<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSF Header: RSA Signature in Layerscape</title>
    <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512309#M1207</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the information I'll try it right away.&lt;/P&gt;&lt;P&gt;However I am very new to Yocto and using NXP SDK 1.9, and I don't know how to tell bitbake (or modify the recipe) to add the ARCH=arm parameter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 May 2016 09:01:21 GMT</pubDate>
    <dc:creator>vsiles</dc:creator>
    <dc:date>2016-05-12T09:01:21Z</dc:date>
    <item>
      <title>CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512305#M1203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to understand what is hashed/signed by the uni_sign tool. I'm only signing one binary (u-boot-spl.bin) so it takes as input an input file and the .bin file, and outputs a hdr.bin file.&lt;/P&gt;&lt;P&gt;In this header, there is a RSA signature, but I'm not sure of what ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My goal is to perform secure boot while loading CSF / u-boot from the SD card. Right now the PBL loads everything, but the ISBC fails with error 0x341 (signature missmatch), so u-boot and linux runs in Non secure SEC state.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 May 2016 13:10:22 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512305#M1203</guid>
      <dc:creator>vsiles</dc:creator>
      <dc:date>2016-05-10T13:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512306#M1204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;SPAN class="jive-username-link jiveTT-hover-user"&gt;Vincent Siles,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt;Please refer to the following functionalities of CST tool.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt;1. Key Generation&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt; a. Generating RSA Public and Private Keys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt; b. Generating OTPMK and DRV keys with hamming code inserted.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt;2. Generating CSF header for an image&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt;3. Signing code using RSA Private Keys.&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-username-link"&gt;Please sign image with the private key, store the hash of public key in SFP fuse(SFP_SRKRH shadow registers), and store OTPMK keys to &lt;SPAN&gt;OTPMK registers.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please refer to the following steps for running a basic secure boot test.&lt;/P&gt;&lt;P&gt;1. Generate a public/private RSA key pair.&lt;/P&gt;&lt;P&gt;2. Sign the image to be validated (U-Boot) using the private key.&lt;/P&gt;&lt;P&gt;3. Create a header containing information regarding the image, keys, signature etc.&lt;/P&gt;&lt;P&gt;4. Load the U-Boot and header image on to memory&lt;/P&gt;&lt;P&gt;5. Store the hash of public key in fuses (SFP)&lt;/P&gt;&lt;P&gt;6. Run out of POR with RCW having SB_EN=1 and location of header programmed in &lt;STRONG&gt;DCFG SCRATCHRW1 register via PBI commands&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;7. Boot ROM will read the SCRATCH REGISTER for location of the HEADER and then perform the validation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to the following procedure of CST tool.&lt;/P&gt;&lt;P&gt;1. Generate a key pair of size 1024, 2048 or 4096 (1K, 2K or 4K)&lt;BR /&gt;2. Copy the image to be copied in CST directory (uboot.bin)&lt;BR /&gt;3. &lt;STRONG&gt;Modify the input_file if required&lt;/STRONG&gt; (for Image name, image location, Key names etc.)&lt;BR /&gt;4. Run the uni_sign tool which will create the header file and also give the Public Key hash.&lt;BR /&gt; ./uni_sign --file &amp;lt;input_secure_file&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suspect the input file which you used to sign the image is not correct.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Would you please provide the input file used for signing SD secure u-boot?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Have a great day,&lt;BR /&gt;Yiping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2016 06:38:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512306#M1204</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2016-05-12T06:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512307#M1205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear &lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/yipingwang" rel="nofollow noopener noreferrer" target="_blank"&gt;yipingwang&lt;/A&gt;​ thank you for this detail information. Here is the input file I am currently using:&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="_jivemacro_uid_14630358474508460 jive_macro_code jive_text_macro" data-renderedposition="34_8_1192_1376" jivemacro_uid="_14630358474508460" modifiedtitle="true"&gt;&lt;P&gt;/* Copyright (c) 2013 Freescale Semiconductor, Inc.&lt;/P&gt;&lt;P&gt; * All rights reserved.&lt;/P&gt;&lt;P&gt; */&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify the platform. [Mandatory]&lt;/P&gt;&lt;P&gt;# Choose Platform - 1010/1040/2041/3041/4080/5020/5040/9131/9132/9164/4240/C290/LS1&lt;/P&gt;&lt;P&gt;PLATFORM=LS1&lt;/P&gt;&lt;P&gt;# ESBC Flag. Specify ESBC=0 to sign u-boot and ESBC=1 to sign ESBC images.(default is 0)&lt;/P&gt;&lt;P&gt;ESBC=0&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Entry Point/Image start address field in the header.[Mandatory]&lt;/P&gt;&lt;P&gt;# (default=ADDRESS of first file specified in images)&lt;/P&gt;&lt;P&gt;ENTRY_POINT=10000a00&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify the file name of the keys seperated by comma.&lt;/P&gt;&lt;P&gt;# The number of files and key select should lie between 1 and 4 for 1040 and C290.&lt;/P&gt;&lt;P&gt;# For rest of the platforms only one key is required and key select should not be provided.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# USAGE (for 4080/5020/5040/3041/2041/1010/913x): PRI_KEY = &amp;lt;key1.pri&amp;gt;&lt;/P&gt;&lt;P&gt;# USAGE (for 1040/C290/9164/4240/LS1): PRI_KEY = &amp;lt;key1.pri&amp;gt;, &amp;lt;key2.pri&amp;gt;, &amp;lt;key3.pri&amp;gt;, &amp;lt;key4.pri&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# PRI_KEY (Default private key :srk.pri) - [Optional]&lt;/P&gt;&lt;P&gt;PRI_KEY=srk.pri&lt;/P&gt;&lt;P&gt;# PUB_KEY (Default public key :srk.pub) - [Optional]&lt;/P&gt;&lt;P&gt;PUB_KEY=srk.pub&lt;/P&gt;&lt;P&gt;# Please provide KEY_SELECT(between 1 to 4) (Required for 1040/C290/9164/4240/LS1 only) - [Optional]&lt;/P&gt;&lt;P&gt;KEY_SELECT=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify SG table address, only for (2041/3041/4080/5020/5040) with ESBC=0 - [Optional]&lt;/P&gt;&lt;P&gt;SG_TABLE_ADDR=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify the target where image will be loaded. (Default is NOR_16B) - [Optional]&lt;/P&gt;&lt;P&gt;# Only required for Non-PBL Devices (1010/1040/9131/9132i/C290)&lt;/P&gt;&lt;P&gt;# Select from - NOR_8B/NOR_16B/NAND_8B_512/NAND_8B_2K/NAND_8B_4K/NAND_16B_512/NAND_16B_2K/NAND_16B_4K/SD/MMC/SPI&lt;/P&gt;&lt;P&gt;IMAGE_TARGET=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify IMAGE, Max 8 images are possible. DST_ADDR is required only for Non-PBL Platform. [Mandatory]&lt;/P&gt;&lt;P&gt;# USAGE : IMAGE_NO = {IMAGE_NAME, SRC_ADDR, DST_ADDR}&lt;/P&gt;&lt;P&gt;IMAGE_1={u-boot-spl.bin,10000a00,ffffffff}&lt;/P&gt;&lt;P&gt;IMAGE_2={,,}&lt;/P&gt;&lt;P&gt;IMAGE_3={,,}&lt;/P&gt;&lt;P&gt;IMAGE_4={,,}&lt;/P&gt;&lt;P&gt;IMAGE_5={,,}&lt;/P&gt;&lt;P&gt;IMAGE_6={,,}&lt;/P&gt;&lt;P&gt;IMAGE_7={,,}&lt;/P&gt;&lt;P&gt;IMAGE_8={,,}&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify OEM AND FSL ID to be populated in header. [Optional]&lt;/P&gt;&lt;P&gt;# e.g FSL_UID=11111111&lt;/P&gt;&lt;P&gt;FSL_UID=&lt;/P&gt;&lt;P&gt;FSL_UID_1=&lt;/P&gt;&lt;P&gt;OEM_UID=&lt;/P&gt;&lt;P&gt;OEM_UID_1=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify the file names of csf header and sg table. (Default :hdr.out) [Optional]&lt;/P&gt;&lt;P&gt;OUTPUT_HDR_FILENAME=hdr_uboot-spl.out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Specify the file names of hash file and sign file.&lt;/P&gt;&lt;P&gt;HASH_FILENAME=img_hash.out&lt;/P&gt;&lt;P&gt;INPUT_SIGN_FILENAME=sign.out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Specify the signature size.It is mandatory when neither public key nor private key is specified.&lt;/P&gt;&lt;P&gt;# Signature size would be [0x80 for 1k key, 0x100 for 2k key, and 0x200 for 4k key].&lt;/P&gt;&lt;P&gt;SIGN_SIZE=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Specify the output file name of sg table. (Default :sg_table.out). [Optional]&lt;/P&gt;&lt;P&gt;# Please note that OUTPUT SG BIN is only required for 2041/3041/4080/5020/5040 when ESBC flag is not set.&lt;/P&gt;&lt;P&gt;OUTPUT_SG_BIN=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Following fields are Required for 4240/9164/1040/C290 only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Specify House keeping Area&lt;/P&gt;&lt;P&gt;# Required for 4240/9164/1040/C290 only when ESBC flag is not set. [Mandatory]&lt;/P&gt;&lt;P&gt;HK_AREA_POINTER=&lt;/P&gt;&lt;P&gt;HK_AREA_SIZE=&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;# Following field Required for 4240/9164/1040/C290 only&lt;/P&gt;&lt;P&gt;# Specify Secondary Image Flag. (0 or 1) - [Optional]&lt;/P&gt;&lt;P&gt;# (Default is 0)&lt;/P&gt;&lt;P&gt;SEC_IMAGE=0&lt;/P&gt;&lt;P&gt;# Specify Manufacturing Protection Flag. (0 or 1) - [Optional]&lt;/P&gt;&lt;P&gt;# Required only for LS1(Default is 0)&lt;/P&gt;&lt;P&gt;MP_FLAG=1&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;VERBOSE=1&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Additional information:&lt;/P&gt;&lt;P&gt;- the board is a ls1021atwr&lt;/P&gt;&lt;P&gt;- I copied u-boot-spl.bin to the CST directory before using the uni_sign command&lt;/P&gt;&lt;P&gt;- srk.pri/pub have been genrated using gen_keys 4096&lt;/P&gt;&lt;P&gt;- I'm attempting a secure boot via SD card, so I created a file with RCW/PBI/CST/u-boot-spl.bin/u-boo.bin flashed onto the SD card.&lt;/P&gt;&lt;P&gt;- The PBL copies the CST/u-boot-spl.bin/u-boot.bin part from SD to OCRAM at address 0x10000000, so u-boot-spl.bin is at 0x10000a00&lt;/P&gt;&lt;P&gt;- OTPMK is burnt on the fuses&lt;/P&gt;&lt;P&gt;- RSA Hash is written in mirror registers using ccs&lt;/P&gt;&lt;P&gt;- Once this isdone, I release core0 and let the secure boot happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From this setting, I had some issues. ISBC successfully check the barker word, but returned the error "too may image file (&amp;gt; 8)". Using ccs, I saw that the endianness of the SG table was wrong, so I changed the endianness of the CST but the barker word. Then I got the error "key modulus is 0", so I realized I needed to only changed the endianness of some part of the header. Now I get a "Wrong hash computation".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this endianness issue comes from the fact that I am attempting secure boot from SD, so the PBI commands that copy from SD to OCRAM might mess with the endianness. In order to test a scenario known to work, I am attempting booting from the NOR (done yesterday), and I'll try secure boot from the NOR today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: to create the image I flash on the SD card, I do the following commands, extracted from u-boot makefile:&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_macro_code jive_text_macro _jivemacro_uid_14630367291751541" data-renderedposition="1956_8_1192_208" jivemacro_uid="_14630367291751541"&gt;&lt;P&gt;$ # create CSF header&lt;/P&gt;&lt;P&gt;$ uni_sign input_file&lt;/P&gt;&lt;P&gt;$ # append CSF header and SPL&lt;/P&gt;&lt;P&gt;$ cat hdr_uboot-spl.out u-boot-spl.bin &amp;gt; u-boot-spl-with-hdr.bin&lt;/P&gt;&lt;P&gt;$ # append RCW/PBI generated commands to SPL&lt;/P&gt;&lt;P&gt;$ mkimage -n $(UBOOT_SRC)/$(CONFIG_SYS_FSL_PBL_RCW) \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -R $(UBOOT_SRC)/$(CONFIG_SYS_FSL_PBL_PBI) -T pblimage \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -A $(ARCH) -a 0x10000000 -d u-boot-spl-with-hdr.bin u-boot-spl.pbl&lt;/P&gt;&lt;P&gt;$ # padding&lt;/P&gt;&lt;P&gt;$ objcpy -I binary -O binary --pad-to=$(CONFIG_SPL_PAD_TO) \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --gap-fill=0xff u-boot-spl.pbl u-boot-spl.pbl.padded&lt;/P&gt;&lt;P&gt;$ # adding u-bot.img&lt;/P&gt;&lt;P&gt;$ cat u-boot-spl.pbl.padded u-boot.img &amp;gt; signed-u-boot-with-spl.bin&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2016 07:07:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512307#M1205</guid>
      <dc:creator>vsiles</dc:creator>
      <dc:date>2016-05-12T07:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512308#M1206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vincent,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CST tool is compiled for PowerPC ARCH(big endian) by default, please compile CST tool with "make ARCH=arm" for ARM platform.&lt;/P&gt;&lt;P&gt;Please use the latest CST tool from SDK 1.9, if you use the git tree, please use the source commit ID "65f79eb1443211826a58ff225e86b251af5f0e12".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Have a great day,&lt;BR /&gt;Yiping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2016 08:38:26 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512308#M1206</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2016-05-12T08:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512309#M1207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the information I'll try it right away.&lt;/P&gt;&lt;P&gt;However I am very new to Yocto and using NXP SDK 1.9, and I don't know how to tell bitbake (or modify the recipe) to add the ARCH=arm parameter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2016 09:01:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512309#M1207</guid>
      <dc:creator>vsiles</dc:creator>
      <dc:date>2016-05-12T09:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512310#M1208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I patched the cst Makefile to change ARCH ?= powerpc to ARCH = arm&lt;/P&gt;&lt;P&gt;With it, the header has indeed changed and looks like the modification of the endianness I was doing. So I tried with the new header (untouched) and it still fails with error 0x341.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the change in ARCH, should I regenerate my OPTMK key (I hope not, it's burnt...) and SRK key or did the change only affected uni_sign ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2016 09:34:34 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512310#M1208</guid>
      <dc:creator>vsiles</dc:creator>
      <dc:date>2016-05-12T09:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: CSF Header: RSA Signature</title>
      <link>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512311#M1209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My bad, I forgot to fix one of my script.&lt;/P&gt;&lt;P&gt;SecMon.HPSR now shows Trusted \o/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much &lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/yipingwang"&gt;yipingwang&lt;/A&gt;​ !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2016 10:20:50 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/CSF-Header-RSA-Signature/m-p/512311#M1209</guid>
      <dc:creator>vsiles</dc:creator>
      <dc:date>2016-05-12T10:20:50Z</dc:date>
    </item>
  </channel>
</rss>

