12.2.1 Access Control...................................................................................................................... 551
12.2.2 Virtualization..........................................................................................................................551
12.2.3 Security domain identifiers (SDIDs)...................................................................................... 551
12.2.4 TrustZone SecureWorld........................................................................................................ 552
12.3 Special-purpose cryptographic keys....................................................................................552
12.3.1 Initializing and clearing black and trusted descriptor keys.................................................... 552
12.3.2 Black keys and JDKEK/TDKEK............................................................................................ 552
12.3.3 Trusted descriptors and TDSK..............................................................................................552
12.3.4 Master key and blobs............................................................................................................ 553
12.4 Black keys........................................................................................................................... 553
12.4.1 Black key encapsulation schemes........................................................................................ 553
12.4.2 Differences between black and red keys.............................................................................. 553
12.4.3 Loading red keys...................................................................................................................553
12.4.4 Loading black keys................................................................................................................553
12.4.5 Avoiding errors when loading red and black keys.................................................................554
12.4.6 Encapsulating and decapsulating black keys........................................................................555
12.4.7 Types of black keys and their use.........................................................................................556
12.4.8 Types of blobs for key storage.............................................................................................. 556
12.5 Trusted descriptors..............................................................................................................556
12.5.1 Why trusted descriptors are needed..................................................................................... 556
12.5.2 Trusted-descriptor key types and uses................................................................................. 557
12.5.3 Trusted descriptors encrypting/decrypting black keys.......................................................... 557
12.5.4 Trusted-descriptor blob types and uses................................................................................ 557
12.5.5 Configuring the system to create trusted descriptors properly..............................................557
12.5.6 Creating trusted descriptors.................................................................................................. 558
12.6 Blobs....................................................................................................................................559
12.6.1 Blob protocol......................................................................................................................... 559
12.6.2 Why blobs are needed.......................................................................................................... 559
12.6.3 Blob conformance considerations......................................................................................... 559
12.6.4 Encapsulating and decapsulating blobs................................................................................560
12.6.5 Blob types............................................................................................................................. 560
12.6.6 Blob encapsulation................................................................................................................563
12.6.7 Blob decapsulation................................................................................................................564
12.7 Critical security parameters.................................................................................................564
12.8 Manufacturing-protection chip-authentication process........................................................565
12.8.1 Providing data to the manufacturing-protection authentication process............................... 567
12.8.2 MPPrivk_generation function................................................................................................ 569
12.8.3 MPPubk_generation function................................................................................................ 570
12.8.4 MPSign function.................................................................................................................... 572
12.8.5 MP-ECDH function................................................................................................................573
Chapter 13 SEC service error detection, recovery (reset), and
reconfiguration.............................................................................................575
13.1 Software SEC Reset............................................................................................................575
13.2 Job ring error detection, recovery, reset and reconfiguration..............................................575
13.2.1 Job ring user error detection, recovery, reset, and reconfiguration services........................ 575
13.2.2 Job ring error detection, recovery, reset, and reconfiguration management services.......... 577
13.3 QMan interface error detection, recovery, reset, and reconfiguration................................. 578
13.3.1 QI user services.................................................................................................................... 578
13.3.2 QI management services...................................................................................................... 579
13.4 RTIC error detection, recovery, reset, and reconfiguration................................................. 581
13.4.1 RTIC user services................................................................................................................581
13.4.2 RTIC management services..................................................................................................581
NXP Semiconductors
Contents
QorIQ LX2160A Security (SEC) Reference Manual, Rev. 0, 07/2020
Reference Manual
8 / 1266