Lines Matching refs:with
17 ARM DEN0006C-1. It should be used in conjunction with the `Firmware Update`_
23 A Chain of Trust (CoT) starts with a set of implicitly trusted components. On
30 tampered with.
40 extensions. To sign the certificates, the PKCS#1 SHA-256 with RSA Encryption
41 signature scheme is used with a RSA key length of 2048 bits. Future version of
48 with the hash extracted from the content certificate. The SHA-256 function is
90 It is self-signed with the private part of the ROT key. It contains a hash
95 It is self-signed with the private part of the ROT key. It contains the
101 It is self-signed with the trusted world key. It contains the public part of
106 It is self-signed with the SCP\_BL2 key. It contains a hash of the SCP\_BL2
111 It is self-signed with the trusted world key. It contains the public part of
116 It is self-signed with the BL31 key. It contains a hash of the BL31 image.
120 It is self-signed with the trusted world key. It contains the public part of
125 It is self-signed with the BL32 key. It contains a hash of the BL32 image.
129 It is self-signed with the non-trusted world key. It contains the public
134 It is self-signed with the BL33 key. It contains a hash of the BL33 image.
147 compared with the hash of the ROTPK read from the trusted root-key storage
153 - BL1 loads the BL2 image. Its hash is calculated and compared with the hash
159 compared with the hash of the ROTPK read from the trusted root-key storage
188 - BL2 calculates the hash of each image. It compares it with the hash obtained
197 the FIP along with the boot loader images. These certificates are loaded in