blob: a81f0e442bf694e9dfb96f13428929d15d34857c [file] [log] [blame]
Juan Castillo11abdcd2014-10-21 11:30:42 +01001/*
2 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Juan Castillo11abdcd2014-10-21 11:30:42 +01005 */
6
Juan Castilloe6d30e92015-06-12 11:27:59 +01007#include "tbbr/tbb_key.h"
Juan Castillo11abdcd2014-10-21 11:30:42 +01008
9/*
10 * Keys used to establish the chain of trust
11 *
12 * The order of the keys must follow the enumeration specified in tbb_key.h
13 */
Juan Castilloe6d30e92015-06-12 11:27:59 +010014static key_t tbb_keys[] = {
15 [ROT_KEY] = {
Juan Castillo11abdcd2014-10-21 11:30:42 +010016 .id = ROT_KEY,
Juan Castillo1218dd52015-07-03 16:23:16 +010017 .opt = "rot-key",
Juan Castillo212f7382015-12-15 16:37:57 +000018 .help_msg = "Root Of Trust key (input/output file)",
Juan Castillo11abdcd2014-10-21 11:30:42 +010019 .desc = "Root Of Trust key"
20 },
Juan Castilloe6d30e92015-06-12 11:27:59 +010021 [TRUSTED_WORLD_KEY] = {
Juan Castillo11abdcd2014-10-21 11:30:42 +010022 .id = TRUSTED_WORLD_KEY,
Juan Castillo1218dd52015-07-03 16:23:16 +010023 .opt = "trusted-world-key",
Juan Castillo212f7382015-12-15 16:37:57 +000024 .help_msg = "Trusted World key (input/output file)",
Juan Castillo11abdcd2014-10-21 11:30:42 +010025 .desc = "Trusted World key"
26 },
Juan Castilloe6d30e92015-06-12 11:27:59 +010027 [NON_TRUSTED_WORLD_KEY] = {
Juan Castillo11abdcd2014-10-21 11:30:42 +010028 .id = NON_TRUSTED_WORLD_KEY,
Juan Castillo1218dd52015-07-03 16:23:16 +010029 .opt = "non-trusted-world-key",
Juan Castillo212f7382015-12-15 16:37:57 +000030 .help_msg = "Non Trusted World key (input/output file)",
Juan Castillo11abdcd2014-10-21 11:30:42 +010031 .desc = "Non Trusted World key"
32 },
Juan Castillobe801202015-12-03 10:19:21 +000033 [SCP_FW_CONTENT_CERT_KEY] = {
34 .id = SCP_FW_CONTENT_CERT_KEY,
35 .opt = "scp-fw-key",
Juan Castillo212f7382015-12-15 16:37:57 +000036 .help_msg = "SCP Firmware Content Certificate key (input/output file)",
Juan Castillobe801202015-12-03 10:19:21 +000037 .desc = "SCP Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010038 },
Juan Castillobe801202015-12-03 10:19:21 +000039 [SOC_FW_CONTENT_CERT_KEY] = {
40 .id = SOC_FW_CONTENT_CERT_KEY,
41 .opt = "soc-fw-key",
Juan Castillo212f7382015-12-15 16:37:57 +000042 .help_msg = "SoC Firmware Content Certificate key (input/output file)",
Juan Castillobe801202015-12-03 10:19:21 +000043 .desc = "SoC Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010044 },
Juan Castillobe801202015-12-03 10:19:21 +000045 [TRUSTED_OS_FW_CONTENT_CERT_KEY] = {
46 .id = TRUSTED_OS_FW_CONTENT_CERT_KEY,
47 .opt = "tos-fw-key",
Juan Castillo212f7382015-12-15 16:37:57 +000048 .help_msg = "Trusted OS Firmware Content Certificate key (input/output file)",
Juan Castillobe801202015-12-03 10:19:21 +000049 .desc = "Trusted OS Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010050 },
Juan Castillobe801202015-12-03 10:19:21 +000051 [NON_TRUSTED_FW_CONTENT_CERT_KEY] = {
52 .id = NON_TRUSTED_FW_CONTENT_CERT_KEY,
53 .opt = "nt-fw-key",
Juan Castillo212f7382015-12-15 16:37:57 +000054 .help_msg = "Non Trusted Firmware Content Certificate key (input/output file)",
Juan Castillobe801202015-12-03 10:19:21 +000055 .desc = "Non Trusted Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010056 }
57};
Juan Castilloe6d30e92015-06-12 11:27:59 +010058
59REGISTER_KEYS(tbb_keys);