Skip to content

Commit f33f02e

Browse files
committed
applications: nrf_desktop: update documentation for nRF54LM20 DK target
Updated the nRF Desktop documentation for the nRF54LM20 DK target to align it with the newest configuration changes. The nRF54LM20 DK target now uses the KMU to store the MCUboot public key for image verification and hardware-based cryptography based on the CRACEN HW peripheral. The hardware cryptography is enabled for both the MCUboot bootloader and the application image. Ref: NCSDK-34043 Signed-off-by: Kamil Piszczek <[email protected]>
1 parent 2cdd28a commit f33f02e

File tree

4 files changed

+14
-15
lines changed

4 files changed

+14
-15
lines changed

applications/nrf_desktop/board_configuration.rst

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -178,15 +178,10 @@ Sample mouse (``nrf54lm20dk/nrf54lm20a/cpuapp``)
178178
For detailed information on working with the nRF54LM20 DK, see the :ref:`ug_nrf54l15_gs` documentation.
179179
* In ``llvm`` configurations, the partition layout is different to accommodate for the higher memory footprint of the ``llvm`` toolchain.
180180
* The configurations use the MCUboot bootloader built in the direct-xip mode (``MCUBOOT+XIP``) and support firmware updates using the :ref:`nrf_desktop_dfu`.
181+
All of the configurations enable hardware cryptography for the MCUboot bootloader.
181182
The application image is verified using a pure ED25519 signature.
182-
183-
.. note::
184-
Currently, the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target has the following limitations:
185-
186-
* The software-based cryptography is used in the MCUboot bootloader and application image.
187-
The hardware-based cryptography is not yet supported.
188-
* The public key that MCUboot uses for validating the application image is stored in the bootloader partition.
189-
The hardware Key Management Unit (KMU) is not supported yet.
183+
The public key that MCUboot uses for validating the application image is securely stored in the hardware Key Management Unit (KMU).
184+
For more details on nRF54L Series cryptography, see :ref:`ug_nrf54l_cryptography`.
190185

191186
Sample mouse or dongle (``nrf54h20dk/nrf54h20/cpuapp``)
192187
* The configuration uses the nRF54H20 DK.

applications/nrf_desktop/bootloader_dfu.rst

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -208,9 +208,6 @@ You can enhance security further by enabling the following sysbuild Kconfig opti
208208
This option enables generating a default :file:`keyfile.json` file during the build process based on the input file provided by the :kconfig:option:`SB_CONFIG_BOOT_SIGNATURE_KEY_FILE` sysbuild Kconfig option.
209209
The automatic provisioning is only performed if the west flash command is executed with the ``--erase`` or ``--recover`` flag.
210210

211-
.. note::
212-
KMU is not yet supported for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target.
213-
214211
.. _nrf_desktop_bootloader_background_dfu:
215212

216213
Background Device Firmware Upgrade

applications/nrf_desktop/description.rst

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1029,9 +1029,6 @@ The private key is used to sign the application image.
10291029
The public key is generated from the private key and is used by MCUboot to validate the application image.
10301030
The public key is securely stored in the Key Management Unit (KMU) hardware peripheral of the nRF54L device.
10311031

1032-
.. note::
1033-
KMU is not yet supported for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target.
1034-
10351032
In this application, the application image is automatically signed with a private key by the |NCS| build system.
10361033
The private keys are stored in the application configuration directory of the board.
10371034
Path to the private key is defined by the ``SB_CONFIG_BOOT_SIGNATURE_KEY_FILE`` sysbuild Kconfig option.

doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,17 @@ nRF5340 Audio
208208
nRF Desktop
209209
-----------
210210

211-
|no_changes_yet_note|
211+
* Updated:
212+
213+
* The memory layouts for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target to make more space for the application code.
214+
This change in the partition map of every nRF54LM20 configuration is a breaking change and cannot be performed using DFU.
215+
As a result, the DFU procedure will fail if you attempt to upgrade the application firmware based on one of the |NCS| v3.1 releases.
216+
* The application and MCUboot configurations for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target to use the CRACEN hardware crypto driver instead of the Oberon software crypto driver.
217+
The application image signature is verified with the CRACEN hardware peripheral.
218+
* The MCUboot configurations for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target to use the KMU-based key storage.
219+
The public key used by MCUboot for validating the application image is securely stored in the KMU hardware peripheral.
220+
To simplify the programming procedure, the application is configured to use the automatic KMU provisioning.
221+
The KMU provisioning is performed by the west runner as a part of the ``west flash`` command when the ``--erase`` or ``--recover`` flag is used.
212222

213223
nRF Machine Learning (Edge Impulse)
214224
-----------------------------------

0 commit comments

Comments
 (0)