Hi @MTH
A key feature of the boot ROM is the ability to perform a secure boot, also known as a High-Assurance Boot (HAB). ROM Code starts by verifying the signed image in the boot medium, which is generally the bootloader (including uboot, atf and other firmware), and then if there is additional image or software to be signed, that is the way to extend the root of trust.
I do not quite catch that " During uboot update, before writing firmware in eMMC, to ensure we don't store untrusted software." Can you please explain more?
There are two ways for your reference.
The first method is to put the signed uboot on the real load address and then use the HAB ROM API to verify it.
Or, take the signed uboot as a whole, like a zimage, and wrap the signed uboot with the IMAGE signature method, then call the ROM HAB API to verify it.
Best regards
Harvey