| /* |
| * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions are met: |
| * |
| * Redistributions of source code must retain the above copyright notice, this |
| * list of conditions and the following disclaimer. |
| * |
| * Redistributions in binary form must reproduce the above copyright notice, |
| * this list of conditions and the following disclaimer in the documentation |
| * and/or other materials provided with the distribution. |
| * |
| * Neither the name of ARM nor the names of its contributors may be used |
| * to endorse or promote products derived from this software without specific |
| * prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
| * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
| * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| * POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include <stddef.h> |
| |
| #include "firmware_image_package.h" |
| #include "tbbr_config.h" |
| |
| /* The images used depends on the platform. */ |
| toc_entry_t toc_entries[] = { |
| { |
| .name = "SCP Firmware Updater Configuration FWU SCP_BL2U", |
| .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U, |
| .cmdline_name = "scp-fwu-cfg", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "AP Firmware Updater Configuration BL2U", |
| .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U, |
| .cmdline_name = "ap-fwu-cfg", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Firmware Updater NS_BL2U", |
| .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U, |
| .cmdline_name = "fwu", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Non-Trusted Firmware Updater certificate", |
| .uuid = UUID_TRUSTED_FWU_CERT, |
| .cmdline_name = "fwu-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Trusted Boot Firmware BL2", |
| .uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2, |
| .cmdline_name = "tb-fw", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "SCP Firmware SCP_BL2", |
| .uuid = UUID_SCP_FIRMWARE_SCP_BL2, |
| .cmdline_name = "scp-fw", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "EL3 Runtime Firmware BL31", |
| .uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31, |
| .cmdline_name = "soc-fw", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Secure Payload BL32 (Trusted OS)", |
| .uuid = UUID_SECURE_PAYLOAD_BL32, |
| .cmdline_name = "tos-fw", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Non-Trusted Firmware BL33", |
| .uuid = UUID_NON_TRUSTED_FIRMWARE_BL33, |
| .cmdline_name = "nt-fw", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| /* Key Certificates */ |
| { |
| .name = "Root Of Trust key certificate", |
| .uuid = UUID_ROT_KEY_CERT, |
| .cmdline_name = "rot-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Trusted key certificate", |
| .uuid = UUID_TRUSTED_KEY_CERT, |
| .cmdline_name = "trusted-key-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "SCP Firmware key certificate", |
| .uuid = UUID_SCP_FW_KEY_CERT, |
| .cmdline_name = "scp-fw-key-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "SoC Firmware key certificate", |
| .uuid = UUID_SOC_FW_KEY_CERT, |
| .cmdline_name = "soc-fw-key-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Trusted OS Firmware key certificate", |
| .uuid = UUID_TRUSTED_OS_FW_KEY_CERT, |
| .cmdline_name = "tos-fw-key-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Non-Trusted Firmware key certificate", |
| .uuid = UUID_NON_TRUSTED_FW_KEY_CERT, |
| .cmdline_name = "nt-fw-key-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| /* Content certificates */ |
| { |
| .name = "Trusted Boot Firmware BL2 certificate", |
| .uuid = UUID_TRUSTED_BOOT_FW_CERT, |
| .cmdline_name = "tb-fw-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "SCP Firmware content certificate", |
| .uuid = UUID_SCP_FW_CONTENT_CERT, |
| .cmdline_name = "scp-fw-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "SoC Firmware content certificate", |
| .uuid = UUID_SOC_FW_CONTENT_CERT, |
| .cmdline_name = "soc-fw-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Trusted OS Firmware content certificate", |
| .uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT, |
| .cmdline_name = "tos-fw-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = "Non-Trusted Firmware content certificate", |
| .uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT, |
| .cmdline_name = "nt-fw-cert", |
| .action = 0, |
| .action_arg = NULL |
| }, |
| { |
| .name = NULL, |
| .uuid = { 0 }, |
| .cmdline_name = NULL, |
| .action = 0, |
| .action_arg = NULL |
| } |
| }; |
| |
| size_t toc_entries_len = sizeof(toc_entries) / sizeof(toc_entries[0]); |