Hi, this is the fifth version of my patch series which fixes decoding of digests and salts in LUKS2 headers in case they happen to contain escaped characters. While modern cryptsetup versions in fact don't escape any characters part of the Base64 alphabet, old versions of cryptsetup did this until v2.0.2.
Changes compared to v4 include mostly style-related fixes pointed out by Daniel. Please refer to the range-diff below. Patrick Patrick Steinhardt (2): json: Add function to unescape JSON-encoded strings luks2: Fix decoding of digests and salts with escaped chars grub-core/disk/luks2.c | 28 +++++++-- grub-core/lib/json/json.c | 118 ++++++++++++++++++++++++++++++++++++++ grub-core/lib/json/json.h | 12 ++++ 3 files changed, 154 insertions(+), 4 deletions(-) Range-diff against v4: 1: c2233323a ! 1: ebab6b092 json: Add function to unescape JSON-encoded strings @@ grub-core/lib/json/json.c: grub_json_getint64 (grub_int64_t *out, const grub_jso + grub_size_t inpos, resultpos; + char *result; + -+ if (!out || !outlen) -+ return grub_error (GRUB_ERR_BAD_ARGUMENT, "Output parameters are not set"); ++ if (out == NULL || outlen == NULL) ++ return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("output parameters are not set")); + + result = grub_calloc (1, inlen + 1); -+ if (!result) ++ if (result == NULL) + return GRUB_ERR_OUT_OF_MEMORY; + + for (inpos = resultpos = 0; inpos < inlen; inpos++) @@ grub-core/lib/json/json.c: grub_json_getint64 (grub_int64_t *out, const grub_jso + inpos++; + if (inpos >= inlen) + { -+ ret = grub_error (GRUB_ERR_BAD_ARGUMENT, "Expected escaped character"); ++ ret = grub_error (GRUB_ERR_BAD_ARGUMENT, N_("expected escaped character")); + goto err; + } + + switch (in[inpos]) + { + case '"': -+ result[resultpos++] = '"'; break; ++ result[resultpos++] = '"'; ++ break; ++ + case '/': -+ result[resultpos++] = '/'; break; ++ result[resultpos++] = '/'; ++ break; ++ + case '\\': -+ result[resultpos++] = '\\'; break; ++ result[resultpos++] = '\\'; ++ break; ++ + case 'b': -+ result[resultpos++] = '\b'; break; ++ result[resultpos++] = '\b'; ++ break; ++ + case 'f': -+ result[resultpos++] = '\f'; break; ++ result[resultpos++] = '\f'; ++ break; ++ + case 'r': -+ result[resultpos++] = '\r'; break; ++ result[resultpos++] = '\r'; ++ break; ++ + case 'n': -+ result[resultpos++] = '\n'; break; ++ result[resultpos++] = '\n'; ++ break; ++ + case 't': -+ result[resultpos++] = '\t'; break; ++ result[resultpos++] = '\t'; ++ break; ++ + case 'u': + { -+ unsigned char values[4] = {0}; -+ int i; ++ char values[4] = {0}; ++ unsigned i; + + inpos++; + if (inpos + ARRAY_SIZE(values) > inlen) + { -+ ret = grub_error (GRUB_ERR_BAD_ARGUMENT, "Unicode sequence too short"); ++ ret = grub_error (GRUB_ERR_BAD_ARGUMENT, N_("unicode sequence too short")); + goto err; + } + -+ for (i = 0; i < 4; i++) ++ for (i = 0; i < ARRAY_SIZE(values); i++) + { + char c = in[inpos++]; + @@ grub-core/lib/json/json.c: grub_json_getint64 (grub_int64_t *out, const grub_jso + else + { + ret = grub_error (GRUB_ERR_BAD_ARGUMENT, -+ "Unicode sequence with invalid character '%c'", c); ++ N_("unicode sequence with invalid character '%c'"), c); + goto err; + } + } @@ grub-core/lib/json/json.c: grub_json_getint64 (grub_int64_t *out, const grub_jso + + break; + } ++ + default: -+ ret = grub_error (GRUB_ERR_BAD_ARGUMENT, "Unrecognized escaped character '%c'", in[inpos]); ++ ret = grub_error (GRUB_ERR_BAD_ARGUMENT, N_("unrecognized escaped character '%c'"), in[inpos]); + goto err; + } + } @@ grub-core/lib/json/json.c: grub_json_getint64 (grub_int64_t *out, const grub_jso + *out = result; + *outlen = resultpos; + -+err: ++ err: + if (ret != GRUB_ERR_NONE) + grub_free (result); + 2: 84370adba ! 2: 60ccd669d luks2: Fix decoding of digests and salts with escaped chars @@ grub-core/disk/luks2.c: luks2_scan (grub_disk_t disk, grub_cryptomount_args_t ca + bool successful; + + if (grub_json_unescape (&unescaped, &unescaped_len, in, inlen) != GRUB_ERR_NONE) -+ return grub_error (GRUB_ERR_BAD_ARGUMENT, "Could not unescape Base64 string"); ++ return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("could not unescape Base64 string")); + -+ successful = base64_decode (unescaped, (size_t)unescaped_len, (char *)decoded, decodedlen); ++ successful = base64_decode (unescaped, (grub_size_t) unescaped_len, (char *) decoded, decodedlen); + grub_free (unescaped); + if (!successful) -+ return grub_error (GRUB_ERR_BAD_ARGUMENT, "Could not decode Base64 string"); ++ return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("could not decode Base64 string")); + + return GRUB_ERR_NONE; +} -- 2.37.0
signature.asc
Description: PGP signature
_______________________________________________ Grub-devel mailing list Grub-devel@gnu.org https://lists.gnu.org/mailman/listinfo/grub-devel