14f5beb56STamas Ban /* 24f5beb56STamas Ban * Copyright (c) 2024, Arm Limited. All rights reserved. 34f5beb56STamas Ban * 44f5beb56STamas Ban * SPDX-License-Identifier: BSD-3-Clause 54f5beb56STamas Ban */ 64f5beb56STamas Ban 74f5beb56STamas Ban #ifndef TC_DPE_H 84f5beb56STamas Ban #define TC_DPE_H 94f5beb56STamas Ban 104f5beb56STamas Ban /* 114f5beb56STamas Ban * The certificate structure on the TC platform: 124f5beb56STamas Ban * - The arrows indicate the parent/child relationships (who loads who). 134f5beb56STamas Ban * - The boxes indicate the certificates. 144f5beb56STamas Ban * 154f5beb56STamas Ban * AP FW Cert. 164f5beb56STamas Ban * +--------------------------------+ 174f5beb56STamas Ban * | | 184f5beb56STamas Ban * Plat Cert. | +->SPx | Hyper Cert. 194f5beb56STamas Ban * +--------------------------+ | +->SP1 | +--------------------+ 204f5beb56STamas Ban * RoT Cert. | | | +->TOS_FW_CONF | | | 214f5beb56STamas Ban * +------------+ | +->SCP_BL1 +-----+-----+-->FW_CONF +->AP_BL32 | | +->PVMFW | 224f5beb56STamas Ban * | | | | | | | | | | | | 234f5beb56STamas Ban * | RSE_BL1_2--+-----+-->RSE_BL2------->AP_BL1--+-----+------------->AP_BL2------------+-----+-->AP_BL33 | 244f5beb56STamas Ban * | | | | | | | | | | | | 254f5beb56STamas Ban * +------------+ | +->RSE_S +-----+-----+-->TB_FW_CONF +->AP_BL31 | | +->HYPERVISOR | 264f5beb56STamas Ban * | +->RSE_NS | | +->SCP_BL2 | | | 274f5beb56STamas Ban * | | | +->HW_CONF | | | 284f5beb56STamas Ban * +--------------------------+ | +---------------+-----+-->NT_FW_CONF | 294f5beb56STamas Ban * | | | | 304f5beb56STamas Ban * +--------------------------------+ +--------------------+ 314f5beb56STamas Ban */ 324f5beb56STamas Ban 334f5beb56STamas Ban #define DPE_AP_FW_CERT_ID 0x300 /* Includes: FW_CONF - SP1 */ 344f5beb56STamas Ban #define DPE_HYPERVISOR_CERT_ID 0x400 /* Includes: AP_BL33 - PVMFW */ 354f5beb56STamas Ban 364f5beb56STamas Ban /* Common definition */ 374f5beb56STamas Ban #define DPE_CERT_ID_SAME_AS_PARENT 0xFFFFFFFF 384f5beb56STamas Ban 39*3201faf3STamas Ban /* 40*3201faf3STamas Ban * Target Locality: 41*3201faf3STamas Ban * The goal is to specify that a certain component is expected to run and 42*3201faf3STamas Ban * thereby send DPE commands from a given security domain. RSE is capable of 43*3201faf3STamas Ban * of distinguishing the client's locality based on the MHU channel used for 44*3201faf3STamas Ban * communication. 45*3201faf3STamas Ban * Defines here must match with RSE side: 46*3201faf3STamas Ban */ 47*3201faf3STamas Ban #define LOCALITY_NONE -1 48*3201faf3STamas Ban /* #define LOCALITY_RSE_S 0 */ /* Not applicable on AP side */ 49*3201faf3STamas Ban /* #define LOCALITY_RSE_NS 1 */ /* Not applicable on AP side */ 50*3201faf3STamas Ban #define LOCALITY_AP_S 2 51*3201faf3STamas Ban #define LOCALITY_AP_NS 3 52*3201faf3STamas Ban 534f5beb56STamas Ban #endif /* TC_DPE_H */ 54