Comment by @arikauppi in commit a38050d
Image is verified but how to trust the verification anchor (root of trust)?
In embedded world, some kind of root of trust (public key, public key hash etc) is stored in HW. eFUSEs or other OTP (one-time programmable memory) is typically used. However if root of trust is "burned" to HW, then key revocation and renewal become issues.
This then leads to trusted execution environment + trusted applications which could aid in storing the root of trust in a secure way. (TCG / trusted computing group, http://www.trustedcomputinggroup.org/, OP-TEE, https://wiki.linaro.org/WorkingGroups/Security/OP-TEE etc)
Also, it is not typically enough to verify the image during boot but in some applications also run-time integrity needs to be ensured. This then opens totally different can of worms.
Comment by @arikauppi in commit a38050d