Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 1 | # |
Sandrine Bailleux | 172d568 | 2020-02-03 14:57:53 +0100 | [diff] [blame] | 2 | # Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved. |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 3 | # |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | # SPDX-License-Identifier: BSD-3-Clause |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 5 | # |
| 6 | |
| 7 | # This file defines the keys and certificates that must be created to establish |
| 8 | # a Chain of Trust following the TBBR document. These definitions include the |
dp-arm | 4972ec5 | 2016-05-25 16:20:20 +0100 | [diff] [blame] | 9 | # command line options passed to the cert_create and fiptool commands. |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 10 | # |
| 11 | # Expected environment: |
| 12 | # |
| 13 | # BUILD_PLAT: output directory |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 14 | # NEED_BL32: indicates whether BL32 is needed by the platform |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 15 | # BL2: image filename (optional). Default is IMG_BIN(2) (see macro IMG_BIN) |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 16 | # SCP_BL2: image filename (optional). Default is IMG_BIN(30) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 17 | # BL31: image filename (optional). Default is IMG_BIN(31) |
| 18 | # BL32: image filename (optional). Default is IMG_BIN(32) |
| 19 | # BL33: image filename (optional). Default is IMG_BIN(33) |
| 20 | # |
| 21 | # Build options added by this file: |
| 22 | # |
| 23 | # KEY_ALG |
Justin Chadwell | febe86c | 2019-07-29 17:13:45 +0100 | [diff] [blame] | 24 | # KEY_SIZE |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 25 | # ROT_KEY |
Sandrine Bailleux | 172d568 | 2020-02-03 14:57:53 +0100 | [diff] [blame] | 26 | # PROT_KEY |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 27 | # TRUSTED_WORLD_KEY |
| 28 | # NON_TRUSTED_WORLD_KEY |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 29 | # SCP_BL2_KEY |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 30 | # BL31_KEY |
| 31 | # BL32_KEY |
| 32 | # BL33_KEY |
| 33 | # |
| 34 | |
| 35 | # Certificate generation tool default parameters |
| 36 | TRUSTED_KEY_CERT := ${BUILD_PLAT}/trusted_key.crt |
Yatharth Kochar | d1a9343 | 2015-10-12 12:33:47 +0100 | [diff] [blame] | 37 | FWU_CERT := ${BUILD_PLAT}/fwu_cert.crt |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 38 | |
Juan Castillo | 4352998 | 2016-01-22 11:05:24 +0000 | [diff] [blame] | 39 | # Default non-volatile counter values (overridable by the platform) |
| 40 | TFW_NVCTR_VAL ?= 0 |
| 41 | NTFW_NVCTR_VAL ?= 0 |
| 42 | |
| 43 | # Pass the non-volatile counters to the cert_create tool |
| 44 | $(eval $(call CERT_ADD_CMD_OPT,${TFW_NVCTR_VAL},--tfw-nvctr)) |
| 45 | $(eval $(call CERT_ADD_CMD_OPT,${NTFW_NVCTR_VAL},--ntfw-nvctr)) |
| 46 | |
dp-arm | 4972ec5 | 2016-05-25 16:20:20 +0100 | [diff] [blame] | 47 | # Add Trusted Key certificate to the fiptool and cert_create command line options |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 48 | $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert)) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 49 | |
dp-arm | 4972ec5 | 2016-05-25 16:20:20 +0100 | [diff] [blame] | 50 | # Add fwu certificate to the fiptool and cert_create command line options |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 51 | $(eval $(call TOOL_ADD_PAYLOAD,${FWU_CERT},--fwu-cert,,FWU_)) |
Yatharth Kochar | d1a9343 | 2015-10-12 12:33:47 +0100 | [diff] [blame] | 52 | |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 53 | # Add the keys to the cert_create command line options (private keys are NOT |
| 54 | # packed in the FIP). Developers can use their own keys by specifying the proper |
| 55 | # build option in the command line when building the Trusted Firmware |
| 56 | $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg))) |
Manish V Badarkhe | 57d2e74 | 2020-11-08 17:38:57 +0000 | [diff] [blame] | 57 | $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_))) |
Justin Chadwell | febe86c | 2019-07-29 17:13:45 +0100 | [diff] [blame] | 58 | $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size))) |
Manish V Badarkhe | 57d2e74 | 2020-11-08 17:38:57 +0000 | [diff] [blame] | 59 | $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_))) |
Qixiang Xu | 1a1f291 | 2017-11-09 13:56:29 +0800 | [diff] [blame] | 60 | $(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg))) |
Manish V Badarkhe | 57d2e74 | 2020-11-08 17:38:57 +0000 | [diff] [blame] | 61 | $(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg,FWU_))) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 62 | $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key))) |
Masahiro Yamada | 5ebfda3 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 63 | $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_))) |
Sandrine Bailleux | 172d568 | 2020-02-03 14:57:53 +0100 | [diff] [blame] | 64 | $(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key))) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 65 | $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key))) |
| 66 | $(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key))) |
| 67 | |
Masahiro Yamada | ec154ad | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 68 | |
| 69 | # Add the BL2 CoT (image cert) |
Roberto Vargas | 53c052b | 2018-01-02 11:23:41 +0000 | [diff] [blame] | 70 | ifeq (${BL2_AT_EL3}, 0) |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 71 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert)) |
Roberto Vargas | 53c052b | 2018-01-02 11:23:41 +0000 | [diff] [blame] | 72 | endif |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 73 | |
Masahiro Yamada | ec154ad | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 74 | # Add the SCP_BL2 CoT (key cert + img cert) |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 75 | ifneq (${SCP_BL2},) |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 76 | $(if ${SCP_BL2_KEY},$(eval $(call CERT_ADD_CMD_OPT,${SCP_BL2_KEY},--scp-fw-key))) |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 77 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert)) |
| 78 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_key.crt,--scp-fw-key-cert)) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 79 | endif |
| 80 | |
dp-arm | cdd03cb | 2017-02-15 11:07:55 +0000 | [diff] [blame] | 81 | ifeq (${ARCH},aarch64) |
Soby Mathew | bf16923 | 2017-11-14 14:10:10 +0000 | [diff] [blame] | 82 | ifeq (${NEED_BL31},yes) |
Masahiro Yamada | ec154ad | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 83 | # Add the BL31 CoT (key cert + img cert) |
Juan Castillo | be80120 | 2015-12-03 10:19:21 +0000 | [diff] [blame] | 84 | $(if ${BL31_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL31_KEY},--soc-fw-key))) |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 85 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_content.crt,--soc-fw-cert)) |
| 86 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_key.crt,--soc-fw-key-cert)) |
dp-arm | cdd03cb | 2017-02-15 11:07:55 +0000 | [diff] [blame] | 87 | endif |
Soby Mathew | bf16923 | 2017-11-14 14:10:10 +0000 | [diff] [blame] | 88 | endif |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 89 | |
Masahiro Yamada | ec154ad | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 90 | # Add the BL32 CoT (key cert + img cert) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 91 | ifeq (${NEED_BL32},yes) |
Juan Castillo | be80120 | 2015-12-03 10:19:21 +0000 | [diff] [blame] | 92 | $(if ${BL32_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL32_KEY},--tos-fw-key))) |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 93 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_content.crt,--tos-fw-cert)) |
| 94 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_key.crt,--tos-fw-key-cert)) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 95 | endif |
| 96 | |
Masahiro Yamada | ec154ad | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 97 | # Add the BL33 CoT (key cert + img cert) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 98 | ifneq (${BL33},) |
Juan Castillo | be80120 | 2015-12-03 10:19:21 +0000 | [diff] [blame] | 99 | $(if ${BL33_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL33_KEY},--nt-fw-key))) |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 100 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_content.crt,--nt-fw-cert)) |
Sandrine Bailleux | 172d568 | 2020-02-03 14:57:53 +0100 | [diff] [blame] | 101 | ifneq (${COT},dualroot) |
Masahiro Yamada | 6c2b459 | 2018-01-26 11:42:01 +0900 | [diff] [blame] | 102 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_key.crt,--nt-fw-key-cert)) |
Juan Castillo | a3487d1 | 2015-08-18 14:23:04 +0100 | [diff] [blame] | 103 | endif |
Sandrine Bailleux | 172d568 | 2020-02-03 14:57:53 +0100 | [diff] [blame] | 104 | endif |
Manish Pandey | 0a65884 | 2020-05-22 12:27:28 +0100 | [diff] [blame] | 105 | |
| 106 | # Add SiP owned Secure Partitions CoT (image cert) |
| 107 | ifneq (${SP_LAYOUT_FILE},) |
| 108 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/sip_sp_content.crt,--sip-sp-cert)) |
Manish Pandey | 3f0d7af | 2020-07-24 16:43:54 +0100 | [diff] [blame] | 109 | ifeq (${COT},dualroot) |
| 110 | $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat_sp_content.crt,--plat-sp-cert)) |
| 111 | endif |
Manish Pandey | 0a65884 | 2020-05-22 12:27:28 +0100 | [diff] [blame] | 112 | endif |