<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2145906#M239806</link>
    <description>&lt;P&gt;The section &amp;lt;7.3 Using CST with Hardware Security Module&amp;gt; of CST User Guide can be a reference for you.&lt;/P&gt;
&lt;P&gt;You can download the guide from&amp;nbsp;&lt;A href="https://www.nxp.com/webapp/Download?colCode=IMX_CST_TOOL_NEW&amp;amp;appType=license&amp;amp;location=null" target="_self"&gt;IMX_CST_TOOL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
    <pubDate>Mon, 04 Aug 2025 06:16:21 GMT</pubDate>
    <dc:creator>Harvey021</dc:creator>
    <dc:date>2025-08-04T06:16:21Z</dc:date>
    <item>
      <title>i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2145219#M239777</link>
      <description>&lt;P&gt;How is the following Secure Boot / Chain of Trust scenario usually handled? What are the precedents?&lt;/P&gt;&lt;P&gt;In most of the documentation/examples, the scenario is simple: the same company creates the device and the application software, sells the device with application software on it, and only their keys need to be accommodated.&lt;/P&gt;&lt;P&gt;However in our case: we manufacture i.MX 8X based devices. Our customers develop software applications for the devices, and then sell the devices with software to their customers.&lt;/P&gt;&lt;P&gt;Our keys are in the AHAB SRK. But we also need to accommodate our customers keys somewhere, so that they can sign their software updates...&lt;/P&gt;&lt;P&gt;We supply our customers with the SDK produced by Yocto, and the Linux rootfs. Our customers don't perform Yocto builds themselves. They build their application software using the SDK.&lt;/P&gt;&lt;P&gt;What precedents are there for how this scenario is usually handled, in terms of secure boot and whose keys are stored where? What is the terminology for the different parties?&lt;/P&gt;&lt;P&gt;Thank you&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2025 13:52:43 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2145219#M239777</guid>
      <dc:creator>petero5</dc:creator>
      <dc:date>2025-08-01T13:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2145906#M239806</link>
      <description>&lt;P&gt;The section &amp;lt;7.3 Using CST with Hardware Security Module&amp;gt; of CST User Guide can be a reference for you.&lt;/P&gt;
&lt;P&gt;You can download the guide from&amp;nbsp;&lt;A href="https://www.nxp.com/webapp/Download?colCode=IMX_CST_TOOL_NEW&amp;amp;appType=license&amp;amp;location=null" target="_self"&gt;IMX_CST_TOOL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 06:16:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2145906#M239806</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-08-04T06:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2146770#M239853</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;thank you, yes we are using CST with HSM.&lt;/P&gt;&lt;P&gt;But are still looking for best practices re chain of trust involving two companies, rather than one:&lt;/P&gt;&lt;P&gt;Company A manufactures the device, builds the Yocto SDK and the FIT image, U-Boot, Linux kernel and rootfs.&lt;/P&gt;&lt;P&gt;Company B receives the above and develops an application (and creates the application partition).&lt;/P&gt;&lt;P&gt;If A writes the SRKs and closes the device, then B can trust that the device and images have not been tampered with on the way to them.&lt;/P&gt;&lt;P&gt;But there needs to be a way to enroll B's public key for the application partition, or include that in the chain of trust?&lt;/P&gt;&lt;P&gt;Thank you&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 09:07:41 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2146770#M239853</guid>
      <dc:creator>petero5</dc:creator>
      <dc:date>2025-08-05T09:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2148085#M239925</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/206875"&gt;@petero5&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've sent you internal system emails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 06:05:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2148085#M239925</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-08-07T06:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2148259#M239936</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;. Thank you. Where can I find the internal system emails please? I've looked under Private Messages / Inbox, but that is empty?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 08:23:56 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2148259#M239936</guid>
      <dc:creator>petero5</dc:creator>
      <dc:date>2025-08-07T08:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: i.MX 8X secure boot - keys for two parties rather than one - Yocto Linux</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2148361#M239948</link>
      <description>&lt;P&gt;Please let me know if you not received yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 09:53:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/i-MX-8X-secure-boot-keys-for-two-parties-rather-than-one-Yocto/m-p/2148361#M239948</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2025-08-07T09:53:46Z</dc:date>
    </item>
  </channel>
</rss>

