IMX93 - AHAB - Secure Boot

キャンセル
次の結果を表示 
表示  限定  | 次の代わりに検索 
もしかして: 

IMX93 - AHAB - Secure Boot

ソリューションへジャンプ
1,587件の閲覧回数
il_ciancio
Contributor III

Hello NXP Experts,

I have followed this guide uboot-imx/doc/imx/ahab/guides/mx8ulp_9x_secure_boot.txt at lf_v2023.04 · nxp-imx/uboot-imx in order to generate a PKI Tree and SRK_Table compatible with my target: IMX9332.

I have followed also the "i.MX Linux User's Guide" chapter "10.9.1 Automated image signing for secure boot", in order to generate a signed image with Yocto.

Looking at the generated binaries, I have found the SRK_Table generated, so I'm confident that bitbake works correctly.

I have also flashed my EVK with UUU.

In u-boot, I runned ahab_status and below there is the result:

il_ciancio_0-1743690619755.png.

Looking on other ticket in this wonderfull community, It seems that the problem is that I have not flashed the eFuse (and I did not).

What can I do If I want to test the signature on the SWs over the public keys in the SRK Table flashed? In other terms, Can I flash an OS without signature and during the boot I will have an error on the signature?

Please help me!

 

Regards,

Alessandro.

 

 

 

タグ(4)
0 件の賞賛
返信
1 解決策
1,467件の閲覧回数
Harvey021
NXP TechSupport
NXP TechSupport

The way with SRK Hash fusing is our recommended and verified procedure.

You may try tool, OPENSSL, for help to images verification. However, we don't provide support for that.

 

Regards

Harvey

元の投稿で解決策を見る

7 返答(返信)
1,561件の閲覧回数
Harvey021
NXP TechSupport
NXP TechSupport

Hello @il_ciancio 

For official verification and container integrity checks, using the ahab_status is recommended.

The signed images will trigger events if any error on both open and closed device.

and images not signed or signing incorrectly won't boot on a closed device. 

 

Regards

Harvey

 

0 件の賞賛
返信
1,549件の閲覧回数
il_ciancio
Contributor III

Hello @Harvey021 ,

thanks for your reply.

I have putted the ahab_status from my board and looking at the error (see the table below)

il_ciancio_0-1744015061232.png

it seems that the only problem is that I have not flashed the e-fuse.

What do you think?

 

0 件の賞賛
返信
1,546件の閲覧回数
Harvey021
NXP TechSupport
NXP TechSupport

Yes, the SRK Hash not fused will raise the issue of the key hash not matched 

 

Regards

Harvey

1,544件の閲覧回数
il_ciancio
Contributor III
Thanks,
so the certificates generated by CST tool and the image generated and signed by Yocto are well configured, otherwise will I get other error?
0 件の賞賛
返信
1,510件の閲覧回数
Harvey021
NXP TechSupport
NXP TechSupport

SRK Hash acts as a role to establish root of trust. As stated from guide introduction_ahab.txt 

"On the target device during the authentication process the AHAB code verify the
SRK Table against the SoC SRK_HASH fuses, in case the verification is successful
the root of trust is established and the AHAB code can progress with the image
authentication."

Regards

Harvey

0 件の賞賛
返信
1,493件の閲覧回数
il_ciancio
Contributor III
So without fusing I can't verify (in order to test on the board the signature) if the image/certs/SRK table are properly generated?
0 件の賞賛
返信
1,468件の閲覧回数
Harvey021
NXP TechSupport
NXP TechSupport

The way with SRK Hash fusing is our recommended and verified procedure.

You may try tool, OPENSSL, for help to images verification. However, we don't provide support for that.

 

Regards

Harvey