All of lore.kernel.org
 help / color / mirror / Atom feed
From: development@efficientek.com
To: grub-devel@gnu.org
Cc: Glenn Washburn <development@efficientek.com>,
	Daniel Kiper <daniel.kiper@oracle.com>,
	Patrick Steinhardt <ps@pks.im>
Subject: [PATCH 05/17] luks: Add support for LUKS2 in (proc)/luks_script
Date: Wed, 29 Jul 2020 16:50:10 -0500	[thread overview]
Message-ID: <9eab0e91e2287186914c0d187162673565af592d.1596056714.git.development@efficientek.com> (raw)
In-Reply-To: <cover.1596056714.git.development@efficientek.com>

From: Glenn Washburn <development@efficientek.com>

Signed-off-by: Glenn Washburn <development@efficientek.com>
---
 grub-core/disk/cryptodisk.c | 18 ++++++++++--------
 1 file changed, 10 insertions(+), 8 deletions(-)

diff --git a/grub-core/disk/cryptodisk.c b/grub-core/disk/cryptodisk.c
index c21be7d52..f6b6302e1 100644
--- a/grub-core/disk/cryptodisk.c
+++ b/grub-core/disk/cryptodisk.c
@@ -1210,12 +1210,14 @@ luks_script_get (grub_size_t *sz)
   *sz = 0;
 
   for (i = cryptodisk_list; i != NULL; i = i->next)
-    if (grub_strcmp (i->modname, "luks") == 0)
+    if (grub_strncmp (i->modname, "luks", 4) == 0)
       {
-	size += sizeof ("luks_mount ");
+	size += grub_strlen (i->modname);
+	size += sizeof ("_mount");
 	size += grub_strlen (i->uuid);
 	size += grub_strlen (i->cipher->cipher->name);
-	size += 54;
+	/* mode + mode_iv + spaces + offset + sector size + ??? + '\n' + NULL */
+	size += 5 + 8 + 5 + 20 + 4 + 16 + 1 + 1;
 	if (i->essiv_hash)
 	  size += grub_strlen (i->essiv_hash->name);
 	size += i->keysize * 2;
@@ -1228,16 +1230,16 @@ luks_script_get (grub_size_t *sz)
   ptr = ret;
 
   for (i = cryptodisk_list; i != NULL; i = i->next)
-    if (grub_strcmp (i->modname, "luks") == 0)
+    if (grub_strncmp (i->modname, "luks", 4) == 0)
       {
 	unsigned j;
 	const char *iptr;
-	ptr = grub_stpcpy (ptr, "luks_mount ");
+	ptr = grub_stpcpy (ptr, i->modname);
+	ptr = grub_stpcpy (ptr, "_mount ");
 	ptr = grub_stpcpy (ptr, i->uuid);
 	*ptr++ = ' ';
-	grub_snprintf (ptr, 21, "%" PRIuGRUB_UINT64_T " ", i->offset);
-	while (*ptr)
-	  ptr++;
+	ptr += grub_snprintf (ptr, 21, "%" PRIuGRUB_UINT64_T " ", i->offset);
+	ptr += grub_snprintf (ptr, 6, "%d ", 1 << i->log_sector_size);
 	for (iptr = i->cipher->cipher->name; *iptr; iptr++)
 	  *ptr++ = grub_tolower (*iptr);
 	switch (i->mode)
-- 
2.25.1



  parent reply	other threads:[~2020-07-29 21:52 UTC|newest]

Thread overview: 31+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-07-29 21:50 [PATCH 00/17] Fixes and improvements for cryptodisks+luks2 and a few other things development
2020-07-29 21:50 ` [PATCH 01/17] configure: Add Ubuntu dejavu font path development
2020-07-29 22:08   ` David Michael
2020-07-30 21:14     ` Mike Gilbert
2020-07-29 21:50 ` [PATCH 02/17] cryptodisk: Fix cipher IV mode 'plain64' always being set as 'plain' development
2020-07-29 21:50 ` [PATCH 03/17] cryptodisk: Incorrect calculation of start sector for grub_disk_read in grub_cryptodisk_read development
2020-07-29 21:50 ` [PATCH 04/17] cryptodisk: Add more verbosity when reading/writing cryptodisks development
2020-07-29 21:50 ` development [this message]
2020-07-30 15:14   ` [PATCH 05/17] luks: Add support for LUKS2 in (proc)/luks_script Patrick Steinhardt
2020-07-30 20:38     ` Glenn Washburn
2020-07-29 21:50 ` [PATCH 06/17] luks2: grub_cryptodisk_t->total_length is the max number of device native sectors development
2020-07-30 15:21   ` Patrick Steinhardt
2020-07-30 21:03     ` Glenn Washburn
2020-07-29 21:50 ` [PATCH 07/17] cryptodisk, luks: Allow special processing for comparing UUIDs development
2020-07-30 15:24   ` [PATCH 07/17] cryptodisk,luks: " Patrick Steinhardt
2020-07-30 21:29     ` Glenn Washburn
2020-07-29 21:50 ` [PATCH 08/17] cryptodisk: Unregister cryptomount command when removing module development
2020-07-29 21:50 ` [PATCH 09/17] fs: When checking if a block list goes past the end of the disk, make sure the total size of the disk is in grub native sector sizes, otherwise there will be blocks at the end of the disk unaccessible by block lists development
2020-07-30 15:26   ` Patrick Steinhardt
2020-07-29 21:50 ` [PATCH 10/17] cryptodisk: Properly handle non-512 byte sized sectors development
2020-07-29 21:50 ` [PATCH 11/17] cryptodisk: Rename total_length field in grub_cryptodisk_t to total_sectors development
2020-07-30 15:29   ` Patrick Steinhardt
2020-07-30 21:58     ` Glenn Washburn
2020-07-29 21:50 ` [PATCH 12/17] fs: Allow number of blocks in block list to be optional, where length will be defaulted to the length of the device development
2020-07-29 21:50 ` [PATCH 13/17] loopback: Add procfs entry 'loopbacks' to output configured loopback devices development
2020-07-29 21:50 ` [PATCH 14/17] cryptodisk: Add header line to procfs entry and crypto and source device names development
2020-07-29 21:50 ` [PATCH 15/17] cryptodisk: Add a couple comments noting the usage of a couple fields in grub_cryptodisk_t as is done for grub_disk_t development
2020-07-29 21:50 ` [PATCH 16/17] luks2: Ensure that bit fields of grub_luks2_digest_t in luks2_parse_digest are initialized before returning development
2020-07-29 21:50 ` [PATCH 17/17] luks2: Fix use of incorrect index and some error messages development
2020-07-30 20:22   ` Patrick Steinhardt
2020-07-30 22:04     ` Glenn Washburn

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9eab0e91e2287186914c0d187162673565af592d.1596056714.git.development@efficientek.com \
    --to=development@efficientek.com \
    --cc=daniel.kiper@oracle.com \
    --cc=grub-devel@gnu.org \
    --cc=ps@pks.im \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.