mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-24 03:53:31 +00:00
ff1dd52024
The csf_spl.txt and csf_fit.txt templates contain file paths which must be edited for the location of your NXP CST generated key files. Streamline the process of signing an image by assigning unique var names to these which can be expended from env variables in the csf.sh script. The following vars are used: SRK_TABLE - full path to SRK_1_2_3_4_table.bin CSF_KEY - full path to the CSF Key CSF1_1_sha256_4096_65537_v3_usr_crt.pem IMG_KEY - full path to the IMG Key IMG1_1_sha256_4096_65537_v3_usr_crt.pem Additionally provide an example of running the csf.sh script. Signed-off-by: Tim Harvey <tharvey@gateworks.com> Reviewed-by: Fabio Estevam <festevam@denx.de> Reviewed-by: Peng Fan <peng.fan@nxp.com>
30 lines
655 B
Text
30 lines
655 B
Text
[Header]
|
|
Version = 4.3
|
|
Hash Algorithm = sha256
|
|
Engine = CAAM
|
|
Engine Configuration = 0
|
|
Certificate Format = X509
|
|
Signature Format = CMS
|
|
|
|
[Install SRK]
|
|
# SRK_TABLE is full path to SRK_1_2_3_4_table.bin
|
|
File = "$SRK_TABLE"
|
|
Source index = 0
|
|
|
|
[Install CSFK]
|
|
# CSF_KEY is full path to CSF1_1_sha256_4096_65537_v3_usr_crt.pem
|
|
File = "$CSF_KEY"
|
|
|
|
[Authenticate CSF]
|
|
|
|
[Install Key]
|
|
Verification index = 0
|
|
Target Index = 2
|
|
# IMG_KEY is full path to IMG1_1_sha256_4096_65537_v3_usr_crt.pem
|
|
File = "$IMG_KEY"
|
|
|
|
[Authenticate Data]
|
|
Verification index = 2
|
|
# FIXME:
|
|
# Line 1 -- fitImage
|
|
Blocks = 0x401fcdc0 0x57c00 0xffff "flash.bin"
|