MW v04.02.00
  • TOC
      • 1. NXP Plug & Trust Middleware
        • 1.1. Organization of Documentation
        • 1.2. Folder Structure
        • 1.3. List of Platform Prerequisites
      • 2. Changes
        • 2.1. Pending Refactoring items
        • 2.2. Known limitations
        • 2.3. Release v04.02.00
        • 2.4. Release v04.01.03
        • 2.5. Release v04.01.01
        • 2.6. Release v04.01.00
        • 2.7. Release v04.00.01
        • 2.8. Release v04.00.00
        • 2.9. Release v03.03.00
        • 2.10. Release v03.01.01
        • 2.11. Release v03.01.00
        • 2.12. Release v03.00.06
        • 2.13. Release v03.00.05
        • 2.14. Release v03.00.04
        • 2.15. Release v03.00.03
        • 2.16. Release v03.00.02
        • 2.17. Release v02.16.01
        • 2.18. Release v02.16.00
        • 2.19. Release v02.15.00
        • 2.20. Release v02.14.00
        • 2.21. Release v02.12.05
        • 2.22. Release v02.12.04
        • 2.23. Release v02.12.03
        • 2.24. Release v02.12.02
        • 2.25. Release v02.12.01
        • 2.26. Release v02.12.00
        • 2.27. Release v02.11.03
        • 2.28. Internal Release v02.11.01
        • 2.29. Release v02.11.00
        • 2.30. Release v02.10.00
        • 2.31. Release v02.09.00
        • 2.32. Release v02.07.00
        • 2.33. Release v02.06.00
        • 2.34. Release v02.05.00
        • 2.35. Release v02.04.00
        • 2.36. Release 02.03.00
      • 3. Plug & Trust MW Stack
        • 3.1. Features
        • 3.2. Plug & Trust MW : Block Diagram
        • 3.3. SSS APIs
        • 3.4. SSS APIs: SE051 vs SE050
        • 3.5. Parameter Check & Conventions
        • 3.6. I2CM / Secure Sensor
        • 3.7. Logging
        • 3.8. Feature File - fsl_sss_ftr.h
        • 3.9. Platform SCP03 Authentication
        • 3.10. Auth Objects
        • 3.11. Auth Objects : UserID
        • 3.12. Auth Objects : AESKey
        • 3.13. Auth Objects : ECKey
        • 3.14. Key Id Range and Purpose
        • 3.15. Authentication Keys
        • 3.16. ECDAA Keys For Random Number
        • 3.17. Trust provisioned KeyIDs
        • 3.18. SCP03 with PUF
        • 3.19. SSS Heap Management
        • 3.20. Secure Boot
      • 4. Building / Compiling
        • 4.1. Windows Build
        • 4.2. Import MCUXPresso projects from SDK
        • 4.3. Freedom K64F Build (CMake - Advanced)
        • 4.4. i.MX Linux Build
        • 4.5. Raspberry Pi Build
        • 4.6. CMake
        • 4.7. CMake Options
      • 5. Demo and Examples
        • 5.1. Demo List
        • 5.2. SSS API Examples
        • 5.3. Cloud Demos
        • 5.4. Linux Specific Demos
        • 5.5. OPC-UA Example
        • 5.6. ARM PSA Example
        • 5.7. SE05X Examples
        • 5.8. OpenSSL Examples
        • 5.9. Tests for User Crypto
        • 5.10. NXPNFCRDLIB examples
        • 5.11. Ease-of-Use examples
        • 5.12. Semslite examples
        • 5.13. PUF examples
      • 6. NXP EdgeLock 2GO Agent
        • 6.1. Introduction
        • 6.2. Building and running the EdgeLock 2GO agent
        • 6.3. Datastore / Keystore
        • 6.4. Connection to the EdgeLock 2GO cloud service
        • 6.5. Claim Codes
        • 6.6. Offline Provisioning of Secure Objects
        • 6.7. API
        • 6.8. EdgeLock 2GO Agent Examples
      • 7. SEMS Lite Agent
        • 7.1. SEMS Lite Overview (Only for SE051)
        • 7.2. Update Package
        • 7.3. SEMS Lite Agent Usage
        • 7.4. SEMS Lite management APIs
        • 7.5. SEMS Lite Agent Package Load Process
        • 7.6. SEMSLite Types and APIs
        • 7.7. SEMS Lite Known Issue
        • 7.8. SEMS Lite DEMOs
      • 8. Plugins / Add-ins
        • 8.1. Introduction on OpenSSL engine
        • 8.2. Introduction on mbedTLS ALT Implementation
        • 8.3. Platform Security Architecture
        • 8.4. Android Key master
        • 8.5. Introduction on Open62541 (OPC UA stack)
        • 8.6. WiFi EAP Demo with Raspberry Pi3
        • 8.7. PKCS#11 Standalone Library
      • 9. CLI Tool
        • 9.1. Introduction
        • 9.2. Block Diagram
        • 9.3. Steps needed before running ssscli tool
        • 9.4. Running the ssscli tool - Windows
        • 9.5. CLI Provisioning
        • 9.6. Usage Examples
        • 9.7. List of ssscli commands
        • 9.8. CLI Data formats
        • 9.9. Object Policies Through ssscli
        • 9.10. Upload keys and certificates to SE05X using ssscli tool
      • 10. A71CH
        • 10.1. A71CH and SSS API
        • 10.2. Miscellaneous
        • 10.3. A71CH Legacy API
        • 10.4. A71CH Legacy HLSE (Generic) API
        • 10.5. A71CH Legacy Configure Tool
      • 11. Appendix
        • 11.1. Glossary
        • 11.2. APDU Commands over VCOM
        • 11.3. Visual Studio 2019 Setup
        • 11.4. Setting up MCUXPresso IDE
        • 11.5. Development Platforms
        • 11.6. How to get SE Platform Information and UID
        • 11.7. Version Information
        • 11.8. Certificate Chains
        • 11.9. JRCP_v1 Server
        • 11.10. Using own Platform SCP03 Keys
        • 11.11. Write APDU to buffer
        • 11.12. SE05x MW Types and APIs
  • Page
      • 9. CLI Tool
  • « 8.7. PKCS#11 ...
  • 9.1. Introduction »

Plug & Trust MW

  • 1. NXP Plug & Trust Middleware
  • 2. Changes
  • 3. Plug & Trust MW Stack
  • 4. Building / Compiling
  • 5. Demo and Examples
  • 6. NXP EdgeLock 2GO Agent
  • 7. SEMS Lite Agent
  • 8. Plugins / Add-ins
  • 9. CLI Tool
    • 9.1. Introduction
    • 9.2. Block Diagram
    • 9.3. Steps needed before running ssscli tool
    • 9.4. Running the ssscli tool - Windows
    • 9.5. CLI Provisioning
    • 9.6. Usage Examples
    • 9.7. List of ssscli commands
    • 9.8. CLI Data formats
    • 9.9. Object Policies Through ssscli
    • 9.10. Upload keys and certificates to SE05X using ssscli tool
  • 10. A71CH
  • 11. Appendix

9. CLI ToolΒΆ

  • 9.1. Introduction
  • 9.2. Block Diagram
  • 9.3. Steps needed before running ssscli tool
    • 9.3.1. Once per installation
      • 9.3.1.1. Windows
      • 9.3.1.2. i.MX
      • 9.3.1.3. Raspberry Pi
    • 9.3.2. Communication interface (cmake SMCOM setting)
  • 9.4. Running the ssscli tool - Windows
  • 9.5. CLI Provisioning
    • 9.5.1. Generating keys and certificates
    • 9.5.2. Provisioning for the demo
    • 9.5.3. Steps to provision your device for demo on Windows
      • 9.5.3.1. Using precompiled binaries
      • 9.5.3.2. Using Python scripts
    • 9.5.4. Steps to provision your device for demo on iMX or Raspberry Pi
  • 9.6. Usage Examples
    • 9.6.1. SE05X: VCOM Interface
    • 9.6.2. SE05X: PCSC interface
    • 9.6.3. se05x: JRCPV2 interface
    • 9.6.4. A71CH: VCOM Interface
    • 9.6.5. A71CH: SCI2C interface
    • 9.6.6. MBEDTLS
  • 9.7. List of ssscli commands
    • 9.7.1. ssscli Commands
    • 9.7.2. Set Commands
    • 9.7.3. Get Commands
    • 9.7.4. Generate Commands
    • 9.7.5. Refpem Commands
    • 9.7.6. Se05x Commands
    • 9.7.7. A71CH Commands
    • 9.7.8. POLICY Commands
  • 9.8. CLI Data formats
    • 9.8.1. DER
    • 9.8.2. PEM
    • 9.8.3. HEX
    • 9.8.4. REFERENCE KEY
  • 9.9. Object Policies Through ssscli
    • 9.9.1. Create object policy
    • 9.9.2. Attach policy to object
  • 9.10. Upload keys and certificates to SE05X using ssscli tool

Back to top

© Copyright 2018-2020, NXP.
Created using Sphinx 2.0.1.