xref: /rk3399_ARM-atf/tools/fiptool/tbbr_config.c (revision 82cb2c1ad9897473743f08437d0a3995bed561b9)
1 /*
2  * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <stddef.h>
8 
9 #include "firmware_image_package.h"
10 #include "tbbr_config.h"
11 
12 /* The images used depends on the platform. */
13 toc_entry_t toc_entries[] = {
14 	{
15 		.name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
16 		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
17 		.cmdline_name = "scp-fwu-cfg"
18 	},
19 	{
20 		.name = "AP Firmware Updater Configuration BL2U",
21 		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
22 		.cmdline_name = "ap-fwu-cfg"
23 	},
24 	{
25 		.name = "Firmware Updater NS_BL2U",
26 		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
27 		.cmdline_name = "fwu"
28 	},
29 	{
30 		.name = "Non-Trusted Firmware Updater certificate",
31 		.uuid = UUID_TRUSTED_FWU_CERT,
32 		.cmdline_name = "fwu-cert"
33 	},
34 	{
35 		.name = "Trusted Boot Firmware BL2",
36 		.uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
37 		.cmdline_name = "tb-fw"
38 	},
39 	{
40 		.name = "SCP Firmware SCP_BL2",
41 		.uuid = UUID_SCP_FIRMWARE_SCP_BL2,
42 		.cmdline_name = "scp-fw"
43 	},
44 	{
45 		.name = "EL3 Runtime Firmware BL31",
46 		.uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
47 		.cmdline_name = "soc-fw"
48 	},
49 	{
50 		.name = "Secure Payload BL32 (Trusted OS)",
51 		.uuid = UUID_SECURE_PAYLOAD_BL32,
52 		.cmdline_name = "tos-fw"
53 	},
54 	{
55 		.name = "Non-Trusted Firmware BL33",
56 		.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
57 		.cmdline_name = "nt-fw"
58 	},
59 
60 	/* Key Certificates */
61 	{
62 		.name = "Root Of Trust key certificate",
63 		.uuid = UUID_ROT_KEY_CERT,
64 		.cmdline_name = "rot-cert"
65 	},
66 	{
67 		.name = "Trusted key certificate",
68 		.uuid = UUID_TRUSTED_KEY_CERT,
69 		.cmdline_name = "trusted-key-cert"
70 	},
71 	{
72 		.name = "SCP Firmware key certificate",
73 		.uuid = UUID_SCP_FW_KEY_CERT,
74 		.cmdline_name = "scp-fw-key-cert"
75 	},
76 	{
77 		.name = "SoC Firmware key certificate",
78 		.uuid = UUID_SOC_FW_KEY_CERT,
79 		.cmdline_name = "soc-fw-key-cert"
80 	},
81 	{
82 		.name = "Trusted OS Firmware key certificate",
83 		.uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
84 		.cmdline_name = "tos-fw-key-cert"
85 	},
86 	{
87 		.name = "Non-Trusted Firmware key certificate",
88 		.uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
89 		.cmdline_name = "nt-fw-key-cert"
90 	},
91 
92 	/* Content certificates */
93 	{
94 		.name = "Trusted Boot Firmware BL2 certificate",
95 		.uuid = UUID_TRUSTED_BOOT_FW_CERT,
96 		.cmdline_name = "tb-fw-cert"
97 	},
98 	{
99 		.name = "SCP Firmware content certificate",
100 		.uuid = UUID_SCP_FW_CONTENT_CERT,
101 		.cmdline_name = "scp-fw-cert"
102 	},
103 	{
104 		.name = "SoC Firmware content certificate",
105 		.uuid = UUID_SOC_FW_CONTENT_CERT,
106 		.cmdline_name = "soc-fw-cert"
107 	},
108 	{
109 		.name = "Trusted OS Firmware content certificate",
110 		.uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
111 		.cmdline_name = "tos-fw-cert"
112 	},
113 	{
114 		.name = "Non-Trusted Firmware content certificate",
115 		.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
116 		.cmdline_name = "nt-fw-cert"
117 	},
118 	{
119 		.name = NULL,
120 		.uuid = { 0 },
121 		.cmdline_name = NULL,
122 	}
123 };
124