<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Boot issue on imx6ull in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155568#M162115</link>
    <description>&lt;P&gt;Hi Igor,&lt;/P&gt;&lt;P&gt;I've seen the posts related to the "Error - CSF lies outside the image bounds" issue, but i'm still stacked. I checked all the step of HAB tutorial, and all seems correctly done. Could the problem be indexing related even if the unlocked system correctly boot?&lt;/P&gt;&lt;P&gt;You can find all the file &lt;STRONG&gt;&lt;EM&gt;.csf&lt;/EM&gt;&lt;/STRONG&gt; file used below.&lt;/P&gt;&lt;P&gt;------ var-default.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ u-boot-ivt.img.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x85ffffc0 0x0000 0x00057020 "u-boot-ivt.img"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ SPL.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x00908400 0x00000000 0x0000ac00 "SPL"&lt;/P&gt;&lt;P&gt;[Unlock]&lt;BR /&gt;Engine = CAAM&lt;BR /&gt;Features = RNG&lt;/P&gt;&lt;P&gt;------ zImage-ivt.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x82000000 0x0000 0x6a3020 "zImage-ivt"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you give me some further hint?&lt;/P&gt;&lt;P&gt;Thank you for the support,&lt;/P&gt;&lt;P&gt;Best&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Sep 2020 13:18:56 GMT</pubDate>
    <dc:creator>kwroot</dc:creator>
    <dc:date>2020-09-18T13:18:56Z</dc:date>
    <item>
      <title>Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1151395#M161577</link>
      <description>&lt;P&gt;Hi! I'm trying to implement secure boot on imx6ull (Yocto - sumo release). Using the related guide at this &lt;A href="http://variwiki.com/index.php?title=High_Assurance_Boot&amp;amp;release=RELEASE_SUMO_V1.1_DART-6UL#Secure_the_device" target="_self"&gt;link&lt;/A&gt;, no error shows up. In fact, after burning the public keys on efuses the hab_status resulted always ok even in the next boot (Secure boot disabled HAB Configuration: 0xf0, HAB State: 0x66 No HAB Events Found!). Considering that no HAB Events were found, i've burnt the last fuse (fuse prog 0 6 0x2), but now i'm not able to boot the system.&lt;/P&gt;&lt;P&gt;The error is the following:&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;## Flattened Device Tree blob at 83000000&lt;BR /&gt;Booting using the fdt blob at 0x83000000&lt;/P&gt;&lt;P&gt;Authenticate image from DDR location 0x82000000...&lt;BR /&gt;Check CSF for Write Data command before authenticating image&lt;BR /&gt;Error - CSF lies outside the image bounds&lt;BR /&gt;Authenticate zImage Fail, Please check&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;And the hab_status still not shows HAB events.&lt;/P&gt;&lt;P&gt;How can i solve this problem?&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 06:38:55 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1151395#M161577</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-18T06:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1151480#M161583</link>
      <description>&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;If i try to reflash with the same sd card i get this error:&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;Authenticate image from DDR location 0x82000000...&lt;BR /&gt;Check CSF for Write Data command before authenticating image&lt;/P&gt;&lt;P&gt;Secure boot enabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xcc, HAB State: 0x99&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0f 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x48&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_INDEX (0x0F)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;Authenticate zImage Fail, Please check&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 09:11:53 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1151480#M161583</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-10T09:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1152105#M161668</link>
      <description>&lt;P&gt;Hi kwroot&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for&amp;nbsp; "Error - CSF lies outside the image bounds" one can look at issues on&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors/HAB-on-i-MX6/m-p/279393" target="_blank"&gt;https://community.nxp.com/t5/i-MX-Processors/HAB-on-i-MX6/m-p/279393&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors/Why-I-am-getting-these-HAB-events-Dealing-with-QSPI-FLASH-offset/m-p/931293" target="_blank"&gt;https://community.nxp.com/t5/i-MX-Processors/Why-I-am-getting-these-HAB-events-Dealing-with-QSPI-FLASH-offset/m-p/931293&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step by step descriptions for using HAB :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://variwiki.com/index.php?title=High_Assurance_Boot" target="_blank"&gt;https://variwiki.com/index.php?title=High_Assurance_Boot&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://boundarydevices.com/high-assurance-boot-hab-dummies/" target="_blank"&gt;https://boundarydevices.com/high-assurance-boot-hab-dummies/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 11:08:28 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1152105#M161668</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2020-09-11T11:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1152143#M161670</link>
      <description>&lt;P&gt;Hi Igor,&lt;/P&gt;&lt;P&gt;I followed the HAB tutorial step by step. The Paragraph 3.10 says "Make sure there are not events before proceeding to the next step". But even if no HAB event were found, the system now is not booting. This means that i cannot be 100% sure that the HAB is correctly done until burning the SEC_CONFIG[1] fuse bit. Now i'm not confident to make further test on other imx6ull cpu's.&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is there some virtual safe-environment for make this kind of test?&lt;/LI&gt;&lt;LI&gt;The tutorial use the 2.3.3 cfu's version. I've used the cst 3.1.0. Could this be a problem?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thank you for your support.&lt;/P&gt;&lt;P&gt;Best&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 14:54:50 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1152143#M161670</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-17T14:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1154883#M162033</link>
      <description>&lt;P&gt;Dear Igor,&lt;/P&gt;&lt;P&gt;I look forward to your reply.&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 14:54:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1154883#M162033</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-17T14:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155124#M162058</link>
      <description>&lt;P&gt;Hi kwroot&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt;Is there some virtual safe-environment for make this kind of test?&lt;/P&gt;
&lt;P&gt;no&lt;/P&gt;
&lt;P&gt;&amp;gt;The tutorial use the 2.3.3 cfu's version. I've used the cst 3.1.0. Could this be a problem?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;cst 3.1.0 is latest version, it should not cause problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 01:28:27 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155124#M162058</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2020-09-18T01:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155568#M162115</link>
      <description>&lt;P&gt;Hi Igor,&lt;/P&gt;&lt;P&gt;I've seen the posts related to the "Error - CSF lies outside the image bounds" issue, but i'm still stacked. I checked all the step of HAB tutorial, and all seems correctly done. Could the problem be indexing related even if the unlocked system correctly boot?&lt;/P&gt;&lt;P&gt;You can find all the file &lt;STRONG&gt;&lt;EM&gt;.csf&lt;/EM&gt;&lt;/STRONG&gt; file used below.&lt;/P&gt;&lt;P&gt;------ var-default.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ u-boot-ivt.img.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x85ffffc0 0x0000 0x00057020 "u-boot-ivt.img"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ SPL.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x00908400 0x00000000 0x0000ac00 "SPL"&lt;/P&gt;&lt;P&gt;[Unlock]&lt;BR /&gt;Engine = CAAM&lt;BR /&gt;Features = RNG&lt;/P&gt;&lt;P&gt;------ zImage-ivt.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x82000000 0x0000 0x6a3020 "zImage-ivt"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you give me some further hint?&lt;/P&gt;&lt;P&gt;Thank you for the support,&lt;/P&gt;&lt;P&gt;Best&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 13:18:56 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155568#M162115</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-18T13:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155582#M162119</link>
      <description>&lt;P&gt;Hi Igor,&lt;/P&gt;&lt;P&gt;I've seen all the posts&amp;nbsp; concerning the "CSF lies outside the image bounds" error, but i'm still stucked. I also checked step by step all the HAB instruction, and all seems correctly done. Could the problem be indexing related even if the unlocked system correctly boot with no HAB events?&lt;/P&gt;&lt;P&gt;You can find all the &lt;STRONG&gt;&lt;EM&gt;.csf &lt;/EM&gt;&lt;/STRONG&gt;below:&lt;/P&gt;&lt;P&gt;------ var-default.csf ------&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = ANY&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----- u-boot-ivt.img.csf ------&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x85ffffc0 0x0000 0x00057020 "u-boot-ivt.img"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ SPL.csf -------&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x00908400 0x00000000 0x0000ac00 "SPL"&lt;/P&gt;&lt;P&gt;[Unlock]&lt;BR /&gt;Engine = CAAM&lt;BR /&gt;Features = RNG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ zImage-ivt.csf -------&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.1&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = SW&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;Source index = 0 # Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Address Offset Length Data File Path&lt;BR /&gt;Blocks = 0x82000000 0x0000 0x6a3020 "zImage-ivt"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------&lt;/P&gt;&lt;P&gt;Can you give me an hint?&lt;/P&gt;&lt;P&gt;Thank you for the support.&lt;/P&gt;&lt;P&gt;Best&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 13:38:04 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155582#M162119</guid>
      <dc:creator>kwroot</dc:creator>
      <dc:date>2020-09-18T13:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155611#M162124</link>
      <description>&lt;P&gt;Hi kwroot&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what bsp used in the case, could you try from&amp;nbsp; source.codeaurora.org/external/imx/linux-imx repository&lt;/P&gt;
&lt;P&gt;&lt;A href="https://source.codeaurora.org/external/imx/uboot-imx/tree/?h=imx_v2020.04_5.4.24_2.1.0" target="_blank" rel="noopener"&gt;https://source.codeaurora.org/external/imx/uboot-imx/tree/?h=imx_v2020.04_5.4.24_2.1.0&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://source.codeaurora.org/external/imx/linux-imx/tree/?h=imx_5.4.24_2.1.0" target="_blank" rel="noopener"&gt;https://source.codeaurora.org/external/imx/linux-imx/tree/?h=imx_5.4.24_2.1.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Rebuild all from scratch following guidelines from:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://source.codeaurora.org/external/imx/uboot-imx/tree/doc/imx/habv4?h=imx_v2020.04_5.4.24_2.1.0" target="_blank"&gt;https://source.codeaurora.org/external/imx/uboot-imx/tree/doc/imx/habv4?h=imx_v2020.04_5.4.24_2.1.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 14:40:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1155611#M162124</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2020-09-18T14:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot issue on imx6ull</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1753278#M215344</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;kwroot：&lt;/SPAN&gt;&lt;BR /&gt;Thank you for sharing. I am also working on secure boot on the imx6ull board. I want to know if you have successfully solved this problem later. I hope you can provide information to help me solve this problem.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 06:26:45 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-issue-on-imx6ull/m-p/1753278#M215344</guid>
      <dc:creator>ljm3721</dc:creator>
      <dc:date>2023-11-07T06:26:45Z</dc:date>
    </item>
  </channel>
</rss>

