diff options
author | Jamie Fox <jamie.fox@arm.com> | 2019-09-26 16:58:03 +0100 |
---|---|---|
committer | Jamie Fox <jamie.fox@arm.com> | 2019-11-05 14:49:13 +0000 |
commit | a80d033c6ce7ee995dfdeed4ce8582564f2adaa4 (patch) | |
tree | 79436da131622ae5502c6ea629797a65680aabd8 /platform | |
parent | 6c0a58dec1facc4d97566cb0bd683258d83149c6 (diff) | |
download | trusted-firmware-m-a80d033c6ce7ee995dfdeed4ce8582564f2adaa4.tar.gz |
Platform: Remove function to get HUK
Removes the tfm_plat_get_crypto_huk() function as it is no longer
required and may not be possible to implement on some platforms.
Change-Id: If1c1039ce287c373daf6519959cbe87ff47db5b3
Signed-off-by: Jamie Fox <jamie.fox@arm.com>
Diffstat (limited to 'platform')
-rw-r--r-- | platform/ext/target/mps2/an519/dummy_crypto_keys.c | 11 | ||||
-rw-r--r-- | platform/ext/target/mps2/an521/dummy_crypto_keys.c | 11 | ||||
-rw-r--r-- | platform/ext/target/mps2/an539/dummy_crypto_keys.c | 11 | ||||
-rw-r--r-- | platform/ext/target/mps3/an524/dummy_crypto_keys.c | 11 | ||||
-rw-r--r-- | platform/ext/target/musca_a/dummy_crypto_keys.c | 11 | ||||
-rw-r--r-- | platform/ext/target/musca_b1/dummy_crypto_keys.c | 11 | ||||
-rw-r--r-- | platform/include/tfm_plat_crypto_keys.h | 10 |
7 files changed, 0 insertions, 76 deletions
diff --git a/platform/ext/target/mps2/an519/dummy_crypto_keys.c b/platform/ext/target/mps2/an519/dummy_crypto_keys.c index a7936ab711..9dd4d2834a 100644 --- a/platform/ext/target/mps2/an519/dummy_crypto_keys.c +++ b/platform/ext/target/mps2/an519/dummy_crypto_keys.c @@ -58,17 +58,6 @@ static inline void copy_key(uint8_t *p_dst, const uint8_t *p_src, size_t size) } } -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size) -{ - if(size > TFM_KEY_LEN_BYTES) { - return TFM_PLAT_ERR_SYSTEM_ERR; - } - - copy_key(key, sample_tfm_key, size); - - return TFM_PLAT_ERR_SUCCESS; -} - enum tfm_plat_err_t tfm_plat_get_huk_derived_key(const uint8_t *label, size_t label_size, const uint8_t *context, diff --git a/platform/ext/target/mps2/an521/dummy_crypto_keys.c b/platform/ext/target/mps2/an521/dummy_crypto_keys.c index 39d1bdd54b..423a69bec4 100644 --- a/platform/ext/target/mps2/an521/dummy_crypto_keys.c +++ b/platform/ext/target/mps2/an521/dummy_crypto_keys.c @@ -58,17 +58,6 @@ static inline void copy_key(uint8_t *p_dst, const uint8_t *p_src, size_t size) } } -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size) -{ - if(size > TFM_KEY_LEN_BYTES) { - return TFM_PLAT_ERR_SYSTEM_ERR; - } - - copy_key(key, sample_tfm_key, size); - - return TFM_PLAT_ERR_SUCCESS; -} - enum tfm_plat_err_t tfm_plat_get_huk_derived_key(const uint8_t *label, size_t label_size, const uint8_t *context, diff --git a/platform/ext/target/mps2/an539/dummy_crypto_keys.c b/platform/ext/target/mps2/an539/dummy_crypto_keys.c index e354ddca81..fde597de79 100644 --- a/platform/ext/target/mps2/an539/dummy_crypto_keys.c +++ b/platform/ext/target/mps2/an539/dummy_crypto_keys.c @@ -55,17 +55,6 @@ static inline void copy_key(uint8_t *p_dst, const uint8_t *p_src, size_t size) } } -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size) -{ - if(size > TFM_KEY_LEN_BYTES) { - return TFM_PLAT_ERR_SYSTEM_ERR; - } - - copy_key(key, sample_tfm_key, size); - - return TFM_PLAT_ERR_SUCCESS; -} - enum tfm_plat_err_t tfm_plat_get_huk_derived_key(const uint8_t *label, size_t label_size, const uint8_t *context, diff --git a/platform/ext/target/mps3/an524/dummy_crypto_keys.c b/platform/ext/target/mps3/an524/dummy_crypto_keys.c index 633c97af61..4281b385ed 100644 --- a/platform/ext/target/mps3/an524/dummy_crypto_keys.c +++ b/platform/ext/target/mps3/an524/dummy_crypto_keys.c @@ -55,17 +55,6 @@ static inline void copy_key(uint8_t *p_dst, const uint8_t *p_src, size_t size) } } -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size) -{ - if(size > TFM_KEY_LEN_BYTES) { - return TFM_PLAT_ERR_SYSTEM_ERR; - } - - copy_key(key, sample_tfm_key, size); - - return TFM_PLAT_ERR_SUCCESS; -} - enum tfm_plat_err_t tfm_plat_get_huk_derived_key(const uint8_t *label, size_t label_size, const uint8_t *context, diff --git a/platform/ext/target/musca_a/dummy_crypto_keys.c b/platform/ext/target/musca_a/dummy_crypto_keys.c index 34c47c631f..fd4e485ed9 100644 --- a/platform/ext/target/musca_a/dummy_crypto_keys.c +++ b/platform/ext/target/musca_a/dummy_crypto_keys.c @@ -58,17 +58,6 @@ static inline void copy_key(uint8_t *p_dst, const uint8_t *p_src, size_t size) } } -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size) -{ - if(size > TFM_KEY_LEN_BYTES) { - return TFM_PLAT_ERR_SYSTEM_ERR; - } - - copy_key(key, sample_tfm_key, size); - - return TFM_PLAT_ERR_SUCCESS; -} - enum tfm_plat_err_t tfm_plat_get_huk_derived_key(const uint8_t *label, size_t label_size, const uint8_t *context, diff --git a/platform/ext/target/musca_b1/dummy_crypto_keys.c b/platform/ext/target/musca_b1/dummy_crypto_keys.c index 633c97af61..4281b385ed 100644 --- a/platform/ext/target/musca_b1/dummy_crypto_keys.c +++ b/platform/ext/target/musca_b1/dummy_crypto_keys.c @@ -55,17 +55,6 @@ static inline void copy_key(uint8_t *p_dst, const uint8_t *p_src, size_t size) } } -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size) -{ - if(size > TFM_KEY_LEN_BYTES) { - return TFM_PLAT_ERR_SYSTEM_ERR; - } - - copy_key(key, sample_tfm_key, size); - - return TFM_PLAT_ERR_SUCCESS; -} - enum tfm_plat_err_t tfm_plat_get_huk_derived_key(const uint8_t *label, size_t label_size, const uint8_t *context, diff --git a/platform/include/tfm_plat_crypto_keys.h b/platform/include/tfm_plat_crypto_keys.h index a281b7f4d2..d9a21b33d8 100644 --- a/platform/include/tfm_plat_crypto_keys.h +++ b/platform/include/tfm_plat_crypto_keys.h @@ -79,16 +79,6 @@ struct tfm_plat_rotpk_t { }; /** - * \brief Gets hardware unique key for encryption - * - * \param[out] key Buf to store the key in - * \param[in] size Size of the buffer - * - * \return Returns error code specified in \ref tfm_plat_err_t - */ -enum tfm_plat_err_t tfm_plat_get_crypto_huk(uint8_t *key, uint32_t size); - -/** * \brief Gets key material derived from the hardware unique key. * * \param[in] label Label for KDF |