To make RoT and RoT bootloader artifact verification in the planner more robust, we'd like to compare an RoT/RoT bootloader's sign field in the caboose (which is the RKTH) to the CMPA's rkth field found in inventory.
Today all we get from inventory for RotPage are base64 encoded blobs. We need to have a way to safely decode and extract this information so the planner can use it.