
Common Data Security Architecture (CDSA) White Paper
Validating the CSP Credentials
Figure 1-10  Verifying the authenticity of data in the .MF file
.SF file, containing hash of data in .MF file
.MF file, containing hash of shared library and library name
| 
 | Are | No | 
| HASH | hashes | 
 | 
| function | 
 | |
| equal? | 
 | |
| 
 | 
 | |
| 
 | Yes | 
 | 
| 
 | Proceed to verify hash | 
 | 
| 
 | of shared library | 
 | 
.MF or .SF file has been tampered with. STOP!
4.If these hashes match, a hash of the shared library to be loaded is calculated. The hash is then compared to the 
| 68 | Chapter 1 | 
