MCUXpresso Secure Provisioning Tool IMXRT1170

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

MCUXpresso Secure Provisioning Tool IMXRT1170

52 Views
danielberhe
Contributor IV

Hi All,

I've been looking at MCUXpresso Secure Provisioning tool for my custom imxrt1170 based board.  The tool is able to detect the board via USB and managed to build and write an image to the flash (MT25QL256ABA1EW7-0SIT). I did all of this using the GUI and not the command line interface. I saw in the user guide that it supports command line but I couldn't see all the commands I need. For context, these are the steps I need to manufacture my board:

  1. Generate authentication keys. I guess this only need to be done once.
  2. Build a signed image. This image will be the bootloader and won't change once a board has shipped so I will only need to generate the image once and use it on multiple boards.
  3. Write the image and burn the srk hash fuses.
  4. Close the board. How do I check the bootloader image I wrote in step 2 above will actually pass the signature check? In uboot, I used to run hab_status before closing the board, but not sure how that's done in this case.
  5. Potentially reset so that the closing the board state changes? Previously on imx6 units, the board was reporting that it was in unsecure mode until it was rebooted. Is that the case here?
  6. Write the application image to flash at a given offset.
  7. Write "golden" factory application image to flash at another given offset.
  8. Write other manufacturing data at given flash offset.
  9. Burn fuses to set the boot media (SPI NOR for me so no fuses to burn) and BT_FUSE_SEL.

Can I do the above steps using the secure provisioning tool command line interface? The writing to flash bits will potentially need to erase sectors first and also do verify after write.

Thank you,

Daniel

0 Kudos
Reply
1 Reply

13 Views
Gavin_Jia
NXP TechSupport
NXP TechSupport

Hi @danielberhe ,

Thanks for your interest in NXP MIMXRT series!

In fact, the actions you perform with the SPT tool are logged in the log window below, and you can view this log to get the underlying commands that were actually executed.

Best regards,
Gavin

0 Kudos
Reply