Merge branch 'upstream' into tizen
[platform/upstream/cryptsetup.git] / tests / luks2-integrity-test
1 #!/bin/bash
2 #
3 # Test cryptsetup/authenticated encryption compatibility.
4 #
5 [ -z "$CRYPTSETUP_PATH" ] && CRYPTSETUP_PATH=".."
6 CRYPTSETUP=$CRYPTSETUP_PATH/cryptsetup
7 DEV_NAME=dmi_test
8 DEV=mode-test.img
9 HEADER_IMG=mode-test-detached.img
10 PWD1=nHjJHjI23JK
11 KEY_FILE=key.img
12 FAST_PBKDF_OPT="--pbkdf pbkdf2 --pbkdf-force-iterations 1000"
13
14 CRYPTSETUP_VALGRIND=../.libs/cryptsetup
15 CRYPTSETUP_LIB_VALGRIND=../.libs
16
17 dmremove() { # device
18         udevadm settle >/dev/null 2>&1
19         dmsetup remove $1 >/dev/null 2>&1
20 }
21
22 cleanup() {
23         [ -b /dev/mapper/$DEV_NAME ] && dmremove $DEV_NAME
24         [ -b /dev/mapper/"$DEV_NAME"_dif ] && dmremove "$DEV_NAME"_dif
25         rm -f $DEV $KEY_FILE $HEADER_IMG >/dev/null 2>&1
26 }
27
28 fail()
29 {
30         echo
31         [ -n "$1" ] && echo "FAIL: $1"
32         echo "FAILED backtrace:"
33         while caller $frame; do ((frame++)); done
34         cleanup
35         exit 100
36 }
37
38 skip()
39 {
40         [ -n "$1" ] && echo "$1"
41         exit 77
42 }
43
44 function valgrind_setup()
45 {
46         command -v valgrind >/dev/null || fail "Cannot find valgrind."
47         [ ! -f $CRYPTSETUP_VALGRIND ] && fail "Unable to get location of cryptsetup executable."
48         export LD_LIBRARY_PATH="$CRYPTSETUP_LIB_VALGRIND:$LD_LIBRARY_PATH"
49 }
50
51 function valgrind_run()
52 {
53         INFOSTRING="$(basename ${BASH_SOURCE[1]})-line-${BASH_LINENO[0]}" ./valg.sh ${CRYPTSETUP_VALGRIND} "$@"
54 }
55
56 add_device() {
57         cleanup
58         dd if=/dev/urandom of=$KEY_FILE bs=1 count=512 >/dev/null 2>&1
59         dd if=/dev/zero of=$DEV bs=1M count=32 >/dev/null 2>&1
60         sync
61 }
62
63 status_check() # name value [detached]
64 {
65         if [ -n "$3" ]; then
66                 PARAMS="$DEV_NAME --header $HEADER_IMG"
67         else
68                 PARAMS="$DEV_NAME"
69         fi
70         X=$($CRYPTSETUP status $PARAMS | grep -m1 "$1" | sed -e 's/.*:[ \t]\+//' | cut -d' ' -f1)
71         if [ "$X" != "$2" ] ; then
72                 echo "[status FAIL]"
73                 echo " Expecting $1:$2 got \"$X\"."
74                 fail
75         fi
76 }
77
78 dump_check() # name value
79 {
80         X=$($CRYPTSETUP luksDump $DEV | grep -m1 "$1" | sed -e 's/.*:[ \t]\+//' | cut -d' ' -f1)
81         if [ "$X" != "$2" ] ; then
82                 echo "[dump FAIL]"
83                 echo " Expecting $1:$2 got \"$X\"."
84                 fail
85         fi
86 }
87
88 int_check_sum() # alg checksum
89 {
90         VSUM=$(sha256sum /dev/mapper/$DEV_NAME | cut -d' ' -f 1)
91         if [ "$VSUM" = "$2" ] ; then
92                 echo -n "[CHECKSUM]"
93         else
94                 echo "[FAIL]"
95                 echo " Expecting $2 got $VSUM."
96                 fail
97         fi
98 }
99
100 int_error_detection() # alg int sector_size
101 {
102         echo -n "[DETECT_CORRUPTION]"
103         echo -n "XXXXX" | dd of=$DEV bs=1M seek=28 count=1 conv=notrunc >/dev/null 2>&1 || fail "Cannot write to device."
104         $CRYPTSETUP open -d $KEY_FILE $DEV $DEV_NAME || fail "Cannot activate device."
105         dd if=/dev/mapper/$DEV_NAME  of=/dev/null >/dev/null 2>&1 && fail "Error detection failed."
106         $CRYPTSETUP close $DEV_NAME || fail "Cannot deactivate device."
107 }
108
109 intformat() # alg integrity integrity_out key_size int_key_size sector_size csum [test_hdr]
110 {
111         echo -n "[$1:$2:$4:$6]"
112         echo -n "[FORMAT]"
113         $CRYPTSETUP luksFormat --type luks2 -q -c $1 --integrity $2 --sector-size $6 -s $4 \
114                 $FAST_PBKDF_OPT -d $KEY_FILE $DEV --offset 8192 --integrity-legacy-padding >/dev/null 2>&1
115         if [ $? -ne 0 ] ; then
116                 echo "[N/A]"
117                 return
118         fi
119         dump_check "cipher" $1
120         dump_check "sector" $6
121         dump_check "integrity" $3
122         dump_check "Key:" $(($4 + $5))
123         echo -n "[ACTIVATE]"
124         $CRYPTSETUP open -d $KEY_FILE $DEV $DEV_NAME || fail "Cannot activate device."
125         status_check "cipher" $1
126         status_check "sector size" $6
127         status_check "integrity:" $3
128         status_check "keysize:" $(($4 + $5))
129         [ $5 -gt 0 ] && status_check "integrity keysize:" $5
130         int_check_sum $1 $7
131         echo -n "[REMOVE]"
132         $CRYPTSETUP close $DEV_NAME || fail "Cannot deactivate device."
133
134         # check detached header activation
135         if [ -n "$8" ] ; then
136                 echo -n "[DETACHED_HDR]"
137                 $CRYPTSETUP luksHeaderBackup -q --header-backup-file $HEADER_IMG $DEV || fail
138                 wipefs -a $DEV >/dev/null 2>&1  || fail
139                 $CRYPTSETUP open --header $HEADER_IMG -d $KEY_FILE $DEV $DEV_NAME || fail "Cannot activate device."
140                 status_check "cipher" $1 1
141                 status_check "sector size" $6 1
142                 status_check "integrity:" $3 1
143                 status_check "keysize:" $(($4 + $5)) 1
144                 [ $5 -gt 0 ] && status_check "integrity keysize:" $5 1
145                 int_check_sum $1 $7
146                 $CRYPTSETUP close $DEV_NAME || fail "Cannot deactivate device."
147                 $CRYPTSETUP luksHeaderRestore -q --header-backup-file $HEADER_IMG $DEV || fail
148                 rm -f $HEADER_IMG
149         fi
150
151         int_error_detection
152         echo "[OK]"
153 }
154
155 [ $(id -u) != 0 ] && skip "WARNING: You must be root to run this test, test skipped."
156 [ ! -x "$CRYPTSETUP" ] && skip "Cannot find $CRYPTSETUP, test skipped."
157 [ -n "$VALG" ] && valgrind_setup && CRYPTSETUP=valgrind_run
158 modprobe dm-integrity >/dev/null 2>&1
159 dmsetup targets | grep integrity >/dev/null 2>&1 || skip "Cannot find dm-integrity target, test skipped."
160 command -v wipefs >/dev/null ||  skip "Cannot find wipefs, test skipped."
161
162 add_device
163
164 intformat aes-cbc-essiv:sha256 hmac-sha256 hmac\(sha256\) 128 256  512 ee501705a084cd0ab6f4a28014bcf62b8bfa3434de00b82743c50b3abf06232c 1
165 intformat aes-xts-plain64      hmac-sha256 hmac\(sha256\) 256 256  512 ee501705a084cd0ab6f4a28014bcf62b8bfa3434de00b82743c50b3abf06232c 1
166 intformat aes-xts-random       hmac-sha256 hmac\(sha256\) 256 256  512 492c2d1cc9e222a850c399bfef4ed5a86bf5afc59e54f0f0c7ba8e2a64548323
167 intformat aes-cbc-essiv:sha256 hmac-sha256 hmac\(sha256\) 256 256  512 ee501705a084cd0ab6f4a28014bcf62b8bfa3434de00b82743c50b3abf06232c
168 intformat aes-xts-plain64      hmac-sha256 hmac\(sha256\) 512 256  512 ee501705a084cd0ab6f4a28014bcf62b8bfa3434de00b82743c50b3abf06232c
169 intformat aes-xts-random       hmac-sha256 hmac\(sha256\) 512 256  512 492c2d1cc9e222a850c399bfef4ed5a86bf5afc59e54f0f0c7ba8e2a64548323
170 intformat aes-cbc-essiv:sha256 hmac-sha256 hmac\(sha256\) 128 256 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
171 intformat aes-xts-plain64      hmac-sha256 hmac\(sha256\) 256 256 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
172 intformat aes-xts-random       hmac-sha256 hmac\(sha256\) 256 256 4096 8c0463f5ac09613674bdf40b0ff6f985edbc3de04e51fdc688873cb333ef3cda
173 intformat aes-cbc-essiv:sha256 hmac-sha256 hmac\(sha256\) 256 256 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
174 intformat aes-xts-plain64      hmac-sha256 hmac\(sha256\) 512 256 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
175 intformat aes-xts-random       hmac-sha256 hmac\(sha256\) 512 256 4096 8c0463f5ac09613674bdf40b0ff6f985edbc3de04e51fdc688873cb333ef3cda
176
177 intformat aes-cbc-essiv:sha256 hmac-sha512 hmac\(sha512\) 256 512 4096 9873d864fccb866521e79c9f0f75ad0c578d6bd7620399bbf4779e698c6e92fd
178 intformat aes-xts-essiv:sha256 hmac-sha512 hmac\(sha512\) 512 512 4096 9873d864fccb866521e79c9f0f75ad0c578d6bd7620399bbf4779e698c6e92fd
179 intformat aes-xts-plain64      hmac-sha512 hmac\(sha512\) 512 512 4096 9873d864fccb866521e79c9f0f75ad0c578d6bd7620399bbf4779e698c6e92fd
180 intformat aes-xts-random       hmac-sha512 hmac\(sha512\) 512 512 4096 621f6c03f7361c2bf8f10059ae822339223f8471c750b0cf8584fba7134bd4a2
181
182 intformat aes-xts-plain64 hmac-sha1 hmac\(sha1\) 512 160 4096 7370c66a92708fb71b186931468be6aa9b26f4f88373b00b1c57360b9ee1304e
183 intformat aes-xts-random  hmac-sha1 hmac\(sha1\) 512 160 4096 8c0463f5ac09613674bdf40b0ff6f985edbc3de04e51fdc688873cb333ef3cda
184
185 intformat aes-gcm-random aead aead 128 0  512 5f6f3f6be03c74d9aaaeaf40dd310c99a20e2786045f78a1fc6a0b189d231f57
186 intformat aes-gcm-random aead aead 128 0 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
187 intformat aes-gcm-random aead aead 256 0  512 5f6f3f6be03c74d9aaaeaf40dd310c99a20e2786045f78a1fc6a0b189d231f57
188 intformat aes-gcm-random aead aead 256 0 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
189
190 intformat aes-ccm-random aead aead 152 0  512 288e5e9bc5be6c0bd2a74abbb72c7944da83198b5e3041dcf159e7ae250dafa8
191 intformat aes-ccm-random aead aead 152 0 4096 7370c66a92708fb71b186931468be6aa9b26f4f88373b00b1c57360b9ee1304e
192 intformat aes-ccm-random aead aead 280 0  512 288e5e9bc5be6c0bd2a74abbb72c7944da83198b5e3041dcf159e7ae250dafa8
193 intformat aes-ccm-random aead aead 280 0 4096 7370c66a92708fb71b186931468be6aa9b26f4f88373b00b1c57360b9ee1304e
194
195 intformat chacha20-plain64 poly1305 poly1305 256 0  512 3f82eae753ff52a689ddc559c691bbdff838361bbe9a3ce8c7212e16e51b5dbe
196 intformat chacha20-random  poly1305 poly1305 256 0  512 5f6f3f6be03c74d9aaaeaf40dd310c99a20e2786045f78a1fc6a0b189d231f57
197 intformat chacha20-plain64 poly1305 poly1305 256 0 4096 7370c66a92708fb71b186931468be6aa9b26f4f88373b00b1c57360b9ee1304e
198 intformat chacha20-random  poly1305 poly1305 256 0 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b
199
200 intformat aegis128-random  aead aead 128 0  512 ee501705a084cd0ab6f4a28014bcf62b8bfa3434de00b82743c50b3abf06232c 1
201 intformat aegis128-random  aead aead 128 0 4096 358d6beceddf593aff6b22c31684e0df9c226330aff5812e060950215217d21b 1
202
203 cleanup