<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Address Values in Blocks in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969632#M144423</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Community.&lt;/P&gt;&lt;P&gt;I try to secure u-boot for iMX6UL board and I have a question about High Assurance Boot (HABv4).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I obtained .csf file after sign the u-boot, kernel and SPL. When I&amp;nbsp; examine into this csf files, I saw the address values. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;u-boot-ivt.img.csf&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;&lt;STRONG&gt;Blocks = 0x177fffc0 0x0000 0x00058020 "u-boot-ivt.img"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;SPL.csf:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;&lt;STRONG&gt;Blocks = 0x00907400 0x00000000 0x0000bc00 "SPL"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Unlock]&lt;/P&gt;&lt;P&gt;Engine = CAAM&lt;BR /&gt;Features = RNG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;EM&gt;&lt;STRONG&gt;zImage-ivt.csf:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;&lt;STRONG&gt;Blocks = 0x82000000 0x0000 0x6ad020 "zImage-ivt"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is this :&lt;/P&gt;&lt;P&gt;Where do the address values in these blocks come from? I want to know about them. I'd appreciate any help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Oct 2019 11:25:33 GMT</pubDate>
    <dc:creator>memrekaraaslan</dc:creator>
    <dc:date>2019-10-25T11:25:33Z</dc:date>
    <item>
      <title>Address Values in Blocks</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969632#M144423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Community.&lt;/P&gt;&lt;P&gt;I try to secure u-boot for iMX6UL board and I have a question about High Assurance Boot (HABv4).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I obtained .csf file after sign the u-boot, kernel and SPL. When I&amp;nbsp; examine into this csf files, I saw the address values. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;u-boot-ivt.img.csf&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;&lt;STRONG&gt;Blocks = 0x177fffc0 0x0000 0x00058020 "u-boot-ivt.img"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;SPL.csf:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;&lt;STRONG&gt;Blocks = 0x00907400 0x00000000 0x0000bc00 "SPL"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Unlock]&lt;/P&gt;&lt;P&gt;Engine = CAAM&lt;BR /&gt;Features = RNG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;EM&gt;&lt;STRONG&gt;zImage-ivt.csf:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;&lt;STRONG&gt;Blocks = 0x82000000 0x0000 0x6ad020 "zImage-ivt"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is this :&lt;/P&gt;&lt;P&gt;Where do the address values in these blocks come from? I want to know about them. I'd appreciate any help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2019 11:25:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969632#M144423</guid>
      <dc:creator>memrekaraaslan</dc:creator>
      <dc:date>2019-10-25T11:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Address Values in Blocks</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969633#M144424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; Look at Appendix E (Extracting U-boot data for CSF) of app note Secure Boot on i.MX 50, i.MX 53, &lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;i.MX 6 and i.MX 7 Series using HABv4, Rev. 2, 05/2018&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;A class="link-titled" href="https://www.nxp.com/docs/en/application-note/AN4581.pdf" title="https://www.nxp.com/docs/en/application-note/AN4581.pdf"&gt;https://www.nxp.com/docs/en/application-note/AN4581.pdf&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Have a great day,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Yuri&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Note:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;- If this post answers your question, please click the "Mark Correct" button. Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;- We are following threads for 7 weeks after the last post, later replies are ignored&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Please open a new thread and refer to the closed one, if you have a related question at a later point in time.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2019 09:10:28 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969633#M144424</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2019-10-28T09:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Address Values in Blocks</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969634#M144425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello again.&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;I solved the problem . Since my development card is DART-6UL, so I was signing with mx6ul. But I found out my chip is mx6ull. Therefore, when I sign with mx6ull, HAB events do not appear.&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;I followed this document :&amp;nbsp;&lt;A href="http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL"&gt;http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL&lt;/A&gt;&amp;nbsp;for Secure Boot.&amp;nbsp;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;=&amp;gt; hab_status&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;BR /&gt;No HAB Events Found!&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;After this message, I noticed something and I have question marks in my head.&amp;nbsp; I tested all the conditions and saw the result:&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;If I have the SPL signed (SPL_signed) file on the SD card, it doesn't matter if u-boot and zImage are signed or not. If the SPL is signed again, I do not receive HAB events. However, if the SPL is unsigned, then I display HAB events even if u-boot and zImage are signed. I tried all the combinations of this trio and I got this result.&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;SPL&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;u-boot&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;zImage&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;HAB Events&lt;/STRONG&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;1)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;signed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;signed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;signed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;No HAB Events Found&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;2)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;signed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; X&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;X&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;SPAN&gt;No HAB Events Found&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; 3)&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unsigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;X&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;X&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;HAB Events occurs&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;SPAN&gt;X : doesn't care&amp;nbsp; (signed or unsigned)&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;SPAN&gt;My question is: Why is only SPL's signature checked?&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;SPAN&gt;Does this mean that the device is ready to "closed" when HAB events do not occur (No HAB Events Found!) ?&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2019 13:39:11 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969634#M144425</guid>
      <dc:creator>memrekaraaslan</dc:creator>
      <dc:date>2019-11-05T13:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Address Values in Blocks</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969635#M144426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; i.MX boot ROM really checks only the primary bootloader; further activities&lt;/P&gt;&lt;P&gt;regarding trust extension are performed by secondary booloader and are application&amp;nbsp;&lt;/P&gt;&lt;P&gt;dependent. Look at app&amp;nbsp; note "HABv4 RVT Guidelines and Recommendations"&lt;/P&gt;&lt;P&gt;for more details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN12263.pdf" target="test_blank"&gt;https://www.nxp.com/docs/en/application-note/AN12263.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Yuri.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2019 04:11:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Address-Values-in-Blocks/m-p/969635#M144426</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2019-11-06T04:11:09Z</dc:date>
    </item>
  </channel>
</rss>

