blob: 8c53ef9552e110f770f8053ba9a8d7d27bd920f5 [file] [log] [blame]
laurenw-arm483e5ac2022-04-21 15:49:00 -05001/*
laurenw-arm9b4f9d52023-05-02 14:28:38 -05002 * Copyright (c) 2022-2023, Arm Limited. All rights reserved.
laurenw-arm483e5ac2022-04-21 15:49:00 -05003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#ifndef CCA_OID_H
8#define CCA_OID_H
9
10/* Reuse the Object IDs defined by TBBR for certificate extensions. */
11#include "tbbr_oid.h"
12
13/*
14 * Assign arbitrary Object ID values that do not conflict with any of the
15 * TBBR reserved OIDs.
16 */
17/* Platform root-of-trust public key */
18#define PROT_PK_OID "1.3.6.1.4.1.4128.2100.1102"
19/* Secure World root-of-trust public key */
20#define SWD_ROT_PK_OID "1.3.6.1.4.1.4128.2100.1103"
21/* Core Secure World public key */
22#define CORE_SWD_PK_OID "1.3.6.1.4.1.4128.2100.1104"
23/* Platform public key */
24#define PLAT_PK_OID "1.3.6.1.4.1.4128.2100.1105"
25/* Realm Monitor Manager (RMM) Hash */
26#define RMM_HASH_OID "1.3.6.1.4.1.4128.2100.1106"
27
laurenw-arm9b4f9d52023-05-02 14:28:38 -050028/* CCAFirmwareNVCounter - Non-volatile counter extension */
29#define CCA_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.3"
30
Manish V Badarkhe6dcbfa12023-07-19 10:39:08 +010031/*
32 * First undef previous definitions from tbbr_oid.h.
33 * CCA ROTPK authenticates BL31 and its configuration image in
34 * CCA CoT.
35 **/
36#undef BL31_IMAGE_KEY_OID
37#undef SOC_FW_CONFIG_KEY_OID
38#undef HW_CONFIG_KEY_OID
39#define BL31_IMAGE_KEY_OID ZERO_OID
40#define SOC_FW_CONFIG_KEY_OID ZERO_OID
41#define HW_CONFIG_KEY_OID ZERO_OID
42#define RMM_IMAGE_KEY_OID ZERO_OID
43
laurenw-arm483e5ac2022-04-21 15:49:00 -050044#endif /* CCA_OID_H */