123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116 |
- /* vim: set tabstop=8 shiftwidth=4 softtabstop=4 expandtab smarttab colorcolumn=80: */
- /*
- * Copyright (c) 2016 Red Hat, Inc.
- * Author: Nathaniel McCallum <npmccallum@redhat.com>
- *
- * This program is free software: you can redistribute it and/or modify it
- * under the terms of the GNU Lesser General Public License as published by
- * the Free Software Foundation, either version 2.1 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
- #include "test.h"
- #include <sys/types.h>
- #include <sys/stat.h>
- #include <fcntl.h>
- #include <errno.h>
- #include <error.h>
- #include <stdio.h>
- #include <stdlib.h>
- static const luksmeta_uuid_t UUID = {
- 0xfb, 0x06, 0x8c, 0x1f, 0x68, 0x04, 0x87, 0x9f,
- 0xf4, 0xcd, 0x32, 0x25, 0xb2, 0x1a, 0x7e, 0xf8
- };
- int
- main(int argc, char *argv[])
- {
- uint8_t data[sizeof(UUID)] = {};
- struct crypt_device *cd = NULL;
- luksmeta_uuid_t uuid = {};
- uint32_t offset = 0;
- uint32_t length = 0;
- int fd;
- /* Test for -ENOENT when there is no luksmeta header. */
- cd = test_format();
- for (int slot = 0; slot < crypt_keyslot_max(CRYPT_LUKS1); slot++) {
- assert(luksmeta_save(cd, slot, UUID, UUID, sizeof(UUID)) == -ENOENT);
- assert(luksmeta_load(cd, slot, uuid, data, sizeof(data)) == -ENOENT);
- assert(luksmeta_wipe(cd, slot, UUID) == -ENOENT);
- assert(luksmeta_test(cd) == -ENOENT);
- }
- crypt_free(cd);
- cd = test_init();
- test_hole(cd, &offset, &length);
- /* Test the layout state. */
- assert(test_layout((range_t[]) {
- { 0, 1024 }, /* LUKS header */
- { 1024, offset - 1024, true }, /* Keyslot Area */
- { offset, 4096 }, /* luksmeta header */
- END(offset + 4096), /* Rest of the file */
- }));
- /* Test error codes for a valid luksmeta header but no slot. */
- for (int slot = 0; slot < crypt_keyslot_max(CRYPT_LUKS1); slot++) {
- assert(luksmeta_load(cd, slot, uuid, data, sizeof(data)) == -ENODATA);
- assert(luksmeta_wipe(cd, slot, UUID) == -EALREADY);
- }
- /* Test for -EALREADY when a valid header is present. */
- assert(luksmeta_init(cd) == -EALREADY);
- assert(luksmeta_test(cd) == 0);
- /* Test for -EBADSLT when an invalid slot is used. */
- assert(luksmeta_save(cd, 10, UUID, UUID, sizeof(UUID)) == -EBADSLT);
- assert(luksmeta_load(cd, 10, uuid, data, sizeof(data)) == -EBADSLT);
- assert(luksmeta_wipe(cd, 10, UUID) == -EBADSLT);
- assert(luksmeta_save(cd, -10, UUID, UUID, sizeof(UUID)) == -EBADSLT);
- assert(luksmeta_load(cd, -10, uuid, data, sizeof(data)) == -EBADSLT);
- assert(luksmeta_wipe(cd, -10, UUID) == -EBADSLT);
- assert(luksmeta_load(cd, -1, uuid, data, sizeof(data)) == -EBADSLT);
- assert(luksmeta_wipe(cd, -1, UUID) == -EBADSLT);
- /* Test for -EKEYREJECTED when a reserved UUID is used. */
- assert(luksmeta_save(cd, CRYPT_ANY_SLOT, (luksmeta_uuid_t) {},
- UUID, sizeof(UUID)) == -EKEYREJECTED);
- /* Test to make sure that data corruption is picked up correctly. */
- fd = open(filename, O_RDWR | O_SYNC);
- if (fd < 0)
- error(EXIT_FAILURE, errno, "%s:%d", __FILE__, __LINE__);
- if (lseek(fd, offset + 16, SEEK_SET) == -1)
- error(EXIT_FAILURE, errno, "%s:%d", __FILE__, __LINE__);
- if (write(fd, &(char) { 17 }, 1) != 1)
- error(EXIT_FAILURE, errno, "%s:%d", __FILE__, __LINE__);
- close(fd);
- assert(luksmeta_save(cd, 2, UUID, UUID, sizeof(UUID)) == -EINVAL);
- assert(luksmeta_load(cd, 2, uuid, data, sizeof(data)) == -EINVAL);
- assert(luksmeta_wipe(cd, 2, UUID) == -EINVAL);
- /* Test nuking */
- assert(luksmeta_init(cd) == 0);
- assert(luksmeta_test(cd) == 0);
- assert(luksmeta_nuke(cd) == 0);
- assert(luksmeta_test(cd) == -ENOENT);
- assert(test_layout((range_t[]) {
- { 0, 1024 }, /* LUKS header */
- { 1024, offset - 1024, true }, /* Keyslot Area */
- END(offset), /* Rest of the file */
- }));
- crypt_free(cd);
- unlink(filename);
- return 0;
- }
|