UDISKS_DM_TARGETS_PARAMS includes the complete table entry, in case of the crypt target this includes the key and iv type.
udisks only needs UDISKS_DM_TARGETS_PARAMS for UDISKS_DM_TARGETS_TYPE == "linear", and is only interested in the major/minor of the device and the offset.
So we should drop the key information for UDISKS_DM_TARGETS_TYPE == "crypt" or only explicitly set major/minor/offset, and/or not set UDISKS_DM_TARGETS_TYPE for anything != "linear".
Original bug: http:// bugs.debian. org/576687
udisks exports the device-mapper table data to udev. This data includes encryption keys.
| E:UDISKS_ DM_TARGETS_ COUNT=1 DM_TARGETS_ TYPE=crypt DM_TARGETS_ START=0 DM_TARGETS_ LENGTH= 1467585 DM_TARGETS_ PARAMS= aes-cbc- essiv:sha256\ x20XXXXXXXXXXXX XXXXXXXXXXXXXXX XXXXX\x200\ x208:5\ x200
| E:UDISKS_
| E:UDISKS_
| E:UDISKS_
| E:UDISKS_
UDISKS_ DM_TARGETS_ PARAMS includes the complete table entry, in case of the crypt target this includes the key and iv type.
udisks only needs UDISKS_ DM_TARGETS_ PARAMS for UDISKS_ DM_TARGETS_ TYPE == "linear", and is only interested in the major/minor of the device and the offset.
So we should drop the key information for UDISKS_ DM_TARGETS_ TYPE == "crypt" or only explicitly set major/minor/offset, and/or not set UDISKS_ DM_TARGETS_ TYPE for anything != "linear".