Skip to content

Commit 6fb292c

Browse files
committed
[nrf noup] bootutil: key revocation
Disable previous generation key when update comes with new valid key and application is confirmed. Signed-off-by: Mateusz Michalek <[email protected]>
1 parent 148712e commit 6fb292c

File tree

6 files changed

+157
-0
lines changed

6 files changed

+157
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
/*
2+
* SPDX-License-Identifier: Apache-2.0
3+
*
4+
* Copyright (c) 2025 Nordic Semiconductor ASA
5+
*
6+
* Original license:
7+
*
8+
* Licensed to the Apache Software Foundation (ASF) under one
9+
* or more contributor license agreements. See the NOTICE file
10+
* distributed with this work for additional information
11+
* regarding copyright ownership. The ASF licenses this file
12+
* to you under the Apache License, Version 2.0 (the
13+
* "License"); you may not use this file except in compliance
14+
* with the License. You may obtain a copy of the License at
15+
*
16+
* http://www.apache.org/licenses/LICENSE-2.0
17+
*
18+
* Unless required by applicable law or agreed to in writing,
19+
* software distributed under the License is distributed on an
20+
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
21+
* KIND, either express or implied. See the License for the
22+
* specific language governing permissions and limitations
23+
* under the License.
24+
*/
25+
26+
#ifndef H_KEY_REVOCATION_
27+
#define H_KEY_REVOCATION_
28+
29+
#include <inttypes.h>
30+
31+
#ifdef __cplusplus
32+
extern "C" {
33+
#endif
34+
35+
#define BOOT_KEY_REVOKE_OK 0
36+
#define BOOT_KEY_REVOKE_NOT_READY 1
37+
#define BOOT_KEY_REVOKE_INVALID 2
38+
#define BOOT_KEY_REVOKE_FAILED 2
39+
40+
41+
void allow_revoke(void);
42+
43+
int revoke(void);
44+
45+
#ifdef __cplusplus
46+
}
47+
#endif
48+
49+
#endif

boot/bootutil/src/ed25519_psa.c

+41
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,11 @@ static psa_key_id_t kmu_key_ids[3] = {
3232
MAKE_PSA_KMU_KEY_ID(230)
3333
};
3434

35+
#if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION)
36+
#include <bootutil/key_revocation.h>
37+
static psa_key_id_t *validated_with = NULL;
38+
#endif
39+
3540
BUILD_ASSERT(CONFIG_BOOT_SIGNATURE_KMU_SLOTS <= ARRAY_SIZE(kmu_key_ids),
3641
"Invalid number of KMU slots, up to 3 are supported on nRF54L15");
3742
#endif
@@ -114,6 +119,9 @@ int ED25519_verify(const uint8_t *message, size_t message_len,
114119
EDDSA_SIGNAGURE_LENGTH);
115120
if (status == PSA_SUCCESS) {
116121
ret = 1;
122+
#if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION)
123+
validated_with = kmu_key_ids + i;
124+
#endif
117125
break;
118126
}
119127

@@ -122,4 +130,37 @@ int ED25519_verify(const uint8_t *message, size_t message_len,
122130

123131
return ret;
124132
}
133+
#if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION)
134+
int exec_revoke(void)
135+
{
136+
int ret = BOOT_KEY_REVOKE_OK;
137+
psa_status_t status = psa_crypto_init();
138+
139+
if (!validated_with) {
140+
ret = BOOT_KEY_REVOKE_INVALID;
141+
goto out;
142+
}
143+
144+
if (status != PSA_SUCCESS) {
145+
BOOT_LOG_ERR("PSA crypto init failed with error %d", status);
146+
ret = BOOT_KEY_REVOKE_FAILED;
147+
goto out;
148+
}
149+
for (int i = 0; i < CONFIG_BOOT_SIGNATURE_KMU_SLOTS; i++) {
150+
if ((kmu_key_ids + i) == validated_with) {
151+
break;
152+
}
153+
BOOT_LOG_DBG("Invalidating key ID %d", i);
154+
155+
status = psa_destroy_key(kmu_key_ids[i]);
156+
if (status == PSA_SUCCESS) {
157+
BOOT_LOG_DBG("Success on key ID %d", i);
158+
} else {
159+
BOOT_LOG_ERR("Key invalidation failed with: %d", status);
160+
}
161+
}
162+
out:
163+
return ret;
164+
}
165+
#endif /* CONFIG_BOOT_KMU_KEYS_REVOCATION */
125166
#endif

boot/bootutil/src/key_revocation.c

+34
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
/*
2+
* Copyright (c) 2025, Nordic Semiconductor ASA
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License");
5+
* you may not use this file except in compliance with the License.
6+
* You may obtain a copy of the License at
7+
*
8+
* http://www.apache.org/licenses/LICENSE-2.0
9+
*
10+
* Unless required by applicable law or agreed to in writing, software
11+
* distributed under the License is distributed on an "AS IS" BASIS,
12+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
* See the License for the specific language governing permissions and
14+
* limitations under the License.
15+
*/
16+
17+
#include <bootutil/key_revocation.h>
18+
19+
extern int exec_revoke(void);
20+
21+
static uint8_t ready_to_revoke;
22+
23+
void allow_revoke(void)
24+
{
25+
ready_to_revoke = 1;
26+
}
27+
28+
int revoke(void)
29+
{
30+
if (ready_to_revoke) {
31+
return exec_revoke();
32+
}
33+
return BOOT_KEY_REVOKE_NOT_READY;
34+
}

boot/bootutil/src/loader.c

+15
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,10 @@ int pcd_version_cmp_net(const struct flash_area *fap, struct image_header *hdr);
7676

7777
#include "mcuboot_config/mcuboot_config.h"
7878

79+
#if defined(CONFIG_BOOT_KEYS_REVOCATION)
80+
#include "bootutil/key_revocation.h"
81+
#endif
82+
7983
BOOT_LOG_MODULE_DECLARE(mcuboot);
8084

8185
static struct boot_loader_state boot_data;
@@ -2733,6 +2737,11 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
27332737
}
27342738
}
27352739

2740+
#if defined(CONFIG_BOOT_KEYS_REVOCATION)
2741+
if (BOOT_SWAP_TYPE(state) == BOOT_SWAP_TYPE_NONE) {
2742+
allow_revoke();
2743+
}
2744+
#endif
27362745
/* Iterate over all the images. At this point all required update operations
27372746
* have finished. By the end of the loop each image in the primary slot will
27382747
* have been re-validated.
@@ -2838,6 +2847,12 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
28382847
fill_rsp(state, rsp);
28392848

28402849
fih_rc = FIH_SUCCESS;
2850+
#if defined(CONFIG_BOOT_KEYS_REVOCATION)
2851+
rc = revoke();
2852+
if (rc != BOOT_KEY_REVOKE_OK) {
2853+
FIH_SET(fih_rc, FIH_FAILURE);
2854+
}
2855+
#endif /* CONFIG_BOOT_KEYS_REVOCATION */
28412856
out:
28422857
/*
28432858
* Since the boot_status struct stores plaintext encryption keys, reset

boot/zephyr/CMakeLists.txt

+6
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,12 @@ if(DEFINED CONFIG_BOOT_SHARE_BACKEND_RETENTION)
9191
)
9292
endif()
9393

94+
if(DEFINED CONFIG_BOOT_KEYS_REVOCATION)
95+
zephyr_library_sources(
96+
${BOOT_DIR}/bootutil/src/key_revocation.c
97+
)
98+
endif()
99+
94100
# Generic bootutil sources and includes.
95101
zephyr_library_include_directories(${BOOT_DIR}/bootutil/include)
96102
zephyr_library_sources(

boot/zephyr/Kconfig

+12
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,18 @@ config BOOT_SIGNATURE_KMU_SLOTS
329329

330330
endif
331331

332+
config BOOT_KEYS_REVOCATION
333+
bool "Auto revoke previous gen key"
334+
help
335+
Automatically revoke previous generation key upon new valid key usage.
336+
337+
config BOOT_KMU_KEYS_REVOCATION
338+
bool
339+
depends on BOOT_KEYS_REVOCATION
340+
default y if BOOT_SIGNATURE_USING_KMU
341+
help
342+
Enabling KMU key revocation backend.
343+
332344
if !BOOT_SIGNATURE_USING_KMU
333345

334346
config BOOT_SIGNATURE_KEY_FILE

0 commit comments

Comments
 (0)