Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 1 | # |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 2 | # Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved. |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 3 | # |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | # SPDX-License-Identifier: BSD-3-Clause |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 5 | # |
| 6 | |
Antonio Nino Diaz | d7da2f8 | 2018-10-10 11:14:44 +0100 | [diff] [blame] | 7 | PLAT_BL_COMMON_SOURCES += drivers/arm/pl011/${ARCH}/pl011_console.S \ |
Yatharth Kochar | f528faf | 2016-06-28 16:58:26 +0100 | [diff] [blame] | 8 | plat/arm/board/common/${ARCH}/board_arm_helpers.S |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 9 | |
Antonio Nino Diaz | d7da2f8 | 2018-10-10 11:14:44 +0100 | [diff] [blame] | 10 | BL1_SOURCES += drivers/cfi/v2m/v2m_flash.c |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 11 | |
Antonio Nino Diaz | d7da2f8 | 2018-10-10 11:14:44 +0100 | [diff] [blame] | 12 | BL2_SOURCES += drivers/cfi/v2m/v2m_flash.c |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 13 | |
| 14 | ifneq (${TRUSTED_BOARD_BOOT},0) |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 15 | ifneq (${ARM_CRYPTOCELL_INTEG}, 1) |
| 16 | # ROTPK hash location |
| 17 | ifeq (${ARM_ROTPK_LOCATION}, regs) |
| 18 | ARM_ROTPK_LOCATION_ID = ARM_ROTPK_REGS_ID |
| 19 | else ifeq (${ARM_ROTPK_LOCATION}, devel_rsa) |
Max Shvetsov | 7b753d9 | 2020-02-11 12:41:08 +0000 | [diff] [blame] | 20 | CRYPTO_ALG=rsa |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 21 | ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_RSA_ID |
| 22 | ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_rsa_sha256.bin |
| 23 | $(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"')) |
| 24 | $(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH) |
| 25 | $(warning Development keys support for FVP is deprecated. Use `regs` \ |
| 26 | option instead) |
| 27 | else ifeq (${ARM_ROTPK_LOCATION}, devel_ecdsa) |
Max Shvetsov | 7b753d9 | 2020-02-11 12:41:08 +0000 | [diff] [blame] | 28 | CRYPTO_ALG=ec |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 29 | ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_ECDSA_ID |
| 30 | ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_ecdsa_sha256.bin |
| 31 | $(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"')) |
| 32 | $(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH) |
| 33 | $(warning Development keys support for FVP is deprecated. Use `regs` \ |
| 34 | option instead) |
| 35 | else |
Sandrine Bailleux | 3e183f9 | 2021-04-16 16:08:46 +0200 | [diff] [blame] | 36 | $(error "Unsupported ARM_ROTPK_LOCATION value") |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 37 | endif |
| 38 | |
| 39 | $(eval $(call add_define,ARM_ROTPK_LOCATION_ID)) |
| 40 | |
| 41 | # Force generation of the new hash if ROT_KEY is specified |
| 42 | ifdef ROT_KEY |
| 43 | HASH_PREREQUISITES = $(ROT_KEY) FORCE |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 44 | else |
| 45 | HASH_PREREQUISITES = $(ROT_KEY) |
| 46 | endif |
| 47 | |
| 48 | $(ARM_ROTPK_HASH) : $(HASH_PREREQUISITES) |
| 49 | ifndef ROT_KEY |
| 50 | $(error Cannot generate hash: no ROT_KEY defined) |
| 51 | endif |
Max Shvetsov | 7b753d9 | 2020-02-11 12:41:08 +0000 | [diff] [blame] | 52 | openssl ${CRYPTO_ALG} -in $< -pubout -outform DER | openssl dgst \ |
Max Shvetsov | 06dba29 | 2019-12-06 11:50:12 +0000 | [diff] [blame] | 53 | -sha256 -binary > $@ |
| 54 | |
| 55 | # Certificate NV-Counters. Use values corresponding to tied off values in |
| 56 | # ARM development platforms |
| 57 | TFW_NVCTR_VAL ?= 31 |
| 58 | NTFW_NVCTR_VAL ?= 223 |
| 59 | else |
| 60 | # Certificate NV-Counters when CryptoCell is integrated. For development |
| 61 | # platforms we set the counter to first valid value. |
| 62 | TFW_NVCTR_VAL ?= 0 |
| 63 | NTFW_NVCTR_VAL ?= 0 |
| 64 | endif |
| 65 | BL1_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \ |
| 66 | plat/arm/board/common/rotpk/arm_dev_rotpk.S |
| 67 | BL2_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \ |
| 68 | plat/arm/board/common/rotpk/arm_dev_rotpk.S |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 69 | |
Sandrine Bailleux | 012f871 | 2020-02-06 14:59:33 +0100 | [diff] [blame] | 70 | # Allows platform code to provide implementation variants depending on the |
| 71 | # selected chain of trust. |
| 72 | $(eval $(call add_define,ARM_COT_${COT})) |
| 73 | |
| 74 | ifeq (${COT},dualroot) |
| 75 | # Platform Root of Trust key files. |
| 76 | ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_rsa.pem |
| 77 | ARM_PROTPK_HASH := plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin |
| 78 | |
| 79 | # Provide the private key to cert_create tool. It needs it to sign the images. |
| 80 | PROT_KEY := ${ARM_PROT_KEY} |
| 81 | |
| 82 | $(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"')) |
| 83 | |
| 84 | BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S |
| 85 | BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S |
| 86 | |
| 87 | $(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH) |
| 88 | $(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH) |
| 89 | endif |
| 90 | |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 91 | endif |