@@ -32,6 +32,11 @@ static psa_key_id_t kmu_key_ids[3] = {
32
32
MAKE_PSA_KMU_KEY_ID (230 )
33
33
};
34
34
35
+ #if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION )
36
+ #include <bootutil/key_revocation.h>
37
+ static psa_key_id_t * validated_with = NULL ;
38
+ #endif
39
+
35
40
BUILD_ASSERT (CONFIG_BOOT_SIGNATURE_KMU_SLOTS <= ARRAY_SIZE (kmu_key_ids ),
36
41
"Invalid number of KMU slots, up to 3 are supported on nRF54L15" );
37
42
#endif
@@ -114,6 +119,9 @@ int ED25519_verify(const uint8_t *message, size_t message_len,
114
119
EDDSA_SIGNAGURE_LENGTH );
115
120
if (status == PSA_SUCCESS ) {
116
121
ret = 1 ;
122
+ #if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION )
123
+ validated_with = kmu_key_ids + i ;
124
+ #endif
117
125
break ;
118
126
}
119
127
@@ -122,4 +130,37 @@ int ED25519_verify(const uint8_t *message, size_t message_len,
122
130
123
131
return ret ;
124
132
}
133
+ #if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION )
134
+ int exec_revoke (void )
135
+ {
136
+ int ret = BOOT_KEY_REVOKE_OK ;
137
+ psa_status_t status = psa_crypto_init ();
138
+
139
+ if (!validated_with ) {
140
+ ret = BOOT_KEY_REVOKE_INVALID ;
141
+ goto out ;
142
+ }
143
+
144
+ if (status != PSA_SUCCESS ) {
145
+ BOOT_LOG_ERR ("PSA crypto init failed with error %d" , status );
146
+ ret = BOOT_KEY_REVOKE_FAILED ;
147
+ goto out ;
148
+ }
149
+ for (int i = 0 ; i < CONFIG_BOOT_SIGNATURE_KMU_SLOTS ; i ++ ) {
150
+ if ((kmu_key_ids + i ) == validated_with ) {
151
+ break ;
152
+ }
153
+ BOOT_LOG_DBG ("Invalidating key ID %d" , i );
154
+
155
+ status = psa_destroy_key (kmu_key_ids [i ]);
156
+ if (status == PSA_SUCCESS ) {
157
+ BOOT_LOG_DBG ("Success on key ID %d" , i );
158
+ } else {
159
+ BOOT_LOG_ERR ("Key invalidation failed with: %d" , status );
160
+ }
161
+ }
162
+ out :
163
+ return ret ;
164
+ }
165
+ #endif /* CONFIG_BOOT_KMU_KEYS_REVOCATION */
125
166
#endif
0 commit comments