xref: /optee_os/ta/trusted_keys/include/trusted_keys.h (revision f86ab8e7e0de869dfa25ca05a37ee070d7e5b86b)
1*f86ab8e7SSumit Garg /* SPDX-License-Identifier: BSD-2-Clause */
2*f86ab8e7SSumit Garg /*
3*f86ab8e7SSumit Garg  * Copyright (C) 2019-2020, Linaro Limited
4*f86ab8e7SSumit Garg  */
5*f86ab8e7SSumit Garg 
6*f86ab8e7SSumit Garg #ifndef TRUSTED_KEYS_H
7*f86ab8e7SSumit Garg #define TRUSTED_KEYS_H
8*f86ab8e7SSumit Garg 
9*f86ab8e7SSumit Garg #define TRUSTED_KEYS_UUID { 0xf04a0fe7, 0x1f5d, 0x4b9b, \
10*f86ab8e7SSumit Garg 		{ 0xab, 0xf7, 0x61, 0x9b, 0x85, 0xb4, 0xce, 0x8c } }
11*f86ab8e7SSumit Garg 
12*f86ab8e7SSumit Garg /*
13*f86ab8e7SSumit Garg  * Get random data for symmetric key
14*f86ab8e7SSumit Garg  *
15*f86ab8e7SSumit Garg  * [out]     memref[0]        Random data
16*f86ab8e7SSumit Garg  */
17*f86ab8e7SSumit Garg #define TA_CMD_GET_RANDOM	0x0
18*f86ab8e7SSumit Garg 
19*f86ab8e7SSumit Garg /*
20*f86ab8e7SSumit Garg  * Seal trusted key using hardware unique key
21*f86ab8e7SSumit Garg  *
22*f86ab8e7SSumit Garg  * [in]      memref[0]        Plain key
23*f86ab8e7SSumit Garg  * [out]     memref[1]        Sealed key datablob
24*f86ab8e7SSumit Garg  */
25*f86ab8e7SSumit Garg #define TA_CMD_SEAL		0x1
26*f86ab8e7SSumit Garg 
27*f86ab8e7SSumit Garg /*
28*f86ab8e7SSumit Garg  * Unseal trusted key using hardware unique key
29*f86ab8e7SSumit Garg  *
30*f86ab8e7SSumit Garg  * [in]      memref[0]        Sealed key datablob
31*f86ab8e7SSumit Garg  * [out]     memref[1]        Plain key
32*f86ab8e7SSumit Garg  */
33*f86ab8e7SSumit Garg #define TA_CMD_UNSEAL		0x2
34*f86ab8e7SSumit Garg 
35*f86ab8e7SSumit Garg #endif /* TRUSTED_KEYS_H */
36