<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックRe: CST 2.3.2 hang</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552564#M86300</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you make it work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 Jun 2016 11:01:00 GMT</pubDate>
    <dc:creator>jdepedro</dc:creator>
    <dc:date>2016-06-27T11:01:00Z</dc:date>
    <item>
      <title>CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552556#M86292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I met issue when encrypting u-boot image by using CST. When I enabling image encryption. The CST hang for about 20 minutes, at last it returned but did not generate expected CSF bin, image not encrypted either, only generated dek.bin. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my CSF file content:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Header]&lt;/P&gt;&lt;P&gt;Version = 4.1&lt;/P&gt;&lt;P&gt;Hash Algorithm = SHA256&lt;/P&gt;&lt;P&gt;Engine Configuration = 0&lt;/P&gt;&lt;P&gt;Certificate Format = X509&lt;/P&gt;&lt;P&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;Engine = CAAM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;/P&gt;&lt;P&gt;File = "../crts/SRK_1_2_3_4_table.bin"&lt;/P&gt;&lt;P&gt;# Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;Source index = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;/P&gt;&lt;P&gt;# Key used to authenticate the CSF data&lt;/P&gt;&lt;P&gt;File = "../crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Unlock]&lt;/P&gt;&lt;P&gt;Engine = CAAM&lt;/P&gt;&lt;P&gt;Features = RNG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Install Key]&lt;/P&gt;&lt;P&gt;# Key slot index used to authenticate the key to be installed&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;# Key to install&lt;/P&gt;&lt;P&gt;Target Index = 2&lt;/P&gt;&lt;P&gt;File = "../crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;/P&gt;&lt;P&gt;# Key slot index used to authenticate the image data&lt;/P&gt;&lt;P&gt;Verification Index = 2&lt;/P&gt;&lt;P&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address&amp;nbsp;&amp;nbsp; Offset&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Data File Path&lt;/P&gt;&lt;P&gt;Blocks = 0x177ff400 0x00000000 0x00000C10 "./u-boot.imx"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Encrypt the boot image and create a DEK&lt;/P&gt;&lt;P&gt;[Install Secret Key]&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;Target Index = 0&lt;/P&gt;&lt;P&gt;Key = "./dek.bin"&lt;/P&gt;&lt;P&gt;Key Length = 128&lt;/P&gt;&lt;P&gt;Blob Address = 0x1787fbb8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Provide DEK blob location to decrypt&lt;/P&gt;&lt;P&gt;[Decrypt Data]&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;Mac Bytes = 16&lt;/P&gt;&lt;P&gt;Blocks = 0x17800010 0x00000C10 0x7cff0 "./u-boot.imx"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I remove the content after "#Encrypt the boot image and create a DEK" everything goes well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2016 05:37:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552556#M86292</guid>
      <dc:creator>cfm</dc:creator>
      <dc:date>2016-06-21T05:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552557#M86293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Have You used the following ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/docs/DOC-330622"&gt;Encrypted boot loader on SabreSD i.MX6q board&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;BR /&gt;Yuri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2016 06:52:08 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552557#M86293</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2016-06-21T06:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552558#M86294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I am following steps in that pages.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2016 06:54:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552558#M86294</guid>
      <dc:creator>cfm</dc:creator>
      <dc:date>2016-06-21T06:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552559#M86295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The cst tries to get random data from /dev/random. This operation can block for long periods of time if there is no enough entropy in the machine. You can generate entropy by inserting data in /dev/random. Try to use this package:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1em; color: #242729; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;On deb types: &lt;CODE style="padding: 1px 5px; font-size: 13px; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, sans-serif; background-color: #eff0f1;"&gt;sudo apt-get install rng-tools&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1em; color: #242729; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;Then run &lt;CODE style="padding: 1px 5px; font-size: 13px; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, sans-serif; background-color: #eff0f1;"&gt;sudo rngd -r /dev/urandom&lt;/CODE&gt; before using the CST tool.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2016 11:02:08 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552559#M86295</guid>
      <dc:creator>jdepedro</dc:creator>
      <dc:date>2016-06-23T11:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552560#M86296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help, I will have a try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jun 2016 01:15:58 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552560#M86296</guid>
      <dc:creator>cfm</dc:creator>
      <dc:date>2016-06-24T01:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552561#M86297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By doing that I still can not to encrypt the image, I just got this output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;$ ../linux64/cst -o u-boot_csf.bin -i u-boot.csf&lt;/P&gt;&lt;P&gt;Encryption not enabled&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The size of my CSF uboot.imx is 0x6cc00, and my CSF file looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Header]&lt;/P&gt;&lt;P&gt;Version = 4.1&lt;/P&gt;&lt;P&gt;Hash Algorithm = SHA256&lt;/P&gt;&lt;P&gt;Engine Configuration = 0&lt;/P&gt;&lt;P&gt;Certificate Format = X509&lt;/P&gt;&lt;P&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;Engine = CAAM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;/P&gt;&lt;P&gt;File = "../crts/SRK_1_2_3_4_table.bin"&lt;/P&gt;&lt;P&gt;# Index of the key location in the SRK table to be installed&lt;/P&gt;&lt;P&gt;Source index = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;/P&gt;&lt;P&gt;# Key used to authenticate the CSF data&lt;/P&gt;&lt;P&gt;File = "../crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Unlock]&lt;/P&gt;&lt;P&gt;Engine = CAAM&lt;/P&gt;&lt;P&gt;Features = RNG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Install Key]&lt;/P&gt;&lt;P&gt;# Key slot index used to authenticate the key to be installed&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;# Key to install&lt;/P&gt;&lt;P&gt;Target Index = 2&lt;/P&gt;&lt;P&gt;File = "../crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;/P&gt;&lt;P&gt;# Key slot index used to authenticate the image data&lt;/P&gt;&lt;P&gt;Verification Index = 2&lt;/P&gt;&lt;P&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address&amp;nbsp;&amp;nbsp; Offset&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Data File Path&lt;/P&gt;&lt;P&gt;Blocks = 0x877ff400 0x00000000 0x0006CC00 "./u-boot.imx"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Encrypt the boot image and create a DEK&lt;/P&gt;&lt;P&gt;[Install Secret Key]&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;Target Index = 0&lt;/P&gt;&lt;P&gt;Key = "./dek.bin"&lt;/P&gt;&lt;P&gt;Key Length = 128&lt;/P&gt;&lt;P&gt;Blob Address = 0x8786DF80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Provide DEK blob location to decrypt&lt;/P&gt;&lt;P&gt;[Decrypt Data]&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;Mac Bytes = 16&lt;/P&gt;&lt;P&gt;Blocks = 0x87800010 0x00000C10 0x6BFF0 "./u-boot.imx"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jun 2016 02:55:31 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552561#M86297</guid>
      <dc:creator>cfm</dc:creator>
      <dc:date>2016-06-24T02:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552562#M86298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The CST you are using has not encryption support. (The binary version distributed by NXP does not have encryption support enabled by default).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to enable it, you need to recompile the tool adding encryption support:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="border: 0px; font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; font-size: 14px; color: #333333; background-position: initial;"&gt;&lt;TBODY style="background-position: initial;"&gt;&lt;TR style="border: 0px; background-position: initial;"&gt;&lt;TD class="code" style="border: 0px; padding: 0 0 0 15px; background-position: initial;"&gt;&lt;P class="container" style="margin: 15px 0 0; padding: 0 0 15px; background-position: initial;" title="Hint: double-click to select code"&gt;&lt;/P&gt;&lt;DIV class="number1 alt2 line index0" style="padding: 0 1em 0 0; background-position: initial;"&gt;&lt;CODE class="plain java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #000000 !important; background-position: initial;"&gt;cd &lt;/CODE&gt;&lt;CODE class="plain java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #000000 !important; background-position: initial;"&gt;cst-&lt;/CODE&gt;&lt;CODE class="value java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #009900 !important; background-position: initial;"&gt;2.3&lt;/CODE&gt;&lt;CODE class="plain java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #000000 !important; background-position: initial;"&gt;.&lt;/CODE&gt;&lt;CODE class="value java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #009900 !important; background-position: initial;"&gt;2&lt;/CODE&gt;&lt;CODE class="plain java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #000000 !important; background-position: initial;"&gt;/code/back_end/src&lt;/CODE&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="number2 alt1 line index1" style="padding: 0 1em 0 0; background-position: initial;"&gt;&lt;CODE class="plain java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #000000 !important; background-position: initial;"&gt;gcc -o cst -I ../hdr -L ../../../linux64/lib *.c -lfrontend -lcrypto&lt;/CODE&gt;&lt;/P&gt;&lt;P class="number3 index2 alt2 line" style="padding: 0 1em 0 0; background-position: initial;"&gt;&lt;CODE class="plain java" style="font-family: Consolas, 'Bitstream Vera Sans Mono', 'Courier New', Courier, monospace; color: #000000 !important; background-position: initial;"&gt;cp cst ../../../linux64&lt;/CODE&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jun 2016 07:01:29 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552562#M86298</guid>
      <dc:creator>jdepedro</dc:creator>
      <dc:date>2016-06-24T07:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552563#M86299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks, I will have a try :-)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jun 2016 08:29:41 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552563#M86299</guid>
      <dc:creator>cfm</dc:creator>
      <dc:date>2016-06-24T08:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552564#M86300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you make it work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2016 11:01:00 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552564#M86300</guid>
      <dc:creator>jdepedro</dc:creator>
      <dc:date>2016-06-27T11:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: CST 2.3.2 hang</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552565#M86301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for your help, the CST now can work, but I cannot get the encrypted u-boot run (only certification works fine), my encryption CSF configuration is:&lt;/P&gt;&lt;P&gt;================================================================&lt;/P&gt;&lt;P&gt;#Encrypt the boot image and create a DEK&lt;/P&gt;&lt;P&gt;[Install Secret Key]&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;Target Index = 0&lt;/P&gt;&lt;P&gt;Key = "./dek.bin"&lt;/P&gt;&lt;P&gt;Key Length = 128&lt;/P&gt;&lt;P&gt;Blob Address = 0x8786DF80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Provide DEK blob location to decrypt&lt;/P&gt;&lt;P&gt;[Decrypt Data]&lt;/P&gt;&lt;P&gt;Verification Index = 0&lt;/P&gt;&lt;P&gt;Mac Bytes = 16&lt;/P&gt;&lt;P&gt;Blocks = 0x87800000 0x00000C00 0x0006C000 "./u-boot.imx"&amp;nbsp; # u-boot.bin region&lt;/P&gt;&lt;P&gt;================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The u-boot.imx size is 0x0006CC00, u-boot.imx will be loaded at 0x877ff400.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2016 01:20:15 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/CST-2-3-2-hang/m-p/552565#M86301</guid>
      <dc:creator>cfm</dc:creator>
      <dc:date>2016-06-28T01:20:15Z</dc:date>
    </item>
  </channel>
</rss>

