Cryptoaesdecrypt; Table 12-18: Cryptoaesdecrypt Command; Table 12-19: Cryptoaesdecrypt Response; Table 12-17: Cryptoaesencrypt Response - Semtech LR1110 User Manual

Hide thumbs Also See for LR1110:
Table of Contents

Advertisement

Table 12-17: CryptoAesEncrypt Response

Byte
Data from Host
Data to Host
KeyID: specified Key ID, as defined in
Data1, Data2, ... , DataN: Provided data, considered as Byte buffers.
CEStatus: defined in section
EncryptedData1, EncryptedData2, ... , EncryptedDataN: Encrypted data, considered as Byte buffers

12.3.9 CryptoAesDecrypt

The command CryptoAesDecrypt( ) will decrypt the provided data using the specified Key and return it.

Table 12-18: CryptoAesDecrypt Command

Byte
Data from Host
Data to Host

Table 12-19: CryptoAesDecrypt Response

Byte
Data from Host
Data to Host
KeyID: specified Key ID, as defined in
Data1, Data2, ... , DataN: Provided data, considered as Byte buffers.
CEStatus: defined in section
DecryptedData1, DecryptedData2, ... , DecryptedDataN: Decrypted data, considered as Byte buffers
LR1110
User Manual
Rev.1.0
UM.LR1110.W.APP
March 2020
0
1
0x00
0x00
Stat1
CEStatus
Table 12-1: Cryptographic Keys Usage and
CEStatus on page
107.
0
1
0x05
0x09
Stat1
Stat2
0
1
0x00
0x00
Stat1
CEStatus
Table 12-1: Cryptographic Keys Usage and
CEStatus on page
107.
www.semtech.com
2
0x00
Encrypted
Data1
Derivation. Goes from 0 to 27.
2
3
KeyID (7:0)
Data1
IrqStatus
IrqStatus
(31:24)
(23:16)
2
0x00
Decrypted
Data1
Derivation. Goes from 0 to 27.
...
N+1
...
0x00
Encrypted
...
DataN
...
N+2
...
DataN
...
0x00
...
N+1
...
0x00
Decrypted
...
DataN
112 of 130
Semtech

Advertisement

Table of Contents
loading

Table of Contents