Last edited 4 months ago

HASH internal peripheral


1. Peripheral overview

The HASH peripheral is used to compute a message digest.
The HASH peripheral is also able to give the HMAC[1] used for authentication using the same algorithm support.

1.1. On STM32MP13x lines More info.png and STM32MP2 series

Secure Hash algorithms supports:

  • SHA-1 [2]
  • SHA-2 [3]:
    • SHA-224
    • SHA-256
    • SHA-384
    • SHA-512
    • Truncated output SHA-512/224, SHA512/256
  • SHA-3 [4]:
    • SHA3-224
    • SHA3-256
    • SHA3-384
    • SHA3-512
    • SHAKE128 and 256
    • Keccak-based functions
  • HMAC support for all supported algorithm

Refer to the STM32 MPU reference manuals for the complete list of features, and to the software frameworks and drivers, introduced below, to see which features are implemented.

1.2. On STM32MP15x lines More info.png

Secure Hash algorithms supports:

  • MD5 [5]
  • SHA-1 [2]
  • SHA-2 [3]:
    • SHA-224
    • SHA-256
  • HMAC support for all supported algorithm

Refer to the STM32MP15 reference manuals for the complete list of features, and to the software frameworks and drivers, introduced below, to see which features are implemented.

2. Peripheral usage

This chapter is applicable in the scope of the OpenSTLinux BSP running on the Arm® Cortex®-A processor(s), and the STM32CubeMPU Package running on the Arm® Cortex®-M processor.

2.1. Boot time assignment

The HASH instance is used as boot device to support binary authentication when device is in secured locked state.

2.1.1. On STM32MP13x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Boot time allocation Comment How to.png
Instance Cortex-A7
secure
(ROM code)
Cortex-A7
secure
(TF-A BL2)
Cortex-A7
non-secure
(U-Boot)
Security HASH HASH

2.1.2. On STM32MP15x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Boot time allocation Comment How to.png
Instance Cortex-A7
secure
(ROM code)
Cortex-A7
secure
(TF-A BL2)
Cortex-A7
non-secure
(U-Boot)
Security HASH HASH1
HASH2 not used at boot time.

2.1.3. On STM32MP21x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Boot time allocation Comment How to.png
Instance Cortex-A35
secure
(ROM code)
Cortex-A35
secure
(TF-A BL2)
Cortex-A35
nonsecure
(U-Boot)
Security HASH HASH1

2.1.4. On STM32MP23x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Boot time allocation Comment How to.png
Instance Cortex-A35
secure
(ROM code)
Cortex-A35
secure
(TF-A BL2)
Cortex-A35
nonsecure
(U-Boot)
Security HASH HASH

2.1.5. On STM32MP25x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Boot time allocation Comment How to.png
Instance Cortex-A35
secure
(ROM code)
Cortex-A35
secure
(TF-A BL2)
Cortex-A35
nonsecure
(U-Boot)
Security HASH HASH

2.2. Runtime assignment

2.2.1. On STM32MP13x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Runtime allocation Comment How to.png
Instance Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Security HASH HASH Assignment (single choice)

2.2.2. On STM32MP15x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Runtime allocation Comment How to.png
Instance Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Cortex-M4

(STM32Cube)
Security HASH HASH1 Assignment (single choice)
HASH2

2.2.3. On STM32MP21x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Runtime allocation Comment How to.png
Instance Cortex-A35
secure
(OP-TEE /
TF-A BL31)
Cortex-A35
nonsecure
(Linux)
Cortex-M33
secure
(TF-M)
Cortex-M33
nonsecure
(STM32Cube)
Security HASH HASH1 OP-TEE
HASH2 OP-TEE

2.2.4. On STM32MP23x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Runtime allocation Comment How to.png
Instance Cortex-A35
secure
(OP-TEE /
TF-A BL31)
Cortex-A35
nonsecure
(Linux)
Cortex-M33
secure
(TF-M)
Cortex-M33
nonsecure
(STM32Cube)
Security HASH HASH OP-TEE

2.2.5. On STM32MP25x lines More info.png

Click on How to.png to expand or collapse the legend...

Domain Peripheral Runtime allocation Comment How to.png
Instance Cortex-A35
secure
(OP-TEE /
TF-A BL31)
Cortex-A35
nonsecure
(Linux)
Cortex-M33
secure
(TF-M)
Cortex-M33
nonsecure
(STM32Cube)
Cortex-M0+
(STM32Cube)
Security HASH HASH OP-TEE

3. Software frameworks and drivers

Below are listed the software frameworks and drivers managing the HASH peripheral for the embedded software components listed in the above tables.

4. How to assign and configure the peripheral

The peripheral assignment can be done via the STM32CubeMX graphical tool (and manually completed if needed).
This tool also helps to configure the peripheral:

  • partial device trees (pin control and clock tree) generation for the OpenSTLinux software components,
  • HAL initialization code generation for the STM32CubeMPU Package.

The configuration is applied by the firmware running in the context in which the peripheral is assigned.

5. References