mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-18 02:24:18 +00:00

Add example keys for building trusted flash images using doimage tools. Similar files can be generated using openssl or mbedtls. Marvell platform make files are using trusted boot configurations from this example etst vector. Change-Id: I38a2e295171bee4c14005ce6f020b352c683496e Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
29 lines
1 KiB
INI
29 lines
1 KiB
INI
# Trusted boot image extension definitions
|
|
|
|
kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
|
|
|
|
# CSK keys array - 16 entries total.
|
|
# Only a key with csk_key_index will be used for signing the image
|
|
# use "*" string instead of file name for specifying an empty key
|
|
csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
|
|
"tools/doimage/secure/csk_priv_pem1.key",
|
|
"tools/doimage/secure/csk_priv_pem2.key",
|
|
"tools/doimage/secure/csk_priv_pem3.key",
|
|
"*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"];
|
|
|
|
# index of CSK key in the array. Valid range is 0 to 15
|
|
csk_key_index = 3;
|
|
|
|
# AES-256 symmetric key for image encryption
|
|
aes_key_file = "tools/doimage/secure/aes_key.txt";
|
|
|
|
efuse_disable = false;
|
|
jtag = { enable = true; delay = 20; };
|
|
|
|
box_id = 0xdeadbeef;
|
|
flash_id = 0xbaddf00d;
|
|
|
|
# SecureBootControl and EfuseBurnControl registers array
|
|
# Two register addresses for each connected CP
|
|
# A8K - two CP, four register values
|
|
control = [0xF2441920, 0xF2441940, 0xF4441920, 0xF4441940];
|