Displaying 6 results from an estimated 6 matches for "is_bitlock".
Did you mean:
is_bitlocker
2020 Oct 06
2
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...r.h>
>@@ -82,11 +83,23 @@ inspect_do_decrypt (guestfs_h *g, struct key_store *ks)
> CLEANUP_FREE char *type = guestfs_vfs_type (g, partitions[i]);
> if (type &&
> (STREQ (type, "crypto_LUKS") || STREQ (type, "BitLocker"))) {
>+ bool is_bitlocker = STREQ (type, "BitLocker");
> char mapname[32];
> make_mapname (partitions[i], mapname, sizeof mapname);
>
> #ifdef GUESTFS_HAVE_LUKS_UUID
>- CLEANUP_FREE char *uuid = guestfs_luks_uuid (g, partitions[i]);
>+ CLEANUP_FREE char *uuid;
>+ i...
2020 Oct 07
2
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...nspect_do_decrypt (guestfs_h *g, struct key_store *ks)
>> > CLEANUP_FREE char *type = guestfs_vfs_type (g, partitions[i]);
>> > if (type &&
>> > (STREQ (type, "crypto_LUKS") || STREQ (type, "BitLocker"))) {
>> >+ bool is_bitlocker = STREQ (type, "BitLocker");
>> > char mapname[32];
>> > make_mapname (partitions[i], mapname, sizeof mapname);
>> >
>> >#ifdef GUESTFS_HAVE_LUKS_UUID
>> >- CLEANUP_FREE char *uuid = guestfs_luks_uuid (g, partitions[i]);
>&g...
2020 Oct 06
0
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...2,11 +83,23 @@ inspect_do_decrypt (guestfs_h *g, struct key_store *ks)
> > CLEANUP_FREE char *type = guestfs_vfs_type (g, partitions[i]);
> > if (type &&
> > (STREQ (type, "crypto_LUKS") || STREQ (type, "BitLocker"))) {
> >+ bool is_bitlocker = STREQ (type, "BitLocker");
> > char mapname[32];
> > make_mapname (partitions[i], mapname, sizeof mapname);
> >
> >#ifdef GUESTFS_HAVE_LUKS_UUID
> >- CLEANUP_FREE char *uuid = guestfs_luks_uuid (g, partitions[i]);
> >+ CLEANUP_FR...
2020 Oct 09
0
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...t (guestfs_h *g, struct key_store *ks)
>>> > CLEANUP_FREE char *type = guestfs_vfs_type (g, partitions[i]);
>>> > if (type &&
>>> > (STREQ (type, "crypto_LUKS") || STREQ (type, "BitLocker"))) {
>>> >+ bool is_bitlocker = STREQ (type, "BitLocker");
>>> > char mapname[32];
>>> > make_mapname (partitions[i], mapname, sizeof mapname);
>>> >
>>> >#ifdef GUESTFS_HAVE_LUKS_UUID
>>> >- CLEANUP_FREE char *uuid = guestfs_luks_uuid (g, pa...
2020 Sep 07
5
[PATCH common v2 0/4] Windows BitLocker support.
For links to the original patch series, see:
https://bugzilla.redhat.com/show_bug.cgi?id=1808977#c8
The original feedback was that ignoring errors from guestfs_luks_uuid
would ignore legitimate errors from non-BitLocker disks, so I have
modified this series so that errors are only ignored in the BitLocker
case. As noted in the 4th patch there is no actual error in the
BitLocker case, cryptsetup
2020 Sep 07
0
[PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...;
#include <error.h>
@@ -82,11 +83,23 @@ inspect_do_decrypt (guestfs_h *g, struct key_store *ks)
CLEANUP_FREE char *type = guestfs_vfs_type (g, partitions[i]);
if (type &&
(STREQ (type, "crypto_LUKS") || STREQ (type, "BitLocker"))) {
+ bool is_bitlocker = STREQ (type, "BitLocker");
char mapname[32];
make_mapname (partitions[i], mapname, sizeof mapname);
#ifdef GUESTFS_HAVE_LUKS_UUID
- CLEANUP_FREE char *uuid = guestfs_luks_uuid (g, partitions[i]);
+ CLEANUP_FREE char *uuid;
+ if (!is_bitlocker)
+...