version 1.00
Image-Signing tools is a tool to sign SoFIA 3GR binary images using user's generated RSA Key.
It is divided to
	1. "Bootloader"which images needed to be signed using Gold RSA Key
        2. "BSP" images needed to be signed using Master RSA Key

Below describe step-by-step to fully sign SoFIA 3GR images. All input images and keys are
as listed

(Note: * is for user input file)

STEP 1: Populate Bootloader and BSP folder with respective keys listed
----------------------------------------------------------------------------
Bootloader  ->  keys  -> *GpukCert.bin
                         *PubKeys.bin
                         *Gprk.key
BSP         ->  keys  -> *Mprk.key
                         *Sprk.key
                         *PubKeys.bin (from IBV)


STEP2 2: Sign psi_ram.fls and ebl.fls
----------------------------------------------------------------------------
Bootloader  ->  input  -> *psi_ram.fls
            ->  output -> psi_ram_signed.fls

[command]   $<image-signing> make Sign_psi_ram

BSP         ->  input  -> *ebl.fls
            ->  output -> ebl_signed.fls (copy back to input)
[command]   $<image-signing> make Sign_ebl


STEP 3: Sign bootloader images
----------------------------------------------------------------------------
Bootloader  ->  input  -> *psi_ram_signed.fls (in output folder from step 2)
                          *psi_flash.fls
                          *slb.fls
                          *ebl_signed.fls (From BSP output)
                output -> Signed bootloader images (Gold Key only)
                          psi_flash_signed_bl.fls
                          slb_signed_bl.fls
[command]   $<image-signing> make Sign_bootloader

STEP 4: Sign BSP images
----------------------------------------------------------------------------
BSP  ->  input  -> Bootloader signed images
                    *psi_flash_signed_bl.fls
                    *slb_signed_bl.fls
                    *psi_ram_signed.fls
                    *ebl_signed.fls
                ->  system  -> all non-bootloader unsigned images
                                [vrl related images]
                                *secvm.fls
                                *mobilevisor.fls
                                *ucode_patch.fls
                                *splash_img.fls (optional)
                                *modem.fls (optional)
                                *mvconfig_smp.fls
                                *boot.fls
                                *recovery.fls
                                [other images]
                                *userdata.fls
                                *cache.fls
                                *system.fls

Note: vrl relate image must have same filename. Rename the images if needed.

         output -> Final signed bootloader images
                      psi_flash_signed.fls
                      slb_signed.fls
                   Signed BSP images
                      secvm_signed.fls
                      mobilevisor_signed.fls
                      ucode_patch_signed.fls
                      splash_img_signed.fls
                      mvconfig_signed.fls
                      boot_signed.fls
                      system_signed.fls
                      userdata_signed.fls
                      cache_signed.fls
                      recovery_signed.fls
                      vrl_signed.fls

[command] $<image-signing> make Sign_BSP

