<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックTesting signed images</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1667502#M207429</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am in the process of adding signed images to our board but I was left with questions on how to test that.&lt;/P&gt;&lt;P&gt;After getting a signed os_cntr_signed.bin image, it boots fine. On u-boot when I try ahab_status, I see SECO events (because I don't have my keys fused yet).&lt;/P&gt;&lt;P&gt;Initially I thought I could use u-boot fuse override for testing the fuse values I need to use, but that is not implemented. After searching on how to use fuse shadow registers, I found that it is not possible. Examples:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors/Access-to-OCOTP-registers-from-SCU-on-IMX8QM-leads-to-hang/td-p/1335399" target="_blank"&gt;https://community.nxp.com/t5/i-MX-Processors/Access-to-OCOTP-registers-from-SCU-on-IMX8QM-leads-to-hang/td-p/1335399&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors/IMX8-unable-to-override-OCOTP-shadow-registers-Is-there-a-way/td-p/1424010" target="_blank"&gt;https://community.nxp.com/t5/i-MX-Processors/IMX8-unable-to-override-OCOTP-shadow-registers-Is-there-a-way/td-p/1424010&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Initially If thought I could implement something like what is mentioned in the first link.&lt;/P&gt;&lt;P&gt;Based on that, how am I supposed to test secure boot keys / commands without permanently fusing the keys or bricking the board?&lt;/P&gt;&lt;P&gt;What is NXP advice on that?&lt;/P&gt;&lt;P&gt;For reference, we are using i.MX8X (imx8qxp).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jun 2023 13:41:46 GMT</pubDate>
    <dc:creator>eduardo3</dc:creator>
    <dc:date>2023-06-12T13:41:46Z</dc:date>
    <item>
      <title>Testing signed images</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1667502#M207429</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am in the process of adding signed images to our board but I was left with questions on how to test that.&lt;/P&gt;&lt;P&gt;After getting a signed os_cntr_signed.bin image, it boots fine. On u-boot when I try ahab_status, I see SECO events (because I don't have my keys fused yet).&lt;/P&gt;&lt;P&gt;Initially I thought I could use u-boot fuse override for testing the fuse values I need to use, but that is not implemented. After searching on how to use fuse shadow registers, I found that it is not possible. Examples:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors/Access-to-OCOTP-registers-from-SCU-on-IMX8QM-leads-to-hang/td-p/1335399" target="_blank"&gt;https://community.nxp.com/t5/i-MX-Processors/Access-to-OCOTP-registers-from-SCU-on-IMX8QM-leads-to-hang/td-p/1335399&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors/IMX8-unable-to-override-OCOTP-shadow-registers-Is-there-a-way/td-p/1424010" target="_blank"&gt;https://community.nxp.com/t5/i-MX-Processors/IMX8-unable-to-override-OCOTP-shadow-registers-Is-there-a-way/td-p/1424010&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Initially If thought I could implement something like what is mentioned in the first link.&lt;/P&gt;&lt;P&gt;Based on that, how am I supposed to test secure boot keys / commands without permanently fusing the keys or bricking the board?&lt;/P&gt;&lt;P&gt;What is NXP advice on that?&lt;/P&gt;&lt;P&gt;For reference, we are using i.MX8X (imx8qxp).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 13:41:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1667502#M207429</guid>
      <dc:creator>eduardo3</dc:creator>
      <dc:date>2023-06-12T13:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: Testing signed images</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1669327#M207604</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;If not burning the SRK fuse, you may can use OPENSSL command to analyze the images with their key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 12:54:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1669327#M207604</guid>
      <dc:creator>Bio_TICFSL</dc:creator>
      <dc:date>2023-06-14T12:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Testing signed images</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1670908#M207714</link>
      <description>&lt;P&gt;I'll try the openssl approach in the future. Another FAE we contacted also confirmed there is no way of testing on a imx8 board without fusing the keys. His suggestion in that case was to fuse (if we are fine with that) but not close the device.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 07:45:29 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/1670908#M207714</guid>
      <dc:creator>eduardo3</dc:creator>
      <dc:date>2023-06-16T07:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Testing signed images</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/2186760#M241431</link>
      <description>&lt;P&gt;I am interested in this topic!&lt;BR /&gt;I need to verify the&amp;nbsp;&lt;SPAN&gt;os_cntr_signed.bin container coming out from a Yocto AHAB-signed build for imx93&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I do:&lt;BR /&gt;~/cst-4.0.0/linux64/bin/ahab_image_verifier os_cntr_signed.bin 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;I get:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#999999"&gt;Signature Block: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;Version: 0 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;Length: 2648 bytes &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;Tag: 0x90 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;Certificate Offset: 0x0 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;SRK Table/Array Offset: 0x10 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;SRK Table: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Tag: 0xD7 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Length: 2112 bytes &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Version: 66 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;SRK Record: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Tag: 0xE1 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Length: 527 bytes &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Sign Algorithm: RSA &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Hash Algorithm: SHA2_384 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Key Size/Curve: RSA4096 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;SRK Flags: CA Flags &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Modulus (N):&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;.....&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;Signature verification failed&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This doesn't happen for&amp;nbsp;imx-boot-imx93-var-som-aski-sd.bin-flash_singleboot_gdet&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;Signature Block:&lt;BR /&gt;&amp;nbsp;Version: 0&lt;BR /&gt;&amp;nbsp;Length: 400 bytes&lt;BR /&gt;&amp;nbsp;Tag: 0x90&lt;BR /&gt;&amp;nbsp;Certificate Offset: 0x0&lt;BR /&gt;&amp;nbsp;SRK Table/Array Offset: 0x10&lt;BR /&gt;&amp;nbsp;SRK Table:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Tag: 0xD7&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Length: 308 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Version: 66&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;SRK Record:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Tag: 0xE1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Length: 76 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Sign Algorithm: ECDSA &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Hash Algorithm: SHA2_256 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Key Size/Curve: PRIME256V1 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;SRK Flags: None &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;X Coordinate:&amp;nbsp; ....&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Y Coordinate:&amp;nbsp; ...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;......&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#808080"&gt;Signature verification successful&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;I am using a Digicert HSM for the signature&lt;BR /&gt;&lt;BR /&gt;does anybody have a clue about the verification failed for os_cntr_signed ?&lt;BR /&gt;does anybody have a hint on how to verify the signature with openssl ?(just to exclude the issue is ahab_image_verifier itself)&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 15:29:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Testing-signed-images/m-p/2186760#M241431</guid>
      <dc:creator>imx8mp_developer</dc:creator>
      <dc:date>2025-10-15T15:29:02Z</dc:date>
    </item>
  </channel>
</rss>

