Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 920928 Details for
Bug 1122937
aarch64 AES crypto: block misalignment causes crash or data corruption and cryptsetup fails to activate partitions
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
cryptsetup-test-log.txt
cryptsetup-test-log.txt (text/plain), 44.88 KB, created by
Richard W.M. Jones
on 2014-07-25 09:33:46 UTC
(
hide
)
Description:
cryptsetup-test-log.txt
Filename:
MIME Type:
Creator:
Richard W.M. Jones
Created:
2014-07-25 09:33:46 UTC
Size:
44.88 KB
patch
obsolete
>Making check in lib >make[1]: Entering directory '/home/rjones/d/cryptsetup/lib' >Making check in crypto_backend >make[2]: Entering directory '/home/rjones/d/cryptsetup/lib/crypto_backend' >make[2]: Nothing to be done for 'check'. >make[2]: Leaving directory '/home/rjones/d/cryptsetup/lib/crypto_backend' >Making check in luks1 >make[2]: Entering directory '/home/rjones/d/cryptsetup/lib/luks1' >make[2]: Nothing to be done for 'check'. >make[2]: Leaving directory '/home/rjones/d/cryptsetup/lib/luks1' >Making check in loopaes >make[2]: Entering directory '/home/rjones/d/cryptsetup/lib/loopaes' >make[2]: Nothing to be done for 'check'. >make[2]: Leaving directory '/home/rjones/d/cryptsetup/lib/loopaes' >Making check in verity >make[2]: Entering directory '/home/rjones/d/cryptsetup/lib/verity' >make[2]: Nothing to be done for 'check'. >make[2]: Leaving directory '/home/rjones/d/cryptsetup/lib/verity' >Making check in tcrypt >make[2]: Entering directory '/home/rjones/d/cryptsetup/lib/tcrypt' >make[2]: Nothing to be done for 'check'. >make[2]: Leaving directory '/home/rjones/d/cryptsetup/lib/tcrypt' >make[2]: Entering directory '/home/rjones/d/cryptsetup/lib' >make[2]: Nothing to be done for 'check-am'. >make[2]: Leaving directory '/home/rjones/d/cryptsetup/lib' >make[1]: Leaving directory '/home/rjones/d/cryptsetup/lib' >Making check in src >make[1]: Entering directory '/home/rjones/d/cryptsetup/src' >make[1]: Nothing to be done for 'check'. >make[1]: Leaving directory '/home/rjones/d/cryptsetup/src' >Making check in man >make[1]: Entering directory '/home/rjones/d/cryptsetup/man' >make[1]: Nothing to be done for 'check'. >make[1]: Leaving directory '/home/rjones/d/cryptsetup/man' >Making check in python >make[1]: Entering directory '/home/rjones/d/cryptsetup/python' >make check-TESTS >make[2]: Entering directory '/home/rjones/d/cryptsetup/python' >================== >All 0 tests passed >================== >make[2]: Leaving directory '/home/rjones/d/cryptsetup/python' >make[1]: Leaving directory '/home/rjones/d/cryptsetup/python' >Making check in tests >make[1]: Entering directory '/home/rjones/d/cryptsetup/tests' >make api-test differ >make[2]: Entering directory '/home/rjones/d/cryptsetup/tests' >gcc -DHAVE_CONFIG_H -I. -I.. -include config.h -g -Wall -O0 -I../lib/ -I../lib/luks1 -g -O2 -MT api_test-api-test.o -MD -MP -MF .deps/api_test-api-test.Tpo -c -o api_test-api-test.o `test -f 'api-test.c' || echo './'`api-test.c >mv -f .deps/api_test-api-test.Tpo .deps/api_test-api-test.Po >gcc -DHAVE_CONFIG_H -I. -I.. -include config.h -g -Wall -O0 -I../lib/ -I../lib/luks1 -g -O2 -MT api_test-utils_loop.o -MD -MP -MF .deps/api_test-utils_loop.Tpo -c -o api_test-utils_loop.o `test -f '../lib/utils_loop.c' || echo './'`../lib/utils_loop.c >mv -f .deps/api_test-utils_loop.Tpo .deps/api_test-utils_loop.Po >/bin/sh ../libtool --tag=CC --mode=link gcc -g -Wall -O0 -I../lib/ -I../lib/luks1 -g -O2 -static -o api-test api_test-api-test.o api_test-utils_loop.o ../lib/libcryptsetup.la >libtool: link: gcc -g -Wall -O0 -I../lib/ -I../lib/luks1 -g -O2 -o api-test api_test-api-test.o api_test-utils_loop.o ../lib/.libs/libcryptsetup.so -luuid -ldevmapper -lgcrypt -ldl -lgpg-error -lfipscheck -Wl,-rpath -Wl,/home/rjones/d/cryptsetup/lib/.libs >gcc -DHAVE_CONFIG_H -I. -I.. -Wall -O2 -g -O2 -MT differ-differ.o -MD -MP -MF .deps/differ-differ.Tpo -c -o differ-differ.o `test -f 'differ.c' || echo './'`differ.c >mv -f .deps/differ-differ.Tpo .deps/differ-differ.Po >/bin/sh ../libtool --tag=CC --mode=link gcc -Wall -O2 -g -O2 -o differ differ-differ.o >libtool: link: gcc -Wall -O2 -g -O2 -o differ differ-differ.o >make[2]: Leaving directory '/home/rjones/d/cryptsetup/tests' >make check-TESTS >make[2]: Entering directory '/home/rjones/d/cryptsetup/tests' >NonFIPSAlg: Crypto is properly initialised in format > [(success),NonFIPSAlg:1914] crypt_init(&cd, DEVICE_2) > [(success),NonFIPSAlg:1916] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(fail) ,NonFIPSAlg:1918] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) [Already formatted.] > => errno -22, errmsg: > [(success),NonFIPSAlg:1922] crypt_init(&cd, DEVICE_2) > [(success),NonFIPSAlg:1932] crypt_init(&cd, DEVICE_2) > [(fail) ,NonFIPSAlg:1934] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) [MD5 unsupported, too short] > => errno -22, errmsg: Requested LUKS hash md5 is not supported. >AddDevicePlain: plain device API creation exercise > [(fail) ,AddDevicePlain:583] crypt_init(&cd, "") [empty device string] > => errno -15, errmsg: Device doesn't exist or access denied. > [(fail) ,AddDevicePlain:584] crypt_init(&cd, DEVICE_WRONG) [nonexistent device name ] > => errno -15, errmsg: Device /dev/Ooo_ doesn't exist or access denied. > [(fail) ,AddDevicePlain:585] crypt_init(&cd, DEVICE_CHAR) [character device as backing device] > => errno -15, errmsg: > [(success),AddDevicePlain:586] crypt_init(&cd, tmp_file_1) > [(success),AddDevicePlain:590] crypt_init(&cd,DEVICE_1) > [(fail) ,AddDevicePlain:593] crypt_format(cd,CRYPT_PLAIN,NULL,cipher_mode,NULL,NULL,key_size,¶ms) [cipher param is null] > => errno -22, errmsg: Invalid plain crypt parameters. > [(fail) ,AddDevicePlain:594] crypt_format(cd,CRYPT_PLAIN,cipher,NULL,NULL,NULL,key_size,¶ms) [cipher_mode param is null] > => errno -22, errmsg: Invalid plain crypt parameters. > [(success),AddDevicePlain:595] crypt_format(cd,CRYPT_PLAIN,cipher,cipher_mode,NULL,NULL,key_size,¶ms) > [(success),AddDevicePlain:596] strcmp(cipher_mode,crypt_get_cipher_mode(cd)) > [(success),AddDevicePlain:597] strcmp(cipher,crypt_get_cipher(cd)) > [(equal) ,AddDevicePlain:598] (int)key_size == crypt_get_volume_key_size(cd) > [(equal) ,AddDevicePlain:599] params.skip == crypt_get_iv_offset(cd) > [(equal) ,AddDevicePlain:600] params.offset == crypt_get_data_offset(cd) > [(fail) ,AddDevicePlain:605] crypt_set_uuid(cd,DEVICE_1_UUID) [can't set uuid to plain device] > => errno -22, errmsg: This operation is not supported for this device type. > [(success),AddDevicePlain:610] crypt_init(&cd, DEVICE_1) > [(success),AddDevicePlain:611] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, NULL) > [(fail) ,AddDevicePlain:612] crypt_activate_by_volume_key(cd, NULL, key, key_size, 0) [cannot verify key with plain] > => errno -22, errmsg: > [(success),AddDevicePlain:613] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) > [(equal) ,AddDevicePlain:614] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDevicePlain:615] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDevicePlain:623] crypt_init(&cd, DEVICE_1) > [(success),AddDevicePlain:624] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(equal) ,AddDevicePlain:625] crypt_get_data_offset(cd) == params.offset > [(fail) ,AddDevicePlain:627] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) [invalid device size (0 blocks)] > => errno -22, errmsg: Requested offset is beyond real size of device /dev/loop1. > [(equal) ,AddDevicePlain:628] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:633] crypt_init(&cd, DEVICE_1) > [(success),AddDevicePlain:634] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(success),AddDevicePlain:635] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) > [(equal) ,AddDevicePlain:636] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(equal) ,AddDevicePlain:639] r_size>>SECTOR_SHIFT == 1 > [(success),AddDevicePlain:640] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDevicePlain:647] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(fail) ,AddDevicePlain:648] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) [Device too small] > => errno -22, errmsg: Device /dev/loop1 is too small. > [(equal) ,AddDevicePlain:649] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:656] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(fail) ,AddDevicePlain:657] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) [Device too small] > => errno -22, errmsg: Requested offset is beyond real size of device /dev/loop1. > [(equal) ,AddDevicePlain:658] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:665] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(fail) ,AddDevicePlain:666] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) [Device too small] > => errno -22, errmsg: Requested offset is beyond real size of device /dev/loop1. > [(equal) ,AddDevicePlain:667] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:674] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(fail) ,AddDevicePlain:675] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) [Offset and size are beyond device real size] > => errno -22, errmsg: Device /dev/loop1 is too small. > [(equal) ,AddDevicePlain:676] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:683] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(success),AddDevicePlain:684] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) > [(equal) ,AddDevicePlain:685] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(equal) ,AddDevicePlain:687] (r_size >> SECTOR_SHIFT) == params.size > [(success),AddDevicePlain:688] crypt_deactivate(cd,CDEVICE_1) > [(success),AddDevicePlain:697] crypt_init(&cd, DEVICE_1) > [(success),AddDevicePlain:698] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(fail) ,AddDevicePlain:700] crypt_activate_by_passphrase(cd, NULL, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) [cannot verify passphrase with plain] > => errno -22, errmsg: > [(success),AddDevicePlain:701] crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) > [(equal) ,AddDevicePlain:704] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(equal) ,AddDevicePlain:707] crypt_status(cd, CDEVICE_1) == CRYPT_BUSY > [(fail) ,AddDevicePlain:708] crypt_deactivate(cd, CDEVICE_1) [Device is busy] > => errno -16, errmsg: Device ctest1 is still in use. > [(success),AddDevicePlain:710] crypt_deactivate(cd, CDEVICE_1) > [(equal) ,AddDevicePlain:711] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:715] crypt_init(&cd,DEVICE_1) > [(success),AddDevicePlain:716] crypt_format(cd, CRYPT_PLAIN, cipher, cipher_mode, NULL, NULL, key_size, ¶ms) > [(success),AddDevicePlain:717] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) > [(fail) ,AddDevicePlain:720] crypt_init_by_name_and_header(&cd, CDEVICE_1, H_DEVICE) [can't init plain device by header device] > => errno -15, errmsg: Device head_ok doesn't exist or access denied. > [(success),AddDevicePlain:721] crypt_init_by_name(&cd, CDEVICE_1) > [(success),AddDevicePlain:722] strcmp(cipher_mode,crypt_get_cipher_mode(cd)) > [(success),AddDevicePlain:723] strcmp(cipher,crypt_get_cipher(cd)) > [(equal) ,AddDevicePlain:724] (int)key_size == crypt_get_volume_key_size(cd) > [(equal) ,AddDevicePlain:725] params.skip == crypt_get_iv_offset(cd) > [(equal) ,AddDevicePlain:726] params.offset == crypt_get_data_offset(cd) > [(success),AddDevicePlain:727] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDevicePlain:730] crypt_init(&cd,DEVICE_1) > [(success),AddDevicePlain:731] crypt_format(cd,CRYPT_PLAIN,cipher,cipher_mode,NULL,NULL,key_size,¶ms) > [(fail) ,AddDevicePlain:736] crypt_set_data_device(cd,H_DEVICE) [can't set data device for plain device] > => errno -22, errmsg: This operation is not supported for this device type. > [(success),AddDevicePlain:739] strcmp(crypt_get_type(cd),CRYPT_PLAIN) > [(success),AddDevicePlain:741] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) > [(equal) ,AddDevicePlain:742] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDevicePlain:745] crypt_resize(cd,CDEVICE_1,size>>SECTOR_SHIFT) > [(equal) ,AddDevicePlain:747] r_size == size > [(fail) ,AddDevicePlain:750] crypt_resize(cd, CDEVICE_1, (uint64_t)-1) [Backing device is too small] > => errno -22, errmsg: Device /dev/loop1 is too small. > [(fail) ,AddDevicePlain:751] crypt_resize(cd, CDEVICE_1, (size>>SECTOR_SHIFT)+1) [crypt device overlaps backing device] > => errno -22, errmsg: Device /dev/loop1 is too small. > [(success),AddDevicePlain:754] crypt_resize(cd,CDEVICE_1, 123) > [(equal) ,AddDevicePlain:756] r_size>>SECTOR_SHIFT == 123 > [(success),AddDevicePlain:757] crypt_resize(cd,CDEVICE_1,0) > [(equal) ,AddDevicePlain:759] r_size == size > [(success),AddDevicePlain:760] crypt_deactivate(cd,CDEVICE_1) > [(equal) ,AddDevicePlain:761] crypt_status(cd,CDEVICE_1) == CRYPT_INACTIVE > [(success),AddDevicePlain:765] crypt_init(&cd,DEVICE_1) > [(success),AddDevicePlain:768] crypt_format(cd,CRYPT_PLAIN,cipher,cipher_mode,NULL,NULL,key_size,¶ms) > [(success),AddDevicePlain:769] crypt_activate_by_volume_key(cd,CDEVICE_1,key,key_size,0) > [(equal) ,AddDevicePlain:771] r_size>>SECTOR_SHIFT == params.size > [(success),AddDevicePlain:773] crypt_resize(cd,CDEVICE_1,params.size + 10) > [(equal) ,AddDevicePlain:775] r_size>>SECTOR_SHIFT == params.size + 10 > [(fail) ,AddDevicePlain:778] crypt_resize(cd,CDEVICE_1,params.size + 11) [new device size overlaps backing device] > => errno -22, errmsg: Device /dev/loop1 is too small. > [(equal) ,AddDevicePlain:780] r_size>>SECTOR_SHIFT == params.size + 10 > [(equal) ,AddDevicePlain:781] crypt_status(cd,CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDevicePlain:784] fd < 0 > [(success),AddDevicePlain:787] crypt_resize(cd,CDEVICE_1, 1) > [(equal) ,AddDevicePlain:789] r_size>>SECTOR_SHIFT == 1 > [(success),AddDevicePlain:791] crypt_resize(cd,CDEVICE_1,0) > [(equal) ,AddDevicePlain:793] r_size>>SECTOR_SHIFT == (size >> SECTOR_SHIFT)- 42 > [(success),AddDevicePlain:794] crypt_deactivate(cd,CDEVICE_1) > [(success),AddDevicePlain:799] crypt_init(&cd,DEVICE_1) > [(success),AddDevicePlain:800] crypt_format(cd,CRYPT_PLAIN,cipher,cipher_mode,NULL,NULL,key_size,¶ms) > [(success),AddDevicePlain:801] crypt_activate_by_volume_key(cd,CDEVICE_1,key,key_size,0) > [(fail) ,AddDevicePlain:804] crypt_suspend(cd,CDEVICE_1) [cannot suspend plain device] > => errno -22, errmsg: This operation is supported only for LUKS device. > [(equal) ,AddDevicePlain:805] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(fail) ,AddDevicePlain:806] crypt_resume_by_passphrase(cd,CDEVICE_1,CRYPT_ANY_SLOT,passphrase, strlen(passphrase)) [cannot resume plain device] > => errno -22, errmsg: This operation is supported only for LUKS device. > [(equal) ,AddDevicePlain:807] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(fail) ,AddDevicePlain:814] crypt_volume_key_get(cd, CRYPT_ANY_SLOT, key2, &key_size, passphrase, strlen(passphrase)) [small buffer] > => errno -12, errmsg: Volume key buffer too small. > [(success),AddDevicePlain:816] crypt_volume_key_get(cd, CRYPT_ANY_SLOT, key2, &key_size, passphrase, strlen(passphrase)) > [(success),AddDevicePlain:818] memcmp(key, key2, key_size) > [(success),AddDevicePlain:820] strcmp(cipher, crypt_get_cipher(cd)) > [(success),AddDevicePlain:821] strcmp(cipher_mode, crypt_get_cipher_mode(cd)) > [(equal) ,AddDevicePlain:822] (int)key_size == crypt_get_volume_key_size(cd) > [(equal) ,AddDevicePlain:823] 0 == crypt_get_data_offset(cd) > [(success),AddDevicePlain:824] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDevicePlain:827] _prepare_keyfile(KEYFILE1, KEY1, strlen(KEY1)) > [(success),AddDevicePlain:828] _prepare_keyfile(KEYFILE2, KEY2, strlen(KEY2)) > [(fail) ,AddDevicePlain:829] crypt_activate_by_keyfile(cd, NULL, CRYPT_ANY_SLOT, KEYFILE1, 0, 0) [cannot verify key with plain] > => errno -22, errmsg: > [(equal) ,AddDevicePlain:830] 0 == crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0) > [(equal) ,AddDevicePlain:831] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDevicePlain:832] crypt_deactivate(cd, CDEVICE_1) > [(fail) ,AddDevicePlain:833] crypt_activate_by_keyfile_offset(cd, NULL, CRYPT_ANY_SLOT, KEYFILE1, 0, strlen(KEY1) + 1, 0) [cannot seek] > => errno -22, errmsg: > [(equal) ,AddDevicePlain:834] 0 == crypt_activate_by_keyfile_offset(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0, 0) > [(success),AddDevicePlain:835] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDevicePlain:839] crypt_init(&cd,DEVICE_1) > [(success),AddDevicePlain:840] crypt_format(cd,CRYPT_PLAIN,cipher,cipher_mode,NULL,NULL,key_size,¶ms) > [(fail) ,AddDevicePlain:843] crypt_keyslot_add_by_passphrase(cd,CRYPT_ANY_SLOT,passphrase,strlen(passphrase),passphrase,strlen(passphrase)) [can't add keyslot to plain device] > => errno -22, errmsg: This operation is supported only for LUKS device. > [(fail) ,AddDevicePlain:844] crypt_keyslot_add_by_volume_key(cd,CRYPT_ANY_SLOT ,key,key_size,passphrase,strlen(passphrase)) [can't add keyslot to plain device] > => errno -22, errmsg: This operation is supported only for LUKS device. > [(fail) ,AddDevicePlain:845] crypt_keyslot_add_by_keyfile(cd,CRYPT_ANY_SLOT,KEYFILE1,strlen(KEY1),KEYFILE2,strlen(KEY2)) [can't add keyslot to plain device] > => errno -22, errmsg: This operation is supported only for LUKS device. > [(fail) ,AddDevicePlain:846] crypt_keyslot_destroy(cd,1) [can't manipulate keyslots on plain device] > => errno -22, errmsg: This operation is supported only for LUKS device. > [(equal) ,AddDevicePlain:847] crypt_keyslot_status(cd, 0) == CRYPT_SLOT_INVALID >HashDevicePlain: plain device API hash test > [(success),HashDevicePlain:1602] crypt_init(&cd, DEVICE_1) > [(success),HashDevicePlain:1603] crypt_format(cd, CRYPT_PLAIN, "aes", "cbc-essiv:sha256", NULL, NULL, 16, ¶ms) > [(success),HashDevicePlain:1606] _prepare_keyfile(KEYFILE1, "tooshort", 8) > [(fail) ,HashDevicePlain:1607] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 16, 0) [not enough data in keyfile] > => errno -22, errmsg: Cannot read requested amount of data. > [(success),HashDevicePlain:1615] _prepare_keyfile(KEYFILE1, key, key_size) > [(success),HashDevicePlain:1616] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0) > [(success),HashDevicePlain:1617] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(success),HashDevicePlain:1618] strcmp(key, mk_hex) > [(success),HashDevicePlain:1619] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1623] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size - 3, 0) > [(success),HashDevicePlain:1624] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(success),HashDevicePlain:1625] strcmp(key, mk_hex) > [(success),HashDevicePlain:1626] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1635] _prepare_keyfile(KEYFILE1, key, strlen(mk_hex) / 2) > [(success),HashDevicePlain:1636] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0) > [(success),HashDevicePlain:1637] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(fail) ,HashDevicePlain:1638] strcmp(key, mk_hex) [only key length used] > => errno -98, errmsg: > [(success),HashDevicePlain:1639] strncmp(key, mk_hex, key_size) > [(success),HashDevicePlain:1640] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1644] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0) > [(success),HashDevicePlain:1645] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(fail) ,HashDevicePlain:1646] strcmp(key, mk_hex) [only key length used] > => errno -98, errmsg: > [(success),HashDevicePlain:1647] strncmp(key, mk_hex, key_size) > [(success),HashDevicePlain:1648] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1655] crypt_init(&cd, DEVICE_1) > [(success),HashDevicePlain:1656] crypt_format(cd, CRYPT_PLAIN, "aes", "cbc-essiv:sha256", NULL, NULL, 16, ¶ms) > [(success),HashDevicePlain:1662] _prepare_keyfile(KEYFILE1, keystr, strlen(keystr)) > [(success),HashDevicePlain:1663] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0) > [(success),HashDevicePlain:1664] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(success),HashDevicePlain:1665] strcmp(key, mk_hex) > [(success),HashDevicePlain:1666] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1669] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0) > [(success),HashDevicePlain:1670] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(success),HashDevicePlain:1671] strcmp(key, mk_hex) > [(success),HashDevicePlain:1672] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1678] _prepare_keyfile(KEYFILE1, keystr, strlen(keystr)) > [(success),HashDevicePlain:1679] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, key_size, 0) > [(success),HashDevicePlain:1680] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(success),HashDevicePlain:1681] strcmp(key, mk_hex) > [(success),HashDevicePlain:1682] crypt_deactivate(cd, CDEVICE_1) > [(success),HashDevicePlain:1685] crypt_activate_by_keyfile(cd, CDEVICE_1, CRYPT_ANY_SLOT, KEYFILE1, 0, 0) > [(success),HashDevicePlain:1686] _get_key_dm(CDEVICE_1, key, sizeof(key)) > [(success),HashDevicePlain:1687] strcmp(key, "0e49cb34a1dee1df33f6505e4de44a66") > [(success),HashDevicePlain:1688] crypt_deactivate(cd, CDEVICE_1) >AddDeviceLuks: Format and use LUKS device > [(success),AddDeviceLuks:1019] get_luks_offsets(1, key_size, 0, 0, &r_header_size, &r_payload_offset) >sectors_per_stripes 250 > [(success),AddDeviceLuks:1020] create_dmdevice_over_loop(H_DEVICE, r_header_size) > [(success),AddDeviceLuks:1021] create_dmdevice_over_loop(H_DEVICE_WRONG, r_header_size - 1) > [(success),AddDeviceLuks:1024] crypt_init(&cd, DMDIR H_DEVICE_WRONG) > [(fail) ,AddDeviceLuks:1026] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) [Not enough space for keyslots material] > => errno -22, errmsg: Device /dev/mapper/head_wr is too small. (LUKS requires at least 1049600 bytes.) > [(success),AddDeviceLuks:1030] crypt_init(&cd, DMDIR H_DEVICE) > [(success),AddDeviceLuks:1031] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(equal) ,AddDeviceLuks:1032] crypt_get_data_offset(cd) == 0 > [(success),AddDeviceLuks:1039] crypt_init(&cd, DEVICE_2) > [(success),AddDeviceLuks:1040] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(success),AddDeviceLuks:1041] !(crypt_get_data_offset(cd) > 0) > [(success),AddDeviceLuks:1048] get_luks_offsets(0, key_size, params.data_alignment, 0, NULL, &r_payload_offset) >sectors_per_stripes 250 > [(success),AddDeviceLuks:1049] create_dmdevice_over_loop(L_DEVICE_0S, r_payload_offset) > [(success),AddDeviceLuks:1050] create_dmdevice_over_loop(L_DEVICE_1S, r_payload_offset + 1) > [(success),AddDeviceLuks:1052] create_dmdevice_over_loop(L_DEVICE_WRONG, 2050 - 1) > [(success),AddDeviceLuks:1055] crypt_init(&cd, DMDIR L_DEVICE_WRONG) > [(fail) ,AddDeviceLuks:1056] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) [Device too small] > => errno -22, errmsg: Device /dev/mapper/luks_wr is too small. (LUKS requires at least 1049600 bytes.) > [(success),AddDeviceLuks:1060] crypt_init(&cd, DMDIR L_DEVICE_0S) > [(success),AddDeviceLuks:1061] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(fail) ,AddDeviceLuks:1062] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) [Encrypted area too small] > => errno -22, errmsg: Requested offset is beyond real size of device /dev/mapper/luks_zerosec. > [(success),AddDeviceLuks:1066] crypt_init(&cd, DMDIR L_DEVICE_1S) > [(success),AddDeviceLuks:1067] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(equal) ,AddDeviceLuks:1068] crypt_get_data_offset(cd) == params.data_alignment > [(success),AddDeviceLuks:1069] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) > [(equal) ,AddDeviceLuks:1070] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDeviceLuks:1071] device_size(DMDIR CDEVICE_1, &r_size_1) > [(equal) ,AddDeviceLuks:1072] r_size_1 == SECTOR_SIZE > [(success),AddDeviceLuks:1073] crypt_deactivate(cd, CDEVICE_1) > [(equal) ,AddDeviceLuks:1074] crypt_status(cd, CDEVICE_1) == CRYPT_INACTIVE > [(fail) ,AddDeviceLuks:1076] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) [Context is already formated] > => errno -22, errmsg: > [(fail) ,AddDeviceLuks:1077] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, NULL) [Context is already formated] > => errno -22, errmsg: > [(success),AddDeviceLuks:1079] crypt_set_data_device(cd, DMDIR L_DEVICE_0S) > [(fail) ,AddDeviceLuks:1080] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) [Device too small] > => errno -22, errmsg: Requested offset is beyond real size of device /dev/mapper/luks_zerosec. > [(success),AddDeviceLuks:1081] crypt_set_data_device(cd, DMDIR L_DEVICE_1S) > [(success),AddDeviceLuks:1082] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) > [(success),AddDeviceLuks:1083] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDeviceLuks:1090] crypt_init(&cd, DMDIR H_DEVICE) > [(success),AddDeviceLuks:1091] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(equal) ,AddDeviceLuks:1092] crypt_keyslot_add_by_volume_key(cd, 7, key, key_size, passphrase, strlen(passphrase)) == 7 > [(equal) ,AddDeviceLuks:1093] crypt_activate_by_passphrase(cd, CDEVICE_1, 7, passphrase, strlen(passphrase) ,0) == 7 > [(success),AddDeviceLuks:1095] crypt_init_by_name_and_header(&cd, CDEVICE_1, DMDIR H_DEVICE) > [(fail) ,AddDeviceLuks:1096] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) [Context is already formated] > => errno -22, errmsg: > [(equal) ,AddDeviceLuks:1097] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDeviceLuks:1100] crypt_init_by_name_and_header(&cd, CDEVICE_1, NULL) > [(equal) ,AddDeviceLuks:1101] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDeviceLuks:1102] !!crypt_get_type(cd) > [(success),AddDeviceLuks:1103] strcmp(cipher, crypt_get_cipher(cd)) > [(success),AddDeviceLuks:1104] strcmp(cipher_mode, crypt_get_cipher_mode(cd)) > [(equal) ,AddDeviceLuks:1105] (int)key_size == crypt_get_volume_key_size(cd) > [(success),AddDeviceLuks:1106] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDeviceLuks:1113] crypt_init(&cd, DMDIR L_DEVICE_1S) > [(success),AddDeviceLuks:1114] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(success),AddDeviceLuks:1115] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) > [(success),AddDeviceLuks:1119] crypt_init(&cd, DMDIR H_DEVICE) > [(success),AddDeviceLuks:1120] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(success),AddDeviceLuks:1123] crypt_init_by_name_and_header(&cd, CDEVICE_1, DMDIR H_DEVICE) > [(equal) ,AddDeviceLuks:1124] crypt_status(cd, CDEVICE_1) == CRYPT_ACTIVE > [(success),AddDeviceLuks:1125] !!crypt_get_type(cd) > [(fail) ,AddDeviceLuks:1126] crypt_activate_by_volume_key(cd, CDEVICE_1, key, key_size, 0) [Device is active] > => errno -17, errmsg: Device ctest1 already exists. > [(fail) ,AddDeviceLuks:1127] crypt_activate_by_volume_key(cd, CDEVICE_2, key, key_size, 0) [Device is active] > => errno -22, errmsg: Device type is not properly initialised. > [(equal) ,AddDeviceLuks:1128] crypt_status(cd, CDEVICE_2) == CRYPT_INACTIVE > [(success),AddDeviceLuks:1129] crypt_deactivate(cd, CDEVICE_1) > [(success),AddDeviceLuks:1134] crypt_init(&cd, DEVICE_2) > [(success),AddDeviceLuks:1135] crypt_format(cd, CRYPT_LUKS1, cipher, cipher_mode, NULL, key, key_size, ¶ms) > [(success),AddDeviceLuks:1138] crypt_volume_key_verify(cd, key, key_size) > [(success),AddDeviceLuks:1139] crypt_activate_by_volume_key(cd, CDEVICE_2, key, key_size, 0) > [(equal) ,AddDeviceLuks:1140] crypt_status(cd, CDEVICE_2) == CRYPT_ACTIVE > [(success),AddDeviceLuks:1141] crypt_deactivate(cd, CDEVICE_2) > [(equal) ,AddDeviceLuks:1144] 7 == crypt_keyslot_add_by_volume_key(cd, 7, key, key_size, passphrase, strlen(passphrase)) > [(equal) ,AddDeviceLuks:1145] CRYPT_SLOT_ACTIVE_LAST == crypt_keyslot_status(cd, 7) > [(equal) ,AddDeviceLuks:1146] 7 == crypt_activate_by_passphrase(cd, CDEVICE_2, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0) >FAIL line 1146 [AddDeviceLuks]: expected equal values differs: 7 != -1 >FAIL: api-test >CASE: [1] open - compat image - acceptance check >./compat-test: line 162: 9789 Done echo $PWD0 > 9790 Segmentation fault | $CRYPTSETUP luksOpen $LOOPDEV $DEV_NAME >FAILED >FAIL: compat-test >which: no uuencode in (/sbin:/bin:/usr/sbin:/usr/bin) >WARNING: test require uuencode binary, test skipped. >PASS: loopaes-test ># Create desktop-class 4K drive ># (logical_block_size=512, physical_block_size=4096, alignment_offset=0) >Formatting using topology info (256 bits key)...No key available with this passphrase. >FAIL Keyslot add failed. >FAIL: align-test >[1] Allowing discards for LUKS device >No key available with this passphrase. >FAILED >FAIL: discards-test >aes PLAIN:[table OK][status OK] LUKS:./mode-test: line 98: 10028 Done echo $PASSWORD > 10029 Segmentation fault | $CRYPTSETUP luksOpen /dev/mapper/$DEV_NAME "$DEV_NAME"_"$1" > /dev/null 2>&1 >[table FAIL] > Expecting aes-cbc-plain got . >FAIL: mode-test >HASH: ripemd160 KSIZE: 0 / pwd [OK] >HASH: ripemd160 KSIZE: 256 / pwd [OK] >HASH: ripemd160 KSIZE: 128 / pwd [OK] >HASH: sha1 KSIZE: 256 / pwd [OK] >HASH: sha1 KSIZE: 128 / pwd [OK] >HASH: sha256 KSIZE: 256 / pwd [OK] >HASH: sha256 KSIZE: 128 / pwd [OK] >HASH: sha256 KSIZE: 0 / std- [OK] >HASH: sha256 KSIZE: 256 / std- [OK] >HASH: sha256 KSIZE: 128 / std- [OK] >HASH: sha256 KSIZE: 256 / stdin [OK] >HASH: sha256 KSIZE: 0 / stdin [OK] >HASH: ripemd160 KSIZE: 256 / file [OK] >HASH: sha256 KSIZE: 256 / file [OK] >HASH: unknown* KSIZE: 256 / file [OK] >HASH: sha256:20 KSIZE: 256 / pwd [OK] >HASH: sha256:32 KSIZE: 256 / pwd [OK] >HASH: sha256: KSIZE: 256 / failpwd [OK] >HASH: sha256:xx KSIZE: 256 / failpwd [OK] >HASH: ripemd160 KSIZE: 256 / file [OK] >HASH: sha256 KSIZE: 256 / file [OK] >HASH: sha256 KSIZE: 128 / file [OK] >HASH: sha256 KSIZE: 512 / file [OK] >HASH: plain KSIZE: 128 / cat [OK] >HASH: plain KSIZE: 128 / cat [OK] >HASH: plain KSIZE: 128 / cat [OK] >HASH: plain KSIZE: 256 / pwd [OK] >HASH: plain:2 KSIZE: 256 / pwd [OK] >HASH: plain:9 KSIZE: 256 / failpwd [OK] >HASH: sha256 KSIZE: 128 / cat [OK] >HASH: sha256:14 KSIZE: 128 / cat [OK] >HASH: sha256 KSIZE: 128 / pwd [OK] >HASH: sha256 KSIZE: 128 / pwd [OK] >HASH: sha256 KSIZE: 128 / pwd [OK] >PASS: password-hash-test >REQUIRED KDF TEST >REQUIRED CIPHERS TEST ># Algorithm | Key | Encryption | Decryption > aes-cbc 256b 26.0 MiB/s 21.8 MiB/s > aes-lrw 384b 55.7 MiB/s 57.1 MiB/s > aes-xts 512b 25.7 MiB/s 21.7 MiB/s > twofish-cbc 256b 66.7 MiB/s 72.7 MiB/s > twofish-lrw 384b 66.4 MiB/s 69.6 MiB/s > twofish-xts 512b 67.0 MiB/s 73.5 MiB/s > serpent-cbc 256b 43.7 MiB/s 48.3 MiB/s > serpent-lrw 384b 44.8 MiB/s 47.8 MiB/s > serpent-xts 512b 45.3 MiB/s 48.1 MiB/s >blowfish-cbc 256b 50.4 MiB/s 58.6 MiB/s >des3_ede-cbc 192b 15.0 MiB/s 15.6 MiB/s > cast5-cbc 128b 50.0 MiB/s 55.0 MiB/s >HEADER CHECK > tcrypt-images/tc_1-rmd160-cbc-aes [OK] > tcrypt-images/tc_1-rmd160-cbc-blowfish [OK] > tcrypt-images/tc_1-sha1-cbc-3des [OK] > tcrypt-images/tc_1-sha1-cbc-aes [OK] > tcrypt-images/tc_1-sha1-cbc-blowfish [OK] > tcrypt-images/tc_1-sha1-cbc-cast [OK] > tcrypt-images/tc_2-rmd160-cbc-aes [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-blowfish [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-blowfish-serpent [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-twofish [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-twofish-serpent [OK] > tcrypt-images/tc_2-rmd160-cbc-serpent-aes [OK] > tcrypt-images/tc_2-rmd160-cbc-serpent-twofish-aes [OK] > tcrypt-images/tc_2-rmd160-cbc-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-cbc-twofish [OK] > tcrypt-images/tc_2-rmd160-cbc-twofish-serpent [OK] > tcrypt-images/tc_2-rmd160-lrw-aes [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-twofish [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-twofish-serpent [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-aes [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-twofish-aes [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-lrw-twofish [OK] > tcrypt-images/tc_2-rmd160-lrw-twofish-serpent [OK] > tcrypt-images/tc_2-whirlpool-cbc-aes [OK] > tcrypt-images/tc_3-rmd160-xts-aes [OK] > tcrypt-images/tc_3-rmd160-xts-aes-twofish [OK] > tcrypt-images/tc_3-rmd160-xts-aes-twofish-serpent [OK] > tcrypt-images/tc_3-rmd160-xts-serpent [OK] > tcrypt-images/tc_3-rmd160-xts-serpent-aes [OK] > tcrypt-images/tc_3-rmd160-xts-serpent-twofish-aes [OK] > tcrypt-images/tc_3-rmd160-xts-twofish [OK] > tcrypt-images/tc_3-rmd160-xts-twofish-serpent [OK] > tcrypt-images/tc_3-sha512-xts-aes [OK] > tcrypt-images/tc_3-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_3-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_4-rmd160-xts-aes [OK] > tcrypt-images/tc_4-sha512-xts-aes [OK] > tcrypt-images/tc_4-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_4-sha512-xts-aes-twofish [OK] > tcrypt-images/tc_4-sha512-xts-aes-twofish-serpent [OK] > tcrypt-images/tc_4-sha512-xts-serpent [OK] > tcrypt-images/tc_4-sha512-xts-serpent-aes [OK] > tcrypt-images/tc_4-sha512-xts-serpent-twofish-aes [OK] > tcrypt-images/tc_4-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_4-sha512-xts-twofish [OK] > tcrypt-images/tc_4-sha512-xts-twofish-serpent [OK] > tcrypt-images/tc_5-rmd160-xts-aes [OK] > tcrypt-images/tc_5-sha512-xts-aes [OK] > tcrypt-images/tc_5-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_5-sha512-xts-aes-twofish [OK] > tcrypt-images/tc_5-sha512-xts-aes-twofish-serpent [OK] > tcrypt-images/tc_5-sha512-xts-serpent [OK] > tcrypt-images/tc_5-sha512-xts-serpent-aes [OK] > tcrypt-images/tc_5-sha512-xts-serpent-twofish-aes [OK] > tcrypt-images/tc_5-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_5-sha512-xts-twofish [OK] > tcrypt-images/tc_5-sha512-xts-twofish-serpent [OK] > tcrypt-images/tc_5-whirlpool-xts-aes [OK] >HEADER CHECK (HIDDEN) > tcrypt-images/tc_2-rmd160-cbc-aes-hidden (hidden) [OK] > tcrypt-images/tc_2-rmd160-cbc-serpent-twofish-aes-hidden (hidden) [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-hidden (hidden) [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-twofish-aes-hidden (hidden) [OK] > tcrypt-images/tc_3-sha512-xts-aes-hidden (hidden) [OK] > tcrypt-images/tc_3-sha512-xts-serpent-twofish-aes-hidden (hidden) [OK] > tcrypt-images/tc_4-sha512-xts-aes-hidden (hidden) [OK] > tcrypt-images/tc_4-sha512-xts-serpent-twofish-aes-hidden (hidden) [OK] > tcrypt-images/tc_5-sha512-xts-aes-hidden (hidden) [OK] > tcrypt-images/tc_5-sha512-xts-serpent-twofish-aes-hidden (hidden) [OK] >HEADER KEYFILES CHECK > tcrypt-images/tck_5-sha512-xts-aes [OK] >ACTIVATION FS UUID CHECK > tcrypt-images/tc_1-rmd160-cbc-aes [OK] > tcrypt-images/tc_1-rmd160-cbc-blowfish [N/A] > tcrypt-images/tc_1-sha1-cbc-3des [OK] > tcrypt-images/tc_1-sha1-cbc-aes [OK] > tcrypt-images/tc_1-sha1-cbc-blowfish [N/A] > tcrypt-images/tc_1-sha1-cbc-cast [OK] > tcrypt-images/tc_2-rmd160-cbc-aes [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-blowfish [N/A] > tcrypt-images/tc_2-rmd160-cbc-aes-blowfish-serpent [N/A] > tcrypt-images/tc_2-rmd160-cbc-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-cbc-aes-twofish [N/A] > tcrypt-images/tc_2-rmd160-cbc-aes-twofish-serpent [N/A] > tcrypt-images/tc_2-rmd160-cbc-serpent-aes [N/A] > tcrypt-images/tc_2-rmd160-cbc-serpent-twofish-aes [N/A] > tcrypt-images/tc_2-rmd160-cbc-serpent-twofish-aes-hidden [N/A] > tcrypt-images/tc_2-rmd160-cbc-twofish [OK] > tcrypt-images/tc_2-rmd160-cbc-twofish-serpent [N/A] > tcrypt-images/tc_2-rmd160-lrw-aes [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-twofish [OK] > tcrypt-images/tc_2-rmd160-lrw-aes-twofish-serpent [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-aes [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-twofish-aes [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-lrw-twofish [OK] > tcrypt-images/tc_2-rmd160-lrw-twofish-serpent [OK] > tcrypt-images/tc_2-whirlpool-cbc-aes [OK] > tcrypt-images/tc_3-rmd160-xts-aes [OK] > tcrypt-images/tc_3-rmd160-xts-aes-twofish [OK] > tcrypt-images/tc_3-rmd160-xts-aes-twofish-serpent [OK] > tcrypt-images/tc_3-rmd160-xts-serpent [OK] > tcrypt-images/tc_3-rmd160-xts-serpent-aes [OK] > tcrypt-images/tc_3-rmd160-xts-serpent-twofish-aes [OK] > tcrypt-images/tc_3-rmd160-xts-twofish [OK] > tcrypt-images/tc_3-rmd160-xts-twofish-serpent [OK] > tcrypt-images/tc_3-sha512-xts-aes [OK] > tcrypt-images/tc_3-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_3-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_4-rmd160-xts-aes [OK] > tcrypt-images/tc_4-sha512-xts-aes [OK] > tcrypt-images/tc_4-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_4-sha512-xts-aes-twofish [OK] > tcrypt-images/tc_4-sha512-xts-aes-twofish-serpent [OK] > tcrypt-images/tc_4-sha512-xts-serpent [OK] > tcrypt-images/tc_4-sha512-xts-serpent-aes [OK] > tcrypt-images/tc_4-sha512-xts-serpent-twofish-aes [OK] > tcrypt-images/tc_4-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_4-sha512-xts-twofish [OK] > tcrypt-images/tc_4-sha512-xts-twofish-serpent [OK] > tcrypt-images/tc_5-rmd160-xts-aes [OK] > tcrypt-images/tc_5-sha512-xts-aes [OK] > tcrypt-images/tc_5-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_5-sha512-xts-aes-twofish [OK] > tcrypt-images/tc_5-sha512-xts-aes-twofish-serpent [OK] > tcrypt-images/tc_5-sha512-xts-serpent [OK] > tcrypt-images/tc_5-sha512-xts-serpent-aes [OK] > tcrypt-images/tc_5-sha512-xts-serpent-twofish-aes [OK] > tcrypt-images/tc_5-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_5-sha512-xts-twofish [OK] > tcrypt-images/tc_5-sha512-xts-twofish-serpent [OK] > tcrypt-images/tc_5-whirlpool-xts-aes [OK] >ACTIVATION FS UUID (HIDDEN) CHECK > tcrypt-images/tc_2-rmd160-cbc-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-cbc-serpent-twofish-aes-hidden [N/A] > tcrypt-images/tc_2-rmd160-lrw-aes-hidden [OK] > tcrypt-images/tc_2-rmd160-lrw-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_3-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_3-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_4-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_4-sha512-xts-serpent-twofish-aes-hidden [OK] > tcrypt-images/tc_5-sha512-xts-aes-hidden [OK] > tcrypt-images/tc_5-sha512-xts-serpent-twofish-aes-hidden [OK] >PASS: tcrypt-compat-test >REQUIRED KDF TEST >REQUIRED CIPHERS TEST ># Algorithm | Key | Encryption | Decryption > aes-xts 256b 35.2 MiB/s 29.9 MiB/s > twofish-xts 256b 68.2 MiB/s 73.5 MiB/s > serpent-xts 256b 45.9 MiB/s 48.1 MiB/s > aes-cbc 256b 26.0 MiB/s 21.8 MiB/s > aes-lrw 256b 70.5 MiB/s 73.3 MiB/s >ACTIVATION FS UUID CHECK > luks1-images/luks1_aes-cbc-essiv-sha256-sha1.img [FAILED] >FAIL: luks1-compat-test >Verity tests [separate devices] >V1(sb=yes) sha256 block size 512: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 512: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 512: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 512: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V0(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V0(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V0(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V0(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >Verity tests [one device offset] >V1(sb=yes) sha256 block size 512: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 512: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 512: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 512: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V0(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V0(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V0(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V0(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha256 block size 4096: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=yes) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][data_dev corruption] >V1(sb=no) sha1 block size 1024: [root hash][verify][activate][in-kernel verify][hash_dev corruption] >PASS: verity-compat-test >[1] Reencryption >./reencryption-compat-test: line 60: 24415 Done echo "$1" > 24416 Segmentation fault | $CRYPTSETUP luksOpen $LOOPDEV1 $DEV_NAME >FAILED >FAIL: reencryption-compat-test >==================== >7 of 11 tests failed >==================== >Makefile:581: recipe for target 'check-TESTS' failed >make[2]: *** [check-TESTS] Error 1 >make[2]: Leaving directory '/home/rjones/d/cryptsetup/tests' >Makefile:704: recipe for target 'check-am' failed >make[1]: *** [check-am] Error 2 >make[1]: Leaving directory '/home/rjones/d/cryptsetup/tests' >Makefile:452: recipe for target 'check-recursive' failed >make: *** [check-recursive] Error 1
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1122937
: 920928 |
920929
|
921078
|
921079