blob: 0a280b4edd28abf6b5a4ab6f85ff4b64f6b3f618 [file] [log] [blame]
Juan Castilloa3487d12015-08-18 14:23:04 +01001#
Pankaj Gupta4d493802021-01-26 21:04:16 +05302# Copyright (c) 2015-2021, ARM Limited and Contributors. All rights reserved.
Juan Castilloa3487d12015-08-18 14:23:04 +01003#
dp-armfa3cf0b2017-05-03 09:38:09 +01004# SPDX-License-Identifier: BSD-3-Clause
Juan Castilloa3487d12015-08-18 14:23:04 +01005#
6
7# This file defines the keys and certificates that must be created to establish
8# a Chain of Trust following the TBBR document. These definitions include the
dp-arm4972ec52016-05-25 16:20:20 +01009# command line options passed to the cert_create and fiptool commands.
Juan Castilloa3487d12015-08-18 14:23:04 +010010#
11# Expected environment:
12#
13# BUILD_PLAT: output directory
Manish Pandey92ef7c32021-10-01 14:34:33 +010014# NEED_BL2: indicates whether BL2 is needed by the platform
Juan Castillo7d199412015-12-14 09:35:25 +000015# NEED_BL32: indicates whether BL32 is needed by the platform
Juan Castilloa3487d12015-08-18 14:23:04 +010016# BL2: image filename (optional). Default is IMG_BIN(2) (see macro IMG_BIN)
Juan Castilloa72b6472015-12-10 15:49:17 +000017# SCP_BL2: image filename (optional). Default is IMG_BIN(30)
Juan Castilloa3487d12015-08-18 14:23:04 +010018# BL31: image filename (optional). Default is IMG_BIN(31)
19# BL32: image filename (optional). Default is IMG_BIN(32)
20# BL33: image filename (optional). Default is IMG_BIN(33)
21#
22# Build options added by this file:
23#
24# KEY_ALG
Justin Chadwellfebe86c2019-07-29 17:13:45 +010025# KEY_SIZE
Juan Castilloa3487d12015-08-18 14:23:04 +010026# ROT_KEY
Sandrine Bailleux172d5682020-02-03 14:57:53 +010027# PROT_KEY
Juan Castilloa3487d12015-08-18 14:23:04 +010028# TRUSTED_WORLD_KEY
29# NON_TRUSTED_WORLD_KEY
Juan Castilloa72b6472015-12-10 15:49:17 +000030# SCP_BL2_KEY
Juan Castilloa3487d12015-08-18 14:23:04 +010031# BL31_KEY
32# BL32_KEY
33# BL33_KEY
34#
35
36# Certificate generation tool default parameters
Pankaj Gupta4d493802021-01-26 21:04:16 +053037TRUSTED_KEY_CERT ?= ${BUILD_PLAT}/trusted_key.crt
Yatharth Kochard1a93432015-10-12 12:33:47 +010038FWU_CERT := ${BUILD_PLAT}/fwu_cert.crt
Juan Castilloa3487d12015-08-18 14:23:04 +010039
Juan Castillo43529982016-01-22 11:05:24 +000040# Default non-volatile counter values (overridable by the platform)
41TFW_NVCTR_VAL ?= 0
42NTFW_NVCTR_VAL ?= 0
43
44# Pass the non-volatile counters to the cert_create tool
45$(eval $(call CERT_ADD_CMD_OPT,${TFW_NVCTR_VAL},--tfw-nvctr))
46$(eval $(call CERT_ADD_CMD_OPT,${NTFW_NVCTR_VAL},--ntfw-nvctr))
47
dp-arm4972ec52016-05-25 16:20:20 +010048# Add Trusted Key certificate to the fiptool and cert_create command line options
Masahiro Yamada6c2b4592018-01-26 11:42:01 +090049$(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +010050
dp-arm4972ec52016-05-25 16:20:20 +010051# Add fwu certificate to the fiptool and cert_create command line options
Masahiro Yamada6c2b4592018-01-26 11:42:01 +090052$(eval $(call TOOL_ADD_PAYLOAD,${FWU_CERT},--fwu-cert,,FWU_))
Yatharth Kochard1a93432015-10-12 12:33:47 +010053
Juan Castilloa3487d12015-08-18 14:23:04 +010054# Add the keys to the cert_create command line options (private keys are NOT
55# packed in the FIP). Developers can use their own keys by specifying the proper
56# build option in the command line when building the Trusted Firmware
57$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg)))
Manish V Badarkhe57d2e742020-11-08 17:38:57 +000058$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_)))
Justin Chadwellfebe86c2019-07-29 17:13:45 +010059$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size)))
Manish V Badarkhe57d2e742020-11-08 17:38:57 +000060$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_)))
Qixiang Xu1a1f2912017-11-09 13:56:29 +080061$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg)))
Manish V Badarkhe57d2e742020-11-08 17:38:57 +000062$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg,FWU_)))
Juan Castilloa3487d12015-08-18 14:23:04 +010063$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
Masahiro Yamada5ebfda32018-01-26 11:42:01 +090064$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_)))
Sandrine Bailleux172d5682020-02-03 14:57:53 +010065$(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key)))
Juan Castilloa3487d12015-08-18 14:23:04 +010066$(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key)))
67$(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key)))
68
Masahiro Yamadaec154ad2018-01-26 11:42:01 +090069
70# Add the BL2 CoT (image cert)
Manish Pandey92ef7c32021-10-01 14:34:33 +010071ifeq (${NEED_BL2},yes)
Roberto Vargas53c052b2018-01-02 11:23:41 +000072ifeq (${BL2_AT_EL3}, 0)
Masahiro Yamada6c2b4592018-01-26 11:42:01 +090073$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert))
Roberto Vargas53c052b2018-01-02 11:23:41 +000074endif
laurenw-arm56f1e3e2021-03-03 14:19:38 -060075endif
Juan Castilloa3487d12015-08-18 14:23:04 +010076
Masahiro Yamadaec154ad2018-01-26 11:42:01 +090077# Add the SCP_BL2 CoT (key cert + img cert)
Juan Castilloa72b6472015-12-10 15:49:17 +000078ifneq (${SCP_BL2},)
Juan Castilloa72b6472015-12-10 15:49:17 +000079 $(if ${SCP_BL2_KEY},$(eval $(call CERT_ADD_CMD_OPT,${SCP_BL2_KEY},--scp-fw-key)))
Masahiro Yamada6c2b4592018-01-26 11:42:01 +090080 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert))
81 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_key.crt,--scp-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +010082endif
83
dp-armcdd03cb2017-02-15 11:07:55 +000084ifeq (${ARCH},aarch64)
Soby Mathewbf169232017-11-14 14:10:10 +000085ifeq (${NEED_BL31},yes)
Masahiro Yamadaec154ad2018-01-26 11:42:01 +090086# Add the BL31 CoT (key cert + img cert)
Juan Castillobe801202015-12-03 10:19:21 +000087$(if ${BL31_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL31_KEY},--soc-fw-key)))
Masahiro Yamada6c2b4592018-01-26 11:42:01 +090088$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_content.crt,--soc-fw-cert))
89$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_key.crt,--soc-fw-key-cert))
dp-armcdd03cb2017-02-15 11:07:55 +000090endif
Soby Mathewbf169232017-11-14 14:10:10 +000091endif
Juan Castilloa3487d12015-08-18 14:23:04 +010092
Masahiro Yamadaec154ad2018-01-26 11:42:01 +090093# Add the BL32 CoT (key cert + img cert)
Juan Castilloa3487d12015-08-18 14:23:04 +010094ifeq (${NEED_BL32},yes)
Juan Castillobe801202015-12-03 10:19:21 +000095 $(if ${BL32_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL32_KEY},--tos-fw-key)))
Masahiro Yamada6c2b4592018-01-26 11:42:01 +090096 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_content.crt,--tos-fw-cert))
97 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_key.crt,--tos-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +010098endif
99
Masahiro Yamadaec154ad2018-01-26 11:42:01 +0900100# Add the BL33 CoT (key cert + img cert)
Juan Castilloa3487d12015-08-18 14:23:04 +0100101ifneq (${BL33},)
Juan Castillobe801202015-12-03 10:19:21 +0000102 $(if ${BL33_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL33_KEY},--nt-fw-key)))
Masahiro Yamada6c2b4592018-01-26 11:42:01 +0900103 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_content.crt,--nt-fw-cert))
Sandrine Bailleux172d5682020-02-03 14:57:53 +0100104ifneq (${COT},dualroot)
Masahiro Yamada6c2b4592018-01-26 11:42:01 +0900105 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_key.crt,--nt-fw-key-cert))
Juan Castilloa3487d12015-08-18 14:23:04 +0100106endif
Sandrine Bailleux172d5682020-02-03 14:57:53 +0100107endif
Manish Pandey0a658842020-05-22 12:27:28 +0100108
109# Add SiP owned Secure Partitions CoT (image cert)
110ifneq (${SP_LAYOUT_FILE},)
111 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/sip_sp_content.crt,--sip-sp-cert))
Manish Pandey3f0d7af2020-07-24 16:43:54 +0100112ifeq (${COT},dualroot)
113 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat_sp_content.crt,--plat-sp-cert))
114endif
Manish Pandey0a658842020-05-22 12:27:28 +0100115endif