10.3.8 CryptoAesEncrypt
Command CryptoAesEncrypt(...) encrypts the provided data using the specified Key and returns it. It is to be used
for generic, non-LoRaWAN cryptographic operations, where the Crypto Engine is used as a hardware accelerator, on key
indexes 26 and 27 only (General Purpose keys).
Table 10-16: CryptoAesEncrypt Command
Byte
Data from Host
Data to Host
Table 10-17: CryptoAesEncrypt Response
Byte
Data from Host
Data to Host
•
KeyID: Specified Key ID, as defined in
Valid values are from 26 to 27.
•
Data1, Data2 to DataN: Provided data, considered as byte buffers.
•
CEStatus: Defined in section
•
EncryptedData1, EncryptedData2 to EncryptedDataN: Encrypted data, considered as byte buffers.
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
0
1
0x05
0x08
Stat1
Stat2
0
1
0x00
0x00
Stat1
CEStatus
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
www.semtech.com
2
3
KeyID (7:0)
Data1
IrqStatus
IrqStatus
(31:24)
(23:16)
2
0x00
Encrypted
Data1
Derivation.
...
N+2
...
DataN
...
0x00
...
N+1
...
0x00
Encrypted
...
DataN
109 of 130
Semtech
Proprietary & Confidential