<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic imx6 secure boot questions in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot-questions/m-p/1134084#M160991</link>
    <description>&lt;P&gt;Hi everyone!&lt;/P&gt;&lt;P&gt;I have different questions about secure boot on imx6ull (that runs linux compiled with Yocto - release sumo).&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;According to the related guide (&lt;A href="http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL#Secure_the_device" target="_blank"&gt;http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL#Secure_the_device&lt;/A&gt;) the paragraph 3.5 says that &lt;EM&gt;HAB does not consider the duration of the PKI&lt;/EM&gt;. So if the PKI expires, what happens? is the system still bootable?&lt;/LI&gt;&lt;LI&gt;Is it possible/safe to burn efuses in an automatic way without enter manually in the uboot command line? maybe entering the&lt;STRONG&gt; fuse prog command&lt;/STRONG&gt; in the &lt;STRONG&gt;bootcmd&lt;/STRONG&gt; u-boot variable?&lt;/LI&gt;&lt;LI&gt;I'm wondering if there is some many-time-programmable memory to use for storing the PKI instead of efuses (in the case the PKI needs to be updated). So, is it possible to make secure boot without burning efuses?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thank you all in advance!&lt;/P&gt;</description>
    <pubDate>Wed, 02 Sep 2020 10:03:01 GMT</pubDate>
    <dc:creator>kwroot</dc:creator>
    <dc:date>2020-09-02T10:03:01Z</dc:date>
    <item>
      <title>imx6 secure boot questions</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot-questions/m-p/1134084#M160991</link>
      <description>&lt;P&gt;Hi everyone!&lt;/P&gt;&lt;P&gt;I have different questions about secure boot on imx6ull (that runs linux compiled with Yocto - release sumo).&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;According to the related guide (&lt;A href="http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL#Secure_the_device" target="_blank"&gt;http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL#Secure_the_device&lt;/A&gt;) the paragraph 3.5 says that &lt;EM&gt;HAB does not consider the duration of the PKI&lt;/EM&gt;. So if the PKI expires, what happens? is the system still bootable?&lt;/LI&gt;&lt;LI&gt;Is it possible/safe to burn efuses in an automatic way without enter manually in the uboot command line? maybe entering the&lt;STRONG&gt; fuse prog command&lt;/STRONG&gt; in the &lt;STRONG&gt;bootcmd&lt;/STRONG&gt; u-boot variable?&lt;/LI&gt;&lt;LI&gt;I'm wondering if there is some many-time-programmable memory to use for storing the PKI instead of efuses (in the case the PKI needs to be updated). So, is it possible to make secure boot without burning efuses?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thank you all in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 10:03:01 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot-questions/m-p/1134084#M160991</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-02T10:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: imx6 secure boot questions</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot-questions/m-p/1134193#M161001</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/177425"&gt;@kwroot&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;1.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HAB on iMX doesn't verify the certificate period, so a signed image will continue &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;to boot on closed (locked) independent of certificate period set with CST tool.&lt;BR /&gt;&lt;BR /&gt;2.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; The i.MX fuses can be burned only once. So, the fuses are recommended to be burned &lt;BR /&gt;after / with system images transfer, using UUU (MFG tool). &lt;BR /&gt;&lt;BR /&gt;3.&lt;BR /&gt;&amp;nbsp; It impossible to make secure boot without burning efuses. SRK fuses contain SRK hashes,&lt;BR /&gt;which are verified by boot ROM.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Yuri.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 12:08:00 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot-questions/m-p/1134193#M161001</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2020-09-02T12:08:00Z</dc:date>
    </item>
  </channel>
</rss>

