Lines Matching refs:trusted
23 A Chain of Trust (CoT) starts with a set of implicitly trusted components. On
27 trusted root-key storage registers.
57 the trusted key certificate. The public part is the ROTPK.
63 one of the extension fields in the trusted world certificate.
65 - **Non-trusted world key**
69 extension fields in the trusted world certificate.
96 public part of the trusted world key and the public part of the non-trusted
101 It is self-signed with the trusted world key. It contains the public part of
111 It is self-signed with the trusted world key. It contains the public part of
120 It is self-signed with the trusted world key. It contains the public part of
129 It is self-signed with the non-trusted world key. It contains the public
147 compared with the hash of the ROTPK read from the trusted root-key storage
157 - BL2 loads and verifies the trusted key certificate. The issuer public key is
159 compared with the hash of the ROTPK read from the trusted root-key storage
160 registers. If the comparison succeeds, BL2 reads and saves the trusted and
161 non-trusted world public keys from the verified certificate.
168 is verified using the trusted world public key. If the signature
208 to implement the desired trusted boot sequence. ARM platforms use this framework