Skip to content

Commit

Permalink
doc: precise trusted storage description
Browse files Browse the repository at this point in the history
Minor fixes after review

Signed-off-by: Krzysztof Taborowski <[email protected]>
  • Loading branch information
ktaborowski committed Sep 19, 2024
1 parent 529ab0e commit d18feeb
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 6 deletions.
2 changes: 1 addition & 1 deletion doc/links.rst
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@
.. _NCS testing applications: https://docs.nordicsemi.com/bundle/ncs-2.7.0/page/nrf/test_and_optimize.html
.. _Installing the nRF Connect SDK: https://docs.nordicsemi.com/bundle/ncs-2.7.0/page/nrf/installation/install_ncs.html
.. _Board Configurator: https://docs.nordicsemi.com/bundle/nrf-connect-board-configurator/page/index.html
.. _Hardware unique key: https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/security/hw_unique_key.html#lib-hw-unique-key
.. _Trusted storage: https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/security/trusted_storage.html
.. _Hardware flash write protection: https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/security/bootloader/fprotect.html

.. ncs fixed links(do not update them)
Expand Down
2 changes: 1 addition & 1 deletion doc/releases_and_migration/migration_guide_v280.rst
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ The following logs are generated:
[00:00:00.014,900] <inf> sid_mfg_parser_v8: MFG_SECP_256R1 import success
[00:00:00.054,505] <inf> sid_mfg: Successfully parsed mfg data
The secure key storage is based on the `Hardware unique key`_ security library.
The secure key storage is based on the `Trusted storage`_ security library.
After keys are imported into secure key storage, it is impossible to read their raw values.
Therefore, once secure key storage is enabled in the firmware, it must remain enabled in all subsequent firmware versions.
This feature is enabled by default in all Sidewalk samples.
Expand Down
7 changes: 3 additions & 4 deletions doc/samples/sid_end_device.rst
Original file line number Diff line number Diff line change
Expand Up @@ -132,14 +132,13 @@ For example:
Secure Key Storage support
==========================

The Sidewalk Platform Abstraction Layer for nRF Connect SDK supports a secure key storage mechanism for Sidewalk keys,
ensuring they are stored persistently and confidentially.
The Sidewalk Platform Abstraction Layer for nRF Connect SDK supports a trusted storage mechanism for non-volatile Sidewalk keys, ensuring they are stored persistently and confidentially.
The feature is enabled by default with the ``CONFIG_SIDEWALK_CRYPTO_PSA_KEY_STORAGE`` Kconfig option.

.. note::

Once secure keys are moved to secure key storage, it is impossible to retrieve them in plain text.
Therefore, you must not update your firmware to versions that do not support secure key storage.
Once keys are moved to trusted storage, it is impossible to retrieve them back into MFG storage.
Therefore, you must not update your firmware to versions that do not support trusted storage for non-volatile Sidewalk keys.

Device Firmware Upgrade support
===============================
Expand Down

0 comments on commit d18feeb

Please sign in to comment.