Lines Matching refs:used
9 terms of certificate hierarchy and the mechanisms used to verify a
14 - The mechanism used to encode and transport information, e.g. DER encoded
18 - The mechanism used to verify the transported information i.e. the
142 #. Authenticate the image as per the cryptographic algorithms used.
145 be used to authenticate the next image in the CoT.
167 also specifies the authentication methods and the parsing method used for
171 used for verifying the CoT, e.g. memory for public keys, hashes etc.
188 #. Export a custom IPM if a proprietary image format is being used (described
248 ``_name`` must be a string containing the name of the CL. This name is used for
257 #. Extracting parameters used for authenticating an image based upon a
263 used in the CoT. This library must implement the specific methods to parse the
305 type of hash algorithm used as this information accompanies the hash. This
368 single parsing method. There has to be one IPL for every method used by the
372 is treated as being in raw binary format e.g. boot loader images used by
373 TF-A. This method should only be used by data images.
377 libraries will be available which can be used to parse an image represented
378 by this method. Such libraries can be used to write the corresponding IPL
388 The following enum can be used to define these three methods.
421 The ``init()`` function will be used to initialize the IPL.
432 be used to verify either the current or the next image in the CoT sequence.
435 will be used by the IPM to find the right parser descriptor for the image.
441 which will be used to verify it. As described in the Section "Authentication
453 The AM defines the type of each parameter used by an authentication method. It
487 ``cookie`` is used by the platform to specify additional information to the IPM
494 the ``cookie`` field means that it is not used.
559 field is used to specify the length of the data in the memory.
566 parameters that should be extracted from it and used to verify the next image
586 #. A parsing method which is used by the AM to find the appropriate IPM.
589 section. These are used to verify the current image.
591 #. Parameters which are used to verify the next image in the current CoT. These
623 and ``drivers/auth/tbbr/tbbr_cot_bl2.c`` respectively. The common CoT used across
698 - ``alg``: the signature algorithm used (obtained from current image)
714 be used to extract the parameter data from the corresponding image.
859 is used to extract a public key from the parent image. If the cookie is an
864 - ``sig``: parameter descriptor of type ``AUTH_PARAM_SIG``. It is used to extract
866 - ``sig_alg``: parameter descriptor of type ``AUTH_PARAM_SIG``. It is used to
868 - ``raw_data``: parameter descriptor of type ``AUTH_PARAM_RAW_DATA``. It is used
876 descriptor is used to extract the public key from an x509v3 extension with OID
907 depend on the images used in the CoT. Raw images do not need a library, so