summaryrefslogtreecommitdiff
path: root/units/disk
diff options
authorBetty Lin <betty.lin@canonical.com>2020-03-10 15:37:48 +0800
committerBetty Lin <betty.lin@canonical.com>2020-03-17 13:49:23 +0800
commit40008b556169845ccca77f013d02d10ff1883af2 (patch)
tree486c480e9361f1996eb18e36c43442e6c78a2794 /units/disk
parentd7729cb27dc869cc5ba1026872d533ed2d300477 (diff)
modify check-fde-tpm
Since every project has its own method to clean TPM, list them in test case for QA engineer to choose.
Diffstat (limited to 'units/disk')
-rw-r--r--units/disk/encryption.pxu12
1 files changed, 7 insertions, 5 deletions
diff --git a/units/disk/encryption.pxu b/units/disk/encryption.pxu
index b805a37e..d4c5df8c 100644
--- a/units/disk/encryption.pxu
+++ b/units/disk/encryption.pxu
@@ -37,12 +37,14 @@ _purpose:
BIOS), the device won't be able to get the master key and decrypt its data
partition.
_steps:
+ NOTE!!!! YOU'LL HAVE TO RE-INSTALL THE IMAGE AFTER THIS TEST
1. Install the image and make sure it boots and you can log in.
- 2. Turn the device off and upgrade/downgrade the BIOS or modify Secure Boot state
- 3. Make sure the BIOS is set up properly (e.g. TPM enabled, UEFI boot mode)
- 4. Start the device
+ 2. Make sure the BIOS is set up properly (e.g. TPM enabled, UEFI boot mode)
+ 3. Based on your project's situation, choose one of the following methods to clean TPM:
+ a. Turn the device off and upgrade/downgrade the BIOS or modify Secure Boot state
+ b. Clean TPM via BIOS menu
+ c. Install checkbox, execute "checkbox-[project name].checkbox-cli run com.canonical.certification::tpm2.0_3.0.4/tpm2_takeownership"
+ 4. Start or reboot the device
_verification:
Mark this test as "Passed" if the device cannot boot anymore.
- Note: You must flash the BIOS back to the latest version, re-enable Secure Boot
- and re-install the image afterwards.