tbbr_config.c 3.94 KB
Newer Older
dp-arm's avatar
dp-arm committed
1
/*
2
 * Copyright (c) 2016-2020, ARM Limited and Contributors. All rights reserved.
dp-arm's avatar
dp-arm committed
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
dp-arm's avatar
dp-arm committed
5
6
 */

Isla Mitchell's avatar
Isla Mitchell committed
7
#include <stddef.h>
8

Isla Mitchell's avatar
Isla Mitchell committed
9
10
#include <firmware_image_package.h>

dp-arm's avatar
dp-arm committed
11
12
13
14
#include "tbbr_config.h"

/* The images used depends on the platform. */
toc_entry_t toc_entries[] = {
15
16
17
	{
		.name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
18
		.cmdline_name = "scp-fwu-cfg"
19
20
21
22
	},
	{
		.name = "AP Firmware Updater Configuration BL2U",
		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
23
		.cmdline_name = "ap-fwu-cfg"
24
25
26
27
	},
	{
		.name = "Firmware Updater NS_BL2U",
		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
28
		.cmdline_name = "fwu"
29
30
31
32
	},
	{
		.name = "Non-Trusted Firmware Updater certificate",
		.uuid = UUID_TRUSTED_FWU_CERT,
33
		.cmdline_name = "fwu-cert"
34
35
36
37
	},
	{
		.name = "Trusted Boot Firmware BL2",
		.uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
38
		.cmdline_name = "tb-fw"
39
40
41
42
	},
	{
		.name = "SCP Firmware SCP_BL2",
		.uuid = UUID_SCP_FIRMWARE_SCP_BL2,
43
		.cmdline_name = "scp-fw"
44
45
46
47
	},
	{
		.name = "EL3 Runtime Firmware BL31",
		.uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
48
		.cmdline_name = "soc-fw"
49
50
51
52
	},
	{
		.name = "Secure Payload BL32 (Trusted OS)",
		.uuid = UUID_SECURE_PAYLOAD_BL32,
53
		.cmdline_name = "tos-fw"
54
	},
55
56
57
58
59
60
61
62
63
64
	{
		.name = "Secure Payload BL32 Extra1 (Trusted OS Extra1)",
		.uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA1,
		.cmdline_name = "tos-fw-extra1"
	},
	{
		.name = "Secure Payload BL32 Extra2 (Trusted OS Extra2)",
		.uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA2,
		.cmdline_name = "tos-fw-extra2"
	},
65
66
67
	{
		.name = "Non-Trusted Firmware BL33",
		.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
68
		.cmdline_name = "nt-fw"
69
	},
Soby Mathew's avatar
Soby Mathew committed
70
	/* Dynamic Configs */
71
72
73
74
75
	{
		.name = "FW_CONFIG",
		.uuid = UUID_FW_CONFIG,
		.cmdline_name = "fw-config"
	},
Soby Mathew's avatar
Soby Mathew committed
76
77
78
79
80
81
82
83
84
85
	{
		.name = "HW_CONFIG",
		.uuid = UUID_HW_CONFIG,
		.cmdline_name = "hw-config"
	},
	{
		.name = "TB_FW_CONFIG",
		.uuid = UUID_TB_FW_CONFIG,
		.cmdline_name = "tb-fw-config"
	},
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
	{
		.name = "SOC_FW_CONFIG",
		.uuid = UUID_SOC_FW_CONFIG,
		.cmdline_name = "soc-fw-config"
	},
	{
		.name = "TOS_FW_CONFIG",
		.uuid = UUID_TOS_FW_CONFIG,
		.cmdline_name = "tos-fw-config"
	},
	{
		.name = "NT_FW_CONFIG",
		.uuid = UUID_NT_FW_CONFIG,
		.cmdline_name = "nt-fw-config"
	},
dp-arm's avatar
dp-arm committed
101
	/* Key Certificates */
102
103
104
	{
		.name = "Root Of Trust key certificate",
		.uuid = UUID_ROT_KEY_CERT,
105
		.cmdline_name = "rot-cert"
106
107
108
109
	},
	{
		.name = "Trusted key certificate",
		.uuid = UUID_TRUSTED_KEY_CERT,
110
		.cmdline_name = "trusted-key-cert"
111
112
113
114
	},
	{
		.name = "SCP Firmware key certificate",
		.uuid = UUID_SCP_FW_KEY_CERT,
115
		.cmdline_name = "scp-fw-key-cert"
116
117
118
119
	},
	{
		.name = "SoC Firmware key certificate",
		.uuid = UUID_SOC_FW_KEY_CERT,
120
		.cmdline_name = "soc-fw-key-cert"
121
122
123
124
	},
	{
		.name = "Trusted OS Firmware key certificate",
		.uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
125
		.cmdline_name = "tos-fw-key-cert"
126
127
128
129
	},
	{
		.name = "Non-Trusted Firmware key certificate",
		.uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
130
		.cmdline_name = "nt-fw-key-cert"
131
	},
132

dp-arm's avatar
dp-arm committed
133
	/* Content certificates */
134
135
136
	{
		.name = "Trusted Boot Firmware BL2 certificate",
		.uuid = UUID_TRUSTED_BOOT_FW_CERT,
137
		.cmdline_name = "tb-fw-cert"
138
139
140
141
	},
	{
		.name = "SCP Firmware content certificate",
		.uuid = UUID_SCP_FW_CONTENT_CERT,
142
		.cmdline_name = "scp-fw-cert"
143
144
145
146
	},
	{
		.name = "SoC Firmware content certificate",
		.uuid = UUID_SOC_FW_CONTENT_CERT,
147
		.cmdline_name = "soc-fw-cert"
148
149
150
151
	},
	{
		.name = "Trusted OS Firmware content certificate",
		.uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
152
		.cmdline_name = "tos-fw-cert"
153
154
155
156
	},
	{
		.name = "Non-Trusted Firmware content certificate",
		.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
157
		.cmdline_name = "nt-fw-cert"
158
	},
159
160
161
162
163
	{
		.name = "SiP owned Secure Partition content certificate",
		.uuid = UUID_SIP_SECURE_PARTITION_CONTENT_CERT,
		.cmdline_name = "sip-sp-cert"
	},
164
165
166
167
168
	{
		.name = "Platform owned Secure Partition content certificate",
		.uuid = UUID_PLAT_SECURE_PARTITION_CONTENT_CERT,
		.cmdline_name = "plat-sp-cert"
	},
169
170
	{
		.name = NULL,
171
		.uuid = { {0} },
172
173
		.cmdline_name = NULL,
	}
dp-arm's avatar
dp-arm committed
174
};