Cryptoaesencrypt; Table 10-16: Cryptoaesencrypt Command; Table 10-17: Cryptoaesencrypt Response - Semtech LR1121 User Manual

Table of Contents

Advertisement

10.3.8 CryptoAesEncrypt

Command CryptoAesEncrypt(...) encrypts the provided data using the specified Key and returns it. It is to be used
for generic, non-LoRaWAN cryptographic operations, where the Crypto Engine is used as a hardware accelerator, on key
indexes 26 and 27 only (General Purpose keys).

Table 10-16: CryptoAesEncrypt Command

Byte
Data from Host
Data to Host

Table 10-17: CryptoAesEncrypt Response

Byte
Data from Host
Data to Host
KeyID: Specified Key ID, as defined in
Valid values are from 26 to 27.
Data1, Data2 to DataN: Provided data, considered as byte buffers.
CEStatus: Defined in section
EncryptedData1, EncryptedData2 to EncryptedDataN: Encrypted data, considered as byte buffers.
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
0
1
0x05
0x08
Stat1
Stat2
0
1
0x00
0x00
Stat1
CEStatus
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
www.semtech.com
2
3
KeyID (7:0)
Data1
IrqStatus
IrqStatus
(31:24)
(23:16)
2
0x00
Encrypted
Data1
Derivation.
...
N+2
...
DataN
...
0x00
...
N+1
...
0x00
Encrypted
...
DataN
109 of 130
Semtech
Proprietary & Confidential

Advertisement

Table of Contents
loading

Table of Contents