1 /* 2 * Copyright (c) 2022-2023, Arm Limited. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #ifndef CCA_OID_H 8 #define CCA_OID_H 9 10 /* Reuse the Object IDs defined by TBBR for certificate extensions. */ 11 #include "tbbr_oid.h" 12 13 /* 14 * Assign arbitrary Object ID values that do not conflict with any of the 15 * TBBR reserved OIDs. 16 */ 17 /* Platform root-of-trust public key */ 18 #define PROT_PK_OID "1.3.6.1.4.1.4128.2100.1102" 19 /* Secure World root-of-trust public key */ 20 #define SWD_ROT_PK_OID "1.3.6.1.4.1.4128.2100.1103" 21 /* Core Secure World public key */ 22 #define CORE_SWD_PK_OID "1.3.6.1.4.1.4128.2100.1104" 23 /* Platform public key */ 24 #define PLAT_PK_OID "1.3.6.1.4.1.4128.2100.1105" 25 /* Realm Monitor Manager (RMM) Hash */ 26 #define RMM_HASH_OID "1.3.6.1.4.1.4128.2100.1106" 27 28 /* CCAFirmwareNVCounter - Non-volatile counter extension */ 29 #define CCA_FW_NVCOUNTER_OID "1.3.6.1.4.1.4128.2100.3" 30 31 /* 32 * First undef previous definitions from tbbr_oid.h. 33 * CCA ROTPK authenticates BL31 and its configuration image in 34 * CCA CoT. 35 **/ 36 #undef BL31_IMAGE_KEY_OID 37 #undef SOC_FW_CONFIG_KEY_OID 38 #undef HW_CONFIG_KEY_OID 39 #define BL31_IMAGE_KEY_OID ZERO_OID 40 #define SOC_FW_CONFIG_KEY_OID ZERO_OID 41 #define HW_CONFIG_KEY_OID ZERO_OID 42 #define RMM_IMAGE_KEY_OID ZERO_OID 43 44 #endif /* CCA_OID_H */ 45