<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CST-3.3.2 back_end-ssl Interface with HSM API in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1722232#M212560</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/19"&gt;@Irene&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any update on below query?&lt;/P&gt;</description>
    <pubDate>Wed, 13 Sep 2023 17:09:25 GMT</pubDate>
    <dc:creator>jbhaijy</dc:creator>
    <dc:date>2023-09-13T17:09:25Z</dc:date>
    <item>
      <title>CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1708044#M211111</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In cst-3.3.2, on cst/code/ path there is&amp;nbsp;&lt;EM&gt;back_end-ssl&lt;/EM&gt; &amp;amp;&amp;nbsp;&lt;EM&gt;back_end-pkcs11.&amp;nbsp;&lt;/EM&gt;I want to sign the build images through remote HSM. There are HSM signing API's which we need to call for signing particular image. I just want to know how we can integrate these HSM API call in CST backend implementation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please explain what is the purpose of&amp;nbsp;&lt;EM&gt;back_end-ssl &amp;amp;&amp;nbsp;&lt;/EM&gt;back_end-pkcs11 &amp;amp; which is the best approach to call HSM API for signing images.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 06:18:39 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1708044#M211111</guid>
      <dc:creator>jbhaijy</dc:creator>
      <dc:date>2023-08-21T06:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1708409#M211169</link>
      <description>&lt;P&gt;Let me look into this issue.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 13:48:11 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1708409#M211169</guid>
      <dc:creator>Irene</dc:creator>
      <dc:date>2023-08-21T13:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1709303#M211243</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/19"&gt;@Irene&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any update on this?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 18:14:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1709303#M211243</guid>
      <dc:creator>jbhaijy</dc:creator>
      <dc:date>2023-08-22T18:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1709313#M211244</link>
      <description>&lt;P&gt;This might help address your questions.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 18:31:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1709313#M211244</guid>
      <dc:creator>Irene</dc:creator>
      <dc:date>2023-08-22T18:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1710393#M211325</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/19"&gt;@Irene&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Appreciate your help &amp;amp; support. Thanks.&lt;/P&gt;&lt;P&gt;I followed the steps mentioned in the document you shared &amp;amp; I am able to use "Mode = HSM" &amp;amp; generated the&amp;nbsp;data_csfsig.bin,&amp;nbsp;data_imgsig.bin,&amp;nbsp;sig_request.txt &amp;amp; csf.bin. I think this use-case is best suites our requirement &amp;amp; hence I need to understand this approach in deep. I have few question regarding this approach.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For initial testing purpose we have created development keys &amp;amp; certs on systems filesystem but finally these keys &amp;amp; certs will be kept on remote HSM. For initial testing can we sign the&amp;nbsp;data_csfsig.bin &amp;amp;&amp;nbsp;data_imgsig.bin with the development private key's available on filesystem? If yes, can you please share the command to sign these images?&lt;/LI&gt;&lt;LI&gt;In case of signing with HSM, do we also need to send the&amp;nbsp;sig_request.txt along&amp;nbsp;data_csfsig.bin &amp;amp;&amp;nbsp;data_imgsig.bin?&lt;/LI&gt;&lt;LI&gt;After receiving the signature, how we can insert them into CSF binary? Is there any command? At what offiset or address? as mentioned in step-3.1 in the document.&lt;/LI&gt;&lt;LI&gt;To generate the final signed flash.bin, what is the command to insert CSF binary into flash.bin incase of i.MX8 &amp;amp; appending the CSF binary into u-boot image incase of i.MX6?&amp;nbsp; We have i.MX6 &amp;amp; i.MX8 based products.&amp;nbsp;At what offiset or address?&amp;nbsp;as mentioned in step-3.2 in the document.&lt;/LI&gt;&lt;LI&gt;As mentioned in the step3-Note, if the signature received from HSM is bigger than the pre-calculated size, then in that case the changes required to update the offset(option-1) or update in the code (option-2) will be one time activity, right?&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 24 Aug 2023 06:58:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1710393#M211325</guid>
      <dc:creator>jbhaijy</dc:creator>
      <dc:date>2023-08-24T06:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1711706#M211479</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/19"&gt;@Irene&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any update on above queries?&lt;/P&gt;&lt;P&gt;I am following-up with you because the solution mentioned in the document which shared with me is possibly fit for our requirement &amp;amp; it is no where mentioned in the NXP public document. Request you please share if you have application document specifically for "Mode = HSM" works.&lt;/P&gt;&lt;P&gt;Thanks for you support.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 13:53:15 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1711706#M211479</guid>
      <dc:creator>jbhaijy</dc:creator>
      <dc:date>2023-08-26T13:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1713392#M211676</link>
      <description>&lt;P&gt;For initial testing purpose we have created development keys &amp;amp; certs on systems filesystem but finally these keys &amp;amp; certs will be kept on remote HSM. For initial testing can we sign the data_csfsig.bin &amp;amp; data_imgsig.bin with the development private key's available on filesystem? If yes, can you please share the command to sign these images?&lt;/P&gt;
&lt;P&gt;&amp;lt;NXP&amp;gt; &lt;EM style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;&lt;SPAN data-preserver-spaces="true"&gt;Yes, they can; please sign the binaries with the openssl command.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;In case of signing with HSM, do we also need to send the&amp;nbsp;sig_request.txt along&amp;nbsp;data_csfsig.bin &amp;amp;&amp;nbsp;data_imgsig.bin?&lt;/P&gt;
&lt;P style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;&lt;SPAN data-preserver-spaces="true"&gt;&amp;lt;NXP&amp;gt; Yes. The sig_request file contains the identification(unique tag) of which signature belongs to which binary.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;After receiving the signature, how we can insert them into CSF binary? Is there any command? At what offiset or address? as mentioned in step-3.1 in the document.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;&lt;SPAN data-preserver-spaces="true"&gt;&amp;lt;NXP&amp;gt;This is a manual process, and the offset is as described in the diagram in Step 2.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;As mentioned in the step3-Note, if the signature received from HSM is bigger than the pre-calculated size, then in that case the changes required to update the offset(option-1) or update in the code (option-2) will be one time activity, right?&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;&amp;lt;NXP&amp;gt; The option 2 is better suited for permanent change.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="color: #0e101a; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:01:55 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1713392#M211676</guid>
      <dc:creator>Irene</dc:creator>
      <dc:date>2023-08-29T17:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1720440#M212372</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/19"&gt;@Irene&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned in the document CST generates&amp;nbsp;&lt;SPAN&gt;data_csfsig.bin &amp;amp;&amp;nbsp;data_imgsig.bin. My question is instead of sending these binaries to HSM for signing, can we generate the hash value of each binary &amp;amp; send it to HSM for signature generation? Our standard signing API's needs hash value &amp;amp; keypair ID.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 13:45:49 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1720440#M212372</guid>
      <dc:creator>jbhaijy</dc:creator>
      <dc:date>2023-09-11T13:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: CST-3.3.2 back_end-ssl Interface with HSM API</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1722232#M212560</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/19"&gt;@Irene&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any update on below query?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 17:09:25 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-3-3-2-back-end-ssl-Interface-with-HSM-API/m-p/1722232#M212560</guid>
      <dc:creator>jbhaijy</dc:creator>
      <dc:date>2023-09-13T17:09:25Z</dc:date>
    </item>
  </channel>
</rss>

