xref: /arm-trusted-firmware/tools/marvell/doimage/secure/sec_img_7K.cfg (revision 91f16700b400a8c0651d24a598fc48ee2997a0d7)
1*91f16700Schasinglulu# Trusted boot image extension definitions
2*91f16700Schasinglulu
3*91f16700Schasinglulukak_key_file = "tools/doimage/secure/kak_priv_pem.key";
4*91f16700Schasinglulu
5*91f16700Schasinglulu# CSK keys array - 16 entries total.
6*91f16700Schasinglulu# Only a key with csk_key_index will be used for signing the image
7*91f16700Schasinglulu# use "*" string instead of file name for specifying an empty key
8*91f16700Schasinglulucsk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9*91f16700Schasinglulu                "tools/doimage/secure/csk_priv_pem1.key",
10*91f16700Schasinglulu                "tools/doimage/secure/csk_priv_pem2.key",
11*91f16700Schasinglulu                "tools/doimage/secure/csk_priv_pem3.key",
12*91f16700Schasinglulu                "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"];
13*91f16700Schasinglulu
14*91f16700Schasinglulu# index of CSK key in the array. Valid range is 0 to 15
15*91f16700Schasinglulucsk_key_index = 3;
16*91f16700Schasinglulu
17*91f16700Schasinglulu# AES-256 symmetric key for image encryption
18*91f16700Schasingluluaes_key_file = "tools/doimage/secure/aes_key.txt";
19*91f16700Schasinglulu
20*91f16700Schasingluluefuse_disable = false;
21*91f16700Schasinglulujtag = { enable = true; delay = 20; };
22*91f16700Schasinglulu
23*91f16700Schasinglulubox_id = 0xdeadbeef;
24*91f16700Schasingluluflash_id = 0xbaddf00d;
25*91f16700Schasinglulu
26*91f16700Schasinglulu# SecureBootControl and EfuseBurnControl registers array
27*91f16700Schasinglulu# Two register addresses for each connected CP
28*91f16700Schasinglulu# A7K - one CP, two register values
29*91f16700Schasinglulucontrol = [0xF2441920, 0xF2441940];
30