<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX Processors中的主题 Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2121289#M238617</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Even after setting 'n' option for&amp;nbsp;&lt;SPAN&gt;"Do you want the SRK certificates to have the CA flag set? (y/n)?:n" the SRK_1_2_3_4_table.bin is still recognised as invalid file. Kindly help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thx,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Kiran.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jun 2025 08:51:22 GMT</pubDate>
    <dc:creator>KiranM7</dc:creator>
    <dc:date>2025-06-23T08:51:22Z</dc:date>
    <item>
      <title>Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2118012#M238313</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; I want to implement Secure Boot on FRDM i.MX 91 Development Board. So far I have generated Private &amp;amp; Public Keys by following -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://wiki.amarulasolutions.com/opensource/uboot/secure_boot/imx8mm_habv4.html" target="_blank" rel="noopener nofollow noreferrer"&gt;https://wiki.amarulasolutions.com/opensource/uboot/secure_boot/imx8mm_habv4.html&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;and using &lt;/SPAN&gt;&lt;SPAN&gt;IMX_CST_TOOL_NEW&lt;/SPAN&gt;&lt;SPAN&gt;. I am referring&amp;nbsp;&lt;A href="https://www.nxp.com/docs/en/user-guide/IMX_LINUX_USERS_GUIDE.pdf" target="_blank" rel="noopener"&gt;https://www.nxp.com/docs/en/user-guide/IMX_LINUX_USERS_GUIDE.pdf&lt;/A&gt;&amp;nbsp;to set a Yocto build for code signing. I have followed these steps&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;1. 
repo init -u https://github.com/nxp-imx/imx-manifest -b imx-linux-styhead -m
imx-6.12.3-1.0.0_security-reference-design.xml
repo sync
MACHINE=imx91-11x11-lpddr4-evk DISTRO=fsl-imx-xwayland source imx-setup-release.sh -b frdm-imx91
2. Add the meta-secure-boot layer to the Yocto project.
bitbake-layers add-layer ../sources/meta-nxp-security-reference-design/meta-
secure-boot
3. Add CST or SPSDK in SIG_TOOL_PATH in local.conf.
echo "SIG_TOOL_PATH = \"/home/Kiran/Downloads/IMX_CST_TOOL_NEW/cst-4.0.0\"" &amp;gt;&amp;gt; conf/local.conf

To generate a signed bootloader/kernel/WIC image in Yocto project:
Build a signed WIC image.
bitbake core-image-minimal-secure-boot
On running the above command I get below error
.....
meta-secure-boot     = "HEAD:8f8264146cb639a6eee13da463560c5e7a893fb2"

Sstate summary: Wanted 22 Local 6 Mirrors 0 Missed 16 Current 2516 (27% match, 99% complete)####         | ETA:  0:00:00
Initialising tasks: 100% |###############################################################################| Time: 0:00:01
NOTE: Executing Tasks
ERROR: imx-boot-signature-1.0-r0 do_compile: Execution of '/home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/imx-boot-signature/1.0/temp/run.do_compile.88482' failed with exit code 255
ERROR: Logfile of failure stored in: /home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/imx-boot-signature/1.0/temp/log.do_compile.88482
Log data follows:
 DEBUG: Executing shell function do_compile
 NOTE: Signing boot image
Install SRK
Super Root Key table is invalid in file File/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0/crts/SRK_1_2_3_4_table.bin in command InstallSRK
ERROR: Failed to sign the image using: container_2.csf
imx_signer.c:main:1959: SIG_TOOL_PATH set to: "/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0"
imx_signer.c:main:1960: SIG_DATA_PATH set to: "/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0"
imx_signer.c:main:1961: Input filename = imx-boot-imx91-11x11-lpddr4-evk-sd.bin-flash_singleboot
imx_signer.c:main:1962: Output filename = signed-imx-boot-imx91-11x11-lpddr4-evk-sd.bin-flash_singleboot
imx_signer.c:main:1964: Input CSF Configuration filename = /home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/imx-boot-signature/1.0/imx-boot-signature-1.0/sign.cfg
imx_signer.c:main:1974: Input filesize = 2032640 bytes
imx_signer.c:main:1988: IVT header = TAG:0x87 | LEN:0x0220 | VER:0x00
imx_signer.c:sign_container:963: Image Flag type: 0x6
imx_signer.c:sign_container:969: Container 0 already signed
imx_signer.c:sign_container:972: file_off = 0x00000400
imx_signer.c:sign_container:963: Image Flag type: 0x3
imx_signer.c:sign_container:987: file_off = 0x00000800 imx_signer.c:sign_container:996: APP container offset = 0x00049800
imx_signer.c:sign_container:997: APP container signature offset = 0x00049990
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 0
imx_signer.c:sign_container:1010: Container Offset : 0x00000000
imx_signer.c:sign_container:1011: Signature Offset : 0x00000000
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 2
imx_signer.c:sign_container:1010: Container Offset : 0x00000400
imx_signer.c:sign_container:1011: Signature Offset : 0x00000490
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 3
imx_signer.c:sign_container:1010: Container Offset : 0x00049800
imx_signer.c:sign_container:1011: Signature Offset : 0x00049990
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 0
imx_signer.c:sign_container:1010: Container Offset : 0x00000000
imx_signer.c:sign_container:1011: Signature Offset : 0x00000000
imx_signer.c:sign_container:1044: CSF filename = container_2.csf
INFO: container_2.csf generated
imx_signer.c:sign_container:1051: CSF filename created = container_2.csf
Executing command: /home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0/linux64/bin/cst --verbose --i container_2.csf --o otemp.bin
| WARNING: exit code 255 from a shell command.
ERROR: Task (/home/Kiran/SEC_YOCTO/sources/meta-nxp-security-reference-design/meta-secure-boot/recipes-secure-boot/imx-mkimage/imx-boot-signature.bb:do_compile) failed with exit code '1'
ERROR: linux-imx-signature-1.0-r0 do_compile: Execution of '/home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/linux-imx-signature/1.0/temp/run.do_compile.88485' failed with exit code 255
ERROR: Logfile of failure stored in: /home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/linux-imx-signature/1.0/temp/log.do_compile.88485
Log data follows:
DEBUG: Executing shell function do_compile
NOTE: Signing kernel image
Install SRK
Super Root Key table is invalid in file File/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0/crts/SRK_1_2_3_4_table.bin in command InstallSRK
ERROR: Failed to sign the image using: container_1.csf
imx_signer.c:main:1959: SIG_TOOL_PATH set to: "/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0"
imx_signer.c:main:1960: SIG_DATA_PATH set to: "/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0"
imx_signer.c:main:1961: Input filename = flash_os.bin
imx_signer.c:main:1962: Output filename = signed-flash_os.bin
imx_signer.c:main:1964: Input CSF Configuration filename = /home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/linux-imx-signature/1.0/linux-imx-signature-1.0/sign.cfg
imx_signer.c:main:1974: Input filesize = 35030016 bytes
imx_signer.c:main:1988: IVT header = TAG:0x87 | LEN:0x0120 | VER:0x00
imx_signer.c:sign_container:963: Image Flag type: 0x3
imx_signer.c:sign_container:987: file_off = 0x00000400
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 1
imx_signer.c:sign_container:1010: Container Offset : 0x00000000
imx_signer.c:sign_container:1011: Signature Offset : 0x00000110
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 0
imx_signer.c:sign_container:1010: Container Offset : 0x00000000
imx_signer.c:sign_container:1011: Signature Offset : 0x00000000
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 0
imx_signer.c:sign_container:1010: Container Offset : 0x00000000
imx_signer.c:sign_container:1011: Signature Offset : 0x00000000
imx_signer.c:sign_container:1009: CSF Container:	 Container Number : 0
imx_signer.c:sign_container:1010: Container Offset : 0x00000000
imx_signer.c:sign_container:1011: Signature Offset : 0x00000000
imx_signer.c:sign_container:1044: CSF filename = container_1.csf
INFO: container_1.csf generated
imx_signer.c:sign_container:1051: CSF filename created = container_1.csf
Executing command: /home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0/linux64/bin/cst --verbose --i container_1.csf --o signed-flash_os.bin
WARNING: exit code 255 from a shell command.
ERROR: Task (/home/Kiran/SEC_YOCTO/sources/meta-nxp-security-reference-design/meta-secure-boot/recipes-secure-boot/linux/linux-imx-signature.bb:do_compile) failed with exit code '1'
NOTE: Tasks Summary: Attempted 5207 tasks of which 5203 didn't need to be rerun and 2 failed.

Summary: 2 tasks failed:
  /home/Kiran/SEC_YOCTO/sources/meta-nxp-security-reference-design/meta-secure-boot/recipes-secure-boot/imx-mkimage/imx-boot-signature.bb:do_compile
    log: /home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/imx-boot-signature/1.0/temp/log.do_compile.88482
  /home/Kiran/SEC_YOCTO/sources/meta-nxp-security-reference-design/meta-secure-boot/recipes-secure-boot/linux/linux-imx-signature.bb:do_compile
    log: /home/Kiran/SEC_YOCTO/frdm-imx91/tmp/work/imx91_11x11_lpddr4_evk-poky-linux/linux-imx-signature/1.0/temp/log.do_compile.88485
Summary: There were 2 ERROR messages, returning a non-zero exit code.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error snap from above code:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Super Root Key table is invalid in file File/home/Kiran/cst/IMX_CST_TOOL_NEW/cst-4.0.0/crts/SRK_1_2_3_4_table.bin in command InstallSRK&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ERROR: Failed to sign the image using: container_2.csf&lt;/STRONG&gt;&lt;BR /&gt;imx_signer.c:main:1959: SIG_TOOL_PATH set to:&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have followed these steps to generate the SRK keys&lt;/P&gt;&lt;PRE&gt;$ echo "42424242" &amp;gt; serial

$ echo "Amarual357" &amp;gt; key_pass.txt
$ echo "Amarual357" &amp;gt;&amp;gt; key_pass.txt
$ ./hab4_pki_tree&lt;/PRE&gt;&lt;P&gt;Do you want to use an existing CA key (y/n)?: n&lt;/P&gt;&lt;P&gt;Key type options (confirm targeted device supports desired key type):&lt;BR /&gt;Select the key type (possible values: rsa, rsa-pss, ecc)?: rsa&lt;BR /&gt;Enter key length in bits for PKI tree: 2048&lt;BR /&gt;Enter PKI tree duration (years): 10&lt;BR /&gt;How many Super Root Keys should be generated? 4&lt;BR /&gt;Do you want the SRK certificates to have the CA flag set? (y/n)?: y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kiran@LinuxNew:~/cst/IMX_CST_TOOL_NEW/cst-4.0.0/crts$ ../linux64/bin/srktool -h 4 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -d sha256 -c ./SRK1_sha256_2048_65537_v3_ca_crt.pem,./SRK2_sha256_2048_65537_v3_ca_crt.pem,./SRK3_sha256_2048_65537_v3_ca_crt.pem,./SRK4_sha256_2048_65537_v3_ca_crt.pem&lt;BR /&gt;Number of certificates = 4&lt;BR /&gt;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;SRK table binary filename = SRK_1_2_3_4_table.bin&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin&lt;BR /&gt;SRK Fuse binary dump:&lt;BR /&gt;SRKH[0] = 0x542C6295&lt;BR /&gt;SRKH[1] = 0x41D0DB63&lt;BR /&gt;SRKH[2] = 0x96D4FB34&lt;BR /&gt;SRKH[3] = 0x2FE8944E&lt;BR /&gt;SRKH[4] = 0xEF82C54D&lt;BR /&gt;SRKH[5] = 0xC956909F&lt;BR /&gt;SRKH[6] = 0xA5A5365D&lt;BR /&gt;SRKH[7] = 0x33E50E18&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The Yocto build is failing because of invalid&lt;/STRONG&gt;&amp;nbsp;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;SRK_1_2_3_4_table.bin.&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;Please help in resolving this issue for i.MX91 processor.&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800000"&gt;&lt;FONT color="#000000"&gt;Also, let me know if I have to follow some specific guide for getting a signed image through&amp;nbsp;IMX_CST_TOOL_NEW - cst-4.0.0 tool.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jun 2025 19:20:42 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2118012#M238313</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-06-17T19:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2118435#M238325</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;secure boot isn't supported for FRDM board.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 09:20:04 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2118435#M238325</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-06-18T09:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2118473#M238327</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Requesting you to provide help with respect to NXP Code Signing Tool to get the correct SRK_Table.bin generated from iMX91 processor point of view. I know there is no support for FRDM iMX91 dev board, but at least give some guidance on how to do it for iMX 91 processor.&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Kiran. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 10:10:11 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2118473#M238327</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-06-18T10:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2121077#M238599</link>
      <description>&lt;P&gt;To set "n" for the "&lt;SPAN&gt;Do you want the SRK certificates to have the CA flag set? (y/n)?: y&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;and the&amp;nbsp;&lt;A href="https://www.nxp.com/webapp/Download?colCode=UG10195&amp;amp;location=null&amp;amp;isHTMLorPDF=HTML" target="_self"&gt;UG10195&lt;/A&gt;&amp;nbsp;to build image for FRDM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 04:33:58 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2121077#M238599</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-06-23T04:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2121289#M238617</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Even after setting 'n' option for&amp;nbsp;&lt;SPAN&gt;"Do you want the SRK certificates to have the CA flag set? (y/n)?:n" the SRK_1_2_3_4_table.bin is still recognised as invalid file. Kindly help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thx,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Kiran.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 08:51:22 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2121289#M238617</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-06-23T08:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2123610#M238745</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Chage the key type to&amp;nbsp;&lt;SPAN&gt;rsa-pss or ecc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Harvey&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2025 04:28:48 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2123610#M238745</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-06-26T04:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2124809#M238801</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; I changed the key type to ECC. Executed below commands to generate the key:&lt;/P&gt;&lt;P&gt;Do you want to use an existing CA key (y/n)?: n&lt;/P&gt;&lt;P&gt;Key type options (confirm targeted device supports desired key type):&lt;BR /&gt;Select the key type (possible values: rsa, rsa-pss, ecc)?: ecc&lt;BR /&gt;Enter length for elliptic curve to be used for PKI tree:&lt;BR /&gt;Possible values p256, p384, p521: p256&lt;BR /&gt;Enter the digest algorithm to use: sha256&lt;BR /&gt;Enter PKI tree duration (years): 10&lt;BR /&gt;Do you want the SRK certificates to have the CA flag set? (y/n)?: y&lt;/P&gt;&lt;P&gt;After the keys were generated renamed&amp;nbsp;secp256r1 with prime256v1, this ensured the Yocto build went ahead and was successful albiet with setting MACHINE= imx91-11x11-lpddr4-evk. &amp;nbsp;&lt;/P&gt;&lt;P&gt;I have this image&amp;nbsp;core-image-minimal-secure-boot-imx91-11x11-lpddr4-evk.rootfs-20250625112623.wic.zst ready now.&lt;/P&gt;&lt;P&gt;So far I have executed following bitbake commands:&lt;/P&gt;&lt;P&gt;bitbake core-image-minimal-secure-boot&lt;/P&gt;&lt;P&gt;bitbake imx-boot-signature&lt;/P&gt;&lt;P&gt;bitbake linux-imx-signature&lt;/P&gt;&lt;P&gt;Can you please suggest the next steps in verifying that the secure boot works.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 13:32:17 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2124809#M238801</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-06-27T13:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2125046#M238816</link>
      <description>&lt;P&gt;We recommend to run the "ahab_status" in U-Boot to verify that secure boot work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on how to program the SRK Fuses, verifying signature and closing&lt;BR /&gt;the part to enable secure boot, see the secure boot user guide, -&amp;nbsp;&lt;A href="https://github.com/nxp-imx/uboot-imx/tree/lf-6.12.3-1.0.0/doc/imx/ahab/guides" target="_self"&gt;ahab_guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you're working with FRDM board. To&amp;nbsp;&lt;SPAN&gt;Integrate the i.MX FRDM layer to BSP is needed.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://docs.nxp.com/bundle/UG10195/page/topics/image_build_using_yocto.html" target="_self"&gt;UG10195&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As previous post about secure boot for FRMD board, R&amp;amp;D will have a plan for that in the late of this year.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Harvey&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jun 2025 04:53:23 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2125046#M238816</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-06-28T04:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2125726#M238851</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Today I flashed the&amp;nbsp;&lt;SPAN&gt;core-image-base-imx91-11x11-lpddr4-evk.rootfs.wic.zst onto the iMX-FRDM board and got below log on u-boot, can you please suggest the things that I am missing.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Retry time exceeded; starting again&lt;/P&gt;&lt;P&gt;Authenticate OS container at 0x98000000&lt;/P&gt;&lt;P&gt;Error: Wrong container header&lt;/P&gt;&lt;P&gt;ERR: failed to authenticate&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; aha_status&lt;/P&gt;&lt;P&gt;Lifecycle: 0x00000008, OEM Open&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;0x0287eed6&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;IPC = MU APD (0x2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;CMD = ELE_OEM_CNTN_AUTH_REQ (0x87)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;IND = ELE_NO_AUTHENTICATION_FAILURE_IND (0xEE)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;STA = ELE_SUCCESS_IND (0xD6)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0x0287eed6&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;IPC = MU APD (0x2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;CMD = ELE_OEM_CNTN_AUTH_REQ (0x87)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;IND = ELE_NO_AUTHENTICATION_FAILURE_IND (0xEE)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;STA = ELE_SUCCESS_IND (0xD6)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 15:10:55 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2125726#M238851</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-06-30T15:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2126269#M238884</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The &amp;lt;IND = ELE_NO_AUTHENTICATION_FAILURE_IND (0xEE)&amp;gt; is an indication of that not signed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Harvey&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 08:47:10 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2126269#M238884</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-07-01T08:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2127343#M238928</link>
      <description>&lt;P&gt;Hi, today I flashed&amp;nbsp;&lt;SPAN&gt;signed-imx-boot-imx91-11x11-lpddr4-evk-sd.bin-flash_singleboot and it's still stuck up in u-boot, please find the snap below:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Retry time exceeded; starting again
Authenticate OS container at 0x98000000
Error: Wrong container header
ERR: failed to authenticate
u-boot=&amp;gt; ahab_status
Lifecycle: 0x00000008, OEM Open


        0x0287fad6
        IPC = MU APD (0x2)
        CMD = ELE_OEM_CNTN_AUTH_REQ (0x87)
        IND = ELE_BAD_KEY_HASH_FAILURE_IND (0xFA)
        STA = ELE_SUCCESS_IND (0xD6)

        0x0287fad6
        IPC = MU APD (0x2)
        CMD = ELE_OEM_CNTN_AUTH_REQ (0x87)
        IND = ELE_BAD_KEY_HASH_FAILURE_IND (0xFA)
        STA = ELE_SUCCESS_IND (0xD6)
u-boot=&amp;gt; %   &lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 02 Jul 2025 14:59:34 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2127343#M238928</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-07-02T14:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2127650#M238944</link>
      <description>&lt;P&gt;The&amp;nbsp;IND = ELE_BAD_KEY_HASH_FAILURE_IND (0xFA)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key does not match with the OTP that SRK hashes fused on the target, or the event can be displayed in case the SRK fuses are not programmed yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 02:00:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2127650#M238944</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-07-03T02:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2129362#M239045</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After flashing the 2 files:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. core-image-minimal-secure-boot-imx91-11x11-lpddr4-evk.rootfs.wic.zst &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. signed-imx-boot-imx91-11x11-lpddr4-evk-sd.bin-flash_singleboot&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I check ahab_status on u-boot I get the below message and also the board boots completely till Linux&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Hit any key to stop autoboot:  0
u-boot=&amp;gt;
u-boot=&amp;gt; ahab_status
Lifecycle: 0x00000008, OEM Open
        0x0287eed6
        IPC = MU APD (0x2)
        CMD = ELE_OEM_CNTN_AUTH_REQ (0x87)
        IND = ELE_NO_AUTHENTICATION_FAILURE_IND (0xEE)
        STA = ELE_SUCCESS_IND (0xD6)
        0x0287eed6
        IPC = MU APD (0x2)
        CMD = ELE_OEM_CNTN_AUTH_REQ (0x87)
        IND = ELE_NO_AUTHENTICATION_FAILURE_IND (0xEE)
        STA = ELE_SUCCESS_IND (0xD6)
u-boot=&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if this indicates that the secure boot is working correctly. Also, how can I test this by trying corresponding non-secure image?&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: I haven't yet flashed the fuses. I wan't to check whether the secure boot works without flashing the fuses first. Once this step is completed then I will flash the fuses.&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Kiran.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 13:53:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2129362#M239045</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-07-07T13:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2129695#M239058</link>
      <description>&lt;P&gt;SRK fuse is the basis of root of trust, to power on the board and run ahab_status command on U-Boot terminal is recommended method.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For details, please refer to the&amp;nbsp;&lt;A href="https://github.com/nxp-imx/uboot-imx/tree/lf-6.12.20-2.0.0/doc/imx/ahab" target="_self"&gt;ahab&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://www.nxp.com/webapp/Download?colCode=AN12312&amp;amp;location=null" target="_self"&gt;AN12312&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 02:44:45 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2129695#M239058</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-07-08T02:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2130291#M239089</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can I use&amp;nbsp;&lt;STRONG&gt;fuse override&lt;/STRONG&gt; option to test secure boot, without flashing the actual fuses? Can you please help with examples if applicable?&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Kiran.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 16:40:01 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2130291#M239089</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-07-08T16:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2130794#M239117</link>
      <description>&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Considering the security requirements, there is no shadow related to the override function in SRK Fuse.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Otherwise, it will lead to security risks.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Harvey&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 09:17:01 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2130794#M239117</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-07-09T09:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2131673#M239163</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have generated below keys through NXP CST:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you want to use an existing CA key (y/n)?: n&lt;/P&gt;&lt;P&gt;Key type options (confirm targeted device supports desired key type):&lt;/P&gt;&lt;P&gt;Select the key type (possible values: rsa, rsa-pss, ecc)?: ecc&lt;/P&gt;&lt;P&gt;Enter length for elliptic curve to be used for PKI tree:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Possible values p256, p384, p521:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;p384&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Enter the digest algorithm to use: sha384&lt;/P&gt;&lt;P&gt;Enter PKI tree duration (years): 5&lt;/P&gt;&lt;P&gt;Do you want the SRK certificates to have the CA flag set? (y/n)?: n&lt;/P&gt;&lt;P&gt;kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ ../linux64/bin/srktool -a -d sha256 -s sha384 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -f 1 -c ./SRK1_sha384_secp384r1_v3_usr_crt.pem,./SRK2_sha384_secp384r1_v3_usr_crt.pem,./SRK3_sha384_secp384r1_v3_usr_crt.pem,./SRK4_sha384_secp384r1_v3_usr_crt.pem&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Number of certificates&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;= 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;SRK table binary filename = SRK_1_2_3_4_table.bin&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SRK Fuse binary filename&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;= SRK_1_2_3_4_fuse.bin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;SRK Fuse binary dump:&lt;/P&gt;&lt;P&gt;SRKH[0] = 0x6B8C7EE0&lt;/P&gt;&lt;P&gt;SRKH[1] = 0x18EF2C9C&lt;/P&gt;&lt;P&gt;SRKH[2] = 0xF08294BB&lt;/P&gt;&lt;P&gt;SRKH[3] = 0x0F81D4E7&lt;/P&gt;&lt;P&gt;SRKH[4] = 0xFBF5ECC7&lt;/P&gt;&lt;P&gt;SRKH[5] = 0xD1604A8F&lt;/P&gt;&lt;P&gt;SRKH[6] = 0xB026FF45&lt;/P&gt;&lt;P&gt;SRKH[7] = 0xF1B499F4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ openssl dgst -binary -sha256 SRK_1_2_3_4_table.bin&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;?~?k?,??????&lt;/SPAN&gt;&lt;SPAN&gt;ԁ&lt;/SPAN&gt;&lt;SPAN&gt;?????J`?E?&amp;amp;?????kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ od -t x4 --endian=big SRK_1_2_3_4_fuse.bin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;0000000 e07e8c6b 9c2cef18 bb9482f0 e7d4810f&lt;/P&gt;&lt;P&gt;0000020 c7ecf5fb 8f4a60d1 45ff26b0 f499b4f1&lt;/P&gt;&lt;P&gt;0000040&lt;/P&gt;&lt;P&gt;kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ sha256sum SRK_1_2_3_4_table.bin&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;e07e8c6b9c2cef18bb9482f0e7d4810fc7ecf5fb8f4a60d145ff26b0f499b4f1&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;SRK_1_2_3_4_table.bin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you please guide me on which fuse addresses do I have to&amp;nbsp;&lt;/SPAN&gt;flash the below?:&lt;/P&gt;&lt;P&gt;SRK Fuse binary dump:&lt;/P&gt;&lt;P&gt;SRKH[0] = 0x6B8C7EE0&lt;/P&gt;&lt;P&gt;SRKH[1] = 0x18EF2C9C&lt;/P&gt;&lt;P&gt;SRKH[2] = 0xF08294BB&lt;/P&gt;&lt;P&gt;SRKH[3] = 0x0F81D4E7&lt;/P&gt;&lt;P&gt;SRKH[4] = 0xFBF5ECC7&lt;/P&gt;&lt;P&gt;SRKH[5] = 0xD1604A8F&lt;/P&gt;&lt;P&gt;SRKH[6] = 0xB026FF45&lt;/P&gt;&lt;P&gt;SRKH[7] = 0xF1B499F4&lt;/P&gt;&lt;P&gt;Also, any other steps that I need to do after flashing the keys?&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Kiran.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 11:32:11 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2131673#M239163</guid>
      <dc:creator>KiranM7</dc:creator>
      <dc:date>2025-07-10T11:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Error in SRK table key generated from IMX_CST_TOOL_NEW</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2132160#M239185</link>
      <description>&lt;P&gt;Please raise a&amp;nbsp;&lt;A href="https://www.nxp.com/support/support:SUPPORTHOME" target="_self"&gt;Confidential assistance&lt;/A&gt;&amp;nbsp;ticket for&amp;nbsp;fuse information support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 03:22:08 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Error-in-SRK-table-key-generated-from-IMX-CST-TOOL-NEW/m-p/2132160#M239185</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-07-11T03:22:08Z</dc:date>
    </item>
  </channel>
</rss>

