mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-08 05:43:53 +00:00
docs(arm): update TBBR CoT dtsi file name in doc
Change-Id: I31ebee7574f5133aadbf2767377fd74a21775ce5 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
This commit is contained in:
parent
c4b35cebff
commit
dc35bd320c
1 changed files with 1 additions and 1 deletions
|
@ -98,7 +98,7 @@ All standard chains of trust provided in TF-A source tree (that is, under
|
|||
``drivers/auth/``) require that the certificate's signature has already been
|
||||
validated prior to calling ``get_ext()``, or any function that calls ``get_ext()``.
|
||||
Platforms taking their chain of trust from a dynamic configuration file (such as
|
||||
``fdts/cot_descriptors.dtsi``) are also safe, as signature verification will
|
||||
``fdts/tbbr_cot_descriptors.dtsi``) are also safe, as signature verification will
|
||||
always be done prior to any calls to ``get_ext()`` or ``auth_nvctr()`` in this
|
||||
case, no matter the order of the properties in the file. Therefore, it is not
|
||||
possible to exploit this vulnerability pre-authentication in upstream TF-A.
|
||||
|
|
Loading…
Add table
Reference in a new issue