MCUXpresso Secure Provisioning Tool v9.0.1 Now Available

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

MCUXpresso Secure Provisioning Tool v9.0.1 Now Available

MCUXpresso Secure Provisioning Tool v9.0.1 Now Available

MCUXpresso Secure Provisioning Tool (SEC) is a graphical user interface (GUI) tool covering secure boot process and Trust Provisioning capabilities, primarily aimed at microcontroller customers. It provides unified GUI front-end over existing command-line tools (cst, pfr, tpconfig, tphost).

What is new in the v9.0.1 release?

  • Added support for MCF56816xx/7xx/8xx processors
  • Added support for MCX N23x and MCX A14x / A15x processors
  • Added support for MWCT2x12/D2 processors
  • Added support for NHS52S04 processor
  • Added support for MCUboot - open source secondary bootloader
  • Additional images can be used for most of the processors (except for KW45 and K32W processors)
  • Exported OTP/PFR/IFR configuration now contains page name, that is validated during the import.
  • Firmware version supported for LPC55Sxx and i.MX RTxxx processors; for RT118x it is available only for signed images
  • Minimal firmware version can be now specified in firmware configuration dialog
  • Added support for build, write and manufacturing script hooks
  • Removed limitation for key chain length for LPC55S6x and i.MX RTxxx processors; for other LPCs changed to warning
  • Added support for FlexSPI instance selection for FlexSPI NAND for i.MX RT116x/7x
  • Supported key revocation constraint for LPC55S3x, MCX N1xx, RW61x, KW45 and K32W processors
  • The MBI image is partially erased before executing Device HSM, so it does not boot after reset. Applies for MCX N10, MCX N11, LPC55S3x, RW61x and MWCT2x12
  • In the installation layout, created "sample_data" sub-folder (soft link), it contains sample binary applications, signature provider examples, trust zone, XMCD and DCD configuration templates
  • Signature provider:

  - added support of sending only hash of the data for signing

  - incompatible change in encoding of sending public keys, public keys are encoded in the standard key encodings (pem, der, nxp) instead of hex format

  • Integrated NXP Secure Provisioning SDK 2.2.x with the following highlighted changes:

 - new tools: nxpmemcfg, dk6prog, el2go, nxpwpc

  • i.MX RT1050/6x: eMMC supported
  • RW61x: Device HSM trust provisioning now required Device HSM loader from restricted data package
  • Removed support for JLink and PEmicro debug libraries; all debug probes are now supported via pyOCD
  • Added CLI tools: imgtool and uuu
  • CLI: added support to save or change workspace settings and specify additional images
  • Fixed $check_fw_versions SB2.1 high level commands for SB editor
  • Fixed default flash (W25Q512NWEQ) for i.MX RT117x based on flash used on RT117x-EVKB
  • Fixed key used to sign flashloader for i.MX RT10xx and RT116x/7x - changed from the first key to the selected key
  • Fixed flashloader for i.MX RT1181/82 processors

Note: v9.0.1 release fixes several customers issues reported for SEC v9

 

Downloads

 

Useful links:

Release Notes: MCUXpresso Secure Provisioning Tool (SEC) v9.0.1 release notes

Fact Sheet: MCUXpresso Secure Provisioning Tool Fact Sheet 

Labels (1)
100% helpful (1/1)
Version history
Last update:
‎08-22-2024 01:55 PM
Updated by: