<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックRe: imx6 secure boot</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1618214#M202946</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/212816"&gt;@rakesh3&lt;/a&gt;,&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;I hope you are doing well&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Please find the answer below.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;Kindly double-check if the parameters&amp;nbsp;Authenticate Start Address, Offset, and Length in [Authenticate Data] of the CSF file are correct.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The message&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HAB_INV_CERTIFICATE&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;means: other certificate or Super-Root Key Table verification failed (including mismatch with crt_hsh)&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;For the message&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HAB_INV_ASSERTION&lt;/STRONG&gt;: the HAB checks that all of the following data have been authenticated (using their final locations):&lt;BR /&gt;&lt;BR /&gt;- IVT ;&lt;BR /&gt;&lt;BR /&gt;- DCD (if provided);&lt;BR /&gt;&lt;BR /&gt;- Boot Data (initial byte if provided);&lt;BR /&gt;&lt;BR /&gt;- Entry point (initial word).&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;Each of the above data components not covered by a valid signature will cause HAB to generate an event with reason HAB_INV_ASSERTION.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;Kindly refer to the below document file to configure a secure boot. We will recommend you try the latest BSP version.&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://source.codeaurora.org/external/imx/uboot-imx/tree/doc/imx/habv4?h=imx_v2020.04_5.4.24_2.1.0" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://source.codeaurora.org/external/imx/uboot-imx/tree/doc/imx/habv4?h%3Dimx_v2020.04_5.4.24_2.1.0&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw0q4hHWnvewwfcOkTIUqRXS"&gt;https://source.codeaurora.org/&lt;WBR /&gt;external/imx/uboot-imx/tree/&lt;WBR /&gt;doc/imx/habv4?h=imx_v2020.04_&lt;WBR /&gt;5.4.24_2.1.0&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;AN12056&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN12056.pdf?_gl=1*zy4qyk*_ga*MTQ3NzI0MDA3OS4xNjc5MDQ4MzY5*_ga_WM5LE0KMSH*MTY3OTA0ODM2OC4xLjEuMTY3OTA1MDY4MC4wLjAuMA.." target="_blank" rel="nofollow noopener noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://www.nxp.com/docs/en/application-note/AN12056.pdf?_gl%3D1*zy4qyk*_ga*MTQ3NzI0MDA3OS4xNjc5MDQ4MzY5*_ga_WM5LE0KMSH*MTY3OTA0ODM2OC4xLjEuMTY3OTA1MDY4MC4wLjAuMA..&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw2k9No3RokzEAnf36mIndW6"&gt;&lt;STRONG&gt;Encrypted Boot on HABv4 and CAAM Enabled Devices&lt;/STRONG&gt;&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://community.nxp.com/pwmxy87654/attachments/pwmxy87654/imx-processors/60046/1/i.MX_6_Linux_High_Assurance_Boot_(HAB)_User's_Guide.pdf" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://community.nxp.com/pwmxy87654/attachments/pwmxy87654/imx-processors/60046/1/i.MX_6_Linux_High_Assurance_Boot_(HAB)_User's_Guide.pdf&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw24NzsQLtEp2qDw8oREOlzd"&gt;i.MX_6_Linux_High_Assurance_&lt;WBR /&gt;Boot_(HAB)_User's_Guide.pdf&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN4581.pdf?_gl=1*xrviye*_ga*Mjk4NDEwMTEwLjE2NzkwNDc1ODg.*_ga_WM5LE0KMSH*MTY3OTI5MjU0My4zLjEuMTY3OTI5MjU4OS4wLjAuMA.." target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.nxp.com/docs/en/application-note/AN4581.pdf?_gl%3D1*xrviye*_ga*Mjk4NDEwMTEwLjE2NzkwNDc1ODg.*_ga_WM5LE0KMSH*MTY3OTI5MjU0My4zLjEuMTY3OTI5MjU4OS4wLjAuMA..&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw25GsZThLovpyWiAzOCvEpk"&gt;i.MX Secure Boot on HABv4 Supported Devices&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;Dhruvit Vasavada&lt;/DIV&gt;</description>
    <pubDate>Mon, 20 Mar 2023 07:35:00 GMT</pubDate>
    <dc:creator>Dhruvit</dc:creator>
    <dc:date>2023-03-20T07:35:00Z</dc:date>
    <item>
      <title>imx6 secure boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1613993#M202645</link>
      <description>&lt;P&gt;Hi team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently i am workign on imx6q board. Trying to implement the HAB in that so i have concluded the CONFIG_IMX_HAB in the config file of u-boot .&lt;/P&gt;&lt;P&gt;Created the signed u-boot and key using the CST tool.&lt;/P&gt;&lt;P&gt;But while checking the status of hab_status getting below events.&amp;nbsp;&lt;/P&gt;&lt;P&gt;MX6 HORIZON U-Boot &amp;gt; hab_status&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x24 0x42 0x69 0x30 0xe1 0x1d&lt;BR /&gt;0x00 0x04 0x00 0x02 0x40 0x00 0x36 0x06&lt;BR /&gt;0x55 0x55 0x00 0x03 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_WARNING (0x69)&lt;BR /&gt;RSN = HAB_ENG_FAIL (0x30)&lt;BR /&gt;CTX = HAB_CTX_ENTRY (0xE1)&lt;BR /&gt;ENG = HAB_ENG_CAAM (0x1D)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 2 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x00&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 3 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x2c&lt;BR /&gt;0x00 0x00 0x02 0xf8&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 4 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x20&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 5 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x80 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 6 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x21 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x50&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_CERTIFICATE (0x21)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;MX6 HORIZON U-Boot &amp;gt; &amp;lt;INTERRUPT&amp;gt;&lt;BR /&gt;MX6 HORIZON U-Boot &amp;gt;&lt;BR /&gt;MX6 HORIZON U-Boot &amp;gt;&lt;BR /&gt;MX6 HORIZON U-Boot &amp;gt;&lt;BR /&gt;MX6 HORIZON U-Boot &amp;gt;&lt;BR /&gt;MX6 HORIZON U-Boot &amp;gt; hab_status&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x24 0x42 0x69 0x30 0xe1 0x1d&lt;BR /&gt;0x00 0x04 0x00 0x02 0x40 0x00 0x36 0x06&lt;BR /&gt;0x55 0x55 0x00 0x03 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_WARNING (0x69)&lt;BR /&gt;RSN = HAB_ENG_FAIL (0x30)&lt;BR /&gt;CTX = HAB_CTX_ENTRY (0xE1)&lt;BR /&gt;ENG = HAB_ENG_CAAM (0x1D)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 2 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x00&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 3 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x2c&lt;BR /&gt;0x00 0x00 0x02 0xf8&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 4 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x7f 0xf4 0x20&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 5 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x17 0x80 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 6 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x42 0x33 0x21 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x50&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_CERTIFICATE (0x21)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;Below is my csf file .&lt;/P&gt;&lt;P&gt;[Header]&lt;BR /&gt;Version = 4.2&lt;BR /&gt;&amp;nbsp;Hash Algorithm = sha256&lt;BR /&gt;&amp;nbsp;Engine Configuration = 0&lt;BR /&gt;&amp;nbsp;Certificate Format = X509&lt;BR /&gt;&amp;nbsp;Signature Format = CMS&lt;BR /&gt;&amp;nbsp;Engine = CAAM&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;[Install SRK]&lt;BR /&gt;&amp;nbsp;# Index of the key location in the SRK table to be installed&lt;BR /&gt;&amp;nbsp;File = "../../crts/SRK_1_2_3_4_table.bin"&lt;BR /&gt;&amp;nbsp;Source index = 0&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;[Install CSFK]&lt;BR /&gt;&amp;nbsp;# Key used to authenticate the CSF data&lt;BR /&gt;&amp;nbsp;File = "../../crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;[Authenticate CSF]&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;[Install Key]&lt;BR /&gt;&amp;nbsp;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;&amp;nbsp;Verification index = 0&lt;BR /&gt;&amp;nbsp;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;&amp;nbsp;Target Index = 2&lt;BR /&gt;&amp;nbsp;# Key to install&lt;BR /&gt;&amp;nbsp;File= "../../crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;[Authenticate Data]&lt;BR /&gt;&amp;nbsp;# Key slot index used to authenticate the image data&lt;BR /&gt;&amp;nbsp;Verification index = 2&lt;BR /&gt;&amp;nbsp;# Authenticate Start Address, Offset, Length and file&lt;BR /&gt;&amp;nbsp;#Blocks = 0x177ff400 0x00000000 0x00091c00 "u-boot-dtb.imx"&lt;BR /&gt;&amp;nbsp;Blocks = 0x177ff400 0x00000000 0x00092c00 "u-boot-dtb.imx"&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;[Unlock]&lt;BR /&gt;&amp;nbsp;Engine = CAAM&lt;BR /&gt;&amp;nbsp;Features = RNG&lt;/P&gt;&lt;P&gt;Below is the u-boot-dtb.imx.log file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Image Type: Freescale IMX Boot Image&lt;BR /&gt;Image Ver: 2 (i.MX53/6/7 compatible)&lt;BR /&gt;&amp;nbsp;Mode: DCD&lt;BR /&gt;&amp;nbsp;Data Size: 610400 Bytes = 596.09 KiB = 0.58 MiB&lt;BR /&gt;&amp;nbsp;Load Address: 177ff420&lt;BR /&gt;&amp;nbsp;Entry Point: 17800000&lt;BR /&gt;&amp;nbsp;HAB Blocks: 0x177ff400 0x00000000 0x00092c00&lt;BR /&gt;&amp;nbsp;DCD Blocks: 0x00910000 0x0000002c 0x000002f8&lt;/P&gt;&lt;P&gt;Please help me on this issue,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rk&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:38:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1613993#M202645</guid>
      <dc:creator>rakesh3</dc:creator>
      <dc:date>2023-03-13T11:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: imx6 secure boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1618214#M202946</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/212816"&gt;@rakesh3&lt;/a&gt;,&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;I hope you are doing well&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Please find the answer below.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;Kindly double-check if the parameters&amp;nbsp;Authenticate Start Address, Offset, and Length in [Authenticate Data] of the CSF file are correct.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The message&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HAB_INV_CERTIFICATE&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;means: other certificate or Super-Root Key Table verification failed (including mismatch with crt_hsh)&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;For the message&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HAB_INV_ASSERTION&lt;/STRONG&gt;: the HAB checks that all of the following data have been authenticated (using their final locations):&lt;BR /&gt;&lt;BR /&gt;- IVT ;&lt;BR /&gt;&lt;BR /&gt;- DCD (if provided);&lt;BR /&gt;&lt;BR /&gt;- Boot Data (initial byte if provided);&lt;BR /&gt;&lt;BR /&gt;- Entry point (initial word).&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;Each of the above data components not covered by a valid signature will cause HAB to generate an event with reason HAB_INV_ASSERTION.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;Kindly refer to the below document file to configure a secure boot. We will recommend you try the latest BSP version.&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://source.codeaurora.org/external/imx/uboot-imx/tree/doc/imx/habv4?h=imx_v2020.04_5.4.24_2.1.0" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://source.codeaurora.org/external/imx/uboot-imx/tree/doc/imx/habv4?h%3Dimx_v2020.04_5.4.24_2.1.0&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw0q4hHWnvewwfcOkTIUqRXS"&gt;https://source.codeaurora.org/&lt;WBR /&gt;external/imx/uboot-imx/tree/&lt;WBR /&gt;doc/imx/habv4?h=imx_v2020.04_&lt;WBR /&gt;5.4.24_2.1.0&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;AN12056&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN12056.pdf?_gl=1*zy4qyk*_ga*MTQ3NzI0MDA3OS4xNjc5MDQ4MzY5*_ga_WM5LE0KMSH*MTY3OTA0ODM2OC4xLjEuMTY3OTA1MDY4MC4wLjAuMA.." target="_blank" rel="nofollow noopener noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://www.nxp.com/docs/en/application-note/AN12056.pdf?_gl%3D1*zy4qyk*_ga*MTQ3NzI0MDA3OS4xNjc5MDQ4MzY5*_ga_WM5LE0KMSH*MTY3OTA0ODM2OC4xLjEuMTY3OTA1MDY4MC4wLjAuMA..&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw2k9No3RokzEAnf36mIndW6"&gt;&lt;STRONG&gt;Encrypted Boot on HABv4 and CAAM Enabled Devices&lt;/STRONG&gt;&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://community.nxp.com/pwmxy87654/attachments/pwmxy87654/imx-processors/60046/1/i.MX_6_Linux_High_Assurance_Boot_(HAB)_User's_Guide.pdf" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://community.nxp.com/pwmxy87654/attachments/pwmxy87654/imx-processors/60046/1/i.MX_6_Linux_High_Assurance_Boot_(HAB)_User's_Guide.pdf&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw24NzsQLtEp2qDw8oREOlzd"&gt;i.MX_6_Linux_High_Assurance_&lt;WBR /&gt;Boot_(HAB)_User's_Guide.pdf&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN4581.pdf?_gl=1*xrviye*_ga*Mjk4NDEwMTEwLjE2NzkwNDc1ODg.*_ga_WM5LE0KMSH*MTY3OTI5MjU0My4zLjEuMTY3OTI5MjU4OS4wLjAuMA.." target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.nxp.com/docs/en/application-note/AN4581.pdf?_gl%3D1*xrviye*_ga*Mjk4NDEwMTEwLjE2NzkwNDc1ODg.*_ga_WM5LE0KMSH*MTY3OTI5MjU0My4zLjEuMTY3OTI5MjU4OS4wLjAuMA..&amp;amp;source=gmail&amp;amp;ust=1679379624908000&amp;amp;usg=AOvVaw25GsZThLovpyWiAzOCvEpk"&gt;i.MX Secure Boot on HABv4 Supported Devices&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;Dhruvit Vasavada&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Mar 2023 07:35:00 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1618214#M202946</guid>
      <dc:creator>Dhruvit</dc:creator>
      <dc:date>2023-03-20T07:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: imx6 secure boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1618218#M202947</link>
      <description>&lt;P&gt;Thanks for reply Druvit,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checked on other device , now i am getting only one warning on hab_status.&lt;/P&gt;&lt;P&gt;U-Boot &amp;gt; hab_status&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x24 0x42 0x69 0x30 0xe1 0x1d&lt;BR /&gt;0x00 0x04 0x00 0x02 0x40 0x00 0x36 0x06&lt;BR /&gt;0x55 0x55 0x00 0x03 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_WARNING (0x69)&lt;BR /&gt;RSN = HAB_ENG_FAIL (0x30)&lt;BR /&gt;CTX = HAB_CTX_ENTRY (0xE1)&lt;BR /&gt;ENG = HAB_ENG_CAAM (0x1D)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please help me to find the issue, can we do something for this issue or can ignore this warning.&lt;/P&gt;&lt;P&gt;Here I have not fused the&amp;nbsp;SRK_1_2_3_4_fuse.bin in the device. does it required to fuse this&amp;nbsp;SRK_1_2_3_4_fuse.bin before running the&amp;nbsp;&lt;/P&gt;&lt;P&gt;==&amp;gt;hab_status ????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help me on this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rk&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 07:58:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/imx6-secure-boot/m-p/1618218#M202947</guid>
      <dc:creator>rakesh3</dc:creator>
      <dc:date>2023-03-20T07:58:12Z</dc:date>
    </item>
  </channel>
</rss>

