10.3.9 CryptoAesDecrypt
Command CryptoAesDecrypt(...) decrypts the provided data using the specified Key and returns it, and can only be
used on keys indexes 26-27, when the Crypto Engine is used as a stand-alone hardware accelerator for non-LoRaWAN
security tasks.
Table 10-18: CryptoAesDecrypt Command
Byte
Data from Host
Data to Host
Table 10-19: CryptoAesDecrypt Response
Byte
Data from Host
Data to Host
•
KeyID: Specified Key ID, as defined in
Valid values are from 0 to 27.
•
Data1, Data2 to DataN: Provided data, considered as byte buffers.
•
CEStatus: Defined in section
•
DecryptedData1, DecryptedData2 to DecryptedDataN: Decrypted data, considered as byte buffers.
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
0
1
0x05
0x09
Stat1
Stat2
0
1
0x00
0x00
Stat1
CEStatus
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
www.semtech.com
2
3
KeyID (7:0)
Data1
IrqStatus
IrqStatus
(31:24)
(23:16)
2
0x00
Decrypted
Data1
Derivation.
...
N+2
...
DataN
...
0x00
...
N+1
...
0x00
Decrypted
...
DataN
110 of 130
Semtech
Proprietary & Confidential