Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(528)

Side by Side Diff: src/platform/vboot_reference/tests/run_image_verification_tests.sh

Issue 1530009: Make image verification test script call big_{firmware|kernel} tests. (Closed)
Patch Set: Created 10 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 #!/bin/bash 1 #!/bin/bash
2 2
3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
4 # Use of this source code is governed by a BSD-style license that can be 4 # Use of this source code is governed by a BSD-style license that can be
5 # found in the LICENSE file. 5 # found in the LICENSE file.
6 6
7 # Run verified boot firmware and kernel verification tests. 7 # Run verified boot firmware and kernel verification tests.
8 8
9 # Load common constants and variables. 9 # Load common constants and variables.
10 . "$(dirname "$0")/common.sh" 10 . "$(dirname "$0")/common.sh"
11 11
12 return_code=0 12 return_code=0
13 13
14 function test_firmware_verification { 14 function test_firmware_verification {
15 algorithmcounter=0 15 algorithmcounter=0
16 for keylen in ${key_lengths[@]} 16 for keylen in ${key_lengths[@]}
17 do 17 do
18 for hashalgo in ${hash_algos[@]} 18 for hashalgo in ${hash_algos[@]}
19 do 19 do
20 echo -e "For Root key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:" 20 echo -e "For Root key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:"
21 cd ${UTIL_DIR} && ${TEST_DIR}/firmware_image_tests $algorithmcounter \ 21 ${TEST_DIR}/firmware_image_tests $algorithmcounter \
22 ${TESTKEY_DIR}/key_rsa8192.pem \ 22 ${TESTKEY_DIR}/key_rsa8192.pem \
23 ${TESTKEY_DIR}/key_rsa8192.keyb \ 23 ${TESTKEY_DIR}/key_rsa8192.keyb \
24 ${TESTKEY_DIR}/key_rsa${keylen}.pem \ 24 ${TESTKEY_DIR}/key_rsa${keylen}.pem \
25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb
26 if [ $? -ne 0 ] 26 if [ $? -ne 0 ]
27 then 27 then
28 return_code=255 28 return_code=255
29 fi 29 fi
30 let algorithmcounter=algorithmcounter+1 30 let algorithmcounter=algorithmcounter+1
31 done 31 done
32 done 32 done
33 cd ${TEST_DIR} && ${TEST_DIR}/big_firmware_tests
petkov 2010/03/30 22:40:06 Another way to write this might be: cd ${TEST_DIR
34 if [ $? -ne 0 ]
35 then
36 return_code=255
37 fi
33 } 38 }
34 39
35 function test_kernel_verification { 40 function test_kernel_verification {
36 # Test for various combinations of firmware signing algorithm and 41 # Test for various combinations of firmware signing algorithm and
37 # kernel signing algorithm 42 # kernel signing algorithm
38 firmware_algorithmcounter=0 43 firmware_algorithmcounter=0
39 kernel_algorithmcounter=0 44 kernel_algorithmcounter=0
40 for firmware_keylen in ${key_lengths[@]} 45 for firmware_keylen in ${key_lengths[@]}
41 do 46 do
42 for firmware_hashalgo in ${hash_algos[@]} 47 for firmware_hashalgo in ${hash_algos[@]}
43 do 48 do
44 let kernel_algorithmcounter=0 49 let kernel_algorithmcounter=0
45 for kernel_keylen in ${key_lengths[@]} 50 for kernel_keylen in ${key_lengths[@]}
46 do 51 do
47 for kernel_hashalgo in ${hash_algos[@]} 52 for kernel_hashalgo in ${hash_algos[@]}
48 do 53 do
49 echo -e "For ${COL_YELLOW}Firmware signing algorithm \ 54 echo -e "For ${COL_YELLOW}Firmware signing algorithm \
50 RSA-${firmware_keylen}/${firmware_hashalgo}${COL_STOP} \ 55 RSA-${firmware_keylen}/${firmware_hashalgo}${COL_STOP} \
51 and ${COL_YELLOW}Kernel signing algorithm RSA-${kernel_keylen}/\ 56 and ${COL_YELLOW}Kernel signing algorithm RSA-${kernel_keylen}/\
52 ${kernel_hashalgo}${COL_STOP}" 57 ${kernel_hashalgo}${COL_STOP}"
53 cd ${UTIL_DIR} && ${TEST_DIR}/kernel_image_tests \ 58 ${TEST_DIR}/kernel_image_tests \
54 $firmware_algorithmcounter $kernel_algorithmcounter \ 59 $firmware_algorithmcounter $kernel_algorithmcounter \
55 ${TESTKEY_DIR}/key_rsa${firmware_keylen}.pem \ 60 ${TESTKEY_DIR}/key_rsa${firmware_keylen}.pem \
56 ${TESTKEY_DIR}/key_rsa${firmware_keylen}.keyb \ 61 ${TESTKEY_DIR}/key_rsa${firmware_keylen}.keyb \
57 ${TESTKEY_DIR}/key_rsa${kernel_keylen}.pem \ 62 ${TESTKEY_DIR}/key_rsa${kernel_keylen}.pem \
58 ${TESTKEY_DIR}/key_rsa${kernel_keylen}.keyb 63 ${TESTKEY_DIR}/key_rsa${kernel_keylen}.keyb
59 if [ $? -ne 0 ] 64 if [ $? -ne 0 ]
60 then 65 then
61 return_code=255 66 return_code=255
62 fi 67 fi
63 let kernel_algorithmcounter=kernel_algorithmcounter+1 68 let kernel_algorithmcounter=kernel_algorithmcounter+1
64 done 69 done
65 done 70 done
66 let firmware_algorithmcounter=firmware_algorithmcounter+1 71 let firmware_algorithmcounter=firmware_algorithmcounter+1
67 done 72 done
68 done 73 done
74 cd ${TEST_DIR} && ${TEST_DIR}/big_kernel_tests
75 if [ $? -ne 0 ]
76 then
77 return_code=255
78 fi
69 } 79 }
70 80
71 check_test_keys 81 check_test_keys
72 echo 82 echo
73 echo "Testing high-level firmware image verification..." 83 echo "Testing high-level firmware image verification..."
74 test_firmware_verification 84 test_firmware_verification
75 85
76 echo 86 echo
77 echo "Testing high-level kernel image verification..." 87 echo "Testing high-level kernel image verification..."
78 test_kernel_verification 88 test_kernel_verification
79 89
80 exit $return_code 90 exit $return_code
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698