Cryptoaesdecrypt; Table 10-18: Cryptoaesdecrypt Command; Table 10-19: Cryptoaesdecrypt Response - Semtech LR1121 User Manual

Table of Contents

Advertisement

10.3.9 CryptoAesDecrypt

Command CryptoAesDecrypt(...) decrypts the provided data using the specified Key and returns it, and can only be
used on keys indexes 26-27, when the Crypto Engine is used as a stand-alone hardware accelerator for non-LoRaWAN
security tasks.

Table 10-18: CryptoAesDecrypt Command

Byte
Data from Host
Data to Host

Table 10-19: CryptoAesDecrypt Response

Byte
Data from Host
Data to Host
KeyID: Specified Key ID, as defined in
Valid values are from 0 to 27.
Data1, Data2 to DataN: Provided data, considered as byte buffers.
CEStatus: Defined in section
DecryptedData1, DecryptedData2 to DecryptedDataN: Decrypted data, considered as byte buffers.
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
0
1
0x05
0x09
Stat1
Stat2
0
1
0x00
0x00
Stat1
CEStatus
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
www.semtech.com
2
3
KeyID (7:0)
Data1
IrqStatus
IrqStatus
(31:24)
(23:16)
2
0x00
Decrypted
Data1
Derivation.
...
N+2
...
DataN
...
0x00
...
N+1
...
0x00
Decrypted
...
DataN
110 of 130
Semtech
Proprietary & Confidential

Advertisement

Table of Contents
loading

Table of Contents