mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-17 10:04:26 +00:00

This commit streamlines directory creation by introducing a single pattern rule to automatically make directories for which there is a dependency. We currently use several macros to generate rules to create directories upon dependence, which is a significant amount of code and a lot of redundancy. The rule introduced by this change represents a catch-all: any rule dependency on a path ending in a forward slash is automatically created. Now, rules can rely on an unordered dependency (`|`) on `$$(@D)/` which, when secondary expansion is enabled, expands to the directory of the target being built, e.g.: build/main.o: main.c | $$(@D)/ # automatically creates `build/` Change-Id: I7e554efa2ac850e779bb302fd9c7fbb239886c9f Signed-off-by: Chris Kay <chris.kay@arm.com>
93 lines
3.8 KiB
Makefile
93 lines
3.8 KiB
Makefile
#
|
|
# Copyright 2021 NXP
|
|
#
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
|
#
|
|
|
|
# This file defines the keys and certificates that must be created to establish
|
|
# a Chain of Trust for the DDR FW. These definitions include the
|
|
# command line options passed to the cert_create and fiptool commands for DDR FW.
|
|
# A DDR FW key is used for signing the DDR Firmware. The DDR key is authenticated
|
|
# by the Trusted World Key. Two content certificates are created:
|
|
# For DDR RDIMM Images [ signed by DDR FW Key]
|
|
# For DDR UDIMM Images [ signed by DDR FW Key]
|
|
#
|
|
# Expected environment:
|
|
#
|
|
# BUILD_PLAT: output directory
|
|
#
|
|
# Build options added by this file:
|
|
#
|
|
# KEY_ALG
|
|
# KEY_SIZE
|
|
# TRUSTED_WORLD_KEY
|
|
# NON_TRUSTED_WORLD_KEY
|
|
#
|
|
|
|
# Copy the tbbr.mk from PLAT_TOOL_PATH/cert_create_helper
|
|
# to the ${PLAT_DIR}. So that cert_create is enabled
|
|
# to create certificates for DDR
|
|
$(shell cp ${PLAT_TOOL_PATH}/cert_create_helper/cert_create_tbbr.mk ${PLAT_DIR})
|
|
|
|
# Certificate generation tool default parameters
|
|
DDR_FW_CERT := ${BUILD_PLAT}/ddr_fw_key_cert.crt
|
|
|
|
# Default non-volatile counter values (overridable by the platform)
|
|
TFW_NVCTR_VAL ?= 0
|
|
NTFW_NVCTR_VAL ?= 0
|
|
|
|
# Pass the non-volatile counters to the cert_create tool
|
|
$(eval $(call CERT_ADD_CMD_OPT,${TFW_NVCTR_VAL},--tfw-nvctr,DDR_))
|
|
|
|
ifeq (${DDR_KEY},)
|
|
DDR_KEY=${BUILD_PLAT}/ddr.pem
|
|
endif
|
|
|
|
ifeq (${TRUSTED_KEY_CERT},)
|
|
$(info Generating: Trusted key certificate as part of DDR cert creation)
|
|
TRUSTED_KEY_CERT := ${BUILD_PLAT}/trusted_key.crt
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,,DDR_))
|
|
else
|
|
$(info Using: Trusted key certificate as part of DDR cert creation)
|
|
DDR_FIP_ARGS += --trusted-key-cert ${TRUSTED_KEY_CERT}
|
|
endif
|
|
|
|
# Add the keys to the cert_create command line options (private keys are NOT
|
|
# packed in the FIP). Developers can use their own keys by specifying the proper
|
|
# build option in the command line when building the Trusted Firmware
|
|
$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,DDR_)))
|
|
$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,DDR_)))
|
|
$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg,DDR_)))
|
|
$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,DDR_)))
|
|
$(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key,DDR_)))
|
|
$(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key, DDR_)))
|
|
|
|
# Add the DDR CoT (key cert + img cert)
|
|
$(if ${DDR_KEY},$(eval $(call CERT_ADD_CMD_OPT,${DDR_KEY},--ddr-fw-key,DDR_)))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/ddr_fw_key.crt,--ddr-fw-key-cert,,DDR_))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/ddr_udimm_fw_content.crt,--ddr-udimm-fw-cert,,DDR_))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/ddr_rdimm_fw_content.crt,--ddr-rdimm-fw-cert,,DDR_))
|
|
|
|
$(eval $(call TOOL_ADD_IMG,DDR_IMEM_UDIMM_1D,--ddr-immem-udimm-1d,DDR_))
|
|
$(eval $(call TOOL_ADD_IMG,DDR_IMEM_UDIMM_2D,--ddr-immem-udimm-2d,DDR_))
|
|
$(eval $(call TOOL_ADD_IMG,DDR_DMEM_UDIMM_1D,--ddr-dmmem-udimm-1d,DDR_))
|
|
$(eval $(call TOOL_ADD_IMG,DDR_DMEM_UDIMM_2D,--ddr-dmmem-udimm-2d,DDR_))
|
|
|
|
$(eval $(call TOOL_ADD_IMG,DDR_IMEM_RDIMM_1D,--ddr-immem-rdimm-1d,DDR_))
|
|
$(eval $(call TOOL_ADD_IMG,DDR_IMEM_RDIMM_2D,--ddr-immem-rdimm-2d,DDR_))
|
|
$(eval $(call TOOL_ADD_IMG,DDR_DMEM_RDIMM_1D,--ddr-dmmem-rdimm-1d,DDR_))
|
|
$(eval $(call TOOL_ADD_IMG,DDR_DMEM_RDIMM_2D,--ddr-dmmem-rdimm-2d,DDR_))
|
|
|
|
DDR_FIP_DEPS += ddr_certificates
|
|
|
|
# Process TBB related flags
|
|
ifneq (${GENERATE_COT},0)
|
|
# Common cert_create options
|
|
ifneq (${CREATE_KEYS},0)
|
|
$(eval DDR_CRT_ARGS += -n)
|
|
ifneq (${SAVE_KEYS},0)
|
|
$(eval DDR_CRT_ARGS += -k)
|
|
endif
|
|
endif
|
|
endif
|