xref: /rk3399_ARM-atf/tools/fiptool/tbbr_config.c (revision 819281ee23e1fd048e8385ecc708f78dff5e51d9)
1*819281eeSdp-arm /*
2*819281eeSdp-arm  * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
3*819281eeSdp-arm  *
4*819281eeSdp-arm  * Redistribution and use in source and binary forms, with or without
5*819281eeSdp-arm  * modification, are permitted provided that the following conditions are met:
6*819281eeSdp-arm  *
7*819281eeSdp-arm  * Redistributions of source code must retain the above copyright notice, this
8*819281eeSdp-arm  * list of conditions and the following disclaimer.
9*819281eeSdp-arm  *
10*819281eeSdp-arm  * Redistributions in binary form must reproduce the above copyright notice,
11*819281eeSdp-arm  * this list of conditions and the following disclaimer in the documentation
12*819281eeSdp-arm  * and/or other materials provided with the distribution.
13*819281eeSdp-arm  *
14*819281eeSdp-arm  * Neither the name of ARM nor the names of its contributors may be used
15*819281eeSdp-arm  * to endorse or promote products derived from this software without specific
16*819281eeSdp-arm  * prior written permission.
17*819281eeSdp-arm  *
18*819281eeSdp-arm  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19*819281eeSdp-arm  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20*819281eeSdp-arm  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21*819281eeSdp-arm  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22*819281eeSdp-arm  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23*819281eeSdp-arm  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24*819281eeSdp-arm  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25*819281eeSdp-arm  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26*819281eeSdp-arm  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27*819281eeSdp-arm  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28*819281eeSdp-arm  * POSSIBILITY OF SUCH DAMAGE.
29*819281eeSdp-arm  */
30*819281eeSdp-arm 
31*819281eeSdp-arm #include <stddef.h>
32*819281eeSdp-arm 
33*819281eeSdp-arm #include "firmware_image_package.h"
34*819281eeSdp-arm #include "tbbr_config.h"
35*819281eeSdp-arm 
36*819281eeSdp-arm /* The images used depends on the platform. */
37*819281eeSdp-arm toc_entry_t toc_entries[] = {
38*819281eeSdp-arm 	{ "SCP Firmware Updater Configuration FWU SCP_BL2U", UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
39*819281eeSdp-arm 	  "scp-fwu-cfg", NULL, 0, NULL },
40*819281eeSdp-arm 	{ "AP Firmware Updater Configuration BL2U", UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
41*819281eeSdp-arm 	  "ap-fwu-cfg", NULL, 0, NULL },
42*819281eeSdp-arm 	{ "Firmware Updater NS_BL2U", UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
43*819281eeSdp-arm 	  "fwu", NULL, 0, NULL },
44*819281eeSdp-arm 	{ "Non-Trusted Firmware Updater certificate", UUID_TRUSTED_FWU_CERT,
45*819281eeSdp-arm 	  "fwu-cert", NULL, 0, NULL },
46*819281eeSdp-arm 	{ "Trusted Boot Firmware BL2", UUID_TRUSTED_BOOT_FIRMWARE_BL2,
47*819281eeSdp-arm 	  "tb-fw", NULL, 0, NULL },
48*819281eeSdp-arm 	{ "SCP Firmware SCP_BL2", UUID_SCP_FIRMWARE_SCP_BL2,
49*819281eeSdp-arm 	  "scp-fw", NULL, 0, NULL },
50*819281eeSdp-arm 	{ "EL3 Runtime Firmware BL31", UUID_EL3_RUNTIME_FIRMWARE_BL31,
51*819281eeSdp-arm 	  "soc-fw", NULL, 0, NULL },
52*819281eeSdp-arm 	{ "Secure Payload BL32 (Trusted OS)", UUID_SECURE_PAYLOAD_BL32,
53*819281eeSdp-arm 	  "tos-fw", NULL, 0, NULL },
54*819281eeSdp-arm 	{ "Non-Trusted Firmware BL33", UUID_NON_TRUSTED_FIRMWARE_BL33,
55*819281eeSdp-arm 	  "nt-fw", NULL, 0, NULL },
56*819281eeSdp-arm 	/* Key Certificates */
57*819281eeSdp-arm 	{ "Root Of Trust key certificate", UUID_ROT_KEY_CERT,
58*819281eeSdp-arm 	  "rot-cert", NULL, 0, NULL },
59*819281eeSdp-arm 	{ "Trusted key certificate", UUID_TRUSTED_KEY_CERT,
60*819281eeSdp-arm 	  "trusted-key-cert", NULL, 0, NULL },
61*819281eeSdp-arm 	{ "SCP Firmware key certificate", UUID_SCP_FW_KEY_CERT,
62*819281eeSdp-arm 	  "scp-fw-key-cert", NULL, 0, NULL },
63*819281eeSdp-arm 	{ "SoC Firmware key certificate", UUID_SOC_FW_KEY_CERT,
64*819281eeSdp-arm 	  "soc-fw-key-cert", NULL, 0, NULL },
65*819281eeSdp-arm 	{ "Trusted OS Firmware key certificate", UUID_TRUSTED_OS_FW_KEY_CERT,
66*819281eeSdp-arm 	  "tos-fw-key-cert", NULL, 0, NULL },
67*819281eeSdp-arm 	{ "Non-Trusted Firmware key certificate", UUID_NON_TRUSTED_FW_KEY_CERT,
68*819281eeSdp-arm 	  "nt-fw-key-cert", NULL, 0, NULL },
69*819281eeSdp-arm 	/* Content certificates */
70*819281eeSdp-arm 	{ "Trusted Boot Firmware BL2 certificate", UUID_TRUSTED_BOOT_FW_CERT,
71*819281eeSdp-arm 	  "tb-fw-cert", NULL, 0, NULL },
72*819281eeSdp-arm 	{ "SCP Firmware content certificate", UUID_SCP_FW_CONTENT_CERT,
73*819281eeSdp-arm 	  "scp-fw-cert", NULL, 0, NULL },
74*819281eeSdp-arm 	{ "SoC Firmware content certificate", UUID_SOC_FW_CONTENT_CERT,
75*819281eeSdp-arm 	  "soc-fw-cert", NULL, 0, NULL },
76*819281eeSdp-arm 	{ "Trusted OS Firmware content certificate", UUID_TRUSTED_OS_FW_CONTENT_CERT,
77*819281eeSdp-arm 	  "tos-fw-cert", NULL, 0, NULL },
78*819281eeSdp-arm 	{ "Non-Trusted Firmware content certificate", UUID_NON_TRUSTED_FW_CONTENT_CERT,
79*819281eeSdp-arm 	  "nt-fw-cert", NULL, 0, NULL },
80*819281eeSdp-arm 	{ NULL, { 0 }, NULL, NULL, 0, NULL }
81*819281eeSdp-arm };
82*819281eeSdp-arm 
83*819281eeSdp-arm size_t toc_entries_len = sizeof(toc_entries) / sizeof(toc_entries[0]);
84