You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
124 lines
2.8 KiB
124 lines
2.8 KiB
/*
|
|
* Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <firmware_image_package.h>
|
|
|
|
#include "tbbr_config.h"
|
|
|
|
/* The images used depends on the platform. */
|
|
toc_entry_t toc_entries[] = {
|
|
{
|
|
.name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
|
|
.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
|
|
.cmdline_name = "scp-fwu-cfg"
|
|
},
|
|
{
|
|
.name = "AP Firmware Updater Configuration BL2U",
|
|
.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
|
|
.cmdline_name = "ap-fwu-cfg"
|
|
},
|
|
{
|
|
.name = "Firmware Updater NS_BL2U",
|
|
.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
|
|
.cmdline_name = "fwu"
|
|
},
|
|
{
|
|
.name = "Non-Trusted Firmware Updater certificate",
|
|
.uuid = UUID_TRUSTED_FWU_CERT,
|
|
.cmdline_name = "fwu-cert"
|
|
},
|
|
{
|
|
.name = "Trusted Boot Firmware BL2",
|
|
.uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
|
|
.cmdline_name = "tb-fw"
|
|
},
|
|
{
|
|
.name = "SCP Firmware SCP_BL2",
|
|
.uuid = UUID_SCP_FIRMWARE_SCP_BL2,
|
|
.cmdline_name = "scp-fw"
|
|
},
|
|
{
|
|
.name = "EL3 Runtime Firmware BL31",
|
|
.uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
|
|
.cmdline_name = "soc-fw"
|
|
},
|
|
{
|
|
.name = "Secure Payload BL32 (Trusted OS)",
|
|
.uuid = UUID_SECURE_PAYLOAD_BL32,
|
|
.cmdline_name = "tos-fw"
|
|
},
|
|
{
|
|
.name = "Non-Trusted Firmware BL33",
|
|
.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
|
|
.cmdline_name = "nt-fw"
|
|
},
|
|
|
|
/* Key Certificates */
|
|
{
|
|
.name = "Root Of Trust key certificate",
|
|
.uuid = UUID_ROT_KEY_CERT,
|
|
.cmdline_name = "rot-cert"
|
|
},
|
|
{
|
|
.name = "Trusted key certificate",
|
|
.uuid = UUID_TRUSTED_KEY_CERT,
|
|
.cmdline_name = "trusted-key-cert"
|
|
},
|
|
{
|
|
.name = "SCP Firmware key certificate",
|
|
.uuid = UUID_SCP_FW_KEY_CERT,
|
|
.cmdline_name = "scp-fw-key-cert"
|
|
},
|
|
{
|
|
.name = "SoC Firmware key certificate",
|
|
.uuid = UUID_SOC_FW_KEY_CERT,
|
|
.cmdline_name = "soc-fw-key-cert"
|
|
},
|
|
{
|
|
.name = "Trusted OS Firmware key certificate",
|
|
.uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
|
|
.cmdline_name = "tos-fw-key-cert"
|
|
},
|
|
{
|
|
.name = "Non-Trusted Firmware key certificate",
|
|
.uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
|
|
.cmdline_name = "nt-fw-key-cert"
|
|
},
|
|
|
|
/* Content certificates */
|
|
{
|
|
.name = "Trusted Boot Firmware BL2 certificate",
|
|
.uuid = UUID_TRUSTED_BOOT_FW_CERT,
|
|
.cmdline_name = "tb-fw-cert"
|
|
},
|
|
{
|
|
.name = "SCP Firmware content certificate",
|
|
.uuid = UUID_SCP_FW_CONTENT_CERT,
|
|
.cmdline_name = "scp-fw-cert"
|
|
},
|
|
{
|
|
.name = "SoC Firmware content certificate",
|
|
.uuid = UUID_SOC_FW_CONTENT_CERT,
|
|
.cmdline_name = "soc-fw-cert"
|
|
},
|
|
{
|
|
.name = "Trusted OS Firmware content certificate",
|
|
.uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
|
|
.cmdline_name = "tos-fw-cert"
|
|
},
|
|
{
|
|
.name = "Non-Trusted Firmware content certificate",
|
|
.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
|
|
.cmdline_name = "nt-fw-cert"
|
|
},
|
|
{
|
|
.name = NULL,
|
|
.uuid = { 0 },
|
|
.cmdline_name = NULL,
|
|
}
|
|
};
|
|
|