Unverified Commit ebf417aa authored by Soby Mathew's avatar Soby Mathew Committed by GitHub
Browse files

Merge pull request #1540 from MISL-EBU-System-SW/marvell-updates-18.09

Marvell updates 18.09
parents 100992b5 6d55ef1a
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
# Trusted boot image extension definitions
kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
# CSK keys array - 16 entries total.
# Only a key with csk_key_index will be used for signing the image
# use "*" string instead of file name for specifying an empty key
csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
"tools/doimage/secure/csk_priv_pem1.key",
"tools/doimage/secure/csk_priv_pem2.key",
"tools/doimage/secure/csk_priv_pem3.key",
"*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"];
# index of CSK key in the array. Valid range is 0 to 15
csk_key_index = 3;
# AES-256 symmetric key for image encryption
aes_key_file = "tools/doimage/secure/aes_key.txt";
efuse_disable = false;
jtag = { enable = true; delay = 20; };
box_id = 0xdeadbeef;
flash_id = 0xbaddf00d;
# SecureBootControl and EfuseBurnControl registers array
# Two register addresses for each connected CP
# A7K - one CP, two register values
control = [0xF2441920, 0xF2441940];
# Trusted boot image extension definitions
kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
# CSK keys array - 16 entries total.
# Only a key with csk_key_index will be used for signing the image
# use "*" string instead of file name for specifying an empty key
csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
"tools/doimage/secure/csk_priv_pem1.key",
"tools/doimage/secure/csk_priv_pem2.key",
"tools/doimage/secure/csk_priv_pem3.key",
"*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"];
# index of CSK key in the array. Valid range is 0 to 15
csk_key_index = 3;
# AES-256 symmetric key for image encryption
aes_key_file = "tools/doimage/secure/aes_key.txt";
efuse_disable = false;
jtag = { enable = true; delay = 20; };
box_id = 0xdeadbeef;
flash_id = 0xbaddf00d;
# SecureBootControl and EfuseBurnControl registers array
# Two register addresses for each connected CP
# A8K - two CP, four register values
control = [0xF2441920, 0xF2441940, 0xF4441920, 0xF4441940];
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment