-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TRUST M MTR SHIELD cannot read data. #77
Comments
Hi @NNAA0917 It seems you are using TRUST M MTR SHIELD. Please note that the script write_default_shared_secret.sh is specifically designed for OPTIGA™ Trust M V3 variant. For the MTR variant, the Lcso has been set to operational mode and the change conditions are restricted to Conf-0xE140&&Auto-0xF1D0. This means modifications can only be made if you have both the PBS and Auth.Ref which can be claimed here. To check the metadata for PBS (0xE140) on your device, you can run the following command: ./bin/trustm_metadata -r 0xe140 -X .Thanks. |
Hi @ying-css . /write_default_shared_secret.sh Generate default shared secret Bypass Shielded Communication. 1274:Error [0x0102] : OPTIGA comms API failed 1274:Error [0x0102] : OPTIGA comms API failed As shown above, an error seems to have occurred in the Opening section. Also, my final goal is as follows
Currently, 1 has been executed and already downloaded the 7z file. Please check the above. |
Hi @NNAA0917 It seems you have encountered some issues when communicating with OPTIGA™ Trust M. Could you please confirm whether the I2C interface is enabled on your Raspberry Pi? The following command: ./bin/trustm_metadata -r 0xe140 -X should work if the communication between Raspberry Pi and OPTIGA™ Trust M MTR is properly established. The -X argument ensures that shielded communication is bypassed. Enabling shielded communication is not mandatory for Matter applications. For Step 3: performing commissioning using the credentials(DAC,PAI,CD, Private Key) stored inside Trust M, which platform do you prefer to use? Currently, we have a Door Lock example available here which is using Infineon PSoC6 platform. You can perform commissioning using either a Raspberry Pi or a smartphone as the commissioner: Let me know if this helps or if you have any further questions! |
Hi @ying-css Bypass Shielded Communication. ./matter_provisioning_master.sh is being used to write the DAC and PAI. For security reasons, the private key could not be read out from the OPTIGA™ Trust M MTR.
Also, the platform is stm32. Thank you for your confirmation. |
Hi @NNAA0917, Yes, It seems OPTIGA™ Trust M MTR can communicate properly with RaspberryPi now. |
Hi @ying-css |
Hi @NNAA0917 In this case, you can use the DAC and PAI you claimed from Kudelski's keySTREAM along with the test CD from CSA which I just shared with you for evaluation purpose. Thanks. |
Hi @ying-css If I want to do commissioning, is it enough to read the CD, DAC and PAI that I wrote to from the OPTIGA and use them? |
Hi @ying-css |
Hi @NNAA0917 The data objects in OPTIGA TRUST M MTR used for commissioning include the following: |
Hi @NNAA0917 To port OPTIGA TRUST M MTR to stm32 platform, you need to implement the PAL (Platform Abstraction Layer) for stm32 platform. You can refer to the existing PAL layer for the Trust X implementation here.The PAL layer for Trust X is almost same as what is required for Trust M. Additionally, you must update some configuration files, such as BUILD.gn, args.gni and targets.py to align with your Matter application requirements. Please refer to this commit as your reference. BTW, Could you kindly let us know which development board(stm32) you are using for this integration? What is the target matter application? We can order the boards and help to integrate at our side. Thanks. |
Hi @ying-css |
Hi @ying-css Also, https://github.com/project-chip/connectedhomeip/blob/master/src/platform/Infineon/crypto/trustm/CHIPCryptoPALHsm_P256_trustm. cpp Please check the above. |
Hi @NNAA0917 Thank you for your response. It's great to hear that the PAL has been successfully integrated into stm32 platform and that you can read out the data inside OPTIGA TRUST M MTR. However, we noticed that the log you shared seems incomplete. Could you kindly provide the complete log for the commissioning process? |
Hi @ying-css |
Hi @ying-css On a different topic, I have a question about writing DAC and PAI during actual mass production. |
Hi @NNAA0917 Yes, the OEM's manufacturing facility refers to your manufacturer's factory. Writing the unique DAC and PAI into the OPTIGA TRUST M MTR during the mass production is straightforward. You can claim the bundle file from Kudelski's keySTREAM platform, then use a shell script to automate the process. This script can read the file content, read UID(unique for every OPTIGA TRUST M MTR) from TRUST M MTR, match it and write the DAC and PAI in accordingly. For more information, Please refer to this. Thanks a lot. |
Thank you for checking. If it is only possible to write one at a time, it is my understanding that it is quite difficult because the connection between the OPTIGA and the writing jig has to be made each time. |
Hi @NNAA0917 Late-stage provisioning allows the PID to be modified right up until production begins, enabling OEMs to create multiple variants of their end products. This approach empowers customers to customize their products with different PAIs and DACs. |
Have you looked for an answer?
I am referring to the README for linux-optiga-trust-m.
Question/Issue:
I am using OPTIGA TRUST M MTR.
I connected https://github.com/Infineon/linux-optiga-trust-mを参考にRaspberry pi4B and TRUST M MTR SHIELD.
In addition, I have implemented the following on Raspberry pi4B.
git clone --recurse-submodules https://github.com/Infineon/linux-optiga-trust-m.git
cd linux-optiga-trust-m
./provider_installation_script.sh
To pair the host with OPTIGA™ Trust M, I executed the following to write the default shared secret to OPTIGA™ Trust M.
cd linux-optiga-trust-m/scripts/misc/
./write_default_shared_secret
When I execute the above, the following error is output and I cannot connect normally.
Generate default shared secret
Bypass Shielded Communication.
Shared Platform Binding Secret. [0xe140]
1922:Error [0x8007] : OPTIGA device Access Condition Not Satisfied
Please tell me the cause.
Context
Raspberry pi4B
TRUST M MTR SHIELD
The text was updated successfully, but these errors were encountered: