From: Frantisek Sumsal Date: Tue, 9 May 2023 20:17:15 +0000 (+0200) Subject: cryptenroll: fix an assertion with weak passwords X-Git-Tag: v254-rc1~524^2~1 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=0e43ab6d245a77aab35c7963ec636f37e6103984;p=thirdparty%2Fsystemd.git cryptenroll: fix an assertion with weak passwords Passing 0 to log_xxx_errno() leads to an assertion, so let's not do that: $ NEWPASSWORD="" build-san/systemd-cryptenroll --unlock-key-file=/tmp/password --password "$img" /tmp/password has 0644 mode that is too permissive, please adjust the ownership and access mode. Assertion '(_error) != 0' failed at src/cryptenroll/cryptenroll-password.c:164, function enroll_password(). Aborting. Aborted (core dumped) --- diff --git a/src/cryptenroll/cryptenroll-password.c b/src/cryptenroll/cryptenroll-password.c index 25a90b59053..72f2165d49c 100644 --- a/src/cryptenroll/cryptenroll-password.c +++ b/src/cryptenroll/cryptenroll-password.c @@ -161,7 +161,7 @@ int enroll_password( if (r < 0) return log_error_errno(r, "Failed to check password for quality: %m"); if (r == 0) - log_warning_errno(r, "Specified password does not pass quality checks (%s), proceeding anyway.", error); + log_warning("Specified password does not pass quality checks (%s), proceeding anyway.", error); keyslot = crypt_keyslot_add_by_volume_key( cd,