Imported Upstream version 2.6.1
[platform/upstream/cryptsetup.git] / tests / loopaes-test
1 #!/bin/bash
2
3 [ -z "$CRYPTSETUP_PATH" ] && CRYPTSETUP_PATH=".."
4 CRYPTSETUP=$CRYPTSETUP_PATH/cryptsetup
5
6 CRYPTSETUP_VALGRIND=../.libs/cryptsetup
7 CRYPTSETUP_LIB_VALGRIND=../.libs
8
9 # try to validate using loop-AES losetup/kernel if available
10 LOSETUP_AES=/losetup-aes.old
11
12 LOOP_DD_PARAM="bs=1k count=10000"
13 DEV_NAME=dummy
14 IMG=loopaes.img
15 KEYv1=key_v1
16 KEYv2=key_v2
17 KEYv3=key_v3
18 LOOPDEV=$(losetup -f 2>/dev/null)
19
20 function dmremove() { # device
21         udevadm settle >/dev/null 2>&1
22         dmsetup remove --retry $1 >/dev/null 2>&1
23 }
24
25 function remove_mapping()
26 {
27         [ -b /dev/mapper/$DEV_NAME2 ] && dmremove $DEV_NAME2
28         [ -b /dev/mapper/$DEV_NAME ] && dmremove $DEV_NAME
29         losetup -d $LOOPDEV >/dev/null 2>&1
30         rm -f $IMG $KEYv1 $KEYv2 $KEYv3 >/dev/null 2>&1
31 }
32
33 function fail()
34 {
35         echo "FAILED backtrace:"
36         while caller $frame; do ((frame++)); done
37         remove_mapping
38         exit 2
39 }
40
41 function skip()
42 {
43         remove_mapping
44         [ -n "$1" ] && echo "$1"
45         exit 77
46 }
47
48 function valgrind_setup()
49 {
50         command -v valgrind >/dev/null || fail "Cannot find valgrind."
51         [ ! -f $CRYPTSETUP_VALGRIND ] && fail "Unable to get location of cryptsetup executable."
52         export LD_LIBRARY_PATH="$CRYPTSETUP_LIB_VALGRIND:$LD_LIBRARY_PATH"
53 }
54
55 function valgrind_run()
56 {
57         INFOSTRING="$(basename ${BASH_SOURCE[1]})-line-${BASH_LINENO[0]}" ./valg.sh ${CRYPTSETUP_VALGRIND} "$@"
58 }
59
60 function prepare()
61 {
62         remove_mapping
63         dd if=/dev/zero of=$IMG $LOOP_DD_PARAM >/dev/null 2>&1
64         sync
65         losetup $LOOPDEV $IMG
66
67         # Prepare raw key: v1 - one key, v2 - 64 keys, v3 - 64 + one IV
68         if [ ! -e $KEYv3 ]; then
69                 head -c 3705 /dev/urandom | uuencode -m - | head -n 66 | tail -n 65 >$KEYv3
70                 head -n 1 $KEYv3 > $KEYv1
71                 head -n 64 $KEYv3 > $KEYv2
72         fi
73         [ -n "$1" ] && echo -n "$1 "
74 }
75
76 function check_exists()
77 {
78         [ -b /dev/mapper/$DEV_NAME ] || fail
79 }
80
81 function get_offset_params() # $offset
82 {
83         offset=$1
84         if [ "${offset:0:1}" = "@" ] ; then
85                 echo "-o $((${offset:1} / 512)) -p 0"
86         else
87                 echo "-o $((offset / 512))"
88         fi
89 }
90
91 function get_expsum() # $offset
92 {
93         case $1 in
94         0)
95            echo "31e00e0e4c233c89051cd748122fde2c98db0121ca09ba93a3820817ea037bc5"
96            ;;
97         @8192 | 8192)
98            echo "bfd94392d1dd8f5d477251d21b3c736e177a4945cd4937847fc7bace82996aed"
99            ;;
100         @8388608 | 8388608)
101            echo "33838fe36928a929bd7971bed7e82bd426c88193fcd692c2e6f1b9c9bfecd4d6"
102            ;;
103         *) fail
104            ;;
105         esac
106 }
107
108 function check_sum() # $key $keysize $offset [stdin|keyfile]
109 {
110         $CRYPTSETUP close $DEV_NAME || fail
111
112         EXPSUM=$(get_expsum $3)
113         if [ "$4" == "stdin" ] ; then
114                 cat $1 | $CRYPTSETUP loopaesOpen $LOOPDEV $DEV_NAME -s $2 --key-file - $(get_offset_params $3) >/dev/null 2>&1
115         else
116                 $CRYPTSETUP loopaesOpen $LOOPDEV $DEV_NAME -s $2 --key-file $1 $(get_offset_params $3) >/dev/null 2>&1
117         fi
118         ret=$?
119         VSUM=$(sha256sum /dev/mapper/$DEV_NAME | cut -d' ' -f 1)
120         if [ $ret -eq 0 -a "$VSUM" = "$EXPSUM" ] ; then
121                 echo -n "[$4:OK]"
122         else
123                 echo "[$4:FAIL]"
124                 [ "$VSUM" != "$EXPSUM" ] && echo " Expecting $EXPSUM got $VSUM."
125                 fail
126         fi
127 }
128
129 function check_sum_losetup() # $key $alg
130 {
131         [ ! -x $LOSETUP_AES ] && echo && return
132
133         echo -n " Verification using loop-AES: "
134
135         losetup -d $LOOPDEV >/dev/null 2>&1
136         cat $1 | $LOSETUP_AES -p 0 -e $2 -o $3 $LOOPDEV $IMG
137         ret=$?
138         VSUM=$(sha256sum $LOOPDEV | cut -d' ' -f 1)
139         if [ $ret -eq 0 -a "$VSUM" = "$EXPSUM" ] ; then
140                 echo "[OK]"
141         else
142                 echo "[FAIL]"
143                 [ "$VSUM" != "$EXPSUM" ] && echo " Expecting $EXPSUM got $VSUM (loop-AES)."
144                 fail
145         fi
146         losetup -d $LOOPDEV >/dev/null 2>&1
147 }
148
149 function check_version()
150 {
151         VER_STR=$(dmsetup version | grep Driver)
152         VER_MIN=$(echo $VER_STR | cut -f 2 -d.)
153         VER_PATCH=$(echo $VER_STR | cut -f 3 -d.)
154
155         test $VER_MIN -lt 19 && return 1
156         test $VER_MIN -eq 19 -a $VER_PATCH -ge 6 && return 1 # RHEL
157         return 0
158 }
159
160 [ $(id -u) != 0 ] && skip "WARNING: You must be root to run this test, test skipped."
161 [ -z "$LOOPDEV" ] && skip "Cannot find free loop device, test skipped."
162 [ ! -x "$CRYPTSETUP" ] && skip "Cannot find $CRYPTSETUP, test skipped."
163 [ -n "$VALG" ] && valgrind_setup && CRYPTSETUP=valgrind_run
164 command -v uuencode >/dev/null || skip "WARNING: test require uuencode binary, test skipped."
165 check_version || skip "Probably old kernel, test skipped."
166
167 # loop-AES tests
168 KEY_SIZES="128 256"
169 KEY_FILES="$KEYv1 $KEYv2 $KEYv3"
170 DEV_OFFSET="0 8192 @8192 8388608 @8388608"
171
172 for key_size in $KEY_SIZES ; do
173     for key in $KEY_FILES ; do
174         for offset in $DEV_OFFSET ; do
175                 prepare "Open loop-AES $key / AES-$key_size / offset $offset"
176                 $CRYPTSETUP loopaesOpen $LOOPDEV $DEV_NAME \
177                         -s $key_size --key-file $key $(get_offset_params $offset) \
178                         2>/dev/null
179                 [ $? -ne 0 ] && echo "[SKIPPED]" && continue
180                 check_exists
181                 # Fill device with zeroes and reopen it
182                 dd if=/dev/zero of=/dev/mapper/$DEV_NAME $LOOP_DD_PARAM >/dev/null 2>&1
183                 check_sum $key $key_size $offset keyfile
184                 check_sum $key $key_size $offset stdin
185                 $CRYPTSETUP loopaesClose $DEV_NAME || fail
186                 check_sum_losetup $key AES$key_size $offset
187         done
188     done
189 done
190
191 remove_mapping
192 exit 0