Ondrej Kozina
3bea349f9e
Optionaly check device table before reencryption initialization.
2019-08-01 10:43:57 +02:00
Ondrej Kozina
98e0c8d609
Extend device table check in-before reencryption.
2019-08-01 10:43:57 +02:00
Ondrej Kozina
71f7385fcb
Add support for linear segment in device comparison.
2019-08-01 10:43:57 +02:00
Ondrej Kozina
fbedf0ba6b
Improve dm-crypt segments comparison function.
...
Check key descriptions are identical if both targets
were constructed using keys in kernel keyring service.
2019-08-01 10:40:37 +02:00
Ondrej Kozina
cf710eab13
Add internal crypt_compare_dm_devices.
2019-08-01 10:40:37 +02:00
Ondrej Kozina
b216a6a30e
Introduce crypt_strcmp function (allows NULL).
2019-07-31 14:58:55 +02:00
Ondrej Kozina
b79086b3e9
Refactor assembly of multi-segment LUKS2 devices.
2019-07-31 14:58:55 +02:00
Ondrej Kozina
b551bdb0ce
Make json_segments_count fn return unsigned value.
2019-07-31 14:58:55 +02:00
Ondrej Kozina
0886bc7afd
Check for error sooner while assigning reencryption segments.
...
Also wraps function parameters definition.
2019-07-31 14:58:55 +02:00
Milan Broz
e7027e3d40
Revert back last cleanup call in api-test.
...
Removed by a mistake.
2019-07-31 12:15:49 +02:00
Milan Broz
243690b5ab
Disalble luks2-reencryption-test in FIPE mode for now.
2019-07-31 12:03:44 +02:00
Milan Broz
5b5f76002e
Fix various tests to run again in FIPS OpenSSL mode.
2019-07-31 10:27:58 +02:00
Milan Broz
fc03f1a1e6
Fix TCRYPT KDF failyure in FIPS mode.
...
SOme crypto backends now supports plain hash, but not PBKDF2 with
the same hash in FIPS mode.
Let's continue scanning other KDF if this error happens.
2019-07-31 10:25:54 +02:00
Milan Broz
1d59ae9aa9
Remove FIPS mode restriction for crypt_volume_key_get.
...
It is an application responsibility to use this API in the proper
context.
2019-07-30 14:12:50 +02:00
Milan Broz
8fde1b9f2c
Mark API tests as skipped if setup phase fails.
2019-07-30 13:18:34 +02:00
Milan Broz
5e03f8c725
Always close context before failing API test.
...
Some devices could be still open delaying removal in cleanup.
2019-07-30 13:14:12 +02:00
Milan Broz
d6d4a50f7c
Rename cd1-> cd in api test2.
2019-07-30 10:48:08 +02:00
Milan Broz
fe4e1de566
Mention limitiation of crypt_get_volume_key_size().
2019-07-29 14:32:13 +02:00
Ondrej Kozina
e0d34b8f47
Add basic LUKS2 reencryption api test.
2019-07-26 16:20:36 +02:00
Ondrej Kozina
17c9d35449
Update reencryption flags description.
2019-07-26 16:09:38 +02:00
Ondrej Kozina
0e994265c6
Report data segment is moved in crypt_reencrypt_status.
2019-07-26 16:09:38 +02:00
Ondrej Kozina
e16319a290
Fail encryption initialization when data device too small.
2019-07-26 16:09:38 +02:00
Ondrej Kozina
c033643f07
Fix corner case bug in encryption with data shift.
...
If we initialized encryption with data shift and only single
segment the resulting metadata were missing
CRYPT_REENCRYPT_MOVE_FIRST_SEGMENT flag and also segments json section was
invalid.
2019-07-26 16:06:03 +02:00
Ondrej Kozina
607e2248c8
Simplify LUKS2_reencrypt_direction function.
2019-07-26 16:06:03 +02:00
Ondrej Kozina
a1111c7aa0
Tighten reencryption direction field validation.
2019-07-26 16:06:03 +02:00
Ondrej Kozina
1b82e70fc1
Fix bug in minimal device size calculation for reencryption.
2019-07-26 16:06:03 +02:00
Ondrej Kozina
35068c2e6e
Fix broken segments calculation for backward data shift reencryption.
2019-07-26 16:06:03 +02:00
Ondrej Kozina
212703edf8
crypt_get_data_offset() must always return new offset value.
2019-07-26 16:06:03 +02:00
Ondrej Kozina
7460d1a446
Fix backward reencryption with data shift.
...
The device has to be shrunk the data shift size during activation.
Otherwise the online reencryption would fail with incorrect device
size.
2019-07-26 16:04:27 +02:00
Ondrej Kozina
c851205f83
Fix bug in reencryption digest to segment assignement.
2019-07-23 17:28:26 +02:00
Ondrej Kozina
dd0e073159
Fill direction field in crypt_reencrypt_status.
2019-07-23 17:28:26 +02:00
Ondrej Kozina
193b477086
Report reencryption data shift value in sectors.
2019-07-23 17:28:26 +02:00
Ondrej Kozina
3f85da0098
Fix datashift calculation in reencryption initialization.
2019-07-23 17:28:25 +02:00
Ondrej Kozina
dad28f3dfe
Move exclusive open for offline reencryption in initialization.
2019-07-23 17:28:25 +02:00
Ondrej Kozina
e8e1da3fb5
Do not callback progress twice in reencryption loop.
2019-07-23 17:28:25 +02:00
Ondrej Kozina
4a24311161
Extend offline reencryption test for other keyslot numbers.
2019-07-15 14:36:36 +02:00
Ondrej Kozina
4f8c6b7773
Fix offline reencryption bug in header backup phase.
...
If first active keyslot number was different from zero the
decryption always failed.
2019-07-15 14:36:36 +02:00
Milan Broz
26fc2c24bd
Update po files.
2019-07-15 10:26:13 +02:00
Ondrej Kozina
330f9daade
Pass max_hotzone_size inside reencryption parameters in sectors.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
4a232bc868
Pass device size inside reencryption parameters in sectors.
...
it was mistake in reencryption API. All other device sizes
related to device mapper devices are always in 512b setctors.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
61dff96474
Reencryption keyslot must report as unbound.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
bda28bbf38
Fix bug in crypt_keyslot_add_by_key.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
66bedfd8e4
Fix LUKS2 reencryption recovery test.
...
Detect properly the case when recovery actually completed
encryption action for detached header case.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
c18f968d84
Extend LUKS2 metadata size api tests.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
5dfbc57117
Move LUKS2 metadata size api tests in separate routine.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
e3fb6771d6
Re-enable mode test for LUKS2.
...
Since release 2.1.0 mode test for LUKS2 is skipped due to small test image.
Enforce smaller LUKS2 metadata via --offset to reenable the test.
Also detect failure for open action if format pass earlier.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
f4da3c7f1b
Add warning when changing explicitly requested LUKS2 metadata size.
2019-07-12 15:37:18 +02:00
Ondrej Kozina
81dbc9c070
Reduce implicit keyslots size when header device is too small.
...
Unless user explicitly asks for keyslots areas size
(either via --luks2-keyslots-size or --offset) reduce keyslots
size so that it fits in metadata device.
2019-07-12 15:37:08 +02:00
Ondrej Kozina
431bc87f85
Add LUKS2 error message hint when device too small.
...
If we format LUKS2 device with parameters unsuitable
for current metadata device size we usually fail during header areas
wipe. It was not clear what the reason actually was.
2019-07-12 15:12:46 +02:00
Milan Broz
b0e224a9f8
Update po file.
2019-07-01 10:19:14 +02:00