3 CRYPTSETUP=../src/cryptsetup
4 REENC=../src/cryptsetup-reencrypt
12 function remove_mapping()
14 [ -b /dev/mapper/$DEV_NAME2 ] && dmsetup remove $DEV_NAME2
15 [ -b /dev/mapper/$DEV_NAME ] && dmsetup remove $DEV_NAME
16 [ ! -z "$LOOPDEV1" ] && losetup -d $LOOPDEV1 >/dev/null 2>&1
17 rm -f $IMG $KEY1 >/dev/null 2>&1
23 [ -n "$1" ] && echo "$1"
31 [ -n "$1" ] && echo "$1"
38 echo "$1" | $CRYPTSETUP luksOpen $LOOPDEV1 $DEV_NAME || fail
40 $CRYPTSETUP luksOpen -d key1 $LOOPDEV1 $DEV_NAME || fail
44 function wipe_dev() # $1 dev
46 dd if=/dev/zero of=$1 bs=256k >/dev/null 2>&1
49 function wipe() # $1 pass
52 wipe_dev /dev/mapper/$DEV_NAME
53 $CRYPTSETUP luksClose $DEV_NAME || fail
56 function prepare() # $1 dev1_siz
60 dd if=/dev/zero of=$IMG bs=1k count=$1 >/dev/null 2>&1
61 LOOPDEV1=$(losetup -f 2>/dev/null)
62 [ -z "$LOOPDEV1" ] && fail "No free loop device"
63 losetup $LOOPDEV1 $IMG
65 if [ ! -e $KEY1 ]; then
66 dd if=/dev/urandom of=$KEY1 count=1 bs=32 >/dev/null 2>&1
70 function check_hash_dev() # $1 dev, $2 hash
72 HASH=$(sha256sum $1 | cut -d' ' -f 1)
73 [ $HASH != "$2" ] && fail "HASH differs ($HASH)"
76 function check_hash() # $1 pwd, $2 hash
79 check_hash_dev /dev/mapper/$DEV_NAME $2
80 $CRYPTSETUP remove $DEV_NAME || fail
83 [ $(id -u) != 0 ] && skip "WARNING: You must be root to run this test, test skipped."
84 [ ! -x "$REENC" ] && skip "Cannot find $REENC, test skipped."
88 HASH1=b69dae56a14d1a8314ed40664c4033ea0a550eea2673e04df42a66ac6b9faf2c
89 HASH2=d85ef2a08aeac2812a648deb875485a6e3848fc3d43ce4aa380937f08199f86b
90 HASH3=e4e5749032a5163c45125eccf3e8598ba5ed840df442c97e1d5ad4ad84359605
92 echo "[1] Reencryption"
94 echo $PWD1 | $CRYPTSETUP -q luksFormat -s 128 -c aes-cbc-plain -i 1 --align-payload 4096 $LOOPDEV1 || fail
96 check_hash $PWD1 $HASH1
97 echo $PWD1 | $REENC $LOOPDEV1 -q
98 check_hash $PWD1 $HASH1
99 echo $PWD1 | $REENC $LOOPDEV1 -q -s 256
100 check_hash $PWD1 $HASH1
101 echo $PWD1 | $REENC $LOOPDEV1 -q -s 256 -c aes-xts-plain64 -h sha256
102 check_hash $PWD1 $HASH1
103 echo $PWD1 | $REENC $LOOPDEV1 -q --use-directio
104 check_hash $PWD1 $HASH1
106 echo "[2] Reencryption with data shift"
107 echo $PWD1 | $CRYPTSETUP -q luksFormat -c aes-cbc-essiv:sha256 -s 128 -i 1 --align-payload 2048 $LOOPDEV1 || fail
109 echo $PWD1 | $REENC $LOOPDEV1 -q -s 256 --reduce-device-size 1024S || fail
110 check_hash $PWD1 $HASH2
111 echo $PWD1 | $REENC $LOOPDEV1 -q -i 1 || fail
112 check_hash $PWD1 $HASH2
114 echo "[3] Reencryption with keyfile"
115 echo $PWD1 | $CRYPTSETUP -q luksFormat -d key1 -c aes-cbc-essiv:sha256 -s 128 -i 1 --align-payload 4096 $LOOPDEV1 || fail
118 echo $PWD1 | $CRYPTSETUP -q luksAddKey -d key1 $LOOPDEV1 || fail
119 $REENC $LOOPDEV1 -d key1 -S 0 -i 1 -q || fail
121 # FIXME echo $PWD1 | $REENC ...
123 echo "[4] Encryption of not yet encrypted device"
124 # well, movin' zeroes :-)
126 SIZE=$(blockdev --getsz $LOOPDEV1)
128 dmsetup create $DEV_NAME2 --table "0 $(($SIZE - $OFFSET)) linear $LOOPDEV1 0" || fail
129 check_hash_dev /dev/mapper/$DEV_NAME2 $HASH3
130 dmsetup remove $DEV_NAME2 || fail
131 echo $PWD1 | $REENC $LOOPDEV1 -c aes-cbc-essiv:sha256 -s 128 --new --reduce-device-size "$OFFSET"S -q
132 check_hash $PWD1 $HASH3