This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

AM2634: Clarification on Keywriter Mechanisms and Secure Boot Implementation

Part Number: AM2634

Tool/software:

Hi TI,

We are seeking clarification on several aspects of the keywriter mechanism and secure boot processes as we are integrating these technologies into our production. Below are some detailed questions we hope to have answered:

  1. What is the function of  the certificate generated by using gen_keywr_cert.sh? Is there a relation between smek.key, the public key from smpk.pem and the key writing certificate?

  2. Is the code in the keywriter additional package not actually keywriter code? What is the relation between Keywriter Code, SBL and Tools(Certificate generation) and how do they work?

  3. What is the purpose of the folder source/security/tifs/sbl_keywriter/scripts/cert_gen/common/keys_devel?

  4. How does the keywriter image write keys into the chip's otp efuse?

  5. Is the following process during factory production feasible?
    a. The programming station writes the key writer image to a RAM address via CAN, where it executes to write keys.
    b. The programming station writes signed production software to Flash via CAN.
    c. Power cycle the device, and secure boot becomes effective.

  6. Is the entire binary image file encrypted using smek.key for SBL and HSM runtime firmware? Is this encryption process completed during compilation? Are the so-called HS-SE device signed SBL and HSM firmware actually both signed and encrypted image files?

  7. Is the signature calculated based on the encrypted image or the unencrypted image? That is, what is the sequence of encryption and signing?

We appreciate your assistance in providing detailed explanations to these inquiries, which will help us ensure our implementation aligns with best practices and technical specifications.

Best regards,
Cesc Yang.