You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
123 lines
3.1 KiB
123 lines
3.1 KiB
#!/bin/sh
|
|
#
|
|
# This script implements the old fip_create tool on top of
|
|
# the new fiptool.
|
|
#
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
|
#
|
|
|
|
usage() {
|
|
cat << EOF
|
|
This tool is used to create a Firmware Image Package.
|
|
|
|
Usage:
|
|
fip_create [options] FIP_FILENAME
|
|
|
|
Options:
|
|
-h,--help: Print this help message and exit
|
|
-d,--dump: Print contents of FIP after update
|
|
-u,--unpack: Unpack images from an existing FIP
|
|
-f,--force: Overwrite existing files when unpacking images
|
|
|
|
Components that can be added/updated:
|
|
--scp-fwu-cfg FILENAME SCP Firmware Updater Configuration FWU SCP_BL2U
|
|
--ap-fwu-cfg FILENAME AP Firmware Updater Configuration BL2U
|
|
--fwu FILENAME Firmware Updater NS_BL2U
|
|
--fwu-cert FILENAME Non-Trusted Firmware Updater certificate
|
|
--tb-fw FILENAME Trusted Boot Firmware BL2
|
|
--scp-fw FILENAME SCP Firmware SCP_BL2
|
|
--soc-fw FILENAME EL3 Runtime Firmware BL31
|
|
--tos-fw FILENAME Secure Payload BL32 (Trusted OS)
|
|
--nt-fw FILENAME Non-Trusted Firmware BL33
|
|
--rot-cert FILENAME Root Of Trust key certificate
|
|
--trusted-key-cert FILENAME Trusted key certificate
|
|
--scp-fw-key-cert FILENAME SCP Firmware key certificate
|
|
--soc-fw-key-cert FILENAME SoC Firmware key certificate
|
|
--tos-fw-key-cert FILENAME Trusted OS Firmware key certificate
|
|
--nt-fw-key-cert FILENAME Non-Trusted Firmware key certificate
|
|
--tb-fw-cert FILENAME Trusted Boot Firmware BL2 certificate
|
|
--scp-fw-cert FILENAME SCP Firmware content certificate
|
|
--soc-fw-cert FILENAME SoC Firmware content certificate
|
|
--tos-fw-cert FILENAME Trusted OS Firmware content certificate
|
|
--nt-fw-cert FILENAME Non-Trusted Firmware content certificate
|
|
EOF
|
|
exit
|
|
}
|
|
|
|
echo "!! The fip_create tool is deprecated. Use the new fiptool. !!"
|
|
basedir="$(dirname $0)/../fiptool"
|
|
fiptool_args=
|
|
while :; do
|
|
case "$1" in
|
|
-h | --help )
|
|
usage
|
|
break ;;
|
|
-d | --dump )
|
|
fiptool_args="info $fiptool_args"
|
|
shift ;;
|
|
-u | --unpack )
|
|
fiptool_args="unpack $fiptool_args"
|
|
shift ;;
|
|
-f | --force )
|
|
fiptool_args="$fiptool_args --force"
|
|
shift ;;
|
|
--scp-fwu-cfg | \
|
|
--ap-fwu-cfg | \
|
|
--fwu | \
|
|
--fwu-cert | \
|
|
--tb-fw | \
|
|
--scp-fw | \
|
|
--soc-fw | \
|
|
--tos-fw | \
|
|
--nt-fw | \
|
|
--rot-cert | \
|
|
--trusted-key-cert | \
|
|
--scp-fw-key-cert | \
|
|
--soc-fw-key-cert | \
|
|
--tos-fw-key-cert | \
|
|
--nt-fw-key-cert | \
|
|
--tb-fw-cert | \
|
|
--scp-fw-cert | \
|
|
--soc-fw-cert | \
|
|
--tos-fw-cert | \
|
|
--nt-fw-cert )
|
|
fiptool_args="$fiptool_args $1"
|
|
shift
|
|
if test -z $1; then
|
|
usage
|
|
fi
|
|
fiptool_args="$fiptool_args $1"
|
|
shift ;;
|
|
* )
|
|
break ;;
|
|
esac
|
|
done
|
|
|
|
# expect a FIP filename
|
|
if test -z $1; then
|
|
usage
|
|
fi
|
|
|
|
is_pack_cmd=1
|
|
for arg in $fiptool_args; do
|
|
case "$arg" in
|
|
unpack )
|
|
is_pack_cmd=0
|
|
break ;;
|
|
info )
|
|
is_pack_cmd=0
|
|
break ;;
|
|
* )
|
|
esac
|
|
done
|
|
|
|
# if --unpack and --dump were not specified
|
|
# the default action is to pack
|
|
if test "$is_pack_cmd" -eq 1; then
|
|
fiptool_args="update $fiptool_args"
|
|
fi
|
|
|
|
# append FIP filename
|
|
fiptool_args="$fiptool_args $1"
|
|
echo "Invoking fiptool with args: $fiptool_args"
|
|
"$basedir/fiptool" $fiptool_args
|
|
|