Skip to content

Commit 793825f

Browse files
committed
nrf/doc/mcuboot_main_confi: key storage record
Added paragraph on Public key storage solutions. Signed-off-by: Andrzej Puzdrowski <[email protected]>
1 parent a3703bb commit 793825f

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

doc/nrf/app_dev/bootloaders_dfu/mcuboot_nsib/bootloader_main_config.rst

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,18 @@ Notably, the Ed25519 signature can also be directly calculated on the image itse
119119
- :kconfig:option:`SB_CONFIG_BOOT_SIGNATURE_TYPE_NONE`
120120
- Not applicable
121121

122+
Public key storage
123+
******************
124+
125+
MCUboot supports two methods for storing the public key used for image verification:
126+
127+
* Embedded in the image - The public key is compiled in the MCUboot instance.
128+
For this method, no additional configuration is required.
129+
* Stored in the KMU - The public key is stored in the Key Management Unit (KMU) of the nRF54L devices.
130+
You can enable it using the :kconfig:option:`SB_CONFIG_MCUBOOT_SIGNATURE_USING_KMU` sysbuild Kconfig option.
131+
This implementation supports up to three keys and includes a key revocation scheme.
132+
You can manage these features through the ``CONFIG_BOOT_SIGNATURE_KMU_SLOTS`` and ``CONFIG_BOOT_SIGNATURE_KMU_SLOTS`` MCUboot Kconfig options.
133+
122134
MCUboot image hash algorithms
123135
*****************************
124136

0 commit comments

Comments
 (0)