STM32CubeMX user interface

UM1718

 

 

Figure 187. Non-secure project completed

Open the project

A non-secure code is generated

DT56337

The non-secure application can be developed using the generated code skeletons.

SMAK code compilation and encrypted binaries generation

If the “Sign Binary(ies)” option is ticked during boot path settings configuration, the generated application binaries are encrypted.

Open the project in IAR

Select: Project → Option → Build Actions

The link to the STM32 Trusted Package executable and the link to the secure application xml are filled automatically

Compile secure (right click on Project → Rebuild all)

After the post build phase, the secure signed and encrypted binaries are generated

196/453

UM1718 Rev 41

UM1718

STM32CubeMX user interface

 

 

Figure 188. IDE post build commands

Post build command added

Trusted Package Creator generates an encrypted binary

DT56338

Secure manager API

When SMAK boot path is set, the middleware “Secure Manager API” can be configured (see

Figure 188).

Figure 189. Secure manager API configuration

Depending upon the configuration, the code is generated, and the “Secure Manager API” is added. Additional services (such as cryptography or initial attestation) can be added with the middleware.

UM1718 Rev 41

197/453

Соседние файлы в папке STM