diff options
author | Betty Lin <betty.lin@canonical.com> | 2020-03-10 15:37:48 +0800 |
---|---|---|
committer | Betty Lin <betty.lin@canonical.com> | 2020-03-17 13:49:23 +0800 |
commit | 40008b556169845ccca77f013d02d10ff1883af2 (patch) | |
tree | 486c480e9361f1996eb18e36c43442e6c78a2794 /units/disk | |
parent | d7729cb27dc869cc5ba1026872d533ed2d300477 (diff) |
modify check-fde-tpm
Since every project has its own method to clean TPM, list them in test case for QA engineer to choose.
Diffstat (limited to 'units/disk')
-rw-r--r-- | units/disk/encryption.pxu | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/units/disk/encryption.pxu b/units/disk/encryption.pxu index b805a37e..d4c5df8c 100644 --- a/units/disk/encryption.pxu +++ b/units/disk/encryption.pxu @@ -37,12 +37,14 @@ _purpose: BIOS), the device won't be able to get the master key and decrypt its data partition. _steps: + NOTE!!!! YOU'LL HAVE TO RE-INSTALL THE IMAGE AFTER THIS TEST 1. Install the image and make sure it boots and you can log in. - 2. Turn the device off and upgrade/downgrade the BIOS or modify Secure Boot state - 3. Make sure the BIOS is set up properly (e.g. TPM enabled, UEFI boot mode) - 4. Start the device + 2. Make sure the BIOS is set up properly (e.g. TPM enabled, UEFI boot mode) + 3. Based on your project's situation, choose one of the following methods to clean TPM: + a. Turn the device off and upgrade/downgrade the BIOS or modify Secure Boot state + b. Clean TPM via BIOS menu + c. Install checkbox, execute "checkbox-[project name].checkbox-cli run com.canonical.certification::tpm2.0_3.0.4/tpm2_takeownership" + 4. Start or reboot the device _verification: Mark this test as "Passed" if the device cannot boot anymore. - Note: You must flash the BIOS back to the latest version, re-enable Secure Boot - and re-install the image afterwards. |