Common Data Security Architecture (CDSA) White Paper
68 Chapter1
Common Data Security Architecture (CDSA) White Paper
Validating the CSP Credentials
Figure 1-10 Verifying the authenticity of data in the .MF file
4. If these hashes match, a hash of the shared library to be loaded is calculated. The hash is
then compared to the pre-calculated value in the .MF file, as shown in Figure 1-11 on page
69.
.MF file,
containing
hash of
shared library
and library
name
.SF file, containing hash
of data in .MF file
SHA-1
HASH
function
Are
SHA-1
hashes
equal?
Proceed to verify hash
of shared library
.MF or .SF file
has been
tampered with.
STOP!
No
Yes