Common Data Security Architecture (CDSA) White Paper

Validating the CSP Credentials

Figure 1-10 Verifying the authenticity of data in the .MF file

.SF file, containing hash of data in .MF file

.MF file, containing hash of shared library and library name

SHA-1

Are

No

SHA-1

HASH

hashes

 

function

 

equal?

 

 

 

 

Yes

 

 

Proceed to verify hash

 

 

of shared library

 

.MF or .SF file has been tampered with. STOP!

4.If these hashes match, a hash of the shared library to be loaded is calculated. The hash is then compared to the pre-calculated value in the .MF file, as shown in Figure 1-11 on page 69.

68

Chapter 1

Page 68
Image 68
HP UX Security Products and Features Software manual SHA-1