Add a description of how to implement verified boot using signed FIT images, and a simple test which verifies operation on sandbox. The test signs a FIT image and verifies it, then signs a FIT configuration and verifies it. Then it corrupts the signature to check that this is detected. Signed-off-by: Simon Glass <sjg@chromium.org> |
||
|---|---|---|
| .. | ||
| command_syntax_extensions.txt | ||
| howto.txt | ||
| kernel.its | ||
| kernel_fdt.its | ||
| multi.its | ||
| sign-configs.its | ||
| sign-images.its | ||
| signature.txt | ||
| source_file_format.txt | ||
| update3.its | ||
| update_uboot.its | ||
| verified-boot.txt | ||