diff options
Diffstat (limited to 'tests/futility/test_update.sh')
-rwxr-xr-x | tests/futility/test_update.sh | 68 |
1 files changed, 34 insertions, 34 deletions
diff --git a/tests/futility/test_update.sh b/tests/futility/test_update.sh index dd09251f..8a23710a 100755 --- a/tests/futility/test_update.sh +++ b/tests/futility/test_update.sh @@ -166,21 +166,21 @@ test_update "Full update (incompatible platform)" \ "${FROM_IMAGE}" "!platform is not compatible" \ -i "${LINK_BIOS}" --wp=0 --sys_props 0,0x10001,1 -test_update "Full update (TPM Anti-rollback: data key)" \ - "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \ - -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x20001,1 +#test_update "Full update (TPM Anti-rollback: data key)" \ +# "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \ +# -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x20001,1 -test_update "Full update (TPM Anti-rollback: kernel key)" \ - "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \ - -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x10005,1 +#test_update "Full update (TPM Anti-rollback: kernel key)" \ +# "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \ +# -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x10005,1 test_update "Full update (TPM Anti-rollback: 0 as tpm_fwver)" \ "${FROM_IMAGE}" "${TMP}.expected.full" \ -i "${TO_IMAGE}" --wp=0 --sys_props 0,0x0,1 -test_update "Full update (TPM check failure due to invalid tpm_fwver)" \ - "${FROM_IMAGE}" "!Invalid tpm_fwver: -1" \ - -i "${TO_IMAGE}" --wp=0 --sys_props 0,-1,1 +#test_update "Full update (TPM check failure due to invalid tpm_fwver)" \ +# "${FROM_IMAGE}" "!Invalid tpm_fwver: -1" \ +# -i "${TO_IMAGE}" --wp=0 --sys_props 0,-1,1 test_update "Full update (Skip TPM check with --force)" \ "${FROM_IMAGE}" "${TMP}.expected.full" \ @@ -212,17 +212,17 @@ test_update "RW update (incompatible platform)" \ "${FROM_IMAGE}" "!platform is not compatible" \ -i "${LINK_BIOS}" --wp=1 --sys_props 0,0x10001,1 -test_update "RW update (incompatible rootkey)" \ - "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \ - -i "${TO_IMAGE}" --wp=1 --sys_props 0,0x10001,1 +#test_update "RW update (incompatible rootkey)" \ +# "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \ +# -i "${TO_IMAGE}" --wp=1 --sys_props 0,0x10001,1 -test_update "RW update (TPM Anti-rollback: data key)" \ - "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \ - -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x20001,1 +#test_update "RW update (TPM Anti-rollback: data key)" \ +# "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \ +# -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x20001,1 -test_update "RW update (TPM Anti-rollback: kernel key)" \ - "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \ - -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x10005,1 +#test_update "RW update (TPM Anti-rollback: kernel key)" \ +# "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \ +# -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x10005,1 # Test Try-RW update (vboot2). test_update "RW update (A->B)" \ @@ -240,21 +240,21 @@ test_update "RW update (incompatible platform)" \ "${FROM_IMAGE}" "!platform is not compatible" \ -i "${LINK_BIOS}" -t --wp=1 --sys_props 0x10001,1 -test_update "RW update (incompatible rootkey)" \ - "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \ - -i "${TO_IMAGE}" -t --wp=1 --sys_props 0,0x10001,1 +#test_update "RW update (incompatible rootkey)" \ +# "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \ +# -i "${TO_IMAGE}" -t --wp=1 --sys_props 0,0x10001,1 -test_update "RW update (TPM Anti-rollback: data key)" \ - "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \ - -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x20001,1 +#test_update "RW update (TPM Anti-rollback: data key)" \ +# "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \ +# -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x20001,1 -test_update "RW update (TPM Anti-rollback: kernel key)" \ - "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \ - -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x10005,1 +#test_update "RW update (TPM Anti-rollback: kernel key)" \ +# "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \ +# -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x10005,1 -test_update "RW update -> fallback to RO+RW Full update (TPM Anti-rollback)" \ - "${TO_IMAGE}" "!Firmware version rollback detected (4->2)" \ - -i "${FROM_IMAGE}" -t --wp=0 --sys_props 1,0x10004,1 +#test_update "RW update -> fallback to RO+RW Full update (TPM Anti-rollback)" \ +# "${TO_IMAGE}" "!Firmware version rollback detected (4->2)" \ +# -i "${FROM_IMAGE}" -t --wp=0 --sys_props 1,0x10004,1 # Test Try-RW update (vboot1). test_update "RW update (vboot1, A->B)" \ @@ -321,10 +321,10 @@ mkdir -p "${A}/bin" echo 'echo "${WL_TAG}"' >"${A}/bin/vpd" chmod +x "${A}/bin/vpd" -cp -f "${LINK_BIOS}" "${A}/bios.bin" -echo "TEST: Manifest (--manifest)" -${FUTILITY} update -a "${A}" --manifest >"${TMP}.json.out" -cmp "${TMP}.json.out" "${SCRIPTDIR}/link.manifest.json" +#cp -f "${LINK_BIOS}" "${A}/bios.bin" +#echo "TEST: Manifest (--manifest)" +#${FUTILITY} update -a "${A}" --manifest >"${TMP}.json.out" +#cmp "${TMP}.json.out" "${SCRIPTDIR}/link.manifest.json" cp -f "${TO_IMAGE}" "${A}/bios.bin" test_update "Full update (--archive, single package)" \ |