MCUXpresso Secure Provisioning Tool IMXRT1170

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 

MCUXpresso Secure Provisioning Tool IMXRT1170

53 次查看
danielberhe
Contributor IV

Hi All,

I've been looking at MCUXpresso Secure Provisioning tool for my custom imxrt1170 based board.  The tool is able to detect the board via USB and managed to build and write an image to the flash (MT25QL256ABA1EW7-0SIT). I did all of this using the GUI and not the command line interface. I saw in the user guide that it supports command line but I couldn't see all the commands I need. For context, these are the steps I need to manufacture my board:

  1. Generate authentication keys. I guess this only need to be done once.
  2. Build a signed image. This image will be the bootloader and won't change once a board has shipped so I will only need to generate the image once and use it on multiple boards.
  3. Write the image and burn the srk hash fuses.
  4. Close the board. How do I check the bootloader image I wrote in step 2 above will actually pass the signature check? In uboot, I used to run hab_status before closing the board, but not sure how that's done in this case.
  5. Potentially reset so that the closing the board state changes? Previously on imx6 units, the board was reporting that it was in unsecure mode until it was rebooted. Is that the case here?
  6. Write the application image to flash at a given offset.
  7. Write "golden" factory application image to flash at another given offset.
  8. Write other manufacturing data at given flash offset.
  9. Burn fuses to set the boot media (SPI NOR for me so no fuses to burn) and BT_FUSE_SEL.

Can I do the above steps using the secure provisioning tool command line interface? The writing to flash bits will potentially need to erase sectors first and also do verify after write.

Thank you,

Daniel

0 项奖励
回复
1 回复

14 次查看
Gavin_Jia
NXP TechSupport
NXP TechSupport

Hi @danielberhe ,

Thanks for your interest in NXP MIMXRT series!

In fact, the actions you perform with the SPT tool are logged in the log window below, and you can view this log to get the underlying commands that were actually executed.

Best regards,
Gavin

0 项奖励
回复