From: Gary Lin Date: Fri, 29 Dec 2023 09:08:20 +0000 (+0800) Subject: tests: Switch password quality check off for luks2 test X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=5a311d029fb3b0526551ea89b8f16842355f0d03;p=thirdparty%2Fgrub.git tests: Switch password quality check off for luks2 test When adding/changing the password for the luks2 partition, cryptsetup may reject the command due to the weak password. Since this is only for testing, add "--force-password" to switch password quality check off to avoid the unexpected failure. Signed-off-by: Gary Lin Reviewed-by: Glenn Washburn Reviewed-by: Daniel Kiper --- diff --git a/tests/grub_cmd_cryptomount.in b/tests/grub_cmd_cryptomount.in index 4578ab709..f4d8f3547 100644 --- a/tests/grub_cmd_cryptomount.in +++ b/tests/grub_cmd_cryptomount.in @@ -173,7 +173,7 @@ eval testcase_fail "'LUKS2 test with argon2 pbkdf:'" \ # Add good password to second slot and change first slot to unchecked password csscript=`mktemp "${TMPDIR:-/tmp}/tmp.XXXXXXXXXX"` || exit 99 cat >$csscript <<'EOF' - CSOPTS="--pbkdf-force-iterations 1000 --pbkdf=pbkdf2" + CSOPTS="--pbkdf-force-iterations 1000 --pbkdf=pbkdf2 --force-password" cryptsetup $CSOPTS --key-file $lukskeyfile luksAddKey $luksdiskfile $lukskeyfile echo "newpass" | cryptsetup $CSOPTS --key-file $lukskeyfile --key-slot 0 luksChangeKey $luksdiskfile EOF