xref: /rk3399_ARM-atf/tools/fiptool/tbbr_config.c (revision 4df2246943af8568564b4732de02794b2fd8bd39)
1 /*
2  * Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <stddef.h>
8 
9 #include <firmware_image_package.h>
10 
11 #include "tbbr_config.h"
12 
13 /* The images used depends on the platform. */
14 toc_entry_t toc_entries[] = {
15 	{
16 		.name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
17 		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
18 		.cmdline_name = "scp-fwu-cfg"
19 	},
20 	{
21 		.name = "AP Firmware Updater Configuration BL2U",
22 		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
23 		.cmdline_name = "ap-fwu-cfg"
24 	},
25 	{
26 		.name = "Firmware Updater NS_BL2U",
27 		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
28 		.cmdline_name = "fwu"
29 	},
30 	{
31 		.name = "Non-Trusted Firmware Updater certificate",
32 		.uuid = UUID_TRUSTED_FWU_CERT,
33 		.cmdline_name = "fwu-cert"
34 	},
35 	{
36 		.name = "Trusted Boot Firmware BL2",
37 		.uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
38 		.cmdline_name = "tb-fw"
39 	},
40 	{
41 		.name = "SCP Firmware SCP_BL2",
42 		.uuid = UUID_SCP_FIRMWARE_SCP_BL2,
43 		.cmdline_name = "scp-fw"
44 	},
45 	{
46 		.name = "EL3 Runtime Firmware BL31",
47 		.uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
48 		.cmdline_name = "soc-fw"
49 	},
50 	{
51 		.name = "Secure Payload BL32 (Trusted OS)",
52 		.uuid = UUID_SECURE_PAYLOAD_BL32,
53 		.cmdline_name = "tos-fw"
54 	},
55 	{
56 		.name = "Non-Trusted Firmware BL33",
57 		.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
58 		.cmdline_name = "nt-fw"
59 	},
60 
61 	/* Key Certificates */
62 	{
63 		.name = "Root Of Trust key certificate",
64 		.uuid = UUID_ROT_KEY_CERT,
65 		.cmdline_name = "rot-cert"
66 	},
67 	{
68 		.name = "Trusted key certificate",
69 		.uuid = UUID_TRUSTED_KEY_CERT,
70 		.cmdline_name = "trusted-key-cert"
71 	},
72 	{
73 		.name = "SCP Firmware key certificate",
74 		.uuid = UUID_SCP_FW_KEY_CERT,
75 		.cmdline_name = "scp-fw-key-cert"
76 	},
77 	{
78 		.name = "SoC Firmware key certificate",
79 		.uuid = UUID_SOC_FW_KEY_CERT,
80 		.cmdline_name = "soc-fw-key-cert"
81 	},
82 	{
83 		.name = "Trusted OS Firmware key certificate",
84 		.uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
85 		.cmdline_name = "tos-fw-key-cert"
86 	},
87 	{
88 		.name = "Non-Trusted Firmware key certificate",
89 		.uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
90 		.cmdline_name = "nt-fw-key-cert"
91 	},
92 
93 	/* Content certificates */
94 	{
95 		.name = "Trusted Boot Firmware BL2 certificate",
96 		.uuid = UUID_TRUSTED_BOOT_FW_CERT,
97 		.cmdline_name = "tb-fw-cert"
98 	},
99 	{
100 		.name = "SCP Firmware content certificate",
101 		.uuid = UUID_SCP_FW_CONTENT_CERT,
102 		.cmdline_name = "scp-fw-cert"
103 	},
104 	{
105 		.name = "SoC Firmware content certificate",
106 		.uuid = UUID_SOC_FW_CONTENT_CERT,
107 		.cmdline_name = "soc-fw-cert"
108 	},
109 	{
110 		.name = "Trusted OS Firmware content certificate",
111 		.uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
112 		.cmdline_name = "tos-fw-cert"
113 	},
114 	{
115 		.name = "Non-Trusted Firmware content certificate",
116 		.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
117 		.cmdline_name = "nt-fw-cert"
118 	},
119 	{
120 		.name = NULL,
121 		.uuid = { 0 },
122 		.cmdline_name = NULL,
123 	}
124 };
125