This is a bootloader test application which demonstrates booting an encrypted application signed with certificate generated for inplace auth type .The example is supported only on HS-SE device. In this example the image information such as header, image residing address after auth and decryption and image size are obtained as a response from Sciclient_procBootAuthAndStart api. In this example the appimage is copied from flash to ddr memory to do authentication and decryption, as decryption can't be done in flash memory.
Parameter | Value |
---|---|
CPU + OS | r5fss0-0 nortos |
Toolchain | ti-arm-clang |
Boards | am62ax-sk |
Example folder | examples/security/boootloader_test |
Since this is a bootloader application, the example will be run every time you boot an application using this example. It is run from a OSPI boot media unlike other examples which are usually loaded with CCS. Nevertheless, you can build this example like you do for the others using makefile or build it via CCS by importing as a project.
${SDK_INSTALL_PATH}/examples/security/bootloader_test/am62ax-sk/default_security_bootloader_test_hs.cfg
default_security_bootloader_test_hs.cfg
shown above.C:/ti/mcu_plus_sdk
and this example and mcu_core_test_app application is built using makefiles, in Windows, cd C:/ti/mcu_plus_sdk/tools/boot python uart_uniflash.py -p COM13 --cfg=C:/ti/mcu_plus_sdk/examples/security/bootloader_test/am62ax-sk/default_security_bootloader_test_hs.cfg
~/ti/mcu_plus_sdk
cd ~/ti/mcu_plus_sdk/tools/boot python uart_uniflash.py -p /dev/ttyUSB0 --cfg=~/ti/mcu_plus_sdk/examples/security/bootloader_test/am62ax-sk/default_security_bootloader_test_hs.cfg
Shown below is a sample output when the application is run,