Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
adam.huang
Arm Trusted Firmware
Commits
e4686fd8
Unverified
Commit
e4686fd8
authored
Jul 19, 2018
by
danh-arm
Committed by
GitHub
Jul 19, 2018
Browse files
Merge pull request #1449 from theopolis/hikey-tbb
hikey: Add experimental TBB support
parents
8ff0dfa7
e59a3bff
Changes
6
Hide whitespace changes
Inline
Side-by-side
plat/hisilicon/hikey/hikey_io_storage.c
View file @
e4686fd8
...
@@ -89,6 +89,44 @@ static const io_uuid_spec_t scp_bl2_uuid_spec = {
...
@@ -89,6 +89,44 @@ static const io_uuid_spec_t scp_bl2_uuid_spec = {
.
uuid
=
UUID_SCP_FIRMWARE_SCP_BL2
,
.
uuid
=
UUID_SCP_FIRMWARE_SCP_BL2
,
};
};
#if TRUSTED_BOARD_BOOT
static
const
io_uuid_spec_t
trusted_key_cert_uuid_spec
=
{
.
uuid
=
UUID_TRUSTED_KEY_CERT
,
};
static
const
io_uuid_spec_t
scp_fw_key_cert_uuid_spec
=
{
.
uuid
=
UUID_SCP_FW_KEY_CERT
,
};
static
const
io_uuid_spec_t
soc_fw_key_cert_uuid_spec
=
{
.
uuid
=
UUID_SOC_FW_KEY_CERT
,
};
static
const
io_uuid_spec_t
tos_fw_key_cert_uuid_spec
=
{
.
uuid
=
UUID_TRUSTED_OS_FW_KEY_CERT
,
};
static
const
io_uuid_spec_t
nt_fw_key_cert_uuid_spec
=
{
.
uuid
=
UUID_NON_TRUSTED_FW_KEY_CERT
,
};
static
const
io_uuid_spec_t
scp_fw_cert_uuid_spec
=
{
.
uuid
=
UUID_SCP_FW_CONTENT_CERT
,
};
static
const
io_uuid_spec_t
soc_fw_cert_uuid_spec
=
{
.
uuid
=
UUID_SOC_FW_CONTENT_CERT
,
};
static
const
io_uuid_spec_t
tos_fw_cert_uuid_spec
=
{
.
uuid
=
UUID_TRUSTED_OS_FW_CONTENT_CERT
,
};
static
const
io_uuid_spec_t
nt_fw_cert_uuid_spec
=
{
.
uuid
=
UUID_NON_TRUSTED_FW_CONTENT_CERT
,
};
#endif
/* TRUSTED_BOARD_BOOT */
static
const
struct
plat_io_policy
policies
[]
=
{
static
const
struct
plat_io_policy
policies
[]
=
{
[
FIP_IMAGE_ID
]
=
{
[
FIP_IMAGE_ID
]
=
{
&
emmc_dev_handle
,
&
emmc_dev_handle
,
...
@@ -124,7 +162,54 @@ static const struct plat_io_policy policies[] = {
...
@@ -124,7 +162,54 @@ static const struct plat_io_policy policies[] = {
&
fip_dev_handle
,
&
fip_dev_handle
,
(
uintptr_t
)
&
bl33_uuid_spec
,
(
uintptr_t
)
&
bl33_uuid_spec
,
check_fip
check_fip
}
},
#if TRUSTED_BOARD_BOOT
[
TRUSTED_KEY_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
trusted_key_cert_uuid_spec
,
check_fip
},
[
SCP_FW_KEY_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
scp_fw_key_cert_uuid_spec
,
check_fip
},
[
SOC_FW_KEY_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
soc_fw_key_cert_uuid_spec
,
check_fip
},
[
TRUSTED_OS_FW_KEY_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
tos_fw_key_cert_uuid_spec
,
check_fip
},
[
NON_TRUSTED_FW_KEY_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
nt_fw_key_cert_uuid_spec
,
check_fip
},
[
SCP_FW_CONTENT_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
scp_fw_cert_uuid_spec
,
check_fip
},
[
SOC_FW_CONTENT_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
soc_fw_cert_uuid_spec
,
check_fip
},
[
TRUSTED_OS_FW_CONTENT_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
tos_fw_cert_uuid_spec
,
check_fip
},
[
NON_TRUSTED_FW_CONTENT_CERT_ID
]
=
{
&
fip_dev_handle
,
(
uintptr_t
)
&
nt_fw_cert_uuid_spec
,
check_fip
},
#endif
/* TRUSTED_BOARD_BOOT */
};
};
static
int
check_emmc
(
const
uintptr_t
spec
)
static
int
check_emmc
(
const
uintptr_t
spec
)
...
...
plat/hisilicon/hikey/hikey_rotpk.S
0 → 100644
View file @
e4686fd8
/*
*
Copyright
(
c
)
2018
,
ARM
Limited
and
Contributors
.
All
rights
reserved
.
*
*
SPDX
-
License
-
Identifier
:
BSD
-
3
-
Clause
*/
.
global
hikey_rotpk_hash
.
global
hikey_rotpk_hash_end
.
section
.
rodata
.
hikey_rotpk_hash
,
"a"
hikey_rotpk_hash
:
/
*
DER
header
*/
.
byte
0x30
,
0x31
,
0x30
,
0x0D
,
0x06
,
0x09
,
0x60
,
0x86
,
0x48
.
byte
0x01
,
0x65
,
0x03
,
0x04
,
0x02
,
0x01
,
0x05
,
0x00
,
0x04
,
0x20
/
*
SHA256
*/
.
incbin
ROTPK_HASH
hikey_rotpk_hash_end
:
plat/hisilicon/hikey/hikey_tbbr.c
0 → 100644
View file @
e4686fd8
/*
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
#include <platform.h>
extern
char
hikey_rotpk_hash
[],
hikey_rotpk_hash_end
[];
int
plat_get_rotpk_info
(
void
*
cookie
,
void
**
key_ptr
,
unsigned
int
*
key_len
,
unsigned
int
*
flags
)
{
*
key_ptr
=
hikey_rotpk_hash
;
*
key_len
=
hikey_rotpk_hash_end
-
hikey_rotpk_hash
;
*
flags
=
ROTPK_IS_HASH
;
return
0
;
}
int
plat_get_nv_ctr
(
void
*
cookie
,
unsigned
int
*
nv_ctr
)
{
*
nv_ctr
=
0
;
return
0
;
}
int
plat_set_nv_ctr
(
void
*
cookie
,
unsigned
int
nv_ctr
)
{
return
1
;
}
plat/hisilicon/hikey/include/hikey_layout.h
View file @
e4686fd8
...
@@ -58,10 +58,10 @@
...
@@ -58,10 +58,10 @@
* + loader +
* + loader +
* ++++++++++ 0xF980_1000
* ++++++++++ 0xF980_1000
* + BL2 +
* + BL2 +
* ++++++++++ 0xF98
1_8
000
* ++++++++++ 0xF98
3_0
000
*/
*/
#define BL2_BASE (BL1_RO_BASE)
/* 0xf980_1000 */
#define BL2_BASE (BL1_RO_BASE)
/* 0xf980_1000 */
#define BL2_LIMIT (0xF98
18
000)
/* 0xf98
1_8
000 */
#define BL2_LIMIT (0xF98
30
000)
/* 0xf98
3_0
000 */
/*
/*
* SCP_BL2 specific defines.
* SCP_BL2 specific defines.
...
...
plat/hisilicon/hikey/include/platform_def.h
View file @
e4686fd8
...
@@ -21,7 +21,7 @@
...
@@ -21,7 +21,7 @@
*/
*/
/* Size of cacheable stacks */
/* Size of cacheable stacks */
#define PLATFORM_STACK_SIZE 0x
8
00
#define PLATFORM_STACK_SIZE 0x
10
00
#define FIRMWARE_WELCOME_STR "Booting Trusted Firmware\n"
#define FIRMWARE_WELCOME_STR "Booting Trusted Firmware\n"
...
...
plat/hisilicon/hikey/platform.mk
View file @
e4686fd8
...
@@ -122,6 +122,42 @@ BL31_SOURCES += plat/hisilicon/hikey/hisi_sip_svc.c \
...
@@ -122,6 +122,42 @@ BL31_SOURCES += plat/hisilicon/hikey/hisi_sip_svc.c \
lib/pmf/pmf_smc.c
lib/pmf/pmf_smc.c
endif
endif
ifneq
(${TRUSTED_BOARD_BOOT},0)
include
drivers/auth/mbedtls/mbedtls_crypto.mk
include
drivers/auth/mbedtls/mbedtls_x509.mk
USE_TBBR_DEFS
:=
1
AUTH_SOURCES
:=
drivers/auth/auth_mod.c
\
drivers/auth/crypto_mod.c
\
drivers/auth/img_parser_mod.c
\
drivers/auth/tbbr/tbbr_cot.c
BL2_SOURCES
+=
${AUTH_SOURCES}
\
plat/common/tbbr/plat_tbbr.c
\
plat/hisilicon/hikey/hikey_tbbr.c
\
plat/hisilicon/hikey/hikey_rotpk.S
ROT_KEY
=
$(BUILD_PLAT)
/rot_key.pem
ROTPK_HASH
=
$(BUILD_PLAT)
/rotpk_sha256.bin
$(eval
$(call
add_define_val,ROTPK_HASH,
'"$(ROTPK_HASH)"'
))
$(BUILD_PLAT)/bl2/hikey_rotpk.o
:
$(ROTPK_HASH)
certificates
:
$(ROT_KEY)
$(ROT_KEY)
:
| $(BUILD_PLAT)
@
echo
" OPENSSL
$@
"
$(Q)
openssl genrsa 2048
>
$@
2>/dev/null
$(ROTPK_HASH)
:
$(ROT_KEY)
@
echo
" OPENSSL
$@
"
$(Q)
openssl rsa
-in
$<
-pubout
-outform
DER 2>/dev/null |
\
openssl dgst
-sha256
-binary
>
$@
2>/dev/null
override
BL1_SOURCES
=
endif
# Enable workarounds for selected Cortex-A53 errata.
# Enable workarounds for selected Cortex-A53 errata.
ERRATA_A53_836870
:=
1
ERRATA_A53_836870
:=
1
ERRATA_A53_843419
:=
1
ERRATA_A53_843419
:=
1
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment