Quantcast
Channel: Raspberry Pi Forums
Viewing all articles
Browse latest Browse all 6815

Advanced users • Re: Raspberry PI 5 Secure Boot

$
0
0
To verify whether the public key has been programmed you could enable the recovery_metadata option

Uncomment recovery_metadata=1 in config.txt
https://github.com/raspberrypi/usbboot/ ... g.txt#L10

Code:

recovery -v -d . -j metadata
You should then get a JSON file showing OTP settings including the public key hash
Not sure about JSON, but CUSTOMER_KEY_HASH is all zero (I haven't flashed it yet, and currently want to test everything before making irreversible changes)

Code:

user@localhost:~/rpi5/usbboot/recovery5$ sudo ../rpiboot -v -d . -j metadata1RPIBOOT: build-date Oct  2 2024 version 20240422~085300 d0a2ed95Boot directory '.'Loading: ./bootcode5.binWaiting for BCM2835/6/7/2711/2712...Device located successfullyLoading: ./bootcode5.binInitialised device correctlyFound serial number 3last_serial -1 serial 3Sending bootcode.binlibusb_bulk_transfer sent 24 bytes; returned 0Writing 102724 byteslibusb_bulk_transfer sent 102724 bytes; returned 0Successful read 4 bytes Waiting for BCM2835/6/7/2711/2712...Device located successfullyLoading: ./bootcode5.binInitialised device correctlyFound serial number 4last_serial -1 serial 4Second stage boot serverFailed to create metadata file: metadata1/28cb67db.jsonReceived message GetFileSize: config.txtLoading: ./config.txtFile size = 379 bytesReceived message ReadFile: config.txtFile read: config.txtlibusb_bulk_transfer sent 379 bytes; returned 0Received message GetFileSize: pieeprom.binLoading: ./pieeprom.binFile size = 2097152 bytesReceived message GetFileSize: pieeprom.binLoading: ./pieeprom.binFile size = 2097152 bytesReceived message GetFileSize: pieeprom.sigLoading: ./pieeprom.sigFile size = 80 bytesReceived message ReadFile: pieeprom.sigFile read: pieeprom.siglibusb_bulk_transfer sent 80 bytes; returned 0Received message GetFileSize: pieeprom.binLoading: ./pieeprom.binFile size = 2097152 bytesReceived message ReadFile: pieeprom.binFile read: pieeprom.binlibusb_bulk_transfer sent 2097152 bytes; returned 0Received message GetFileSize: *USER_SERIAL_NUM*28cb67dblibusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *MAC_ADDR*2c:cf:67:5e:7a:98libusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *CUSTOMER_KEY_HASH*0000000000000000000000000000000000000000000000000000000000000000libusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *BOOT_ROM*0000000alibusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *BOARD_ATTR*00000000libusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *USER_BOARDREV*d04170libusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *JTAG_LOCKED*0libusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *MAC_WIFI_ADDR*2c:cf:67:5e:7a:99libusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *MAC_BT_ADDR*2c:cf:67:5e:7a:9alibusb_bulk_transfer sent 0 bytes; returned 0Received message GetFileSize: *FACTORY_UUID*_19a519a5_1a47520e_3370523b_00000000_00000000_00000000libusb_bulk_transfer sent 0 bytes; returned 0Received message Done: *FACTORY_UUID*_19a519a5_1a47520e_3370523b_00000000_00000000_00000000CMD exitSecond stage boot server done
EDIT:
got JSON

Code:

{"USER_SERIAL_NUM" : "28cb67db","MAC_ADDR" : "2c:cf:67:5e:7a:98","CUSTOMER_KEY_HASH" : "0000000000000000000000000000000000000000000000000000000000000000","BOOT_ROM" : "0000000a","BOARD_ATTR" : "00000000","USER_BOARDREV" : "d04170","JTAG_LOCKED" : "0","MAC_WIFI_ADDR" : "2c:cf:67:5e:7a:99","MAC_BT_ADDR" : "2c:cf:67:5e:7a:9a","FACTORY_UUID" : "000000911042926453"}
EDIT2: with same setup got no JSON on secure-boot-recovery5

Statistics: Posted by wa1ter — Wed Oct 02, 2024 9:21 am



Viewing all articles
Browse latest Browse all 6815

Trending Articles