SPRADN0 December 2024 F29H850TU , F29H859TU-Q1
The primary difference between the flash kernel design for C28-based devices and the F29H85x flash kernel is the integration of the Hardware Security Module (HSM). The HSM is a subsystem that provides security and cryptographic functions. The C29 CPUs interface with the HSM to perform cryptographic operations required for code authentication, secure boot, secure firmware upgrades, and encrypted run-time communications.
During the UART boot sequence, the HSM is responsible for authentication of the incoming image. For the authentication to succeed, the incoming image must include an X.509 certificate. To properly generate an X.509 certificate with the flash kernel, refer to Section 2.2.
The HSM introduces the concept of different device security states. The device states are High Security - Field Securable (HS-FS), High Security - Key Provisioned (HS-KP), and High Security - Security Enabled (HS-SE). By default, the F29H85x device ships with HS-FS. Table 2-1 describes the differences between these three states.
|
HS-FS |
HS-KP |
HS-SE |
|
|---|---|---|---|
|
C29 boot image (flash kernel) |
Secure boot not enforced |
Secure boot enforced with customer keys programmed by keywriter |
Secure boot enforced with customer keys programmed by keywriter |
|
HSM boot image |
Secure boot enforced (with default TI-provided key) | Secure boot enforced with customer keys programmed by keywriter | Secure boot enforced with customer keys programmed by keywriter |
|
C29 JTAG |
Open by default |
Open by default |
Closed by default |
|
SoC firewalls |
Open by default |
Disabled for HSM and enabled for C29 |
Disabled for HSM and enabled fro C29 |
|
C29 CPU access to C29 flash banks |
Enabled |
Disabled |
Enabled |
TI provides OTP (One Time Programmable) Keywriter that can be used to transition an HS-FS device to HS-KP or HS-SE. OTP Keywriter is a combination of TI delivered HSM Run Time Firmware and Tools (Certificate generation) which together when executed on device enables the following:
Once these fields are programmed, the device state is transitioned to HS-KP, boot ROM enforces secure boot with Image Authentication and decryption based on the keys provisioned and configured in the device. Secure boot requires an image to be encrypted (optional) and signed using customer keys. This image is then verified by the SoC using the active MPK Hash (to verify the signature) and the MEK (for decryption).
For more information on the OTP Keywriter, request the Restricted Security Package from the F29H85x MCU SDK download page.
The firmware upgrade process differs between HS-FS, HS-KP, and HS-SE devices.