• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1#
2# Copyright (c) 2015-2021, ARM Limited and Contributors. All rights reserved.
3#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6
7# This file defines the keys and certificates that must be created to establish
8# a Chain of Trust following the TBBR document. These definitions include the
9# command line options passed to the cert_create and fiptool commands.
10#
11# Expected environment:
12#
13#   BUILD_PLAT: output directory
14#   NEED_BL2: indicates whether BL2 is needed by the platform
15#   NEED_BL32: indicates whether BL32 is needed by the platform
16#   BL2: image filename (optional). Default is IMG_BIN(2) (see macro IMG_BIN)
17#   SCP_BL2: image filename (optional). Default is IMG_BIN(30)
18#   BL31: image filename (optional). Default is IMG_BIN(31)
19#   BL32: image filename (optional). Default is IMG_BIN(32)
20#   BL33: image filename (optional). Default is IMG_BIN(33)
21#
22# Build options added by this file:
23#
24#   KEY_ALG
25#   KEY_SIZE
26#   ROT_KEY
27#   PROT_KEY
28#   TRUSTED_WORLD_KEY
29#   NON_TRUSTED_WORLD_KEY
30#   SCP_BL2_KEY
31#   BL31_KEY
32#   BL32_KEY
33#   BL33_KEY
34#
35
36# Certificate generation tool default parameters
37TRUSTED_KEY_CERT	?=	${BUILD_PLAT}/trusted_key.crt
38FWU_CERT		:=	${BUILD_PLAT}/fwu_cert.crt
39
40# Default non-volatile counter values (overridable by the platform)
41TFW_NVCTR_VAL		?=	0
42NTFW_NVCTR_VAL		?=	0
43
44# Pass the non-volatile counters to the cert_create tool
45$(eval $(call CERT_ADD_CMD_OPT,${TFW_NVCTR_VAL},--tfw-nvctr))
46$(eval $(call CERT_ADD_CMD_OPT,${NTFW_NVCTR_VAL},--ntfw-nvctr))
47
48# Add Trusted Key certificate to the fiptool and cert_create command line options
49$(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
50
51# Add fwu certificate to the fiptool and cert_create command line options
52$(eval $(call TOOL_ADD_PAYLOAD,${FWU_CERT},--fwu-cert,,FWU_))
53
54# Add the keys to the cert_create command line options (private keys are NOT
55# packed in the FIP). Developers can use their own keys by specifying the proper
56# build option in the command line when building the Trusted Firmware
57$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg)))
58$(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_)))
59$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size)))
60$(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_)))
61$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg)))
62$(if ${HASH_ALG},$(eval $(call CERT_ADD_CMD_OPT,${HASH_ALG},--hash-alg,FWU_)))
63$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
64$(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_)))
65$(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key)))
66$(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key)))
67$(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key)))
68
69
70# Add the BL2 CoT (image cert)
71ifeq (${NEED_BL2},yes)
72ifeq (${BL2_AT_EL3}, 0)
73$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert))
74endif
75endif
76
77# Add the SCP_BL2 CoT (key cert + img cert)
78ifneq (${SCP_BL2},)
79    $(if ${SCP_BL2_KEY},$(eval $(call CERT_ADD_CMD_OPT,${SCP_BL2_KEY},--scp-fw-key)))
80    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert))
81    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/scp_fw_key.crt,--scp-fw-key-cert))
82endif
83
84ifeq (${ARCH},aarch64)
85ifeq (${NEED_BL31},yes)
86# Add the BL31 CoT (key cert + img cert)
87$(if ${BL31_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL31_KEY},--soc-fw-key)))
88$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_content.crt,--soc-fw-cert))
89$(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/soc_fw_key.crt,--soc-fw-key-cert))
90endif
91endif
92
93# Add the BL32 CoT (key cert + img cert)
94ifeq (${NEED_BL32},yes)
95    $(if ${BL32_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL32_KEY},--tos-fw-key)))
96    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_content.crt,--tos-fw-cert))
97    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/tos_fw_key.crt,--tos-fw-key-cert))
98endif
99
100# Add the BL33 CoT (key cert + img cert)
101ifneq (${BL33},)
102    $(if ${BL33_KEY},$(eval $(call CERT_ADD_CMD_OPT,${BL33_KEY},--nt-fw-key)))
103    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_content.crt,--nt-fw-cert))
104ifneq (${COT},dualroot)
105    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/nt_fw_key.crt,--nt-fw-key-cert))
106endif
107endif
108
109# Add SiP owned Secure Partitions CoT (image cert)
110ifneq (${SP_LAYOUT_FILE},)
111    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/sip_sp_content.crt,--sip-sp-cert))
112ifeq (${COT},dualroot)
113    $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat_sp_content.crt,--plat-sp-cert))
114endif
115endif
116