forked from ladar/sedutil
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathTestSuite.sh
executable file
·63 lines (61 loc) · 2.8 KB
/
TestSuite.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
#!/bin/bash
if [ -$1- = -- ] ; then echo device not specified; exit; fi
echo Drive $1 needs to be in a Inactive state
echo if you haven\'t already done so please do a revertnoerase/reverttper or
echo PSID revert on $1
echo -
echo Continuing with this test suite WILL ERASE ALL DATA ON $1
echo If you dont want that to happen hit Ctrl-C now.
echo press enter to continue or Ctrl-c to abort
read INOUT
echo Last chance to hit Ctrl-c an keep the data on your drive
read INPUT
## test sedutil commands
##PROG=./CLI/dist/Release_i686/GNU-Linux/sedutil-cli
PROG=./CLI/dist/Release_x86_64/GNU-Linux/sedutil-cli
##PROG=./sedutil-cli
##PROG=echo
LOGFILE=sedutil_baseline
OUTPUTSINK=">> ${LOGFILE} 2>&1"
echo testing ${PROG} `date` > ${LOGFILE}
##
echo Begin TestSuite >> ${LOGFILE}
uname -a >> ${LOGFILE}
echo testing sedutil `date` | tee -a ${LOGFILE}
${PROG} --help | grep -a Copyright >> ${LOGFILE} 2>&1
${PROG} --scan >> ${LOGFILE} 2>&1
echo Perform the initial setup | tee -a ${LOGFILE}
${PROG} --initialsetup passw0rd $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo change the LSP Admin1 password | tee -a ${LOGFILE}
${PROG} --setAdmin1Pwd passw0rd password $1 >> ${LOGFILE} 2>&1
${PROG} --enableLockingRange 0 password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo test readlocking | tee -a ${LOGFILE}
${PROG} --setLockingRange 0 RO password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo test write locking | tee -a ${LOGFILE}
${PROG} --setLockingRange 0 RW password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo set LockingRange 0 LK | tee -a ${LOGFILE}
${PROG} --setLockingRange 0 lk password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo disable locking on the global range | tee -a ${LOGFILE}
${PROG} --disableLockingRange 0 password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo unset MBRDone | tee -a ${LOGFILE}
${PROG} --setMBRDone OFF password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo disable mbr shadowing | tee -a ${LOGFILE}
${PROG} --setMBREnable off password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
echo resetting device | tee -a ${LOGFILE}
${PROG} --revertnoerase password $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
${PROG} --reverttper passw0rd $1 >> ${LOGFILE} 2>&1
${PROG} --query $1 | grep -a MediaEncrypt >> ${LOGFILE} 2>&1
${PROG} --validatePBKDF2 >> ${LOGFILE} 2>&1
echo Thanks for running the test suite
echo please e-mail ${LOGFILE} to [email protected]
echo along with the OS, OS level and type of drive you have
exit