[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v16 16/20] cryptodisk: Fallback to passphrase
From: |
Gary Lin |
Subject: |
[PATCH v16 16/20] cryptodisk: Fallback to passphrase |
Date: |
Wed, 15 May 2024 13:07:08 +0800 |
From: Patrick Colp <patrick.colp@oracle.com>
If a protector is specified, but it fails to unlock the disk, fall back
to asking for the passphrase. However, an error was set indicating that
the protector(s) failed. Later code (e.g., LUKS code) fails as
`grub_errno` is now set. Print the existing errors out first, before
proceeding with the passphrase.
Signed-off-by: Patrick Colp <patrick.colp@oracle.com>
Signed-off-by: Gary Lin <glin@suse.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
---
grub-core/disk/cryptodisk.c | 17 ++++++++++++++++-
1 file changed, 16 insertions(+), 1 deletion(-)
diff --git a/grub-core/disk/cryptodisk.c b/grub-core/disk/cryptodisk.c
index cfa3e28ce..ffb41a5fe 100644
--- a/grub-core/disk/cryptodisk.c
+++ b/grub-core/disk/cryptodisk.c
@@ -1167,6 +1167,10 @@ grub_cryptodisk_scan_device_real (const char *name,
ret = cr->recover_key (source, dev, cargs);
if (ret != GRUB_ERR_NONE)
{
+ /* Reset key data to trigger the passphrase prompt later */
+ cargs->key_data = NULL;
+ cargs->key_len = 0;
+
part = grub_partition_get_name (source->partition);
grub_dprintf ("cryptodisk",
"recovered a key from key protector %s but it "
@@ -1192,7 +1196,6 @@ grub_cryptodisk_scan_device_real (const char *name,
source->name, source->partition != NULL ? "," : "",
part != NULL ? part : N_("UNKNOWN"), dev->uuid);
grub_free (part);
- goto error;
}
if (cargs->key_len)
@@ -1207,6 +1210,18 @@ grub_cryptodisk_scan_device_real (const char *name,
unsigned long tries = 3;
const char *tries_env;
+ /*
+ * Print the error from key protectors and clear grub_errno.
+ * Since '--protector' doesn't not coexist with '--password' and
+ * '--key-file', only "cargs->key_len == 0" is expected if all
+ * key protectors fail.
+ */
+ if (grub_errno)
+ {
+ grub_print_error ();
+ grub_errno = GRUB_ERR_NONE;
+ }
+
askpass = 1;
cargs->key_data = grub_malloc (GRUB_CRYPTODISK_MAX_PASSPHRASE);
if (cargs->key_data == NULL)
--
2.35.3
- [PATCH v16 05/20] libtasn1: fix the potential buffer overrun, (continued)
- [PATCH v16 05/20] libtasn1: fix the potential buffer overrun, Gary Lin, 2024/05/15
- [PATCH v16 07/20] asn1_test: test module for libtasn1, Gary Lin, 2024/05/15
- [PATCH v16 08/20] libtasn1: Add the documentation, Gary Lin, 2024/05/15
- [PATCH v16 09/20] key_protector: Add key protectors framework, Gary Lin, 2024/05/15
- [PATCH v16 06/20] libtasn1: compile into asn1 module, Gary Lin, 2024/05/15
- [PATCH v16 10/20] tpm2: Add TPM Software Stack (TSS), Gary Lin, 2024/05/15
- [PATCH v16 11/20] key_protector: Add TPM2 Key Protector, Gary Lin, 2024/05/15
- [PATCH v16 12/20] cryptodisk: Support key protectors, Gary Lin, 2024/05/15
- [PATCH v16 13/20] util/grub-protect: Add new tool, Gary Lin, 2024/05/15
- [PATCH v16 14/20] tpm2: Support authorized policy, Gary Lin, 2024/05/15
- [PATCH v16 16/20] cryptodisk: Fallback to passphrase,
Gary Lin <=
- [PATCH v16 17/20] cryptodisk: wipe out the cached keys from protectors, Gary Lin, 2024/05/15
- [PATCH v16 18/20] diskfilter: look up cryptodisk devices first, Gary Lin, 2024/05/15
- [PATCH v16 19/20] tpm2: Enable tpm2 module for grub-emu, Gary Lin, 2024/05/15
- [PATCH v16 15/20] tpm2: Implement NV index, Gary Lin, 2024/05/15
- [PATCH v16 20/20] tests: Add tpm2_test, Gary Lin, 2024/05/15