blob: b11811cd5ac3b5623c8df614a5db0cbd8bf7b0a1 [file] [log] [blame]
Juan Castillo31a68f02015-04-14 12:49:03 +01001#
laurenw-armd3449782022-04-21 16:50:49 -05002# Copyright (c) 2015-2022, ARM Limited and Contributors. All rights reserved.
Juan Castillo31a68f02015-04-14 12:49:03 +01003#
dp-armfa3cf0b2017-05-03 09:38:09 +01004# SPDX-License-Identifier: BSD-3-Clause
Juan Castillo31a68f02015-04-14 12:49:03 +01005#
6
Antonio Nino Diazd7da2f82018-10-10 11:14:44 +01007PLAT_BL_COMMON_SOURCES += drivers/arm/pl011/${ARCH}/pl011_console.S \
Yatharth Kocharf528faf2016-06-28 16:58:26 +01008 plat/arm/board/common/${ARCH}/board_arm_helpers.S
Juan Castillo31a68f02015-04-14 12:49:03 +01009
Antonio Nino Diazd7da2f82018-10-10 11:14:44 +010010BL1_SOURCES += drivers/cfi/v2m/v2m_flash.c
Juan Castillo31a68f02015-04-14 12:49:03 +010011
Antonio Nino Diazd7da2f82018-10-10 11:14:44 +010012BL2_SOURCES += drivers/cfi/v2m/v2m_flash.c
Juan Castillo31a68f02015-04-14 12:49:03 +010013
14ifneq (${TRUSTED_BOARD_BOOT},0)
Max Shvetsov06dba292019-12-06 11:50:12 +000015ifneq (${ARM_CRYPTOCELL_INTEG}, 1)
16# ROTPK hash location
17ifeq (${ARM_ROTPK_LOCATION}, regs)
18 ARM_ROTPK_LOCATION_ID = ARM_ROTPK_REGS_ID
19else ifeq (${ARM_ROTPK_LOCATION}, devel_rsa)
Max Shvetsov7b753d92020-02-11 12:41:08 +000020 CRYPTO_ALG=rsa
Max Shvetsov06dba292019-12-06 11:50:12 +000021 ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_RSA_ID
22 ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_rsa_sha256.bin
23$(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"'))
24$(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH)
25$(warning Development keys support for FVP is deprecated. Use `regs` \
26option instead)
27else ifeq (${ARM_ROTPK_LOCATION}, devel_ecdsa)
Max Shvetsov7b753d92020-02-11 12:41:08 +000028 CRYPTO_ALG=ec
Max Shvetsov06dba292019-12-06 11:50:12 +000029 ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_ECDSA_ID
30 ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_ecdsa_sha256.bin
31$(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"'))
32$(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH)
33$(warning Development keys support for FVP is deprecated. Use `regs` \
34option instead)
35else
Sandrine Bailleux3e183f92021-04-16 16:08:46 +020036$(error "Unsupported ARM_ROTPK_LOCATION value")
Max Shvetsov06dba292019-12-06 11:50:12 +000037endif
38
39$(eval $(call add_define,ARM_ROTPK_LOCATION_ID))
40
laurenw-armd3449782022-04-21 16:50:49 -050041ifeq (${ENABLE_RME}, 1)
42COT := cca
43endif
44
Max Shvetsov06dba292019-12-06 11:50:12 +000045# Force generation of the new hash if ROT_KEY is specified
46ifdef ROT_KEY
47 HASH_PREREQUISITES = $(ROT_KEY) FORCE
Max Shvetsov06dba292019-12-06 11:50:12 +000048else
49 HASH_PREREQUISITES = $(ROT_KEY)
50endif
51
52$(ARM_ROTPK_HASH) : $(HASH_PREREQUISITES)
53ifndef ROT_KEY
54 $(error Cannot generate hash: no ROT_KEY defined)
55endif
Max Shvetsov7b753d92020-02-11 12:41:08 +000056 openssl ${CRYPTO_ALG} -in $< -pubout -outform DER | openssl dgst \
Max Shvetsov06dba292019-12-06 11:50:12 +000057 -sha256 -binary > $@
58
59# Certificate NV-Counters. Use values corresponding to tied off values in
60# ARM development platforms
61TFW_NVCTR_VAL ?= 31
62NTFW_NVCTR_VAL ?= 223
63else
64# Certificate NV-Counters when CryptoCell is integrated. For development
65# platforms we set the counter to first valid value.
66TFW_NVCTR_VAL ?= 0
67NTFW_NVCTR_VAL ?= 0
68endif
69BL1_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \
70 plat/arm/board/common/rotpk/arm_dev_rotpk.S
71BL2_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \
72 plat/arm/board/common/rotpk/arm_dev_rotpk.S
Juan Castillo31a68f02015-04-14 12:49:03 +010073
Sandrine Bailleux012f8712020-02-06 14:59:33 +010074# Allows platform code to provide implementation variants depending on the
75# selected chain of trust.
76$(eval $(call add_define,ARM_COT_${COT}))
77
78ifeq (${COT},dualroot)
79# Platform Root of Trust key files.
80ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_rsa.pem
81ARM_PROTPK_HASH := plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin
82
83# Provide the private key to cert_create tool. It needs it to sign the images.
84PROT_KEY := ${ARM_PROT_KEY}
85
86$(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"'))
87
88BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S
89BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S
90
91$(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
laurenw-armd3449782022-04-21 16:50:49 -050092$(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
93endif
94
95ifeq (${COT},cca)
96# Platform and Secure World Root of Trust key files.
97ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_rsa.pem
98ARM_PROTPK_HASH := plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin
99ARM_SWD_ROT_KEY := plat/arm/board/common/swd_rotpk/arm_swd_rotprivk_rsa.pem
100ARM_SWD_ROTPK_HASH := plat/arm/board/common/swd_rotpk/arm_swd_rotpk_rsa_sha256.bin
101
102# Provide the private keys to cert_create tool. It needs them to sign the images.
103PROT_KEY := ${ARM_PROT_KEY}
104SWD_ROT_KEY := ${ARM_SWD_ROT_KEY}
105
106$(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"'))
107$(eval $(call add_define_val,ARM_SWD_ROTPK_HASH,'"$(ARM_SWD_ROTPK_HASH)"'))
108
109BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S \
110 plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
111BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S \
112 plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
113
114$(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
115$(BUILD_PLAT)/bl1/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK_HASH)
Sandrine Bailleux012f8712020-02-06 14:59:33 +0100116$(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
laurenw-armd3449782022-04-21 16:50:49 -0500117$(BUILD_PLAT)/bl2/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK_HASH)
Sandrine Bailleux012f8712020-02-06 14:59:33 +0100118endif
119
Juan Castillo31a68f02015-04-14 12:49:03 +0100120endif