On Fri, Aug 04, 2023 at 11:45:00AM +0000, Klemens Nanni wrote: > If the root disk contains a valid CRYPTO volume, bioctl(8) by default > unlocks that instead of creating a new one. > > Use `-C force' to prevent reuse of old volumes, which happens if you, e.g. > restart an encrypted installation past this point or install onto an old > disk without wiping it first: > > Encrypt the root disk with a passphrase? [no] y > > Configuring the crypto chunk sd0... > > Disk: sd0 geometry: 652/255/63 [10485760 Sectors] > Offset: 0 Signature: 0xAA55 > Starting Ending LBA Info: > #: id C H S - C H S [ start: size ] > > ------------------------------------------------------------------------------- > 0: 00 0 0 0 - 0 0 0 [ 0: 0 ] > Unused > 1: 00 0 0 0 - 0 0 0 [ 0: 0 ] > Unused > 2: 00 0 0 0 - 0 0 0 [ 0: 0 ] > Unused > *3: A6 0 1 2 - 652 180 40 [ 64: 10485696 ] > OpenBSD > Use (W)hole disk MBR, whole disk (G)PT, (O)penBSD area or (E)dit? > [OpenBSD] > Passphrase: > sd1 at scsibus1 targ 1 lun 0: <OPENBSD, SR CRYPTO, 006> > > There bioctl once prompts for the old existing > Passphrase: > instead of > New passphrase: > Re-type passphrase: > > > Feedback? Objection? OK?
Anyone takers? One likes it, otherwise no replies. I'm inclined to go ahead with this one soon unless there are objections is it fixes a few cases users stumbled over. Index: install.sub =================================================================== RCS file: /cvs/src/distrib/miniroot/install.sub,v retrieving revision 1.1252 diff -u -p -r1.1252 install.sub --- install.sub 2 Aug 2023 08:51:16 -0000 1.1252 +++ install.sub 10 Aug 2023 07:54:36 -0000 @@ -3097,7 +3097,7 @@ encrypt_root() { md_prep_fdisk $_chunk echo 'RAID *' | disklabel -w -A -T- $_chunk - until bioctl -c C -l ${_chunk}a softraid0 >/dev/null; do + until bioctl -Cforce -cC -l${_chunk}a softraid0 >/dev/null; do # Most likely botched passphrases, silently retry twice. ((++_tries < 3)) || exit done