Lines Matching refs:from
4 The Trusted Board Boot (TBB) feature prevents malicious firmware from running on
44 with the hash extracted from the content certificate. Various hash algorithms
143 read from the verified certificate. A hash of that key is calculated and
144 compared with the hash of the ROTPK read from the trusted root-key storage
145 registers. If they match, the BL2 hash is read from the certificate.
152 read from the certificate. Control is transferred to the BL2 image if all
156 read from the verified certificate. A hash of that key is calculated and
157 compared with the hash of the ROTPK read from the trusted root-key storage
159 non-trusted world public keys from the verified certificate.
167 verification succeeds, BL2 reads and saves the BL3x public key from the
172 BL2 reads and saves the BL3x image hash from the certificate.
177 verification succeeds, BL2 reads and saves the BL33 public key from the
181 verification succeeds, BL2 reads and saves the BL33 image hash from the
187 from the corresponding content certificate. The image authentication succeeds