<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regarding the limitations of Key Scramble settings in MCUXpresso Secure Provisioning Tool</title>
    <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2032201#M555</link>
    <description>&lt;P&gt;Hello Marek,&lt;/P&gt;&lt;P&gt;I can confirm that image produced with V7 using a scramble value of&amp;nbsp;0x19a8c836 and a scramble align of 0xd6 doesn't work - while using the default values the image works. Note however that I used different keys and random counter.&lt;/P&gt;&lt;P&gt;I carefully checked fuse settings on the non-working board (the one with the mentioned scramble values) and they look correct. Apparently, image_enc tool is producing a bad key blob.&lt;/P&gt;&lt;P&gt;As a side note, I am surprised that issues on such a sensitive topic (image protection) are not being appropriately addressed: how is it possible that, although ages have passed, it is still not possible to reliably get a correctly formed bootable image from SPT?&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Stefano&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jan 2025 09:13:23 GMT</pubDate>
    <dc:creator>svoulaz_ik</dc:creator>
    <dc:date>2025-01-22T09:13:23Z</dc:date>
    <item>
      <title>Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2018433#M529</link>
      <description>&lt;P&gt;Hi NXP&lt;/P&gt;&lt;P&gt;According to NXP application note, OTFAD_KEY_SCRAMBLE and ALIGN were arbitrary word and byte.&lt;/P&gt;&lt;P&gt;But when I set non-SPT default values (0x33AA55CC &amp;amp; 0x1B), the RT10101 fails to decrypt and boot .[On my EVT board] .It stops in ISP mdoe.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;===================================================================&lt;BR /&gt;On the NXP RT1010 EVB, writing the default settings(0x33AA55CC &amp;amp; 0x1B) allows it to boot successfully.&lt;/P&gt;&lt;P&gt;The following are the steps on NXP EVB&lt;/P&gt;&lt;P&gt;Step 1. Burning fuses[OTFAD KEK &amp;amp; SCRAMBLE] =&amp;gt; boot successfully.&lt;BR /&gt;Step 2. Burning fuses[HAB] =&amp;gt; boot successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;===================================================================&lt;BR /&gt;On non-NXP EVB device, writing the non-default settings ,the RT10101 fails to decrypt and boot and stops in ISP mdoe.&lt;BR /&gt;The following are the steps on my EVT board&lt;/P&gt;&lt;P&gt;Step 1. Burning fuses[OTFAD KEK] =&amp;gt; boot successfully.&lt;BR /&gt;Step 2. Burning fuses[HAB] =&amp;gt; boot successfully.&lt;BR /&gt;Step 3. Burning fuses[SCRAMBLE] =&amp;gt; &lt;FONT color="#FF0000"&gt;boot Fail.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I use SPT for programming, and during the programming process, it will verify that the SPT fuses settings match the device. Therefore, my settings should be correctly written to my EVT board.&lt;/P&gt;&lt;P&gt;Using the SPT OTP setting function, I also confirmed that my settings were successfully written to the eFuses.&lt;/P&gt;&lt;P&gt;I tried changing the OTFAD encryption block to an unwritten block (e.g., 0x60020000), and my EVT board can boot normally.&lt;BR /&gt;=&amp;gt;This indicates that there might be an issue with the decryption process.&lt;BR /&gt;===================================================================&lt;/P&gt;&lt;P&gt;Based on the above successful and failed boot cases:&lt;/P&gt;&lt;P&gt;1. Does the order of writing eFuses affect the functionality of OTFAD and Scramble?&lt;/P&gt;&lt;P&gt;2. Are there any configuration limitations for OTFAD_KEY_SCRAMBLE and ALIGN?&lt;/P&gt;&lt;P&gt;Does this mean there is an issue with OTFAD and Scramble?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 08:12:24 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2018433#M529</guid>
      <dc:creator>Omar_hong</dc:creator>
      <dc:date>2024-12-23T08:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021167#M538</link>
      <description>&lt;P&gt;Hi Omar,&lt;/P&gt;
&lt;P&gt;after you burn SCRAMBLE, you need to update key blobs (because key blobs are affected by the SCRAMBLE).&lt;/P&gt;
&lt;P&gt;There is application note with details about OTFAD encryption on RT101x, which might help: AN12670 How to use encrypted XIP boot.in i.MX RT1010&lt;/P&gt;
&lt;P&gt;About ALIGN, please refer to chapter "Key blob KEK details" in Security Reference Manual.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 08:50:34 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021167#M538</guid>
      <dc:creator>marek-trmac</dc:creator>
      <dc:date>2025-01-02T08:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021214#M539</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/176703"&gt;@marek-trmac&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Thank you for your reply.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;I have used SPT to erase the flash in the above steps, and then used SPT to rewrite the updated KEY blobs and firmware.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 09:35:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021214#M539</guid>
      <dc:creator>Omar_hong</dc:creator>
      <dc:date>2025-01-02T09:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021225#M540</link>
      <description>&lt;P&gt;Hi Omar,&lt;/P&gt;
&lt;P&gt;what ALIGN fuse value did you burn? Does default OTFAD settings works on your custom board?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 09:41:15 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021225#M540</guid>
      <dc:creator>marek-trmac</dc:creator>
      <dc:date>2025-01-02T09:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021248#M541</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/176703"&gt;@marek-trmac&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for your reply.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;what ALIGN fuse value did you burn?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt;Since the setting values are intended for future production, it is inconvenient to disclose them. I can only say that I have set them within the range of 0x00 to 0xFF.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Does default OTFAD settings works on your custom board?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt;Due to concerns about causing the aforementioned situation again, I am currently not burn any scramble config( OTFAD_KEY_SCRAMBLE and ALIGN) to the custom board.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 10:13:14 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021248#M541</guid>
      <dc:creator>Omar_hong</dc:creator>
      <dc:date>2025-01-02T10:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021902#M542</link>
      <description>&lt;P&gt;Hi Omar,&lt;/P&gt;
&lt;P&gt;we confirm the problem, we found the keyblob is generated wrongly for same scramble values. The problem is reproducible since SEC tool v8. Could you use SEC tool v7? In version 7 the tool uses &lt;STRONG&gt;image_enc&lt;/STRONG&gt; utility to generate the keyblob and there is no such issue.&lt;/P&gt;
&lt;P&gt;We are sorry for the inconvenience.&amp;nbsp;We'll fix the problem for next release.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 12:47:24 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2021902#M542</guid>
      <dc:creator>marek-trmac</dc:creator>
      <dc:date>2025-01-03T12:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2022361#M544</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/176703"&gt;@marek-trmac&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I am using SPT V9.0.1.&amp;nbsp; Do you mean that I need to use version V7.0 to generate the correct keyblob data based on my scramble values ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 07:36:14 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2022361#M544</guid>
      <dc:creator>Omar_hong</dc:creator>
      <dc:date>2025-01-06T07:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2022372#M545</link>
      <description>&lt;P&gt;Hi Omar,&lt;/P&gt;
&lt;P&gt;yes, use SEC v7. The problem is in nxpimage utility, which is used to generate keyblob since SEC v8. In the older versions, keyblob was generated using image_enc utility.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 07:47:05 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2022372#M545</guid>
      <dc:creator>marek-trmac</dc:creator>
      <dc:date>2025-01-06T07:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2031602#M551</link>
      <description>&lt;P&gt;Hello, having same trouble on rt1176 using SEC V10 - can you confirm the problem still exists on V10?&lt;/P&gt;&lt;P&gt;Besides, since V7 does not accept binary images with boot header nor ELF files (at least, not those built within&amp;nbsp;MCUXpresso IDE v11.9.0 Build 2144), I'm having hard times with V7 too - and the encrypted image (from blinky sample) does not work anyway. Looks like older image_enc tool suffers the same bug with some scrambling value and/or align.&lt;/P&gt;&lt;P&gt;I am quite surprised this issue has not been addressed yet, since it is actually a security flaw - scrambling is definitely useless if you can (safely) use only default values.&lt;/P&gt;&lt;P&gt;Kudos&lt;/P&gt;&lt;P&gt;Stefano&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 16:34:49 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2031602#M551</guid>
      <dc:creator>svoulaz_ik</dc:creator>
      <dc:date>2025-01-21T16:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2032090#M553</link>
      <description>&lt;P&gt;Hi Stefano,&lt;/P&gt;
&lt;P&gt;scramble for RT116x/7x and RT10xx is confirmed bug in MCUXpresso Secure Provisioning tool v10 and currently there is not planned any hotfix. RT117x is supported since&amp;nbsp;MCUXpresso Secure Provisioning tool v5, so we recommend to use older version (v7). There is not known such problem for image_enc tool.&lt;/P&gt;
&lt;P&gt;For the input image, kindly follow the description in chapter 6.2.1.1 and disable&amp;nbsp;XIP_BOOT_HEADER_ENABLE (images with the header are not supported in tool version 7).&lt;/P&gt;
&lt;P&gt;We are sorry for inconvenience&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 07:28:38 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2032090#M553</guid>
      <dc:creator>marek-trmac</dc:creator>
      <dc:date>2025-01-22T07:28:38Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2032201#M555</link>
      <description>&lt;P&gt;Hello Marek,&lt;/P&gt;&lt;P&gt;I can confirm that image produced with V7 using a scramble value of&amp;nbsp;0x19a8c836 and a scramble align of 0xd6 doesn't work - while using the default values the image works. Note however that I used different keys and random counter.&lt;/P&gt;&lt;P&gt;I carefully checked fuse settings on the non-working board (the one with the mentioned scramble values) and they look correct. Apparently, image_enc tool is producing a bad key blob.&lt;/P&gt;&lt;P&gt;As a side note, I am surprised that issues on such a sensitive topic (image protection) are not being appropriately addressed: how is it possible that, although ages have passed, it is still not possible to reliably get a correctly formed bootable image from SPT?&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Stefano&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 09:13:23 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2032201#M555</guid>
      <dc:creator>svoulaz_ik</dc:creator>
      <dc:date>2025-01-22T09:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the limitations of Key Scramble settings</title>
      <link>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2033129#M560</link>
      <description>&lt;P&gt;Hi Stefano,&lt;/P&gt;
&lt;P&gt;Here is an update for your problem: for i.MX RT116x/7x, the image_enc utility was replaced by nxpimage already in SEC v7. That's why SEC v7 produces same problem in keyblob as SEC v10. For RT117x kindly use SEC v6. You can still use the processor with your custom fuses, only the keyblob needs to be fixed (bootable_images\otfad_keyblobs.bin).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, it shall be also possible to generate keyblob in SEC v6 and replace the keyblob generated by SEC v10 (it is possible to add hook into SEC v10 build script). To do this, you must have all keys and all OTFAD parameters same in both workspaces.&lt;/P&gt;
&lt;P&gt;We are sorry for inconvenience&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 10:17:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCUXpresso-Secure-Provisioning/Regarding-the-limitations-of-Key-Scramble-settings/m-p/2033129#M560</guid>
      <dc:creator>marek-trmac</dc:creator>
      <dc:date>2025-01-23T10:17:46Z</dc:date>
    </item>
  </channel>
</rss>

