blob: 37d87d307209f0b58052fa9f1f0e1eec60f1405c [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Manish V Badarkhea1ffcf72020-06-11 21:08:45 +01002 * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley9df48042015-03-19 18:58:55 +00005 */
6
Antonio Nino Diaz5eb88372018-11-08 10:20:19 +00007#ifndef TBBR_OID_H
8#define TBBR_OID_H
Dan Handley9df48042015-03-19 18:58:55 +00009
10/*
Juan Castillo740bc522015-12-02 09:48:34 +000011 * The following is a list of OID values defined and reserved by ARM, which
12 * are used to define the extension fields of the certificate structure, as
13 * defined in the Trusted Board Boot Requirements (TBBR) specification,
14 * ARM DEN0006C-1.
Dan Handley9df48042015-03-19 18:58:55 +000015 */
16
Dan Handley9df48042015-03-19 18:58:55 +000017
Juan Castillo740bc522015-12-02 09:48:34 +000018/* TrustedFirmwareNVCounter - Non-volatile counter extension */
Juan Castillobe801202015-12-03 10:19:21 +000019#define TRUSTED_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.1"
Juan Castillo740bc522015-12-02 09:48:34 +000020/* NonTrustedFirmwareNVCounter - Non-volatile counter extension */
Juan Castillobe801202015-12-03 10:19:21 +000021#define NON_TRUSTED_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.2"
Dan Handley9df48042015-03-19 18:58:55 +000022
Dan Handley9df48042015-03-19 18:58:55 +000023
Juan Castillo740bc522015-12-02 09:48:34 +000024/*
25 * Non-Trusted Firmware Updater Certificate
26 */
27
28/* APFirmwareUpdaterConfigHash - BL2U */
Juan Castillobe801202015-12-03 10:19:21 +000029#define AP_FWU_CFG_HASH_OID "1.3.6.1.4.1.4128.2100.101"
Juan Castillo740bc522015-12-02 09:48:34 +000030/* SCPFirmwareUpdaterConfigHash - SCP_BL2U */
Juan Castillobe801202015-12-03 10:19:21 +000031#define SCP_FWU_CFG_HASH_OID "1.3.6.1.4.1.4128.2100.102"
Juan Castillo740bc522015-12-02 09:48:34 +000032/* FirmwareUpdaterHash - NS_BL2U */
Juan Castillobe801202015-12-03 10:19:21 +000033#define FWU_HASH_OID "1.3.6.1.4.1.4128.2100.103"
Juan Castillo740bc522015-12-02 09:48:34 +000034/* TrustedWatchdogRefreshTime */
35#define TRUSTED_WATCHDOG_TIME_OID "1.3.6.1.4.1.4128.2100.104"
36
37
38/*
39 * Trusted Boot Firmware Certificate
40 */
41
42/* TrustedBootFirmwareHash - BL2 */
Juan Castillobe801202015-12-03 10:19:21 +000043#define TRUSTED_BOOT_FW_HASH_OID "1.3.6.1.4.1.4128.2100.201"
Soby Mathew2ffb4732017-11-07 16:50:31 +000044#define TRUSTED_BOOT_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.202"
45#define HW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.203"
Manish V Badarkhea1ffcf72020-06-11 21:08:45 +010046#define FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.204"
Juan Castillo740bc522015-12-02 09:48:34 +000047
48/*
49 * Trusted Key Certificate
50 */
51
52/* PrimaryDebugCertificatePK */
53#define PRIMARY_DEBUG_PK_OID "1.3.6.1.4.1.4128.2100.301"
54/* TrustedWorldPK */
Juan Castillobe801202015-12-03 10:19:21 +000055#define TRUSTED_WORLD_PK_OID "1.3.6.1.4.1.4128.2100.302"
Juan Castillo740bc522015-12-02 09:48:34 +000056/* NonTrustedWorldPK */
Juan Castillobe801202015-12-03 10:19:21 +000057#define NON_TRUSTED_WORLD_PK_OID "1.3.6.1.4.1.4128.2100.303"
Juan Castillo740bc522015-12-02 09:48:34 +000058
59
60/*
61 * Trusted Debug Certificate
62 */
63
64/* DebugScenario */
65#define TRUSTED_DEBUG_SCENARIO_OID "1.3.6.1.4.1.4128.2100.401"
66/* SoC Specific */
67#define TRUSTED_DEBUG_SOC_SPEC_OID "1.3.6.1.4.1.4128.2100.402"
68/* SecondaryDebugCertPK */
69#define SECONDARY_DEBUG_PK_OID "1.3.6.1.4.1.4128.2100.403"
70
71
72/*
73 * SoC Firmware Key Certificate
74 */
75
76/* SoCFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +000077#define SOC_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.501"
Juan Castillo740bc522015-12-02 09:48:34 +000078
Juan Castillo740bc522015-12-02 09:48:34 +000079/*
80 * SoC Firmware Content Certificate
81 */
Dan Handley9df48042015-03-19 18:58:55 +000082
Juan Castillo740bc522015-12-02 09:48:34 +000083/* APRomPatchHash - BL1_PATCH */
84#define APROM_PATCH_HASH_OID "1.3.6.1.4.1.4128.2100.601"
85/* SoCConfigHash */
86#define SOC_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.602"
87/* SoCAPFirmwareHash - BL31 */
Juan Castillobe801202015-12-03 10:19:21 +000088#define SOC_AP_FW_HASH_OID "1.3.6.1.4.1.4128.2100.603"
Soby Mathew2bb78d32018-03-29 14:29:55 +010089/* SoCFirmwareConfigHash = SOC_FW_CONFIG */
90#define SOC_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.604"
Dan Handley9df48042015-03-19 18:58:55 +000091
Juan Castillo740bc522015-12-02 09:48:34 +000092/*
93 * SCP Firmware Key Certificate
94 */
95
96/* SCPFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +000097#define SCP_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.701"
Juan Castillo740bc522015-12-02 09:48:34 +000098
99
100/*
101 * SCP Firmware Content Certificate
102 */
103
Juan Castilloa72b6472015-12-10 15:49:17 +0000104/* SCPFirmwareHash - SCP_BL2 */
Juan Castillobe801202015-12-03 10:19:21 +0000105#define SCP_FW_HASH_OID "1.3.6.1.4.1.4128.2100.801"
Juan Castilloa72b6472015-12-10 15:49:17 +0000106/* SCPRomPatchHash - SCP_BL1_PATCH */
Juan Castillo740bc522015-12-02 09:48:34 +0000107#define SCP_ROM_PATCH_HASH_OID "1.3.6.1.4.1.4128.2100.802"
108
109
110/*
111 * Trusted OS Firmware Key Certificate
112 */
113
114/* TrustedOSFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +0000115#define TRUSTED_OS_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.901"
Juan Castillo740bc522015-12-02 09:48:34 +0000116
117
118/*
119 * Trusted OS Firmware Content Certificate
120 */
121
122/* TrustedOSFirmwareHash - BL32 */
Juan Castillobe801202015-12-03 10:19:21 +0000123#define TRUSTED_OS_FW_HASH_OID "1.3.6.1.4.1.4128.2100.1001"
Summer Qin80726782017-04-20 16:28:39 +0100124/* TrustedOSExtra1FirmwareHash - BL32 Extra1 */
125#define TRUSTED_OS_FW_EXTRA1_HASH_OID "1.3.6.1.4.1.4128.2100.1002"
126/* TrustedOSExtra2FirmwareHash - BL32 Extra2 */
127#define TRUSTED_OS_FW_EXTRA2_HASH_OID "1.3.6.1.4.1.4128.2100.1003"
Soby Mathew2bb78d32018-03-29 14:29:55 +0100128/* TrustedOSFirmwareConfigHash - TOS_FW_CONFIG */
129#define TRUSTED_OS_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.1004"
Juan Castillo740bc522015-12-02 09:48:34 +0000130
131
132/*
133 * Non-Trusted Firmware Key Certificate
134 */
135
136/* NonTrustedFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +0000137#define NON_TRUSTED_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.1101"
Juan Castillo740bc522015-12-02 09:48:34 +0000138
139
140/*
141 * Non-Trusted Firmware Content Certificate
142 */
Dan Handley9df48042015-03-19 18:58:55 +0000143
Juan Castillo740bc522015-12-02 09:48:34 +0000144/* NonTrustedWorldBootloaderHash - BL33 */
Juan Castillobe801202015-12-03 10:19:21 +0000145#define NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID "1.3.6.1.4.1.4128.2100.1201"
Soby Mathew2bb78d32018-03-29 14:29:55 +0100146/* NonTrustedFirmwareConfigHash - NT_FW_CONFIG */
147#define NON_TRUSTED_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.1202"
Dan Handley9df48042015-03-19 18:58:55 +0000148
Manish Pandeyc70b4b42020-06-10 15:50:36 +0100149/*
150 * Secure Partitions Content Certificate
151 */
152#define SP_PKG1_HASH_OID "1.3.6.1.4.1.4128.2100.1301"
153#define SP_PKG2_HASH_OID "1.3.6.1.4.1.4128.2100.1302"
154#define SP_PKG3_HASH_OID "1.3.6.1.4.1.4128.2100.1303"
155#define SP_PKG4_HASH_OID "1.3.6.1.4.1.4128.2100.1304"
156#define SP_PKG5_HASH_OID "1.3.6.1.4.1.4128.2100.1305"
157#define SP_PKG6_HASH_OID "1.3.6.1.4.1.4128.2100.1306"
158#define SP_PKG7_HASH_OID "1.3.6.1.4.1.4128.2100.1307"
159#define SP_PKG8_HASH_OID "1.3.6.1.4.1.4128.2100.1308"
160
Antonio Nino Diaz5eb88372018-11-08 10:20:19 +0000161#endif /* TBBR_OID_H */