Skip to content

Commit 0d54d03

Browse files
AhmedIsmail02aggarg
authored andcommitted
docs: Update documents to include the PSA Crypto option
Top level README.md along with applications' documents are updated to illustrate how the new PSA Crypto APIs implementation configuration option can be used, and mention the available configurations for the new option. Signed-off-by: Ahmed Ismail <[email protected]>
1 parent 832b5d2 commit 0d54d03

File tree

8 files changed

+48
-12
lines changed

8 files changed

+48
-12
lines changed

README.md

+4-2
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,10 @@ and [AWS OTA PAL PSA implementation](#aws-ota-pal-psa-implementation) can be per
7373

7474
Corstone platform communicates with the AWS IoT Core over a secure TLS
7575
connection. Mbed TLS running on the NSPE is used to establish the TLS
76-
connection. Mbed TLS makes use of the PSA Crypto APIs provided by TF-M for
77-
Crypto operations.
76+
connection. For crypto operations, Mbed TLS supports PSA Crypto APIs provided by either
77+
the Mbed TLS itself or the Trusted Firmware-M and the default is
78+
PSA Crypto API from Trusted Firmware-M. For more information about the PSA Crypto APIs
79+
implementation, please refer to [Mbed TLS document](docs/components/security/mbedtls/mbedtls.md#psa-crypto-apis-implementation).
7880

7981
[PKCS#11](https://www.freertos.org/pkcs11/index.html) APIs to perform TLS
8082
client authentication and import TLS client certificate and private key into

docs/applications/device_advisor/running_aws_iot_core_device_advisor_tests.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -65,15 +65,15 @@ Save and close the file.
6565
To build the application, run the following command:
6666

6767
```bash
68-
./tools/scripts/build.sh ${APPLICATION_NAME} --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --toolchain GNU
68+
./tools/scripts/build.sh ${APPLICATION_NAME} --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --toolchain GNU --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS>
6969
```
7070

7171
* The `certificate pem's path` and `private key pem's path` should be the downloaded key's and certificate's paths during the Thing creation.
7272

7373
Or, run the command below to perform a clean build:
7474

7575
```bash
76-
./tools/scripts/build.sh ${APPLICATION_NAME} --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --toolchain GNU -c
76+
./tools/scripts/build.sh ${APPLICATION_NAME} --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --toolchain GNU --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS> -c
7777
```
7878

7979
## Running the application

docs/applications/keyword_detection.md

+7-2
Original file line numberDiff line numberDiff line change
@@ -47,18 +47,23 @@ Follow the instructions described in [Setting Up AWS Connectivity](./aws_iot/set
4747
To build the Keyword-Detection example, run the following command:
4848

4949
```bash
50-
./tools/scripts/build.sh keyword-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference <ETHOS/SOFTWARE> --audio <ROM/VSI> --toolchain <ARMCLANG/GNU>
50+
./tools/scripts/build.sh keyword-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference <ETHOS/SOFTWARE> --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS>
5151
```
5252
* The `certificate pem's path` and `private key pem's path` should be the downloaded key's and certificate's path if you chose the **Auto-generate a new certificate** during the Thing creation. If you chose **Skip creating a certificate at this time** then these paths should locate the generated credential files that were created by the `./tools/scripts/generate_credentials.py` script in the previous step.
5353

5454
* The `inference` is used to select the inference type whether it's `ETHOS` or `SOFTWARE`.
5555

5656
* The `audio` is used to select the input audio source whether it's preloaded into `ROM` or using Arm's Virtual Streaming Interface `VSI`.
5757

58+
* The `conn-stack` is used to select the connectivity stack to be used whether it's `FREERTOS_PLUS_TCP` or `IOT_VSOCKET`.
59+
60+
* The `psa-crypto-implementation` is used to select the library providing the PSA Crypto APIs implementation whether it's `TF-M` or `MBEDTLS`. For more information about the PSA Crypto APIs
61+
implementation, please refer to [Mbed TLS document](../components/security/mbedtls/mbedtls.md#psa-crypto-apis-implementation).
62+
5863
Or, run the command below to perform a clean build:
5964

6065
```bash
61-
./tools/scripts/build.sh keyword-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference <ETHOS/SOFTWARE> --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> -c
66+
./tools/scripts/build.sh keyword-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference <ETHOS/SOFTWARE> --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS> -c
6267
```
6368

6469
## Provisioning the device credentials into Protected Storage

docs/applications/object_detection.md

+7-2
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,20 @@ Follow the instructions described in [Setting Up AWS Connectivity](./aws_iot/set
2525

2626
To build the Object-Detection example, run the following command:
2727
```bash
28-
./tools/scripts/build.sh object-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> -t corstone315 --toolchain GNU
28+
./tools/scripts/build.sh object-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> -t corstone315 --toolchain GNU --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS>
2929
```
3030
- The `certificate pem's path` and `private key pem's path` should be the downloaded key's and certificate's path if you chose the **Auto-generate a new certificate** during the Thing creation. If you chose **Skip creating a certificate at this time** then these paths should locate the generated credential files that were created by the `./tools/scripts/generate_credentials.py` script in the previous step.
3131

3232
- The `toolchain` is used to select the `GNU`, that supports the `Mali-C55`.
3333

34+
* The `conn-stack` is used to select the connectivity stack to be used whether it's `FREERTOS_PLUS_TCP` or `IOT_VSOCKET`.
35+
36+
* The `psa-crypto-implementation` is used to select the library providing the PSA Crypto APIs implementation whether it's `TF-M` or `MBEDTLS`. For more information about the PSA Crypto APIs
37+
implementation, please refer to [Mbed TLS document](../components/security/mbedtls/mbedtls.md#psa-crypto-apis-implementation).
38+
3439
Or, run the command below to perform a clean build:
3540
```bash
36-
./tools/scripts/build.sh object-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> -t corstone315 --toolchain GNU -c
41+
./tools/scripts/build.sh object-detection --certificate_path <certificate pem's path> --private_key_path <private key pem's path> -t corstone315 --toolchain GNU --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS> -c
3742
```
3843

3944
## Provisioning the device credentials into Protected Storage

docs/applications/speech_recognition.md

+7-2
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,21 @@ Follow the instructions described in [Setting Up AWS Connectivity](./aws_iot/set
2727
To build the Speech-Recognition example, run the following command:
2828

2929
```bash
30-
./tools/scripts/build.sh speech-recognition --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference ETHOS --audio <ROM/VSI> --toolchain <ARMCLANG/GNU>
30+
./tools/scripts/build.sh speech-recognition --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference ETHOS --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS>
3131
```
3232
* The `certificate pem's path` and `private key pem's path` should be the downloaded key's and certificate's path if you chose the **Auto-generate a new certificate** during the Thing creation. If you chose **Skip creating a certificate at this time** then these paths should locate the generated credential files that were created by the `./tools/scripts/generate_credentials.py` script in the previous step.
3333

3434
* The `audio` is used to select the input audio source whether it's preloaded into `ROM` or using Arm's Virtual Streaming Interface `VSI`.
3535

36+
* The `conn-stack` is used to select the connectivity stack to be used whether it's `FREERTOS_PLUS_TCP` or `IOT_VSOCKET`.
37+
38+
* The `psa-crypto-implementation` is used to select the library providing the PSA Crypto APIs implementation whether it's `TF-M` or `MBEDTLS`. For more information about the PSA Crypto APIs
39+
implementation, please refer to [Mbed TLS document](../components/security/mbedtls/mbedtls.md#psa-crypto-apis-implementation).
40+
3641
Or, run the command below to perform a clean build:
3742

3843
```bash
39-
./tools/scripts/build.sh speech-recognition --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference ETHOS --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> -c
44+
./tools/scripts/build.sh speech-recognition --certificate_path <certificate pem's path> --private_key_path <private key pem's path> --target <corstone300/corstone310/corstone315> --inference ETHOS --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS> -c
4045
```
4146

4247
## Provisioning the device credentials into Protected Storage

docs/components/aws_iot/aws_tool.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ You may now use MQTT to send and receive message for that device. See section [O
9696

9797
You may now rebuild keyword with those certificates:
9898
```sh
99-
./tools/scripts/build.sh keyword-detection --certificate_path certificates/thing_certificate_<your_thing_name>.pem.crt --private_key_path certificates/thing_private_key_<your_thing_name>.pem.key --target <corstone300/corstone310/corstone315> --inference <ETHOS/SOFTWARE> --audio <ROM/VSI> --toolchain <ARMCLANG/GNU>
99+
./tools/scripts/build.sh keyword-detection --certificate_path certificates/thing_certificate_<your_thing_name>.pem.crt --private_key_path certificates/thing_private_key_<your_thing_name>.pem.key --target <corstone300/corstone310/corstone315> --inference <ETHOS/SOFTWARE> --audio <ROM/VSI> --toolchain <ARMCLANG/GNU> --conn-stack <FREERTOS_PLUS_TCP/IOT_VSOCKET> --psa-crypto-implementation <TF-M/MBEDTLS>
100100
```
101101
Next, we'll create the bucket, upload the binary there, create a role capable of running an OTA update, and create the update. All of those with the following command:
102102
```sh

docs/components/security/mbedtls/mbedtls.md

+18
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,24 @@ target_compile_definitions(mbedtls-config
3838

3939
To enable the FreeRTOS threading protection `#define MBEDTLS_THREADING_ALT` should be present in the user provided mbedtls configuration file.
4040

41+
### PSA Crypto APIs Implementation
42+
43+
PSA Crypto is part of Platform Security Architecture initiative that standardized crypto interfaces. The PSA Crypto specification is available [here](https://arm-software.github.io/psa-api/crypto/1.1/). Mbed TLS, and Trusted Firmware-M libraries provide implementation for PSA Crypto APIs.
44+
45+
User can choose which library is to be used for implementing PSA Crypto APIs used by Mbed TLS library running on the Non-Secure side through the build option `--psa-crypto-implementation <TF-M/MBEDTLS>`.
46+
47+
The default PSA Crypto APIs implementation is the one provided by Trusted Firmware-M library, where the `--psa-crypto-implementation` build option default value is `TF-M`.
48+
49+
In case of using Trusted Firmware-M as the PSA Crypto APIs implementation, `tfm-ns-interface` library has to be linked to the `mbedtls` target.
50+
51+
```cmake
52+
target_link_libraries(mbedtls
53+
PUBLIC
54+
mbedtls-config
55+
tfm-ns-interface
56+
)
57+
```
58+
4159
## Integration
4260

4361
### FreeRTOS threading support

docs/development_environment/vscode_dev_env_build_and_debug.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,8 @@ Command Palette (F1)
129129
./tools/scripts/build.sh <reference application name> --toolchain <GNU/ARMCLANG>
130130
--certificate_path <certificate pem's path>
131131
--private_key_path <private key pem's path> --target <target name>
132-
--inference <inference engine> --audio <audio input>
132+
--inference <inference engine> --audio <audio input> --conn-stack <connectivity stack>
133+
--psa-crypto-implementation <library providing PSA Crypto APIs implementation>
133134
```
134135

135136
## Running a reference application

0 commit comments

Comments
 (0)