Dear Bhupesh, In message <819346bb83b04348a266643afd5bd6f6@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx> you wrote: > > I agree with Marek. Usually for non-cryptographic-secure (key based cryptography) boot > method the CRC protection is usually the best possible protection against Image > corruption. CRC check is usually used in a number of field-deployed solutions to ensure > linux image sanity. The FIT image approach as suggested by Marek also allows for secure boot methods (like cryptographically signed images); this is used in production for several systems, including the Google Chromebook. Best regards, Wolfgang Denk -- DENX Software Engineering GmbH, MD: Wolfgang Denk & Detlev Zundel HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany Phone: (+49)-8142-66989-10 Fax: (+49)-8142-66989-80 Email: wd@xxxxxxx Each honest calling, each walk of life, has its own elite, its own aristocracy based on excellence of performance. - James Bryant Conant _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/linux-arm-kernel