Common Data Security Architecture (CDSA) White Paper

Validating the CSP Credentials

Figure 1-10 Verifying the authenticity of data in the .MF file

.SF file, containing hash of data in .MF file

 

.MF file,

 

 

 

Are

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

.MF or .SF file

 

 

containing

 

 

SHA-1

No

 

 

 

hash of

 

 

 

SHA-1

 

has been

 

 

 

 

HASH

 

 

 

shared library

 

 

hashes

 

 

tampered with.

 

 

 

 

function

 

 

 

 

and library

 

 

equal?

 

 

STOP!

 

 

name

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Yes

Proceed to verify hash of shared library

4.If these hashes match, a hash of the shared library to be loaded is calculated. The hash is then compared to the pre-calculated value in the .MF file, as shown in Figure 1-11 on page 69.

68

Chapter 1