1/*
2 * Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <stddef.h>
8
9#include <firmware_image_package.h>
10
11#include "tbbr_config.h"
12
13/* The images used depends on the platform. */
14toc_entry_t toc_entries[] = {
15	{
16		.name = "SCP Firmware Updater Configuration FWU SCP_BL2U",
17		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_SCP_BL2U,
18		.cmdline_name = "scp-fwu-cfg"
19	},
20	{
21		.name = "AP Firmware Updater Configuration BL2U",
22		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_BL2U,
23		.cmdline_name = "ap-fwu-cfg"
24	},
25	{
26		.name = "Firmware Updater NS_BL2U",
27		.uuid = UUID_TRUSTED_UPDATE_FIRMWARE_NS_BL2U,
28		.cmdline_name = "fwu"
29	},
30	{
31		.name = "Non-Trusted Firmware Updater certificate",
32		.uuid = UUID_TRUSTED_FWU_CERT,
33		.cmdline_name = "fwu-cert"
34	},
35	{
36		.name = "Trusted Boot Firmware BL2",
37		.uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
38		.cmdline_name = "tb-fw"
39	},
40	{
41		.name = "SCP Firmware SCP_BL2",
42		.uuid = UUID_SCP_FIRMWARE_SCP_BL2,
43		.cmdline_name = "scp-fw"
44	},
45	{
46		.name = "EL3 Runtime Firmware BL31",
47		.uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
48		.cmdline_name = "soc-fw"
49	},
50	{
51		.name = "Secure Payload BL32 (Trusted OS)",
52		.uuid = UUID_SECURE_PAYLOAD_BL32,
53		.cmdline_name = "tos-fw"
54	},
55	{
56		.name = "Secure Payload BL32 Extra1 (Trusted OS Extra1)",
57		.uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA1,
58		.cmdline_name = "tos-fw-extra1"
59	},
60	{
61		.name = "Secure Payload BL32 Extra2 (Trusted OS Extra2)",
62		.uuid = UUID_SECURE_PAYLOAD_BL32_EXTRA2,
63		.cmdline_name = "tos-fw-extra2"
64	},
65	{
66		.name = "Non-Trusted Firmware BL33",
67		.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
68		.cmdline_name = "nt-fw"
69	},
70
71	/* Key Certificates */
72	{
73		.name = "Root Of Trust key certificate",
74		.uuid = UUID_ROT_KEY_CERT,
75		.cmdline_name = "rot-cert"
76	},
77	{
78		.name = "Trusted key certificate",
79		.uuid = UUID_TRUSTED_KEY_CERT,
80		.cmdline_name = "trusted-key-cert"
81	},
82	{
83		.name = "SCP Firmware key certificate",
84		.uuid = UUID_SCP_FW_KEY_CERT,
85		.cmdline_name = "scp-fw-key-cert"
86	},
87	{
88		.name = "SoC Firmware key certificate",
89		.uuid = UUID_SOC_FW_KEY_CERT,
90		.cmdline_name = "soc-fw-key-cert"
91	},
92	{
93		.name = "Trusted OS Firmware key certificate",
94		.uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
95		.cmdline_name = "tos-fw-key-cert"
96	},
97	{
98		.name = "Non-Trusted Firmware key certificate",
99		.uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
100		.cmdline_name = "nt-fw-key-cert"
101	},
102
103	/* Content certificates */
104	{
105		.name = "Trusted Boot Firmware BL2 certificate",
106		.uuid = UUID_TRUSTED_BOOT_FW_CERT,
107		.cmdline_name = "tb-fw-cert"
108	},
109	{
110		.name = "SCP Firmware content certificate",
111		.uuid = UUID_SCP_FW_CONTENT_CERT,
112		.cmdline_name = "scp-fw-cert"
113	},
114	{
115		.name = "SoC Firmware content certificate",
116		.uuid = UUID_SOC_FW_CONTENT_CERT,
117		.cmdline_name = "soc-fw-cert"
118	},
119	{
120		.name = "Trusted OS Firmware content certificate",
121		.uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
122		.cmdline_name = "tos-fw-cert"
123	},
124	{
125		.name = "Non-Trusted Firmware content certificate",
126		.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
127		.cmdline_name = "nt-fw-cert"
128	},
129	{
130		.name = NULL,
131		.uuid = { 0 },
132		.cmdline_name = NULL,
133	}
134};
135