<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RT6xx secure boot in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/RT6xx-secure-boot/m-p/1715564#M211847</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/220996"&gt;@yoeinhor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am sorry for not getting back to you on time, but, regarding your questions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1 No, the&amp;nbsp;&lt;SPAN&gt;OTP_MASTER_KEY is not necesary for plain signed images&lt;/SPAN&gt;&amp;nbsp;. Its use is described at&amp;nbsp;&lt;STRONG&gt;AN12079&amp;nbsp;&lt;/STRONG&gt;which is under secure access.&lt;/P&gt;
&lt;P&gt;2 The implication that I see is that for booting a signed image, you will need to provide a ROM the keys/root certicate in the key store area, instead of the OTPs.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="diego_charles_0-1693549160906.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/239223iDE4C1CEB022EF1BC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="diego_charles_0-1693549160906.png" alt="diego_charles_0-1693549160906.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditordiego_charles_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditordiego_charles_4" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;All the best,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Diego&lt;/P&gt;</description>
    <pubDate>Fri, 01 Sep 2023 06:20:44 GMT</pubDate>
    <dc:creator>diego_charles</dc:creator>
    <dc:date>2023-09-01T06:20:44Z</dc:date>
    <item>
      <title>RT6xx secure boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/RT6xx-secure-boot/m-p/1695913#M209961</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am working on converting RT6xx systems from normal boot to secure boot with plain signed non-XIP images in the field, and have a couple of questions:&lt;/P&gt;&lt;P&gt;1. OTP_MASTER_KEY: Is this OTP necessary? Why? I saw it is set by the secure provisioning tool but I don't see a reason for it.&lt;/P&gt;&lt;P&gt;2. Are there any implications to flashing an image with the "image_type" field set to "plain signed non-XIP (0x1)" while secure boot is not enabled in the OTP? Following the boot process diagram in the manual, it seems like the bootloader ROM will treat it the same way as non-signed images, but I need to make sure this is the case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2023 12:27:49 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/RT6xx-secure-boot/m-p/1695913#M209961</guid>
      <dc:creator>yoeinhor</dc:creator>
      <dc:date>2023-07-31T12:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: RT6xx secure boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/RT6xx-secure-boot/m-p/1715564#M211847</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/220996"&gt;@yoeinhor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am sorry for not getting back to you on time, but, regarding your questions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1 No, the&amp;nbsp;&lt;SPAN&gt;OTP_MASTER_KEY is not necesary for plain signed images&lt;/SPAN&gt;&amp;nbsp;. Its use is described at&amp;nbsp;&lt;STRONG&gt;AN12079&amp;nbsp;&lt;/STRONG&gt;which is under secure access.&lt;/P&gt;
&lt;P&gt;2 The implication that I see is that for booting a signed image, you will need to provide a ROM the keys/root certicate in the key store area, instead of the OTPs.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="diego_charles_0-1693549160906.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/239223iDE4C1CEB022EF1BC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="diego_charles_0-1693549160906.png" alt="diego_charles_0-1693549160906.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditordiego_charles_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditordiego_charles_4" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;All the best,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Diego&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2023 06:20:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/RT6xx-secure-boot/m-p/1715564#M211847</guid>
      <dc:creator>diego_charles</dc:creator>
      <dc:date>2023-09-01T06:20:44Z</dc:date>
    </item>
  </channel>
</rss>

