arm-trusted-firmware/include/tools_share/cca_oid.h
Manish V Badarkhe 0cffcdd617 feat(auth): add explicit entries for key OIDs
Key-OIDs that authenticate BL31, BL31(SOC)-FW config, and HW config
images have been explicitly entered.
Implementations of signer-ID consume these entries.

Change-Id: I24c9085ed5f266af06d40fb73302e35d857a9d5b
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
2023-07-28 09:01:15 +01:00

44 lines
1.3 KiB
C

/*
* Copyright (c) 2022-2023, Arm Limited. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
#ifndef CCA_OID_H
#define CCA_OID_H
/* Reuse the Object IDs defined by TBBR for certificate extensions. */
#include "tbbr_oid.h"
/*
* Assign arbitrary Object ID values that do not conflict with any of the
* TBBR reserved OIDs.
*/
/* Platform root-of-trust public key */
#define PROT_PK_OID "1.3.6.1.4.1.4128.2100.1102"
/* Secure World root-of-trust public key */
#define SWD_ROT_PK_OID "1.3.6.1.4.1.4128.2100.1103"
/* Core Secure World public key */
#define CORE_SWD_PK_OID "1.3.6.1.4.1.4128.2100.1104"
/* Platform public key */
#define PLAT_PK_OID "1.3.6.1.4.1.4128.2100.1105"
/* Realm Monitor Manager (RMM) Hash */
#define RMM_HASH_OID "1.3.6.1.4.1.4128.2100.1106"
/* CCAFirmwareNVCounter - Non-volatile counter extension */
#define CCA_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.3"
/*
* First undef previous definitions from tbbr_oid.h.
* CCA ROTPK authenticates BL31 and its configuration image in
* CCA CoT.
**/
#undef BL31_IMAGE_KEY_OID
#undef SOC_FW_CONFIG_KEY_OID
#undef HW_CONFIG_KEY_OID
#define BL31_IMAGE_KEY_OID ZERO_OID
#define SOC_FW_CONFIG_KEY_OID ZERO_OID
#define HW_CONFIG_KEY_OID ZERO_OID
#define RMM_IMAGE_KEY_OID ZERO_OID
#endif /* CCA_OID_H */