<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX RT Crossover MCUsのトピックOTFAD and using flash as FEE</title>
    <link>https://community.nxp.com/t5/i-MX-RT-Crossover-MCUs/OTFAD-and-using-flash-as-FEE/m-p/1201767#M11763</link>
    <description>&lt;P&gt;We are developing an application to iMXRT1010 and want to use the last 1MB of the XIP flash chip as non-volatile data storage (FEE). How can we set up the encrypted boot and the OTFAD so that only the code section of the flash is encrypted and decrypted during execution, while the data section is not affected by it?&lt;/P&gt;</description>
    <pubDate>Fri, 18 Dec 2020 10:27:21 GMT</pubDate>
    <dc:creator>benedek_kupper</dc:creator>
    <dc:date>2020-12-18T10:27:21Z</dc:date>
    <item>
      <title>OTFAD and using flash as FEE</title>
      <link>https://community.nxp.com/t5/i-MX-RT-Crossover-MCUs/OTFAD-and-using-flash-as-FEE/m-p/1201767#M11763</link>
      <description>&lt;P&gt;We are developing an application to iMXRT1010 and want to use the last 1MB of the XIP flash chip as non-volatile data storage (FEE). How can we set up the encrypted boot and the OTFAD so that only the code section of the flash is encrypted and decrypted during execution, while the data section is not affected by it?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 10:27:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-RT-Crossover-MCUs/OTFAD-and-using-flash-as-FEE/m-p/1201767#M11763</guid>
      <dc:creator>benedek_kupper</dc:creator>
      <dc:date>2020-12-18T10:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: OTFAD and using flash as FEE</title>
      <link>https://community.nxp.com/t5/i-MX-RT-Crossover-MCUs/OTFAD-and-using-flash-as-FEE/m-p/1201818#M11765</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;The range of memory decrypted is defined by the OTFAD registers&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;OTFAD_CTX0_RGD_W0&amp;nbsp; (start address - 1k aligned)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;OTFAD_CTX0_RGD_W1 (end address - 1k aligned)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and these registers can be changed during operation.&lt;/P&gt;&lt;P&gt;Therefore once your application starts you can adjust the end address value (as needed) and use the excluded flash area for other purposes without decryption.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;BR /&gt;&lt;EM&gt;[uTasker project developer for Kinetis and i.MX RT]&lt;/EM&gt;&lt;BR /&gt;&lt;FONT color="#999999"&gt;Contact me by personal message or on the uTasker web site to discuss professional training, solutions to problems or rapid product development requirements&lt;BR /&gt;&lt;BR /&gt;For professionals searching for faster, problem-free Kinetis and i.MX RT 10xx developments the uTasker project holds the key: &lt;A href="https://www.utasker.com/iMX/RT1011.html" target="_blank"&gt;https://www.utasker.com/iMX/RT1011.html&lt;/A&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See the uTasker project for accurate BEE and OTFAD emulation and a turn-key secure solution (OTA, clone-/IP protection and in-field updating) using a unified method that gives compatibility between i.MX RT devices with BEE and OTFAD and flexibility in changing AES256 keys rather than one-shot eFUSE programming).&lt;/P&gt;&lt;P&gt;It allows securing any application within 5 minutes without the usual steep learning cure and numerous tools needing to be set up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Boot loader concept including XiP on-the-fly decryption, clone protection or AES256 protected RAM execution.&lt;BR /&gt;-- Boot Loader concept flow chart: &lt;A href="https://www.utasker.com/docs/iMX/Loader.pdf" target="_blank"&gt;https://www.utasker.com/docs/iMX/Loader.pdf&lt;/A&gt; and usage reference &lt;A href="https://www.utasker.com/docs/iMX/uTaskerLoader_TestDrive.pdf" target="_blank"&gt;https://www.utasker.com/docs/iMX/uTaskerLoader_TestDrive.pdf&lt;/A&gt;&lt;BR /&gt;-- Serial Loader features: &lt;A href="https://www.utasker.com/docs/uTasker/uTaskerSerialLoader.pdf" target="_blank"&gt;https://www.utasker.com/docs/uTasker/uTaskerSerialLoader.pdf&lt;/A&gt;&lt;BR /&gt;-- Building the loader with MCUXpresso: &lt;A href="https://www.utasker.com/docs/iMX/MCUXpresso.pdf" target="_blank"&gt;https://www.utasker.com/docs/iMX/MCUXpresso.pdf&lt;/A&gt; (and video guide &lt;A href="https://youtu.be/p_eUGo6GypY" target="_blank"&gt;https://youtu.be/p_eUGo6GypY&lt;/A&gt; ) - the guide document explains how to use with any application (eg. SDK) and to enabling its operation with On-The-Fly decryption in 5 minutes&lt;BR /&gt;-- Building the loader with IAR: &lt;A href="https://www.utasker.com/docs/iMX/IAR.pdf" target="_blank"&gt;https://www.utasker.com/docs/iMX/IAR.pdf&lt;/A&gt; (and video guide &lt;A href="https://youtu.be/XPCwVndP99s" target="_blank"&gt;https://youtu.be/XPCwVndP99s&lt;/A&gt; )&lt;BR /&gt;-- Building the loader with VisualStudio and GCC: &lt;A href="https://www.utasker.com/docs/iMX/GCC.pdf" target="_blank"&gt;https://www.utasker.com/docs/iMX/GCC.pdf&lt;/A&gt; (and video guide &lt;A href="https://youtu.be/0UzLLSXABK8" target="_blank"&gt;https://youtu.be/0UzLLSXABK8&lt;/A&gt; )&lt;BR /&gt;Video Guide to encrypting NXP SDK examples to run from XiP memory using on-the-fly decryption and uploading with the µTasker loader: &lt;A href="https://www.youtube.com/watch?v=5iT7KP691ls&amp;amp;list=PLWKlVb_MqDQEOCnsNOJO8gd3jDCwiyKKe&amp;amp;index=10" target="_blank"&gt;https://www.youtube.com/watch?v=5iT7KP691ls&amp;amp;list=PLWKlVb_MqDQEOCnsNOJO8gd3jDCwiyKKe&amp;amp;index=10&lt;/A&gt;&lt;BR /&gt;Video Guide to encrypting NXP SDK examples to run at optimal speed in internal RAM and uploading with the µTasker loader:&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=fnfLQ-nbscI&amp;amp;list=PLWKlVb_MqDQEOCnsNOJO8gd3jDCwiyKKe&amp;amp;index=11" target="_blank"&gt;https://www.youtube.com/watch?v=fnfLQ-nbscI&amp;amp;list=PLWKlVb_MqDQEOCnsNOJO8gd3jDCwiyKKe&amp;amp;index=11&lt;/A&gt;&lt;BR /&gt;Video Guide for Embedded Artist OEM Module for i.MX RT 1062 showing precise secured application operation analysis: &lt;A href="https://youtu.be/o7hQbOqhJoc" target="_blank"&gt;https://youtu.be/o7hQbOqhJoc&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 13:00:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-RT-Crossover-MCUs/OTFAD-and-using-flash-as-FEE/m-p/1201818#M11765</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2020-12-18T13:00:09Z</dc:date>
    </item>
  </channel>
</rss>

