<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/112323/nrf5340---mcuboot-secure-boot-with-production-keys</link><description>Hi, I&amp;#39;m working on nRF5340, NCS v2.6.1, Zephyr v3.4.99. The net core is running the child image HCI RPMsg controller. Th app core is running application and child image mcuboot. 
 I know that by default MCUboot uses generated NSIB key pair &amp;lt;ncs&amp;gt;/bootloader</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 05 Jul 2024 09:34:53 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/112323/nrf5340---mcuboot-secure-boot-with-production-keys" /><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/492407?ContentTypeID=1</link><pubDate>Fri, 05 Jul 2024 09:34:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5ad218c2-bde5-4825-b21e-75fff8e41322</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;It&amp;#39;s weird. In the subsequent tests I&amp;#39;ve not seen the &amp;quot;Not enough free space&amp;quot; warning anymore.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/492326?ContentTypeID=1</link><pubDate>Thu, 04 Jul 2024 17:24:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c207a488-3672-42b2-a492-41c6c0e4a002</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;It says that there is not enough&amp;nbsp;free space to perform a swap upgrade. Seems like it is trying to place the FW image into the s0/s1 slot intended for mcuboot, given the reported number of bytes available.&lt;/p&gt;
&lt;p&gt;Warning messages from MCUBoot&amp;nbsp;in your log:&lt;/p&gt;
&lt;p&gt;W: Not enough free space to run swap upgrade&lt;br /&gt;W: required 253952 bytes but only 65536 are available&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/492319?ContentTypeID=1</link><pubDate>Thu, 04 Jul 2024 15:40:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:70db46e7-4be5-4034-9f82-48ca0950d025</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;OK, I&amp;#39;ve added&amp;nbsp;&lt;/p&gt;
&lt;p&gt;CONFIG_UART_CONSOLE=y&lt;br /&gt;CONFIG_LOG_BACKEND_UART=y&lt;br /&gt;CONFIG_LOG_MODE_MINIMAL=y&lt;/p&gt;
&lt;p&gt;Then I checked it out trying a DFU using a not-signed application image&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
Attempting to boot slot 0.
Attempting to boot from address 0x8200.
Verifying signature against key 0.
Hash: 0x8f...99
Firmware signature verified.
Firmware version 2
Booting (0x8200).*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
I: Starting bootloader
I: Primary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
I: Secondary image: magic=good, swap_type=0x2, copy_done=0x3, image_ok=0x3
I: Boot source: none
I: Primary image: magic=unset, swap_type=0x1, copy_done=0x1, image_ok=0x3
I: Secondary image: magic=good, swap_type=0x2, copy_done=0x3, image_ok=0x3
I: Boot source: none
I: Image index: 1, Swap type: test
I: Starting swap using move algorithm.
W: Not enough free space to run swap upgrade
W: required 253952 bytes but only 65536 are available
I: Bootloader chainload address offset: 0x30000
I: Jumping to the first image slot*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
[00:00:00.215,698] &amp;lt;inf&amp;gt; hostgw: initialized
[00:00:00.220,581] &amp;lt;inf&amp;gt; hostgw: start thread (priority: 1)
[00:00:00.237,091] &amp;lt;dbg&amp;gt; hostgw: hgw_thread: timeout, buffer size: 1 bytes.

	*********************************
	*       XXXXXXXXXXXXXX          *
	*********************************
	product name : Q
	part number  : C09094-01-99
	serial number: 1234509876
	ble address  : E7:7B:3A:2F:63:D5 (random)
	ble serial   : 2020016037
	fw version   : 1.0-beta17
	fw commit    : 154e35853e82d4b7cae3f3bcfc60c3e81a171983
	hw revision  : A
	hw config    : 0
	auth sw ver  : -.-.-.-
	auth fw ver  : -.-.-.-
	Ta (0.1C)    : 272
	Rh (perc)    : 51
	Pb (mmHg)    : 742

[00:02:14.711,395] &amp;lt;wrn&amp;gt; control: starting dfu..		&amp;lt;-- STARTING DFU OF AN APPLICATION IMAGE WHICH IS NOT SIGNED

*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
Attempting to boot slot 0.
Attempting to boot from address 0x8200.
Verifying signature against key 0.
Hash: 0x8f...99
Firmware signature verified.
Firmware version 2
Booting (0x8200).*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
I: Starting bootloader
I: Primary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
I: Secondary image: magic=good, swap_type=0x2, copy_done=0x3, image_ok=0x3
I: Boot source: none
I: Primary image: magic=unset, swap_type=0x1, copy_done=0x1, image_ok=0x3
I: Secondary image: magic=good, swap_type=0x2, copy_done=0x3, image_ok=0x3
I: Boot source: none
I: Image index: 1, Swap type: test
I: Starting swap using move algorithm.
W: Not enough free space to run swap upgrade
W: required 253952 bytes but only 65536 are available
I: Bootloader chainload address offset: 0x30000
I: Jumping to the first image slot*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
[00:00:00.216,217] &amp;lt;inf&amp;gt; hostgw: initialized
[00:00:00.221,069] &amp;lt;inf&amp;gt; hostgw: start thread (priority: 1)
[00:00:00.237,579] &amp;lt;dbg&amp;gt; hostgw: hgw_thread: timeout, buffer size: 1 bytes.

	*********************************
	*       XXXXXXXXXXXXXX          *
	*********************************
	product name : Q
	part number  : C09094-01-99
	serial number: 1234509876
	ble address  : E7:7B:3A:2F:63:D5 (random)
	ble serial   : 2020016037
	fw version   : 1.0-beta17
	fw commit    : 154e35853e82d4b7cae3f3bcfc60c3e81a171983
	hw revision  : A
	hw config    : 0
	auth sw ver  : -.-.-.-
	auth fw ver  : -.-.-.-
	Ta (0.1C)    : 271
	Rh (perc)    : 51
	Pb (mmHg)    : 742
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The firmware update gets failed (I know that).&lt;br /&gt;The problem is that from the mcuboot log there is no cues that something went wrong.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/492268?ContentTypeID=1</link><pubDate>Thu, 04 Jul 2024 12:58:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6177c5a8-30a0-41b2-9395-d39c0fe8f769</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;You&amp;#39;ve set&amp;nbsp;CONFIG_LOG_BACKEND_UART to &amp;#39;=n&amp;#39;, which prevents the logger from writing anything to your uart terminal.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/492168?ContentTypeID=1</link><pubDate>Thu, 04 Jul 2024 06:27:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:60b514a4-8bbd-43d9-b169-89079b8041ff</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;Hi Vidar, please find here the &lt;span&gt;build/mcuboot/zephyr/.config. Yes, the last part of the console output is from the application&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/mcuboot_5F00_config.zip"&gt;devzone.nordicsemi.com/.../mcuboot_5F00_config.zip&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491638?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 14:14:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f33e3e4c-144d-43af-9b05-d59ea7a25f24</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;To confirm which symbols are selected, you can check the generated configuration file build/mcuboot/zephyr/.config. Was the last part of your debug output from the application?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491582?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 12:02:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1ac96b63-4a39-4a8f-a6f7-0046721c512d</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;At build time I get&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;..
Merged configuration &amp;#39;/home/gabriele/spiro-dev/apps/spiro/child_image/mcuboot.conf&amp;#39;
..
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;This is&amp;nbsp;&lt;span&gt;mcuboot.conf content&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;CONFIG_SERIAL=y
CONFIG_UART_CONSOLE=n
CONFIG_MCUBOOT_SERIAL=n
CONFIG_FPROTECT=n
CONFIG_BOOT_SERIAL_UART=n
CONFIG_LOG_BACKEND_UART=n
CONFIG_USE_SEGGER_RTT=y
CONFIG_RTT_CONSOLE=y
CONFIG_CONSOLE_HANDLER=n

CONFIG_BOOT_MAX_IMG_SECTORS=256
CONFIG_PM_PARTITION_SIZE_MCUBOOT=0x10000

### Enable ECDSA signing/verification
CONFIG_BOOT_SIGNATURE_KEY_FILE=&amp;quot;../../../../cosmed_priv_ecdsa.pem&amp;quot;
CONFIG_BOOT_SIGNATURE_TYPE_RSA=n
CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256=y
CONFIG_BOOT_SIGNATURE_TYPE_ED25519=n
CONFIG_BOOT_VALIDATE_SLOT0=y
CONFIG_FW_INFO_FIRMWARE_VERSION=2
CONFIG_FW_INFO=y

# Logging options
CONFIG_LOG=y
CONFIG_MCUBOOT_LOG_LEVEL_INF=y
&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491563?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 11:03:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5c515ec7-a527-4e7d-bf49-3c4a49992837</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Yes, it should be, but I didn&amp;#39;t see any logs from MCUBoot in the image you posted. Is this section printed by the app:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/pastedimage1719831775267v1.png" alt=" " /&gt;?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491560?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 10:41:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:65597084-54ed-483c-8ec6-9ebef280cac0</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;In mcuboot.conf I already have&amp;nbsp;&lt;/p&gt;
&lt;p&gt;CONFIG_LOG=y&lt;br /&gt;CONFIG_MCUBOOT_LOG_LEVEL_INF=y&lt;/p&gt;
&lt;p&gt;Isn&amp;#39;t it enough ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491524?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 09:02:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:98c9b5d8-974e-4566-adfa-ef5393fa6617</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;The &amp;quot;Firmware signature verified&amp;quot; message seen in your debug log is from the immutable bootloader after verifying the mcuboot image. You can enable logging in mcuboot to see the status of the applicaiton FW validation.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491497?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 08:01:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b7cb4c88-0618-4704-91f3-a45713548dd6</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;In reality I meant to validate the application image, not the mcuboot image. I think it makes more sense, because the malicious guy would attempt to&amp;nbsp;hack the application in first place. How to do that ?&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491493?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 07:55:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:53e830cb-b421-496d-9074-b9e203ac0ee9</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;If you want to test and verify the boot validation mechanism in the immutable bootloader, you need to&amp;nbsp;invalidate&amp;nbsp;mcuboot image, not the application image.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491486?ContentTypeID=1</link><pubDate>Mon, 01 Jul 2024 07:37:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9326ddc4-74eb-42e4-8b29-6285a5ddf1d8</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;Hi Vidar,&lt;/p&gt;
&lt;p&gt;is there anything wrong I can fix or improve ?&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491250?ContentTypeID=1</link><pubDate>Fri, 28 Jun 2024 08:52:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6e70185b-8e0c-44f1-941e-d293173260cd</guid><dc:creator>Vidar Berg</dc:creator><description>[quote user="gabrielef@cosmed.it"]I made some progress. I&amp;#39;ve verified that the firmware update, controlled by immutable MCUboot, fails if and only if I introduce on purpose any corruption or invalid signature on the application firmware. [/quote]
&lt;p&gt;You are enabling the immutable bootloader with&amp;nbsp;&lt;span&gt;CONFIG_SECURE_BOOT=y,&lt;/span&gt; and using mcuboot as the second stage bootloader.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The immutable bootloader will only validate the mcuboot image.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-2.6.1/page/nrf/config_and_build/bootloaders/bootloader.html"&gt;https://docs.nordicsemi.com/bundle/ncs-2.6.1/page/nrf/config_and_build/bootloaders/bootloader.html&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/491061?ContentTypeID=1</link><pubDate>Thu, 27 Jun 2024 10:08:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6b313f5e-e62c-4389-a967-d26290ba27d7</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;Hi, Vidar&lt;/p&gt;
&lt;p&gt;I made some progress. I&amp;#39;ve verified that the firmware update, controlled by immutable MCUboot, fails if and only if I introduce on purpose any corruption or invalid signature on the application firmware. This makes me confident the secure boot is working fine.&lt;/p&gt;
&lt;p&gt;A problem is that the message I get on the console is always the same, either if the firmware update succeed or fails. It is correct ? I expected to have different messages (see figure)&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/console_5F00_msg_5F00_issue.png" /&gt;&lt;/p&gt;
&lt;p&gt;Please find attached the current config of application and mcuboot. Can you check it ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490758?ContentTypeID=1</link><pubDate>Wed, 26 Jun 2024 06:55:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4c8c9471-8e52-4d81-9f61-5764e4931506</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Could you please post your bootloader configuration file (build/mcuboot/zephyr/.config) here?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490668?ContentTypeID=1</link><pubDate>Tue, 25 Jun 2024 13:34:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f06a4854-9ada-4c2e-8a19-71d87e6cbcc9</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;I&amp;#39;ve double checked CONFIG_SERIAL=y is needed.&lt;br /&gt;I also wanted to test MCUBoot efficacy in preventing firmware update under signature mismatch.&lt;br /&gt;First of all, I build and installed a firmware with&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;mcuboot.conf
&amp;#160; CONFIG_BOOT_SIGNATURE_KEY_FILE=&amp;quot;../../../../mycompany.pem&amp;quot;
myproject.conf
&amp;#160; CONFIG_SB_SIGNING_KEY_FILE=&amp;quot;../../mycompany.pem&amp;quot;&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Then I tryed to flash another firmware with&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;mcuboot.conf
&amp;#160; CONFIG_BOOT_SIGNATURE_KEY_FILE=&amp;quot;../../../../mycompany.pem&amp;quot;
myproject.conf
&amp;#160; CONFIG_SB_SIGNING_KEY_FILE=&amp;quot;../../hackering.pem&amp;quot;&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;The result is as follows&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
Attempting to boot slot 0.
Attempting to boot from address 0x8200.
Firwmare has been invalidated: 0x91020000.
Failed to validate, permanently invalidating!
Attempting to boot slot 1.
No fw_info struct found.
No bootable image found. Aborting boot.&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;This is good, in the sense that a public key mismatch has been detected and the update blocked.&lt;br /&gt;The problem is that the device cannot reboot anymore !&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490558?ContentTypeID=1</link><pubDate>Tue, 25 Jun 2024 09:56:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5137633a-351d-4679-b3c4-6177f1c8b0f4</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;CONFIG_SERIAL should not be required for the default bootloader configuration, so I&amp;#39;m not sure why this was required.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You can make it relative to your project source directory:&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-2.6.1/page/nrf/config_and_build/bootloaders/bootloader_adding.html#d207e671"&gt;https://docs.nordicsemi.com/bundle/ncs-2.6.1/page/nrf/config_and_build/bootloaders/bootloader_adding.html#d207e671&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490327?ContentTypeID=1</link><pubDate>Mon, 24 Jun 2024 13:53:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:58333bd1-8171-41ae-8b60-69b1a864f650</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;I&amp;#39;ve solved by setting this in mcuboot.conf&lt;/p&gt;
&lt;p&gt;CONFIG_SERIAL=y&lt;/p&gt;
&lt;p&gt;One last question.&lt;br /&gt;I want to avoid to set an absolute path in myproject.conf like&lt;/p&gt;
&lt;p&gt;CONFIG_SB_SIGNING_KEY_FILE=&amp;quot;/home/gabriele/myproject/mycompany.pem&amp;quot;&lt;/p&gt;
&lt;p&gt;How to make it relative, i.e. not showing the host user name ?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490207?ContentTypeID=1</link><pubDate>Mon, 24 Jun 2024 09:37:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f86359e4-2100-402e-82ff-ee735335dba6</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;It looks like the program hangs in MCUBoot. I suggest you try to debug the device in VS code to see where&amp;nbsp;it hangs. You may also consider disabling secure boot (&lt;span&gt;CONFIG_SECURE_BOOT=n) to simplify debugging.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490020?ContentTypeID=1</link><pubDate>Fri, 21 Jun 2024 14:47:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:981864c1-14fd-4d4d-9f6b-16544fa35940</guid><dc:creator>Gabriele</dc:creator><description>&lt;p&gt;yes Vidar, it is.&lt;/p&gt;
&lt;p&gt;So, I generated a ECDSA key and switch to&amp;nbsp;&lt;/p&gt;
&lt;p&gt;CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256=y&lt;br /&gt;CONFIG_BOOT_SIGNATURE_TYPE_RSA=n&lt;/p&gt;
&lt;p&gt;The build ends successfully but, at flashing time, I just get this on the console.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting nRF Connect SDK 7d80c8bcf3c8 ***
Attempting to boot slot 0.
Attempting to boot from address 0x8200.
Verifying signature against key 0.
Hash: 0x8f...99
Firmware signature verified.
Firmware version 1
Setting monotonic counter (version: 1, slot: 0)
Booting (0x8200).&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;What&amp;#39;s going on ?&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 - MCUboot secure boot with production keys</title><link>https://devzone.nordicsemi.com/thread/490000?ContentTypeID=1</link><pubDate>Fri, 21 Jun 2024 13:55:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:84e7b69d-4914-4f2d-bf37-d71838e9db1a</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Please check if &amp;#39;&lt;span&gt;CONFIG_BOOT_SIGNATURE_TYPE_RSA&amp;#39; is indeed selected in build/mcuboot/zephyr/.config. This line &amp;quot; File &amp;quot;/home/gabriele/spiro-dev/nrf53sdk/zephyr/python-env/lib/python3.8/site-packages/ecdsa/keys.py&amp;quot;, line 393, in from_der&lt;br /&gt; raise der.UnexpectedDER(&amp;quot; indicates that the build system is trying to use ECDSA instead of RSA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vidar&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>