tbbr_config.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. /*
  2. * Copyright (c) 2016-2022, ARM Limited and Contributors. All rights reserved.
  3. *
  4. * SPDX-License-Identifier: BSD-3-Clause
  5. */
  6. #include <stddef.h>
  7. #include <firmware_image_package.h>
  8. #include "tbbr_config.h"
  9. /* The images used depends on the platform. */
  10. toc_entry_t toc_entries[] = {
  11. {
  12. .name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
  13. .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
  14. .cmdline_name = "scp-fwu-cfg"
  15. },
  16. {
  17. .name = "AP Firmware Updater Configuration BL2U",
  18. .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
  19. .cmdline_name = "ap-fwu-cfg"
  20. },
  21. {
  22. .name = "Firmware Updater NS_BL2U",
  23. .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
  24. .cmdline_name = "fwu"
  25. },
  26. {
  27. .name = "Non-Trusted Firmware Updater certificate",
  28. .uuid = UUID_TRUSTED_FWU_CERT,
  29. .cmdline_name = "fwu-cert"
  30. },
  31. {
  32. .name = "Trusted Boot Firmware BL2",
  33. .uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
  34. .cmdline_name = "tb-fw"
  35. },
  36. {
  37. .name = "SCP Firmware SCP_BL2",
  38. .uuid = UUID_SCP_FIRMWARE_SCP_BL2,
  39. .cmdline_name = "scp-fw"
  40. },
  41. {
  42. .name = "EL3 Runtime Firmware BL31",
  43. .uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
  44. .cmdline_name = "soc-fw"
  45. },
  46. {
  47. .name = "Secure Payload BL32 (Trusted OS)",
  48. .uuid = UUID_SECURE_PAYLOAD_BL32,
  49. .cmdline_name = "tos-fw"
  50. },
  51. {
  52. .name = "Secure Payload BL32 Extra1 (Trusted OS Extra1)",
  53. .uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA1,
  54. .cmdline_name = "tos-fw-extra1"
  55. },
  56. {
  57. .name = "Secure Payload BL32 Extra2 (Trusted OS Extra2)",
  58. .uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA2,
  59. .cmdline_name = "tos-fw-extra2"
  60. },
  61. {
  62. .name = "Non-Trusted Firmware BL33",
  63. .uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
  64. .cmdline_name = "nt-fw"
  65. },
  66. {
  67. .name = "Realm Monitor Management Firmware",
  68. .uuid = UUID_REALM_MONITOR_MGMT_FIRMWARE,
  69. .cmdline_name = "rmm-fw"
  70. },
  71. /* Dynamic Configs */
  72. {
  73. .name = "FW_CONFIG",
  74. .uuid = UUID_FW_CONFIG,
  75. .cmdline_name = "fw-config"
  76. },
  77. {
  78. .name = "HW_CONFIG",
  79. .uuid = UUID_HW_CONFIG,
  80. .cmdline_name = "hw-config"
  81. },
  82. {
  83. .name = "TB_FW_CONFIG",
  84. .uuid = UUID_TB_FW_CONFIG,
  85. .cmdline_name = "tb-fw-config"
  86. },
  87. {
  88. .name = "SOC_FW_CONFIG",
  89. .uuid = UUID_SOC_FW_CONFIG,
  90. .cmdline_name = "soc-fw-config"
  91. },
  92. {
  93. .name = "TOS_FW_CONFIG",
  94. .uuid = UUID_TOS_FW_CONFIG,
  95. .cmdline_name = "tos-fw-config"
  96. },
  97. {
  98. .name = "NT_FW_CONFIG",
  99. .uuid = UUID_NT_FW_CONFIG,
  100. .cmdline_name = "nt-fw-config"
  101. },
  102. /* Key Certificates */
  103. {
  104. .name = "Root Of Trust key certificate",
  105. .uuid = UUID_ROT_KEY_CERT,
  106. .cmdline_name = "rot-cert"
  107. },
  108. {
  109. .name = "Trusted key certificate",
  110. .uuid = UUID_TRUSTED_KEY_CERT,
  111. .cmdline_name = "trusted-key-cert"
  112. },
  113. {
  114. .name = "SCP Firmware key certificate",
  115. .uuid = UUID_SCP_FW_KEY_CERT,
  116. .cmdline_name = "scp-fw-key-cert"
  117. },
  118. {
  119. .name = "SoC Firmware key certificate",
  120. .uuid = UUID_SOC_FW_KEY_CERT,
  121. .cmdline_name = "soc-fw-key-cert"
  122. },
  123. {
  124. .name = "Trusted OS Firmware key certificate",
  125. .uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
  126. .cmdline_name = "tos-fw-key-cert"
  127. },
  128. {
  129. .name = "Non-Trusted Firmware key certificate",
  130. .uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
  131. .cmdline_name = "nt-fw-key-cert"
  132. },
  133. /* Content certificates */
  134. {
  135. .name = "Trusted Boot Firmware BL2 certificate",
  136. .uuid = UUID_TRUSTED_BOOT_FW_CERT,
  137. .cmdline_name = "tb-fw-cert"
  138. },
  139. {
  140. .name = "SCP Firmware content certificate",
  141. .uuid = UUID_SCP_FW_CONTENT_CERT,
  142. .cmdline_name = "scp-fw-cert"
  143. },
  144. {
  145. .name = "SoC Firmware content certificate",
  146. .uuid = UUID_SOC_FW_CONTENT_CERT,
  147. .cmdline_name = "soc-fw-cert"
  148. },
  149. {
  150. .name = "Trusted OS Firmware content certificate",
  151. .uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
  152. .cmdline_name = "tos-fw-cert"
  153. },
  154. {
  155. .name = "Non-Trusted Firmware content certificate",
  156. .uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
  157. .cmdline_name = "nt-fw-cert"
  158. },
  159. {
  160. .name = "SiP owned Secure Partition content certificate",
  161. .uuid = UUID_SIP_SECURE_PARTITION_CONTENT_CERT,
  162. .cmdline_name = "sip-sp-cert"
  163. },
  164. {
  165. .name = "Platform owned Secure Partition content certificate",
  166. .uuid = UUID_PLAT_SECURE_PARTITION_CONTENT_CERT,
  167. .cmdline_name = "plat-sp-cert"
  168. },
  169. {
  170. .name = "CCA Content Certificate",
  171. .uuid = UUID_CCA_CONTENT_CERT,
  172. .cmdline_name = "cca-cert"
  173. },
  174. {
  175. .name = "Core Secure World Key Certificate",
  176. .uuid = UUID_CORE_SWD_KEY_CERT,
  177. .cmdline_name = "core-swd-cert"
  178. },
  179. {
  180. .name = "Platform Key Certificate",
  181. .uuid = UUID_PLAT_KEY_CERT,
  182. .cmdline_name = "plat-key-cert"
  183. },
  184. {
  185. .name = NULL,
  186. .uuid = { {0} },
  187. .cmdline_name = NULL,
  188. }
  189. };