blob: c29e1a80677cd6e84d86bd3a1760e4cf8f3479a3 [file] [log] [blame]
############################
Musca-B1/S1 OTP Provisioning
############################
This document assumes that the user has set up the build environment, is
capable of compiling the TF-M project, and is in possession of at least one
Musca-S1 board, or a Musca-B1 board that has not been provisioned before.
.. Note::
During provisioning, the 'MCUBOOT_IMAGE_NUMBER' configuration's value
determines which Root of Trust public key's hash will be stored. Whichever
one is stored, it can only be checked against successfully in the matching
way later. This means that a board provisioned with a build in which
'MCUBOOT_IMAGE_NUMBER=1' can only be used with 'MCUBOOT_IMAGE_NUMBER=1',
as long as the OTP is enabled. Same goes with 'MCUBOOT_IMAGE_NUMBER=2'.
*********************************
Provisioning on Musca HW variants
*********************************
Even though most of the process is identical between the boards, there is
a difference between them because of the underlying hardware.
While the B1 has actual OTP memory, the S1 only has volatile registers in its
place. Because a power cyclce wipes that area, the S1 merely imitates OTP
memory by copying provisioned data to its non-volatile MRAM.
Once the provisioning process is done, the CryptoCell-312 enters the Secure
Enabled lifecycle, which it recognizes by the contents of the OTP.
Debug and board reprogramming through USB is locked down in this state.
This lock can be forced open, but only with DAPLink firmware v34 or above.
Because the S1 "OTP" content is stored in the MRAM, it can be provisioned only
once with the normal provisioning flow. However, a workaround to re-provision
the board does exist. To achieve this, one needs to wipe the key area in the
MRAM with the debugger in advance. The address and size of said area can be
found at 'platform/ext/target/musca_s1/partition/flash_layout.h' as
'TF-M key area'.
For further information on the DAPLink firmware and update process, please
refer to the `Musca-B1 Technical Reference Manual
<https://developer.arm.com/docs/101312/0000>`__ or the `Musca-S1 Technical
Reference Manual <https://developer.arm.com/docs/101835/0000>`__.
Provisioning steps
==================
1. Build TF-M with -DCRYPTO_HW_ACCELERATOR_OTP_STATE=PROVISIONING given on
the CMake command line.
2. Load the tfm.hex file to the board and open the serial output.
Once you see something like the following snippet:
.. code-block:: bash
...
First cycle: Attestation key is provisioned successfully
First cycle: HUK is provisioned successfully
Please reset the board to program ROTPK
...
3. Reset the board once by pressing the nSRST button and wait until you see
something like this:
::
...
Second cycle: ROTPK is provisioned successfully
Provisioning finished, reset the board to get secure enabled lifecycle
...
4. Reset the board once more.
If the provisioning process was succesful, you should see an output like:
::
...
Board is in invalid lifecycle for provisioning: 5
...
Using the provisioned data
==========================
1. Build TF-M with -DCRYPTO_HW_ACCELERATOR_OTP_STATE=ENABLED given
on the CMake command line.
2. Load the tfm.hex file to
the board.
--------------
*Copyright (c) 2020, Arm Limited. All rights reserved.*