<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Layerscape中的主题 Re: LS1084ARDB secure boot issue</title>
    <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1542400#M11301</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I want to confirm the generation of the OTPMK and SRKH.&lt;BR /&gt;Are the OTPMK and SRKH will generate when using flex-builder -m ls1088ardb -a arm64 -s to build code?&lt;BR /&gt;Or do I need to use the command ./gen_otpmk_drbg --b 2 to generate the OTPMK and ./uni_sign --hash to generate the SRKH&lt;/P&gt;&lt;P&gt;In addition, I also want to confirm the byte swap of the OTPMK and the SRKH, if the generated OTPMK is as follows&lt;/P&gt;&lt;P&gt;OTPMK[255:0] is:&lt;BR /&gt;2e89c524788e777bef7abff23635627e65070e76b3aca9dab5214243d6808a11&lt;/P&gt;&lt;P&gt;NAME | BITS | VALUE&lt;BR /&gt;_________|______________|____________&lt;BR /&gt;OTPMKR 0 | 255-224 | 2e89c524&lt;BR /&gt;OTPMKR 1 | 223-192 | 788e777b&lt;BR /&gt;OTPMKR 2 | 191-160 | ef7abff2&lt;BR /&gt;OTPMKR 3 | 159-128 | 3635627e&lt;BR /&gt;OTPMKR 4 | 127- 96 | 65070e76&lt;BR /&gt;OTPMKR 5 | 95- 64 | b3aca9da&lt;BR /&gt;OTPMKR 6 | 63- 32 | b5214243&lt;BR /&gt;OTPMKR 7 | 31- 0 | d6808a11&lt;/P&gt;&lt;P&gt;The byte swap of the OTPMK I do is the following.&lt;BR /&gt;Is it correct?&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80234 0x24c5892e&lt;BR /&gt;=&amp;gt; mw 0x1e80238 0x7b778e78&lt;BR /&gt;=&amp;gt; mw 0x1e8023c 0xf2bf7aef&lt;BR /&gt;=&amp;gt; mw 0x1e80240 0x7e623536&lt;BR /&gt;=&amp;gt; mw 0x1e80244 0x760e0765&lt;BR /&gt;=&amp;gt; mw 0x1e80248 0xdaa9acb3&lt;BR /&gt;=&amp;gt; mw 0x1e8024c 0x434221b5&lt;BR /&gt;=&amp;gt; mw 0x1e80250 0x118a80d6&lt;/P&gt;&lt;P&gt;Similarly, if the generated SRKH is as follows.&lt;/P&gt;&lt;P&gt;SRK (Public Key) Hash:&lt;BR /&gt;b0afeac4309c3d913e2c33a59396b4c396b5e240d5b17fbb4cd088a938704fdc&lt;BR /&gt;SFP SRKHR0 = b0afeac4&lt;BR /&gt;SFP SRKHR1 = 309c3d91&lt;BR /&gt;SFP SRKHR2 = 3e2c33a5&lt;BR /&gt;SFP SRKHR3 = 9396b4c3&lt;BR /&gt;SFP SRKHR4 = 96b5e240&lt;BR /&gt;SFP SRKHR5 = d5b17fbb&lt;BR /&gt;SFP SRKHR6 = 4cd088a9&lt;BR /&gt;SFP SRKHR7 = 38704fdc&lt;/P&gt;&lt;P&gt;The byte swap of the SRKH I do is the following.&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80254 0xc4eaafb0&lt;BR /&gt;=&amp;gt; mw 0x1e80258 0x913d9c30&lt;BR /&gt;=&amp;gt; mw 0x1e8025c 0xa5332c3e&lt;BR /&gt;=&amp;gt; mw 0x1e80260 0xc3b49693&lt;BR /&gt;=&amp;gt; mw 0x1e80264 0x40e2b596&lt;BR /&gt;=&amp;gt; mw 0x1e80268 0xbb7fb1d5&lt;BR /&gt;=&amp;gt; mw 0x1e8026c 0xa988d04c&lt;BR /&gt;=&amp;gt; mw 0x1e80270 0xdc4f7038&lt;/P&gt;&lt;P&gt;Is it correct?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 24 Oct 2022 03:55:26 GMT</pubDate>
    <dc:creator>tzongruey</dc:creator>
    <dc:date>2022-10-24T03:55:26Z</dc:date>
    <item>
      <title>LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1533195#M11243</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have set SB_EN=1 for secure boot in the RCW file.&lt;BR /&gt;I try to use firmware_ls1088ardb_uboot_qspiboot_secure.img to flash NOR on my platform and try to boot up.&lt;BR /&gt;In the beginning, it can boot up successfully, but it will show the following error message, and can not stay in uboot to enter the command&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;NOTICE: ROTPK is not deployed on platform. Skipping ROTPK verification.&lt;BR /&gt;ERROR: Error in installing ROTPK table&lt;BR /&gt;ERROR: SRK hash doesn't match the fuse hash&lt;BR /&gt;ERROR: ROTPK FAILURE&lt;BR /&gt;ERROR: SECURE BOOT DEVE MODE : CONTINUING ON FAILURE. CHECK ROTPK&lt;BR /&gt;........&lt;BR /&gt;ERROR :: 400 :: Public key hash comparison failed&lt;BR /&gt;SEC_MON already in Non Secure state.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So I modified the return value of the abortboot function in packages/firmware/u-boot/common/autoboot.c&lt;BR /&gt;Then, the secure boot image can stay in uboot, enter the following md and mw commands&lt;BR /&gt;The input value is according to the generated OTPMK and SRKH.&lt;BR /&gt;After entering the following command, I tried to restart the platform&lt;BR /&gt;But it couldn't boot up.&lt;/P&gt;&lt;P&gt;=&amp;gt; md 0x1e90014&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80234 0xca301f1d&lt;BR /&gt;=&amp;gt; mw 0x1e80238 0xebbad2eb&lt;BR /&gt;=&amp;gt; mw 0x1e8023c 0x1afa68c5&lt;BR /&gt;=&amp;gt; mw 0x1e80240 0x956ee93c&lt;BR /&gt;=&amp;gt; mw 0x1e80244 0xcd750046&lt;BR /&gt;=&amp;gt; mw 0x1e80248 0x5c8c5792&lt;BR /&gt;=&amp;gt; mw 0x1e8024c 0xfdc12435&lt;BR /&gt;=&amp;gt; mw 0x1e80250 0x4dd802f8&lt;/P&gt;&lt;P&gt;=&amp;gt; md 0x1e90014&lt;BR /&gt;=&amp;gt; md 0x1e80024&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80020 0x2&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80254 0x244fdad5&lt;BR /&gt;=&amp;gt; mw 0x1e80258 0x1d216e05&lt;BR /&gt;=&amp;gt; mw 0x1e8025c 0xeae7dc7a&lt;BR /&gt;=&amp;gt; mw 0x1e80260 0x03cc4a25&lt;BR /&gt;=&amp;gt; mw 0x1e80264 0xd75dc191&lt;BR /&gt;=&amp;gt; mw 0x1e80268 0xfde52e47&lt;BR /&gt;=&amp;gt; mw 0x1e8026c 0xacebc955&lt;BR /&gt;=&amp;gt; mw 0x1e80270 0xba1f57b1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The current situation becomes that as long as firmware_ls1088ardb_uboot_qspiboot_secure.img is used, it can't boot up.&lt;BR /&gt;The only way to boot up is to flash back firmware_ls1088ardb_uboot_qspiboot.img&lt;BR /&gt;What should I do to boot using firmware_ls1088ardb_uboot_qspiboot_secure.img?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 06:56:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1533195#M11243</guid>
      <dc:creator>tzongruey</dc:creator>
      <dc:date>2022-10-06T06:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1535007#M11262</link>
      <description>&lt;P&gt;Hi, do you have your fuses blew?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2022 16:23:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1535007#M11262</guid>
      <dc:creator>JosephAtNXP</dc:creator>
      <dc:date>2022-10-10T16:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1535362#M11265</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Did you mean the build configuration of CONFIG_FUSE_PROVISIONING in configs/build_lsdk.cfg?&lt;BR /&gt;I have set it as y.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 06:34:59 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1535362#M11265</guid>
      <dc:creator>tzongruey</dc:creator>
      <dc:date>2022-10-11T06:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1535795#M11268</link>
      <description>&lt;P&gt;Hi, two questions:&lt;/P&gt;
&lt;P&gt;Have you followed the steps that the&amp;nbsp;&lt;A href="https://docs.nxp.com/bundle/GUID-487B2E69-BB19-42CB-AC38-7EF18C0FE3AE/page/GUID-38B02850-872C-4567-8088-75AC149FD52C.html" target="_self"&gt;&lt;STRONG&gt;6.1.1.5.2 Prepare board for Secure boot&lt;/STRONG&gt;&lt;/A&gt; part suggests? And if so, have you checked that those writings indeed were written?&lt;/P&gt;
&lt;P&gt;The other question is regarding to your image, could you please tell me how did you built your image?&lt;/P&gt;
&lt;P&gt;Thanks in advance, best regards.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 18:26:28 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1535795#M11268</guid>
      <dc:creator>JosephAtNXP</dc:creator>
      <dc:date>2022-10-11T18:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1536104#M11273</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I didn't follow the steps of chapter 6.1.1.5.2 Prepare board for Secure boot in LSDK21.08 completely.&lt;BR /&gt;The LSDK version I used was 20.04 update290520.&lt;BR /&gt;Therefore, I referred to the document of the LSDK 20.04 update290520 version.&lt;/P&gt;&lt;P&gt;I checked the steps of chapter 6.1.1.5.2 Prepare board for Secure boot in LSDK21.08&lt;BR /&gt;When I used uboot command(md mw) to write OTPMK and SRKH, I didn't do byte swaps for OTPMK and SRKH.&lt;BR /&gt;Is that causing this issue?&lt;BR /&gt;How could I fix it?&lt;/P&gt;&lt;P&gt;When I built a secure image, I only modified SB_EN in RCW to 1&lt;BR /&gt;The other parts are the same as when I built a non-secure image&lt;BR /&gt;Currently, I only can use a non-secure image to boot up.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 08:16:11 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1536104#M11273</guid>
      <dc:creator>tzongruey</dc:creator>
      <dc:date>2022-10-12T08:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1536523#M11279</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;please take the guide up.&lt;/P&gt;
&lt;P&gt;Enable POVD putting the corresponding jumper in order to enable SFP. After that, perform the first step to write to OTPMK and SRKH, this would be reading if the fuses are already blown, if you need to re-write those fuses, the workaround would be change your chip for another one.&lt;/P&gt;
&lt;P&gt;If your chip has been replaced, take this guide to prepare the board. This causes the issue for sure, your image won't hash nor match, neither any software.&lt;/P&gt;
&lt;P&gt;Nonetheless, I also wanted to see how your image was built. I meant if you used flex-builder or performed it manually, and how did you do that.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 20:43:29 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1536523#M11279</guid>
      <dc:creator>JosephAtNXP</dc:creator>
      <dc:date>2022-10-12T20:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1536701#M11280</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The attached picture is the schematics of our platform.&lt;BR /&gt;I have put the jumper to the TA_PROG_SFP pin(connect TP649 and TP650) to enable SFP in my previous test.&lt;BR /&gt;If I set the CONFIG_FUSE_PROVISIONING as y in configs/build_lsdk.cfg&lt;BR /&gt;Is the OTPMK and SRKH will pack into firmware_ls1088ardb_qspiboot_secure.img or not?&lt;BR /&gt;I am confused about that.&lt;BR /&gt;I couldn't boot up with a secure image.&lt;BR /&gt;If I want to rewrite the OTPMK and SRKH, I couldn't use the console to rewrite them.&lt;BR /&gt;I built my image by using flex-builder.&lt;BR /&gt;I used flex-build -m ls1088ardb -a arm64 or flex-build -m ls1088ardb -a arm64 -s to generate the secure image.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 02:21:58 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1536701#M11280</guid>
      <dc:creator>tzongruey</dc:creator>
      <dc:date>2022-10-13T02:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1538745#M11288</link>
      <description>&lt;P&gt;Hi, tzongruey&lt;/P&gt;&lt;P&gt;Ok, here's what is happenning.&lt;/P&gt;&lt;P&gt;The Super Root Key Hash (SRKH) and the OTP Master Key registers are keys used by the CAAM module to hash information, those can validate images and softwares by using its information in hashing functions. For secured reasons, those are implemented as fuses inside the device, once you set a fuse to 1 or 0, those fuses will blow and never set another value.&lt;/P&gt;&lt;P&gt;That is why you need to connect a jumper in the RDB, to be completely sure that you are going to set those fuses [blowing register by register or all the registers with a fuse provisioning file and the file_provisioning -&amp;gt; y], what happened here is that you did blow your fuses and you did not do byte swapping, so the key won't match for the image. So, you should get a new device that occupies the old one with not-blown fuses and get you key typed again.&lt;/P&gt;&lt;P&gt;You should do byte swapping, as the last version states, and follow that guide. Also, let me check that command you used for building that image.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Oct 2022 18:29:41 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1538745#M11288</guid>
      <dc:creator>JosephAtNXP</dc:creator>
      <dc:date>2022-10-17T18:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1542400#M11301</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I want to confirm the generation of the OTPMK and SRKH.&lt;BR /&gt;Are the OTPMK and SRKH will generate when using flex-builder -m ls1088ardb -a arm64 -s to build code?&lt;BR /&gt;Or do I need to use the command ./gen_otpmk_drbg --b 2 to generate the OTPMK and ./uni_sign --hash to generate the SRKH&lt;/P&gt;&lt;P&gt;In addition, I also want to confirm the byte swap of the OTPMK and the SRKH, if the generated OTPMK is as follows&lt;/P&gt;&lt;P&gt;OTPMK[255:0] is:&lt;BR /&gt;2e89c524788e777bef7abff23635627e65070e76b3aca9dab5214243d6808a11&lt;/P&gt;&lt;P&gt;NAME | BITS | VALUE&lt;BR /&gt;_________|______________|____________&lt;BR /&gt;OTPMKR 0 | 255-224 | 2e89c524&lt;BR /&gt;OTPMKR 1 | 223-192 | 788e777b&lt;BR /&gt;OTPMKR 2 | 191-160 | ef7abff2&lt;BR /&gt;OTPMKR 3 | 159-128 | 3635627e&lt;BR /&gt;OTPMKR 4 | 127- 96 | 65070e76&lt;BR /&gt;OTPMKR 5 | 95- 64 | b3aca9da&lt;BR /&gt;OTPMKR 6 | 63- 32 | b5214243&lt;BR /&gt;OTPMKR 7 | 31- 0 | d6808a11&lt;/P&gt;&lt;P&gt;The byte swap of the OTPMK I do is the following.&lt;BR /&gt;Is it correct?&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80234 0x24c5892e&lt;BR /&gt;=&amp;gt; mw 0x1e80238 0x7b778e78&lt;BR /&gt;=&amp;gt; mw 0x1e8023c 0xf2bf7aef&lt;BR /&gt;=&amp;gt; mw 0x1e80240 0x7e623536&lt;BR /&gt;=&amp;gt; mw 0x1e80244 0x760e0765&lt;BR /&gt;=&amp;gt; mw 0x1e80248 0xdaa9acb3&lt;BR /&gt;=&amp;gt; mw 0x1e8024c 0x434221b5&lt;BR /&gt;=&amp;gt; mw 0x1e80250 0x118a80d6&lt;/P&gt;&lt;P&gt;Similarly, if the generated SRKH is as follows.&lt;/P&gt;&lt;P&gt;SRK (Public Key) Hash:&lt;BR /&gt;b0afeac4309c3d913e2c33a59396b4c396b5e240d5b17fbb4cd088a938704fdc&lt;BR /&gt;SFP SRKHR0 = b0afeac4&lt;BR /&gt;SFP SRKHR1 = 309c3d91&lt;BR /&gt;SFP SRKHR2 = 3e2c33a5&lt;BR /&gt;SFP SRKHR3 = 9396b4c3&lt;BR /&gt;SFP SRKHR4 = 96b5e240&lt;BR /&gt;SFP SRKHR5 = d5b17fbb&lt;BR /&gt;SFP SRKHR6 = 4cd088a9&lt;BR /&gt;SFP SRKHR7 = 38704fdc&lt;/P&gt;&lt;P&gt;The byte swap of the SRKH I do is the following.&lt;/P&gt;&lt;P&gt;=&amp;gt; mw 0x1e80254 0xc4eaafb0&lt;BR /&gt;=&amp;gt; mw 0x1e80258 0x913d9c30&lt;BR /&gt;=&amp;gt; mw 0x1e8025c 0xa5332c3e&lt;BR /&gt;=&amp;gt; mw 0x1e80260 0xc3b49693&lt;BR /&gt;=&amp;gt; mw 0x1e80264 0x40e2b596&lt;BR /&gt;=&amp;gt; mw 0x1e80268 0xbb7fb1d5&lt;BR /&gt;=&amp;gt; mw 0x1e8026c 0xa988d04c&lt;BR /&gt;=&amp;gt; mw 0x1e80270 0xdc4f7038&lt;/P&gt;&lt;P&gt;Is it correct?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2022 03:55:26 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1542400#M11301</guid>
      <dc:creator>tzongruey</dc:creator>
      <dc:date>2022-10-24T03:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: LS1084ARDB secure boot issue</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1543092#M11303</link>
      <description>&lt;P&gt;Yes, according to&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;6.1.1.5.2.2 Byte swap for reading and writing SRKH/OTPMK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You should write to OTPMK and SRKH considering the core endianness and using u-boot, it is correct that the bytes should be swapped.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="josephlinares_0-1666672103601.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/197970i33FDED0F68197258/image-size/medium?v=v2&amp;amp;px=400" role="button" title="josephlinares_0-1666672103601.png" alt="josephlinares_0-1666672103601.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Look at the example provided for the guide, if the generated keys were given using the commands for generating them, you are swapping your bytes correctly and putting them into the correct register.&lt;/P&gt;
&lt;P&gt;Also, the OTPMK is generated correctly, the same goes for the SRKH generation.&lt;/P&gt;
&lt;P&gt;Anyway, could be helpful to check what the SRKH and OTPMK registers are written to in the first board you used. If you burnt them or not and what is its value if positive.&lt;/P&gt;
&lt;P&gt;Edit: Could you please confirm that when generating your keys, your OTPMKR_X are described starting from 0 AND the bits interval starting from 255?&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2022 04:48:36 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1084ARDB-secure-boot-issue/m-p/1543092#M11303</guid>
      <dc:creator>JosephAtNXP</dc:creator>
      <dc:date>2022-10-25T04:48:36Z</dc:date>
    </item>
  </channel>
</rss>

