Tool/software:
We are able to create SE-bootable tiboot3.bin using the 'standard' Yocto (scarthgap) build, but cannot currently see how to extend that to support an HSM for the signing step.
Specifically, we think we have identified where 'openssl' is called to sign the x509 certificate, but cannot see how to pass the extra parameters required to specify the key to use on the HSM.
(also applies to the signing of the 'other' boot components, but we are assuming that once we can see how to one, the others will follow)
There might also be an issue with configuring the 'openssl' within Yocto to support an HSM - so if you have any advice there, it would be welcome.