1*f86ab8e7SSumit Garg /* SPDX-License-Identifier: BSD-2-Clause */ 2*f86ab8e7SSumit Garg /* 3*f86ab8e7SSumit Garg * Copyright (C) 2019-2020, Linaro Limited 4*f86ab8e7SSumit Garg */ 5*f86ab8e7SSumit Garg 6*f86ab8e7SSumit Garg #ifndef TRUSTED_KEYS_H 7*f86ab8e7SSumit Garg #define TRUSTED_KEYS_H 8*f86ab8e7SSumit Garg 9*f86ab8e7SSumit Garg #define TRUSTED_KEYS_UUID { 0xf04a0fe7, 0x1f5d, 0x4b9b, \ 10*f86ab8e7SSumit Garg { 0xab, 0xf7, 0x61, 0x9b, 0x85, 0xb4, 0xce, 0x8c } } 11*f86ab8e7SSumit Garg 12*f86ab8e7SSumit Garg /* 13*f86ab8e7SSumit Garg * Get random data for symmetric key 14*f86ab8e7SSumit Garg * 15*f86ab8e7SSumit Garg * [out] memref[0] Random data 16*f86ab8e7SSumit Garg */ 17*f86ab8e7SSumit Garg #define TA_CMD_GET_RANDOM 0x0 18*f86ab8e7SSumit Garg 19*f86ab8e7SSumit Garg /* 20*f86ab8e7SSumit Garg * Seal trusted key using hardware unique key 21*f86ab8e7SSumit Garg * 22*f86ab8e7SSumit Garg * [in] memref[0] Plain key 23*f86ab8e7SSumit Garg * [out] memref[1] Sealed key datablob 24*f86ab8e7SSumit Garg */ 25*f86ab8e7SSumit Garg #define TA_CMD_SEAL 0x1 26*f86ab8e7SSumit Garg 27*f86ab8e7SSumit Garg /* 28*f86ab8e7SSumit Garg * Unseal trusted key using hardware unique key 29*f86ab8e7SSumit Garg * 30*f86ab8e7SSumit Garg * [in] memref[0] Sealed key datablob 31*f86ab8e7SSumit Garg * [out] memref[1] Plain key 32*f86ab8e7SSumit Garg */ 33*f86ab8e7SSumit Garg #define TA_CMD_UNSEAL 0x2 34*f86ab8e7SSumit Garg 35*f86ab8e7SSumit Garg #endif /* TRUSTED_KEYS_H */ 36