Skip to content

Latest commit

 

History

History
34 lines (25 loc) · 1.98 KB

File metadata and controls

34 lines (25 loc) · 1.98 KB

Fetching device certificate

Please refer to readme_deviceCertificate.md for steps to fetch just the device certificate.

Generating Device Manifest File over UART for PIC32MZW1

The WFI32E01 module on the curiosity board has an on-board TNG module. The primary security elements of the TNG can be extracted via UART by flashing the firmware present in this project. This includes the device certificate, public keys in different slots etc that are required to generate the device's manifest file by scripts in this folder.

Follow these steps to generate the manifest file of a curiosity board running the FW available in this repository:

  1. Clone this repo to your PC.

  2. Make sure that you have python 3 installed in your PC

  3. Install python dependencies from the requirements.txt file in this scripts folder.

    python -m pip install -r requirements.txt
  4. Power up the Curiosity board.

    • Make sure that a USB cable is connected to the PC from J204 (USB Power).
  5. Flash the firmware present in this repo.

    Note: you can either compile the firmware from the sources or download the hex file from the releases tab

  6. Connect UART1 to the PC using a USB to UART converter. Make sure that you dont open a terminal but make a note of the COM port.

  7. Execute the following commands from the cloned repo.

    cd scripts\ManifestProcessing
    python createManifest_uart.py -c COM3

    Note: Make sure that the correct COM port is passed to the script.

  8. A manifest file with the device serial number prefix will be generated in the scripts folder.

  9. Store the json file as well as the manifest_signer certificate.

    • manifest_signer certificate is a self signed certificate used to sign the manifest. This is essential to validate the authenticity of the manifest file during device registration.