nRF Connect SDK Intermediate

Changing the version will not affect your certificate
Lesson 1 – Zephyr RTOS: Beyond the basics
7 Topics | 1 Quiz
Boot-up sequence & execution context
Thread life cycle
Scheduler in-depth
Data passing
Exercise 1 – Exploring threads and ISRs
Exercise 2 – Kernel options
Summary
Lesson 1 quiz
Lesson 2 – Debugging and troubleshooting
8 Topics | 1 Quiz
Debugging in nRF Connect for VS Code
Build errors and fatal errors
Troubleshooting the devicetree
Physical debugging
Exercise 1 – Advanced debugging in nRF Connect for VS Code
Exercise 2 – Debugging with core dump and addr2line
Exercise 3 – Debugging the devicetree
Exercise 4 – Remote debugging with Memfault
Lesson 2 quiz
Lesson 3 – Adding custom board support
5 Topics | 1 Quiz
Board definition
Creating board files
Board files for multi-core hardware & TF-M
Exercise 1 – Custom board for single-core SoC
Exercise 2 – Custom board for a multi-core & TF-M capable SoC/SiP
Lesson 3 quiz
Lesson 4 – Pulse Width Modulation (PWM)
4 Topics | 1 Quiz
Pulse Width Modulation (PWM)
Zephyr PWM API
Exercise 1 – Controlling an LED with PWM
Exercise 2 – Using PWM to control a servo motor
Lesson 4 quiz
Lesson 5 – Serial Peripheral Interface (SPI)
3 Topics | 1 Quiz
Serial Peripheral Interface (SPI)
Zephyr SPI API
Exercise 1 – Interfacing with a sensor over SPI
Lesson 5 quiz
Lesson 6 – Analog-to-digital converter (ADC)
5 Topics | 1 Quiz
ADC peripheral on Nordic devices
Choosing between Zephyr ADC API and nrfx SAADC driver API
Exercise 1 – Interfacing with ADC using Zephyr API
Exercise 2 – Interfacing with ADC using nrfx driver and software timers
Exercise 3 – Interfacing with ADC using nrfx drivers and TIMER/PPI
Lesson 6 quiz
Lesson 7 – Device driver development
6 Topics | 1 Quiz
Device driver model
Device driver implementation
Device power management
Exercise 1 – Creating a custom driver using the sensor API
Exercise 2 – Adding power management to a custom driver
Exercise 3 – Creating a custom driver with a custom API
Lesson 7 quiz
Lesson 8 – Sysbuild
5 Topics | 1 Quiz
Sysbuild explained
Sysbuild configuration
Sysbuild – Partition Manager
Exercise 1 – Configuring extra image
Exercise 2 – Adding custom image
Lesson 8 quiz
Lesson 9 – Bootloaders and DFU/FOTA
12 Topics | 1 Quiz
Bootloader basics
Application verification
Device Firmware Update (DFU) essentials
MCUboot, and relevant libraries
DFU for the nRF5340 SoC
Exercise 1 – DFU over UART
Exercise 2 – DFU with custom keys
Exercise 3 – DFU with external flash
Exercise 4 – DFU over USB
Exercise 5 – FOTA over Bluetooth LE
Exercise 6 – FOTA over LTE-M/NB-IoT
Exercise 7 – FOTA over Wi-Fi
Lesson 9 quiz
Get your Certificate!
Feedback
Feedback

If you are having issues with the exercises, please create a ticket on DevZone: devzone.nordicsemi.com
Drag & Drop Files, Choose Files to Upload You can upload up to 2 files.
Loading
RegisterLog in

Exercise 2 – DFU with custom keys

In this exercise, we will learn how to sign DFU images using custom keys. Only individuals with a valid key can perform a DFU on a device.

As covered in the Application verification topic. Signing a Device Firmware Update (DFU) image ensures its authenticity and integrity. A cryptographic signature is generated using a private key and attached to the DFU image. The device uses the corresponding public key to verify the signature, confirming the image is from a trusted source and has not been tampered with. The public key is automatically generated from the private key and stored in the MCUboot image.

The more observant readers might have noticed the following warning from the build logs so far:

      ---------------------------------------------------------
      --- WARNING: Using default MCUBoot key, it should not ---
      --- be used for production.                           ---
      ---------------------------------------------------------
Terminal

When building for MCUboot, a default signing key is used to ease development. For production, it is extremely important to use your own key instead!

MCUboot has a set of default keys, which can be found here. If we do not configure the application to use a custom key, anyone will be able to upload DFU to our device!

Using the Key Management Unit (KMU) on the nRF54L Series to store the public key

The nRF54L Series SoCs (nRF54LM20, nRF54L15, nRF54L10, nRF54L05) are equipped with a Hardware Key Management Unit (KMU) that provides:

  • Safe storage for cryptographic keys
  • Direct key transfer to CRACEN RAM
  • Protection against unauthorized access

On the nRF54L Series, two options are available for storing the public key used to verify the signature on an image in the SoC.

  1. Store it in the MCUboot bootloader image itself. In this approach, the build system embeds the public key within the MCUboot bootloader image automatically
  2. Store it in the KMU (Recommended). Requires manual provisioning of the public key.

In this exercise, we will cover both approaches.

The tab “All other DKs” describes method 1, which, by the way, can also be done on the nRF54L Series SoCs

The tab “nRF54L Series DK” describes the KMU approach and is the recommended approach for the nRF54L Series devices.

Exercise steps

1. Creating the key.

You can create the key however you want; It is nothing but a normal key in .pem format. We will use the imgtool.py bundled with the nRF Connect SDK as an example.

1.1 To set our own key, we first need to generate a key. We will use imgtool for this:

  • All other DKs
  • nRF54L Series DK
Copy
python3 <NCS_PATH>/bootloader/mcuboot/scripts/imgtool.py keygen -t ecdsa-p256 -k private_key.pem
Terminal command

Use this command if you want to store the public key using the KMU on the nRF54L Series.

Note: only ED25519 keys are supported.

Copy
python3 <NCS_PATH>/bootloader/mcuboot/scripts/imgtool.py keygen -t ed25519 -k private_key.pem 
Terminal command

1.2 Back up the key to somewhere safe. It is not uncommon to lose the key and thus be unable to ever do DFU on the devices again.

2. Configure the project to use this key.

Next up, we will configure the project to use this key. The key is used both by MCUboot to generate a custom key, and by Sysbuild to automatically create and sign DFU files. Therefore, this is set in Sysbuild Kconfig.

2.1 To configure our project to use this key, we will follow docs at Bootloader & DFU -> Signature keys. We set the path to the key in sysbuild.conf. We can use the full path of the key if it is stored elsewhere on the PC, but for this example, the key is stored in the project folder, and we will use ${APP_DIR}:

Copy
# STEP 2.1 - Add private key for MCUboot
SB_CONFIG_BOOT_SIGNATURE_KEY_FILE="\${APP_DIR}/private_key.pem"
Kconfig

2.2 Next, we should configure the key type to match the key we generated in step 1.1.

  • All other DKs
  • nRF54L Series DK

Copy
# STEP 2.2. - Configure key type
SB_CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256=y
Kconfig

On the nRF54L Series DK, we need to enable the following two parameters:

SB_CONFIG_MCUBOOT_SIGNATURE_USING_KMU – This option enables using Key Management Unit (KMU) to store keys for signature verification instead of compiling key data into the MCUboot bootloader image. Using KMU requires manually provisioning the public key, which is done in the next step.

The SB_CONFIG_BOOT_SIGNATURE_TYPE_ED25519 is to select the type of key.

Copy
# STEP 2.2. - Configure key type
SB_CONFIG_MCUBOOT_SIGNATURE_USING_KMU=y
SB_CONFIG_BOOT_SIGNATURE_TYPE_ED25519=y
Kconfig

2.3 (nRF54L Series DK only) Provision the public key to the device.

This step is only applicable to the nRF54L Series DK. Skip this step if you are using other DKs.

  • All other DKs
  • nRF54L Series DK

No action is needed here. The public key will be stored in the MCUboot bootloader image automatically by the build system

If you are using the KMU to store the public key (Only applicable for the nRF54L Series). You need to upload the public key to the device; the build system can handle this automatically during the build and flashing process. To configure the build and flash system to generate the needed metadata and provision the KMU with the public key, add the following Kconfig Symbol in Sysbuild.conf

Copy
SB_CONFIG_MCUBOOT_GENERATE_DEFAULT_KMU_KEYFILE=y
Kconfig

Make sure when you flash the device, your flash with –erase option

Or alternatively , it can be done manually. The nRF Connect SDK provides two ways to do it:

  • west command ncs-provision
  • nRF Util command nrfutil device x-provision-keys

Which are more suitable to be integrated with the production flashing pipeline of your device .

For more information about provisioning on the nRF54L Series, you can read Performing KMU provisioning on our technical documentation.

3. Build the project again.

  • Build (pristine build) the project and flash (with erase).

During this step, you can observe that the warning about the missing key is gone and build logs lists that we are using our key.

MCUBoot bootloader key file: <PATH>/ncs-inter/v2.9.0-v2.7.0/l9/l9_e2/private_key.pem
Terminal

  • Change led blinking period and build (do not flash)
  • Use AuTerm to upload a new DFU image
  • Reset the board

Recall

These steps were described in details in Exercise 1 – DFU over UART, steps 5.3 and 5.4.

4. Check that it fails with the wrong key.

Lastly, checking that it fails with the wrong key is a good idea.

4.1 Generate a new custom key. Save this key as a different file to avoid losing the correct one.

  • All other DKs
  • nRF54L Series DK
Copy
python3 <NCS_PATH>/bootloader/mcuboot/scripts/imgtool.py keygen -t ecdsa-p256 -k do_not_use_this_key.pem
Terminal command
Copy
python3 <NCS_PATH>/bootloader/mcuboot/scripts/imgtool.py keygen -t ed25519 -k do_not_use_this_key.pem
Terminal command

Next, update sysbuild configuration to use the newly generated key.

Copy
SB_CONFIG_BOOT_SIGNATURE_KEY_FILE="\${APP_DIR}/do_not_use_this_key.pem"
Kconfig

4.2 Now, try to do DFU over UART as we learned in Exercise 1 (sections: 5.3 – 5.4) with the new zephyr.signed.bin. Since this one uses a different key than the one we flashed in step 3 , DFU should fail with the error (remember to close AuTerm before connecting serial terminal in VSCode and resetting the board):

  • All other DKs
  • nRF54L Series DK

5. Update the board again by changing the key.

It is possible to update the board again by changing the key to the proper one and doing a pristine build (this will cause signing the firmware again with the correct key).

Copy
SB_CONFIG_BOOT_SIGNATURE_KEY_FILE="\${APP_DIR}/private_key.pem"
Kconfig

Make sure to Log in or Register to save your progress

Back
Next

Nordic Developer Academy Privacy Policy

 

1. Introduction 

In this Privacy Policy you will find information on Nordic Semiconductor ASA (“Nordic Semiconductor”) processes your personal data when you use the Nordic Developer Academy.

References to “we” and “us” in this document refers to Nordic Semiconductor.

 

2. Our processing of personal data when you use the Nordic Developer Academy 

2.1 Nordic Developer Academy 

Nordic Semiconductor processes personal data in order to provide you with the features and functionality of the Nordic Developer Academy. Creating a user account is optional, but required if you want to track you progress and view your completed courses and obtained certificates. If you choose to create a user account, we will process the following categories of personal data:

  • Email
  • Name
  • Password (encrypted)
  • Course progression (e.g. which course you have completely or partly completed)
  • Certificate information, which consists of name of completed course and the validity of the certificate
  • Course results

During your use of the Nordic Developer Academy, you may also be asked if you want to provide feedback. If you choose to respond to any such surveys, we will also process the personal data in your responses in that survey.

The legal basis for this processing is GDPR article 6 (1) b. The processing is necessary for Nordic Semiconductor to provide the Nordic Developer Academy under the Terms of Service.

 

2.2 Analytics 

If you consent to analytics, Nordic Semiconductor will use Google Analytics to obtain statistics about how the Nordic Developer Academy is used. This includes collecting information on for example what pages are viewed, the duration of the visit, the way in which the pages are maneuvered, what links are clicked, technical information about your equipment. The information is used to learn how Nordic Developer Academy is used and how the user experience can be further developed.

 

2.2 Newsletter 

You can consent to receive newsletters from Nordic from within the Nordic Developer Academy. How your personal data is processed when you sign up for our newsletters is described in the Nordic Semiconductor Privacy Policy.

 

3. Retention period 

We will store your personal data for as long you use the Nordic Developer Academy. If our systems register that you have not used your account for 36 months, your account will be deleted.

 

4. Additional information 

Additional information on how we process personal data can be found in the Nordic Semiconductor Privacy Policy and Cookie Policy.

‍‍ 

Nordic Developer Academy Terms of Service

 

1. Introduction

‍These terms and conditions (“Terms of Use”) apply to the use of the Nordic Developer Academy, provided by Nordic Semiconductor ASA, org. nr. 966 011 726, a public limited liability company registered in Norway (“Nordic Semiconductor”). ‍

Nordic Developer Academy allows the user to take technical courses related to Nordic Semiconductor products, software and services, and obtain a certificate certifying completion of these courses. By completing the registration process for the Nordic Developer Academy, you are agreeing to be bound by these Terms of Use.

These Terms of Use are applicable as long as you have a user account giving you access to Nordic Developer Academy.‍

‍2. Access to and use of Nordic Developer Academy

‍‍Upon acceptance of these Terms of Use you are granted a non-exclusive right of access to, and use of Nordic Developer Academy, as it is provided to you at any time. Nordic Semiconductor provides Nordic Developer Academy to you free of charge, subject to the provisions of these Terms of Use and the Nordic Developer Academy Privacy Policy.

To access select features of Nordic Developer Academy, you need to create a user account. You are solely responsible for the security associated with your user account, including always keeping your login details safe.

You will able to receive an electronic certificate from Nordic Developer Academy upon completion of courses. By issuing you such a certificate, Nordic Semiconductor certifies that you have completed the applicable course, but does not provide any further warrants or endorsements for any particular skills or professional qualifications.

Nordic Semiconductor will continuously develop Nordic Developer Academy with new features and functionality, but reserves the right to remove or alter any existing functions without notice.

‍3. Acceptable use

You undertake that you will use Nordic Developer Academy in accordance with applicable law and regulations, and in accordance with these Terms of Use.‍ You must not modify, adapt, or hack Nordic Developer Academy or modify another website so as to falsely imply that it is associated with Nordic Developer Academy, Nordic Semiconductor, or any other Nordic Semiconductor product, software or service.

You agree not to reproduce, duplicate, copy, sell, resell or in any other way exploit any portion of Nordic Developer Academy, use of Nordic Developer Academy, or access to Nordic Developer Academy without the express written permission by Nordic Semiconductor. You must not upload, post, host, or transmit unsolicited email, SMS, or \”spam\” messages.

You are responsible for ensuring that the information you post and the content you share does not;

  • contain false, misleading or otherwise erroneous information
  • infringe someone else’s copyrights or other intellectual property rights
  • contain sensitive personal data or
  • contain information that might be received as offensive or insulting.
  • Such information may be removed without prior notice.

‍Nordic Semiconductor reserves the right to at any time determine whether a use of Nordic Developer Academy is in violation of its requirements for acceptable use.

Violation of the at any time applicable requirements for acceptable use may result in termination of your account. We will take reasonable steps to notify you and state the reason for termination in such cases.

‍4. Routines for planned maintenance

‍Certain types of maintenance may imply a stop or reduction in availability of Nordic Developer Academy. Nordic Semiconductor does not warrant any level of service availability but will provide its best effort to limit the impact of any planned maintenance on the availability of Nordic Developer Academy.

5. Intellectual property rights

‍Nordic Semiconductor retains all rights to all elements of Nordic Developer Academy. This includes, but is not limited to, the concept, design, trademarks, know-how, trade secrets, copyrights and all other intellectual property rights.

Nordic Semiconductor receives all rights to all content uploaded or created in Nordic Developer Academy. You do not receive any license or usage rights to Nordic Developer Academy beyond what is explicitly stated in this Agreement.

‍6. Liability and damages

‍Nothing within these Terms of Use is intended to limit your statutory data privacy rights as a data subject, as described in the Nordic Developer Academy Privacy Policy. ‍You acknowledge that errors might occur from time to time and waive any right to claim for compensation as a result of errors in Nordic Developer Academy. When an error occurs, you shall notify Nordic Semiconductor of the error and provide a description of the error situation.

You agree to indemnify Nordic Semiconductor for any loss, including indirect loss, arising out of or in connection with your use of Nordic Developer Academy or violations of these Terms of Use. ‍Nordic Semiconductor shall not be held liable for, and does not warrant that (i) Nordic Developer Academy will meet your specific requirements, (ii) Nordic Developer Academy will be uninterrupted, timely, secure, or error-free, (iii) the results that may be obtained from the use of Nordic Developer Academy will be accurate or reliable, (iv) the quality of any products, services, information, or other material purchased or obtained by you through Nordic Developer Academy will meet your expectations, or that (v) any errors in Nordic Developer Academy will be corrected.

You accept that this is a service provided to you without any payment and hence you accept that Nordic Semiconductor will not be held responsible, or liable, for any breaches of these Terms of Use or any loss connected to your use of Nordic Developer Academy. Unless otherwise follows from mandatory law, Nordic Semiconductor will not accept any such responsibility or liability.

‍7. Change of terms

‍Nordic Semiconductor may update and change the Terms of Use from time to time. Nordic Semiconductor will seek to notify you about significant changes before such changes come into force and give you a possibility to evaluate the effects of proposed changes. Continued use of Nordic Developer Academy after any such changes shall constitute your acceptance of such changes. You can review the current version of the Terms of Use at any time at https://academy.nordicsemi.com/terms-of-service/

‍8. Transfer of rights

‍Nordic Semiconductor is entitled to transfer its rights and obligation pursuant to these Terms of Use to a third party as part of a merger or acquisition process, or as a result of other organizational changes.

‍9. Third Party Services

‍‍To the extent Nordic Developer Academy facilitates access to services provided by a third party, you agree to comply with the terms governing such third party services. Nordic Semiconductor shall not be held liable for any errors, omissions, inaccuracies, etc. related to such third party services.

‍10. Dispute resolution

‍‍The Terms of Use and any other legally binding agreement between yourself and Nordic Semiconductor shall be subject to Norwegian law and Norwegian courts’ exclusive jurisdiction.

 

Switch language?

Progress is tracked separately for each language. Switching will continue from your progress in that language or start fresh if you haven't begun.

Your current progress is saved, and you can switch back anytime.

Log in
Don’t have an account? Register an account

Forgot your password?
Register an account
Already have an account? Log in
(All fields are required unless specified optional)

  • 8 or more characters
  • Upper and lower case letters
  • At least one number or special character

Forgot your password?
Enter the email associated with your account, and we will send you a link to reset your password.

Back to Log in

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.

      Change summary

      What's new in the latest version

      General updates

      General updates

      •Support for nRF54LS05 DK (Available through the early access sampling program)
      •Support for the nRF54LM20B with Axon NPU for Edge AI applications
      Bluetooth LE updates

      Bluetooth LE updates

      •Quality of Service module is now production-ready.
      •New experimental features for RF testing (Direct Test Mode) and low-latency packet handling (LE Flushable ACL).
      MCUboot & Partition Manager

      MCUboot & Partition Manager

      •Single-Slot DFU and RAM Load mode are both promoted to fully supported
      •Partition Manager is officially deprecated in favor of Zephyr's devicetree-based partitioning.