11d80bfc6d
This commit adds two tests, which test the new amend interface of both luks raw images and qcow2 luks encrypted images. Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> [mreitz: Let 293 verify that LUKS works; drop $(seq) usage from 293; drop 293 and 294 from the auto group] Signed-off-by: Max Reitz <mreitz@redhat.com> Message-Id: <20200625125548.870061-16-mreitz@redhat.com>
31 lines
806 B
Plaintext
31 lines
806 B
Plaintext
QA output created by 294
|
|
== creating a test image ==
|
|
Formatting 'TEST_DIR/t.IMGFMT', fmt=IMGFMT size=33554432
|
|
|
|
== test that key 0 opens the image ==
|
|
read 4096/4096 bytes at offset 0
|
|
4 KiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
|
|
|
|
== adding a password to slot 1 ==
|
|
|
|
== 'backup' the image header ==
|
|
1+0 records in
|
|
1+0 records out
|
|
|
|
== erase slot 0 ==
|
|
|
|
== test that key 0 doesn't open the image ==
|
|
qemu-io: can't open: Invalid password, cannot unlock any keyslot
|
|
|
|
== 'restore' the image header ==
|
|
1+0 records in
|
|
1+0 records out
|
|
|
|
== test that key 0 still doesn't open the image (key material is erased) ==
|
|
qemu-io: can't open: Invalid password, cannot unlock any keyslot
|
|
|
|
== test that key 1 still works ==
|
|
read 4096/4096 bytes at offset 0
|
|
4 KiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
|
|
*** done
|