Konstantin Porotchkin | 30b05bc | 2018-08-14 15:25:07 +0300 | [diff] [blame] | 1 | # Trusted boot image extension definitions |
| 2 | |
| 3 | kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; |
| 4 | |
| 5 | # CSK keys array - 16 entries total. |
| 6 | # Only a key with csk_key_index will be used for signing the image |
| 7 | # use "*" string instead of file name for specifying an empty key |
| 8 | csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", |
| 9 | "tools/doimage/secure/csk_priv_pem1.key", |
| 10 | "tools/doimage/secure/csk_priv_pem2.key", |
| 11 | "tools/doimage/secure/csk_priv_pem3.key", |
| 12 | "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"]; |
| 13 | |
| 14 | # index of CSK key in the array. Valid range is 0 to 15 |
| 15 | csk_key_index = 3; |
| 16 | |
| 17 | # AES-256 symmetric key for image encryption |
| 18 | aes_key_file = "tools/doimage/secure/aes_key.txt"; |
| 19 | |
| 20 | efuse_disable = false; |
| 21 | jtag = { enable = true; delay = 20; }; |
| 22 | |
| 23 | box_id = 0xdeadbeef; |
| 24 | flash_id = 0xbaddf00d; |
| 25 | |
| 26 | # SecureBootControl and EfuseBurnControl registers array |
| 27 | # Two register addresses for each connected CP |
| 28 | # A7K - one CP, two register values |
| 29 | control = [0xF2441920, 0xF2441940]; |