@@ -194,6 +194,7 @@ endchoice # BOOT_IMG_HASH_ALG
194194
195195config BOOT_SIGNATURE_TYPE_PURE_ALLOW
196196 bool
197+ depends on NRF_SECURITY
197198 help
198199 Hidden option set by configurations that allow Pure variant,
199200 for example ed25519. The pure variant means that image
@@ -293,6 +294,7 @@ config BOOT_ED25519_MBEDTLS
293294
294295config BOOT_ED25519_PSA
295296 bool "Use PSA crypto"
297+ depends on NRF_SECURITY
296298 select BOOT_USE_PSA_CRYPTO
297299 select BOOT_ED25519_PSA_DEPENDENCIES
298300 select BOOT_X25519_PSA_DEPENDENCIES if BOOT_ENCRYPT_IMAGE
@@ -304,15 +306,17 @@ endchoice
304306
305307config BOOT_SIGNATURE_USING_KMU
306308 bool "Use KMU stored keys for signature verification"
307- help
308- The MCUboot will use keys provisioned to board for signature verification
309- instead of compiling in a key data.
309+ depends on NRF_SECURITY
310+ depends on CRACEN_LIB_KMU
310311 select PSA_WANT_ALG_GCM
311312 select PSA_WANT_KEY_TYPE_AES
312313 select PSA_WANT_AES_KEY_SIZE_256
313314 select PSA_WANT_ALG_SP800_108_COUNTER_CMAC
314315 select PSA_WANT_ALG_CMAC
315316 select PSA_WANT_ALG_ECB_NO_PADDING
317+ help
318+ MCUboot will use keys provisioned to the device key management unit for signature
319+ verification instead of compiling in key data from a file.
316320
317321if !BOOT_SIGNATURE_USING_KMU
318322
@@ -351,10 +355,18 @@ config MCUBOOT_CLEANUP_ARM_CORE
351355 start-up code which can cause a module fault and potentially make the
352356 module irrecoverable.
353357
358+ # Disable MBEDTLS from being selected if NRF_SECURITY is enabled, and use default NRF_SECURITY
359+ # configuration file for MBEDTLS
360+ config MBEDTLS
361+ depends on !NRF_SECURITY
362+
363+ config NRF_SECURITY
364+ select MBEDTLS_PROMPTLESS
365+
354366if MBEDTLS
355367
356368config MBEDTLS_CFG_FILE
357- default "mcuboot-mbedtls-cfg.h"
369+ default "mcuboot-mbedtls-cfg.h" if !NRF_SECURITY
358370
359371endif
360372
0 commit comments