diff options
| author | Pierre Equoy <pierre.equoy@canonical.com> | 2019-08-23 17:19:35 +0800 |
|---|---|---|
| committer | Pierre Equoy <pierre.equoy@canonical.com> | 2019-08-23 17:21:18 +0800 |
| commit | ad45c9c7a04935ea569526401b84ff8f159effc7 (patch) | |
| tree | 2b12aff1c932c6a6bd9c39a2d2f93cf46be24399 /COPYING | |
| parent | 4e79129c7ab2e6663d986ba708f4afac538edb06 (diff) | |
Add manual test to check decryption error when TPM data modified
There is no easy way to automate a test to check that device data partition cannot be decrypted if TPM2 data is modified. The easiest way is to manually flash the BIOS after installing the OEM image. By doing so, the TPM data, including data used for data partition decryption, is modified, making it impossible to decrypt the partition and boot the device.
Diffstat (limited to 'COPYING')
0 files changed, 0 insertions, 0 deletions
