aboutsummaryrefslogtreecommitdiff
path: root/bl2/src/provisioning.c
diff options
context:
space:
mode:
authorRaef Coles <raef.coles@arm.com>2021-12-07 15:59:14 +0000
committerDavid Hu <david.hu@arm.com>2022-04-01 04:28:30 +0200
commit15a37f8c9e216fadc0712090f7b56b2ad66d99c8 (patch)
tree1b85afe0d5e39625f9f1548a9c36181873e39360 /bl2/src/provisioning.c
parent4cdb208f2476e0a858a27bbe2984c4405a7311f0 (diff)
downloadtrusted-firmware-m-15a37f8c9e216fadc0712090f7b56b2ad66d99c8.tar.gz
BL1: Add BL1
As a (split) first-stage bootloader designed to be implemented in a combination of ROM and OTP. Change-Id: I3e4a31ff04d81198a8964b7bd78799cfd177e0a1 Signed-off-by: Raef Coles <raef.coles@arm.com>
Diffstat (limited to 'bl2/src/provisioning.c')
-rw-r--r--bl2/src/provisioning.c34
1 files changed, 0 insertions, 34 deletions
diff --git a/bl2/src/provisioning.c b/bl2/src/provisioning.c
index c78f1f28a0..03ed15c72e 100644
--- a/bl2/src/provisioning.c
+++ b/bl2/src/provisioning.c
@@ -23,10 +23,6 @@ __PACKED_STRUCT bl2_assembly_and_test_provisioning_data_t {
uint8_t bl2_rotpk_1[32];
uint8_t bl2_rotpk_2[32];
-#ifdef BL1
- uint8_t bl1_rotpk_0[32];
-#endif /* BL1 */
-
#ifdef PLATFORM_PSA_ADAC_SECURE_DEBUG
uint8_t secure_debug_pk[32];
#endif /* PLATFORM_PSA_ADAC_SECURE_DEBUG */
@@ -82,27 +78,6 @@ static const struct bl2_assembly_and_test_provisioning_data_t bl2_assembly_and_t
#else
#error "No public key available for given signing algorithm."
#endif /* MCUBOOT_SIGN_RSA_LEN */
-#ifdef BL1
-#if (MCUBOOT_SIGN_RSA_LEN == 2048)
- /* bl2 rotpk 0 */
- {
- 0xfc, 0x57, 0x01, 0xdc, 0x61, 0x35, 0xe1, 0x32,
- 0x38, 0x47, 0xbd, 0xc4, 0x0f, 0x04, 0xd2, 0xe5,
- 0xbe, 0xe5, 0x83, 0x3b, 0x23, 0xc2, 0x9f, 0x93,
- 0x59, 0x3d, 0x00, 0x01, 0x8c, 0xfa, 0x99, 0x94,
- },
-#elif (MCUBOOT_SIGN_RSA_LEN == 3072)
- /* bl1 rotpk 0 */
- {
- 0xbf, 0xe6, 0xd8, 0x6f, 0x88, 0x26, 0xf4, 0xff,
- 0x97, 0xfb, 0x96, 0xc4, 0xe6, 0xfb, 0xc4, 0x99,
- 0x3e, 0x46, 0x19, 0xfc, 0x56, 0x5d, 0xa2, 0x6a,
- 0xdf, 0x34, 0xc3, 0x29, 0x48, 0x9a, 0xdc, 0x38,
- },
-#else
-#error "No public key available for given signing algorithm."
-#endif /* MCUBOOT_SIGN_RSA_LEN */
-#endif /* BL1 */
#ifdef PLATFORM_PSA_ADAC_SECURE_DEBUG
{
@@ -172,15 +147,6 @@ enum tfm_plat_err_t provision_assembly_and_test(void)
return err;
}
-#ifdef BL1
- err = tfm_plat_otp_write(PLAT_OTP_ID_BL1_ROTPK_0,
- sizeof(bl2_assembly_and_test_prov_data.bl1_rotpk_0),
- bl2_assembly_and_test_prov_data.bl1_rotpk_0);
- if (err != TFM_PLAT_ERR_SUCCESS && err != TFM_PLAT_ERR_UNSUPPORTED) {
- return err;
- }
-#endif /* BL1 */
-
#ifdef PLATFORM_PSA_ADAC_SECURE_DEBUG
err = tfm_plat_otp_write(PLAT_OTP_ID_SECURE_DEBUG_PK,
sizeof(bl2_assembly_and_test_prov_data.secure_debug_pk),