blob: 52b43ab3e3a6764ee2e8bc8428f37eddb3894cc3 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Manish V Badarkhea1ffcf72020-06-11 21:08:45 +01002 * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley9df48042015-03-19 18:58:55 +00005 */
6
Antonio Nino Diaz5eb88372018-11-08 10:20:19 +00007#ifndef TBBR_OID_H
8#define TBBR_OID_H
Dan Handley9df48042015-03-19 18:58:55 +00009
Manish V Badarkhe39317ab2020-07-23 10:43:57 +010010#define MAX_OID_NAME_LEN 30
11
Dan Handley9df48042015-03-19 18:58:55 +000012/*
Juan Castillo740bc522015-12-02 09:48:34 +000013 * The following is a list of OID values defined and reserved by ARM, which
14 * are used to define the extension fields of the certificate structure, as
15 * defined in the Trusted Board Boot Requirements (TBBR) specification,
16 * ARM DEN0006C-1.
Dan Handley9df48042015-03-19 18:58:55 +000017 */
18
Dan Handley9df48042015-03-19 18:58:55 +000019
Juan Castillo740bc522015-12-02 09:48:34 +000020/* TrustedFirmwareNVCounter - Non-volatile counter extension */
Juan Castillobe801202015-12-03 10:19:21 +000021#define TRUSTED_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.1"
Juan Castillo740bc522015-12-02 09:48:34 +000022/* NonTrustedFirmwareNVCounter - Non-volatile counter extension */
Juan Castillobe801202015-12-03 10:19:21 +000023#define NON_TRUSTED_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.2"
Dan Handley9df48042015-03-19 18:58:55 +000024
Dan Handley9df48042015-03-19 18:58:55 +000025
Juan Castillo740bc522015-12-02 09:48:34 +000026/*
27 * Non-Trusted Firmware Updater Certificate
28 */
29
30/* APFirmwareUpdaterConfigHash - BL2U */
Juan Castillobe801202015-12-03 10:19:21 +000031#define AP_FWU_CFG_HASH_OID "1.3.6.1.4.1.4128.2100.101"
Juan Castillo740bc522015-12-02 09:48:34 +000032/* SCPFirmwareUpdaterConfigHash - SCP_BL2U */
Juan Castillobe801202015-12-03 10:19:21 +000033#define SCP_FWU_CFG_HASH_OID "1.3.6.1.4.1.4128.2100.102"
Juan Castillo740bc522015-12-02 09:48:34 +000034/* FirmwareUpdaterHash - NS_BL2U */
Juan Castillobe801202015-12-03 10:19:21 +000035#define FWU_HASH_OID "1.3.6.1.4.1.4128.2100.103"
Juan Castillo740bc522015-12-02 09:48:34 +000036/* TrustedWatchdogRefreshTime */
37#define TRUSTED_WATCHDOG_TIME_OID "1.3.6.1.4.1.4128.2100.104"
38
39
40/*
41 * Trusted Boot Firmware Certificate
42 */
43
44/* TrustedBootFirmwareHash - BL2 */
Juan Castillobe801202015-12-03 10:19:21 +000045#define TRUSTED_BOOT_FW_HASH_OID "1.3.6.1.4.1.4128.2100.201"
Soby Mathew2ffb4732017-11-07 16:50:31 +000046#define TRUSTED_BOOT_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.202"
47#define HW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.203"
Manish V Badarkhea1ffcf72020-06-11 21:08:45 +010048#define FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.204"
Juan Castillo740bc522015-12-02 09:48:34 +000049
50/*
51 * Trusted Key Certificate
52 */
53
54/* PrimaryDebugCertificatePK */
55#define PRIMARY_DEBUG_PK_OID "1.3.6.1.4.1.4128.2100.301"
56/* TrustedWorldPK */
Juan Castillobe801202015-12-03 10:19:21 +000057#define TRUSTED_WORLD_PK_OID "1.3.6.1.4.1.4128.2100.302"
Juan Castillo740bc522015-12-02 09:48:34 +000058/* NonTrustedWorldPK */
Juan Castillobe801202015-12-03 10:19:21 +000059#define NON_TRUSTED_WORLD_PK_OID "1.3.6.1.4.1.4128.2100.303"
Juan Castillo740bc522015-12-02 09:48:34 +000060
61
62/*
63 * Trusted Debug Certificate
64 */
65
66/* DebugScenario */
67#define TRUSTED_DEBUG_SCENARIO_OID "1.3.6.1.4.1.4128.2100.401"
68/* SoC Specific */
69#define TRUSTED_DEBUG_SOC_SPEC_OID "1.3.6.1.4.1.4128.2100.402"
70/* SecondaryDebugCertPK */
71#define SECONDARY_DEBUG_PK_OID "1.3.6.1.4.1.4128.2100.403"
72
73
74/*
75 * SoC Firmware Key Certificate
76 */
77
78/* SoCFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +000079#define SOC_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.501"
Juan Castillo740bc522015-12-02 09:48:34 +000080
Juan Castillo740bc522015-12-02 09:48:34 +000081/*
82 * SoC Firmware Content Certificate
83 */
Dan Handley9df48042015-03-19 18:58:55 +000084
Juan Castillo740bc522015-12-02 09:48:34 +000085/* APRomPatchHash - BL1_PATCH */
86#define APROM_PATCH_HASH_OID "1.3.6.1.4.1.4128.2100.601"
87/* SoCConfigHash */
88#define SOC_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.602"
89/* SoCAPFirmwareHash - BL31 */
Juan Castillobe801202015-12-03 10:19:21 +000090#define SOC_AP_FW_HASH_OID "1.3.6.1.4.1.4128.2100.603"
Soby Mathew2bb78d32018-03-29 14:29:55 +010091/* SoCFirmwareConfigHash = SOC_FW_CONFIG */
92#define SOC_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.604"
Dan Handley9df48042015-03-19 18:58:55 +000093
Juan Castillo740bc522015-12-02 09:48:34 +000094/*
95 * SCP Firmware Key Certificate
96 */
97
98/* SCPFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +000099#define SCP_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.701"
Juan Castillo740bc522015-12-02 09:48:34 +0000100
101
102/*
103 * SCP Firmware Content Certificate
104 */
105
Juan Castilloa72b6472015-12-10 15:49:17 +0000106/* SCPFirmwareHash - SCP_BL2 */
Juan Castillobe801202015-12-03 10:19:21 +0000107#define SCP_FW_HASH_OID "1.3.6.1.4.1.4128.2100.801"
Juan Castilloa72b6472015-12-10 15:49:17 +0000108/* SCPRomPatchHash - SCP_BL1_PATCH */
Juan Castillo740bc522015-12-02 09:48:34 +0000109#define SCP_ROM_PATCH_HASH_OID "1.3.6.1.4.1.4128.2100.802"
110
111
112/*
113 * Trusted OS Firmware Key Certificate
114 */
115
116/* TrustedOSFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +0000117#define TRUSTED_OS_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.901"
Juan Castillo740bc522015-12-02 09:48:34 +0000118
119
120/*
121 * Trusted OS Firmware Content Certificate
122 */
123
124/* TrustedOSFirmwareHash - BL32 */
Juan Castillobe801202015-12-03 10:19:21 +0000125#define TRUSTED_OS_FW_HASH_OID "1.3.6.1.4.1.4128.2100.1001"
Summer Qin80726782017-04-20 16:28:39 +0100126/* TrustedOSExtra1FirmwareHash - BL32 Extra1 */
127#define TRUSTED_OS_FW_EXTRA1_HASH_OID "1.3.6.1.4.1.4128.2100.1002"
128/* TrustedOSExtra2FirmwareHash - BL32 Extra2 */
129#define TRUSTED_OS_FW_EXTRA2_HASH_OID "1.3.6.1.4.1.4128.2100.1003"
Soby Mathew2bb78d32018-03-29 14:29:55 +0100130/* TrustedOSFirmwareConfigHash - TOS_FW_CONFIG */
131#define TRUSTED_OS_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.1004"
Juan Castillo740bc522015-12-02 09:48:34 +0000132
133
134/*
135 * Non-Trusted Firmware Key Certificate
136 */
137
138/* NonTrustedFirmwareContentCertPK */
Juan Castillobe801202015-12-03 10:19:21 +0000139#define NON_TRUSTED_FW_CONTENT_CERT_PK_OID "1.3.6.1.4.1.4128.2100.1101"
Juan Castillo740bc522015-12-02 09:48:34 +0000140
141
142/*
143 * Non-Trusted Firmware Content Certificate
144 */
Dan Handley9df48042015-03-19 18:58:55 +0000145
Juan Castillo740bc522015-12-02 09:48:34 +0000146/* NonTrustedWorldBootloaderHash - BL33 */
Juan Castillobe801202015-12-03 10:19:21 +0000147#define NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID "1.3.6.1.4.1.4128.2100.1201"
Soby Mathew2bb78d32018-03-29 14:29:55 +0100148/* NonTrustedFirmwareConfigHash - NT_FW_CONFIG */
149#define NON_TRUSTED_FW_CONFIG_HASH_OID "1.3.6.1.4.1.4128.2100.1202"
Dan Handley9df48042015-03-19 18:58:55 +0000150
Manish Pandeyc70b4b42020-06-10 15:50:36 +0100151/*
152 * Secure Partitions Content Certificate
153 */
154#define SP_PKG1_HASH_OID "1.3.6.1.4.1.4128.2100.1301"
155#define SP_PKG2_HASH_OID "1.3.6.1.4.1.4128.2100.1302"
156#define SP_PKG3_HASH_OID "1.3.6.1.4.1.4128.2100.1303"
157#define SP_PKG4_HASH_OID "1.3.6.1.4.1.4128.2100.1304"
158#define SP_PKG5_HASH_OID "1.3.6.1.4.1.4128.2100.1305"
159#define SP_PKG6_HASH_OID "1.3.6.1.4.1.4128.2100.1306"
160#define SP_PKG7_HASH_OID "1.3.6.1.4.1.4128.2100.1307"
161#define SP_PKG8_HASH_OID "1.3.6.1.4.1.4128.2100.1308"
162
Pankaj Guptadd906e62020-12-09 14:02:38 +0530163#ifdef PLAT_DEF_OID
164#include <platform_oid.h>
165#endif
Antonio Nino Diaz5eb88372018-11-08 10:20:19 +0000166#endif /* TBBR_OID_H */