<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Boot on imx6ul using HABv4 in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-on-imx6ul-using-HABv4/m-p/530857#M84686</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;nbsp; Please look at my comments below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;gt; Is it a must to fuse the SRK table during the development stage?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;The system boots but it is impossible to check signed image. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;2.&lt;BR /&gt;&amp;nbsp; Please look at example in the following thread.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&lt;A href="https://community.nxp.com/thread/304214"&gt;HAB on Nitrogen_6X IMX6Q board&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&lt;A _jive_internal="true" href="https://community.nxp.com/servlet/JiveServlet/download/325535-1-259256/secure_boot_on_imx6.pdf" title="https://community.nxp.com/servlet/JiveServlet/download/325535-1-259256/secure_boot_on_imx6.pdf"&gt;https://community.nxp.com/servlet/JiveServlet/download/325535-1-259256/secure_boot_on_imx6.pdf&lt;/A&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;3.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; According to the Appendix A (Interpreting HAB Event Data from Report_Event() API) of the “HAB4_API.pdf” in the &lt;BR /&gt;CST package, HAB Event 1 indicates that the digital signature authentication of the data block starting at 0x8780_0400 &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;has failed. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;nbsp; Please look at Example 2 in the Appendix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;nbsp; HAB event2 means that one of the following required areas is not signed as documented in the Operation section for authenticate_image() API:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- IVT;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- DCD (if provided);&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- Boot Data (initial byte - if provided);&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- Entry point (initial word).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&lt;BR /&gt; Please look at Example 1 in the Appendix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;BR /&gt;Yuri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Jul 2016 07:08:43 GMT</pubDate>
    <dc:creator>Yuri</dc:creator>
    <dc:date>2016-07-26T07:08:43Z</dc:date>
    <item>
      <title>Secure Boot on imx6ul using HABv4</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-on-imx6ul-using-HABv4/m-p/530856#M84685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am currently working on performing a secure boot on the imx6ul using HABv4. I followed the steps provided in the following document. &lt;/P&gt;&lt;P&gt;&lt;A href="http://marc.info/?l=u-boot&amp;amp;m=139227973004718&amp;amp;q=p5" title="http://marc.info/?l=u-boot&amp;amp;m=139227973004718&amp;amp;q=p5"&gt;http://marc.info/?l=u-boot&amp;amp;m=139227973004718&amp;amp;q=p5&lt;/A&gt;​&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After performing all the steps I have described below, I typed&lt;SPAN style="font-family: 'courier new', courier;"&gt; hab_status&lt;/SPAN&gt; in the U-boot command prompt. Then I get the HAB Events I have shown below.&amp;nbsp; The only step I did not perform is fusing the SRK table. I would like to know the following information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Is it a must to fuse the SRK table during the development stage?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. From where can I find the load address that has to specify in the csf file? I used the following value defined in the Uboot configuration file. The document AN4581 (Rev.0,10/2012) describes that start* = TEXT_BASE and that it is defined in the config.mk file. However, config.mk file is not available in my U-boot folder (Probably because I am using a newer version). &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;#define CONFIG_SYS_TEXT_BASE 0x87800000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;AN4581(Rev. 1, 10/2015) does not provide any information regarding this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. How does the Uboot knows the starting pointer of cfs? Should we specify it in any other location?&amp;nbsp; &lt;/P&gt;&lt;P&gt;4. I have specified the steps I performed below. Let me know whether anything I am doing wrongly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Steps Performed:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please see the steps performed below.&lt;/P&gt;&lt;P&gt;1. Built u-boot.imx enabling the secure mode.&lt;/P&gt;&lt;P&gt;2. Generated all root public key files and corresponding hash.&lt;/P&gt;&lt;P&gt;3. Created csf file with the following content. Content of the file is attached at the end.&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; My u-uboot.imx file is 0x60830. I extended it to 0x61000 using the following command.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;objcopy -I binary -O binary --pad-to 0x61000 --gap-fill=0x5A u-boot.imx u-boot-pad.imx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;5. Then I generated csf.bin file using the command below.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;./cst -o u-boot_csf.bin -i uboot.csf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;6. Merged image and csf data using the command below.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;cat u-boot-pad.imx u-boot_csf.bin&amp;nbsp; &amp;gt; u-boot-signed.imx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;7. Then extended the final image to 0x63000&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;objcopy -I binary -O binary --pad-to 0x63000 --gap-fill=0x5A u-boot-signed.imx u-boot-signed-pad.imx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;8. The length of the block is calculated as: Length = u-boot-pad.imx (0x61000) - IVT_OFFSET (0x400).&lt;/P&gt;&lt;P&gt;And added 400 to the starting address as shown below.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp; Offset Length Data File Path&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Blocks = 0x87800400 0x400 0x00060C00 "u-boot-pad.imx"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;HAB Events:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;--------- HAB Event 1 -----------------&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;event data:&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xdb 0x00 0x1c 0x42 0x33 0x18 0xc0 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xca 0x00 0x14 0x00 0x02 0xc5 0x00 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x0d 0x34 0x87 0x80 0x04 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x06 0x0c 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;--------- HAB Event 2 -----------------&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;event data:&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x00 0x87 0x7f 0xf7 0xd0&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x20&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;--------- HAB Event 3 -----------------&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;event data:&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x00 0x87 0x7f 0xf7 0xfc&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x01 0xf0&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;--------- HAB Event 4 -----------------&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;event data:&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x00 0x87 0x7f 0xf7 0xf0&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x01&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;--------- HAB Event 5 -----------------&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;event data:&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xdb 0x00 0x14 0x42 0x33 0x0c 0xa0 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x00 0x87 0x80 0x00 0x00&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00 0x00 0x00 0x04&lt;/SPAN&gt;&lt;/H6&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Command Sequency File Description:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;#Illustrative Command Sequence File Description&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Header]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Version = 4.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Hash Algorithm = sha256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Engine = ANY&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Engine Configuration = 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Certificate Format = X509&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Signature Format = CMS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Install SRK]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;File = "../crts/SRK_1_2_3_4_table.bin"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;# Index of the key location in the SRK table to be installed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Source index = 0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Install CSFK]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;# Key used to authenticate the CSF data&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;File = "../crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Authenticate CSF]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Install Key]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;# Key to install&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;File= "../crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;# Target key slot in HAB key store where key will be installed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Target Index = 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;# Key slot index used to authenticate the key to be installed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Verification index = 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;[Authenticate Data]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp; Offset Length Data File Path&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Blocks = 0x87800400 0x400 0x00060C00 "u-boot-pad.imx"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;# Key slot index used to authenticate the image data&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Verification index = 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jul 2016 12:25:24 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-on-imx6ul-using-HABv4/m-p/530856#M84685</guid>
      <dc:creator>radikedalpatadu</dc:creator>
      <dc:date>2016-07-22T12:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot on imx6ul using HABv4</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-on-imx6ul-using-HABv4/m-p/530857#M84686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;nbsp; Please look at my comments below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;gt; Is it a must to fuse the SRK table during the development stage?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;The system boots but it is impossible to check signed image. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;2.&lt;BR /&gt;&amp;nbsp; Please look at example in the following thread.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&lt;A href="https://community.nxp.com/thread/304214"&gt;HAB on Nitrogen_6X IMX6Q board&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&lt;A _jive_internal="true" href="https://community.nxp.com/servlet/JiveServlet/download/325535-1-259256/secure_boot_on_imx6.pdf" title="https://community.nxp.com/servlet/JiveServlet/download/325535-1-259256/secure_boot_on_imx6.pdf"&gt;https://community.nxp.com/servlet/JiveServlet/download/325535-1-259256/secure_boot_on_imx6.pdf&lt;/A&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;3.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; According to the Appendix A (Interpreting HAB Event Data from Report_Event() API) of the “HAB4_API.pdf” in the &lt;BR /&gt;CST package, HAB Event 1 indicates that the digital signature authentication of the data block starting at 0x8780_0400 &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;has failed. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;nbsp; Please look at Example 2 in the Appendix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&amp;nbsp; HAB event2 means that one of the following required areas is not signed as documented in the Operation section for authenticate_image() API:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- IVT;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- DCD (if provided);&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- Boot Data (initial byte - if provided);&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;- Entry point (initial word).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="Normal tm5"&gt;&lt;SPAN class="tm6"&gt;&lt;BR /&gt; Please look at Example 1 in the Appendix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;BR /&gt;Yuri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2016 07:08:43 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot-on-imx6ul-using-HABv4/m-p/530857#M84686</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2016-07-26T07:08:43Z</dc:date>
    </item>
  </channel>
</rss>

