diff options
author | Juan Castillo <juan.castillo@arm.com> | 2015-04-10 12:43:27 +0100 |
---|---|---|
committer | Juan Castillo <juan.castillo@arm.com> | 2015-06-25 08:53:27 +0100 |
commit | f04585f399865fb12a53b0c332807387adb7cb2f (patch) | |
tree | 3018cbfed2bdf7c21135fe014804921bd87b2152 | |
parent | 962f7c512ae63129471506f94003902a3245d54a (diff) |
TBB: delete deprecated plat_match_rotpk()
The authentication framework deprecates plat_match_rotpk()
in favour of plat_get_rotpk_info(). This patch removes
plat_match_rotpk() from the platform port.
Change-Id: I2250463923d3ef15496f9c39678b01ee4b33883b
-rw-r--r-- | docs/porting-guide.md | 11 | ||||
-rw-r--r-- | include/plat/common/platform.h | 1 | ||||
-rw-r--r-- | plat/arm/board/common/board_arm_trusted_boot.c | 11 |
3 files changed, 0 insertions, 23 deletions
diff --git a/docs/porting-guide.md b/docs/porting-guide.md index d0096054..2f013535 100644 --- a/docs/porting-guide.md +++ b/docs/porting-guide.md @@ -472,17 +472,6 @@ The ARM FVP port uses this function to initialize the mailbox memory used for providing the warm-boot entry-point addresses. -### Function: plat_match_rotpk() - - Argument : const unsigned char *, unsigned int - Return : int - -This function is mandatory when Trusted Board Boot is enabled. It receives a -pointer to a buffer containing a signing key and its size as parameters and -returns 0 (success) if that key matches the ROT (Root Of Trust) key stored in -the platform. Any other return value means a mismatch. - - ### Function: plat_get_rotpk_info() Argument : void *, void **, unsigned int *, unsigned int * diff --git a/include/plat/common/platform.h b/include/plat/common/platform.h index d8fa8916..469d46b6 100644 --- a/include/plat/common/platform.h +++ b/include/plat/common/platform.h @@ -198,7 +198,6 @@ void bl32_plat_enable_mmu(uint32_t flags); /******************************************************************************* * Trusted Board Boot functions ******************************************************************************/ -int plat_match_rotpk(const unsigned char *, unsigned int); int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len, unsigned int *flags); diff --git a/plat/arm/board/common/board_arm_trusted_boot.c b/plat/arm/board/common/board_arm_trusted_boot.c index 50379be4..103aafbf 100644 --- a/plat/arm/board/common/board_arm_trusted_boot.c +++ b/plat/arm/board/common/board_arm_trusted_boot.c @@ -63,17 +63,6 @@ static const unsigned char arm_devel_rotpk_hash[] = \ #endif /* - * Check the validity of the key - * - * 0 = success, Otherwise = error - */ -int plat_match_rotpk(const unsigned char *key_buf, unsigned int key_len) -{ - /* TODO: check against the ROT key stored in the platform */ - return 0; -} - -/* * Return the ROTPK hash in the following ASN.1 structure in DER format: * * AlgorithmIdentifier ::= SEQUENCE { |