<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Debugging Secure Boot on NXP 1043 in Layerscape</title>
    <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880525#M14404</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tlabs_0-1717495362521.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/282360iD3E176055AC6F445/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tlabs_0-1717495362521.png" alt="Tlabs_0-1717495362521.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So means this is wrong?&lt;/P&gt;&lt;P&gt;Is there a way testing the SRKH without fusing it?&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jun 2024 11:44:32 GMT</pubDate>
    <dc:creator>Tlabs</dc:creator>
    <dc:date>2024-06-04T11:44:32Z</dc:date>
    <item>
      <title>Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1879947#M14394</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am trying to debug my secure boot implementation. And it looks like that OTMK and SRKH has been written successfull:&lt;/P&gt;&lt;P&gt;=&amp;gt; md 0x1e80234&lt;BR /&gt;01e80234: ffffffff ffffffff ffffffff ffffffff&lt;BR /&gt;01e80244: ffffffff ffffffff ffffffff ffffffff&amp;nbsp;&lt;BR /&gt;01e80254: 6348455f e12a27d5 49968d2b 77ab26b1&lt;BR /&gt;01e80264: 25a8f2d7 47f364af 6442d2aa d8efea8&lt;/P&gt;&lt;P&gt;01e80274: 00000000 00000000 00000000 00000000&amp;nbsp;&lt;BR /&gt;01e80284: 00000000 ffffffff ffffffff ffffffff&lt;BR /&gt;01e80294: ffffffff ffffffff ffffffff ffffffff&lt;BR /&gt;01e802a4: ffffffff 00000000 00000000 00000000&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if i look to the SecMon_HP Status Register i can see:&lt;/P&gt;&lt;P&gt;=&amp;gt; md.b 0x1e90014 4&lt;BR /&gt;01e90014: 80 00 29 00&lt;/P&gt;&lt;P&gt;ZMK_ZERO: 1&lt;/P&gt;&lt;P&gt;OTPMK_ZERO: 0&lt;/P&gt;&lt;P&gt;OTPMK_SYNDROME: 0&lt;/P&gt;&lt;P&gt;SECURITY_CONFIG: 0010&lt;/P&gt;&lt;P&gt;SSM_STATE: 1001 --&amp;gt; looks like the ISBC reset the board due to a SRKH hash mismatch.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;&lt;/P&gt;&lt;P&gt;=&amp;gt; md.b 0x1ee0204&lt;BR /&gt;01ee0204: 00 00 00 00 --&amp;gt; no errors&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone an idea how i can move forward?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 15:30:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1879947#M14394</guid>
      <dc:creator>Tlabs</dc:creator>
      <dc:date>2024-06-03T15:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880256#M14397</link>
      <description>&lt;P&gt;SRKH and OTPMK should be carefully written keeping in mind the SFP Block Endianness. If SRKH and OTPMK are written using Core, SRKH and OTPMK need to be swapped. However, if SRKH and OTPMK are written using DAP or SFP, swap is not required.&lt;BR /&gt;Refer the following table for details.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yipingwang_0-1717471099099.png" style="width: 586px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/282297i654669DC6C7BB4E3/image-dimensions/586x104?v=v2" width="586" height="104" role="button" title="yipingwang_0-1717471099099.png" alt="yipingwang_0-1717471099099.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For example:&lt;BR /&gt;Assuming following SRKH values are generated:&lt;BR /&gt;SRK (Public Key) Hash:&lt;BR /&gt;fdc2fed4317f569e1828425ce87b5cfd34beab8fdf792a702dff85e132a29687&lt;BR /&gt;SFP SRKHR0 = fdc2fed4&lt;BR /&gt;SFP SRKHR1 = 317f569e&lt;BR /&gt;SFP SRKHR2 = 1828425c&lt;BR /&gt;SFP SRKHR3 = e87b5cfd&lt;BR /&gt;SFP SRKHR4 = 34beab8f&lt;BR /&gt;SFP SRKHR5 = df792a70&lt;BR /&gt;SFP SRKHR6 = 2dff85e1&lt;BR /&gt;SFP SRKHR7 = 32a29687&lt;BR /&gt;Execute following commands at the CCS console to permanently write SRKH using DAP/SFP:&lt;BR /&gt;ccs::write_mem 32 0x1e80254 4 0 0xfdc2fed4&lt;BR /&gt;ccs::write_mem 32 0x1e80258 4 0 0x317f569e&lt;BR /&gt;ccs::write_mem 32 0x1e8025c 4 0 0x1828425c&lt;BR /&gt;ccs::write_mem 32 0x1e80260 4 0 0xe87b5cfd&lt;BR /&gt;ccs::write_mem 32 0x1e80264 4 0 0x34beab8f&lt;BR /&gt;ccs::write_mem 32 0x1e80268 4 0 0xdf792a70&lt;BR /&gt;ccs::write_mem 32 0x1e8026c 4 0 0x2dff85e1&lt;BR /&gt;ccs::write_mem 32 0x1e80270 4 0 0x32a29687&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Execute following commands at the U-Boot console to permanently write SRKH using core:&lt;BR /&gt;mw.l 0x1e80254 0xd4fec2fd&lt;BR /&gt;mw.l 0x1e80258 0x9e567f31&lt;BR /&gt;mw.l 0x1e8025c 0x5c422818&lt;BR /&gt;mw.l 0x1e80260 0xfd5c7be8&lt;BR /&gt;mw.l 0x1e80264 0x8fabbe34&lt;/P&gt;
&lt;P&gt;mw.l 0x1e80268 0x702a79df&lt;BR /&gt;mw.l 0x1e8026c 0xe185ff2d&lt;BR /&gt;mw.l 0x1e80270 0x8796a232&lt;BR /&gt;mw.l 0x1e80020 0x2&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 03:21:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880256#M14397</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2024-06-04T03:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880443#M14401</link>
      <description>&lt;P&gt;Thank you for the answer.&lt;/P&gt;&lt;P&gt;1. I used the CST provisioning image. I configured the SRKH in the provisioning configuration file exactly like the output of the make script. i hope this is correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. I tried to read the SECMON_HP register with u-boot using md.b is this correct?&lt;/P&gt;&lt;P&gt;3. What is the bit 15-12 SECURITY_CONFIG in the SECMON_HP standing for exactly? I couldnt find it in the documentation.&lt;/P&gt;&lt;P&gt;4. In my case the SSM_STATE is 1001 what does this mean?&lt;/P&gt;&lt;P&gt;5. When i read the SCRATCHHW2 register (with SBEN=1, BOOT_HO=0 in the RCW) it is the adress of the CSF Header of the ESBC image correct?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 08:25:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880443#M14401</guid>
      <dc:creator>Tlabs</dc:creator>
      <dc:date>2024-06-04T08:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880511#M14402</link>
      <description>&lt;P&gt;&lt;SPAN&gt;SRK (Public Key) Hash:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;a0f283ace4cf3c8fa893950ea69b74992bf065b042b15fc9a1f3860e47b6bb02&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR0 = a0f283ac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;SFP SRKHR1 = e4cf3c8f&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR2 = a893950e&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR3 = a69b7499&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR4 = 2bf065b0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR5 = 42b15fc9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR6 = a1f3860e&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;SFP SRKHR7 = 47b6bb02&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The fuse provisioning utility is running on the ARM core, so it is same as uboot. The SRKH value needs to be in "reverse order_1".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i.e. customer&amp;nbsp; input_fuse_file.txt should be # Super root key hash [Optional]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SRKH_0=ac83f2a0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SRKH_1=8f3ccfe4&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 09:47:01 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880511#M14402</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2024-06-04T09:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880525#M14404</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tlabs_0-1717495362521.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/282360iD3E176055AC6F445/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tlabs_0-1717495362521.png" alt="Tlabs_0-1717495362521.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So means this is wrong?&lt;/P&gt;&lt;P&gt;Is there a way testing the SRKH without fusing it?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 11:44:32 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1880525#M14404</guid>
      <dc:creator>Tlabs</dc:creator>
      <dc:date>2024-06-04T11:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1881385#M14406</link>
      <description>&lt;P&gt;Can anyone give me a short feedback please&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 08:43:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1881385#M14406</guid>
      <dc:creator>Tlabs</dc:creator>
      <dc:date>2024-06-05T08:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1884881#M14422</link>
      <description>&lt;P&gt;Please configure the following options in RCW.&lt;/P&gt;
&lt;P&gt;SB_EN=1&amp;nbsp;&lt;BR /&gt;BOOT_HO=1&lt;/P&gt;
&lt;P&gt;Then refer to section "6.1.1.5.2.4.1 Program SRKH mirror registers in CodeWarrior environment" in the attached document to program&amp;nbsp;SRKH mirror registers with CCS + CodeWarrior TAP.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 07:44:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1884881#M14422</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2024-06-11T07:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging Secure Boot on NXP 1043</title>
      <link>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1884996#M14423</link>
      <description>&lt;P&gt;Your fuse &lt;SPAN&gt;provisioning input file is correct, no need to do byte swapping, atf will do the swapping work.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Secure boot u-boot cannot be stopped at all, in your previous description, you stopped u-boot to read registers value. So it means you are not using secure boot image(atf+u-boot) at all.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 08:58:08 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/Debugging-Secure-Boot-on-NXP-1043/m-p/1884996#M14423</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2024-06-11T08:58:08Z</dc:date>
    </item>
  </channel>
</rss>

