The PDI content integrity is verified using checksums. Depending on the use case, executables and data objects in the PDI can be encrypted, authenticated, or both. For information on how to create the PDI, see Creating a Boot Image (PDI).
Note: In the boot process description, the term
validates includes checksum verification and authentication as
needed.