<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IMX6UL HAB encryption in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884967#M134097</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I followed every single step of the following guide, but my device doesn't boot. My device is closed and signing works perfect but when i try to encrypt it just doesn't work. Can somebody help me out please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in doc/imx/hab/habv4/guides/mx6_mx7_encrypted_boot.txt ( i skipped some parts &lt;SPAN class="lia-unicode-emoji" title=":disappointed_face:"&gt;&lt;LI-EMOJI id="lia_disappointed-face" title=":disappointed_face:"&gt;&lt;/LI-EMOJI&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;+==========================================================+ 
+&amp;nbsp;&amp;nbsp; i.MX6, i.MX7 U-Boot Encrypted Boot guide using HABv4&amp;nbsp;&amp;nbsp; +
+==========================================================+
CONFIG_FAT_WRITE=y
CONFIG_CMD_DEKBLOB=y
CONFIG_CDM_PRIBLOB=y
- Kconfig&amp;nbsp;&amp;nbsp;&amp;nbsp; 
File systems -&amp;gt; Enable FAT filesystem support-&amp;gt; Enable FAT filesystem&amp;nbsp;&amp;nbsp; write support&amp;nbsp;&amp;nbsp; 
ARM architecture -&amp;gt; Support the 'dek_blob' command&amp;nbsp;&amp;nbsp; 
ARM architecture -&amp;gt; Support the set_priblob_bitfield command&amp;nbsp;&amp;nbsp;
&amp;nbsp; 
1.3 Compile the CST to enable the encrypting feature 
----------------------------------------------------
The encrypting feature is not enabled by default. 
You need to execute the following commands to enable it:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ sudo apt-get install libssl-dev openssl&amp;nbsp;&amp;nbsp; 
$ cd &amp;lt;CST install directory&amp;gt;/code/back_end/src&amp;nbsp;&amp;nbsp; 
$ gcc -o cst_encrypted -I ../hdr -L ../../../linux64/lib *.c&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -lfrontend -lcrypto&amp;nbsp;&amp;nbsp; 
$ cp cst_encrypted ../../../&amp;lt;where your original CST executable is&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 

1.4.1 csf_u-boot_enc.txt 
-------------------------&amp;nbsp;&amp;nbsp; 
- Modify the Authenticate Data command to only cover IVT and DCD:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Blocks = 0x877ff400 0x00000000 0x00000c00 "u-boot-dtb.imx"&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Blob Address = Authenticate Start Address + Padding + length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
= 0x877ff400 + 0x2000 + 0x9ec00 = 0x878a0000&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ cp u-boot-dtb.imx u-boot-dtb.imx-enc&amp;nbsp;&amp;nbsp; 
Block = (Authenticate start addr + 0xc00) 0xc00 (length - 0xc00) u-boot-dtb.imx-enc
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = (0x877ff400 + 0xc00) 0xc00 (0x9ec00 - 0xc00) u-boot-dtb.imx-enc
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0x87800000 0xc00 0x9e000 u-boot-dtb.imx-enc&amp;nbsp; 

1.4.2 csf_u-boot_sign_enc.txt 
-----------------------------&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Blocks = 0x877ff400 0x000 0x0009ec00 "u-boot-dtb.imx-enc"&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Key = "dek-dummy.bin"&amp;nbsp;&amp;nbsp; Blocks = 0x87800000 0x00000c00 0x9e000 "u-boot-dtb.imx-dummy"&amp;nbsp; 
1.5 Encrypt the U-Boot image 
----------------------------
The image is encrypted using the Code Signing Tool.
It generates also a CSF binary and a dek.bin file, which will be used on the future steps below.&amp;nbsp; 
- Create the CSF binary file and encrypt the U-Boot image&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ ./cst_encrypted -i csf_u-boot_enc.txt -o csf_u-boot_enc.bin
&amp;nbsp; 
1.6 Sign the encrypted U-Boot image 
-----------------------------------
$ ./cst_encrypted -i csf_u-boot_sign_enc.txt -o csf_u-boot_sign_enc.bin

1.7 Swap Nonce/MAC from csf_u-boot_enc.bin to csf_u-boot_sign_enc.bin 
---------------------------------------------------------------------
First, calculate Nonce/MAC size based on MAC bytes value in CSF. 
As Mac bytes is 16:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Nonce/MAC size = Nonce size + MAC bytes + CSF header for Nonce/Mac
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 12 + 16 + 8 = 36 bytes&amp;nbsp; 
Then, calculate Nonce/MAC offset in CSF:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
MAC offset = csf_u-boot-enc.bin size - Nonce/MAC size&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
= 3972 - 36 = 3936 Bytes&amp;nbsp; 
In the next step, extract Nonce/NAC from the first CSF:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ dd if=csf_u-boot_enc.bin of=noncemac.bin bs=1 skip=3936 count=36
Finally, replace the MAC of csf_u-boot_sign_enc.bin with the extracted one:
$ dd if=noncemac.bin of=csf_u-boot_sign_enc.bin bs=1 seek=3936 count=36

1.8 Generate encryptedu-boot with no dek 
----------------------------------------
First, pad the CSF to 0x2000:
$ objcopy -I binary -O binary --pad-to 0x2000 --gap-fill=0xff
csf_u-boot_sign_enc.bin csf_u-boot_sign_enc_padded.bin
Then, append this file to the encrypted U-Boot image:
$ cat u-boot-dtb.imx-enc csf_u-boot_sign_enc_padded.bin &amp;gt;&amp;nbsp;&amp;nbsp; u-boot_encrypted_no_dek.bin
Pad this new file to width+offset (0x9ec00 + 0x2000 = 0xa0c00):
$ objcopy -I binary -O binary --pad-to 0xa0c00 --gap-fill=0x00&amp;nbsp;
u-boot_encrypted_no_dek.bin u-boot_encrypted_no_dek_padded.bin

1.9 Generate the DEK Blob 
-------------------------
Run the following commands:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
=&amp;gt; mmc list&amp;nbsp;&amp;nbsp; FSL_SDHC: 0 (SD)&amp;nbsp;&amp;nbsp; #index to use for mmc in following commands&amp;nbsp;&amp;nbsp; 
=&amp;gt; fatload mmc 0 0x80800000 dek.bin&amp;nbsp;&amp;nbsp; =&amp;gt; dek_blob 0x80800000 0x80801000 128&amp;nbsp;&amp;nbsp; 
=&amp;gt; fatwrite mmc 0 0x80801000 dek_blob.bin 0x48&amp;nbsp; 

1.10 Finalize the encrypted U-Boot image 
----------------------------------------
$ cat u-boot_encrypted_no_dek_padded.bin dek_blob.bin &amp;gt; u-boot_encrypted.bin
If the image does not boot, please verify the size of your U-Boot image,
the length specified into CSF and the padding values.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 19 Jan 2019 23:36:30 GMT</pubDate>
    <dc:creator>omar_aberkan</dc:creator>
    <dc:date>2019-01-19T23:36:30Z</dc:date>
    <item>
      <title>IMX6UL HAB encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884967#M134097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I followed every single step of the following guide, but my device doesn't boot. My device is closed and signing works perfect but when i try to encrypt it just doesn't work. Can somebody help me out please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in doc/imx/hab/habv4/guides/mx6_mx7_encrypted_boot.txt ( i skipped some parts &lt;SPAN class="lia-unicode-emoji" title=":disappointed_face:"&gt;&lt;LI-EMOJI id="lia_disappointed-face" title=":disappointed_face:"&gt;&lt;/LI-EMOJI&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;+==========================================================+ 
+&amp;nbsp;&amp;nbsp; i.MX6, i.MX7 U-Boot Encrypted Boot guide using HABv4&amp;nbsp;&amp;nbsp; +
+==========================================================+
CONFIG_FAT_WRITE=y
CONFIG_CMD_DEKBLOB=y
CONFIG_CDM_PRIBLOB=y
- Kconfig&amp;nbsp;&amp;nbsp;&amp;nbsp; 
File systems -&amp;gt; Enable FAT filesystem support-&amp;gt; Enable FAT filesystem&amp;nbsp;&amp;nbsp; write support&amp;nbsp;&amp;nbsp; 
ARM architecture -&amp;gt; Support the 'dek_blob' command&amp;nbsp;&amp;nbsp; 
ARM architecture -&amp;gt; Support the set_priblob_bitfield command&amp;nbsp;&amp;nbsp;
&amp;nbsp; 
1.3 Compile the CST to enable the encrypting feature 
----------------------------------------------------
The encrypting feature is not enabled by default. 
You need to execute the following commands to enable it:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ sudo apt-get install libssl-dev openssl&amp;nbsp;&amp;nbsp; 
$ cd &amp;lt;CST install directory&amp;gt;/code/back_end/src&amp;nbsp;&amp;nbsp; 
$ gcc -o cst_encrypted -I ../hdr -L ../../../linux64/lib *.c&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -lfrontend -lcrypto&amp;nbsp;&amp;nbsp; 
$ cp cst_encrypted ../../../&amp;lt;where your original CST executable is&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 

1.4.1 csf_u-boot_enc.txt 
-------------------------&amp;nbsp;&amp;nbsp; 
- Modify the Authenticate Data command to only cover IVT and DCD:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Blocks = 0x877ff400 0x00000000 0x00000c00 "u-boot-dtb.imx"&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Blob Address = Authenticate Start Address + Padding + length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
= 0x877ff400 + 0x2000 + 0x9ec00 = 0x878a0000&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ cp u-boot-dtb.imx u-boot-dtb.imx-enc&amp;nbsp;&amp;nbsp; 
Block = (Authenticate start addr + 0xc00) 0xc00 (length - 0xc00) u-boot-dtb.imx-enc
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = (0x877ff400 + 0xc00) 0xc00 (0x9ec00 - 0xc00) u-boot-dtb.imx-enc
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0x87800000 0xc00 0x9e000 u-boot-dtb.imx-enc&amp;nbsp; 

1.4.2 csf_u-boot_sign_enc.txt 
-----------------------------&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Blocks = 0x877ff400 0x000 0x0009ec00 "u-boot-dtb.imx-enc"&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Key = "dek-dummy.bin"&amp;nbsp;&amp;nbsp; Blocks = 0x87800000 0x00000c00 0x9e000 "u-boot-dtb.imx-dummy"&amp;nbsp; 
1.5 Encrypt the U-Boot image 
----------------------------
The image is encrypted using the Code Signing Tool.
It generates also a CSF binary and a dek.bin file, which will be used on the future steps below.&amp;nbsp; 
- Create the CSF binary file and encrypt the U-Boot image&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ ./cst_encrypted -i csf_u-boot_enc.txt -o csf_u-boot_enc.bin
&amp;nbsp; 
1.6 Sign the encrypted U-Boot image 
-----------------------------------
$ ./cst_encrypted -i csf_u-boot_sign_enc.txt -o csf_u-boot_sign_enc.bin

1.7 Swap Nonce/MAC from csf_u-boot_enc.bin to csf_u-boot_sign_enc.bin 
---------------------------------------------------------------------
First, calculate Nonce/MAC size based on MAC bytes value in CSF. 
As Mac bytes is 16:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
Nonce/MAC size = Nonce size + MAC bytes + CSF header for Nonce/Mac
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 12 + 16 + 8 = 36 bytes&amp;nbsp; 
Then, calculate Nonce/MAC offset in CSF:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
MAC offset = csf_u-boot-enc.bin size - Nonce/MAC size&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
= 3972 - 36 = 3936 Bytes&amp;nbsp; 
In the next step, extract Nonce/NAC from the first CSF:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
$ dd if=csf_u-boot_enc.bin of=noncemac.bin bs=1 skip=3936 count=36
Finally, replace the MAC of csf_u-boot_sign_enc.bin with the extracted one:
$ dd if=noncemac.bin of=csf_u-boot_sign_enc.bin bs=1 seek=3936 count=36

1.8 Generate encryptedu-boot with no dek 
----------------------------------------
First, pad the CSF to 0x2000:
$ objcopy -I binary -O binary --pad-to 0x2000 --gap-fill=0xff
csf_u-boot_sign_enc.bin csf_u-boot_sign_enc_padded.bin
Then, append this file to the encrypted U-Boot image:
$ cat u-boot-dtb.imx-enc csf_u-boot_sign_enc_padded.bin &amp;gt;&amp;nbsp;&amp;nbsp; u-boot_encrypted_no_dek.bin
Pad this new file to width+offset (0x9ec00 + 0x2000 = 0xa0c00):
$ objcopy -I binary -O binary --pad-to 0xa0c00 --gap-fill=0x00&amp;nbsp;
u-boot_encrypted_no_dek.bin u-boot_encrypted_no_dek_padded.bin

1.9 Generate the DEK Blob 
-------------------------
Run the following commands:&amp;nbsp;&amp;nbsp;&amp;nbsp; 
=&amp;gt; mmc list&amp;nbsp;&amp;nbsp; FSL_SDHC: 0 (SD)&amp;nbsp;&amp;nbsp; #index to use for mmc in following commands&amp;nbsp;&amp;nbsp; 
=&amp;gt; fatload mmc 0 0x80800000 dek.bin&amp;nbsp;&amp;nbsp; =&amp;gt; dek_blob 0x80800000 0x80801000 128&amp;nbsp;&amp;nbsp; 
=&amp;gt; fatwrite mmc 0 0x80801000 dek_blob.bin 0x48&amp;nbsp; 

1.10 Finalize the encrypted U-Boot image 
----------------------------------------
$ cat u-boot_encrypted_no_dek_padded.bin dek_blob.bin &amp;gt; u-boot_encrypted.bin
If the image does not boot, please verify the size of your U-Boot image,
the length specified into CSF and the padding values.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;DIV style="display: none;"&gt;2.8.0.0&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2019 23:36:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884967#M134097</guid>
      <dc:creator>omar_aberkan</dc:creator>
      <dc:date>2019-01-19T23:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: IMX6UL HAB encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884968#M134098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one can create service request for obtaining encrypted boot example&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/docs/DOC-329745"&gt;How to submit a new question for NXP Support&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2019 23:34:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884968#M134098</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2019-01-21T23:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: IMX6UL HAB encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884969#M134099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have stucked at command :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;$&amp;nbsp; gcc -o cst_encrypted -I ../hdr -L ../../../linux64/lib *.c&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -lfrontend -lcrypto&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/tmp/ccuAQQCf.o: In function `sk_X509_new_null':&lt;BR /&gt;adapt_layer_openssl.c:(.text+0x5): undefined reference to `OPENSSL_sk_new_null'&lt;BR /&gt;/tmp/ccuAQQCf.o: In function `sk_X509_push':&lt;BR /&gt;adapt_layer_openssl.c:(.text+0x2a): undefined reference to `OPENSSL_sk_push'&lt;BR /&gt;/tmp/ccuAQQCf.o: In function `sk_X509_pop_free':&lt;BR /&gt;adapt_layer_openssl.c:(.text+0x4f): undefined reference to `OPENSSL_sk_pop_free'&lt;BR /&gt;/tmp/ccuAQQCf.o: In function `gen_sig_data_ecdsa':&lt;BR /&gt;adapt_layer_openssl.c:(.text+0xa4f): undefined reference to `EVP_PKEY_get0_EC_KEY'&lt;BR /&gt;adapt_layer_openssl.c:(.text+0xa8d): undefined reference to `EVP_PKEY_get0_EC_KEY'&lt;BR /&gt;adapt_layer_openssl.c:(.text+0xbda): undefined reference to `ECDSA_SIG_get0'&lt;BR /&gt;/tmp/cc2DOb8b.o: In function `generate_hash':&lt;BR /&gt;openssl_helper.c:(.text+0x1f): undefined reference to `EVP_MD_CTX_new'&lt;BR /&gt;/tmp/cc2DOb8b.o: In function `sign_data':&lt;BR /&gt;openssl_helper.c:(.text+0x4b3): undefined reference to `EVP_MD_CTX_new'&lt;BR /&gt;openssl_helper.c:(.text+0x520): undefined reference to `EVP_MD_CTX_free'&lt;BR /&gt;openssl_helper.c:(.text+0x5a6): undefined reference to `EVP_MD_CTX_free'&lt;BR /&gt;openssl_helper.c:(.text+0x5c5): undefined reference to `EVP_MD_CTX_free'&lt;BR /&gt;/tmp/cc2DOb8b.o: In function `ver_sig_data':&lt;BR /&gt;openssl_helper.c:(.text+0xc8b): undefined reference to `EVP_PKEY_get0_RSA'&lt;BR /&gt;openssl_helper.c:(.text+0xd49): undefined reference to `ECDSA_SIG_set0'&lt;BR /&gt;openssl_helper.c:(.text+0xd78): undefined reference to `EVP_PKEY_get0_EC_KEY'&lt;BR /&gt;../../../linux64/lib/libfrontend.a(srk_helper.o): In function `srk_entry_pkcs1':&lt;BR /&gt;srk_helper.c:(.text+0x90): undefined reference to `EVP_PKEY_get0_RSA'&lt;BR /&gt;srk_helper.c:(.text+0xa8): undefined reference to `RSA_get0_key'&lt;BR /&gt;../../../linux64/lib/libfrontend.a(srk_helper.o): In function `srk_entry_ec':&lt;BR /&gt;srk_helper.c:(.text+0x564): undefined reference to `EVP_PKEY_get0_EC_KEY'&lt;BR /&gt;srk_helper.c:(.text+0x5d3): undefined reference to `EVP_PKEY_get0_EC_KEY'&lt;BR /&gt;/usr/bin/ld: ../../../linux64/lib/libfrontend.a(err.o): unrecognized relocation (0x2a) in section `.text'&lt;BR /&gt;/usr/bin/ld: final link failed: Bad value&lt;BR /&gt;collect2: error: ld returned 1 exit status&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance ,&lt;/P&gt;&lt;P&gt;Pramod&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Mar 2019 05:19:16 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884969#M134099</guid>
      <dc:creator>PramodKumar</dc:creator>
      <dc:date>2019-03-07T05:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: IMX6UL HAB encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884970#M134100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pramod&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one can look at AN12056 &lt;A href="https://www.nxp.com/docs/en/application-note/AN12056.pdf" target="_blank"&gt;&lt;STRONG&gt;Encrypted Boot on HABv4 and CAAM Enabled Devices &lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Mar 2019 07:41:26 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/IMX6UL-HAB-encryption/m-p/884970#M134100</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2019-03-07T07:41:26Z</dc:date>
    </item>
  </channel>
</rss>

