You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Replace the outdated information pertaining to SUIT SDFW with new info
applicable to the latest release of IronSide SE.
Signed-off-by: Grzegorz Swiderski <[email protected]>
(cherry picked from commit 4dc5927)
Copy file name to clipboardExpand all lines: doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_ironside.rst
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -381,6 +381,8 @@ It is divided into a 16-bit major version and a 16-bit minor version.
381
381
382
382
This versioning scheme allows IronSide to support multiple UICR formats, enabling updates to the format without breaking compatibility with existing configurations.
383
383
384
+
.. _ug_nrf54h20_ironside_se_uicr_lock:
385
+
384
386
UICR.LOCK
385
387
=========
386
388
@@ -1261,6 +1263,8 @@ See the following table for a summary of the available boot commands:
1261
1263
1262
1264
The following chapters describe each command in detail.
Copy file name to clipboardExpand all lines: doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_keys.rst
+46-47Lines changed: 46 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,82 +7,77 @@ Provisioning keys on the nRF54H20 SoC
7
7
:local:
8
8
:depth: 2
9
9
10
-
This guide describes how to generate and provision cryptographic public keys on an nRF54H20 SoC in the Root of Trust (RoT) lifecycle state.
11
-
It is intended for developers defining manifest signing keys for the application core, radio core, and OEM root.
12
-
A successful provisioning makes the keys available to Secure Domain Firmware through PSA Crypto key identifiers.
10
+
This guide describes how to provision pre-generated cryptographic keys on an nRF54H20 SoC.
11
+
It is intended for developers who wish to create a predefined set of keys for their application, made available through PSA Crypto key identifiers.
13
12
14
13
Prerequisites
15
14
=============
16
15
17
-
To follow this guide, your nRF54H20 device must meet the following requirement:
16
+
To follow this guide, your nRF54H20 device must meet the following requirements:
18
17
19
18
* On the nRF54H20 DK, you must :ref:`provision <ug_nrf54h20_gs_bringup_soc_bin>` the DK as described in the :ref:`ug_nrf54h20_gs` page.
20
19
* On a custom nRF54H20-based device, you must :ref:`configure, generate, and program the BICR <ug_nrf54h20_custom_pcb_bicr>` as described in the :ref:`ug_nrf54h20_custom_pcb` page.
21
-
* You must configure :ref:`ug_nrf54h20_ironside_uicr_securestorage` in your |ISE| UICR configuration.
22
20
23
21
Overview
24
22
========
25
23
26
-
The keys provisioning workflow for the nRF54H20 SoC consists of two main steps:
24
+
The keys provisioning workflow for the nRF54H20 SoC consists of three main steps:
27
25
28
-
1. Generating the required metadata using a script provided with the |NCS|.
26
+
1. Choosing key identifiers based on the desired properties for each key.
27
+
#. Generating the required metadata using a script provided with the |NCS|.
29
28
#. Provisioning the keys to the nRF54H20 SoC.
30
29
31
-
.. note::
32
-
The nRF54H20 SoC must be in RoT lifecycle state for key provisioning to work.
33
-
For more details on lifecycle states, see :ref:`ug_nrf54h20_architecture_lifecycle`.
30
+
.. rst-class:: numbered-step
34
31
35
-
.. _ug_nrf54h20_keys_generating:
32
+
Choosing a key ID
33
+
=================
34
+
35
+
Key provisioning is supported by the |ISE| firmware through the :ref:`ug_crypto_architecture_implementation_standards_ironside` of the PSA Crypto API.
36
+
|ISE| defines two categories of keys that can be provisioned: standard *user keys* and non-standard *revocable keys*.
37
+
These categories are tied to distinct key ID ranges.
36
38
37
-
Generating the keys
38
-
===================
39
+
User keys
40
+
---------
39
41
40
-
A script is used to generate the necessary cryptographic keys, BLOBs, and metadata required for provisioning.
41
-
The script follows the PSA Crypto standard to generate the required 28-byte key.
42
-
It is located in the :file:`nrf/scripts/generate_psa_key_attributes.py` file.
42
+
These are the standard persistent keys conforming to the :ref:`supported version of the PSA Crypto API <ug_psa_certified_api_overview_crypto_ncs>`:
* Maximum ID: ``0x3FFFFFFF`` (``PSA_KEY_ID_USER_MAX``)
45
46
46
-
1. Generate private keys using Ed25519::
47
+
In order to successfully provision user keys, you must first configure cryptographic partitions in your :ref:`ug_nrf54h20_ironside_uicr_securestorage` configuration.
The :ref:`generate_psa_key_attributes_script` is used to generate a JSON file containing the necessary cryptographic keys, BLOBs, and metadata required for provisioning.
Here is an example command to generate metadata for provisioning the public key part of an Ed25519 key, from a pre-existing PEM file, as a revocable key:
0 commit comments