Examples of Application Processor in a sentence
A SHA-256 Hash_DRBG provided in the hardware of the Application Processor.
The TSF shall verify the integrity of the bootchain up through the Application Processor OS kernel stored in mutable media prior to its execution through the use of [an immutable hardware hash of an asymmetric key].
A hardware SHA-256 Hash_DRBG provided by the Qualcomm Application Processor hardwareThe TOE ensures that it initializes each RBG with sufficient entropy ultimately accumulated from a TOE- hardware-based noise source.
Failure of any redundant system component affecting the critical redundancy like loss of any one Application Processor, Router, CFE would also be included in this category.
FPT_TST_EXT.2(1).1The TSF shall verify the integrity of the bootchain up through the Application Processor OS kernel stored in mutable media prior to its execution through the use of [an immutable hardware hash of an asymmetric key].
If so indicated on the Merchant Application, Processor will process PIN debit Card transactions and EBT Card transactions.
The Application Processor (AP) contains the hash of the Secure Boot Public Key (a key embedded in the end of the signed bootloader image), and upon verifying the SBPK attached to the bootloader produces the expected hash, the AP uses this public key to verify the signature of the bootloader image, to ensure its integrity and authenticity before transitioning execution to the bootloader.
The Android operating system sets the ARM eXecute Never (XN) bit on memory pages and the MMU circuitry of the TOE’s ARMv8 Application Processor enforces the XN bits.
The Application Processor (AP) contains the SHA-256 hash of the Secure Boot Public Key (an RSA 2048-bit key embedded in end of the signed bootloader image), and upon verifying the SBPK attached to the bootloader produces the expected hash, the AP uses this public key to verify the PKCS 1.5 RSA 2048 w/ SHA-256 signature of the bootloader image, to ensure its integrity and authenticity before transitioning execution to the bootloader.
The TOE uses its Application Processor DRBG when generating FEKs for SDP and SD card encryption, and uses its BoringSSL DRBG for all other uses.