|
Packit Service |
a9384c |
#!/bin/bash
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
[ -z "$CRYPTSETUP_PATH" ] && CRYPTSETUP_PATH=".."
|
|
Packit Service |
a9384c |
CRYPTSETUP=$CRYPTSETUP_PATH/cryptsetup
|
|
Packit Service |
a9384c |
REENC=$CRYPTSETUP_PATH/cryptsetup-reencrypt
|
|
Packit Service |
a9384c |
FAST_PBKDF="--pbkdf-force-iterations 1000"
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
DEV_NAME=reenc9768
|
|
Packit Service |
a9384c |
DEV_NAME2=reenc1273
|
|
Packit Service |
a9384c |
IMG=reenc-data
|
|
Packit Service |
a9384c |
IMG_HDR=$IMG.hdr
|
|
Packit Service |
a9384c |
ORIG_IMG=reenc-data-orig
|
|
Packit Service |
a9384c |
KEY1=key1
|
|
Packit Service |
a9384c |
PWD1="93R4P4pIqAH8"
|
|
Packit Service |
a9384c |
PWD2="1cND4319812f"
|
|
Packit Service |
a9384c |
PWD3="1-9Qu5Ejfnqv"
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
MNT_DIR=./mnt_luks
|
|
Packit Service |
a9384c |
START_DIR=$(pwd)
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function del_scsi_device()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
rmmod scsi_debug 2>/dev/null
|
|
Packit Service |
a9384c |
sleep 2
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function remove_mapping()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
[ -b /dev/mapper/$DEV_NAME2 ] && dmsetup remove --retry $DEV_NAME2
|
|
Packit Service |
a9384c |
[ -b /dev/mapper/$DEV_NAME ] && dmsetup remove --retry $DEV_NAME
|
|
Packit Service |
a9384c |
[ ! -z "$LOOPDEV1" ] && losetup -d $LOOPDEV1 >/dev/null 2>&1
|
|
Packit Service |
a9384c |
rm -f $IMG $IMG_HDR $ORIG_IMG $KEY1 >/dev/null 2>&1
|
|
Packit Service |
a9384c |
umount $MNT_DIR > /dev/null 2>&1
|
|
Packit Service |
a9384c |
rmdir $MNT_DIR > /dev/null 2>&1
|
|
Packit Service |
a9384c |
LOOPDEV1=""
|
|
Packit Service |
a9384c |
del_scsi_device
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function fail()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
[ -n "$1" ] && echo "$1"
|
|
Packit Service |
a9384c |
echo "FAILED backtrace:"
|
|
Packit Service |
a9384c |
while caller $frame; do ((frame++)); done
|
|
Packit Service |
a9384c |
cd $START_DIR
|
|
Packit Service |
a9384c |
remove_mapping
|
|
Packit Service |
a9384c |
exit 2
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function skip()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
[ -n "$1" ] && echo "$1"
|
|
Packit Service |
a9384c |
exit 77
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function add_scsi_device() {
|
|
Packit Service |
a9384c |
del_scsi_device
|
|
Packit Service |
a9384c |
modprobe scsi_debug $@ delay=0
|
|
Packit Service |
a9384c |
if [ $? -ne 0 ] ; then
|
|
Packit Service |
a9384c |
echo "This kernel seems to not support proper scsi_debug module, test skipped."
|
|
Packit Service |
a9384c |
exit 77
|
|
Packit Service |
a9384c |
fi
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
sleep 2
|
|
Packit Service |
a9384c |
SCSI_DEV="/dev/"$(grep -l -e scsi_debug /sys/block/*/device/model | cut -f4 -d /)
|
|
Packit Service |
a9384c |
[ -b $SCSI_DEV ] || fail "Cannot find $SCSI_DEV."
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function open_crypt() # $1 pwd, $2 hdr
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
if [ -n "$2" ] ; then
|
|
Packit Service |
a9384c |
echo "$1" | $CRYPTSETUP luksOpen $LOOPDEV1 $DEV_NAME --header $2 || fail
|
|
Packit Service |
a9384c |
elif [ -n "$1" ] ; then
|
|
Packit Service |
a9384c |
echo "$1" | $CRYPTSETUP luksOpen $LOOPDEV1 $DEV_NAME || fail
|
|
Packit Service |
a9384c |
else
|
|
Packit Service |
a9384c |
$CRYPTSETUP luksOpen -d $KEY1 $LOOPDEV1 $DEV_NAME || fail
|
|
Packit Service |
a9384c |
fi
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function wipe_dev() # $1 dev
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
dd if=/dev/zero of=$1 bs=256k >/dev/null 2>&1
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function wipe() # $1 pass
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
open_crypt $1
|
|
Packit Service |
a9384c |
wipe_dev /dev/mapper/$DEV_NAME
|
|
Packit Service |
a9384c |
udevadm settle >/dev/null 2>&1
|
|
Packit Service |
a9384c |
$CRYPTSETUP luksClose $DEV_NAME || fail
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function prepare() # $1 dev1_siz
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
remove_mapping
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
dd if=/dev/zero of=$IMG bs=1k count=$1 >/dev/null 2>&1
|
|
Packit Service |
a9384c |
LOOPDEV1=$(losetup -f 2>/dev/null)
|
|
Packit Service |
a9384c |
[ -z "$LOOPDEV1" ] && fail "No free loop device"
|
|
Packit Service |
a9384c |
losetup $LOOPDEV1 $IMG
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
if [ ! -e $KEY1 ]; then
|
|
Packit Service |
a9384c |
dd if=/dev/urandom of=$KEY1 count=1 bs=32 >/dev/null 2>&1
|
|
Packit Service |
a9384c |
fi
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function check_hash_dev() # $1 dev, $2 hash
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
HASH=$(sha256sum $1 | cut -d' ' -f 1)
|
|
Packit Service |
a9384c |
[ $HASH != "$2" ] && fail "HASH differs ($HASH)"
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function check_hash() # $1 pwd, $2 hash, $3 hdr
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
open_crypt $1 $3
|
|
Packit Service |
a9384c |
check_hash_dev /dev/mapper/$DEV_NAME $2
|
|
Packit Service |
a9384c |
$CRYPTSETUP remove $DEV_NAME || fail
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function backup_orig()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
sync
|
|
Packit Service |
a9384c |
losetup -d $LOOPDEV1
|
|
Packit Service |
a9384c |
cp $IMG $ORIG_IMG
|
|
Packit Service |
a9384c |
losetup $LOOPDEV1 $IMG
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function rollback()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
sync
|
|
Packit Service |
a9384c |
losetup -d $LOOPDEV1
|
|
Packit Service |
a9384c |
cp $ORIG_IMG $IMG
|
|
Packit Service |
a9384c |
losetup $LOOPDEV1 $IMG
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function check_slot() #space separated list of ENABLED key slots
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
local _KS0=DISABLED
|
|
Packit Service |
a9384c |
local _KS1=$_KS0 _KS2=$_KS0 _KS3=$_KS0 _KS4=$_KS0 _KS5=$_KS0 _KS6=$_KS0 _KS7=$_KS0
|
|
Packit Service |
a9384c |
local _tmp
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
for _tmp in $*; do
|
|
Packit Service |
a9384c |
eval _KS$_tmp=ENABLED
|
|
Packit Service |
a9384c |
done
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
local _out=$($CRYPTSETUP luksDump $LOOPDEV1 | grep -e "Key Slot" | cut -d ' ' -f 4)
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
local _i=0
|
|
Packit Service |
a9384c |
for _tmp in $_out; do
|
|
Packit Service |
a9384c |
eval local _orig="\${_KS${_i}}"
|
|
Packit Service |
a9384c |
if [ "$_tmp" != "$_orig" ]; then
|
|
Packit Service |
a9384c |
echo "Keyslot $_i is $_tmp, expected result: $_orig"
|
|
Packit Service |
a9384c |
return 1
|
|
Packit Service |
a9384c |
fi
|
|
Packit Service |
a9384c |
_i=$[_i+1]
|
|
Packit Service |
a9384c |
done
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
return 0
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function simple_scsi_reenc()
|
|
Packit Service |
a9384c |
{
|
|
Packit Service |
a9384c |
echo -n "$1"
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP luksFormat --type luks1 $FAST_PBKDF $SCSI_DEV || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP luksOpen $SCSI_DEV $DEV_NAME || fail
|
|
Packit Service |
a9384c |
HASH=$(sha256sum /dev/mapper/$DEV_NAME | cut -d' ' -f 1)
|
|
Packit Service |
a9384c |
$CRYPTSETUP luksClose $DEV_NAME || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC -q $FAST_PBKDF $SCSI_DEV || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP luksOpen $SCSI_DEV $DEV_NAME || fail
|
|
Packit Service |
a9384c |
check_hash_dev /dev/mapper/$DEV_NAME $HASH
|
|
Packit Service |
a9384c |
$CRYPTSETUP luksClose $DEV_NAME || fail
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function mount_and_test() {
|
|
Packit Service |
a9384c |
test -d $MNT_DIR || mkdir -p $MNT_DIR
|
|
Packit Service |
a9384c |
mount $@ $MNT_DIR 2>/dev/null || {
|
|
Packit Service |
a9384c |
echo -n "failed to mount [SKIP]"
|
|
Packit Service |
a9384c |
return 0
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
rm $MNT_DIR/* 2>/dev/null
|
|
Packit Service |
a9384c |
cd $MNT_DIR
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
if [ "${REENC:0:1}" != "/" ] ; then
|
|
Packit Service |
a9384c |
MNT_REENC=$START_DIR/$REENC
|
|
Packit Service |
a9384c |
else
|
|
Packit Service |
a9384c |
MNT_REENC=$REENC
|
|
Packit Service |
a9384c |
fi
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo $PWD2 | $MNT_REENC $LOOPDEV1 -q --use-fsync --use-directio --write-log $FAST_PBKDF || return 1
|
|
Packit Service |
a9384c |
cd $START_DIR
|
|
Packit Service |
a9384c |
umount $MNT_DIR
|
|
Packit Service |
a9384c |
echo -n [OK]
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function test_logging_tmpfs() {
|
|
Packit Service |
a9384c |
echo -n "[tmpfs]"
|
|
Packit Service |
a9384c |
mount_and_test -t tmpfs none -o size=$[25*1024*1024] || return 1
|
|
Packit Service |
a9384c |
echo
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
function test_logging() {
|
|
Packit Service |
a9384c |
echo -n "$1:"
|
|
Packit Service |
a9384c |
for img in $(ls img_fs*img.xz) ; do
|
|
Packit Service |
a9384c |
wipefs -a $SCSI_DEV > /dev/null
|
|
Packit Service |
a9384c |
echo -n "[${img%.img.xz}]"
|
|
Packit Service |
a9384c |
xz -d -c $img | dd of=$SCSI_DEV bs=4k >/dev/null 2>&1
|
|
Packit Service |
a9384c |
mount_and_test $SCSI_DEV || return 1
|
|
Packit Service |
a9384c |
done
|
|
Packit Service |
a9384c |
echo
|
|
Packit Service |
a9384c |
}
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
[ $(id -u) != 0 ] && skip "WARNING: You must be root to run this test, test skipped."
|
|
Packit Service |
a9384c |
[ ! -x "$REENC" ] && skip "Cannot find $REENC, test skipped."
|
|
Packit Service |
a9384c |
which wipefs >/dev/null 2>&1 || skip "Cannot find wipefs, test skipped."
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
# REENCRYPTION tests
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
HASH1=b69dae56a14d1a8314ed40664c4033ea0a550eea2673e04df42a66ac6b9faf2c
|
|
Packit Service |
a9384c |
HASH2=d85ef2a08aeac2812a648deb875485a6e3848fc3d43ce4aa380937f08199f86b
|
|
Packit Service |
a9384c |
HASH3=e4e5749032a5163c45125eccf3e8598ba5ed840df442c97e1d5ad4ad84359605
|
|
Packit Service |
a9384c |
HASH4=2daeb1f36095b44b318410b3f4e8b5d989dcc7bb023d1426c492dab0a3053e74
|
|
Packit Service |
a9384c |
HASH5=5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[1] Reencryption"
|
|
Packit Service |
a9384c |
prepare 8192
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksFormat --type luks1 -s 128 -c aes-cbc-plain $FAST_PBKDF --align-payload 4096 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
wipe $PWD1
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q -s 256 $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q -s 256 -c aes-xts-plain64 -h sha256 $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --use-directio $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --master-key-file /dev/urandom $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q -s 512 --master-key-file /dev/urandom $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
$CRYPTSETUP --type luks1 luksDump $LOOPDEV1 > /dev/null || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[2] Reencryption with data shift"
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksFormat --type luks1 -c aes-cbc-essiv:sha256 -s 128 $FAST_PBKDF --align-payload 2048 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
wipe $PWD1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q -s 256 --reduce-device-size 1024S $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH2
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH2
|
|
Packit Service |
a9384c |
$CRYPTSETUP --type luks1 luksDump $LOOPDEV1 > /dev/null || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[3] Reencryption with keyfile"
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksFormat --type luks1 -d $KEY1 -c aes-cbc-essiv:sha256 -s 128 $FAST_PBKDF --align-payload 4096 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
wipe
|
|
Packit Service |
a9384c |
check_hash "" $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksAddKey -d $KEY1 $LOOPDEV1 $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
$REENC $LOOPDEV1 -d $KEY1 $FAST_PBKDF -q 2>/dev/null && fail
|
|
Packit Service |
a9384c |
$REENC $LOOPDEV1 -d $KEY1 -S 0 $FAST_PBKDF -q || fail
|
|
Packit Service |
a9384c |
check_hash "" $HASH1
|
|
Packit Service |
a9384c |
check_slot 0 || fail "Only keyslot 0 expected to be enabled"
|
|
Packit Service |
a9384c |
$REENC $LOOPDEV1 -d $KEY1 $FAST_PBKDF -q || fail
|
|
Packit Service |
a9384c |
# FIXME echo $PWD1 | $REENC ...
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[4] Encryption of not yet encrypted device"
|
|
Packit Service |
a9384c |
# well, movin' zeroes :-)
|
|
Packit Service |
a9384c |
OFFSET=2048
|
|
Packit Service |
a9384c |
SIZE=$(blockdev --getsz $LOOPDEV1)
|
|
Packit Service |
a9384c |
wipe_dev $LOOPDEV1
|
|
Packit Service |
a9384c |
dmsetup create $DEV_NAME2 --table "0 $(($SIZE - $OFFSET)) linear $LOOPDEV1 0" || fail
|
|
Packit Service |
a9384c |
check_hash_dev /dev/mapper/$DEV_NAME2 $HASH3
|
|
Packit Service |
a9384c |
dmsetup remove --retry $DEV_NAME2 || fail
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -c aes-cbc-essiv:sha256 -s 128 --new --type luks1 --reduce-device-size "$OFFSET"S -q $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH3
|
|
Packit Service |
a9384c |
$CRYPTSETUP --type luks1 luksDump $LOOPDEV1 > /dev/null || fail
|
|
Packit Service |
a9384c |
# 64MiB + 1 KiB
|
|
Packit Service |
a9384c |
prepare 65537
|
|
Packit Service |
a9384c |
OFFSET=131072
|
|
Packit Service |
a9384c |
SIZE=$(blockdev --getsz $LOOPDEV1)
|
|
Packit Service |
a9384c |
wipe_dev $LOOPDEV1
|
|
Packit Service |
a9384c |
dmsetup create $DEV_NAME2 --table "0 $(($SIZE - $OFFSET)) linear $LOOPDEV1 0" || fail
|
|
Packit Service |
a9384c |
check_hash_dev /dev/mapper/$DEV_NAME2 $HASH5
|
|
Packit Service |
a9384c |
dmsetup remove --retry $DEV_NAME2 || fail
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -c aes-cbc-essiv:sha256 -s 128 --new --type luks1 --reduce-device-size "$OFFSET"S -q $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH5
|
|
Packit Service |
a9384c |
$CRYPTSETUP --type luks1 luksDump $LOOPDEV1 > /dev/null || fail
|
|
Packit Service |
a9384c |
prepare 8192
|
|
Packit Service |
a9384c |
OFFSET=4096
|
|
Packit Service |
a9384c |
echo fake | $REENC $LOOPDEV1 -d $KEY1 --new --type luks1 --reduce-device-size "$OFFSET"S -q $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
$CRYPTSETUP open --test-passphrase $LOOPDEV1 -d $KEY1 || fail
|
|
Packit Service |
a9384c |
wipe_dev $LOOPDEV1
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[5] Reencryption using specific keyslot"
|
|
Packit Service |
a9384c |
echo $PWD2 | $CRYPTSETUP -q luksFormat --type luks1 $FAST_PBKDF $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD1" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 1 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD2" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 2 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD1" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 3 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD2" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 4 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD1" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 5 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD2" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 6 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD3" | $CRYPTSETUP -q luksAddKey $FAST_PBKDF -S 7 $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
backup_orig
|
|
Packit Service |
a9384c |
echo $PWD2 | $REENC $FAST_PBKDF -S 0 -q $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
check_slot 0 || fail "Only keyslot 0 expected to be enabled"
|
|
Packit Service |
a9384c |
wipe $PWD2
|
|
Packit Service |
a9384c |
rollback
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $FAST_PBKDF -S 1 -q $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
check_slot 1 || fail "Only keyslot 1 expected to be enabled"
|
|
Packit Service |
a9384c |
wipe $PWD1
|
|
Packit Service |
a9384c |
rollback
|
|
Packit Service |
a9384c |
echo $PWD2 | $REENC $FAST_PBKDF -S 6 -q $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
check_slot 6 || fail "Only keyslot 6 expected to be enabled"
|
|
Packit Service |
a9384c |
wipe $PWD2
|
|
Packit Service |
a9384c |
rollback
|
|
Packit Service |
a9384c |
echo $PWD3 | $REENC $FAST_PBKDF -S 7 -q $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
check_slot 7 || fail "Only keyslot 7 expected to be enabled"
|
|
Packit Service |
a9384c |
wipe $PWD3
|
|
Packit Service |
a9384c |
rollback
|
|
Packit Service |
a9384c |
echo $PWD3 | $REENC $FAST_PBKDF -S 8 -q $LOOPDEV1 2>/dev/null && fail
|
|
Packit Service |
a9384c |
$CRYPTSETUP luksDump $LOOPDEV1 > /dev/null || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[6] Reencryption using all active keyslots"
|
|
Packit Service |
a9384c |
echo -e "$PWD2\n$PWD1\n$PWD2\n$PWD1\n$PWD2\n$PWD1\n$PWD2\n$PWD3" | $REENC -q $LOOPDEV1 $FAST_PBKDF || fail
|
|
Packit Service |
a9384c |
check_slot 0 1 2 3 4 5 6 7 || fail "All keyslots expected to be enabled"
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[7] Reencryption of block devices with different block size"
|
|
Packit Service |
a9384c |
add_scsi_device sector_size=512 dev_size_mb=8
|
|
Packit Service |
a9384c |
simple_scsi_reenc "[512 sector]"
|
|
Packit Service |
a9384c |
add_scsi_device sector_size=4096 dev_size_mb=8
|
|
Packit Service |
a9384c |
simple_scsi_reenc "[4096 sector]"
|
|
Packit Service |
a9384c |
add_scsi_device sector_size=512 physblk_exp=3 dev_size_mb=8
|
|
Packit Service |
a9384c |
simple_scsi_reenc "[4096/512 sector]"
|
|
Packit Service |
a9384c |
echo "[OK]"
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[8] Header only reencryption (hash and iteration time)"
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksFormat --type luks1 --hash sha1 $FAST_PBKDF $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
wipe $PWD1
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --keep-key || fail
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --keep-key --pbkdf-force-iterations 999 2>/dev/null && fail
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --keep-key --hash sha256 --pbkdf-force-iterations 1001
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
[ "$($CRYPTSETUP luksDump $LOOPDEV1 | grep -A1 -m1 "Key Slot 0" | grep Iterations: | sed -e 's/[[:space:]]\+Iterations:\ \+//g')" -eq 1001 ] || fail
|
|
Packit Service |
a9384c |
[ "$($CRYPTSETUP luksDump $LOOPDEV1 | grep -m1 "Hash spec:" | cut -f2)" = "sha256" ] || fail
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --keep-key --hash sha512 $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
[ "$($CRYPTSETUP luksDump $LOOPDEV1 | grep -A1 -m1 "Key Slot 0" | grep Iterations: | sed -e 's/[[:space:]]\+Iterations:\ \+//g')" -eq 1000 ] || fail
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --keep-key $FAST_PBKDF
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
$CRYPTSETUP --type luks1 luksDump $LOOPDEV1 > /dev/null || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[9] Test log I/Os on various underlaying block devices"
|
|
Packit Service |
a9384c |
prepare 8192
|
|
Packit Service |
a9384c |
echo $PWD2 | $CRYPTSETUP -q luksFormat --type luks1 $FAST_PBKDF $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
add_scsi_device sector_size=512 dev_size_mb=32
|
|
Packit Service |
a9384c |
test_logging "[512 sector]" || fail
|
|
Packit Service |
a9384c |
add_scsi_device sector_size=4096 dev_size_mb=32
|
|
Packit Service |
a9384c |
test_logging "[4096 sector]" || fail
|
|
Packit Service |
a9384c |
add_scsi_device sector_size=512 dev_size_mb=32 physblk_exp=3
|
|
Packit Service |
a9384c |
test_logging "[4096/512 sector]" || fail
|
|
Packit Service |
a9384c |
test_logging_tmpfs || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[10] Removal of encryption"
|
|
Packit Service |
a9384c |
prepare 8192
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksFormat --type luks1 $FAST_PBKDF $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
wipe $PWD1
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --decrypt || fail
|
|
Packit Service |
a9384c |
check_hash_dev $LOOPDEV1 $HASH4
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo $PWD1 | $CRYPTSETUP -q luksFormat --type luks1 -S5 $FAST_PBKDF $LOOPDEV1 || fail
|
|
Packit Service |
a9384c |
wipe $PWD1
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH1
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --decrypt || fail
|
|
Packit Service |
a9384c |
check_hash_dev $LOOPDEV1 $HASH4
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
echo "[11] Detached header - adding encryption/reencryption/decryption"
|
|
Packit Service |
a9384c |
prepare 8192
|
|
Packit Service |
a9384c |
check_hash_dev $IMG $HASH4
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q $FAST_PBKDF --header $IMG_HDR --new --type luks1
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH4 $IMG_HDR
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q $FAST_PBKDF --header $IMG_HDR
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH4 $IMG_HDR
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q --header $IMG_HDR --decrypt
|
|
Packit Service |
a9384c |
check_hash_dev $IMG $HASH4
|
|
Packit Service |
a9384c |
# existing header of zero size
|
|
Packit Service |
a9384c |
cat /dev/null >$IMG_HDR
|
|
Packit Service |
a9384c |
echo $PWD1 | $REENC $LOOPDEV1 -q $FAST_PBKDF --header $IMG_HDR --new --type luks1
|
|
Packit Service |
a9384c |
check_hash $PWD1 $HASH4 $IMG_HDR
|
|
Packit Service |
a9384c |
$CRYPTSETUP isLuks $LOOPDEV1 && fail
|
|
Packit Service |
a9384c |
$CRYPTSETUP isLuks $IMG_HDR || fail
|
|
Packit Service |
a9384c |
|
|
Packit Service |
a9384c |
remove_mapping
|
|
Packit Service |
a9384c |
exit 0
|