Hello,
With reference to this document: AM263x MCU+ SDK: Understanding the bootflow and bootloaders (ti.com)
There is this excerpt:
This .bin file is then signed using the Signing Scripts to create the final .tiimage bootable image.
- The
.tiimagefile extension is kept to separate the SBL boot image from a normal application image - The rom_degenerateKey.pem is used for this.
- This is a ROM bootloader requirement and is needed even on a non-secure device.
But then there is this table:

If the text says that the SBL shall always be signed regardless of device type, what is meant by Certificate Verification "Not Performed" for HS-FS in the above table?
In other words, if verification is not performed by HS-FS RBL why is it necessary to sign the SBL in this case please?
Thank you.