Lines Matching refs:image
26 - The BL1 image, on the assumption that it resides in ROM so cannot be
43 image. An image can be authenticated by calculating its hash and matching it
65 non secure world image (BL33). The public part is stored in one of the
71 sign the content certificate for the BL3X image. The public part is stored
88 of the BL2 image.
104 image.
113 It is self-signed with the BL31 key. It contains a hash of the BL31 image.
122 It is self-signed with the BL32 key. It contains a hash of the BL32 image.
131 It is self-signed with the BL33 key. It contains a hash of the BL33 image.
151 - BL1 loads the BL2 image. Its hash is calculated and compared with the hash
152 read from the certificate. Control is transferred to the BL2 image if all
172 BL2 reads and saves the BL3x image hash from the certificate.
174 The next two steps are executed only for the BL33 image.
181 verification succeeds, BL2 reads and saves the BL33 image hash from the
186 - BL2 calculates the hash of each image. It compares it with the hash obtained
187 from the corresponding content certificate. The image authentication succeeds
248 firmware image as input and generates the encrypted firmware image which can