$ cat tools/pkc/fuse_config_append.xml zme@zme-System-Product-Name:/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra (dev)$ sudo ./odmfuse.sh -X tools/pkc/fuse_config_append.xml -i 0x23 -k tools/pkc/rsa_priv.pem -S tools/pkc/sbk-32.key jetson-orin-nano-devkit copying minratchet_config(/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)... done. ./tegraflash.py --chip 0x23 --applet "/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" --encrypt_key "/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key" --key "/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem" --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000.dts Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0314 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 0.0330 ] File rcm_state open failed [ 0.0335 ] ERROR: failed to read rcm_state [ 0.0335 ] [ 0.0350 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --getmode mode.txt [ 0.0369 ] Key size is 384 bytes [ 0.0363 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts [ 0.0477 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts [ 0.0675 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts [ 0.0804 ] Parsing partition layout [ 0.0822 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0853 ] Kernel DTB used: None [ 0.0853 ] WARNING: dce base dtb is not provided [ 0.0853 ] Parsing partition layout [ 0.0871 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0891 ] Creating list of images to be encrypted and signed [ 0.0913 ] Generating ratchet blob [ 0.0913 ] Generating coldboot mb1-bct [ 0.0932 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 0.0948 ] MB1-BCT version: 0.13 [ 0.0964 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.0968 ] Added Platform Config 9 data with size :- 100 [ 0.0968 ] [ 0.0968 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 0.0968 ] [ 0.0968 ] Updating mb1-bct with firmware information [ 0.0987 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.1012 ] mb1_cold_boot_bct_MB1.bct [ 0.1012 ] Encrypting and signing mb1_cold_boot_bct_MB1.bct [ 0.1013 ] header_magic: 4d423142 [ 0.1032 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.1050 ] Generating SHA2 Hash for mb1bct [ 0.1090 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 0.1114 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 0.1119 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 0.1134 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.1158 ] tegrasign_v3.py --file mb1_cold_boot_bct_MB1_aligned_sigheader.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_cold_boot_bct_MB1_aligned_sigheader_kdf.yaml [ 0.1172 ] Perform key derivation on mb1_cold_boot_bct_MB1_aligned_sigheader.bct [ 0.1496 ] Key Size is 32 bytes [ 0.1514 ] Performing aes-gcm encryption [ 0.1519 ] --key 690c07f2f9d9a9d228e45e72f3b5d2ae206f0475ed6b39a1f07c2986b623bb05 [ 0.1523 ] --iv 7b4099968f363bfa4a0e72ba [ 0.1523 ] --aad 4d4243544016000000000000000000000000000000000000000000000000000400000000000000000000000000000000b96b3bdab2d1679bb4f656c157cb5b12000000007b4099968f363bfa4a0e72ba [ 0.1548 ] Sha saved in mb1_cold_boot_bct_MB1_aligned_sigheader_tmp0_encrypt.sha [ 0.1558 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.1579 ] Key size is 384 bytes [ 0.1948 ] Saving pkc public key in pub_key.key [ 0.1957 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa [ 0.1993 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml oem-rsa [ 0.2011 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.2030 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.2037 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.2113 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.2135 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.2189 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.2193 ] adding BCH for mb2_t234_aligned.bin [ 0.2225 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.2351 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.2357 ] adding BCH for mb2_t234_aligned.bin [ 0.2539 ] tegrasign_v3.py --file mb1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_t234_prod_aligned_sigheader_kdf.yaml [ 0.2562 ] Perform key derivation on mb1_t234_prod_aligned_sigheader.bin [ 0.2871 ] Key Size is 32 bytes [ 0.2891 ] Performing aes-gcm encryption [ 0.2900 ] --key d68edbffe788d3b405e3b97175b6e1e9b54766f7a032321b396a4926e4b53588 [ 0.2906 ] --iv 64edeb39b8c5a2fadd0593d4 [ 0.2909 ] --aad 4d423142903004000000005000000050010401000000000000000000000000040000000000000000000000000000000003fd7d5b61ab2b170c3f938e445e16490000000064edeb39b8c5a2fadd0593d4 [ 0.3029 ] Sha saved in mb1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.3059 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.3081 ] INFO: updated file for successfully [ 0.3102 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.3122 ] INFO: updated file for successfully [ 0.3143 ] tegrasign_v3.py --file mb1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_t234_prod_aligned_sigheader_kdf.yaml [ 0.3159 ] Perform key derivation on mb1_t234_prod_aligned_sigheader.bin [ 0.3484 ] Key Size is 32 bytes [ 0.3505 ] Performing aes-gcm encryption [ 0.3511 ] --key fe0bc7a0f122a03f3e1731922ede7a6dcd5c1cf7266e199e439f5e736041212d [ 0.3514 ] --iv ac578dc6da78751ba4049506 [ 0.3515 ] --aad 4d42314290300400000000500000005001040100000000000000000000000004000000000000000000000000000000004dfc6b1969d35acd9fb02b17b6a7424c00000000ac578dc6da78751ba4049506 [ 0.3711 ] Sha saved in mb1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.3732 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.3751 ] INFO: updated file for successfully [ 0.3777 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.3797 ] INFO: updated file for successfully [ 0.3818 ] tegrasign_v3.py --file psc_bl1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=psc_bl1_t234_prod_aligned_sigheader_kdf.yaml [ 0.3836 ] Perform key derivation on psc_bl1_t234_prod_aligned_sigheader.bin [ 0.4100 ] Key Size is 32 bytes [ 0.4119 ] Performing aes-gcm encryption [ 0.4125 ] --key 2b885107d5845efb8e305bf04740aff47e46de4a814acdaf79d88e01dc670a26 [ 0.4128 ] --iv 41a85c1e2006fbd4be4a45dd [ 0.4130 ] --aad 5053434200000200000012000004120008020200000000000000000000000004000000000000000000000000000000005d7c50e596d1b0e5e5752c2a5322d8c00000000041a85c1e2006fbd4be4a45dd [ 0.4238 ] Sha saved in psc_bl1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.4252 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.4269 ] INFO: updated file for successfully [ 0.4296 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.4316 ] INFO: updated file for successfully [ 0.4335 ] tegrasign_v3.py --file mb2_t234_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb2_t234_sigheader_kdf.yaml [ 0.4358 ] Perform key derivation on mb2_t234_sigheader.bin [ 0.4663 ] Key Size is 32 bytes [ 0.4682 ] Performing aes-gcm encryption [ 0.4688 ] --key 85b6117fcbe12e94e8da4b5a38aca76086afcf314a03d0f030fc1a72f2ae5c32 [ 0.4691 ] --iv f8b172894a64429cadbb35ff [ 0.4692 ] --aad 4d423242c0eb05000000000000000000000000000000000000000000000000040000000000000000000000000000000099ef9396e43171937bb0e883f1515f7500000000f8b172894a64429cadbb35ff [ 0.4925 ] Sha saved in mb2_t234_sigheader_tmp0_encrypt.sha [ 0.4953 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.4970 ] INFO: updated file for successfully [ 0.4999 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.5022 ] INFO: updated file for successfully [ 0.5043 ] tegrasign_v3.py --file psc_bl1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=psc_bl1_t234_prod_aligned_sigheader_kdf.yaml [ 0.5054 ] Perform key derivation on psc_bl1_t234_prod_aligned_sigheader.bin [ 0.5330 ] Key Size is 32 bytes [ 0.5346 ] Performing aes-gcm encryption [ 0.5350 ] --key 8f3c2ade78e4b072f0a5188da8a851f93615f18a91afdb6c117a6db0d6691283 [ 0.5352 ] --iv 1d6c9478e92ab070cd982638 [ 0.5353 ] --aad 50534342000002000000120000041200080202000000000000000000000000040000000000000000000000000000000086a8b1a1198566ae0a1084d17d509734000000001d6c9478e92ab070cd982638 [ 0.5449 ] Sha saved in psc_bl1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.5467 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.5484 ] INFO: updated file for successfully [ 0.5512 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.5532 ] INFO: updated file for successfully [ 0.5552 ] tegrasign_v3.py --file mb2_t234_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb2_t234_sigheader_kdf.yaml [ 0.5571 ] Perform key derivation on mb2_t234_sigheader.bin [ 0.5916 ] Key Size is 32 bytes [ 0.5940 ] Performing aes-gcm encryption [ 0.5948 ] --key 8d25b03caa0329ec344b9a8627f446a4c2c90d69e7a2b9f81273b4708a7ecf0c [ 0.5953 ] --iv 5f61a7776e88f64cce19a4f7 [ 0.5955 ] --aad 4d423242c0eb0500000000000000000000000000000000000000000000000004000000000000000000000000000000002daf59d564e1ad8ae2673b58ccd9b1cf000000005f61a7776e88f64cce19a4f7 [ 0.6179 ] Sha saved in mb2_t234_sigheader_tmp0_encrypt.sha [ 0.6215 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.6238 ] INFO: updated file for successfully [ 0.6267 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.6289 ] INFO: updated file for successfully [ 0.6310 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list images_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.6330 ] Key size is 384 bytes [ 0.8381 ] Saving pkc public key in pub_key.key [ 0.8369 ] Parsing dev params for multi chains [ 0.8497 ] Generating br-bct [ 0.8519 ] Updating dev and MSS params in BR BCT [ 0.8521 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.8547 ] Updating bl info [ 0.8572 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.8590 ] WARNING: boot chain is not completed. set to 0 [ 0.8604 ] Perform encryption on bct [ 0.8621 ] tegrasign_v3.py --file br_bct_BR.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=br_bct_BR_kdf.yaml [ 0.8637 ] Perform key derivation on br_bct_BR.bct [ 0.8656 ] ERROR: 0[ 0.8911 ] Key Size is 32 bytes [ 0.8929 ] Performing aes-gcm encryption [ 0.8935 ] --key bc9b54a43bc25fadbc31384b6e7c58a488f881b3cac5d26b41c9e40cd997c951 [ 0.8939 ] --iv 1ba78e8d8de950e313812430 [ 0.8939 ] --aad ffbd95140699963e748b116476897c3842435442cbbaecd500000000000000000000000000000000000000001ba78e8d8de950e313812430 [ 0.8964 ] Sha saved in br_bct_BR_tmp_encrypt.sha [ 0.8959 ] Get Signed section of bct [ 0.8977 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 0.8997 ] Signing BCT [ 0.9012 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.9030 ] Key size is 384 bytes [ 0.9387 ] Saving pkc public key in pub_key.key [ 0.9374 ] Updating BCT with signature [ 0.9397 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 0.9418 ] Offset :4608 Len :3584 [ 0.9426 ] Generating SHA2 Hash [ 0.9441 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 0.9443 ] Assuming zero filled SBK key [ 0.9443 ] Assuming zero filled SBK key [ 0.9489 ] Sha saved in br_bct_BR.sha [ 0.9481 ] Updating BCT with SHA2 Hash [ 0.9500 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml [ 0.9521 ] Offset :4608 Len :3584 [ 0.9527 ] Offset :68 Len :8124 [ 0.9531 ] Generating coldboot mb1-bct [ 0.9549 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 0.9573 ] MB1-BCT version: 0.13 [ 0.9593 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.9597 ] Added Platform Config 9 data with size :- 100 [ 0.9598 ] [ 0.9598 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 0.9598 ] [ 0.9598 ] Updating mb1-bct with firmware information [ 0.9617 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.9644 ] mb1_cold_boot_bct_MB1.bct [ 0.9644 ] Encrypting and signing mb1_cold_boot_bct_MB1.bct [ 0.9645 ] header_magic: 4d423142 [ 0.9665 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.9687 ] Generating SHA2 Hash for mb1bct [ 0.9730 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 0.9759 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 0.9767 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 0.9787 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.9811 ] tegrasign_v3.py --file mb1_cold_boot_bct_MB1_aligned_sigheader.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_cold_boot_bct_MB1_aligned_sigheader_kdf.yaml [ 0.9827 ] Perform key derivation on mb1_cold_boot_bct_MB1_aligned_sigheader.bct [ 1.0131 ] Key Size is 32 bytes [ 1.0149 ] Performing aes-gcm encryption [ 1.0153 ] --key 9750c305064a40a89e0262b0ed2613c612e5642dd7c07b4d38e873229a96be4e [ 1.0156 ] --iv 6e5824bf0811bfb87fb4a67a [ 1.0157 ] --aad 4d4243544016000000000000000000000000000000000000000000000000000400000000000000000000000000000000b7aba0ed252b3ba12068b4abce650a4c000000006e5824bf0811bfb87fb4a67a [ 1.0186 ] Sha saved in mb1_cold_boot_bct_MB1_aligned_sigheader_tmp0_encrypt.sha [ 1.0198 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 1.0221 ] Key size is 384 bytes [ 1.0553 ] Saving pkc public key in pub_key.key [ 1.0562 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa [ 1.0594 ] Generating recovery mb1-bct [ 1.0612 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 1.0633 ] MB1-BCT version: 0.13 [ 1.0659 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 1.0662 ] Added Platform Config 9 data with size :- 100 [ 1.0665 ] [ 1.0665 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 1.0665 ] [ 1.0666 ] Updating mb1-bct with firmware information [ 1.0687 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin [ 1.0714 ] mb1_bct_MB1.bct [ 1.0715 ] Encrypting and signing mb1_bct_MB1.bct [ 1.0716 ] header_magic: 4d423142 [ 1.0739 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct [ 1.0764 ] Generating SHA2 Hash for mb1bct [ 1.0800 ] Sha saved in mb1_bct_MB1_aligned.sha [ 1.0821 ] Sha saved in mb1_bct_MB1.sha [ 1.0824 ] tegrahost_v2 --appendsigheader mb1_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 1.0840 ] adding BCH for mb1_bct_MB1_aligned.bct [ 1.0864 ] tegrasign_v3.py --file mb1_bct_MB1_aligned_sigheader.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_bct_MB1_aligned_sigheader_kdf.yaml [ 1.0880 ] Perform key derivation on mb1_bct_MB1_aligned_sigheader.bct [ 1.1176 ] Key Size is 32 bytes [ 1.1192 ] Performing aes-gcm encryption [ 1.1198 ] --key b32da985d2ddb0dc1c214ce28ce085134cc551b6043706467068c6eb8e29ebbb [ 1.1203 ] --iv 6114c0a9df1d5a3914f6ec7e [ 1.1203 ] --aad 4d4243544016000000000000000000000000000000000000000000000000000400000000000000000000000000000000593f1f85372b5f81e5478a367cb6bf65000000006114c0a9df1d5a3914f6ec7e [ 1.1236 ] Sha saved in mb1_bct_MB1_aligned_sigheader_tmp0_encrypt.sha [ 1.1245 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list mb1_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 1.1262 ] Key size is 384 bytes [ 1.1624 ] Saving pkc public key in pub_key.key [ 1.1632 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa [ 1.1664 ] Error: Skip generating mem_bct because sdram_config is not defined [ 1.1665 ] Error: Skip generating mem_bct because sdram_config is not defined [ 1.1665 ] Copying signatures [ 1.1686 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key [ 1.1814 ] Boot Rom communication [ 1.1837 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader_encrypt.bin.signed --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin.signed --download bct_mb1 mb1_bct_MB1_sigheader_encrypt.bct.signed [ 1.1856 ] BR_CID: 0x89012344705DD3CF8C0000000DFF02C0 [ 1.2153 ] Sending bct_br [ 1.2626 ] Sending mb1 [ 1.2632 ] ERROR: might be timeout in USB write. Error: Return value 3 Command tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader_encrypt.bin.signed --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin.signed --download bct_mb1 mb1_bct_MB1_sigheader_encrypt.bct.signed Reading board information failed.