coreboot/src/security
Arthur Heymans bccb6916fe security/intel/txt/ramstage.c: Fix clearing secrets on CBNT
intel_txt_memory_has_secret() checks for ESTS.TXT_ESTS_WAKE_ERROR_STS
|| E2STS.TXT_E2STS_SECRET_STS and it looks like with CBNT the E2STS
bit can be set without the ESTS bit.

Change-Id: Iff4436501b84f5c209add845b3cd3a62782d17e6
Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/47934
Reviewed-by: Jonathan Zhang <jonzhang@fb.com>
Reviewed-by: Christian Walter <christian.walter@9elements.com>
Reviewed-by: Angel Pons <th3fanbus@gmail.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
2021-01-04 23:09:22 +00:00
..
intel security/intel/txt/ramstage.c: Fix clearing secrets on CBNT 2021-01-04 23:09:22 +00:00
lockdown lockdown: Add hint for how to check for lockdown support in boot log 2020-06-22 12:27:18 +00:00
memory src/security: Drop unneeded empty lines 2020-09-21 16:26:17 +00:00
tpm cbfs: Move more stuff into cbfs_boot_lookup() 2020-12-02 22:13:06 +00:00
vboot cbfs: Add verification for RO CBFS metadata hash 2020-12-03 00:11:08 +00:00
Kconfig cbfs: Add verification for RO CBFS metadata hash 2020-12-03 00:11:08 +00:00
Makefile.inc security: Add common boot media write protection 2020-04-28 01:19:32 +00:00