You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Edited mentions of nRF54L15 DK with TF-M support to account for
TF-M support on emulated nRF54L10 and missing support for TF-M
on emulated nRF54L05. NCSDK-30596.
Signed-off-by: Grzegorz Ferenc <[email protected]>
Copy file name to clipboardExpand all lines: doc/nrf/app_dev/device_guides/nrf54l/cryptography.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -335,7 +335,7 @@ Depending on the usage scheme:
335
335
336
336
* Key slots with the usage scheme Encrypted (``CRACEN_KMU_KEY_USAGE_SCHEME_ENCRYPTED``) also have to be decrypted to a temporary push location in RAM before they are used by CRACEN, which is handled by the CRACEN driver.
337
337
338
-
When the application is built with TF-M, this temporary push location is protected inside the secure processing environment to avoid exposing the key material to the non-secure application.
338
+
When the application is built with TF-M (for nRF54L Series devices that :ref:`support TF-M <ug_tfm_supported_services>`), this temporary push location is protected inside the secure processing environment to avoid exposing the key material to the non-secure application.
339
339
If TF-M is not used, the keys are pushed to a reserved RAM area at location 0x20000000-0x20000064 (``kmu_push_area``).
340
340
341
341
You might encounter the following KMU-specific error codes when using the KMU keys:
Copy file name to clipboardExpand all lines: doc/nrf/protocols/matter/end_product/security.rst
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,18 +33,17 @@ For an overview of the cryptography layer configuration supported for each |NCS|
33
33
Secure processing environment
34
34
*****************************
35
35
36
-
Depending on the board target, Matter samples can use the :ref:`secure processing environment <ug_tfm_security_by_separation>` with Trusted Firmware-M (TF-M).
36
+
When building for the nRF54L15 DK using the ``nrf54l15dk/nrf54l15/cpuapp/ns`` :ref:`board target <app_boards_names>`, Matter samples can use the :ref:`secure processing environment <ug_tfm_security_by_separation>` with Trusted Firmware-M (TF-M).
37
+
In such cases, all cryptographic operations within the Matter stack are performed by using the `Platform Security Architecture (PSA)`_ API and executed in the secure TF-M environment using the :ref:`TF-M Crypto Service implementation <ug_crypto_architecture_implementation_standards_tfm>`.
38
+
The secure materials like Matter Session keys and other keys (except for the DAC private key) can be stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` or :ref:`key_storage_kmu`.
37
39
38
-
nRF54L with Trusted Firmware-M (TF-M)
39
-
=====================================
40
+
Matter samples use the full, configurable TF-M build, so you cannot use the minimal build.
41
+
For more information, see :ref:`ug_tfm_supported_services_profiles`.
40
42
41
-
On the nRF54L SoC, all cryptographic operations within the Matter stack are performed by utilizing the `Platform Security Architecture (PSA)`_ API and executed in the secure TF-M environment using the :ref:`TF-M Crypto Service implementation <ug_crypto_architecture_implementation_standards_tfm>`.
42
-
The secure materials like Matter Session keys and other keys, except for the DAC private key, are stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` module.
43
-
Matter samples use the full TF-M library, so you cannot use the :ref:`tfm_minimal_build` version of TF-M.
44
-
45
-
To build a Matter sample with the TF-M support, :ref:`build <building>` for the :ref:`board target <app_boards_names>` with the ``/ns`` variant.
43
+
Matter sample partition layout
44
+
==============================
46
45
47
-
To configure partition layout for your application, you can edit the :file:`pm_static_nrf54l15dk_nrf54l15_cpuapp_ns.yml` file that is available in each sample directory.
46
+
To configure the partition layout for your application, you can edit the :file:`pm_static_nrf54l15dk_nrf54l15_cpuapp_ns.yml` file that is available in each sample directory.
48
47
To read more about the TF-M partitioning, see :ref:`ug_tfm_partition_alignment_requirements`.
49
48
While using TF-M, the application partition size and available RAM space for the application is lower than without TF-M.
50
49
You must keep this in mind and calculate the available space for the application partition.
Copy file name to clipboardExpand all lines: doc/nrf/protocols/thread/overview/security.rst
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,11 +40,14 @@ The Thread stack requires the following cryptographic operations:
40
40
Secure processing environment
41
41
*****************************
42
42
43
-
When building for the nRF54L15 DK using the :ref:`board target <app_boards_names>` with the ``/ns`` variant (``nrf54l15dk/nrf54l15/cpuapp/ns``), Thread samples can use the :ref:`secure processing environment <ug_tfm_security_by_separation>` with Trusted Firmware-M (TF-M).
43
+
When building for the nRF54L15 DK using the ``nrf54l15dk/nrf54l15/cpuapp/ns`` :ref:`board target <app_boards_names>`, Thread samples can use the :ref:`secure processing environment <ug_tfm_security_by_separation>` with Trusted Firmware-M (TF-M).
44
44
In such cases, all cryptographic operations within the Thread stack are performed using the `Platform Security Architecture (PSA)`_ API and executed in the secure TF-M environment using the :ref:`TF-M Crypto Service implementation <ug_crypto_architecture_implementation_standards_tfm>`.
45
-
The secure materials like Thread network key are stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` module.
45
+
The secure materials like Thread network key can be stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` or :ref:`key_storage_kmu`.
46
46
47
-
For example, to build the Thread CLI sample for the nRF54L15 DK with the TF-M support, run the following command:
47
+
Thread samples use the full, configurable TF-M build, so you cannot use the minimal build.
48
+
For more information, see :ref:`ug_tfm_supported_services_profiles`.
49
+
50
+
For example, to build the Thread CLI sample with the TF-M support, run the following command:
Copy file name to clipboardExpand all lines: doc/nrf/security.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Some of them are documented in detail in other parts of this documentation, whil
38
38
|- :ref:`ug_nrf54l_cryptography`
39
39
* - Trusted Firmware-M (TF-M)
40
40
- TF-M is the reference implementation of `Platform Security Architecture (PSA)`_.
41
-
On nRF5340, nRF54L and nRF91 Series devices, TF-M is used to configure and boot an application with :ref:`security by separation <app_boards_spe_nspe_cpuapp_ns>`.
41
+
On :ref:`boards with the /ns variant <app_boards_names>`, TF-M is used to configure and boot an application with :ref:`security by separation <app_boards_spe_nspe_cpuapp_ns>`.
Copy file name to clipboardExpand all lines: doc/nrf/security/tfm/tfm_building.rst
+65-7Lines changed: 65 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,18 +17,76 @@ To add TF-M to your build, enable the :kconfig:option:`CONFIG_BUILD_WITH_TFM` co
17
17
By default, TF-M is configured to build the :ref:`minimal version <tfm_minimal_build>`.
18
18
To use the full TF-M, you must disable the :kconfig:option:`CONFIG_TFM_PROFILE_TYPE_MINIMAL` option.
19
19
20
+
.. _ug_tfm_building_board_targets:
21
+
20
22
Board targets supported by TF-M
21
23
*******************************
22
24
23
-
The :ref:`boards supported by the SDK <app_boards_names>` distinguish entries according which CPU is to be targeted (for multi-core SoCs) and whether the security by separation is to be used or not (addition of the ``*/ns`` :ref:`variant <app_boards_names>` if it is used).
24
-
25
+
The boards supported by the SDK distinguish entries according to which CPU is to be targeted (for multi-core SoCs) and whether the :ref:`security by separation <ug_tfm_security_by_separation>` is to be used or not (addition of the ``*/ns`` :ref:`variant <app_boards_names>` if it is used).
25
26
To build with TF-M in the |NCS|, you must use a board target with the ``*/ns`` variant.
26
-
The following platforms are currently supported:
27
27
28
-
* nRF54LM20A
29
-
* nRF54L15
30
-
* nRF5340
31
-
* nRF91 Series
28
+
The following table lists the board targets that you can use to build with TF-M.
29
+
See :ref:`app_boards_names` for the complete list of boards and board targets supported by the SDK.
0 commit comments