tbbr_config.c 2.79 KB
Newer Older
dp-arm's avatar
dp-arm committed
1
/*
2
 * Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved.
dp-arm's avatar
dp-arm committed
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
dp-arm's avatar
dp-arm committed
5
6
 */

7
#include <firmware_image_package.h>
Isla Mitchell's avatar
Isla Mitchell committed
8
#include <stddef.h>
9

dp-arm's avatar
dp-arm committed
10
11
12
13
#include "tbbr_config.h"

/* The images used depends on the platform. */
toc_entry_t toc_entries[] = {
14
15
16
	{
		.name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
17
		.cmdline_name = "scp-fwu-cfg"
18
19
20
21
	},
	{
		.name = "AP Firmware Updater Configuration BL2U",
		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
22
		.cmdline_name = "ap-fwu-cfg"
23
24
25
26
	},
	{
		.name = "Firmware Updater NS_BL2U",
		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
27
		.cmdline_name = "fwu"
28
29
30
31
	},
	{
		.name = "Non-Trusted Firmware Updater certificate",
		.uuid = UUID_TRUSTED_FWU_CERT,
32
		.cmdline_name = "fwu-cert"
33
34
35
36
	},
	{
		.name = "Trusted Boot Firmware BL2",
		.uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
37
		.cmdline_name = "tb-fw"
38
39
40
41
	},
	{
		.name = "SCP Firmware SCP_BL2",
		.uuid = UUID_SCP_FIRMWARE_SCP_BL2,
42
		.cmdline_name = "scp-fw"
43
44
45
46
	},
	{
		.name = "EL3 Runtime Firmware BL31",
		.uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
47
		.cmdline_name = "soc-fw"
48
49
50
51
	},
	{
		.name = "Secure Payload BL32 (Trusted OS)",
		.uuid = UUID_SECURE_PAYLOAD_BL32,
52
		.cmdline_name = "tos-fw"
53
54
55
56
	},
	{
		.name = "Non-Trusted Firmware BL33",
		.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
57
		.cmdline_name = "nt-fw"
58
	},
59

dp-arm's avatar
dp-arm committed
60
	/* Key Certificates */
61
62
63
	{
		.name = "Root Of Trust key certificate",
		.uuid = UUID_ROT_KEY_CERT,
64
		.cmdline_name = "rot-cert"
65
66
67
68
	},
	{
		.name = "Trusted key certificate",
		.uuid = UUID_TRUSTED_KEY_CERT,
69
		.cmdline_name = "trusted-key-cert"
70
71
72
73
	},
	{
		.name = "SCP Firmware key certificate",
		.uuid = UUID_SCP_FW_KEY_CERT,
74
		.cmdline_name = "scp-fw-key-cert"
75
76
77
78
	},
	{
		.name = "SoC Firmware key certificate",
		.uuid = UUID_SOC_FW_KEY_CERT,
79
		.cmdline_name = "soc-fw-key-cert"
80
81
82
83
	},
	{
		.name = "Trusted OS Firmware key certificate",
		.uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
84
		.cmdline_name = "tos-fw-key-cert"
85
86
87
88
	},
	{
		.name = "Non-Trusted Firmware key certificate",
		.uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
89
		.cmdline_name = "nt-fw-key-cert"
90
	},
91

dp-arm's avatar
dp-arm committed
92
	/* Content certificates */
93
94
95
	{
		.name = "Trusted Boot Firmware BL2 certificate",
		.uuid = UUID_TRUSTED_BOOT_FW_CERT,
96
		.cmdline_name = "tb-fw-cert"
97
98
99
100
	},
	{
		.name = "SCP Firmware content certificate",
		.uuid = UUID_SCP_FW_CONTENT_CERT,
101
		.cmdline_name = "scp-fw-cert"
102
103
104
105
	},
	{
		.name = "SoC Firmware content certificate",
		.uuid = UUID_SOC_FW_CONTENT_CERT,
106
		.cmdline_name = "soc-fw-cert"
107
108
109
110
	},
	{
		.name = "Trusted OS Firmware content certificate",
		.uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
111
		.cmdline_name = "tos-fw-cert"
112
113
114
115
	},
	{
		.name = "Non-Trusted Firmware content certificate",
		.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
116
		.cmdline_name = "nt-fw-cert"
117
118
119
120
121
122
	},
	{
		.name = NULL,
		.uuid = { 0 },
		.cmdline_name = NULL,
	}
dp-arm's avatar
dp-arm committed
123
};