You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
applications: nrf_desktop: update documentation for nRF54LM20 DK target
Updated the nRF Desktop documentation for the nRF54LM20 DK target to
align it with the newest configuration changes. The nRF54LM20 DK target
now uses the KMU to store the MCUboot public key for image verification
and hardware-based cryptography based on the CRACEN HW peripheral. The
hardware cryptography is enabled for both the MCUboot bootloader and
the application image.
Ref: NCSDK-34043
Signed-off-by: Kamil Piszczek <[email protected]>
For detailed information on working with the nRF54LM20 DK, see the :ref:`ug_nrf54l15_gs` documentation.
179
179
* In ``llvm`` configurations, the partition layout is different to accommodate for the higher memory footprint of the ``llvm`` toolchain.
180
180
* The configurations use the MCUboot bootloader built in the direct-xip mode (``MCUBOOT+XIP``) and support firmware updates using the :ref:`nrf_desktop_dfu`.
181
+
All of the configurations enable hardware cryptography for the MCUboot bootloader.
181
182
The application image is verified using a pure ED25519 signature.
182
-
183
-
.. note::
184
-
Currently, the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target has the following limitations:
185
-
186
-
* The software-based cryptography is used in the MCUboot bootloader and application image.
187
-
The hardware-based cryptography is not yet supported.
188
-
* The public key that MCUboot uses for validating the application image is stored in the bootloader partition.
189
-
The hardware Key Management Unit (KMU) is not supported yet.
183
+
The public key that MCUboot uses for validating the application image is securely stored in the hardware Key Management Unit (KMU).
184
+
For more details on nRF54L Series cryptography, see :ref:`ug_nrf54l_cryptography`.
190
185
191
186
Sample mouse or dongle (``nrf54h20dk/nrf54h20/cpuapp``)
Copy file name to clipboardExpand all lines: applications/nrf_desktop/bootloader_dfu.rst
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,9 +208,6 @@ You can enhance security further by enabling the following sysbuild Kconfig opti
208
208
This option enables generating a default :file:`keyfile.json` file during the build process based on the input file provided by the :kconfig:option:`SB_CONFIG_BOOT_SIGNATURE_KEY_FILE` sysbuild Kconfig option.
209
209
The automatic provisioning is only performed if the west flash command is executed with the ``--erase`` or ``--recover`` flag.
210
210
211
-
.. note::
212
-
KMU is not yet supported for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target.
Copy file name to clipboardExpand all lines: doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,7 +208,17 @@ nRF5340 Audio
208
208
nRF Desktop
209
209
-----------
210
210
211
-
|no_changes_yet_note|
211
+
* Updated:
212
+
213
+
* The memory layouts for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target to make more space for the application code.
214
+
This change in the partition map of every nRF54LM20 configuration is a breaking change and cannot be performed using DFU.
215
+
As a result, the DFU procedure will fail if you attempt to upgrade the application firmware based on one of the |NCS| v3.1 releases.
216
+
* The application and MCUboot configurations for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target to use the CRACEN hardware crypto driver instead of the Oberon software crypto driver.
217
+
The application image signature is verified with the CRACEN hardware peripheral.
218
+
* The MCUboot configurations for the ``nrf54lm20dk/nrf54lm20a/cpuapp`` board target to use the KMU-based key storage.
219
+
The public key used by MCUboot for validating the application image is securely stored in the KMU hardware peripheral.
220
+
To simplify the programming procedure, the application is configured to use the automatic KMU provisioning.
221
+
The KMU provisioning is performed by the west runner as a part of the ``west flash`` command when the ``--erase`` or ``--recover`` flag is used.
0 commit comments