mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-26 06:50:10 +00:00

Arm ROTPK generation may start before the build directory is created, causing errors like: 00:45:53.235 Can't open "/home/buildslave/workspace/tf-a-coverity/ trusted-firmware-a/build/rd1ae/debug/arm_rotpk.bin" for writing, No such file or directory This patch ensures the build directory is created beforehand to prevent such issues. Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I73f7d5af00efc738e95ea79c5cacecdb6a2d20c6
164 lines
5.7 KiB
Makefile
164 lines
5.7 KiB
Makefile
#
|
|
# Copyright (c) 2015-2024, Arm Limited and Contributors. All rights reserved.
|
|
#
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
|
#
|
|
|
|
PLAT_BL_COMMON_SOURCES += drivers/arm/pl011/${ARCH}/pl011_console.S \
|
|
plat/arm/board/common/${ARCH}/board_arm_helpers.S
|
|
|
|
BL1_SOURCES += drivers/cfi/v2m/v2m_flash.c
|
|
|
|
BL2_SOURCES += drivers/cfi/v2m/v2m_flash.c
|
|
|
|
ifneq (${TRUSTED_BOARD_BOOT},0)
|
|
ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_dev_rotpk.S
|
|
ARM_ROTPK = $(BUILD_PLAT)/arm_rotpk.bin
|
|
ARM_ROTPK_IS_HASH := 1
|
|
$(eval $(call add_define_val,ARM_ROTPK,'"$(ARM_ROTPK)"'))
|
|
|
|
# ROTPK hash location
|
|
ifeq (${ARM_ROTPK_LOCATION}, regs)
|
|
ARM_ROTPK_LOCATION_ID = ARM_ROTPK_REGS_ID
|
|
else
|
|
# The ROTPK is a development key
|
|
ifeq (${ARM_ROTPK_LOCATION}, devel_rsa)
|
|
CRYPTO_ALG=rsa
|
|
ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_RSA_ID
|
|
ROT_KEY ?= plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem
|
|
$(warning Development keys support for FVP is deprecated. Use `regs` \
|
|
option instead)
|
|
else ifeq (${ARM_ROTPK_LOCATION}, devel_ecdsa)
|
|
CRYPTO_ALG=ec
|
|
ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_ECDSA_ID
|
|
ROT_KEY ?= plat/arm/board/common/rotpk/arm_rotprivk_ecdsa.pem
|
|
$(warning Development keys support for FVP is deprecated. Use `regs` \
|
|
option instead)
|
|
else ifeq (${ARM_ROTPK_LOCATION}, devel_full_dev_rsa_key)
|
|
CRYPTO_ALG=rsa
|
|
ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_FULL_DEV_RSA_KEY_ID
|
|
ROT_KEY ?= plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem
|
|
ARM_ROTPK_IS_HASH = 0
|
|
$(warning Development keys support for FVP is deprecated. Use `regs` \
|
|
option instead)
|
|
else ifeq (${ARM_ROTPK_LOCATION}, devel_full_dev_ecdsa_key)
|
|
CRYPTO_ALG=ec
|
|
ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_FULL_DEV_ECDSA_KEY_ID
|
|
ROT_KEY ?= plat/arm/board/common/rotpk/arm_rotprivk_ecdsa.pem
|
|
ARM_ROTPK_IS_HASH = 0
|
|
$(warning Development keys support for FVP is deprecated. Use `regs` \
|
|
option instead)
|
|
else
|
|
$(error "Unsupported ARM_ROTPK_LOCATION value")
|
|
endif
|
|
$(BUILD_PLAT)/bl1/arm_dev_rotpk.o : $(ARM_ROTPK)
|
|
$(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK)
|
|
endif
|
|
|
|
$(eval $(call add_define,ARM_ROTPK_LOCATION_ID))
|
|
$(eval $(call add_define,ARM_ROTPK_IS_HASH))
|
|
|
|
ifeq (${ENABLE_RME}, 1)
|
|
COT := cca
|
|
endif
|
|
|
|
# Force generation of the ROT public key if ROT_KEY is specified
|
|
ifdef ROT_KEY
|
|
PK_PREREQUISITES = $(ROT_KEY) FORCE
|
|
endif
|
|
|
|
$(ARM_ROTPK) : $(PK_PREREQUISITES) | $$(@D)/
|
|
ifndef ROT_KEY
|
|
$(error Cannot generate public key: no ROT_KEY defined)
|
|
endif
|
|
ifeq ($(ARM_ROTPK_IS_HASH), 1)
|
|
${OPENSSL_BIN_PATH}/openssl ${CRYPTO_ALG} -in $< -pubout -outform DER | \
|
|
${OPENSSL_BIN_PATH}/openssl dgst -${HASH_ALG} -binary -out $@
|
|
else
|
|
${OPENSSL_BIN_PATH}/openssl ${CRYPTO_ALG} -in $< -pubout -outform DER -out $@
|
|
endif
|
|
|
|
# Certificate NV-Counters. Use values corresponding to tied off values in
|
|
# ARM development platforms
|
|
TFW_NVCTR_VAL ?= 31
|
|
NTFW_NVCTR_VAL ?= 223
|
|
# The CCA Non-Volatile Counter only exists on some Arm development platforms.
|
|
# On others, we mock it by aliasing it to the Trusted Firmware Non-Volatile counter,
|
|
# hence we set both counters to the same default value.
|
|
CCAFW_NVCTR_VAL ?= 31
|
|
|
|
BL1_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \
|
|
${ARM_ROTPK_S}
|
|
BL2_SOURCES += plat/arm/board/common/board_arm_trusted_boot.c \
|
|
${ARM_ROTPK_S}
|
|
|
|
ifeq ($(CRYPTO_ALG), ec)
|
|
ifeq ($(KEY_SIZE), 384)
|
|
ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_ecdsa_secp384r1.pem
|
|
ARM_SWD_ROT_KEY := plat/arm/board/common/swd_rotpk/arm_swd_rotprivk_ecdsa_secp384r1.pem
|
|
else
|
|
ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_ecdsa.pem
|
|
ARM_SWD_ROT_KEY := plat/arm/board/common/swd_rotpk/arm_swd_rotprivk_ecdsa.pem
|
|
endif
|
|
else
|
|
ARM_PROT_KEY := plat/arm/board/common/protpk/arm_protprivk_rsa.pem
|
|
ARM_SWD_ROT_KEY := plat/arm/board/common/swd_rotpk/arm_swd_rotprivk_rsa.pem
|
|
endif
|
|
|
|
# Allows platform code to provide implementation variants depending on the
|
|
# selected chain of trust.
|
|
$(eval $(call add_define,ARM_COT_${COT}))
|
|
|
|
ifeq (${COT},dualroot)
|
|
# Platform Root of Trust key files.
|
|
ARM_PROTPK := $(BUILD_PLAT)/arm_protpk.bin
|
|
|
|
# Provide the private key to cert_create tool. It needs it to sign the images.
|
|
PROT_KEY := ${ARM_PROT_KEY}
|
|
|
|
$(eval $(call add_define_val,ARM_PROTPK,'"$(ARM_PROTPK)"'))
|
|
|
|
BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S
|
|
BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S
|
|
|
|
$(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK)
|
|
$(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK)
|
|
endif
|
|
|
|
ifeq (${COT},cca)
|
|
# Platform and Secure World Root of Trust key files.
|
|
ARM_PROTPK := $(BUILD_PLAT)/arm_protpk.bin
|
|
ARM_SWD_ROTPK := $(BUILD_PLAT)/arm_swd_rotpk.bin
|
|
|
|
# Provide the private keys to cert_create tool. It needs them to sign the images.
|
|
PROT_KEY := ${ARM_PROT_KEY}
|
|
SWD_ROT_KEY := ${ARM_SWD_ROT_KEY}
|
|
|
|
$(eval $(call add_define_val,ARM_PROTPK,'"$(ARM_PROTPK)"'))
|
|
$(eval $(call add_define_val,ARM_SWD_ROTPK,'"$(ARM_SWD_ROTPK)"'))
|
|
|
|
BL1_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S \
|
|
plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
|
|
BL2_SOURCES += plat/arm/board/common/protpk/arm_dev_protpk.S \
|
|
plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
|
|
|
|
$(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK)
|
|
$(BUILD_PLAT)/bl1/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK)
|
|
$(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK)
|
|
$(BUILD_PLAT)/bl2/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK)
|
|
endif
|
|
|
|
$(ARM_PROTPK): $(ARM_PROT_KEY)
|
|
ifndef ARM_PROT_KEY
|
|
$(error Cannot generate hash: no PROT_KEY defined)
|
|
endif
|
|
${OPENSSL_BIN_PATH}/openssl ${CRYPTO_ALG} -in ${ARM_PROT_KEY} -pubout -outform DER | \
|
|
${OPENSSL_BIN_PATH}/openssl dgst -${HASH_ALG} -binary -out $@
|
|
|
|
$(ARM_SWD_ROTPK): $(ARM_SWD_ROT_KEY)
|
|
ifndef ARM_SWD_ROT_KEY
|
|
$(error Cannot generate hash: no SWD_KEY defined)
|
|
endif
|
|
${OPENSSL_BIN_PATH}/openssl ${CRYPTO_ALG} -in ${ARM_SWD_ROT_KEY} -pubout -outform DER | \
|
|
${OPENSSL_BIN_PATH}/openssl dgst -${HASH_ALG} -binary -out $@
|
|
endif
|