xref: /rk3399_ARM-atf/drivers/tpm/tpm2.mk (revision 7e848540159ba8fbb0577c76e4dc0c5bbc542489)
1*36e3d877SAbhi.Singh#
2*36e3d877SAbhi.Singh# Copyright (c) 2025, Arm Limited. All rights reserved.
3*36e3d877SAbhi.Singh#
4*36e3d877SAbhi.Singh# SPDX-License-Identifier: BSD-3-Clause
5*36e3d877SAbhi.Singh#
6*36e3d877SAbhi.Singh
7*36e3d877SAbhi.SinghTPM2_SRC_DIR	:= drivers/tpm/
8*36e3d877SAbhi.Singh
9*36e3d877SAbhi.SinghTPM2_SOURCES	:= ${TPM2_SRC_DIR}tpm2_cmds.c \
10*36e3d877SAbhi.Singh                   ${TPM2_SRC_DIR}tpm2_chip.c
11*36e3d877SAbhi.Singh
12*36e3d877SAbhi.Singh# TPM Hash algorithm, used during Measured Boot
13*36e3d877SAbhi.Singh# currently only accepts SHA-256
14*36e3d877SAbhi.Singhifeq (${MBOOT_TPM_HASH_ALG}, sha256)
15*36e3d877SAbhi.Singh    TPM_ALG_ID			:=	TPM_ALG_SHA256
16*36e3d877SAbhi.Singh    TCG_DIGEST_SIZE		:=	32U
17*36e3d877SAbhi.Singhelse
18*36e3d877SAbhi.Singh    $(error "The selected MBOOT_TPM_HASH_ALG is invalid.")
19*36e3d877SAbhi.Singhendif #MBOOT_TPM_HASH_ALG
20*36e3d877SAbhi.Singh
21*36e3d877SAbhi.Singhifeq (${TPM_INTERFACE}, FIFO_SPI)
22*36e3d877SAbhi.Singh    TPM2_SOURCES += ${TPM2_SRC_DIR}tpm2_fifo.c \
23*36e3d877SAbhi.Singh                    ${TPM2_SRC_DIR}tpm2_fifo_spi.c
24*36e3d877SAbhi.Singhelse
25*36e3d877SAbhi.Singh    $(error "The selected TPM_INTERFACE is invalid.")
26*36e3d877SAbhi.Singhendif #TPM_INTERFACE
27