You are not logged in.
I am trying to operate tcplay (encryption application) from the command line and I'm baffled. I have done this in the past, at least with veracrypt, and it was a matter of simply specifying the device (a whole partition in my case) and a mount point. It was something like :
veracrypt --create /dev/sdb2... to create an encrypted partition (it would then ask for a password),
and something like :
veracrypt --mount /dev/sdb2 /mnt/secrets... to view the partition contents decrypted (it would then ask for a password)
and something like
veracrypt --dismount /mnt/secrets... to unmount the partition
But tcplay seems completely different. Although creation seems to follow the same principle, the man page only talks of "mapping", not "mounting". The manual gives as example (ignoring hidden volumes and and non-default encryption options) :
tcplay --map=truecrypt1 --device=/dev/vn0This presumably identifies the device (a partition) as an entity called "truecrypt1", but does nothing about mounting it on the file system.
The man page example goes on with :
losetup /dev/loop1 secvol --map = secv --device = /dev/loop1
mount /dev/mapper/secv /mntHow has this complexity arisen? What have loop devices got to do with it? It now takes three lines to mount an encrypted volume? Is this something of systemd's doing? I have a veracrypt encrypted partition from an earlier Chimera installation and I'm a bit reluctant to try mounting it with this new methodology in case it foobars it all.
Offline
I never used that kind of tools.
But one thing I know for sure: Truecrypt is no more maintained for now about 12 years or so. So I am not astonished that Veracrypt is a bit more comfortable.
Offline
There is cryptsetup which according to its man page handles VeraCrypt encryption format.
It still will need two separate steps, like
cryptsetup open --type tcrypt /dev/sdb2 secrets
mount /dev/mapper/secrets /mnt/secretsThe first step creates the virtual partition (/dev/mapper/secrets) being the decryption of the real partition (/dev/sdb2), and the second step mounts that partition's filesystem on /mnt/secrets.
As per man page, if the VeraCrypt encryption has "personalized iteration count", you may need additional options to the open command.
Afaict tcplay does the same thing as cryptsetup, i.e. it creates that virtual partition for decrypted content access, and it doesn't mix in the filesystem mounting (which is an interpretation of the decrypted content).
Offline