File tree Expand file tree Collapse file tree 3 files changed +1
-32
lines changed
doc/nrf/app_dev/bootloaders_dfu/mcuboot_nsib Expand file tree Collapse file tree 3 files changed +1
-32
lines changed Original file line number Diff line number Diff line change @@ -28,13 +28,6 @@ function(b0_gen_keys)
28
28
--in ${SIGNATURE_PRIVATE_KEY_FILE}
29
29
--out ${SIGNATURE_PUBLIC_KEY_FILE}
30
30
)
31
- elseif (SB_CONFIG_SECURE_BOOT_SIGNING_OPENSSL)
32
- set (PUB_GEN_CMD
33
- openssl ec
34
- -pubout
35
- -in ${SIGNATURE_PRIVATE_KEY_FILE}
36
- -out ${SIGNATURE_PUBLIC_KEY_FILE}
37
- )
38
31
elseif (SB_CONFIG_SECURE_BOOT_SIGNING_CUSTOM)
39
32
string (CONFIGURE "${SB_CONFIG_SECURE_BOOT_SIGNING_PUBLIC_KEY} " SIGNATURE_PUBLIC_KEY_FILE)
40
33
set (SIGNATURE_PUBLIC_KEY_FILE ${SIGNATURE_PUBLIC_KEY_FILE} PARENT_SCOPE)
@@ -185,25 +178,6 @@ function(b0_sign_image slot cpunet_target)
185
178
--in ${hash_file} ${sign_cmd_signature_type}
186
179
> ${signature_file}
187
180
)
188
- elseif (SB_CONFIG_SECURE_BOOT_SIGNING_OPENSSL)
189
- if (SB_CONFIG_SECURE_BOOT_SIGNATURE_TYPE_ED25519)
190
- set (sign_cmd
191
- openssl pkeyutl -sign -inkey ${SIGNATURE_PRIVATE_KEY_FILE} -rawin -in ${hash_file} > ${signature_file} &&
192
- openssl pkeyutl -verify -pubin -inkey ${SIGNATURE_PRIVATE_KEY_FILE} -rawin -in ${hash_file} -sigfile ${signature_file}
193
- )
194
- else ()
195
- set (sign_cmd
196
- openssl dgst
197
- -${sign_cmd_hash_type}
198
- -sign ${SIGNATURE_PRIVATE_KEY_FILE} ${hash_file} |
199
- ${PYTHON_EXECUTABLE}
200
- ${ZEPHYR_NRF_MODULE_DIR} /scripts/bootloader/asn1parse.py
201
- --alg ecdsa
202
- --contents signature
203
- > ${signature_file}
204
- )
205
- endif ()
206
-
207
181
elseif (SB_CONFIG_SECURE_BOOT_SIGNING_CUSTOM)
208
182
set (custom_sign_cmd "${SB_CONFIG_SECURE_BOOT_SIGNING_COMMAND} " )
209
183
string (CONFIGURE "${custom_sign_cmd} " custom_sign_cmd)
Original file line number Diff line number Diff line change @@ -146,12 +146,10 @@ See :ref:`ug_fw_update_keys` for information on how to generate custom keys for
146
146
147
147
For SoCs using KMU for NSIB (nRF54L Series devices), the private key must be provisioned in the KMU before NSIB can be run.
148
148
149
- Additionally, the |NSIB | supports the following methods for signing images with private keys:
149
+ Additionally, the |NSIB | supports a custom method for signing images with private keys:
150
150
151
- * Uses the :kconfig:option: `SB_CONFIG_SECURE_BOOT_SIGNING_OPENSSL ` Kconfig option.
152
151
* :ref: `Using a custom command <ug_bootloader_adding_sysbuild_immutable_b0_custom_signing >` - Uses the :kconfig:option: `SB_CONFIG_SECURE_BOOT_SIGNING_CUSTOM ` Kconfig option.
153
152
154
- The OpenSSL method is handled internally by the build system, whereas using custom commands requires more configuration steps.
155
153
156
154
Checking the public key
157
155
^^^^^^^^^^^^^^^^^^^^^^^
Original file line number Diff line number Diff line change @@ -279,9 +279,6 @@ choice SECURE_BOOT_SIGNING
279
279
config SECURE_BOOT_SIGNING_PYTHON
280
280
bool "Sign with Python ecdsa library"
281
281
282
- config SECURE_BOOT_SIGNING_OPENSSL
283
- bool "Sign with openssl command line tool"
284
-
285
282
config SECURE_BOOT_SIGNING_CUSTOM
286
283
bool "Sign with custom command"
287
284
You can’t perform that action at this time.
0 commit comments