<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX Processors中的主题 Re: Verify signed images from Linux user space</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1483662#M192131</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/79131"&gt;@jb2&lt;/a&gt;&amp;nbsp;, we are currently asking ourselves exactly the same question. Have you found a solution to test the flash.bin or other signed boot artifacts from Linux against the blown SRKs? I would be interested in your solution.&lt;/P&gt;</description>
    <pubDate>Sun, 03 Jul 2022 11:36:12 GMT</pubDate>
    <dc:creator>michael_glembot</dc:creator>
    <dc:date>2022-07-03T11:36:12Z</dc:date>
    <item>
      <title>Verify signed images from Linux user space</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1002443#M148607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I succeed to use the UBoot and kernel verification with the HAB API but I want to go further in sign verification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've two partitions and a mechanism to update the kernel (and rootfs) from the linux user space. What I want is to verify the authenticity of the kernel before burn it to the non-active partition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The HAB API is in the boot ROM and, as far as I could find, it's not possible to use this API in the user space. Is it all right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I'm trying to do the verification my self:&lt;/P&gt;&lt;P&gt;- Read SRK in UBoot and transfer in the user space with the bootcmd&lt;/P&gt;&lt;P&gt;- Verify the two certificate with this SRK (CFS and IMG certificate)&lt;/P&gt;&lt;P&gt;-&amp;nbsp;Verify the signature of the command and the kernel with openssl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My questions are:&lt;/P&gt;&lt;P&gt;1) Do you think is it possible to verify the kernel in that way?&lt;/P&gt;&lt;P&gt;2) I don't know how to verify the CFS/IMG certificate&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) The signature check failed with open SSL. Here are information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ivt.bin: interrupt vector for kernel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;linux.csf: csf file for kernel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;test_signature.sh: script to check the signature of the kernel image&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;In code file I've: from 0x0 (beginning of the kernel to the end of IVT)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Signature is the signature after IMG1_cert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Certificate is the IMG1_ certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;response: "Verification Failure"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Mar 2020 07:51:10 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1002443#M148607</guid>
      <dc:creator>jb2</dc:creator>
      <dc:date>2020-03-23T07:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Verify signed images from Linux user space</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1002444#M148608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; We recommend to use the DM-crypt after U-boot and kernel are verified.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Use&amp;nbsp; app note&amp;nbsp; AN12714&amp;nbsp; (i.MX Encrypted Storage Using CAAM Secure Keys)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;A class="link-titled" href="https://www.nxp.com/docs/en/application-note/AN12714.pdf" title="https://www.nxp.com/docs/en/application-note/AN12714.pdf"&gt;https://www.nxp.com/docs/en/application-note/AN12714.pdf&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Have a great day,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Yuri.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Note:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;- If this post answers your question, please click the "Mark Correct" button. Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;- We are following threads for 7 weeks after the last post, later replies are ignored&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Please open a new thread and refer to the closed one, if you have a related question at a later point in time.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Mar 2020 03:56:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1002444#M148608</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2020-03-24T03:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Verify signed images from Linux user space</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1483662#M192131</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/79131"&gt;@jb2&lt;/a&gt;&amp;nbsp;, we are currently asking ourselves exactly the same question. Have you found a solution to test the flash.bin or other signed boot artifacts from Linux against the blown SRKs? I would be interested in your solution.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jul 2022 11:36:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1483662#M192131</guid>
      <dc:creator>michael_glembot</dc:creator>
      <dc:date>2022-07-03T11:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Verify signed images from Linux user space</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1483663#M192132</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/1941"&gt;@Yuri&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Did you read &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/79131"&gt;@jb2&lt;/a&gt;&amp;nbsp;'s question at all? And if so, did you understand them?&amp;nbsp;There are over 600 views interested in a solution.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jul 2022 11:40:10 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1483663#M192132</guid>
      <dc:creator>michael_glembot</dc:creator>
      <dc:date>2022-07-03T11:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Verify signed images from Linux user space</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1484115#M192162</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/172891"&gt;@michael_glembot&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Sorry I don't remember if I succeed and I no longer have access to the source code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2022 14:29:36 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Verify-signed-images-from-Linux-user-space/m-p/1484115#M192162</guid>
      <dc:creator>jb2</dc:creator>
      <dc:date>2022-07-04T14:29:36Z</dc:date>
    </item>
  </channel>
</rss>

