вт, 10 нояб. 2020 г. в 00:34, Glenn Washburn :
>
> On Mon, 9 Nov 2020 10:56:51 +0300
> Dmitry wrote:
>
> > Thanks for feedback. First of all I think it's preferable to introduce
> > the master-key option at the beginning. Because I see no point for a
> > user to use a standard slot key along with
On Mon, 9 Nov 2020 10:56:51 +0300
Dmitry wrote:
> Thanks for feedback. First of all I think it's preferable to introduce
> the master-key option at the beginning. Because I see no point for a
> user to use a standard slot key along with a detached header.
> Decryption from key to master key takes
This header uses types defined in but does not include it,
which leads to lead compile errors like the following:
../include/grub/cpu/linux.h:27:3: error: unknown type name ‘grub_uint32_t’
27 | grub_uint32_t code0; /* Executable code */
| ^
Signed-off-by: Javier Martine
And it seems the next function can be used to allow
keyfile-offset and keyfile-size:
file.h:
grub_file_t
grub_file_offset_open (grub_file_t parent, enum grub_file_type type,
grub_off_t start, grub_off_t size);
So only grub_cmd_cryptomount can be modified for this.
Dmitry
пн, 9 нояб. 2020 г.