我要评分
获取效率
正确性
完整性
易理解

Test Result List

Test Type

Case No.

Case Name

Test Result

(PASS/FAIL/NT)

Security Feature Tests

4.1.1

TEE OS Upgrade in the iBMC

pass

4.1.2

Rollback Prevention in the iBMC

pass

4.1.3

BIOS TEE Enabling and Disabling

pass

4.1.4

Secure Memory Configuration of the BIOS

pass

4.1.5

TA Binary Confidentiality and Completeness

pass

4.1.6

CA and TA Authentication

pass

4.1.7

TA Lifecycle

pass

4.1.8

Data Isolation of the Trusted Storage Function in the Secure OS

pass

4.1.9

teecd Authentication

pass

4.1.10

tlogcat Log

pass

4.1.11

Upgrading to the Confidential OS on the TaiShan 200 Server (Model 2280, VD)

pass

4.1.12

Upgrading to the Confidential OS on the TaiShan 200 Pro Server (Model 2480 with 16 MB Flash)

pass

4.1.13

Upgrading to the Confidential OS on the TaiShan 200 Server (Model 2280, VF)

pass

Basic Function Tests of the Secure OS

4.2.1

Random Number Generation

pass

4.2.2

Encryption and Decryption Key Generation

pass

4.2.3

RSA and SM2 Encryption, Decryption and Signature

pass

4.2.4

AES and SM4 Symmetric Encryption and Decryption

pass

4.2.5

SH256 and SM3 Hash Algorithms

pass

4.2.6

HUK Key

pass

4.2.7

Trusted Storage

pass

4.2.8

Multi-core Concurrency in the Secure OS

pass

4.2.9-1

Parameter Transfer of the Shared Memory in the Secure OS

pass

4.2.9-2

Parameter Transfer of the Zero-Copy Shared Memory in the Secure OS

pass

4.2.10

Basic Python Functions in the Confidential OS

NT

4.2.11

Basic Java Functions in the Confidential OS

NT

4.2.12

Memory Space of 32 Mailboxes in the OS with 64 KB Pages

pass

4.2.13

Access from a CA to a TA in a Container

pass

4.2.14

Inter-TA Access in a Container

pass

4.2.15

Basic Java Functions in a Container

NT

4.2.16

Basic Python Functions in a Container

NT

4.2.17

Basic Rust Functions in the Confidential OS

pass

4.2.18

Basic Rust Functions in a Container

pass

Performance Tests

4.3.1

Random Number Generation in the Secure OS

  

4.3.2

Encryption and Decryption Key Generation in the Secure OS

  

4.3.3

Asymmetric Key Encryption and Decryption in the Secure OS

  

4.3.4

Asymmetric Signature and Signature Verification in the Secure OS

  

4.3.5

Symmetric Encryption and Decryption in the Secure OS

  

4.3.6

Hash Calculation in the Secure OS

  

4.3.7

REE and TEE Interaction Performance Loss

  

4.3.8

Concurrent Signature