LR1110
User Manual Rev.1.0
UM.LR1110.W.APP March 2020
112 of 130
Semtech
www.semtech.com
• KeyID: specified Key ID, as defined in Table 12-1: Cryptographic Keys Usage and Derivation. Goes from 0 to 27.
• Data1, Data2, ... , DataN: Provided data, considered as Byte buffers.
• CEStatus: defined in section CEStatus on page 107.
• EncryptedData1, EncryptedData2, ... , EncryptedDataN: Encrypted data, considered as Byte buffers
12.3.9 CryptoAesDecrypt
The command CryptoAesDecrypt( ) will decrypt the provided data using the specified Key and return it.
• KeyID: specified Key ID, as defined in Table 12-1: Cryptographic Keys Usage and Derivation. Goes from 0 to 27.
• Data1, Data2, ... , DataN: Provided data, considered as Byte buffers.
• CEStatus: defined in section CEStatus on page 107.
• DecryptedData1, DecryptedData2, ... , DecryptedDataN: Decrypted data, considered as Byte buffers
Table 12-17: CryptoAesEncrypt Response
Byte 0 1 2 … N+1
Data from Host 0x00 0x00 0x00 … 0x00
Data to Host Stat1 CEStatus
Encrypted
Data1
…
Encrypted
DataN
Table 12-18: CryptoAesDecrypt Command
Byte 0 1 2 3 … N+2
Data from Host 0x05 0x09 KeyID (7:0) Data1 … DataN
Data to Host Stat1 Stat2
IrqStatus
(31:24)
IrqStatus
(23:16)
… 0x00
Table 12-19: CryptoAesDecrypt Response
Byte 0 1 2 … N+1
Data from Host 0x00 0x00 0x00 … 0x00
Data to Host Stat1 CEStatus
Decrypted
Data1
…
Decrypted
DataN