Hi,
I have generated below keys through NXP CST:
Do you want to use an existing CA key (y/n)?: n
Key type options (confirm targeted device supports desired key type):
Select the key type (possible values: rsa, rsa-pss, ecc)?: ecc
Enter length for elliptic curve to be used for PKI tree:
Possible values p256, p384, p521: p384
Enter the digest algorithm to use: sha384
Enter PKI tree duration (years): 5
Do you want the SRK certificates to have the CA flag set? (y/n)?: n
kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ ../linux64/bin/srktool -a -d sha256 -s sha384 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -f 1 -c ./SRK1_sha384_secp384r1_v3_usr_crt.pem,./SRK2_sha384_secp384r1_v3_usr_crt.pem,./SRK3_sha384_secp384r1_v3_usr_crt.pem,./SRK4_sha384_secp384r1_v3_usr_crt.pem
Number of certificates = 4
SRK table binary filename = SRK_1_2_3_4_table.bin
SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin
SRK Fuse binary dump:
SRKH[0] = 0x6B8C7EE0
SRKH[1] = 0x18EF2C9C
SRKH[2] = 0xF08294BB
SRKH[3] = 0x0F81D4E7
SRKH[4] = 0xFBF5ECC7
SRKH[5] = 0xD1604A8F
SRKH[6] = 0xB026FF45
SRKH[7] = 0xF1B499F4
kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ openssl dgst -binary -sha256 SRK_1_2_3_4_table.bin
?~?k?,??????ԁ?????J`?E?&?????kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ od -t x4 --endian=big SRK_1_2_3_4_fuse.bin
0000000 e07e8c6b 9c2cef18 bb9482f0 e7d4810f
0000020 c7ecf5fb 8f4a60d1 45ff26b0 f499b4f1
0000040
kiran@ip-172-31-30-41:/data1/Kiran/SEC_YOCTO/cst-4.0.0/crts$ sha256sum SRK_1_2_3_4_table.bin
e07e8c6b9c2cef18bb9482f0e7d4810fc7ecf5fb8f4a60d145ff26b0f499b4f1 SRK_1_2_3_4_table.bin
Can you please guide me on which fuse addresses do I have to flash the below?:
SRK Fuse binary dump:
SRKH[0] = 0x6B8C7EE0
SRKH[1] = 0x18EF2C9C
SRKH[2] = 0xF08294BB
SRKH[3] = 0x0F81D4E7
SRKH[4] = 0xFBF5ECC7
SRKH[5] = 0xD1604A8F
SRKH[6] = 0xB026FF45
SRKH[7] = 0xF1B499F4
Also, any other steps that I need to do after flashing the keys?
Thx,
Kiran.