blob: 8d3f14fff1bbdb9ecf2ebbb8f98adb5a5d209e3a [file] [log] [blame]
Juan Castilloa3487d12015-08-18 14:23:04 +01001#
2# Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3#
4# Redistribution and use in source and binary forms, with or without
5# modification, are permitted provided that the following conditions are met:
6#
7# Redistributions of source code must retain the above copyright notice, this
8# list of conditions and the following disclaimer.
9#
10# Redistributions in binary form must reproduce the above copyright notice,
11# this list of conditions and the following disclaimer in the documentation
12# and/or other materials provided with the distribution.
13#
14# Neither the name of ARM nor the names of its contributors may be used
15# to endorse or promote products derived from this software without specific
16# prior written permission.
17#
18# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28# POSSIBILITY OF SUCH DAMAGE.
29#
30
31# This file defines the keys and certificates that must be created to establish
32# a Chain of Trust following the TBBR document. These definitions include the
dp-arm4972ec52016-05-25 16:20:20 +010033# command line options passed to the cert_create and fiptool commands.
Juan Castilloa3487d12015-08-18 14:23:04 +010034#
35# Expected environment:
36#
37# BUILD_PLAT: output directory
Juan Castillo7d199412015-12-14 09:35:25 +000038# NEED_BL32: indicates whether BL32 is needed by the platform
Juan Castilloa3487d12015-08-18 14:23:04 +010039# BL2: image filename (optional). Default is IMG_BIN(2) (see macro IMG_BIN)
Juan Castilloa72b6472015-12-10 15:49:17 +000040# SCP_BL2: image filename (optional). Default is IMG_BIN(30)
Juan Castilloa3487d12015-08-18 14:23:04 +010041# BL31: image filename (optional). Default is IMG_BIN(31)
42# BL32: image filename (optional). Default is IMG_BIN(32)
43# BL33: image filename (optional). Default is IMG_BIN(33)
44#
45# Build options added by this file:
46#
47# KEY_ALG
48# ROT_KEY
49# TRUSTED_WORLD_KEY
50# NON_TRUSTED_WORLD_KEY
Juan Castilloa72b6472015-12-10 15:49:17 +000051# SCP_BL2_KEY
Juan Castilloa3487d12015-08-18 14:23:04 +010052# BL31_KEY
53# BL32_KEY
54# BL33_KEY
55#
56
57# Certificate generation tool default parameters
58TRUSTED_KEY_CERT := ${BUILD_PLAT}/trusted_key.crt
Yatharth Kochard1a93432015-10-12 12:33:47 +010059FWU_CERT := ${BUILD_PLAT}/fwu_cert.crt
Juan Castilloa3487d12015-08-18 14:23:04 +010060
Juan Castillo43529982016-01-22 11:05:24 +000061# Default non-volatile counter values (overridable by the platform)
62TFW_NVCTR_VAL ?= 0
63NTFW_NVCTR_VAL ?= 0
64
65# Pass the non-volatile counters to the cert_create tool
66$(eval $(call CERT_ADD_CMD_OPT,${TFW_NVCTR_VAL},--tfw-nvctr))
67$(eval $(call CERT_ADD_CMD_OPT,${NTFW_NVCTR_VAL},--ntfw-nvctr))
68
dp-arm4972ec52016-05-25 16:20:20 +010069# Add Trusted Key certificate to the fiptool and cert_create command line options
Juan Castilloa3487d12015-08-18 14:23:04 +010070$(eval $(call FIP_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
71$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_KEY_CERT},--trusted-key-cert))
72
dp-arm4972ec52016-05-25 16:20:20 +010073# Add fwu certificate to the fiptool and cert_create command line options
Yatharth Kochard1a93432015-10-12 12:33:47 +010074$(eval $(call FWU_FIP_ADD_PAYLOAD,${FWU_CERT},--fwu-cert))
75$(eval $(call FWU_CERT_ADD_CMD_OPT,${FWU_CERT},--fwu-cert))
76
Juan Castilloa3487d12015-08-18 14:23:04 +010077# Add the keys to the cert_create command line options (private keys are NOT
78# packed in the FIP). Developers can use their own keys by specifying the proper
79# build option in the command line when building the Trusted Firmware
80$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg)))
81$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
Yatharth Kochard1a93432015-10-12 12:33:47 +010082$(if ${ROT_KEY},$(eval $(call FWU_CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
Juan Castilloa3487d12015-08-18 14:23:04 +010083$(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key)))
84$(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key)))
85
86# Add the BL2 CoT (image cert + image)
Juan Castillobe801202015-12-03 10:19:21 +000087$(if ${BL2},$(eval $(call CERT_ADD_CMD_OPT,${BL2},--tb-fw,true)),\
88 $(eval $(call CERT_ADD_CMD_OPT,$(call IMG_BIN,2),--tb-fw,true)))
89$(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert))
90$(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +010091
Juan Castilloa72b6472015-12-10 15:49:17 +000092# Add the SCP_BL2 CoT (key cert + img cert + image)
93ifneq (${SCP_BL2},)
94 $(eval $(call CERT_ADD_CMD_OPT,${SCP_BL2},--scp-fw,true))
95 $(if ${SCP_BL2_KEY},$(eval $(call CERT_ADD_CMD_OPT,${SCP_BL2_KEY},--scp-fw-key)))
Juan Castillobe801202015-12-03 10:19:21 +000096 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert))
97 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/scp_fw_key.crt,--scp-fw-key-cert))
98 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert))
99 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_key.crt,--scp-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +0100100endif
101
102# Add the BL31 CoT (key cert + img cert + image)
Juan Castillobe801202015-12-03 10:19:21 +0000103$(if ${BL31},$(eval $(call CERT_ADD_CMD_OPT,${BL31},--soc-fw,true)),\
104 $(eval $(call CERT_ADD_CMD_OPT,$(call IMG_BIN,31),--soc-fw,true)))
105$(if ${BL31_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL31_KEY},--soc-fw-key)))
106$(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/soc_fw_content.crt,--soc-fw-cert))
107$(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/soc_fw_key.crt,--soc-fw-key-cert))
108$(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_content.crt,--soc-fw-cert))
109$(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_key.crt,--soc-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +0100110
111# Add the BL32 CoT (key cert + img cert + image)
112ifeq (${NEED_BL32},yes)
Juan Castillobe801202015-12-03 10:19:21 +0000113 $(if ${BL32},$(eval $(call CERT_ADD_CMD_OPT,${BL32},--tos-fw,true)),\
114 $(if ${BL32_SOURCES},$(eval $(call CERT_ADD_CMD_OPT,$(call IMG_BIN,32),--tos-fw,true))))
115 $(if ${BL32_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL32_KEY},--tos-fw-key)))
116 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/tos_fw_content.crt,--tos-fw-cert))
117 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/tos_fw_key.crt,--tos-fw-key-cert))
118 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_content.crt,--tos-fw-cert))
119 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_key.crt,--tos-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +0100120endif
121
122# Add the BL33 CoT (key cert + img cert + image)
123ifneq (${BL33},)
Juan Castillobe801202015-12-03 10:19:21 +0000124 $(eval $(call CERT_ADD_CMD_OPT,${BL33},--nt-fw,true))
125 $(if ${BL33_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL33_KEY},--nt-fw-key)))
126 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/nt_fw_content.crt,--nt-fw-cert))
127 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/nt_fw_key.crt,--nt-fw-key-cert))
128 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_content.crt,--nt-fw-cert))
129 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_key.crt,--nt-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +0100130endif
Yatharth Kocharb1c2fe02015-10-14 15:27:24 +0100131
132# Add the BL2U image
Juan Castillobe801202015-12-03 10:19:21 +0000133$(if ${BL2U},$(eval $(call FWU_CERT_ADD_CMD_OPT,${BL2U},--ap-fwu-cfg,true)),\
134 $(eval $(call FWU_CERT_ADD_CMD_OPT,$(call IMG_BIN,2u),--ap-fwu-cfg,true)))
Yatharth Kochard1a93432015-10-12 12:33:47 +0100135
136# Add the SCP_BL2U image
137ifneq (${SCP_BL2U},)
Juan Castillobe801202015-12-03 10:19:21 +0000138 $(eval $(call FWU_CERT_ADD_CMD_OPT,${SCP_BL2U},--scp-fwu-cfg,true))
Yatharth Kochard1a93432015-10-12 12:33:47 +0100139endif
140
141# Add the NS_BL2U image
142ifneq (${NS_BL2U},)
Juan Castillobe801202015-12-03 10:19:21 +0000143 $(eval $(call FWU_CERT_ADD_CMD_OPT,${NS_BL2U},--fwu,true))
Yatharth Kocharb1c2fe02015-10-14 15:27:24 +0100144endif