STM32CubeMX user interface

UM1718

 

 

Figure 141. Application boot path:

(ST-iRoT and OEM-uRoT Secure/Non-Secure user application assembled)

67 L5R7 2(0X5R7

Secure/Non-Secure user application (assembled as single image)

System flash User flash

NS-User application

S-User application

2(0X5R7

Bootloader

Debug authentication

ST-iRoT (secure boot)

Reset

ST SFI/RSS

Single image

(Secure and Non-Secure)

Not generated by

670 &XEH0;

DT56424V1

Figure 142. Application boot path:

(OEM-iRoT and Secure/Non-Secure user application assembled)

2(0L5R7 6HFXUH 1RQ 6HFXUH XVHU DSSOLFDWLRQ

(assembled as single image)

System flash User flash

NS-User application

S-User application

OEMiRoT

Bootloader

Debug authentication

ST-iRoT (secure boot)

Reset

ST SFI/RSS

Single image

(Secure and Non-Secure)

Not generated by

STM32CubeMX

4.16.2Creating a boot path project: an example

Prerequisites

Hardware: Discovery board STM32H573I-DK-REVC

Tools

STM32CubeMX-6.8.0 or later

Trusted Package Creator (embedded in STM32CubeMX installation folder)

CubeFW must be installed through CubeMX

IAR Embedded Workbench® rev 9.20.4 or later

DT56425V1

170/453

UM1718 Rev 41

UM1718

STM32CubeMX user interface

 

 

4.16.3How to configure an OEM-iRoT boot path

The following instructions describe how to generate an OEM immutable Root of Trust (OEM-iRoT) boot path. The procedure to generate other boot paths is similar, but the data required for the configuration can be different.

Step 1: Selecting the MCU

Figure 143. Select the device or board

Click here to access the list of supported boards,

or use the MCU selector for a custom product

DT56292

UM1718 Rev 41

171/453

STM32CubeMX user interface

UM1718

 

 

Figure 144. Select the STM32H5 device

Select STM32H5

Click to open the

MCU/MPU selector

Figure 145. Peripheral initialization

DT56293V2

Click No

DT56294

If you click yes, there will be an error during the secure code compilation.

By default, all peripherals are set as secure, and the memory allocation for the secure code (defined through the OEM-iRoT_boot application) is too small.

Step 2: Project creation with OEM-iRoT boot path

For this example, enable TrustZone (TZEN = 1).

172/453

UM1718 Rev 41

UM1718

STM32CubeMX user interface

 

 

Figure 146. Boot paths for STM32H56x devices

 

 

User option bytes

 

 

 

TZEN

= 1

UBE

= 1

 

ST-iRoT

 

 

 

 

 

= 0

 

 

= 0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

NS application

 

 

 

 

 

 

 

 

OEM-iRoT

 

 

 

 

 

 

 

 

 

 

 

TZEN disabled

 

 

 

 

 

 

S application

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Select the option “With TrustZone” on the popup window, as shown below.

Figure 147. Activate TrustZone

DT56295V2

Step 3: Device and peripherals configuration

At this point, the device and its peripherals can be configured. For this example, the default configuration is kept.

UM1718 Rev 41

173/453

Соседние файлы в папке STM