This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Tool/software:
We use the following command to perform a oneshot program currently:
./gen_keywr_cert.sh -t tifek/ti_fek_public.pem -b keys/bmpk.pem --bmek keys/bmek.key -s keys/smpk.pem --smek keys/smek.key --keycnt 2 --keyrev 1
But our sign server only provide two rsa4096 key , so i want to remove --bmek keys/bmek.key and --smek keys/smek.key ,like the following:
./gen_keywr_cert.sh -t tifek/ti_fek_public.pem -b keys/bmpk.pem -s keys/smpk.pem --keycnt 2 --keyrev 1
Is it ok for this change?
Hello,
That is completely okay. It's just that you can't leverage the encrypted boot if you do not program the encryption keys.
1. At the end of the link above,Hong said linux sdk now is not support encrypted boot ?
2. Does this mean that all images (tispl.bin, tiboot3.bin, u-boot.img, linux fitimage) do not support encrypted boot?
Hello,
Please note the following for the encryption keys:
At present, the Processor SDK does not support encrypting images but MCU+ SDK does. If really required, one may implement the encryption of the images in the Processor SDK & leverage encrypted boot if the encryption keys are programmed.
If supported, whether this feature(encrypted boot ) is on or off by default?
The ROM or TIFS decrypts an image as part of the authentication only if the encryption extension is found in the certificate.
The image signed by the scripts in the PSDK will not have encryption extension since it doesn't support encryption while the MCU+ SDK has the following flags to control the encryption of the SBL & Application images.
~/ti/mcu_plus_sdk/am64x/10_00_00_20 ❯ grep -B1 "ENC.*ENABLED" -- devconfig/devconfig.mak # Encryption option for application (yes/no) ENC_ENABLED?=no -- # Encryption option for SBL (yes/no) ENC_SBL_ENABLED?=yes
If the encryption keys are not programmed these must be set to NO.