Re: [PATCH v4] cryptodisk: allow user to retry failed passphrase

2024-05-06 Thread Forest
On Mon, 6 May 2024 20:22:48 +0200, Daniel Kiper wrote: >You can make this check much simpler. Please take a look at the commit >ac8a37dda (net/http: Allow use of non-standard TCP/IP ports). I did it that way in order to preserve a feature of Glenn's suggested approach: passing through any grub_er

Re: [PATCH v4] cryptodisk: allow user to retry failed passphrase

2024-05-06 Thread Daniel Kiper via Grub-devel
On Sat, Apr 27, 2024 at 05:48:31PM -0700, Forest wrote: > Give the user a chance to re-enter their cryptodisk passphrase after a typo, > rather than immediately failing (and likely dumping them into a grub shell). > > By default, we allow 3 tries before giving up. A value in the > cryptodisk_passph

Re: [PATCH v4] cryptodisk: allow user to retry failed passphrase

2024-05-03 Thread Maximilian Stendler
Hi, I've had the same issue but build a different solution via scripting[0]: The cryptomount and retries are implemented in a grub.cfg template. With some shell-scripts the actual grub.cfg can be generated and put into a tar used as a memdisk, additionally containing all necessary modules and comp

Re: [PATCH v4] cryptodisk: allow user to retry failed passphrase

2024-04-30 Thread Glenn Washburn
On Sat, 27 Apr 2024 17:48:31 -0700 Forest wrote: > Give the user a chance to re-enter their cryptodisk passphrase after a typo, > rather than immediately failing (and likely dumping them into a grub shell). > > By default, we allow 3 tries before giving up. A value in the > cryptodisk_passphrase

[PATCH v4] cryptodisk: allow user to retry failed passphrase

2024-04-27 Thread Forest
Give the user a chance to re-enter their cryptodisk passphrase after a typo, rather than immediately failing (and likely dumping them into a grub shell). By default, we allow 3 tries before giving up. A value in the cryptodisk_passphrase_tries environment variable will override this default. The