Last edited 3 years ago

STM32MP13 HASH internal peripheral


1. Article purpose[edit source]

The purpose of this article is to:

  • briefly introduce the HASH peripheral and its main features
  • indicate the level of security supported by this hardware block
  • explain how each instance can be allocated to the three runtime contexts and linked to the corresponding software components
  • explain, when necessary, how to configure the HASH peripheral.

2. Peripheral overview[edit source]

The HASH peripheral is used to compute a message digest.
Digest algorithms could be:

  • SHA[1] (1, 224, 256, 384, 512)
  • Keccak-based functions[2]
    • SHA3 (224, 256, 384, 512)
    • Shake
    • RawShake

The HASH peripheral is also able to give the HMAC[3] used for authentication using the same algorithm support.

2.1. Features[edit source]

Refer to the STM32MP13 reference manuals for the complete list of features, and to the software components, introduced below, to see which features are implemented.

2.2. Security support[edit source]

HASH is a secure peripheral (under ETZPC control)

3. Peripheral usage and associated software[edit source]

3.1. Boot time[edit source]

HASH instance is used as boot device to support binary authentication.

3.2. Runtime[edit source]

3.2.1. Overview[edit source]

HASH instance can be allocated to:

or


Chapter Peripheral assignment describes which peripheral instance can be assigned to which context.

3.2.2. Software frameworks[edit source]

Domain Peripheral Software components Comment
OP-TEE Linux
Security HASH OP-TEE HASH driver Linux Crypto framework

3.2.3. Peripheral configuration[edit source]

The configuration is applied by the firmware running in the context to which the peripheral is assigned. The configuration can be done alone via the STM32CubeMX tool for all internal peripherals, and then manually completed (particularly for external peripherals), according to the information given in the corresponding software framework article.

3.2.4. Peripheral assignment[edit source]

Click on the right to expand the legend...

Domain Peripheral Runtime allocation Comment
Instance Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Security HASH HASH Assignment (single choice)

4. References[edit source]