Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 281681 Details for
Bug 414991
[RHEL5.2] kernel panic on mounting ecryptfs overlay
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Updated version of noninteractive.sh from ecrytpfs-full tarball at sf.net
ecryptfs-noninteractive-tests.sh (text/plain), 3.96 KB, created by
Jarod Wilson
on 2007-12-07 21:57:47 UTC
(
hide
)
Description:
Updated version of noninteractive.sh from ecrytpfs-full tarball at sf.net
Filename:
MIME Type:
Creator:
Jarod Wilson
Created:
2007-12-07 21:57:47 UTC
Size:
3.96 KB
patch
obsolete
>#!/bin/sh > ># Run this script as root ># Nb: at the moment, the salt tests must be run interactively first, ># so the keys can be added to ~/.ecryptfs/sig-cache.txt ># Also of note, right now, the invalid cipher tests cause a kernel panic... > >SRC_DIR="/tmp/crypt" >DST_DIR="/mnt/crypt" >HOME_DIR="/root" >PASSWD_DIR="$HOME_DIR/.ecryptfs/pki" >PASSWD_PATH="$PASSWD_DIR/passwd" > >function mkdirs { > mkdir -p $SRC_DIR > mkdir -p $DST_DIR > mkdir -p $PASSWD_DIR >} > >function write_tmp_files { > echo "passwd=t" > $PASSWD_PATH >} > >function clean_src { > if [ "x$SRC_DIR" == "x" ]; then > echo "SRC_DIR is empty" > exit 1 > else > if [ "x$SRC_DIR" == "x/" ]; then > echo "SRC_DIR is root; probably not what you want" > exit 1 > else > rm -rf $SRC_DIR/* > fi > fi >} > >function mount_passphrase { > mount -t ecryptfs $SRC_DIR $DST_DIR -o key=passphrase,cipher=aes,verbosity=0 >} > >function remount_ro { > mount -i -o remount,ro $DST_DIR >} > >function umount_ecryptfs { > umount $DST_DIR >} > >function mkdir_clean_mount_passphrase { > for i in "passwd=t" "passfile=$HOME_DIR/.ecryptfs/pki/passwd"; do > echo "Performing mount with passphrase option [$i]" > /sbin/mount.ecryptfs $SRC_DIR $DST_DIR -o key=passphrase:$i:cipher=aes:verbosity=0,ecryptfs_key_bytes=16 > /dev/null > if [ $? -eq 0 ] > then > echo "ok" > else > echo "Error mounting ecryptfs with passphrase option [$i] [$?]" > exit 1 > fi > umount_ecryptfs > done >} > >#we should return errno from calls to libecryptfs functions. >function mkdir_clean_mount_bad_passphrase { > for i in "passwd=" "passfile="; do > echo "Performing mount with bad passphrase option [$i]" > /sbin/mount.ecryptfs $SRC_DIR $DST_DIR -o key=passphrase:$i:cipher=aes:verbosity=0,ecryptfs_key_bytes=16 > /dev/null > if [ $? -eq 234 ] > then > echo "ok" > else > echo "Return code differed from what was expected [$i]" > umount_ecryptfs > exit 1 > fi > done >} > >function mkdir_clean_mount_ciphers { > #for i in "aes" "des" "cast5" "cast6" "blowfish" "twofish" "des3_ede" ""; do > # des and des3_ede appear to be invalid now > for i in "aes" "cast5" "cast6" "blowfish" "twofish" ""; do > echo "Performing mount with cipher [$i]" > /sbin/mount.ecryptfs $SRC_DIR $DST_DIR -o key=passphrase:passwd=t:cipher=$i:verbosity=0,ecryptfs_key_bytes=16 > /dev/null > if [ $? -eq 0 ] > then > echo "ok" > else > echo "Error mounting ecryptfs with cipher [$i]" > exit 1 > fi > umount_ecryptfs > done >} > >function mkdir_clean_mount_bad_ciphers { > for i in "aesaaaaaaa" "bbbaes" "xxxaesyyy"; do > echo "Performing mount with incorrect cipher [$i]" > /sbin/mount.ecryptfs $SRC_DIR $DST_DIR -o key=passphrase:passwd=t:cipher=$i:verbosity=0,ecryptfs_key_bytes=16 > /dev/null > if [ $? -eq 234 ] > then > echo "ok" > else > echo "Mount should have failed with cipher [$i]" > umount_ecryptfs > exit > fi > done >} > >#Salts need to be hex values if a non hex value is specified 0 is used >#we should probably clarify that we are requesting a hex value >function mkdir_clean_mount_salt { > for i in "" "a" "12345678" "0xdeadbeefdeadbeefdeadbeef" "ghijklmn" "sdflajsdflksjdaflsdjk" ""; do > echo "Performing mount with salt [$i]" > /sbin/mount.ecryptfs $SRC_DIR $DST_DIR -o key=passphrase:passwd=t:salt=$i:cipher=aes:verbosity=0,ecryptfs_key_bytes=16 > /dev/null > if [ $? -eq 0 ] > then > echo "ok" > else > echo "Error mounting ecryptfs with salt [$i]" > exit 1 > fi > umount_ecryptfs > done >} > >function clean_up_tests { > rm -f $PASSWD_PATH >} > >echo "Running non-interactive mount tests" >echo "Passphrase mount" > >echo "Making directories" >mkdirs >echo "Writing temporary files" >write_tmp_files >echo "Cleaning out source directory" >clean_src >echo "Testing Passphrase Modes" >mkdir_clean_mount_passphrase >mkdir_clean_mount_bad_passphrase >echo "" >echo "Testing Cipher Modes" >mkdir_clean_mount_ciphers >mkdir_clean_mount_bad_ciphers >echo "" >echo "Testing Salts" >mkdir_clean_mount_salt >echo "" >echo "Cleaning up" >clean_up_tests
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 414991
: 281681