$ sudo BOARDID=3668 BOARDSKU=0000 FAB=100 BOARDREV= CHIPREV=2 ./tegra194-flash-helper.sh flash_l4t_tegra194_spi_sd_p3668_avo.xml p3668-carriersku.dtb tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg 0xB8190000 boot.img rootfs.img -u ${PWD}/../pkc.key -v ${PWD}/../sbk.key /tegraflash.py --chip 0x19 --key /../pkc.key --encrypt_key /null_user_key.txt --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign boot.img Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0003 ] Generating signature [ 0.0023 ] tegrasign_v3.py --getmode mode.txt --key ${KEYS_DIR}/pkc.key [ 0.0036 ] K [ 0.0038 ] ey size is 256 bytes [ 0.0060 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key ${KEYS_DIR}/pkc.key [ 0.0075 ] K [ 0.0077 ] ey size is 256 bytes [ 0.0077 ] Generating ratchet blob [ 0.0095 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0101 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0103 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0103 ] [ 0.0103 ] /signed_bootimg_dir/boot.img size is less than header size (400) [ 0.0104 ] Encrypting file [ 0.0121 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0129 ] [ 0.0130 ] 1_boot.img size is less than header size (400) [ 0.0152 ] tegrasign_v3.py --key /null_user_key.txt --list 1_boot.img_list.xml [ 0.0153 ] Key is a SBK key [ 0.0153 ] Key Size is 16 bytes [ 0.0190 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 0.0197 ] [ 0.0215 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 0.0222 ] [ 0.0222 ] 1_boot.img.encrypt size is less than header size (400) [ 0.0239 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.0246 ] adding BCH for 1_boot.img.encrypt [ 0.0247 ] [ 0.0268 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list 1_boot.img_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0281 ] K [ 0.0283 ] ey size is 256 bytes [ 0.0384 ] Saving pkc public key in pub_key.key [ 0.0402 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0411 ] [ 0.0412 ] Signed and encrypted file: /signed_bootimg_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x0 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /signed_bootimg_dir/boot_sigheader.img.encrypt.signed /tegraflash.py --chip 0x19 --key /../pkc.key --encrypt_key ${KEYS_DIR}/flash-x/null_user_key.txt --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign kernel_p3668-carriersku.dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0004 ] Generating signature [ 0.0023 ] tegrasign_v3.py --getmode mode.txt --key ${KEYS_DIR}/pkc.key [ 0.0037 ] K [ 0.0039 ] ey size is 256 bytes [ 0.0061 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key ${KEYS_DIR}/pkc.key [ 0.0074 ] K [ 0.0076 ] ey size is 256 bytes [ 0.0076 ] Generating ratchet blob [ 0.0093 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0100 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0102 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0102 ] [ 0.0102 ] header_magic: d00dfeed [ 0.0103 ] Encrypting file [ 0.0121 ] tegrahost_v2 --chip 0x19 --align 1_kernel_p3668-carriersku.dtb [ 0.0128 ] [ 0.0128 ] header_magic: d00dfeed [ 0.0150 ] tegrasign_v3.py --key /null_user_key.txt --list 1_kernel_p3668-carriersku.dtb_list.xml [ 0.0151 ] Key is a SBK key [ 0.0151 ] Key Size is 16 bytes [ 0.0207 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_p3668-carriersku.dtb.encrypt 1_kernel_p3668-carriersku.dtb.hash zerosbk [ 0.0216 ] [ 0.0234 ] tegrahost_v2 --chip 0x19 --align 1_kernel_p3668-carriersku.dtb.encrypt [ 0.0240 ] [ 0.0240 ] header_magic: d00dfeed [ 0.0258 ] tegrahost_v2 --appendsigheader 1_kernel_p3668-carriersku.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.0264 ] adding BCH for 1_kernel_p3668-carriersku.dtb.encrypt [ 0.0290 ] [ 0.0310 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list 1_kernel_p3668-carriersku.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0323 ] Key s [ 0.0326 ] ize is 256 bytes [ 0.0424 ] Saving pkc public key in pub_key.key [ 0.0441 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_p3668-carriersku.dtb_sigheader.encrypt.signed 1_kernel_p3668-carriersku.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0460 ] [ 0.0463 ] Signed and encryp ted file: /signed_bootimg_dir/kernel_p3668-carriersku.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_p3668-carriersku.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2edb0 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_p3668-carriersku.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /signed_bootimg_dir/kernel_p3668-carriersku_sigheader.dtb.encrypt.signed ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --trim_bpmp_dtb --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bins "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb p3668-carriersku.dtb" --key /../pkc.key --encrypt_key /../sbk.key Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0049 ] Using default ramcode: 0 [ 0.0050 ] Generating BPMP dtb for ramcode - 0 [ 0.0379 ] Old BPMP dtb size - 195712 bytes [ 0.0380 ] New BPMP dtb size - 195698 bytes [ 0.0380 ] [ 0.0404 ] tegrasign_v3.py --getmode mode.txt --key ${KEYS_DIR}/pkc.key [ 0.0418 ] K[ 0.0420 ] ey size is 256 bytes [ 0.0418 ] Generating RCM messages [ 0.0436 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --file mb1_t194_prod.bin --offset 4096 [ 0.0443 ] Key is a SBK key [ 0.0697 ] Key Size is 16 bytes [ 0.0698 ] 245216 [ 0.0769 ] [ 0.0790 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.0799 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.0816 ] [ 0.0838 ] tegrasign_v3.py --getmode mode.txt --key ${KEYS_DIR}/pkc.key [ 0.0851 ] K[ 0.0853 ] ey size is 256 bytes [ 0.0872 ] tegrasign_v3.py --file mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key ${KEYS_DIR}/pkc.key --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0887 ] K[ 0.0889 ] ey size is 256 bytes [ 0.0994 ] Saving pkc public key in pub_key.key [ 0.1010 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.1036 ] [ 0.1056 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.1066 ] [ 0.1085 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.1093 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.1095 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.1095 ] [ 0.1113 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.1119 ] RCM 0 is saved as rcm_0.rcm [ 0.1138 ] RCM 1 is saved as rcm_1.rcm [ 0.1139 ] RCM 2 is saved as rcm_2.rcm [ 0.1139 ] List of rcm files are saved in rcm_list.xml [ 0.1139 ] [ 0.1139 ] Signing RCM messages [ 0.1162 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key ${KEYS_DIR}/pkc.key --list rcm_list.xml --pubkeyhash pub_key.key [ 0.1176 ] K[ 0.1178 ] ey size is 256 bytes [ 0.1500 ] Saving pkc public key in pub_key.key [ 0.1496 ] Copying signature to RCM mesages [ 0.1517 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.1532 ] [ 0.1532 ] Parsing partition layout [ 0.1552 ] tegraparser_v2 --pt flash.xml.tmp [ 0.1564 ] [ 0.1564 ] Creating list of images to be signed [ 0.1584 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml --ratchet_blob ratchet_blob.bin [ 0.1592 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.1596 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.1599 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.1613 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.1617 ] adding BCH for spe_t194.bin [ 0.1631 ] adding BCH for spe_t194.bin [ 0.1641 ] adding BCH for nvtboot_t194.bin [ 0.1652 ] adding BCH for nvtboot_t194.bin [ 0.1672 ] Header already present for preboot_c10_prod_cr.bin [ 0.1692 ] Header already present for preboot_c10_prod_cr.bin [ 0.1694 ] Header already present for mce_c10_prod_cr.bin [ 0.1696 ] Header already present for mce_c10_prod_cr.bin [ 0.1703 ] adding BCH for mts_c10_prod_cr.bin [ 0.1724 ] adding BCH for mts_c10_prod_cr.bin [ 0.2120 ] Header already present for warmboot_t194_prod.bin [ 0.2512 ] Header already present for warmboot_t194_prod.bin [ 0.2515 ] adding BCH for xusb_sil_rel_fw [ 0.2519 ] adding BCH for xusb_sil_rel_fw [ 0.2534 ] adding BCH for cboot_t194.bin [ 0.2550 ] adding BCH for cboot_t194.bin [ 0.2613 ] adding BCH for p3668-carriersku.dtb [ 0.2675 ] adding BCH for p3668-carriersku.dtb [ 0.2696 ] adding BCH for tos-trusty_t194.img [ 0.2718 ] adding BCH for tos-trusty_t194.img [ 0.2764 ] adding BCH for eks.img [ 0.2810 ] adding BCH for eks.img [ 0.2811 ] adding BCH for adsp-fw.bin [ 0.2813 ] adding BCH for adsp-fw.bin [ 0.2820 ] adding BCH for camera-rtcpu-rce.img [ 0.2829 ] adding BCH for camera-rtcpu-rce.img [ 0.2859 ] adding BCH for bpmp_t194.bin [ 0.2891 ] adding BCH for bpmp_t194.bin [ 0.2990 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.3088 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.3130 ] [ 0.3152 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list images_list.xml --pubkeyhash pub_key.key [ 0.3163 ] Key size is 256 bytes [ 0.3484 ] Saving pkc public key in pub_key.key [ 0.6757 ] [ 0.6758 ] Generating br-bct [ 0.6778 ] Performing cfg overlay [ 0.6778 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 0.6781 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /37216/tmpm6es4myk1.cfg [ 0.7023 ] [ 0.7023 ] Updating dev and MSS params in BR BCT [ 0.7024 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /37216/tmpm6es4myk1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 0.7238 ] [ 0.7238 ] Updating bl info [ 0.7258 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 0.7278 ] [ 0.7305 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 0.7314 ] [ 0.7315 ] header_magic: 4e564441 [ 0.7342 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mb1_t194_prod_sigheader.bin_list.xml [ 0.7343 ] Key is a SBK key [ 0.7343 ] Key Size is 16 bytes [ 0.7349 ] 245216 [ 0.7464 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 0.7488 ] [ 0.7510 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 0.7519 ] [ 0.7520 ] header_magic: 4e564441 [ 0.7549 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.7567 ] K[ 0.7570 ] ey size is 256 bytes [ 0.7673 ] Saving pkc public key in pub_key.key [ 0.7688 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.7713 ] [ 0.7734 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 0.7741 ] [ 0.7742 ] header_magic: 4e564441 [ 0.7765 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mb1_t194_prod_sigheader.bin_list.xml [ 0.7766 ] Key is a SBK key [ 0.7766 ] Key Size is 16 bytes [ 0.7770 ] 245216 [ 0.7873 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 0.7898 ] [ 0.7918 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 0.7929 ] [ 0.7930 ] header_magic: 4e564441 [ 0.7958 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.7976 ] Key[ 0.7978 ] size is 256 bytes [ 0.8080 ] Saving pkc public key in pub_key.key [ 0.8095 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.8118 ] [ 0.8139 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 0.8146 ] [ 0.8147 ] header_magic: 4e564441 [ 0.8170 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list spe_t194_sigheader.bin_list.xml [ 0.8171 ] Key is a SBK key [ 0.8171 ] Key Size is 16 bytes [ 0.8173 ] 90864 [ 0.8237 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 0.8250 ] [ 0.8268 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 0.8275 ] [ 0.8276 ] header_magic: 4e564441 [ 0.8299 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.8312 ] Ke[ 0.8315 ] y size is 256 bytes [ 0.8415 ] Saving pkc public key in pub_key.key [ 0.8429 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.8445 ] [ 0.8464 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 0.8471 ] [ 0.8472 ] header_magic: 4e564441 [ 0.8495 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list spe_t194_sigheader.bin_list.xml [ 0.8496 ] Key is a SBK key [ 0.8496 ] Key Size is 16 bytes [ 0.8498 ] 90864 [ 0.8564 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 0.8578 ] [ 0.8595 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 0.8603 ] [ 0.8603 ] header_magic: 4e564441 [ 0.8627 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.8641 ] K[ 0.8644 ] ey size is 256 bytes [ 0.8755 ] Saving pkc public key in pub_key.key [ 0.8774 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.8790 ] [ 0.8813 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 0.8822 ] [ 0.8823 ] header_magic: 4e564441 [ 0.8850 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list nvtboot_t194_sigheader.bin_list.xml [ 0.8850 ] Key is a SBK key [ 0.8850 ] Key Size is 16 bytes [ 0.8856 ] 177136 [ 0.8961 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 0.8983 ] [ 0.9003 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 0.9012 ] [ 0.9013 ] header_magic: 4e564441 [ 0.9039 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.9057 ] Ke[ 0.9059 ] y size is 256 bytes [ 0.9228 ] Saving pkc public key in pub_key.key [ 0.9242 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.9277 ] [ 0.9299 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 0.9306 ] [ 0.9306 ] header_magic: 4e564441 [ 0.9330 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list nvtboot_t194_sigheader.bin_list.xml [ 0.9331 ] Key is a SBK key [ 0.9331 ] Key Size is 16 bytes [ 0.9334 ] 177136 [ 0.9419 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 0.9438 ] [ 0.9456 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 0.9463 ] [ 0.9464 ] header_magic: 4e564441 [ 0.9487 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.9502 ] K[ 0.9504 ] ey size is 256 bytes [ 0.9606 ] Saving pkc public key in pub_key.key [ 0.9620 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.9640 ] [ 0.9660 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 0.9667 ] [ 0.9667 ] header_magic: 4e564441 [ 0.9690 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 0.9691 ] Key is a SBK key [ 0.9691 ] Key Size is 16 bytes [ 0.9692 ] 19920 [ 0.9746 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 0.9755 ] [ 0.9773 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 0.9781 ] [ 0.9781 ] header_magic: 4e564441 [ 0.9805 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 0.9819 ] Key s[ 0.9822 ] ize is 256 bytes [ 0.9919 ] Saving pkc public key in pub_key.key [ 0.9934 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.9944 ] [ 0.9963 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 0.9971 ] [ 0.9971 ] header_magic: 4e564441 [ 0.9994 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 0.9995 ] Key is a SBK key [ 0.9995 ] Key Size is 16 bytes [ 0.9996 ] 19920 [ 1.0050 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 1.0059 ] [ 1.0076 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 1.0084 ] [ 1.0084 ] header_magic: 4e564441 [ 1.0108 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.0121 ] Key size is 2[ 1.0123 ] 56 bytes [ 1.0225 ] Saving pkc public key in pub_key.key [ 1.0242 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.0251 ] [ 1.0270 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 1.0278 ] [ 1.0278 ] header_magic: 4e564441 [ 1.0301 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 1.0302 ] Key is a SBK key [ 1.0302 ] Key Size is 16 bytes [ 1.0304 ] 139104 [ 1.0380 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 1.0396 ] [ 1.0414 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 1.0422 ] [ 1.0423 ] header_magic: 4e564441 [ 1.0447 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.0460 ] Ke[ 1.0462 ] y size is 256 bytes [ 1.0563 ] Saving pkc public key in pub_key.key [ 1.0580 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.0597 ] [ 1.0618 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 1.0625 ] [ 1.0626 ] header_magic: 4e564441 [ 1.0650 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 1.0650 ] Key is a SBK key [ 1.0650 ] Key Size is 16 bytes [ 1.0653 ] 139104 [ 1.0728 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 1.0745 ] [ 1.0763 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 1.0770 ] [ 1.0770 ] header_magic: 4e564441 [ 1.0794 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.0808 ] Ke[ 1.0810 ] y size is 256 bytes [ 1.0909 ] Saving pkc public key in pub_key.key [ 1.0924 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.0941 ] [ 1.0960 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 1.0967 ] [ 1.0968 ] header_magic: 4e564441 [ 1.0991 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 1.0991 ] Key is a SBK key [ 1.0991 ] Key Size is 16 bytes [ 1.1025 ] 3426320 [ 1.1742 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 1.1979 ] [ 1.1999 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 1.2010 ] [ 1.2010 ] header_magic: 4e564441 [ 1.2034 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.2052 ] Key [ 1.2056 ] size is 256 bytes [ 1.2194 ] Saving pkc public key in pub_key.key [ 1.2209 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.2446 ] [ 1.2491 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 1.2501 ] [ 1.2502 ] header_magic: 4e564441 [ 1.2526 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 1.2527 ] Key is a SBK key [ 1.2527 ] Key Size is 16 bytes [ 1.2557 ] 3426320 [ 1.3311 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 1.3535 ] [ 1.3556 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 1.3565 ] [ 1.3566 ] header_magic: 4e564441 [ 1.3593 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.3614 ] K[ 1.3617 ] ey size is 256 bytes [ 1.3798 ] Saving pkc public key in pub_key.key [ 1.3817 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.4046 ] [ 1.4109 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 1.4119 ] [ 1.4120 ] header_magic: 4e564441 [ 1.4147 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 1.4148 ] Key is a SBK key [ 1.4148 ] Key Size is 16 bytes [ 1.4151 ] 61408 [ 1.4237 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 1.4252 ] [ 1.4273 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 1.4284 ] [ 1.4285 ] header_magic: 4e564441 [ 1.4312 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.4333 ] K[ 1.4335 ] ey size is 256 bytes [ 1.4447 ] Saving pkc public key in pub_key.key [ 1.4466 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.4481 ] [ 1.4504 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 1.4515 ] [ 1.4516 ] header_magic: 4e564441 [ 1.4543 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 1.4544 ] Key is a SBK key [ 1.4544 ] Key Size is 16 bytes [ 1.4547 ] 61408 [ 1.4635 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 1.4650 ] [ 1.4671 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 1.4681 ] [ 1.4682 ] header_magic: 4e564441 [ 1.4710 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.4732 ] K[ 1.4734 ] ey size is 256 bytes [ 1.4834 ] Saving pkc public key in pub_key.key [ 1.4850 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.4865 ] [ 1.4885 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 1.4893 ] [ 1.4894 ] header_magic: 4e564441 [ 1.4918 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list xusb_sil_rel_fw_sigheader_list.xml [ 1.4918 ] Key is a SBK key [ 1.4918 ] Key Size is 16 bytes [ 1.4921 ] 129024 [ 1.4998 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 1.5015 ] [ 1.5034 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 1.5043 ] [ 1.5043 ] header_magic: 4e564441 [ 1.5069 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.5085 ] K[ 1.5088 ] ey size is 256 bytes [ 1.5208 ] Saving pkc public key in pub_key.key [ 1.5226 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.5245 ] [ 1.5270 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 1.5280 ] [ 1.5281 ] header_magic: 4e564441 [ 1.5308 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list xusb_sil_rel_fw_sigheader_list.xml [ 1.5309 ] Key is a SBK key [ 1.5309 ] Key Size is 16 bytes [ 1.5313 ] 129024 [ 1.5407 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 1.5425 ] [ 1.5447 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 1.5457 ] [ 1.5458 ] header_magic: 4e564441 [ 1.5485 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.5504 ] Key s[ 1.5507 ] ize is 256 bytes [ 1.5675 ] Saving pkc public key in pub_key.key [ 1.5692 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.5711 ] [ 1.5732 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 1.5740 ] [ 1.5741 ] header_magic: 4e564441 [ 1.5765 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list cboot_t194_sigheader.bin_list.xml [ 1.5765 ] Key is a SBK key [ 1.5765 ] Key Size is 16 bytes [ 1.5770 ] 544224 [ 1.5922 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 1.5964 ] [ 1.5984 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 1.5992 ] [ 1.5992 ] header_magic: 4e564441 [ 1.6017 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.6035 ] Key si[ 1.6039 ] ze is 256 bytes [ 1.6154 ] Saving pkc public key in pub_key.key [ 1.6172 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.6216 ] [ 1.6247 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 1.6257 ] [ 1.6257 ] header_magic: 4e564441 [ 1.6284 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list cboot_t194_sigheader.bin_list.xml [ 1.6285 ] Key is a SBK key [ 1.6285 ] Key Size is 16 bytes [ 1.6292 ] 544224 [ 1.6466 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 1.6514 ] [ 1.6535 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 1.6545 ] [ 1.6546 ] header_magic: 4e564441 [ 1.6573 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.6592 ] Key[ 1.6594 ] size is 256 bytes [ 1.6702 ] Saving pkc public key in pub_key.key [ 1.6719 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.6762 ] [ 1.6786 ] tegrahost_v2 --chip 0x19 --align p3668-carriersku_sigheader.dtb [ 1.6795 ] [ 1.6795 ] header_magic: 4e564441 [ 1.6819 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list p3668-carriersku_sigheader.dtb_list.xml [ 1.6820 ] Key is a SBK key [ 1.6820 ] Key Size is 16 bytes [ 1.6822 ] 191920 [ 1.6913 ] tegrahost_v2 --chip 0x19 0 --updatesigheader p3668-carriersku_sigheader.dtb.encrypt p3668-carriersku_sigheader.dtb.hash zerosbk [ 1.6934 ] [ 1.6953 ] tegrahost_v2 --chip 0x19 --align p3668-carriersku_sigheader.dtb.encrypt [ 1.6963 ] [ 1.6964 ] header_magic: 4e564441 [ 1.6988 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list p3668-carriersku_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 1.7004 ] K[ 1.7006 ] ey size is 256 bytes [ 1.7111 ] Saving pkc public key in pub_key.key [ 1.7127 ] tegrahost_v2 --chip 0x19 0 --updatesigheader p3668-carriersku_sigheader.dtb.encrypt.signed p3668-carriersku_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.ke y [ 1.7147 ] [ 1.7168 ] tegrahost_v2 --chip 0x19 --align p3668-carriersku_sigheader.dtb [ 1.7177 ] [ 1.7177 ] header_magic: 4e564441 [ 1.7201 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list p3668-carriersku_sigheader.dtb_list.xml [ 1.7202 ] Key is a SBK key [ 1.7202 ] Key Size is 16 bytes [ 1.7204 ] 191920 [ 1.7294 ] tegrahost_v2 --chip 0x19 0 --updatesigheader p3668-carriersku_sigheader.dtb.encrypt p3668-carriersku_sigheader.dtb.hash zerosbk [ 1.7315 ] [ 1.7334 ] tegrahost_v2 --chip 0x19 --align p3668-carriersku_sigheader.dtb.encrypt [ 1.7342 ] [ 1.7342 ] header_magic: 4e564441 [ 1.7366 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list p3668-carriersku_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 1.7384 ] Key siz[ 1.7387 ] e is 256 bytes [ 1.7491 ] Saving pkc public key in pub_key.key [ 1.7506 ] tegrahost_v2 --chip 0x19 0 --updatesigheader p3668-carriersku_sigheader.dtb.encrypt.signed p3668-carriersku_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.7528 ] [ 1.7549 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 1.7558 ] [ 1.7559 ] header_magic: 4e564441 [ 1.7583 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list tos-trusty_t194_sigheader.img_list.xml [ 1.7584 ] Key is a SBK key [ 1.7584 ] Key Size is 16 bytes [ 1.7589 ] 406464 [ 1.7721 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 1.7756 ] [ 1.7776 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 1.7784 ] [ 1.7785 ] header_magic: 4e564441 [ 1.7809 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 1.7825 ] K[ 1.7827 ] ey size is 256 bytes [ 1.7930 ] Saving pkc public key in pub_key.key [ 1.7946 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.7982 ] [ 1.8005 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 1.8013 ] [ 1.8014 ] header_magic: 4e564441 [ 1.8038 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list tos-trusty_t194_sigheader.img_list.xml [ 1.8039 ] Key is a SBK key [ 1.8039 ] Key Size is 16 bytes [ 1.8043 ] 406464 [ 1.8173 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 1.8224 ] [ 1.8244 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 1.8253 ] [ 1.8253 ] header_magic: 4e564441 [ 1.8277 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8294 ] K[ 1.8297 ] ey size is 256 bytes [ 1.8402 ] Saving pkc public key in pub_key.key [ 1.8418 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.8467 ] [ 1.8491 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 1.8499 ] [ 1.8500 ] header_magic: 4e564441 [ 1.8525 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list eks_sigheader.img_list.xml [ 1.8525 ] Key is a SBK key [ 1.8525 ] Key Size is 16 bytes [ 1.8527 ] 1040 [ 1.8580 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 1.8589 ] [ 1.8610 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 1.8618 ] [ 1.8619 ] header_magic: 4e564441 [ 1.8643 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8659 ] Ke[ 1.8662 ] y size is 256 bytes [ 1.8761 ] Saving pkc public key in pub_key.key [ 1.8778 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.8787 ] [ 1.8806 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 1.8815 ] [ 1.8815 ] header_magic: 4e564441 [ 1.8840 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list eks_sigheader.img_list.xml [ 1.8840 ] Key is a SBK key [ 1.8840 ] Key Size is 16 bytes [ 1.8842 ] 1040 [ 1.8893 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 1.8902 ] [ 1.8920 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 1.8928 ] [ 1.8929 ] header_magic: 4e564441 [ 1.8953 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8969 ] Key [ 1.8971 ] size is 256 bytes [ 1.9071 ] Saving pkc public key in pub_key.key [ 1.9088 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.9097 ] [ 1.9117 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 1.9125 ] [ 1.9126 ] header_magic: 4e564441 [ 1.9151 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list adsp-fw_sigheader.bin_list.xml [ 1.9151 ] Key is a SBK key [ 1.9151 ] Key Size is 16 bytes [ 1.9153 ] 77216 [ 1.9218 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 1.9233 ] [ 1.9252 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 1.9261 ] [ 1.9261 ] header_magic: 4e564441 [ 1.9286 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.9303 ] Ke[ 1.9305 ] y size is 256 bytes [ 1.9406 ] Saving pkc public key in pub_key.key [ 1.9422 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.9437 ] [ 1.9458 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 1.9466 ] [ 1.9467 ] header_magic: 4e564441 [ 1.9491 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list adsp-fw_sigheader.bin_list.xml [ 1.9492 ] Key is a SBK key [ 1.9492 ] Key Size is 16 bytes [ 1.9494 ] 77216 [ 1.9559 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 1.9574 ] [ 1.9593 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 1.9601 ] [ 1.9602 ] header_magic: 4e564441 [ 1.9626 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.9643 ] K[ 1.9646 ] ey size is 256 bytes [ 1.9753 ] Saving pkc public key in pub_key.key [ 1.9772 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 1.9787 ] [ 1.9811 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 1.9820 ] [ 1.9821 ] header_magic: 4e564441 [ 1.9850 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 1.9851 ] Key is a SBK key [ 1.9851 ] Key Size is 16 bytes [ 1.9856 ] 268656 [ 1.9977 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 2.0004 ] [ 2.0026 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 2.0035 ] [ 2.0036 ] header_magic: 4e564441 [ 2.0064 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 2.0083 ] Ke[ 2.0085 ] y size is 256 bytes [ 2.0190 ] Saving pkc public key in pub_key.key [ 2.0206 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.0249 ] [ 2.0272 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 2.0281 ] [ 2.0281 ] header_magic: 4e564441 [ 2.0305 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 2.0306 ] Key is a SBK key [ 2.0306 ] Key Size is 16 bytes [ 2.0309 ] 268656 [ 2.0415 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 2.0440 ] [ 2.0459 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 2.0470 ] [ 2.0470 ] header_magic: 4e564441 [ 2.0495 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 2.0510 ] Ke[ 2.0512 ] y size is 256 bytes [ 2.0616 ] Saving pkc public key in pub_key.key [ 2.0632 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.0660 ] [ 2.0682 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 2.0690 ] [ 2.0691 ] header_magic: 4e564441 [ 2.0715 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list bpmp_t194_sigheader.bin_list.xml [ 2.0715 ] Key is a SBK key [ 2.0716 ] Key Size is 16 bytes [ 2.0722 ] 852256 [ 2.0932 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 2.0992 ] [ 2.1012 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 2.1020 ] [ 2.1021 ] header_magic: 4e564441 [ 2.1045 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.1061 ] Ke[ 2.1063 ] y size is 256 bytes [ 2.1173 ] Saving pkc public key in pub_key.key [ 2.1188 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.1250 ] [ 2.1279 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 2.1288 ] [ 2.1288 ] header_magic: 4e564441 [ 2.1313 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list bpmp_t194_sigheader.bin_list.xml [ 2.1313 ] Key is a SBK key [ 2.1313 ] Key Size is 16 bytes [ 2.1320 ] 852256 [ 2.1532 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 2.1594 ] [ 2.1613 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 2.1622 ] [ 2.1622 ] header_magic: 4e564441 [ 2.1649 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.1665 ] K[ 2.1668 ] ey size is 256 bytes [ 2.1790 ] Saving pkc public key in pub_key.key [ 2.1809 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.1878 ] [ 2.1911 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 2.1922 ] [ 2.1923 ] header_magic: 4e564441 [ 2.1951 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 2.1951 ] Key is a SBK key [ 2.1951 ] Key Size is 16 bytes [ 2.1956 ] 195712 [ 2.2063 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 2.2088 ] [ 2.2110 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 2.2120 ] [ 2.2120 ] header_magic: 4e564441 [ 2.2148 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 2.2168 ] K[ 2.2171 ] ey size is 256 bytes [ 2.2272 ] Saving pkc public key in pub_key.key [ 2.2288 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.2311 ] [ 2.2333 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 2.2342 ] [ 2.2342 ] header_magic: 4e564441 [ 2.2367 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 2.2367 ] Key is a SBK key [ 2.2367 ] Key Size is 16 bytes [ 2.2370 ] 195712 [ 2.2463 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 2.2484 ] [ 2.2503 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 2.2514 ] [ 2.2514 ] header_magic: 4e564441 [ 2.2540 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 2.2557 ] K[ 2.2559 ] ey size is 256 bytes [ 2.2690 ] Saving pkc public key in pub_key.key [ 2.2709 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.2733 ] [ 2.2789 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 2.2800 ] [ 2.2801 ] header_magic: 50000ea [ 2.2829 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list nvtboot_recovery_t194.bin_list.xml [ 2.2830 ] Key is a SBK key [ 2.2830 ] Key Size is 16 bytes [ 2.2833 ] 177056 [ 2.2937 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 2.2954 ] [ 2.2976 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 2.2987 ] [ 2.2987 ] header_magic: 8f5cc7fe [ 2.3008 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin [ 2.3018 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 2.3040 ] [ 2.3065 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.3082 ] K[ 2.3085 ] ey size is 256 bytes [ 2.3196 ] Saving pkc public key in pub_key.key [ 2.3215 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.3252 ] [ 2.3276 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 2.3289 ] [ 2.3290 ] header_magic: 9000014 [ 2.3318 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list nvtboot_recovery_cpu_t194.bin_list.xml [ 2.3318 ] Key is a SBK key [ 2.3319 ] Key Size is 16 bytes [ 2.3323 ] 259744 [ 2.3443 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 2.3458 ] [ 2.3482 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 2.3493 ] [ 2.3494 ] header_magic: e741218f [ 2.3515 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin [ 2.3525 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 2.3559 ] [ 2.3583 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.3605 ] Ke[ 2.3607 ] y size is 256 bytes [ 2.3720 ] Saving pkc public key in pub_key.key [ 2.3738 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.3767 ] [ 2.3768 ] Copying signed file in /encrypted_signed_t19x [ 2.3776 ] Generating br-bct [ 2.3797 ] Performing cfg overlay [ 2.3797 ] ['/37216/tmpm6es4myk1.cfg'] [ 2.3797 ] Updating dev and MSS params in BR BCT [ 2.3798 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /37216/tmpm6es4myk1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.3997 ] [ 2.3997 ] Updating bl info [ 2.4019 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 2.4038 ] [ 2.4038 ] Generating br-bct [ 2.4059 ] Performing cfg overlay [ 2.4059 ] ['/37216/tmpm6es4myk1.cfg'] [ 2.4059 ] Updating dev and MSS params in BR BCT [ 2.4060 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /37216/tmpm6es4myk1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.4263 ] [ 2.4263 ] Updating bl info [ 2.4285 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 2.4308 ] [ 2.4309 ] Updating smd info [ 2.4330 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 2.4342 ] [ 2.4342 ] Updating Odmdata [ 2.4364 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 2.4376 ] [ 2.4376 ] Get encrypted section of bct [ 2.4397 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 2.4408 ] [ 2.4408 ] Signing BCT [ 2.4430 ] Generating signatures with encryption [ 2.4454 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --offset 2328 --file br_bct_BR.bct [ 2.4465 ] Key is a SBK key [ 2.4667 ] Key Size is 16 bytes [ 2.4668 ] 560 [ 2.4715 ] [ 2.4715 ] Updating BCT with signature [ 2.4717 ] Get Signed section of bct [ 2.4737 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 2.4746 ] [ 2.4765 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 2.4773 ] Key size is 256 bytes [ 2.5083 ] Saving pkc public key in pub_key.key [ 2.5124 ] [ 2.5124 ] Updating BCT with signature [ 2.5144 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 2.5154 ] [ 2.5154 ] Generating coldboot mb1-bct [ 2.5177 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /37216/tmpm6es4myk1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.5186 ] MB1-BCT version: 0x1 [ 2.5188 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 2.5190 ] Added Platform Config 0 data with size :- 2496 [ 2.5197 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 2.5200 ] Added Platform Config 1 data with size :- 19640 [ 2.5278 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 2.5281 ] Added Platform Config 2 data with size :- 24 [ 2.5284 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 2.5286 ] Added Platform Config 4 data with size :- 348 [ 2.5286 ] [ 2.5286 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 2.5286 ] Added Platform Config 3 data with size :- 92 [ 2.5286 ] [ 2.5286 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 2.5286 ] Added Platform Config 5 data with size :- 128 [ 2.5287 ] [ 2.5287 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 2.5287 ] Added Platform Config 7 data with size :- 392 [ 2.5287 ] [ 2.5287 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.5287 ] Added Platform Config 9 data with size :- 40 [ 2.5287 ] [ 2.5287 ] Updating mb1-bct with firmware information [ 2.5307 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.5317 ] MB1-BCT version: 0x1 [ 2.5320 ] [ 2.5320 ] Updating mb1-bct with storage information [ 2.5340 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.5350 ] MB1-BCT version: 0x1 [ 2.5354 ] [ 2.5354 ] Updating mb1-bct with ratchet information [ 2.5372 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 2.5380 ] MB1-BCT version: 0x1 [ 2.5382 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.5383 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.5384 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.5384 ] [ 2.5404 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 2.5413 ] [ 2.5414 ] header_magic: c0660000 [ 2.5438 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mb1_cold_boot_bct_MB1.bct_list.xml [ 2.5439 ] Key is a SBK key [ 2.5439 ] Key Size is 16 bytes [ 2.5440 ] 26304 [ 2.5497 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 2.5506 ] [ 2.5525 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 2.5534 ] [ 2.5534 ] header_magic: 35d93dec [ 2.5553 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 2.5561 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 2.5567 ] [ 2.5591 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.5608 ] Ke[ 2.5610 ] y size is 256 bytes [ 2.5713 ] Saving pkc public key in pub_key.key [ 2.5730 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.5741 ] [ 2.5741 ] Generating recovery mb1-bct [ 2.5761 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /37216/tmpm6es4myk1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.5770 ] MB1-BCT version: 0x1 [ 2.5771 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 2.5773 ] Added Platform Config 0 data with size :- 2496 [ 2.5780 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 2.5782 ] Added Platform Config 1 data with size :- 19640 [ 2.5859 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 2.5860 ] Added Platform Config 2 data with size :- 24 [ 2.5862 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 2.5863 ] Added Platform Config 4 data with size :- 348 [ 2.5865 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 2.5867 ] Added Platform Config 3 data with size :- 92 [ 2.5867 ] [ 2.5867 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 2.5867 ] Added Platform Config 5 data with size :- 128 [ 2.5867 ] [ 2.5867 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 2.5867 ] Added Platform Config 7 data with size :- 392 [ 2.5867 ] [ 2.5867 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.5867 ] Added Platform Config 9 data with size :- 40 [ 2.5867 ] [ 2.5867 ] Updating mb1-bct with firmware information [ 2.5885 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.5893 ] MB1-BCT version: 0x1 [ 2.5896 ] [ 2.5896 ] Updating mb1-bct with storage information [ 2.5914 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.5923 ] MB1-BCT version: 0x1 [ 2.5925 ] [ 2.5925 ] Updating mb1-bct with ratchet information [ 2.5944 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 2.5952 ] MB1-BCT version: 0x1 [ 2.5954 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.5955 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.5955 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.5955 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.5955 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.5955 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.5956 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.5956 ] [ 2.5974 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 2.5984 ] [ 2.5984 ] header_magic: c0660000 [ 2.6009 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mb1_bct_MB1.bct_list.xml [ 2.6010 ] Key is a SBK key [ 2.6010 ] Key Size is 16 bytes [ 2.6011 ] 26304 [ 2.6069 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 2.6078 ] [ 2.6097 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 2.6106 ] [ 2.6106 ] header_magic: 35d93dec [ 2.6125 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 2.6133 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 2.6138 ] [ 2.6162 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.6178 ] K[ 2.6181 ] ey size is 256 bytes [ 2.6286 ] Saving pkc public key in pub_key.key [ 2.6304 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.6317 ] [ 2.6318 ] Generating coldboot mem-bct [ 2.6341 ] tegrabct_v2 --chip 0x19 0 --sdram /37216/tmpm6es4myk1.cfg --membct /37216/tmpm6es4myk1_1.bct /37216/tmpm6es4myk1_2.bct /37216/tmpm6es4myk1_3.bct /media/user/work/jetson/test-image/flash-x/37216/tmpm6es4myk1_4.bct [ 2.6350 ] Packing sdram param for instance[0] [ 2.6544 ] Packing sdram param for instance[1] [ 2.6545 ] Packing sdram param for instance[2] [ 2.6547 ] Packing sdram param for instance[3] [ 2.6548 ] Packing sdram param for instance[4] [ 2.6548 ] Packing sdram param for instance[5] [ 2.6548 ] Packing sdram param for instance[6] [ 2.6548 ] Packing sdram param for instance[7] [ 2.6548 ] Packing sdram param for instance[8] [ 2.6548 ] Packing sdram param for instance[9] [ 2.6548 ] Packing sdram param for instance[10] [ 2.6548 ] Packing sdram param for instance[11] [ 2.6548 ] Packing sdram param for instance[12] [ 2.6548 ] Packing sdram param for instance[13] [ 2.6548 ] Packing sdram param for instance[14] [ 2.6548 ] Packing sdram param for instance[15] [ 2.6548 ] [ 2.6549 ] Getting sector size from pt [ 2.6567 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 2.6578 ] [ 2.6578 ] BlockSize read from layout is 200 [ 2.6598 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --file /37216/tmpm6es4myk1_1.bct [ 2.6606 ] Key is a SBK key [ 2.6818 ] Key Size is 16 bytes [ 2.6819 ] 48352 [ 2.6870 ] [ 2.6891 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --file /37216/tmpm6es4myk1_2.bct [ 2.6899 ] Key is a SBK key [ 2.7107 ] Key Size is 16 bytes [ 2.7108 ] 48352 [ 2.7155 ] [ 2.7178 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --file /37216/tmpm6es4myk1_3.bct [ 2.7188 ] Key is a SBK key [ 2.7402 ] Key Size is 16 bytes [ 2.7404 ] 48352 [ 2.7452 ] [ 2.7475 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --file /37216/tmpm6es4myk1_4.bct [ 2.7487 ] Key is a SBK key [ 2.7694 ] Key Size is 16 bytes [ 2.7694 ] 48352 [ 2.7743 ] [ 2.7764 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /37216/tmpm6es4myk1_1_encrypt.bct /media/user/work/jetson/test-image/flash-x/37216/tmpm6es4myk1_2_encrypt.bct /37216/tmpm6es4myk1_3_encrypt.bct /media/user/work/jetson/test-image/flash-x/37216/tmpm6es4myk1_4_encrypt.bct [ 2.7774 ] adding BCH for /37216/tmpm6es4myk1_1_encrypt.bct [ 2.7787 ] [ 2.7806 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 2.7814 ] [ 2.7815 ] header_magic: 4e564441 [ 2.7840 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mem_coldboot.bct_list.xml --pubkeyhash pub_key.key [ 2.7856 ] Ke[ 2.7859 ] y size is 256 bytes [ 2.7963 ] Saving pkc public key in pub_key.key [ 2.7978 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key [ 2.7994 ] [ 2.8014 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 2.8025 ] [ 2.8044 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct oem-rsa [ 2.8052 ] Header already present for mem_coldboot.bct [ 2.8055 ] [ 2.8079 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key ${KEYS_DIR}/pkc.key --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.8096 ] Key s[ 2.8098 ] ize is 256 bytes [ 2.8200 ] Saving pkc public key in pub_key.key [ 2.8216 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 2.8227 ] [ 2.8228 ] Generating recovery mem-bct [ 2.8247 ] tegrabct_v2 --chip 0x19 0 --sdram /37216/tmpm6es4myk1.cfg --membct /37216/tmpm6es4myk1_1.bct /37216/tmpm6es4myk1_2.bct /37216/tmpm6es4myk1_3.bct /media/user/work/jetson/test-image/flash-x/37216/tmpm6es4myk1_4.bct [ 2.8254 ] Packing sdram param for instance[0] [ 2.8448 ] Packing sdram param for instance[1] [ 2.8450 ] Packing sdram param for instance[2] [ 2.8452 ] Packing sdram param for instance[3] [ 2.8452 ] Packing sdram param for instance[4] [ 2.8452 ] Packing sdram param for instance[5] [ 2.8452 ] Packing sdram param for instance[6] [ 2.8452 ] Packing sdram param for instance[7] [ 2.8452 ] Packing sdram param for instance[8] [ 2.8452 ] Packing sdram param for instance[9] [ 2.8452 ] Packing sdram param for instance[10] [ 2.8453 ] Packing sdram param for instance[11] [ 2.8453 ] Packing sdram param for instance[12] [ 2.8453 ] Packing sdram param for instance[13] [ 2.8453 ] Packing sdram param for instance[14] [ 2.8453 ] Packing sdram param for instance[15] [ 2.8453 ] [ 2.8472 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 2.8481 ] [ 2.8482 ] header_magic: 3000000 [ 2.8507 ] tegrasign_v3.py --key ${KEYS_DIR}/sbk.key --list mem_rcm.bct_list.xml [ 2.8507 ] Key is a SBK key [ 2.8508 ] Key Size is 16 bytes [ 2.8509 ] 48352 [ 2.8572 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 2.8585 ] [ 2.8605 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 2.8615 ] [ 2.8616 ] header_magic: b0df14d3 [ 2.8635 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin [ 2.8642 ] adding BCH for mem_rcm.bct.encrypt [ 2.8649 ] [ 2.8674 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mem_rcm.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.8692 ] Key siz[ 2.8695 ] e is 256 bytes [ 2.8797 ] Saving pkc public key in pub_key.key [ 2.8813 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.8826 ] [ 2.8831 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 2.8833 ] preboot_c10_prod_cr.bin [ 2.8833 ] mce_c10_prod_cr.bin [ 2.8835 ] mts_c10_prod_cr.bin [ 2.8857 ] bpmp_t194.bin [ 2.8863 ] tegra194-a02-bpmp-p3668-a00.dtb [ 2.8865 ] spe_t194.bin [ 2.8866 ] tos-trusty_t194.img [ 2.8869 ] eks.img [ 2.8869 ] p3668-carriersku.dtb [ 2.8871 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 2.8893 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 2.8902 ] [ 2.8903 ] header_magic: 4e564441 [ 2.8927 ] tegrasign_v3.py --key ${KEYS_DIR}/pkc.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.8944 ] Key [ 2.8946 ] size is 256 bytes [ 2.9051 ] Saving pkc public key in pub_key.key [ 2.9067 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.9094 ] [ 2.9117 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 2.9127 ] [ 2.9167 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /encrypted_signed_t19x/flash.xml.tmp flash.idx [ 2.9785 ] ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; bootloader_dtb p3668-carriersku_sigheader.dtb.encrypt.signed" saving flash command in flashcmd.txt *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0049 ] Parsing partition layout [ 0.0067 ] tegraparser_v2 --pt secureflash.xml.tmp [ 0.0077 ] [ 0.0077 ] Boot Rom communication [ 0.0095 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_1_signed.rcm --rcm rcm_2_signed.rcm [ 0.0101 ] BR_CID: 0xd8021911647e25c80c0000000c018280 [ 0.0108 ] Bootrom returned error 19 [ 0.0110 ] Boot Rom communication failed [ 0.0110 ] Error: Return value 19 Command tegrarcm_v2 --chip 0x19 0 --rcm rcm_1_signed.rcm --rcm rcm_2_signed.rcm