blob: 5b84b6e9193228216a27e65af7001d357f74aa8c [file] [log] [blame]
Juan Castillo11abdcd2014-10-21 11:30:42 +01001/*
2 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Juan Castillo11abdcd2014-10-21 11:30:42 +01005 */
6
Juan Castilloe6d30e92015-06-12 11:27:59 +01007#include "tbbr/tbb_key.h"
Juan Castillo11abdcd2014-10-21 11:30:42 +01008
9/*
10 * Keys used to establish the chain of trust
11 *
12 * The order of the keys must follow the enumeration specified in tbb_key.h
13 */
Juan Castilloe6d30e92015-06-12 11:27:59 +010014static key_t tbb_keys[] = {
15 [ROT_KEY] = {
Juan Castillo11abdcd2014-10-21 11:30:42 +010016 .id = ROT_KEY,
Juan Castillo1218dd52015-07-03 16:23:16 +010017 .opt = "rot-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020018 .help_msg = "Root Of Trust key file or PKCS11 URI",
Juan Castillo11abdcd2014-10-21 11:30:42 +010019 .desc = "Root Of Trust key"
20 },
Juan Castilloe6d30e92015-06-12 11:27:59 +010021 [TRUSTED_WORLD_KEY] = {
Juan Castillo11abdcd2014-10-21 11:30:42 +010022 .id = TRUSTED_WORLD_KEY,
Juan Castillo1218dd52015-07-03 16:23:16 +010023 .opt = "trusted-world-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020024 .help_msg = "Trusted World key file or PKCS11 URI",
Juan Castillo11abdcd2014-10-21 11:30:42 +010025 .desc = "Trusted World key"
26 },
Juan Castilloe6d30e92015-06-12 11:27:59 +010027 [NON_TRUSTED_WORLD_KEY] = {
Juan Castillo11abdcd2014-10-21 11:30:42 +010028 .id = NON_TRUSTED_WORLD_KEY,
Juan Castillo1218dd52015-07-03 16:23:16 +010029 .opt = "non-trusted-world-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020030 .help_msg = "Non Trusted World key file or PKCS11 URI",
Juan Castillo11abdcd2014-10-21 11:30:42 +010031 .desc = "Non Trusted World key"
32 },
Juan Castillobe801202015-12-03 10:19:21 +000033 [SCP_FW_CONTENT_CERT_KEY] = {
34 .id = SCP_FW_CONTENT_CERT_KEY,
35 .opt = "scp-fw-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020036 .help_msg = "SCP Firmware Content Certificate key file or PKCS11 URI",
Juan Castillobe801202015-12-03 10:19:21 +000037 .desc = "SCP Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010038 },
Juan Castillobe801202015-12-03 10:19:21 +000039 [SOC_FW_CONTENT_CERT_KEY] = {
40 .id = SOC_FW_CONTENT_CERT_KEY,
41 .opt = "soc-fw-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020042 .help_msg = "SoC Firmware Content Certificate key file or PKCS11 URI",
Juan Castillobe801202015-12-03 10:19:21 +000043 .desc = "SoC Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010044 },
Juan Castillobe801202015-12-03 10:19:21 +000045 [TRUSTED_OS_FW_CONTENT_CERT_KEY] = {
46 .id = TRUSTED_OS_FW_CONTENT_CERT_KEY,
47 .opt = "tos-fw-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020048 .help_msg = "Trusted OS Firmware Content Certificate key file or PKCS11 URI",
Juan Castillobe801202015-12-03 10:19:21 +000049 .desc = "Trusted OS Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010050 },
Juan Castillobe801202015-12-03 10:19:21 +000051 [NON_TRUSTED_FW_CONTENT_CERT_KEY] = {
52 .id = NON_TRUSTED_FW_CONTENT_CERT_KEY,
53 .opt = "nt-fw-key",
Robin van der Gracht06b5cdb2023-09-12 11:16:23 +020054 .help_msg = "Non Trusted Firmware Content Certificate key file or PKCS11 URI",
Juan Castillobe801202015-12-03 10:19:21 +000055 .desc = "Non Trusted Firmware Content Certificate key"
Juan Castillo11abdcd2014-10-21 11:30:42 +010056 }
57};
Juan Castilloe6d30e92015-06-12 11:27:59 +010058
59REGISTER_KEYS(tbb_keys);