|
1 | | -# This configuration file is for the offline secure boot content certificate generation tool |
2 | | -# cert_sb_content_util.py (Content Certificate Generation Tool - CCGT). |
3 | | -# |
4 | | -# The available parameters in this configuration file are the following |
5 | | -# • [KEY-CFG] : Mandatory header. |
6 | | -# The internal non-configurable header. |
7 | | -# • cert-keypair : Mandatory parameter. |
8 | | -# The file holding the RSA keypair for signing this certificate, in PEM format. |
9 | | -# • cert-keypair-pwd : Optional. If omitted the tool prompts for direct input. |
10 | | -# The passphrase file for the keypair file, in .txt format. |
11 | | -# • load-verify-scheme : Mandatory parameter. |
12 | | -# The SW image verification scheme. Supported schemes are: |
13 | | -# - 0 : Load and verify from flash to memory. |
14 | | -# - 1 : Full hash verification in Flash, with no loading to memory. |
15 | | -# - 2 : Verify in memory. |
16 | | -# - 3 : Load from flash. |
17 | | -# Note: Option 3 is not recommended and is not allowed in Secure LCS. |
18 | | -# • crypto-type : Mandatory parameter. |
19 | | -# The cryptographic verification and decryption mode: |
20 | | -# - 0 : Both AES and hash are calculated on the plain image. |
21 | | -# - 1 : AES is calculated on the plain image, and the hash is calculated on the encrypted image. |
22 | | -# Note: We recommend that you use the first mode. |
23 | | -# • aes-ce-id : Mandatory parameter. |
24 | | -# The ID of the key used for encryption, matching the entity that signed the certificate chain: |
25 | | -# - 0 : None. |
26 | | -# - 1 : Kceicv (ICV). |
27 | | -# - 2 : Kce (OEM). |
28 | | -# • aes-enc-key : Optional. Can be omitted if no encryption is needed. |
29 | | -# The text file containing the encryption key for the authenticated SW images: Kce or Kceicv. |
30 | | -# The contents of this file are comma-separated hex Bytes ("0x12,0x34 …") ending with "." |
31 | | -# • images-table : Mandatory parameter. |
32 | | -# The text file containing the list of SW image files to be processed. Each line refers to a single image, |
33 | | -# with the following parameters: <image file name> <32b mem load addr> <32b flash store addr> <32b image max size> |
34 | | -# <encryption flag: 0 – not encrypted, 1 -encrypted> |
35 | | -# Notes: |
36 | | -# - If using loading scheme option 1, the memory address is 0xffffffff (nonexisting address). |
37 | | -# - If using loading scheme option 2, the storage address is 0xffffffff (non-existing address). |
38 | | -# - If encryption is used, an output file named <image file name>_enc.bin is created for each encrypted image. |
39 | | -# • nvcounter-val : Mandatory parameter. |
40 | | -# The NV counter value: |
41 | | -# - 0..64 : The ICV counter. |
42 | | -# - 0..96 : The OEM counter. |
43 | | -# - 0..160 : The full counter, if OEM and ICV are a single entity. |
44 | | -# • cert-pkg : Mandatory parameter. |
45 | | -# The content certificate package in binary format. |
46 | | -[CNT-CFG] |
47 | | -cert-keypair = key/OEMSBContent.pem |
48 | | -cert-keypair-pwd = key/oem_keys_pass.pwd |
49 | | -load-verify-scheme = 1 |
50 | | -crypto-type = 0 |
51 | | -aes-ce-id = 0 |
52 | | -aes-enc-key = key/kce.txt |
53 | | -images-table = ../build/images/images.txt |
54 | | -nvcounter-val = 0 |
55 | | -cert-pkg = ../cert/OEMSBContent.crt |
| 1 | +# This configuration file is for the offline secure boot content certificate generation tool |
| 2 | +# cert_sb_content_util.py (Content Certificate Generation Tool - CCGT). |
| 3 | +# |
| 4 | +# The available parameters in this configuration file are the following |
| 5 | +# • [KEY-CFG] : Mandatory header. |
| 6 | +# The internal non-configurable header. |
| 7 | +# • cert-keypair : Mandatory parameter. |
| 8 | +# The file holding the RSA keypair for signing this certificate, in PEM format. |
| 9 | +# • cert-keypair-pwd : Optional. If omitted the tool prompts for direct input. |
| 10 | +# The passphrase file for the keypair file, in .txt format. |
| 11 | +# • load-verify-scheme : Mandatory parameter. |
| 12 | +# The SW image verification scheme. Supported schemes are: |
| 13 | +# - 0 : Load and verify from flash to memory. |
| 14 | +# - 1 : Full hash verification in Flash, with no loading to memory. |
| 15 | +# - 2 : Verify in memory. |
| 16 | +# - 3 : Load from flash. |
| 17 | +# Note: Option 3 is not recommended and is not allowed in Secure LCS. |
| 18 | +# • crypto-type : Mandatory parameter. |
| 19 | +# The cryptographic verification and decryption mode: |
| 20 | +# - 0 : Both AES and hash are calculated on the plain image. |
| 21 | +# - 1 : AES is calculated on the plain image, and the hash is calculated on the encrypted image. |
| 22 | +# Note: We recommend that you use the first mode. |
| 23 | +# • aes-ce-id : Mandatory parameter. |
| 24 | +# The ID of the key used for encryption, matching the entity that signed the certificate chain: |
| 25 | +# - 0 : None. |
| 26 | +# - 1 : Kceicv (ICV). |
| 27 | +# - 2 : Kce (OEM). |
| 28 | +# • aes-enc-key : Optional. Can be omitted if no encryption is needed. |
| 29 | +# The text file containing the encryption key for the authenticated SW images: Kce or Kceicv. |
| 30 | +# The contents of this file are comma-separated hex Bytes ("0x12,0x34 …") ending with "." |
| 31 | +# • images-table : Mandatory parameter. |
| 32 | +# The text file containing the list of SW image files to be processed. Each line refers to a single image, |
| 33 | +# with the following parameters: <image file name> <32b mem load addr> <32b flash store addr> <32b image max size> |
| 34 | +# <encryption flag: 0 – not encrypted, 1 -encrypted> |
| 35 | +# Notes: |
| 36 | +# - If using loading scheme option 1, the memory address is 0xffffffff (nonexisting address). |
| 37 | +# - If using loading scheme option 2, the storage address is 0xffffffff (non-existing address). |
| 38 | +# - If encryption is used, an output file named <image file name>_enc.bin is created for each encrypted image. |
| 39 | +# • nvcounter-val : Mandatory parameter. |
| 40 | +# The NV counter value: |
| 41 | +# - 0..64 : The ICV counter. |
| 42 | +# - 0..96 : The OEM counter. |
| 43 | +# - 0..160 : The full counter, if OEM and ICV are a single entity. |
| 44 | +# • cert-pkg : Mandatory parameter. |
| 45 | +# The content certificate package in binary format. |
| 46 | +[CNT-CFG] |
| 47 | +cert-keypair = utils/key/OEMSBContent.pem |
| 48 | +cert-keypair-pwd = utils/key/oem_keys_pass.pwd |
| 49 | +load-verify-scheme = 1 |
| 50 | +crypto-type = 0 |
| 51 | +aes-ce-id = 0 |
| 52 | +aes-enc-key = utils/key/kce.txt |
| 53 | +images-table = build/images/images.txt |
| 54 | +nvcounter-val = 0 |
| 55 | +cert-pkg = cert/OEMSBContent.crt |
0 commit comments