Hi,
We have a secure version of the AM62x chip, and uboot compiled with SDK9.0 can start normally.
tiboot3-am62x-hs-fs-evm.bin, tispl.bin and u-boot.img are all encrypted using TI key.
I replaced board/ti/keys/custMpk.pem with our own key, but there is no difference between the compiled tiboot3-am62x-hs-fs-evm.bin and tiboot3-am62x-hs-evm.bin.
Their map files show that their contents are the same, that is, binman does not use custMpk to encrypt the files.
SDK9.0 no longer requires "k3-image-gen" and "core-secdev-k3", so how to use customer key to encrypt files.
The AM62x_Secure_SDK_v1.pdf document introduces the use of k3-image-gen./scripts/gen_x509_combined_cert.sh
$TI_SECURE_DEV_PKG/scripts/secure-binary-image.sh
Do I still need to use this in SDK9.0?
In addition, how to encrypt Image and DTB in SDK9.0?
Regards,
Stephen