Skip to content

Commit d75e56a

Browse files
committed
doc: add kmu provisioning info
adds info about provisioning keys before running with bootloader Signed-off-by: Anna Wojdylo <anna.wojdylo@nordicsemi.no>
1 parent c55ed9b commit d75e56a

File tree

3 files changed

+13
-0
lines changed

3 files changed

+13
-0
lines changed

doc/nrf/app_dev/device_guides/nrf54l/fota_update.rst

+1
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,7 @@ Provisioning of keys for Hardware KMU
193193
*************************************
194194

195195
In case of FOTA implementations using the MCUboot bootloader, which includes hardware cryptography and KMU, you must complete key provisioning before booting any application.
196+
Otherwise, the bootloader :ref:`may not boot the firmware setup and might take unwanted actions<ug_nrf54l_developing_basics_kmu_provisioning_keys>`.
196197
Refer to :ref:`ug_nrf54l_developing_provision_kmu` for detailed description.
197198

198199
.. _ug_nrf54l_developing_ble_fota_mcuboot_direct_xip_mode:

doc/nrf/app_dev/device_guides/nrf54l/kmu_basics.rst

+10
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,22 @@ Locked keys
3535
Once provisioned, locked keys are permanently available for use and cannot be deleted without erasing the device.
3636
For these keys, the revocation policy (RPOLICY) must be marked as ``locked``.
3737

38+
.. _ug_nrf54l_developing_basics_kmu_provisioning_keys:
39+
3840
Provisioning keys for the bootloader
3941
************************************
4042

4143
The bootloader can use multiple key generations for image verification (up to three for nRF54L SoCs).
4244
To safeguard against unauthorized provisioning by attackers, you must :ref:`provision all key generations onto the device<ug_nrf54l_developing_provision_kmu>`.
4345

46+
Make sure to provision the setup’s relevant key sets before any run with bootloaders, including the first boot.
47+
Failure to do so can lead to unwanted actions by the bootloader on your firmware setup.
48+
You may experience the following issues:
49+
50+
* The nRF Secure Immutable Bootloader (NSIB) will mark the image as permanently invalid without a key available for verification.
51+
* In direct-xip mode, MCUboot will delete the image if no appropriate key is provisioned.
52+
* The firmware will simply not boot, indicating a lack of proper key provisioning.
53+
4454
By default, MCUboot uses a single key.
4555
You can configure the number of key generations that MCUboot uses for application verification with the ``CONFIG_BOOT_SIGNATURE_KMU_SLOTS`` MCUboot's Kconfig option.
4656

doc/nrf/app_dev/device_guides/nrf54l/kmu_provision.rst

+2
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ Once completed, install the required additional commands for nRF Util:
2222
2323
nrfutil install device
2424
25+
Additionally, before provisioning, make sure you familiarized yourself with the :ref:`ug_nrf54l_developing_basics_kmu_provisioning_keys` section.
26+
2527
.. _ug_nrf54l_developing_provision_kmu_generate:
2628

2729
Key generation

0 commit comments

Comments
 (0)