Skip to content

Commit ced88a8

Browse files
Revert "[nxp fromtree] [NXP][rw61x][k32w1] Rework reference apps (project-chip#35172)"
This reverts commit 2237612. Signed-off-by: marius-alex-tache <marius.tache@nxp.com>
1 parent e379291 commit ced88a8

File tree

112 files changed

+2944
-1287
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+2944
-1287
lines changed

.github/workflows/examples-nxp.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ jobs:
150150
if: github.actor != 'restyled-io[bot]'
151151

152152
container:
153-
image: ghcr.io/project-chip/chip-build-nxp:74
153+
image: ghcr.io/project-chip/chip-build-rw61x:66
154154
volumes:
155155
- "/tmp/bloat_reports:/tmp/bloat_reports"
156156
steps:

docs/guides/nxp/nxp_manufacturing_flow.md

+21-55
Original file line numberDiff line numberDiff line change
@@ -251,58 +251,24 @@ adding the following gn argument `chip_use_plain_dac_key=true`.
251251

252252
Supported platforms:
253253

254-
- RW61X
255-
256-
there are three implementations for factory data protection
257-
258-
- whole factory data protection with AES encryption ( chip_with_factory_data=1
259-
chip_enable_secure_whole_factory_data=true )
260-
`examples/platform/nxp/rt/rw61x/factory_data/source/AppFactoryDataExample.cpp`\
261-
`src/platform/nxp/rt/rw61x/FactoryDataProviderEncImpl.cpp`
262-
263-
- only dac private key protection ( chip_with_factory_data=1
264-
chip_enable_secure_dac_private_key_storage=true )
265-
`examples/platform/nxp/rt/rw61x/factory_data/source/AppFactoryDataExample.cpp`
266-
\
267-
`src/platform/nxp/rt/rw61x/FactoryDataProviderImpl.cpp`
268-
269-
- whole factory data protection with hard-coded AES key (
270-
chip_with_factory_data=1 )
271-
`examples/platform/nxp/common/factory_data/source/AppFactoryDataDefaultImpl.cpp`
272-
\
273-
`src/platform/nxp/common/factory_data/FactoryDataProviderFwkImpl.cpp`
274-
275-
for the first one, the whole factory data is encrypted by an AES-256 key, the
276-
AES key can be passed through serial link when in factory production mode, and
277-
will be provisioned into Edge Lock, and the returned AES Key blob (wrapped key)
278-
can be stored in the end of factory data region in TLV format. for the
279-
decryption process, the blob is retrieved and provisioned into Edge Lock and the
280-
whole factory data can be decrypted using the returned key index in Edge Lock.
281-
Compared with only dac private key protection solution, this solution can avoid
282-
tampering with the original factory data.
283-
284-
the factory data should be encrypted by an AES-256 key using "--aes256_key"
285-
option in "generate.py" script file.
286-
287-
it will check whether there is AES key blob in factory data region when in each
288-
initialization, if not, the default AES key is converted and the result is
289-
stored into flash, it run only once.
290-
291-
for the second one, it only protect the dac private key inside the factory data,
292-
the dac private key is retrieved and provisioned into Edge Lock, the returned
293-
key blob replace the previous dac private key, and also update the overall size
294-
and hash, and re-write the factory data. when device is doing matter
295-
commissioning, the blob is retrieved and provisioned into Edge Lock and the
296-
signing can be done using the returned key index in Edge Lock.
297-
298-
the factory data should be plain text for the first programming. it will check
299-
whether there is dac private key blob (base on the size of blob, should be 48)
300-
in factory data when in each initialization, if not, the dac private key is
301-
converted and the result is stored into flash, it run only once.
302-
303-
for the third one, it is a little similar to the first one, the whole factory
304-
data is encrypted by an AES key, but there are two differences:
305-
306-
- the AES key is hard-coded and not provisioned into Edge Lock
307-
- the factory data should be encrypted by AES-128 key using "--aes128_key"
308-
option in "generate.py" script file.
254+
- RW61X - `src/plaftorm/nxp/rt/rw61x/FactoryDataProviderImpl.h`
255+
256+
For platforms that have a secure subsystem (`SE50`), the DAC private key can be
257+
converted to an encrypted blob. This blob will overwrite the DAC private key in
258+
factory data and will be imported in the `SE50` before to sign, by the factory
259+
data provider instance.
260+
261+
The conversion process shall happen at manufacturing time and should be run one
262+
time only:
263+
264+
- Write factory data binary.
265+
- Build the application with
266+
`chip_with_factory_data=1 chip_convert_dac_private_key=1` set.
267+
- Write the application to the board and let it run.
268+
269+
After the conversion process:
270+
271+
- Make sure the application is built with `chip_with_factory_data=1`, but
272+
without `chip_convert_dac_private_key` arg, since conversion already
273+
happened.
274+
- Write the application to the board.

docs/guides/nxp/nxp_mcxw71_ota_guide.md

+11-13
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# NXP `MCXW71/K32W1` OTA guide
1+
# NXP MCXW71/K32W1 OTA guide
22

33
### Convert `srec` into `sb3` file
44

@@ -49,12 +49,11 @@ an `.sb3` file:
4949
```
5050

5151
A note regarding OTA image header version (`-vn` option). An application binary
52-
has its own software version (given by
53-
`CHIP_DEVICE_CONFIG_DEVICE_SOFTWARE_VERSION`, which can be overwritten). In
54-
order to have a correct OTA process, the OTA header version should be the same
55-
as the binary embedded software version. A user can set a custom software
56-
version in the gn build args by setting `nxp_software_version` to the wanted
57-
version.
52+
has its own software version (given by `CHIP_DEVICE_CONFIG_DEVICE_SOFTWARE_VERSION`,
53+
which can be overwritten). In order to have a correct OTA process, the OTA header
54+
version should be the same as the binary embedded software version. A user can set
55+
a custom software version in the gn build args by setting `nxp_software_version`
56+
to the wanted version.
5857

5958
### OTA factory data
6059

@@ -99,9 +98,9 @@ using CSA official instructions from
9998
proposed. Also, CSA official instructions document point to the OS/Docker images
10099
that should be used on the RPis. For compatibility reasons, we recommand
101100
compiling chip-tool and OTA Provider applications with the same commit id that
102-
was used for compiling the reference application. Also, please note that there
103-
is a single controller (chip-tool) running on Computer #1 which is used for
104-
commissioning both the device and the OTA Provider Application. If needed,
101+
was used for compiling the reference application. Also, please note that
102+
there is a single controller (chip-tool) running on Computer #1 which is used
103+
for commissioning both the device and the OTA Provider Application. If needed,
105104
[these instructions](https://itsfoss.com/connect-wifi-terminal-ubuntu/) could be
106105
used for connecting the RPis to WiFi.
107106

@@ -152,9 +151,8 @@ user@computer1:~/connectedhomeip$ : ./out/chip-tool-app/chip-tool otasoftwareupd
152151
execute `ot-ctl server disable` followed by `ot-ctl server enable`. After
153152
this step, the commissioning process of the device can start;
154153
- Due to some MDNS issues, the commissioning of the OTA Provider Application
155-
may fail. Please make sure that the SRP cache is disabled
156-
(`ot-ctl srp server disable`) on the openthread border router while
157-
commissioning the OTA Provider Application;
154+
may fail. Please make sure that the SRP cache is disabled (`ot-ctl srp server disable`)
155+
on the openthread border router while commissioning the OTA Provider Application;
158156
- No other Docker image should be running (e.g.: Docker image needed by Test
159157
Harness) except the OTBR one. A docker image can be killed using the
160158
command:

docs/guides/nxp/nxp_rw61x_ota_software_update.md

+38-33
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,10 @@ MCUBoot is an open-source secure bootloader used by RW61x to apply the
4848
self-upgrade. For more details, please refer to the
4949
[MCUBoot documentation](https://github.com/mcu-tools/mcuboot/blob/main/docs/design.md).
5050

51-
For RW61x platform, the bootloader is configured to use the flash remapping
52-
mechanism by default, in order to perform the image upgrade. This is achieved by
53-
using the `MCUBoot DIRECT-XIP` upgrade mode.
51+
In our use case, the bootloader runs the application residing in the primary
52+
partition. In order to run the OTA update image, the bootloader will swap the
53+
content of the primary and the secondary partitions. This type of upgrade is
54+
called swap-move and is the default upgrade configured by MCUBoot.
5455

5556
## OTA Software Update process for RW61x example application
5657

@@ -85,42 +86,47 @@ J-Link > exec EnableEraseAllFlashBanks
8586
J-Link > erase 0x8000000, 0x88a0000
8687
```
8788

88-
- MCUBoot application can be built with SDK installed, using instructions
89-
90-
below.
91-
92-
- Retrieve the mcuboot directory with :
89+
- Using MCUXPresso, import the `mcuboot_opensource` demo example from the SDK
90+
previously downloaded. The example can be found under the `ota_examples`
91+
folder.
92+
![mcuboot_demo](../../../examples/platform/nxp/rt/rw61x/doc/images/mcuboot_demo.PNG)
93+
- Before building the demo example, it should be specified that the
94+
application to be run by the bootloader is monolithic. As a result, only one
95+
image will be upgraded by the bootloader. This can be done by defining
96+
`MONOLITHIC_APP` as 1 in the settings of the `mcuboot_opensource` project :
9397

9498
```
95-
user@ubuntu: cd ~/Desktop/connectedhomeip/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/armgcc
99+
Right click on the Project -> Properties -> C/C++ Build -> Settings -> Tool Settings -> MCU C Compiler -> Preprocessor -> Add "MONOLITHIC_APP=1" in the Defined Symbols
96100
```
97101

98-
`<rw612 board>`: Supported rw612 boards are: `rdrw612bga` or `frdmrw612`
102+
![rw610_mcuboot_monolithic](../../../examples/platform/nxp/rt/rw61x/doc/images/mcuboot_monolithic_app.PNG)
99103

100-
- Build the mcuboot application :
104+
- Build the demo example project.
101105

102106
```
103-
user@ubuntu: chmod +x build_flash_release.sh
104-
user@ubuntu: export ARMGCC_DIR=/opt/gcc-arm-none-eabi-10.3-2021.10 # with ARMGCC_DIR referencing the compiler path
105-
user@ubuntu: ./build_flash_release.sh
107+
Right click on the Project -> Build Project
106108
```
107109

108-
- Program the generated binary to the target board.
110+
- Program the demo example to the target board.
109111

110112
```
111-
J-Link > loadbin ~/Desktop/connectedhomeip/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/armgcc/flash_release/mcuboot_opensource.elf
113+
Right click on the Project -> Debug -> As->SEGGER JLink probes -> OK -> Select elf file
112114
```
113115

114-
- If it runs successfully, the following logs will be displayed on the
115-
terminal :
116+
Note : The mcuboot binary is loaded in flash at address 0x8000000.
117+
118+
- To run the flashed demo, either press the reset button of the device or use
119+
the debugger IDE of MCUXpresso. If it runs successfully, the following logs
120+
will be displayed on the terminal :
116121

117122
```
118123
hello sbl.
119-
Disabling flash remapping function
120-
Bootloader Version 2.0.0
121-
Image 0 Primary slot: Image not found
122-
Image 0 Secondary slot: Image not found
123-
No slot to load for image 0
124+
Bootloader Version 1.9.0
125+
Primary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
126+
Secondary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
127+
Boot source: none
128+
Swap type: none
129+
erasing trailer; fa_id=2
124130
Unable to find bootable image
125131
```
126132

@@ -129,7 +135,7 @@ partitions to be the size of 4.4 MB. If the size is to be changed, the partition
129135
addresses should be modified in the flash_partitioning.h accordingly. For more
130136
information about the flash partitioning with mcuboot, please refer to the
131137
dedicated readme.txt located in
132-
"`<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/`".
138+
"`SDK_RW612/boards/rdrw612bga/ota_examples/mcuboot_opensource/`".
133139

134140
### Generating and flashing the signed application image
135141

@@ -156,15 +162,15 @@ arm-none-eabi-objcopy -R .flash_config -R .NVM -O binary chip-rw61x-all-cluster-
156162

157163
To sign the image and wrap the raw binary of the application with the header and
158164
trailer, "`imgtool`" is provided in the SDK and can be found in
159-
"`<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/middleware/mcuboot_opensource/scripts/`".
165+
"`/middleware/mcuboot_opensource/scripts/`".
160166

161167
The following commands can be run (make sure to replace the /path/to/file/binary
162168
with the adequate files):
163169

164170
```
165-
user@ubuntu: cd ~/Desktop/<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/middleware/mcuboot_opensource/scripts/
171+
user@ubuntu: cd ~/Desktop/SDK_RW612/middleware/mcuboot_opensource/scripts
166172
167-
user@ubuntu: python3 imgtool.py sign --key ~/Desktop/<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem --align 4 --header-size 0x1000 --pad-header --pad --confirm --slot-size 0x440000 --max-sectors 1088 --version "1.0" ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example.bin ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example_SIGNED.bin
173+
user@ubuntu: python3 imgtool.py sign --key ~/Desktop/SDK_RW612/boards/rdrw612bga/ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem --align 4 --header-size 0x1000 --pad-header --slot-size 0x440000 --max-sectors 1088 --version "1.0" ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example.bin ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example_SIGNED.bin
168174
```
169175

170176
Notes :
@@ -176,7 +182,7 @@ Notes :
176182
adjusted accordingly.
177183
- In this example, the image is signed with the private key provided by the
178184
SDK as an example
179-
(`<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem`),
185+
(`SDK_RW612/boards/rdrw612bga/ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem`),
180186
MCUBoot is built with its corresponding public key which would be used to
181187
verify the integrity of the image. It is possible to generate a new pair of
182188
keys using the following commands. This procedure should be done prior to
@@ -195,7 +201,7 @@ user@ubuntu: python3 imgtool.py getpub -k priv_key.pem
195201
```
196202

197203
- The extracted public key can then be copied to the
198-
`<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/keys/sign-rsa2048-pub.c`,
204+
`SDK_RW612/boards/rdrw612bga/ota_examples/mcuboot_opensource/keys/sign-rsa2048-pub.c`,
199205
given as a value to the rsa_pub_key[] array.
200206

201207
The resulting output is the signed binary of the application version "1.0".
@@ -215,12 +221,11 @@ application and run it.
215221
To generate the OTA update image the same procedure can be followed from the
216222
[Generating and flashing the signed application image](#generating-and-flashing-the-signed-application-image)
217223
sub-section, replacing the "--version "1.0"" argument with "--version "2.0""
218-
(recent version of the update), without arguments "--pad" "--confirm" when
219-
running `imgtool` script during OTA Update Image generation.
224+
(recent version of the update).
220225

221226
Note : When building the update image, the build arguments
222-
nxp_software_version=2 nxp_software_version_string=\"2.0\" can be added to the
223-
gn gen command in order to specify the upgraded version.
227+
`nxp_software_version=2 nxp_sofware_version_string=\"2.0\"` can be added to the
228+
`gn gen` command in order to specify the upgraded version.
224229

225230
When the signed binary of the update is generated, the file should be converted
226231
into OTA format. To do so, the ota_image_tool is provided in the repo and can be

examples/all-clusters-app/nxp/rt/rw61x/BUILD.gn

+8-19
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,7 @@ rt_sdk("sdk") {
5757
defines = []
5858

5959
# To be moved, temporary mbedtls config fix to build app with factory data
60-
if (chip_enable_secure_dac_private_key_storage ||
61-
chip_enable_secure_whole_factory_data) {
60+
if (chip_enable_secure_dac_private_key_storage == 1) {
6261
defines += [
6362
"MBEDTLS_NIST_KW_C",
6463
"MBEDTLS_PSA_CRYPTO_CLIENT",
@@ -75,18 +74,10 @@ rt_sdk("sdk") {
7574
include_dirs += [ "${example_platform_dir}/board/" ]
7675
sources += [ "${example_platform_dir}/board/pin_mux.c" ]
7776
sources += [ "${example_platform_dir}/board/hardware_init.c" ]
77+
sources += [ "${example_platform_dir}/board/clock_config.c" ]
78+
sources += [ "${example_platform_dir}/board/board.c" ]
7879
sources += [ "${example_platform_dir}/board/peripherals.c" ]
7980

80-
if (board_version == "frdm") {
81-
include_dirs += [ "${example_platform_dir}/board/frdmrw612/" ]
82-
sources += [ "${example_platform_dir}/board/frdmrw612/clock_config.c" ]
83-
sources += [ "${example_platform_dir}/board/frdmrw612/board.c" ]
84-
} else {
85-
include_dirs += [ "${example_platform_dir}/board/rdrw612bga/" ]
86-
sources += [ "${example_platform_dir}/board/rdrw612bga/clock_config.c" ]
87-
sources += [ "${example_platform_dir}/board/rdrw612bga/board.c" ]
88-
}
89-
9081
# Indicate the path to CHIPProjectConfig.h
9182
include_dirs += [ "include/config" ]
9283

@@ -98,7 +89,7 @@ rt_sdk("sdk") {
9889

9990
# For matter with BR feature, increase FreeRTOS heap size
10091
if (chip_enable_wifi && chip_enable_openthread) {
101-
defines += [ "configTOTAL_HEAP_SIZE=(size_t)(170 * 1024)" ]
92+
defines += [ "configTOTAL_HEAP_SIZE=(size_t)(160 * 1024)" ]
10293
}
10394

10495
defines += [
@@ -142,12 +133,10 @@ rt_executable("all_cluster_app") {
142133
"../../common/main/main.cpp",
143134
]
144135

145-
if (chip_enable_secure_dac_private_key_storage ||
146-
chip_enable_secure_whole_factory_data) {
147-
sources += [ "${chip_root}/examples/platform/nxp/${nxp_platform}/factory_data/source/AppFactoryDataExample.cpp" ]
148-
if (chip_enable_secure_whole_factory_data) {
149-
defines += [ "ENABLE_SECURE_WHOLE_FACTORY_DATA" ]
150-
}
136+
if (chip_enable_secure_dac_private_key_storage == 1) {
137+
sources += [
138+
"${example_platform_dir}/factory_data/source/AppFactoryDataExample.cpp",
139+
]
151140
} else {
152141
sources += [
153142
"${common_example_dir}/factory_data/source/AppFactoryDataDefaultImpl.cpp",

0 commit comments

Comments
 (0)