This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Tool/software:
Hi TI,
We are seeking clarification on several aspects of the keywriter mechanism and secure boot processes as we are integrating these technologies into our production. Below are some detailed questions we hope to have answered:
What is the function of the certificate generated by using gen_keywr_cert.sh
? Is there a relation between smek.key
, the public key from smpk.pem
and the key writing certificate?
Is the code in the keywriter additional package not actually keywriter code? What is the relation between Keywriter Code, SBL and Tools(Certificate generation) and how do they work?
What is the purpose of the folder source/security/tifs/sbl_keywriter/scripts/cert_gen/common/keys_devel
?
How does the keywriter image write keys into the chip's otp efuse?
Is the following process during factory production feasible?
a. The programming station writes the key writer image to a RAM address via CAN, where it executes to write keys.
b. The programming station writes signed production software to Flash via CAN.
c. Power cycle the device, and secure boot becomes effective.
Is the entire binary image file encrypted using smek.key
for SBL and HSM runtime firmware? Is this encryption process completed during compilation? Are the so-called HS-SE device signed SBL and HSM firmware actually both signed and encrypted image files?
Is the signature calculated based on the encrypted image or the unencrypted image? That is, what is the sequence of encryption and signing?
We appreciate your assistance in providing detailed explanations to these inquiries, which will help us ensure our implementation aligns with best practices and technical specifications.
Best regards,
Cesc Yang.
Hi Cesc,
Thanks for your query,
I will try to get back with a response by tomorrow latest . In case I have not replied back feel free to ping here.
Hi Nilabh,
Have there been any updates or progress on these issues? Understanding these matters is crucial for us, as we have limited knowledge of the specific mechanisms involved. We need to grasp some key conceptual understandings, which are vital for our integration work.
We would greatly appreciate any feedback you can provide within this week.
Hi Cesc,
I would recommend giving this section of Academy a read to understand the secure boot process:
Further more https://software-dl.ti.com/mcu-plus-sdk/esd/AM263PX/latest/exports/docs/api_guide_am263px/DRIVERS_HSMCLIENT_PAGE.html
Meanwhile I am working on consolidating the responses for the queries you have asked.