LR1110
User Manual
Rev.1.0
UM.LR1110.W.APP
March 2020
10 of 130
Semtech
Table 10-6: Wi-Fi MacValidation Field....................................................................................................... 89
Table 10-7: Wi-Fi Frame Control Field....................................................................................................... 89
Table 10-8: SubType Description................................................................................................................ 90
Table 10-9: WifiGetNbResults Command ................................................................................................ 91
Table 10-10: WifiGetNbResults Response................................................................................................ 91
Table 10-11: WifiReadResults Command................................................................................................. 91
Table 10-12: WifiReadResults Response................................................................................................... 91
Table 10-13: WifiResetCumulTimings Command................................................................................. 92
Table 10-14: Wi-Fi Cumulative Timings Description ........................................................................... 92
Table 10-15: WifiReadCumulTimings Command.................................................................................. 93
Table 10-16: WifiReadCumulTimings Response.................................................................................... 93
Table 11-1: GnssSetConstellationToUse .................................................................................................. 96
Table 11-2: GnssSetMode.............................................................................................................................. 96
Table 11-3: GnssAutonomous Command ............................................................................................... 97
Table 11-4: GnssAssisted Command......................................................................................................... 97
Table 11-5: GnssSetAssistancePosition Command.............................................................................. 98
Table 11-6: GnssGetResultSize Command ............................................................................................ 100
Table 11-7: GnssGetResultSize Response.............................................................................................. 100
Table 11-8: GnssReadResults Command ............................................................................................... 100
Table 11-9: GnssReadResults Response ................................................................................................. 100
Table 11-10: GnssGetNbSvDetected Command................................................................................. 101
Table 11-11: GnssGetNbSvDetected Response................................................................................... 101
Table 11-12: GnssGetSvDetected Command....................................................................................... 101
Table 11-13: GnssGetSvDetected Response......................................................................................... 101
Table 11-14: GnssGetConsumption Command .................................................................................. 102
Table 11-15: GnssGetConsumption Response .................................................................................... 102
Table 11-16: GnssAlmanacFullUpdate ................................................................................................... 103
Table 11-17: AlmanacFullUpdatePayload ............................................................................................. 103
Table 11-18: AlmanacHeader..................................................................................................................... 103
Table 11-19: SvAlmanac Format............................................................................................................... 103
Table 12-1: Cryptographic Keys Usage and Derivation.................................................................... 105
Table 12-2: CryptoSetKey Command...................................................................................................... 107
Table 12-3: CryptoSetKey Response........................................................................................................ 107
Table 12-4: CryptoDeriveAndStoreKey Command ............................................................................ 108
Table 12-5: CryptoDeriveAndStoreKey Response.............................................................................. 108
Table 12-6: CryptoProcessJoinAccept Command.............................................................................. 108
Table 12-8: CryptoComputeAesCmac Command.............................................................................. 109
Table 12-9: CryptoComputeAesCmac Response................................................................................ 109
Table 12-7: CryptoProcessJoinAccept Response................................................................................ 109
Table 12-10: CryptoComputeAesCmac Command Example ......................................................... 110
Table 12-11: CryptoComputeAesCmac Response Example ........................................................... 110
Table 12-12: CryptoVerifyAesCmac Command................................................................................... 110
Table 12-13: CryptoVerifyAesCmac ......................................................................................................... 110
Table 12-14: CryptoAesEncrypt01 Command ..................................................................................... 111
Table 12-15: CryptoAesEncrypt01 Response ....................................................................................... 111
Table 12-16: CryptoAesEncrypt Command .......................................................................................... 111
Table 12-18: CryptoAesDecrypt Command.......................................................................................... 112
Table 12-19: CryptoAesDecrypt Response............................................................................................ 112
Table 12-17: CryptoAesEncrypt Response ............................................................................................ 112
Table 12-20: CryptoStoreToFlash Command....................................................................................... 113
Table 12-21: CryptoAesDecrypt Response............................................................................................ 113
Table 12-22: CryptoRestoreFromFlash Command............................................................................. 113
Table 12-23: CryptoRestoreFromFlash Response............................................................................... 113
Table 12-24: CryptoSetParam Command.............................................................................................. 114