SPRAD04 January   2022 TDA4VH-Q1 , TDA4VM , TDA4VM-Q1

 

  1.   Trademarks
  2. 1Introduction
  3. 2TIDK Device Verification
    1. 2.1 Sign and Encrypt Second BootLoader (SBL)
    2. 2.2 Sign and Encrypt System Image
  4. 3Keys Programming
    1. 3.1 Install Keywriter
    2. 3.2 Keys Generation
    3. 3.3 Build Keywriter Application
    4. 3.4 Program Keys in HS-FS Device
  5. 4Key Programming Verification
  6. 5Building and Booting on HS Devices Using Linux SDK
  7. 6Summary

Build Keywriter Application

After generating the keys to be programmed into the SoC, perform the following command to generate the x509 certificate.

# cd ${PSDKRA_PATH}/pdk/packages/ti/boot/sbl/example/k3MulticoreApp/keywriter/scripts
# ./gen_keywr_cert.sh -s keys/smpk.pem --smek keys/smek.key -t keys/tifekpub.pem -a keys/aes256.key

You can find the generated certificate in the folder: x509cert/final_certificate.bin. Perform the following command to compile the keywriter source code and append the x509 certificate to the keywriter application.

# cd ${PSDKRA_PATH}/pdk/packages/ti/build
# make keywriter_img -j8

The TIFS in GP silicon and HS-FS silicon are different, because the TI production key is already programmed to HS-FS silicon in the TI factory, but it is empty in the GP device. However, while building the Keywriter application, the keywriter.mk in PDK will load the HS-FS TIFS binary and convert it to array forms, which can load by the keywriter application source code. All of these steps are executed automatically while compiling the keywriter source code, so no extra operation required.

The generated keywriter application is in folder:
${PSDKRA_PATH}/pdk/packages/ti/boot/sbl/example/k3MulticoreApp/binary/keywriter_img_j721e_release.bin