SPRUIY1D November   2020  – August 2024

 

  1.   1
  2.   Description
  3.   Features
  4.   4
  5. 1Evaluation Module Overview
    1. 1.1 Introduction
    2. 1.2 Preface: Read This First
      1. 1.2.1 If You Need Assistance
      2. 1.2.2 Important Usage Notes
    3. 1.3 Kit Overview
      1. 1.3.1 Kit Contents
      2. 1.3.2 Key Features
      3. 1.3.3 Component Identification
      4. 1.3.4 Daughter Cards
        1. 1.3.4.1 Connecting the AM273x EVM to the AWR2243BOOST EVM
        2. 1.3.4.2 Connecting the AM273x EVM to the DCA1000
      5. 1.3.5 Security
      6. 1.3.6 Compliance
  6. 2Hardware
    1. 2.1 Board Setup
      1. 2.1.1 Power Requirements
        1. 2.1.1.1 Power Status LEDs
      2. 2.1.2 Push Buttons
      3. 2.1.3 Switches
      4. 2.1.4 LEDs
      5. 2.1.5 Boot Mode Selection
    2. 2.2 Hardware Description
      1. 2.2.1  Functional Block Diagram
      2. 2.2.2  Memory Interface
        1. 2.2.2.1 QSPI Interface
        2. 2.2.2.2 Board ID EEPROM
      3. 2.2.3  Ethernet Interface
      4. 2.2.4  Micro USB Interfaces
        1. 2.2.4.1 FTDI USB Interface
          1. 2.2.4.1.1 FTDI EEPROM Memory Device
        2. 2.2.4.2 XDS USB Interface
        3. 2.2.4.3 PC Connection
      5. 2.2.5  I2C Interface
        1. 2.2.5.1 I2C Connections
      6. 2.2.6  UART Interface
      7. 2.2.7  CAN Interfaces
        1. 2.2.7.1 CAN-A Interface
        2. 2.2.7.2 CAN-B Interface
      8. 2.2.8  JTAG Emulation
      9. 2.2.9  SPI Interface
      10. 2.2.10 MDI Interface
      11. 2.2.11 ePWM Interface
    3. 2.3 Connectors
      1. 2.3.1 60-Pin High Density (HD) FE Connector-1 (J1)
      2. 2.3.2 60-Pin High Density (HD) FE Connector-2 (J11)
      3. 2.3.3 MIPI 60-Pin Connector (J19)
      4. 2.3.4 Debug Connector 60-Pin (J7)
      5. 2.3.5 External Clock Option (J13, J1)
    4. 2.4 Mechanical Mounting of the PCB
  7. 3Additional Information
    1. 3.1 Trademarks
    2.     3.A Rev. C Design Changes
  8. 4Revision History

Security

The AM273x EVM can have a Non-Secure (GP or General Purpose) or a Secure device (HS-FS). To determine if the device is secure, refer to field parameter for security: "y" of the Device name. If the Security Parameter is "H", then the device is a Secure device.

TMDS273EVM, TMDS273GPEVM, TPR12REVM Security Field Parameter Figure 1-4 Security Field Parameter

The AM273x device leaves the TI factory in an HS-FS state where customer keys are not programmed and has the following attributes:

  • Does not enforce the secure boot process
  • M4 JTAG port is closed
  • R5 JTAG port is open
  • Security Subsystem firewalls are closed
  • SoC Firewalls are open
  • ROM Boot expects a TI signed binary (encryption is optional)
  • TIFS-MCU binary is signed by the TI private key

The One Time Programmable (OTP) keywriter converts the secure device from HS-FS to HS-SE. The OTP keywriter programs customer keys into the device eFuses to enforce secure boot and establish a root of trust. The secure boot requires an image to be encrypted (optional) and signed using customer keys, which is verified by the SoC. A secure device in the HS-SE state has the following attributes:

  • M4, R5 JTAG ports are both closed
  • Security Subsystems and SoC Firewalls are both closed
  • TIFS-MCU and SBL need to be signed with active customer key