Part Number: AM625
Hi TI team,
I’d like to get a detailed confirmation on the secure boot flow using custom keys for the AM625 device.
Here is my current setup and what I’ve done so far:
-
I have already fused one SOM to HS-SE using the TI dummy keys, and that device boots successfully with images signed using the dummy keys.
-
As an experiment, I generated custom keys using the OTP keywriter (
-g) command and created anotp-keywriter.bin. -
I understand from your previous reply on last thread that the OTP keywriter binary can only be used on HS-FS devices, not HS-SE, and that once the device is converted to HS-SE the key fuses are locked.
Now I want to implement the complete secure boot flow with my own custom keys on a fresh HS-FS custome SOM.
Below are the steps which already mentioned in ti secure boot guide, I plan to follow — could you please review them and confirm if this sequence is correct, or let me know if any changes are needed?
Planned Steps for Secure Boot with Custom Keys
cd $SDK_DIR/source/security/sbl_keywriter/scripts/cert_gen/am62x
1. Generate your RSA-4096 production key pairs: ./gen_keywr_cert.sh –g
2. Generate a full provisioning certificate for inspection:
./gen_keywr_cert.sh \
-t tifek/ti_fek_public.pem \
--msv 0xC0FFE \
-b keys_devel/bmpk.pem \
--bmek keys_devel/bmek.key \
-s keys_devel/smpk.pem \
--smek keys_devel/smek.key \
--keycnt 2 \
--keyrev 1
3.Convert the certificate binary to .h format.
python3 ../../../../../tools/bin2c/bin2c.py final_certificate.bin
keycert.h KEYCERT
4.In following directory: /source/security/ sbl_keywriter/am62ax-sk/r5fss0-0_nortos/ti-arm-clang
Clean :
make -sj clean PROFILE=debug
Then run:
make -sj PROFILE=debug
5.Flash and run the otp-keywriter.bin on the HS-FS device to fuse the generated keys into OTP.
6.Rebuild all boot components (tiboot3.bin, SPL/U-Boot, and FIT image) signed with the same
custom key set.
7.Verify boot on HS-FS — confirm that images signed with custom keys boot correctly.
8.Convert device to HS-SE mode to permanently enforce secure boot with custom keys.
9.After conversion, test DFU and boot flow again to ensure only images signed with my custom
keys are accepted.
Additional Clarification
For building the R5 and A53 boot components (tiboot3.bin, SPL/U-Boot, and FIT image),
please confirm if the correct method is simply to copy the key folder (generated by the OTP keywriter)
and place it in the paths used by the respective build systems, e.g.:
$ cp source/security/sbl_keywriter/scripts/cert_gen/am62x/keys UBOOT_PATH/board/ti/keys
so that each build stage automatically picks the same custom key set during the signing process.
Is this the right approach to ensure all boot binaries are signed with the same fused key set?
Can you please confirm if the above sequence is correct and whether any additional steps or
configurations are required for AM625?
thanks and regards,
Kapil.