1*6414dc6dSKonstantin Porotchkin# Trusted boot image extension definitions 2*6414dc6dSKonstantin Porotchkin 3*6414dc6dSKonstantin Porotchkinkak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 4*6414dc6dSKonstantin Porotchkin 5*6414dc6dSKonstantin Porotchkin# CSK keys array - 16 entries total. 6*6414dc6dSKonstantin Porotchkin# Only a key with csk_key_index will be used for signing the image 7*6414dc6dSKonstantin Porotchkin# use "*" string instead of file name for specifying an empty key 8*6414dc6dSKonstantin Porotchkincsk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9*6414dc6dSKonstantin Porotchkin "tools/doimage/secure/csk_priv_pem1.key", 10*6414dc6dSKonstantin Porotchkin "tools/doimage/secure/csk_priv_pem2.key", 11*6414dc6dSKonstantin Porotchkin "tools/doimage/secure/csk_priv_pem3.key", 12*6414dc6dSKonstantin Porotchkin "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"]; 13*6414dc6dSKonstantin Porotchkin 14*6414dc6dSKonstantin Porotchkin# index of CSK key in the array. Valid range is 0 to 15 15*6414dc6dSKonstantin Porotchkincsk_key_index = 3; 16*6414dc6dSKonstantin Porotchkin 17*6414dc6dSKonstantin Porotchkin# AES-256 symmetric key for image encryption 18*6414dc6dSKonstantin Porotchkinaes_key_file = "tools/doimage/secure/aes_key.txt"; 19*6414dc6dSKonstantin Porotchkin 20*6414dc6dSKonstantin Porotchkinefuse_disable = false; 21*6414dc6dSKonstantin Porotchkinjtag = { enable = true; delay = 20; }; 22*6414dc6dSKonstantin Porotchkin 23*6414dc6dSKonstantin Porotchkinbox_id = 0xdeadbeef; 24*6414dc6dSKonstantin Porotchkinflash_id = 0xbaddf00d; 25*6414dc6dSKonstantin Porotchkin 26*6414dc6dSKonstantin Porotchkin# SecureBootControl and EfuseBurnControl registers array 27*6414dc6dSKonstantin Porotchkin# Two register addresses for each connected CP 28*6414dc6dSKonstantin Porotchkin# A7K - one CP, two register values 29*6414dc6dSKonstantin Porotchkincontrol = [0xF2441920, 0xF2441940]; 30