You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When an uefi image is used with an encrypted off-chip BL, the current ccpv5 emulation will decrypt the off-chip using an un-initialized CCP LSB context as the key.
IMHO it would be better to detect such cased (if possible) and warn the user that the decryption output is useless.
The long-term solution is to retrieve the initial seed for the CCP LSB's so the emulator can successfully decrypt the off-chip BL.
The text was updated successfully, but these errors were encountered:
When an uefi image is used with an encrypted off-chip BL, the current ccpv5 emulation will decrypt the off-chip using an un-initialized CCP LSB context as the key.
IMHO it would be better to detect such cased (if possible) and warn the user that the decryption output is useless.
The long-term solution is to retrieve the initial seed for the CCP LSB's so the emulator can successfully decrypt the off-chip BL.
The text was updated successfully, but these errors were encountered: