<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nRF5340: net core application image signed by another key is booted</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/111290/nrf5340-net-core-application-image-signed-by-another-key-is-booted</link><description>Hello, 
 I&amp;#39;m developing a firmware based on Zigbee CLI sample and enabled DFU of app core and net core via serial. 
 
 Now I am setting a custom key for image signing and checking the verification. Verifing app core application works fine, but verifing</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 28 May 2024 13:47:40 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/111290/nrf5340-net-core-application-image-signed-by-another-key-is-booted" /><item><title>RE: nRF5340: net core application image signed by another key is booted</title><link>https://devzone.nordicsemi.com/thread/486221?ContentTypeID=1</link><pubDate>Tue, 28 May 2024 13:47:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4b97a17b-40a7-49b3-9453-cdc0b3df586c</guid><dc:creator>Sigurd Hellesvik</dc:creator><description>&lt;p&gt;Then we take a step back:&lt;/p&gt;
&lt;p&gt;The issue is that verification of network core image does not work, right?&lt;/p&gt;
&lt;p&gt;I think we need logs from the bootloaders in this case.&lt;br /&gt;Can you get those logs, from both cores?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF5340: net core application image signed by another key is booted</title><link>https://devzone.nordicsemi.com/thread/486069?ContentTypeID=1</link><pubDate>Tue, 28 May 2024 02:15:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8f5dd283-fdf9-4c74-9b09-f2bb73bc508a</guid><dc:creator>yuk</dc:creator><description>&lt;p&gt;Thank you for your support.&lt;/p&gt;
&lt;p&gt;I checked with&amp;nbsp;&lt;span&gt;&amp;quot;west -vvv build ...&amp;quot; and its result was&lt;/span&gt;&amp;nbsp;&amp;quot;keys were set as I expected&amp;quot;.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Build log of the base firmware with key name image_sign.pem;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;[392/402] cd /D C:\Users\yuk\dev\git\firmware\zigbee_cli\build_1\modules\mcuboot &amp;amp;&amp;amp; C:\ncs\toolchains\31f4403e35\opt\zephyr-sdk\arm-zephyr-eabi\bin\arm-zephyr-eabi-objcopy.exe --input-target=ihex --output-target=binary --gap-fill=0xff C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/802154_rpmsg/zephyr/signed_by_b0_app.hex C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/zephyr/net_core_app_to_sign.bin &amp;amp;&amp;amp; C:\Users\yuk\AppData\Local\Programs\Python\Python312\python.exe C:/Users/yuk/ncs/v2.4.2/bootloader/mcuboot/scripts/imgtool.py sign --key C:/Users/yuk/dev/git/firmware/zigbee_cli/custom_key_dir/image_sign.pem --header-size 0x200 --align 4 --version 1.1.0+4 --pad-header --slot-size 0x74000 C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/zephyr/net_core_app_to_sign.bin C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/zephyr/net_core_app_update.bin&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="color:black;font-family:Arial;font-size:9.0pt;margin:0in;"&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Build log of the&amp;nbsp;test firmware for image verification with key test_image_sign.pem;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;&lt;span&gt;[386/402] cd /D C:\Users\yuk\dev\git\firmware\zigbee_cli\build_1\modules\mcuboot &amp;amp;&amp;amp; C:\ncs\toolchains\31f4403e35\opt\zephyr-sdk\arm-zephyr-eabi\bin\arm-zephyr-eabi-objcopy.exe --input-target=ihex --output-target=binary --gap-fill=0xff C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/802154_rpmsg/zephyr/signed_by_b0_app.hex C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/zephyr/net_core_app_to_sign.bin &amp;amp;&amp;amp; C:\Users\yuk\AppData\Local\Programs\Python\Python312\python.exe C:/Users/yuk/ncs/v2.4.2/bootloader/mcuboot/scripts/imgtool.py sign --key C:/Users/yuk/dev/git/firmware/zigbee_cli/custom_key_dir/test_image_sign.pem --header-size 0x200 --align 4 --version 1.1.0+6 --pad-header --slot-size 0x74000 C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/zephyr/net_core_app_to_sign.bin C:/Users/yuk/dev/git/firmware/zigbee_cli/build_1/zephyr/net_core_app_update.bin&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;
&lt;p style="color:black;font-family:Arial;font-size:9.0pt;margin:0in;"&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Thank you&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF5340: net core application image signed by another key is booted</title><link>https://devzone.nordicsemi.com/thread/485848?ContentTypeID=1</link><pubDate>Fri, 24 May 2024 13:38:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:87cf9bba-c286-4c67-82a5-1a2733899611</guid><dc:creator>Sigurd Hellesvik</dc:creator><description>&lt;p&gt;Check with &amp;quot;west -vvv build ...&amp;quot; that the keys were really set as you expected.&lt;/p&gt;
&lt;p&gt;If they are set as expected, then we will take a step back, un-assume that this is related to keys and apply some generic debugging to your issue.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF5340: net core application image signed by another key is booted</title><link>https://devzone.nordicsemi.com/thread/485716?ContentTypeID=1</link><pubDate>Fri, 24 May 2024 05:39:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:91eadedc-dd01-43c5-98ff-bcdf5e821c4c</guid><dc:creator>yuk</dc:creator><description>&lt;p&gt;Thank you for your reply.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;I set the key with&amp;nbsp;802154_rpmsg_CONFIG_SB_SIGNING_KEY_FILE, because i&amp;#39;m using Zigbee not BT.&lt;/p&gt;
&lt;p&gt;Now my&amp;nbsp;&lt;span&gt;CMakeList has&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;pre class="ui-code" data-mode="text"&gt;set(mcuboot_CONFIG_BOOT_SIGNATURE_KEY_FILE \&amp;quot;${CMAKE_CURRENT_SOURCE_DIR}/custom_key_dir/image_sign.pem\&amp;quot;)
set(802154_rpmsg_CONFIG_SB_SIGNING_KEY_FILE \&amp;quot;${CMAKE_CURRENT_SOURCE_DIR}/custom_key_dir/image_sign.pem\&amp;quot;)&lt;/pre&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;I tried DFU same as before with this version.&lt;/p&gt;
&lt;p&gt;However, the behavior remains the same. The net core app is able to start after DFU. This is not my expectation...&lt;/p&gt;
&lt;p&gt;Is there something else I&amp;#39;m missing?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Thank you.&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF5340: net core application image signed by another key is booted</title><link>https://devzone.nordicsemi.com/thread/485060?ContentTypeID=1</link><pubDate>Tue, 21 May 2024 11:17:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2aaaf4f4-2198-40c2-9bef-92d251d13f9c</guid><dc:creator>Sigurd Hellesvik</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Yes, the network core image is also signed.&lt;/p&gt;
&lt;p&gt;If I build with &amp;quot;west -vvv build ...&amp;quot;, I get the following log:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[227/236] cd /home/bruk/hdd/nrf_connect_sdk/zephyr/samples/hello_world/build/modules/mcuboot &amp;amp;&amp;amp; /opt/zephyr-sdk/arm-zephyr-eabi/bin/arm-zephyr-eabi-objcopy --input-target=ihex --output-target=binary --gap-fill=0xff /home/bruk/hdd/nrf_connect_sdk/zephyr/samples/hello_world/build/hci_ipc/zephyr/signed_by_b0_app.hex /home/bruk/hdd/nrf_connect_sdk/zephyr/samples/hello_world/build/zephyr/net_core_app_to_sign.bin &amp;amp;&amp;amp; /home/bruk/hdd/nrf_connect_sdk/venv/bin/python /home/bruk/hdd/nrf_connect_sdk/bootloader/mcuboot/scripts/imgtool.py sign --key /home/bruk/hdd/nrf_connect_sdk/bootloader/mcuboot/root-rsa-2048.pem --header-size 0x200 --align 4 --version 0.0.0+0 --pad-header --slot-size 0x78000 /home/bruk/hdd/nrf_connect_sdk/zephyr/samples/hello_world/build/zephyr/net_core_app_to_sign.bin /home/bruk/hdd/nrf_connect_sdk/zephyr/samples/hello_world/build/zephyr/net_core_app_update.bin
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;As you can see, it is signed with the MCUboot key, and with the key of the network core bootloader.&lt;/p&gt;
&lt;p&gt;Try to set the key for the network core bootloader as well, with hci_ipc_CONFIG_SB_SIGNING_KEY_FILE&lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;Sigurd Hellesvik&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>