| /openbmc/qemu/tests/qemu-iotests/tests/ |
| H A D | luks-detached-header | 4 # Test LUKS volume with detached header 38 luks_img = os.path.join(iotests.test_dir, "luks.img") 49 "driver": "luks", 58 "driver": "luks", 74 # 1. Create the normal LUKS disk with 128M size 82 node_name="luks-1-storage", 87 "file": "luks-1-storage", 96 # 2. Create the LUKS disk with detached header (raw) 98 # Create detached LUKS header 106 node_name="luks-2-header-storage", [all …]
|
| /openbmc/qemu/crypto/ |
| H A D | block-luks.c | 2 * QEMU Crypto block device encryption LUKS format 25 #include "block-luks.h" 26 #include "block-luks-priv.h" 39 * Reference for the LUKS format implemented here is 343 qcrypto_block_luks_splitkeylen_sectors(const QCryptoBlockLUKS *luks, in qcrypto_block_luks_splitkeylen_sectors() argument 352 size_t splitkeylen = luks->header.master_key_len * stripes; in qcrypto_block_luks_splitkeylen_sectors() 408 * Stores the main LUKS header, taking care of endianness 416 const QCryptoBlockLUKS *luks = block->opaque; in qcrypto_block_luks_store_header() local 422 memcpy(hdr_copy, &luks->header, sizeof(QCryptoBlockLUKSHeader)); in qcrypto_block_luks_store_header() 438 * Loads the main LUKS header, and byteswaps it to native endianness [all …]
|
| H A D | block-luks-priv.h | 2 * QEMU Crypto block device encryption LUKS format 24 #include "block-luks.h" 36 * Reference for the LUKS format implemented here is 50 /* The following constants are all defined by the LUKS spec */ 103 /* LUKS version, currently 1 */
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 149.out | 3 truncate TEST_DIR/luks-aes-256-xts-plain64-sha1.img --size 4194304MB 5 …ey-size 512 --hash sha1 --key-slot 0 --key-file - --iter-time 10 TEST_DIR/luks-aes-256-xts-plain64… 7 sudo cryptsetup -q -v luksOpen TEST_DIR/luks-aes-256-xts-plain64-sha1.img qiotest-145-aes-256-xts-p… 23 …ec0,data=MTIzNDU2,format=base64 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/lu… 28 …ec0,data=MTIzNDU2,format=base64 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/lu… 33 …ec0,data=MTIzNDU2,format=base64 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/lu… 38 …ec0,data=MTIzNDU2,format=base64 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/lu… 43 sudo cryptsetup -q -v luksOpen TEST_DIR/luks-aes-256-xts-plain64-sha1.img qiotest-145-aes-256-xts-p… 59 unlink TEST_DIR/luks-aes-256-xts-plain64-sha1.img 63 …luks --object secret,id=sec0,data=MTIzNDU2,format=base64 -o key-secret=sec0,iter-time=10,cipher-al… [all …]
|
| H A D | 149 | 21 # Exercise the QEMU 'luks' block driver to validate interoperability 34 """Represent configuration parameters for a single LUKS 62 return "luks-%s.img" % self.name 130 """Add another password to a LUKS key slot""" 151 """Format a new LUKS volume with cryptsetup, adding the 178 """Set the ownership of a open LUKS device to this user""" 196 """Open an image as a LUKS device""" 206 """Close an active LUKS device """ 246 """Create and format a disk image with LUKS using qemu-img""" 259 args = ["create", "-f", "luks", [all …]
|
| H A D | 210.out | 3 …": {"job-id": "job0", "options": {"driver": "file", "filename": "TEST_DIR/PID-t.luks", "size": 0}}} 8 {"execute": "blockdev-add", "arguments": {"driver": "file", "filename": "TEST_DIR/PID-t.luks", "nod… 10 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "luks", "file"… 58 …": {"job-id": "job0", "options": {"driver": "file", "filename": "TEST_DIR/PID-t.luks", "size": 0}}} 63 …aes-128", "cipher-mode": "cbc", "driver": "luks", "file": {"driver": "file", "filename": "TEST_DIR… 111 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "luks", "file"… 119 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "luks", "file"… 167 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "luks", "file"… 173 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "luks", "file"… 179 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "luks", "file"…
|
| H A D | 210 | 4 # Test luks and file image creation 28 supported_fmts=['luks'], 32 with iotests.FilePath('t.luks') as disk_path, \ 62 'driver=luks,file.driver=file,file.filename=%s,key-secret=keysec0' % (disk_path), 96 'driver=luks,file.driver=file,file.filename=%s,key-secret=keysec0' % (disk_path), 132 'driver=luks,file.driver=file,file.filename=%s,key-secret=keysec0' % (disk_path), 166 vm.add_blockdev('driver=luks,file=node0,key-secret=keysec0,node-name=node1') 176 'driver=luks,file.driver=file,file.filename=%s,key-secret=keysec0' % (disk_path),
|
| H A D | 082.out | 60 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 86 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 91 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 112 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 117 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 138 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 143 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 164 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 169 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase [all …]
|
| H A D | 282.out | 4 Formatting 'vol.img', fmt=luks size=4194304 key-secret=sec0 8 Formatting 'vol.img', fmt=luks size=4194304 key-secret=sec0
|
| H A D | 282 | 4 # Test qemu-img file cleanup for LUKS when using a non-UTF8 secret 40 _supported_fmt luks
|
| H A D | 087 | 167 echo === Encrypted image LUKS === 170 _make_test_img --object secret,id=sec0,data=123456 -o encrypt.format=luks,encrypt.key-secret=sec0 $… 189 "format": "luks",
|
| H A D | 295 | 64 self.img_opts = [ '-o', "encrypt.format=luks" ] 99 'format':'luks', 141 crypt_options['format'] = 'luks' 175 crypt_options['format'] = 'luks' 275 iotests.main(supported_fmts = ['qcow2', 'luks'])
|
| H A D | 284 | 85 echo "testing LUKS qcow2 encryption" 90 …_make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=…
|
| H A D | 025 | 41 _supported_fmt raw qcow2 qed luks 67 if [ "$IMGFMT" == "luks" ]; then
|
| /openbmc/estoraged/include/ |
| H A D | estoraged.hpp | 31 * @brief eStoraged object to manage a LUKS encrypted storage device. 41 * @param[in] luksName - name for the LUKS container 76 /** @brief Format the LUKS encrypted device and create empty filesystem. 78 * @param[in] password - password to set for the LUKS device. 90 /** @brief Unmount filesystem and lock the LUKS device. 96 * @param[in] password - password for the LUKS device. 100 /** @brief Change the password for the LUKS device. 102 * @param[in] oldPassword - old password for the LUKS device. 103 * @param[in] newPassword - new password for the LUKS device. 108 /** @brief Check if the LUKS device is currently locked. */ [all …]
|
| /openbmc/qemu/docs/devel/ |
| H A D | luks-detached-header.rst | 2 LUKS volume with detached header 8 This document gives an overview of the design of LUKS volume with detached 14 The LUKS format has ability to store the header in a separate volume from 15 the payload. We could extend the LUKS driver in QEMU to support this use 18 Normally a LUKS volume has a layout: 28 With a detached LUKS header, you need 2 disks so getting: 41 * Secrecy - the disk2 cannot be identified as containing LUKS 51 add encryption.You can store the LUKS header 65 LUKS volume with detached header is shown in the diagram below. 69 LUKS header and key material are located in the header node, [all …]
|
| /openbmc/qemu/tests/unit/ |
| H A D | test-crypto-block.c | 25 #include "crypto/block-luks-priv.h" 59 .u.luks = { 68 .u.luks = { 77 .u.luks = { 91 .u.luks = { 138 .path = "/crypto/block/luks/default", 153 .path = "/crypto/block/luks/aes-256-cbc-plain64", 168 .path = "/crypto/block/luks/aes-256-cbc-essiv", 402 return "LUKS header cipher name is not NUL terminated"; in luks_bad_null_term_cipher_name() 411 return "LUKS header cipher mode is not NUL terminated"; in luks_bad_null_term_cipher_mode() [all …]
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Inventory/Item/ |
| H A D | Volume.interface.yaml | 3 interface only supports LUKS encrypted volumes, but it can be extended in 9 Format a LUKS encrypted device and create a filesystem. 14 Array of bytes to use as the LUKS password. 51 Array of bytes to use as the LUKS password. 58 Change the LUKS password that unlocks the storage volume. 63 Array of bytes for the old LUKS password. 67 Array of bytes to use as the LUKS password. 77 Indicates whether the LUKS volume is locked.
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/ |
| H A D | cryptsetup_2.7.5.bb | 1 SUMMARY = "Manage plain dm-crypt and LUKS encrypted volumes" 4 LUKS volumes. The difference is that LUKS uses a metadata header \ 39 luks-adjust-xts-keysize \ 65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt… 71 PACKAGECONFIG[luks2] = "--with-default-luks-format=LUKS2,--with-default-luks-format=LUKS1"
|
| /openbmc/openbmc/meta-security/recipes-security/cryptmount/ |
| H A D | cryptmount_6.2.0.bb | 13 PACKAGECONFIG ?="intl luks gcrypt nls" 19 PACKAGECONFIG[luks] = "--enable-luks, --disable-luks, cryptsetup"
|
| /openbmc/qemu/block/ |
| H A D | crypto.c | 42 BdrvChild *header; /* Reference to the detached LUKS header */ 654 qdict_put_str(cryptoopts, "format", "luks"); in block_crypto_measure() 711 luks_opts = &create_options->u.luks; in block_crypto_co_create_luks() 722 "specified for formatting LUKS disk"); in block_crypto_co_create_luks() 728 .u.luks = *qapi_BlockdevCreateOptionsLUKS_base(luks_opts), in block_crypto_co_create_luks() 736 /* LUKS volume with detached header */ in block_crypto_co_create_luks() 744 /* Format the LUKS header node */ in block_crypto_co_create_luks() 751 /* Format the LUKS payload node */ in block_crypto_co_create_luks() 759 /* LUKS volume with none-detached header */ in block_crypto_co_create_luks() 816 qdict_put_str(cryptoopts, "format", "luks"); in block_crypto_co_create_opts_luks() [all …]
|
| /openbmc/qemu/qapi/ |
| H A D | crypto.json | 156 # @luks: LUKS encryption format. Recommended for new images 161 'data': ['qcow', 'luks']} 192 # The options that apply to LUKS encryption format 206 # The options that apply to LUKS encryption format initialization 249 'luks': 'QCryptoBlockOptionsLUKS' } } 263 'luks': 'QCryptoBlockCreateOptionsLUKS' } } 281 # Information about the LUKS block encryption key slot options 302 # Information about the LUKS block encryption options 314 # @detached-header: whether the LUKS header is detached (Since 9.0) 348 'data': { 'luks': 'QCryptoBlockInfoLUKS' } } [all …]
|
| /openbmc/qemu/docs/interop/ |
| H A D | qcow2.rst | 67 2 for LUKS encryption 352 of the ``LUKS`` crypt method. The header extension must be absent for 369 For the LUKS crypt method, the encryption header works as follows. 371 The first 592 bytes of the header clusters will contain the LUKS 374 stripes in the key slot and key size. Refer to the LUKS format 376 package) for details of the LUKS partition header format. 378 In the LUKS partition header, the ``payload-offset`` field will be 379 calculated as normal for the LUKS spec. ie the size of the LUKS 381 start of the LUKS header. This offset value is not required to be 387 In the LUKS key slots header, the ``key-material-offset`` is relative [all …]
|
| /openbmc/qemu/docs/system/ |
| H A D | qemu-block-drivers.rst.inc | 67 If this is set to ``luks``, it requests that the qcow2 payload (not 68 qcow2 header) be encrypted using the LUKS format. The passphrase to 69 use to unlock the LUKS key slot is given by the ``encrypt.key-secret`` 70 parameter. LUKS encryption parameters can be tuned with the other 91 and interoperability with old versions of QEMU. The ``luks`` format 97 (``encrypt.format=luks``) or encryption key (``encrypt.format=aes``). 102 to ``aes-256``. Only used when ``encrypt.format=luks``. 107 Only used when ``encrypt.format=luks``. 112 to ``plain64``. Only used when ``encrypt.format=luks``. 117 (if required). Defaults to ``sha256``. Only used when ``encrypt.format=luks``. [all …]
|
| /openbmc/estoraged/src/ |
| H A D | estoraged.cpp | 289 * Check if the mapped virtual device exists. If it exists, the LUKS volume in isLocked() 330 /* Format the LUKS encrypted device. */ in formatLuksDev() 367 lg2::error("Failed to load LUKS header: {RETVAL}", "RETVAL", retval, in loadLuksHeader() 390 lg2::info("Activating LUKS dev {DEV}", "DEV", devPath, "REDFISH_MESSAGE_ID", in activateLuksDev() 402 lg2::error("Failed to activate LUKS dev: {RETVAL}", "RETVAL", retval, in activateLuksDev() 408 lg2::info("Successfully activated LUKS dev {DEV}", "DEV", devPath, in activateLuksDev() 501 lg2::info("Deactivating LUKS device {DEV}", "DEV", devPath, in deactivateLuksDev() 514 lg2::info("Successfully deactivated LUKS device {DEV}", "DEV", devPath, in deactivateLuksDev()
|