000000
--- a/udev/ykfde
+++ /dev/null
@@ -1,17 +0,0 @@
-#!/bin/sh
-
-source /etc/ykfde.conf
-
-# Looks like Yubikey is reset after challenge response, triggering
-# yet another add event. Ignore if the file exists.
-[ -s /crypto_keyfile.bin ] && exit 0
-
-# write the response to keyfile
-ykchalresp -${YKFDE_SLOT:-2} "$(cat /ykfde-challenge)" 2>/dev/null | tr -d '\n' > /crypto_keyfile.bin
-
-# if the systemd unit was faster try to answer password agent
-for REQUEST in $(ls -1 /run/systemd/ask-password/ask.* || \
- inotifywait --quiet --format %w%f --event MOVED_TO --timeout 2 /run/systemd/ask-password/); do
- grep -q '^Message=Please enter passphrase for disk' ${REQUEST} || exit 1
- /usr/lib/systemd/systemd-reply-password 1 $(grep '^Socket=' ${REQUEST} | cut -d= -f2) < /crypto_keyfile.bin
-done