mirror of
https://github.com/linuxboot/heads.git
synced 2024-12-19 21:17:55 +00:00
functions: prompt_tpm_owner_password only reuses /tmp/secret/tpm_owner_password if already created by seal functions or itself. Sealing ops not being able to reuse the file shred it (kexec-seal-key and seal-totp)
Signed-off-by: Thierry Laurion <insurgo@riseup.net>
This commit is contained in:
parent
921acd0f6f
commit
48c446cd7d
@ -194,11 +194,8 @@ list_usb_storage() {
|
||||
# line, since some flows need it multiple times and only one prompt is ideal.
|
||||
prompt_tpm_owner_password() {
|
||||
TRACE "Under /etc/functions:prompt_tpm_owner_password"
|
||||
#Caller might already have cached the password in tpm_password. If not, prompt for it and cache it externally
|
||||
if [ -n "$tpm_owner_password" ]; then
|
||||
DEBUG "tpm_owner_password variable already set by caller. Reusing"
|
||||
return 0
|
||||
elif [ -s /tmp/secret/tpm_owner_password ]; then
|
||||
|
||||
if [ -s /tmp/secret/tpm_owner_password ]; then
|
||||
DEBUG "/tmp/secret/tpm_owner_password already cached in file. Reusing"
|
||||
tpm_owner_password=$(cat /tmp/secret/tpm_owner_password)
|
||||
return 0
|
||||
|
Loading…
Reference in New Issue
Block a user