Files
OpenCellular/autotest/firmware_VbootCrypto/control
Zdenek Behan b3e07ca793 vboot_reference: add in the VbootCrypto tests into vboot_reference git repo
Change-Id: I7a46dc2ea475c72703ff5bc1f88fbb021cb24c92

Review URL: http://codereview.chromium.org/3143029
2010-09-07 12:53:17 -07:00

43 lines
1.4 KiB
Plaintext

# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
AUTHOR = "ChromeOS Team"
NAME = "firmware_VbootCrypto"
PURPOSE = """
Verifies Firmware Verified Boot Reference Implementation, its components, and
crypto performance.
"""
CRITERIA = """
This test is a benchmark.
Errors in any of the following tests will cause a failure:
- _sha_test()
- _rsa_test()
- _image_verification_test()
- _rollback_tests()
- _splicing_tests()
"""
TIME = "LONG"
TEST_CATEGORY = "Functional"
TEST_CLASS = "firmware"
TEST_TYPE = "client"
DOC = """
This test implements various RSA and SHA by creating and verifying various
keys and hashes. It will generate public key signatures using sha1, sha256,
and sha512 algorithms with key lengths of 1024, 2048, 4096, and 8192. RSA
padding tests will then be run to verify them. Tests are also run to verify
the correctness of firmware and kernel image verification.
"""
test_suites = [
'crypto', # RSA Signature Verification and SHA* Correctness.
'verification', # Firmware and Kernel Image Verification.
'benchmarks', # Crypto and Image Verification benchmarks.
'rollback', # Firmware/Kernel Rollback Prevention.
'splicing', # Image Splicing Attack.
]
for suite in test_suites:
job.run_test('firmware_VbootCrypto', suite=suite, tag=suite)