This feature is currently not supported on the ConnectCore 8X.

Although securing the device involves programming the hash of four public keys into the eFuses, only one key (number 0 by default) is used in the secure boot process. If the key gets compromised, it can be revoked and a different key used.

To use a different key for the signature of firmware images, set your conf/local.conf project configuration file as follows: 

TRUSTFENCE_KEY_INDEX = "N"

N (range 0 - 3) is the key number to use.

To revoke a key,  use the trustfence revoke command. That will burn the appropriate bit in the SRK Revoke fuse word. For example, to revoke the key with index 0:

trustfence revoke 0

The last key (index 3) cannot be revoked.

Revoking a key is an irreversible process.

On closed devices, the SRK Revoke fuse word is write-protected, and thus keys cannot be revoked by default. In order to be able to revoke keys in closed devices, you must define the following Yocto macro:

TRUSTFENCE_UNLOCK_KEY_REVOCATION = "1"

The macro configures U-Boot not to protect the SRK Revoke fuse word, making key revocation possible.

You can check the revocation status of the keys by using the trustfence status command.