The PDI content integrity is verified using checksums. Depending on the use case, executables and data objects in the PDI can be encrypted, authenticated, or both. For the artifacts to create the PDI, see Boot Image (PDI) Creation.
Note: In the boot process description, the term
validates includes checksum verification and authentication as
needed.