8 # generate primary header with luks2 keyslot assigned
9 # to more than 1 digest.
11 # secondary header is corrupted on purpose as well
15 # $2 full source luks2 image
20 test -d $TMPDIR || mkdir $TMPDIR
21 read_luks2_json0 $TGT_IMG $TMPDIR/json0
22 read_luks2_bin_hdr0 $TGT_IMG $TMPDIR/hdr0
23 read_luks2_bin_hdr1 $TGT_IMG $TMPDIR/hdr1
28 # add keyslot 1 to second digest
29 json_str=$(jq -r -c -M '.digests."1" = .digests."0" | .digests."1".keyslots = ["1"]' $TMPDIR/json0)
30 test ${#json_str} -lt $((LUKS2_JSON_SIZE*512)) || exit 2
32 write_luks2_json "$json_str" $TMPDIR/json0
34 merge_bin_hdr_with_json $TMPDIR/hdr0 $TMPDIR/json0 $TMPDIR/area0
35 erase_checksum $TMPDIR/area0
36 chks0=$(calc_sha256_checksum_file $TMPDIR/area0)
37 write_checksum $chks0 $TMPDIR/area0
38 write_luks2_hdr0 $TMPDIR/area0 $TGT_IMG
39 kill_bin_hdr $TMPDIR/hdr1
40 write_luks2_hdr1 $TMPDIR/hdr1 $TGT_IMG
45 read_luks2_bin_hdr1 $TGT_IMG $TMPDIR/hdr_res1
46 local str_res1=$(head -c 6 $TMPDIR/hdr_res1)
47 test "$str_res1" = "VACUUM" || exit 2
49 read_luks2_json0 $TGT_IMG $TMPDIR/json_res0
50 chks_res0=$(read_sha256_checksum $TGT_IMG)
51 test "$chks0" = "$chks_res0" || exit 2
52 new_arr_len=$(jq -c -M '.digests."1".keyslots | length' $TMPDIR/json_res0)
53 test 1 -eq $new_arr_len || exit 2
62 test $# -eq 2 || exit 1
64 TGT_IMG=$1/$(test_img_name $0)