This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

[参考译文] SK-AM62:用于启用 OTP 密钥写入器和自定义密钥的序列

Guru**** 1737970 points
请注意,本文内容源自机器翻译,可能存在语法或其它翻译错误,仅供参考。如需获取准确内容,请参阅链接中的英语原文或自行翻译。

https://e2e.ti.com/support/processors-group/processors/f/processors-forum/1407836/sk-am62-sequence-for-enabling-otp-key-writer-and-custom-key

器件型号:SK-AM62

工具与软件:

大家好、团队成员:

我使用 AM62X EVM、并希望 使用自定义密钥启用安全引导 HS-SE。

继续使用自定义密钥、下面是我要附加的步骤

1. Generate a new set of keys:
         ./gen_keywr_cert.sh –g
2. In the keys folder :
         aes256.key bmek.key bmpk.pem smek.key smpk.pem
3. Make the One Shot certificate, specifying SMPK as the certificate for secure boot
        ./gen_keywr_cert.sh -t tifek/ti_fek_public.pem -a keys/aes256.key --msv 0xC0FFE --bmpk keys/bmpk.pem -b-wp --bmek keys/bmek.key --bmek-wp --smpk keys/smpk.pem --smek keys/smek.key --keycnt 2 --keyrev 1
4. Output:
         1… secondary_cert.bin
         5… primary_cert.bin
         7… ../../x509cert/final_certificate.bin
5. Convert the bin, produce the keycert.h:
         python3 ~/ti/mcu_plus_sdk_am62x_09_01_00_39/tools/bin2c/bin2c.py final_certificate.bin keycert.h KEYCERT
6. Build the tiboot3.bin
         ti-arm-clang$ make -sj clean PROFILE=debug
         ti-arm-clang$ make -sj PROFILE=debug
7.	Output:
         ti-arm-clang/sbl_keywriter.debug.tiimage Done !!!
         ti-arm-clang$ md5sum tiboot3.bin
         db3eca1de8d2e0ccb811016691a265c8 tiboot3.bin
8.	 Install the custom signing key in the u-boot source tree, replacing the TI development key:
          copy keys/smpk.pem to board/ti/keys/custMpk.pem
9.	 Rebuild u-boot, now signed with the new custom key.

问题1。 这些步骤是否已完成  且有效?

问题2: 上述步骤是否可以签署和保护、直到 u-boot 为止?

问题3。 如果是、如何在 u-boot 和我的 FitImage.bin 之间启用信任根(fimage conatains fs、kernal...)。

问题4。  何时使用 BMPK? 如何进行测试。

问题5.  我是否应保持 board/ti/keys/custMpk.crt 和 board/ti/keys/custMpk.key 不变?

此致、

-RJ