RM0082
AS_Cryptographic co-processor (C3)
Doc ID 018672 Rev 1
397/844
Bits ‘aa’ in the above table are used to set the algorithm to use and have the same encoding
as in the INIT instruction(
Bit ‘t’ in the above table is used to truncate the result to 96 bits:
21.11.8 HASH
CONTEXT instruction
The HASH CONTEXT instruction is composed by 2 sub-instructions:
●
SAVE
●
RESTORE
21.11.9 SAVE
The HASH CONTEXT SAVE instruction is 2 words long. This instruction is used to set the
Destination address Register for the context and to save the full context.
The second word represents the Destination Address for the context.
21.11.10 RESTORE
The HASH CONTEXT RESTORE instruction is 2 words long. This instruction is used to set
the Source Address Register for the context and to restore the full context.
The second word represents the Source Address for the context.
Table 335.
HASH END Instruction bit encoding
W#
Bit Encoding
1
xxxx 010a a01t xxxx cccc cccc cccc cccc
2
32 bit Destination Address for the message
Bit 20
t
Truncate
1’b0
Full digest
1’b1
Truncated 96 bit digest
Table 336.
HASH CONTEXT SAVE Instruction bit encoding
W#
Bit Encoding
1
xxxx 0101 10xx xxxx cccc cccc cccc cccc
2
32 bit Destination Address for the context
Table 337.
HASH CONTEXT RESTORE Instruction bit encoding
W#
Bit Encoding
1
xxxx 0101 11xx xxxx cccc cccc cccc cccc
2
32 bit Source Address for the context