Index: autotest/firmware_VbootCrypto/control |
diff --git a/autotest/firmware_VbootCrypto/control b/autotest/firmware_VbootCrypto/control |
new file mode 100644 |
index 0000000000000000000000000000000000000000..6542ea8b70cc07b23e0fb5c0d65019300044b075 |
--- /dev/null |
+++ b/autotest/firmware_VbootCrypto/control |
@@ -0,0 +1,42 @@ |
+# Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
+# Use of this source code is governed by a BSD-style license that can be |
+# found in the LICENSE file. |
+ |
+AUTHOR = "ChromeOS Team" |
+NAME = "firmware_VbootCrypto" |
+PURPOSE = """ |
+Verifies Firmware Verified Boot Reference Implementation, its components, and |
+crypto performance. |
+""" |
+CRITERIA = """ |
+This test is a benchmark. |
+ |
+Errors in any of the following tests will cause a failure: |
+ - _sha_test() |
+ - _rsa_test() |
+ - _image_verification_test() |
+ - _rollback_tests() |
+ - _splicing_tests() |
+""" |
+TIME = "LONG" |
+TEST_CATEGORY = "Functional" |
+TEST_CLASS = "firmware" |
+TEST_TYPE = "client" |
+ |
+DOC = """ |
+This test implements various RSA and SHA by creating and verifying various |
+keys and hashes. It will generate public key signatures using sha1, sha256, |
+and sha512 algorithms with key lengths of 1024, 2048, 4096, and 8192. RSA |
+padding tests will then be run to verify them. Tests are also run to verify |
+the correctness of firmware and kernel image verification. |
+""" |
+ |
+test_suites = [ |
+ 'crypto', # RSA Signature Verification and SHA* Correctness. |
+ 'verification', # Firmware and Kernel Image Verification. |
+ 'benchmarks', # Crypto and Image Verification benchmarks. |
+ 'rollback', # Firmware/Kernel Rollback Prevention. |
+ 'splicing', # Image Splicing Attack. |
+] |
+for suite in test_suites: |
+ job.run_test('firmware_VbootCrypto', suite=suite, tag=suite) |