This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Tool/software:
Dear experts,
I would like to ask a couple of questions regarding secure boot:
1.) Are there documents that explain the process of key burning ?
2.) How can we integrate the tools (responsible for burning MPK and BMPKH) in our manufacturing lines.
3.) In case of MPK compromised, how does the devices switch to BMPKH for devices recovery? Is there any way to reprogram a new MPK key?
4.) Is there a separate tool for configuring the this information?
5.) Is there a way to debug the process to see is something goes wrong during development phase? If so, is there a manual to explain that process.
Regards,
Alex
Hi,
1,2) The necessary resources are available on the following MSS page
ti.com/secureresources/AM64X-HS-RESTRICTED-SW
3,4) Please see the following FAQ
5) There is no special procedure required for debugging. It is same as debugging any general application.
Regards,
Prashant
Hi Prashant,
While I was going through the document, I found that JTAG will be disable after writing efuse into device.
But after that it can also be unlocked as per the Unlock JTAG on an HS-SE device document.
But if we unlock it, is there any way to lock it again?
Regards,
Jayprakash
Hi Jayprakash,
But if we unlock it, is there any way to lock it again?
The JTAG unlock persists only for the active power cycle. The JTAG will go its default locked state on HSSE devices on the next power cycle.
Regards,
Prashant