2020-07-18 10:48:21 +08:00
|
|
|
From f73c9760f43897fce0d6aa32042f751a2e7d0de0 Mon Sep 17 00:00:00 2001
|
2019-09-30 10:36:13 -04:00
|
|
|
From: hanzhijun <hanzhijun1@huawei.com>
|
2020-07-18 10:48:21 +08:00
|
|
|
Date: Sat, 18 Jul 2020 10:30:03 +0800
|
|
|
|
|
Subject: [PATCH 2/2] fix compat test
|
2019-09-30 10:36:13 -04:00
|
|
|
|
|
|
|
|
---
|
2020-07-18 10:48:21 +08:00
|
|
|
tests/compat-test | 15 ++++++++-------
|
|
|
|
|
1 file changed, 8 insertions(+), 7 deletions(-)
|
2019-09-30 10:36:13 -04:00
|
|
|
|
|
|
|
|
diff --git a/tests/compat-test b/tests/compat-test
|
2020-07-18 10:48:21 +08:00
|
|
|
index a61453e..7ee946e 100755
|
|
|
|
|
--- a/tests/compat-test
|
|
|
|
|
+++ b/tests/compat-test
|
|
|
|
|
@@ -22,6 +22,7 @@ PWD0="compatkey"
|
2019-09-30 10:36:13 -04:00
|
|
|
PWD1="93R4P4pIqAH8"
|
|
|
|
|
PWD2="mymJeD8ivEhE"
|
|
|
|
|
PWD3="ocMakf3fAcQO"
|
|
|
|
|
+PWD4="hkj123HJGS12"
|
|
|
|
|
PWDW="rUkL4RUryBom"
|
|
|
|
|
VK_FILE="compattest_vkfile"
|
|
|
|
|
|
2020-07-18 10:48:21 +08:00
|
|
|
@@ -225,17 +226,17 @@ echo $PWD1 | $CRYPTSETUP luksAddKey $IMG $FAST_PBKDF_OPT 2>/dev/null && fail
|
2019-09-30 10:36:13 -04:00
|
|
|
echo -e "$PWD1\n$PWD2" | $CRYPTSETUP luksAddKey $IMG $FAST_PBKDF_OPT || fail
|
|
|
|
|
echo -e "$PWD0\n$PWD1" | $CRYPTSETUP luksAddKey $IMG $FAST_PBKDF_OPT 2>/dev/null && fail
|
|
|
|
|
echo "[4] change key"
|
|
|
|
|
-echo -e "$PWD1\n$PWD0\n" | $CRYPTSETUP luksChangeKey $FAST_PBKDF_OPT $IMG || fail
|
|
|
|
|
+echo -e "$PWD1\n$PWD4\n" | $CRYPTSETUP luksChangeKey $FAST_PBKDF_OPT $IMG || fail
|
|
|
|
|
echo -e "$PWD1\n$PWD2\n" | $CRYPTSETUP luksChangeKey $FAST_PBKDF_OPT $IMG 2>/dev/null && fail
|
|
|
|
|
[ $? -ne 2 ] && fail "luksChangeKey should return EPERM exit code"
|
|
|
|
|
echo "[5] remove key"
|
|
|
|
|
-# delete active keys PWD0, PWD2
|
|
|
|
|
+# delete active keys PWD2, PWD4
|
|
|
|
|
echo $PWD1 | $CRYPTSETUP luksRemoveKey $IMG 2>/dev/null && fail
|
|
|
|
|
[ $? -ne 2 ] && fail "luksRemove should return EPERM exit code"
|
|
|
|
|
-echo $PWD0 | $CRYPTSETUP luksRemoveKey $IMG || fail
|
|
|
|
|
echo $PWD2 | $CRYPTSETUP luksRemoveKey $IMG || fail
|
|
|
|
|
+echo $PWD4 | $CRYPTSETUP luksRemoveKey $IMG || fail
|
|
|
|
|
# check if keys were deleted
|
|
|
|
|
-echo $PWD0 | $CRYPTSETUP luksOpen $IMG --test-passphrase 2>/dev/null && fail
|
|
|
|
|
+echo $PWD4 | $CRYPTSETUP luksOpen $IMG --test-passphrase 2>/dev/null && fail
|
2020-07-18 10:48:21 +08:00
|
|
|
[ $? -ne 1 ] && fail "luksOpen should return ENOENT exit code"
|
2019-09-30 10:36:13 -04:00
|
|
|
echo $PWD2 | $CRYPTSETUP luksOpen $IMG --test-passphrase 2>/dev/null && fail
|
2020-07-18 10:48:21 +08:00
|
|
|
[ $? -ne 1 ] && fail "luksOpen should return ENOENT exit code"
|
|
|
|
|
@@ -867,16 +868,16 @@ expect timeout abort "Are you sure? (Type 'yes' in capital letters):"
|
2019-09-30 10:36:13 -04:00
|
|
|
send "YES\n"
|
2020-07-18 10:48:21 +08:00
|
|
|
expect timeout abort "Enter passphrase for $EXPECT_DEV:"
|
2019-09-30 10:36:13 -04:00
|
|
|
sleep 0.1
|
|
|
|
|
-send "$PWD0\n"
|
|
|
|
|
+send "$PWD4\n"
|
|
|
|
|
expect timeout abort "Verify passphrase:"
|
|
|
|
|
sleep 0.1
|
|
|
|
|
-send "$PWD0\n"
|
|
|
|
|
+send "$PWD4\n"
|
|
|
|
|
expect timeout abort "Command successful."
|
|
|
|
|
expect timeout abort eof
|
|
|
|
|
eval spawn $CRYPTSETUP luksOpen -v $LOOPDEV --test-passphrase
|
2020-07-18 10:48:21 +08:00
|
|
|
expect timeout abort "Enter passphrase for $EXPECT_DEV:"
|
2019-09-30 10:36:13 -04:00
|
|
|
sleep 0.1
|
|
|
|
|
-send "$PWD0\n"
|
|
|
|
|
+send "$PWD4\n"
|
|
|
|
|
expect timeout abort "Command successful."
|
|
|
|
|
expect timeout abort eof
|
|
|
|
|
exit
|
2020-07-18 10:48:21 +08:00
|
|
|
--
|
|
|
|
|
1.8.3.1
|
|
|
|
|
|