arm-trusted-firmware/include/common
laurenw-arm 56b741d3e4 feat(cca): introduce new "cca" chain of trust
This chain of trust is targeted at Arm CCA solutions and defines 3
independent signing domains:

1) CCA signing domain. The Arm CCA Security Model (Arm DEN-0096.A.a) [1]
refers to the CCA signing domain as the provider of CCA components
running on the CCA platform. The CCA signing domain might be independent
from other signing domains providing other firmware blobs.

The CCA platform is a collective term used to identify all hardware and
firmware components involved in delivering the CCA security guarantee.
Hence, all hardware and firmware components on a CCA enabled system that
a Realm is required to trust.

In the context of TF-A, this corresponds to BL1, BL2, BL31, RMM and
associated configuration files.

The CCA signing domain is rooted in the Silicon ROTPK, just as in the
TBBR CoT.

2) Non-CCA Secure World signing domain. This includes SPMC (and
associated configuration file) as the expected BL32 image as well as
SiP-owned secure partitions. It is rooted in a new SiP-owned key called
Secure World ROTPK, or SWD_ROTPK for short.

3) Platform owner signing domain. This includes BL33 (and associated
configuration file) and the platform owner's secure partitions. It is
rooted in the Platform ROTPK, or PROTPK.

[1] https://developer.arm.com/documentation/DEN0096/A_a

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I6ffef3f53d710e6a2072fb4374401249122a2805
2022-06-14 09:47:37 -05:00
..
tbbr feat(cca): introduce new "cca" chain of trust 2022-06-14 09:47:37 -05:00
asm_macros_common.S Add support for Branch Target Identification 2019-05-24 14:44:45 +01:00
bl_common.h feat(spmc/lsp): add logical partition framework 2022-05-04 12:07:33 +01:00
bl_common.ld.h feat(spmc/lsp): add logical partition framework 2022-05-04 12:07:33 +01:00
debug.h feat(common/debug): add new macro ERROR_NL() to print just a newline 2021-07-21 00:01:06 +02:00
desc_image_load.h Add helper to parse BL31 parameters (both versions) 2019-07-23 20:25:34 -07:00
ep_info.h feat(rme): add Realm security state definition 2021-10-01 16:54:44 -05:00
fdt_fixup.h feat(fdt): add the ability to supply idle state information 2022-04-26 17:52:25 +02:00
fdt_wrappers.h feat(fdt-wrappers): add function to find or add a sudnode 2022-04-28 14:55:14 +01:00
feat_detect.h refactor(el3-runtime): add arch-features detection mechanism 2022-04-04 10:24:51 +01:00
image_decompress.h Standardise header guards across codebase 2018-11-08 10:20:19 +00:00
interrupt_props.h Replace __ASSEMBLY__ with compiler-builtin __ASSEMBLER__ 2019-08-01 13:14:12 -07:00
nv_cntr_ids.h dtsi: Update the nv-counter node in the device tree 2020-08-28 09:50:25 +00:00
param_header.h Replace __ASSEMBLY__ with compiler-builtin __ASSEMBLER__ 2019-08-01 13:14:12 -07:00
romlib.h Standardise header guards across codebase 2018-11-08 10:20:19 +00:00
runtime_svc.h Switch AARCH32/AARCH64 to __aarch64__ 2019-08-01 13:45:03 -07:00
tf_crc32.h refactor(hw_crc32): renamed hw_crc32 to tf_crc32 2021-08-02 17:15:41 +01:00
uuid.h feat(spmc): add FFA_PARTITION_INFO_GET handler 2022-05-13 15:51:23 +01:00