Hi,
I’m fusing TX2NX & JP 4.6.2 with PKC, SBK, KEK0, KEK1, KEK2 keys. I’m preparing the fuseblob (to mass production fuse) using command:
sudo BOARDID=3636 FAB="300" BOARDSKU="0001" ./odmfuse.sh --noburn --auth SBKPKC -i 0x18 -p -k ${CRE_FOLDER}/secureboot_sign_key/rsa_priv.pem -S ${CRE_FOLDER}/secureboot_sign_key/sbk_key.txt --KEK0 ${CRE_FOLDER}/secureboot_sign_key/kek0.txt --KEK1 ${CRE_FOLDER}/secureboot_sign_key/kek1.txt --KEK2 ${CRE_FOLDER}/secureboot_sign_key/kek2.txt jetson-xavier-nx-devkit-tx2-nx
This is output log
Board ID(3636) version(300) sku(0001) revision()
copying sdram_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg)... done.
copying misc_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg)... done.
copying scr_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying pmc_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-p3636-0001-a00.cfg)... done.
copying pmic_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-p3636-0001-a00.cfg)... done.
copying br_cmd_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg)... done.
copying prod_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-p3636-0001-a00.cfg)... done.
copying dev_params(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing mb2_bootloader(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mts_preboot(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts_bootpack(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
copying bootloader_dtb(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb)... done.
Existing bpmp_fw(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpmp_fw_dtb(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/tegra186-bpmp-p3636-0001-a00-00.dtb)... done.
Existing tlk(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eks(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/eks.img) reused.
Existing mb1file(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing spefile(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/spe.bin) reused.
copying tegraboot(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done.
Existing tbcfile(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/cboot.bin) reused.
Existing scefile(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
copying wb0boot(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done.
done.
Existing cfg(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/flash.xml) reused.
Existing bl(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing applet(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
./tegraflash.py --sdram_config tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --pmc_config tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic_config tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --br_cmd_config tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod_config tegra186-mb1-bct-prod-p3636-0001-a00.cfg --dev_params emmc.cfg --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bootloader_dtb tegra186-p3636-0001-p3509-0000-a01.dtb; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-bpmp-p3636-0001-a00-00.dtb; tlk tos-trusty.img; eks eks.img" --cfg flash.xml --bl nvtboot_recovery_cpu.bin --odmdata 0x2090000 --chip 0x18 --applet mb1_recovery_prod.bin --key "/CRE_FOLDER/secureboot_sign_key/rsa_priv.pem" --encrypt_key "/CRE_FOLDER/secureboot_sign_key/sbk_key.txt" --cmd "sign"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0071 ] Using default ramcode: 0
[ 0.0071 ] Disable BPMP dtb trim, using default dtb
[ 0.0071 ]
[ 0.0098 ] tegrasign_v3.py --getmode mode.txt --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem
[ 0.0118 ] K[ 0.0121 ] ey size is 256 bytes
[ 0.0124 ] Generating RCM messages
[ 0.0145 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0156 ] RCM 0 is saved as rcm_0.rcm
[ 0.0162 ] RCM 1 is saved as rcm_1.rcm
[ 0.0162 ] List of rcm files are saved in rcm_list.xml
[ 0.0162 ]
[ 0.0162 ] Signing RCM messages
[ 0.0186 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0188 ] Key is a SBK key
[ 0.0188 ] Key Size is 16 bytes
[ 0.0194 ] 160
[ 0.0256 ] 114176
[ 0.0339 ] Copying signature to RCM mesages
[ 0.0362 ] Signing RCM messages
[ 0.0386 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0401 ] K[ 0.0405 ] ey size is 256 bytes
[ 0.0719 ] Saving pkc public key in pub_key.key
[ 0.0716 ] Copying signature to RCM mesages
[ 0.0738 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key
[ 0.0750 ]
[ 0.0750 ] Parsing partition layout
[ 0.0771 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0784 ]
[ 0.0784 ] Creating list of images to be signed
[ 0.0805 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml oem-rsa-sbk
[ 0.1004 ]
[ 0.1004 ] Generating signatures
[ 0.1030 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list images_list.xml --pubkeyhash pub_key.key
[ 0.1031 ] Key is a SBK key
[ 0.1031 ] Key Size is 16 bytes
[ 0.1038 ] 99904
...
[ 0.4885 ] 192320
[ 0.4984 ] Generating br-bct
[ 0.5004 ] Updating dev and MSS params in BR BCT
[ 0.5004 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[ 0.5118 ]
[ 0.5118 ] Updating bl info
[ 0.5139 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.5157 ]
[ 0.5158 ] Updating smd info
[ 0.5180 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 0.5192 ]
[ 0.5192 ] Updating Odmdata
[ 0.5213 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[ 0.5225 ]
[ 0.5225 ] Get encrypted section of bct
[ 0.5247 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 0.5257 ]
[ 0.5257 ] Signing BCT
[ 0.5279 ] Generating signatures with encryption
[ 0.5300 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list bct_list.xml --pubkeyhash pub_key.key
[ 0.5308 ] Key is a SBK key
[ 0.5617 ] Key Size is 16 bytes
[ 0.5618 ] 1920
[ 0.5694 ]
[ 0.5694 ] Updating BCT with signature
[ 0.5718 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[ 0.5730 ]
[ 0.5730 ] Get Signed section of bct
[ 0.5751 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 0.5761 ]
[ 0.5783 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key
[ 0.5791 ] Key size is 256 bytes
[ 0.6249 ] Saving pkc public key in pub_key.key
[ 0.6304 ]
[ 0.6304 ] Updating BCT with signature
[ 0.6328 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[ 0.6340 ]
[ 0.6340 ] Generating coldboot mb1-bct
[ 0.6361 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 0.6369 ] MB1-BCT version: 0xf
[ 0.6370 ] Copying Sdram info from 1 to 2 set
[ 0.6474 ] Copying Sdram info from 2 to 3 set
[ 0.6476 ] Packing sdram param for instance[0]
[ 0.6478 ] Packing sdram param for instance[1]
[ 0.6480 ] Packing sdram param for instance[2]
[ 0.6481 ] Packing sdram param for instance[3]
[ 0.6483 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 0.6487 ] Appending platform config data of size :- 2280
[ 0.6489 ] Parsing config file :mobile_scr.cfg
[ 0.6490 ] Appending platform config data of size :- 12240
[ 0.6493 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 0.6495 ] Appending platform config data of size :- 24
[ 0.6495 ]
[ 0.6495 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 0.6495 ] Appending platform config data of size :- 508
[ 0.6495 ]
[ 0.6495 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 0.6495 ] Appending platform config data of size :- 64
[ 0.6495 ]
[ 0.6495 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 0.6495 ] Appending platform config data of size :- 1628
[ 0.6495 ]
[ 0.6495 ] Updating mb1-bct with firmware information
[ 0.6516 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.6524 ] MB1-BCT version: 0xf
[ 0.6529 ]
[ 0.6529 ] Updating mb1-bct with storage information
[ 0.6550 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.6558 ] MB1-BCT version: 0xf
[ 0.6563 ]
[ 0.6585 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 0.6593 ]
[ 0.6615 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[ 0.6625 ]
[ 0.6651 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[ 0.6652 ] Key is a SBK key
[ 0.6652 ] Key Size is 16 bytes
[ 0.6656 ] 48768
[ 0.6733 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 0.6743 ]
[ 0.6765 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 0.6773 ]
[ 0.6799 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[ 0.6817 ] Ke[ 0.6820 ] y size is 256 bytes
[ 0.6977 ] Saving pkc public key in pub_key.key
[ 0.6997 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.signed mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 0.7008 ]
[ 0.7009 ] Generating recovery mb1-bct
[ 0.7030 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 0.7038 ] MB1-BCT version: 0xf
[ 0.7041 ] Copying Sdram info from 1 to 2 set
[ 0.7144 ] Copying Sdram info from 2 to 3 set
[ 0.7146 ] Packing sdram param for instance[0]
[ 0.7147 ] Packing sdram param for instance[1]
[ 0.7149 ] Packing sdram param for instance[2]
[ 0.7151 ] Packing sdram param for instance[3]
[ 0.7153 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 0.7156 ] Appending platform config data of size :- 2280
[ 0.7158 ] Parsing config file :minimal_scr.cfg
[ 0.7160 ] Appending platform config data of size :- 12240
[ 0.7162 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 0.7164 ] Appending platform config data of size :- 24
[ 0.7164 ]
[ 0.7164 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 0.7164 ] Appending platform config data of size :- 508
[ 0.7164 ]
[ 0.7164 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 0.7164 ] Appending platform config data of size :- 64
[ 0.7164 ]
[ 0.7164 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 0.7164 ] Appending platform config data of size :- 1628
[ 0.7164 ]
[ 0.7164 ] Updating mb1-bct with firmware information
[ 0.7186 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.7194 ] MB1-BCT version: 0xf
[ 0.7198 ]
[ 0.7198 ] Updating mb1-bct with storage information
[ 0.7220 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.7227 ] MB1-BCT version: 0xf
[ 0.7232 ]
[ 0.7254 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 0.7262 ]
[ 0.7283 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[ 0.7294 ]
[ 0.7320 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_bct_MB1_sigheader.bct_list.xml
[ 0.7321 ] Key is a SBK key
[ 0.7321 ] Key Size is 16 bytes
[ 0.7325 ] 48768
[ 0.7401 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 0.7411 ]
[ 0.7433 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1_sigheader.bct.encrypt
[ 0.7442 ]
[ 0.7469 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[ 0.7485 ] Key [ 0.7489 ] size is 256 bytes
[ 0.7645 ] Saving pkc public key in pub_key.key
[ 0.7666 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt.signed mb1_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 0.7676 ]
[ 0.7677 ] Generating br-bct
[ 0.7699 ] Updating dev and MSS params in BR BCT
[ 0.7699 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[ 0.7813 ]
[ 0.7814 ] Updating bl info
[ 0.7835 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin
[ 0.7846 ]
[ 0.7846 ] Parsing partition layout
[ 0.7868 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.7882 ]
[ 0.7882 ] Creating list of images to be signed
[ 0.7903 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml oem-rsa-sbk
[ 0.8484 ]
[ 0.8485 ] Generating signatures
[ 0.8545 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list images_list.xml --pubkeyhash pub_key.key
[ 0.8549 ] Key is a SBK key
[ 0.8550 ] Key Size is 16 bytes
[ 0.8583 ] 99904
...
[ 1.3139 ] 192320
[ 1.3237 ] Copying signatures
[ 1.3259 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[ 1.4051 ]
[ 1.4109 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery.bin
[ 1.4150 ]
[ 1.4205 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin oem-rsa-sbk --chip 0x18 0
[ 1.4257 ]
[ 1.4325 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list nvtboot_recovery_sigheader.bin_list.xml
[ 1.4329 ] Key is a SBK key
[ 1.4329 ] Key Size is 16 bytes
[ 1.4350 ] 121872
[ 1.4749 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt nvtboot_recovery_sigheader.bin.hash zerosbk
[ 1.4800 ]
[ 1.4857 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_sigheader.bin.encrypt
[ 1.4898 ]
[ 1.4960 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_recovery_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.5006 ] Ke[ 1.5013 ] y size is 256 bytes
[ 1.5290 ] Saving pkc public key in pub_key.key
[ 1.5312 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt.signed nvtboot_recovery_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.5326 ]
[ 1.5350 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu.bin
[ 1.5359 ]
[ 1.5381 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin oem-rsa-sbk --chip 0x18 0
[ 1.5395 ]
[ 1.5422 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list nvtboot_recovery_cpu_sigheader.bin_list.xml
[ 1.5423 ] Key is a SBK key
[ 1.5423 ] Key Size is 16 bytes
[ 1.5429 ] 224768
[ 1.5556 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 1.5570 ]
[ 1.5591 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu_sigheader.bin.encrypt
[ 1.5601 ]
[ 1.5628 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_recovery_cpu_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.5646 ] Key [ 1.5649 ] size is 256 bytes
[ 1.5831 ] Saving pkc public key in pub_key.key
[ 1.5853 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt.signed nvtboot_recovery_cpu_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.5866 ]
[ 1.5867 ] Copying signed file in /work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/encrypted_signed
[ 1.5903 ] tegrahost_v2 --chip 0x18 --align spe_sigheader.bin.encrypt
[ 1.5913 ]
[ 1.5940 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list spe_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.5957 ] K[ 1.5961 ] ey size is 256 bytes
[ 1.6130 ] Saving pkc public key in pub_key.key
[ 1.6151 ] tegrahost_v2 --chip 0x18 0 --updatesigheader spe_sigheader.bin.encrypt.signed spe_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.6164 ]
[ 1.6189 ] tegrahost_v2 --chip 0x18 --align spe_sigheader.bin.encrypt
[ 1.6198 ]
[ 1.6226 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list spe_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.6244 ] K[ 1.6247 ] ey size is 256 bytes
[ 1.6414 ] Saving pkc public key in pub_key.key
[ 1.6435 ] tegrahost_v2 --chip 0x18 0 --updatesigheader spe_sigheader.bin.encrypt.signed spe_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.6447 ]
[ 1.6470 ] tegrahost_v2 --chip 0x18 --align nvtboot_sigheader.bin.encrypt
[ 1.6479 ]
[ 1.6505 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.6523 ] K[ 1.6526 ] ey size is 256 bytes
[ 1.6688 ] Saving pkc public key in pub_key.key
[ 1.6708 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_sigheader.bin.encrypt.signed nvtboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.6720 ]
[ 1.6744 ] tegrahost_v2 --chip 0x18 --align nvtboot_sigheader.bin.encrypt
[ 1.6752 ]
[ 1.6779 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.6796 ] K[ 1.6799 ] ey size is 256 bytes
[ 1.6964 ] Saving pkc public key in pub_key.key
[ 1.6984 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_sigheader.bin.encrypt.signed nvtboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.6996 ]
[ 1.7020 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr_sigheader.bin.encrypt
[ 1.7029 ]
[ 1.7055 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list preboot_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.7073 ] K[ 1.7076 ] ey size is 256 bytes
[ 1.7231 ] Saving pkc public key in pub_key.key
[ 1.7253 ] tegrahost_v2 --chip 0x18 0 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt.signed preboot_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.7263 ]
[ 1.7287 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr_sigheader.bin.encrypt
[ 1.7295 ]
[ 1.7322 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list preboot_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.7342 ] K[ 1.7345 ] ey size is 256 bytes
[ 1.7503 ] Saving pkc public key in pub_key.key
[ 1.7524 ] tegrahost_v2 --chip 0x18 0 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt.signed preboot_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.7535 ]
[ 1.7558 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 1.7568 ]
[ 1.7594 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mce_mts_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.7611 ] K[ 1.7614 ] ey size is 256 bytes
[ 1.7973 ] Saving pkc public key in pub_key.key
[ 1.7994 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt.signed mce_mts_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.8034 ]
[ 1.8075 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 1.8084 ]
[ 1.8111 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mce_mts_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.8129 ] K[ 1.8132 ] ey size is 256 bytes
[ 1.8508 ] Saving pkc public key in pub_key.key
[ 1.8531 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt.signed mce_mts_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.8572 ]
[ 1.8615 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt
[ 1.8624 ]
[ 1.8650 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.8667 ] K[ 1.8670 ] ey size is 256 bytes
[ 1.8996 ] Saving pkc public key in pub_key.key
[ 1.9055 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed cboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.9114 ]
[ 1.9188 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt
[ 1.9227 ]
[ 1.9295 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.9369 ] K[ 1.9381 ] ey size is 256 bytes
[ 1.9750 ] Saving pkc public key in pub_key.key
[ 1.9773 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed cboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 1.9894 ]
[ 1.9923 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[ 1.9935 ]
[ 1.9966 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[ 1.9987 ] Ke[ 1.9991 ] y size is 256 bytes
[ 2.0180 ] Saving pkc public key in pub_key.key
[ 2.0206 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.0220 ]
[ 2.0249 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[ 2.0261 ]
[ 2.0290 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.0310 ] Ke[ 2.0313 ] y size is 256 bytes
[ 2.0501 ] Saving pkc public key in pub_key.key
[ 2.0522 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.0534 ]
[ 2.0559 ] tegrahost_v2 --chip 0x18 --align tos-trusty_sigheader.img.encrypt
[ 2.0567 ]
[ 2.0594 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tos-trusty_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.0611 ] K[ 2.0614 ] ey size is 256 bytes
[ 2.0803 ] Saving pkc public key in pub_key.key
[ 2.0825 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tos-trusty_sigheader.img.encrypt.signed tos-trusty_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.0841 ]
[ 2.0868 ] tegrahost_v2 --chip 0x18 --align tos-trusty_sigheader.img.encrypt
[ 2.0876 ]
[ 2.0903 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tos-trusty_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.0921 ] K[ 2.0924 ] ey size is 256 bytes
[ 2.1111 ] Saving pkc public key in pub_key.key
[ 2.1132 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tos-trusty_sigheader.img.encrypt.signed tos-trusty_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.1147 ]
[ 2.1173 ] tegrahost_v2 --chip 0x18 --align eks_sigheader.img.encrypt
[ 2.1182 ]
[ 2.1208 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.1224 ] K[ 2.1227 ] ey size is 256 bytes
[ 2.1378 ] Saving pkc public key in pub_key.key
[ 2.1398 ] tegrahost_v2 --chip 0x18 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.1409 ]
[ 2.1432 ] tegrahost_v2 --chip 0x18 --align adsp-fw_sigheader.bin.encrypt
[ 2.1441 ]
[ 2.1467 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.1484 ] K[ 2.1487 ] ey size is 256 bytes
[ 2.1644 ] Saving pkc public key in pub_key.key
[ 2.1663 ] tegrahost_v2 --chip 0x18 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.1675 ]
[ 2.1703 ] tegrahost_v2 --chip 0x18 --align adsp-fw_sigheader.bin.encrypt
[ 2.1712 ]
[ 2.1739 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.1755 ] K[ 2.1758 ] ey size is 256 bytes
[ 2.1916 ] Saving pkc public key in pub_key.key
[ 2.1938 ] tegrahost_v2 --chip 0x18 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.1949 ]
[ 2.1972 ] tegrahost_v2 --chip 0x18 --align bpmp_sigheader.bin.encrypt
[ 2.1981 ]
[ 2.2007 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bpmp_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.2024 ] K[ 2.2027 ] ey size is 256 bytes
[ 2.2223 ] Saving pkc public key in pub_key.key
[ 2.2244 ] tegrahost_v2 --chip 0x18 0 --updatesigheader bpmp_sigheader.bin.encrypt.signed bpmp_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.2261 ]
[ 2.2288 ] tegrahost_v2 --chip 0x18 --align bpmp_sigheader.bin.encrypt
[ 2.2296 ]
[ 2.2323 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bpmp_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.2341 ] K[ 2.2344 ] ey size is 256 bytes
[ 2.2543 ] Saving pkc public key in pub_key.key
[ 2.2563 ] tegrahost_v2 --chip 0x18 0 --updatesigheader bpmp_sigheader.bin.encrypt.signed bpmp_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.2579 ]
[ 2.2606 ] tegrahost_v2 --chip 0x18 --align tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt
[ 2.2615 ]
[ 2.2641 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.2658 ] K[ 2.2661 ] ey size is 256 bytes
[ 2.2821 ] Saving pkc public key in pub_key.key
[ 2.2840 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.signed tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.2851 ]
[ 2.2875 ] tegrahost_v2 --chip 0x18 --align tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt
[ 2.2884 ]
[ 2.2911 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.2928 ] Key [ 2.2931 ] size is 256 bytes
[ 2.3091 ] Saving pkc public key in pub_key.key
[ 2.3111 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.signed tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.3123 ]
[ 2.3147 ] tegrahost_v2 --chip 0x18 --align camera-rtcpu-sce_sigheader.img.encrypt
[ 2.3156 ]
[ 2.3183 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list camera-rtcpu-sce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.3200 ] K[ 2.3204 ] ey size is 256 bytes
[ 2.3365 ] Saving pkc public key in pub_key.key
[ 2.3385 ] tegrahost_v2 --chip 0x18 0 --updatesigheader camera-rtcpu-sce_sigheader.img.encrypt.signed camera-rtcpu-sce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.3396 ]
[ 2.3421 ] tegrahost_v2 --chip 0x18 --align camera-rtcpu-sce_sigheader.img.encrypt
[ 2.3430 ]
[ 2.3456 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list camera-rtcpu-sce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.3473 ] Key[ 2.3476 ] size is 256 bytes
[ 2.3638 ] Saving pkc public key in pub_key.key
[ 2.3659 ] tegrahost_v2 --chip 0x18 0 --updatesigheader camera-rtcpu-sce_sigheader.img.encrypt.signed camera-rtcpu-sce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.3670 ]
[ 2.3700 ] tegrahost_v2 --chip 0x18 --align boot_sigheader.img.encrypt
[ 2.3708 ]
[ 2.3734 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.3752 ] K[ 2.3755 ] ey size is 256 bytes
[ 2.3904 ] Saving pkc public key in pub_key.key
[ 2.3924 ] tegrahost_v2 --chip 0x18 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.3934 ]
[ 2.3957 ] tegrahost_v2 --chip 0x18 --align boot_sigheader.img.encrypt
[ 2.3966 ]
[ 2.3993 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.4012 ] K[ 2.4015 ] ey size is 256 bytes
[ 2.4165 ] Saving pkc public key in pub_key.key
[ 2.4186 ] tegrahost_v2 --chip 0x18 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.4196 ]
[ 2.4219 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[ 2.4228 ]
[ 2.4254 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.4270 ] K[ 2.4273 ] ey size is 256 bytes
[ 2.4442 ] Saving pkc public key in pub_key.key
[ 2.4463 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.4475 ]
[ 2.4499 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[ 2.4508 ]
[ 2.4535 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.4551 ] K[ 2.4554 ] ey size is 256 bytes
[ 2.4722 ] Saving pkc public key in pub_key.key
[ 2.4743 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.4755 ]
[ 2.4797 ] Parsing partition layout
[ 2.4818 ] tegraparser_v2 --pt test.xml
[ 2.4831 ]
[ 2.4831 ] Generating br-bct
[ 2.4852 ] Updating dev and MSS params in BR BCT
[ 2.4853 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[ 2.4967 ]
[ 2.4967 ] Updating bl info
[ 2.4988 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo test.bin --updatesig images_list_signed.xml
[ 2.5005 ]
[ 2.5005 ] Updating smd info
[ 2.5026 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo test.bin
[ 2.5038 ]
[ 2.5038 ] Updating Odmdata
[ 2.5059 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[ 2.5070 ]
[ 2.5070 ] Get encrypted section of bct
[ 2.5091 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 2.5101 ]
[ 2.5101 ] Signing BCT
[ 2.5121 ] Generating signatures with encryption
[ 2.5142 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list bct_list.xml --pubkeyhash pub_key.key
[ 2.5150 ] Key is a SBK key
[ 2.5458 ] Key Size is 16 bytes
[ 2.5459 ] 1920
[ 2.5535 ]
[ 2.5536 ] Updating BCT with signature
[ 2.5559 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[ 2.5570 ]
[ 2.5571 ] Get Signed section of bct
[ 2.5591 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 2.5602 ]
[ 2.5623 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key
[ 2.5631 ] Key size is 256 bytes
[ 2.6092 ] Saving pkc public key in pub_key.key
[ 2.6147 ]
[ 2.6148 ] Updating BCT with signature
[ 2.6170 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[ 2.6182 ]
[ 2.6182 ] Generating coldboot mb1-bct
[ 2.6202 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.6210 ] MB1-BCT version: 0xf
[ 2.6212 ] Copying Sdram info from 1 to 2 set
[ 2.6315 ] Copying Sdram info from 2 to 3 set
[ 2.6317 ] Packing sdram param for instance[0]
[ 2.6319 ] Packing sdram param for instance[1]
[ 2.6320 ] Packing sdram param for instance[2]
[ 2.6322 ] Packing sdram param for instance[3]
[ 2.6324 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 2.6326 ] Appending platform config data of size :- 2280
[ 2.6329 ] Parsing config file :mobile_scr.cfg
[ 2.6330 ] Appending platform config data of size :- 12240
[ 2.6334 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 2.6335 ] Appending platform config data of size :- 24
[ 2.6335 ]
[ 2.6335 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 2.6335 ] Appending platform config data of size :- 508
[ 2.6335 ]
[ 2.6335 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 2.6335 ] Appending platform config data of size :- 64
[ 2.6335 ]
[ 2.6335 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.6335 ] Appending platform config data of size :- 1628
[ 2.6335 ]
[ 2.6336 ] Updating mb1-bct with firmware information
[ 2.6357 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo test.bin
[ 2.6365 ] MB1-BCT version: 0xf
[ 2.6370 ]
[ 2.6370 ] Updating mb1-bct with storage information
[ 2.6391 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo test.bin
[ 2.6398 ] MB1-BCT version: 0xf
[ 2.6404 ]
[ 2.6424 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 2.6433 ]
[ 2.6455 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[ 2.6466 ]
[ 2.6492 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[ 2.6493 ] Key is a SBK key
[ 2.6493 ] Key Size is 16 bytes
[ 2.6497 ] 48768
[ 2.6572 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 2.6582 ]
[ 2.6604 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 2.6612 ]
[ 2.6639 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.6656 ] K[ 2.6659 ] ey size is 256 bytes
[ 2.6815 ] Saving pkc public key in pub_key.key
[ 2.6834 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.signed mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.6845 ]
[ 2.6846 ] Generating recovery mb1-bct
[ 2.6867 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.6875 ] MB1-BCT version: 0xf
[ 2.6877 ] Copying Sdram info from 1 to 2 set
[ 2.6981 ] Copying Sdram info from 2 to 3 set
[ 2.6983 ] Packing sdram param for instance[0]
[ 2.6985 ] Packing sdram param for instance[1]
[ 2.6986 ] Packing sdram param for instance[2]
[ 2.6988 ] Packing sdram param for instance[3]
[ 2.6989 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 2.6992 ] Appending platform config data of size :- 2280
[ 2.6994 ] Parsing config file :minimal_scr.cfg
[ 2.6996 ] Appending platform config data of size :- 12240
[ 2.6999 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 2.7001 ] Appending platform config data of size :- 24
[ 2.7001 ]
[ 2.7001 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 2.7001 ] Appending platform config data of size :- 508
[ 2.7001 ]
[ 2.7001 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 2.7001 ] Appending platform config data of size :- 64
[ 2.7001 ]
[ 2.7001 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.7001 ] Appending platform config data of size :- 1628
[ 2.7001 ]
[ 2.7002 ] Updating mb1-bct with firmware information
[ 2.7023 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo test.bin
[ 2.7030 ] MB1-BCT version: 0xf
[ 2.7036 ]
[ 2.7036 ] Updating mb1-bct with storage information
[ 2.7057 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo test.bin
[ 2.7065 ] MB1-BCT version: 0xf
[ 2.7070 ]
[ 2.7090 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 2.7099 ]
[ 2.7120 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[ 2.7131 ]
[ 2.7157 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_bct_MB1_sigheader.bct_list.xml
[ 2.7158 ] Key is a SBK key
[ 2.7158 ] Key Size is 16 bytes
[ 2.7163 ] 48768
[ 2.7237 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 2.7248 ]
[ 2.7269 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1_sigheader.bct.encrypt
[ 2.7278 ]
[ 2.7304 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[ 2.7320 ] Key [ 2.7323 ] size is 256 bytes
[ 2.7481 ] Saving pkc public key in pub_key.key
[ 2.7501 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt.signed mb1_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 2.7512 ]
[ 2.7513 ] Generating br-bct
[ 2.7534 ] Updating dev and MSS params in BR BCT
[ 2.7535 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[ 2.7648 ]
[ 2.7649 ] Updating bl info
[ 2.7669 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo test.bin
[ 2.7679 ]
[ 2.7680 ] Creating list of images to be signed
[ 2.7701 ] tegrahost_v2 --chip 0x18 --partitionlayout test.bin --list images_list.xml oem-rsa-sbk skip_header
[ 2.7726 ]
[ 2.7727 ] Generating signatures
[ 2.7750 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list images_list.xml --pubkeyhash pub_key.key
[ 2.7767 ] K[ 2.7770 ] ey size is 256 bytes
[ 2.8735 ] Saving pkc public key in pub_key.key
[ 2.8732 ] Copying signatures
[ 2.8754 ] tegrahost_v2 --chip 0x18 0 --partitionlayout test.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[ 2.8795 ]
[ 2.8856 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt.signed.signed
[ 2.8876 ]
[ 2.8914 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt.signed.signed_list.xml --pubkeyhash pub_key.key
[ 2.8945 ] K[ 2.8951 ] ey size is 256 bytes
[ 2.9229 ] Saving pkc public key in pub_key.key
[ 2.9252 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed.signed.signed cboot_sigheader.bin.encrypt.signed.signed.sig oem-rsa --pubkeyhash pub_key.key
[ 2.9266 ]
[ 2.9292 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt.signed.signed
[ 2.9300 ]
[ 2.9327 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt.signed.signed_list.xml --pubkeyhash pub_key.key
[ 2.9345 ] K[ 2.9347 ] ey size is 256 bytes
[ 2.9527 ] Saving pkc public key in pub_key.key
[ 2.9547 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed.signed.signed cboot_sigheader.bin.encrypt.signed.signed.sig oem-rsa --pubkeyhash pub_key.key
[ 2.9562 ]
[ 2.9578 ] Generating br-bct
[ 2.9601 ] Updating dev and MSS params in BR BCT
[ 2.9602 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[ 2.9715 ]
[ 2.9716 ] Updating bl info
[ 2.9737 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo test.bin --updatesig images_list_signed.xml
[ 2.9751 ]
[ 2.9751 ] Updating smd info
[ 2.9772 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo test.bin
[ 2.9783 ]
[ 2.9784 ] Updating Odmdata
[ 2.9804 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[ 2.9816 ]
[ 2.9816 ] Get encrypted section of bct
[ 2.9836 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 2.9848 ]
[ 2.9848 ] Signing BCT
[ 2.9869 ] Generating signatures with encryption
[ 2.9891 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list bct_list.xml --pubkeyhash pub_key.key
[ 2.9900 ] Key is a SBK key
[ 3.0283 ] Key Size is 16 bytes
[ 3.0284 ] 1920
[ 3.0371 ]
[ 3.0371 ] Updating BCT with signature
[ 3.0394 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[ 3.0407 ]
[ 3.0407 ] Get Signed section of bct
[ 3.0428 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 3.0438 ]
[ 3.0459 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key
[ 3.0467 ] Key size is 256 bytes
[ 3.0931 ] Saving pkc public key in pub_key.key
[ 3.0986 ]
[ 3.0986 ] Updating BCT with signature
[ 3.1010 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[ 3.1023 ]
[ 3.1023 ] Generating coldboot mb1-bct
[ 3.1044 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 3.1052 ] MB1-BCT version: 0xf
[ 3.1054 ] Copying Sdram info from 1 to 2 set
[ 3.1157 ] Copying Sdram info from 2 to 3 set
[ 3.1160 ] Packing sdram param for instance[0]
[ 3.1161 ] Packing sdram param for instance[1]
[ 3.1163 ] Packing sdram param for instance[2]
[ 3.1164 ] Packing sdram param for instance[3]
[ 3.1166 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 3.1169 ] Appending platform config data of size :- 2280
[ 3.1173 ] Parsing config file :mobile_scr.cfg
[ 3.1174 ] Appending platform config data of size :- 12240
[ 3.1176 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 3.1179 ] Appending platform config data of size :- 24
[ 3.1179 ]
[ 3.1179 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 3.1179 ] Appending platform config data of size :- 508
[ 3.1179 ]
[ 3.1179 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 3.1179 ] Appending platform config data of size :- 64
[ 3.1179 ]
[ 3.1179 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 3.1179 ] Appending platform config data of size :- 1628
[ 3.1179 ]
[ 3.1179 ] Updating mb1-bct with firmware information
[ 3.1201 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo test.bin
[ 3.1209 ] MB1-BCT version: 0xf
[ 3.1214 ]
[ 3.1214 ] Updating mb1-bct with storage information
[ 3.1235 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo test.bin
[ 3.1242 ] MB1-BCT version: 0xf
[ 3.1248 ]
[ 3.1269 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 3.1277 ]
[ 3.1299 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[ 3.1309 ]
[ 3.1335 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[ 3.1336 ] Key is a SBK key
[ 3.1337 ] Key Size is 16 bytes
[ 3.1341 ] 48768
[ 3.1415 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 3.1425 ]
[ 3.1447 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 3.1455 ]
[ 3.1482 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[ 3.1499 ] K[ 3.1501 ] ey size is 256 bytes
[ 3.1656 ] Saving pkc public key in pub_key.key
[ 3.1677 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.signed mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 3.1688 ]
[ 3.1689 ] Generating recovery mb1-bct
[ 3.1709 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 3.1717 ] MB1-BCT version: 0xf
[ 3.1718 ] Copying Sdram info from 1 to 2 set
[ 3.1823 ] Copying Sdram info from 2 to 3 set
[ 3.1825 ] Packing sdram param for instance[0]
[ 3.1826 ] Packing sdram param for instance[1]
[ 3.1828 ] Packing sdram param for instance[2]
[ 3.1829 ] Packing sdram param for instance[3]
[ 3.1831 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 3.1834 ] Appending platform config data of size :- 2280
[ 3.1836 ] Parsing config file :minimal_scr.cfg
[ 3.1838 ] Appending platform config data of size :- 12240
[ 3.1841 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 3.1842 ] Appending platform config data of size :- 24
[ 3.1842 ]
[ 3.1842 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 3.1842 ] Appending platform config data of size :- 508
[ 3.1842 ]
[ 3.1842 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 3.1842 ] Appending platform config data of size :- 64
[ 3.1842 ]
[ 3.1842 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 3.1842 ] Appending platform config data of size :- 1628
[ 3.1842 ]
[ 3.1843 ] Updating mb1-bct with firmware information
[ 3.1864 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo test.bin
[ 3.1872 ] MB1-BCT version: 0xf
[ 3.1876 ]
[ 3.1876 ] Updating mb1-bct with storage information
[ 3.1898 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo test.bin
[ 3.1905 ] MB1-BCT version: 0xf
[ 3.1910 ]
[ 3.1931 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 3.1939 ]
[ 3.1961 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[ 3.1972 ]
[ 3.1998 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_bct_MB1_sigheader.bct_list.xml
[ 3.1999 ] Key is a SBK key
[ 3.1999 ] Key Size is 16 bytes
[ 3.2003 ] 48768
[ 3.2078 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 3.2090 ]
[ 3.2111 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1_sigheader.bct.encrypt
[ 3.2120 ]
[ 3.2146 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[ 3.2163 ] K[ 3.2166 ] ey size is 256 bytes
[ 3.2323 ] Saving pkc public key in pub_key.key
[ 3.2343 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt.signed mb1_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[ 3.2354 ]
[ 3.2355 ] Copying signatures
[ 3.2377 ] tegrahost_v2 --chip 0x18 0 --partitionlayout test.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[ 3.2411 ]
[ 3.2437 ] nvtboot_recovery_sigheader.bin.encrypt.signed
[ 3.2439 ] preboot_d15_prod_cr.bin
[ 3.2440 ] mce_mts_d15_prod_cr.bin
[ 3.2458 ] tegra186-p3636-0001-p3509-0000-a01.dtb
[ 3.2460 ] bpmp.bin
[ 3.2465 ] tegra186-bpmp-p3636-0001-a00-00.dtb
[ 3.2466 ] tos-trusty.img
[ 3.2470 ] eks.img
[ 3.2471 ] nvtboot_recovery_cpu_sigheader.bin.encrypt.signed
[ 3.2497 ] tegraparser_v2 --generategpt --pt test.bin
[ 3.2510 ]
[ 3.2564 ] tegraparser_v2 --pt test.bin --generateflashindex /work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/encrypted_signed/flash.xml.tmp flash.idx
[ 3.3313 ]
*** Calculating HASH from keyfile /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem ... done
PKC HASH: 0x...
*** Generating fuse configuration ... done.
*** Start preparing fuse configuration ...
*** done.
The command run without error, but the odmfuse_pkc.xml file in fuseblob.tbz2 is strange, it doesn’t contains public key & sbk keys. Only KEK keys inside.
$ tar xf fuseblob.tbz2 -C /tmp/
$ cat /tmp/bootloader/odmfuse_pkc.xml
<genericfuse MagicId="0x45535546" version="1.0.0">
<fuse name="Kek0" size="16" value="xx..." />
<fuse name="Kek1" size="16" value="xx..." />
<fuse name="Kek2" size="16" value="xx..." />
<fuse name="SecurityMode" size="4" value="0x1" />
</genericfuse>
- Does the fuseblob.tbz2 generated correctly?
- Can fuseblob.tbz2 (assumed it is correct) be used for production mass fusing for TX2NX boards?
Thank you.