This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

SK-AM62: sequence for enabling OTP key writer and custom key

Part Number: SK-AM62

Tool/software:

Hi Team,

I use the AM62X EVM and want to enables secure boot  HS-SE with custom keys.

Moving forward with custom keys, this are my steps attaching below

1. Generate a new set of keys:
         ./gen_keywr_cert.sh –g
2. In the keys folder :
         aes256.key bmek.key bmpk.pem smek.key smpk.pem
3. Make the One Shot certificate, specifying SMPK as the certificate for secure boot
        ./gen_keywr_cert.sh -t tifek/ti_fek_public.pem -a keys/aes256.key --msv 0xC0FFE --bmpk keys/bmpk.pem -b-wp --bmek keys/bmek.key --bmek-wp --smpk keys/smpk.pem --smek keys/smek.key --keycnt 2 --keyrev 1
4. Output:
         1… secondary_cert.bin
         5… primary_cert.bin
         7… ../../x509cert/final_certificate.bin
5. Convert the bin, produce the keycert.h:
         python3 ~/ti/mcu_plus_sdk_am62x_09_01_00_39/tools/bin2c/bin2c.py final_certificate.bin keycert.h KEYCERT
6. Build the tiboot3.bin
         ti-arm-clang$ make -sj clean PROFILE=debug
         ti-arm-clang$ make -sj PROFILE=debug
7.	Output:
         ti-arm-clang/sbl_keywriter.debug.tiimage Done !!!
         ti-arm-clang$ md5sum tiboot3.bin
         db3eca1de8d2e0ccb811016691a265c8 tiboot3.bin
8.	 Install the custom signing key in the u-boot source tree, replacing the TI development key:
          copy keys/smpk.pem to board/ti/keys/custMpk.pem
9.	 Rebuild u-boot, now signed with the new custom key.

Q1. Are these steps completed  and valid?

Q2. Is the above steps can sign and secure till u-boot ?

Q3. if yes,How can i enable root of trust between u-boot and my FitImage.bin (fitimage conatains fs,kernal..).

Q4.  when is the BMPK used ? how can i test this.

Q5. Should I leave board/ti/keys/custMpk.crt and board/ti/keys/custMpk.key untouched?

Regards,

-RJ