SM CODE
RNG_SM_1
Detailed implementation
RNG module include an internal diagnostic for the analog source entropy that can be used
to detect failures on the module itself. Furthermore, the required test on generated random
number difference between the previous one (as required by FIPS PUB 140-2) can be
exploited as well.
Implementation:
•
Check for RNG error conditions.
•
Check the difference between generated random number and the previous one.
Error reporting
CEIS, SEIS error bits of the RNG status register (RNG_SR)
Application software
error for FIPS PUB 140-2 test fail
Fault detection time
Depends on implementation
Addressed fault model
Permanent/transient
Dependency on
Device
configuration
RNG module available only on specific part numbers
Initialization
Permanent/transient
Periodicity
Continuous
Test for the diagnostic
Not applicable
Multiple-fault protection
CPU_SM_0: Periodic core self-test software
Recommendations and known limitations
None
3.6.30
Advanced encryption standard hardware accelerator (AES)
Table 104.
AES_SM_0
SM CODE
AES_SM_0
Description
Periodic read-back of AES configuration registers
Ownership
End user
Detailed implementation
This method must be applied to AES configuration registers.
Detailed information on the implementation of this method can be found in
Section 3.6.14 Extended interrupt and events controller (EXTI)
.
Error reporting
Refer to NVIC_SM_0
Fault detection time
Refer to NVIC_SM_0
Addressed fault model
Refer to NVIC_SM_0
Dependency on
Device
configuration
AES module available only on specific part numbers
Initialization
Refer to NVIC_SM_0
Periodicity
Refer to NVIC_SM_0
Test for the diagnostic
Refer to NVIC_SM_0
Multiple-fault protection
Refer to NVIC_SM_0
Recommendations and known limitations
Refer to NVIC_SM_0
Table 105.
AES_SM_1
SM CODE
AES_SM_1
Description
Encryption/decryption collateral detection
Ownership
ST
UM2305
Hardware and software diagnostics
UM2305
-
Rev 10
page 60/110