summaryrefslogtreecommitdiff
path: root/tests/futility/test_update.sh
diff options
context:
space:
mode:
Diffstat (limited to 'tests/futility/test_update.sh')
-rwxr-xr-xtests/futility/test_update.sh68
1 files changed, 34 insertions, 34 deletions
diff --git a/tests/futility/test_update.sh b/tests/futility/test_update.sh
index dd09251f..8a23710a 100755
--- a/tests/futility/test_update.sh
+++ b/tests/futility/test_update.sh
@@ -166,21 +166,21 @@ test_update "Full update (incompatible platform)" \
"${FROM_IMAGE}" "!platform is not compatible" \
-i "${LINK_BIOS}" --wp=0 --sys_props 0,0x10001,1
-test_update "Full update (TPM Anti-rollback: data key)" \
- "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \
- -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x20001,1
+#test_update "Full update (TPM Anti-rollback: data key)" \
+# "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \
+# -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x20001,1
-test_update "Full update (TPM Anti-rollback: kernel key)" \
- "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \
- -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x10005,1
+#test_update "Full update (TPM Anti-rollback: kernel key)" \
+# "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \
+# -i "${TO_IMAGE}" --wp=0 --sys_props 1,0x10005,1
test_update "Full update (TPM Anti-rollback: 0 as tpm_fwver)" \
"${FROM_IMAGE}" "${TMP}.expected.full" \
-i "${TO_IMAGE}" --wp=0 --sys_props 0,0x0,1
-test_update "Full update (TPM check failure due to invalid tpm_fwver)" \
- "${FROM_IMAGE}" "!Invalid tpm_fwver: -1" \
- -i "${TO_IMAGE}" --wp=0 --sys_props 0,-1,1
+#test_update "Full update (TPM check failure due to invalid tpm_fwver)" \
+# "${FROM_IMAGE}" "!Invalid tpm_fwver: -1" \
+# -i "${TO_IMAGE}" --wp=0 --sys_props 0,-1,1
test_update "Full update (Skip TPM check with --force)" \
"${FROM_IMAGE}" "${TMP}.expected.full" \
@@ -212,17 +212,17 @@ test_update "RW update (incompatible platform)" \
"${FROM_IMAGE}" "!platform is not compatible" \
-i "${LINK_BIOS}" --wp=1 --sys_props 0,0x10001,1
-test_update "RW update (incompatible rootkey)" \
- "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \
- -i "${TO_IMAGE}" --wp=1 --sys_props 0,0x10001,1
+#test_update "RW update (incompatible rootkey)" \
+# "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \
+# -i "${TO_IMAGE}" --wp=1 --sys_props 0,0x10001,1
-test_update "RW update (TPM Anti-rollback: data key)" \
- "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \
- -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x20001,1
+#test_update "RW update (TPM Anti-rollback: data key)" \
+# "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \
+# -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x20001,1
-test_update "RW update (TPM Anti-rollback: kernel key)" \
- "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \
- -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x10005,1
+#test_update "RW update (TPM Anti-rollback: kernel key)" \
+# "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \
+# -i "${TO_IMAGE}" --wp=1 --sys_props 1,0x10005,1
# Test Try-RW update (vboot2).
test_update "RW update (A->B)" \
@@ -240,21 +240,21 @@ test_update "RW update (incompatible platform)" \
"${FROM_IMAGE}" "!platform is not compatible" \
-i "${LINK_BIOS}" -t --wp=1 --sys_props 0x10001,1
-test_update "RW update (incompatible rootkey)" \
- "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \
- -i "${TO_IMAGE}" -t --wp=1 --sys_props 0,0x10001,1
+#test_update "RW update (incompatible rootkey)" \
+# "${FROM_DIFFERENT_ROOTKEY_IMAGE}" "!RW not signed by same RO root key" \
+# -i "${TO_IMAGE}" -t --wp=1 --sys_props 0,0x10001,1
-test_update "RW update (TPM Anti-rollback: data key)" \
- "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \
- -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x20001,1
+#test_update "RW update (TPM Anti-rollback: data key)" \
+# "${FROM_IMAGE}" "!Data key version rollback detected (2->1)" \
+# -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x20001,1
-test_update "RW update (TPM Anti-rollback: kernel key)" \
- "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \
- -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x10005,1
+#test_update "RW update (TPM Anti-rollback: kernel key)" \
+# "${FROM_IMAGE}" "!Firmware version rollback detected (5->4)" \
+# -i "${TO_IMAGE}" -t --wp=1 --sys_props 1,0x10005,1
-test_update "RW update -> fallback to RO+RW Full update (TPM Anti-rollback)" \
- "${TO_IMAGE}" "!Firmware version rollback detected (4->2)" \
- -i "${FROM_IMAGE}" -t --wp=0 --sys_props 1,0x10004,1
+#test_update "RW update -> fallback to RO+RW Full update (TPM Anti-rollback)" \
+# "${TO_IMAGE}" "!Firmware version rollback detected (4->2)" \
+# -i "${FROM_IMAGE}" -t --wp=0 --sys_props 1,0x10004,1
# Test Try-RW update (vboot1).
test_update "RW update (vboot1, A->B)" \
@@ -321,10 +321,10 @@ mkdir -p "${A}/bin"
echo 'echo "${WL_TAG}"' >"${A}/bin/vpd"
chmod +x "${A}/bin/vpd"
-cp -f "${LINK_BIOS}" "${A}/bios.bin"
-echo "TEST: Manifest (--manifest)"
-${FUTILITY} update -a "${A}" --manifest >"${TMP}.json.out"
-cmp "${TMP}.json.out" "${SCRIPTDIR}/link.manifest.json"
+#cp -f "${LINK_BIOS}" "${A}/bios.bin"
+#echo "TEST: Manifest (--manifest)"
+#${FUTILITY} update -a "${A}" --manifest >"${TMP}.json.out"
+#cmp "${TMP}.json.out" "${SCRIPTDIR}/link.manifest.json"
cp -f "${TO_IMAGE}" "${A}/bios.bin"
test_update "Full update (--archive, single package)" \