123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134 |
- #
- # Copyright (c) 2015-2023, Arm Limited and Contributors. All rights reserved.
- #
- # SPDX-License-Identifier: BSD-3-Clause
- #
- PLAT_BL_COMMON_SOURCES += drivers/arm/pl011/${ARCH}/pl011_console.S \
- plat/arm/board/common/${ARCH}/board_arm_helpers.S
- BL1_SOURCES += drivers/cfi/v2m/v2m_flash.c
- BL2_SOURCES += drivers/cfi/v2m/v2m_flash.c
- ifneq (${TRUSTED_BOARD_BOOT},0)
- ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_dev_rotpk.S
- # ROTPK hash location
- ifeq (${ARM_ROTPK_LOCATION}, regs)
- ARM_ROTPK_LOCATION_ID = ARM_ROTPK_REGS_ID
- else ifeq (${ARM_ROTPK_LOCATION}, devel_rsa)
- CRYPTO_ALG=rsa
- ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_RSA_ID
- ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_rsa_sha256.bin
- $(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"'))
- $(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH)
- $(warning Development keys support for FVP is deprecated. Use `regs` \
- option instead)
- else ifeq (${ARM_ROTPK_LOCATION}, devel_ecdsa)
- CRYPTO_ALG=ec
- ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_ECDSA_ID
- ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_ecdsa_sha256.bin
- $(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"'))
- $(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH)
- $(warning Development keys support for FVP is deprecated. Use `regs` \
- option instead)
- else ifeq (${ARM_ROTPK_LOCATION}, devel_full_dev_rsa_key)
- CRYPTO_ALG=rsa
- ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_FULL_DEV_RSA_KEY_ID
- ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_full_dev_rsa_rotpk.S
- $(warning Development keys support for FVP is deprecated. Use `regs` \
- option instead)
- else ifeq (${ARM_ROTPK_LOCATION}, devel_full_dev_ecdsa_key)
- CRYPTO_ALG=ec
- ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_FULL_DEV_ECDSA_KEY_ID
- ifeq (${KEY_SIZE},384)
- ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_full_dev_ecdsa_p384_rotpk.S
- else
- ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_full_dev_ecdsa_p256_rotpk.S
- endif
- $(warning Development keys support for FVP is deprecated. Use `regs` \
- option instead)
- else
- $(error "Unsupported ARM_ROTPK_LOCATION value")
- endif
- $(eval $(call add_define,ARM_ROTPK_LOCATION_ID))
- ifeq (${ENABLE_RME}, 1)
- COT := cca
- endif
- # Force generation of the new hash if ROT_KEY is specified
- ifdef ROT_KEY
- HASH_PREREQUISITES = $(ROT_KEY) FORCE
- endif
- $(ARM_ROTPK_HASH) : $(HASH_PREREQUISITES)
- ifndef ROT_KEY
- $(error Cannot generate hash: no ROT_KEY defined)
- endif
- ${OPENSSL_BIN_PATH}/openssl ${CRYPTO_ALG} -in $< -pubout -outform DER | \
- ${OPENSSL_BIN_PATH}/openssl dgst -sha256 -binary > $@
- # Certificate NV-Counters. Use values corresponding to tied off values in
- # ARM development platforms
- TFW_NVCTR_VAL ?= 31
- NTFW_NVCTR_VAL ?= 223
- # The CCA Non-Volatile Counter only exists on some Arm development platforms.
- # On others, we mock it by aliasing it to the Trusted Firmware Non-Volatile counter,
- # hence we set both counters to the same default value.
- CCAFW_NVCTR_VAL ?= 31
- BL1_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \
- ${ARM_ROTPK_S}
- BL2_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \
- ${ARM_ROTPK_S}
- # Allows platform code to provide implementation variants depending on the
- # selected chain of trust.
- $(eval $(call add_define,ARM_COT_${COT}))
- ifeq (${COT},dualroot)
- # Platform Root of Trust key files.
- ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_rsa.pem
- ARM_PROTPK_HASH := plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin
- # Provide the private key to cert_create tool. It needs it to sign the images.
- PROT_KEY := ${ARM_PROT_KEY}
- $(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"'))
- BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S
- BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S
- $(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
- $(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
- endif
- ifeq (${COT},cca)
- # Platform and Secure World Root of Trust key files.
- ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_rsa.pem
- ARM_PROTPK_HASH := plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin
- ARM_SWD_ROT_KEY := plat/arm/board/common/swd_rotpk/arm_swd_rotprivk_rsa.pem
- ARM_SWD_ROTPK_HASH := plat/arm/board/common/swd_rotpk/arm_swd_rotpk_rsa_sha256.bin
- # Provide the private keys to cert_create tool. It needs them to sign the images.
- PROT_KEY := ${ARM_PROT_KEY}
- SWD_ROT_KEY := ${ARM_SWD_ROT_KEY}
- $(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"'))
- $(eval $(call add_define_val,ARM_SWD_ROTPK_HASH,'"$(ARM_SWD_ROTPK_HASH)"'))
- BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S \
- plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
- BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S \
- plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
- $(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
- $(BUILD_PLAT)/bl1/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK_HASH)
- $(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
- $(BUILD_PLAT)/bl2/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK_HASH)
- endif
- endif
|