unique key for each i.MX8M device using its CPU UID to sign boot images for testing?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

unique key for each i.MX8M device using its CPU UID to sign boot images for testing?

314 Views
Tubi
Contributor I

I'm working on a secure manufacturing and test process for i.MX8M devices with HAB in closed mode.

For returned products or production testing, I want to boot a custom test image (e.g., functional test or recovery U-Boot). To limit security exposure and avoid managing one global signing key, I’m considering generating a unique signing key per device based on its CPU UID (read from OCOTP).

The idea is:

Derive a signing key from the device's UID using HMAC or similar

Use that key to sign a test boot image (for U-Boot or SPL)

Program the device’s SRK or CSF with the matching public key

Allow only that device to boot its own test image

Questions:

Is this technically allowed by the HAB/SRK design?

Can the SRK or CSF be made unique per device based on the UID?

Are there practical limits to doing per-device signed boot images (e.g., provisioning effort, ROM support)?

I’m not looking to weaken security — I just want to avoid using one global key for test image signing. Each test image would be valid for one device only, and this approach would offload security ownership to the customer.

Thanks in advance!

0 Kudos
Reply
1 Reply

283 Views
Harvey021
NXP TechSupport
NXP TechSupport

This is not the default supported approach of our secure boot.

The SW verification part can be implemented by changing the logic.

 

Regards

Harvey

0 Kudos
Reply