8 # generate primary header with too large keyslots_size set in config section
9 # (iow config.keyslots_size = data_offset - keyslots_offset + 512)
11 # secondary header is corrupted on purpose as well
15 # $2 full source luks2 image
20 test -d $TMPDIR || mkdir $TMPDIR
21 read_luks2_json0 $TGT_IMG $TMPDIR/json0
22 read_luks2_bin_hdr0 $TGT_IMG $TMPDIR/hdr0
23 read_luks2_bin_hdr1 $TGT_IMG $TMPDIR/hdr1
28 # make area 7 being included in area 6
29 OFFS=$((2*LUKS2_HDR_SIZE*512))
30 json_str=$(jq -c --arg off $OFFS '.config.keyslots_size = (.segments."0".offset | tonumber - ($off | tonumber) + 4096 | tostring)' $TMPDIR/json0)
31 test -n "$json_str" || exit 2
32 # [.keyslots[].area.offset | tonumber] | max | tostring ---> max offset in keyslot areas
33 test ${#json_str} -lt $((LUKS2_JSON_SIZE*512)) || exit 2
35 write_luks2_json "$json_str" $TMPDIR/json0
37 merge_bin_hdr_with_json $TMPDIR/hdr0 $TMPDIR/json0 $TMPDIR/area0
38 erase_checksum $TMPDIR/area0
39 chks0=$(calc_sha256_checksum_file $TMPDIR/area0)
40 write_checksum $chks0 $TMPDIR/area0
41 write_luks2_hdr0 $TMPDIR/area0 $TGT_IMG
42 kill_bin_hdr $TMPDIR/hdr1
43 write_luks2_hdr1 $TMPDIR/hdr1 $TGT_IMG
48 read_luks2_bin_hdr1 $TGT_IMG $TMPDIR/hdr_res1
49 local str_res1=$(head -c 6 $TMPDIR/hdr_res1)
50 test "$str_res1" = "VACUUM" || exit 2
52 read_luks2_json0 $TGT_IMG $TMPDIR/json_res0
53 jq -c --arg off $OFFS 'if .config.keyslots_size != ( .segments."0".offset | tonumber - ($off | tonumber) + 4096 | tostring )
54 then error("Unexpected value in result json") else empty end' $TMPDIR/json_res0 || exit 5
63 test $# -eq 2 || exit 1
65 TGT_IMG=$1/$(test_img_name $0)