Provided by: imx-code-signing-tool_3.4.1+dfsg-6_amd64 

NAME
cst - Code Signing Tool for generating binary CSF files for NXP secure boot
SYNOPSIS
cst --output file --input file [--cert cert.pem] [--backend ssl|pkcs11] [--verbose] cst --license|--version|--help
DESCRIPTION
cst (Code Signing Tool) is used to generate a binary Command Sequence File (CSF) required by the HAB or AHAB secure boot mechanisms on NXP i.MX processors. The CSF contains the authentication commands and signature data used to verify signed boot images during the secure boot process. The tool processes a plain-text CSF description file and produces a binary CSF that can be appended to or embedded in a boot image. Optionally, a certificate can be provided to encrypt the Data Encryption Key (DEK).
OPTIONS
-o, --output file The output binary CSF file to generate. -i, --input file The input CSF description text file. -c, --cert cert.pem Public key certificate to encrypt the DEK (optional). -b, --backend ssl|pkcs11 Optional. Backend for key handling. Default is 'ssl' (local filesystem). 'pkcs11' uses a PKCS#11-compatible keystore. -g, --verbose Enable verbose output. -l, --license Print license information and exit. -v, --version Print the tool version and exit. -h, --help Display a brief help message.
EXAMPLES
Generate binary CSF from a text CSF file: cst -o out_csf.bin -i hab4.csf Encrypt DEK with a certificate: cst -o out_csf.bin -c cert.pem -i hab4.csf
SEE ALSO
srktool(1), csf_parser(1) 2025-06-04 CST(1)