EasyManua.ls Logo

Semtech LR1121 - Page 11

Semtech LR1121
130 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
LR1121
User Manual Rev 1.1
UM.LR1121.W.APP Mar 2023
11 of 130
Semtech
Proprietary & Confidential
www.semtech.com
Table 9-6: SetTxParams Command.......................................................................................................... 100
Table 9-7: RampTime Values...................................................................................................................... 100
Table 10-1: Cryptographic Keys Usage and Derivation.................................................................... 101
Table 10-2: CryptoSetKey Command...................................................................................................... 103
Table 10-3: CryptoSetKey Response........................................................................................................ 103
Table 10-4: CryptoDeriveKey Command............................................................................................... 104
Table 10-5: CryptoDeriveKey Response ................................................................................................. 104
Table 10-6: CryptoProcessJoinAccept Command.............................................................................. 105
Table 10-7: CryptoProcessJoinAccept Response................................................................................ 105
Table 10-8: CryptoComputeAesCmac Command.............................................................................. 106
Table 10-9: CryptoComputeAesCmac Response................................................................................ 106
Table 10-10: CryptoComputeAesCmac Command Example ......................................................... 106
Table 10-11: CryptoComputeAesCmac Response Example........................................................... 106
Table 10-12: CryptoVerifyAesCmac Command................................................................................... 107
Table 10-13: CryptoVerifyAesCmac Response..................................................................................... 107
Table 10-14: CryptoAesEncrypt01 Command ..................................................................................... 108
Table 10-15: CryptoAesEncrypt01 Response ....................................................................................... 108
Table 10-16: CryptoAesEncrypt Command .......................................................................................... 109
Table 10-17: CryptoAesEncrypt Response ............................................................................................ 109
Table 10-18: CryptoAesDecrypt Command.......................................................................................... 110
Table 10-19: CryptoAesDecrypt Response............................................................................................ 110
Table 10-20: CryptoStoreToFlash Command....................................................................................... 111
Table 10-21: CryptoAesDecrypt Response............................................................................................ 111
Table 10-22: CryptoRestoreFromFlash Command............................................................................. 111
Table 10-23: CryptoRestoreFromFlash Response............................................................................... 111
Table 10-24: CryptoSetParam Command.............................................................................................. 112
Table 10-25: CryptoSetParam Response................................................................................................ 112
Table 10-26: CryptoGetParam Command............................................................................................. 112
Table 10-27: CryptoGetParam Response............................................................................................... 112
Table 11-1: GetChipEui Command........................................................................................................... 113
Table 11-2: GetChipEui Response ............................................................................................................ 113
Table 11-3: GetSemtechJoinEui Command.......................................................................................... 114
Table 11-4: GetSemtechJoinEui Response............................................................................................ 114
Table 11-5: DeriveRootKeysAndGetPin Command (Standard) ..................................................... 115
Table 11-6: DeriveRootKeysAndGetPin Response ............................................................................. 115
Table 11-7: DeriveRootKeysAndGetPin Command (advanced).................................................... 116
Table 11-8: DeriveRootKeysAndGetPin Response (advanced)...................................................... 116
Table 11-9: LoRaWAN 1.0.x vs. 1.1.x Security Correspondence Table......................................... 118
Table 12-1: ETSI Test Signals ...................................................................................................................... 119
Table 12-2: SetTxCw Command................................................................................................................ 120
Table 12-3: SetTxInfinitePreamble Command..................................................................................... 120
Table 13-1: Register / Memory Access Operations............................................................................. 121
Table 13-2: System Configuration / Status Operations .................................................................... 122
Table 13-3: Radio Configuration / Status Operations ....................................................................... 123
Table 13-4: CryptoElement Configuration / Status Operations..................................................... 125
Table 13-5: Bootloader Commands......................................................................................................... 126
Table 14-1: Revision History ....................................................................................................................... 127

Table of Contents

Related product manuals