aboutsummaryrefslogtreecommitdiff
path: root/resources/grub/config/menuentries
diff options
context:
space:
mode:
Diffstat (limited to 'resources/grub/config/menuentries')
-rw-r--r--resources/grub/config/menuentries/common.cfg10
1 files changed, 5 insertions, 5 deletions
diff --git a/resources/grub/config/menuentries/common.cfg b/resources/grub/config/menuentries/common.cfg
index c7a1bf77..4cebb390 100644
--- a/resources/grub/config/menuentries/common.cfg
+++ b/resources/grub/config/menuentries/common.cfg
@@ -34,14 +34,14 @@ menuentry 'Load Operating System (incl. fully encrypted disks) [O]' --hotkey='o
fi
done
done
+ # prompt user for passphrase if LUKS header is found but try using external keyfiles first
+ search -n -f /keyfile --set=kf --hint usb0, --hint usb1,
+ if [ $? = 0 ]; then
+ kf="-k (${kf})/keyfile ${d}"
+ fi
# (This way, we only need to scan for encrypted data once while covering every possible disk setup,
# be it LVM/BTRFS/ZFS/ext4/etc. (on LUKS) (on RAID) on/across raw devices/MBR/GPT
for d in ${devs}; do
- # prompt user for passphrase if LUKS header is found but try using external keyfiles first
- search -n -f /keyfile --set=kf --hint usb0, --hint usb1,
- if [ $? = 0 ]; then
- kf="-k (${kf})/keyfile ${d}"
- fi
cryptomount ${kf} ${d}
done
# 3. Do the same routine again, but for possibly decrypted data this time. There might be an LVM