summaryrefslogtreecommitdiff
path: root/tools/doimage/secure/sec_img_8K.cfg
diff options
context:
space:
mode:
authorKonstantin Porotchkin <kostap@marvell.com>2017-03-20 16:48:13 +0200
committerKonstantin Porotchkin <kostap@marvell.com>2017-04-02 17:37:18 +0300
commita4f405c918fc170f25db0b11254094ef052b68b3 (patch)
tree23fcd47402909df19cd7a0e53cac7ae38f7e5b4f /tools/doimage/secure/sec_img_8K.cfg
parent4712fa35c1b04a421c8722501a37eb481b379e1f (diff)
tools: Add marvell doimage build tool
Add Marvell flash image builder "doimage" The "doimage" tool is used for building a boot image with all headers and extensions acceptable by the SoC BootROM. It also is able to sign and encrypt the image for trusted boot mode as far as verify and print the image content information. This "doimage" release supports Marvell A7K/A8K SoCs. Change-Id: I5ad7377abdcbccb77cb4d71e5e4e4cd4358303e7 Signed-off-by: Haim Boot <hayim@marvell.com> Signed-off-by: Yehuda Yitschak <yehuday@marvell.com> Signed-off-by: Konstantin Porotchkin <kostap@marvell.com> Reviewed-on: http://vgitil04.il.marvell.com:8080/37917
Diffstat (limited to 'tools/doimage/secure/sec_img_8K.cfg')
-rw-r--r--tools/doimage/secure/sec_img_8K.cfg29
1 files changed, 29 insertions, 0 deletions
diff --git a/tools/doimage/secure/sec_img_8K.cfg b/tools/doimage/secure/sec_img_8K.cfg
new file mode 100644
index 00000000..53ac3228
--- /dev/null
+++ b/tools/doimage/secure/sec_img_8K.cfg
@@ -0,0 +1,29 @@
+# Trusted boot image extention definitions
+
+kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
+
+# CSK keys array - 16 entries total.
+# Only a key with csk_key_index will be used for signing the image
+# use "*" string instead of file name for specifying an empty key
+csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
+ "tools/doimage/secure/csk_priv_pem1.key",
+ "tools/doimage/secure/csk_priv_pem2.key",
+ "tools/doimage/secure/csk_priv_pem3.key",
+ "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*", "*"];
+
+# index of CSK key in the array. Valid range is 0 to 15
+csk_key_index = 3;
+
+# AES-256 symmetric key for image encryption
+aes_key_file = "tools/doimage/secure/aes_key.txt";
+
+efuse_disable = false;
+jtag = { enable = true; delay = 20; };
+
+box_id = 0xdeadbeef;
+flash_id = 0xbaddf00d;
+
+# SecureBootControl and EfuseBurnControl registers array
+# Two register addresses for each connected CP
+# A8K - two CP, four register values
+control = [0xF2441920, 0xF2441940, 0xF4441920, 0xF4441940];