<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/91118/ble-secure-boot-validation-option-on-the-app-bootloader-zip-file</link><description>Hi 
 I have a running DFU code and can update the bootloader as generated zip file and the app with the zip file. Now I saw, that there is the option &amp;quot;V ALIDATE_ECDSA_P256_SHA256&amp;quot; to generate the packages. 
 See also : https://devzone.nordicsemi.com/guides</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 17 Mar 2023 08:29:33 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/91118/ble-secure-boot-validation-option-on-the-app-bootloader-zip-file" /><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/415898?ContentTypeID=1</link><pubDate>Fri, 17 Mar 2023 08:29:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b1cf7e1d-0c27-4d1b-af93-2744b476665a</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;Those are two different CRCs. By default, the bottom one is 0x00000000:&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/pastedimage1679041440680v1.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;And this is only used if you use the flag app boot validation:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/pastedimage1679041499270v2.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;Note that this also requires some changes to the bootloader. You need to enable some settings in sdk_config.h (I don&amp;#39;t remember which one from the top of my head).&lt;/p&gt;
&lt;p&gt;But remember that settings are only generated with nrfutil if you intend to flash the application with the debugger. If you intend to do a DFU, the settings will be generated by the bootloader.&lt;/p&gt;
&lt;p&gt;If you want to use Boot validation, you need to specify this when generating the application image using nrfutil using &amp;quot;nrfutil pkg generate ... --app-boot-validation &amp;lt;type&amp;gt; ...&amp;quot;&lt;/p&gt;
&lt;p&gt;Please see &amp;quot;nrfutil pkg generate --help&amp;quot;.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;BR,&lt;br /&gt;Edvin&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/415828?ContentTypeID=1</link><pubDate>Thu, 16 Mar 2023 21:27:14 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:83463c82-30f5-457b-9772-3b3bbaec4f30</guid><dc:creator>RVM</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;I have a follow up question.... Who (application or nrfutil) is responsible for creating and inserting the CRC into the new image being uploaded over DFU?&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Does the application developer have to do some kind of post processing to inject this into a specific location in the generated output file &lt;br /&gt;&lt;em&gt;&lt;span style="text-decoration:underline;"&gt;&lt;strong&gt;OR&lt;/strong&gt;&lt;/span&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Does the nrfutil tool calculate and inject this value into the merged HEX or DFU outputs that it generates?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;I also do not understand why the generated BL settings show two CRC fields/values e.g. below:&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/0525.Capture.PNG" /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/383170?ContentTypeID=1</link><pubDate>Thu, 25 Aug 2022 06:48:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c31ec6ba-94c3-4423-96d5-d9af03acca77</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;Ah, I see.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;No, the image will be tranferred. Adding the app-boot-validation will require the bootloader to check the CRC on every reboot (unless otherwise specified). The image will be transferred (since it is signed with the correct key), but when the transfer is done, it will see that the CRC that it should compare against is not present, and hence it will be rejected.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you look at where in the bootloader project&amp;nbsp;NRF_BL_APP_SIGNATURE_CHECK_REQUIRED is used, it is used two places:&lt;/p&gt;
&lt;p&gt;1: in app_is_valid(), which is used in&amp;nbsp;dfu_enter_check(), to check whether the application is valid during startup in the bootloader.&lt;/p&gt;
&lt;p&gt;2: in&amp;nbsp;postvalidate_app(). This is used a few places, but by default, it is mainly called in&amp;nbsp;on_data_obj_execute_request_sched(), which is used when the transfer is complete, and the image is checked before the swap takes place. This check checks if the boot_validation.type is actually VALIDATE_ECDSA_P256_SHA256.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Edvin&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/383122?ContentTypeID=1</link><pubDate>Wed, 24 Aug 2022 15:02:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:06d2b0e0-8a25-4287-afc5-9ef2bd8a7034</guid><dc:creator>Dominik Eugster</dc:creator><description>[quote userid="26071" url="~/f/nordic-q-a/91118/ble-secure-boot-validation-option-on-the-app-bootloader-zip-file/383048"]Does not work. It transfers the image, but the image will be rejected when the CRC is validated. To confirm that it will not run, you can monitor the nrfutil output, or you can make a change in the application that you are trying to upload (I turned on LED4 in the updated application, just to see whether it was running or not).&amp;nbsp;[/quote]
&lt;p&gt;Yes this is the same behaviour what I had, the DFU OTA was possible but after the transfer of 100%, the image will be rejected. My fault was, that I expected that the image will be rejected before the transfer like when I generate the files with a wrong key.&lt;/p&gt;
[quote userid="26071" url="~/f/nordic-q-a/91118/ble-secure-boot-validation-option-on-the-app-bootloader-zip-file/383048"]And then the image was accepted again.[/quote]
&lt;p&gt;Yes, I had the same on my custom HW.&lt;/p&gt;
&lt;p&gt;-&amp;gt; at the end I can say it&amp;#39;s working like it should, the only &amp;quot;problem&amp;quot; was that I expected the rejection before the transfer and not after.&lt;/p&gt;
&lt;p&gt;Thank you for your effort and time!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/383048?ContentTypeID=1</link><pubDate>Wed, 24 Aug 2022 11:37:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9520d22b-d9c7-4bd5-baa4-ab6d787b0470</guid><dc:creator>Edvin</dc:creator><description>[quote user="Dominik Eugster"]Can you try this on your DK please? Does the bootloader on your DK check and block the flashing of a application zip file WITHOUT the validation added before flashing the complete file or can the bootloader check this only if the file was transferred 100% before? (I use nRF Connect App on a Android Phone)[/quote]
&lt;p&gt;That is what I did (in an otherwise unmodified SDK).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Actually, I was testing on SDK17.1.0, but after realizing that your bootloader project was written for SDK17.0.2, I ran the test again now.&lt;/p&gt;
&lt;p&gt;So the unmodified bootloader, pca10056_s140_ble, together with the ble_app_buttonless_dfu example for simplicity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;First, without any modifications, just checking that everything was OK, and normal DFU was working. Then I changed:&lt;/p&gt;
&lt;p&gt;#define NRF_BL_APP_SIGNATURE_CHECK_REQUIRED 0&lt;/p&gt;
&lt;p&gt;to&lt;/p&gt;
&lt;p&gt;#define NRF_BL_APP_SIGNATURE_CHECK_REQUIRED 1&lt;/p&gt;
&lt;p&gt;In order to get the ble_app_buttonless_dfu example to still run, I changed the command to generate the bootloader settings from:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;nrfutil settings generate --family NRF52840 --application files\buttonless.hex --application-version 2 --bootloader-version 2 --bl-settings-version 2 --key-file ..\..\..\private.key files\settings.hex
to
nrfutil settings generate --family NRF52840 --application files\buttonless.hex --application-version 2 --bootloader-version 2 --bl-settings-version 2 --app-boot-validation VALIDATE_ECDSA_P256_SHA256 --key-file ..\..\..\private.key files\settings.hex&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Then the ble_app_buttonless_dfu example would still run. However, the dfu image created with the command:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;nrfutil pkg generate --application files\buttonless2.hex --application-version 3 --hw-version 52 --sd-req 0x0100 --key-file ..\..\..\private.key files\dfu_test.zip&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Does not work. It transfers the image, but the image will be rejected when the CRC is validated. To confirm that it will not run, you can monitor the nrfutil output, or you can make a change in the application that you are trying to upload (I turned on LED4 in the updated application, just to see whether it was running or not).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Then I added the app validation in the nrfutil pkg generate command:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="c_cpp"&gt;nrfutil pkg generate --application files\buttonless2.hex --application-version 3 --hw-version 52 --sd-req 0x0100 --app-boot-validation VALIDATE_ECDSA_P256_SHA256 --key-file ..\..\..\private.key files\dfu_test.zip&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;And then the image was accepted again.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;If you want to test yourself, unzip an unmodified DK, and add the following test.bat file to your SDK\examples\dfu\secure_bootloader\pca10056_s140_ble\armgcc folder:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/2308.test.bat"&gt;devzone.nordicsemi.com/.../2308.test.bat&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;NB: You need to change the serial number to match your target DK and the COM port to match your connectivity DK.&lt;/p&gt;
&lt;p&gt;The current setup in test.bat will fail to upload the DFU. To succeed, comment out line 25 and uncomment line 26.&lt;/p&gt;
&lt;p&gt;Also, you need to compile the ble_app_buttonless_dfu example with a modification (not strictly needed to modify it), and place it in the files\ folder, with the name buttonless2.hex.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Edvin&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382963?ContentTypeID=1</link><pubDate>Tue, 23 Aug 2022 20:01:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3ee992b4-e89e-40f4-8025-3e91ca504178</guid><dc:creator>Dominik Eugster</dc:creator><description>&lt;p&gt;Yes, I run my code on a custom HW with the IO drive to a nRF21540 aswell included into the bootloader code.&lt;/p&gt;
&lt;p&gt;And yes, I work with &lt;span id="heading"&gt;nRF5 Software Development Kit v17.0.2&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;Again, I think its running like it should, I only expected an other feedback from the bootloader.&lt;/p&gt;
&lt;p&gt;What I expected:&lt;/p&gt;
&lt;p&gt;1) Wrong key on a Booloader or application zip DFU package -&amp;gt; bootloader will not accept the file and not start the flashing&lt;/p&gt;
&lt;p&gt;-&amp;gt; reality: same behaviour&lt;/p&gt;
&lt;p&gt;2) Bootloader or App zip DFU file with no validation option added with nrfutil (correct key added to pkg):&lt;/p&gt;
&lt;p&gt;&lt;em&gt;--app-boot-validation VALIDATE_ECDSA_P256_SHA256 --sd-boot-validation VALIDATE_ECDSA_P256_SHA256&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;-&amp;gt; what I expected: -&amp;gt; bootloader will not accept the file and not start the flashing&lt;/p&gt;
&lt;p&gt;-&amp;gt; reality: bootloader accept both zip files, flash them, restarts and do it again and agin and doesn&amp;#39;t accept it to load. But the check that there is no validation added is recognized AFTER flash the complete zip file and not before like a wrong key. Is this how it shoulkd work or not?&lt;/p&gt;
&lt;p&gt;Can you try this on your DK please? Does the bootloader on your DK check and block the flashing of a application zip file WITHOUT the validation added before flashing the complete file or can the bootloader check this only if the file was transferred 100% before? (I use nRF Connect App on a Android Phone)&lt;/p&gt;
&lt;p&gt;Thanks a lot&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382945?ContentTypeID=1</link><pubDate>Tue, 23 Aug 2022 14:03:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:485b1bd5-e30b-4117-b5f8-3d47b524d696</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;I struggle to reproduce this on a DK. Is it intended to run on custom HW? It keeps disconnecting from nRF Connect.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You are using SDK17.0.2, right?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382944?ContentTypeID=1</link><pubDate>Tue, 23 Aug 2022 13:55:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fbc6636d-e706-45f2-9017-bc72fa57dd08</guid><dc:creator>Dominik Eugster</dc:creator><description>&lt;p&gt;Checking again, is it possible that the complete DFU OTA is working until 100%, but the check of the validation key is done after rebooting the bootloader? Because now I can do the OTA with a unsigned zip file until 100%, the bootloader restarts, is checking again and the Nordic nRF Connect App restarts automatically to download again and again, maybe because of an unsigned APP? Is this the logic?&lt;/p&gt;
&lt;p&gt;I expected that the check of the signed APP is done BEFORE starting the DFU. I use the single image bootloader and therefore I can &amp;quot;kill&amp;quot; the application with the Nordic App (only with an APP which was generated with the correct key, but which is unsigned)&lt;/p&gt;
&lt;p&gt;Is this the correct handling of the bootloader?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382934?ContentTypeID=1</link><pubDate>Tue, 23 Aug 2022 13:07:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b594a7a8-de2e-4c8d-80f2-025b18177039</guid><dc:creator>Dominik Eugster</dc:creator><description>&lt;p&gt;I will try an unmodified, but I didn&amp;#39;t changed something about reading the keys.&lt;/p&gt;
&lt;p&gt;I use the SeggerEmbeed Code, added you all files whith a new generated key, just for debug.&lt;/p&gt;
&lt;p&gt;Thanks for your time&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/1207.secure_5F00_bootloader.rar"&gt;devzone.nordicsemi.com/.../1207.secure_5F00_bootloader.rar&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The only difference between the 2 zip files is the boot validation type, the signature of the file is ECDSA_P256_SHA256 o both zip files, even if I don&amp;#39;t use the command:&lt;/p&gt;
&lt;p&gt;--app-boot-validation VALIDATE_ECDSA_P256_SHA256 --sd-boot-validation VALIDATE_ECDSA_P256_SHA256&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/2-images.jpg" /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382920?ContentTypeID=1</link><pubDate>Tue, 23 Aug 2022 12:29:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6b352b13-98a0-4ebe-a6df-c6c97e297b24</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;I tested this with an image using the serial (!) bootloader from SDK17.1.0 just now, and a DFU image consisting of an application, without the --app-boot-validation set just now, and I was not able to transfer the image, due to an &amp;quot;Invalid object&amp;quot; return.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Can you please try an unmodified SDK?&lt;/p&gt;
&lt;p&gt;Are you replicating this on an nRF52840 DK? If so, can you please send the bootloader project you are using? (remember to remove the keys you are using. I can generate my own key pair).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Edvin&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382860?ContentTypeID=1</link><pubDate>Tue, 23 Aug 2022 09:13:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a827a136-2a50-4bc0-b451-e27e316ea8f5</guid><dc:creator>Dominik Eugster</dc:creator><description>&lt;p&gt;Hi &lt;a href="https://devzone.nordicsemi.com/members/edvin-holmseth"&gt;Edvin&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I changed NRF_BL_APP_SIGNATURE_CHECK_REQUIRED in the bootloader&amp;#39;s sdk_config.h. Then I generated all files, combined the HEX files, flashed my device and code is running. But it&amp;#39;s still posiible to do a OTA with a Bootloader or APP zip file which is NOT generated with the line --app-boot-validation VALIDATE_ECDSA_P256_SHA256 --sd-boot-validation VALIDATE_ECDSA_P256_SHA256.&lt;/p&gt;
&lt;p&gt;What do I don&amp;#39;t understand? And why is this possible?&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/HEX-combined.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/_5F00_bootloader.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/App-with-key.jpg" /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382675?ContentTypeID=1</link><pubDate>Mon, 22 Aug 2022 12:04:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ea30f2e7-e5c2-41b2-93be-be76a064dc10</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Please see my colleague, Amanda&amp;#39;s reply in this ticket:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/76022/secure-dfu-app-sd-bl-from-sdk-15-3-0-to-sdk-17-0-2-with-validate_ecdsa_p256_sha256"&gt;Secure DFU (APP, SD, BL) from SDK 15.3.0 to SDK 17.0.2 with VALIDATE_ECDSA_P256_SHA256&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Basically, you need to set&amp;nbsp;&lt;span&gt;NRF_BL_APP_SIGNATURE_CHECK_REQUIRED in your bootloader&amp;#39;s sdk_config.h file if you want to use the VALIDATE_ECDSA_P256_SHA256 option.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Edvin&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE Secure boot validation option on the App/bootloader zip file</title><link>https://devzone.nordicsemi.com/thread/382457?ContentTypeID=1</link><pubDate>Fri, 19 Aug 2022 12:46:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1c1a1e64-ef24-4538-b664-14e6152b7ca9</guid><dc:creator>Dominik Eugster</dc:creator><description>&lt;p&gt;What I like to implement is the &lt;span&gt;VALIDATE_ECDSA_P256_SHA256 option to have the highest security level. Are there some settings in the sdk_config.h which are necessary to enable this?&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>