@@ -32,6 +32,10 @@ static psa_key_id_t kmu_key_ids[3] = {
32
32
MAKE_PSA_KMU_KEY_ID (230 )
33
33
};
34
34
35
+ #if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION )
36
+ static psa_key_id_t * validated_with = NULL ;
37
+ #endif
38
+
35
39
BUILD_ASSERT (CONFIG_BOOT_SIGNATURE_KMU_SLOTS <= ARRAY_SIZE (kmu_key_ids ),
36
40
"Invalid number of KMU slots, up to 3 are supported on nRF54L15" );
37
41
#endif
@@ -114,6 +118,9 @@ int ED25519_verify(const uint8_t *message, size_t message_len,
114
118
EDDSA_SIGNAGURE_LENGTH );
115
119
if (status == PSA_SUCCESS ) {
116
120
ret = 1 ;
121
+ #if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION )
122
+ validated_with = kmu_key_ids + i ;
123
+ #endif
117
124
break ;
118
125
}
119
126
@@ -122,4 +129,39 @@ int ED25519_verify(const uint8_t *message, size_t message_len,
122
129
123
130
return ret ;
124
131
}
132
+ #if defined(CONFIG_BOOT_KMU_KEYS_REVOCATION )
133
+ int exec_revoke (void )
134
+ {
135
+ int ret = 0 ;
136
+
137
+ if (!validated_with ) {
138
+ ret = 1 ;
139
+ goto out ;
140
+ }
141
+ psa_status_t status = psa_crypto_init ();
142
+
143
+ if (status != PSA_SUCCESS ) {
144
+ BOOT_LOG_ERR ("PSA crypto init failed with error %d" , status );
145
+ ret = 1 ;
146
+ goto out ;
147
+ }
148
+ for (int i = 0 ; i < CONFIG_BOOT_SIGNATURE_KMU_SLOTS ; i ++ ) {
149
+ if ((kmu_key_ids + i ) == validated_with ){
150
+ break ;
151
+ }
152
+ BOOT_LOG_DBG ("Invalidating key ID %d" , i );
153
+
154
+ status = psa_destroy_key (kmu_key_ids [i ]);
155
+ if (status == PSA_SUCCESS ) {
156
+ BOOT_LOG_DBG ("Success on key ID %d" , i );
157
+ } else {
158
+ BOOT_LOG_ERR ("Key invalidation failed with: %d" , status );
159
+ ret = 1 ;
160
+ goto out ;
161
+ }
162
+ }
163
+ out :
164
+ return ret ;
165
+ }
166
+ #endif /* CONFIG_BOOT_KMU_KEYS_REVOCATION */
125
167
#endif
0 commit comments