[Feature] add GA346 baseline version

Change-Id: Ic62933698569507dcf98240cdf5d9931ae34348f
diff --git a/meta/meta-mediatek/classes/trustzone-fitimage.bbclass b/meta/meta-mediatek/classes/trustzone-fitimage.bbclass
new file mode 100644
index 0000000..0572ee4
--- /dev/null
+++ b/meta/meta-mediatek/classes/trustzone-fitimage.bbclass
@@ -0,0 +1,223 @@
+inherit hsm-sign-env
+
+python __anonymous () {
+        depends = d.getVar("DEPENDS", True)
+        depends = "%s u-boot-mkimage-native lz4-native" % depends
+        d.setVar("DEPENDS", depends)
+}
+
+#
+# Emit the fitImage ITS header
+#
+fitimage_emit_fit_header() {
+        cat << EOF >> ${WORKDIR}/fit-image.its
+/dts-v1/;
+
+/ {
+        description = "Trustzone fitimage for ${DISTRO_NAME}/${PV}/${MACHINE} ver:${TRUSTZONE_VERSION}";
+        #address-cells = <1>;
+EOF
+}
+
+#
+# Emit the fitImage section bits
+#
+# $1 ... Section bit type: imagestart - image section start
+#                          confstart  - configuration section start
+#                          sectend    - section end
+#                          fitend     - fitimage end
+#
+fitimage_emit_section_maint() {
+        case $1 in
+        imagestart)
+                cat << EOF >> ${WORKDIR}/fit-image.its
+
+        images {
+EOF
+        ;;
+        confstart)
+                cat << EOF >> ${WORKDIR}/fit-image.its
+
+        configurations {
+EOF
+        ;;
+        sectend)
+                cat << EOF >> ${WORKDIR}/fit-image.its
+        };
+EOF
+        ;;
+        fitend)
+                cat << EOF >> ${WORKDIR}/fit-image.its
+};
+EOF
+        ;;
+        esac
+}
+
+fitimage_emit_section_trustedos() {
+
+        if [ -n "${IMAGE_HASH_ALGO}" ] ; then
+            trustedos_csum="${IMAGE_HASH_ALGO}"
+        else
+            trustedos_csum="sha256"
+        fi
+
+        cat << EOF >> ${WORKDIR}/fit-image.its
+                trustedos@1 {
+                        description = "Trusted OS Image";
+                        data = /incbin/("${1}");
+                        type = "tee";
+                        arch = "arm";
+                        os = "linux";
+                        compression = "${2}";
+                        load = <${TRUSTEDOS_LOADADDRESS}>;
+                        entry = <${TRUSTEDOS_ENTRYPOINT}>;
+                        hash@1 {
+                                algo = "${trustedos_csum}";
+                        };
+                };
+EOF
+}
+
+#
+# Emit the fitImage ITS trustzone section
+#
+# $1 ... Path to trustzone image
+# $2 ... Compression type
+fitimage_emit_section_trustzone() {
+
+        if [ -n "${IMAGE_HASH_ALGO}" ] ; then
+            trustzone_csum="${IMAGE_HASH_ALGO}"
+        else
+            trustzone_csum="sha256"
+        fi
+
+if [ -d ${TL_SRC} ]; then
+        cat << EOF >> ${WORKDIR}/fit-image.its
+                tee@1 {
+                        description = "Tee Image";
+                        data = /incbin/("${1}");
+                        type = "kernel";
+                        arch = "arm";
+                        os = "linux";
+                        compression = "${2}";
+                        load = <${TEE_LOADADDRESS}>;
+                        entry = <${TEE_ENTRYPOINT}>;
+                        hash@1 {
+                                algo = "${trustzone_csum}";
+                        };
+                };
+EOF
+else
+        cat << EOF >> ${WORKDIR}/fit-image.its
+                tee@1 {
+                        description = "Tee Image";
+                        data = /incbin/("${1}");
+                        type = "kernel";
+                        arch = "arm";
+                        os = "linux";
+                        compression = "${2}";
+                        load = <${TRUSTZONE_LOADADDRESS}>;
+                        entry = <${TRUSTZONE_ENTRYPOINT}>;
+                        hash@1 {
+                                algo = "${trustzone_csum}";
+                        };
+                };
+EOF
+fi
+}
+
+#
+# Emit the fitImage ITS configuration section
+#
+# $1 ... trustzone image ID
+fitimage_emit_section_config() {
+
+        if [ -n "${VB_HASH_ALGO}" ] && [ -n "${VB_RSA_ALGO}" ] ; then
+            conf_csum="${VB_HASH_ALGO},${VB_RSA_ALGO}"
+        else
+            conf_csum="sha256,rsa2048"
+        fi
+        conf_key_name="dev"
+
+        conf_desc="${MTK_PROJECT} configuration"
+
+        trustzone_line="kernel = \"tee@1\";"
+         if [ -n "${TRUSTEDOS_ENTRYPOINT}" ] && [ -n "${TRUSTEDOS_LOADADDRESS}" ] ; then
+            trustedos_line="tee = \"trustedos@1\";"
+            sign_images_line="sign-images = \"kernel\", \"tee\";"
+        else
+            trustedos_line=""
+            sign_images_line="sign-images = \"kernel\";"
+        fi
+
+        cat << EOF >> ${WORKDIR}/fit-image.its
+                default = "conf@1";
+                conf@1 {
+                        description = "${conf_desc}";
+                        ${trustzone_line}
+                        ${trustedos_line}
+                        signature@1 {
+                                algo = "${conf_csum}";
+                                key-name-hint="${conf_key_name}";
+                                ${sign_images_line}
+                        };
+                };
+EOF
+}
+
+do_assemble_fitimage() {
+
+                rm -f ${WORKDIR}/fit-image.its
+
+                fitimage_emit_fit_header
+
+                #
+                # Step 1: Prepare a trustzone image section.
+                #
+                fitimage_emit_section_maint imagestart
+
+                #uboot_prep_kimage
+                if [ -d ${TL_SRC} ]; then
+                        if [ "${SECURE_BOOT_ENABLE}" = "yes" ] && [ "${FORCE_DISABLE_TEE_ENCRYPTION}" != "yes" ]; then
+                                fitimage_emit_section_trustzone ${TZ_ASSEMBLE_OUT}/${TZ_TMP_SIGNED_BINARY} ${TRUSTZONE_COMPRESS}
+                                if [ -n "${TRUSTEDOS_ENTRYPOINT}" ] && [ -n "${TRUSTEDOS_LOADADDRESS}" ] ; then
+                                    fitimage_emit_section_trustedos ${TZ_ASSEMBLE_OUT}/${TRUSTEDOS_SIGNED_BINARY} ${TRUSTZONE_COMPRESS}
+                                fi
+                        else
+                                fitimage_emit_section_trustzone ${TZ_ASSEMBLE_OUT}/${TZ_TMP_RAW_BINARY} ${TRUSTZONE_COMPRESS}
+                                 if [ -n "${TRUSTEDOS_ENTRYPOINT}" ] && [ -n "${TRUSTEDOS_LOADADDRESS}" ] ; then
+                                    fitimage_emit_section_trustedos ${TZ_ASSEMBLE_OUT}/${TRUSTEDOS_RAW_BINARY} ${TRUSTZONE_COMPRESS}
+                                fi
+                        fi
+                else
+                        fitimage_emit_section_trustzone ${TZ_ASSEMBLE_OUT}/${TZ_RAW_BINARY} ${TRUSTZONE_COMPRESS}
+                fi
+
+                fitimage_emit_section_maint sectend
+
+                #
+                # Step 2: Prepare a configurations section
+                #
+                fitimage_emit_section_maint confstart
+
+                fitimage_emit_section_config
+
+                fitimage_emit_section_maint sectend
+
+                fitimage_emit_section_maint fitend
+
+                #
+                # Step 3: Assemble the image
+                #
+                ${HSM_ENV} HSM_KEY_NAME=${VERIFIED_KEY} uboot-mkimage -f ${WORKDIR}/fit-image.its ${TZ_ASSEMBLE_OUT}/${TZ_BINARY}
+
+                if [ "${SECURE_BOOT_ENABLE}" = "yes" ] && [ "${STANDALONE_SIGN_PREPARE}" != "yes" ]; then
+                        mkdir -p ./mykeys
+                        cp -f ${MTK_KEY_DIR}/${VERIFIED_KEY}.crt ./mykeys/dev.crt
+                        cp -f ${MTK_KEY_DIR}/${VERIFIED_KEY}.pem ./mykeys/dev.key
+                        ${HSM_ENV} HSM_KEY_NAME=${VERIFIED_KEY} uboot-mkimage -D "-I dts -O dtb -p 1024" -k ./mykeys -f ${WORKDIR}/fit-image.its -r ${TZ_ASSEMBLE_OUT}/${TZ_BINARY}
+                fi
+}
+
+addtask assemble_fitimage before do_install after do_compile