xref: /rk3399_ARM-atf/plat/arm/board/common/board_common.mk (revision 5fdf198c117a4b6dbcf5242f5136f7224ceff6ff)
1#
2# Copyright (c) 2015-2023, Arm Limited and Contributors. All rights reserved.
3#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6
7PLAT_BL_COMMON_SOURCES	+=	drivers/arm/pl011/${ARCH}/pl011_console.S	\
8				plat/arm/board/common/${ARCH}/board_arm_helpers.S
9
10BL1_SOURCES		+=	drivers/cfi/v2m/v2m_flash.c
11
12BL2_SOURCES		+=	drivers/cfi/v2m/v2m_flash.c
13
14ifneq (${TRUSTED_BOARD_BOOT},0)
15ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_dev_rotpk.S
16ifneq (${ARM_CRYPTOCELL_INTEG}, 1)
17# ROTPK hash location
18ifeq (${ARM_ROTPK_LOCATION}, regs)
19	ARM_ROTPK_LOCATION_ID = ARM_ROTPK_REGS_ID
20else ifeq (${ARM_ROTPK_LOCATION}, devel_rsa)
21	CRYPTO_ALG=rsa
22	ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_RSA_ID
23	ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_rsa_sha256.bin
24$(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"'))
25$(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH)
26$(warning Development keys support for FVP is deprecated. Use `regs` \
27option instead)
28else ifeq (${ARM_ROTPK_LOCATION}, devel_ecdsa)
29	CRYPTO_ALG=ec
30	ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_ECDSA_ID
31	ARM_ROTPK_HASH = plat/arm/board/common/rotpk/arm_rotpk_ecdsa_sha256.bin
32$(eval $(call add_define_val,ARM_ROTPK_HASH,'"$(ARM_ROTPK_HASH)"'))
33$(BUILD_PLAT)/bl2/arm_dev_rotpk.o : $(ARM_ROTPK_HASH)
34$(warning Development keys support for FVP is deprecated. Use `regs` \
35option instead)
36else ifeq (${ARM_ROTPK_LOCATION}, devel_full_dev_rsa_key)
37	CRYPTO_ALG=rsa
38	ARM_ROTPK_LOCATION_ID = ARM_ROTPK_DEVEL_FULL_DEV_RSA_KEY_ID
39	ARM_ROTPK_S = plat/arm/board/common/rotpk/arm_full_dev_rsa_rotpk.S
40$(warning Development keys support for FVP is deprecated. Use `regs` \
41option instead)
42else
43$(error "Unsupported ARM_ROTPK_LOCATION value")
44endif
45
46$(eval $(call add_define,ARM_ROTPK_LOCATION_ID))
47
48ifeq (${ENABLE_RME}, 1)
49COT	:=	cca
50endif
51
52# Force generation of the new hash if ROT_KEY is specified
53ifdef ROT_KEY
54	HASH_PREREQUISITES = $(ROT_KEY) FORCE
55else
56	HASH_PREREQUISITES = $(ROT_KEY)
57endif
58
59$(ARM_ROTPK_HASH) : $(HASH_PREREQUISITES)
60ifndef ROT_KEY
61	$(error Cannot generate hash: no ROT_KEY defined)
62endif
63	${OPENSSL_BIN_PATH}/openssl ${CRYPTO_ALG} -in $< -pubout -outform DER | \
64	${OPENSSL_BIN_PATH}/openssl dgst -sha256 -binary > $@
65
66# Certificate NV-Counters. Use values corresponding to tied off values in
67# ARM development platforms
68TFW_NVCTR_VAL	?=	31
69NTFW_NVCTR_VAL	?=	223
70# The CCA Non-Volatile Counter only exists on some Arm development platforms.
71# On others, we mock it by aliasing it to the Trusted Firmware Non-Volatile counter,
72# hence we set both counters to the same default value.
73CCAFW_NVCTR_VAL	?=	31
74else
75# Certificate NV-Counters when CryptoCell is integrated. For development
76# platforms we set the counter to first valid value.
77TFW_NVCTR_VAL	?=	0
78NTFW_NVCTR_VAL	?=	0
79CCAFW_NVCTR_VAL	?=	0
80endif
81BL1_SOURCES		+=	plat/arm/board/common/board_arm_trusted_boot.c \
82				${ARM_ROTPK_S}
83BL2_SOURCES		+=	plat/arm/board/common/board_arm_trusted_boot.c \
84				${ARM_ROTPK_S}
85
86# Allows platform code to provide implementation variants depending on the
87# selected chain of trust.
88$(eval $(call add_define,ARM_COT_${COT}))
89
90ifeq (${COT},dualroot)
91# Platform Root of Trust key files.
92ARM_PROT_KEY		:=	plat/arm/board/common/protpk/arm_protprivk_rsa.pem
93ARM_PROTPK_HASH		:=	plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin
94
95# Provide the private key to cert_create tool. It needs it to sign the images.
96PROT_KEY		:=	${ARM_PROT_KEY}
97
98$(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"'))
99
100BL1_SOURCES		+=	plat/arm/board/common/protpk/arm_dev_protpk.S
101BL2_SOURCES		+=	plat/arm/board/common/protpk/arm_dev_protpk.S
102
103$(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
104$(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
105endif
106
107ifeq (${COT},cca)
108# Platform and Secure World Root of Trust key files.
109ARM_PROT_KEY		:=	plat/arm/board/common/protpk/arm_protprivk_rsa.pem
110ARM_PROTPK_HASH		:=	plat/arm/board/common/protpk/arm_protpk_rsa_sha256.bin
111ARM_SWD_ROT_KEY		:=	plat/arm/board/common/swd_rotpk/arm_swd_rotprivk_rsa.pem
112ARM_SWD_ROTPK_HASH	:=	plat/arm/board/common/swd_rotpk/arm_swd_rotpk_rsa_sha256.bin
113
114# Provide the private keys to cert_create tool. It needs them to sign the images.
115PROT_KEY		:=	${ARM_PROT_KEY}
116SWD_ROT_KEY		:=	${ARM_SWD_ROT_KEY}
117
118$(eval $(call add_define_val,ARM_PROTPK_HASH,'"$(ARM_PROTPK_HASH)"'))
119$(eval $(call add_define_val,ARM_SWD_ROTPK_HASH,'"$(ARM_SWD_ROTPK_HASH)"'))
120
121BL1_SOURCES		+=	plat/arm/board/common/protpk/arm_dev_protpk.S \
122				plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
123BL2_SOURCES		+=	plat/arm/board/common/protpk/arm_dev_protpk.S \
124				plat/arm/board/common/swd_rotpk/arm_dev_swd_rotpk.S
125
126$(BUILD_PLAT)/bl1/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
127$(BUILD_PLAT)/bl1/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK_HASH)
128$(BUILD_PLAT)/bl2/arm_dev_protpk.o: $(ARM_PROTPK_HASH)
129$(BUILD_PLAT)/bl2/arm_dev_swd_rotpk.o: $(ARM_SWD_ROTPK_HASH)
130endif
131
132endif
133