3 VERITYSETUP=../src/veritysetup
6 DEV_OUT="$DEV_NAME.out"
10 function remove_mapping()
12 [ -b /dev/mapper/$DEV_NAME ] && dmsetup remove $DEV_NAME
13 [ ! -z "$LOOPDEV1" ] && losetup -d $LOOPDEV1 >/dev/null 2>&1
14 [ ! -z "$LOOPDEV2" ] && losetup -d $LOOPDEV2 >/dev/null 2>&1
15 rm -f $IMG $IMG_HASH $DEV_OUT >/dev/null 2>&1
22 [ -n "$1" ] && echo "$1"
24 [ -f $DEV_OUT ] && cat $DEV_OUT
31 [ -n "$1" ] && echo "$1"
35 function prepare() # $1 dev1_siz [$2 dev2_size]
39 dd if=/dev/zero of=$IMG bs=1k count=$1 >/dev/null 2>&1
40 LOOPDEV1=$(losetup -f 2>/dev/null)
41 [ -z "$LOOPDEV1" ] && fail "No free loop device"
42 losetup $LOOPDEV1 $IMG
45 dd if=/dev/zero of=$IMG_HASH bs=1k count=$2 >/dev/null 2>&1
46 LOOPDEV2=$(losetup -f 2>/dev/null)
47 [ -z "$LOOPDEV2" ] && fail "No free loop device"
48 losetup $LOOPDEV2 $IMG_HASH
53 dd if=/dev/zero of=$LOOPDEV1 bs=256k >/dev/null 2>&1
54 dd if=/dev/zero of=$LOOPDEV2 bs=256k >/dev/null 2>&1
55 rm -f $DEV_OUT >/dev/null 2>&1
58 function check_exists()
60 [ -b /dev/mapper/$DEV_NAME ] || fail
63 function compare_out() # $1 what, $2 expected
65 OPT=$(grep -v "^#" $DEV_OUT | grep -i "$1" | sed -e s/.*\:\ // )
67 [ $OPT != $2 ] && fail "$1 differs ($2)"
70 function check_root_hash() # $1 size, $2 hash, $3 salt, $4 version, $5 hash, [$6 offset]
72 if [ -z "$LOOPDEV2" ] ; then
73 BLOCKS=$(($6 * 512 / $1))
74 DEV_PARAMS="$LOOPDEV1 $LOOPDEV1 \
76 --data-blocks=$BLOCKS --debug"
78 DEV_PARAMS="$LOOPDEV1 $LOOPDEV2"
81 for fail in data hash; do
83 echo -n "V$4 $5 block size $1: "
84 $VERITYSETUP format $DEV_PARAMS --format=$4 \
85 --data-block-size=$1 --hash-block-size=$1 \
90 compare_out "root hash" $2
91 compare_out "alt" "$3"
93 $VERITYSETUP verify $DEV_PARAMS $2 >>$DEV_OUT 2>&1 || fail
96 $VERITYSETUP create $DEV_NAME $DEV_PARAMS $2 >>$DEV_OUT 2>&1 || fail
100 dd if=/dev/mapper/$DEV_NAME of=/dev/null bs=$1 2>/dev/null
101 dmsetup status $DEV_NAME | grep "verity V" >/dev/null || fail
102 echo -n "[in-kernel verify]"
104 $VERITYSETUP remove $DEV_NAME || fail
108 dd if=/dev/urandom of=$LOOPDEV1 bs=1 seek=3456 count=1 2>/dev/null
112 if [ -z "$LOOPDEV2" ] ; then
113 dd if=/dev/urandom of=$LOOPDEV1 bs=1 seek=$((8193 + $4)) count=1 2>/dev/null
115 dd if=/dev/urandom of=$LOOPDEV2 bs=1 seek=8193 count=1 2>/dev/null
121 $VERITYSETUP verify $DEV_PARAMS $2 >>$DEV_OUT 2>&1 && \
122 fail "userspace check for $TXT corruption"
123 $VERITYSETUP create $DEV_NAME $DEV_PARAMS $2 >>$DEV_OUT 2>&1 || \
125 dd if=/dev/mapper/$DEV_NAME of=/dev/null bs=$1 2>/dev/null
126 dmsetup status $DEV_NAME | grep "verity V" >/dev/null && \
127 fail "in-kernel check for $TXT corruption"
128 $VERITYSETUP remove $DEV_NAME || fail "deactivation"
129 echo "[$TXT corruption]"
133 function valgrind_setup()
135 which valgrind >/dev/null 2>&1 || fail "Cannot find valgrind."
136 [ ! -f $CRYPTSETUP_VALGRIND ] && fail "Unable to get location of cryptsetup executable."
137 #export LD_LIBRARY_PATH="$CRYPTSETUP_LIB_VALGRIND:$LD_LIBRARY_PATH"
140 function valgrind_run()
142 INFOSTRING="$(basename ${BASH_SOURCE[1]})-line-${BASH_LINENO[0]}" ./valg.sh ${VERITYSETUP} "$@"
145 [ $(id -u) != 0 ] && skip "WARNING: You must be root to run this test, test skipped."
146 [ ! -x "$VERITYSETUP" ] && skip "Cannot find $VERITYSETUP, test skipped."
148 [ -n "$VALG" ] && valgrind_setup && VERITYSETUP=valgrind_run
152 SALT=e48da609055204e89ae53b655ca2216dd983cf3cb829f34f63a297d106d53e2d
154 echo "Verity tests [separate devices]"
156 check_root_hash 512 9de18652fe74edfb9b805aaed72ae2aa48f94333f1ba5c452ac33b1c39325174 $SALT 1 sha256
157 check_root_hash 1024 54d92778750495d1f80832b486ebd007617d746271511bbf0e295e143da2b3df $SALT 1 sha256
158 check_root_hash 4096 e522df0f97da4febb882ac40f30b37dc0b444bf6df418929463fa25280f09d5c $SALT 1 sha256
160 check_root_hash 4096 cbbf4ebd004ef65e29b935bb635a39cf754d677f3fa10b0126da725bbdf10f7d $SALT 0 sha256
162 check_root_hash 1024 d0e9163ca8844aaa2e88fe5265a8c5d9ee494a99 $SALT 1 sha1
163 check_root_hash 1024 73509e8e868be6b8ac939817a98a3d35121413b2 dadada 1 sha1
165 echo "Verity tests [one device offset]"
166 prepare $((8192 + 1024))
167 check_root_hash 512 9de18652fe74edfb9b805aaed72ae2aa48f94333f1ba5c452ac33b1c39325174 $SALT 1 sha256 16384
168 check_root_hash 1024 54d92778750495d1f80832b486ebd007617d746271511bbf0e295e143da2b3df $SALT 1 sha256 16384
169 check_root_hash 4096 e522df0f97da4febb882ac40f30b37dc0b444bf6df418929463fa25280f09d5c $SALT 1 sha256 16384
171 check_root_hash 4096 cbbf4ebd004ef65e29b935bb635a39cf754d677f3fa10b0126da725bbdf10f7d $SALT 0 sha256 16384
173 check_root_hash 1024 d0e9163ca8844aaa2e88fe5265a8c5d9ee494a99 $SALT 1 sha1 16384
174 check_root_hash 1024 73509e8e868be6b8ac939817a98a3d35121413b2 dadada 1 sha1 16384