xref: /rk3399_ARM-atf/include/drivers/measured_boot/metadata.h (revision a77a7444e5f02888d156a58f78bf8185a02d04a1)
1*a77a7444STamas Ban /*
2*a77a7444STamas Ban  * Copyright (c) 2024, Arm Limited. All rights reserved.
3*a77a7444STamas Ban  *
4*a77a7444STamas Ban  * SPDX-License-Identifier: BSD-3-Clause
5*a77a7444STamas Ban  */
6*a77a7444STamas Ban 
7*a77a7444STamas Ban #ifndef METADATA_H
8*a77a7444STamas Ban #define METADATA_H
9*a77a7444STamas Ban 
10*a77a7444STamas Ban /*
11*a77a7444STamas Ban  * Images, measured during the boot process, have some associated metadata.
12*a77a7444STamas Ban  * One of these types of metadata is the image identifier strings. These macros
13*a77a7444STamas Ban  * define these strings. They are used across the different measured boot
14*a77a7444STamas Ban  * backends.
15*a77a7444STamas Ban  * Note that these strings follow the standardization recommendations
16*a77a7444STamas Ban  * defined in the Arm Server Base Security Guide (a.k.a. SBSG, Arm DEN 0086),
17*a77a7444STamas Ban  * where applicable. They should not be changed in the code.
18*a77a7444STamas Ban  * Where the SBSG does not make recommendations, we are free to choose any
19*a77a7444STamas Ban  * naming convention.
20*a77a7444STamas Ban  * The key thing is to choose meaningful strings so that when the measured boot
21*a77a7444STamas Ban  * metadata is used in attestation, the different components can be identified.
22*a77a7444STamas Ban  */
23*a77a7444STamas Ban #define MBOOT_BL2_IMAGE_STRING		"BL_2"
24*a77a7444STamas Ban #define MBOOT_BL31_IMAGE_STRING		"SECURE_RT_EL3"
25*a77a7444STamas Ban #if defined(SPD_opteed)
26*a77a7444STamas Ban #define MBOOT_BL32_IMAGE_STRING		"SECURE_RT_EL1_OPTEE"
27*a77a7444STamas Ban #elif defined(SPD_tspd)
28*a77a7444STamas Ban #define MBOOT_BL32_IMAGE_STRING		"SECURE_RT_EL1_TSPD"
29*a77a7444STamas Ban #elif defined(SPD_tlkd)
30*a77a7444STamas Ban #define MBOOT_BL32_IMAGE_STRING		"SECURE_RT_EL1_TLKD"
31*a77a7444STamas Ban #elif defined(SPD_trusty)
32*a77a7444STamas Ban #define MBOOT_BL32_IMAGE_STRING		"SECURE_RT_EL1_TRUSTY"
33*a77a7444STamas Ban #else
34*a77a7444STamas Ban #define MBOOT_BL32_IMAGE_STRING		"SECURE_RT_EL1_UNKNOWN"
35*a77a7444STamas Ban #endif /* SPD_opteed */
36*a77a7444STamas Ban #define MBOOT_BL32_EXTRA1_IMAGE_STRING	"SECURE_RT_EL1_OPTEE_EXTRA1"
37*a77a7444STamas Ban #define MBOOT_BL32_EXTRA2_IMAGE_STRING	"SECURE_RT_EL1_OPTEE_EXTRA2"
38*a77a7444STamas Ban #define MBOOT_BL33_IMAGE_STRING		"BL_33"
39*a77a7444STamas Ban #define MBOOT_FW_CONFIG_STRING		"FW_CONFIG"
40*a77a7444STamas Ban #define MBOOT_HW_CONFIG_STRING		"HW_CONFIG"
41*a77a7444STamas Ban #define MBOOT_NT_FW_CONFIG_STRING	"NT_FW_CONFIG"
42*a77a7444STamas Ban #define MBOOT_SCP_BL2_IMAGE_STRING	"SYS_CTRL_2"
43*a77a7444STamas Ban #define MBOOT_SOC_FW_CONFIG_STRING	"SOC_FW_CONFIG"
44*a77a7444STamas Ban #define MBOOT_STM32_STRING		"STM32"
45*a77a7444STamas Ban #define MBOOT_TB_FW_CONFIG_STRING	"TB_FW_CONFIG"
46*a77a7444STamas Ban #define MBOOT_TOS_FW_CONFIG_STRING	"TOS_FW_CONFIG"
47*a77a7444STamas Ban #define MBOOT_RMM_IMAGE_STRING		"RMM"
48*a77a7444STamas Ban #define MBOOT_SP1_STRING		"SP1"
49*a77a7444STamas Ban #define MBOOT_SP2_STRING		"SP2"
50*a77a7444STamas Ban #define MBOOT_SP3_STRING		"SP3"
51*a77a7444STamas Ban #define MBOOT_SP4_STRING		"SP4"
52*a77a7444STamas Ban #define MBOOT_SP5_STRING		"SP5"
53*a77a7444STamas Ban #define MBOOT_SP6_STRING		"SP6"
54*a77a7444STamas Ban #define MBOOT_SP7_STRING		"SP7"
55*a77a7444STamas Ban #define MBOOT_SP8_STRING		"SP8"
56*a77a7444STamas Ban 
57*a77a7444STamas Ban #endif /* METADATA_H */
58