mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-11 10:50:01 +01:00
Replace mk_ with vk_ name prefix.
This commit is contained in:
@@ -702,9 +702,9 @@ static void AddDeviceLuks2(void)
|
||||
char key[128], key2[128], key3[128];
|
||||
|
||||
const char *tmp_buf, *passphrase = "blabla", *passphrase2 = "nsdkFI&Y#.sd";
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *mk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *vk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset, r_header_size, r_size_1;
|
||||
@@ -716,8 +716,8 @@ static void AddDeviceLuks2(void)
|
||||
pbkdf.max_memory_kb = 0;
|
||||
}
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key3, mk_hex2, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
crypt_decode_key(key3, vk_hex2, key_size);
|
||||
|
||||
// init test devices
|
||||
OK_(get_luks2_offsets(0, 0, 0, &r_header_size, &r_payload_offset));
|
||||
@@ -1050,8 +1050,8 @@ static void Luks2MetadataSize(void)
|
||||
char key[128], tmp[128];
|
||||
|
||||
const char *passphrase = "blabla";
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_header_size, default_mdata_size, default_keyslots_size, mdata_size,
|
||||
@@ -1065,7 +1065,7 @@ static void Luks2MetadataSize(void)
|
||||
pbkdf.iterations = 1000;
|
||||
}
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
// init test devices
|
||||
OK_(get_luks2_offsets(0, 0, 0, &r_header_size, NULL));
|
||||
@@ -1244,8 +1244,8 @@ static void Luks2HeaderRestore(void)
|
||||
};
|
||||
uint32_t flags = 0;
|
||||
|
||||
const char *mk_hex = "ccadd99b16cd3d200c22d6db45d8b6630ef3d936767127347ec8a76ab992c2ea";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "ccadd99b16cd3d200c22d6db45d8b6630ef3d936767127347ec8a76ab992c2ea";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset;
|
||||
@@ -1257,7 +1257,7 @@ static void Luks2HeaderRestore(void)
|
||||
pbkdf.max_memory_kb = 0;
|
||||
}
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
OK_(get_luks2_offsets(0, params.data_alignment, 0, NULL, &r_payload_offset));
|
||||
OK_(create_dmdevice_over_loop(L_DEVICE_OK, r_payload_offset + 5000));
|
||||
@@ -1346,8 +1346,8 @@ static void Luks2HeaderLoad(void)
|
||||
};
|
||||
char key[128], cmd[256];
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset, r_header_size, img_size;
|
||||
@@ -1359,7 +1359,7 @@ static void Luks2HeaderLoad(void)
|
||||
pbkdf.max_memory_kb = 0;
|
||||
}
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
// hardcoded values for existing image IMAGE1
|
||||
img_size = 8192;
|
||||
@@ -1479,8 +1479,8 @@ static void Luks2HeaderBackup(void)
|
||||
char key[128];
|
||||
int fd, ro = O_RDONLY;
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset;
|
||||
@@ -1494,7 +1494,7 @@ static void Luks2HeaderBackup(void)
|
||||
pbkdf.max_memory_kb = 0;
|
||||
}
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
OK_(get_luks2_offsets(1, params.data_alignment, 0, NULL, &r_payload_offset));
|
||||
OK_(create_dmdevice_over_loop(L_DEVICE_OK, r_payload_offset + 1));
|
||||
@@ -1576,8 +1576,8 @@ static void ResizeDeviceLuks2(void)
|
||||
};
|
||||
char key[128];
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset, r_header_size, r_size;
|
||||
@@ -1589,7 +1589,7 @@ static void ResizeDeviceLuks2(void)
|
||||
pbkdf.max_memory_kb = 0;
|
||||
}
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
// prepare env
|
||||
OK_(get_luks2_offsets(0, params.data_alignment, 0, NULL, &r_payload_offset));
|
||||
@@ -2919,9 +2919,9 @@ static void Luks2KeyslotAdd(void)
|
||||
{
|
||||
char key[128], key2[128], key_ret[128];
|
||||
const char *cipher = "aes", *cipher_mode="xts-plain64";
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *mk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_ret_len, key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *vk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_ret_len, key_size = strlen(vk_hex) / 2;
|
||||
uint64_t r_payload_offset;
|
||||
struct crypt_pbkdf_type pbkdf = {
|
||||
.type = "argon2i",
|
||||
@@ -2936,8 +2936,8 @@ static void Luks2KeyslotAdd(void)
|
||||
.sector_size = TST_SECTOR_SIZE
|
||||
};
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key2, mk_hex2, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
crypt_decode_key(key2, vk_hex2, key_size);
|
||||
|
||||
/* Cannot use Argon2 in FIPS */
|
||||
if (_fips_mode) {
|
||||
@@ -3058,13 +3058,13 @@ static void Luks2KeyslotParams(void)
|
||||
char key[128], key2[128];
|
||||
const char *cipher = "aes", *cipher_mode="xts-plain64";
|
||||
const char *cipher_spec = "aes-xts-plain64", *cipher_keyslot = "aes-cbc-essiv:sha256";
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *mk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size_ret, key_size = strlen(mk_hex) / 2, keyslot_key_size = 16;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *vk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size_ret, key_size = strlen(vk_hex) / 2, keyslot_key_size = 16;
|
||||
uint64_t r_payload_offset;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key2, mk_hex2, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
crypt_decode_key(key2, vk_hex2, key_size);
|
||||
|
||||
OK_(prepare_keyfile(KEYFILE1, PASSPHRASE, strlen(PASSPHRASE)));
|
||||
OK_(prepare_keyfile(KEYFILE2, PASSPHRASE1, strlen(PASSPHRASE1)));
|
||||
@@ -3649,17 +3649,17 @@ static void Luks2Refresh(void)
|
||||
uint64_t r_payload_offset;
|
||||
char key[128], key1[128];
|
||||
const char *cipher = "aes", *mode = "xts-plain64";
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c645be6a5b84818afe7a78a6de7a1a";
|
||||
const char *mk_hex2 = "bb22158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c645be6a5b84818afe7a78a6de7a1a";
|
||||
const char *vk_hex2 = "bb22158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
struct crypt_params_luks2 params = {
|
||||
.sector_size = 512,
|
||||
.integrity = "aead"
|
||||
};
|
||||
struct crypt_active_device cad = {};
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key1, mk_hex2, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
crypt_decode_key(key1, vk_hex2, key_size);
|
||||
|
||||
OK_(get_luks2_offsets(0, 0, 0, NULL, &r_payload_offset));
|
||||
OK_(create_dmdevice_over_loop(L_DEVICE_OK, r_payload_offset + 1000));
|
||||
@@ -3871,11 +3871,11 @@ static void Luks2Reencryption(void)
|
||||
};
|
||||
dev_t devno;
|
||||
|
||||
const char *mk_hex = "bb21babe733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21babe733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
char key[128];
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
/* reencryption currently depends on kernel keyring support in dm-crypt */
|
||||
if (!t_dm_crypt_keyring_support())
|
||||
|
||||
@@ -325,14 +325,14 @@ static void AddDevicePlain(void)
|
||||
|
||||
const char *passphrase = PASSPHRASE;
|
||||
// hashed hex version of PASSPHRASE
|
||||
const char *mk_hex = "ccadd99b16cd3d200c22d6db45d8b6630ef3d936767127347ec8a76ab992c2ea";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "ccadd99b16cd3d200c22d6db45d8b6630ef3d936767127347ec8a76ab992c2ea";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
|
||||
uint64_t size, r_size;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
FAIL_(crypt_init(&cd, ""), "empty device string");
|
||||
FAIL_(crypt_init(&cd, DEVICE_WRONG), "nonexistent device name ");
|
||||
FAIL_(crypt_init(&cd, DEVICE_CHAR), "character device as backing device");
|
||||
@@ -798,16 +798,16 @@ static void AddDeviceLuks(void)
|
||||
char key[128], key2[128], key3[128];
|
||||
|
||||
const char *passphrase = "blabla", *passphrase2 = "nsdkFI&Y#.sd";
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *mk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
const char *vk_hex2 = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1e";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset, r_header_size, r_size_1;
|
||||
struct crypt_pbkdf_type pbkdf;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key3, mk_hex2, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
crypt_decode_key(key3, vk_hex2, key_size);
|
||||
|
||||
// init test devices
|
||||
OK_(get_luks_offsets(1, key_size, 0, 0, &r_header_size, &r_payload_offset));
|
||||
@@ -1133,13 +1133,13 @@ static void LuksHeaderRestore(void)
|
||||
};
|
||||
char key[128], key2[128], cmd[256];
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
OK_(get_luks_offsets(0, key_size, params.data_alignment, 0, NULL, &r_payload_offset));
|
||||
OK_(create_dmdevice_over_loop(L_DEVICE_OK, r_payload_offset + 5000));
|
||||
@@ -1220,14 +1220,14 @@ static void LuksHeaderLoad(void)
|
||||
};
|
||||
char key[128], cmd[256];
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset, r_header_size;
|
||||
uint64_t mdata_size, keyslots_size;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
// prepare test env
|
||||
OK_(get_luks_offsets(0, key_size, params.data_alignment, 0, &r_header_size, &r_payload_offset));
|
||||
@@ -1332,15 +1332,15 @@ static void LuksHeaderBackup(void)
|
||||
char key[128];
|
||||
int fd, ro = O_RDONLY;
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset;
|
||||
|
||||
const char *passphrase = PASSPHRASE;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
OK_(get_luks_offsets(0, key_size, params.data_alignment, 0, NULL, &r_payload_offset));
|
||||
OK_(create_dmdevice_over_loop(L_DEVICE_OK, r_payload_offset + 1));
|
||||
@@ -1414,13 +1414,13 @@ static void ResizeDeviceLuks(void)
|
||||
};
|
||||
char key[128];
|
||||
|
||||
const char *mk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(mk_hex) / 2;
|
||||
const char *vk_hex = "bb21158c733229347bd4e681891e213d94c685be6a5b84818afe7a78a6de7a1a";
|
||||
size_t key_size = strlen(vk_hex) / 2;
|
||||
const char *cipher = "aes";
|
||||
const char *cipher_mode = "cbc-essiv:sha256";
|
||||
uint64_t r_payload_offset, r_header_size, r_size;
|
||||
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
|
||||
// prepare env
|
||||
OK_(get_luks_offsets(0, key_size, params.data_alignment, 0, NULL, &r_payload_offset));
|
||||
@@ -1502,7 +1502,7 @@ static void HashDevicePlain(void)
|
||||
};
|
||||
|
||||
size_t key_size;
|
||||
const char *mk_hex, *keystr;
|
||||
const char *vk_hex, *keystr;
|
||||
char key[256];
|
||||
|
||||
OK_(crypt_init(&cd, DEVICE_1));
|
||||
@@ -1515,41 +1515,41 @@ static void HashDevicePlain(void)
|
||||
|
||||
// hash PLAIN, exact key
|
||||
// 0 1 2 3 4 5 6 7 8 9 a b c d e f
|
||||
mk_hex = "caffeecaffeecaffeecaffeecaffee88";
|
||||
vk_hex = "caffeecaffeecaffeecaffeecaffee88";
|
||||
key_size = 16;
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
OK_(prepare_keyfile(KEYFILE1, key, key_size));
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
OK_(strcmp(key, mk_hex));
|
||||
OK_(strcmp(key, vk_hex));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
|
||||
// Limit plain key
|
||||
mk_hex = "caffeecaffeecaffeecaffeeca000000";
|
||||
vk_hex = "caffeecaffeecaffeecaffeeca000000";
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size - 3, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
OK_(strcmp(key, mk_hex));
|
||||
OK_(strcmp(key, vk_hex));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
|
||||
_remove_keyfiles();
|
||||
|
||||
// hash PLAIN, long key
|
||||
// 0 1 2 3 4 5 6 7 8 9 a b c d e f
|
||||
mk_hex = "caffeecaffeecaffeecaffeecaffee88babebabe";
|
||||
vk_hex = "caffeecaffeecaffeecaffeecaffee88babebabe";
|
||||
key_size = 16;
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
OK_(prepare_keyfile(KEYFILE1, key, strlen(mk_hex) / 2));
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
OK_(prepare_keyfile(KEYFILE1, key, strlen(vk_hex) / 2));
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
FAIL_(strcmp(key, mk_hex), "only key length used");
|
||||
OK_(strncmp(key, mk_hex, key_size));
|
||||
FAIL_(strcmp(key, vk_hex), "only key length used");
|
||||
OK_(strncmp(key, vk_hex, key_size));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
|
||||
// Now without explicit limit
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
FAIL_(strcmp(key, mk_hex), "only key length used");
|
||||
OK_(strncmp(key, mk_hex, key_size));
|
||||
FAIL_(strcmp(key, vk_hex), "only key length used");
|
||||
OK_(strncmp(key, vk_hex, key_size));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
CRYPT_FREE(cd);
|
||||
|
||||
@@ -1558,15 +1558,15 @@ static void HashDevicePlain(void)
|
||||
// Handling of legacy "plain" hash (no hash)
|
||||
params.hash = "plain";
|
||||
// 0 1 2 3 4 5 6 7 8 9 a b c d e f
|
||||
mk_hex = "aabbcaffeecaffeecaffeecaffeecaff";
|
||||
vk_hex = "aabbcaffeecaffeecaffeecaffeecaff";
|
||||
key_size = 16;
|
||||
crypt_decode_key(key, mk_hex, key_size);
|
||||
OK_(prepare_keyfile(KEYFILE1, key, strlen(mk_hex) / 2));
|
||||
crypt_decode_key(key, vk_hex, key_size);
|
||||
OK_(prepare_keyfile(KEYFILE1, key, strlen(vk_hex) / 2));
|
||||
OK_(crypt_init(&cd, DEVICE_1));
|
||||
OK_(crypt_format(cd, CRYPT_PLAIN, "aes", "cbc-essiv:sha256", NULL, NULL, 16, ¶ms));
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
OK_(strcmp(key, mk_hex));
|
||||
OK_(strcmp(key, vk_hex));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
CRYPT_FREE(cd);
|
||||
|
||||
@@ -1578,19 +1578,19 @@ static void HashDevicePlain(void)
|
||||
OK_(crypt_format(cd, CRYPT_PLAIN, "aes", "cbc-essiv:sha256", NULL, NULL, 16, ¶ms));
|
||||
|
||||
// 0 1 2 3 4 5 6 7 8 9 a b c d e f
|
||||
mk_hex = "c62e4615bd39e222572f3a1bf7c2132e";
|
||||
vk_hex = "c62e4615bd39e222572f3a1bf7c2132e";
|
||||
keystr = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx";
|
||||
key_size = strlen(keystr); // 32
|
||||
OK_(prepare_keyfile(KEYFILE1, keystr, strlen(keystr)));
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
OK_(strcmp(key, mk_hex));
|
||||
OK_(strcmp(key, vk_hex));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
|
||||
// Read full keyfile
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
OK_(strcmp(key, mk_hex));
|
||||
OK_(strcmp(key, vk_hex));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
|
||||
_remove_keyfiles();
|
||||
@@ -1600,7 +1600,7 @@ static void HashDevicePlain(void)
|
||||
OK_(prepare_keyfile(KEYFILE1, keystr, strlen(keystr)));
|
||||
OK_(crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0));
|
||||
OK_(get_key_dm(CDEVICE_1, key, sizeof(key)));
|
||||
OK_(strcmp(key, mk_hex));
|
||||
OK_(strcmp(key, vk_hex));
|
||||
OK_(crypt_deactivate(cd, CDEVICE_1));
|
||||
|
||||
// Full keyfile
|
||||
|
||||
Reference in New Issue
Block a user