blob: cdbf38959326b901864854d9fe1e019e7ef74a22 [file] [log] [blame]
dp-arm4972ec52016-05-25 16:20:20 +01001/*
laurenw-armcbf61542022-04-21 16:36:26 -05002 * Copyright (c) 2016-2022, ARM Limited and Contributors. All rights reserved.
dp-arm4972ec52016-05-25 16:20:20 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
dp-arm4972ec52016-05-25 16:20:20 +01005 */
6
Isla Mitchell99305012017-07-11 14:54:08 +01007#include <stddef.h>
Masahiro Yamadae3a2b312017-05-08 18:29:03 +09008
Isla Mitchell751f56b2017-07-14 10:46:32 +01009#include <firmware_image_package.h>
10
dp-arm4972ec52016-05-25 16:20:20 +010011#include "tbbr_config.h"
12
13/* The images used depends on the platform. */
14toc_entry_t toc_entries[] = {
dp-arm715ef422016-08-30 14:18:58 +010015 {
16 .name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
17 .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
dp-arm90d2f0e2016-11-14 15:54:32 +000018 .cmdline_name = "scp-fwu-cfg"
dp-arm715ef422016-08-30 14:18:58 +010019 },
20 {
21 .name = "AP Firmware Updater Configuration BL2U",
22 .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
dp-arm90d2f0e2016-11-14 15:54:32 +000023 .cmdline_name = "ap-fwu-cfg"
dp-arm715ef422016-08-30 14:18:58 +010024 },
25 {
26 .name = "Firmware Updater NS_BL2U",
27 .uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
dp-arm90d2f0e2016-11-14 15:54:32 +000028 .cmdline_name = "fwu"
dp-arm715ef422016-08-30 14:18:58 +010029 },
30 {
31 .name = "Non-Trusted Firmware Updater certificate",
32 .uuid = UUID_TRUSTED_FWU_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +000033 .cmdline_name = "fwu-cert"
dp-arm715ef422016-08-30 14:18:58 +010034 },
35 {
36 .name = "Trusted Boot Firmware BL2",
37 .uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
dp-arm90d2f0e2016-11-14 15:54:32 +000038 .cmdline_name = "tb-fw"
dp-arm715ef422016-08-30 14:18:58 +010039 },
40 {
41 .name = "SCP Firmware SCP_BL2",
42 .uuid = UUID_SCP_FIRMWARE_SCP_BL2,
dp-arm90d2f0e2016-11-14 15:54:32 +000043 .cmdline_name = "scp-fw"
dp-arm715ef422016-08-30 14:18:58 +010044 },
45 {
46 .name = "EL3 Runtime Firmware BL31",
47 .uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
dp-arm90d2f0e2016-11-14 15:54:32 +000048 .cmdline_name = "soc-fw"
dp-arm715ef422016-08-30 14:18:58 +010049 },
50 {
51 .name = "Secure Payload BL32 (Trusted OS)",
52 .uuid = UUID_SECURE_PAYLOAD_BL32,
dp-arm90d2f0e2016-11-14 15:54:32 +000053 .cmdline_name = "tos-fw"
dp-arm715ef422016-08-30 14:18:58 +010054 },
55 {
Summer Qin80726782017-04-20 16:28:39 +010056 .name = "Secure Payload BL32 Extra1 (Trusted OS Extra1)",
57 .uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA1,
58 .cmdline_name = "tos-fw-extra1"
59 },
60 {
61 .name = "Secure Payload BL32 Extra2 (Trusted OS Extra2)",
62 .uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA2,
63 .cmdline_name = "tos-fw-extra2"
64 },
65 {
dp-arm715ef422016-08-30 14:18:58 +010066 .name = "Non-Trusted Firmware BL33",
67 .uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
dp-arm90d2f0e2016-11-14 15:54:32 +000068 .cmdline_name = "nt-fw"
dp-arm715ef422016-08-30 14:18:58 +010069 },
Zelalem Aweke4d37db82021-07-11 18:33:20 -050070 {
71 .name = "Realm Monitor Management Firmware",
72 .uuid = UUID_REALM_MONITOR_MGMT_FIRMWARE,
73 .cmdline_name = "rmm-fw"
74 },
Soby Mathew2ffb4732017-11-07 16:50:31 +000075 /* Dynamic Configs */
76 {
Manish V Badarkhee9207d62020-06-11 21:02:03 +010077 .name = "FW_CONFIG",
78 .uuid = UUID_FW_CONFIG,
79 .cmdline_name = "fw-config"
80 },
81 {
Soby Mathew2ffb4732017-11-07 16:50:31 +000082 .name = "HW_CONFIG",
83 .uuid = UUID_HW_CONFIG,
84 .cmdline_name = "hw-config"
85 },
86 {
87 .name = "TB_FW_CONFIG",
88 .uuid = UUID_TB_FW_CONFIG,
89 .cmdline_name = "tb-fw-config"
90 },
Soby Mathew2bb78d32018-03-29 14:29:55 +010091 {
92 .name = "SOC_FW_CONFIG",
93 .uuid = UUID_SOC_FW_CONFIG,
94 .cmdline_name = "soc-fw-config"
95 },
96 {
97 .name = "TOS_FW_CONFIG",
98 .uuid = UUID_TOS_FW_CONFIG,
99 .cmdline_name = "tos-fw-config"
100 },
101 {
102 .name = "NT_FW_CONFIG",
103 .uuid = UUID_NT_FW_CONFIG,
104 .cmdline_name = "nt-fw-config"
105 },
dp-arm4972ec52016-05-25 16:20:20 +0100106 /* Key Certificates */
dp-arm715ef422016-08-30 14:18:58 +0100107 {
108 .name = "Root Of Trust key certificate",
109 .uuid = UUID_ROT_KEY_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000110 .cmdline_name = "rot-cert"
dp-arm715ef422016-08-30 14:18:58 +0100111 },
112 {
113 .name = "Trusted key certificate",
114 .uuid = UUID_TRUSTED_KEY_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000115 .cmdline_name = "trusted-key-cert"
dp-arm715ef422016-08-30 14:18:58 +0100116 },
117 {
118 .name = "SCP Firmware key certificate",
119 .uuid = UUID_SCP_FW_KEY_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000120 .cmdline_name = "scp-fw-key-cert"
dp-arm715ef422016-08-30 14:18:58 +0100121 },
122 {
123 .name = "SoC Firmware key certificate",
124 .uuid = UUID_SOC_FW_KEY_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000125 .cmdline_name = "soc-fw-key-cert"
dp-arm715ef422016-08-30 14:18:58 +0100126 },
127 {
128 .name = "Trusted OS Firmware key certificate",
129 .uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000130 .cmdline_name = "tos-fw-key-cert"
dp-arm715ef422016-08-30 14:18:58 +0100131 },
132 {
133 .name = "Non-Trusted Firmware key certificate",
134 .uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000135 .cmdline_name = "nt-fw-key-cert"
dp-arm715ef422016-08-30 14:18:58 +0100136 },
dp-arm90d2f0e2016-11-14 15:54:32 +0000137
dp-arm4972ec52016-05-25 16:20:20 +0100138 /* Content certificates */
dp-arm715ef422016-08-30 14:18:58 +0100139 {
140 .name = "Trusted Boot Firmware BL2 certificate",
141 .uuid = UUID_TRUSTED_BOOT_FW_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000142 .cmdline_name = "tb-fw-cert"
dp-arm715ef422016-08-30 14:18:58 +0100143 },
144 {
145 .name = "SCP Firmware content certificate",
146 .uuid = UUID_SCP_FW_CONTENT_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000147 .cmdline_name = "scp-fw-cert"
dp-arm715ef422016-08-30 14:18:58 +0100148 },
149 {
150 .name = "SoC Firmware content certificate",
151 .uuid = UUID_SOC_FW_CONTENT_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000152 .cmdline_name = "soc-fw-cert"
dp-arm715ef422016-08-30 14:18:58 +0100153 },
154 {
155 .name = "Trusted OS Firmware content certificate",
156 .uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000157 .cmdline_name = "tos-fw-cert"
dp-arm715ef422016-08-30 14:18:58 +0100158 },
159 {
160 .name = "Non-Trusted Firmware content certificate",
161 .uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
dp-arm90d2f0e2016-11-14 15:54:32 +0000162 .cmdline_name = "nt-fw-cert"
dp-arm715ef422016-08-30 14:18:58 +0100163 },
164 {
Manish Pandey0a658842020-05-22 12:27:28 +0100165 .name = "SiP owned Secure Partition content certificate",
166 .uuid = UUID_SIP_SECURE_PARTITION_CONTENT_CERT,
167 .cmdline_name = "sip-sp-cert"
168 },
169 {
Manish Pandey3f0d7af2020-07-24 16:43:54 +0100170 .name = "Platform owned Secure Partition content certificate",
171 .uuid = UUID_PLAT_SECURE_PARTITION_CONTENT_CERT,
172 .cmdline_name = "plat-sp-cert"
173 },
174 {
laurenw-armcbf61542022-04-21 16:36:26 -0500175 .name = "CCA Content Certificate",
176 .uuid = UUID_CCA_CONTENT_CERT,
177 .cmdline_name = "cca-cert"
178 },
179 {
180 .name = "Core Secure World Key Certificate",
181 .uuid = UUID_CORE_SWD_KEY_CERT,
182 .cmdline_name = "core-swd-cert"
183 },
184 {
185 .name = "Platform Key Certificate",
186 .uuid = UUID_PLAT_KEY_CERT,
187 .cmdline_name = "plat-key-cert"
188 },
189 {
dp-arm715ef422016-08-30 14:18:58 +0100190 .name = NULL,
Roberto Vargaseace8f12018-04-26 13:36:53 +0100191 .uuid = { {0} },
dp-arm715ef422016-08-30 14:18:58 +0100192 .cmdline_name = NULL,
dp-arm715ef422016-08-30 14:18:58 +0100193 }
dp-arm4972ec52016-05-25 16:20:20 +0100194};