Hi @tthalath
1. why I didn't get the response bad hash seco event
>$ seco events
SECO Event[0] = 0x0087F029
SECO Event[1] = 0x00890029
Please note that the first SECO EVENTS 0x0087F029 means: The "authenticate container" command failed, because signature data is bad.
0x87 - AHAB_AUTH_CONTAINER_REQ
0xF0 - AHAB_BAD_SIGNATURE_IND
0x29 - the request failed -> it is expected on OEM closed board because the data contained in container header(the part used to calculated the signature) is modified, which cannot match the signature data.
The second SECO EVENT returned is 0x00890029, it means release container.
0x89 - AHAB_RELEASE_CONTAINER_REQ
- Why there is no "bad hash" event?
As said before, because the "authenticate container" command failed, it will not continue to "verify image", but directly jump to "release container". You can refer to the code logic in uboot ./arch/arm/mach-imx/imx8/ahab.c

2. what does the meaning of below seco events
SECO Event[1] = 0x00890029?
As explained in above. It means "release container".
0x89 - AHAB_RELEASE_CONTAINER_REQ
0x29 - the request failed
3. Even though the response F0 expected but the status I got 29 (The request failed) instead of 00 (The request was successful)?
It is expected on OEM closed board because the AHAB_AUTH_CONTAINER_REQ command failed.
4. what is the expected response of seco events for OEM closed board when I corrupt the hash of img array and when only corrupt the img data ?
Your results are reasonable. Please see the flows as below:
The complete procedure for authenticating images included in a container is:
• The requestor sends the Authenticate Container message, which will trigger the process of authenticating the container header.
• The requestor sends the Verify Image message, which will request the SECO to validate one or more of the images included in the Image Array of the previously authenticated container header.
• The requestor sends the Release Container message after completing the authentication of images in a container
(1) If you corrupt the hash of image array, it means the data included in "signed part" is corrupt, so the request "Authenticate Container" will fail directly. Then it will directly send "Release Container" request as explained above.

(2) If you only corrupted img data:
The request "Authenticate Container" can pass, then "Verify Image" request fails.
So your results are as expected. Hope these information help you.
Best regards
Harvey