tdocumentation and test improvements - tomb - the crypto undertaker HTML git clone git://parazyd.org/tomb.git DIR Log DIR Files DIR Refs DIR README DIR LICENSE --- DIR commit f3c18819d24976213554625be822ac1ccab2ae05 DIR parent 551a7839f500a9ba4b26cd63774019d91615cb16 HTML Author: Jaromil <jaromil@dyne.org> Date: Thu, 20 Jun 2013 10:26:12 +0200 documentation and test improvements also renamed 'backup' command into 'engrave' Diffstat: M extras/test/runtests | 11 ++++++----- M tomb | 52 ++++++++++++++++++------------- 2 files changed, 37 insertions(+), 26 deletions(-) --- DIR diff --git a/extras/test/runtests b/extras/test/runtests t@@ -11,7 +11,7 @@ error() { _warning " ${@}"; } tt() { start_loops=(`sudo losetup -a |cut -d: -f1`) start_temps=(`find /dev/shm -name 'tomb*'`) - ${T} ${=@} + ${T} -D ${=@} res=$? loops=(`sudo losetup -a |cut -d: -f1`) temps=(`find /dev/shm -name 'tomb*'`) t@@ -47,16 +47,20 @@ startloops=(`sudo losetup -a |cut -d: -f1`) -notice "Testing creation" +notice "Testing creation: dig" tt dig -s 20 /tmp/test.tomb { test $? = 0 } && { results+=(dig SUCCESS) } +notice "Testing creation: forge" + tt --ignore-swap --unsecure-dev-mode --tomb-pwd ${dummypass} --use-urandom forge /tmp/test.tomb.key { test $? = 0 } && { results+=(forge SUCCESS) } +notice "Testing creation: lock" + tt --ignore-swap --unsecure-dev-mode --tomb-pwd ${dummypass} lock /tmp/test.tomb -k /tmp/test.tomb.key { test $? = 0 } && { results+=(lock SUCCESS) } t@@ -126,9 +130,6 @@ if [ "$rnd" = "$rnd2" ]; then else error "Bind hook on file reports incongruence" fi -sudo umount $HOME/test-$rnd -rm /media/test.tomb/bind-hooks -rm /media/test.tomb/test-$rnd tt close test DIR diff --git a/tomb b/tomb t@@ -254,43 +254,43 @@ is_valid_tomb() { usage() { cat <<EOF -Syntax: tomb [options] command [file] [place] +Syntax: tomb [options] command [arguments] Commands: + // Creation: dig create a new empty TOMB file of --size in MB forge create a new KEY file and set its password lock installs a lock on a TOMB to use it with KEY + // Operations on tombs: open open an existing TOMB - index update the search indexes of tombs search looks for filenames matching text patterns - - list list open TOMBs - - close close a TOMB (or all) + list list of open TOMBs and information on them + close close a specific TOMB (or 'all') slam slam a TOMB killing all programs using it + // Operations on keys: passwd change the password of a KEY change change the KEY locking a TOMB (needs old one) EOF + if [ "$RESIZER" = 1 ]; then + cat <<EOF + resize resize a TOMB to a new --size (can only grow) +EOF + fi { test "$QRENCODE" = "1" } && { cat <<EOF - backup makes a QR code of a KEY to be saved on paper + engrave makes a QR code of a KEY to be saved on paper EOF } - if [ "$RESIZER" = 1 ]; then - cat <<EOF - resize resize a TOMB to a new --size (can only grow) -EOF - fi if [ "$STEGHIDE" = 1 ]; then cat <<EOF - bury hide a KEY inside a JPEG image - exhume extract a KEY from a JPEG image + bury hide a KEY inside a JPEG image + exhume extract a KEY from a JPEG image EOF fi cat <<EOF t@@ -305,7 +305,7 @@ Options: EOF { test "$KDF" = 1 } && { cat <<EOF - --kdf seconds generate passwords against dictionary attacks + --kdf generate passwords armored against dictionary attacks EOF } t@@ -773,6 +773,7 @@ gen_key() { # KDF is a new key strenghtening technique against brute forcing # see: https://github.com/dyne/Tomb/issues/82 itertime="`option_value --kdf`" + { test "$itertime" = "" } && { itertime=".5" } _verbose "KDF itertime chosen: $itertime" # --kdf takes one parameter: iter time (on present machine) in seconds local -i microseconds t@@ -901,7 +902,7 @@ exhume_key() { # Produces a printable image of the key contents so that it can be # backuped on paper and hidden in books etc. -backup_key() { +engrave_key() { # load key from options tombkey="`load_key $1`" { test $? = 0 } || { die "No key specified." } t@@ -2102,7 +2103,7 @@ main() { subcommands_opts[dig]="f -force -ignore-swap s: -size=s " subcommands_opts[lock]="f -force -ignore-swap k: -key=k o: -sudo-pwd: -tomb-pwd: " subcommands_opts[change]="f -force -ignore-swap k: -key=k -sudo-pwd: -tomb-pwd: " - subcommands_opts[backup]="k: -key=k " + subcommands_opts[engrave]="k: -key=k " subcommands_opts[passwd]="f -ignore-swap -kdf: -tomb-old-pwd: -tomb-pwd: " subcommands_opts[close]="-sudo-pwd: " t@@ -2234,10 +2235,10 @@ main() { change_tomb_key ${=PARAM} ;; - backup) + engrave) { test "$QRENCODE" = 0 } && { - die "QREncode not installed: cannot backup keys on paper." } - backup_key ${=PARAM} + die "QREncode not installed: cannot engrave keys on paper." } + engrave_key ${=PARAM} ;; # backward compat t@@ -2306,8 +2307,17 @@ Tomb $VERSION - a strong and gentle undertaker for your secrets EOF option_is_set -v && { cat <<EOF + This source code is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + Please refer to the GNU Public License for more details. + +System utils: -Key forging algorithms (GnuPG symmetric ciphers): + `sudo -V | head -n1` + `cryptsetup --version` + `pinentry --version` + `gpg --version | head -n1` - key forging algorithms (GnuPG symmetric ciphers): `list_gnupg_ciphers` EOF return 0