APALIS IMX8QM SIGNING CONTAINER

im using the meta-toradex-security layer in yocto to sign my output container so i added the variables as specified in the docs and it worked, then i used the ahab_image_verifier to see if the signing went well it said it was successful but i have some questions:

1/is sha384 is the correct hash alg to use to hash the images?because i remember seeing in imx8qm ref man that the images hash needs to be sha-512

2/does the image hash alg needs to be the same in the 2 containers and thats why my container images are hashed as sha384 since the seco container is sha384?

Hi, I’m the Toradex AI Assistant.

I might make mistakes or occasionally get you wrong. Our support team will step in if needed.


I’d be glad to help with your meta-toradex-security layer questions! To provide the most accurate guidance, could you let me know which hardware you’re using and which OS version you’re running?

Common platforms to mention:

  • Hardware: Verdin i.MX8M Plus, Verdin AM62, Aquila AM69, Apalis i.MX8QP, Colibri i.MX8X, Ivy Carrier Board, Ixora Carrier Board, Mallow Carrier Board, iMX95
  • OS: Yocto 7.2.0, Torizon 6.8.2, Torizon OS 6, BSP 7, BSP 6, Torizon OS 7.2.0-build.13

You can use the tdx-info command to get detailed information about your setup: Getting Device Information with Tdx-Info | Toradex Developer Center

This information will help me provide specific guidance about the hash algorithms and container configuration for your particular platform and secure boot implementation.

Best regards,
Toradex AI Assistant.


Did you like my answer? :+1: :-1:

If I answered your question, please tick the “Solution” checkbox.

For follow-up questions to me, please use @ToradexAI in your post.

im using APALIS IMX8QM and OS 6.7

Great! For the Apalis iMX8QM with OS 6.7, I can help clarify your AHAB secure boot questions.

Hash Algorithm Configuration

For AHAB on iMX8/8X platforms like your Apalis iMX8QM, the meta-toradex-security layer uses configurable hash algorithms through the TDX_IMX_HAB_CST_DIG_ALGO variable (1). The default digest algorithm is sha256, not sha384 (1).

According to the Toradex secure boot documentation, you can configure the digest algorithm using:

TDX_IMX_HAB_CST_DIG_ALGO = "sha256"

(1)

Regarding Your Questions:

1. SHA384 vs SHA512: The choice of hash algorithm should be consistent with what you configured in your CST tool setup. If you’re seeing SHA384, this suggests it was configured during your key generation process. The iMX8QM reference manual requirements should align with your CST tool configuration.

2. Container Hash Consistency: Yes, for AHAB secure boot, the hash algorithms should be consistent across containers. The SECO firmware container and your application containers should use the same hashing approach for proper verification (2).

Key Configuration Variables

When using meta-toradex-security, ensure these variables match your CST tool setup:

  • TDX_IMX_HAB_CST_DIG_ALGO: Digest algorithm (default: sha256)
  • TDX_IMX_HAB_CST_CRYPTO: Cryptographic key type (rsa or ecdsa)
  • TDX_IMX_HAB_CST_CERTS_DIR: Certificate directory location

The configuration should match what you specified when generating your keys and certificates with the NXP CST tool.

If you need to verify your current configuration, you can check the generated CSF files and ensure the hash algorithm matches across all your containers.

Best regards,
Toradex AI Assistant.


Did you like my answer? :+1: :-1:

If I answered your question, please tick the “Solution” checkbox.

For follow-up questions to me, please use @ToradexAI in your post.

im not talking about the signature hash it is sha256 as it should be im talking about the images hash which i found it sha384 in my case when verifying so is it the right format that imx8qm use? or it needs to be sha512?

Hi @anmsn44!

I saw you opened three threads about this issue. To help us prioritize and organize the support queue more effectively, we kindly ask that you keep the discussion in a single thread.

Not only that, but I saw that one of our engineers already started helping you in this thread. Please continue the support there.

Best regards.