Registered User m (Cleanup) |
Registered User mNo edit summary |
||
(10 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
<noinclude>{{ApplicableFor | |||
|MPUs list=STM32MP13x, STM32MP15x | |||
|MPUs checklist=STM32MP13x,STM32MP15x | |||
}}</noinclude> | |||
==Article purpose== | ==Article purpose== | ||
The purpose of this article is to | The purpose of this article is to | ||
* briefly introduce the CRC peripheral and its main features | * briefly introduce the CRC peripheral and its main features | ||
* indicate the level of security supported by this hardware block | * indicate the level of security supported by this hardware block | ||
* explain how each instance can be allocated to the | * explain how each instance can be allocated to the runtime contexts and linked to the corresponding software components | ||
* explain how to configure the CRC peripheral. | * explain how to configure the CRC peripheral. | ||
==Peripheral overview== | ==Peripheral overview== | ||
The '''CRC''' peripheral is used to verify data transmission or storage integrity.<br /> | The '''CRC''' peripheral is used to verify data transmission or storage integrity.<br /> | ||
===Features=== | ===Features=== | ||
Refer to the [[STM32MP15 resources#Reference manuals|STM32MP15 reference manuals]] for the complete list of features, and to the software components, introduced below, to see which features are implemented. | Refer to the [[STM32MP13 resources#Reference manuals|STM32MP13 reference manuals]] or [[STM32MP15 resources#Reference manuals|STM32MP15 reference manuals]] for the complete list of features, and to the software components, introduced below, to see which features are implemented. | ||
===Security support=== | ===Security support=== | ||
CRC1 and CRC2 are '''non secure''' peripherals. | ==== On {{MicroprocessorDevice | device=13}} ==== | ||
CRC is a '''non-secure''' peripheral. | |||
==== On {{MicroprocessorDevice | device=15}} ==== | |||
CRC1 and CRC2 are '''non-secure''' peripherals. | |||
==Peripheral usage and associated software== | ==Peripheral usage and associated software== | ||
Line 22: | Line 30: | ||
CRC instances can be allocated to: | CRC instances can be allocated to: | ||
* the Arm<sup>®</sup> Cortex<sup>®</sup>-A7 non-secure for using in Linux<sup>®</sup> with [[Crypto_API_overview|Linux Crypto framework]] | * the Arm<sup>®</sup> Cortex<sup>®</sup>-A7 non-secure for using in Linux<sup>®</sup> with [[Crypto_API_overview|Linux Crypto framework]] | ||
or | or, on {{MicroprocessorDevice | device=15}} only | ||
* the Arm<sup>®</sup> Cortex<sup>®</sup>-M4 for using in STM32Cube with [[STM32CubeMP1 architecture|STM32Cube CRC driver]] | * the Arm<sup>®</sup> Cortex<sup>®</sup>-M4 for using in STM32Cube with [[STM32CubeMP1 architecture|STM32Cube CRC driver]] | ||
Line 28: | Line 36: | ||
====Software frameworks==== | ====Software frameworks==== | ||
{{: | ===== On {{MicroprocessorDevice | device=13}} ===== | ||
{{:STM32MP13 internal peripherals software table template}} | |||
| Security | |||
| [[CRC internal peripheral|CRC]] | |||
| | |||
| [[Crypto_API_overview|Linux Crypto framework]] | |||
| | |||
|- | |- | ||
|} | |||
===== On {{MicroprocessorDevice | device=15}} ===== | |||
{{:STM32MP15_internal_peripherals_software_table_template}} | |||
| Security | |||
| [[CRC internal peripheral|CRC]] | |||
| | | | ||
| [[Crypto_API_overview|Linux Crypto framework]] | | [[Crypto_API_overview|Linux Crypto framework]] | ||
| [[STM32CubeMP1 architecture|STM32Cube CRC driver]] | | [[STM32CubeMP1 architecture|STM32Cube CRC driver]] | ||
| | |||
|- | |- | ||
|} | |} | ||
Line 42: | Line 60: | ||
====Peripheral assignment==== | ====Peripheral assignment==== | ||
{{: | ===== On {{MicroprocessorDevice | device=13}} ===== | ||
< | {{:STM32MP13_internal_peripherals_assignment_table_template}} | ||
<section begin=stm32mp13 /> | |||
| rowspan="1" | Security | |||
| rowspan="1" | [[CRC internal peripheral|CRC]] | |||
| CRC | |||
| | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| | |||
|- | |||
<section end=stm32mp13 /> | |||
|} | |||
===== On {{MicroprocessorDevice | device=15}} ===== | |||
{{:STM32MP15_internal_peripherals_assignment_table_template}} | |||
<section begin=stm32mp15 /> | |||
| rowspan="2" | Security | | rowspan="2" | Security | ||
| rowspan="2" | [[CRC internal peripheral|CRC]] | | rowspan="2" | [[CRC internal peripheral|CRC]] | ||
Line 58: | Line 89: | ||
| | | | ||
|- | |- | ||
</ | <section end=stm32mp15 /> | ||
|} | |} | ||
==References== | ==References== | ||
Line 68: | Line 96: | ||
<noinclude> | <noinclude> | ||
{{ArticleBasedOnModel| | {{ArticleBasedOnModel| Internal peripheral article model}} | ||
{{PublicationRequestId | 8786 | 2018-09-19 | AlainF}} | {{PublicationRequestId | 8786 | 2018-09-19 | AlainF}} | ||
[[Category:Security peripherals]] | [[Category:Security peripherals]] | ||
</noinclude> | </noinclude> |
Revision as of 13:26, 1 February 2022
1. Article purpose[edit | edit source]
The purpose of this article is to
- briefly introduce the CRC peripheral and its main features
- indicate the level of security supported by this hardware block
- explain how each instance can be allocated to the runtime contexts and linked to the corresponding software components
- explain how to configure the CRC peripheral.
2. Peripheral overview[edit | edit source]
The CRC peripheral is used to verify data transmission or storage integrity.
2.1. Features[edit | edit source]
Refer to the STM32MP13 reference manuals or STM32MP15 reference manuals for the complete list of features, and to the software components, introduced below, to see which features are implemented.
2.2. Security support[edit | edit source]
2.2.1. On STM32MP13x lines
[edit | edit source]
CRC is a non-secure peripheral.
2.2.2. On STM32MP15x lines
[edit | edit source]
CRC1 and CRC2 are non-secure peripherals.
3. Peripheral usage and associated software[edit | edit source]
3.1. Boot time[edit | edit source]
CRC instances are not used at boot time.
3.2. Runtime[edit | edit source]
3.2.1. Overview[edit | edit source]
CRC instances can be allocated to:
- the Arm® Cortex®-A7 non-secure for using in Linux® with Linux Crypto framework
- the Arm® Cortex®-M4 for using in STM32Cube with STM32Cube CRC driver
Chapter Peripheral assignment describes which peripheral instance can be assigned to which context.
3.2.2. Software frameworks[edit | edit source]
3.2.2.1. On STM32MP13x lines
[edit | edit source]
Domain | Peripheral | Software components | Comment | |
---|---|---|---|---|
OP-TEE | Linux | |||
Security | CRC | Linux Crypto framework |
3.2.2.2. On STM32MP15x lines
[edit | edit source]
Domain | Peripheral | Software components | Comment | ||
---|---|---|---|---|---|
OP-TEE | Linux | STM32Cube | |||
Security | CRC | Linux Crypto framework | STM32Cube CRC driver |
3.2.3. Peripheral configuration[edit | edit source]
The configuration is applied by the firmware running in the context to which the peripheral is assigned. The configuration can be done alone via the STM32CubeMX tool for all internal peripherals, and then manually completed (particularly for external peripherals), according to the information given in the corresponding software framework article.
3.2.4. Peripheral assignment[edit | edit source]
3.2.4.1. On STM32MP13x lines
[edit | edit source]
Click on the right to expand the legend...
Domain | Peripheral | Runtime allocation | Comment | ||
---|---|---|---|---|---|
Instance | Cortex-A7 secure (OP-TEE) |
Cortex-A7 non-secure (Linux) | |||
Security | CRC | CRC | ☐ |
3.2.4.2. On STM32MP15x lines
[edit | edit source]
Click on the right to expand the legend...
Domain | Peripheral | Runtime allocation | Comment | |||
---|---|---|---|---|---|---|
Instance | Cortex-A7 secure (OP-TEE) |
Cortex-A7 non-secure (Linux) |
Cortex-M4 (STM32Cube) | |||
Security | CRC | CRC1 | ☐ | |||
CRC2 | ☐ |
4. References[edit | edit source]