<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: imx6q secure boot HAB error in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1614657#M202695</link>
    <description>&lt;P&gt;Thanks for reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please give me any link of this doc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rk&lt;/P&gt;</description>
    <pubDate>Tue, 14 Mar 2023 07:27:35 GMT</pubDate>
    <dc:creator>rakesh3</dc:creator>
    <dc:date>2023-03-14T07:27:35Z</dc:date>
    <item>
      <title>imx6q secure boot HAB error</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1613261#M202576</link>
      <description>&lt;P&gt;Hi team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am using the imx6q device where i am implementing the secure boot. I have signed the u-boot and followed below steps.But getting 6 errors ..&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x24 0x42 0x69 0x30 0xe1 0x1d&lt;BR /&gt;0x00 0x04 0x00 0x02 0x40 0x00 0x36 0x06&lt;BR /&gt;0x55 0x55 0x00 0x03 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_WARNING (0x69)&lt;BR /&gt;RSN = HAB_ENG_FAIL (0x30)&lt;BR /&gt;CTX = HAB_CTX_ENTRY (0xE1)&lt;BR /&gt;ENG = HAB_ENG_CAAM (0x1D)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 2 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x08 0x42 0x33 0x22 0x0a 0x00&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ADDRESS (0x22)&lt;BR /&gt;CTX = HAB_CTX_AUTHENTICATE (0x0A)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 3 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x00&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 4 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x2c&lt;BR /&gt;0x00 0x00 0x02 0x90&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 5 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x20&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 6 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x80 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually there are two kind of events (&lt;SPAN&gt;HAB_ENG_FAIL and&amp;nbsp;HAB_INV_ADDRESS&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;. I don't fully understand HAB event 1.&amp;nbsp;&lt;SPAN&gt;if I use u-boot-2018.05 from u-boot official website, it will have HAB event 2 to 6, and HAB event 1 is gone. I really have a concern about&amp;nbsp;HAB_INV_ADDRESS. I check CSF PTR by od command on u-boot.imx image, and it matches with the value on the target board eMMC area.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;$ od -X -N 0x20 u-boot.imx&lt;BR /&gt;0000000 402000d1 17800000 00000000 177ff42c&lt;BR /&gt;0000020 177ff420 177ff400 178b4000 00000000&lt;BR /&gt;0000040&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;=&amp;gt; md 0x177ff400&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;177ff400: 402000d1 17800000 00000000 177ff42c .. @........,...&lt;BR /&gt;177ff410: 177ff420 177ff400 178b4000 00000000 ........@......&lt;BR /&gt;177ff420: 177ff000 000b500c 00000000 409002d2 .....P.........@&lt;BR /&gt;177ff430: 048c02cc 68400c02 3f3fc000 6c400c02 ......@h..??..@l&lt;BR /&gt;177ff440: 30fc3000 70400c02 00c0ff0f 74400c02 .0.0..@p......@t&lt;BR /&gt;177ff450: 0ff0f03f 78400c02 00f3ff00 7c400c02 ?.....@x......@|&lt;BR /&gt;177ff460: c300000f 80400c02 ff030000 60400c02 ......@.......@`&lt;BR /&gt;177ff470: fb000000 10000e02 cf0000f0 18000e02 ................&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;=&amp;gt; md 0x178b400&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;178b4000: 425000d4 000c00be 00001703 50000000 ..PB...........P&lt;BR /&gt;178b4010: 020c00be 01000009 90040000 000c00ca ................&lt;BR /&gt;178b4020: 001dc501 e4070000 000c00be 02000009 ................&lt;BR /&gt;178b4030: e8090000 001400ca 001dc502 3c0d0000 ...............&amp;lt;&lt;BR /&gt;178b4040: 00f47f17 004c0b00 1d0800b2 02000000 ......L.........&lt;BR /&gt;178b4050: 404004d7 210f01e1 80000000 03000001 ..@@...!........&lt;BR /&gt;178b4060: c9a7d4b7 bd2d20b5 31fbf7ac 747d2c6b ..... -....1k,}t&lt;BR /&gt;178b4070: 671958b5 783295ec c87a6b80 43432646 .X.g..2x.kz.F&amp;amp;CC&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also, you can see there is the valid data in CSF section on the target board. I set the size of CSF file in imximage.cfg as 0x2000. I'm enclosed csf file for your reference.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#Illustrative Command Sequence File Description&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;2 Version = 4.2&lt;BR /&gt;3 Hash Algorithm = sha256&lt;BR /&gt;4 Engine Configuration = 0&lt;BR /&gt;5 Certificate Format = X509&lt;BR /&gt;6 Signature Format = CMS&lt;BR /&gt;7 Engine = CAAM&lt;BR /&gt;8&lt;BR /&gt;9 [Install SRK]&lt;BR /&gt;10 # Index of the key location in the SRK table to be installed&lt;BR /&gt;11 File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;12 Source index = 0&lt;BR /&gt;13&lt;BR /&gt;14 [Install CSFK]&lt;BR /&gt;15 # Key used to authenticate the CSF data&lt;BR /&gt;16 File = "../../crts/CSF1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;BR /&gt;17&lt;BR /&gt;18 [Authenticate CSF]&lt;BR /&gt;19&lt;BR /&gt;20 [Install Key]&lt;BR /&gt;21 # Key slot index used to authenticate the key to be installed&lt;BR /&gt;22 Verification index = 0&lt;BR /&gt;23 # Target key slot in HAB key store where key will be installed&lt;BR /&gt;24 Target Index = 2&lt;BR /&gt;25 # Key to install&lt;BR /&gt;26 File= "../../crts/IMG1_1_sha256_4096_65537_v3_usr_crt.pem"&lt;BR /&gt;27&lt;BR /&gt;28 [Authenticate Data]&lt;BR /&gt;29 # Key slot index used to authenticate the image data&lt;BR /&gt;30 Verification index = 2&lt;BR /&gt;31 # Authenticate Start Address, Offset, Length and file&lt;BR /&gt;32 #Blocks = 0x177ff400 0x00000000 0x00091c00 "u-boot-dtb.imx"&lt;BR /&gt;33 Blocks = 0x177ff400 0x00000000 0x00092c00 "u-boot-dtb.imx", \&lt;BR /&gt;34 0x00910000 0x0000002c 0x000002f8 "u-boot-dtb.imx"&lt;BR /&gt;35&lt;BR /&gt;36 [Unlock]&lt;BR /&gt;37 Engine = CAAM&lt;BR /&gt;38 Features = RNG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The following are the couple of commands to generate u-boot signed image file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ ../linux64/bin/cst --o u-boot_csf.bin --i u-boot.csf&lt;BR /&gt;$ objcopy -I binary -O binary --pad-to 0x2000 --gap-fill=0x00 u-boot_csf.bin u-boot_csf_pad.bin&lt;BR /&gt;$ cat u-boot.imx u-boot_csf_pad.bin &amp;gt; u-boot-signed.imx&lt;/P&gt;&lt;P&gt;Please suggest on this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rakesh&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 17:11:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1613261#M202576</guid>
      <dc:creator>rakesh3</dc:creator>
      <dc:date>2023-03-10T17:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: imx6q secure boot HAB error</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1614156#M202660</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Please read the &lt;SPAN&gt;HAB CST UG and the HAB V4 API RM.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 14:30:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1614156#M202660</guid>
      <dc:creator>Bio_TICFSL</dc:creator>
      <dc:date>2023-03-13T14:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: imx6q secure boot HAB error</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1614657#M202695</link>
      <description>&lt;P&gt;Thanks for reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please give me any link of this doc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rk&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 07:27:35 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1614657#M202695</guid>
      <dc:creator>rakesh3</dc:creator>
      <dc:date>2023-03-14T07:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: imx6q secure boot HAB error</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1616656#M202838</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I read the document, the failure its indicating is the INSERTION API, means some of component like IVT, data, DCD is not properly signed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;and other is the invalid digital signature of address.&lt;/P&gt;&lt;P&gt;I have doubt like , we have to use the same data from u-boot-dtb.imx.log file in the csf-u-boot.txt CSF file in authentication Block field.&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;&amp;nbsp;# Key slot index used to authenticate the image data&lt;BR /&gt;&amp;nbsp;Verification index = 2&lt;BR /&gt;&amp;nbsp;Engine = DCP&lt;BR /&gt;&amp;nbsp;# Authenticate Start Address, Offset, Length and file&lt;BR /&gt;&amp;nbsp;#Blocks = 0x177ff400 0x00000000 0x00091c00 "u-boot-dtb.imx"&lt;BR /&gt;Blocks = 0x177ff400 0x00000000 0x00092c00 "u-boot-dtb.imx"&lt;/P&gt;&lt;P&gt;&amp;nbsp;Image Type: Freescale IMX Boot Image&lt;BR /&gt;Image Ver: 2 (i.MX53/6/7 compatible)&lt;BR /&gt;&amp;nbsp;Mode: DCD&lt;BR /&gt;&amp;nbsp;Data Size: 610400 Bytes = 596.09 KiB = 0.58 MiB&lt;BR /&gt;&amp;nbsp;Load Address: 177ff420&lt;BR /&gt;Entry Point: 17800000&lt;BR /&gt;&amp;nbsp;HAB Blocks:&lt;STRONG&gt; 0x177ff400 0x00000000 0x00092c00&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;DCD Blocks: 0x00910000 0x0000002c 0x000002f8&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am i going in right direction, Any input on this would be appreciable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rakesh&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 09:58:06 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6q-secure-boot-HAB-error/m-p/1616656#M202838</guid>
      <dc:creator>rakesh3</dc:creator>
      <dc:date>2023-03-16T09:58:06Z</dc:date>
    </item>
  </channel>
</rss>

