3 [ -z "$CRYPTSETUP_PATH" ] && CRYPTSETUP_PATH=".."
4 CRYPTSETUP=$CRYPTSETUP_PATH/cryptsetup
6 # try to validate using loop-AES losetup/kernel if available
7 LOSETUP_AES=/losetup-aes.old
9 LOOP_DD_PARAM="bs=1k count=10000"
15 LOOPDEV=$(losetup -f 2>/dev/null)
17 function dmremove() { # device
18 udevadm settle >/dev/null 2>&1
19 dmsetup remove --retry $1 >/dev/null 2>&1
22 function remove_mapping()
24 [ -b /dev/mapper/$DEV_NAME2 ] && dmremove $DEV_NAME2
25 [ -b /dev/mapper/$DEV_NAME ] && dmremove $DEV_NAME
26 losetup -d $LOOPDEV >/dev/null 2>&1
27 rm -f $IMG $KEYv1 $KEYv2 $KEYv3 >/dev/null 2>&1
32 echo "FAILED backtrace:"
33 while caller $frame; do ((frame++)); done
40 [ -n "$1" ] && echo "$1"
47 dd if=/dev/zero of=$IMG $LOOP_DD_PARAM >/dev/null 2>&1
51 # Prepare raw key: v1 - one key, v2 - 64 keys, v3 - 64 + one IV
52 if [ ! -e $KEYv3 ]; then
53 head -c 3705 /dev/urandom | uuencode -m - | head -n 66 | tail -n 65 >$KEYv3
54 head -n 1 $KEYv3 > $KEYv1
55 head -n 64 $KEYv3 > $KEYv2
57 [ -n "$1" ] && echo -n "$1 "
60 function check_exists()
62 [ -b /dev/mapper/$DEV_NAME ] || fail
65 function get_offset_params() # $offset
68 if [ "${offset:0:1}" = "@" ] ; then
69 echo "-o $((${offset:1} / 512)) -p 0"
71 echo "-o $((offset / 512))"
75 function get_expsum() # $offset
79 echo "31e00e0e4c233c89051cd748122fde2c98db0121ca09ba93a3820817ea037bc5"
82 echo "bfd94392d1dd8f5d477251d21b3c736e177a4945cd4937847fc7bace82996aed"
85 echo "33838fe36928a929bd7971bed7e82bd426c88193fcd692c2e6f1b9c9bfecd4d6"
92 function check_sum() # $key $keysize $offset [stdin|keyfile]
94 # Fill device with zeroes and reopen it
95 dd if=/dev/zero of=/dev/mapper/$DEV_NAME bs=1k $LOOP_DD_PARAM >/dev/null 2>&1
99 EXPSUM=$(get_expsum $3)
100 if [ "$4" == "stdin" ] ; then
101 cat $1 | $CRYPTSETUP loopaesOpen $LOOPDEV $DEV_NAME -s $2 --key-file - $(get_offset_params $3) >/dev/null 2>&1
103 $CRYPTSETUP loopaesOpen $LOOPDEV $DEV_NAME -s $2 --key-file $1 $(get_offset_params $3) >/dev/null 2>&1
106 VSUM=$(sha256sum /dev/mapper/$DEV_NAME | cut -d' ' -f 1)
107 if [ $ret -eq 0 -a "$VSUM" = "$EXPSUM" ] ; then
111 [ "$VSUM" != "$EXPSUM" ] && echo " Expecting $EXPSUM got $VSUM."
116 function check_sum_losetup() # $key $alg
118 [ ! -x $LOSETUP_AES ] && echo && return
120 echo -n " Verification using loop-AES: "
122 losetup -d $LOOPDEV >/dev/null 2>&1
123 cat $1 | $LOSETUP_AES -p 0 -e $2 -o $3 $LOOPDEV $IMG
125 VSUM=$(sha256sum $LOOPDEV | cut -d' ' -f 1)
126 if [ $ret -eq 0 -a "$VSUM" = "$EXPSUM" ] ; then
130 [ "$VSUM" != "$EXPSUM" ] && echo " Expecting $EXPSUM got $VSUM (loop-AES)."
133 losetup -d $LOOPDEV >/dev/null 2>&1
136 function check_version()
138 VER_STR=$(dmsetup version | grep Driver)
139 VER_MIN=$(echo $VER_STR | cut -f 2 -d.)
140 VER_PATCH=$(echo $VER_STR | cut -f 3 -d.)
142 test $VER_MIN -lt 19 && return 1
143 test $VER_MIN -eq 19 -a $VER_PATCH -ge 6 && return 1 # RHEL
147 [ $(id -u) != 0 ] && skip "WARNING: You must be root to run this test, test skipped."
148 [ -z "$LOOPDEV" ] && skip "Cannot find free loop device, test skipped."
149 which uuencode >/dev/null 2>&1 || skip "WARNING: test require uuencode binary, test skipped."
150 check_version || skip "Probably old kernel, test skipped."
154 KEY_FILES="$KEYv1 $KEYv2 $KEYv3"
155 DEV_OFFSET="0 8192 @8192 8388608 @8388608"
157 for key_size in $KEY_SIZES ; do
158 for key in $KEY_FILES ; do
159 for offset in $DEV_OFFSET ; do
160 prepare "Open loop-AES $key / AES-$key_size / offset $offset"
161 $CRYPTSETUP loopaesOpen $LOOPDEV $DEV_NAME \
162 -s $key_size --key-file $key $(get_offset_params $offset) \
164 [ $? -ne 0 ] && echo "[SKIPPED]" && continue
166 check_sum $key $key_size $offset keyfile
167 $CRYPTSETUP loopaesClose $DEV_NAME || fail
168 check_sum $key $key_size $offset stdin
169 $CRYPTSETUP loopaesClose $DEV_NAME || fail
170 check_sum_losetup $key AES$key_size $offset