-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nrf_security: Add key revocation for SICR keys #19710
base: main
Are you sure you want to change the base?
Conversation
CI InformationTo view the history of this post, clich the 'edited' button above Inputs:Sources:sdk-nrf: PR head: dcd079a863c4adce3246d3ec5f822c634f0bc412 more detailssdk-nrf:
Github labels
List of changed files detected by CI (3)
Outputs:ToolchainVersion: 11349092be Test Spec & Results: ✅ Success; ❌ Failure; 🟠 Queued; 🟡 Progress; ◻️ Skipped;
|
4fdb848
to
caca435
Compare
|
||
nrf_mramc_config_set(mramc, &mramc_config_write_enabled); | ||
|
||
memcpy(key.sicr.attr_addr, &sicr_attr, sizeof(sicr_attr)); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ahem key
is a pointer but you use it as if it were not?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a good catch, thanks! I will update.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated and opened a PR in secdom to run it's CI: 1051
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I see CI failures, I think you need to make CI green first before I review?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think that you need to wait no, the CI failures seem to build some nrfx clock build failures. These should not be relevant to this PR at all.
caca435
to
4ed1318
Compare
This refactors how SICR keys are writen into MRAM. This refactors the code but it should not change any funcionality. The purpose of this is to make the MRAM writing part reusable so it can be used by the revocation functionality later. Signed-off-by: Georgios Vasilakis <[email protected]>
4ed1318
to
8008df6
Compare
8008df6
to
14c4ee8
Compare
Adds support of key revocation using the psa_destroy_key API. The value 0xfa50 is used in the key type in order to mark an revoked key. The return code PSA_ERROR_NOT_PERMITTED is returned for revoked keys for all the functions in the PSA crypto driver wrapper. This error code seems OK since it mentions platform specific policies for not permitted an operation. Ref: NCSDK-30076 Signed-off-by: Georgios Vasilakis <[email protected]>
14c4ee8
to
dcd079a
Compare
Adds key revocation for the platform keys stored in SICR for nRF54H20.