Skip to content

Commit d6a38f6

Browse files
committed
Phase 4: add wolfHSM section to STM32-TZ.md
Add a wolfHSM section to docs/STM32-TZ.md alongside the PKCS11 and PSA sections, with a cross-reference to the dedicated docs/wolfHSM.md for the full STM32H5 build/flash/test recipe.
1 parent 9caa201 commit d6a38f6

1 file changed

Lines changed: 13 additions & 0 deletions

File tree

docs/STM32-TZ.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,19 @@ The `WOLFCRYPT_TZ_PSA` option provides a standard PSA Crypto interface using
3333
wolfPSA in the secure domain. The key storage uses the same secure flash
3434
keystore backend as PKCS11, exposed through the wolfPSA store API.
3535

36+
### wolfHSM API in non-secure world
37+
38+
The `WOLFCRYPT_TZ_WOLFHSM` option hosts a wolfHSM server inside the secure
39+
domain and exposes it to non-secure applications through a single non-secure
40+
callable veneer. Non-secure code uses the standard wolfCrypt API with the
41+
wolfHSM client cryptocb registered under `WH_DEV_ID`; key material, the
42+
keystore, and crypto operations stay in the secure domain. Persistent keys
43+
live in the same secure flash keystore region used by PKCS11 and PSA, with
44+
two-partition journaling for power-fail safety.
45+
46+
See [wolfHSM](wolfHSM.md) for the full configuration, build, flash, and
47+
test recipe on STM32H5.
48+
3649
### PSA Initial Attestation (DICE)
3750

3851
When `WOLFCRYPT_TZ_PSA=1` is enabled, wolfBoot exposes the PSA Initial

0 commit comments

Comments
 (0)