LR1121
User Manual Rev 1.1
UM.LR1121.W.APP Mar 2023
11 of 130
Semtech
Proprietary & Confidential
www.semtech.com
Table 9-6: SetTxParams Command.......................................................................................................... 100
Table 9-7: RampTime Values...................................................................................................................... 100
Table 10-1: Cryptographic Keys Usage and Derivation.................................................................... 101
Table 10-2: CryptoSetKey Command...................................................................................................... 103
Table 10-3: CryptoSetKey Response........................................................................................................ 103
Table 10-4: CryptoDeriveKey Command............................................................................................... 104
Table 10-5: CryptoDeriveKey Response ................................................................................................. 104
Table 10-6: CryptoProcessJoinAccept Command.............................................................................. 105
Table 10-7: CryptoProcessJoinAccept Response................................................................................ 105
Table 10-8: CryptoComputeAesCmac Command.............................................................................. 106
Table 10-9: CryptoComputeAesCmac Response................................................................................ 106
Table 10-10: CryptoComputeAesCmac Command Example ......................................................... 106
Table 10-11: CryptoComputeAesCmac Response Example........................................................... 106
Table 10-12: CryptoVerifyAesCmac Command................................................................................... 107
Table 10-13: CryptoVerifyAesCmac Response..................................................................................... 107
Table 10-14: CryptoAesEncrypt01 Command ..................................................................................... 108
Table 10-15: CryptoAesEncrypt01 Response ....................................................................................... 108
Table 10-16: CryptoAesEncrypt Command .......................................................................................... 109
Table 10-17: CryptoAesEncrypt Response ............................................................................................ 109
Table 10-18: CryptoAesDecrypt Command.......................................................................................... 110
Table 10-19: CryptoAesDecrypt Response............................................................................................ 110
Table 10-20: CryptoStoreToFlash Command....................................................................................... 111
Table 10-21: CryptoAesDecrypt Response............................................................................................ 111
Table 10-22: CryptoRestoreFromFlash Command............................................................................. 111
Table 10-23: CryptoRestoreFromFlash Response............................................................................... 111
Table 10-24: CryptoSetParam Command.............................................................................................. 112
Table 10-25: CryptoSetParam Response................................................................................................ 112
Table 10-26: CryptoGetParam Command............................................................................................. 112
Table 10-27: CryptoGetParam Response............................................................................................... 112
Table 11-1: GetChipEui Command........................................................................................................... 113
Table 11-2: GetChipEui Response ............................................................................................................ 113
Table 11-3: GetSemtechJoinEui Command.......................................................................................... 114
Table 11-4: GetSemtechJoinEui Response............................................................................................ 114
Table 11-5: DeriveRootKeysAndGetPin Command (Standard) ..................................................... 115
Table 11-6: DeriveRootKeysAndGetPin Response ............................................................................. 115
Table 11-7: DeriveRootKeysAndGetPin Command (advanced).................................................... 116
Table 11-8: DeriveRootKeysAndGetPin Response (advanced)...................................................... 116
Table 11-9: LoRaWAN 1.0.x vs. 1.1.x Security Correspondence Table......................................... 118
Table 12-1: ETSI Test Signals ...................................................................................................................... 119
Table 12-2: SetTxCw Command................................................................................................................ 120
Table 12-3: SetTxInfinitePreamble Command..................................................................................... 120
Table 13-1: Register / Memory Access Operations............................................................................. 121
Table 13-2: System Configuration / Status Operations .................................................................... 122
Table 13-3: Radio Configuration / Status Operations ....................................................................... 123
Table 13-4: CryptoElement Configuration / Status Operations..................................................... 125
Table 13-5: Bootloader Commands......................................................................................................... 126
Table 14-1: Revision History ....................................................................................................................... 127