EKS image and UEFI Payload Encryption #1996
Unanswered
gabrielssanches
asked this question in
Q&A
Replies: 1 comment
-
made a PR on this matter #1997 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
While doing a custom EKB, I could not get it to work until I removed the UEFI payload encryption key, a.k.a sym_t234.key here:
after inspecting recipes-bsp/tegra-binaries/tegra-helper-scripts/tegra-flash-helper.sh it made sense since --uefi-enc is not being handled
I think until that is handled, a better description could be added in the wiki.
something like this:
Generate a Custom EKB
Before replacing the default EKB in your Yocto build, you must generate a custom one that matches OemK1 fuse burned on your Jetson device.
Run the following command:
Where:
oem_k1.key → The OEM_K1 key stored in the OEM_K1 fuse.
sym2_t234.key → The disk encryption key.
auth_t234.key → The UEFI variable authentication key.
eks_t234.img → The generated EKB image to be flashed to the EKS partition of the device.
Beta Was this translation helpful? Give feedback.
All reactions