TX2NX fuse noburn doesn't generate public key in odmfuse_pck.xml

Hi,
I’m fusing TX2NX & JP 4.6.2 with PKC, SBK, KEK0, KEK1, KEK2 keys. I’m preparing the fuseblob (to mass production fuse) using command:

sudo BOARDID=3636 FAB="300" BOARDSKU="0001" ./odmfuse.sh --noburn --auth SBKPKC -i 0x18 -p  -k ${CRE_FOLDER}/secureboot_sign_key/rsa_priv.pem -S ${CRE_FOLDER}/secureboot_sign_key/sbk_key.txt --KEK0 ${CRE_FOLDER}/secureboot_sign_key/kek0.txt --KEK1 ${CRE_FOLDER}/secureboot_sign_key/kek1.txt --KEK2 ${CRE_FOLDER}/secureboot_sign_key/kek2.txt jetson-xavier-nx-devkit-tx2-nx

This is output log

Board ID(3636) version(300) sku(0001) revision()
copying sdram_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg)... done.
copying misc_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg)... done.
copying scr_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying pmc_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-p3636-0001-a00.cfg)... done.
copying pmic_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-p3636-0001-a00.cfg)... done.
copying br_cmd_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg)... done.
copying prod_config(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-p3636-0001-a00.cfg)... done.
copying dev_params(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing mb2_bootloader(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mts_preboot(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts_bootpack(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
copying bootloader_dtb(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb)... done.
Existing bpmp_fw(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpmp_fw_dtb(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/tegra186-bpmp-p3636-0001-a00-00.dtb)... done.
Existing tlk(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eks(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/eks.img) reused.
Existing mb1file(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing spefile(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/spe.bin) reused.
copying tegraboot(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done.
Existing tbcfile(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/cboot.bin) reused.
Existing scefile(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
copying wb0boot(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done.
done.
Existing cfg(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/flash.xml) reused.
Existing bl(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing applet(/work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
./tegraflash.py --sdram_config tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --pmc_config tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic_config tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --br_cmd_config tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod_config tegra186-mb1-bct-prod-p3636-0001-a00.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bootloader_dtb tegra186-p3636-0001-p3509-0000-a01.dtb; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-bpmp-p3636-0001-a00-00.dtb; tlk tos-trusty.img; eks eks.img" --cfg flash.xml --bl nvtboot_recovery_cpu.bin --odmdata 0x2090000 --chip 0x18 --applet mb1_recovery_prod.bin  --key "/CRE_FOLDER/secureboot_sign_key/rsa_priv.pem" --encrypt_key "/CRE_FOLDER/secureboot_sign_key/sbk_key.txt" --cmd "sign" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0071 ] Using default ramcode: 0
[   0.0071 ] Disable BPMP dtb trim, using default dtb
[   0.0071 ] 
[   0.0098 ] tegrasign_v3.py --getmode mode.txt --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem
[   0.0118 ] K[   0.0121 ] ey size is 256 bytes
[   0.0124 ] Generating RCM messages
[   0.0145 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0156 ] RCM 0 is saved as rcm_0.rcm
[   0.0162 ] RCM 1 is saved as rcm_1.rcm
[   0.0162 ] List of rcm files are saved in rcm_list.xml
[   0.0162 ] 
[   0.0162 ] Signing RCM messages
[   0.0186 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0188 ] Key is a SBK key
[   0.0188 ] Key Size is 16 bytes
[   0.0194 ] 160
[   0.0256 ] 114176
[   0.0339 ] Copying signature to RCM mesages
[   0.0362 ] Signing RCM messages
[   0.0386 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0401 ] K[   0.0405 ] ey size is 256 bytes
[   0.0719 ] Saving pkc public key in pub_key.key
[   0.0716 ] Copying signature to RCM mesages
[   0.0738 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key
[   0.0750 ] 
[   0.0750 ] Parsing partition layout
[   0.0771 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0784 ] 
[   0.0784 ] Creating list of images to be signed
[   0.0805 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml oem-rsa-sbk
[   0.1004 ] 
[   0.1004 ] Generating signatures
[   0.1030 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list images_list.xml --pubkeyhash pub_key.key
[   0.1031 ] Key is a SBK key
[   0.1031 ] Key Size is 16 bytes
[   0.1038 ] 99904
...
[   0.4885 ] 192320
[   0.4984 ] Generating br-bct
[   0.5004 ] Updating dev and MSS params in BR BCT
[   0.5004 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.5118 ] 
[   0.5118 ] Updating bl info
[   0.5139 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.5157 ] 
[   0.5158 ] Updating smd info
[   0.5180 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.5192 ] 
[   0.5192 ] Updating Odmdata
[   0.5213 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[   0.5225 ] 
[   0.5225 ] Get encrypted section of bct
[   0.5247 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.5257 ] 
[   0.5257 ] Signing BCT
[   0.5279 ] Generating signatures with encryption
[   0.5300 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list bct_list.xml --pubkeyhash pub_key.key
[   0.5308 ] Key is a SBK key
[   0.5617 ] Key Size is 16 bytes
[   0.5618 ] 1920
[   0.5694 ] 
[   0.5694 ] Updating BCT with signature
[   0.5718 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   0.5730 ] 
[   0.5730 ] Get Signed section of bct
[   0.5751 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.5761 ] 
[   0.5783 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key
[   0.5791 ] Key size is 256 bytes
[   0.6249 ] Saving pkc public key in pub_key.key
[   0.6304 ] 
[   0.6304 ] Updating BCT with signature
[   0.6328 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   0.6340 ] 
[   0.6340 ] Generating coldboot mb1-bct
[   0.6361 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   0.6369 ] MB1-BCT version: 0xf
[   0.6370 ] Copying Sdram info from 1 to 2 set
[   0.6474 ] Copying Sdram info from 2 to 3 set
[   0.6476 ] Packing sdram param for instance[0]
[   0.6478 ] Packing sdram param for instance[1]
[   0.6480 ] Packing sdram param for instance[2]
[   0.6481 ] Packing sdram param for instance[3]

[   0.6483 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   0.6487 ] Appending platform config data of size :- 2280

[   0.6489 ] Parsing config file :mobile_scr.cfg 
[   0.6490 ] Appending platform config data of size :- 12240

[   0.6493 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   0.6495 ] Appending platform config data of size :- 24
[   0.6495 ] 
[   0.6495 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   0.6495 ] Appending platform config data of size :- 508
[   0.6495 ] 
[   0.6495 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   0.6495 ] Appending platform config data of size :- 64
[   0.6495 ] 
[   0.6495 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   0.6495 ] Appending platform config data of size :- 1628
[   0.6495 ] 
[   0.6495 ] Updating mb1-bct with firmware information
[   0.6516 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.6524 ] MB1-BCT version: 0xf
[   0.6529 ] 
[   0.6529 ] Updating mb1-bct with storage information
[   0.6550 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.6558 ] MB1-BCT version: 0xf
[   0.6563 ] 
[   0.6585 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   0.6593 ] 
[   0.6615 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[   0.6625 ] 
[   0.6651 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   0.6652 ] Key is a SBK key
[   0.6652 ] Key Size is 16 bytes
[   0.6656 ] 48768
[   0.6733 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.6743 ] 
[   0.6765 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[   0.6773 ] 
[   0.6799 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[   0.6817 ] Ke[   0.6820 ] y size is 256 bytes
[   0.6977 ] Saving pkc public key in pub_key.key
[   0.6997 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.signed mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   0.7008 ] 
[   0.7009 ] Generating recovery mb1-bct
[   0.7030 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   0.7038 ] MB1-BCT version: 0xf
[   0.7041 ] Copying Sdram info from 1 to 2 set
[   0.7144 ] Copying Sdram info from 2 to 3 set
[   0.7146 ] Packing sdram param for instance[0]
[   0.7147 ] Packing sdram param for instance[1]
[   0.7149 ] Packing sdram param for instance[2]
[   0.7151 ] Packing sdram param for instance[3]

[   0.7153 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   0.7156 ] Appending platform config data of size :- 2280

[   0.7158 ] Parsing config file :minimal_scr.cfg 
[   0.7160 ] Appending platform config data of size :- 12240

[   0.7162 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   0.7164 ] Appending platform config data of size :- 24
[   0.7164 ] 
[   0.7164 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   0.7164 ] Appending platform config data of size :- 508
[   0.7164 ] 
[   0.7164 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   0.7164 ] Appending platform config data of size :- 64
[   0.7164 ] 
[   0.7164 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   0.7164 ] Appending platform config data of size :- 1628
[   0.7164 ] 
[   0.7164 ] Updating mb1-bct with firmware information
[   0.7186 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.7194 ] MB1-BCT version: 0xf
[   0.7198 ] 
[   0.7198 ] Updating mb1-bct with storage information
[   0.7220 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.7227 ] MB1-BCT version: 0xf
[   0.7232 ] 
[   0.7254 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   0.7262 ] 
[   0.7283 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[   0.7294 ] 
[   0.7320 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_bct_MB1_sigheader.bct_list.xml
[   0.7321 ] Key is a SBK key
[   0.7321 ] Key Size is 16 bytes
[   0.7325 ] 48768
[   0.7401 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.7411 ] 
[   0.7433 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1_sigheader.bct.encrypt
[   0.7442 ] 
[   0.7469 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[   0.7485 ] Key [   0.7489 ] size is 256 bytes
[   0.7645 ] Saving pkc public key in pub_key.key
[   0.7666 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt.signed mb1_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   0.7676 ] 
[   0.7677 ] Generating br-bct
[   0.7699 ] Updating dev and MSS params in BR BCT
[   0.7699 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.7813 ] 
[   0.7814 ] Updating bl info
[   0.7835 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin
[   0.7846 ] 
[   0.7846 ] Parsing partition layout
[   0.7868 ] tegraparser_v2 --pt flash.xml.tmp
[   0.7882 ] 
[   0.7882 ] Creating list of images to be signed
[   0.7903 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml oem-rsa-sbk
[   0.8484 ] 
[   0.8485 ] Generating signatures
[   0.8545 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list images_list.xml --pubkeyhash pub_key.key
[   0.8549 ] Key is a SBK key
[   0.8550 ] Key Size is 16 bytes
[   0.8583 ] 99904
...
[   1.3139 ] 192320
[   1.3237 ] Copying signatures
[   1.3259 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[   1.4051 ] 
[   1.4109 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery.bin
[   1.4150 ] 
[   1.4205 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin oem-rsa-sbk --chip 0x18 0
[   1.4257 ] 
[   1.4325 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list nvtboot_recovery_sigheader.bin_list.xml
[   1.4329 ] Key is a SBK key
[   1.4329 ] Key Size is 16 bytes
[   1.4350 ] 121872
[   1.4749 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt nvtboot_recovery_sigheader.bin.hash zerosbk
[   1.4800 ] 
[   1.4857 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_sigheader.bin.encrypt
[   1.4898 ] 
[   1.4960 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_recovery_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.5006 ] Ke[   1.5013 ] y size is 256 bytes
[   1.5290 ] Saving pkc public key in pub_key.key
[   1.5312 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt.signed nvtboot_recovery_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.5326 ] 
[   1.5350 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu.bin
[   1.5359 ] 
[   1.5381 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin oem-rsa-sbk --chip 0x18 0
[   1.5395 ] 
[   1.5422 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list nvtboot_recovery_cpu_sigheader.bin_list.xml
[   1.5423 ] Key is a SBK key
[   1.5423 ] Key Size is 16 bytes
[   1.5429 ] 224768
[   1.5556 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   1.5570 ] 
[   1.5591 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu_sigheader.bin.encrypt
[   1.5601 ] 
[   1.5628 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_recovery_cpu_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.5646 ] Key [   1.5649 ] size is 256 bytes
[   1.5831 ] Saving pkc public key in pub_key.key
[   1.5853 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt.signed nvtboot_recovery_cpu_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.5866 ] 
[   1.5867 ] Copying signed file in /work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/encrypted_signed
[   1.5903 ] tegrahost_v2 --chip 0x18 --align spe_sigheader.bin.encrypt
[   1.5913 ] 
[   1.5940 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list spe_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.5957 ] K[   1.5961 ] ey size is 256 bytes
[   1.6130 ] Saving pkc public key in pub_key.key
[   1.6151 ] tegrahost_v2 --chip 0x18 0 --updatesigheader spe_sigheader.bin.encrypt.signed spe_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.6164 ] 
[   1.6189 ] tegrahost_v2 --chip 0x18 --align spe_sigheader.bin.encrypt
[   1.6198 ] 
[   1.6226 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list spe_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.6244 ] K[   1.6247 ] ey size is 256 bytes
[   1.6414 ] Saving pkc public key in pub_key.key
[   1.6435 ] tegrahost_v2 --chip 0x18 0 --updatesigheader spe_sigheader.bin.encrypt.signed spe_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.6447 ] 
[   1.6470 ] tegrahost_v2 --chip 0x18 --align nvtboot_sigheader.bin.encrypt
[   1.6479 ] 
[   1.6505 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.6523 ] K[   1.6526 ] ey size is 256 bytes
[   1.6688 ] Saving pkc public key in pub_key.key
[   1.6708 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_sigheader.bin.encrypt.signed nvtboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.6720 ] 
[   1.6744 ] tegrahost_v2 --chip 0x18 --align nvtboot_sigheader.bin.encrypt
[   1.6752 ] 
[   1.6779 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list nvtboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.6796 ] K[   1.6799 ] ey size is 256 bytes
[   1.6964 ] Saving pkc public key in pub_key.key
[   1.6984 ] tegrahost_v2 --chip 0x18 0 --updatesigheader nvtboot_sigheader.bin.encrypt.signed nvtboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.6996 ] 
[   1.7020 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr_sigheader.bin.encrypt
[   1.7029 ] 
[   1.7055 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list preboot_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.7073 ] K[   1.7076 ] ey size is 256 bytes
[   1.7231 ] Saving pkc public key in pub_key.key
[   1.7253 ] tegrahost_v2 --chip 0x18 0 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt.signed preboot_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.7263 ] 
[   1.7287 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr_sigheader.bin.encrypt
[   1.7295 ] 
[   1.7322 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list preboot_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.7342 ] K[   1.7345 ] ey size is 256 bytes
[   1.7503 ] Saving pkc public key in pub_key.key
[   1.7524 ] tegrahost_v2 --chip 0x18 0 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt.signed preboot_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.7535 ] 
[   1.7558 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr_sigheader.bin.encrypt
[   1.7568 ] 
[   1.7594 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mce_mts_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.7611 ] K[   1.7614 ] ey size is 256 bytes
[   1.7973 ] Saving pkc public key in pub_key.key
[   1.7994 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt.signed mce_mts_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.8034 ] 
[   1.8075 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr_sigheader.bin.encrypt
[   1.8084 ] 
[   1.8111 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mce_mts_d15_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.8129 ] K[   1.8132 ] ey size is 256 bytes
[   1.8508 ] Saving pkc public key in pub_key.key
[   1.8531 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt.signed mce_mts_d15_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.8572 ] 
[   1.8615 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt
[   1.8624 ] 
[   1.8650 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.8667 ] K[   1.8670 ] ey size is 256 bytes
[   1.8996 ] Saving pkc public key in pub_key.key
[   1.9055 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed cboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.9114 ] 
[   1.9188 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt
[   1.9227 ] 
[   1.9295 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   1.9369 ] K[   1.9381 ] ey size is 256 bytes
[   1.9750 ] Saving pkc public key in pub_key.key
[   1.9773 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed cboot_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   1.9894 ] 
[   1.9923 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[   1.9935 ] 
[   1.9966 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[   1.9987 ] Ke[   1.9991 ] y size is 256 bytes
[   2.0180 ] Saving pkc public key in pub_key.key
[   2.0206 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.0220 ] 
[   2.0249 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[   2.0261 ] 
[   2.0290 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[   2.0310 ] Ke[   2.0313 ] y size is 256 bytes
[   2.0501 ] Saving pkc public key in pub_key.key
[   2.0522 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.0534 ] 
[   2.0559 ] tegrahost_v2 --chip 0x18 --align tos-trusty_sigheader.img.encrypt
[   2.0567 ] 
[   2.0594 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tos-trusty_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.0611 ] K[   2.0614 ] ey size is 256 bytes
[   2.0803 ] Saving pkc public key in pub_key.key
[   2.0825 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tos-trusty_sigheader.img.encrypt.signed tos-trusty_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.0841 ] 
[   2.0868 ] tegrahost_v2 --chip 0x18 --align tos-trusty_sigheader.img.encrypt
[   2.0876 ] 
[   2.0903 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tos-trusty_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.0921 ] K[   2.0924 ] ey size is 256 bytes
[   2.1111 ] Saving pkc public key in pub_key.key
[   2.1132 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tos-trusty_sigheader.img.encrypt.signed tos-trusty_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.1147 ] 
[   2.1173 ] tegrahost_v2 --chip 0x18 --align eks_sigheader.img.encrypt
[   2.1182 ] 
[   2.1208 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.1224 ] K[   2.1227 ] ey size is 256 bytes
[   2.1378 ] Saving pkc public key in pub_key.key
[   2.1398 ] tegrahost_v2 --chip 0x18 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.1409 ] 
[   2.1432 ] tegrahost_v2 --chip 0x18 --align adsp-fw_sigheader.bin.encrypt
[   2.1441 ] 
[   2.1467 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   2.1484 ] K[   2.1487 ] ey size is 256 bytes
[   2.1644 ] Saving pkc public key in pub_key.key
[   2.1663 ] tegrahost_v2 --chip 0x18 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.1675 ] 
[   2.1703 ] tegrahost_v2 --chip 0x18 --align adsp-fw_sigheader.bin.encrypt
[   2.1712 ] 
[   2.1739 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   2.1755 ] K[   2.1758 ] ey size is 256 bytes
[   2.1916 ] Saving pkc public key in pub_key.key
[   2.1938 ] tegrahost_v2 --chip 0x18 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.1949 ] 
[   2.1972 ] tegrahost_v2 --chip 0x18 --align bpmp_sigheader.bin.encrypt
[   2.1981 ] 
[   2.2007 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bpmp_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   2.2024 ] K[   2.2027 ] ey size is 256 bytes
[   2.2223 ] Saving pkc public key in pub_key.key
[   2.2244 ] tegrahost_v2 --chip 0x18 0 --updatesigheader bpmp_sigheader.bin.encrypt.signed bpmp_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.2261 ] 
[   2.2288 ] tegrahost_v2 --chip 0x18 --align bpmp_sigheader.bin.encrypt
[   2.2296 ] 
[   2.2323 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bpmp_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key
[   2.2341 ] K[   2.2344 ] ey size is 256 bytes
[   2.2543 ] Saving pkc public key in pub_key.key
[   2.2563 ] tegrahost_v2 --chip 0x18 0 --updatesigheader bpmp_sigheader.bin.encrypt.signed bpmp_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.2579 ] 
[   2.2606 ] tegrahost_v2 --chip 0x18 --align tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt
[   2.2615 ] 
[   2.2641 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[   2.2658 ] K[   2.2661 ] ey size is 256 bytes
[   2.2821 ] Saving pkc public key in pub_key.key
[   2.2840 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.signed tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.2851 ] 
[   2.2875 ] tegrahost_v2 --chip 0x18 --align tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt
[   2.2884 ] 
[   2.2911 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[   2.2928 ] Key [   2.2931 ] size is 256 bytes
[   2.3091 ] Saving pkc public key in pub_key.key
[   2.3111 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.signed tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.3123 ] 
[   2.3147 ] tegrahost_v2 --chip 0x18 --align camera-rtcpu-sce_sigheader.img.encrypt
[   2.3156 ] 
[   2.3183 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list camera-rtcpu-sce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.3200 ] K[   2.3204 ] ey size is 256 bytes
[   2.3365 ] Saving pkc public key in pub_key.key
[   2.3385 ] tegrahost_v2 --chip 0x18 0 --updatesigheader camera-rtcpu-sce_sigheader.img.encrypt.signed camera-rtcpu-sce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.3396 ] 
[   2.3421 ] tegrahost_v2 --chip 0x18 --align camera-rtcpu-sce_sigheader.img.encrypt
[   2.3430 ] 
[   2.3456 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list camera-rtcpu-sce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.3473 ] Key[   2.3476 ]  size is 256 bytes
[   2.3638 ] Saving pkc public key in pub_key.key
[   2.3659 ] tegrahost_v2 --chip 0x18 0 --updatesigheader camera-rtcpu-sce_sigheader.img.encrypt.signed camera-rtcpu-sce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.3670 ] 
[   2.3700 ] tegrahost_v2 --chip 0x18 --align boot_sigheader.img.encrypt
[   2.3708 ] 
[   2.3734 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.3752 ] K[   2.3755 ] ey size is 256 bytes
[   2.3904 ] Saving pkc public key in pub_key.key
[   2.3924 ] tegrahost_v2 --chip 0x18 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.3934 ] 
[   2.3957 ] tegrahost_v2 --chip 0x18 --align boot_sigheader.img.encrypt
[   2.3966 ] 
[   2.3993 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key
[   2.4012 ] K[   2.4015 ] ey size is 256 bytes
[   2.4165 ] Saving pkc public key in pub_key.key
[   2.4186 ] tegrahost_v2 --chip 0x18 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.4196 ] 
[   2.4219 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[   2.4228 ] 
[   2.4254 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[   2.4270 ] K[   2.4273 ] ey size is 256 bytes
[   2.4442 ] Saving pkc public key in pub_key.key
[   2.4463 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.4475 ] 
[   2.4499 ] tegrahost_v2 --chip 0x18 --align tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
[   2.4508 ] 
[   2.4535 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key
[   2.4551 ] K[   2.4554 ] ey size is 256 bytes
[   2.4722 ] Saving pkc public key in pub_key.key
[   2.4743 ] tegrahost_v2 --chip 0x18 0 --updatesigheader tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.signed tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.4755 ] 
[   2.4797 ] Parsing partition layout
[   2.4818 ] tegraparser_v2 --pt test.xml
[   2.4831 ] 
[   2.4831 ] Generating br-bct
[   2.4852 ] Updating dev and MSS params in BR BCT
[   2.4853 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[   2.4967 ] 
[   2.4967 ] Updating bl info
[   2.4988 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo test.bin --updatesig images_list_signed.xml
[   2.5005 ] 
[   2.5005 ] Updating smd info
[   2.5026 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo test.bin
[   2.5038 ] 
[   2.5038 ] Updating Odmdata
[   2.5059 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[   2.5070 ] 
[   2.5070 ] Get encrypted section of bct
[   2.5091 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   2.5101 ] 
[   2.5101 ] Signing BCT
[   2.5121 ] Generating signatures with encryption
[   2.5142 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list bct_list.xml --pubkeyhash pub_key.key
[   2.5150 ] Key is a SBK key
[   2.5458 ] Key Size is 16 bytes
[   2.5459 ] 1920
[   2.5535 ] 
[   2.5536 ] Updating BCT with signature
[   2.5559 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   2.5570 ] 
[   2.5571 ] Get Signed section of bct
[   2.5591 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   2.5602 ] 
[   2.5623 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key
[   2.5631 ] Key size is 256 bytes
[   2.6092 ] Saving pkc public key in pub_key.key
[   2.6147 ] 
[   2.6148 ] Updating BCT with signature
[   2.6170 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   2.6182 ] 
[   2.6182 ] Generating coldboot mb1-bct
[   2.6202 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   2.6210 ] MB1-BCT version: 0xf
[   2.6212 ] Copying Sdram info from 1 to 2 set
[   2.6315 ] Copying Sdram info from 2 to 3 set
[   2.6317 ] Packing sdram param for instance[0]
[   2.6319 ] Packing sdram param for instance[1]
[   2.6320 ] Packing sdram param for instance[2]
[   2.6322 ] Packing sdram param for instance[3]

[   2.6324 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   2.6326 ] Appending platform config data of size :- 2280

[   2.6329 ] Parsing config file :mobile_scr.cfg 
[   2.6330 ] Appending platform config data of size :- 12240

[   2.6334 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   2.6335 ] Appending platform config data of size :- 24
[   2.6335 ] 
[   2.6335 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   2.6335 ] Appending platform config data of size :- 508
[   2.6335 ] 
[   2.6335 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   2.6335 ] Appending platform config data of size :- 64
[   2.6335 ] 
[   2.6335 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   2.6335 ] Appending platform config data of size :- 1628
[   2.6335 ] 
[   2.6336 ] Updating mb1-bct with firmware information
[   2.6357 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo test.bin
[   2.6365 ] MB1-BCT version: 0xf
[   2.6370 ] 
[   2.6370 ] Updating mb1-bct with storage information
[   2.6391 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo test.bin
[   2.6398 ] MB1-BCT version: 0xf
[   2.6404 ] 
[   2.6424 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   2.6433 ] 
[   2.6455 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[   2.6466 ] 
[   2.6492 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   2.6493 ] Key is a SBK key
[   2.6493 ] Key Size is 16 bytes
[   2.6497 ] 48768
[   2.6572 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   2.6582 ] 
[   2.6604 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[   2.6612 ] 
[   2.6639 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[   2.6656 ] K[   2.6659 ] ey size is 256 bytes
[   2.6815 ] Saving pkc public key in pub_key.key
[   2.6834 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.signed mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.6845 ] 
[   2.6846 ] Generating recovery mb1-bct
[   2.6867 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   2.6875 ] MB1-BCT version: 0xf
[   2.6877 ] Copying Sdram info from 1 to 2 set
[   2.6981 ] Copying Sdram info from 2 to 3 set
[   2.6983 ] Packing sdram param for instance[0]
[   2.6985 ] Packing sdram param for instance[1]
[   2.6986 ] Packing sdram param for instance[2]
[   2.6988 ] Packing sdram param for instance[3]

[   2.6989 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   2.6992 ] Appending platform config data of size :- 2280

[   2.6994 ] Parsing config file :minimal_scr.cfg 
[   2.6996 ] Appending platform config data of size :- 12240

[   2.6999 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   2.7001 ] Appending platform config data of size :- 24
[   2.7001 ] 
[   2.7001 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   2.7001 ] Appending platform config data of size :- 508
[   2.7001 ] 
[   2.7001 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   2.7001 ] Appending platform config data of size :- 64
[   2.7001 ] 
[   2.7001 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   2.7001 ] Appending platform config data of size :- 1628
[   2.7001 ] 
[   2.7002 ] Updating mb1-bct with firmware information
[   2.7023 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo test.bin
[   2.7030 ] MB1-BCT version: 0xf
[   2.7036 ] 
[   2.7036 ] Updating mb1-bct with storage information
[   2.7057 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo test.bin
[   2.7065 ] MB1-BCT version: 0xf
[   2.7070 ] 
[   2.7090 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   2.7099 ] 
[   2.7120 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[   2.7131 ] 
[   2.7157 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_bct_MB1_sigheader.bct_list.xml
[   2.7158 ] Key is a SBK key
[   2.7158 ] Key Size is 16 bytes
[   2.7163 ] 48768
[   2.7237 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   2.7248 ] 
[   2.7269 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1_sigheader.bct.encrypt
[   2.7278 ] 
[   2.7304 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[   2.7320 ] Key [   2.7323 ] size is 256 bytes
[   2.7481 ] Saving pkc public key in pub_key.key
[   2.7501 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt.signed mb1_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   2.7512 ] 
[   2.7513 ] Generating br-bct
[   2.7534 ] Updating dev and MSS params in BR BCT
[   2.7535 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[   2.7648 ] 
[   2.7649 ] Updating bl info
[   2.7669 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo test.bin
[   2.7679 ] 
[   2.7680 ] Creating list of images to be signed
[   2.7701 ] tegrahost_v2 --chip 0x18 --partitionlayout test.bin --list images_list.xml oem-rsa-sbk skip_header
[   2.7726 ] 
[   2.7727 ] Generating signatures
[   2.7750 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list images_list.xml --pubkeyhash pub_key.key
[   2.7767 ] K[   2.7770 ] ey size is 256 bytes
[   2.8735 ] Saving pkc public key in pub_key.key
[   2.8732 ] Copying signatures
[   2.8754 ] tegrahost_v2 --chip 0x18 0 --partitionlayout test.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[   2.8795 ] 
[   2.8856 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt.signed.signed
[   2.8876 ] 
[   2.8914 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt.signed.signed_list.xml --pubkeyhash pub_key.key
[   2.8945 ] K[   2.8951 ] ey size is 256 bytes
[   2.9229 ] Saving pkc public key in pub_key.key
[   2.9252 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed.signed.signed cboot_sigheader.bin.encrypt.signed.signed.sig oem-rsa --pubkeyhash pub_key.key
[   2.9266 ] 
[   2.9292 ] tegrahost_v2 --chip 0x18 --align cboot_sigheader.bin.encrypt.signed.signed
[   2.9300 ] 
[   2.9327 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list cboot_sigheader.bin.encrypt.signed.signed_list.xml --pubkeyhash pub_key.key
[   2.9345 ] K[   2.9347 ] ey size is 256 bytes
[   2.9527 ] Saving pkc public key in pub_key.key
[   2.9547 ] tegrahost_v2 --chip 0x18 0 --updatesigheader cboot_sigheader.bin.encrypt.signed.signed.signed cboot_sigheader.bin.encrypt.signed.signed.sig oem-rsa --pubkeyhash pub_key.key
[   2.9562 ] 
[   2.9578 ] Generating br-bct
[   2.9601 ] Updating dev and MSS params in BR BCT
[   2.9602 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[   2.9715 ] 
[   2.9716 ] Updating bl info
[   2.9737 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo test.bin --updatesig images_list_signed.xml
[   2.9751 ] 
[   2.9751 ] Updating smd info
[   2.9772 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo test.bin
[   2.9783 ] 
[   2.9784 ] Updating Odmdata
[   2.9804 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[   2.9816 ] 
[   2.9816 ] Get encrypted section of bct
[   2.9836 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   2.9848 ] 
[   2.9848 ] Signing BCT
[   2.9869 ] Generating signatures with encryption
[   2.9891 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list bct_list.xml --pubkeyhash pub_key.key
[   2.9900 ] Key is a SBK key
[   3.0283 ] Key Size is 16 bytes
[   3.0284 ] 1920
[   3.0371 ] 
[   3.0371 ] Updating BCT with signature
[   3.0394 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   3.0407 ] 
[   3.0407 ] Get Signed section of bct
[   3.0428 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   3.0438 ] 
[   3.0459 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key
[   3.0467 ] Key size is 256 bytes
[   3.0931 ] Saving pkc public key in pub_key.key
[   3.0986 ] 
[   3.0986 ] Updating BCT with signature
[   3.1010 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   3.1023 ] 
[   3.1023 ] Generating coldboot mb1-bct
[   3.1044 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   3.1052 ] MB1-BCT version: 0xf
[   3.1054 ] Copying Sdram info from 1 to 2 set
[   3.1157 ] Copying Sdram info from 2 to 3 set
[   3.1160 ] Packing sdram param for instance[0]
[   3.1161 ] Packing sdram param for instance[1]
[   3.1163 ] Packing sdram param for instance[2]
[   3.1164 ] Packing sdram param for instance[3]

[   3.1166 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   3.1169 ] Appending platform config data of size :- 2280

[   3.1173 ] Parsing config file :mobile_scr.cfg 
[   3.1174 ] Appending platform config data of size :- 12240

[   3.1176 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   3.1179 ] Appending platform config data of size :- 24
[   3.1179 ] 
[   3.1179 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   3.1179 ] Appending platform config data of size :- 508
[   3.1179 ] 
[   3.1179 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   3.1179 ] Appending platform config data of size :- 64
[   3.1179 ] 
[   3.1179 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   3.1179 ] Appending platform config data of size :- 1628
[   3.1179 ] 
[   3.1179 ] Updating mb1-bct with firmware information
[   3.1201 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo test.bin
[   3.1209 ] MB1-BCT version: 0xf
[   3.1214 ] 
[   3.1214 ] Updating mb1-bct with storage information
[   3.1235 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo test.bin
[   3.1242 ] MB1-BCT version: 0xf
[   3.1248 ] 
[   3.1269 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   3.1277 ] 
[   3.1299 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[   3.1309 ] 
[   3.1335 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   3.1336 ] Key is a SBK key
[   3.1337 ] Key Size is 16 bytes
[   3.1341 ] 48768
[   3.1415 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   3.1425 ] 
[   3.1447 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[   3.1455 ] 
[   3.1482 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[   3.1499 ] K[   3.1501 ] ey size is 256 bytes
[   3.1656 ] Saving pkc public key in pub_key.key
[   3.1677 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.signed mb1_cold_boot_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   3.1688 ] 
[   3.1689 ] Generating recovery mb1-bct
[   3.1709 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   3.1717 ] MB1-BCT version: 0xf
[   3.1718 ] Copying Sdram info from 1 to 2 set
[   3.1823 ] Copying Sdram info from 2 to 3 set
[   3.1825 ] Packing sdram param for instance[0]
[   3.1826 ] Packing sdram param for instance[1]
[   3.1828 ] Packing sdram param for instance[2]
[   3.1829 ] Packing sdram param for instance[3]

[   3.1831 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   3.1834 ] Appending platform config data of size :- 2280

[   3.1836 ] Parsing config file :minimal_scr.cfg 
[   3.1838 ] Appending platform config data of size :- 12240

[   3.1841 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   3.1842 ] Appending platform config data of size :- 24
[   3.1842 ] 
[   3.1842 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   3.1842 ] Appending platform config data of size :- 508
[   3.1842 ] 
[   3.1842 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   3.1842 ] Appending platform config data of size :- 64
[   3.1842 ] 
[   3.1842 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   3.1842 ] Appending platform config data of size :- 1628
[   3.1842 ] 
[   3.1843 ] Updating mb1-bct with firmware information
[   3.1864 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo test.bin
[   3.1872 ] MB1-BCT version: 0xf
[   3.1876 ] 
[   3.1876 ] Updating mb1-bct with storage information
[   3.1898 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo test.bin
[   3.1905 ] MB1-BCT version: 0xf
[   3.1910 ] 
[   3.1931 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   3.1939 ] 
[   3.1961 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa-sbk --chip 0x18 0
[   3.1972 ] 
[   3.1998 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/sbk_key.txt --list mb1_bct_MB1_sigheader.bct_list.xml
[   3.1999 ] Key is a SBK key
[   3.1999 ] Key Size is 16 bytes
[   3.2003 ] 48768
[   3.2078 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   3.2090 ] 
[   3.2111 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1_sigheader.bct.encrypt
[   3.2120 ] 
[   3.2146 ] tegrasign_v3.py --key /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct.encrypt_list.xml --pubkeyhash pub_key.key
[   3.2163 ] K[   3.2166 ] ey size is 256 bytes
[   3.2323 ] Saving pkc public key in pub_key.key
[   3.2343 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt.signed mb1_bct_MB1_sigheader.bct.encrypt.sig oem-rsa --pubkeyhash pub_key.key
[   3.2354 ] 
[   3.2355 ] Copying signatures
[   3.2377 ] tegrahost_v2 --chip 0x18 0 --partitionlayout test.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[   3.2411 ] 
[   3.2437 ] nvtboot_recovery_sigheader.bin.encrypt.signed
[   3.2439 ] preboot_d15_prod_cr.bin
[   3.2440 ] mce_mts_d15_prod_cr.bin
[   3.2458 ] tegra186-p3636-0001-p3509-0000-a01.dtb
[   3.2460 ] bpmp.bin
[   3.2465 ] tegra186-bpmp-p3636-0001-a00-00.dtb
[   3.2466 ] tos-trusty.img
[   3.2470 ] eks.img
[   3.2471 ] nvtboot_recovery_cpu_sigheader.bin.encrypt.signed
[   3.2497 ] tegraparser_v2 --generategpt --pt test.bin
[   3.2510 ] 
[   3.2564 ] tegraparser_v2 --pt test.bin --generateflashindex /work/works/tools/nvidia_sdk/sdk/JetPack_4.6.2_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra/bootloader/encrypted_signed/flash.xml.tmp flash.idx
[   3.3313 ] 
*** Calculating HASH from keyfile /CRE_FOLDER/secureboot_sign_key/rsa_priv.pem ... done
PKC HASH: 0x...
*** Generating fuse configuration ... done.
*** Start preparing fuse configuration ... 
*** done.

The command run without error, but the odmfuse_pkc.xml file in fuseblob.tbz2 is strange, it doesn’t contains public key & sbk keys. Only KEK keys inside.

$ tar xf fuseblob.tbz2 -C /tmp/
$ cat /tmp/bootloader/odmfuse_pkc.xml 
<genericfuse MagicId="0x45535546" version="1.0.0">
<fuse name="Kek0" size="16" value="xx..." />
<fuse name="Kek1" size="16" value="xx..." />
<fuse name="Kek2" size="16" value="xx..." />
<fuse name="SecurityMode" size="4" value="0x1" />
</genericfuse>
  1. Does the fuseblob.tbz2 generated correctly?
  2. Can fuseblob.tbz2 (assumed it is correct) be used for production mass fusing for TX2NX boards?

Thank you.

hello HnilND,

this --auth option it only needed in offline mode, it’s indicating the current fuse status of the board. there’re three options need to enabled all together for the offline approach, (a) board info, (b) --noburn, (c) --auth.
here’re authentication types,
(1) NS – No authentication,
(2) PKC - PKC is enabled,
(3) SBKPKC - both SBK and PKC are enabled.

so…
you’re using incorrect commands if that’s your 1st time to program the fuse.
please revise the command as… --auth NS since this board haven’t fused.

Thank you Jerry. That is clear. I’m using wrong --auth option.

About my question #2, the fuseblob.tbz2 can be used for mass production fusing? Thank you.

yes.

1 Like

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.