LR1110
User Manual
Rev.1.0
UM.LR1110.W.APP
March 2020
112 of 130
Semtech
•
KeyID
: specified Key ID, as defined in
Table 12-1: Cryptographic Keys Usage and Derivation
. Goes from 0 to 27.
•
Data1, Data2, ... , DataN
: Provided data, considered as Byte buffers.
•
CEStatus
•
EncryptedData1, EncryptedData2, ... , EncryptedDataN
: Encrypted data, considered as Byte buffers
12.3.9 CryptoAesDecrypt
The command
CryptoAesDecrypt( )
will decrypt the provided data using the specified Key and return it.
•
KeyID
: specified Key ID, as defined in
Table 12-1: Cryptographic Keys Usage and Derivation
. Goes from 0 to 27.
•
Data1, Data2, ... , DataN
: Provided data, considered as Byte buffers.
•
CEStatus
•
DecryptedData1, DecryptedData2, ... , DecryptedDataN
: Decrypted data, considered as Byte buffers
Table 12-17: CryptoAesEncrypt Response
Byte
0
1
2
…
N+1
Data from Host
0x00
0x00
0x00
…
0x00
Data to Host
Stat1
CEStatus
Encrypted
Data1
…
Encrypted
DataN
Table 12-18: CryptoAesDecrypt Command
Byte
0
1
2
3
…
N+2
Data from Host
0x05
0x09
KeyID (7:0)
Data1
…
DataN
Data to Host
Stat1
Stat2
IrqStatus
(31:24)
IrqStatus
(23:16)
…
0x00
Table 12-19: CryptoAesDecrypt Response
Byte
0
1
2
…
N+1
Data from Host
0x00
0x00
0x00
…
0x00
Data to Host
Stat1
CEStatus
Decrypted
Data1
…
Decrypted
DataN