blob: 6f89c169b281f9bc842ef8076a595af537a0d012 [file] [log] [blame]
laurenw-arm483e5ac2022-04-21 15:49:00 -05001/*
Tamas Ban7ae8d652024-04-30 16:02:14 +02002 * Copyright (c) 2022-2024, Arm Limited. All rights reserved.
laurenw-arm483e5ac2022-04-21 15:49:00 -05003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#ifndef CCA_OID_H
8#define CCA_OID_H
9
10/* Reuse the Object IDs defined by TBBR for certificate extensions. */
11#include "tbbr_oid.h"
12
13/*
14 * Assign arbitrary Object ID values that do not conflict with any of the
15 * TBBR reserved OIDs.
16 */
17/* Platform root-of-trust public key */
18#define PROT_PK_OID "1.3.6.1.4.1.4128.2100.1102"
19/* Secure World root-of-trust public key */
20#define SWD_ROT_PK_OID "1.3.6.1.4.1.4128.2100.1103"
21/* Core Secure World public key */
22#define CORE_SWD_PK_OID "1.3.6.1.4.1.4128.2100.1104"
23/* Platform public key */
24#define PLAT_PK_OID "1.3.6.1.4.1.4128.2100.1105"
25/* Realm Monitor Manager (RMM) Hash */
26#define RMM_HASH_OID "1.3.6.1.4.1.4128.2100.1106"
27
laurenw-arm9b4f9d52023-05-02 14:28:38 -050028/* CCAFirmwareNVCounter - Non-volatile counter extension */
29#define CCA_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.3"
30
Manish V Badarkhe6dcbfa12023-07-19 10:39:08 +010031/*
32 * First undef previous definitions from tbbr_oid.h.
Tamas Ban7ae8d652024-04-30 16:02:14 +020033 * CCA ROTPK authenticates BL31, SCP_BL2 and its configuration image in
Manish V Badarkhe6dcbfa12023-07-19 10:39:08 +010034 * CCA CoT.
35 **/
36#undef BL31_IMAGE_KEY_OID
37#undef SOC_FW_CONFIG_KEY_OID
38#undef HW_CONFIG_KEY_OID
Tamas Ban7ae8d652024-04-30 16:02:14 +020039#undef SCP_BL2_IMAGE_KEY_OID
Manish V Badarkhe6dcbfa12023-07-19 10:39:08 +010040#define BL31_IMAGE_KEY_OID ZERO_OID
41#define SOC_FW_CONFIG_KEY_OID ZERO_OID
42#define HW_CONFIG_KEY_OID ZERO_OID
Tamas Ban7ae8d652024-04-30 16:02:14 +020043#define SCP_BL2_IMAGE_KEY_OID ZERO_OID
Manish V Badarkhe6dcbfa12023-07-19 10:39:08 +010044#define RMM_IMAGE_KEY_OID ZERO_OID
45
laurenw-arm483e5ac2022-04-21 15:49:00 -050046#endif /* CCA_OID_H */