diff --git a/source/Core/BSP/Pinecilv2/bl_mcu_sdk/drivers/bl702_driver/std_drv/inc/bl702_sec_eng.h b/source/Core/BSP/Pinecilv2/bl_mcu_sdk/drivers/bl702_driver/std_drv/inc/bl702_sec_eng.h
index 7bb7eaf6..ed92aef2 100644
--- a/source/Core/BSP/Pinecilv2/bl_mcu_sdk/drivers/bl702_driver/std_drv/inc/bl702_sec_eng.h
+++ b/source/Core/BSP/Pinecilv2/bl_mcu_sdk/drivers/bl702_driver/std_drv/inc/bl702_sec_eng.h
@@ -1,44 +1,47 @@
/**
- ******************************************************************************
- * @file bl702_sec_eng.h
- * @version V1.0
- * @date
- * @brief This file is the standard driver header file
- ******************************************************************************
- * @attention
- *
- *
© COPYRIGHT(c) 2020 Bouffalo Lab
- *
- * Redistribution and use in source and binary forms, with or without modification,
- * are permitted provided that the following conditions are met:
- * 1. Redistributions of source code must retain the above copyright notice,
- * this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright notice,
- * this list of conditions and the following disclaimer in the documentation
- * and/or other materials provided with the distribution.
- * 3. Neither the name of Bouffalo Lab nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
- * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
- * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
- * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
- * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
- * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- *
- ******************************************************************************
- */
+ ******************************************************************************
+ * @file bl702_sec_eng.h
+ * @version V1.0
+ * @date
+ * @brief This file is the standard driver header file
+ ******************************************************************************
+ * @attention
+ *
+ * © COPYRIGHT(c) 2020 Bouffalo Lab
+ *
+ * Redistribution and use in source and binary forms, with or without modification,
+ * are permitted provided that the following conditions are met:
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ * 3. Neither the name of Bouffalo Lab nor the names of its contributors
+ * may be used to endorse or promote products derived from this software
+ * without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
+ * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+ * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ ******************************************************************************
+ */
#ifndef __BL702_SEC_ENG_H__
#define __BL702_SEC_ENG_H__
-#include "sec_eng_reg.h"
#include "bl702_common.h"
+#include "sec_eng_reg.h"
+#ifdef __cplusplus
+extern "C" {
+#endif
/** @addtogroup BL702_Peripheral_Driver
* @{
*/
@@ -55,260 +58,253 @@
* @brief AES port type definition
*/
typedef enum {
- SEC_ENG_AES_ID0, /*!< AES0 port define */
+ SEC_ENG_AES_ID0, /*!< AES0 port define */
} SEC_ENG_AES_ID_Type;
/**
* @brief SHA port type definition
*/
typedef enum {
- SEC_ENG_SHA_ID0, /*!< SHA0 port define */
+ SEC_ENG_SHA_ID0, /*!< SHA0 port define */
} SEC_ENG_SHA_ID_Type;
/**
* @brief SHA type definition
*/
typedef enum {
- SEC_ENG_SHA256, /*!< SHA type:SHA256 */
- SEC_ENG_SHA224, /*!< SHA type:SHA224 */
- SEC_ENG_SHA1, /*!< SHA type:SHA1 */
- SEC_ENG_SHA1_RSVD, /*!< SHA type:SHA1 */
+ SEC_ENG_SHA256, /*!< SHA type:SHA256 */
+ SEC_ENG_SHA224, /*!< SHA type:SHA224 */
+ SEC_ENG_SHA1, /*!< SHA type:SHA1 */
+ SEC_ENG_SHA1_RSVD, /*!< SHA type:SHA1 */
} SEC_ENG_SHA_Type;
/**
* @brief AES type definition
*/
typedef enum {
- SEC_ENG_AES_ECB, /*!< AES mode type:ECB */
- SEC_ENG_AES_CTR, /*!< AES mode type:CTR */
- SEC_ENG_AES_CBC, /*!< AES mode type:CBC */
+ SEC_ENG_AES_ECB, /*!< AES mode type:ECB */
+ SEC_ENG_AES_CTR, /*!< AES mode type:CTR */
+ SEC_ENG_AES_CBC, /*!< AES mode type:CBC */
} SEC_ENG_AES_Type;
/**
* @brief AES KEY type definition
*/
typedef enum {
- SEC_ENG_AES_KEY_128BITS, /*!< AES KEY type:128 bits */
- SEC_ENG_AES_KEY_256BITS, /*!< AES KEY type:256 bits */
- SEC_ENG_AES_KEY_192BITS, /*!< AES KEY type:192 bits */
- SEC_ENG_AES_DOUBLE_KEY_128BITS, /*!< AES double KEY type:128 bits */
+ SEC_ENG_AES_KEY_128BITS, /*!< AES KEY type:128 bits */
+ SEC_ENG_AES_KEY_256BITS, /*!< AES KEY type:256 bits */
+ SEC_ENG_AES_KEY_192BITS, /*!< AES KEY type:192 bits */
+ SEC_ENG_AES_DOUBLE_KEY_128BITS, /*!< AES double KEY type:128 bits */
} SEC_ENG_AES_Key_Type;
/**
* @brief AES CTR mode counter type definition
*/
typedef enum {
- SEC_ENG_AES_COUNTER_BYTE_4, /*!< AES CTR mode counter type:4 bytes */
- SEC_ENG_AES_COUNTER_BYTE_1, /*!< AES CTR mode counter type:1 byte */
- SEC_ENG_AES_COUNTER_BYTE_2, /*!< AES CTR mode counter type:2 bytes */
- SEC_ENG_AES_COUNTER_BYTE_3, /*!< AES CTR mode counter type:3 bytes */
+ SEC_ENG_AES_COUNTER_BYTE_4, /*!< AES CTR mode counter type:4 bytes */
+ SEC_ENG_AES_COUNTER_BYTE_1, /*!< AES CTR mode counter type:1 byte */
+ SEC_ENG_AES_COUNTER_BYTE_2, /*!< AES CTR mode counter type:2 bytes */
+ SEC_ENG_AES_COUNTER_BYTE_3, /*!< AES CTR mode counter type:3 bytes */
} SEC_ENG_AES_Counter_Type;
/**
* @brief AES use new or old value type definition
*/
typedef enum {
- SEC_ENG_AES_USE_NEW, /*!< Use new value */
- SEC_ENG_AES_USE_OLD, /*!< Use old value same as last one */
+ SEC_ENG_AES_USE_NEW, /*!< Use new value */
+ SEC_ENG_AES_USE_OLD, /*!< Use old value same as last one */
} SEC_ENG_AES_ValueUsed_Type;
/**
* @brief AES KEY source type definition
*/
typedef enum {
- SEC_ENG_AES_KEY_SW, /*!< AES KEY from software */
- SEC_ENG_AES_KEY_HW, /*!< AES KEY from hardware */
+ SEC_ENG_AES_KEY_SW, /*!< AES KEY from software */
+ SEC_ENG_AES_KEY_HW, /*!< AES KEY from hardware */
} SEC_ENG_AES_Key_Src_Type;
/**
* @brief AES KEY source type definition
*/
typedef enum {
- SEC_ENG_AES_ENCRYPTION, /*!< AES encryption */
- SEC_ENG_AES_DECRYPTION, /*!< AES decryption */
+ SEC_ENG_AES_ENCRYPTION, /*!< AES encryption */
+ SEC_ENG_AES_DECRYPTION, /*!< AES decryption */
} SEC_ENG_AES_EnDec_Type;
/**
* @brief AES PKA register size type definition
*/
typedef enum {
- SEC_ENG_PKA_REG_SIZE_8 = 1, /*!< Register size is 8 Bytes */
- SEC_ENG_PKA_REG_SIZE_16, /*!< Register size is 16 Bytes */
- SEC_ENG_PKA_REG_SIZE_32, /*!< Register size is 32 Bytes */
- SEC_ENG_PKA_REG_SIZE_64, /*!< Register size is 64 Bytes */
- SEC_ENG_PKA_REG_SIZE_96, /*!< Register size is 96 Bytes */
- SEC_ENG_PKA_REG_SIZE_128, /*!< Register size is 128 Bytes */
- SEC_ENG_PKA_REG_SIZE_192, /*!< Register size is 192 Bytes */
- SEC_ENG_PKA_REG_SIZE_256, /*!< Register size is 256 Bytes */
- SEC_ENG_PKA_REG_SIZE_384, /*!< Register size is 384 Bytes */
- SEC_ENG_PKA_REG_SIZE_512, /*!< Register size is 512 Bytes */
+ SEC_ENG_PKA_REG_SIZE_8 = 1, /*!< Register size is 8 Bytes */
+ SEC_ENG_PKA_REG_SIZE_16, /*!< Register size is 16 Bytes */
+ SEC_ENG_PKA_REG_SIZE_32, /*!< Register size is 32 Bytes */
+ SEC_ENG_PKA_REG_SIZE_64, /*!< Register size is 64 Bytes */
+ SEC_ENG_PKA_REG_SIZE_96, /*!< Register size is 96 Bytes */
+ SEC_ENG_PKA_REG_SIZE_128, /*!< Register size is 128 Bytes */
+ SEC_ENG_PKA_REG_SIZE_192, /*!< Register size is 192 Bytes */
+ SEC_ENG_PKA_REG_SIZE_256, /*!< Register size is 256 Bytes */
+ SEC_ENG_PKA_REG_SIZE_384, /*!< Register size is 384 Bytes */
+ SEC_ENG_PKA_REG_SIZE_512, /*!< Register size is 512 Bytes */
} SEC_ENG_PKA_REG_SIZE_Type;
/**
* @brief AES PKA register size type definition
*/
typedef enum {
- SEC_ENG_PKA_OP_PPSEL, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MOD2N = 0x11, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LDIV2N = 0x12, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LMUL2N = 0x13, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LDIV = 0x14, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LSQR = 0x15, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LMUL = 0x16, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LSUB = 0x17, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LADD = 0x18, /*!< PKA operation type */
- SEC_ENG_PKA_OP_LCMP = 0x19, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MDIV2 = 0x21, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MINV = 0x22, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MEXP = 0x23, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MSQR = 0x24, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MMUL = 0x25, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MREM = 0x26, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MSUB = 0x27, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MADD = 0x28, /*!< PKA operation type */
- SEC_ENG_PKA_OP_RESIZE = 0x31, /*!< PKA operation type */
- SEC_ENG_PKA_OP_MOVDAT = 0x32, /*!< PKA operation type */
- SEC_ENG_PKA_OP_NLIR = 0x33, /*!< PKA operation type */
- SEC_ENG_PKA_OP_SLIR = 0x34, /*!< PKA operation type */
- SEC_ENG_PKA_OP_CLIR = 0x35, /*!< PKA operation type */
- SEC_ENG_PKA_OP_CFLIRI_BUFFER = 0x36, /*!< PKA operation type */
- SEC_ENG_PKA_OP_CTLIRI_PLD = 0x37, /*!< PKA operation type */
- SEC_ENG_PKA_OP_CFLIR_BUFFER = 0x38, /*!< PKA operation type */
- SEC_ENG_PKA_OP_CTLIR_PLD = 0x39, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_PPSEL, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MOD2N = 0x11, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LDIV2N = 0x12, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LMUL2N = 0x13, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LDIV = 0x14, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LSQR = 0x15, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LMUL = 0x16, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LSUB = 0x17, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LADD = 0x18, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_LCMP = 0x19, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MDIV2 = 0x21, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MINV = 0x22, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MEXP = 0x23, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MSQR = 0x24, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MMUL = 0x25, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MREM = 0x26, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MSUB = 0x27, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MADD = 0x28, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_RESIZE = 0x31, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_MOVDAT = 0x32, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_NLIR = 0x33, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_SLIR = 0x34, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_CLIR = 0x35, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_CFLIRI_BUFFER = 0x36, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_CTLIRI_PLD = 0x37, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_CFLIR_BUFFER = 0x38, /*!< PKA operation type */
+ SEC_ENG_PKA_OP_CTLIR_PLD = 0x39, /*!< PKA operation type */
} SEC_ENG_PKA_OP_Type;
/**
* @brief Sec Eng Interrupt Type Def
*/
typedef enum {
- SEC_ENG_INT_TRNG, /*!< Sec Eng Trng Interrupt Type */
- SEC_ENG_INT_AES, /*!< Sec Eng Aes Interrupt Type */
- SEC_ENG_INT_SHA, /*!< Sec Eng Sha Interrupt Type */
- SEC_ENG_INT_PKA, /*!< Sec Eng Pka Interrupt Type */
- SEC_ENG_INT_CDET, /*!< Sec Eng Cdet Interrupt Type */
- SEC_ENG_INT_GMAC, /*!< Sec Eng Gmac Interrupt Type */
- SEC_ENG_INT_ALL, /*!< Sec Eng All Interrupt Types */
+ SEC_ENG_INT_TRNG, /*!< Sec Eng Trng Interrupt Type */
+ SEC_ENG_INT_AES, /*!< Sec Eng Aes Interrupt Type */
+ SEC_ENG_INT_SHA, /*!< Sec Eng Sha Interrupt Type */
+ SEC_ENG_INT_PKA, /*!< Sec Eng Pka Interrupt Type */
+ SEC_ENG_INT_CDET, /*!< Sec Eng Cdet Interrupt Type */
+ SEC_ENG_INT_GMAC, /*!< Sec Eng Gmac Interrupt Type */
+ SEC_ENG_INT_ALL, /*!< Sec Eng All Interrupt Types */
} SEC_ENG_INT_Type;
/**
* @brief SEC_ENG SHA context
*/
-typedef struct
-{
- uint32_t total[2]; /*!< Number of bytes processed */
- uint32_t *shaBuf; /*!< Data not processed but in this temp buffer */
- uint32_t *shaPadding; /*!< Padding data */
- uint8_t shaFeed; /*!< Sha has feed data */
+typedef struct {
+ uint32_t total[2]; /*!< Number of bytes processed */
+ uint32_t *shaBuf; /*!< Data not processed but in this temp buffer */
+ uint32_t *shaPadding; /*!< Padding data */
+ uint8_t shaFeed; /*!< Sha has feed data */
} SEC_Eng_SHA256_Ctx;
/**
* @brief SEC_ENG SHA link mode context
*/
-typedef struct
-{
- uint32_t total[2]; /*!< Number of bytes processed */
- uint32_t *shaBuf; /*!< Data not processed but in this temp buffer */
- uint32_t *shaPadding; /*!< Padding data */
- uint32_t linkAddr; /*!< Link configure address */
+typedef struct {
+ uint32_t total[2]; /*!< Number of bytes processed */
+ uint32_t *shaBuf; /*!< Data not processed but in this temp buffer */
+ uint32_t *shaPadding; /*!< Padding data */
+ uint32_t linkAddr; /*!< Link configure address */
} SEC_Eng_SHA256_Link_Ctx;
/**
* @brief SEC_ENG AES context
*/
-typedef struct
-{
- uint8_t aesFeed; /*!< AES has feed data */
- SEC_ENG_AES_Type mode; /*!< AES mode */
+typedef struct {
+ uint8_t aesFeed; /*!< AES has feed data */
+ SEC_ENG_AES_Type mode; /*!< AES mode */
} SEC_Eng_AES_Ctx;
/**
* @brief SEC_ENG SHA link config structure type definition
*/
-typedef struct
-{
- uint32_t : 2; /*!< [1:0]reserved */
- uint32_t shaMode : 3; /*!< [4:2]Sha-256/sha-224/sha-1/sha-1 */
- uint32_t : 1; /*!< [5]reserved */
- uint32_t shaHashSel : 1; /*!< [6]New hash or accumulate last hash */
- uint32_t : 2; /*!< [8:7]reserved */
- uint32_t shaIntClr : 1; /*!< [9]Clear interrupt */
- uint32_t shaIntSet : 1; /*!< [10]Set interrupt */
- uint32_t : 5; /*!< [15:11]reserved */
- uint32_t shaMsgLen : 16; /*!< [31:16]Number of 512-bit block */
- uint32_t shaSrcAddr; /*!< Message source address */
- uint32_t result[8]; /*!< Result of SHA */
+typedef struct {
+ uint32_t : 2; /*!< [1:0]reserved */
+ uint32_t shaMode : 3; /*!< [4:2]Sha-256/sha-224/sha-1/sha-1 */
+ uint32_t : 1; /*!< [5]reserved */
+ uint32_t shaHashSel : 1; /*!< [6]New hash or accumulate last hash */
+ uint32_t : 2; /*!< [8:7]reserved */
+ uint32_t shaIntClr : 1; /*!< [9]Clear interrupt */
+ uint32_t shaIntSet : 1; /*!< [10]Set interrupt */
+ uint32_t : 5; /*!< [15:11]reserved */
+ uint32_t shaMsgLen : 16; /*!< [31:16]Number of 512-bit block */
+ uint32_t shaSrcAddr; /*!< Message source address */
+ uint32_t result[8]; /*!< Result of SHA */
} __attribute__((aligned(4))) SEC_Eng_SHA_Link_Config_Type;
/**
* @brief SEC_ENG AES link config structure type definition
*/
-typedef struct
-{
- uint32_t : 3; /*!< [2:0]Reserved */
- uint32_t aesMode : 2; /*!< [4:3]128-bit/256-bit/192-bit/128-bit-double key mode select */
- uint32_t aesDecEn : 1; /*!< [5]Encode or decode */
- uint32_t aesDecKeySel : 1; /*!< [6]Use new key or use same key as last one */
- uint32_t aesHwKeyEn : 1; /*!< [7]Enable or disable using hardware hey */
- uint32_t : 1; /*!< [8]Reserved */
- uint32_t aesIntClr : 1; /*!< [9]Clear interrupt */
- uint32_t aesIntSet : 1; /*!< [10]Set interrupt */
- uint32_t : 1; /*!< [11]Reserved */
- uint32_t aesBlockMode : 2; /*!< [13:12]ECB/CTR/CBC mode select */
- uint32_t aesIVSel : 1; /*!< [14]Use new iv or use same iv as last one */
- uint32_t : 1; /*!< [15]Reserved */
- uint32_t aesMsgLen : 16; /*!< [31:16]Number of 128-bit block */
- uint32_t aesSrcAddr; /*!< Message source address */
- uint32_t aesDstAddr; /*!< Message destination address */
- uint32_t aesIV0; /*!< Big endian initial vector(MSB) */
- uint32_t aesIV1; /*!< Big endian initial vector */
- uint32_t aesIV2; /*!< Big endian initial vector */
- uint32_t aesIV3; /*!< Big endian initial vector(LSB)(CTR mode:counter initial value) */
- uint32_t aesKey0; /*!< Big endian aes key(aes-128/256 key MSB) */
- uint32_t aesKey1; /*!< Big endian aes key */
- uint32_t aesKey2; /*!< Big endian aes key */
- uint32_t aesKey3; /*!< Big endian aes key(aes-128 key LSB) */
- uint32_t aesKey4; /*!< Big endian aes key */
- uint32_t aesKey5; /*!< Big endian aes key */
- uint32_t aesKey6; /*!< Big endian aes key */
- uint32_t aesKey7; /*!< Big endian aes key(aes-256 key LSB) */
+typedef struct {
+ uint32_t : 3; /*!< [2:0]Reserved */
+ uint32_t aesMode : 2; /*!< [4:3]128-bit/256-bit/192-bit/128-bit-double key mode select */
+ uint32_t aesDecEn : 1; /*!< [5]Encode or decode */
+ uint32_t aesDecKeySel : 1; /*!< [6]Use new key or use same key as last one */
+ uint32_t aesHwKeyEn : 1; /*!< [7]Enable or disable using hardware hey */
+ uint32_t : 1; /*!< [8]Reserved */
+ uint32_t aesIntClr : 1; /*!< [9]Clear interrupt */
+ uint32_t aesIntSet : 1; /*!< [10]Set interrupt */
+ uint32_t : 1; /*!< [11]Reserved */
+ uint32_t aesBlockMode : 2; /*!< [13:12]ECB/CTR/CBC mode select */
+ uint32_t aesIVSel : 1; /*!< [14]Use new iv or use same iv as last one */
+ uint32_t : 1; /*!< [15]Reserved */
+ uint32_t aesMsgLen : 16; /*!< [31:16]Number of 128-bit block */
+ uint32_t aesSrcAddr; /*!< Message source address */
+ uint32_t aesDstAddr; /*!< Message destination address */
+ uint32_t aesIV0; /*!< Big endian initial vector(MSB) */
+ uint32_t aesIV1; /*!< Big endian initial vector */
+ uint32_t aesIV2; /*!< Big endian initial vector */
+ uint32_t aesIV3; /*!< Big endian initial vector(LSB)(CTR mode:counter initial value) */
+ uint32_t aesKey0; /*!< Big endian aes key(aes-128/256 key MSB) */
+ uint32_t aesKey1; /*!< Big endian aes key */
+ uint32_t aesKey2; /*!< Big endian aes key */
+ uint32_t aesKey3; /*!< Big endian aes key(aes-128 key LSB) */
+ uint32_t aesKey4; /*!< Big endian aes key */
+ uint32_t aesKey5; /*!< Big endian aes key */
+ uint32_t aesKey6; /*!< Big endian aes key */
+ uint32_t aesKey7; /*!< Big endian aes key(aes-256 key LSB) */
} __attribute__((aligned(4))) SEC_Eng_AES_Link_Config_Type;
/**
* @brief SEC_ENG GMAC link config structure type definition
*/
-typedef struct
-{
- uint32_t : 9; /*!< [8:0]reserved */
- uint32_t gmacIntClr : 1; /*!< [9]Clear interrupt */
- uint32_t gmacIntSet : 1; /*!< [10]Set interrupt */
- uint32_t : 5; /*!< [15:11]reserved */
- uint32_t gmacMsgLen : 16; /*!< [31:16]Number of 128-bit block */
- uint32_t gmacSrcAddr; /*!< Message source address */
- uint32_t gmacKey0; /*!< GMAC key */
- uint32_t gmacKey1; /*!< GMAC key */
- uint32_t gmacKey2; /*!< GMAC key */
- uint32_t gmacKey3; /*!< GMAC key */
- uint32_t result[4]; /*!< Result of GMAC */
- uint32_t dummy; /*!< Not use,trigger GMAC will clear this value */
+typedef struct {
+ uint32_t : 9; /*!< [8:0]reserved */
+ uint32_t gmacIntClr : 1; /*!< [9]Clear interrupt */
+ uint32_t gmacIntSet : 1; /*!< [10]Set interrupt */
+ uint32_t : 5; /*!< [15:11]reserved */
+ uint32_t gmacMsgLen : 16; /*!< [31:16]Number of 128-bit block */
+ uint32_t gmacSrcAddr; /*!< Message source address */
+ uint32_t gmacKey0; /*!< GMAC key */
+ uint32_t gmacKey1; /*!< GMAC key */
+ uint32_t gmacKey2; /*!< GMAC key */
+ uint32_t gmacKey3; /*!< GMAC key */
+ uint32_t result[4]; /*!< Result of GMAC */
+ uint32_t dummy; /*!< Not use,trigger GMAC will clear this value */
} __attribute__((aligned(4))) SEC_Eng_GMAC_Link_Config_Type;
/**
* @brief SEC_ENG PKA status type definition
*/
-typedef struct
-{
- uint16_t primeFail : 1; /*!< [0]Prime fail */
- uint16_t errUnknown : 1; /*!< [1]Err unknown opc */
- uint16_t errOverflow : 1; /*!< [2]Err opq overflow */
- uint16_t errSrc2 : 1; /*!< [3]Err invalid src2 */
- uint16_t errSrc1 : 1; /*!< [4]Err invalid src1 */
- uint16_t errSrc0 : 1; /*!< [5]Err invalid src0 */
- uint16_t errDiv0 : 1; /*!< [6]Err div by 0 */
- uint16_t errFull : 1; /*!< [7]Err cam full */
- uint16_t lastOpc : 1; /*!< [8]Last opc */
- uint16_t opqFull : 1; /*!< [9]Opq full */
- uint16_t cmdIndex : 5; /*!< [14:10]Cmd err index */
- uint16_t errCmd : 1; /*!< [15]Err cmd */
+typedef struct {
+ uint16_t primeFail : 1; /*!< [0]Prime fail */
+ uint16_t errUnknown : 1; /*!< [1]Err unknown opc */
+ uint16_t errOverflow : 1; /*!< [2]Err opq overflow */
+ uint16_t errSrc2 : 1; /*!< [3]Err invalid src2 */
+ uint16_t errSrc1 : 1; /*!< [4]Err invalid src1 */
+ uint16_t errSrc0 : 1; /*!< [5]Err invalid src0 */
+ uint16_t errDiv0 : 1; /*!< [6]Err div by 0 */
+ uint16_t errFull : 1; /*!< [7]Err cam full */
+ uint16_t lastOpc : 1; /*!< [8]Last opc */
+ uint16_t opqFull : 1; /*!< [9]Opq full */
+ uint16_t cmdIndex : 5; /*!< [14:10]Cmd err index */
+ uint16_t errCmd : 1; /*!< [15]Err cmd */
} SEC_Eng_PKA_Status_Type;
/*@} end of group SEC_ENG_Public_Types */
@@ -330,107 +326,64 @@ typedef struct
/** @defgroup SEC_ENG_SHA_TYPE
* @{
*/
-#define IS_SEC_ENG_SHA_TYPE(type) (((type) == SEC_ENG_SHA256) || \
- ((type) == SEC_ENG_SHA224) || \
- ((type) == SEC_ENG_SHA1) || \
- ((type) == SEC_ENG_SHA1_RSVD))
+#define IS_SEC_ENG_SHA_TYPE(type) (((type) == SEC_ENG_SHA256) || ((type) == SEC_ENG_SHA224) || ((type) == SEC_ENG_SHA1) || ((type) == SEC_ENG_SHA1_RSVD))
/** @defgroup SEC_ENG_AES_TYPE
* @{
*/
-#define IS_SEC_ENG_AES_TYPE(type) (((type) == SEC_ENG_AES_ECB) || \
- ((type) == SEC_ENG_AES_CTR) || \
- ((type) == SEC_ENG_AES_CBC))
+#define IS_SEC_ENG_AES_TYPE(type) (((type) == SEC_ENG_AES_ECB) || ((type) == SEC_ENG_AES_CTR) || ((type) == SEC_ENG_AES_CBC))
/** @defgroup SEC_ENG_AES_KEY_TYPE
* @{
*/
-#define IS_SEC_ENG_AES_KEY_TYPE(type) (((type) == SEC_ENG_AES_KEY_128BITS) || \
- ((type) == SEC_ENG_AES_KEY_256BITS) || \
- ((type) == SEC_ENG_AES_KEY_192BITS) || \
- ((type) == SEC_ENG_AES_DOUBLE_KEY_128BITS))
+#define IS_SEC_ENG_AES_KEY_TYPE(type) (((type) == SEC_ENG_AES_KEY_128BITS) || ((type) == SEC_ENG_AES_KEY_256BITS) || ((type) == SEC_ENG_AES_KEY_192BITS) || ((type) == SEC_ENG_AES_DOUBLE_KEY_128BITS))
/** @defgroup SEC_ENG_AES_COUNTER_TYPE
* @{
*/
-#define IS_SEC_ENG_AES_COUNTER_TYPE(type) (((type) == SEC_ENG_AES_COUNTER_BYTE_4) || \
- ((type) == SEC_ENG_AES_COUNTER_BYTE_1) || \
- ((type) == SEC_ENG_AES_COUNTER_BYTE_2) || \
- ((type) == SEC_ENG_AES_COUNTER_BYTE_3))
+#define IS_SEC_ENG_AES_COUNTER_TYPE(type) \
+ (((type) == SEC_ENG_AES_COUNTER_BYTE_4) || ((type) == SEC_ENG_AES_COUNTER_BYTE_1) || ((type) == SEC_ENG_AES_COUNTER_BYTE_2) || ((type) == SEC_ENG_AES_COUNTER_BYTE_3))
/** @defgroup SEC_ENG_AES_VALUEUSED_TYPE
* @{
*/
-#define IS_SEC_ENG_AES_VALUEUSED_TYPE(type) (((type) == SEC_ENG_AES_USE_NEW) || \
- ((type) == SEC_ENG_AES_USE_OLD))
+#define IS_SEC_ENG_AES_VALUEUSED_TYPE(type) (((type) == SEC_ENG_AES_USE_NEW) || ((type) == SEC_ENG_AES_USE_OLD))
/** @defgroup SEC_ENG_AES_KEY_SRC_TYPE
* @{
*/
-#define IS_SEC_ENG_AES_KEY_SRC_TYPE(type) (((type) == SEC_ENG_AES_KEY_SW) || \
- ((type) == SEC_ENG_AES_KEY_HW))
+#define IS_SEC_ENG_AES_KEY_SRC_TYPE(type) (((type) == SEC_ENG_AES_KEY_SW) || ((type) == SEC_ENG_AES_KEY_HW))
/** @defgroup SEC_ENG_AES_ENDEC_TYPE
* @{
*/
-#define IS_SEC_ENG_AES_ENDEC_TYPE(type) (((type) == SEC_ENG_AES_ENCRYPTION) || \
- ((type) == SEC_ENG_AES_DECRYPTION))
+#define IS_SEC_ENG_AES_ENDEC_TYPE(type) (((type) == SEC_ENG_AES_ENCRYPTION) || ((type) == SEC_ENG_AES_DECRYPTION))
/** @defgroup SEC_ENG_PKA_REG_SIZE_TYPE
* @{
*/
-#define IS_SEC_ENG_PKA_REG_SIZE_TYPE(type) (((type) == SEC_ENG_PKA_REG_SIZE_8) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_16) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_32) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_64) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_96) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_128) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_192) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_256) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_384) || \
- ((type) == SEC_ENG_PKA_REG_SIZE_512))
+#define IS_SEC_ENG_PKA_REG_SIZE_TYPE(type) \
+ (((type) == SEC_ENG_PKA_REG_SIZE_8) || ((type) == SEC_ENG_PKA_REG_SIZE_16) || ((type) == SEC_ENG_PKA_REG_SIZE_32) || ((type) == SEC_ENG_PKA_REG_SIZE_64) || ((type) == SEC_ENG_PKA_REG_SIZE_96) \
+ || ((type) == SEC_ENG_PKA_REG_SIZE_128) || ((type) == SEC_ENG_PKA_REG_SIZE_192) || ((type) == SEC_ENG_PKA_REG_SIZE_256) || ((type) == SEC_ENG_PKA_REG_SIZE_384) \
+ || ((type) == SEC_ENG_PKA_REG_SIZE_512))
/** @defgroup SEC_ENG_PKA_OP_TYPE
* @{
*/
-#define IS_SEC_ENG_PKA_OP_TYPE(type) (((type) == SEC_ENG_PKA_OP_PPSEL) || \
- ((type) == SEC_ENG_PKA_OP_MOD2N) || \
- ((type) == SEC_ENG_PKA_OP_LDIV2N) || \
- ((type) == SEC_ENG_PKA_OP_LMUL2N) || \
- ((type) == SEC_ENG_PKA_OP_LDIV) || \
- ((type) == SEC_ENG_PKA_OP_LSQR) || \
- ((type) == SEC_ENG_PKA_OP_LMUL) || \
- ((type) == SEC_ENG_PKA_OP_LSUB) || \
- ((type) == SEC_ENG_PKA_OP_LADD) || \
- ((type) == SEC_ENG_PKA_OP_LCMP) || \
- ((type) == SEC_ENG_PKA_OP_MDIV2) || \
- ((type) == SEC_ENG_PKA_OP_MINV) || \
- ((type) == SEC_ENG_PKA_OP_MEXP) || \
- ((type) == SEC_ENG_PKA_OP_MSQR) || \
- ((type) == SEC_ENG_PKA_OP_MMUL) || \
- ((type) == SEC_ENG_PKA_OP_MREM) || \
- ((type) == SEC_ENG_PKA_OP_MSUB) || \
- ((type) == SEC_ENG_PKA_OP_MADD) || \
- ((type) == SEC_ENG_PKA_OP_RESIZE) || \
- ((type) == SEC_ENG_PKA_OP_MOVDAT) || \
- ((type) == SEC_ENG_PKA_OP_NLIR) || \
- ((type) == SEC_ENG_PKA_OP_SLIR) || \
- ((type) == SEC_ENG_PKA_OP_CLIR) || \
- ((type) == SEC_ENG_PKA_OP_CFLIRI_BUFFER) || \
- ((type) == SEC_ENG_PKA_OP_CTLIRI_PLD) || \
- ((type) == SEC_ENG_PKA_OP_CFLIR_BUFFER) || \
- ((type) == SEC_ENG_PKA_OP_CTLIR_PLD))
+#define IS_SEC_ENG_PKA_OP_TYPE(type) \
+ (((type) == SEC_ENG_PKA_OP_PPSEL) || ((type) == SEC_ENG_PKA_OP_MOD2N) || ((type) == SEC_ENG_PKA_OP_LDIV2N) || ((type) == SEC_ENG_PKA_OP_LMUL2N) || ((type) == SEC_ENG_PKA_OP_LDIV) \
+ || ((type) == SEC_ENG_PKA_OP_LSQR) || ((type) == SEC_ENG_PKA_OP_LMUL) || ((type) == SEC_ENG_PKA_OP_LSUB) || ((type) == SEC_ENG_PKA_OP_LADD) || ((type) == SEC_ENG_PKA_OP_LCMP) \
+ || ((type) == SEC_ENG_PKA_OP_MDIV2) || ((type) == SEC_ENG_PKA_OP_MINV) || ((type) == SEC_ENG_PKA_OP_MEXP) || ((type) == SEC_ENG_PKA_OP_MSQR) || ((type) == SEC_ENG_PKA_OP_MMUL) \
+ || ((type) == SEC_ENG_PKA_OP_MREM) || ((type) == SEC_ENG_PKA_OP_MSUB) || ((type) == SEC_ENG_PKA_OP_MADD) || ((type) == SEC_ENG_PKA_OP_RESIZE) || ((type) == SEC_ENG_PKA_OP_MOVDAT) \
+ || ((type) == SEC_ENG_PKA_OP_NLIR) || ((type) == SEC_ENG_PKA_OP_SLIR) || ((type) == SEC_ENG_PKA_OP_CLIR) || ((type) == SEC_ENG_PKA_OP_CFLIRI_BUFFER) || ((type) == SEC_ENG_PKA_OP_CTLIRI_PLD) \
+ || ((type) == SEC_ENG_PKA_OP_CFLIR_BUFFER) || ((type) == SEC_ENG_PKA_OP_CTLIR_PLD))
/** @defgroup SEC_ENG_INT_TYPE
* @{
*/
-#define IS_SEC_ENG_INT_TYPE(type) (((type) == SEC_ENG_INT_TRNG) || \
- ((type) == SEC_ENG_INT_AES) || \
- ((type) == SEC_ENG_INT_SHA) || \
- ((type) == SEC_ENG_INT_PKA) || \
- ((type) == SEC_ENG_INT_CDET) || \
- ((type) == SEC_ENG_INT_GMAC) || \
- ((type) == SEC_ENG_INT_ALL))
+#define IS_SEC_ENG_INT_TYPE(type) \
+ (((type) == SEC_ENG_INT_TRNG) || ((type) == SEC_ENG_INT_AES) || ((type) == SEC_ENG_INT_SHA) || ((type) == SEC_ENG_INT_PKA) || ((type) == SEC_ENG_INT_CDET) || ((type) == SEC_ENG_INT_GMAC) \
+ || ((type) == SEC_ENG_INT_ALL))
/*@} end of group SEC_ENG_Public_Constants */
@@ -453,118 +406,74 @@ void SEC_PKA_IRQHandler(void);
void SEC_AES_IRQHandler(void);
void SEC_SHA_IRQHandler(void);
#endif
-void Sec_Eng_SHA256_Init(SEC_Eng_SHA256_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, SEC_ENG_SHA_Type type,
- uint32_t shaTmpBuf[16],
- uint32_t padding[16]);
-void Sec_Eng_SHA_Start(SEC_ENG_SHA_ID_Type shaNo);
-BL_Err_Type Sec_Eng_SHA256_Update(SEC_Eng_SHA256_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, const uint8_t *input,
- uint32_t len);
+void Sec_Eng_SHA256_Init(SEC_Eng_SHA256_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, SEC_ENG_SHA_Type type, uint32_t shaTmpBuf[16], uint32_t padding[16]);
+void Sec_Eng_SHA_Start(SEC_ENG_SHA_ID_Type shaNo);
+BL_Err_Type Sec_Eng_SHA256_Update(SEC_Eng_SHA256_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, const uint8_t *input, uint32_t len);
BL_Err_Type Sec_Eng_SHA256_Finish(SEC_Eng_SHA256_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, uint8_t *hash);
-void Sec_Eng_SHA_Enable_Link(SEC_ENG_SHA_ID_Type shaNo);
-void Sec_Eng_SHA_Disable_Link(SEC_ENG_SHA_ID_Type shaNo);
-void Sec_Eng_SHA256_Link_Init(SEC_Eng_SHA256_Link_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, uint32_t linkAddr,
- uint32_t shaTmpBuf[16], uint32_t padding[16]);
-BL_Err_Type Sec_Eng_SHA256_Link_Update(SEC_Eng_SHA256_Link_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo,
- const uint8_t *input, uint32_t len);
-BL_Err_Type Sec_Eng_SHA256_Link_Finish(SEC_Eng_SHA256_Link_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo,
- uint8_t *hash);
-BL_Err_Type Sec_Eng_AES_Init(SEC_Eng_AES_Ctx *aesCtx, SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Type aesType,
- SEC_ENG_AES_Key_Type keyType, SEC_ENG_AES_EnDec_Type enDecType);
-void Sec_Eng_AES_Enable_LE(SEC_ENG_AES_ID_Type aesNo);
-void Sec_Eng_AES_Enable_BE(SEC_ENG_AES_ID_Type aesNo);
-void Sec_Eng_AES_Enable_Link(SEC_ENG_AES_ID_Type aesNo);
-void Sec_Eng_AES_Disable_Link(SEC_ENG_AES_ID_Type aesNo);
-BL_Err_Type Sec_Eng_AES_Link_Work(SEC_ENG_AES_ID_Type aesNo, uint32_t linkAddr, const uint8_t *in, uint32_t len,
- uint8_t *out);
-void Sec_Eng_AES_Set_Hw_Key_Src(SEC_ENG_AES_ID_Type aesNo, uint8_t src);
-void Sec_Eng_AES_Set_Key_IV(SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Key_Src_Type keySrc, const uint8_t *key,
- const uint8_t *iv);
-void Sec_Eng_AES_Set_Key_IV_BE(SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Key_Src_Type keySrc, const uint8_t *key,
- const uint8_t *iv);
-void Sec_Eng_AES_Set_Counter_Byte(SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Counter_Type counterType);
-BL_Err_Type Sec_Eng_AES_Crypt(SEC_Eng_AES_Ctx *aesCtx, SEC_ENG_AES_ID_Type aesNo, const uint8_t *in, uint32_t len,
- uint8_t *out);
+void Sec_Eng_SHA_Enable_Link(SEC_ENG_SHA_ID_Type shaNo);
+void Sec_Eng_SHA_Disable_Link(SEC_ENG_SHA_ID_Type shaNo);
+void Sec_Eng_SHA256_Link_Init(SEC_Eng_SHA256_Link_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, uint32_t linkAddr, uint32_t shaTmpBuf[16], uint32_t padding[16]);
+BL_Err_Type Sec_Eng_SHA256_Link_Update(SEC_Eng_SHA256_Link_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, const uint8_t *input, uint32_t len);
+BL_Err_Type Sec_Eng_SHA256_Link_Finish(SEC_Eng_SHA256_Link_Ctx *shaCtx, SEC_ENG_SHA_ID_Type shaNo, uint8_t *hash);
+BL_Err_Type Sec_Eng_AES_Init(SEC_Eng_AES_Ctx *aesCtx, SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Type aesType, SEC_ENG_AES_Key_Type keyType, SEC_ENG_AES_EnDec_Type enDecType);
+void Sec_Eng_AES_Enable_LE(SEC_ENG_AES_ID_Type aesNo);
+void Sec_Eng_AES_Enable_BE(SEC_ENG_AES_ID_Type aesNo);
+void Sec_Eng_AES_Enable_Link(SEC_ENG_AES_ID_Type aesNo);
+void Sec_Eng_AES_Disable_Link(SEC_ENG_AES_ID_Type aesNo);
+BL_Err_Type Sec_Eng_AES_Link_Work(SEC_ENG_AES_ID_Type aesNo, uint32_t linkAddr, const uint8_t *in, uint32_t len, uint8_t *out);
+void Sec_Eng_AES_Set_Hw_Key_Src(SEC_ENG_AES_ID_Type aesNo, uint8_t src);
+void Sec_Eng_AES_Set_Key_IV(SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Key_Src_Type keySrc, const uint8_t *key, const uint8_t *iv);
+void Sec_Eng_AES_Set_Key_IV_BE(SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Key_Src_Type keySrc, const uint8_t *key, const uint8_t *iv);
+void Sec_Eng_AES_Set_Counter_Byte(SEC_ENG_AES_ID_Type aesNo, SEC_ENG_AES_Counter_Type counterType);
+BL_Err_Type Sec_Eng_AES_Crypt(SEC_Eng_AES_Ctx *aesCtx, SEC_ENG_AES_ID_Type aesNo, const uint8_t *in, uint32_t len, uint8_t *out);
BL_Err_Type Sec_Eng_AES_Finish(SEC_ENG_AES_ID_Type aesNo);
BL_Err_Type Sec_Eng_Trng_Enable(void);
-void Sec_Eng_Trng_Int_Enable(void);
-void Sec_Eng_Trng_Int_Disable(void);
+void Sec_Eng_Trng_Int_Enable(void);
+void Sec_Eng_Trng_Int_Disable(void);
BL_Err_Type Sec_Eng_Trng_Read(uint8_t data[32]);
BL_Err_Type Sec_Eng_Trng_Get_Random(uint8_t *data, uint32_t len);
-void Sec_Eng_Trng_Int_Read_Trigger(void);
-void Sec_Eng_Trng_Int_Read(uint8_t data[32]);
-void Sec_Eng_Trng_Disable(void);
-void Sec_Eng_PKA_Reset(void);
-void Sec_Eng_PKA_BigEndian_Enable(void);
-void Sec_Eng_PKA_LittleEndian_Enable(void);
-void Sec_Eng_PKA_GetStatus(SEC_Eng_PKA_Status_Type *status);
-void Sec_Eng_PKA_Write_Data(SEC_ENG_PKA_REG_SIZE_Type regType, uint8_t regIndex, const uint32_t *data, uint16_t size,
- uint8_t lastOp);
-void Sec_Eng_PKA_Read_Data(SEC_ENG_PKA_REG_SIZE_Type regType, uint8_t regIdx, uint32_t *result, uint8_t retSize);
-void Sec_Eng_PKA_CREG(SEC_ENG_PKA_REG_SIZE_Type dRegType, uint8_t dRegIdx, uint8_t size, uint8_t lastOp);
-void Sec_Eng_PKA_Write_Immediate(SEC_ENG_PKA_REG_SIZE_Type regType, uint8_t regIndex, uint32_t data, uint8_t lastOp);
-void Sec_Eng_PKA_NREG(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_Move_Data(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_RESIZE(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MADD(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MSUB(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MREM(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s2RegType,
- uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MMUL(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MSQR(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s2RegType,
- uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MEXP(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MINV(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s2RegType,
- uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_MINV(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s2RegType,
- uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_LCMP(uint8_t *cout, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx);
-void Sec_Eng_PKA_LADD(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_LSUB(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_LMUL(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s1RegType,
- uint8_t s1RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_LSQR(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_LDIV(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint8_t s2RegType,
- uint8_t s2RegIdx, uint8_t lastOp);
-void Sec_Eng_PKA_LMUL2N(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint16_t bit_shift,
- uint8_t lastOp);
-void Sec_Eng_PKA_LDIV2N(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint16_t bit_shift,
- uint8_t lastOp);
-void Sec_Eng_PKA_LMOD2N(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx,
- uint16_t bit_shift,
- uint8_t lastOp);
-void Sec_Eng_PKA_GF2Mont(uint8_t dRegType, uint8_t dRegIdx, uint8_t sRegType, uint8_t sRegIdx, uint32_t size,
- uint8_t tRegType, uint8_t tRegIdx, uint8_t pRegType, uint8_t pRegIdx);
-void Sec_Eng_PKA_Mont2GF(uint8_t dRegType, uint8_t dRegIdx, uint8_t aRegType, uint8_t aRegIdx, uint8_t invrRegType,
- uint8_t invrRegIdx,
- uint8_t tRegType, uint8_t tRegIdx, uint8_t pRegType, uint8_t pRegIdx);
-void Sec_Eng_GMAC_Enable_LE(void);
-void Sec_Eng_GMAC_Enable_BE(void);
-void Sec_Eng_GMAC_Enable_Link(void);
-void Sec_Eng_GMAC_Disable_Link(void);
+void Sec_Eng_Trng_Int_Read_Trigger(void);
+void Sec_Eng_Trng_Int_Read(uint8_t data[32]);
+void Sec_Eng_Trng_Disable(void);
+void Sec_Eng_PKA_Reset(void);
+void Sec_Eng_PKA_BigEndian_Enable(void);
+void Sec_Eng_PKA_LittleEndian_Enable(void);
+void Sec_Eng_PKA_GetStatus(SEC_Eng_PKA_Status_Type *status);
+void Sec_Eng_PKA_Write_Data(SEC_ENG_PKA_REG_SIZE_Type regType, uint8_t regIndex, const uint32_t *data, uint16_t size, uint8_t lastOp);
+void Sec_Eng_PKA_Read_Data(SEC_ENG_PKA_REG_SIZE_Type regType, uint8_t regIdx, uint32_t *result, uint8_t retSize);
+void Sec_Eng_PKA_CREG(SEC_ENG_PKA_REG_SIZE_Type dRegType, uint8_t dRegIdx, uint8_t size, uint8_t lastOp);
+void Sec_Eng_PKA_Write_Immediate(SEC_ENG_PKA_REG_SIZE_Type regType, uint8_t regIndex, uint32_t data, uint8_t lastOp);
+void Sec_Eng_PKA_NREG(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_Move_Data(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_RESIZE(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MADD(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MSUB(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MREM(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MMUL(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MSQR(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MEXP(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MINV(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_MINV(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_LCMP(uint8_t *cout, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx);
+void Sec_Eng_PKA_LADD(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_LSUB(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_LMUL(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s1RegType, uint8_t s1RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_LSQR(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_LDIV(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint8_t s2RegType, uint8_t s2RegIdx, uint8_t lastOp);
+void Sec_Eng_PKA_LMUL2N(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint16_t bit_shift, uint8_t lastOp);
+void Sec_Eng_PKA_LDIV2N(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint16_t bit_shift, uint8_t lastOp);
+void Sec_Eng_PKA_LMOD2N(uint8_t dRegType, uint8_t dRegIdx, uint8_t s0RegType, uint8_t s0RegIdx, uint16_t bit_shift, uint8_t lastOp);
+void Sec_Eng_PKA_GF2Mont(uint8_t dRegType, uint8_t dRegIdx, uint8_t sRegType, uint8_t sRegIdx, uint32_t size, uint8_t tRegType, uint8_t tRegIdx, uint8_t pRegType, uint8_t pRegIdx);
+void Sec_Eng_PKA_Mont2GF(uint8_t dRegType, uint8_t dRegIdx, uint8_t aRegType, uint8_t aRegIdx, uint8_t invrRegType, uint8_t invrRegIdx, uint8_t tRegType, uint8_t tRegIdx, uint8_t pRegType,
+ uint8_t pRegIdx);
+void Sec_Eng_GMAC_Enable_LE(void);
+void Sec_Eng_GMAC_Enable_BE(void);
+void Sec_Eng_GMAC_Enable_Link(void);
+void Sec_Eng_GMAC_Disable_Link(void);
BL_Err_Type Sec_Eng_GMAC_Link_Work(uint32_t linkAddr, const uint8_t *in, uint32_t len, uint8_t *out);
-void SEC_Eng_IntMask(SEC_ENG_INT_Type intType, BL_Mask_Type intMask);
-void SEC_Eng_ClrIntStatus(SEC_ENG_INT_Type intType);
-void SEC_Eng_Int_Callback_Install(SEC_ENG_INT_Type intType, intCallback_Type *cbFun);
+void SEC_Eng_IntMask(SEC_ENG_INT_Type intType, BL_Mask_Type intMask);
+void SEC_Eng_ClrIntStatus(SEC_ENG_INT_Type intType);
+void SEC_Eng_Int_Callback_Install(SEC_ENG_INT_Type intType, intCallback_Type *cbFun);
BL_Sts_Type SEC_Eng_GetIntStatus(SEC_ENG_INT_Type intType);
/*----------*/
void SEC_Eng_Turn_On_Sec_Ring(void);
@@ -578,3 +487,6 @@ void SEC_Eng_Turn_Off_Sec_Ring(void);
/*@} end of group BL702_Peripheral_Driver */
#endif /* __BL702_SEC_ENG_H__ */
+#ifdef __cplusplus
+}
+#endif
\ No newline at end of file