1 /*
2  * Copyright (c) 2022-2023, Arm Limited. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #ifndef CCA_OID_H
8 #define CCA_OID_H
9 
10 /* Reuse the Object IDs defined by TBBR for certificate extensions. */
11 #include "tbbr_oid.h"
12 
13 /*
14  * Assign arbitrary Object ID values that do not conflict with any of the
15  * TBBR reserved OIDs.
16  */
17 /* Platform root-of-trust public key */
18 #define PROT_PK_OID				"1.3.6.1.4.1.4128.2100.1102"
19 /* Secure World root-of-trust public key */
20 #define SWD_ROT_PK_OID				"1.3.6.1.4.1.4128.2100.1103"
21 /* Core Secure World public key */
22 #define CORE_SWD_PK_OID				"1.3.6.1.4.1.4128.2100.1104"
23 /* Platform public key */
24 #define PLAT_PK_OID				"1.3.6.1.4.1.4128.2100.1105"
25 /* Realm Monitor Manager (RMM) Hash */
26 #define RMM_HASH_OID				"1.3.6.1.4.1.4128.2100.1106"
27 
28 /* CCAFirmwareNVCounter - Non-volatile counter extension */
29 #define CCA_FW_NVCOUNTER_OID			"1.3.6.1.4.1.4128.2100.3"
30 
31 /*
32  * First undef previous definitions from tbbr_oid.h.
33  * CCA ROTPK authenticates BL31 and its configuration image in
34  * CCA CoT.
35  **/
36 #undef BL31_IMAGE_KEY_OID
37 #undef SOC_FW_CONFIG_KEY_OID
38 #undef HW_CONFIG_KEY_OID
39 #define BL31_IMAGE_KEY_OID			ZERO_OID
40 #define SOC_FW_CONFIG_KEY_OID			ZERO_OID
41 #define HW_CONFIG_KEY_OID			ZERO_OID
42 #define RMM_IMAGE_KEY_OID			ZERO_OID
43 
44 #endif /* CCA_OID_H */
45