diff options
author | Raef Coles <raef.coles@arm.com> | 2021-12-07 15:59:14 +0000 |
---|---|---|
committer | David Hu <david.hu@arm.com> | 2022-04-01 04:28:30 +0200 |
commit | 15a37f8c9e216fadc0712090f7b56b2ad66d99c8 (patch) | |
tree | 1b85afe0d5e39625f9f1548a9c36181873e39360 /bl2/src/provisioning.c | |
parent | 4cdb208f2476e0a858a27bbe2984c4405a7311f0 (diff) | |
download | trusted-firmware-m-15a37f8c9e216fadc0712090f7b56b2ad66d99c8.tar.gz |
BL1: Add BL1
As a (split) first-stage bootloader designed to be implemented in a
combination of ROM and OTP.
Change-Id: I3e4a31ff04d81198a8964b7bd78799cfd177e0a1
Signed-off-by: Raef Coles <raef.coles@arm.com>
Diffstat (limited to 'bl2/src/provisioning.c')
-rw-r--r-- | bl2/src/provisioning.c | 34 |
1 files changed, 0 insertions, 34 deletions
diff --git a/bl2/src/provisioning.c b/bl2/src/provisioning.c index c78f1f28a0..03ed15c72e 100644 --- a/bl2/src/provisioning.c +++ b/bl2/src/provisioning.c @@ -23,10 +23,6 @@ __PACKED_STRUCT bl2_assembly_and_test_provisioning_data_t { uint8_t bl2_rotpk_1[32]; uint8_t bl2_rotpk_2[32]; -#ifdef BL1 - uint8_t bl1_rotpk_0[32]; -#endif /* BL1 */ - #ifdef PLATFORM_PSA_ADAC_SECURE_DEBUG uint8_t secure_debug_pk[32]; #endif /* PLATFORM_PSA_ADAC_SECURE_DEBUG */ @@ -82,27 +78,6 @@ static const struct bl2_assembly_and_test_provisioning_data_t bl2_assembly_and_t #else #error "No public key available for given signing algorithm." #endif /* MCUBOOT_SIGN_RSA_LEN */ -#ifdef BL1 -#if (MCUBOOT_SIGN_RSA_LEN == 2048) - /* bl2 rotpk 0 */ - { - 0xfc, 0x57, 0x01, 0xdc, 0x61, 0x35, 0xe1, 0x32, - 0x38, 0x47, 0xbd, 0xc4, 0x0f, 0x04, 0xd2, 0xe5, - 0xbe, 0xe5, 0x83, 0x3b, 0x23, 0xc2, 0x9f, 0x93, - 0x59, 0x3d, 0x00, 0x01, 0x8c, 0xfa, 0x99, 0x94, - }, -#elif (MCUBOOT_SIGN_RSA_LEN == 3072) - /* bl1 rotpk 0 */ - { - 0xbf, 0xe6, 0xd8, 0x6f, 0x88, 0x26, 0xf4, 0xff, - 0x97, 0xfb, 0x96, 0xc4, 0xe6, 0xfb, 0xc4, 0x99, - 0x3e, 0x46, 0x19, 0xfc, 0x56, 0x5d, 0xa2, 0x6a, - 0xdf, 0x34, 0xc3, 0x29, 0x48, 0x9a, 0xdc, 0x38, - }, -#else -#error "No public key available for given signing algorithm." -#endif /* MCUBOOT_SIGN_RSA_LEN */ -#endif /* BL1 */ #ifdef PLATFORM_PSA_ADAC_SECURE_DEBUG { @@ -172,15 +147,6 @@ enum tfm_plat_err_t provision_assembly_and_test(void) return err; } -#ifdef BL1 - err = tfm_plat_otp_write(PLAT_OTP_ID_BL1_ROTPK_0, - sizeof(bl2_assembly_and_test_prov_data.bl1_rotpk_0), - bl2_assembly_and_test_prov_data.bl1_rotpk_0); - if (err != TFM_PLAT_ERR_SUCCESS && err != TFM_PLAT_ERR_UNSUPPORTED) { - return err; - } -#endif /* BL1 */ - #ifdef PLATFORM_PSA_ADAC_SECURE_DEBUG err = tfm_plat_otp_write(PLAT_OTP_ID_SECURE_DEBUG_PK, sizeof(bl2_assembly_and_test_prov_data.secure_debug_pk), |