mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-15 09:04:17 +00:00

BL2_AT_EL3 is an overloaded macro which has two uses: 1. When BL2 is entry point into TF-A(no BL1) 2. When BL2 is running at EL3 exception level These two scenarios are not exactly same even though first implicitly means second to be true. To distinguish between these two use cases we introduce new macros. BL2_AT_EL3 is renamed to RESET_TO_BL2 to better convey both 1. and 2. Additional macro BL2_RUNS_AT_EL3 is added to cover all scenarious where BL2 runs at EL3 (including four world systems). BREAKING CHANGE: BL2_AT_EL3 renamed to RESET_TO_BL2 across the repository. Change-Id: I477e1d0f843b44b799c216670e028fcb3509fb72 Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
140 lines
5.3 KiB
Makefile
140 lines
5.3 KiB
Makefile
#
|
|
# Copyright (c) 2015-2023, ARM Limited and Contributors. All rights reserved.
|
|
#
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
|
#
|
|
|
|
# This file defines the keys and certificates that must be created to establish
|
|
# a Chain of Trust following the TBBR document. These definitions include the
|
|
# command line options passed to the cert_create and fiptool commands.
|
|
#
|
|
# Expected environment:
|
|
#
|
|
# BUILD_PLAT: output directory
|
|
# NEED_BL2: indicates whether BL2 is needed by the platform
|
|
# NEED_BL32: indicates whether BL32 is needed by the platform
|
|
# BL2: image filename (optional). Default is IMG_BIN(2) (see macro IMG_BIN)
|
|
# SCP_BL2: image filename (optional). Default is IMG_BIN(30)
|
|
# BL31: image filename (optional). Default is IMG_BIN(31)
|
|
# BL32: image filename (optional). Default is IMG_BIN(32)
|
|
# BL33: image filename (optional). Default is IMG_BIN(33)
|
|
#
|
|
# Build options added by this file:
|
|
#
|
|
# KEY_ALG
|
|
# KEY_SIZE
|
|
# ROT_KEY
|
|
# PROT_KEY
|
|
# PLAT_KEY
|
|
# SWD_ROT_KEY
|
|
# CORE_SWD_KEY
|
|
# TRUSTED_WORLD_KEY
|
|
# NON_TRUSTED_WORLD_KEY
|
|
# SCP_BL2_KEY
|
|
# BL31_KEY
|
|
# BL32_KEY
|
|
# BL33_KEY
|
|
#
|
|
|
|
# Certificate generation tool default parameters
|
|
TRUSTED_KEY_CERT ?= ${BUILD_PLAT}/trusted_key.crt
|
|
FWU_CERT := ${BUILD_PLAT}/fwu_cert.crt
|
|
|
|
# Default non-volatile counter values (overridable by the platform)
|
|
TFW_NVCTR_VAL ?= 0
|
|
NTFW_NVCTR_VAL ?= 0
|
|
|
|
# Pass the non-volatile counters to the cert_create tool
|
|
$(eval $(call CERT_ADD_CMD_OPT,${TFW_NVCTR_VAL},--tfw-nvctr))
|
|
$(eval $(call CERT_ADD_CMD_OPT,${NTFW_NVCTR_VAL},--ntfw-nvctr))
|
|
|
|
# Add Trusted Key certificate to the fiptool and cert_create command line options
|
|
ifneq (${COT},cca)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
|
|
else
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/cca.crt,--cca-cert))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/core-swd.crt,--core-swd-cert))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat-key.crt,--plat-key-cert))
|
|
endif
|
|
|
|
# Add fwu certificate to the fiptool and cert_create command line options
|
|
ifneq (${COT},cca)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${FWU_CERT},--fwu-cert,,FWU_))
|
|
endif
|
|
|
|
# Add the keys to the cert_create command line options (private keys are NOT
|
|
# packed in the FIP). Developers can use their own keys by specifying the proper
|
|
# build option in the command line when building the Trusted Firmware
|
|
$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg)))
|
|
$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_)))
|
|
$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size)))
|
|
$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_)))
|
|
$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg)))
|
|
$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg,FWU_)))
|
|
$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
|
|
$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_)))
|
|
$(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key)))
|
|
$(if ${PLAT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PLAT_KEY},--plat-key)))
|
|
$(if ${SWD_ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${SWD_ROT_KEY},--swd-rot-key)))
|
|
$(if ${CORE_SWD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${CORE_SWD_KEY},--core-swd-key)))
|
|
$(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key)))
|
|
$(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key)))
|
|
|
|
|
|
# Add the BL2 CoT (image cert)
|
|
ifeq (${NEED_BL2},yes)
|
|
ifeq (${RESET_TO_BL2}, 0)
|
|
ifneq (${COT},cca)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert))
|
|
endif
|
|
endif
|
|
endif
|
|
|
|
# Add the SCP_BL2 CoT (key cert + img cert)
|
|
ifneq (${SCP_BL2},)
|
|
ifneq (${COT},cca)
|
|
$(if ${SCP_BL2_KEY},$(eval $(call CERT_ADD_CMD_OPT,${SCP_BL2_KEY},--scp-fw-key)))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_key.crt,--scp-fw-key-cert))
|
|
endif
|
|
endif
|
|
|
|
ifeq (${ARCH},aarch64)
|
|
ifeq (${NEED_BL31},yes)
|
|
# Add the BL31 CoT (key cert + img cert)
|
|
$(if ${BL31_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL31_KEY},--soc-fw-key)))
|
|
ifneq (${COT},cca)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_content.crt,--soc-fw-cert))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_key.crt,--soc-fw-key-cert))
|
|
endif
|
|
endif
|
|
endif
|
|
|
|
# Add the BL32 CoT (key cert + img cert)
|
|
ifeq (${NEED_BL32},yes)
|
|
$(if ${BL32_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL32_KEY},--tos-fw-key)))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_content.crt,--tos-fw-cert))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_key.crt,--tos-fw-key-cert))
|
|
endif
|
|
|
|
# Add the BL33 CoT (key cert + img cert)
|
|
ifneq (${BL33},)
|
|
$(if ${BL33_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL33_KEY},--nt-fw-key)))
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_content.crt,--nt-fw-cert))
|
|
ifneq (${COT},dualroot)
|
|
ifneq (${COT},cca)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_key.crt,--nt-fw-key-cert))
|
|
endif
|
|
endif
|
|
endif
|
|
|
|
# Add SiP owned Secure Partitions CoT (image cert)
|
|
ifneq (${SP_LAYOUT_FILE},)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/sip_sp_content.crt,--sip-sp-cert))
|
|
ifeq (${COT},dualroot)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat_sp_content.crt,--plat-sp-cert))
|
|
endif
|
|
ifeq (${COT},cca)
|
|
$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat_sp_content.crt,--plat-sp-cert))
|
|
endif
|
|
endif
|