Yu Watanabe [Tue, 29 Dec 2020 16:44:04 +0000 (01:44 +0900)]
siphash: introduce siphash24_compress_safe()
Yu Watanabe [Tue, 29 Dec 2020 14:44:53 +0000 (23:44 +0900)]
resolve: do not compare key twice
Yu Watanabe [Tue, 29 Dec 2020 13:29:21 +0000 (22:29 +0900)]
resolve: slightly shorten dns_resource_key_compare_func()
Yu Watanabe [Tue, 29 Dec 2020 16:22:56 +0000 (01:22 +0900)]
resolve: fix typo
Yu Watanabe [Tue, 29 Dec 2020 08:26:43 +0000 (17:26 +0900)]
fuzzers: set maximum length for several fuzzers
Hopefully fixes oss-fuzz#19081, oss-fuzz#21731, oss-fuzz#21755.
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19081
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21731
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21755
Yu Watanabe [Tue, 29 Dec 2020 15:18:24 +0000 (00:18 +0900)]
Merge pull request #17477 from yuwata/network-drop-serialization-routing-policy-rule
network: do not serialize/deserialize routing policy rules
Yu Watanabe [Wed, 28 Oct 2020 08:02:41 +0000 (17:02 +0900)]
network: do not serialize/deserialize routing policy rules
We already handle foreign routing policy rules correctly by the previous
commit. So, the serialization/deserialization of rules are not necessary
anymore.
Yu Watanabe [Wed, 28 Oct 2020 11:27:23 +0000 (20:27 +0900)]
network: drop unnecessary routing policy rules
networkd already drop foreign address, routes, and nexthops on startup,
except those created by kernel. However, previously, routing policy
rules were not. The logic of serialization/deserialization of rules only
works for rules created by previous invocation of networkd, and does not
work for one created by other tools like `ip rule`.
This makes networkd drop foreign routing policy rules except created by
kernel on startup. Also, remove rules created by networkd when the
corresponding links are dropped or networkd is stopping.
Yu Watanabe [Thu, 29 Oct 2020 02:55:12 +0000 (11:55 +0900)]
network: treat rule which has l3mdev flag as created by kernel
Yu Watanabe [Thu, 29 Oct 2020 02:34:36 +0000 (11:34 +0900)]
network: adjust protocol of rules sent from kernel when kernel does not support FRA_PROTOCOL
Otherwise, each configured rule is treated as foreign.
Yu Watanabe [Wed, 28 Oct 2020 07:54:51 +0000 (16:54 +0900)]
network: set FRA_PROTOCOL to RTPROT_STATIC by default
Luca Boccassi [Mon, 28 Dec 2020 12:28:35 +0000 (12:28 +0000)]
Merge pull request #18048 from poettering/timesync-man-more
man: extend time-{set,sync}.target + systemd-timesyncd/wait-sync docs
Lennart Poettering [Mon, 28 Dec 2020 09:43:10 +0000 (10:43 +0100)]
man: apply @Minoru's suggestions from code review
Co-authored-by: Alexander Batischev <eual.jp@gmail.com>
Lennart Poettering [Sun, 20 Dec 2020 20:03:53 +0000 (21:03 +0100)]
man: extend time-{set,sync}.target + systemd-timesyncd/wait-sync docs
Let's link the three man pages together more tightly and explain what
the two targets are about, emphasizing local/quick/reliable/approximate
vs remote/slow/unreliable/accurate synchronization.
Follow-up for:
1431b2f701f7ba71e5d8664e709b1fad26797918 fe934b42e480473afba8a29a4a0d3d0e789543ac
Luca Boccassi [Mon, 28 Dec 2020 00:23:14 +0000 (00:23 +0000)]
shared/dns: fix dlopen_idn return code check
Fixes https://github.com/systemd/systemd/issues/18078
Thomas Haller [Wed, 23 Dec 2020 12:18:56 +0000 (13:18 +0100)]
sd-dhcp-client: avoid "maybe-uninitialized" warning in client_timeout_resend()
When compiling with CFLAGS='-Werror=maybe-uninitialized -Og' we get a
warning about uninitialized "next_timeout" variable.
Avoid the warning by adding an (unreachable) "default" label.
Fixes:
c24288d21ee9 ("sd-dhcp-client: correct dhcpv4 renew/rebind retransmit timeouts")
Yu Watanabe [Thu, 24 Dec 2020 13:31:37 +0000 (22:31 +0900)]
Merge pull request #18021 from ssahani/route-allow-list
networkd: add support for prefix allow-list and route allow-list
Yu Watanabe [Thu, 24 Dec 2020 04:50:48 +0000 (13:50 +0900)]
test-network: add tests for [IPv6AcceptRA] PrefixDenyList= or friends
Yu Watanabe [Thu, 24 Dec 2020 05:27:25 +0000 (14:27 +0900)]
network: introduce RouterAllowList= and RouterDenyList= in [IPv6AcceptRA]
Susant Sahani [Fri, 18 Dec 2020 19:28:38 +0000 (20:28 +0100)]
networkd: add support for prefix allow-list and route allow-list
Yu Watanabe [Thu, 24 Dec 2020 05:00:24 +0000 (14:00 +0900)]
network: rename DenyList= -> PrefixDenyList=
Yu Watanabe [Thu, 24 Dec 2020 04:12:40 +0000 (13:12 +0900)]
network: make RouteDenyList= filter route prefix rather than gateway address
DenyList= filters provided prefixes, not router address.
So, RouteDenyLisy= should so for consistency.
Fixes
16c89e649d248b0fc7c1dc7ad9f3323be4eac0f4.
Yu Watanabe [Thu, 24 Dec 2020 04:07:30 +0000 (13:07 +0900)]
network: fix condition for checking the provided gateway is assigned to link
Fix bug introduced by
221019166f315252304b3459902ead613b905de5.
Yu Watanabe [Thu, 24 Dec 2020 03:48:21 +0000 (12:48 +0900)]
sd-ndisc: fix indentation
Yu Watanabe [Thu, 24 Dec 2020 00:13:47 +0000 (09:13 +0900)]
network: drop redundant TAKE_PTR()
Follow-up for
16c89e649d248b0fc7c1dc7ad9f3323be4eac0f4.
Sebastiaan van Stijn [Wed, 23 Dec 2020 22:51:04 +0000 (23:51 +0100)]
Improve instructions for debugging failing service
In situations where a service fails to start, systemd suggests the user to
use "journalctl -xe" to get details about the failure. While running this
command does provide some additional details, most of the information is
similar to what was already printed when the service fails.
often the actual reason for the failure can be found in the logs of the
service that fails to start.
This patch updates the wording to suggest using "-u" to view the service
logs instead.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Yu Watanabe [Wed, 23 Dec 2020 23:56:24 +0000 (08:56 +0900)]
Merge pull request #18069 from flokli/ipv6-privacy-extensions-kernel
network: fix IPv6PrivacyExtensions=kernel
Florian Klink [Wed, 23 Dec 2020 11:57:47 +0000 (12:57 +0100)]
network: fix IPv6PrivacyExtensions=kernel handling
When set to "kernel", systemd is not supposed to touch that sysctl.
5e0534f1c13cd50ec2b143a8b18156cd37e502f7, part of
https://github.com/systemd/systemd/pull/17240 forgot to handle that
case.
Fixes https://github.com/systemd/systemd/issues/18003
Florian Klink [Wed, 23 Dec 2020 11:56:45 +0000 (12:56 +0100)]
network: fix typo
IPv6 privacy extensions are plural, not singular.
Jonathan G. Underwood [Tue, 22 Dec 2020 20:04:52 +0000 (20:04 +0000)]
cryptsetup: add support for workqueue options
This commit adds support for disabling the read and write
workqueues with the new crypttab options no-read-workqueue
and no-write-workqueue. These correspond to the cryptsetup
options --perf-no_read_workqueue and --perf-no_write_workqueue
respectively.
Dmitry Borodaenko [Wed, 23 Dec 2020 01:54:04 +0000 (17:54 -0800)]
man/systemd-nspawn: document hashing machine name for uid base
Explicitly document the behavior introduced in #7437: when picking a new
UID shift base with "-U", a hash of the machine name will be tried
before falling back to fully random UID base candidates.
pali [Sun, 20 Dec 2020 02:24:51 +0000 (03:24 +0100)]
udev: Updates for cdrom_id helper
cdrom_id udev helper does not parse all MMC profiles. Following change
fixes this issue and parse all 34 profiles from all MMC standard versions.
Also it replaces magic constants by macros provided by linux/cdrom.h and
fixes cd_profiles_old_mmc() to issue READ_DISC_INFO command in two steps,
like it is doing kernel and also mkudffs.
Luca Boccassi [Sat, 19 Dec 2020 21:40:47 +0000 (21:40 +0000)]
basic: add make_mount_point_inode helper
Creates a file or a directory depending on the source path, useful
for creating mount points.
Yu Watanabe [Mon, 21 Dec 2020 06:28:19 +0000 (15:28 +0900)]
udev: fix memleak
Fixes #18039.
Yu Watanabe [Mon, 21 Dec 2020 07:33:20 +0000 (16:33 +0900)]
journal-importer: ignore invalid field at one more place
Fixes oss-fuzz#28817.
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28817
Luca BRUNO [Mon, 21 Dec 2020 09:55:04 +0000 (09:55 +0000)]
man/localtime: document default timezone
This explicitly documents the default `UTC` timezone which is used
by systemd and (other softwares) when `/etc/localtime` is not present.
Ref: https://github.com/systemd/systemd/blob/v247/src/basic/time-util.c#L1460-L1469
Florian Klink [Sun, 20 Dec 2020 17:24:05 +0000 (18:24 +0100)]
man/systemd.netdev: clarify the wireguard AllowedIPs= setting
`AllowedIPs=` only affects "routing inside the network interface
itself", as in, which wireguard peer packets with a specific destination
address are sent to, and what source addresses are accepted from which
peer.
To cause packets to be sent via wireguard in first place, a route via
that interface needs to be added - either in the `[Routes]` section on
the `.network` matching the wireguard interface, or outside of networkd.
This is a common cause of misunderstanding, because tools like wg-quick
also add routes to the interface. However, those tools are meant as a
"extremely simple script for easily bringing up a WireGuard interface,
suitable for a few common use cases (from their manpage).
Networkd also should support other usecases - like setting AllowedIPs to
0.0.0.0/0 and ::/0 and having a dynamic routing protocol setting more
specific routes (or the user manually setting them).
Reported-In: https://github.com/systemd/systemd/issues/14176
Yu Watanabe [Mon, 21 Dec 2020 00:21:22 +0000 (09:21 +0900)]
Merge pull request #18040 from mrc0mmand/cryptenroll-unused-variable
cryptenroll: drop an unused variable
Frantisek Sumsal [Sun, 20 Dec 2020 21:27:36 +0000 (22:27 +0100)]
github: add the missing tpm2 optional dependency
Frantisek Sumsal [Sun, 20 Dec 2020 21:21:35 +0000 (22:21 +0100)]
travis: add missing optional build dependencies
Frantisek Sumsal [Sun, 20 Dec 2020 21:15:52 +0000 (22:15 +0100)]
cryptenroll: drop an unused variable
Fixes following warning/error w/ clang:
../src/cryptenroll/cryptenroll-tpm2.c:64:64: error: unused variable 'a' [-Werror,-Wunused-variable]
_cleanup_(json_variant_unrefp) JsonVariant *v = NULL, *a = NULL;
^
1 error generated.
Yu Watanabe [Sun, 20 Dec 2020 01:01:59 +0000 (10:01 +0900)]
Merge pull request #18029 from bluca/minor_fixes
Minor test script runner and labeller bot fixes
Daan De Meyer [Sat, 19 Dec 2020 18:47:50 +0000 (19:47 +0100)]
mkosi: Add basic editors to final images
It's often useful to have an editor available to edit some random
config file in the final image. Let's install some basic editors
that don't take up too much space.
Luca Boccassi [Sat, 19 Dec 2020 18:43:59 +0000 (18:43 +0000)]
Add more matching rules to GA labeler bot for subcomponents
Luca Boccassi [Sat, 19 Dec 2020 18:43:27 +0000 (18:43 +0000)]
False positives in GA labeler bot
Don't automatically match on man/* and **/meson.build, since we change those
files as part of larger changes that we usually don't mark that way
Luca Boccassi [Sat, 19 Dec 2020 18:42:20 +0000 (18:42 +0000)]
test: fix regex in run-integration-tests.sh
The regex results in calls of "make setup run -again" which is broken
Luca Boccassi [Sat, 19 Dec 2020 18:41:03 +0000 (18:41 +0000)]
test: use deny-list in run-integration-tests.sh
The old env var doesn't seem to be used anywhere, and the script
currently doesn't work, so it seems safe to change immediately
Daan De Meyer [Sat, 19 Dec 2020 14:25:41 +0000 (15:25 +0100)]
mkosi: Use --only-changed meson option when installing
Recently, mkosi gained support for specifying an --install-directory
option to save the contents of the install directory between bulids.
By enabling the --only-changed meson install option, meson won't
overwrite the contents of files that haven't changed since the last
build when using --install-directory.
Alexander Batischev [Sat, 19 Dec 2020 11:17:49 +0000 (14:17 +0300)]
man: Advertise systemd-time-wait-sync.service more (#17729)
* man: Advertise systemd-time-wait-sync.service more
The description of time-sync.target says that NTP services *should* pull
that target, but doesn't mention that e.g. systemd-timesyncd.service
doesn't actually do that. As a result, time-sync.target is reached way
earlier than people expect; see #5097, #8861, #11008.
systemd provides systemd-time-wait-sync.service to ameliorate this
problem, but doesn't feature it prominently in relevant manpages. In
fact, it's only mentioned in passing in systemd-timesyncd.service(8). As
a result, I ended up re-implementing that service, and I'm not the first
one: https://github.com/NixOS/nixpkgs/pull/51338
This patch adds a mention right in the description of time-sync.target,
which will hopefully raise awareness of this helper service.
Yu Watanabe [Fri, 18 Dec 2020 14:15:36 +0000 (23:15 +0900)]
Yu Watanabe [Fri, 18 Dec 2020 15:57:36 +0000 (00:57 +0900)]
Merge pull request #18019 from yuwata/hostname-drop-libudev
hostname: fix build failure
Yu Watanabe [Fri, 18 Dec 2020 14:25:43 +0000 (23:25 +0900)]
man: update org.freedesktop.hostname1.xml
Yu Watanabe [Fri, 18 Dec 2020 09:47:44 +0000 (18:47 +0900)]
memory-id: fix never hit condition
As sizeof(int64_t) is always 8.
Yu Watanabe [Fri, 18 Dec 2020 14:08:41 +0000 (23:08 +0900)]
hostname: fix build failure
Follow-up for
b9d8069832425b34211a6812e06537e0c50d46b6.
libudev.h was dropped from most of our binaries.
Lennart Poettering [Fri, 18 Dec 2020 13:26:32 +0000 (14:26 +0100)]
Merge pull request #15531 from felipeborges/add-device-model-field-to-hostnamed
hostnamed: Add "Model" field
Devon Pringle [Mon, 14 Dec 2020 06:23:17 +0000 (16:23 +1000)]
networkd: add RouteDenyList
Allow configuration for IPv6 discovered routes to be ignored instead of
adding them as a route. This can be used to block unwanted routes, for
example, you may wish to not receive some set of routes on an interface
if they are causing issues.
Yu Watanabe [Fri, 18 Dec 2020 12:44:00 +0000 (21:44 +0900)]
Merge pull request #18015 from keszybz/dmi-test-mesonification2
Dmi test mesonification2
Yu Watanabe [Fri, 18 Dec 2020 11:12:02 +0000 (20:12 +0900)]
Merge pull request #18011 from yuwata/trivial-fixes
Trivial fixes for recently merged PRs
Yu Watanabe [Fri, 18 Dec 2020 07:52:29 +0000 (16:52 +0900)]
Merge pull request #17693 from yuwata/tmpfiles-compress-nocow-on-btrfs
tmpfiles: try to set file attributes one by one
Yu Watanabe [Fri, 18 Dec 2020 07:02:56 +0000 (16:02 +0900)]
Merge pull request #18009 from poettering/time-set-sync-target
tweaks for time-sync.target and time-set.target
Yu Watanabe [Fri, 18 Dec 2020 04:26:44 +0000 (13:26 +0900)]
netlink: fix size of fib rule messages
Yu Watanabe [Fri, 18 Dec 2020 04:24:30 +0000 (13:24 +0900)]
meson: sort files
Yu Watanabe [Fri, 18 Dec 2020 04:21:07 +0000 (13:21 +0900)]
nspawn: sort headers
Yu Watanabe [Fri, 18 Dec 2020 04:18:37 +0000 (13:18 +0900)]
netlink: fix indentation
Yu Watanabe [Fri, 18 Dec 2020 04:17:49 +0000 (13:17 +0900)]
netlink: drop unnecessary error handling
Yu Watanabe [Fri, 18 Dec 2020 04:14:08 +0000 (13:14 +0900)]
netlink: use whitespace instead of tab
Yu Watanabe [Fri, 18 Dec 2020 04:12:09 +0000 (13:12 +0900)]
sd-netlink: add several assertions
Yu Watanabe [Fri, 18 Dec 2020 04:11:06 +0000 (13:11 +0900)]
sd-netlink: replace *messages[] -> **messages
Yu Watanabe [Fri, 18 Dec 2020 04:05:19 +0000 (13:05 +0900)]
meson: add missing headers
Yu Watanabe [Fri, 18 Dec 2020 04:00:57 +0000 (13:00 +0900)]
network: move variable declaration
Yu Watanabe [Fri, 18 Dec 2020 03:59:29 +0000 (12:59 +0900)]
tree-wide: fix typo
Yu Watanabe [Mon, 23 Nov 2020 06:49:51 +0000 (15:49 +0900)]
tmpfiles: try to set file attributes one by one
Closes #17690.
Yu Watanabe [Fri, 27 Nov 2020 03:47:05 +0000 (12:47 +0900)]
chattr-util: introduce fallback mode to set file attributes one by one
Susant Sahani [Fri, 18 Dec 2020 03:21:15 +0000 (08:51 +0530)]
network: Allow to configure unreachable/blackhole RoutingPolicyRule (#17984)
Lennart Poettering [Thu, 17 Dec 2020 21:37:22 +0000 (22:37 +0100)]
Merge pull request #17741 from poettering/cryptsetup-fido2
cryptsetup: add support for unlocking cryptsetup volumes via FIDO2 + TPM2 + add systemd-cryptenroll tool + more
Lennart Poettering [Thu, 17 Dec 2020 19:26:24 +0000 (20:26 +0100)]
man: document that .timer units now have After= on both time-set.target + time-sync.target
Lennart Poettering [Thu, 17 Dec 2020 19:21:46 +0000 (20:21 +0100)]
core: order timer units after both time-sync.target and time-set.target
If users do not enable a service like systemd-time-wait-sync.target
(because they don't want to delay boot for external events, such as an
NTP sync), then timers should still take the the weaker time-set.target
feature into account, so that the clock is at least monotonic.
Hence, order timer units after both of the targets: time-sync.target
*and* time-set.target. That way, the right thing will happen regardless
if people have no NTP server (and thus also no
systemd-time-wait-sync.service or equivalent) or, only have an NTP
server (and no systemd-time-wait-sync.service), or have both.
Ordering after time-set.target is basically "free". The logic it is
backed by should be instant, without communication with the outside
going on. It's useful still so that time servers that implement the
timestamp from /var/ logic can run in later boot.
Lennart Poettering [Thu, 17 Dec 2020 19:19:44 +0000 (20:19 +0100)]
units: don't pull in time-sync.target from systemd-timesyncd.service
systemd-timesyncd.service only applies the much weaker monotonic clock
from file logic, i.e should pull in and order itself before
time-set.target. The strong time-sync.target unit is pulled in by
systemd-time-wait-sync.service.
Lennart Poettering [Thu, 26 Nov 2020 13:42:23 +0000 (14:42 +0100)]
update TODO
Lennart Poettering [Thu, 17 Dec 2020 13:16:15 +0000 (14:16 +0100)]
mkosi: add TPM2 packages to debian/ubuntu/fedora mkosi files
As suggested: https://github.com/systemd/systemd/pull/17741#issuecomment-
743479834
Lennart Poettering [Mon, 7 Dec 2020 16:18:52 +0000 (17:18 +0100)]
man: document new features
Lennart Poettering [Thu, 17 Dec 2020 12:55:50 +0000 (13:55 +0100)]
fido2: when listing fido2/hmac-secret devices, actually validate feature set
Lennart Poettering [Wed, 9 Dec 2020 20:13:58 +0000 (21:13 +0100)]
test: add tpm2 and fido2 libs to dlopen test
Lennart Poettering [Tue, 8 Dec 2020 14:12:29 +0000 (15:12 +0100)]
repart: optionally lock encrypted partitions to TPM2
This useful for bootstrapping encrypted systems: on first boot let's
create a /var/ partition that is locked to the local TPM2.
Lennart Poettering [Tue, 8 Dec 2020 13:39:49 +0000 (14:39 +0100)]
string-table: add private version of lookup macro with boolean fallback
Lennart Poettering [Fri, 4 Dec 2020 16:26:37 +0000 (17:26 +0100)]
cryptsetup: add support for TPM2 unlocking of volumes
Lennart Poettering [Sat, 28 Nov 2020 21:59:21 +0000 (22:59 +0100)]
cryptenroll: support listing and wiping tokens
Lennart Poettering [Sat, 28 Nov 2020 14:27:34 +0000 (15:27 +0100)]
cryptenroll: add support for TPM2 enrolling
Lennart Poettering [Tue, 1 Dec 2020 12:45:32 +0000 (13:45 +0100)]
json: add APIs for quickly inserting hex blobs into as JSON strings
This is similar to the base64 support, but fixed-size hash values are
typically preferably presented as series of hex values, hence store them
here like that too.
Lennart Poettering [Mon, 30 Nov 2020 15:23:15 +0000 (16:23 +0100)]
sort-util: make cmp_int() generic, so that we can reuse it elsewhere
Lennart Poettering [Tue, 24 Nov 2020 12:41:47 +0000 (13:41 +0100)]
cryptenroll: add new "systemd-cryptenroll" tool for enrolling FIDO2+PKCS#11 security tokens
Lennart Poettering [Thu, 26 Nov 2020 11:46:10 +0000 (12:46 +0100)]
cryptsetup: add fido2 support
Lennart Poettering [Fri, 4 Dec 2020 09:19:47 +0000 (10:19 +0100)]
fido2: don't use up/uv/rk when device doesn't support it
Apparently devices are supposed to generate failures if we try to turn
off features they don't have. Thus don't.
Prompted-by: https://github.com/systemd/systemd/issues/17784#issuecomment-737730395
Lennart Poettering [Thu, 26 Nov 2020 12:30:24 +0000 (13:30 +0100)]
homed: split out HMAC-HASH fido2 decode code into src/shared/
That way we can use it later on in systemd-cryptsetup to unlock devices
with FIDO2 tokens.
Lennart Poettering [Wed, 25 Nov 2020 15:34:54 +0000 (16:34 +0100)]
homed: move fido2 setup code to src/shared/
That way we can reuse it from systemd-cryptenroll
Lennart Poettering [Wed, 25 Nov 2020 14:15:25 +0000 (15:15 +0100)]
homed: move fido2 device enumeration logic to shared code
Lennart Poettering [Wed, 25 Nov 2020 14:07:06 +0000 (15:07 +0100)]
homed: turn libfido2 into a dlopen() type dependency
Lennart Poettering [Thu, 26 Nov 2020 12:29:56 +0000 (13:29 +0100)]
cryptsetup: split up attach_luks_or_plain_or_bitlk() into smaller functions
Just some refactoring.
Lennart Poettering [Wed, 25 Nov 2020 10:10:29 +0000 (11:10 +0100)]
cryptsetup: read PKCS#11 key and token info from LUKS2 metadata
Optionally, embedd PKCS#11 token URI and encrypted key in LUKS2 JSON
metadata header. That way it becomes very easy to unlock properly set up
PKCS#11-enabled LUKS2 volumes, a simple /etc/crypttab line like the
following suffices:
mytest /dev/disk/by-partuuid/
41c1df55-e628-4dbb-8492-
bc69d81e172e - pkcs11-uri=auto
Such a line declares that unlocking via PKCS#11 shall be attempted, and
the token URI and the encrypted key shall be read from the LUKS2 header.
An external key file for the encrypted PKCS#11 key is hence no longer
necessary, nor is specifying the precise URI to use.
Lennart Poettering [Wed, 25 Nov 2020 10:58:55 +0000 (11:58 +0100)]
cryptsetup: be more careful with erasing key material from memory