<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>LPC Microcontrollers中的主题 Re: lpc55s69 secure boot</title>
    <link>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370436#M46989</link>
    <description>&lt;P&gt;In UM11126 chapter 7.2.2&amp;nbsp;Secure firmware update it's written:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;If firmware updates are to be performed in the field when secure boot is enabled, then a
secure firmware update mechanism is preferred. Otherwise inauthentic firmware may be
written to the device, causing it to not boot.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to allow secure update and permanently disable write-memory? otherwise I don't understand how it's possible to prevent writing of inauthentic firmware?&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;</description>
    <pubDate>Fri, 12 Nov 2021 07:22:33 GMT</pubDate>
    <dc:creator>MarcoBelli1</dc:creator>
    <dc:date>2021-11-12T07:22:33Z</dc:date>
    <item>
      <title>lpc55s69 secure boot</title>
      <link>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370023#M46984</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;I'm trying to understand LPC55S69 secure boot.&lt;/P&gt;&lt;P&gt;I'm reading UM11126 user manual and AN12283.&lt;/P&gt;&lt;P&gt;What are the options to update a firmware on LPC after secure boot is enabled?&lt;/P&gt;&lt;P&gt;I understand that 2 main commands are available for programming the flash&lt;/P&gt;&lt;P&gt;1) blhost write-memory&lt;/P&gt;&lt;P&gt;2) blhost receive-sb-file&lt;/P&gt;&lt;P&gt;are both of them available after secure boot is enabled?&amp;nbsp;&lt;/P&gt;&lt;P&gt;is only receive-sb file enabled?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the only info I have found is:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;SECURE_BOOT_CFG
field determines whether
secure boot flow is
enabled or not.
• If secure boot is enabled
or debug authentication
fields (CC_SOCU_xxx) are
not in the default state,
then limited ISP
commands are allowed.
Allowed command set can
be retrieved by “blhost -p
COMx/-u &amp;lt;VID,PID&amp;gt; --
get-property 7”.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Thu, 11 Nov 2021 15:20:28 GMT</pubDate>
      <guid>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370023#M46984</guid>
      <dc:creator>MarcoBelli1</dc:creator>
      <dc:date>2021-11-11T15:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: lpc55s69 secure boot</title>
      <link>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370126#M46985</link>
      <description>&lt;P&gt;Both of these commands are available for programming the flash after secure boot is enabled.&lt;/P&gt;
&lt;P&gt;As you can see in AN12283, “write-memory” is used to write a signed image into flash (p. 15) and “receive-sb-file” is used to load a SB2.0 file into the device (p. 19). In both instances the secure boot is already enabled. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also find some more information about each command on the “blhost User's Guide” document, here’s the link: &lt;A href="https://www.nxp.com/docs/en/user-guide/MCUBLHOSTUG.pdf" target="_blank"&gt;https://www.nxp.com/docs/en/user-guide/MCUBLHOSTUG.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Edwin.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Nov 2021 19:08:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370126#M46985</guid>
      <dc:creator>EdwinHz</dc:creator>
      <dc:date>2021-11-11T19:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: lpc55s69 secure boot</title>
      <link>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370436#M46989</link>
      <description>&lt;P&gt;In UM11126 chapter 7.2.2&amp;nbsp;Secure firmware update it's written:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;If firmware updates are to be performed in the field when secure boot is enabled, then a
secure firmware update mechanism is preferred. Otherwise inauthentic firmware may be
written to the device, causing it to not boot.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to allow secure update and permanently disable write-memory? otherwise I don't understand how it's possible to prevent writing of inauthentic firmware?&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;</description>
      <pubDate>Fri, 12 Nov 2021 07:22:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370436#M46989</guid>
      <dc:creator>MarcoBelli1</dc:creator>
      <dc:date>2021-11-12T07:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: lpc55s69 secure boot</title>
      <link>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370824#M46994</link>
      <description>&lt;P&gt;Secure Boot provides the tools to ensure that unauthorized code can’t be executed, not to disable flash programming. This is instead done with the Lifecycle state. Take a look into Section 10.3 of the User Manual, specifically “OEM Closed” on Table 273. I believe this will prove to be useful for your inquiry.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Nov 2021 21:37:35 GMT</pubDate>
      <guid>https://community.nxp.com/t5/LPC-Microcontrollers/lpc55s69-secure-boot/m-p/1370824#M46994</guid>
      <dc:creator>EdwinHz</dc:creator>
      <dc:date>2021-11-12T21:37:35Z</dc:date>
    </item>
  </channel>
</rss>

