IMX93 - AHAB - Secure Boot

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

IMX93 - AHAB - Secure Boot

Jump to solution
504 Views
il_ciancio
Contributor III

Hello NXP Experts,

I have followed this guide uboot-imx/doc/imx/ahab/guides/mx8ulp_9x_secure_boot.txt at lf_v2023.04 · nxp-imx/uboot-imx in order to generate a PKI Tree and SRK_Table compatible with my target: IMX9332.

I have followed also the "i.MX Linux User's Guide" chapter "10.9.1 Automated image signing for secure boot", in order to generate a signed image with Yocto.

Looking at the generated binaries, I have found the SRK_Table generated, so I'm confident that bitbake works correctly.

I have also flashed my EVK with UUU.

In u-boot, I runned ahab_status and below there is the result:

il_ciancio_0-1743690619755.png.

Looking on other ticket in this wonderfull community, It seems that the problem is that I have not flashed the eFuse (and I did not).

What can I do If I want to test the signature on the SWs over the public keys in the SRK Table flashed? In other terms, Can I flash an OS without signature and during the boot I will have an error on the signature?

Please help me!

 

Regards,

Alessandro.

 

 

 

0 Kudos
Reply
1 Solution
384 Views
Harvey021
NXP TechSupport
NXP TechSupport

The way with SRK Hash fusing is our recommended and verified procedure.

You may try tool, OPENSSL, for help to images verification. However, we don't provide support for that.

 

Regards

Harvey

View solution in original post

7 Replies
478 Views
Harvey021
NXP TechSupport
NXP TechSupport

Hello @il_ciancio 

For official verification and container integrity checks, using the ahab_status is recommended.

The signed images will trigger events if any error on both open and closed device.

and images not signed or signing incorrectly won't boot on a closed device. 

 

Regards

Harvey

 

0 Kudos
Reply
466 Views
il_ciancio
Contributor III

Hello @Harvey021 ,

thanks for your reply.

I have putted the ahab_status from my board and looking at the error (see the table below)

il_ciancio_0-1744015061232.png

it seems that the only problem is that I have not flashed the e-fuse.

What do you think?

 

0 Kudos
Reply
463 Views
Harvey021
NXP TechSupport
NXP TechSupport

Yes, the SRK Hash not fused will raise the issue of the key hash not matched 

 

Regards

Harvey

461 Views
il_ciancio
Contributor III
Thanks,
so the certificates generated by CST tool and the image generated and signed by Yocto are well configured, otherwise will I get other error?
0 Kudos
Reply
427 Views
Harvey021
NXP TechSupport
NXP TechSupport

SRK Hash acts as a role to establish root of trust. As stated from guide introduction_ahab.txt 

"On the target device during the authentication process the AHAB code verify the
SRK Table against the SoC SRK_HASH fuses, in case the verification is successful
the root of trust is established and the AHAB code can progress with the image
authentication."

Regards

Harvey

0 Kudos
Reply
410 Views
il_ciancio
Contributor III
So without fusing I can't verify (in order to test on the board the signature) if the image/certs/SRK table are properly generated?
0 Kudos
Reply
385 Views
Harvey021
NXP TechSupport
NXP TechSupport

The way with SRK Hash fusing is our recommended and verified procedure.

You may try tool, OPENSSL, for help to images verification. However, we don't provide support for that.

 

Regards

Harvey