X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=doc%2FuImage.FIT%2Fverified-boot.txt;h=41c9fa9e09f97d047f980a31fcdbad5cd74d0db2;hb=0ed2e2d825ac70d99ef89e3bb745979a22e2972e;hp=3c83fbc2c16744c2387e3c4271971b14489aa124;hpb=041bca5ba3adb48750d0a438cb3b1356a0c2e603;p=oweals%2Fu-boot.git diff --git a/doc/uImage.FIT/verified-boot.txt b/doc/uImage.FIT/verified-boot.txt index 3c83fbc2c1..41c9fa9e09 100644 --- a/doc/uImage.FIT/verified-boot.txt +++ b/doc/uImage.FIT/verified-boot.txt @@ -64,7 +64,7 @@ software from updatable memory. It is critical that the public key be secure and cannot be tampered with. It can be stored in read-only memory, or perhaps protected by other on-chip -crypto provided by some modern SOCs. If the public key can ben changed, then +crypto provided by some modern SOCs. If the public key can be changed, then the verification is worthless. @@ -87,13 +87,13 @@ affect the whole change. Flattened Image Tree (FIT) -------------------------- -The FIT format is alreay widely used in U-Boot. It is a flattened device +The FIT format is already widely used in U-Boot. It is a flattened device tree (FDT) in a particular format, with images contained within. FITs include hashes to verify images, so it is relatively straightforward to add signatures as well. The public key can be stored in U-Boot's CONFIG_OF_CONTROL device tree in -a standard place. Then when a FIT it loaded it can be verified using that +a standard place. Then when a FIT is loaded it can be verified using that public key. Multiple keys and multiple signatures are supported. See signature.txt for more information.