SPRAD04 January   2022 TDA4VH-Q1 , TDA4VM , TDA4VM-Q1

 

  1.   Trademarks
  2. 1Introduction
  3. 2TIDK Device Verification
    1. 2.1 Sign and Encrypt Second BootLoader (SBL)
    2. 2.2 Sign and Encrypt System Image
  4. 3Keys Programming
    1. 3.1 Install Keywriter
    2. 3.2 Keys Generation
    3. 3.3 Build Keywriter Application
    4. 3.4 Program Keys in HS-FS Device
  5. 4Key Programming Verification
  6. 5Building and Booting on HS Devices Using Linux SDK
  7. 6Summary

TIDK Device Verification

HS-SE-TIDK device is security enforced silicon, which has TI dummy key programmed in customer area. The customer needs to use the TI dummy key to sign and encrypt their system image, if they want to verify the functionality in the HS-SE-TIDK device. This step is necessary to help customers familiarize the process of signing and encrypting binaries with security keys. But the TI dummy key is public for all the customers, so the HS-SE-TIDK device can never be a production device.

The TI dummy keys are included in the default RTOS SDK. You can download the SDK from RTOS SDK for DRA829 & TDA4VM Jacinto™ Processors. You can find TI dummy keys in the following folder. All the processes tested in SDK7.1 software work fine.

# cp ${PSDKRA_PATH}/pdk/packages/ti/build/makerules/k3_dev_mpk.pem ~/TIDummyKey/smpk.pem
# cp ${PSDKRA_PATH}/pdk/packages/ti/build/makerules/k3_dev_mek.txt  ~/TIDummyKey/smek.txt