From b887dd4ad28aa0ec0ceb372e8b62b9f5825e59de Mon Sep 17 00:00:00 2001 From: Srinivas Edireswarapu - I17752 Date: Fri, 27 Sep 2024 16:40:35 +0530 Subject: [PATCH] Documentation updates for release v3.7.6 (20240926) --- a00005.html | 4 +- a00008.html | 4 +- a00011.html | 6 +- a00014.html | 4 +- a00017.html | 26 +- a00020.html | 34 +- a00020.js | 4 +- a00038.html | 8 +- a00041.html | 4 +- a00044.html | 2 +- a00047.html | 10 +- a00047.js | 4 +- a00050.html | 10 +- a00050.js | 2 +- a00056.html | 8 +- a00059.html | 8 +- a00062.html | 16 +- a00062.js | 10 +- a00065.html | 14 +- a00065.js | 8 +- a00068.html | 6 +- a00068.js | 2 +- a00071.html | 22 +- a00071.js | 18 +- a00074.html | 2 +- a00077.html | 2 +- a00080.html | 6 +- a00083.html | 6 +- a00086.html | 6 +- a00089.html | 6 +- a00092.html | 8 +- a00095.html | 8 +- a00098.html | 14 +- a00101.html | 8 +- a00104.html | 8 +- a00107.html | 8 +- a00110.html | 8 +- a00113.html | 8 +- a00119.html | 124 +- a00122.html | 229 - a00128.html | 68 +- a00128.js | 3 +- a00131.html | 72 +- a00131.js | 3 +- a00221.html | 593 -- a00221.js | 153 - a00224.html | 613 -- a00224.js | 153 - a00227.html | 493 +- a00230.html | 509 +- a00233.html | 59 +- a00233.js | 4 - a00239.html | 56 +- a00245.html | 32 +- a00245.js | 8 - a00248.html | 170 - a00248.js | 15 - a00251.html | 817 +-- a00251.js | 27 +- a00254.html | 140 +- a00254.js | 33 +- a00257.html | 1109 ++- a00257.js | 57 +- a00260.html | 139 +- a00260.js | 22 +- a00263.html | 901 +-- a00263.js | 71 +- a00266.html | 168 +- a00269.html | 664 +- a00272.html | 199 +- a00272.js | 16 - a00275.html | 57 +- a00278.html | 79 +- a00278.js | 17 +- a00281.html | 91 +- a00281.js | 16 - a00284.html | 72 +- a00284.js | 13 +- a00287.html | 197 +- a00287.js | 28 +- a00290.html | 86 +- a00290.js | 18 +- a00293.html | 297 +- a00293.js | 81 +- a00296.html | 56 +- a00299.html | 200 +- a00299.js | 72 +- a00302.html | 18 +- a00305.html | 44 +- a00305.js | 9 +- a00308.html | 18 +- a00311.html | 32 +- a00311.js | 6 +- a00314.html | 19 +- a00317.html | 402 +- a00317.js | 9 +- a00320.html | 280 +- a00320.js | 8 - a00323.html | 350 +- a00323.js | 12 +- a00326.html | 281 +- a00329.html | 293 +- a00332.html | 18 +- a00335.html | 16 +- a00338.html | 48 +- a00338.js | 11 - a00344.html | 48 +- a00347.html | 406 -- a00347.js | 11 - a00350.html | 2149 +----- a00350.js | 441 -- a00353.html | 493 +- a00353.js | 22 +- a00356.html | 2149 +++++- a00359.html | 420 +- a00362.html | 18 +- a00365.html | 376 +- a00368.html | 19 +- a00371.html | 463 +- a00371.js | 5 - a00374.html | 155 +- a00374.js | 11 - a00377.html | 116 +- a00380.html | 154 +- a00383.html | 40 +- a00383.js | 7 - a00386.html | 18 +- a00389.html | 49 +- a00389.js | 9 +- a00392.html | 18 +- a00395.html | 43 +- a00398.html | 18 +- a00401.html | 18 +- a00404.html | 18 +- a00407.html | 18 +- a00410.html | 35 +- a00413.html | 36 +- a00416.html | 18 +- a00419.html | 18 +- a00422.html | 18 +- a00425.html | 18 +- a00428.html | 19 +- a00431.html | 17 +- a00446.html | 121 - a00449.html | 123 - a00452.html | 123 - a00455.html | 122 - a00458.html | 18 +- a00461.html | 18 +- a00464.html | 20 +- a00467.html | 19 +- a00470.html | 37 +- a00473.html | 17 +- a00476.html | 20 +- a00479.html | 28 +- a00482.html | 48 +- a00485.html | 33 +- a00488.html | 190 +- a00488.js | 11 - a00491.html | 240 +- a00491.js | 14 - a00494.html | 30 +- a00497.html | 77 +- a00497.js | 4 - a00500.html | 32 +- a00503.html | 212 +- a00503.js | 9 +- a00506.html | 482 +- a00506.js | 24 +- a00512.html | 79 +- a00512.js | 7 +- a00515.html | 139 +- a00515.js | 23 - a00524.html | 149 - a00524.js | 9 - a00533.html | 157 - a00533.js | 5 - a00536.html | 328 - a00536.js | 8 - a00539.html | 68 +- a00539.js | 15 +- a00542.html | 166 - a00542.js | 13 - a00545.html | 141 - a00548.html | 68 +- a00548.js | 9 +- a00551.html | 247 +- a00551.js | 6 +- a00554.html | 78 +- a00554.js | 13 +- a00557.html | 80 +- a00557.js | 16 +- a00563.html | 325 +- a00563.js | 14 +- a00566.html | 79 +- a00566.js | 11 +- a00569.html | 67 +- a00569.js | 5 +- a00572.html | 74 +- a00572.js | 16 +- a00575.html | 140 - a00578.html | 313 +- a00578.js | 10 +- a00581.html | 88 +- a00581.js | 20 +- a00584.html | 297 +- a00584.js | 7 +- a00587.html | 377 +- a00587.js | 16 +- a00590.html | 61 +- a00590.js | 12 - a00593.html | 28 +- a00593.js | 6 +- a00596.html | 303 +- a00596.js | 15 +- a00599.html | 316 +- a00599.js | 17 +- a00602.html | 362 +- a00602.js | 8 +- a00605.html | 53 +- a00605.js | 12 +- a00608.html | 49 +- a00608.js | 7 +- a00611.html | 183 +- a00611.js | 2 - a00614.html | 113 +- a00614.js | 14 +- a00617.html | 75 +- a00617.js | 9 +- a00620.html | 86 +- a00620.js | 12 +- a00623.html | 72 +- a00623.js | 11 +- a00626.html | 344 +- a00626.js | 16 +- a00629.html | 81 +- a00629.js | 6 +- a00632.html | 56 +- a00635.html | 352 +- a00635.js | 31 +- a00638.html | 532 +- a00638.js | 32 +- a00641.html | 84 +- a00644.html | 43 +- a00653.html | 480 +- a00653.js | 32 +- a00656.html | 1440 +--- a00656.js | 32 - a00662.html | 1476 ---- a00662.js | 31 - a00665.html | 267 - a00665.js | 15 - a00674.html | 145 - a00674.js | 5 - a00677.html | 1265 +++- a00677.js | 29 +- a00680.html | 247 +- a00680.js | 19 +- a00683.html | 157 - a00683.js | 6 - a00689.html | 42 +- a00692.html | 86 +- a00698.html | 63 +- a00698.js | 7 +- a00701.html | 161 - a00701.js | 5 - a00704.html | 51 +- a00704.js | 5 - a00707.html | 54 +- a00710.html | 139 - a00713.html | 53 +- a00713.js | 5 +- a00716.html | 66 +- a00716.js | 3 +- a00719.html | 81 +- a00719.js | 6 +- a00722.html | 132 +- a00722.js | 12 - a00725.html | 112 +- a00725.js | 14 - a00728.html | 127 +- a00728.js | 13 +- a00731.html | 314 +- a00731.js | 69 +- a00734.html | 92 +- a00737.html | 118 +- a00740.html | 167 +- a00740.js | 15 +- a00743.html | 217 +- a00743.js | 20 +- a00746.html | 320 +- a00746.js | 69 +- a00749.html | 72 +- a00749.js | 4 - a00752.html | 63 +- a00752.js | 7 - a00755.html | 164 +- a00755.js | 11 +- a00758.html | 176 +- a00758.js | 14 +- a00761.html | 66 +- a00761.js | 9 +- a00764.html | 80 +- a00764.js | 4 +- a00767.html | 128 +- a00767.js | 9 +- a00770.html | 119 +- a00770.js | 10 +- a00773.html | 65 +- a00776.html | 64 +- a00785.html | 114 +- a00788.html | 58 +- a00788.js | 6 - a00791.html | 40 +- a00794.html | 120 - a00797.html | 119 - a00800.html | 532 +- a00800.js | 18 - a00803.html | 117 +- a00803.js | 4 +- a00806.html | 93 +- a00806.js | 23 - a01436.html | 123 - a01438.html | 664 -- a01438.js | 17 - a01439.html | 7963 --------------------- a01439.js | 174 - a01440.html | 116 - a01441.html | 375 - a01441.js | 15 - a01442.html | 816 --- a01442.js | 47 - a01443.html | 3035 -------- a01443.js | 148 - a01444.html | 1199 ---- a01444.js | 29 - a01445.html | 137 - a01445.js | 4 - a01446.html | 3410 --------- a01446.js | 100 - a01446_md_lib_hal_README_dup.js | 19 - a01447.html | 540 -- a01447.js | 218 - a01448.html | 116 - a01449.html | 312 - a01449.js | 10 - a01450.html | 1396 ---- a01450.js | 119 - a01451.html | 153 - a01451.js | 39 - a01452.html | 5977 ---------------- a01452.js | 130 - a01453.html | 802 --- a01453.js | 29 - a01454.html | 123 - a01454.js | 4 - a01455.html | 134 - a01455.js | 6 - a01456.html | 153 - a01456.js | 19 - a01457.html | 193 - a01457.js | 39 - a01458.html | 294 - a01458.js | 23 - a01459.html | 1120 --- a01459.js | 32 - a01460.html | 654 -- a01461.html | 172 - a01461.js | 5 - a01462.html | 480 -- a01468.html | 383 +- a01469.html | 734 +- a01480.html | 715 +- a01484.html | 98 +- a01488.html | 88 +- a01492.html | 128 - a01496.html | 60 +- a01500.html | 125 - a01504.html | 134 - a01508.html | 173 - a01508.js | 5 - a01512.html | 125 - a01516.html | 281 - a01516.js | 4 - a01580.html | 144 - a01584.html | 195 - a01584.js | 7 - a01588.html | 141 - a01592.html | 143 - a01592.js | 8 - a01596.html | 131 - a01596.js | 5 - a01600.html | 139 - a01600.js | 7 - a01604.html | 136 - a01604.js | 6 - a01608.html | 159 - a01608.js | 12 - a01612.html | 154 - a01612.js | 5 - a01616.html | 131 - a01616.js | 6 - a01620.html | 140 - a01624.html | 173 - a01628.html | 188 - a01632.html | 203 - a01636.html | 132 - a01640.html | 131 - a01644.html | 135 - a01644.js | 7 - a01648.html | 148 - a01648.js | 4 - a01652.html | 205 - a01652.js | 8 - a01656.html | 128 - a01660.html | 144 - a01664.html | 125 - a01668.html | 125 - a01672.html | 125 - a01676.html | 131 - a01680.html | 125 - a01684.html | 125 - a01688.html | 141 - a01692.html | 158 - a01692.js | 11 - a01696.html | 141 - a01696.js | 6 - a01700.html | 146 - a01700.js | 8 - a01704.html | 135 - a01704.js | 7 - a01708.html | 155 - a01708.js | 12 - a01712.html | 139 - a01712.js | 8 - a01716.html | 147 - a01716.js | 10 - a01720.html | 158 - a01720.js | 11 - a01724.html | 154 - a01724.js | 10 - a01728.html | 170 - a01728.js | 14 - a01732.html | 143 - a01732.js | 5 - a01736.html | 154 - a01736.js | 10 - a01740.html | 150 - a01740.js | 9 - a01744.html | 146 - a01744.js | 8 - a01748.html | 134 - a01748.js | 5 - a01752.html | 193 - a01752.js | 13 - a01756.html | 147 - a01760.html | 142 - a01760.js | 7 - a01764.html | 154 - a01764.js | 10 - a01768.html | 178 - a01768.js | 16 - a01772.html | 141 - a01776.html | 141 - a01780.html | 122 - a01784.html | 125 - a01788.html | 125 - a01792.html | 125 - a01796.html | 122 - a01800.html | 125 - a01804.html | 125 - a01808.html | 130 - a01812.html | 122 - a01816.html | 122 - a01820.html | 125 - a01824.html | 125 - a01828.html | 126 - a01832.html | 126 - a01836.html | 158 - a01836.js | 5 - a01840.html | 260 - a01840.js | 11 - a01844.html | 146 - a01848.html | 125 - a01852.html | 209 - a01852.js | 7 - a01856.html | 158 - a01856.js | 5 - a01860.html | 154 - a01872.html | 159 - a01876.html | 174 - a01876.js | 4 - a01880.html | 125 - a01884.html | 134 - a01888.html | 134 - a01892.html | 173 - a01896.html | 131 - a01900.html | 128 - a01904.html | 128 - a01908.html | 128 - a01912.html | 128 - a01916.html | 137 - a01920.html | 134 - a01924.html | 128 - a01928.html | 134 - a01932.html | 146 - a01936.html | 149 - a01940.html | 134 - a01944.html | 146 - a01948.html | 149 - a01952.html | 137 - a01956.html | 125 - a01960.html | 125 - a01964.html | 125 - a01968.html | 131 - a01972.html | 128 - a01976.html | 128 - a01980.html | 128 - a01984.html | 152 - a01988.html | 161 - a01992.html | 137 - a01996.html | 128 - a02000.html | 131 - a02004.html | 125 - a02008.html | 137 - a02012.html | 137 - a02016.html | 137 - a02020.html | 131 - a02024.html | 128 - a02028.html | 140 - a02032.html | 128 - a02036.html | 143 - a02040.html | 143 - a02044.html | 125 - a02048.html | 146 - a02052.html | 146 - a02056.html | 128 - a02060.html | 125 - a02064.html | 125 - a02068.html | 131 - a02072.html | 125 - a02076.html | 137 - a02080.html | 137 - a02084.html | 137 - a02088.html | 137 - a02092.html | 125 - a02096.html | 128 - a02100.html | 128 - a02104.html | 131 - a02108.html | 131 - a02112.html | 125 - a02116.html | 128 - a02120.html | 140 - a02124.html | 137 - a02128.html | 128 - a02132.html | 134 - a02136.html | 134 - a02140.html | 128 - a02144.html | 155 - a02144.png | Bin 684 -> 0 bytes a02148.html | 154 - a02148.png | Bin 699 -> 0 bytes a02152.html | 155 - a02152.png | Bin 685 -> 0 bytes a02156.html | 157 - a02156.png | Bin 1182 -> 0 bytes a02160.html | 163 - a02160.png | Bin 705 -> 0 bytes a02164.html | 162 - a02164.png | Bin 688 -> 0 bytes a02168.html | 154 - a02168.png | Bin 713 -> 0 bytes a02172.html | 130 - a02172.png | Bin 1175 -> 0 bytes a02176.html | 162 - a02176.png | Bin 1054 -> 0 bytes a02180.html | 186 - a02180.png | Bin 1147 -> 0 bytes a02184.html | 171 - a02184.png | Bin 1260 -> 0 bytes a02188.html | 186 - a02188.png | Bin 1064 -> 0 bytes a02192.html | 171 - a02192.png | Bin 1152 -> 0 bytes a02196.html | 180 - a02196.png | Bin 1328 -> 0 bytes a02200.html | 195 - a02200.png | Bin 1039 -> 0 bytes a02204.html | 206 - a02204.png | Bin 1163 -> 0 bytes a02208.html | 194 - a02208.png | Bin 1189 -> 0 bytes a02212.html | 165 - a02212.png | Bin 1116 -> 0 bytes a02216.html | 193 - a02216.png | Bin 1321 -> 0 bytes a02220.html | 162 - a02220.png | Bin 1091 -> 0 bytes a02224.html | 167 - a02224.png | Bin 688 -> 0 bytes a02228.html | 166 - a02228.png | Bin 8254 -> 0 bytes a02232.html | 178 - a02232.js | 4 - a02232.png | Bin 731 -> 0 bytes a02236.html | 221 - a02236.js | 5 - a02236.png | Bin 773 -> 0 bytes a02240.html | 133 - a02240.png | Bin 588 -> 0 bytes a02244.html | 156 - a02244.png | Bin 688 -> 0 bytes a02248.html | 156 - a02248.png | Bin 680 -> 0 bytes a02252.html | 157 - a02252.png | Bin 689 -> 0 bytes a02256.html | 157 - a02256.png | Bin 704 -> 0 bytes a02260.html | 158 - a02260.png | Bin 700 -> 0 bytes a02264.html | 156 - a02264.png | Bin 693 -> 0 bytes a02268.html | 161 - a02268.png | Bin 684 -> 0 bytes a02272.html | 156 - a02272.png | Bin 659 -> 0 bytes a02276.html | 157 - a02276.png | Bin 776 -> 0 bytes a02280.html | 161 - a02280.png | Bin 686 -> 0 bytes a02284.html | 162 - a02284.png | Bin 694 -> 0 bytes a02288.html | 156 - a02288.png | Bin 702 -> 0 bytes a02292.html | 164 - a02292.png | Bin 689 -> 0 bytes a02296.html | 203 - a02296.png | Bin 1160 -> 0 bytes a02300.html | 208 - a02300.png | Bin 1131 -> 0 bytes a02304.html | 213 - a02304.png | Bin 1115 -> 0 bytes a02308.html | 157 - a02308.png | Bin 26310 -> 0 bytes a02312.html | 123 - a02312.png | Bin 1198 -> 0 bytes a02316.html | 123 - a02316.png | Bin 1466 -> 0 bytes a02320.html | 123 - a02320.png | Bin 1436 -> 0 bytes a02324.html | 123 - a02324.png | Bin 1211 -> 0 bytes a02328.html | 123 - a02328.png | Bin 1518 -> 0 bytes a02332.html | 123 - a02332.png | Bin 1152 -> 0 bytes a02336.html | 123 - a02336.png | Bin 1135 -> 0 bytes a02340.html | 123 - a02340.png | Bin 1292 -> 0 bytes a02344.html | 123 - a02344.png | Bin 1156 -> 0 bytes a02348.html | 123 - a02348.png | Bin 1145 -> 0 bytes a02352.html | 123 - a02352.png | Bin 1164 -> 0 bytes a02356.html | 123 - a02356.png | Bin 1195 -> 0 bytes a02360.html | 123 - a02360.png | Bin 1294 -> 0 bytes a02364.html | 123 - a02364.png | Bin 1200 -> 0 bytes a02368.html | 123 - a02368.png | Bin 1160 -> 0 bytes a02372.html | 123 - a02372.png | Bin 1152 -> 0 bytes a02376.html | 123 - a02376.png | Bin 1201 -> 0 bytes a02380.html | 123 - a02380.png | Bin 1457 -> 0 bytes a02384.html | 123 - a02384.png | Bin 1155 -> 0 bytes a02388.html | 123 - a02388.png | Bin 1451 -> 0 bytes a02392.html | 123 - a02392.png | Bin 1359 -> 0 bytes a02396.html | 123 - a02396.png | Bin 1279 -> 0 bytes a02400.html | 123 - a02400.png | Bin 1160 -> 0 bytes a02404.html | 123 - a02404.png | Bin 1201 -> 0 bytes a02408.html | 124 - a02408.png | Bin 1170 -> 0 bytes a02412.html | 123 - a02412.png | Bin 1285 -> 0 bytes a02416.html | 123 - a02416.png | Bin 1186 -> 0 bytes a02420.html | 123 - a02420.png | Bin 1192 -> 0 bytes a02424.html | 123 - a02424.png | Bin 1374 -> 0 bytes a02428.html | 123 - a02428.png | Bin 1433 -> 0 bytes a02432.html | 123 - a02432.png | Bin 1197 -> 0 bytes a02436.html | 123 - a02436.png | Bin 1366 -> 0 bytes a02440.html | 123 - a02440.png | Bin 1213 -> 0 bytes a02444.html | 123 - a02444.png | Bin 1281 -> 0 bytes a02448.html | 123 - a02448.png | Bin 1378 -> 0 bytes a02452.html | 189 - a02452.png | Bin 1057 -> 0 bytes a02456.html | 171 - a02456.png | Bin 1059 -> 0 bytes a02460.html | 210 - a02460.png | Bin 1084 -> 0 bytes a02464.html | 189 - a02464.png | Bin 1007 -> 0 bytes a02468.html | 216 - a02468.png | Bin 1103 -> 0 bytes a02472.html | 185 - a02472.png | Bin 1086 -> 0 bytes a02476.html | 186 - a02476.png | Bin 1092 -> 0 bytes a02480.html | 192 - a02480.png | Bin 1091 -> 0 bytes a02484.html | 191 - a02484.png | Bin 1081 -> 0 bytes a02488.html | 188 - a02488.png | Bin 1093 -> 0 bytes a02492.html | 191 - a02492.png | Bin 1125 -> 0 bytes a02496.html | 194 - a02496.png | Bin 1073 -> 0 bytes a02500.html | 229 - a02500.png | Bin 1099 -> 0 bytes a02504.html | 155 - a02508.html | 147 - a02512.html | 203 - a02512.js | 5 - a02512.png | Bin 1569 -> 0 bytes a02516.html | 210 - a02516.js | 5 - a02516.png | Bin 11119 -> 0 bytes a02520.html | 264 - a02520.png | Bin 1010 -> 0 bytes a02524.html | 128 - a02524.png | Bin 716 -> 0 bytes a02528.html | 128 - a02528.png | Bin 646 -> 0 bytes a02532.html | 128 - a02532.png | Bin 607 -> 0 bytes a02536.html | 774 -- a02536.png | Bin 619 -> 0 bytes a02825.html | 125 - a02826.html | 127 - a02827.html | 345 - a02828.html | 118 - a02829.html | 157 - a02831.html | 121 - a02836.html | 114 - a02837.html | 251 - a02838.html | 134 - a02839.html | 713 -- a02840.html | 140 - annotated.html | 520 +- annotated_dup.js | 518 +- classes.html | 48 +- dir_0680cb466dcc0d680630f5d267d4b7d1.html | 2 +- dir_0da7b7c68dd2857c05256c12c60bb57c.html | 2 +- dir_0f8c318486f9c8f97febe2dc0542d496.html | 10 +- dir_0f8c318486f9c8f97febe2dc0542d496.js | 4 +- dir_18075c3a94726308684965563d2ee6c8.html | 2 +- dir_26647cdac0a1f8c717d44b4eb3b4ec89.html | 66 +- dir_26647cdac0a1f8c717d44b4eb3b4ec89.js | 32 +- dir_2d87885bbe6729211aeb398dfc685454.html | 10 +- dir_2d87885bbe6729211aeb398dfc685454.js | 4 +- dir_39966be8f8e069f6fa92c98611834f6b.html | 18 +- dir_39966be8f8e069f6fa92c98611834f6b.js | 8 +- dir_6319b470d978b666f57c44c2de446197.html | 2 +- dir_67fd8893924321d7b171cf185824f934.html | 2 +- dir_695be77052103537ae3c41f50bd7e0cc.html | 69 +- dir_695be77052103537ae3c41f50bd7e0cc.js | 33 +- dir_7837fde3ab9c1fb2fc5be7b717af8d79.html | 2 +- dir_87abda79916a436a3f9fdf465608c5f5.html | 2 +- dir_92f10bc6a7ace15606cb0622f4eb49bb.html | 2 +- dir_97aefd0d527b934f1d99a682da8fe6a9.html | 90 +- dir_97aefd0d527b934f1d99a682da8fe6a9.js | 44 +- dir_99d508b4fb3d57104ef2cdbd94e6a78a.html | 2 +- dir_a5bdbfbbaa7895161d62825676df7980.html | 2 +- dir_b2187fb9aff39e17c00391b7def58804.html | 14 +- dir_b2187fb9aff39e17c00391b7def58804.js | 6 +- dir_b3c25b642613ea6a80d1cd59c6d313a8.html | 142 +- dir_b3c25b642613ea6a80d1cd59c6d313a8.js | 70 +- dir_b9d9bcd31faf1443658640fef106169e.html | 14 +- dir_b9d9bcd31faf1443658640fef106169e.js | 6 +- dir_c4875bffc6c901e8f9ea57d13c10be7a.html | 10 +- dir_c4875bffc6c901e8f9ea57d13c10be7a.js | 4 +- dir_d422163b96683743ed3963d4aac17747.html | 2 +- dir_dbc902ed54f25d1382ab433b67c4a47f.html | 2 +- dir_e870e4dac26de7990352b1cb7547818f.html | 136 +- dir_e870e4dac26de7990352b1cb7547818f.js | 70 +- dir_ec1cbef6cba079ce838897574eab818a.html | 10 +- dir_ec1cbef6cba079ce838897574eab818a.js | 4 +- dir_fe677a742bdf73affcb7505b38a59233.html | 144 +- dir_fe677a742bdf73affcb7505b38a59233.js | 70 +- files.html | 357 +- functions.html | 235 +- functions_func.html | 10 +- functions_vars.html | 227 +- globals.html | 1070 +-- globals_b.html | 10 +- globals_c.html | 304 +- globals_d.html | 44 +- globals_defs.html | 463 +- globals_defs_b.html | 10 +- globals_defs_c.html | 110 +- globals_defs_d.html | 30 +- globals_defs_e.html | 6 +- globals_defs_g.html | 56 +- globals_defs_h.html | 26 +- globals_defs_i.html | 40 +- globals_defs_k.html | 78 +- globals_defs_l.html | 24 +- globals_defs_m.html | 44 +- globals_defs_n.html | 54 +- globals_defs_o.html | 4 +- globals_defs_p.html | 26 +- globals_defs_r.html | 32 +- globals_defs_s.html | 126 +- globals_defs_u.html | 20 +- globals_defs_v.html | 60 +- globals_defs_w.html | 24 +- globals_e.html | 6 +- globals_enum.html | 16 +- globals_eval.html | 80 +- globals_func.html | 523 +- globals_func_b.html | 2 +- globals_func_c.html | 188 +- globals_func_d.html | 6 +- globals_func_h.html | 142 +- globals_func_i.html | 32 +- globals_func_k.html | 8 +- globals_func_l.html | 8 +- globals_func_n.html | 4 +- globals_func_p.html | 74 +- globals_func_r.html | 6 +- globals_func_s.html | 16 +- globals_func_t.html | 28 +- globals_func_w.html | 3 +- globals_g.html | 56 +- globals_h.html | 168 +- globals_i.html | 70 +- globals_k.html | 84 +- globals_l.html | 30 +- globals_m.html | 44 +- globals_n.html | 56 +- globals_o.html | 4 +- globals_p.html | 134 +- globals_r.html | 36 +- globals_s.html | 162 +- globals_t.html | 48 +- globals_type.html | 62 +- globals_u.html | 20 +- globals_v.html | 60 +- globals_vars.html | 34 +- globals_w.html | 25 +- hierarchy.html | 522 +- hierarchy.js | 498 +- index.html | 28 +- index.js | 20 +- modules.html | 28 +- modules.js | 26 +- namespacemembers.html | 378 +- namespacemembers_func.html | 378 +- namespaces.html | 220 +- namespaces_dup.js | 6 +- navtreedata.js | 331 +- navtreeindex0.js | 500 +- navtreeindex1.js | 500 +- navtreeindex10.js | 179 +- navtreeindex2.js | 500 +- navtreeindex3.js | 500 +- navtreeindex4.js | 500 +- navtreeindex5.js | 500 +- navtreeindex6.js | 500 +- navtreeindex7.js | 500 +- navtreeindex8.js | 500 +- navtreeindex9.js | 500 +- pages.html | 27 +- search/all_0.js | 60 +- search/all_1.js | 1411 ++-- search/all_10.js | 258 +- search/all_11.js | 50 +- search/all_12.js | 255 +- search/all_13.js | 74 +- search/all_14.js | 28 +- search/all_15.js | 68 +- search/all_16.js | 29 +- search/all_17.js | 2 +- search/all_18.js | 6 +- search/all_2.js | 26 +- search/all_3.js | 636 +- search/all_4.js | 72 +- search/all_5.js | 10 +- search/all_6.js | 6 +- search/all_7.js | 76 +- search/all_8.js | 241 +- search/all_9.js | 104 +- search/all_a.js | 2 +- search/all_b.js | 96 +- search/all_c.js | 42 +- search/all_d.js | 64 +- search/all_e.js | 64 +- search/all_f.js | 14 +- search/classes_0.js | 24 +- search/classes_1.js | 175 +- search/classes_10.js | 13 +- search/classes_11.js | 8 +- search/classes_12.js | 6 +- search/classes_13.js | 2 +- search/classes_14.js | 2 +- search/classes_15.js | 2 +- search/classes_16.js | 2 +- search/classes_2.js | 8 +- search/classes_3.js | 164 +- search/classes_4.js | 6 +- search/classes_5.js | 4 +- search/classes_6.js | 2 +- search/classes_7.js | 2 +- search/classes_8.js | 6 +- search/classes_9.js | 12 +- search/classes_a.js | 2 +- search/classes_b.js | 6 +- search/classes_c.js | 2 +- search/classes_d.js | 6 +- search/classes_e.js | 34 +- search/classes_f.js | 6 +- search/defines_0.js | 393 +- search/defines_1.js | 8 +- search/defines_10.js | 18 +- search/defines_11.js | 58 +- search/defines_12.js | 22 +- search/defines_2.js | 108 +- search/defines_3.js | 18 +- search/defines_4.js | 4 +- search/defines_5.js | 54 +- search/defines_6.js | 24 +- search/defines_7.js | 38 +- search/defines_8.js | 76 +- search/defines_9.js | 22 +- search/defines_a.js | 38 +- search/defines_b.js | 52 +- search/defines_c.js | 2 +- search/defines_d.js | 24 +- search/defines_e.js | 30 +- search/defines_f.js | 124 +- search/enums_0.js | 14 +- search/enumvalues_0.js | 20 +- search/enumvalues_1.js | 6 +- search/enumvalues_2.js | 10 +- search/enumvalues_3.js | 22 +- search/enumvalues_4.js | 20 +- search/files_0.js | 125 +- search/files_1.js | 82 +- search/files_2.js | 54 +- search/files_4.js | 4 +- search/files_5.js | 70 +- search/files_6.js | 16 +- search/files_8.js | 4 +- search/functions_0.js | 36 +- search/functions_1.js | 571 +- search/functions_10.js | 2 +- search/functions_11.js | 3 +- search/functions_3.js | 204 +- search/functions_4.js | 4 +- search/functions_5.js | 2 +- search/functions_6.js | 16 +- search/functions_7.js | 140 +- search/functions_8.js | 30 +- search/functions_9.js | 6 +- search/functions_a.js | 8 +- search/functions_b.js | 2 +- search/functions_c.js | 72 +- search/functions_d.js | 4 +- search/functions_e.js | 42 +- search/functions_f.js | 26 +- search/groups_0.js | 6 +- search/groups_1.js | 4 +- search/groups_2.js | 4 +- search/groups_3.js | 4 +- search/groups_4.js | 2 +- search/groups_5.js | 2 +- search/groups_6.js | 2 +- search/groups_7.js | 2 +- search/namespaces_0.js | 24 +- search/namespaces_1.js | 4 +- search/pages_0.js | 3 +- search/pages_1.js | 6 +- search/pages_2.js | 2 +- search/pages_3.js | 2 +- search/pages_4.js | 2 +- search/pages_5.js | 2 +- search/pages_6.js | 4 +- search/pages_7.js | 2 +- search/pages_8.js | 6 +- search/pages_9.js | 4 +- search/pages_a.js | 2 +- search/typedefs_0.js | 52 +- search/typedefs_1.js | 2 +- search/typedefs_2.js | 2 +- search/typedefs_4.js | 6 +- search/variables_0.js | 6 +- search/variables_1.js | 6 +- search/variables_10.js | 26 +- search/variables_11.js | 12 +- search/variables_12.js | 4 +- search/variables_13.js | 6 +- search/variables_14.js | 4 +- search/variables_2.js | 34 +- search/variables_3.js | 22 +- search/variables_4.js | 2 +- search/variables_5.js | 2 +- search/variables_6.js | 4 +- search/variables_7.js | 9 +- search/variables_8.js | 22 +- search/variables_9.js | 8 +- search/variables_a.js | 4 +- search/variables_b.js | 14 +- search/variables_c.js | 4 +- search/variables_d.js | 10 +- search/variables_e.js | 46 +- search/variables_f.js | 10 +- 1037 files changed, 29443 insertions(+), 105414 deletions(-) delete mode 100644 a00122.html delete mode 100644 a00221.html delete mode 100644 a00221.js delete mode 100644 a00224.html delete mode 100644 a00224.js delete mode 100644 a00233.js delete mode 100644 a00245.js delete mode 100644 a00248.html delete mode 100644 a00248.js delete mode 100644 a00272.js delete mode 100644 a00281.js delete mode 100644 a00320.js delete mode 100644 a00338.js delete mode 100644 a00347.html delete mode 100644 a00347.js delete mode 100644 a00350.js delete mode 100644 a00371.js delete mode 100644 a00374.js delete mode 100644 a00383.js delete mode 100644 a00446.html delete mode 100644 a00449.html delete mode 100644 a00452.html delete mode 100644 a00455.html delete mode 100644 a00488.js delete mode 100644 a00491.js delete mode 100644 a00497.js delete mode 100644 a00515.js delete mode 100644 a00524.html delete mode 100644 a00524.js delete mode 100644 a00533.html delete mode 100644 a00533.js delete mode 100644 a00536.html delete mode 100644 a00536.js delete mode 100644 a00542.html delete mode 100644 a00542.js delete mode 100644 a00545.html delete mode 100644 a00575.html delete mode 100644 a00590.js delete mode 100644 a00656.js delete mode 100644 a00662.html delete mode 100644 a00662.js delete mode 100644 a00665.html delete mode 100644 a00665.js delete mode 100644 a00674.html delete mode 100644 a00674.js delete mode 100644 a00683.html delete mode 100644 a00683.js delete mode 100644 a00701.html delete mode 100644 a00701.js delete mode 100644 a00704.js delete mode 100644 a00710.html delete mode 100644 a00722.js delete mode 100644 a00725.js delete mode 100644 a00749.js delete mode 100644 a00752.js delete mode 100644 a00788.js delete mode 100644 a00794.html delete mode 100644 a00797.html delete mode 100644 a00800.js delete mode 100644 a00806.js delete mode 100644 a01436.html delete mode 100644 a01438.html delete mode 100644 a01438.js delete mode 100644 a01439.html delete mode 100644 a01439.js delete mode 100644 a01440.html delete mode 100644 a01441.html delete mode 100644 a01441.js delete mode 100644 a01442.html delete mode 100644 a01442.js delete mode 100644 a01443.html delete mode 100644 a01443.js delete mode 100644 a01444.html delete mode 100644 a01444.js delete mode 100644 a01445.html delete mode 100644 a01445.js delete mode 100644 a01446.html delete mode 100644 a01446.js delete mode 100644 a01446_md_lib_hal_README_dup.js delete mode 100644 a01447.html delete mode 100644 a01447.js delete mode 100644 a01448.html delete mode 100644 a01449.html delete mode 100644 a01449.js delete mode 100644 a01450.html delete mode 100644 a01450.js delete mode 100644 a01451.html delete mode 100644 a01451.js delete mode 100644 a01452.html delete mode 100644 a01452.js delete mode 100644 a01453.html delete mode 100644 a01453.js delete mode 100644 a01454.html delete mode 100644 a01454.js delete mode 100644 a01455.html delete mode 100644 a01455.js delete mode 100644 a01456.html delete mode 100644 a01456.js delete mode 100644 a01457.html delete mode 100644 a01457.js delete mode 100644 a01458.html delete mode 100644 a01458.js delete mode 100644 a01459.html delete mode 100644 a01459.js delete mode 100644 a01460.html delete mode 100644 a01461.html delete mode 100644 a01461.js delete mode 100644 a01462.html delete mode 100644 a01492.html delete mode 100644 a01500.html delete mode 100644 a01504.html delete mode 100644 a01508.html delete mode 100644 a01508.js delete mode 100644 a01512.html delete mode 100644 a01516.html delete mode 100644 a01516.js delete mode 100644 a01580.html delete mode 100644 a01584.html delete mode 100644 a01584.js delete mode 100644 a01588.html delete mode 100644 a01592.html delete mode 100644 a01592.js delete mode 100644 a01596.html delete mode 100644 a01596.js delete mode 100644 a01600.html delete mode 100644 a01600.js delete mode 100644 a01604.html delete mode 100644 a01604.js delete mode 100644 a01608.html delete mode 100644 a01608.js delete mode 100644 a01612.html delete mode 100644 a01612.js delete mode 100644 a01616.html delete mode 100644 a01616.js delete mode 100644 a01620.html delete mode 100644 a01624.html delete mode 100644 a01628.html delete mode 100644 a01632.html delete mode 100644 a01636.html delete mode 100644 a01640.html delete mode 100644 a01644.html delete mode 100644 a01644.js delete mode 100644 a01648.html delete mode 100644 a01648.js delete mode 100644 a01652.html delete mode 100644 a01652.js delete mode 100644 a01656.html delete mode 100644 a01660.html delete mode 100644 a01664.html delete mode 100644 a01668.html delete mode 100644 a01672.html delete mode 100644 a01676.html delete mode 100644 a01680.html delete mode 100644 a01684.html delete mode 100644 a01688.html delete mode 100644 a01692.html delete mode 100644 a01692.js delete mode 100644 a01696.html delete mode 100644 a01696.js delete mode 100644 a01700.html delete mode 100644 a01700.js delete mode 100644 a01704.html delete mode 100644 a01704.js delete mode 100644 a01708.html delete mode 100644 a01708.js delete mode 100644 a01712.html delete mode 100644 a01712.js delete mode 100644 a01716.html delete mode 100644 a01716.js delete mode 100644 a01720.html delete mode 100644 a01720.js delete mode 100644 a01724.html delete mode 100644 a01724.js delete mode 100644 a01728.html delete mode 100644 a01728.js delete mode 100644 a01732.html delete mode 100644 a01732.js delete mode 100644 a01736.html delete mode 100644 a01736.js delete mode 100644 a01740.html delete mode 100644 a01740.js delete mode 100644 a01744.html delete mode 100644 a01744.js delete mode 100644 a01748.html delete mode 100644 a01748.js delete mode 100644 a01752.html delete mode 100644 a01752.js delete mode 100644 a01756.html delete mode 100644 a01760.html delete mode 100644 a01760.js delete mode 100644 a01764.html delete mode 100644 a01764.js delete mode 100644 a01768.html delete mode 100644 a01768.js delete mode 100644 a01772.html delete mode 100644 a01776.html delete mode 100644 a01780.html delete mode 100644 a01784.html delete mode 100644 a01788.html delete mode 100644 a01792.html delete mode 100644 a01796.html delete mode 100644 a01800.html delete mode 100644 a01804.html delete mode 100644 a01808.html delete mode 100644 a01812.html delete mode 100644 a01816.html delete mode 100644 a01820.html delete mode 100644 a01824.html delete mode 100644 a01828.html delete mode 100644 a01832.html delete mode 100644 a01836.html delete mode 100644 a01836.js delete mode 100644 a01840.html delete mode 100644 a01840.js delete mode 100644 a01844.html delete mode 100644 a01848.html delete mode 100644 a01852.html delete mode 100644 a01852.js delete mode 100644 a01856.html delete mode 100644 a01856.js delete mode 100644 a01860.html delete mode 100644 a01872.html delete mode 100644 a01876.html delete mode 100644 a01876.js delete mode 100644 a01880.html delete mode 100644 a01884.html delete mode 100644 a01888.html delete mode 100644 a01892.html delete mode 100644 a01896.html delete mode 100644 a01900.html delete mode 100644 a01904.html delete mode 100644 a01908.html delete mode 100644 a01912.html delete mode 100644 a01916.html delete mode 100644 a01920.html delete mode 100644 a01924.html delete mode 100644 a01928.html delete mode 100644 a01932.html delete mode 100644 a01936.html delete mode 100644 a01940.html delete mode 100644 a01944.html delete mode 100644 a01948.html delete mode 100644 a01952.html delete mode 100644 a01956.html delete mode 100644 a01960.html delete mode 100644 a01964.html delete mode 100644 a01968.html delete mode 100644 a01972.html delete mode 100644 a01976.html delete mode 100644 a01980.html delete mode 100644 a01984.html delete mode 100644 a01988.html delete mode 100644 a01992.html delete mode 100644 a01996.html delete mode 100644 a02000.html delete mode 100644 a02004.html delete mode 100644 a02008.html delete mode 100644 a02012.html delete mode 100644 a02016.html delete mode 100644 a02020.html delete mode 100644 a02024.html delete mode 100644 a02028.html delete mode 100644 a02032.html delete mode 100644 a02036.html delete mode 100644 a02040.html delete mode 100644 a02044.html delete mode 100644 a02048.html delete mode 100644 a02052.html delete mode 100644 a02056.html delete mode 100644 a02060.html delete mode 100644 a02064.html delete mode 100644 a02068.html delete mode 100644 a02072.html delete mode 100644 a02076.html delete mode 100644 a02080.html delete mode 100644 a02084.html delete mode 100644 a02088.html delete mode 100644 a02092.html delete mode 100644 a02096.html delete mode 100644 a02100.html delete mode 100644 a02104.html delete mode 100644 a02108.html delete mode 100644 a02112.html delete mode 100644 a02116.html delete mode 100644 a02120.html delete mode 100644 a02124.html delete mode 100644 a02128.html delete mode 100644 a02132.html delete mode 100644 a02136.html delete mode 100644 a02140.html delete mode 100644 a02144.html delete mode 100644 a02144.png delete mode 100644 a02148.html delete mode 100644 a02148.png delete mode 100644 a02152.html delete mode 100644 a02152.png delete mode 100644 a02156.html delete mode 100644 a02156.png delete mode 100644 a02160.html delete mode 100644 a02160.png delete mode 100644 a02164.html delete mode 100644 a02164.png delete mode 100644 a02168.html delete mode 100644 a02168.png delete mode 100644 a02172.html delete mode 100644 a02172.png delete mode 100644 a02176.html delete mode 100644 a02176.png delete mode 100644 a02180.html delete mode 100644 a02180.png delete mode 100644 a02184.html delete mode 100644 a02184.png delete mode 100644 a02188.html delete mode 100644 a02188.png delete mode 100644 a02192.html delete mode 100644 a02192.png delete mode 100644 a02196.html delete mode 100644 a02196.png delete mode 100644 a02200.html delete mode 100644 a02200.png delete mode 100644 a02204.html delete mode 100644 a02204.png delete mode 100644 a02208.html delete mode 100644 a02208.png delete mode 100644 a02212.html delete mode 100644 a02212.png delete mode 100644 a02216.html delete mode 100644 a02216.png delete mode 100644 a02220.html delete mode 100644 a02220.png delete mode 100644 a02224.html delete mode 100644 a02224.png delete mode 100644 a02228.html delete mode 100644 a02228.png delete mode 100644 a02232.html delete mode 100644 a02232.js delete mode 100644 a02232.png delete mode 100644 a02236.html delete mode 100644 a02236.js delete mode 100644 a02236.png delete mode 100644 a02240.html delete mode 100644 a02240.png delete mode 100644 a02244.html delete mode 100644 a02244.png delete mode 100644 a02248.html delete mode 100644 a02248.png delete mode 100644 a02252.html delete mode 100644 a02252.png delete mode 100644 a02256.html delete mode 100644 a02256.png delete mode 100644 a02260.html delete mode 100644 a02260.png delete mode 100644 a02264.html delete mode 100644 a02264.png delete mode 100644 a02268.html delete mode 100644 a02268.png delete mode 100644 a02272.html delete mode 100644 a02272.png delete mode 100644 a02276.html delete mode 100644 a02276.png delete mode 100644 a02280.html delete mode 100644 a02280.png delete mode 100644 a02284.html delete mode 100644 a02284.png delete mode 100644 a02288.html delete mode 100644 a02288.png delete mode 100644 a02292.html delete mode 100644 a02292.png delete mode 100644 a02296.html delete mode 100644 a02296.png delete mode 100644 a02300.html delete mode 100644 a02300.png delete mode 100644 a02304.html delete mode 100644 a02304.png delete mode 100644 a02308.html delete mode 100644 a02308.png delete mode 100644 a02312.html delete mode 100644 a02312.png delete mode 100644 a02316.html delete mode 100644 a02316.png delete mode 100644 a02320.html delete mode 100644 a02320.png delete mode 100644 a02324.html delete mode 100644 a02324.png delete mode 100644 a02328.html delete mode 100644 a02328.png delete mode 100644 a02332.html delete mode 100644 a02332.png delete mode 100644 a02336.html delete mode 100644 a02336.png delete mode 100644 a02340.html delete mode 100644 a02340.png delete mode 100644 a02344.html delete mode 100644 a02344.png delete mode 100644 a02348.html delete mode 100644 a02348.png delete mode 100644 a02352.html delete mode 100644 a02352.png delete mode 100644 a02356.html delete mode 100644 a02356.png delete mode 100644 a02360.html delete mode 100644 a02360.png delete mode 100644 a02364.html delete mode 100644 a02364.png delete mode 100644 a02368.html delete mode 100644 a02368.png delete mode 100644 a02372.html delete mode 100644 a02372.png delete mode 100644 a02376.html delete mode 100644 a02376.png delete mode 100644 a02380.html delete mode 100644 a02380.png delete mode 100644 a02384.html delete mode 100644 a02384.png delete mode 100644 a02388.html delete mode 100644 a02388.png delete mode 100644 a02392.html delete mode 100644 a02392.png delete mode 100644 a02396.html delete mode 100644 a02396.png delete mode 100644 a02400.html delete mode 100644 a02400.png delete mode 100644 a02404.html delete mode 100644 a02404.png delete mode 100644 a02408.html delete mode 100644 a02408.png delete mode 100644 a02412.html delete mode 100644 a02412.png delete mode 100644 a02416.html delete mode 100644 a02416.png delete mode 100644 a02420.html delete mode 100644 a02420.png delete mode 100644 a02424.html delete mode 100644 a02424.png delete mode 100644 a02428.html delete mode 100644 a02428.png delete mode 100644 a02432.html delete mode 100644 a02432.png delete mode 100644 a02436.html delete mode 100644 a02436.png delete mode 100644 a02440.html delete mode 100644 a02440.png delete mode 100644 a02444.html delete mode 100644 a02444.png delete mode 100644 a02448.html delete mode 100644 a02448.png delete mode 100644 a02452.html delete mode 100644 a02452.png delete mode 100644 a02456.html delete mode 100644 a02456.png delete mode 100644 a02460.html delete mode 100644 a02460.png delete mode 100644 a02464.html delete mode 100644 a02464.png delete mode 100644 a02468.html delete mode 100644 a02468.png delete mode 100644 a02472.html delete mode 100644 a02472.png delete mode 100644 a02476.html delete mode 100644 a02476.png delete mode 100644 a02480.html delete mode 100644 a02480.png delete mode 100644 a02484.html delete mode 100644 a02484.png delete mode 100644 a02488.html delete mode 100644 a02488.png delete mode 100644 a02492.html delete mode 100644 a02492.png delete mode 100644 a02496.html delete mode 100644 a02496.png delete mode 100644 a02500.html delete mode 100644 a02500.png delete mode 100644 a02504.html delete mode 100644 a02508.html delete mode 100644 a02512.html delete mode 100644 a02512.js delete mode 100644 a02512.png delete mode 100644 a02516.html delete mode 100644 a02516.js delete mode 100644 a02516.png delete mode 100644 a02520.html delete mode 100644 a02520.png delete mode 100644 a02524.html delete mode 100644 a02524.png delete mode 100644 a02528.html delete mode 100644 a02528.png delete mode 100644 a02532.html delete mode 100644 a02532.png delete mode 100644 a02536.html delete mode 100644 a02536.png delete mode 100644 a02825.html delete mode 100644 a02826.html delete mode 100644 a02827.html delete mode 100644 a02828.html delete mode 100644 a02829.html delete mode 100644 a02831.html delete mode 100644 a02836.html delete mode 100644 a02837.html delete mode 100644 a02838.html delete mode 100644 a02839.html delete mode 100644 a02840.html diff --git a/a00005.html b/a00005.html index 45db0f54c..93c41b02b 100644 --- a/a00005.html +++ b/a00005.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -107,7 +107,7 @@ More...

#include <stdlib.h>
#include <stdio.h>
-#include "cryptoauthlib.h"
+#include "cryptoauthlib.h"
#include "api_206a.h"
@@ -107,7 +107,7 @@

Provides api interfaces to use with ATSHA206A device. More...

-
#include "atca_status.h"
+
#include "atca_status.h"

diff --git a/a00008.html b/a00008.html index de13feb9e..ead5b4c70 100644 --- a/a00008.html +++ b/a00008.html @@ -31,7 +31,7 @@

-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/a00011.html b/a00011.html index 59e466463..42deac7c0 100644 --- a/a00011.html +++ b/a00011.html @@ -31,7 +31,7 @@ @@ -105,8 +105,8 @@

Contains API for performing the symmetric Authentication between the Host and the device. More...

-
#include "cryptoauthlib.h"
-#include "host/atca_host.h"
+

Macros

-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

Contains API for performing the symmetric Authentication between the Host and the device. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

diff --git a/a00014.html b/a00014.html index 86d56e163..8bbe5188d 100644 --- a/a00014.html +++ b/a00014.html @@ -31,7 +31,7 @@

-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/a00017.html b/a00017.html index 33f7b4cd9..39a931420 100644 --- a/a00017.html +++ b/a00017.html @@ -31,7 +31,7 @@ @@ -107,15 +107,15 @@ More...

#include <ctype.h>
#include "ascii_kit_host.h"
-#include "hal/kit_protocol.h"
+#include "hal/kit_protocol.h"
#include "talib/talib_fce.h"

Functions

-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
- + - + +ATCA_STATUS  +ATCA_STATUS  +ATCA_STATUS  +void 

Functions

ATCA_STATUS kit_host_init_phy (atca_hal_kit_phy_t *phy, ATCAIface iface)
ATCA_STATUS kit_host_init_phy (atca_hal_kit_phy_t *phy, ATCAIface iface)
 Initializes a phy structure with a cryptoauthlib hal adapter.
 
ATCA_STATUS kit_host_init (ascii_kit_host_context_t *ctx, ATCAIfaceCfg *iface[], const size_t iface_count, const atca_hal_kit_phy_t *phy, const uint32_t flags)
ATCA_STATUS kit_host_init (ascii_kit_host_context_t *ctx, ATCAIfaceCfg *iface[], const size_t iface_count, const atca_hal_kit_phy_t *phy, const uint32_t flags)
 Initializes the kit protocol parser context.
 
@@ -123,18 +123,18 @@
 Format the status and data into the kit protocol response format.
 
-ATCA_STATUS kit_host_process_cmd (ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen)
kit_host_process_cmd (ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen)
 Iterate through a command list to match the given command and then will execute it.
 
-ATCA_STATUS kit_host_process_ta (ascii_kit_host_context_t *ctx, int argc, char *argv[], uint8_t *response, size_t *rlen)
kit_host_process_ta (ascii_kit_host_context_t *ctx, int argc, char *argv[], uint8_t *response, size_t *rlen)
 
-ATCA_STATUS kit_host_process_line (ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen)
kit_host_process_line (ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen)
 Parse a line as a kit protocol command. The kit protocol is printable ascii and each line ends with a newline character.
 
-void kit_host_task (ascii_kit_host_context_t *ctx)
kit_host_task (ascii_kit_host_context_t *ctx)
 Non returning kit protocol runner using the configured physical interface that was provided when the context was initialized.
 
@@ -151,13 +151,13 @@

ATCA_STATUS kit_host_init ( - ascii_kit_host_context_t *  + ascii_kit_host_context_tctx, - ATCAIfaceCfg *  + ATCAIfaceCfgiface[], @@ -169,7 +169,7 @@

- const atca_hal_kit_phy_t *  + const atca_hal_kit_phy_tphy, @@ -210,13 +210,13 @@

ATCA_STATUS kit_host_init_phy ( - atca_hal_kit_phy_t *  + atca_hal_kit_phy_tphy, - ATCAIface  + ATCAIface  iface  diff --git a/a00020.html b/a00020.html index 9b288cbd3..789c88b26 100644 --- a/a00020.html +++ b/a00020.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -108,13 +108,13 @@

KIT protocol intepreter. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"
- + - +

Data Structures

struct  _ascii_kit_host_context
struct  _ascii_kit_host_context
 
struct  _kit_host_map_entry
struct  _kit_host_map_entry
 
+typedef struct _ascii_kit_host_context  - +

@@ -147,17 +147,17 @@

Typedefs

-typedef struct _ascii_kit_host_context ascii_kit_host_context_t
ascii_kit_host_context_t
 
typedef struct _kit_host_map_entry kit_host_map_entry_t
typedef struct _kit_host_map_entry kit_host_map_entry_t
 
- + - + +ATCA_STATUS  +ATCA_STATUS  +void 

Functions

ATCA_STATUS kit_host_init_phy (atca_hal_kit_phy_t *phy, ATCAIface iface)
ATCA_STATUS kit_host_init_phy (atca_hal_kit_phy_t *phy, ATCAIface iface)
 Initializes a phy structure with a cryptoauthlib hal adapter.
 
ATCA_STATUS kit_host_init (ascii_kit_host_context_t *ctx, ATCAIfaceCfg *iface[], const size_t iface_count, const atca_hal_kit_phy_t *phy, const uint32_t flags)
ATCA_STATUS kit_host_init (ascii_kit_host_context_t *ctx, ATCAIfaceCfg *iface[], const size_t iface_count, const atca_hal_kit_phy_t *phy, const uint32_t flags)
 Initializes the kit protocol parser context.
 
@@ -165,15 +165,15 @@
 Format the status and data into the kit protocol response format.
 
-ATCA_STATUS kit_host_process_cmd (ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen)
kit_host_process_cmd (ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen)
 Iterate through a command list to match the given command and then will execute it.
 
-ATCA_STATUS kit_host_process_line (ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen)
kit_host_process_line (ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen)
 Parse a line as a kit protocol command. The kit protocol is printable ascii and each line ends with a newline character.
 
-void kit_host_task (ascii_kit_host_context_t *ctx)
kit_host_task (ascii_kit_host_context_t *ctx)
 Non returning kit protocol runner using the configured physical interface that was provided when the context was initialized.
 
@@ -208,7 +208,7 @@

- +
typedef struct _kit_host_map_entry kit_host_map_entry_ttypedef struct _kit_host_map_entry kit_host_map_entry_t

@@ -226,13 +226,13 @@

ATCA_STATUS kit_host_init ( - ascii_kit_host_context_t *  + ascii_kit_host_context_tctx, - ATCAIfaceCfg *  + ATCAIfaceCfgiface[], @@ -244,7 +244,7 @@

- const atca_hal_kit_phy_t *  + const atca_hal_kit_phy_tphy, @@ -285,13 +285,13 @@

ATCA_STATUS kit_host_init_phy ( - atca_hal_kit_phy_t *  + atca_hal_kit_phy_tphy, - ATCAIface  + ATCAIface  iface  diff --git a/a00020.js b/a00020.js index 245697edd..c803ec733 100644 --- a/a00020.js +++ b/a00020.js @@ -1,7 +1,7 @@ var a00020 = [ - [ "_ascii_kit_host_context", "a01480.html", null ], - [ "_kit_host_map_entry", "a01484.html", null ], + [ "_ascii_kit_host_context", "a01507.html", null ], + [ "_kit_host_map_entry", "a01511.html", null ], [ "KIT_MESSAGE_SIZE_MAX", "a00020.html#a5ef47c1942cca10be5c5bf17841c8611", null ], [ "kit_host_map_entry_t", "a00020.html#abe18de5c585f639142a5bf7c253e5b7f", null ], [ "kit_host_format_response", "a00020.html#ac6f6e7798cc371e9667889cbbb4af330", null ], diff --git a/a00038.html b/a00038.html index 129b5a797..df6c259d4 100644 --- a/a00038.html +++ b/a00038.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,10 +103,10 @@

PKCS11 Trust Platform Configuration. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"
#include "pkcs11_config.h"
-#include "pkcs11/pkcs11_object.h"
-#include "pkcs11/pkcs11_slot.h"
+#include "pkcs11/pkcs11_object.h"
+#include "pkcs11/pkcs11_slot.h"

Detailed Description

PKCS11 Trust Platform Configuration.

diff --git a/a00041.html b/a00041.html index 300643648..62c8cab6f 100644 --- a/a00041.html +++ b/a00041.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

Provides required interface to access IO protection key. More...

-
#include "atca_status.h"
+
#include "atca_status.h"
diff --git a/a00044.html b/a00044.html index befad2f0e..1dc42e947 100644 --- a/a00044.html +++ b/a00044.html @@ -31,7 +31,7 @@ diff --git a/a00047.html b/a00047.html index d2c3e35fa..61a1b0245 100644 --- a/a00047.html +++ b/a00047.html @@ -31,7 +31,7 @@ @@ -107,16 +107,16 @@

Provides required APIs to manage secure boot under various scenarios. More...

-
#include "atca_status.h"
+
#include "atca_status.h"
#include "secure_boot_memory.h"
#include "atca_command.h"
-#include "crypto/atca_crypto_sw_sha2.h"
+#include "crypto/atca_crypto_sw_sha2.h"

Functions

-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
- + - +

Data Structures

struct  secure_boot_config_bits
struct  secure_boot_config_bits
 
struct  secure_boot_parameters
struct  secure_boot_parameters
 
@@ -106,18 +106,18 @@

Provides interface to memory component for the secure boot. More...

-
#include "atca_status.h"
+
#include "atca_status.h"
#include "atca_command.h"

diff --git a/a00047.js b/a00047.js index de056a9cd..e3df1088b 100644 --- a/a00047.js +++ b/a00047.js @@ -1,7 +1,7 @@ var a00047 = [ - [ "secure_boot_config_bits", "a01488.html", null ], - [ "secure_boot_parameters", "a01492.html", null ], + [ "secure_boot_config_bits", "a01515.html", null ], + [ "secure_boot_parameters", "a01519.html", null ], [ "bind_host_and_secure_element_with_io_protection", "a00047.html#af086e6ea3beaf8711ec855ff7dce40b1", null ], [ "secure_boot_process", "a00047.html#a861a785461af4116bca9343019225abd", null ] ]; \ No newline at end of file diff --git a/a00050.html b/a00050.html index df25b616d..6e869a905 100644 --- a/a00050.html +++ b/a00050.html @@ -31,7 +31,7 @@

-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
- +

Data Structures

struct  memory_parameters
struct  memory_parameters
 
+ATCA_STATUS  @@ -126,7 +126,7 @@ ATCA_STATUS  +void  diff --git a/a00050.js b/a00050.js index 172aad650..2e4d76ff1 100644 --- a/a00050.js +++ b/a00050.js @@ -1,4 +1,4 @@ var a00050 = [ - [ "memory_parameters", "a01496.html", null ] + [ "memory_parameters", "a01523.html", null ] ]; \ No newline at end of file diff --git a/a00056.html b/a00056.html index 31866f24d..451de2a4f 100644 --- a/a00056.html +++ b/a00056.html @@ -31,7 +31,7 @@ @@ -105,7 +105,7 @@

TNG TLS device certificate definition. More...

-

Functions

-ATCA_STATUS secure_boot_init_memory (memory_parameters *memory_params)
secure_boot_init_memory (memory_parameters *memory_params)
 
ATCA_STATUS secure_boot_read_memory (uint8_t *pu8_data, uint32_t *pu32_target_length)
secure_boot_write_memory (uint8_t *pu8_data, uint32_t *pu32_target_length)
 
-void secure_boot_deinit_memory (memory_parameters *memory_params)
secure_boot_deinit_memory (memory_parameters *memory_params)
 
ATCA_STATUS secure_boot_mark_full_copy_completion (void)
-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -115,10 +115,10 @@ const uint8_t  +const atcacert_cert_element_t  +const atcacert_def_t 
g_tflxtls_cert_template_4_device [500]
 
-const atcacert_cert_element_t g_tflxtls_cert_elements_4_device []
g_tflxtls_cert_elements_4_device []
 
-const atcacert_def_t g_tflxtls_cert_def_4_device
g_tflxtls_cert_def_4_device
 

Detailed Description

diff --git a/a00059.html b/a00059.html index f7d42e9e1..67290adc4 100644 --- a/a00059.html +++ b/a00059.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,7 +103,7 @@

TNG TLS device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ @@ -112,10 +112,10 @@ const uint8_t  +const atcacert_def_t  +const atcacert_cert_element_t 

Variables

g_tflxtls_cert_template_4_device [500]
 
-const atcacert_def_t g_tflxtls_cert_def_4_device
g_tflxtls_cert_def_4_device
 
-const atcacert_cert_element_t g_tflxtls_cert_elements_4_device []
g_tflxtls_cert_elements_4_device []
 

Detailed Description

diff --git a/a00062.html b/a00062.html index 5bf3ec6e9..1427b604a 100644 --- a/a00062.html +++ b/a00062.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -107,32 +107,32 @@

TNG Helper Functions. More...

- +

Data Structures

struct  tng_cert_map_element
struct  tng_cert_map_element
 
- + - + - + - +

Functions

const atcacert_def_ttng_map_get_device_cert_def (int index)
const atcacert_def_ttng_map_get_device_cert_def (int index)
 Helper function to iterate through all trust cert definitions.
 
ATCA_STATUS tng_get_device_cert_def_ext (ATCADevice device, const atcacert_def_t **cert_def)
ATCA_STATUS tng_get_device_cert_def_ext (ATCADevice device, const atcacert_def_t **cert_def)
 Get the TNG device certificate definition.
 
ATCA_STATUS tng_get_device_cert_def (const atcacert_def_t **cert_def)
ATCA_STATUS tng_get_device_cert_def (const atcacert_def_t **cert_def)
 Get the TNG device certificate definition.
 
ATCA_STATUS tng_get_device_pubkey (uint8_t *public_key)
ATCA_STATUS tng_get_device_pubkey (uint8_t *public_key)
 Uses GenKey command to calculate the public key from the primary device public key.
 
diff --git a/a00062.js b/a00062.js index 09be222ed..8380f5d74 100644 --- a/a00062.js +++ b/a00062.js @@ -1,8 +1,8 @@ var a00062 = [ - [ "tng_cert_map_element", "a01500.html", null ], - [ "tng_get_device_cert_def", "a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5", null ], - [ "tng_get_device_cert_def_ext", "a01438.html#ga3b8f346977ed8428692d15f74ef12401", null ], - [ "tng_get_device_pubkey", "a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a", null ], - [ "tng_map_get_device_cert_def", "a01438.html#ga60599359d5331215ca7fdf6710f0dbb1", null ] + [ "tng_cert_map_element", "a01527.html", null ], + [ "tng_get_device_cert_def", "a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5", null ], + [ "tng_get_device_cert_def_ext", "a01465.html#ga3b8f346977ed8428692d15f74ef12401", null ], + [ "tng_get_device_pubkey", "a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a", null ], + [ "tng_map_get_device_cert_def", "a01465.html#ga60599359d5331215ca7fdf6710f0dbb1", null ] ]; \ No newline at end of file diff --git a/a00065.html b/a00065.html index 120b82b23..175245722 100644 --- a/a00065.html +++ b/a00065.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -106,8 +106,8 @@

TNG Helper Functions. More...

-
#include "atca_basic.h"
-#include "atcacert/atcacert_def.h"
+
#include "atca_basic.h"
+#include "atcacert/atcacert_def.h"
@@ -117,16 +117,16 @@

Macros

- + - + - + - +

Functions

const atcacert_def_ttng_map_get_device_cert_def (int index)
const atcacert_def_ttng_map_get_device_cert_def (int index)
 Helper function to iterate through all trust cert definitions.
 
ATCA_STATUS tng_get_device_cert_def (const atcacert_def_t **cert_def)
ATCA_STATUS tng_get_device_cert_def (const atcacert_def_t **cert_def)
 Get the TNG device certificate definition.
 
ATCA_STATUS tng_get_device_cert_def_ext (ATCADevice device, const atcacert_def_t **cert_def)
ATCA_STATUS tng_get_device_cert_def_ext (ATCADevice device, const atcacert_def_t **cert_def)
 Get the TNG device certificate definition.
 
ATCA_STATUS tng_get_device_pubkey (uint8_t *public_key)
ATCA_STATUS tng_get_device_pubkey (uint8_t *public_key)
 Uses GenKey command to calculate the public key from the primary device public key.
 
diff --git a/a00065.js b/a00065.js index 59d79a6b4..4d7b182b9 100644 --- a/a00065.js +++ b/a00065.js @@ -1,7 +1,7 @@ var a00065 = [ - [ "tng_get_device_cert_def", "a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5", null ], - [ "tng_get_device_cert_def_ext", "a01438.html#ga3b8f346977ed8428692d15f74ef12401", null ], - [ "tng_get_device_pubkey", "a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a", null ], - [ "tng_map_get_device_cert_def", "a01438.html#ga60599359d5331215ca7fdf6710f0dbb1", null ] + [ "tng_get_device_cert_def", "a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5", null ], + [ "tng_get_device_cert_def_ext", "a01465.html#ga3b8f346977ed8428692d15f74ef12401", null ], + [ "tng_get_device_pubkey", "a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a", null ], + [ "tng_map_get_device_cert_def", "a01465.html#ga60599359d5331215ca7fdf6710f0dbb1", null ] ]; \ No newline at end of file diff --git a/a00068.html b/a00068.html index 992acc301..3fb80a738 100644 --- a/a00068.html +++ b/a00068.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -106,7 +106,7 @@

Client side certificate I/O functions for TNG devices. More...

#include "tng_atca.h"
-#include "atcacert/atcacert_client.h"
+#include "atcacert/atcacert_client.h"
#include "tng_atcacert_client.h"
#include "tngtls_cert_def_1_signer.h"
#include "tng_root_cert.h"
@@ -114,7 +114,7 @@
- + diff --git a/a00068.js b/a00068.js index 557ab92b3..bf4a06107 100644 --- a/a00068.js +++ b/a00068.js @@ -1,7 +1,7 @@ var a00068 = [ [ "tng_atcacert_device_public_key", "a00068.html#a01bf19754baee6ce82ec46f966528262", null ], - [ "tng_atcacert_max_device_cert_size", "a01438.html#ga67606649a5f2261cb6b55478d72bf805", null ], + [ "tng_atcacert_max_device_cert_size", "a01465.html#ga67606649a5f2261cb6b55478d72bf805", null ], [ "tng_atcacert_max_signer_cert_size", "a00068.html#a857aacbb70f2ea18411f1ca478a0e37f", null ], [ "tng_atcacert_read_device_cert", "a00068.html#a22c7ea083197410f396d18fa808e8e0c", null ], [ "tng_atcacert_read_signer_cert", "a00068.html#a82d3c529ed81119a956957052c06e8d7", null ], diff --git a/a00071.html b/a00071.html index cb0055f92..d63bb4383 100644 --- a/a00071.html +++ b/a00071.html @@ -31,7 +31,7 @@ @@ -104,36 +104,36 @@

Client side certificate I/O functions for TNG devices. More...

#include <stdint.h>
-#include "atcacert/atcacert.h"
+#include "atcacert/atcacert.h"

Functions

int tng_atcacert_max_device_cert_size (size_t *max_cert_size)
int tng_atcacert_max_device_cert_size (size_t *max_cert_size)
 Return the maximum possible certificate size in bytes for a TNG device certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.
 
int tng_atcacert_read_device_cert (uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert)
-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
- + - + - + - + - + - + - + - + - +

Functions

int tng_atcacert_max_device_cert_size (size_t *max_cert_size)
int tng_atcacert_max_device_cert_size (size_t *max_cert_size)
 Return the maximum possible certificate size in bytes for a TNG device certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.
 
int tng_atcacert_read_device_cert (uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert)
int tng_atcacert_read_device_cert (uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert)
 Reads the device certificate for a TNG device.
 
int tng_atcacert_device_public_key (uint8_t *public_key, uint8_t *cert)
int tng_atcacert_device_public_key (uint8_t *public_key, uint8_t *cert)
 Reads the device public key.
 
int tng_atcacert_max_signer_cert_size (size_t *max_cert_size)
int tng_atcacert_max_signer_cert_size (size_t *max_cert_size)
 Return the maximum possible certificate size in bytes for a TNG signer certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.
 
int tng_atcacert_read_signer_cert (uint8_t *cert, size_t *cert_size)
int tng_atcacert_read_signer_cert (uint8_t *cert, size_t *cert_size)
 Reads the signer certificate for a TNG device.
 
int tng_atcacert_signer_public_key (uint8_t *public_key, uint8_t *cert)
int tng_atcacert_signer_public_key (uint8_t *public_key, uint8_t *cert)
 Reads the signer public key.
 
int tng_atcacert_root_cert_size (size_t *cert_size)
int tng_atcacert_root_cert_size (size_t *cert_size)
 Get the size of the TNG root cert.
 
int tng_atcacert_root_cert (uint8_t *cert, size_t *cert_size)
int tng_atcacert_root_cert (uint8_t *cert, size_t *cert_size)
 Get the TNG root cert.
 
int tng_atcacert_root_public_key (uint8_t *public_key)
int tng_atcacert_root_public_key (uint8_t *public_key)
 Gets the root public key.
 
diff --git a/a00071.js b/a00071.js index d301c3e6d..ff4c63dd9 100644 --- a/a00071.js +++ b/a00071.js @@ -1,12 +1,12 @@ var a00071 = [ - [ "tng_atcacert_device_public_key", "a01438.html#ga01bf19754baee6ce82ec46f966528262", null ], - [ "tng_atcacert_max_device_cert_size", "a01438.html#ga67606649a5f2261cb6b55478d72bf805", null ], - [ "tng_atcacert_max_signer_cert_size", "a01438.html#ga857aacbb70f2ea18411f1ca478a0e37f", null ], - [ "tng_atcacert_read_device_cert", "a01438.html#ga22c7ea083197410f396d18fa808e8e0c", null ], - [ "tng_atcacert_read_signer_cert", "a01438.html#ga82d3c529ed81119a956957052c06e8d7", null ], - [ "tng_atcacert_root_cert", "a01438.html#ga31cf63afba3c936d279a325d71691a68", null ], - [ "tng_atcacert_root_cert_size", "a01438.html#gaa3a0387ff2a71684a2992d4661c53331", null ], - [ "tng_atcacert_root_public_key", "a01438.html#ga8cd0d450da1bf23d0f6784446d35c556", null ], - [ "tng_atcacert_signer_public_key", "a01438.html#gaa4c31ab35807d8ed51fbecc48866aa04", null ] + [ "tng_atcacert_device_public_key", "a01465.html#ga01bf19754baee6ce82ec46f966528262", null ], + [ "tng_atcacert_max_device_cert_size", "a01465.html#ga67606649a5f2261cb6b55478d72bf805", null ], + [ "tng_atcacert_max_signer_cert_size", "a01465.html#ga857aacbb70f2ea18411f1ca478a0e37f", null ], + [ "tng_atcacert_read_device_cert", "a01465.html#ga22c7ea083197410f396d18fa808e8e0c", null ], + [ "tng_atcacert_read_signer_cert", "a01465.html#ga82d3c529ed81119a956957052c06e8d7", null ], + [ "tng_atcacert_root_cert", "a01465.html#ga31cf63afba3c936d279a325d71691a68", null ], + [ "tng_atcacert_root_cert_size", "a01465.html#gaa3a0387ff2a71684a2992d4661c53331", null ], + [ "tng_atcacert_root_public_key", "a01465.html#ga8cd0d450da1bf23d0f6784446d35c556", null ], + [ "tng_atcacert_signer_public_key", "a01465.html#gaa4c31ab35807d8ed51fbecc48866aa04", null ] ]; \ No newline at end of file diff --git a/a00074.html b/a00074.html index 7febdaba6..17e66dfff 100644 --- a/a00074.html +++ b/a00074.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/a00077.html b/a00077.html index f8953ef96..f0fc07304 100644 --- a/a00077.html +++ b/a00077.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/a00080.html b/a00080.html index 3c27f64d3..8affbaa27 100644 --- a/a00080.html +++ b/a00080.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,14 +105,14 @@

TNG LORA signer certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ +SHARED_LIB_EXPORT const atcacert_def_t 

Variables

-SHARED_LIB_EXPORT const atcacert_def_t g_tnglora_cert_def_1_signer
g_tnglora_cert_def_1_signer
 

Detailed Description

diff --git a/a00083.html b/a00083.html index 73fd7e9df..edaf6eb49 100644 --- a/a00083.html +++ b/a00083.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,13 +103,13 @@

TNG LORA signer certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ +ATCA_DLL const atcacert_def_t 

Variables

-ATCA_DLL const atcacert_def_t g_tnglora_cert_def_1_signer
g_tnglora_cert_def_1_signer
 

Detailed Description

diff --git a/a00086.html b/a00086.html index 43dd15e38..34f53e615 100644 --- a/a00086.html +++ b/a00086.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

TNG LORA device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+
#include "atcacert/atcacert_def.h"
#include "tngtls_cert_def_2_device.h"
#include "tngtls_cert_def_1_signer.h"
#include "tnglora_cert_def_1_signer.h"
@@ -114,7 +114,7 @@

Variables

-SHARED_LIB_EXPORT const atcacert_def_t g_tnglora_cert_def_2_device +SHARED_LIB_EXPORT const atcacert_def_t g_tnglora_cert_def_2_device  

Detailed Description

diff --git a/a00089.html b/a00089.html index 64ae674c8..36f08204c 100644 --- a/a00089.html +++ b/a00089.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,13 +103,13 @@

TNG LORA device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ +ATCA_DLL const atcacert_def_t 

Variables

-ATCA_DLL const atcacert_def_t g_tnglora_cert_def_2_device
g_tnglora_cert_def_2_device
 

Detailed Description

diff --git a/a00092.html b/a00092.html index d6785acb5..d4b311dae 100644 --- a/a00092.html +++ b/a00092.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

TNG LORA device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ @@ -115,10 +115,10 @@ SHARED_LIB_EXPORT const uint8_t  +SHARED_LIB_EXPORT const atcacert_cert_element_t  +SHARED_LIB_EXPORT const atcacert_def_t 
g_tnglora_cert_template_4_device [552]
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tnglora_cert_elements_4_device []
g_tnglora_cert_elements_4_device []
 
-SHARED_LIB_EXPORT const atcacert_def_t g_tnglora_cert_def_4_device
g_tnglora_cert_def_4_device
 

Detailed Description

diff --git a/a00095.html b/a00095.html index 2ed5c66b8..b2ea485d0 100644 --- a/a00095.html +++ b/a00095.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,19 +103,19 @@

TNG LORA device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ +ATCA_DLL const atcacert_def_t  +SHARED_LIB_EXPORT const atcacert_cert_element_t 
#define TNGLORA_CERT_TEMPLATE_4_DEVICE_SIZE   552
 
-ATCA_DLL const atcacert_def_t g_tnglora_cert_def_4_device
g_tnglora_cert_def_4_device
 
SHARED_LIB_EXPORT const uint8_t g_tnglora_cert_template_4_device []
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tnglora_cert_elements_4_device []
g_tnglora_cert_elements_4_device []
 

Detailed Description

diff --git a/a00098.html b/a00098.html index 3fc48fb46..edca6ca4a 100644 --- a/a00098.html +++ b/a00098.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

TNG TLS signer certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ - + +SHARED_LIB_EXPORT const atcacert_def_t 

@@ -113,10 +113,10 @@

SHARED_LIB_EXPORT const uint8_t g_tngtls_cert_template_1_signer [520]
 
SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_1_signer []
SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_1_signer []
 
-SHARED_LIB_EXPORT const atcacert_def_t g_tngtls_cert_def_1_signer
g_tngtls_cert_def_1_signer
 

Detailed Description

@@ -130,7 +130,7 @@

- +
SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_1_signer[]SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_1_signer[]

.id = "subject",
.device_loc ={
-
+
.zone = DEVZONE_NONE,
},
.cert_loc ={
.offset = 158,
@@ -146,7 +146,7 @@

}

}
}
-
@ DEVZONE_NONE
Special value used to indicate there is no device location.
Definition: atcacert_def.h:106
+
@ DEVZONE_NONE
Special value used to indicate there is no device location.
Definition: atcacert_def.h:106
diff --git a/a00101.html b/a00101.html index a936b53cc..a63f5f2ee 100644 --- a/a00101.html +++ b/a00101.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,19 +103,19 @@

TNG TLS signer certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ +ATCA_DLL const atcacert_def_t  +SHARED_LIB_EXPORT const atcacert_cert_element_t 
#define TNGTLS_CERT_TEMPLATE_1_SIGNER_SIZE   520
 
-ATCA_DLL const atcacert_def_t g_tngtls_cert_def_1_signer
g_tngtls_cert_def_1_signer
 
SHARED_LIB_EXPORT const uint8_t g_tngtls_cert_template_1_signer []
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_1_signer []
g_tngtls_cert_elements_1_signer []
 

Detailed Description

diff --git a/a00104.html b/a00104.html index 600bf790d..d3e77a15a 100644 --- a/a00104.html +++ b/a00104.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

TNG TLS device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ @@ -115,10 +115,10 @@ SHARED_LIB_EXPORT const uint8_t  +SHARED_LIB_EXPORT const atcacert_cert_element_t  +SHARED_LIB_EXPORT const atcacert_def_t 
g_tngtls_cert_template_2_device [505]
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_2_device [2]
g_tngtls_cert_elements_2_device [2]
 
-SHARED_LIB_EXPORT const atcacert_def_t g_tngtls_cert_def_2_device
g_tngtls_cert_def_2_device
 

Detailed Description

diff --git a/a00107.html b/a00107.html index c212afffc..ec81247d4 100644 --- a/a00107.html +++ b/a00107.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,7 +103,7 @@

TNG TLS device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ @@ -112,13 +112,13 @@ #define  +ATCA_DLL const atcacert_def_t  +SHARED_LIB_EXPORT const atcacert_cert_element_t 
#define TNGTLS_CERT_TEMPLATE_2_DEVICE_SIZE   505
TNGTLS_CERT_ELEMENTS_2_DEVICE_COUNT   2
 
-ATCA_DLL const atcacert_def_t g_tngtls_cert_def_2_device
g_tngtls_cert_def_2_device
 
SHARED_LIB_EXPORT const uint8_t g_tngtls_cert_template_2_device []
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_2_device []
g_tngtls_cert_elements_2_device []
 

Detailed Description

diff --git a/a00110.html b/a00110.html index dd2856f7b..a7bc9f5e9 100644 --- a/a00110.html +++ b/a00110.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,7 +105,7 @@

TNG TLS device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ @@ -115,10 +115,10 @@ SHARED_LIB_EXPORT const uint8_t  +SHARED_LIB_EXPORT const atcacert_cert_element_t  +SHARED_LIB_EXPORT const atcacert_def_t 
g_tngtls_cert_template_3_device [546]
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_3_device []
g_tngtls_cert_elements_3_device []
 
-SHARED_LIB_EXPORT const atcacert_def_t g_tngtls_cert_def_3_device
g_tngtls_cert_def_3_device
 

Detailed Description

diff --git a/a00113.html b/a00113.html index da07933b3..96d8d38cf 100644 --- a/a00113.html +++ b/a00113.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,19 +103,19 @@

TNG TLS device certificate definition. More...

-
#include "atcacert/atcacert_def.h"
+ +ATCA_DLL const atcacert_def_t  +ATCA_DLL const atcacert_cert_element_t 
#define TNGTLS_CERT_TEMPLATE_3_DEVICE_SIZE   546
 
-ATCA_DLL const atcacert_def_t g_tngtls_cert_def_3_device
g_tngtls_cert_def_3_device
 
ATCA_DLL const uint8_t g_tngtls_cert_template_3_device []
 
-ATCA_DLL const atcacert_cert_element_t g_tngtls_cert_elements_3_device []
g_tngtls_cert_elements_3_device []
 

Detailed Description

diff --git a/a00119.html b/a00119.html index 226cd32f8..efac49d5e 100644 --- a/a00119.html +++ b/a00119.html @@ -5,7 +5,7 @@ -CryptoAuthLib: wpc_apis.c File Reference +CryptoAuthLib: wpc_apis.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,17 +97,123 @@
-
wpc_apis.c File Reference
+ +
wpc_apis.h File Reference

Provides api interfaces for WPC authentication. More...

-
#include "cryptoauthlib.h"
-#include "wpc_apis.h"
-#include "wpccert_client.h"
-#include "atcacert/atcacert_client.h"
-

Detailed Description

+
#include "wpc_check_config.h"
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Macros

+#define WPC_PROTOCOL_VERSION   0x01
 
+#define WPC_PROTOCOL_MAX_VERSION   0x01
 
+#define WPC_TBS_AUTH_PREFIX   0x41
 
+#define WPC_CONST_N_RH   ATCA_SHA256_DIGEST_SIZE
 
+#define WPC_CONST_OS_MC   (2 + WPC_CONST_N_RH)
 
+#define WPC_HEADER(x)   ((WPC_PROTOCOL_VERSION << 4) | x)
 
+#define WPC_GET_DIGESTS_TYPE   0x09
 
+#define WPC_GET_DIGESTS_HEADER   WPC_HEADER(WPC_GET_DIGESTS_TYPE)
 
+#define WPC_GET_DIGESTS_LENGTH   (2)
 
+#define WPC_GET_CERTIFICATE_TYPE   0x0A
 
+#define WPC_GET_CERTIFICATE_HEADER   WPC_HEADER(WPC_GET_CERTIFICATE_TYPE)
 
+#define WPC_GET_CERTIFICATE_LENGTH   (4)
 
+#define WPC_CHALLENGE_TYPE   0x0B
 
+#define WPC_CHALLENGE_HEADER   WPC_HEADER(WPC_CHALLENGE_TYPE)
 
+#define WPC_CHALLENGE_NONCE_LENGTH   (16)
 
+#define WPC_CHALLENGE_LENGTH   (2 + WPC_CHALLENGE_NONCE_LENGTH)
 
+#define WPC_DIGESTS_TYPE   0x01
 
+#define WPC_DIGESTS_HEADER   WPC_HEADER(WPC_DIGESTS_TYPE)
 
+#define WPC_DIGESTS_LENGTH(x)   (2 + (ATCA_SHA256_DIGEST_SIZE * x))
 
+#define WPC_CERTIFICATE_TYPE   0x02
 
+#define WPC_CERTIFICATE_HEADER   WPC_HEADER(WPC_CERTIFICATE_TYPE)
 
+#define WPC_CERTIFICATE_LENGTH(x)   (1 + x)
 
+#define WPC_CHALLENGE_AUTH_TYPE   0x03
 
+#define WPC_CHALLENGE_AUTH_HEADER   WPC_HEADER(WPC_CHALLENGE_AUTH_TYPE)
 
+#define WPC_CHALLENGE_AUTH_LENGTH   (67)
 
+#define WPC_ERROR_TYPE   0x07
 
+#define WPC_ERROR_HEADER   WPC_HEADER(WPC_ERROR_TYPE)
 
+#define WPC_ERROR_LENGTH   (3)
 
+#define WPC_ERROR_INVALID_REQUEST   (0x01)
 
+#define WPC_ERROR_UNSUPPORTED_PROTOCOL   (0x02)
 
+#define WPC_ERROR_BUSY   (0x03)
 
+#define WPC_ERROR_UNSPECIFIED   (0x04)
 
+ + + +

+Variables

+const uint8_t g_root_ca_digest []
 
+

Detailed Description

Provides api interfaces for WPC authentication.

@@ -115,7 +221,7 @@ diff --git a/a00122.html b/a00122.html deleted file mode 100644 index dc0fb6ba9..000000000 --- a/a00122.html +++ /dev/null @@ -1,229 +0,0 @@ - - - - - - - -CryptoAuthLib: wpc_apis.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
wpc_apis.h File Reference
-
-
- -

Provides api interfaces for WPC authentication. -More...

-
#include "wpc_check_config.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define WPC_PROTOCOL_VERSION   0x01
 
-#define WPC_PROTOCOL_MAX_VERSION   0x01
 
-#define WPC_TBS_AUTH_PREFIX   0x41
 
-#define WPC_CONST_N_RH   ATCA_SHA256_DIGEST_SIZE
 
-#define WPC_CONST_OS_MC   (2 + WPC_CONST_N_RH)
 
-#define WPC_HEADER(x)   ((WPC_PROTOCOL_VERSION << 4) | x)
 
-#define WPC_GET_DIGESTS_TYPE   0x09
 
-#define WPC_GET_DIGESTS_HEADER   WPC_HEADER(WPC_GET_DIGESTS_TYPE)
 
-#define WPC_GET_DIGESTS_LENGTH   (2)
 
-#define WPC_GET_CERTIFICATE_TYPE   0x0A
 
-#define WPC_GET_CERTIFICATE_HEADER   WPC_HEADER(WPC_GET_CERTIFICATE_TYPE)
 
-#define WPC_GET_CERTIFICATE_LENGTH   (4)
 
-#define WPC_CHALLENGE_TYPE   0x0B
 
-#define WPC_CHALLENGE_HEADER   WPC_HEADER(WPC_CHALLENGE_TYPE)
 
-#define WPC_CHALLENGE_NONCE_LENGTH   (16)
 
-#define WPC_CHALLENGE_LENGTH   (2 + WPC_CHALLENGE_NONCE_LENGTH)
 
-#define WPC_DIGESTS_TYPE   0x01
 
-#define WPC_DIGESTS_HEADER   WPC_HEADER(WPC_DIGESTS_TYPE)
 
-#define WPC_DIGESTS_LENGTH(x)   (2 + (ATCA_SHA256_DIGEST_SIZE * x))
 
-#define WPC_CERTIFICATE_TYPE   0x02
 
-#define WPC_CERTIFICATE_HEADER   WPC_HEADER(WPC_CERTIFICATE_TYPE)
 
-#define WPC_CERTIFICATE_LENGTH(x)   (1 + x)
 
-#define WPC_CHALLENGE_AUTH_TYPE   0x03
 
-#define WPC_CHALLENGE_AUTH_HEADER   WPC_HEADER(WPC_CHALLENGE_AUTH_TYPE)
 
-#define WPC_CHALLENGE_AUTH_LENGTH   (67)
 
-#define WPC_ERROR_TYPE   0x07
 
-#define WPC_ERROR_HEADER   WPC_HEADER(WPC_ERROR_TYPE)
 
-#define WPC_ERROR_LENGTH   (3)
 
-#define WPC_ERROR_INVALID_REQUEST   (0x01)
 
-#define WPC_ERROR_UNSUPPORTED_PROTOCOL   (0x02)
 
-#define WPC_ERROR_BUSY   (0x03)
 
-#define WPC_ERROR_UNSPECIFIED   (0x04)
 
- - - -

-Variables

-const uint8_t g_root_ca_digest []
 
-

Detailed Description

-

Provides api interfaces for WPC authentication.

- -
-
- - - - diff --git a/a00128.html b/a00128.html index 1e8465970..9117240a7 100644 --- a/a00128.html +++ b/a00128.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -107,24 +107,26 @@ More...

#include "wpc_check_config.h"
#include "wpccert_client.h"
-#include "atcacert/atcacert_def.h"
-#include "atcacert/atcacert_der.h"
-#include "atcacert/atcacert_client.h"
-#include "atca_basic.h"
+#include "atcacert/atcacert_def.h"
+#include "atcacert/atcacert_der.h"
+#include "atcacert/atcacert_client.h"
+#include "atca_basic.h"
- + + + +ATCA_STATUS  - + +ATCA_STATUS 

Functions

ATCA_STATUS wpccert_read_cert (ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size)
+ATCA_STATUS wpccert_read_cert_size (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 
ATCA_STATUS wpccert_read_cert (ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size)
 WPC API -.
 
-ATCA_STATUS wpccert_read_pdu_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
wpccert_read_pdu_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
 
-ATCA_STATUS wpccert_read_mfg_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
ATCA_STATUS wpccert_read_mfg_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
 
-ATCA_STATUS wpccert_public_key (const atcacert_def_t *cert_def, uint8_t *public_key, uint8_t *cert)
wpccert_public_key (const atcacert_def_t *cert_def, uint8_t *public_key, uint8_t *cert)
 

Detailed Description

@@ -140,13 +142,13 @@

ATCA_STATUS wpccert_read_cert ( - ATCADevice  + ATCADevice  device, - const atcacert_def_t *  + const atcacert_def_tcert_def, @@ -172,6 +174,48 @@

Returns
ATCA_SUCCESS on success, otherwise an error code.
+

+
+ +

◆ wpccert_read_mfg_cert()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS wpccert_read_mfg_cert (ATCADevice device,
uint8_t * cert,
size_t * cert_size,
uint8_t slot 
)
+
+

CA device MFG Cert

+

CA2 device MFG Cert

+
diff --git a/a00128.js b/a00128.js index 16f02480d..fcc4bebf1 100644 --- a/a00128.js +++ b/a00128.js @@ -1,4 +1,5 @@ var a00128 = [ - [ "wpccert_read_cert", "a00128.html#a76a6ac477f6341e80284c76c38b532ff", null ] + [ "wpccert_read_cert", "a00128.html#a76a6ac477f6341e80284c76c38b532ff", null ], + [ "wpccert_read_mfg_cert", "a00128.html#a9d37502a45846eb04ff3a0824242a99d", null ] ]; \ No newline at end of file diff --git a/a00131.html b/a00131.html index 73bd4654d..fdf4403fb 100644 --- a/a00131.html +++ b/a00131.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -105,8 +105,8 @@

Provides api interfaces for accessing WPC certificates from device. More...

-
#include "cryptoauthlib.h"
-#include "atcacert/atcacert_def.h"
+ @@ -116,23 +116,25 @@ - - - + + + + + +ATCA_STATUS  +ATCA_STATUS  - + +ATCA_STATUS 

Functions

uint8_t wpccert_get_slot_count (void)
 
-ATCA_STATUS wpccert_get_slot_info (uint16_t *dig_handle, const atcacert_def_t **def, uint8_t slot)
 
ATCA_STATUS wpccert_read_cert (ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size)
+ATCA_STATUS wpccert_get_slot_info (uint16_t *dig_handle, const atcacert_def_t **def, uint8_t **mfg, uint8_t *root_dgst, uint8_t slot)
 
+ATCA_STATUS wpccert_read_cert_size (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 
ATCA_STATUS wpccert_read_cert (ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size)
 WPC API -.
 
-ATCA_STATUS wpccert_write_cert (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
wpccert_write_cert (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 
-ATCA_STATUS wpccert_read_pdu_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
wpccert_read_pdu_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
 
-ATCA_STATUS wpccert_read_mfg_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
ATCA_STATUS wpccert_read_mfg_cert (ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot)
 
-ATCA_STATUS wpccert_public_key (const atcacert_def_t *cert_def, uint8_t *public_key, uint8_t *cert)
wpccert_public_key (const atcacert_def_t *cert_def, uint8_t *public_key, uint8_t *cert)
 

Detailed Description

@@ -148,13 +150,13 @@

ATCA_STATUS wpccert_read_cert ( - ATCADevice  + ATCADevice  device, - const atcacert_def_t *  + const atcacert_def_tcert_def, @@ -180,6 +182,48 @@

Returns
ATCA_SUCCESS on success, otherwise an error code.
+

+
+ +

◆ wpccert_read_mfg_cert()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS wpccert_read_mfg_cert (ATCADevice device,
uint8_t * cert,
size_t * cert_size,
uint8_t slot 
)
+
+

CA device MFG Cert

+

CA2 device MFG Cert

+
diff --git a/a00131.js b/a00131.js index ee5f18eb5..5066fca3f 100644 --- a/a00131.js +++ b/a00131.js @@ -1,4 +1,5 @@ var a00131 = [ - [ "wpccert_read_cert", "a00131.html#a76a6ac477f6341e80284c76c38b532ff", null ] + [ "wpccert_read_cert", "a00131.html#a76a6ac477f6341e80284c76c38b532ff", null ], + [ "wpccert_read_mfg_cert", "a00131.html#a9d37502a45846eb04ff3a0824242a99d", null ] ]; \ No newline at end of file diff --git a/a00221.html b/a00221.html deleted file mode 100644 index 042b35d5c..000000000 --- a/a00221.html +++ /dev/null @@ -1,593 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_basic.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_basic.c File Reference
-
-
- -

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods. -More...

-
#include "atca_basic.h"
-#include "atca_version.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atcab_version (char *ver_str)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS atcab_init_ext (ATCADevice *device, ATCAIfaceCfg *cfg)
 Creates and initializes a ATCADevice context.
 
ATCA_STATUS atcab_init (ATCAIfaceCfg *cfg)
 Creates a global ATCADevice object used by Basic API.
 
ATCA_STATUS atcab_init_device (ATCADevice ca_device)
 Initialize the global ATCADevice object to point to one of your choosing for use with all the atcab_ basic API.
 
ATCA_STATUS atcab_release_ext (ATCADevice *device)
 release (free) the an ATCADevice instance.
 
ATCA_STATUS atcab_release (void)
 release (free) the global ATCADevice instance. This must be called in order to release or free up the interface.
 
ATCADevice atcab_get_device (void)
 Get the global device object.
 
ATCADeviceType atcab_get_device_type_ext (ATCADevice device)
 Get the selected device type of rthe device context.
 
ATCADeviceType atcab_get_device_type (void)
 Get the current device type configured for the global ATCADevice.
 
uint8_t atcab_get_device_address (ATCADevice device)
 Get the current device address based on the configured device and interface.
 
bool atcab_is_ca_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ca2_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ta_device (ATCADeviceType dev_type)
 Check whether the device is Trust Anchor device.
 
ATCA_STATUS atcab_wakeup (void)
 wakeup the CryptoAuth device
 
ATCA_STATUS atcab_idle (void)
 idle the CryptoAuth device
 
ATCA_STATUS atcab_sleep (void)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS atcab_get_zone_size_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_get_zone_size (uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_aes (uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out)
 Compute the AES-128 encrypt, decrypt, or GFM calculation.
 
ATCA_STATUS atcab_aes_encrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_encrypt (uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt (uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_gfm (const uint8_t *h, const uint8_t *input, uint8_t *output)
 Perform a Galois Field Multiply (GFM) operation.
 
ATCA_STATUS atcab_aes_gcm_init_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_rand (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv)
 Initialize context for AES GCM operation with a IV composed of a random and optional fixed(free) field, which is common when starting an encrypt operation.
 
ATCA_STATUS atcab_aes_gcm_aad_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_aad_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish (atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish (atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_checkmac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data)
 Compares a MAC response with input values.
 
ATCA_STATUS atcab_checkmac_with_response_mac (uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac)
 Compares a MAC response with input values.SHA105 device can generate optional mac Output response mac mode only supports in SHA105 device.
 
ATCA_STATUS atcab_counter (uint8_t mode, uint16_t counter_id, uint32_t *counter_value)
 Compute the Counter functions.
 
ATCA_STATUS atcab_counter_increment (uint16_t counter_id, uint32_t *counter_value)
 Increments one of the device's monotonic counters.
 
ATCA_STATUS atcab_counter_read (uint16_t counter_id, uint32_t *counter_value)
 Read one of the device's monotonic counters.
 
ATCA_STATUS atcab_derivekey_ext (ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_derivekey (uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_ecdh_base (uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce)
 Base function for generating premaster secret key using ECDH.
 
ATCA_STATUS atcab_ecdh (uint16_t key_id, const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in a slot and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_enc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)])
 ECDH command with a private key in a slot and the premaster secret is read from the next slot.
 
ATCA_STATUS atcab_ecdh_ioenc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in a slot and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_ecdh_tempkey (const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in TempKey and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_tempkey_ioenc (const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in TempKey and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_gendig (uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size)
 Issues a GenDig command, which performs a SHA256 hash on the source data indicated by zone with the contents of TempKey. See the CryptoAuth datasheet for your chip to see what the values of zone correspond to.
 
ATCA_STATUS atcab_gendivkey (const uint8_t *other_data)
 Issues a GenDivKey command to generate the equivalent diversified key as that programmed into the client side device.
 
ATCA_STATUS atcab_genkey_base (uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key)
 Issues GenKey command, which can generate a private key, compute a public key, nd/or compute a digest of a public key.
 
ATCA_STATUS atcab_genkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_genkey (uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_get_pubkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_get_pubkey (uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_hmac (uint8_t mode, uint16_t key_id, uint8_t *digest)
 Issues a HMAC command, which computes an HMAC/SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_info_base (uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS atcab_info_ext (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info (uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_lock_status (uint16_t param2, uint8_t *is_locked)
 Use the Info command to get the lock status.
 
ATCA_STATUS atcab_info_chip_status (uint8_t *chip_status)
 Use the Info command to get the chip status.
 
ATCA_STATUS atcab_info_set_latch (bool state)
 Use the Info command to set the persistent latch state for an ATECC608 device.
 
ATCA_STATUS atcab_info_get_latch (bool *state)
 Use the Info command to get the persistent latch current state for an ATECC608 device.
 
ATCA_STATUS atcab_kdf (uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce)
 Executes the KDF command, which derives a new key in PRF, AES, or HKDF modes.
 
ATCA_STATUS atcab_lock (uint8_t mode, uint16_t summary_crc)
 The Lock command prevents future modifications of the Configuration and/or Data and OTP zones. If the device is so configured, then this command can be used to lock individual data slots. This command fails if the designated area is already locked.
 
ATCA_STATUS atcab_lock_config_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone (void)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_crc (uint16_t summary_crc)
 Lock the config zone with summary CRC.
 
ATCA_STATUS atcab_lock_data_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone (void)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_crc (uint16_t summary_crc)
 Lock the data zone (slots and OTP) with summary CRC.
 
ATCA_STATUS atcab_lock_data_slot_ext (ATCADevice device, uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_lock_data_slot (uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_mac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest)
 Executes MAC command, which computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_nonce_base (uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out)
 Executes Nonce command, which loads a random or fixed nonce/data into the device for use by subsequent commands.
 
ATCA_STATUS atcab_nonce (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_nonce_load (uint8_t target, const uint8_t *num_in, uint16_t num_in_size)
 Execute a Nonce command in pass-through mode to load one of the device's internal buffers with a fixed value.
 
ATCA_STATUS atcab_nonce_rand_ext (ATCADevice device, const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_nonce_rand (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_challenge (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_challenge_seed_update (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random challenge combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_priv_write (uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)])
 Executes PrivWrite command, to write externally generated ECC private keys into the device.
 
ATCA_STATUS atcab_random_ext (ATCADevice device, uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_random (uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_read_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_read_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_is_locked (uint8_t zone, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified zone is locked.
 
ATCA_STATUS atcab_is_config_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_config_locked (bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked (bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_slot_locked_ext (ATCADevice device, uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_slot_locked (uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_private_ext (ATCADevice device, uint16_t slot, bool *is_private)
 Check to see if the key is a private key or not.
 
-ATCA_STATUS atcab_is_private (uint16_t slot, bool *is_private)
 
-ATCA_STATUS atcab_read_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 
ATCA_STATUS atcab_read_bytes_zone (uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 Used to read an arbitrary number of bytes from any zone configured for clear reads.
 
ATCA_STATUS atcab_read_serial_number_ext (ATCADevice device, uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_serial_number (uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_pubkey_ext (ATCADevice device, uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_pubkey (uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_sig (uint16_t slot, uint8_t *sig)
 Executes Read command to read a 64 byte ECDSA P256 signature from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_config_zone_ext (ATCADevice device, uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_read_config_zone (uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_cmp_config_zone (uint8_t *config_data, bool *same_config)
 Compares a specified configuration zone with the configuration zone currently on the device.
 
ATCA_STATUS atcab_read_enc (uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes Read command on a slot configured for encrypted reads and decrypts the data to return it as plaintext.
 
ATCA_STATUS atcab_secureboot (uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac)
 Executes Secure Boot command, which provides support for secure boot of an external MCU or MPU.
 
ATCA_STATUS atcab_secureboot_mac (uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes Secure Boot command with encrypted digest and validated MAC response using the IO protection key.
 
ATCA_STATUS atcab_selftest (uint8_t mode, uint16_t param2, uint8_t *result)
 Executes the SelfTest command, which performs a test of one or more of the cryptographic engines within the ATECC608 chip.
 
ATCA_STATUS atcab_sha_base (uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size)
 Executes SHA command, which computes a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system.
 
ATCA_STATUS atcab_sha_start (void)
 Executes SHA command to initialize SHA-256 calculation engine.
 
ATCA_STATUS atcab_sha_update (const uint8_t *message)
 Executes SHA command to add 64 bytes of message data to the current context.
 
ATCA_STATUS atcab_sha_end (uint8_t *digest, uint16_t length, const uint8_t *message)
 Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_read_context (uint8_t *context, uint16_t *context_size)
 Executes SHA command to read the SHA-256 context back. Only for ATECC608 with SHA-256 contexts. HMAC not supported.
 
ATCA_STATUS atcab_sha_write_context (const uint8_t *context, uint16_t context_size)
 Executes SHA command to write (restore) a SHA-256 context into the the device. Only supported for ATECC608 with SHA-256 contexts.
 
ATCA_STATUS atcab_sha (uint16_t length, const uint8_t *message, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256_init (atca_sha256_ctx_t *ctx)
 Initialize a SHA context for performing a hardware SHA-256 operation on a device. Note that only one SHA operation can be run at a time.
 
ATCA_STATUS atcab_hw_sha2_256_update (atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Add message data to a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_hw_sha2_256_finish (atca_sha256_ctx_t *ctx, uint8_t *digest)
 Finish SHA-256 digest for a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_sha_hmac_init (atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot)
 Executes SHA command to start an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_update (atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Executes SHA command to add an arbitrary amount of message data to a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_finish (atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target)
 Executes SHA command to complete a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_ext (ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac (const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sign_base (uint8_t mode, uint16_t key_id, uint8_t *signature)
 Executes the Sign command, which generates a signature using the ECDSA algorithm.
 
ATCA_STATUS atcab_sign_ext (ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign (uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_internal (uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature)
 Executes Sign command to sign an internally generated message.
 
ATCA_STATUS atcab_updateextra (uint8_t mode, uint16_t new_value)
 Executes UpdateExtra command to update the values of the two extra bytes within the Configuration zone (bytes 84 and 85).
 
ATCA_STATUS atcab_verify (uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac)
 Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command.
 
ATCA_STATUS atcab_verify_extern_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_mac (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_stored_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored (const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_with_tempkey (const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. keyConfig.reqrandom bit should be set and the message to be signed should be already loaded into TempKey for all devices.
 
ATCA_STATUS atcab_verify_stored_mac (const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with a public key stored in the device. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_validate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Validate mode to validate a public key stored in a slot.
 
ATCA_STATUS atcab_verify_invalidate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Invalidate mode which invalidates a previously validated public key stored in a slot.
 
ATCA_STATUS atcab_write (uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac)
 Executes the Write command, which writes either one four byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for this slot, the data may be required to be encrypted by the system prior to being sent to the device. This command cannot be used to write slots configured as ECC private keys.
 
ATCA_STATUS atcab_write_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
ATCA_STATUS atcab_write_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
-ATCA_STATUS atcab_write_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 
ATCA_STATUS atcab_write_bytes_zone (uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 Executes the Write command, which writes data into the configuration, otp, or data zones with a given byte offset and length. Offset and length must be multiples of a word (4 bytes).
 
ATCA_STATUS atcab_write_pubkey_ext (ATCADevice device, uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_pubkey (uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_config_zone_ext (ATCADevice device, const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_config_zone (const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_enc (uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes the Write command, which performs an encrypted write of a 32 byte block into given slot.
 
ATCA_STATUS atcab_write_config_counter (uint16_t counter_id, uint32_t counter_value)
 Initialize one of the monotonic counters in device with a specific value.
 
- - - -

-Variables

-ATCADevice g_atcab_device_ptr = NULL
 
-

Detailed Description

-

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.

- -
-
- - - - diff --git a/a00221.js b/a00221.js deleted file mode 100644 index 1c5971060..000000000 --- a/a00221.js +++ /dev/null @@ -1,153 +0,0 @@ -var a00221 = -[ - [ "atcab_aes", "a01439.html#gad115ce255664a48b80e90ea19c156b79", null ], - [ "atcab_aes_decrypt", "a01439.html#ga9658e84055727e6357cf7ef636b4e398", null ], - [ "atcab_aes_decrypt_ext", "a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b", null ], - [ "atcab_aes_encrypt", "a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1", null ], - [ "atcab_aes_encrypt_ext", "a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba", null ], - [ "atcab_aes_gcm_aad_update", "a01439.html#ga1d6fd831a8125a366504a0ab77b62da8", null ], - [ "atcab_aes_gcm_aad_update_ext", "a01439.html#ga1c6666c7b4d077fb058adc4971da2160", null ], - [ "atcab_aes_gcm_decrypt_finish", "a01439.html#gaa86508958ff3d81f9bd8e79344537218", null ], - [ "atcab_aes_gcm_decrypt_finish_ext", "a01439.html#ga9c5173c7529f898f251814133169ba1d", null ], - [ "atcab_aes_gcm_decrypt_update", "a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738", null ], - [ "atcab_aes_gcm_decrypt_update_ext", "a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2", null ], - [ "atcab_aes_gcm_encrypt_finish", "a01439.html#gada2d38835826587970de3868ca48eaa4", null ], - [ "atcab_aes_gcm_encrypt_finish_ext", "a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123", null ], - [ "atcab_aes_gcm_encrypt_update", "a01439.html#gab3fda8219d17d1b7bc50b1040399a47d", null ], - [ "atcab_aes_gcm_encrypt_update_ext", "a01439.html#gaac8b8555b03b50a118b70cb8387c24ae", null ], - [ "atcab_aes_gcm_init", "a01439.html#ga4805112b62e86b5465e24648504dc374", null ], - [ "atcab_aes_gcm_init_ext", "a01439.html#ga8742a7be77a2350c069c5c380ac4c635", null ], - [ "atcab_aes_gcm_init_rand", "a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6", null ], - [ "atcab_aes_gfm", "a01439.html#ga5554940ed4c7c7e28652ce6923cf9314", null ], - [ "atcab_challenge", "a01439.html#ga114a721517c95d5ba5fcac5b226669d6", null ], - [ "atcab_challenge_seed_update", "a01439.html#gaadde4309089c569fd87c24a1a2326cd4", null ], - [ "atcab_checkmac", "a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee", null ], - [ "atcab_checkmac_with_response_mac", "a01439.html#gad50eab1ee1abb18515e914a294668907", null ], - [ "atcab_cmp_config_zone", "a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87", null ], - [ "atcab_counter", "a01439.html#gabaaaef242649206029e1c10ac6d1fb7d", null ], - [ "atcab_counter_increment", "a01439.html#ga6e510e056ea16a0a34b405b7ca378f16", null ], - [ "atcab_counter_read", "a01439.html#gaeee666028a097659af69cc828a6bd68b", null ], - [ "atcab_derivekey", "a01439.html#ga34b7b6d46868f0d63d195216ef9939b1", null ], - [ "atcab_derivekey_ext", "a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31", null ], - [ "atcab_ecdh", "a01439.html#ga6fc480ad2824df6309f4f370ffad15f9", null ], - [ "atcab_ecdh_base", "a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c", null ], - [ "atcab_ecdh_enc", "a01439.html#ga51e3ae10f0596d473f646074650904e6", null ], - [ "atcab_ecdh_ioenc", "a01439.html#ga975f7303086190d3b6f76c367583d622", null ], - [ "atcab_ecdh_tempkey", "a01439.html#gac244b83b061ffd8ae3d59b5f973baa53", null ], - [ "atcab_ecdh_tempkey_ioenc", "a01439.html#gafaccb0c9d12154b0c5b917f89f233721", null ], - [ "atcab_gendig", "a01439.html#ga70751ea87f2cf913986bc7bca2cc661f", null ], - [ "atcab_gendivkey", "a01439.html#ga3f7953865c6091f266e727714e6f91dd", null ], - [ "atcab_genkey", "a01439.html#ga617bdbdce7b5736351d93214d44c5b8f", null ], - [ "atcab_genkey_base", "a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903", null ], - [ "atcab_genkey_ext", "a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c", null ], - [ "atcab_get_device", "a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4", null ], - [ "atcab_get_device_address", "a01439.html#ga775bea13de8cc26e61a34ada48358568", null ], - [ "atcab_get_device_type", "a01439.html#ga2b02163fab87313b81dd7f51345d3eb6", null ], - [ "atcab_get_device_type_ext", "a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d", null ], - [ "atcab_get_pubkey", "a01439.html#gad2096a4618dd37c48ed48847fe63d844", null ], - [ "atcab_get_pubkey_ext", "a01439.html#gae2cbb1989eff2c66935040f41a593bf6", null ], - [ "atcab_get_zone_size", "a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412", null ], - [ "atcab_get_zone_size_ext", "a01439.html#gad65cf773e03aed93e2a1437f13511a91", null ], - [ "atcab_hmac", "a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d", null ], - [ "atcab_hw_sha2_256", "a01439.html#ga4bf8b665fe1712626a480742c2daa16b", null ], - [ "atcab_hw_sha2_256_finish", "a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91", null ], - [ "atcab_hw_sha2_256_init", "a01439.html#gade49e7746864105730fa7d531645ff62", null ], - [ "atcab_hw_sha2_256_update", "a01439.html#ga67f2ce6224651d9cc65e9915e35558bd", null ], - [ "atcab_idle", "a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0", null ], - [ "atcab_info", "a01439.html#ga6e19ecd60be4c74665d9ec142e460771", null ], - [ "atcab_info_base", "a01439.html#ga806d07982fda5c30755af6b5b4ef9314", null ], - [ "atcab_info_chip_status", "a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043", null ], - [ "atcab_info_ext", "a01439.html#gacd308bac927905d5c59f526b40c63d76", null ], - [ "atcab_info_get_latch", "a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48", null ], - [ "atcab_info_lock_status", "a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35", null ], - [ "atcab_info_set_latch", "a01439.html#ga2649126606db8a0b64ae8e19d09f6600", null ], - [ "atcab_init", "a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8", null ], - [ "atcab_init_device", "a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4", null ], - [ "atcab_init_ext", "a01439.html#gaa1d392a2b2ae7a51907cb724f0465741", null ], - [ "atcab_is_ca2_device", "a01439.html#ga973437347c3261df0b116fec9ee9c378", null ], - [ "atcab_is_ca_device", "a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f", null ], - [ "atcab_is_config_locked", "a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36", null ], - [ "atcab_is_config_locked_ext", "a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08", null ], - [ "atcab_is_data_locked", "a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d", null ], - [ "atcab_is_data_locked_ext", "a01439.html#ga7e3189411975d835c0115511556302d8", null ], - [ "atcab_is_locked", "a01439.html#gaefce484222bdbedef37787a9b10d4426", null ], - [ "atcab_is_private_ext", "a01439.html#gac5f4cc263fd729871446e01cb063f141", null ], - [ "atcab_is_slot_locked", "a01439.html#ga802de50265ff91dc30dd7c93d9e026e1", null ], - [ "atcab_is_slot_locked_ext", "a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17", null ], - [ "atcab_is_ta_device", "a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3", null ], - [ "atcab_kdf", "a01439.html#ga40a6c01492a76366f9402302b527c4e1", null ], - [ "atcab_lock", "a01439.html#ga25d2895192d93c524f5dba92a492cdfb", null ], - [ "atcab_lock_config_zone", "a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23", null ], - [ "atcab_lock_config_zone_crc", "a01439.html#ga0698e0c55ad700fe57498321e842cb38", null ], - [ "atcab_lock_config_zone_ext", "a01439.html#gaf5059df8d40a5f9f0f5e2004039de424", null ], - [ "atcab_lock_data_slot", "a01439.html#ga958190a9182d1b54f82fbca8216406ea", null ], - [ "atcab_lock_data_slot_ext", "a01439.html#ga0d91be168c4b3714cc0177632627bfc3", null ], - [ "atcab_lock_data_zone", "a01439.html#ga8020aa89a5bed09ad35320b78e0fb890", null ], - [ "atcab_lock_data_zone_crc", "a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6", null ], - [ "atcab_lock_data_zone_ext", "a01439.html#ga8105d79d3dd914cf643121ff243b00a3", null ], - [ "atcab_mac", "a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791", null ], - [ "atcab_nonce", "a01439.html#ga2293df1c1c794496790bae25d3844fa5", null ], - [ "atcab_nonce_base", "a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6", null ], - [ "atcab_nonce_load", "a01439.html#ga2239ae3a87c341a48aa108bd82a58552", null ], - [ "atcab_nonce_rand", "a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c", null ], - [ "atcab_nonce_rand_ext", "a01439.html#ga89942894a5a8f82391d74346603aa837", null ], - [ "atcab_priv_write", "a01439.html#gaead7151af044da249b398dc457fc8e06", null ], - [ "atcab_random", "a01439.html#ga4fa442396dfbb89e59dfca837b565cec", null ], - [ "atcab_random_ext", "a01439.html#ga103f4596f0f9590971763592c5233ec3", null ], - [ "atcab_read_bytes_zone", "a01439.html#ga750704332198726725a327344f4f7dd5", null ], - [ "atcab_read_config_zone", "a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3", null ], - [ "atcab_read_config_zone_ext", "a01439.html#ga9ee98f13a88710e5234266b4b456b1dc", null ], - [ "atcab_read_enc", "a01439.html#ga0cf0048247bb577c85142510225ea960", null ], - [ "atcab_read_pubkey", "a01439.html#ga782ca1e5b1574b2b6793c841be22b28b", null ], - [ "atcab_read_pubkey_ext", "a01439.html#ga2ea51a5aafd900c9bdffeffe82274255", null ], - [ "atcab_read_serial_number", "a01439.html#ga96c434878e1f435e2cda5b0b5fec444f", null ], - [ "atcab_read_serial_number_ext", "a01439.html#ga8a741e461c20d2a72493bc6178826eb1", null ], - [ "atcab_read_sig", "a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7", null ], - [ "atcab_read_zone", "a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb", null ], - [ "atcab_read_zone_ext", "a01439.html#ga245f181cbf1ba418e60d060503945c33", null ], - [ "atcab_release", "a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4", null ], - [ "atcab_release_ext", "a01439.html#ga147803646532319e585a0fe7a6c028ef", null ], - [ "atcab_secureboot", "a01439.html#ga9506331ea7d454fe3c9b2585128c77aa", null ], - [ "atcab_secureboot_mac", "a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534", null ], - [ "atcab_selftest", "a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7", null ], - [ "atcab_sha", "a01439.html#ga31d269ccdafd08519a899a8aebf53df1", null ], - [ "atcab_sha_base", "a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4", null ], - [ "atcab_sha_end", "a01439.html#ga1db86704035048066a370815b657234d", null ], - [ "atcab_sha_hmac", "a01439.html#gae655ce06583c08169170102fbb0b55c9", null ], - [ "atcab_sha_hmac_ext", "a01439.html#gaede6ae09e6192e452ad261f4e15e1c62", null ], - [ "atcab_sha_hmac_finish", "a01439.html#gaa4be9972396b7cadb08dd8e2199daf08", null ], - [ "atcab_sha_hmac_init", "a01439.html#ga310a017cddce9ef05071cb619b4b6db9", null ], - [ "atcab_sha_hmac_update", "a01439.html#gae3343c160e80365b7e96bdfdc9b6365c", null ], - [ "atcab_sha_read_context", "a01439.html#ga74d1db50562642ce511fa7cbd384c2ab", null ], - [ "atcab_sha_start", "a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a", null ], - [ "atcab_sha_update", "a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949", null ], - [ "atcab_sha_write_context", "a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120", null ], - [ "atcab_sign", "a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8", null ], - [ "atcab_sign_base", "a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268", null ], - [ "atcab_sign_ext", "a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc", null ], - [ "atcab_sign_internal", "a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29", null ], - [ "atcab_sleep", "a01439.html#ga9475e032c388144c5a0df45d1df182a5", null ], - [ "atcab_updateextra", "a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d", null ], - [ "atcab_verify", "a01439.html#ga694d921c7bc17a0e158ef96e3d476700", null ], - [ "atcab_verify_extern", "a01439.html#ga2c3e18de900ba705192963d08b37f600", null ], - [ "atcab_verify_extern_ext", "a01439.html#ga3a4e2ffada9173db1a775a697bbebf18", null ], - [ "atcab_verify_extern_mac", "a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6", null ], - [ "atcab_verify_invalidate", "a01439.html#ga9393b545b2fa1fdd539672a0428a30ab", null ], - [ "atcab_verify_stored", "a01439.html#gae8cc7670847805423ad591985eecd832", null ], - [ "atcab_verify_stored_ext", "a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff", null ], - [ "atcab_verify_stored_mac", "a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7", null ], - [ "atcab_verify_stored_with_tempkey", "a01439.html#ga582dc8686f0491ad4292287f6971543c", null ], - [ "atcab_verify_validate", "a01439.html#gacf9a0c7772ebb65b87c4a4788850702b", null ], - [ "atcab_version", "a01439.html#gaff701132013eaac5600dd9fd6253505d", null ], - [ "atcab_wakeup", "a01439.html#gad3bc620aedd9322d160eece0d8d20c82", null ], - [ "atcab_write", "a01439.html#gabf2b29b4d3ae926b63c403d084380dbe", null ], - [ "atcab_write_bytes_zone", "a01439.html#gac395a7e195aa3cf28b48de345755feb0", null ], - [ "atcab_write_config_counter", "a01439.html#gab25ca44957dff1c2df34607738ca3bf7", null ], - [ "atcab_write_config_zone", "a01439.html#ga0777a86aa412a97b19cc72a12c171b94", null ], - [ "atcab_write_config_zone_ext", "a01439.html#ga92d651c637007f8c3672c3313767c0e7", null ], - [ "atcab_write_enc", "a01439.html#ga78a5394997ea31b125cd57d07aa73636", null ], - [ "atcab_write_pubkey", "a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa", null ], - [ "atcab_write_pubkey_ext", "a01439.html#gaa80d6c193374d363649236778289f2ea", null ], - [ "atcab_write_zone", "a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2", null ], - [ "atcab_write_zone_ext", "a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1", null ] -]; \ No newline at end of file diff --git a/a00224.html b/a00224.html deleted file mode 100644 index 0c2177aa4..000000000 --- a/a00224.html +++ /dev/null @@ -1,613 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_basic.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_basic.h File Reference
-
-
- -

CryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to. -More...

- - - - - - - - -

-Macros

-#define atcab_get_addr(...)   calib_get_addr(__VA_ARGS__)
 
-#define atca_execute_command(...)   calib_execute_command(__VA_ARGS__)
 
-#define SHA_CONTEXT_MAX_SIZE   (109)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atcab_version (char *ver_str)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS atcab_init_ext (ATCADevice *device, ATCAIfaceCfg *cfg)
 Creates and initializes a ATCADevice context.
 
ATCA_STATUS atcab_init (ATCAIfaceCfg *cfg)
 Creates a global ATCADevice object used by Basic API.
 
ATCA_STATUS atcab_init_device (ATCADevice ca_device)
 Initialize the global ATCADevice object to point to one of your choosing for use with all the atcab_ basic API.
 
ATCA_STATUS atcab_release_ext (ATCADevice *device)
 release (free) the an ATCADevice instance.
 
ATCA_STATUS atcab_release (void)
 release (free) the global ATCADevice instance. This must be called in order to release or free up the interface.
 
ATCADevice atcab_get_device (void)
 Get the global device object.
 
ATCADeviceType atcab_get_device_type_ext (ATCADevice device)
 Get the selected device type of rthe device context.
 
ATCADeviceType atcab_get_device_type (void)
 Get the current device type configured for the global ATCADevice.
 
uint8_t atcab_get_device_address (ATCADevice device)
 Get the current device address based on the configured device and interface.
 
bool atcab_is_ca_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ca2_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ta_device (ATCADeviceType dev_type)
 Check whether the device is Trust Anchor device.
 
-ATCA_STATUS atcab_pbkdf2_sha256_ext (ATCADevice device, const uint32_t iter, const uint16_t slot, const uint8_t *salt, const size_t salt_len, uint8_t *result, size_t result_len)
 
-ATCA_STATUS atcab_pbkdf2_sha256 (const uint32_t iter, const uint16_t slot, const uint8_t *salt, const size_t salt_len, uint8_t *result, size_t result_len)
 
ATCA_STATUS atcab_wakeup (void)
 wakeup the CryptoAuth device
 
ATCA_STATUS atcab_idle (void)
 idle the CryptoAuth device
 
ATCA_STATUS atcab_sleep (void)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS atcab_get_zone_size (uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_get_zone_size_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_aes (uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out)
 Compute the AES-128 encrypt, decrypt, or GFM calculation.
 
ATCA_STATUS atcab_aes_encrypt (uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_encrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt (uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_gfm (const uint8_t *h, const uint8_t *input, uint8_t *output)
 Perform a Galois Field Multiply (GFM) operation.
 
ATCA_STATUS atcab_aes_gcm_init (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_rand (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv)
 Initialize context for AES GCM operation with a IV composed of a random and optional fixed(free) field, which is common when starting an encrypt operation.
 
ATCA_STATUS atcab_aes_gcm_aad_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_aad_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish (atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish (atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_checkmac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data)
 Compares a MAC response with input values.
 
ATCA_STATUS atcab_checkmac_with_response_mac (uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac)
 Compares a MAC response with input values.SHA105 device can generate optional mac Output response mac mode only supports in SHA105 device.
 
ATCA_STATUS atcab_counter (uint8_t mode, uint16_t counter_id, uint32_t *counter_value)
 Compute the Counter functions.
 
ATCA_STATUS atcab_counter_increment (uint16_t counter_id, uint32_t *counter_value)
 Increments one of the device's monotonic counters.
 
ATCA_STATUS atcab_counter_read (uint16_t counter_id, uint32_t *counter_value)
 Read one of the device's monotonic counters.
 
ATCA_STATUS atcab_derivekey (uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_derivekey_ext (ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_ecdh_base (uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce)
 Base function for generating premaster secret key using ECDH.
 
ATCA_STATUS atcab_ecdh (uint16_t key_id, const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in a slot and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_enc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)])
 ECDH command with a private key in a slot and the premaster secret is read from the next slot.
 
ATCA_STATUS atcab_ecdh_ioenc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in a slot and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_ecdh_tempkey (const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in TempKey and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_tempkey_ioenc (const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in TempKey and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_gendig (uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size)
 Issues a GenDig command, which performs a SHA256 hash on the source data indicated by zone with the contents of TempKey. See the CryptoAuth datasheet for your chip to see what the values of zone correspond to.
 
ATCA_STATUS atcab_gendivkey (const uint8_t *other_data)
 Issues a GenDivKey command to generate the equivalent diversified key as that programmed into the client side device.
 
ATCA_STATUS atcab_genkey_base (uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key)
 Issues GenKey command, which can generate a private key, compute a public key, nd/or compute a digest of a public key.
 
ATCA_STATUS atcab_genkey (uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_genkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_get_pubkey (uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_get_pubkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_hmac (uint8_t mode, uint16_t key_id, uint8_t *digest)
 Issues a HMAC command, which computes an HMAC/SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_info_base (uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS atcab_info (uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_ext (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_lock_status (uint16_t param2, uint8_t *is_locked)
 Use the Info command to get the lock status.
 
ATCA_STATUS atcab_info_chip_status (uint8_t *chip_status)
 Use the Info command to get the chip status.
 
ATCA_STATUS atcab_info_set_latch (bool state)
 Use the Info command to set the persistent latch state for an ATECC608 device.
 
ATCA_STATUS atcab_info_get_latch (bool *state)
 Use the Info command to get the persistent latch current state for an ATECC608 device.
 
ATCA_STATUS atcab_kdf (uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce)
 Executes the KDF command, which derives a new key in PRF, AES, or HKDF modes.
 
ATCA_STATUS atcab_lock (uint8_t mode, uint16_t summary_crc)
 The Lock command prevents future modifications of the Configuration and/or Data and OTP zones. If the device is so configured, then this command can be used to lock individual data slots. This command fails if the designated area is already locked.
 
ATCA_STATUS atcab_lock_config_zone (void)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_crc (uint16_t summary_crc)
 Lock the config zone with summary CRC.
 
ATCA_STATUS atcab_lock_data_zone (void)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_crc (uint16_t summary_crc)
 Lock the data zone (slots and OTP) with summary CRC.
 
ATCA_STATUS atcab_lock_data_slot (uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_lock_data_slot_ext (ATCADevice device, uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_mac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest)
 Executes MAC command, which computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_nonce_base (uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out)
 Executes Nonce command, which loads a random or fixed nonce/data into the device for use by subsequent commands.
 
ATCA_STATUS atcab_nonce (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_nonce_load (uint8_t target, const uint8_t *num_in, uint16_t num_in_size)
 Execute a Nonce command in pass-through mode to load one of the device's internal buffers with a fixed value.
 
ATCA_STATUS atcab_nonce_rand (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_nonce_rand_ext (ATCADevice device, const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_challenge (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_challenge_seed_update (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random challenge combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_priv_write (uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)])
 Executes PrivWrite command, to write externally generated ECC private keys into the device.
 
ATCA_STATUS atcab_random (uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_random_ext (ATCADevice device, uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_read_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_read_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_is_locked (uint8_t zone, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified zone is locked.
 
ATCA_STATUS atcab_is_config_locked (bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_config_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked (bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_slot_locked (uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_slot_locked_ext (ATCADevice device, uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_private_ext (ATCADevice device, uint16_t slot, bool *is_private)
 Check to see if the key is a private key or not.
 
-ATCA_STATUS atcab_is_private (uint16_t slot, bool *is_private)
 
-ATCA_STATUS atcab_read_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 
ATCA_STATUS atcab_read_bytes_zone (uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 Used to read an arbitrary number of bytes from any zone configured for clear reads.
 
ATCA_STATUS atcab_read_serial_number (uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_serial_number_ext (ATCADevice device, uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_pubkey (uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_pubkey_ext (ATCADevice device, uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_sig (uint16_t slot, uint8_t *sig)
 Executes Read command to read a 64 byte ECDSA P256 signature from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_config_zone (uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_read_config_zone_ext (ATCADevice device, uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_cmp_config_zone (uint8_t *config_data, bool *same_config)
 Compares a specified configuration zone with the configuration zone currently on the device.
 
ATCA_STATUS atcab_read_enc (uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes Read command on a slot configured for encrypted reads and decrypts the data to return it as plaintext.
 
ATCA_STATUS atcab_secureboot (uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac)
 Executes Secure Boot command, which provides support for secure boot of an external MCU or MPU.
 
ATCA_STATUS atcab_secureboot_mac (uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes Secure Boot command with encrypted digest and validated MAC response using the IO protection key.
 
ATCA_STATUS atcab_selftest (uint8_t mode, uint16_t param2, uint8_t *result)
 Executes the SelfTest command, which performs a test of one or more of the cryptographic engines within the ATECC608 chip.
 
ATCA_STATUS atcab_sha_base (uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size)
 Executes SHA command, which computes a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system.
 
ATCA_STATUS atcab_sha_start (void)
 Executes SHA command to initialize SHA-256 calculation engine.
 
ATCA_STATUS atcab_sha_update (const uint8_t *message)
 Executes SHA command to add 64 bytes of message data to the current context.
 
ATCA_STATUS atcab_sha_end (uint8_t *digest, uint16_t length, const uint8_t *message)
 Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_read_context (uint8_t *context, uint16_t *context_size)
 Executes SHA command to read the SHA-256 context back. Only for ATECC608 with SHA-256 contexts. HMAC not supported.
 
ATCA_STATUS atcab_sha_write_context (const uint8_t *context, uint16_t context_size)
 Executes SHA command to write (restore) a SHA-256 context into the the device. Only supported for ATECC608 with SHA-256 contexts.
 
ATCA_STATUS atcab_sha (uint16_t length, const uint8_t *message, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256_init (atca_sha256_ctx_t *ctx)
 Initialize a SHA context for performing a hardware SHA-256 operation on a device. Note that only one SHA operation can be run at a time.
 
ATCA_STATUS atcab_hw_sha2_256_update (atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Add message data to a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_hw_sha2_256_finish (atca_sha256_ctx_t *ctx, uint8_t *digest)
 Finish SHA-256 digest for a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_sha_hmac_init (atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot)
 Executes SHA command to start an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_update (atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Executes SHA command to add an arbitrary amount of message data to a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_finish (atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target)
 Executes SHA command to complete a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac (const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_ext (ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sign_base (uint8_t mode, uint16_t key_id, uint8_t *signature)
 Executes the Sign command, which generates a signature using the ECDSA algorithm.
 
ATCA_STATUS atcab_sign (uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_ext (ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_internal (uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature)
 Executes Sign command to sign an internally generated message.
 
ATCA_STATUS atcab_updateextra (uint8_t mode, uint16_t new_value)
 Executes UpdateExtra command to update the values of the two extra bytes within the Configuration zone (bytes 84 and 85).
 
ATCA_STATUS atcab_verify (uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac)
 Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command.
 
ATCA_STATUS atcab_verify_extern (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_mac (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_stored (const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_with_tempkey (const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. keyConfig.reqrandom bit should be set and the message to be signed should be already loaded into TempKey for all devices.
 
ATCA_STATUS atcab_verify_stored_mac (const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with a public key stored in the device. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_validate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Validate mode to validate a public key stored in a slot.
 
ATCA_STATUS atcab_verify_invalidate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Invalidate mode which invalidates a previously validated public key stored in a slot.
 
ATCA_STATUS atcab_write (uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac)
 Executes the Write command, which writes either one four byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for this slot, the data may be required to be encrypted by the system prior to being sent to the device. This command cannot be used to write slots configured as ECC private keys.
 
ATCA_STATUS atcab_write_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
ATCA_STATUS atcab_write_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
-ATCA_STATUS atcab_write_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 
ATCA_STATUS atcab_write_bytes_zone (uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 Executes the Write command, which writes data into the configuration, otp, or data zones with a given byte offset and length. Offset and length must be multiples of a word (4 bytes).
 
ATCA_STATUS atcab_write_pubkey (uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_pubkey_ext (ATCADevice device, uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_config_zone (const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_config_zone_ext (ATCADevice device, const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_enc (uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes the Write command, which performs an encrypted write of a 32 byte block into given slot.
 
ATCA_STATUS atcab_write_config_counter (uint16_t counter_id, uint32_t counter_value)
 Initialize one of the monotonic counters in device with a specific value.
 
- - - -

-Variables

-ATCADevice g_atcab_device_ptr
 
-

Detailed Description

-

CryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to.

- -
-
- - - - diff --git a/a00224.js b/a00224.js deleted file mode 100644 index 517d03ada..000000000 --- a/a00224.js +++ /dev/null @@ -1,153 +0,0 @@ -var a00224 = -[ - [ "atcab_aes", "a01439.html#gad115ce255664a48b80e90ea19c156b79", null ], - [ "atcab_aes_decrypt", "a01439.html#ga9658e84055727e6357cf7ef636b4e398", null ], - [ "atcab_aes_decrypt_ext", "a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b", null ], - [ "atcab_aes_encrypt", "a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1", null ], - [ "atcab_aes_encrypt_ext", "a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba", null ], - [ "atcab_aes_gcm_aad_update", "a01439.html#ga1d6fd831a8125a366504a0ab77b62da8", null ], - [ "atcab_aes_gcm_aad_update_ext", "a01439.html#ga1c6666c7b4d077fb058adc4971da2160", null ], - [ "atcab_aes_gcm_decrypt_finish", "a01439.html#gaa86508958ff3d81f9bd8e79344537218", null ], - [ "atcab_aes_gcm_decrypt_finish_ext", "a01439.html#ga9c5173c7529f898f251814133169ba1d", null ], - [ "atcab_aes_gcm_decrypt_update", "a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738", null ], - [ "atcab_aes_gcm_decrypt_update_ext", "a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2", null ], - [ "atcab_aes_gcm_encrypt_finish", "a01439.html#gada2d38835826587970de3868ca48eaa4", null ], - [ "atcab_aes_gcm_encrypt_finish_ext", "a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123", null ], - [ "atcab_aes_gcm_encrypt_update", "a01439.html#gab3fda8219d17d1b7bc50b1040399a47d", null ], - [ "atcab_aes_gcm_encrypt_update_ext", "a01439.html#gaac8b8555b03b50a118b70cb8387c24ae", null ], - [ "atcab_aes_gcm_init", "a01439.html#ga4805112b62e86b5465e24648504dc374", null ], - [ "atcab_aes_gcm_init_ext", "a01439.html#ga8742a7be77a2350c069c5c380ac4c635", null ], - [ "atcab_aes_gcm_init_rand", "a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6", null ], - [ "atcab_aes_gfm", "a01439.html#ga5554940ed4c7c7e28652ce6923cf9314", null ], - [ "atcab_challenge", "a01439.html#ga114a721517c95d5ba5fcac5b226669d6", null ], - [ "atcab_challenge_seed_update", "a01439.html#gaadde4309089c569fd87c24a1a2326cd4", null ], - [ "atcab_checkmac", "a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee", null ], - [ "atcab_checkmac_with_response_mac", "a01439.html#gad50eab1ee1abb18515e914a294668907", null ], - [ "atcab_cmp_config_zone", "a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87", null ], - [ "atcab_counter", "a01439.html#gabaaaef242649206029e1c10ac6d1fb7d", null ], - [ "atcab_counter_increment", "a01439.html#ga6e510e056ea16a0a34b405b7ca378f16", null ], - [ "atcab_counter_read", "a01439.html#gaeee666028a097659af69cc828a6bd68b", null ], - [ "atcab_derivekey", "a01439.html#ga34b7b6d46868f0d63d195216ef9939b1", null ], - [ "atcab_derivekey_ext", "a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31", null ], - [ "atcab_ecdh", "a01439.html#ga6fc480ad2824df6309f4f370ffad15f9", null ], - [ "atcab_ecdh_base", "a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c", null ], - [ "atcab_ecdh_enc", "a01439.html#ga51e3ae10f0596d473f646074650904e6", null ], - [ "atcab_ecdh_ioenc", "a01439.html#ga975f7303086190d3b6f76c367583d622", null ], - [ "atcab_ecdh_tempkey", "a01439.html#gac244b83b061ffd8ae3d59b5f973baa53", null ], - [ "atcab_ecdh_tempkey_ioenc", "a01439.html#gafaccb0c9d12154b0c5b917f89f233721", null ], - [ "atcab_gendig", "a01439.html#ga70751ea87f2cf913986bc7bca2cc661f", null ], - [ "atcab_gendivkey", "a01439.html#ga3f7953865c6091f266e727714e6f91dd", null ], - [ "atcab_genkey", "a01439.html#ga617bdbdce7b5736351d93214d44c5b8f", null ], - [ "atcab_genkey_base", "a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903", null ], - [ "atcab_genkey_ext", "a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c", null ], - [ "atcab_get_device", "a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4", null ], - [ "atcab_get_device_address", "a01439.html#ga775bea13de8cc26e61a34ada48358568", null ], - [ "atcab_get_device_type", "a01439.html#ga2b02163fab87313b81dd7f51345d3eb6", null ], - [ "atcab_get_device_type_ext", "a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d", null ], - [ "atcab_get_pubkey", "a01439.html#gad2096a4618dd37c48ed48847fe63d844", null ], - [ "atcab_get_pubkey_ext", "a01439.html#gae2cbb1989eff2c66935040f41a593bf6", null ], - [ "atcab_get_zone_size", "a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412", null ], - [ "atcab_get_zone_size_ext", "a01439.html#gad65cf773e03aed93e2a1437f13511a91", null ], - [ "atcab_hmac", "a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d", null ], - [ "atcab_hw_sha2_256", "a01439.html#ga4bf8b665fe1712626a480742c2daa16b", null ], - [ "atcab_hw_sha2_256_finish", "a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91", null ], - [ "atcab_hw_sha2_256_init", "a01439.html#gade49e7746864105730fa7d531645ff62", null ], - [ "atcab_hw_sha2_256_update", "a01439.html#ga67f2ce6224651d9cc65e9915e35558bd", null ], - [ "atcab_idle", "a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0", null ], - [ "atcab_info", "a01439.html#ga6e19ecd60be4c74665d9ec142e460771", null ], - [ "atcab_info_base", "a01439.html#ga806d07982fda5c30755af6b5b4ef9314", null ], - [ "atcab_info_chip_status", "a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043", null ], - [ "atcab_info_ext", "a01439.html#gacd308bac927905d5c59f526b40c63d76", null ], - [ "atcab_info_get_latch", "a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48", null ], - [ "atcab_info_lock_status", "a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35", null ], - [ "atcab_info_set_latch", "a01439.html#ga2649126606db8a0b64ae8e19d09f6600", null ], - [ "atcab_init", "a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8", null ], - [ "atcab_init_device", "a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4", null ], - [ "atcab_init_ext", "a01439.html#gaa1d392a2b2ae7a51907cb724f0465741", null ], - [ "atcab_is_ca2_device", "a01439.html#ga973437347c3261df0b116fec9ee9c378", null ], - [ "atcab_is_ca_device", "a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f", null ], - [ "atcab_is_config_locked", "a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36", null ], - [ "atcab_is_config_locked_ext", "a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08", null ], - [ "atcab_is_data_locked", "a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d", null ], - [ "atcab_is_data_locked_ext", "a01439.html#ga7e3189411975d835c0115511556302d8", null ], - [ "atcab_is_locked", "a01439.html#gaefce484222bdbedef37787a9b10d4426", null ], - [ "atcab_is_private_ext", "a01439.html#gac5f4cc263fd729871446e01cb063f141", null ], - [ "atcab_is_slot_locked", "a01439.html#ga802de50265ff91dc30dd7c93d9e026e1", null ], - [ "atcab_is_slot_locked_ext", "a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17", null ], - [ "atcab_is_ta_device", "a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3", null ], - [ "atcab_kdf", "a01439.html#ga40a6c01492a76366f9402302b527c4e1", null ], - [ "atcab_lock", "a01439.html#ga25d2895192d93c524f5dba92a492cdfb", null ], - [ "atcab_lock_config_zone", "a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23", null ], - [ "atcab_lock_config_zone_crc", "a01439.html#ga0698e0c55ad700fe57498321e842cb38", null ], - [ "atcab_lock_config_zone_ext", "a01439.html#gaf5059df8d40a5f9f0f5e2004039de424", null ], - [ "atcab_lock_data_slot", "a01439.html#ga958190a9182d1b54f82fbca8216406ea", null ], - [ "atcab_lock_data_slot_ext", "a01439.html#ga0d91be168c4b3714cc0177632627bfc3", null ], - [ "atcab_lock_data_zone", "a01439.html#ga8020aa89a5bed09ad35320b78e0fb890", null ], - [ "atcab_lock_data_zone_crc", "a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6", null ], - [ "atcab_lock_data_zone_ext", "a01439.html#ga8105d79d3dd914cf643121ff243b00a3", null ], - [ "atcab_mac", "a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791", null ], - [ "atcab_nonce", "a01439.html#ga2293df1c1c794496790bae25d3844fa5", null ], - [ "atcab_nonce_base", "a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6", null ], - [ "atcab_nonce_load", "a01439.html#ga2239ae3a87c341a48aa108bd82a58552", null ], - [ "atcab_nonce_rand", "a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c", null ], - [ "atcab_nonce_rand_ext", "a01439.html#ga89942894a5a8f82391d74346603aa837", null ], - [ "atcab_priv_write", "a01439.html#gaead7151af044da249b398dc457fc8e06", null ], - [ "atcab_random", "a01439.html#ga4fa442396dfbb89e59dfca837b565cec", null ], - [ "atcab_random_ext", "a01439.html#ga103f4596f0f9590971763592c5233ec3", null ], - [ "atcab_read_bytes_zone", "a01439.html#ga750704332198726725a327344f4f7dd5", null ], - [ "atcab_read_config_zone", "a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3", null ], - [ "atcab_read_config_zone_ext", "a01439.html#ga9ee98f13a88710e5234266b4b456b1dc", null ], - [ "atcab_read_enc", "a01439.html#ga0cf0048247bb577c85142510225ea960", null ], - [ "atcab_read_pubkey", "a01439.html#ga782ca1e5b1574b2b6793c841be22b28b", null ], - [ "atcab_read_pubkey_ext", "a01439.html#ga2ea51a5aafd900c9bdffeffe82274255", null ], - [ "atcab_read_serial_number", "a01439.html#ga96c434878e1f435e2cda5b0b5fec444f", null ], - [ "atcab_read_serial_number_ext", "a01439.html#ga8a741e461c20d2a72493bc6178826eb1", null ], - [ "atcab_read_sig", "a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7", null ], - [ "atcab_read_zone", "a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb", null ], - [ "atcab_read_zone_ext", "a01439.html#ga245f181cbf1ba418e60d060503945c33", null ], - [ "atcab_release", "a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4", null ], - [ "atcab_release_ext", "a01439.html#ga147803646532319e585a0fe7a6c028ef", null ], - [ "atcab_secureboot", "a01439.html#ga9506331ea7d454fe3c9b2585128c77aa", null ], - [ "atcab_secureboot_mac", "a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534", null ], - [ "atcab_selftest", "a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7", null ], - [ "atcab_sha", "a01439.html#ga31d269ccdafd08519a899a8aebf53df1", null ], - [ "atcab_sha_base", "a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4", null ], - [ "atcab_sha_end", "a01439.html#ga1db86704035048066a370815b657234d", null ], - [ "atcab_sha_hmac", "a01439.html#gae655ce06583c08169170102fbb0b55c9", null ], - [ "atcab_sha_hmac_ext", "a01439.html#gaede6ae09e6192e452ad261f4e15e1c62", null ], - [ "atcab_sha_hmac_finish", "a01439.html#gaa4be9972396b7cadb08dd8e2199daf08", null ], - [ "atcab_sha_hmac_init", "a01439.html#ga310a017cddce9ef05071cb619b4b6db9", null ], - [ "atcab_sha_hmac_update", "a01439.html#gae3343c160e80365b7e96bdfdc9b6365c", null ], - [ "atcab_sha_read_context", "a01439.html#ga74d1db50562642ce511fa7cbd384c2ab", null ], - [ "atcab_sha_start", "a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a", null ], - [ "atcab_sha_update", "a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949", null ], - [ "atcab_sha_write_context", "a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120", null ], - [ "atcab_sign", "a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8", null ], - [ "atcab_sign_base", "a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268", null ], - [ "atcab_sign_ext", "a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc", null ], - [ "atcab_sign_internal", "a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29", null ], - [ "atcab_sleep", "a01439.html#ga9475e032c388144c5a0df45d1df182a5", null ], - [ "atcab_updateextra", "a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d", null ], - [ "atcab_verify", "a01439.html#ga694d921c7bc17a0e158ef96e3d476700", null ], - [ "atcab_verify_extern", "a01439.html#ga2c3e18de900ba705192963d08b37f600", null ], - [ "atcab_verify_extern_ext", "a01439.html#ga3a4e2ffada9173db1a775a697bbebf18", null ], - [ "atcab_verify_extern_mac", "a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6", null ], - [ "atcab_verify_invalidate", "a01439.html#ga9393b545b2fa1fdd539672a0428a30ab", null ], - [ "atcab_verify_stored", "a01439.html#gae8cc7670847805423ad591985eecd832", null ], - [ "atcab_verify_stored_ext", "a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff", null ], - [ "atcab_verify_stored_mac", "a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7", null ], - [ "atcab_verify_stored_with_tempkey", "a01439.html#ga582dc8686f0491ad4292287f6971543c", null ], - [ "atcab_verify_validate", "a01439.html#gacf9a0c7772ebb65b87c4a4788850702b", null ], - [ "atcab_version", "a01439.html#gaff701132013eaac5600dd9fd6253505d", null ], - [ "atcab_wakeup", "a01439.html#gad3bc620aedd9322d160eece0d8d20c82", null ], - [ "atcab_write", "a01439.html#gabf2b29b4d3ae926b63c403d084380dbe", null ], - [ "atcab_write_bytes_zone", "a01439.html#gac395a7e195aa3cf28b48de345755feb0", null ], - [ "atcab_write_config_counter", "a01439.html#gab25ca44957dff1c2df34607738ca3bf7", null ], - [ "atcab_write_config_zone", "a01439.html#ga0777a86aa412a97b19cc72a12c171b94", null ], - [ "atcab_write_config_zone_ext", "a01439.html#ga92d651c637007f8c3672c3313767c0e7", null ], - [ "atcab_write_enc", "a01439.html#ga78a5394997ea31b125cd57d07aa73636", null ], - [ "atcab_write_pubkey", "a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa", null ], - [ "atcab_write_pubkey_ext", "a01439.html#gaa80d6c193374d363649236778289f2ea", null ], - [ "atcab_write_zone", "a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2", null ], - [ "atcab_write_zone_ext", "a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1", null ] -]; \ No newline at end of file diff --git a/a00227.html b/a00227.html index d14e3f76e..c68935c4c 100644 --- a/a00227.html +++ b/a00227.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_cfgs.c File Reference +CryptoAuthLib: atca_basic.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,26 +97,495 @@
-
atca_cfgs.c File Reference
+ +
atca_basic.c File Reference
-

a set of default configurations for various ATCA devices and interfaces +

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods. More...

-
#include <stddef.h>
-#include "cryptoauthlib.h"
-#include "atca_cfgs.h"
-#include "atca_iface.h"
-#include "atca_device.h"
-

Detailed Description

-

a set of default configurations for various ATCA devices and interfaces

+
#include "atca_basic.h"
+#include "atca_version.h"
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS atcab_version (char *ver_str)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS atcab_init_ext (ATCADevice *device, ATCAIfaceCfg *cfg)
 Creates and initializes a ATCADevice context.
 
ATCA_STATUS atcab_init (ATCAIfaceCfg *cfg)
 Creates a global ATCADevice object used by Basic API.
 
ATCA_STATUS atcab_init_device (ATCADevice ca_device)
 Initialize the global ATCADevice object to point to one of your choosing for use with all the atcab_ basic API.
 
ATCA_STATUS atcab_release_ext (ATCADevice *device)
 release (free) the an ATCADevice instance.
 
ATCA_STATUS atcab_release (void)
 release (free) the global ATCADevice instance. This must be called in order to release or free up the interface.
 
ATCADevice atcab_get_device (void)
 Get the global device object.
 
ATCADeviceType atcab_get_device_type_ext (ATCADevice device)
 Get the selected device type of rthe device context.
 
ATCADeviceType atcab_get_device_type (void)
 Get the current device type configured for the global ATCADevice.
 
uint8_t atcab_get_device_address (ATCADevice device)
 Get the current device address based on the configured device and interface.
 
bool atcab_is_ca_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ca2_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ta_device (ATCADeviceType dev_type)
 Check whether the device is Trust Anchor device.
 
ATCA_STATUS atcab_wakeup (void)
 wakeup the CryptoAuth device
 
ATCA_STATUS atcab_idle (void)
 idle the CryptoAuth device
 
ATCA_STATUS atcab_sleep (void)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS atcab_get_zone_size_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_get_zone_size (uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_aes (uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out)
 Compute the AES-128 encrypt, decrypt, or GFM calculation.
 
ATCA_STATUS atcab_aes_encrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_encrypt (uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt (uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_gfm (const uint8_t *h, const uint8_t *input, uint8_t *output)
 Perform a Galois Field Multiply (GFM) operation.
 
ATCA_STATUS atcab_aes_gcm_init_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_rand (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv)
 Initialize context for AES GCM operation with a IV composed of a random and optional fixed(free) field, which is common when starting an encrypt operation.
 
ATCA_STATUS atcab_aes_gcm_aad_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_aad_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish (atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish (atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_checkmac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data)
 Compares a MAC response with input values.
 
ATCA_STATUS atcab_checkmac_with_response_mac (uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac)
 Compares a MAC response with input values.SHA105 device can generate optional mac Output response mac mode only supports in SHA105 device.
 
ATCA_STATUS atcab_counter (uint8_t mode, uint16_t counter_id, uint32_t *counter_value)
 Compute the Counter functions.
 
ATCA_STATUS atcab_counter_increment (uint16_t counter_id, uint32_t *counter_value)
 Increments one of the device's monotonic counters.
 
ATCA_STATUS atcab_counter_read (uint16_t counter_id, uint32_t *counter_value)
 Read one of the device's monotonic counters.
 
ATCA_STATUS atcab_derivekey_ext (ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_derivekey (uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_ecdh_base (uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce)
 Base function for generating premaster secret key using ECDH.
 
ATCA_STATUS atcab_ecdh (uint16_t key_id, const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in a slot and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_enc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)])
 ECDH command with a private key in a slot and the premaster secret is read from the next slot.
 
ATCA_STATUS atcab_ecdh_ioenc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in a slot and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_ecdh_tempkey (const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in TempKey and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_tempkey_ioenc (const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in TempKey and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_gendig (uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size)
 Issues a GenDig command, which performs a SHA256 hash on the source data indicated by zone with the contents of TempKey. See the CryptoAuth datasheet for your chip to see what the values of zone correspond to.
 
ATCA_STATUS atcab_gendivkey (const uint8_t *other_data)
 Issues a GenDivKey command to generate the equivalent diversified key as that programmed into the client side device.
 
ATCA_STATUS atcab_genkey_base (uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key)
 Issues GenKey command, which can generate a private key, compute a public key, nd/or compute a digest of a public key.
 
ATCA_STATUS atcab_genkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_genkey (uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_get_pubkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_get_pubkey (uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_hmac (uint8_t mode, uint16_t key_id, uint8_t *digest)
 Issues a HMAC command, which computes an HMAC/SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_info_base (uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS atcab_info_ext (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info (uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_lock_status (uint16_t param2, uint8_t *is_locked)
 Use the Info command to get the lock status.
 
ATCA_STATUS atcab_info_chip_status (uint8_t *chip_status)
 Use the Info command to get the chip status.
 
ATCA_STATUS atcab_info_set_latch (bool state)
 Use the Info command to set the persistent latch state for an ATECC608 device.
 
ATCA_STATUS atcab_info_get_latch (bool *state)
 Use the Info command to get the persistent latch current state for an ATECC608 device.
 
ATCA_STATUS atcab_kdf (uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce)
 Executes the KDF command, which derives a new key in PRF, AES, or HKDF modes.
 
ATCA_STATUS atcab_lock (uint8_t mode, uint16_t summary_crc)
 The Lock command prevents future modifications of the Configuration and/or Data and OTP zones. If the device is so configured, then this command can be used to lock individual data slots. This command fails if the designated area is already locked.
 
ATCA_STATUS atcab_lock_config_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone (void)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_crc (uint16_t summary_crc)
 Lock the config zone with summary CRC.
 
ATCA_STATUS atcab_lock_data_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone (void)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_crc (uint16_t summary_crc)
 Lock the data zone (slots and OTP) with summary CRC.
 
ATCA_STATUS atcab_lock_data_slot_ext (ATCADevice device, uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_lock_data_slot (uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_mac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest)
 Executes MAC command, which computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_nonce_base (uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out)
 Executes Nonce command, which loads a random or fixed nonce/data into the device for use by subsequent commands.
 
ATCA_STATUS atcab_nonce (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_nonce_load (uint8_t target, const uint8_t *num_in, uint16_t num_in_size)
 Execute a Nonce command in pass-through mode to load one of the device's internal buffers with a fixed value.
 
ATCA_STATUS atcab_nonce_rand_ext (ATCADevice device, const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_nonce_rand (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_challenge (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_challenge_seed_update (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random challenge combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_priv_write (uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)])
 Executes PrivWrite command, to write externally generated ECC private keys into the device.
 
ATCA_STATUS atcab_random_ext (ATCADevice device, uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_random (uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_read_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_read_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_is_locked (uint8_t zone, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified zone is locked.
 
ATCA_STATUS atcab_is_config_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_config_locked (bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked (bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_slot_locked_ext (ATCADevice device, uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_slot_locked (uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_private_ext (ATCADevice device, uint16_t slot, bool *is_private)
 Check to see if the key is a private key or not.
 
+ATCA_STATUS atcab_is_private (uint16_t slot, bool *is_private)
 
+ATCA_STATUS atcab_read_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 
ATCA_STATUS atcab_read_bytes_zone (uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 Used to read an arbitrary number of bytes from any zone configured for clear reads.
 
ATCA_STATUS atcab_read_serial_number_ext (ATCADevice device, uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_serial_number (uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_pubkey_ext (ATCADevice device, uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_pubkey (uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_sig (uint16_t slot, uint8_t *sig)
 Executes Read command to read a 64 byte ECDSA P256 signature from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_config_zone_ext (ATCADevice device, uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_read_config_zone (uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_cmp_config_zone (uint8_t *config_data, bool *same_config)
 Compares a specified configuration zone with the configuration zone currently on the device.
 
ATCA_STATUS atcab_read_enc (uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes Read command on a slot configured for encrypted reads and decrypts the data to return it as plaintext.
 
ATCA_STATUS atcab_secureboot (uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac)
 Executes Secure Boot command, which provides support for secure boot of an external MCU or MPU.
 
ATCA_STATUS atcab_secureboot_mac (uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes Secure Boot command with encrypted digest and validated MAC response using the IO protection key.
 
ATCA_STATUS atcab_selftest (uint8_t mode, uint16_t param2, uint8_t *result)
 Executes the SelfTest command, which performs a test of one or more of the cryptographic engines within the ATECC608 chip.
 
ATCA_STATUS atcab_sha_base (uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size)
 Executes SHA command, which computes a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system.
 
ATCA_STATUS atcab_sha_start (void)
 Executes SHA command to initialize SHA-256 calculation engine.
 
ATCA_STATUS atcab_sha_update (const uint8_t *message)
 Executes SHA command to add 64 bytes of message data to the current context.
 
ATCA_STATUS atcab_sha_end (uint8_t *digest, uint16_t length, const uint8_t *message)
 Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_read_context (uint8_t *context, uint16_t *context_size)
 Executes SHA command to read the SHA-256 context back. Only for ATECC608 with SHA-256 contexts. HMAC not supported.
 
ATCA_STATUS atcab_sha_write_context (const uint8_t *context, uint16_t context_size)
 Executes SHA command to write (restore) a SHA-256 context into the the device. Only supported for ATECC608 with SHA-256 contexts.
 
ATCA_STATUS atcab_sha (uint16_t length, const uint8_t *message, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256_init (atca_sha256_ctx_t *ctx)
 Initialize a SHA context for performing a hardware SHA-256 operation on a device. Note that only one SHA operation can be run at a time.
 
ATCA_STATUS atcab_hw_sha2_256_update (atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Add message data to a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_hw_sha2_256_finish (atca_sha256_ctx_t *ctx, uint8_t *digest)
 Finish SHA-256 digest for a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_sha_hmac_init (atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot)
 Executes SHA command to start an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_update (atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Executes SHA command to add an arbitrary amount of message data to a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_finish (atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target)
 Executes SHA command to complete a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_ext (ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac (const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sign_base (uint8_t mode, uint16_t key_id, uint8_t *signature)
 Executes the Sign command, which generates a signature using the ECDSA algorithm.
 
ATCA_STATUS atcab_sign_ext (ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign (uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_internal (uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature)
 Executes Sign command to sign an internally generated message.
 
ATCA_STATUS atcab_updateextra (uint8_t mode, uint16_t new_value)
 Executes UpdateExtra command to update the values of the two extra bytes within the Configuration zone (bytes 84 and 85).
 
ATCA_STATUS atcab_verify (uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac)
 Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command.
 
ATCA_STATUS atcab_verify_extern_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_mac (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_stored_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored (const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_with_tempkey (const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. keyConfig.reqrandom bit should be set and the message to be signed should be already loaded into TempKey for all devices.
 
ATCA_STATUS atcab_verify_stored_mac (const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with a public key stored in the device. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_validate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Validate mode to validate a public key stored in a slot.
 
ATCA_STATUS atcab_verify_invalidate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Invalidate mode which invalidates a previously validated public key stored in a slot.
 
ATCA_STATUS atcab_write (uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac)
 Executes the Write command, which writes either one four byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for this slot, the data may be required to be encrypted by the system prior to being sent to the device. This command cannot be used to write slots configured as ECC private keys.
 
ATCA_STATUS atcab_write_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
ATCA_STATUS atcab_write_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
+ATCA_STATUS atcab_write_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 
ATCA_STATUS atcab_write_bytes_zone (uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 Executes the Write command, which writes data into the configuration, otp, or data zones with a given byte offset and length. Offset and length must be multiples of a word (4 bytes).
 
ATCA_STATUS atcab_write_pubkey_ext (ATCADevice device, uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_pubkey (uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_config_zone_ext (ATCADevice device, const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_config_zone (const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_enc (uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes the Write command, which performs an encrypted write of a 32 byte block into given slot.
 
ATCA_STATUS atcab_write_config_counter (uint16_t counter_id, uint32_t counter_value)
 Initialize one of the monotonic counters in device with a specific value.
 
+ + + +

+Variables

+ATCADevice g_atcab_device_ptr = NULL
 
+

Detailed Description

+

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.

diff --git a/a00230.html b/a00230.html index 99382c624..50e34901a 100644 --- a/a00230.html +++ b/a00230.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_cfgs.h File Reference +CryptoAuthLib: atca_basic.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,22 +97,515 @@
-
atca_cfgs.h File Reference
+ +
atca_basic.h File Reference
-

a set of default configurations for various ATCA devices and interfaces +

CryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to. More...

-
#include "atca_iface.h"
-

Detailed Description

-

a set of default configurations for various ATCA devices and interfaces

+ + + + + + + + +

+Macros

+#define atcab_get_addr(...)   calib_get_addr(__VA_ARGS__)
 
+#define atca_execute_command(...)   calib_execute_command(__VA_ARGS__)
 
+#define SHA_CONTEXT_MAX_SIZE   (109)
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS atcab_version (char *ver_str)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS atcab_init_ext (ATCADevice *device, ATCAIfaceCfg *cfg)
 Creates and initializes a ATCADevice context.
 
ATCA_STATUS atcab_init (ATCAIfaceCfg *cfg)
 Creates a global ATCADevice object used by Basic API.
 
ATCA_STATUS atcab_init_device (ATCADevice ca_device)
 Initialize the global ATCADevice object to point to one of your choosing for use with all the atcab_ basic API.
 
ATCA_STATUS atcab_release_ext (ATCADevice *device)
 release (free) the an ATCADevice instance.
 
ATCA_STATUS atcab_release (void)
 release (free) the global ATCADevice instance. This must be called in order to release or free up the interface.
 
ATCADevice atcab_get_device (void)
 Get the global device object.
 
ATCADeviceType atcab_get_device_type_ext (ATCADevice device)
 Get the selected device type of rthe device context.
 
ATCADeviceType atcab_get_device_type (void)
 Get the current device type configured for the global ATCADevice.
 
uint8_t atcab_get_device_address (ATCADevice device)
 Get the current device address based on the configured device and interface.
 
bool atcab_is_ca_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ca2_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ta_device (ATCADeviceType dev_type)
 Check whether the device is Trust Anchor device.
 
+ATCA_STATUS atcab_pbkdf2_sha256_ext (ATCADevice device, const uint32_t iter, const uint16_t slot, const uint8_t *salt, const size_t salt_len, uint8_t *result, size_t result_len)
 
+ATCA_STATUS atcab_pbkdf2_sha256 (const uint32_t iter, const uint16_t slot, const uint8_t *salt, const size_t salt_len, uint8_t *result, size_t result_len)
 
ATCA_STATUS atcab_wakeup (void)
 wakeup the CryptoAuth device
 
ATCA_STATUS atcab_idle (void)
 idle the CryptoAuth device
 
ATCA_STATUS atcab_sleep (void)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS atcab_get_zone_size (uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_get_zone_size_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_aes (uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out)
 Compute the AES-128 encrypt, decrypt, or GFM calculation.
 
ATCA_STATUS atcab_aes_encrypt (uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_encrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt (uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_gfm (const uint8_t *h, const uint8_t *input, uint8_t *output)
 Perform a Galois Field Multiply (GFM) operation.
 
ATCA_STATUS atcab_aes_gcm_init (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_rand (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv)
 Initialize context for AES GCM operation with a IV composed of a random and optional fixed(free) field, which is common when starting an encrypt operation.
 
ATCA_STATUS atcab_aes_gcm_aad_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_aad_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish (atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish (atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_checkmac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data)
 Compares a MAC response with input values.
 
ATCA_STATUS atcab_checkmac_with_response_mac (uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac)
 Compares a MAC response with input values.SHA105 device can generate optional mac Output response mac mode only supports in SHA105 device.
 
ATCA_STATUS atcab_counter (uint8_t mode, uint16_t counter_id, uint32_t *counter_value)
 Compute the Counter functions.
 
ATCA_STATUS atcab_counter_increment (uint16_t counter_id, uint32_t *counter_value)
 Increments one of the device's monotonic counters.
 
ATCA_STATUS atcab_counter_read (uint16_t counter_id, uint32_t *counter_value)
 Read one of the device's monotonic counters.
 
ATCA_STATUS atcab_derivekey (uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_derivekey_ext (ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_ecdh_base (uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce)
 Base function for generating premaster secret key using ECDH.
 
ATCA_STATUS atcab_ecdh (uint16_t key_id, const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in a slot and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_enc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)])
 ECDH command with a private key in a slot and the premaster secret is read from the next slot.
 
ATCA_STATUS atcab_ecdh_ioenc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in a slot and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_ecdh_tempkey (const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in TempKey and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_tempkey_ioenc (const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in TempKey and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_gendig (uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size)
 Issues a GenDig command, which performs a SHA256 hash on the source data indicated by zone with the contents of TempKey. See the CryptoAuth datasheet for your chip to see what the values of zone correspond to.
 
ATCA_STATUS atcab_gendivkey (const uint8_t *other_data)
 Issues a GenDivKey command to generate the equivalent diversified key as that programmed into the client side device.
 
ATCA_STATUS atcab_genkey_base (uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key)
 Issues GenKey command, which can generate a private key, compute a public key, nd/or compute a digest of a public key.
 
ATCA_STATUS atcab_genkey (uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_genkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_get_pubkey (uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_get_pubkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_hmac (uint8_t mode, uint16_t key_id, uint8_t *digest)
 Issues a HMAC command, which computes an HMAC/SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_info_base (uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS atcab_info (uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_ext (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_lock_status (uint16_t param2, uint8_t *is_locked)
 Use the Info command to get the lock status.
 
ATCA_STATUS atcab_info_chip_status (uint8_t *chip_status)
 Use the Info command to get the chip status.
 
ATCA_STATUS atcab_info_set_latch (bool state)
 Use the Info command to set the persistent latch state for an ATECC608 device.
 
ATCA_STATUS atcab_info_get_latch (bool *state)
 Use the Info command to get the persistent latch current state for an ATECC608 device.
 
ATCA_STATUS atcab_kdf (uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce)
 Executes the KDF command, which derives a new key in PRF, AES, or HKDF modes.
 
ATCA_STATUS atcab_lock (uint8_t mode, uint16_t summary_crc)
 The Lock command prevents future modifications of the Configuration and/or Data and OTP zones. If the device is so configured, then this command can be used to lock individual data slots. This command fails if the designated area is already locked.
 
ATCA_STATUS atcab_lock_config_zone (void)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_crc (uint16_t summary_crc)
 Lock the config zone with summary CRC.
 
ATCA_STATUS atcab_lock_data_zone (void)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_crc (uint16_t summary_crc)
 Lock the data zone (slots and OTP) with summary CRC.
 
ATCA_STATUS atcab_lock_data_slot (uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_lock_data_slot_ext (ATCADevice device, uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_mac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest)
 Executes MAC command, which computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_nonce_base (uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out)
 Executes Nonce command, which loads a random or fixed nonce/data into the device for use by subsequent commands.
 
ATCA_STATUS atcab_nonce (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_nonce_load (uint8_t target, const uint8_t *num_in, uint16_t num_in_size)
 Execute a Nonce command in pass-through mode to load one of the device's internal buffers with a fixed value.
 
ATCA_STATUS atcab_nonce_rand (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_nonce_rand_ext (ATCADevice device, const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_challenge (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_challenge_seed_update (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random challenge combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_priv_write (uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)])
 Executes PrivWrite command, to write externally generated ECC private keys into the device.
 
ATCA_STATUS atcab_random (uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_random_ext (ATCADevice device, uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_read_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_read_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_is_locked (uint8_t zone, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified zone is locked.
 
ATCA_STATUS atcab_is_config_locked (bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_config_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked (bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_slot_locked (uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_slot_locked_ext (ATCADevice device, uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_private_ext (ATCADevice device, uint16_t slot, bool *is_private)
 Check to see if the key is a private key or not.
 
+ATCA_STATUS atcab_is_private (uint16_t slot, bool *is_private)
 
+ATCA_STATUS atcab_read_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 
ATCA_STATUS atcab_read_bytes_zone (uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 Used to read an arbitrary number of bytes from any zone configured for clear reads.
 
ATCA_STATUS atcab_read_serial_number (uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_serial_number_ext (ATCADevice device, uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_pubkey (uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_pubkey_ext (ATCADevice device, uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_sig (uint16_t slot, uint8_t *sig)
 Executes Read command to read a 64 byte ECDSA P256 signature from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_config_zone (uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_read_config_zone_ext (ATCADevice device, uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_cmp_config_zone (uint8_t *config_data, bool *same_config)
 Compares a specified configuration zone with the configuration zone currently on the device.
 
ATCA_STATUS atcab_read_enc (uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes Read command on a slot configured for encrypted reads and decrypts the data to return it as plaintext.
 
ATCA_STATUS atcab_secureboot (uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac)
 Executes Secure Boot command, which provides support for secure boot of an external MCU or MPU.
 
ATCA_STATUS atcab_secureboot_mac (uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes Secure Boot command with encrypted digest and validated MAC response using the IO protection key.
 
ATCA_STATUS atcab_selftest (uint8_t mode, uint16_t param2, uint8_t *result)
 Executes the SelfTest command, which performs a test of one or more of the cryptographic engines within the ATECC608 chip.
 
ATCA_STATUS atcab_sha_base (uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size)
 Executes SHA command, which computes a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system.
 
ATCA_STATUS atcab_sha_start (void)
 Executes SHA command to initialize SHA-256 calculation engine.
 
ATCA_STATUS atcab_sha_update (const uint8_t *message)
 Executes SHA command to add 64 bytes of message data to the current context.
 
ATCA_STATUS atcab_sha_end (uint8_t *digest, uint16_t length, const uint8_t *message)
 Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_read_context (uint8_t *context, uint16_t *context_size)
 Executes SHA command to read the SHA-256 context back. Only for ATECC608 with SHA-256 contexts. HMAC not supported.
 
ATCA_STATUS atcab_sha_write_context (const uint8_t *context, uint16_t context_size)
 Executes SHA command to write (restore) a SHA-256 context into the the device. Only supported for ATECC608 with SHA-256 contexts.
 
ATCA_STATUS atcab_sha (uint16_t length, const uint8_t *message, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256_init (atca_sha256_ctx_t *ctx)
 Initialize a SHA context for performing a hardware SHA-256 operation on a device. Note that only one SHA operation can be run at a time.
 
ATCA_STATUS atcab_hw_sha2_256_update (atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Add message data to a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_hw_sha2_256_finish (atca_sha256_ctx_t *ctx, uint8_t *digest)
 Finish SHA-256 digest for a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_sha_hmac_init (atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot)
 Executes SHA command to start an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_update (atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Executes SHA command to add an arbitrary amount of message data to a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_finish (atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target)
 Executes SHA command to complete a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac (const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_ext (ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sign_base (uint8_t mode, uint16_t key_id, uint8_t *signature)
 Executes the Sign command, which generates a signature using the ECDSA algorithm.
 
ATCA_STATUS atcab_sign (uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_ext (ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_internal (uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature)
 Executes Sign command to sign an internally generated message.
 
ATCA_STATUS atcab_updateextra (uint8_t mode, uint16_t new_value)
 Executes UpdateExtra command to update the values of the two extra bytes within the Configuration zone (bytes 84 and 85).
 
ATCA_STATUS atcab_verify (uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac)
 Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command.
 
ATCA_STATUS atcab_verify_extern (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_mac (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_stored (const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_with_tempkey (const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. keyConfig.reqrandom bit should be set and the message to be signed should be already loaded into TempKey for all devices.
 
ATCA_STATUS atcab_verify_stored_mac (const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with a public key stored in the device. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_validate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Validate mode to validate a public key stored in a slot.
 
ATCA_STATUS atcab_verify_invalidate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Invalidate mode which invalidates a previously validated public key stored in a slot.
 
ATCA_STATUS atcab_write (uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac)
 Executes the Write command, which writes either one four byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for this slot, the data may be required to be encrypted by the system prior to being sent to the device. This command cannot be used to write slots configured as ECC private keys.
 
ATCA_STATUS atcab_write_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
ATCA_STATUS atcab_write_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
+ATCA_STATUS atcab_write_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 
ATCA_STATUS atcab_write_bytes_zone (uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 Executes the Write command, which writes data into the configuration, otp, or data zones with a given byte offset and length. Offset and length must be multiples of a word (4 bytes).
 
ATCA_STATUS atcab_write_pubkey (uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_pubkey_ext (ATCADevice device, uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_config_zone (const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_config_zone_ext (ATCADevice device, const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_enc (uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes the Write command, which performs an encrypted write of a 32 byte block into given slot.
 
ATCA_STATUS atcab_write_config_counter (uint16_t counter_id, uint32_t counter_value)
 Initialize one of the monotonic counters in device with a specific value.
 
+ + + +

+Variables

+ATCADevice g_atcab_device_ptr
 
+

Detailed Description

+

CryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to.

diff --git a/a00233.html b/a00233.html index 48af4bbc3..373732e13 100644 --- a/a00233.html +++ b/a00233.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_compiler.h File Reference +CryptoAuthLib: atca_cfgs.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,59 +97,26 @@
- -
atca_compiler.h File Reference
+
atca_cfgs.c File Reference
-

CryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros. +

a set of default configurations for various ATCA devices and interfaces More...

-
#include <stdbool.h>
-
- - - - - - - - - -

-Macros

-#define SHARED_LIB_EXPORT
 
-#define ATCA_DLL   extern
 
-#define ATCA_PACKED
 
#define UNUSED_VAR(x)
 
-

Detailed Description

-

CryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros.

+
#include <stddef.h>
+#include "cryptoauthlib.h"
+#include "atca_cfgs.h"
+#include "atca_iface.h"
+#include "atca_device.h"
+

Detailed Description

+

a set of default configurations for various ATCA devices and interfaces

-

Macro Definition Documentation

- -

◆ UNUSED_VAR

- -
-
- - - - - - - - -
#define UNUSED_VAR( x)
-
-

Enables removal of compiler warning due to unused variables

- -
-
-
+
diff --git a/a00233.js b/a00233.js deleted file mode 100644 index a8968d184..000000000 --- a/a00233.js +++ /dev/null @@ -1,4 +0,0 @@ -var a00233 = -[ - [ "UNUSED_VAR", "a00233.html#a6e61b3a07893501c121343edf3bfcbd8", null ] -]; \ No newline at end of file diff --git a/a00239.html b/a00239.html index 182311651..91ba5df49 100644 --- a/a00239.html +++ b/a00239.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_debug.c File Reference +CryptoAuthLib: atca_compiler.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,30 +98,58 @@
-
atca_debug.c File Reference
+Macros
+
atca_compiler.h File Reference
-

Debug/Trace for CryptoAuthLib calls. +

CryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros. More...

-
#include "cryptoauthlib.h"
+
#include <stdbool.h>
- - - + + + + + + + + +

-Functions

-ATCA_STATUS atca_trace (ATCA_STATUS status)
 

+Macros

+#define SHARED_LIB_EXPORT
 
+#define ATCA_DLL   extern
 
+#define ATCA_PACKED
 
#define UNUSED_VAR(x)
 

Detailed Description

-

Debug/Trace for CryptoAuthLib calls.

+

CryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros.

-
+

Macro Definition Documentation

+ +

◆ UNUSED_VAR

+ +
+
+ + + + + + + + +
#define UNUSED_VAR( x)
+
+

Enables removal of compiler warning due to unused variables

+ +
+
+
diff --git a/a00245.html b/a00245.html index e4b8ef917..5166c641e 100644 --- a/a00245.html +++ b/a00245.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_device.c File Reference +CryptoAuthLib: atca_debug.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,41 +99,29 @@
-
atca_device.c File Reference
+
atca_debug.c File Reference
-

Microchip CryptoAuth device object. +

Debug/Trace for CryptoAuthLib calls. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - + +

Functions

ATCADevice newATCADevice (ATCAIfaceCfg *cfg)
 constructor for a Microchip CryptoAuth device
 
void deleteATCADevice (ATCADevice *ca_dev)
 destructor for a device NULLs reference after object is freed
 
ATCA_STATUS initATCADevice (ATCAIfaceCfg *cfg, ATCADevice ca_dev)
 Initializer for an Microchip CryptoAuth device.
 
ATCAIface atGetIFace (ATCADevice dev)
 returns a reference to the ATCAIface interface object for the device
 
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
 Release any resources associated with the device.
 
+ATCA_STATUS atca_trace (ATCA_STATUS status)
 

Detailed Description

-

Microchip CryptoAuth device object.

+

Debug/Trace for CryptoAuthLib calls.

diff --git a/a00245.js b/a00245.js deleted file mode 100644 index 6e715aa76..000000000 --- a/a00245.js +++ /dev/null @@ -1,8 +0,0 @@ -var a00245 = -[ - [ "atGetIFace", "a01441.html#ga3f98e29cffa06446fc91b329703606af", null ], - [ "deleteATCADevice", "a01441.html#gac087cf04cd5bd6ff2e026d89bfbf5e12", null ], - [ "initATCADevice", "a01441.html#ga8eec7f2190d1f9bda6684f5d2177db15", null ], - [ "newATCADevice", "a01441.html#gad5e12e12d3030e28d75164286df9e5e9", null ], - [ "releaseATCADevice", "a01441.html#gab729e6c838c0a247d4f226fb92492d96", null ] -]; \ No newline at end of file diff --git a/a00248.html b/a00248.html deleted file mode 100644 index be39daf06..000000000 --- a/a00248.html +++ /dev/null @@ -1,170 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_device.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_device.h File Reference
-
-
- -

Microchip Crypto Auth device object. -More...

-
#include "atca_iface.h"
-
- - - - -

-Data Structures

struct  atca_device
 atca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods More...
 
- - - - - - -

-Typedefs

-typedef void(* ctx_cb) (void *ctx)
 Callback function to clean up the session context.
 
-typedef struct atca_deviceATCADevice
 
- - - - -

-Enumerations

enum  ATCADeviceState { ATCA_DEVICE_STATE_UNKNOWN = 0 -, ATCA_DEVICE_STATE_SLEEP -, ATCA_DEVICE_STATE_IDLE -, ATCA_DEVICE_STATE_ACTIVE - }
 ATCADeviceState says about device state.
 
- - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS initATCADevice (ATCAIfaceCfg *cfg, ATCADevice ca_dev)
 Initializer for an Microchip CryptoAuth device.
 
ATCADevice newATCADevice (ATCAIfaceCfg *cfg)
 constructor for a Microchip CryptoAuth device
 
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
 Release any resources associated with the device.
 
void deleteATCADevice (ATCADevice *ca_dev)
 destructor for a device NULLs reference after object is freed
 
ATCAIface atGetIFace (ATCADevice dev)
 returns a reference to the ATCAIface interface object for the device
 
-

Detailed Description

-

Microchip Crypto Auth device object.

- -
-
- - - - diff --git a/a00248.js b/a00248.js deleted file mode 100644 index f0d578547..000000000 --- a/a00248.js +++ /dev/null @@ -1,15 +0,0 @@ -var a00248 = -[ - [ "ctx_cb", "a01441.html#gada27ffa70c78964d3b38abd11c5f4f22", null ], - [ "ATCADeviceState", "a01441.html#ga765308123cf522f5ec8b528bf4ea1243", [ - [ "ATCA_DEVICE_STATE_UNKNOWN", "a01441.html#gga765308123cf522f5ec8b528bf4ea1243a63b66c34fbe9ae97d123487be138ad49", null ], - [ "ATCA_DEVICE_STATE_SLEEP", "a01441.html#gga765308123cf522f5ec8b528bf4ea1243a94ff4a4e6aecf9bce31e3395eb13d080", null ], - [ "ATCA_DEVICE_STATE_IDLE", "a01441.html#gga765308123cf522f5ec8b528bf4ea1243a6387319b28607ca0b70a0e1f4b5d64fc", null ], - [ "ATCA_DEVICE_STATE_ACTIVE", "a01441.html#gga765308123cf522f5ec8b528bf4ea1243ae56ae390858b5c3adda40857974f2269", null ] - ] ], - [ "atGetIFace", "a01441.html#ga3f98e29cffa06446fc91b329703606af", null ], - [ "deleteATCADevice", "a01441.html#gac087cf04cd5bd6ff2e026d89bfbf5e12", null ], - [ "initATCADevice", "a01441.html#ga8eec7f2190d1f9bda6684f5d2177db15", null ], - [ "newATCADevice", "a01441.html#gad5e12e12d3030e28d75164286df9e5e9", null ], - [ "releaseATCADevice", "a01441.html#gab729e6c838c0a247d4f226fb92492d96", null ] -]; \ No newline at end of file diff --git a/a00251.html b/a00251.html index 51398049c..41c0409e2 100644 --- a/a00251.html +++ b/a00251.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_helpers.c File Reference +CryptoAuthLib: atca_device.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,813 +98,42 @@
-
atca_helpers.c File Reference
+
atca_device.c File Reference
-

Helpers to support the CryptoAuthLib Basic API methods. +

Microchip CryptoAuth device object. More...

-
#include <stdlib.h>
-#include <stdio.h>
-#include <ctype.h>
-#include <string.h>
-#include "cryptoauthlib.h"
-#include "atca_helpers.h"
+
#include "cryptoauthlib.h"
- - - - - -

-Macros

-#define B64_IS_EQUAL   (64u)
 
-#define B64_IS_INVALID   (-1)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +

Functions

-const uint8_t * atcab_b64rules_default (void)
 
-const uint8_t * atcab_b64rules_mime (void)
 
-const uint8_t * atcab_b64rules_urlsafe (void)
 
ATCA_STATUS atcab_bin2hex (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size)
 Convert a binary buffer to a hex string for easy reading.
 
ATCA_STATUS atcab_reversal (const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size)
 To reverse the input data.
 
ATCA_STATUS atcab_bin2hex_ (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper)
 Function that converts a binary buffer to a hex string suitable for easy reading.
 
-ATCA_STATUS atcab_hex2bin_ (const char *hex, size_t hex_size, uint8_t *bin, size_t *bin_size, bool is_space)
 
ATCA_STATUS atcab_hex2bin (const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len)
 Function that converts a hex string to binary buffer.
 
bool isDigit (char c)
 Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))
 
bool isBlankSpace (char c)
 Checks to see if a character is blank space.
 
bool isAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHexAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHex (char c)
 Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).
 
bool isHexDigit (char c)
 Returns true if this character is a valid hex character.
 
ATCA_STATUS packHex (const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len)
 Remove spaces from a ASCII hex string.
 
bool isBase64 (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).
 
bool isBase64Digit (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character.
 
ATCA_STATUS atcab_base64decode_ (const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules)
 Decode base64 string to data with ruleset option.
 
ATCA_STATUS atcab_base64encode_ (const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules)
 Encode data as base64 string with ruleset option.
 
ATCA_STATUS atcab_base64encode (const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len)
 Encode data as base64 string.
 
ATCA_STATUS atcab_base64decode (const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len)
 Decode base64 string to data.
 
-size_t atcab_pointer_delta (const void *start, const void *end)
 Helper function to calculate the number of bytes between two pointers.
 
-int atcab_memset_s (void *dest, size_t destsz, int ch, size_t count)
 Guaranteed to perform memory writes regardless of optimization level. Matches memset_s signature.
 
-char lib_toupper (char c)
 Converts a character to uppercase.
 
-char lib_tolower (char c)
 Converts a character to lowercase.
 
-const char * lib_strcasestr (const char *haystack, const char *needle)
 Search for a substring in a case insenstive format.
 
ATCADevice newATCADevice (ATCAIfaceCfg *cfg)
 constructor for a Microchip CryptoAuth device
 
void deleteATCADevice (ATCADevice *ca_dev)
 destructor for a device NULLs reference after object is freed
 
ATCA_STATUS initATCADevice (ATCAIfaceCfg *cfg, ATCADevice ca_dev)
 Initializer for an Microchip CryptoAuth device.
 
ATCAIface atGetIFace (ATCADevice dev)
 returns a reference to the ATCAIface interface object for the device
 
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
 Release any resources associated with the device.
 

Detailed Description

-

Helpers to support the CryptoAuthLib Basic API methods.

+

Microchip CryptoAuth device object.

-

Function Documentation

- -

◆ atcab_base64decode()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64decode (const char * encoded,
size_t encoded_len,
uint8_t * byte_array,
size_t * array_len 
)
-
- -

Decode base64 string to data.

-
Parameters
- - - - - -
[in]encodedBase64 string to be decoded.
[in]encoded_lenSize of the base64 string in bytes.
[out]byte_arrayDecoded data will be returned here.
[in,out]array_lenAs input, the size of the byte_array buffer. As output, the length of the decoded data.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_base64decode_()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64decode_ (const char * encoded,
size_t encoded_size,
uint8_t * data,
size_t * data_size,
const uint8_t * rules 
)
-
- -

Decode base64 string to data with ruleset option.

-
Parameters
- - - - - - -
[in]encodedBase64 string to be decoded.
[in]encoded_sizeSize of the base64 string in bytes.
[out]dataDecoded data will be returned here.
[in,out]data_sizeAs input, the size of the byte_array buffer. As output, the length of the decoded data.
[in]rulesbase64 ruleset to use
-
-
- -
-
- -

◆ atcab_base64encode()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64encode (const uint8_t * byte_array,
size_t array_len,
char * encoded,
size_t * encoded_len 
)
-
- -

Encode data as base64 string.

-
Parameters
- - - - - -
[in]byte_arrayData to be encode in base64.
[in]array_lenSize of byte_array in bytes.
[in]encodedBase64 output is returned here.
[in,out]encoded_lenAs input, the size of the encoded buffer. As output, the length of the encoded base64 character string.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_base64encode_()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64encode_ (const uint8_t * data,
size_t data_size,
char * encoded,
size_t * encoded_size,
const uint8_t * rules 
)
-
- -

Encode data as base64 string with ruleset option.

-
Parameters
- - - - - - -
[in]dataThe input byte array that will be converted to base 64 encoded characters
[in]data_sizeThe length of the byte array
[in]encodedThe output converted to base 64 encoded characters.
[in,out]encoded_sizeInput: The size of the encoded buffer, Output: The length of the encoded base 64 character string
[in]rulesruleset to use during encoding
-
-
- -
-
- -

◆ atcab_bin2hex_()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_bin2hex_ (const uint8_t * bin,
size_t bin_size,
char * hex,
size_t * hex_size,
bool is_pretty,
bool is_space,
bool is_upper 
)
-
- -

Function that converts a binary buffer to a hex string suitable for easy reading.

-
Parameters
- - - - - - - - -
[in]binInput data to convert.
[in]bin_sizeSize of data to convert.
[out]hexBuffer that receives hex string.
[in,out]hex_sizeAs input, the size of the hex buffer. As output, the size of the output hex.
[in]is_prettyIndicates whether new lines should be added for pretty printing.
[in]is_spaceConvert the output hex with space between it.
[in]is_upperConvert the output hex to upper case.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_hex2bin()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_hex2bin (const char * ascii_hex,
size_t ascii_hex_len,
uint8_t * binary,
size_t * bin_len 
)
-
- -

Function that converts a hex string to binary buffer.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ascii_hexInput buffer to convert
[in]ascii_hex_lenLength of buffer to convert
[out]binaryBuffer that receives binary
[in,out]bin_lenAs input, the size of the bin buffer. As output, the size of the bin data.
-
-
- -
-
- -

◆ atcab_reversal()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_reversal (const uint8_t * bin,
size_t bin_size,
uint8_t * dest,
size_t * dest_size 
)
-
- -

To reverse the input data.

-
Parameters
- - - - - -
[in]binInput data to reverse.
[in]bin_sizeSize of data to reverse.
[out]destBuffer to store reversed binary data.
[in]dest_sizeThe size of the dest buffer.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ isAlpha()

- -
-
- - - - - - - - -
bool isAlpha (char c)
-
- -

Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is a hex
- -
-
- -

◆ isBase64()

- -
-
- - - - - - - - - - - - - - - - - - -
bool isBase64 (char c,
const uint8_t * rules 
)
-
- -

Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).

-
Parameters
- - - -
[in]ccharacter to check
[in]rulesbase64 ruleset to use
-
-
-
Returns
True if the character can be included in a valid base 64 string
- -
-
- -

◆ isBase64Digit()

- -
-
- - - - - - - - - - - - - - - - - - -
bool isBase64Digit (char c,
const uint8_t * rules 
)
-
- -

Returns true if this character is a valid base 64 character.

-
Parameters
- - - -
[in]ccharacter to check
[in]rulesbase64 ruleset to use
-
-
-
Returns
True if the character can be included in a valid base 64 string
- -
-
- -

◆ isBlankSpace()

- -
-
- - - - - - - - -
bool isBlankSpace (char c)
-
- -

Checks to see if a character is blank space.

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is blankspace
- -
-
- -

◆ isDigit()

- -
-
- - - - - - - - -
bool isDigit (char c)
-
- -

Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is a digit
- -
-
- -

◆ isHex()

- -
-
- - - - - - - - -
bool isHex (char c)
-
- -

Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character can be included in a valid hexstring
- -
-
- -

◆ isHexAlpha()

- -
-
- - - - - - - - -
bool isHexAlpha (char c)
-
- -

Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is a hex
- -
-
- -

◆ isHexDigit()

- -
-
- - - - - - - - -
bool isHexDigit (char c)
-
- -

Returns true if this character is a valid hex character.

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character can be included in a valid hexstring
- -
-
- -

◆ packHex()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS packHex (const char * ascii_hex,
size_t ascii_hex_len,
char * packed_hex,
size_t * packed_len 
)
-
- -

Remove spaces from a ASCII hex string.

-
Parameters
- - - - - -
[in]ascii_hexInitial hex string to remove blankspace from
[in]ascii_hex_lenLength of the initial hex string
[in]packed_hexResulting hex string without blankspace
[in,out]packed_lenIn: Size to packed_hex buffer Out: Number of bytes in the packed hex string
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
+
diff --git a/a00251.js b/a00251.js index f88f9c859..88e27d6db 100644 --- a/a00251.js +++ b/a00251.js @@ -1,25 +1,8 @@ var a00251 = [ - [ "atcab_base64decode", "a00251.html#a6073c5a05e0ad2e738f460e727014553", null ], - [ "atcab_base64decode_", "a00251.html#a55ba8a1787f69d44d6e40db041fbd786", null ], - [ "atcab_base64encode", "a00251.html#a3aa141525a1141f1a290e2a996da0c9c", null ], - [ "atcab_base64encode_", "a00251.html#aeeff0177acf29e6e7b134a14d7119d69", null ], - [ "atcab_bin2hex", "a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272", null ], - [ "atcab_bin2hex_", "a00251.html#a40b70cfab865fa4fd9a5e7a29ca59d38", null ], - [ "atcab_hex2bin", "a00251.html#a481179181349c801c16fc1ab698f2f24", null ], - [ "atcab_memset_s", "a00251.html#ac37b319dabc5b9492a422f6d3d4e118b", null ], - [ "atcab_pointer_delta", "a00251.html#a72f385a8eafc464a05acfa54561fed63", null ], - [ "atcab_reversal", "a00251.html#a7371f490659b6fd68739d2b1fee50696", null ], - [ "isAlpha", "a00251.html#a592c23e94097ad5e212beb6390aa88c6", null ], - [ "isBase64", "a00251.html#ac873a37c53fdd922d5b36efd737e3ec3", null ], - [ "isBase64Digit", "a00251.html#ad10d15454308230fbef54bdd43001ed2", null ], - [ "isBlankSpace", "a00251.html#a04fefe2ff5a7d2e937b2634acd22982a", null ], - [ "isDigit", "a00251.html#a7a929bf65cbc777bab7e533a2755cfad", null ], - [ "isHex", "a00251.html#ab7ca9ee391118aafe6f3cf7df4fa5de3", null ], - [ "isHexAlpha", "a00251.html#a78abefc293c0a04d8ef649c94c8a1057", null ], - [ "isHexDigit", "a00251.html#a39003da4dc8a0b8999f1325c2f96f641", null ], - [ "lib_strcasestr", "a00251.html#a21594322838322aac744aaf655d77ec8", null ], - [ "lib_tolower", "a00251.html#ada3308b30b1b1e40abb806dbc5476648", null ], - [ "lib_toupper", "a00251.html#a13a4675d782c861977b653e3c2b354ba", null ], - [ "packHex", "a00251.html#ad017ae33af5a7ea062cea7d54de675a8", null ] + [ "atGetIFace", "a01468.html#ga3f98e29cffa06446fc91b329703606af", null ], + [ "deleteATCADevice", "a01468.html#gac087cf04cd5bd6ff2e026d89bfbf5e12", null ], + [ "initATCADevice", "a01468.html#ga8eec7f2190d1f9bda6684f5d2177db15", null ], + [ "newATCADevice", "a01468.html#gad5e12e12d3030e28d75164286df9e5e9", null ], + [ "releaseATCADevice", "a01468.html#gab729e6c838c0a247d4f226fb92492d96", null ] ]; \ No newline at end of file diff --git a/a00254.html b/a00254.html index c43e6f6ce..e23d2d8d0 100644 --- a/a00254.html +++ b/a00254.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_helpers.h File Reference +CryptoAuthLib: atca_device.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,106 +97,72 @@
-
atca_helpers.h File Reference
+ +
atca_device.h File Reference
-

Helpers to support the CryptoAuthLib Basic API methods. +

Microchip Crypto Auth device object. More...

-
#include "cryptoauthlib.h"
+
#include "atca_iface.h"
+ + + + +

+Data Structures

struct  atca_device
 atca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods More...
 
+ + + + + + +

+Typedefs

+typedef void(* ctx_cb) (void *ctx)
 Callback function to clean up the session context.
 
+typedef struct atca_deviceATCADevice
 
+ + + + +

+Enumerations

enum  ATCADeviceState { ATCA_DEVICE_STATE_UNKNOWN = 0 +, ATCA_DEVICE_STATE_SLEEP +, ATCA_DEVICE_STATE_IDLE +, ATCA_DEVICE_STATE_ACTIVE + }
 ATCADeviceState says about device state.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +

Functions

ATCA_STATUS atcab_bin2hex (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size)
 Convert a binary buffer to a hex string for easy reading.
 
ATCA_STATUS atcab_bin2hex_ (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper)
 Function that converts a binary buffer to a hex string suitable for easy reading.
 
ATCA_STATUS atcab_hex2bin (const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len)
 Function that converts a hex string to binary buffer.
 
-ATCA_STATUS atcab_hex2bin_ (const char *hex, size_t hex_size, uint8_t *bin, size_t *bin_size, bool is_space)
 
ATCA_STATUS packHex (const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len)
 Remove spaces from a ASCII hex string.
 
bool isDigit (char c)
 Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))
 
bool isBlankSpace (char c)
 Checks to see if a character is blank space.
 
bool isAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHexAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHex (char c)
 Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).
 
bool isHexDigit (char c)
 Returns true if this character is a valid hex character.
 
bool isBase64 (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).
 
bool isBase64Digit (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character.
 
-const uint8_t * atcab_b64rules_default (void)
 
-const uint8_t * atcab_b64rules_mime (void)
 
-const uint8_t * atcab_b64rules_urlsafe (void)
 
ATCA_STATUS atcab_base64decode_ (const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules)
 Decode base64 string to data with ruleset option.
 
ATCA_STATUS atcab_base64encode (const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len)
 Encode data as base64 string.
 
ATCA_STATUS atcab_base64encode_ (const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules)
 Encode data as base64 string with ruleset option.
 
ATCA_STATUS atcab_base64decode (const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len)
 Decode base64 string to data.
 
ATCA_STATUS atcab_reversal (const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size)
 To reverse the input data.
 
-int atcab_memset_s (void *dest, size_t destsz, int ch, size_t count)
 Guaranteed to perform memory writes regardless of optimization level. Matches memset_s signature.
 
-size_t atcab_pointer_delta (const void *start, const void *end)
 Helper function to calculate the number of bytes between two pointers.
 
-char lib_toupper (char c)
 Converts a character to uppercase.
 
-char lib_tolower (char c)
 Converts a character to lowercase.
 
ATCA_STATUS initATCADevice (ATCAIfaceCfg *cfg, ATCADevice ca_dev)
 Initializer for an Microchip CryptoAuth device.
 
ATCADevice newATCADevice (ATCAIfaceCfg *cfg)
 constructor for a Microchip CryptoAuth device
 
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
 Release any resources associated with the device.
 
void deleteATCADevice (ATCADevice *ca_dev)
 destructor for a device NULLs reference after object is freed
 
ATCAIface atGetIFace (ATCADevice dev)
 returns a reference to the ATCAIface interface object for the device
 

Detailed Description

-

Helpers to support the CryptoAuthLib Basic API methods.

+

Microchip Crypto Auth device object.

diff --git a/a00254.js b/a00254.js index 41cb0fe4a..ff44ab1f3 100644 --- a/a00254.js +++ b/a00254.js @@ -1,24 +1,15 @@ var a00254 = [ - [ "atcab_base64decode", "a01439.html#ga6073c5a05e0ad2e738f460e727014553", null ], - [ "atcab_base64decode_", "a01439.html#ga55ba8a1787f69d44d6e40db041fbd786", null ], - [ "atcab_base64encode", "a01439.html#ga3aa141525a1141f1a290e2a996da0c9c", null ], - [ "atcab_base64encode_", "a01439.html#gaeeff0177acf29e6e7b134a14d7119d69", null ], - [ "atcab_bin2hex", "a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272", null ], - [ "atcab_bin2hex_", "a01439.html#ga40b70cfab865fa4fd9a5e7a29ca59d38", null ], - [ "atcab_hex2bin", "a01439.html#ga481179181349c801c16fc1ab698f2f24", null ], - [ "atcab_memset_s", "a01439.html#gac37b319dabc5b9492a422f6d3d4e118b", null ], - [ "atcab_pointer_delta", "a01439.html#ga72f385a8eafc464a05acfa54561fed63", null ], - [ "atcab_reversal", "a01439.html#ga7371f490659b6fd68739d2b1fee50696", null ], - [ "isAlpha", "a01439.html#ga592c23e94097ad5e212beb6390aa88c6", null ], - [ "isBase64", "a01439.html#gac873a37c53fdd922d5b36efd737e3ec3", null ], - [ "isBase64Digit", "a01439.html#gad10d15454308230fbef54bdd43001ed2", null ], - [ "isBlankSpace", "a01439.html#ga04fefe2ff5a7d2e937b2634acd22982a", null ], - [ "isDigit", "a01439.html#ga7a929bf65cbc777bab7e533a2755cfad", null ], - [ "isHex", "a01439.html#gab7ca9ee391118aafe6f3cf7df4fa5de3", null ], - [ "isHexAlpha", "a01439.html#ga78abefc293c0a04d8ef649c94c8a1057", null ], - [ "isHexDigit", "a01439.html#ga39003da4dc8a0b8999f1325c2f96f641", null ], - [ "lib_tolower", "a01439.html#gada3308b30b1b1e40abb806dbc5476648", null ], - [ "lib_toupper", "a01439.html#ga13a4675d782c861977b653e3c2b354ba", null ], - [ "packHex", "a01439.html#gad017ae33af5a7ea062cea7d54de675a8", null ] + [ "ctx_cb", "a01468.html#gada27ffa70c78964d3b38abd11c5f4f22", null ], + [ "ATCADeviceState", "a01468.html#ga765308123cf522f5ec8b528bf4ea1243", [ + [ "ATCA_DEVICE_STATE_UNKNOWN", "a01468.html#gga765308123cf522f5ec8b528bf4ea1243a63b66c34fbe9ae97d123487be138ad49", null ], + [ "ATCA_DEVICE_STATE_SLEEP", "a01468.html#gga765308123cf522f5ec8b528bf4ea1243a94ff4a4e6aecf9bce31e3395eb13d080", null ], + [ "ATCA_DEVICE_STATE_IDLE", "a01468.html#gga765308123cf522f5ec8b528bf4ea1243a6387319b28607ca0b70a0e1f4b5d64fc", null ], + [ "ATCA_DEVICE_STATE_ACTIVE", "a01468.html#gga765308123cf522f5ec8b528bf4ea1243ae56ae390858b5c3adda40857974f2269", null ] + ] ], + [ "atGetIFace", "a01468.html#ga3f98e29cffa06446fc91b329703606af", null ], + [ "deleteATCADevice", "a01468.html#gac087cf04cd5bd6ff2e026d89bfbf5e12", null ], + [ "initATCADevice", "a01468.html#ga8eec7f2190d1f9bda6684f5d2177db15", null ], + [ "newATCADevice", "a01468.html#gad5e12e12d3030e28d75164286df9e5e9", null ], + [ "releaseATCADevice", "a01468.html#gab729e6c838c0a247d4f226fb92492d96", null ] ]; \ No newline at end of file diff --git a/a00257.html b/a00257.html index 24b779611..417a3262f 100644 --- a/a00257.html +++ b/a00257.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_iface.h File Reference +CryptoAuthLib: atca_helpers.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,303 +98,856 @@
-
atca_iface.h File Reference
+Functions
+
atca_helpers.c File Reference
-

Microchip Crypto Auth hardware interface object. +

Helpers to support the CryptoAuthLib Basic API methods. More...

-
#include <stdint.h>
-#include <stddef.h>
-#include "atca_config.h"
-#include "atca_devtypes.h"
-#include "atca_status.h"
+
#include <stdlib.h>
+#include <stdio.h>
+#include <ctype.h>
+#include <string.h>
+#include "cryptoauthlib.h"
+#include "atca_helpers.h"
- - - - - - - - - -

-Data Structures

struct  ATCAIfaceCfg
 
struct  ATCAHAL_t
 HAL Driver Structure. More...
 
struct  atca_iface
 atca_iface is the context structure for a configured interface More...
 
- - - - - - - - -

Macros

-#define ATCA_IFACECFG_NAME(x)   (x)
 
-#define ATCA_IFACECFG_I2C_ADDRESS(c)   (c)->cfg.atcai2c.address
 
-#define ATCA_IFACECFG_I2C_BAUD(c)   (c)->cfg.atcai2c.baud
 
-#define ATCA_IFACECFG_VALUE(c, v)   (c)->cfg.v
 
- - - - - - -

-Typedefs

-typedef struct atca_ifaceATCAIface
 
-typedef struct atca_iface atca_iface_t
 atca_iface is the context structure for a configured interface
 
- - - - - + + + +

-Enumerations

enum  ATCAIfaceType {
-  ATCA_I2C_IFACE = 0 -, ATCA_SWI_IFACE = 1 -, ATCA_UART_IFACE = 2 -, ATCA_SPI_IFACE = 3 -,
-  ATCA_HID_IFACE = 4 -, ATCA_KIT_IFACE = 5 -, ATCA_CUSTOM_IFACE = 6 -, ATCA_I2C_GPIO_IFACE = 7 -,
-  ATCA_SWI_GPIO_IFACE = 8 -, ATCA_SPI_GPIO_IFACE = 9 -, ATCA_UNKNOWN_IFACE = 0xFE -
- }
 
enum  ATCAKitType {
-  ATCA_KIT_AUTO_IFACE -, ATCA_KIT_I2C_IFACE -, ATCA_KIT_SWI_IFACE -, ATCA_KIT_SPI_IFACE -,
-  ATCA_KIT_UNKNOWN_IFACE -
- }
 
+#define B64_IS_EQUAL   (64u)
 
+#define B64_IS_INVALID   (-1)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Functions

ATCA_STATUS initATCAIface (ATCAIfaceCfg *cfg, ATCAIface ca_iface)
 Initializer for ATCAIface objects.
 
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
 Instruct the HAL driver to release any resources associated with this interface.
 
void deleteATCAIface (ATCAIface *ca_iface)
 Instruct the HAL driver to release any resources associated with this interface, then delete the object.
 
ATCA_STATUS atinit (ATCAIface ca_iface)
 Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.
 
ATCA_STATUS atsend (ATCAIface ca_iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Sends the data to the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atreceive (ATCAIface ca_iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receives data from the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atcontrol (ATCAIface ca_iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations with the underlying hal driver.
 
ATCA_STATUS atwake (ATCAIface ca_iface)
 Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.
 
ATCA_STATUS atidle (ATCAIface ca_iface)
 Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.
 
ATCA_STATUS atsleep (ATCAIface ca_iface)
 Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.
 
ATCAIfaceCfgatgetifacecfg (ATCAIface ca_iface)
 Returns the logical interface configuration for the device.
 
void * atgetifacehaldat (ATCAIface ca_iface)
 Returns the HAL data pointer for the device.
 
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfg *cfg, uint8_t address, ATCAKitType kitiface)
 Change the address of the selected device.
 
-uint8_t ifacecfg_get_address (ATCAIfaceCfg *cfg)
 Retrieves the device address given an interface configuration.
 
bool ifacetype_is_kit (ATCAIfaceType iface_type)
 Check if the given interface is a "kit protocol" one.
 
bool atca_iface_is_kit (ATCAIface ca_iface)
 Check if the given interface is configured as a "kit protocol" one where transactions are atomic.
 
bool atca_iface_is_swi (ATCAIface ca_iface)
 Check if the given interface is configured as a SWI.
 
-int atca_iface_get_retries (ATCAIface ca_iface)
 Retrive the number of retries for a configured interface.
 
-uint16_t atca_iface_get_wake_delay (ATCAIface ca_iface)
 Retrive the wake/retry delay for a configured interface/device.
 
-ATCADeviceType iface_get_device_type_by_name (const char *name)
 Get the ATCADeviceType for a string that looks like a part number.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Variables

-struct {
   uint8_t   address
 
-   uint8_t   bus
 
-   uint32_t   baud
 
atcai2c
 
-struct {
-   uint8_t   address
 
-   uint8_t   bus
 
atcaswi
 
-struct {
-   uint8_t   bus
 
-   uint8_t   select_pin
 
-   uint32_t   baud
 
atcaspi
 
-struct {
-   ATCAKitType   dev_interface
 
-   uint8_t   dev_identity
 
-   uint8_t   port
 
-   uint32_t   baud
 
-   uint8_t   wordsize
 
-   uint8_t   parity
 
-   uint8_t   stopbits
 
atcauart
 
-struct {
-   int   idx
 
-   ATCAKitType   dev_interface
 
-   uint8_t   dev_identity
 
-   uint32_t   vid
 
-   uint32_t   pid
 
-   uint32_t   packetsize
 
atcahid
 
-struct {
-   ATCAKitType   dev_interface
 
-   uint8_t   dev_identity
 
-   uint32_t   flags
 
atcakit
 
-struct {
-   ATCA_STATUS(*   halinit )(void *hal, void *cfg)
 
-   ATCA_STATUS(*   halpostinit )(void *iface)
 
-   ATCA_STATUS(*   halsend )(void *iface, uint8_t
-      word_address, uint8_t *txdata,
-       int txlength)
 
-   ATCA_STATUS(*   halreceive )(void *iface, uint8_t
-      word_address, uint8_t *rxdata,
-       uint16_t *rxlength)
 
-   ATCA_STATUS(*   halwake )(void *iface)
 
-   ATCA_STATUS(*   halidle )(void *iface)
 
-   ATCA_STATUS(*   halsleep )(void *iface)
 
-   ATCA_STATUS(*   halrelease )(void *hal_data)
 
atcacustom
 
+const uint8_t * atcab_b64rules_default (void)
 
+const uint8_t * atcab_b64rules_mime (void)
 
+const uint8_t * atcab_b64rules_urlsafe (void)
 
ATCA_STATUS atcab_bin2hex (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size)
 Convert a binary buffer to a hex string for easy reading.
 
ATCA_STATUS atcab_reversal (const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size)
 To reverse the input data.
 
ATCA_STATUS atcab_bin2hex_ (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper)
 Function that converts a binary buffer to a hex string suitable for easy reading.
 
+ATCA_STATUS atcab_hex2bin_ (const char *hex, size_t hex_size, uint8_t *bin, size_t *bin_size, bool is_space)
 
ATCA_STATUS atcab_hex2bin (const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len)
 Function that converts a hex string to binary buffer.
 
bool isDigit (char c)
 Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))
 
bool isBlankSpace (char c)
 Checks to see if a character is blank space.
 
bool isAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHexAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHex (char c)
 Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).
 
bool isHexDigit (char c)
 Returns true if this character is a valid hex character.
 
ATCA_STATUS packHex (const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len)
 Remove spaces from a ASCII hex string.
 
bool isBase64 (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).
 
bool isBase64Digit (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character.
 
ATCA_STATUS atcab_base64decode_ (const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules)
 Decode base64 string to data with ruleset option.
 
ATCA_STATUS atcab_base64encode_ (const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules)
 Encode data as base64 string with ruleset option.
 
ATCA_STATUS atcab_base64encode (const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len)
 Encode data as base64 string.
 
ATCA_STATUS atcab_base64decode (const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len)
 Decode base64 string to data.
 
+size_t atcab_pointer_delta (const void *start, const void *end)
 Helper function to calculate the number of bytes between two pointers.
 
+int atcab_memset_s (void *dest, size_t destsz, int ch, size_t count)
 Guaranteed to perform memory writes regardless of optimization level. Matches memset_s signature.
 
+char lib_toupper (char c)
 Converts a character to uppercase.
 
+char lib_tolower (char c)
 Converts a character to lowercase.
 
+const char * lib_strcasestr (const char *haystack, const char *needle)
 Search for a substring in a case insenstive format.
 

Detailed Description

-

Microchip Crypto Auth hardware interface object.

+

Helpers to support the CryptoAuthLib Basic API methods.

-

Variable Documentation

- -

◆ address

+

Function Documentation

+ +

◆ atcab_base64decode()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_base64decode (const char * encoded,
size_t encoded_len,
uint8_t * byte_array,
size_t * array_len 
)
+
+ +

Decode base64 string to data.

+
Parameters
+ + + + + +
[in]encodedBase64 string to be decoded.
[in]encoded_lenSize of the base64 string in bytes.
[out]byte_arrayDecoded data will be returned here.
[in,out]array_lenAs input, the size of the byte_array buffer. As output, the length of the decoded data.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcab_base64decode_()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_base64decode_ (const char * encoded,
size_t encoded_size,
uint8_t * data,
size_t * data_size,
const uint8_t * rules 
)
+
+ +

Decode base64 string to data with ruleset option.

+
Parameters
+ + + + + + +
[in]encodedBase64 string to be decoded.
[in]encoded_sizeSize of the base64 string in bytes.
[out]dataDecoded data will be returned here.
[in,out]data_sizeAs input, the size of the byte_array buffer. As output, the length of the decoded data.
[in]rulesbase64 ruleset to use
+
+
+ +
+
+ +

◆ atcab_base64encode()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_base64encode (const uint8_t * byte_array,
size_t array_len,
char * encoded,
size_t * encoded_len 
)
+
+ +

Encode data as base64 string.

+
Parameters
+ + + + + +
[in]byte_arrayData to be encode in base64.
[in]array_lenSize of byte_array in bytes.
[in]encodedBase64 output is returned here.
[in,out]encoded_lenAs input, the size of the encoded buffer. As output, the length of the encoded base64 character string.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcab_base64encode_()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_base64encode_ (const uint8_t * data,
size_t data_size,
char * encoded,
size_t * encoded_size,
const uint8_t * rules 
)
+
+ +

Encode data as base64 string with ruleset option.

+
Parameters
+ + + + + + +
[in]dataThe input byte array that will be converted to base 64 encoded characters
[in]data_sizeThe length of the byte array
[in]encodedThe output converted to base 64 encoded characters.
[in,out]encoded_sizeInput: The size of the encoded buffer, Output: The length of the encoded base 64 character string
[in]rulesruleset to use during encoding
+
+
+ +
+
+ +

◆ atcab_bin2hex()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_bin2hex (const uint8_t * bin,
size_t bin_size,
char * hex,
size_t * hex_size 
)
+
+ +

Convert a binary buffer to a hex string for easy reading.

+
Parameters
+ + + + + +
[in]binInput data to convert.
[in]bin_sizeSize of data to convert.
[out]hexBuffer that receives hex string.
[in,out]hex_sizeAs input, the size of the hex buffer. As output, the size of the output hex.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcab_bin2hex_()

- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
uint8_t addressATCA_STATUS atcab_bin2hex_ (const uint8_t * bin,
size_t bin_size,
char * hex,
size_t * hex_size,
bool is_pretty,
bool is_space,
bool is_upper 
)
+
+ +

Function that converts a binary buffer to a hex string suitable for easy reading.

+
Parameters
+ + + + + + + + +
[in]binInput data to convert.
[in]bin_sizeSize of data to convert.
[out]hexBuffer that receives hex string.
[in,out]hex_sizeAs input, the size of the hex buffer. As output, the size of the output hex.
[in]is_prettyIndicates whether new lines should be added for pretty printing.
[in]is_spaceConvert the output hex with space between it.
[in]is_upperConvert the output hex to upper case.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcab_hex2bin()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_hex2bin (const char * ascii_hex,
size_t ascii_hex_len,
uint8_t * binary,
size_t * bin_len 
)
-

Device address - the upper 7 bits are the I2c address bits

+ +

Function that converts a hex string to binary buffer.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + +
[in]ascii_hexInput buffer to convert
[in]ascii_hex_lenLength of buffer to convert
[out]binaryBuffer that receives binary
[in,out]bin_lenAs input, the size of the bin buffer. As output, the size of the bin data.
+
+
+ +
+
+ +

◆ atcab_reversal()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcab_reversal (const uint8_t * bin,
size_t bin_size,
uint8_t * dest,
size_t * dest_size 
)
+
+ +

To reverse the input data.

+
Parameters
+ + + + + +
[in]binInput data to reverse.
[in]bin_sizeSize of data to reverse.
[out]destBuffer to store reversed binary data.
[in]dest_sizeThe size of the dest buffer.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ isAlpha()

+ +
+
+ + + + + + + + +
bool isAlpha (char c)
+
+ +

Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))

+
Parameters
+ + +
[in]ccharacter to check
+
+
+
Returns
True if the character is a hex
+ +
+
+ +

◆ isBase64()

+ +
+
+ + + + + + + + + + + + + + + + + + +
bool isBase64 (char c,
const uint8_t * rules 
)
+
+ +

Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).

+
Parameters
+ + + +
[in]ccharacter to check
[in]rulesbase64 ruleset to use
+
+
+
Returns
True if the character can be included in a valid base 64 string
+ +
+
+ +

◆ isBase64Digit()

+ +
+
+ + + + + + + + + + + + + + + + + + +
bool isBase64Digit (char c,
const uint8_t * rules 
)
+
+ +

Returns true if this character is a valid base 64 character.

+
Parameters
+ + + +
[in]ccharacter to check
[in]rulesbase64 ruleset to use
+
+
+
Returns
True if the character can be included in a valid base 64 string
+ +
+
+ +

◆ isBlankSpace()

+ +
+
+ + + + + + + + +
bool isBlankSpace (char c)
+
+ +

Checks to see if a character is blank space.

+
Parameters
+ + +
[in]ccharacter to check
+
+
+
Returns
True if the character is blankspace
+ +
+
+ +

◆ isDigit()

+ +
+
+ + + + + + + + +
bool isDigit (char c)
+
+ +

Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))

+
Parameters
+ + +
[in]ccharacter to check
+
+
+
Returns
True if the character is a digit
+ +
+
+ +

◆ isHex()

+ +
+
+ + + + + + + + +
bool isHex (char c)
+
+ +

Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).

+
Parameters
+ + +
[in]ccharacter to check
+
+
+
Returns
True if the character can be included in a valid hexstring
+ +
+
+ +

◆ isHexAlpha()

+ +
+
+ + + + + + + + +
bool isHexAlpha (char c)
+
+ +

Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))

+
Parameters
+ + +
[in]ccharacter to check
+
+
+
Returns
True if the character is a hex
+ +
+
+ +

◆ isHexDigit()

+ +
+
+ + + + + + + + +
bool isHexDigit (char c)
+
+ +

Returns true if this character is a valid hex character.

+
Parameters
+ + +
[in]ccharacter to check
+
+
+
Returns
True if the character can be included in a valid hexstring
+ +
+
+ +

◆ packHex()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS packHex (const char * ascii_hex,
size_t ascii_hex_len,
char * packed_hex,
size_t * packed_len 
)
+
+ +

Remove spaces from a ASCII hex string.

+
Parameters
+ + + + + +
[in]ascii_hexInitial hex string to remove blankspace from
[in]ascii_hex_lenLength of the initial hex string
[in]packed_hexResulting hex string without blankspace
[in,out]packed_lenIn: Size to packed_hex buffer Out: Number of bytes in the packed hex string
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
@@ -403,7 +956,7 @@

diff --git a/a00257.js b/a00257.js index 7d2bb4282..77989a916 100644 --- a/a00257.js +++ b/a00257.js @@ -1,38 +1,25 @@ var a00257 = [ - [ "atca_iface_t", "a01442.html#gaa9323be08c4d757019e9863d9a7fb6b1", null ], - [ "ATCAIfaceType", "a01442.html#gac7f674d4a0afb12d2f3c9c5e98cb1089", [ - [ "ATCA_I2C_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb", null ], - [ "ATCA_SWI_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26", null ], - [ "ATCA_UART_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d", null ], - [ "ATCA_SPI_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7", null ], - [ "ATCA_HID_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1", null ], - [ "ATCA_KIT_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9", null ], - [ "ATCA_CUSTOM_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d", null ], - [ "ATCA_I2C_GPIO_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e", null ], - [ "ATCA_SWI_GPIO_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2", null ], - [ "ATCA_SPI_GPIO_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb", null ], - [ "ATCA_UNKNOWN_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ac300244b5b323ee44001db318f365cec", null ] - ] ], - [ "atca_iface_get_retries", "a01442.html#ga349718dea5d5b558766a31b7dcd7e811", null ], - [ "atca_iface_get_wake_delay", "a01442.html#ga128f54833b5ed2105dae417333e1d651", null ], - [ "atca_iface_is_kit", "a01442.html#gacb09a6fa845efade7d47796bead14d2c", null ], - [ "atca_iface_is_swi", "a01442.html#gad2276d5ebd02613fbeda8ae15b679d1e", null ], - [ "atcontrol", "a01442.html#ga324cef45a35e02b387001afdc9092778", null ], - [ "atgetifacecfg", "a01442.html#gac88ba81abfd42df65c6c0c64414dfc6e", null ], - [ "atgetifacehaldat", "a01442.html#ga5e4163b8882d4eb42d4d5191c8731da0", null ], - [ "atidle", "a01442.html#gac794fffe040e6d47a34c756720f3cbea", null ], - [ "atinit", "a01442.html#ga386353e8700eec35e4548dfa29f13b8d", null ], - [ "atreceive", "a01442.html#ga01badea388343bdf5929c5c2be9f426b", null ], - [ "atsend", "a01442.html#gabd4f20b06efedede6bc4a836cfad8f38", null ], - [ "atsleep", "a01442.html#gac06336335e5f3191e3b1fc06d2830d96", null ], - [ "atwake", "a01442.html#ga32693c852341e1b946bab3cca5f71761", null ], - [ "deleteATCAIface", "a01442.html#gaf8074d759241d3edd6d8ead1d7322a98", null ], - [ "iface_get_device_type_by_name", "a01442.html#ga8e50f9bf69be0910880411e9a0d5bc24", null ], - [ "ifacecfg_get_address", "a01442.html#ga9efe98ee7fe9be95593c7177800efd8d", null ], - [ "ifacecfg_set_address", "a01442.html#ga4e975805352164dc3a8ff553b42c509f", null ], - [ "ifacetype_is_kit", "a01442.html#gaaff5268b9acbf16db03b425e6c54f97c", null ], - [ "initATCAIface", "a01442.html#ga3a31087729a7a2e9a624572f234809fc", null ], - [ "releaseATCAIface", "a01442.html#gab9ee16357a8e397a72eda7e9c8553fb3", null ], - [ "address", "a00257.html#af3f726014b044194def151079f1f2d89", null ] + [ "atcab_base64decode", "a00257.html#a6073c5a05e0ad2e738f460e727014553", null ], + [ "atcab_base64decode_", "a00257.html#a55ba8a1787f69d44d6e40db041fbd786", null ], + [ "atcab_base64encode", "a00257.html#a3aa141525a1141f1a290e2a996da0c9c", null ], + [ "atcab_base64encode_", "a00257.html#aeeff0177acf29e6e7b134a14d7119d69", null ], + [ "atcab_bin2hex", "a00257.html#ae31a9fd8e9deca79aa5fef0292fe5272", null ], + [ "atcab_bin2hex_", "a00257.html#a40b70cfab865fa4fd9a5e7a29ca59d38", null ], + [ "atcab_hex2bin", "a00257.html#a481179181349c801c16fc1ab698f2f24", null ], + [ "atcab_memset_s", "a00257.html#ac37b319dabc5b9492a422f6d3d4e118b", null ], + [ "atcab_pointer_delta", "a00257.html#a72f385a8eafc464a05acfa54561fed63", null ], + [ "atcab_reversal", "a00257.html#a7371f490659b6fd68739d2b1fee50696", null ], + [ "isAlpha", "a00257.html#a592c23e94097ad5e212beb6390aa88c6", null ], + [ "isBase64", "a00257.html#ac873a37c53fdd922d5b36efd737e3ec3", null ], + [ "isBase64Digit", "a00257.html#ad10d15454308230fbef54bdd43001ed2", null ], + [ "isBlankSpace", "a00257.html#a04fefe2ff5a7d2e937b2634acd22982a", null ], + [ "isDigit", "a00257.html#a7a929bf65cbc777bab7e533a2755cfad", null ], + [ "isHex", "a00257.html#ab7ca9ee391118aafe6f3cf7df4fa5de3", null ], + [ "isHexAlpha", "a00257.html#a78abefc293c0a04d8ef649c94c8a1057", null ], + [ "isHexDigit", "a00257.html#a39003da4dc8a0b8999f1325c2f96f641", null ], + [ "lib_strcasestr", "a00257.html#a21594322838322aac744aaf655d77ec8", null ], + [ "lib_tolower", "a00257.html#ada3308b30b1b1e40abb806dbc5476648", null ], + [ "lib_toupper", "a00257.html#a13a4675d782c861977b653e3c2b354ba", null ], + [ "packHex", "a00257.html#ad017ae33af5a7ea062cea7d54de675a8", null ] ]; \ No newline at end of file diff --git a/a00260.html b/a00260.html index f8192a331..8656c97a5 100644 --- a/a00260.html +++ b/a00260.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_platform.h File Reference +CryptoAuthLib: atca_helpers.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,46 +97,127 @@
- -
atca_platform.h File Reference
+
atca_helpers.h File Reference
-

Configure the platform interfaces for cryptoauthlib. +

Helpers to support the CryptoAuthLib Basic API methods. More...

-
#include <stddef.h>
-#include <string.h>
+
#include "cryptoauthlib.h"
- - - -

-Macros

-#define hal_memset_s   atcab_memset_s
 
- - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Functions

-void * hal_malloc (size_t size)
 
-void hal_free (void *ptr)
 
-const char * lib_strcasestr (const char *haystack, const char *needle)
 Search for a substring in a case insenstive format.
 
+#define IS_ADD_SAFE_UINT16_T(a, b)   (((UINT16_MAX - (a)) >= (b)) ? true : false)
 
+#define IS_ADD_SAFE_UINT32_T(a, b)   (((UINT32_MAX - (a)) >= (b)) ? true : false)
 
+#define IS_ADD_SAFE_UINT64_T(a, b)   (((UINT64_MAX - (a)) >= (b)) ? true : false)
 
+#define IS_ADD_SAFE_SIZE_T(a, b)   (((SIZE_MAX - (a)) >= (b)) ? true : false)
 
+#define IS_MUL_SAFE_UINT16_T(a, b)   ((((a) <= UINT16_MAX / (b))) ? true : false)
 
+#define IS_MUL_SAFE_UINT32_T(a, b)   ((((a) <= UINT32_MAX / (b))) ? true : false)
 
+#define IS_MUL_SAFE_UINT64_T(a, b)   ((((a) <= UINT64_MAX / (b))) ? true : false)
 
+#define IS_MUL_SAFE_SIZE_T(a, b)   ((((a) <= SIZE_MAX / (b))) ? true : false)
 
ATCA_STATUS atcab_bin2hex (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size)
 Convert a binary buffer to a hex string for easy reading.
 
ATCA_STATUS atcab_bin2hex_ (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper)
 Function that converts a binary buffer to a hex string suitable for easy reading.
 
ATCA_STATUS atcab_hex2bin (const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len)
 Function that converts a hex string to binary buffer.
 
+ATCA_STATUS atcab_hex2bin_ (const char *hex, size_t hex_size, uint8_t *bin, size_t *bin_size, bool is_space)
 
ATCA_STATUS packHex (const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len)
 Remove spaces from a ASCII hex string.
 
bool isDigit (char c)
 Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))
 
bool isBlankSpace (char c)
 Checks to see if a character is blank space.
 
bool isAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHexAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHex (char c)
 Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).
 
bool isHexDigit (char c)
 Returns true if this character is a valid hex character.
 
bool isBase64 (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).
 
bool isBase64Digit (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character.
 
+const uint8_t * atcab_b64rules_default (void)
 
+const uint8_t * atcab_b64rules_mime (void)
 
+const uint8_t * atcab_b64rules_urlsafe (void)
 
ATCA_STATUS atcab_base64decode_ (const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules)
 Decode base64 string to data with ruleset option.
 
ATCA_STATUS atcab_base64encode (const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len)
 Encode data as base64 string.
 
ATCA_STATUS atcab_base64encode_ (const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules)
 Encode data as base64 string with ruleset option.
 
ATCA_STATUS atcab_base64decode (const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len)
 Decode base64 string to data.
 
ATCA_STATUS atcab_reversal (const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size)
 To reverse the input data.
 
+int atcab_memset_s (void *dest, size_t destsz, int ch, size_t count)
 Guaranteed to perform memory writes regardless of optimization level. Matches memset_s signature.
 
+size_t atcab_pointer_delta (const void *start, const void *end)
 Helper function to calculate the number of bytes between two pointers.
 
+char lib_toupper (char c)
 Converts a character to uppercase.
 
+char lib_tolower (char c)
 Converts a character to lowercase.
 

Detailed Description

-

Configure the platform interfaces for cryptoauthlib.

+

Helpers to support the CryptoAuthLib Basic API methods.

diff --git a/a00260.js b/a00260.js index 278a6703d..a1f3cf88b 100644 --- a/a00260.js +++ b/a00260.js @@ -1,4 +1,24 @@ var a00260 = [ - [ "lib_strcasestr", "a00260.html#a21594322838322aac744aaf655d77ec8", null ] + [ "atcab_base64decode", "a01466.html#ga6073c5a05e0ad2e738f460e727014553", null ], + [ "atcab_base64decode_", "a01466.html#ga55ba8a1787f69d44d6e40db041fbd786", null ], + [ "atcab_base64encode", "a01466.html#ga3aa141525a1141f1a290e2a996da0c9c", null ], + [ "atcab_base64encode_", "a01466.html#gaeeff0177acf29e6e7b134a14d7119d69", null ], + [ "atcab_bin2hex", "a01466.html#gae31a9fd8e9deca79aa5fef0292fe5272", null ], + [ "atcab_bin2hex_", "a01466.html#ga40b70cfab865fa4fd9a5e7a29ca59d38", null ], + [ "atcab_hex2bin", "a01466.html#ga481179181349c801c16fc1ab698f2f24", null ], + [ "atcab_memset_s", "a01466.html#gac37b319dabc5b9492a422f6d3d4e118b", null ], + [ "atcab_pointer_delta", "a01466.html#ga72f385a8eafc464a05acfa54561fed63", null ], + [ "atcab_reversal", "a01466.html#ga7371f490659b6fd68739d2b1fee50696", null ], + [ "isAlpha", "a01466.html#ga592c23e94097ad5e212beb6390aa88c6", null ], + [ "isBase64", "a01466.html#gac873a37c53fdd922d5b36efd737e3ec3", null ], + [ "isBase64Digit", "a01466.html#gad10d15454308230fbef54bdd43001ed2", null ], + [ "isBlankSpace", "a01466.html#ga04fefe2ff5a7d2e937b2634acd22982a", null ], + [ "isDigit", "a01466.html#ga7a929bf65cbc777bab7e533a2755cfad", null ], + [ "isHex", "a01466.html#gab7ca9ee391118aafe6f3cf7df4fa5de3", null ], + [ "isHexAlpha", "a01466.html#ga78abefc293c0a04d8ef649c94c8a1057", null ], + [ "isHexDigit", "a01466.html#ga39003da4dc8a0b8999f1325c2f96f641", null ], + [ "lib_tolower", "a01466.html#gada3308b30b1b1e40abb806dbc5476648", null ], + [ "lib_toupper", "a01466.html#ga13a4675d782c861977b653e3c2b354ba", null ], + [ "packHex", "a01466.html#gad017ae33af5a7ea062cea7d54de675a8", null ] ]; \ No newline at end of file diff --git a/a00263.html b/a00263.html index 6b2e841d6..3c86c9d7f 100644 --- a/a00263.html +++ b/a00263.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_status.h File Reference +CryptoAuthLib: atca_iface.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,652 +98,303 @@
-
atca_status.h File Reference
+Typedefs | +Enumerations | +Functions | +Variables
+
atca_iface.h File Reference
-

Microchip Crypto Auth status codes. +

Microchip Crypto Auth hardware interface object. More...

#include <stdint.h>
+#include <stddef.h>
+#include "atca_devtypes.h"
+#include "atca_status.h"
#include "atca_config.h"
-#include "atca_compiler.h"
+ + + + + + + + + +

+Data Structures

struct  ATCAIfaceCfg
 
struct  ATCAHAL_t
 HAL Driver Structure. More...
 
struct  atca_iface
 atca_iface is the context structure for a configured interface More...
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + +

Macros

#define ATCA_SUCCESS   (0)
 
-#define ATCA_CONFIG_ZONE_LOCKED   (0x01)
 
-#define ATCA_DATA_ZONE_LOCKED   (0x02)
 
#define ATCA_WAKE_FAILED   (-48)
 
#define ATCA_CHECKMAC_VERIFY_FAILED   (-47)
 
#define ATCA_PARSE_ERROR   (-46)
 
#define ATCA_STATUS_CRC   (-44)
 
#define ATCA_STATUS_UNKNOWN   (-43)
 
#define ATCA_STATUS_ECC   (-42)
 
#define ATCA_STATUS_SELFTEST_ERROR   (-41)
 
#define ATCA_FUNC_FAIL   (-32)
 
#define ATCA_GEN_FAIL   (-31)
 
#define ATCA_BAD_PARAM   (-30)
 
#define ATCA_INVALID_ID   (-29)
 
#define ATCA_INVALID_SIZE   (-28)
 
#define ATCA_RX_CRC_ERROR   (-27)
 
#define ATCA_RX_FAIL   (-26)
 
#define ATCA_RX_NO_RESPONSE   (-25)
 
#define ATCA_RESYNC_WITH_WAKEUP   (-24)
 
#define ATCA_PARITY_ERROR   (-23)
 
#define ATCA_TX_TIMEOUT   (-22)
 
#define ATCA_RX_TIMEOUT   (-21)
 
#define ATCA_TOO_MANY_COMM_RETRIES   (-20)
 
#define ATCA_SMALL_BUFFER   (-19)
 
#define ATCA_COMM_FAIL   (-16)
 
#define ATCA_TIMEOUT   (-15)
 
#define ATCA_BAD_OPCODE   (-14)
 
#define ATCA_WAKE_SUCCESS   (-13)
 
#define ATCA_EXECUTION_ERROR   (-12)
 
#define ATCA_UNIMPLEMENTED   (-11)
 
#define ATCA_ASSERT_FAILURE   (-10)
 
#define ATCA_TX_FAIL   (-9)
 
#define ATCA_NOT_LOCKED   (-8)
 
#define ATCA_NO_DEVICES   (-7)
 
#define ATCA_HEALTH_TEST_ERROR   (-6)
 
#define ATCA_ALLOC_FAILURE   (-5)
 
#define ATCA_USE_FLAGS_CONSUMED   (-4)
 
#define ATCA_NOT_INITIALIZED   (-3)
 
-#define ATCA_STATUS_AUTH_BIT   0x40u
 
-#define ATCA_STATUS_AUTH_BIT_COMPLEMENT   ~(ATCA_STATUS_AUTH_BIT & 0xffu)
 
+#define ATCA_IFACECFG_NAME(x)   (x)
 
+#define ATCA_IFACECFG_I2C_ADDRESS(c)   (c)->cfg.atcai2c.address
 
+#define ATCA_IFACECFG_I2C_BAUD(c)   (c)->cfg.atcai2c.baud
 
+#define ATCA_IFACECFG_VALUE(c, v)   (c)->cfg.v
 
- - + + + + + +

Typedefs

-typedef int ATCA_STATUS
 
+typedef struct atca_ifaceATCAIface
 
+typedef struct atca_iface atca_iface_t
 atca_iface is the context structure for a configured interface
 
+ + + + + +

+Enumerations

enum  ATCAIfaceType {
+  ATCA_I2C_IFACE = 0 +, ATCA_SWI_IFACE = 1 +, ATCA_UART_IFACE = 2 +, ATCA_SPI_IFACE = 3 +,
+  ATCA_HID_IFACE = 4 +, ATCA_KIT_IFACE = 5 +, ATCA_CUSTOM_IFACE = 6 +, ATCA_I2C_GPIO_IFACE = 7 +,
+  ATCA_SWI_GPIO_IFACE = 8 +, ATCA_SPI_GPIO_IFACE = 9 +, ATCA_UNKNOWN_IFACE = 0xFE +
+ }
 
enum  ATCAKitType {
+  ATCA_KIT_AUTO_IFACE +, ATCA_KIT_I2C_IFACE +, ATCA_KIT_SWI_IFACE +, ATCA_KIT_SPI_IFACE +,
+  ATCA_KIT_UNKNOWN_IFACE +
+ }
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS initATCAIface (ATCAIfaceCfg *cfg, ATCAIface ca_iface)
 Initializer for ATCAIface objects.
 
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
 Instruct the HAL driver to release any resources associated with this interface.
 
void deleteATCAIface (ATCAIface *ca_iface)
 Instruct the HAL driver to release any resources associated with this interface, then delete the object.
 
ATCA_STATUS atinit (ATCAIface ca_iface)
 Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.
 
ATCA_STATUS atsend (ATCAIface ca_iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Sends the data to the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atreceive (ATCAIface ca_iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receives data from the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atcontrol (ATCAIface ca_iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations with the underlying hal driver.
 
ATCA_STATUS atwake (ATCAIface ca_iface)
 Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.
 
ATCA_STATUS atidle (ATCAIface ca_iface)
 Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.
 
ATCA_STATUS atsleep (ATCAIface ca_iface)
 Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.
 
ATCAIfaceCfgatgetifacecfg (ATCAIface ca_iface)
 Returns the logical interface configuration for the device.
 
void * atgetifacehaldat (ATCAIface ca_iface)
 Returns the HAL data pointer for the device.
 
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfg *cfg, uint8_t address, ATCAKitType kitiface)
 Change the address of the selected device.
 
+uint8_t ifacecfg_get_address (ATCAIfaceCfg *cfg)
 Retrieves the device address given an interface configuration.
 
bool ifacetype_is_kit (ATCAIfaceType iface_type)
 Check if the given interface is a "kit protocol" one.
 
bool atca_iface_is_kit (ATCAIface ca_iface)
 Check if the given interface is configured as a "kit protocol" one where transactions are atomic.
 
bool atca_iface_is_swi (ATCAIface ca_iface)
 Check if the given interface is configured as a SWI.
 
+int atca_iface_get_retries (ATCAIface ca_iface)
 Retrive the number of retries for a configured interface.
 
+uint16_t atca_iface_get_wake_delay (ATCAIface ca_iface)
 Retrive the wake/retry delay for a configured interface/device.
 
+ATCADeviceType iface_get_device_type_by_name (const char *name)
 Get the ATCADeviceType for a string that looks like a part number.
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Variables

+struct {
   uint8_t   address
 
+   uint8_t   bus
 
+   uint32_t   baud
 
atcai2c
 
+struct {
+   uint8_t   address
 
+   uint8_t   bus
 
atcaswi
 
+struct {
+   uint8_t   bus
 
+   uint8_t   select_pin
 
+   uint32_t   baud
 
atcaspi
 
+struct {
+   ATCAKitType   dev_interface
 
+   uint8_t   dev_identity
 
+   uint8_t   port
 
+   uint32_t   baud
 
+   uint8_t   wordsize
 
+   uint8_t   parity
 
+   uint8_t   stopbits
 
atcauart
 
+struct {
+   int   idx
 
+   ATCAKitType   dev_interface
 
+   uint8_t   dev_identity
 
+   uint32_t   vid
 
+   uint32_t   pid
 
+   uint32_t   packetsize
 
atcahid
 
+struct {
+   ATCAKitType   dev_interface
 
+   uint8_t   dev_identity
 
+   uint32_t   flags
 
atcakit
 
+struct {
+   ATCA_STATUS(*   halinit )(void *hal, void *cfg)
 
+   ATCA_STATUS(*   halpostinit )(void *iface)
 
+   ATCA_STATUS(*   halsend )(void *iface, uint8_t
+      word_address, uint8_t *txdata,
+       int txlength)
 
+   ATCA_STATUS(*   halreceive )(void *iface, uint8_t
+      word_address, uint8_t *rxdata,
+       uint16_t *rxlength)
 
+   ATCA_STATUS(*   halwake )(void *iface)
 
+   ATCA_STATUS(*   halidle )(void *iface)
 
+   ATCA_STATUS(*   halsleep )(void *iface)
 
+   ATCA_STATUS(*   halrelease )(void *hal_data)
 
atcacustom
 

Detailed Description

-

Microchip Crypto Auth status codes.

+

Microchip Crypto Auth hardware interface object.

-

Macro Definition Documentation

- -

◆ ATCA_ALLOC_FAILURE

- -
-
- - - - -
#define ATCA_ALLOC_FAILURE   (-5)
-
-

STATUS (0xFB): Couldn't allocate required memory

- -
-
- -

◆ ATCA_ASSERT_FAILURE

- -
-
- - - - -
#define ATCA_ASSERT_FAILURE   (-10)
-
-

STATUS (0xF6): Code failed run-time consistency check

- -
-
- -

◆ ATCA_BAD_OPCODE

- -
-
- - - - -
#define ATCA_BAD_OPCODE   (-14)
-
-

STATUS (0xF2): opcode is not supported by the device

- -
-
- -

◆ ATCA_BAD_PARAM

- -
-
- - - - -
#define ATCA_BAD_PARAM   (-30)
-
-

STATUS (0xE2): bad argument (out of range, null pointer, etc.)

- -
-
- -

◆ ATCA_CHECKMAC_VERIFY_FAILED

- -
-
- - - - -
#define ATCA_CHECKMAC_VERIFY_FAILED   (-47)
-
-

STATUS (0xD1): response status byte indicates CheckMac failure(status byte = 0x01)

- -
-
- -

◆ ATCA_COMM_FAIL

- -
-
- - - - -
#define ATCA_COMM_FAIL   (-16)
-
-

STATUS (0xF0): Communication with device failed. Same as in hardware dependent modules.

- -
-
- -

◆ ATCA_EXECUTION_ERROR

- -
-
- - - - -
#define ATCA_EXECUTION_ERROR   (-12)
-
-

STATUS (0xF4): chip was in a state where it could not execute the command, response status byte indicates command execution error (status byte = 0x0F)

- -
-
- -

◆ ATCA_FUNC_FAIL

- -
-
- - - - -
#define ATCA_FUNC_FAIL   (-32)
-
-

STATUS (0xE0): Function could not execute due to incorrect condition / state.

- -
-
- -

◆ ATCA_GEN_FAIL

- -
-
- - - - -
#define ATCA_GEN_FAIL   (-31)
-
-

STATUS (0xE1): unspecified error

- -
-
- -

◆ ATCA_HEALTH_TEST_ERROR

- -
-
- - - - -
#define ATCA_HEALTH_TEST_ERROR   (-6)
-
-

STATUS (0xFA): random number generator health test error

- -
-
- -

◆ ATCA_INVALID_ID

- -
-
- - - - -
#define ATCA_INVALID_ID   (-29)
-
-

STATUS (0xE3: invalid device id, id not set

- -
-
- -

◆ ATCA_INVALID_SIZE

- -
-
- - - - -
#define ATCA_INVALID_SIZE   (-28)
-
-

STATUS (0xE4): Count value is out of range or greater than buffer size.

- -
-
- -

◆ ATCA_NO_DEVICES

- -
-
- - - - -
#define ATCA_NO_DEVICES   (-7)
-
-

STATUS (0xF9): For protocols that support device discovery (kit protocol), no devices were found

- -
-
- -

◆ ATCA_NOT_INITIALIZED

- -
-
- - - - -
#define ATCA_NOT_INITIALIZED   (-3)
-
-

STATUS (0xFD): The library has not been initialized so the command could not be executed

- -
-
- -

◆ ATCA_NOT_LOCKED

- -
-
- - - - -
#define ATCA_NOT_LOCKED   (-8)
-
-

STATUS (0xF8): required zone was not locked

- -
-
- -

◆ ATCA_PARITY_ERROR

- -
-
- - - - -
#define ATCA_PARITY_ERROR   (-23)
-
-

STATUS (0xE9): for protocols needing parity

- -
-
- -

◆ ATCA_PARSE_ERROR

- -
-
- - - - -
#define ATCA_PARSE_ERROR   (-46)
-
-

STATUS (0xD2): response status byte indicates parsing error(status byte = 0x03)

- -
-
- -

◆ ATCA_RESYNC_WITH_WAKEUP

- -
-
- - - - -
#define ATCA_RESYNC_WITH_WAKEUP   (-24)
-
-

STATUS (0xE8): Re-synchronization succeeded, but only after generating a Wake-up

- -
-
- -

◆ ATCA_RX_CRC_ERROR

- -
-
- - - - -
#define ATCA_RX_CRC_ERROR   (-27)
-
-

STATUS (0xE5): CRC error in data received from device

- -
-
- -

◆ ATCA_RX_FAIL

- -
-
- - - - -
#define ATCA_RX_FAIL   (-26)
-
-

STATUS (0xE6): Timed out while waiting for response. Number of bytes received is > 0.

- -
-
- -

◆ ATCA_RX_NO_RESPONSE

- -
-
- - - - -
#define ATCA_RX_NO_RESPONSE   (-25)
-
-

STATUS (0xE7): Not an error while the Command layer is polling for a command response.

- -
-
- -

◆ ATCA_RX_TIMEOUT

- -
-
- - - - -
#define ATCA_RX_TIMEOUT   (-21)
-
-

STATUS (0xEB): for Microchip PHY protocol, timeout on receipt waiting for master

- -
-
- -

◆ ATCA_SMALL_BUFFER

- -
-
- - - - -
#define ATCA_SMALL_BUFFER   (-19)
-
-

STATUS (0xED): Supplied buffer is too small for data required

- -
-
- -

◆ ATCA_STATUS_CRC

- -
-
- - - - -
#define ATCA_STATUS_CRC   (-44)
-
-

STATUS (0xD4): response status byte indicates DEVICE did not receive data properly(status byte = 0xFF)

- -
-
- -

◆ ATCA_STATUS_ECC

- -
-
- - - - -
#define ATCA_STATUS_ECC   (-42)
-
-

STATUS (0xD6): response status byte is ECC fault(status byte = 0x05)

- -
-
- -

◆ ATCA_STATUS_SELFTEST_ERROR

- -
-
- - - - -
#define ATCA_STATUS_SELFTEST_ERROR   (-41)
-
-

STATUS (0xD7): response status byte is Self Test Error, chip in failure mode (status byte = 0x07)

- -
-
- -

◆ ATCA_STATUS_UNKNOWN

- -
-
- - - - -
#define ATCA_STATUS_UNKNOWN   (-43)
-
-

STATUS (0xD5): response status byte is unknown

- -
-
- -

◆ ATCA_SUCCESS

- -
-
- - - - -
#define ATCA_SUCCESS   (0)
-
-

STATUS (0x00): Function Successful

- -
-
- -

◆ ATCA_TIMEOUT

- -
-
- - - - -
#define ATCA_TIMEOUT   (-15)
-
-

STATUS (0xF1): Timed out while waiting for response. Number of bytes received is 0.

- -
-
- -

◆ ATCA_TOO_MANY_COMM_RETRIES

- -
-
- - - - -
#define ATCA_TOO_MANY_COMM_RETRIES   (-20)
-
-

STATUS (0xEC): Device did not respond too many times during a transmission. Could indicate no device present.

- -
-
- -

◆ ATCA_TX_FAIL

- -
-
- - - - -
#define ATCA_TX_FAIL   (-9)
-
-

STATUS (0xF7): Failed to write

- -
-
- -

◆ ATCA_TX_TIMEOUT

- -
-
- - - - -
#define ATCA_TX_TIMEOUT   (-22)
-
-

STATUS (0xEA): for Microchip PHY protocol, timeout on transmission waiting for master

- -
-
- -

◆ ATCA_UNIMPLEMENTED

- -
-
- - - - -
#define ATCA_UNIMPLEMENTED   (-11)
-
-

STATUS (0xF5): Function or some element of it hasn't been implemented yet

- -
-
- -

◆ ATCA_USE_FLAGS_CONSUMED

- -
-
- - - - -
#define ATCA_USE_FLAGS_CONSUMED   (-4)
-
-

STATUS (0xFC): Use flags on the device indicates its consumed fully

- -
-
- -

◆ ATCA_WAKE_FAILED

- -
-
- - - - -
#define ATCA_WAKE_FAILED   (-48)
-
-

STATUS (0xD0): response status byte indicates CheckMac failure(status byte = 0x01)

- -
-
- -

◆ ATCA_WAKE_SUCCESS

+

Variable Documentation

+ +

◆ address

- +
#define ATCA_WAKE_SUCCESS   (-13)uint8_t address
-

STATUS (0xF3): received proper wake token

+

Device address - the upper 7 bits are the I2c address bits

@@ -752,7 +403,7 @@

diff --git a/a00263.js b/a00263.js index 62c21024d..70c7ebc03 100644 --- a/a00263.js +++ b/a00263.js @@ -1,39 +1,38 @@ var a00263 = [ - [ "ATCA_ALLOC_FAILURE", "a00263.html#aa17bd20787fa8dcde44983f25c00d80b", null ], - [ "ATCA_ASSERT_FAILURE", "a00263.html#abb19bd83c35f7194c30e913a3d4b4137", null ], - [ "ATCA_BAD_OPCODE", "a00263.html#a3d393762ff34c052e12509e79d54415f", null ], - [ "ATCA_BAD_PARAM", "a00263.html#a22c74ba87b45d105867f93c97b6dbe04", null ], - [ "ATCA_CHECKMAC_VERIFY_FAILED", "a00263.html#afe80ac4fce5d1f8edd75a218362779ec", null ], - [ "ATCA_COMM_FAIL", "a00263.html#ae9dd0fe8e48163ddf047629aeb8820e6", null ], - [ "ATCA_EXECUTION_ERROR", "a00263.html#a889853cfab2a19aa22c00d0d19c87bcc", null ], - [ "ATCA_FUNC_FAIL", "a00263.html#a962730477dba3c48a84629c23a0e4a13", null ], - [ "ATCA_GEN_FAIL", "a00263.html#aa1cd2b6470db000dd151f2a092f41edf", null ], - [ "ATCA_HEALTH_TEST_ERROR", "a00263.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5", null ], - [ "ATCA_INVALID_ID", "a00263.html#a9fd83db4807d846db39ffe92925dc939", null ], - [ "ATCA_INVALID_SIZE", "a00263.html#a90fced83678233feeb83da9e73579484", null ], - [ "ATCA_NO_DEVICES", "a00263.html#a652c8fbaca046330679929610433b987", null ], - [ "ATCA_NOT_INITIALIZED", "a00263.html#ace96e4c864044972f87aef44e8d106ec", null ], - [ "ATCA_NOT_LOCKED", "a00263.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3", null ], - [ "ATCA_PARITY_ERROR", "a00263.html#a2fefd4147dcde6662dc2bae6adb61237", null ], - [ "ATCA_PARSE_ERROR", "a00263.html#a54b00d87ad3367d281df208661352063", null ], - [ "ATCA_RESYNC_WITH_WAKEUP", "a00263.html#a6c467c51b23ea961e1aabd6e98644d47", null ], - [ "ATCA_RX_CRC_ERROR", "a00263.html#aef8e0056fbad0bd33fcb2213b2f3ae49", null ], - [ "ATCA_RX_FAIL", "a00263.html#a8aa6f2e22841fba09b78262c9ce7a728", null ], - [ "ATCA_RX_NO_RESPONSE", "a00263.html#a6a0c600725ed81640f2e39c88c864e1c", null ], - [ "ATCA_RX_TIMEOUT", "a00263.html#ab5bbd989a822d35a59c9eb6258bf26fc", null ], - [ "ATCA_SMALL_BUFFER", "a00263.html#ab1a2ea3166875b26f91e82767d6e3e1a", null ], - [ "ATCA_STATUS_CRC", "a00263.html#a9198f13b90df739a1ca20f101beccfbb", null ], - [ "ATCA_STATUS_ECC", "a00263.html#ad878d8797ca33784da8e968cbf17a722", null ], - [ "ATCA_STATUS_SELFTEST_ERROR", "a00263.html#a3319805e96477b7b89da0f4a69ef1a83", null ], - [ "ATCA_STATUS_UNKNOWN", "a00263.html#a884d88ac0c809d0801ca4dbe24dac986", null ], - [ "ATCA_SUCCESS", "a00263.html#ab132d69c7f94de708ffef02b6dc69d27", null ], - [ "ATCA_TIMEOUT", "a00263.html#afc6b7767c53326f3520ec83ac02df679", null ], - [ "ATCA_TOO_MANY_COMM_RETRIES", "a00263.html#ad4cd022abf0e71d3605a9fc18e8a1ea6", null ], - [ "ATCA_TX_FAIL", "a00263.html#a149bb02116700288df316d5ab391f5d3", null ], - [ "ATCA_TX_TIMEOUT", "a00263.html#a7b4c194a6a86ffadc703b841280778c3", null ], - [ "ATCA_UNIMPLEMENTED", "a00263.html#ad80a997b8786774af268692c936f90d9", null ], - [ "ATCA_USE_FLAGS_CONSUMED", "a00263.html#a4dbc1891be5e77d93690554e7bb2aa8d", null ], - [ "ATCA_WAKE_FAILED", "a00263.html#a796b7e7bc096ae19c65b701d87b8718f", null ], - [ "ATCA_WAKE_SUCCESS", "a00263.html#afb58269e38e4025d4e6620c4d1202ee4", null ] + [ "atca_iface_t", "a01469.html#gaa9323be08c4d757019e9863d9a7fb6b1", null ], + [ "ATCAIfaceType", "a01469.html#gac7f674d4a0afb12d2f3c9c5e98cb1089", [ + [ "ATCA_I2C_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb", null ], + [ "ATCA_SWI_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26", null ], + [ "ATCA_UART_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d", null ], + [ "ATCA_SPI_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7", null ], + [ "ATCA_HID_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1", null ], + [ "ATCA_KIT_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9", null ], + [ "ATCA_CUSTOM_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d", null ], + [ "ATCA_I2C_GPIO_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e", null ], + [ "ATCA_SWI_GPIO_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2", null ], + [ "ATCA_SPI_GPIO_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb", null ], + [ "ATCA_UNKNOWN_IFACE", "a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ac300244b5b323ee44001db318f365cec", null ] + ] ], + [ "atca_iface_get_retries", "a01469.html#ga349718dea5d5b558766a31b7dcd7e811", null ], + [ "atca_iface_get_wake_delay", "a01469.html#ga128f54833b5ed2105dae417333e1d651", null ], + [ "atca_iface_is_kit", "a01469.html#gacb09a6fa845efade7d47796bead14d2c", null ], + [ "atca_iface_is_swi", "a01469.html#gad2276d5ebd02613fbeda8ae15b679d1e", null ], + [ "atcontrol", "a01469.html#ga324cef45a35e02b387001afdc9092778", null ], + [ "atgetifacecfg", "a01469.html#gac88ba81abfd42df65c6c0c64414dfc6e", null ], + [ "atgetifacehaldat", "a01469.html#ga5e4163b8882d4eb42d4d5191c8731da0", null ], + [ "atidle", "a01469.html#gac794fffe040e6d47a34c756720f3cbea", null ], + [ "atinit", "a01469.html#ga386353e8700eec35e4548dfa29f13b8d", null ], + [ "atreceive", "a01469.html#ga01badea388343bdf5929c5c2be9f426b", null ], + [ "atsend", "a01469.html#gabd4f20b06efedede6bc4a836cfad8f38", null ], + [ "atsleep", "a01469.html#gac06336335e5f3191e3b1fc06d2830d96", null ], + [ "atwake", "a01469.html#ga32693c852341e1b946bab3cca5f71761", null ], + [ "deleteATCAIface", "a01469.html#gaf8074d759241d3edd6d8ead1d7322a98", null ], + [ "iface_get_device_type_by_name", "a01469.html#ga8e50f9bf69be0910880411e9a0d5bc24", null ], + [ "ifacecfg_get_address", "a01469.html#ga9efe98ee7fe9be95593c7177800efd8d", null ], + [ "ifacecfg_set_address", "a01469.html#ga4e975805352164dc3a8ff553b42c509f", null ], + [ "ifacetype_is_kit", "a01469.html#gaaff5268b9acbf16db03b425e6c54f97c", null ], + [ "initATCAIface", "a01469.html#ga3a31087729a7a2e9a624572f234809fc", null ], + [ "releaseATCAIface", "a01469.html#gab9ee16357a8e397a72eda7e9c8553fb3", null ], + [ "address", "a00263.html#af3f726014b044194def151079f1f2d89", null ] ]; \ No newline at end of file diff --git a/a00266.html b/a00266.html index 2f69c69a7..21244c837 100644 --- a/a00266.html +++ b/a00266.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_utils_sizes.c File Reference +CryptoAuthLib: atca_platform.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,169 +100,43 @@ -
atca_utils_sizes.c File Reference
+
atca_platform.h File Reference
-

API to Return structure sizes of cryptoauthlib structures. +

Configure the platform interfaces for cryptoauthlib. More...

-
#include "cryptoauthlib.h"
-#include "cal_internal.h"
-#include "atcacert/atcacert_check_config.h"
-#include "atcacert/atcacert_date.h"
-#include "atcacert/atcacert_def.h"
-#include "host/atca_host.h"
+
#include <stddef.h>
+#include <string.h>
- - - - + +

Macros

-#define SIZE_OF_API_T(x)   size_t x ## _size(void); size_t x ## _size(void) { return sizeof( x ); }
 
-#define SIZE_OF_API_S(x)   size_t x ## _size(void); size_t x ## _size(void) { return sizeof(struct x ); }
 
+#define hal_memset_s   atcab_memset_s
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + +

Functions

-size_t atcacert_tm_utc_t_size (void)
 
-size_t atcacert_date_format_t_size (void)
 
-size_t atcacert_cert_type_t_size (void)
 
-size_t atcacert_cert_sn_src_t_size (void)
 
-size_t atcacert_device_zone_t_size (void)
 
-size_t atcacert_std_cert_element_t_size (void)
 
-size_t atcacert_device_loc_t_size (void)
 
-size_t atcacert_cert_loc_t_size (void)
 
-size_t atcacert_cert_element_t_size (void)
 
-size_t atcacert_def_t_size (void)
 
-size_t atcacert_build_state_t_size (void)
 
-size_t atca_temp_key_t_size (void)
 
-size_t atca_include_data_in_out_size (void)
 
-size_t atca_nonce_in_out_t_size (void)
 
-size_t atca_io_decrypt_in_out_t_size (void)
 
-size_t atca_verify_mac_in_out_t_size (void)
 
-size_t atca_secureboot_enc_in_out_t_size (void)
 
-size_t atca_secureboot_mac_in_out_t_size (void)
 
-size_t atca_mac_in_out_t_size (void)
 
-size_t atca_hmac_in_out_size (void)
 
-size_t atca_gen_dig_in_out_t_size (void)
 
-size_t atca_write_mac_in_out_t_size (void)
 
-size_t atca_derive_key_in_out_size (void)
 
-size_t atca_derive_key_mac_in_out_size (void)
 
-size_t atca_decrypt_in_out_size (void)
 
-size_t atca_check_mac_in_out_t_size (void)
 
-size_t atca_verify_in_out_t_size (void)
 
-size_t atca_gen_key_in_out_t_size (void)
 
-size_t atca_sign_internal_in_out_t_size (void)
 
-size_t bool_size (void)
 
-size_t ATCAPacket_size (void)
 
-size_t atca_device_size (void)
 
-size_t ATCADeviceType_size (void)
 
-size_t ATCAIfaceType_size (void)
 
-size_t ATCAIfaceCfg_size (void)
 
-size_t atca_iface_size (void)
 
-size_t ATCA_STATUS_size (void)
 
-size_t atcac_sha1_ctx_size (void)
 
-size_t atcac_sha1_ctx_t_size (void)
 
-size_t atcac_sha2_256_ctx_size (void)
 
-size_t atcac_sha2_256_ctx_t_size (void)
 
-size_t atcac_hmac_ctx_size (void)
 
-size_t atcac_hmac_ctx_t_size (void)
 
+void * hal_malloc (size_t size)
 
+void hal_free (void *ptr)
 
+const char * lib_strcasestr (const char *haystack, const char *needle)
 Search for a substring in a case insenstive format.
 

Detailed Description

-

API to Return structure sizes of cryptoauthlib structures.

+

Configure the platform interfaces for cryptoauthlib.

diff --git a/a00269.html b/a00269.html index 88b8bcb63..40de9163d 100644 --- a/a00269.html +++ b/a00269.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_version.h File Reference +CryptoAuthLib: atca_status.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,38 +98,660 @@
-
atca_version.h File Reference
+Macros | +Typedefs
+
atca_status.h File Reference
-

Microchip CryptoAuth Library Version. +

Microchip Crypto Auth status codes. More...

- +
#include <stdint.h>
+#include "atca_compiler.h"
+
- - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Macros

-#define ATCA_LIBRARY_VERSION_DATE   "20240626"
 
-#define ATCA_LIBRARY_VERSION_MAJOR   3
 
-#define ATCA_LIBRARY_VERSION_MINOR   7
 
-#define ATCA_LIBRARY_VERSION_BUILD   5
 
#define ATCA_SUCCESS   (0)
 
+#define ATCA_CONFIG_ZONE_LOCKED   (0x01)
 
+#define ATCA_DATA_ZONE_LOCKED   (0x02)
 
#define ATCA_WAKE_FAILED   (-48)
 
#define ATCA_CHECKMAC_VERIFY_FAILED   (-47)
 
#define ATCA_PARSE_ERROR   (-46)
 
#define ATCA_STATUS_CRC   (-44)
 
#define ATCA_STATUS_UNKNOWN   (-43)
 
#define ATCA_STATUS_ECC   (-42)
 
#define ATCA_STATUS_SELFTEST_ERROR   (-41)
 
#define ATCA_FUNC_FAIL   (-32)
 
#define ATCA_GEN_FAIL   (-31)
 
#define ATCA_BAD_PARAM   (-30)
 
#define ATCA_INVALID_ID   (-29)
 
#define ATCA_INVALID_SIZE   (-28)
 
#define ATCA_RX_CRC_ERROR   (-27)
 
#define ATCA_RX_FAIL   (-26)
 
#define ATCA_RX_NO_RESPONSE   (-25)
 
#define ATCA_RESYNC_WITH_WAKEUP   (-24)
 
#define ATCA_PARITY_ERROR   (-23)
 
#define ATCA_TX_TIMEOUT   (-22)
 
#define ATCA_RX_TIMEOUT   (-21)
 
#define ATCA_TOO_MANY_COMM_RETRIES   (-20)
 
#define ATCA_SMALL_BUFFER   (-19)
 
#define ATCA_COMM_FAIL   (-16)
 
#define ATCA_TIMEOUT   (-15)
 
#define ATCA_BAD_OPCODE   (-14)
 
#define ATCA_WAKE_SUCCESS   (-13)
 
#define ATCA_EXECUTION_ERROR   (-12)
 
#define ATCA_UNIMPLEMENTED   (-11)
 
#define ATCA_ASSERT_FAILURE   (-10)
 
#define ATCA_TX_FAIL   (-9)
 
#define ATCA_NOT_LOCKED   (-8)
 
#define ATCA_NO_DEVICES   (-7)
 
#define ATCA_HEALTH_TEST_ERROR   (-6)
 
#define ATCA_ALLOC_FAILURE   (-5)
 
#define ATCA_USE_FLAGS_CONSUMED   (-4)
 
#define ATCA_NOT_INITIALIZED   (-3)
 
+#define ATCA_STATUS_AUTH_BIT   0x40u
 
+#define ATCA_STATUS_AUTH_BIT_COMPLEMENT   ~(ATCA_STATUS_AUTH_BIT & 0xffu)
 
+ + +

+Typedefs

+typedef int ATCA_STATUS
 

Detailed Description

-

Microchip CryptoAuth Library Version.

+

Microchip Crypto Auth status codes.

-
+

Macro Definition Documentation

+ +

◆ ATCA_ALLOC_FAILURE

+ +
+
+ + + + +
#define ATCA_ALLOC_FAILURE   (-5)
+
+

STATUS (0xFB): Couldn't allocate required memory

+ +
+
+ +

◆ ATCA_ASSERT_FAILURE

+ +
+
+ + + + +
#define ATCA_ASSERT_FAILURE   (-10)
+
+

STATUS (0xF6): Code failed run-time consistency check

+ +
+
+ +

◆ ATCA_BAD_OPCODE

+ +
+
+ + + + +
#define ATCA_BAD_OPCODE   (-14)
+
+

STATUS (0xF2): opcode is not supported by the device

+ +
+
+ +

◆ ATCA_BAD_PARAM

+ +
+
+ + + + +
#define ATCA_BAD_PARAM   (-30)
+
+

STATUS (0xE2): bad argument (out of range, null pointer, etc.)

+ +
+
+ +

◆ ATCA_CHECKMAC_VERIFY_FAILED

+ +
+
+ + + + +
#define ATCA_CHECKMAC_VERIFY_FAILED   (-47)
+
+

STATUS (0xD1): response status byte indicates CheckMac failure(status byte = 0x01)

+ +
+
+ +

◆ ATCA_COMM_FAIL

+ +
+
+ + + + +
#define ATCA_COMM_FAIL   (-16)
+
+

STATUS (0xF0): Communication with device failed. Same as in hardware dependent modules.

+ +
+
+ +

◆ ATCA_EXECUTION_ERROR

+ +
+
+ + + + +
#define ATCA_EXECUTION_ERROR   (-12)
+
+

STATUS (0xF4): chip was in a state where it could not execute the command, response status byte indicates command execution error (status byte = 0x0F)

+ +
+
+ +

◆ ATCA_FUNC_FAIL

+ +
+
+ + + + +
#define ATCA_FUNC_FAIL   (-32)
+
+

STATUS (0xE0): Function could not execute due to incorrect condition / state.

+ +
+
+ +

◆ ATCA_GEN_FAIL

+ +
+
+ + + + +
#define ATCA_GEN_FAIL   (-31)
+
+

STATUS (0xE1): unspecified error

+ +
+
+ +

◆ ATCA_HEALTH_TEST_ERROR

+ +
+
+ + + + +
#define ATCA_HEALTH_TEST_ERROR   (-6)
+
+

STATUS (0xFA): random number generator health test error

+ +
+
+ +

◆ ATCA_INVALID_ID

+ +
+
+ + + + +
#define ATCA_INVALID_ID   (-29)
+
+

STATUS (0xE3: invalid device id, id not set

+ +
+
+ +

◆ ATCA_INVALID_SIZE

+ +
+
+ + + + +
#define ATCA_INVALID_SIZE   (-28)
+
+

STATUS (0xE4): Count value is out of range or greater than buffer size.

+ +
+
+ +

◆ ATCA_NO_DEVICES

+ +
+
+ + + + +
#define ATCA_NO_DEVICES   (-7)
+
+

STATUS (0xF9): For protocols that support device discovery (kit protocol), no devices were found

+ +
+
+ +

◆ ATCA_NOT_INITIALIZED

+ +
+
+ + + + +
#define ATCA_NOT_INITIALIZED   (-3)
+
+

STATUS (0xFD): The library has not been initialized so the command could not be executed

+ +
+
+ +

◆ ATCA_NOT_LOCKED

+ +
+
+ + + + +
#define ATCA_NOT_LOCKED   (-8)
+
+

STATUS (0xF8): required zone was not locked

+ +
+
+ +

◆ ATCA_PARITY_ERROR

+ +
+
+ + + + +
#define ATCA_PARITY_ERROR   (-23)
+
+

STATUS (0xE9): for protocols needing parity

+ +
+
+ +

◆ ATCA_PARSE_ERROR

+ +
+
+ + + + +
#define ATCA_PARSE_ERROR   (-46)
+
+

STATUS (0xD2): response status byte indicates parsing error(status byte = 0x03)

+ +
+
+ +

◆ ATCA_RESYNC_WITH_WAKEUP

+ +
+
+ + + + +
#define ATCA_RESYNC_WITH_WAKEUP   (-24)
+
+

STATUS (0xE8): Re-synchronization succeeded, but only after generating a Wake-up

+ +
+
+ +

◆ ATCA_RX_CRC_ERROR

+ +
+
+ + + + +
#define ATCA_RX_CRC_ERROR   (-27)
+
+

STATUS (0xE5): CRC error in data received from device

+ +
+
+ +

◆ ATCA_RX_FAIL

+ +
+
+ + + + +
#define ATCA_RX_FAIL   (-26)
+
+

STATUS (0xE6): Timed out while waiting for response. Number of bytes received is > 0.

+ +
+
+ +

◆ ATCA_RX_NO_RESPONSE

+ +
+
+ + + + +
#define ATCA_RX_NO_RESPONSE   (-25)
+
+

STATUS (0xE7): Not an error while the Command layer is polling for a command response.

+ +
+
+ +

◆ ATCA_RX_TIMEOUT

+ +
+
+ + + + +
#define ATCA_RX_TIMEOUT   (-21)
+
+

STATUS (0xEB): for Microchip PHY protocol, timeout on receipt waiting for master

+ +
+
+ +

◆ ATCA_SMALL_BUFFER

+ +
+
+ + + + +
#define ATCA_SMALL_BUFFER   (-19)
+
+

STATUS (0xED): Supplied buffer is too small for data required

+ +
+
+ +

◆ ATCA_STATUS_CRC

+ +
+
+ + + + +
#define ATCA_STATUS_CRC   (-44)
+
+

STATUS (0xD4): response status byte indicates DEVICE did not receive data properly(status byte = 0xFF)

+ +
+
+ +

◆ ATCA_STATUS_ECC

+ +
+
+ + + + +
#define ATCA_STATUS_ECC   (-42)
+
+

STATUS (0xD6): response status byte is ECC fault(status byte = 0x05)

+ +
+
+ +

◆ ATCA_STATUS_SELFTEST_ERROR

+ +
+
+ + + + +
#define ATCA_STATUS_SELFTEST_ERROR   (-41)
+
+

STATUS (0xD7): response status byte is Self Test Error, chip in failure mode (status byte = 0x07)

+ +
+
+ +

◆ ATCA_STATUS_UNKNOWN

+ +
+
+ + + + +
#define ATCA_STATUS_UNKNOWN   (-43)
+
+

STATUS (0xD5): response status byte is unknown

+ +
+
+ +

◆ ATCA_SUCCESS

+ +
+
+ + + + +
#define ATCA_SUCCESS   (0)
+
+

STATUS (0x00): Function Successful

+ +
+
+ +

◆ ATCA_TIMEOUT

+ +
+
+ + + + +
#define ATCA_TIMEOUT   (-15)
+
+

STATUS (0xF1): Timed out while waiting for response. Number of bytes received is 0.

+ +
+
+ +

◆ ATCA_TOO_MANY_COMM_RETRIES

+ +
+
+ + + + +
#define ATCA_TOO_MANY_COMM_RETRIES   (-20)
+
+

STATUS (0xEC): Device did not respond too many times during a transmission. Could indicate no device present.

+ +
+
+ +

◆ ATCA_TX_FAIL

+ +
+
+ + + + +
#define ATCA_TX_FAIL   (-9)
+
+

STATUS (0xF7): Failed to write

+ +
+
+ +

◆ ATCA_TX_TIMEOUT

+ +
+
+ + + + +
#define ATCA_TX_TIMEOUT   (-22)
+
+

STATUS (0xEA): for Microchip PHY protocol, timeout on transmission waiting for master

+ +
+
+ +

◆ ATCA_UNIMPLEMENTED

+ +
+
+ + + + +
#define ATCA_UNIMPLEMENTED   (-11)
+
+

STATUS (0xF5): Function or some element of it hasn't been implemented yet

+ +
+
+ +

◆ ATCA_USE_FLAGS_CONSUMED

+ +
+
+ + + + +
#define ATCA_USE_FLAGS_CONSUMED   (-4)
+
+

STATUS (0xFC): Use flags on the device indicates its consumed fully

+ +
+
+ +

◆ ATCA_WAKE_FAILED

+ +
+
+ + + + +
#define ATCA_WAKE_FAILED   (-48)
+
+

STATUS (0xD0): response status byte indicates CheckMac failure(status byte = 0x01)

+ +
+
+ +

◆ ATCA_WAKE_SUCCESS

+ +
+
+ + + + +
#define ATCA_WAKE_SUCCESS   (-13)
+
+

STATUS (0xF3): received proper wake token

+ +
+
+
diff --git a/a00272.html b/a00272.html index c7915cd30..9d7fda57a 100644 --- a/a00272.html +++ b/a00272.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert.h File Reference +CryptoAuthLib: atca_utils_sizes.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,66 +98,171 @@
-
atcacert.h File Reference
+Macros | +Functions
+
atca_utils_sizes.c File Reference
-

Declarations common to all atcacert code. +

API to Return structure sizes of cryptoauthlib structures. More...

-
#include <stddef.h>
-#include <stdint.h>
-#include "atcacert_check_config.h"
-#include "atca_status.h"
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + +

Macros

-#define FALSE   (0)
 
-#define TRUE   (1)
 
#define ATCACERT_E_SUCCESS   ATCA_SUCCESS
 
#define ATCACERT_E_ERROR   ATCA_GEN_FAIL
 
#define ATCACERT_E_BAD_PARAMS   ATCA_BAD_PARAM
 
#define ATCACERT_E_BUFFER_TOO_SMALL   ATCA_SMALL_BUFFER
 
#define ATCACERT_E_UNIMPLEMENTED   ATCA_UNIMPLEMENTED
 
#define ATCACERT_E_DECODING_ERROR   4
 
#define ATCACERT_E_INVALID_DATE   5
 
#define ATCACERT_E_UNEXPECTED_ELEM_SIZE   7
 
#define ATCACERT_E_ELEM_MISSING   8
 
#define ATCACERT_E_ELEM_OUT_OF_BOUNDS   9
 
#define ATCACERT_E_BAD_CERT   10
 
-#define ATCACERT_E_WRONG_CERT_DEF   11
 
#define ATCACERT_E_VERIFY_FAILED   12
 
#define ATCACERT_E_INVALID_TRANSFORM   13
 
+#define SIZE_OF_API_T(x)   size_t x ## _size(void); size_t x ## _size(void) { return sizeof( x ); }
 
+#define SIZE_OF_API_S(x)   size_t x ## _size(void); size_t x ## _size(void) { return sizeof(struct x ); }
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

+size_t atcacert_tm_utc_t_size (void)
 
+size_t atcacert_date_format_t_size (void)
 
+size_t atcacert_cert_type_t_size (void)
 
+size_t atcacert_cert_sn_src_t_size (void)
 
+size_t atcacert_device_zone_t_size (void)
 
+size_t atcacert_std_cert_element_t_size (void)
 
+size_t atcacert_device_loc_t_size (void)
 
+size_t atcacert_cert_loc_t_size (void)
 
+size_t atcacert_cert_element_t_size (void)
 
+size_t atcacert_def_t_size (void)
 
+size_t atcacert_build_state_t_size (void)
 
+size_t atca_temp_key_t_size (void)
 
+size_t atca_include_data_in_out_size (void)
 
+size_t atca_nonce_in_out_t_size (void)
 
+size_t atca_io_decrypt_in_out_t_size (void)
 
+size_t atca_verify_mac_in_out_t_size (void)
 
+size_t atca_secureboot_enc_in_out_t_size (void)
 
+size_t atca_secureboot_mac_in_out_t_size (void)
 
+size_t atca_mac_in_out_t_size (void)
 
+size_t atca_hmac_in_out_size (void)
 
+size_t atca_gen_dig_in_out_t_size (void)
 
+size_t atca_write_mac_in_out_t_size (void)
 
+size_t atca_derive_key_in_out_size (void)
 
+size_t atca_derive_key_mac_in_out_size (void)
 
+size_t atca_decrypt_in_out_size (void)
 
+size_t atca_check_mac_in_out_t_size (void)
 
+size_t atca_verify_in_out_t_size (void)
 
+size_t atca_gen_key_in_out_t_size (void)
 
+size_t atca_sign_internal_in_out_t_size (void)
 
+size_t bool_size (void)
 
+size_t ATCAPacket_size (void)
 
+size_t atca_device_size (void)
 
+size_t ATCADeviceType_size (void)
 
+size_t ATCAIfaceType_size (void)
 
+size_t ATCAIfaceCfg_size (void)
 
+size_t atca_iface_size (void)
 
+size_t ATCA_STATUS_size (void)
 
+size_t atcac_sha1_ctx_size (void)
 
+size_t atcac_sha1_ctx_t_size (void)
 
+size_t atcac_sha2_256_ctx_size (void)
 
+size_t atcac_sha2_256_ctx_t_size (void)
 
+size_t atcac_hmac_ctx_size (void)
 
+size_t atcac_hmac_ctx_t_size (void)
 

Detailed Description

-

Declarations common to all atcacert code.

-

These are common definitions used by all the atcacert code.

+

API to Return structure sizes of cryptoauthlib structures.

diff --git a/a00272.js b/a00272.js deleted file mode 100644 index 4d0767557..000000000 --- a/a00272.js +++ /dev/null @@ -1,16 +0,0 @@ -var a00272 = -[ - [ "ATCACERT_E_BAD_CERT", "a01443.html#ga822ee0620c8d2d12ff971b9b35f9f5cd", null ], - [ "ATCACERT_E_BAD_PARAMS", "a01443.html#ga47509d283523ab1892fb8746d6f4e37d", null ], - [ "ATCACERT_E_BUFFER_TOO_SMALL", "a01443.html#ga7a2e774fc8b12c4045dea335a86afca6", null ], - [ "ATCACERT_E_DECODING_ERROR", "a01443.html#gaea155533fdd352d6602d3e2fc717930f", null ], - [ "ATCACERT_E_ELEM_MISSING", "a01443.html#ga8e3e7c64650c92364bbac17f6a75474a", null ], - [ "ATCACERT_E_ELEM_OUT_OF_BOUNDS", "a01443.html#ga62604c78d688530173e203b02df180fa", null ], - [ "ATCACERT_E_ERROR", "a01443.html#ga048a6bb9781dbbc402409a172f976f74", null ], - [ "ATCACERT_E_INVALID_DATE", "a01443.html#gaafd66d6744314225ead24b3901bd6372", null ], - [ "ATCACERT_E_INVALID_TRANSFORM", "a01443.html#ga2396e500bd36c2316a1a6e13e3117958", null ], - [ "ATCACERT_E_SUCCESS", "a01443.html#ga7bd1ad830360fc8b988f855da6d0d5ba", null ], - [ "ATCACERT_E_UNEXPECTED_ELEM_SIZE", "a01443.html#ga5a7cb98e18ad338f2eaf6594acb67c32", null ], - [ "ATCACERT_E_UNIMPLEMENTED", "a01443.html#ga4b6db1523875a2b1453ef5e16989ecd4", null ], - [ "ATCACERT_E_VERIFY_FAILED", "a01443.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d", null ] -]; \ No newline at end of file diff --git a/a00275.html b/a00275.html index b9a98426b..4217b1558 100644 --- a/a00275.html +++ b/a00275.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_check_config.h File Reference +CryptoAuthLib: atca_version.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,54 +99,37 @@
-
atcacert_check_config.h File Reference
+
atca_version.h File Reference
-

Configuration check and defaults for the atcacert module. +

Microchip CryptoAuth Library Version. More...

-
#include "cryptoauthlib.h"
-#include "crypto/atca_crypto_sw.h"
-
+
- - - - - - - - - - - - - - - - - - + + + + + + + +

Macros

-#define HOSTLIB_CERT_EN   DEFAULT_DISABLED
 
-#define ATCACERT_INTEGRATION_EN   HOSTLIB_CERT_EN
 
-#define ATCACERT_COMPCERT_EN   (CALIB_ECC_SUPPORT || CALIB_CA2_CERT_SUPPORT)
 
-#define ATCACERT_HW_CHALLENGE_EN   (ATCAB_RANDOM_EN && (ATCA_ECC_SUPPORT || ATCA_TA_SUPPORT))
 
-#define ATCACERT_HW_VERIFY_EN   (ATCAB_VERIFY_EXTERN_EN && (ATCA_ECC_SUPPORT || ATCA_TA_SUPPORT))
 
-#define ATCACERT_DATEFMT_ISO_EN   DEFAULT_ENABLED
 
-#define ATCACERT_DATEFMT_UTC_EN   DEFAULT_ENABLED
 
-#define ATCACERT_DATEFMT_POSIX_EN   DEFAULT_ENABLED
 
-#define ATCACERT_DATEFMT_GEN_EN   DEFAULT_ENABLED
 
+#define ATCA_LIBRARY_VERSION_DATE   "20240926"
 
+#define ATCA_LIBRARY_VERSION_MAJOR   3
 
+#define ATCA_LIBRARY_VERSION_MINOR   7
 
+#define ATCA_LIBRARY_VERSION_BUILD   6
 

Detailed Description

-

Configuration check and defaults for the atcacert module.

- +

Microchip CryptoAuth Library Version.

+
diff --git a/a00278.html b/a00278.html index 70448fa09..631ea28a3 100644 --- a/a00278.html +++ b/a00278.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_client.c File Reference +CryptoAuthLib: atcacert.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,47 +98,66 @@
-
atcacert_client.c File Reference
+Macros
+
atcacert.h File Reference
-

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device. +

Declarations common to all atcacert code. More...

-
#include <limits.h>
-#include <stdlib.h>
-#include "atcacert_client.h"
-#include "atcacert_der.h"
-#include "atcacert_pem.h"
-#include "cryptoauthlib.h"
-#include "calib/calib_basic.h"
-#include "talib/talib_basic.h"
-#include "talib/talib_internal.h"
+
#include <stddef.h>
+#include <stdint.h>
+#include "atcacert_check_config.h"
+#include "atca_status.h"
- - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Functions

ATCA_STATUS atcacert_read_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert (const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert_size_ext (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 
ATCA_STATUS atcacert_read_cert_size (const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 

+Macros

+#define FALSE   (0)
 
+#define TRUE   (1)
 
#define ATCACERT_E_SUCCESS   ATCA_SUCCESS
 
#define ATCACERT_E_ERROR   ATCA_GEN_FAIL
 
#define ATCACERT_E_BAD_PARAMS   ATCA_BAD_PARAM
 
#define ATCACERT_E_BUFFER_TOO_SMALL   ATCA_SMALL_BUFFER
 
#define ATCACERT_E_UNIMPLEMENTED   ATCA_UNIMPLEMENTED
 
#define ATCACERT_E_DECODING_ERROR   4
 
#define ATCACERT_E_INVALID_DATE   5
 
#define ATCACERT_E_UNEXPECTED_ELEM_SIZE   7
 
#define ATCACERT_E_ELEM_MISSING   8
 
#define ATCACERT_E_ELEM_OUT_OF_BOUNDS   9
 
#define ATCACERT_E_BAD_CERT   10
 
+#define ATCACERT_E_WRONG_CERT_DEF   11
 
#define ATCACERT_E_VERIFY_FAILED   12
 
#define ATCACERT_E_INVALID_TRANSFORM   13
 

Detailed Description

-

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.

+

Declarations common to all atcacert code.

+

These are common definitions used by all the atcacert code.

diff --git a/a00278.js b/a00278.js index a15d9db21..2642d6ef3 100644 --- a/a00278.js +++ b/a00278.js @@ -1,7 +1,16 @@ var a00278 = [ - [ "atcacert_read_cert", "a01443.html#gafd202f259b53d72b0a382f33e99f9065", null ], - [ "atcacert_read_cert_ext", "a01443.html#ga906f310b9518c8f41431b047602cd651", null ], - [ "atcacert_read_cert_size", "a01443.html#ga143bf9b419fc7a090cb9876436735616", null ], - [ "atcacert_read_cert_size_ext", "a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b", null ] + [ "ATCACERT_E_BAD_CERT", "a01470.html#ga822ee0620c8d2d12ff971b9b35f9f5cd", null ], + [ "ATCACERT_E_BAD_PARAMS", "a01470.html#ga47509d283523ab1892fb8746d6f4e37d", null ], + [ "ATCACERT_E_BUFFER_TOO_SMALL", "a01470.html#ga7a2e774fc8b12c4045dea335a86afca6", null ], + [ "ATCACERT_E_DECODING_ERROR", "a01470.html#gaea155533fdd352d6602d3e2fc717930f", null ], + [ "ATCACERT_E_ELEM_MISSING", "a01470.html#ga8e3e7c64650c92364bbac17f6a75474a", null ], + [ "ATCACERT_E_ELEM_OUT_OF_BOUNDS", "a01470.html#ga62604c78d688530173e203b02df180fa", null ], + [ "ATCACERT_E_ERROR", "a01470.html#ga048a6bb9781dbbc402409a172f976f74", null ], + [ "ATCACERT_E_INVALID_DATE", "a01470.html#gaafd66d6744314225ead24b3901bd6372", null ], + [ "ATCACERT_E_INVALID_TRANSFORM", "a01470.html#ga2396e500bd36c2316a1a6e13e3117958", null ], + [ "ATCACERT_E_SUCCESS", "a01470.html#ga7bd1ad830360fc8b988f855da6d0d5ba", null ], + [ "ATCACERT_E_UNEXPECTED_ELEM_SIZE", "a01470.html#ga5a7cb98e18ad338f2eaf6594acb67c32", null ], + [ "ATCACERT_E_UNIMPLEMENTED", "a01470.html#ga4b6db1523875a2b1453ef5e16989ecd4", null ], + [ "ATCACERT_E_VERIFY_FAILED", "a01470.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d", null ] ]; \ No newline at end of file diff --git a/a00281.html b/a00281.html index da4559e6d..9b5a26ca7 100644 --- a/a00281.html +++ b/a00281.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_client.h File Reference +CryptoAuthLib: atcacert_check_config.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,68 +98,55 @@
-
atcacert_client.h File Reference
+Macros
+
atcacert_check_config.h File Reference
-

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device. +

Configuration check and defaults for the atcacert module. More...

-
#include <stddef.h>
-#include <stdint.h>
-#include "atcacert_def.h"
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + +

-Functions

ATCA_STATUS atcacert_read_device_loc (const atcacert_device_loc_t *device_loc, uint8_t *data)
 Read the data from a device location.
 
ATCA_STATUS atcacert_read_device_loc_ext (ATCADevice device, const atcacert_device_loc_t *device_loc, uint8_t *data)
 Read the data from a device location.
 
ATCA_STATUS atcacert_read_cert (const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_write_cert (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 Take a full certificate and write it to the ATECC508A device according to the certificate definition.
 
ATCA_STATUS atcacert_write_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 Take a full certificate and write it to the ATECC508A device according to the certificate definition.
 
ATCA_STATUS atcacert_create_csr (const atcacert_def_t *csr_def, uint8_t *csr, size_t *csr_size)
 Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.
 
ATCA_STATUS atcacert_create_csr_pem (const atcacert_def_t *csr_def, char *csr, size_t *csr_size)
 Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.
 
ATCA_STATUS atcacert_get_response (uint8_t device_private_key_slot, const uint8_t challenge[32], uint8_t response[64])
 Calculates the response to a challenge sent from the host.
 
ATCA_STATUS atcacert_read_subj_key_id (const atcacert_def_t *cert_def, uint8_t subj_key_id[20])
 Reads the subject key ID based on a certificate definition.
 
ATCA_STATUS atcacert_read_subj_key_id_ext (ATCADevice device, const atcacert_def_t *cert_def, uint8_t subj_key_id[20])
 Reads the subject key ID based on a certificate definition.
 
ATCA_STATUS atcacert_read_cert_size (const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 
ATCA_STATUS atcacert_read_cert_size_ext (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 

+Macros

+#define HOSTLIB_CERT_EN   DEFAULT_DISABLED
 
+#define ATCACERT_INTEGRATION_EN   HOSTLIB_CERT_EN
 
+#define ATCACERT_COMPCERT_EN   (CALIB_ECC_SUPPORT || CALIB_CA2_CERT_SUPPORT)
 
+#define ATCACERT_HW_CHALLENGE_EN   (ATCAB_RANDOM_EN && (ATCA_ECC_SUPPORT || ATCA_TA_SUPPORT))
 
+#define ATCACERT_HW_VERIFY_EN   (ATCAB_VERIFY_EXTERN_EN && (ATCA_ECC_SUPPORT || ATCA_TA_SUPPORT))
 
+#define ATCACERT_DATEFMT_ISO_EN   DEFAULT_ENABLED
 
+#define ATCACERT_DATEFMT_UTC_EN   DEFAULT_ENABLED
 
+#define ATCACERT_DATEFMT_POSIX_EN   DEFAULT_ENABLED
 
+#define ATCACERT_DATEFMT_GEN_EN   DEFAULT_ENABLED
 

Detailed Description

-

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.

- +

Configuration check and defaults for the atcacert module.

+
diff --git a/a00281.js b/a00281.js deleted file mode 100644 index 11e1532d5..000000000 --- a/a00281.js +++ /dev/null @@ -1,16 +0,0 @@ -var a00281 = -[ - [ "atcacert_create_csr", "a01443.html#ga9b103dcc50fefcb19514285da7fbe296", null ], - [ "atcacert_create_csr_pem", "a01443.html#ga1e4f207e7180d504c5dd369cd20fef21", null ], - [ "atcacert_get_response", "a01443.html#ga9a9769b84557ca2c47fa4442daa9a111", null ], - [ "atcacert_read_cert", "a01443.html#gafd202f259b53d72b0a382f33e99f9065", null ], - [ "atcacert_read_cert_ext", "a01443.html#ga906f310b9518c8f41431b047602cd651", null ], - [ "atcacert_read_cert_size", "a01443.html#ga143bf9b419fc7a090cb9876436735616", null ], - [ "atcacert_read_cert_size_ext", "a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b", null ], - [ "atcacert_read_device_loc", "a01443.html#ga7eb1ce78d2efb60aa56b929577fa88d2", null ], - [ "atcacert_read_device_loc_ext", "a01443.html#ga9d69be730c8bd7863588c43ebe58b225", null ], - [ "atcacert_read_subj_key_id", "a01443.html#ga7f12776448f02a8c9862c4af64537017", null ], - [ "atcacert_read_subj_key_id_ext", "a01443.html#gacb6ecab7acc06102caee5419a01bd803", null ], - [ "atcacert_write_cert", "a01443.html#gafa00725d50c68cfd2e0072bf563491a0", null ], - [ "atcacert_write_cert_ext", "a01443.html#ga25a3291ce46841ca52346b42dc416485", null ] -]; \ No newline at end of file diff --git a/a00284.html b/a00284.html index 6b1e50a6e..e3d3a2592 100644 --- a/a00284.html +++ b/a00284.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_date.c File Reference +CryptoAuthLib: atcacert_client.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,63 +98,47 @@
-
atcacert_date.c File Reference
+Functions
+
atcacert_client.c File Reference
-

Date handling with regard to certificates. +

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device. More...

-
#include <string.h>
-#include <limits.h>
-#include "atcacert_date.h"
-#include "atca_compiler.h"
+
#include <limits.h>
+#include <stdlib.h>
+#include "atcacert_client.h"
+#include "atcacert_der.h"
+#include "atcacert_pem.h"
+#include "cryptoauthlib.h"
+#include "calib/calib_basic.h"
+#include "talib/talib_basic.h"
+#include "talib/talib_internal.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - -

Functions

atcacert_date_format_t atcacert_date_from_asn1_tag (const uint8_t tag)
 Convert the asn1 tag for the supported time formats into the local time format.
 
ATCA_STATUS atcacert_date_enc (atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size)
 Format a timestamp according to the format type.
 
ATCA_STATUS atcacert_date_dec (atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp)
 Parse a formatted timestamp according to the specified format.
 
ATCA_STATUS atcacert_date_get_max_date (atcacert_date_format_t format, atcacert_tm_utc_t *timestamp)
 Return the maximum date available for the given format.
 
ATCA_STATUS atcacert_date_enc_compcert (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_enc_compcert_ext (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert (const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert_ext (const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
int atcacert_date_cmp (const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2)
 Compare two dates.
 
- - - + + + + + + + + + + + +

-Variables

const size_t ATCACERT_DATE_FORMAT_SIZES [5]
 
ATCA_STATUS atcacert_read_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert (const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert_size_ext (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 
ATCA_STATUS atcacert_read_cert_size (const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 

Detailed Description

-

Date handling with regard to certificates.

+

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.

diff --git a/a00284.js b/a00284.js index b67892b4a..3c446eac9 100644 --- a/a00284.js +++ b/a00284.js @@ -1,12 +1,7 @@ var a00284 = [ - [ "atcacert_date_cmp", "a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486", null ], - [ "atcacert_date_dec", "a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461", null ], - [ "atcacert_date_dec_compcert", "a01443.html#gaab6bdf548ca56cec54441114a3152767", null ], - [ "atcacert_date_dec_compcert_ext", "a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2", null ], - [ "atcacert_date_enc", "a01443.html#ga33f676825335d37da36aee1c93463829", null ], - [ "atcacert_date_enc_compcert", "a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62", null ], - [ "atcacert_date_enc_compcert_ext", "a01443.html#ga949c368ba13b78caee11d2abe60de755", null ], - [ "atcacert_date_from_asn1_tag", "a01443.html#ga208c468285600790ebcdba55a4ccf3a8", null ], - [ "atcacert_date_get_max_date", "a01443.html#ga82a0f236afa03da347abbee1db588cb3", null ] + [ "atcacert_read_cert", "a01470.html#gafd202f259b53d72b0a382f33e99f9065", null ], + [ "atcacert_read_cert_ext", "a01470.html#ga906f310b9518c8f41431b047602cd651", null ], + [ "atcacert_read_cert_size", "a01470.html#ga143bf9b419fc7a090cb9876436735616", null ], + [ "atcacert_read_cert_size_ext", "a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b", null ] ]; \ No newline at end of file diff --git a/a00287.html b/a00287.html index 07560a29f..069f8106c 100644 --- a/a00287.html +++ b/a00287.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_date.h File Reference +CryptoAuthLib: atcacert_client.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,169 +98,68 @@
-
atcacert_date.h File Reference
+Functions
+
atcacert_client.h File Reference
-

Declarations for date handling with regard to certificates. +

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device. More...

#include <stddef.h>
-#include "atcacert.h"
+#include <stdint.h>
+#include "atcacert_def.h"
- - - -

-Data Structures

struct  atcacert_tm_utc_s
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

#define DATEFMT_ISO8601_SEP   (0U)
 ISO8601 full date YYYY-MM-DDThh:mm:ssZ.
 
-#define DATEFMT_RFC5280_UTC   (1U)
 RFC 5280 (X.509) 4.1.2.5.1 UTCTime format YYMMDDhhmmssZ.
 
-#define DATEFMT_POSIX_UINT32_BE   (2U)
 POSIX (aka UNIX) date format. Seconds since Jan 1, 1970. 32 bit unsigned integer, big endian.
 
-#define DATEFMT_POSIX_UINT32_LE   (3U)
 POSIX (aka UNIX) date format. Seconds since Jan 1, 1970. 32 bit unsigned integer, little endian.
 
-#define DATEFMT_RFC5280_GEN   (4U)
 RFC 5280 (X.509) 4.1.2.5.2 GeneralizedTime format YYYYMMDDhhmmssZ.
 
-#define DATEFMT_INVALID   (0xFFU)
 
-#define DATEFMT_ISO8601_SEP_SIZE   (20)
 
-#define DATEFMT_RFC5280_UTC_SIZE   (13)
 
-#define DATEFMT_POSIX_UINT32_BE_SIZE   (4)
 
-#define DATEFMT_POSIX_UINT32_LE_SIZE   (4)
 
-#define DATEFMT_RFC5280_GEN_SIZE   (15)
 
-#define DATEFMT_MAX_SIZE   DATEFMT_ISO8601_SEP_SIZE
 
-#define ATCACERT_DATE_FORMAT_SIZES_COUNT   5
 
-#define ATCACERT_COMP_CERT_MAX_SIZE   72u
 
-#define atcacert_date_enc_posix_uint32_be   atcacert_date_enc_posix_be
 
-#define atcacert_date_dec_posix_uint32_be   atcacert_date_dec_posix_be
 
-#define atcacert_date_enc_posix_uint32_le   atcacert_date_enc_posix_le
 
-#define atcacert_date_dec_posix_uint32_le   atcacert_date_dec_posix_le
 
- - - - - -

-Typedefs

typedef struct atcacert_tm_utc_s atcacert_tm_utc_t
 
-typedef uint8_t atcacert_date_format_t
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Functions

ATCA_STATUS atcacert_date_enc (atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size)
 Format a timestamp according to the format type.
 
ATCA_STATUS atcacert_date_dec (atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp)
 Parse a formatted timestamp according to the specified format.
 
ATCA_STATUS atcacert_date_enc_compcert (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_enc_compcert_ext (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert (const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert_ext (const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
atcacert_date_format_t atcacert_date_from_asn1_tag (const uint8_t tag)
 Convert the asn1 tag for the supported time formats into the local time format.
 
ATCA_STATUS atcacert_date_get_max_date (atcacert_date_format_t format, atcacert_tm_utc_t *timestamp)
 Return the maximum date available for the given format.
 
-ATCA_STATUS atcacert_date_enc_iso8601_sep (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(20)])
 
-ATCA_STATUS atcacert_date_dec_iso8601_sep (const uint8_t formatted_date[(20)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_rfc5280_utc (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(13)])
 
-ATCA_STATUS atcacert_date_dec_rfc5280_utc (const uint8_t formatted_date[(13)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_rfc5280_gen (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(15)])
 
-ATCA_STATUS atcacert_date_dec_rfc5280_gen (const uint8_t formatted_date[(15)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_posix_be (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(4)])
 
-ATCA_STATUS atcacert_date_dec_posix_be (const uint8_t formatted_date[(4)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_posix_le (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(4)])
 
-ATCA_STATUS atcacert_date_dec_posix_le (const uint8_t formatted_date[(4)], atcacert_tm_utc_t *timestamp)
 
int atcacert_date_cmp (const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2)
 Compare two dates.
 
- - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Variables

-const size_t ATCACERT_DATE_FORMAT_SIZES [5]
 
ATCA_STATUS atcacert_read_device_loc (const atcacert_device_loc_t *device_loc, uint8_t *data)
 Read the data from a device location.
 
ATCA_STATUS atcacert_read_device_loc_ext (ATCADevice device, const atcacert_device_loc_t *device_loc, uint8_t *data)
 Read the data from a device location.
 
ATCA_STATUS atcacert_read_cert (const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_write_cert (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 Take a full certificate and write it to the ATECC508A device according to the certificate definition.
 
ATCA_STATUS atcacert_write_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 Take a full certificate and write it to the ATECC508A device according to the certificate definition.
 
ATCA_STATUS atcacert_create_csr (const atcacert_def_t *csr_def, uint8_t *csr, size_t *csr_size)
 Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.
 
ATCA_STATUS atcacert_create_csr_pem (const atcacert_def_t *csr_def, char *csr, size_t *csr_size)
 Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.
 
ATCA_STATUS atcacert_get_response (uint8_t device_private_key_slot, const uint8_t challenge[32], uint8_t response[64])
 Calculates the response to a challenge sent from the host.
 
ATCA_STATUS atcacert_read_subj_key_id (const atcacert_def_t *cert_def, uint8_t subj_key_id[20])
 Reads the subject key ID based on a certificate definition.
 
ATCA_STATUS atcacert_read_subj_key_id_ext (ATCADevice device, const atcacert_def_t *cert_def, uint8_t subj_key_id[20])
 Reads the subject key ID based on a certificate definition.
 
ATCA_STATUS atcacert_read_cert_size (const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 
ATCA_STATUS atcacert_read_cert_size_ext (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 

Detailed Description

-

Declarations for date handling with regard to certificates.

+

Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.

diff --git a/a00287.js b/a00287.js index d5466d59d..201ef5e0a 100644 --- a/a00287.js +++ b/a00287.js @@ -1,18 +1,16 @@ var a00287 = [ - [ "DATEFMT_ISO8601_SEP", "a01443.html#ga6e58a9d673118d8075bb4cb4c85ec0cb", null ], - [ "DATEFMT_POSIX_UINT32_BE", "a01443.html#ga35593316a537ec58d4a214243be9c862", null ], - [ "DATEFMT_POSIX_UINT32_LE", "a01443.html#gad97a813a37feaac6770f66846ad4bf27", null ], - [ "DATEFMT_RFC5280_GEN", "a01443.html#ga9b2731e0538062863fdd2816e60787b6", null ], - [ "DATEFMT_RFC5280_UTC", "a01443.html#ga0043de3aea86035e05798afc16d516d0", null ], - [ "atcacert_tm_utc_t", "a01443.html#ga4a59e158244def2c79227aa244bd59c2", null ], - [ "atcacert_date_cmp", "a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486", null ], - [ "atcacert_date_dec", "a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461", null ], - [ "atcacert_date_dec_compcert", "a01443.html#gaab6bdf548ca56cec54441114a3152767", null ], - [ "atcacert_date_dec_compcert_ext", "a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2", null ], - [ "atcacert_date_enc", "a01443.html#ga33f676825335d37da36aee1c93463829", null ], - [ "atcacert_date_enc_compcert", "a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62", null ], - [ "atcacert_date_enc_compcert_ext", "a01443.html#ga949c368ba13b78caee11d2abe60de755", null ], - [ "atcacert_date_from_asn1_tag", "a01443.html#ga208c468285600790ebcdba55a4ccf3a8", null ], - [ "atcacert_date_get_max_date", "a01443.html#ga82a0f236afa03da347abbee1db588cb3", null ] + [ "atcacert_create_csr", "a01470.html#ga9b103dcc50fefcb19514285da7fbe296", null ], + [ "atcacert_create_csr_pem", "a01470.html#ga1e4f207e7180d504c5dd369cd20fef21", null ], + [ "atcacert_get_response", "a01470.html#ga9a9769b84557ca2c47fa4442daa9a111", null ], + [ "atcacert_read_cert", "a01470.html#gafd202f259b53d72b0a382f33e99f9065", null ], + [ "atcacert_read_cert_ext", "a01470.html#ga906f310b9518c8f41431b047602cd651", null ], + [ "atcacert_read_cert_size", "a01470.html#ga143bf9b419fc7a090cb9876436735616", null ], + [ "atcacert_read_cert_size_ext", "a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b", null ], + [ "atcacert_read_device_loc", "a01470.html#ga7eb1ce78d2efb60aa56b929577fa88d2", null ], + [ "atcacert_read_device_loc_ext", "a01470.html#ga9d69be730c8bd7863588c43ebe58b225", null ], + [ "atcacert_read_subj_key_id", "a01470.html#ga7f12776448f02a8c9862c4af64537017", null ], + [ "atcacert_read_subj_key_id_ext", "a01470.html#gacb6ecab7acc06102caee5419a01bd803", null ], + [ "atcacert_write_cert", "a01470.html#gafa00725d50c68cfd2e0072bf563491a0", null ], + [ "atcacert_write_cert_ext", "a01470.html#ga25a3291ce46841ca52346b42dc416485", null ] ]; \ No newline at end of file diff --git a/a00290.html b/a00290.html index 2653042fb..19658851f 100644 --- a/a00290.html +++ b/a00290.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_def.c File Reference +CryptoAuthLib: atcacert_date.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,61 +98,63 @@
-
atcacert_def.c File Reference
+Functions | +Variables
+
atcacert_date.c File Reference
-

Main certificate definition implementation. +

Date handling with regard to certificates. More...

-
#include "atcacert_def.h"
-#include "crypto/atca_crypto_sw.h"
-#include "crypto/atca_crypto_sw_sha1.h"
-#include "crypto/atca_crypto_sw_sha2.h"
-#include "atcacert_der.h"
-#include "atcacert_date.h"
-#include <string.h>
-#include "atca_helpers.h"
-#include "cal_buffer.h"
+
#include <string.h>
+#include <limits.h>
+#include "atcacert_date.h"
+#include "atca_compiler.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS atcacert_get_subject (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf)
 Gets the subject name from a certificate.
 
ATCA_STATUS atcacert_get_subj_public_key (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64])
 Gets the subject public key from a certificate.
 
ATCA_STATUS atcacert_get_subj_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20])
 Gets the subject key ID from a certificate.
 
ATCA_STATUS atcacert_get_issuer (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128])
 Gets the issuer name of a certificate.
 
ATCA_STATUS atcacert_get_issue_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the issue date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_expire_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the expire date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_cert_sn (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size)
 Gets the certificate serial number from a certificate.
 
ATCA_STATUS atcacert_get_auth_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20])
 Gets the authority key ID from a certificate.
 
int atcacert_calc_expire_years (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years)
 
atcacert_date_format_t atcacert_date_from_asn1_tag (const uint8_t tag)
 Convert the asn1 tag for the supported time formats into the local time format.
 
ATCA_STATUS atcacert_date_enc (atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size)
 Format a timestamp according to the format type.
 
ATCA_STATUS atcacert_date_dec (atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp)
 Parse a formatted timestamp according to the specified format.
 
ATCA_STATUS atcacert_date_get_max_date (atcacert_date_format_t format, atcacert_tm_utc_t *timestamp)
 Return the maximum date available for the given format.
 
ATCA_STATUS atcacert_date_enc_compcert (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_enc_compcert_ext (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert (const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert_ext (const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
int atcacert_date_cmp (const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2)
 Compare two dates.
 
+ + +

+Variables

const size_t ATCACERT_DATE_FORMAT_SIZES [5]
 

Detailed Description

-

Main certificate definition implementation.

+

Date handling with regard to certificates.

diff --git a/a00290.js b/a00290.js index e0e31f730..8846c8eec 100644 --- a/a00290.js +++ b/a00290.js @@ -1,12 +1,12 @@ var a00290 = [ - [ "atcacert_calc_expire_years", "a01443.html#ga6961d4584f23cfe79ddec69a91e41e03", null ], - [ "atcacert_get_auth_key_id", "a01443.html#ga79182d181cd8041a0e66e18790dff519", null ], - [ "atcacert_get_cert_sn", "a01443.html#gad1de933f825653a1a725b46407adb09e", null ], - [ "atcacert_get_expire_date", "a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466", null ], - [ "atcacert_get_issue_date", "a01443.html#ga7305906995afb21b494446d84298533b", null ], - [ "atcacert_get_issuer", "a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7", null ], - [ "atcacert_get_subj_key_id", "a01443.html#ga9544e4c1c1ae365f90253f8a475e164e", null ], - [ "atcacert_get_subj_public_key", "a01443.html#gaa530a6a7f90a9a610856701b0220a161", null ], - [ "atcacert_get_subject", "a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0", null ] + [ "atcacert_date_cmp", "a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486", null ], + [ "atcacert_date_dec", "a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461", null ], + [ "atcacert_date_dec_compcert", "a01470.html#gaab6bdf548ca56cec54441114a3152767", null ], + [ "atcacert_date_dec_compcert_ext", "a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2", null ], + [ "atcacert_date_enc", "a01470.html#ga33f676825335d37da36aee1c93463829", null ], + [ "atcacert_date_enc_compcert", "a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62", null ], + [ "atcacert_date_enc_compcert_ext", "a01470.html#ga949c368ba13b78caee11d2abe60de755", null ], + [ "atcacert_date_from_asn1_tag", "a01470.html#ga208c468285600790ebcdba55a4ccf3a8", null ], + [ "atcacert_date_get_max_date", "a01470.html#ga82a0f236afa03da347abbee1db588cb3", null ] ]; \ No newline at end of file diff --git a/a00293.html b/a00293.html index 5bfef588a..c3e79490c 100644 --- a/a00293.html +++ b/a00293.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_def.h File Reference +CryptoAuthLib: atcacert_date.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,191 +101,166 @@ Data Structures | Macros | Typedefs | -Enumerations | -Functions
-
atcacert_def.h File Reference
+Functions | +Variables
+
atcacert_date.h File Reference
-

Declarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices. +

Declarations for date handling with regard to certificates. More...

#include <stddef.h>
-#include <stdint.h>
-#include "atca_compiler.h"
-#include "atcacert.h"
-#include "atcacert_date.h"
-#include "atca_helpers.h"
-#include "crypto/atca_crypto_sw.h"
-#include "cal_buffer.h"
+#include "atcacert.h"
- - - - - - - - - +

Data Structures

struct  atcacert_device_loc_s
 
struct  atcacert_cert_loc_s
 
struct  atcacert_cert_element_s
 
struct  atcacert_def_s
 
struct  atcacert_build_state_s
struct  atcacert_tm_utc_s
 
- - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Macros

-#define ATCA_MAX_TRANSFORMS   2
 
-#define CA_DEV_SN_SIZE   9u
 
-#define CA2_DEV_SN_SIZE_PART_1   4u
 
-#define CA2_DEV_SN_SIZE_PART_2   5u
 
-#define CA_DEV_SN_CONFIG_ZONE_OFFSET   0u
 
-#define CA2_DEV_SN_CONFIG_ZONE_OFFSET_PART_1   0u
 
-#define CA2_DEV_SN_CONFIG_ZONE_OFFSET_PART_2   8u
 
#define DATEFMT_ISO8601_SEP   (0U)
 ISO8601 full date YYYY-MM-DDThh:mm:ssZ.
 
+#define DATEFMT_RFC5280_UTC   (1U)
 RFC 5280 (X.509) 4.1.2.5.1 UTCTime format YYMMDDhhmmssZ.
 
+#define DATEFMT_POSIX_UINT32_BE   (2U)
 POSIX (aka UNIX) date format. Seconds since Jan 1, 1970. 32 bit unsigned integer, big endian.
 
+#define DATEFMT_POSIX_UINT32_LE   (3U)
 POSIX (aka UNIX) date format. Seconds since Jan 1, 1970. 32 bit unsigned integer, little endian.
 
+#define DATEFMT_RFC5280_GEN   (4U)
 RFC 5280 (X.509) 4.1.2.5.2 GeneralizedTime format YYYYMMDDhhmmssZ.
 
+#define DATEFMT_INVALID   (0xFFU)
 
+#define DATEFMT_ISO8601_SEP_SIZE   (20)
 
+#define DATEFMT_RFC5280_UTC_SIZE   (13)
 
+#define DATEFMT_POSIX_UINT32_BE_SIZE   (4)
 
+#define DATEFMT_POSIX_UINT32_LE_SIZE   (4)
 
+#define DATEFMT_RFC5280_GEN_SIZE   (15)
 
+#define DATEFMT_MAX_SIZE   DATEFMT_ISO8601_SEP_SIZE
 
+#define ATCACERT_DATE_FORMAT_SIZES_COUNT   5
 
+#define ATCACERT_COMP_CERT_MAX_SIZE   72u
 
+#define atcacert_date_enc_posix_uint32_be   atcacert_date_enc_posix_be
 
+#define atcacert_date_dec_posix_uint32_be   atcacert_date_dec_posix_be
 
+#define atcacert_date_enc_posix_uint32_le   atcacert_date_enc_posix_le
 
+#define atcacert_date_dec_posix_uint32_le   atcacert_date_dec_posix_le
 
- - - - - - - - - - - - - - - - - - - - - -

Typedefs

typedef enum atcacert_cert_type_e atcacert_cert_type_t
 
typedef enum atcacert_cert_sn_src_e atcacert_cert_sn_src_t
 
typedef enum atcacert_device_zone_e atcacert_device_zone_t
 
-typedef enum atcacert_transform_e atcacert_transform_t
 How to transform the data from the device to the certificate.
 
typedef enum atcacert_std_cert_element_e atcacert_std_cert_element_t
 
typedef struct ATCA_PACKED atcacert_device_loc_s atcacert_device_loc_t
 
typedef struct ATCA_PACKED atcacert_cert_loc_s atcacert_cert_loc_t
 
typedef struct ATCA_PACKED atcacert_cert_element_s atcacert_cert_element_t
 
typedef struct atcacert_def_s atcacert_def_t
 
typedef struct atcacert_build_state_s atcacert_build_state_t
 
- - - - - - - - - - - - + + + +

-Enumerations

enum  atcacert_cert_type_e { CERTTYPE_X509 -, CERTTYPE_CUSTOM -, CERTTYPE_X509_FULL_STORED - }
 
enum  atcacert_cert_sn_src_e {
-  SNSRC_STORED = 0x0 -, SNSRC_STORED_DYNAMIC = 0x7 -, SNSRC_DEVICE_SN = 0x8 -, SNSRC_SIGNER_ID = 0x9 -,
-  SNSRC_PUB_KEY_HASH = 0xA -, SNSRC_DEVICE_SN_HASH = 0xB -, SNSRC_PUB_KEY_HASH_POS = 0xC -, SNSRC_DEVICE_SN_HASH_POS = 0xD -,
-  SNSRC_PUB_KEY_HASH_RAW = 0xE -, SNSRC_DEVICE_SN_HASH_RAW = 0xF -
- }
 
enum  atcacert_device_zone_e {
-  DEVZONE_CONFIG = 0x00 -, DEVZONE_OTP = 0x01 -, DEVZONE_DATA = 0x02 -, DEVZONE_GENKEY = 0x03 -,
-  DEVZONE_NONE = 0x07 -
- }
 
enum  atcacert_transform_e {
-  TF_NONE -, TF_REVERSE -, TF_BIN2HEX_UC -, TF_BIN2HEX_LC -,
-  TF_HEX2BIN_UC -, TF_HEX2BIN_LC -, TF_BIN2HEX_SPACE_UC -, TF_BIN2HEX_SPACE_LC -,
-  TF_HEX2BIN_SPACE_UC -, TF_HEX2BIN_SPACE_LC -
- }
 How to transform the data from the device to the certificate. More...
 
enum  atcacert_std_cert_element_e {
-  STDCERT_PUBLIC_KEY -, STDCERT_SIGNATURE -, STDCERT_ISSUE_DATE -, STDCERT_EXPIRE_DATE -,
-  STDCERT_SIGNER_ID -, STDCERT_CERT_SN -, STDCERT_AUTH_KEY_ID -, STDCERT_SUBJ_KEY_ID -,
-  STDCERT_NUM_ELEMENTS -
- }
 
typedef struct atcacert_tm_utc_s atcacert_tm_utc_t
 
+typedef uint8_t atcacert_date_format_t
 
- - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS atcacert_get_subject (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf)
 Gets the subject name from a certificate.
 
ATCA_STATUS atcacert_get_subj_public_key (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64])
 Gets the subject public key from a certificate.
 
ATCA_STATUS atcacert_get_subj_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20])
 Gets the subject key ID from a certificate.
 
ATCA_STATUS atcacert_get_issuer (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128])
 Gets the issuer name of a certificate.
 
ATCA_STATUS atcacert_get_issue_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the issue date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_expire_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the expire date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_cert_sn (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size)
 Gets the certificate serial number from a certificate.
 
ATCA_STATUS atcacert_get_auth_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20])
 Gets the authority key ID from a certificate.
 
int atcacert_calc_expire_years (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years)
 
ATCA_STATUS atcacert_date_enc (atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size)
 Format a timestamp according to the format type.
 
ATCA_STATUS atcacert_date_dec (atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp)
 Parse a formatted timestamp according to the specified format.
 
ATCA_STATUS atcacert_date_enc_compcert (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_enc_compcert_ext (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert (const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert_ext (const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
atcacert_date_format_t atcacert_date_from_asn1_tag (const uint8_t tag)
 Convert the asn1 tag for the supported time formats into the local time format.
 
ATCA_STATUS atcacert_date_get_max_date (atcacert_date_format_t format, atcacert_tm_utc_t *timestamp)
 Return the maximum date available for the given format.
 
+ATCA_STATUS atcacert_date_enc_iso8601_sep (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(20)])
 
+ATCA_STATUS atcacert_date_dec_iso8601_sep (const uint8_t formatted_date[(20)], atcacert_tm_utc_t *timestamp)
 
+ATCA_STATUS atcacert_date_enc_rfc5280_utc (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(13)])
 
+ATCA_STATUS atcacert_date_dec_rfc5280_utc (const uint8_t formatted_date[(13)], atcacert_tm_utc_t *timestamp)
 
+ATCA_STATUS atcacert_date_enc_rfc5280_gen (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(15)])
 
+ATCA_STATUS atcacert_date_dec_rfc5280_gen (const uint8_t formatted_date[(15)], atcacert_tm_utc_t *timestamp)
 
+ATCA_STATUS atcacert_date_enc_posix_be (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(4)])
 
+ATCA_STATUS atcacert_date_dec_posix_be (const uint8_t formatted_date[(4)], atcacert_tm_utc_t *timestamp)
 
+ATCA_STATUS atcacert_date_enc_posix_le (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(4)])
 
+ATCA_STATUS atcacert_date_dec_posix_le (const uint8_t formatted_date[(4)], atcacert_tm_utc_t *timestamp)
 
int atcacert_date_cmp (const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2)
 Compare two dates.
 
+ + +

+Variables

+const size_t ATCACERT_DATE_FORMAT_SIZES [5]
 

Detailed Description

-

Declarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices.

-

Only the dynamic elements of a certificate (the parts of the certificate that change from device to device) are stored on the ATECC device. The definitions here describe the form of the certificate, and where the dynamic elements can be found both on the ATECC device itself and in the certificate template.

-

This also defines utility functions for working with the certificates and their definitions.

+

Declarations for date handling with regard to certificates.

diff --git a/a00293.js b/a00293.js index 6714b0f57..97bc58b0a 100644 --- a/a00293.js +++ b/a00293.js @@ -1,69 +1,18 @@ var a00293 = [ - [ "atcacert_build_state_t", "a01443.html#ga199c030847111ed09a682ca61b7597a9", null ], - [ "atcacert_cert_element_t", "a01443.html#ga28ae8005ca4b109958b090d2079d190b", null ], - [ "atcacert_cert_loc_t", "a01443.html#gad473c89ee9a934029ff87e86fc1c570d", null ], - [ "atcacert_cert_sn_src_t", "a01443.html#ga3bddddfbb916fe1dd1e935e454d3265b", null ], - [ "atcacert_cert_type_t", "a01443.html#gae63503395992a60853867e3865f75be0", null ], - [ "atcacert_def_t", "a01443.html#ga01be962d7321095d15547113d727c97d", null ], - [ "atcacert_device_loc_t", "a01443.html#ga5973a9cc26357822a232433f57741777", null ], - [ "atcacert_device_zone_t", "a01443.html#ga63df515d393c9ebb6979d53208263458", null ], - [ "atcacert_std_cert_element_t", "a01443.html#ga70deb837a72574263e6fb0721d8e0616", null ], - [ "atcacert_transform_t", "a01443.html#ga249c2793a533c5487b5b7b935683a78f", null ], - [ "atcacert_cert_sn_src_e", "a01443.html#ga813047a656af7fe578d28fd54c840e8e", [ - [ "SNSRC_STORED", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1", null ], - [ "SNSRC_STORED_DYNAMIC", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b", null ], - [ "SNSRC_DEVICE_SN", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41", null ], - [ "SNSRC_SIGNER_ID", "a01443.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff", null ], - [ "SNSRC_PUB_KEY_HASH", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e", null ], - [ "SNSRC_DEVICE_SN_HASH", "a01443.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2", null ], - [ "SNSRC_PUB_KEY_HASH_POS", "a01443.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5", null ], - [ "SNSRC_DEVICE_SN_HASH_POS", "a01443.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7", null ], - [ "SNSRC_PUB_KEY_HASH_RAW", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972", null ], - [ "SNSRC_DEVICE_SN_HASH_RAW", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909", null ] - ] ], - [ "atcacert_cert_type_e", "a01443.html#ga5430f01929cd7269e04db08d1f28642f", [ - [ "CERTTYPE_X509", "a01443.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44", null ], - [ "CERTTYPE_CUSTOM", "a01443.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb", null ], - [ "CERTTYPE_X509_FULL_STORED", "a01443.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9", null ] - ] ], - [ "atcacert_device_zone_e", "a01443.html#ga1c0876228cb459f64347a63f3bae4c73", [ - [ "DEVZONE_CONFIG", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207", null ], - [ "DEVZONE_OTP", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea", null ], - [ "DEVZONE_DATA", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb", null ], - [ "DEVZONE_GENKEY", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c", null ], - [ "DEVZONE_NONE", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05", null ] - ] ], - [ "atcacert_std_cert_element_e", "a01443.html#ga77184d0c71198b489ea9b57d07da824e", [ - [ "STDCERT_PUBLIC_KEY", "a01443.html#gga77184d0c71198b489ea9b57d07da824eaf78a51bddeca05e1a525f26792b6de68", null ], - [ "STDCERT_SIGNATURE", "a01443.html#gga77184d0c71198b489ea9b57d07da824ea8eab5679d330212bb87b2413ea82b7cc", null ], - [ "STDCERT_ISSUE_DATE", "a01443.html#gga77184d0c71198b489ea9b57d07da824ea2f3039692a71546e581fcaf8a8a53f15", null ], - [ "STDCERT_EXPIRE_DATE", "a01443.html#gga77184d0c71198b489ea9b57d07da824ea886b91f34d6839fe9e9217490530c604", null ], - [ "STDCERT_SIGNER_ID", "a01443.html#gga77184d0c71198b489ea9b57d07da824eadfaaad6a933423f63fc3233bd84b90d3", null ], - [ "STDCERT_CERT_SN", "a01443.html#gga77184d0c71198b489ea9b57d07da824ea73b3d53d4e70a48fd3fdeb0143493efc", null ], - [ "STDCERT_AUTH_KEY_ID", "a01443.html#gga77184d0c71198b489ea9b57d07da824ea6a9cddad9f6b552f0fe5f63fc57cf106", null ], - [ "STDCERT_SUBJ_KEY_ID", "a01443.html#gga77184d0c71198b489ea9b57d07da824ea97400647cc539ce999c0b9f95d736585", null ], - [ "STDCERT_NUM_ELEMENTS", "a01443.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f", null ] - ] ], - [ "atcacert_transform_e", "a01443.html#ga121ffde3250c4ca6947c680868aa6017", [ - [ "TF_NONE", "a01443.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84", null ], - [ "TF_REVERSE", "a01443.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817", null ], - [ "TF_BIN2HEX_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7", null ], - [ "TF_BIN2HEX_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979", null ], - [ "TF_HEX2BIN_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779", null ], - [ "TF_HEX2BIN_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd", null ], - [ "TF_BIN2HEX_SPACE_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa", null ], - [ "TF_BIN2HEX_SPACE_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe", null ], - [ "TF_HEX2BIN_SPACE_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08", null ], - [ "TF_HEX2BIN_SPACE_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d", null ] - ] ], - [ "atcacert_calc_expire_years", "a01443.html#ga6961d4584f23cfe79ddec69a91e41e03", null ], - [ "atcacert_get_auth_key_id", "a01443.html#ga79182d181cd8041a0e66e18790dff519", null ], - [ "atcacert_get_cert_sn", "a01443.html#gad1de933f825653a1a725b46407adb09e", null ], - [ "atcacert_get_expire_date", "a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466", null ], - [ "atcacert_get_issue_date", "a01443.html#ga7305906995afb21b494446d84298533b", null ], - [ "atcacert_get_issuer", "a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7", null ], - [ "atcacert_get_subj_key_id", "a01443.html#ga9544e4c1c1ae365f90253f8a475e164e", null ], - [ "atcacert_get_subj_public_key", "a01443.html#gaa530a6a7f90a9a610856701b0220a161", null ], - [ "atcacert_get_subject", "a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0", null ] + [ "DATEFMT_ISO8601_SEP", "a01470.html#ga6e58a9d673118d8075bb4cb4c85ec0cb", null ], + [ "DATEFMT_POSIX_UINT32_BE", "a01470.html#ga35593316a537ec58d4a214243be9c862", null ], + [ "DATEFMT_POSIX_UINT32_LE", "a01470.html#gad97a813a37feaac6770f66846ad4bf27", null ], + [ "DATEFMT_RFC5280_GEN", "a01470.html#ga9b2731e0538062863fdd2816e60787b6", null ], + [ "DATEFMT_RFC5280_UTC", "a01470.html#ga0043de3aea86035e05798afc16d516d0", null ], + [ "atcacert_tm_utc_t", "a01470.html#ga4a59e158244def2c79227aa244bd59c2", null ], + [ "atcacert_date_cmp", "a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486", null ], + [ "atcacert_date_dec", "a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461", null ], + [ "atcacert_date_dec_compcert", "a01470.html#gaab6bdf548ca56cec54441114a3152767", null ], + [ "atcacert_date_dec_compcert_ext", "a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2", null ], + [ "atcacert_date_enc", "a01470.html#ga33f676825335d37da36aee1c93463829", null ], + [ "atcacert_date_enc_compcert", "a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62", null ], + [ "atcacert_date_enc_compcert_ext", "a01470.html#ga949c368ba13b78caee11d2abe60de755", null ], + [ "atcacert_date_from_asn1_tag", "a01470.html#ga208c468285600790ebcdba55a4ccf3a8", null ], + [ "atcacert_date_get_max_date", "a01470.html#ga82a0f236afa03da347abbee1db588cb3", null ] ]; \ No newline at end of file diff --git a/a00296.html b/a00296.html index 7a8da02e3..5fe7e3832 100644 --- a/a00296.html +++ b/a00296.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_der.c File Reference +CryptoAuthLib: atcacert_def.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,62 @@
-
atcacert_der.c File Reference
+ +
atcacert_def.c File Reference
-

functions required to work with DER encoded data related to X.509 certificates. +

Main certificate definition implementation. More...

-
#include "cryptoauthlib.h"
-#include "atcacert_der.h"
+
#include "atcacert_def.h"
+#include "crypto/atca_crypto_sw.h"
+#include "crypto/atca_crypto_sw_sha1.h"
+#include "crypto/atca_crypto_sw_sha2.h"
+#include "atcacert_der.h"
+#include "atcacert_date.h"
#include <string.h>
-

Detailed Description

-

functions required to work with DER encoded data related to X.509 certificates.

+#include "atca_helpers.h"
+#include "cal_buffer.h"
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS atcacert_get_subject (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf)
 Gets the subject name from a certificate.
 
ATCA_STATUS atcacert_get_subj_public_key (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *subj_public_key)
 Gets the subject public key from a certificate.
 
ATCA_STATUS atcacert_get_subj_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20])
 Gets the subject key ID from a certificate.
 
ATCA_STATUS atcacert_get_issuer (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128])
 Gets the issuer name of a certificate.
 
ATCA_STATUS atcacert_get_issue_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the issue date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_expire_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the expire date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_cert_sn (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size)
 Gets the certificate serial number from a certificate.
 
ATCA_STATUS atcacert_get_auth_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20])
 Gets the authority key ID from a certificate.
 
int atcacert_calc_expire_years (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years)
 
+

Detailed Description

+

Main certificate definition implementation.

diff --git a/a00299.html b/a00299.html index fff5d15e8..894a77e66 100644 --- a/a00299.html +++ b/a00299.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_der.h File Reference +CryptoAuthLib: atcacert_def.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,50 +98,194 @@
-
atcacert_der.h File Reference
+
atcacert_def.h File Reference
-

function declarations required to work with DER encoded data related to X.509 certificates. +

Declarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices. More...

#include <stddef.h>
#include <stdint.h>
-#include "atcacert.h"
+#include "atca_compiler.h"
+#include "atcacert.h"
+#include "atcacert_date.h"
+#include "atca_helpers.h"
+#include "crypto/atca_crypto_sw.h"
+#include "cal_buffer.h"
+ + + + + + + + + + + +

+Data Structures

struct  atcacert_device_loc_s
 
struct  atcacert_cert_loc_s
 
struct  atcacert_cert_element_s
 
struct  atcacert_def_s
 
struct  atcacert_build_state_s
 
+ + + + + + + + + + + + + + + +

+Macros

+#define ATCA_MAX_TRANSFORMS   2
 
+#define CA_DEV_SN_SIZE   9u
 
+#define CA2_DEV_SN_SIZE_PART_1   4u
 
+#define CA2_DEV_SN_SIZE_PART_2   5u
 
+#define CA_DEV_SN_CONFIG_ZONE_OFFSET   0u
 
+#define CA2_DEV_SN_CONFIG_ZONE_OFFSET_PART_1   0u
 
+#define CA2_DEV_SN_CONFIG_ZONE_OFFSET_PART_2   8u
 
+ + + + + + + + + + + + + + + + + + + + + + +

+Typedefs

typedef enum atcacert_cert_type_e atcacert_cert_type_t
 
typedef enum atcacert_cert_sn_src_e atcacert_cert_sn_src_t
 
typedef enum atcacert_device_zone_e atcacert_device_zone_t
 
+typedef enum atcacert_transform_e atcacert_transform_t
 How to transform the data from the device to the certificate.
 
typedef enum atcacert_std_cert_element_e atcacert_std_cert_element_t
 
typedef struct ATCA_PACKED atcacert_device_loc_s atcacert_device_loc_t
 
typedef struct ATCA_PACKED atcacert_cert_loc_s atcacert_cert_loc_t
 
typedef struct ATCA_PACKED atcacert_cert_element_s atcacert_cert_element_t
 
typedef struct atcacert_def_s atcacert_def_t
 
typedef struct atcacert_build_state_s atcacert_build_state_t
 
+ + + + + + + + + + + + +

+Enumerations

enum  atcacert_cert_type_e { CERTTYPE_X509 +, CERTTYPE_CUSTOM +, CERTTYPE_X509_FULL_STORED + }
 
enum  atcacert_cert_sn_src_e {
+  SNSRC_STORED = 0x0 +, SNSRC_STORED_DYNAMIC = 0x7 +, SNSRC_DEVICE_SN = 0x8 +, SNSRC_SIGNER_ID = 0x9 +,
+  SNSRC_PUB_KEY_HASH = 0xA +, SNSRC_DEVICE_SN_HASH = 0xB +, SNSRC_PUB_KEY_HASH_POS = 0xC +, SNSRC_DEVICE_SN_HASH_POS = 0xD +,
+  SNSRC_PUB_KEY_HASH_RAW = 0xE +, SNSRC_DEVICE_SN_HASH_RAW = 0xF +
+ }
 
enum  atcacert_device_zone_e {
+  DEVZONE_CONFIG = 0x00 +, DEVZONE_OTP = 0x01 +, DEVZONE_DATA = 0x02 +, DEVZONE_GENKEY = 0x03 +,
+  DEVZONE_NONE = 0x07 +
+ }
 
enum  atcacert_transform_e {
+  TF_NONE +, TF_REVERSE +, TF_BIN2HEX_UC +, TF_BIN2HEX_LC +,
+  TF_HEX2BIN_UC +, TF_HEX2BIN_LC +, TF_BIN2HEX_SPACE_UC +, TF_BIN2HEX_SPACE_LC +,
+  TF_HEX2BIN_SPACE_UC +, TF_HEX2BIN_SPACE_LC +
+ }
 How to transform the data from the device to the certificate. More...
 
enum  atcacert_std_cert_element_e {
+  STDCERT_PUBLIC_KEY +, STDCERT_SIGNATURE +, STDCERT_ISSUE_DATE +, STDCERT_EXPIRE_DATE +,
+  STDCERT_SIGNER_ID +, STDCERT_CERT_SN +, STDCERT_AUTH_KEY_ID +, STDCERT_SUBJ_KEY_ID +,
+  STDCERT_NUM_ELEMENTS +
+ }
 
- - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS atcacert_der_enc_length (size_t length, uint8_t *der_length, size_t *der_length_size)
 Encode a length in DER format.
 
ATCA_STATUS atcacert_der_dec_length (const uint8_t *der_length, size_t *der_length_size, size_t *length)
 Decode a DER format length.
 
-ATCA_STATUS atcacert_der_adjust_length (uint8_t *der_length, size_t *der_length_size, int delta_length, size_t *new_length)
 
ATCA_STATUS atcacert_der_enc_integer (const uint8_t *int_data, size_t int_data_size, uint8_t is_unsigned, uint8_t *der_int, size_t *der_int_size)
 Encode an ASN.1 integer in DER format, including tag and length fields.
 
ATCA_STATUS atcacert_der_dec_integer (const uint8_t *der_int, size_t *der_int_size, uint8_t *int_data, size_t *int_data_size)
 Decode an ASN.1 DER encoded integer.
 
ATCA_STATUS atcacert_der_enc_ecdsa_sig_value (const uint8_t raw_sig[64], uint8_t *der_sig, size_t *der_sig_size)
 Formats a raw ECDSA P256 signature in the DER encoding found in X.509 certificates.
 
ATCA_STATUS atcacert_der_dec_ecdsa_sig_value (const uint8_t *der_sig, size_t *der_sig_size, uint8_t raw_sig[64])
 Parses an ECDSA P256 signature in the DER encoding as found in X.509 certificates.
 
ATCA_STATUS atcacert_get_subject (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf)
 Gets the subject name from a certificate.
 
ATCA_STATUS atcacert_get_subj_public_key (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *subj_public_key)
 Gets the subject public key from a certificate.
 
ATCA_STATUS atcacert_get_subj_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20])
 Gets the subject key ID from a certificate.
 
ATCA_STATUS atcacert_get_issuer (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128])
 Gets the issuer name of a certificate.
 
ATCA_STATUS atcacert_get_issue_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the issue date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_expire_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the expire date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_cert_sn (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size)
 Gets the certificate serial number from a certificate.
 
ATCA_STATUS atcacert_get_auth_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20])
 Gets the authority key ID from a certificate.
 
int atcacert_calc_expire_years (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years)
 

Detailed Description

-

function declarations required to work with DER encoded data related to X.509 certificates.

+

Declarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices.

+

Only the dynamic elements of a certificate (the parts of the certificate that change from device to device) are stored on the ATECC device. The definitions here describe the form of the certificate, and where the dynamic elements can be found both on the ATECC device itself and in the certificate template.

+

This also defines utility functions for working with the certificates and their definitions.

diff --git a/a00299.js b/a00299.js index 9b507a3fd..be7936ca3 100644 --- a/a00299.js +++ b/a00299.js @@ -1,9 +1,69 @@ var a00299 = [ - [ "atcacert_der_dec_ecdsa_sig_value", "a01443.html#gab22e2c8bf627f700be0e10e331bfdb1f", null ], - [ "atcacert_der_dec_integer", "a01443.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb", null ], - [ "atcacert_der_dec_length", "a01443.html#ga9d4810aa2fd1db14a8f91204387fd972", null ], - [ "atcacert_der_enc_ecdsa_sig_value", "a01443.html#gacee7e7eb74c022b2ea70c7a549d5f876", null ], - [ "atcacert_der_enc_integer", "a01443.html#gadc86044101ad9a87556d49ab8bf892af", null ], - [ "atcacert_der_enc_length", "a01443.html#ga5866e20dc2c7f9d788924155eac4fece", null ] + [ "atcacert_build_state_t", "a01470.html#ga199c030847111ed09a682ca61b7597a9", null ], + [ "atcacert_cert_element_t", "a01470.html#ga28ae8005ca4b109958b090d2079d190b", null ], + [ "atcacert_cert_loc_t", "a01470.html#gad473c89ee9a934029ff87e86fc1c570d", null ], + [ "atcacert_cert_sn_src_t", "a01470.html#ga3bddddfbb916fe1dd1e935e454d3265b", null ], + [ "atcacert_cert_type_t", "a01470.html#gae63503395992a60853867e3865f75be0", null ], + [ "atcacert_def_t", "a01470.html#ga01be962d7321095d15547113d727c97d", null ], + [ "atcacert_device_loc_t", "a01470.html#ga5973a9cc26357822a232433f57741777", null ], + [ "atcacert_device_zone_t", "a01470.html#ga63df515d393c9ebb6979d53208263458", null ], + [ "atcacert_std_cert_element_t", "a01470.html#ga70deb837a72574263e6fb0721d8e0616", null ], + [ "atcacert_transform_t", "a01470.html#ga249c2793a533c5487b5b7b935683a78f", null ], + [ "atcacert_cert_sn_src_e", "a01470.html#ga813047a656af7fe578d28fd54c840e8e", [ + [ "SNSRC_STORED", "a01470.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1", null ], + [ "SNSRC_STORED_DYNAMIC", "a01470.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b", null ], + [ "SNSRC_DEVICE_SN", "a01470.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41", null ], + [ "SNSRC_SIGNER_ID", "a01470.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff", null ], + [ "SNSRC_PUB_KEY_HASH", "a01470.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e", null ], + [ "SNSRC_DEVICE_SN_HASH", "a01470.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2", null ], + [ "SNSRC_PUB_KEY_HASH_POS", "a01470.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5", null ], + [ "SNSRC_DEVICE_SN_HASH_POS", "a01470.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7", null ], + [ "SNSRC_PUB_KEY_HASH_RAW", "a01470.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972", null ], + [ "SNSRC_DEVICE_SN_HASH_RAW", "a01470.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909", null ] + ] ], + [ "atcacert_cert_type_e", "a01470.html#ga5430f01929cd7269e04db08d1f28642f", [ + [ "CERTTYPE_X509", "a01470.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44", null ], + [ "CERTTYPE_CUSTOM", "a01470.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb", null ], + [ "CERTTYPE_X509_FULL_STORED", "a01470.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9", null ] + ] ], + [ "atcacert_device_zone_e", "a01470.html#ga1c0876228cb459f64347a63f3bae4c73", [ + [ "DEVZONE_CONFIG", "a01470.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207", null ], + [ "DEVZONE_OTP", "a01470.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea", null ], + [ "DEVZONE_DATA", "a01470.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb", null ], + [ "DEVZONE_GENKEY", "a01470.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c", null ], + [ "DEVZONE_NONE", "a01470.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05", null ] + ] ], + [ "atcacert_std_cert_element_e", "a01470.html#ga77184d0c71198b489ea9b57d07da824e", [ + [ "STDCERT_PUBLIC_KEY", "a01470.html#gga77184d0c71198b489ea9b57d07da824eaf78a51bddeca05e1a525f26792b6de68", null ], + [ "STDCERT_SIGNATURE", "a01470.html#gga77184d0c71198b489ea9b57d07da824ea8eab5679d330212bb87b2413ea82b7cc", null ], + [ "STDCERT_ISSUE_DATE", "a01470.html#gga77184d0c71198b489ea9b57d07da824ea2f3039692a71546e581fcaf8a8a53f15", null ], + [ "STDCERT_EXPIRE_DATE", "a01470.html#gga77184d0c71198b489ea9b57d07da824ea886b91f34d6839fe9e9217490530c604", null ], + [ "STDCERT_SIGNER_ID", "a01470.html#gga77184d0c71198b489ea9b57d07da824eadfaaad6a933423f63fc3233bd84b90d3", null ], + [ "STDCERT_CERT_SN", "a01470.html#gga77184d0c71198b489ea9b57d07da824ea73b3d53d4e70a48fd3fdeb0143493efc", null ], + [ "STDCERT_AUTH_KEY_ID", "a01470.html#gga77184d0c71198b489ea9b57d07da824ea6a9cddad9f6b552f0fe5f63fc57cf106", null ], + [ "STDCERT_SUBJ_KEY_ID", "a01470.html#gga77184d0c71198b489ea9b57d07da824ea97400647cc539ce999c0b9f95d736585", null ], + [ "STDCERT_NUM_ELEMENTS", "a01470.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f", null ] + ] ], + [ "atcacert_transform_e", "a01470.html#ga121ffde3250c4ca6947c680868aa6017", [ + [ "TF_NONE", "a01470.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84", null ], + [ "TF_REVERSE", "a01470.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817", null ], + [ "TF_BIN2HEX_UC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7", null ], + [ "TF_BIN2HEX_LC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979", null ], + [ "TF_HEX2BIN_UC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779", null ], + [ "TF_HEX2BIN_LC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd", null ], + [ "TF_BIN2HEX_SPACE_UC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa", null ], + [ "TF_BIN2HEX_SPACE_LC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe", null ], + [ "TF_HEX2BIN_SPACE_UC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08", null ], + [ "TF_HEX2BIN_SPACE_LC", "a01470.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d", null ] + ] ], + [ "atcacert_calc_expire_years", "a01470.html#ga6961d4584f23cfe79ddec69a91e41e03", null ], + [ "atcacert_get_auth_key_id", "a01470.html#ga79182d181cd8041a0e66e18790dff519", null ], + [ "atcacert_get_cert_sn", "a01470.html#gad1de933f825653a1a725b46407adb09e", null ], + [ "atcacert_get_expire_date", "a01470.html#gaede1f0a4a04cfd720b5fe6a8f56fc466", null ], + [ "atcacert_get_issue_date", "a01470.html#ga7305906995afb21b494446d84298533b", null ], + [ "atcacert_get_issuer", "a01470.html#gae5e5dfa5db2ac919c093ed4149ff2bc7", null ], + [ "atcacert_get_subj_key_id", "a01470.html#ga9544e4c1c1ae365f90253f8a475e164e", null ], + [ "atcacert_get_subj_public_key", "a01470.html#ga263eee4dfc30ce4442bfa97f95bd5c30", null ], + [ "atcacert_get_subject", "a01470.html#ga40feb31278b164a32fe9bf9c2c5a79c0", null ] ]; \ No newline at end of file diff --git a/a00302.html b/a00302.html index fd2c4fbdd..bb05b83e4 100644 --- a/a00302.html +++ b/a00302.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_host_hw.c File Reference +CryptoAuthLib: atcacert_der.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
atcacert_host_hw.c File Reference
+
atcacert_der.c File Reference
-

host side methods using CryptoAuth hardware +

functions required to work with DER encoded data related to X.509 certificates. More...

-
#include "atcacert_host_hw.h"
-#include "atca_basic.h"
-#include "crypto/atca_crypto_sw_sha2.h"
+
#include "cryptoauthlib.h"
+#include "atcacert_der.h"
+#include <string.h>

Detailed Description

-

host side methods using CryptoAuth hardware

+

functions required to work with DER encoded data related to X.509 certificates.

diff --git a/a00305.html b/a00305.html index 151614ac0..cc787d303 100644 --- a/a00305.html +++ b/a00305.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_host_hw.h File Reference +CryptoAuthLib: atcacert_der.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,37 +99,49 @@
-
atcacert_host_hw.h File Reference
+
atcacert_der.h File Reference
-

host side methods using CryptoAuth hardware +

function declarations required to work with DER encoded data related to X.509 certificates. More...

#include <stddef.h>
#include <stdint.h>
-#include "atcacert_def.h"
+#include "atcacert.h"
- - - - - - - - - + + + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS atcacert_verify_cert_hw (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, const uint8_t ca_public_key[64])
 Verify a certificate against its certificate authority's public key using the host's ATECC device for crypto functions.
 
ATCA_STATUS atcacert_gen_challenge_hw (uint8_t challenge[32])
 Generate a random challenge to be sent to the client using the RNG on the host's ATECC device.
 
ATCA_STATUS atcacert_verify_response_hw (const uint8_t device_public_key[64], const uint8_t challenge[32], const uint8_t response[64])
 Verify a client's response to a challenge using the host's ATECC device for crypto functions.
 
ATCA_STATUS atcacert_der_enc_length (size_t length, uint8_t *der_length, size_t *der_length_size)
 Encode a length in DER format.
 
ATCA_STATUS atcacert_der_dec_length (const uint8_t *der_length, size_t *der_length_size, size_t *length)
 Decode a DER format length.
 
+ATCA_STATUS atcacert_der_adjust_length (uint8_t *der_length, size_t *der_length_size, int delta_length, size_t *new_length)
 
ATCA_STATUS atcacert_der_enc_integer (const uint8_t *int_data, size_t int_data_size, uint8_t is_unsigned, uint8_t *der_int, size_t *der_int_size)
 Encode an ASN.1 integer in DER format, including tag and length fields.
 
ATCA_STATUS atcacert_der_dec_integer (const uint8_t *der_int, size_t *der_int_size, uint8_t *int_data, size_t *int_data_size)
 Decode an ASN.1 DER encoded integer.
 
ATCA_STATUS atcacert_der_enc_ecdsa_sig_value (const uint8_t raw_sig[64], uint8_t *der_sig, size_t *der_sig_size)
 Formats a raw ECDSA P256 signature in the DER encoding found in X.509 certificates.
 
ATCA_STATUS atcacert_der_dec_ecdsa_sig_value (const uint8_t *der_sig, size_t *der_sig_size, uint8_t raw_sig[64])
 Parses an ECDSA P256 signature in the DER encoding as found in X.509 certificates.
 

Detailed Description

-

host side methods using CryptoAuth hardware

+

function declarations required to work with DER encoded data related to X.509 certificates.

diff --git a/a00305.js b/a00305.js index 28315e27c..bd4f59c2b 100644 --- a/a00305.js +++ b/a00305.js @@ -1,6 +1,9 @@ var a00305 = [ - [ "atcacert_gen_challenge_hw", "a01443.html#ga6692847d9c41eb73e469df029697a7b9", null ], - [ "atcacert_verify_cert_hw", "a01443.html#ga42939c26927fb65340ff1ebb2914a976", null ], - [ "atcacert_verify_response_hw", "a01443.html#ga1441695a23776f3b38722e51fd3c36e3", null ] + [ "atcacert_der_dec_ecdsa_sig_value", "a01470.html#gab22e2c8bf627f700be0e10e331bfdb1f", null ], + [ "atcacert_der_dec_integer", "a01470.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb", null ], + [ "atcacert_der_dec_length", "a01470.html#ga9d4810aa2fd1db14a8f91204387fd972", null ], + [ "atcacert_der_enc_ecdsa_sig_value", "a01470.html#gacee7e7eb74c022b2ea70c7a549d5f876", null ], + [ "atcacert_der_enc_integer", "a01470.html#gadc86044101ad9a87556d49ab8bf892af", null ], + [ "atcacert_der_enc_length", "a01470.html#ga5866e20dc2c7f9d788924155eac4fece", null ] ]; \ No newline at end of file diff --git a/a00308.html b/a00308.html index 6d494ff0d..fcd789b6f 100644 --- a/a00308.html +++ b/a00308.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_host_sw.c File Reference +CryptoAuthLib: atcacert_host_hw.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
atcacert_host_sw.c File Reference
+
atcacert_host_hw.c File Reference
-

host side methods using software implementations +

host side methods using CryptoAuth hardware More...

-
#include "atcacert_host_sw.h"
-#include "crypto/atca_crypto_sw.h"
-#include "cal_internal.h"
+

Detailed Description

-

host side methods using software implementations

+

host side methods using CryptoAuth hardware

diff --git a/a00311.html b/a00311.html index 8070dcc98..4be9ca565 100644 --- a/a00311.html +++ b/a00311.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_host_sw.h File Reference +CryptoAuthLib: atcacert_host_hw.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,37 +99,37 @@
-
atcacert_host_sw.h File Reference
+
atcacert_host_hw.h File Reference
-

Host side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library. +

host side methods using CryptoAuth hardware More...

#include <stddef.h>
#include <stdint.h>
-#include "atcacert_def.h"
+#include "atcacert_def.h"
- - - - - - - - - + + + + + + + + +

Functions

ATCA_STATUS atcacert_verify_cert_sw (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, const uint8_t ca_public_key[64])
 Verify a certificate against its certificate authority's public key using software crypto functions.The function is currently not implemented.
 
ATCA_STATUS atcacert_gen_challenge_sw (uint8_t challenge[32])
 Generate a random challenge to be sent to the client using a software PRNG.The function is currently not implemented.
 
ATCA_STATUS atcacert_verify_response_sw (const uint8_t device_public_key[64], const uint8_t challenge[32], const uint8_t response[64])
 Verify a client's response to a challenge using software crypto functions.The function is currently not implemented.
 
ATCA_STATUS atcacert_verify_cert_hw (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, const uint8_t ca_public_key[64])
 Verify a certificate against its certificate authority's public key using the host's ATECC device for crypto functions.
 
ATCA_STATUS atcacert_gen_challenge_hw (uint8_t challenge[32])
 Generate a random challenge to be sent to the client using the RNG on the host's ATECC device.
 
ATCA_STATUS atcacert_verify_response_hw (const uint8_t device_public_key[64], const uint8_t challenge[32], const uint8_t response[64])
 Verify a client's response to a challenge using the host's ATECC device for crypto functions.
 

Detailed Description

-

Host side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library.

+

host side methods using CryptoAuth hardware

diff --git a/a00311.js b/a00311.js index 0c889ea32..4354ac20e 100644 --- a/a00311.js +++ b/a00311.js @@ -1,6 +1,6 @@ var a00311 = [ - [ "atcacert_gen_challenge_sw", "a01443.html#ga883a0c84474150e6b123dfab15a8c929", null ], - [ "atcacert_verify_cert_sw", "a01443.html#ga5bad45c1fda32b7a57275af23ab0f626", null ], - [ "atcacert_verify_response_sw", "a01443.html#gab67e7a4c5899ef5402ff44f3f91d20b5", null ] + [ "atcacert_gen_challenge_hw", "a01470.html#ga6692847d9c41eb73e469df029697a7b9", null ], + [ "atcacert_verify_cert_hw", "a01470.html#ga42939c26927fb65340ff1ebb2914a976", null ], + [ "atcacert_verify_response_hw", "a01470.html#ga1441695a23776f3b38722e51fd3c36e3", null ] ]; \ No newline at end of file diff --git a/a00314.html b/a00314.html index 2ab240af3..9ad0e9d30 100644 --- a/a00314.html +++ b/a00314.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_pem.c File Reference +CryptoAuthLib: atcacert_host_sw.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,24 @@
-
atcacert_pem.c File Reference
+
atcacert_host_sw.c File Reference
-

Functions required to work with PEM encoded data related to X.509 certificates. +

host side methods using software implementations More...

-
#include <string.h>
-#include "atcacert.h"
-#include "atcacert_pem.h"
-#include "atca_helpers.h"
+
#include "atcacert_host_sw.h"
+#include "crypto/atca_crypto_sw.h"
+#include "cal_internal.h"

Detailed Description

-

Functions required to work with PEM encoded data related to X.509 certificates.

+

host side methods using software implementations

diff --git a/a00317.html b/a00317.html index 5bef76e7f..bd8fdec4f 100644 --- a/a00317.html +++ b/a00317.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atcacert_pem.h File Reference +CryptoAuthLib: atcacert_host_sw.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,402 +98,38 @@
-
atcacert_pem.h File Reference
+
atcacert_host_sw.h File Reference
-

Functions for converting between DER and PEM formats. +

Host side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library. More...

-
#include <stdint.h>
+
#include <stddef.h>
+#include <stdint.h>
+#include "atcacert_def.h"
- - - - - - - - - -

-Macros

-#define PEM_CERT_BEGIN   "-----BEGIN CERTIFICATE-----"
 
-#define PEM_CERT_END   "-----END CERTIFICATE-----"
 
-#define PEM_CSR_BEGIN   "-----BEGIN CERTIFICATE REQUEST-----"
 
-#define PEM_CSR_END   "-----END CERTIFICATE REQUEST-----"
 
- - - - - - - - - - - - - - - - - - + + + + + + + + +

Functions

ATCA_STATUS atcacert_encode_pem (const uint8_t *der, size_t der_size, char *pem, size_t *pem_size, const char *header, const char *footer)
 Encode a DER data in PEM format.
 
ATCA_STATUS atcacert_decode_pem (const char *pem, size_t pem_size, uint8_t *der, size_t *der_size, const char *header, const char *footer)
 Decode PEM data into DER format.
 
ATCA_STATUS atcacert_encode_pem_cert (const uint8_t *der_cert, size_t der_cert_size, char *pem_cert, size_t *pem_cert_size)
 Encode a DER certificate in PEM format.
 
ATCA_STATUS atcacert_decode_pem_cert (const char *pem_cert, size_t pem_cert_size, uint8_t *der_cert, size_t *der_cert_size)
 Decode a PEM certificate into DER format.
 
ATCA_STATUS atcacert_encode_pem_csr (const uint8_t *der_csr, size_t der_csr_size, char *pem_csr, size_t *pem_csr_size)
 Encode a DER CSR in PEM format.
 
ATCA_STATUS atcacert_decode_pem_csr (const char *pem_csr, size_t pem_csr_size, uint8_t *der_csr, size_t *der_csr_size)
 Extract the CSR certificate bytes from a PEM encoded CSR certificate.
 
ATCA_STATUS atcacert_verify_cert_sw (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, const uint8_t ca_public_key[64])
 Verify a certificate against its certificate authority's public key using software crypto functions.The function is currently not implemented.
 
ATCA_STATUS atcacert_gen_challenge_sw (uint8_t challenge[32])
 Generate a random challenge to be sent to the client using a software PRNG.The function is currently not implemented.
 
ATCA_STATUS atcacert_verify_response_sw (const uint8_t device_public_key[64], const uint8_t challenge[32], const uint8_t response[64])
 Verify a client's response to a challenge using software crypto functions.The function is currently not implemented.
 

Detailed Description

-

Functions for converting between DER and PEM formats.

+

Host side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library.

-

Function Documentation

- -

◆ atcacert_decode_pem()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_decode_pem (const char * pem,
size_t pem_size,
uint8_t * der,
size_t * der_size,
const char * header,
const char * footer 
)
-
- -

Decode PEM data into DER format.

-
Parameters
- - - - - - - -
[in]pemPEM data to decode to DER.
[in]pem_sizePEM data size in bytes.
[out]derDER data is returned here.
[in,out]der_sizeAs input, the size of the der buffer. As output, the size of the DER data.
[in]headerHeader to find the beginning of the PEM data.
[in]footerFooter to find the end of the PEM data.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_decode_pem_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_decode_pem_cert (const char * pem_cert,
size_t pem_cert_size,
uint8_t * der_cert,
size_t * der_cert_size 
)
-
- -

Decode a PEM certificate into DER format.

-
Parameters
- - - - - -
[in]pem_certPEM certificate to decode to DER.
[in]pem_cert_sizePEM certificate size in bytes.
[out]der_certDER certificate is returned here.
[in,out]der_cert_sizeAs input, the size of the der_cert buffer. As output, the size of the DER certificate.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_decode_pem_csr()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_decode_pem_csr (const char * pem_csr,
size_t pem_csr_size,
uint8_t * der_csr,
size_t * der_csr_size 
)
-
- -

Extract the CSR certificate bytes from a PEM encoded CSR certificate.

-
Parameters
- - - - - -
[in]pem_csrPEM CSR to decode to DER.
[in]pem_csr_sizePEM CSR size in bytes.
[out]der_csrDER CSR is returned here.
[in,out]der_csr_sizeAs input, the size of the der_csr buffer. As output, the size of the DER CSR.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_encode_pem()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_encode_pem (const uint8_t * der,
size_t der_size,
char * pem,
size_t * pem_size,
const char * header,
const char * footer 
)
-
- -

Encode a DER data in PEM format.

-
Parameters
- - - - - - - -
[in]derDER data to be encoded as PEM.
[out]der_sizeDER data size in bytes.
[out]pemPEM encoded data is returned here.
[in,out]pem_sizeAs input, the size of the pem buffer. As output, the size of the PEM data.
[in]headerHeader to place at the beginning of the PEM data.
[in]footerFooter to place at the end of the PEM data.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_encode_pem_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_encode_pem_cert (const uint8_t * der_cert,
size_t der_cert_size,
char * pem_cert,
size_t * pem_cert_size 
)
-
- -

Encode a DER certificate in PEM format.

-
Parameters
- - - - - -
[in]der_certDER certificate to be encoded as PEM.
[out]der_cert_sizeDER certificate size in bytes.
[out]pem_certPEM encoded certificate is returned here.
[in,out]pem_cert_sizeAs input, the size of the pem_cert buffer. As output, the size of the PEM certificate.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_encode_pem_csr()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_encode_pem_csr (const uint8_t * der_csr,
size_t der_csr_size,
char * pem_csr,
size_t * pem_csr_size 
)
-
- -

Encode a DER CSR in PEM format.

-
Parameters
- - - - - -
[in]der_csrDER CSR to be encoded as PEM.
[out]der_csr_sizeDER CSR size in bytes.
[out]pem_csrPEM encoded CSR is returned here.
[in,out]pem_csr_sizeAs input, the size of the pem_csr buffer. As output, the size of the PEM CSR.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
+
diff --git a/a00317.js b/a00317.js index da0690fd2..d124cf6cf 100644 --- a/a00317.js +++ b/a00317.js @@ -1,9 +1,6 @@ var a00317 = [ - [ "atcacert_decode_pem", "a00317.html#a32d4e4f417e88b56b9adc5b7c521d545", null ], - [ "atcacert_decode_pem_cert", "a00317.html#a5ee7c8e3893e67ae0a622bddc443bcbd", null ], - [ "atcacert_decode_pem_csr", "a00317.html#adfccc0bc91b144dffab3aba96126800f", null ], - [ "atcacert_encode_pem", "a00317.html#a65ca7cd1f2358ad40ae4c8c13f6d817c", null ], - [ "atcacert_encode_pem_cert", "a00317.html#a206c4857a73ccfc7898131b61d43ba67", null ], - [ "atcacert_encode_pem_csr", "a00317.html#ad3b6773201632141bbc95ca6d43271f9", null ] + [ "atcacert_gen_challenge_sw", "a01470.html#ga883a0c84474150e6b123dfab15a8c929", null ], + [ "atcacert_verify_cert_sw", "a01470.html#ga5bad45c1fda32b7a57275af23ab0f626", null ], + [ "atcacert_verify_response_sw", "a01470.html#gab67e7a4c5899ef5402ff44f3f91d20b5", null ] ]; \ No newline at end of file diff --git a/a00320.html b/a00320.html index 3b75a4165..4ccf2577c 100644 --- a/a00320.html +++ b/a00320.html @@ -5,7 +5,7 @@ -CryptoAuthLib: cal_buffer.c File Reference +CryptoAuthLib: atcacert_pem.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,281 +97,25 @@
-
cal_buffer.c File Reference
+
atcacert_pem.c File Reference
-

Cryptoauthlib buffer management system. +

Functions required to work with PEM encoded data related to X.509 certificates. More...

#include <string.h>
-#include "cal_buffer.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS cal_buf_read_bytes (cal_buffer *cab, size_t offset, void *dest, size_t length)
 Read bytes from a cal_buffer or cal_buffer linked list.
 
-ATCA_STATUS cal_buf_read_byte (cal_buffer *cab, size_t offset, uint8_t *value)
 
-ATCA_STATUS cal_buf_write_byte (cal_buffer *cab, size_t offset, uint8_t value)
 
ATCA_STATUS cal_buf_write_bytes (cal_buffer *cab, size_t offset, const void *source, size_t length)
 Write bytes into a single cal_buffer structure or cal_buffer linked list.
 
ATCA_STATUS cal_buf_read_number (cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian)
 Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.
 
ATCA_STATUS cal_buf_write_number (cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian)
 Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.
 
-ATCA_STATUS cal_buf_set_used (cal_buffer *buf, size_t used)
 
-size_t cal_buf_get_used (cal_buffer *buf)
 
-ATCA_STATUS cal_buf_copy (cal_buffer *dst, size_t dst_offset, cal_buffer *src, size_t src_offset, size_t length)
 
-ATCA_STATUS cal_buf_set (cal_buffer *dst, size_t dst_offset, uint8_t value, size_t length)
 
-cal_buffer cal_buf_init_const_ptr (size_t len, const uint8_t *message)
 Initialize a cal buffer with constant pointer Returns the initialized cal buffer.
 
-

Detailed Description

-

Cryptoauthlib buffer management system.

- -

Function Documentation

- -

◆ cal_buf_read_bytes()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS cal_buf_read_bytes (cal_buffercab,
size_t offset,
void * dest,
size_t length 
)
-
- -

Read bytes from a cal_buffer or cal_buffer linked list.

-
Parameters
- - - - - -
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination buffer
[in]lengthLength of the read - assumes dest has sufficent memory to accept the bytes being read
-
-
- -
-
- -

◆ cal_buf_read_number()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS cal_buf_read_number (cal_buffercab,
size_t offset,
void * dest,
size_t num_size,
bool buf_big_endian 
)
-
- -

Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.

-
Parameters
- - - - - - -
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination number
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
-
-
- -
-
- -

◆ cal_buf_write_bytes()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS cal_buf_write_bytes (cal_buffercab,
size_t offset,
const void * source,
size_t length 
)
-
- -

Write bytes into a single cal_buffer structure or cal_buffer linked list.

-
Parameters
- - - - - -
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetTarget offset to start the write at
[in]sourcePointer to a source buffer
[in]lengthLength of the write - assumes source is sufficently large to support this operation
-
-
- -
-
- -

◆ cal_buf_write_number()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS cal_buf_write_number (cal_buffercab,
size_t offset,
const void * source,
size_t num_size,
bool buf_big_endian 
)
-
- -

Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.

-
Parameters
- - - - - - -
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the write at
[in]sourcePointer to a number to be written
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
-
-
- -
-
-
+#include "atcacert.h"
+#include "atcacert_pem.h"
+#include "atca_helpers.h"
+

Detailed Description

+

Functions required to work with PEM encoded data related to X.509 certificates.

+ +
diff --git a/a00320.js b/a00320.js deleted file mode 100644 index cdf01f023..000000000 --- a/a00320.js +++ /dev/null @@ -1,8 +0,0 @@ -var a00320 = -[ - [ "cal_buf_init_const_ptr", "a00320.html#a923fdd71f9a98e47040d26acb74a0202", null ], - [ "cal_buf_read_bytes", "a00320.html#acc0d724d5fc815cc98dea12aa5bb15d0", null ], - [ "cal_buf_read_number", "a00320.html#a546b07423022359a8b27fcbeadfdd93d", null ], - [ "cal_buf_write_bytes", "a00320.html#a0890ecff5c568d7ee2d631bd3877fcc6", null ], - [ "cal_buf_write_number", "a00320.html#af8a1f17b5af51c3539246d03282206a2", null ] -]; \ No newline at end of file diff --git a/a00323.html b/a00323.html index ead953369..db414e83d 100644 --- a/a00323.html +++ b/a00323.html @@ -5,7 +5,7 @@ -CryptoAuthLib: cal_buffer.h File Reference +CryptoAuthLib: atcacert_pem.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,97 +98,97 @@
-
cal_buffer.h File Reference
+Macros | +Functions
+
atcacert_pem.h File Reference
-

Cryptoauthlib buffer management system. +

Functions for converting between DER and PEM formats. More...

#include <stdint.h>
-#include <stdlib.h>
-#include <stdbool.h>
-#include "atca_config_check.h"
-#include "atca_status.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + +

-Data Structures

struct  cal_buffer_s
 
-#define CAL_BUF_INIT(s, b)   { (size_t)(s), (uint8_t*)(b) }
 
-typedef struct cal_buffer_s cal_buffer
 
-ATCA_STATUS cal_buf_read_byte (cal_buffer *cab, size_t offset, uint8_t *value)
 
-ATCA_STATUS cal_buf_write_byte (cal_buffer *cab, size_t offset, uint8_t value)
 
ATCA_STATUS cal_buf_read_bytes (cal_buffer *cab, size_t offset, void *dest, size_t length)
 Read bytes from a cal_buffer or cal_buffer linked list.
 
ATCA_STATUS cal_buf_write_bytes (cal_buffer *cab, size_t offset, const void *source, size_t length)
 Write bytes into a single cal_buffer structure or cal_buffer linked list.
 
ATCA_STATUS cal_buf_read_number (cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian)
 Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.
 
ATCA_STATUS cal_buf_write_number (cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian)
 Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.
 
-ATCA_STATUS cal_buf_copy (cal_buffer *dst, size_t dst_offset, cal_buffer *src, size_t src_offset, size_t length)
 
-ATCA_STATUS cal_buf_set (cal_buffer *dst, size_t dst_offset, uint8_t value, size_t length)
 
-ATCA_STATUS cal_buf_set_used (cal_buffer *buf, size_t used)
 
-size_t cal_buf_get_used (cal_buffer *buf)
 
-cal_buffer cal_buf_init_const_ptr (size_t len, const uint8_t *message)
 Initialize a cal buffer with constant pointer Returns the initialized cal buffer.
 

+Macros

+#define PEM_CERT_BEGIN   "-----BEGIN CERTIFICATE-----"
 
+#define PEM_CERT_END   "-----END CERTIFICATE-----"
 
+#define PEM_CSR_BEGIN   "-----BEGIN CERTIFICATE REQUEST-----"
 
+#define PEM_CSR_END   "-----END CERTIFICATE REQUEST-----"
 
+ + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS atcacert_encode_pem (const uint8_t *der, size_t der_size, char *pem, size_t *pem_size, const char *header, const char *footer)
 Encode a DER data in PEM format.
 
ATCA_STATUS atcacert_decode_pem (const char *pem, size_t pem_size, uint8_t *der, size_t *der_size, const char *header, const char *footer)
 Decode PEM data into DER format.
 
ATCA_STATUS atcacert_encode_pem_cert (const uint8_t *der_cert, size_t der_cert_size, char *pem_cert, size_t *pem_cert_size)
 Encode a DER certificate in PEM format.
 
ATCA_STATUS atcacert_decode_pem_cert (const char *pem_cert, size_t pem_cert_size, uint8_t *der_cert, size_t *der_cert_size)
 Decode a PEM certificate into DER format.
 
ATCA_STATUS atcacert_encode_pem_csr (const uint8_t *der_csr, size_t der_csr_size, char *pem_csr, size_t *pem_csr_size)
 Encode a DER CSR in PEM format.
 
ATCA_STATUS atcacert_decode_pem_csr (const char *pem_csr, size_t pem_csr_size, uint8_t *der_csr, size_t *der_csr_size)
 Extract the CSR certificate bytes from a PEM encoded CSR certificate.
 

Detailed Description

-

Cryptoauthlib buffer management system.

- +

Functions for converting between DER and PEM formats.

+

Function Documentation

- -

◆ cal_buf_read_bytes()

+ +

◆ atcacert_decode_pem()

- + - - + + - + - - + + - - + + + + + + + + + + + + + + @@ -198,54 +198,103 @@

-

Read bytes from a cal_buffer or cal_buffer linked list.

+

Decode PEM data into DER format.

Parameters

ATCA_STATUS cal_buf_read_bytes ATCA_STATUS atcacert_decode_pem (cal_buffercab, const char * pem,
size_t offset, pem_size,
void * dest, uint8_t * der,
size_t length size_t * der_size,
const char * header,
const char * footer 
- - - - + + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination buffer
[in]lengthLength of the read - assumes dest has sufficent memory to accept the bytes being read
[in]pemPEM data to decode to DER.
[in]pem_sizePEM data size in bytes.
[out]derDER data is returned here.
[in,out]der_sizeAs input, the size of the der buffer. As output, the size of the DER data.
[in]headerHeader to find the beginning of the PEM data.
[in]footerFooter to find the end of the PEM data.
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -

◆ cal_buf_read_number()

+ +

◆ atcacert_decode_pem_cert()

- + - - + + - + + + + + + + - - + + + + + + + + +
ATCA_STATUS cal_buf_read_number ATCA_STATUS atcacert_decode_pem_cert (cal_buffercab, const char * pem_cert,
size_t offset, pem_cert_size,
uint8_t * der_cert,
void * dest, size_t * der_cert_size 
)
+
+ +

Decode a PEM certificate into DER format.

+
Parameters
+ + + + + +
[in]pem_certPEM certificate to decode to DER.
[in]pem_cert_sizePEM certificate size in bytes.
[out]der_certDER certificate is returned here.
[in,out]der_cert_sizeAs input, the size of the der_cert buffer. As output, the size of the DER certificate.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcacert_decode_pem_csr()

+ +
+
+ + + + + + - + + + + + + + - - + + @@ -255,49 +304,61 @@

-

Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.

+

Extract the CSR certificate bytes from a PEM encoded CSR certificate.

Parameters

ATCA_STATUS atcacert_decode_pem_csr (const char * pem_csr,
size_t num_size, pem_csr_size,
uint8_t * der_csr,
bool buf_big_endian size_t * der_csr_size 
- - - - - + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination number
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
[in]pem_csrPEM CSR to decode to DER.
[in]pem_csr_sizePEM CSR size in bytes.
[out]der_csrDER CSR is returned here.
[in,out]der_csr_sizeAs input, the size of the der_csr buffer. As output, the size of the DER CSR.
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -

◆ cal_buf_write_bytes()

+ +

◆ atcacert_encode_pem()

- + - - + + - + - - + + - - + + + + + + + + + + + + + + @@ -307,54 +368,103 @@

-

Write bytes into a single cal_buffer structure or cal_buffer linked list.

+

Encode a DER data in PEM format.

Parameters

ATCA_STATUS cal_buf_write_bytes ATCA_STATUS atcacert_encode_pem (cal_buffercab, const uint8_t * der,
size_t offset, der_size,
const void * source, char * pem,
size_t length size_t * pem_size,
const char * header,
const char * footer 
- - - - + + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetTarget offset to start the write at
[in]sourcePointer to a source buffer
[in]lengthLength of the write - assumes source is sufficently large to support this operation
[in]derDER data to be encoded as PEM.
[out]der_sizeDER data size in bytes.
[out]pemPEM encoded data is returned here.
[in,out]pem_sizeAs input, the size of the pem buffer. As output, the size of the PEM data.
[in]headerHeader to place at the beginning of the PEM data.
[in]footerFooter to place at the end of the PEM data.
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -

◆ cal_buf_write_number()

+ +

◆ atcacert_encode_pem_cert()

- + - - + + - + + + + + + + - - + + + + + + + + +
ATCA_STATUS cal_buf_write_number ATCA_STATUS atcacert_encode_pem_cert (cal_buffercab, const uint8_t * der_cert,
size_t offset, der_cert_size,
char * pem_cert,
const void * source, size_t * pem_cert_size 
)
+
+ +

Encode a DER certificate in PEM format.

+
Parameters
+ + + + + +
[in]der_certDER certificate to be encoded as PEM.
[out]der_cert_sizeDER certificate size in bytes.
[out]pem_certPEM encoded certificate is returned here.
[in,out]pem_cert_sizeAs input, the size of the pem_cert buffer. As output, the size of the PEM certificate.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcacert_encode_pem_csr()

+ +
+
+ + + + + + - + + + + + + + - - + + @@ -364,17 +474,17 @@

-

Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.

+

Encode a DER CSR in PEM format.

Parameters

ATCA_STATUS atcacert_encode_pem_csr (const uint8_t * der_csr,
size_t num_size, der_csr_size,
char * pem_csr,
bool buf_big_endian size_t * pem_csr_size 
- - - - - + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the write at
[in]sourcePointer to a number to be written
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
[in]der_csrDER CSR to be encoded as PEM.
[out]der_csr_sizeDER CSR size in bytes.
[out]pem_csrPEM encoded CSR is returned here.
[in,out]pem_csr_sizeAs input, the size of the pem_csr buffer. As output, the size of the PEM CSR.
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
@@ -383,7 +493,7 @@

diff --git a/a00323.js b/a00323.js index c71aae383..ab95e80fe 100644 --- a/a00323.js +++ b/a00323.js @@ -1,9 +1,9 @@ var a00323 = [ - [ "cal_buffer_s", "a01612.html", "a01612" ], - [ "cal_buf_init_const_ptr", "a00323.html#a923fdd71f9a98e47040d26acb74a0202", null ], - [ "cal_buf_read_bytes", "a00323.html#acc0d724d5fc815cc98dea12aa5bb15d0", null ], - [ "cal_buf_read_number", "a00323.html#a546b07423022359a8b27fcbeadfdd93d", null ], - [ "cal_buf_write_bytes", "a00323.html#a0890ecff5c568d7ee2d631bd3877fcc6", null ], - [ "cal_buf_write_number", "a00323.html#af8a1f17b5af51c3539246d03282206a2", null ] + [ "atcacert_decode_pem", "a00323.html#a32d4e4f417e88b56b9adc5b7c521d545", null ], + [ "atcacert_decode_pem_cert", "a00323.html#a5ee7c8e3893e67ae0a622bddc443bcbd", null ], + [ "atcacert_decode_pem_csr", "a00323.html#adfccc0bc91b144dffab3aba96126800f", null ], + [ "atcacert_encode_pem", "a00323.html#a65ca7cd1f2358ad40ae4c8c13f6d817c", null ], + [ "atcacert_encode_pem_cert", "a00323.html#a206c4857a73ccfc7898131b61d43ba67", null ], + [ "atcacert_encode_pem_csr", "a00323.html#ad3b6773201632141bbc95ca6d43271f9", null ] ]; \ No newline at end of file diff --git a/a00326.html b/a00326.html index 90cb7058f..8262a7dc3 100644 --- a/a00326.html +++ b/a00326.html @@ -5,7 +5,7 @@ -CryptoAuthLib: cal_internal.h File Reference +CryptoAuthLib: cal_buffer.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,281 @@
-
cal_internal.h File Reference
+
cal_buffer.c File Reference
-

Internal CryptoAuthLib Interfaces. +

Cryptoauthlib buffer management system. More...

-
#include "atca_config_check.h"
-#include "crypto/atca_crypto_sw.h"
-#include "mbedtls/atca_mbedtls_wrap.h"
-

Detailed Description

-

Internal CryptoAuthLib Interfaces.

- -
+
#include <string.h>
+#include "cal_buffer.h"
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS cal_buf_read_bytes (cal_buffer *cab, size_t offset, void *dest, size_t length)
 Read bytes from a cal_buffer or cal_buffer linked list.
 
+ATCA_STATUS cal_buf_read_byte (cal_buffer *cab, size_t offset, uint8_t *value)
 
+ATCA_STATUS cal_buf_write_byte (cal_buffer *cab, size_t offset, uint8_t value)
 
ATCA_STATUS cal_buf_write_bytes (cal_buffer *cab, size_t offset, const void *source, size_t length)
 Write bytes into a single cal_buffer structure or cal_buffer linked list.
 
ATCA_STATUS cal_buf_read_number (cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian)
 Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.
 
ATCA_STATUS cal_buf_write_number (cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian)
 Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.
 
+ATCA_STATUS cal_buf_set_used (cal_buffer *buf, size_t used)
 
+size_t cal_buf_get_used (cal_buffer *buf)
 
+ATCA_STATUS cal_buf_copy (cal_buffer *dst, size_t dst_offset, cal_buffer *src, size_t src_offset, size_t length)
 
+ATCA_STATUS cal_buf_set (cal_buffer *dst, size_t dst_offset, uint8_t value, size_t length)
 
+cal_buffer cal_buf_init_const_ptr (size_t len, const uint8_t *message)
 Initialize a cal buffer with constant pointer Returns the initialized cal buffer.
 
+

Detailed Description

+

Cryptoauthlib buffer management system.

+ +

Function Documentation

+ +

◆ cal_buf_read_bytes()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_read_bytes (cal_buffercab,
size_t offset,
void * dest,
size_t length 
)
+
+ +

Read bytes from a cal_buffer or cal_buffer linked list.

+
Parameters
+ + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination buffer
[in]lengthLength of the read - assumes dest has sufficent memory to accept the bytes being read
+
+
+ +
+
+ +

◆ cal_buf_read_number()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_read_number (cal_buffercab,
size_t offset,
void * dest,
size_t num_size,
bool buf_big_endian 
)
+
+ +

Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.

+
Parameters
+ + + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination number
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
+
+
+ +
+
+ +

◆ cal_buf_write_bytes()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_write_bytes (cal_buffercab,
size_t offset,
const void * source,
size_t length 
)
+
+ +

Write bytes into a single cal_buffer structure or cal_buffer linked list.

+
Parameters
+ + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetTarget offset to start the write at
[in]sourcePointer to a source buffer
[in]lengthLength of the write - assumes source is sufficently large to support this operation
+
+
+ +
+
+ +

◆ cal_buf_write_number()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_write_number (cal_buffercab,
size_t offset,
const void * source,
size_t num_size,
bool buf_big_endian 
)
+
+ +

Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.

+
Parameters
+ + + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the write at
[in]sourcePointer to a number to be written
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
+
+
+ +
+
+
diff --git a/a00329.html b/a00329.html index 82b339931..c6f21f1d5 100644 --- a/a00329.html +++ b/a00329.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_aes.c File Reference +CryptoAuthLib: cal_buffer.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,293 @@
-
calib_aes.c File Reference
+ +
cal_buffer.h File Reference
-

CryptoAuthLib Basic API methods for AES command. +

Cryptoauthlib buffer management system. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for AES command.

-

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. Also can perform GFM (Galois Field Multiply) calculation in support of AES-GCM.

-
Note
List of devices that support this command - ATECC608A/B. Refer to device edatasheet for full details.
- -
+
#include <stdint.h>
+#include <stdlib.h>
+#include <stdbool.h>
+#include "atca_config_check.h"
+#include "atca_status.h"
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Data Structures

struct  cal_buffer_s
 
+#define CAL_BUF_INIT(s, b)   { (size_t)(s), (uint8_t*)(b) }
 
+typedef struct cal_buffer_s cal_buffer
 
+ATCA_STATUS cal_buf_read_byte (cal_buffer *cab, size_t offset, uint8_t *value)
 
+ATCA_STATUS cal_buf_write_byte (cal_buffer *cab, size_t offset, uint8_t value)
 
ATCA_STATUS cal_buf_read_bytes (cal_buffer *cab, size_t offset, void *dest, size_t length)
 Read bytes from a cal_buffer or cal_buffer linked list.
 
ATCA_STATUS cal_buf_write_bytes (cal_buffer *cab, size_t offset, const void *source, size_t length)
 Write bytes into a single cal_buffer structure or cal_buffer linked list.
 
ATCA_STATUS cal_buf_read_number (cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian)
 Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.
 
ATCA_STATUS cal_buf_write_number (cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian)
 Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.
 
+ATCA_STATUS cal_buf_copy (cal_buffer *dst, size_t dst_offset, cal_buffer *src, size_t src_offset, size_t length)
 
+ATCA_STATUS cal_buf_set (cal_buffer *dst, size_t dst_offset, uint8_t value, size_t length)
 
+ATCA_STATUS cal_buf_set_used (cal_buffer *buf, size_t used)
 
+size_t cal_buf_get_used (cal_buffer *buf)
 
+cal_buffer cal_buf_init_const_ptr (size_t len, const uint8_t *message)
 Initialize a cal buffer with constant pointer Returns the initialized cal buffer.
 
+

Detailed Description

+

Cryptoauthlib buffer management system.

+ +

Function Documentation

+ +

◆ cal_buf_read_bytes()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_read_bytes (cal_buffercab,
size_t offset,
void * dest,
size_t length 
)
+
+ +

Read bytes from a cal_buffer or cal_buffer linked list.

+
Parameters
+ + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination buffer
[in]lengthLength of the read - assumes dest has sufficent memory to accept the bytes being read
+
+
+ +
+
+ +

◆ cal_buf_read_number()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_read_number (cal_buffercab,
size_t offset,
void * dest,
size_t num_size,
bool buf_big_endian 
)
+
+ +

Read a number from a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the representation in the buffer.

+
Parameters
+ + + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the read from
[in]destPointer to a destination number
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
+
+
+ +
+
+ +

◆ cal_buf_write_bytes()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_write_bytes (cal_buffercab,
size_t offset,
const void * source,
size_t length 
)
+
+ +

Write bytes into a single cal_buffer structure or cal_buffer linked list.

+
Parameters
+ + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetTarget offset to start the write at
[in]sourcePointer to a source buffer
[in]lengthLength of the write - assumes source is sufficently large to support this operation
+
+
+ +
+
+ +

◆ cal_buf_write_number()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS cal_buf_write_number (cal_buffercab,
size_t offset,
const void * source,
size_t num_size,
bool buf_big_endian 
)
+
+ +

Write a number into a cal_buffer or cal_buffer linked list This function does not reinterpet the number and signedness is only preserved if the destination is the same size as the source.

+
Parameters
+ + + + + + +
[in]cabPointer to a buffer structure or the head of a buffer structure linked list
[in]offsetOffset to start the write at
[in]sourcePointer to a number to be written
[in]num_sizeSize of the number in bytes
[in]buf_big_endianSpecifies the expected endianness representation within the buffer
+
+
+ +
+
+
diff --git a/a00332.html b/a00332.html index 74979d66d..135d56029 100644 --- a/a00332.html +++ b/a00332.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_aes_gcm.c File Reference +CryptoAuthLib: cal_internal.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_aes_gcm.c File Reference
+
cal_internal.h File Reference
-

CryptoAuthLib Basic API methods for AES GCM mode. +

Internal CryptoAuthLib Interfaces. More...

-
#include "cryptoauthlib.h"
+
#include "atca_config_check.h"
+#include "crypto/atca_crypto_sw.h"
+#include "mbedtls/atca_mbedtls_wrap.h"

Detailed Description

-

CryptoAuthLib Basic API methods for AES GCM mode.

-

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. Also can perform GFM (Galois Field Multiply) calculation in support of AES-GCM.

-
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
+

Internal CryptoAuthLib Interfaces.

diff --git a/a00335.html b/a00335.html index b50afcd44..d52c51c6d 100644 --- a/a00335.html +++ b/a00335.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_aes_gcm.h File Reference +CryptoAuthLib: calib_aes.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,22 +97,24 @@
-
calib_aes_gcm.h File Reference
+
calib_aes.c File Reference
-

Unity tests for the cryptoauthlib AES GCM functions. +

CryptoAuthLib Basic API methods for AES command. More...

-
#include "calib_config_check.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

Unity tests for the cryptoauthlib AES GCM functions.

+

CryptoAuthLib Basic API methods for AES command.

+

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. Also can perform GFM (Galois Field Multiply) calculation in support of AES-GCM.

+
Note
List of devices that support this command - ATECC608A/B. Refer to device edatasheet for full details.
diff --git a/a00338.html b/a00338.html index ca44208d1..cc8970b21 100644 --- a/a00338.html +++ b/a00338.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_basic.c File Reference +CryptoAuthLib: calib_aes_gcm.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,52 +97,24 @@
- -
calib_basic.c File Reference
+
calib_aes_gcm.c File Reference
-

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods. +

CryptoAuthLib Basic API methods for AES GCM mode. More...

-
#include "cryptoauthlib.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS calib_wakeup_i2c (ATCADevice device)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS calib_wakeup (ATCADevice device)
 wakeup the CryptoAuth device
 
ATCA_STATUS calib_idle (ATCADevice device)
 idle the CryptoAuth device
 
ATCA_STATUS calib_sleep (ATCADevice device)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS calib_exit (ATCADevice device)
 common cleanup code which idles the device after any operation
 
ATCA_STATUS calib_get_addr (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr)
 Compute the address given the zone, slot, block, and offset.
 
ATCA_STATUS calib_ca2_get_addr (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr)
 Compute the address given the zone, slot, block, and offset for the device.
 
ATCA_STATUS calib_get_zone_size (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
-

Detailed Description

-

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.

+
#include "cryptoauthlib.h"
+

Detailed Description

+

CryptoAuthLib Basic API methods for AES GCM mode.

+

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. Also can perform GFM (Galois Field Multiply) calculation in support of AES-GCM.

+
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
diff --git a/a00338.js b/a00338.js deleted file mode 100644 index d1a0d2761..000000000 --- a/a00338.js +++ /dev/null @@ -1,11 +0,0 @@ -var a00338 = -[ - [ "calib_ca2_get_addr", "a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd", null ], - [ "calib_exit", "a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927", null ], - [ "calib_get_addr", "a01444.html#gae51a67781e9e4618e669db1c999e6ec2", null ], - [ "calib_get_zone_size", "a01444.html#ga023735b1c0b10e70832d9a957bc99ae3", null ], - [ "calib_idle", "a01444.html#ga59750d83d93368b2944f57bb38bf4d1f", null ], - [ "calib_sleep", "a01444.html#gad26b70951a0da6d80fb98027faae7a1f", null ], - [ "calib_wakeup", "a01444.html#gafbc037d57a4cc4fec6a2f291736170cb", null ], - [ "calib_wakeup_i2c", "a01444.html#ga884790e08be94431e1fbe92bf6106e06", null ] -]; \ No newline at end of file diff --git a/a00344.html b/a00344.html index 0e1346e50..98aac68bd 100644 --- a/a00344.html +++ b/a00344.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_checkmac.c File Reference +CryptoAuthLib: calib_basic.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,52 @@
-
calib_checkmac.c File Reference
+ +
calib_basic.c File Reference
-

CryptoAuthLib Basic API methods for CheckMAC command. +

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for CheckMAC command.

-

The CheckMac command calculates a MAC response that would have been generated on a different CryptoAuthentication device and then compares the result with input value.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+
#include "cryptoauthlib.h"
+
+ + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS calib_wakeup_i2c (ATCADevice device)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS calib_wakeup (ATCADevice device)
 wakeup the CryptoAuth device
 
ATCA_STATUS calib_idle (ATCADevice device)
 idle the CryptoAuth device
 
ATCA_STATUS calib_sleep (ATCADevice device)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS calib_exit (ATCADevice device)
 common cleanup code which idles the device after any operation
 
ATCA_STATUS calib_get_addr (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr)
 Compute the address given the zone, slot, block, and offset.
 
ATCA_STATUS calib_ca2_get_addr (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr)
 Compute the address given the zone, slot, block, and offset for the device.
 
ATCA_STATUS calib_get_zone_size (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
+

Detailed Description

+

CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.

diff --git a/a00347.html b/a00347.html deleted file mode 100644 index 5f615afbb..000000000 --- a/a00347.html +++ /dev/null @@ -1,406 +0,0 @@ - - - - - - - -CryptoAuthLib: calib_command.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
calib_command.c File Reference
-
-
- -

Microchip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface. -More...

-
#include "cryptoauthlib.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atInfo (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Info method.
 
ATCA_STATUS atPause (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Pause method.
 
void atCRC (size_t length, const uint8_t *data, uint8_t *crc_le)
 Calculates CRC over the given raw data and returns the CRC in little-endian byte order.
 
void atCalcCrc (ATCAPacket *packet)
 This function calculates CRC and adds it to the correct offset in the packet data.
 
ATCA_STATUS atCheckCrc (const uint8_t *response)
 This function checks the consistency of a response.
 
bool atIsSHAFamily (ATCADeviceType device_type)
 determines if a given device type is a SHA device or a superset of a SHA device
 
bool atIsECCFamily (ATCADeviceType device_type)
 determines if a given device type is an ECC device or a superset of a ECC device
 
ATCA_STATUS isATCAError (uint8_t *data)
 checks for basic error frame in data
 
-

Detailed Description

-

Microchip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface.

-

The primary goal of the command builder is to wrap the given parameters with the correct packet size and CRC. The caller should first fill in the parameters required in the ATCAPacket parameter given to the command. The command builder will deal with the mechanics of creating a valid packet using the parameter information.

- -

Function Documentation

- -

◆ atCalcCrc()

- -
-
- - - - - - - - -
void atCalcCrc (ATCAPacketpacket)
-
- -

This function calculates CRC and adds it to the correct offset in the packet data.

-
Parameters
- - -
[in]packetPacket to calculate CRC data for
-
-
- -
-
- -

◆ atCheckCrc()

- -
-
- - - - - - - - -
ATCA_STATUS atCheckCrc (const uint8_t * response)
-
- -

This function checks the consistency of a response.

-
Parameters
- - -
[in]responsepointer to response
-
-
-
Returns
ATCA_SUCCESS on success, otherwise ATCA_RX_CRC_ERROR
- -
-
- -

◆ atCRC()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
void atCRC (size_t length,
const uint8_t * data,
uint8_t * crc_le 
)
-
- -

Calculates CRC over the given raw data and returns the CRC in little-endian byte order.

-
Parameters
- - - - -
[in]lengthSize of data not including the CRC byte positions
[in]dataPointer to the data over which to compute the CRC
[out]crc_lePointer to the place where the two-bytes of CRC will be returned in little-endian byte order.
-
-
- -
-
- -

◆ atInfo()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atInfo (ATCADeviceType device_type,
ATCAPacketpacket 
)
-
- -

ATCACommand Info method.

-
Parameters
- - - -
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ atIsECCFamily()

- -
-
- - - - - - - - -
bool atIsECCFamily (ATCADeviceType device_type)
-
- -

determines if a given device type is an ECC device or a superset of a ECC device

-
Parameters
- - -
[in]device_typeType of device to check for family type
-
-
-
Returns
boolean indicating whether the given device is an ECC family device.
- -
-
- -

◆ atIsSHAFamily()

- -
-
- - - - - - - - -
bool atIsSHAFamily (ATCADeviceType device_type)
-
- -

determines if a given device type is a SHA device or a superset of a SHA device

-
Parameters
- - -
[in]device_typeType of device to check for family type
-
-
-
Returns
boolean indicating whether the given device is a SHA family device.
- -
-
- -

◆ atPause()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atPause (ATCADeviceType device_type,
ATCAPacketpacket 
)
-
- -

ATCACommand Pause method.

-
Parameters
- - - -
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ isATCAError()

- -
-
- - - - - - - - -
ATCA_STATUS isATCAError (uint8_t * data)
-
- -

checks for basic error frame in data

-
Parameters
- - -
[in]datapointer to received data - expected to be in the form of a CA device response frame
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
-
- - - - diff --git a/a00347.js b/a00347.js deleted file mode 100644 index 1b32126f2..000000000 --- a/a00347.js +++ /dev/null @@ -1,11 +0,0 @@ -var a00347 = -[ - [ "atCalcCrc", "a00347.html#aff659b1042abf6e1376e38ccb4a20f3e", null ], - [ "atCheckCrc", "a00347.html#a7723a58d1781b3ba54e8f45d5729b33a", null ], - [ "atCRC", "a00347.html#a53ded4ed630b6ef4d292056c2e6b34f6", null ], - [ "atInfo", "a00347.html#a640d3cfd0f5b41f50cea0b987094d8a1", null ], - [ "atIsECCFamily", "a00347.html#ae82dca54cc3fd1cc2f1671e98d64df07", null ], - [ "atIsSHAFamily", "a00347.html#aae5866a78d2f0464b04eee9ef1f97030", null ], - [ "atPause", "a00347.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8", null ], - [ "isATCAError", "a00347.html#ae41108996848638519849163e51cd10a", null ] -]; \ No newline at end of file diff --git a/a00350.html b/a00350.html index 4f5f0a0ee..e5e38b5f0 100644 --- a/a00350.html +++ b/a00350.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_command.h File Reference +CryptoAuthLib: calib_checkmac.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,2151 +97,24 @@
- -
calib_command.h File Reference
+
calib_checkmac.c File Reference
-

Microchip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch. +

CryptoAuthLib Basic API methods for CheckMAC command. More...

-
#include <stddef.h>
-#include "calib_config_check.h"
-
- - - -

-Data Structures

struct  ATCAPacket
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define ATCA_CMD_SIZE_MIN   (7u)
 minimum number of bytes in command (from count byte to second CRC byte)
 
-#define ATCA_CMD_SIZE_MAX   ((uint8_t)4 * 36 + 7)
 maximum size of command packet (Verify)
 
-#define CMD_STATUS_SUCCESS   ((uint8_t)0x00)
 status byte for success
 
-#define CMD_STATUS_WAKEUP   ((uint8_t)0x11)
 status byte after wake-up
 
-#define CMD_STATUS_BYTE_PARSE   ((uint8_t)0x03)
 command parse error
 
-#define CMD_STATUS_BYTE_ECC   ((uint8_t)0x05)
 command ECC error
 
-#define CMD_STATUS_BYTE_EXEC   ((uint8_t)0x0F)
 command execution error
 
-#define CMD_STATUS_BYTE_COMM   ((uint8_t)0xFF)
 communication error
 
Opcodes for Crypto Authentication device commands
-#define ATCA_CHECKMAC   ((uint8_t)0x28)
 CheckMac command op-code.
 
-#define ATCA_DERIVE_KEY   ((uint8_t)0x1C)
 DeriveKey command op-code.
 
-#define ATCA_INFO   ((uint8_t)0x30)
 Info command op-code.
 
-#define ATCA_GENDIG   ((uint8_t)0x15)
 GenDig command op-code.
 
-#define ATCA_GENKEY   ((uint8_t)0x40)
 GenKey command op-code.
 
-#define ATCA_HMAC   ((uint8_t)0x11)
 HMAC command op-code.
 
-#define ATCA_LOCK   ((uint8_t)0x17)
 Lock command op-code.
 
-#define ATCA_MAC   ((uint8_t)0x08)
 MAC command op-code.
 
-#define ATCA_NONCE   ((uint8_t)0x16)
 Nonce command op-code.
 
-#define ATCA_PAUSE   ((uint8_t)0x01)
 Pause command op-code.
 
-#define ATCA_PRIVWRITE   ((uint8_t)0x46)
 PrivWrite command op-code.
 
-#define ATCA_RANDOM   ((uint8_t)0x1B)
 Random command op-code.
 
-#define ATCA_READ   ((uint8_t)0x02)
 Read command op-code.
 
-#define ATCA_SIGN   ((uint8_t)0x41)
 Sign command op-code.
 
-#define ATCA_UPDATE_EXTRA   ((uint8_t)0x20)
 UpdateExtra command op-code.
 
-#define ATCA_VERIFY   ((uint8_t)0x45)
 GenKey command op-code.
 
-#define ATCA_WRITE   ((uint8_t)0x12)
 Write command op-code.
 
-#define ATCA_ECDH   ((uint8_t)0x43)
 ECDH command op-code.
 
-#define ATCA_COUNTER   ((uint8_t)0x24)
 Counter command op-code.
 
-#define ATCA_DELETE   ((uint8_t)0x13)
 Delete command op-code.
 
-#define ATCA_SHA   ((uint8_t)0x47)
 SHA command op-code.
 
-#define ATCA_AES   ((uint8_t)0x51)
 AES command op-code.
 
-#define ATCA_KDF   ((uint8_t)0x56)
 KDF command op-code.
 
-#define ATCA_SECUREBOOT   ((uint8_t)0x80)
 Secure Boot command op-code.
 
-#define ATCA_SELFTEST   ((uint8_t)0x77)
 Self test command op-code.
 
Definitions of Data and Packet Sizes
-#define ATCA_BLOCK_SIZE   (32u)
 size of a block
 
-#define ATCA_WORD_SIZE   (4u)
 size of a word
 
-#define ATCA_PUB_KEY_PAD   (4u)
 size of the public key pad
 
-#define ATCA_SERIAL_NUM_SIZE   (9u)
 number of bytes in the device serial number
 
-#define ATCA_RSP_SIZE_VAL   ((uint8_t)7)
 size of response packet containing four bytes of data
 
-#define ATCA_KEY_COUNT   (16u)
 number of keys
 
-#define ATCA_ECC_CONFIG_SIZE   (128u)
 size of configuration zone
 
-#define ATCA_SHA_CONFIG_SIZE   (88u)
 size of configuration zone
 
-#define ATCA_CA2_CONFIG_SIZE   (64u)
 size of ECC204 configuration zone
 
-#define ATCA_CA2_CONFIG_SLOT_SIZE   (16u)
 size of ECC204 configuration slot size
 
-#define ATCA_OTP_SIZE   (64u)
 size of OTP zone
 
-#define ATCA_DATA_SIZE   (ATCA_KEY_COUNT * ATCA_KEY_SIZE)
 size of data zone
 
-#define ATCA_AES_GFM_SIZE   ATCA_BLOCK_SIZE
 size of GFM data
 
-#define ATCA_CHIPMODE_OFFSET   (19u)
 ChipMode byte offset within the configuration zone.
 
-#define ATCA_CHIPMODE_I2C_ADDRESS_FLAG   ((uint8_t)0x01)
 ChipMode I2C Address in UserExtraAdd flag.
 
-#define ATCA_CHIPMODE_TTL_ENABLE_FLAG   ((uint8_t)0x02)
 ChipMode TTLenable flag.
 
-#define ATCA_CHIPMODE_WATCHDOG_MASK   ((uint8_t)0x04)
 ChipMode watchdog duration mask.
 
-#define ATCA_CHIPMODE_WATCHDOG_SHORT   ((uint8_t)0x00)
 ChipMode short watchdog (~1.3s)
 
-#define ATCA_CHIPMODE_WATCHDOG_LONG   ((uint8_t)0x04)
 ChipMode long watchdog (~13s)
 
-#define ATCA_CHIPMODE_CLOCK_DIV_MASK   ((uint8_t)0xF8)
 ChipMode clock divider mask.
 
-#define ATCA_CHIPMODE_CLOCK_DIV_M0   ((uint8_t)0x00)
 ChipMode clock divider M0.
 
-#define ATCA_CHIPMODE_CLOCK_DIV_M1   ((uint8_t)0x28)
 ChipMode clock divider M1.
 
-#define ATCA_CHIPMODE_CLOCK_DIV_M2   ((uint8_t)0x68)
 ChipMode clock divider M2.
 
-#define ATCA_COUNT_SIZE   (1u)
 Number of bytes in the command packet Count.
 
-#define ATCA_CRC_SIZE   (2u)
 Number of bytes in the command packet CRC.
 
-#define ATCA_PACKET_OVERHEAD   (ATCA_COUNT_SIZE + ATCA_CRC_SIZE)
 Number of bytes in the command packet.
 
-#define ATCA_PUB_KEY_SIZE   (64u)
 size of a p256 public key
 
-#define ATCA_PRIV_KEY_SIZE   (32u)
 size of a p256 private key
 
-#define ATCA_SIG_SIZE   (64u)
 size of a p256 signature
 
-#define ATCA_KEY_SIZE   (32u)
 size of a symmetric SHA key
 
-#define RSA2048_KEY_SIZE   (256u)
 size of a RSA private key
 
-#define ATCA_RSP_SIZE_MIN   ((uint8_t)4)
 minimum number of bytes in response
 
-#define ATCA_RSP_SIZE_4   ((uint8_t)7)
 size of response packet containing 4 bytes data
 
-#define ATCA_RSP_SIZE_72   ((uint8_t)75)
 size of response packet containing 64 bytes data
 
-#define ATCA_RSP_SIZE_64   ((uint8_t)67)
 size of response packet containing 64 bytes data
 
-#define ATCA_RSP_SIZE_32   (35u)
 size of response packet containing 32 bytes data
 
-#define ATCA_RSP_SIZE_16   ((uint8_t)19)
 size of response packet containing 16 bytes data
 
-#define ATCA_RSP_SIZE_MAX   ((uint8_t)75)
 maximum size of response packet (GenKey and Verify command)
 
-#define OUTNONCE_SIZE   (32u)
 Size of the OutNonce response expected from several commands.
 
Definitions for Command Parameter Ranges
-#define ATCA_KEY_ID_MAX   ((uint8_t)15)
 maximum value for key id
 
-#define ATCA_OTP_BLOCK_MAX   ((uint8_t)1)
 maximum value for OTP block
 
Definitions for Indexes Common to All Commands
-#define ATCA_COUNT_IDX   (0)
 command packet index for count
 
-#define ATCA_OPCODE_IDX   (1)
 command packet index for op-code
 
-#define ATCA_PARAM1_IDX   (2)
 command packet index for first parameter
 
-#define ATCA_PARAM2_IDX   (3)
 command packet index for second parameter
 
-#define ATCA_DATA_IDX   (5)
 command packet index for data load
 
-#define ATCA_RSP_DATA_IDX   (1u)
 buffer index of data in response
 
Definitions for Zone and Address Parameters
-#define ATCA_ZONE_MASK   ((uint8_t)0x03)
 Zone mask.
 
-#define ATCA_ZONE_ENCRYPTED   ((uint8_t)0x40)
 Zone bit 6 set: Write is encrypted with an unlocked data zone.
 
-#define ATCA_ZONE_READWRITE_32   ((uint8_t)0x80)
 Zone bit 7 set: Access 32 bytes, otherwise 4 bytes.
 
-#define ATCA_ADDRESS_MASK_CONFIG   ((uint16_t)0x001F)
 Address bits 5 to 7 are 0 for Configuration zone.
 
-#define ATCA_ADDRESS_MASK_OTP   ((uint16_t)0x000F)
 Address bits 4 to 7 are 0 for OTP zone.
 
-#define ATCA_ADDRESS_MASK   ((uint16_t)0x007F)
 Address bit 7 to 15 are always 0.
 
-#define ATCA_TEMPKEY_KEYID   ((uint16_t)0xFFFF)
 KeyID when referencing TempKey.
 
Definitions for Key types
-#define ATCA_B283_KEY_TYPE   0
 B283 NIST ECC key.
 
-#define ATCA_K283_KEY_TYPE   1
 K283 NIST ECC key.
 
-#define ATCA_P256_KEY_TYPE   4
 P256 NIST ECC key.
 
-#define ATCA_AES_KEY_TYPE   6
 AES-128 Key.
 
-#define ATCA_SHA_KEY_TYPE   7
 SHA key or other data.
 
Definitions for the AES Command
-#define AES_MODE_IDX   ATCA_PARAM1_IDX
 AES command index for mode.
 
-#define AES_KEYID_IDX   ATCA_PARAM2_IDX
 AES command index for key id.
 
-#define AES_INPUT_IDX   ATCA_DATA_IDX
 AES command index for input data.
 
-#define AES_COUNT   (23u)
 AES command packet size.
 
-#define AES_MODE_MASK   ((uint8_t)0xC7)
 AES mode bits 3 to 5 are 0.
 
-#define AES_MODE_KEY_BLOCK_MASK   ((uint8_t)0xC0)
 AES mode mask for key block field.
 
-#define AES_MODE_OP_MASK   ((uint8_t)0x07)
 AES mode operation mask.
 
-#define AES_MODE_ENCRYPT   ((uint8_t)0x00)
 AES mode: Encrypt.
 
-#define AES_MODE_DECRYPT   ((uint8_t)0x01)
 AES mode: Decrypt.
 
-#define AES_MODE_GFM   ((uint8_t)0x03)
 AES mode: GFM calculation.
 
-#define AES_MODE_KEY_BLOCK_POS   (6u)
 Bit shift for key block in mode.
 
-#define AES_DATA_SIZE   (16u)
 size of AES encrypt/decrypt data
 
-#define AES_RSP_SIZE   ATCA_RSP_SIZE_16
 AES command response packet size.
 
Definitions for the CheckMac Command
-#define CHECKMAC_MODE_IDX   ATCA_PARAM1_IDX
 CheckMAC command index for mode.
 
-#define CHECKMAC_KEYID_IDX   ATCA_PARAM2_IDX
 CheckMAC command index for key identifier.
 
-#define CHECKMAC_CLIENT_CHALLENGE_IDX   ATCA_DATA_IDX
 CheckMAC command index for client challenge.
 
-#define CHECKMAC_CLIENT_RESPONSE_IDX   (37u)
 CheckMAC command index for client response.
 
-#define CHECKMAC_DATA_IDX   (69u)
 CheckMAC command index for other data.
 
-#define CHECKMAC_COUNT   (84u)
 CheckMAC command packet size.
 
-#define CHECKMAC_MODE_CHALLENGE   ((uint8_t)0x00)
 CheckMAC mode 0: first SHA block from key id.
 
-#define CHECKMAC_MODE_BLOCK2_TEMPKEY   ((uint8_t)0x01)
 CheckMAC mode bit 0: second SHA block from TempKey.
 
-#define CHECKMAC_MODE_BLOCK1_TEMPKEY   ((uint8_t)0x02)
 CheckMAC mode bit 1: first SHA block from TempKey.
 
-#define CHECKMAC_MODE_SOURCE_FLAG_MATCH   ((uint8_t)0x04)
 CheckMAC mode bit 2: match TempKey.SourceFlag.
 
-#define CHECKMAC_MODE_INCLUDE_OTP_64   ((uint8_t)0x20)
 CheckMAC mode bit 5: include first 64 OTP bits.
 
-#define CHECKMAC_MODE_MASK   ((uint8_t)0x27)
 CheckMAC mode bits 3, 4, 6, and 7 are 0.
 
-#define CHECKMAC_MODE_OUTPUT_MAC_RESPONSE   ((uint8_t)0x08)
 CheckMAC mode bit 3: Single byte boolean response + 32 bytes mac in SHA105 device.
 
-#define CHECKMAC_CLIENT_CHALLENGE_SIZE   (32u)
 CheckMAC size of client challenge.
 
-#define CHECKMAC_CLIENT_RESPONSE_SIZE   (32u)
 CheckMAC size of client response.
 
-#define CHECKMAC_OTHER_DATA_SIZE   (13u)
 CheckMAC size of "other data".
 
-#define CHECKMAC_CLIENT_COMMAND_SIZE   (4u)
 CheckMAC size of client command header size inside "other data".
 
-#define CHECKMAC_CMD_MATCH   (0u)
 CheckMAC return value when there is a match.
 
-#define CHECKMAC_CMD_MISMATCH   (1u)
 CheckMAC return value when there is a mismatch.
 
-#define CHECKMAC_RSP_SIZE   ATCA_RSP_SIZE_MIN
 CheckMAC response packet size.
 
-#define CHECKMAC_SINGLE_BYTE_BOOL_RESP   (1u)
 
-#define CHECKMAC_SHA105_DEFAULT_KEYID   ((uint16_t)0x0003)
 
Definitions for the Counter command
-#define COUNTER_COUNT   ATCA_CMD_SIZE_MIN
 
-#define COUNTER_MODE_IDX   ATCA_PARAM1_IDX
 Counter command index for mode.
 
-#define COUNTER_KEYID_IDX   ATCA_PARAM2_IDX
 Counter command index for key id.
 
-#define COUNTER_MODE_MASK   ((uint8_t)0x01)
 Counter mode bits 1 to 7 are 0.
 
-#define COUNTER_MAX_VALUE   ((uint32_t)2097151)
 Counter maximum value of the counter.
 
-#define COUNTER_MODE_READ   ((uint8_t)0x00)
 Counter command mode for reading.
 
-#define COUNTER_MODE_INCREMENT   ((uint8_t)0x01)
 Counter command mode for incrementing.
 
-#define COUNTER_RSP_SIZE   ATCA_RSP_SIZE_4
 Counter command response packet size.
 
-#define COUNTER_SIZE   ATCA_RSP_SIZE_MIN
 Counter size in binary.
 
-#define COUNTER_MAX_VALUE_CA2   ((uint16_t)10000)
 Counter maximum value of the counter for ECC204.
 
Definitions for the Delete command
-#define DELETE_COUNT   (39u)
 
-#define DELETE_MODE   ((uint8_t)0x00)
 
-#define DELETE_MAC_SIZE   (32u)
 
-#define DELETE_NONCE_KEY_ID   ((uint16_t)0x8000)
 
Definitions for the DeriveKey Command
-#define DERIVE_KEY_RANDOM_IDX   ATCA_PARAM1_IDX
 DeriveKey command index for random bit.
 
-#define DERIVE_KEY_TARGETKEY_IDX   ATCA_PARAM2_IDX
 DeriveKey command index for target slot.
 
-#define DERIVE_KEY_MAC_IDX   ATCA_DATA_IDX
 DeriveKey command index for optional MAC.
 
-#define DERIVE_KEY_COUNT_SMALL   ATCA_CMD_SIZE_MIN
 DeriveKey command packet size without MAC.
 
-#define DERIVE_KEY_MODE   ((uint8_t)0x04)
 DeriveKey command mode set to 4 as in datasheet.
 
-#define DERIVE_KEY_COUNT_LARGE   (39u)
 DeriveKey command packet size with MAC.
 
-#define DERIVE_KEY_RANDOM_FLAG   ((uint8_t)4)
 DeriveKey 1. parameter; has to match TempKey.SourceFlag.
 
-#define DERIVE_KEY_MAC_SIZE   (32u)
 DeriveKey MAC size.
 
-#define DERIVE_KEY_RSP_SIZE   ATCA_RSP_SIZE_MIN
 DeriveKey response packet size.
 
Definitions for the ECDH Command
-#define ECDH_PREFIX_MODE   ((uint8_t)0x00)
 
-#define ECDH_COUNT   (ATCA_CMD_SIZE_MIN + ATCA_PUB_KEY_SIZE)
 
-#define ECDH_MODE_SOURCE_MASK   ((uint8_t)0x01)
 
-#define ECDH_MODE_SOURCE_EEPROM_SLOT   ((uint8_t)0x00)
 
-#define ECDH_MODE_SOURCE_TEMPKEY   ((uint8_t)0x01)
 
-#define ECDH_MODE_OUTPUT_MASK   ((uint8_t)0x02)
 
-#define ECDH_MODE_OUTPUT_CLEAR   ((uint8_t)0x00)
 
-#define ECDH_MODE_OUTPUT_ENC   ((uint8_t)0x02)
 
-#define ECDH_MODE_COPY_MASK   ((uint8_t)0x0C)
 
-#define ECDH_MODE_COPY_COMPATIBLE   ((uint8_t)0x00)
 
-#define ECDH_MODE_COPY_EEPROM_SLOT   ((uint8_t)0x04)
 
-#define ECDH_MODE_COPY_TEMP_KEY   ((uint8_t)0x08)
 
-#define ECDH_MODE_COPY_OUTPUT_BUFFER   ((uint8_t)0x0C)
 
-#define ECDH_KEY_SIZE   ATCA_BLOCK_SIZE
 ECDH output data size.
 
-#define ECDH_RSP_SIZE   ATCA_RSP_SIZE_64
 ECDH command packet size.
 
Definitions for the GenDig Command
-#define GENDIG_ZONE_IDX   ATCA_PARAM1_IDX
 GenDig command index for zone.
 
-#define GENDIG_KEYID_IDX   ATCA_PARAM2_IDX
 GenDig command index for key id.
 
-#define GENDIG_DATA_IDX   ATCA_DATA_IDX
 GenDig command index for optional data.
 
-#define GENDIG_COUNT   ATCA_CMD_SIZE_MIN
 GenDig command packet size without "other data".
 
-#define GENDIG_ZONE_CONFIG   ((uint8_t)0)
 GenDig zone id config. Use KeyID to specify any of the four 256-bit blocks of the Configuration zone.
 
-#define GENDIG_ZONE_OTP   ((uint8_t)1)
 GenDig zone id OTP. Use KeyID to specify either the first or second 256-bit block of the OTP zone.
 
-#define GENDIG_ZONE_DATA   ((uint8_t)2)
 GenDig zone id data. Use KeyID to specify a slot in the Data zone or a transport key in the hardware array.
 
-#define GENDIG_ZONE_SHARED_NONCE   ((uint8_t)3)
 GenDig zone id shared nonce. KeyID specifies the location of the input value in the message generation.
 
-#define GENDIG_ZONE_COUNTER   ((uint8_t)4)
 GenDig zone id counter. KeyID specifies the monotonic counter ID to be included in the message generation.
 
-#define GENDIG_ZONE_KEY_CONFIG   ((uint8_t)5)
 GenDig zone id key config. KeyID specifies the slot for which the configuration information is to be included in the message generation.
 
-#define GENDIG_RSP_SIZE   ATCA_RSP_SIZE_MIN
 GenDig command response packet size.
 
-#define GENDIG_USE_TEMPKEY_BIT   ((uint16_t)0x8000)
 Use temp key for GenDig command if bit 15 is 1.
 
Definitions for the GenDivKey Command
-#define GENDIVKEY_MODE   ((uint8_t)2)
 
-#define GENDIVKEY_OTHER_DATA_SIZE   ((uint8_t)4)
 
-#define GENDIVKEY_DEFAULT_KEYID   ((uint16_t)0x0003)
 
Definitions for the GenKey Command
-#define GENKEY_MODE_IDX   ATCA_PARAM1_IDX
 GenKey command index for mode.
 
-#define GENKEY_KEYID_IDX   ATCA_PARAM2_IDX
 GenKey command index for key id.
 
-#define GENKEY_DATA_IDX   (5u)
 GenKey command index for other data.
 
-#define GENKEY_COUNT   ATCA_CMD_SIZE_MIN
 GenKey command packet size without "other data".
 
-#define GENKEY_COUNT_DATA   (10u)
 GenKey command packet size with "other data".
 
-#define GENKEY_OTHER_DATA_SIZE   (3u)
 GenKey size of "other data".
 
-#define GENKEY_MODE_MASK   ((uint8_t)0x1C)
 GenKey mode bits 0 to 1 and 5 to 7 are 0.
 
-#define GENKEY_MODE_PRIVATE   ((uint8_t)0x04)
 GenKey mode: private key generation.
 
-#define GENKEY_MODE_PUBLIC   ((uint8_t)0x00)
 GenKey mode: public key calculation.
 
-#define GENKEY_MODE_DIGEST   ((uint8_t)0x08)
 GenKey mode: PubKey digest will be created after the public key is calculated.
 
-#define GENKEY_MODE_PUBKEY_DIGEST   ((uint8_t)0x10)
 GenKey mode: Calculate PubKey digest on the public key in KeyId.
 
-#define GENKEY_MODE_MAC   ((uint8_t)0x20)
 Genkey mode: Calculate MAC of public key + session key.
 
-#define GENKEY_PRIVATE_TO_TEMPKEY   ((uint16_t)0xFFFF)
 GenKey Create private key and store to tempkey (608 only)
 
-#define GENKEY_RSP_SIZE_SHORT   ATCA_RSP_SIZE_MIN
 GenKey response packet size in Digest mode.
 
-#define GENKEY_RSP_SIZE_LONG   ATCA_RSP_SIZE_64
 GenKey response packet size when returning a public key.
 
Definitions for the HMAC Command
-#define HMAC_MODE_IDX   ATCA_PARAM1_IDX
 HMAC command index for mode.
 
-#define HMAC_KEYID_IDX   ATCA_PARAM2_IDX
 HMAC command index for key id.
 
-#define HMAC_COUNT   ATCA_CMD_SIZE_MIN
 HMAC command packet size.
 
-#define HMAC_MODE_FLAG_TK_RAND   ((uint8_t)0x00)
 HMAC mode bit 2: The value of this bit must match the value in TempKey.SourceFlag or the command will return an error.
 
-#define HMAC_MODE_FLAG_TK_NORAND   ((uint8_t)0x04)
 HMAC mode bit 2: The value of this bit must match the value in TempKey.SourceFlag or the command will return an error.
 
-#define HMAC_MODE_FLAG_OTP88   ((uint8_t)0x10)
 HMAC mode bit 4: Include the first 88 OTP bits (OTP[0] through OTP[10]) in the message.; otherwise, the corresponding message bits are set to zero. Not applicable for ATECC508A.
 
-#define HMAC_MODE_FLAG_OTP64   ((uint8_t)0x20)
 HMAC mode bit 5: Include the first 64 OTP bits (OTP[0] through OTP[7]) in the message.; otherwise, the corresponding message bits are set to zero. If Mode[4] is set, the value of this mode bit is ignored. Not applicable for ATECC508A.
 
-#define HMAC_MODE_FLAG_FULLSN   ((uint8_t)0x40)
 HMAC mode bit 6: If set, include the 48 bits SN[2:3] and SN[4:7] in the message.; otherwise, the corresponding message bits are set to zero.
 
-#define HMAC_MODE_MASK   ((uint8_t)0x74)
 HMAC mode bits 0, 1, 3, and 7 are 0.
 
-#define HMAC_DIGEST_SIZE   (32u)
 HMAC size of digest response.
 
-#define HMAC_RSP_SIZE   ATCA_RSP_SIZE_32
 HMAC command response packet size.
 
Definitions for the Info Command
-#define INFO_PARAM1_IDX   ATCA_PARAM1_IDX
 Info command index for 1. parameter.
 
-#define INFO_PARAM2_IDX   ATCA_PARAM2_IDX
 Info command index for 2. parameter.
 
-#define INFO_COUNT   ATCA_CMD_SIZE_MIN
 Info command packet size.
 
-#define INFO_MODE_REVISION   ((uint8_t)0x00)
 Info mode Revision.
 
-#define INFO_MODE_KEY_VALID   ((uint8_t)0x01)
 Info mode KeyValid.
 
-#define INFO_MODE_STATE   ((uint8_t)0x02)
 Info mode State.
 
-#define INFO_MODE_LOCK_STATUS   ((uint8_t)0x02)
 Info mode Lock status for ECC204,TA010,SHA10x devices.
 
-#define INFO_MODE_CHIP_STATUS   ((uint8_t)0xC5)
 Info mode Chip status for ECC204,TA010,SHA10x devices.
 
-#define INFO_MODE_GPIO   ((uint8_t)0x03)
 Info mode GPIO.
 
-#define INFO_MODE_VOL_KEY_PERMIT   ((uint8_t)0x04)
 Info mode GPIO.
 
-#define INFO_MODE_MAX   ((uint8_t)0x03)
 Info mode maximum value.
 
-#define INFO_NO_STATE   ((uint8_t)0x00)
 Info mode is not the state mode.
 
-#define INFO_OUTPUT_STATE_MASK   ((uint8_t)0x01)
 Info output state mask.
 
-#define INFO_DRIVER_STATE_MASK   ((uint8_t)0x02)
 Info driver state mask.
 
-#define INFO_PARAM2_SET_LATCH_STATE   ((uint16_t)0x0002)
 Info param2 to set the persistent latch state.
 
-#define INFO_PARAM2_LATCH_SET   ((uint16_t)0x0001)
 Info param2 to set the persistent latch.
 
-#define INFO_PARAM2_LATCH_CLEAR   ((uint16_t)0x0000)
 Info param2 to clear the persistent latch.
 
-#define INFO_SIZE   ((uint8_t)0x04)
 Info return size.
 
-#define INFO_RSP_SIZE   ATCA_RSP_SIZE_VAL
 Info command response packet size.
 
Definitions for the KDF Command
-#define KDF_MODE_IDX   ATCA_PARAM1_IDX
 KDF command index for mode.
 
-#define KDF_KEYID_IDX   ATCA_PARAM2_IDX
 KDF command index for key id.
 
-#define KDF_DETAILS_IDX   ATCA_DATA_IDX
 KDF command index for details.
 
-#define KDF_DETAILS_SIZE   (4u)
 KDF details (param3) size.
 
-#define KDF_MESSAGE_IDX   (ATCA_DATA_IDX + KDF_DETAILS_SIZE)
 
-#define KDF_MODE_SOURCE_MASK   ((uint8_t)0x03)
 KDF mode source key mask.
 
-#define KDF_MODE_SOURCE_TEMPKEY   ((uint8_t)0x00)
 KDF mode source key in TempKey.
 
-#define KDF_MODE_SOURCE_TEMPKEY_UP   ((uint8_t)0x01)
 KDF mode source key in upper TempKey.
 
-#define KDF_MODE_SOURCE_SLOT   ((uint8_t)0x02)
 KDF mode source key in a slot.
 
-#define KDF_MODE_SOURCE_ALTKEYBUF   ((uint8_t)0x03)
 KDF mode source key in alternate key buffer.
 
-#define KDF_MODE_TARGET_MASK   ((uint8_t)0x1C)
 KDF mode target key mask.
 
-#define KDF_MODE_TARGET_TEMPKEY   ((uint8_t)0x00)
 KDF mode target key in TempKey.
 
-#define KDF_MODE_TARGET_TEMPKEY_UP   ((uint8_t)0x04)
 KDF mode target key in upper TempKey.
 
-#define KDF_MODE_TARGET_SLOT   ((uint8_t)0x08)
 KDF mode target key in slot.
 
-#define KDF_MODE_TARGET_ALTKEYBUF   ((uint8_t)0x0C)
 KDF mode target key in alternate key buffer.
 
-#define KDF_MODE_TARGET_OUTPUT   ((uint8_t)0x10)
 KDF mode target key in output buffer.
 
-#define KDF_MODE_TARGET_OUTPUT_ENC   ((uint8_t)0x14)
 KDF mode target key encrypted in output buffer.
 
-#define KDF_MODE_ALG_MASK   ((uint8_t)0x60)
 KDF mode algorithm mask.
 
-#define KDF_MODE_ALG_PRF   ((uint8_t)0x00)
 KDF mode PRF algorithm.
 
-#define KDF_MODE_ALG_AES   ((uint8_t)0x20)
 KDF mode AES algorithm.
 
-#define KDF_MODE_ALG_HKDF   ((uint8_t)0x40)
 KDF mode HKDF algorithm.
 
-#define KDF_DETAILS_PRF_KEY_LEN_MASK   ((uint32_t)0x00000003)
 KDF details for PRF, source key length mask.
 
-#define KDF_DETAILS_PRF_KEY_LEN_16   ((uint32_t)0x00000000)
 KDF details for PRF, source key length is 16 bytes.
 
-#define KDF_DETAILS_PRF_KEY_LEN_32   ((uint32_t)0x00000001)
 KDF details for PRF, source key length is 32 bytes.
 
-#define KDF_DETAILS_PRF_KEY_LEN_48   ((uint32_t)0x00000002)
 KDF details for PRF, source key length is 48 bytes.
 
-#define KDF_DETAILS_PRF_KEY_LEN_64   ((uint32_t)0x00000003)
 KDF details for PRF, source key length is 64 bytes.
 
-#define KDF_DETAILS_PRF_TARGET_LEN_MASK   ((uint32_t)0x00000100)
 KDF details for PRF, target length mask.
 
-#define KDF_DETAILS_PRF_TARGET_LEN_32   ((uint32_t)0x00000000)
 KDF details for PRF, target length is 32 bytes.
 
-#define KDF_DETAILS_PRF_TARGET_LEN_64   ((uint32_t)0x00000100)
 KDF details for PRF, target length is 64 bytes.
 
-#define KDF_DETAILS_PRF_AEAD_MASK   ((uint32_t)0x00000600)
 KDF details for PRF, AEAD processing mask.
 
-#define KDF_DETAILS_PRF_AEAD_MODE0   ((uint32_t)0x00000000)
 KDF details for PRF, AEAD no processing.
 
-#define KDF_DETAILS_PRF_AEAD_MODE1   ((uint32_t)0x00000200)
 KDF details for PRF, AEAD First 32 go to target, second 32 go to output buffer.
 
-#define KDF_DETAILS_AES_KEY_LOC_MASK   ((uint32_t)0x00000003)
 KDF details for AES, key location mask.
 
-#define KDF_DETAILS_HKDF_MSG_LOC_MASK   ((uint32_t)0x00000003)
 KDF details for HKDF, message location mask.
 
-#define KDF_DETAILS_HKDF_MSG_LOC_SLOT   ((uint32_t)0x00000000)
 KDF details for HKDF, message location in slot.
 
-#define KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY   ((uint32_t)0x00000001)
 KDF details for HKDF, message location in TempKey.
 
-#define KDF_DETAILS_HKDF_MSG_LOC_INPUT   ((uint32_t)0x00000002)
 KDF details for HKDF, message location in input parameter.
 
-#define KDF_DETAILS_HKDF_MSG_LOC_IV   ((uint32_t)0x00000003)
 KDF details for HKDF, message location is a special IV function.
 
-#define KDF_DETAILS_HKDF_ZERO_KEY   ((uint32_t)0x00000004)
 KDF details for HKDF, key is 32 bytes of zero.
 
Definitions for the Lock Command
-#define LOCK_ZONE_IDX   ATCA_PARAM1_IDX
 Lock command index for zone.
 
-#define LOCK_SUMMARY_IDX   ATCA_PARAM2_IDX
 Lock command index for summary.
 
-#define LOCK_COUNT   ATCA_CMD_SIZE_MIN
 Lock command packet size.
 
-#define LOCK_ZONE_CONFIG   ((uint8_t)0x00)
 Lock zone is Config.
 
-#define LOCK_ZONE_DATA   ((uint8_t)0x01)
 Lock zone is OTP or Data.
 
-#define LOCK_ZONE_DATA_SLOT   ((uint8_t)0x02)
 Lock slot of Data.
 
-#define LOCK_ZONE_CA2_DATA   ((uint8_t)0x00)
 Lock second gen Data zone by slot.
 
-#define LOCK_ZONE_CA2_CONFIG   ((uint8_t)0x01)
 Lock second gen configuration zone by slot.
 
-#define LOCK_ZONE_NO_CRC   ((uint8_t)0x80)
 Lock command: Ignore summary.
 
-#define LOCK_ZONE_MASK   ((uint8_t)0xBF)
 Lock parameter 1 bits 6 are 0.
 
-#define ATCA_UNLOCKED   ((uint8_t)0x55)
 Value indicating an unlocked zone.
 
-#define ATCA_LOCKED   ((uint8_t)0x00)
 Value indicating a locked zone.
 
-#define LOCK_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Lock command response packet size.
 
Definitions for the MAC Command
-#define MAC_MODE_IDX   ATCA_PARAM1_IDX
 MAC command index for mode.
 
-#define MAC_KEYID_IDX   ATCA_PARAM2_IDX
 MAC command index for key id.
 
-#define MAC_CHALLENGE_IDX   ATCA_DATA_IDX
 MAC command index for optional challenge.
 
-#define MAC_COUNT_SHORT   ATCA_CMD_SIZE_MIN
 MAC command packet size without challenge.
 
-#define MAC_COUNT_LONG   (39u)
 MAC command packet size with challenge.
 
-#define MAC_MODE_CHALLENGE   ((uint8_t)0x00)
 MAC mode 0: first SHA block from data slot.
 
-#define MAC_MODE_BLOCK2_TEMPKEY   ((uint8_t)0x01)
 MAC mode bit 0: second SHA block from TempKey.
 
-#define MAC_MODE_BLOCK1_TEMPKEY   ((uint8_t)0x02)
 MAC mode bit 1: first SHA block from TempKey.
 
-#define MAC_MODE_SOURCE_FLAG_MATCH   ((uint8_t)0x04)
 MAC mode bit 2: match TempKey.SourceFlag.
 
-#define MAC_MODE_PTNONCE_TEMPKEY   ((uint8_t)0x06)
 MAC mode bit 0: second SHA block from TempKey.
 
-#define MAC_MODE_PASSTHROUGH   ((uint8_t)0x07)
 MAC mode bit 0-2: pass-through mode.
 
-#define MAC_MODE_INCLUDE_OTP_88   ((uint8_t)0x10)
 MAC mode bit 4: include first 88 OTP bits.
 
-#define MAC_MODE_INCLUDE_OTP_64   ((uint8_t)0x20)
 MAC mode bit 5: include first 64 OTP bits.
 
-#define MAC_MODE_INCLUDE_SN   ((uint8_t)0x40)
 MAC mode bit 6: include serial number.
 
-#define MAC_CHALLENGE_SIZE   (32u)
 MAC size of challenge.
 
-#define MAC_SIZE   (32u)
 MAC size of response.
 
-#define MAC_MODE_MASK   ((uint8_t)0x77)
 MAC mode bits 3 and 7 are 0.
 
-#define MAC_RSP_SIZE   ATCA_RSP_SIZE_32
 MAC command response packet size.
 
-#define MAC_SHA104_DEFAULT_KEYID   ((uint16_t)0x0003)
 
Definitions for the Nonce Command
-#define NONCE_MODE_IDX   ATCA_PARAM1_IDX
 Nonce command index for mode.
 
-#define NONCE_PARAM2_IDX   ATCA_PARAM2_IDX
 Nonce command index for 2. parameter.
 
-#define NONCE_INPUT_IDX   ATCA_DATA_IDX
 Nonce command index for input data.
 
-#define NONCE_COUNT_SHORT   (ATCA_CMD_SIZE_MIN + 20u)
 Nonce command packet size for 20 bytes of NumIn.
 
-#define NONCE_COUNT_LONG   (ATCA_CMD_SIZE_MIN + 32u)
 Nonce command packet size for 32 bytes of NumIn.
 
-#define NONCE_COUNT_LONG_64   (ATCA_CMD_SIZE_MIN + 64u)
 Nonce command packet size for 64 bytes of NumIn.
 
-#define NONCE_MODE_MASK   ((uint8_t)0x03)
 Nonce mode bits 2 to 7 are 0.
 
-#define NONCE_MODE_SEED_UPDATE   ((uint8_t)0x00)
 Nonce mode: update seed.
 
-#define NONCE_MODE_NO_SEED_UPDATE   ((uint8_t)0x01)
 Nonce mode: do not update seed.
 
-#define NONCE_MODE_INVALID   ((uint8_t)0x02)
 Nonce mode 2 is invalid.
 
-#define NONCE_MODE_PASSTHROUGH   ((uint8_t)0x03)
 Nonce mode: pass-through.
 
-#define NONCE_MODE_GEN_SESSION_KEY   ((uint8_t)0x02)
 NOnce mode: Generate session key in ECC204 device.
 
-#define NONCE_MODE_INPUT_LEN_MASK   ((uint8_t)0x20)
 Nonce mode: input size mask.
 
-#define NONCE_MODE_INPUT_LEN_32   ((uint8_t)0x00)
 Nonce mode: input size is 32 bytes.
 
-#define NONCE_MODE_INPUT_LEN_64   ((uint8_t)0x20)
 Nonce mode: input size is 64 bytes.
 
-#define NONCE_MODE_TARGET_MASK   ((uint8_t)0xC0)
 Nonce mode: target mask.
 
-#define NONCE_MODE_TARGET_TEMPKEY   ((uint8_t)0x00)
 Nonce mode: target is TempKey.
 
-#define NONCE_MODE_TARGET_MSGDIGBUF   ((uint8_t)0x40)
 Nonce mode: target is Message Digest Buffer.
 
-#define NONCE_MODE_TARGET_ALTKEYBUF   ((uint8_t)0x80)
 Nonce mode: target is Alternate Key Buffer.
 
-#define NONCE_ZERO_CALC_MASK   ((uint16_t)0x8000)
 Nonce zero (param2): calculation mode mask.
 
-#define NONCE_ZERO_CALC_RANDOM   ((uint16_t)0x0000)
 Nonce zero (param2): calculation mode random, use RNG in calculation and return RNG output.
 
-#define NONCE_ZERO_CALC_TEMPKEY   ((uint16_t)0x8000)
 Nonce zero (param2): calculation mode TempKey, use TempKey in calculation and return new TempKey value.
 
-#define NONCE_NUMIN_SIZE   (20)
 Nonce NumIn size for random modes.
 
-#define NONCE_NUMIN_SIZE_PASSTHROUGH   (32)
 Nonce NumIn size for 32-byte pass-through mode.
 
-#define NONCE_RSP_SIZE_SHORT   ATCA_RSP_SIZE_MIN
 Nonce command response packet size with no output.
 
-#define NONCE_RSP_SIZE_LONG   ATCA_RSP_SIZE_32
 Nonce command response packet size with output.
 
Definitions for the Pause Command
-#define PAUSE_SELECT_IDX   ATCA_PARAM1_IDX
 Pause command index for Selector.
 
-#define PAUSE_PARAM2_IDX   ATCA_PARAM2_IDX
 Pause command index for 2. parameter.
 
-#define PAUSE_COUNT   ATCA_CMD_SIZE_MIN
 Pause command packet size.
 
-#define PAUSE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Pause command response packet size.
 
Definitions for the PrivWrite Command
-#define PRIVWRITE_ZONE_IDX   ATCA_PARAM1_IDX
 PrivWrite command index for zone.
 
-#define PRIVWRITE_KEYID_IDX   ATCA_PARAM2_IDX
 PrivWrite command index for KeyID.
 
-#define PRIVWRITE_VALUE_IDX   ( 5)
 PrivWrite command index for value.
 
-#define PRIVWRITE_MAC_IDX   (41)
 PrivWrite command index for MAC.
 
-#define PRIVWRITE_COUNT   (75)
 PrivWrite command packet size.
 
-#define PRIVWRITE_ZONE_MASK   ((uint8_t)0x40)
 PrivWrite zone bits 0 to 5 and 7 are 0.
 
-#define PRIVWRITE_MODE_ENCRYPT   ((uint8_t)0x40)
 PrivWrite mode: encrypted.
 
-#define PRIVWRITE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 PrivWrite command response packet size.
 
Definitions for the Random Command
-#define RANDOM_MODE_IDX   ATCA_PARAM1_IDX
 Random command index for mode.
 
-#define RANDOM_PARAM2_IDX   ATCA_PARAM2_IDX
 Random command index for 2. parameter.
 
-#define RANDOM_COUNT   ATCA_CMD_SIZE_MIN
 Random command packet size.
 
-#define RANDOM_SEED_UPDATE   ((uint8_t)0x00)
 Random mode for automatic seed update.
 
-#define RANDOM_NO_SEED_UPDATE   ((uint8_t)0x01)
 Random mode for no seed update.
 
-#define RANDOM_NUM_SIZE   ((uint8_t)32)
 Number of bytes in the data packet of a random command.
 
-#define RANDOM_RSP_SIZE   ATCA_RSP_SIZE_32
 Random command response packet size.
 
Definitions for the Read Command
-#define READ_ZONE_IDX   ATCA_PARAM1_IDX
 Read command index for zone.
 
-#define READ_ADDR_IDX   ATCA_PARAM2_IDX
 Read command index for address.
 
-#define READ_COUNT   ATCA_CMD_SIZE_MIN
 Read command packet size.
 
-#define READ_ZONE_MASK   ((uint8_t)0x83)
 Read zone bits 2 to 6 are 0.
 
-#define READ_4_RSP_SIZE   ATCA_RSP_SIZE_VAL
 Read command response packet size when reading 4 bytes.
 
-#define READ_32_RSP_SIZE   ATCA_RSP_SIZE_32
 Read command response packet size when reading 32 bytes.
 
Definitions for the SecureBoot Command
-#define SECUREBOOT_MODE_IDX   ATCA_PARAM1_IDX
 SecureBoot command index for mode.
 
-#define SECUREBOOT_DIGEST_SIZE   (32u)
 SecureBoot digest input size.
 
-#define SECUREBOOT_SIGNATURE_SIZE   (64u)
 SecureBoot signature input size.
 
-#define SECUREBOOT_COUNT_DIG   (ATCA_CMD_SIZE_MIN + SECUREBOOT_DIGEST_SIZE)
 SecureBoot command packet size for just a digest.
 
-#define SECUREBOOT_COUNT_DIG_SIG   (ATCA_CMD_SIZE_MIN + SECUREBOOT_DIGEST_SIZE + SECUREBOOT_SIGNATURE_SIZE)
 SecureBoot command packet size for a digest and signature.
 
-#define SECUREBOOT_MAC_SIZE   (32u)
 SecureBoot MAC output size.
 
-#define SECUREBOOT_RSP_SIZE_NO_MAC   ATCA_RSP_SIZE_MIN
 SecureBoot response packet size for no MAC.
 
-#define SECUREBOOT_RSP_SIZE_MAC   (ATCA_PACKET_OVERHEAD + SECUREBOOT_MAC_SIZE)
 SecureBoot response packet size with MAC.
 
-#define SECUREBOOT_MODE_MASK   ((uint8_t)0x07)
 SecureBoot mode mask.
 
-#define SECUREBOOT_MODE_FULL   ((uint8_t)0x05)
 SecureBoot mode Full.
 
-#define SECUREBOOT_MODE_FULL_STORE   ((uint8_t)0x06)
 SecureBoot mode FullStore.
 
-#define SECUREBOOT_MODE_FULL_COPY   ((uint8_t)0x07)
 SecureBoot mode FullCopy.
 
-#define SECUREBOOT_MODE_PROHIBIT_FLAG   ((uint8_t)0x40)
 SecureBoot mode flag to prohibit SecureBoot until next power cycle.
 
-#define SECUREBOOT_MODE_ENC_MAC_FLAG   ((uint8_t)0x80)
 SecureBoot mode flag for encrypted digest and returning validating MAC.
 
-#define SECUREBOOTCONFIG_OFFSET   (70)
 SecureBootConfig byte offset into the configuration zone.
 
-#define SECUREBOOTCONFIG_MODE_MASK   ((uint16_t)0x0003)
 Mask for SecureBootMode field in SecureBootConfig value.
 
-#define SECUREBOOTCONFIG_MODE_DISABLED   ((uint16_t)0x0000)
 Disabled SecureBootMode in SecureBootConfig value.
 
-#define SECUREBOOTCONFIG_MODE_FULL_BOTH   ((uint16_t)0x0001)
 Both digest and signature always required SecureBootMode in SecureBootConfig value.
 
-#define SECUREBOOTCONFIG_MODE_FULL_SIG   ((uint16_t)0x0002)
 Signature stored SecureBootMode in SecureBootConfig value.
 
-#define SECUREBOOTCONFIG_MODE_FULL_DIG   ((uint16_t)0x0003)
 Digest stored SecureBootMode in SecureBootConfig value.
 
Definitions for the SelfTest Command
-#define SELFTEST_MODE_IDX   ATCA_PARAM1_IDX
 SelfTest command index for mode.
 
-#define SELFTEST_COUNT   ATCA_CMD_SIZE_MIN
 SelfTest command packet size.
 
-#define SELFTEST_MODE_RNG   ((uint8_t)0x01)
 SelfTest mode RNG DRBG function.
 
-#define SELFTEST_MODE_ECDSA_SIGN_VERIFY   ((uint8_t)0x04)
 SelfTest mode ECDSA verify function.
 
-#define SELFTEST_MODE_ECDH   ((uint8_t)0x08)
 SelfTest mode ECDH function.
 
-#define SELFTEST_MODE_AES   ((uint8_t)0x10)
 SelfTest mode AES encrypt function.
 
-#define SELFTEST_MODE_SHA   ((uint8_t)0x20)
 SelfTest mode SHA function.
 
-#define SELFTEST_MODE_ALL   ((uint8_t)0x3B)
 SelfTest mode all algorithms.
 
-#define SELFTEST_RSP_SIZE   ATCA_RSP_SIZE_MIN
 SelfTest command response packet size.
 
Definitions for the SHA Command
-#define SHA_COUNT_SHORT   ATCA_CMD_SIZE_MIN
 
-#define SHA_COUNT_LONG   ATCA_CMD_SIZE_MIN
 Just a starting size.
 
-#define ATCA_SHA_DIGEST_SIZE   (32u)
 
-#define SHA_DATA_MAX   (64)
 
-#define SHA_MODE_MASK   ((uint8_t)0x07)
 Mask the bit 0-2.
 
-#define SHA_MODE_SHA256_START   ((uint8_t)0x00)
 Initialization, does not accept a message.
 
-#define SHA_MODE_SHA256_UPDATE   ((uint8_t)0x01)
 Add 64 bytes in the meesage to the SHA context.
 
-#define SHA_MODE_SHA256_END   ((uint8_t)0x02)
 Complete the calculation and return the digest.
 
-#define SHA_MODE_SHA256_PUBLIC   ((uint8_t)0x03)
 Add 64 byte ECC public key in the slot to the SHA context.
 
-#define SHA_MODE_HMAC_START   ((uint8_t)0x04)
 Initialization, HMAC calculation.
 
-#define SHA_MODE_ECC204_HMAC_START   ((uint8_t)0x03)
 Initialization, HMAC calculation for ECC204.
 
-#define SHA_MODE_HMAC_UPDATE   ((uint8_t)0x01)
 Add 64 bytes in the meesage to the SHA context.
 
-#define SHA_MODE_HMAC_END   ((uint8_t)0x05)
 Complete the HMAC computation and return digest.
 
-#define SHA_MODE_608_HMAC_END   ((uint8_t)0x02)
 Complete the HMAC computation and return digest... Different command on 608.
 
-#define SHA_MODE_ECC204_HMAC_END   ((uint8_t)0x02)
 Complete the HMAC computation and return digest... Different mode on ECC204.
 
-#define SHA_MODE_READ_CONTEXT   ((uint8_t)0x06)
 Read current SHA-256 context out of the device.
 
-#define SHA_MODE_WRITE_CONTEXT   ((uint8_t)0x07)
 Restore a SHA-256 context into the device.
 
-#define SHA_MODE_TARGET_MASK   ((uint8_t)0xC0)
 Resulting digest target location mask.
 
-#define SHA_RSP_SIZE   ATCA_RSP_SIZE_32
 SHA command response packet size.
 
-#define SHA_RSP_SIZE_SHORT   ATCA_RSP_SIZE_MIN
 SHA command response packet size only status code.
 
-#define SHA_RSP_SIZE_LONG   ATCA_RSP_SIZE_32
 SHA command response packet size.
 
Definitions for the Sign Command
-#define SIGN_MODE_IDX   ATCA_PARAM1_IDX
 Sign command index for mode.
 
-#define SIGN_KEYID_IDX   ATCA_PARAM2_IDX
 Sign command index for key id.
 
-#define SIGN_COUNT   ATCA_CMD_SIZE_MIN
 Sign command packet size.
 
-#define SIGN_MODE_MASK   ((uint8_t)0xE1)
 Sign mode bits 1 to 4 are 0.
 
-#define SIGN_MODE_INTERNAL   ((uint8_t)0x00)
 Sign mode 0: internal.
 
-#define SIGN_MODE_INVALIDATE   ((uint8_t)0x01)
 Sign mode bit 1: Signature will be used for Verify(Invalidate)
 
-#define SIGN_MODE_INCLUDE_SN   ((uint8_t)0x40)
 Sign mode bit 6: include serial number.
 
-#define SIGN_MODE_EXTERNAL   ((uint8_t)0x80)
 Sign mode bit 7: external.
 
-#define SIGN_MODE_SOURCE_MASK   ((uint8_t)0x20)
 Sign mode message source mask.
 
-#define SIGN_MODE_SOURCE_TEMPKEY   ((uint8_t)0x00)
 Sign mode message source is TempKey.
 
-#define SIGN_MODE_SOURCE_MSGDIGBUF   ((uint8_t)0x20)
 Sign mode message source is the Message Digest Buffer.
 
-#define SIGN_RSP_SIZE   ATCA_RSP_SIZE_MAX
 Sign command response packet size.
 
Definitions for the UpdateExtra Command
-#define UPDATE_MODE_IDX   ATCA_PARAM1_IDX
 UpdateExtra command index for mode.
 
-#define UPDATE_VALUE_IDX   ATCA_PARAM2_IDX
 UpdateExtra command index for new value.
 
-#define UPDATE_COUNT   ATCA_CMD_SIZE_MIN
 UpdateExtra command packet size.
 
-#define UPDATE_MODE_USER_EXTRA   ((uint8_t)0x00)
 UpdateExtra mode update UserExtra (config byte 84)
 
-#define UPDATE_MODE_SELECTOR   ((uint8_t)0x01)
 UpdateExtra mode update Selector (config byte 85)
 
-#define UPDATE_MODE_USER_EXTRA_ADD   UPDATE_MODE_SELECTOR
 UpdateExtra mode update UserExtraAdd (config byte 85)
 
-#define UPDATE_MODE_DEC_COUNTER   ((uint8_t)0x02)
 UpdateExtra mode: decrement counter.
 
-#define UPDATE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 UpdateExtra command response packet size.
 
Definitions for the Verify Command
-#define VERIFY_MODE_IDX   ATCA_PARAM1_IDX
 Verify command index for mode.
 
-#define VERIFY_KEYID_IDX   ATCA_PARAM2_IDX
 Verify command index for key id.
 
-#define VERIFY_DATA_IDX   ( 5)
 Verify command index for data.
 
-#define VERIFY_256_STORED_COUNT   ( 71)
 Verify command packet size for 256-bit key in stored mode.
 
-#define VERIFY_283_STORED_COUNT   ( 79)
 Verify command packet size for 283-bit key in stored mode.
 
-#define VERIFY_256_VALIDATE_COUNT   ( 90)
 Verify command packet size for 256-bit key in validate mode.
 
-#define VERIFY_283_VALIDATE_COUNT   ( 98)
 Verify command packet size for 283-bit key in validate mode.
 
-#define VERIFY_256_EXTERNAL_COUNT   (135)
 Verify command packet size for 256-bit key in external mode.
 
-#define VERIFY_283_EXTERNAL_COUNT   (151)
 Verify command packet size for 283-bit key in external mode.
 
-#define VERIFY_256_KEY_SIZE   ( 64)
 Verify key size for 256-bit key.
 
-#define VERIFY_283_KEY_SIZE   ( 72)
 Verify key size for 283-bit key.
 
-#define VERIFY_256_SIGNATURE_SIZE   ( 64)
 Verify signature size for 256-bit key.
 
-#define VERIFY_283_SIGNATURE_SIZE   ( 72)
 Verify signature size for 283-bit key.
 
-#define VERIFY_OTHER_DATA_SIZE   ( 19u)
 Verify size of "other data".
 
-#define VERIFY_MODE_MASK   ((uint8_t)0x07)
 Verify mode bits 3 to 7 are 0.
 
-#define VERIFY_MODE_STORED   ((uint8_t)0x00)
 Verify mode: stored.
 
-#define VERIFY_MODE_VALIDATE_EXTERNAL   ((uint8_t)0x01)
 Verify mode: validate external.
 
-#define VERIFY_MODE_EXTERNAL   ((uint8_t)0x02)
 Verify mode: external.
 
-#define VERIFY_MODE_VALIDATE   ((uint8_t)0x03)
 Verify mode: validate.
 
-#define VERIFY_MODE_INVALIDATE   ((uint8_t)0x07)
 Verify mode: invalidate.
 
-#define VERIFY_MODE_SOURCE_MASK   ((uint8_t)0x20)
 Verify mode message source mask.
 
-#define VERIFY_MODE_SOURCE_TEMPKEY   ((uint8_t)0x00)
 Verify mode message source is TempKey.
 
-#define VERIFY_MODE_SOURCE_MSGDIGBUF   ((uint8_t)0x20)
 Verify mode message source is the Message Digest Buffer.
 
-#define VERIFY_MODE_MAC_FLAG   ((uint8_t)0x80)
 Verify mode: MAC.
 
-#define VERIFY_KEY_B283   ((uint16_t)0x0000)
 Verify key type: B283.
 
-#define VERIFY_KEY_K283   ((uint16_t)0x0001)
 Verify key type: K283.
 
-#define VERIFY_KEY_P256   ((uint16_t)0x0004)
 Verify key type: P256.
 
-#define VERIFY_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Verify command response packet size.
 
-#define VERIFY_RSP_SIZE_MAC   ATCA_RSP_SIZE_32
 Verify command response packet size with validating MAC.
 
Definitions for the Write Command
-#define WRITE_ZONE_IDX   ATCA_PARAM1_IDX
 Write command index for zone.
 
-#define WRITE_ADDR_IDX   ATCA_PARAM2_IDX
 Write command index for address.
 
-#define WRITE_VALUE_IDX   ATCA_DATA_IDX
 Write command index for data.
 
-#define WRITE_MAC_VS_IDX   ( 9)
 Write command index for MAC following short data.
 
-#define WRITE_MAC_VL_IDX   (37)
 Write command index for MAC following long data.
 
-#define WRITE_MAC_SIZE   (32u)
 Write MAC size.
 
-#define WRITE_ZONE_MASK   ((uint8_t)0xC3)
 Write zone bits 2 to 5 are 0.
 
-#define WRITE_ZONE_WITH_MAC   ((uint8_t)0x40)
 Write zone bit 6: write encrypted with MAC.
 
-#define WRITE_ZONE_OTP   ((uint8_t)1)
 Write zone id OTP.
 
-#define WRITE_ZONE_DATA   ((uint8_t)2)
 Write zone id data.
 
-#define WRITE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Write command response packet size.
 
- - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atInfo (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Info method.
 
ATCA_STATUS atPause (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Pause method.
 
bool atIsSHAFamily (ATCADeviceType device_type)
 determines if a given device type is a SHA device or a superset of a SHA device
 
bool atIsECCFamily (ATCADeviceType device_type)
 determines if a given device type is an ECC device or a superset of a ECC device
 
ATCA_STATUS isATCAError (uint8_t *data)
 checks for basic error frame in data
 
void atCRC (size_t length, const uint8_t *data, uint8_t *crc_le)
 Calculates CRC over the given raw data and returns the CRC in little-endian byte order.
 
void atCalcCrc (ATCAPacket *packet)
 This function calculates CRC and adds it to the correct offset in the packet data.
 
ATCA_STATUS atCheckCrc (const uint8_t *response)
 This function checks the consistency of a response.
 
-

Detailed Description

-

Microchip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch.

-

This command object supports the ATSHA and ATECC device family. The command list is a superset of all device commands for this family. The command object differentiates the packet contents based on specific device type within the family.

+
#include "cryptoauthlib.h"
+

Detailed Description

+

CryptoAuthLib Basic API methods for CheckMAC command.

+

The CheckMac command calculates a MAC response that would have been generated on a different CryptoAuthentication device and then compares the result with input value.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
-

Function Documentation

- -

◆ atCalcCrc()

- -
-
- - - - - - - - -
void atCalcCrc (ATCAPacketpacket)
-
- -

This function calculates CRC and adds it to the correct offset in the packet data.

-
Parameters
- - -
[in]packetPacket to calculate CRC data for
-
-
- -
-
- -

◆ atCheckCrc()

- -
-
- - - - - - - - -
ATCA_STATUS atCheckCrc (const uint8_t * response)
-
- -

This function checks the consistency of a response.

-
Parameters
- - -
[in]responsepointer to response
-
-
-
Returns
ATCA_SUCCESS on success, otherwise ATCA_RX_CRC_ERROR
- -
-
- -

◆ atCRC()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
void atCRC (size_t length,
const uint8_t * data,
uint8_t * crc_le 
)
-
- -

Calculates CRC over the given raw data and returns the CRC in little-endian byte order.

-
Parameters
- - - - -
[in]lengthSize of data not including the CRC byte positions
[in]dataPointer to the data over which to compute the CRC
[out]crc_lePointer to the place where the two-bytes of CRC will be returned in little-endian byte order.
-
-
- -
-
- -

◆ atInfo()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atInfo (ATCADeviceType device_type,
ATCAPacketpacket 
)
-
- -

ATCACommand Info method.

-
Parameters
- - - -
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ atIsECCFamily()

- -
-
- - - - - - - - -
bool atIsECCFamily (ATCADeviceType device_type)
-
- -

determines if a given device type is an ECC device or a superset of a ECC device

-
Parameters
- - -
[in]device_typeType of device to check for family type
-
-
-
Returns
boolean indicating whether the given device is an ECC family device.
- -
-
- -

◆ atIsSHAFamily()

- -
-
- - - - - - - - -
bool atIsSHAFamily (ATCADeviceType device_type)
-
- -

determines if a given device type is a SHA device or a superset of a SHA device

-
Parameters
- - -
[in]device_typeType of device to check for family type
-
-
-
Returns
boolean indicating whether the given device is a SHA family device.
- -
-
- -

◆ atPause()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atPause (ATCADeviceType device_type,
ATCAPacketpacket 
)
-
- -

ATCACommand Pause method.

-
Parameters
- - - -
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ isATCAError()

- -
-
- - - - - - - - -
ATCA_STATUS isATCAError (uint8_t * data)
-
- -

checks for basic error frame in data

-
Parameters
- - -
[in]datapointer to received data - expected to be in the form of a CA device response frame
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
+
diff --git a/a00350.js b/a00350.js deleted file mode 100644 index 80790834e..000000000 --- a/a00350.js +++ /dev/null @@ -1,441 +0,0 @@ -var a00350 = -[ - [ "ATCAPacket", "a01620.html", null ], - [ "AES_COUNT", "a00350.html#a72cc5ecbdfa169d282776461ce48fda6", null ], - [ "AES_DATA_SIZE", "a00350.html#a8cbce00b91b0ddfb3264c9c367a3699a", null ], - [ "AES_INPUT_IDX", "a00350.html#afabb67121c9c58fac9829287b55a2389", null ], - [ "AES_KEYID_IDX", "a00350.html#a2809c87d994c49b53e039f752834fc97", null ], - [ "AES_MODE_DECRYPT", "a00350.html#a01cd269d08661e645b4caee850424130", null ], - [ "AES_MODE_ENCRYPT", "a00350.html#a5ebee4d7d2d30a88ded25f9a6feecc52", null ], - [ "AES_MODE_GFM", "a00350.html#a34ec73cf7504b560883a5d192fe88793", null ], - [ "AES_MODE_IDX", "a00350.html#a890e2e40916e88caf596cff43be8ab23", null ], - [ "AES_MODE_KEY_BLOCK_MASK", "a00350.html#af54068dbf6ecb7bf8b1881caa0f3b89f", null ], - [ "AES_MODE_KEY_BLOCK_POS", "a00350.html#abbbbd4cd4cc05e2ea023f059676aa37e", null ], - [ "AES_MODE_MASK", "a00350.html#a7b2f5fb4edfbf4cb719aedbd7215b863", null ], - [ "AES_MODE_OP_MASK", "a00350.html#a62c9e80674303aea5f92d76c92d30d2b", null ], - [ "AES_RSP_SIZE", "a00350.html#ab24f797b7c19e899ef753d9901850e44", null ], - [ "ATCA_ADDRESS_MASK", "a00350.html#a579676fd500ded40bc49dc53231fa658", null ], - [ "ATCA_ADDRESS_MASK_CONFIG", "a00350.html#a32d53cee52cd042a31f1adc934ad7a5a", null ], - [ "ATCA_ADDRESS_MASK_OTP", "a00350.html#a56e3f8d816e2068d80003fdee7d58763", null ], - [ "ATCA_AES", "a00350.html#a4edf9367ffdc790e886166890fc814c1", null ], - [ "ATCA_AES_GFM_SIZE", "a00350.html#a6ce84aad51d25e05139f83ac9ca2b162", null ], - [ "ATCA_AES_KEY_TYPE", "a00350.html#a8335b06c5f49c384e2c2f31861865a54", null ], - [ "ATCA_B283_KEY_TYPE", "a00350.html#a16f1550cc792fa205acef2106f2fcf54", null ], - [ "ATCA_BLOCK_SIZE", "a00350.html#aa0117f3d3f9a9ae65a3fab1e68b7caef", null ], - [ "ATCA_CA2_CONFIG_SIZE", "a00350.html#a80e6b848030f81d90fbad16844105612", null ], - [ "ATCA_CA2_CONFIG_SLOT_SIZE", "a00350.html#a3bf3b2b477944691143db26f205e7d7f", null ], - [ "ATCA_CHECKMAC", "a00350.html#a1f9bb707789dc9194b06403113c9dfaf", null ], - [ "ATCA_CHIPMODE_CLOCK_DIV_M0", "a00350.html#abe16121ea22ed08080997a2cfae1c125", null ], - [ "ATCA_CHIPMODE_CLOCK_DIV_M1", "a00350.html#aabaee03887c7e4403ac4936d9cde406e", null ], - [ "ATCA_CHIPMODE_CLOCK_DIV_M2", "a00350.html#a84f7e63b8711e799da259862b170fd75", null ], - [ "ATCA_CHIPMODE_CLOCK_DIV_MASK", "a00350.html#a09ab7fb893534775d506020643820939", null ], - [ "ATCA_CHIPMODE_I2C_ADDRESS_FLAG", "a00350.html#a74a13b4b6304a02b4e006901b6ac1de5", null ], - [ "ATCA_CHIPMODE_OFFSET", "a00350.html#a6eaf90b702c122de71a18a9b2bd43ba7", null ], - [ "ATCA_CHIPMODE_TTL_ENABLE_FLAG", "a00350.html#a10795619d6fb78965b7e78996261f6cd", null ], - [ "ATCA_CHIPMODE_WATCHDOG_LONG", "a00350.html#a9a089181beb38a1e5c5add58e96302bc", null ], - [ "ATCA_CHIPMODE_WATCHDOG_MASK", "a00350.html#a814ad478cb05af339635633cbcd495b7", null ], - [ "ATCA_CHIPMODE_WATCHDOG_SHORT", "a00350.html#ab2c08e9a862fce29e741ef2b75918a8e", null ], - [ "ATCA_CMD_SIZE_MAX", "a00350.html#a3f7b636ed69136b5e5aa6d172cfd34e9", null ], - [ "ATCA_CMD_SIZE_MIN", "a00350.html#ac978ae798bc2c020c7b8a2e5a258016e", null ], - [ "ATCA_COUNT_IDX", "a00350.html#a0aac7fbfd425112b4b1e922876532a9e", null ], - [ "ATCA_COUNT_SIZE", "a00350.html#ad410516c4b4eb448a333eb3ed1f7b288", null ], - [ "ATCA_COUNTER", "a00350.html#a9599c4331857f1daa543a31fcce650fd", null ], - [ "ATCA_CRC_SIZE", "a00350.html#a276faf364bbb0e27819842111e08842f", null ], - [ "ATCA_DATA_IDX", "a00350.html#a756539af7bcadf33dd3a9b2f60763f7a", null ], - [ "ATCA_DATA_SIZE", "a00350.html#a0b96c7eee244d44c648245421745db12", null ], - [ "ATCA_DELETE", "a00350.html#a69f659af2d835a38a13650b26a5e36d4", null ], - [ "ATCA_DERIVE_KEY", "a00350.html#ac9405ff4647b09a6d8ab7a4d8a091ee8", null ], - [ "ATCA_ECC_CONFIG_SIZE", "a00350.html#ae8b9077022cc706947fdc8b45a573d81", null ], - [ "ATCA_ECDH", "a00350.html#a06c1c02df3023d78b6b224060966460f", null ], - [ "ATCA_GENDIG", "a00350.html#a37e24393c3e995d47a09ad962b6b83de", null ], - [ "ATCA_GENKEY", "a00350.html#a17f002359b157bee44a3c071a5a206db", null ], - [ "ATCA_HMAC", "a00350.html#a36122a4f84ec0c31330c3c0458304029", null ], - [ "ATCA_INFO", "a00350.html#a0e74f12b91b93e683f27fb8b4c0bfb2f", null ], - [ "ATCA_K283_KEY_TYPE", "a00350.html#aac4e75cf70cf0cf946216ffefaf65525", null ], - [ "ATCA_KDF", "a00350.html#a1c0632a1eabc73aaebcb4c7f265b8a00", null ], - [ "ATCA_KEY_COUNT", "a00350.html#afa043ddb1952520a2bba28ac41a98f93", null ], - [ "ATCA_KEY_ID_MAX", "a00350.html#a5da5f8005c1b2612b998afcbd823c716", null ], - [ "ATCA_KEY_SIZE", "a00350.html#a66a410dde8f388c582495ba315284276", null ], - [ "ATCA_LOCK", "a00350.html#ac227802d9a5680688ac4c2b23b38273c", null ], - [ "ATCA_LOCKED", "a00350.html#af397e129e4581162f91873358b5f1538", null ], - [ "ATCA_MAC", "a00350.html#aa0843d9ec7e246455483a1fb1fdf3a07", null ], - [ "ATCA_NONCE", "a00350.html#a232e4a2b3f189cc2c3594ce5f18da3aa", null ], - [ "ATCA_OPCODE_IDX", "a00350.html#a15c3e02dd629f85722f4b74e61f3adca", null ], - [ "ATCA_OTP_BLOCK_MAX", "a00350.html#aa0eacfa4e596c3eb572753b7f5171276", null ], - [ "ATCA_OTP_SIZE", "a00350.html#a4c05f7bd221df19c5c6ad1fe1f4709be", null ], - [ "ATCA_P256_KEY_TYPE", "a00350.html#a6e53cd97c61a185ca397ebed8dc3edcb", null ], - [ "ATCA_PACKET_OVERHEAD", "a00350.html#aa569255bc251cd90cb2d0f6b710164bc", null ], - [ "ATCA_PARAM1_IDX", "a00350.html#a090c04fed9d153a97fb77195c7eb2f56", null ], - [ "ATCA_PARAM2_IDX", "a00350.html#a9e84a71fc7e3ba613779aeb8d740eb23", null ], - [ "ATCA_PAUSE", "a00350.html#a7d786006183912073939b3f62075dd27", null ], - [ "ATCA_PRIV_KEY_SIZE", "a00350.html#a3caf91c8e7ec183e0ad7b93dad9cb548", null ], - [ "ATCA_PRIVWRITE", "a00350.html#a3171c7ab4447a2e752706bed1072e694", null ], - [ "ATCA_PUB_KEY_PAD", "a00350.html#ae52318f0263884ff3a3e67328138cc75", null ], - [ "ATCA_PUB_KEY_SIZE", "a00350.html#a07089e8e8b1aa335ddfd37e591f64ebb", null ], - [ "ATCA_RANDOM", "a00350.html#ace94188e9d741a9b44616474b633064f", null ], - [ "ATCA_READ", "a00350.html#a8760372110d92cea3570a5720db05de2", null ], - [ "ATCA_RSP_DATA_IDX", "a00350.html#abaaa930c2275599fcc3d83cfc02bfafe", null ], - [ "ATCA_RSP_SIZE_16", "a00350.html#a0be09b502137446daedc43f1d3e85f86", null ], - [ "ATCA_RSP_SIZE_32", "a00350.html#afd812ab5b70a92a4d3a420c4f7106ac5", null ], - [ "ATCA_RSP_SIZE_4", "a00350.html#a15cc6f16cdb8f11b60981af7c3b15ef8", null ], - [ "ATCA_RSP_SIZE_64", "a00350.html#a5b7ad7c3c75639352af5ad3b1298500c", null ], - [ "ATCA_RSP_SIZE_72", "a00350.html#a67ca82b396385dd18790b48d731dfe15", null ], - [ "ATCA_RSP_SIZE_MAX", "a00350.html#a908aece3a9501eb14a70c2b24a3e4089", null ], - [ "ATCA_RSP_SIZE_MIN", "a00350.html#a0c738f2cc7bf063582c34188f85ddc3c", null ], - [ "ATCA_RSP_SIZE_VAL", "a00350.html#a882f14cac02df8282ccad2a43afc8a23", null ], - [ "ATCA_SECUREBOOT", "a00350.html#af4aab184dc60e2de854994d26d57dfde", null ], - [ "ATCA_SELFTEST", "a00350.html#acbec80dc1b5f24d3013c2a9b06c11bdc", null ], - [ "ATCA_SERIAL_NUM_SIZE", "a00350.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0", null ], - [ "ATCA_SHA", "a00350.html#a8e5f11692a8a23e1410d9b5ce8bebc2b", null ], - [ "ATCA_SHA_CONFIG_SIZE", "a00350.html#a1887d11853092541df18c2a04fb6b87a", null ], - [ "ATCA_SHA_KEY_TYPE", "a00350.html#ad325831ee2326885795706efd7b3b00e", null ], - [ "ATCA_SIG_SIZE", "a00350.html#a56448f81a8d04c6871b3422c496bf8b6", null ], - [ "ATCA_SIGN", "a00350.html#a516dbf4bbd2c4b366e0306890d0bca56", null ], - [ "ATCA_TEMPKEY_KEYID", "a00350.html#a988fff8295c1914217b8543b614f556c", null ], - [ "ATCA_UNLOCKED", "a00350.html#a54155caf79f004ccf0a875cf3a0ef05b", null ], - [ "ATCA_UPDATE_EXTRA", "a00350.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2", null ], - [ "ATCA_VERIFY", "a00350.html#a8e357a6e926176155fe47aba97d915fb", null ], - [ "ATCA_WORD_SIZE", "a00350.html#a555bdf8fa32d4d47577f7748ca928389", null ], - [ "ATCA_WRITE", "a00350.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771", null ], - [ "ATCA_ZONE_ENCRYPTED", "a00350.html#a167bc588244395e98461008070fee8f3", null ], - [ "ATCA_ZONE_MASK", "a00350.html#a1d6d2f2713e845ec3b3bf465025d6858", null ], - [ "ATCA_ZONE_READWRITE_32", "a00350.html#aa32b46f2c058ee54377d0cbef1ec8764", null ], - [ "CHECKMAC_CLIENT_CHALLENGE_IDX", "a00350.html#a0f2c0b2e264a88b766811fe4ea0de88f", null ], - [ "CHECKMAC_CLIENT_CHALLENGE_SIZE", "a00350.html#a3c7444c099cf0f89f754fd3cbec77bf4", null ], - [ "CHECKMAC_CLIENT_COMMAND_SIZE", "a00350.html#ad3d431e17094b6690d443e0a038da9e2", null ], - [ "CHECKMAC_CLIENT_RESPONSE_IDX", "a00350.html#a170c911bfe1a20e3572bdc5c2cd80c9d", null ], - [ "CHECKMAC_CLIENT_RESPONSE_SIZE", "a00350.html#a93cb0fdfc89b69cb1c4670f30288f2ad", null ], - [ "CHECKMAC_CMD_MATCH", "a00350.html#a09b26b691e29966bcec1513edf819efe", null ], - [ "CHECKMAC_CMD_MISMATCH", "a00350.html#a1db673cb318ec36ebd0c9c1a5ce301ad", null ], - [ "CHECKMAC_COUNT", "a00350.html#a4c998ee3d596f3006a4488bd8657df33", null ], - [ "CHECKMAC_DATA_IDX", "a00350.html#a1ba2ec2d321b3f90f53c02c7fb9711f2", null ], - [ "CHECKMAC_KEYID_IDX", "a00350.html#a4203bbb296cd67d035066979657cf979", null ], - [ "CHECKMAC_MODE_BLOCK1_TEMPKEY", "a00350.html#a9088fc1b89c3ca9b58901de000d8d55d", null ], - [ "CHECKMAC_MODE_BLOCK2_TEMPKEY", "a00350.html#a40d926e0e037fc8bb265bb19f57e5d1a", null ], - [ "CHECKMAC_MODE_CHALLENGE", "a00350.html#aaabcd1e4afb29088a17f7e87e7136e24", null ], - [ "CHECKMAC_MODE_IDX", "a00350.html#ae757542e1c4d4815e1dc8db034dca476", null ], - [ "CHECKMAC_MODE_INCLUDE_OTP_64", "a00350.html#abeef4ff866116f4e17a6c3ad94b0a286", null ], - [ "CHECKMAC_MODE_MASK", "a00350.html#a67e74cb132024711cf064ff98021d71f", null ], - [ "CHECKMAC_MODE_OUTPUT_MAC_RESPONSE", "a00350.html#a411d35690c62060ac4c39588741a808e", null ], - [ "CHECKMAC_MODE_SOURCE_FLAG_MATCH", "a00350.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad", null ], - [ "CHECKMAC_OTHER_DATA_SIZE", "a00350.html#a7c365741639a5c7dc29267a130e8d827", null ], - [ "CHECKMAC_RSP_SIZE", "a00350.html#aa44ecaa440ab845d5939333171476adf", null ], - [ "CMD_STATUS_BYTE_COMM", "a00350.html#a6a6daf9c5640ad80e7af330daad1f6ea", null ], - [ "CMD_STATUS_BYTE_ECC", "a00350.html#a44cee4dee17a7c1a2618d11e8e5774dd", null ], - [ "CMD_STATUS_BYTE_EXEC", "a00350.html#ae496c798891069e04802bbac7d96e0f5", null ], - [ "CMD_STATUS_BYTE_PARSE", "a00350.html#aef76930f6d419fc30841be04fe6ac8d6", null ], - [ "CMD_STATUS_SUCCESS", "a00350.html#a85c326c023bdc268c499eb33375f2270", null ], - [ "CMD_STATUS_WAKEUP", "a00350.html#afd20c2250b83786f216a100bde94a670", null ], - [ "COUNTER_KEYID_IDX", "a00350.html#a269bd52a7856116ebce13c1072f56d9e", null ], - [ "COUNTER_MAX_VALUE", "a00350.html#abc722de99f444668d09e3815fcc78400", null ], - [ "COUNTER_MAX_VALUE_CA2", "a00350.html#a94608e9994efbb6869e15bf1076c9899", null ], - [ "COUNTER_MODE_IDX", "a00350.html#a83a00fa1769c54aeb5ad02bdfba5b3e7", null ], - [ "COUNTER_MODE_INCREMENT", "a00350.html#aadb200c87d6dedb5768eeb8395e697c2", null ], - [ "COUNTER_MODE_MASK", "a00350.html#a7b90ca417a76facaeec91d8f2c10f860", null ], - [ "COUNTER_MODE_READ", "a00350.html#a4e3355c5ab7c48cfe466c9374ccc698e", null ], - [ "COUNTER_RSP_SIZE", "a00350.html#a66287a8b6f625f866b5cecc4845993ed", null ], - [ "COUNTER_SIZE", "a00350.html#a2addec53a2494a40b9101b78426dad2f", null ], - [ "DERIVE_KEY_COUNT_LARGE", "a00350.html#ac0386500d37b5502158a62b8d864580f", null ], - [ "DERIVE_KEY_COUNT_SMALL", "a00350.html#a3a3d3289c719d81f95b3d025a2564c9f", null ], - [ "DERIVE_KEY_MAC_IDX", "a00350.html#ac3f89b5db216fd58ae2de3ebd52e26c5", null ], - [ "DERIVE_KEY_MAC_SIZE", "a00350.html#affa79c933fa76585479228b15c2cbc83", null ], - [ "DERIVE_KEY_MODE", "a00350.html#ac6d810ee00947694d9b95d95db0b2f3c", null ], - [ "DERIVE_KEY_RANDOM_FLAG", "a00350.html#ad6f89d1bb03ed8d84e230bedca57ddd9", null ], - [ "DERIVE_KEY_RANDOM_IDX", "a00350.html#a3495c2fd81985342858bac47300bcdc8", null ], - [ "DERIVE_KEY_RSP_SIZE", "a00350.html#a766a94a7e38b558e1165b24de78d21db", null ], - [ "DERIVE_KEY_TARGETKEY_IDX", "a00350.html#a7216bb6f51f67f09e5372c7f731bf23a", null ], - [ "ECDH_KEY_SIZE", "a00350.html#aa21e10945076d803129feb07946591f9", null ], - [ "ECDH_RSP_SIZE", "a00350.html#aa667451bf2e061c3e76a7a8a5d8b86d4", null ], - [ "GENDIG_COUNT", "a00350.html#a235eb9557fa074bf152f9ce9c5844058", null ], - [ "GENDIG_DATA_IDX", "a00350.html#ac101f854026596231715eca664550e36", null ], - [ "GENDIG_KEYID_IDX", "a00350.html#ac2d5b5de26d0318ba6db3ad1055eb6ec", null ], - [ "GENDIG_RSP_SIZE", "a00350.html#a2c26247a084a027f06a2aaf692313f12", null ], - [ "GENDIG_USE_TEMPKEY_BIT", "a00350.html#ab1be0c05faf7ef0c161f34cb6b0c4e28", null ], - [ "GENDIG_ZONE_CONFIG", "a00350.html#a9cab0c5dd2e3796497a5237f101f19e0", null ], - [ "GENDIG_ZONE_COUNTER", "a00350.html#a84f07835d69fed7484299c78f4971a3e", null ], - [ "GENDIG_ZONE_DATA", "a00350.html#abc21880360bdce990ad724fa7a7d9bf0", null ], - [ "GENDIG_ZONE_IDX", "a00350.html#ab79b57111a49362bd51922813cb84355", null ], - [ "GENDIG_ZONE_KEY_CONFIG", "a00350.html#aba61a1bd245d7471e59a39577498065b", null ], - [ "GENDIG_ZONE_OTP", "a00350.html#aee95b219cf932dfedb3a3c5e23d01a9d", null ], - [ "GENDIG_ZONE_SHARED_NONCE", "a00350.html#a49923a8835f64294a5e9b3660c80dc7e", null ], - [ "GENKEY_COUNT", "a00350.html#ab6782a07fce203169aba6dd32f8ab123", null ], - [ "GENKEY_COUNT_DATA", "a00350.html#a07289de41178ecfb6392da31e31e27c3", null ], - [ "GENKEY_DATA_IDX", "a00350.html#a9163acda5dd0653f40b6ad445f2c972d", null ], - [ "GENKEY_KEYID_IDX", "a00350.html#a5cacc01be37cebf35e300be96893477e", null ], - [ "GENKEY_MODE_DIGEST", "a00350.html#a609531b6e844f5a9eebd7c4dcd869b16", null ], - [ "GENKEY_MODE_IDX", "a00350.html#af120353f5e8e159eaa9c930555b159d5", null ], - [ "GENKEY_MODE_MAC", "a00350.html#ae7b4dae38c2b38b25e43dc7ff4959764", null ], - [ "GENKEY_MODE_MASK", "a00350.html#aa3984c137090a2d103b2089c7ac31642", null ], - [ "GENKEY_MODE_PRIVATE", "a00350.html#adc25fc4bebaac1582bb57d791f72356d", null ], - [ "GENKEY_MODE_PUBKEY_DIGEST", "a00350.html#a8d9a1e331d54bffb36f7b4e97af5d161", null ], - [ "GENKEY_MODE_PUBLIC", "a00350.html#a03e556ba7849f28ee8c58df8921cba66", null ], - [ "GENKEY_OTHER_DATA_SIZE", "a00350.html#a62644ffb962c56fbea154526a2a84b40", null ], - [ "GENKEY_PRIVATE_TO_TEMPKEY", "a00350.html#ad5b1ead29f3ce3cee52d106af531ab86", null ], - [ "GENKEY_RSP_SIZE_LONG", "a00350.html#a08e8a80be2717ece7c5ed5cc0a27fbab", null ], - [ "GENKEY_RSP_SIZE_SHORT", "a00350.html#a0543a644422ffc7460eeeb78799bde16", null ], - [ "HMAC_COUNT", "a00350.html#a041d4cd845319ea0a693a1c4008b2a06", null ], - [ "HMAC_DIGEST_SIZE", "a00350.html#acd5976f898b9f67ea8e21df4e27fb712", null ], - [ "HMAC_KEYID_IDX", "a00350.html#a23673926f1dd2464bd20f6512985d855", null ], - [ "HMAC_MODE_FLAG_FULLSN", "a00350.html#a564f52346bfc03bdd50aa7d03974efe7", null ], - [ "HMAC_MODE_FLAG_OTP64", "a00350.html#a62261a1c6f121c296dce7e0f697c9a4a", null ], - [ "HMAC_MODE_FLAG_OTP88", "a00350.html#a34be98ca6fb22f331eb62cfc4104ded6", null ], - [ "HMAC_MODE_FLAG_TK_NORAND", "a00350.html#ac3b1177210ba941afa527bacbcfd4fab", null ], - [ "HMAC_MODE_FLAG_TK_RAND", "a00350.html#a08326ee33be4faaec3be800e80c1cc17", null ], - [ "HMAC_MODE_IDX", "a00350.html#adf58a677811566e8446870523bb65850", null ], - [ "HMAC_MODE_MASK", "a00350.html#a8250b0997534871fdd6ead1c3aa220ba", null ], - [ "HMAC_RSP_SIZE", "a00350.html#adec1fd29e8c6b2f804fc4050778dafc8", null ], - [ "INFO_COUNT", "a00350.html#aee1a29942cf2b3637a65506dc6b5d4fe", null ], - [ "INFO_DRIVER_STATE_MASK", "a00350.html#a9cc740e22e15f08a8b90873a2b3b47e8", null ], - [ "INFO_MODE_CHIP_STATUS", "a00350.html#ad792a3c825c32832a9b6292bfe028d32", null ], - [ "INFO_MODE_GPIO", "a00350.html#a30e8f8f4027e2137c11c2fb49b4c2aa6", null ], - [ "INFO_MODE_KEY_VALID", "a00350.html#a6f746e9967643e3234727eaa5a0b274b", null ], - [ "INFO_MODE_LOCK_STATUS", "a00350.html#a1cfd78a07f649bda6cf3b7de35804a90", null ], - [ "INFO_MODE_MAX", "a00350.html#a249c12b69d65f6c33568c78b9d9b127d", null ], - [ "INFO_MODE_REVISION", "a00350.html#ae591dd29af805fc5b63e5b06d5e7c450", null ], - [ "INFO_MODE_STATE", "a00350.html#a7432ca6b291e32e962fabaa6d604a8bc", null ], - [ "INFO_MODE_VOL_KEY_PERMIT", "a00350.html#ac0fb0edb797b754a069e12931a001257", null ], - [ "INFO_NO_STATE", "a00350.html#ad5b035b6f65f87b7fdf75f225a54ce35", null ], - [ "INFO_OUTPUT_STATE_MASK", "a00350.html#a2b70682af491ce76c45505cabafcf9c0", null ], - [ "INFO_PARAM1_IDX", "a00350.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac", null ], - [ "INFO_PARAM2_IDX", "a00350.html#a09e4830c78dedfa2ce662e0fdbe430e3", null ], - [ "INFO_PARAM2_LATCH_CLEAR", "a00350.html#a027d5e8ae4a55db4ae52a41f3214c861", null ], - [ "INFO_PARAM2_LATCH_SET", "a00350.html#aae24f308513ed54fc7c41b39bc05760b", null ], - [ "INFO_PARAM2_SET_LATCH_STATE", "a00350.html#a5dcc70feddb0b97c6fa779c6c3c819e6", null ], - [ "INFO_RSP_SIZE", "a00350.html#a0c667e3f6590ac12726cbf4ad2b0f4f5", null ], - [ "INFO_SIZE", "a00350.html#a70457c61d44fbac0cb48727f53c39388", null ], - [ "KDF_DETAILS_AES_KEY_LOC_MASK", "a00350.html#a77a516ab645b681ad7861d8b74e4a115", null ], - [ "KDF_DETAILS_HKDF_MSG_LOC_INPUT", "a00350.html#ae2b34b443ce2e0f285dd8d6f34f84d70", null ], - [ "KDF_DETAILS_HKDF_MSG_LOC_IV", "a00350.html#a53650471a7eef96ce0ef00cb6b8a6a9b", null ], - [ "KDF_DETAILS_HKDF_MSG_LOC_MASK", "a00350.html#aa5b4cb5be95861466fff33fe0d5a9020", null ], - [ "KDF_DETAILS_HKDF_MSG_LOC_SLOT", "a00350.html#a8d5f52e7dbb1ea5308517365bbec87b5", null ], - [ "KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY", "a00350.html#abae30386c46658676cf11de7bec27138", null ], - [ "KDF_DETAILS_HKDF_ZERO_KEY", "a00350.html#ae16e61d55b371f9c5e31f08f680de609", null ], - [ "KDF_DETAILS_IDX", "a00350.html#a56306fca73ae0f43053787bafdac6a94", null ], - [ "KDF_DETAILS_PRF_AEAD_MASK", "a00350.html#a71bd7b920718c3bbf99d78eda569018c", null ], - [ "KDF_DETAILS_PRF_AEAD_MODE0", "a00350.html#a77402cc8f4efbba6119bd57717c34ce4", null ], - [ "KDF_DETAILS_PRF_AEAD_MODE1", "a00350.html#a696c55d8590e9d1ac2571d6921f27573", null ], - [ "KDF_DETAILS_PRF_KEY_LEN_16", "a00350.html#af83ceba3654b1b76e216402a023c1578", null ], - [ "KDF_DETAILS_PRF_KEY_LEN_32", "a00350.html#aadcf0e639c6da291ddcb7fed49f1f967", null ], - [ "KDF_DETAILS_PRF_KEY_LEN_48", "a00350.html#aae92bdb9d72ad6bd2193cbf0e672d46e", null ], - [ "KDF_DETAILS_PRF_KEY_LEN_64", "a00350.html#a1519bbd506095c4db25aad15bbc0735b", null ], - [ "KDF_DETAILS_PRF_KEY_LEN_MASK", "a00350.html#af42b60e97bdf4bf0338b8a5ce420fdc5", null ], - [ "KDF_DETAILS_PRF_TARGET_LEN_32", "a00350.html#ac049629a826435702055cc8279db76bb", null ], - [ "KDF_DETAILS_PRF_TARGET_LEN_64", "a00350.html#a0b47a5e9928b7f3c91db64a9b80fde8b", null ], - [ "KDF_DETAILS_PRF_TARGET_LEN_MASK", "a00350.html#a32c642907f4f326893fb6fccfce18707", null ], - [ "KDF_DETAILS_SIZE", "a00350.html#a2e025044ab9693b267e79f80e0a69cb1", null ], - [ "KDF_KEYID_IDX", "a00350.html#ae814b4e63476d137bf226537cb2ff0fc", null ], - [ "KDF_MODE_ALG_AES", "a00350.html#aee08925a21e8dbf05f8557617e3f610e", null ], - [ "KDF_MODE_ALG_HKDF", "a00350.html#a59b230043c3cd1fa0deafac6225238cb", null ], - [ "KDF_MODE_ALG_MASK", "a00350.html#a90f529642e87edae132421b3777ec4b1", null ], - [ "KDF_MODE_ALG_PRF", "a00350.html#a41ad765834ce2cf37241f79b80857f79", null ], - [ "KDF_MODE_IDX", "a00350.html#a959e54d571acf81b608d5c6d535b0510", null ], - [ "KDF_MODE_SOURCE_ALTKEYBUF", "a00350.html#aa3f4cdb700e47737058c174a1f156707", null ], - [ "KDF_MODE_SOURCE_MASK", "a00350.html#addd73b0088cc98d40eaf8b3370f2fc8e", null ], - [ "KDF_MODE_SOURCE_SLOT", "a00350.html#a3b69501fcc3e0cea0197fc0f6107916a", null ], - [ "KDF_MODE_SOURCE_TEMPKEY", "a00350.html#a43cad9606d9b7c0e5875b1fa66108eb8", null ], - [ "KDF_MODE_SOURCE_TEMPKEY_UP", "a00350.html#a3785654ccbe309a87213aedb001ca39d", null ], - [ "KDF_MODE_TARGET_ALTKEYBUF", "a00350.html#afeaf2094813c3184f0f128c37e3297dd", null ], - [ "KDF_MODE_TARGET_MASK", "a00350.html#a97828be629e8f11561b58cb434c18b21", null ], - [ "KDF_MODE_TARGET_OUTPUT", "a00350.html#afa19443ca4e054e38a7599c37575678d", null ], - [ "KDF_MODE_TARGET_OUTPUT_ENC", "a00350.html#a28cccb87be4305fa9469c26b0ca341e8", null ], - [ "KDF_MODE_TARGET_SLOT", "a00350.html#a05c0e401be347897d9573ba58492e570", null ], - [ "KDF_MODE_TARGET_TEMPKEY", "a00350.html#abdbb7fc88ccf13d556dce6de3df9ce1b", null ], - [ "KDF_MODE_TARGET_TEMPKEY_UP", "a00350.html#ad7e0df789060db2a9e8339972eac2482", null ], - [ "LOCK_COUNT", "a00350.html#a8a5cce3cbccf46b91c8065559ad1a082", null ], - [ "LOCK_RSP_SIZE", "a00350.html#a773dce573d9ff453d2f49aa7fc48e210", null ], - [ "LOCK_SUMMARY_IDX", "a00350.html#a6bd6b85614792b8dabb6432f7a48151e", null ], - [ "LOCK_ZONE_CA2_CONFIG", "a00350.html#a28d91425d00258aed31192c90f3dbd2e", null ], - [ "LOCK_ZONE_CA2_DATA", "a00350.html#ac06e8b2502bc78fda0d33dcd3e11525a", null ], - [ "LOCK_ZONE_CONFIG", "a00350.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39", null ], - [ "LOCK_ZONE_DATA", "a00350.html#a1dedbfae86a6c38085070160696e00bb", null ], - [ "LOCK_ZONE_DATA_SLOT", "a00350.html#af5a93b147dd08b111b348edd1bc82fa5", null ], - [ "LOCK_ZONE_IDX", "a00350.html#aa72601de2238c09393f120f68abf66a4", null ], - [ "LOCK_ZONE_MASK", "a00350.html#a71b3c35d021e0ac507fdd6cd9538467f", null ], - [ "LOCK_ZONE_NO_CRC", "a00350.html#a29b582e5069538ee92f5bcd6d1356255", null ], - [ "MAC_CHALLENGE_IDX", "a00350.html#a427e37c74bad23b251deb2274de6d703", null ], - [ "MAC_CHALLENGE_SIZE", "a00350.html#a921afead5f0a35822bc8263c3a1e1761", null ], - [ "MAC_COUNT_LONG", "a00350.html#aa466dfdf174c134a11f578d1731990ef", null ], - [ "MAC_COUNT_SHORT", "a00350.html#a94d9bf52f1a6c7af3943eb92dd3967ef", null ], - [ "MAC_KEYID_IDX", "a00350.html#adb6b7f50e3d8af5d2de64f3bd4c83332", null ], - [ "MAC_MODE_BLOCK1_TEMPKEY", "a00350.html#a1ed0d355896761d1cfef4d3b225fefae", null ], - [ "MAC_MODE_BLOCK2_TEMPKEY", "a00350.html#aaf599e8acc392c2ef07eba93eafc474d", null ], - [ "MAC_MODE_CHALLENGE", "a00350.html#a876298788a9270561dc279b7d4c92cb8", null ], - [ "MAC_MODE_IDX", "a00350.html#a4b1f89e4c4a24c058fddb3d936e76017", null ], - [ "MAC_MODE_INCLUDE_OTP_64", "a00350.html#a0bd9324a824410d7787c6fcd6e29d8a2", null ], - [ "MAC_MODE_INCLUDE_OTP_88", "a00350.html#ae5da70c1f37ee40a0cf4edc459d5840a", null ], - [ "MAC_MODE_INCLUDE_SN", "a00350.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5", null ], - [ "MAC_MODE_MASK", "a00350.html#a6e6b931cf58debb1a23b87c16c7b4d47", null ], - [ "MAC_MODE_PASSTHROUGH", "a00350.html#a41beaf29ad684f5fae6046c689d6bcf1", null ], - [ "MAC_MODE_PTNONCE_TEMPKEY", "a00350.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2", null ], - [ "MAC_MODE_SOURCE_FLAG_MATCH", "a00350.html#adffd78899cf3d3dd18afc5ce3c54acb4", null ], - [ "MAC_RSP_SIZE", "a00350.html#a1e34a5e5e8b86355569f958ecbaff3d4", null ], - [ "MAC_SIZE", "a00350.html#a4c987156ced719bbcf398ab6c76289c0", null ], - [ "NONCE_COUNT_LONG", "a00350.html#a9a7fddf245cba834f86e0b63f2b14dc1", null ], - [ "NONCE_COUNT_LONG_64", "a00350.html#aaffdf30ca558bdd5f772578742835306", null ], - [ "NONCE_COUNT_SHORT", "a00350.html#acff2b897c994e1444f8e94e638c25c74", null ], - [ "NONCE_INPUT_IDX", "a00350.html#a98721952094435f45bffa352dd6848ad", null ], - [ "NONCE_MODE_GEN_SESSION_KEY", "a00350.html#a447491c6888534a69d8f3a5b446396f8", null ], - [ "NONCE_MODE_IDX", "a00350.html#a97ca81334088c297c577f4b4aaced3cf", null ], - [ "NONCE_MODE_INPUT_LEN_32", "a00350.html#af7ee0188ab539a350a6da19fe3f34a72", null ], - [ "NONCE_MODE_INPUT_LEN_64", "a00350.html#a54f085984c6aaf826263a755fd3243d7", null ], - [ "NONCE_MODE_INPUT_LEN_MASK", "a00350.html#ad83ef570608a572d2dd99e6954e14d40", null ], - [ "NONCE_MODE_INVALID", "a00350.html#a7c675071c7fd650a29594c5fcc9882a1", null ], - [ "NONCE_MODE_MASK", "a00350.html#a98be7c54d55328daa4390a816c9bb243", null ], - [ "NONCE_MODE_NO_SEED_UPDATE", "a00350.html#ae3f2d180d7f35d9a7876a28972f2f587", null ], - [ "NONCE_MODE_PASSTHROUGH", "a00350.html#a6132b175668ba4d6efecca5986c007c0", null ], - [ "NONCE_MODE_SEED_UPDATE", "a00350.html#a798018a4ef489e8fb0a02b5edf7e9d55", null ], - [ "NONCE_MODE_TARGET_ALTKEYBUF", "a00350.html#a8ad263b7b321311a57db7600f18a555f", null ], - [ "NONCE_MODE_TARGET_MASK", "a00350.html#ab887d70e4a421cf2bcab6b77feba4134", null ], - [ "NONCE_MODE_TARGET_MSGDIGBUF", "a00350.html#a071a95b4b2048e0d879e6e13984e38fd", null ], - [ "NONCE_MODE_TARGET_TEMPKEY", "a00350.html#ac51f4a863e071bce52c995ddae7e2144", null ], - [ "NONCE_NUMIN_SIZE", "a00350.html#ad0c3da8203a3be6755e86cda96e00228", null ], - [ "NONCE_NUMIN_SIZE_PASSTHROUGH", "a00350.html#ab568e0ec9f976d91d7940c227e8d73ee", null ], - [ "NONCE_PARAM2_IDX", "a00350.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0", null ], - [ "NONCE_RSP_SIZE_LONG", "a00350.html#a7ae9dcc07ca9d990e9db6d8949ac935a", null ], - [ "NONCE_RSP_SIZE_SHORT", "a00350.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675", null ], - [ "NONCE_ZERO_CALC_MASK", "a00350.html#a99bca33105a872e8a20fe199cc17219b", null ], - [ "NONCE_ZERO_CALC_RANDOM", "a00350.html#a80b8b54f333be5a587f22e2d04812de6", null ], - [ "NONCE_ZERO_CALC_TEMPKEY", "a00350.html#a2a2b74db24609199702267614fc31990", null ], - [ "OUTNONCE_SIZE", "a00350.html#ad742aca4fbd1b833423eeb7ce90a6743", null ], - [ "PAUSE_COUNT", "a00350.html#aa914251d0e03f7d1850ee04296715f14", null ], - [ "PAUSE_PARAM2_IDX", "a00350.html#ad74ed86697c0977d4e0a2451068b7131", null ], - [ "PAUSE_RSP_SIZE", "a00350.html#a5859f9a2eb99b4636c894705047e9344", null ], - [ "PAUSE_SELECT_IDX", "a00350.html#a49f538b630cc416a8ad1f6d784e3a1e4", null ], - [ "PRIVWRITE_COUNT", "a00350.html#a17980d6743441fa2afd71523006ae058", null ], - [ "PRIVWRITE_KEYID_IDX", "a00350.html#a4aa5b68bbd7847f53444608615653832", null ], - [ "PRIVWRITE_MAC_IDX", "a00350.html#a20afccf35c609f05a3d7dc70687baa2e", null ], - [ "PRIVWRITE_MODE_ENCRYPT", "a00350.html#afa24177621a8a2fbe041ef0ce73a414d", null ], - [ "PRIVWRITE_RSP_SIZE", "a00350.html#aa66ad8429261c1ba13d064d660d6d464", null ], - [ "PRIVWRITE_VALUE_IDX", "a00350.html#ab65b17098ebc6027a9240ca84c07ab5c", null ], - [ "PRIVWRITE_ZONE_IDX", "a00350.html#a376a70cf087e157cbb914d9ca2e5b989", null ], - [ "PRIVWRITE_ZONE_MASK", "a00350.html#aba7cf525ec69429e947f294361e1cdab", null ], - [ "RANDOM_COUNT", "a00350.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0", null ], - [ "RANDOM_MODE_IDX", "a00350.html#ac846e3f7c924497d70254125dae38dce", null ], - [ "RANDOM_NO_SEED_UPDATE", "a00350.html#a444d3fe4302ca95080d919dc89b1bc52", null ], - [ "RANDOM_NUM_SIZE", "a00350.html#a2197c0ad6c0fbf1c801228de9bf0d2ab", null ], - [ "RANDOM_PARAM2_IDX", "a00350.html#a3f54bd6d53a687ae3660196497e8faa1", null ], - [ "RANDOM_RSP_SIZE", "a00350.html#aeb7623b070997b65f0bb108abf8e5f44", null ], - [ "RANDOM_SEED_UPDATE", "a00350.html#af12673d4006ff926c863b2d0f9038561", null ], - [ "READ_32_RSP_SIZE", "a00350.html#ad79706b7b1e6c0e0d29afe692d8d5c06", null ], - [ "READ_4_RSP_SIZE", "a00350.html#a041cfaec382d0a67dcfe36d43332da48", null ], - [ "READ_ADDR_IDX", "a00350.html#af9f464ac4065aff75f5967933725d665", null ], - [ "READ_COUNT", "a00350.html#ad222baf9301d2d35a5c928a0d91c4335", null ], - [ "READ_ZONE_IDX", "a00350.html#ae273cfc99b8538b3c81ba8240a6ff425", null ], - [ "READ_ZONE_MASK", "a00350.html#acf9c81ae1249f3c174ec75cf65517176", null ], - [ "RSA2048_KEY_SIZE", "a00350.html#aeb3783d1cdf4f9c1217d030bc0386fad", null ], - [ "SECUREBOOT_COUNT_DIG", "a00350.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e", null ], - [ "SECUREBOOT_COUNT_DIG_SIG", "a00350.html#abd28a29107703b43a734301acf491f5c", null ], - [ "SECUREBOOT_DIGEST_SIZE", "a00350.html#a9257968de99742ec468463a72588820f", null ], - [ "SECUREBOOT_MAC_SIZE", "a00350.html#aed2edebc2be522d7bb38f85d273406f9", null ], - [ "SECUREBOOT_MODE_ENC_MAC_FLAG", "a00350.html#abf2bad62bab02224f51d67f6725575a4", null ], - [ "SECUREBOOT_MODE_FULL", "a00350.html#a122f4b7b9f1011c04385a7caccc2d536", null ], - [ "SECUREBOOT_MODE_FULL_COPY", "a00350.html#a3d287922c127b599204ea3bc64d4a825", null ], - [ "SECUREBOOT_MODE_FULL_STORE", "a00350.html#a2aac76b15694b82fda038e127d152297", null ], - [ "SECUREBOOT_MODE_IDX", "a00350.html#a7ff1918de6f8238ba4f67d9368e3587d", null ], - [ "SECUREBOOT_MODE_MASK", "a00350.html#aac36b471fe92c252dd02a9d1cc2c65e2", null ], - [ "SECUREBOOT_MODE_PROHIBIT_FLAG", "a00350.html#a2d04ced68d56c0db40b93b767de02089", null ], - [ "SECUREBOOT_RSP_SIZE_MAC", "a00350.html#a3db7049de685080f046f0b4221de461b", null ], - [ "SECUREBOOT_RSP_SIZE_NO_MAC", "a00350.html#ab4657866a69a00b9b3bfa4df51521fa6", null ], - [ "SECUREBOOT_SIGNATURE_SIZE", "a00350.html#a51bd4fe709f11b3b50f47c2fb18976ca", null ], - [ "SECUREBOOTCONFIG_MODE_DISABLED", "a00350.html#a76bf5d4ce89c95c658328fe8e66669e7", null ], - [ "SECUREBOOTCONFIG_MODE_FULL_BOTH", "a00350.html#a2b86bf6731827368bf66eec960c35a32", null ], - [ "SECUREBOOTCONFIG_MODE_FULL_DIG", "a00350.html#a9b7c3aca6168b52321e1951893efa050", null ], - [ "SECUREBOOTCONFIG_MODE_FULL_SIG", "a00350.html#a43bb6027c548274980a3ba42bdef51c9", null ], - [ "SECUREBOOTCONFIG_MODE_MASK", "a00350.html#a0c9c951895abf02992e41c617702c2ea", null ], - [ "SECUREBOOTCONFIG_OFFSET", "a00350.html#ad10e2a3c801be9002d53af14357dbe9f", null ], - [ "SELFTEST_COUNT", "a00350.html#a2aba96712a9932d61146c43289e9d808", null ], - [ "SELFTEST_MODE_AES", "a00350.html#a91ebd87544ccdab3670cfbec8d23bd4a", null ], - [ "SELFTEST_MODE_ALL", "a00350.html#a1ef61cb184d3ff5ef2f8bf9db6521888", null ], - [ "SELFTEST_MODE_ECDH", "a00350.html#a01d7437a14fd35ccc926168fb4ca2ca7", null ], - [ "SELFTEST_MODE_ECDSA_SIGN_VERIFY", "a00350.html#afbd09beedecedcf316a6c02e40d1e712", null ], - [ "SELFTEST_MODE_IDX", "a00350.html#aa16bfad9cb883d258befaacadb3385ef", null ], - [ "SELFTEST_MODE_RNG", "a00350.html#acd9a7a2257f664a4f9f674d37eb95bef", null ], - [ "SELFTEST_MODE_SHA", "a00350.html#afab9546447cf1e0020c32d298a1d897f", null ], - [ "SELFTEST_RSP_SIZE", "a00350.html#a7599639f80f3ac2a0d22f2857138cb87", null ], - [ "SHA_COUNT_LONG", "a00350.html#ada37181a648dd51b374eec1cbb4bbaa3", null ], - [ "SHA_MODE_608_HMAC_END", "a00350.html#a625604e07a0618bd7d514faee5e42fba", null ], - [ "SHA_MODE_ECC204_HMAC_END", "a00350.html#a90fa979b13088478c8bcf8fd7a6bb541", null ], - [ "SHA_MODE_ECC204_HMAC_START", "a00350.html#a41b6da4df887f3d2d38c26b49168d779", null ], - [ "SHA_MODE_HMAC_END", "a00350.html#aeb307ed9134e0fa2f0fcbdaf7b01515d", null ], - [ "SHA_MODE_HMAC_START", "a00350.html#abbfeec0d0247336b8c6e993d4db17d11", null ], - [ "SHA_MODE_HMAC_UPDATE", "a00350.html#a2071156124a692a5f2a5c764c923f731", null ], - [ "SHA_MODE_MASK", "a00350.html#a612cbf6171e9a0a176e0bd2844f49528", null ], - [ "SHA_MODE_READ_CONTEXT", "a00350.html#ac7e5a54695b8bd9e5087ebb94df70b39", null ], - [ "SHA_MODE_SHA256_END", "a00350.html#a0e98e55c91c7559f57fdef4c9969c188", null ], - [ "SHA_MODE_SHA256_PUBLIC", "a00350.html#a0f2fc749d3d196477b22cbceee856dfb", null ], - [ "SHA_MODE_SHA256_START", "a00350.html#ad42195362cd7dca0acabc8739c9a6fc4", null ], - [ "SHA_MODE_SHA256_UPDATE", "a00350.html#a05ece414a0596ec9bb75c0ca8ca731dc", null ], - [ "SHA_MODE_TARGET_MASK", "a00350.html#a70f88a123587c96ad7affc1e5dae9002", null ], - [ "SHA_MODE_WRITE_CONTEXT", "a00350.html#a7b7c499931480a88f6a106644c3d2185", null ], - [ "SHA_RSP_SIZE", "a00350.html#a8a5a586bdb0194be827417658836bf9c", null ], - [ "SHA_RSP_SIZE_LONG", "a00350.html#ae5ad3c81d0b62f4b86a4a0dc84a79134", null ], - [ "SHA_RSP_SIZE_SHORT", "a00350.html#a74490b179b34f9925e9fe00675e53713", null ], - [ "SIGN_COUNT", "a00350.html#aabff3f5b7f5391c27a0329ff0c997264", null ], - [ "SIGN_KEYID_IDX", "a00350.html#a02f20fbee84fe680d94b94a2b2828040", null ], - [ "SIGN_MODE_EXTERNAL", "a00350.html#a9b6844bb107f02832a6d827b8c5b0fda", null ], - [ "SIGN_MODE_IDX", "a00350.html#ae7cfb9eb789137f5ea9195a7a4f6b11e", null ], - [ "SIGN_MODE_INCLUDE_SN", "a00350.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116", null ], - [ "SIGN_MODE_INTERNAL", "a00350.html#aced5221c0f15440eb52fa9f460956443", null ], - [ "SIGN_MODE_INVALIDATE", "a00350.html#a1acc7b9af9cf3c6c556bd910ce4f239b", null ], - [ "SIGN_MODE_MASK", "a00350.html#a88cc1851cedb6f2a73df4618dbc0b165", null ], - [ "SIGN_MODE_SOURCE_MASK", "a00350.html#a35246a9bad0d77d26b59b542928c9e34", null ], - [ "SIGN_MODE_SOURCE_MSGDIGBUF", "a00350.html#a1a38e9575eb4f714377889ce5270e60b", null ], - [ "SIGN_MODE_SOURCE_TEMPKEY", "a00350.html#a73670681360e1272aa13d1359e7bb275", null ], - [ "SIGN_RSP_SIZE", "a00350.html#a66dba5e06f73c5df37c9d18409185f4d", null ], - [ "UPDATE_COUNT", "a00350.html#aac8020f191ca7ce2b1a81fcede9b5aa2", null ], - [ "UPDATE_MODE_DEC_COUNTER", "a00350.html#a023880ad2167cc0d6cefb7f747b73c92", null ], - [ "UPDATE_MODE_IDX", "a00350.html#abec02770ab378eea5c604269dc8c024a", null ], - [ "UPDATE_MODE_SELECTOR", "a00350.html#a81bab82e6be63d8186b26bb9c3b8732c", null ], - [ "UPDATE_MODE_USER_EXTRA", "a00350.html#abe02b5e0e9bb8cb4c2a727549c14ae55", null ], - [ "UPDATE_MODE_USER_EXTRA_ADD", "a00350.html#a5884f043019e78838621ba2402a8cc95", null ], - [ "UPDATE_RSP_SIZE", "a00350.html#aabf82974c18252bcd0c48ee99af75dfb", null ], - [ "UPDATE_VALUE_IDX", "a00350.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799", null ], - [ "VERIFY_256_EXTERNAL_COUNT", "a00350.html#aae43276ff3f774ffd928ad1776592c7b", null ], - [ "VERIFY_256_KEY_SIZE", "a00350.html#add994f7919c2f2b076f25ff207432686", null ], - [ "VERIFY_256_SIGNATURE_SIZE", "a00350.html#ae56700f2b05067288af3cc4af8e7f34d", null ], - [ "VERIFY_256_STORED_COUNT", "a00350.html#a0b7d56888416e08f1ff67252072e3cea", null ], - [ "VERIFY_256_VALIDATE_COUNT", "a00350.html#a677e57736342aed3a7a40704b82895d9", null ], - [ "VERIFY_283_EXTERNAL_COUNT", "a00350.html#a1a551775820d79c59f49068140e40f1b", null ], - [ "VERIFY_283_KEY_SIZE", "a00350.html#af0cca41df253e49372d6853d4f5c406b", null ], - [ "VERIFY_283_SIGNATURE_SIZE", "a00350.html#a47f281930ad5bc31576ccd06e913563f", null ], - [ "VERIFY_283_STORED_COUNT", "a00350.html#a3f7d34f0bcacd6c816c2b51cd13f5364", null ], - [ "VERIFY_283_VALIDATE_COUNT", "a00350.html#ab09e6f726235fba47a2ea3f49cbfc2cb", null ], - [ "VERIFY_DATA_IDX", "a00350.html#a15623038b9b0b4b51243691fe15253e2", null ], - [ "VERIFY_KEY_B283", "a00350.html#a4c6b67a2a6193a1e317b6ef16ca3fca6", null ], - [ "VERIFY_KEY_K283", "a00350.html#ad2eacbf59056d95e69b60f21beaafcb1", null ], - [ "VERIFY_KEY_P256", "a00350.html#a94fc1ff3975c056868a169b1b836f920", null ], - [ "VERIFY_KEYID_IDX", "a00350.html#a868d5d7ce0451e1c8f95f16092cfbc97", null ], - [ "VERIFY_MODE_EXTERNAL", "a00350.html#af3729ff16ba78ef4a6b70c341e81c749", null ], - [ "VERIFY_MODE_IDX", "a00350.html#a896cc15df167f9a04f7e4f84de2bc7d2", null ], - [ "VERIFY_MODE_INVALIDATE", "a00350.html#ab45a164ee20c8320318a3bc5e2eaa31f", null ], - [ "VERIFY_MODE_MAC_FLAG", "a00350.html#af3461e50ec2b06201d17feee167e0a4b", null ], - [ "VERIFY_MODE_MASK", "a00350.html#ac892dbe1953c43e7e17b1d51ce967c9e", null ], - [ "VERIFY_MODE_SOURCE_MASK", "a00350.html#a3d6ae4ea1e385c2f7521495b53715a3f", null ], - [ "VERIFY_MODE_SOURCE_MSGDIGBUF", "a00350.html#a1b104109ce8d8c8a99484bc52d58460a", null ], - [ "VERIFY_MODE_SOURCE_TEMPKEY", "a00350.html#ad5c40b78682251cb07855e58bcf29f82", null ], - [ "VERIFY_MODE_STORED", "a00350.html#a1da616e68f89a90e6fa3c920b4708fe2", null ], - [ "VERIFY_MODE_VALIDATE", "a00350.html#adb7f53410523734e4c9485f2d71e7791", null ], - [ "VERIFY_MODE_VALIDATE_EXTERNAL", "a00350.html#a8f38093650cd530f44dc59e6eb78fa3d", null ], - [ "VERIFY_OTHER_DATA_SIZE", "a00350.html#a5a4ff6025fa5d4d936ededc78be16e47", null ], - [ "VERIFY_RSP_SIZE", "a00350.html#ac75be9d5426dcf6ee196a788a35ee54b", null ], - [ "VERIFY_RSP_SIZE_MAC", "a00350.html#ace51b2a4dc8622ac3c03780dc369355e", null ], - [ "WRITE_ADDR_IDX", "a00350.html#a2d9e0bcb5ccf94f140b1cd519f407ffa", null ], - [ "WRITE_MAC_SIZE", "a00350.html#a3b8fb940e149c6fb29801ef573cc6311", null ], - [ "WRITE_MAC_VL_IDX", "a00350.html#a9c08115363fb521e9fee60849046f820", null ], - [ "WRITE_MAC_VS_IDX", "a00350.html#a203996620baf9cdf0aa01dd719e02d06", null ], - [ "WRITE_RSP_SIZE", "a00350.html#af0ac761b64981003336d72c34df3d2e3", null ], - [ "WRITE_VALUE_IDX", "a00350.html#a5cdd382afc6d46da59de60fb35abd611", null ], - [ "WRITE_ZONE_DATA", "a00350.html#ae80ecfb4c696095b5627988cc7c9cde0", null ], - [ "WRITE_ZONE_IDX", "a00350.html#a8cbed81461d4e4c4991c50629b3a5bcd", null ], - [ "WRITE_ZONE_MASK", "a00350.html#aacd5623cd6f8eb12e7cdf22941f501dc", null ], - [ "WRITE_ZONE_OTP", "a00350.html#a830d379174b47b466f5de16fe3345182", null ], - [ "WRITE_ZONE_WITH_MAC", "a00350.html#ac02ad2aea02f18d833e6e0631ae839ad", null ], - [ "atCalcCrc", "a00350.html#aff659b1042abf6e1376e38ccb4a20f3e", null ], - [ "atCheckCrc", "a00350.html#a7723a58d1781b3ba54e8f45d5729b33a", null ], - [ "atCRC", "a00350.html#a53ded4ed630b6ef4d292056c2e6b34f6", null ], - [ "atInfo", "a00350.html#a640d3cfd0f5b41f50cea0b987094d8a1", null ], - [ "atIsECCFamily", "a00350.html#ae82dca54cc3fd1cc2f1671e98d64df07", null ], - [ "atIsSHAFamily", "a00350.html#aae5866a78d2f0464b04eee9ef1f97030", null ], - [ "atPause", "a00350.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8", null ], - [ "isATCAError", "a00350.html#ae41108996848638519849163e51cd10a", null ] -]; \ No newline at end of file diff --git a/a00353.html b/a00353.html index 64443d28a..e5de587aa 100644 --- a/a00353.html +++ b/a00353.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_config_check.h File Reference +CryptoAuthLib: calib_command.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,409 +98,298 @@
-
calib_config_check.h File Reference
+Functions
+
calib_command.c File Reference
-

Consistency checks for configuration options. +

Microchip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface. More...

-
#include "atca_config_check.h"
-#include "crypto/crypto_sw_config_check.h"
+
#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + +

-Macros

-#define CALIB_SHA204_EN   DEFAULT_ENABLED
 
-#define CALIB_SHA206_EN   DEFAULT_ENABLED
 
-#define CALIB_ECC108_EN   DEFAULT_DISABLED
 
-#define CALIB_ECC508_EN   DEFAULT_ENABLED
 
-#define CALIB_ECC608_EN   DEFAULT_ENABLED
 
-#define CALIB_ECC204_EN   DEFAULT_ENABLED
 
-#define CALIB_TA010_EN   DEFAULT_ENABLED
 
-#define CALIB_SHA104_EN   DEFAULT_ENABLED
 
-#define CALIB_SHA105_EN   DEFAULT_ENABLED
 
-#define CALIB_FULL_FEATURE   (CALIB_SHA204_EN || CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN)
 
-#define CALIB_ECC_SUPPORT   (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN || CALIB_ECC204_EN || CALIB_TA010_EN)
 
-#define CALIB_CA2_SUPPORT   (CALIB_ECC204_EN || CALIB_TA010_EN || CALIB_SHA104_EN || CALIB_SHA105_EN)
 
-#define CALIB_CA2_CERT_SUPPORT   (CALIB_ECC204_EN || CALIB_TA010_EN)
 
-#define CALIB_SHA206_ONLY   (CALIB_SHA206_EN && !(CALIB_FULL_FEATURE || ATCA_CA2_SUPPORT))
 
-#define DEFAULT_CA_MAX_PACKET_SIZE   (198u)
 
-#define CA_MAX_PACKET_SIZE   (DEFAULT_CA_MAX_PACKET_SIZE)
 
-#define CALIB_AES_EN   (ATCAB_AES_EN && CALIB_ECC608_EN)
 
-#define CALIB_AES_GCM_EN   (ATCAB_AES_GCM_EN && CALIB_AES_EN && CALIB_ECC608_EN)
 
-#define CALIB_CHECKMAC_EN   (ATCAB_CHECKMAC_EN && (CALIB_FULL_FEATURE || CALIB_SHA105_EN))
 
-#define CALIB_COUNTER_EN   (ATCAB_COUNTER_EN && (CALIB_ECC_SUPPORT || CALIB_SHA104_EN || CALIB_SHA105_EN))
 
-#define CALIB_DELETE_EN   (DEFAULT_DISABLED)
 
-#define CALIB_DERIVEKEY_EN   (ATCAB_DERIVEKEY_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
 
-#define CALIB_ECDH_EN   (ATCAB_ECDH_EN && (CALIB_ECC508_EN || CALIB_ECC608_EN))
 
-#define CALIB_ECDH_ENC_EN   (ATCAB_ECDH_ENC_EN && (CALIB_ECC508_EN || CALIB_ECC608_EN))
 
-#define CALIB_GENDIG_EN   (ATCAB_GENDIG_EN && (CALIB_FULL_FEATURE || CALIB_SHA105_EN))
 
-#define CALIB_GENDIVKEY_EN   (ATCAB_GENDIG_EN && CALIB_SHA105_EN)
 
-#define CALIB_GENKEY_EN   (ATCAB_GENKEY_EN && CALIB_ECC_SUPPORT)
 
-#define CALIB_GENKEY_MAC_EN   (ATCAB_GENKEY_MAC_EN && CALIB_ECC_SUPPORT)
 
-#define CALIB_HMAC_EN   (ATCAB_HMAC_EN && (CALIB_SHA204_EN || CALIB_ECC108_EN || CALIB_ECC508_EN))
 
#define CALIB_INFO_LATCH_EN   ATCAB_INFO_LATCH_EN
 
-#define CALIB_KDF_EN   (ATCAB_KDF_EN && CALIB_ECC608_EN)
 
#define CALIB_LOCK_EN   (ATCAB_LOCK_EN && CALIB_FULL_FEATURE)
 
#define CALIB_LOCK_CA2_EN   (ATCAB_LOCK_EN && ATCA_CA2_SUPPORT)
 
-#define CALIB_MAC_EN   (ATCAB_MAC_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN || CALIB_SHA104_EN))
 
-#define CALIB_NONCE_EN   (ATCAB_NONCE_EN && (CALIB_FULL_FEATURE || CALIB_CA2_SUPPORT))
 
-#define CALIB_PRIVWRITE_EN   (ATCAB_PRIVWRITE_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
 
-#define CALIB_RANDOM_EN   (ATCAB_RANDOM_EN && CALIB_FULL_FEATURE)
 
#define CALIB_READ_EN   (ATCAB_READ_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
 
-#define CALIB_READ_CA2_EN   (ATCAB_READ_EN && CALIB_CA2_SUPPORT)
 
-#define CALIB_READ_ENC_EN   (ATCAB_READ_ENC_EN && CALIB_FULL_FEATURE)
 
-#define CALIB_SECUREBOOT_EN   (ATCAB_SECUREBOOT_EN && CALIB_ECC608_EN)
 
-#define CALIB_SECUREBOOT_MAC_EN   (ATCAB_SECUREBOOT_MAC_EN && CALIB_ECC608_EN)
 
-#define CALIB_SELFTEST_EN   (ATCAB_SELFTEST_EN && (CALIB_ECC608_EN || CALIB_CA2_SUPPORT))
 
#define CALIB_SHA_EN   (ATCAB_SHA_EN && (CALIB_FULL_FEATURE || CALIB_CA2_SUPPORT))
 
#define CALIB_SHA_HMAC_EN   (ATCAB_SHA_HMAC_EN && CALIB_ECC_SUPPORT)
 
#define CALIB_SHA_CONTEXT_EN   (ATCAB_SHA_CONTEXT_EN && CALIB_ECC608_EN)
 
#define CALIB_SIGN_EN   (ATCAB_SIGN_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
 
#define CALIB_SIGN_CA2_EN   (ATCAB_SIGN_EN && (CALIB_ECC204_EN || CALIB_TA010_EN))
 
-#define CALIB_SIGN_INTERNAL_EN   (ATCAB_SIGN_INTERNAL_EN && CALIB_SIGN_EN)
 
#define CALIB_UPDATEEXTRA_EN   (ATCAB_UPDATEEXTRA_EN && CALIB_FULL_FEATURE)
 
#define CALIB_VERIFY_EN   (ATCAB_VERIFY_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
 
#define CALIB_VERIFY_MAC_EN   (ATCAB_VERIFY_MAC_EN && CALIB_ECC608_EN)
 
-#define CALIB_VERIFY_EXTERN_EN   (ATCAB_VERIFY_EXTERN_EN && CALIB_VERIFY_EN)
 
#define CALIB_VERIFY_STORED_EN   (ATCAB_VERIFY_STORED_EN && CALIB_VERIFY_EN)
 
-#define CALIB_VERIFY_VALIDATE_EN   (ATCAB_VERIFY_VALIDATE_EN && CALIB_VERIFY_EN)
 
-#define CALIB_WRITE_EN   (ATCAB_WRITE_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
 
#define CALIB_WRITE_ENC_EN   (ATCAB_WRITE_ENC_EN && CALIB_FULL_FEATURE)
 
-#define CALIB_WRITE_CA2_EN   (ATCAB_WRITE_EN && CALIB_CA2_SUPPORT)
 

+Functions

ATCA_STATUS atInfo (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Info method.
 
ATCA_STATUS atPause (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Pause method.
 
void atCRC (size_t length, const uint8_t *data, uint8_t *crc_le)
 Calculates CRC over the given raw data and returns the CRC in little-endian byte order.
 
void atCalcCrc (ATCAPacket *packet)
 This function calculates CRC and adds it to the correct offset in the packet data.
 
ATCA_STATUS atCheckCrc (const uint8_t *response)
 This function checks the consistency of a response.
 
bool atIsSHAFamily (ATCADeviceType device_type)
 determines if a given device type is a SHA device or a superset of a SHA device
 
bool atIsECCFamily (ATCADeviceType device_type)
 determines if a given device type is an ECC device or a superset of a ECC device
 
ATCA_STATUS isATCAError (uint8_t *data)
 checks for basic error frame in data
 

Detailed Description

-

Consistency checks for configuration options.

- -

Macro Definition Documentation

- -

◆ CALIB_INFO_LATCH_EN

+

Microchip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface.

+

The primary goal of the command builder is to wrap the given parameters with the correct packet size and CRC. The caller should first fill in the parameters required in the ATCAPacket parameter given to the command. The command builder will deal with the mechanics of creating a valid packet using the parameter information.

+ +

Function Documentation

+ +

◆ atCalcCrc()

- + + + + +
#define CALIB_INFO_LATCH_EN   ATCAB_INFO_LATCH_ENvoid atCalcCrc (ATCAPacketpacket)
-

Supported API's: calib_info_get_latch calib_info_set_latch

-

ECC204 specific api: calib_info_lock_status

+ +

This function calculates CRC and adds it to the correct offset in the packet data.

+
Parameters
+ + +
[in]packetPacket to calculate CRC data for
+
+
- -

◆ CALIB_LOCK_CA2_EN

+ +

◆ atCheckCrc()

- + + + + +
#define CALIB_LOCK_CA2_EN   (ATCAB_LOCK_EN && ATCA_CA2_SUPPORT)ATCA_STATUS atCheckCrc (const uint8_t * response)
-

Enable CALIB_LOCK_CA2_EN which enables the lock command for the ecc204 and ta010 devices

-

Supported API's: calib_lock

+ +

This function checks the consistency of a response.

+
Parameters
+ + +
[in]responsepointer to response
+
+
+
Returns
ATCA_SUCCESS on success, otherwise ATCA_RX_CRC_ERROR
- -

◆ CALIB_LOCK_EN

+ +

◆ atCRC()

- + + + + -
#define CALIB_LOCK_EN   (ATCAB_LOCK_EN && CALIB_FULL_FEATURE)void atCRC (size_t length,
-
-

Enable CALIB_LOCK_EN to enable the lock commands for the classic cryptoauth parts

-

Supported API's: calib_lock

- -
-
- -

◆ CALIB_READ_EN

- -
-
- - + + + + -
#define CALIB_READ_EN   (ATCAB_READ_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))const uint8_t * data,
-
-

Enable CALIB_READ_EN which enables the read commands

-

Supported API's: calib_read_zone

- -
-
- -

◆ CALIB_SHA_CONTEXT_EN

- -
-
- - + + + + -
#define CALIB_SHA_CONTEXT_EN   (ATCAB_SHA_CONTEXT_EN && CALIB_ECC608_EN)uint8_t * crc_le 
-
-

Requires: CALIB_SHA_BASE

-

Use the SHA command to compute an HMAC/SHA-256 operation

-

Supported API's: calib_sha_read_context

- -
-
- -

◆ CALIB_SHA_EN

- -
-
- - + + +
#define CALIB_SHA_EN   (ATCAB_SHA_EN && (CALIB_FULL_FEATURE || CALIB_CA2_SUPPORT)))
-

Enable CALIB_SHA_EN to compute a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system

-

Supported API's: calib_sha_base

+ +

Calculates CRC over the given raw data and returns the CRC in little-endian byte order.

+
Parameters
+ + + + +
[in]lengthSize of data not including the CRC byte positions
[in]dataPointer to the data over which to compute the CRC
[out]crc_lePointer to the place where the two-bytes of CRC will be returned in little-endian byte order.
+
+
- -

◆ CALIB_SHA_HMAC_EN

+ +

◆ atInfo()

- + + + + -
#define CALIB_SHA_HMAC_EN   (ATCAB_SHA_HMAC_EN && CALIB_ECC_SUPPORT)ATCA_STATUS atInfo (ATCADeviceType device_type,
-
-

Requires: CALIB_SHA_HMAC CALIB_SHA_BASE

-

Use the SHA command to compute an HMAC/SHA-256 operation

-

Supported API's: calib_sha_hmac,calib_sha_hmac_init, calib_sha_hmac_update, calib_sha_hmac_finish

- -
-
- -

◆ CALIB_SIGN_CA2_EN

- -
-
- - + + + + -
#define CALIB_SIGN_CA2_EN   (ATCAB_SIGN_EN && (CALIB_ECC204_EN || CALIB_TA010_EN))ATCAPacketpacket 
-
-

Enable CALIB_SIGN_CA2_EN to generate a signature using the ECDSA algorithm

-

Supported API's: calib_sign_base

- -
-
- -

◆ CALIB_SIGN_EN

- -
-
- - + + +
#define CALIB_SIGN_EN   (ATCAB_SIGN_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN)))
-

Enable CALIB_SIGN_EN to generate a signature using the ECDSA algorithm

-

Supported API's: calib_sign

+ +

ATCACommand Info method.

+
Parameters
+ + + +
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
+
+
+
Returns
ATCA_SUCCESS
- -

◆ CALIB_UPDATEEXTRA_EN

+ +

◆ atIsECCFamily()

- + + + + +
#define CALIB_UPDATEEXTRA_EN   (ATCAB_UPDATEEXTRA_EN && CALIB_FULL_FEATURE)bool atIsECCFamily (ATCADeviceType device_type)
-

Enable CALIB_UPDATEEXTRA_EN to update the values of the two extra bytes within the configuration zone (bytes 84 and 85)

-

Supported API's: calib_updateextra

+ +

determines if a given device type is an ECC device or a superset of a ECC device

+
Parameters
+ + +
[in]device_typeType of device to check for family type
+
+
+
Returns
boolean indicating whether the given device is an ECC family device.
- -

◆ CALIB_VERIFY_EN

+ +

◆ atIsSHAFamily()

- + + + + +
#define CALIB_VERIFY_EN   (ATCAB_VERIFY_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))bool atIsSHAFamily (ATCADeviceType device_type)
-

Enable CALIB_VERIFY_EN which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command

-

Supported API's: calib_verify

+ +

determines if a given device type is a SHA device or a superset of a SHA device

+
Parameters
+ + +
[in]device_typeType of device to check for family type
+
+
+
Returns
boolean indicating whether the given device is a SHA family device.
- -

◆ CALIB_VERIFY_MAC_EN

+ +

◆ atPause()

- + + + + -
#define CALIB_VERIFY_MAC_EN   (ATCAB_VERIFY_MAC_EN && CALIB_ECC608_EN)ATCA_STATUS atPause (ATCADeviceType device_type,
-
-

Requires: CALIB_NONCE_MODE_ENCODING CALIB_NONCE_BASE ATCAH_VERIFY_MAC ATCAC_SW_SHA2_256 CALIB_VERIFY

-

Executes verification command with verification MAC for the External or Stored Verify modes

-

Supported API's: calib_verify_extern_stored_mac, calib_verify_extern_mac, calib_verify_stored_mac

- -
-
- -

◆ CALIB_VERIFY_STORED_EN

- -
-
- - + + + + + + + + +
#define CALIB_VERIFY_STORED_EN   (ATCAB_VERIFY_STORED_EN && CALIB_VERIFY_EN)ATCAPacketpacket 
)
-

Requires: CALIB_NONCE_MODE_ENCODING CALIB_NONCE_BASE CALIB_VERIFY

-

Verifies a signature (ECDSA verify operation) with a public key stored in the device

-

Supported API's: calib_verify_stored

+ +

ATCACommand Pause method.

+
Parameters
+ + + +
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
+
+
+
Returns
ATCA_SUCCESS
- -

◆ CALIB_WRITE_ENC_EN

+ +

◆ isATCAError()

- + + + + +
#define CALIB_WRITE_ENC_EN   (ATCAB_WRITE_ENC_EN && CALIB_FULL_FEATURE)ATCA_STATUS isATCAError (uint8_t * data)
-

Requires: CALIB_NONCE_MODE_ENCODING CALIB_NONCE_BASE CALIB_READ_ZONE CALIB_GENDIG ATCAH_GENDIG ATCAH_WRITE_AUTH_MAC ATCAH_NONCE ATCAC_SW_SHA2_256 CALIB_WRITE ATCAH_GEN_SESSION_KEY

-

Performs an encrypted write of a 32 byte block into given slot

-

Supported API's: calib_write_enc

+ +

checks for basic error frame in data

+
Parameters
+ + +
[in]datapointer to received data - expected to be in the form of a CA device response frame
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
@@ -509,7 +398,7 @@

diff --git a/a00353.js b/a00353.js index 6e53dda10..be4d3d6b8 100644 --- a/a00353.js +++ b/a00353.js @@ -1,17 +1,11 @@ var a00353 = [ - [ "CALIB_INFO_LATCH_EN", "a00353.html#af19794adbeec8b57eb7cbef1f9e21c91", null ], - [ "CALIB_LOCK_CA2_EN", "a00353.html#a611611e20ca91cad7e9897847b9b355a", null ], - [ "CALIB_LOCK_EN", "a00353.html#a3801cb49b78666a9cfa602fa74b22da9", null ], - [ "CALIB_READ_EN", "a00353.html#a67ed014df4e1bbbea873ede0e9700e29", null ], - [ "CALIB_SHA_CONTEXT_EN", "a00353.html#a84c51bc36228a8fadd8654bfaae5d58c", null ], - [ "CALIB_SHA_EN", "a00353.html#a467882792e9ea53b4e596d1be05997a6", null ], - [ "CALIB_SHA_HMAC_EN", "a00353.html#ab13bbafe02599813084788482536728f", null ], - [ "CALIB_SIGN_CA2_EN", "a00353.html#ac629bf5f0b5d6c64c5393cadd7b7479c", null ], - [ "CALIB_SIGN_EN", "a00353.html#a9802710200f050b0e9414bd88cdd8c0d", null ], - [ "CALIB_UPDATEEXTRA_EN", "a00353.html#ab46a8196f24bde7c86ac5e3affdc8ff8", null ], - [ "CALIB_VERIFY_EN", "a00353.html#a671b3421327a5c885b0c3e6e1e64afe7", null ], - [ "CALIB_VERIFY_MAC_EN", "a00353.html#ac419953cd10efa4bef6e4efdc9c6cbe9", null ], - [ "CALIB_VERIFY_STORED_EN", "a00353.html#ae841eeabdfbe04dd3241f6fde1a57954", null ], - [ "CALIB_WRITE_ENC_EN", "a00353.html#a64cbcf66a79f024ae3cce06d1f6731f9", null ] + [ "atCalcCrc", "a00353.html#aff659b1042abf6e1376e38ccb4a20f3e", null ], + [ "atCheckCrc", "a00353.html#a7723a58d1781b3ba54e8f45d5729b33a", null ], + [ "atCRC", "a00353.html#a53ded4ed630b6ef4d292056c2e6b34f6", null ], + [ "atInfo", "a00353.html#a640d3cfd0f5b41f50cea0b987094d8a1", null ], + [ "atIsECCFamily", "a00353.html#ae82dca54cc3fd1cc2f1671e98d64df07", null ], + [ "atIsSHAFamily", "a00353.html#aae5866a78d2f0464b04eee9ef1f97030", null ], + [ "atPause", "a00353.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8", null ], + [ "isATCAError", "a00353.html#ae41108996848638519849163e51cd10a", null ] ]; \ No newline at end of file diff --git a/a00356.html b/a00356.html index 03cd6a0ab..78d055358 100644 --- a/a00356.html +++ b/a00356.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_counter.c File Reference +CryptoAuthLib: calib_command.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,2151 @@
-
calib_counter.c File Reference
+ +
calib_command.h File Reference
-

CryptoAuthLib Basic API methods for Counter command. +

Microchip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for Counter command.

-

The Counter command reads or increments the binary count value for one of the two monotonic counters

-
Note
List of devices that support this command - ATECC508A and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+
#include <stddef.h>
+#include "calib_config_check.h"
+
+ + + +

+Data Structures

struct  ATCAPacket
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Macros

+#define ATCA_CMD_SIZE_MIN   (7u)
 minimum number of bytes in command (from count byte to second CRC byte)
 
+#define ATCA_CMD_SIZE_MAX   ((uint8_t)4 * 36 + 7)
 maximum size of command packet (Verify)
 
+#define CMD_STATUS_SUCCESS   ((uint8_t)0x00)
 status byte for success
 
+#define CMD_STATUS_WAKEUP   ((uint8_t)0x11)
 status byte after wake-up
 
+#define CMD_STATUS_BYTE_PARSE   ((uint8_t)0x03)
 command parse error
 
+#define CMD_STATUS_BYTE_ECC   ((uint8_t)0x05)
 command ECC error
 
+#define CMD_STATUS_BYTE_EXEC   ((uint8_t)0x0F)
 command execution error
 
+#define CMD_STATUS_BYTE_COMM   ((uint8_t)0xFF)
 communication error
 
Opcodes for Crypto Authentication device commands
+#define ATCA_CHECKMAC   ((uint8_t)0x28)
 CheckMac command op-code.
 
+#define ATCA_DERIVE_KEY   ((uint8_t)0x1C)
 DeriveKey command op-code.
 
+#define ATCA_INFO   ((uint8_t)0x30)
 Info command op-code.
 
+#define ATCA_GENDIG   ((uint8_t)0x15)
 GenDig command op-code.
 
+#define ATCA_GENKEY   ((uint8_t)0x40)
 GenKey command op-code.
 
+#define ATCA_HMAC   ((uint8_t)0x11)
 HMAC command op-code.
 
+#define ATCA_LOCK   ((uint8_t)0x17)
 Lock command op-code.
 
+#define ATCA_MAC   ((uint8_t)0x08)
 MAC command op-code.
 
+#define ATCA_NONCE   ((uint8_t)0x16)
 Nonce command op-code.
 
+#define ATCA_PAUSE   ((uint8_t)0x01)
 Pause command op-code.
 
+#define ATCA_PRIVWRITE   ((uint8_t)0x46)
 PrivWrite command op-code.
 
+#define ATCA_RANDOM   ((uint8_t)0x1B)
 Random command op-code.
 
+#define ATCA_READ   ((uint8_t)0x02)
 Read command op-code.
 
+#define ATCA_SIGN   ((uint8_t)0x41)
 Sign command op-code.
 
+#define ATCA_UPDATE_EXTRA   ((uint8_t)0x20)
 UpdateExtra command op-code.
 
+#define ATCA_VERIFY   ((uint8_t)0x45)
 GenKey command op-code.
 
+#define ATCA_WRITE   ((uint8_t)0x12)
 Write command op-code.
 
+#define ATCA_ECDH   ((uint8_t)0x43)
 ECDH command op-code.
 
+#define ATCA_COUNTER   ((uint8_t)0x24)
 Counter command op-code.
 
+#define ATCA_DELETE   ((uint8_t)0x13)
 Delete command op-code.
 
+#define ATCA_SHA   ((uint8_t)0x47)
 SHA command op-code.
 
+#define ATCA_AES   ((uint8_t)0x51)
 AES command op-code.
 
+#define ATCA_KDF   ((uint8_t)0x56)
 KDF command op-code.
 
+#define ATCA_SECUREBOOT   ((uint8_t)0x80)
 Secure Boot command op-code.
 
+#define ATCA_SELFTEST   ((uint8_t)0x77)
 Self test command op-code.
 
Definitions of Data and Packet Sizes
+#define ATCA_BLOCK_SIZE   (32u)
 size of a block
 
+#define ATCA_WORD_SIZE   (4u)
 size of a word
 
+#define ATCA_PUB_KEY_PAD   (4u)
 size of the public key pad
 
+#define ATCA_SERIAL_NUM_SIZE   (9u)
 number of bytes in the device serial number
 
+#define ATCA_RSP_SIZE_VAL   ((uint8_t)7)
 size of response packet containing four bytes of data
 
+#define ATCA_KEY_COUNT   (16u)
 number of keys
 
+#define ATCA_ECC_CONFIG_SIZE   (128u)
 size of configuration zone
 
+#define ATCA_SHA_CONFIG_SIZE   (88u)
 size of configuration zone
 
+#define ATCA_CA2_CONFIG_SIZE   (64u)
 size of ECC204 configuration zone
 
+#define ATCA_CA2_CONFIG_SLOT_SIZE   (16u)
 size of ECC204 configuration slot size
 
+#define ATCA_OTP_SIZE   (64u)
 size of OTP zone
 
+#define ATCA_DATA_SIZE   (ATCA_KEY_COUNT * ATCA_KEY_SIZE)
 size of data zone
 
+#define ATCA_AES_GFM_SIZE   ATCA_BLOCK_SIZE
 size of GFM data
 
+#define ATCA_CHIPMODE_OFFSET   (19u)
 ChipMode byte offset within the configuration zone.
 
+#define ATCA_CHIPMODE_I2C_ADDRESS_FLAG   ((uint8_t)0x01)
 ChipMode I2C Address in UserExtraAdd flag.
 
+#define ATCA_CHIPMODE_TTL_ENABLE_FLAG   ((uint8_t)0x02)
 ChipMode TTLenable flag.
 
+#define ATCA_CHIPMODE_WATCHDOG_MASK   ((uint8_t)0x04)
 ChipMode watchdog duration mask.
 
+#define ATCA_CHIPMODE_WATCHDOG_SHORT   ((uint8_t)0x00)
 ChipMode short watchdog (~1.3s)
 
+#define ATCA_CHIPMODE_WATCHDOG_LONG   ((uint8_t)0x04)
 ChipMode long watchdog (~13s)
 
+#define ATCA_CHIPMODE_CLOCK_DIV_MASK   ((uint8_t)0xF8)
 ChipMode clock divider mask.
 
+#define ATCA_CHIPMODE_CLOCK_DIV_M0   ((uint8_t)0x00)
 ChipMode clock divider M0.
 
+#define ATCA_CHIPMODE_CLOCK_DIV_M1   ((uint8_t)0x28)
 ChipMode clock divider M1.
 
+#define ATCA_CHIPMODE_CLOCK_DIV_M2   ((uint8_t)0x68)
 ChipMode clock divider M2.
 
+#define ATCA_COUNT_SIZE   (1u)
 Number of bytes in the command packet Count.
 
+#define ATCA_CRC_SIZE   (2u)
 Number of bytes in the command packet CRC.
 
+#define ATCA_PACKET_OVERHEAD   (ATCA_COUNT_SIZE + ATCA_CRC_SIZE)
 Number of bytes in the command packet.
 
+#define ATCA_PUB_KEY_SIZE   (64u)
 size of a p256 public key
 
+#define ATCA_PRIV_KEY_SIZE   (32u)
 size of a p256 private key
 
+#define ATCA_SIG_SIZE   (64u)
 size of a p256 signature
 
+#define ATCA_KEY_SIZE   (32u)
 size of a symmetric SHA key
 
+#define RSA2048_KEY_SIZE   (256u)
 size of a RSA private key
 
+#define ATCA_RSP_SIZE_MIN   ((uint8_t)4)
 minimum number of bytes in response
 
+#define ATCA_RSP_SIZE_4   ((uint8_t)7)
 size of response packet containing 4 bytes data
 
+#define ATCA_RSP_SIZE_72   ((uint8_t)75)
 size of response packet containing 64 bytes data
 
+#define ATCA_RSP_SIZE_64   ((uint8_t)67)
 size of response packet containing 64 bytes data
 
+#define ATCA_RSP_SIZE_32   (35u)
 size of response packet containing 32 bytes data
 
+#define ATCA_RSP_SIZE_16   ((uint8_t)19)
 size of response packet containing 16 bytes data
 
+#define ATCA_RSP_SIZE_MAX   ((uint8_t)75)
 maximum size of response packet (GenKey and Verify command)
 
+#define OUTNONCE_SIZE   (32u)
 Size of the OutNonce response expected from several commands.
 
Definitions for Command Parameter Ranges
+#define ATCA_KEY_ID_MAX   ((uint8_t)15)
 maximum value for key id
 
+#define ATCA_OTP_BLOCK_MAX   ((uint8_t)1)
 maximum value for OTP block
 
Definitions for Indexes Common to All Commands
+#define ATCA_COUNT_IDX   (0)
 command packet index for count
 
+#define ATCA_OPCODE_IDX   (1)
 command packet index for op-code
 
+#define ATCA_PARAM1_IDX   (2)
 command packet index for first parameter
 
+#define ATCA_PARAM2_IDX   (3)
 command packet index for second parameter
 
+#define ATCA_DATA_IDX   (5)
 command packet index for data load
 
+#define ATCA_RSP_DATA_IDX   (1u)
 buffer index of data in response
 
Definitions for Zone and Address Parameters
+#define ATCA_ZONE_MASK   ((uint8_t)0x03)
 Zone mask.
 
+#define ATCA_ZONE_ENCRYPTED   ((uint8_t)0x40)
 Zone bit 6 set: Write is encrypted with an unlocked data zone.
 
+#define ATCA_ZONE_READWRITE_32   ((uint8_t)0x80)
 Zone bit 7 set: Access 32 bytes, otherwise 4 bytes.
 
+#define ATCA_ADDRESS_MASK_CONFIG   ((uint16_t)0x001F)
 Address bits 5 to 7 are 0 for Configuration zone.
 
+#define ATCA_ADDRESS_MASK_OTP   ((uint16_t)0x000F)
 Address bits 4 to 7 are 0 for OTP zone.
 
+#define ATCA_ADDRESS_MASK   ((uint16_t)0x007F)
 Address bit 7 to 15 are always 0.
 
+#define ATCA_TEMPKEY_KEYID   ((uint16_t)0xFFFF)
 KeyID when referencing TempKey.
 
Definitions for Key types
+#define ATCA_B283_KEY_TYPE   0
 B283 NIST ECC key.
 
+#define ATCA_K283_KEY_TYPE   1
 K283 NIST ECC key.
 
+#define ATCA_P256_KEY_TYPE   4
 P256 NIST ECC key.
 
+#define ATCA_AES_KEY_TYPE   6
 AES-128 Key.
 
+#define ATCA_SHA_KEY_TYPE   7
 SHA key or other data.
 
Definitions for the AES Command
+#define AES_MODE_IDX   ATCA_PARAM1_IDX
 AES command index for mode.
 
+#define AES_KEYID_IDX   ATCA_PARAM2_IDX
 AES command index for key id.
 
+#define AES_INPUT_IDX   ATCA_DATA_IDX
 AES command index for input data.
 
+#define AES_COUNT   (23u)
 AES command packet size.
 
+#define AES_MODE_MASK   ((uint8_t)0xC7)
 AES mode bits 3 to 5 are 0.
 
+#define AES_MODE_KEY_BLOCK_MASK   ((uint8_t)0xC0)
 AES mode mask for key block field.
 
+#define AES_MODE_OP_MASK   ((uint8_t)0x07)
 AES mode operation mask.
 
+#define AES_MODE_ENCRYPT   ((uint8_t)0x00)
 AES mode: Encrypt.
 
+#define AES_MODE_DECRYPT   ((uint8_t)0x01)
 AES mode: Decrypt.
 
+#define AES_MODE_GFM   ((uint8_t)0x03)
 AES mode: GFM calculation.
 
+#define AES_MODE_KEY_BLOCK_POS   (6u)
 Bit shift for key block in mode.
 
+#define AES_DATA_SIZE   (16u)
 size of AES encrypt/decrypt data
 
+#define AES_RSP_SIZE   ATCA_RSP_SIZE_16
 AES command response packet size.
 
Definitions for the CheckMac Command
+#define CHECKMAC_MODE_IDX   ATCA_PARAM1_IDX
 CheckMAC command index for mode.
 
+#define CHECKMAC_KEYID_IDX   ATCA_PARAM2_IDX
 CheckMAC command index for key identifier.
 
+#define CHECKMAC_CLIENT_CHALLENGE_IDX   ATCA_DATA_IDX
 CheckMAC command index for client challenge.
 
+#define CHECKMAC_CLIENT_RESPONSE_IDX   (37u)
 CheckMAC command index for client response.
 
+#define CHECKMAC_DATA_IDX   (69u)
 CheckMAC command index for other data.
 
+#define CHECKMAC_COUNT   (84u)
 CheckMAC command packet size.
 
+#define CHECKMAC_MODE_CHALLENGE   ((uint8_t)0x00)
 CheckMAC mode 0: first SHA block from key id.
 
+#define CHECKMAC_MODE_BLOCK2_TEMPKEY   ((uint8_t)0x01)
 CheckMAC mode bit 0: second SHA block from TempKey.
 
+#define CHECKMAC_MODE_BLOCK1_TEMPKEY   ((uint8_t)0x02)
 CheckMAC mode bit 1: first SHA block from TempKey.
 
+#define CHECKMAC_MODE_SOURCE_FLAG_MATCH   ((uint8_t)0x04)
 CheckMAC mode bit 2: match TempKey.SourceFlag.
 
+#define CHECKMAC_MODE_INCLUDE_OTP_64   ((uint8_t)0x20)
 CheckMAC mode bit 5: include first 64 OTP bits.
 
+#define CHECKMAC_MODE_MASK   ((uint8_t)0x27)
 CheckMAC mode bits 3, 4, 6, and 7 are 0.
 
+#define CHECKMAC_MODE_OUTPUT_MAC_RESPONSE   ((uint8_t)0x08)
 CheckMAC mode bit 3: Single byte boolean response + 32 bytes mac in SHA105 device.
 
+#define CHECKMAC_CLIENT_CHALLENGE_SIZE   (32u)
 CheckMAC size of client challenge.
 
+#define CHECKMAC_CLIENT_RESPONSE_SIZE   (32u)
 CheckMAC size of client response.
 
+#define CHECKMAC_OTHER_DATA_SIZE   (13u)
 CheckMAC size of "other data".
 
+#define CHECKMAC_CLIENT_COMMAND_SIZE   (4u)
 CheckMAC size of client command header size inside "other data".
 
+#define CHECKMAC_CMD_MATCH   (0u)
 CheckMAC return value when there is a match.
 
+#define CHECKMAC_CMD_MISMATCH   (1u)
 CheckMAC return value when there is a mismatch.
 
+#define CHECKMAC_RSP_SIZE   ATCA_RSP_SIZE_MIN
 CheckMAC response packet size.
 
+#define CHECKMAC_SINGLE_BYTE_BOOL_RESP   (1u)
 
+#define CHECKMAC_SHA105_DEFAULT_KEYID   ((uint16_t)0x0003)
 
Definitions for the Counter command
+#define COUNTER_COUNT   ATCA_CMD_SIZE_MIN
 
+#define COUNTER_MODE_IDX   ATCA_PARAM1_IDX
 Counter command index for mode.
 
+#define COUNTER_KEYID_IDX   ATCA_PARAM2_IDX
 Counter command index for key id.
 
+#define COUNTER_MODE_MASK   ((uint8_t)0x01)
 Counter mode bits 1 to 7 are 0.
 
+#define COUNTER_MAX_VALUE   ((uint32_t)2097151)
 Counter maximum value of the counter.
 
+#define COUNTER_MODE_READ   ((uint8_t)0x00)
 Counter command mode for reading.
 
+#define COUNTER_MODE_INCREMENT   ((uint8_t)0x01)
 Counter command mode for incrementing.
 
+#define COUNTER_RSP_SIZE   ATCA_RSP_SIZE_4
 Counter command response packet size.
 
+#define COUNTER_SIZE   ATCA_RSP_SIZE_MIN
 Counter size in binary.
 
+#define COUNTER_MAX_VALUE_CA2   ((uint16_t)10000)
 Counter maximum value of the counter for ECC204.
 
Definitions for the Delete command
+#define DELETE_COUNT   (39u)
 
+#define DELETE_MODE   ((uint8_t)0x00)
 
+#define DELETE_MAC_SIZE   (32u)
 
+#define DELETE_NONCE_KEY_ID   ((uint16_t)0x8000)
 
Definitions for the DeriveKey Command
+#define DERIVE_KEY_RANDOM_IDX   ATCA_PARAM1_IDX
 DeriveKey command index for random bit.
 
+#define DERIVE_KEY_TARGETKEY_IDX   ATCA_PARAM2_IDX
 DeriveKey command index for target slot.
 
+#define DERIVE_KEY_MAC_IDX   ATCA_DATA_IDX
 DeriveKey command index for optional MAC.
 
+#define DERIVE_KEY_COUNT_SMALL   ATCA_CMD_SIZE_MIN
 DeriveKey command packet size without MAC.
 
+#define DERIVE_KEY_MODE   ((uint8_t)0x04)
 DeriveKey command mode set to 4 as in datasheet.
 
+#define DERIVE_KEY_COUNT_LARGE   (39u)
 DeriveKey command packet size with MAC.
 
+#define DERIVE_KEY_RANDOM_FLAG   ((uint8_t)4)
 DeriveKey 1. parameter; has to match TempKey.SourceFlag.
 
+#define DERIVE_KEY_MAC_SIZE   (32u)
 DeriveKey MAC size.
 
+#define DERIVE_KEY_RSP_SIZE   ATCA_RSP_SIZE_MIN
 DeriveKey response packet size.
 
Definitions for the ECDH Command
+#define ECDH_PREFIX_MODE   ((uint8_t)0x00)
 
+#define ECDH_COUNT   (ATCA_CMD_SIZE_MIN + ATCA_PUB_KEY_SIZE)
 
+#define ECDH_MODE_SOURCE_MASK   ((uint8_t)0x01)
 
+#define ECDH_MODE_SOURCE_EEPROM_SLOT   ((uint8_t)0x00)
 
+#define ECDH_MODE_SOURCE_TEMPKEY   ((uint8_t)0x01)
 
+#define ECDH_MODE_OUTPUT_MASK   ((uint8_t)0x02)
 
+#define ECDH_MODE_OUTPUT_CLEAR   ((uint8_t)0x00)
 
+#define ECDH_MODE_OUTPUT_ENC   ((uint8_t)0x02)
 
+#define ECDH_MODE_COPY_MASK   ((uint8_t)0x0C)
 
+#define ECDH_MODE_COPY_COMPATIBLE   ((uint8_t)0x00)
 
+#define ECDH_MODE_COPY_EEPROM_SLOT   ((uint8_t)0x04)
 
+#define ECDH_MODE_COPY_TEMP_KEY   ((uint8_t)0x08)
 
+#define ECDH_MODE_COPY_OUTPUT_BUFFER   ((uint8_t)0x0C)
 
+#define ECDH_KEY_SIZE   ATCA_BLOCK_SIZE
 ECDH output data size.
 
+#define ECDH_RSP_SIZE   ATCA_RSP_SIZE_64
 ECDH command packet size.
 
Definitions for the GenDig Command
+#define GENDIG_ZONE_IDX   ATCA_PARAM1_IDX
 GenDig command index for zone.
 
+#define GENDIG_KEYID_IDX   ATCA_PARAM2_IDX
 GenDig command index for key id.
 
+#define GENDIG_DATA_IDX   ATCA_DATA_IDX
 GenDig command index for optional data.
 
+#define GENDIG_COUNT   ATCA_CMD_SIZE_MIN
 GenDig command packet size without "other data".
 
+#define GENDIG_ZONE_CONFIG   ((uint8_t)0)
 GenDig zone id config. Use KeyID to specify any of the four 256-bit blocks of the Configuration zone.
 
+#define GENDIG_ZONE_OTP   ((uint8_t)1)
 GenDig zone id OTP. Use KeyID to specify either the first or second 256-bit block of the OTP zone.
 
+#define GENDIG_ZONE_DATA   ((uint8_t)2)
 GenDig zone id data. Use KeyID to specify a slot in the Data zone or a transport key in the hardware array.
 
+#define GENDIG_ZONE_SHARED_NONCE   ((uint8_t)3)
 GenDig zone id shared nonce. KeyID specifies the location of the input value in the message generation.
 
+#define GENDIG_ZONE_COUNTER   ((uint8_t)4)
 GenDig zone id counter. KeyID specifies the monotonic counter ID to be included in the message generation.
 
+#define GENDIG_ZONE_KEY_CONFIG   ((uint8_t)5)
 GenDig zone id key config. KeyID specifies the slot for which the configuration information is to be included in the message generation.
 
+#define GENDIG_RSP_SIZE   ATCA_RSP_SIZE_MIN
 GenDig command response packet size.
 
+#define GENDIG_USE_TEMPKEY_BIT   ((uint16_t)0x8000)
 Use temp key for GenDig command if bit 15 is 1.
 
Definitions for the GenDivKey Command
+#define GENDIVKEY_MODE   ((uint8_t)2)
 
+#define GENDIVKEY_OTHER_DATA_SIZE   ((uint8_t)4)
 
+#define GENDIVKEY_DEFAULT_KEYID   ((uint16_t)0x0003)
 
Definitions for the GenKey Command
+#define GENKEY_MODE_IDX   ATCA_PARAM1_IDX
 GenKey command index for mode.
 
+#define GENKEY_KEYID_IDX   ATCA_PARAM2_IDX
 GenKey command index for key id.
 
+#define GENKEY_DATA_IDX   (5u)
 GenKey command index for other data.
 
+#define GENKEY_COUNT   ATCA_CMD_SIZE_MIN
 GenKey command packet size without "other data".
 
+#define GENKEY_COUNT_DATA   (10u)
 GenKey command packet size with "other data".
 
+#define GENKEY_OTHER_DATA_SIZE   (3u)
 GenKey size of "other data".
 
+#define GENKEY_MODE_MASK   ((uint8_t)0x1C)
 GenKey mode bits 0 to 1 and 5 to 7 are 0.
 
+#define GENKEY_MODE_PRIVATE   ((uint8_t)0x04)
 GenKey mode: private key generation.
 
+#define GENKEY_MODE_PUBLIC   ((uint8_t)0x00)
 GenKey mode: public key calculation.
 
+#define GENKEY_MODE_DIGEST   ((uint8_t)0x08)
 GenKey mode: PubKey digest will be created after the public key is calculated.
 
+#define GENKEY_MODE_PUBKEY_DIGEST   ((uint8_t)0x10)
 GenKey mode: Calculate PubKey digest on the public key in KeyId.
 
+#define GENKEY_MODE_MAC   ((uint8_t)0x20)
 Genkey mode: Calculate MAC of public key + session key.
 
+#define GENKEY_PRIVATE_TO_TEMPKEY   ((uint16_t)0xFFFF)
 GenKey Create private key and store to tempkey (608 only)
 
+#define GENKEY_RSP_SIZE_SHORT   ATCA_RSP_SIZE_MIN
 GenKey response packet size in Digest mode.
 
+#define GENKEY_RSP_SIZE_LONG   ATCA_RSP_SIZE_64
 GenKey response packet size when returning a public key.
 
Definitions for the HMAC Command
+#define HMAC_MODE_IDX   ATCA_PARAM1_IDX
 HMAC command index for mode.
 
+#define HMAC_KEYID_IDX   ATCA_PARAM2_IDX
 HMAC command index for key id.
 
+#define HMAC_COUNT   ATCA_CMD_SIZE_MIN
 HMAC command packet size.
 
+#define HMAC_MODE_FLAG_TK_RAND   ((uint8_t)0x00)
 HMAC mode bit 2: The value of this bit must match the value in TempKey.SourceFlag or the command will return an error.
 
+#define HMAC_MODE_FLAG_TK_NORAND   ((uint8_t)0x04)
 HMAC mode bit 2: The value of this bit must match the value in TempKey.SourceFlag or the command will return an error.
 
+#define HMAC_MODE_FLAG_OTP88   ((uint8_t)0x10)
 HMAC mode bit 4: Include the first 88 OTP bits (OTP[0] through OTP[10]) in the message.; otherwise, the corresponding message bits are set to zero. Not applicable for ATECC508A.
 
+#define HMAC_MODE_FLAG_OTP64   ((uint8_t)0x20)
 HMAC mode bit 5: Include the first 64 OTP bits (OTP[0] through OTP[7]) in the message.; otherwise, the corresponding message bits are set to zero. If Mode[4] is set, the value of this mode bit is ignored. Not applicable for ATECC508A.
 
+#define HMAC_MODE_FLAG_FULLSN   ((uint8_t)0x40)
 HMAC mode bit 6: If set, include the 48 bits SN[2:3] and SN[4:7] in the message.; otherwise, the corresponding message bits are set to zero.
 
+#define HMAC_MODE_MASK   ((uint8_t)0x74)
 HMAC mode bits 0, 1, 3, and 7 are 0.
 
+#define HMAC_DIGEST_SIZE   (32u)
 HMAC size of digest response.
 
+#define HMAC_RSP_SIZE   ATCA_RSP_SIZE_32
 HMAC command response packet size.
 
Definitions for the Info Command
+#define INFO_PARAM1_IDX   ATCA_PARAM1_IDX
 Info command index for 1. parameter.
 
+#define INFO_PARAM2_IDX   ATCA_PARAM2_IDX
 Info command index for 2. parameter.
 
+#define INFO_COUNT   ATCA_CMD_SIZE_MIN
 Info command packet size.
 
+#define INFO_MODE_REVISION   ((uint8_t)0x00)
 Info mode Revision.
 
+#define INFO_MODE_KEY_VALID   ((uint8_t)0x01)
 Info mode KeyValid.
 
+#define INFO_MODE_STATE   ((uint8_t)0x02)
 Info mode State.
 
+#define INFO_MODE_LOCK_STATUS   ((uint8_t)0x02)
 Info mode Lock status for ECC204,TA010,SHA10x devices.
 
+#define INFO_MODE_CHIP_STATUS   ((uint8_t)0xC5)
 Info mode Chip status for ECC204,TA010,SHA10x devices.
 
+#define INFO_MODE_GPIO   ((uint8_t)0x03)
 Info mode GPIO.
 
+#define INFO_MODE_VOL_KEY_PERMIT   ((uint8_t)0x04)
 Info mode GPIO.
 
+#define INFO_MODE_MAX   ((uint8_t)0x03)
 Info mode maximum value.
 
+#define INFO_NO_STATE   ((uint8_t)0x00)
 Info mode is not the state mode.
 
+#define INFO_OUTPUT_STATE_MASK   ((uint8_t)0x01)
 Info output state mask.
 
+#define INFO_DRIVER_STATE_MASK   ((uint8_t)0x02)
 Info driver state mask.
 
+#define INFO_PARAM2_SET_LATCH_STATE   ((uint16_t)0x0002)
 Info param2 to set the persistent latch state.
 
+#define INFO_PARAM2_LATCH_SET   ((uint16_t)0x0001)
 Info param2 to set the persistent latch.
 
+#define INFO_PARAM2_LATCH_CLEAR   ((uint16_t)0x0000)
 Info param2 to clear the persistent latch.
 
+#define INFO_SIZE   ((uint8_t)0x04)
 Info return size.
 
+#define INFO_RSP_SIZE   ATCA_RSP_SIZE_VAL
 Info command response packet size.
 
Definitions for the KDF Command
+#define KDF_MODE_IDX   ATCA_PARAM1_IDX
 KDF command index for mode.
 
+#define KDF_KEYID_IDX   ATCA_PARAM2_IDX
 KDF command index for key id.
 
+#define KDF_DETAILS_IDX   ATCA_DATA_IDX
 KDF command index for details.
 
+#define KDF_DETAILS_SIZE   (4u)
 KDF details (param3) size.
 
+#define KDF_MESSAGE_IDX   (ATCA_DATA_IDX + KDF_DETAILS_SIZE)
 
+#define KDF_MODE_SOURCE_MASK   ((uint8_t)0x03)
 KDF mode source key mask.
 
+#define KDF_MODE_SOURCE_TEMPKEY   ((uint8_t)0x00)
 KDF mode source key in TempKey.
 
+#define KDF_MODE_SOURCE_TEMPKEY_UP   ((uint8_t)0x01)
 KDF mode source key in upper TempKey.
 
+#define KDF_MODE_SOURCE_SLOT   ((uint8_t)0x02)
 KDF mode source key in a slot.
 
+#define KDF_MODE_SOURCE_ALTKEYBUF   ((uint8_t)0x03)
 KDF mode source key in alternate key buffer.
 
+#define KDF_MODE_TARGET_MASK   ((uint8_t)0x1C)
 KDF mode target key mask.
 
+#define KDF_MODE_TARGET_TEMPKEY   ((uint8_t)0x00)
 KDF mode target key in TempKey.
 
+#define KDF_MODE_TARGET_TEMPKEY_UP   ((uint8_t)0x04)
 KDF mode target key in upper TempKey.
 
+#define KDF_MODE_TARGET_SLOT   ((uint8_t)0x08)
 KDF mode target key in slot.
 
+#define KDF_MODE_TARGET_ALTKEYBUF   ((uint8_t)0x0C)
 KDF mode target key in alternate key buffer.
 
+#define KDF_MODE_TARGET_OUTPUT   ((uint8_t)0x10)
 KDF mode target key in output buffer.
 
+#define KDF_MODE_TARGET_OUTPUT_ENC   ((uint8_t)0x14)
 KDF mode target key encrypted in output buffer.
 
+#define KDF_MODE_ALG_MASK   ((uint8_t)0x60)
 KDF mode algorithm mask.
 
+#define KDF_MODE_ALG_PRF   ((uint8_t)0x00)
 KDF mode PRF algorithm.
 
+#define KDF_MODE_ALG_AES   ((uint8_t)0x20)
 KDF mode AES algorithm.
 
+#define KDF_MODE_ALG_HKDF   ((uint8_t)0x40)
 KDF mode HKDF algorithm.
 
+#define KDF_DETAILS_PRF_KEY_LEN_MASK   ((uint32_t)0x00000003)
 KDF details for PRF, source key length mask.
 
+#define KDF_DETAILS_PRF_KEY_LEN_16   ((uint32_t)0x00000000)
 KDF details for PRF, source key length is 16 bytes.
 
+#define KDF_DETAILS_PRF_KEY_LEN_32   ((uint32_t)0x00000001)
 KDF details for PRF, source key length is 32 bytes.
 
+#define KDF_DETAILS_PRF_KEY_LEN_48   ((uint32_t)0x00000002)
 KDF details for PRF, source key length is 48 bytes.
 
+#define KDF_DETAILS_PRF_KEY_LEN_64   ((uint32_t)0x00000003)
 KDF details for PRF, source key length is 64 bytes.
 
+#define KDF_DETAILS_PRF_TARGET_LEN_MASK   ((uint32_t)0x00000100)
 KDF details for PRF, target length mask.
 
+#define KDF_DETAILS_PRF_TARGET_LEN_32   ((uint32_t)0x00000000)
 KDF details for PRF, target length is 32 bytes.
 
+#define KDF_DETAILS_PRF_TARGET_LEN_64   ((uint32_t)0x00000100)
 KDF details for PRF, target length is 64 bytes.
 
+#define KDF_DETAILS_PRF_AEAD_MASK   ((uint32_t)0x00000600)
 KDF details for PRF, AEAD processing mask.
 
+#define KDF_DETAILS_PRF_AEAD_MODE0   ((uint32_t)0x00000000)
 KDF details for PRF, AEAD no processing.
 
+#define KDF_DETAILS_PRF_AEAD_MODE1   ((uint32_t)0x00000200)
 KDF details for PRF, AEAD First 32 go to target, second 32 go to output buffer.
 
+#define KDF_DETAILS_AES_KEY_LOC_MASK   ((uint32_t)0x00000003)
 KDF details for AES, key location mask.
 
+#define KDF_DETAILS_HKDF_MSG_LOC_MASK   ((uint32_t)0x00000003)
 KDF details for HKDF, message location mask.
 
+#define KDF_DETAILS_HKDF_MSG_LOC_SLOT   ((uint32_t)0x00000000)
 KDF details for HKDF, message location in slot.
 
+#define KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY   ((uint32_t)0x00000001)
 KDF details for HKDF, message location in TempKey.
 
+#define KDF_DETAILS_HKDF_MSG_LOC_INPUT   ((uint32_t)0x00000002)
 KDF details for HKDF, message location in input parameter.
 
+#define KDF_DETAILS_HKDF_MSG_LOC_IV   ((uint32_t)0x00000003)
 KDF details for HKDF, message location is a special IV function.
 
+#define KDF_DETAILS_HKDF_ZERO_KEY   ((uint32_t)0x00000004)
 KDF details for HKDF, key is 32 bytes of zero.
 
Definitions for the Lock Command
+#define LOCK_ZONE_IDX   ATCA_PARAM1_IDX
 Lock command index for zone.
 
+#define LOCK_SUMMARY_IDX   ATCA_PARAM2_IDX
 Lock command index for summary.
 
+#define LOCK_COUNT   ATCA_CMD_SIZE_MIN
 Lock command packet size.
 
+#define LOCK_ZONE_CONFIG   ((uint8_t)0x00)
 Lock zone is Config.
 
+#define LOCK_ZONE_DATA   ((uint8_t)0x01)
 Lock zone is OTP or Data.
 
+#define LOCK_ZONE_DATA_SLOT   ((uint8_t)0x02)
 Lock slot of Data.
 
+#define LOCK_ZONE_CA2_DATA   ((uint8_t)0x00)
 Lock second gen Data zone by slot.
 
+#define LOCK_ZONE_CA2_CONFIG   ((uint8_t)0x01)
 Lock second gen configuration zone by slot.
 
+#define LOCK_ZONE_NO_CRC   ((uint8_t)0x80)
 Lock command: Ignore summary.
 
+#define LOCK_ZONE_MASK   ((uint8_t)0xBF)
 Lock parameter 1 bits 6 are 0.
 
+#define ATCA_UNLOCKED   ((uint8_t)0x55)
 Value indicating an unlocked zone.
 
+#define ATCA_LOCKED   ((uint8_t)0x00)
 Value indicating a locked zone.
 
+#define LOCK_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Lock command response packet size.
 
Definitions for the MAC Command
+#define MAC_MODE_IDX   ATCA_PARAM1_IDX
 MAC command index for mode.
 
+#define MAC_KEYID_IDX   ATCA_PARAM2_IDX
 MAC command index for key id.
 
+#define MAC_CHALLENGE_IDX   ATCA_DATA_IDX
 MAC command index for optional challenge.
 
+#define MAC_COUNT_SHORT   ATCA_CMD_SIZE_MIN
 MAC command packet size without challenge.
 
+#define MAC_COUNT_LONG   (39u)
 MAC command packet size with challenge.
 
+#define MAC_MODE_CHALLENGE   ((uint8_t)0x00)
 MAC mode 0: first SHA block from data slot.
 
+#define MAC_MODE_BLOCK2_TEMPKEY   ((uint8_t)0x01)
 MAC mode bit 0: second SHA block from TempKey.
 
+#define MAC_MODE_BLOCK1_TEMPKEY   ((uint8_t)0x02)
 MAC mode bit 1: first SHA block from TempKey.
 
+#define MAC_MODE_SOURCE_FLAG_MATCH   ((uint8_t)0x04)
 MAC mode bit 2: match TempKey.SourceFlag.
 
+#define MAC_MODE_PTNONCE_TEMPKEY   ((uint8_t)0x06)
 MAC mode bit 0: second SHA block from TempKey.
 
+#define MAC_MODE_PASSTHROUGH   ((uint8_t)0x07)
 MAC mode bit 0-2: pass-through mode.
 
+#define MAC_MODE_INCLUDE_OTP_88   ((uint8_t)0x10)
 MAC mode bit 4: include first 88 OTP bits.
 
+#define MAC_MODE_INCLUDE_OTP_64   ((uint8_t)0x20)
 MAC mode bit 5: include first 64 OTP bits.
 
+#define MAC_MODE_INCLUDE_SN   ((uint8_t)0x40)
 MAC mode bit 6: include serial number.
 
+#define MAC_CHALLENGE_SIZE   (32u)
 MAC size of challenge.
 
+#define MAC_SIZE   (32u)
 MAC size of response.
 
+#define MAC_MODE_MASK   ((uint8_t)0x77)
 MAC mode bits 3 and 7 are 0.
 
+#define MAC_RSP_SIZE   ATCA_RSP_SIZE_32
 MAC command response packet size.
 
+#define MAC_SHA104_DEFAULT_KEYID   ((uint16_t)0x0003)
 
Definitions for the Nonce Command
+#define NONCE_MODE_IDX   ATCA_PARAM1_IDX
 Nonce command index for mode.
 
+#define NONCE_PARAM2_IDX   ATCA_PARAM2_IDX
 Nonce command index for 2. parameter.
 
+#define NONCE_INPUT_IDX   ATCA_DATA_IDX
 Nonce command index for input data.
 
+#define NONCE_COUNT_SHORT   (ATCA_CMD_SIZE_MIN + 20u)
 Nonce command packet size for 20 bytes of NumIn.
 
+#define NONCE_COUNT_LONG   (ATCA_CMD_SIZE_MIN + 32u)
 Nonce command packet size for 32 bytes of NumIn.
 
+#define NONCE_COUNT_LONG_64   (ATCA_CMD_SIZE_MIN + 64u)
 Nonce command packet size for 64 bytes of NumIn.
 
+#define NONCE_MODE_MASK   ((uint8_t)0x03)
 Nonce mode bits 2 to 7 are 0.
 
+#define NONCE_MODE_SEED_UPDATE   ((uint8_t)0x00)
 Nonce mode: update seed.
 
+#define NONCE_MODE_NO_SEED_UPDATE   ((uint8_t)0x01)
 Nonce mode: do not update seed.
 
+#define NONCE_MODE_INVALID   ((uint8_t)0x02)
 Nonce mode 2 is invalid.
 
+#define NONCE_MODE_PASSTHROUGH   ((uint8_t)0x03)
 Nonce mode: pass-through.
 
+#define NONCE_MODE_GEN_SESSION_KEY   ((uint8_t)0x02)
 NOnce mode: Generate session key in ECC204 device.
 
+#define NONCE_MODE_INPUT_LEN_MASK   ((uint8_t)0x20)
 Nonce mode: input size mask.
 
+#define NONCE_MODE_INPUT_LEN_32   ((uint8_t)0x00)
 Nonce mode: input size is 32 bytes.
 
+#define NONCE_MODE_INPUT_LEN_64   ((uint8_t)0x20)
 Nonce mode: input size is 64 bytes.
 
+#define NONCE_MODE_TARGET_MASK   ((uint8_t)0xC0)
 Nonce mode: target mask.
 
+#define NONCE_MODE_TARGET_TEMPKEY   ((uint8_t)0x00)
 Nonce mode: target is TempKey.
 
+#define NONCE_MODE_TARGET_MSGDIGBUF   ((uint8_t)0x40)
 Nonce mode: target is Message Digest Buffer.
 
+#define NONCE_MODE_TARGET_ALTKEYBUF   ((uint8_t)0x80)
 Nonce mode: target is Alternate Key Buffer.
 
+#define NONCE_ZERO_CALC_MASK   ((uint16_t)0x8000)
 Nonce zero (param2): calculation mode mask.
 
+#define NONCE_ZERO_CALC_RANDOM   ((uint16_t)0x0000)
 Nonce zero (param2): calculation mode random, use RNG in calculation and return RNG output.
 
+#define NONCE_ZERO_CALC_TEMPKEY   ((uint16_t)0x8000)
 Nonce zero (param2): calculation mode TempKey, use TempKey in calculation and return new TempKey value.
 
+#define NONCE_NUMIN_SIZE   (20)
 Nonce NumIn size for random modes.
 
+#define NONCE_NUMIN_SIZE_PASSTHROUGH   (32)
 Nonce NumIn size for 32-byte pass-through mode.
 
+#define NONCE_RSP_SIZE_SHORT   ATCA_RSP_SIZE_MIN
 Nonce command response packet size with no output.
 
+#define NONCE_RSP_SIZE_LONG   ATCA_RSP_SIZE_32
 Nonce command response packet size with output.
 
Definitions for the Pause Command
+#define PAUSE_SELECT_IDX   ATCA_PARAM1_IDX
 Pause command index for Selector.
 
+#define PAUSE_PARAM2_IDX   ATCA_PARAM2_IDX
 Pause command index for 2. parameter.
 
+#define PAUSE_COUNT   ATCA_CMD_SIZE_MIN
 Pause command packet size.
 
+#define PAUSE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Pause command response packet size.
 
Definitions for the PrivWrite Command
+#define PRIVWRITE_ZONE_IDX   ATCA_PARAM1_IDX
 PrivWrite command index for zone.
 
+#define PRIVWRITE_KEYID_IDX   ATCA_PARAM2_IDX
 PrivWrite command index for KeyID.
 
+#define PRIVWRITE_VALUE_IDX   ( 5)
 PrivWrite command index for value.
 
+#define PRIVWRITE_MAC_IDX   (41)
 PrivWrite command index for MAC.
 
+#define PRIVWRITE_COUNT   (75)
 PrivWrite command packet size.
 
+#define PRIVWRITE_ZONE_MASK   ((uint8_t)0x40)
 PrivWrite zone bits 0 to 5 and 7 are 0.
 
+#define PRIVWRITE_MODE_ENCRYPT   ((uint8_t)0x40)
 PrivWrite mode: encrypted.
 
+#define PRIVWRITE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 PrivWrite command response packet size.
 
Definitions for the Random Command
+#define RANDOM_MODE_IDX   ATCA_PARAM1_IDX
 Random command index for mode.
 
+#define RANDOM_PARAM2_IDX   ATCA_PARAM2_IDX
 Random command index for 2. parameter.
 
+#define RANDOM_COUNT   ATCA_CMD_SIZE_MIN
 Random command packet size.
 
+#define RANDOM_SEED_UPDATE   ((uint8_t)0x00)
 Random mode for automatic seed update.
 
+#define RANDOM_NO_SEED_UPDATE   ((uint8_t)0x01)
 Random mode for no seed update.
 
+#define RANDOM_NUM_SIZE   ((uint8_t)32)
 Number of bytes in the data packet of a random command.
 
+#define RANDOM_RSP_SIZE   ATCA_RSP_SIZE_32
 Random command response packet size.
 
Definitions for the Read Command
+#define READ_ZONE_IDX   ATCA_PARAM1_IDX
 Read command index for zone.
 
+#define READ_ADDR_IDX   ATCA_PARAM2_IDX
 Read command index for address.
 
+#define READ_COUNT   ATCA_CMD_SIZE_MIN
 Read command packet size.
 
+#define READ_ZONE_MASK   ((uint8_t)0x83)
 Read zone bits 2 to 6 are 0.
 
+#define READ_4_RSP_SIZE   ATCA_RSP_SIZE_VAL
 Read command response packet size when reading 4 bytes.
 
+#define READ_32_RSP_SIZE   ATCA_RSP_SIZE_32
 Read command response packet size when reading 32 bytes.
 
Definitions for the SecureBoot Command
+#define SECUREBOOT_MODE_IDX   ATCA_PARAM1_IDX
 SecureBoot command index for mode.
 
+#define SECUREBOOT_DIGEST_SIZE   (32u)
 SecureBoot digest input size.
 
+#define SECUREBOOT_SIGNATURE_SIZE   (64u)
 SecureBoot signature input size.
 
+#define SECUREBOOT_COUNT_DIG   (ATCA_CMD_SIZE_MIN + SECUREBOOT_DIGEST_SIZE)
 SecureBoot command packet size for just a digest.
 
+#define SECUREBOOT_COUNT_DIG_SIG   (ATCA_CMD_SIZE_MIN + SECUREBOOT_DIGEST_SIZE + SECUREBOOT_SIGNATURE_SIZE)
 SecureBoot command packet size for a digest and signature.
 
+#define SECUREBOOT_MAC_SIZE   (32u)
 SecureBoot MAC output size.
 
+#define SECUREBOOT_RSP_SIZE_NO_MAC   ATCA_RSP_SIZE_MIN
 SecureBoot response packet size for no MAC.
 
+#define SECUREBOOT_RSP_SIZE_MAC   (ATCA_PACKET_OVERHEAD + SECUREBOOT_MAC_SIZE)
 SecureBoot response packet size with MAC.
 
+#define SECUREBOOT_MODE_MASK   ((uint8_t)0x07)
 SecureBoot mode mask.
 
+#define SECUREBOOT_MODE_FULL   ((uint8_t)0x05)
 SecureBoot mode Full.
 
+#define SECUREBOOT_MODE_FULL_STORE   ((uint8_t)0x06)
 SecureBoot mode FullStore.
 
+#define SECUREBOOT_MODE_FULL_COPY   ((uint8_t)0x07)
 SecureBoot mode FullCopy.
 
+#define SECUREBOOT_MODE_PROHIBIT_FLAG   ((uint8_t)0x40)
 SecureBoot mode flag to prohibit SecureBoot until next power cycle.
 
+#define SECUREBOOT_MODE_ENC_MAC_FLAG   ((uint8_t)0x80)
 SecureBoot mode flag for encrypted digest and returning validating MAC.
 
+#define SECUREBOOTCONFIG_OFFSET   (70)
 SecureBootConfig byte offset into the configuration zone.
 
+#define SECUREBOOTCONFIG_MODE_MASK   ((uint16_t)0x0003)
 Mask for SecureBootMode field in SecureBootConfig value.
 
+#define SECUREBOOTCONFIG_MODE_DISABLED   ((uint16_t)0x0000)
 Disabled SecureBootMode in SecureBootConfig value.
 
+#define SECUREBOOTCONFIG_MODE_FULL_BOTH   ((uint16_t)0x0001)
 Both digest and signature always required SecureBootMode in SecureBootConfig value.
 
+#define SECUREBOOTCONFIG_MODE_FULL_SIG   ((uint16_t)0x0002)
 Signature stored SecureBootMode in SecureBootConfig value.
 
+#define SECUREBOOTCONFIG_MODE_FULL_DIG   ((uint16_t)0x0003)
 Digest stored SecureBootMode in SecureBootConfig value.
 
Definitions for the SelfTest Command
+#define SELFTEST_MODE_IDX   ATCA_PARAM1_IDX
 SelfTest command index for mode.
 
+#define SELFTEST_COUNT   ATCA_CMD_SIZE_MIN
 SelfTest command packet size.
 
+#define SELFTEST_MODE_RNG   ((uint8_t)0x01)
 SelfTest mode RNG DRBG function.
 
+#define SELFTEST_MODE_ECDSA_SIGN_VERIFY   ((uint8_t)0x04)
 SelfTest mode ECDSA verify function.
 
+#define SELFTEST_MODE_ECDH   ((uint8_t)0x08)
 SelfTest mode ECDH function.
 
+#define SELFTEST_MODE_AES   ((uint8_t)0x10)
 SelfTest mode AES encrypt function.
 
+#define SELFTEST_MODE_SHA   ((uint8_t)0x20)
 SelfTest mode SHA function.
 
+#define SELFTEST_MODE_ALL   ((uint8_t)0x3B)
 SelfTest mode all algorithms.
 
+#define SELFTEST_RSP_SIZE   ATCA_RSP_SIZE_MIN
 SelfTest command response packet size.
 
Definitions for the SHA Command
+#define SHA_COUNT_SHORT   ATCA_CMD_SIZE_MIN
 
+#define SHA_COUNT_LONG   ATCA_CMD_SIZE_MIN
 Just a starting size.
 
+#define ATCA_SHA_DIGEST_SIZE   (32u)
 
+#define SHA_DATA_MAX   (64)
 
+#define SHA_MODE_MASK   ((uint8_t)0x07)
 Mask the bit 0-2.
 
+#define SHA_MODE_SHA256_START   ((uint8_t)0x00)
 Initialization, does not accept a message.
 
+#define SHA_MODE_SHA256_UPDATE   ((uint8_t)0x01)
 Add 64 bytes in the meesage to the SHA context.
 
+#define SHA_MODE_SHA256_END   ((uint8_t)0x02)
 Complete the calculation and return the digest.
 
+#define SHA_MODE_SHA256_PUBLIC   ((uint8_t)0x03)
 Add 64 byte ECC public key in the slot to the SHA context.
 
+#define SHA_MODE_HMAC_START   ((uint8_t)0x04)
 Initialization, HMAC calculation.
 
+#define SHA_MODE_ECC204_HMAC_START   ((uint8_t)0x03)
 Initialization, HMAC calculation for ECC204.
 
+#define SHA_MODE_HMAC_UPDATE   ((uint8_t)0x01)
 Add 64 bytes in the meesage to the SHA context.
 
+#define SHA_MODE_HMAC_END   ((uint8_t)0x05)
 Complete the HMAC computation and return digest.
 
+#define SHA_MODE_608_HMAC_END   ((uint8_t)0x02)
 Complete the HMAC computation and return digest... Different command on 608.
 
+#define SHA_MODE_ECC204_HMAC_END   ((uint8_t)0x02)
 Complete the HMAC computation and return digest... Different mode on ECC204.
 
+#define SHA_MODE_READ_CONTEXT   ((uint8_t)0x06)
 Read current SHA-256 context out of the device.
 
+#define SHA_MODE_WRITE_CONTEXT   ((uint8_t)0x07)
 Restore a SHA-256 context into the device.
 
+#define SHA_MODE_TARGET_MASK   ((uint8_t)0xC0)
 Resulting digest target location mask.
 
+#define SHA_RSP_SIZE   ATCA_RSP_SIZE_32
 SHA command response packet size.
 
+#define SHA_RSP_SIZE_SHORT   ATCA_RSP_SIZE_MIN
 SHA command response packet size only status code.
 
+#define SHA_RSP_SIZE_LONG   ATCA_RSP_SIZE_32
 SHA command response packet size.
 
Definitions for the Sign Command
+#define SIGN_MODE_IDX   ATCA_PARAM1_IDX
 Sign command index for mode.
 
+#define SIGN_KEYID_IDX   ATCA_PARAM2_IDX
 Sign command index for key id.
 
+#define SIGN_COUNT   ATCA_CMD_SIZE_MIN
 Sign command packet size.
 
+#define SIGN_MODE_MASK   ((uint8_t)0xE1)
 Sign mode bits 1 to 4 are 0.
 
+#define SIGN_MODE_INTERNAL   ((uint8_t)0x00)
 Sign mode 0: internal.
 
+#define SIGN_MODE_INVALIDATE   ((uint8_t)0x01)
 Sign mode bit 1: Signature will be used for Verify(Invalidate)
 
+#define SIGN_MODE_INCLUDE_SN   ((uint8_t)0x40)
 Sign mode bit 6: include serial number.
 
+#define SIGN_MODE_EXTERNAL   ((uint8_t)0x80)
 Sign mode bit 7: external.
 
+#define SIGN_MODE_SOURCE_MASK   ((uint8_t)0x20)
 Sign mode message source mask.
 
+#define SIGN_MODE_SOURCE_TEMPKEY   ((uint8_t)0x00)
 Sign mode message source is TempKey.
 
+#define SIGN_MODE_SOURCE_MSGDIGBUF   ((uint8_t)0x20)
 Sign mode message source is the Message Digest Buffer.
 
+#define SIGN_RSP_SIZE   ATCA_RSP_SIZE_MAX
 Sign command response packet size.
 
Definitions for the UpdateExtra Command
+#define UPDATE_MODE_IDX   ATCA_PARAM1_IDX
 UpdateExtra command index for mode.
 
+#define UPDATE_VALUE_IDX   ATCA_PARAM2_IDX
 UpdateExtra command index for new value.
 
+#define UPDATE_COUNT   ATCA_CMD_SIZE_MIN
 UpdateExtra command packet size.
 
+#define UPDATE_MODE_USER_EXTRA   ((uint8_t)0x00)
 UpdateExtra mode update UserExtra (config byte 84)
 
+#define UPDATE_MODE_SELECTOR   ((uint8_t)0x01)
 UpdateExtra mode update Selector (config byte 85)
 
+#define UPDATE_MODE_USER_EXTRA_ADD   UPDATE_MODE_SELECTOR
 UpdateExtra mode update UserExtraAdd (config byte 85)
 
+#define UPDATE_MODE_DEC_COUNTER   ((uint8_t)0x02)
 UpdateExtra mode: decrement counter.
 
+#define UPDATE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 UpdateExtra command response packet size.
 
Definitions for the Verify Command
+#define VERIFY_MODE_IDX   ATCA_PARAM1_IDX
 Verify command index for mode.
 
+#define VERIFY_KEYID_IDX   ATCA_PARAM2_IDX
 Verify command index for key id.
 
+#define VERIFY_DATA_IDX   ( 5)
 Verify command index for data.
 
+#define VERIFY_256_STORED_COUNT   ( 71)
 Verify command packet size for 256-bit key in stored mode.
 
+#define VERIFY_283_STORED_COUNT   ( 79)
 Verify command packet size for 283-bit key in stored mode.
 
+#define VERIFY_256_VALIDATE_COUNT   ( 90)
 Verify command packet size for 256-bit key in validate mode.
 
+#define VERIFY_283_VALIDATE_COUNT   ( 98)
 Verify command packet size for 283-bit key in validate mode.
 
+#define VERIFY_256_EXTERNAL_COUNT   (135)
 Verify command packet size for 256-bit key in external mode.
 
+#define VERIFY_283_EXTERNAL_COUNT   (151)
 Verify command packet size for 283-bit key in external mode.
 
+#define VERIFY_256_KEY_SIZE   ( 64)
 Verify key size for 256-bit key.
 
+#define VERIFY_283_KEY_SIZE   ( 72)
 Verify key size for 283-bit key.
 
+#define VERIFY_256_SIGNATURE_SIZE   ( 64)
 Verify signature size for 256-bit key.
 
+#define VERIFY_283_SIGNATURE_SIZE   ( 72)
 Verify signature size for 283-bit key.
 
+#define VERIFY_OTHER_DATA_SIZE   ( 19u)
 Verify size of "other data".
 
+#define VERIFY_MODE_MASK   ((uint8_t)0x07)
 Verify mode bits 3 to 7 are 0.
 
+#define VERIFY_MODE_STORED   ((uint8_t)0x00)
 Verify mode: stored.
 
+#define VERIFY_MODE_VALIDATE_EXTERNAL   ((uint8_t)0x01)
 Verify mode: validate external.
 
+#define VERIFY_MODE_EXTERNAL   ((uint8_t)0x02)
 Verify mode: external.
 
+#define VERIFY_MODE_VALIDATE   ((uint8_t)0x03)
 Verify mode: validate.
 
+#define VERIFY_MODE_INVALIDATE   ((uint8_t)0x07)
 Verify mode: invalidate.
 
+#define VERIFY_MODE_SOURCE_MASK   ((uint8_t)0x20)
 Verify mode message source mask.
 
+#define VERIFY_MODE_SOURCE_TEMPKEY   ((uint8_t)0x00)
 Verify mode message source is TempKey.
 
+#define VERIFY_MODE_SOURCE_MSGDIGBUF   ((uint8_t)0x20)
 Verify mode message source is the Message Digest Buffer.
 
+#define VERIFY_MODE_MAC_FLAG   ((uint8_t)0x80)
 Verify mode: MAC.
 
+#define VERIFY_KEY_B283   ((uint16_t)0x0000)
 Verify key type: B283.
 
+#define VERIFY_KEY_K283   ((uint16_t)0x0001)
 Verify key type: K283.
 
+#define VERIFY_KEY_P256   ((uint16_t)0x0004)
 Verify key type: P256.
 
+#define VERIFY_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Verify command response packet size.
 
+#define VERIFY_RSP_SIZE_MAC   ATCA_RSP_SIZE_32
 Verify command response packet size with validating MAC.
 
Definitions for the Write Command
+#define WRITE_ZONE_IDX   ATCA_PARAM1_IDX
 Write command index for zone.
 
+#define WRITE_ADDR_IDX   ATCA_PARAM2_IDX
 Write command index for address.
 
+#define WRITE_VALUE_IDX   ATCA_DATA_IDX
 Write command index for data.
 
+#define WRITE_MAC_VS_IDX   ( 9)
 Write command index for MAC following short data.
 
+#define WRITE_MAC_VL_IDX   (37)
 Write command index for MAC following long data.
 
+#define WRITE_MAC_SIZE   (32u)
 Write MAC size.
 
+#define WRITE_ZONE_MASK   ((uint8_t)0xC3)
 Write zone bits 2 to 5 are 0.
 
+#define WRITE_ZONE_WITH_MAC   ((uint8_t)0x40)
 Write zone bit 6: write encrypted with MAC.
 
+#define WRITE_ZONE_OTP   ((uint8_t)1)
 Write zone id OTP.
 
+#define WRITE_ZONE_DATA   ((uint8_t)2)
 Write zone id data.
 
+#define WRITE_RSP_SIZE   ATCA_RSP_SIZE_MIN
 Write command response packet size.
 
+ + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS atInfo (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Info method.
 
ATCA_STATUS atPause (ATCADeviceType device_type, ATCAPacket *packet)
 ATCACommand Pause method.
 
bool atIsSHAFamily (ATCADeviceType device_type)
 determines if a given device type is a SHA device or a superset of a SHA device
 
bool atIsECCFamily (ATCADeviceType device_type)
 determines if a given device type is an ECC device or a superset of a ECC device
 
ATCA_STATUS isATCAError (uint8_t *data)
 checks for basic error frame in data
 
void atCRC (size_t length, const uint8_t *data, uint8_t *crc_le)
 Calculates CRC over the given raw data and returns the CRC in little-endian byte order.
 
void atCalcCrc (ATCAPacket *packet)
 This function calculates CRC and adds it to the correct offset in the packet data.
 
ATCA_STATUS atCheckCrc (const uint8_t *response)
 This function checks the consistency of a response.
 
+

Detailed Description

+

Microchip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch.

+

This command object supports the ATSHA and ATECC device family. The command list is a superset of all device commands for this family. The command object differentiates the packet contents based on specific device type within the family.

-
+

Function Documentation

+ +

◆ atCalcCrc()

+ +
+
+ + + + + + + + +
void atCalcCrc (ATCAPacketpacket)
+
+ +

This function calculates CRC and adds it to the correct offset in the packet data.

+
Parameters
+ + +
[in]packetPacket to calculate CRC data for
+
+
+ +
+
+ +

◆ atCheckCrc()

+ +
+
+ + + + + + + + +
ATCA_STATUS atCheckCrc (const uint8_t * response)
+
+ +

This function checks the consistency of a response.

+
Parameters
+ + +
[in]responsepointer to response
+
+
+
Returns
ATCA_SUCCESS on success, otherwise ATCA_RX_CRC_ERROR
+ +
+
+ +

◆ atCRC()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
void atCRC (size_t length,
const uint8_t * data,
uint8_t * crc_le 
)
+
+ +

Calculates CRC over the given raw data and returns the CRC in little-endian byte order.

+
Parameters
+ + + + +
[in]lengthSize of data not including the CRC byte positions
[in]dataPointer to the data over which to compute the CRC
[out]crc_lePointer to the place where the two-bytes of CRC will be returned in little-endian byte order.
+
+
+ +
+
+ +

◆ atInfo()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS atInfo (ATCADeviceType device_type,
ATCAPacketpacket 
)
+
+ +

ATCACommand Info method.

+
Parameters
+ + + +
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
+
+
+
Returns
ATCA_SUCCESS
+ +
+
+ +

◆ atIsECCFamily()

+ +
+
+ + + + + + + + +
bool atIsECCFamily (ATCADeviceType device_type)
+
+ +

determines if a given device type is an ECC device or a superset of a ECC device

+
Parameters
+ + +
[in]device_typeType of device to check for family type
+
+
+
Returns
boolean indicating whether the given device is an ECC family device.
+ +
+
+ +

◆ atIsSHAFamily()

+ +
+
+ + + + + + + + +
bool atIsSHAFamily (ATCADeviceType device_type)
+
+ +

determines if a given device type is a SHA device or a superset of a SHA device

+
Parameters
+ + +
[in]device_typeType of device to check for family type
+
+
+
Returns
boolean indicating whether the given device is a SHA family device.
+ +
+
+ +

◆ atPause()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS atPause (ATCADeviceType device_type,
ATCAPacketpacket 
)
+
+ +

ATCACommand Pause method.

+
Parameters
+ + + +
[in]ca_cmdinstance
[in]packetpointer to the packet containing the command being built
+
+
+
Returns
ATCA_SUCCESS
+ +
+
+ +

◆ isATCAError()

+ +
+
+ + + + + + + + +
ATCA_STATUS isATCAError (uint8_t * data)
+
+ +

checks for basic error frame in data

+
Parameters
+ + +
[in]datapointer to received data - expected to be in the form of a CA device response frame
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+
diff --git a/a00359.html b/a00359.html index c3f857ac2..45bf9fb06 100644 --- a/a00359.html +++ b/a00359.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_delete.c File Reference +CryptoAuthLib: calib_config_check.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,419 @@
-
calib_delete.c File Reference
+ +
calib_config_check.h File Reference
-

CryptoAuthLib Basic API methods for Delete command. +

Consistency checks for configuration options. More...

-
#include "cryptoauthlib.h"
-#include "host/atca_host.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for Delete command.

-

The Delete command, when executed, will clear all of the Data zone slots and set all bytes of each slot to 0xFF.The Configuration zone will be untouched, except for the value of the Primary_Deleted byte.

-
Note
List of devices that support this command - ECC204, TA010, SHA10x.Refer to device datasheets for full details.
- -
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Macros

+#define CALIB_SHA204_EN   DEFAULT_ENABLED
 
+#define CALIB_SHA206_EN   DEFAULT_ENABLED
 
+#define CALIB_ECC108_EN   DEFAULT_DISABLED
 
+#define CALIB_ECC508_EN   DEFAULT_ENABLED
 
+#define CALIB_ECC608_EN   DEFAULT_ENABLED
 
+#define CALIB_ECC204_EN   DEFAULT_ENABLED
 
+#define CALIB_TA010_EN   DEFAULT_ENABLED
 
+#define CALIB_SHA104_EN   DEFAULT_ENABLED
 
+#define CALIB_SHA105_EN   DEFAULT_ENABLED
 
+#define CALIB_FULL_FEATURE   (CALIB_SHA204_EN || CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN)
 
+#define CALIB_ECC_SUPPORT   (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN || CALIB_ECC204_EN || CALIB_TA010_EN)
 
+#define CALIB_CA2_SUPPORT   (CALIB_ECC204_EN || CALIB_TA010_EN || CALIB_SHA104_EN || CALIB_SHA105_EN)
 
+#define CALIB_CA2_CERT_SUPPORT   (CALIB_ECC204_EN || CALIB_TA010_EN)
 
+#define CALIB_SHA206_ONLY   (CALIB_SHA206_EN && !(CALIB_FULL_FEATURE || ATCA_CA2_SUPPORT))
 
+#define DEFAULT_CA_MAX_PACKET_SIZE   (198u)
 
+#define CA_MAX_PACKET_SIZE   (DEFAULT_CA_MAX_PACKET_SIZE)
 
+#define CALIB_AES_EN   (ATCAB_AES_EN && CALIB_ECC608_EN)
 
+#define CALIB_AES_GCM_EN   (ATCAB_AES_GCM_EN && CALIB_AES_EN && CALIB_ECC608_EN)
 
+#define CALIB_CHECKMAC_EN   (ATCAB_CHECKMAC_EN && (CALIB_FULL_FEATURE || CALIB_SHA105_EN))
 
+#define CALIB_COUNTER_EN   (ATCAB_COUNTER_EN && (CALIB_ECC_SUPPORT || CALIB_SHA104_EN || CALIB_SHA105_EN))
 
+#define CALIB_DELETE_EN   (DEFAULT_DISABLED)
 
+#define CALIB_DERIVEKEY_EN   (ATCAB_DERIVEKEY_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
 
+#define CALIB_ECDH_EN   (ATCAB_ECDH_EN && (CALIB_ECC508_EN || CALIB_ECC608_EN))
 
+#define CALIB_ECDH_ENC_EN   (ATCAB_ECDH_ENC_EN && (CALIB_ECC508_EN || CALIB_ECC608_EN))
 
+#define CALIB_GENDIG_EN   (ATCAB_GENDIG_EN && (CALIB_FULL_FEATURE || CALIB_SHA105_EN))
 
+#define CALIB_GENDIVKEY_EN   (ATCAB_GENDIG_EN && CALIB_SHA105_EN)
 
+#define CALIB_GENKEY_EN   (ATCAB_GENKEY_EN && CALIB_ECC_SUPPORT)
 
+#define CALIB_GENKEY_MAC_EN   (ATCAB_GENKEY_MAC_EN && CALIB_ECC_SUPPORT)
 
+#define CALIB_HMAC_EN   (ATCAB_HMAC_EN && (CALIB_SHA204_EN || CALIB_ECC108_EN || CALIB_ECC508_EN))
 
#define CALIB_INFO_LATCH_EN   ATCAB_INFO_LATCH_EN
 
+#define CALIB_KDF_EN   (ATCAB_KDF_EN && CALIB_ECC608_EN)
 
#define CALIB_LOCK_EN   (ATCAB_LOCK_EN && CALIB_FULL_FEATURE)
 
#define CALIB_LOCK_CA2_EN   (ATCAB_LOCK_EN && ATCA_CA2_SUPPORT)
 
+#define CALIB_MAC_EN   (ATCAB_MAC_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN || CALIB_SHA104_EN))
 
+#define CALIB_NONCE_EN   (ATCAB_NONCE_EN && (CALIB_FULL_FEATURE || CALIB_CA2_SUPPORT))
 
+#define CALIB_PRIVWRITE_EN   (ATCAB_PRIVWRITE_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
 
+#define CALIB_RANDOM_EN   (ATCAB_RANDOM_EN && CALIB_FULL_FEATURE)
 
#define CALIB_READ_EN   (ATCAB_READ_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
 
+#define CALIB_READ_CA2_EN   (ATCAB_READ_EN && CALIB_CA2_SUPPORT)
 
+#define CALIB_READ_ENC_EN   (ATCAB_READ_ENC_EN && CALIB_FULL_FEATURE)
 
+#define CALIB_SECUREBOOT_EN   (ATCAB_SECUREBOOT_EN && CALIB_ECC608_EN)
 
+#define CALIB_SECUREBOOT_MAC_EN   (ATCAB_SECUREBOOT_MAC_EN && CALIB_ECC608_EN)
 
+#define CALIB_SELFTEST_EN   (ATCAB_SELFTEST_EN && (CALIB_ECC608_EN || CALIB_CA2_SUPPORT))
 
#define CALIB_SHA_EN   (ATCAB_SHA_EN && (CALIB_FULL_FEATURE || CALIB_CA2_SUPPORT))
 
#define CALIB_SHA_HMAC_EN   (ATCAB_SHA_HMAC_EN && CALIB_ECC_SUPPORT)
 
#define CALIB_SHA_CONTEXT_EN   (ATCAB_SHA_CONTEXT_EN && CALIB_ECC608_EN)
 
#define CALIB_SIGN_EN   (ATCAB_SIGN_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
 
#define CALIB_SIGN_CA2_EN   (ATCAB_SIGN_EN && (CALIB_ECC204_EN || CALIB_TA010_EN))
 
+#define CALIB_SIGN_INTERNAL_EN   (ATCAB_SIGN_INTERNAL_EN && CALIB_SIGN_EN)
 
#define CALIB_UPDATEEXTRA_EN   (ATCAB_UPDATEEXTRA_EN && CALIB_FULL_FEATURE)
 
#define CALIB_VERIFY_EN   (ATCAB_VERIFY_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
 
#define CALIB_VERIFY_MAC_EN   (ATCAB_VERIFY_MAC_EN && CALIB_ECC608_EN)
 
+#define CALIB_VERIFY_EXTERN_EN   (ATCAB_VERIFY_EXTERN_EN && CALIB_VERIFY_EN)
 
#define CALIB_VERIFY_STORED_EN   (ATCAB_VERIFY_STORED_EN && CALIB_VERIFY_EN)
 
+#define CALIB_VERIFY_VALIDATE_EN   (ATCAB_VERIFY_VALIDATE_EN && CALIB_VERIFY_EN)
 
+#define CALIB_WRITE_EN   (ATCAB_WRITE_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
 
#define CALIB_WRITE_ENC_EN   (ATCAB_WRITE_ENC_EN && CALIB_FULL_FEATURE)
 
+#define CALIB_WRITE_CA2_EN   (ATCAB_WRITE_EN && CALIB_CA2_SUPPORT)
 
+

Detailed Description

+

Consistency checks for configuration options.

+ +

Macro Definition Documentation

+ +

◆ CALIB_INFO_LATCH_EN

+ +
+
+ + + + +
#define CALIB_INFO_LATCH_EN   ATCAB_INFO_LATCH_EN
+
+

Supported API's: calib_info_get_latch calib_info_set_latch

+

ECC204 specific api: calib_info_lock_status

+ +
+
+ +

◆ CALIB_LOCK_CA2_EN

+ +
+
+ + + + +
#define CALIB_LOCK_CA2_EN   (ATCAB_LOCK_EN && ATCA_CA2_SUPPORT)
+
+

Enable CALIB_LOCK_CA2_EN which enables the lock command for the ecc204 and ta010 devices

+

Supported API's: calib_lock

+ +
+
+ +

◆ CALIB_LOCK_EN

+ +
+
+ + + + +
#define CALIB_LOCK_EN   (ATCAB_LOCK_EN && CALIB_FULL_FEATURE)
+
+

Enable CALIB_LOCK_EN to enable the lock commands for the classic cryptoauth parts

+

Supported API's: calib_lock

+ +
+
+ +

◆ CALIB_READ_EN

+ +
+
+ + + + +
#define CALIB_READ_EN   (ATCAB_READ_EN && (CALIB_FULL_FEATURE || CALIB_SHA206_EN))
+
+

Enable CALIB_READ_EN which enables the read commands

+

Supported API's: calib_read_zone

+ +
+
+ +

◆ CALIB_SHA_CONTEXT_EN

+ +
+
+ + + + +
#define CALIB_SHA_CONTEXT_EN   (ATCAB_SHA_CONTEXT_EN && CALIB_ECC608_EN)
+
+

Requires: CALIB_SHA_BASE

+

Use the SHA command to compute an HMAC/SHA-256 operation

+

Supported API's: calib_sha_read_context

+ +
+
+ +

◆ CALIB_SHA_EN

+ +
+
+ + + + +
#define CALIB_SHA_EN   (ATCAB_SHA_EN && (CALIB_FULL_FEATURE || CALIB_CA2_SUPPORT))
+
+

Enable CALIB_SHA_EN to compute a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system

+

Supported API's: calib_sha_base

+ +
+
+ +

◆ CALIB_SHA_HMAC_EN

+ +
+
+ + + + +
#define CALIB_SHA_HMAC_EN   (ATCAB_SHA_HMAC_EN && CALIB_ECC_SUPPORT)
+
+

Requires: CALIB_SHA_HMAC CALIB_SHA_BASE

+

Use the SHA command to compute an HMAC/SHA-256 operation

+

Supported API's: calib_sha_hmac,calib_sha_hmac_init, calib_sha_hmac_update, calib_sha_hmac_finish

+ +
+
+ +

◆ CALIB_SIGN_CA2_EN

+ +
+
+ + + + +
#define CALIB_SIGN_CA2_EN   (ATCAB_SIGN_EN && (CALIB_ECC204_EN || CALIB_TA010_EN))
+
+

Enable CALIB_SIGN_CA2_EN to generate a signature using the ECDSA algorithm

+

Supported API's: calib_sign_base

+ +
+
+ +

◆ CALIB_SIGN_EN

+ +
+
+ + + + +
#define CALIB_SIGN_EN   (ATCAB_SIGN_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
+
+

Enable CALIB_SIGN_EN to generate a signature using the ECDSA algorithm

+

Supported API's: calib_sign

+ +
+
+ +

◆ CALIB_UPDATEEXTRA_EN

+ +
+
+ + + + +
#define CALIB_UPDATEEXTRA_EN   (ATCAB_UPDATEEXTRA_EN && CALIB_FULL_FEATURE)
+
+

Enable CALIB_UPDATEEXTRA_EN to update the values of the two extra bytes within the configuration zone (bytes 84 and 85)

+

Supported API's: calib_updateextra

+ +
+
+ +

◆ CALIB_VERIFY_EN

+ +
+
+ + + + +
#define CALIB_VERIFY_EN   (ATCAB_VERIFY_EN && (CALIB_ECC108_EN || CALIB_ECC508_EN || CALIB_ECC608_EN))
+
+

Enable CALIB_VERIFY_EN which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command

+

Supported API's: calib_verify

+ +
+
+ +

◆ CALIB_VERIFY_MAC_EN

+ +
+
+ + + + +
#define CALIB_VERIFY_MAC_EN   (ATCAB_VERIFY_MAC_EN && CALIB_ECC608_EN)
+
+

Requires: CALIB_NONCE_MODE_ENCODING CALIB_NONCE_BASE ATCAH_VERIFY_MAC ATCAC_SW_SHA2_256 CALIB_VERIFY

+

Executes verification command with verification MAC for the External or Stored Verify modes

+

Supported API's: calib_verify_extern_stored_mac, calib_verify_extern_mac, calib_verify_stored_mac

+ +
+
+ +

◆ CALIB_VERIFY_STORED_EN

+ +
+
+ + + + +
#define CALIB_VERIFY_STORED_EN   (ATCAB_VERIFY_STORED_EN && CALIB_VERIFY_EN)
+
+

Requires: CALIB_NONCE_MODE_ENCODING CALIB_NONCE_BASE CALIB_VERIFY

+

Verifies a signature (ECDSA verify operation) with a public key stored in the device

+

Supported API's: calib_verify_stored

+ +
+
+ +

◆ CALIB_WRITE_ENC_EN

+ +
+
+ + + + +
#define CALIB_WRITE_ENC_EN   (ATCAB_WRITE_ENC_EN && CALIB_FULL_FEATURE)
+
+

Requires: CALIB_NONCE_MODE_ENCODING CALIB_NONCE_BASE CALIB_READ_ZONE CALIB_GENDIG ATCAH_GENDIG ATCAH_WRITE_AUTH_MAC ATCAH_NONCE ATCAC_SW_SHA2_256 CALIB_WRITE ATCAH_GEN_SESSION_KEY

+

Performs an encrypted write of a 32 byte block into given slot

+

Supported API's: calib_write_enc

+ +
+
+
diff --git a/a00362.html b/a00362.html index d20dbb3e9..dd2b3afa7 100644 --- a/a00362.html +++ b/a00362.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_derivekey.c File Reference +CryptoAuthLib: calib_counter.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_derivekey.c File Reference
+
calib_counter.c File Reference
-

CryptoAuthLib Basic API methods for DeriveKey command. +

CryptoAuthLib Basic API methods for Counter command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for DeriveKey command.

-

The DeriveKey command combines the current value of a key with the nonce stored in TempKey using SHA-256 and derives a new key.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for Counter command.

+

The Counter command reads or increments the binary count value for one of the two monotonic counters

+
Note
List of devices that support this command - ATECC508A and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00365.html b/a00365.html index b51ed4e2b..718479aa2 100644 --- a/a00365.html +++ b/a00365.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_device.h File Reference +CryptoAuthLib: calib_delete.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,379 +97,25 @@
- -
calib_device.h File Reference
+
calib_delete.c File Reference
-

Microchip Crypto Auth Device Data. +

CryptoAuthLib Basic API methods for Delete command. More...

-
#include <stdint.h>
-#include "atca_compiler.h"
-
- - - - - - - -

-Data Structures

struct  atsha204a_config_s
 
struct  atecc508a_config_s
 
struct  atecc608_config_s
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define ATCA_AES_ENABLE_EN_SHIFT   (0)
 
-#define ATCA_AES_ENABLE_EN_MASK   (0x01u << ATCA_AES_ENABLE_EN_SHIFT)
 
-#define ATCA_I2C_ENABLE_EN_SHIFT   (0)
 
-#define ATCA_I2C_ENABLE_EN_MASK   (0x01u << ATCA_I2C_ENABLE_EN_SHIFT)
 
-#define ATCA_COUNTER_MATCH_EN_SHIFT   (0)
 
-#define ATCA_COUNTER_MATCH_EN_MASK   (0x01u << ATCA_COUNTER_MATCH_EN_SHIFT)
 
-#define ATCA_COUNTER_MATCH_KEY_SHIFT   (4)
 
-#define ATCA_COUNTER_MATCH_KEY_MASK   (0x0Fu << ATCA_COUNTER_MATCH_KEY_SHIFT)
 
-#define ATCA_COUNTER_MATCH_KEY(v)   (ATCA_COUNTER_MATCH_KEY_MASK & (v << ATCA_COUNTER_MATCH_KEY_SHIFT))
 
-#define ATCA_CHIP_MODE_I2C_EXTRA_SHIFT   (0)
 
-#define ATCA_CHIP_MODE_I2C_EXTRA_MASK   (0x01u << ATCA_CHIP_MODE_I2C_EXTRA_SHIFT)
 
-#define ATCA_CHIP_MODE_TTL_EN_SHIFT   (1)
 
-#define ATCA_CHIP_MODE_TTL_EN_MASK   (0x01u << ATCA_CHIP_MODE_TTL_EN_SHIFT)
 
-#define ATCA_CHIP_MODE_WDG_LONG_SHIFT   (2)
 
-#define ATCA_CHIP_MODE_WDG_LONG_MASK   (0x01u << ATCA_CHIP_MODE_WDG_LONG_SHIFT)
 
-#define ATCA_CHIP_MODE_CLK_DIV_SHIFT   (3)
 
-#define ATCA_CHIP_MODE_CLK_DIV_MASK   (0x1Fu << ATCA_CHIP_MODE_CLK_DIV_SHIFT)
 
-#define ATCA_CHIP_MODE_CLK_DIV(v)   (ATCA_CHIP_MODE_CLK_DIV_MASK & (v << ATCA_CHIP_MODE_CLK_DIV_SHIFT))
 
-#define ATCA_SLOT_CONFIG_READKEY_SHIFT   (0)
 
-#define ATCA_SLOT_CONFIG_READKEY_MASK   (0x0Fu << ATCA_SLOT_CONFIG_READKEY_SHIFT)
 
-#define ATCA_SLOT_CONFIG_READKEY(v)   (ATCA_SLOT_CONFIG_READKEY_MASK & (v << ATCA_SLOT_CONFIG_READKEY_SHIFT))
 
-#define ATCA_SLOT_CONFIG_NOMAC_SHIFT   (4)
 
-#define ATCA_SLOT_CONFIG_NOMAC_MASK   (0x01u << ATCA_SLOT_CONFIG_NOMAC_SHIFT)
 
-#define ATCA_SLOT_CONFIG_LIMITED_USE_SHIFT   (5)
 
-#define ATCA_SLOT_CONFIG_LIMITED_USE_MASK   (0x01u << ATCA_SLOT_CONFIG_LIMITED_USE_SHIFT)
 
-#define ATCA_SLOT_CONFIG_ENC_READ_SHIFT   (6)
 
-#define ATCA_SLOT_CONFIG_ENC_READ_MASK   (0x01u << ATCA_SLOT_CONFIG_ENC_READ_SHIFT)
 
-#define ATCA_SLOT_CONFIG_IS_SECRET_SHIFT   (7)
 
-#define ATCA_SLOT_CONFIG_IS_SECRET_MASK   (0x01u << ATCA_SLOT_CONFIG_IS_SECRET_SHIFT)
 
-#define ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT   (8)
 
-#define ATCA_SLOT_CONFIG_WRITE_KEY_MASK   ((uint32_t)0x0Fu << ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT)
 
-#define ATCA_SLOT_CONFIG_WRITE_KEY(v)   (ATCA_SLOT_CONFIG_WRITE_KEY_MASK & (v << ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT))
 
-#define ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT   (12)
 
-#define ATCA_SLOT_CONFIG_WRITE_CONFIG_MASK   (((uint32_t)0x0Fu << ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT))
 
-#define ATCA_SLOT_CONFIG_WRITE_CONFIG(v)   ((ATCA_SLOT_CONFIG_WRITE_CONFIG_MASK & ((uint32_t)(v) << ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT)))
 
-#define ATCA_SLOT_CONFIG_EXT_SIG_SHIFT   (0)
 
-#define ATCA_SLOT_CONFIG_EXT_SIG_MASK   (0x01u << ATCA_SLOT_CONFIG_EXT_SIG_SHIFT)
 
-#define ATCA_SLOT_CONFIG_INT_SIG_SHIFT   (1)
 
-#define ATCA_SLOT_CONFIG_INT_SIG_MASK   (0x01u << ATCA_SLOT_CONFIG_INT_SIG_SHIFT)
 
-#define ATCA_SLOT_CONFIG_ECDH_SHIFT   (2)
 
-#define ATCA_SLOT_CONFIG_ECDH_MASK   (0x01u << ATCA_SLOT_CONFIG_ECDH_SHIFT)
 
-#define ATCA_SLOT_CONFIG_WRITE_ECDH_SHIFT   (3)
 
-#define ATCA_SLOT_CONFIG_WRITE_ECDH_MASK   (0x01u << ATCA_SLOT_CONFIG_WRITE_ECDH_SHIFT)
 
-#define ATCA_SLOT_CONFIG_GEN_KEY_SHIFT   (8)
 
-#define ATCA_SLOT_CONFIG_GEN_KEY_MASK   (0x01u << ATCA_SLOT_CONFIG_GEN_KEY_SHIFT)
 
-#define ATCA_SLOT_CONFIG_PRIV_WRITE_SHIFT   (9)
 
-#define ATCA_SLOT_CONFIG_PRIV_WRITE_MASK   (0x01u << ATCA_SLOT_CONFIG_PRIV_WRITE_SHIFT)
 
-#define ATCA_USE_LOCK_ENABLE_SHIFT   (0)
 
-#define ATCA_USE_LOCK_ENABLE_MASK   (0x0Fu << ATCA_USE_LOCK_ENABLE_SHIFT)
 
-#define ATCA_USE_LOCK_KEY_SHIFT   (4)
 
-#define ATCA_USE_LOCK_KEY_MASK   (0x0Fu << ATCA_USE_LOCK_KEY_SHIFT)
 
-#define ATCA_VOL_KEY_PERM_SLOT_SHIFT   (0)
 
-#define ATCA_VOL_KEY_PERM_SLOT_MASK   (0x0Fu << ATCA_VOL_KEY_PERM_SLOT_SHIFT)
 
-#define ATCA_VOL_KEY_PERM_SLOT(v)   (ATCA_VOL_KEY_PERM_SLOT_MASK & (v << ATCA_VOL_KEY_PERM_SLOT_SHIFT))
 
-#define ATCA_VOL_KEY_PERM_EN_SHIFT   (7)
 
-#define ATCA_VOL_KEY_PERM_EN_MASK   (0x01u << ATCA_VOL_KEY_PERM_EN_SHIFT)
 
-#define ATCA_SECURE_BOOT_MODE_SHIFT   (0)
 
-#define ATCA_SECURE_BOOT_MODE_MASK   (0x03u << ATCA_SECURE_BOOT_MODE_SHIFT)
 
-#define ATCA_SECURE_BOOT_MODE(v)   (ATCA_SECURE_BOOT_MODE_MASK & (v << ATCA_SECURE_BOOT_MODE_SHIFT))
 
-#define ATCA_SECURE_BOOT_PERSIST_EN_SHIFT   (3)
 
-#define ATCA_SECURE_BOOT_PERSIST_EN_MASK   (0x01u << ATCA_SECURE_BOOT_PERSIST_EN_SHIFT)
 
-#define ATCA_SECURE_BOOT_RAND_NONCE_SHIFT   (4)
 
-#define ATCA_SECURE_BOOT_RAND_NONCE_MASK   (0x01u << ATCA_SECURE_BOOT_RAND_NONCE_SHIFT)
 
-#define ATCA_SECURE_BOOT_DIGEST_SHIFT   (8)
 
-#define ATCA_SECURE_BOOT_DIGEST_MASK   (0x0Fu << ATCA_SECURE_BOOT_DIGEST_SHIFT)
 
-#define ATCA_SECURE_BOOT_DIGEST(v)   (ATCA_SECURE_BOOT_DIGEST_MASK & (v << ATCA_SECURE_BOOT_DIGEST_SHIFT))
 
-#define ATCA_SECURE_BOOT_PUB_KEY_SHIFT   (12)
 
-#define ATCA_SECURE_BOOT_PUB_KEY_MASK   (0x0Fu << ATCA_SECURE_BOOT_PUB_KEY_SHIFT)
 
-#define ATCA_SECURE_BOOT_PUB_KEY(v)   (ATCA_SECURE_BOOT_PUB_KEY_MASK & (v << ATCA_SECURE_BOOT_PUB_KEY_SHIFT))
 
-#define ATCA_SLOT_LOCKED(v)   ((0x01 << v) & 0xFFFFu)
 
-#define ATCA_CHIP_OPT_POST_EN_SHIFT   (0)
 
-#define ATCA_CHIP_OPT_POST_EN_MASK   (0x01u << ATCA_CHIP_OPT_POST_EN_SHIFT)
 
-#define ATCA_CHIP_OPT_IO_PROT_EN_SHIFT   (1)
 
-#define ATCA_CHIP_OPT_IO_PROT_EN_MASK   (0x01u << ATCA_CHIP_OPT_IO_PROT_EN_SHIFT)
 
-#define ATCA_CHIP_OPT_KDF_AES_EN_SHIFT   (2)
 
-#define ATCA_CHIP_OPT_KDF_AES_EN_MASK   (0x01u << ATCA_CHIP_OPT_KDF_AES_EN_SHIFT)
 
-#define ATCA_CHIP_OPT_ECDH_PROT_SHIFT   (8)
 
-#define ATCA_CHIP_OPT_ECDH_PROT_MASK   (0x03u << ATCA_CHIP_OPT_ECDH_PROT_SHIFT)
 
-#define ATCA_CHIP_OPT_ECDH_PROT(v)   (ATCA_CHIP_OPT_ECDH_PROT_MASK & (v << ATCA_CHIP_OPT_ECDH_PROT_SHIFT))
 
-#define ATCA_CHIP_OPT_KDF_PROT_SHIFT   (10)
 
-#define ATCA_CHIP_OPT_KDF_PROT_MASK   (0x03u << ATCA_CHIP_OPT_KDF_PROT_SHIFT)
 
-#define ATCA_CHIP_OPT_KDF_PROT(v)   (ATCA_CHIP_OPT_KDF_PROT_MASK & (v << ATCA_CHIP_OPT_KDF_PROT_SHIFT))
 
-#define ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT   (12)
 
-#define ATCA_CHIP_OPT_IO_PROT_KEY_MASK   ((uint16_t)0x0Fu << ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT)
 
-#define ATCA_CHIP_OPT_IO_PROT_KEY(v)   (ATCA_CHIP_OPT_IO_PROT_KEY_MASK & (v << ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT))
 
-#define ATCA_KEY_CONFIG_OFFSET(x)   (96UL + (x) * 2u)
 
-#define ATCA_KEY_CONFIG_PRIVATE_SHIFT   (0)
 
-#define ATCA_KEY_CONFIG_PRIVATE_MASK   (0x01u << ATCA_KEY_CONFIG_PRIVATE_SHIFT)
 
-#define ATCA_KEY_CONFIG_PUB_INFO_SHIFT   (1)
 
-#define ATCA_KEY_CONFIG_PUB_INFO_MASK   (0x01u << ATCA_KEY_CONFIG_PUB_INFO_SHIFT)
 
-#define ATCA_KEY_CONFIG_KEY_TYPE_SHIFT   (2)
 
-#define ATCA_KEY_CONFIG_KEY_TYPE_MASK   ((0x07u << ATCA_KEY_CONFIG_KEY_TYPE_SHIFT))
 
-#define ATCA_KEY_CONFIG_KEY_TYPE(v)   ((ATCA_KEY_CONFIG_KEY_TYPE_MASK & ((v) << ATCA_KEY_CONFIG_KEY_TYPE_SHIFT)))
 
-#define ATCA_KEY_CONFIG_LOCKABLE_SHIFT   (5)
 
-#define ATCA_KEY_CONFIG_LOCKABLE_MASK   (0x01u << ATCA_KEY_CONFIG_LOCKABLE_SHIFT)
 
-#define ATCA_KEY_CONFIG_REQ_RANDOM_SHIFT   (6)
 
-#define ATCA_KEY_CONFIG_REQ_RANDOM_MASK   (0x01u << ATCA_KEY_CONFIG_REQ_RANDOM_SHIFT)
 
-#define ATCA_KEY_CONFIG_REQ_AUTH_SHIFT   (7)
 
-#define ATCA_KEY_CONFIG_REQ_AUTH_MASK   (0x01u << ATCA_KEY_CONFIG_REQ_AUTH_SHIFT)
 
-#define ATCA_KEY_CONFIG_AUTH_KEY_SHIFT   (8)
 
-#define ATCA_KEY_CONFIG_AUTH_KEY_MASK   (0x0Fu << ATCA_KEY_CONFIG_AUTH_KEY_SHIFT)
 
-#define ATCA_KEY_CONFIG_AUTH_KEY(v)   (ATCA_KEY_CONFIG_AUTH_KEY_MASK & (v << ATCA_KEY_CONFIG_AUTH_KEY_SHIFT))
 
-#define ATCA_KEY_CONFIG_PERSIST_DIS_SHIFT   (12)
 
-#define ATCA_KEY_CONFIG_PERSIST_DIS_MASK   (0x01u << ATCA_KEY_CONFIG_PERSIST_DIS_SHIFT)
 
-#define ATCA_KEY_CONFIG_RFU_SHIFT   (13)
 
-#define ATCA_KEY_CONFIG_RFU_MASK   (0x01u << ATCA_KEY_CONFIG_RFU_SHIFT)
 
-#define ATCA_KEY_CONFIG_X509_ID_SHIFT   (14)
 
-#define ATCA_KEY_CONFIG_X509_ID_MASK   (0x03u << ATCA_KEY_CONFIG_X509_ID_SHIFT)
 
-#define ATCA_KEY_CONFIG_X509_ID(v)   (ATCA_KEY_CONFIG_X509_ID_MASK & (v << ATCA_KEY_CONFIG_X509_ID_SHIFT))
 
- - - - - - - -

-Typedefs

-typedef struct ATCA_PACKED atsha204a_config_s atsha204a_config_t
 
-typedef struct ATCA_PACKED atecc508a_config_s atecc508a_config_t
 
-typedef struct ATCA_PACKED atecc608_config_s atecc608_config_t
 
-

Detailed Description

-

Microchip Crypto Auth Device Data.

+
#include "cryptoauthlib.h"
+#include "host/atca_host.h"
+

Detailed Description

+

CryptoAuthLib Basic API methods for Delete command.

+

The Delete command, when executed, will clear all of the Data zone slots and set all bytes of each slot to 0xFF.The Configuration zone will be untouched, except for the value of the Primary_Deleted byte.

+
Note
List of devices that support this command - ECC204, TA010, SHA10x.Refer to device datasheets for full details.
diff --git a/a00368.html b/a00368.html index fdc841e7a..e449bc5cf 100644 --- a/a00368.html +++ b/a00368.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_ecdh.c File Reference +CryptoAuthLib: calib_derivekey.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,24 @@
-
calib_ecdh.c File Reference
+
calib_derivekey.c File Reference
-

CryptoAuthLib Basic API methods for ECDH command. +

CryptoAuthLib Basic API methods for DeriveKey command. More...

-
#include "cryptoauthlib.h"
-#include "host/atca_host.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for ECDH command.

-

The ECDH command implements the Elliptic Curve Diffie-Hellman algorithm to combine an internal private key with an external public key to calculate a shared secret.

-
Note
List of devices that support this command - ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for DeriveKey command.

+

The DeriveKey command combines the current value of a key with the nonce stored in TempKey using SHA-256 and derives a new key.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00371.html b/a00371.html index d131ea556..28c58a28e 100644 --- a/a00371.html +++ b/a00371.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_execution.c File Reference +CryptoAuthLib: calib_device.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,117 +98,378 @@
-
calib_execution.c File Reference
+Data Structures | +Macros | +Typedefs
+
calib_device.h File Reference
-

Implements an execution handler that executes a given command on a device and returns the results. +

Microchip Crypto Auth Device Data. More...

-
#include "cryptoauthlib.h"
+
#include <stdint.h>
+#include "atca_compiler.h"
- - - - - - - - - - - + + + + + + + +

-Functions

ATCA_STATUS calib_get_execution_time (uint8_t opcode, ATCADevice device)
 return the typical execution time for the given command
 
-ATCA_STATUS calib_execute_send (ATCADevice device, uint8_t word_address, uint8_t *txdata, uint16_t txlength)
 
-ATCA_STATUS calib_execute_receive (ATCADevice device, uint8_t device_address, uint8_t *rxdata, uint16_t *rxlength)
 
ATCA_STATUS calib_execute_command (ATCAPacket *packet, ATCADevice device)
 Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.
 

+Data Structures

struct  atsha204a_config_s
 
struct  atecc508a_config_s
 
struct  atecc608_config_s
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Macros

+#define ATCA_AES_ENABLE_EN_SHIFT   (0)
 
+#define ATCA_AES_ENABLE_EN_MASK   (0x01u << ATCA_AES_ENABLE_EN_SHIFT)
 
+#define ATCA_I2C_ENABLE_EN_SHIFT   (0)
 
+#define ATCA_I2C_ENABLE_EN_MASK   (0x01u << ATCA_I2C_ENABLE_EN_SHIFT)
 
+#define ATCA_COUNTER_MATCH_EN_SHIFT   (0)
 
+#define ATCA_COUNTER_MATCH_EN_MASK   (0x01u << ATCA_COUNTER_MATCH_EN_SHIFT)
 
+#define ATCA_COUNTER_MATCH_KEY_SHIFT   (4)
 
+#define ATCA_COUNTER_MATCH_KEY_MASK   (0x0Fu << ATCA_COUNTER_MATCH_KEY_SHIFT)
 
+#define ATCA_COUNTER_MATCH_KEY(v)   (ATCA_COUNTER_MATCH_KEY_MASK & (v << ATCA_COUNTER_MATCH_KEY_SHIFT))
 
+#define ATCA_CHIP_MODE_I2C_EXTRA_SHIFT   (0)
 
+#define ATCA_CHIP_MODE_I2C_EXTRA_MASK   (0x01u << ATCA_CHIP_MODE_I2C_EXTRA_SHIFT)
 
+#define ATCA_CHIP_MODE_TTL_EN_SHIFT   (1)
 
+#define ATCA_CHIP_MODE_TTL_EN_MASK   (0x01u << ATCA_CHIP_MODE_TTL_EN_SHIFT)
 
+#define ATCA_CHIP_MODE_WDG_LONG_SHIFT   (2)
 
+#define ATCA_CHIP_MODE_WDG_LONG_MASK   (0x01u << ATCA_CHIP_MODE_WDG_LONG_SHIFT)
 
+#define ATCA_CHIP_MODE_CLK_DIV_SHIFT   (3)
 
+#define ATCA_CHIP_MODE_CLK_DIV_MASK   (0x1Fu << ATCA_CHIP_MODE_CLK_DIV_SHIFT)
 
+#define ATCA_CHIP_MODE_CLK_DIV(v)   (ATCA_CHIP_MODE_CLK_DIV_MASK & (v << ATCA_CHIP_MODE_CLK_DIV_SHIFT))
 
+#define ATCA_SLOT_CONFIG_READKEY_SHIFT   (0)
 
+#define ATCA_SLOT_CONFIG_READKEY_MASK   (0x0Fu << ATCA_SLOT_CONFIG_READKEY_SHIFT)
 
+#define ATCA_SLOT_CONFIG_READKEY(v)   (ATCA_SLOT_CONFIG_READKEY_MASK & (v << ATCA_SLOT_CONFIG_READKEY_SHIFT))
 
+#define ATCA_SLOT_CONFIG_NOMAC_SHIFT   (4)
 
+#define ATCA_SLOT_CONFIG_NOMAC_MASK   (0x01u << ATCA_SLOT_CONFIG_NOMAC_SHIFT)
 
+#define ATCA_SLOT_CONFIG_LIMITED_USE_SHIFT   (5)
 
+#define ATCA_SLOT_CONFIG_LIMITED_USE_MASK   (0x01u << ATCA_SLOT_CONFIG_LIMITED_USE_SHIFT)
 
+#define ATCA_SLOT_CONFIG_ENC_READ_SHIFT   (6)
 
+#define ATCA_SLOT_CONFIG_ENC_READ_MASK   (0x01u << ATCA_SLOT_CONFIG_ENC_READ_SHIFT)
 
+#define ATCA_SLOT_CONFIG_IS_SECRET_SHIFT   (7)
 
+#define ATCA_SLOT_CONFIG_IS_SECRET_MASK   (0x01u << ATCA_SLOT_CONFIG_IS_SECRET_SHIFT)
 
+#define ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT   (8)
 
+#define ATCA_SLOT_CONFIG_WRITE_KEY_MASK   ((uint32_t)0x0Fu << ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT)
 
+#define ATCA_SLOT_CONFIG_WRITE_KEY(v)   (ATCA_SLOT_CONFIG_WRITE_KEY_MASK & (v << ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT))
 
+#define ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT   (12)
 
+#define ATCA_SLOT_CONFIG_WRITE_CONFIG_MASK   (((uint32_t)0x0Fu << ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT))
 
+#define ATCA_SLOT_CONFIG_WRITE_CONFIG(v)   ((ATCA_SLOT_CONFIG_WRITE_CONFIG_MASK & ((uint32_t)(v) << ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT)))
 
+#define ATCA_SLOT_CONFIG_EXT_SIG_SHIFT   (0)
 
+#define ATCA_SLOT_CONFIG_EXT_SIG_MASK   (0x01u << ATCA_SLOT_CONFIG_EXT_SIG_SHIFT)
 
+#define ATCA_SLOT_CONFIG_INT_SIG_SHIFT   (1)
 
+#define ATCA_SLOT_CONFIG_INT_SIG_MASK   (0x01u << ATCA_SLOT_CONFIG_INT_SIG_SHIFT)
 
+#define ATCA_SLOT_CONFIG_ECDH_SHIFT   (2)
 
+#define ATCA_SLOT_CONFIG_ECDH_MASK   (0x01u << ATCA_SLOT_CONFIG_ECDH_SHIFT)
 
+#define ATCA_SLOT_CONFIG_WRITE_ECDH_SHIFT   (3)
 
+#define ATCA_SLOT_CONFIG_WRITE_ECDH_MASK   (0x01u << ATCA_SLOT_CONFIG_WRITE_ECDH_SHIFT)
 
+#define ATCA_SLOT_CONFIG_GEN_KEY_SHIFT   (8)
 
+#define ATCA_SLOT_CONFIG_GEN_KEY_MASK   (0x01u << ATCA_SLOT_CONFIG_GEN_KEY_SHIFT)
 
+#define ATCA_SLOT_CONFIG_PRIV_WRITE_SHIFT   (9)
 
+#define ATCA_SLOT_CONFIG_PRIV_WRITE_MASK   (0x01u << ATCA_SLOT_CONFIG_PRIV_WRITE_SHIFT)
 
+#define ATCA_USE_LOCK_ENABLE_SHIFT   (0)
 
+#define ATCA_USE_LOCK_ENABLE_MASK   (0x0Fu << ATCA_USE_LOCK_ENABLE_SHIFT)
 
+#define ATCA_USE_LOCK_KEY_SHIFT   (4)
 
+#define ATCA_USE_LOCK_KEY_MASK   (0x0Fu << ATCA_USE_LOCK_KEY_SHIFT)
 
+#define ATCA_VOL_KEY_PERM_SLOT_SHIFT   (0)
 
+#define ATCA_VOL_KEY_PERM_SLOT_MASK   (0x0Fu << ATCA_VOL_KEY_PERM_SLOT_SHIFT)
 
+#define ATCA_VOL_KEY_PERM_SLOT(v)   (ATCA_VOL_KEY_PERM_SLOT_MASK & (v << ATCA_VOL_KEY_PERM_SLOT_SHIFT))
 
+#define ATCA_VOL_KEY_PERM_EN_SHIFT   (7)
 
+#define ATCA_VOL_KEY_PERM_EN_MASK   (0x01u << ATCA_VOL_KEY_PERM_EN_SHIFT)
 
+#define ATCA_SECURE_BOOT_MODE_SHIFT   (0)
 
+#define ATCA_SECURE_BOOT_MODE_MASK   (0x03u << ATCA_SECURE_BOOT_MODE_SHIFT)
 
+#define ATCA_SECURE_BOOT_MODE(v)   (ATCA_SECURE_BOOT_MODE_MASK & (v << ATCA_SECURE_BOOT_MODE_SHIFT))
 
+#define ATCA_SECURE_BOOT_PERSIST_EN_SHIFT   (3)
 
+#define ATCA_SECURE_BOOT_PERSIST_EN_MASK   (0x01u << ATCA_SECURE_BOOT_PERSIST_EN_SHIFT)
 
+#define ATCA_SECURE_BOOT_RAND_NONCE_SHIFT   (4)
 
+#define ATCA_SECURE_BOOT_RAND_NONCE_MASK   (0x01u << ATCA_SECURE_BOOT_RAND_NONCE_SHIFT)
 
+#define ATCA_SECURE_BOOT_DIGEST_SHIFT   (8)
 
+#define ATCA_SECURE_BOOT_DIGEST_MASK   (0x0Fu << ATCA_SECURE_BOOT_DIGEST_SHIFT)
 
+#define ATCA_SECURE_BOOT_DIGEST(v)   (ATCA_SECURE_BOOT_DIGEST_MASK & (v << ATCA_SECURE_BOOT_DIGEST_SHIFT))
 
+#define ATCA_SECURE_BOOT_PUB_KEY_SHIFT   (12)
 
+#define ATCA_SECURE_BOOT_PUB_KEY_MASK   (0x0Fu << ATCA_SECURE_BOOT_PUB_KEY_SHIFT)
 
+#define ATCA_SECURE_BOOT_PUB_KEY(v)   (ATCA_SECURE_BOOT_PUB_KEY_MASK & (v << ATCA_SECURE_BOOT_PUB_KEY_SHIFT))
 
+#define ATCA_SLOT_LOCKED(v)   ((0x01 << v) & 0xFFFFu)
 
+#define ATCA_CHIP_OPT_POST_EN_SHIFT   (0)
 
+#define ATCA_CHIP_OPT_POST_EN_MASK   (0x01u << ATCA_CHIP_OPT_POST_EN_SHIFT)
 
+#define ATCA_CHIP_OPT_IO_PROT_EN_SHIFT   (1)
 
+#define ATCA_CHIP_OPT_IO_PROT_EN_MASK   (0x01u << ATCA_CHIP_OPT_IO_PROT_EN_SHIFT)
 
+#define ATCA_CHIP_OPT_KDF_AES_EN_SHIFT   (2)
 
+#define ATCA_CHIP_OPT_KDF_AES_EN_MASK   (0x01u << ATCA_CHIP_OPT_KDF_AES_EN_SHIFT)
 
+#define ATCA_CHIP_OPT_ECDH_PROT_SHIFT   (8)
 
+#define ATCA_CHIP_OPT_ECDH_PROT_MASK   (0x03u << ATCA_CHIP_OPT_ECDH_PROT_SHIFT)
 
+#define ATCA_CHIP_OPT_ECDH_PROT(v)   (ATCA_CHIP_OPT_ECDH_PROT_MASK & (v << ATCA_CHIP_OPT_ECDH_PROT_SHIFT))
 
+#define ATCA_CHIP_OPT_KDF_PROT_SHIFT   (10)
 
+#define ATCA_CHIP_OPT_KDF_PROT_MASK   (0x03u << ATCA_CHIP_OPT_KDF_PROT_SHIFT)
 
+#define ATCA_CHIP_OPT_KDF_PROT(v)   (ATCA_CHIP_OPT_KDF_PROT_MASK & (v << ATCA_CHIP_OPT_KDF_PROT_SHIFT))
 
+#define ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT   (12)
 
+#define ATCA_CHIP_OPT_IO_PROT_KEY_MASK   ((uint16_t)0x0Fu << ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT)
 
+#define ATCA_CHIP_OPT_IO_PROT_KEY(v)   (ATCA_CHIP_OPT_IO_PROT_KEY_MASK & (v << ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT))
 
+#define ATCA_KEY_CONFIG_OFFSET(x)   (96UL + (x) * 2u)
 
+#define ATCA_KEY_CONFIG_PRIVATE_SHIFT   (0)
 
+#define ATCA_KEY_CONFIG_PRIVATE_MASK   (0x01u << ATCA_KEY_CONFIG_PRIVATE_SHIFT)
 
+#define ATCA_KEY_CONFIG_PUB_INFO_SHIFT   (1)
 
+#define ATCA_KEY_CONFIG_PUB_INFO_MASK   (0x01u << ATCA_KEY_CONFIG_PUB_INFO_SHIFT)
 
+#define ATCA_KEY_CONFIG_KEY_TYPE_SHIFT   (2)
 
+#define ATCA_KEY_CONFIG_KEY_TYPE_MASK   ((0x07u << ATCA_KEY_CONFIG_KEY_TYPE_SHIFT))
 
+#define ATCA_KEY_CONFIG_KEY_TYPE(v)   ((ATCA_KEY_CONFIG_KEY_TYPE_MASK & ((v) << ATCA_KEY_CONFIG_KEY_TYPE_SHIFT)))
 
+#define ATCA_KEY_CONFIG_LOCKABLE_SHIFT   (5)
 
+#define ATCA_KEY_CONFIG_LOCKABLE_MASK   (0x01u << ATCA_KEY_CONFIG_LOCKABLE_SHIFT)
 
+#define ATCA_KEY_CONFIG_REQ_RANDOM_SHIFT   (6)
 
+#define ATCA_KEY_CONFIG_REQ_RANDOM_MASK   (0x01u << ATCA_KEY_CONFIG_REQ_RANDOM_SHIFT)
 
+#define ATCA_KEY_CONFIG_REQ_AUTH_SHIFT   (7)
 
+#define ATCA_KEY_CONFIG_REQ_AUTH_MASK   (0x01u << ATCA_KEY_CONFIG_REQ_AUTH_SHIFT)
 
+#define ATCA_KEY_CONFIG_AUTH_KEY_SHIFT   (8)
 
+#define ATCA_KEY_CONFIG_AUTH_KEY_MASK   (0x0Fu << ATCA_KEY_CONFIG_AUTH_KEY_SHIFT)
 
+#define ATCA_KEY_CONFIG_AUTH_KEY(v)   (ATCA_KEY_CONFIG_AUTH_KEY_MASK & (v << ATCA_KEY_CONFIG_AUTH_KEY_SHIFT))
 
+#define ATCA_KEY_CONFIG_PERSIST_DIS_SHIFT   (12)
 
+#define ATCA_KEY_CONFIG_PERSIST_DIS_MASK   (0x01u << ATCA_KEY_CONFIG_PERSIST_DIS_SHIFT)
 
+#define ATCA_KEY_CONFIG_RFU_SHIFT   (13)
 
+#define ATCA_KEY_CONFIG_RFU_MASK   (0x01u << ATCA_KEY_CONFIG_RFU_SHIFT)
 
+#define ATCA_KEY_CONFIG_X509_ID_SHIFT   (14)
 
+#define ATCA_KEY_CONFIG_X509_ID_MASK   (0x03u << ATCA_KEY_CONFIG_X509_ID_SHIFT)
 
+#define ATCA_KEY_CONFIG_X509_ID(v)   (ATCA_KEY_CONFIG_X509_ID_MASK & (v << ATCA_KEY_CONFIG_X509_ID_SHIFT))
 
+ + + + + + +

+Typedefs

+typedef struct ATCA_PACKED atsha204a_config_s atsha204a_config_t
 
+typedef struct ATCA_PACKED atecc508a_config_s atecc508a_config_t
 
+typedef struct ATCA_PACKED atecc608_config_s atecc608_config_t
 

Detailed Description

-

Implements an execution handler that executes a given command on a device and returns the results.

-

This implementation wraps Polling and No polling (simple wait) schemes into a single method and use it across the library. Polling is used by default, however, by defining the ATCA_NO_POLL symbol the code will instead wait an estimated max execution time before requesting the result.

+

Microchip Crypto Auth Device Data.

-

Function Documentation

- -

◆ calib_execute_command()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_execute_command (ATCAPacketpacket,
ATCADevice device 
)
-
- -

Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.

-
Parameters
- - - -
[in,out]packetAs input, the packet to be sent. As output, the data buffer in the packet structure will contain the response.
[in]deviceCryptoAuthentication device to send the command to.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_get_execution_time()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_get_execution_time (uint8_t opcode,
ATCADevice device 
)
-
- -

return the typical execution time for the given command

-
Parameters
- - - -
[in]opcodeOpcode value of the command
[in]ca_cmdCommand object for which the execution times are associated
-
-
-
Returns
ATCA_SUCCESS
- -
-
-
+
diff --git a/a00371.js b/a00371.js deleted file mode 100644 index 0ad337b11..000000000 --- a/a00371.js +++ /dev/null @@ -1,5 +0,0 @@ -var a00371 = -[ - [ "calib_execute_command", "a00371.html#a19fc558e09f03a2f8f5ee89b1e396b2e", null ], - [ "calib_get_execution_time", "a00371.html#aa08ad4e89a8218e9598abbd36c11d07a", null ] -]; \ No newline at end of file diff --git a/a00374.html b/a00374.html index 287831b1a..5d8123d71 100644 --- a/a00374.html +++ b/a00374.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_execution.h File Reference +CryptoAuthLib: calib_ecdh.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,156 +97,25 @@
- -
calib_execution.h File Reference
+
calib_ecdh.c File Reference
-

Defines an execution handler that executes a given command on a device and returns the results. +

CryptoAuthLib Basic API methods for ECDH command. More...

-
#include "atca_status.h"
-#include "calib_command.h"
-#include "atca_device.h"
-#include "atca_config.h"
-
- - - - -

-Data Structures

struct  device_execution_time_t
 Structure to hold the device execution time and the opcode for the corresponding command. More...
 
- - - - - - - - - - - - - - - - - - -

-Macros

-#define ATCA_UNSUPPORTED_CMD   ((uint16_t)0xFFFF)
 
-#define CALIB_SWI_FLAG_WAKE   0x00
 flag preceding a command
 
-#define CALIB_SWI_FLAG_CMD   0x77
 flag preceding a command
 
-#define CALIB_SWI_FLAG_TX   0x88
 flag requesting a response
 
-#define CALIB_SWI_FLAG_IDLE   0xBB
 flag requesting to go into Idle mode
 
-#define CALIB_SWI_FLAG_SLEEP   0xCC
 flag requesting to go into Sleep mode
 
- - - - - - - - - - - -

-Functions

ATCA_STATUS calib_get_execution_time (uint8_t opcode, ATCADevice device)
 return the typical execution time for the given command
 
-ATCA_STATUS calib_execute_send (ATCADevice device, uint8_t word_address, uint8_t *txdata, uint16_t txlength)
 
-ATCA_STATUS calib_execute_receive (ATCADevice device, uint8_t device_address, uint8_t *rxdata, uint16_t *rxlength)
 
ATCA_STATUS calib_execute_command (ATCAPacket *packet, ATCADevice device)
 Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.
 
-

Detailed Description

-

Defines an execution handler that executes a given command on a device and returns the results.

-

The basic flow is to wake the device, send the command, wait/poll for completion, and finally receives the response from the device and does basic checks before returning to caller.

-

This handler supports the ATSHA and ATECC device family.

+
#include "cryptoauthlib.h"
+#include "host/atca_host.h"
+

Detailed Description

+

CryptoAuthLib Basic API methods for ECDH command.

+

The ECDH command implements the Elliptic Curve Diffie-Hellman algorithm to combine an internal private key with an external public key to calculate a shared secret.

+
Note
List of devices that support this command - ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
-

Function Documentation

- -

◆ calib_execute_command()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_execute_command (ATCAPacketpacket,
ATCADevice device 
)
-
- -

Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.

-
Parameters
- - - -
[in,out]packetAs input, the packet to be sent. As output, the data buffer in the packet structure will contain the response.
[in]deviceCryptoAuthentication device to send the command to.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_get_execution_time()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_get_execution_time (uint8_t opcode,
ATCADevice device 
)
-
- -

return the typical execution time for the given command

-
Parameters
- - - -
[in]opcodeOpcode value of the command
[in]ca_cmdCommand object for which the execution times are associated
-
-
-
Returns
ATCA_SUCCESS
- -
-
-
+
diff --git a/a00374.js b/a00374.js deleted file mode 100644 index 1259f48d6..000000000 --- a/a00374.js +++ /dev/null @@ -1,11 +0,0 @@ -var a00374 = -[ - [ "device_execution_time_t", "a01636.html", null ], - [ "CALIB_SWI_FLAG_CMD", "a00374.html#ac7946c257bcbaf0e1589e960b83d23df", null ], - [ "CALIB_SWI_FLAG_IDLE", "a00374.html#a525ae62bb76a8ba01d4d85264f832c8e", null ], - [ "CALIB_SWI_FLAG_SLEEP", "a00374.html#a8dd3e14e93cec4aea30e27104935d51b", null ], - [ "CALIB_SWI_FLAG_TX", "a00374.html#a1c46cc5ed5e30945d62e9ea369c94cdb", null ], - [ "CALIB_SWI_FLAG_WAKE", "a00374.html#a55c5fe347b23c42f6359e97ae82b4729", null ], - [ "calib_execute_command", "a00374.html#a19fc558e09f03a2f8f5ee89b1e396b2e", null ], - [ "calib_get_execution_time", "a00374.html#aa08ad4e89a8218e9598abbd36c11d07a", null ] -]; \ No newline at end of file diff --git a/a00377.html b/a00377.html index 5b4c7951a..6f8bd68cd 100644 --- a/a00377.html +++ b/a00377.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_gendig.c File Reference +CryptoAuthLib: calib_execution.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,118 @@
-
calib_gendig.c File Reference
+ +
calib_execution.c File Reference
-

CryptoAuthLib Basic API methods for GenDig command. +

Implements an execution handler that executes a given command on a device and returns the results. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for GenDig command.

-

The GenDig command uses SHA-256 to combine a stored value with the contents of TempKey, which must have been valid prior to the execution of this command.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+
#include "cryptoauthlib.h"
+
+ + + + + + + + + + + +

+Functions

ATCA_STATUS calib_get_execution_time (uint8_t opcode, ATCADevice device)
 return the typical execution time for the given command
 
+ATCA_STATUS calib_execute_send (ATCADevice device, uint8_t word_address, uint8_t *txdata, uint16_t txlength)
 
+ATCA_STATUS calib_execute_receive (ATCADevice device, uint8_t device_address, uint8_t *rxdata, uint16_t *rxlength)
 
ATCA_STATUS calib_execute_command (ATCAPacket *packet, ATCADevice device)
 Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.
 
+

Detailed Description

+

Implements an execution handler that executes a given command on a device and returns the results.

+

This implementation wraps Polling and No polling (simple wait) schemes into a single method and use it across the library. Polling is used by default, however, by defining the ATCA_NO_POLL symbol the code will instead wait an estimated max execution time before requesting the result.

-
+

Function Documentation

+ +

◆ calib_execute_command()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS calib_execute_command (ATCAPacketpacket,
ATCADevice device 
)
+
+ +

Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.

+
Parameters
+ + + +
[in,out]packetAs input, the packet to be sent. As output, the data buffer in the packet structure will contain the response.
[in]deviceCryptoAuthentication device to send the command to.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ calib_get_execution_time()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS calib_get_execution_time (uint8_t opcode,
ATCADevice device 
)
+
+ +

return the typical execution time for the given command

+
Parameters
+ + + +
[in]opcodeOpcode value of the command
[in]ca_cmdCommand object for which the execution times are associated
+
+
+
Returns
ATCA_SUCCESS
+ +
+
+
diff --git a/a00380.html b/a00380.html index d069ab40e..5450b3cbd 100644 --- a/a00380.html +++ b/a00380.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_genkey.c File Reference +CryptoAuthLib: calib_execution.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,156 @@
-
calib_genkey.c File Reference
+ +
calib_execution.h File Reference
-

CryptoAuthLib Basic API methods for GenKey command. +

Defines an execution handler that executes a given command on a device and returns the results. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for GenKey command.

-

The GenKey command is used for creating ECC private keys, generating ECC public keys, and for digest calculations involving public keys.

-
Note
List of devices that support this command - ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+
#include "atca_status.h"
+#include "calib_command.h"
+#include "atca_device.h"
+#include "atca_config.h"
+
+ + + + +

+Data Structures

struct  device_execution_time_t
 Structure to hold the device execution time and the opcode for the corresponding command. More...
 
+ + + + + + + + + + + + + + + + + + +

+Macros

+#define ATCA_UNSUPPORTED_CMD   ((uint16_t)0xFFFF)
 
+#define CALIB_SWI_FLAG_WAKE   0x00
 flag preceding a command
 
+#define CALIB_SWI_FLAG_CMD   0x77
 flag preceding a command
 
+#define CALIB_SWI_FLAG_TX   0x88
 flag requesting a response
 
+#define CALIB_SWI_FLAG_IDLE   0xBB
 flag requesting to go into Idle mode
 
+#define CALIB_SWI_FLAG_SLEEP   0xCC
 flag requesting to go into Sleep mode
 
+ + + + + + + + + + + +

+Functions

ATCA_STATUS calib_get_execution_time (uint8_t opcode, ATCADevice device)
 return the typical execution time for the given command
 
+ATCA_STATUS calib_execute_send (ATCADevice device, uint8_t word_address, uint8_t *txdata, uint16_t txlength)
 
+ATCA_STATUS calib_execute_receive (ATCADevice device, uint8_t device_address, uint8_t *rxdata, uint16_t *rxlength)
 
ATCA_STATUS calib_execute_command (ATCAPacket *packet, ATCADevice device)
 Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.
 
+

Detailed Description

+

Defines an execution handler that executes a given command on a device and returns the results.

+

The basic flow is to wake the device, send the command, wait/poll for completion, and finally receives the response from the device and does basic checks before returning to caller.

+

This handler supports the ATSHA and ATECC device family.

-
+

Function Documentation

+ +

◆ calib_execute_command()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS calib_execute_command (ATCAPacketpacket,
ATCADevice device 
)
+
+ +

Wakes up device, sends the packet, waits for command completion, receives response, and puts the device into the idle state.

+
Parameters
+ + + +
[in,out]packetAs input, the packet to be sent. As output, the data buffer in the packet structure will contain the response.
[in]deviceCryptoAuthentication device to send the command to.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ calib_get_execution_time()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS calib_get_execution_time (uint8_t opcode,
ATCADevice device 
)
+
+ +

return the typical execution time for the given command

+
Parameters
+ + + +
[in]opcodeOpcode value of the command
[in]ca_cmdCommand object for which the execution times are associated
+
+
+
Returns
ATCA_SUCCESS
+ +
+
+
diff --git a/a00383.html b/a00383.html index bb249e727..3e600f2bc 100644 --- a/a00383.html +++ b/a00383.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_helpers.c File Reference +CryptoAuthLib: calib_gendig.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,44 +97,24 @@
- -
calib_helpers.c File Reference
+
calib_gendig.c File Reference
-

CryptoAuthLib Basic API - Helper Functions to. +

CryptoAuthLib Basic API methods for GenDig command. More...

-
#include "cryptoauthlib.h"
-
- - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS calib_ca2_is_config_locked (ATCADevice device, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified slot is locked.
 
ATCA_STATUS calib_ca2_is_data_locked (ATCADevice device, bool *is_locked)
 Use Info command to check ECC204 Data zone lock status.
 
ATCA_STATUS calib_ca2_is_locked (ATCADevice device, uint8_t zone, bool *is_locked)
 Use Info command to check config/data is locked or not.
 
-ATCADeviceType calib_get_devicetype (uint8_t revision[4])
 Parse the revision field to get the device type.
 
-ATCADeviceType calib_get_devicetype_with_device_id (uint8_t device_id, uint8_t device_revision)
 
-

Detailed Description

-

CryptoAuthLib Basic API - Helper Functions to.

+
#include "cryptoauthlib.h"
+

Detailed Description

+

CryptoAuthLib Basic API methods for GenDig command.

+

The GenDig command uses SHA-256 to combine a stored value with the contents of TempKey, which must have been valid prior to the execution of this command.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00383.js b/a00383.js deleted file mode 100644 index 54ee9f076..000000000 --- a/a00383.js +++ /dev/null @@ -1,7 +0,0 @@ -var a00383 = -[ - [ "calib_ca2_is_config_locked", "a01444.html#gad7d44a63b0871068bc30abb0faed78f9", null ], - [ "calib_ca2_is_data_locked", "a01444.html#ga801b481ac3ff13401fc2a45817d05db4", null ], - [ "calib_ca2_is_locked", "a01444.html#ga55738f97714ea089a988e1853d8d6224", null ], - [ "calib_get_devicetype", "a01444.html#ga00e2fc1d5b517b275066c31be0be2304", null ] -]; \ No newline at end of file diff --git a/a00386.html b/a00386.html index 63844172c..5587d7e84 100644 --- a/a00386.html +++ b/a00386.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_hmac.c File Reference +CryptoAuthLib: calib_genkey.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_hmac.c File Reference
+
calib_genkey.c File Reference
-

CryptoAuthLib Basic API methods for HMAC command. +

CryptoAuthLib Basic API methods for GenKey command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for HMAC command.

-

The HMAC command computes an HMAC/SHA-256 digest using a key stored in the device over a challenge stored in the TempKey register, and/or other information stored within the device.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, and ATECC508A . There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for GenKey command.

+

The GenKey command is used for creating ECC private keys, generating ECC public keys, and for digest calculations involving public keys.

+
Note
List of devices that support this command - ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00389.html b/a00389.html index 1d943beeb..81abb0041 100644 --- a/a00389.html +++ b/a00389.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_info.c File Reference +CryptoAuthLib: calib_helpers.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,45 +99,42 @@
-
calib_info.c File Reference
+
calib_helpers.c File Reference
-

CryptoAuthLib Basic API methods for Info command. +

CryptoAuthLib Basic API - Helper Functions to. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - + + + + + + + + + + + + + +

Functions

ATCA_STATUS calib_info_base (ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS calib_info (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS calib_info_privkey_valid (ATCADevice device, uint16_t key_id, uint8_t *is_valid)
 Use Info command to check ECC Private key stored in key slot is valid or not.
 
ATCA_STATUS calib_info_lock_status (ATCADevice device, uint16_t param2, uint8_t *is_locked)
 Use Info command to ECC204,TA010 config/data zone lock status.
 
ATCA_STATUS calib_info_chip_status (ATCADevice device, uint8_t *chip_status)
 Use Info command to get ECC204,TA010,SHA10x chip status.
 
ATCA_STATUS calib_ca2_is_config_locked (ATCADevice device, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified slot is locked.
 
ATCA_STATUS calib_ca2_is_data_locked (ATCADevice device, bool *is_locked)
 Use Info command to check ECC204 Data zone lock status.
 
ATCA_STATUS calib_ca2_is_locked (ATCADevice device, uint8_t zone, bool *is_locked)
 Use Info command to check config/data is locked or not.
 
+ATCADeviceType calib_get_devicetype (uint8_t revision[4])
 Parse the revision field to get the device type.
 
+ATCADeviceType calib_get_devicetype_with_device_id (uint8_t device_id, uint8_t device_revision)
 

Detailed Description

-

CryptoAuthLib Basic API methods for Info command.

-

Info command returns a variety of static and dynamic information about the device and its state. Also is used to control the GPIO pin and the persistent latch.

-
Note
The ATSHA204A refers to this command as DevRev instead of Info, however, the OpCode and operation is the same.
-
-List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A & ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API - Helper Functions to.

diff --git a/a00389.js b/a00389.js index 944101821..8f41d809f 100644 --- a/a00389.js +++ b/a00389.js @@ -1,8 +1,7 @@ var a00389 = [ - [ "calib_info", "a01444.html#ga132cfbb5c581c5cc5adf5350d4161966", null ], - [ "calib_info_base", "a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0", null ], - [ "calib_info_chip_status", "a01444.html#gac33e6d38d506b4e71618063d1b4a7499", null ], - [ "calib_info_lock_status", "a01444.html#gacd82ed053319a63bbe06755632e377bc", null ], - [ "calib_info_privkey_valid", "a01444.html#ga39e3e31e7573d3d73f4b757db7704cce", null ] + [ "calib_ca2_is_config_locked", "a01471.html#gad7d44a63b0871068bc30abb0faed78f9", null ], + [ "calib_ca2_is_data_locked", "a01471.html#ga801b481ac3ff13401fc2a45817d05db4", null ], + [ "calib_ca2_is_locked", "a01471.html#ga55738f97714ea089a988e1853d8d6224", null ], + [ "calib_get_devicetype", "a01471.html#ga00e2fc1d5b517b275066c31be0be2304", null ] ]; \ No newline at end of file diff --git a/a00392.html b/a00392.html index b04ff6b18..bdce0a709 100644 --- a/a00392.html +++ b/a00392.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_kdf.c File Reference +CryptoAuthLib: calib_hmac.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_kdf.c File Reference
+
calib_hmac.c File Reference
-

CryptoAuthLib Basic API methods for KDF command. +

CryptoAuthLib Basic API methods for HMAC command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for KDF command.

-

The KDF command implements one of a number of Key Derivation Functions (KDF). Generally this function combines a source key with an input string and creates a result key/digest/array. Three algorithms are currently supported: PRF, HKDF and AES.

-
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
+

CryptoAuthLib Basic API methods for HMAC command.

+

The HMAC command computes an HMAC/SHA-256 digest using a key stored in the device over a challenge stored in the TempKey register, and/or other information stored within the device.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, and ATECC508A . There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00395.html b/a00395.html index 1235377ff..7a826bc6a 100644 --- a/a00395.html +++ b/a00395.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_lock.c File Reference +CryptoAuthLib: calib_info.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,47 @@
-
calib_lock.c File Reference
+ +
calib_info.c File Reference
-

CryptoAuthLib Basic API methods for Lock command. +

CryptoAuthLib Basic API methods for Info command. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for Lock command.

-

The Lock command prevents future modifications of the Configuration zone, enables configured policies for Data and OTP zones, and can render individual slots read-only regardless of configuration.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+
#include "cryptoauthlib.h"
+
+ + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS calib_info_base (ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS calib_info (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS calib_info_privkey_valid (ATCADevice device, uint16_t key_id, uint8_t *is_valid)
 Use Info command to check ECC Private key stored in key slot is valid or not.
 
ATCA_STATUS calib_info_lock_status (ATCADevice device, uint16_t param2, uint8_t *is_locked)
 Use Info command to ECC204,TA010 config/data zone lock status.
 
ATCA_STATUS calib_info_chip_status (ATCADevice device, uint8_t *chip_status)
 Use Info command to get ECC204,TA010,SHA10x chip status.
 
+

Detailed Description

+

CryptoAuthLib Basic API methods for Info command.

+

Info command returns a variety of static and dynamic information about the device and its state. Also is used to control the GPIO pin and the persistent latch.

+
Note
The ATSHA204A refers to this command as DevRev instead of Info, however, the OpCode and operation is the same.
+
+List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A & ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00398.html b/a00398.html index efd58ce5b..6b2fa93b9 100644 --- a/a00398.html +++ b/a00398.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_mac.c File Reference +CryptoAuthLib: calib_kdf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_mac.c File Reference
+
calib_kdf.c File Reference
-

CryptoAuthLib Basic API methods for MAC command. +

CryptoAuthLib Basic API methods for KDF command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for MAC command.

-

The MAC command computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device. The output of this command is the digest of this message.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for KDF command.

+

The KDF command implements one of a number of Key Derivation Functions (KDF). Generally this function combines a source key with an input string and creates a result key/digest/array. Three algorithms are currently supported: PRF, HKDF and AES.

+
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
diff --git a/a00401.html b/a00401.html index 0adc7a8ad..addf8bab0 100644 --- a/a00401.html +++ b/a00401.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_nonce.c File Reference +CryptoAuthLib: calib_lock.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_nonce.c File Reference
+
calib_lock.c File Reference
-

CryptoAuthLib Basic API methods for Nonce command. +

CryptoAuthLib Basic API methods for Lock command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for Nonce command.

-

The Nonce command generates a nonce for use by a subsequent commands of the device by combining an internally generated random number with an input value from the system.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for Lock command.

+

The Lock command prevents future modifications of the Configuration zone, enables configured policies for Data and OTP zones, and can render individual slots read-only regardless of configuration.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00404.html b/a00404.html index d52540c9c..25ea80ccd 100644 --- a/a00404.html +++ b/a00404.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_privwrite.c File Reference +CryptoAuthLib: calib_mac.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_privwrite.c File Reference
+
calib_mac.c File Reference
-

CryptoAuthLib Basic API methods for PrivWrite command. +

CryptoAuthLib Basic API methods for MAC command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for PrivWrite command.

-

The PrivWrite command is used to write externally generated ECC private keys into the device.

-
Note
List of devices that support this command - ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for MAC command.

+

The MAC command computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device. The output of this command is the digest of this message.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00407.html b/a00407.html index 3aa00583a..fb04abdd7 100644 --- a/a00407.html +++ b/a00407.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_random.c File Reference +CryptoAuthLib: calib_nonce.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_random.c File Reference
+
calib_nonce.c File Reference
-

CryptoAuthLib Basic API methods for Random command. +

CryptoAuthLib Basic API methods for Nonce command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for Random command.

-

The Random command generates a random number for use by the system.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for Nonce command.

+

The Nonce command generates a nonce for use by a subsequent commands of the device by combining an internally generated random number with an input value from the system.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00410.html b/a00410.html index 9028ceb62..c115871f9 100644 --- a/a00410.html +++ b/a00410.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_read.c File Reference +CryptoAuthLib: calib_packet.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,37 @@
-
calib_read.c File Reference
+ +
calib_packet.c File Reference
-

CryptoAuthLib Basic API methods for Read command. +

CryptoAuthLib API for packet allocation. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for Read command.

-

The Read command reads words either 4-byte words or 32-byte blocks from one of the memory zones of the device. The data may optionally be encrypted before being returned to the system.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
- +
#include "cryptoauthlib.h"
+#include "calib_packet.h"
+
+ + + + + +

+Functions

+ATCAPacketcalib_packet_alloc (void)
 
+void calib_packet_free (ATCAPacket *packet)
 
+

Detailed Description

+

CryptoAuthLib API for packet allocation.

+

The APIs are used for allocating packets in heap or bss according to atcab heap availability. Corresponding memory free is done

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B
+
diff --git a/a00413.html b/a00413.html index 9f2df4c32..a6c68695f 100644 --- a/a00413.html +++ b/a00413.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_secureboot.c File Reference +CryptoAuthLib: calib_packet.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,38 @@
-
calib_secureboot.c File Reference
+ +
calib_packet.h File Reference
-

CryptoAuthLib Basic API methods for SecureBoot command. +

Defines packet allocation functions. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for SecureBoot command.

-

The SecureBoot command provides support for secure boot of an external MCU or MPU.

-
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
- +
#include "calib_command.h"
+#include "atca_device.h"
+#include "atca_config.h"
+
+ + + + + +

+Functions

+ATCAPacketcalib_packet_alloc (void)
 
+void calib_packet_free (ATCAPacket *packet)
 
+

Detailed Description

+

Defines packet allocation functions.

+

The APIs are used for allocating packets in heap or bss according to atcab heap availability. Corresponding memory free is done

+

This supports the ATECC device family.

+
diff --git a/a00416.html b/a00416.html index 9b74dc99f..0ec512461 100644 --- a/a00416.html +++ b/a00416.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_selftest.c File Reference +CryptoAuthLib: calib_privwrite.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_selftest.c File Reference
+
calib_privwrite.c File Reference
-

CryptoAuthLib Basic API methods for SelfTest command. +

CryptoAuthLib Basic API methods for PrivWrite command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for SelfTest command.

-

The SelfTest command performs a test of one or more of the cryptographic engines within the device.

-
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
+

CryptoAuthLib Basic API methods for PrivWrite command.

+

The PrivWrite command is used to write externally generated ECC private keys into the device.

+
Note
List of devices that support this command - ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00419.html b/a00419.html index 37b7a3826..edc5a3567 100644 --- a/a00419.html +++ b/a00419.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_sha.c File Reference +CryptoAuthLib: calib_random.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_sha.c File Reference
+
calib_random.c File Reference
-

CryptoAuthLib Basic API methods for SHA command. +

CryptoAuthLib Basic API methods for Random command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for SHA command.

-

The SHA command Computes a SHA-256 or HMAC/SHA digest for general purpose use by the host system.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for Random command.

+

The Random command generates a random number for use by the system.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00422.html b/a00422.html index d8b3b4fc1..3c0b5f70e 100644 --- a/a00422.html +++ b/a00422.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_sign.c File Reference +CryptoAuthLib: calib_read.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_sign.c File Reference
+
calib_read.c File Reference
-

CryptoAuthLib Basic API methods for Sign command. +

CryptoAuthLib Basic API methods for Read command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for Sign command.

-

The Sign command generates a signature using the private key in slot with ECDSA algorithm.

-
Note
List of devices that support this command - ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for Read command.

+

The Read command reads words either 4-byte words or 32-byte blocks from one of the memory zones of the device. The data may optionally be encrypted before being returned to the system.

+
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
diff --git a/a00425.html b/a00425.html index 22f0a8587..30550ecd8 100644 --- a/a00425.html +++ b/a00425.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_updateextra.c File Reference +CryptoAuthLib: calib_secureboot.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,24 @@
-
calib_updateextra.c File Reference
+
calib_secureboot.c File Reference
-

CryptoAuthLib Basic API methods for UpdateExtra command. +

CryptoAuthLib Basic API methods for SecureBoot command. More...

-
#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for UpdateExtra command.

-

The UpdateExtra command is used to update the values of the two extra bytes within the Configuration zone after the Configuration zone has been locked.

-
Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
+

CryptoAuthLib Basic API methods for SecureBoot command.

+

The SecureBoot command provides support for secure boot of an external MCU or MPU.

+
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
diff --git a/a00428.html b/a00428.html index ae057f64b..53b9526e9 100644 --- a/a00428.html +++ b/a00428.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_verify.c File Reference +CryptoAuthLib: calib_selftest.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,24 @@
-
calib_verify.c File Reference
+
calib_selftest.c File Reference
-

CryptoAuthLib Basic API methods for Verify command. +

CryptoAuthLib Basic API methods for SelfTest command. More...

-
#include "cryptoauthlib.h"
-#include "host/atca_host.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for Verify command.

-

The Verify command takes an ECDSA [R,S] signature and verifies that it is correctly generated given an input message digest and public key.

-
Note
List of devices that support this command - ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheet for full details.
+

CryptoAuthLib Basic API methods for SelfTest command.

+

The SelfTest command performs a test of one or more of the cryptographic engines within the device.

+
Note
List of devices that support this command - ATECC608A/B. Refer to device datasheet for full details.
diff --git a/a00431.html b/a00431.html index 4a25f30b8..984134d29 100644 --- a/a00431.html +++ b/a00431.html @@ -5,7 +5,7 @@ -CryptoAuthLib: calib_write.c File Reference +CryptoAuthLib: calib_sha.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,17 +97,16 @@
-
calib_write.c File Reference
+
calib_sha.c File Reference
-

CryptoAuthLib Basic API methods for Write command. +

CryptoAuthLib Basic API methods for SHA command. More...

-
#include "cryptoauthlib.h"
-#include "host/atca_host.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

CryptoAuthLib Basic API methods for Write command.

-

The Write command writes either one 4-byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for a slot, the data may be required to be encrypted by the system prior to being sent to the device

+

CryptoAuthLib Basic API methods for SHA command.

+

The SHA command Computes a SHA-256 or HMAC/SHA digest for general purpose use by the host system.

Note
List of devices that support this command - ATSHA204A, ATECC108A, ATECC508A, and ATECC608A/B. There are differences in the modes that they support. Refer to device datasheets for full details.
@@ -115,7 +114,7 @@ diff --git a/a00446.html b/a00446.html deleted file mode 100644 index 94d70bf73..000000000 --- a/a00446.html +++ /dev/null @@ -1,121 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_crypto_hw_aes.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
atca_crypto_hw_aes.h File Reference
-
-
- -

AES CTR, CBC & CMAC structure definitions. -More...

-
#include "cryptoauthlib.h"
-#include "crypto_hw_config_check.h"
-

Detailed Description

-

AES CTR, CBC & CMAC structure definitions.

- -
-
- - - - diff --git a/a00449.html b/a00449.html deleted file mode 100644 index cde69c02d..000000000 --- a/a00449.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_crypto_hw_aes_cbc.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
atca_crypto_hw_aes_cbc.c File Reference
-
-
- -

CryptoAuthLib Basic API methods for AES CBC mode. -More...

-
#include "cryptoauthlib.h"
-#include "atca_crypto_hw_aes.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for AES CBC mode.

-

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode.

-
Note
List of devices that support this command - ATECC608A, ATECC608B, & TA10x. Refer to device datasheet for full details.
- -
-
- - - - diff --git a/a00452.html b/a00452.html deleted file mode 100644 index f03f8a271..000000000 --- a/a00452.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_crypto_hw_aes_cbcmac.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
atca_crypto_hw_aes_cbcmac.c File Reference
-
-
- -

CryptoAuthLib Basic API methods for AES CBC_MAC mode. -More...

-
#include "cryptoauthlib.h"
-#include "crypto_hw_config_check.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for AES CBC_MAC mode.

-

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. Also can perform GFM (Galois Field Multiply) calculation in support of AES-GCM.

-
Note
List of devices that support this command - ATECC608A. Refer to device datasheet for full details.
- -
-
- - - - diff --git a/a00455.html b/a00455.html deleted file mode 100644 index 70ce3c8f5..000000000 --- a/a00455.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_crypto_hw_aes_ccm.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
atca_crypto_hw_aes_ccm.c File Reference
-
-
- -

CryptoAuthLib Basic API methods for AES CCM mode. -More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

CryptoAuthLib Basic API methods for AES CCM mode.

-

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. CCM mode provides security and authenticity to the message being processed.

-
Note
List of devices that support this command - ATECC608A. Refer to device datasheet for full details.
- -
-
- - - - diff --git a/a00458.html b/a00458.html index 415acf94d..88f49167d 100644 --- a/a00458.html +++ b/a00458.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_hw_aes_cmac.c File Reference +CryptoAuthLib: atca_crypto_hw_aes.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,23 @@
-
atca_crypto_hw_aes_cmac.c File Reference
+
atca_crypto_hw_aes.h File Reference
-

CryptoAuthLib Basic API methods for AES CBC_MAC mode. +

AES CTR, CBC & CMAC structure definitions. More...

-
#include "cryptoauthlib.h"
-#include "atca_crypto_hw_aes.h"
+

Detailed Description

-

CryptoAuthLib Basic API methods for AES CBC_MAC mode.

-

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode.

-
Note
List of devices that support this command - ATECC608A, ATECC608B, & TA10x. Refer to device datasheet for full details.
+

AES CTR, CBC & CMAC structure definitions.

diff --git a/a00461.html b/a00461.html index 4896e90e1..b410faede 100644 --- a/a00461.html +++ b/a00461.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_hw_aes_ctr.c File Reference +CryptoAuthLib: atca_crypto_hw_aes_cbc.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,25 @@
-
atca_crypto_hw_aes_ctr.c File Reference
+
atca_crypto_hw_aes_cbc.c File Reference
-

CryptoAuthLib Basic API methods for AES CTR mode. +

CryptoAuthLib Basic API methods for AES CBC mode. More...

-
#include "cryptoauthlib.h"
-#include "atca_crypto_hw_aes.h"
+
#include "cryptoauthlib.h"
+#include "atca_crypto_hw_aes.h"

Detailed Description

-

CryptoAuthLib Basic API methods for AES CTR mode.

+

CryptoAuthLib Basic API methods for AES CBC mode.

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode.

-
Note
List of devices that support this command - ATECC608A, ATECC608B, & TA100. Refer to device datasheet for full details.
+
Note
List of devices that support this command - ATECC608A, ATECC608B, & TA10x. Refer to device datasheet for full details.
diff --git a/a00464.html b/a00464.html index 5077c0184..3b4f62a83 100644 --- a/a00464.html +++ b/a00464.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_pad.c File Reference +CryptoAuthLib: atca_crypto_hw_aes_cbcmac.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,23 +97,25 @@
-
atca_crypto_pad.c File Reference
+
atca_crypto_hw_aes_cbcmac.c File Reference
-

Implementation of PKCS7 Padding for block encryption. +

CryptoAuthLib Basic API methods for AES CBC_MAC mode. More...

-
#include "cryptoauthlib.h"
-#include "atca_crypto_sw.h"
+

Detailed Description

-

Implementation of PKCS7 Padding for block encryption.

- +

CryptoAuthLib Basic API methods for AES CBC_MAC mode.

+

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. Also can perform GFM (Galois Field Multiply) calculation in support of AES-GCM.

+
Note
List of devices that support this command - ATECC608A. Refer to device datasheet for full details.
+
diff --git a/a00467.html b/a00467.html index e176ef50f..90f3d79f2 100644 --- a/a00467.html +++ b/a00467.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_pbkdf2.c File Reference +CryptoAuthLib: atca_crypto_hw_aes_ccm.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,23 +97,24 @@
-
atca_crypto_pbkdf2.c File Reference
+
atca_crypto_hw_aes_ccm.c File Reference
-

Implementation of the PBKDF2 algorithm for use in generating password hashes. +

CryptoAuthLib Basic API methods for AES CCM mode. More...

-
#include "cryptoauthlib.h"
-#include "cal_internal.h"
+
#include "cryptoauthlib.h"

Detailed Description

-

Implementation of the PBKDF2 algorithm for use in generating password hashes.

- +

CryptoAuthLib Basic API methods for AES CCM mode.

+

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode. CCM mode provides security and authenticity to the message being processed.

+
Note
List of devices that support this command - ATECC608A. Refer to device datasheet for full details.
+
diff --git a/a00470.html b/a00470.html index 64ed56727..5bc3d3244 100644 --- a/a00470.html +++ b/a00470.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_sw.h File Reference +CryptoAuthLib: atca_crypto_hw_aes_cmac.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,40 +97,25 @@
- -
atca_crypto_sw.h File Reference
+
atca_crypto_hw_aes_cmac.c File Reference
-

Common defines for CryptoAuthLib software crypto wrappers. +

CryptoAuthLib Basic API methods for AES CBC_MAC mode. More...

-
#include <stdint.h>
-#include <stdlib.h>
-#include "crypto/crypto_sw_config_check.h"
-#include "atca_status.h"
-
- - - - - - - -

-Macros

-#define ATCA_SHA1_DIGEST_SIZE   (20U)
 
-#define ATCA_SHA2_256_DIGEST_SIZE   (32U)
 
-#define ATCA_SHA2_256_BLOCK_SIZE   (64U)
 
-

Detailed Description

-

Common defines for CryptoAuthLib software crypto wrappers.

+
#include "cryptoauthlib.h"
+#include "atca_crypto_hw_aes.h"
+

Detailed Description

+

CryptoAuthLib Basic API methods for AES CBC_MAC mode.

+

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode.

+
Note
List of devices that support this command - ATECC608A, ATECC608B, & TA10x. Refer to device datasheet for full details.
diff --git a/a00473.html b/a00473.html index 52aa2b4be..dff3e0f4b 100644 --- a/a00473.html +++ b/a00473.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_sw_aes_gcm.c File Reference +CryptoAuthLib: atca_crypto_hw_aes_ctr.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,22 +97,25 @@
-
atca_crypto_sw_aes_gcm.c File Reference
+
atca_crypto_hw_aes_ctr.c File Reference
-

Common Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation. +

CryptoAuthLib Basic API methods for AES CTR mode. More...

-
#include "atca_crypto_sw.h"
+
#include "cryptoauthlib.h"
+#include "atca_crypto_hw_aes.h"

Detailed Description

-

Common Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation.

+

CryptoAuthLib Basic API methods for AES CTR mode.

+

The AES command supports 128-bit AES encryption or decryption of small messages or data packets in ECB mode.

+
Note
List of devices that support this command - ATECC608A, ATECC608B, & TA100. Refer to device datasheet for full details.
diff --git a/a00476.html b/a00476.html index 11d8154e7..df33ded30 100644 --- a/a00476.html +++ b/a00476.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_sw_sha1.c File Reference +CryptoAuthLib: atca_crypto_pad.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,23 @@
-
atca_crypto_sw_sha1.c File Reference
+
atca_crypto_pad.c File Reference
-

Wrapper API for SHA 1 routines. +

Implementation of PKCS7 Padding for block encryption. More...

-
#include "atca_crypto_sw_sha1.h"
-#include "hashes/sha1_routines.h"
-#include "cryptoauthlib.h"
-#include "cal_internal.h"
+
#include "cryptoauthlib.h"
+#include "atca_crypto_sw.h"

Detailed Description

-

Wrapper API for SHA 1 routines.

- +

Implementation of PKCS7 Padding for block encryption.

+
diff --git a/a00479.html b/a00479.html index d750ecc19..d47fc401b 100644 --- a/a00479.html +++ b/a00479.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_sw_sha1.h File Reference +CryptoAuthLib: atca_crypto_pbkdf2.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,33 +97,23 @@
- -
atca_crypto_sw_sha1.h File Reference
+
atca_crypto_pbkdf2.c File Reference
-

Wrapper API for SHA 1 routines. +

Implementation of the PBKDF2 algorithm for use in generating password hashes. More...

-
#include "atca_crypto_sw.h"
-#include <stddef.h>
-#include <stdint.h>
-
- - - -

-Functions

-ATCA_STATUS atcac_sw_sha1 (const uint8_t *data, size_t data_size, uint8_t digest[(20U)])
 
-

Detailed Description

-

Wrapper API for SHA 1 routines.

+
#include "cryptoauthlib.h"
+#include "cal_internal.h"
+

Detailed Description

+

Implementation of the PBKDF2 algorithm for use in generating password hashes.

diff --git a/a00482.html b/a00482.html index 26f59d5ee..431c9b393 100644 --- a/a00482.html +++ b/a00482.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_sw_sha2.c File Reference +CryptoAuthLib: atca_crypto_sw.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,52 @@
-
atca_crypto_sw_sha2.c File Reference
+ +
atca_crypto_sw.h File Reference
-

Wrapper API for software SHA 256 routines. +

Common defines for CryptoAuthLib software crypto wrappers. More...

-
#include "cryptoauthlib.h"
-#include "atca_crypto_sw_sha2.h"
-#include "cal_internal.h"
-

Detailed Description

-

Wrapper API for software SHA 256 routines.

+
#include <stdint.h>
+#include <stdlib.h>
+#include "crypto/crypto_sw_config_check.h"
+#include "atca_status.h"
+
+ + + + + + + + + + + + + + + +

+Macros

+#define ATCA_SHA1_DIGEST_SIZE   (20U)
 
+#define ATCA_SHA2_256_DIGEST_SIZE   (32U)
 
+#define ATCA_SHA2_256_BLOCK_SIZE   (64U)
 
+#define ATCA_SHA2_384_DIGEST_SIZE   (48U)
 
+#define ATCA_SHA2_384_BLOCK_SIZE   (128U)
 
+#define ATCA_SHA2_512_DIGEST_SIZE   (64U)
 
+#define ATCA_SHA2_512_BLOCK_SIZE   (128U)
 
+

Detailed Description

+

Common defines for CryptoAuthLib software crypto wrappers.

diff --git a/a00485.html b/a00485.html index d54ced5ab..7bde6ce36 100644 --- a/a00485.html +++ b/a00485.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_crypto_sw_sha2.h File Reference +CryptoAuthLib: atca_crypto_sw_aes_cmac.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,39 +97,22 @@
- -
atca_crypto_sw_sha2.h File Reference
+
atca_crypto_sw_aes_cmac.c File Reference
-

Wrapper API for software SHA 256 routines. +

Common Wrapper for host side AES-CMAC implementations that feature update APIs rather than an all at once implementation. More...

-
#include "atca_crypto_sw.h"
-#include <stddef.h>
-#include <stdint.h>
-
- - - - - - - -

-Functions

-ATCA_STATUS atcac_sw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t digest[(32U)])
 
-ATCA_STATUS atcac_sha256_hmac_ctr_iteration (struct atcac_hmac_ctx *ctx, uint8_t iteration, uint16_t length, const uint8_t *label, size_t label_len, const uint8_t *data, size_t data_len, uint8_t digest[(32U)])
 
-ATCA_STATUS atcac_sha256_hmac_counter (uint8_t *key, size_t key_len, const uint8_t *label, size_t label_len, const uint8_t *data, size_t data_len, uint8_t *digest, size_t diglen)
 
-

Detailed Description

-

Wrapper API for software SHA 256 routines.

+
#include "atca_crypto_sw.h"
+

Detailed Description

+

Common Wrapper for host side AES-CMAC implementations that feature update APIs rather than an all at once implementation.

diff --git a/a00488.html b/a00488.html index cf45a3b6a..90995c2fc 100644 --- a/a00488.html +++ b/a00488.html @@ -5,7 +5,7 @@ -CryptoAuthLib: crypto_hw_config_check.h File Reference +CryptoAuthLib: atca_crypto_sw_aes_gcm.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,192 +97,22 @@
- -
crypto_hw_config_check.h File Reference
+
atca_crypto_sw_aes_gcm.c File Reference
-

Consistency checks for configuration options. +

Common Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation. More...

-
#include "atca_config_check.h"
-#include "calib/calib_config_check.h"
-#include "talib/talib_config_check.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

#define ATCAB_AES_EXTRAS_EN   (CALIB_AES_EN || TALIB_AES_EN)
 
-#define ATCAB_AES_RANDOM_IV_EN   (ATCA_HOSTLIB_EN || CALIB_RANDOM_EN || TALIB_RANDOM_EN)
 
#define ATCAB_AES_UPDATE_EN   ATCAB_AES_EXTRAS_EN
 
#define ATCAB_AES_CBC_ENCRYPT_EN   ATCAB_AES_EXTRAS_EN
 
#define ATCAB_AES_CBC_DECRYPT_EN   ATCAB_AES_EXTRAS_EN
 
-#define ATCAB_AES_CBC_UPDATE_EN   ATCAB_AES_UPDATE_EN
 
#define ATCAB_AES_CBCMAC_EN   ATCAB_AES_CBC_ENCRYPT_EN
 
#define ATCAB_AES_CTR_EN   ATCAB_AES_EXTRAS_EN
 
#define ATCAB_AES_CTR_RAND_IV_EN   (ATCAB_AES_CTR_EN && ATCAB_AES_RANDOM_IV_EN)
 
#define ATCAB_AES_CCM_EN   (ATCAB_AES_CBCMAC_EN && ATCAB_AES_CTR_EN)
 
-#define ATCAB_AES_CCM_RAND_IV_EN   (ATCAB_AES_CCM_EN && ATCAB_AES_RANDOM_IV_EN)
 
-#define ATCAB_AES_CMAC_EN   ATCAB_AES_CBC_ENCRYPT_EN
 
-#define ATCAC_PKCS7_PAD_EN   ATCAB_AES_EXTRAS_EN
 
-

Detailed Description

-

Consistency checks for configuration options.

- -

Macro Definition Documentation

- -

◆ ATCAB_AES_CBC_DECRYPT_EN

- -
-
- - - - -
#define ATCAB_AES_CBC_DECRYPT_EN   ATCAB_AES_EXTRAS_EN
-
-

Requires: ATCAB_AES_EN

-

Enable ATCAB_AES_CBC_DECRYPT to decrypt a block of data using CBC mode and a key within the device. atcab_aes_cbc_init() should be called before the first use of this function

-

Supported API's: atcab_aes_cbc_decrypt_block, atcab_aes_cbc_init_ext, atcab_aes_cbc_init

- -
-
- -

◆ ATCAB_AES_CBC_ENCRYPT_EN

- -
-
- - - - -
#define ATCAB_AES_CBC_ENCRYPT_EN   ATCAB_AES_EXTRAS_EN
-
-

Requires: ATCAB_AES_EN

-

Enable ATCAB_AES_CBC_ENCRYPT_EN to encrypt a block of data using CBC mode and a key within the device. atcab_aes_cbc_init() should be called before the first use of this function

-

Supported API's: atcab_aes_cbc_encrypt_block , atcab_aes_cbc_init_ext, atcab_aes_cbc_init

- -
-
- -

◆ ATCAB_AES_CBCMAC_EN

- -
-
- - - - -
#define ATCAB_AES_CBCMAC_EN   ATCAB_AES_CBC_ENCRYPT_EN
-
-

Requires: ATCAB_AES_CBCMAC ATCAB_AES_CBC_ENCRYPT ATCAB_AES_MODE_ENCODING CALIB_AES_MODE_ENCODING CALIB_AES

-

Enable ATCAB_AES_CBCMAC to initialize context for AES CBC-MAC operation Enable ATCAB_AES_CBCMAC to calculate AES CBC-MAC with key stored within ECC608 device Enable ATCAB_AES_CBCMAC to finish a CBC-MAC operation returning the CBC-MAC value

-

Supported API's: atcab_aes_cbcmac_init_ext atcab_aes_cbcmac_init, atcab_aes_cbcmac_init_update, atcab_aes_cbcmac_finish

- -
-
- -

◆ ATCAB_AES_CCM_EN

- -
-
- - - - -
#define ATCAB_AES_CCM_EN   (ATCAB_AES_CBCMAC_EN && ATCAB_AES_CTR_EN)
-
-

Requires: ATCAB_AES_EN ATCAB_AES_CTR_EN

-

Enable ATCAB_AES_CCM_EN to enable AES CCM operation

- -
-
- -

◆ ATCAB_AES_CTR_EN

- -
-
- - - - -
#define ATCAB_AES_CTR_EN   ATCAB_AES_EXTRAS_EN
-
-

Requires: ATCAB_AES_EN

-

Enable ATCAB_AES_CTR_EN to support AES-CTR mode

- -
-
- -

◆ ATCAB_AES_CTR_RAND_IV_EN

- -
-
- - - - -
#define ATCAB_AES_CTR_RAND_IV_EN   (ATCAB_AES_CTR_EN && ATCAB_AES_RANDOM_IV_EN)
-
-

Requires: ATCAB_AES_CTR_EN ATCAB_RANDOM_EN

-

Enable ATCAB_AES_CTR_RAND_IV_EN to initialize context for AES CTR operation with a random nonce and counter set to 0 as the IV, which is common when starting an encrypt operation

-

Supported API's: atcab_aes_ctr_init_rand_ext, atcab_aes_ctr_init_rand

- -
-
- -

◆ ATCAB_AES_EXTRAS_EN

- -
-
- - - - -
#define ATCAB_AES_EXTRAS_EN   (CALIB_AES_EN || TALIB_AES_EN)
-
-

Automatically set base on other configuation options but can be overridden to disable all CBC, CBCMAC, CTR, & CCM modes at once rather than individually

- -
-
- -

◆ ATCAB_AES_UPDATE_EN

- -
-
- - - - -
#define ATCAB_AES_UPDATE_EN   ATCAB_AES_EXTRAS_EN
-
-

Enable update/finalize APIs for block ciphers

- -
-
-
+
#include "atca_crypto_sw.h"
+

Detailed Description

+

Common Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation.

+ +
diff --git a/a00488.js b/a00488.js deleted file mode 100644 index 6a92fc202..000000000 --- a/a00488.js +++ /dev/null @@ -1,11 +0,0 @@ -var a00488 = -[ - [ "ATCAB_AES_CBC_DECRYPT_EN", "a00488.html#a23ae19deaff29f2796c4981962ca9b55", null ], - [ "ATCAB_AES_CBC_ENCRYPT_EN", "a00488.html#ac2eb887016e59054e626341175577669", null ], - [ "ATCAB_AES_CBCMAC_EN", "a00488.html#a1996786ea061102926ef0ba52a510bfd", null ], - [ "ATCAB_AES_CCM_EN", "a00488.html#ae638244ab3ba72e50b974f763e2abc42", null ], - [ "ATCAB_AES_CTR_EN", "a00488.html#a6569901e92e84b0b448794f8a89d1d9e", null ], - [ "ATCAB_AES_CTR_RAND_IV_EN", "a00488.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd", null ], - [ "ATCAB_AES_EXTRAS_EN", "a00488.html#a28cb83338bbbc858be983299cede3ba9", null ], - [ "ATCAB_AES_UPDATE_EN", "a00488.html#af273e717452d3e5295d20197b4615ed0", null ] -]; \ No newline at end of file diff --git a/a00491.html b/a00491.html index d347e5950..be4f6db85 100644 --- a/a00491.html +++ b/a00491.html @@ -5,7 +5,7 @@ -CryptoAuthLib: crypto_sw_config_check.h File Reference +CryptoAuthLib: atca_crypto_sw_sha1.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,239 +97,25 @@
- -
crypto_sw_config_check.h File Reference
+
atca_crypto_sw_sha1.c File Reference
-

Consistency checks for configuration options. +

Wrapper API for SHA 1 routines. More...

-
#include "atca_config_check.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
 
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
 
-#define ATCAC_SHA256_HMAC_EN   ATCAC_SHA256_EN
 
-#define ATCAC_SHA256_HMAC_CTR_EN   ATCAC_SHA256_HMAC_EN
 
#define ATCAC_RANDOM_EN   ATCA_HOSTLIB_EN
 
#define ATCAC_VERIFY_EN   ATCA_HOSTLIB_EN
 
#define ATCAC_SIGN_EN   ATCA_HOSTLIB_EN
 
#define ATCA_CRYPTO_SHA1_EN   (ATCAC_SHA1_EN && !ATCA_HOSTLIB_EN)
 
-#define ATCA_CRYPTO_SHA2_EN   (ATCAC_SHA256_EN && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA2_HMAC_EN   (ATCAC_SHA256_HMAC_EN && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA2_HMAC_CTR_EN   ATCAC_SHA256_HMAC_CTR_EN
 
#define ATCAC_PBKDF2_SHA256_EN   ATCAC_SHA256_HMAC_EN
 
#define ATCAB_PBKDF2_SHA256_EN   (CALIB_SHA_HMAC_EN || TALIB_SHA_HMAC_EN)
 
#define ATCAC_AES_GCM_EN   (ATCA_HOSTLIB_EN)
 
-

Detailed Description

-

Consistency checks for configuration options.

- -

Macro Definition Documentation

- -

◆ ATCA_CRYPTO_SHA1_EN

- -
-
- - - - -
#define ATCA_CRYPTO_SHA1_EN   (ATCAC_SHA1_EN && !ATCA_HOSTLIB_EN)
-
-

Enable ATCAC_SHA1_EN to enable sha1 host side api

-

Supported API's: atcab_write

- -
-
- -

◆ ATCA_CRYPTO_SHA2_HMAC_CTR_EN

- -
-
- - - - -
#define ATCA_CRYPTO_SHA2_HMAC_CTR_EN   ATCAC_SHA256_HMAC_CTR_EN
-
-

Requires: ATCAC_SHA256_HMAC_EN

-

Enable ATCAC_SHA256_HMAC_COUNTER to implement SHA256 HMAC-Counter per NIST SP 800-108 used for KDF like operations

-

Supported API's: atcac_sha256_hmac_counter

- -
-
- -

◆ ATCA_CRYPTO_SHA2_HMAC_EN

- -
-
- - - - -
#define ATCA_CRYPTO_SHA2_HMAC_EN   (ATCAC_SHA256_HMAC_EN && !ATCA_HOSTLIB_EN)
-
-

Requires: ATCAC_SHA256_EN

-

Enable ATCAC_SHA256_HMAC to initialize context for performing HMAC (sha256) in software

-

Supported API's: atcac_sha256_hmac_init, atcac_sha256_hmac_update, atcac_sha256_hmac_finish

- -
-
- -

◆ ATCAB_PBKDF2_SHA256_EN

- -
-
- - - - -
#define ATCAB_PBKDF2_SHA256_EN   (CALIB_SHA_HMAC_EN || TALIB_SHA_HMAC_EN)
-
-

Requires: CALIB_SHA_HMAC_EN

-

Enable ATCAB_PBKDF2_SHA256_EN to calculate a PBKDF2 password hash using a stored key inside a device. The key length is determined by the device being used. ECCx08: 32 bytes, TA100: 16-64 bytes

-

Supported API's: atcab_pbkdf2_256, atcab_pbkdf2_256_ext

- -
-
- -

◆ ATCAC_AES_GCM_EN

- -
-
- - - - -
#define ATCAC_AES_GCM_EN   (ATCA_HOSTLIB_EN)
-
-

Indicates if this module is a provider of an AES-GCM implementation

- -
-
- -

◆ ATCAC_PBKDF2_SHA256_EN

- -
-
- - - - -
#define ATCAC_PBKDF2_SHA256_EN   ATCAC_SHA256_HMAC_EN
-
-

Requires: ATCAC_SHA256_EN ATCAC_SHA256_HMAC_EN

-

Enable ATCAC_PBKDF2_SHA256_EN to calculate a PBKDF2 hash of a given password and salt

-

Supported API's: atcac_pbkdf2_256

- -
-
- -

◆ ATCAC_RANDOM_EN

- -
-
- - - - -
#define ATCAC_RANDOM_EN   ATCA_HOSTLIB_EN
-
-

Requires: ATCA_HOSTLIB_EN

-

Enable ATCAC_RANDOM_EN get random numbers from the host's implementation - generally assumed to come from the host's cryptographic library or peripheral driver

- -
-
- -

◆ ATCAC_SHA1_EN

- -
-
- - - - -
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
-
-

Enable ATCAC_SHA1_EN to enable sha1 host side api

-

Supported API's: atcab_write

- -
-
- -

◆ ATCAC_SHA256_EN

- -
-
- - - - -
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
-
-

Enable ATCAC_SHA256_EN to enable sha256 host side api

-

Supported API's: atcab_write

- -
-
- -

◆ ATCAC_SIGN_EN

- -
-
- - - - -
#define ATCAC_SIGN_EN   ATCA_HOSTLIB_EN
-
-

Requires: ATCA_HOSTLIB_EN

-

Enable ATCAC_SIGN_EN to use the host's sign functions. Generally assumed to come from the host's cryptographic library or peripheral driver.

- -
-
- -

◆ ATCAC_VERIFY_EN

- -
-
- - - - -
#define ATCAC_VERIFY_EN   ATCA_HOSTLIB_EN
-
-

Requires: ATCA_HOSTLIB_EN

-

Enable ATCAC_VERIFY_EN to use the host's verify functions. Generally assumed to come from the host's cryptographic library or peripheral driver.

- -
-
-
+
#include "atca_crypto_sw_sha1.h"
+#include "hashes/sha1_routines.h"
+#include "cryptoauthlib.h"
+#include "cal_internal.h"
+

Detailed Description

+

Wrapper API for SHA 1 routines.

+ +
diff --git a/a00491.js b/a00491.js deleted file mode 100644 index efde4c273..000000000 --- a/a00491.js +++ /dev/null @@ -1,14 +0,0 @@ -var a00491 = -[ - [ "ATCA_CRYPTO_SHA1_EN", "a00491.html#a2e5e1b4f8da8d151569d6ff0133b43ec", null ], - [ "ATCA_CRYPTO_SHA2_HMAC_CTR_EN", "a00491.html#a5a3020c4884811361247f771da67b9a5", null ], - [ "ATCA_CRYPTO_SHA2_HMAC_EN", "a00491.html#a18071ade62f5d4b39e444ca87548e31e", null ], - [ "ATCAB_PBKDF2_SHA256_EN", "a00491.html#aa46ae7101b70ba482359edccca83f414", null ], - [ "ATCAC_AES_GCM_EN", "a00491.html#a2cf377cd3579f3ba898ec2391835cfd5", null ], - [ "ATCAC_PBKDF2_SHA256_EN", "a00491.html#a6d2fa2e22a151bea100d7c7ee84dbe7f", null ], - [ "ATCAC_RANDOM_EN", "a00491.html#add878e0ecc6c87b683935f418f403c7e", null ], - [ "ATCAC_SHA1_EN", "a00491.html#a8e3c7ddf3a16cbdcc42060cdee2d884e", null ], - [ "ATCAC_SHA256_EN", "a00491.html#a99dab792a5983a089fe816abc57bad25", null ], - [ "ATCAC_SIGN_EN", "a00491.html#a094297d2dd0a7e2b4606fc37fc797fcd", null ], - [ "ATCAC_VERIFY_EN", "a00491.html#a7eeef6ad76dccb48d8b1741a9254af97", null ] -]; \ No newline at end of file diff --git a/a00494.html b/a00494.html index f56f01511..021c4ae18 100644 --- a/a00494.html +++ b/a00494.html @@ -5,7 +5,7 @@ -CryptoAuthLib: sha1_routines.c File Reference +CryptoAuthLib: atca_crypto_sw_sha1.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,33 @@
-
sha1_routines.c File Reference
+ +
atca_crypto_sw_sha1.h File Reference
-

Software implementation of the SHA1 algorithm. +

Wrapper API for SHA 1 routines. More...

-
#include "sha1_routines.h"
-#include <string.h>
-#include "atca_compiler.h"
-#include "cryptoauthlib.h"
-

Detailed Description

-

Software implementation of the SHA1 algorithm.

+
#include "atca_crypto_sw.h"
+#include <stddef.h>
+#include <stdint.h>
+
+ + + +

+Functions

+ATCA_STATUS atcac_sw_sha1 (const uint8_t *data, size_t data_size, uint8_t digest[(20U)])
 
+

Detailed Description

+

Wrapper API for SHA 1 routines.

diff --git a/a00497.html b/a00497.html index cdea6402b..62d47ddf8 100644 --- a/a00497.html +++ b/a00497.html @@ -5,7 +5,7 @@ -CryptoAuthLib: sha1_routines.h File Reference +CryptoAuthLib: atca_crypto_sw_sha2.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,81 +97,24 @@
- -
sha1_routines.h File Reference
+
atca_crypto_sw_sha2.c File Reference
-

Software implementation of the SHA1 algorithm. +

Wrapper API for software SHA 256 routines. More...

-
#include "atca_compiler.h"
-#include <stdio.h>
-#include <stdlib.h>
-#include <stddef.h>
-#include <stdint.h>
-
- - - -

-Data Structures

struct  CL_HashContext
 
- - - - - - - - - - - - - - - - - -

-Macros

-#define U8   uint8_t
 
-#define U16   uint16_t
 
-#define U32   uint32_t
 
-#define memcpy_P   memmove
 
-#define strcpy_P   strcpy
 
-#define _WDRESET()
 
-#define _NOP()
 
-#define leftRotate(x, n)   (x) = (((x) << (n)) | ((x) >> (32 - (n))))
 
- - - - - - - - - - - -

-Functions

-void shaEngine (uint32_t *buf, uint32_t *h)
 
-void CL_hashInit (CL_HashContext *ctx)
 
-void CL_hashUpdate (CL_HashContext *ctx, const uint8_t *src, int nbytes)
 
-void CL_hashFinal (CL_HashContext *ctx, uint8_t *dest)
 
-void CL_hash (uint8_t *msg, int msgBytes, uint8_t *dest)
 
-

Detailed Description

-

Software implementation of the SHA1 algorithm.

+
#include "cryptoauthlib.h"
+#include "atca_crypto_sw_sha2.h"
+#include "cal_internal.h"
+

Detailed Description

+

Wrapper API for software SHA 256 routines.

diff --git a/a00497.js b/a00497.js deleted file mode 100644 index 27326df0c..000000000 --- a/a00497.js +++ /dev/null @@ -1,4 +0,0 @@ -var a00497 = -[ - [ "CL_HashContext", "a01640.html", null ] -]; \ No newline at end of file diff --git a/a00500.html b/a00500.html index 77356906e..1d7668e37 100644 --- a/a00500.html +++ b/a00500.html @@ -5,7 +5,7 @@ -CryptoAuthLib: sha2_routines.c File Reference +CryptoAuthLib: atca_crypto_sw_sha2.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,31 +98,35 @@
-
sha2_routines.c File Reference
+Functions
+
atca_crypto_sw_sha2.h File Reference
-

Software implementation of the SHA256 algorithm. +

Wrapper API for software SHA 256 routines. More...

-
#include "cryptoauthlib.h"
-#include "sha2_routines.h"
+
#include "atca_crypto_sw.h"
+#include <stddef.h>
+#include <stdint.h>
- - - + + + + +

-Macros

-#define rotate_right(value, places)   ((value >> places) | (value << (32 - places)))
 

+Functions

+ATCA_STATUS atcac_sha256_hmac_ctr_iteration (struct atcac_hmac_ctx *ctx, uint8_t iteration, uint16_t length, const uint8_t *label, size_t label_len, const uint8_t *data, size_t data_len, uint8_t digest[(32U)])
 
+ATCA_STATUS atcac_sha256_hmac_counter (uint8_t *key, size_t key_len, const uint8_t *label, size_t label_len, const uint8_t *data, size_t data_len, uint8_t *digest, size_t diglen)
 

Detailed Description

-

Software implementation of the SHA256 algorithm.

+

Wrapper API for software SHA 256 routines.

diff --git a/a00503.html b/a00503.html index 80d5c42a4..d2fc9f135 100644 --- a/a00503.html +++ b/a00503.html @@ -5,7 +5,7 @@ -CryptoAuthLib: sha2_routines.h File Reference +CryptoAuthLib: crypto_hw_config_check.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,55 +98,191 @@
-
sha2_routines.h File Reference
+Macros
+
crypto_hw_config_check.h File Reference
-

Software implementation of the SHA256 algorithm. +

Consistency checks for configuration options. More...

-
#include <stdint.h>
+
#include "atca_config_check.h"
+#include "calib/calib_config_check.h"
+#include "talib/talib_config_check.h"
- - - -

-Data Structures

struct  sw_sha256_ctx
 
- - - - -

Macros

-#define SHA256_DIGEST_SIZE   (32)
 
-#define SHA256_BLOCK_SIZE   (64)
 
- - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + +

-Functions

-void sw_sha256_init (sw_sha256_ctx *ctx)
 
-void sw_sha256_update (sw_sha256_ctx *ctx, const uint8_t *message, uint32_t len)
 
-void sw_sha256_final (sw_sha256_ctx *ctx, uint8_t digest[(32)])
 
-void sw_sha256 (const uint8_t *message, unsigned int len, uint8_t digest[(32)])
 
#define ATCAB_AES_EXTRAS_EN   (CALIB_AES_EN || TALIB_AES_EN)
 
+#define ATCAB_AES_RANDOM_IV_EN   (ATCA_HOSTLIB_EN || CALIB_RANDOM_EN || TALIB_RANDOM_EN)
 
#define ATCAB_AES_UPDATE_EN   ATCAB_AES_EXTRAS_EN
 
#define ATCAB_AES_CBC_ENCRYPT_EN   ATCAB_AES_EXTRAS_EN
 
#define ATCAB_AES_CBC_DECRYPT_EN   ATCAB_AES_EXTRAS_EN
 
+#define ATCAB_AES_CBC_UPDATE_EN   ATCAB_AES_UPDATE_EN
 
#define ATCAB_AES_CBCMAC_EN   ATCAB_AES_CBC_ENCRYPT_EN
 
#define ATCAB_AES_CTR_EN   ATCAB_AES_EXTRAS_EN
 
#define ATCAB_AES_CTR_RAND_IV_EN   (ATCAB_AES_CTR_EN && ATCAB_AES_RANDOM_IV_EN)
 
#define ATCAB_AES_CCM_EN   (ATCAB_AES_CBCMAC_EN && ATCAB_AES_CTR_EN)
 
+#define ATCAB_AES_CCM_RAND_IV_EN   (ATCAB_AES_CCM_EN && ATCAB_AES_RANDOM_IV_EN)
 
+#define ATCAB_AES_CMAC_EN   ATCAB_AES_CBC_ENCRYPT_EN
 
+#define ATCAC_PKCS7_PAD_EN   ATCAB_AES_EXTRAS_EN
 

Detailed Description

-

Software implementation of the SHA256 algorithm.

- -
+

Consistency checks for configuration options.

+ +

Macro Definition Documentation

+ +

◆ ATCAB_AES_CBC_DECRYPT_EN

+ +
+
+ + + + +
#define ATCAB_AES_CBC_DECRYPT_EN   ATCAB_AES_EXTRAS_EN
+
+

Requires: ATCAB_AES_EN

+

Enable ATCAB_AES_CBC_DECRYPT to decrypt a block of data using CBC mode and a key within the device. atcab_aes_cbc_init() should be called before the first use of this function

+

Supported API's: atcab_aes_cbc_decrypt_block, atcab_aes_cbc_init_ext, atcab_aes_cbc_init

+ +
+
+ +

◆ ATCAB_AES_CBC_ENCRYPT_EN

+ +
+
+ + + + +
#define ATCAB_AES_CBC_ENCRYPT_EN   ATCAB_AES_EXTRAS_EN
+
+

Requires: ATCAB_AES_EN

+

Enable ATCAB_AES_CBC_ENCRYPT_EN to encrypt a block of data using CBC mode and a key within the device. atcab_aes_cbc_init() should be called before the first use of this function

+

Supported API's: atcab_aes_cbc_encrypt_block , atcab_aes_cbc_init_ext, atcab_aes_cbc_init

+ +
+
+ +

◆ ATCAB_AES_CBCMAC_EN

+ +
+
+ + + + +
#define ATCAB_AES_CBCMAC_EN   ATCAB_AES_CBC_ENCRYPT_EN
+
+

Requires: ATCAB_AES_CBCMAC ATCAB_AES_CBC_ENCRYPT ATCAB_AES_MODE_ENCODING CALIB_AES_MODE_ENCODING CALIB_AES

+

Enable ATCAB_AES_CBCMAC to initialize context for AES CBC-MAC operation Enable ATCAB_AES_CBCMAC to calculate AES CBC-MAC with key stored within ECC608 device Enable ATCAB_AES_CBCMAC to finish a CBC-MAC operation returning the CBC-MAC value

+

Supported API's: atcab_aes_cbcmac_init_ext atcab_aes_cbcmac_init, atcab_aes_cbcmac_init_update, atcab_aes_cbcmac_finish

+ +
+
+ +

◆ ATCAB_AES_CCM_EN

+ +
+
+ + + + +
#define ATCAB_AES_CCM_EN   (ATCAB_AES_CBCMAC_EN && ATCAB_AES_CTR_EN)
+
+

Requires: ATCAB_AES_EN ATCAB_AES_CTR_EN

+

Enable ATCAB_AES_CCM_EN to enable AES CCM operation

+ +
+
+ +

◆ ATCAB_AES_CTR_EN

+ +
+
+ + + + +
#define ATCAB_AES_CTR_EN   ATCAB_AES_EXTRAS_EN
+
+

Requires: ATCAB_AES_EN

+

Enable ATCAB_AES_CTR_EN to support AES-CTR mode

+ +
+
+ +

◆ ATCAB_AES_CTR_RAND_IV_EN

+ +
+
+ + + + +
#define ATCAB_AES_CTR_RAND_IV_EN   (ATCAB_AES_CTR_EN && ATCAB_AES_RANDOM_IV_EN)
+
+

Requires: ATCAB_AES_CTR_EN ATCAB_RANDOM_EN

+

Enable ATCAB_AES_CTR_RAND_IV_EN to initialize context for AES CTR operation with a random nonce and counter set to 0 as the IV, which is common when starting an encrypt operation

+

Supported API's: atcab_aes_ctr_init_rand_ext, atcab_aes_ctr_init_rand

+ +
+
+ +

◆ ATCAB_AES_EXTRAS_EN

+ +
+
+ + + + +
#define ATCAB_AES_EXTRAS_EN   (CALIB_AES_EN || TALIB_AES_EN)
+
+

Automatically set base on other configuation options but can be overridden to disable all CBC, CBCMAC, CTR, & CCM modes at once rather than individually

+ +
+
+ +

◆ ATCAB_AES_UPDATE_EN

+ +
+
+ + + + +
#define ATCAB_AES_UPDATE_EN   ATCAB_AES_EXTRAS_EN
+
+

Enable update/finalize APIs for block ciphers

+ +
+
+
diff --git a/a00503.js b/a00503.js index 4da24bd8f..4a77b7796 100644 --- a/a00503.js +++ b/a00503.js @@ -1,4 +1,11 @@ var a00503 = [ - [ "sw_sha256_ctx", "a01644.html", "a01644" ] + [ "ATCAB_AES_CBC_DECRYPT_EN", "a00503.html#a23ae19deaff29f2796c4981962ca9b55", null ], + [ "ATCAB_AES_CBC_ENCRYPT_EN", "a00503.html#ac2eb887016e59054e626341175577669", null ], + [ "ATCAB_AES_CBCMAC_EN", "a00503.html#a1996786ea061102926ef0ba52a510bfd", null ], + [ "ATCAB_AES_CCM_EN", "a00503.html#ae638244ab3ba72e50b974f763e2abc42", null ], + [ "ATCAB_AES_CTR_EN", "a00503.html#a6569901e92e84b0b448794f8a89d1d9e", null ], + [ "ATCAB_AES_CTR_RAND_IV_EN", "a00503.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd", null ], + [ "ATCAB_AES_EXTRAS_EN", "a00503.html#a28cb83338bbbc858be983299cede3ba9", null ], + [ "ATCAB_AES_UPDATE_EN", "a00503.html#af273e717452d3e5295d20197b4615ed0", null ] ]; \ No newline at end of file diff --git a/a00506.html b/a00506.html index 0dd78cd48..3b52d4d9b 100644 --- a/a00506.html +++ b/a00506.html @@ -5,7 +5,7 @@ -CryptoAuthLib: cryptoauthlib.h File Reference +CryptoAuthLib: crypto_sw_config_check.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,211 +99,379 @@
-
cryptoauthlib.h File Reference
+
crypto_sw_config_check.h File Reference
-

Single aggregation point for all CryptoAuthLib header files. +

Consistency checks for configuration options. More...

-
#include <stdio.h>
-#include <stdint.h>
-#include <stddef.h>
-#include <stdlib.h>
-#include <string.h>
-#include <stdarg.h>
-#include "atca_config_check.h"
-#include "atca_compiler.h"
-#include "atca_version.h"
-#include "atca_platform.h"
-#include "atca_status.h"
-#include "atca_debug.h"
-#include "cal_buffer.h"
-#include "atca_iface.h"
-#include "atca_device.h"
-#include "atca_helpers.h"
-#include "hal/atca_hal.h"
-#include "atca_cfgs.h"
-#include "calib/calib_basic.h"
-#include "calib/calib_command.h"
-#include "calib/calib_aes_gcm.h"
-#include "talib/talib_status.h"
-#include "talib/talib_basic.h"
-#include "atca_basic.h"
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Macros

#define ATCA_SHA256_BLOCK_SIZE   (64u)
 
-#define ATCA_SHA256_DIGEST_SIZE   (32u)
 
-#define ATCA_SHA384_BLOCK_SIZE   (128u)
 
-#define ATCA_SHA384_DIGEST_SIZE   (48u)
 
-#define ATCA_SHA512_BLOCK_SIZE   (128u)
 
-#define ATCA_SHA512_DIGEST_SIZE   (64u)
 
-#define ATCA_AES128_BLOCK_SIZE   (16u)
 
-#define ATCA_AES128_KEY_SIZE   (16)
 
-#define ATCA_AES256_BLOCK_SIZE   (16u)
 
-#define ATCA_AES256_KEY_SIZE   (32u)
 
-#define ATCA_ECCP256_MSG_SIZE   (32u)
 
-#define ATCA_KEY_TYPE_ECCP256   (0u)
 
-#define ATCA_ECCP256_KEY_SIZE   (32u)
 
-#define ATCA_ECCP256_PUBKEY_SIZE   (64u)
 
-#define ATCA_ECCP256_SIG_SIZE   (64u)
 
-#define ATCA_ECCP256_OID_SIZE   (10u)
 
-#define ATCA_ECCP256_ASN1_HDR_SIZE   (27u)
 
-#define ATCA_ECC_UNCOMPRESSED_TYPE   ((uint8_t)0x04)
 
-#define ATCA_ECC_UNCOMPRESSED_TYPE_OFFSET   (1u)
 
-#define ATCA_ZONE_CONFIG   ((uint8_t)0x00)
 
-#define ATCA_ZONE_OTP   ((uint8_t)0x01)
 
-#define ATCA_ZONE_DATA   ((uint8_t)0x02)
 
-#define DEVICE_PRODUCT_ID_LOCATION   0
 
-#define DEVICE_IDENTIFIER_LOCATION   1
 
-#define DEVICE_PART_LOCATION   2
 
-#define DEVICE_REVISION_LOCATION   3
 
-#define ATCA_ZONE_CA2_DATA   ((uint8_t)0x00)
 
-#define ATCA_ZONE_CA2_CONFIG   ((uint8_t)0x01)
 
-#define ATCA_ECC204_DEVICE_ID   ((uint8_t)0x5A)
 
-#define ATCA_TA010_DEVICE_ID   ((uint8_t)0x6A)
 
-#define ATCA_SHA104_DEVICE_ID   ((uint8_t)0x35)
 
-#define ATCA_SHA105_DEVICE_ID   ((uint8_t)0x3B)
 
#define SHA_MODE_TARGET_TEMPKEY   ((uint8_t)0x00)
 
#define SHA_MODE_TARGET_MSGDIGBUF   ((uint8_t)0x40)
 
#define SHA_MODE_TARGET_OUT_ONLY   ((uint8_t)0xC0)
 
-#define ATCA_STRINGIFY(x)   #x
 
-#define ATCA_TOSTRING(x)   ATCA_STRINGIFY(x)
 
-#define ATCA_TRACE(s, m)   atca_trace(s)
 
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
 
#define ATCAC_SHA256_EN   (FEATURE_ENABLED)
 
#define ATCAC_SHA384_EN   (FEATURE_DISABLED)
 
#define ATCAC_SHA512_EN   (FEATURE_DISABLED)
 
+#define ATCAC_SHA256_HMAC_EN   ATCAC_SHA256_EN
 
+#define ATCAC_SHA256_HMAC_CTR_EN   ATCAC_SHA256_HMAC_EN
 
#define ATCAC_RANDOM_EN   ATCA_HOSTLIB_EN
 
#define ATCAC_VERIFY_EN   ATCA_HOSTLIB_EN
 
#define ATCAC_SIGN_EN   ATCA_HOSTLIB_EN
 
#define ATCA_CRYPTO_SHA1_EN   (ATCAC_SHA1_EN && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA256_EN   ((ATCAC_SHA256_EN) && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA384_EN   ((ATCAC_SHA384_EN) && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA512_EN   ((ATCAC_SHA512_EN) && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA2_EN   (ATCA_CRYPTO_SHA256_EN || ATCA_CRYPTO_SHA384_EN || ATCA_CRYPTO_SHA512_EN)
 
#define ATCA_CRYPTO_SHA2_HMAC_EN   (ATCAC_SHA256_HMAC_EN && !ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_SHA2_HMAC_CTR_EN   ATCAC_SHA256_HMAC_CTR_EN
 
#define ATCAC_PBKDF2_SHA256_EN   ATCAC_SHA256_HMAC_EN
 
#define ATCAB_PBKDF2_SHA256_EN   (CALIB_SHA_HMAC_EN || TALIB_SHA_HMAC_EN)
 
#define ATCAC_AES_GCM_EN   (ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_AES_GCM_EN   (!ATCA_HOSTLIB_EN)
 
#define ATCAC_AES_CMAC_EN   (ATCA_HOSTLIB_EN)
 
#define ATCA_CRYPTO_AES_CMAC_EN   (!ATCA_HOSTLIB_EN)
 

Detailed Description

-

Single aggregation point for all CryptoAuthLib header files.

- +

Consistency checks for configuration options.

+

Macro Definition Documentation

- -

◆ ATCA_SHA256_BLOCK_SIZE

+ +

◆ ATCA_CRYPTO_AES_CMAC_EN

- +
#define ATCA_SHA256_BLOCK_SIZE   (64u)#define ATCA_CRYPTO_AES_CMAC_EN   (!ATCA_HOSTLIB_EN)
-

Library Configuration File - All build attributes should be included in atca_config.h

+

Enable ATCA_CRYPTO_AES_CMAC_EN to enable AES CMAC host side api

- -

◆ SHA_MODE_TARGET_MSGDIGBUF

+ +

◆ ATCA_CRYPTO_AES_GCM_EN

- +
#define SHA_MODE_TARGET_MSGDIGBUF   ((uint8_t)0x40)#define ATCA_CRYPTO_AES_GCM_EN   (!ATCA_HOSTLIB_EN)
-

Place resulting digest both in Output buffer and Message Digest Buffer

+

Enable ATCA_CRYPTO_AES_GCM_EN to enable AES GCM host side api

- -

◆ SHA_MODE_TARGET_OUT_ONLY

+ +

◆ ATCA_CRYPTO_SHA1_EN

- +
#define SHA_MODE_TARGET_OUT_ONLY   ((uint8_t)0xC0)#define ATCA_CRYPTO_SHA1_EN   (ATCAC_SHA1_EN && !ATCA_HOSTLIB_EN)
-

Place resulting digest both in Output buffer ONLY

+

Enable ATCAC_SHA1_EN to enable sha1 host side api

+

Supported API's: atcab_write

- -

◆ SHA_MODE_TARGET_TEMPKEY

+ +

◆ ATCA_CRYPTO_SHA256_EN

- +
#define SHA_MODE_TARGET_TEMPKEY   ((uint8_t)0x00)#define ATCA_CRYPTO_SHA256_EN   ((ATCAC_SHA256_EN) && !ATCA_HOSTLIB_EN)
-

Place resulting digest both in Output buffer and TempKey

+

Enable ATCA_CRYPTO_SHA256_EN to enable SHA2 host side api

+ +
+
+ +

◆ ATCA_CRYPTO_SHA2_EN

+ +
+
+ + + + +
#define ATCA_CRYPTO_SHA2_EN   (ATCA_CRYPTO_SHA256_EN || ATCA_CRYPTO_SHA384_EN || ATCA_CRYPTO_SHA512_EN)
+
+

Enable ATCAC_SHA2_EN to enable sha2 host side api

+ +
+
+ +

◆ ATCA_CRYPTO_SHA2_HMAC_CTR_EN

+ +
+
+ + + + +
#define ATCA_CRYPTO_SHA2_HMAC_CTR_EN   ATCAC_SHA256_HMAC_CTR_EN
+
+

Requires: ATCAC_SHA256_HMAC_EN

+

Enable ATCAC_SHA256_HMAC_COUNTER to implement SHA256 HMAC-Counter per NIST SP 800-108 used for KDF like operations

+

Supported API's: atcac_sha256_hmac_counter

+ +
+
+ +

◆ ATCA_CRYPTO_SHA2_HMAC_EN

+ +
+
+ + + + +
#define ATCA_CRYPTO_SHA2_HMAC_EN   (ATCAC_SHA256_HMAC_EN && !ATCA_HOSTLIB_EN)
+
+

Requires: ATCAC_SHA256_EN

+

Enable ATCAC_SHA256_HMAC to initialize context for performing HMAC (sha256) in software

+

Supported API's: atcac_sha256_hmac_init, atcac_sha256_hmac_update, atcac_sha256_hmac_finish

+ +
+
+ +

◆ ATCA_CRYPTO_SHA384_EN

+ +
+
+ + + + +
#define ATCA_CRYPTO_SHA384_EN   ((ATCAC_SHA384_EN) && !ATCA_HOSTLIB_EN)
+
+

Enable ATCA_CRYPTO_SHA384_EN to enable SHA384 host side api

+ +
+
+ +

◆ ATCA_CRYPTO_SHA512_EN

+ +
+
+ + + + +
#define ATCA_CRYPTO_SHA512_EN   ((ATCAC_SHA512_EN) && !ATCA_HOSTLIB_EN)
+
+

Enable ATCA_CRYPTO_SHA512_EN to enable SHA2512 host side api

+ +
+
+ +

◆ ATCAB_PBKDF2_SHA256_EN

+ +
+
+ + + + +
#define ATCAB_PBKDF2_SHA256_EN   (CALIB_SHA_HMAC_EN || TALIB_SHA_HMAC_EN)
+
+

Requires: CALIB_SHA_HMAC_EN

+

Enable ATCAB_PBKDF2_SHA256_EN to calculate a PBKDF2 password hash using a stored key inside a device. The key length is determined by the device being used. ECCx08: 32 bytes, TA100: 16-64 bytes

+

Supported API's: atcab_pbkdf2_256, atcab_pbkdf2_256_ext

+ +
+
+ +

◆ ATCAC_AES_CMAC_EN

+ +
+
+ + + + +
#define ATCAC_AES_CMAC_EN   (ATCA_HOSTLIB_EN)
+
+

Indicates if this module is a provider of an AES-CMAC implementation

+ +
+
+ +

◆ ATCAC_AES_GCM_EN

+ +
+
+ + + + +
#define ATCAC_AES_GCM_EN   (ATCA_HOSTLIB_EN)
+
+

Indicates if this module is a provider of an AES-GCM implementation

+ +
+
+ +

◆ ATCAC_PBKDF2_SHA256_EN

+ +
+
+ + + + +
#define ATCAC_PBKDF2_SHA256_EN   ATCAC_SHA256_HMAC_EN
+
+

Requires: ATCAC_SHA256_EN ATCAC_SHA256_HMAC_EN

+

Enable ATCAC_PBKDF2_SHA256_EN to calculate a PBKDF2 hash of a given password and salt

+

Supported API's: atcac_pbkdf2_256

+ +
+
+ +

◆ ATCAC_RANDOM_EN

+ +
+
+ + + + +
#define ATCAC_RANDOM_EN   ATCA_HOSTLIB_EN
+
+

Requires: ATCA_HOSTLIB_EN

+

Enable ATCAC_RANDOM_EN get random numbers from the host's implementation - generally assumed to come from the host's cryptographic library or peripheral driver

+ +
+
+ +

◆ ATCAC_SHA1_EN

+ +
+
+ + + + +
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
+
+

Enable ATCAC_SHA1_EN to enable sha1 host side api

+

Supported API's: atcab_write

+ +
+
+ +

◆ ATCAC_SHA256_EN

+ +
+
+ + + + +
#define ATCAC_SHA256_EN   (FEATURE_ENABLED)
+
+

Enable ATCAC_SHA256_EN to enable sha256 host side api

+ +
+
+ +

◆ ATCAC_SHA384_EN

+ +
+
+ + + + +
#define ATCAC_SHA384_EN   (FEATURE_DISABLED)
+
+

Enable ATCAC_SHA384_EN to enable sha384 host side api

+

Disabled by default. Enable ATCAC_SHA512_EN to use SHA384

+ +
+
+ +

◆ ATCAC_SHA512_EN

+ +
+
+ + + + +
#define ATCAC_SHA512_EN   (FEATURE_DISABLED)
+
+

Enable ATCAC_SHA512_EN to enable sha512 host side api

+

Disabled by default. Use FEATURE_ENABLED to enable this feature

+ +
+
+ +

◆ ATCAC_SIGN_EN

+ +
+
+ + + + +
#define ATCAC_SIGN_EN   ATCA_HOSTLIB_EN
+
+

Requires: ATCA_HOSTLIB_EN

+

Enable ATCAC_SIGN_EN to use the host's sign functions. Generally assumed to come from the host's cryptographic library or peripheral driver.

+ +
+
+ +

◆ ATCAC_VERIFY_EN

+ +
+
+ + + + +
#define ATCAC_VERIFY_EN   ATCA_HOSTLIB_EN
+
+

Requires: ATCA_HOSTLIB_EN

+

Enable ATCAC_VERIFY_EN to use the host's verify functions. Generally assumed to come from the host's cryptographic library or peripheral driver.

@@ -312,7 +480,7 @@

diff --git a/a00506.js b/a00506.js index 59cd6b474..7923aebbe 100644 --- a/a00506.js +++ b/a00506.js @@ -1,7 +1,23 @@ var a00506 = [ - [ "ATCA_SHA256_BLOCK_SIZE", "a00506.html#a85e0a506bd6fdae6ce32d5df3a48ac1c", null ], - [ "SHA_MODE_TARGET_MSGDIGBUF", "a00506.html#ae559b402c678cc51f8252b927b8781e5", null ], - [ "SHA_MODE_TARGET_OUT_ONLY", "a00506.html#ae0df4b9151bb3d807bc1c532036c6d88", null ], - [ "SHA_MODE_TARGET_TEMPKEY", "a00506.html#a850ec56b408fccccaea5826d452c3a64", null ] + [ "ATCA_CRYPTO_AES_CMAC_EN", "a00506.html#a112f8346894949beab73635af3851822", null ], + [ "ATCA_CRYPTO_AES_GCM_EN", "a00506.html#a51c0870d3a917ac80f7a786feceeba57", null ], + [ "ATCA_CRYPTO_SHA1_EN", "a00506.html#a2e5e1b4f8da8d151569d6ff0133b43ec", null ], + [ "ATCA_CRYPTO_SHA256_EN", "a00506.html#ace1877f29888c93a210f571fc4eff7ee", null ], + [ "ATCA_CRYPTO_SHA2_EN", "a00506.html#aff63a86885856fcc093664f27af75f27", null ], + [ "ATCA_CRYPTO_SHA2_HMAC_CTR_EN", "a00506.html#a5a3020c4884811361247f771da67b9a5", null ], + [ "ATCA_CRYPTO_SHA2_HMAC_EN", "a00506.html#a18071ade62f5d4b39e444ca87548e31e", null ], + [ "ATCA_CRYPTO_SHA384_EN", "a00506.html#a98bc86a602a329edb27388de020d6282", null ], + [ "ATCA_CRYPTO_SHA512_EN", "a00506.html#a80bccf213793f64bc90bb751ef12da3a", null ], + [ "ATCAB_PBKDF2_SHA256_EN", "a00506.html#aa46ae7101b70ba482359edccca83f414", null ], + [ "ATCAC_AES_CMAC_EN", "a00506.html#ace0d6e503c0db5222207053a7c537103", null ], + [ "ATCAC_AES_GCM_EN", "a00506.html#a2cf377cd3579f3ba898ec2391835cfd5", null ], + [ "ATCAC_PBKDF2_SHA256_EN", "a00506.html#a6d2fa2e22a151bea100d7c7ee84dbe7f", null ], + [ "ATCAC_RANDOM_EN", "a00506.html#add878e0ecc6c87b683935f418f403c7e", null ], + [ "ATCAC_SHA1_EN", "a00506.html#a8e3c7ddf3a16cbdcc42060cdee2d884e", null ], + [ "ATCAC_SHA256_EN", "a00506.html#a99dab792a5983a089fe816abc57bad25", null ], + [ "ATCAC_SHA384_EN", "a00506.html#a372b1be02c2a55afbe5eda47580c7ee8", null ], + [ "ATCAC_SHA512_EN", "a00506.html#a7815fa6e2b361a72ae88bb26bea8a9ad", null ], + [ "ATCAC_SIGN_EN", "a00506.html#a094297d2dd0a7e2b4606fc37fc797fcd", null ], + [ "ATCAC_VERIFY_EN", "a00506.html#a7eeef6ad76dccb48d8b1741a9254af97", null ] ]; \ No newline at end of file diff --git a/a00512.html b/a00512.html index 2e3e38217..c2cc1b5c1 100644 --- a/a00512.html +++ b/a00512.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_hal.c File Reference +CryptoAuthLib: sha1_routines.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,48 +101,77 @@ Data Structures | Macros | Functions
-
atca_hal.c File Reference
+
sha1_routines.h File Reference
-

low-level HAL - methods used to setup indirection to physical layer interface. this level does the dirty work of abstracting the higher level ATCAIFace methods from the low-level physical interfaces. Its main goal is to keep low-level details from bleeding into the logical interface implemetation. +

Software implementation of the SHA1 algorithm. More...

-
#include "cryptoauthlib.h"
-#include "atca_hal.h"
+
#include "atca_compiler.h"
+#include <stdio.h>
+#include <stdlib.h>
+#include <stddef.h>
+#include <stdint.h>
- - +

Data Structures

struct  atca_hal_list_entry_t
 Structure that holds the hal/phy maping for different interface types. More...
struct  CL_HashContext
 
+ + + + + + + + + + + + + + + + + +

+Macros

+#define U8   uint8_t
 
+#define U16   uint16_t
 
+#define U32   uint32_t
 
+#define memcpy_P   memmove
 
+#define strcpy_P   strcpy
 
+#define _WDRESET()
 
+#define _NOP()
 
+#define leftRotate(x, n)   (x) = (((x) << (n)) | ((x) >> (32 - (n))))
 
- - - - - - - - - - - - - - - + + + + + + + + + +

Functions

ATCA_STATUS hal_iface_register_hal (ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy)
 Register/Replace a HAL with a.
 
ATCA_STATUS hal_iface_init (ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy)
 Standard HAL API for ATCA to initialize a physical interface.
 
ATCA_STATUS hal_iface_release (ATCAIfaceType iface_type, void *hal_data)
 releases a physical interface, HAL knows how to interpret hal_data
 
ATCA_STATUS hal_check_wake (const uint8_t *response, int response_size)
 Utility function for hal_wake to check the reply.
 
uint8_t hal_is_command_word (uint8_t word_address)
 Utility function for hal_wake to check the reply.
 
+void shaEngine (uint32_t *buf, uint32_t *h)
 
+void CL_hashInit (CL_HashContext *ctx)
 
+void CL_hashUpdate (CL_HashContext *ctx, const uint8_t *src, int nbytes)
 
+void CL_hashFinal (CL_HashContext *ctx, uint8_t *dest)
 
+void CL_hash (uint8_t *msg, int msgBytes, uint8_t *dest)
 

Detailed Description

-

low-level HAL - methods used to setup indirection to physical layer interface. this level does the dirty work of abstracting the higher level ATCAIFace methods from the low-level physical interfaces. Its main goal is to keep low-level details from bleeding into the logical interface implemetation.

+

Software implementation of the SHA1 algorithm.

diff --git a/a00512.js b/a00512.js index 6ace35acb..7d6ff87ca 100644 --- a/a00512.js +++ b/a00512.js @@ -1,9 +1,4 @@ var a00512 = [ - [ "atca_hal_list_entry_t", "a01648.html", "a01648" ], - [ "hal_check_wake", "a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76", null ], - [ "hal_iface_init", "a01446.html#ga24d379ed97e2c8ce205abf096707bf99", null ], - [ "hal_iface_register_hal", "a01446.html#ga43e975cd670652e6ae76f390b2e82218", null ], - [ "hal_iface_release", "a01446.html#gacadf30e249834f38397a8569c7b798c2", null ], - [ "hal_is_command_word", "a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae", null ] + [ "CL_HashContext", "a01663.html", null ] ]; \ No newline at end of file diff --git a/a00515.html b/a00515.html index 4d354faac..c618b3da6 100644 --- a/a00515.html +++ b/a00515.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_hal.h File Reference +CryptoAuthLib: sha2_routines.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,143 +98,34 @@
-
atca_hal.h File Reference
+Macros
+
sha2_routines.c File Reference
-

low-level HAL - methods used to setup indirection to physical layer interface +

Software implementation of the SHA256, SHA384 and SHA512 algorithm. More...

-
#include <stdlib.h>
-#include "atca_config.h"
-#include "atca_status.h"
-#include "atca_iface.h"
+
#include "cryptoauthlib.h"
+#include "sha2_routines.h"
- - - - - -

-Data Structures

struct  atca_hal_kit_phy_t
 
struct  atca_hal_shm_t
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Macros

-#define ATCA_POLLING_INIT_TIME_MSEC   1
 
-#define ATCA_POLLING_FREQUENCY_TIME_MSEC   2
 
-#define ATCA_POLLING_MAX_TIME_MSEC   2500
 
-#define ATCA_HAL_CONTROL_WAKE   (0U)
 Execute the hardware specific wake - generally only for kits.
 
-#define ATCA_HAL_CONTROL_IDLE   (1U)
 Execute the hardware specific idle - generally only for kits.
 
-#define ATCA_HAL_CONTROL_SLEEP   (2U)
 Execute the hardware specific sleep - generally only for kits.
 
-#define ATCA_HAL_CONTROL_RESET   (3U)
 Execute the hardware specific reset - generally only for kits.
 
-#define ATCA_HAL_CONTROL_SELECT   (4U)
 Select the device - assert CS, open device, etc.
 
-#define ATCA_HAL_CONTROL_DESELECT   (5U)
 Select the device - de-assert CS, release device, etc.
 
-#define ATCA_HAL_CHANGE_BAUD   (6U)
 Change the datarate of the phy.
 
-#define ATCA_HAL_FLUSH_BUFFER   (7U)
 If the phy has a buffer make sure all bytes are transmitted.
 
-#define ATCA_HAL_CONTROL_DIRECTION   (8U)
 Set the PIN mode (in vs out)
 
- - - - -

-Typedefs

-typedef void * hal_mutex_t
 Generic mutex type definition for most systems.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + +

-Functions

ATCA_STATUS hal_iface_init (ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy)
 Standard HAL API for ATCA to initialize a physical interface.
 
ATCA_STATUS hal_iface_release (ATCAIfaceType iface_type, void *hal_data)
 releases a physical interface, HAL knows how to interpret hal_data
 
ATCA_STATUS hal_check_wake (const uint8_t *response, int response_size)
 Utility function for hal_wake to check the reply.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 
void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void hal_delay_ms (uint32_t delay)
 Timer API implemented at the HAL level.
 
void hal_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
-ATCA_STATUS hal_init_mutex (void *pMutex, bool shared)
 
-ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
-ATCA_STATUS hal_lock_mutex (void *pMutex)
 
-ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
-ATCA_STATUS hal_alloc_shared (void **pShared, size_t size, const char *pName, bool *initialized)
 
-ATCA_STATUS hal_free_shared (void *pShared, size_t size)
 
ATCA_STATUS hal_iface_register_hal (ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy)
 Register/Replace a HAL with a.
 
uint8_t hal_is_command_word (uint8_t word_address)
 Utility function for hal_wake to check the reply.
 
+#define rotate_right(value, places)   (((value) >> (places)) | ((value) << (32U - (places))))
 
+#define rotate_right_64bit(value, places)   (((value) >> (places)) | ((value) << (64U - (places))))
 

Detailed Description

-

low-level HAL - methods used to setup indirection to physical layer interface

+

Software implementation of the SHA256, SHA384 and SHA512 algorithm.

diff --git a/a00515.js b/a00515.js deleted file mode 100644 index 1ccaddfaa..000000000 --- a/a00515.js +++ /dev/null @@ -1,23 +0,0 @@ -var a00515 = -[ - [ "ATCA_HAL_CHANGE_BAUD", "a01446.html#ga6c3c5f6f46d99838464be80796088baa", null ], - [ "ATCA_HAL_CONTROL_DESELECT", "a01446.html#ga20f197858c01f040ca70cad589fcdabc", null ], - [ "ATCA_HAL_CONTROL_DIRECTION", "a01446.html#gae2eb00133330119dd9c73d6c5d9fd8dd", null ], - [ "ATCA_HAL_CONTROL_IDLE", "a01446.html#ga3c8d531ea7b725debf75cbbd851f92a0", null ], - [ "ATCA_HAL_CONTROL_RESET", "a01446.html#ga1236f6d20d3f9402af1f5c3f1adc98e3", null ], - [ "ATCA_HAL_CONTROL_SELECT", "a01446.html#gafb82c723c3d22673ebf65f89497d2e99", null ], - [ "ATCA_HAL_CONTROL_SLEEP", "a01446.html#gaa7f16d0fbd30e35a1a233166f6f59d06", null ], - [ "ATCA_HAL_CONTROL_WAKE", "a01446.html#ga6e1cf53d19f95ce1bcee622e8176b8a9", null ], - [ "ATCA_HAL_FLUSH_BUFFER", "a01446.html#ga61fae4f7c3849b77ae33e767e137032d", null ], - [ "hal_mutex_t", "a01446.html#ga73601b3bcebddd5e814e47b9a9c5f2a6", null ], - [ "atca_delay_ms", "a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], - [ "atca_delay_us", "a01446.html#ga7598dfcd6dcac882836544d48356d02f", null ], - [ "hal_check_wake", "a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76", null ], - [ "hal_create_mutex", "a01446.html#gaad9da28968a527ce51a2b081461d4cfe", null ], - [ "hal_delay_ms", "a01446.html#gadc23b8130e72a445f76c68d62e8c95c5", null ], - [ "hal_delay_us", "a01446.html#ga7e9019810ba5ab81b256282392cd5079", null ], - [ "hal_iface_init", "a01446.html#ga24d379ed97e2c8ce205abf096707bf99", null ], - [ "hal_iface_register_hal", "a01446.html#ga43e975cd670652e6ae76f390b2e82218", null ], - [ "hal_iface_release", "a01446.html#gacadf30e249834f38397a8569c7b798c2", null ], - [ "hal_is_command_word", "a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae", null ] -]; \ No newline at end of file diff --git a/a00524.html b/a00524.html deleted file mode 100644 index b2d7ab2c8..000000000 --- a/a00524.html +++ /dev/null @@ -1,149 +0,0 @@ - - - - - - - -CryptoAuthLib: hal_all_platforms_kit_hidapi.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
hal_all_platforms_kit_hidapi.c File Reference
-
-
- -

HAL for kit protocol over HID for any platform. -More...

-
#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include "hidapi.h"
-#include "atca_hal.h"
-#include "hal/kit_protocol.h"
-
- - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS hal_kit_hid_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of Kit USB HID init.
 
ATCA_STATUS hal_kit_hid_post_init (ATCAIface iface)
 HAL implementation of Kit HID post init.
 
ATCA_STATUS hal_kit_hid_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of kit protocol send over USB HID.
 
ATCA_STATUS hal_kit_hid_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of send over USB HID.
 
ATCA_STATUS hal_kit_hid_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_kit_hid_release (void *hal_data)
 Close the physical port for HID.
 
-

Detailed Description

-

HAL for kit protocol over HID for any platform.

- -
-
- - - - diff --git a/a00524.js b/a00524.js deleted file mode 100644 index 3f88eabd2..000000000 --- a/a00524.js +++ /dev/null @@ -1,9 +0,0 @@ -var a00524 = -[ - [ "hal_kit_hid_control", "a01446.html#gadcf53722678e48323751359a04734680", null ], - [ "hal_kit_hid_init", "a01446.html#ga025e8f78bfdef446732e3aafacebc857", null ], - [ "hal_kit_hid_post_init", "a01446.html#ga6f06bc1662b3d0361f6a241e1b5612f2", null ], - [ "hal_kit_hid_receive", "a01446.html#ga1c62358b9abc11bc2e52b34c3dd712e0", null ], - [ "hal_kit_hid_release", "a01446.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f", null ], - [ "hal_kit_hid_send", "a01446.html#ga3fd44b390fe7558c882c97faa783c018", null ] -]; \ No newline at end of file diff --git a/a00533.html b/a00533.html deleted file mode 100644 index 29f6b14e2..000000000 --- a/a00533.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: hal_freertos.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
hal_freertos.c File Reference
-
-
- -

FreeRTOS Hardware/OS Abstration Layer. -More...

-
#include "atca_hal.h"
-#include "FreeRTOS.h"
-#include "semphr.h"
-#include "task.h"
-
- - - -

-Macros

-#define ATCA_MUTEX_TIMEOUT   portMAX_DELAY
 
- - - - - - - - - - - - - - - - - -

-Functions

-void * hal_malloc (size_t size)
 
-void hal_free (void *ptr)
 
void hal_rtos_delay_ms (uint32_t delay)
 This function delays for a number of milliseconds.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
-ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
-ATCA_STATUS hal_lock_mutex (void *pMutex)
 
-ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
-

Detailed Description

-

FreeRTOS Hardware/OS Abstration Layer.

- -
-
- - - - diff --git a/a00533.js b/a00533.js deleted file mode 100644 index 07c1c39f1..000000000 --- a/a00533.js +++ /dev/null @@ -1,5 +0,0 @@ -var a00533 = -[ - [ "hal_create_mutex", "a01446.html#gaad9da28968a527ce51a2b081461d4cfe", null ], - [ "hal_rtos_delay_ms", "a01446.html#gacb8b202e3e6d66c96262b1ad4126ff6a", null ] -]; \ No newline at end of file diff --git a/a00536.html b/a00536.html deleted file mode 100644 index ed5a9bfe7..000000000 --- a/a00536.html +++ /dev/null @@ -1,328 +0,0 @@ - - - - - - - -CryptoAuthLib: hal_gpio_harmony.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
hal_gpio_harmony.c File Reference
-
-
- -

ATCA Hardware abstraction layer for GPIO. -More...

-
#include "atca_hal.h"
-
- - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS hal_gpio_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 Initialize a gpio interface using given config.
 
ATCA_STATUS hal_gpio_post_init (ATCAIface iface)
 Post Init for gpio hal.
 
ATCA_STATUS hal_gpio_send (ATCAIface iface, uint8_t word_address, uint8_t *pin_state, int unused_param)
 Set the state of the pin.
 
ATCA_STATUS hal_gpio_receive (ATCAIface iface, uint8_t word_address, uint8_t *pin_state, uint16_t *unused_param)
 Read the state of the pin.
 
-ATCA_STATUS hal_gpio_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
ATCA_STATUS hal_gpio_release (void *hal_data)
 Release and clean up the HAL.
 
-

Detailed Description

-

ATCA Hardware abstraction layer for GPIO.

- -

Function Documentation

- -

◆ hal_gpio_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_gpio_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

Initialize a gpio interface using given config.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_gpio_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_gpio_post_init (ATCAIface iface)
-
- -

Post Init for gpio hal.

-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_gpio_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_gpio_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * pin_state,
uint16_t * unused_param 
)
-
- -

Read the state of the pin.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
ifaceInterface context
word_addressUnused parameter
pin_statePin state to output
unused_paramUnused parameter
-
-
- -
-
- -

◆ hal_gpio_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_gpio_release (void * hal_data)
-
- -

Release and clean up the HAL.

-
Parameters
- - -
[in]hal_dataopaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_gpio_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_gpio_send (ATCAIface iface,
uint8_t word_address,
uint8_t * pin_state,
int unused_param 
)
-
- -

Set the state of the pin.

-
Returns
ATCA_SUCCESS
-
Parameters
- - - - - -
ifaceInterface context
word_addressUnused parameter
pin_statePin state to output
unused_paramUnused parameter
-
-
- -
-
-
-
- - - - diff --git a/a00536.js b/a00536.js deleted file mode 100644 index bc14aaa74..000000000 --- a/a00536.js +++ /dev/null @@ -1,8 +0,0 @@ -var a00536 = -[ - [ "hal_gpio_init", "a00536.html#a5159dcc0de9cf18a0a46d390fcde3d59", null ], - [ "hal_gpio_post_init", "a00536.html#a680903ede9921710475c23f3e0f5c56c", null ], - [ "hal_gpio_receive", "a00536.html#ac4ec5194f4ed97053e725b4f5d3b6db4", null ], - [ "hal_gpio_release", "a00536.html#a34a8c0ab6cfceb80c15080b571c0b3f7", null ], - [ "hal_gpio_send", "a00536.html#a0509181ebe5c1f3311cacc800796469b", null ] -]; \ No newline at end of file diff --git a/a00539.html b/a00539.html index 5d0d3d482..d5453c078 100644 --- a/a00539.html +++ b/a00539.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_i2c_harmony.c File Reference +CryptoAuthLib: hal_all_platforms_kit_hidapi.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,57 +99,49 @@
-
hal_i2c_harmony.c File Reference
+
hal_all_platforms_kit_hidapi.c File Reference
-

ATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB. +

HAL for kit protocol over HID for any platform. More...

-
#include <string.h>
-#include <stdio.h>
-#include "cryptoauthlib.h"
+
#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include "hidapi.h"
+#include "atca_hal.h"
+#include "hal/kit_protocol.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 
ATCA_STATUS hal_i2c_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_kit_hid_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of Kit USB HID init.
 
ATCA_STATUS hal_kit_hid_post_init (ATCAIface iface)
 HAL implementation of Kit HID post init.
 
ATCA_STATUS hal_kit_hid_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of kit protocol send over USB HID.
 
ATCA_STATUS hal_kit_hid_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of send over USB HID.
 
ATCA_STATUS hal_kit_hid_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_kit_hid_release (void *hal_data)
 Close the physical port for HID.
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the Harmony I2C primitives to set up the interface.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+

HAL for kit protocol over HID for any platform.

diff --git a/a00539.js b/a00539.js index 7a0ec3d55..648b6f5d3 100644 --- a/a00539.js +++ b/a00539.js @@ -1,12 +1,9 @@ var a00539 = [ - [ "change_i2c_speed", "a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ], - [ "hal_i2c_control", "a01446.html#ga4f82572f05b8587d98bc38601453863e", null ], - [ "hal_i2c_discover_buses", "a01446.html#ga05700385437884cc7b28c38d33e84f8c", null ], - [ "hal_i2c_discover_devices", "a01446.html#gac7644e62498a596c09952ee3b28017b9", null ], - [ "hal_i2c_init", "a01446.html#ga17df8d983df73e2e8f62f1236f157909", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ] + [ "hal_kit_hid_control", "a01473.html#gadcf53722678e48323751359a04734680", null ], + [ "hal_kit_hid_init", "a01473.html#ga025e8f78bfdef446732e3aafacebc857", null ], + [ "hal_kit_hid_post_init", "a01473.html#ga6f06bc1662b3d0361f6a241e1b5612f2", null ], + [ "hal_kit_hid_receive", "a01473.html#ga1c62358b9abc11bc2e52b34c3dd712e0", null ], + [ "hal_kit_hid_release", "a01473.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f", null ], + [ "hal_kit_hid_send", "a01473.html#ga3fd44b390fe7558c882c97faa783c018", null ] ]; \ No newline at end of file diff --git a/a00542.html b/a00542.html deleted file mode 100644 index 458cb6fac..000000000 --- a/a00542.html +++ /dev/null @@ -1,166 +0,0 @@ - - - - - - - -CryptoAuthLib: hal_i2c_start.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
hal_i2c_start.c File Reference
-
-
- -

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers. -More...

-
#include <string.h>
-#include <stdio.h>
-#include <atmel_start.h>
-#include <hal_gpio.h>
-#include <hal_delay.h>
-#include "hal_i2c_start.h"
-#include "atca_start_config.h"
-#include "atca_start_iface.h"
-#include "cryptoauthlib.h"
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
-

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the START I2C primitives to set up the interface.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

- -
-
- - - - diff --git a/a00542.js b/a00542.js deleted file mode 100644 index 9085a38be..000000000 --- a/a00542.js +++ /dev/null @@ -1,13 +0,0 @@ -var a00542 = -[ - [ "hal_i2c_discover_buses", "a01446.html#ga05700385437884cc7b28c38d33e84f8c", null ], - [ "hal_i2c_discover_devices", "a01446.html#gac7644e62498a596c09952ee3b28017b9", null ], - [ "hal_i2c_idle", "a01446.html#ga9317303ada721ff3f97e7aad69437a30", null ], - [ "hal_i2c_init", "a01446.html#ga09e7f465a040fbd19ea136269571de3c", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ], - [ "hal_i2c_sleep", "a01446.html#ga3f89bae6a625d5f37abdcc99408def27", null ], - [ "hal_i2c_wake", "a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] -]; \ No newline at end of file diff --git a/a00545.html b/a00545.html deleted file mode 100644 index 0a6bc7890..000000000 --- a/a00545.html +++ /dev/null @@ -1,141 +0,0 @@ - - - - - - - -CryptoAuthLib: hal_i2c_start.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
hal_i2c_start.h File Reference
-
-
- -

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers. -More...

-
#include "atmel_start.h"
-#include <stdlib.h>
-#include "cryptoauthlib.h"
-
- - - -

-Data Structures

struct  i2c_start_instance
 
- - - - - -

-Typedefs

-typedef void(* start_change_baudrate) (ATCAIface iface, uint32_t speed)
 
-typedef struct i2c_start_instance i2c_start_instance_t
 
-

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

- -
-
- - - - diff --git a/a00548.html b/a00548.html index b54112644..b32f907c4 100644 --- a/a00548.html +++ b/a00548.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_kit_bridge.c File Reference +CryptoAuthLib: hal_freertos.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,50 +98,58 @@
-
hal_kit_bridge.c File Reference
+
hal_freertos.c File Reference
-

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit. +

FreeRTOS Hardware/OS Abstration Layer. More...

-
#include "cryptoauthlib.h"
-#include "atca_hal.h"
-#include "hal_kit_bridge.h"
+
#include "atca_hal.h"
+#include "FreeRTOS.h"
+#include "semphr.h"
+#include "task.h"
+ + + +

+Macros

+#define ATCA_MUTEX_TIMEOUT   portMAX_DELAY
 
- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS hal_kit_attach_phy (ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy)
 Helper function that connects a physical layer context structure that will be used by the kit protocol bridge.
 
ATCA_STATUS hal_kit_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of Kit USB HID init.
 
ATCA_STATUS hal_kit_post_init (ATCAIface iface)
 HAL implementation of Kit HID post init.
 
ATCA_STATUS hal_kit_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of kit protocol send over USB HID.
 
ATCA_STATUS hal_kit_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxsize)
 HAL implementation of send over USB HID.
 
ATCA_STATUS hal_kit_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Kit Protocol Control.
 
ATCA_STATUS hal_kit_release (void *hal_data)
 Close the physical port for HID.
 
+void * hal_malloc (size_t size)
 
+void hal_free (void *ptr)
 
void hal_rtos_delay_ms (uint32_t delay)
 This function delays for a number of milliseconds.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
+ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
+ATCA_STATUS hal_lock_mutex (void *pMutex)
 
+ATCA_STATUS hal_unlock_mutex (void *pMutex)
 

Detailed Description

-

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.

+

FreeRTOS Hardware/OS Abstration Layer.

diff --git a/a00548.js b/a00548.js index 1fbdb01a5..0e4a71075 100644 --- a/a00548.js +++ b/a00548.js @@ -1,10 +1,5 @@ var a00548 = [ - [ "hal_kit_attach_phy", "a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29", null ], - [ "hal_kit_control", "a01446.html#ga56a9e080fb9055109778010912be08ba", null ], - [ "hal_kit_init", "a01446.html#ga4d01381c1a907ba56368a9313d0b65cb", null ], - [ "hal_kit_post_init", "a01446.html#ga7baebf1b0431d0670517d3788d63b111", null ], - [ "hal_kit_receive", "a01446.html#ga239b2412c8c0d45c2097a4fa06c9aa53", null ], - [ "hal_kit_release", "a01446.html#gafb063a58f6e3b087cf08fce5c66ee422", null ], - [ "hal_kit_send", "a01446.html#ga18817a4a7ab5958453eca414e28834ba", null ] + [ "hal_create_mutex", "a01473.html#gaad9da28968a527ce51a2b081461d4cfe", null ], + [ "hal_rtos_delay_ms", "a01473.html#gacb8b202e3e6d66c96262b1ad4126ff6a", null ] ]; \ No newline at end of file diff --git a/a00551.html b/a00551.html index 8169645ed..a47ad37f0 100644 --- a/a00551.html +++ b/a00551.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_kit_bridge.h File Reference +CryptoAuthLib: hal_gpio_harmony.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,54 +98,229 @@
-
hal_kit_bridge.h File Reference
+
hal_gpio_harmony.c File Reference
-

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit. +

ATCA Hardware abstraction layer for GPIO. More...

- - - - - - - - - - - - - - - - -

-Macros

-#define BRIDGE_PROTOCOL_VERSION   (2)
 
-#define HAL_KIT_COMMAND_SEND   0x01
 
-#define HAL_KIT_COMMAND_RECV   0x02
 
-#define HAL_KIT_COMMAND_WAKE   0x03
 
-#define HAL_KIT_COMMAND_IDLE   0x04
 
-#define HAL_KIT_COMMAND_SLEEP   0x05
 
-#define HAL_KIT_HEADER_LEN   (3)
 
+
#include "atca_hal.h"
+
- - - + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS hal_kit_attach_phy (ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy)
 Helper function that connects a physical layer context structure that will be used by the kit protocol bridge.
 
ATCA_STATUS hal_gpio_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 Initialize a gpio interface using given config.
 
ATCA_STATUS hal_gpio_post_init (ATCAIface iface)
 Post Init for gpio hal.
 
ATCA_STATUS hal_gpio_send (ATCAIface iface, uint8_t word_address, uint8_t *pin_state, int unused_param)
 Set the state of the pin.
 
ATCA_STATUS hal_gpio_receive (ATCAIface iface, uint8_t word_address, uint8_t *pin_state, uint16_t *unused_param)
 Read the state of the pin.
 
+ATCA_STATUS hal_gpio_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
ATCA_STATUS hal_gpio_release (void *hal_data)
 Release and clean up the HAL.
 

Detailed Description

-

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.

+

ATCA Hardware abstraction layer for GPIO.

-
+

Function Documentation

+ +

◆ hal_gpio_init()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_gpio_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
+
+ +

Initialize a gpio interface using given config.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_gpio_post_init()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_gpio_post_init (ATCAIface iface)
+
+ +

Post Init for gpio hal.

+
Returns
ATCA_SUCCESS
+ +
+
+ +

◆ hal_gpio_receive()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_gpio_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * pin_state,
uint16_t * unused_param 
)
+
+ +

Read the state of the pin.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + +
ifaceInterface context
word_addressUnused parameter
pin_statePin state to output
unused_paramUnused parameter
+
+
+ +
+
+ +

◆ hal_gpio_release()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_gpio_release (void * hal_data)
+
+ +

Release and clean up the HAL.

+
Parameters
+ + +
[in]hal_dataopaque pointer to hal data structure - known only to the HAL implementation
+
+
+
Returns
ATCA_SUCCESS
+ +
+
+ +

◆ hal_gpio_send()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_gpio_send (ATCAIface iface,
uint8_t word_address,
uint8_t * pin_state,
int unused_param 
)
+
+ +

Set the state of the pin.

+
Returns
ATCA_SUCCESS
+
Parameters
+ + + + + +
ifaceInterface context
word_addressUnused parameter
pin_statePin state to output
unused_paramUnused parameter
+
+
+ +
+
+
diff --git a/a00551.js b/a00551.js index d4fbc87b7..e0ef0bc35 100644 --- a/a00551.js +++ b/a00551.js @@ -1,4 +1,8 @@ var a00551 = [ - [ "hal_kit_attach_phy", "a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29", null ] + [ "hal_gpio_init", "a00551.html#a5159dcc0de9cf18a0a46d390fcde3d59", null ], + [ "hal_gpio_post_init", "a00551.html#a680903ede9921710475c23f3e0f5c56c", null ], + [ "hal_gpio_receive", "a00551.html#ac4ec5194f4ed97053e725b4f5d3b6db4", null ], + [ "hal_gpio_release", "a00551.html#a34a8c0ab6cfceb80c15080b571c0b3f7", null ], + [ "hal_gpio_send", "a00551.html#a0509181ebe5c1f3311cacc800796469b", null ] ]; \ No newline at end of file diff --git a/a00554.html b/a00554.html index 020b6a086..083c5c745 100644 --- a/a00554.html +++ b/a00554.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_linux.c File Reference +CryptoAuthLib: hal_i2c_harmony.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,57 +99,57 @@
-
hal_linux.c File Reference
+
hal_i2c_harmony.c File Reference
-

Timer Utility Functions for Linux. +

ATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB. More...

-
#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <stdint.h>
-#include <unistd.h>
-#include <sys/types.h>
-#include <sys/stat.h>
-#include <fcntl.h>
-#include <errno.h>
-#include "atca_hal.h"
+
#include <string.h>
+#include <stdio.h>
+#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

void hal_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void hal_delay_ms (uint32_t delay)
 Timer API implemented at the HAL level.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
-ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
-ATCA_STATUS hal_lock_mutex (void *pMutex)
 
-ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
-ATCA_STATUS hal_check_pid (hal_pid_t pid)
 Check if the pid exists in the system.
 
ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 
ATCA_STATUS hal_i2c_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

Timer Utility Functions for Linux.

- +

ATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the Harmony I2C primitives to set up the interface.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+
diff --git a/a00554.js b/a00554.js index 18e79ad87..8b6cc2eed 100644 --- a/a00554.js +++ b/a00554.js @@ -1,7 +1,12 @@ var a00554 = [ - [ "hal_check_pid", "a01446.html#gae31246ac870409a3d694c240c6c3498a", null ], - [ "hal_create_mutex", "a01446.html#gaad9da28968a527ce51a2b081461d4cfe", null ], - [ "hal_delay_ms", "a01446.html#gadc23b8130e72a445f76c68d62e8c95c5", null ], - [ "hal_delay_us", "a01446.html#ga7e9019810ba5ab81b256282392cd5079", null ] + [ "change_i2c_speed", "a01473.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ], + [ "hal_i2c_control", "a01473.html#ga4f82572f05b8587d98bc38601453863e", null ], + [ "hal_i2c_discover_buses", "a01473.html#ga05700385437884cc7b28c38d33e84f8c", null ], + [ "hal_i2c_discover_devices", "a01473.html#gac7644e62498a596c09952ee3b28017b9", null ], + [ "hal_i2c_init", "a01473.html#ga17df8d983df73e2e8f62f1236f157909", null ], + [ "hal_i2c_post_init", "a01473.html#gafbe53519362f18c2688d10da6f7c618f", null ], + [ "hal_i2c_receive", "a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], + [ "hal_i2c_release", "a01473.html#gac382cc4431d2d1c721c21a453ba36c22", null ], + [ "hal_i2c_send", "a01473.html#gacc9a889e19d2f1a475a39391565b66dd", null ] ]; \ No newline at end of file diff --git a/a00557.html b/a00557.html index 8c37f18b2..dba6167a2 100644 --- a/a00557.html +++ b/a00557.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_linux_i2c_userspace.c File Reference +CryptoAuthLib: hal_i2c_start.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,71 +98,67 @@
-
hal_linux_i2c_userspace.c File Reference
+
hal_i2c_start.c File Reference
-

ATCA Hardware abstraction layer for Linux using I2C. +

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers. More...

-
#include <cryptoauthlib.h>
-#include <linux/i2c-dev.h>
-#include <unistd.h>
-#include <sys/ioctl.h>
-#include <sys/types.h>
-#include <sys/stat.h>
-#include <fcntl.h>
-#include <errno.h>
-#include <string.h>
-#include <stdint.h>
+
#include <string.h>
#include <stdio.h>
-#include <stdlib.h>
-#include <limits.h>
-#include "atca_hal.h"
+#include <atmel_start.h>
+#include <hal_gpio.h>
+#include <hal_delay.h>
+#include "hal_i2c_start.h"
+#include "atca_start_config.h"
+#include "atca_start_iface.h"
+#include "cryptoauthlib.h"
- - - -

-Data Structures

struct  atca_i2c_host_s
 
- - - -

-Typedefs

-typedef struct atca_i2c_host_s atca_i2c_host_t
 
- - - - + + + + + + + + + + - + - + - - - - + + + + + + + + + +

Functions

ATCA_STATUS hal_i2c_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS hal_i2c_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_i2c_release (void *hal_data)
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for Linux using I2C.

+

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the START I2C primitives to set up the interface.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

diff --git a/a00557.js b/a00557.js index 357a2bc95..d36195fd8 100644 --- a/a00557.js +++ b/a00557.js @@ -1,9 +1,13 @@ var a00557 = [ - [ "hal_i2c_control", "a01446.html#ga4f82572f05b8587d98bc38601453863e", null ], - [ "hal_i2c_init", "a01446.html#ga17df8d983df73e2e8f62f1236f157909", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ] + [ "hal_i2c_discover_buses", "a01473.html#ga05700385437884cc7b28c38d33e84f8c", null ], + [ "hal_i2c_discover_devices", "a01473.html#gac7644e62498a596c09952ee3b28017b9", null ], + [ "hal_i2c_idle", "a01473.html#ga9317303ada721ff3f97e7aad69437a30", null ], + [ "hal_i2c_init", "a01473.html#ga09e7f465a040fbd19ea136269571de3c", null ], + [ "hal_i2c_post_init", "a01473.html#gafbe53519362f18c2688d10da6f7c618f", null ], + [ "hal_i2c_receive", "a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], + [ "hal_i2c_release", "a01473.html#gac382cc4431d2d1c721c21a453ba36c22", null ], + [ "hal_i2c_send", "a01473.html#gacc9a889e19d2f1a475a39391565b66dd", null ], + [ "hal_i2c_sleep", "a01473.html#ga3f89bae6a625d5f37abdcc99408def27", null ], + [ "hal_i2c_wake", "a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] ]; \ No newline at end of file diff --git a/a00563.html b/a00563.html index aaa44db16..54cc04257 100644 --- a/a00563.html +++ b/a00563.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_linux_uart_userspace.c File Reference +CryptoAuthLib: hal_kit_bridge.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,313 +98,50 @@
-
hal_linux_uart_userspace.c File Reference
+
hal_kit_bridge.c File Reference
-

ATCA Hardware abstraction layer for Linux using UART. +

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit. More...

-
#include "cryptoauthlib.h"
-#include "atca_hal.h"
-#include <unistd.h>
-#include <fcntl.h>
-#include <sys/ioctl.h>
-#include <termios.h>
+
#include "cryptoauthlib.h"
+#include "atca_hal.h"
+#include "hal_kit_bridge.h"
- - - -

-Data Structures

struct  atca_uart_host_s
 
- - - -

-Typedefs

-typedef struct atca_uart_host_s atca_uart_host_t
 
- - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS hal_uart_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of UART init.
 
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
 HAL implementation of UART post init.
 
ATCA_STATUS hal_uart_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of UART send.
 
ATCA_STATUS hal_uart_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of UART receive function.
 
ATCA_STATUS hal_uart_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the UART.
 
ATCA_STATUS hal_uart_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_kit_attach_phy (ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy)
 Helper function that connects a physical layer context structure that will be used by the kit protocol bridge.
 
ATCA_STATUS hal_kit_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of Kit USB HID init.
 
ATCA_STATUS hal_kit_post_init (ATCAIface iface)
 HAL implementation of Kit HID post init.
 
ATCA_STATUS hal_kit_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of kit protocol send over USB HID.
 
ATCA_STATUS hal_kit_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxsize)
 HAL implementation of send over USB HID.
 
ATCA_STATUS hal_kit_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Kit Protocol Control.
 
ATCA_STATUS hal_kit_release (void *hal_data)
 Close the physical port for HID.
 

Detailed Description

-

ATCA Hardware abstraction layer for Linux using UART.

+

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.

-

Function Documentation

- -

◆ hal_uart_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations for the UART.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

HAL implementation of UART init.

-

this implementation assumes UART SERIAL PORT peripheral has been enabled by user . It only initialize an UART interface using given config.

-
Parameters
- - - -
[in]halpointer to HAL specific data that is maintained by this HAL
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
-
- -

HAL implementation of UART post init.

-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

HAL implementation of UART receive function.

-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_uart_release (void * hal_data)
-
- -

manages reference count on given bus and releases resource if no more refences exist

-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of UART send.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addresstransaction type
[in]txdatadata to be send to device
[in]txdatapointer to space to bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
+
diff --git a/a00563.js b/a00563.js index e901d1453..3085790e5 100644 --- a/a00563.js +++ b/a00563.js @@ -1,10 +1,10 @@ var a00563 = [ - [ "atca_uart_host_s", "a01676.html", null ], - [ "hal_uart_control", "a00563.html#a41ed83bbc8e0fd3abea7beb513fbdb96", null ], - [ "hal_uart_init", "a00563.html#afb6d836af248aed1afe715ae2f2f7c2b", null ], - [ "hal_uart_post_init", "a00563.html#a1c5f894db539ea5cb0d5ae0fa38449d7", null ], - [ "hal_uart_receive", "a00563.html#a1a0256b61c3579519f8cc6d6157bc126", null ], - [ "hal_uart_release", "a00563.html#a1e0c17bf7342c21ca69d066eefa1f1eb", null ], - [ "hal_uart_send", "a00563.html#aae0b332270c1e8df223b430d8e8ddbbc", null ] + [ "hal_kit_attach_phy", "a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29", null ], + [ "hal_kit_control", "a01473.html#ga56a9e080fb9055109778010912be08ba", null ], + [ "hal_kit_init", "a01473.html#ga4d01381c1a907ba56368a9313d0b65cb", null ], + [ "hal_kit_post_init", "a01473.html#ga7baebf1b0431d0670517d3788d63b111", null ], + [ "hal_kit_receive", "a01473.html#ga239b2412c8c0d45c2097a4fa06c9aa53", null ], + [ "hal_kit_release", "a01473.html#gafb063a58f6e3b087cf08fce5c66ee422", null ], + [ "hal_kit_send", "a01473.html#ga18817a4a7ab5958453eca414e28834ba", null ] ]; \ No newline at end of file diff --git a/a00566.html b/a00566.html index a504491e0..c63ecd034 100644 --- a/a00566.html +++ b/a00566.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_sam0_i2c_asf.c File Reference +CryptoAuthLib: hal_kit_bridge.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,63 +98,54 @@
-
hal_sam0_i2c_asf.c File Reference
+
hal_kit_bridge.h File Reference
-

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers. +

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit. More...

-
#include <asf.h>
-#include <string.h>
-#include <stdio.h>
-#include "hal_sam0_i2c_asf.h"
-#include "cryptoauthlib.h"
-
+
+ + + + + + + + + + + + + + + +

+Macros

+#define BRIDGE_PROTOCOL_VERSION   (2)
 
+#define HAL_KIT_COMMAND_SEND   0x01
 
+#define HAL_KIT_COMMAND_RECV   0x02
 
+#define HAL_KIT_COMMAND_WAKE   0x03
 
+#define HAL_KIT_COMMAND_IDLE   0x04
 
+#define HAL_KIT_COMMAND_SLEEP   0x05
 
+#define HAL_KIT_HEADER_LEN   (3)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + +

Functions

ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_kit_attach_phy (ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy)
 Helper function that connects a physical layer context structure that will be used by the kit protocol bridge.
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the ASF I2C primitives to set up the interface.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+

Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.

diff --git a/a00566.js b/a00566.js index d160afdee..cfcf1b9bb 100644 --- a/a00566.js +++ b/a00566.js @@ -1,13 +1,4 @@ var a00566 = [ - [ "hal_i2c_discover_buses", "a01446.html#ga05700385437884cc7b28c38d33e84f8c", null ], - [ "hal_i2c_discover_devices", "a01446.html#gac7644e62498a596c09952ee3b28017b9", null ], - [ "hal_i2c_idle", "a01446.html#ga9317303ada721ff3f97e7aad69437a30", null ], - [ "hal_i2c_init", "a01446.html#ga09e7f465a040fbd19ea136269571de3c", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ], - [ "hal_i2c_sleep", "a01446.html#ga3f89bae6a625d5f37abdcc99408def27", null ], - [ "hal_i2c_wake", "a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] + [ "hal_kit_attach_phy", "a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29", null ] ]; \ No newline at end of file diff --git a/a00569.html b/a00569.html index 4afe22f88..d4495a5e7 100644 --- a/a00569.html +++ b/a00569.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_sam0_i2c_asf.h File Reference +CryptoAuthLib: hal_linux.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,41 +98,58 @@
-
hal_sam0_i2c_asf.h File Reference
+Functions
+
hal_linux.c File Reference
-

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers. +

Timer Utility Functions for Linux. More...

-
#include <asf.h>
-#include "cryptoauthlib.h"
+
#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <stdint.h>
+#include <unistd.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <fcntl.h>
+#include <errno.h>
+#include "atca_hal.h"
- - - -

-Data Structures

struct  i2c_sam0_instance
 
- - - - - + + + + + + + + + + + + + + + + + + +

-Typedefs

-typedef void(* sam0_change_baudrate) (ATCAIface iface, uint32_t speed)
 
-typedef struct i2c_sam0_instance i2c_sam0_instance_t
 

+Functions

void hal_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void hal_delay_ms (uint32_t delay)
 Timer API implemented at the HAL level.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
+ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
+ATCA_STATUS hal_lock_mutex (void *pMutex)
 
+ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
+ATCA_STATUS hal_check_pid (hal_pid_t pid)
 Check if the pid exists in the system.
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

- +

Timer Utility Functions for Linux.

+
diff --git a/a00569.js b/a00569.js index efbe94cb5..60c9d6a66 100644 --- a/a00569.js +++ b/a00569.js @@ -1,4 +1,7 @@ var a00569 = [ - [ "i2c_sam0_instance", "a01680.html", null ] + [ "hal_check_pid", "a01473.html#gae31246ac870409a3d694c240c6c3498a", null ], + [ "hal_create_mutex", "a01473.html#gaad9da28968a527ce51a2b081461d4cfe", null ], + [ "hal_delay_ms", "a01473.html#gadc23b8130e72a445f76c68d62e8c95c5", null ], + [ "hal_delay_us", "a01473.html#ga7e9019810ba5ab81b256282392cd5079", null ] ]; \ No newline at end of file diff --git a/a00572.html b/a00572.html index 3745f5035..0e8630ed4 100644 --- a/a00572.html +++ b/a00572.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_sam_i2c_asf.c File Reference +CryptoAuthLib: hal_linux_i2c_userspace.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,63 +98,71 @@
-
hal_sam_i2c_asf.c File Reference
+
hal_linux_i2c_userspace.c File Reference
-

ATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers. +

ATCA Hardware abstraction layer for Linux using I2C. More...

-
#include <asf.h>
+
#include <cryptoauthlib.h>
+#include <linux/i2c-dev.h>
+#include <unistd.h>
+#include <sys/ioctl.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <fcntl.h>
+#include <errno.h>
#include <string.h>
+#include <stdint.h>
#include <stdio.h>
-#include "cryptoauthlib.h"
-#include "hal_sam_i2c_asf.h"
+#include <stdlib.h>
+#include <limits.h>
+#include "atca_hal.h"
+ + + +

+Data Structures

struct  atca_i2c_host_s
 
+ + + +

+Typedefs

+typedef struct atca_i2c_host_s atca_i2c_host_t
 
- - - - - - - - - - + + + + - + - + - - - - - - - - - - + + + +

Functions

ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
ATCA_STATUS hal_i2c_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
ATCA_STATUS hal_i2c_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the ASF I2C primitives to set up the interface.

-

Prerequisite: add "TWI - Two-Wire Interface (Common API) (service)" module to application in Atmel Studio

+

ATCA Hardware abstraction layer for Linux using I2C.

diff --git a/a00572.js b/a00572.js index 10ec12300..388bb7a60 100644 --- a/a00572.js +++ b/a00572.js @@ -1,13 +1,9 @@ var a00572 = [ - [ "hal_i2c_discover_buses", "a01446.html#ga05700385437884cc7b28c38d33e84f8c", null ], - [ "hal_i2c_discover_devices", "a01446.html#gac7644e62498a596c09952ee3b28017b9", null ], - [ "hal_i2c_idle", "a01446.html#ga9317303ada721ff3f97e7aad69437a30", null ], - [ "hal_i2c_init", "a01446.html#ga09e7f465a040fbd19ea136269571de3c", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ], - [ "hal_i2c_sleep", "a01446.html#ga3f89bae6a625d5f37abdcc99408def27", null ], - [ "hal_i2c_wake", "a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] + [ "hal_i2c_control", "a01473.html#ga4f82572f05b8587d98bc38601453863e", null ], + [ "hal_i2c_init", "a01473.html#ga17df8d983df73e2e8f62f1236f157909", null ], + [ "hal_i2c_post_init", "a01473.html#gafbe53519362f18c2688d10da6f7c618f", null ], + [ "hal_i2c_receive", "a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], + [ "hal_i2c_release", "a01473.html#gac382cc4431d2d1c721c21a453ba36c22", null ], + [ "hal_i2c_send", "a01473.html#gacc9a889e19d2f1a475a39391565b66dd", null ] ]; \ No newline at end of file diff --git a/a00575.html b/a00575.html deleted file mode 100644 index 210709bbd..000000000 --- a/a00575.html +++ /dev/null @@ -1,140 +0,0 @@ - - - - - - - -CryptoAuthLib: hal_sam_i2c_asf.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
hal_sam_i2c_asf.h File Reference
-
-
- -

ATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers. -More...

-
#include <asf.h>
-#include "cryptoauthlib.h"
-
- - - -

-Data Structures

struct  i2c_sam_instance
 
- - - - - -

-Typedefs

-typedef void(* sam_change_baudrate) (ATCAIface iface, uint32_t speed)
 
-typedef struct i2c_sam_instance i2c_sam_instance_t
 
-

Detailed Description

-

ATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers.

-

Prerequisite: add "TWI - Two-Wire Interface (Common API) (service)" module to application in Atmel Studio

- -
-
- - - - diff --git a/a00578.html b/a00578.html index f738877d8..429415806 100644 --- a/a00578.html +++ b/a00578.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_sam_timer_asf.c File Reference +CryptoAuthLib: hal_linux_uart_userspace.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,38 +98,313 @@
-
hal_sam_timer_asf.c File Reference
+
hal_linux_uart_userspace.c File Reference
-

ATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers. +

ATCA Hardware abstraction layer for Linux using UART. More...

-
#include <asf.h>
-#include <delay.h>
-#include "atca_hal.h"
+
#include "cryptoauthlib.h"
+#include "atca_hal.h"
+#include <unistd.h>
+#include <fcntl.h>
+#include <sys/ioctl.h>
+#include <termios.h>
+ + + +

+Data Structures

struct  atca_uart_host_s
 
+ + + +

+Typedefs

+typedef struct atca_uart_host_s atca_uart_host_t
 
- - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

void atca_delay_10us (uint32_t delay)
 This function delays for a number of tens of microseconds.
 
void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 
ATCA_STATUS hal_uart_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of UART init.
 
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
 HAL implementation of UART post init.
 
ATCA_STATUS hal_uart_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of UART send.
 
ATCA_STATUS hal_uart_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of UART receive function.
 
ATCA_STATUS hal_uart_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the UART.
 
ATCA_STATUS hal_uart_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers.

+

ATCA Hardware abstraction layer for Linux using UART.

-
+

Function Documentation

+ +

◆ hal_uart_control()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
+
+ +

Perform control operations for the UART.

+
Parameters
+ + + + + +
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_init()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
+
+ +

HAL implementation of UART init.

+

this implementation assumes UART SERIAL PORT peripheral has been enabled by user . It only initialize an UART interface using given config.

+
Parameters
+ + + +
[in]halpointer to HAL specific data that is maintained by this HAL
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_post_init()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
+
+ +

HAL implementation of UART post init.

+
Parameters
+ + +
[in]ifaceinstance
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_receive()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
+
+ +

HAL implementation of UART receive function.

+
Parameters
+ + + + + +
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_release()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_uart_release (void * hal_data)
+
+ +

manages reference count on given bus and releases resource if no more refences exist

+
Parameters
+ + +
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_send()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
+
+ +

HAL implementation of UART send.

+
Parameters
+ + + + + +
[in]ifaceinstance
[in]word_addresstransaction type
[in]txdatadata to be send to device
[in]txdatapointer to space to bytes to send
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+
diff --git a/a00578.js b/a00578.js index 694b2d56d..4485a9457 100644 --- a/a00578.js +++ b/a00578.js @@ -1,6 +1,10 @@ var a00578 = [ - [ "atca_delay_10us", "a01446.html#ga19891182689551cc3a88603135959351", null ], - [ "atca_delay_ms", "a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], - [ "atca_delay_us", "a01446.html#ga7598dfcd6dcac882836544d48356d02f", null ] + [ "atca_uart_host_s", "a01695.html", null ], + [ "hal_uart_control", "a00578.html#a41ed83bbc8e0fd3abea7beb513fbdb96", null ], + [ "hal_uart_init", "a00578.html#afb6d836af248aed1afe715ae2f2f7c2b", null ], + [ "hal_uart_post_init", "a00578.html#a1c5f894db539ea5cb0d5ae0fa38449d7", null ], + [ "hal_uart_receive", "a00578.html#a1a0256b61c3579519f8cc6d6157bc126", null ], + [ "hal_uart_release", "a00578.html#a1e0c17bf7342c21ca69d066eefa1f1eb", null ], + [ "hal_uart_send", "a00578.html#aae0b332270c1e8df223b430d8e8ddbbc", null ] ]; \ No newline at end of file diff --git a/a00581.html b/a00581.html index cf4afb64e..f9227c18d 100644 --- a/a00581.html +++ b/a00581.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_spi_harmony.c File Reference +CryptoAuthLib: hal_sam0_i2c_asf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,66 +99,62 @@
-
hal_spi_harmony.c File Reference
+
hal_sam0_i2c_asf.c File Reference
-

ATCA Hardware abstraction layer for SPI over Harmony PLIB. +

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers. More...

-
#include <string.h>
+
#include <asf.h>
+#include <string.h>
#include <stdio.h>
-#include "atca_config.h"
-#include "cryptoauthlib.h"
-#include "atca_hal.h"
-#include "atca_device.h"
-#include "definitions.h"
-#include "talib/talib_defines.h"
-#include "talib/talib_fce.h"
+#include "hal_sam0_i2c_asf.h"
+#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS hal_spi_discover_buses (int spi_buses[], int max_buses)
 discover spi buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS hal_spi_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any TA10x devices on a given logical bus number
 
ATCA_STATUS hal_spi_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an SPI interface using given config
 
ATCA_STATUS hal_spi_post_init (ATCAIface iface)
 HAL implementation of SPI post init.
 
ATCA_STATUS hal_spi_select (ATCAIface iface)
 HAL implementation to assert the device chip select.
 
ATCA_STATUS hal_spi_deselect (ATCAIface iface)
 HAL implementation to deassert the device chip select.
 
ATCA_STATUS hal_spi_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of SPI send over Harmony.
 
ATCA_STATUS hal_spi_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of SPI receive function for HARMONY SPI.
 
ATCA_STATUS hal_spi_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_spi_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for SPI over Harmony PLIB.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical SPI implementation. Part 2 is the Harmony SPI primitives to set up the interface.

-

Prerequisite: add SERCOM SPI Master Interrupt support to application in Mplab Harmony 3

+

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the ASF I2C primitives to set up the interface.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

diff --git a/a00581.js b/a00581.js index 79bdde27c..e7b89d774 100644 --- a/a00581.js +++ b/a00581.js @@ -1,13 +1,13 @@ var a00581 = [ - [ "hal_spi_control", "a01446.html#gac7f3951634faf0a7c16c234d471c3660", null ], - [ "hal_spi_deselect", "a01446.html#ga6bcb25e01ba6242973eedb32fa9dac2a", null ], - [ "hal_spi_discover_buses", "a01446.html#ga92cecc8e30a88dee1cbedd49141bc209", null ], - [ "hal_spi_discover_devices", "a01446.html#ga6cf45c115bcb721e951e8792e0feb3f0", null ], - [ "hal_spi_init", "a01446.html#ga24b3ca4076a0e4093644d4f58cd80a69", null ], - [ "hal_spi_post_init", "a01446.html#gaeb831d9894ce11146bd00c79a98b7f0f", null ], - [ "hal_spi_receive", "a01446.html#ga410c24762579358a576a58610a877e63", null ], - [ "hal_spi_release", "a01446.html#ga8c3f1c6c20d939c4ca976fdda6279359", null ], - [ "hal_spi_select", "a01446.html#ga237aa1d0ee551a61991b52dc7812ff64", null ], - [ "hal_spi_send", "a01446.html#ga16661176757d0ef155155b07267a44ed", null ] + [ "hal_i2c_discover_buses", "a01473.html#ga05700385437884cc7b28c38d33e84f8c", null ], + [ "hal_i2c_discover_devices", "a01473.html#gac7644e62498a596c09952ee3b28017b9", null ], + [ "hal_i2c_idle", "a01473.html#ga9317303ada721ff3f97e7aad69437a30", null ], + [ "hal_i2c_init", "a01473.html#ga09e7f465a040fbd19ea136269571de3c", null ], + [ "hal_i2c_post_init", "a01473.html#gafbe53519362f18c2688d10da6f7c618f", null ], + [ "hal_i2c_receive", "a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], + [ "hal_i2c_release", "a01473.html#gac382cc4431d2d1c721c21a453ba36c22", null ], + [ "hal_i2c_send", "a01473.html#gacc9a889e19d2f1a475a39391565b66dd", null ], + [ "hal_i2c_sleep", "a01473.html#ga3f89bae6a625d5f37abdcc99408def27", null ], + [ "hal_i2c_wake", "a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] ]; \ No newline at end of file diff --git a/a00584.html b/a00584.html index 55a1064e7..3dd457720 100644 --- a/a00584.html +++ b/a00584.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_swi_gpio.c File Reference +CryptoAuthLib: hal_sam0_i2c_asf.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,288 +98,41 @@
-
hal_swi_gpio.c File Reference
+Data Structures | +Typedefs
+
hal_sam0_i2c_asf.h File Reference
-

ATCA Hardware abstraction layer for 1WIRE or SWI over GPIO. +

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers. More...

-
#include "cryptoauthlib.h"
-#include "hal_swi_gpio.h"
+
#include <asf.h>
+#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - - - - - + + + +

-Functions

ATCA_STATUS hal_swi_gpio_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an GPIO interface using given config
 
ATCA_STATUS hal_swi_gpio_post_init (ATCAIface iface)
 HAL implementation of GPIO post init.
 
ATCA_STATUS hal_swi_gpio_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of bit banging send over Harmony.
 
ATCA_STATUS hal_swi_gpio_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of bit banging receive from HARMONY.
 
ATCA_STATUS hal_swi_gpio_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations.
 
ATCA_STATUS hal_swi_gpio_release (void *hal_data)
 releases resource if no more communication
 

+Data Structures

struct  i2c_sam0_instance
 
+ + + + +

+Typedefs

+typedef void(* sam0_change_baudrate) (ATCAIface iface, uint32_t speed)
 
+typedef struct i2c_sam0_instance i2c_sam0_instance_t
 

Detailed Description

-

ATCA Hardware abstraction layer for 1WIRE or SWI over GPIO.

+

ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

-

Function Documentation

- -

◆ hal_swi_gpio_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_gpio_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_gpio_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_gpio_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

initialize an GPIO interface using given config

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_gpio_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_gpio_post_init (ATCAIface iface)
-
- -

HAL implementation of GPIO post init.

-
Parameters
- - -
[in]ifaceATCAIface instance
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_swi_gpio_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_gpio_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

HAL implementation of bit banging receive from HARMONY.

-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_gpio_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_gpio_release (void * hal_data)
-
- -

releases resource if no more communication

-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_gpio_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_gpio_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of bit banging send over Harmony.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdevice transaction type
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
+
diff --git a/a00584.js b/a00584.js index 4417da8a1..2b47dd3a9 100644 --- a/a00584.js +++ b/a00584.js @@ -1,9 +1,4 @@ var a00584 = [ - [ "hal_swi_gpio_control", "a00584.html#aaf7a492cce7f9a5fe5b817aae347ba3d", null ], - [ "hal_swi_gpio_init", "a00584.html#a56876f187f5f50c3cc8728ee21f0962c", null ], - [ "hal_swi_gpio_post_init", "a00584.html#a1527badd7e7e5f4d1e60eada509b1319", null ], - [ "hal_swi_gpio_receive", "a00584.html#a3415a23c978f3421bc01d069d1ab9180", null ], - [ "hal_swi_gpio_release", "a00584.html#aae0cb0a585b3eb7535c70047bef1f7c6", null ], - [ "hal_swi_gpio_send", "a00584.html#aea9aba476b50f5d4ef082c24f0cb6b68", null ] + [ "i2c_sam0_instance", "a01699.html", null ] ]; \ No newline at end of file diff --git a/a00587.html b/a00587.html index 704336a37..a63198674 100644 --- a/a00587.html +++ b/a00587.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_swi_gpio.h File Reference +CryptoAuthLib: hal_sam_i2c_asf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,345 +97,64 @@
-
hal_swi_gpio.h File Reference
+ +
hal_sam_i2c_asf.c File Reference
-

ATCA Hardware abstraction layer for SWI over GPIO drivers. +

ATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers. More...

-
#include <stdlib.h>
-#include "cryptoauthlib.h"
-#include "atca_status.h"
-#include "atca_hal.h"
-#include "atca_config.h"
+
#include <asf.h>
+#include <string.h>
+#include <stdio.h>
+#include "cryptoauthlib.h"
+#include "hal_sam_i2c_asf.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

Macros for Bit-Banged 1WIRE Timing

Times to drive bits at 230.4 kbps.

-
-#define tPUP   0
 
-#define tDSCHG   150
 
-#define tRESET   96
 
-#define tRRT   1
 
-#define tDRR   1
 
-#define tMSDR   2
 
-#define tHTSS   150
 
-#define tDACK   2
 
-#define tDACK_DLY   atca_delay_us(tDACK)
 
-#define tRRT_DLY   atca_delay_ms(tRRT)
 
-#define tDRR_DLY   atca_delay_us(tDRR)
 
-#define tMSDR_DLY   atca_delay_us(tMSDR)
 
-#define tDSCHG_DLY   atca_delay_us(tDSCHG)
 
-#define tRESET_DLY   atca_delay_us(tRESET)
 
-#define tHTSS_DLY   atca_delay_us(tHTSS)
 
-#define tLOW0_MIN   6
 
-#define tLOW0_MAX   16
 
-#define tLOW1_MIN   1
 
-#define tLOW1_MAX   2
 
-#define tRCV_MIN   4
 
-#define tRCV_MAX   6
 
-#define tBIT_MIN   (tLOW0_MIN + tPUP + tRCV_MIN)
 
-#define tBIT_MAX   75
 
-#define tWAKEUP   1
 
-#define tLOW0_TYPICAL   (tLOW0_MIN + ((tLOW0_MAX - tLOW0_MIN) / 2))
 
-#define tLOW1_TYPICAL   (tLOW1_MIN + ((tLOW1_MAX - tLOW1_MIN) / 2))
 
-#define tBIT_TYPICAL   (tBIT_MIN + ((tBIT_MAX - tBIT_MIN) / 2 ))
 
-#define tLOW0_HDLY   atca_delay_us(11)
 
-#define tRD_HDLY   atca_delay_us(1)
 
-#define tLOW1_HDLY   atca_delay_us(1)
 
-#define tRCV0_HDLY   atca_delay_us(11)
 
-#define tRCV1_HDLY   atca_delay_us(14)
 
-#define tRD_DLY   atca_delay_us(1)
 
-#define tHIGH_SPEED_DLY   atca_delay_us(1)
 
-#define tSWIN_DLY   atca_delay_us(1)
 
-#define tLOW0_DLY   atca_delay_us(tLOW0_TYPICAL)
 
-#define tLOW1_DLY   atca_delay_us(tLOW1_TYPICAL)
 
-#define tBIT_DLY   atca_delay_us(tBIT_TYPICAL)
 
-#define tRCV0_DLY   atca_delay_us(tBIT_TYPICAL - tLOW0_TYPICAL)
 
-#define tRCV1_DLY   atca_delay_us(tBIT_TYPICAL - tLOW1_TYPICAL)
 
-#define send_logic0_1wire(...)   send_logic_bit(__VA_ARGS__, ATCA_GPIO_LOGIC_BIT0)
 
-#define send_logic1_1wire(...)   send_logic_bit(__VA_ARGS__, ATCA_GPIO_LOGIC_BIT1)
 
-#define send_ACK_1wire(...)   send_logic0_1wire(__VA_ARGS__)
 
-#define send_NACK_1wire(...)   send_logic1_1wire(__VA_ARGS__)
 
-#define ATCA_1WIRE_RESET_WORD_ADDR   0x00
 
-#define ATCA_1WIRE_SLEEP_WORD_ADDR   0x01
 
-#define ATCA_1WIRE_SLEEP_WORD_ADDR_ALTERNATE   0x02
 
-#define ATCA_1WIRE_COMMAND_WORD_ADDR   0x03
 
-#define ATCA_1WIRE_RESPONSE_LENGTH_SIZE   0x01
 
-#define ATCA_1WIRE_BIT_MASK   0x80
 
-#define ATCA_GPIO_WRITE   0
 
-#define ATCA_GPIO_READ   1
 
-#define ATCA_GPIO_INPUT_DIR   0
 
-#define ATCA_GPIO_OUTPUT_DIR   1
 
-#define ATCA_GPIO_LOGIC_BIT0   0
 
-#define ATCA_GPIO_LOGIC_BIT1   1
 
-#define ATCA_GPIO_ACK   ATCA_GPIO_LOGIC_BIT0
 
-#define ATCA_GPIO_CLEAR   0
 
-#define ATCA_GPIO_SET   1
 
-#define ATCA_MIN_RESPONSE_LENGTH   4
 
-#define PIN_INPUT_DIR(pin)   PORT_GroupInputEnable(GET_PORT_GROUP(pin), GET_PIN_MASK(pin))
 
-#define PIN_OUTPUT_DIR(pin)   PORT_GroupOutputEnable(GET_PORT_GROUP(pin), GET_PIN_MASK(pin))
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Macros for Bit-Banged SWI Timing

Times to drive bits at 230.4 kbps.

-
#define BIT_DELAY_1L   atca_delay_us(4)
 
-#define BIT_DELAY_1H   atca_delay_us(4)
 should be 4.34 us, is 4.05us
 
#define BIT_DELAY_5   atca_delay_us(26)
 
#define BIT_DELAY_7   atca_delay_us(34)
 
#define RX_TX_DELAY   atca_delay_us(65)
 
#define ATCA_SWI_WAKE_WORD_ADDR   ((uint8_t)0x00)
 
-#define ATCA_SWI_CMD_WORD_ADDR   ((uint8_t)0x77)
 
-#define ATCA_SWI_TX_WORD_ADDR   ((uint8_t)0x88)
 
-#define ATCA_SWI_IDLE_WORD_ADDR   ((uint8_t)0xBB)
 
-#define ATCA_SWI_SLEEP_WORD_ADDR   ((uint8_t)0xCC)
 
-#define ATCA_SWI_BIT_MASK   0x01
 
enum  protocol_type { ATCA_PROTOCOL_1WIRE -, ATCA_PROTOCOL_SWI -, NO_OF_PROTOCOL - }
 
enum  delay_type {
-  LOGIC0_1 -, LOGIC0_2 -, LOGIC0_3 -, LOGIC0_4 -,
-  LOGIC1_1 -, LOGIC1_2 -, NO_OF_DELAYS -
- }
 

+Functions

ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for SWI over GPIO drivers.

+

ATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the ASF I2C primitives to set up the interface.

+

Prerequisite: add "TWI - Two-Wire Interface (Common API) (service)" module to application in Atmel Studio

-

Macro Definition Documentation

- -

◆ ATCA_SWI_WAKE_WORD_ADDR

- -
-
- - - - -
#define ATCA_SWI_WAKE_WORD_ADDR   ((uint8_t)0x00)
-
-

SWI WORD Address

- -
-
- -

◆ BIT_DELAY_1L

- -
-
- - - - -
#define BIT_DELAY_1L   atca_delay_us(4)
-
-

delay macro for width of one pulse (start pulse or zero pulse) should be 4.34 us, is 4.05 us

- -
-
- -

◆ BIT_DELAY_5

- -
-
- - - - -
#define BIT_DELAY_5   atca_delay_us(26)
-
-

time to keep pin high for five pulses plus stop bit (used to bit-bang CryptoAuth 'zero' bit) should be 26.04 us, is 26.92 us

- -
-
- -

◆ BIT_DELAY_7

- -
-
- - - - -
#define BIT_DELAY_7   atca_delay_us(34)
-
-

time to keep pin high for seven bits plus stop bit (used to bit-bang CryptoAuth 'one' bit) should be 34.72 us, is 35.13 us

- -
-
- -

◆ RX_TX_DELAY

- -
-
- - - - -
#define RX_TX_DELAY   atca_delay_us(65)
-
-

turn around time when switching from receive to transmit should be 93 us (Setting little less value as there would be other process before these steps)

- -
-
-
+
diff --git a/a00587.js b/a00587.js index 178c834ef..0443b3dbf 100644 --- a/a00587.js +++ b/a00587.js @@ -1,9 +1,13 @@ var a00587 = [ - [ "ATCA_SWI_WAKE_WORD_ADDR", "a00587.html#a35e9d98d207f17ebac66dc86e29a6464", null ], - [ "BIT_DELAY_1H", "a00587.html#a1ce4882b7d053eafcec22cd84fb5727d", null ], - [ "BIT_DELAY_1L", "a00587.html#ad884cf7d66d88b38180369a791a9824b", null ], - [ "BIT_DELAY_5", "a00587.html#a2ced4699fc4ab5162dbb9453edecb32e", null ], - [ "BIT_DELAY_7", "a00587.html#abd0d20a34060650b8a2895c17f842f44", null ], - [ "RX_TX_DELAY", "a00587.html#a60ba93807a2c0ea2ce1432245f3f7da0", null ] + [ "hal_i2c_discover_buses", "a01473.html#ga05700385437884cc7b28c38d33e84f8c", null ], + [ "hal_i2c_discover_devices", "a01473.html#gac7644e62498a596c09952ee3b28017b9", null ], + [ "hal_i2c_idle", "a01473.html#ga9317303ada721ff3f97e7aad69437a30", null ], + [ "hal_i2c_init", "a01473.html#ga09e7f465a040fbd19ea136269571de3c", null ], + [ "hal_i2c_post_init", "a01473.html#gafbe53519362f18c2688d10da6f7c618f", null ], + [ "hal_i2c_receive", "a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], + [ "hal_i2c_release", "a01473.html#gac382cc4431d2d1c721c21a453ba36c22", null ], + [ "hal_i2c_send", "a01473.html#gacc9a889e19d2f1a475a39391565b66dd", null ], + [ "hal_i2c_sleep", "a01473.html#ga3f89bae6a625d5f37abdcc99408def27", null ], + [ "hal_i2c_wake", "a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] ]; \ No newline at end of file diff --git a/a00590.html b/a00590.html index e841d13ea..cae0a437c 100644 --- a/a00590.html +++ b/a00590.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_swi_uart.c File Reference +CryptoAuthLib: hal_sam_i2c_asf.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,54 +98,41 @@
-
hal_swi_uart.c File Reference
+Data Structures | +Typedefs
+
hal_sam_i2c_asf.h File Reference
-

ATCA Hardware abstraction layer for SWI over UART drivers. +

ATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers. More...

-
#include "cryptoauthlib.h"
+
#include <asf.h>
+#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + +

-Functions

ATCA_STATUS hal_swi_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an SWI interface using given config
 
ATCA_STATUS hal_swi_post_init (ATCAIface iface)
 HAL implementation of SWI post init.
 
ATCA_STATUS hal_swi_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of SWI send command over UART.
 
ATCA_STATUS hal_swi_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of SWI receive function over UART.
 
ATCA_STATUS hal_swi_wake (ATCAIface iface)
 Send Wake flag via SWI.
 
ATCA_STATUS hal_swi_sleep (ATCAIface iface)
 Send Sleep flag via SWI.
 
ATCA_STATUS hal_swi_idle (ATCAIface iface)
 Send Idle flag via SWI.
 
ATCA_STATUS hal_swi_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_swi_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

+Data Structures

struct  i2c_sam_instance
 
+ + + + +

+Typedefs

+typedef void(* sam_change_baudrate) (ATCAIface iface, uint32_t speed)
 
+typedef struct i2c_sam_instance i2c_sam_instance_t
 

Detailed Description

-

ATCA Hardware abstraction layer for SWI over UART drivers.

+

ATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers.

+

Prerequisite: add "TWI - Two-Wire Interface (Common API) (service)" module to application in Atmel Studio

diff --git a/a00590.js b/a00590.js deleted file mode 100644 index 1b40e2e94..000000000 --- a/a00590.js +++ /dev/null @@ -1,12 +0,0 @@ -var a00590 = -[ - [ "hal_swi_control", "a01446.html#gad6ba20fd0d0d393f0cbf03ea9cb63346", null ], - [ "hal_swi_idle", "a01446.html#ga618291172976da96c4f02dc9200c845c", null ], - [ "hal_swi_init", "a01446.html#gae3e41d9b466fb912625402db629b1a62", null ], - [ "hal_swi_post_init", "a01446.html#ga9186e5235979216330ae580290872c77", null ], - [ "hal_swi_receive", "a01446.html#ga159bdf9c24e429d54800da1eb1c21058", null ], - [ "hal_swi_release", "a01446.html#ga196dbc62546b39ac3e556a0f7f6b7132", null ], - [ "hal_swi_send", "a01446.html#ga9df4dbd666a87efe49578842e53ad91e", null ], - [ "hal_swi_sleep", "a01446.html#ga252e365a30f2583dae8a8eac073a9f53", null ], - [ "hal_swi_wake", "a01446.html#gafc428980ec95e37eee94813db229fe70", null ] -]; \ No newline at end of file diff --git a/a00593.html b/a00593.html index ea253ebdf..f8e0769b8 100644 --- a/a00593.html +++ b/a00593.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_timer_start.c File Reference +CryptoAuthLib: hal_sam_timer_asf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,37 +99,37 @@
-
hal_timer_start.c File Reference
+
hal_sam_timer_asf.c File Reference
-

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers. +

ATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers. More...

-
#include <hal_delay.h>
-#include "atca_hal.h"
+
#include <asf.h>
+#include <delay.h>
+#include "atca_hal.h"
- - - - + - + + + +

Functions

void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void atca_delay_10us (uint32_t delay)
void atca_delay_10us (uint32_t delay)
 This function delays for a number of tens of microseconds.
 
void atca_delay_ms (uint32_t ms)
void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+

ATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers.

diff --git a/a00593.js b/a00593.js index 44c346a8e..e22fd4832 100644 --- a/a00593.js +++ b/a00593.js @@ -1,6 +1,6 @@ var a00593 = [ - [ "atca_delay_10us", "a01446.html#ga19891182689551cc3a88603135959351", null ], - [ "atca_delay_ms", "a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], - [ "atca_delay_us", "a01446.html#ga7598dfcd6dcac882836544d48356d02f", null ] + [ "atca_delay_10us", "a01473.html#ga19891182689551cc3a88603135959351", null ], + [ "atca_delay_ms", "a01473.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], + [ "atca_delay_us", "a01473.html#ga7598dfcd6dcac882836544d48356d02f", null ] ]; \ No newline at end of file diff --git a/a00596.html b/a00596.html index ada0ff1b6..03a403c26 100644 --- a/a00596.html +++ b/a00596.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_uart_harmony.c File Reference +CryptoAuthLib: hal_spi_harmony.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,270 +98,67 @@
-
hal_uart_harmony.c File Reference
+Functions
+
hal_spi_harmony.c File Reference
-

ATCA Hardware abstraction layer for SWI uart over Harmony PLIB. +

ATCA Hardware abstraction layer for SPI over Harmony PLIB. More...

-
#include "atca_config.h"
-#include "cryptoauthlib.h"
+
#include <string.h>
+#include <stdio.h>
+#include "atca_config.h"
+#include "cryptoauthlib.h"
+#include "atca_hal.h"
+#include "atca_device.h"
+#include "definitions.h"
+#include "talib/talib_defines.h"
+#include "talib/talib_fce.h"
- - - - - - - - - - - - - - - - - -

Functions

ATCA_STATUS hal_uart_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 Initialize an uart interface using given config.
 
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
 HAL implementation of SWI post init.
 
ATCA_STATUS hal_uart_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Send byte(s) via SWI.
 
ATCA_STATUS hal_uart_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receive byte(s) via SWI.
 
-ATCA_STATUS hal_uart_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
ATCA_STATUS hal_uart_release (void *hal_data)
 Manages reference count on given bus and releases resource if no more reference(s) exist.
 
- - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Variables

PLIB_SWI_SERIAL_SETUP serial_setup
 
ATCA_STATUS hal_spi_discover_buses (int spi_buses[], int max_buses)
 discover spi buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS hal_spi_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any TA10x devices on a given logical bus number
 
ATCA_STATUS hal_spi_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an SPI interface using given config
 
ATCA_STATUS hal_spi_post_init (ATCAIface iface)
 HAL implementation of SPI post init.
 
ATCA_STATUS hal_spi_select (ATCAIface iface)
 HAL implementation to assert the device chip select.
 
ATCA_STATUS hal_spi_deselect (ATCAIface iface)
 HAL implementation to deassert the device chip select.
 
ATCA_STATUS hal_spi_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of SPI send over Harmony.
 
ATCA_STATUS hal_spi_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of SPI receive function for HARMONY SPI.
 
ATCA_STATUS hal_spi_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_spi_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for SWI uart over Harmony PLIB.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the Harmony UART (ring buffer mode) primitives to set up the interface.

- -

Function Documentation

- -

◆ hal_uart_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

Initialize an uart interface using given config.

-
Parameters
- - - -
[in]halopaque pointer to HAL data
[in]cfginterface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
-
- -

HAL implementation of SWI post init.

-
Parameters
- - -
[in]ifaceATCAIface instance
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_uart_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

Receive byte(s) via SWI.

-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_uart_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_uart_release (void * hal_data)
-
- -

Manages reference count on given bus and releases resource if no more reference(s) exist.

-
Parameters
- - -
[in]hal_dataopaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_uart_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

Send byte(s) via SWI.

-
Parameters
- - - - - -
[in]ifaceinterface of the logical device to send data to
[in]word_addressdevice transaction type
[in]txdatapointer to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS
- -
-
-

Variable Documentation

- -

◆ serial_setup

- -
-
- - - - -
PLIB_SWI_SERIAL_SETUP serial_setup
-
-Initial value:
= {
-
.parity = PLIB_SWI_PARITY_NONE,
-
.dataWidth = PLIB_SWI_DATA_WIDTH,
-
.stopBits = PLIB_SWI_STOP_BIT
-
}
-
-
-
-
+

ATCA Hardware abstraction layer for SPI over Harmony PLIB.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical SPI implementation. Part 2 is the Harmony SPI primitives to set up the interface.

+

Prerequisite: add SERCOM SPI Master Interrupt support to application in Mplab Harmony 3

+ +
diff --git a/a00596.js b/a00596.js index 118e3317a..ab8b20be9 100644 --- a/a00596.js +++ b/a00596.js @@ -1,8 +1,13 @@ var a00596 = [ - [ "hal_uart_init", "a00596.html#afb6d836af248aed1afe715ae2f2f7c2b", null ], - [ "hal_uart_post_init", "a00596.html#a1c5f894db539ea5cb0d5ae0fa38449d7", null ], - [ "hal_uart_receive", "a00596.html#a1a0256b61c3579519f8cc6d6157bc126", null ], - [ "hal_uart_release", "a00596.html#a1e0c17bf7342c21ca69d066eefa1f1eb", null ], - [ "hal_uart_send", "a00596.html#aae0b332270c1e8df223b430d8e8ddbbc", null ] + [ "hal_spi_control", "a01473.html#gac7f3951634faf0a7c16c234d471c3660", null ], + [ "hal_spi_deselect", "a01473.html#ga6bcb25e01ba6242973eedb32fa9dac2a", null ], + [ "hal_spi_discover_buses", "a01473.html#ga92cecc8e30a88dee1cbedd49141bc209", null ], + [ "hal_spi_discover_devices", "a01473.html#ga6cf45c115bcb721e951e8792e0feb3f0", null ], + [ "hal_spi_init", "a01473.html#ga24b3ca4076a0e4093644d4f58cd80a69", null ], + [ "hal_spi_post_init", "a01473.html#gaeb831d9894ce11146bd00c79a98b7f0f", null ], + [ "hal_spi_receive", "a01473.html#ga410c24762579358a576a58610a877e63", null ], + [ "hal_spi_release", "a01473.html#ga8c3f1c6c20d939c4ca976fdda6279359", null ], + [ "hal_spi_select", "a01473.html#ga237aa1d0ee551a61991b52dc7812ff64", null ], + [ "hal_spi_send", "a01473.html#ga16661176757d0ef155155b07267a44ed", null ] ]; \ No newline at end of file diff --git a/a00599.html b/a00599.html index 9d0b608f4..d534baab6 100644 --- a/a00599.html +++ b/a00599.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_uc3_i2c_asf.c File Reference +CryptoAuthLib: hal_swi_gpio.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,65 +99,287 @@
-
hal_uc3_i2c_asf.c File Reference
+
hal_swi_gpio.c File Reference
-

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers. +

ATCA Hardware abstraction layer for 1WIRE or SWI over GPIO. More...

-
#include <asf.h>
-#include <string.h>
-#include <stdio.h>
-#include "cryptoauthlib.h"
-#include "hal_uc3_i2c_asf.h"
+
#include "cryptoauthlib.h"
+#include "hal_swi_gpio.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_swi_gpio_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an GPIO interface using given config
 
ATCA_STATUS hal_swi_gpio_post_init (ATCAIface iface)
 HAL implementation of GPIO post init.
 
ATCA_STATUS hal_swi_gpio_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of bit banging send over Harmony.
 
ATCA_STATUS hal_swi_gpio_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of bit banging receive from HARMONY.
 
ATCA_STATUS hal_swi_gpio_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations.
 
ATCA_STATUS hal_swi_gpio_release (void *hal_data)
 releases resource if no more communication
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.

-

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the ASF I2C primitives to set up the interface.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+

ATCA Hardware abstraction layer for 1WIRE or SWI over GPIO.

-
+

Function Documentation

+ +

◆ hal_swi_gpio_control()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_swi_gpio_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
+
+ +

Perform control operations.

+
Parameters
+ + + + + +
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_swi_gpio_init()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_swi_gpio_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
+
+ +

initialize an GPIO interface using given config

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_swi_gpio_post_init()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_swi_gpio_post_init (ATCAIface iface)
+
+ +

HAL implementation of GPIO post init.

+
Parameters
+ + +
[in]ifaceATCAIface instance
+
+
+
Returns
ATCA_SUCCESS
+ +
+
+ +

◆ hal_swi_gpio_receive()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_swi_gpio_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
+
+ +

HAL implementation of bit banging receive from HARMONY.

+
Parameters
+ + + + + +
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_swi_gpio_release()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_swi_gpio_release (void * hal_data)
+
+ +

releases resource if no more communication

+
Parameters
+ + +
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_swi_gpio_send()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_swi_gpio_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
+
+ +

HAL implementation of bit banging send over Harmony.

+
Parameters
+ + + + + +
[in]ifaceinstance
[in]word_addressdevice transaction type
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+
diff --git a/a00599.js b/a00599.js index d817a0c8a..32d8db5b6 100644 --- a/a00599.js +++ b/a00599.js @@ -1,14 +1,9 @@ var a00599 = [ - [ "change_i2c_speed", "a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ], - [ "hal_i2c_discover_buses", "a01446.html#ga05700385437884cc7b28c38d33e84f8c", null ], - [ "hal_i2c_discover_devices", "a01446.html#gac7644e62498a596c09952ee3b28017b9", null ], - [ "hal_i2c_idle", "a01446.html#ga9317303ada721ff3f97e7aad69437a30", null ], - [ "hal_i2c_init", "a01446.html#ga09e7f465a040fbd19ea136269571de3c", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ], - [ "hal_i2c_sleep", "a01446.html#ga3f89bae6a625d5f37abdcc99408def27", null ], - [ "hal_i2c_wake", "a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] + [ "hal_swi_gpio_control", "a00599.html#aaf7a492cce7f9a5fe5b817aae347ba3d", null ], + [ "hal_swi_gpio_init", "a00599.html#a56876f187f5f50c3cc8728ee21f0962c", null ], + [ "hal_swi_gpio_post_init", "a00599.html#a1527badd7e7e5f4d1e60eada509b1319", null ], + [ "hal_swi_gpio_receive", "a00599.html#a3415a23c978f3421bc01d069d1ab9180", null ], + [ "hal_swi_gpio_release", "a00599.html#aae0cb0a585b3eb7535c70047bef1f7c6", null ], + [ "hal_swi_gpio_send", "a00599.html#aea9aba476b50f5d4ef082c24f0cb6b68", null ] ]; \ No newline at end of file diff --git a/a00602.html b/a00602.html index a05aa5d83..da417ddd8 100644 --- a/a00602.html +++ b/a00602.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_uc3_i2c_asf.h File Reference +CryptoAuthLib: hal_swi_gpio.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,55 +97,345 @@
- -
hal_uc3_i2c_asf.h File Reference
+
hal_swi_gpio.h File Reference
-

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers. +

ATCA Hardware abstraction layer for SWI over GPIO drivers. More...

-
#include <asf.h>
-#include "twi.h"
+
#include <stdlib.h>
+#include "cryptoauthlib.h"
+#include "atca_status.h"
+#include "atca_hal.h"
+#include "atca_config.h"
- - - - -

-Data Structures

struct  atcaI2Cmaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
- - -

Macros

-#define MAX_I2C_BUSES   3
 
- - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Typedefs

-typedef struct atcaI2Cmaster ATCAI2CMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
Macros for Bit-Banged 1WIRE Timing

Times to drive bits at 230.4 kbps.

+
+#define tPUP   0
 
+#define tDSCHG   150
 
+#define tRESET   96
 
+#define tRRT   1
 
+#define tDRR   1
 
+#define tMSDR   2
 
+#define tHTSS   150
 
+#define tDACK   2
 
+#define tDACK_DLY   atca_delay_us(tDACK)
 
+#define tRRT_DLY   atca_delay_ms(tRRT)
 
+#define tDRR_DLY   atca_delay_us(tDRR)
 
+#define tMSDR_DLY   atca_delay_us(tMSDR)
 
+#define tDSCHG_DLY   atca_delay_us(tDSCHG)
 
+#define tRESET_DLY   atca_delay_us(tRESET)
 
+#define tHTSS_DLY   atca_delay_us(tHTSS)
 
+#define tLOW0_MIN   6
 
+#define tLOW0_MAX   16
 
+#define tLOW1_MIN   1
 
+#define tLOW1_MAX   2
 
+#define tRCV_MIN   4
 
+#define tRCV_MAX   6
 
+#define tBIT_MIN   (tLOW0_MIN + tPUP + tRCV_MIN)
 
+#define tBIT_MAX   75
 
+#define tWAKEUP   1
 
+#define tLOW0_TYPICAL   (tLOW0_MIN + ((tLOW0_MAX - tLOW0_MIN) / 2))
 
+#define tLOW1_TYPICAL   (tLOW1_MIN + ((tLOW1_MAX - tLOW1_MIN) / 2))
 
+#define tBIT_TYPICAL   (tBIT_MIN + ((tBIT_MAX - tBIT_MIN) / 2 ))
 
+#define tLOW0_HDLY   atca_delay_us(11)
 
+#define tRD_HDLY   atca_delay_us(1)
 
+#define tLOW1_HDLY   atca_delay_us(1)
 
+#define tRCV0_HDLY   atca_delay_us(11)
 
+#define tRCV1_HDLY   atca_delay_us(14)
 
+#define tRD_DLY   atca_delay_us(1)
 
+#define tHIGH_SPEED_DLY   atca_delay_us(1)
 
+#define tSWIN_DLY   atca_delay_us(1)
 
+#define tLOW0_DLY   atca_delay_us(tLOW0_TYPICAL)
 
+#define tLOW1_DLY   atca_delay_us(tLOW1_TYPICAL)
 
+#define tBIT_DLY   atca_delay_us(tBIT_TYPICAL)
 
+#define tRCV0_DLY   atca_delay_us(tBIT_TYPICAL - tLOW0_TYPICAL)
 
+#define tRCV1_DLY   atca_delay_us(tBIT_TYPICAL - tLOW1_TYPICAL)
 
+#define send_logic0_1wire(...)   send_logic_bit(__VA_ARGS__, ATCA_GPIO_LOGIC_BIT0)
 
+#define send_logic1_1wire(...)   send_logic_bit(__VA_ARGS__, ATCA_GPIO_LOGIC_BIT1)
 
+#define send_ACK_1wire(...)   send_logic0_1wire(__VA_ARGS__)
 
+#define send_NACK_1wire(...)   send_logic1_1wire(__VA_ARGS__)
 
+#define ATCA_1WIRE_RESET_WORD_ADDR   0x00
 
+#define ATCA_1WIRE_SLEEP_WORD_ADDR   0x01
 
+#define ATCA_1WIRE_SLEEP_WORD_ADDR_ALTERNATE   0x02
 
+#define ATCA_1WIRE_COMMAND_WORD_ADDR   0x03
 
+#define ATCA_1WIRE_RESPONSE_LENGTH_SIZE   0x01
 
+#define ATCA_1WIRE_BIT_MASK   0x80
 
+#define ATCA_GPIO_WRITE   0
 
+#define ATCA_GPIO_READ   1
 
+#define ATCA_GPIO_INPUT_DIR   0
 
+#define ATCA_GPIO_OUTPUT_DIR   1
 
+#define ATCA_GPIO_LOGIC_BIT0   0
 
+#define ATCA_GPIO_LOGIC_BIT1   1
 
+#define ATCA_GPIO_ACK   ATCA_GPIO_LOGIC_BIT0
 
+#define ATCA_GPIO_CLEAR   0
 
+#define ATCA_GPIO_SET   1
 
+#define ATCA_MIN_RESPONSE_LENGTH   4
 
+#define PIN_INPUT_DIR(pin)   PORT_GroupInputEnable(GET_PORT_GROUP(pin), GET_PIN_MASK(pin))
 
+#define PIN_OUTPUT_DIR(pin)   PORT_GroupOutputEnable(GET_PORT_GROUP(pin), GET_PIN_MASK(pin))
 
- - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Functions

ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 

Macros for Bit-Banged SWI Timing

Times to drive bits at 230.4 kbps.

+
#define BIT_DELAY_1L   atca_delay_us(4)
 
+#define BIT_DELAY_1H   atca_delay_us(4)
 should be 4.34 us, is 4.05us
 
#define BIT_DELAY_5   atca_delay_us(26)
 
#define BIT_DELAY_7   atca_delay_us(34)
 
#define RX_TX_DELAY   atca_delay_us(65)
 
#define ATCA_SWI_WAKE_WORD_ADDR   ((uint8_t)0x00)
 
+#define ATCA_SWI_CMD_WORD_ADDR   ((uint8_t)0x77)
 
+#define ATCA_SWI_TX_WORD_ADDR   ((uint8_t)0x88)
 
+#define ATCA_SWI_IDLE_WORD_ADDR   ((uint8_t)0xBB)
 
+#define ATCA_SWI_SLEEP_WORD_ADDR   ((uint8_t)0xCC)
 
+#define ATCA_SWI_BIT_MASK   0x01
 
enum  protocol_type { ATCA_PROTOCOL_1WIRE +, ATCA_PROTOCOL_SWI +, NO_OF_PROTOCOL + }
 
enum  delay_type {
+  LOGIC0_1 +, LOGIC0_2 +, LOGIC0_3 +, LOGIC0_4 +,
+  LOGIC1_1 +, LOGIC1_2 +, NO_OF_DELAYS +
+ }
 

Detailed Description

-

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.

-

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+

ATCA Hardware abstraction layer for SWI over GPIO drivers.

-
+

Macro Definition Documentation

+ +

◆ ATCA_SWI_WAKE_WORD_ADDR

+ +
+
+ + + + +
#define ATCA_SWI_WAKE_WORD_ADDR   ((uint8_t)0x00)
+
+

SWI WORD Address

+ +
+
+ +

◆ BIT_DELAY_1L

+ +
+
+ + + + +
#define BIT_DELAY_1L   atca_delay_us(4)
+
+

delay macro for width of one pulse (start pulse or zero pulse) should be 4.34 us, is 4.05 us

+ +
+
+ +

◆ BIT_DELAY_5

+ +
+
+ + + + +
#define BIT_DELAY_5   atca_delay_us(26)
+
+

time to keep pin high for five pulses plus stop bit (used to bit-bang CryptoAuth 'zero' bit) should be 26.04 us, is 26.92 us

+ +
+
+ +

◆ BIT_DELAY_7

+ +
+
+ + + + +
#define BIT_DELAY_7   atca_delay_us(34)
+
+

time to keep pin high for seven bits plus stop bit (used to bit-bang CryptoAuth 'one' bit) should be 34.72 us, is 35.13 us

+ +
+
+ +

◆ RX_TX_DELAY

+ +
+
+ + + + +
#define RX_TX_DELAY   atca_delay_us(65)
+
+

turn around time when switching from receive to transmit should be 93 us (Setting little less value as there would be other process before these steps)

+ +
+
+
diff --git a/a00602.js b/a00602.js index 400cbadc6..3f88e44ee 100644 --- a/a00602.js +++ b/a00602.js @@ -1,5 +1,9 @@ var a00602 = [ - [ "ATCAI2CMaster_t", "a01446.html#ga06b19a932aea9cf3a5165fefacb24f7b", null ], - [ "change_i2c_speed", "a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ] + [ "ATCA_SWI_WAKE_WORD_ADDR", "a00602.html#a35e9d98d207f17ebac66dc86e29a6464", null ], + [ "BIT_DELAY_1H", "a00602.html#a1ce4882b7d053eafcec22cd84fb5727d", null ], + [ "BIT_DELAY_1L", "a00602.html#ad884cf7d66d88b38180369a791a9824b", null ], + [ "BIT_DELAY_5", "a00602.html#a2ced4699fc4ab5162dbb9453edecb32e", null ], + [ "BIT_DELAY_7", "a00602.html#abd0d20a34060650b8a2895c17f842f44", null ], + [ "RX_TX_DELAY", "a00602.html#a60ba93807a2c0ea2ce1432245f3f7da0", null ] ]; \ No newline at end of file diff --git a/a00605.html b/a00605.html index 698f44e72..1f5e8d2c4 100644 --- a/a00605.html +++ b/a00605.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_uc3_timer_asf.c File Reference +CryptoAuthLib: hal_swi_uart.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,38 +99,53 @@
-
hal_uc3_timer_asf.c File Reference
+
hal_swi_uart.c File Reference
-

ATCA Hardware abstraction layer for SAM4S I2C over ASF drivers. +

ATCA Hardware abstraction layer for SWI over UART drivers. More...

-
#include <asf.h>
-#include <delay.h>
-#include "atca_hal.h"
+
#include "cryptoauthlib.h"
- - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void atca_delay_10us (uint32_t delay)
 This function delays for a number of tens of microseconds.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 
ATCA_STATUS hal_swi_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an SWI interface using given config
 
ATCA_STATUS hal_swi_post_init (ATCAIface iface)
 HAL implementation of SWI post init.
 
ATCA_STATUS hal_swi_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of SWI send command over UART.
 
ATCA_STATUS hal_swi_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of SWI receive function over UART.
 
ATCA_STATUS hal_swi_wake (ATCAIface iface)
 Send Wake flag via SWI.
 
ATCA_STATUS hal_swi_sleep (ATCAIface iface)
 Send Sleep flag via SWI.
 
ATCA_STATUS hal_swi_idle (ATCAIface iface)
 Send Idle flag via SWI.
 
ATCA_STATUS hal_swi_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_swi_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-

ATCA Hardware abstraction layer for SAM4S I2C over ASF drivers.

-

Prerequisite: add "Delay routines (service)" module to application in Atmel Studio

+

ATCA Hardware abstraction layer for SWI over UART drivers.

diff --git a/a00605.js b/a00605.js index 1e3acd36f..4b4c2e4ea 100644 --- a/a00605.js +++ b/a00605.js @@ -1,6 +1,12 @@ var a00605 = [ - [ "atca_delay_10us", "a01446.html#ga19891182689551cc3a88603135959351", null ], - [ "atca_delay_ms", "a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], - [ "atca_delay_us", "a01446.html#ga7598dfcd6dcac882836544d48356d02f", null ] + [ "hal_swi_control", "a01473.html#gad6ba20fd0d0d393f0cbf03ea9cb63346", null ], + [ "hal_swi_idle", "a01473.html#ga618291172976da96c4f02dc9200c845c", null ], + [ "hal_swi_init", "a01473.html#gae3e41d9b466fb912625402db629b1a62", null ], + [ "hal_swi_post_init", "a01473.html#ga9186e5235979216330ae580290872c77", null ], + [ "hal_swi_receive", "a01473.html#ga159bdf9c24e429d54800da1eb1c21058", null ], + [ "hal_swi_release", "a01473.html#ga196dbc62546b39ac3e556a0f7f6b7132", null ], + [ "hal_swi_send", "a01473.html#ga9df4dbd666a87efe49578842e53ad91e", null ], + [ "hal_swi_sleep", "a01473.html#ga252e365a30f2583dae8a8eac073a9f53", null ], + [ "hal_swi_wake", "a01473.html#gafc428980ec95e37eee94813db229fe70", null ] ]; \ No newline at end of file diff --git a/a00608.html b/a00608.html index 926e14d04..1c4f49f4a 100644 --- a/a00608.html +++ b/a00608.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_windows.c File Reference +CryptoAuthLib: hal_timer_start.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,50 +99,37 @@
-
hal_windows.c File Reference
+
hal_timer_start.c File Reference
-

ATCA Hardware abstraction layer for windows timer functions. +

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers. More...

-
#include "atca_hal.h"
-#include <windows.h>
-#include <math.h>
+
#include <hal_delay.h>
+#include "atca_hal.h"
- - - - - - - - - - - - - - - - - - + + + + + + + + +

Functions

void hal_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void hal_delay_ms (uint32_t delay)
 Timer API implemented at the HAL level.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
-ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
-ATCA_STATUS hal_lock_mutex (void *pMutex)
 
-ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
-ATCA_STATUS hal_check_pid (hal_pid_t pid)
 Check if the pid exists in the system.
 
void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void atca_delay_10us (uint32_t delay)
 This function delays for a number of tens of microseconds.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 

Detailed Description

-

ATCA Hardware abstraction layer for windows timer functions.

+

ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

diff --git a/a00608.js b/a00608.js index 78caafcab..33840cd16 100644 --- a/a00608.js +++ b/a00608.js @@ -1,7 +1,6 @@ var a00608 = [ - [ "hal_check_pid", "a01446.html#gae31246ac870409a3d694c240c6c3498a", null ], - [ "hal_create_mutex", "a01446.html#gaad9da28968a527ce51a2b081461d4cfe", null ], - [ "hal_delay_ms", "a01446.html#gadc23b8130e72a445f76c68d62e8c95c5", null ], - [ "hal_delay_us", "a01446.html#ga7e9019810ba5ab81b256282392cd5079", null ] + [ "atca_delay_10us", "a01473.html#ga19891182689551cc3a88603135959351", null ], + [ "atca_delay_ms", "a01473.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], + [ "atca_delay_us", "a01473.html#ga7598dfcd6dcac882836544d48356d02f", null ] ]; \ No newline at end of file diff --git a/a00611.html b/a00611.html index 1e3ba7d5f..43b4f82aa 100644 --- a/a00611.html +++ b/a00611.html @@ -5,7 +5,7 @@ -CryptoAuthLib: hal_windows_kit_uart.c File Reference +CryptoAuthLib: hal_uart_harmony.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,111 +98,48 @@
-
hal_windows_kit_uart.c File Reference
+Functions | +Variables
+
hal_uart_harmony.c File Reference
-

ATCA Hardware abstraction layer for Windows using UART. +

ATCA Hardware abstraction layer for SWI uart over Harmony PLIB. More...

-
#include "cryptoauthlib.h"
-#include "atca_hal.h"
-#include <windows.h>
-#include <stdio.h>
-#include <conio.h>
-#include <math.h>
-#include <string.h>
+
#include "atca_config.h"
+#include "cryptoauthlib.h"
- - - -

-Data Structures

struct  atca_uart_host_s
 
- - - -

-Typedefs

-typedef struct atca_uart_host_s atca_uart_host_t
 
- - + + - - + + - - + + - - + + - - + - + +

Functions

ATCA_STATUS hal_uart_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of UART init.
ATCA_STATUS hal_uart_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 Initialize an uart interface using given config.
 
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
 HAL implementation of UART post init.
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
 HAL implementation of SWI post init.
 
ATCA_STATUS hal_uart_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of UART send.
ATCA_STATUS hal_uart_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Send byte(s) via SWI.
 
ATCA_STATUS hal_uart_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of UART receive function.
ATCA_STATUS hal_uart_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receive byte(s) via SWI.
 
ATCA_STATUS hal_uart_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the UART.
+ATCA_STATUS hal_uart_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
ATCA_STATUS hal_uart_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 Manages reference count on given bus and releases resource if no more reference(s) exist.
 
+ + +

+Variables

PLIB_SWI_SERIAL_SETUP serial_setup
 

Detailed Description

-

ATCA Hardware abstraction layer for Windows using UART.

- +

ATCA Hardware abstraction layer for SWI uart over Harmony PLIB.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the Harmony UART (ring buffer mode) primitives to set up the interface.

+

Function Documentation

- -

◆ hal_uart_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_uart_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations for the UART.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-

◆ hal_uart_init()

@@ -212,13 +149,13 @@

ATCA_STATUS hal_uart_init ( - ATCAIface  + ATCAIface  iface, - ATCAIfaceCfg *  + ATCAIfaceCfgcfg  @@ -229,12 +166,11 @@

-

HAL implementation of UART init.

-

this implementation assumes UART SERIAL PORT peripheral has been enabled by user . It only initialize an UART interface using given config.

+

Initialize an uart interface using given config.

Parameters
- - + +
[in]halpointer to HAL specific data that is maintained by this HAL
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
[in]halopaque pointer to HAL data
[in]cfginterface configuration
@@ -251,21 +187,21 @@

ATCA_STATUS hal_uart_post_init ( - ATCAIface  + ATCAIface  iface)

-

HAL implementation of UART post init.

+

HAL implementation of SWI post init.

Parameters
- +
[in]ifaceinstance
[in]ifaceATCAIface instance
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Returns
ATCA_SUCCESS
@@ -278,7 +214,7 @@

ATCA_STATUS hal_uart_receive ( - ATCAIface  + ATCAIface  iface, @@ -307,7 +243,7 @@

-

HAL implementation of UART receive function.

+

Receive byte(s) via SWI.

Parameters
@@ -337,14 +273,14 @@

-

manages reference count on given bus and releases resource if no more refences exist

+

Manages reference count on given bus and releases resource if no more reference(s) exist.

Parameters

[in]ifaceDevice to interact with.
- +
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
[in]hal_dataopaque pointer to hal data structure - known only to the HAL implementation
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Returns
ATCA_SUCCESS

@@ -357,7 +293,7 @@

ATCA_STATUS hal_uart_send ( - ATCAIface  + ATCAIface  iface, @@ -386,19 +322,38 @@

-

HAL implementation of UART send.

+

Send byte(s) via SWI.

Parameters
- - - - - + + + +
[in]ifaceinstance
[in]word_addresstransaction type
[in]txdatadata to be send to device
[in]txdatapointer to space to bytes to send
[in]lennumber of bytes to send
[in]ifaceinterface of the logical device to send data to
[in]word_addressdevice transaction type
[in]txdatapointer to bytes to send
[in]txlengthnumber of bytes to send
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Returns
ATCA_SUCCESS
+ +

+
+

Variable Documentation

+
+

◆ serial_setup

+
+
+ + + + +
PLIB_SWI_SERIAL_SETUP serial_setup
+
+Initial value:
= {
+
.parity = PLIB_SWI_PARITY_NONE,
+
.dataWidth = PLIB_SWI_DATA_WIDTH,
+
.stopBits = PLIB_SWI_STOP_BIT
+
}
+
@@ -406,7 +361,7 @@

diff --git a/a00611.js b/a00611.js index 5ee3e607f..541bc97bc 100644 --- a/a00611.js +++ b/a00611.js @@ -1,7 +1,5 @@ var a00611 = [ - [ "atca_uart_host_s", "a01676.html", null ], - [ "hal_uart_control", "a00611.html#a41ed83bbc8e0fd3abea7beb513fbdb96", null ], [ "hal_uart_init", "a00611.html#afb6d836af248aed1afe715ae2f2f7c2b", null ], [ "hal_uart_post_init", "a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7", null ], [ "hal_uart_receive", "a00611.html#a1a0256b61c3579519f8cc6d6157bc126", null ], diff --git a/a00614.html b/a00614.html index 8b79e983d..b8123b1ce 100644 --- a/a00614.html +++ b/a00614.html @@ -5,7 +5,7 @@ -CryptoAuthLib: kit_protocol.h File Reference +CryptoAuthLib: hal_uc3_i2c_asf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,81 +98,66 @@
-
kit_protocol.h File Reference
+
hal_uc3_i2c_asf.c File Reference
-
#include "cryptoauthlib.h"
+ +

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers. +More...

+
#include <asf.h>
+#include <string.h>
+#include <stdio.h>
+#include "cryptoauthlib.h"
+#include "hal_uc3_i2c_asf.h"
- - - - - - - -

-Macros

-#define KIT_TX_WRAP_SIZE   (10)
 
-#define KIT_MSG_SIZE   (32u)
 
-#define KIT_RX_WRAP_SIZE   (KIT_MSG_SIZE + 6u)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

-ATCA_STATUS kit_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 
-ATCA_STATUS kit_post_init (ATCAIface iface)
 
-ATCA_STATUS kit_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 
-ATCA_STATUS kit_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxsize)
 
-ATCA_STATUS kit_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
-ATCA_STATUS kit_release (void *hal_data)
 
-ATCA_STATUS kit_wrap_cmd (ATCAIface iface, uint8_t word_address, const uint8_t *txdata, int txlen, char *pkitcmd, int *nkitcmd)
 
-ATCA_STATUS kit_parse_rsp (const char *pkitbuf, int nkitbuf, uint8_t *kitstatus, uint8_t *rxdata, int *datasize)
 
-ATCA_STATUS kit_wake (ATCAIface iface)
 
-ATCA_STATUS kit_idle (ATCAIface iface)
 
-ATCA_STATUS kit_sleep (ATCAIface iface)
 
-ATCA_STATUS kit_phy_send (ATCAIface iface, uint8_t *txdata, int txlength)
 
-ATCA_STATUS kit_phy_receive (ATCAIface iface, uint8_t *rxdata, int *rxsize)
 
const char * kit_id_from_devtype (ATCADeviceType devtype)
 
const char * kit_interface_from_kittype (ATCAKitType kittype)
 
const char * kit_interface (ATCAKitType kittype)
 
ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-
+

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.

+

This code is structured in two parts. Part 1 is the connection of the ATCA HAL API to the physical I2C implementation. Part 2 is the ASF I2C primitives to set up the interface.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

+
diff --git a/a00614.js b/a00614.js index 4dd506afe..908dac01f 100644 --- a/a00614.js +++ b/a00614.js @@ -1,6 +1,14 @@ var a00614 = [ - [ "kit_id_from_devtype", "a01446.html#ga554072f32204a0eb8d7b8c7931e43343", null ], - [ "kit_interface", "a01446.html#ga33fe33933fb59dde6e6fb8975da6c12d", null ], - [ "kit_interface_from_kittype", "a01446.html#ga31075898964b61f4877ba882477b71c3", null ] + [ "change_i2c_speed", "a01473.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ], + [ "hal_i2c_discover_buses", "a01473.html#ga05700385437884cc7b28c38d33e84f8c", null ], + [ "hal_i2c_discover_devices", "a01473.html#gac7644e62498a596c09952ee3b28017b9", null ], + [ "hal_i2c_idle", "a01473.html#ga9317303ada721ff3f97e7aad69437a30", null ], + [ "hal_i2c_init", "a01473.html#ga09e7f465a040fbd19ea136269571de3c", null ], + [ "hal_i2c_post_init", "a01473.html#gafbe53519362f18c2688d10da6f7c618f", null ], + [ "hal_i2c_receive", "a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], + [ "hal_i2c_release", "a01473.html#gac382cc4431d2d1c721c21a453ba36c22", null ], + [ "hal_i2c_send", "a01473.html#gacc9a889e19d2f1a475a39391565b66dd", null ], + [ "hal_i2c_sleep", "a01473.html#ga3f89bae6a625d5f37abdcc99408def27", null ], + [ "hal_i2c_wake", "a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ] ]; \ No newline at end of file diff --git a/a00617.html b/a00617.html index f88942f62..71158b206 100644 --- a/a00617.html +++ b/a00617.html @@ -5,7 +5,7 @@ -CryptoAuthLib: swi_uart_samd21_asf.c File Reference +CryptoAuthLib: hal_uc3_i2c_asf.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,59 +98,54 @@
-
swi_uart_samd21_asf.c File Reference
+Data Structures | +Macros | +Typedefs | +Functions
+
hal_uc3_i2c_asf.h File Reference
-

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers. +

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers. More...

-
#include <stdlib.h>
-#include <stdio.h>
-#include "swi_uart_samd21_asf.h"
-#include "atca_helpers.h"
+
#include <asf.h>
+#include "twi.h"
+ + + + +

+Data Structures

struct  atcaI2Cmaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
+ + + +

+Macros

+#define MAX_I2C_BUSES   3
 
+ + + + +

+Typedefs

+typedef struct atcaI2Cmaster ATCAI2CMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
- - - - - - - - - - - - - - - - - - - - - -

Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
- - - + + +

-Variables

-struct port_config pin_conf
 
ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 

Detailed Description

-

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.

-

Prerequisite: add UART Polled support to application in Atmel Studio

+

ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.

+

Prerequisite: add SERCOM I2C Master Polled support to application in Atmel Studio

diff --git a/a00617.js b/a00617.js index 294dc1c87..54a9923e0 100644 --- a/a00617.js +++ b/a00617.js @@ -1,10 +1,5 @@ var a00617 = [ - [ "swi_uart_deinit", "a01446.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], - [ "swi_uart_discover_buses", "a01446.html#gad640b598d581ee7c8a4c804bee602906", null ], - [ "swi_uart_init", "a01446.html#ga003b63648f1a5f9eba274760559688f2", null ], - [ "swi_uart_mode", "a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], - [ "swi_uart_receive_byte", "a01446.html#ga93f3dab17c14f71641ca970998ede823", null ], - [ "swi_uart_send_byte", "a01446.html#ga4a4d491006d9683d67838963706ac9c1", null ], - [ "swi_uart_setbaud", "a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] + [ "ATCAI2CMaster_t", "a01473.html#ga06b19a932aea9cf3a5165fefacb24f7b", null ], + [ "change_i2c_speed", "a01473.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ] ]; \ No newline at end of file diff --git a/a00620.html b/a00620.html index a04cfcb28..033a3714b 100644 --- a/a00620.html +++ b/a00620.html @@ -5,7 +5,7 @@ -CryptoAuthLib: swi_uart_samd21_asf.h File Reference +CryptoAuthLib: hal_uc3_timer_asf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,89 +98,39 @@
-
swi_uart_samd21_asf.h File Reference
+
hal_uc3_timer_asf.c File Reference
-

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers. +

ATCA Hardware abstraction layer for SAM4S I2C over ASF drivers. More...

#include <asf.h>
-#include "cryptoauthlib.h"
+#include <delay.h>
+#include "atca_hal.h"
- - - - -

-Data Structures

struct  atcaSWImaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
- - - - - - - - - - - - - - - -

-Macros

#define MAX_SWI_BUSES   6
 
-#define RECEIVE_MODE   0
 
-#define TRANSMIT_MODE   1
 
-#define RX_DELAY   10
 
-#define TX_DELAY   90
 
-#define DEBUG_PIN_1   EXT2_PIN_5
 
-#define DEBUG_PIN_2   EXT2_PIN_6
 
- - - - -

-Typedefs

-typedef struct atcaSWImaster ATCASWIMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
- - - - - - - - - - - - - - - - - - - - - + + + + + + + + +

Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void atca_delay_10us (uint32_t delay)
 This function delays for a number of tens of microseconds.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 

Detailed Description

-

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.

-

Prerequisite: add UART Polled support to application in Atmel Studio

+

ATCA Hardware abstraction layer for SAM4S I2C over ASF drivers.

+

Prerequisite: add "Delay routines (service)" module to application in Atmel Studio

diff --git a/a00620.js b/a00620.js index 6f3b786ac..601aca0f9 100644 --- a/a00620.js +++ b/a00620.js @@ -1,12 +1,6 @@ var a00620 = [ - [ "MAX_SWI_BUSES", "a01446.html#gaf9d9d027ce20f528edea144203141714", null ], - [ "ATCASWIMaster_t", "a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff", null ], - [ "swi_uart_deinit", "a01446.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], - [ "swi_uart_discover_buses", "a01446.html#gad640b598d581ee7c8a4c804bee602906", null ], - [ "swi_uart_init", "a01446.html#ga003b63648f1a5f9eba274760559688f2", null ], - [ "swi_uart_mode", "a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], - [ "swi_uart_receive_byte", "a01446.html#ga93f3dab17c14f71641ca970998ede823", null ], - [ "swi_uart_send_byte", "a01446.html#ga4a4d491006d9683d67838963706ac9c1", null ], - [ "swi_uart_setbaud", "a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] + [ "atca_delay_10us", "a01473.html#ga19891182689551cc3a88603135959351", null ], + [ "atca_delay_ms", "a01473.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], + [ "atca_delay_us", "a01473.html#ga7598dfcd6dcac882836544d48356d02f", null ] ]; \ No newline at end of file diff --git a/a00623.html b/a00623.html index f8c148502..0029fad9e 100644 --- a/a00623.html +++ b/a00623.html @@ -5,7 +5,7 @@ -CryptoAuthLib: swi_uart_start.c File Reference +CryptoAuthLib: hal_windows.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,55 +98,51 @@
-
swi_uart_start.c File Reference
+
hal_windows.c File Reference
-
#include <stdlib.h>
-#include <stdio.h>
-#include <peripheral_clk_config.h>
-#include "swi_uart_start.h"
-#include "atca_helpers.h"
+ +

ATCA Hardware abstraction layer for windows timer functions. +More...

+
#include "atca_hal.h"
+#include <windows.h>
+#include <math.h>
- - - -

-Macros

-#define USART_BAUD_RATE(baud, sercom_freq)   (65536 - ((65536 * 16.0F * baud) / sercom_freq))
 
- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
void hal_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void hal_delay_ms (uint32_t delay)
 Timer API implemented at the HAL level.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
+ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
+ATCA_STATUS hal_lock_mutex (void *pMutex)
 
+ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
+ATCA_STATUS hal_check_pid (hal_pid_t pid)
 Check if the pid exists in the system.
 

Detailed Description

-
+

ATCA Hardware abstraction layer for windows timer functions.

+
diff --git a/a00623.js b/a00623.js index 0009b74e3..827e97b15 100644 --- a/a00623.js +++ b/a00623.js @@ -1,10 +1,7 @@ var a00623 = [ - [ "swi_uart_deinit", "a01446.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], - [ "swi_uart_discover_buses", "a01446.html#gad640b598d581ee7c8a4c804bee602906", null ], - [ "swi_uart_init", "a01446.html#ga003b63648f1a5f9eba274760559688f2", null ], - [ "swi_uart_mode", "a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], - [ "swi_uart_receive_byte", "a01446.html#ga93f3dab17c14f71641ca970998ede823", null ], - [ "swi_uart_send_byte", "a01446.html#ga4a4d491006d9683d67838963706ac9c1", null ], - [ "swi_uart_setbaud", "a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] + [ "hal_check_pid", "a01473.html#gae31246ac870409a3d694c240c6c3498a", null ], + [ "hal_create_mutex", "a01473.html#gaad9da28968a527ce51a2b081461d4cfe", null ], + [ "hal_delay_ms", "a01473.html#gadc23b8130e72a445f76c68d62e8c95c5", null ], + [ "hal_delay_us", "a01473.html#ga7e9019810ba5ab81b256282392cd5079", null ] ]; \ No newline at end of file diff --git a/a00626.html b/a00626.html index 09b7918bc..8f200a812 100644 --- a/a00626.html +++ b/a00626.html @@ -5,7 +5,7 @@ -CryptoAuthLib: swi_uart_start.h File Reference +CryptoAuthLib: hal_windows_kit_uart.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,78 +99,314 @@
-
swi_uart_start.h File Reference
+
hal_windows_kit_uart.c File Reference
-
#include <stdlib.h>
-#include "atmel_start.h"
-#include "cryptoauthlib.h"
+ +

ATCA Hardware abstraction layer for Windows using UART. +More...

+
#include "cryptoauthlib.h"
+#include "atca_hal.h"
+#include <windows.h>
+#include <stdio.h>
+#include <conio.h>
+#include <math.h>
+#include <string.h>
- - +

Data Structures

struct  atcaSWImaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
struct  atca_uart_host_s
 
- - - - - - - - - - - -

-Macros

#define MAX_SWI_BUSES   6
 
-#define RECEIVE_MODE   0
 
-#define TRANSMIT_MODE   1
 
-#define RX_DELAY   10
 
-#define TX_DELAY   93
 
- - - + +

Typedefs

-typedef struct atcaSWImaster ATCASWIMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
+typedef struct atca_uart_host_s atca_uart_host_t
 
- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
ATCA_STATUS hal_uart_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of UART init.
 
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
 HAL implementation of UART post init.
 
ATCA_STATUS hal_uart_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of UART send.
 
ATCA_STATUS hal_uart_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of UART receive function.
 
ATCA_STATUS hal_uart_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the UART.
 
ATCA_STATUS hal_uart_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 

Detailed Description

-
-
+

ATCA Hardware abstraction layer for Windows using UART.

+ +

Function Documentation

+ +

◆ hal_uart_control()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
+
+ +

Perform control operations for the UART.

+
Parameters
+ + + + + +
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_init()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
+
+ +

HAL implementation of UART init.

+

this implementation assumes UART SERIAL PORT peripheral has been enabled by user . It only initialize an UART interface using given config.

+
Parameters
+ + + +
[in]halpointer to HAL specific data that is maintained by this HAL
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_post_init()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_uart_post_init (ATCAIface iface)
+
+ +

HAL implementation of UART post init.

+
Parameters
+ + +
[in]ifaceinstance
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_receive()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
+
+ +

HAL implementation of UART receive function.

+
Parameters
+ + + + + +
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_release()

+ +
+
+ + + + + + + + +
ATCA_STATUS hal_uart_release (void * hal_data)
+
+ +

manages reference count on given bus and releases resource if no more refences exist

+
Parameters
+ + +
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ hal_uart_send()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS hal_uart_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
+
+ +

HAL implementation of UART send.

+
Parameters
+ + + + + + +
[in]ifaceinstance
[in]word_addresstransaction type
[in]txdatadata to be send to device
[in]txdatapointer to space to bytes to send
[in]lennumber of bytes to send
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+
diff --git a/a00626.js b/a00626.js index b32f6187d..ca79b8659 100644 --- a/a00626.js +++ b/a00626.js @@ -1,12 +1,10 @@ var a00626 = [ - [ "MAX_SWI_BUSES", "a01446.html#gaf9d9d027ce20f528edea144203141714", null ], - [ "ATCASWIMaster_t", "a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff", null ], - [ "swi_uart_deinit", "a01446.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], - [ "swi_uart_discover_buses", "a01446.html#gad640b598d581ee7c8a4c804bee602906", null ], - [ "swi_uart_init", "a01446.html#ga003b63648f1a5f9eba274760559688f2", null ], - [ "swi_uart_mode", "a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], - [ "swi_uart_receive_byte", "a01446.html#ga93f3dab17c14f71641ca970998ede823", null ], - [ "swi_uart_send_byte", "a01446.html#ga4a4d491006d9683d67838963706ac9c1", null ], - [ "swi_uart_setbaud", "a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] + [ "atca_uart_host_s", "a01695.html", null ], + [ "hal_uart_control", "a00626.html#a41ed83bbc8e0fd3abea7beb513fbdb96", null ], + [ "hal_uart_init", "a00626.html#afb6d836af248aed1afe715ae2f2f7c2b", null ], + [ "hal_uart_post_init", "a00626.html#a1c5f894db539ea5cb0d5ae0fa38449d7", null ], + [ "hal_uart_receive", "a00626.html#a1a0256b61c3579519f8cc6d6157bc126", null ], + [ "hal_uart_release", "a00626.html#a1e0c17bf7342c21ca69d066eefa1f1eb", null ], + [ "hal_uart_send", "a00626.html#aae0b332270c1e8df223b430d8e8ddbbc", null ] ]; \ No newline at end of file diff --git a/a00629.html b/a00629.html index afa0d046f..89a245ef8 100644 --- a/a00629.html +++ b/a00629.html @@ -5,7 +5,7 @@ -CryptoAuthLib: kit_protocol.c File Reference +CryptoAuthLib: kit_protocol.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,46 +100,79 @@ -
kit_protocol.c File Reference
+
kit_protocol.h File Reference
- -

Microchip Crypto Auth hardware interface object. -More...

-
#include <stdlib.h>
-#include <stdio.h>
-#include <limits.h>
-#include "atca_compiler.h"
-#include "kit_protocol.h"
-#include "atca_helpers.h"
+
#include "cryptoauthlib.h"
- - - - + + + + + +

Macros

-#define KIT_MAX_SCAN_COUNT   8
 
-#define KIT_MAX_TX_BUF   32
 
+#define KIT_TX_WRAP_SIZE   (10)
 
+#define KIT_MSG_SIZE   (32u)
 
+#define KIT_RX_WRAP_SIZE   (KIT_MSG_SIZE + 6u)
 
- + + + + + + + + + + + + + + + + + + + + + + + + + + + - + - +

Functions

const char * kit_id_from_devtype (ATCADeviceType devtype)
+ATCA_STATUS kit_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 
+ATCA_STATUS kit_post_init (ATCAIface iface)
 
+ATCA_STATUS kit_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 
+ATCA_STATUS kit_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxsize)
 
+ATCA_STATUS kit_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
+ATCA_STATUS kit_release (void *hal_data)
 
+ATCA_STATUS kit_wrap_cmd (ATCAIface iface, uint8_t word_address, const uint8_t *txdata, int txlen, char *pkitcmd, int *nkitcmd)
 
+ATCA_STATUS kit_parse_rsp (const char *pkitbuf, int nkitbuf, uint8_t *kitstatus, uint8_t *rxdata, int *datasize)
 
+ATCA_STATUS kit_wake (ATCAIface iface)
 
+ATCA_STATUS kit_idle (ATCAIface iface)
 
+ATCA_STATUS kit_sleep (ATCAIface iface)
 
+ATCA_STATUS kit_phy_send (ATCAIface iface, uint8_t *txdata, int txlength)
 
+ATCA_STATUS kit_phy_receive (ATCAIface iface, uint8_t *rxdata, int *rxsize)
 
const char * kit_id_from_devtype (ATCADeviceType devtype)
 
const char * kit_interface_from_kittype (ATCAKitType kittype)
const char * kit_interface_from_kittype (ATCAKitType kittype)
 
const char * kit_interface (ATCAKitType kittype)
const char * kit_interface (ATCAKitType kittype)
 

Detailed Description

-

Microchip Crypto Auth hardware interface object.

- +
diff --git a/a00629.js b/a00629.js index f84a98285..0581a4fa0 100644 --- a/a00629.js +++ b/a00629.js @@ -1,6 +1,6 @@ var a00629 = [ - [ "kit_id_from_devtype", "a01446.html#ga554072f32204a0eb8d7b8c7931e43343", null ], - [ "kit_interface", "a01446.html#ga33fe33933fb59dde6e6fb8975da6c12d", null ], - [ "kit_interface_from_kittype", "a01446.html#ga31075898964b61f4877ba882477b71c3", null ] + [ "kit_id_from_devtype", "a01473.html#ga554072f32204a0eb8d7b8c7931e43343", null ], + [ "kit_interface", "a01473.html#ga33fe33933fb59dde6e6fb8975da6c12d", null ], + [ "kit_interface_from_kittype", "a01473.html#ga31075898964b61f4877ba882477b71c3", null ] ]; \ No newline at end of file diff --git a/a00632.html b/a00632.html index 4d980b7b9..3009a2597 100644 --- a/a00632.html +++ b/a00632.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_host.c File Reference +CryptoAuthLib: swi_uart_samd21_asf.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,24 +97,60 @@
-
atca_host.c File Reference
+ +
swi_uart_samd21_asf.c File Reference
-

Host side methods to support CryptoAuth computations. +

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers. More...

-
#include "atca_host.h"
-#include "crypto/atca_crypto_sw_sha2.h"
-#include "cal_internal.h"
-

Detailed Description

-

Host side methods to support CryptoAuth computations.

+
#include <stdlib.h>
+#include <stdio.h>
+#include "swi_uart_samd21_asf.h"
+#include "atca_helpers.h"
+
+ + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
+ + + +

+Variables

+struct port_config pin_conf
 
+

Detailed Description

+

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.

+

Prerequisite: add UART Polled support to application in Atmel Studio

diff --git a/a00635.html b/a00635.html index e2bf20e89..a416f503d 100644 --- a/a00635.html +++ b/a00635.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_host.h File Reference +CryptoAuthLib: swi_uart_samd21_asf.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,326 +99,88 @@
-
atca_host.h File Reference
+
swi_uart_samd21_asf.h File Reference
-

Definitions and Prototypes for ATCA Utility Functions. +

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers. More...

-
#include <stdint.h>
-#include "cryptoauthlib.h"
-#include "calib/calib_basic.h"
-#include "atca_host_config_check.h"
+
#include <asf.h>
+#include "cryptoauthlib.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + +

Data Structures

struct  atca_temp_key
 Structure to hold TempKey fields. More...
 
struct  atca_include_data_in_out
 Input / output parameters for function atca_include_data(). More...
 
struct  atca_nonce_in_out
 Input/output parameters for function atca_nonce(). More...
 
struct  atca_io_decrypt_in_out
 
struct  atca_verify_mac
 
struct  atca_secureboot_enc_in_out
 
struct  atca_secureboot_mac_in_out
 
struct  atca_mac_in_out
 Input/output parameters for function atca_mac(). More...
 
struct  atca_hmac_in_out
 Input/output parameters for function atca_hmac(). More...
 
struct  atca_gen_dig_in_out
 Input/output parameters for function atcah_gen_dig(). More...
 
struct  atca_diversified_key_in_out
 Input/output parameters for function atcah_gendivkey(). More...
 
struct  atca_write_mac_in_out
 Input/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac(). More...
 
struct  atca_derive_key_in_out
 Input/output parameters for function atcah_derive_key(). More...
 
struct  atca_derive_key_mac_in_out
 Input/output parameters for function atcah_derive_key_mac(). More...
 
struct  atca_decrypt_in_out
 Input/output parameters for function atca_decrypt(). More...
 
struct  atca_check_mac_in_out
 Input/output parameters for function atcah_check_mac(). More...
 
struct  atca_resp_mac_in_out
 Input/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function. More...
 
struct  atca_verify_in_out
 Input/output parameters for function atcah_verify(). More...
 
struct  atca_gen_key_in_out
 Input/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function. More...
 
struct  atca_sign_internal_in_out
 Input/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function. More...
 
struct  atca_session_key_in_out
 Input/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function. More...
 
struct  atca_delete_in_out
 Input/Output paramters for calculating the mac.Used with Delete command. More...
struct  atcaSWImaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + +

Macros

Definitions for ATECC Message Sizes to Calculate a SHA256 Hash

"||" is the concatenation operator. The number in braces is the length of the hash input value in bytes.

-
-#define ATCA_MSG_SIZE_NONCE   (55)
 RandOut{32} || NumIn{20} || OpCode{1} || Mode{1} || LSB of Param2{1}.
 
-#define ATCA_MSG_SIZE_MAC   (88)
 (Key or TempKey){32} || (Challenge or TempKey){32} || OpCode{1} || Mode{1} || Param2{2} || (OTP0_7 or 0){8} || (OTP8_10 or 0){3} || SN8{1} || (SN4_7 or 0){4} || SN0_1{2} || (SN2_3 or 0){2}
 
-#define ATCA_MSG_SIZE_HMAC   (88u)
 
-#define ATCA_MSG_SIZE_GEN_DIG   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2} || 0{25} || TempKey{32}.
 
-#define ATCA_MSG_SIZE_DIVERSIFIED_KEY   (96)
 ParentKey{32} || OtherData{4} || SN8{1} || SN0_1{2} || 0{25} || InputData{32}.
 
-#define ATCA_MSG_SIZE_DERIVE_KEY   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2} || 0{25} || TempKey{32}.
 
-#define ATCA_MSG_SIZE_DERIVE_KEY_MAC   (39)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2}.
 
-#define ATCA_MSG_SIZE_ENCRYPT_MAC   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2}|| SN8{1} || SN0_1{2} || 0{25} || TempKey{32}.
 
-#define ATCA_MSG_SIZE_SESSION_KEY   (96)
 TransportKey{32} || 0x15{1} || 0x00{1} || KeyId{2} || SN8{1} || SN0_1{2} || 0{25} || Nonce{32}.
 
-#define ATCA_MSG_SIZE_DELETE_MAC   (96)
 Hmac/SecretKey{32} || 0x13{1} || 0x00{1} || 0x0000{2} || SN8{1} || SN0_1{2} || 0{25} || Nonce{32}.
 
-#define ATCA_MSG_SIZE_RESPONSE_MAC   (97)
 SlotKey{32} || Opcode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2} || 0{25} || client_Resp{32} || checkmac_result{1}.
 
-#define ATCA_MSG_SIZE_PRIVWRITE_MAC   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2}|| SN8{1} || SN0_1{2} || 0{21} || PlainText{36}.
 
-#define ATCA_COMMAND_HEADER_SIZE   ( 4)
 
-#define ATCA_GENDIG_ZEROS_SIZE   (25)
 
-#define ATCA_GENDIVKEY_ZEROS_SIZE   (25)
 
-#define ATCA_WRITE_MAC_ZEROS_SIZE   (25)
 
-#define ATCA_DELETE_MAC_ZEROS_SIZE   (25)
 
-#define ATCA_RESP_MAC_ZEROS_SIZE   (25)
 
-#define ATCA_PRIVWRITE_MAC_ZEROS_SIZE   (21)
 
-#define ATCA_PRIVWRITE_PLAIN_TEXT_SIZE   (36)
 
-#define ATCA_DERIVE_KEY_ZEROS_SIZE   (25)
 
-#define ATCA_HMAC_BLOCK_SIZE   (64u)
 
-#define ATCA_ENCRYPTION_KEY_SIZE   (64)
 
Definition for TempKey Mode
-#define MAC_MODE_USE_TEMPKEY_MASK   ((uint8_t)0x03)
 mode mask for MAC command when using TempKey
 
#define MAX_SWI_BUSES   6
 
+#define RECEIVE_MODE   0
 
+#define TRANSMIT_MODE   1
 
+#define RX_DELAY   10
 
+#define TX_DELAY   90
 
+#define DEBUG_PIN_1   EXT2_PIN_5
 
+#define DEBUG_PIN_2   EXT2_PIN_6
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + +

Typedefs

-typedef struct atca_temp_key atca_temp_key_t
 Structure to hold TempKey fields.
 
-typedef struct atca_nonce_in_out atca_nonce_in_out_t
 
-typedef struct atca_io_decrypt_in_out atca_io_decrypt_in_out_t
 
-typedef struct atca_verify_mac atca_verify_mac_in_out_t
 
-typedef struct atca_secureboot_enc_in_out atca_secureboot_enc_in_out_t
 
-typedef struct atca_secureboot_mac_in_out atca_secureboot_mac_in_out_t
 
-typedef struct atca_mac_in_out atca_mac_in_out_t
 
-typedef struct atca_gen_dig_in_out atca_gen_dig_in_out_t
 Input/output parameters for function atcah_gen_dig().
 
-typedef struct atca_diversified_key_in_out atca_diversified_key_in_out_t
 Input/output parameters for function atcah_gendivkey().
 
-typedef struct atca_write_mac_in_out atca_write_mac_in_out_t
 Input/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac().
 
-typedef struct atca_check_mac_in_out atca_check_mac_in_out_t
 Input/output parameters for function atcah_check_mac().
 
-typedef struct atca_resp_mac_in_out atca_resp_mac_in_out_t
 Input/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function.
 
-typedef struct atca_verify_in_out atca_verify_in_out_t
 
-typedef struct atca_gen_key_in_out atca_gen_key_in_out_t
 Input/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function.
 
-typedef struct atca_sign_internal_in_out atca_sign_internal_in_out_t
 Input/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function.
 
-typedef struct atca_session_key_in_out atca_session_key_in_out_t
 Input/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function.
 
-typedef struct atca_delete_in_out atca_delete_in_out_t
 Input/Output paramters for calculating the mac.Used with Delete command.
 
+typedef struct atcaSWImaster ATCASWIMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + +

Functions

-ATCA_STATUS atcah_nonce (struct atca_nonce_in_out *param)
 
-ATCA_STATUS atcah_mac (struct atca_mac_in_out *param)
 
-ATCA_STATUS atcah_check_mac (struct atca_check_mac_in_out *param)
 
-ATCA_STATUS atcah_hmac (struct atca_hmac_in_out *param)
 
-ATCA_STATUS atcah_gen_dig (struct atca_gen_dig_in_out *param)
 
-ATCA_STATUS atcah_gendivkey (struct atca_diversified_key_in_out *param)
 
-ATCA_STATUS atcah_gen_mac (struct atca_gen_dig_in_out *param)
 
-ATCA_STATUS atcah_write_auth_mac (struct atca_write_mac_in_out *param)
 
-ATCA_STATUS atcah_privwrite_auth_mac (struct atca_write_mac_in_out *param)
 
-ATCA_STATUS atcah_derive_key (struct atca_derive_key_in_out *param)
 
-ATCA_STATUS atcah_derive_key_mac (struct atca_derive_key_mac_in_out *param)
 
-ATCA_STATUS atcah_decrypt (struct atca_decrypt_in_out *param)
 
-ATCA_STATUS atcah_sha256 (uint32_t len, const uint8_t *message, uint8_t *digest)
 
-uint8_t * atcah_include_data (struct atca_include_data_in_out *param)
 
-ATCA_STATUS atcah_gen_key_msg (struct atca_gen_key_in_out *param)
 
-ATCA_STATUS atcah_config_to_sign_internal (ATCADeviceType device_type, struct atca_sign_internal_in_out *param, const uint8_t *config)
 
-ATCA_STATUS atcah_sign_internal_msg (ATCADeviceType device_type, struct atca_sign_internal_in_out *param)
 
-ATCA_STATUS atcah_verify_mac (atca_verify_mac_in_out_t *param)
 
-ATCA_STATUS atcah_secureboot_enc (atca_secureboot_enc_in_out_t *param)
 
-ATCA_STATUS atcah_secureboot_mac (atca_secureboot_mac_in_out_t *param)
 
-ATCA_STATUS atcah_encode_counter_match (uint32_t counter_value, uint8_t *counter_match_value)
 
-ATCA_STATUS atcah_io_decrypt (struct atca_io_decrypt_in_out *param)
 
-ATCA_STATUS atcah_ecc204_write_auth_mac (struct atca_write_mac_in_out *param)
 
-ATCA_STATUS atcah_gen_session_key (atca_session_key_in_out_t *param)
 
-ATCA_STATUS atcah_gen_output_resp_mac (struct atca_resp_mac_in_out *param)
 
ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 

Detailed Description

-

Definitions and Prototypes for ATCA Utility Functions.

+

ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.

+

Prerequisite: add UART Polled support to application in Atmel Studio

diff --git a/a00635.js b/a00635.js index fbdfc1133..353b7d89a 100644 --- a/a00635.js +++ b/a00635.js @@ -1,25 +1,12 @@ var a00635 = [ - [ "ATCA_MSG_SIZE_DELETE_MAC", "a01447.html#ga15a78dd66644866b65cd5eda8b1a30d0", null ], - [ "ATCA_MSG_SIZE_DERIVE_KEY", "a01447.html#ga1f445a11e4da099fec31efd43eadc234", null ], - [ "ATCA_MSG_SIZE_DERIVE_KEY_MAC", "a01447.html#ga4ef7d31c60616cf5177f415e32607d10", null ], - [ "ATCA_MSG_SIZE_DIVERSIFIED_KEY", "a01447.html#gab2891a03e978d463823775bc1161a06e", null ], - [ "ATCA_MSG_SIZE_ENCRYPT_MAC", "a01447.html#gafd8064c07a5f22cdb087c88e1b87c1be", null ], - [ "ATCA_MSG_SIZE_GEN_DIG", "a01447.html#ga656372cab66beeb5a333e9a33e342017", null ], - [ "ATCA_MSG_SIZE_MAC", "a01447.html#ga2b5993f5b7254d8c6e50794824cf47b6", null ], - [ "ATCA_MSG_SIZE_NONCE", "a01447.html#gaebdc2d83274268bb48fc45e87aef38af", null ], - [ "ATCA_MSG_SIZE_PRIVWRITE_MAC", "a01447.html#ga1039bfbe7e13d614814341bdee6afa7b", null ], - [ "ATCA_MSG_SIZE_RESPONSE_MAC", "a01447.html#ga6d3a4804abc8a467154d5abd744c0cea", null ], - [ "ATCA_MSG_SIZE_SESSION_KEY", "a01447.html#ga56b92d82ffddbd86c99107b12043f8db", null ], - [ "MAC_MODE_USE_TEMPKEY_MASK", "a01447.html#ga05323075c94849bf70e84f5a5931f058", null ], - [ "atca_check_mac_in_out_t", "a01447.html#ga62321bafeb0a9dd7c4ce657ece10109f", null ], - [ "atca_delete_in_out_t", "a01447.html#ga4ea861d041b787c766e9a19a0f11421c", null ], - [ "atca_diversified_key_in_out_t", "a01447.html#gae9784404fbe619217879d5d12261c2b8", null ], - [ "atca_gen_dig_in_out_t", "a01447.html#ga572abeaaabf22c386ebcba19b4f6236c", null ], - [ "atca_gen_key_in_out_t", "a01447.html#gada8cf14261301ec18458cbcbbe3d9b32", null ], - [ "atca_resp_mac_in_out_t", "a01447.html#gad2bbb95a1e12c8167ce68884dcf77a4e", null ], - [ "atca_session_key_in_out_t", "a01447.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e", null ], - [ "atca_sign_internal_in_out_t", "a01447.html#ga1fdcaf886974acc1fcdfc3bace49b700", null ], - [ "atca_temp_key_t", "a01447.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe", null ], - [ "atca_write_mac_in_out_t", "a01447.html#gac077314e00956519884e609b44b9cbce", null ] + [ "MAX_SWI_BUSES", "a01473.html#gaf9d9d027ce20f528edea144203141714", null ], + [ "ATCASWIMaster_t", "a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff", null ], + [ "swi_uart_deinit", "a01473.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], + [ "swi_uart_discover_buses", "a01473.html#gad640b598d581ee7c8a4c804bee602906", null ], + [ "swi_uart_init", "a01473.html#ga003b63648f1a5f9eba274760559688f2", null ], + [ "swi_uart_mode", "a01473.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], + [ "swi_uart_receive_byte", "a01473.html#ga93f3dab17c14f71641ca970998ede823", null ], + [ "swi_uart_send_byte", "a01473.html#ga4a4d491006d9683d67838963706ac9c1", null ], + [ "swi_uart_setbaud", "a01473.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] ]; \ No newline at end of file diff --git a/a00638.html b/a00638.html index cfadb86eb..a4704e6be 100644 --- a/a00638.html +++ b/a00638.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_host_config_check.h File Reference +CryptoAuthLib: swi_uart_start.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,505 +98,55 @@
-
atca_host_config_check.h File Reference
+Macros | +Functions
+
swi_uart_start.c File Reference
- -

Consistency checks for configuration options. -More...

- +
#include <stdlib.h>
+#include <stdio.h>
+#include <peripheral_clk_config.h>
+#include "swi_uart_start.h"
+#include "atca_helpers.h"
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + +

Macros

#define ATCAH_INCLUDE_DATA   (DEFAULT_ENABLED)
 
#define ATCAH_NONCE   (DEFAULT_ENABLED)
 
#define ATCAH_IO_DECRYPT   (DEFAULT_ENABLED)
 
#define ATCAH_VERIFY_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_SECUREBOOT_ENC   (DEFAULT_ENABLED)
 
#define ATCAH_SECUREBOOT_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_CHECK_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_OUTPUT_RESP_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_HMAC   (DEFAULT_ENABLED)
 
#define ATCAH_GENDIG   (DEFAULT_ENABLED)
 
#define ATCAH_GENDIVKEY   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_WRITE_AUTH_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_PRIVWRITE_AUTH_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_DERIVE_KEY   (DEFAULT_ENABLED)
 
#define ATCAH_DERIVE_KEY_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_DECRYPT   (DEFAULT_ENABLED)
 
#define ATCAH_SHA256   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_KEY_MSG   (DEFAULT_ENABLED)
 
#define ATCAH_CONFIG_TO_SIGN_INTERNAL   (DEFAULT_ENABLED)
 
#define ATCAH_SIGN_INTERNAL_MSG   (DEFAULT_ENABLED)
 
#define ATCAH_ENCODE_COUNTER_MATCH   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_SESSION_KEY   (DEFAULT_ENABLED)
 
#define ATCAH_DELETE_MAC   (CALIB_DELETE_EN)
 
-#define ATCAC_SW_SHA2_256   (DEFAULT_ENABLED)
 
+#define USART_BAUD_RATE(baud, sercom_freq)   (65536 - ((65536 * 16.0F * baud) / sercom_freq))
 
+ + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 

Detailed Description

-

Consistency checks for configuration options.

- -

Macro Definition Documentation

- -

◆ ATCAH_CHECK_MAC

- -
-
- - - - -
#define ATCAH_CHECK_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_CHECK_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_check_mac

-

Enable ATCAH_CHECK_MAC to perform the checkmac operation to generate client response on the host side

- -
-
- -

◆ ATCAH_CONFIG_TO_SIGN_INTERNAL

- -
-
- - - - -
#define ATCAH_CONFIG_TO_SIGN_INTERNAL   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_CONFIG_TO_SIGN_INTERNAL

-

Supported API's: atcah_config_to_sign_internal

-

Enable ATCAH_CONFIG_TO_SIGN_INTERNAL to populate the slot_config, key_config, and is_slot_locked fields in the atca_sign_internal_in_out structure from the provided config zone

- -
-
- -

◆ ATCAH_DECRYPT

- -
-
- - - - -
#define ATCAH_DECRYPT   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_DECRYPT

-

Supported API's: atcah_decrypt

-

Enable ATCAH_DECRYPT to decrypt 32-byte encrypted data received with the Read command

- -
-
- -

◆ ATCAH_DELETE_MAC

- -
-
- - - - -
#define ATCAH_DELETE_MAC   (CALIB_DELETE_EN)
-
-

Requires: ATCAH_DELETE_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_delete_mac

-

Enable ATCAH_DELETE_MAC to calculate the mac

- -
-
- -

◆ ATCAH_DERIVE_KEY

- -
-
- - - - -
#define ATCAH_DERIVE_KEY   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_DERIVE_KEY ATCAC_SW_SHA2_256

-

Supported API's: atcah_derive_key

-

Enable ATCAH_DERIVE_KEY to derive a key with a key and TempKey

- -
-
- -

◆ ATCAH_DERIVE_KEY_MAC

- -
-
- - - - -
#define ATCAH_DERIVE_KEY_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_DERIVE_KEY_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_derive_key_mac

-

Enable ATCAH_DERIVE_KEY_MAC to calculate the input MAC for a DeriveKey command

- -
-
- -

◆ ATCAH_ENCODE_COUNTER_MATCH

- -
-
- - - - -
#define ATCAH_ENCODE_COUNTER_MATCH   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_ENCODE_COUNTER_MATCH

-

Supported API's: atcah_encode_counter_match

-

Enable ATCAH_ENCODE_COUNTER_MATCH to build the counter match value that needs to be stored in a slot

- -
-
- -

◆ ATCAH_GEN_KEY_MSG

- -
-
- - - - -
#define ATCAH_GEN_KEY_MSG   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_SHA256 ATCAC_SW_SHA2_256

-

Supported API's: atcah_gen_key_msg

-

Enable ATCAH_GEN_KEY_MSG to calculate the PubKey digest created by GenKey and saved to TempKey

- -
-
- -

◆ ATCAH_GEN_MAC

- -
-
- - - - -
#define ATCAH_GEN_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_GEN_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_gen_mac

-

Enable ATCAH_GEN_MAC to generate mac with session key with a plain text

- -
-
- -

◆ ATCAH_GEN_OUTPUT_RESP_MAC

- -
-
- - - - -
#define ATCAH_GEN_OUTPUT_RESP_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_GEN_OUTPUT_RESP_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_gen_output_resp_mac

-

Enable ATCAH_GEN_OUTPUT_RESP_MAC to generate output response mac

- -
-
- -

◆ ATCAH_GEN_SESSION_KEY

- -
-
- - - - -
#define ATCAH_GEN_SESSION_KEY   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_GEN_SESSION_KEY ATCAC_SW_SHA2_256

-

Supported API's: atcah_gen_Session_key

-

Enable ATCAH_GEN_SESSION_KEY to calculate the session key for the ECC204

- -
-
- -

◆ ATCAH_GENDIG

- -
-
- - - - -
#define ATCAH_GENDIG   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_GENDIG ATCAC_SW_SHA2_256

-

Supported API's: atcah_gen_dig

-

Enable ATCAH_GENDIG to combine the current TempKey with a stored value

- -
-
- -

◆ ATCAH_GENDIVKEY

- -
-
- - - - -
#define ATCAH_GENDIVKEY   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_GENDIVKEY ATCAC_SW_SHA2_256

-

Supported API's: atcah_gendivkey

-

Enable ATCAH_GENDIVKEY to generate the diversified key

- -
-
- -

◆ ATCAH_HMAC

- -
-
- - - - -
#define ATCAH_HMAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_HMAC ATCAC_SW_SHA2_256 ATCAH_INCLUDE_DATA

-

Supported API's: atcah_hmac

-

Enable ATCAH_HMAC to generate an HMAC / SHA-256 hash of a key and other information

- -
-
- -

◆ ATCAH_INCLUDE_DATA

- -
-
- - - - -
#define ATCAH_INCLUDE_DATA   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_INCLUDE_DATA

-

Supported API's: atcah_include_data

-

Enable ATCAH_INCLUDE_DATA to copy otp and sn data into a command buffer

- -
-
- -

◆ ATCAH_IO_DECRYPT

- -
-
- - - - -
#define ATCAH_IO_DECRYPT   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_IO_DECRYPT ATCAC_SW_SHA2_256

-

Supported API's: atcah_io_decrypt

-

Enable ATCAH_IO_DECRYPT to decrypt data that's been encrypted by the IO protection key.The ECDH and KDF commands on the ATECC608 are the only ones that support this operation

- -
-
- -

◆ ATCAH_MAC

- -
-
- - - - -
#define ATCAH_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_MAC ATCAC_SW_SHA2_256 ATCAH_INCLUDE_DATA

-

Supported API's: atcah_mac

-

Enable ATCAH_MAC to generate an SHA-256 digest (MAC) of a key, challenge, and other information

- -
-
- -

◆ ATCAH_NONCE

- -
-
- - - - -
#define ATCAH_NONCE   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_NONCE ATCAC_SW_SHA2_256

-

Supported API's: atcah_nonce

-

Enable ATCAH_NONCE to calculate host side nonce with the parameters passed

- -
-
- -

◆ ATCAH_PRIVWRITE_AUTH_MAC

- -
-
- - - - -
#define ATCAH_PRIVWRITE_AUTH_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_PRIVWRITE_AUTH_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_privwrite_auth_mac

-

Enable ATCAH_PRIVWRITE_AUTH_MAC to calculate the input MAC for the PrivWrite command

- -
-
- -

◆ ATCAH_SECUREBOOT_ENC

- -
-
- - - - -
#define ATCAH_SECUREBOOT_ENC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_SECUREBOOT_ENC ATCAC_SW_SHA2_256

-

Supported API's: atcah_secureboot_enc

-

Enable ATCAH_SECUREBOOT_ENC to encrypt the digest for the SecureBoot command when using the encrypted digest / validating mac option

- -
-
- -

◆ ATCAH_SECUREBOOT_MAC

- -
-
- - - - -
#define ATCAH_SECUREBOOT_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_SECUREBOOT_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_secureboot_mac

-

Enable ATCAH_SECUREBOOT_MAC to calculates the expected MAC returned from the SecureBoot command when verification is a success

- -
-
- -

◆ ATCAH_SHA256

- -
-
- - - - -
#define ATCAH_SHA256   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_SHA256 ATCAC_SW_SHA2_256

-

Supported API's: atcah_sha256

-

Enable ATCAH_SHA256 to create a SHA256 digest on a little-endian system

- -
-
- -

◆ ATCAH_SIGN_INTERNAL_MSG

- -
-
- - - - -
#define ATCAH_SIGN_INTERNAL_MSG   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_SIGN_INTERNAL_MSG ATCAC_SW_SHA2_256

-

Supported API's: atcah_sign_internal_msg

-

Enable ATCAH_SIGN_INTERNAL_MSG to build the full message that would be signed by the Sign(Internal) command

- -
-
- -

◆ ATCAH_VERIFY_MAC

- -
-
- - - - -
#define ATCAH_VERIFY_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_VERIFY_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_verify_mac

-

Enable ATCAH_VERIFY_MAC to calculate the expected MAC on the host side for the Verify command

- -
-
- -

◆ ATCAH_WRITE_AUTH_MAC

- -
-
- - - - -
#define ATCAH_WRITE_AUTH_MAC   (DEFAULT_ENABLED)
-
-

Requires: ATCAH_WRITE_AUTH_MAC ATCAC_SW_SHA2_256

-

Supported API's: atcah_write_auth_mac ECC204 specific API's: atcah_ecc204_write_auth_mac

-

Enable ATCAH_WRITE_AUTH_MAC to calculate the input MAC for the Write command

- -
-
-
+
+
diff --git a/a00638.js b/a00638.js index c8677ef01..8dfa6a9d0 100644 --- a/a00638.js +++ b/a00638.js @@ -1,28 +1,10 @@ var a00638 = [ - [ "ATCAH_CHECK_MAC", "a00638.html#a063f7ad7678d60de756ef8526b9dfea1", null ], - [ "ATCAH_CONFIG_TO_SIGN_INTERNAL", "a00638.html#ae427973632a62dfd8f35709c21993190", null ], - [ "ATCAH_DECRYPT", "a00638.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b", null ], - [ "ATCAH_DELETE_MAC", "a00638.html#acd2c32968024ddc7c650102a5076d70b", null ], - [ "ATCAH_DERIVE_KEY", "a00638.html#ada4b87726e822b6e94dcc18eefc39049", null ], - [ "ATCAH_DERIVE_KEY_MAC", "a00638.html#a22a85235261861839a0db05649999ef5", null ], - [ "ATCAH_ENCODE_COUNTER_MATCH", "a00638.html#a2ecb26546b49e369aeaf86bccf10a2e9", null ], - [ "ATCAH_GEN_KEY_MSG", "a00638.html#a371384b4f8d818c31dee337aa4e24403", null ], - [ "ATCAH_GEN_MAC", "a00638.html#a0f0e6c501c2dc57b4ed68fe29780b062", null ], - [ "ATCAH_GEN_OUTPUT_RESP_MAC", "a00638.html#a70d0b80d637281693321866bd3c2735f", null ], - [ "ATCAH_GEN_SESSION_KEY", "a00638.html#aa5220706535f7367e06aa2aadebc0b57", null ], - [ "ATCAH_GENDIG", "a00638.html#aec5752be28ebfd8dc506bda7c36b9f7d", null ], - [ "ATCAH_GENDIVKEY", "a00638.html#af25240ee5ff347e1cf2768bfd513345f", null ], - [ "ATCAH_HMAC", "a00638.html#a6a86a40deff31dbaf005519aba627991", null ], - [ "ATCAH_INCLUDE_DATA", "a00638.html#a6442329f443943bbc8f3e10dde67930d", null ], - [ "ATCAH_IO_DECRYPT", "a00638.html#ae58a45ab173bf9ca7c4cdf4768fcf00e", null ], - [ "ATCAH_MAC", "a00638.html#a33ac8a876197c7774452b7b46411f188", null ], - [ "ATCAH_NONCE", "a00638.html#a879c87175b07e859a15320e199a104a6", null ], - [ "ATCAH_PRIVWRITE_AUTH_MAC", "a00638.html#a13ed9a07ad5f74cfb67b7582c1b638a3", null ], - [ "ATCAH_SECUREBOOT_ENC", "a00638.html#a745b85254a910c7d8edbea41ab927cf4", null ], - [ "ATCAH_SECUREBOOT_MAC", "a00638.html#aa1d0ffc3e79f52154b2e362b74b7b112", null ], - [ "ATCAH_SHA256", "a00638.html#a58d2f9f20485ae35c2208f3bce5cb4a7", null ], - [ "ATCAH_SIGN_INTERNAL_MSG", "a00638.html#ad2e1b57a0f8a5dc87427b1eca18ac02f", null ], - [ "ATCAH_VERIFY_MAC", "a00638.html#a1515a97abca19263c1cf16dcbdd01944", null ], - [ "ATCAH_WRITE_AUTH_MAC", "a00638.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0", null ] + [ "swi_uart_deinit", "a01473.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], + [ "swi_uart_discover_buses", "a01473.html#gad640b598d581ee7c8a4c804bee602906", null ], + [ "swi_uart_init", "a01473.html#ga003b63648f1a5f9eba274760559688f2", null ], + [ "swi_uart_mode", "a01473.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], + [ "swi_uart_receive_byte", "a01473.html#ga93f3dab17c14f71641ca970998ede823", null ], + [ "swi_uart_send_byte", "a01473.html#ga4a4d491006d9683d67838963706ac9c1", null ], + [ "swi_uart_setbaud", "a01473.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] ]; \ No newline at end of file diff --git a/a00641.html b/a00641.html index f4d11e6b3..435f70800 100644 --- a/a00641.html +++ b/a00641.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_jwt.c File Reference +CryptoAuthLib: swi_uart_start.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,26 +97,80 @@
-
atca_jwt.c File Reference
+ +
swi_uart_start.h File Reference
- -

Utilities to create and verify a JSON Web Token (JWT) -More...

-
#include "cryptoauthlib.h"
-#include "atca_helpers.h"
-#include "crypto/atca_crypto_sw_sha2.h"
-#include "jwt/atca_jwt.h"
-#include <stdio.h>
-

Detailed Description

-

Utilities to create and verify a JSON Web Token (JWT)

- +
#include <stdlib.h>
+#include "atmel_start.h"
+#include "cryptoauthlib.h"
+
+ + + + +

+Data Structures

struct  atcaSWImaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
+ + + + + + + + + + + +

+Macros

#define MAX_SWI_BUSES   6
 
+#define RECEIVE_MODE   0
 
+#define TRANSMIT_MODE   1
 
+#define RX_DELAY   10
 
+#define TX_DELAY   93
 
+ + + + +

+Typedefs

+typedef struct atcaSWImaster ATCASWIMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
+ + + + + + + + + + + + + + + + + + + + + + +

+Functions

ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
+

Detailed Description

+
diff --git a/a00644.html b/a00644.html index 5121d28d6..d66fe1ce0 100644 --- a/a00644.html +++ b/a00644.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_jwt.h File Reference +CryptoAuthLib: kit_protocol.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,22 +97,49 @@
-
atca_jwt.h File Reference
+ +
kit_protocol.c File Reference
-

Utilities to create and verify a JSON Web Token (JWT) +

Microchip Crypto Auth hardware interface object. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

Utilities to create and verify a JSON Web Token (JWT)

+
#include <stdlib.h>
+#include <stdio.h>
+#include <limits.h>
+#include "atca_compiler.h"
+#include "kit_protocol.h"
+#include "atca_helpers.h"
+
+ + + + + +

+Macros

+#define KIT_MAX_SCAN_COUNT   8
 
+#define KIT_MAX_TX_BUF   32
 
+ + + + + + + +

+Functions

const char * kit_id_from_devtype (ATCADeviceType devtype)
 
const char * kit_interface_from_kittype (ATCAKitType kittype)
 
const char * kit_interface (ATCAKitType kittype)
 
+

Detailed Description

+

Microchip Crypto Auth hardware interface object.

diff --git a/a00653.html b/a00653.html index dc6a1f2b7..6fe8cccd6 100644 --- a/a00653.html +++ b/a00653.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_mbedtls_interface.h File Reference +CryptoAuthLib: atca_host_config_check.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,134 +98,496 @@
-
atca_mbedtls_interface.h File Reference
+Macros
+
atca_host_config_check.h File Reference
-

Configuration Check for MbedTLS Integration Support. +

Consistency checks for configuration options. More...

-
#include "atca_config_check.h"
-
- - - -

-Data Structures

struct  atcac_x509_ctx
 
+
- - - - - - - - - - - - -

Macros

#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
 
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
 
#define ATCAC_AES_CMAC_EN   (DEFAULT_ENABLED)
 
#define ATCAC_AES_GCM_EN   (DEFAULT_ENABLED)
 
#define ATCAC_PKEY_EN   (DEFAULT_ENABLED)
 
#define HOSTLIB_CERT_EN   (DEFAULT_ENABLED)
 
- - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Typedefs

-typedef struct atcac_x509_ctx atcac_x509_ctx_t
 
#define ATCAH_INCLUDE_DATA   (DEFAULT_ENABLED)
 
#define ATCAH_NONCE   (DEFAULT_ENABLED)
 
#define ATCAH_IO_DECRYPT   (DEFAULT_ENABLED)
 
#define ATCAH_VERIFY_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_SECUREBOOT_ENC   (DEFAULT_ENABLED)
 
#define ATCAH_SECUREBOOT_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_CHECK_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_OUTPUT_RESP_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_HMAC   (DEFAULT_ENABLED)
 
#define ATCAH_GENDIG   (DEFAULT_ENABLED)
 
#define ATCAH_GENDIVKEY   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_WRITE_AUTH_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_PRIVWRITE_AUTH_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_DERIVE_KEY   (DEFAULT_ENABLED)
 
#define ATCAH_DERIVE_KEY_MAC   (DEFAULT_ENABLED)
 
#define ATCAH_DECRYPT   (DEFAULT_ENABLED)
 
#define ATCAH_SHA256   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_KEY_MSG   (DEFAULT_ENABLED)
 
#define ATCAH_CONFIG_TO_SIGN_INTERNAL   (DEFAULT_ENABLED)
 
#define ATCAH_SIGN_INTERNAL_MSG   (DEFAULT_ENABLED)
 
#define ATCAH_ENCODE_COUNTER_MATCH   (DEFAULT_ENABLED)
 
#define ATCAH_GEN_SESSION_KEY   (DEFAULT_ENABLED)
 
#define ATCAH_DELETE_MAC   (CALIB_DELETE_EN)
 
+#define ATCAC_SW_SHA2_256   (DEFAULT_ENABLED)
 

Detailed Description

-

Configuration Check for MbedTLS Integration Support.

- +

Consistency checks for configuration options.

+

Macro Definition Documentation

- -

◆ ATCAC_AES_CMAC_EN

+ +

◆ ATCAH_CHECK_MAC

- +
#define ATCAC_AES_CMAC_EN   (DEFAULT_ENABLED)#define ATCAH_CHECK_MAC   (DEFAULT_ENABLED)
-

Indicates if this module is a provider of an AES-CMAC implementation

+

Requires: ATCAH_CHECK_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_check_mac

+

Enable ATCAH_CHECK_MAC to perform the checkmac operation to generate client response on the host side

- -

◆ ATCAC_AES_GCM_EN

+ +

◆ ATCAH_CONFIG_TO_SIGN_INTERNAL

- +
#define ATCAC_AES_GCM_EN   (DEFAULT_ENABLED)#define ATCAH_CONFIG_TO_SIGN_INTERNAL   (DEFAULT_ENABLED)
-

Indicates if this module is a provider of an AES-GCM implementation

+

Requires: ATCAH_CONFIG_TO_SIGN_INTERNAL

+

Supported API's: atcah_config_to_sign_internal

+

Enable ATCAH_CONFIG_TO_SIGN_INTERNAL to populate the slot_config, key_config, and is_slot_locked fields in the atca_sign_internal_in_out structure from the provided config zone

- -

◆ ATCAC_PKEY_EN

+ +

◆ ATCAH_DECRYPT

- +
#define ATCAC_PKEY_EN   (DEFAULT_ENABLED)#define ATCAH_DECRYPT   (DEFAULT_ENABLED)
-

Indicates if this module is a provider of a generic asymmetric cryptography implementation

+

Requires: ATCAH_DECRYPT

+

Supported API's: atcah_decrypt

+

Enable ATCAH_DECRYPT to decrypt 32-byte encrypted data received with the Read command

- -

◆ ATCAC_SHA1_EN

+ +

◆ ATCAH_DELETE_MAC

- +
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)#define ATCAH_DELETE_MAC   (CALIB_DELETE_EN)
-

Indicates if this module is a provider of a SHA1 implementation

+

Requires: ATCAH_DELETE_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_delete_mac

+

Enable ATCAH_DELETE_MAC to calculate the mac

- -

◆ ATCAC_SHA256_EN

+ +

◆ ATCAH_DERIVE_KEY

- +
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)#define ATCAH_DERIVE_KEY   (DEFAULT_ENABLED)
-

Indicates if this module is a provider of a SHA256 implementation

+

Requires: ATCAH_DERIVE_KEY ATCAC_SW_SHA2_256

+

Supported API's: atcah_derive_key

+

Enable ATCAH_DERIVE_KEY to derive a key with a key and TempKey

- -

◆ HOSTLIB_CERT_EN

+ +

◆ ATCAH_DERIVE_KEY_MAC

- +
#define HOSTLIB_CERT_EN   (DEFAULT_ENABLED)#define ATCAH_DERIVE_KEY_MAC   (DEFAULT_ENABLED)
-

Indicates if this module is a provider of x509 certificate handling

+

Requires: ATCAH_DERIVE_KEY_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_derive_key_mac

+

Enable ATCAH_DERIVE_KEY_MAC to calculate the input MAC for a DeriveKey command

+ +
+
+ +

◆ ATCAH_ENCODE_COUNTER_MATCH

+ +
+
+ + + + +
#define ATCAH_ENCODE_COUNTER_MATCH   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_ENCODE_COUNTER_MATCH

+

Supported API's: atcah_encode_counter_match

+

Enable ATCAH_ENCODE_COUNTER_MATCH to build the counter match value that needs to be stored in a slot

+ +
+
+ +

◆ ATCAH_GEN_KEY_MSG

+ +
+
+ + + + +
#define ATCAH_GEN_KEY_MSG   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_SHA256 ATCAC_SW_SHA2_256

+

Supported API's: atcah_gen_key_msg

+

Enable ATCAH_GEN_KEY_MSG to calculate the PubKey digest created by GenKey and saved to TempKey

+ +
+
+ +

◆ ATCAH_GEN_MAC

+ +
+
+ + + + +
#define ATCAH_GEN_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_GEN_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_gen_mac

+

Enable ATCAH_GEN_MAC to generate mac with session key with a plain text

+ +
+
+ +

◆ ATCAH_GEN_OUTPUT_RESP_MAC

+ +
+
+ + + + +
#define ATCAH_GEN_OUTPUT_RESP_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_GEN_OUTPUT_RESP_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_gen_output_resp_mac

+

Enable ATCAH_GEN_OUTPUT_RESP_MAC to generate output response mac

+ +
+
+ +

◆ ATCAH_GEN_SESSION_KEY

+ +
+
+ + + + +
#define ATCAH_GEN_SESSION_KEY   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_GEN_SESSION_KEY ATCAC_SW_SHA2_256

+

Supported API's: atcah_gen_Session_key

+

Enable ATCAH_GEN_SESSION_KEY to calculate the session key for the ECC204

+ +
+
+ +

◆ ATCAH_GENDIG

+ +
+
+ + + + +
#define ATCAH_GENDIG   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_GENDIG ATCAC_SW_SHA2_256

+

Supported API's: atcah_gen_dig

+

Enable ATCAH_GENDIG to combine the current TempKey with a stored value

+ +
+
+ +

◆ ATCAH_GENDIVKEY

+ +
+
+ + + + +
#define ATCAH_GENDIVKEY   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_GENDIVKEY ATCAC_SW_SHA2_256

+

Supported API's: atcah_gendivkey

+

Enable ATCAH_GENDIVKEY to generate the diversified key

+ +
+
+ +

◆ ATCAH_HMAC

+ +
+
+ + + + +
#define ATCAH_HMAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_HMAC ATCAC_SW_SHA2_256 ATCAH_INCLUDE_DATA

+

Supported API's: atcah_hmac

+

Enable ATCAH_HMAC to generate an HMAC / SHA-256 hash of a key and other information

+ +
+
+ +

◆ ATCAH_INCLUDE_DATA

+ +
+
+ + + + +
#define ATCAH_INCLUDE_DATA   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_INCLUDE_DATA

+

Supported API's: atcah_include_data

+

Enable ATCAH_INCLUDE_DATA to copy otp and sn data into a command buffer

+ +
+
+ +

◆ ATCAH_IO_DECRYPT

+ +
+
+ + + + +
#define ATCAH_IO_DECRYPT   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_IO_DECRYPT ATCAC_SW_SHA2_256

+

Supported API's: atcah_io_decrypt

+

Enable ATCAH_IO_DECRYPT to decrypt data that's been encrypted by the IO protection key.The ECDH and KDF commands on the ATECC608 are the only ones that support this operation

+ +
+
+ +

◆ ATCAH_MAC

+ +
+
+ + + + +
#define ATCAH_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_MAC ATCAC_SW_SHA2_256 ATCAH_INCLUDE_DATA

+

Supported API's: atcah_mac

+

Enable ATCAH_MAC to generate an SHA-256 digest (MAC) of a key, challenge, and other information

+ +
+
+ +

◆ ATCAH_NONCE

+ +
+
+ + + + +
#define ATCAH_NONCE   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_NONCE ATCAC_SW_SHA2_256

+

Supported API's: atcah_nonce

+

Enable ATCAH_NONCE to calculate host side nonce with the parameters passed

+ +
+
+ +

◆ ATCAH_PRIVWRITE_AUTH_MAC

+ +
+
+ + + + +
#define ATCAH_PRIVWRITE_AUTH_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_PRIVWRITE_AUTH_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_privwrite_auth_mac

+

Enable ATCAH_PRIVWRITE_AUTH_MAC to calculate the input MAC for the PrivWrite command

+ +
+
+ +

◆ ATCAH_SECUREBOOT_ENC

+ +
+
+ + + + +
#define ATCAH_SECUREBOOT_ENC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_SECUREBOOT_ENC ATCAC_SW_SHA2_256

+

Supported API's: atcah_secureboot_enc

+

Enable ATCAH_SECUREBOOT_ENC to encrypt the digest for the SecureBoot command when using the encrypted digest / validating mac option

+ +
+
+ +

◆ ATCAH_SECUREBOOT_MAC

+ +
+
+ + + + +
#define ATCAH_SECUREBOOT_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_SECUREBOOT_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_secureboot_mac

+

Enable ATCAH_SECUREBOOT_MAC to calculates the expected MAC returned from the SecureBoot command when verification is a success

+ +
+
+ +

◆ ATCAH_SHA256

+ +
+
+ + + + +
#define ATCAH_SHA256   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_SHA256 ATCAC_SW_SHA2_256

+

Supported API's: atcah_sha256

+

Enable ATCAH_SHA256 to create a SHA256 digest on a little-endian system

+ +
+
+ +

◆ ATCAH_SIGN_INTERNAL_MSG

+ +
+
+ + + + +
#define ATCAH_SIGN_INTERNAL_MSG   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_SIGN_INTERNAL_MSG ATCAC_SW_SHA2_256

+

Supported API's: atcah_sign_internal_msg

+

Enable ATCAH_SIGN_INTERNAL_MSG to build the full message that would be signed by the Sign(Internal) command

+ +
+
+ +

◆ ATCAH_VERIFY_MAC

+ +
+
+ + + + +
#define ATCAH_VERIFY_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_VERIFY_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_verify_mac

+

Enable ATCAH_VERIFY_MAC to calculate the expected MAC on the host side for the Verify command

+ +
+
+ +

◆ ATCAH_WRITE_AUTH_MAC

+ +
+
+ + + + +
#define ATCAH_WRITE_AUTH_MAC   (DEFAULT_ENABLED)
+
+

Requires: ATCAH_WRITE_AUTH_MAC ATCAC_SW_SHA2_256

+

Supported API's: atcah_write_auth_mac ECC204 specific API's: atcah_ecc204_write_auth_mac

+

Enable ATCAH_WRITE_AUTH_MAC to calculate the input MAC for the Write command

@@ -234,7 +596,7 @@

diff --git a/a00653.js b/a00653.js index 7e086eeb2..aa052afd9 100644 --- a/a00653.js +++ b/a00653.js @@ -1,10 +1,28 @@ var a00653 = [ - [ "atcac_x509_ctx", "a01780.html", null ], - [ "ATCAC_AES_CMAC_EN", "a00653.html#ace0d6e503c0db5222207053a7c537103", null ], - [ "ATCAC_AES_GCM_EN", "a00653.html#a2cf377cd3579f3ba898ec2391835cfd5", null ], - [ "ATCAC_PKEY_EN", "a00653.html#ae0b5716ff6baea028959764dc6d88e96", null ], - [ "ATCAC_SHA1_EN", "a00653.html#a8e3c7ddf3a16cbdcc42060cdee2d884e", null ], - [ "ATCAC_SHA256_EN", "a00653.html#a99dab792a5983a089fe816abc57bad25", null ], - [ "HOSTLIB_CERT_EN", "a00653.html#a82cc4e898685eda93b47e741e5b44137", null ] + [ "ATCAH_CHECK_MAC", "a00653.html#a063f7ad7678d60de756ef8526b9dfea1", null ], + [ "ATCAH_CONFIG_TO_SIGN_INTERNAL", "a00653.html#ae427973632a62dfd8f35709c21993190", null ], + [ "ATCAH_DECRYPT", "a00653.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b", null ], + [ "ATCAH_DELETE_MAC", "a00653.html#acd2c32968024ddc7c650102a5076d70b", null ], + [ "ATCAH_DERIVE_KEY", "a00653.html#ada4b87726e822b6e94dcc18eefc39049", null ], + [ "ATCAH_DERIVE_KEY_MAC", "a00653.html#a22a85235261861839a0db05649999ef5", null ], + [ "ATCAH_ENCODE_COUNTER_MATCH", "a00653.html#a2ecb26546b49e369aeaf86bccf10a2e9", null ], + [ "ATCAH_GEN_KEY_MSG", "a00653.html#a371384b4f8d818c31dee337aa4e24403", null ], + [ "ATCAH_GEN_MAC", "a00653.html#a0f0e6c501c2dc57b4ed68fe29780b062", null ], + [ "ATCAH_GEN_OUTPUT_RESP_MAC", "a00653.html#a70d0b80d637281693321866bd3c2735f", null ], + [ "ATCAH_GEN_SESSION_KEY", "a00653.html#aa5220706535f7367e06aa2aadebc0b57", null ], + [ "ATCAH_GENDIG", "a00653.html#aec5752be28ebfd8dc506bda7c36b9f7d", null ], + [ "ATCAH_GENDIVKEY", "a00653.html#af25240ee5ff347e1cf2768bfd513345f", null ], + [ "ATCAH_HMAC", "a00653.html#a6a86a40deff31dbaf005519aba627991", null ], + [ "ATCAH_INCLUDE_DATA", "a00653.html#a6442329f443943bbc8f3e10dde67930d", null ], + [ "ATCAH_IO_DECRYPT", "a00653.html#ae58a45ab173bf9ca7c4cdf4768fcf00e", null ], + [ "ATCAH_MAC", "a00653.html#a33ac8a876197c7774452b7b46411f188", null ], + [ "ATCAH_NONCE", "a00653.html#a879c87175b07e859a15320e199a104a6", null ], + [ "ATCAH_PRIVWRITE_AUTH_MAC", "a00653.html#a13ed9a07ad5f74cfb67b7582c1b638a3", null ], + [ "ATCAH_SECUREBOOT_ENC", "a00653.html#a745b85254a910c7d8edbea41ab927cf4", null ], + [ "ATCAH_SECUREBOOT_MAC", "a00653.html#aa1d0ffc3e79f52154b2e362b74b7b112", null ], + [ "ATCAH_SHA256", "a00653.html#a58d2f9f20485ae35c2208f3bce5cb4a7", null ], + [ "ATCAH_SIGN_INTERNAL_MSG", "a00653.html#ad2e1b57a0f8a5dc87427b1eca18ac02f", null ], + [ "ATCAH_VERIFY_MAC", "a00653.html#a1515a97abca19263c1cf16dcbdd01944", null ], + [ "ATCAH_WRITE_AUTH_MAC", "a00653.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0", null ] ]; \ No newline at end of file diff --git a/a00656.html b/a00656.html index 41ec612fb..172c39c1a 100644 --- a/a00656.html +++ b/a00656.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_mbedtls_wrap.c File Reference +CryptoAuthLib: atca_jwt.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,1440 +97,26 @@
- -
atca_mbedtls_wrap.c File Reference
+
atca_jwt.c File Reference
-

Wrapper functions to replace cryptoauthlib software crypto functions with the mbedTLS equivalent. +

Utilities to create and verify a JSON Web Token (JWT) More...

-
#include "atca_config_check.h"
-#include "mbedtls/config.h"
-#include <stdlib.h>
-#include "mbedtls/cmac.h"
-#include "mbedtls/ctr_drbg.h"
-#include "mbedtls/pk.h"
-#include "mbedtls/ecdh.h"
-#include "mbedtls/ecp.h"
-#include "mbedtls/entropy.h"
-#include "mbedtls/x509_crt.h"
-#include "mbedtls/oid.h"
-#include "cryptoauthlib.h"
-#include "atca_mbedtls_wrap.h"
-#include "atca_mbedtls_patch.h"
-#include "crypto/atca_crypto_sw.h"
-#include "atcacert/atcacert_client.h"
-#include "atcacert/atcacert_def.h"
-#include "mbedtls/pk_internal.h"
-#include "atcacert/atcacert_der.h"
-
- - - - - -

-Macros

-#define mbedtls_calloc   calloc
 
-#define mbedtls_free   free
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atcac_sw_random (uint8_t *data, size_t data_size)
 Return Random Bytes.
 
ATCA_STATUS atcac_aes_gcm_aad_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len)
 Update the GCM context with additional authentication data (AAD)
 
ATCA_STATUS atcac_aes_gcm_encrypt_start (struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len)
 Initialize an AES-GCM context.
 
ATCA_STATUS atcac_aes_gcm_encrypt_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len)
 Encrypt a data using the initialized context.
 
ATCA_STATUS atcac_aes_gcm_encrypt_finish (struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len)
 Get the AES-GCM tag and free the context.
 
ATCA_STATUS atcac_aes_gcm_decrypt_start (struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len)
 Initialize an AES-GCM context for decryption.
 
ATCA_STATUS atcac_aes_gcm_decrypt_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len)
 Decrypt ciphertext using the initialized context.
 
ATCA_STATUS atcac_aes_gcm_decrypt_finish (struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified)
 Compare the AES-GCM tag and free the context.
 
ATCA_STATUS atcac_sw_sha1_init (struct atcac_sha1_ctx *ctx)
 Initialize context for performing SHA1 hash in software.
 
ATCA_STATUS atcac_sw_sha1_update (struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size)
 Add data to a SHA1 hash.
 
ATCA_STATUS atcac_sw_sha1_finish (struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE])
 Complete the SHA1 hash in software and return the digest.
 
ATCA_STATUS atcac_sw_sha2_256_init (struct atcac_sha2_256_ctx *ctx)
 Initialize context for performing SHA256 hash in software.
 
ATCA_STATUS atcac_sw_sha2_256_update (struct atcac_sha2_256_ctx *ctx, const uint8_t *data, size_t data_size)
 Add data to a SHA256 hash.
 
ATCA_STATUS atcac_sw_sha2_256_finish (struct atcac_sha2_256_ctx *ctx, uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE])
 Complete the SHA256 hash in software and return the digest.
 
ATCA_STATUS atcac_aes_cmac_init (struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len)
 Initialize context for performing CMAC in software.
 
ATCA_STATUS atcac_aes_cmac_update (struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size)
 Update CMAC context with input data.
 
ATCA_STATUS atcac_aes_cmac_finish (struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size)
 Finish CMAC calculation and clear the CMAC context.
 
ATCA_STATUS atcac_sha256_hmac_init (struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len)
 Initialize context for performing HMAC (sha256) in software.
 
ATCA_STATUS atcac_sha256_hmac_update (struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size)
 Update HMAC context with input data.
 
ATCA_STATUS atcac_sha256_hmac_finish (struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len)
 Finish CMAC calculation and clear the HMAC context.
 
ATCA_STATUS atcac_pk_init (struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey)
 Set up a public/private key structure for use in asymmetric cryptographic functions.
 
ATCA_STATUS atcac_pk_init_pem (struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey)
 Set up a public/private key structure for use in asymmetric cryptographic functions.
 
ATCA_STATUS atcac_pk_free (struct atcac_pk_ctx *ctx)
 Free a public/private key structure.
 
ATCA_STATUS atcac_pk_public (struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen)
 Get the public key from the context.
 
ATCA_STATUS atcac_pk_sign (struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len)
 Perform a signature with the private key in the context.
 
ATCA_STATUS atcac_pk_verify (struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len)
 Perform a verify using the public key in the provided context.
 
ATCA_STATUS atcac_pk_derive (struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen)
 Execute the key agreement protocol for the provided keys (if they can)
 
int atca_mbedtls_pk_init_ext (ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid)
 Initializes an mbedtls pk context for use with EC operations.
 
int atca_mbedtls_pk_init (mbedtls_pk_context *pkey, const uint16_t slotid)
 Initializes an mbedtls pk context for use with EC operations.
 
-ATCA_STATUS atcac_parse_der (struct atcac_x509_ctx **cert, cal_buffer *der)
 
-ATCA_STATUS atcac_get_subject (const struct atcac_x509_ctx *cert, cal_buffer *cert_subject)
 
-ATCA_STATUS atcac_get_subj_public_key (const struct atcac_x509_ctx *cert, cal_buffer *subj_public_key)
 
-ATCA_STATUS atcac_get_subj_key_id (const struct atcac_x509_ctx *cert, cal_buffer *subj_public_key_id)
 
-ATCA_STATUS atcac_get_issue_date (const struct atcac_x509_ctx *cert, cal_buffer *not_before, uint8_t *fmt)
 
-ATCA_STATUS atcac_get_expire_date (const struct atcac_x509_ctx *cert, cal_buffer *not_after, uint8_t *fmt)
 
-ATCA_STATUS atcac_get_issuer (const struct atcac_x509_ctx *cert, cal_buffer *issuer_buf)
 
-ATCA_STATUS atcac_get_cert_sn (const struct atcac_x509_ctx *cert, cal_buffer *cert_sn)
 
-ATCA_STATUS atcac_get_auth_key_id (const struct atcac_x509_ctx *cert, cal_buffer *auth_key_id)
 
-void atcac_x509_free (void *cert)
 
- - - -

-Variables

const mbedtls_pk_info_t atca_mbedtls_eckey_info
 
-

Detailed Description

-

Wrapper functions to replace cryptoauthlib software crypto functions with the mbedTLS equivalent.

+
#include "cryptoauthlib.h"
+#include "atca_helpers.h"
+#include "crypto/atca_crypto_sw_sha2.h"
+#include "jwt/atca_jwt.h"
+#include <stdio.h>
+

Detailed Description

+

Utilities to create and verify a JSON Web Token (JWT)

-

Function Documentation

- -

◆ atcac_aes_cmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_cmac_finish (struct atcac_aes_cmac_ctxctx,
uint8_t * cmac,
size_t * cmac_size 
)
-
- -

Finish CMAC calculation and clear the CMAC context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a aes-cmac context
[out]cmaccmac value
[in,out]cmac_sizelength of cmac
-
-
- -
-
- -

◆ atcac_aes_cmac_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_cmac_init (struct atcac_aes_cmac_ctxctx,
const uint8_t * key,
const uint8_t key_len 
)
-
- -

Initialize context for performing CMAC in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a aes-cmac context
[in]keykey value to use
[in]key_lenlength of the key
-
-
- -
-
- -

◆ atcac_aes_cmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_cmac_update (struct atcac_aes_cmac_ctxctx,
const uint8_t * data,
const size_t data_size 
)
-
- -

Update CMAC context with input data.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a aes-cmac context
[in]datainput data
[in]data_sizelength of input data
-
-
- -
-
- -

◆ atcac_aes_gcm_aad_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_aad_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * aad,
const size_t aad_len 
)
-
- -

Update the GCM context with additional authentication data (AAD)

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxAES-GCM Context
[in]aadAdditional Authentication Data
[in]aad_lenLength of AAD
-
-
- -
-
- -

◆ atcac_aes_gcm_decrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_decrypt_finish (struct atcac_aes_gcm_ctxctx,
const uint8_t * tag,
size_t tag_len,
bool * is_verified 
)
-
- -

Compare the AES-GCM tag and free the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxAES-GCM Context
[in]tagGCM Tag to Verify
[in]tag_lenLength of the GCM tag
[out]is_verifiedTag verified as matching
-
-
- -
-
- -

◆ atcac_aes_gcm_decrypt_start()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_decrypt_start (struct atcac_aes_gcm_ctxctx,
const uint8_t * key,
const uint8_t key_len,
const uint8_t * iv,
const uint8_t iv_len 
)
-
- -

Initialize an AES-GCM context for decryption.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]keyAES Key
[in]key_lenLength of the AES key - should be 16 or 32
[in]ivInitialization vector input
[in]iv_lenLength of the initialization vector
-
-
- -
-
- -

◆ atcac_aes_gcm_decrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_decrypt_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * ciphertext,
const size_t ct_len,
uint8_t * plaintext,
size_t * pt_len 
)
-
- -

Decrypt ciphertext using the initialized context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]ciphertextCiphertext to decrypt
[in]ct_lenLength of the ciphertext
[out]plaintextResulting decrypted plaintext
[in,out]pt_lenLength of the plaintext buffer
-
-
- -
-
- -

◆ atcac_aes_gcm_encrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_encrypt_finish (struct atcac_aes_gcm_ctxctx,
uint8_t * tag,
size_t tag_len 
)
-
- -

Get the AES-GCM tag and free the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxAES-GCM Context
[out]tagGCM Tag Result
[in]tag_lenLength of the GCM tag
-
-
- -
-
- -

◆ atcac_aes_gcm_encrypt_start()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_encrypt_start (struct atcac_aes_gcm_ctxctx,
const uint8_t * key,
const uint8_t key_len,
const uint8_t * iv,
const uint8_t iv_len 
)
-
- -

Initialize an AES-GCM context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]keyAES Key
[in]key_lenLength of the AES key - should be 16 or 32
[in]ivInitialization vector input
[in]iv_lenLength of the initialization vector
-
-
- -
-
- -

◆ atcac_aes_gcm_encrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_encrypt_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * plaintext,
const size_t pt_len,
uint8_t * ciphertext,
size_t * ct_len 
)
-
- -

Encrypt a data using the initialized context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]plaintextInput buffer to encrypt
[in]pt_lenLength of the input
[out]ciphertextOutput buffer
[in,out]ct_lenLength of the ciphertext buffer
-
-
- -
-
- -

◆ atcac_pk_derive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_derive (struct atcac_pk_ctxprivate_ctx,
struct atcac_pk_ctxpublic_ctx,
uint8_t * buf,
size_t * buflen 
)
-
- -

Execute the key agreement protocol for the provided keys (if they can)

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_pk_free()

- -
-
- - - - - - - - -
ATCA_STATUS atcac_pk_free (struct atcac_pk_ctxctx)
-
- -

Free a public/private key structure.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ctxpointer to a pk context
-
-
- -
-
- -

◆ atcac_pk_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_init (struct atcac_pk_ctxctx,
const uint8_t * buf,
size_t buflen,
uint8_t key_type,
bool pubkey 
)
-
- -

Set up a public/private key structure for use in asymmetric cryptographic functions.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxpointer to a pk context
[in]bufbuffer containing a pem encoded key
[in]buflenlength of the input buffer
[in]pubkeybuffer is a public key
-
-
- -
-
- -

◆ atcac_pk_init_pem()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_init_pem (struct atcac_pk_ctxctx,
const uint8_t * buf,
size_t buflen,
bool pubkey 
)
-
- -

Set up a public/private key structure for use in asymmetric cryptographic functions.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxpointer to a pk context
[in]bufbuffer containing a pem encoded key
[in]buflenlength of the input buffer
[in]pubkeybuffer is a public key
-
-
- -
-
- -

◆ atcac_pk_public()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_public (struct atcac_pk_ctxctx,
uint8_t * buf,
size_t * buflen 
)
-
- -

Get the public key from the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_pk_sign()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_sign (struct atcac_pk_ctxctx,
const uint8_t * digest,
size_t dig_len,
uint8_t * signature,
size_t * sig_len 
)
-
- -

Perform a signature with the private key in the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_pk_verify()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_verify (struct atcac_pk_ctxctx,
const uint8_t * digest,
size_t dig_len,
const uint8_t * signature,
size_t sig_len 
)
-
- -

Perform a verify using the public key in the provided context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_sha256_hmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sha256_hmac_finish (struct atcac_hmac_ctxctx,
uint8_t * digest,
size_t * digest_len 
)
-
- -

Finish CMAC calculation and clear the HMAC context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a sha256-hmac context
[out]digesthmac value
[in,out]digest_lenlength of hmac
-
-
- -
-
- -

◆ atcac_sha256_hmac_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sha256_hmac_init (struct atcac_hmac_ctxctx,
struct atcac_sha2_256_ctxsha256_ctx,
const uint8_t * key,
const uint8_t key_len 
)
-
- -

Initialize context for performing HMAC (sha256) in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxpointer to a sha256-hmac context
[in]sha256_ctxpointer to a sha256 context
[in]keykey value to use
[in]key_lenlength of the key
-
-
- -
-
- -

◆ atcac_sha256_hmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sha256_hmac_update (struct atcac_hmac_ctxctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Update HMAC context with input data.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a sha256-hmac context
[in]datainput data
[in]data_sizelength of input data
-
-
- -
-
- -

◆ atcac_sw_random()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_random (uint8_t * data,
size_t data_size 
)
-
- -

Return Random Bytes.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_sw_sha1_finish()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha1_finish (struct atcac_sha1_ctxctx,
uint8_t digest[ATCA_SHA1_DIGEST_SIZE] 
)
-
- -

Complete the SHA1 hash in software and return the digest.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - -
[in]ctxpointer to a hash context
[out]digestoutput buffer (20 bytes)
-
-
- -
-
- -

◆ atcac_sw_sha1_init()

- -
-
- - - - - - - - -
ATCA_STATUS atcac_sw_sha1_init (struct atcac_sha1_ctxctx)
-
- -

Initialize context for performing SHA1 hash in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ctxpointer to a hash context
-
-
- -
-
- -

◆ atcac_sw_sha1_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha1_update (struct atcac_sha1_ctxctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Add data to a SHA1 hash.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a hash context
[in]datainput data buffer
[in]data_sizeinput data length
-
-
- -
-
- -

◆ atcac_sw_sha2_256_finish()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha2_256_finish (struct atcac_sha2_256_ctxctx,
uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE] 
)
-
- -

Complete the SHA256 hash in software and return the digest.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - -
[in]ctxpointer to a hash context
[out]digestoutput buffer (32 bytes)
-
-
- -
-
- -

◆ atcac_sw_sha2_256_init()

- -
-
- - - - - - - - -
ATCA_STATUS atcac_sw_sha2_256_init (struct atcac_sha2_256_ctxctx)
-
- -

Initialize context for performing SHA256 hash in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ctxpointer to a hash context
-
-
- -
-
- -

◆ atcac_sw_sha2_256_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha2_256_update (struct atcac_sha2_256_ctxctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Add data to a SHA256 hash.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a hash context
[in]datainput data buffer
[in]data_sizeinput data length
-
-
- -
-
-

Variable Documentation

- -

◆ atca_mbedtls_eckey_info

- -
-
- - - - -
const mbedtls_pk_info_t atca_mbedtls_eckey_info
-
-Initial value:
= {
-
MBEDTLS_PK_ECKEY,
-
"EC",
-
atca_mbedtls_eckey_get_bitlen,
-
atca_mbedtls_eckey_can_do,
-
atca_mbedtls_eckey_verify,
-
atca_mbedtls_eckey_sign,
-
-
-
-
-
-
NULL,
-
NULL,
-
atca_mbedtls_eckey_check_pair,
-
atca_mbedtls_eckey_alloc,
-
atca_mbedtls_eckey_free,
-
-
-
-
-
-
atca_mbedtls_eckey_debug,
-
}
-
-
-
-
+
diff --git a/a00656.js b/a00656.js deleted file mode 100644 index fa766ef6b..000000000 --- a/a00656.js +++ /dev/null @@ -1,32 +0,0 @@ -var a00656 = -[ - [ "atca_mbedtls_pk_init", "a01449.html#gaa55a112d0b087adc242cc9b0978b5d15", null ], - [ "atca_mbedtls_pk_init_ext", "a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6", null ], - [ "atcac_aes_cmac_finish", "a00656.html#a9fb429f011c7df55055763f41b896f28", null ], - [ "atcac_aes_cmac_init", "a00656.html#a17af2d47faed0774e9277be42512b0f4", null ], - [ "atcac_aes_cmac_update", "a00656.html#a9c6a8dc222080952c2541db9cf7cd3c0", null ], - [ "atcac_aes_gcm_aad_update", "a00656.html#a7cc388d11506f9ef030994fab99cfaa7", null ], - [ "atcac_aes_gcm_decrypt_finish", "a00656.html#ac9cde02547c1ed0122c87f0a156ee268", null ], - [ "atcac_aes_gcm_decrypt_start", "a00656.html#a473ff3c449375989e846d66342333b3a", null ], - [ "atcac_aes_gcm_decrypt_update", "a00656.html#a04b292df2006e31743224b66e16a29e9", null ], - [ "atcac_aes_gcm_encrypt_finish", "a00656.html#a5bdd8ba09593bb7a2ce1f48df873250a", null ], - [ "atcac_aes_gcm_encrypt_start", "a00656.html#a856d7a2b4bdd82d01544cb4ee6048e48", null ], - [ "atcac_aes_gcm_encrypt_update", "a00656.html#a34f53a6f8a1ef018ef886961e4f60694", null ], - [ "atcac_pk_derive", "a00656.html#a7b82589420e299091e6b80459bfb90d8", null ], - [ "atcac_pk_free", "a00656.html#a757c5734289254c48f43cc26b7d5e6a4", null ], - [ "atcac_pk_init", "a00656.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f", null ], - [ "atcac_pk_init_pem", "a00656.html#a93806f5fc89ac97ab70e74dc9c41dd76", null ], - [ "atcac_pk_public", "a00656.html#acd482e1225ffba53b6bfe903e133a541", null ], - [ "atcac_pk_sign", "a00656.html#aef7827b56555e8efcc4646855335555f", null ], - [ "atcac_pk_verify", "a00656.html#a29573bbcca0c005de19ec709109538df", null ], - [ "atcac_sha256_hmac_finish", "a00656.html#ac5f016c7c9fa74cadbd76508e68ffe66", null ], - [ "atcac_sha256_hmac_init", "a00656.html#a107f3a8b6eb198dff510926061cabb43", null ], - [ "atcac_sha256_hmac_update", "a00656.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee", null ], - [ "atcac_sw_random", "a00656.html#a45fef91f1894c03f9fd94d2835a91342", null ], - [ "atcac_sw_sha1_finish", "a00656.html#abb02186059737ad5fb792665cf0b97dd", null ], - [ "atcac_sw_sha1_init", "a00656.html#a723448315d3bbc03a39104d36fd2b4bc", null ], - [ "atcac_sw_sha1_update", "a00656.html#a1b8bae42b5963d812f4cf2329807f778", null ], - [ "atcac_sw_sha2_256_finish", "a00656.html#a41146dace082e493f250425972a04d7f", null ], - [ "atcac_sw_sha2_256_init", "a00656.html#afb989c314b0afecd1202493a3cfee909", null ], - [ "atcac_sw_sha2_256_update", "a00656.html#a1caf63c685aa46025eda5e73f8d634b5", null ] -]; \ No newline at end of file diff --git a/a00662.html b/a00662.html deleted file mode 100644 index 15a432f0d..000000000 --- a/a00662.html +++ /dev/null @@ -1,1476 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_openssl_interface.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_openssl_interface.c File Reference
-
-
- -

Crypto abstraction functions for external host side cryptography. -More...

-
#include "cryptoauthlib.h"
-#include "crypto/atca_crypto_sw.h"
-#include <openssl/bn.h>
-#include <openssl/bio.h>
-#include <openssl/cmac.h>
-#include <openssl/ec.h>
-#include <openssl/evp.h>
-#include <openssl/hmac.h>
-#include <openssl/pem.h>
-#include <openssl/rand.h>
-#include <openssl/x509.h>
-#include <openssl/x509v3.h>
-
- - - -

-Data Structures

struct  atca_evp_ctx
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atcac_sw_random (uint8_t *data, size_t data_size)
 Return Random Bytes.
 
ATCA_STATUS atcac_aes_gcm_aad_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len)
 Update the GCM context with additional authentication data (AAD)
 
ATCA_STATUS atcac_aes_gcm_encrypt_start (struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len)
 Initialize an AES-GCM context.
 
ATCA_STATUS atcac_aes_gcm_encrypt_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len)
 Encrypt a data using the initialized context.
 
ATCA_STATUS atcac_aes_gcm_encrypt_finish (struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len)
 Get the AES-GCM tag and free the context.
 
ATCA_STATUS atcac_aes_gcm_decrypt_start (struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len)
 Initialize an AES-GCM context for decryption.
 
ATCA_STATUS atcac_aes_gcm_decrypt_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len)
 Decrypt ciphertext using the initialized context.
 
ATCA_STATUS atcac_aes_gcm_decrypt_finish (struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified)
 Compare the AES-GCM tag and free the context.
 
ATCA_STATUS atcac_sw_sha1_init (struct atcac_sha1_ctx *ctx)
 Initialize context for performing SHA1 hash in software.
 
ATCA_STATUS atcac_sw_sha1_update (struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size)
 Add data to a SHA1 hash.
 
ATCA_STATUS atcac_sw_sha1_finish (struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE])
 Complete the SHA1 hash in software and return the digest.
 
ATCA_STATUS atcac_sw_sha2_256_init (struct atcac_sha2_256_ctx *ctx)
 Initialize context for performing SHA256 hash in software.
 
ATCA_STATUS atcac_sw_sha2_256_update (struct atcac_sha2_256_ctx *ctx, const uint8_t *data, size_t data_size)
 Add data to a SHA256 hash.
 
ATCA_STATUS atcac_sw_sha2_256_finish (struct atcac_sha2_256_ctx *ctx, uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE])
 Complete the SHA256 hash in software and return the digest.
 
ATCA_STATUS atcac_aes_cmac_init (struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len)
 Initialize context for performing CMAC in software.
 
ATCA_STATUS atcac_aes_cmac_update (struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size)
 Update CMAC context with input data.
 
ATCA_STATUS atcac_aes_cmac_finish (struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size)
 Finish CMAC calculation and clear the CMAC context.
 
ATCA_STATUS atcac_sha256_hmac_init (struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len)
 Initialize context for performing HMAC (sha256) in software.
 
ATCA_STATUS atcac_sha256_hmac_update (struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size)
 Update HMAC context with input data.
 
ATCA_STATUS atcac_sha256_hmac_finish (struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len)
 Finish CMAC calculation and clear the HMAC context.
 
ATCA_STATUS atcac_pk_init (struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey)
 Set up a public/private key structure for use in asymmetric cryptographic functions.
 
ATCA_STATUS atcac_pk_init_pem (struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey)
 Set up a public/private key structure for use in asymmetric cryptographic functions.
 
ATCA_STATUS atcac_pk_free (struct atcac_pk_ctx *ctx)
 Free a public/private key structure.
 
ATCA_STATUS atcac_pk_public (struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen)
 Get the public key from the context.
 
ATCA_STATUS atcac_pk_sign (struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len)
 Perform a signature with the private key in the context.
 
ATCA_STATUS atcac_pk_verify (struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len)
 Perform a verify using the public key in the provided context.
 
ATCA_STATUS atcac_pk_derive (struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen)
 Execute the key agreement protocol for the provided keys (if they can)
 
-ATCA_STATUS atcac_parse_der (struct atcac_x509_ctx **cert, cal_buffer *der)
 
-ATCA_STATUS atcac_get_subject (const struct atcac_x509_ctx *cert, cal_buffer *cert_subject)
 
-ATCA_STATUS atcac_get_subj_public_key (const struct atcac_x509_ctx *cert, cal_buffer *subj_public_key)
 
-ATCA_STATUS atcac_get_subj_key_id (const struct atcac_x509_ctx *cert, cal_buffer *subj_public_key_id)
 
-ATCA_STATUS atcac_get_issuer (const struct atcac_x509_ctx *cert, cal_buffer *issuer_buf)
 
-ATCA_STATUS atcac_get_auth_key_id (const struct atcac_x509_ctx *cert, cal_buffer *auth_key_id)
 
-ATCA_STATUS atcac_get_issue_date (const struct atcac_x509_ctx *cert, cal_buffer *not_before, uint8_t *fmt)
 
-ATCA_STATUS atcac_get_expire_date (const struct atcac_x509_ctx *cert, cal_buffer *not_after, uint8_t *fmt)
 
-ATCA_STATUS atcac_get_cert_sn (const struct atcac_x509_ctx *cert, cal_buffer *cert_sn)
 
-void atcac_x509_free (void *cert)
 
-

Detailed Description

-

Crypto abstraction functions for external host side cryptography.

- -

Function Documentation

- -

◆ atcac_aes_cmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_cmac_finish (struct atcac_aes_cmac_ctxctx,
uint8_t * cmac,
size_t * cmac_size 
)
-
- -

Finish CMAC calculation and clear the CMAC context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a aes-cmac context
[out]cmaccmac value
[in,out]cmac_sizelength of cmac
-
-
- -
-
- -

◆ atcac_aes_cmac_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_cmac_init (struct atcac_aes_cmac_ctxctx,
const uint8_t * key,
const uint8_t key_len 
)
-
- -

Initialize context for performing CMAC in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a aes-cmac context
[in]keykey value to use
[in]key_lenlength of the key
-
-
- -
-
- -

◆ atcac_aes_cmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_cmac_update (struct atcac_aes_cmac_ctxctx,
const uint8_t * data,
const size_t data_size 
)
-
- -

Update CMAC context with input data.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a aes-cmac context
[in]datainput data
[in]data_sizelength of input data
-
-
- -
-
- -

◆ atcac_aes_gcm_aad_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_aad_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * aad,
const size_t aad_len 
)
-
- -

Update the GCM context with additional authentication data (AAD)

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxAES-GCM Context
[in]aadAdditional Authentication Data
[in]aad_lenLength of AAD
-
-
- -
-
- -

◆ atcac_aes_gcm_decrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_decrypt_finish (struct atcac_aes_gcm_ctxctx,
const uint8_t * tag,
size_t tag_len,
bool * is_verified 
)
-
- -

Compare the AES-GCM tag and free the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxAES-GCM Context
[in]tagGCM Tag to Verify
[in]tag_lenLength of the GCM tag
[out]is_verifiedTag verified as matching
-
-
- -
-
- -

◆ atcac_aes_gcm_decrypt_start()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_decrypt_start (struct atcac_aes_gcm_ctxctx,
const uint8_t * key,
const uint8_t key_len,
const uint8_t * iv,
const uint8_t iv_len 
)
-
- -

Initialize an AES-GCM context for decryption.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]keyAES Key
[in]key_lenLength of the AES key - should be 16 or 32
[in]ivInitialization vector input
[in]iv_lenLength of the initialization vector
-
-
- -
-
- -

◆ atcac_aes_gcm_decrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_decrypt_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * ciphertext,
const size_t ct_len,
uint8_t * plaintext,
size_t * pt_len 
)
-
- -

Decrypt ciphertext using the initialized context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]ciphertextCiphertext to decrypt
[in]ct_lenLength of the ciphertext
[out]plaintextResulting decrypted plaintext
[in,out]pt_lenLength of the plaintext buffer
-
-
- -
-
- -

◆ atcac_aes_gcm_encrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_encrypt_finish (struct atcac_aes_gcm_ctxctx,
uint8_t * tag,
size_t tag_len 
)
-
- -

Get the AES-GCM tag and free the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxAES-GCM Context
[out]tagGCM Tag Result
[in]tag_lenLength of the GCM tag
-
-
- -
-
- -

◆ atcac_aes_gcm_encrypt_start()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_encrypt_start (struct atcac_aes_gcm_ctxctx,
const uint8_t * key,
const uint8_t key_len,
const uint8_t * iv,
const uint8_t iv_len 
)
-
- -

Initialize an AES-GCM context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]keyAES Key
[in]key_lenLength of the AES key - should be 16 or 32
[in]ivInitialization vector input
[in]iv_lenLength of the initialization vector
-
-
- -
-
- -

◆ atcac_aes_gcm_encrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_aes_gcm_encrypt_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * plaintext,
const size_t pt_len,
uint8_t * ciphertext,
size_t * ct_len 
)
-
- -

Encrypt a data using the initialized context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - - -
[in]ctxAES-GCM Context
[in]plaintextInput buffer to encrypt
[in]pt_lenLength of the input
[out]ciphertextOutput buffer
[in,out]ct_lenLength of the ciphertext buffer
-
-
- -
-
- -

◆ atcac_pk_derive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_derive (struct atcac_pk_ctxprivate_ctx,
struct atcac_pk_ctxpublic_ctx,
uint8_t * buf,
size_t * buflen 
)
-
- -

Execute the key agreement protocol for the provided keys (if they can)

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_pk_free()

- -
-
- - - - - - - - -
ATCA_STATUS atcac_pk_free (struct atcac_pk_ctxctx)
-
- -

Free a public/private key structure.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ctxpointer to a pk context
-
-
- -
-
- -

◆ atcac_pk_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_init (struct atcac_pk_ctxctx,
const uint8_t * buf,
size_t buflen,
uint8_t key_type,
bool pubkey 
)
-
- -

Set up a public/private key structure for use in asymmetric cryptographic functions.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxpointer to a pk context
[in]bufbuffer containing a pem encoded key
[in]buflenlength of the input buffer
[in]pubkeybuffer is a public key
-
-
- -
-
- -

◆ atcac_pk_init_pem()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_init_pem (struct atcac_pk_ctxctx,
const uint8_t * buf,
size_t buflen,
bool pubkey 
)
-
- -

Set up a public/private key structure for use in asymmetric cryptographic functions.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxpointer to a pk context
[in]bufbuffer containing a pem encoded key
[in]buflenlength of the input buffer
[in]pubkeybuffer is a public key
-
-
- -
-
- -

◆ atcac_pk_public()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_public (struct atcac_pk_ctxctx,
uint8_t * buf,
size_t * buflen 
)
-
- -

Get the public key from the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_pk_sign()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_sign (struct atcac_pk_ctxctx,
const uint8_t * digest,
size_t dig_len,
uint8_t * signature,
size_t * sig_len 
)
-
- -

Perform a signature with the private key in the context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_pk_verify()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_pk_verify (struct atcac_pk_ctxctx,
const uint8_t * digest,
size_t dig_len,
const uint8_t * signature,
size_t sig_len 
)
-
- -

Perform a verify using the public key in the provided context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_sha256_hmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sha256_hmac_finish (struct atcac_hmac_ctxctx,
uint8_t * digest,
size_t * digest_len 
)
-
- -

Finish CMAC calculation and clear the HMAC context.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a sha256-hmac context
[out]digesthmac value
[in,out]digest_lenlength of hmac
-
-
- -
-
- -

◆ atcac_sha256_hmac_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sha256_hmac_init (struct atcac_hmac_ctxctx,
struct atcac_sha2_256_ctxsha256_ctx,
const uint8_t * key,
const uint8_t key_len 
)
-
- -

Initialize context for performing HMAC (sha256) in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ctxpointer to a sha256-hmac context
[in]sha256_ctxpointer to a sha256 context
[in]keykey value to use
[in]key_lenlength of the key
-
-
- -
-
- -

◆ atcac_sha256_hmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sha256_hmac_update (struct atcac_hmac_ctxctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Update HMAC context with input data.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a sha256-hmac context
[in]datainput data
[in]data_sizelength of input data
-
-
- -
-
- -

◆ atcac_sw_random()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_random (uint8_t * data,
size_t data_size 
)
-
- -

Return Random Bytes.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcac_sw_sha1_finish()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha1_finish (struct atcac_sha1_ctxctx,
uint8_t digest[ATCA_SHA1_DIGEST_SIZE] 
)
-
- -

Complete the SHA1 hash in software and return the digest.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - -
[in]ctxpointer to a hash context
[out]digestoutput buffer (20 bytes)
-
-
- -
-
- -

◆ atcac_sw_sha1_init()

- -
-
- - - - - - - - -
ATCA_STATUS atcac_sw_sha1_init (struct atcac_sha1_ctxctx)
-
- -

Initialize context for performing SHA1 hash in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ctxpointer to a hash context
-
-
- -
-
- -

◆ atcac_sw_sha1_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha1_update (struct atcac_sha1_ctxctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Add data to a SHA1 hash.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a hash context
[in]datainput data buffer
[in]data_sizeinput data length
-
-
- -
-
- -

◆ atcac_sw_sha2_256_finish()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha2_256_finish (struct atcac_sha2_256_ctxctx,
uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE] 
)
-
- -

Complete the SHA256 hash in software and return the digest.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - -
[in]ctxpointer to a hash context
[out]digestoutput buffer (32 bytes)
-
-
- -
-
- -

◆ atcac_sw_sha2_256_init()

- -
-
- - - - - - - - -
ATCA_STATUS atcac_sw_sha2_256_init (struct atcac_sha2_256_ctxctx)
-
- -

Initialize context for performing SHA256 hash in software.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ctxpointer to a hash context
-
-
- -
-
- -

◆ atcac_sw_sha2_256_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcac_sw_sha2_256_update (struct atcac_sha2_256_ctxctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Add data to a SHA256 hash.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ctxpointer to a hash context
[in]datainput data buffer
[in]data_sizeinput data length
-
-
- -
-
-
-
- - - - diff --git a/a00662.js b/a00662.js deleted file mode 100644 index 729d2b8e0..000000000 --- a/a00662.js +++ /dev/null @@ -1,31 +0,0 @@ -var a00662 = -[ - [ "atca_evp_ctx", "a01812.html", null ], - [ "atcac_aes_cmac_finish", "a00662.html#a9fb429f011c7df55055763f41b896f28", null ], - [ "atcac_aes_cmac_init", "a00662.html#a17af2d47faed0774e9277be42512b0f4", null ], - [ "atcac_aes_cmac_update", "a00662.html#a9c6a8dc222080952c2541db9cf7cd3c0", null ], - [ "atcac_aes_gcm_aad_update", "a00662.html#a7cc388d11506f9ef030994fab99cfaa7", null ], - [ "atcac_aes_gcm_decrypt_finish", "a00662.html#ac9cde02547c1ed0122c87f0a156ee268", null ], - [ "atcac_aes_gcm_decrypt_start", "a00662.html#a473ff3c449375989e846d66342333b3a", null ], - [ "atcac_aes_gcm_decrypt_update", "a00662.html#a04b292df2006e31743224b66e16a29e9", null ], - [ "atcac_aes_gcm_encrypt_finish", "a00662.html#a5bdd8ba09593bb7a2ce1f48df873250a", null ], - [ "atcac_aes_gcm_encrypt_start", "a00662.html#a856d7a2b4bdd82d01544cb4ee6048e48", null ], - [ "atcac_aes_gcm_encrypt_update", "a00662.html#a34f53a6f8a1ef018ef886961e4f60694", null ], - [ "atcac_pk_derive", "a00662.html#a7b82589420e299091e6b80459bfb90d8", null ], - [ "atcac_pk_free", "a00662.html#a757c5734289254c48f43cc26b7d5e6a4", null ], - [ "atcac_pk_init", "a00662.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f", null ], - [ "atcac_pk_init_pem", "a00662.html#a93806f5fc89ac97ab70e74dc9c41dd76", null ], - [ "atcac_pk_public", "a00662.html#acd482e1225ffba53b6bfe903e133a541", null ], - [ "atcac_pk_sign", "a00662.html#aef7827b56555e8efcc4646855335555f", null ], - [ "atcac_pk_verify", "a00662.html#a29573bbcca0c005de19ec709109538df", null ], - [ "atcac_sha256_hmac_finish", "a00662.html#ac5f016c7c9fa74cadbd76508e68ffe66", null ], - [ "atcac_sha256_hmac_init", "a00662.html#a107f3a8b6eb198dff510926061cabb43", null ], - [ "atcac_sha256_hmac_update", "a00662.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee", null ], - [ "atcac_sw_random", "a00662.html#a45fef91f1894c03f9fd94d2835a91342", null ], - [ "atcac_sw_sha1_finish", "a00662.html#abb02186059737ad5fb792665cf0b97dd", null ], - [ "atcac_sw_sha1_init", "a00662.html#a723448315d3bbc03a39104d36fd2b4bc", null ], - [ "atcac_sw_sha1_update", "a00662.html#a1b8bae42b5963d812f4cf2329807f778", null ], - [ "atcac_sw_sha2_256_finish", "a00662.html#a41146dace082e493f250425972a04d7f", null ], - [ "atcac_sw_sha2_256_init", "a00662.html#afb989c314b0afecd1202493a3cfee909", null ], - [ "atcac_sw_sha2_256_update", "a00662.html#a1caf63c685aa46025eda5e73f8d634b5", null ] -]; \ No newline at end of file diff --git a/a00665.html b/a00665.html deleted file mode 100644 index 2493d2f25..000000000 --- a/a00665.html +++ /dev/null @@ -1,267 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_openssl_interface.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_openssl_interface.h File Reference
-
-
- -

OpenSSL Integration Support. -More...

-
#include "atca_config_check.h"
-
- - - - - - - - - - - - - -

-Data Structures

struct  atcac_sha1_ctx
 
struct  atcac_sha2_256_ctx
 
struct  atcac_aes_cmac_ctx
 
struct  atcac_hmac_ctx
 
struct  atcac_pk_ctx
 
struct  atcac_x509_ctx
 
- - - - - - - - - - - - - -

-Macros

#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
 
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
 
#define ATCAC_AES_CMAC_EN   (DEFAULT_ENABLED)
 
#define ATCAC_AES_GCM_EN   (DEFAULT_ENABLED)
 
#define ATCAC_PKEY_EN   (DEFAULT_ENABLED)
 
#define HOSTLIB_CERT_EN   (DEFAULT_ENABLED)
 
- - - - - - - - - - - - - -

-Typedefs

-typedef struct atcac_sha1_ctx atcac_sha1_ctx_t
 
-typedef struct atcac_sha2_256_ctx atcac_sha2_256_ctx_t
 
-typedef struct atcac_aes_cmac_ctx atcac_aes_cmac_ctx_t
 
-typedef struct atcac_hmac_ctx atcac_hmac_ctx_t
 
-typedef struct atcac_pk_ctx atcac_pk_ctx_t
 
-typedef struct atcac_x509_ctx atcac_x509_ctx_t
 
-

Detailed Description

-

OpenSSL Integration Support.

- -

Macro Definition Documentation

- -

◆ ATCAC_AES_CMAC_EN

- -
-
- - - - -
#define ATCAC_AES_CMAC_EN   (DEFAULT_ENABLED)
-
-

Indicates if this module is a provider of an AES-CMAC implementation

- -
-
- -

◆ ATCAC_AES_GCM_EN

- -
-
- - - - -
#define ATCAC_AES_GCM_EN   (DEFAULT_ENABLED)
-
-

Indicates if this module is a provider of an AES-GCM implementation

- -
-
- -

◆ ATCAC_PKEY_EN

- -
-
- - - - -
#define ATCAC_PKEY_EN   (DEFAULT_ENABLED)
-
-

Indicates if this module is a provider of a generic asymmetric cryptography implementation

- -
-
- -

◆ ATCAC_SHA1_EN

- -
-
- - - - -
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
-
-

Indicates if this module is a provider of a SHA1 implementation

- -
-
- -

◆ ATCAC_SHA256_EN

- -
-
- - - - -
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
-
-

Indicates if this module is a provider of a SHA256 implementation

- -
-
- -

◆ HOSTLIB_CERT_EN

- -
-
- - - - -
#define HOSTLIB_CERT_EN   (DEFAULT_ENABLED)
-
-

Indicates if this module is a provider of x509 certificate handling

- -
-
-
-
- - - - diff --git a/a00665.js b/a00665.js deleted file mode 100644 index 53447a781..000000000 --- a/a00665.js +++ /dev/null @@ -1,15 +0,0 @@ -var a00665 = -[ - [ "atcac_sha1_ctx", "a01784.html", null ], - [ "atcac_sha2_256_ctx", "a01788.html", null ], - [ "atcac_aes_cmac_ctx", "a01800.html", null ], - [ "atcac_hmac_ctx", "a01792.html", null ], - [ "atcac_pk_ctx", "a01804.html", null ], - [ "atcac_x509_ctx", "a01780.html", null ], - [ "ATCAC_AES_CMAC_EN", "a00665.html#ace0d6e503c0db5222207053a7c537103", null ], - [ "ATCAC_AES_GCM_EN", "a00665.html#a2cf377cd3579f3ba898ec2391835cfd5", null ], - [ "ATCAC_PKEY_EN", "a00665.html#ae0b5716ff6baea028959764dc6d88e96", null ], - [ "ATCAC_SHA1_EN", "a00665.html#a8e3c7ddf3a16cbdcc42060cdee2d884e", null ], - [ "ATCAC_SHA256_EN", "a00665.html#a99dab792a5983a089fe816abc57bad25", null ], - [ "HOSTLIB_CERT_EN", "a00665.html#a82cc4e898685eda93b47e741e5b44137", null ] -]; \ No newline at end of file diff --git a/a00674.html b/a00674.html deleted file mode 100644 index cca5ab39f..000000000 --- a/a00674.html +++ /dev/null @@ -1,145 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_attrib.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_attrib.c File Reference
-
-
- -

PKCS11 Library Object Attributes Handling. -More...

-
#include "pkcs11_config.h"
-#include "pkcs11_attrib.h"
-#include "cryptoauthlib.h"
-#include "pkcs11_session.h"
-
- - - - - - - - - - - - - -

-Functions

CK_RV pkcs11_attrib_fill (CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize)
 Perform the nessasary checks and copy data into an attribute structure.
 
-CK_RV pkcs11_attrib_value (CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize)
 Helper function to write a numerical value to an attribute buffer.
 
-CK_RV pkcs11_attrib_false (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_attrib_true (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_attrib_empty (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-

Detailed Description

-

PKCS11 Library Object Attributes Handling.

- -
-
- - - - diff --git a/a00674.js b/a00674.js deleted file mode 100644 index 4b7f80c92..000000000 --- a/a00674.js +++ /dev/null @@ -1,5 +0,0 @@ -var a00674 = -[ - [ "pkcs11_attrib_fill", "a01450.html#ga8b1206a513938768655cdd541ffee9b3", null ], - [ "pkcs11_attrib_value", "a01450.html#ga50e9c64b899d1b2f78c9634298225303", null ] -]; \ No newline at end of file diff --git a/a00677.html b/a00677.html index e7bf1fac0..087d1c490 100644 --- a/a00677.html +++ b/a00677.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_attrib.h File Reference +CryptoAuthLib: atca_openssl_interface.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,69 +99,1248 @@
-
pkcs11_attrib.h File Reference
+
atca_openssl_interface.c File Reference
-

PKCS11 Library Object Attribute Handling. +

Crypto abstraction functions for external host side cryptography. More...

-
#include "cryptoauthlib.h"
-#include "cryptoki.h"
-#include "pkcs11_session.h"
+
#include "cryptoauthlib.h"
+#include "crypto/atca_crypto_sw.h"
+#include <openssl/bn.h>
+#include <openssl/bio.h>
+#include <openssl/cmac.h>
+#include <openssl/ec.h>
+#include <openssl/evp.h>
+#include <openssl/hmac.h>
+#include <openssl/pem.h>
+#include <openssl/rand.h>
+#include <openssl/x509.h>
+#include <openssl/x509v3.h>
- +

Data Structures

struct  pkcs11_attrib_model_s
struct  atca_evp_ctx
 
- - - - - - - -

-Typedefs

typedef CK_RV(* attrib_f) (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-typedef struct pkcs11_attrib_model_s pkcs11_attrib_model
 
-typedef struct pkcs11_attrib_model_spkcs11_attrib_model_ptr
 
- - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

CK_RV pkcs11_attrib_fill (CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize)
 Perform the nessasary checks and copy data into an attribute structure.
 
-CK_RV pkcs11_attrib_value (CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize)
 Helper function to write a numerical value to an attribute buffer.
 
-CK_RV pkcs11_attrib_false (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_attrib_true (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_attrib_empty (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
ATCA_STATUS atcac_sw_random (uint8_t *data, size_t data_size)
 Return Random Bytes.
 
ATCA_STATUS atcac_aes_gcm_aad_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len)
 Update the GCM context with additional authentication data (AAD)
 
ATCA_STATUS atcac_aes_gcm_encrypt_start (struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len)
 Initialize an AES-GCM context.
 
ATCA_STATUS atcac_aes_gcm_encrypt_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len)
 Encrypt a data using the initialized context.
 
ATCA_STATUS atcac_aes_gcm_encrypt_finish (struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len)
 Get the AES-GCM tag and free the context.
 
ATCA_STATUS atcac_aes_gcm_decrypt_start (struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len)
 Initialize an AES-GCM context for decryption.
 
ATCA_STATUS atcac_aes_gcm_decrypt_update (struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len)
 Decrypt ciphertext using the initialized context.
 
ATCA_STATUS atcac_aes_gcm_decrypt_finish (struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified)
 Compare the AES-GCM tag and free the context.
 
ATCA_STATUS atcac_sw_sha1_init (struct atcac_sha1_ctx *ctx)
 Initialize context for performing SHA1 hash in software.
 
ATCA_STATUS atcac_sw_sha1_update (struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size)
 Add data to a SHA1 hash.
 
ATCA_STATUS atcac_sw_sha1_finish (struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE])
 Complete the SHA1 hash in software and return the digest.
 
ATCA_STATUS atcac_aes_cmac_init (struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len)
 Initialize context for performing CMAC in software.
 
ATCA_STATUS atcac_aes_cmac_update (struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size)
 Update CMAC context with input data.
 
ATCA_STATUS atcac_aes_cmac_finish (struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size)
 Finish CMAC calculation and clear the CMAC context.
 
ATCA_STATUS atcac_sha256_hmac_init (struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len)
 Initialize context for performing HMAC (sha256) in software.
 
ATCA_STATUS atcac_sha256_hmac_update (struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size)
 Update HMAC context with input data.
 
ATCA_STATUS atcac_sha256_hmac_finish (struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len)
 Finish CMAC calculation and clear the HMAC context.
 
ATCA_STATUS atcac_pk_init (struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey)
 Set up a public/private key structure for use in asymmetric cryptographic functions.
 
ATCA_STATUS atcac_pk_init_pem (struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey)
 Set up a public/private key structure for use in asymmetric cryptographic functions.
 
ATCA_STATUS atcac_pk_free (struct atcac_pk_ctx *ctx)
 Free a public/private key structure.
 
ATCA_STATUS atcac_pk_public (struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen)
 Get the public key from the context.
 
ATCA_STATUS atcac_pk_sign (struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len)
 Perform a signature with the private key in the context.
 
ATCA_STATUS atcac_pk_verify (struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len)
 Perform a verify using the public key in the provided context.
 
ATCA_STATUS atcac_pk_derive (struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen)
 Execute the key agreement protocol for the provided keys (if they can)
 
+ATCA_STATUS atcac_parse_der (struct atcac_x509_ctx **cert, cal_buffer *der)
 
+ATCA_STATUS atcac_get_subject (const struct atcac_x509_ctx *cert, cal_buffer *cert_subject)
 
+ATCA_STATUS atcac_get_subj_public_key (const struct atcac_x509_ctx *cert, cal_buffer *subj_public_key)
 
+ATCA_STATUS atcac_get_subj_key_id (const struct atcac_x509_ctx *cert, cal_buffer *subj_public_key_id)
 
+ATCA_STATUS atcac_get_issuer (const struct atcac_x509_ctx *cert, cal_buffer *issuer_buf)
 
+ATCA_STATUS atcac_get_auth_key_id (const struct atcac_x509_ctx *cert, cal_buffer *auth_key_id)
 
+ATCA_STATUS atcac_get_issue_date (const struct atcac_x509_ctx *cert, cal_buffer *not_before, uint8_t *fmt)
 
+ATCA_STATUS atcac_get_expire_date (const struct atcac_x509_ctx *cert, cal_buffer *not_after, uint8_t *fmt)
 
+ATCA_STATUS atcac_get_cert_sn (const struct atcac_x509_ctx *cert, cal_buffer *cert_sn)
 
+void atcac_x509_free (void *cert)
 

Detailed Description

-

PKCS11 Library Object Attribute Handling.

+

Crypto abstraction functions for external host side cryptography.

-

Typedef Documentation

- -

◆ attrib_f

+

Function Documentation

+ +

◆ atcac_aes_cmac_finish()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_cmac_finish (struct atcac_aes_cmac_ctxctx,
uint8_t * cmac,
size_t * cmac_size 
)
+
+ +

Finish CMAC calculation and clear the CMAC context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxpointer to a aes-cmac context
[out]cmaccmac value
[in,out]cmac_sizelength of cmac
+
+
+ +
+
+ +

◆ atcac_aes_cmac_init()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_cmac_init (struct atcac_aes_cmac_ctxctx,
const uint8_t * key,
const uint8_t key_len 
)
+
+ +

Initialize context for performing CMAC in software.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxpointer to a aes-cmac context
[in]keykey value to use
[in]key_lenlength of the key
+
+
+ +
+
+ +

◆ atcac_aes_cmac_update()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_cmac_update (struct atcac_aes_cmac_ctxctx,
const uint8_t * data,
const size_t data_size 
)
+
+ +

Update CMAC context with input data.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxpointer to a aes-cmac context
[in]datainput data
[in]data_sizelength of input data
+
+
+ +
+
+ +

◆ atcac_aes_gcm_aad_update()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_aad_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * aad,
const size_t aad_len 
)
+
+ +

Update the GCM context with additional authentication data (AAD)

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxAES-GCM Context
[in]aadAdditional Authentication Data
[in]aad_lenLength of AAD
+
+
+ +
+
+ +

◆ atcac_aes_gcm_decrypt_finish()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_decrypt_finish (struct atcac_aes_gcm_ctxctx,
const uint8_t * tag,
size_t tag_len,
bool * is_verified 
)
+
+ +

Compare the AES-GCM tag and free the context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + +
[in]ctxAES-GCM Context
[in]tagGCM Tag to Verify
[in]tag_lenLength of the GCM tag
[out]is_verifiedTag verified as matching
+
+
+ +
+
+ +

◆ atcac_aes_gcm_decrypt_start()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_decrypt_start (struct atcac_aes_gcm_ctxctx,
const uint8_t * key,
const uint8_t key_len,
const uint8_t * iv,
const uint8_t iv_len 
)
+
+ +

Initialize an AES-GCM context for decryption.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + + +
[in]ctxAES-GCM Context
[in]keyAES Key
[in]key_lenLength of the AES key - should be 16 or 32
[in]ivInitialization vector input
[in]iv_lenLength of the initialization vector
+
+
+ +
+
+ +

◆ atcac_aes_gcm_decrypt_update()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_decrypt_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * ciphertext,
const size_t ct_len,
uint8_t * plaintext,
size_t * pt_len 
)
+
+ +

Decrypt ciphertext using the initialized context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + + +
[in]ctxAES-GCM Context
[in]ciphertextCiphertext to decrypt
[in]ct_lenLength of the ciphertext
[out]plaintextResulting decrypted plaintext
[in,out]pt_lenLength of the plaintext buffer
+
+
+ +
+
+ +

◆ atcac_aes_gcm_encrypt_finish()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_encrypt_finish (struct atcac_aes_gcm_ctxctx,
uint8_t * tag,
size_t tag_len 
)
+
+ +

Get the AES-GCM tag and free the context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxAES-GCM Context
[out]tagGCM Tag Result
[in]tag_lenLength of the GCM tag
+
+
+ +
+
+ +

◆ atcac_aes_gcm_encrypt_start()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_encrypt_start (struct atcac_aes_gcm_ctxctx,
const uint8_t * key,
const uint8_t key_len,
const uint8_t * iv,
const uint8_t iv_len 
)
+
+ +

Initialize an AES-GCM context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + + +
[in]ctxAES-GCM Context
[in]keyAES Key
[in]key_lenLength of the AES key - should be 16 or 32
[in]ivInitialization vector input
[in]iv_lenLength of the initialization vector
+
+
+ +
+
+ +

◆ atcac_aes_gcm_encrypt_update()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_aes_gcm_encrypt_update (struct atcac_aes_gcm_ctxctx,
const uint8_t * plaintext,
const size_t pt_len,
uint8_t * ciphertext,
size_t * ct_len 
)
+
+ +

Encrypt a data using the initialized context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + + +
[in]ctxAES-GCM Context
[in]plaintextInput buffer to encrypt
[in]pt_lenLength of the input
[out]ciphertextOutput buffer
[in,out]ct_lenLength of the ciphertext buffer
+
+
+ +
+
+ +

◆ atcac_pk_derive()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_pk_derive (struct atcac_pk_ctxprivate_ctx,
struct atcac_pk_ctxpublic_ctx,
uint8_t * buf,
size_t * buflen 
)
+
+ +

Execute the key agreement protocol for the provided keys (if they can)

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcac_pk_free()

+ +
+
+ + + + + + + + +
ATCA_STATUS atcac_pk_free (struct atcac_pk_ctxctx)
+
+ +

Free a public/private key structure.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + +
[in]ctxpointer to a pk context
+
+
+ +
+
+ +

◆ atcac_pk_init()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_pk_init (struct atcac_pk_ctxctx,
const uint8_t * buf,
size_t buflen,
uint8_t key_type,
bool pubkey 
)
+
+ +

Set up a public/private key structure for use in asymmetric cryptographic functions.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + +
[in]ctxpointer to a pk context
[in]bufbuffer containing a pem encoded key
[in]buflenlength of the input buffer
[in]pubkeybuffer is a public key
+
+
+ +
+
+ +

◆ atcac_pk_init_pem()

- + + + + + + + + + + + + + + + + + + + + + + + + + + +
typedef CK_RV(* attrib_f) (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)ATCA_STATUS atcac_pk_init_pem (struct atcac_pk_ctxctx,
const uint8_t * buf,
size_t buflen,
bool pubkey 
)
-

Populate an attribute based on the "object"

+ +

Set up a public/private key structure for use in asymmetric cryptographic functions.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + +
[in]ctxpointer to a pk context
[in]bufbuffer containing a pem encoded key
[in]buflenlength of the input buffer
[in]pubkeybuffer is a public key
+
+
+ +
+
+ +

◆ atcac_pk_public()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_pk_public (struct atcac_pk_ctxctx,
uint8_t * buf,
size_t * buflen 
)
+
+ +

Get the public key from the context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcac_pk_sign()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_pk_sign (struct atcac_pk_ctxctx,
const uint8_t * digest,
size_t dig_len,
uint8_t * signature,
size_t * sig_len 
)
+
+ +

Perform a signature with the private key in the context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcac_pk_verify()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_pk_verify (struct atcac_pk_ctxctx,
const uint8_t * digest,
size_t dig_len,
const uint8_t * signature,
size_t sig_len 
)
+
+ +

Perform a verify using the public key in the provided context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcac_sha256_hmac_finish()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_sha256_hmac_finish (struct atcac_hmac_ctxctx,
uint8_t * digest,
size_t * digest_len 
)
+
+ +

Finish CMAC calculation and clear the HMAC context.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxpointer to a sha256-hmac context
[out]digesthmac value
[in,out]digest_lenlength of hmac
+
+
+ +
+
+ +

◆ atcac_sha256_hmac_init()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_sha256_hmac_init (struct atcac_hmac_ctxctx,
struct atcac_sha2_256_ctxsha256_ctx,
const uint8_t * key,
const uint8_t key_len 
)
+
+ +

Initialize context for performing HMAC (sha256) in software.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + + +
[in]ctxpointer to a sha256-hmac context
[in]sha256_ctxpointer to a sha256 context
[in]keykey value to use
[in]key_lenlength of the key
+
+
+ +
+
+ +

◆ atcac_sha256_hmac_update()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_sha256_hmac_update (struct atcac_hmac_ctxctx,
const uint8_t * data,
size_t data_size 
)
+
+ +

Update HMAC context with input data.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxpointer to a sha256-hmac context
[in]datainput data
[in]data_sizelength of input data
+
+
+ +
+
+ +

◆ atcac_sw_random()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_sw_random (uint8_t * data,
size_t data_size 
)
+
+ +

Return Random Bytes.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atcac_sw_sha1_finish()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_sw_sha1_finish (struct atcac_sha1_ctxctx,
uint8_t digest[ATCA_SHA1_DIGEST_SIZE] 
)
+
+ +

Complete the SHA1 hash in software and return the digest.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + +
[in]ctxpointer to a hash context
[out]digestoutput buffer (20 bytes)
+
+
+ +
+
+ +

◆ atcac_sw_sha1_init()

+ +
+
+ + + + + + + + +
ATCA_STATUS atcac_sw_sha1_init (struct atcac_sha1_ctxctx)
+
+ +

Initialize context for performing SHA1 hash in software.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + +
[in]ctxpointer to a hash context
+
+
+ +
+
+ +

◆ atcac_sw_sha1_update()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcac_sw_sha1_update (struct atcac_sha1_ctxctx,
const uint8_t * data,
size_t data_size 
)
+
+ +

Add data to a SHA1 hash.

+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
Parameters
+ + + + +
[in]ctxpointer to a hash context
[in]datainput data buffer
[in]data_sizeinput data length
+
+
@@ -170,7 +1349,7 @@

diff --git a/a00677.js b/a00677.js index b04cfacc9..5cc4ca3e9 100644 --- a/a00677.js +++ b/a00677.js @@ -1,7 +1,28 @@ var a00677 = [ - [ "pkcs11_attrib_model_s", "a01820.html", null ], - [ "attrib_f", "a00677.html#ac11a80ac0cea6f244191654180db0693", null ], - [ "pkcs11_attrib_fill", "a01450.html#ga8b1206a513938768655cdd541ffee9b3", null ], - [ "pkcs11_attrib_value", "a01450.html#ga50e9c64b899d1b2f78c9634298225303", null ] + [ "atca_evp_ctx", "a01827.html", null ], + [ "atcac_aes_cmac_finish", "a00677.html#a9fb429f011c7df55055763f41b896f28", null ], + [ "atcac_aes_cmac_init", "a00677.html#a17af2d47faed0774e9277be42512b0f4", null ], + [ "atcac_aes_cmac_update", "a00677.html#a9c6a8dc222080952c2541db9cf7cd3c0", null ], + [ "atcac_aes_gcm_aad_update", "a00677.html#a7cc388d11506f9ef030994fab99cfaa7", null ], + [ "atcac_aes_gcm_decrypt_finish", "a00677.html#ac9cde02547c1ed0122c87f0a156ee268", null ], + [ "atcac_aes_gcm_decrypt_start", "a00677.html#a473ff3c449375989e846d66342333b3a", null ], + [ "atcac_aes_gcm_decrypt_update", "a00677.html#a04b292df2006e31743224b66e16a29e9", null ], + [ "atcac_aes_gcm_encrypt_finish", "a00677.html#a5bdd8ba09593bb7a2ce1f48df873250a", null ], + [ "atcac_aes_gcm_encrypt_start", "a00677.html#a856d7a2b4bdd82d01544cb4ee6048e48", null ], + [ "atcac_aes_gcm_encrypt_update", "a00677.html#a34f53a6f8a1ef018ef886961e4f60694", null ], + [ "atcac_pk_derive", "a00677.html#a7b82589420e299091e6b80459bfb90d8", null ], + [ "atcac_pk_free", "a00677.html#a757c5734289254c48f43cc26b7d5e6a4", null ], + [ "atcac_pk_init", "a00677.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f", null ], + [ "atcac_pk_init_pem", "a00677.html#a93806f5fc89ac97ab70e74dc9c41dd76", null ], + [ "atcac_pk_public", "a00677.html#acd482e1225ffba53b6bfe903e133a541", null ], + [ "atcac_pk_sign", "a00677.html#aef7827b56555e8efcc4646855335555f", null ], + [ "atcac_pk_verify", "a00677.html#a29573bbcca0c005de19ec709109538df", null ], + [ "atcac_sha256_hmac_finish", "a00677.html#ac5f016c7c9fa74cadbd76508e68ffe66", null ], + [ "atcac_sha256_hmac_init", "a00677.html#a107f3a8b6eb198dff510926061cabb43", null ], + [ "atcac_sha256_hmac_update", "a00677.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee", null ], + [ "atcac_sw_random", "a00677.html#a45fef91f1894c03f9fd94d2835a91342", null ], + [ "atcac_sw_sha1_finish", "a00677.html#abb02186059737ad5fb792665cf0b97dd", null ], + [ "atcac_sw_sha1_init", "a00677.html#a723448315d3bbc03a39104d36fd2b4bc", null ], + [ "atcac_sw_sha1_update", "a00677.html#a1b8bae42b5963d812f4cf2329807f778", null ] ]; \ No newline at end of file diff --git a/a00680.html b/a00680.html index 94fcc74f5..03323024b 100644 --- a/a00680.html +++ b/a00680.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_cert.c File Reference +CryptoAuthLib: atca_openssl_interface.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,67 +98,214 @@
-
pkcs11_cert.c File Reference
+Data Structures | +Macros | +Typedefs
+
atca_openssl_interface.h File Reference
-

PKCS11 Library Certificate Handling. +

OpenSSL Integration Support. More...

-
#include "cryptoauthlib.h"
-#include "atcacert/atcacert_def.h"
-#include "atcacert/atcacert_client.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_token.h"
-#include "pkcs11_cert.h"
-#include "pkcs11_os.h"
-#include "pkcs11_util.h"
-#include "pkcs11_slot.h"
+ - - - - - - - - - + + + + + + + + + + + + + + + + +

-Functions

-CK_RV pkcs11_cert_load (pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pAttribute, ATCADevice device)
 
-CK_RV pkcs11_cert_x509_write (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_cert_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_cert_clear_object_cache (pkcs11_object_ptr pObject)
 

+Data Structures

struct  atcac_sha1_ctx
 
struct  atcac_sha2_256_ctx
 
struct  atcac_sha2_384_ctx
 
struct  atcac_sha2_512_ctx
 
struct  atcac_aes_cmac_ctx
 
struct  atcac_hmac_ctx
 
struct  atcac_pk_ctx
 
struct  atcac_x509_ctx
 
- - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

-Variables

const pkcs11_attrib_model pkcs11_cert_x509public_attributes []
 
-const CK_ULONG pkcs11_cert_x509public_attributes_count = (CK_ULONG)(sizeof( pkcs11_cert_x509public_attributes ) / sizeof( pkcs11_cert_x509public_attributes [0]))
 
const pkcs11_attrib_model pkcs11_cert_wtlspublic_attributes []
 
-const CK_ULONG pkcs11_cert_wtlspublic_attributes_count = (CK_ULONG)(sizeof( pkcs11_cert_wtlspublic_attributes ) / sizeof( pkcs11_cert_wtlspublic_attributes [0]))
 
const pkcs11_attrib_model pkcs11_cert_x509_attributes []
 
-const CK_ULONG pkcs11_cert_x509_attributes_count = (CK_ULONG)(sizeof( pkcs11_cert_x509_attributes ) / sizeof( pkcs11_cert_x509_attributes [0]))
 

+Macros

#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
 
#define ATCAC_SHA256_EN   (FEATURE_ENABLED)
 
#define ATCAC_SHA384_EN   (FEATURE_DISABLED)
 
#define ATCAC_SHA512_EN   (FEATURE_DISABLED)
 
#define ATCAC_AES_CMAC_EN   (DEFAULT_ENABLED)
 
#define ATCAC_AES_GCM_EN   (DEFAULT_ENABLED)
 
#define ATCAC_PKEY_EN   (DEFAULT_ENABLED)
 
#define HOSTLIB_CERT_EN   (DEFAULT_ENABLED)
 
+ + + + + + + + + + + + + + + + +

+Typedefs

+typedef struct atcac_sha1_ctx atcac_sha1_ctx_t
 
+typedef struct atcac_sha2_256_ctx atcac_sha2_256_ctx_t
 
+typedef struct atcac_sha2_384_ctx atcac_sha2_384_ctx_t
 
+typedef struct atcac_sha2_512_ctx atcac_sha2_512_ctx_t
 
+typedef struct atcac_aes_cmac_ctx atcac_aes_cmac_ctx_t
 
+typedef struct atcac_hmac_ctx atcac_hmac_ctx_t
 
+typedef struct atcac_pk_ctx atcac_pk_ctx_t
 
+typedef struct atcac_x509_ctx atcac_x509_ctx_t
 

Detailed Description

-

PKCS11 Library Certificate Handling.

+

OpenSSL Integration Support.

-
+

Macro Definition Documentation

+ +

◆ ATCAC_AES_CMAC_EN

+ +
+
+ + + + +
#define ATCAC_AES_CMAC_EN   (DEFAULT_ENABLED)
+
+

Indicates if this module is a provider of an AES-CMAC implementation

+ +
+
+ +

◆ ATCAC_AES_GCM_EN

+ +
+
+ + + + +
#define ATCAC_AES_GCM_EN   (DEFAULT_ENABLED)
+
+

Indicates if this module is a provider of an AES-GCM implementation

+ +
+
+ +

◆ ATCAC_PKEY_EN

+ +
+
+ + + + +
#define ATCAC_PKEY_EN   (DEFAULT_ENABLED)
+
+

Indicates if this module is a provider of a generic asymmetric cryptography implementation

+ +
+
+ +

◆ ATCAC_SHA1_EN

+ +
+
+ + + + +
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
+
+

Indicates if this module is a provider of a SHA1 implementation

+ +
+
+ +

◆ ATCAC_SHA256_EN

+ +
+
+ + + + +
#define ATCAC_SHA256_EN   (FEATURE_ENABLED)
+
+

Indicates if this module is a provider of a SHA256 implementation

+ +
+
+ +

◆ ATCAC_SHA384_EN

+ +
+
+ + + + +
#define ATCAC_SHA384_EN   (FEATURE_DISABLED)
+
+

Indicates if this module is a provider of a SHA384 implementation

+

Disabled by default. Use FEATURE_ENABLED to use SHA384

+ +
+
+ +

◆ ATCAC_SHA512_EN

+ +
+
+ + + + +
#define ATCAC_SHA512_EN   (FEATURE_DISABLED)
+
+

Indicates if this module is a provider of a SHA512 implementation

+

Disabled by default. Use FEATURE_ENABLED to use SHA512

+ +
+
+ +

◆ HOSTLIB_CERT_EN

+ +
+
+ + + + +
#define HOSTLIB_CERT_EN   (DEFAULT_ENABLED)
+
+

Indicates if this module is a provider of x509 certificate handling

+ +
+
+
diff --git a/a00680.js b/a00680.js index 4ec8d99a9..fcbdb1bec 100644 --- a/a00680.js +++ b/a00680.js @@ -1,6 +1,19 @@ var a00680 = [ - [ "pkcs11_cert_wtlspublic_attributes", "a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80", null ], - [ "pkcs11_cert_x509_attributes", "a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7", null ], - [ "pkcs11_cert_x509public_attributes", "a01450.html#ga8de4193ede04a12ab4e44b8df9eec478", null ] + [ "atcac_sha1_ctx", "a01803.html", null ], + [ "atcac_sha2_256_ctx", "a01831.html", null ], + [ "atcac_sha2_384_ctx", "a01835.html", null ], + [ "atcac_sha2_512_ctx", "a01839.html", null ], + [ "atcac_aes_cmac_ctx", "a01815.html", null ], + [ "atcac_hmac_ctx", "a01807.html", null ], + [ "atcac_pk_ctx", "a01819.html", null ], + [ "atcac_x509_ctx", "a01799.html", null ], + [ "ATCAC_AES_CMAC_EN", "a00680.html#ace0d6e503c0db5222207053a7c537103", null ], + [ "ATCAC_AES_GCM_EN", "a00680.html#a2cf377cd3579f3ba898ec2391835cfd5", null ], + [ "ATCAC_PKEY_EN", "a00680.html#ae0b5716ff6baea028959764dc6d88e96", null ], + [ "ATCAC_SHA1_EN", "a00680.html#a8e3c7ddf3a16cbdcc42060cdee2d884e", null ], + [ "ATCAC_SHA256_EN", "a00680.html#a99dab792a5983a089fe816abc57bad25", null ], + [ "ATCAC_SHA384_EN", "a00680.html#a372b1be02c2a55afbe5eda47580c7ee8", null ], + [ "ATCAC_SHA512_EN", "a00680.html#a7815fa6e2b361a72ae88bb26bea8a9ad", null ], + [ "HOSTLIB_CERT_EN", "a00680.html#a82cc4e898685eda93b47e741e5b44137", null ] ]; \ No newline at end of file diff --git a/a00683.html b/a00683.html deleted file mode 100644 index eb219bb39..000000000 --- a/a00683.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_cert.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_cert.h File Reference
-
-
- -

PKCS11 Library Certificate Handling. -More...

-
#include "pkcs11_object.h"
-
- - - - - - - - - -

-Functions

-CK_RV pkcs11_cert_x509_write (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_cert_load (pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pAttribute, ATCADevice device)
 
-CK_RV pkcs11_cert_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_cert_clear_object_cache (pkcs11_object_ptr pObject)
 
- - - - - - - - - - - - - -

-Variables

const pkcs11_attrib_model pkcs11_cert_x509public_attributes []
 
-const CK_ULONG pkcs11_cert_x509public_attributes_count
 
const pkcs11_attrib_model pkcs11_cert_wtlspublic_attributes []
 
-const CK_ULONG pkcs11_cert_wtlspublic_attributes_count
 
const pkcs11_attrib_model pkcs11_cert_x509_attributes []
 
-const CK_ULONG pkcs11_cert_x509_attributes_count
 
-

Detailed Description

-

PKCS11 Library Certificate Handling.

- -
-
- - - - diff --git a/a00683.js b/a00683.js deleted file mode 100644 index 30bb017d1..000000000 --- a/a00683.js +++ /dev/null @@ -1,6 +0,0 @@ -var a00683 = -[ - [ "pkcs11_cert_wtlspublic_attributes", "a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80", null ], - [ "pkcs11_cert_x509_attributes", "a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7", null ], - [ "pkcs11_cert_x509public_attributes", "a01450.html#ga8de4193ede04a12ab4e44b8df9eec478", null ] -]; \ No newline at end of file diff --git a/a00689.html b/a00689.html index 423b5a891..692da6b06 100644 --- a/a00689.html +++ b/a00689.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_debug.c File Reference +CryptoAuthLib: pkcs11_attrib.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,25 +97,47 @@
-
pkcs11_debug.c File Reference
+ +
pkcs11_attrib.c File Reference
-

PKCS11 Library Debugging. +

PKCS11 Library Object Attributes Handling. More...

#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_os.h"
-#include "atca_helpers.h"
-

Detailed Description

-

PKCS11 Library Debugging.

+#include "pkcs11_attrib.h"
+#include "cryptoauthlib.h"
+#include "pkcs11_session.h"
+
+ + + + + + + + + + + + + +

+Functions

CK_RV pkcs11_attrib_fill (CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize)
 Perform the nessasary checks and copy data into an attribute structure.
 
+CK_RV pkcs11_attrib_value (CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize)
 Helper function to write a numerical value to an attribute buffer.
 
+CK_RV pkcs11_attrib_false (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_attrib_true (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_attrib_empty (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+

Detailed Description

+

PKCS11 Library Object Attributes Handling.

diff --git a/a00692.html b/a00692.html index dcc457ea6..e2b4cbc20 100644 --- a/a00692.html +++ b/a00692.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_debug.h File Reference +CryptoAuthLib: pkcs11_attrib.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,39 +98,79 @@
-
pkcs11_debug.h File Reference
+Data Structures | +Typedefs | +Functions
+
pkcs11_attrib.h File Reference
-

PKCS11 Library Debugging. +

PKCS11 Library Object Attribute Handling. More...

-
#include "pkcs11_config.h"
+
#include "cryptoauthlib.h"
+#include "cryptoki.h"
+#include "pkcs11_session.h"
- - - - - - - - - + + + +

-Macros

-#define PKCS11_DEBUG_NOFILE(...)
 
-#define PKCS11_DEBUG(...)
 
-#define PKCS11_DEBUG_RETURN(x)   { return x; }
 
-#define pkcs11_debug_attributes(x, y)
 

+Data Structures

struct  pkcs11_attrib_model_s
 
+ + + + + + + +

+Typedefs

typedef CK_RV(* attrib_f) (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+typedef struct pkcs11_attrib_model_s pkcs11_attrib_model
 
+typedef struct pkcs11_attrib_model_spkcs11_attrib_model_ptr
 
+ + + + + + + + + + + + +

+Functions

CK_RV pkcs11_attrib_fill (CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize)
 Perform the nessasary checks and copy data into an attribute structure.
 
+CK_RV pkcs11_attrib_value (CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize)
 Helper function to write a numerical value to an attribute buffer.
 
+CK_RV pkcs11_attrib_false (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_attrib_true (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_attrib_empty (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 

Detailed Description

-

PKCS11 Library Debugging.

+

PKCS11 Library Object Attribute Handling.

-
+

Typedef Documentation

+ +

◆ attrib_f

+ +
+
+ + + + +
typedef CK_RV(* attrib_f) (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
+
+

Populate an attribute based on the "object"

+ +
+
+
diff --git a/a00698.html b/a00698.html index aaf1762c7..f7840360e 100644 --- a/a00698.html +++ b/a00698.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_digest.h File Reference +CryptoAuthLib: pkcs11_cert.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,43 +98,58 @@
-
pkcs11_digest.h File Reference
+Functions | +Variables
+
pkcs11_cert.h File Reference
-

PKCS11 Library Digest (SHA256) Handling. +

PKCS11 Library Certificate Handling. More...

-
#include "cryptoki.h"
+
#include "pkcs11_object.h"
- - - - - - - - - - - - + + + + + + + + +

Functions

-CK_RV pkcs11_digest_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
 Initializes a message-digesting operation using the specified mechanism in the specified session.
 
-CK_RV pkcs11_digest (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Digest the specified data in a one-pass operation and return the resulting digest.
 
-CK_RV pkcs11_digest_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part digesting operation.
 
-CK_RV pkcs11_digest_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Finishes a multiple-part digesting operation.
 
+CK_RV pkcs11_cert_x509_write (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_cert_load (pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pAttribute, ATCADevice device)
 
+CK_RV pkcs11_cert_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
+CK_RV pkcs11_cert_clear_object_cache (pkcs11_object_ptr pObject)
 
+ + + + + + + + + + + + +

+Variables

const pkcs11_attrib_model pkcs11_cert_x509public_attributes []
 
+const CK_ULONG pkcs11_cert_x509public_attributes_count
 
const pkcs11_attrib_model pkcs11_cert_wtlspublic_attributes []
 
+const CK_ULONG pkcs11_cert_wtlspublic_attributes_count
 
const pkcs11_attrib_model pkcs11_cert_x509_attributes []
 
+const CK_ULONG pkcs11_cert_x509_attributes_count
 

Detailed Description

-

PKCS11 Library Digest (SHA256) Handling.

+

PKCS11 Library Certificate Handling.

diff --git a/a00698.js b/a00698.js index b11120b21..bb543b89f 100644 --- a/a00698.js +++ b/a00698.js @@ -1,7 +1,6 @@ var a00698 = [ - [ "pkcs11_digest", "a00698.html#a81936ce8429c7a97bc42921589c1522e", null ], - [ "pkcs11_digest_final", "a00698.html#abd1c9ccc6899b550d241f007fd023d6b", null ], - [ "pkcs11_digest_init", "a00698.html#a903aed9c7d096dced1233a11539c781d", null ], - [ "pkcs11_digest_update", "a00698.html#a87a4b63b1a4ced5e40a1cc0bbc88599d", null ] + [ "pkcs11_cert_wtlspublic_attributes", "a01477.html#gabc10a1f1b90bc7d2fb047db0af539e80", null ], + [ "pkcs11_cert_x509_attributes", "a01477.html#gafa471eb33699e2cba5dc3cc50a2d8df7", null ], + [ "pkcs11_cert_x509public_attributes", "a01477.html#ga8de4193ede04a12ab4e44b8df9eec478", null ] ]; \ No newline at end of file diff --git a/a00701.html b/a00701.html deleted file mode 100644 index 1dbe81162..000000000 --- a/a00701.html +++ /dev/null @@ -1,161 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_encrypt.c File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_encrypt.c File Reference
-
-
- -

PKCS11 Library Encrypt Support. -More...

-
#include "cryptoauthlib.h"
-#include <limits.h>
-#include "pkcs11_config.h"
-#include "pkcs11_encrypt.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_object.h"
-#include "pkcs11_session.h"
-#include "pkcs11_util.h"
-#include "pkcs11_slot.h"
-
- - - - - - - - - - - - - - - - - - - -

-Functions

-CK_RV pkcs11_encrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
-CK_RV pkcs11_encrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
-CK_RV pkcs11_encrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Finishes a multiple-part encryption operation.
 
-CK_RV pkcs11_decrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
-CK_RV pkcs11_decrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
-CK_RV pkcs11_decrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Finishes a multiple-part decryption operation.
 
-

Detailed Description

-

PKCS11 Library Encrypt Support.

- -
-
- - - - diff --git a/a00701.js b/a00701.js deleted file mode 100644 index e744931e7..000000000 --- a/a00701.js +++ /dev/null @@ -1,5 +0,0 @@ -var a00701 = -[ - [ "pkcs11_decrypt_final", "a01450.html#ga045a35287c46a29da2ad13e700087e0d", null ], - [ "pkcs11_encrypt_final", "a01450.html#gaae94f85980031bec34148341efd537e3", null ] -]; \ No newline at end of file diff --git a/a00704.html b/a00704.html index 76bfc4a89..fa18b6eda 100644 --- a/a00704.html +++ b/a00704.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_encrypt.h File Reference +CryptoAuthLib: pkcs11_debug.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,54 +97,25 @@
- -
pkcs11_encrypt.h File Reference
+
pkcs11_debug.c File Reference
-

PKCS11 Library AES Support. +

PKCS11 Library Debugging. More...

-
#include "cryptoki.h"
-
- - - - - - - - - - - - - - - - - - - -

-Functions

-CK_RV pkcs11_encrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
-CK_RV pkcs11_encrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
-CK_RV pkcs11_encrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Finishes a multiple-part encryption operation.
 
-CK_RV pkcs11_decrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
-CK_RV pkcs11_decrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
-CK_RV pkcs11_decrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Finishes a multiple-part decryption operation.
 
-

Detailed Description

-

PKCS11 Library AES Support.

+
#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_os.h"
+#include "atca_helpers.h"
+

Detailed Description

+

PKCS11 Library Debugging.

diff --git a/a00704.js b/a00704.js deleted file mode 100644 index 371c1a22e..000000000 --- a/a00704.js +++ /dev/null @@ -1,5 +0,0 @@ -var a00704 = -[ - [ "pkcs11_decrypt_final", "a01450.html#ga045a35287c46a29da2ad13e700087e0d", null ], - [ "pkcs11_encrypt_final", "a01450.html#gaae94f85980031bec34148341efd537e3", null ] -]; \ No newline at end of file diff --git a/a00707.html b/a00707.html index 6ad150c00..b75604797 100644 --- a/a00707.html +++ b/a00707.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_find.c File Reference +CryptoAuthLib: pkcs11_debug.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,49 +98,39 @@
-
pkcs11_find.c File Reference
+Macros
+
pkcs11_debug.h File Reference
-

PKCS11 Library Object Find/Searching. +

PKCS11 Library Debugging. More...

-
#include "cryptoauthlib.h"
-#include "atcacert/atcacert_def.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_os.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_session.h"
-#include "pkcs11_find.h"
-#include "pkcs11_util.h"
-#include "pkcs11_cert.h"
+
#include "pkcs11_config.h"
- - - - - - - - - + + + + + + + + +

-Functions

-CK_RV pkcs11_find_init (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_find_continue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 
-CK_RV pkcs11_find_finish (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_find_get_attribute (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 

+Macros

+#define PKCS11_DEBUG_NOFILE(...)
 
+#define PKCS11_DEBUG(...)
 
+#define PKCS11_DEBUG_RETURN(x)   { return x; }
 
+#define pkcs11_debug_attributes(x, y)
 

Detailed Description

-

PKCS11 Library Object Find/Searching.

+

PKCS11 Library Debugging.

diff --git a/a00710.html b/a00710.html deleted file mode 100644 index 2c98295ed..000000000 --- a/a00710.html +++ /dev/null @@ -1,139 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_find.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_find.h File Reference
-
-
- -

PKCS11 Library Object Find/Searching. -More...

-
#include "cryptoki.h"
-#include "pkcs11_object.h"
-
- - - - - - - - - -

-Functions

-CK_RV pkcs11_find_init (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_find_continue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 
-CK_RV pkcs11_find_finish (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_find_get_attribute (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-

Detailed Description

-

PKCS11 Library Object Find/Searching.

- -
-
- - - - diff --git a/a00713.html b/a00713.html index 769af7a48..67a1b8439 100644 --- a/a00713.html +++ b/a00713.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_info.c File Reference +CryptoAuthLib: pkcs11_digest.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,48 +98,43 @@
-
pkcs11_info.c File Reference
+Functions
+
pkcs11_digest.h File Reference
-

PKCS11 Library Information Functions. +

PKCS11 Library Digest (SHA256) Handling. More...

-
#include "cryptoauthlib.h"
-#include "pkcs11_config.h"
-#include "pkcs11_init.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_session.h"
-#include "pkcs11_util.h"
-#include "pkcs11_info.h"
-#include <stdio.h>
+
#include "cryptoki.h"
- - - -

Functions

-CK_RV pkcs11_get_lib_info (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
- - - - - + + + + + + + + + + + +

-Variables

-const char pkcs11_lib_manufacturer_id [] = "Microchip Technology Inc"
 
-const char pkcs11_lib_description [] = "Cryptoauthlib PKCS11 Interface"
 
+CK_RV pkcs11_digest_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
 Initializes a message-digesting operation using the specified mechanism in the specified session.
 
+CK_RV pkcs11_digest (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Digest the specified data in a one-pass operation and return the resulting digest.
 
+CK_RV pkcs11_digest_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part digesting operation.
 
+CK_RV pkcs11_digest_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Finishes a multiple-part digesting operation.
 

Detailed Description

-

PKCS11 Library Information Functions.

+

PKCS11 Library Digest (SHA256) Handling.

diff --git a/a00713.js b/a00713.js index 07e83b104..c665629c4 100644 --- a/a00713.js +++ b/a00713.js @@ -1,4 +1,7 @@ var a00713 = [ - [ "pkcs11_get_lib_info", "a01450.html#gaae56826104269ca730066136fb3eb995", null ] + [ "pkcs11_digest", "a00713.html#a81936ce8429c7a97bc42921589c1522e", null ], + [ "pkcs11_digest_final", "a00713.html#abd1c9ccc6899b550d241f007fd023d6b", null ], + [ "pkcs11_digest_init", "a00713.html#a903aed9c7d096dced1233a11539c781d", null ], + [ "pkcs11_digest_update", "a00713.html#a87a4b63b1a4ced5e40a1cc0bbc88599d", null ] ]; \ No newline at end of file diff --git a/a00716.html b/a00716.html index 13144006e..fc6fcd0d5 100644 --- a/a00716.html +++ b/a00716.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_info.h File Reference +CryptoAuthLib: pkcs11_encrypt.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,41 +98,63 @@
-
pkcs11_info.h File Reference
+Functions
+
pkcs11_encrypt.c File Reference
-

PKCS11 Library Information Functions. +

PKCS11 Library Encrypt Support. More...

-
#include "cryptoki.h"
+
#include "cryptoauthlib.h"
+#include <limits.h>
+#include "pkcs11_config.h"
+#include "pkcs11_encrypt.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_init.h"
+#include "pkcs11_object.h"
+#include "pkcs11_session.h"
+#include "pkcs11_util.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_key.h"
- - - -

Functions

-CK_RV pkcs11_get_lib_info (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
- - - - - + + + + + + + + + + + + + + + + + +

-Variables

-const char pkcs11_lib_manufacturer_id []
 
-const char pkcs11_lib_description []
 
+CK_RV pkcs11_encrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
+CK_RV pkcs11_encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
+CK_RV pkcs11_encrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
+CK_RV pkcs11_encrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Finishes a multiple-part encryption operation.
 
+CK_RV pkcs11_decrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
+CK_RV pkcs11_decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
+CK_RV pkcs11_decrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
+CK_RV pkcs11_decrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Finishes a multiple-part decryption operation.
 

Detailed Description

-

PKCS11 Library Information Functions.

+

PKCS11 Library Encrypt Support.

diff --git a/a00716.js b/a00716.js index 43afd2bf0..3bf22a4eb 100644 --- a/a00716.js +++ b/a00716.js @@ -1,4 +1,5 @@ var a00716 = [ - [ "pkcs11_get_lib_info", "a01450.html#gaae56826104269ca730066136fb3eb995", null ] + [ "pkcs11_decrypt_final", "a01477.html#ga045a35287c46a29da2ad13e700087e0d", null ], + [ "pkcs11_encrypt_final", "a01477.html#gaae94f85980031bec34148341efd537e3", null ] ]; \ No newline at end of file diff --git a/a00719.html b/a00719.html index aa443b041..82c47c272 100644 --- a/a00719.html +++ b/a00719.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_init.c File Reference +CryptoAuthLib: pkcs11_encrypt.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,67 +99,52 @@
-
pkcs11_init.c File Reference
+
pkcs11_encrypt.h File Reference
-

PKCS11 Library Init/Deinit. +

PKCS11 Library AES Support. More...

-
#include "atca_device.h"
-#include "hal/atca_hal.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_os.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_object.h"
-#include "pkcs11_session.h"
-#include "cryptoauthlib.h"
+
#include "cryptoki.h"
- - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

-pkcs11_lib_ctx_ptr pkcs11_get_context (void)
 Retrieve the current library context.
 
-CK_RV pkcs11_lock_context (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_context (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_lock_device (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_device (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_lock_both (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_both (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_init_check (pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock)
 Check if the library is initialized properly.
 
CK_RV pkcs11_init (CK_C_INITIALIZE_ARGS const *pInitArgs)
 Initializes the PKCS11 API Library for Cryptoauthlib.
 
CK_RV pkcs11_deinit (CK_VOID_PTR pReserved)
 
+CK_RV pkcs11_encrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
+CK_RV pkcs11_encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
+CK_RV pkcs11_encrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
+CK_RV pkcs11_encrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Finishes a multiple-part encryption operation.
 
+CK_RV pkcs11_decrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
+CK_RV pkcs11_decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
+CK_RV pkcs11_decrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
+CK_RV pkcs11_decrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Finishes a multiple-part decryption operation.
 

Detailed Description

-

PKCS11 Library Init/Deinit.

-

Copyright (c) 2017 Microchip Technology Inc. All rights reserved.

+

PKCS11 Library AES Support.

diff --git a/a00719.js b/a00719.js index 5fecf2a4f..77a51d0d1 100644 --- a/a00719.js +++ b/a00719.js @@ -1,7 +1,5 @@ var a00719 = [ - [ "pkcs11_deinit", "a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4", null ], - [ "pkcs11_get_context", "a01450.html#gae0e3060e6ae0dfc17a35881c223d8123", null ], - [ "pkcs11_init", "a01450.html#gaab9ef494fdc21911e700f2b9d62547ec", null ], - [ "pkcs11_init_check", "a01450.html#gadd899ffeae0146c08b249e3f551e21f8", null ] + [ "pkcs11_decrypt_final", "a01477.html#ga045a35287c46a29da2ad13e700087e0d", null ], + [ "pkcs11_encrypt_final", "a01477.html#gaae94f85980031bec34148341efd537e3", null ] ]; \ No newline at end of file diff --git a/a00722.html b/a00722.html index af933439a..52a864cc7 100644 --- a/a00722.html +++ b/a00722.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_init.h File Reference +CryptoAuthLib: pkcs11_find.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,123 +98,49 @@
-
pkcs11_init.h File Reference
+
pkcs11_find.c File Reference
-

PKCS11 Library Initialization & Context. +

PKCS11 Library Object Find/Searching. More...

-
#include "atca_compiler.h"
+
#include "cryptoauthlib.h"
+#include "atcacert/atcacert_def.h"
#include "pkcs11_config.h"
-#include "pkcs11_os.h"
-#include "cryptoauthlib.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_init.h"
+#include "pkcs11_os.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_session.h"
+#include "pkcs11_find.h"
+#include "pkcs11_util.h"
+#include "pkcs11_cert.h"
- - - - - - - - - -

-Data Structures

struct  pkcs11_dev_ctx
 
struct  pkcs11_dev_res
 
struct  pkcs11_dev_state
 
struct  pkcs11_lib_ctx_s
 
- - - - - - - - - - - - - - - - - -

-Macros

-#define PKCS11_AES_OP   (0x0u)
 
-#define PKCS11_DIGEST_OP_0   (0x1u)
 
-#define PKCS11_DIGEST_OP_1   (0x2u)
 
-#define PKCS11_AUTH_OP_0   (0x3u)
 
-#define PKCS11_AUTH_OP_1   (0x4u)
 
-#define PKCS11_MAX_DEV_CTX   (5u)
 
-#define MAX_DIGEST_SESSIONS   (2u)
 
-#define MAX_AUTH_SESSIONS   (2u)
 
- - - -

-Typedefs

typedef struct pkcs11_lib_ctx_s pkcs11_lib_ctx
 
- - - - - - - - - - - - - - - - - - - - - - - + + + + + + + +

Functions

CK_RV pkcs11_init (CK_C_INITIALIZE_ARGS const *pInitArgs)
 Initializes the PKCS11 API Library for Cryptoauthlib.
 
CK_RV pkcs11_deinit (CK_VOID_PTR pReserved)
 
-CK_RV pkcs11_init_check (pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock)
 Check if the library is initialized properly.
 
-pkcs11_lib_ctx_ptr pkcs11_get_context (void)
 Retrieve the current library context.
 
-CK_RV pkcs11_lock_context (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_context (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_lock_device (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_device (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_lock_both (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_both (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_find_init (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
+CK_RV pkcs11_find_continue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 
+CK_RV pkcs11_find_finish (CK_SESSION_HANDLE hSession)
 
+CK_RV pkcs11_find_get_attribute (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 

Detailed Description

-

PKCS11 Library Initialization & Context.

+

PKCS11 Library Object Find/Searching.

-

Typedef Documentation

- -

◆ pkcs11_lib_ctx

- -
-
- - - - -
typedef struct pkcs11_lib_ctx_s pkcs11_lib_ctx
-
-

Library Context

- -
-
-
+
diff --git a/a00722.js b/a00722.js deleted file mode 100644 index c03e4a95e..000000000 --- a/a00722.js +++ /dev/null @@ -1,12 +0,0 @@ -var a00722 = -[ - [ "pkcs11_dev_ctx", "a01828.html", null ], - [ "pkcs11_dev_res", "a01832.html", null ], - [ "pkcs11_dev_state", "a01836.html", "a01836" ], - [ "pkcs11_lib_ctx_s", "a01840.html", "a01840" ], - [ "pkcs11_lib_ctx", "a00722.html#a829124de0deebf29734cd6390a232292", null ], - [ "pkcs11_deinit", "a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4", null ], - [ "pkcs11_get_context", "a01450.html#gae0e3060e6ae0dfc17a35881c223d8123", null ], - [ "pkcs11_init", "a01450.html#gaab9ef494fdc21911e700f2b9d62547ec", null ], - [ "pkcs11_init_check", "a01450.html#gadd899ffeae0146c08b249e3f551e21f8", null ] -]; \ No newline at end of file diff --git a/a00725.html b/a00725.html index cda730e0c..3cffde312 100644 --- a/a00725.html +++ b/a00725.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_key.c File Reference +CryptoAuthLib: pkcs11_find.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,110 +98,40 @@
-
pkcs11_key.c File Reference
+Functions
+
pkcs11_find.h File Reference
-

PKCS11 Library Key Object Handling. +

PKCS11 Library Object Find/Searching. More...

-
#include "cryptoauthlib.h"
-#include "crypto/atca_crypto_sw_sha1.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_token.h"
-#include "pkcs11_attrib.h"
-#include "pkcs11_key.h"
-#include "pkcs11_session.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_util.h"
-#include "pkcs11_os.h"
+
#include "cryptoki.h"
+#include "pkcs11_object.h"
- - - - - - - - - - - - - - - - -

Functions

-const pkcs11_ecc_key_info_tpkcs11_get_object_key_type (ATCADevice device_ctx, pkcs11_object_ptr obj_ptr)
 
-CK_RV pkcs11_ta_get_pubkey (CK_VOID_PTR pObject, cal_buffer *key_buffer, pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_key_write (CK_VOID_PTR pSession, CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, const pkcs11_ecc_key_info_t *ec_key_info)
 
-CK_RV pkcs11_key_generate (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
-CK_RV pkcs11_key_generate_pair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 
-CK_RV pkcs11_key_derive (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
-CK_RV pkcs11_key_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_key_clear_object_cache (pkcs11_object_ptr pObject)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + +

-Variables

CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec256 []
 
-CK_BYTE pkcs11_key_ec_params_p256 [] = { 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 }
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec224 []
 
-CK_BYTE pkcs11_key_ec_params_p224 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x21 }
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384 []
 
-CK_BYTE pkcs11_key_ec_params_p384 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x22 }
 
CK_BYTE pkcs11_x962_asn1_hdr_ec384 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec521 []
 
-CK_BYTE pkcs11_key_ec_params_p521 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x23 }
 
const pkcs11_ecc_key_info_t ec_key_data_table [4]
 
const pkcs11_attrib_model pkcs11_key_public_attributes []
 
-const CK_ULONG pkcs11_key_public_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_public_attributes ) / sizeof( pkcs11_key_public_attributes [0]))
 
const pkcs11_attrib_model pkcs11_key_private_attributes []
 
-const CK_ULONG pkcs11_key_private_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_private_attributes ) / sizeof( pkcs11_key_private_attributes [0]))
 
const pkcs11_attrib_model pkcs11_key_secret_attributes []
 
-const CK_ULONG pkcs11_key_secret_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_secret_attributes ) / sizeof( pkcs11_key_secret_attributes [0]))
 
+CK_RV pkcs11_find_init (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
+CK_RV pkcs11_find_continue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 
+CK_RV pkcs11_find_finish (CK_SESSION_HANDLE hSession)
 
+CK_RV pkcs11_find_get_attribute (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 

Detailed Description

-

PKCS11 Library Key Object Handling.

+

PKCS11 Library Object Find/Searching.

diff --git a/a00725.js b/a00725.js deleted file mode 100644 index 93d055334..000000000 --- a/a00725.js +++ /dev/null @@ -1,14 +0,0 @@ -var a00725 = -[ - [ "pkcs11_ec_pbkey_asn1_hdr_p224", "a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p256", "a01450.html#gacf3b4678891994823f2cdd0cb8707ecc", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p384", "a01450.html#gadbc903025f5c5ea06b36fba39f30d305", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p521", "a01450.html#ga44f7303f7073c7f97c3e31ec5db97769", null ], - [ "pkcs11_key_private_attributes", "a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa", null ], - [ "pkcs11_key_public_attributes", "a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215", null ], - [ "pkcs11_key_secret_attributes", "a01450.html#ga6ef03269a32699359d90901cc84954f3", null ], - [ "pkcs11_x962_asn1_hdr_ec224", "a01450.html#gaaefbee7a7f8454014a46e969fa9912c3", null ], - [ "pkcs11_x962_asn1_hdr_ec256", "a01450.html#ga7fd56486be0426ec029cd60072ef62ba", null ], - [ "pkcs11_x962_asn1_hdr_ec384", "a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd", null ], - [ "pkcs11_x962_asn1_hdr_ec521", "a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd", null ] -]; \ No newline at end of file diff --git a/a00728.html b/a00728.html index 8eec2d4cd..36c07c1c7 100644 --- a/a00728.html +++ b/a00728.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_key.h File Reference +CryptoAuthLib: pkcs11_info.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,127 +98,48 @@
-
pkcs11_key.h File Reference
+
pkcs11_info.c File Reference
-

PKCS11 Library Object Handling. +

PKCS11 Library Information Functions. More...

-
#include "pkcs11_object.h"
+
#include "cryptoauthlib.h"
+#include "pkcs11_config.h"
+#include "pkcs11_init.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_session.h"
+#include "pkcs11_util.h"
+#include "pkcs11_info.h"
+#include <stdio.h>
- - - -

-Data Structures

struct  pkcs11_ecc_key_info_s
 
- - - - - - - -

-Macros

-#define PKCS11_X962_ASN1_HEADER_SZ   3u
 
-#define PKCS11_MAX_ECC_ASN1_HDR_SIZE   ATCA_ECCP256_ASN1_HDR_SIZE
 
-#define PKCS11_MAX_ECC_PB_KEY_SIZE   TA_ECC521_PUB_KEY_SIZE
 
- - - -

-Typedefs

-typedef struct pkcs11_ecc_key_info_s pkcs11_ecc_key_info_t
 
- - - - - - - - - - - - - - - - + + +

Functions

-CK_RV pkcs11_key_write (CK_VOID_PTR pSession, CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, const pkcs11_ecc_key_info_t *ec_key_info)
 
-CK_RV pkcs11_key_generate (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
-CK_RV pkcs11_key_generate_pair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 
-CK_RV pkcs11_key_derive (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
-CK_RV pkcs11_key_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_key_clear_object_cache (pkcs11_object_ptr pObject)
 
-const pkcs11_ecc_key_info_tpkcs11_get_object_key_type (ATCADevice device_ctx, pkcs11_object_ptr obj_ptr)
 
-CK_RV pkcs11_ta_get_pubkey (CK_VOID_PTR pObject, cal_buffer *key_buffer, pkcs11_session_ctx_ptr session_ctx)
 
+CK_RV pkcs11_get_lib_info (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + +

Variables

-const pkcs11_ecc_key_info_t ec_key_data_table [4]
 
const pkcs11_attrib_model pkcs11_key_public_attributes []
 
-const CK_ULONG pkcs11_key_public_attributes_count
 
const pkcs11_attrib_model pkcs11_key_private_attributes []
 
-const CK_ULONG pkcs11_key_private_attributes_count
 
const pkcs11_attrib_model pkcs11_key_secret_attributes []
 
-const CK_ULONG pkcs11_key_secret_attributes_count
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec256 []
 
-CK_BYTE pkcs11_key_ec_params_p256 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec224 []
 
-CK_BYTE pkcs11_key_ec_params_p224 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec384 []
 
-CK_BYTE pkcs11_key_ec_params_p384 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec521 []
 
-CK_BYTE pkcs11_key_ec_params_p521 []
 
+const char pkcs11_lib_manufacturer_id [] = "Microchip Technology Inc"
 
+const char pkcs11_lib_description [] = "Cryptoauthlib PKCS11 Interface"
 

Detailed Description

-

PKCS11 Library Object Handling.

+

PKCS11 Library Information Functions.

diff --git a/a00728.js b/a00728.js index d61f9a4c3..4669f0acd 100644 --- a/a00728.js +++ b/a00728.js @@ -1,15 +1,4 @@ var a00728 = [ - [ "pkcs11_ecc_key_info_s", "a01844.html", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p224", "a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p256", "a01450.html#gacf3b4678891994823f2cdd0cb8707ecc", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p384", "a01450.html#gadbc903025f5c5ea06b36fba39f30d305", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p521", "a01450.html#ga44f7303f7073c7f97c3e31ec5db97769", null ], - [ "pkcs11_key_private_attributes", "a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa", null ], - [ "pkcs11_key_public_attributes", "a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215", null ], - [ "pkcs11_key_secret_attributes", "a01450.html#ga6ef03269a32699359d90901cc84954f3", null ], - [ "pkcs11_x962_asn1_hdr_ec224", "a01450.html#gaaefbee7a7f8454014a46e969fa9912c3", null ], - [ "pkcs11_x962_asn1_hdr_ec256", "a01450.html#ga7fd56486be0426ec029cd60072ef62ba", null ], - [ "pkcs11_x962_asn1_hdr_ec384", "a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd", null ], - [ "pkcs11_x962_asn1_hdr_ec521", "a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd", null ] + [ "pkcs11_get_lib_info", "a01477.html#gaae56826104269ca730066136fb3eb995", null ] ]; \ No newline at end of file diff --git a/a00731.html b/a00731.html index 70ad9c0a7..7ecafeeaf 100644 --- a/a00731.html +++ b/a00731.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_main.c File Reference +CryptoAuthLib: pkcs11_info.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,313 +98,41 @@
-
pkcs11_main.c File Reference
+Functions | +Variables
+
pkcs11_info.h File Reference
-

PKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html. +

PKCS11 Library Information Functions. More...

#include "cryptoki.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_encrypt.h"
-#include "pkcs11_init.h"
-#include "pkcs11_info.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_mech.h"
-#include "pkcs11_session.h"
-#include "pkcs11_token.h"
-#include "pkcs11_find.h"
-#include "pkcs11_object.h"
-#include "pkcs11_signature.h"
-#include "pkcs11_digest.h"
-#include "pkcs11_key.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + +

Functions

-CK_RV C_Initialize (CK_VOID_PTR pInitArgs)
 Initializes Cryptoki library NOTES: If pInitArgs is a non-NULL_PTR is must dereference to a CK_C_INITIALIZE_ARGS structure.
 
-CK_RV C_Finalize (CK_VOID_PTR pReserved)
 Clean up miscellaneous Cryptoki-associated resources.
 
-CK_RV C_GetInfo (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
-CK_RV C_GetFunctionList (CK_FUNCTION_LIST_PTR_PTR ppFunctionList)
 Obtains entry points of Cryptoki library functions.
 
-CK_RV C_GetSlotList (CK_BBOOL tokenPresent, CK_SLOT_ID_PTR pSlotList, CK_ULONG_PTR pulCount)
 Obtains a list of slots in the system.
 
-CK_RV C_GetSlotInfo (CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo)
 Obtains information about a particular slot.
 
-CK_RV C_GetTokenInfo (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
-CK_RV C_GetMechanismList (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 Obtains a list of mechanisms supported by a token (in a slot)
 
-CK_RV C_GetMechanismInfo (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 Obtains information about a particular mechanism of a token (in a slot)
 
-CK_RV C_InitToken (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 Initializes a token (in a slot)
 
-CK_RV C_InitPIN (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 Initializes the normal user's PIN.
 
-CK_RV C_SetPIN (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 Modifies the PIN of the current user.
 
-CK_RV C_OpenSession (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY Notify, CK_SESSION_HANDLE_PTR phSession)
 Opens a connection between an application and a particular token or sets up an application callback for token insertion.
 
-CK_RV C_CloseSession (CK_SESSION_HANDLE hSession)
 Close the given session.
 
-CK_RV C_CloseAllSessions (CK_SLOT_ID slotID)
 Close all open sessions.
 
-CK_RV C_GetSessionInfo (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Retrieve information about the specified session.
 
-CK_RV C_GetOperationState (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pOperationState, CK_ULONG_PTR pulOperationStateLen)
 Obtains the cryptographic operations state of a session.
 
-CK_RV C_SetOperationState (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pOperationState, CK_ULONG ulOperationStateLen, CK_OBJECT_HANDLE hEncryptionKey, CK_OBJECT_HANDLE hAuthenticationKey)
 Sets the cryptographic operations state of a session.
 
-CK_RV C_Login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 Login on the token in the specified session.
 
-CK_RV C_Logout (CK_SESSION_HANDLE hSession)
 Log out of the token in the specified session.
 
-CK_RV C_CreateObject (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
-CK_RV C_CopyObject (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phNewObject)
 Create a copy of the object with the specified handle.
 
-CK_RV C_DestroyObject (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
-CK_RV C_GetObjectSize (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 Obtains the size of an object in bytes.
 
-CK_RV C_GetAttributeValue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Obtains an attribute value of an object.
 
-CK_RV C_SetAttributeValue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Change or set the value of the specified attributes on the specified object.
 
-CK_RV C_FindObjectsInit (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Initializes an object search in the specified session using the specified attribute template as search parameters.
 
-CK_RV C_FindObjects (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 Continue the search for objects in the specified session.
 
-CK_RV C_FindObjectsFinal (CK_SESSION_HANDLE hSession)
 Finishes an object search operation (and cleans up)
 
-CK_RV C_EncryptInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes an encryption operation using the specified mechanism and session.
 
-CK_RV C_Encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Perform a single operation encryption operation in the specified session.
 
-CK_RV C_EncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues a multiple-part encryption operation.
 
-CK_RV C_EncryptFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pLastEncryptedPart, CK_ULONG_PTR pulLastEncryptedPartLen)
 Finishes a multiple-part encryption operation.
 
-CK_RV C_DecryptInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize decryption using the specified object.
 
-CK_RV C_Decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Perform a single operation decryption in the given session.
 
-CK_RV C_DecryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues a multiple-part decryption operation.
 
-CK_RV C_DecryptFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pLastPart, CK_ULONG_PTR pulLastPartLen)
 Finishes a multiple-part decryption operation.
 
-CK_RV C_DigestInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
 Initializes a message-digesting operation using the specified mechanism in the specified session.
 
-CK_RV C_Digest (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Digest the specified data in a one-pass operation and return the resulting digest.
 
-CK_RV C_DigestUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part digesting operation.
 
-CK_RV C_DigestKey (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey)
 Update a running digest operation by digesting a secret key with the specified handle.
 
-CK_RV C_DigestFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Finishes a multiple-part digesting operation.
 
-CK_RV C_SignInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
-CK_RV C_Sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
-CK_RV C_SignUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
-CK_RV C_SignFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
-CK_RV C_SignRecoverInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a signature operation, where the data can be recovered from the signature.
 
-CK_RV C_SignRecover (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Signs single-part data, where the data can be recovered from the signature.
 
-CK_RV C_VerifyInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
-CK_RV C_Verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
-CK_RV C_VerifyUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
-CK_RV C_VerifyFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 
-CK_RV C_VerifyRecoverInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation where the data is recovered from the signature.
 
-CK_RV C_VerifyRecover (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Verifies a signature on single-part data, where the data is recovered from the signature.
 
-CK_RV C_DigestEncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues simultaneous multiple-part digesting and encryption operations.
 
-CK_RV C_DecryptDigestUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues simultaneous multiple-part decryption and digesting operations.
 
-CK_RV C_SignEncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues simultaneous multiple-part signature and encryption operations.
 
-CK_RV C_DecryptVerifyUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues simultaneous multiple-part decryption and verification operations.
 
-CK_RV C_GenerateKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 Generates a secret key using the specified mechanism.
 
-CK_RV C_GenerateKeyPair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 Generates a public-key/private-key pair using the specified mechanism.
 
-CK_RV C_WrapKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hWrappingKey, CK_OBJECT_HANDLE hKey, CK_BYTE_PTR pWrappedKey, CK_ULONG_PTR pulWrappedKeyLen)
 Wraps (encrypts) the specified key using the specified wrapping key and mechanism.
 
-CK_RV C_UnwrapKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hUnwrappingKey, CK_BYTE_PTR pWrappedKey, CK_ULONG ulWrappedKeyLen, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
 Unwraps (decrypts) the specified key using the specified unwrapping key.
 
-CK_RV C_DeriveKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
 Derive a key from the specified base key.
 
-CK_RV C_SeedRandom (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSeed, CK_ULONG ulSeedLen)
 Mixes in additional seed material to the random number generator.
 
-CK_RV C_GenerateRandom (CK_SESSION_HANDLE hSession, CK_BYTE_PTR RandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
-CK_RV C_GetFunctionStatus (CK_SESSION_HANDLE hSession)
 Legacy function - see PKCS#11 v2.40.
 
-CK_RV C_CancelFunction (CK_SESSION_HANDLE hSession)
 Legacy function.
 
-CK_RV C_WaitForSlotEvent (CK_FLAGS flags, CK_SLOT_ID_PTR pSlot, CK_VOID_PTR pRserved)
 Wait for a slot event (token insertion, removal, etc) on the specified slot to occur.
 
+CK_RV pkcs11_get_lib_info (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
+ + + + +

+Variables

+const char pkcs11_lib_manufacturer_id []
 
+const char pkcs11_lib_description []
 

Detailed Description

-

PKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html.

+

PKCS11 Library Information Functions.

diff --git a/a00731.js b/a00731.js index 456d9960a..a9e516f91 100644 --- a/a00731.js +++ b/a00731.js @@ -1,71 +1,4 @@ var a00731 = [ - [ "C_CancelFunction", "a01450.html#gac545b1d8eeb82e40f7519cdfc5a3427c", null ], - [ "C_CloseAllSessions", "a01450.html#gad2ab78c409dfcbc155d673550cb71736", null ], - [ "C_CloseSession", "a01450.html#gae2ce0be368072fa83e0b1f5136b7b753", null ], - [ "C_CopyObject", "a01450.html#ga301f7118a227ffedd7f945a9532fc18a", null ], - [ "C_CreateObject", "a01450.html#ga01b36384bff05a4dc4476c0764cdc248", null ], - [ "C_Decrypt", "a01450.html#gad7a0c95a7b810c5534185632b8b58d29", null ], - [ "C_DecryptDigestUpdate", "a01450.html#ga128ba07226b7e45772830f06dfde4b71", null ], - [ "C_DecryptFinal", "a01450.html#gab549c4d540cff530f9e4d9bca36e2253", null ], - [ "C_DecryptInit", "a01450.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5", null ], - [ "C_DecryptUpdate", "a01450.html#gaa4fb93ab28bedada72364e925b3dacbf", null ], - [ "C_DecryptVerifyUpdate", "a01450.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c", null ], - [ "C_DeriveKey", "a01450.html#ga67ecc1ce8ca0630aebdf3a29e129f531", null ], - [ "C_DestroyObject", "a01450.html#ga1b991b6fd8b20f130f9d87b98e590fdb", null ], - [ "C_Digest", "a01450.html#gadfc9281add668a5aff9bbc1253655917", null ], - [ "C_DigestEncryptUpdate", "a01450.html#ga3f8a5f0509ef9929f90536b6e255e485", null ], - [ "C_DigestFinal", "a01450.html#ga1f3dc3758726bb4737db956e4cd71e91", null ], - [ "C_DigestInit", "a01450.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403", null ], - [ "C_DigestKey", "a01450.html#ga21a9c4115bc535490416e2850a2a45fd", null ], - [ "C_DigestUpdate", "a01450.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6", null ], - [ "C_Encrypt", "a01450.html#gaf9aab1c3fcf352af53b0e66652fac39d", null ], - [ "C_EncryptFinal", "a01450.html#gab4a336f9cb4920a9ff8585aec5d90a3f", null ], - [ "C_EncryptInit", "a01450.html#ga23a9b2dc15a447decd10881dde448890", null ], - [ "C_EncryptUpdate", "a01450.html#ga5e13fc136e0b7f79d22a6b735424a815", null ], - [ "C_Finalize", "a01450.html#ga945318df98e940ab331931023133ed3d", null ], - [ "C_FindObjects", "a01450.html#ga42635cbaa2ba78482ae053bea477246a", null ], - [ "C_FindObjectsFinal", "a01450.html#ga46347f830269bfbcbece15951f0c0fa4", null ], - [ "C_FindObjectsInit", "a01450.html#gaf4d4d071deb07e7dcfa489a2a835756d", null ], - [ "C_GenerateKey", "a01450.html#ga84673050f913404ec3ae164d4f7a1d9c", null ], - [ "C_GenerateKeyPair", "a01450.html#ga802a061224966a5523beb1ea0a9d9c27", null ], - [ "C_GenerateRandom", "a01450.html#ga54a883eb1608be800f7fbd204665d50d", null ], - [ "C_GetAttributeValue", "a01450.html#gaaad61dc7b2313286bdd049676ef0fd70", null ], - [ "C_GetFunctionList", "a01450.html#gab4cf13775c4e92b36156ee92dd52bef5", null ], - [ "C_GetFunctionStatus", "a01450.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0", null ], - [ "C_GetInfo", "a01450.html#ga75bdc5d475cd205914b8227c7f08df4c", null ], - [ "C_GetMechanismInfo", "a01450.html#gabe5aeb6b794d4ca28cb2534fe0a4a159", null ], - [ "C_GetMechanismList", "a01450.html#gac80659e1b954f9514723fd6d4429dfb6", null ], - [ "C_GetObjectSize", "a01450.html#gadd117013f515b1d441889a24a605bd93", null ], - [ "C_GetOperationState", "a01450.html#ga95dcfc50be7ac2cb3ebf58d958f70dde", null ], - [ "C_GetSessionInfo", "a01450.html#gaffb75a4d4ba623ee01f31877b56b018e", null ], - [ "C_GetSlotInfo", "a01450.html#gae795a3fd0467a249eeb075f94bfa0adc", null ], - [ "C_GetSlotList", "a01450.html#gac6ce96c3f4a3b7f24d9420763df121fc", null ], - [ "C_GetTokenInfo", "a01450.html#gac933291718eb6aa218db1c677e07ab02", null ], - [ "C_Initialize", "a01450.html#ga2e45ad4ce8c84712c646dddaa99544e3", null ], - [ "C_InitPIN", "a01450.html#ga2b726534eedac635b28ccd501c242004", null ], - [ "C_InitToken", "a01450.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb", null ], - [ "C_Login", "a01450.html#gaca7aa4ae8d9592f464dc1b545fead02e", null ], - [ "C_Logout", "a01450.html#gab7a0a4ff33f2450736d76d453045ad6f", null ], - [ "C_OpenSession", "a01450.html#gad28ad989a94c345875dff446ad6c6481", null ], - [ "C_SeedRandom", "a01450.html#gab26093f478636b5ba04176c2f81f44c4", null ], - [ "C_SetAttributeValue", "a01450.html#ga752412c887c0d900c05b771709ebac83", null ], - [ "C_SetOperationState", "a01450.html#ga66e6598e8f5db01e428a46d58b9865fc", null ], - [ "C_SetPIN", "a01450.html#ga386826845e06a84b36522a2bf49ff6c6", null ], - [ "C_Sign", "a01450.html#ga5f587605d68a7a56012ac337ddaec5e1", null ], - [ "C_SignEncryptUpdate", "a01450.html#gaf63ca32aef7a90f87e94a288de5e82cc", null ], - [ "C_SignFinal", "a01450.html#ga2171c591535849faf017fa126e3a9a48", null ], - [ "C_SignInit", "a01450.html#ga37d93326915dc9b74f2476238f35037c", null ], - [ "C_SignRecover", "a01450.html#ga210f4bdbaae1bc2b8e242e1610da4f0f", null ], - [ "C_SignRecoverInit", "a01450.html#ga97ee219718545f49ee651cbb00712b8c", null ], - [ "C_SignUpdate", "a01450.html#gada0dd5a3d8ae781df05ea016d2f76d16", null ], - [ "C_UnwrapKey", "a01450.html#gafd4a7d6e142179e46453af11d5da3e91", null ], - [ "C_Verify", "a01450.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529", null ], - [ "C_VerifyFinal", "a01450.html#gaf6ecd512fa21851f0bcbc25b90c2b444", null ], - [ "C_VerifyInit", "a01450.html#gaeae51e6092fa8c8a58e022fcd8366c45", null ], - [ "C_VerifyRecover", "a01450.html#ga82355d41e5303e31cc49df003e9d8c38", null ], - [ "C_VerifyRecoverInit", "a01450.html#gaefe33200a70026c7e622b01473d78b66", null ], - [ "C_VerifyUpdate", "a01450.html#gaba9414cf3fc679beaae1baa5425a6e01", null ], - [ "C_WaitForSlotEvent", "a01450.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6", null ], - [ "C_WrapKey", "a01450.html#gaf47613fd93688da939cf4c6998f83d77", null ] + [ "pkcs11_get_lib_info", "a01477.html#gaae56826104269ca730066136fb3eb995", null ] ]; \ No newline at end of file diff --git a/a00734.html b/a00734.html index a55a8ff3c..2e5335e57 100644 --- a/a00734.html +++ b/a00734.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_mech.c File Reference +CryptoAuthLib: pkcs11_init.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,64 +98,68 @@
-
pkcs11_mech.c File Reference
+
pkcs11_init.c File Reference
-

PKCS11 Library Mechanism Handling. +

PKCS11 Library Init/Deinit. More...

-
#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_mech.h"
-#include "pkcs11_slot.h"
-#include "cryptoauthlib.h"
+
#include "atca_device.h"
+#include "hal/atca_hal.h"
+#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_init.h"
+#include "pkcs11_os.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_object.h"
+#include "pkcs11_session.h"
+#include "cryptoauthlib.h"
- - - -

-Data Structures

struct  pcks11_mech_table_e
 
- - - - - -

-Macros

-#define PCKS11_MECH_ECC508_EC_CAPABILITY   (CKF_EC_F_P | CKF_EC_NAMEDCURVE | CKF_EC_UNCOMPRESS)
 
-#define TABLE_SIZE(x)   sizeof(x) / sizeof(x[0])
 
- - - - - -

-Typedefs

-typedef struct pcks11_mech_table_e pcks11_mech_table_e
 
-typedef struct pcks11_mech_table_epcks11_mech_table_ptr
 
- - - - + + + + + + + + + + + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_mech_get_list (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 
-CK_RV pkcs_mech_get_info (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 
+pkcs11_lib_ctx_ptr pkcs11_get_context (void)
 Retrieve the current library context.
 
+CK_RV pkcs11_lock_context (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_unlock_context (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_lock_device (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_unlock_device (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_lock_both (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_unlock_both (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_init_check (pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock)
 Check if the library is initialized properly.
 
CK_RV pkcs11_init (CK_C_INITIALIZE_ARGS const *pInitArgs)
 Initializes the PKCS11 API Library for Cryptoauthlib.
 
CK_RV pkcs11_deinit (CK_VOID_PTR pReserved)
 

Detailed Description

-

PKCS11 Library Mechanism Handling.

+

PKCS11 Library Init/Deinit.

+

Copyright (c) 2017 Microchip Technology Inc. All rights reserved.

diff --git a/a00737.html b/a00737.html index 89d085aa8..4df749f80 100644 --- a/a00737.html +++ b/a00737.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_mech.h File Reference +CryptoAuthLib: pkcs11_init.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,33 +98,123 @@
-
pkcs11_mech.h File Reference
+
pkcs11_init.h File Reference
-

PKCS11 Library Mechanism Handling. +

PKCS11 Library Initialization & Context. More...

-
#include "cryptoki.h"
+
#include "atca_compiler.h"
+#include "pkcs11_config.h"
+#include "pkcs11_os.h"
+#include "cryptoauthlib.h"
+ + + + + + + + + +

+Data Structures

struct  pkcs11_dev_ctx
 
struct  pkcs11_dev_res
 
struct  pkcs11_dev_state
 
struct  pkcs11_lib_ctx_s
 
+ + + + + + + + + + + + + + + + + +

+Macros

+#define PKCS11_AES_OP   (0x0u)
 
+#define PKCS11_DIGEST_OP_0   (0x1u)
 
+#define PKCS11_DIGEST_OP_1   (0x2u)
 
+#define PKCS11_AUTH_OP_0   (0x3u)
 
+#define PKCS11_AUTH_OP_1   (0x4u)
 
+#define PKCS11_MAX_DEV_CTX   (5u)
 
+#define MAX_DIGEST_SESSIONS   (2u)
 
+#define MAX_AUTH_SESSIONS   (2u)
 
+ + + +

+Typedefs

typedef struct pkcs11_lib_ctx_s pkcs11_lib_ctx
 
- - - - + + + + + + + + + + + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_mech_get_list (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 
-CK_RV pkcs_mech_get_info (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 
CK_RV pkcs11_init (CK_C_INITIALIZE_ARGS const *pInitArgs)
 Initializes the PKCS11 API Library for Cryptoauthlib.
 
CK_RV pkcs11_deinit (CK_VOID_PTR pReserved)
 
+CK_RV pkcs11_init_check (pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock)
 Check if the library is initialized properly.
 
+pkcs11_lib_ctx_ptr pkcs11_get_context (void)
 Retrieve the current library context.
 
+CK_RV pkcs11_lock_context (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_unlock_context (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_lock_device (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_unlock_device (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_lock_both (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_unlock_both (pkcs11_lib_ctx_ptr pContext)
 

Detailed Description

-

PKCS11 Library Mechanism Handling.

+

PKCS11 Library Initialization & Context.

-
+

Typedef Documentation

+ +

◆ pkcs11_lib_ctx

+ +
+
+ + + + +
typedef struct pkcs11_lib_ctx_s pkcs11_lib_ctx
+
+

Library Context

+ +
+
+
diff --git a/a00740.html b/a00740.html index 1d3c96aac..ffd75120d 100644 --- a/a00740.html +++ b/a00740.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_object.c File Reference +CryptoAuthLib: pkcs11_key.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,101 +100,112 @@ -
pkcs11_object.c File Reference
+
pkcs11_key.c File Reference
-

PKCS11 Library Object Handling Base. +

PKCS11 Library Key Object Handling. More...

-
#include "cryptoauthlib.h"
-#include "atcacert/atcacert_def.h"
-#include "cryptoki.h"
+
#include "cryptoauthlib.h"
+#include "crypto/atca_crypto_sw_sha1.h"
#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_session.h"
-#include "pkcs11_util.h"
-#include "pkcs11_object.h"
-#include "pkcs11_os.h"
-#include "pkcs11_find.h"
-#include "pkcs11_key.h"
-#include "pkcs11_cert.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_token.h"
+#include "pkcs11_attrib.h"
+#include "pkcs11_key.h"
+#include "pkcs11_session.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_util.h"
+#include "pkcs11_os.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_object_alloc (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject)
 
-CK_RV pkcs11_object_free (pkcs11_object_ptr pObject)
 
-CK_RV pkcs11_object_check (pkcs11_object_ptr *ppObject, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_object_get_handle (pkcs11_object_ptr pObject, CK_OBJECT_HANDLE_PTR phObject)
 
-CK_RV pkcs11_object_get_owner (pkcs11_object_ptr pObject, CK_SLOT_ID_PTR pSlotId)
 
-CK_RV pkcs11_object_get_name (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_class (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_destroyable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_size (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 
-CK_RV pkcs11_object_find (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_object_create (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
-CK_RV pkcs11_object_destroy (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
-CK_RV pkcs11_object_deinit (pkcs11_lib_ctx_ptr pContext)
 
-ATCA_STATUS pkcs11_object_load_handle_info (ATCADevice device, pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_object_is_private (pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession)
 Checks the attributes of the underlying cryptographic asset to determine if it is a private key - this changes the way the associated public key is referenced.
 
+const pkcs11_key_info_tpkcs11_get_object_key_type (ATCADevice device_ctx, pkcs11_object_ptr obj_ptr)
 
+CK_RV pkcs11_ta_get_pubkey (CK_VOID_PTR pObject, cal_buffer *key_buffer, pkcs11_session_ctx_ptr session_ctx)
 
+CK_RV pkcs11_key_write (CK_VOID_PTR pSession, CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute)
 
+CK_RV pkcs11_key_generate (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
+CK_RV pkcs11_key_generate_pair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 
+CK_RV pkcs11_key_derive (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
+CK_RV pkcs11_key_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
+CK_RV pkcs11_key_clear_object_cache (pkcs11_object_ptr pObject)
 
- - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Variables

-pkcs11_object_cache_t pkcs11_object_cache [PKCS11_MAX_OBJECTS_ALLOWED]
 
const pkcs11_attrib_model pkcs11_object_monotonic_attributes []
 
-const CK_ULONG pkcs11_object_monotonic_attributes_count = (CK_ULONG)(sizeof( pkcs11_object_monotonic_attributes ) / sizeof( pkcs11_object_monotonic_attributes [0]))
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec256 []
 
+CK_BYTE pkcs11_key_ec_params_p256 [] = { 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 }
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec224 []
 
+CK_BYTE pkcs11_key_ec_params_p224 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x21 }
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384 []
 
+CK_BYTE pkcs11_key_ec_params_p384 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x22 }
 
CK_BYTE pkcs11_x962_asn1_hdr_ec384 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec521 []
 
+CK_BYTE pkcs11_key_ec_params_p521 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x23 }
 
const pkcs11_ecc_key_info_t ec_key_data_table [4]
 
const pkcs11_rsa_key_info_t rsa_key_data_table [4]
 
const pkcs11_key_info_t key_data_table []
 
const pkcs11_attrib_model pkcs11_key_public_attributes []
 
+const CK_ULONG pkcs11_key_public_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_public_attributes ) / sizeof( pkcs11_key_public_attributes [0]))
 
const pkcs11_attrib_model pkcs11_key_private_attributes []
 
+const CK_ULONG pkcs11_key_private_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_private_attributes ) / sizeof( pkcs11_key_private_attributes [0]))
 
const pkcs11_attrib_model pkcs11_key_secret_attributes []
 
+const CK_ULONG pkcs11_key_secret_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_secret_attributes ) / sizeof( pkcs11_key_secret_attributes [0]))
 

Detailed Description

-

PKCS11 Library Object Handling Base.

+

PKCS11 Library Key Object Handling.

diff --git a/a00740.js b/a00740.js index e8554745d..0299a466b 100644 --- a/a00740.js +++ b/a00740.js @@ -1,7 +1,14 @@ var a00740 = [ - [ "pkcs11_object_create", "a01450.html#ga5cdd6e87496f480f42c44430250794bb", null ], - [ "pkcs11_object_destroy", "a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25", null ], - [ "pkcs11_object_is_private", "a01450.html#gad3eaa8d90b81d65f8e585c81c701f893", null ], - [ "pkcs11_object_monotonic_attributes", "a01450.html#ga230747fbe3b7a13dfda75980844c3e9d", null ] + [ "pkcs11_ec_pbkey_asn1_hdr_p224", "a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p256", "a01477.html#gacf3b4678891994823f2cdd0cb8707ecc", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p384", "a01477.html#gadbc903025f5c5ea06b36fba39f30d305", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p521", "a01477.html#ga44f7303f7073c7f97c3e31ec5db97769", null ], + [ "pkcs11_key_private_attributes", "a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa", null ], + [ "pkcs11_key_public_attributes", "a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215", null ], + [ "pkcs11_key_secret_attributes", "a01477.html#ga6ef03269a32699359d90901cc84954f3", null ], + [ "pkcs11_x962_asn1_hdr_ec224", "a01477.html#gaaefbee7a7f8454014a46e969fa9912c3", null ], + [ "pkcs11_x962_asn1_hdr_ec256", "a01477.html#ga7fd56486be0426ec029cd60072ef62ba", null ], + [ "pkcs11_x962_asn1_hdr_ec384", "a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd", null ], + [ "pkcs11_x962_asn1_hdr_ec521", "a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd", null ] ]; \ No newline at end of file diff --git a/a00743.html b/a00743.html index b5d6ec3b4..297e97026 100644 --- a/a00743.html +++ b/a00743.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_object.h File Reference +CryptoAuthLib: pkcs11_key.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,130 +103,137 @@ Typedefs | Functions | Variables
-
pkcs11_object.h File Reference
+
pkcs11_key.h File Reference

PKCS11 Library Object Handling. More...

-
#include "cryptoauthlib.h"
-#include "cryptoki.h"
-#include "pkcs11_config.h"
-#include "pkcs11_attrib.h"
+
#include "pkcs11_object.h"
- + - + + +

Data Structures

struct  pkcs11_object_s
struct  pkcs11_ecc_key_info_s
 
struct  pkcs11_object_cache_s
struct  pkcs11_rsa_key_info_s
 
struct  pkcs11_key_info_s
 
- - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + +

Macros

-#define PKCS11_OBJECT_FLAG_DESTROYABLE   (0x01U)
 
-#define PKCS11_OBJECT_FLAG_MODIFIABLE   (0x02U)
 
-#define PKCS11_OBJECT_FLAG_DYNAMIC   (0x04U)
 
-#define PKCS11_OBJECT_FLAG_SENSITIVE   (0x08U)
 
-#define PKCS11_OBJECT_FLAG_TA_TYPE   (0x10U)
 
-#define PKCS11_OBJECT_FLAG_TRUST_TYPE   (0x20U)
 
-#define PKCS11_OBJECT_FLAG_CERT_CACHE   (0x40U)
 
-#define PKCS11_OBJECT_FLAG_KEY_CACHE   (0x80U)
 
-#define PKCS11_OBJECT_FLAG_KEY_CACHE_COMPLEMENT   ~(PKCS11_OBJECT_FLAG_KEY_CACHE & 0xffu)
 
-#define PKCS11_OBJECT_FLAG_CERT_CACHE_COMPLEMENT   ~(PKCS11_OBJECT_FLAG_CERT_CACHE & 0xffu)
 
+#define PKCS11_X962_ASN1_HEADER_SZ   3u
 
+#define PKCS11_MAX_ECC_ASN1_HDR_SIZE   ATCA_ECCP256_ASN1_HDR_SIZE
 
+#define PKCS11_MAX_ECC_RSA_ASN1_HDR_SIZE   ATCA_RSA4K_ASN1_HDR_SIZE
 
+#define PKCS11_MAX_ECC_RSA_PB_KEY_SIZE   ATCA_MAX_ECC_RSA_PB_KEY_SIZE
 
+#define PKCS11_MAX_ECC_PB_KEY_SIZE   TA_ECC521_PUB_KEY_SIZE
 
+#define PKCS11_MAX_RSA_PB_KEY_SIZE   TA_KEY_TYPE_RSA4096_SIZE
 
- - - - + + + + + +

Typedefs

-typedef struct pkcs11_object_s pkcs11_object
 
-typedef struct pkcs11_object_cache_s pkcs11_object_cache_t
 
+typedef struct pkcs11_ecc_key_info_s pkcs11_ecc_key_info_t
 
+typedef struct pkcs11_rsa_key_info_s pkcs11_rsa_key_info_t
 
+typedef struct pkcs11_key_info_s pkcs11_key_info_t
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_object_alloc (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject)
 
-CK_RV pkcs11_object_free (pkcs11_object_ptr pObject)
 
-CK_RV pkcs11_object_check (pkcs11_object_ptr *ppObject, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_object_find (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_object_is_private (pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession)
 Checks the attributes of the underlying cryptographic asset to determine if it is a private key - this changes the way the associated public key is referenced.
 
-CK_RV pkcs11_object_deinit (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_object_get_owner (pkcs11_object_ptr pObject, CK_SLOT_ID_PTR pSlotId)
 
-ATCA_STATUS pkcs11_object_load_handle_info (ATCADevice device, pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_object_get_class (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_name (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_destroyable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_size (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 
-CK_RV pkcs11_object_get_handle (pkcs11_object_ptr pObject, CK_OBJECT_HANDLE_PTR phObject)
 
-CK_RV pkcs11_object_create (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
-CK_RV pkcs11_object_destroy (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
+CK_RV pkcs11_key_write (CK_VOID_PTR pSession, CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute)
 
+CK_RV pkcs11_key_generate (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
+CK_RV pkcs11_key_generate_pair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 
+CK_RV pkcs11_key_derive (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
+CK_RV pkcs11_key_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
+CK_RV pkcs11_key_clear_object_cache (pkcs11_object_ptr pObject)
 
+const pkcs11_key_info_tpkcs11_get_object_key_type (ATCADevice device_ctx, pkcs11_object_ptr obj_ptr)
 
+CK_RV pkcs11_ta_get_pubkey (CK_VOID_PTR pObject, cal_buffer *key_buffer, pkcs11_session_ctx_ptr session_ctx)
 
- - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Variables

-pkcs11_object_cache_t pkcs11_object_cache []
 
const pkcs11_attrib_model pkcs11_object_monotonic_attributes []
 
-const CK_ULONG pkcs11_object_monotonic_attributes_count
 
+const pkcs11_ecc_key_info_t ec_key_data_table [4]
 
+const pkcs11_rsa_key_info_t rsa_key_data_table [4]
 
+const pkcs11_key_info_t key_data_table []
 
const pkcs11_attrib_model pkcs11_key_public_attributes []
 
+const CK_ULONG pkcs11_key_public_attributes_count
 
const pkcs11_attrib_model pkcs11_key_private_attributes []
 
+const CK_ULONG pkcs11_key_private_attributes_count
 
const pkcs11_attrib_model pkcs11_key_secret_attributes []
 
+const CK_ULONG pkcs11_key_secret_attributes_count
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec256 []
 
+CK_BYTE pkcs11_key_ec_params_p256 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec224 []
 
+CK_BYTE pkcs11_key_ec_params_p224 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec384 []
 
+CK_BYTE pkcs11_key_ec_params_p384 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec521 []
 
+CK_BYTE pkcs11_key_ec_params_p521 []
 

Detailed Description

PKCS11 Library Object Handling.

@@ -236,7 +243,7 @@ diff --git a/a00743.js b/a00743.js index abeafef68..96719a3b9 100644 --- a/a00743.js +++ b/a00743.js @@ -1,9 +1,17 @@ var a00743 = [ - [ "pkcs11_object_s", "a01852.html", "a01852" ], - [ "pkcs11_object_cache_s", "a01856.html", "a01856" ], - [ "pkcs11_object_create", "a01450.html#ga5cdd6e87496f480f42c44430250794bb", null ], - [ "pkcs11_object_destroy", "a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25", null ], - [ "pkcs11_object_is_private", "a01450.html#gad3eaa8d90b81d65f8e585c81c701f893", null ], - [ "pkcs11_object_monotonic_attributes", "a01450.html#ga230747fbe3b7a13dfda75980844c3e9d", null ] + [ "pkcs11_ecc_key_info_s", "a01871.html", null ], + [ "pkcs11_rsa_key_info_s", "a01875.html", null ], + [ "pkcs11_key_info_s", "a01879.html", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p224", "a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p256", "a01477.html#gacf3b4678891994823f2cdd0cb8707ecc", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p384", "a01477.html#gadbc903025f5c5ea06b36fba39f30d305", null ], + [ "pkcs11_ec_pbkey_asn1_hdr_p521", "a01477.html#ga44f7303f7073c7f97c3e31ec5db97769", null ], + [ "pkcs11_key_private_attributes", "a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa", null ], + [ "pkcs11_key_public_attributes", "a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215", null ], + [ "pkcs11_key_secret_attributes", "a01477.html#ga6ef03269a32699359d90901cc84954f3", null ], + [ "pkcs11_x962_asn1_hdr_ec224", "a01477.html#gaaefbee7a7f8454014a46e969fa9912c3", null ], + [ "pkcs11_x962_asn1_hdr_ec256", "a01477.html#ga7fd56486be0426ec029cd60072ef62ba", null ], + [ "pkcs11_x962_asn1_hdr_ec384", "a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd", null ], + [ "pkcs11_x962_asn1_hdr_ec521", "a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd", null ] ]; \ No newline at end of file diff --git a/a00746.html b/a00746.html index 1da40f2b3..21c82f51a 100644 --- a/a00746.html +++ b/a00746.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_os.c File Reference +CryptoAuthLib: pkcs11_main.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,46 +99,312 @@
-
pkcs11_os.c File Reference
+
pkcs11_main.c File Reference
-

PKCS11 Library Operating System Abstraction Functions. +

PKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html. More...

-
#include "pkcs11_os.h"
-#include "pkcs11_util.h"
-#include "pkcs11_init.h"
+
#include "cryptoki.h"
+#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_encrypt.h"
+#include "pkcs11_init.h"
+#include "pkcs11_info.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_mech.h"
+#include "pkcs11_session.h"
+#include "pkcs11_token.h"
+#include "pkcs11_find.h"
+#include "pkcs11_object.h"
+#include "pkcs11_signature.h"
+#include "pkcs11_digest.h"
+#include "pkcs11_key.h"
- - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

CK_RV pkcs11_os_create_mutex (CK_VOID_PTR_PTR ppMutex)
 Application callback for creating a mutex object.
 
-CK_RV pkcs11_os_destroy_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_lock_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_unlock_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_alloc_shared_ctx (void **ppShared, size_t size)
 
-CK_RV pkcs11_os_free_shared_ctx (void *pShared, size_t size)
 
+CK_RV C_Initialize (CK_VOID_PTR pInitArgs)
 Initializes Cryptoki library NOTES: If pInitArgs is a non-NULL_PTR is must dereference to a CK_C_INITIALIZE_ARGS structure.
 
+CK_RV C_Finalize (CK_VOID_PTR pReserved)
 Clean up miscellaneous Cryptoki-associated resources.
 
+CK_RV C_GetInfo (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
+CK_RV C_GetFunctionList (CK_FUNCTION_LIST_PTR_PTR ppFunctionList)
 Obtains entry points of Cryptoki library functions.
 
+CK_RV C_GetSlotList (CK_BBOOL tokenPresent, CK_SLOT_ID_PTR pSlotList, CK_ULONG_PTR pulCount)
 Obtains a list of slots in the system.
 
+CK_RV C_GetSlotInfo (CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo)
 Obtains information about a particular slot.
 
+CK_RV C_GetTokenInfo (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
+CK_RV C_GetMechanismList (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 Obtains a list of mechanisms supported by a token (in a slot)
 
+CK_RV C_GetMechanismInfo (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 Obtains information about a particular mechanism of a token (in a slot)
 
+CK_RV C_InitToken (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 Initializes a token (in a slot)
 
+CK_RV C_InitPIN (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 Initializes the normal user's PIN.
 
+CK_RV C_SetPIN (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 Modifies the PIN of the current user.
 
+CK_RV C_OpenSession (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY Notify, CK_SESSION_HANDLE_PTR phSession)
 Opens a connection between an application and a particular token or sets up an application callback for token insertion.
 
+CK_RV C_CloseSession (CK_SESSION_HANDLE hSession)
 Close the given session.
 
+CK_RV C_CloseAllSessions (CK_SLOT_ID slotID)
 Close all open sessions.
 
+CK_RV C_GetSessionInfo (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Retrieve information about the specified session.
 
+CK_RV C_GetOperationState (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pOperationState, CK_ULONG_PTR pulOperationStateLen)
 Obtains the cryptographic operations state of a session.
 
+CK_RV C_SetOperationState (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pOperationState, CK_ULONG ulOperationStateLen, CK_OBJECT_HANDLE hEncryptionKey, CK_OBJECT_HANDLE hAuthenticationKey)
 Sets the cryptographic operations state of a session.
 
+CK_RV C_Login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 Login on the token in the specified session.
 
+CK_RV C_Logout (CK_SESSION_HANDLE hSession)
 Log out of the token in the specified session.
 
+CK_RV C_CreateObject (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
+CK_RV C_CopyObject (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phNewObject)
 Create a copy of the object with the specified handle.
 
+CK_RV C_DestroyObject (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
+CK_RV C_GetObjectSize (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 Obtains the size of an object in bytes.
 
+CK_RV C_GetAttributeValue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Obtains an attribute value of an object.
 
+CK_RV C_SetAttributeValue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Change or set the value of the specified attributes on the specified object.
 
+CK_RV C_FindObjectsInit (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Initializes an object search in the specified session using the specified attribute template as search parameters.
 
+CK_RV C_FindObjects (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 Continue the search for objects in the specified session.
 
+CK_RV C_FindObjectsFinal (CK_SESSION_HANDLE hSession)
 Finishes an object search operation (and cleans up)
 
+CK_RV C_EncryptInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes an encryption operation using the specified mechanism and session.
 
+CK_RV C_Encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Perform a single operation encryption operation in the specified session.
 
+CK_RV C_EncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues a multiple-part encryption operation.
 
+CK_RV C_EncryptFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pLastEncryptedPart, CK_ULONG_PTR pulLastEncryptedPartLen)
 Finishes a multiple-part encryption operation.
 
+CK_RV C_DecryptInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize decryption using the specified object.
 
+CK_RV C_Decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Perform a single operation decryption in the given session.
 
+CK_RV C_DecryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues a multiple-part decryption operation.
 
+CK_RV C_DecryptFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pLastPart, CK_ULONG_PTR pulLastPartLen)
 Finishes a multiple-part decryption operation.
 
+CK_RV C_DigestInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
 Initializes a message-digesting operation using the specified mechanism in the specified session.
 
+CK_RV C_Digest (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Digest the specified data in a one-pass operation and return the resulting digest.
 
+CK_RV C_DigestUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part digesting operation.
 
+CK_RV C_DigestKey (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey)
 Update a running digest operation by digesting a secret key with the specified handle.
 
+CK_RV C_DigestFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Finishes a multiple-part digesting operation.
 
+CK_RV C_SignInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
+CK_RV C_Sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
+CK_RV C_SignUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
+CK_RV C_SignFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
+CK_RV C_SignRecoverInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a signature operation, where the data can be recovered from the signature.
 
+CK_RV C_SignRecover (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Signs single-part data, where the data can be recovered from the signature.
 
+CK_RV C_VerifyInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
+CK_RV C_Verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
+CK_RV C_VerifyUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
+CK_RV C_VerifyFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 
+CK_RV C_VerifyRecoverInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation where the data is recovered from the signature.
 
+CK_RV C_VerifyRecover (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Verifies a signature on single-part data, where the data is recovered from the signature.
 
+CK_RV C_DigestEncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues simultaneous multiple-part digesting and encryption operations.
 
+CK_RV C_DecryptDigestUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues simultaneous multiple-part decryption and digesting operations.
 
+CK_RV C_SignEncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues simultaneous multiple-part signature and encryption operations.
 
+CK_RV C_DecryptVerifyUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues simultaneous multiple-part decryption and verification operations.
 
+CK_RV C_GenerateKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 Generates a secret key using the specified mechanism.
 
+CK_RV C_GenerateKeyPair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 Generates a public-key/private-key pair using the specified mechanism.
 
+CK_RV C_WrapKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hWrappingKey, CK_OBJECT_HANDLE hKey, CK_BYTE_PTR pWrappedKey, CK_ULONG_PTR pulWrappedKeyLen)
 Wraps (encrypts) the specified key using the specified wrapping key and mechanism.
 
+CK_RV C_UnwrapKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hUnwrappingKey, CK_BYTE_PTR pWrappedKey, CK_ULONG ulWrappedKeyLen, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
 Unwraps (decrypts) the specified key using the specified unwrapping key.
 
+CK_RV C_DeriveKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
 Derive a key from the specified base key.
 
+CK_RV C_SeedRandom (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSeed, CK_ULONG ulSeedLen)
 Mixes in additional seed material to the random number generator.
 
+CK_RV C_GenerateRandom (CK_SESSION_HANDLE hSession, CK_BYTE_PTR RandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
+CK_RV C_GetFunctionStatus (CK_SESSION_HANDLE hSession)
 Legacy function - see PKCS#11 v2.40.
 
+CK_RV C_CancelFunction (CK_SESSION_HANDLE hSession)
 Legacy function.
 
+CK_RV C_WaitForSlotEvent (CK_FLAGS flags, CK_SLOT_ID_PTR pSlot, CK_VOID_PTR pRserved)
 Wait for a slot event (token insertion, removal, etc) on the specified slot to occur.
 

Detailed Description

-

PKCS11 Library Operating System Abstraction Functions.

+

PKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html.

diff --git a/a00746.js b/a00746.js index 09e8fa8de..a43df4eff 100644 --- a/a00746.js +++ b/a00746.js @@ -1,4 +1,71 @@ var a00746 = [ - [ "pkcs11_os_create_mutex", "a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362", null ] + [ "C_CancelFunction", "a01477.html#gac545b1d8eeb82e40f7519cdfc5a3427c", null ], + [ "C_CloseAllSessions", "a01477.html#gad2ab78c409dfcbc155d673550cb71736", null ], + [ "C_CloseSession", "a01477.html#gae2ce0be368072fa83e0b1f5136b7b753", null ], + [ "C_CopyObject", "a01477.html#ga301f7118a227ffedd7f945a9532fc18a", null ], + [ "C_CreateObject", "a01477.html#ga01b36384bff05a4dc4476c0764cdc248", null ], + [ "C_Decrypt", "a01477.html#gad7a0c95a7b810c5534185632b8b58d29", null ], + [ "C_DecryptDigestUpdate", "a01477.html#ga128ba07226b7e45772830f06dfde4b71", null ], + [ "C_DecryptFinal", "a01477.html#gab549c4d540cff530f9e4d9bca36e2253", null ], + [ "C_DecryptInit", "a01477.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5", null ], + [ "C_DecryptUpdate", "a01477.html#gaa4fb93ab28bedada72364e925b3dacbf", null ], + [ "C_DecryptVerifyUpdate", "a01477.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c", null ], + [ "C_DeriveKey", "a01477.html#ga67ecc1ce8ca0630aebdf3a29e129f531", null ], + [ "C_DestroyObject", "a01477.html#ga1b991b6fd8b20f130f9d87b98e590fdb", null ], + [ "C_Digest", "a01477.html#gadfc9281add668a5aff9bbc1253655917", null ], + [ "C_DigestEncryptUpdate", "a01477.html#ga3f8a5f0509ef9929f90536b6e255e485", null ], + [ "C_DigestFinal", "a01477.html#ga1f3dc3758726bb4737db956e4cd71e91", null ], + [ "C_DigestInit", "a01477.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403", null ], + [ "C_DigestKey", "a01477.html#ga21a9c4115bc535490416e2850a2a45fd", null ], + [ "C_DigestUpdate", "a01477.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6", null ], + [ "C_Encrypt", "a01477.html#gaf9aab1c3fcf352af53b0e66652fac39d", null ], + [ "C_EncryptFinal", "a01477.html#gab4a336f9cb4920a9ff8585aec5d90a3f", null ], + [ "C_EncryptInit", "a01477.html#ga23a9b2dc15a447decd10881dde448890", null ], + [ "C_EncryptUpdate", "a01477.html#ga5e13fc136e0b7f79d22a6b735424a815", null ], + [ "C_Finalize", "a01477.html#ga945318df98e940ab331931023133ed3d", null ], + [ "C_FindObjects", "a01477.html#ga42635cbaa2ba78482ae053bea477246a", null ], + [ "C_FindObjectsFinal", "a01477.html#ga46347f830269bfbcbece15951f0c0fa4", null ], + [ "C_FindObjectsInit", "a01477.html#gaf4d4d071deb07e7dcfa489a2a835756d", null ], + [ "C_GenerateKey", "a01477.html#ga84673050f913404ec3ae164d4f7a1d9c", null ], + [ "C_GenerateKeyPair", "a01477.html#ga802a061224966a5523beb1ea0a9d9c27", null ], + [ "C_GenerateRandom", "a01477.html#ga54a883eb1608be800f7fbd204665d50d", null ], + [ "C_GetAttributeValue", "a01477.html#gaaad61dc7b2313286bdd049676ef0fd70", null ], + [ "C_GetFunctionList", "a01477.html#gab4cf13775c4e92b36156ee92dd52bef5", null ], + [ "C_GetFunctionStatus", "a01477.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0", null ], + [ "C_GetInfo", "a01477.html#ga75bdc5d475cd205914b8227c7f08df4c", null ], + [ "C_GetMechanismInfo", "a01477.html#gabe5aeb6b794d4ca28cb2534fe0a4a159", null ], + [ "C_GetMechanismList", "a01477.html#gac80659e1b954f9514723fd6d4429dfb6", null ], + [ "C_GetObjectSize", "a01477.html#gadd117013f515b1d441889a24a605bd93", null ], + [ "C_GetOperationState", "a01477.html#ga95dcfc50be7ac2cb3ebf58d958f70dde", null ], + [ "C_GetSessionInfo", "a01477.html#gaffb75a4d4ba623ee01f31877b56b018e", null ], + [ "C_GetSlotInfo", "a01477.html#gae795a3fd0467a249eeb075f94bfa0adc", null ], + [ "C_GetSlotList", "a01477.html#gac6ce96c3f4a3b7f24d9420763df121fc", null ], + [ "C_GetTokenInfo", "a01477.html#gac933291718eb6aa218db1c677e07ab02", null ], + [ "C_Initialize", "a01477.html#ga2e45ad4ce8c84712c646dddaa99544e3", null ], + [ "C_InitPIN", "a01477.html#ga2b726534eedac635b28ccd501c242004", null ], + [ "C_InitToken", "a01477.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb", null ], + [ "C_Login", "a01477.html#gaca7aa4ae8d9592f464dc1b545fead02e", null ], + [ "C_Logout", "a01477.html#gab7a0a4ff33f2450736d76d453045ad6f", null ], + [ "C_OpenSession", "a01477.html#gad28ad989a94c345875dff446ad6c6481", null ], + [ "C_SeedRandom", "a01477.html#gab26093f478636b5ba04176c2f81f44c4", null ], + [ "C_SetAttributeValue", "a01477.html#ga752412c887c0d900c05b771709ebac83", null ], + [ "C_SetOperationState", "a01477.html#ga66e6598e8f5db01e428a46d58b9865fc", null ], + [ "C_SetPIN", "a01477.html#ga386826845e06a84b36522a2bf49ff6c6", null ], + [ "C_Sign", "a01477.html#ga5f587605d68a7a56012ac337ddaec5e1", null ], + [ "C_SignEncryptUpdate", "a01477.html#gaf63ca32aef7a90f87e94a288de5e82cc", null ], + [ "C_SignFinal", "a01477.html#ga2171c591535849faf017fa126e3a9a48", null ], + [ "C_SignInit", "a01477.html#ga37d93326915dc9b74f2476238f35037c", null ], + [ "C_SignRecover", "a01477.html#ga210f4bdbaae1bc2b8e242e1610da4f0f", null ], + [ "C_SignRecoverInit", "a01477.html#ga97ee219718545f49ee651cbb00712b8c", null ], + [ "C_SignUpdate", "a01477.html#gada0dd5a3d8ae781df05ea016d2f76d16", null ], + [ "C_UnwrapKey", "a01477.html#gafd4a7d6e142179e46453af11d5da3e91", null ], + [ "C_Verify", "a01477.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529", null ], + [ "C_VerifyFinal", "a01477.html#gaf6ecd512fa21851f0bcbc25b90c2b444", null ], + [ "C_VerifyInit", "a01477.html#gaeae51e6092fa8c8a58e022fcd8366c45", null ], + [ "C_VerifyRecover", "a01477.html#ga82355d41e5303e31cc49df003e9d8c38", null ], + [ "C_VerifyRecoverInit", "a01477.html#gaefe33200a70026c7e622b01473d78b66", null ], + [ "C_VerifyUpdate", "a01477.html#gaba9414cf3fc679beaae1baa5425a6e01", null ], + [ "C_WaitForSlotEvent", "a01477.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6", null ], + [ "C_WrapKey", "a01477.html#gaf47613fd93688da939cf4c6998f83d77", null ] ]; \ No newline at end of file diff --git a/a00749.html b/a00749.html index a607d53ac..4d83d60d0 100644 --- a/a00749.html +++ b/a00749.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_os.h File Reference +CryptoAuthLib: pkcs11_mech.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,56 +98,64 @@
-
pkcs11_os.h File Reference
+
pkcs11_mech.c File Reference
-

PKCS11 Library Operating System Abstraction. +

PKCS11 Library Mechanism Handling. More...

-
#include "cryptoki.h"
-#include "cryptoauthlib.h"
+
#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_init.h"
+#include "pkcs11_mech.h"
+#include "pkcs11_slot.h"
+#include "cryptoauthlib.h"
+ + + +

+Data Structures

struct  pcks11_mech_table_e
 
- - - - + + + + +

Macros

-#define pkcs11_os_malloc   hal_malloc
 
-#define pkcs11_os_free   hal_free
 
+#define PCKS11_MECH_ECC508_EC_CAPABILITY   (CKF_EC_F_P | CKF_EC_NAMEDCURVE | CKF_EC_UNCOMPRESS)
 
+#define TABLE_SIZE(x)   sizeof(x) / sizeof(x[0])
 
+ + + + +

+Typedefs

+typedef struct pcks11_mech_table_e pcks11_mech_table_e
 
+typedef struct pcks11_mech_table_epcks11_mech_table_ptr
 
- - - - - - - - - - - - - + + + +

Functions

CK_RV pkcs11_os_create_mutex (CK_VOID_PTR_PTR ppMutex)
 Application callback for creating a mutex object.
 
-CK_RV pkcs11_os_destroy_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_lock_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_unlock_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_alloc_shared_ctx (void **ppShared, size_t size)
 
-CK_RV pkcs11_os_free_shared_ctx (void *pShared, size_t size)
 
+CK_RV pkcs11_mech_get_list (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 
+CK_RV pkcs_mech_get_info (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 

Detailed Description

-

PKCS11 Library Operating System Abstraction.

+

PKCS11 Library Mechanism Handling.

diff --git a/a00749.js b/a00749.js deleted file mode 100644 index 5b0bd5beb..000000000 --- a/a00749.js +++ /dev/null @@ -1,4 +0,0 @@ -var a00749 = -[ - [ "pkcs11_os_create_mutex", "a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362", null ] -]; \ No newline at end of file diff --git a/a00752.html b/a00752.html index 0c0b537ac..bd8905b71 100644 --- a/a00752.html +++ b/a00752.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_session.c File Reference +CryptoAuthLib: pkcs11_mech.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,69 +99,32 @@
-
pkcs11_session.c File Reference
+
pkcs11_mech.h File Reference
-

PKCS11 Library Session Handling. +

PKCS11 Library Mechanism Handling. More...

-
#include "cryptoauthlib.h"
-#include "host/atca_host.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_session.h"
-#include "pkcs11_token.h"
-#include "pkcs11_init.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_object.h"
-#include "pkcs11_os.h"
-#include "pkcs11_util.h"
-#include "pkcs11_key.h"
-#include "pkcs11_cert.h"
+
#include "cryptoki.h"
- - - - - - - - - - - - - - - - - - - - - - - + + + +

Functions

-pkcs11_session_ctx_ptr pkcs11_get_session_context (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_session_check (pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession)
 Check if the session is initialized properly.
 
-CK_RV pkcs11_reserve_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
-CK_RV pkcs11_release_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
-CK_RV pkcs11_session_open (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY notify, CK_SESSION_HANDLE_PTR phSession)
 
-CK_RV pkcs11_session_close (CK_SESSION_HANDLE hSession)
 
CK_RV pkcs11_session_closeall (CK_SLOT_ID slotID)
 Close all sessions for a given slot - not actually all open sessions.
 
-CK_RV pkcs11_session_get_info (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Obtains information about a particular session.
 
CK_RV pkcs11_session_login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 
-CK_RV pkcs11_session_logout (CK_SESSION_HANDLE hSession)
 
+CK_RV pkcs11_mech_get_list (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 
+CK_RV pkcs_mech_get_info (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 

Detailed Description

-

PKCS11 Library Session Handling.

+

PKCS11 Library Mechanism Handling.

diff --git a/a00752.js b/a00752.js deleted file mode 100644 index 43272dd7a..000000000 --- a/a00752.js +++ /dev/null @@ -1,7 +0,0 @@ -var a00752 = -[ - [ "pkcs11_session_check", "a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b", null ], - [ "pkcs11_session_closeall", "a01450.html#ga43525e77f9049b545fa09129cacf9c9a", null ], - [ "pkcs11_session_get_info", "a01450.html#ga236a002e179ed36a0b81399a3e11fcb8", null ], - [ "pkcs11_session_login", "a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df", null ] -]; \ No newline at end of file diff --git a/a00755.html b/a00755.html index 60da0ad85..c1a1f8faa 100644 --- a/a00755.html +++ b/a00755.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_session.h File Reference +CryptoAuthLib: pkcs11_object.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,99 +98,103 @@
-
pkcs11_session.h File Reference
+Functions | +Variables
+
pkcs11_object.c File Reference
-

PKCS11 Library Session Management & Context. +

PKCS11 Library Object Handling Base. More...

-
#include "cryptoki.h"
+
#include "cryptoauthlib.h"
+#include "atcacert/atcacert_def.h"
+#include "cryptoki.h"
#include "pkcs11_config.h"
-#include "cal_internal.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_init.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_session.h"
+#include "pkcs11_util.h"
+#include "pkcs11_object.h"
+#include "pkcs11_os.h"
+#include "pkcs11_find.h"
+#include "pkcs11_key.h"
+#include "pkcs11_cert.h"
- - - - - -

-Data Structures

struct  pkcs11_session_mech_ctx_s
 
struct  pkcs11_session_ctx_s
 
- - - - - - - - - -

-Typedefs

-typedef struct pkcs11_session_mech_ctx_s pkcs11_session_mech_ctx
 
-typedef struct pkcs11_session_mech_ctx_spkcs11_session_mech_ctx_ptr
 
typedef struct pkcs11_session_ctx_s pkcs11_session_ctx
 
-typedef struct pkcs11_session_ctx_spkcs11_session_ctx_ptr
 
- - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

-pkcs11_session_ctx_ptr pkcs11_get_session_context (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_session_check (pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession)
 Check if the session is initialized properly.
 
-CK_RV pkcs11_session_get_info (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Obtains information about a particular session.
 
-CK_RV pkcs11_session_open (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY notify, CK_SESSION_HANDLE_PTR phSession)
 
-CK_RV pkcs11_session_close (CK_SESSION_HANDLE hSession)
 
CK_RV pkcs11_session_closeall (CK_SLOT_ID slotID)
 Close all sessions for a given slot - not actually all open sessions.
 
CK_RV pkcs11_session_login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 
-CK_RV pkcs11_session_logout (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_reserve_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
-CK_RV pkcs11_release_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
+CK_RV pkcs11_object_alloc (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject)
 
+CK_RV pkcs11_object_free (pkcs11_object_ptr pObject)
 
+CK_RV pkcs11_object_check (pkcs11_object_ptr *ppObject, CK_OBJECT_HANDLE hObject)
 
+CK_RV pkcs11_object_get_handle (pkcs11_object_ptr pObject, CK_OBJECT_HANDLE_PTR phObject)
 
+CK_RV pkcs11_object_get_owner (pkcs11_object_ptr pObject, CK_SLOT_ID_PTR pSlotId)
 
+CK_RV pkcs11_object_get_name (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_class (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_destroyable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_size (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 
+CK_RV pkcs11_object_find (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
+CK_RV pkcs11_object_create (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
+CK_RV pkcs11_object_destroy (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
+CK_RV pkcs11_object_deinit (pkcs11_lib_ctx_ptr pContext)
 
+ATCA_STATUS pkcs11_object_load_handle_info (ATCADevice device, pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_object_is_private (pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession)
 Checks the attributes of the underlying cryptographic asset to determine if it is a private key - this changes the way the associated public key is referenced.
 
+ + + + + + +

+Variables

+pkcs11_object_cache_t pkcs11_object_cache [PKCS11_MAX_OBJECTS_ALLOWED]
 
const pkcs11_attrib_model pkcs11_object_monotonic_attributes []
 
+const CK_ULONG pkcs11_object_monotonic_attributes_count = (CK_ULONG)(sizeof( pkcs11_object_monotonic_attributes ) / sizeof( pkcs11_object_monotonic_attributes [0]))
 

Detailed Description

-

PKCS11 Library Session Management & Context.

+

PKCS11 Library Object Handling Base.

-

Typedef Documentation

- -

◆ pkcs11_session_ctx

- -
-
- - - - -
typedef struct pkcs11_session_ctx_s pkcs11_session_ctx
-
-

Session Context

- -
-
-
+
diff --git a/a00755.js b/a00755.js index 82a4299c9..ec951f5e8 100644 --- a/a00755.js +++ b/a00755.js @@ -1,10 +1,7 @@ var a00755 = [ - [ "pkcs11_session_mech_ctx_s", "a01860.html", null ], - [ "pkcs11_session_ctx_s", "a01872.html", null ], - [ "pkcs11_session_ctx", "a00755.html#a9d8980ea83d2e8eb2a9f45210ba5c54d", null ], - [ "pkcs11_session_check", "a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b", null ], - [ "pkcs11_session_closeall", "a01450.html#ga43525e77f9049b545fa09129cacf9c9a", null ], - [ "pkcs11_session_get_info", "a01450.html#ga236a002e179ed36a0b81399a3e11fcb8", null ], - [ "pkcs11_session_login", "a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df", null ] + [ "pkcs11_object_create", "a01477.html#ga5cdd6e87496f480f42c44430250794bb", null ], + [ "pkcs11_object_destroy", "a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25", null ], + [ "pkcs11_object_is_private", "a01477.html#gad3eaa8d90b81d65f8e585c81c701f893", null ], + [ "pkcs11_object_monotonic_attributes", "a01477.html#ga230747fbe3b7a13dfda75980844c3e9d", null ] ]; \ No newline at end of file diff --git a/a00758.html b/a00758.html index caf815b76..4ee1e7509 100644 --- a/a00758.html +++ b/a00758.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_signature.c File Reference +CryptoAuthLib: pkcs11_object.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,69 +98,145 @@
-
pkcs11_signature.c File Reference
+Data Structures | +Macros | +Typedefs | +Functions | +Variables
+
pkcs11_object.h File Reference
-

PKCS11 Library Sign/Verify Handling. +

PKCS11 Library Object Handling. More...

-
#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_signature.h"
-#include "pkcs11_object.h"
-#include "pkcs11_session.h"
-#include "pkcs11_util.h"
-#include "cryptoauthlib.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_key.h"
-#include "atcacert/atcacert_der.h"
+
#include "cryptoauthlib.h"
+#include "cryptoki.h"
+#include "pkcs11_config.h"
+#include "pkcs11_attrib.h"
+ + + + + +

+Data Structures

struct  pkcs11_object_s
 
struct  pkcs11_object_cache_s
 
+ + + + + + + + + + + + + + + + + + + + + +

+Macros

+#define PKCS11_OBJECT_FLAG_DESTROYABLE   (0x01U)
 
+#define PKCS11_OBJECT_FLAG_MODIFIABLE   (0x02U)
 
+#define PKCS11_OBJECT_FLAG_DYNAMIC   (0x04U)
 
+#define PKCS11_OBJECT_FLAG_SENSITIVE   (0x08U)
 
+#define PKCS11_OBJECT_FLAG_TA_TYPE   (0x10U)
 
+#define PKCS11_OBJECT_FLAG_TRUST_TYPE   (0x20U)
 
+#define PKCS11_OBJECT_FLAG_CERT_CACHE   (0x40U)
 
+#define PKCS11_OBJECT_FLAG_KEY_CACHE   (0x80U)
 
+#define PKCS11_OBJECT_FLAG_KEY_CACHE_COMPLEMENT   ~(PKCS11_OBJECT_FLAG_KEY_CACHE & 0xffu)
 
+#define PKCS11_OBJECT_FLAG_CERT_CACHE_COMPLEMENT   ~(PKCS11_OBJECT_FLAG_CERT_CACHE & 0xffu)
 
+ + + + + +

+Typedefs

+typedef struct pkcs11_object_s pkcs11_object
 
+typedef struct pkcs11_object_cache_s pkcs11_object_cache_t
 
- - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_signature_sign_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
-CK_RV pkcs11_signature_sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
-CK_RV pkcs11_signature_sign_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
-CK_RV pkcs11_signature_sign_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
-CK_RV pkcs11_signature_verify_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
-CK_RV pkcs11_signature_verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
-CK_RV pkcs11_signature_verify_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
-CK_RV pkcs11_signature_verify_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 
+CK_RV pkcs11_object_alloc (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject)
 
+CK_RV pkcs11_object_free (pkcs11_object_ptr pObject)
 
+CK_RV pkcs11_object_check (pkcs11_object_ptr *ppObject, CK_OBJECT_HANDLE hObject)
 
+CK_RV pkcs11_object_find (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
+CK_RV pkcs11_object_is_private (pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession)
 Checks the attributes of the underlying cryptographic asset to determine if it is a private key - this changes the way the associated public key is referenced.
 
+CK_RV pkcs11_object_deinit (pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_object_get_owner (pkcs11_object_ptr pObject, CK_SLOT_ID_PTR pSlotId)
 
+ATCA_STATUS pkcs11_object_load_handle_info (ATCADevice device, pkcs11_lib_ctx_ptr pContext)
 
+CK_RV pkcs11_object_get_class (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_name (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_destroyable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_object_get_size (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 
+CK_RV pkcs11_object_get_handle (pkcs11_object_ptr pObject, CK_OBJECT_HANDLE_PTR phObject)
 
+CK_RV pkcs11_object_create (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
+CK_RV pkcs11_object_destroy (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
+ + + + + + +

+Variables

+pkcs11_object_cache_t pkcs11_object_cache []
 
const pkcs11_attrib_model pkcs11_object_monotonic_attributes []
 
+const CK_ULONG pkcs11_object_monotonic_attributes_count
 

Detailed Description

-

PKCS11 Library Sign/Verify Handling.

+

PKCS11 Library Object Handling.

diff --git a/a00758.js b/a00758.js index 339030712..f9b36e51e 100644 --- a/a00758.js +++ b/a00758.js @@ -1,11 +1,9 @@ var a00758 = [ - [ "pkcs11_signature_sign", "a01450.html#ga4641a3dd4da46f801565310f3784a41e", null ], - [ "pkcs11_signature_sign_continue", "a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a", null ], - [ "pkcs11_signature_sign_finish", "a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7", null ], - [ "pkcs11_signature_sign_init", "a01450.html#ga742c35812a444a87e35150e2332be0c2", null ], - [ "pkcs11_signature_verify", "a01450.html#ga27b3652fb8a87f7f40fff10c63316b35", null ], - [ "pkcs11_signature_verify_continue", "a01450.html#gab735278cab8e184d682b4ed8b12dbb1b", null ], - [ "pkcs11_signature_verify_finish", "a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da", null ], - [ "pkcs11_signature_verify_init", "a01450.html#ga852f9badf3176a60bfb874fb5d118791", null ] + [ "pkcs11_object_s", "a01887.html", "a01887" ], + [ "pkcs11_object_cache_s", "a01891.html", "a01891" ], + [ "pkcs11_object_create", "a01477.html#ga5cdd6e87496f480f42c44430250794bb", null ], + [ "pkcs11_object_destroy", "a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25", null ], + [ "pkcs11_object_is_private", "a01477.html#gad3eaa8d90b81d65f8e585c81c701f893", null ], + [ "pkcs11_object_monotonic_attributes", "a01477.html#ga230747fbe3b7a13dfda75980844c3e9d", null ] ]; \ No newline at end of file diff --git a/a00761.html b/a00761.html index 7147e7464..d6ed7f156 100644 --- a/a00761.html +++ b/a00761.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_signature.h File Reference +CryptoAuthLib: pkcs11_os.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,58 +99,46 @@
-
pkcs11_signature.h File Reference
+
pkcs11_os.c File Reference
-

PKCS11 Library Sign/Verify Handling. +

PKCS11 Library Operating System Abstraction Functions. More...

-
#include "cryptoki.h"
+
#include "pkcs11_os.h"
+#include "pkcs11_util.h"
+#include "pkcs11_init.h"
- - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_signature_sign_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
-CK_RV pkcs11_signature_sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
-CK_RV pkcs11_signature_sign_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
-CK_RV pkcs11_signature_sign_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
-CK_RV pkcs11_signature_verify_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
-CK_RV pkcs11_signature_verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
-CK_RV pkcs11_signature_verify_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
-CK_RV pkcs11_signature_verify_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 
CK_RV pkcs11_os_create_mutex (CK_VOID_PTR_PTR ppMutex)
 Application callback for creating a mutex object.
 
+CK_RV pkcs11_os_destroy_mutex (CK_VOID_PTR pMutex)
 
+CK_RV pkcs11_os_lock_mutex (CK_VOID_PTR pMutex)
 
+CK_RV pkcs11_os_unlock_mutex (CK_VOID_PTR pMutex)
 
+CK_RV pkcs11_os_alloc_shared_ctx (void **ppShared, size_t size)
 
+CK_RV pkcs11_os_free_shared_ctx (void *pShared, size_t size)
 

Detailed Description

-

PKCS11 Library Sign/Verify Handling.

+

PKCS11 Library Operating System Abstraction Functions.

diff --git a/a00761.js b/a00761.js index afbe5bf17..e1f9e4698 100644 --- a/a00761.js +++ b/a00761.js @@ -1,11 +1,4 @@ var a00761 = [ - [ "pkcs11_signature_sign", "a01450.html#ga4641a3dd4da46f801565310f3784a41e", null ], - [ "pkcs11_signature_sign_continue", "a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a", null ], - [ "pkcs11_signature_sign_finish", "a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7", null ], - [ "pkcs11_signature_sign_init", "a01450.html#ga742c35812a444a87e35150e2332be0c2", null ], - [ "pkcs11_signature_verify", "a01450.html#ga27b3652fb8a87f7f40fff10c63316b35", null ], - [ "pkcs11_signature_verify_continue", "a01450.html#gab735278cab8e184d682b4ed8b12dbb1b", null ], - [ "pkcs11_signature_verify_finish", "a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da", null ], - [ "pkcs11_signature_verify_init", "a01450.html#ga852f9badf3176a60bfb874fb5d118791", null ] + [ "pkcs11_os_create_mutex", "a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362", null ] ]; \ No newline at end of file diff --git a/a00764.html b/a00764.html index 4057ae9b6..f05bf5d41 100644 --- a/a00764.html +++ b/a00764.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_slot.c File Reference +CryptoAuthLib: pkcs11_os.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,64 +98,56 @@
-
pkcs11_slot.c File Reference
+
pkcs11_os.h File Reference
-

PKCS11 Library Slot Handling. +

PKCS11 Library Operating System Abstraction. More...

-
#include "cryptoauthlib.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_init.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_info.h"
-#include "pkcs11_util.h"
-#include "pkcs11_object.h"
-#include "pkcs11_os.h"
-#include <stdio.h>
+
#include "cryptoki.h"
+#include "cryptoauthlib.h"
+ + + + + +

+Macros

+#define pkcs11_os_malloc   hal_malloc
 
+#define pkcs11_os_free   hal_free
 
- - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + +

Functions

-pkcs11_slot_ctx_ptr pkcs11_slot_get_context (pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID)
 Retrieve the current slot context.
 
-pkcs11_slot_ctx_ptr pkcs11_slot_get_new_context (pkcs11_lib_ctx_ptr lib_ctx)
 
-CK_VOID_PTR pkcs11_slot_initslots (CK_ULONG pulCount)
 
-CK_RV pkcs11_slot_deinitslots (pkcs11_lib_ctx_ptr lib_ctx)
 
-CK_RV pkcs11_slot_config (CK_SLOT_ID slotID)
 
-CK_RV pkcs11_slot_init (CK_SLOT_ID slotID)
 This is an internal function that initializes a pkcs11 slot - it must already have the locks in place before being called.
 
-CK_RV pkcs11_slot_get_list (CK_BBOOL tokenPresent, CK_SLOT_ID_PTR pSlotList, CK_ULONG_PTR pulCount)
 
-CK_RV pkcs11_slot_get_info (CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo)
 Obtains information about a particular slot.
 
CK_RV pkcs11_os_create_mutex (CK_VOID_PTR_PTR ppMutex)
 Application callback for creating a mutex object.
 
+CK_RV pkcs11_os_destroy_mutex (CK_VOID_PTR pMutex)
 
+CK_RV pkcs11_os_lock_mutex (CK_VOID_PTR pMutex)
 
+CK_RV pkcs11_os_unlock_mutex (CK_VOID_PTR pMutex)
 
+CK_RV pkcs11_os_alloc_shared_ctx (void **ppShared, size_t size)
 
+CK_RV pkcs11_os_free_shared_ctx (void *pShared, size_t size)
 

Detailed Description

-

PKCS11 Library Slot Handling.

-

The nomenclature here can lead to some confusion - the pkcs11 slot is not the same as a device slot. So for example each slot defined here is a specific device (most systems would have only one). The "slots" as defined by the device specification would be enumerated seperately as related to specific supported mechanisms as cryptographic "objects".

+

PKCS11 Library Operating System Abstraction.

diff --git a/a00764.js b/a00764.js index 7792718de..4456568e1 100644 --- a/a00764.js +++ b/a00764.js @@ -1,6 +1,4 @@ var a00764 = [ - [ "pkcs11_slot_get_context", "a01450.html#ga987853011908614aba0db7c5933b0a20", null ], - [ "pkcs11_slot_get_info", "a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2", null ], - [ "pkcs11_slot_init", "a01450.html#ga418414364e88d0673b4f6c90cd62ebed", null ] + [ "pkcs11_os_create_mutex", "a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362", null ] ]; \ No newline at end of file diff --git a/a00767.html b/a00767.html index a904d52ad..2dbfd97bf 100644 --- a/a00767.html +++ b/a00767.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_slot.h File Reference +CryptoAuthLib: pkcs11_session.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,96 +98,70 @@
-
pkcs11_slot.h File Reference
+
pkcs11_session.c File Reference
-

PKCS11 Library Slot Handling & Context. +

PKCS11 Library Session Handling. More...

-
#include "pkcs11_init.h"
-#include "cryptoauthlib.h"
+
#include "cryptoauthlib.h"
+#include "host/atca_host.h"
+#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_session.h"
+#include "pkcs11_token.h"
+#include "pkcs11_init.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_object.h"
+#include "pkcs11_os.h"
+#include "pkcs11_util.h"
+#include "pkcs11_key.h"
+#include "pkcs11_cert.h"
- - - -

-Data Structures

struct  pkcs11_slot_ctx_s
 
- - - - - - - -

-Macros

-#define SLOT_STATE_UNINITIALIZED   (0U)
 
-#define SLOT_STATE_CONFIGURED   (1U)
 
-#define SLOT_STATE_READY   (2U)
 
- - - -

-Typedefs

typedef struct pkcs11_slot_ctx_s pkcs11_slot_ctx
 
- - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + +

Functions

-CK_RV pkcs11_slot_init (CK_SLOT_ID slotID)
 This is an internal function that initializes a pkcs11 slot - it must already have the locks in place before being called.
 
-CK_RV pkcs11_slot_config (CK_SLOT_ID slotID)
 
-CK_VOID_PTR pkcs11_slot_initslots (CK_ULONG pulCount)
 
-CK_RV pkcs11_slot_deinitslots (pkcs11_lib_ctx_ptr lib_ctx)
 
-pkcs11_slot_ctx_ptr pkcs11_slot_get_context (pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID)
 Retrieve the current slot context.
 
-pkcs11_slot_ctx_ptr pkcs11_slot_get_new_context (pkcs11_lib_ctx_ptr lib_ctx)
 
-CK_RV pkcs11_slot_get_list (CK_BBOOL tokenPresent, CK_SLOT_ID_PTR pSlotList, CK_ULONG_PTR pulCount)
 
-CK_RV pkcs11_slot_get_info (CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo)
 Obtains information about a particular slot.
 
+pkcs11_session_ctx_ptr pkcs11_get_session_context (CK_SESSION_HANDLE hSession)
 
+CK_RV pkcs11_session_check (pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession)
 Check if the session is initialized properly.
 
+CK_RV pkcs11_reserve_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
+CK_RV pkcs11_release_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
+CK_RV pkcs11_session_open (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY notify, CK_SESSION_HANDLE_PTR phSession)
 
+CK_RV pkcs11_session_close (CK_SESSION_HANDLE hSession)
 
CK_RV pkcs11_session_closeall (CK_SLOT_ID slotID)
 Close all sessions for a given slot - not actually all open sessions.
 
+CK_RV pkcs11_session_get_info (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Obtains information about a particular session.
 
CK_RV pkcs11_session_login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 
+CK_RV pkcs11_session_logout (CK_SESSION_HANDLE hSession)
 

Detailed Description

-

PKCS11 Library Slot Handling & Context.

+

PKCS11 Library Session Handling.

-

Typedef Documentation

- -

◆ pkcs11_slot_ctx

- -
-
- - - - -
typedef struct pkcs11_slot_ctx_s pkcs11_slot_ctx
-
-

Slot Context

- -
-
-
+
diff --git a/a00767.js b/a00767.js index 51ea651ed..fe5a6f397 100644 --- a/a00767.js +++ b/a00767.js @@ -1,8 +1,7 @@ var a00767 = [ - [ "pkcs11_slot_ctx_s", "a01876.html", "a01876" ], - [ "pkcs11_slot_ctx", "a00767.html#a1813685567d78b9f762d2f1eec531616", null ], - [ "pkcs11_slot_get_context", "a01450.html#ga987853011908614aba0db7c5933b0a20", null ], - [ "pkcs11_slot_get_info", "a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2", null ], - [ "pkcs11_slot_init", "a01450.html#ga418414364e88d0673b4f6c90cd62ebed", null ] + [ "pkcs11_session_check", "a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b", null ], + [ "pkcs11_session_closeall", "a01477.html#ga43525e77f9049b545fa09129cacf9c9a", null ], + [ "pkcs11_session_get_info", "a01477.html#ga236a002e179ed36a0b81399a3e11fcb8", null ], + [ "pkcs11_session_login", "a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df", null ] ]; \ No newline at end of file diff --git a/a00770.html b/a00770.html index 2f9267b91..f831c25d6 100644 --- a/a00770.html +++ b/a00770.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_token.h File Reference +CryptoAuthLib: pkcs11_session.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,60 +98,99 @@
-
pkcs11_token.h File Reference
+
pkcs11_session.h File Reference
-

PKCS11 Library Token Management & Context. +

PKCS11 Library Session Management & Context. More...

-
#include "pkcs11_init.h"
-#include "pkcs11_session.h"
+
#include "cryptoki.h"
+#include "pkcs11_config.h"
+#include "cal_internal.h"
- - - + + + + + +

-Macros

-#define ATCA_SERIAL_NUM_SIZE   (9)
 

+Data Structures

struct  pkcs11_session_mech_ctx_s
 
struct  pkcs11_session_ctx_s
 
+ + + + + + + + +

+Typedefs

+typedef struct pkcs11_session_mech_ctx_s pkcs11_session_mech_ctx
 
+typedef struct pkcs11_session_mech_ctx_spkcs11_session_mech_ctx_ptr
 
typedef struct pkcs11_session_ctx_s pkcs11_session_ctx
 
+typedef struct pkcs11_session_ctx_spkcs11_session_ctx_ptr
 
- - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + +

Functions

CK_RV pkcs11_token_init (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 
-CK_RV pkcs11_token_get_access_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_writable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_storage (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_info (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
-CK_RV pkcs11_token_convert_pin_to_key (const CK_UTF8CHAR_PTR pPin, const CK_ULONG ulPinLen, const CK_UTF8CHAR_PTR pSalt, const CK_ULONG ulSaltLen, CK_BYTE_PTR pKey, CK_ULONG ulKeyLen, pkcs11_slot_ctx_ptr slot_ctx)
 
-CK_RV pkcs11_token_random (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
-CK_RV pkcs11_token_set_pin (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 
+pkcs11_session_ctx_ptr pkcs11_get_session_context (CK_SESSION_HANDLE hSession)
 
+CK_RV pkcs11_session_check (pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession)
 Check if the session is initialized properly.
 
+CK_RV pkcs11_session_get_info (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Obtains information about a particular session.
 
+CK_RV pkcs11_session_open (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY notify, CK_SESSION_HANDLE_PTR phSession)
 
+CK_RV pkcs11_session_close (CK_SESSION_HANDLE hSession)
 
CK_RV pkcs11_session_closeall (CK_SLOT_ID slotID)
 Close all sessions for a given slot - not actually all open sessions.
 
CK_RV pkcs11_session_login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 
+CK_RV pkcs11_session_logout (CK_SESSION_HANDLE hSession)
 
+CK_RV pkcs11_reserve_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
+CK_RV pkcs11_release_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 

Detailed Description

-

PKCS11 Library Token Management & Context.

+

PKCS11 Library Session Management & Context.

-
+

Typedef Documentation

+ +

◆ pkcs11_session_ctx

+ +
+
+ + + + +
typedef struct pkcs11_session_ctx_s pkcs11_session_ctx
+
+

Session Context

+ +
+
+
diff --git a/a00770.js b/a00770.js index e96b104a9..9fbc9a3aa 100644 --- a/a00770.js +++ b/a00770.js @@ -1,6 +1,10 @@ var a00770 = [ - [ "pkcs11_token_get_info", "a01450.html#ga7bf2fea766cab4645fe615661bcf0db9", null ], - [ "pkcs11_token_init", "a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45", null ], - [ "pkcs11_token_random", "a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401", null ] + [ "pkcs11_session_mech_ctx_s", "a01895.html", null ], + [ "pkcs11_session_ctx_s", "a01907.html", null ], + [ "pkcs11_session_ctx", "a00770.html#a9d8980ea83d2e8eb2a9f45210ba5c54d", null ], + [ "pkcs11_session_check", "a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b", null ], + [ "pkcs11_session_closeall", "a01477.html#ga43525e77f9049b545fa09129cacf9c9a", null ], + [ "pkcs11_session_get_info", "a01477.html#ga236a002e179ed36a0b81399a3e11fcb8", null ], + [ "pkcs11_session_login", "a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df", null ] ]; \ No newline at end of file diff --git a/a00773.html b/a00773.html index 32270840a..a500bab3e 100644 --- a/a00773.html +++ b/a00773.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_util.c File Reference +CryptoAuthLib: pkcs11_signature.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,35 +99,68 @@
-
pkcs11_util.c File Reference
+
pkcs11_signature.c File Reference
-

PKCS11 Library Utility Functions. +

PKCS11 Library Sign/Verify Handling. More...

-
#include "pkcs11_util.h"
+
#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_init.h"
+#include "pkcs11_signature.h"
+#include "pkcs11_object.h"
+#include "pkcs11_session.h"
+#include "pkcs11_util.h"
+#include "cryptoauthlib.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_key.h"
+#include "atcacert/atcacert_der.h"
- - - - - - + + + + + + + + + + + + + + + + + + + + + + + +

Functions

-void pkcs11_util_escape_string (CK_UTF8CHAR_PTR buf, CK_ULONG buf_len)
 
-CK_RV pkcs11_util_convert_rv (ATCA_STATUS status)
 
-int pkcs11_util_memset (void *dest, size_t destsz, int ch, size_t count)
 
+CK_RV pkcs11_signature_sign_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
+CK_RV pkcs11_signature_sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
+CK_RV pkcs11_signature_sign_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
+CK_RV pkcs11_signature_sign_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
+CK_RV pkcs11_signature_verify_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
+CK_RV pkcs11_signature_verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
+CK_RV pkcs11_signature_verify_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
+CK_RV pkcs11_signature_verify_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 

Detailed Description

-

PKCS11 Library Utility Functions.

+

PKCS11 Library Sign/Verify Handling.

diff --git a/a00776.html b/a00776.html index 47c4d2611..254bf9f17 100644 --- a/a00776.html +++ b/a00776.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_util.h File Reference +CryptoAuthLib: pkcs11_signature.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,45 +98,59 @@
-
pkcs11_util.h File Reference
+
pkcs11_signature.h File Reference
-

PKCS11 Library Utilities. +

PKCS11 Library Sign/Verify Handling. More...

-
#include "pkcs11_config.h"
-#include "cryptoki.h"
-#include "cryptoauthlib.h"
+
#include "cryptoki.h"
- - - -

-Macros

-#define PKCS11_UTIL_ARRAY_SIZE(x)   sizeof(x) / sizeof(x[0])
 
- - - - - - + + + + + + + + + + + + + + + + + + + + + + + +

Functions

-void pkcs11_util_escape_string (CK_UTF8CHAR_PTR buf, CK_ULONG buf_len)
 
-CK_RV pkcs11_util_convert_rv (ATCA_STATUS status)
 
-int pkcs11_util_memset (void *dest, size_t destsz, int ch, size_t count)
 
+CK_RV pkcs11_signature_sign_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
+CK_RV pkcs11_signature_sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
+CK_RV pkcs11_signature_sign_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
+CK_RV pkcs11_signature_sign_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
+CK_RV pkcs11_signature_verify_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
+CK_RV pkcs11_signature_verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
+CK_RV pkcs11_signature_verify_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
+CK_RV pkcs11_signature_verify_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 

Detailed Description

-

PKCS11 Library Utilities.

+

PKCS11 Library Sign/Verify Handling.

diff --git a/a00785.html b/a00785.html index a62cecbd2..1ae170f1b 100644 --- a/a00785.html +++ b/a00785.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_config.c File Reference +CryptoAuthLib: pkcs11_token.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,102 +98,60 @@
-
pkcs11_config.c File Reference
+
pkcs11_token.h File Reference
-

PKCS11 Library Configuration. +

PKCS11 Library Token Management & Context. More...

-
#include <stdbool.h>
-#include "cryptoauthlib.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_object.h"
-#include "pkcs11_key.h"
-#include "pkcs11_cert.h"
-#include "pkcs11_os.h"
-#include "pkcs11_util.h"
-#include <limits.h>
-#include <stdio.h>
-#include <ctype.h>
-#include <stdlib.h>
-#include <errno.h>
-#include <fcntl.h>
-#include <dirent.h>
+
#include "pkcs11_init.h"
+#include "pkcs11_session.h"
- - - -

-Data Structures

struct  pkcs11_conf_filedata_s
 
- - - - - - -

Macros

-#define PKCS11_CONFIG_U8_MAX   0xFFL
 
-#define PKCS11_CONFIG_U16_MAX   0xFFFFL
 
-#define PKCS11_CONFIG_U32_MAX   0xFFFFFFFFL
 
- - - - - + +

-Typedefs

-typedef struct pkcs11_conf_filedata_s pkcs11_conf_filedata
 
-typedef struct pkcs11_conf_filedata_spkcs11_conf_filedata_ptr
 
+#define ATCA_SERIAL_NUM_SIZE   (9)
 
- - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +

Functions

-void pkcs11_config_init_private (pkcs11_object_ptr pObject, const char *label, size_t len)
 
-void pkcs11_config_init_public (pkcs11_object_ptr pObject, const char *label, size_t len)
 
-void pkcs11_config_init_secret (pkcs11_object_ptr pObject, const char *label, size_t len, size_t keylen)
 
-void pkcs11_config_init_cert (pkcs11_object_ptr pObject, const char *label, size_t len)
 
-void pkcs11_config_split_string (char *s, char splitter, int *argc, char *argv[])
 
-CK_RV pkcs11_config_cert (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pLabel)
 
-CK_RV pkcs11_config_key (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pLabel)
 
-CK_RV pkcs11_config_remove_object (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject)
 
-CK_RV pkcs11_config_load_objects (pkcs11_slot_ctx_ptr slot_ctx)
 
-CK_RV pkcs11_config_load (pkcs11_slot_ctx_ptr slot_ctx)
 
CK_RV pkcs11_token_init (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 
+CK_RV pkcs11_token_get_access_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_token_get_writable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_token_get_storage (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_token_get_info (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
+CK_RV pkcs11_token_convert_pin_to_key (const CK_UTF8CHAR_PTR pPin, const CK_ULONG ulPinLen, const CK_UTF8CHAR_PTR pSalt, const CK_ULONG ulSaltLen, CK_BYTE_PTR pKey, CK_ULONG ulKeyLen, pkcs11_slot_ctx_ptr slot_ctx)
 
+CK_RV pkcs11_token_random (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
+CK_RV pkcs11_token_set_pin (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 

Detailed Description

-

PKCS11 Library Configuration.

+

PKCS11 Library Token Management & Context.

diff --git a/a00788.html b/a00788.html index a18926452..74598a9e7 100644 --- a/a00788.html +++ b/a00788.html @@ -5,7 +5,7 @@ -CryptoAuthLib: pkcs11_token.c File Reference +CryptoAuthLib: pkcs11_util.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -99,61 +99,35 @@
-
pkcs11_token.c File Reference
+
pkcs11_util.c File Reference
-

PKCS11 Library Token Handling. +

PKCS11 Library Utility Functions. More...

-
#include "cryptoauthlib.h"
-#include "pkcs11_config.h"
-#include "pkcs11_debug.h"
-#include "pkcs11_token.h"
-#include "pkcs11_slot.h"
-#include "pkcs11_info.h"
-#include "pkcs11_util.h"
-#include "pkcs11_object.h"
-#include "pkcs11_key.h"
-#include "pkcs11_cert.h"
-#include "pkcs11_session.h"
+
#include "pkcs11_util.h"
- - - - - - - - - - - - - - - - - - + + + + + +

Functions

CK_RV pkcs11_token_init (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 
-CK_RV pkcs11_token_get_access_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_writable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_storage (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_info (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
-CK_RV pkcs11_token_random (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
-CK_RV pkcs11_token_convert_pin_to_key (const CK_UTF8CHAR_PTR pPin, const CK_ULONG ulPinLen, const CK_UTF8CHAR_PTR pSalt, const CK_ULONG ulSaltLen, CK_BYTE_PTR pKey, CK_ULONG ulKeyLen, pkcs11_slot_ctx_ptr slot_ctx)
 
-CK_RV pkcs11_token_set_pin (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 
+void pkcs11_util_escape_string (CK_UTF8CHAR_PTR buf, CK_ULONG buf_len)
 
+CK_RV pkcs11_util_convert_rv (ATCA_STATUS status)
 
+int pkcs11_util_memset (void *dest, size_t destsz, int ch, size_t count)
 

Detailed Description

-

PKCS11 Library Token Handling.

+

PKCS11 Library Utility Functions.

diff --git a/a00788.js b/a00788.js deleted file mode 100644 index ec6c92ecc..000000000 --- a/a00788.js +++ /dev/null @@ -1,6 +0,0 @@ -var a00788 = -[ - [ "pkcs11_token_get_info", "a01450.html#ga7bf2fea766cab4645fe615661bcf0db9", null ], - [ "pkcs11_token_init", "a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45", null ], - [ "pkcs11_token_random", "a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401", null ] -]; \ No newline at end of file diff --git a/a00791.html b/a00791.html index a60983d3c..2268cced5 100644 --- a/a00791.html +++ b/a00791.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_wolfssl_interface.c File Reference +CryptoAuthLib: pkcs11_util.h File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,22 +97,46 @@
-
atca_wolfssl_interface.c File Reference
+ +
pkcs11_util.h File Reference
-

Crypto abstraction functions for external host side cryptography. +

PKCS11 Library Utilities. More...

-
#include "cryptoauthlib.h"
-

Detailed Description

-

Crypto abstraction functions for external host side cryptography.

+
#include "pkcs11_config.h"
+#include "cryptoki.h"
+#include "cryptoauthlib.h"
+
+ + + +

+Macros

+#define PKCS11_UTIL_ARRAY_SIZE(x)   sizeof(x) / sizeof(x[0])
 
+ + + + + + + +

+Functions

+void pkcs11_util_escape_string (CK_UTF8CHAR_PTR buf, CK_ULONG buf_len)
 
+CK_RV pkcs11_util_convert_rv (ATCA_STATUS status)
 
+int pkcs11_util_memset (void *dest, size_t destsz, int ch, size_t count)
 
+

Detailed Description

+

PKCS11 Library Utilities.

diff --git a/a00794.html b/a00794.html deleted file mode 100644 index 456137ae3..000000000 --- a/a00794.html +++ /dev/null @@ -1,120 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_wolfssl_interface.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
atca_wolfssl_interface.h File Reference
-
-
- -

Configuration Check for WolfSSL Integration Support. -More...

-
#include "atca_config_check.h"
-

Detailed Description

-

Configuration Check for WolfSSL Integration Support.

- -
-
- - - - diff --git a/a00797.html b/a00797.html deleted file mode 100644 index 17ca96f08..000000000 --- a/a00797.html +++ /dev/null @@ -1,119 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_wolfssl_internal.h File Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
atca_wolfssl_internal.h File Reference
-
-
- -

WolfSSL Integration Support. -More...

-

Detailed Description

-

WolfSSL Integration Support.

- -
-
- - - - diff --git a/a00800.html b/a00800.html index 53741991c..92b090b75 100644 --- a/a00800.html +++ b/a00800.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_config_check.h File Reference +CryptoAuthLib: pkcs11_config.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,461 +98,105 @@
-
atca_config_check.h File Reference
+Data Structures | +Macros | +Typedefs | +Functions
+
pkcs11_config.c File Reference
-

Consistency checks for configuration options. +

PKCS11 Library Configuration. More...

-
#include "atca_config.h"
+
#include <stdbool.h>
+#include "cryptoauthlib.h"
+#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_object.h"
+#include "pkcs11_key.h"
+#include "pkcs11_cert.h"
+#include "pkcs11_os.h"
+#include "pkcs11_util.h"
+#include <limits.h>
+#include <stdio.h>
+#include <ctype.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <dirent.h>
+ + + +

+Data Structures

struct  pkcs11_conf_filedata_s
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + +

Macros

-#define FEATURE_ENABLED   (1)
 
-#define FEATURE_DISABLED   (0)
 
-#define DEFAULT_ENABLED   FEATURE_ENABLED
 
-#define DEFAULT_DISABLED   FEATURE_DISABLED
 
#define ATCA_SHA_SUPPORT   1
 
-#define ATCA_ECC_SUPPORT   DEFAULT_ENABLED
 
-#define ATCA_CA2_SUPPORT   DEFAULT_ENABLED
 
-#define ATCA_CA2_CERT_SUPPORT   DEFAULT_ENABLED
 
-#define ATCA_CA_SUPPORT   DEFAULT_ENABLED
 
-#define ATCA_HOSTLIB_EN   DEFAULT_ENABLED
 
#define ATCA_USE_ATCAB_FUNCTIONS
 
-#define ATCA_CHECK_PARAMS_EN   DEFAULT_ENABLED
 
#define ATCA_CHECK_INVALID_MSG(c, s, m)   if (c) { return ATCA_TRACE(s, m); }
 
-#define ATCA_CHECK_VALID_MSG(c, m)   if (!ATCA_TRACE(!(c), m))
 
-#define ATCA_CHECK_INVALID(c, s)   ATCA_CHECK_INVALID_MSG(c, s, "")
 
-#define ATCA_CHECK_VALID(c)   ATCA_CHECK_VALID_MSG(c, "")
 
#define MULTIPART_BUF_EN   (DEFAULT_DISABLED)
 
#define ATCACERT_EN   (DEFAULT_ENABLED)
 
-#define ATCA_HEAP
 
#define ATCA_UNUSED_VAR_CHECK   (DEFAULT_ENABLED)
 
-#define ATCAB_AES_EN   (DEFAULT_ENABLED)
 
#define ATCAB_AES_GFM_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_AES_GCM_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_CHECKMAC_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_COUNTER_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_DERIVEKEY_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_ECDH_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_ECDH_ENC_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_GENDIG_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_GENKEY_EN   (DEFAULT_ENABLED)
 
#define ATCAB_GENKEY_MAC_EN   ATCAB_GENKEY_EN
 
-#define ATCAB_HMAC_EN   (DEFAULT_ENABLED)
 
#define ATCAB_INFO_LATCH_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_KDF_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_LOCK_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_MAC_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_NONCE_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_PRIVWRITE_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_RANDOM_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_READ_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_READ_ENC_EN   ATCAB_READ_EN
 
-#define ATCAB_SECUREBOOT_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_SECUREBOOT_MAC_EN   ATCAB_SECUREBOOT_EN
 
-#define ATCAB_SELFTEST_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_SHA_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_SHA_HMAC_EN   ATCAB_SHA_EN
 
-#define ATCAB_SHA_CONTEXT_EN   ATCAB_SHA_EN
 
-#define ATCAB_SIGN_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_SIGN_INTERNAL_EN   ATCAB_SIGN_EN
 
-#define ATCAB_UPDATEEXTRA_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_VERIFY_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_VERIFY_EXTERN_EN   ATCAB_VERIFY_EN
 
#define ATCAB_VERIFY_MAC_EN   ATCAB_VERIFY_EN
 
-#define ATCAB_VERIFY_STORED_EN   ATCAB_VERIFY_EN
 
-#define ATCAB_VERIFY_VALIDATE_EN   ATCAB_VERIFY_EN
 
-#define ATCAB_WRITE_EN   (DEFAULT_ENABLED)
 
-#define ATCAB_WRITE_ENC_EN   ATCAB_WRITE_EN
 
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
 
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
 
-#define ATCAC_SHA256_HMAC_EN   ATCAC_SHA256_EN
 
-#define ATCAC_SHA256_HMAC_CTR_EN   ATCAC_SHA256_HMAC_EN
 
#define ATCAC_RANDOM_EN   ATCA_HOSTLIB_EN
 
#define ATCAC_VERIFY_EN   ATCA_HOSTLIB_EN
 
#define ATCAC_SIGN_EN   ATCA_HOSTLIB_EN
 
+#define PKCS11_CONFIG_U8_MAX   0xFFL
 
+#define PKCS11_CONFIG_U16_MAX   0xFFFFL
 
+#define PKCS11_CONFIG_U32_MAX   0xFFFFFFFFL
 
+ + + + + +

+Typedefs

+typedef struct pkcs11_conf_filedata_s pkcs11_conf_filedata
 
+typedef struct pkcs11_conf_filedata_spkcs11_conf_filedata_ptr
 
+ + + + + + + + + + + + + + + + + + + + + + +

+Functions

+void pkcs11_config_set_key_size (pkcs11_object_ptr pObject)
 
+void pkcs11_config_init_private (pkcs11_object_ptr pObject, const char *label, size_t len)
 
+void pkcs11_config_init_public (pkcs11_object_ptr pObject, const char *label, size_t len)
 
+void pkcs11_config_init_secret (pkcs11_object_ptr pObject, const char *label, size_t len, size_t keylen)
 
+void pkcs11_config_init_cert (pkcs11_object_ptr pObject, const char *label, size_t len)
 
+void pkcs11_config_split_string (char *s, char splitter, int *argc, char *argv[])
 
+CK_RV pkcs11_config_cert (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pLabel)
 
+CK_RV pkcs11_config_key (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pLabel)
 
+CK_RV pkcs11_config_remove_object (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject)
 
+CK_RV pkcs11_config_load_objects (pkcs11_slot_ctx_ptr slot_ctx)
 
+CK_RV pkcs11_config_load (pkcs11_slot_ctx_ptr slot_ctx)
 

Detailed Description

-

Consistency checks for configuration options.

- -

Macro Definition Documentation

- -

◆ ATCA_CHECK_INVALID_MSG

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
#define ATCA_CHECK_INVALID_MSG( c,
 s,
 
)   if (c) { return ATCA_TRACE(s, m); }
-
-

Emits message and returns the status code when the condition is true

- -
-
- -

◆ ATCA_SHA_SUPPORT

- -
-
- - - - -
#define ATCA_SHA_SUPPORT   1
-
-

Library Configuration File - All build attributes should be included in atca_config.h

- -
-
- -

◆ ATCA_UNUSED_VAR_CHECK

- -
-
- - - - -
#define ATCA_UNUSED_VAR_CHECK   (DEFAULT_ENABLED)
-
-

Enables removal of compiler warning due to unused variables

- -
-
- -

◆ ATCA_USE_ATCAB_FUNCTIONS

- -
-
- - - - -
#define ATCA_USE_ATCAB_FUNCTIONS
-
-

Does the atcab_ API layer need to be instantiated (adds a layer of abstraction)

- -
-
- -

◆ ATCAB_AES_GFM_EN

- -
-
- - - - -
#define ATCAB_AES_GFM_EN   (DEFAULT_ENABLED)
-
-

Enable ATCAB_AES_GFM_EN to enabled Galois Field Multiply

-

Supported API's: atcab_aes

- -
-
- -

◆ ATCAB_GENKEY_MAC_EN

- -
-
- - - - -
#define ATCAB_GENKEY_MAC_EN   ATCAB_GENKEY_EN
-
-

Requires: ATCAB_GENKEY_EN

-

Enable ATCAB_GENKEY_MAC_EN which provides for a mac with the genkey command

-

Supported API's: atcab_genkey_base

- -
-
- -

◆ ATCAB_INFO_LATCH_EN

- -
-
- - - - -
#define ATCAB_INFO_LATCH_EN   (DEFAULT_ENABLED)
-
-

Enable ATCAB_INFO_LATCH_EN which enables control of GPIOs and the persistent latch

-

Supported API's: atcab_info_base

- -
-
- -

◆ ATCAB_VERIFY_MAC_EN

- -
-
- - - - -
#define ATCAB_VERIFY_MAC_EN   ATCAB_VERIFY_EN
-
-

Requires: ATCAB_VERIFY

-

Executes verification command with verification MAC for the External or Stored Verify modes

-

Supported API's: atcab_verify_extern_mac, atcab_verify_stored_mac

- -
-
- -

◆ ATCAC_RANDOM_EN

- -
-
- - - - -
#define ATCAC_RANDOM_EN   ATCA_HOSTLIB_EN
-
-

Requires: ATCA_HOSTLIB_EN

-

Enable ATCAC_RANDOM_EN get random numbers from the host's implementation - generally assumed to come from the host's cryptographic library or peripheral driver

- -
-
- -

◆ ATCAC_SHA1_EN

- -
-
- - - - -
#define ATCAC_SHA1_EN   (DEFAULT_ENABLED)
-
-

Enable ATCAC_SHA1_EN to enable sha1 host side api

-

Supported API's: atcab_write

- -
-
- -

◆ ATCAC_SHA256_EN

- -
-
- - - - -
#define ATCAC_SHA256_EN   (DEFAULT_ENABLED)
-
-

Enable ATCAC_SHA256_EN to enable sha256 host side api

-

Supported API's: atcab_write

- -
-
- -

◆ ATCAC_SIGN_EN

- -
-
- - - - -
#define ATCAC_SIGN_EN   ATCA_HOSTLIB_EN
-
-

Requires: ATCA_HOSTLIB_EN

-

Enable ATCAC_SIGN_EN to use the host's sign functions. Generally assumed to come from the host's cryptographic library or peripheral driver.

- -
-
- -

◆ ATCAC_VERIFY_EN

- -
-
- - - - -
#define ATCAC_VERIFY_EN   ATCA_HOSTLIB_EN
-
-

Requires: ATCA_HOSTLIB_EN

-

Enable ATCAC_VERIFY_EN to use the host's verify functions. Generally assumed to come from the host's cryptographic library or peripheral driver.

- -
-
- -

◆ ATCACERT_EN

- -
-
- - - - -
#define ATCACERT_EN   (DEFAULT_ENABLED)
-
-

Enables the ATCACERT x509 handling module

- -
-
- -

◆ MULTIPART_BUF_EN

- -
-
- - - - -
#define MULTIPART_BUF_EN   (DEFAULT_DISABLED)
-
-

Enables multipart buffer handling (generally for small memory model platforms)

- -
-
-
+

PKCS11 Library Configuration.

+ +
diff --git a/a00800.js b/a00800.js deleted file mode 100644 index 239e5eb2f..000000000 --- a/a00800.js +++ /dev/null @@ -1,18 +0,0 @@ -var a00800 = -[ - [ "ATCA_CHECK_INVALID_MSG", "a00800.html#a2593f45dcf42602b3c334dccb9c52395", null ], - [ "ATCA_SHA_SUPPORT", "a00800.html#afe8da91949841c137ea573c327bff267", null ], - [ "ATCA_UNUSED_VAR_CHECK", "a00800.html#a987213394bc9a51f05c4a5f1b1de69f8", null ], - [ "ATCA_USE_ATCAB_FUNCTIONS", "a00800.html#ab97062ef8dcf4e46b403d9c22aeb22c9", null ], - [ "ATCAB_AES_GFM_EN", "a00800.html#a31c9145169cb4a4e3be509ad04a40b04", null ], - [ "ATCAB_GENKEY_MAC_EN", "a00800.html#a85d4ccd2d66f9b2fd10c7a2e408c4737", null ], - [ "ATCAB_INFO_LATCH_EN", "a00800.html#a5965863afba861e5e0e899229da26e83", null ], - [ "ATCAB_VERIFY_MAC_EN", "a00800.html#a5d69a9273e615d799841edc21bd72dc0", null ], - [ "ATCAC_RANDOM_EN", "a00800.html#add878e0ecc6c87b683935f418f403c7e", null ], - [ "ATCAC_SHA1_EN", "a00800.html#a8e3c7ddf3a16cbdcc42060cdee2d884e", null ], - [ "ATCAC_SHA256_EN", "a00800.html#a99dab792a5983a089fe816abc57bad25", null ], - [ "ATCAC_SIGN_EN", "a00800.html#a094297d2dd0a7e2b4606fc37fc797fcd", null ], - [ "ATCAC_VERIFY_EN", "a00800.html#a7eeef6ad76dccb48d8b1741a9254af97", null ], - [ "ATCACERT_EN", "a00800.html#a3d181d31956d42db1d25281deca4c7e3", null ], - [ "MULTIPART_BUF_EN", "a00800.html#a4ff9c0c2785616e560c43e5312f40c0d", null ] -]; \ No newline at end of file diff --git a/a00803.html b/a00803.html index 5878fcd8e..164291686 100644 --- a/a00803.html +++ b/a00803.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_devtypes.h File Reference +CryptoAuthLib: pkcs11_token.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,89 +98,62 @@
-
atca_devtypes.h File Reference
+Functions
+
pkcs11_token.c File Reference
-

Microchip Crypto Auth. +

PKCS11 Library Token Handling. More...

-
#include <stdint.h>
+
#include "cryptoauthlib.h"
+#include "pkcs11_config.h"
+#include "pkcs11_debug.h"
+#include "pkcs11_token.h"
+#include "pkcs11_slot.h"
+#include "pkcs11_info.h"
+#include "pkcs11_util.h"
+#include "pkcs11_object.h"
+#include "pkcs11_key.h"
+#include "pkcs11_cert.h"
+#include "pkcs11_session.h"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define ATSHA204A   (0U)
 The supported Device type in Cryptoauthlib library.
 
-#define ATECC108A   (1U)
 
-#define ATECC508A   (2U)
 
-#define ATECC608A   (3U)
 
-#define ATECC608B   (3U)
 
-#define ATECC608   (3U)
 
-#define ATSHA206A   (4U)
 
-#define TA100   (0x10U)
 
-#define TA101   (0x11U)
 
-#define ECC204   (0x20U)
 
-#define TA010   (0x21U)
 
-#define ECC206   (0x22U)
 
-#define RNG90   (0x23U)
 
-#define SHA104   (0x24U)
 
-#define SHA105   (0x25U)
 
-#define SHA106   (0x26U)
 
-#define ATCA_DEV_UNKNOWN   (0x7EU)
 
-#define ATCA_DEV_INVALID   (0x7FU)
 
- - - + + + + + + + + + + + + + + + + + + +

-Typedefs

-typedef uint8_t ATCADeviceType
 

+Functions

CK_RV pkcs11_token_init (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 
+CK_RV pkcs11_token_get_access_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_token_get_writable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_token_get_storage (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
+CK_RV pkcs11_token_get_info (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
+CK_RV pkcs11_token_random (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
+CK_RV pkcs11_token_convert_pin_to_key (const CK_UTF8CHAR_PTR pPin, const CK_ULONG ulPinLen, const CK_UTF8CHAR_PTR pSalt, const CK_ULONG ulSaltLen, CK_BYTE_PTR pKey, CK_ULONG ulKeyLen, pkcs11_slot_ctx_ptr slot_ctx)
 
+CK_RV pkcs11_token_set_pin (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 

Detailed Description

-

Microchip Crypto Auth.

+

PKCS11 Library Token Handling.

diff --git a/a00803.js b/a00803.js index b7211bf20..b3e1de02c 100644 --- a/a00803.js +++ b/a00803.js @@ -1,4 +1,6 @@ var a00803 = [ - [ "ATSHA204A", "a01441.html#ga054acfe7d4dd4064f9d27a9ea7fc2337", null ] + [ "pkcs11_token_get_info", "a01477.html#ga7bf2fea766cab4645fe615661bcf0db9", null ], + [ "pkcs11_token_init", "a01477.html#ga7e207adf2d26c1d6ea64f7c60252bf45", null ], + [ "pkcs11_token_random", "a01477.html#gaf4c0c6a2d12d879308f2d42cc61ef401", null ] ]; \ No newline at end of file diff --git a/a00806.html b/a00806.html index f5aae4a9b..cd0761b3b 100644 --- a/a00806.html +++ b/a00806.html @@ -5,7 +5,7 @@ -CryptoAuthLib: atca_iface.c File Reference +CryptoAuthLib: atca_wolfssl_interface.c File Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -97,99 +97,22 @@
- -
atca_iface.c File Reference
+
atca_wolfssl_interface.c File Reference
-

Microchip CryptoAuthLib hardware interface object. +

Crypto abstraction functions for external host side cryptography. More...

-
#include "cryptoauthlib.h"
-#include <ctype.h>
-
- - - -

-Data Structures

struct  devtype_names_t
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS initATCAIface (ATCAIfaceCfg *cfg, ATCAIface ca_iface)
 Initializer for ATCAIface objects.
 
ATCA_STATUS atinit (ATCAIface ca_iface)
 Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.
 
ATCA_STATUS atsend (ATCAIface ca_iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Sends the data to the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atreceive (ATCAIface ca_iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receives data from the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atcontrol (ATCAIface ca_iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations with the underlying hal driver.
 
ATCA_STATUS atwake (ATCAIface ca_iface)
 Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.
 
ATCA_STATUS atidle (ATCAIface ca_iface)
 Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.
 
ATCA_STATUS atsleep (ATCAIface ca_iface)
 Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.
 
ATCAIfaceCfgatgetifacecfg (ATCAIface ca_iface)
 Returns the logical interface configuration for the device.
 
void * atgetifacehaldat (ATCAIface ca_iface)
 Returns the HAL data pointer for the device.
 
bool ifacetype_is_kit (ATCAIfaceType iface_type)
 Check if the given interface is a "kit protocol" one.
 
bool atca_iface_is_kit (ATCAIface ca_iface)
 Check if the given interface is configured as a "kit protocol" one where transactions are atomic.
 
bool atca_iface_is_swi (ATCAIface ca_iface)
 Check if the given interface is configured as a SWI.
 
-int atca_iface_get_retries (ATCAIface ca_iface)
 Retrive the number of retries for a configured interface.
 
-uint16_t atca_iface_get_wake_delay (ATCAIface ca_iface)
 Retrive the wake/retry delay for a configured interface/device.
 
-uint8_t ifacecfg_get_address (ATCAIfaceCfg *cfg)
 Retrieves the device address given an interface configuration.
 
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfg *cfg, uint8_t address, ATCAKitType kitiface)
 Change the address of the selected device.
 
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
 Instruct the HAL driver to release any resources associated with this interface.
 
void deleteATCAIface (ATCAIface *ca_iface)
 Instruct the HAL driver to release any resources associated with this interface, then delete the object.
 
-ATCADeviceType iface_get_device_type_by_name (const char *name)
 Get the ATCADeviceType for a string that looks like a part number.
 
-

Detailed Description

-

Microchip CryptoAuthLib hardware interface object.

+
#include "cryptoauthlib.h"
+

Detailed Description

+

Crypto abstraction functions for external host side cryptography.

diff --git a/a00806.js b/a00806.js deleted file mode 100644 index 2d831d9c0..000000000 --- a/a00806.js +++ /dev/null @@ -1,23 +0,0 @@ -var a00806 = -[ - [ "atca_iface_get_retries", "a01442.html#ga349718dea5d5b558766a31b7dcd7e811", null ], - [ "atca_iface_get_wake_delay", "a01442.html#ga128f54833b5ed2105dae417333e1d651", null ], - [ "atca_iface_is_kit", "a01442.html#gacb09a6fa845efade7d47796bead14d2c", null ], - [ "atca_iface_is_swi", "a01442.html#gad2276d5ebd02613fbeda8ae15b679d1e", null ], - [ "atcontrol", "a01442.html#ga324cef45a35e02b387001afdc9092778", null ], - [ "atgetifacecfg", "a01442.html#gac88ba81abfd42df65c6c0c64414dfc6e", null ], - [ "atgetifacehaldat", "a01442.html#ga5e4163b8882d4eb42d4d5191c8731da0", null ], - [ "atidle", "a01442.html#gac794fffe040e6d47a34c756720f3cbea", null ], - [ "atinit", "a01442.html#ga386353e8700eec35e4548dfa29f13b8d", null ], - [ "atreceive", "a01442.html#ga01badea388343bdf5929c5c2be9f426b", null ], - [ "atsend", "a01442.html#gabd4f20b06efedede6bc4a836cfad8f38", null ], - [ "atsleep", "a01442.html#gac06336335e5f3191e3b1fc06d2830d96", null ], - [ "atwake", "a01442.html#ga32693c852341e1b946bab3cca5f71761", null ], - [ "deleteATCAIface", "a01442.html#gaf8074d759241d3edd6d8ead1d7322a98", null ], - [ "iface_get_device_type_by_name", "a01442.html#ga8e50f9bf69be0910880411e9a0d5bc24", null ], - [ "ifacecfg_get_address", "a01442.html#ga9efe98ee7fe9be95593c7177800efd8d", null ], - [ "ifacecfg_set_address", "a01442.html#ga4e975805352164dc3a8ff553b42c509f", null ], - [ "ifacetype_is_kit", "a01442.html#gaaff5268b9acbf16db03b425e6c54f97c", null ], - [ "initATCAIface", "a01442.html#ga3a31087729a7a2e9a624572f234809fc", null ], - [ "releaseATCAIface", "a01442.html#gab9ee16357a8e397a72eda7e9c8553fb3", null ] -]; \ No newline at end of file diff --git a/a01436.html b/a01436.html deleted file mode 100644 index e6f39ad17..000000000 --- a/a01436.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: Deprecated List - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Deprecated List
-
-
-
-
Global atcab_init_device (ATCADevice ca_device)
-
This function is not recommended for use generally. Use of _ext is recommended instead. You can use atcab_init_ext to obtain an initialized instance and associated it with the global structure - but this shouldn't be a required process except in extremely unusual circumstances.
-
Global atidle (ATCAIface ca_iface)
-
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
-
Global atsleep (ATCAIface ca_iface)
-
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
-
Global atwake (ATCAIface ca_iface)
-
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
-
-
-
-
- - - - diff --git a/a01438.html b/a01438.html deleted file mode 100644 index 8824ba9c0..000000000 --- a/a01438.html +++ /dev/null @@ -1,664 +0,0 @@ - - - - - - - -CryptoAuthLib: TNG API (tng_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
TNG API (tng_)
-
-
- -

These methods provide some convenience functions (mostly around certificates) for TNG devices, which currently include ATECC608A-MAHTN-T. -More...

- - -

TNG Functions

This folder has a number of convenience functions for working with TNG devices (currently ATECC608A-MAHTN-T).These devices have standard certificates that can be easily read using the functions in tng_atcacert_client.h
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

const atcacert_def_ttng_map_get_device_cert_def (int index)
 Helper function to iterate through all trust cert definitions.
 
ATCA_STATUS tng_get_device_cert_def (const atcacert_def_t **cert_def)
 Get the TNG device certificate definition.
 
ATCA_STATUS tng_get_device_cert_def_ext (ATCADevice device, const atcacert_def_t **cert_def)
 Get the TNG device certificate definition.
 
ATCA_STATUS tng_get_device_pubkey (uint8_t *public_key)
 Uses GenKey command to calculate the public key from the primary device public key.
 
-const uint8_t g_tflxtls_cert_template_4_device [500]
 
-const atcacert_def_t g_tflxtls_cert_def_4_device
 
-const atcacert_cert_element_t g_tflxtls_cert_elements_4_device []
 
-ATCA_DLL const atcacert_def_t g_tnglora_cert_def_1_signer
 
-ATCA_DLL const atcacert_def_t g_tnglora_cert_def_2_device
 
-const uint8_t g_cryptoauth_root_ca_002_cert []
 
-const size_t g_cryptoauth_root_ca_002_cert_size
 
-#define CRYPTOAUTH_ROOT_CA_002_PUBLIC_KEY_OFFSET   266
 
-ATCA_DLL const atcacert_def_t g_tnglora_cert_def_4_device
 
-SHARED_LIB_EXPORT const uint8_t g_tnglora_cert_template_4_device []
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tnglora_cert_elements_4_device []
 
-#define TNGLORA_CERT_TEMPLATE_4_DEVICE_SIZE   552
 
-ATCA_DLL const atcacert_def_t g_tngtls_cert_def_1_signer
 
-SHARED_LIB_EXPORT const uint8_t g_tngtls_cert_template_1_signer []
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_1_signer []
 
-#define TNGTLS_CERT_TEMPLATE_1_SIGNER_SIZE   520
 
-ATCA_DLL const atcacert_def_t g_tngtls_cert_def_2_device
 
-SHARED_LIB_EXPORT const uint8_t g_tngtls_cert_template_2_device []
 
-SHARED_LIB_EXPORT const atcacert_cert_element_t g_tngtls_cert_elements_2_device []
 
-#define TNGTLS_CERT_TEMPLATE_2_DEVICE_SIZE   505
 
-#define TNGTLS_CERT_ELEMENTS_2_DEVICE_COUNT   2
 
-ATCA_DLL const atcacert_def_t g_tngtls_cert_def_3_device
 
-ATCA_DLL const uint8_t g_tngtls_cert_template_3_device []
 
-ATCA_DLL const atcacert_cert_element_t g_tngtls_cert_elements_3_device []
 
-#define TNGTLS_CERT_TEMPLATE_3_DEVICE_SIZE   546
 
int tng_atcacert_max_device_cert_size (size_t *max_cert_size)
 Return the maximum possible certificate size in bytes for a TNG device certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.
 
int tng_atcacert_read_device_cert (uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert)
 Reads the device certificate for a TNG device.
 
int tng_atcacert_device_public_key (uint8_t *public_key, uint8_t *cert)
 Reads the device public key.
 
int tng_atcacert_max_signer_cert_size (size_t *max_cert_size)
 Return the maximum possible certificate size in bytes for a TNG signer certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.
 
int tng_atcacert_read_signer_cert (uint8_t *cert, size_t *cert_size)
 Reads the signer certificate for a TNG device.
 
int tng_atcacert_signer_public_key (uint8_t *public_key, uint8_t *cert)
 Reads the signer public key.
 
int tng_atcacert_root_cert_size (size_t *cert_size)
 Get the size of the TNG root cert.
 
int tng_atcacert_root_cert (uint8_t *cert, size_t *cert_size)
 Get the TNG root cert.
 
int tng_atcacert_root_public_key (uint8_t *public_key)
 Gets the root public key.
 
-

Detailed Description

-

These methods provide some convenience functions (mostly around certificates) for TNG devices, which currently include ATECC608A-MAHTN-T.

-

Function Documentation

- -

◆ tng_atcacert_device_public_key()

- -
-
- - - - - - - - - - - - - - - - - - -
int tng_atcacert_device_public_key (uint8_t * public_key,
uint8_t * cert 
)
-
- -

Reads the device public key.

-
Parameters
- - - -
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve.
[in]certIf supplied, the device public key is used from this certificate. If set to NULL, the device public key is read from the device.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_max_device_cert_size()

- -
-
- - - - - - - - -
int tng_atcacert_max_device_cert_size (size_t * max_cert_size)
-
- -

Return the maximum possible certificate size in bytes for a TNG device certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.

-
Parameters
- - -
[out]max_cert_sizeMaximum certificate size will be returned here in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_max_signer_cert_size()

- -
-
- - - - - - - - -
int tng_atcacert_max_signer_cert_size (size_t * max_cert_size)
-
- -

Return the maximum possible certificate size in bytes for a TNG signer certificate. Certificate can be variable size, so this gives an appropriate buffer size when reading the certificate.

-
Parameters
- - -
[out]max_cert_sizeMaximum certificate size will be returned here in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_read_device_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
int tng_atcacert_read_device_cert (uint8_t * cert,
size_t * cert_size,
const uint8_t * signer_cert 
)
-
- -

Reads the device certificate for a TNG device.

-
Parameters
- - - - -
[out]certBuffer to received the certificate (DER format).
[in,out]cert_sizeAs input, the size of the cert buffer in bytes. As output, the size of the certificate returned in cert in bytes.
[in]signer_certIf supplied, the signer public key is used from this certificate. If set to NULL, the signer public key is read from the device.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_read_signer_cert()

- -
-
- - - - - - - - - - - - - - - - - - -
int tng_atcacert_read_signer_cert (uint8_t * cert,
size_t * cert_size 
)
-
- -

Reads the signer certificate for a TNG device.

-
Parameters
- - - -
[out]certBuffer to received the certificate (DER format).
[in,out]cert_sizeAs input, the size of the cert buffer in bytes. As output, the size of the certificate returned in cert in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_root_cert()

- -
-
- - - - - - - - - - - - - - - - - - -
int tng_atcacert_root_cert (uint8_t * cert,
size_t * cert_size 
)
-
- -

Get the TNG root cert.

-
Parameters
- - - -
[out]certBuffer to received the certificate (DER format).
[in,out]cert_sizeAs input, the size of the cert buffer in bytes. As output, the size of the certificate returned in cert in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_root_cert_size()

- -
-
- - - - - - - - -
int tng_atcacert_root_cert_size (size_t * cert_size)
-
- -

Get the size of the TNG root cert.

-
Parameters
- - -
[out]cert_sizeCertificate size will be returned here in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_root_public_key()

- -
-
- - - - - - - - -
int tng_atcacert_root_public_key (uint8_t * public_key)
-
- -

Gets the root public key.

-
Parameters
- - -
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_atcacert_signer_public_key()

- -
-
- - - - - - - - - - - - - - - - - - -
int tng_atcacert_signer_public_key (uint8_t * public_key,
uint8_t * cert 
)
-
- -

Reads the signer public key.

-
Parameters
- - - -
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve.
[in]certIf supplied, the signer public key is used from this certificate. If set to NULL, the signer public key is read from the device.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_get_device_cert_def()

- -
-
- - - - - - - - -
ATCA_STATUS tng_get_device_cert_def (const atcacert_def_t ** cert_def)
-
- -

Get the TNG device certificate definition.

-
Parameters
- - -
[out]cert_defTNG device certificate defnition is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_get_device_cert_def_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS tng_get_device_cert_def_ext (ATCADevice device,
const atcacert_def_t ** cert_def 
)
-
- -

Get the TNG device certificate definition.

-
Parameters
- - - -
[in]devicePointer to the device context pointer
[out]cert_defTNG device certificate defnition is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_get_device_pubkey()

- -
-
- - - - - - - - -
ATCA_STATUS tng_get_device_pubkey (uint8_t * public_key)
-
- -

Uses GenKey command to calculate the public key from the primary device public key.

-
Parameters
- - -
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ tng_map_get_device_cert_def()

- -
-
- - - - - - - - -
const atcacert_def_t * tng_map_get_device_cert_def (int index)
-
- -

Helper function to iterate through all trust cert definitions.

-
Parameters
- - -
[in]indexMap index
-
-
-
Returns
non-null value if success, otherwise NULL
- -
-
-
-
- - - - diff --git a/a01438.js b/a01438.js deleted file mode 100644 index fdc2c22d4..000000000 --- a/a01438.js +++ /dev/null @@ -1,17 +0,0 @@ -var a01438 = -[ - [ "TNG Functions", "a01438.html#md_app_tng_readme", null ], - [ "tng_atcacert_device_public_key", "a01438.html#ga01bf19754baee6ce82ec46f966528262", null ], - [ "tng_atcacert_max_device_cert_size", "a01438.html#ga67606649a5f2261cb6b55478d72bf805", null ], - [ "tng_atcacert_max_signer_cert_size", "a01438.html#ga857aacbb70f2ea18411f1ca478a0e37f", null ], - [ "tng_atcacert_read_device_cert", "a01438.html#ga22c7ea083197410f396d18fa808e8e0c", null ], - [ "tng_atcacert_read_signer_cert", "a01438.html#ga82d3c529ed81119a956957052c06e8d7", null ], - [ "tng_atcacert_root_cert", "a01438.html#ga31cf63afba3c936d279a325d71691a68", null ], - [ "tng_atcacert_root_cert_size", "a01438.html#gaa3a0387ff2a71684a2992d4661c53331", null ], - [ "tng_atcacert_root_public_key", "a01438.html#ga8cd0d450da1bf23d0f6784446d35c556", null ], - [ "tng_atcacert_signer_public_key", "a01438.html#gaa4c31ab35807d8ed51fbecc48866aa04", null ], - [ "tng_get_device_cert_def", "a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5", null ], - [ "tng_get_device_cert_def_ext", "a01438.html#ga3b8f346977ed8428692d15f74ef12401", null ], - [ "tng_get_device_pubkey", "a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a", null ], - [ "tng_map_get_device_cert_def", "a01438.html#ga60599359d5331215ca7fdf6710f0dbb1", null ] -]; \ No newline at end of file diff --git a/a01439.html b/a01439.html deleted file mode 100644 index c53e03bc9..000000000 --- a/a01439.html +++ /dev/null @@ -1,7963 +0,0 @@ - - - - - - - -CryptoAuthLib: Basic Crypto API methods (atcab_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Basic Crypto API methods (atcab_)
-
-
- -

These methods provide the most convenient, simple API to CryptoAuth chips. -More...

- - - - - - - - -

-Macros

-#define atcab_get_addr(...)   calib_get_addr(__VA_ARGS__)
 
-#define atca_execute_command(...)   calib_execute_command(__VA_ARGS__)
 
-#define SHA_CONTEXT_MAX_SIZE   (109)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atcab_version (char *ver_str)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS atcab_init_ext (ATCADevice *device, ATCAIfaceCfg *cfg)
 Creates and initializes a ATCADevice context.
 
ATCA_STATUS atcab_init (ATCAIfaceCfg *cfg)
 Creates a global ATCADevice object used by Basic API.
 
ATCA_STATUS atcab_init_device (ATCADevice ca_device)
 Initialize the global ATCADevice object to point to one of your choosing for use with all the atcab_ basic API.
 
ATCA_STATUS atcab_release_ext (ATCADevice *device)
 release (free) the an ATCADevice instance.
 
ATCA_STATUS atcab_release (void)
 release (free) the global ATCADevice instance. This must be called in order to release or free up the interface.
 
ATCADevice atcab_get_device (void)
 Get the global device object.
 
ATCADeviceType atcab_get_device_type_ext (ATCADevice device)
 Get the selected device type of rthe device context.
 
ATCADeviceType atcab_get_device_type (void)
 Get the current device type configured for the global ATCADevice.
 
uint8_t atcab_get_device_address (ATCADevice device)
 Get the current device address based on the configured device and interface.
 
bool atcab_is_ca_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ca2_device (ATCADeviceType dev_type)
 Check whether the device is cryptoauth device.
 
bool atcab_is_ta_device (ATCADeviceType dev_type)
 Check whether the device is Trust Anchor device.
 
-ATCA_STATUS atcab_pbkdf2_sha256_ext (ATCADevice device, const uint32_t iter, const uint16_t slot, const uint8_t *salt, const size_t salt_len, uint8_t *result, size_t result_len)
 
-ATCA_STATUS atcab_pbkdf2_sha256 (const uint32_t iter, const uint16_t slot, const uint8_t *salt, const size_t salt_len, uint8_t *result, size_t result_len)
 
ATCA_STATUS atcab_wakeup (void)
 wakeup the CryptoAuth device
 
ATCA_STATUS atcab_idle (void)
 idle the CryptoAuth device
 
ATCA_STATUS atcab_sleep (void)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS atcab_get_zone_size (uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_get_zone_size_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS atcab_aes (uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out)
 Compute the AES-128 encrypt, decrypt, or GFM calculation.
 
ATCA_STATUS atcab_aes_encrypt (uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_encrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext)
 Perform an AES-128 encrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt (uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_decrypt_ext (ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext)
 Perform an AES-128 decrypt operation with a key in the device.
 
ATCA_STATUS atcab_aes_gfm (const uint8_t *h, const uint8_t *input, uint8_t *output)
 Perform a Galois Field Multiply (GFM) operation.
 
ATCA_STATUS atcab_aes_gcm_init (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size)
 Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.
 
ATCA_STATUS atcab_aes_gcm_init_rand (atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv)
 Initialize context for AES GCM operation with a IV composed of a random and optional fixed(free) field, which is common when starting an encrypt operation.
 
ATCA_STATUS atcab_aes_gcm_aad_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_aad_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size)
 Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext)
 Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish (atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_encrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size)
 Complete a GCM encrypt operation returning the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update (atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_update_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext)
 Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish (atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_aes_gcm_decrypt_finish_ext (ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified)
 Complete a GCM decrypt operation verifying the authentication tag.
 
ATCA_STATUS atcab_checkmac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data)
 Compares a MAC response with input values.
 
ATCA_STATUS atcab_checkmac_with_response_mac (uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac)
 Compares a MAC response with input values.SHA105 device can generate optional mac Output response mac mode only supports in SHA105 device.
 
ATCA_STATUS atcab_counter (uint8_t mode, uint16_t counter_id, uint32_t *counter_value)
 Compute the Counter functions.
 
ATCA_STATUS atcab_counter_increment (uint16_t counter_id, uint32_t *counter_value)
 Increments one of the device's monotonic counters.
 
ATCA_STATUS atcab_counter_read (uint16_t counter_id, uint32_t *counter_value)
 Read one of the device's monotonic counters.
 
ATCA_STATUS atcab_derivekey (uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_derivekey_ext (ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac)
 Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.
 
ATCA_STATUS atcab_ecdh_base (uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce)
 Base function for generating premaster secret key using ECDH.
 
ATCA_STATUS atcab_ecdh (uint16_t key_id, const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in a slot and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_enc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)])
 ECDH command with a private key in a slot and the premaster secret is read from the next slot.
 
ATCA_STATUS atcab_ecdh_ioenc (uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in a slot and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_ecdh_tempkey (const uint8_t *public_key, uint8_t *pms)
 ECDH command with a private key in TempKey and the premaster secret is returned in the clear.
 
ATCA_STATUS atcab_ecdh_tempkey_ioenc (const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key)
 ECDH command with a private key in TempKey and the premaster secret is returned encrypted using the IO protection key.
 
ATCA_STATUS atcab_gendig (uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size)
 Issues a GenDig command, which performs a SHA256 hash on the source data indicated by zone with the contents of TempKey. See the CryptoAuth datasheet for your chip to see what the values of zone correspond to.
 
ATCA_STATUS atcab_gendivkey (const uint8_t *other_data)
 Issues a GenDivKey command to generate the equivalent diversified key as that programmed into the client side device.
 
ATCA_STATUS atcab_genkey_base (uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key)
 Issues GenKey command, which can generate a private key, compute a public key, nd/or compute a digest of a public key.
 
ATCA_STATUS atcab_genkey (uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_genkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.
 
ATCA_STATUS atcab_get_pubkey (uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_get_pubkey_ext (ATCADevice device, uint16_t key_id, uint8_t *public_key)
 Uses GenKey command to calculate the public key from an existing private key in a slot.
 
ATCA_STATUS atcab_hmac (uint8_t mode, uint16_t key_id, uint8_t *digest)
 Issues a HMAC command, which computes an HMAC/SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_info_base (uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS atcab_info (uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_ext (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS atcab_info_lock_status (uint16_t param2, uint8_t *is_locked)
 Use the Info command to get the lock status.
 
ATCA_STATUS atcab_info_chip_status (uint8_t *chip_status)
 Use the Info command to get the chip status.
 
ATCA_STATUS atcab_info_set_latch (bool state)
 Use the Info command to set the persistent latch state for an ATECC608 device.
 
ATCA_STATUS atcab_info_get_latch (bool *state)
 Use the Info command to get the persistent latch current state for an ATECC608 device.
 
ATCA_STATUS atcab_kdf (uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce)
 Executes the KDF command, which derives a new key in PRF, AES, or HKDF modes.
 
ATCA_STATUS atcab_lock (uint8_t mode, uint16_t summary_crc)
 The Lock command prevents future modifications of the Configuration and/or Data and OTP zones. If the device is so configured, then this command can be used to lock individual data slots. This command fails if the designated area is already locked.
 
ATCA_STATUS atcab_lock_config_zone (void)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the config zone.
 
ATCA_STATUS atcab_lock_config_zone_crc (uint16_t summary_crc)
 Lock the config zone with summary CRC.
 
ATCA_STATUS atcab_lock_data_zone (void)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_ext (ATCADevice device)
 Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.
 
ATCA_STATUS atcab_lock_data_zone_crc (uint16_t summary_crc)
 Lock the data zone (slots and OTP) with summary CRC.
 
ATCA_STATUS atcab_lock_data_slot (uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_lock_data_slot_ext (ATCADevice device, uint16_t slot)
 Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).
 
ATCA_STATUS atcab_mac (uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest)
 Executes MAC command, which computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device.
 
ATCA_STATUS atcab_nonce_base (uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out)
 Executes Nonce command, which loads a random or fixed nonce/data into the device for use by subsequent commands.
 
ATCA_STATUS atcab_nonce (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_nonce_load (uint8_t target, const uint8_t *num_in, uint16_t num_in_size)
 Execute a Nonce command in pass-through mode to load one of the device's internal buffers with a fixed value.
 
ATCA_STATUS atcab_nonce_rand (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_nonce_rand_ext (ATCADevice device, const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_challenge (const uint8_t *num_in)
 Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.
 
ATCA_STATUS atcab_challenge_seed_update (const uint8_t *num_in, uint8_t *rand_out)
 Execute a Nonce command to generate a random challenge combining a host nonce (num_in) and a device random number.
 
ATCA_STATUS atcab_priv_write (uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)])
 Executes PrivWrite command, to write externally generated ECC private keys into the device.
 
ATCA_STATUS atcab_random (uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_random_ext (ATCADevice device, uint8_t *rand_out)
 Executes Random command, which generates a 32 byte random number from the device.
 
ATCA_STATUS atcab_read_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_read_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len)
 Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.
 
ATCA_STATUS atcab_is_locked (uint8_t zone, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified zone is locked.
 
ATCA_STATUS atcab_is_config_locked (bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_config_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether configuration zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked (bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_data_locked_ext (ATCADevice device, bool *is_locked)
 This function check whether data/setup zone is locked or not.
 
ATCA_STATUS atcab_is_slot_locked (uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_slot_locked_ext (ATCADevice device, uint16_t slot, bool *is_locked)
 This function check whether slot/handle is locked or not.
 
ATCA_STATUS atcab_is_private_ext (ATCADevice device, uint16_t slot, bool *is_private)
 Check to see if the key is a private key or not.
 
-ATCA_STATUS atcab_is_private (uint16_t slot, bool *is_private)
 
-ATCA_STATUS atcab_read_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 
ATCA_STATUS atcab_read_bytes_zone (uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length)
 Used to read an arbitrary number of bytes from any zone configured for clear reads.
 
ATCA_STATUS atcab_read_serial_number (uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_serial_number_ext (ATCADevice device, uint8_t *serial_number)
 This function returns serial number of the device.
 
ATCA_STATUS atcab_read_pubkey (uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_pubkey_ext (ATCADevice device, uint16_t slot, uint8_t *public_key)
 Executes Read command to read an ECC P256 public key from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_sig (uint16_t slot, uint8_t *sig)
 Executes Read command to read a 64 byte ECDSA P256 signature from a slot configured for clear reads.
 
ATCA_STATUS atcab_read_config_zone (uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_read_config_zone_ext (ATCADevice device, uint8_t *config_data)
 Executes Read command to read the complete device configuration zone.
 
ATCA_STATUS atcab_cmp_config_zone (uint8_t *config_data, bool *same_config)
 Compares a specified configuration zone with the configuration zone currently on the device.
 
ATCA_STATUS atcab_read_enc (uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes Read command on a slot configured for encrypted reads and decrypts the data to return it as plaintext.
 
ATCA_STATUS atcab_secureboot (uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac)
 Executes Secure Boot command, which provides support for secure boot of an external MCU or MPU.
 
ATCA_STATUS atcab_secureboot_mac (uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes Secure Boot command with encrypted digest and validated MAC response using the IO protection key.
 
ATCA_STATUS atcab_selftest (uint8_t mode, uint16_t param2, uint8_t *result)
 Executes the SelfTest command, which performs a test of one or more of the cryptographic engines within the ATECC608 chip.
 
ATCA_STATUS atcab_sha_base (uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size)
 Executes SHA command, which computes a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system.
 
ATCA_STATUS atcab_sha_start (void)
 Executes SHA command to initialize SHA-256 calculation engine.
 
ATCA_STATUS atcab_sha_update (const uint8_t *message)
 Executes SHA command to add 64 bytes of message data to the current context.
 
ATCA_STATUS atcab_sha_end (uint8_t *digest, uint16_t length, const uint8_t *message)
 Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_read_context (uint8_t *context, uint16_t *context_size)
 Executes SHA command to read the SHA-256 context back. Only for ATECC608 with SHA-256 contexts. HMAC not supported.
 
ATCA_STATUS atcab_sha_write_context (const uint8_t *context, uint16_t context_size)
 Executes SHA command to write (restore) a SHA-256 context into the the device. Only supported for ATECC608 with SHA-256 contexts.
 
ATCA_STATUS atcab_sha (uint16_t length, const uint8_t *message, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t *digest)
 Use the SHA command to compute a SHA-256 digest.
 
ATCA_STATUS atcab_hw_sha2_256_init (atca_sha256_ctx_t *ctx)
 Initialize a SHA context for performing a hardware SHA-256 operation on a device. Note that only one SHA operation can be run at a time.
 
ATCA_STATUS atcab_hw_sha2_256_update (atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Add message data to a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_hw_sha2_256_finish (atca_sha256_ctx_t *ctx, uint8_t *digest)
 Finish SHA-256 digest for a SHA context for performing a hardware SHA-256 operation on a device.
 
ATCA_STATUS atcab_sha_hmac_init (atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot)
 Executes SHA command to start an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_update (atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size)
 Executes SHA command to add an arbitrary amount of message data to a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_finish (atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target)
 Executes SHA command to complete a HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac (const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sha_hmac_ext (ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target)
 Use the SHA command to compute an HMAC/SHA-256 operation.
 
ATCA_STATUS atcab_sign_base (uint8_t mode, uint16_t key_id, uint8_t *signature)
 Executes the Sign command, which generates a signature using the ECDSA algorithm.
 
ATCA_STATUS atcab_sign (uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_ext (ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature)
 Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_sign_internal (uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature)
 Executes Sign command to sign an internally generated message.
 
ATCA_STATUS atcab_updateextra (uint8_t mode, uint16_t new_value)
 Executes UpdateExtra command to update the values of the two extra bytes within the Configuration zone (bytes 84 and 85).
 
ATCA_STATUS atcab_verify (uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac)
 Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command.
 
ATCA_STATUS atcab_verify_extern (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_extern_mac (const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_stored (const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_ext (ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
 
ATCA_STATUS atcab_verify_stored_with_tempkey (const uint8_t *signature, uint16_t key_id, bool *is_verified)
 Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. keyConfig.reqrandom bit should be set and the message to be signed should be already loaded into TempKey for all devices.
 
ATCA_STATUS atcab_verify_stored_mac (const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified)
 Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with a public key stored in the device. This function is only available on the ATECC608.
 
ATCA_STATUS atcab_verify_validate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Validate mode to validate a public key stored in a slot.
 
ATCA_STATUS atcab_verify_invalidate (uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified)
 Executes the Verify command in Invalidate mode which invalidates a previously validated public key stored in a slot.
 
ATCA_STATUS atcab_write (uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac)
 Executes the Write command, which writes either one four byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for this slot, the data may be required to be encrypted by the system prior to being sent to the device. This command cannot be used to write slots configured as ECC private keys.
 
ATCA_STATUS atcab_write_zone (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
ATCA_STATUS atcab_write_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len)
 Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
 
-ATCA_STATUS atcab_write_bytes_zone_ext (ATCADevice device, uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 
ATCA_STATUS atcab_write_bytes_zone (uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length)
 Executes the Write command, which writes data into the configuration, otp, or data zones with a given byte offset and length. Offset and length must be multiples of a word (4 bytes).
 
ATCA_STATUS atcab_write_pubkey (uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_pubkey_ext (ATCADevice device, uint16_t slot, const uint8_t *public_key)
 Uses the write command to write a public key to a slot in the proper format.
 
ATCA_STATUS atcab_write_config_zone (const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_config_zone_ext (ATCADevice device, const uint8_t *config_data)
 Executes the Write command, which writes the configuration zone.
 
ATCA_STATUS atcab_write_enc (uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)])
 Executes the Write command, which performs an encrypted write of a 32 byte block into given slot.
 
ATCA_STATUS atcab_write_config_counter (uint16_t counter_id, uint32_t counter_value)
 Initialize one of the monotonic counters in device with a specific value.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Variables

-ATCADevice g_atcab_device_ptr
 
ATCA_STATUS atcab_bin2hex (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size)
 Convert a binary buffer to a hex string for easy reading.
 
ATCA_STATUS atcab_bin2hex_ (const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper)
 Function that converts a binary buffer to a hex string suitable for easy reading.
 
ATCA_STATUS atcab_hex2bin (const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len)
 Function that converts a hex string to binary buffer.
 
-ATCA_STATUS atcab_hex2bin_ (const char *hex, size_t hex_size, uint8_t *bin, size_t *bin_size, bool is_space)
 
ATCA_STATUS packHex (const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len)
 Remove spaces from a ASCII hex string.
 
bool isDigit (char c)
 Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))
 
bool isBlankSpace (char c)
 Checks to see if a character is blank space.
 
bool isAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHexAlpha (char c)
 Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))
 
bool isHex (char c)
 Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).
 
bool isHexDigit (char c)
 Returns true if this character is a valid hex character.
 
bool isBase64 (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).
 
bool isBase64Digit (char c, const uint8_t *rules)
 Returns true if this character is a valid base 64 character.
 
-const uint8_t * atcab_b64rules_default (void)
 
-const uint8_t * atcab_b64rules_mime (void)
 
-const uint8_t * atcab_b64rules_urlsafe (void)
 
ATCA_STATUS atcab_base64decode_ (const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules)
 Decode base64 string to data with ruleset option.
 
ATCA_STATUS atcab_base64encode (const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len)
 Encode data as base64 string.
 
ATCA_STATUS atcab_base64encode_ (const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules)
 Encode data as base64 string with ruleset option.
 
ATCA_STATUS atcab_base64decode (const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len)
 Decode base64 string to data.
 
ATCA_STATUS atcab_reversal (const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size)
 To reverse the input data.
 
-int atcab_memset_s (void *dest, size_t destsz, int ch, size_t count)
 Guaranteed to perform memory writes regardless of optimization level. Matches memset_s signature.
 
-size_t atcab_pointer_delta (const void *start, const void *end)
 Helper function to calculate the number of bytes between two pointers.
 
-char lib_toupper (char c)
 Converts a character to uppercase.
 
-char lib_tolower (char c)
 Converts a character to lowercase.
 
-

Detailed Description

-

These methods provide the most convenient, simple API to CryptoAuth chips.

-

Function Documentation

- -

◆ atcab_aes()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes (uint8_t mode,
uint16_t key_id,
const uint8_t * aes_in,
uint8_t * aes_out 
)
-
- -

Compute the AES-128 encrypt, decrypt, or GFM calculation.

-
Parameters
- - - - - -
[in]modeThe mode for the AES command.
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]aes_inInput data to the AES command (16 bytes).
[out]aes_outOutput data from the AES command is returned here (16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_decrypt()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_decrypt (uint16_t key_id,
uint8_t key_block,
const uint8_t * ciphertext,
uint8_t * plaintext 
)
-
- -

Perform an AES-128 decrypt operation with a key in the device.

-
Parameters
- - - - - -
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]ciphertextInput ciphertext to be decrypted (16 bytes).
[out]plaintextOutput plaintext is returned here (16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_decrypt_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_decrypt_ext (ATCADevice device,
uint16_t key_id,
uint8_t key_block,
const uint8_t * ciphertext,
uint8_t * plaintext 
)
-
- -

Perform an AES-128 decrypt operation with a key in the device.

-
Parameters
- - - - - - -
[in]deviceDevice context pointer
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]ciphertextInput ciphertext to be decrypted (16 bytes).
[out]plaintextOutput plaintext is returned here (16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_encrypt()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_encrypt (uint16_t key_id,
uint8_t key_block,
const uint8_t * plaintext,
uint8_t * ciphertext 
)
-
- -

Perform an AES-128 encrypt operation with a key in the device.

-
Parameters
- - - - - -
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]plaintextInput plaintext to be encrypted (16 bytes).
[out]ciphertextOutput ciphertext is returned here (16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_encrypt_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_encrypt_ext (ATCADevice device,
uint16_t key_id,
uint8_t key_block,
const uint8_t * plaintext,
uint8_t * ciphertext 
)
-
- -

Perform an AES-128 encrypt operation with a key in the device.

-
Parameters
- - - - - - -
[in]deviceDevice context pointer
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]plaintextInput plaintext to be encrypted (16 bytes).
[out]ciphertextOutput ciphertext is returned here (16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_aad_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_aad_update (atca_aes_gcm_ctx_t * ctx,
const uint8_t * aad,
uint32_t aad_size 
)
-
- -

Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.

-

This can be called multiple times. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function. When there is AAD to include, this should be called before atcab_aes_gcm_encrypt_update() or atcab_aes_gcm_decrypt_update().

-
Parameters
- - - - -
[in]ctxAES GCM context
[in]aadAdditional authenticated data to be added
[in]aad_sizeSize of aad in bytes
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_aad_update_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_aad_update_ext (ATCADevice device,
atca_aes_gcm_ctx_t * ctx,
const uint8_t * aad,
uint32_t aad_size 
)
-
- -

Process Additional Authenticated Data (AAD) using GCM mode and a key within the ATECC608 device.

-

This can be called multiple times. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function. When there is AAD to include, this should be called before atcab_aes_gcm_encrypt_update() or atcab_aes_gcm_decrypt_update().

-
Parameters
- - - - - -
[in]deviceDevice context
[in]ctxAES GCM context
[in]aadAdditional authenticated data to be added
[in]aad_sizeSize of aad in bytes
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_decrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_decrypt_finish (atca_aes_gcm_ctx_t * ctx,
const uint8_t * tag,
size_t tag_size,
bool * is_verified 
)
-
- -

Complete a GCM decrypt operation verifying the authentication tag.

-
Parameters
- - - - - -
[in]ctxAES GCM context structure.
[in]tagExpected authentication tag.
[in]tag_sizeSize of tag in bytes (12 to 16 bytes).
[out]is_verifiedReturns whether or not the tag verified.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_decrypt_finish_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_decrypt_finish_ext (ATCADevice device,
atca_aes_gcm_ctx_t * ctx,
const uint8_t * tag,
size_t tag_size,
bool * is_verified 
)
-
- -

Complete a GCM decrypt operation verifying the authentication tag.

-
Parameters
- - - - - - -
[in]deviceDevice context
[in]ctxAES GCM context structure.
[in]tagExpected authentication tag.
[in]tag_sizeSize of tag in bytes (12 to 16 bytes).
[out]is_verifiedReturns whether or not the tag verified.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_decrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_decrypt_update (atca_aes_gcm_ctx_t * ctx,
const uint8_t * ciphertext,
uint32_t ciphertext_size,
uint8_t * plaintext 
)
-
- -

Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.

-
Parameters
- - - - - -
[in]ctxAES GCM context structure.
[in]ciphertextCiphertext to be decrypted.
[in]ciphertext_sizeSize of ciphertext in bytes.
[out]plaintextDecrypted data is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_decrypt_update_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_decrypt_update_ext (ATCADevice device,
atca_aes_gcm_ctx_t * ctx,
const uint8_t * ciphertext,
uint32_t ciphertext_size,
uint8_t * plaintext 
)
-
- -

Decrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.

-
Parameters
- - - - - - -
[in]deviceDevice context
[in]ctxAES GCM context structure.
[in]ciphertextCiphertext to be decrypted.
[in]ciphertext_sizeSize of ciphertext in bytes.
[out]plaintextDecrypted data is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_encrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_encrypt_finish (atca_aes_gcm_ctx_t * ctx,
uint8_t * tag,
size_t tag_size 
)
-
- -

Complete a GCM encrypt operation returning the authentication tag.

-
Parameters
- - - - -
[in]ctxAES GCM context structure.
[out]tagAuthentication tag is returned here.
[in]tag_sizeTag size in bytes (12 to 16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_encrypt_finish_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_encrypt_finish_ext (ATCADevice device,
atca_aes_gcm_ctx_t * ctx,
uint8_t * tag,
size_t tag_size 
)
-
- -

Complete a GCM encrypt operation returning the authentication tag.

-
Parameters
- - - - - -
[in]deviceDevice context
[in]ctxAES GCM context structure.
[out]tagAuthentication tag is returned here.
[in]tag_sizeTag size in bytes (12 to 16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_encrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_encrypt_update (atca_aes_gcm_ctx_t * ctx,
const uint8_t * plaintext,
uint32_t plaintext_size,
uint8_t * ciphertext 
)
-
- -

Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.

-
Parameters
- - - - - -
[in]ctxAES GCM context structure.
[in]plaintextPlaintext to be encrypted (16 bytes).
[in]plaintext_sizeSize of plaintext in bytes.
[out]ciphertextEncrypted data is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_encrypt_update_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_encrypt_update_ext (ATCADevice device,
atca_aes_gcm_ctx_t * ctx,
const uint8_t * plaintext,
uint32_t plaintext_size,
uint8_t * ciphertext 
)
-
- -

Encrypt data using GCM mode and a key within the ATECC608 device. atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called before the first use of this function.

-
Parameters
- - - - - - -
[in]deviceDevice context
[in]ctxAES GCM context structure.
[in]plaintextPlaintext to be encrypted (16 bytes).
[in]plaintext_sizeSize of plaintext in bytes.
[out]ciphertextEncrypted data is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_init (atca_aes_gcm_ctx_t * ctx,
uint16_t key_id,
uint8_t key_block,
const uint8_t * iv,
size_t iv_size 
)
-
- -

Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.

-
Parameters
- - - - - - -
[in]ctxAES GCM context to be initialized.
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]ivInitialization vector.
[in]iv_sizeSize of IV in bytes. Standard is 12 bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_init_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_init_ext (ATCADevice device,
atca_aes_gcm_ctx_t * ctx,
uint16_t key_id,
uint8_t key_block,
const uint8_t * iv,
size_t iv_size 
)
-
- -

Initialize context for AES GCM operation with an existing IV, which is common when starting a decrypt operation.

-
Parameters
- - - - - - - -
[in]deviceDevice context
[in]ctxAES GCM context to be initialized.
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]ivInitialization vector.
[in]iv_sizeSize of IV in bytes. Standard is 12 bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gcm_init_rand()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gcm_init_rand (atca_aes_gcm_ctx_t * ctx,
uint16_t key_id,
uint8_t key_block,
size_t rand_size,
const uint8_t * free_field,
size_t free_field_size,
uint8_t * iv 
)
-
- -

Initialize context for AES GCM operation with a IV composed of a random and optional fixed(free) field, which is common when starting an encrypt operation.

-
Parameters
- - - - - - - - -
[in]ctxAES CTR context to be initialized.
[in]key_idKey location. Can either be a slot number or ATCA_TEMPKEY_KEYID for TempKey.
[in]key_blockIndex of the 16-byte block to use within the key location for the actual key.
[in]rand_sizeSize of the random field in bytes. Minimum and recommended size is 12 bytes. Max is 32 bytes.
[in]free_fieldFixed data to include in the IV after the random field. Can be NULL if not used.
[in]free_field_sizeSize of the free field in bytes.
[out]ivInitialization vector is returned here. Its size will be rand_size and free_field_size combined.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_aes_gfm()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_aes_gfm (const uint8_t * h,
const uint8_t * input,
uint8_t * output 
)
-
- -

Perform a Galois Field Multiply (GFM) operation.

-
Parameters
- - - - -
[in]hFirst input value (16 bytes).
[in]inputSecond input value (16 bytes).
[out]outputGFM result is returned here (16 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_base64decode()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64decode (const char * encoded,
size_t encoded_len,
uint8_t * byte_array,
size_t * array_len 
)
-
- -

Decode base64 string to data.

-
Parameters
- - - - - -
[in]encodedBase64 string to be decoded.
[in]encoded_lenSize of the base64 string in bytes.
[out]byte_arrayDecoded data will be returned here.
[in,out]array_lenAs input, the size of the byte_array buffer. As output, the length of the decoded data.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_base64decode_()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64decode_ (const char * encoded,
size_t encoded_size,
uint8_t * data,
size_t * data_size,
const uint8_t * rules 
)
-
- -

Decode base64 string to data with ruleset option.

-
Parameters
- - - - - - -
[in]encodedBase64 string to be decoded.
[in]encoded_sizeSize of the base64 string in bytes.
[out]dataDecoded data will be returned here.
[in,out]data_sizeAs input, the size of the byte_array buffer. As output, the length of the decoded data.
[in]rulesbase64 ruleset to use
-
-
- -
-
- -

◆ atcab_base64encode()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64encode (const uint8_t * byte_array,
size_t array_len,
char * encoded,
size_t * encoded_len 
)
-
- -

Encode data as base64 string.

-
Parameters
- - - - - -
[in]byte_arrayData to be encode in base64.
[in]array_lenSize of byte_array in bytes.
[in]encodedBase64 output is returned here.
[in,out]encoded_lenAs input, the size of the encoded buffer. As output, the length of the encoded base64 character string.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_base64encode_()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_base64encode_ (const uint8_t * data,
size_t data_size,
char * encoded,
size_t * encoded_size,
const uint8_t * rules 
)
-
- -

Encode data as base64 string with ruleset option.

-
Parameters
- - - - - - -
[in]dataThe input byte array that will be converted to base 64 encoded characters
[in]data_sizeThe length of the byte array
[in]encodedThe output converted to base 64 encoded characters.
[in,out]encoded_sizeInput: The size of the encoded buffer, Output: The length of the encoded base 64 character string
[in]rulesruleset to use during encoding
-
-
- -
-
- -

◆ atcab_bin2hex()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_bin2hex (const uint8_t * bin,
size_t bin_size,
char * hex,
size_t * hex_size 
)
-
- -

Convert a binary buffer to a hex string for easy reading.

-
Parameters
- - - - - -
[in]binInput data to convert.
[in]bin_sizeSize of data to convert.
[out]hexBuffer that receives hex string.
[in,out]hex_sizeAs input, the size of the hex buffer. As output, the size of the output hex.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_bin2hex_()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_bin2hex_ (const uint8_t * bin,
size_t bin_size,
char * hex,
size_t * hex_size,
bool is_pretty,
bool is_space,
bool is_upper 
)
-
- -

Function that converts a binary buffer to a hex string suitable for easy reading.

-
Parameters
- - - - - - - - -
[in]binInput data to convert.
[in]bin_sizeSize of data to convert.
[out]hexBuffer that receives hex string.
[in,out]hex_sizeAs input, the size of the hex buffer. As output, the size of the output hex.
[in]is_prettyIndicates whether new lines should be added for pretty printing.
[in]is_spaceConvert the output hex with space between it.
[in]is_upperConvert the output hex to upper case.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_challenge()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_challenge (const uint8_t * num_in)
-
- -

Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.

-
Parameters
- - -
[in]num_inData to be loaded into TempKey (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_challenge_seed_update()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_challenge_seed_update (const uint8_t * num_in,
uint8_t * rand_out 
)
-
- -

Execute a Nonce command to generate a random challenge combining a host nonce (num_in) and a device random number.

-
Parameters
- - - -
[in]num_inHost nonce to be combined with the device random number (20 bytes).
[out]rand_outInternally generated 32-byte random number that was used in the nonce/challenge calculation is returned here. Can be NULL if not needed.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_checkmac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_checkmac (uint8_t mode,
uint16_t key_id,
const uint8_t * challenge,
const uint8_t * response,
const uint8_t * other_data 
)
-
- -

Compares a MAC response with input values.

-
Parameters
- - - - - - -
[in]modeControls which fields within the device are used in the message
[in]key_idKey location in the CryptoAuth device to use for the MAC
[in]challengeChallenge data (32 bytes)
[in]responseMAC response data (32 bytes)
[in]other_dataOtherData parameter (13 bytes)
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_checkmac_with_response_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_checkmac_with_response_mac (uint8_t mode,
const uint8_t * challenge,
const uint8_t * response,
const uint8_t * other_data,
uint8_t * mac 
)
-
- -

Compares a MAC response with input values.SHA105 device can generate optional mac Output response mac mode only supports in SHA105 device.

-
Parameters
- - - - - - -
[in]modeControls which fields within the device are used in the message
[in]challengeChallenge data (32 bytes)
[in]responseMAC response data (32 bytes)
[in]other_dataOtherData parameter (13 bytes)
[out]macMAC response (32 bytes)
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_cmp_config_zone()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_cmp_config_zone (uint8_t * config_data,
bool * same_config 
)
-
- -

Compares a specified configuration zone with the configuration zone currently on the device.

-

This only compares the static portions of the configuration zone and skips those that are unique per device (first 16 bytes) and areas that can change after the configuration zone has been locked (e.g. LastKeyUse).

-
Parameters
- - - -
[in]config_dataFull configuration data to compare the device against.
[out]same_configResult is returned here. True if the static portions on the configuration zones are the same.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_counter()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_counter (uint8_t mode,
uint16_t counter_id,
uint32_t * counter_value 
)
-
- -

Compute the Counter functions.

-
Parameters
- - - - -
[in]modethe mode used for the counter
[in]counter_idThe counter to be used
[out]counter_valuepointer to the counter value returned from device
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_counter_increment()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_counter_increment (uint16_t counter_id,
uint32_t * counter_value 
)
-
- -

Increments one of the device's monotonic counters.

-
Parameters
- - - -
[in]counter_idCounter to be incremented
[out]counter_valueNew value of the counter is returned here. Can be NULL if not needed.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_counter_read()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_counter_read (uint16_t counter_id,
uint32_t * counter_value 
)
-
- -

Read one of the device's monotonic counters.

-
Parameters
- - - -
[in]counter_idCounter to be read
[out]counter_valueCounter value is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_derivekey()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_derivekey (uint8_t mode,
uint16_t key_id,
const uint8_t * mac 
)
-
- -

Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.

-
Parameters
- - - - -
[in]modeBit 2 must match the value in TempKey.SourceFlag
[in]key_idKey slot to be written
[in]macOptional 32 byte MAC used to validate operation. NULL if not required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_derivekey_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_derivekey_ext (ATCADevice device,
uint8_t mode,
uint16_t key_id,
const uint8_t * mac 
)
-
- -

Executes the DeviveKey command for deriving a new key from a nonce (TempKey) and an existing key.

-
Parameters
- - - - - -
[in]deviceDevice context
[in]modeBit 2 must match the value in TempKey.SourceFlag
[in]key_idKey slot to be written
[in]macOptional 32 byte MAC used to validate operation. NULL if not required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_ecdh()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_ecdh (uint16_t key_id,
const uint8_t * public_key,
uint8_t * pms 
)
-
- -

ECDH command with a private key in a slot and the premaster secret is returned in the clear.

-
Parameters
- - - - -
[in]key_idSlot of private key for ECDH computation
[in]public_keyPublic key input to ECDH calculation. X and Y integers in big-endian format. 64 bytes for P256 key.
[out]pmsComputed ECDH premaster secret is returned here. 32 bytes.
-
-
-
Returns
ATCA_SUCCESS on success
- -
-
- -

◆ atcab_ecdh_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_ecdh_base (uint8_t mode,
uint16_t key_id,
const uint8_t * public_key,
uint8_t * pms,
uint8_t * out_nonce 
)
-
- -

Base function for generating premaster secret key using ECDH.

-
Parameters
- - - - - - -
[in]modeMode to be used for ECDH computation
[in]key_idSlot of key for ECDH computation
[in]public_keyPublic key input to ECDH calculation. X and Y integers in big-endian format. 64 bytes for P256 key.
[out]pmsComputed ECDH pre-master secret is returned here (32 bytes) if returned directly. Otherwise NULL.
[out]out_nonceNonce used to encrypt pre-master secret. NULL if output encryption not used.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_ecdh_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_ecdh_enc (uint16_t key_id,
const uint8_t * public_key,
uint8_t * pms,
const uint8_t * read_key,
uint16_t read_key_id,
const uint8_t num_in[(20)] 
)
-
- -

ECDH command with a private key in a slot and the premaster secret is read from the next slot.

-

This function only works for even numbered slots with the proper configuration.

-
Parameters
- - - - - - - -
[in]key_idSlot of key for ECDH computation
[in]public_keyPublic key input to ECDH calculation. X and Y integers in big-endian format. 64 bytes for P256 key.
[out]pmsComputed ECDH premaster secret is returned here (32 bytes).
[in]read_keyRead key for the premaster secret slot (key_id|1).
[in]read_key_idRead key slot for read_key.
[in]num_in20 byte host nonce to inject into Nonce calculation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_ecdh_ioenc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_ecdh_ioenc (uint16_t key_id,
const uint8_t * public_key,
uint8_t * pms,
const uint8_t * io_key 
)
-
- -

ECDH command with a private key in a slot and the premaster secret is returned encrypted using the IO protection key.

-
Parameters
- - - - - -
[in]key_idSlot of key for ECDH computation
[in]public_keyPublic key input to ECDH calculation. X and Y integers in big-endian format. 64 bytes for P256 key.
[out]pmsComputed ECDH premaster secret is returned here (32 bytes).
[in]io_keyIO protection key.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_ecdh_tempkey()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_ecdh_tempkey (const uint8_t * public_key,
uint8_t * pms 
)
-
- -

ECDH command with a private key in TempKey and the premaster secret is returned in the clear.

-
Parameters
- - - -
[in]public_keyPublic key input to ECDH calculation. X and Y integers in big-endian format. 64 bytes for P256 key.
[out]pmsComputed ECDH premaster secret is returned here (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_ecdh_tempkey_ioenc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_ecdh_tempkey_ioenc (const uint8_t * public_key,
uint8_t * pms,
const uint8_t * io_key 
)
-
- -

ECDH command with a private key in TempKey and the premaster secret is returned encrypted using the IO protection key.

-
Parameters
- - - - -
[in]public_keyPublic key input to ECDH calculation. X and Y integers in big-endian format. 64 bytes for P256 key.
[out]pmsComputed ECDH premaster secret is returned here (32 bytes).
[in]io_keyIO protection key.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_gendig()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_gendig (uint8_t zone,
uint16_t key_id,
const uint8_t * other_data,
uint8_t other_data_size 
)
-
- -

Issues a GenDig command, which performs a SHA256 hash on the source data indicated by zone with the contents of TempKey. See the CryptoAuth datasheet for your chip to see what the values of zone correspond to.

-
Parameters
- - - - - -
[in]zoneDesignates the source of the data to hash with TempKey.
[in]key_idIndicates the key, OTP block, or message order for shared nonce mode.
[in]other_dataFour bytes of data for SHA calculation when using a NoMac key, 32 bytes for "Shared Nonce" mode, otherwise ignored (can be NULL).
[in]other_data_sizeSize of other_data in bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_gendivkey()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_gendivkey (const uint8_t * other_data)
-
- -

Issues a GenDivKey command to generate the equivalent diversified key as that programmed into the client side device.

-
Parameters
- - - -
[in]deviceDevice context pointer
[in]other_dataMust match data used when generating the diversified key in the client device
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_genkey()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_genkey (uint16_t key_id,
uint8_t * public_key 
)
-
- -

Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.

-
Parameters
- - - -
[in]key_idSlot number where an ECC private key is configured. Can also be ATCA_TEMPKEY_KEYID to generate a private key in TempKey.
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve. Set to NULL if public key isn't required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_genkey_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_genkey_base (uint8_t mode,
uint16_t key_id,
const uint8_t * other_data,
uint8_t * public_key 
)
-
- -

Issues GenKey command, which can generate a private key, compute a public key, nd/or compute a digest of a public key.

-
Parameters
- - - - - -
[in]modeMode determines what operations the GenKey command performs.
[in]key_idSlot to perform the GenKey command on.
[in]other_dataOtherData for PubKey digest calculation. Can be set to NULL otherwise.
[out]public_keyIf the mode indicates a public key will be calculated, it will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve. Set to NULL if public key isn't required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_genkey_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_genkey_ext (ATCADevice device,
uint16_t key_id,
uint8_t * public_key 
)
-
- -

Issues GenKey command, which generates a new random private key in slot/handle and returns the public key.

-
Parameters
- - - - -
[in]deviceDevice context
[in]key_idSlot number where an ECC private key is configured. Can also be ATCA_TEMPKEY_KEYID to generate a private key in TempKey.
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve. Set to NULL if public key isn't required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_get_device()

- -
-
- - - - - - - - -
ATCADevice atcab_get_device (void )
-
- -

Get the global device object.

-
Returns
instance of global ATCADevice
- -
-
- -

◆ atcab_get_device_address()

- -
-
- - - - - - - - -
uint8_t atcab_get_device_address (ATCADevice device)
-
- -

Get the current device address based on the configured device and interface.

-
Returns
the device address if applicable else 0xFF
- -
-
- -

◆ atcab_get_device_type()

- -
-
- - - - - - - - -
ATCADeviceType atcab_get_device_type (void )
-
- -

Get the current device type configured for the global ATCADevice.

-
Returns
Device type if basic api is initialized or ATCA_DEV_UNKNOWN.
- -
-
- -

◆ atcab_get_device_type_ext()

- -
-
- - - - - - - - -
ATCADeviceType atcab_get_device_type_ext (ATCADevice device)
-
- -

Get the selected device type of rthe device context.

-
Parameters
- - -
[in]deviceDevice context pointer
-
-
-
Returns
Device type if basic api is initialized or ATCA_DEV_UNKNOWN.
- -
-
- -

◆ atcab_get_pubkey()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_get_pubkey (uint16_t key_id,
uint8_t * public_key 
)
-
- -

Uses GenKey command to calculate the public key from an existing private key in a slot.

-
Parameters
- - - -
[in]key_idSlot number of the private key.
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve. Set to NULL if public key isn't required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_get_pubkey_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_get_pubkey_ext (ATCADevice device,
uint16_t key_id,
uint8_t * public_key 
)
-
- -

Uses GenKey command to calculate the public key from an existing private key in a slot.

-
Parameters
- - - -
[in]key_idSlot number of the private key.
[out]public_keyPublic key will be returned here. Format will be the X and Y integers in big-endian format. 64 bytes for P256 curve. Set to NULL if public key isn't required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_get_zone_size()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_get_zone_size (uint8_t zone,
uint16_t slot,
size_t * size 
)
-
- -

Gets the size of the specified zone in bytes.

-
Parameters
- - - - -
[in]zoneZone to get size information from. Config(0), OTP(1), or Data(2) which requires a slot.
[in]slotIf zone is Data(2), the slot to query for size.
[out]sizeZone size is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_get_zone_size_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_get_zone_size_ext (ATCADevice device,
uint8_t zone,
uint16_t slot,
size_t * size 
)
-
- -

Gets the size of the specified zone in bytes.

-
Parameters
- - - - - -
[in]deviceDevice context
[in]zoneZone to get size information from. Config(0), OTP(1), or Data(2) which requires a slot.
[in]slotIf zone is Data(2), the slot to query for size.
[out]sizeZone size is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_hex2bin()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_hex2bin (const char * ascii_hex,
size_t ascii_hex_len,
uint8_t * binary,
size_t * bin_len 
)
-
- -

Function that converts a hex string to binary buffer.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ascii_hexInput buffer to convert
[in]ascii_hex_lenLength of buffer to convert
[out]binaryBuffer that receives binary
[in,out]bin_lenAs input, the size of the bin buffer. As output, the size of the bin data.
-
-
- -
-
- -

◆ atcab_hmac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_hmac (uint8_t mode,
uint16_t key_id,
uint8_t * digest 
)
-
- -

Issues a HMAC command, which computes an HMAC/SHA-256 digest of a key stored in the device, a challenge, and other information on the device.

-
Parameters
- - - - -
[in]modeControls which fields within the device are used in the message.
[in]key_idWhich key is to be used to generate the response. Bits 0:3 only are used to select a slot but all 16 bits are used in the HMAC message.
[out]digestHMAC digest is returned in this buffer (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_hw_sha2_256()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_hw_sha2_256 (const uint8_t * data,
size_t data_size,
uint8_t * digest 
)
-
- -

Use the SHA command to compute a SHA-256 digest.

-
Parameters
- - - - -
[in]dataMessage data to be hashed.
[in]data_sizeSize of data in bytes.
[out]digestDigest is returned here (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_hw_sha2_256_finish()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_hw_sha2_256_finish (atca_sha256_ctx_tctx,
uint8_t * digest 
)
-
- -

Finish SHA-256 digest for a SHA context for performing a hardware SHA-256 operation on a device.

-
Parameters
- - - -
[in]ctxSHA256 context
[out]digestSHA256 digest is returned here (32 bytes)
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_hw_sha2_256_init()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_hw_sha2_256_init (atca_sha256_ctx_tctx)
-
- -

Initialize a SHA context for performing a hardware SHA-256 operation on a device. Note that only one SHA operation can be run at a time.

-
Parameters
- - -
[in]ctxSHA256 context
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_hw_sha2_256_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_hw_sha2_256_update (atca_sha256_ctx_tctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Add message data to a SHA context for performing a hardware SHA-256 operation on a device.

-
Parameters
- - - - -
[in]ctxSHA256 context
[in]dataMessage data to be added to hash.
[in]data_sizeSize of data in bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_idle()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_idle (void )
-
- -

idle the CryptoAuth device

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_info (uint8_t * revision)
-
- -

Use the Info command to get the device revision (DevRev).

-
Parameters
- - -
[out]revisionDevice revision is returned here (4 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_info_base (uint8_t mode,
uint16_t param2,
uint8_t * out_data 
)
-
- -

Issues an Info command, which return internal device information and can control GPIO and the persistent latch.

-
Parameters
- - - - -
[in]modeSelects which mode to be used for info command.
[in]param2Selects the particular fields for the mode.
[out]out_dataResponse from info command (4 bytes). Can be set to NULL if not required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info_chip_status()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_info_chip_status (uint8_t * chip_status)
-
- -

Use the Info command to get the chip status.

-
Parameters
- - -
[out]chip_statusreturns chip status here
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_info_ext (ATCADevice device,
uint8_t * revision 
)
-
- -

Use the Info command to get the device revision (DevRev).

-
Parameters
- - - -
[in]deviceDevice context
[out]revisionDevice revision is returned here (4 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info_get_latch()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_info_get_latch (bool * state)
-
- -

Use the Info command to get the persistent latch current state for an ATECC608 device.

-
Parameters
- - -
[out]stateThe state is returned here. Set (true) or Cler (false).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info_lock_status()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_info_lock_status (uint16_t param2,
uint8_t * is_locked 
)
-
- -

Use the Info command to get the lock status.

-
Parameters
- - - -
[in]param2selects the zone and slot
[out]is_lockedreturns lock status here
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_info_set_latch()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_info_set_latch (bool state)
-
- -

Use the Info command to set the persistent latch state for an ATECC608 device.

-
Parameters
- - -
[out]statePersistent latch state. Set (true) or clear (false).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_init()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_init (ATCAIfaceCfgcfg)
-
- -

Creates a global ATCADevice object used by Basic API.

-
Parameters
- - -
[in]cfgLogical interface configuration. Some predefined configurations can be found in atca_cfgs.h
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_init_device()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_init_device (ATCADevice ca_device)
-
- -

Initialize the global ATCADevice object to point to one of your choosing for use with all the atcab_ basic API.

-
Deprecated:
This function is not recommended for use generally. Use of _ext is recommended instead. You can use atcab_init_ext to obtain an initialized instance and associated it with the global structure - but this shouldn't be a required process except in extremely unusual circumstances.
-
Parameters
- - -
[in]ca_deviceATCADevice instance to use as the global Basic API crypto device instance
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_init_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_init_ext (ATCADevicedevice,
ATCAIfaceCfgcfg 
)
-
- -

Creates and initializes a ATCADevice context.

-
Parameters
- - - -
[out]devicePointer to the device context pointer
[in]cfgLogical interface configuration. Some predefined configurations can be found in atca_cfgs.h
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_ca2_device()

- -
-
- - - - - - - - -
bool atcab_is_ca2_device (ATCADeviceType dev_type)
-
- -

Check whether the device is cryptoauth device.

-
Returns
True if device is cryptoauth device or False.
- -
-
- -

◆ atcab_is_ca_device()

- -
-
- - - - - - - - -
bool atcab_is_ca_device (ATCADeviceType dev_type)
-
- -

Check whether the device is cryptoauth device.

-
Returns
True if device is cryptoauth device or False.
- -
-
- -

◆ atcab_is_config_locked()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_is_config_locked (bool * is_locked)
-
- -

This function check whether configuration zone is locked or not.

-
Parameters
- - -
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_config_locked_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_is_config_locked_ext (ATCADevice device,
bool * is_locked 
)
-
- -

This function check whether configuration zone is locked or not.

-
Parameters
- - - -
[in]deviceDevice context
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_data_locked()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_is_data_locked (bool * is_locked)
-
- -

This function check whether data/setup zone is locked or not.

-
Parameters
- - -
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_data_locked_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_is_data_locked_ext (ATCADevice device,
bool * is_locked 
)
-
- -

This function check whether data/setup zone is locked or not.

-
Parameters
- - - -
[in]deviceDevice context
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_locked()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_is_locked (uint8_t zone,
bool * is_locked 
)
-
- -

Executes Read command, which reads the configuration zone to see if the specified zone is locked.

-
Parameters
- - - -
[in]zoneThe zone to query for locked (use LOCK_ZONE_CONFIG or LOCK_ZONE_DATA).
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_private_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_is_private_ext (ATCADevice device,
uint16_t slot,
bool * is_private 
)
-
- -

Check to see if the key is a private key or not.

-

This function will issue the Read command as many times as is required to read the requested data.

-
Parameters
- - - -
[in]slotSlot number to read from if zone is ATCA_ZONE_DATA(2). Ignored for all other zones.
[out]is_privateReturned valud if successful. True if key is private.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_slot_locked()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_is_slot_locked (uint16_t slot,
bool * is_locked 
)
-
- -

This function check whether slot/handle is locked or not.

-
Parameters
- - - -
[in]slotSlot to query for locked
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_slot_locked_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_is_slot_locked_ext (ATCADevice device,
uint16_t slot,
bool * is_locked 
)
-
- -

This function check whether slot/handle is locked or not.

-
Parameters
- - - - -
[in]deviceDevice context
[in]slotSlot to query for locked
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_is_ta_device()

- -
-
- - - - - - - - -
bool atcab_is_ta_device (ATCADeviceType dev_type)
-
- -

Check whether the device is Trust Anchor device.

-
Returns
True if device is Trust Anchor device or False.
- -
-
- -

◆ atcab_kdf()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_kdf (uint8_t mode,
uint16_t key_id,
const uint32_t details,
const uint8_t * message,
uint8_t * out_data,
uint8_t * out_nonce 
)
-
- -

Executes the KDF command, which derives a new key in PRF, AES, or HKDF modes.

-

Generally this function combines a source key with an input string and creates a result key/digest/array.

-
Parameters
- - - - - - - -
[in]modeMode determines KDF algorithm (PRF,AES,HKDF), source key location, and target key locations.
[in]key_idSource and target key slots if locations are in the EEPROM. Source key slot is the LSB and target key slot is the MSB.
[in]detailsFurther information about the computation, depending on the algorithm (4 bytes).
[in]messageInput value from system (up to 128 bytes). Actual size of message is 16 bytes for AES algorithm or is encoded in the MSB of the details parameter for other algorithms.
[out]out_dataOutput of the KDF function is returned here. If the result remains in the device, this can be NULL.
[out]out_nonceIf the output is encrypted, a 32 byte random nonce generated by the device is returned here. If output encryption is not used, this can be NULL.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_lock (uint8_t mode,
uint16_t summary_crc 
)
-
- -

The Lock command prevents future modifications of the Configuration and/or Data and OTP zones. If the device is so configured, then this command can be used to lock individual data slots. This command fails if the designated area is already locked.

-
Parameters
- - - -
[in]modeZone, and/or slot, and summary check (bit 7).
[in]summary_crcCRC of the config or data zones. Ignored for slot locks or when mode bit 7 is set.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_config_zone()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_config_zone (void )
-
- -

Unconditionally (no CRC required) lock the config zone.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_config_zone_crc()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_config_zone_crc (uint16_t summary_crc)
-
- -

Lock the config zone with summary CRC.

-

The CRC is calculated over the entire config zone contents. 48 bytes for TA100, 88 bytes for ATSHA devices, 128 bytes for ATECC devices. Lock will fail if the provided CRC doesn't match the internally calculated one.

-
Parameters
- - -
[in]summary_crcExpected CRC over the config zone.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_config_zone_ext()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_config_zone_ext (ATCADevice device)
-
- -

Unconditionally (no CRC required) lock the config zone.

-
Parameters
- - -
[in]deviceDevice context
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_data_slot()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_data_slot (uint16_t slot)
-
- -

Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).

-
Parameters
- - -
[in]slotSlot to be locked in data zone.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_data_slot_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_lock_data_slot_ext (ATCADevice device,
uint16_t slot 
)
-
- -

Lock an individual slot in the data zone on an ATECC device. Not available for ATSHA devices. Slot must be configured to be slot lockable (KeyConfig.Lockable=1) (for cryptoauth devices) or Lock an individual handle in shared data element on an Trust Anchor device (for Trust Anchor devices).

-
Parameters
- - - -
[in]deviceDevice context
[in]slotSlot to be locked in data zone.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_data_zone()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_data_zone (void )
-
- -

Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.

-

ConfigZone must be locked and DataZone must be unlocked for the zone to be successfully locked.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_data_zone_crc()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_data_zone_crc (uint16_t summary_crc)
-
- -

Lock the data zone (slots and OTP) with summary CRC.

-

The CRC is calculated over the concatenated contents of all the slots and OTP at the end. Private keys (KeyConfig.Private=1) are skipped. Lock will fail if the provided CRC doesn't match the internally calculated one.

-
Parameters
- - -
[in]summary_crcExpected CRC over the data zone.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_lock_data_zone_ext()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_lock_data_zone_ext (ATCADevice device)
-
- -

Unconditionally (no CRC required) lock the data zone (slots and OTP). for CryptoAuth devices and lock the setup for Trust Anchor device.

-
Parameters
- - -
[in]deviceDevice context ConfigZone must be locked and DataZone must be unlocked for the zone to be successfully locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_mac (uint8_t mode,
uint16_t key_id,
const uint8_t * challenge,
uint8_t * digest 
)
-
- -

Executes MAC command, which computes a SHA-256 digest of a key stored in the device, a challenge, and other information on the device.

-
Parameters
- - - - - -
[in]modeControls which fields within the device are used in the message
[in]key_idKey in the CryptoAuth device to use for the MAC
[in]challengeChallenge message (32 bytes). May be NULL if mode indicates a challenge isn't required.
[out]digestMAC response is returned here (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_nonce()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_nonce (const uint8_t * num_in)
-
- -

Execute a Nonce command in pass-through mode to initialize TempKey to a specified value.

-
Parameters
- - -
[in]num_inData to be loaded into TempKey (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_nonce_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_nonce_base (uint8_t mode,
uint16_t zero,
const uint8_t * num_in,
uint8_t * rand_out 
)
-
- -

Executes Nonce command, which loads a random or fixed nonce/data into the device for use by subsequent commands.

-
Parameters
- - - - - -
[in]modeControls the mechanism of the internal RNG or fixed write.
[in]zeroParam2, normally 0, but can be used to indicate a nonce calculation mode (bit 15).
[in]num_inInput value to either be included in the nonce calculation in random modes (20 bytes) or to be written directly (32 bytes or 64 bytes(ATECC608)) in pass-through mode.
[out]rand_outIf using a random mode, the internally generated 32-byte random number that was used in the nonce calculation is returned here. Can be NULL if not needed.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_nonce_load()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_nonce_load (uint8_t target,
const uint8_t * num_in,
uint16_t num_in_size 
)
-
- -

Execute a Nonce command in pass-through mode to load one of the device's internal buffers with a fixed value.

-

For the ATECC608, available targets are TempKey (32 or 64 bytes), Message Digest Buffer (32 or 64 bytes), or the Alternate Key Buffer (32 bytes). For all other devices, only TempKey (32 bytes) is available.

-
Parameters
- - - - -
[in]targetTarget device buffer to load. Can be NONCE_MODE_TARGET_TEMPKEY, NONCE_MODE_TARGET_MSGDIGBUF, or NONCE_MODE_TARGET_ALTKEYBUF.
[in]num_inData to load into the buffer.
[in]num_in_sizeSize of num_in in bytes. Can be 32 or 64 bytes depending on device and target.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_nonce_rand()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_nonce_rand (const uint8_t * num_in,
uint8_t * rand_out 
)
-
- -

Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.

-
Parameters
- - - -
[in]num_inHost nonce to be combined with the device random number (20 bytes).
[out]rand_outInternally generated 32-byte random number that was used in the nonce/challenge calculation is returned here. Can be NULL if not needed.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_nonce_rand_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_nonce_rand_ext (ATCADevice device,
const uint8_t * num_in,
uint8_t * rand_out 
)
-
- -

Execute a Nonce command to generate a random nonce combining a host nonce (num_in) and a device random number.

-
Parameters
- - - - -
[in]deviceDevice context
[in]num_inHost nonce to be combined with the device random number (20 bytes).
[out]rand_outInternally generated 32-byte random number that was used in the nonce/challenge calculation is returned here. Can be NULL if not needed.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_priv_write()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_priv_write (uint16_t key_id,
const uint8_t priv_key[36],
uint16_t write_key_id,
const uint8_t write_key[32],
const uint8_t num_in[(20)] 
)
-
- -

Executes PrivWrite command, to write externally generated ECC private keys into the device.

-
Parameters
- - - - - - -
[in]key_idSlot to write the external private key into.
[in]priv_keyExternal private key (36 bytes) to be written. The first 4 bytes should be zero for P256 curve.
[in]write_key_idWrite key slot. Ignored if write_key is NULL.
[in]write_keyWrite key (32 bytes). If NULL, perform an unencrypted PrivWrite, which is only available when the data zone is unlocked.
[in]num_in20 byte host nonce to inject into Nonce calculation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_random()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_random (uint8_t * rand_out)
-
- -

Executes Random command, which generates a 32 byte random number from the device.

-
Parameters
- - -
[out]rand_out32 bytes of random data is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_random_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_random_ext (ATCADevice device,
uint8_t * rand_out 
)
-
- -

Executes Random command, which generates a 32 byte random number from the device.

-
Parameters
- - - -
[in]deviceDevice context pointer
[out]rand_out32 bytes of random data is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_bytes_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_bytes_zone (uint8_t zone,
uint16_t slot,
size_t offset,
uint8_t * data,
size_t length 
)
-
- -

Used to read an arbitrary number of bytes from any zone configured for clear reads.

-

This function will issue the Read command as many times as is required to read the requested data.

-
Parameters
- - - - - - -
[in]zoneZone to read data from. Option are ATCA_ZONE_CONFIG(0), ATCA_ZONE_OTP(1), or ATCA_ZONE_DATA(2).
[in]slotSlot number to read from if zone is ATCA_ZONE_DATA(2). Ignored for all other zones.
[in]offsetByte offset within the zone to read from.
[out]dataRead data is returned here.
[in]lengthNumber of bytes to read starting from the offset.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_config_zone()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_read_config_zone (uint8_t * config_data)
-
- -

Executes Read command to read the complete device configuration zone.

-
Parameters
- - -
[out]config_dataConfiguration zone data is returned here. 88 bytes for ATSHA devices, 128 bytes for ATECC devices and 48 bytes for Trust Anchor devices.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_config_zone_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_config_zone_ext (ATCADevice device,
uint8_t * config_data 
)
-
- -

Executes Read command to read the complete device configuration zone.

-
Parameters
- - - -
[in]devicedevice context
[out]config_dataConfiguration zone data is returned here. 88 bytes for ATSHA devices, 128 bytes for ATECC devices and 48 bytes for Trust Anchor devices.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_enc (uint16_t key_id,
uint8_t block,
uint8_t * data,
const uint8_t * enc_key,
const uint16_t enc_key_id,
const uint8_t num_in[(20)] 
)
-
- -

Executes Read command on a slot configured for encrypted reads and decrypts the data to return it as plaintext.

-

Data zone must be locked for this command to succeed. Can only read 32 byte blocks.

-
Parameters
- - - - - - - -
[in]key_idThe slot ID to read from.
[in]blockIndex of the 32 byte block within the slot to read.
[out]dataDecrypted (plaintext) data from the read is returned here (32 bytes).
[in]enc_key32 byte ReadKey for the slot being read.
[in]enc_key_idKeyID of the ReadKey being used.
[in]num_in20 byte host nonce to inject into Nonce calculation
-
-
-

returns ATCA_SUCCESS on success, otherwise an error code.

- -
-
- -

◆ atcab_read_pubkey()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_pubkey (uint16_t slot,
uint8_t * public_key 
)
-
- -

Executes Read command to read an ECC P256 public key from a slot configured for clear reads.

-

This function assumes the public key is stored using the ECC public key format specified in the datasheet.

-
Parameters
- - - -
[in]slotSlot number to read from. Only slots 8 to 15 are large enough for a public key.
[out]public_keyPublic key is returned here (64 bytes). Format will be the 32 byte X and Y big-endian integers concatenated.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_pubkey_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_pubkey_ext (ATCADevice device,
uint16_t slot,
uint8_t * public_key 
)
-
- -

Executes Read command to read an ECC P256 public key from a slot configured for clear reads.

-

This function assumes the public key is stored using the ECC public key format specified in the datasheet.

-
Parameters
- - - - -
[in]deviceDevice context pointer
[in]slotSlot number to read from. Only slots 8 to 15 are large enough for a public key.
[out]public_keyPublic key is returned here (64 bytes). Format will be the 32 byte X and Y big-endian integers concatenated.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_serial_number()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_read_serial_number (uint8_t * serial_number)
-
- -

This function returns serial number of the device.

-
Parameters
- - -
[out]serial_number9 byte serial number is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_serial_number_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_serial_number_ext (ATCADevice device,
uint8_t * serial_number 
)
-
- -

This function returns serial number of the device.

-
Parameters
- - - -
[in]deviceDevice context
[out]serial_number9 byte serial number is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_sig()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_sig (uint16_t slot,
uint8_t * sig 
)
-
- -

Executes Read command to read a 64 byte ECDSA P256 signature from a slot configured for clear reads.

-
Parameters
- - - -
[in]slotSlot number to read from. Only slots 8 to 15 are large enough for a signature.
[out]sigSignature will be returned here (64 bytes). Format will be the 32 byte R and S big-endian integers concatenated.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_read_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_zone (uint8_t zone,
uint16_t slot,
uint8_t block,
uint8_t offset,
uint8_t * data,
uint8_t len 
)
-
- -

Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.

-

When reading a slot or OTP, data zone must be locked and the slot configuration must not be secret for a slot to be successfully read.

-
Parameters
- - - - - - - -
[in]zoneZone to be read from device. Options are ATCA_ZONE_CONFIG, ATCA_ZONE_OTP, or ATCA_ZONE_DATA.
[in]slotSlot number for data zone and ignored for other zones.
[in]block32 byte block index within the zone.
[in]offset4 byte work index within the block. Ignored for 32 byte reads.
[out]dataRead data is returned here.
[in]lenLength of the data to be read. Must be either 4 or 32.
-
-
-

returns ATCA_SUCCESS on success, otherwise an error code.

- -
-
- -

◆ atcab_read_zone_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_read_zone_ext (ATCADevice device,
uint8_t zone,
uint16_t slot,
uint8_t block,
uint8_t offset,
uint8_t * data,
uint8_t len 
)
-
- -

Executes Read command, which reads either 4 or 32 bytes of data from a given slot, configuration zone, or the OTP zone.

-

When reading a slot or OTP, data zone must be locked and the slot configuration must not be secret for a slot to be successfully read.

-
Parameters
- - - - - - - - -
[in]deviceDevice context
[in]zoneZone to be read from device. Options are ATCA_ZONE_CONFIG, ATCA_ZONE_OTP, or ATCA_ZONE_DATA.
[in]slotSlot number for data zone and ignored for other zones.
[in]block32 byte block index within the zone.
[in]offset4 byte work index within the block. Ignored for 32 byte reads.
[out]dataRead data is returned here.
[in]lenLength of the data to be read. Must be either 4 or 32.
-
-
-

returns ATCA_SUCCESS on success, otherwise an error code.

- -
-
- -

◆ atcab_release()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_release (void )
-
- -

release (free) the global ATCADevice instance. This must be called in order to release or free up the interface.

-
Returns
Returns ATCA_SUCCESS .
- -
-
- -

◆ atcab_release_ext()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_release_ext (ATCADevicedevice)
-
- -

release (free) the an ATCADevice instance.

-
Parameters
- - -
[in]devicePointer to the device context pointer
-
-
-
Returns
Returns ATCA_SUCCESS .
- -
-
- -

◆ atcab_reversal()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_reversal (const uint8_t * bin,
size_t bin_size,
uint8_t * dest,
size_t * dest_size 
)
-
- -

To reverse the input data.

-
Parameters
- - - - - -
[in]binInput data to reverse.
[in]bin_sizeSize of data to reverse.
[out]destBuffer to store reversed binary data.
[in]dest_sizeThe size of the dest buffer.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_secureboot()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_secureboot (uint8_t mode,
uint16_t param2,
const uint8_t * digest,
const uint8_t * signature,
uint8_t * mac 
)
-
- -

Executes Secure Boot command, which provides support for secure boot of an external MCU or MPU.

-
Parameters
- - - - - - -
[in]modeMode determines what operations the SecureBoot command performs.
[in]param2Not used, must be 0.
[in]digestDigest of the code to be verified (32 bytes).
[in]signatureSignature of the code to be verified (64 bytes). Can be NULL when using the FullStore mode.
[out]macValidating MAC will be returned here (32 bytes). Can be NULL if not required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_secureboot_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_secureboot_mac (uint8_t mode,
const uint8_t * digest,
const uint8_t * signature,
const uint8_t * num_in,
const uint8_t * io_key,
bool * is_verified 
)
-
- -

Executes Secure Boot command with encrypted digest and validated MAC response using the IO protection key.

-
Parameters
- - - - - - - -
[in]modeMode determines what operations the SecureBoot command performs.
[in]digestDigest of the code to be verified (32 bytes). This is the plaintext digest (not encrypted).
[in]signatureSignature of the code to be verified (64 bytes). Can be NULL when using the FullStore mode.
[in]num_inHost nonce (20 bytes).
[in]io_keyIO protection key (32 bytes).
[out]is_verifiedVerify result is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_selftest()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_selftest (uint8_t mode,
uint16_t param2,
uint8_t * result 
)
-
- -

Executes the SelfTest command, which performs a test of one or more of the cryptographic engines within the ATECC608 chip.

-
Parameters
- - - - -
[in]modeFunctions to test. Can be a bit field combining any of the following: SELFTEST_MODE_RNG, SELFTEST_MODE_ECDSA_VERIFY, SELFTEST_MODE_ECDSA_SIGN, SELFTEST_MODE_ECDH, SELFTEST_MODE_AES, SELFTEST_MODE_SHA, SELFTEST_MODE_ALL.
[in]param2Currently unused, should be 0.
[out]resultResults are returned here as a bit field.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha (uint16_t length,
const uint8_t * message,
uint8_t * digest 
)
-
- -

Use the SHA command to compute a SHA-256 digest.

-
Parameters
- - - - -
[in]lengthSize of message parameter in bytes.
[in]messageMessage data to be hashed.
[out]digestDigest is returned here (32 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_base (uint8_t mode,
uint16_t length,
const uint8_t * data_in,
uint8_t * data_out,
uint16_t * data_out_size 
)
-
- -

Executes SHA command, which computes a SHA-256 or HMAC/SHA-256 digest for general purpose use by the host system.

-

Only the Start(0) and Compute(1) modes are available for ATSHA devices.

-
Parameters
- - - - - - -
[in]modeSHA command mode Start(0), Update/Compute(1), End(2), Public(3), HMACstart(4), HMACend(5), Read_Context(6), or Write_Context(7). Also message digest target location for the ATECC608.
[in]lengthNumber of bytes in the message parameter or KeySlot for the HMAC key if Mode is HMACstart(4) or Public(3).
[in]data_inMessage bytes to be hashed or Write_Context if restoring a context on the ATECC608. Can be NULL if not required by the mode.
[out]data_outData returned by the command (digest or context).
[in,out]data_out_sizeAs input, the size of the data_out buffer. As output, the number of bytes returned in data_out.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_end()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_end (uint8_t * digest,
uint16_t length,
const uint8_t * message 
)
-
- -

Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.

-
Parameters
- - - - -
[out]digestDigest from SHA-256 or HMAC/SHA-256 will be returned here (32 bytes).
[in]lengthLength of any remaining data to include in hash. Max 64 bytes.
[in]messageRemaining data to include in hash. NULL if length is 0.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_hmac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_hmac (const uint8_t * data,
size_t data_size,
uint16_t key_slot,
uint8_t * digest,
uint8_t target 
)
-
- -

Use the SHA command to compute an HMAC/SHA-256 operation.

-
Parameters
- - - - - - -
[in]dataMessage data to be hashed.
[in]data_sizeSize of data in bytes.
[in]key_slotSlot key id to use for the HMAC calculation
[out]digestDigest is returned here (32 bytes).
[in]targetWhere to save the digest internal to the device. For ATECC608, can be SHA_MODE_TARGET_TEMPKEY, SHA_MODE_TARGET_MSGDIGBUF, or SHA_MODE_TARGET_OUT_ONLY. For all other devices, SHA_MODE_TARGET_TEMPKEY is the only option.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_hmac_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_hmac_ext (ATCADevice device,
const uint8_t * data,
size_t data_size,
uint16_t key_slot,
uint8_t * digest,
uint8_t target 
)
-
- -

Use the SHA command to compute an HMAC/SHA-256 operation.

-
Parameters
- - - - - - - -
[in]deviceDevice context pointer
[in]dataMessage data to be hashed.
[in]data_sizeSize of data in bytes.
[in]key_slotSlot key id to use for the HMAC calculation
[out]digestDigest is returned here (32 bytes).
[in]targetWhere to save the digest internal to the device. For ATECC608, can be SHA_MODE_TARGET_TEMPKEY, SHA_MODE_TARGET_MSGDIGBUF, or SHA_MODE_TARGET_OUT_ONLY. For all other devices, SHA_MODE_TARGET_TEMPKEY is the only option.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_hmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_hmac_finish (atca_hmac_sha256_ctx_tctx,
uint8_t * digest,
uint8_t target 
)
-
- -

Executes SHA command to complete a HMAC/SHA-256 operation.

-
Parameters
- - - - -
[in]ctxHMAC/SHA-256 context
[out]digestHMAC/SHA-256 result is returned here (32 bytes).
[in]targetWhere to save the digest internal to the device. For ATECC608, can be SHA_MODE_TARGET_TEMPKEY, SHA_MODE_TARGET_MSGDIGBUF, or SHA_MODE_TARGET_OUT_ONLY. For all other devices, SHA_MODE_TARGET_TEMPKEY is the only option.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_hmac_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_hmac_init (atca_hmac_sha256_ctx_tctx,
uint16_t key_slot 
)
-
- -

Executes SHA command to start an HMAC/SHA-256 operation.

-
Parameters
- - - -
[in]ctxHMAC/SHA-256 context
[in]key_slotSlot key id to use for the HMAC calculation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_hmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_hmac_update (atca_hmac_sha256_ctx_tctx,
const uint8_t * data,
size_t data_size 
)
-
- -

Executes SHA command to add an arbitrary amount of message data to a HMAC/SHA-256 operation.

-
Parameters
- - - - -
[in]ctxHMAC/SHA-256 context
[in]dataMessage data to add
[in]data_sizeSize of message data in bytes
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_read_context()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_read_context (uint8_t * context,
uint16_t * context_size 
)
-
- -

Executes SHA command to read the SHA-256 context back. Only for ATECC608 with SHA-256 contexts. HMAC not supported.

-
Parameters
- - - -
[out]contextContext data is returned here.
[in,out]context_sizeAs input, the size of the context buffer in bytes. As output, the size of the returned context data.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_start()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_sha_start (void )
-
- -

Executes SHA command to initialize SHA-256 calculation engine.

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_update()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_sha_update (const uint8_t * message)
-
- -

Executes SHA command to add 64 bytes of message data to the current context.

-
Parameters
- - -
[in]message64 bytes of message data to add to add to operation.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sha_write_context()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sha_write_context (const uint8_t * context,
uint16_t context_size 
)
-
- -

Executes SHA command to write (restore) a SHA-256 context into the the device. Only supported for ATECC608 with SHA-256 contexts.

-
Parameters
- - - -
[in]contextContext data to be restored.
[in]context_sizeSize of the context data in bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sign()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sign (uint16_t key_id,
const uint8_t * msg,
uint8_t * signature 
)
-
- -

Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.

-
Parameters
- - - - -
[in]key_idSlot of the private key to be used to sign the message.
[in]msg32-byte message to be signed. Typically the SHA256 hash of the full message.
[out]signatureSignature will be returned here. Format is R and S integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sign_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sign_base (uint8_t mode,
uint16_t key_id,
uint8_t * signature 
)
-
- -

Executes the Sign command, which generates a signature using the ECDSA algorithm.

-
Parameters
- - - - -
[in]modeMode determines what the source of the message to be signed.
[in]key_idPrivate key slot used to sign the message.
[out]signatureSignature is returned here. Format is R and S integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sign_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sign_ext (ATCADevice device,
uint16_t key_id,
const uint8_t * msg,
uint8_t * signature 
)
-
- -

Executes Sign command, to sign a 32-byte external message using the private key in the specified slot. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.

-
Parameters
- - - - - -
[in]deviceDevice context pointer
[in]key_idSlot of the private key to be used to sign the message.
[in]msg32-byte message to be signed. Typically the SHA256 hash of the full message.
[out]signatureSignature will be returned here. Format is R and S integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sign_internal()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_sign_internal (uint16_t key_id,
bool is_invalidate,
bool is_full_sn,
uint8_t * signature 
)
-
- -

Executes Sign command to sign an internally generated message.

-
Parameters
- - - - - -
[in]key_idSlot of the private key to be used to sign the message.
[in]is_invalidateSet to true if the signature will be used with the Verify(Invalidate) command. false for all other cases.
[in]is_full_snSet to true if the message should incorporate the device's full serial number.
[out]signatureSignature is returned here. Format is R and S integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_sleep()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_sleep (void )
-
- -

invoke sleep on the CryptoAuth device

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_updateextra()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_updateextra (uint8_t mode,
uint16_t new_value 
)
-
- -

Executes UpdateExtra command to update the values of the two extra bytes within the Configuration zone (bytes 84 and 85).

-

Can also be used to decrement the limited use counter associated with the key in slot NewValue.

-
Parameters
- - - -
[in]modeMode determines what operations the UpdateExtra command performs.
[in]new_valueValue to be written.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_verify()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify (uint8_t mode,
uint16_t key_id,
const uint8_t * signature,
const uint8_t * public_key,
const uint8_t * other_data,
uint8_t * mac 
)
-
- -

Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that it is correctly generated from a given message and public key. In all cases, the signature is an input to the command.

-

For the Stored, External, and ValidateExternal Modes, the contents of TempKey (or Message Digest Buffer in some cases for the ATECC608) should contain the 32 byte message.

-
Parameters
- - - - - - - -
[in]modeVerify command mode and options
[in]key_idStored mode, the slot containing the public key to be used for the verification. ValidateExternal mode, the slot containing the public key to be validated. External mode, KeyID contains the curve type to be used to Verify the signature. Validate or Invalidate mode, the slot containing the public key to be (in)validated.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]public_keyIf mode is External, the public key to be used for verification. X and Y integers in big-endian format. 64 bytes for P256 curve. NULL for all other modes.
[in]other_dataIf mode is Validate, the bytes used to generate the message for the validation (19 bytes). NULL for all other modes.
[out]macIf mode indicates a validating MAC, then the MAC will will be returned here. Can be NULL otherwise.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_verify_extern()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_extern (const uint8_t * message,
const uint8_t * signature,
const uint8_t * public_key,
bool * is_verified 
)
-
- -

Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.

-
Parameters
- - - - - -
[in]message32 byte message to be verified. Typically the SHA256 hash of the full message.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]public_keyThe public key to be used for verification. X and Y integers in big-endian format. 64 bytes for P256 curve.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_extern_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_extern_ext (ATCADevice device,
const uint8_t * message,
const uint8_t * signature,
const uint8_t * public_key,
bool * is_verified 
)
-
- -

Executes the Verify command, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.

-
Parameters
- - - - - - -
[in]deviceDevice context pointer
[in]message32 byte message to be verified. Typically the SHA256 hash of the full message.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]public_keyThe public key to be used for verification. X and Y integers in big-endian format. 64 bytes for P256 curve.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_extern_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_extern_mac (const uint8_t * message,
const uint8_t * signature,
const uint8_t * public_key,
const uint8_t * num_in,
const uint8_t * io_key,
bool * is_verified 
)
-
- -

Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with all components (message, signature, and public key) supplied. This function is only available on the ATECC608.

-
Parameters
- - - - - - - -
[in]message32 byte message to be verified. Typically the SHA256 hash of the full message.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]public_keyThe public key to be used for verification. X and Y integers in big-endian format. 64 bytes for P256 curve.
[in]num_inSystem nonce (32 byte) used for the verification MAC.
[in]io_keyIO protection key for verifying the validation MAC.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_invalidate()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_invalidate (uint16_t key_id,
const uint8_t * signature,
const uint8_t * other_data,
bool * is_verified 
)
-
- -

Executes the Verify command in Invalidate mode which invalidates a previously validated public key stored in a slot.

-

This command can only be run after GenKey has been used to create a PubKey digest of the public key to be invalidated in TempKey (mode=0x10).

-
Parameters
- - - - - -
[in]key_idSlot containing the public key to be invalidated.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]other_data19 bytes of data used to build the verification message.
[out]is_verifiedBoolean whether or not the message, signature, validation public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_stored()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_stored (const uint8_t * message,
const uint8_t * signature,
uint16_t key_id,
bool * is_verified 
)
-
- -

Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.

-
Parameters
- - - - - -
[in]message32 byte message to be verified. Typically the SHA256 hash of the full message.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]key_idSlot containing the public key to be used in the verification.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_stored_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_stored_ext (ATCADevice device,
const uint8_t * message,
const uint8_t * signature,
uint16_t key_id,
bool * is_verified 
)
-
- -

Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. The message to be signed will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.

-
Parameters
- - - - - - -
[in]deviceDevice context pointer
[in]message32 byte message to be verified. Typically the SHA256 hash of the full message.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]key_idSlot containing the public key to be used in the verification.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_stored_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_stored_mac (const uint8_t * message,
const uint8_t * signature,
uint16_t key_id,
const uint8_t * num_in,
const uint8_t * io_key,
bool * is_verified 
)
-
- -

Executes the Verify command with verification MAC, which verifies a signature (ECDSA verify operation) with a public key stored in the device. This function is only available on the ATECC608.

-
Parameters
- - - - - - - -
[in]message32 byte message to be verified. Typically the SHA256 hash of the full message.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]key_idSlot containing the public key to be used in the verification.
[in]num_inSystem nonce (32 byte) used for the verification MAC.
[in]io_keyIO protection key for verifying the validation MAC.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_stored_with_tempkey()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_stored_with_tempkey (const uint8_t * signature,
uint16_t key_id,
bool * is_verified 
)
-
- -

Executes the Verify command, which verifies a signature (ECDSA verify operation) with a public key stored in the device. keyConfig.reqrandom bit should be set and the message to be signed should be already loaded into TempKey for all devices.

-

Please refer to TEST(atca_cmd_basic_test, verify_stored_on_reqrandom_set) in atca_tests_verify.c for proper use of this api

-
Parameters
- - - - - -
[in]deviceDevice context pointer
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]key_idSlot containing the public key to be used in the verification.
[out]is_verifiedBoolean whether or not the message, signature, public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_verify_validate()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_verify_validate (uint16_t key_id,
const uint8_t * signature,
const uint8_t * other_data,
bool * is_verified 
)
-
- -

Executes the Verify command in Validate mode to validate a public key stored in a slot.

-

This command can only be run after GenKey has been used to create a PubKey digest of the public key to be validated in TempKey (mode=0x10).

-
Parameters
- - - - - -
[in]key_idSlot containing the public key to be validated.
[in]signatureSignature to be verified. R and S integers in big-endian format. 64 bytes for P256 curve.
[in]other_data19 bytes of data used to build the verification message.
[out]is_verifiedBoolean whether or not the message, signature, validation public key verified.
-
-
-
Returns
ATCA_SUCCESS on verification success or failure, because the command still completed successfully.
- -
-
- -

◆ atcab_version()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_version (char * ver_str)
-
- -

basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.

-

returns a version string for the CryptoAuthLib release. The format of the version string returned is "yyyymmdd"

Parameters
- - -
[out]ver_strptr to space to receive version string
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_wakeup()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_wakeup (void )
-
- -

wakeup the CryptoAuth device

-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write (uint8_t zone,
uint16_t address,
const uint8_t * value,
const uint8_t * mac 
)
-
- -

Executes the Write command, which writes either one four byte word or a 32-byte block to one of the EEPROM zones on the device. Depending upon the value of the WriteConfig byte for this slot, the data may be required to be encrypted by the system prior to being sent to the device. This command cannot be used to write slots configured as ECC private keys.

-
Parameters
- - - - - -
[in]zoneZone/Param1 for the write command.
[in]addressAddress/Param2 for the write command.
[in]valuePlain-text data to be written or cipher-text for encrypted writes. 32 or 4 bytes depending on bit 7 in the zone.
[in]macMAC required for encrypted writes (32 bytes). Set to NULL if not required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_bytes_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_bytes_zone (uint8_t zone,
uint16_t slot,
size_t offset_bytes,
const uint8_t * data,
size_t length 
)
-
- -

Executes the Write command, which writes data into the configuration, otp, or data zones with a given byte offset and length. Offset and length must be multiples of a word (4 bytes).

-

Config zone must be unlocked for writes to that zone. If data zone is unlocked, only 32-byte writes are allowed to slots and OTP and the offset and length must be multiples of 32 or the write will fail.

-
Parameters
- - - - - - -
[in]zoneZone to write data to: ATCA_ZONE_CONFIG(0), ATCA_ZONE_OTP(1), or ATCA_ZONE_DATA(2).
[in]slotIf zone is ATCA_ZONE_DATA(2), the slot number to write to. Ignored for all other zones.
[in]offset_bytesByte offset within the zone to write to. Must be a multiple of a word (4 bytes).
[in]dataData to be written.
[in]lengthNumber of bytes to be written. Must be a multiple of a word (4 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_config_counter()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_config_counter (uint16_t counter_id,
uint32_t counter_value 
)
-
- -

Initialize one of the monotonic counters in device with a specific value.

-

The monotonic counters are stored in the configuration zone using a special format. This encodes a binary count value into the 8 byte encoded value required. Can only be set while the configuration zone is unlocked.

-
Parameters
- - - -
[in]counter_idCounter to be written.
[in]counter_valueCounter value to set.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_config_zone()

- -
-
- - - - - - - - -
ATCA_STATUS atcab_write_config_zone (const uint8_t * config_data)
-
- -

Executes the Write command, which writes the configuration zone.

-

First 16 bytes are skipped as they are not writable. LockValue and LockConfig are also skipped and can only be changed via the Lock command.

-

This command may fail if UserExtra and/or Selector bytes have already been set to non-zero values.

-
Parameters
- - -
[in]config_dataData to the config zone data. This should be 88 bytes for SHA devices and 128 bytes for ECC devices.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_config_zone_ext()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_config_zone_ext (ATCADevice device,
const uint8_t * config_data 
)
-
- -

Executes the Write command, which writes the configuration zone.

-

First 16 bytes are skipped as they are not writable. LockValue and LockConfig are also skipped and can only be changed via the Lock command.

-

This command may fail if UserExtra and/or Selector bytes have already been set to non-zero values.

-
Parameters
- - - -
[in]deviceDevice context
[in]config_dataData to the config zone data. This should be 88 bytes for SHA devices and 128 bytes for ECC devices.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_enc (uint16_t key_id,
uint8_t block,
const uint8_t * data,
const uint8_t * enc_key,
const uint16_t enc_key_id,
const uint8_t num_in[(20)] 
)
-
- -

Executes the Write command, which performs an encrypted write of a 32 byte block into given slot.

-

The function takes clear text bytes and encrypts them for writing over the wire. Data zone must be locked and the slot configuration must be set to encrypted write for the block to be successfully written.

-
Parameters
- - - - - - - -
[in]key_idSlot ID to write to.
[in]blockIndex of the 32 byte block to write in the slot.
[in]data32 bytes of clear text data to be written to the slot
[in]enc_keyWriteKey to encrypt with for writing
[in]enc_key_idThe KeyID of the WriteKey
[in]num_in20 byte host nonce to inject into Nonce calculation
-
-
-

returns ATCA_SUCCESS on success, otherwise an error code.

- -
-
- -

◆ atcab_write_pubkey()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_pubkey (uint16_t slot,
const uint8_t * public_key 
)
-
- -

Uses the write command to write a public key to a slot in the proper format.

-
Parameters
- - - -
[in]slotSlot number to write. Only slots 8 to 15 are large enough to store a public key.
[in]public_keyPublic key to write into the slot specified. X and Y integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_pubkey_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_pubkey_ext (ATCADevice device,
uint16_t slot,
const uint8_t * public_key 
)
-
- -

Uses the write command to write a public key to a slot in the proper format.

-
Parameters
- - - - -
[in]deviceDevice context
[in]slotSlot number to write. Only slots 8 to 15 are large enough to store a public key.
[in]public_keyPublic key to write into the slot specified. X and Y integers in big-endian format. 64 bytes for P256 curve.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_zone (uint8_t zone,
uint16_t slot,
uint8_t block,
uint8_t offset,
const uint8_t * data,
uint8_t len 
)
-
- -

Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.

-
Parameters
- - - - - - - -
[in]zoneDevice zone to write to (0=config, 1=OTP, 2=data).
[in]slotIf writing to the data zone, it is the slot to write to, otherwise it should be 0.
[in]block32-byte block to write to.
[in]offset4-byte word within the specified block to write to. If performing a 32-byte write, this should be 0.
[in]dataData to be written.
[in]lenNumber of bytes to be written. Must be either 4 or 32.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcab_write_zone_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcab_write_zone_ext (ATCADevice device,
uint8_t zone,
uint16_t slot,
uint8_t block,
uint8_t offset,
const uint8_t * data,
uint8_t len 
)
-
- -

Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.

-
Parameters
- - - - - - - - -
[in]deviceDevice context
[in]zoneDevice zone to write to (0=config, 1=OTP, 2=data).
[in]slotIf writing to the data zone, it is the slot to write to, otherwise it should be 0.
[in]block32-byte block to write to.
[in]offset4-byte word within the specified block to write to. If performing a 32-byte write, this should be 0.
[in]dataData to be written.
[in]lenNumber of bytes to be written. Must be either 4 or 32.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ isAlpha()

- -
-
- - - - - - - - -
bool isAlpha (char c)
-
- -

Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is a hex
- -
-
- -

◆ isBase64()

- -
-
- - - - - - - - - - - - - - - - - - -
bool isBase64 (char c,
const uint8_t * rules 
)
-
- -

Returns true if this character is a valid base 64 character or if this is space (A character can be included in a valid base 64 string).

-
Parameters
- - - -
[in]ccharacter to check
[in]rulesbase64 ruleset to use
-
-
-
Returns
True if the character can be included in a valid base 64 string
- -
-
- -

◆ isBase64Digit()

- -
-
- - - - - - - - - - - - - - - - - - -
bool isBase64Digit (char c,
const uint8_t * rules 
)
-
- -

Returns true if this character is a valid base 64 character.

-
Parameters
- - - -
[in]ccharacter to check
[in]rulesbase64 ruleset to use
-
-
-
Returns
True if the character can be included in a valid base 64 string
- -
-
- -

◆ isBlankSpace()

- -
-
- - - - - - - - -
bool isBlankSpace (char c)
-
- -

Checks to see if a character is blank space.

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is blankspace
- -
-
- -

◆ isDigit()

- -
-
- - - - - - - - -
bool isDigit (char c)
-
- -

Checks to see if a character is an ASCII representation of a digit ((c ge '0') and (c le '9'))

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is a digit
- -
-
- -

◆ isHex()

- -
-
- - - - - - - - -
bool isHex (char c)
-
- -

Returns true if this character is a valid hex character or if this is blankspace (The character can be included in a valid hexstring).

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character can be included in a valid hexstring
- -
-
- -

◆ isHexAlpha()

- -
-
- - - - - - - - -
bool isHexAlpha (char c)
-
- -

Checks to see if a character is an ASCII representation of hex ((c >= 'A') and (c <= 'F')) || ((c >= 'a') and (c <= 'f'))

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character is a hex
- -
-
- -

◆ isHexDigit()

- -
-
- - - - - - - - -
bool isHexDigit (char c)
-
- -

Returns true if this character is a valid hex character.

-
Parameters
- - -
[in]ccharacter to check
-
-
-
Returns
True if the character can be included in a valid hexstring
- -
-
- -

◆ packHex()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS packHex (const char * ascii_hex,
size_t ascii_hex_len,
char * packed_hex,
size_t * packed_len 
)
-
- -

Remove spaces from a ASCII hex string.

-
Parameters
- - - - - -
[in]ascii_hexInitial hex string to remove blankspace from
[in]ascii_hex_lenLength of the initial hex string
[in]packed_hexResulting hex string without blankspace
[in,out]packed_lenIn: Size to packed_hex buffer Out: Number of bytes in the packed hex string
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
-
- - - - diff --git a/a01439.js b/a01439.js deleted file mode 100644 index 48fcd4784..000000000 --- a/a01439.js +++ /dev/null @@ -1,174 +0,0 @@ -var a01439 = -[ - [ "atcab_aes", "a01439.html#gad115ce255664a48b80e90ea19c156b79", null ], - [ "atcab_aes_decrypt", "a01439.html#ga9658e84055727e6357cf7ef636b4e398", null ], - [ "atcab_aes_decrypt_ext", "a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b", null ], - [ "atcab_aes_encrypt", "a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1", null ], - [ "atcab_aes_encrypt_ext", "a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba", null ], - [ "atcab_aes_gcm_aad_update", "a01439.html#ga1d6fd831a8125a366504a0ab77b62da8", null ], - [ "atcab_aes_gcm_aad_update_ext", "a01439.html#ga1c6666c7b4d077fb058adc4971da2160", null ], - [ "atcab_aes_gcm_decrypt_finish", "a01439.html#gaa86508958ff3d81f9bd8e79344537218", null ], - [ "atcab_aes_gcm_decrypt_finish_ext", "a01439.html#ga9c5173c7529f898f251814133169ba1d", null ], - [ "atcab_aes_gcm_decrypt_update", "a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738", null ], - [ "atcab_aes_gcm_decrypt_update_ext", "a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2", null ], - [ "atcab_aes_gcm_encrypt_finish", "a01439.html#gada2d38835826587970de3868ca48eaa4", null ], - [ "atcab_aes_gcm_encrypt_finish_ext", "a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123", null ], - [ "atcab_aes_gcm_encrypt_update", "a01439.html#gab3fda8219d17d1b7bc50b1040399a47d", null ], - [ "atcab_aes_gcm_encrypt_update_ext", "a01439.html#gaac8b8555b03b50a118b70cb8387c24ae", null ], - [ "atcab_aes_gcm_init", "a01439.html#ga4805112b62e86b5465e24648504dc374", null ], - [ "atcab_aes_gcm_init_ext", "a01439.html#ga8742a7be77a2350c069c5c380ac4c635", null ], - [ "atcab_aes_gcm_init_rand", "a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6", null ], - [ "atcab_aes_gfm", "a01439.html#ga5554940ed4c7c7e28652ce6923cf9314", null ], - [ "atcab_base64decode", "a01439.html#ga6073c5a05e0ad2e738f460e727014553", null ], - [ "atcab_base64decode_", "a01439.html#ga55ba8a1787f69d44d6e40db041fbd786", null ], - [ "atcab_base64encode", "a01439.html#ga3aa141525a1141f1a290e2a996da0c9c", null ], - [ "atcab_base64encode_", "a01439.html#gaeeff0177acf29e6e7b134a14d7119d69", null ], - [ "atcab_bin2hex", "a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272", null ], - [ "atcab_bin2hex_", "a01439.html#ga40b70cfab865fa4fd9a5e7a29ca59d38", null ], - [ "atcab_challenge", "a01439.html#ga114a721517c95d5ba5fcac5b226669d6", null ], - [ "atcab_challenge_seed_update", "a01439.html#gaadde4309089c569fd87c24a1a2326cd4", null ], - [ "atcab_checkmac", "a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee", null ], - [ "atcab_checkmac_with_response_mac", "a01439.html#gad50eab1ee1abb18515e914a294668907", null ], - [ "atcab_cmp_config_zone", "a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87", null ], - [ "atcab_counter", "a01439.html#gabaaaef242649206029e1c10ac6d1fb7d", null ], - [ "atcab_counter_increment", "a01439.html#ga6e510e056ea16a0a34b405b7ca378f16", null ], - [ "atcab_counter_read", "a01439.html#gaeee666028a097659af69cc828a6bd68b", null ], - [ "atcab_derivekey", "a01439.html#ga34b7b6d46868f0d63d195216ef9939b1", null ], - [ "atcab_derivekey_ext", "a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31", null ], - [ "atcab_ecdh", "a01439.html#ga6fc480ad2824df6309f4f370ffad15f9", null ], - [ "atcab_ecdh_base", "a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c", null ], - [ "atcab_ecdh_enc", "a01439.html#ga51e3ae10f0596d473f646074650904e6", null ], - [ "atcab_ecdh_ioenc", "a01439.html#ga975f7303086190d3b6f76c367583d622", null ], - [ "atcab_ecdh_tempkey", "a01439.html#gac244b83b061ffd8ae3d59b5f973baa53", null ], - [ "atcab_ecdh_tempkey_ioenc", "a01439.html#gafaccb0c9d12154b0c5b917f89f233721", null ], - [ "atcab_gendig", "a01439.html#ga70751ea87f2cf913986bc7bca2cc661f", null ], - [ "atcab_gendivkey", "a01439.html#ga3f7953865c6091f266e727714e6f91dd", null ], - [ "atcab_genkey", "a01439.html#ga617bdbdce7b5736351d93214d44c5b8f", null ], - [ "atcab_genkey_base", "a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903", null ], - [ "atcab_genkey_ext", "a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c", null ], - [ "atcab_get_device", "a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4", null ], - [ "atcab_get_device_address", "a01439.html#ga775bea13de8cc26e61a34ada48358568", null ], - [ "atcab_get_device_type", "a01439.html#ga2b02163fab87313b81dd7f51345d3eb6", null ], - [ "atcab_get_device_type_ext", "a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d", null ], - [ "atcab_get_pubkey", "a01439.html#gad2096a4618dd37c48ed48847fe63d844", null ], - [ "atcab_get_pubkey_ext", "a01439.html#gae2cbb1989eff2c66935040f41a593bf6", null ], - [ "atcab_get_zone_size", "a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412", null ], - [ "atcab_get_zone_size_ext", "a01439.html#gad65cf773e03aed93e2a1437f13511a91", null ], - [ "atcab_hex2bin", "a01439.html#ga481179181349c801c16fc1ab698f2f24", null ], - [ "atcab_hmac", "a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d", null ], - [ "atcab_hw_sha2_256", "a01439.html#ga4bf8b665fe1712626a480742c2daa16b", null ], - [ "atcab_hw_sha2_256_finish", "a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91", null ], - [ "atcab_hw_sha2_256_init", "a01439.html#gade49e7746864105730fa7d531645ff62", null ], - [ "atcab_hw_sha2_256_update", "a01439.html#ga67f2ce6224651d9cc65e9915e35558bd", null ], - [ "atcab_idle", "a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0", null ], - [ "atcab_info", "a01439.html#ga6e19ecd60be4c74665d9ec142e460771", null ], - [ "atcab_info_base", "a01439.html#ga806d07982fda5c30755af6b5b4ef9314", null ], - [ "atcab_info_chip_status", "a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043", null ], - [ "atcab_info_ext", "a01439.html#gacd308bac927905d5c59f526b40c63d76", null ], - [ "atcab_info_get_latch", "a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48", null ], - [ "atcab_info_lock_status", "a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35", null ], - [ "atcab_info_set_latch", "a01439.html#ga2649126606db8a0b64ae8e19d09f6600", null ], - [ "atcab_init", "a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8", null ], - [ "atcab_init_device", "a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4", null ], - [ "atcab_init_ext", "a01439.html#gaa1d392a2b2ae7a51907cb724f0465741", null ], - [ "atcab_is_ca2_device", "a01439.html#ga973437347c3261df0b116fec9ee9c378", null ], - [ "atcab_is_ca_device", "a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f", null ], - [ "atcab_is_config_locked", "a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36", null ], - [ "atcab_is_config_locked_ext", "a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08", null ], - [ "atcab_is_data_locked", "a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d", null ], - [ "atcab_is_data_locked_ext", "a01439.html#ga7e3189411975d835c0115511556302d8", null ], - [ "atcab_is_locked", "a01439.html#gaefce484222bdbedef37787a9b10d4426", null ], - [ "atcab_is_private_ext", "a01439.html#gac5f4cc263fd729871446e01cb063f141", null ], - [ "atcab_is_slot_locked", "a01439.html#ga802de50265ff91dc30dd7c93d9e026e1", null ], - [ "atcab_is_slot_locked_ext", "a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17", null ], - [ "atcab_is_ta_device", "a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3", null ], - [ "atcab_kdf", "a01439.html#ga40a6c01492a76366f9402302b527c4e1", null ], - [ "atcab_lock", "a01439.html#ga25d2895192d93c524f5dba92a492cdfb", null ], - [ "atcab_lock_config_zone", "a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23", null ], - [ "atcab_lock_config_zone_crc", "a01439.html#ga0698e0c55ad700fe57498321e842cb38", null ], - [ "atcab_lock_config_zone_ext", "a01439.html#gaf5059df8d40a5f9f0f5e2004039de424", null ], - [ "atcab_lock_data_slot", "a01439.html#ga958190a9182d1b54f82fbca8216406ea", null ], - [ "atcab_lock_data_slot_ext", "a01439.html#ga0d91be168c4b3714cc0177632627bfc3", null ], - [ "atcab_lock_data_zone", "a01439.html#ga8020aa89a5bed09ad35320b78e0fb890", null ], - [ "atcab_lock_data_zone_crc", "a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6", null ], - [ "atcab_lock_data_zone_ext", "a01439.html#ga8105d79d3dd914cf643121ff243b00a3", null ], - [ "atcab_mac", "a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791", null ], - [ "atcab_memset_s", "a01439.html#gac37b319dabc5b9492a422f6d3d4e118b", null ], - [ "atcab_nonce", "a01439.html#ga2293df1c1c794496790bae25d3844fa5", null ], - [ "atcab_nonce_base", "a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6", null ], - [ "atcab_nonce_load", "a01439.html#ga2239ae3a87c341a48aa108bd82a58552", null ], - [ "atcab_nonce_rand", "a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c", null ], - [ "atcab_nonce_rand_ext", "a01439.html#ga89942894a5a8f82391d74346603aa837", null ], - [ "atcab_pointer_delta", "a01439.html#ga72f385a8eafc464a05acfa54561fed63", null ], - [ "atcab_priv_write", "a01439.html#gaead7151af044da249b398dc457fc8e06", null ], - [ "atcab_random", "a01439.html#ga4fa442396dfbb89e59dfca837b565cec", null ], - [ "atcab_random_ext", "a01439.html#ga103f4596f0f9590971763592c5233ec3", null ], - [ "atcab_read_bytes_zone", "a01439.html#ga750704332198726725a327344f4f7dd5", null ], - [ "atcab_read_config_zone", "a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3", null ], - [ "atcab_read_config_zone_ext", "a01439.html#ga9ee98f13a88710e5234266b4b456b1dc", null ], - [ "atcab_read_enc", "a01439.html#ga0cf0048247bb577c85142510225ea960", null ], - [ "atcab_read_pubkey", "a01439.html#ga782ca1e5b1574b2b6793c841be22b28b", null ], - [ "atcab_read_pubkey_ext", "a01439.html#ga2ea51a5aafd900c9bdffeffe82274255", null ], - [ "atcab_read_serial_number", "a01439.html#ga96c434878e1f435e2cda5b0b5fec444f", null ], - [ "atcab_read_serial_number_ext", "a01439.html#ga8a741e461c20d2a72493bc6178826eb1", null ], - [ "atcab_read_sig", "a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7", null ], - [ "atcab_read_zone", "a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb", null ], - [ "atcab_read_zone_ext", "a01439.html#ga245f181cbf1ba418e60d060503945c33", null ], - [ "atcab_release", "a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4", null ], - [ "atcab_release_ext", "a01439.html#ga147803646532319e585a0fe7a6c028ef", null ], - [ "atcab_reversal", "a01439.html#ga7371f490659b6fd68739d2b1fee50696", null ], - [ "atcab_secureboot", "a01439.html#ga9506331ea7d454fe3c9b2585128c77aa", null ], - [ "atcab_secureboot_mac", "a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534", null ], - [ "atcab_selftest", "a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7", null ], - [ "atcab_sha", "a01439.html#ga31d269ccdafd08519a899a8aebf53df1", null ], - [ "atcab_sha_base", "a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4", null ], - [ "atcab_sha_end", "a01439.html#ga1db86704035048066a370815b657234d", null ], - [ "atcab_sha_hmac", "a01439.html#gae655ce06583c08169170102fbb0b55c9", null ], - [ "atcab_sha_hmac_ext", "a01439.html#gaede6ae09e6192e452ad261f4e15e1c62", null ], - [ "atcab_sha_hmac_finish", "a01439.html#gaa4be9972396b7cadb08dd8e2199daf08", null ], - [ "atcab_sha_hmac_init", "a01439.html#ga310a017cddce9ef05071cb619b4b6db9", null ], - [ "atcab_sha_hmac_update", "a01439.html#gae3343c160e80365b7e96bdfdc9b6365c", null ], - [ "atcab_sha_read_context", "a01439.html#ga74d1db50562642ce511fa7cbd384c2ab", null ], - [ "atcab_sha_start", "a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a", null ], - [ "atcab_sha_update", "a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949", null ], - [ "atcab_sha_write_context", "a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120", null ], - [ "atcab_sign", "a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8", null ], - [ "atcab_sign_base", "a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268", null ], - [ "atcab_sign_ext", "a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc", null ], - [ "atcab_sign_internal", "a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29", null ], - [ "atcab_sleep", "a01439.html#ga9475e032c388144c5a0df45d1df182a5", null ], - [ "atcab_updateextra", "a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d", null ], - [ "atcab_verify", "a01439.html#ga694d921c7bc17a0e158ef96e3d476700", null ], - [ "atcab_verify_extern", "a01439.html#ga2c3e18de900ba705192963d08b37f600", null ], - [ "atcab_verify_extern_ext", "a01439.html#ga3a4e2ffada9173db1a775a697bbebf18", null ], - [ "atcab_verify_extern_mac", "a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6", null ], - [ "atcab_verify_invalidate", "a01439.html#ga9393b545b2fa1fdd539672a0428a30ab", null ], - [ "atcab_verify_stored", "a01439.html#gae8cc7670847805423ad591985eecd832", null ], - [ "atcab_verify_stored_ext", "a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff", null ], - [ "atcab_verify_stored_mac", "a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7", null ], - [ "atcab_verify_stored_with_tempkey", "a01439.html#ga582dc8686f0491ad4292287f6971543c", null ], - [ "atcab_verify_validate", "a01439.html#gacf9a0c7772ebb65b87c4a4788850702b", null ], - [ "atcab_version", "a01439.html#gaff701132013eaac5600dd9fd6253505d", null ], - [ "atcab_wakeup", "a01439.html#gad3bc620aedd9322d160eece0d8d20c82", null ], - [ "atcab_write", "a01439.html#gabf2b29b4d3ae926b63c403d084380dbe", null ], - [ "atcab_write_bytes_zone", "a01439.html#gac395a7e195aa3cf28b48de345755feb0", null ], - [ "atcab_write_config_counter", "a01439.html#gab25ca44957dff1c2df34607738ca3bf7", null ], - [ "atcab_write_config_zone", "a01439.html#ga0777a86aa412a97b19cc72a12c171b94", null ], - [ "atcab_write_config_zone_ext", "a01439.html#ga92d651c637007f8c3672c3313767c0e7", null ], - [ "atcab_write_enc", "a01439.html#ga78a5394997ea31b125cd57d07aa73636", null ], - [ "atcab_write_pubkey", "a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa", null ], - [ "atcab_write_pubkey_ext", "a01439.html#gaa80d6c193374d363649236778289f2ea", null ], - [ "atcab_write_zone", "a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2", null ], - [ "atcab_write_zone_ext", "a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1", null ], - [ "isAlpha", "a01439.html#ga592c23e94097ad5e212beb6390aa88c6", null ], - [ "isBase64", "a01439.html#gac873a37c53fdd922d5b36efd737e3ec3", null ], - [ "isBase64Digit", "a01439.html#gad10d15454308230fbef54bdd43001ed2", null ], - [ "isBlankSpace", "a01439.html#ga04fefe2ff5a7d2e937b2634acd22982a", null ], - [ "isDigit", "a01439.html#ga7a929bf65cbc777bab7e533a2755cfad", null ], - [ "isHex", "a01439.html#gab7ca9ee391118aafe6f3cf7df4fa5de3", null ], - [ "isHexAlpha", "a01439.html#ga78abefc293c0a04d8ef649c94c8a1057", null ], - [ "isHexDigit", "a01439.html#ga39003da4dc8a0b8999f1325c2f96f641", null ], - [ "lib_tolower", "a01439.html#gada3308b30b1b1e40abb806dbc5476648", null ], - [ "lib_toupper", "a01439.html#ga13a4675d782c861977b653e3c2b354ba", null ], - [ "packHex", "a01439.html#gad017ae33af5a7ea062cea7d54de675a8", null ] -]; \ No newline at end of file diff --git a/a01440.html b/a01440.html deleted file mode 100644 index 761eabf2b..000000000 --- a/a01440.html +++ /dev/null @@ -1,116 +0,0 @@ - - - - - - - -CryptoAuthLib: Configuration (cfg_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Configuration (cfg_)
-
-
- -

Logical device configurations describe the CryptoAuth device type and logical interface. -

-

Logical device configurations describe the CryptoAuth device type and logical interface.

-
-
- - - - diff --git a/a01441.html b/a01441.html deleted file mode 100644 index 2a9c64b3f..000000000 --- a/a01441.html +++ /dev/null @@ -1,375 +0,0 @@ - - - - - - - -CryptoAuthLib: ATCADevice (atca_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
ATCADevice (atca_)
-
-
- -

ATCADevice object - composite of command and interface objects. -More...

- - - - - -

-Data Structures

struct  atca_device
 atca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods More...
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define ATSHA204A   (0U)
 The supported Device type in Cryptoauthlib library.
 
-#define ATECC108A   (1U)
 
-#define ATECC508A   (2U)
 
-#define ATECC608A   (3U)
 
-#define ATECC608B   (3U)
 
-#define ATECC608   (3U)
 
-#define ATSHA206A   (4U)
 
-#define TA100   (0x10U)
 
-#define TA101   (0x11U)
 
-#define ECC204   (0x20U)
 
-#define TA010   (0x21U)
 
-#define ECC206   (0x22U)
 
-#define RNG90   (0x23U)
 
-#define SHA104   (0x24U)
 
-#define SHA105   (0x25U)
 
-#define SHA106   (0x26U)
 
-#define ATCA_DEV_UNKNOWN   (0x7EU)
 
-#define ATCA_DEV_INVALID   (0x7FU)
 
- - - - - - - - -

-Typedefs

-typedef void(* ctx_cb) (void *ctx)
 Callback function to clean up the session context.
 
-typedef struct atca_deviceATCADevice
 
-typedef uint8_t ATCADeviceType
 
- - - - -

-Enumerations

enum  ATCADeviceState { ATCA_DEVICE_STATE_UNKNOWN = 0 -, ATCA_DEVICE_STATE_SLEEP -, ATCA_DEVICE_STATE_IDLE -, ATCA_DEVICE_STATE_ACTIVE - }
 ATCADeviceState says about device state.
 
- - - - - - - - - - - - - - - - -

-Functions

ATCADevice newATCADevice (ATCAIfaceCfg *cfg)
 constructor for a Microchip CryptoAuth device
 
void deleteATCADevice (ATCADevice *ca_dev)
 destructor for a device NULLs reference after object is freed
 
ATCA_STATUS initATCADevice (ATCAIfaceCfg *cfg, ATCADevice ca_dev)
 Initializer for an Microchip CryptoAuth device.
 
ATCAIface atGetIFace (ATCADevice dev)
 returns a reference to the ATCAIface interface object for the device
 
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
 Release any resources associated with the device.
 
-

Detailed Description

-

ATCADevice object - composite of command and interface objects.

-

Function Documentation

- -

◆ atGetIFace()

- -
-
- - - - - - - - -
ATCAIface atGetIFace (ATCADevice dev)
-
- -

returns a reference to the ATCAIface interface object for the device

-
Parameters
- - -
[in]devreference to a device
-
-
-
Returns
reference to the ATCAIface object for the device
- -
-
- -

◆ deleteATCADevice()

- -
-
- - - - - - - - -
void deleteATCADevice (ATCADeviceca_dev)
-
- -

destructor for a device NULLs reference after object is freed

-
Parameters
- - -
[in]ca_devpointer to a reference to a device
-
-
- -
-
- -

◆ initATCADevice()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS initATCADevice (ATCAIfaceCfgcfg,
ATCADevice ca_dev 
)
-
- -

Initializer for an Microchip CryptoAuth device.

-
Parameters
- - - -
[in]cfgpointer to an interface configuration object
[in,out]ca_devAs input, pre-allocated structure to be initialized. mCommands and mIface members should point to existing structures to be initialized.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ newATCADevice()

- -
-
- - - - - - - - -
ATCADevice newATCADevice (ATCAIfaceCfgcfg)
-
- -

constructor for a Microchip CryptoAuth device

-
Parameters
- - -
[in]cfgInterface configuration object
-
-
-
Returns
Reference to a new ATCADevice on success. NULL on failure.
- -
-
- -

◆ releaseATCADevice()

- -
-
- - - - - - - - -
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
-
- -

Release any resources associated with the device.

-
Parameters
- - -
[in]ca_devDevice to release
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
-
- - - - diff --git a/a01441.js b/a01441.js deleted file mode 100644 index e1e358fcc..000000000 --- a/a01441.js +++ /dev/null @@ -1,15 +0,0 @@ -var a01441 = -[ - [ "atca_device", "a01508.html", [ - [ "device_state", "a01508.html#a6ce22e245944629826d4869f69babf81", null ], - [ "mIface", "a01508.html#a725646466f0ea8e0982251189c15724a", null ] - ] ], - [ "ATSHA204A", "a01441.html#ga054acfe7d4dd4064f9d27a9ea7fc2337", null ], - [ "ctx_cb", "a01441.html#gada27ffa70c78964d3b38abd11c5f4f22", null ], - [ "ATCADeviceState", "a01441.html#ga765308123cf522f5ec8b528bf4ea1243", null ], - [ "atGetIFace", "a01441.html#ga3f98e29cffa06446fc91b329703606af", null ], - [ "deleteATCADevice", "a01441.html#gac087cf04cd5bd6ff2e026d89bfbf5e12", null ], - [ "initATCADevice", "a01441.html#ga8eec7f2190d1f9bda6684f5d2177db15", null ], - [ "newATCADevice", "a01441.html#gad5e12e12d3030e28d75164286df9e5e9", null ], - [ "releaseATCADevice", "a01441.html#gab729e6c838c0a247d4f226fb92492d96", null ] -]; \ No newline at end of file diff --git a/a01442.html b/a01442.html deleted file mode 100644 index 5c20066bb..000000000 --- a/a01442.html +++ /dev/null @@ -1,816 +0,0 @@ - - - - - - - -CryptoAuthLib: ATCAIface (atca_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
ATCAIface (atca_)
-
-
- -

Abstract interface to all CryptoAuth device types. This interface connects to the HAL implementation and abstracts the physical details of the device communication from all the upper layers of CryptoAuthLib. -More...

- - - - - - - - - - - - -

-Data Structures

struct  devtype_names_t
 
struct  ATCAIfaceCfg
 
struct  ATCAHAL_t
 HAL Driver Structure. More...
 
struct  atca_iface
 atca_iface is the context structure for a configured interface More...
 
- - - - - - - - - -

-Macros

-#define ATCA_IFACECFG_NAME(x)   (x)
 
-#define ATCA_IFACECFG_I2C_ADDRESS(c)   (c)->cfg.atcai2c.address
 
-#define ATCA_IFACECFG_I2C_BAUD(c)   (c)->cfg.atcai2c.baud
 
-#define ATCA_IFACECFG_VALUE(c, v)   (c)->cfg.v
 
- - - - - - -

-Typedefs

-typedef struct atca_ifaceATCAIface
 
-typedef struct atca_iface atca_iface_t
 atca_iface is the context structure for a configured interface
 
- - - - - -

-Enumerations

enum  ATCAIfaceType {
-  ATCA_I2C_IFACE = 0 -, ATCA_SWI_IFACE = 1 -, ATCA_UART_IFACE = 2 -, ATCA_SPI_IFACE = 3 -,
-  ATCA_HID_IFACE = 4 -, ATCA_KIT_IFACE = 5 -, ATCA_CUSTOM_IFACE = 6 -, ATCA_I2C_GPIO_IFACE = 7 -,
-  ATCA_SWI_GPIO_IFACE = 8 -, ATCA_SPI_GPIO_IFACE = 9 -, ATCA_UNKNOWN_IFACE = 0xFE -
- }
 
enum  ATCAKitType {
-  ATCA_KIT_AUTO_IFACE -, ATCA_KIT_I2C_IFACE -, ATCA_KIT_SWI_IFACE -, ATCA_KIT_SPI_IFACE -,
-  ATCA_KIT_UNKNOWN_IFACE -
- }
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS initATCAIface (ATCAIfaceCfg *cfg, ATCAIface ca_iface)
 Initializer for ATCAIface objects.
 
ATCA_STATUS atinit (ATCAIface ca_iface)
 Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.
 
ATCA_STATUS atsend (ATCAIface ca_iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Sends the data to the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atreceive (ATCAIface ca_iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receives data from the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atcontrol (ATCAIface ca_iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations with the underlying hal driver.
 
ATCA_STATUS atwake (ATCAIface ca_iface)
 Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.
 
ATCA_STATUS atidle (ATCAIface ca_iface)
 Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.
 
ATCA_STATUS atsleep (ATCAIface ca_iface)
 Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.
 
ATCAIfaceCfgatgetifacecfg (ATCAIface ca_iface)
 Returns the logical interface configuration for the device.
 
void * atgetifacehaldat (ATCAIface ca_iface)
 Returns the HAL data pointer for the device.
 
bool ifacetype_is_kit (ATCAIfaceType iface_type)
 Check if the given interface is a "kit protocol" one.
 
bool atca_iface_is_kit (ATCAIface ca_iface)
 Check if the given interface is configured as a "kit protocol" one where transactions are atomic.
 
bool atca_iface_is_swi (ATCAIface ca_iface)
 Check if the given interface is configured as a SWI.
 
-int atca_iface_get_retries (ATCAIface ca_iface)
 Retrive the number of retries for a configured interface.
 
-uint16_t atca_iface_get_wake_delay (ATCAIface ca_iface)
 Retrive the wake/retry delay for a configured interface/device.
 
-uint8_t ifacecfg_get_address (ATCAIfaceCfg *cfg)
 Retrieves the device address given an interface configuration.
 
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfg *cfg, uint8_t address, ATCAKitType kitiface)
 Change the address of the selected device.
 
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
 Instruct the HAL driver to release any resources associated with this interface.
 
void deleteATCAIface (ATCAIface *ca_iface)
 Instruct the HAL driver to release any resources associated with this interface, then delete the object.
 
-ATCADeviceType iface_get_device_type_by_name (const char *name)
 Get the ATCADeviceType for a string that looks like a part number.
 
-

Detailed Description

-

Abstract interface to all CryptoAuth device types. This interface connects to the HAL implementation and abstracts the physical details of the device communication from all the upper layers of CryptoAuthLib.

-

Enumeration Type Documentation

- -

◆ ATCAIfaceType

- -
-
- - - - -
enum ATCAIfaceType
-
- - - - - - - - - - - -
Enumerator
ATCA_I2C_IFACE 

Native I2C Driver

-
ATCA_SWI_IFACE 

SWI or 1-Wire over UART/USART

-
ATCA_UART_IFACE 

Kit v1 over UART/USART

-
ATCA_SPI_IFACE 

Native SPI Driver

-
ATCA_HID_IFACE 

Kit v1 over HID

-
ATCA_KIT_IFACE 

Kit v2 (Binary/Bridging)

-
ATCA_CUSTOM_IFACE 

Custom HAL functions provided during interface init

-
ATCA_I2C_GPIO_IFACE 

I2C "Bitbang" Driver

-
ATCA_SWI_GPIO_IFACE 

SWI or 1-Wire using a GPIO

-
ATCA_SPI_GPIO_IFACE 

SWI or 1-Wire using a GPIO

-
- -
-
-

Function Documentation

- -

◆ atca_iface_is_kit()

- -
-
- - - - - - - - -
bool atca_iface_is_kit (ATCAIface ca_iface)
-
- -

Check if the given interface is configured as a "kit protocol" one where transactions are atomic.

-
Returns
true if the interface is considered a kit
- -
-
- -

◆ atca_iface_is_swi()

- -
-
- - - - - - - - -
bool atca_iface_is_swi (ATCAIface ca_iface)
-
- -

Check if the given interface is configured as a SWI.

-
Returns
true if the interface is considered a kit
- -
-
- -

◆ atcontrol()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcontrol (ATCAIface ca_iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations with the underlying hal driver.

-
Parameters
- - - - - -
[in]ca_ifaceDevice to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atgetifacecfg()

- -
-
- - - - - - - - -
ATCAIfaceCfg * atgetifacecfg (ATCAIface ca_iface)
-
- -

Returns the logical interface configuration for the device.

-
Parameters
- - -
[in]ca_ifaceDevice interface.
-
-
-
Returns
Logical interface configuration.
- -
-
- -

◆ atgetifacehaldat()

- -
-
- - - - - - - - -
void * atgetifacehaldat (ATCAIface ca_iface)
-
- -

Returns the HAL data pointer for the device.

-
Parameters
- - -
[in]ca_ifaceDevice interface.
-
-
-
Returns
HAL data pointer.
- -
-
- -

◆ atidle()

- -
-
- - - - - - - - -
ATCA_STATUS atidle (ATCAIface ca_iface)
-
- -

Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.

-
Deprecated:
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
-
Parameters
- - -
[in]ca_ifaceDevice to interact with.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atinit()

- -
-
- - - - - - - - -
ATCA_STATUS atinit (ATCAIface ca_iface)
-
- -

Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.

-
Parameters
- - -
[in]ca_ifaceDevice to interact with.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atreceive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atreceive (ATCAIface ca_iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

Receives data from the device by calling intermediate HAL wrapper function.

-
Parameters
- - - - - -
[in]ca_ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atsend()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atsend (ATCAIface ca_iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

Sends the data to the device by calling intermediate HAL wrapper function.

-
Parameters
- - - - - -
[in]ca_ifaceDevice to interact with.
[in]word_addressdevice transaction type
[in]txdataData to be transmitted to the device.
[in]txlengthNumber of bytes to be transmitted to the device.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atsleep()

- -
-
- - - - - - - - -
ATCA_STATUS atsleep (ATCAIface ca_iface)
-
- -

Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.

-
Deprecated:
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
-
Parameters
- - -
[in]ca_ifaceDevice to interact with.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atwake()

- -
-
- - - - - - - - -
ATCA_STATUS atwake (ATCAIface ca_iface)
-
- -

Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.

-
Deprecated:
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
-
Parameters
- - -
[in]ca_ifaceDevice to interact with.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ deleteATCAIface()

- -
-
- - - - - - - - -
void deleteATCAIface (ATCAIfaceca_iface)
-
- -

Instruct the HAL driver to release any resources associated with this interface, then delete the object.

-
Parameters
- - -
[in]ca_ifaceDevice interface.
-
-
- -
-
- -

◆ ifacecfg_set_address()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfgcfg,
uint8_t address,
ATCAKitType kitiface 
)
-
- -

Change the address of the selected device.

-
Parameters
- - - - -
[in]cfgInterface configuration structure to update
[in]addressDesired address
[in]kitifaceOptional parameter to set the kit iface type
-
-
- -
-
- -

◆ ifacetype_is_kit()

- -
-
- - - - - - - - -
bool ifacetype_is_kit (ATCAIfaceType iface_type)
-
- -

Check if the given interface is a "kit protocol" one.

-
Returns
true if the interface type is considered a kit
- -
-
- -

◆ initATCAIface()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS initATCAIface (ATCAIfaceCfgcfg,
ATCAIface ca_iface 
)
-
- -

Initializer for ATCAIface objects.

-
Parameters
- - - -
[in]cfgLogical configuration for the interface
[in]ca_ifaceInterface structure to initialize.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ releaseATCAIface()

- -
-
- - - - - - - - -
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
-
- -

Instruct the HAL driver to release any resources associated with this interface.

-
Parameters
- - -
[in]ca_ifaceDevice interface.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
-
-
- - - - diff --git a/a01442.js b/a01442.js deleted file mode 100644 index cb134ce84..000000000 --- a/a01442.js +++ /dev/null @@ -1,47 +0,0 @@ -var a01442 = -[ - [ "devtype_names_t", "a01512.html", null ], - [ "ATCAIfaceCfg", "a01516.html", [ - [ "address", "a01516.html#a553439e2acc31fe3587a4c883e134b66", null ] - ] ], - [ "ATCAHAL_t", "a01580.html", null ], - [ "atca_iface", "a01584.html", [ - [ "hal", "a01584.html#a7cee716c7c8c20d0d8aac6243baff819", null ], - [ "hal_data", "a01584.html#ab316c2d139b46380bc97be4d23428caa", null ], - [ "mIfaceCFG", "a01584.html#a093b94b5d693f4e7a8facfc40f1443b0", null ], - [ "phy", "a01584.html#a3ac7e576da4958d6c0488ec606d9cbff", null ] - ] ], - [ "atca_iface_t", "a01442.html#gaa9323be08c4d757019e9863d9a7fb6b1", null ], - [ "ATCAIfaceType", "a01442.html#gac7f674d4a0afb12d2f3c9c5e98cb1089", [ - [ "ATCA_I2C_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb", null ], - [ "ATCA_SWI_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26", null ], - [ "ATCA_UART_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d", null ], - [ "ATCA_SPI_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7", null ], - [ "ATCA_HID_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1", null ], - [ "ATCA_KIT_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9", null ], - [ "ATCA_CUSTOM_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d", null ], - [ "ATCA_I2C_GPIO_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e", null ], - [ "ATCA_SWI_GPIO_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2", null ], - [ "ATCA_SPI_GPIO_IFACE", "a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb", null ] - ] ], - [ "atca_iface_get_retries", "a01442.html#ga349718dea5d5b558766a31b7dcd7e811", null ], - [ "atca_iface_get_wake_delay", "a01442.html#ga128f54833b5ed2105dae417333e1d651", null ], - [ "atca_iface_is_kit", "a01442.html#gacb09a6fa845efade7d47796bead14d2c", null ], - [ "atca_iface_is_swi", "a01442.html#gad2276d5ebd02613fbeda8ae15b679d1e", null ], - [ "atcontrol", "a01442.html#ga324cef45a35e02b387001afdc9092778", null ], - [ "atgetifacecfg", "a01442.html#gac88ba81abfd42df65c6c0c64414dfc6e", null ], - [ "atgetifacehaldat", "a01442.html#ga5e4163b8882d4eb42d4d5191c8731da0", null ], - [ "atidle", "a01442.html#gac794fffe040e6d47a34c756720f3cbea", null ], - [ "atinit", "a01442.html#ga386353e8700eec35e4548dfa29f13b8d", null ], - [ "atreceive", "a01442.html#ga01badea388343bdf5929c5c2be9f426b", null ], - [ "atsend", "a01442.html#gabd4f20b06efedede6bc4a836cfad8f38", null ], - [ "atsleep", "a01442.html#gac06336335e5f3191e3b1fc06d2830d96", null ], - [ "atwake", "a01442.html#ga32693c852341e1b946bab3cca5f71761", null ], - [ "deleteATCAIface", "a01442.html#gaf8074d759241d3edd6d8ead1d7322a98", null ], - [ "iface_get_device_type_by_name", "a01442.html#ga8e50f9bf69be0910880411e9a0d5bc24", null ], - [ "ifacecfg_get_address", "a01442.html#ga9efe98ee7fe9be95593c7177800efd8d", null ], - [ "ifacecfg_set_address", "a01442.html#ga4e975805352164dc3a8ff553b42c509f", null ], - [ "ifacetype_is_kit", "a01442.html#gaaff5268b9acbf16db03b425e6c54f97c", null ], - [ "initATCAIface", "a01442.html#ga3a31087729a7a2e9a624572f234809fc", null ], - [ "releaseATCAIface", "a01442.html#gab9ee16357a8e397a72eda7e9c8553fb3", null ] -]; \ No newline at end of file diff --git a/a01443.html b/a01443.html deleted file mode 100644 index f07522e82..000000000 --- a/a01443.html +++ /dev/null @@ -1,3035 +0,0 @@ - - - - - - - -CryptoAuthLib: Certificate manipulation methods (atcacert_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Certificate manipulation methods (atcacert_)
-
-
- -

These methods provide convenient ways to perform certification I/O with CryptoAuth chips and perform certificate manipulation in memory. -More...

- - - - - - - - - - - - - - -

-Data Structures

struct  atcacert_tm_utc_s
 
struct  atcacert_device_loc_s
 
struct  atcacert_cert_loc_s
 
struct  atcacert_cert_element_s
 
struct  atcacert_def_s
 
struct  atcacert_build_state_s
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define FALSE   (0)
 
-#define TRUE   (1)
 
#define ATCACERT_E_SUCCESS   ATCA_SUCCESS
 
#define ATCACERT_E_ERROR   ATCA_GEN_FAIL
 
#define ATCACERT_E_BAD_PARAMS   ATCA_BAD_PARAM
 
#define ATCACERT_E_BUFFER_TOO_SMALL   ATCA_SMALL_BUFFER
 
#define ATCACERT_E_UNIMPLEMENTED   ATCA_UNIMPLEMENTED
 
#define ATCACERT_E_DECODING_ERROR   4
 
#define ATCACERT_E_INVALID_DATE   5
 
#define ATCACERT_E_UNEXPECTED_ELEM_SIZE   7
 
#define ATCACERT_E_ELEM_MISSING   8
 
#define ATCACERT_E_ELEM_OUT_OF_BOUNDS   9
 
#define ATCACERT_E_BAD_CERT   10
 
-#define ATCACERT_E_WRONG_CERT_DEF   11
 
#define ATCACERT_E_VERIFY_FAILED   12
 
#define ATCACERT_E_INVALID_TRANSFORM   13
 
#define DATEFMT_ISO8601_SEP   (0U)
 ISO8601 full date YYYY-MM-DDThh:mm:ssZ.
 
-#define DATEFMT_RFC5280_UTC   (1U)
 RFC 5280 (X.509) 4.1.2.5.1 UTCTime format YYMMDDhhmmssZ.
 
-#define DATEFMT_POSIX_UINT32_BE   (2U)
 POSIX (aka UNIX) date format. Seconds since Jan 1, 1970. 32 bit unsigned integer, big endian.
 
-#define DATEFMT_POSIX_UINT32_LE   (3U)
 POSIX (aka UNIX) date format. Seconds since Jan 1, 1970. 32 bit unsigned integer, little endian.
 
-#define DATEFMT_RFC5280_GEN   (4U)
 RFC 5280 (X.509) 4.1.2.5.2 GeneralizedTime format YYYYMMDDhhmmssZ.
 
-#define DATEFMT_INVALID   (0xFFU)
 
-#define DATEFMT_ISO8601_SEP_SIZE   (20)
 
-#define DATEFMT_RFC5280_UTC_SIZE   (13)
 
-#define DATEFMT_POSIX_UINT32_BE_SIZE   (4)
 
-#define DATEFMT_POSIX_UINT32_LE_SIZE   (4)
 
-#define DATEFMT_RFC5280_GEN_SIZE   (15)
 
-#define DATEFMT_MAX_SIZE   DATEFMT_ISO8601_SEP_SIZE
 
-#define ATCACERT_DATE_FORMAT_SIZES_COUNT   5
 
-#define ATCACERT_COMP_CERT_MAX_SIZE   72u
 
-#define atcacert_date_enc_posix_uint32_be   atcacert_date_enc_posix_be
 
-#define atcacert_date_dec_posix_uint32_be   atcacert_date_dec_posix_be
 
-#define atcacert_date_enc_posix_uint32_le   atcacert_date_enc_posix_le
 
-#define atcacert_date_dec_posix_uint32_le   atcacert_date_dec_posix_le
 
- - - - - - - - - - - - - - - - - - - - - - - - - - -

-Typedefs

typedef struct atcacert_tm_utc_s atcacert_tm_utc_t
 
-typedef uint8_t atcacert_date_format_t
 
typedef enum atcacert_cert_type_e atcacert_cert_type_t
 
typedef enum atcacert_cert_sn_src_e atcacert_cert_sn_src_t
 
typedef enum atcacert_device_zone_e atcacert_device_zone_t
 
-typedef enum atcacert_transform_e atcacert_transform_t
 How to transform the data from the device to the certificate.
 
typedef enum atcacert_std_cert_element_e atcacert_std_cert_element_t
 
typedef struct ATCA_PACKED atcacert_device_loc_s atcacert_device_loc_t
 
typedef struct ATCA_PACKED atcacert_cert_loc_s atcacert_cert_loc_t
 
typedef struct ATCA_PACKED atcacert_cert_element_s atcacert_cert_element_t
 
typedef struct atcacert_def_s atcacert_def_t
 
typedef struct atcacert_build_state_s atcacert_build_state_t
 
- - - - - - - - - - - - -

-Enumerations

enum  atcacert_cert_type_e { CERTTYPE_X509 -, CERTTYPE_CUSTOM -, CERTTYPE_X509_FULL_STORED - }
 
enum  atcacert_cert_sn_src_e {
-  SNSRC_STORED = 0x0 -, SNSRC_STORED_DYNAMIC = 0x7 -, SNSRC_DEVICE_SN = 0x8 -, SNSRC_SIGNER_ID = 0x9 -,
-  SNSRC_PUB_KEY_HASH = 0xA -, SNSRC_DEVICE_SN_HASH = 0xB -, SNSRC_PUB_KEY_HASH_POS = 0xC -, SNSRC_DEVICE_SN_HASH_POS = 0xD -,
-  SNSRC_PUB_KEY_HASH_RAW = 0xE -, SNSRC_DEVICE_SN_HASH_RAW = 0xF -
- }
 
enum  atcacert_device_zone_e {
-  DEVZONE_CONFIG = 0x00 -, DEVZONE_OTP = 0x01 -, DEVZONE_DATA = 0x02 -, DEVZONE_GENKEY = 0x03 -,
-  DEVZONE_NONE = 0x07 -
- }
 
enum  atcacert_transform_e {
-  TF_NONE -, TF_REVERSE -, TF_BIN2HEX_UC -, TF_BIN2HEX_LC -,
-  TF_HEX2BIN_UC -, TF_HEX2BIN_LC -, TF_BIN2HEX_SPACE_UC -, TF_BIN2HEX_SPACE_LC -,
-  TF_HEX2BIN_SPACE_UC -, TF_HEX2BIN_SPACE_LC -
- }
 How to transform the data from the device to the certificate. More...
 
enum  atcacert_std_cert_element_e {
-  STDCERT_PUBLIC_KEY -, STDCERT_SIGNATURE -, STDCERT_ISSUE_DATE -, STDCERT_EXPIRE_DATE -,
-  STDCERT_SIGNER_ID -, STDCERT_CERT_SN -, STDCERT_AUTH_KEY_ID -, STDCERT_SUBJ_KEY_ID -,
-  STDCERT_NUM_ELEMENTS -
- }
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS atcacert_read_device_loc (const atcacert_device_loc_t *device_loc, uint8_t *data)
 Read the data from a device location.
 
ATCA_STATUS atcacert_read_device_loc_ext (ATCADevice device, const atcacert_device_loc_t *device_loc, uint8_t *data)
 Read the data from a device location.
 
ATCA_STATUS atcacert_read_cert (const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_read_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size)
 Reads the certificate specified by the certificate definition from the ATECC508A device.
 
ATCA_STATUS atcacert_write_cert (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 Take a full certificate and write it to the ATECC508A device according to the certificate definition.
 
ATCA_STATUS atcacert_write_cert_ext (ATCADevice device, const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size)
 Take a full certificate and write it to the ATECC508A device according to the certificate definition.
 
ATCA_STATUS atcacert_create_csr (const atcacert_def_t *csr_def, uint8_t *csr, size_t *csr_size)
 Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.
 
ATCA_STATUS atcacert_create_csr_pem (const atcacert_def_t *csr_def, char *csr, size_t *csr_size)
 Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.
 
ATCA_STATUS atcacert_get_response (uint8_t device_private_key_slot, const uint8_t challenge[32], uint8_t response[64])
 Calculates the response to a challenge sent from the host.
 
ATCA_STATUS atcacert_read_subj_key_id (const atcacert_def_t *cert_def, uint8_t subj_key_id[20])
 Reads the subject key ID based on a certificate definition.
 
ATCA_STATUS atcacert_read_subj_key_id_ext (ATCADevice device, const atcacert_def_t *cert_def, uint8_t subj_key_id[20])
 Reads the subject key ID based on a certificate definition.
 
ATCA_STATUS atcacert_read_cert_size (const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 
ATCA_STATUS atcacert_read_cert_size_ext (ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size)
 Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.
 
ATCA_STATUS atcacert_date_enc (atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size)
 Format a timestamp according to the format type.
 
ATCA_STATUS atcacert_date_dec (atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp)
 Parse a formatted timestamp according to the specified format.
 
ATCA_STATUS atcacert_date_enc_compcert (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_enc_compcert_ext (const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u])
 Encode the issue and expire dates in the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert (const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
ATCA_STATUS atcacert_date_dec_compcert_ext (const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date)
 Decode the issue and expire dates from the format used by the compressed certificate.
 
atcacert_date_format_t atcacert_date_from_asn1_tag (const uint8_t tag)
 Convert the asn1 tag for the supported time formats into the local time format.
 
ATCA_STATUS atcacert_date_get_max_date (atcacert_date_format_t format, atcacert_tm_utc_t *timestamp)
 Return the maximum date available for the given format.
 
-ATCA_STATUS atcacert_date_enc_iso8601_sep (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(20)])
 
-ATCA_STATUS atcacert_date_dec_iso8601_sep (const uint8_t formatted_date[(20)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_rfc5280_utc (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(13)])
 
-ATCA_STATUS atcacert_date_dec_rfc5280_utc (const uint8_t formatted_date[(13)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_rfc5280_gen (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(15)])
 
-ATCA_STATUS atcacert_date_dec_rfc5280_gen (const uint8_t formatted_date[(15)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_posix_be (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(4)])
 
-ATCA_STATUS atcacert_date_dec_posix_be (const uint8_t formatted_date[(4)], atcacert_tm_utc_t *timestamp)
 
-ATCA_STATUS atcacert_date_enc_posix_le (const atcacert_tm_utc_t *timestamp, uint8_t formatted_date[(4)])
 
-ATCA_STATUS atcacert_date_dec_posix_le (const uint8_t formatted_date[(4)], atcacert_tm_utc_t *timestamp)
 
int atcacert_date_cmp (const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2)
 Compare two dates.
 
ATCA_STATUS atcacert_get_subject (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf)
 Gets the subject name from a certificate.
 
ATCA_STATUS atcacert_get_subj_public_key (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64])
 Gets the subject public key from a certificate.
 
ATCA_STATUS atcacert_get_subj_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20])
 Gets the subject key ID from a certificate.
 
ATCA_STATUS atcacert_get_issuer (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128])
 Gets the issuer name of a certificate.
 
ATCA_STATUS atcacert_get_issue_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the issue date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_expire_date (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp)
 Gets the expire date from a certificate. Will be parsed according to the date format specified in the certificate definition.
 
ATCA_STATUS atcacert_get_cert_sn (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size)
 Gets the certificate serial number from a certificate.
 
ATCA_STATUS atcacert_get_auth_key_id (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20])
 Gets the authority key ID from a certificate.
 
int atcacert_calc_expire_years (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years)
 
ATCA_STATUS atcacert_der_enc_length (size_t length, uint8_t *der_length, size_t *der_length_size)
 Encode a length in DER format.
 
ATCA_STATUS atcacert_der_dec_length (const uint8_t *der_length, size_t *der_length_size, size_t *length)
 Decode a DER format length.
 
-ATCA_STATUS atcacert_der_adjust_length (uint8_t *der_length, size_t *der_length_size, int delta_length, size_t *new_length)
 
ATCA_STATUS atcacert_der_enc_integer (const uint8_t *int_data, size_t int_data_size, uint8_t is_unsigned, uint8_t *der_int, size_t *der_int_size)
 Encode an ASN.1 integer in DER format, including tag and length fields.
 
ATCA_STATUS atcacert_der_dec_integer (const uint8_t *der_int, size_t *der_int_size, uint8_t *int_data, size_t *int_data_size)
 Decode an ASN.1 DER encoded integer.
 
ATCA_STATUS atcacert_der_enc_ecdsa_sig_value (const uint8_t raw_sig[64], uint8_t *der_sig, size_t *der_sig_size)
 Formats a raw ECDSA P256 signature in the DER encoding found in X.509 certificates.
 
ATCA_STATUS atcacert_der_dec_ecdsa_sig_value (const uint8_t *der_sig, size_t *der_sig_size, uint8_t raw_sig[64])
 Parses an ECDSA P256 signature in the DER encoding as found in X.509 certificates.
 
ATCA_STATUS atcacert_verify_cert_hw (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, const uint8_t ca_public_key[64])
 Verify a certificate against its certificate authority's public key using the host's ATECC device for crypto functions.
 
ATCA_STATUS atcacert_gen_challenge_hw (uint8_t challenge[32])
 Generate a random challenge to be sent to the client using the RNG on the host's ATECC device.
 
ATCA_STATUS atcacert_verify_response_hw (const uint8_t device_public_key[64], const uint8_t challenge[32], const uint8_t response[64])
 Verify a client's response to a challenge using the host's ATECC device for crypto functions.
 
ATCA_STATUS atcacert_verify_cert_sw (const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, const uint8_t ca_public_key[64])
 Verify a certificate against its certificate authority's public key using software crypto functions.The function is currently not implemented.
 
ATCA_STATUS atcacert_gen_challenge_sw (uint8_t challenge[32])
 Generate a random challenge to be sent to the client using a software PRNG.The function is currently not implemented.
 
ATCA_STATUS atcacert_verify_response_sw (const uint8_t device_public_key[64], const uint8_t challenge[32], const uint8_t response[64])
 Verify a client's response to a challenge using software crypto functions.The function is currently not implemented.
 
- - - -

-Variables

-const size_t ATCACERT_DATE_FORMAT_SIZES [5]
 
-

Detailed Description

-

These methods provide convenient ways to perform certification I/O with CryptoAuth chips and perform certificate manipulation in memory.

-

Macro Definition Documentation

- -

◆ ATCACERT_E_BAD_CERT

- -
-
- - - - -
#define ATCACERT_E_BAD_CERT   10
-
-

Certificate structure is bad in some way.

- -
-
- -

◆ ATCACERT_E_BAD_PARAMS

- -
-
- - - - -
#define ATCACERT_E_BAD_PARAMS   ATCA_BAD_PARAM
-
-

Invalid/bad parameter passed to function.

- -
-
- -

◆ ATCACERT_E_BUFFER_TOO_SMALL

- -
-
- - - - -
#define ATCACERT_E_BUFFER_TOO_SMALL   ATCA_SMALL_BUFFER
-
-

Supplied buffer for output is too small to hold the result.

- -
-
- -

◆ ATCACERT_E_DECODING_ERROR

- -
-
- - - - -
#define ATCACERT_E_DECODING_ERROR   4
-
-

Data being decoded/parsed has an invalid format.

- -
-
- -

◆ ATCACERT_E_ELEM_MISSING

- -
-
- - - - -
#define ATCACERT_E_ELEM_MISSING   8
-
-

The certificate element isn't defined for the certificate definition.

- -
-
- -

◆ ATCACERT_E_ELEM_OUT_OF_BOUNDS

- -
-
- - - - -
#define ATCACERT_E_ELEM_OUT_OF_BOUNDS   9
-
-

Certificate element is out of bounds for the given certificate.

- -
-
- -

◆ ATCACERT_E_ERROR

- -
-
- - - - -
#define ATCACERT_E_ERROR   ATCA_GEN_FAIL
-
-

General error.

- -
-
- -

◆ ATCACERT_E_INVALID_DATE

- -
-
- - - - -
#define ATCACERT_E_INVALID_DATE   5
-
-

Date is invalid.

- -
-
- -

◆ ATCACERT_E_INVALID_TRANSFORM

- -
-
- - - - -
#define ATCACERT_E_INVALID_TRANSFORM   13
-
-

Invalid transform passed to function.

- -
-
- -

◆ ATCACERT_E_SUCCESS

- -
-
- - - - -
#define ATCACERT_E_SUCCESS   ATCA_SUCCESS
-
-

Operation completed successfully.

- -
-
- -

◆ ATCACERT_E_UNEXPECTED_ELEM_SIZE

- -
-
- - - - -
#define ATCACERT_E_UNEXPECTED_ELEM_SIZE   7
-
-

A certificate element size was not what was expected.

- -
-
- -

◆ ATCACERT_E_UNIMPLEMENTED

- -
-
- - - - -
#define ATCACERT_E_UNIMPLEMENTED   ATCA_UNIMPLEMENTED
-
-

Function is unimplemented for the current configuration.

- -
-
- -

◆ ATCACERT_E_VERIFY_FAILED

- -
-
- - - - -
#define ATCACERT_E_VERIFY_FAILED   12
-
-

Certificate or challenge/response verification failed.

- -
-
- -

◆ DATEFMT_ISO8601_SEP

- -
-
- - - - -
#define DATEFMT_ISO8601_SEP   (0U)
-
- -

ISO8601 full date YYYY-MM-DDThh:mm:ssZ.

-

Date formats.

- -
-
-

Typedef Documentation

- -

◆ atcacert_build_state_t

- -
-
-

Tracks the state of a certificate as it's being rebuilt from device information.

- -
-
- -

◆ atcacert_cert_element_t

- -
-
- - - - -
typedef struct ATCA_PACKED atcacert_cert_element_s atcacert_cert_element_t
-
-

Defines a generic dynamic element for a certificate including the device and template locations.

- -
-
- -

◆ atcacert_cert_loc_t

- -
-
- - - - -
typedef struct ATCA_PACKED atcacert_cert_loc_s atcacert_cert_loc_t
-
-

Defines a chunk of data in a certificate template.

- -
-
- -

◆ atcacert_cert_sn_src_t

- -
-
-

Sources for the certificate serial number.

- -
-
- -

◆ atcacert_cert_type_t

- -
-
- - - - -
typedef enum atcacert_cert_type_e atcacert_cert_type_t
-
-

Types of certificates.

- -
-
- -

◆ atcacert_def_t

- -
-
- - - - -
typedef struct atcacert_def_s atcacert_def_t
-
-

Defines a certificate and all the pieces to work with it.

-

If any of the standard certificate elements (std_cert_elements) are not a part of the certificate definition, set their count to 0 to indicate their absence.

- -
-
- -

◆ atcacert_device_loc_t

- -
-
- - - - -
typedef struct ATCA_PACKED atcacert_device_loc_s atcacert_device_loc_t
-
-

Defines a chunk of data in an ATECC device.

- -
-
- -

◆ atcacert_device_zone_t

- -
-
-

ATECC device zones. The values match the Zone Encodings as specified in the datasheet.

- -
-
- -

◆ atcacert_std_cert_element_t

- -
-
-

Standard dynamic certificate elements.

- -
-
- -

◆ atcacert_tm_utc_t

- -
-
- - - - -
typedef struct atcacert_tm_utc_s atcacert_tm_utc_t
-
-

Holds a broken-down date in UTC. Mimics atcacert_tm_utc_t from time.h.

- -
-
-

Enumeration Type Documentation

- -

◆ atcacert_cert_sn_src_e

- -
-
- - - - -
enum atcacert_cert_sn_src_e
-
-

Sources for the certificate serial number.

- - - - - - - - - - - -
Enumerator
SNSRC_STORED 

Cert serial is stored on the device.

-
SNSRC_STORED_DYNAMIC 

Cert serial is stored on the device with the first byte being the DER size (X509 certs only).

-
SNSRC_DEVICE_SN 

Cert serial number is 0x40(MSB) + 9-byte device serial number. Only applies to device certificates.

-
SNSRC_SIGNER_ID 

Cert serial number is 0x40(MSB) + 2-byte signer ID. Only applies to signer certificates.

-
SNSRC_PUB_KEY_HASH 

Cert serial number is the SHA256(Subject public key + Encoded dates), with uppermost 2 bits set to 01.

-
SNSRC_DEVICE_SN_HASH 

Cert serial number is the SHA256(Device SN + Encoded dates), with uppermost 2 bits set to 01. Only applies to device certificates.

-
SNSRC_PUB_KEY_HASH_POS 

Depreciated, don't use. Cert serial number is the SHA256(Subject public key + Encoded dates), with MSBit set to 0 to ensure it's positive.

-
SNSRC_DEVICE_SN_HASH_POS 

Depreciated, don't use. Cert serial number is the SHA256(Device SN + Encoded dates), with MSBit set to 0 to ensure it's positive. Only applies to device certificates.

-
SNSRC_PUB_KEY_HASH_RAW 

Depreciated, don't use. Cert serial number is the SHA256(Subject public key + Encoded dates).

-
SNSRC_DEVICE_SN_HASH_RAW 

Depreciated, don't use. Cert serial number is the SHA256(Device SN + Encoded dates). Only applies to device certificates.

-
- -
-
- -

◆ atcacert_cert_type_e

- -
-
- - - - -
enum atcacert_cert_type_e
-
-

Types of certificates.

- - - - -
Enumerator
CERTTYPE_X509 

Standard X509 certificate.

-
CERTTYPE_CUSTOM 

Custom format.

-
CERTTYPE_X509_FULL_STORED 

Full Stored X509 Certificate.

-
- -
-
- -

◆ atcacert_device_zone_e

- -
-
- - - - -
enum atcacert_device_zone_e
-
-

ATECC device zones. The values match the Zone Encodings as specified in the datasheet.

- - - - - - -
Enumerator
DEVZONE_CONFIG 

Configuration zone.

-
DEVZONE_OTP 

One Time Programmable zone.

-
DEVZONE_DATA 

Data zone (slots).

-
DEVZONE_GENKEY 

Data zone - Generate Pubkey (slots).

-
DEVZONE_NONE 

Special value used to indicate there is no device location.

-
- -
-
- -

◆ atcacert_std_cert_element_e

- -
-
- - - - -
enum atcacert_std_cert_element_e
-
-

Standard dynamic certificate elements.

- - -
Enumerator
STDCERT_NUM_ELEMENTS 

Special item to give the number of elements in this enum.

-
- -
-
- -

◆ atcacert_transform_e

- -
-
- - - - -
enum atcacert_transform_e
-
- -

How to transform the data from the device to the certificate.

- - - - - - - - - - - -
Enumerator
TF_NONE 

No transform, data is used byte for byte.

-
TF_REVERSE 

Reverse the bytes (e.g. change endianness)

-
TF_BIN2HEX_UC 

Convert raw binary into ASCII hex, uppercase.

-
TF_BIN2HEX_LC 

Convert raw binary into ASCII hex, lowercase.

-
TF_HEX2BIN_UC 

Convert ASCII hex, uppercase to binary.

-
TF_HEX2BIN_LC 

Convert ASCII hex, lowercase to binary.

-
TF_BIN2HEX_SPACE_UC 

Convert raw binary into ASCII hex, uppercase space between bytes.

-
TF_BIN2HEX_SPACE_LC 

Convert raw binary into ASCII hex, lowercase space between bytes.

-
TF_HEX2BIN_SPACE_UC 

Convert ASCII hex, uppercase with spaces between bytes to binary.

-
TF_HEX2BIN_SPACE_LC 

Convert ASCII hex, lowercase with spaces between bytes to binary.

-
- -
-
-

Function Documentation

- -

◆ atcacert_calc_expire_years()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
int atcacert_calc_expire_years (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
int issue_tm_year,
uint8_t * expire_years 
)
-
-
Parameters
- - - - - - -
[in]cert_defCertificate definition to find a max size for.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[in]issue_tm_yearissue year.
[out]expire_yearsexpire years.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_create_csr()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_create_csr (const atcacert_def_tcsr_def,
uint8_t * csr,
size_t * csr_size 
)
-
- -

Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.

-
Parameters
- - - - -
[in]csr_defCSR definition describing where to find the dynamic CSR information on the device and how to incorporate it into the template.
[out]csrBuffer to receive the CSR.
[in,out]csr_sizeAs input, the size of the CSR buffer in bytes. As output, the size of the CSR returned in cert in bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_create_csr_pem()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_create_csr_pem (const atcacert_def_tcsr_def,
char * csr,
size_t * csr_size 
)
-
- -

Creates a CSR specified by the CSR definition from the ATECC508A device. This process involves reading the dynamic CSR data from the device and combining it with the template found in the CSR definition, then signing it. Return the CSR int der format.

-
Parameters
- - - - -
[in]csr_defCSR definition describing where to find the dynamic CSR information on the device and how to incorporate it into the template.
[out]csrBuffer to received the CSR formatted as PEM.
[in,out]csr_sizeAs input, the size of the CSR buffer in bytes. As output, the size of the CSR as PEM returned in cert in bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_date_cmp()

- -
-
- - - - - - - - - - - - - - - - - - -
int atcacert_date_cmp (const atcacert_tm_utc_ttimestamp1,
const atcacert_tm_utc_ttimestamp2 
)
-
- -

Compare two dates.

-

Dates are not checked for validity before comparing.

-
Parameters
- - - -
[in]timestamp1First date to compare.
[in]timestamp2Second date to compare.
-
-
-
Returns
-1 if timestamp1 is before timestamp2, 0 if they are equal, 1 if they are timestamp1 is after timestamp2. ATCACERT_E_BAD_PARAMS if either input is NULL.
- -
-
- -

◆ atcacert_date_dec()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_dec (atcacert_date_format_t format,
const uint8_t * formatted_date,
size_t formatted_date_size,
atcacert_tm_utc_ttimestamp 
)
-
- -

Parse a formatted timestamp according to the specified format.

-
Parameters
- - - - - -
[in]formatFormat to parse the formatted date as.
[in]formatted_dateFormatted date to be parsed.
[in]formatted_date_sizeSize of the formatted date in bytes.
[out]timestampParsed timestamp is returned here.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_date_dec_compcert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_dec_compcert (const uint8_t enc_dates[3],
atcacert_date_format_t expire_date_format,
atcacert_tm_utc_tissue_date,
atcacert_tm_utc_texpire_date 
)
-
- -

Decode the issue and expire dates from the format used by the compressed certificate.

-
Parameters
- - - - - -
[in]enc_datesEncoded date from the compressed certificate. 3 bytes.
[in]expire_date_formatExpire date format. Only used to determine max date when no expiration date is specified by the encoded date.
[out]issue_dateDecoded issue date is returned here.
[out]expire_dateDecoded expire date is returned here. If there is no expiration date, the expire date will be set to a maximum value for the given expire_date_format.
-
-
-
Returns
0 on success
- -
-
- -

◆ atcacert_date_dec_compcert_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_dec_compcert_ext (const uint8_t comp_cert[72u],
atcacert_date_format_t expire_date_format,
atcacert_tm_utc_tissue_date,
atcacert_tm_utc_texpire_date 
)
-
- -

Decode the issue and expire dates from the format used by the compressed certificate.

-

Supports extended dates if the format version field is 1

-
Parameters
- - - - - -
[in,out]comp_certCompressed certificate (72 bytes) where the encoded dates will be set. Format version (In comp_cert byte 70([3:0]) must be set to 1 to use extended dates.
[in]expire_date_formatExpire date format. Only used to determine max date when no expiration date is specified by the encoded date.
[out]issue_dateDecoded issue date is returned here.
[out]expire_dateDecoded expire date is returned here. If there is no expiration date, the expire date will be set to a maximum value for the given expire_date_format.
-
-
-
Returns
0 on success
- -
-
- -

◆ atcacert_date_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_enc (atcacert_date_format_t format,
const atcacert_tm_utc_ttimestamp,
uint8_t * formatted_date,
size_t * formatted_date_size 
)
-
- -

Format a timestamp according to the format type.

-
Parameters
- - - - - -
[in]formatFormat to use.
[in]timestampTimestamp to format.
[out]formatted_dateFormatted date will be returned in this buffer.
[in,out]formatted_date_sizeAs input, the size of the formatted_date buffer. As output, the size of the returned formatted_date.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_date_enc_compcert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_enc_compcert (const atcacert_tm_utc_tissue_date,
uint8_t expire_years,
uint8_t enc_dates[3] 
)
-
- -

Encode the issue and expire dates in the format used by the compressed certificate.

-
Parameters
- - - - -
[in]issue_dateIssue date to encode. Note that minutes and seconds will be ignored.
[in]expire_yearsExpire date is expressed as a number of years past the issue date. 0 should be used if there is no expire date.
[out]enc_datesEncoded dates for use in the compressed certificate is returned here. 3 bytes.
-
-
-
Returns
0 on success
- -
-
- -

◆ atcacert_date_enc_compcert_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_enc_compcert_ext (const atcacert_tm_utc_tissue_date,
uint8_t expire_years,
uint8_t comp_cert[72u] 
)
-
- -

Encode the issue and expire dates in the format used by the compressed certificate.

-

Supports extended dates if the format version field is set appropriately (currently 1).

-
Parameters
- - - - -
[in]issue_dateIssue date to encode. Note that minutes and seconds will be ignored.
[in]expire_yearsExpire date is expressed as a number of years past the issue date. 0 should be used if there is no expire date.
[in,out]comp_certCompressed certificate (72 bytes) where the encoded dates will be set. Format version must be set appropriately.
-
-
-
Returns
0 on success
- -
-
- -

◆ atcacert_date_from_asn1_tag()

- -
-
- - - - - - - - -
atcacert_date_format_t atcacert_date_from_asn1_tag (const uint8_t tag)
-
- -

Convert the asn1 tag for the supported time formats into the local time format.

-
Returns
DATEFMT_RFC5280_UTC, DATEFMT_RFC5280_GEN, or DATEFMT_INVALID
- -
-
- -

◆ atcacert_date_get_max_date()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_date_get_max_date (atcacert_date_format_t format,
atcacert_tm_utc_ttimestamp 
)
-
- -

Return the maximum date available for the given format.

-
Parameters
- - - -
[in]formatFormat to get the max date for.
[out]timestampMax date is returned here.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_der_dec_ecdsa_sig_value()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_der_dec_ecdsa_sig_value (const uint8_t * der_sig,
size_t * der_sig_size,
uint8_t raw_sig[64] 
)
-
- -

Parses an ECDSA P256 signature in the DER encoding as found in X.509 certificates.

-

This will parse the DER encoding of the signatureValue field as found in an X.509 certificate (RFC 5280). x509_sig should include the tag, length, and value. The value of the signatureValue is the DER encoding of the ECDSA-Sig-Value as specified by RFC 5480 and SECG SEC1.

-
Parameters
- - - - -
[in]der_sigX.509 format signature (TLV of signatureValue) to be parsed.
[in,out]der_sig_sizeAs input, size of the der_sig buffer in bytes. As output, size of the DER x.509 signature parsed from the buffer.
[out]raw_sigParsed P256 ECDSA signature will be returned in this buffer. Formatted as R and S integers concatenated together. 64 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_der_dec_integer()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_der_dec_integer (const uint8_t * der_int,
size_t * der_int_size,
uint8_t * int_data,
size_t * int_data_size 
)
-
- -

Decode an ASN.1 DER encoded integer.

-

X.680 (http://www.itu.int/rec/T-REC-X.680/en) section 19.8, for tag value X.690 (http://www.itu.int/rec/T-REC-X.690/en) section 8.3, for encoding

-
Parameters
- - - - - -
[in]der_intDER encoded ASN.1 integer, including the tag and length fields.
[in,out]der_int_sizeAs input, the size of the der_int buffer in bytes. As output, the size of the DER integer decoded in bytes.
[out]int_dataDecode integer is returned in this buffer in a signed big-endian format.
[in,out]int_data_sizeAs input, the size of int_data in bytes. As output, the size of the decoded integer in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_der_dec_length()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_der_dec_length (const uint8_t * der_length,
size_t * der_length_size,
size_t * length 
)
-
- -

Decode a DER format length.

-

X.690 (http://www.itu.int/rec/T-REC-X.690/en) section 8.1.3, for encoding

-
Parameters
- - - - -
[in]der_lengthDER encoded length.
[in,out]der_length_sizeAs input, the size of the der_length buffer in bytes. As output, the size of the DER encoded length that was decoded.
[out]lengthDecoded length is returned here.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_der_enc_ecdsa_sig_value()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_der_enc_ecdsa_sig_value (const uint8_t raw_sig[64],
uint8_t * der_sig,
size_t * der_sig_size 
)
-
- -

Formats a raw ECDSA P256 signature in the DER encoding found in X.509 certificates.

-

This will return the DER encoding of the signatureValue field as found in an X.509 certificate (RFC 5280). This include the tag, length, and value. The value of the signatureValue is the DER encoding of the ECDSA-Sig-Value as specified by RFC 5480 and SECG SEC1.

-
Parameters
- - - - -
[in]raw_sigP256 ECDSA signature to be formatted. Input format is R and S integers concatenated together. 64 bytes.
[out]der_sigX.509 format signature (TLV of signatureValue) will be returned in this buffer.
[in,out]der_sig_sizeAs input, the size of the x509_sig buffer in bytes. As output, the size of the returned X.509 signature in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_der_enc_integer()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_der_enc_integer (const uint8_t * int_data,
size_t int_data_size,
uint8_t is_unsigned,
uint8_t * der_int,
size_t * der_int_size 
)
-
- -

Encode an ASN.1 integer in DER format, including tag and length fields.

-

X.680 (http://www.itu.int/rec/T-REC-X.680/en) section 19.8, for tag value X.690 (http://www.itu.int/rec/T-REC-X.690/en) section 8.3, for encoding

-
Parameters
- - - - - - -
[in]int_dataRaw integer in big-endian format.
[in]int_data_sizeSize of the raw integer in bytes.
[in]is_unsignedIndicate whether the input integer should be treated as unsigned.
[out]der_intDER encoded integer is returned in this buffer.
[in,out]der_int_sizeAs input, the size of the der_int buffer in bytes. As output, the size of the DER integer returned in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_der_enc_length()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_der_enc_length (size_t length,
uint8_t * der_length,
size_t * der_length_size 
)
-
- -

Encode a length in DER format.

-

X.690 (http://www.itu.int/rec/T-REC-X.690/en) section 8.1.3, for encoding

-
Parameters
- - - - -
[in]lengthLength to be encoded.
[out]der_lengthDER encoded length will returned in this buffer.
[in,out]der_length_sizeAs input, size of der_length buffer in bytes. As output, the size of the DER length encoding in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_gen_challenge_hw()

- -
-
- - - - - - - - -
ATCA_STATUS atcacert_gen_challenge_hw (uint8_t challenge[32])
-
- -

Generate a random challenge to be sent to the client using the RNG on the host's ATECC device.

-
Parameters
- - -
[out]challengeRandom challenge is return here. 32 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_gen_challenge_sw()

- -
-
- - - - - - - - -
ATCA_STATUS atcacert_gen_challenge_sw (uint8_t challenge[32])
-
- -

Generate a random challenge to be sent to the client using a software PRNG.The function is currently not implemented.

-
Parameters
- - -
[out]challengeRandom challenge is return here. 32 bytes.
-
-
-
Returns
ATCA_UNIMPLEMENTED , as the function is currently not implemented.
- -
-
- -

◆ atcacert_get_auth_key_id()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_auth_key_id (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
uint8_t auth_key_id[20] 
)
-
- -

Gets the authority key ID from a certificate.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]auth_key_idAuthority key ID is returned in this buffer. 20 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_cert_sn()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_cert_sn (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
uint8_t * cert_sn,
size_t * cert_sn_size 
)
-
- -

Gets the certificate serial number from a certificate.

-
Parameters
- - - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]cert_snCertificate SN will be returned in this buffer.
[in,out]cert_sn_sizeAs input, the size of the cert_sn buffer. As output, the size of the certificate SN (cert_sn) in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_expire_date()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_expire_date (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
atcacert_tm_utc_ttimestamp 
)
-
- -

Gets the expire date from a certificate. Will be parsed according to the date format specified in the certificate definition.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]timestampExpire date is returned in this structure.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_issue_date()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_issue_date (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
atcacert_tm_utc_ttimestamp 
)
-
- -

Gets the issue date from a certificate. Will be parsed according to the date format specified in the certificate definition.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]timestampIssue date is returned in this structure.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_issuer()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_issuer (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
uint8_t cert_issuer[128] 
)
-
- -

Gets the issuer name of a certificate.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]cert_issuerCertificate's issuer is returned in this buffer.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_response()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_response (uint8_t device_private_key_slot,
const uint8_t challenge[32],
uint8_t response[64] 
)
-
- -

Calculates the response to a challenge sent from the host.

-

The challenge-response protocol is an ECDSA Sign and Verify. This performs the ECDSA Sign on the challenge and returns the signature as the response.

-
Parameters
- - - - -
[in]device_private_key_slotSlot number for the device's private key. This must be the same slot used to generate the public key included in the device's certificate.
[in]challengeChallenge to generate the response for. Must be 32 bytes.
[out]responseResponse will be returned in this buffer. 64 bytes.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_subj_key_id()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_subj_key_id (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
uint8_t subj_key_id[20] 
)
-
- -

Gets the subject key ID from a certificate.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]subj_key_idSubject key ID is returned in this buffer. 20 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_subj_public_key()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_subj_public_key (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
uint8_t subj_public_key[64] 
)
-
- -

Gets the subject public key from a certificate.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]subj_public_keySubject public key is returned in this buffer. Formatted at X and Y integers concatenated together. 64 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_get_subject()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_get_subject (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
cal_buffercert_subj_buf 
)
-
- -

Gets the subject name from a certificate.

-
Parameters
- - - - - -
[in]cert_defCertificate definition for the certificate.
[in]certCertificate to get element from.
[in]cert_sizeSize of the certificate (cert) in bytes.
[out]subjectSubject name is returned in this buffer.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_cert (const atcacert_def_tcert_def,
const uint8_t ca_public_key[64],
uint8_t * cert,
size_t * cert_size 
)
-
- -

Reads the certificate specified by the certificate definition from the ATECC508A device.

-

This process involves reading the dynamic cert data from the device and combining it with the template found in the certificate definition.

-
Parameters
- - - - - -
[in]cert_defCertificate definition describing where to find the dynamic certificate information on the device and how to incorporate it into the template.
[in]ca_public_keyThe ECC P256 public key of the certificate authority that signed this certificate. Formatted as the 32 byte X and Y integers concatenated together (64 bytes total). Set to NULL if the authority key id is not needed, set properly in the cert_def template, or stored on the device as specifed in the cert_def cert_elements.
[out]certBuffer to received the certificate.
[in,out]cert_sizeAs input, the size of the cert buffer in bytes. As output, the size of the certificate returned in cert in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_cert_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_cert_ext (ATCADevice device,
const atcacert_def_tcert_def,
const uint8_t ca_public_key[64],
uint8_t * cert,
size_t * cert_size 
)
-
- -

Reads the certificate specified by the certificate definition from the ATECC508A device.

-

This process involves reading the dynamic cert data from the device and combining it with the template found in the certificate definition.

-
Parameters
- - - - - - -
[in]deviceDevice context
[in]cert_defCertificate definition describing where to find the dynamic certificate information on the device and how to incorporate it into the template.
[in]ca_public_keyThe ECC P256 public key of the certificate authority that signed this certificate. Formatted as the 32 byte X and Y integers concatenated together (64 bytes total). Set to NULL if the authority key id is not needed, set properly in the cert_def template, or stored on the device as specifed in the cert_def cert_elements.
[out]certBuffer to received the certificate.
[in,out]cert_sizeAs input, the size of the cert buffer in bytes. As output, the size of the certificate returned in cert in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_cert_size()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_cert_size (const atcacert_def_tcert_def,
size_t * cert_size 
)
-
- -

Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.

-
Parameters
- - - -
[in]cert_defCertificate definition to find a max size for.
[out]cert_sizeCertificate size will be returned here in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_cert_size_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_cert_size_ext (ATCADevice device,
const atcacert_def_tcert_def,
size_t * cert_size 
)
-
- -

Return the actual certificate size in bytes for a given cert def. Certificate can be variable size, so this gives the absolute buffer size when reading the certificates.

-
Parameters
- - - - -
[in]deviceDevice context
[in]cert_defCertificate definition to find a max size for.
[out]cert_sizeCertificate size will be returned here in bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_device_loc()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_device_loc (const atcacert_device_loc_tdevice_loc,
uint8_t * data 
)
-
- -

Read the data from a device location.

-
Parameters
- - - -
[in]device_locDevice location to read data from.
[out]dataData read is returned here.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_device_loc_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_device_loc_ext (ATCADevice device,
const atcacert_device_loc_tdevice_loc,
uint8_t * data 
)
-
- -

Read the data from a device location.

-
Parameters
- - - - -
[in]deviceDevice context
[in]device_locDevice location to read data from.
[out]dataData read is returned here.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_subj_key_id()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_subj_key_id (const atcacert_def_tcert_def,
uint8_t subj_key_id[20] 
)
-
- -

Reads the subject key ID based on a certificate definition.

-
Parameters
- - - -
[in]cert_defCertificate definition
[out]subj_key_idSubject key ID is returned in this buffer. 20 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_read_subj_key_id_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_read_subj_key_id_ext (ATCADevice device,
const atcacert_def_tcert_def,
uint8_t subj_key_id[20] 
)
-
- -

Reads the subject key ID based on a certificate definition.

-
Parameters
- - - - -
[in]deviceDevice context
[in]cert_defCertificate definition
[out]subj_key_idSubject key ID is returned in this buffer. 20 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_verify_cert_hw()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_verify_cert_hw (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
const uint8_t ca_public_key[64] 
)
-
- -

Verify a certificate against its certificate authority's public key using the host's ATECC device for crypto functions.

-
Parameters
- - - - - -
[in]cert_defCertificate definition describing how to extract the TBS and signature components from the certificate specified.
[in]certCertificate to verify.
[in]cert_sizeSize of the certificate (cert) in bytes.
[in]ca_public_keyThe ECC P256 public key of the certificate authority that signed this certificate. Formatted as the 32 byte X and Y integers concatenated together (64 bytes total).
-
-
-
Returns
ATCACERT_E_SUCCESS if the verify succeeds, ATCACERT_VERIFY_FAILED or ATCA_EXECUTION_ERROR if it fails to verify. ATCA_EXECUTION_ERROR may occur when the public key is invalid and doesn't fall on the P256 curve.
- -
-
- -

◆ atcacert_verify_cert_sw()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_verify_cert_sw (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size,
const uint8_t ca_public_key[64] 
)
-
- -

Verify a certificate against its certificate authority's public key using software crypto functions.The function is currently not implemented.

-
Parameters
- - - - - -
[in]cert_defCertificate definition describing how to extract the TBS and signature components from the certificate specified.
[in]certCertificate to verify.
[in]cert_sizeSize of the certificate (cert) in bytes.
[in]ca_public_keyThe ECC P256 public key of the certificate authority that signed this certificate. Formatted as the 32 byte X and Y integers concatenated together (64 bytes total).
-
-
-
Returns
ATCA_UNIMPLEMENTED , as the function is currently not implemented.
- -
-
- -

◆ atcacert_verify_response_hw()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_verify_response_hw (const uint8_t device_public_key[64],
const uint8_t challenge[32],
const uint8_t response[64] 
)
-
- -

Verify a client's response to a challenge using the host's ATECC device for crypto functions.

-

The challenge-response protocol is an ECDSA Sign and Verify. This performs an ECDSA verify on the response returned by the client, verifying the client has the private key counter-part to the public key returned in its certificate.

-
Parameters
- - - - -
[in]device_public_keyDevice public key as read from its certificate. Formatted as the X and Y integers concatenated together. 64 bytes.
[in]challengeChallenge that was sent to the client. 32 bytes.
[in]responseResponse returned from the client to be verified. 64 bytes.
-
-
-
Returns
ATCACERT_E_SUCCESS if the verify succeeds, ATCACERT_VERIFY_FAILED or ATCA_EXECUTION_ERROR if it fails to verify. ATCA_EXECUTION_ERROR may occur when the public key is invalid and doesn't fall on the P256 curve.
- -
-
- -

◆ atcacert_verify_response_sw()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_verify_response_sw (const uint8_t device_public_key[64],
const uint8_t challenge[32],
const uint8_t response[64] 
)
-
- -

Verify a client's response to a challenge using software crypto functions.The function is currently not implemented.

-

The challenge-response protocol is an ECDSA Sign and Verify. This performs an ECDSA verify on the response returned by the client, verifying the client has the private key counter-part to the public key returned in its certificate.

-
Parameters
- - - - -
[in]device_public_keyDevice public key as read from its certificate. Formatted as the X and Y integers concatenated together. 64 bytes.
[in]challengeChallenge that was sent to the client. 32 bytes.
[in]responseResponse returned from the client to be verified. 64 bytes.
-
-
-
Returns
ATCA_UNIMPLEMENTED , as the function is currently not implemented.
- -
-
- -

◆ atcacert_write_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_write_cert (const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size 
)
-
- -

Take a full certificate and write it to the ATECC508A device according to the certificate definition.

-
Parameters
- - - - - -
[in]cert_defCertificate definition describing where the dynamic certificate information is and how to store it on the device.
[in]certFull certificate to be stored.
[in]cert_sizeSize of the full certificate in bytes.
[in]deviceDevice context
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atcacert_write_cert_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS atcacert_write_cert_ext (ATCADevice device,
const atcacert_def_tcert_def,
const uint8_t * cert,
size_t cert_size 
)
-
- -

Take a full certificate and write it to the ATECC508A device according to the certificate definition.

-
Parameters
- - - - - - -
[in]deviceDevice context
[in]cert_defCertificate definition describing where the dynamic certificate information is and how to store it on the device.
[in]certFull certificate to be stored.
[in]cert_sizeSize of the full certificate in bytes.
[in]deviceDevice context
-
-
-
Returns
ATCACERT_E_SUCCESS on success, otherwise an error code.
- -
-
-
-
- - - - diff --git a/a01443.js b/a01443.js deleted file mode 100644 index cf32401b1..000000000 --- a/a01443.js +++ /dev/null @@ -1,148 +0,0 @@ -var a01443 = -[ - [ "atcacert_tm_utc_s", "a01588.html", null ], - [ "atcacert_device_loc_s", "a01592.html", [ - [ "count", "a01592.html#a24329906c1970b0510479835d52b70b5", null ], - [ "is_genkey", "a01592.html#a209ce3b19c7ebdd32847334c64a9deb2", null ], - [ "offset", "a01592.html#a6d4c996ba426bfb964f3c2c4d1238f3c", null ], - [ "slot", "a01592.html#ac393a690cd7891565dc679e6ffa4b021", null ], - [ "zone", "a01592.html#af8e8e6406f9252c503f2eaed02f0dbca", null ] - ] ], - [ "atcacert_cert_loc_s", "a01596.html", [ - [ "count", "a01596.html#a2cf939ba243a6dc7c8da9a74040b83f3", null ], - [ "offset", "a01596.html#aee425cdec2c6c77ccb291993a6526d0b", null ] - ] ], - [ "atcacert_cert_element_s", "a01600.html", [ - [ "cert_loc", "a01600.html#a6a6584538d9ba2e8304e2c103d4501a5", null ], - [ "device_loc", "a01600.html#aaac07ecbeef8734077fec8ea17a7e015", null ], - [ "id", "a01600.html#a437f85f49d7a943a0e9f06353a2b6875", null ], - [ "transforms", "a01600.html#a1e4d5bbf62b7cbe49b6d222d6e124833", null ] - ] ], - [ "atcacert_def_s", "a01604.html", [ - [ "ca_cert_def", "a01604.html#ae6dc350fb1a599dd6585c41e34a1e0e8", null ], - [ "comp_cert_dev_loc", "a01604.html#a56f1328d6aec74cd0eb92a30182065b1", null ], - [ "type", "a01604.html#aeb847b88caadd6fad351f4d239edea42", null ] - ] ], - [ "atcacert_build_state_s", "a01608.html", [ - [ "cert", "a01608.html#a850a129376d4a3dd4c9994d04a9edca7", null ], - [ "cert_def", "a01608.html#a5b6c72f114573cb07932b4c0e089150e", null ], - [ "cert_size", "a01608.html#af8600eedc4cac772aff7257ffcd4a1c0", null ], - [ "comp_cert", "a01608.html#ae6ce8bf9e7b8172f5971f7c6516a79f0", null ], - [ "device_sn", "a01608.html#a4530a3779248463eb6b77176ee656e68", null ], - [ "devtype", "a01608.html#af6d0fd1d866c96c7a9e4bc5425baa094", null ], - [ "is_comp_cert", "a01608.html#abfff7f7f7436a1df82e73b4b070f8ab8", null ], - [ "is_device_sn", "a01608.html#aa0b5050ded24b08d6b0022d543d2ed47", null ], - [ "max_cert_size", "a01608.html#a6e1cb79d9215a84f1e74c989bd0c9987", null ] - ] ], - [ "ATCACERT_E_BAD_CERT", "a01443.html#ga822ee0620c8d2d12ff971b9b35f9f5cd", null ], - [ "ATCACERT_E_BAD_PARAMS", "a01443.html#ga47509d283523ab1892fb8746d6f4e37d", null ], - [ "ATCACERT_E_BUFFER_TOO_SMALL", "a01443.html#ga7a2e774fc8b12c4045dea335a86afca6", null ], - [ "ATCACERT_E_DECODING_ERROR", "a01443.html#gaea155533fdd352d6602d3e2fc717930f", null ], - [ "ATCACERT_E_ELEM_MISSING", "a01443.html#ga8e3e7c64650c92364bbac17f6a75474a", null ], - [ "ATCACERT_E_ELEM_OUT_OF_BOUNDS", "a01443.html#ga62604c78d688530173e203b02df180fa", null ], - [ "ATCACERT_E_ERROR", "a01443.html#ga048a6bb9781dbbc402409a172f976f74", null ], - [ "ATCACERT_E_INVALID_DATE", "a01443.html#gaafd66d6744314225ead24b3901bd6372", null ], - [ "ATCACERT_E_INVALID_TRANSFORM", "a01443.html#ga2396e500bd36c2316a1a6e13e3117958", null ], - [ "ATCACERT_E_SUCCESS", "a01443.html#ga7bd1ad830360fc8b988f855da6d0d5ba", null ], - [ "ATCACERT_E_UNEXPECTED_ELEM_SIZE", "a01443.html#ga5a7cb98e18ad338f2eaf6594acb67c32", null ], - [ "ATCACERT_E_UNIMPLEMENTED", "a01443.html#ga4b6db1523875a2b1453ef5e16989ecd4", null ], - [ "ATCACERT_E_VERIFY_FAILED", "a01443.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d", null ], - [ "DATEFMT_ISO8601_SEP", "a01443.html#ga6e58a9d673118d8075bb4cb4c85ec0cb", null ], - [ "DATEFMT_POSIX_UINT32_BE", "a01443.html#ga35593316a537ec58d4a214243be9c862", null ], - [ "DATEFMT_POSIX_UINT32_LE", "a01443.html#gad97a813a37feaac6770f66846ad4bf27", null ], - [ "DATEFMT_RFC5280_GEN", "a01443.html#ga9b2731e0538062863fdd2816e60787b6", null ], - [ "DATEFMT_RFC5280_UTC", "a01443.html#ga0043de3aea86035e05798afc16d516d0", null ], - [ "atcacert_build_state_t", "a01443.html#ga199c030847111ed09a682ca61b7597a9", null ], - [ "atcacert_cert_element_t", "a01443.html#ga28ae8005ca4b109958b090d2079d190b", null ], - [ "atcacert_cert_loc_t", "a01443.html#gad473c89ee9a934029ff87e86fc1c570d", null ], - [ "atcacert_cert_sn_src_t", "a01443.html#ga3bddddfbb916fe1dd1e935e454d3265b", null ], - [ "atcacert_cert_type_t", "a01443.html#gae63503395992a60853867e3865f75be0", null ], - [ "atcacert_def_t", "a01443.html#ga01be962d7321095d15547113d727c97d", null ], - [ "atcacert_device_loc_t", "a01443.html#ga5973a9cc26357822a232433f57741777", null ], - [ "atcacert_device_zone_t", "a01443.html#ga63df515d393c9ebb6979d53208263458", null ], - [ "atcacert_std_cert_element_t", "a01443.html#ga70deb837a72574263e6fb0721d8e0616", null ], - [ "atcacert_tm_utc_t", "a01443.html#ga4a59e158244def2c79227aa244bd59c2", null ], - [ "atcacert_transform_t", "a01443.html#ga249c2793a533c5487b5b7b935683a78f", null ], - [ "atcacert_cert_sn_src_e", "a01443.html#ga813047a656af7fe578d28fd54c840e8e", [ - [ "SNSRC_STORED", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1", null ], - [ "SNSRC_STORED_DYNAMIC", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b", null ], - [ "SNSRC_DEVICE_SN", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41", null ], - [ "SNSRC_SIGNER_ID", "a01443.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff", null ], - [ "SNSRC_PUB_KEY_HASH", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e", null ], - [ "SNSRC_DEVICE_SN_HASH", "a01443.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2", null ], - [ "SNSRC_PUB_KEY_HASH_POS", "a01443.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5", null ], - [ "SNSRC_DEVICE_SN_HASH_POS", "a01443.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7", null ], - [ "SNSRC_PUB_KEY_HASH_RAW", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972", null ], - [ "SNSRC_DEVICE_SN_HASH_RAW", "a01443.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909", null ] - ] ], - [ "atcacert_cert_type_e", "a01443.html#ga5430f01929cd7269e04db08d1f28642f", [ - [ "CERTTYPE_X509", "a01443.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44", null ], - [ "CERTTYPE_CUSTOM", "a01443.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb", null ], - [ "CERTTYPE_X509_FULL_STORED", "a01443.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9", null ] - ] ], - [ "atcacert_device_zone_e", "a01443.html#ga1c0876228cb459f64347a63f3bae4c73", [ - [ "DEVZONE_CONFIG", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207", null ], - [ "DEVZONE_OTP", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea", null ], - [ "DEVZONE_DATA", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb", null ], - [ "DEVZONE_GENKEY", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c", null ], - [ "DEVZONE_NONE", "a01443.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05", null ] - ] ], - [ "atcacert_std_cert_element_e", "a01443.html#ga77184d0c71198b489ea9b57d07da824e", [ - [ "STDCERT_NUM_ELEMENTS", "a01443.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f", null ] - ] ], - [ "atcacert_transform_e", "a01443.html#ga121ffde3250c4ca6947c680868aa6017", [ - [ "TF_NONE", "a01443.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84", null ], - [ "TF_REVERSE", "a01443.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817", null ], - [ "TF_BIN2HEX_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7", null ], - [ "TF_BIN2HEX_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979", null ], - [ "TF_HEX2BIN_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779", null ], - [ "TF_HEX2BIN_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd", null ], - [ "TF_BIN2HEX_SPACE_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa", null ], - [ "TF_BIN2HEX_SPACE_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe", null ], - [ "TF_HEX2BIN_SPACE_UC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08", null ], - [ "TF_HEX2BIN_SPACE_LC", "a01443.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d", null ] - ] ], - [ "atcacert_calc_expire_years", "a01443.html#ga6961d4584f23cfe79ddec69a91e41e03", null ], - [ "atcacert_create_csr", "a01443.html#ga9b103dcc50fefcb19514285da7fbe296", null ], - [ "atcacert_create_csr_pem", "a01443.html#ga1e4f207e7180d504c5dd369cd20fef21", null ], - [ "atcacert_date_cmp", "a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486", null ], - [ "atcacert_date_dec", "a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461", null ], - [ "atcacert_date_dec_compcert", "a01443.html#gaab6bdf548ca56cec54441114a3152767", null ], - [ "atcacert_date_dec_compcert_ext", "a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2", null ], - [ "atcacert_date_enc", "a01443.html#ga33f676825335d37da36aee1c93463829", null ], - [ "atcacert_date_enc_compcert", "a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62", null ], - [ "atcacert_date_enc_compcert_ext", "a01443.html#ga949c368ba13b78caee11d2abe60de755", null ], - [ "atcacert_date_from_asn1_tag", "a01443.html#ga208c468285600790ebcdba55a4ccf3a8", null ], - [ "atcacert_date_get_max_date", "a01443.html#ga82a0f236afa03da347abbee1db588cb3", null ], - [ "atcacert_der_dec_ecdsa_sig_value", "a01443.html#gab22e2c8bf627f700be0e10e331bfdb1f", null ], - [ "atcacert_der_dec_integer", "a01443.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb", null ], - [ "atcacert_der_dec_length", "a01443.html#ga9d4810aa2fd1db14a8f91204387fd972", null ], - [ "atcacert_der_enc_ecdsa_sig_value", "a01443.html#gacee7e7eb74c022b2ea70c7a549d5f876", null ], - [ "atcacert_der_enc_integer", "a01443.html#gadc86044101ad9a87556d49ab8bf892af", null ], - [ "atcacert_der_enc_length", "a01443.html#ga5866e20dc2c7f9d788924155eac4fece", null ], - [ "atcacert_gen_challenge_hw", "a01443.html#ga6692847d9c41eb73e469df029697a7b9", null ], - [ "atcacert_gen_challenge_sw", "a01443.html#ga883a0c84474150e6b123dfab15a8c929", null ], - [ "atcacert_get_auth_key_id", "a01443.html#ga79182d181cd8041a0e66e18790dff519", null ], - [ "atcacert_get_cert_sn", "a01443.html#gad1de933f825653a1a725b46407adb09e", null ], - [ "atcacert_get_expire_date", "a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466", null ], - [ "atcacert_get_issue_date", "a01443.html#ga7305906995afb21b494446d84298533b", null ], - [ "atcacert_get_issuer", "a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7", null ], - [ "atcacert_get_response", "a01443.html#ga9a9769b84557ca2c47fa4442daa9a111", null ], - [ "atcacert_get_subj_key_id", "a01443.html#ga9544e4c1c1ae365f90253f8a475e164e", null ], - [ "atcacert_get_subj_public_key", "a01443.html#gaa530a6a7f90a9a610856701b0220a161", null ], - [ "atcacert_get_subject", "a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0", null ], - [ "atcacert_read_cert", "a01443.html#gafd202f259b53d72b0a382f33e99f9065", null ], - [ "atcacert_read_cert_ext", "a01443.html#ga906f310b9518c8f41431b047602cd651", null ], - [ "atcacert_read_cert_size", "a01443.html#ga143bf9b419fc7a090cb9876436735616", null ], - [ "atcacert_read_cert_size_ext", "a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b", null ], - [ "atcacert_read_device_loc", "a01443.html#ga7eb1ce78d2efb60aa56b929577fa88d2", null ], - [ "atcacert_read_device_loc_ext", "a01443.html#ga9d69be730c8bd7863588c43ebe58b225", null ], - [ "atcacert_read_subj_key_id", "a01443.html#ga7f12776448f02a8c9862c4af64537017", null ], - [ "atcacert_read_subj_key_id_ext", "a01443.html#gacb6ecab7acc06102caee5419a01bd803", null ], - [ "atcacert_verify_cert_hw", "a01443.html#ga42939c26927fb65340ff1ebb2914a976", null ], - [ "atcacert_verify_cert_sw", "a01443.html#ga5bad45c1fda32b7a57275af23ab0f626", null ], - [ "atcacert_verify_response_hw", "a01443.html#ga1441695a23776f3b38722e51fd3c36e3", null ], - [ "atcacert_verify_response_sw", "a01443.html#gab67e7a4c5899ef5402ff44f3f91d20b5", null ], - [ "atcacert_write_cert", "a01443.html#gafa00725d50c68cfd2e0072bf563491a0", null ], - [ "atcacert_write_cert_ext", "a01443.html#ga25a3291ce46841ca52346b42dc416485", null ] -]; \ No newline at end of file diff --git a/a01444.html b/a01444.html deleted file mode 100644 index 8c14b7667..000000000 --- a/a01444.html +++ /dev/null @@ -1,1199 +0,0 @@ - - - - - - - -CryptoAuthLib: Basic Crypto API methods for CryptoAuth Devices (calib_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Basic Crypto API methods for CryptoAuth Devices (calib_)
-
-
- -

These methods provide a simple API to CryptoAuth chips. -More...

- - -

calib directory - Purpose

The purpose of this directory is to contain the files implementing the APIs for a basic interface to the core CryptoAuthLib library.High-level functions like these make it very convenient to use the library when standard configurations and defaults are in play. They are the easiest to use when developing examples or trying to understand the "flow" of an authentication operation without getting overwhelmed by the details.This makes simple jobs easy and if you need more sophistication and power, you can employ the full power of the CryptoAuthLib object model.See the Doxygen documentation in cryptoauthlib/docs for details on the API of the calib commands.
- - - - - - - - - -

-Data Structures

struct  atca_sha256_ctx
 
struct  atsha204a_config_s
 
struct  atecc508a_config_s
 
struct  atecc608_config_s
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define ATCA_AES_ENABLE_EN_SHIFT   (0)
 
-#define ATCA_AES_ENABLE_EN_MASK   (0x01u << ATCA_AES_ENABLE_EN_SHIFT)
 
-#define ATCA_I2C_ENABLE_EN_SHIFT   (0)
 
-#define ATCA_I2C_ENABLE_EN_MASK   (0x01u << ATCA_I2C_ENABLE_EN_SHIFT)
 
-#define ATCA_COUNTER_MATCH_EN_SHIFT   (0)
 
-#define ATCA_COUNTER_MATCH_EN_MASK   (0x01u << ATCA_COUNTER_MATCH_EN_SHIFT)
 
-#define ATCA_COUNTER_MATCH_KEY_SHIFT   (4)
 
-#define ATCA_COUNTER_MATCH_KEY_MASK   (0x0Fu << ATCA_COUNTER_MATCH_KEY_SHIFT)
 
-#define ATCA_COUNTER_MATCH_KEY(v)   (ATCA_COUNTER_MATCH_KEY_MASK & (v << ATCA_COUNTER_MATCH_KEY_SHIFT))
 
-#define ATCA_CHIP_MODE_I2C_EXTRA_SHIFT   (0)
 
-#define ATCA_CHIP_MODE_I2C_EXTRA_MASK   (0x01u << ATCA_CHIP_MODE_I2C_EXTRA_SHIFT)
 
-#define ATCA_CHIP_MODE_TTL_EN_SHIFT   (1)
 
-#define ATCA_CHIP_MODE_TTL_EN_MASK   (0x01u << ATCA_CHIP_MODE_TTL_EN_SHIFT)
 
-#define ATCA_CHIP_MODE_WDG_LONG_SHIFT   (2)
 
-#define ATCA_CHIP_MODE_WDG_LONG_MASK   (0x01u << ATCA_CHIP_MODE_WDG_LONG_SHIFT)
 
-#define ATCA_CHIP_MODE_CLK_DIV_SHIFT   (3)
 
-#define ATCA_CHIP_MODE_CLK_DIV_MASK   (0x1Fu << ATCA_CHIP_MODE_CLK_DIV_SHIFT)
 
-#define ATCA_CHIP_MODE_CLK_DIV(v)   (ATCA_CHIP_MODE_CLK_DIV_MASK & (v << ATCA_CHIP_MODE_CLK_DIV_SHIFT))
 
-#define ATCA_SLOT_CONFIG_READKEY_SHIFT   (0)
 
-#define ATCA_SLOT_CONFIG_READKEY_MASK   (0x0Fu << ATCA_SLOT_CONFIG_READKEY_SHIFT)
 
-#define ATCA_SLOT_CONFIG_READKEY(v)   (ATCA_SLOT_CONFIG_READKEY_MASK & (v << ATCA_SLOT_CONFIG_READKEY_SHIFT))
 
-#define ATCA_SLOT_CONFIG_NOMAC_SHIFT   (4)
 
-#define ATCA_SLOT_CONFIG_NOMAC_MASK   (0x01u << ATCA_SLOT_CONFIG_NOMAC_SHIFT)
 
-#define ATCA_SLOT_CONFIG_LIMITED_USE_SHIFT   (5)
 
-#define ATCA_SLOT_CONFIG_LIMITED_USE_MASK   (0x01u << ATCA_SLOT_CONFIG_LIMITED_USE_SHIFT)
 
-#define ATCA_SLOT_CONFIG_ENC_READ_SHIFT   (6)
 
-#define ATCA_SLOT_CONFIG_ENC_READ_MASK   (0x01u << ATCA_SLOT_CONFIG_ENC_READ_SHIFT)
 
-#define ATCA_SLOT_CONFIG_IS_SECRET_SHIFT   (7)
 
-#define ATCA_SLOT_CONFIG_IS_SECRET_MASK   (0x01u << ATCA_SLOT_CONFIG_IS_SECRET_SHIFT)
 
-#define ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT   (8)
 
-#define ATCA_SLOT_CONFIG_WRITE_KEY_MASK   ((uint32_t)0x0Fu << ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT)
 
-#define ATCA_SLOT_CONFIG_WRITE_KEY(v)   (ATCA_SLOT_CONFIG_WRITE_KEY_MASK & (v << ATCA_SLOT_CONFIG_WRITE_KEY_SHIFT))
 
-#define ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT   (12)
 
-#define ATCA_SLOT_CONFIG_WRITE_CONFIG_MASK   (((uint32_t)0x0Fu << ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT))
 
-#define ATCA_SLOT_CONFIG_WRITE_CONFIG(v)   ((ATCA_SLOT_CONFIG_WRITE_CONFIG_MASK & ((uint32_t)(v) << ATCA_SLOT_CONFIG_WRITE_CONFIG_SHIFT)))
 
-#define ATCA_SLOT_CONFIG_EXT_SIG_SHIFT   (0)
 
-#define ATCA_SLOT_CONFIG_EXT_SIG_MASK   (0x01u << ATCA_SLOT_CONFIG_EXT_SIG_SHIFT)
 
-#define ATCA_SLOT_CONFIG_INT_SIG_SHIFT   (1)
 
-#define ATCA_SLOT_CONFIG_INT_SIG_MASK   (0x01u << ATCA_SLOT_CONFIG_INT_SIG_SHIFT)
 
-#define ATCA_SLOT_CONFIG_ECDH_SHIFT   (2)
 
-#define ATCA_SLOT_CONFIG_ECDH_MASK   (0x01u << ATCA_SLOT_CONFIG_ECDH_SHIFT)
 
-#define ATCA_SLOT_CONFIG_WRITE_ECDH_SHIFT   (3)
 
-#define ATCA_SLOT_CONFIG_WRITE_ECDH_MASK   (0x01u << ATCA_SLOT_CONFIG_WRITE_ECDH_SHIFT)
 
-#define ATCA_SLOT_CONFIG_GEN_KEY_SHIFT   (8)
 
-#define ATCA_SLOT_CONFIG_GEN_KEY_MASK   (0x01u << ATCA_SLOT_CONFIG_GEN_KEY_SHIFT)
 
-#define ATCA_SLOT_CONFIG_PRIV_WRITE_SHIFT   (9)
 
-#define ATCA_SLOT_CONFIG_PRIV_WRITE_MASK   (0x01u << ATCA_SLOT_CONFIG_PRIV_WRITE_SHIFT)
 
-#define ATCA_USE_LOCK_ENABLE_SHIFT   (0)
 
-#define ATCA_USE_LOCK_ENABLE_MASK   (0x0Fu << ATCA_USE_LOCK_ENABLE_SHIFT)
 
-#define ATCA_USE_LOCK_KEY_SHIFT   (4)
 
-#define ATCA_USE_LOCK_KEY_MASK   (0x0Fu << ATCA_USE_LOCK_KEY_SHIFT)
 
-#define ATCA_VOL_KEY_PERM_SLOT_SHIFT   (0)
 
-#define ATCA_VOL_KEY_PERM_SLOT_MASK   (0x0Fu << ATCA_VOL_KEY_PERM_SLOT_SHIFT)
 
-#define ATCA_VOL_KEY_PERM_SLOT(v)   (ATCA_VOL_KEY_PERM_SLOT_MASK & (v << ATCA_VOL_KEY_PERM_SLOT_SHIFT))
 
-#define ATCA_VOL_KEY_PERM_EN_SHIFT   (7)
 
-#define ATCA_VOL_KEY_PERM_EN_MASK   (0x01u << ATCA_VOL_KEY_PERM_EN_SHIFT)
 
-#define ATCA_SECURE_BOOT_MODE_SHIFT   (0)
 
-#define ATCA_SECURE_BOOT_MODE_MASK   (0x03u << ATCA_SECURE_BOOT_MODE_SHIFT)
 
-#define ATCA_SECURE_BOOT_MODE(v)   (ATCA_SECURE_BOOT_MODE_MASK & (v << ATCA_SECURE_BOOT_MODE_SHIFT))
 
-#define ATCA_SECURE_BOOT_PERSIST_EN_SHIFT   (3)
 
-#define ATCA_SECURE_BOOT_PERSIST_EN_MASK   (0x01u << ATCA_SECURE_BOOT_PERSIST_EN_SHIFT)
 
-#define ATCA_SECURE_BOOT_RAND_NONCE_SHIFT   (4)
 
-#define ATCA_SECURE_BOOT_RAND_NONCE_MASK   (0x01u << ATCA_SECURE_BOOT_RAND_NONCE_SHIFT)
 
-#define ATCA_SECURE_BOOT_DIGEST_SHIFT   (8)
 
-#define ATCA_SECURE_BOOT_DIGEST_MASK   (0x0Fu << ATCA_SECURE_BOOT_DIGEST_SHIFT)
 
-#define ATCA_SECURE_BOOT_DIGEST(v)   (ATCA_SECURE_BOOT_DIGEST_MASK & (v << ATCA_SECURE_BOOT_DIGEST_SHIFT))
 
-#define ATCA_SECURE_BOOT_PUB_KEY_SHIFT   (12)
 
-#define ATCA_SECURE_BOOT_PUB_KEY_MASK   (0x0Fu << ATCA_SECURE_BOOT_PUB_KEY_SHIFT)
 
-#define ATCA_SECURE_BOOT_PUB_KEY(v)   (ATCA_SECURE_BOOT_PUB_KEY_MASK & (v << ATCA_SECURE_BOOT_PUB_KEY_SHIFT))
 
-#define ATCA_SLOT_LOCKED(v)   ((0x01 << v) & 0xFFFFu)
 
-#define ATCA_CHIP_OPT_POST_EN_SHIFT   (0)
 
-#define ATCA_CHIP_OPT_POST_EN_MASK   (0x01u << ATCA_CHIP_OPT_POST_EN_SHIFT)
 
-#define ATCA_CHIP_OPT_IO_PROT_EN_SHIFT   (1)
 
-#define ATCA_CHIP_OPT_IO_PROT_EN_MASK   (0x01u << ATCA_CHIP_OPT_IO_PROT_EN_SHIFT)
 
-#define ATCA_CHIP_OPT_KDF_AES_EN_SHIFT   (2)
 
-#define ATCA_CHIP_OPT_KDF_AES_EN_MASK   (0x01u << ATCA_CHIP_OPT_KDF_AES_EN_SHIFT)
 
-#define ATCA_CHIP_OPT_ECDH_PROT_SHIFT   (8)
 
-#define ATCA_CHIP_OPT_ECDH_PROT_MASK   (0x03u << ATCA_CHIP_OPT_ECDH_PROT_SHIFT)
 
-#define ATCA_CHIP_OPT_ECDH_PROT(v)   (ATCA_CHIP_OPT_ECDH_PROT_MASK & (v << ATCA_CHIP_OPT_ECDH_PROT_SHIFT))
 
-#define ATCA_CHIP_OPT_KDF_PROT_SHIFT   (10)
 
-#define ATCA_CHIP_OPT_KDF_PROT_MASK   (0x03u << ATCA_CHIP_OPT_KDF_PROT_SHIFT)
 
-#define ATCA_CHIP_OPT_KDF_PROT(v)   (ATCA_CHIP_OPT_KDF_PROT_MASK & (v << ATCA_CHIP_OPT_KDF_PROT_SHIFT))
 
-#define ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT   (12)
 
-#define ATCA_CHIP_OPT_IO_PROT_KEY_MASK   ((uint16_t)0x0Fu << ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT)
 
-#define ATCA_CHIP_OPT_IO_PROT_KEY(v)   (ATCA_CHIP_OPT_IO_PROT_KEY_MASK & (v << ATCA_CHIP_OPT_IO_PROT_KEY_SHIFT))
 
-#define ATCA_KEY_CONFIG_OFFSET(x)   (96UL + (x) * 2u)
 
-#define ATCA_KEY_CONFIG_PRIVATE_SHIFT   (0)
 
-#define ATCA_KEY_CONFIG_PRIVATE_MASK   (0x01u << ATCA_KEY_CONFIG_PRIVATE_SHIFT)
 
-#define ATCA_KEY_CONFIG_PUB_INFO_SHIFT   (1)
 
-#define ATCA_KEY_CONFIG_PUB_INFO_MASK   (0x01u << ATCA_KEY_CONFIG_PUB_INFO_SHIFT)
 
-#define ATCA_KEY_CONFIG_KEY_TYPE_SHIFT   (2)
 
-#define ATCA_KEY_CONFIG_KEY_TYPE_MASK   ((0x07u << ATCA_KEY_CONFIG_KEY_TYPE_SHIFT))
 
-#define ATCA_KEY_CONFIG_KEY_TYPE(v)   ((ATCA_KEY_CONFIG_KEY_TYPE_MASK & ((v) << ATCA_KEY_CONFIG_KEY_TYPE_SHIFT)))
 
-#define ATCA_KEY_CONFIG_LOCKABLE_SHIFT   (5)
 
-#define ATCA_KEY_CONFIG_LOCKABLE_MASK   (0x01u << ATCA_KEY_CONFIG_LOCKABLE_SHIFT)
 
-#define ATCA_KEY_CONFIG_REQ_RANDOM_SHIFT   (6)
 
-#define ATCA_KEY_CONFIG_REQ_RANDOM_MASK   (0x01u << ATCA_KEY_CONFIG_REQ_RANDOM_SHIFT)
 
-#define ATCA_KEY_CONFIG_REQ_AUTH_SHIFT   (7)
 
-#define ATCA_KEY_CONFIG_REQ_AUTH_MASK   (0x01u << ATCA_KEY_CONFIG_REQ_AUTH_SHIFT)
 
-#define ATCA_KEY_CONFIG_AUTH_KEY_SHIFT   (8)
 
-#define ATCA_KEY_CONFIG_AUTH_KEY_MASK   (0x0Fu << ATCA_KEY_CONFIG_AUTH_KEY_SHIFT)
 
-#define ATCA_KEY_CONFIG_AUTH_KEY(v)   (ATCA_KEY_CONFIG_AUTH_KEY_MASK & (v << ATCA_KEY_CONFIG_AUTH_KEY_SHIFT))
 
-#define ATCA_KEY_CONFIG_PERSIST_DIS_SHIFT   (12)
 
-#define ATCA_KEY_CONFIG_PERSIST_DIS_MASK   (0x01u << ATCA_KEY_CONFIG_PERSIST_DIS_SHIFT)
 
-#define ATCA_KEY_CONFIG_RFU_SHIFT   (13)
 
-#define ATCA_KEY_CONFIG_RFU_MASK   (0x01u << ATCA_KEY_CONFIG_RFU_SHIFT)
 
-#define ATCA_KEY_CONFIG_X509_ID_SHIFT   (14)
 
-#define ATCA_KEY_CONFIG_X509_ID_MASK   (0x03u << ATCA_KEY_CONFIG_X509_ID_SHIFT)
 
-#define ATCA_KEY_CONFIG_X509_ID(v)   (ATCA_KEY_CONFIG_X509_ID_MASK & (v << ATCA_KEY_CONFIG_X509_ID_SHIFT))
 
- - - - - - - - - - - -

-Typedefs

-typedef struct atca_sha256_ctx atca_sha256_ctx_t
 
-typedef atca_sha256_ctx_t atca_hmac_sha256_ctx_t
 
-typedef struct ATCA_PACKED atsha204a_config_s atsha204a_config_t
 
-typedef struct ATCA_PACKED atecc508a_config_s atecc508a_config_t
 
-typedef struct ATCA_PACKED atecc608_config_s atecc608_config_t
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS calib_wakeup_i2c (ATCADevice device)
 basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.
 
ATCA_STATUS calib_wakeup (ATCADevice device)
 wakeup the CryptoAuth device
 
ATCA_STATUS calib_idle (ATCADevice device)
 idle the CryptoAuth device
 
ATCA_STATUS calib_sleep (ATCADevice device)
 invoke sleep on the CryptoAuth device
 
ATCA_STATUS calib_exit (ATCADevice device)
 common cleanup code which idles the device after any operation
 
ATCA_STATUS calib_get_addr (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr)
 Compute the address given the zone, slot, block, and offset.
 
ATCA_STATUS calib_get_zone_size (ATCADevice device, uint8_t zone, uint16_t slot, size_t *size)
 Gets the size of the specified zone in bytes.
 
ATCA_STATUS calib_ca2_get_addr (uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr)
 Compute the address given the zone, slot, block, and offset for the device.
 
-ATCA_STATUS calib_is_locked (ATCADevice device, uint8_t zone, bool *is_locked)
 
-ATCA_STATUS calib_is_slot_locked (ATCADevice device, uint16_t slot, bool *is_locked)
 
ATCA_STATUS calib_ca2_is_locked (ATCADevice device, uint8_t zone, bool *is_locked)
 Use Info command to check config/data is locked or not.
 
ATCA_STATUS calib_ca2_is_data_locked (ATCADevice device, bool *is_locked)
 Use Info command to check ECC204 Data zone lock status.
 
ATCA_STATUS calib_ca2_is_config_locked (ATCADevice device, bool *is_locked)
 Executes Read command, which reads the configuration zone to see if the specified slot is locked.
 
-ATCADeviceType calib_get_devicetype (uint8_t revision[4])
 Parse the revision field to get the device type.
 
-ATCADeviceType calib_get_devicetype_with_device_id (uint8_t device_id, uint8_t device_revision)
 
ATCA_STATUS calib_info_base (ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data)
 Issues an Info command, which return internal device information and can control GPIO and the persistent latch.
 
ATCA_STATUS calib_info (ATCADevice device, uint8_t *revision)
 Use the Info command to get the device revision (DevRev).
 
ATCA_STATUS calib_info_privkey_valid (ATCADevice device, uint16_t key_id, uint8_t *is_valid)
 Use Info command to check ECC Private key stored in key slot is valid or not.
 
ATCA_STATUS calib_info_lock_status (ATCADevice device, uint16_t param2, uint8_t *is_locked)
 Use Info command to ECC204,TA010 config/data zone lock status.
 
ATCA_STATUS calib_info_chip_status (ATCADevice device, uint8_t *chip_status)
 Use Info command to get ECC204,TA010,SHA10x chip status.
 
-

Detailed Description

-

These methods provide a simple API to CryptoAuth chips.

-

Function Documentation

- -

◆ calib_ca2_get_addr()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_ca2_get_addr (uint8_t zone,
uint16_t slot,
uint8_t block,
uint8_t offset,
uint16_t * addr 
)
-
- -

Compute the address given the zone, slot, block, and offset for the device.

-
Parameters
- - - - - - -
[in]zoneZone to get address from. Config(1) or Data(0) which requires a slot.
[in]slotSlot Id number for data zone and zero for other zones.
[in]blockBlock number within the data zone .
[in]offsetAalways zero.
[out]addrPointer to the address of data or configuration zone.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_ca2_is_config_locked()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_ca2_is_config_locked (ATCADevice device,
bool * is_locked 
)
-
- -

Executes Read command, which reads the configuration zone to see if the specified slot is locked.

-
Parameters
- - - - -
[in]deviceDevice context pointer
[in]slotSlot to query for locked (slot 0-15)
[out]is_lockedLock state returned here. True if locked.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-

Use Info command to check ECC204 Config zone lock status

-
Parameters
- - - -
[in]deviceDevice context pointer
[out]is_lockedreturn lock status
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code
- -
-
- -

◆ calib_ca2_is_data_locked()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_ca2_is_data_locked (ATCADevice device,
bool * is_locked 
)
-
- -

Use Info command to check ECC204 Data zone lock status.

-
Parameters
- - - -
[in]deviceDevice context pointer
[out]is_lockedreturn lock status
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code
- -
-
- -

◆ calib_ca2_is_locked()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_ca2_is_locked (ATCADevice device,
uint8_t zone,
bool * is_locked 
)
-
- -

Use Info command to check config/data is locked or not.

-
Parameters
- - - - -
[in]deviceDevice contect pointer
[in]zoneConfig/Data zone
[out]is_lockedreturn lock status here
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code
- -
-
- -

◆ calib_exit()

- -
-
- - - - - - - - -
ATCA_STATUS calib_exit (ATCADevice device)
-
- -

common cleanup code which idles the device after any operation

-
Parameters
- - -
[in]deviceDevice context pointer
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_get_addr()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_get_addr (uint8_t zone,
uint16_t slot,
uint8_t block,
uint8_t offset,
uint16_t * addr 
)
-
- -

Compute the address given the zone, slot, block, and offset.

-
Parameters
- - - - - - -
[in]zoneZone to get address from. Config(0), OTP(1), or Data(2) which requires a slot.
[in]slotSlot Id number for data zone and zero for other zones.
[in]blockBlock number within the data or configuration or OTP zone .
[in]offsetOffset Number within the block of data or configuration or OTP zone.
[out]addrPointer to the address of data or configuration or OTP zone.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_get_zone_size()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_get_zone_size (ATCADevice device,
uint8_t zone,
uint16_t slot,
size_t * size 
)
-
- -

Gets the size of the specified zone in bytes.

-
Parameters
- - - - - -
[in]deviceDevice context pointer
[in]zoneZone to get size information from. Config(0), OTP(1), or Data(2) which requires a slot.
[in]slotIf zone is Data(2), the slot to query for size.
[out]sizeZone size is returned here.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_idle()

- -
-
- - - - - - - - -
ATCA_STATUS calib_idle (ATCADevice device)
-
- -

idle the CryptoAuth device

-
Parameters
- - -
[in]deviceDevice context pointer
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_info()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_info (ATCADevice device,
uint8_t * revision 
)
-
- -

Use the Info command to get the device revision (DevRev).

-
Parameters
- - - -
[in]deviceDevice context pointer
[out]revisionDevice revision is returned here (4 bytes).
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_info_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_info_base (ATCADevice device,
uint8_t mode,
uint16_t param2,
uint8_t * out_data 
)
-
- -

Issues an Info command, which return internal device information and can control GPIO and the persistent latch.

-
Parameters
- - - - - -
[in]deviceDevice context pointer
[in]modeSelects which mode to be used for info command.
[in]param2Selects the particular fields for the mode.
[out]out_dataResponse from info command (4 bytes). Can be set to NULL if not required.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_info_chip_status()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_info_chip_status (ATCADevice device,
uint8_t * chip_status 
)
-
- -

Use Info command to get ECC204,TA010,SHA10x chip status.

-
Parameters
- - - -
[in]deviceDevice context pointer
[out]chip_statusreturn chip status here
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_info_lock_status()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_info_lock_status (ATCADevice device,
uint16_t param2,
uint8_t * is_locked 
)
-
- -

Use Info command to ECC204,TA010 config/data zone lock status.

-
Parameters
- - - - -
[in]deviceDevice context pointer
[in]param2selects the zone and slot
[out]is_lockedreturn lock status here
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_info_privkey_valid()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS calib_info_privkey_valid (ATCADevice device,
uint16_t key_id,
uint8_t * is_valid 
)
-
- -

Use Info command to check ECC Private key stored in key slot is valid or not.

-
Parameters
- - - - -
[in]deviceDevice context pointer
[in]key_idECC private key slot id For ECC204,TA010 key_id is 0x00
[out]is_validreturn private key is valid or invalid
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_sleep()

- -
-
- - - - - - - - -
ATCA_STATUS calib_sleep (ATCADevice device)
-
- -

invoke sleep on the CryptoAuth device

-
Parameters
- - -
[in]deviceDevice context pointer
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_wakeup()

- -
-
- - - - - - - - -
ATCA_STATUS calib_wakeup (ATCADevice device)
-
- -

wakeup the CryptoAuth device

-
Parameters
- - -
[in]deviceDevice context pointer
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ calib_wakeup_i2c()

- -
-
- - - - - - - - -
ATCA_STATUS calib_wakeup_i2c (ATCADevice device)
-
- -

basic API methods are all prefixed with atcab_ (CryptoAuthLib Basic) the fundamental premise of the basic API is it is based on a single interface instance and that instance is global, so all basic API commands assume that one global device is the one to operate on.

-

Drive the SDA pin low for wake up Set i2c device addr as 0U to drive SDA low

-

I2C general call should not interpreted as an addr write

-

Set the i2c device address

- -
-
-
-
- - - - diff --git a/a01444.js b/a01444.js deleted file mode 100644 index 13211bfda..000000000 --- a/a01444.js +++ /dev/null @@ -1,29 +0,0 @@ -var a01444 = -[ - [ "calib directory - Purpose", "a01444.html#md_lib_calib_README", null ], - [ "atca_sha256_ctx", "a01616.html", [ - [ "block", "a01616.html#a6d3f030387c74b86ec476d0c99a46c34", null ], - [ "block_size", "a01616.html#ae7cf177799e4c934821f6540aa5a33e5", null ], - [ "total_msg_size", "a01616.html#aab3e376d6c18921a1ee303e2b703c668", null ] - ] ], - [ "atsha204a_config_s", "a01624.html", null ], - [ "atecc508a_config_s", "a01628.html", null ], - [ "atecc608_config_s", "a01632.html", null ], - [ "calib_ca2_get_addr", "a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd", null ], - [ "calib_ca2_is_config_locked", "a01444.html#gad7d44a63b0871068bc30abb0faed78f9", null ], - [ "calib_ca2_is_data_locked", "a01444.html#ga801b481ac3ff13401fc2a45817d05db4", null ], - [ "calib_ca2_is_locked", "a01444.html#ga55738f97714ea089a988e1853d8d6224", null ], - [ "calib_exit", "a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927", null ], - [ "calib_get_addr", "a01444.html#gae51a67781e9e4618e669db1c999e6ec2", null ], - [ "calib_get_devicetype", "a01444.html#ga00e2fc1d5b517b275066c31be0be2304", null ], - [ "calib_get_zone_size", "a01444.html#ga023735b1c0b10e70832d9a957bc99ae3", null ], - [ "calib_idle", "a01444.html#ga59750d83d93368b2944f57bb38bf4d1f", null ], - [ "calib_info", "a01444.html#ga132cfbb5c581c5cc5adf5350d4161966", null ], - [ "calib_info_base", "a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0", null ], - [ "calib_info_chip_status", "a01444.html#gac33e6d38d506b4e71618063d1b4a7499", null ], - [ "calib_info_lock_status", "a01444.html#gacd82ed053319a63bbe06755632e377bc", null ], - [ "calib_info_privkey_valid", "a01444.html#ga39e3e31e7573d3d73f4b757db7704cce", null ], - [ "calib_sleep", "a01444.html#gad26b70951a0da6d80fb98027faae7a1f", null ], - [ "calib_wakeup", "a01444.html#gafbc037d57a4cc4fec6a2f291736170cb", null ], - [ "calib_wakeup_i2c", "a01444.html#ga884790e08be94431e1fbe92bf6106e06", null ] -]; \ No newline at end of file diff --git a/a01445.html b/a01445.html deleted file mode 100644 index 31485ed96..000000000 --- a/a01445.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: Software crypto methods (atcac_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Software crypto methods (atcac_)
-
-
- -

These methods provide a software implementation of various crypto algorithms. -More...

- - -

crypto directory - Purpose

This directory contains software implementations of cryptographic functions. The functions at the base level are wrappers that will point to the final implementations of the software crypto functions.
- - - - - - - - - -

-Functions

-ATCA_STATUS atcac_sw_sha1 (const uint8_t *data, size_t data_size, uint8_t digest[(20U)])
 
-ATCA_STATUS atcac_sw_sha2_256 (const uint8_t *data, size_t data_size, uint8_t digest[(32U)])
 
-ATCA_STATUS atcac_sha256_hmac_ctr_iteration (struct atcac_hmac_ctx *ctx, uint8_t iteration, uint16_t length, const uint8_t *label, size_t label_len, const uint8_t *data, size_t data_len, uint8_t digest[(32U)])
 
-ATCA_STATUS atcac_sha256_hmac_counter (uint8_t *key, size_t key_len, const uint8_t *label, size_t label_len, const uint8_t *data, size_t data_len, uint8_t *digest, size_t diglen)
 
-

Detailed Description

-

These methods provide a software implementation of various crypto algorithms.

-
-
- - - - diff --git a/a01445.js b/a01445.js deleted file mode 100644 index 627cfdc57..000000000 --- a/a01445.js +++ /dev/null @@ -1,4 +0,0 @@ -var a01445 = -[ - [ "crypto directory - Purpose", "a01445.html#md_lib_crypto_README", null ] -]; \ No newline at end of file diff --git a/a01446.html b/a01446.html deleted file mode 100644 index 5c5a016a2..000000000 --- a/a01446.html +++ /dev/null @@ -1,3410 +0,0 @@ - - - - - - - -CryptoAuthLib: Hardware abstraction layer (hal_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Hardware abstraction layer (hal_)
-
-
- -

These methods define the hardware abstraction layer for communicating with a CryptoAuth device. -More...

- - -

HAL Directory - Purpose

This directory contains all the Hardware Abstraction Layer (HAL) files used to adapt the upper levels of atca-ng and abstractions to physical hardware.HAL contains physical implementations for I2C, SWI, SPI, UART and timers for specific hardware platforms.Include just those HAL files you require based on platform type.

-Cryptoauthlib HAL Architecture

-

Cryptoauthlib has several intermediate conceptual layers

-
    -
  1. The highest layer of cryptoauthlib (outside of integration APIS) that may be used with an application is the atcab_ api functions. These are general purpose functions that present a simple and consistent crypto interface to the application regardless of the device being used.
  2. -
  3. calib_, talib_ APIs are the library functions behind atcab_ ones that generate the correct command packets and process the received responses. Device specific logic is handled by the library here
  4. -
  5. hal_ these functions perform the transmit/recieve of data for a given interface. These are split into sublayers
      -
    • The HAL layer is the first hal layer that presents the interface expected by the higher level library. When using a native driver and no further interpretation is required this layer is all that is required.
    • -
    • The PHY layer if for hals that perform an interpretation or additional protocol logic. In this situation the HAL performs protocol interpretation while the phy performs the physical communication
    • -
    -
  6. -
-

-HAL and PHY Requirements

-

The hal and phy layers have the same construction. A hal or phy must have the following functions and their signatures

-
    -
  • ATCA_STATUS hal_<name>init(ATCAIface iface, ATCAIfaceCfg *cfg);
  • -
  • ATCA_STATUS hal<name>post_init(ATCAIface iface);
  • -
  • ATCA_STATUS hal<name>send(ATCAIface iface, uint8_t address, uint8_t *txdata, int txlength);
  • -
  • ATCA_STATUS hal<name>receive(ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength);
  • -
  • ATCA_STATUS hal<name>control(ATCAIface iface, uint8_t option, void* param, size_t paramlen);
  • -
  • ATCA_STATUS hal<name>_release(void *hal_data);
  • -
-

If the hal is a native driver no phy is required. See the tables below for which hal is required to be ported based on a configured interface

-

-CryptoAuthLib Supported HAL Layers

- - - - - - - - - - - - - - - - - - - -
Device Interface Physical Interface HAL PHY
i2c i2c hal_i2c
gpio hal_i2c_gpio hal_gpio
spi spi hal_spi
swi uart hal_swi hal_uart
gpio hal_swi_gpio hal_gpio
any uart kit hal_uart
hid kit hal_hid
any (user provided) kit_bridge
-

-Microchip Harmony 3 for all PIC32 & ARM products - Use the Harmony 3 Configurator to generate and configure prjects

-

Obtain library and configure using Harmony 3

- - - - - - - - - -
Interface Files API Notes
I2C hal_i2c_harmony.c plib.h For all Harmony 3 based projects
SPI hal_spi_harmony.c plib.h
UART hal_uart_harmony.c plib.h
-

-Microchip 8 & 16 bit products - AVR, PIC16/18, PIC24/DSPIC

-

Obtain library and integration through Microchip Code Configurator

-

-OS & RTOS integrations

-

Use CMake to configure the library in Linux, Windows, and MacOS environments

- - - - - - - - - - - - - - - -
OS Interface Files API Notes
Linux I2C hal_linux_i2c_userspace.c/h i2c-dev
Linux SPI hal_linux_spi_userspace.c/h spidev
Linux/Mac hal_linux.c For all Linux/Mac projects
Windows hal_windows.c For all Windows projects
All kit-hid hal_all_platforms_kit_hidapi.c/h hidapi Works for Windows, Linux, and Mac
freeRTOS hal_freertos.c freeRTOS common routines
-

-Legacy Support - <a href="https://www.microchip.com/start" >Atmel START</a> for AVR, ARM based processesors (SAM)

- - - - - - - - - -
Interface Files API Notes
hal_timer_start.c START Timer implementation
I2C hal_i2c_start.c/h START
SWI swi_uart_start.c/h START SWI using UART
-

-Legacy Support - ASF3 for ARM Cortex-m0 & Cortex-m based processors (SAM)

- - - - - - - - - -
SAM Micros Interface Files API Notes
cortex-m0 I2C hal_sam0_i2c_asf.c/h ASF3 SAMD21, SAMB11, etc
cortex-m3/4/7 I2C hal_sam_i2c_asf.c/h ASF3 SAM4S, SAMG55, SAMV71, etc
all hal_sam_timer_asf.c ASF3 Common timer hal for all platforms
-
- - - - - - - - - - - - - - - - - -

-Data Structures

struct  atca_hal_kit_phy_t
 
struct  atca_hal_shm_t
 
struct  i2c_start_instance
 
struct  atca_i2c_host_s
 
struct  i2c_sam_instance
 
struct  atcaI2Cmaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
struct  atcaSWImaster
 this is the hal_data for ATCA HAL for ASF SERCOM More...
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Macros

-#define ATCA_POLLING_INIT_TIME_MSEC   1
 
-#define ATCA_POLLING_FREQUENCY_TIME_MSEC   2
 
-#define ATCA_POLLING_MAX_TIME_MSEC   2500
 
-#define ATCA_HAL_CONTROL_WAKE   (0U)
 Execute the hardware specific wake - generally only for kits.
 
-#define ATCA_HAL_CONTROL_IDLE   (1U)
 Execute the hardware specific idle - generally only for kits.
 
-#define ATCA_HAL_CONTROL_SLEEP   (2U)
 Execute the hardware specific sleep - generally only for kits.
 
-#define ATCA_HAL_CONTROL_RESET   (3U)
 Execute the hardware specific reset - generally only for kits.
 
-#define ATCA_HAL_CONTROL_SELECT   (4U)
 Select the device - assert CS, open device, etc.
 
-#define ATCA_HAL_CONTROL_DESELECT   (5U)
 Select the device - de-assert CS, release device, etc.
 
-#define ATCA_HAL_CHANGE_BAUD   (6U)
 Change the datarate of the phy.
 
-#define ATCA_HAL_FLUSH_BUFFER   (7U)
 If the phy has a buffer make sure all bytes are transmitted.
 
-#define ATCA_HAL_CONTROL_DIRECTION   (8U)
 Set the PIN mode (in vs out)
 
-#define MAX_I2C_BUSES   3
 
-#define KIT_MAX_SCAN_COUNT   8
 
-#define KIT_MAX_TX_BUF   32
 
-#define KIT_TX_WRAP_SIZE   (10)
 
-#define KIT_MSG_SIZE   (32u)
 
-#define KIT_RX_WRAP_SIZE   (KIT_MSG_SIZE + 6u)
 
#define MAX_SWI_BUSES   6
 
-#define RECEIVE_MODE   0
 
-#define TRANSMIT_MODE   1
 
-#define RX_DELAY   10
 
-#define TX_DELAY   90
 
-#define DEBUG_PIN_1   EXT2_PIN_5
 
-#define DEBUG_PIN_2   EXT2_PIN_6
 
#define MAX_SWI_BUSES   6
 
-#define RECEIVE_MODE   0
 
-#define TRANSMIT_MODE   1
 
-#define RX_DELAY   10
 
-#define TX_DELAY   93
 
- - - - - - - - - - - - - - - - - - - - - - - -

-Typedefs

-typedef void * hal_mutex_t
 Generic mutex type definition for most systems.
 
-typedef void(* start_change_baudrate) (ATCAIface iface, uint32_t speed)
 
-typedef struct i2c_start_instance i2c_start_instance_t
 
-typedef struct atca_i2c_host_s atca_i2c_host_t
 
-typedef void(* sam_change_baudrate) (ATCAIface iface, uint32_t speed)
 
-typedef struct i2c_sam_instance i2c_sam_instance_t
 
-typedef struct atcaI2Cmaster ATCAI2CMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
-typedef struct atcaSWImaster ATCASWIMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
-typedef struct atcaSWImaster ATCASWIMaster_t
 this is the hal_data for ATCA HAL for ASF SERCOM
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

ATCA_STATUS hal_iface_init (ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy)
 Standard HAL API for ATCA to initialize a physical interface.
 
ATCA_STATUS hal_iface_release (ATCAIfaceType iface_type, void *hal_data)
 releases a physical interface, HAL knows how to interpret hal_data
 
ATCA_STATUS hal_check_wake (const uint8_t *response, int response_size)
 Utility function for hal_wake to check the reply.
 
void atca_delay_ms (uint32_t ms)
 Timer API for legacy implementations.
 
void atca_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
void hal_delay_ms (uint32_t delay)
 Timer API implemented at the HAL level.
 
void hal_delay_us (uint32_t delay)
 This function delays for a number of microseconds.
 
ATCA_STATUS hal_create_mutex (void **ppMutex, const char *pName)
 Optional hal interfaces.
 
-ATCA_STATUS hal_init_mutex (void *pMutex, bool shared)
 
-ATCA_STATUS hal_destroy_mutex (void *pMutex)
 
-ATCA_STATUS hal_lock_mutex (void *pMutex)
 
-ATCA_STATUS hal_unlock_mutex (void *pMutex)
 
-ATCA_STATUS hal_alloc_shared (void **pShared, size_t size, const char *pName, bool *initialized)
 
-ATCA_STATUS hal_free_shared (void *pShared, size_t size)
 
ATCA_STATUS hal_iface_register_hal (ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy)
 Register/Replace a HAL with a.
 
uint8_t hal_is_command_word (uint8_t word_address)
 Utility function for hal_wake to check the reply.
 
ATCA_STATUS hal_kit_hid_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of Kit USB HID init.
 
ATCA_STATUS hal_kit_hid_post_init (ATCAIface iface)
 HAL implementation of Kit HID post init.
 
ATCA_STATUS hal_kit_hid_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of kit protocol send over USB HID.
 
ATCA_STATUS hal_kit_hid_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of send over USB HID.
 
ATCA_STATUS hal_kit_hid_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_kit_hid_release (void *hal_data)
 Close the physical port for HID.
 
-void * hal_malloc (size_t size)
 
-void hal_free (void *ptr)
 
void hal_rtos_delay_ms (uint32_t delay)
 This function delays for a number of milliseconds.
 
ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[], int max_buses)
 discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge
 
ATCA_STATUS hal_i2c_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any CryptoAuth devices on a given logical bus number
 
ATCA_STATUS hal_i2c_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
 HAL implementation of I2C post init.
 
ATCA_STATUS hal_i2c_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of I2C send over START.
 
ATCA_STATUS hal_i2c_receive (ATCAIface iface, uint8_t address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of I2C receive function for START I2C.
 
ATCA_STATUS change_i2c_speed (ATCAIface iface, uint32_t speed)
 method to change the bus speec of I2C
 
ATCA_STATUS hal_i2c_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_i2c_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_i2c_init (void *hal, ATCAIfaceCfg *cfg)
 hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.
 
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
 wake up CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
 idle CryptoAuth device using I2C bus
 
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
 sleep CryptoAuth device using I2C bus
 
ATCA_STATUS hal_kit_attach_phy (ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy)
 Helper function that connects a physical layer context structure that will be used by the kit protocol bridge.
 
ATCA_STATUS hal_kit_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 HAL implementation of Kit USB HID init.
 
ATCA_STATUS hal_kit_post_init (ATCAIface iface)
 HAL implementation of Kit HID post init.
 
ATCA_STATUS hal_kit_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of kit protocol send over USB HID.
 
ATCA_STATUS hal_kit_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxsize)
 HAL implementation of send over USB HID.
 
ATCA_STATUS hal_kit_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Kit Protocol Control.
 
ATCA_STATUS hal_kit_release (void *hal_data)
 Close the physical port for HID.
 
-ATCA_STATUS hal_check_pid (hal_pid_t pid)
 Check if the pid exists in the system.
 
void atca_delay_10us (uint32_t delay)
 This function delays for a number of tens of microseconds.
 
ATCA_STATUS hal_spi_discover_buses (int spi_buses[], int max_buses)
 discover spi buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS hal_spi_discover_devices (int bus_num, ATCAIfaceCfg cfg[], int *found)
 discover any TA10x devices on a given logical bus number
 
ATCA_STATUS hal_spi_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an SPI interface using given config
 
ATCA_STATUS hal_spi_post_init (ATCAIface iface)
 HAL implementation of SPI post init.
 
ATCA_STATUS hal_spi_select (ATCAIface iface)
 HAL implementation to assert the device chip select.
 
ATCA_STATUS hal_spi_deselect (ATCAIface iface)
 HAL implementation to deassert the device chip select.
 
ATCA_STATUS hal_spi_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of SPI send over Harmony.
 
ATCA_STATUS hal_spi_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of SPI receive function for HARMONY SPI.
 
ATCA_STATUS hal_spi_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_spi_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
ATCA_STATUS hal_swi_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 initialize an SWI interface using given config
 
ATCA_STATUS hal_swi_post_init (ATCAIface iface)
 HAL implementation of SWI post init.
 
ATCA_STATUS hal_swi_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 HAL implementation of SWI send command over UART.
 
ATCA_STATUS hal_swi_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 HAL implementation of SWI receive function over UART.
 
ATCA_STATUS hal_swi_wake (ATCAIface iface)
 Send Wake flag via SWI.
 
ATCA_STATUS hal_swi_sleep (ATCAIface iface)
 Send Sleep flag via SWI.
 
ATCA_STATUS hal_swi_idle (ATCAIface iface)
 Send Idle flag via SWI.
 
ATCA_STATUS hal_swi_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations for the kit protocol.
 
ATCA_STATUS hal_swi_release (void *hal_data)
 manages reference count on given bus and releases resource if no more refences exist
 
const char * kit_id_from_devtype (ATCADeviceType devtype)
 
const char * kit_interface_from_kittype (ATCAKitType kittype)
 
const char * kit_interface (ATCAKitType kittype)
 
-ATCA_STATUS kit_init (ATCAIface iface, ATCAIfaceCfg *cfg)
 
-ATCA_STATUS kit_post_init (ATCAIface iface)
 
-ATCA_STATUS kit_send (ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 
-ATCA_STATUS kit_receive (ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxsize)
 
-ATCA_STATUS kit_control (ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
-ATCA_STATUS kit_release (void *hal_data)
 
-ATCA_STATUS kit_wrap_cmd (ATCAIface iface, uint8_t word_address, const uint8_t *txdata, int txlen, char *pkitcmd, int *nkitcmd)
 
-ATCA_STATUS kit_parse_rsp (const char *pkitbuf, int nkitbuf, uint8_t *kitstatus, uint8_t *rxdata, int *datasize)
 
-ATCA_STATUS kit_wake (ATCAIface iface)
 
-ATCA_STATUS kit_idle (ATCAIface iface)
 
-ATCA_STATUS kit_sleep (ATCAIface iface)
 
-ATCA_STATUS kit_phy_send (ATCAIface iface, uint8_t *txdata, int txlength)
 
-ATCA_STATUS kit_phy_receive (ATCAIface iface, uint8_t *rxdata, int *rxsize)
 
ATCA_STATUS swi_uart_init (ATCASWIMaster_t *instance)
 Implementation of SWI UART init.
 
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_t *instance)
 Implementation of SWI UART deinit.
 
void swi_uart_setbaud (ATCASWIMaster_t *instance, uint32_t baudrate)
 implementation of SWI UART change baudrate.
 
void swi_uart_mode (ATCASWIMaster_t *instance, uint8_t mode)
 implementation of SWI UART change mode.
 
void swi_uart_discover_buses (int swi_uart_buses[], int max_buses)
 discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge
 
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_t *instance, uint8_t data)
 HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.
 
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_t *instance, uint8_t *data)
 HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.
 
- - - -

-Variables

-struct port_config pin_conf
 
-

Detailed Description

-

These methods define the hardware abstraction layer for communicating with a CryptoAuth device.

-

These methods define the hardware abstraction layer for communicating with a CryptoAuth device using SWI Interface.

-

These methods define the hardware abstraction layer for communicating with a TA10x device.

-

< Uncomment when debugging

-

These methods define the hardware abstraction layer for communicating with a CryptoAuth device using I2C driver of ASF.

-

Macro Definition Documentation

- -

◆ MAX_SWI_BUSES [1/2]

- -
-
- - - - -
#define MAX_SWI_BUSES   6
-
-
    -
  • this HAL implementation assumes you've included the ASF SERCOM UART libraries in your project, otherwise, the HAL layer will not compile because the ASF UART drivers are a dependency *
  • -
- -
-
- -

◆ MAX_SWI_BUSES [2/2]

- -
-
- - - - -
#define MAX_SWI_BUSES   6
-
-
    -
  • this HAL implementation assumes you've included the ASF SERCOM UART libraries in your project, otherwise, the HAL layer will not compile because the ASF UART drivers are a dependency *
  • -
- -
-
-

Function Documentation

- -

◆ atca_delay_10us()

- -
-
- - - - - - - - -
void atca_delay_10us (uint32_t delay)
-
- -

This function delays for a number of tens of microseconds.

-
Parameters
- - -
[in]delaynumber of 0.01 milliseconds to delay
-
-
-
Parameters
- - -
[in]delaynumber of 0.01 milliseconds to delay
-
-
- -
-
- -

◆ atca_delay_ms()

- -
-
- - - - - - - - -
void atca_delay_ms (uint32_t delay)
-
- -

Timer API for legacy implementations.

-

This function delays for a number of milliseconds.

-
   You can override this function if you like to do
-   something else in your system while delaying.
-
Parameters
- - -
[in]delaynumber of milliseconds to delay
-
-
-
   You can override this function if you like to do
-   something else in your system while delaying.
-
Parameters
- - -
[in]delaynumber of milliseconds to delay
-
-
- -
-
- -

◆ atca_delay_us()

- -
-
- - - - - - - - -
void atca_delay_us (uint32_t delay)
-
- -

This function delays for a number of microseconds.

-
Parameters
- - -
[in]delaynumber of 0.001 milliseconds to delay
-
-
-
Parameters
- - -
[in]delaynumber of microseconds to delay
-
-
-
Parameters
- - -
[in]delaynumber of 0.001 milliseconds to delay
-
-
- -
-
- -

◆ change_i2c_speed()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS change_i2c_speed (ATCAIface iface,
uint32_t speed 
)
-
- -

method to change the bus speec of I2C

-

method to change the bus speed of I2C

-
Parameters
- - - - - -
[in]ifaceinterface on which to change bus speed
[in]speedbaud rate (typically 100000 or 400000)
[in]ifaceinterface on which to change bus speed
[in]speedbaud rate (typically 100000 or 400000)
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_check_wake()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_check_wake (const uint8_t * response,
int response_size 
)
-
- -

Utility function for hal_wake to check the reply.

-
Parameters
- - - -
[in]responseWake response to be checked.
[in]response_sizeSize of the response to check.
-
-
-
Returns
ATCA_SUCCESS for expected wake, ATCA_STATUS_SELFTEST_ERROR if the power on self test failed, ATCA_WAKE_FAILED for other failures.
- -
-
- -

◆ hal_create_mutex()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_create_mutex (void ** ppMutex,
const char * pName 
)
-
- -

Optional hal interfaces.

-

Application callback for creating a mutex object.

-
Parameters
- - - - - -
[in,out]ppMutexlocation to receive ptr to mutex
[in,out]pNameString used to identify the mutex
[IN/OUT]ppMutex location to receive ptr to mutex
[IN]pName Name of the mutex for systems using named objects
-
-
- -
-
- -

◆ hal_delay_ms()

- -
-
- - - - - - - - -
void hal_delay_ms (uint32_t delay)
-
- -

Timer API implemented at the HAL level.

-

This function delays for a number of milliseconds.

-
Parameters
- - -
[in]delaynumber of milliseconds to delay
-
-
-
   You can override this function if you like to do
-   something else in your system while delaying.
-
Parameters
- - -
[in]delaynumber of milliseconds to delay
-
-
- -
-
- -

◆ hal_delay_us()

- -
-
- - - - - - - - -
void hal_delay_us (uint32_t delay)
-
- -

This function delays for a number of microseconds.

-
Parameters
- - -
[in]delaynumber of microseconds to delay
-
-
-
Parameters
- - -
[in]delaynumber of microseconds to delay
-
-
- -
-
- -

◆ hal_i2c_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations for the kit protocol.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_discover_buses()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_discover_buses (int i2c_buses[],
int max_buses 
)
-
- -

discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-prior knowledge

-

This HAL implementation assumes you've included the ASF TWI libraries in your project, otherwise, the HAL layer will not compile because the ASF TWI drivers are a dependency.

-

logical to physical bus mapping structure

-

discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge

-
Parameters
- - - -
[in]i2c_buses- an array of logical bus numbers
[in]max_buses- maximum number of buses the app wants to attempt to discover
-
-
-
Returns
ATCA_SUCCESS
-

discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge

Parameters
- - - -
[in]i2c_buses- an array of logical bus numbers
[in]max_buses- maximum number of buses the app wants to attempt to discover
-
-
-
Returns
ATCA_SUCCESS
-

discover i2c buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge

Parameters
- - - -
[in]i2c_buses- an array of logical bus numbers
[in]max_buses- maximum number of buses the app wants to attempt to discover return ATCA_SUCCESS
-
-
- -
-
- -

◆ hal_i2c_discover_devices()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_discover_devices (int bus_num,
ATCAIfaceCfg cfg[],
int * found 
)
-
- -

discover any CryptoAuth devices on a given logical bus number

-
Parameters
- - - - -
[in]bus_numlogical bus number on which to look for CryptoAuth devices
[out]cfgpointer to head of an array of interface config structures which get filled in by this method
[out]foundnumber of devices found on this bus
-
-
-
Returns
ATCA_SUCCESS
-
Parameters
- - - - -
[in]bus_num- logical bus number on which to look for CryptoAuth devices
[out]cfg[]- pointer to head of an array of interface config structures which get filled in by this method
[out]*found- number of devices found on this bus
-
-
-
Returns
ATCA_SUCCESS
-
Parameters
- - - - -
[in]bus_numLogical bus number on which to look for CryptoAuth devices
[out]cfgPointer to head of an array of interface config structures which get filled in by this method
[out]foundNumber of devices found on this bus
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_idle()

- -
-
- - - - - - - - -
ATCA_STATUS hal_i2c_idle (ATCAIface iface)
-
- -

idle CryptoAuth device using I2C bus

-
Parameters
- - -
[in]ifaceinterface to logical device to idle
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ifaceinterface to logical device to idle
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_init() [1/2]

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.

-

HAL implementation of I2C init.

-
    -
  • this HAL implementation assumes you've included the START Twi libraries in your project, otherwise, the HAL layer will not compile because the START TWI drivers are a dependency *
  • -
-

initialize an I2C interface using given config

Parameters
- - - -
[in]hal- opaque ptr to HAL data
[in]cfg- interface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-

this implementation assumes I2C peripheral has been enabled by user. It only initialize an I2C interface using given config.

-
Parameters
- - - -
[in]halpointer to HAL specific data that is maintained by this HAL
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_init() [2/2]

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_init (void * hal,
ATCAIfaceCfgcfg 
)
-
- -

hal_i2c_init manages requests to initialize a physical interface. it manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.

-

hal_i2c_init manages requests to initialize a physical interface. It manages use counts so when an interface has released the physical layer, it will disable the interface for some other use. You can have multiple ATCAIFace instances using the same bus, and you can have multiple ATCAIFace instances on multiple i2c buses, so hal_i2c_init manages these things and ATCAIFace is abstracted from the physical details.

-

initialize an I2C interface using given config

-
    -
  • this HAL implementation assumes you've included the START Twi libraries in your project, otherwise, the HAL layer will not compile because the START TWI drivers are a dependency *
  • -
-

initialize an I2C interface using given config

Parameters
- - - -
[in]hal- opaque ptr to HAL data
[in]cfg- interface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
    -
  • this HAL implementation assumes you've included the ASF SERCOM I2C libraries in your project, otherwise, the HAL layer will not compile because the ASF I2C drivers are a dependency *
    Parameters
    - - - -
    [in]hal- opaque ptr to HAL data
    [in]cfg- interface configuration
    -
    -
    -
    Returns
    ATCA_SUCCESS on success, otherwise an error code.
    -initialize an I2C interface using given config
  • -
-
Parameters
- - - -
[in]hal- opaque ptr to HAL data
[in]cfg- interface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
    -
  • this HAL implementation assumes you've included the ASF Twi libraries in your project, otherwise, the HAL layer will not compile because the ASF TWI drivers are a dependency *
  • -
-

initialize an I2C interface using given config

Parameters
- - - -
[in]hal- opaque ptr to HAL data
[in]cfg- interface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_i2c_post_init (ATCAIface iface)
-
- -

HAL implementation of I2C post init.

-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_SUCCESS
-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_i2c_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

HAL implementation of I2C receive function for START I2C.

-

HAL implementation of I2C receive function for ASF I2C.

-

HAL implementation of I2C receive function.

-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ifaceDevice to interact with.
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]addressdevice address
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice word address
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_i2c_release (void * hal_data)
-
- -

manages reference count on given bus and releases resource if no more refences exist

-

manages reference count on given bus and releases resource if no more refernces exist

-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation return ATCA_SUCCESS
-
-
-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_i2c_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_i2c_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of I2C send over START.

-

HAL implementation of I2C send over ASF.

-

HAL implementation of I2C send.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdevice transaction type
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - -
[in]ifaceinstance
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdevice word address
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdevice word address
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-

Add 1 byte for word address

-

Add 1 byte for word address

- -
-
- -

◆ hal_i2c_sleep()

- -
-
- - - - - - - - -
ATCA_STATUS hal_i2c_sleep (ATCAIface iface)
-
- -

sleep CryptoAuth device using I2C bus

-
Parameters
- - -
[in]ifaceinterface to logical device to sleep
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ifaceinterface to logical device to sleep
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_i2c_wake()

- -
-
- - - - - - - - -
ATCA_STATUS hal_i2c_wake (ATCAIface iface)
-
- -

wake up CryptoAuth device using I2C bus

-
Parameters
- - -
[in]ifaceinterface to logical device to wakeup
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]ifaceinterface to logical device to wakeup
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_iface_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_iface_init (ATCAIfaceCfgcfg,
ATCAHAL_t ** hal,
ATCAHAL_t ** phy 
)
-
- -

Standard HAL API for ATCA to initialize a physical interface.

-
Parameters
- - - -
[in]cfgpointer to ATCAIfaceCfg object
[in]halpointer to ATCAHAL_t intermediate data structure
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_iface_register_hal()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_iface_register_hal (ATCAIfaceType iface_type,
ATCAHAL_thal,
ATCAHAL_t ** old_hal,
ATCAHAL_tphy,
ATCAHAL_t ** old_phy 
)
-
- -

Register/Replace a HAL with a.

-
Parameters
- - - - -
[in]iface_type- the type of physical interface to register
[in]halpointer to the new ATCAHAL_t structure to register
[out]oldpointer to the existing ATCAHAL_t structure
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_iface_release()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_iface_release (ATCAIfaceType iface_type,
void * hal_data 
)
-
- -

releases a physical interface, HAL knows how to interpret hal_data

-
Parameters
- - - -
[in]iface_type- the type of physical interface to release
[in]hal_data- pointer to opaque hal data maintained by HAL implementation for this interface type
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_is_command_word()

- -
-
- - - - - - - - -
uint8_t hal_is_command_word (uint8_t word_address)
-
- -

Utility function for hal_wake to check the reply.

-
Parameters
- - -
[in]word_addressCommand to check
-
-
-
Returns
true if the word_address is considered a command
- -
-
- -

◆ hal_kit_attach_phy()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_attach_phy (ATCAIfaceCfgcfg,
atca_hal_kit_phy_tphy 
)
-
- -

Helper function that connects a physical layer context structure that will be used by the kit protocol bridge.

-
Returns
ATCA_STATUS
-
Parameters
- - - -
cfg[IN] Interface configuration structure
phy[IN] Structure with physical layer interface functions and context
-
-
- -
-
- -

◆ hal_kit_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Kit Protocol Control.

-
Parameters
- - - -
[in]ifaceATCAIface instance that is the interface object to send the bytes over
[in]optionControl option to use
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_hid_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_hid_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations for the kit protocol.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_kit_hid_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_hid_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

HAL implementation of Kit USB HID init.

-
Parameters
- - - -
[in]halpointer to HAL specific data that is maintained by this HAL
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_hid_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_kit_hid_post_init (ATCAIface iface)
-
- -

HAL implementation of Kit HID post init.

-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_hid_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_hid_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

HAL implementation of send over USB HID.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdetermine device transaction type
[in]rxdatapointer to space to receive the data
[in,out]rxsizeptr to expected number of receive bytes to request
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_hid_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_kit_hid_release (void * hal_data)
-
- -

Close the physical port for HID.

-
Parameters
- - -
[in]hal_dataThe hardware abstraction data specific to this HAL
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_hid_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_hid_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of kit protocol send over USB HID.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdetermine device transaction type
[in]txdatapointer to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

HAL implementation of Kit USB HID init.

-
Parameters
- - - -
[in]ifaceinstance
[in]cfgpointer to HAL specific configuration data that is used to initialize this HAL
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_kit_post_init (ATCAIface iface)
-
- -

HAL implementation of Kit HID post init.

-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxsize 
)
-
- -

HAL implementation of send over USB HID.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdetermine device transaction type
[in]rxdatapointer to space to receive the data
[in,out]rxsizeptr to expected number of receive bytes to request
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_kit_release (void * hal_data)
-
- -

Close the physical port for HID.

-
Parameters
- - -
[in]hal_dataThe hardware abstraction data specific to this HAL
-
-
-
Returns
ATCA_STATUS
- -
-
- -

◆ hal_kit_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_kit_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of kit protocol send over USB HID.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdetermine device transaction type
[in]txdatapointer to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_STATUS
-

Add 1 byte to txlength for word address

- -
-
- -

◆ hal_rtos_delay_ms()

- -
-
- - - - - - - - -
void hal_rtos_delay_ms (uint32_t delay)
-
- -

This function delays for a number of milliseconds.

-
   You can override this function if you like to do
-   something else in your system while delaying.
-
Parameters
- - -
[in]delayNumber of milliseconds to delay
-
-
- -
-
- -

◆ hal_spi_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_spi_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations for the kit protocol.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_spi_deselect()

- -
-
- - - - - - - - -
ATCA_STATUS hal_spi_deselect (ATCAIface iface)
-
- -

HAL implementation to deassert the device chip select.

-
Parameters
- - -
[in]ifaceDevice to interact with.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_spi_discover_buses()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_spi_discover_buses (int spi_buses[],
int max_buses 
)
-
- -

discover spi buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge

-
Parameters
- - - -
[in]spi_buses- an array of logical bus numbers
[in]max_buses- maximum number of buses the app wants to attempt to discover
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_spi_discover_devices()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_spi_discover_devices (int bus_num,
ATCAIfaceCfg cfg[],
int * found 
)
-
- -

discover any TA10x devices on a given logical bus number

-
Parameters
- - - - -
[in]bus_numlogical bus number on which to look for TA10x devices
[out]cfgpointer to head of an array of interface config structures which get filled in by this method
[out]foundnumber of devices found on this bus
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_spi_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_spi_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

initialize an SPI interface using given config

-
Parameters
- - - -
[in]hal- opaque ptr to HAL data
[in]cfg- interface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_spi_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_spi_post_init (ATCAIface iface)
-
- -

HAL implementation of SPI post init.

-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_spi_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_spi_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

HAL implementation of SPI receive function for HARMONY SPI.

-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_spi_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_spi_release (void * hal_data)
-
- -

manages reference count on given bus and releases resource if no more refences exist

-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_spi_select()

- -
-
- - - - - - - - -
ATCA_STATUS hal_spi_select (ATCAIface iface)
-
- -

HAL implementation to assert the device chip select.

-
Parameters
- - -
[in]ifaceDevice to interact with.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_spi_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_spi_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of SPI send over Harmony.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdevice transaction type
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_control()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_control (ATCAIface iface,
uint8_t option,
void * param,
size_t paramlen 
)
-
- -

Perform control operations for the kit protocol.

-
Parameters
- - - - - -
[in]ifaceInterface to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_idle()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_idle (ATCAIface iface)
-
- -

Send Idle flag via SWI.

-
Parameters
- - -
[in]ifaceinterface of the logical device to idle
-
-
-
Returns
ATCA_SUCCES
- -
-
- -

◆ hal_swi_init()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_init (ATCAIface iface,
ATCAIfaceCfgcfg 
)
-
- -

initialize an SWI interface using given config

-
Parameters
- - - -
[in]hal- opaque ptr to HAL data
[in]cfg- interface configuration
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_post_init()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_post_init (ATCAIface iface)
-
- -

HAL implementation of SWI post init.

-
Parameters
- - -
[in]ifaceinstance
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_swi_receive()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_receive (ATCAIface iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
-
- -

HAL implementation of SWI receive function over UART.

-
Parameters
- - - - - -
[in]ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_release()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_release (void * hal_data)
-
- -

manages reference count on given bus and releases resource if no more refences exist

-
Parameters
- - -
[in]hal_data- opaque pointer to hal data structure - known only to the HAL implementation
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ hal_swi_send()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ATCA_STATUS hal_swi_send (ATCAIface iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
-
- -

HAL implementation of SWI send command over UART.

-
Parameters
- - - - - -
[in]ifaceinstance
[in]word_addressdevice transaction type
[in]txdatapointer to space to bytes to send
[in]txlengthnumber of bytes to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-

Send word address

-

Send data

- -
-
- -

◆ hal_swi_sleep()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_sleep (ATCAIface iface)
-
- -

Send Sleep flag via SWI.

-
Parameters
- - -
[in]ifaceinterface of the logical device to sleep
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ hal_swi_wake()

- -
-
- - - - - - - - -
ATCA_STATUS hal_swi_wake (ATCAIface iface)
-
- -

Send Wake flag via SWI.

-
Parameters
- - -
[in]ifaceinterface of the logical device to wake up
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ kit_id_from_devtype()

- -
-
- - - - - - - - -
const char * kit_id_from_devtype (ATCADeviceType devtype)
-
-

Kit Protocol is key

- -
-
- -

◆ kit_interface()

- -
-
- - - - - - - - -
const char * kit_interface (ATCAKitType kittype)
-
-

Kit parser physical interface string

- -
-
- -

◆ kit_interface_from_kittype()

- -
-
- - - - - - - - -
const char * kit_interface_from_kittype (ATCAKitType kittype)
-
-

Kit interface from device

- -
-
- -

◆ swi_uart_deinit()

- -
-
- - - - - - - - -
ATCA_STATUS swi_uart_deinit (ATCASWIMaster_tinstance)
-
- -

Implementation of SWI UART deinit.

-

HAL implementation of SWI UART deinit.

-
Parameters
- - -
[in]instanceinstance
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
-
Parameters
- - -
[in]instanceinstance
-
-
-
Returns
ATCA_SUCCESS
- -
-
- -

◆ swi_uart_discover_buses()

- -
-
- - - - - - - - - - - - - - - - - - -
void swi_uart_discover_buses (int swi_uart_buses[],
int max_buses 
)
-
- -

discover UART buses available for this hardware this maintains a list of logical to physical bus mappings freeing the application of the a-priori knowledge

-
Parameters
- - - -
[in]swi_uart_buses- an array of logical bus numbers
[in]max_buses- maximum number of buses the app wants to attempt to discover
-
-
- -
-
- -

◆ swi_uart_init()

- -
-
- - - - - - - - -
ATCA_STATUS swi_uart_init (ATCASWIMaster_tinstance)
-
- -

Implementation of SWI UART init.

-

HAL implementation of SWI UART init.

-
    -
  • this HAL implementation assumes you've included the ASF SERCOM UART libraries in your project, otherwise, the HAL layer will not compile because the ASF UART drivers are a dependency *
    Parameters
    - - -
    [in]instanceinstance
    -
    -
    -
    Returns
    ATCA_SUCCESS on success, otherwise an error code.
    -
  • -
  • this HAL implementation assumes you've included the START SERCOM UART libraries in your project, otherwise, the HAL layer will not compile because the START UART drivers are a dependency *
    Parameters
    - - -
    [in]instanceinstance
    -
    -
    -
    Returns
    ATCA_SUCCESS on success, otherwise an error code.
    -
  • -
- -
-
- -

◆ swi_uart_mode()

- -
-
- - - - - - - - - - - - - - - - - - -
void swi_uart_mode (ATCASWIMaster_tinstance,
uint8_t mode 
)
-
- -

implementation of SWI UART change mode.

-

HAL implementation of SWI UART change mode.

-
Parameters
- - - -
[in]instanceinstance
[in]mode(TRANSMIT_MODE or RECEIVE_MODE)
-
-
- -
-
- -

◆ swi_uart_receive_byte()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS swi_uart_receive_byte (ATCASWIMaster_tinstance,
uint8_t * data 
)
-
- -

HAL implementation of SWI UART receive bytes over ASF. This function receive one byte over UART.

-
Parameters
- - - -
[in]instanceinstance
[out]datapointer to space to receive the data
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ swi_uart_send_byte()

- -
-
- - - - - - - - - - - - - - - - - - -
ATCA_STATUS swi_uart_send_byte (ATCASWIMaster_tinstance,
uint8_t data 
)
-
- -

HAL implementation of SWI UART send byte over ASF. This function send one byte over UART.

-
Parameters
- - - -
[in]instanceinstance
[in]datanumber of byte to send
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ swi_uart_setbaud()

- -
-
- - - - - - - - - - - - - - - - - - -
void swi_uart_setbaud (ATCASWIMaster_tinstance,
uint32_t baudrate 
)
-
- -

implementation of SWI UART change baudrate.

-

HAL implementation of SWI UART change baudrate.

-
Parameters
- - - - - -
[in]instanceinstance
[in]baudrate(typically 230400 , 160000 or 115200)
[in]instanceinstance
[in]baudrate(typically 230400 or 115200)
-
-
- -
-
-
-
- - - - diff --git a/a01446.js b/a01446.js deleted file mode 100644 index 9f19cd37a..000000000 --- a/a01446.js +++ /dev/null @@ -1,100 +0,0 @@ -var a01446 = -[ - [ "HAL Directory - Purpose", "a01446.html#md_lib_hal_README", "a01446_md_lib_hal_README_dup" ], - [ "atca_hal_kit_phy_t", "a01652.html", [ - [ "hal_data", "a01652.html#afd90dea53ccfe0a8c15b12e5e1afaa35", null ], - [ "packet_alloc", "a01652.html#a72b6c6e17726b3e9db70d78e0c52f02c", null ], - [ "packet_free", "a01652.html#a09209305fd48261b835daf6026b7b659", null ], - [ "recv", "a01652.html#abb9616bec2cdd4f546884a45953cb054", null ], - [ "send", "a01652.html#a36eca94789cf465a9cb13e9a1ad92121", null ] - ] ], - [ "atca_hal_shm_t", "a01656.html", null ], - [ "i2c_start_instance", "a01664.html", null ], - [ "atca_i2c_host_s", "a01668.html", null ], - [ "i2c_sam_instance", "a01684.html", null ], - [ "atcaI2Cmaster", "a01660.html", null ], - [ "atcaSWImaster", "a01688.html", null ], - [ "ATCA_HAL_CHANGE_BAUD", "a01446.html#ga6c3c5f6f46d99838464be80796088baa", null ], - [ "ATCA_HAL_CONTROL_DESELECT", "a01446.html#ga20f197858c01f040ca70cad589fcdabc", null ], - [ "ATCA_HAL_CONTROL_DIRECTION", "a01446.html#gae2eb00133330119dd9c73d6c5d9fd8dd", null ], - [ "ATCA_HAL_CONTROL_IDLE", "a01446.html#ga3c8d531ea7b725debf75cbbd851f92a0", null ], - [ "ATCA_HAL_CONTROL_RESET", "a01446.html#ga1236f6d20d3f9402af1f5c3f1adc98e3", null ], - [ "ATCA_HAL_CONTROL_SELECT", "a01446.html#gafb82c723c3d22673ebf65f89497d2e99", null ], - [ "ATCA_HAL_CONTROL_SLEEP", "a01446.html#gaa7f16d0fbd30e35a1a233166f6f59d06", null ], - [ "ATCA_HAL_CONTROL_WAKE", "a01446.html#ga6e1cf53d19f95ce1bcee622e8176b8a9", null ], - [ "ATCA_HAL_FLUSH_BUFFER", "a01446.html#ga61fae4f7c3849b77ae33e767e137032d", null ], - [ "MAX_SWI_BUSES", "a01446.html#gaf9d9d027ce20f528edea144203141714", null ], - [ "MAX_SWI_BUSES", "a01446.html#gaf9d9d027ce20f528edea144203141714", null ], - [ "ATCAI2CMaster_t", "a01446.html#ga06b19a932aea9cf3a5165fefacb24f7b", null ], - [ "ATCASWIMaster_t", "a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff", null ], - [ "ATCASWIMaster_t", "a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff", null ], - [ "hal_mutex_t", "a01446.html#ga73601b3bcebddd5e814e47b9a9c5f2a6", null ], - [ "atca_delay_10us", "a01446.html#ga19891182689551cc3a88603135959351", null ], - [ "atca_delay_ms", "a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55", null ], - [ "atca_delay_us", "a01446.html#ga7598dfcd6dcac882836544d48356d02f", null ], - [ "change_i2c_speed", "a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1", null ], - [ "hal_check_pid", "a01446.html#gae31246ac870409a3d694c240c6c3498a", null ], - [ "hal_check_wake", "a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76", null ], - [ "hal_create_mutex", "a01446.html#gaad9da28968a527ce51a2b081461d4cfe", null ], - [ "hal_delay_ms", "a01446.html#gadc23b8130e72a445f76c68d62e8c95c5", null ], - [ "hal_delay_us", "a01446.html#ga7e9019810ba5ab81b256282392cd5079", null ], - [ "hal_i2c_control", "a01446.html#ga4f82572f05b8587d98bc38601453863e", null ], - [ "hal_i2c_discover_buses", "a01446.html#ga05700385437884cc7b28c38d33e84f8c", null ], - [ "hal_i2c_discover_devices", "a01446.html#gac7644e62498a596c09952ee3b28017b9", null ], - [ "hal_i2c_idle", "a01446.html#ga9317303ada721ff3f97e7aad69437a30", null ], - [ "hal_i2c_init", "a01446.html#ga17df8d983df73e2e8f62f1236f157909", null ], - [ "hal_i2c_init", "a01446.html#ga09e7f465a040fbd19ea136269571de3c", null ], - [ "hal_i2c_post_init", "a01446.html#gafbe53519362f18c2688d10da6f7c618f", null ], - [ "hal_i2c_receive", "a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f", null ], - [ "hal_i2c_release", "a01446.html#gac382cc4431d2d1c721c21a453ba36c22", null ], - [ "hal_i2c_send", "a01446.html#gacc9a889e19d2f1a475a39391565b66dd", null ], - [ "hal_i2c_sleep", "a01446.html#ga3f89bae6a625d5f37abdcc99408def27", null ], - [ "hal_i2c_wake", "a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c", null ], - [ "hal_iface_init", "a01446.html#ga24d379ed97e2c8ce205abf096707bf99", null ], - [ "hal_iface_register_hal", "a01446.html#ga43e975cd670652e6ae76f390b2e82218", null ], - [ "hal_iface_release", "a01446.html#gacadf30e249834f38397a8569c7b798c2", null ], - [ "hal_is_command_word", "a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae", null ], - [ "hal_kit_attach_phy", "a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29", null ], - [ "hal_kit_control", "a01446.html#ga56a9e080fb9055109778010912be08ba", null ], - [ "hal_kit_hid_control", "a01446.html#gadcf53722678e48323751359a04734680", null ], - [ "hal_kit_hid_init", "a01446.html#ga025e8f78bfdef446732e3aafacebc857", null ], - [ "hal_kit_hid_post_init", "a01446.html#ga6f06bc1662b3d0361f6a241e1b5612f2", null ], - [ "hal_kit_hid_receive", "a01446.html#ga1c62358b9abc11bc2e52b34c3dd712e0", null ], - [ "hal_kit_hid_release", "a01446.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f", null ], - [ "hal_kit_hid_send", "a01446.html#ga3fd44b390fe7558c882c97faa783c018", null ], - [ "hal_kit_init", "a01446.html#ga4d01381c1a907ba56368a9313d0b65cb", null ], - [ "hal_kit_post_init", "a01446.html#ga7baebf1b0431d0670517d3788d63b111", null ], - [ "hal_kit_receive", "a01446.html#ga239b2412c8c0d45c2097a4fa06c9aa53", null ], - [ "hal_kit_release", "a01446.html#gafb063a58f6e3b087cf08fce5c66ee422", null ], - [ "hal_kit_send", "a01446.html#ga18817a4a7ab5958453eca414e28834ba", null ], - [ "hal_rtos_delay_ms", "a01446.html#gacb8b202e3e6d66c96262b1ad4126ff6a", null ], - [ "hal_spi_control", "a01446.html#gac7f3951634faf0a7c16c234d471c3660", null ], - [ "hal_spi_deselect", "a01446.html#ga6bcb25e01ba6242973eedb32fa9dac2a", null ], - [ "hal_spi_discover_buses", "a01446.html#ga92cecc8e30a88dee1cbedd49141bc209", null ], - [ "hal_spi_discover_devices", "a01446.html#ga6cf45c115bcb721e951e8792e0feb3f0", null ], - [ "hal_spi_init", "a01446.html#ga24b3ca4076a0e4093644d4f58cd80a69", null ], - [ "hal_spi_post_init", "a01446.html#gaeb831d9894ce11146bd00c79a98b7f0f", null ], - [ "hal_spi_receive", "a01446.html#ga410c24762579358a576a58610a877e63", null ], - [ "hal_spi_release", "a01446.html#ga8c3f1c6c20d939c4ca976fdda6279359", null ], - [ "hal_spi_select", "a01446.html#ga237aa1d0ee551a61991b52dc7812ff64", null ], - [ "hal_spi_send", "a01446.html#ga16661176757d0ef155155b07267a44ed", null ], - [ "hal_swi_control", "a01446.html#gad6ba20fd0d0d393f0cbf03ea9cb63346", null ], - [ "hal_swi_idle", "a01446.html#ga618291172976da96c4f02dc9200c845c", null ], - [ "hal_swi_init", "a01446.html#gae3e41d9b466fb912625402db629b1a62", null ], - [ "hal_swi_post_init", "a01446.html#ga9186e5235979216330ae580290872c77", null ], - [ "hal_swi_receive", "a01446.html#ga159bdf9c24e429d54800da1eb1c21058", null ], - [ "hal_swi_release", "a01446.html#ga196dbc62546b39ac3e556a0f7f6b7132", null ], - [ "hal_swi_send", "a01446.html#ga9df4dbd666a87efe49578842e53ad91e", null ], - [ "hal_swi_sleep", "a01446.html#ga252e365a30f2583dae8a8eac073a9f53", null ], - [ "hal_swi_wake", "a01446.html#gafc428980ec95e37eee94813db229fe70", null ], - [ "kit_id_from_devtype", "a01446.html#ga554072f32204a0eb8d7b8c7931e43343", null ], - [ "kit_interface", "a01446.html#ga33fe33933fb59dde6e6fb8975da6c12d", null ], - [ "kit_interface_from_kittype", "a01446.html#ga31075898964b61f4877ba882477b71c3", null ], - [ "swi_uart_deinit", "a01446.html#ga0b1aad3936bf003686d8db7fa2be5132", null ], - [ "swi_uart_discover_buses", "a01446.html#gad640b598d581ee7c8a4c804bee602906", null ], - [ "swi_uart_init", "a01446.html#ga003b63648f1a5f9eba274760559688f2", null ], - [ "swi_uart_mode", "a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41", null ], - [ "swi_uart_receive_byte", "a01446.html#ga93f3dab17c14f71641ca970998ede823", null ], - [ "swi_uart_send_byte", "a01446.html#ga4a4d491006d9683d67838963706ac9c1", null ], - [ "swi_uart_setbaud", "a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d", null ] -]; \ No newline at end of file diff --git a/a01446_md_lib_hal_README_dup.js b/a01446_md_lib_hal_README_dup.js deleted file mode 100644 index 179ae3818..000000000 --- a/a01446_md_lib_hal_README_dup.js +++ /dev/null @@ -1,19 +0,0 @@ -var a01446_md_lib_hal_README_dup = -[ - [ "Cryptoauthlib HAL Architecture", "a01446.html#autotoc_md16", null ], - [ "CryptoAuthLib Supported HAL Layers", "a01446.html#autotoc_md18", [ - [ "Microchip Harmony 3 for all PIC32 & ARM products - Use the Harmony 3 Configurator to generate and configure prjects", "a01446.html#autotoc_md19", null ], - [ "Microchip 8 & 16 bit products - AVR, PIC16/18, PIC24/DSPIC", "a01446.html#autotoc_md20", null ], - [ "OS & RTOS integrations", "a01446.html#autotoc_md21", null ], - [ "Legacy Support - Atmel START for AVR, ARM based processesors (SAM)", "a01446.html#autotoc_md22", null ], - [ "Legacy Support - ASF3 for ARM Cortex-m0 & Cortex-m based processors (SAM)", "a01446.html#autotoc_md23", null ], - [ "Cryptoauthlib HAL Architecture", "a01446.html#autotoc_md16", null ], - [ "CryptoAuthLib Supported HAL Layers", "a01446.html#autotoc_md18", [ - [ "Microchip Harmony 3 for all PIC32 & ARM products - Use the Harmony 3 Configurator to generate and configure prjects", "a01446.html#autotoc_md19", null ], - [ "Microchip 8 & 16 bit products - AVR, PIC16/18, PIC24/DSPIC", "a01446.html#autotoc_md20", null ], - [ "OS & RTOS integrations", "a01446.html#autotoc_md21", null ], - [ "Legacy Support - Atmel START for AVR, ARM based processesors (SAM)", "a01446.html#autotoc_md22", null ], - [ "Legacy Support - ASF3 for ARM Cortex-m0 & Cortex-m based processors (SAM)", "a01446.html#autotoc_md23", null ] - ] ] - ] ] -]; \ No newline at end of file diff --git a/a01447.html b/a01447.html deleted file mode 100644 index 5d3d3048d..000000000 --- a/a01447.html +++ /dev/null @@ -1,540 +0,0 @@ - - - - - - - -CryptoAuthLib: Host side crypto methods (atcah_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Host side crypto methods (atcah_)
-
-
- -

Use these functions if your system does not use an ATCADevice as a host but implements the host in firmware. The functions provide host-side cryptographic functionality for an ATECC client device. They are intended to accompany the CryptoAuthLib functions. They can be called directly from an application, or integrated into an API. -More...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Structures

struct  atca_temp_key
 Structure to hold TempKey fields. More...
 
struct  atca_include_data_in_out
 Input / output parameters for function atca_include_data(). More...
 
struct  atca_nonce_in_out
 Input/output parameters for function atca_nonce(). More...
 
struct  atca_io_decrypt_in_out
 
struct  atca_verify_mac
 
struct  atca_secureboot_enc_in_out
 
struct  atca_secureboot_mac_in_out
 
struct  atca_mac_in_out
 Input/output parameters for function atca_mac(). More...
 
struct  atca_hmac_in_out
 Input/output parameters for function atca_hmac(). More...
 
struct  atca_gen_dig_in_out
 Input/output parameters for function atcah_gen_dig(). More...
 
struct  atca_diversified_key_in_out
 Input/output parameters for function atcah_gendivkey(). More...
 
struct  atca_write_mac_in_out
 Input/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac(). More...
 
struct  atca_derive_key_in_out
 Input/output parameters for function atcah_derive_key(). More...
 
struct  atca_derive_key_mac_in_out
 Input/output parameters for function atcah_derive_key_mac(). More...
 
struct  atca_decrypt_in_out
 Input/output parameters for function atca_decrypt(). More...
 
struct  atca_check_mac_in_out
 Input/output parameters for function atcah_check_mac(). More...
 
struct  atca_resp_mac_in_out
 Input/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function. More...
 
struct  atca_verify_in_out
 Input/output parameters for function atcah_verify(). More...
 
struct  atca_gen_key_in_out
 Input/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function. More...
 
struct  atca_sign_internal_in_out
 Input/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function. More...
 
struct  atca_session_key_in_out
 Input/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function. More...
 
struct  atca_delete_in_out
 Input/Output paramters for calculating the mac.Used with Delete command. More...
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Typedefs

-typedef struct atca_temp_key atca_temp_key_t
 Structure to hold TempKey fields.
 
-typedef struct atca_nonce_in_out atca_nonce_in_out_t
 
-typedef struct atca_io_decrypt_in_out atca_io_decrypt_in_out_t
 
-typedef struct atca_verify_mac atca_verify_mac_in_out_t
 
-typedef struct atca_secureboot_enc_in_out atca_secureboot_enc_in_out_t
 
-typedef struct atca_secureboot_mac_in_out atca_secureboot_mac_in_out_t
 
-typedef struct atca_mac_in_out atca_mac_in_out_t
 
-typedef struct atca_gen_dig_in_out atca_gen_dig_in_out_t
 Input/output parameters for function atcah_gen_dig().
 
-typedef struct atca_diversified_key_in_out atca_diversified_key_in_out_t
 Input/output parameters for function atcah_gendivkey().
 
-typedef struct atca_write_mac_in_out atca_write_mac_in_out_t
 Input/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac().
 
-typedef struct atca_check_mac_in_out atca_check_mac_in_out_t
 Input/output parameters for function atcah_check_mac().
 
-typedef struct atca_resp_mac_in_out atca_resp_mac_in_out_t
 Input/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function.
 
-typedef struct atca_verify_in_out atca_verify_in_out_t
 
-typedef struct atca_gen_key_in_out atca_gen_key_in_out_t
 Input/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function.
 
-typedef struct atca_sign_internal_in_out atca_sign_internal_in_out_t
 Input/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function.
 
-typedef struct atca_session_key_in_out atca_session_key_in_out_t
 Input/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function.
 
-typedef struct atca_delete_in_out atca_delete_in_out_t
 Input/Output paramters for calculating the mac.Used with Delete command.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

-ATCA_STATUS atcah_nonce (struct atca_nonce_in_out *param)
 
-ATCA_STATUS atcah_mac (struct atca_mac_in_out *param)
 
-ATCA_STATUS atcah_check_mac (struct atca_check_mac_in_out *param)
 
-ATCA_STATUS atcah_hmac (struct atca_hmac_in_out *param)
 
-ATCA_STATUS atcah_gen_dig (struct atca_gen_dig_in_out *param)
 
-ATCA_STATUS atcah_gendivkey (struct atca_diversified_key_in_out *param)
 
-ATCA_STATUS atcah_gen_mac (struct atca_gen_dig_in_out *param)
 
-ATCA_STATUS atcah_write_auth_mac (struct atca_write_mac_in_out *param)
 
-ATCA_STATUS atcah_privwrite_auth_mac (struct atca_write_mac_in_out *param)
 
-ATCA_STATUS atcah_derive_key (struct atca_derive_key_in_out *param)
 
-ATCA_STATUS atcah_derive_key_mac (struct atca_derive_key_mac_in_out *param)
 
-ATCA_STATUS atcah_decrypt (struct atca_decrypt_in_out *param)
 
-ATCA_STATUS atcah_sha256 (uint32_t len, const uint8_t *message, uint8_t *digest)
 
-uint8_t * atcah_include_data (struct atca_include_data_in_out *param)
 
-ATCA_STATUS atcah_gen_key_msg (struct atca_gen_key_in_out *param)
 
-ATCA_STATUS atcah_config_to_sign_internal (ATCADeviceType device_type, struct atca_sign_internal_in_out *param, const uint8_t *config)
 
-ATCA_STATUS atcah_sign_internal_msg (ATCADeviceType device_type, struct atca_sign_internal_in_out *param)
 
-ATCA_STATUS atcah_verify_mac (atca_verify_mac_in_out_t *param)
 
-ATCA_STATUS atcah_secureboot_enc (atca_secureboot_enc_in_out_t *param)
 
-ATCA_STATUS atcah_secureboot_mac (atca_secureboot_mac_in_out_t *param)
 
-ATCA_STATUS atcah_encode_counter_match (uint32_t counter_value, uint8_t *counter_match_value)
 
-ATCA_STATUS atcah_io_decrypt (struct atca_io_decrypt_in_out *param)
 
-ATCA_STATUS atcah_ecc204_write_auth_mac (struct atca_write_mac_in_out *param)
 
-ATCA_STATUS atcah_gen_session_key (atca_session_key_in_out_t *param)
 
-ATCA_STATUS atcah_gen_output_resp_mac (struct atca_resp_mac_in_out *param)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Variables

-uint8_t * atca_include_data_in_out::p_temp
 [out] pointer to output buffer
 
-const uint8_t * atca_include_data_in_out::otp
 [in] pointer to one-time-programming data
 
-const uint8_t * atca_include_data_in_out::sn
 [in] pointer to serial number data
 
-uint8_t atca_nonce_in_out::mode
 [in] Mode parameter used in Nonce command (Param1).
 
-uint16_t atca_nonce_in_out::zero
 [in] Zero parameter used in Nonce command (Param2).
 
-const uint8_t * atca_nonce_in_out::num_in
 [in] Pointer to 20-byte NumIn data used in Nonce command.
 
-const uint8_t * atca_nonce_in_out::rand_out
 [in] Pointer to 32-byte RandOut data from Nonce command.
 
-struct atca_temp_keyatca_nonce_in_out::temp_key
 [in,out] Pointer to TempKey structure.
 
-uint8_t atca_mac_in_out::mode
 [in] Mode parameter used in MAC command (Param1).
 
-uint16_t atca_mac_in_out::key_id
 [in] KeyID parameter used in MAC command (Param2).
 
-const uint8_t * atca_mac_in_out::challenge
 [in] Pointer to 32-byte Challenge data used in MAC command, depending on mode.
 
-const uint8_t * atca_mac_in_out::key
 [in] Pointer to 32-byte key used to generate MAC digest.
 
-const uint8_t * atca_mac_in_out::otp
 [in] Pointer to 11-byte OTP, optionally included in MAC digest, depending on mode.
 
-const uint8_t * atca_mac_in_out::sn
 [in] Pointer to 9-byte SN, optionally included in MAC digest, depending on mode.
 
-uint8_t * atca_mac_in_out::response
 [out] Pointer to 32-byte SHA-256 digest (MAC).
 
-struct atca_temp_keyatca_mac_in_out::temp_key
 [in,out] Pointer to TempKey structure.
 
-uint8_t atca_hmac_in_out::mode
 [in] Mode parameter used in HMAC command (Param1).
 
-uint16_t atca_hmac_in_out::key_id
 [in] KeyID parameter used in HMAC command (Param2).
 
-const uint8_t * atca_hmac_in_out::key
 [in] Pointer to 32-byte key used to generate HMAC digest.
 
-const uint8_t * atca_hmac_in_out::otp
 [in] Pointer to 11-byte OTP, optionally included in HMAC digest, depending on mode.
 
-const uint8_t * atca_hmac_in_out::sn
 [in] Pointer to 9-byte SN, optionally included in HMAC digest, depending on mode.
 
-uint8_t * atca_hmac_in_out::response
 [out] Pointer to 32-byte SHA-256 HMAC digest.
 
-struct atca_temp_keyatca_hmac_in_out::temp_key
 [in,out] Pointer to TempKey structure.
 
-uint8_t * atca_decrypt_in_out::crypto_data
 [in,out] Pointer to 32-byte data. Input encrypted data from Read command (Contents field), output decrypted.
 
-struct atca_temp_keyatca_decrypt_in_out::temp_key
 [in,out] Pointer to TempKey structure.
 
-uint16_t atca_verify_in_out::curve_type
 [in] Curve type used in Verify command (Param2).
 
-const uint8_t * atca_verify_in_out::signature
 [in] Pointer to ECDSA signature to be verified
 
-const uint8_t * atca_verify_in_out::public_key
 [in] Pointer to the public key to be used for verification
 
-struct atca_temp_keyatca_verify_in_out::temp_key
 [in,out] Pointer to TempKey structure.
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Definitions for ATECC Message Sizes to Calculate a SHA256 Hash

"||" is the concatenation operator. The number in braces is the length of the hash input value in bytes.

-
-#define ATCA_MSG_SIZE_NONCE   (55)
 RandOut{32} || NumIn{20} || OpCode{1} || Mode{1} || LSB of Param2{1}.
 
-#define ATCA_MSG_SIZE_MAC   (88)
 (Key or TempKey){32} || (Challenge or TempKey){32} || OpCode{1} || Mode{1} || Param2{2} || (OTP0_7 or 0){8} || (OTP8_10 or 0){3} || SN8{1} || (SN4_7 or 0){4} || SN0_1{2} || (SN2_3 or 0){2}
 
-#define ATCA_MSG_SIZE_HMAC   (88u)
 
-#define ATCA_MSG_SIZE_GEN_DIG   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2} || 0{25} || TempKey{32}.
 
-#define ATCA_MSG_SIZE_DIVERSIFIED_KEY   (96)
 ParentKey{32} || OtherData{4} || SN8{1} || SN0_1{2} || 0{25} || InputData{32}.
 
-#define ATCA_MSG_SIZE_DERIVE_KEY   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2} || 0{25} || TempKey{32}.
 
-#define ATCA_MSG_SIZE_DERIVE_KEY_MAC   (39)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2}.
 
-#define ATCA_MSG_SIZE_ENCRYPT_MAC   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2}|| SN8{1} || SN0_1{2} || 0{25} || TempKey{32}.
 
-#define ATCA_MSG_SIZE_SESSION_KEY   (96)
 TransportKey{32} || 0x15{1} || 0x00{1} || KeyId{2} || SN8{1} || SN0_1{2} || 0{25} || Nonce{32}.
 
-#define ATCA_MSG_SIZE_DELETE_MAC   (96)
 Hmac/SecretKey{32} || 0x13{1} || 0x00{1} || 0x0000{2} || SN8{1} || SN0_1{2} || 0{25} || Nonce{32}.
 
-#define ATCA_MSG_SIZE_RESPONSE_MAC   (97)
 SlotKey{32} || Opcode{1} || Param1{1} || Param2{2} || SN8{1} || SN0_1{2} || 0{25} || client_Resp{32} || checkmac_result{1}.
 
-#define ATCA_MSG_SIZE_PRIVWRITE_MAC   (96)
 KeyId{32} || OpCode{1} || Param1{1} || Param2{2}|| SN8{1} || SN0_1{2} || 0{21} || PlainText{36}.
 
-#define ATCA_COMMAND_HEADER_SIZE   ( 4)
 
-#define ATCA_GENDIG_ZEROS_SIZE   (25)
 
-#define ATCA_GENDIVKEY_ZEROS_SIZE   (25)
 
-#define ATCA_WRITE_MAC_ZEROS_SIZE   (25)
 
-#define ATCA_DELETE_MAC_ZEROS_SIZE   (25)
 
-#define ATCA_RESP_MAC_ZEROS_SIZE   (25)
 
-#define ATCA_PRIVWRITE_MAC_ZEROS_SIZE   (21)
 
-#define ATCA_PRIVWRITE_PLAIN_TEXT_SIZE   (36)
 
-#define ATCA_DERIVE_KEY_ZEROS_SIZE   (25)
 
-#define ATCA_HMAC_BLOCK_SIZE   (64u)
 
-#define ATCA_ENCRYPTION_KEY_SIZE   (64)
 
- - - - -

Definition for TempKey Mode

-#define MAC_MODE_USE_TEMPKEY_MASK   ((uint8_t)0x03)
 mode mask for MAC command when using TempKey
 
-

Detailed Description

-

Use these functions if your system does not use an ATCADevice as a host but implements the host in firmware. The functions provide host-side cryptographic functionality for an ATECC client device. They are intended to accompany the CryptoAuthLib functions. They can be called directly from an application, or integrated into an API.

-

Modern compilers can garbage-collect unused functions. If your compiler does not support this feature, you can just discard this module from your project if you do use an ATECC as a host. Or, if you don't, delete the functions you do not use.

-
-
- - - - diff --git a/a01447.js b/a01447.js deleted file mode 100644 index de6ed4fdf..000000000 --- a/a01447.js +++ /dev/null @@ -1,218 +0,0 @@ -var a01447 = -[ - [ "atca_temp_key", "a01692.html", [ - [ "gen_dig_data", "a01692.html#afde9c1e6769f60992c7fb10280cdd199", null ], - [ "gen_key_data", "a01692.html#a82e1988542001c7499700f3e1b191339", null ], - [ "is_64", "a01692.html#a0f766111832176ea2c8eda8fbf13743d", null ], - [ "key_id", "a01692.html#a70b94559475530db2be60e9d30758098", null ], - [ "no_mac_flag", "a01692.html#ae381dabe56bdd77f48a8241050d16d82", null ], - [ "source_flag", "a01692.html#abd69b6707bf73ae91675a6a0a250ca40", null ], - [ "valid", "a01692.html#aadedd52833b6ce041dfb9e923b448481", null ], - [ "value", "a01692.html#abf76b14a42ef4d7f9d57a1d5edc6cf10", null ] - ] ], - [ "atca_include_data_in_out", "a01696.html", [ - [ "otp", "a01447.html#gaf07ffae9f842764c321a060ead038ac2", null ], - [ "p_temp", "a01447.html#ga80ad9effe2957aaa0e604b175fcdbc63", null ], - [ "sn", "a01447.html#ga46b121ddb13c417e4d65a3fc2f6c365b", null ] - ] ], - [ "atca_nonce_in_out", "a01700.html", [ - [ "mode", "a01447.html#gabaedd7126cc73449d73843ef3b8958c0", null ], - [ "num_in", "a01447.html#ga7627ba268edc51f4e185e956bd215496", null ], - [ "rand_out", "a01447.html#gadc3dc30e978bcf18656aedb6dd4a62f2", null ], - [ "temp_key", "a01447.html#gaf89317aa1f759fc58f67158abd314d1b", null ], - [ "zero", "a01447.html#gaee2c8a03b0aa78ab07b64253f2c48b22", null ] - ] ], - [ "atca_io_decrypt_in_out", "a01704.html", [ - [ "data", "a01704.html#ab910eb48d182d8f191da149339fd6c51", null ], - [ "data_size", "a01704.html#a1d7f86d28ad089ae4401043c117be844", null ], - [ "io_key", "a01704.html#aa6d2797ec2cdef70aa51438e96e2a301", null ], - [ "out_nonce", "a01704.html#a597e62aa42a9971b98a5d76c7f1baef5", null ] - ] ], - [ "atca_verify_mac", "a01708.html", [ - [ "io_key", "a01708.html#a93cba5300302d50e26f70457f84df0da", null ], - [ "key_id", "a01708.html#ad4c4854451abd367cf8a13aad5f6372b", null ], - [ "mac", "a01708.html#afc99cd20d6193df126ae2b32b42f7546", null ], - [ "mode", "a01708.html#ac90559108804dc16ac1ac91a0212bff9", null ], - [ "msg_dig_buf", "a01708.html#acb0498448f486070d33e121ade525c64", null ], - [ "other_data", "a01708.html#ad89fec1f50b8e8ffc890d3683c4b5afe", null ], - [ "signature", "a01708.html#ad94d1c8d1635e597bd70823a207dc727", null ], - [ "sn", "a01708.html#a5e63ccd727b87d022ed0eedc0446410f", null ], - [ "temp_key", "a01708.html#ac9231df54b2f77c5061bdfbcea927a5e", null ] - ] ], - [ "atca_secureboot_enc_in_out", "a01712.html", [ - [ "digest", "a01712.html#a1da30fd41605f42e0b0dd68d75c59bd9", null ], - [ "digest_enc", "a01712.html#aac21cf3b5207c0dc25358d6360953380", null ], - [ "hashed_key", "a01712.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52", null ], - [ "io_key", "a01712.html#aeb02c7cf4fbaf40307821bc38160ab8d", null ], - [ "temp_key", "a01712.html#ac57e99b5d0069d7bd733bcf056cc56e1", null ] - ] ], - [ "atca_secureboot_mac_in_out", "a01716.html", [ - [ "digest", "a01716.html#ad3a988f3c029fff3805a8a9dd4caaaa5", null ], - [ "hashed_key", "a01716.html#a9ebeb5a66a80189ae8e7bb2ea97701c9", null ], - [ "mac", "a01716.html#aeb4c9a28028bd625ac3650b39392cf07", null ], - [ "mode", "a01716.html#a2c6c43889156357aee27b3b09657ebd2", null ], - [ "param2", "a01716.html#ac94f545daf7381aeb770fb42b467d338", null ], - [ "secure_boot_config", "a01716.html#a28771c8ed4754eabcb50649d753ee956", null ], - [ "signature", "a01716.html#acafb471d7cc7a71d613503760930d9f5", null ] - ] ], - [ "atca_mac_in_out", "a01720.html", [ - [ "challenge", "a01447.html#gac4c2db1a307043c7677e76310911d944", null ], - [ "key", "a01447.html#ga84ee714046fea52fb6b334e37b958c89", null ], - [ "key_id", "a01447.html#ga326ed9df4c9b966616e0b1a73f1b2796", null ], - [ "mode", "a01447.html#ga25187965ed87f828c98e4a20c93166e8", null ], - [ "otp", "a01447.html#gac9d561caddec61e481d241a88d73b653", null ], - [ "response", "a01447.html#ga3237adaae1e30c7ed469405e1ebfb435", null ], - [ "sn", "a01447.html#gaba323f1307689412ea6cc1e54810edb9", null ], - [ "temp_key", "a01447.html#ga7bf1d912d79b62cc598395642d77365f", null ] - ] ], - [ "atca_hmac_in_out", "a01724.html", [ - [ "key", "a01447.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0", null ], - [ "key_id", "a01447.html#ga10f04328eda5cffcea79652ac3509c2d", null ], - [ "mode", "a01447.html#ga1616d5efe59851d97fed27b47923c786", null ], - [ "otp", "a01447.html#gaad38386d9ec6afcdcd39eab98e2a4a1c", null ], - [ "response", "a01447.html#gacf6675faad5f7a43ca3fbec2108f57cd", null ], - [ "sn", "a01447.html#gaf0d7fe9a16cad1ba38c7daca4295823b", null ], - [ "temp_key", "a01447.html#ga7507880718dc536d6122f0401073b8c8", null ] - ] ], - [ "atca_gen_dig_in_out", "a01728.html", [ - [ "counter", "a01728.html#adb6743838ca7d8bd3ad390b7608492ba", null ], - [ "is_key_nomac", "a01728.html#a45ea4bd1941244391f04343f993bacf0", null ], - [ "key_conf", "a01728.html#a089cd58d7f5518ee9016eb40c281bdfc", null ], - [ "key_id", "a01728.html#a8bb5e1f0ea943f4749ebf6faa450288b", null ], - [ "other_data", "a01728.html#a3b5c9fd883d9daf4d6a42bbf1aba936d", null ], - [ "slot_conf", "a01728.html#a2d5854b66b7bc7246fa718a5d485d3fb", null ], - [ "slot_locked", "a01728.html#a787c86043a8c305bd23256248614a3f7", null ], - [ "sn", "a01728.html#ad8ca9262cbe607d0c017e12285c3d951", null ], - [ "stored_value", "a01728.html#a4f63b5946df323ef66910d4a0cdf2491", null ], - [ "temp_key", "a01728.html#aa62f8da7dae46c095c603433ae26fedf", null ], - [ "zone", "a01728.html#aa4922c43b6dfecb5e39e286e960cdd88", null ] - ] ], - [ "atca_diversified_key_in_out", "a01732.html", [ - [ "sn", "a01732.html#ab2ca3ae12be534d58e22bb68d6042ea3", null ], - [ "temp_key", "a01732.html#a8406e4a6d09e2f6b8e3bfc12579d8653", null ] - ] ], - [ "atca_write_mac_in_out", "a01736.html", [ - [ "auth_mac", "a01736.html#aaa57ce590925c0efe017af1d4457d479", null ], - [ "encrypted_data", "a01736.html#a38f7761577529e0bbf52cd0b8c17658b", null ], - [ "input_data", "a01736.html#a423e1db9e86ff369d49d78d8f5ea2525", null ], - [ "key_id", "a01736.html#a213cc14f2d1c67be382cb8918aca4362", null ], - [ "sn", "a01736.html#a2c43368d48a41123da5f69356b6f29f5", null ], - [ "temp_key", "a01736.html#a8786d124038d3516d98f2456f19985cf", null ], - [ "zone", "a01736.html#adf4e9d92c10469c78810f2881a95843b", null ] - ] ], - [ "atca_derive_key_in_out", "a01740.html", [ - [ "mode", "a01740.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9", null ], - [ "parent_key", "a01740.html#ad9e30a4f9006923af0d6668768598737", null ], - [ "sn", "a01740.html#a0e321ea27e36c985abacf4510619c9f0", null ], - [ "target_key", "a01740.html#aa2c05475b504237c0ae9db5d48cbb0fc", null ], - [ "target_key_id", "a01740.html#a5b623ae9fa4501c996e4c54842eaa548", null ], - [ "temp_key", "a01740.html#a1a4a8993461b0675edcb2d162ec8823b", null ] - ] ], - [ "atca_derive_key_mac_in_out", "a01744.html", [ - [ "mac", "a01744.html#a0576f1886490bbb3656b420f5bb65e65", null ], - [ "mode", "a01744.html#ae33f3603840fd0bb8ada551ff168ea58", null ], - [ "parent_key", "a01744.html#acb88b64064f725ca81245f2afe6f57f5", null ], - [ "sn", "a01744.html#aeb90e80a488f568c4a193c1fe851c5d4", null ], - [ "target_key_id", "a01744.html#ad2a2e2e1126d1c022be6a84af7f5e4e3", null ] - ] ], - [ "atca_decrypt_in_out", "a01748.html", [ - [ "crypto_data", "a01447.html#ga3d18f12db79908a5a1e831367391aa1c", null ], - [ "temp_key", "a01447.html#ga8305d0f433345a973f638dfea229a274", null ] - ] ], - [ "atca_check_mac_in_out", "a01752.html", [ - [ "client_chal", "a01752.html#ac4f5b60a59fa29d78c720c2be434c5c3", null ], - [ "client_resp", "a01752.html#a4daaa0bccc92503ccc31eaed78eb7409", null ], - [ "key_id", "a01752.html#a11807b6f83083ad17c66640c77c78973", null ], - [ "mode", "a01752.html#a0619aaead2b82313d761804f40c24926", null ], - [ "other_data", "a01752.html#af2d1c007ab43e8556a917efc5bcee9c8", null ], - [ "otp", "a01752.html#ac97a41612246b0527ed1a242bbe28a99", null ], - [ "slot_key", "a01752.html#aad7093cf772d6e337b3c09af9cea92ac", null ], - [ "sn", "a01752.html#a26f951076270f2389044a69b30c86d74", null ], - [ "target_key", "a01752.html#ae00a5116b4b55fb2bc6546ca3156522e", null ], - [ "temp_key", "a01752.html#a605e9f150203a43a550e68e940233245", null ] - ] ], - [ "atca_resp_mac_in_out", "a01756.html", null ], - [ "atca_verify_in_out", "a01760.html", [ - [ "curve_type", "a01447.html#gadf3470738c60dbe57b33fb1e6005f40e", null ], - [ "public_key", "a01447.html#gaf61f82fe19690b80bf370b295c58920b", null ], - [ "signature", "a01447.html#gad2e0f0dbb511520e5d79bdb4ab649c22", null ], - [ "temp_key", "a01447.html#ga4409850783c991d3b429ee78e67c9813", null ] - ] ], - [ "atca_gen_key_in_out", "a01764.html", [ - [ "key_id", "a01764.html#a2582ecc282bd3d712918e6109a18c7d2", null ], - [ "mode", "a01764.html#afa39cec9e8d332618910a0f519b5b48d", null ], - [ "other_data", "a01764.html#a9aa171dc3ed5403822d780a2d0220d61", null ], - [ "public_key", "a01764.html#ad6eba00bdedd4375c93419eb4cda6850", null ], - [ "public_key_size", "a01764.html#a44b034625f63afcfaab306ac6275cd5b", null ], - [ "sn", "a01764.html#a17c83c0e810b2bf35b364f026e1cecb0", null ], - [ "temp_key", "a01764.html#afa11fd0401f2d8884d385ffc77962ec3", null ] - ] ], - [ "atca_sign_internal_in_out", "a01768.html", [ - [ "digest", "a01768.html#a1765e3454849c67fa19a307f724cb8e3", null ], - [ "for_invalidate", "a01768.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7", null ], - [ "is_slot_locked", "a01768.html#a1d994ea91e9234808e6f0320897ab434", null ], - [ "key_config", "a01768.html#a534292cebeb2a65e3198e30061b2c35b", null ], - [ "key_id", "a01768.html#a426f70e97a2f191f021227175699185c", null ], - [ "message", "a01768.html#a5649ccf733b2512db9917036a102fb14", null ], - [ "mode", "a01768.html#a2145615f3148fb8a428657fa8020aad1", null ], - [ "slot_config", "a01768.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154", null ], - [ "sn", "a01768.html#a374985826f0c1b5c6aa52370f9871841", null ], - [ "temp_key", "a01768.html#af8c982fdcb8edc1ff6b1e838fab281ac", null ], - [ "update_count", "a01768.html#afd69516235ce1a7bee9c04146beb93d8", null ], - [ "use_flag", "a01768.html#a4d03aca0b8dd153e5b939a684f7c2955", null ], - [ "verify_other_data", "a01768.html#a2a0f2ee83e6825f92e259ee104fbb67d", null ] - ] ], - [ "atca_session_key_in_out", "a01772.html", null ], - [ "atca_delete_in_out", "a01776.html", null ], - [ "ATCA_MSG_SIZE_DELETE_MAC", "a01447.html#ga15a78dd66644866b65cd5eda8b1a30d0", null ], - [ "ATCA_MSG_SIZE_DERIVE_KEY", "a01447.html#ga1f445a11e4da099fec31efd43eadc234", null ], - [ "ATCA_MSG_SIZE_DERIVE_KEY_MAC", "a01447.html#ga4ef7d31c60616cf5177f415e32607d10", null ], - [ "ATCA_MSG_SIZE_DIVERSIFIED_KEY", "a01447.html#gab2891a03e978d463823775bc1161a06e", null ], - [ "ATCA_MSG_SIZE_ENCRYPT_MAC", "a01447.html#gafd8064c07a5f22cdb087c88e1b87c1be", null ], - [ "ATCA_MSG_SIZE_GEN_DIG", "a01447.html#ga656372cab66beeb5a333e9a33e342017", null ], - [ "ATCA_MSG_SIZE_MAC", "a01447.html#ga2b5993f5b7254d8c6e50794824cf47b6", null ], - [ "ATCA_MSG_SIZE_NONCE", "a01447.html#gaebdc2d83274268bb48fc45e87aef38af", null ], - [ "ATCA_MSG_SIZE_PRIVWRITE_MAC", "a01447.html#ga1039bfbe7e13d614814341bdee6afa7b", null ], - [ "ATCA_MSG_SIZE_RESPONSE_MAC", "a01447.html#ga6d3a4804abc8a467154d5abd744c0cea", null ], - [ "ATCA_MSG_SIZE_SESSION_KEY", "a01447.html#ga56b92d82ffddbd86c99107b12043f8db", null ], - [ "MAC_MODE_USE_TEMPKEY_MASK", "a01447.html#ga05323075c94849bf70e84f5a5931f058", null ], - [ "atca_check_mac_in_out_t", "a01447.html#ga62321bafeb0a9dd7c4ce657ece10109f", null ], - [ "atca_delete_in_out_t", "a01447.html#ga4ea861d041b787c766e9a19a0f11421c", null ], - [ "atca_diversified_key_in_out_t", "a01447.html#gae9784404fbe619217879d5d12261c2b8", null ], - [ "atca_gen_dig_in_out_t", "a01447.html#ga572abeaaabf22c386ebcba19b4f6236c", null ], - [ "atca_gen_key_in_out_t", "a01447.html#gada8cf14261301ec18458cbcbbe3d9b32", null ], - [ "atca_resp_mac_in_out_t", "a01447.html#gad2bbb95a1e12c8167ce68884dcf77a4e", null ], - [ "atca_session_key_in_out_t", "a01447.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e", null ], - [ "atca_sign_internal_in_out_t", "a01447.html#ga1fdcaf886974acc1fcdfc3bace49b700", null ], - [ "atca_temp_key_t", "a01447.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe", null ], - [ "atca_write_mac_in_out_t", "a01447.html#gac077314e00956519884e609b44b9cbce", null ], - [ "atca_mac_in_out::challenge", "a01447.html#gac4c2db1a307043c7677e76310911d944", null ], - [ "atca_decrypt_in_out::crypto_data", "a01447.html#ga3d18f12db79908a5a1e831367391aa1c", null ], - [ "atca_verify_in_out::curve_type", "a01447.html#gadf3470738c60dbe57b33fb1e6005f40e", null ], - [ "atca_mac_in_out::key", "a01447.html#ga84ee714046fea52fb6b334e37b958c89", null ], - [ "atca_hmac_in_out::key", "a01447.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0", null ], - [ "atca_mac_in_out::key_id", "a01447.html#ga326ed9df4c9b966616e0b1a73f1b2796", null ], - [ "atca_hmac_in_out::key_id", "a01447.html#ga10f04328eda5cffcea79652ac3509c2d", null ], - [ "atca_nonce_in_out::mode", "a01447.html#gabaedd7126cc73449d73843ef3b8958c0", null ], - [ "atca_mac_in_out::mode", "a01447.html#ga25187965ed87f828c98e4a20c93166e8", null ], - [ "atca_hmac_in_out::mode", "a01447.html#ga1616d5efe59851d97fed27b47923c786", null ], - [ "atca_nonce_in_out::num_in", "a01447.html#ga7627ba268edc51f4e185e956bd215496", null ], - [ "atca_include_data_in_out::otp", "a01447.html#gaf07ffae9f842764c321a060ead038ac2", null ], - [ "atca_mac_in_out::otp", "a01447.html#gac9d561caddec61e481d241a88d73b653", null ], - [ "atca_hmac_in_out::otp", "a01447.html#gaad38386d9ec6afcdcd39eab98e2a4a1c", null ], - [ "atca_include_data_in_out::p_temp", "a01447.html#ga80ad9effe2957aaa0e604b175fcdbc63", null ], - [ "atca_verify_in_out::public_key", "a01447.html#gaf61f82fe19690b80bf370b295c58920b", null ], - [ "atca_nonce_in_out::rand_out", "a01447.html#gadc3dc30e978bcf18656aedb6dd4a62f2", null ], - [ "atca_mac_in_out::response", "a01447.html#ga3237adaae1e30c7ed469405e1ebfb435", null ], - [ "atca_hmac_in_out::response", "a01447.html#gacf6675faad5f7a43ca3fbec2108f57cd", null ], - [ "atca_verify_in_out::signature", "a01447.html#gad2e0f0dbb511520e5d79bdb4ab649c22", null ], - [ "atca_include_data_in_out::sn", "a01447.html#ga46b121ddb13c417e4d65a3fc2f6c365b", null ], - [ "atca_mac_in_out::sn", "a01447.html#gaba323f1307689412ea6cc1e54810edb9", null ], - [ "atca_hmac_in_out::sn", "a01447.html#gaf0d7fe9a16cad1ba38c7daca4295823b", null ], - [ "atca_nonce_in_out::temp_key", "a01447.html#gaf89317aa1f759fc58f67158abd314d1b", null ], - [ "atca_mac_in_out::temp_key", "a01447.html#ga7bf1d912d79b62cc598395642d77365f", null ], - [ "atca_hmac_in_out::temp_key", "a01447.html#ga7507880718dc536d6122f0401073b8c8", null ], - [ "atca_decrypt_in_out::temp_key", "a01447.html#ga8305d0f433345a973f638dfea229a274", null ], - [ "atca_verify_in_out::temp_key", "a01447.html#ga4409850783c991d3b429ee78e67c9813", null ], - [ "atca_nonce_in_out::zero", "a01447.html#gaee2c8a03b0aa78ab07b64253f2c48b22", null ] -]; \ No newline at end of file diff --git a/a01448.html b/a01448.html deleted file mode 100644 index d816cfa4b..000000000 --- a/a01448.html +++ /dev/null @@ -1,116 +0,0 @@ - - - - - - - -CryptoAuthLib: JSON Web Token (JWT) methods (atca_jwt_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
JSON Web Token (JWT) methods (atca_jwt_)
-
-
- -

Methods for signing and verifying JSON Web Token (JWT) tokens. -

-

Methods for signing and verifying JSON Web Token (JWT) tokens.

-
-
- - - - diff --git a/a01449.html b/a01449.html deleted file mode 100644 index 262f2e26d..000000000 --- a/a01449.html +++ /dev/null @@ -1,312 +0,0 @@ - - - - - - - -CryptoAuthLib: mbedTLS Wrapper methods (atca_mbedtls_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
mbedTLS Wrapper methods (atca_mbedtls_)
-
-
- -

These methods are for interfacing cryptoauthlib to mbedtls. -More...

- - -

mbedtls directory - Purpose

This directory contains the interfacing and wrapper functions to integrate mbedtls as the software crypto library as well as provide eliptic curve cryptography (ECC) hardware acceleration.
- - - -

-Data Structures

struct  atca_mbedtls_eckey_s
 
- - - -

-Typedefs

typedef struct atca_mbedtls_eckey_s atca_mbedtls_eckey_t
 
- - - - - - - - - - - - - - - - - - - - - - - -

-Functions

-int atca_mbedtls_ecdsa_sign (const mbedtls_mpi *d, mbedtls_mpi *r, mbedtls_mpi *s, const unsigned char *buf, size_t buf_len)
 
int atca_mbedtls_pk_init_ext (ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid)
 Initializes an mbedtls pk context for use with EC operations.
 
int atca_mbedtls_pk_init (mbedtls_pk_context *pkey, const uint16_t slotid)
 Initializes an mbedtls pk context for use with EC operations.
 
-int atca_mbedtls_cert_add (struct mbedtls_x509_crt *cert, const struct atcacert_def_s *cert_def)
 
int atca_mbedtls_ecdh_slot_cb (void)
 ECDH Callback to obtain the "slot" used in ECDH operations from the application.
 
int atca_mbedtls_ecdh_ioprot_cb (uint8_t secret[32])
 ECDH Callback to obtain the IO Protection secret from the application.
 
-struct mbedtls_x509_crt * atcac_mbedtls_new (void)
 
-struct atcac_x509_ctxatcac_x509_ctx_new (void)
 
-void atcac_x509_ctx_free (struct atcac_x509_ctx *ctx)
 
-

Detailed Description

-

These methods are for interfacing cryptoauthlib to mbedtls.

-

Typedef Documentation

- -

◆ atca_mbedtls_eckey_t

- -
-
- - - - -
typedef struct atca_mbedtls_eckey_s atca_mbedtls_eckey_t
-
-

Structure to hold metadata - is written into the mbedtls pk structure as the private key bignum value 'd' which otherwise would be unused. Bignums can be any arbitrary length of bytes
-

- -
-
-

Function Documentation

- -

◆ atca_mbedtls_ecdh_ioprot_cb()

- -
-
- - - - - - - - -
int atca_mbedtls_ecdh_ioprot_cb (uint8_t secret[32])
-
- -

ECDH Callback to obtain the IO Protection secret from the application.

-
Parameters
- - -
[out]secret32 byte array used to store the secret
-
-
-
Returns
ATCA_SUCCESS on success, otherwise an error code.
- -
-
- -

◆ atca_mbedtls_ecdh_slot_cb()

- -
-
- - - - - - - - -
int atca_mbedtls_ecdh_slot_cb (void )
-
- -

ECDH Callback to obtain the "slot" used in ECDH operations from the application.

-
Returns
Slot Number
- -
-
- -

◆ atca_mbedtls_pk_init()

- -
-
- - - - - - - - - - - - - - - - - - -
int atca_mbedtls_pk_init (mbedtls_pk_context * pkey,
const uint16_t slotid 
)
-
- -

Initializes an mbedtls pk context for use with EC operations.

-
Parameters
- - - -
[in,out]pkeyptr to space to receive version string
[in]slotidAssociated with this key
-
-
-
Returns
0 on success, otherwise an error code.
- -
-
- -

◆ atca_mbedtls_pk_init_ext()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
int atca_mbedtls_pk_init_ext (ATCADevice device,
mbedtls_pk_context * pkey,
const uint16_t slotid 
)
-
- -

Initializes an mbedtls pk context for use with EC operations.

-
Parameters
- - - -
[in,out]pkeyptr to space to receive version string
[in]slotidAssociated with this key
-
-
-
Returns
0 on success, otherwise an error code.
- -
-
-
-
- - - - diff --git a/a01449.js b/a01449.js deleted file mode 100644 index 99e0bc982..000000000 --- a/a01449.js +++ /dev/null @@ -1,10 +0,0 @@ -var a01449 = -[ - [ "mbedtls directory - Purpose", "a01449.html#md_lib_mbedtls_README", null ], - [ "atca_mbedtls_eckey_s", "a01808.html", null ], - [ "atca_mbedtls_eckey_t", "a01449.html#ga36d21431afe595eab1b7f7a2330ad727", null ], - [ "atca_mbedtls_ecdh_ioprot_cb", "a01449.html#gaa35682dc98e33ce3d6fad1fc902cdff0", null ], - [ "atca_mbedtls_ecdh_slot_cb", "a01449.html#ga98d684683ccecd3d56bdf5dc27ae999c", null ], - [ "atca_mbedtls_pk_init", "a01449.html#gaa55a112d0b087adc242cc9b0978b5d15", null ], - [ "atca_mbedtls_pk_init_ext", "a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6", null ] -]; \ No newline at end of file diff --git a/a01450.html b/a01450.html deleted file mode 100644 index 60cb54578..000000000 --- a/a01450.html +++ /dev/null @@ -1,1396 +0,0 @@ - - - - - - - -CryptoAuthLib: Attributes (pkcs11_attrib_) - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
Attributes (pkcs11_attrib_)
-
-
- - - - - - -

-Data Structures

struct  pkcs11_conf_filedata_s
 
struct  pcks11_mech_table_e
 
- - - - - - - - - - - -

-Macros

-#define PKCS11_CONFIG_U8_MAX   0xFFL
 
-#define PKCS11_CONFIG_U16_MAX   0xFFFFL
 
-#define PKCS11_CONFIG_U32_MAX   0xFFFFFFFFL
 
-#define PCKS11_MECH_ECC508_EC_CAPABILITY   (CKF_EC_F_P | CKF_EC_NAMEDCURVE | CKF_EC_UNCOMPRESS)
 
-#define TABLE_SIZE(x)   sizeof(x) / sizeof(x[0])
 
- - - - - - - - - -

-Typedefs

-typedef struct pkcs11_conf_filedata_s pkcs11_conf_filedata
 
-typedef struct pkcs11_conf_filedata_spkcs11_conf_filedata_ptr
 
-typedef struct pcks11_mech_table_e pcks11_mech_table_e
 
-typedef struct pcks11_mech_table_epcks11_mech_table_ptr
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

CK_RV pkcs11_attrib_fill (CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize)
 Perform the nessasary checks and copy data into an attribute structure.
 
-CK_RV pkcs11_attrib_value (CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize)
 Helper function to write a numerical value to an attribute buffer.
 
-CK_RV pkcs11_attrib_false (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_attrib_true (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_attrib_empty (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_cert_load (pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pAttribute, ATCADevice device)
 
-CK_RV pkcs11_cert_x509_write (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_cert_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_cert_clear_object_cache (pkcs11_object_ptr pObject)
 
-void pkcs11_config_init_private (pkcs11_object_ptr pObject, const char *label, size_t len)
 
-void pkcs11_config_init_public (pkcs11_object_ptr pObject, const char *label, size_t len)
 
-void pkcs11_config_init_secret (pkcs11_object_ptr pObject, const char *label, size_t len, size_t keylen)
 
-void pkcs11_config_init_cert (pkcs11_object_ptr pObject, const char *label, size_t len)
 
-void pkcs11_config_split_string (char *s, char splitter, int *argc, char *argv[])
 
-CK_RV pkcs11_config_cert (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pLabel)
 
-CK_RV pkcs11_config_key (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject, CK_ATTRIBUTE_PTR pLabel)
 
-CK_RV pkcs11_config_remove_object (pkcs11_lib_ctx_ptr pLibCtx, pkcs11_slot_ctx_ptr pSlot, pkcs11_object_ptr pObject)
 
-CK_RV pkcs11_config_load_objects (pkcs11_slot_ctx_ptr slot_ctx)
 
-CK_RV pkcs11_config_load (pkcs11_slot_ctx_ptr slot_ctx)
 
-CK_RV pkcs11_encrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
-CK_RV pkcs11_encrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 
-CK_RV pkcs11_encrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Finishes a multiple-part encryption operation.
 
-CK_RV pkcs11_decrypt_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
-CK_RV pkcs11_decrypt_update (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 
-CK_RV pkcs11_decrypt_final (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Finishes a multiple-part decryption operation.
 
-CK_RV pkcs11_find_init (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_find_continue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 
-CK_RV pkcs11_find_finish (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_find_get_attribute (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_get_lib_info (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
-pkcs11_lib_ctx_ptr pkcs11_get_context (void)
 Retrieve the current library context.
 
-CK_RV pkcs11_lock_context (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_context (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_lock_device (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_device (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_lock_both (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_unlock_both (pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_init_check (pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock)
 Check if the library is initialized properly.
 
CK_RV pkcs11_init (CK_C_INITIALIZE_ARGS const *pInitArgs)
 Initializes the PKCS11 API Library for Cryptoauthlib.
 
CK_RV pkcs11_deinit (CK_VOID_PTR pReserved)
 
-const pkcs11_ecc_key_info_tpkcs11_get_object_key_type (ATCADevice device_ctx, pkcs11_object_ptr obj_ptr)
 
-CK_RV pkcs11_ta_get_pubkey (CK_VOID_PTR pObject, cal_buffer *key_buffer, pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_key_write (CK_VOID_PTR pSession, CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, const pkcs11_ecc_key_info_t *ec_key_info)
 
-CK_RV pkcs11_key_generate (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
-CK_RV pkcs11_key_generate_pair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 
-CK_RV pkcs11_key_derive (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 
-CK_RV pkcs11_key_clear_session_cache (pkcs11_session_ctx_ptr session_ctx)
 
-CK_RV pkcs11_key_clear_object_cache (pkcs11_object_ptr pObject)
 
-CK_RV C_Initialize (CK_VOID_PTR pInitArgs)
 Initializes Cryptoki library NOTES: If pInitArgs is a non-NULL_PTR is must dereference to a CK_C_INITIALIZE_ARGS structure.
 
-CK_RV C_Finalize (CK_VOID_PTR pReserved)
 Clean up miscellaneous Cryptoki-associated resources.
 
-CK_RV C_GetInfo (CK_INFO_PTR pInfo)
 Obtains general information about Cryptoki.
 
-CK_RV C_GetFunctionList (CK_FUNCTION_LIST_PTR_PTR ppFunctionList)
 Obtains entry points of Cryptoki library functions.
 
-CK_RV C_GetSlotList (CK_BBOOL tokenPresent, CK_SLOT_ID_PTR pSlotList, CK_ULONG_PTR pulCount)
 Obtains a list of slots in the system.
 
-CK_RV C_GetSlotInfo (CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo)
 Obtains information about a particular slot.
 
-CK_RV C_GetTokenInfo (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
-CK_RV C_GetMechanismList (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 Obtains a list of mechanisms supported by a token (in a slot)
 
-CK_RV C_GetMechanismInfo (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 Obtains information about a particular mechanism of a token (in a slot)
 
-CK_RV C_InitToken (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 Initializes a token (in a slot)
 
-CK_RV C_InitPIN (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 Initializes the normal user's PIN.
 
-CK_RV C_SetPIN (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 Modifies the PIN of the current user.
 
-CK_RV C_OpenSession (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY Notify, CK_SESSION_HANDLE_PTR phSession)
 Opens a connection between an application and a particular token or sets up an application callback for token insertion.
 
-CK_RV C_CloseSession (CK_SESSION_HANDLE hSession)
 Close the given session.
 
-CK_RV C_CloseAllSessions (CK_SLOT_ID slotID)
 Close all open sessions.
 
-CK_RV C_GetSessionInfo (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Retrieve information about the specified session.
 
-CK_RV C_GetOperationState (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pOperationState, CK_ULONG_PTR pulOperationStateLen)
 Obtains the cryptographic operations state of a session.
 
-CK_RV C_SetOperationState (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pOperationState, CK_ULONG ulOperationStateLen, CK_OBJECT_HANDLE hEncryptionKey, CK_OBJECT_HANDLE hAuthenticationKey)
 Sets the cryptographic operations state of a session.
 
-CK_RV C_Login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 Login on the token in the specified session.
 
-CK_RV C_Logout (CK_SESSION_HANDLE hSession)
 Log out of the token in the specified session.
 
-CK_RV C_CreateObject (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
-CK_RV C_CopyObject (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phNewObject)
 Create a copy of the object with the specified handle.
 
-CK_RV C_DestroyObject (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
-CK_RV C_GetObjectSize (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 Obtains the size of an object in bytes.
 
-CK_RV C_GetAttributeValue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Obtains an attribute value of an object.
 
-CK_RV C_SetAttributeValue (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Change or set the value of the specified attributes on the specified object.
 
-CK_RV C_FindObjectsInit (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 Initializes an object search in the specified session using the specified attribute template as search parameters.
 
-CK_RV C_FindObjects (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE_PTR phObject, CK_ULONG ulMaxObjectCount, CK_ULONG_PTR pulObjectCount)
 Continue the search for objects in the specified session.
 
-CK_RV C_FindObjectsFinal (CK_SESSION_HANDLE hSession)
 Finishes an object search operation (and cleans up)
 
-CK_RV C_EncryptInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes an encryption operation using the specified mechanism and session.
 
-CK_RV C_Encrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen)
 Perform a single operation encryption operation in the specified session.
 
-CK_RV C_EncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues a multiple-part encryption operation.
 
-CK_RV C_EncryptFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pLastEncryptedPart, CK_ULONG_PTR pulLastEncryptedPartLen)
 Finishes a multiple-part encryption operation.
 
-CK_RV C_DecryptInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize decryption using the specified object.
 
-CK_RV C_Decrypt (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Perform a single operation decryption in the given session.
 
-CK_RV C_DecryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues a multiple-part decryption operation.
 
-CK_RV C_DecryptFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pLastPart, CK_ULONG_PTR pulLastPartLen)
 Finishes a multiple-part decryption operation.
 
-CK_RV C_DigestInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
 Initializes a message-digesting operation using the specified mechanism in the specified session.
 
-CK_RV C_Digest (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Digest the specified data in a one-pass operation and return the resulting digest.
 
-CK_RV C_DigestUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part digesting operation.
 
-CK_RV C_DigestKey (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey)
 Update a running digest operation by digesting a secret key with the specified handle.
 
-CK_RV C_DigestFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
 Finishes a multiple-part digesting operation.
 
-CK_RV C_SignInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
-CK_RV C_Sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
-CK_RV C_SignUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
-CK_RV C_SignFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
-CK_RV C_SignRecoverInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a signature operation, where the data can be recovered from the signature.
 
-CK_RV C_SignRecover (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Signs single-part data, where the data can be recovered from the signature.
 
-CK_RV C_VerifyInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
-CK_RV C_Verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
-CK_RV C_VerifyUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
-CK_RV C_VerifyFinal (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 
-CK_RV C_VerifyRecoverInit (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation where the data is recovered from the signature.
 
-CK_RV C_VerifyRecover (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
 Verifies a signature on single-part data, where the data is recovered from the signature.
 
-CK_RV C_DigestEncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues simultaneous multiple-part digesting and encryption operations.
 
-CK_RV C_DecryptDigestUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues simultaneous multiple-part decryption and digesting operations.
 
-CK_RV C_SignEncryptUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, CK_ULONG_PTR pulEncryptedPartLen)
 Continues simultaneous multiple-part signature and encryption operations.
 
-CK_RV C_DecryptVerifyUpdate (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
 Continues simultaneous multiple-part decryption and verification operations.
 
-CK_RV C_GenerateKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
 Generates a secret key using the specified mechanism.
 
-CK_RV C_GenerateKeyPair (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount, CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount, CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
 Generates a public-key/private-key pair using the specified mechanism.
 
-CK_RV C_WrapKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hWrappingKey, CK_OBJECT_HANDLE hKey, CK_BYTE_PTR pWrappedKey, CK_ULONG_PTR pulWrappedKeyLen)
 Wraps (encrypts) the specified key using the specified wrapping key and mechanism.
 
-CK_RV C_UnwrapKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hUnwrappingKey, CK_BYTE_PTR pWrappedKey, CK_ULONG ulWrappedKeyLen, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
 Unwraps (decrypts) the specified key using the specified unwrapping key.
 
-CK_RV C_DeriveKey (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
 Derive a key from the specified base key.
 
-CK_RV C_SeedRandom (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSeed, CK_ULONG ulSeedLen)
 Mixes in additional seed material to the random number generator.
 
-CK_RV C_GenerateRandom (CK_SESSION_HANDLE hSession, CK_BYTE_PTR RandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
-CK_RV C_GetFunctionStatus (CK_SESSION_HANDLE hSession)
 Legacy function - see PKCS#11 v2.40.
 
-CK_RV C_CancelFunction (CK_SESSION_HANDLE hSession)
 Legacy function.
 
-CK_RV C_WaitForSlotEvent (CK_FLAGS flags, CK_SLOT_ID_PTR pSlot, CK_VOID_PTR pRserved)
 Wait for a slot event (token insertion, removal, etc) on the specified slot to occur.
 
-CK_RV pkcs11_mech_get_list (CK_SLOT_ID slotID, CK_MECHANISM_TYPE_PTR pMechanismList, CK_ULONG_PTR pulCount)
 
-CK_RV pkcs_mech_get_info (CK_SLOT_ID slotID, CK_MECHANISM_TYPE type, CK_MECHANISM_INFO_PTR pInfo)
 
-CK_RV pkcs11_object_alloc (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject)
 
-CK_RV pkcs11_object_free (pkcs11_object_ptr pObject)
 
-CK_RV pkcs11_object_check (pkcs11_object_ptr *ppObject, CK_OBJECT_HANDLE hObject)
 
-CK_RV pkcs11_object_get_handle (pkcs11_object_ptr pObject, CK_OBJECT_HANDLE_PTR phObject)
 
-CK_RV pkcs11_object_get_owner (pkcs11_object_ptr pObject, CK_SLOT_ID_PTR pSlotId)
 
-CK_RV pkcs11_object_get_name (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_class (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_destroyable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_object_get_size (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize)
 
-CK_RV pkcs11_object_find (CK_SLOT_ID slotId, pkcs11_object_ptr *ppObject, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount)
 
-CK_RV pkcs11_object_create (CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject)
 Create a new object on the token in the specified session using the given attribute template.
 
-CK_RV pkcs11_object_destroy (CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject)
 Destroy the specified object.
 
-CK_RV pkcs11_object_deinit (pkcs11_lib_ctx_ptr pContext)
 
-ATCA_STATUS pkcs11_object_load_handle_info (ATCADevice device, pkcs11_lib_ctx_ptr pContext)
 
-CK_RV pkcs11_object_is_private (pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession)
 Checks the attributes of the underlying cryptographic asset to determine if it is a private key - this changes the way the associated public key is referenced.
 
CK_RV pkcs11_os_create_mutex (CK_VOID_PTR_PTR ppMutex)
 Application callback for creating a mutex object.
 
-CK_RV pkcs11_os_destroy_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_lock_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_unlock_mutex (CK_VOID_PTR pMutex)
 
-CK_RV pkcs11_os_alloc_shared_ctx (void **ppShared, size_t size)
 
-CK_RV pkcs11_os_free_shared_ctx (void *pShared, size_t size)
 
-pkcs11_session_ctx_ptr pkcs11_get_session_context (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_session_check (pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession)
 Check if the session is initialized properly.
 
-CK_RV pkcs11_reserve_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
-CK_RV pkcs11_release_resource (pkcs11_lib_ctx_ptr pContext, pkcs11_session_ctx_ptr pSession, uint8_t resource)
 
-CK_RV pkcs11_session_open (CK_SLOT_ID slotID, CK_FLAGS flags, CK_VOID_PTR pApplication, CK_NOTIFY notify, CK_SESSION_HANDLE_PTR phSession)
 
-CK_RV pkcs11_session_close (CK_SESSION_HANDLE hSession)
 
CK_RV pkcs11_session_closeall (CK_SLOT_ID slotID)
 Close all sessions for a given slot - not actually all open sessions.
 
-CK_RV pkcs11_session_get_info (CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo)
 Obtains information about a particular session.
 
CK_RV pkcs11_session_login (CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
 
-CK_RV pkcs11_session_logout (CK_SESSION_HANDLE hSession)
 
-CK_RV pkcs11_signature_sign_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initialize a signing operation using the specified key and mechanism.
 
-CK_RV pkcs11_signature_sign (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Sign the data in a single pass operation.
 
-CK_RV pkcs11_signature_sign_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part signature operation.
 
-CK_RV pkcs11_signature_sign_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen)
 Finishes a multiple-part signature operation.
 
-CK_RV pkcs11_signature_verify_init (CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey)
 Initializes a verification operation using the specified key and mechanism.
 
-CK_RV pkcs11_signature_verify (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Verifies a signature on single-part data.
 
-CK_RV pkcs11_signature_verify_continue (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen)
 Continues a multiple-part verification operation.
 
-CK_RV pkcs11_signature_verify_finish (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
 Finishes a multiple-part verification operation.
 
-pkcs11_slot_ctx_ptr pkcs11_slot_get_context (pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID)
 Retrieve the current slot context.
 
-pkcs11_slot_ctx_ptr pkcs11_slot_get_new_context (pkcs11_lib_ctx_ptr lib_ctx)
 
-CK_VOID_PTR pkcs11_slot_initslots (CK_ULONG pulCount)
 
-CK_RV pkcs11_slot_deinitslots (pkcs11_lib_ctx_ptr lib_ctx)
 
-CK_RV pkcs11_slot_config (CK_SLOT_ID slotID)
 
-CK_RV pkcs11_slot_init (CK_SLOT_ID slotID)
 This is an internal function that initializes a pkcs11 slot - it must already have the locks in place before being called.
 
-CK_RV pkcs11_slot_get_list (CK_BBOOL tokenPresent, CK_SLOT_ID_PTR pSlotList, CK_ULONG_PTR pulCount)
 
-CK_RV pkcs11_slot_get_info (CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo)
 Obtains information about a particular slot.
 
CK_RV pkcs11_token_init (CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel)
 
-CK_RV pkcs11_token_get_access_type (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_writable (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_storage (CK_VOID_PTR pObject, CK_ATTRIBUTE_PTR pAttribute, pkcs11_session_ctx_ptr pSession)
 
-CK_RV pkcs11_token_get_info (CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo)
 Obtains information about a particular token.
 
-CK_RV pkcs11_token_random (CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen)
 Generate the specified amount of random data.
 
-CK_RV pkcs11_token_convert_pin_to_key (const CK_UTF8CHAR_PTR pPin, const CK_ULONG ulPinLen, const CK_UTF8CHAR_PTR pSalt, const CK_ULONG ulSaltLen, CK_BYTE_PTR pKey, CK_ULONG ulKeyLen, pkcs11_slot_ctx_ptr slot_ctx)
 
-CK_RV pkcs11_token_set_pin (CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldLen, CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewLen)
 
-void pkcs11_util_escape_string (CK_UTF8CHAR_PTR buf, CK_ULONG buf_len)
 
-CK_RV pkcs11_util_convert_rv (ATCA_STATUS status)
 
-int pkcs11_util_memset (void *dest, size_t destsz, int ch, size_t count)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Variables

const pkcs11_attrib_model pkcs11_cert_x509public_attributes []
 
-const CK_ULONG pkcs11_cert_x509public_attributes_count = (CK_ULONG)(sizeof( pkcs11_cert_x509public_attributes ) / sizeof( pkcs11_cert_x509public_attributes [0]))
 
const pkcs11_attrib_model pkcs11_cert_wtlspublic_attributes []
 
-const CK_ULONG pkcs11_cert_wtlspublic_attributes_count = (CK_ULONG)(sizeof( pkcs11_cert_wtlspublic_attributes ) / sizeof( pkcs11_cert_wtlspublic_attributes [0]))
 
const pkcs11_attrib_model pkcs11_cert_x509_attributes []
 
-const CK_ULONG pkcs11_cert_x509_attributes_count = (CK_ULONG)(sizeof( pkcs11_cert_x509_attributes ) / sizeof( pkcs11_cert_x509_attributes [0]))
 
-const char pkcs11_lib_manufacturer_id [] = "Microchip Technology Inc"
 
-const char pkcs11_lib_description [] = "Cryptoauthlib PKCS11 Interface"
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec256 []
 
-CK_BYTE pkcs11_key_ec_params_p256 [] = { 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 }
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec224 []
 
-CK_BYTE pkcs11_key_ec_params_p224 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x21 }
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384 []
 
-CK_BYTE pkcs11_key_ec_params_p384 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x22 }
 
CK_BYTE pkcs11_x962_asn1_hdr_ec384 []
 
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521 []
 
CK_BYTE pkcs11_x962_asn1_hdr_ec521 []
 
-CK_BYTE pkcs11_key_ec_params_p521 [] = { 0x06, 0x05, 0x2B, 0x81, 0x04, 0x00, 0x23 }
 
const pkcs11_ecc_key_info_t ec_key_data_table [4]
 
const pkcs11_attrib_model pkcs11_key_public_attributes []
 
-const CK_ULONG pkcs11_key_public_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_public_attributes ) / sizeof( pkcs11_key_public_attributes [0]))
 
const pkcs11_attrib_model pkcs11_key_private_attributes []
 
-const CK_ULONG pkcs11_key_private_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_private_attributes ) / sizeof( pkcs11_key_private_attributes [0]))
 
const pkcs11_attrib_model pkcs11_key_secret_attributes []
 
-const CK_ULONG pkcs11_key_secret_attributes_count = (CK_ULONG)(sizeof( pkcs11_key_secret_attributes ) / sizeof( pkcs11_key_secret_attributes [0]))
 
-pkcs11_object_cache_t pkcs11_object_cache [PKCS11_MAX_OBJECTS_ALLOWED]
 
const pkcs11_attrib_model pkcs11_object_monotonic_attributes []
 
-const CK_ULONG pkcs11_object_monotonic_attributes_count = (CK_ULONG)(sizeof( pkcs11_object_monotonic_attributes ) / sizeof( pkcs11_object_monotonic_attributes [0]))
 
-

Detailed Description

-

Function Documentation

- -

◆ pkcs11_attrib_fill()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
CK_RV pkcs11_attrib_fill (CK_ATTRIBUTE_PTR pAttribute,
const void * pData,
const CK_ULONG ulSize 
)
-
- -

Perform the nessasary checks and copy data into an attribute structure.

-

The ulValueLen field is modified to hold the exact length of the specified attribute for the object. In the special case of an attribute whose value is an array of attributes, for example CKA_WRAP_TEMPLATE, where it is passed in with pValue not NULL, then if the pValue of elements within the array is NULL_PTR then the ulValueLen of elements within the array will be set to the required length. If the pValue of elements within the array is not NULL_PTR, then the ulValueLen element of attributes within the array MUST reflect the space that the corresponding pValue points to, and pValue is filled in if there is sufficient room.Therefore it is important to initialize the contents of a buffer before calling C_GetAttributeValue to get such an array value. If any ulValueLen within the array isn't large enough, it will be set to CK_UNAVAILABLE_INFORMATION and the function will return CKR_BUFFER_TOO_SMALL, as it does if an attribute in the pTemplate argument has ulValueLen too small Note that any attribute whose value is an array of attributes is identifiable by virtue of the attribute type having the CKF_ARRAY_ATTRIBUTE bit set.

- -
-
- -

◆ pkcs11_deinit()

- -
-
- - - - - - - - -
CK_RV pkcs11_deinit (CK_VOID_PTR pReserved)
-
- -
-
- -

◆ pkcs11_init()

- -
-
- - - - - - - - -
CK_RV pkcs11_init (CK_C_INITIALIZE_ARGS const * pInitArgs)
-
- -

Initializes the PKCS11 API Library for Cryptoauthlib.

- -
-
- -

◆ pkcs11_os_create_mutex()

- -
-
- - - - - - - - -
CK_RV pkcs11_os_create_mutex (CK_VOID_PTR_PTR ppMutex)
-
- -

Application callback for creating a mutex object.

-
Parameters
- - -
[in,out]ppMutexlocation to receive ptr to mutex
-
-
- -
-
- -

◆ pkcs11_session_closeall()

- -
-
- - - - - - - - -
CK_RV pkcs11_session_closeall (CK_SLOT_ID slotID)
-
- -

Close all sessions for a given slot - not actually all open sessions.

-

for specified slotid close all sessions related with it.

- -
-
- -

◆ pkcs11_session_login()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
CK_RV pkcs11_session_login (CK_SESSION_HANDLE hSession,
CK_USER_TYPE userType,
CK_UTF8CHAR_PTR pPin,
CK_ULONG ulPinLen 
)
-
-

Reserve the PKCS11_AUTH_OP_0 / PKCS11_AUTH_OP_1 based on availability

-

Auth operation unavailable return error

- -
-
- -

◆ pkcs11_token_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
CK_RV pkcs11_token_init (CK_SLOT_ID slotID,
CK_UTF8CHAR_PTR pPin,
CK_ULONG ulPinLen,
CK_UTF8CHAR_PTR pLabel 
)
-
-

Write the configuration into the device and generate new keys

- -
-
-

Variable Documentation

- -

◆ ec_key_data_table

- -
-
- - - - -
const pkcs11_ecc_key_info_t ec_key_data_table[4]
-
-Initial value:
= {
-
{ ATCA_KEY_TYPE_ECCP256, (CK_BYTE)ATCA_ECCP256_OID_SIZE, pkcs11_key_ec_params_p256, pkcs11_ec_pbkey_asn1_hdr_p256,
-
pkcs11_x962_asn1_hdr_ec256, (uint16_t)ATCA_ECCP256_ASN1_HDR_SIZE, ATCA_ECCP256_PUBKEY_SIZE, ATCA_ECCP256_MSG_SIZE, ATCA_ECCP256_SIG_SIZE }
-
-
,{ TA_KEY_TYPE_ECCP224, (CK_BYTE)TA_ECC224_OID_SIZE, pkcs11_key_ec_params_p224, pkcs11_ec_pbkey_asn1_hdr_p224,
-
pkcs11_x962_asn1_hdr_ec224, (uint16_t)TA_ECC224_ASN1_HDR_SIZE, TA_ECC224_PUB_KEY_SIZE, TA_SIGN_P224_MSG_SIZE, TA_SIGN_P224_SIG_SIZE },
-
-
{ TA_KEY_TYPE_ECCP384, (CK_BYTE)TA_ECC384_OID_SIZE, pkcs11_key_ec_params_p384, pkcs11_ec_pbkey_asn1_hdr_p384,
-
pkcs11_x962_asn1_hdr_ec384, (uint16_t)TA_ECC384_ASN1_HDR_SIZE, TA_ECC384_PUB_KEY_SIZE, TA_SIGN_P384_MSG_SIZE, TA_SIGN_P384_SIG_SIZE },
-
-
{ TA_KEY_TYPE_ECCP521, (CK_BYTE)TA_ECC521_OID_SIZE, pkcs11_key_ec_params_p521, pkcs11_ec_pbkey_asn1_hdr_p521,
-
pkcs11_x962_asn1_hdr_ec521, (uint16_t)TA_ECC521_ASN1_HDR_SIZE, TA_ECC521_PUB_KEY_SIZE, TA_SIGN_P521_MSG_SIZE, TA_SIGN_P521_SIG_SIZE },
-
-
}
-
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521[]
Definition: pkcs11_key.c:117
-
CK_BYTE pkcs11_x962_asn1_hdr_ec521[]
Definition: pkcs11_key.c:129
-
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224[]
Definition: pkcs11_key.c:80
-
CK_BYTE pkcs11_x962_asn1_hdr_ec256[]
Definition: pkcs11_key.c:72
-
CK_BYTE pkcs11_x962_asn1_hdr_ec384[]
Definition: pkcs11_key.c:112
-
CK_BYTE pkcs11_x962_asn1_hdr_ec224[]
Definition: pkcs11_key.c:91
-
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256[]
Definition: pkcs11_key.c:61
-
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384[]
Definition: pkcs11_key.c:98
-
-
-
- -

◆ pkcs11_cert_wtlspublic_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_cert_wtlspublic_attributes[]
-
-

CKO_CERTIFICATE (Type: CKC_WTLS) - WTLS Public Key Certificate Model

- -
-
- -

◆ pkcs11_cert_x509_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_cert_x509_attributes[]
-
-

CKO_CERTIFICATE (Type: CKC_X_509_ATTR_CERT) - X509 Attribute Certificate Model

- -
-
- -

◆ pkcs11_cert_x509public_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_cert_x509public_attributes[]
-
-

CKO_CERTIFICATE (Type: CKC_X_509) - X509 Public Key Certificate Model

- -
-
- -

◆ pkcs11_ec_pbkey_asn1_hdr_p224

- -
-
- - - - -
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p224[]
-
-Initial value:
= {
-
0x30, 0x4e,
-
0x30, 0x10,
-
0x06, 0x07,
-
0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01,
-
0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x21,
-
0x03, 0x3a, 0x00,
-
0x04
-
}
-

ASN.1 Header for SECP224R1 public keys

- -
-
- -

◆ pkcs11_ec_pbkey_asn1_hdr_p256

- -
-
- - - - -
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p256[]
-
-Initial value:
= {
-
0x30, 0x59,
-
0x30, 0x13,
-
0x06, 0x07,
-
0x2A, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01,
-
0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07,
-
0x03, 0x42, 0x00,
-
0x04
-
}
-

ASN.1 Header for SECP256R1 public keys

- -
-
- -

◆ pkcs11_ec_pbkey_asn1_hdr_p384

- -
-
- - - - -
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p384[]
-
-Initial value:
= {
-
0x30, 0x76,
-
0x30, 0x10,
-
0x06, 0x07,
-
0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01,
-
0x06, 0x05,
-
0x2b, 0x81, 0x04, 0x00, 0x22,
-
0x03, 0x62, 0x00,
-
0x04
-
}
-

ASN.1 Header for SECP384R1 public keys

- -
-
- -

◆ pkcs11_ec_pbkey_asn1_hdr_p521

- -
-
- - - - -
CK_BYTE pkcs11_ec_pbkey_asn1_hdr_p521[]
-
-Initial value:
= {
-
0x30, 0x81, 0x9b,
-
0x30, 0x10,
-
0x06, 0x07,
-
0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01,
-
0x06, 0x05,
-
0x2b, 0x81, 0x04, 0x00, 0x23,
-
0x03, 0x81, 0x86, 0x00,
-
0x04
-
}
-

ASN.1 Header for SECP521R1 public keys

- -
-
- -

◆ pkcs11_key_private_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_key_private_attributes[]
-
-

CKO_PRIVATE_KEY - Private Key Object Base Model

- -
-
- -

◆ pkcs11_key_public_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_key_public_attributes[]
-
-

CKO_PUBLIC_KEY - Public Key Object Model

- -
-
- -

◆ pkcs11_key_secret_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_key_secret_attributes[]
-
-

CKO_SECRET_KEY - Secret Key Object Base Model

- -
-
- -

◆ pkcs11_object_monotonic_attributes

- -
-
- - - - -
const pkcs11_attrib_model pkcs11_object_monotonic_attributes[]
-
-Initial value:
= {
-
-
{ 0x00000000UL , pkcs11_object_get_class },
-
-
{ 0x00000300UL , pkcs11_object_get_type },
-
-
{ 0x00000301UL , pkcs11_attrib_false },
-
-
{ 0x00000302UL , pkcs11_attrib_false },
-
-
{ 0x00000011UL , 0 },
-
}
-

CKA_CLASS == CKO_HW_FEATURE_TYPE CKA_HW_FEATURE_TYPE == CKH_MONOTONIC_COUNTER

- -
-
- -

◆ pkcs11_x962_asn1_hdr_ec224

- -
-
- - - - -
CK_BYTE pkcs11_x962_asn1_hdr_ec224[]
-
-Initial value:
= {
-
0x04, 0x39, 0x04
-
}
-

X.962 ASN.1 Header for EC224 public keys

- -
-
- -

◆ pkcs11_x962_asn1_hdr_ec256

- -
-
- - - - -
CK_BYTE pkcs11_x962_asn1_hdr_ec256[]
-
-Initial value:
= {
-
0x04, 0x41, 0x04
-
}
-

X.962 ASN.1 Header for EC256 public keys

- -
-
- -

◆ pkcs11_x962_asn1_hdr_ec384

- -
-
- - - - -
CK_BYTE pkcs11_x962_asn1_hdr_ec384[]
-
-Initial value:
= {
-
0x04, 0x61, 0x04
-
}
-

X.962 ASN.1 Header for EC384 public keys

- -
-
- -

◆ pkcs11_x962_asn1_hdr_ec521

- -
-
- - - - -
CK_BYTE pkcs11_x962_asn1_hdr_ec521[]
-
-Initial value:
= {
-
0x04, 0x85, 0x04
-
}
-

X.962 ASN.1 Header for EC521 public keys

- -
-
-
-
- - - - diff --git a/a01450.js b/a01450.js deleted file mode 100644 index efd44e59a..000000000 --- a/a01450.js +++ /dev/null @@ -1,119 +0,0 @@ -var a01450 = -[ - [ "pkcs11_conf_filedata_s", "a01824.html", null ], - [ "pcks11_mech_table_e", "a01848.html", null ], - [ "C_CancelFunction", "a01450.html#gac545b1d8eeb82e40f7519cdfc5a3427c", null ], - [ "C_CloseAllSessions", "a01450.html#gad2ab78c409dfcbc155d673550cb71736", null ], - [ "C_CloseSession", "a01450.html#gae2ce0be368072fa83e0b1f5136b7b753", null ], - [ "C_CopyObject", "a01450.html#ga301f7118a227ffedd7f945a9532fc18a", null ], - [ "C_CreateObject", "a01450.html#ga01b36384bff05a4dc4476c0764cdc248", null ], - [ "C_Decrypt", "a01450.html#gad7a0c95a7b810c5534185632b8b58d29", null ], - [ "C_DecryptDigestUpdate", "a01450.html#ga128ba07226b7e45772830f06dfde4b71", null ], - [ "C_DecryptFinal", "a01450.html#gab549c4d540cff530f9e4d9bca36e2253", null ], - [ "C_DecryptInit", "a01450.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5", null ], - [ "C_DecryptUpdate", "a01450.html#gaa4fb93ab28bedada72364e925b3dacbf", null ], - [ "C_DecryptVerifyUpdate", "a01450.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c", null ], - [ "C_DeriveKey", "a01450.html#ga67ecc1ce8ca0630aebdf3a29e129f531", null ], - [ "C_DestroyObject", "a01450.html#ga1b991b6fd8b20f130f9d87b98e590fdb", null ], - [ "C_Digest", "a01450.html#gadfc9281add668a5aff9bbc1253655917", null ], - [ "C_DigestEncryptUpdate", "a01450.html#ga3f8a5f0509ef9929f90536b6e255e485", null ], - [ "C_DigestFinal", "a01450.html#ga1f3dc3758726bb4737db956e4cd71e91", null ], - [ "C_DigestInit", "a01450.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403", null ], - [ "C_DigestKey", "a01450.html#ga21a9c4115bc535490416e2850a2a45fd", null ], - [ "C_DigestUpdate", "a01450.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6", null ], - [ "C_Encrypt", "a01450.html#gaf9aab1c3fcf352af53b0e66652fac39d", null ], - [ "C_EncryptFinal", "a01450.html#gab4a336f9cb4920a9ff8585aec5d90a3f", null ], - [ "C_EncryptInit", "a01450.html#ga23a9b2dc15a447decd10881dde448890", null ], - [ "C_EncryptUpdate", "a01450.html#ga5e13fc136e0b7f79d22a6b735424a815", null ], - [ "C_Finalize", "a01450.html#ga945318df98e940ab331931023133ed3d", null ], - [ "C_FindObjects", "a01450.html#ga42635cbaa2ba78482ae053bea477246a", null ], - [ "C_FindObjectsFinal", "a01450.html#ga46347f830269bfbcbece15951f0c0fa4", null ], - [ "C_FindObjectsInit", "a01450.html#gaf4d4d071deb07e7dcfa489a2a835756d", null ], - [ "C_GenerateKey", "a01450.html#ga84673050f913404ec3ae164d4f7a1d9c", null ], - [ "C_GenerateKeyPair", "a01450.html#ga802a061224966a5523beb1ea0a9d9c27", null ], - [ "C_GenerateRandom", "a01450.html#ga54a883eb1608be800f7fbd204665d50d", null ], - [ "C_GetAttributeValue", "a01450.html#gaaad61dc7b2313286bdd049676ef0fd70", null ], - [ "C_GetFunctionList", "a01450.html#gab4cf13775c4e92b36156ee92dd52bef5", null ], - [ "C_GetFunctionStatus", "a01450.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0", null ], - [ "C_GetInfo", "a01450.html#ga75bdc5d475cd205914b8227c7f08df4c", null ], - [ "C_GetMechanismInfo", "a01450.html#gabe5aeb6b794d4ca28cb2534fe0a4a159", null ], - [ "C_GetMechanismList", "a01450.html#gac80659e1b954f9514723fd6d4429dfb6", null ], - [ "C_GetObjectSize", "a01450.html#gadd117013f515b1d441889a24a605bd93", null ], - [ "C_GetOperationState", "a01450.html#ga95dcfc50be7ac2cb3ebf58d958f70dde", null ], - [ "C_GetSessionInfo", "a01450.html#gaffb75a4d4ba623ee01f31877b56b018e", null ], - [ "C_GetSlotInfo", "a01450.html#gae795a3fd0467a249eeb075f94bfa0adc", null ], - [ "C_GetSlotList", "a01450.html#gac6ce96c3f4a3b7f24d9420763df121fc", null ], - [ "C_GetTokenInfo", "a01450.html#gac933291718eb6aa218db1c677e07ab02", null ], - [ "C_Initialize", "a01450.html#ga2e45ad4ce8c84712c646dddaa99544e3", null ], - [ "C_InitPIN", "a01450.html#ga2b726534eedac635b28ccd501c242004", null ], - [ "C_InitToken", "a01450.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb", null ], - [ "C_Login", "a01450.html#gaca7aa4ae8d9592f464dc1b545fead02e", null ], - [ "C_Logout", "a01450.html#gab7a0a4ff33f2450736d76d453045ad6f", null ], - [ "C_OpenSession", "a01450.html#gad28ad989a94c345875dff446ad6c6481", null ], - [ "C_SeedRandom", "a01450.html#gab26093f478636b5ba04176c2f81f44c4", null ], - [ "C_SetAttributeValue", "a01450.html#ga752412c887c0d900c05b771709ebac83", null ], - [ "C_SetOperationState", "a01450.html#ga66e6598e8f5db01e428a46d58b9865fc", null ], - [ "C_SetPIN", "a01450.html#ga386826845e06a84b36522a2bf49ff6c6", null ], - [ "C_Sign", "a01450.html#ga5f587605d68a7a56012ac337ddaec5e1", null ], - [ "C_SignEncryptUpdate", "a01450.html#gaf63ca32aef7a90f87e94a288de5e82cc", null ], - [ "C_SignFinal", "a01450.html#ga2171c591535849faf017fa126e3a9a48", null ], - [ "C_SignInit", "a01450.html#ga37d93326915dc9b74f2476238f35037c", null ], - [ "C_SignRecover", "a01450.html#ga210f4bdbaae1bc2b8e242e1610da4f0f", null ], - [ "C_SignRecoverInit", "a01450.html#ga97ee219718545f49ee651cbb00712b8c", null ], - [ "C_SignUpdate", "a01450.html#gada0dd5a3d8ae781df05ea016d2f76d16", null ], - [ "C_UnwrapKey", "a01450.html#gafd4a7d6e142179e46453af11d5da3e91", null ], - [ "C_Verify", "a01450.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529", null ], - [ "C_VerifyFinal", "a01450.html#gaf6ecd512fa21851f0bcbc25b90c2b444", null ], - [ "C_VerifyInit", "a01450.html#gaeae51e6092fa8c8a58e022fcd8366c45", null ], - [ "C_VerifyRecover", "a01450.html#ga82355d41e5303e31cc49df003e9d8c38", null ], - [ "C_VerifyRecoverInit", "a01450.html#gaefe33200a70026c7e622b01473d78b66", null ], - [ "C_VerifyUpdate", "a01450.html#gaba9414cf3fc679beaae1baa5425a6e01", null ], - [ "C_WaitForSlotEvent", "a01450.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6", null ], - [ "C_WrapKey", "a01450.html#gaf47613fd93688da939cf4c6998f83d77", null ], - [ "pkcs11_attrib_fill", "a01450.html#ga8b1206a513938768655cdd541ffee9b3", null ], - [ "pkcs11_attrib_value", "a01450.html#ga50e9c64b899d1b2f78c9634298225303", null ], - [ "pkcs11_decrypt_final", "a01450.html#ga045a35287c46a29da2ad13e700087e0d", null ], - [ "pkcs11_deinit", "a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4", null ], - [ "pkcs11_encrypt_final", "a01450.html#gaae94f85980031bec34148341efd537e3", null ], - [ "pkcs11_get_context", "a01450.html#gae0e3060e6ae0dfc17a35881c223d8123", null ], - [ "pkcs11_get_lib_info", "a01450.html#gaae56826104269ca730066136fb3eb995", null ], - [ "pkcs11_init", "a01450.html#gaab9ef494fdc21911e700f2b9d62547ec", null ], - [ "pkcs11_init_check", "a01450.html#gadd899ffeae0146c08b249e3f551e21f8", null ], - [ "pkcs11_object_create", "a01450.html#ga5cdd6e87496f480f42c44430250794bb", null ], - [ "pkcs11_object_destroy", "a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25", null ], - [ "pkcs11_object_is_private", "a01450.html#gad3eaa8d90b81d65f8e585c81c701f893", null ], - [ "pkcs11_os_create_mutex", "a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362", null ], - [ "pkcs11_session_check", "a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b", null ], - [ "pkcs11_session_closeall", "a01450.html#ga43525e77f9049b545fa09129cacf9c9a", null ], - [ "pkcs11_session_get_info", "a01450.html#ga236a002e179ed36a0b81399a3e11fcb8", null ], - [ "pkcs11_session_login", "a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df", null ], - [ "pkcs11_signature_sign", "a01450.html#ga4641a3dd4da46f801565310f3784a41e", null ], - [ "pkcs11_signature_sign_continue", "a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a", null ], - [ "pkcs11_signature_sign_finish", "a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7", null ], - [ "pkcs11_signature_sign_init", "a01450.html#ga742c35812a444a87e35150e2332be0c2", null ], - [ "pkcs11_signature_verify", "a01450.html#ga27b3652fb8a87f7f40fff10c63316b35", null ], - [ "pkcs11_signature_verify_continue", "a01450.html#gab735278cab8e184d682b4ed8b12dbb1b", null ], - [ "pkcs11_signature_verify_finish", "a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da", null ], - [ "pkcs11_signature_verify_init", "a01450.html#ga852f9badf3176a60bfb874fb5d118791", null ], - [ "pkcs11_slot_get_context", "a01450.html#ga987853011908614aba0db7c5933b0a20", null ], - [ "pkcs11_slot_get_info", "a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2", null ], - [ "pkcs11_slot_init", "a01450.html#ga418414364e88d0673b4f6c90cd62ebed", null ], - [ "pkcs11_token_get_info", "a01450.html#ga7bf2fea766cab4645fe615661bcf0db9", null ], - [ "pkcs11_token_init", "a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45", null ], - [ "pkcs11_token_random", "a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401", null ], - [ "pkcs11_cert_wtlspublic_attributes", "a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80", null ], - [ "pkcs11_cert_x509_attributes", "a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7", null ], - [ "pkcs11_cert_x509public_attributes", "a01450.html#ga8de4193ede04a12ab4e44b8df9eec478", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p224", "a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p256", "a01450.html#gacf3b4678891994823f2cdd0cb8707ecc", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p384", "a01450.html#gadbc903025f5c5ea06b36fba39f30d305", null ], - [ "pkcs11_ec_pbkey_asn1_hdr_p521", "a01450.html#ga44f7303f7073c7f97c3e31ec5db97769", null ], - [ "pkcs11_key_private_attributes", "a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa", null ], - [ "pkcs11_key_public_attributes", "a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215", null ], - [ "pkcs11_key_secret_attributes", "a01450.html#ga6ef03269a32699359d90901cc84954f3", null ], - [ "pkcs11_object_monotonic_attributes", "a01450.html#ga230747fbe3b7a13dfda75980844c3e9d", null ], - [ "pkcs11_x962_asn1_hdr_ec224", "a01450.html#gaaefbee7a7f8454014a46e969fa9912c3", null ], - [ "pkcs11_x962_asn1_hdr_ec256", "a01450.html#ga7fd56486be0426ec029cd60072ef62ba", null ], - [ "pkcs11_x962_asn1_hdr_ec384", "a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd", null ], - [ "pkcs11_x962_asn1_hdr_ec521", "a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd", null ] -]; \ No newline at end of file diff --git a/a01451.html b/a01451.html deleted file mode 100644 index 4ccb50982..000000000 --- a/a01451.html +++ /dev/null @@ -1,153 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - -

-Namespaces

namespace  atcab
 
namespace  atcacert
 
namespace  atcaenum
 
namespace  atjwt
 
namespace  device
 
namespace  exceptions
 
namespace  iface
 
namespace  library
 
namespace  sha206_api
 
namespace  status
 
namespace  tng
 
- - - - - -

-Variables

try :
 
-os _lib_definition_file = os.path.join(os.path.dirname(__file__), 'cryptoauth.json')
 
-

Detailed Description

-
Package Definition
-
-
- - - - diff --git a/a01451.js b/a01451.js deleted file mode 100644 index f44ee4bc6..000000000 --- a/a01451.js +++ /dev/null @@ -1,39 +0,0 @@ -var a01451 = -[ - [ "atcab", "a01452.html", "a01452" ], - [ "atcacert", "a01453.html", "a01453" ], - [ "atcaenum", "a01454.html", "a01454" ], - [ "atjwt", "a01455.html", "a01455" ], - [ "device", "a01456.html", "a01456" ], - [ "exceptions", "a01457.html", "a01457" ], - [ "iface", "a01458.html", "a01458" ], - [ "library", "a01459.html", "a01459" ], - [ "sha206_api", "a01460.html", [ - [ "sha206a_authenticate", "a01460.html#aca369f80d942aad6a827c2817c998df5", null ], - [ "sha206a_check_dk_useflag_validity", "a01460.html#ae4da1b83a8d9d37483a4b179edfeceff", null ], - [ "sha206a_check_pk_useflag_validity", "a01460.html#a1e60ef1b7888afae74b4e390a358d263", null ], - [ "sha206a_diversify_parent_key", "a01460.html#abe0624bf06c710473082bfbef52273f3", null ], - [ "sha206a_generate_challenge_response_pair", "a01460.html#a3c5cc4df72fb0dea8534dc7726430063", null ], - [ "sha206a_generate_derive_key", "a01460.html#a607ffbecea0980b58be2b31a8b87b983", null ], - [ "sha206a_get_data_store_lock_status", "a01460.html#a4bc534fea446c5d50d4d3cde1cf4a4dc", null ], - [ "sha206a_get_dk_update_count", "a01460.html#ac96ca57f02ed212f0eb5ae95875d952c", null ], - [ "sha206a_get_dk_useflag_count", "a01460.html#ae27b4776f24b612e4ea9e712c086d22b", null ], - [ "sha206a_get_pk_useflag_count", "a01460.html#a710e3e25bc12a3ecd3051ebbb763c5b0", null ], - [ "sha206a_read_data_store", "a01460.html#aeed0ec7ac85e0588bc05822d6d63eaa3", null ], - [ "sha206a_verify_device_consumption", "a01460.html#a0d2a1e79937863b4a48218de3567d996", null ], - [ "sha206a_write_data_store", "a01460.html#a1e883095c960da9d48db489a25774042", null ] - ] ], - [ "status", "a01461.html", "a01461" ], - [ "tng", "a01462.html", [ - [ "tng_atcacert_device_public_key", "a01462.html#a7382f6d9830ea03bcbb59f7fae2745e1", null ], - [ "tng_atcacert_max_device_cert_size", "a01462.html#a6878e2f1c9330534f8c7950f26e327b0", null ], - [ "tng_atcacert_max_signer_cert_size", "a01462.html#afc28b6798b670200ecf08645ccaf0e44", null ], - [ "tng_atcacert_read_device_cert", "a01462.html#a76d8460082efdbc28d2a68f5648ce8dd", null ], - [ "tng_atcacert_read_signer_cert", "a01462.html#a6d3eab271cac5959402b283c5a6046a4", null ], - [ "tng_atcacert_root_cert", "a01462.html#a08385a0e8b5e7e8dc5de6570b06555a6", null ], - [ "tng_atcacert_root_cert_size", "a01462.html#a3c1b718b02781b6dbc87f7d6c109d3a6", null ], - [ "tng_atcacert_root_public_key", "a01462.html#a375f83b01899d081623192f9d4a7e6fe", null ], - [ "tng_atcacert_signer_public_key", "a01462.html#a0c580da1c1d3e54a60be0f05d5d5c1f1", null ], - [ "tng_get_device_pubkey", "a01462.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7", null ] - ] ] -]; \ No newline at end of file diff --git a/a01452.html b/a01452.html deleted file mode 100644 index d48f79249..000000000 --- a/a01452.html +++ /dev/null @@ -1,5977 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - -

-Data Structures

class  atca_aes_cbc_ctx
 
class  atca_aes_cbcmac_ctx
 
class  atca_aes_ccm_ctx
 
class  atca_aes_cmac_ctx
 
class  atca_aes_ctr_ctx
 
class  atca_aes_gcm_ctx
 
class  atca_hmac_sha256_ctx
 
class  atca_sha256_ctx
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

def atcab_init (iface_cfg)
 
def atcab_release ()
 
def atcab_get_device ()
 
def atcab_get_device_type ()
 
def atcab_aes (mode, key_id, aes_in, aes_out)
 
def atcab_aes_encrypt (key_id, key_block, plaintext, ciphertext)
 
def atcab_aes_decrypt (key_id, key_block, ciphertext, plaintext)
 
def atcab_aes_gfm (hash_key, inp, output)
 
def atcab_aes_cbc_init (ctx, key_id, key_block, iv)
 
def atcab_aes_cbc_encrypt_block (ctx, plaintext, ciphertext)
 
def atcab_aes_cbc_decrypt_block (ctx, ciphertext, plaintext)
 
def atcab_aes_cmac_init (ctx, key_id, key_block)
 
def atcab_aes_cmac_update (ctx, data, data_size)
 
def atcab_aes_cmac_finish (ctx, cmac, size)
 
def atcab_aes_ctr_init (ctx, key_id, key_block, counter_size, iv)
 
def atcab_aes_ctr_init_rand (ctx, key_id, key_block, counter_size, iv)
 
def atcab_aes_ctr_encrypt_block (ctx, plaintext, ciphertext)
 
def atcab_aes_ctr_decrypt_block (ctx, ciphertext, plaintext)
 
def atcab_aes_gcm_init (ctx, key_id, key_block, iv, iv_size)
 
def atcab_aes_gcm_init_rand (ctx, key_id, key_block, rand_size, free_field, free_field_size, iv)
 
def atcab_aes_gcm_aad_update (ctx, aad, aad_size)
 
def atcab_aes_gcm_encrypt_update (ctx, plaintext, plaintext_size, ciphertext)
 
def atcab_aes_gcm_encrypt_finish (ctx, tag, tag_size)
 
def atcab_aes_gcm_decrypt_update (ctx, ciphertext, ciphertext_size, plaintext)
 
def atcab_aes_gcm_decrypt_finish (ctx, tag, tag_size, is_verified)
 
def atcab_aes_cbcmac_init (ctx, key_id, key_block)
 
def atcab_aes_cbcmac_update (ctx, data, data_size)
 
def atcab_aes_cbcmac_finish (ctx, mac, mac_size)
 
def atcab_aes_ccm_init (ctx, key_id, key_block, iv, iv_size, aad_size, text_size, tag_size)
 
def atcab_aes_ccm_init_rand (ctx, key_id, key_block, iv, iv_size, aad_size, text_size, tag_size)
 
def atcab_aes_ccm_aad_update (ctx, aad, aad_size)
 
def atcab_aes_ccm_aad_finish (ctx)
 
def atcab_aes_ccm_encrypt_update (ctx, plaintext, plaintext_size, ciphertext)
 
def atcab_aes_ccm_decrypt_update (ctx, ciphertext, ciphertext_size, plaintext)
 
def atcab_aes_ccm_encrypt_finish (ctx, tag, tag_size)
 
def atcab_aes_ccm_decrypt_finish (ctx, tag, is_verified)
 
def atcab_checkmac (mode, key_id, challenge, response, other_data)
 
def atcab_counter (mode, counter_id, counter_value)
 
def atcab_counter_increment (counter_id, counter_value)
 
def atcab_counter_read (counter_id, counter_value)
 
def atcab_derivekey (mode, target_key, mac)
 
def atcab_ecdh_base (mode, key_id, public_key, pms, out_nonce)
 
def atcab_ecdh (key_id, public_key, pms)
 
def atcab_ecdh_enc (key_id, public_key, pms, read_key, read_key_id, num_in=None)
 
def atcab_ecdh_ioenc (key_id, public_key, pms, io_key)
 
def atcab_ecdh_tempkey (public_key, pms)
 
def atcab_ecdh_tempkey_ioenc (public_key, pms, io_key)
 
def atcab_gendig (zone, key_id, other_data, other_data_size)
 
def atcab_genkey_base (mode, key_id, other_data, public_key=None)
 
def atcab_genkey (key_id, public_key)
 
def atcab_get_pubkey (key_id, public_key)
 
def atcab_hmac (mode, key_id, digest)
 
def atcab_info_base (mode, param2, out_data)
 
def atcab_info (revision)
 
def atcab_info_get_latch (state)
 
def atcab_info_set_latch (state)
 
def atcab_kdf (mode, key_id, details, message, out_data, out_nonce)
 
def atcab_lock (mode, summary_crc)
 
def atcab_lock_config_zone ()
 
def atcab_lock_config_zone_crc (summary_crc)
 
def atcab_lock_data_zone ()
 
def atcab_lock_data_zone_crc (summary_crc)
 
def atcab_lock_data_slot (slot)
 
def atcab_mac (mode, key_id, challenge, digest)
 
def atcab_nonce_base (mode, zero, num_in, rand_out)
 
def atcab_nonce (num_in)
 
def atcab_nonce_load (target, num_in, num_in_size)
 
def atcab_nonce_rand (num_in, rand_out)
 
def atcab_challenge (num_in)
 
def atcab_challenge_seed_update (num_in, rand_out)
 
def atcab_priv_write (key_id, priv_key, write_key_id, write_key, num_in=None)
 
def atcab_random (random_number)
 
def atcab_read_zone (zone, slot, block, offset, data, length)
 
def atcab_read_serial_number (serial_number)
 
def atcab_is_slot_locked (slot, is_locked)
 
def atcab_is_locked (zone, is_locked)
 
def atcab_read_enc (key_id, block, data, enc_key, enc_key_id, num_in=None)
 
def atcab_read_config_zone (config_data)
 
def atcab_cmp_config_zone (config_data, same_config)
 
def atcab_read_sig (slot, sig)
 
def atcab_read_pubkey (slot, public_key)
 
def atcab_read_bytes_zone (zone, slot, offset, data, length)
 
def atcab_secureboot (mode, param2, digest, signature, mac)
 
def atcab_secureboot_mac (mode, digest, signature, num_in, io_keys, is_verified)
 
def atcab_selftest (mode, param2, result)
 
def atcab_sha_base (mode, length, message, data_out, data_out_size)
 
def atcab_sha_start ()
 
def atcab_sha_update (message)
 
def atcab_sha_end (digest, length, message)
 
def atcab_sha_read_context (context, context_size)
 
def atcab_sha_write_context (context, context_size)
 
def atcab_sha (length, message, digest)
 
def atcab_hw_sha2_256_init (ctx)
 
def atcab_hw_sha2_256_update (ctx, data, data_size)
 
def atcab_hw_sha2_256_finish (ctx, digest)
 
def atcab_hw_sha2_256 (data, data_size, digest)
 
def atcab_sha_hmac_init (ctx, key_slot)
 
def atcab_sha_hmac_update (ctx, data, data_size)
 
def atcab_sha_hmac_finish (ctx, digest, target)
 
def atcab_sha_hmac (data, data_size, key_slot, digest, target)
 
def atcab_sign_base (mode, key_id, signature)
 
def atcab_sign (key_id, msg, signature)
 
def atcab_sign_internal (key_id, is_invalidate, is_full_sn, signature)
 
def atcab_updateextra (mode, new_value)
 
def atcab_verify (mode, key_id, signature, public_key, other_data, mac)
 
def atcab_verify_extern_stored_mac (mode, key_id, message, signature, public_key, num_in, io_key, is_verified)
 
def atcab_verify_extern (message, signature, public_key, is_verified)
 
def atcab_verify_extern_mac (message, signature, public_key, num_in, io_key, is_verified)
 
def atcab_verify_stored (message, signature, key_id, is_verified)
 
def atcab_verify_stored_mac (message, signature, key_id, num_in, io_key, is_verified)
 
def atcab_verify_validate (key_id, signature, other_data, is_verified)
 
def atcab_verify_invalidate (key_id, signature, other_data, is_verified)
 
def atcab_write (zone, address, value, mac)
 
def atcab_write_zone (zone, slot, block, offset, data, length)
 
def atcab_write_enc (key_id, block, data, enc_key, enc_key_id, num_in=None)
 
def atcab_write_config_zone (conf)
 
def atcab_write_pubkey (slot, public_key)
 
def atcab_write_bytes_zone (zone, slot, offset_bytes, data, length)
 
def atcab_write_config_counter (counter_id, counter_value)
 
-

Detailed Description

-
Dynamic link library loading under ctypes and HAL initilization/release functions
-

Function Documentation

- -

◆ atcab_aes()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes ( mode,
 key_id,
 aes_in,
 aes_out 
)
-
-
Compute the AES-128 encrypt, decrypt, or GFM calculation.
-
-Args:
-    mode                The mode for the AES command. (int)
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey. (int)
-    aes_in              Input data to the AES command (16 bytes). (Can be of type bytearray or bytes)
-    aes_out             Output data from the AES command is returned here
-                        (16 bytes). (Expects bytearray of size 16)
-
-Returns:
-    Status Code
-
-
-
- -

◆ atcab_aes_cbc_decrypt_block()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cbc_decrypt_block ( ctx,
 ciphertext,
 plaintext 
)
-
-
Decrypt a block of data using CBC mode and a key within the
-ATECC608. atcab_aes_cbc_init() should be called before the
-first use of this function.
-
-Args:
-    ctx                 AES CBC context.
-    ciphertext          Ciphertext to be decrypted (16 bytes).
-                        (Bytearray or bytes)
-    plaintext           Decrypted data is returned here (16 bytes).
-                        (Bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_cbc_encrypt_block()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cbc_encrypt_block ( ctx,
 plaintext,
 ciphertext 
)
-
-
Encrypt a block of data using CBC mode and a key within the
-ATECC608. atcab_aes_cbc_init() should be called before the
-first use of this function.
-
-Args:
-    ctx                 AES CBC context.
-    plaintext           Plaintext to be encrypted (16 bytes).
-                        (Bytearray or bytes)
-    ciphertext          Encrypted data is returned here (16 bytes).
-                        (Bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_cbc_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cbc_init ( ctx,
 key_id,
 key_block,
 iv 
)
-
-
Initialize context for AES CBC operation.
-Args:
-    ctx                 AES CBC context to be initialized
-    key_id              Key location. Can either be a slot number
-                        or ATCA_TEMPKEY_KEYID for TempKey.
-    key_block           Index of the 16-byte block to use within the
-                        key location for the actual key.
-    iv                  Initialization vector (16 bytes). Bytearray format
-
-Returns:
-    Status Code
-
-
-
- -

◆ atcab_aes_cbcmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cbcmac_finish ( ctx,
 mac,
 mac_size 
)
-
-
Finish a CBC-MAC operation returning the CBC-MAC value. If the data
-provided to the atcab_aes_cbcmac_update() function has incomplete
-block this function will return an error code.
-
-Args:
-    ctx        AES-128 CBC-MAC context.
-    mac        CBC-MAC is returned here.
-    mac_size   Size of CBC-MAC requested in bytes (max 16 bytes).
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_cbcmac_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cbcmac_init ( ctx,
 key_id,
 key_block 
)
-
-
Initialize context for AES CBC-MAC operation.
-
-Args:
-    ctx             AES CBC-MAC context to be initialized
-    key_id          Key location. Can either be a slot number or
-                    ATCA_TEMPKEY_KEYID for TempKey.
-    key_block       Index of the 16-byte block to use within the key
-                    location for the actual key.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_cbcmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cbcmac_update ( ctx,
 data,
 data_size 
)
-
-
Calculate AES CBC-MAC with key stored within ECC608A device.
-atcab_aes_cbcmac_init() should be called before the first use of
-this function.
-
-Args:
-    ctx             AES CBC-MAC context structure.
-    data            Data to be added for AES CBC-MAC calculation. Can be
-                    bytearray or bytes.
-    data_size       Data length in bytes.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_ccm_aad_finish()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_aad_finish ( ctx)
-
-
Finish processing Additional Authenticated Data (AAD) using CCM mode.
-
-Args:
-ctx          AES CCM context
-
-
-
- -

◆ atcab_aes_ccm_aad_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_aad_update ( ctx,
 aad,
 aad_size 
)
-
-
Process Additional Authenticated Data (AAD) using CCM mode and a
-key within the ATECC608A device
-
-Args:
-ctx          AES CCM context
-aad          Additional authenticated data to be added
-aad_size     Size of aad in bytes.
-
-
-
- -

◆ atcab_aes_ccm_decrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_decrypt_finish ( ctx,
 tag,
 is_verified 
)
-
-
Complete a CCM decrypt operation authenticating provided tag.
-Args:
-ctx              AES CCM context structure.
-tag              Authentication tag is returned here.
-is_verified      Value is set to true if the tag is authenticated else
-                 the value is set to false.
-
-
- -

◆ atcab_aes_ccm_decrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_decrypt_update ( ctx,
 ciphertext,
 ciphertext_size,
 plaintext 
)
-
-
Process data using CCM mode and a key within the ATECC608A device.
-atcab_aes_ccm_init() or atcab_aes_ccm_init_rand() should be called
-before the first use of this function.
-
-Args:
-ctx              AES CCM context structure.
-ciphertext       Data to be processed.
-ciphertext_size  Size of the data to be processed.
-plaintext        Output data is returned here.
-
-
-
- -

◆ atcab_aes_ccm_encrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_encrypt_finish ( ctx,
 tag,
 tag_size 
)
-
-
Complete a CCM encrypt operation returning the authentication tag.
-
-Args:
-ctx              AES CCM context structure.
-tag              Authentication tag is returned here.
-tag_size         Tag size in bytes.
-
-
- -

◆ atcab_aes_ccm_encrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_encrypt_update ( ctx,
 plaintext,
 plaintext_size,
 ciphertext 
)
-
-
Process data using CCM mode and a key within the ATECC608A device.
-atcab_aes_ccm_init() or atcab_aes_ccm_init_rand() should be called
-before the first use of this function.
-
-Args:
-ctx             AES CCM context structure.
-plaintext       Data to be processed.
-plaintext_size  Size of the data to be processed.
-ciphertext      Output data is returned here.
-
-
-
- -

◆ atcab_aes_ccm_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_init ( ctx,
 key_id,
 key_block,
 iv,
 iv_size,
 aad_size,
 text_size,
 tag_size 
)
-
-
Initialize context for AES CCM operation with an existing IV, which
-is common when starting a decrypt operation.
-
-Args:
-ctx          AES CCM context to be initialized
-key_id       Key location. Can either be a slot number or
-             ATCA_TEMPKEY_KEYID for TempKey.
-key_block    Index of the 16-byte block to use within the key
-             location for the actual key.
-iv           Nonce to be fed into the AES CCM calculation.
-iv_size      Size of iv.
-aad_size     Size of Additional authtication data.
-text_size    Size of plaintext/ciphertext to be processed.
-tag_size     Prefered size of tag.
-
-
-
- -

◆ atcab_aes_ccm_init_rand()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ccm_init_rand ( ctx,
 key_id,
 key_block,
 iv,
 iv_size,
 aad_size,
 text_size,
 tag_size 
)
-
-
Initialize context for AES CCM operation with a random nonce
-
-Args:
-ctx          AES CCM context to be initialized
-key_id       Key location. Can either be a slot number or
-             ATCA_TEMPKEY_KEYID for TempKey.
-key_block    Index of the 16-byte block to use within the key
-             location for the actual key.
-iv           Nonce to be fed into the AES CCM calculation.
-iv_size      Size of iv.
-aad_size     Size of Additional authtication data.
-text_size    Size of plaintext/ciphertext to be processed.
-tag_size     Prefered size of tag.
-
-
-
- -

◆ atcab_aes_cmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cmac_finish ( ctx,
 cmac,
 size 
)
-
-
Finish a CMAC operation returning the CMAC value.
-
-Args:
-    ctx                 AES-128 CMAC context.
-    cmac                CMAC is returned here.
-    cmac_size           Size of CMAC requested in bytes (max 16 bytes).
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_cmac_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cmac_init ( ctx,
 key_id,
 key_block 
)
-
-
Initialize a CMAC calculation using an AES-128 key in the ATECC608.
-
-Args:
-    ctx                 AES-128 CMAC context.
-    key_id              Key location. Can either be a slot number
-                        or ATCA_TEMPKEY_KEYID for TempKey.
-    key_block           Index of the 16-byte block to use within
-                        the key location for the actual key.
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_cmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_cmac_update ( ctx,
 data,
 data_size 
)
-
-
Add data to an initialized CMAC calculation.
-
-Args:
-    ctx                 AES-128 CMAC context.
-    data                Data to be added.
-    data_size           Size of the data to be added in bytes.
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_ctr_decrypt_block()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ctr_decrypt_block ( ctx,
 ciphertext,
 plaintext 
)
-
-
Decrypt a block of data using CTR mode and a key within the
-ATECC608 device. atcab_aes_ctr_init() or atcab_aes_ctr_init_rand()
-should be called before the first use of this function.
-
-Args:
-    ctx                 AES CTR context structure.
-    ciphertext          Ciphertext to be decrypted (16 bytes).
-    plaintext           Decrypted data is returned here (16 bytes).
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_ctr_encrypt_block()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ctr_encrypt_block ( ctx,
 plaintext,
 ciphertext 
)
-
-
Encrypt a block of data using CTR mode and a key within the
-ATECC608 device. atcab_aes_ctr_init() or atcab_aes_ctr_init_rand()
-should be called before the first use of this function.
-
-Args:
-    ctx                 AES CTR context structure.
-    plaintext           Plaintext to be encrypted (16 bytes).
-    ciphertext          Encrypted data is returned here (16 bytes).
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_aes_ctr_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ctr_init ( ctx,
 key_id,
 key_block,
 counter_size,
 iv 
)
-
-
Initialize context for AES CTR operation with an existing IV, which
-is common when start a decrypt operation.
-
-The IV is a combination of nonce (left-field) and big-endian counter
-(right-field). The counter_size field sets the size of the counter and the
-remaining bytes are assumed to be the nonce.
-
-Args:
-    ctx                 AES CTR context to be initialized.
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey.
-    key_block           Index of the 16-byte block to use within the key
-                        location for the actual key.
-    counter_size        Size of counter in IV in bytes. 4 bytes is a
-                        common size.
-    iv                  Initialization vector (concatenation of nonce and
-                        counter) 16 bytes.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_ctr_init_rand()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_ctr_init_rand ( ctx,
 key_id,
 key_block,
 counter_size,
 iv 
)
-
-
Initialize context for AES CTR operation with a random nonce and
-counter set to 0 as the IV, which is common when starting an
-encrypt operation.
-
-The IV is a combination of nonce (left-field) and big-endian counter
-(right-field). The counter_size field sets the size of the counter and the
-remaining bytes are assumed to be the nonce.
-
-Args:
-    ctx                 AES CTR context to be initialized.
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey.
-    key_block           Index of the 16-byte block to use within the key
-                        location for the actual key.
-    counter_size        Size of counter in IV in bytes. 4 bytes is a
-                        common size.
-    iv                  Initialization vector (concatenation of nonce and
-                        counter) is returned here (16 bytes).
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_decrypt()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_decrypt ( key_id,
 key_block,
 ciphertext,
 plaintext 
)
-
-
Perform an AES-128 decrypt operation with a key in the device.
-
-Args:
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey.(int)
-    key_block           Index of the 16-byte block to use within the key
-                        location for the actual key. (int)
-    ciphertext          Input ciphertext to be decrypted (16 bytes).
-                        (bytearray or bytes)
-    plaintext           Output plaintext is returned here (16 bytes).
-                        (Expects bytearray of size 16)s
-
-Returns:
-    Status Code
-
-
-
- -

◆ atcab_aes_encrypt()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_encrypt ( key_id,
 key_block,
 plaintext,
 ciphertext 
)
-
-
Perform an AES-128 encrypt operation with a key in the device.
-
-Args:
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey. (int)
-    key_block           Index of the 16-byte block to use within the key
-                        location for the actual key.(int)
-    plaintext           Input plaintext to be encrypted (16 bytes).
-                        (Can be of type bytearray or bytes)
-    ciphertext          Output ciphertext is returned here (16 bytes).
-                        (Expects bytearray of size 16)
-
-Returns:
-    Status Code
-
-
-
- -

◆ atcab_aes_gcm_aad_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_aad_update ( ctx,
 aad,
 aad_size 
)
-
-
Process Additional Authenticated Data (AAD) using GCM mode and a
-key within the ATECC608 device.
-
-This can be called multiple times. atcab_aes_gcm_init() or
-atcab_aes_gcm_init_rand() should be called before the first use of this
-function. When there is AAD to include, this should be called before
-atcab_aes_gcm_encrypt_update() or atcab_aes_gcm_decrypt_update().
-
-Args:
-    ctx                 AES GCM context
-    aad                 Additional authenticated data to be added
-    aad_size            Size of aad in bytes
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gcm_decrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_decrypt_finish ( ctx,
 tag,
 tag_size,
 is_verified 
)
-
-
Complete a GCM decrypt operation verifying the authentication tag.
-
-Args:
-    ctx                 AES GCM context structure.
-    tag                 Expected authentication tag.
-    tag_size            Size of tag in bytes (12 to 16 bytes).
-    is_verified         Returns whether or not the tag verified.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gcm_decrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_decrypt_update ( ctx,
 ciphertext,
 ciphertext_size,
 plaintext 
)
-
-
Decrypt data using GCM mode and a key within the ATECC608 device.
-atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called
-before the first use of this function.
-
-Args:
-    ctx                 AES GCM context structure.
-    ciphertext          Ciphertext to be decrypted.
-    ciphertext_size     Size of ciphertext in bytes.
-    plaintext           Decrypted data is returned here.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gcm_encrypt_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_encrypt_finish ( ctx,
 tag,
 tag_size 
)
-
-
Complete a GCM encrypt operation returning the authentication tag.
-
-Args:
-    ctx                 AES GCM context structure.
-    tag                 Authentication tag is returned here.
-    tag_size            Tag size in bytes (12 to 16 bytes).
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gcm_encrypt_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_encrypt_update ( ctx,
 plaintext,
 plaintext_size,
 ciphertext 
)
-
-
Encrypt data using GCM mode and a key within the ATECC608 device.
-atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called
-before the first use of this function.
-
-Args:
-    ctx                 AES GCM context structure.
-    plaintext           Plaintext to be encrypted (16 bytes).
-    plaintext_size      Size of plaintext in bytes.
-    ciphertext          Encrypted data is returned here.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gcm_init()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_init ( ctx,
 key_id,
 key_block,
 iv,
 iv_size 
)
-
-
Initialize context for AES GCM operation with an existing IV, which
-is common when starting a decrypt operation.
-
-Args:
-    ctx                 AES GCM context to be initialized.
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey.
-    key_block           Index of the 16-byte block to use within the key
-                        location for the actual key.
-    iv                  Initialization vector.
-    iv_size       Size of IV in bytes. Standard is 12 bytes.
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gcm_init_rand()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gcm_init_rand ( ctx,
 key_id,
 key_block,
 rand_size,
 free_field,
 free_field_size,
 iv 
)
-
-
Initialize context for AES GCM operation with a IV composed of a
-random and optional fixed(free) field, which is common when
-starting an encrypt operation.
-
-Args:
-    ctx                 AES CTR context to be initialized.
-    key_id              Key location. Can either be a slot number or
-                        ATCA_TEMPKEY_KEYID for TempKey.
-    key_block           Index of the 16-byte block to use within the
-                        key location for the actual key.
-    rand_size           Size of the random field in bytes. Minimum and
-                        recommended size is 12 bytes. Max is 32 bytes.
-    free_field          Fixed data to include in the IV after the
-                        random field. Can be NULL if not used.
-    free_field_size     Size of the free field in bytes.
-    iv                  Initialization vector is returned here. Its
-                        size will be rand_size and free_field_size
-                        combined.
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcab_aes_gfm()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_aes_gfm ( hash_key,
 inp,
 output 
)
-
-
Perform a Galois Field Multiply (GFM) operation.
-
-Args:
-    hash_key            First input value (16 bytes).
-                        (bytearray or bytes)
-    inp                 Second input value (16 bytes).
-                        (bytearray or bytes)
-    output              GFM result is returned here (16 bytes).
-                        (Expects bytearray of size 16)
-
-Returns:
-    Status Code
-
-
-
- -

◆ atcab_challenge()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_challenge ( num_in)
-
-
Execute a Nonce command in pass-through mode to initialize TempKey
-to a specified value.
-
-Args:
-    num_in              Data to be loaded into TempKey (32 bytes).
-                        (bytearray or bytes)
-
-Returns:
-    Status Code
-
-
-
- -

◆ atcab_challenge_seed_update()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_challenge_seed_update ( num_in,
 rand_out 
)
-
-
Execute a Nonce command to generate a random challenge combining
-a host nonce (num_in) and a device random number.
-
-Args:
-    num_in              Host nonce to be combined with the device random
-                        number (20 bytes). (bytearray or bytes)
-    rand_out            Internally generated 32-byte random number that was
-                        used in the nonce/challenge calculation is returned
-                        here. Can be NULL if not needed. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_checkmac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_checkmac ( mode,
 key_id,
 challenge,
 response,
 other_data 
)
-
-
Compares a MAC response with input values
-
-Args:
-    mode                Controls which fields within the device are used in
-                        the message (int)
-    key_id              Key location in the CryptoAuth device to use for the
-                        MAC (int)
-    challenge           Challenge data (32 bytes) (bytearray or bytes)
-    response            MAC response data (32 bytes) (bytearray or bytes)
-    other_data          OtherData parameter (13 bytes) (bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_cmp_config_zone()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_cmp_config_zone ( config_data,
 same_config 
)
-
-
Compares a specified configuration zone with the configuration zone
-currently on the device.
-
-This only compares the static portions of the configuration zone and skips
-those that are unique per device (first 16 bytes) and areas that can change
-after the configuration zone has been locked (e.g. LastKeyUse).
-
-Args:
-    config_data         Full configuration data to compare the device
-                        against. (bytearray or bytes)
-    same_config         Result is returned here. True if the static portions
-                        on the configuration zones are the same.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_counter()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_counter ( mode,
 counter_id,
 counter_value 
)
-
-
Compute the Counter functions
-
-Args:
-    mode                The mode used for the counter (int)
-    counter_id          The counter to be used (int)
-    counter_value       Counter value returned from device
-                        (AtcaReference expected)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_counter_increment()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_counter_increment ( counter_id,
 counter_value 
)
-
-
Increments one of the device's monotonic counters
-
-Args:
-    counter_id          Counter to be incremented (int)
-    counter_value       New value of the counter is returned here
-                        (AtcaReference expected)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_counter_read()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_counter_read ( counter_id,
 counter_value 
)
-
-
Reads one of the device's monotonic counters
-
-Args:
-    counter_id          Counter to be read (int)
-    counter_value       Counter value is returned here
-                        (AtcaReference expected)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_derivekey()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_derivekey ( mode,
 target_key,
 mac 
)
-
-
Executes the DeviveKey command for deriving a new key from a
-nonce (TempKey) and an existing key.
-
-Args:
-    mode                Bit 2 must match the value in TempKey.SourceFlag (int)
-    target_key          Key slot to be written (int)
-    mac                 Optional 32 byte MAC used to validate operation.
-                        (bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_ecdh()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_ecdh ( key_id,
 public_key,
 pms 
)
-
-
ECDH command with a private key in a slot and the premaster secret
-is returned in the clear.
-
-Args:
-    key_id              Slot of key for ECDH computation (int)
-    public_key          Public key input to ECDH calculation. X and Y
-                        integers in big-endian format. 64 bytes for P256
-                        key.(bytearray or bytes)
-    pms                 ByteArray - Computed ECDH premaster secret is returned
-                        here (32 bytes).(Expects bytearray of size 32)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_ecdh_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_ecdh_base ( mode,
 key_id,
 public_key,
 pms,
 out_nonce 
)
-
-
Base function for generating premaster secret key using ECDH.
-
-Args:
-    mode                Mode to be used for ECDH computation (int)
-    key_id              Slot of key for ECDH computation (int)
-    public_key          Public key input to ECDH calculation. X and Y
-                        integers in big-endian format. 64 bytes for P256
-                        key. (bytearray or bytes)
-    pms                 ByteArray - Computed ECDH pre-master secret is returned here (32
-                        bytes) if returned directly. Otherwise NULL.
-    out_nonce           ByteArray - Nonce used to encrypt pre-master secret. NULL if
-                        output encryption not used.
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_ecdh_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_ecdh_enc ( key_id,
 public_key,
 pms,
 read_key,
 read_key_id,
 num_in = None 
)
-
-
ECDH command with a private key in a slot and the premaster secret
-is read from the next slot. This function only works for even
-numbered slots with the proper configuration.
-
-Args:
-    key_id              Slot of key for ECDH computation (int)
-    public_key          Public key input to ECDH calculation. X and Y
-                        integers in big-endian format. 64 bytes for P256
-                        key. (bytearray or bytes)
-    read_key            Read key for the premaster secret slot (key_id|1)
-                        (32 bytes). (bytearray or bytes)
-    read_key_id         Read key slot for read_key. (int)
-    pms                 ByteArray - Computed ECDH premaster secret is returned
-                        here (32 bytes).(Expects bytearray of size 32)
-    num_in              Bytearray - Host nonce used to calculate nonce (20 bytes)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_ecdh_ioenc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_ecdh_ioenc ( key_id,
 public_key,
 pms,
 io_key 
)
-
-
ECDH command with a private key in a slot and the premaster secret
-is returned encrypted using the IO protection key.
-
-Args:
-    key_id              Slot of key for ECDH computation (int)
-    public_key          Public key input to ECDH calculation. X and Y
-                        integers in big-endian format. 64 bytes for P256
-                        key. (bytearray or bytes)
-    io_key              IO protection key (32 bytes). (bytearray or bytes)
-    pms                 Computed ECDH premaster secret is returned here
-                        (32 bytes). (Expects bytearray of size 32)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_ecdh_tempkey()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_ecdh_tempkey ( public_key,
 pms 
)
-
-
ECDH command with a private key in TempKey and the premaster secret
-is returned in the clear.
-
-Args:
-    public_key          Public key input to ECDH calculation. X and Y
-                        integers in big-endian format. 64 bytes for P256
-                        key. (bytearray or bytes)
-    pms                 Computed ECDH premaster secret is returned here
-                        (32 bytes). (Expects bytearray of size 32)
-
-Retuns:
-    Status code
-
-
-
- -

◆ atcab_ecdh_tempkey_ioenc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_ecdh_tempkey_ioenc ( public_key,
 pms,
 io_key 
)
-
-
ECDH command with a private key in TempKey and the premaster secret
-is returned encrypted using the IO protection key.
-
-Args:
-    public_key          Public key input to ECDH calculation. X and Y
-                        integers in big-endian format. 64 bytes for P256
-                        key. (bytearray or bytes)
-    io_key              IO protection key (32 bytes).(bytearray or bytes)
-    pms                 Computed ECDH premaster secret is returned here
-                        (32 bytes). (Expects bytearray of size 32)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_gendig()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_gendig ( zone,
 key_id,
 other_data,
 other_data_size 
)
-
-
Issues a GenDig command, which performs a SHA256 hash on the source
-data indicated by zone with the contents of TempKey.  See the
-CryptoAuth datasheet for your chip to see what the values of zone
-correspond to.
-
-Args:
-    zone                Designates the source of the data to hash
-                        with TempKey.(int)
-    key_id              Indicates the key, OTP block, or message
-                        order for shared nonce mode. (int)
-    other_data          Four bytes of data for SHA calculation when
-                        using a NoMac key, 32 bytes for "Shared Nonce"
-                        mode, otherwise ignored (can be NULL).
-                        (bytearray or bytes)
-    other_data_size     Size of other_data in bytes. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_genkey()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_genkey ( key_id,
 public_key 
)
-
-
Issues GenKey command, which generates a new random private key in
-slot and returns the public key.
-
-Args:
-    key_id              Slot number where an ECC private key is configured.
-                        Can also be ATCA_TEMPKEY_KEYID to generate a private
-                        key in TempKey. (int)
-    public_key          Public key will be returned here. Format will be
-                        the X and Y integers in big-endian format.
-                        64 bytes for P256 curve. Set to NULL if public key
-                        isn't required. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_genkey_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_genkey_base ( mode,
 key_id,
 other_data,
 public_key = None 
)
-
-
Issues GenKey command, which can generate a private key, compute a
-public key, nd/or compute a digest of a public key.
-
-Args:
-    mode                Mode determines what operations the GenKey
-                        command performs. (int)
-    key_id              Slot to perform the GenKey command on. (int)
-    other_data          OtherData for PubKey digest calculation. Can be set
-                        to NULL otherwise. (bytearray or bytes)
-    public_key          If the mode indicates a public key will be
-                        calculated, it will be returned here. Format will
-                        be the X and Y integers in big-endian format.
-                        64 bytes for P256 curve. Set to NULL if public key
-                        isn't required. (Expects bytearray of size 64 bytes)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_get_device()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_get_device (void )
-
-
Return the global device instance
-
-
-
- -

◆ atcab_get_device_type()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_get_device_type (void )
-
-
Return the device type of the currently initialized device.
-
-
-
- -

◆ atcab_get_pubkey()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_get_pubkey ( key_id,
 public_key 
)
-
-
Uses GenKey command to calculate the public key from an existing
-private key in a slot.
-
-Args:
-    key_id              Slot number of the private key. (int)
-    public_key          Public key will be returned here. Format will be
-                        the X and Y integers in big-endian format.
-                        64 bytes for P256 curve. Set to NULL if public key
-                        isn't required.(Expects bytearray)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_hmac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_hmac ( mode,
 key_id,
 digest 
)
-
-
Issues a HMAC command, which computes an HMAC/SHA-256 digest of a
-key stored in the device, a challenge, and other information on the
-device.
-
-Args:
-    mode                Controls which fields within the device are used in the
-                        message. (int)
-    key_id              Which key is to be used to generate the response.
-                        Bits 0:3 only are used to select a slot but all 16 bits
-                        are used in the HMAC message. (int)
-    digest              HMAC digest is returned in this buffer (32 bytes).
-                        (Expects bytearray)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_hw_sha2_256()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_hw_sha2_256 ( data,
 data_size,
 digest 
)
-
-
Use the SHA command to compute a SHA-256 digest.
-
-Args:
-    data                Message data to be hashed. (bytearray or bytes)
-    data_size           Size of data in bytes. (int)
-    digest              Digest is returned here (32 bytes).
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_hw_sha2_256_finish()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_hw_sha2_256_finish ( ctx,
 digest 
)
-
-
Finish SHA-256 digest for a SHA context for performing a hardware
-SHA-256 operation on a device.
-
-Args:
-ctx                     SHA256 context (atca_sha256_ctx)
-digest                  SHA256 digest is returned here (32 bytes)
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_hw_sha2_256_init()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_hw_sha2_256_init ( ctx)
-
-
Initialize a SHA context for performing a hardware SHA-256 operation
-on a device. Note that only one SHA operation can be run at a time.
-
-Args:
-    ctx                     SHA256 context (atca_sha256_ctx)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_hw_sha2_256_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_hw_sha2_256_update ( ctx,
 data,
 data_size 
)
-
-
--> Add message data to a SHA context for performing a hardware SHA-256
-    operation on a device.
-
-Args:
-    ctx                 SHA256 context (atca_sha256_ctx)
-    data                Message data to be added to hash. (bytearray or bytes)
-    data_size           Size of data in bytes. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_info()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_info ( revision)
-
-
Used to get the device revision number. (DevRev)
-
-Args:
-    revision            4-byte bytearray receiving the revision number
-                        from the device. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_info_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_info_base ( mode,
 param2,
 out_data 
)
-
-
Issues an Info command, which return internal device information and
-can control GPIO and the persistent latch.
-
-Args:
-    mode                Selects which mode to be used for info command.(int)
-    param2              Selects the particular fields for the mode.(int)
-    out_data            Response from info command (4 bytes). Can be set to
-                        NULL if not required.(Expects bytearray)
-
-Returns:
-    Status
-
-
-
- -

◆ atcab_info_get_latch()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_info_get_latch ( state)
-
-
Using the Info command to get the persistent latch current state for
-an ATECC608 device.
-
-Args:
-    state               The state is returned here. Set (True) or
-                        clear (False). Expects AtcaReference.
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_info_set_latch()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_info_set_latch ( state)
-
-
Use the Info command to set the persistent latch state for an
-ATECC608 device.
-
-Args:
-    state               Persistent latch state. Set (True) or
-                        clear (False).
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_init()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_init ( iface_cfg)
-
-
Initialize the communication stack and initializes the ATCK590 kit
-Communication over USB HID and Kit Protocol by default
-raise CryptoException
-
-
-
- -

◆ atcab_is_locked()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_is_locked ( zone,
 is_locked 
)
-
-
Executes Read command, which reads the configuration zone to see if
-the specified slot is locked.
-
-Args:
-    zone                The zone to query for locked (use LOCK_ZONE_CONFIG(0x00) or
-                        LOCK_ZONE_DATA(0x01) ). (int)
-    is_locked           Lock state returned here. True if locked.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_is_slot_locked()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_is_slot_locked ( slot,
 is_locked 
)
-
-
Executes Read command, which reads the configuration zone to see if
-the specified slot is locked.
-
-Args:
-    slot                Slot to query for locked (slot 0-15) (int)
-    is_locked           Lock state returned here. True if locked.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_kdf()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_kdf ( mode,
 key_id,
 details,
 message,
 out_data,
 out_nonce 
)
-
-
Executes the KDF command, which derives a new key in PRF, AES, or
-HKDF modes. Generally this function combines a source key with an input
-string and creates a result key/digest/array.
-
-Args:
-    mode            Mode determines KDF algorithm (PRF,AES,HKDF), source
-                    key location, and target key locations. (int)
-    key_id          Source and target key slots if locations are in the
-                    EEPROM. Source key slot is the LSB and target key
-                    slot is the MSB. (int)
-    details         Further information about the computation, depending
-                    on the algorithm. (int)
-    message         Input value from system (up to 128 bytes). Actual size
-                    of message is 16 bytes for AES algorithm or is encoded
-                    in the MSB of the details parameter for other
-                    algorithms.(bytearray or bytes)
-    out_data        Output of the KDF function is returned here. If the
-                    result remains in the device, this can be NULL.
-                    (Expects bytearray)
-    out_nonce       If the output is encrypted, a 32 byte random nonce
-                    generated by the device is returned here. If output
-                    encryption is not used, this can be NULL.
-                    (Expects bytearray)
-
-Retuns:
-    Status code
-
-
-
- -

◆ atcab_lock()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_lock ( mode,
 summary_crc 
)
-
-
The Lock command prevents future modifications of the Configuration
-and/or Data and OTP zones. If the device is so configured, then
-this command can be used to lock individual data slots. This
-command fails if the designated area is already locked.
-
-Args:
-    mode                Zone, and/or slot, and summary check (bit 7).(int)
-    summary_crc         CRC of the config or data zones. Ignored for
-                        slot locks or when mode bit 7 is set. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_lock_config_zone()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_lock_config_zone (void )
-
-
Unconditionally (no CRC required) lock the config zone.
-
-Args:
-    None
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_lock_config_zone_crc()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_lock_config_zone_crc ( summary_crc)
-
-
Lock the config zone with summary CRC.
-
-The CRC is calculated over the entire config zone contents. 88 bytes for
-ATSHA devices, 128 bytes for ATECC devices. Lock will fail if the provided
-CRC doesn't match the internally calculated one.
-
-Args:
-    summary_crc         Expected CRC over the config zone. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_lock_data_slot()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_lock_data_slot ( slot)
-
-
Lock an individual slot in the data zone on an ATECC device. Not
-available for ATSHA devices. Slot must be configured to be slot
-lockable (KeyConfig.Lockable=1).
-
-Args:
-    slot                Slot to be locked in data zone. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_lock_data_zone()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_lock_data_zone (void )
-
-
Unconditionally (no CRC required) lock the data zone (slots and OTP).
-
-ConfigZone must be locked and DataZone must be unlocked for the
-zone to be successfully locked.
-
-Args:
-    None
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_lock_data_zone_crc()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_lock_data_zone_crc ( summary_crc)
-
-
Lock the data zone (slots and OTP) with summary CRC.
-
-The CRC is calculated over the concatenated contents of all the slots and
-OTP at the end. Private keys (KeyConfig.Private=1) are skipped. Lock will
-fail if the provided CRC doesn't match the internally calculated one.
-
-Args:
-    summary_crc         Expected CRC over the config zone. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_mac ( mode,
 key_id,
 challenge,
 digest 
)
-
-
Executes MAC command, which computes a SHA-256 digest of a key
-stored in the device, a challenge, and other information on the
-device.
-
-Args:
-    mode                Controls which fields within the device are used in
-                        the message (int)
-    key_id              Key in the CryptoAuth device to use for the MAC (int)
-    challenge           Challenge message (32 bytes). May be NULL if mode
-                        indicates a challenge isn't required. (bytearray or bytes)
-    digest              MAC response is returned here (32 bytes). (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_nonce()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_nonce ( num_in)
-
-
Execute a Nonce command in pass-through mode to initialize TempKey
-to a specified value.
-
-Args:
-    num_in              Data to be loaded into TempKey (32 bytes).
-                        (bytearray or bytes)
-
-Returns:
-    None
-
-
-
- -

◆ atcab_nonce_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_nonce_base ( mode,
 zero,
 num_in,
 rand_out 
)
-
-
Executes Nonce command, which loads a random or fixed nonce/data
-into the device for use by subsequent commands.
-
-Args:
-    mode                Controls the mechanism of the internal RNG or fixed
-                        write. (int)
-    zero                Param2, normally 0, but can be used to indicate a
-                        nonce calculation mode (bit 15). (int)
-    num_in              Input value to either be included in the nonce
-                        calculation in random modes (20 bytes) or to be
-                        written directly (32 bytes or 64 bytes(ATECC608))
-                        in pass-through mode. (bytearray or bytes)
-    rand_out            If using a random mode, the internally generated
-                        32-byte random number that was used in the nonce
-                        calculation is returned here. Can be NULL if not
-                        needed. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_nonce_load()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_nonce_load ( target,
 num_in,
 num_in_size 
)
-
-
Execute a Nonce command in pass-through mode to load one of the
-device's internal buffers with a fixed value.
-
-For the ATECC608, available targets are TempKey (32 or 64 bytes), Message
-Digest Buffer (32 or 64 bytes), or the Alternate Key Buffer (32 bytes). For
-all other devices, only TempKey (32 bytes) is available.
-
-Args:
-    target              Target device buffer to load. Can be
-                        NONCE_MODE_TARGET_TEMPKEY,
-                        NONCE_MODE_TARGET_MSGDIGBUF, or
-                        NONCE_MODE_TARGET_ALTKEYBUF.(int)
-    num_in              Data to load into the buffer.(bytearray or bytes)
-    num_in_size         Size of num_in in bytes. Can be 32 or 64 bytes
-                        depending on device and target. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_nonce_rand()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_nonce_rand ( num_in,
 rand_out 
)
-
-
Execute a Nonce command to generate a random nonce combining a host
-nonce (num_in) and a device random number.
-
-Args:
-    num_in              Host nonce to be combined with the device random
-                        number (20 bytes). (bytearray or bytes)
-    rand_out            Internally generated 32-byte random number that was
-                        used in the nonce/challenge calculation is returned
-                        here. Can be NULL if not needed.(Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_priv_write()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_priv_write ( key_id,
 priv_key,
 write_key_id,
 write_key,
 num_in = None 
)
-
-
Executes PrivWrite command, to write externally generated ECC
-private keys into the device.
-
-Args:
-    key_id              Slot to write the external private key into. (int)
-    priv_key            External private key (36 bytes) to be written.
-                        The first 4 bytes should be zero for P256 curve.
-                        (bytearray or bytes)
-    write_key_id        Write key slot. Ignored if write_key is NULL.(int)
-    write_key           Write key (32 bytes). If NULL, perform an
-                        unencrypted PrivWrite, which is only available when
-                        the data zone is unlocked. (bytearray or bytes)
-    num_in              Bytearray - Host nonce used to calculate nonce (20 bytes)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_random()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_random ( random_number)
-
-
Generates a 32 byte random number. Note that if the configuration zone
-isn't locked yet (LockConfig) then it will return a 0xFFFF0000 repeating
-pattern instead.
-
-Args:
-    random_number       Random number is returned here (expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_bytes_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_read_bytes_zone ( zone,
 slot,
 offset,
 data,
 length 
)
-
-
Used to read an arbitrary number of bytes from any zone configured
-for clear reads.
-
-This function will issue the Read command as many times as is required to
-read the requested data.
-
-Args:
-    zone                Zone to read data from. Option are ATCA_ZONE_CONFIG(0),
-                        ATCA_ZONE_OTP(1), or ATCA_ZONE_DATA(2). (int)
-    slot                Slot number to read from if zone is ATCA_ZONE_DATA(2).
-                        Ignored for all other zones. (int)
-    offset              Byte offset within the zone to read from. (int)
-    length              Number of bytes to read starting from the offset.(int)
-    data                Read data is returned here. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_config_zone()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_read_config_zone ( config_data)
-
-
Executes Read command to read the complete device configuration
-zone.
-
-Args:
-    config_data         Configuration zone data is returned here. 88 bytes
-                        for ATSHA devices, 128 bytes for ATECC devices.
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_read_enc ( key_id,
 block,
 data,
 enc_key,
 enc_key_id,
 num_in = None 
)
-
-
Executes Read command on a slot configured for encrypted reads and
-decrypts the data to return it as plaintext.
-
-Data zone must be locked for this command to succeed. Can only read 32 byte
-blocks.
-
-Args:
-    key_id              The slot ID to read from. (int)
-    block               Index of the 32 byte block within the slot to read. (int)
-    enc_key             32 byte ReadKey for the slot being read.(bytearray or bytes)
-    enc_key_id          KeyID of the ReadKey being used.(int)
-    data                Decrypted (plaintext) data from the read is returned
-                        here (32 bytes). (Expects bytearray)
-    num_in              Bytearray - Host nonce used to calculate nonce (20 byte)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_pubkey()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_read_pubkey ( slot,
 public_key 
)
-
-
Executes Read command to read an ECC P256 public key from a slot
-configured for clear reads.
-
-This function assumes the public key is stored using the ECC public key
-format specified in the datasheet.
-
-Args:
-    slot                Slot number to read from. Only slots 8 to 15 are
-                        large enough for a public key. (int)
-    public_key          Public key is returned here (64 bytes). Format will
-                        be the 32 byte X and Y big-endian integers
-                        concatenated. (Expects bytearray)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_serial_number()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_read_serial_number ( serial_number)
-
-
Executes Read command, which reads the 9 byte serial number of the
-device from the config zone.
-
-Args:
-    serial_number       9 byte serial number is returned here.
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_sig()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_read_sig ( slot,
 sig 
)
-
-
Executes Read command to read a 64 byte ECDSA P256 signature from a
-slot configured for clear reads.
-
-Args:
-    slot                Slot number to read from. Only slots 8 to 15 are large
-                        enough for a signature. (int)
-    sig                 Signature will be returned here (64 bytes). Format will be
-                        the 32 byte R and S big-endian integers concatenated.
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_read_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_read_zone ( zone,
 slot,
 block,
 offset,
 data,
 length 
)
-
-
Executes Read command, which reads either 4 or 32 bytes of data from
-a given slot, configuration zone, or the OTP zone.
-
-When reading a slot or OTP, data zone must be locked and the slot
-configuration must not be secret for a slot to be successfully read.
-
-Args:
-    zone                Zone to be read from device. Options are
-                        ATCA_ZONE_CONFIG, ATCA_ZONE_OTP, or ATCA_ZONE_DATA.(int)
-    slot                Slot number for data zone and ignored for other zones. (int)
-    block               32 byte block index within the zone. (int)
-    offset              4 byte work index within the block. Ignored for 32 byte
-                        reads. (Expects bytearray)
-    length              Length of the data to be read. Must be either 4 or 32.
-    data                Read data is returned here. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_release()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_release (void )
-
-
Release the kit and the communication stack
-raise CryptoException
-
-
-
- -

◆ atcab_secureboot()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_secureboot ( mode,
 param2,
 digest,
 signature,
 mac 
)
-
-
Executes Secure Boot command, which provides support for secure
-boot of an external MCU or MPU.
-
-Args:
-    mode                Mode determines what operations the SecureBoot
-                        command performs. (int)
-    param2              Not used, must be 0. (int)
-    digest              Digest of the code to be verified (32 bytes).
-                        (bytearray or bytes)
-    signature           Signature of the code to be verified (64 bytes). Can
-                        be NULL when using the FullStore mode. (bytearray or bytes)
-    mac                 Validating MAC will be returned here (32 bytes). Can
-                        be NULL if not required. (Expects bytearray)
-
-Return:
-    Status code
-
-
-
- -

◆ atcab_secureboot_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_secureboot_mac ( mode,
 digest,
 signature,
 num_in,
 io_keys,
 is_verified 
)
-
-
Executes Secure Boot command with encrypted digest and validated
-MAC response using the IO protection key.
-
-Args:
-    mode                Mode determines what operations the SecureBoot
-                        command performs. (int)
-    digest              Digest of the code to be verified (32 bytes).
-                        This is the plaintext digest (not encrypted).
-                        (bytearray or bytes)
-    signature           Signature of the code to be verified (64 bytes). Can
-                        be NULL when using the FullStore mode.
-                        (bytearray or bytes)
-    num_in              Host nonce (20 bytes).(bytearray or bytes)
-    io_key              IO protection key (32 bytes). (bytearray or bytes)
-    is_verified         Verify result is returned here. (Expects
-                        AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_selftest()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_selftest ( mode,
 param2,
 result 
)
-
-
Executes the SelfTest command, which performs a test of one or more
-of the cryptographic engines within the ATECC608 chip.
-
-Args:
-    mode                Functions to test. Can be a bit field combining any
-                        of the following: SELFTEST_MODE_RNG,
-                        SELFTEST_MODE_ECDSA_VERIFY, SELFTEST_MODE_ECDSA_SIGN,
-                        SELFTEST_MODE_ECDH, SELFTEST_MODE_AES,
-                        SELFTEST_MODE_SHA, SELFTEST_MODE_ALL. (int)
-    param2              Currently unused, should be 0. (int)
-    result              Results are returned here as a bit field. (Expects
-                        AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha ( length,
 message,
 digest 
)
-
-
Use the SHA command to compute a SHA-256 digest.
-
-Args:
-    length              Size of message parameter in bytes. (int)
-    message             Message data to be hashed. (bytearray or bytes)
-    digest              Digest is returned here (32 bytes). (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_base ( mode,
 length,
 message,
 data_out,
 data_out_size 
)
-
-
Executes SHA command, which computes a SHA-256 or HMAC/SHA-256
-digest for general purpose use by the host system.
-
-Only the Start(0) and Compute(1) modes are available for ATSHA devices.
-
-Args:
-    mode                SHA command mode Start(0), Update/Compute(1),
-                        End(2), Public(3), HMACstart(4), HMACend(5),
-                        Read_Context(6), or Write_Context(7). Also
-                        message digest target location for the
-                        ATECC608. (int)
-    length              Number of bytes in the message parameter or
-                        KeySlot for the HMAC key if Mode is
-                        HMACstart(4) or Public(3). (int)
-    message             Message bytes to be hashed or Write_Context if
-                        restoring a context on the ATECC608. Can be
-                        NULL if not required by the mode.
-                        (bytearray or bytes)
-    data_out            Data returned by the command (digest or
-                        context).(Expects bytearray)
-    data_out_size       As input, the size of the data_out buffer. As
-                        output, the number of bytes returned in
-                        data_out. (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_end()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_end ( digest,
 length,
 message 
)
-
-
Executes SHA command to complete SHA-256 or HMAC/SHA-256 operation.
-
-Args:
-    length              Length of any remaining data to include in hash. Max 64
-                        bytes.(int)
-    message             Remaining data to include in hash. NULL if length is 0. (bytearray or bytes)
-    digest              Digest from SHA-256 or HMAC/SHA-256 will be returned
-                        here (32 bytes). (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_hmac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_hmac ( data,
 data_size,
 key_slot,
 digest,
 target 
)
-
-
Use the SHA command to compute an HMAC/SHA-256 operation.
-
-Args:
-    data                Message data to be hashed. (bytearray or bytes)
-    data_size           Size of data in bytes. (int)
-    key_slot            Slot key id to use for the HMAC calculation (int)
-    target              Where to save the digest internal to the device.
-                        For ATECC608, can be SHA_MODE_TARGET_TEMPKEY,
-                        SHA_MODE_TARGET_MSGDIGBUF, or
-                        SHA_MODE_TARGET_OUT_ONLY. For all other devices,
-                        SHA_MODE_TARGET_TEMPKEY is the only option. (int)
-    digest              Digest is returned here (32 bytes).
-                        (Expects bytearray)
-
-Return:
-    Status code
-
-
-
- -

◆ atcab_sha_hmac_finish()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_hmac_finish ( ctx,
 digest,
 target 
)
-
-
Executes SHA command to complete a HMAC/SHA-256 operation.
-
-Args:
-    ctx                 HMAC/SHA-256 context (atca_hmac_sha256_ctx_t)
-    target              Where to save the digest internal to the device.
-                        For ATECC608, can be SHA_MODE_TARGET_TEMPKEY,
-                        SHA_MODE_TARGET_MSGDIGBUF, or SHA_MODE_TARGET_OUT_ONLY.
-                        For all other devices, SHA_MODE_TARGET_TEMPKEY is the
-                        only option. (int)
-    digest              HMAC/SHA-256 result is returned here (32 bytes).
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_hmac_init()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_hmac_init ( ctx,
 key_slot 
)
-
-
Executes SHA command to start an HMAC/SHA-256 operation
-
-Args:
-    ctx                 HMAC/SHA-256 context (atca_hmac_sha256_ctx_t)
-    key_slot            Slot key id to use for the HMAC calculation (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_hmac_update()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_hmac_update ( ctx,
 data,
 data_size 
)
-
-
Executes SHA command to add an arbitrary amount of message data to
-a HMAC/SHA-256 operation.
-
-Args:
-    ctx                 HMAC/SHA-256 context (atca_hmac_sha256_ctx_t)
-    data                Message data to add (bytearray or bytes)
-    data_size           Size of message data in bytes (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_read_context()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_read_context ( context,
 context_size 
)
-
-
Executes SHA command to read the SHA-256 context back. Only for
-ATECC608 with SHA-256 contexts. HMAC not supported.
-
-Args:
-    context             Context data is returned here. (Expects bytearray)
-    context_size        As input, the size of the context buffer in
-                        bytes. As output, the size of the returned
-                        context data. (Expects AtcaReference)
-
-Retuns:
-    Status code
-
-
-
- -

◆ atcab_sha_start()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_start (void )
-
-
Executes SHA command to initialize SHA-256 calculation engine
-
-Args:
-    None
-
-Returns;
-    Status code
-
-
-
- -

◆ atcab_sha_update()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_update ( message)
-
-
Executes SHA command to add 64 bytes of message data to the current
-context.
-
-Args:
-    message             64 bytes of message data to add to add to operation.
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sha_write_context()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sha_write_context ( context,
 context_size 
)
-
-
Executes SHA command to write (restore) a SHA-256 context into the
-the device. Only supported for ATECC608 with SHA-256 contexts.
-
-Args:
-    context             Context data to be restored. (bytearray or bytes)
-    context_size        Size of the context data in bytes. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sign()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sign ( key_id,
 msg,
 signature 
)
-
-
Executes Sign command, to sign a 32-byte external message using the private key
-in the specified slot. The message to be signed will be loaded into the Message
-Digest Buffer to the ATECC608 device or TempKey for other devices.
-
-Args:
-    key_id          Slot of the private key to be used to sign the message (int)
-    msg             32-byte message to be signed. Typically the SHA256 hash
-                    of the full message. (bytearray or bytes)
-    signature       Signature will be returned here. Format is R and S integers in
-                    big-endian format. 64 bytes for P256 curve. (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_sign_base()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sign_base ( mode,
 key_id,
 signature 
)
-
-
Executes the Sign command, which generates a signature using the ECDSA algorithm.
-
-Args:
-    mode            Mode determines what the source of the message to be signed (int)
-    key_id          Private key slot used to sign the message. (int)
-    signature       Signature is returned here. Format is R and S integers in
-                    big-endian format. 64 bytes for P256 curve (Expects bytearray)
-
-Returns:
-    Stauts code
-
-
-
- -

◆ atcab_sign_internal()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_sign_internal ( key_id,
 is_invalidate,
 is_full_sn,
 signature 
)
-
-
Executes Sign command to sign an internally generated message.
-
-Args:
-    key_id              Slot of the private key to be used to sign the message (int)
-    is_invalidate       Set to true if the signature will be used with the Verify(Invalidate)
-                        command. false for all other cases.
-    is_full_sn          Set to true if the message should incorporate the device's
-                        full serial number.
-    signature           Signature is returned here. Format is R and S integers in
-                        big-endian format. 64 bytes for P256 curve (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_updateextra()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_updateextra ( mode,
 new_value 
)
-
-
Executes UpdateExtra command to update the values of the two extra bytes within
-the Configuration zone (bytes 84 and 85). an also be used to decrement the limited
-use counter associated with the key in slot NewValue.
-
-Args:
-    mode        Mode determines what operations the UpdateExtra command performs. (int)
-    new_value   Value to be written. (int)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_verify()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify ( mode,
 key_id,
 signature,
 public_key,
 other_data,
 mac 
)
-
-
Executes the Verify command, which takes an ECDSA [R,S] signature and verifies that
-it is correctly generated from a given message and public key. In all cases, the
-signature is an input to the command. For the Stored, External, and ValidateExternal
-Modes, the contents of TempKey (or Message Digest Buffer in some cases for the
-ATECC608) should contain the 32 byte message.
-
-Args:
-    mode                Verify command mode and options (int)
-    key_id              Stored mode, the slot containing the public key to be
-                        used for the verification. ValidateExternal mode, the
-                        slot containing the public key to be validated. External
-                        mode, KeyID contains the curve type to be used to Verify
-                        the signature. Validate or Invalidate mode, the slot
-                        containing the public key to be (in)validated.(int)
-    signature           Signature to be verified. R and S integers in
-                        big-endian format. 64 bytes for P256 curve.
-                        (bytearray or bytes)
-    public_key          If mode is External, the public key to be used for
-                        verification. X and Y integers in big-endian format.
-                        64 bytes for P256 curve. NULL for all other modes.
-                        (bytearray or bytes)
-    other_data          If mode is Validate, the bytes used to generate the
-                        message for the validation (19 bytes). NULL for all other modes.
-                        (bytearray or bytes)
-    mac                 If mode indicates a validating MAC, then the MAC will
-                        be returned here. Can be NULL otherwise.
-                        (Expects bytearray)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_verify_extern()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_extern ( message,
 signature,
 public_key,
 is_verified 
)
-
-
Executes the Verify command, which verifies a signature (ECDSA verify operation) with
-all components (message, signature, and public key) supplied. The message to be signed
-will be loaded into the Message Digest Buffer to the ATECC608 device or TempKey for
-other devices.
-
-Args:
-    message             32 byte message to be verified. Typically the SHA256 hash of
-                        the full message. (Expects bytes)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (Expects bytes)
-    public_key          The public key to be used for verification. X and Y integers
-                        in big-endian format. 64 bytes for P256 curve. (Expects bytes)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_verify_extern_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_extern_mac ( message,
 signature,
 public_key,
 num_in,
 io_key,
 is_verified 
)
-
-
Executes the Verify command with verification MAC, which verifies a signature
-(ECDSA verify operation) with all components (message,  signature, and public key)
-supplied. This function is only available on the ATECC608.
-
-Args:
-    message             32 byte message to be verified. Typically the SHA256 hash of
-                        the full message. (bytearray or bytes)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (bytearray or bytes)
-    public_key          The public key to be used for verification. X and Y integers in
-                        big-endian format. 64 bytes for P256 curve. (bytearray or bytes)
-    num_in              System nonce (32 byte) used for the verification MAC. (bytearray or bytes)
-    io_key              IO protection key for verifying the validation MAC. (bytearray or bytes)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-Returns:
-    Stats code
-
-
-
- -

◆ atcab_verify_extern_stored_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_extern_stored_mac ( mode,
 key_id,
 message,
 signature,
 public_key,
 num_in,
 io_key,
 is_verified 
)
-
-
Executes the Verify command with verification MAC for the External or Stored Verify modes..
-
-Args:
-    mode                Verify command mode. Can be VERIFY_MODE_EXTERNAL or
-                        VERIFY_MODE_STORED. (int)
-    key_id              For VERIFY_MODE_STORED mode, the slot containing the public key
-                        to be used for the verification. For VERIFY_MODE_EXTERNAL mode,
-                        KeyID contains the curve type to be used to Verify the signature.
-                        Only VERIFY_KEY_P256 supported. (int)
-    message             32 byte message to be verified. Typically the SHA256 hash of the
-                        full message. (bytearray or bytes)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (bytearray or bytes)
-    public_key          For VERIFY_MODE_EXTERNAL mode, the public key to be used for
-                        verification. X and Y integers in big-endian format. 64 bytes
-                        for P256 curve. Null for VERIFY_MODE_STORED mode. (bytearray or bytes)
-    num_in              System nonce (32 byte) used for the verification MAC. (bytearray or bytes)
-    io_key              IO protection key for verifying the validation MAC. (bytearray or bytes)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_verify_invalidate()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_invalidate ( key_id,
 signature,
 other_data,
 is_verified 
)
-
-
Executes the Verify command in Invalidate mode which invalidates a previously
-validated public key stored in a slot. This command can only be run after
-GenKey has been used to create a PubKey digest of the public key to be
-invalidated in TempKey (mode=0x10).
-
-Args:
-    key_id              Slot containing the public key to be invalidated. (int)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (bytearray or bytes)
-    other_data          19 bytes of data used to build the verification message (bytearray or bytes)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_verify_stored()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_stored ( message,
 signature,
 key_id,
 is_verified 
)
-
-
Executes the Verify command, which verifies a signature (ECDSA verify operation)
-with a public key stored in the device. The message to be signed will be loaded
-into the Message Digest Buffer to the ATECC608 device or TempKey for other devices.
-
-Args:
-    message             32 byte message to be verified. Typically the SHA256 hash of
-                        the full message. (bytearray or bytes)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (bytearray or bytes)
-    key_id              Slot containing the public key to be used in the verification.(int)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_verify_stored_mac()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_stored_mac ( message,
 signature,
 key_id,
 num_in,
 io_key,
 is_verified 
)
-
-
Executes the Verify command with verification MAC, which verifies a  signature
-(ECDSA verify operation) with a public key stored in the device. This function
-is only available on the ATECC608.
-
-Args:
-    message             32 byte message to be verified. Typically the SHA256 hash of
-                        the full message. (bytearray or bytes)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (bytearray or bytes)
-    key_id              Slot containing the public key to be used in the verification.
-                        (int)
-    num_in              System nonce (32 byte) used for the verification MAC.
-                        (bytearray or bytes)
-    io_key              IO protection key for verifying the validation MAC.
-                        (bytearray or bytes)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-Retuns:
-    Status code
-
-
-
- -

◆ atcab_verify_validate()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_verify_validate ( key_id,
 signature,
 other_data,
 is_verified 
)
-
-
Executes the Verify command in Validate mode to validate a public key stored
-in a slot. This command can only be run after GenKey has been used to create
-a PubKey digest of the public key to be validated in TempKey (mode=0x10).
-
-Args:
-    key_id              Slot containing the public key to be validated.(int)
-    signature           Signature to be verified. R and S integers in big-endian format.
-                        64 bytes for P256 curve. (bytearray or bytes)
-    other_data          19 bytes of data used to build the verification message (bytearray or bytes)
-    is_verified         Boolean whether or not the message, signature, public key verified.
-                        (Expects AtcaReference)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_write()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_write ( zone,
 address,
 value,
 mac 
)
-
-
Executes the Write command, which writes either one four byte word or a 32-byte
-block to one of the EEPROM zones on the device. Depending upon the value of the
-WriteConfig byte for this slot, the data may be required to be encrypted by the
-system prior to being sent to the device. This command cannot be used to write
-slots configured as ECC private keys.
-
-Args:
-    zone                Zone/Param1 for the write command. (int)
-    address             Address/Param2 for the write command. (int)
-    value               Plain-text data to be written or cipher-text for encrypted writes.
-                        32 or 4 bytes depending on bit 7 in the zone. (bytearray or bytes)
-    data                Data to be written. (bytearray or bytes)
-    mac                 MAC required for encrypted writes (32 bytes).
-                        (bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_write_bytes_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_write_bytes_zone ( zone,
 slot,
 offset_bytes,
 data,
 length 
)
-
-
Executes the Write command, which writes data into config, otp, or data zone with a given
-byte offset and length. Offset and length must be multiples of a word (4 bytes).
-
-Config zone must be unlocked for writes to that zone. If data zone is
-unlocked, only 32-byte writes are allowed to slots and OTP and the offset
-and length must be multiples of 32 or the write will fail.
-
-Args:
-    zone                Zone to write data to: Zones.ATCA_ZONE_CONFIG, Zones.ATCA_ZONE_OTP,
-                        or Zones.ATCA_ZONE_DATA. (int)
-    slot                If zone is Zones.ATCA_ZONE_DATA, the slot number to write to.
-                        Ignored for all other zones. (int)
-    offset_bytes        Byte offset within the zone to write to. Must be a multiple of
-                        a word (4 bytes). (int)
-    data                bytearray containing Data to be written. (bytearray or bytes)
-    length              Number of bytes to be written. Must be a multiple of a word (4 bytes).
-                        (int)
-
-Returns:
-    None
-
-
-
- -

◆ atcab_write_config_counter()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_write_config_counter ( counter_id,
 counter_value 
)
-
-
Initialize one of the monotonic counters in device with a specific value. The monotonic
-counters are stored in the configuration zone using a special format. This encodes a
-binary count value into the 8 byte encoded value required. This can only be set while
-the configuration zone is unlocked.
-
-Args:
-    counter_id          Counter to be written (int)
-    counter_value       Counter value to set (int)
-
-
-
- -

◆ atcab_write_config_zone()

- -
-
- - - - - - - - -
def cryptoauthlib.atcab.atcab_write_config_zone ( conf)
-
-
Executes the Write command, which writes the configuration zone. First 16 bytes are
-skipped as they are not writable. LockValue and LockConfig are also skipped and can
-only be changed via the Lock command.
-
-This command may fail if UserExtra and/or Selector bytes have
-already been set to non-zero values.
-
-Args:
-    conf                Data to the config zone data. This should be a 88
-                        byte bytearray for SHA devices and 128 byte bytearray for ECC
-                        devices. (bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_write_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_write_enc ( key_id,
 block,
 data,
 enc_key,
 enc_key_id,
 num_in = None 
)
-
-
Executes the Write command, which performs an encrypted write of a 32 byte block into
-given slot. The function takes clear text bytes and encrypts them for writing over the
-wire. Data zone must be locked and the slot configuration must be set to encrypted
-write for the block to be successfully written.
-
-Args:
-    key_id              Slot ID to write to. (int)
-    block               Index of the 32 byte block to write in the slot. (int)
-    data                32 bytes of clear text data to be written to the slot.
-                        (bytearray or bytes)
-    enc_key             WriteKey to encrypt with for writing
-                        (bytearray or bytes)
-    enc_key_id          The KeyID of the WriteKey (int)
-    num_in              Bytearray - Host nonce used to calculate nonce (20 bytes)
-Returns:
-    Status code
-
-
-
- -

◆ atcab_write_pubkey()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_write_pubkey ( slot,
 public_key 
)
-
-
Executes the Write command, which writes a public key to a data slot in the device format.
-
-Args:
-    slot                Slot number to write. Only slots 8 to 15 are large enough to
-                        store a public key. (int)
-    public_key          Public key to write into the slot specified. X and Y integers
-                        in big-endian format. 64 bytes for P256 curve. (bytearray or bytes)
-
-Returns:
-    Status code
-
-
-
- -

◆ atcab_write_zone()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcab.atcab_write_zone ( zone,
 slot,
 block,
 offset,
 data,
 length 
)
-
-
Executes the Write command, which writes either 4 or 32 bytes of data into a device zone.
-
-Args:
-    zone                Device zone to write to (0=config, 1=OTP, 2=data). (int)
-    slot                If writing to the data zone, it is the slot to write to, otherwise
-                        it should be 0. (int)
-    block               32-byte block to write to. (int)
-    offset              4-byte word within the specified block to write to. If performing a
-                        32-byte write, this should be 0. (int)
-    data                Data to be written. (bytearray or bytes)
-    len                 Number of bytes to be written. Must be either 4 or 32. (int)
-
-Returns:
-    Status code
-
-
-
-
-
- - - - diff --git a/a01452.js b/a01452.js deleted file mode 100644 index 23ecbc91f..000000000 --- a/a01452.js +++ /dev/null @@ -1,130 +0,0 @@ -var a01452 = -[ - [ "atca_aes_cbc_ctx", "a02144.html", null ], - [ "atca_aes_cbcmac_ctx", "a02168.html", null ], - [ "atca_aes_ccm_ctx", "a02164.html", null ], - [ "atca_aes_cmac_ctx", "a02148.html", null ], - [ "atca_aes_ctr_ctx", "a02152.html", null ], - [ "atca_aes_gcm_ctx", "a02160.html", null ], - [ "atca_hmac_sha256_ctx", "a02172.html", null ], - [ "atca_sha256_ctx", "a02156.html", null ], - [ "atcab_aes", "a01452.html#aa6f667c9ff033cb3e1d8bd1565e080aa", null ], - [ "atcab_aes_cbc_decrypt_block", "a01452.html#a9a7024193b07e7c98690873e7452f0ad", null ], - [ "atcab_aes_cbc_encrypt_block", "a01452.html#a7e0bc033c11e689570f7aa9431d49d9c", null ], - [ "atcab_aes_cbc_init", "a01452.html#a837da37427357c91aba40c6becbebfeb", null ], - [ "atcab_aes_cbcmac_finish", "a01452.html#a1c364ea983169ac73197713db23f9a52", null ], - [ "atcab_aes_cbcmac_init", "a01452.html#aa612658a288c6a5cca103e5d3965390c", null ], - [ "atcab_aes_cbcmac_update", "a01452.html#af58b97dc722402be6c65e226a0dd26ae", null ], - [ "atcab_aes_ccm_aad_finish", "a01452.html#a99d19bf27efa04318480a3e81f668ae8", null ], - [ "atcab_aes_ccm_aad_update", "a01452.html#af5502348939c1db2fdafde42603266f3", null ], - [ "atcab_aes_ccm_decrypt_finish", "a01452.html#aa641b1946cfcb33ac7e353a6ca7285ab", null ], - [ "atcab_aes_ccm_decrypt_update", "a01452.html#ab78cfabfa12d891830c1147bbc61a2e0", null ], - [ "atcab_aes_ccm_encrypt_finish", "a01452.html#ac0399ab5a8ab2e7682441241fcc98914", null ], - [ "atcab_aes_ccm_encrypt_update", "a01452.html#a78d906cc88e8efcb280a0869ca7afaf2", null ], - [ "atcab_aes_ccm_init", "a01452.html#ab5ef9981f825f3fe5beb84b4d664f321", null ], - [ "atcab_aes_ccm_init_rand", "a01452.html#af34551008cb67c907488a9403da495ad", null ], - [ "atcab_aes_cmac_finish", "a01452.html#aeccd1e361da41854a45068507ccd9f33", null ], - [ "atcab_aes_cmac_init", "a01452.html#a1b778f3fa3c6d459075500f5248d09c6", null ], - [ "atcab_aes_cmac_update", "a01452.html#aefa4891ccc2a860029958f2e80bdef87", null ], - [ "atcab_aes_ctr_decrypt_block", "a01452.html#a80a2b3fe53dc4caedad79221b05bbdf7", null ], - [ "atcab_aes_ctr_encrypt_block", "a01452.html#a1a3dce72fa3192b1ca917025b8ff4736", null ], - [ "atcab_aes_ctr_init", "a01452.html#aec84bbc3cc86b716a2996069d5d227c0", null ], - [ "atcab_aes_ctr_init_rand", "a01452.html#a87ec2b9cbb53f9f38df252d6b7508881", null ], - [ "atcab_aes_decrypt", "a01452.html#ac67f610115ce611e94d05a87ada77f66", null ], - [ "atcab_aes_encrypt", "a01452.html#a544871498712993b7ceb7a0134beac55", null ], - [ "atcab_aes_gcm_aad_update", "a01452.html#a5b7cd7ecd0b2526f1daa7c60ea39c581", null ], - [ "atcab_aes_gcm_decrypt_finish", "a01452.html#aeae81b172cf9a1b8a85052b9129d9dd1", null ], - [ "atcab_aes_gcm_decrypt_update", "a01452.html#a5af363a108f86f636af7581097b396cd", null ], - [ "atcab_aes_gcm_encrypt_finish", "a01452.html#ae3f487577cbb7e66ccb39c8d6ea9a358", null ], - [ "atcab_aes_gcm_encrypt_update", "a01452.html#a0e5230bd79eba76c6350b724d5297310", null ], - [ "atcab_aes_gcm_init", "a01452.html#a29a3eabf3e5e353e52dd52c69ea69ec4", null ], - [ "atcab_aes_gcm_init_rand", "a01452.html#a4a9dc88e03b9e5066ff28b8518196ce7", null ], - [ "atcab_aes_gfm", "a01452.html#ad9bd7c6cc3e26cca5865dda3c02bcce2", null ], - [ "atcab_challenge", "a01452.html#a40bc5aa6ac58d01d4ee7888dddd884bb", null ], - [ "atcab_challenge_seed_update", "a01452.html#a0cefee590d648d724f343488569c10df", null ], - [ "atcab_checkmac", "a01452.html#aba58d5a7562b69d72c33cfda82c2b580", null ], - [ "atcab_cmp_config_zone", "a01452.html#af312843ce780c0062f9067c182ad2db6", null ], - [ "atcab_counter", "a01452.html#ade607e2a5b08d77e4559161dfac0c0e8", null ], - [ "atcab_counter_increment", "a01452.html#a216d7fa1d484d6a4ecf55d7886c355ef", null ], - [ "atcab_counter_read", "a01452.html#ae40c31b557e83cd4c590288082d07d6e", null ], - [ "atcab_derivekey", "a01452.html#af411b3996170b6dd0e90dc999c896d19", null ], - [ "atcab_ecdh", "a01452.html#a8e85d04188b3d10cccaf6641bf5753fe", null ], - [ "atcab_ecdh_base", "a01452.html#a84c655ca82b1c0ed968be7d63be4a5f2", null ], - [ "atcab_ecdh_enc", "a01452.html#ae3505ac892b47a7384a9ec95338bee22", null ], - [ "atcab_ecdh_ioenc", "a01452.html#adefdce788a6ef35250f5b1c139454b64", null ], - [ "atcab_ecdh_tempkey", "a01452.html#a3a1b9396c4a6aec1fc32839fe681f3a9", null ], - [ "atcab_ecdh_tempkey_ioenc", "a01452.html#ac6eb9270fa4c963d6ebba79aea1ddc4b", null ], - [ "atcab_gendig", "a01452.html#a8b0381ac0e872d25df0373d9cd9ce4af", null ], - [ "atcab_genkey", "a01452.html#acef9ae292bb3e6c3c1c1b16a20bd6494", null ], - [ "atcab_genkey_base", "a01452.html#aa1e87847ce5fccdef062c9aaa5bea65e", null ], - [ "atcab_get_device", "a01452.html#a2087c24eeaa066ab0481265ca17b62fb", null ], - [ "atcab_get_device_type", "a01452.html#a63e034778c2964569df7a6fb0ec0a8f1", null ], - [ "atcab_get_pubkey", "a01452.html#aac8a5ac8d26586ed7a707ddf2224ecd8", null ], - [ "atcab_hmac", "a01452.html#abcef2cce95ddc7363a687ee4cf238671", null ], - [ "atcab_hw_sha2_256", "a01452.html#aec129bd1fae35bcb87dd129ca4e065ca", null ], - [ "atcab_hw_sha2_256_finish", "a01452.html#a6f0cb9bd0b1cecd09fa765083d998db1", null ], - [ "atcab_hw_sha2_256_init", "a01452.html#a213e34c48cf1f6a119979ae00acebee5", null ], - [ "atcab_hw_sha2_256_update", "a01452.html#a4c9b8fd51581178ad0d988f64e2df04c", null ], - [ "atcab_info", "a01452.html#add3fb2f7c78eb84e42bcb17800f2c6de", null ], - [ "atcab_info_base", "a01452.html#af03e307e61709bff1443d0f72a2efdb9", null ], - [ "atcab_info_get_latch", "a01452.html#ab21835e5b3b868f49faecd453d8da4e3", null ], - [ "atcab_info_set_latch", "a01452.html#a0ae7c88423c60e7dd7fefff75d443c35", null ], - [ "atcab_init", "a01452.html#ad7cc965be77a8f829027f9afc21556b5", null ], - [ "atcab_is_locked", "a01452.html#a035fb2c7a593d20f479943c0d74df245", null ], - [ "atcab_is_slot_locked", "a01452.html#ac73a52d0b4b8104accb6f34542d06e85", null ], - [ "atcab_kdf", "a01452.html#a760c91e04ad8a62181956b73ada2e384", null ], - [ "atcab_lock", "a01452.html#a384368c23f29b2008c79effe063da77d", null ], - [ "atcab_lock_config_zone", "a01452.html#a13f0865a1ac2377282b29d6721b5c834", null ], - [ "atcab_lock_config_zone_crc", "a01452.html#a64223730cf6d1f1ecb48ebcfaffea75c", null ], - [ "atcab_lock_data_slot", "a01452.html#a0738f317bdd3c1decb934971e66ee66c", null ], - [ "atcab_lock_data_zone", "a01452.html#ad4c4f17808f4904cef59fb3c6a3060e1", null ], - [ "atcab_lock_data_zone_crc", "a01452.html#a037d202036ce67334a0dc1dd5b714c3e", null ], - [ "atcab_mac", "a01452.html#a02089d61678b8d494424c16bb612b8ad", null ], - [ "atcab_nonce", "a01452.html#ad4e841d49e6fd9d67c664f020877e730", null ], - [ "atcab_nonce_base", "a01452.html#afcb4ae6dd50b4449b6de4d1d0754601d", null ], - [ "atcab_nonce_load", "a01452.html#adf1843ed620eb72a9efc75ff0251efa6", null ], - [ "atcab_nonce_rand", "a01452.html#a75272bce518cb8b951b9adae61a02c58", null ], - [ "atcab_priv_write", "a01452.html#ac94db106ce16b83c5f5518cf92e24d4d", null ], - [ "atcab_random", "a01452.html#a8d6436e974c3780cb205261049fbbb87", null ], - [ "atcab_read_bytes_zone", "a01452.html#abd3403fcc46a2b82556784e142161c65", null ], - [ "atcab_read_config_zone", "a01452.html#a5dfdc90856af9f03e09cc280dcfe3de0", null ], - [ "atcab_read_enc", "a01452.html#a87c05138d598087100ec1e740bf9e221", null ], - [ "atcab_read_pubkey", "a01452.html#a03506fe5daef9a019b2688e49af8a725", null ], - [ "atcab_read_serial_number", "a01452.html#a903f3bc6862860693f3d0c7fcfb68abd", null ], - [ "atcab_read_sig", "a01452.html#a643bc00f84713b2e8705021f6b2c2d0f", null ], - [ "atcab_read_zone", "a01452.html#ae74a63edf1522697556aa1d98493b15b", null ], - [ "atcab_release", "a01452.html#a6b784447f8cf2cfc112ab33a4b10ce22", null ], - [ "atcab_secureboot", "a01452.html#a7063655ccab4af3b185ff519a40329e0", null ], - [ "atcab_secureboot_mac", "a01452.html#a3e585d7d21fb74154c4e53d541db9e5a", null ], - [ "atcab_selftest", "a01452.html#ab078cd0a92f0f235fa36fb06ccf4af19", null ], - [ "atcab_sha", "a01452.html#a583ddc1d9adbdceea0a7617c6b87ff8d", null ], - [ "atcab_sha_base", "a01452.html#a49b55d1996aee8c868684a916341522f", null ], - [ "atcab_sha_end", "a01452.html#a7ffc1b8652c148a1c3a86ef80155502c", null ], - [ "atcab_sha_hmac", "a01452.html#a0589fee6cdf8761c032b330a3079e0e0", null ], - [ "atcab_sha_hmac_finish", "a01452.html#a897a5ee03a68bba8afe2371f89a6d7a5", null ], - [ "atcab_sha_hmac_init", "a01452.html#a6d243431c455704e03f148b9e373db51", null ], - [ "atcab_sha_hmac_update", "a01452.html#a323b71e8080719b27a45f63bb8ef6a59", null ], - [ "atcab_sha_read_context", "a01452.html#a4bcf510aa10502e29fe2321486019fb5", null ], - [ "atcab_sha_start", "a01452.html#a3fee574ed2618a6abc770bb1f17dc6b5", null ], - [ "atcab_sha_update", "a01452.html#a91f72328d639d88598498c37cb552ffb", null ], - [ "atcab_sha_write_context", "a01452.html#acc277568c5c42424ff90d8bfcee667b8", null ], - [ "atcab_sign", "a01452.html#a14fe9d38029d932b4aef6802bbf078ab", null ], - [ "atcab_sign_base", "a01452.html#a8728f5f5bf67ede8dce575af486499c9", null ], - [ "atcab_sign_internal", "a01452.html#af218c61a8dd3d937e5dfd3ad2d0c2701", null ], - [ "atcab_updateextra", "a01452.html#a76dda154eba75b7c0c8f6a8fcc5d346a", null ], - [ "atcab_verify", "a01452.html#a40e190b9a9b0bb5aa2389cc482f94780", null ], - [ "atcab_verify_extern", "a01452.html#a692a721d89bd8f4032502f343d3f1718", null ], - [ "atcab_verify_extern_mac", "a01452.html#ae8ab769023a1d717198eb06aa17ff8b0", null ], - [ "atcab_verify_extern_stored_mac", "a01452.html#aadca3cb06b25a8b3b8c6a851ad477db0", null ], - [ "atcab_verify_invalidate", "a01452.html#a49f823cd787be6ed036e7bc1e430b384", null ], - [ "atcab_verify_stored", "a01452.html#a90baa667a1e6bb223cda44f4322c2f44", null ], - [ "atcab_verify_stored_mac", "a01452.html#a4b1ae9a8e89b7038fd5f75686ca97e31", null ], - [ "atcab_verify_validate", "a01452.html#a627d101aa165533d893461f5fb39efa1", null ], - [ "atcab_write", "a01452.html#acd0f0264807684089bb1ab8bdfcb989f", null ], - [ "atcab_write_bytes_zone", "a01452.html#a5db76308f0e51108dea8222f14ac405e", null ], - [ "atcab_write_config_counter", "a01452.html#aff3e1986bf6d79a353f8820fe5ed4306", null ], - [ "atcab_write_config_zone", "a01452.html#a4144ba085c025b94f6d39de2ba33dc26", null ], - [ "atcab_write_enc", "a01452.html#ae8faf982d17b5fc72231bc648a51063a", null ], - [ "atcab_write_pubkey", "a01452.html#a64692832da534aacee8a61cef74e9be1", null ], - [ "atcab_write_zone", "a01452.html#a18b7743ebac58022a1f704cb3b011803", null ] -]; \ No newline at end of file diff --git a/a01453.html b/a01453.html deleted file mode 100644 index f448eed57..000000000 --- a/a01453.html +++ /dev/null @@ -1,802 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Structures

class  atcacert_cert_element_t
 
class  atcacert_cert_loc_t
 
class  atcacert_cert_sn_src_t
 
class  atcacert_cert_type_t
 
class  atcacert_comp_data_t
 
class  atcacert_date_format_t
 
class  atcacert_def_t
 
class  atcacert_device_loc_t
 
class  atcacert_device_zone_t
 
class  atcacert_std_cert_element_t
 
class  atcacert_tm_utc_t
 
class  atcacert_transform_t
 
class  CertStatus
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

def _atcacert_convert_bytes (kwargs, name, pointer)
 
def _atcacert_convert_enum (kwargs, name, enum)
 
def atcacert_max_cert_size (cert_def, max_cert_size)
 
def atcacert_get_response (device_private_key_slot, challenge, response)
 
def atcacert_read_cert (cert_def, ca_public_key, cert, cert_size)
 
def atcacert_write_cert (cert_def, cert, cert_size)
 
def atcacert_create_csr (csr_def, csr, csr_size)
 
def atcacert_create_csr_pem (csr_def, csr, csr_size)
 
def atcacert_date_enc (date_format, timestamp, formatted_date, formatted_date_size)
 
def atcacert_date_dec (date_format, formatted_date, formatted_date_size, timestamp)
 
def atcacert_date_enc_compcert (issue_date, expire_years, enc_dates)
 
def atcacert_date_dec_compcert (enc_dates, expire_date_format, issue_date, expire_date)
 
def atcacert_date_get_max_date (date_format, timestamp)
 
-

Detailed Description

-
ATCACERT: classes and functions for interacting with compressed certificates
-

Function Documentation

- -

◆ _atcacert_convert_bytes()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert._atcacert_convert_bytes ( kwargs,
 name,
 pointer 
)
-
-protected
-
-
Internal Helper Function: Convert python 'bytes' into memory pointer for ctypes structure
-:param kwargs: kwargs dictionary
-:param name: _field_ name that will be converted
-:param pointer: Conversion Class (resulting type - pointer of type x)
-:return:
-
-
-
- -

◆ _atcacert_convert_enum()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert._atcacert_convert_enum ( kwargs,
 name,
 enum 
)
-
-protected
-
-
Internal Helper Function: Convert python enum into ctypes integer
-:param kwargs: kwargs dictionary
-:param name: _field_ name that will be converted
-:param enum: Conversion Class (resulting type)
-:return:
-
-
-
- -

◆ atcacert_create_csr()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_create_csr ( csr_def,
 csr,
 csr_size 
)
-
-
Creates a CSR specified by the CSR definition from the ATECC508A device.
-This process involves reading the dynamic CSR data from the device and combining it
-with the template found in the CSR definition, then signing it. Return the CSR int der format
-
-Args:
-    csr_def                 CSR definition describing where to find the dynamic CSR information
-                            on the device and how to incorporate it into the template.
-                            Expects atcacert_def_t.
-    csr                     Buffer to receive the CSR. Expects bytearray.
-    csr_size                As input, the size of the CSR buffer in bytes.
-                            As output, the size of the CSR as PEM returned in cert in bytes.
-                            Expects AtcaReference.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_create_csr_pem()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_create_csr_pem ( csr_def,
 csr,
 csr_size 
)
-
-
Creates a CSR specified by the CSR definition from the ATECC508A device.
-This process involves reading the dynamic CSR data from the device and combining it
-with the template found in the CSR definition, then signing it. Return the CSR int der format
-
-Args:
-    csr_def                 CSR definition describing where to find the dynamic CSR information
-                            on the device and how to incorporate it into the template.
-                            Expects atcacert_def_t.
-    csr                     Buffer to receive the CSR. Expects bytearray.
-    csr_size                As input, the size of the CSR buffer in bytes.
-                            As output, the size of the CSR as PEM returned in cert in bytes.
-                            Expects AtcaReference.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_date_dec()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_date_dec ( date_format,
 formatted_date,
 formatted_date_size,
 timestamp 
)
-
-
Parse a formatted timestamp according to the specified format.
-
-Args:
-    date_format             Format to parse the formatted date as.
-    formatted_date          Formatted date to be parsed.
-    formatted_date_size     Size of the formatted date in bytes.
-    timestamp               Parsed timestamp is returned here. Expects atcacert_tm_utc_t.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_date_dec_compcert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_date_dec_compcert ( enc_dates,
 expire_date_format,
 issue_date,
 expire_date 
)
-
-
Decode the issue and expire dates from the format used by the compressed certificate.
-
-Args:
-    enc_dates               Encoded date from the compressed certificate. 3 bytes.
-    expire_date_format      Expire date format. Only used to determine max date when no
-                            expiration date is specified by the encoded date.
-    issue_date              Decoded issue date is returned here. Expects atcacert_tm_utc_t.
-    expire_date             Decoded expire date is returned here. If there is no
-                            expiration date, the expire date will be set to a maximum
-                            value for the given expire_date_format. Expects atcacert_tm_utc_t.
-Returns:
-    ATCACERT_E_SUCCESS on success
-
-
-
- -

◆ atcacert_date_enc()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_date_enc ( date_format,
 timestamp,
 formatted_date,
 formatted_date_size 
)
-
-
Format a timestamp according to the format type.
-
-Args:
-    date_format             Format to use.
-    timestamp               Timestamp to format. Expects atcacert_tm_utc_t.
-    formatted_date          Formatted date will be returned in this buffer.
-                            Expects bytearray.
-    formatted_date_size     As input, the size of the formatted_date buffer.
-                            As output, the size of the returned formatted_date.
-                            Expects AtcaReference.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_date_enc_compcert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_date_enc_compcert ( issue_date,
 expire_years,
 enc_dates 
)
-
-
Encode the issue and expire dates in the format used by the compressed certificate.
-
-Args:
-    issue_date              Issue date to encode. Note that minutes and seconds will be ignored.
-                            Expects atcacert_tm_utc_t.
-    expire_years            Expire date is expressed as a number of years past the issue date.
-                            0 should be used if there is no expire date.
-    enc_dates               Encoded dates for use in the compressed certificate is returned here.
-                            3 bytes. Expects bytearray.
-
-Returns:
-    ATCACERT_E_SUCCESS on success
-
-
-
- -

◆ atcacert_date_get_max_date()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_date_get_max_date ( date_format,
 timestamp 
)
-
-
Return the maximum date available for the given format.
-
-Args:
-    format                  Format to get the max date for.
-    timestamp               Max date is returned here. Expects atcacert_tm_utc_t.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_get_response()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_get_response ( device_private_key_slot,
 challenge,
 response 
)
-
-
Calculates the response to a challenge sent from the host.
-The challenge-response protocol is an ECDSA Sign and Verify. This performs the ECDSA Sign on the
-challenge and returns the signature as the response.
-
-Args:
-    device_private_key_slot         Slot number for the device's private key. This must be the
-                                    same slot used to generate the public key included in the
-                                    device's certificate.
-    challenge                       Challenge to generate the response for. Must be 32 bytes.
-    response                        Response will be returned in this buffer. 64 bytes.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_max_cert_size()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_max_cert_size ( cert_def,
 max_cert_size 
)
-
-
Return the maximum possible certificate size in bytes for a given
-cert def. Certificate can be variable size, so this gives an
-appropriate buffer size when reading the certificates.
-
-Args:
-    cert_def       Certificate definition to find a max size for.
-                   Expects atcacert_def_t.
-    max_cert_size  Maximum certificate size will be returned here in bytes.
-                   Expects AtcaReference.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_read_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_read_cert ( cert_def,
 ca_public_key,
 cert,
 cert_size 
)
-
-
Reads the certificate specified by the certificate definition from the
-ATECC508A device.
-This process involves reading the dynamic cert data from the device and combining it
-with the template found in the certificate definition.
-
-Args:
-    cert_def                Certificate definition describing where to find the dynamic
-                            certificate information on the device and how to incorporate it
-                            into the template. Expects atcacert_def_t.
-    ca_public_key           The ECC P256 public key of the certificate authority that signed
-                            this certificate. Formatted as the 32 byte X and Y integers
-                            concatenated together (64 bytes total). Set to NULL if the
-                            authority key id is not needed, set properly in the cert_def
-                            template, or stored on the device as specifed in the
-                            cert_def cert_elements.
-    cert                    Buffer to received the certificate. Expects bytearray.
-    cert_size               As input, the size of the cert buffer in bytes.
-                            As output, the size of the certificate returned in cert in bytes.
-                            Expects AtcaReference.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ atcacert_write_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atcacert.atcacert_write_cert ( cert_def,
 cert,
 cert_size 
)
-
-
Take a full certificate and write it to the ATECC508A device according to the
-certificate definition.
-
-Args:
-    cert_def                Certificate definition describing where the dynamic certificate
-                            information is and how to store it on the device.
-                            Expects atcacert_def_t.
-    cert                    Full certificate to be stored.
-    cert_size               Size of the full certificate in bytes.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
-
-
- - - - diff --git a/a01453.js b/a01453.js deleted file mode 100644 index 868184980..000000000 --- a/a01453.js +++ /dev/null @@ -1,29 +0,0 @@ -var a01453 = -[ - [ "atcacert_cert_element_t", "a02216.html", null ], - [ "atcacert_cert_loc_t", "a02212.html", null ], - [ "atcacert_cert_sn_src_t", "a02180.html", null ], - [ "atcacert_cert_type_t", "a02176.html", null ], - [ "atcacert_comp_data_t", "a02204.html", null ], - [ "atcacert_date_format_t", "a02192.html", null ], - [ "atcacert_def_t", "a02220.html", null ], - [ "atcacert_device_loc_t", "a02208.html", null ], - [ "atcacert_device_zone_t", "a02184.html", null ], - [ "atcacert_std_cert_element_t", "a02196.html", null ], - [ "atcacert_tm_utc_t", "a02224.html", null ], - [ "atcacert_transform_t", "a02188.html", null ], - [ "CertStatus", "a02200.html", null ], - [ "_atcacert_convert_bytes", "a01453.html#aa9c8b1588cae90a37ef827d71e4ae909", null ], - [ "_atcacert_convert_enum", "a01453.html#acf013c955f2fd024a8669085dadbd3ba", null ], - [ "atcacert_create_csr", "a01453.html#a453696e86822c980d8e5b9e6a27eb861", null ], - [ "atcacert_create_csr_pem", "a01453.html#a6c23b4916b8fa6dc8aa56b45f558d870", null ], - [ "atcacert_date_dec", "a01453.html#a7e05b319688a07bbfeee23895341303e", null ], - [ "atcacert_date_dec_compcert", "a01453.html#a7910146d6e2097e9fb075a2bf60d1b25", null ], - [ "atcacert_date_enc", "a01453.html#a23ff0ccfc75d564fc9f6200ef8cff5fb", null ], - [ "atcacert_date_enc_compcert", "a01453.html#a82bd7bbea46866cb644016ea7faff329", null ], - [ "atcacert_date_get_max_date", "a01453.html#a0ffefee23107bcbbadef2508ccaaba4f", null ], - [ "atcacert_get_response", "a01453.html#a9c3717acbb392ceed968c1172400e6dd", null ], - [ "atcacert_max_cert_size", "a01453.html#a3b6192388c29b0efb1968d6b44efd712", null ], - [ "atcacert_read_cert", "a01453.html#a4fe33f1da468796b39c80a34e12411fb", null ], - [ "atcacert_write_cert", "a01453.html#a5c4d1755dfd9a2b378cd45f14de1f1ee", null ] -]; \ No newline at end of file diff --git a/a01454.html b/a01454.html deleted file mode 100644 index 99d528e7d..000000000 --- a/a01454.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcaenum Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcaenum Namespace Reference
-
-
- - - - -

-Data Structures

class  AtcaEnum
 
-

Detailed Description

-
Enum Extension for improved comparisons
-
-
- - - - diff --git a/a01454.js b/a01454.js deleted file mode 100644 index b447266bf..000000000 --- a/a01454.js +++ /dev/null @@ -1,4 +0,0 @@ -var a01454 = -[ - [ "AtcaEnum", "a02228.html", null ] -]; \ No newline at end of file diff --git a/a01455.html b/a01455.html deleted file mode 100644 index 14cc6ce8e..000000000 --- a/a01455.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atjwt Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atjwt Namespace Reference
-
-
- - - - - - - - -

-Data Structures

class  HwEcAlgorithm
 
class  HwHmacAlgorithm
 
class  PyJWT
 
- - - -

-Variables

try :
 
-

Detailed Description

-
JWT: Extension to the jwt module with hardware based security
-
-
- - - - diff --git a/a01455.js b/a01455.js deleted file mode 100644 index fb89c87b9..000000000 --- a/a01455.js +++ /dev/null @@ -1,6 +0,0 @@ -var a01455 = -[ - [ "HwEcAlgorithm", "a02232.html", "a02232" ], - [ "HwHmacAlgorithm", "a02236.html", "a02236" ], - [ "PyJWT", "a02240.html", null ] -]; \ No newline at end of file diff --git a/a01456.html b/a01456.html deleted file mode 100644 index a7a952645..000000000 --- a/a01456.html +++ /dev/null @@ -1,153 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Structures

class  AesEnable
 
class  Atecc508aConfig
 
class  Atecc608Config
 
class  Atsha204aConfig
 
class  ChipMode508
 
class  ChipMode608
 
class  ChipOptions
 
class  Counter204
 
class  CountMatch
 
class  I2cEnable
 
class  KeyConfig
 
class  SecureBoot
 
class  SlotConfig
 
class  UseLock
 
class  VolatileKeyPermission
 
class  X509Format
 
-

Detailed Description

-
Cryptoauthlib Device Configuration
-
-
- - - - diff --git a/a01456.js b/a01456.js deleted file mode 100644 index 364083f94..000000000 --- a/a01456.js +++ /dev/null @@ -1,19 +0,0 @@ -var a01456 = -[ - [ "AesEnable", "a02244.html", null ], - [ "Atecc508aConfig", "a02300.html", null ], - [ "Atecc608Config", "a02304.html", null ], - [ "Atsha204aConfig", "a02296.html", null ], - [ "ChipMode508", "a02256.html", null ], - [ "ChipMode608", "a02260.html", null ], - [ "ChipOptions", "a02284.html", null ], - [ "Counter204", "a02264.html", null ], - [ "CountMatch", "a02252.html", null ], - [ "I2cEnable", "a02248.html", null ], - [ "KeyConfig", "a02292.html", null ], - [ "SecureBoot", "a02280.html", null ], - [ "SlotConfig", "a02268.html", null ], - [ "UseLock", "a02272.html", null ], - [ "VolatileKeyPermission", "a02276.html", null ], - [ "X509Format", "a02288.html", null ] -]; \ No newline at end of file diff --git a/a01457.html b/a01457.html deleted file mode 100644 index cc95de4e9..000000000 --- a/a01457.html +++ /dev/null @@ -1,193 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.exceptions Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Structures

class  AssertionFailure
 
class  BadArgumentError
 
class  BadCrcError
 
class  BadOpcodeError
 
class  CheckmacVerifyFailedError
 
class  CommunicationError
 
class  ConfigZoneLockedError
 
class  CrcError
 
class  CryptoError
 
class  DataZoneLockedError
 
class  EccFaultError
 
class  ExecutionError
 
class  FunctionError
 
class  GenericError
 
class  HealthTestError
 
class  InvalidIdentifierError
 
class  InvalidSizeError
 
class  LibraryLoadError
 
class  LibraryMemoryError
 
class  LibraryNotInitialized
 
class  NoDevicesFoundError
 
class  NoResponseError
 
class  NoUseFlagError
 
class  ParityError
 
class  ParseError
 
class  ReceiveError
 
class  ReceiveTimeoutError
 
class  ResyncWithWakeupError
 
class  StatusUnknownError
 
class  TimeOutError
 
class  TransmissionError
 
class  TransmissionTimeoutError
 
class  UnimplementedError
 
class  UnsupportedInterface
 
class  WakeFailedError
 
class  ZoneNotLockedError
 
-

Detailed Description

-
Cryptoauthlib Exceptions
-
-
- - - - diff --git a/a01457.js b/a01457.js deleted file mode 100644 index 0a0b3ffbc..000000000 --- a/a01457.js +++ /dev/null @@ -1,39 +0,0 @@ -var a01457 = -[ - [ "AssertionFailure", "a02416.html", null ], - [ "BadArgumentError", "a02356.html", null ], - [ "BadCrcError", "a02368.html", null ], - [ "BadOpcodeError", "a02404.html", null ], - [ "CheckmacVerifyFailedError", "a02328.html", null ], - [ "CommunicationError", "a02396.html", null ], - [ "ConfigZoneLockedError", "a02316.html", null ], - [ "CrcError", "a02336.html", null ], - [ "CryptoError", "a02308.html", null ], - [ "DataZoneLockedError", "a02320.html", null ], - [ "EccFaultError", "a02344.html", null ], - [ "ExecutionError", "a02408.html", null ], - [ "FunctionError", "a02348.html", null ], - [ "GenericError", "a02352.html", null ], - [ "HealthTestError", "a02432.html", null ], - [ "InvalidIdentifierError", "a02360.html", null ], - [ "InvalidSizeError", "a02364.html", null ], - [ "LibraryLoadError", "a02312.html", null ], - [ "LibraryMemoryError", "a02436.html", null ], - [ "LibraryNotInitialized", "a02444.html", null ], - [ "NoDevicesFoundError", "a02428.html", null ], - [ "NoResponseError", "a02376.html", null ], - [ "NoUseFlagError", "a02440.html", null ], - [ "ParityError", "a02384.html", null ], - [ "ParseError", "a02332.html", null ], - [ "ReceiveError", "a02372.html", null ], - [ "ReceiveTimeoutError", "a02392.html", null ], - [ "ResyncWithWakeupError", "a02380.html", null ], - [ "StatusUnknownError", "a02340.html", null ], - [ "TimeOutError", "a02400.html", null ], - [ "TransmissionError", "a02420.html", null ], - [ "TransmissionTimeoutError", "a02388.html", null ], - [ "UnimplementedError", "a02412.html", null ], - [ "UnsupportedInterface", "a02448.html", null ], - [ "WakeFailedError", "a02324.html", null ], - [ "ZoneNotLockedError", "a02424.html", null ] -]; \ No newline at end of file diff --git a/a01458.html b/a01458.html deleted file mode 100644 index 0e816d0d4..000000000 --- a/a01458.html +++ /dev/null @@ -1,294 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Structures

class  _ATCACUSTOM
 
class  _ATCAHID
 
class  _ATCAI2C
 
class  _ATCAIfaceParams
 
class  _ATCAKIT
 
class  _ATCASPI
 
class  _ATCASWI
 
class  _ATCAUART
 
class  _U_Address
 
class  ATCADeviceType
 
class  ATCAIfaceCfg
 
class  ATCAIfaceType
 
class  ATCAKitType
 
- - - - - - - - - - - - - - - -

-Functions

def _iface_load_default_config (name)
 
def cfg_ateccx08a_i2c_default ()
 
def cfg_ateccx08a_swi_default ()
 
def cfg_ateccx08a_kithid_default ()
 
def cfg_atsha20xa_i2c_default ()
 
def cfg_atsha20xa_swi_default ()
 
def cfg_atsha20xa_kithid_default ()
 
-

Detailed Description

-
Interface Configuration
-

Function Documentation

- -

◆ _iface_load_default_config()

- -
-
- - - - - -
- - - - - - - - -
def cryptoauthlib.iface._iface_load_default_config ( name)
-
-protected
-
-
"Attempt to load the default configuration structure from the library by name
-
-
- -

◆ cfg_ateccx08a_i2c_default()

- -
-
- - - - - - - -
def cryptoauthlib.iface.cfg_ateccx08a_i2c_default ()
-
-
Default configuration for an ECCx08A device on the first logical I2C bus
-
-
- -

◆ cfg_ateccx08a_kithid_default()

- -
-
- - - - - - - -
def cryptoauthlib.iface.cfg_ateccx08a_kithid_default ()
-
-
Default configuration for Kit protocol over a HID interface
-
-
- -

◆ cfg_ateccx08a_swi_default()

- -
-
- - - - - - - -
def cryptoauthlib.iface.cfg_ateccx08a_swi_default ()
-
-
Default configuration for an ECCx08A device on the logical SWI bus over UART
-
-
- -

◆ cfg_atsha20xa_i2c_default()

- -
-
- - - - - - - -
def cryptoauthlib.iface.cfg_atsha20xa_i2c_default ()
-
-
Default configuration for a SHA204A device on the first logical I2C bus
-
-
- -

◆ cfg_atsha20xa_kithid_default()

- -
-
- - - - - - - -
def cryptoauthlib.iface.cfg_atsha20xa_kithid_default ()
-
-
Default configuration for Kit protocol over a HID interface for SHA204
-
-
- -

◆ cfg_atsha20xa_swi_default()

- -
-
- - - - - - - -
def cryptoauthlib.iface.cfg_atsha20xa_swi_default ()
-
-
Default configuration for an SHA204A device on the logical SWI bus over UART
-
-
-
-
- - - - diff --git a/a01458.js b/a01458.js deleted file mode 100644 index 34dc189a9..000000000 --- a/a01458.js +++ /dev/null @@ -1,23 +0,0 @@ -var a01458 = -[ - [ "_ATCACUSTOM", "a02492.html", null ], - [ "_ATCAHID", "a02484.html", null ], - [ "_ATCAI2C", "a02468.html", null ], - [ "_ATCAIfaceParams", "a02496.html", null ], - [ "_ATCAKIT", "a02488.html", null ], - [ "_ATCASPI", "a02476.html", null ], - [ "_ATCASWI", "a02472.html", null ], - [ "_ATCAUART", "a02480.html", null ], - [ "_U_Address", "a02464.html", null ], - [ "ATCADeviceType", "a02460.html", null ], - [ "ATCAIfaceCfg", "a02500.html", null ], - [ "ATCAIfaceType", "a02452.html", null ], - [ "ATCAKitType", "a02456.html", null ], - [ "_iface_load_default_config", "a01458.html#a3f0aeae05c5278420c02156257845b1d", null ], - [ "cfg_ateccx08a_i2c_default", "a01458.html#afe3491a94655b07c2608d3451e59d606", null ], - [ "cfg_ateccx08a_kithid_default", "a01458.html#a88737f422c86c2246a698fd64d59db1a", null ], - [ "cfg_ateccx08a_swi_default", "a01458.html#a64fa8e408c7c7abc0999d5b74825e69d", null ], - [ "cfg_atsha20xa_i2c_default", "a01458.html#acc3d4402aa912d4f90e3298a7e8de20c", null ], - [ "cfg_atsha20xa_kithid_default", "a01458.html#a1b929d7e15620e9c352c3cf1e75e2a22", null ], - [ "cfg_atsha20xa_swi_default", "a01458.html#a4638d28e57304b76ce9f50077e6b3b47", null ] -]; \ No newline at end of file diff --git a/a01459.html b/a01459.html deleted file mode 100644 index e7007e7e8..000000000 --- a/a01459.html +++ /dev/null @@ -1,1120 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.library Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.library Namespace Reference
-
-
- - - - - - - - - - -

-Data Structures

class  _CtypeIterator
 
class  AtcaReference
 
class  AtcaStructure
 
class  AtcaUnion
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

-def indent (lines, insert)
 
def _force_local_library ()
 
def load_cryptoauthlib (lib=None)
 
def get_cryptoauthlib ()
 
def get_device_name (revision)
 
def get_device_name_with_device_id (revision)
 
def get_device_type_id (name)
 
def get_size_by_name (name)
 
def get_ctype_by_name (name)
 
def get_ctype_structure_instance (structure, value)
 
def get_ctype_array_instance (array, value)
 
def _get_field_definition (obj, name)
 
def _def_to_field (f_type, f_size=None)
 
def _convert_pointer_to_list (p, length)
 
def _get_attribute_from_ctypes (obj, obj_type, length=None, *args)
 
def _check_type_rationality (cls)
 
def _array_to_code (obj, name=None, parent=None, **kwargs)
 
def _object_definition_code (obj, name=None, parent=None, parent_name=None, anon=None, type_info=None, check_names={}, **kwargs)
 
-def _union_to_code (obj, name=None, parent=None, anon=None, entry=None, parent_name=None, type_info=None, **kwargs)
 
def _structure_to_code (obj, name=None, parent=None, type_info=None, parent_name=None, **kwargs)
 
def _obj_to_code (obj, name, parent=None, anon=None, parent_name=None, **kwargs)
 
def _pointer_to_code (obj, name=None, parent=None, parent_name=None, check_names={}, skip_references=[], **kwargs)
 
def _is_pointer (obj, type_info=None, **kwargs)
 
def _to_code (obj, name=None, **kwargs)
 
def _structure_to_string (item, int level=0)
 
def _ctype_from_definition (cls)
 
def ctypes_to_bytes (obj)
 
-def create_byte_buffer (init_or_size)
 
- - - - - - - - - - - -

-Variables

try :
 
-dict ATCA_NAMES = {'i2c': 'i2c', 'hid': 'kithid', 'sha': 'sha204', 'ecc': 'eccx08'}
 
-None _CRYPTO_LIB = None
 
-dict _CTYPES_BY_SIZE = {1: c_uint8, 2: c_uint16, 4:c_uint32}
 
_fields_
 
-

Detailed Description

-
Cryptoauthlib Library Management
-

Function Documentation

- -

◆ _array_to_code()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._array_to_code ( obj,
 name = None,
 parent = None,
** kwargs 
)
-
-protected
-
-
Convert an array like item from a ctypes structure into a C language formatted
-string
-
-
-
- -

◆ _check_type_rationality()

- -
-
- - - - - -
- - - - - - - - -
def cryptoauthlib.library._check_type_rationality ( cls)
-
-protected
-
-
This checks the structure or union size against the constants that are stored in the library
-during compilation. This is not an absolute guarentee that alignment is completely correct
-but it will catch most cases of incompability between the compiled library that is installed
-and the python module
-
-
-
- -

◆ _convert_pointer_to_list()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._convert_pointer_to_list ( p,
 length 
)
-
-protected
-
-
Pointer types can be frustrating to interact with generally when processing data in python
-so this converts them into types that are iterable and bounded
-
-
-
- -

◆ _ctype_from_definition()

- -
-
- - - - - -
- - - - - - - - -
def cryptoauthlib.library._ctype_from_definition ( cls)
-
-protected
-
-
Extends the ctypes structure and union types to add a new attribute _def_ which is a dictionary
-of field attributes. This extends functionality by quite a bit by supporting additional types
-and field linkages
-
-
-
- -

◆ _def_to_field()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._def_to_field ( f_type,
 f_size = None 
)
-
-protected
-
-
Helper function to convert an entry in the _def_ dictionary to the 
-tuple required for a _field_ entry
-
-
-
- -

◆ _force_local_library()

- -
-
- - - - - -
- - - - - - - -
def cryptoauthlib.library._force_local_library ()
-
-protected
-
-
In some environments loading seems to fail under all circumstances unless
-brute forcing it.
-
-
-
- -

◆ _get_attribute_from_ctypes()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._get_attribute_from_ctypes ( obj,
 obj_type,
 length = None,
args 
)
-
-protected
-
-
Helper function that is used by AtcaStructure and AtcaUnion to intercept attribute access
-to those objects and convert the resulting values into easier to use python objects based
-on the configuration of the structure/union
-
-
-
- -

◆ _get_field_definition()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._get_field_definition ( obj,
 name 
)
-
-protected
-
-
Get meta information about the ctypes structure/union by accessing
-the field description attributes of the class that were provided
-as part of the ctype structure/union definition
-
-
-
- -

◆ _is_pointer()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._is_pointer ( obj,
 type_info = None,
** kwargs 
)
-
-protected
-
-
Checks to see if object looks like a pointer
-
-
-
- -

◆ _obj_to_code()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._obj_to_code ( obj,
 name,
 parent = None,
 anon = None,
 parent_name = None,
** kwargs 
)
-
-protected
-
-
Convert python/ctypes object into a C language representation
-
-
-
- -

◆ _object_definition_code()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._object_definition_code ( obj,
 name = None,
 parent = None,
 parent_name = None,
 anon = None,
 type_info = None,
 check_names = {},
** kwargs 
)
-
-protected
-
-
Emits the first half of the assignment of this object
-
-
-
- -

◆ _pointer_to_code()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._pointer_to_code ( obj,
 name = None,
 parent = None,
 parent_name = None,
 check_names = {},
 skip_references = [],
** kwargs 
)
-
-protected
-
-
Convert the pointer into a representative object by creating a definition in the prepend
-area
-
-
-
- -

◆ _structure_to_code()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._structure_to_code ( obj,
 name = None,
 parent = None,
 type_info = None,
 parent_name = None,
** kwargs 
)
-
-protected
-
-
Emits a string with a C language representation of the structure(s) following pointers the
-best that is can
-
-
-
- -

◆ _structure_to_string()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._structure_to_string ( item,
int  level = 0 
)
-
-protected
-
-
Emits a readable string of the structure elements coverting types and following pointers and arrays
-the best that is can
-
-
-
- -

◆ _to_code()

- -
-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library._to_code ( obj,
 name = None,
** kwargs 
)
-
-protected
-
-
Map object types to the proper renderer function by catching pointer like objects first
-
-Returns: (append, prepend)
-
-
-
- -

◆ ctypes_to_bytes()

- -
-
- - - - - - - - -
def cryptoauthlib.library.ctypes_to_bytes ( obj)
-
-
Convert a ctypes structure/array into bytes. This is for python2 compatibility
-
-
-
- -

◆ get_cryptoauthlib()

- -
-
- - - - - - - -
def cryptoauthlib.library.get_cryptoauthlib ()
-
-
This is a helper function for the other python files in this module to use the loaded library
-
-
-
- -

◆ get_ctype_array_instance()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library.get_ctype_array_instance ( array,
 value 
)
-
-
Internal Helper Function: Convert python list into ctype array
-:param value: Value to convert
-:param array: Conversion Class (resulting type)
-:return:
-
-
-
- -

◆ get_ctype_by_name()

- -
-
- - - - - - - - -
def cryptoauthlib.library.get_ctype_by_name ( name)
-
-
For known (atca_utils_sizes.c) types that are custom to the library retrieve the size
-
-
-
- -

◆ get_ctype_structure_instance()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.library.get_ctype_structure_instance ( structure,
 value 
)
-
-
Internal Helper Function:  Convert a value into the correct ctypes structure for a given field
-:param value: Value to convert
-:param structure: Conversion Class (resulting type)
-:return:
-
-
-
- -

◆ get_device_name()

- -
-
- - - - - - - - -
def cryptoauthlib.library.get_device_name ( revision)
-
-
Returns the device name based on the info byte array values returned by atcab_info
-
-
-
- -

◆ get_device_name_with_device_id()

- -
-
- - - - - - - - -
def cryptoauthlib.library.get_device_name_with_device_id ( revision)
-
-
Returns the device name based on the info byte array values returned by atcab_info for ECC204 family
-
-
-
- -

◆ get_device_type_id()

- -
-
- - - - - - - - -
def cryptoauthlib.library.get_device_type_id ( name)
-
-
Returns the ATCADeviceType value based on the device name
-
-
-
- -

◆ get_size_by_name()

- -
-
- - - - - - - - -
def cryptoauthlib.library.get_size_by_name ( name)
-
-
Get the size of an object in the library using the name_size api from atca_utils_sizes.c
-
-
-
- -

◆ load_cryptoauthlib()

- -
-
- - - - - - - - -
def cryptoauthlib.library.load_cryptoauthlib ( lib = None)
-
-
Load CryptoAauthLib into Python environment
-raise LibraryLoadError if cryptoauthlib library can't be loaded
-
-
-
-
-
- - - - diff --git a/a01459.js b/a01459.js deleted file mode 100644 index ba521a24e..000000000 --- a/a01459.js +++ /dev/null @@ -1,32 +0,0 @@ -var a01459 = -[ - [ "_CtypeIterator", "a02508.html", null ], - [ "AtcaReference", "a02504.html", null ], - [ "AtcaStructure", "a02516.html", "a02516" ], - [ "AtcaUnion", "a02512.html", "a02512" ], - [ "_array_to_code", "a01459.html#ac55af04b29df0650b502b9df1db36444", null ], - [ "_check_type_rationality", "a01459.html#a4b3b07664816ecd9b1e69aece27315ed", null ], - [ "_convert_pointer_to_list", "a01459.html#a2a572a1c4153428ddf599aac1054a1c5", null ], - [ "_ctype_from_definition", "a01459.html#af97b6ad66a6d4bb6a14631fa52059c0b", null ], - [ "_def_to_field", "a01459.html#af41036c1c577c3ea72112cb347ccaa7f", null ], - [ "_force_local_library", "a01459.html#a2e119a638263f674b4441439cf472810", null ], - [ "_get_attribute_from_ctypes", "a01459.html#af9181efd0fd60114f021c54a713f13af", null ], - [ "_get_field_definition", "a01459.html#a4268b8eb517ac8eb32eabcb3bbeb9e75", null ], - [ "_is_pointer", "a01459.html#a44bdab0afac36d18288aa73ad9b5d341", null ], - [ "_obj_to_code", "a01459.html#af7258b81811d05efc7fdf6152fd10907", null ], - [ "_object_definition_code", "a01459.html#a1ce7de010f8d9ae4bc2428ea26fe495f", null ], - [ "_pointer_to_code", "a01459.html#a39c2c2660f89a924cd4eef1ae7d672a5", null ], - [ "_structure_to_code", "a01459.html#af5d2460ce51e3abef1c8065695ba0b63", null ], - [ "_structure_to_string", "a01459.html#a9f3720f901ce589dcfd623721b695938", null ], - [ "_to_code", "a01459.html#a321e7a3f55577a28ad2b2ed4f2ef132c", null ], - [ "ctypes_to_bytes", "a01459.html#acafa34b913dba87fe1768f8e18cfd135", null ], - [ "get_cryptoauthlib", "a01459.html#a851038e6c6158127d7ecbd1e6580081b", null ], - [ "get_ctype_array_instance", "a01459.html#a2748ff60b5f1512fbf9f228e4c86598a", null ], - [ "get_ctype_by_name", "a01459.html#a5cc6d0583a5f0554e61e3886c5bf1785", null ], - [ "get_ctype_structure_instance", "a01459.html#a30811985170f0083009bbd5439d1bcc2", null ], - [ "get_device_name", "a01459.html#a2da0648c5d2cb3a8da467b8dfac16e8c", null ], - [ "get_device_name_with_device_id", "a01459.html#ac4f25f606f7c968b08b874dc8d75ca50", null ], - [ "get_device_type_id", "a01459.html#adaf39153cd62515d9750fdb0748dbacc", null ], - [ "get_size_by_name", "a01459.html#a7c6a46d9327a395ac4909411d937b193", null ], - [ "load_cryptoauthlib", "a01459.html#aa9a021d0bc0272e702a7de499b76683c", null ] -]; \ No newline at end of file diff --git a/a01460.html b/a01460.html deleted file mode 100644 index be097d628..000000000 --- a/a01460.html +++ /dev/null @@ -1,654 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.sha206_api Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.sha206_api Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Functions

def sha206a_generate_derive_key (parent_key, derived_key, param1, param2)
 
def sha206a_generate_challenge_response_pair (key, challenge, response)
 
def sha206a_authenticate (challenge, expected_response, is_verified)
 
def sha206a_write_data_store (slot, data, block, offset, length, lock_after_write)
 
def sha206a_read_data_store (slot, data, offset, length)
 
def sha206a_get_data_store_lock_status (slot, is_locked)
 
def sha206a_get_dk_update_count (dk_update_count)
 
def sha206a_get_pk_useflag_count (pk_avail_count)
 
def sha206a_get_dk_useflag_count (dk_avail_count)
 
def sha206a_check_pk_useflag_validity (is_consumed)
 
def sha206a_check_dk_useflag_validity (is_consumed)
 
def sha206a_verify_device_consumption (is_consumed)
 
def sha206a_diversify_parent_key (parent_key, diversified_key)
 
-

Detailed Description

-
SHA206 API: classes and functions for interacting with SHA206A device
-

Function Documentation

- -

◆ sha206a_authenticate()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_authenticate ( challenge,
 expected_response,
 is_verified 
)
-
-
verifies the challenge and provided response using key in device
-
-Args:
-    challenge           Challenge to be used in the response calculations
-                        (Expects bytearray of size 32)
-
-    expected_response   Expected response from the device
-                        (Expects bytearray of size 32)
-
-    is_authenticated    result of expected of response and calcualted response
-                        (AtcaReference expected)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_check_dk_useflag_validity()

- -
-
- - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_check_dk_useflag_validity ( is_consumed)
-
-
verifies Derived Key use flags for consumption
-
-Args:
-    is_consumed            indicates if derived key is available for consumption
-                           (Expected AtcaReference)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_check_pk_useflag_validity()

- -
-
- - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_check_pk_useflag_validity ( is_consumed)
-
-
verifies Parent Key use flags for consumption
-
-Args:
-    is_consumed            indicates if parent key is available for consumption
-                           (Expected AtcaReference)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_diversify_parent_key()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_diversify_parent_key ( parent_key,
 diversified_key 
)
-
-
Computes the diversified key based on the parent key provided and device serial number
-
-Args:
-    parent_key             parent key to be diversified (Expected bytearray of size 32)
-
-    diversified_key        output diversified key is returned here
-                           (Expected bytearray of size 32)
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_generate_challenge_response_pair()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_generate_challenge_response_pair ( key,
 challenge,
 response 
)
-
-
Generates the response based on Key and Challenge provided
-
-Args:
-    key             input data contains device's key
-                    (Expects bytearray of size 32)
-
-    challenge       input data to be used in challenge response calculation
-                    (Expects bytearray of size 32)
-
-    response        output response is returned here
-                    (Expects bytearray of size 32)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_generate_derive_key()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_generate_derive_key ( parent_key,
 derived_key,
 param1,
 param2 
)
-
-
Generates the derived key based on the parent key and other parameters provided
-
-Args:
-    parent_key      input data contains device's parent key
-                    (Expects bytearray of size 32)
-
-    derived key     output derived key is returned here
-                    (Expects bytearray of size 32)
-
-    param1          input data to be used in derive key calculation (int)
-
-    param2          input data to be used in derive key calculation (int)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_get_data_store_lock_status()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_get_data_store_lock_status ( slot,
 is_locked 
)
-
-
Returns the lock status of the given data store
-
-Args:
-    slot               Slot number of the data store (int)
-
-    is_locked          lock status of the data store slot
-                       (Expected AtcaReference)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_get_dk_update_count()

- -
-
- - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_get_dk_update_count ( dk_update_count)
-
-
Read Derived Key slot update count. It will be wraps around 256
-
-Args:
-    dk_update_count       returns number of times the slot has been
-                          updated with derived key (Expected AtcaReference)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_get_dk_useflag_count()

- -
-
- - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_get_dk_useflag_count ( dk_avail_count)
-
-
calculates available Derived Key use counts
-
-Args:
-    dk_avail_count        counts available bit's as 1 (int)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_get_pk_useflag_count()

- -
-
- - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_get_pk_useflag_count ( pk_avail_count)
-
-
calculates available Parent Key use counts
-
-Args:
-    pk_avail_count        counts available bit's as 1 (int)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_read_data_store()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_read_data_store ( slot,
 data,
 offset,
 length 
)
-
-
Read the data stored in Data store
-
-Args:
-    slot               Slot number to read from (int)
-
-    data               Pointer that holds the data
-                       (Expected bytearray of size 32)
-
-    offset             Byte offset within the zone to read from. (int)
-
-    length             data length (int)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_verify_device_consumption()

- -
-
- - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_verify_device_consumption ( is_consumed)
-
-
verifies the device is fully consumed or not based on Parent and Derived Key use flags.
-
-Args:
-    is_consumed            result of device consumption is returned here
-                           (Expected AtcaReference)
-
-Returns:
-    Status Code
-
-
-
- -

◆ sha206a_write_data_store()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.sha206_api.sha206a_write_data_store ( slot,
 data,
 block,
 offset,
 length,
 lock_after_write 
)
-
-
Update the data store slot with user data and lock it if necessary
-
-Args:
-    slot               Slot number to be written with data (int)
-
-    data               Pointer that holds the data
-                       (Expected bytearray of size 32)
-
-    block              32-byte block to write (int)
-
-    offset             4-byte word within the specified block to write to. If
-                       performing a 32-byte write, this should be 0. (int)
-
-    length             data length (int)
-
-    lock_after_write   set 1 to lock slot after write, otherwise 0
-                       (Expected bool/int)
-
-Returns:
-    Status Code
-
-
-
-
-
- - - - diff --git a/a01461.html b/a01461.html deleted file mode 100644 index f2b1996ed..000000000 --- a/a01461.html +++ /dev/null @@ -1,172 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.status Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.status Namespace Reference
-
-
- - - - -

-Data Structures

class  Status
 
- - - -

-Functions

def check_status (status, *args, **kwargs)
 
- - - -

-Variables

-dict STATUS_EXCEPTION_MAP
 
-

Detailed Description

-
Status codes and status to exception conversions.
-

Function Documentation

- -

◆ check_status()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.status.check_status ( status,
args,
** kwargs 
)
-
-
Look up the status return code from an API call and raise the exception that matches
-
-
-
-
-
- - - - diff --git a/a01461.js b/a01461.js deleted file mode 100644 index 4ef4d2aca..000000000 --- a/a01461.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01461 = -[ - [ "Status", "a02520.html", null ], - [ "check_status", "a01461.html#a79e412f95dfbdb782c011ac214270aa3", null ] -]; \ No newline at end of file diff --git a/a01462.html b/a01462.html deleted file mode 100644 index f507f69be..000000000 --- a/a01462.html +++ /dev/null @@ -1,480 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.tng Namespace Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.tng Namespace Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - -

-Functions

def tng_get_device_pubkey (public_key)
 
def tng_atcacert_max_device_cert_size (max_cert_size)
 
def tng_atcacert_read_device_cert (cert, cert_size, signer_cert=None)
 
def tng_atcacert_device_public_key (public_key, cert=None)
 
def tng_atcacert_max_signer_cert_size (max_cert_size)
 
def tng_atcacert_read_signer_cert (cert, cert_size)
 
def tng_atcacert_signer_public_key (public_key, cert=None)
 
def tng_atcacert_root_cert_size (cert_size)
 
def tng_atcacert_root_cert (cert, cert_size)
 
def tng_atcacert_root_public_key (public_key)
 
-

Detailed Description

-
TNG: classes and functions for interacting with TNG devices
-

Function Documentation

- -

◆ tng_atcacert_device_public_key()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_device_public_key ( public_key,
 cert = None 
)
-
-
Reads the device public key.
-
-Args:
-    public_key   Public key will be returned here. Format will be
-                 the X and Y integers in big-endian format.
-                 64 bytes for P256 curve. Expects bytearray.
-    cert         If supplied, the device public key is used from
-                 this certificate. If set to None, the device
-                 public key is read from the device. Expects bytes or None.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_max_device_cert_size()

- -
-
- - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_max_device_cert_size ( max_cert_size)
-
-
Return the maximum possible certificate size in bytes for a TNG
-device certificate. Certificate can be variable size, so this
-gives an appropriate buffer size when reading the certificate.
-
-Args:
-    max_cert_size  Maximum certificate size will be returned here
-                   in bytes. Expects AtcaReference.
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_max_signer_cert_size()

- -
-
- - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_max_signer_cert_size ( max_cert_size)
-
-
Return the maximum possible certificate size in bytes for a TNG
-signer certificate. Certificate can be variable size, so this
-gives an appropriate buffer size when reading the certificate.
-
-Args:
-    max_cert_size  Maximum certificate size will be returned here
-                   in bytes. Expects AtcaReference.
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_read_device_cert()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_read_device_cert ( cert,
 cert_size,
 signer_cert = None 
)
-
-
Reads the device certificate for a TNG device.
-
-Args:
-    cert         Buffer to received the certificate (DER format).
-                 Expects bytearray.
-    cert_size    As input, the size of the cert buffer in bytes.
-                 As output, the size of the certificate returned
-                 in cert in bytes. Expects AtcaReference.
-    signer_cert  If supplied, the signer public key is used from
-                 this certificate. If set to None, the signer
-                 public key is read from the device.
-                 Expects bytes or None.
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_read_signer_cert()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_read_signer_cert ( cert,
 cert_size 
)
-
-
Reads the signer certificate for a TNG device.
-
-Args:
-    cert         Buffer to received the certificate (DER format).
-                 Expects bytearray.
-    cert_size    As input, the size of the cert buffer in bytes.
-                 As output, the size of the certificate returned
-                 in cert in bytes. Expects AtcaReference.
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_root_cert()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_root_cert ( cert,
 cert_size 
)
-
-
Get the TNG root cert.
-
-Args:
-    cert       Buffer to received the certificate (DER format).
-               Expects bytearray.
-    cert_size  As input, the size of the cert buffer in bytes.
-               As output, the size of the certificate returned
-               in cert in bytes. Expects AtcaReference.
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_root_cert_size()

- -
-
- - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_root_cert_size ( cert_size)
-
-
Get the size of the TNG root cert.
-
-Args:
-    cert_size  Certificate size will be returned here in bytes.
-               Expects AtcaReference.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_root_public_key()

- -
-
- - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_root_public_key ( public_key)
-
-
Gets the root public key.
-
-Args:
-    public_key  Public key will be returned here. Format will be
-                the X and Y integers in big-endian format.
-                64 bytes for P256 curve. Expects bytearray.
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_atcacert_signer_public_key()

- -
-
- - - - - - - - - - - - - - - - - - -
def cryptoauthlib.tng.tng_atcacert_signer_public_key ( public_key,
 cert = None 
)
-
-
Reads the signer public key.
-
-Args:
-    public_key   Public key will be returned here. Format will be
-                 the X and Y integers in big-endian format.
-                 64 bytes for P256 curve. Expects bytearray.
-    cert         If supplied, the signer public key is used from
-                 this certificate. If set to None, the signer
-                 public key is read from the device. Expects bytes or None.
-
-Returns:
-    ATCACERT_E_SUCCESS on success, otherwise an error code.
-
-
-
- -

◆ tng_get_device_pubkey()

- -
-
- - - - - - - - -
def cryptoauthlib.tng.tng_get_device_pubkey ( public_key)
-
-
Uses GenKey command to calculate the public key from the primary
-device public key.
-
-Args:
-    public_key  Public key will be returned here. Format will be
-                the X and Y integers in big-endian format.
-                64 bytes for P256 curve. Expects bytearray.
-
-Returns:
-    ATCA_SUCCESS on success, otherwise an error code.
-
-
-
-
-
- - - - diff --git a/a01468.html b/a01468.html index 9f925ed18..08c3ab3f1 100644 --- a/a01468.html +++ b/a01468.html @@ -5,7 +5,7 @@ -CryptoAuthLib: test_device Namespace Reference +CryptoAuthLib: ATCADevice (atca_) @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,235 +98,269 @@
-
test_device Namespace Reference
+Data Structures | +Macros | +Typedefs | +Enumerations | +Functions
+
ATCADevice (atca_)
+ +

ATCADevice object - composite of command and interface objects. +More...

+ + + + +

+Data Structures

struct  atca_device
 atca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods More...
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

+Macros

+#define ATSHA204A   (0U)
 The supported Device type in Cryptoauthlib library.
 
+#define ATECC108A   (1U)
 
+#define ATECC508A   (2U)
 
+#define ATECC608A   (3U)
 
+#define ATECC608B   (3U)
 
+#define ATECC608   (3U)
 
+#define ATSHA206A   (4U)
 
+#define TA100   (0x10U)
 
+#define TA101   (0x11U)
 
+#define ECC204   (0x20U)
 
+#define TA010   (0x21U)
 
+#define ECC206   (0x22U)
 
+#define RNG90   (0x23U)
 
+#define SHA104   (0x24U)
 
+#define SHA105   (0x25U)
 
+#define SHA106   (0x26U)
 
+#define ATCA_DEV_UNKNOWN   (0x7EU)
 
+#define ATCA_DEV_INVALID   (0x7FU)
 
+ + + + + + + + +

+Typedefs

+typedef void(* ctx_cb) (void *ctx)
 Callback function to clean up the session context.
 
+typedef struct atca_deviceATCADevice
 
+typedef uint8_t ATCADeviceType
 
+ + + + +

+Enumerations

enum  ATCADeviceState { ATCA_DEVICE_STATE_UNKNOWN = 0 +, ATCA_DEVICE_STATE_SLEEP +, ATCA_DEVICE_STATE_IDLE +, ATCA_DEVICE_STATE_ACTIVE + }
 ATCADeviceState says about device state.
 
- - - - - - - - -

Functions

-def test_device_config_size (config, size)
 
-def test_device_config_from_def (config, definition, vector)
 
-def test_device_config_from_vector (config, vector)
 
-def test_device_serial_number_from_def (config, definition, vector)
 
- - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +

-Variables

-bytearray ATSHA204A_SER_NUM_VECTOR = bytearray.fromhex('01 23 6E AA CE FE 0B 8D EE')
 
bytearray ATSHA204A_DEVICE_CONFIG_VECTOR
 
dict ATSHA204A_DEVICE_CONFIG
 
-bytearray ATECC508A_SER_NUM_VECTOR = bytearray.fromhex('01 23 72 E8 B9 63 B2 D3 EE')
 
bytearray ATECC508A_DEVICE_CONFIG_VECTOR
 
dict ATECC508A_DEVICE_CONFIG
 
-bytearray ATECC608_SER_NUM_VECTOR = bytearray.fromhex('01 23 72 E8 B9 63 B2 D3 EE')
 
bytearray ATECC608_DEVICE_CONFIG_VECTOR
 
dict ATECC608_DEVICE_CONFIG
 
id
 
ATCADevice newATCADevice (ATCAIfaceCfg *cfg)
 constructor for a Microchip CryptoAuth device
 
void deleteATCADevice (ATCADevice *ca_dev)
 destructor for a device NULLs reference after object is freed
 
ATCA_STATUS initATCADevice (ATCAIfaceCfg *cfg, ATCADevice ca_dev)
 Initializer for an Microchip CryptoAuth device.
 
ATCAIface atGetIFace (ATCADevice dev)
 returns a reference to the ATCAIface interface object for the device
 
ATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
 Release any resources associated with the device.
 

Detailed Description

-
Device.py tests. Covers the configuration structures
-

Variable Documentation

- -

◆ ATECC508A_DEVICE_CONFIG

+

ATCADevice object - composite of command and interface objects.

+

Function Documentation

+ +

◆ atGetIFace()

- + + + + +
dict test_device.ATECC508A_DEVICE_CONFIGATCAIface atGetIFace (ATCADevice dev)
-Initial value:
1= {
-
2 'SN03': [0x01, 0x23, 0x72, 0xE8],
-
3 'RevNum': [0x00, 0x00, 0x60, 0x02],
-
4 'SN48': [0xB9, 0x63, 0xB2, 0xD3, 0xEE],
-
5 'I2C_Enable': 0x2D,
-
6 'I2C_Address': 0xB0,
-
7 'OTPmode': 0x55,
-
8 'SlotConfig': [0x208F, 0x44C4, 0x2087, 0x2087,
-
9 0x0F8F, 0x36C4, 0x0F9F, 0x2082,
-
10 0x0F0F, 0x44C4, 0x0F0F, 0x0F0F,
-
11 0x0F0F, 0x0F0F, 0x0F0F, 0x0F0F],
-
12 'Counter0': [0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00],
-
13 'Counter1': [0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00],
-
14 'LastKeyUse': [0xFF, 0xFF, 0xFF, 0xFF,
-
15 0xFF, 0xFF, 0xFF, 0xFF,
-
16 0xFF, 0xFF, 0xFF, 0xFF,
-
17 0xFF, 0xFF, 0xFF, 0xFF],
-
18 'LockValue': 0x55,
-
19 'LockConfig': 0x55,
-
20 'SlotLocked': 0xFFFF,
-
21 'KeyConfig': [0x0033, 0x001C, 0x0013, 0x0013,
-
22 0x007C, 0x001C, 0x003C, 0x0033,
-
23 0x003C, 0x003C, 0x003C, 0x0030,
-
24 0x003C, 0x003C, 0x003C, 0x0030]
-
25}
-
+ +

returns a reference to the ATCAIface interface object for the device

+
Parameters
+ + +
[in]devreference to a device
+
+
+
Returns
reference to the ATCAIface object for the device
+
- -

◆ ATECC508A_DEVICE_CONFIG_VECTOR

+ +

◆ deleteATCADevice()

- + + + + +
bytearray test_device.ATECC508A_DEVICE_CONFIG_VECTORvoid deleteATCADevice (ATCADeviceca_dev)
-Initial value:
1= bytearray.fromhex(
-
2 '01 23 72 E8 00 00 60 02 B9 63 B2 D3 EE 00 2D 00'
-
3 'B0 00 55 00 8F 20 C4 44 87 20 87 20 8F 0F C4 36'
-
4 '9F 0F 82 20 0F 0F C4 44 0F 0F 0F 0F 0F 0F 0F 0F'
-
5 '0F 0F 0F 0F FF FF FF FF 00 00 00 00 FF FF FF FF'
-
6 '00 00 00 00 FF FF FF FF FF FF FF FF FF FF FF FF'
-
7 'FF FF FF FF 00 00 55 55 FF FF 00 00 00 00 00 00'
-
8 '33 00 1C 00 13 00 13 00 7C 00 1C 00 3C 00 33 00'
-
9 '3C 00 3C 00 3C 00 30 00 3C 00 3C 00 3C 00 30 00')
-
+ +

destructor for a device NULLs reference after object is freed

+
Parameters
+ + +
[in]ca_devpointer to a reference to a device
+
+
+
- -

◆ ATECC608_DEVICE_CONFIG

+ +

◆ initATCADevice()

- + + + + + + + + + + -
dict test_device.ATECC608_DEVICE_CONFIGATCA_STATUS initATCADevice (ATCAIfaceCfgcfg,
ATCADevice ca_dev 
-
-Initial value:
1= {
-
2 'SN03': [0x01, 0x23, 0x72, 0xE8],
-
3 'RevNum': [0x00, 0x00, 0x60, 0x02],
-
4 'SN48': [0xB9, 0x63, 0xB2, 0xD3, 0xEE],
-
5 'AES_Enable': {'Enable': 1},
-
6 'I2C_Enable': 0x2D,
-
7 'I2C_Address': 0xB0,
-
8 'ChipMode': 1,
-
9 'CountMatch': 0x55,
-
10 'SlotConfig': [0x208F, 0x44C4, 0x2087, 0x2087,
-
11 0x0F8F, 0x36C4, 0x0F9F, 0x2082,
-
12 0x0F0F, 0x44C4, 0x0F0F, 0x0F0F,
-
13 0x0F0F, 0x0F0F, 0x0F0F, 0x0F0F],
-
14 'Counter0': [0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00],
-
15 'Counter1': [0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00],
-
16 'SlotLocked': 0xFFFF,
-
17 'ChipOptions': {
-
18 'IoProtectionKeyEnable': 1,
-
19 'KdfAesEnable': 1,
-
20 'IoProtectionKey': 4
-
21 },
-
22 'KeyConfig': [0x0033, 0x001C, 0x0013, 0x0013,
-
23 0x007C, 0x001C, 0x003C, 0x0033,
-
24 0x003C, 0x003C, 0x003C, 0x0030,
-
25 0x003C, 0x003C, 0x003C, 0x0030]
-
26}
-
-
-
- -

◆ ATECC608_DEVICE_CONFIG_VECTOR

- -
-
- - + + +
bytearray test_device.ATECC608_DEVICE_CONFIG_VECTOR)
-Initial value:
1= bytearray.fromhex(
-
2 '01 23 72 E8 00 00 60 02 B9 63 B2 D3 EE 01 2D 00'
-
3 'B0 00 55 01 8F 20 C4 44 87 20 87 20 8F 0F C4 36'
-
4 '9F 0F 82 20 0F 0F C4 44 0F 0F 0F 0F 0F 0F 0F 0F'
-
5 '0F 0F 0F 0F FF FF FF FF 00 00 00 00 FF FF FF FF'
-
6 '00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00'
-
7 '00 00 00 00 00 00 00 00 FF FF 06 40 00 00 00 00'
-
8 '33 00 1C 00 13 00 13 00 7C 00 1C 00 3C 00 33 00'
-
9 '3C 00 3C 00 3C 00 30 00 3C 00 3C 00 3C 00 30 00')
-
+ +

Initializer for an Microchip CryptoAuth device.

+
Parameters
+ + + +
[in]cfgpointer to an interface configuration object
[in,out]ca_devAs input, pre-allocated structure to be initialized. mCommands and mIface members should point to existing structures to be initialized.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
- -

◆ ATSHA204A_DEVICE_CONFIG

+ +

◆ newATCADevice()

- + + + + +
dict test_device.ATSHA204A_DEVICE_CONFIGATCADevice newATCADevice (ATCAIfaceCfgcfg)
-Initial value:
1= {
-
2 'SN03': [0x01, 0x23, 0x6E, 0xAA],
-
3 'RevNum': [0x00, 0x09, 0x04, 0x00],
-
4 'SN48': [0xCE, 0xFE, 0x0B, 0x8D, 0xEE],
-
5 'I2C_Enable': 0x01,
-
6 'I2C_Address': 0xC8,
-
7 'OTPmode': 0x55,
-
8 'SlotConfig': [0x808F, 0xA180, 0xE082, 0xF4C4,
-
9 0x0084, 0x85A0, 0x4086, 0x0787,
-
10 0x000F, 0x64C4, 0x7A8A, 0x8B0B,
-
11 0x4C0C, 0x4DDD, 0x42C2, 0x8FAF],
-
12 'Counter': [0xFF, 0xFF, 0xFF, 0xFF,
-
13 0xFF, 0xFF, 0xFF, 0xFF],
-
14 'LastKeyUse': [0xFF, 0xFF, 0xFF, 0xFF,
-
15 0xFF, 0xFF, 0xFF, 0xFF,
-
16 0xFF, 0xFF, 0xFF, 0xFF,
-
17 0xFF, 0xFF, 0xFF, 0xFF],
-
18 'LockValue': 0x55,
-
19 'LockConfig': 0x55
-
20}
-
+ +

constructor for a Microchip CryptoAuth device

+
Parameters
+ + +
[in]cfgInterface configuration object
+
+
+
Returns
Reference to a new ATCADevice on success. NULL on failure.
+
- -

◆ ATSHA204A_DEVICE_CONFIG_VECTOR

+ +

◆ releaseATCADevice()

- + + + + +
bytearray test_device.ATSHA204A_DEVICE_CONFIG_VECTORATCA_STATUS releaseATCADevice (ATCADevice ca_dev)
-Initial value:
1= bytearray.fromhex(
-
2 '01 23 6E AA 00 09 04 00 CE FE 0B 8D EE 00 01 00'
-
3 'C8 00 55 00 8F 80 80 A1 82 E0 C4 F4 84 00 A0 85'
-
4 '86 40 87 07 0F 00 C4 64 8A 7A 0B 8B 0C 4C DD 4D'
-
5 'C2 42 AF 8F FF 00 FF 00 FF 00 FF 00 FF 00 FF 00'
-
6 'FF 00 FF 00 FF FF FF FF FF FF FF FF FF FF FF FF'
-
7 'FF FF FF FF 00 00 55 55')
-
+ +

Release any resources associated with the device.

+
Parameters
+ + +
[in]ca_devDevice to release
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+
@@ -334,7 +368,6 @@

diff --git a/a01469.html b/a01469.html index 819255eda..c3ce7d527 100644 --- a/a01469.html +++ b/a01469.html @@ -5,7 +5,7 @@ -CryptoAuthLib: test_iface Namespace Reference +CryptoAuthLib: ATCAIface (atca_) @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,49 +98,717 @@
-
test_iface Namespace Reference
+
ATCAIface (atca_)
+ +

Abstract interface to all CryptoAuth device types. This interface connects to the HAL implementation and abstracts the physical details of the device communication from all the upper layers of CryptoAuthLib. +More...

+ + + + + + + + + + + +

+Data Structures

struct  devtype_names_t
 
struct  ATCAIfaceCfg
 
struct  ATCAHAL_t
 HAL Driver Structure. More...
 
struct  atca_iface
 atca_iface is the context structure for a configured interface More...
 
+ + + + + + + + + +

+Macros

+#define ATCA_IFACECFG_NAME(x)   (x)
 
+#define ATCA_IFACECFG_I2C_ADDRESS(c)   (c)->cfg.atcai2c.address
 
+#define ATCA_IFACECFG_I2C_BAUD(c)   (c)->cfg.atcai2c.baud
 
+#define ATCA_IFACECFG_VALUE(c, v)   (c)->cfg.v
 
+ + + + + + +

+Typedefs

+typedef struct atca_ifaceATCAIface
 
+typedef struct atca_iface atca_iface_t
 atca_iface is the context structure for a configured interface
 
+ + + + + +

+Enumerations

enum  ATCAIfaceType {
+  ATCA_I2C_IFACE = 0 +, ATCA_SWI_IFACE = 1 +, ATCA_UART_IFACE = 2 +, ATCA_SPI_IFACE = 3 +,
+  ATCA_HID_IFACE = 4 +, ATCA_KIT_IFACE = 5 +, ATCA_CUSTOM_IFACE = 6 +, ATCA_I2C_GPIO_IFACE = 7 +,
+  ATCA_SWI_GPIO_IFACE = 8 +, ATCA_SPI_GPIO_IFACE = 9 +, ATCA_UNKNOWN_IFACE = 0xFE +
+ }
 
enum  ATCAKitType {
+  ATCA_KIT_AUTO_IFACE +, ATCA_KIT_I2C_IFACE +, ATCA_KIT_SWI_IFACE +, ATCA_KIT_SPI_IFACE +,
+  ATCA_KIT_UNKNOWN_IFACE +
+ }
 
- - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Functions

-def test_iface_init (test_init_with_lib)
 
-def test_iface_cfg_size (test_iface_init)
 
-def test_iface_cfg_ateccx08a_i2c (test_iface_init)
 
-def test_iface_cfg_ateccx08a_swi (test_iface_init)
 
-def test_iface_cfg_ateccx08a_kithid (test_iface_init)
 
-def test_iface_cfg_atsha20xa_i2c (test_iface_init)
 
-def test_iface_cfg_atsha20xa_swi (test_iface_init)
 
-def test_iface_cfg_atsha20xa_kithid (test_iface_init)
 
ATCA_STATUS initATCAIface (ATCAIfaceCfg *cfg, ATCAIface ca_iface)
 Initializer for ATCAIface objects.
 
ATCA_STATUS atinit (ATCAIface ca_iface)
 Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.
 
ATCA_STATUS atsend (ATCAIface ca_iface, uint8_t word_address, uint8_t *txdata, int txlength)
 Sends the data to the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atreceive (ATCAIface ca_iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 Receives data from the device by calling intermediate HAL wrapper function.
 
ATCA_STATUS atcontrol (ATCAIface ca_iface, uint8_t option, void *param, size_t paramlen)
 Perform control operations with the underlying hal driver.
 
ATCA_STATUS atwake (ATCAIface ca_iface)
 Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.
 
ATCA_STATUS atidle (ATCAIface ca_iface)
 Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.
 
ATCA_STATUS atsleep (ATCAIface ca_iface)
 Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.
 
ATCAIfaceCfgatgetifacecfg (ATCAIface ca_iface)
 Returns the logical interface configuration for the device.
 
void * atgetifacehaldat (ATCAIface ca_iface)
 Returns the HAL data pointer for the device.
 
bool ifacetype_is_kit (ATCAIfaceType iface_type)
 Check if the given interface is a "kit protocol" one.
 
bool atca_iface_is_kit (ATCAIface ca_iface)
 Check if the given interface is configured as a "kit protocol" one where transactions are atomic.
 
bool atca_iface_is_swi (ATCAIface ca_iface)
 Check if the given interface is configured as a SWI.
 
+int atca_iface_get_retries (ATCAIface ca_iface)
 Retrive the number of retries for a configured interface.
 
+uint16_t atca_iface_get_wake_delay (ATCAIface ca_iface)
 Retrive the wake/retry delay for a configured interface/device.
 
+uint8_t ifacecfg_get_address (ATCAIfaceCfg *cfg)
 Retrieves the device address given an interface configuration.
 
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfg *cfg, uint8_t address, ATCAKitType kitiface)
 Change the address of the selected device.
 
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
 Instruct the HAL driver to release any resources associated with this interface.
 
void deleteATCAIface (ATCAIface *ca_iface)
 Instruct the HAL driver to release any resources associated with this interface, then delete the object.
 
+ATCADeviceType iface_get_device_type_by_name (const char *name)
 Get the ATCADeviceType for a string that looks like a part number.
 

Detailed Description

-
These tests verify the structures match the expectation from what is in atca_cfs.c
-If that file has been modified then the tests will fail. If the file has not been
-modified then we can reasonably expect that there is a problem with the ctypes
-definition or assumptions of the platform build and memory alignment is wrong
-
+

Abstract interface to all CryptoAuth device types. This interface connects to the HAL implementation and abstracts the physical details of the device communication from all the upper layers of CryptoAuthLib.

+

Enumeration Type Documentation

+ +

◆ ATCAIfaceType

+ +
+
+ + + + +
enum ATCAIfaceType
+
+ + + + + + + + + + + +
Enumerator
ATCA_I2C_IFACE 

Native I2C Driver

+
ATCA_SWI_IFACE 

SWI or 1-Wire over UART/USART

+
ATCA_UART_IFACE 

Kit v1 over UART/USART

+
ATCA_SPI_IFACE 

Native SPI Driver

+
ATCA_HID_IFACE 

Kit v1 over HID

+
ATCA_KIT_IFACE 

Kit v2 (Binary/Bridging)

+
ATCA_CUSTOM_IFACE 

Custom HAL functions provided during interface init

+
ATCA_I2C_GPIO_IFACE 

I2C "Bitbang" Driver

+
ATCA_SWI_GPIO_IFACE 

SWI or 1-Wire using a GPIO

+
ATCA_SPI_GPIO_IFACE 

SWI or 1-Wire using a GPIO

+
+ +
+
+

Function Documentation

+ +

◆ atca_iface_is_kit()

+ +
+
+ + + + + + + + +
bool atca_iface_is_kit (ATCAIface ca_iface)
+
+ +

Check if the given interface is configured as a "kit protocol" one where transactions are atomic.

+
Returns
true if the interface is considered a kit
+ +
+
+ +

◆ atca_iface_is_swi()

+ +
+
+ + + + + + + + +
bool atca_iface_is_swi (ATCAIface ca_iface)
+
+ +

Check if the given interface is configured as a SWI.

+
Returns
true if the interface is considered a kit
+ +
+
+ +

◆ atcontrol()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atcontrol (ATCAIface ca_iface,
uint8_t option,
void * param,
size_t paramlen 
)
+
+ +

Perform control operations with the underlying hal driver.

+
Parameters
+ + + + + +
[in]ca_ifaceDevice to interact with.
[in]optionControl parameter identifier
[in]paramOptional pointer to parameter value
[in]paramlenLength of the parameter
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atgetifacecfg()

+ +
+
+ + + + + + + + +
ATCAIfaceCfg * atgetifacecfg (ATCAIface ca_iface)
+
+ +

Returns the logical interface configuration for the device.

+
Parameters
+ + +
[in]ca_ifaceDevice interface.
+
+
+
Returns
Logical interface configuration.
+ +
+
+ +

◆ atgetifacehaldat()

+ +
+
+ + + + + + + + +
void * atgetifacehaldat (ATCAIface ca_iface)
+
+ +

Returns the HAL data pointer for the device.

+
Parameters
+ + +
[in]ca_ifaceDevice interface.
+
+
+
Returns
HAL data pointer.
+ +
+
+ +

◆ atidle()

+ +
+
+ + + + + + + + +
ATCA_STATUS atidle (ATCAIface ca_iface)
+
+ +

Puts the device into idle state by calling intermediate HAL wrapper function. The atcab_idle() function should be used instead.

+
Deprecated:
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
+
Parameters
+ + +
[in]ca_ifaceDevice to interact with.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atinit()

+ +
+
+ + + + + + + + +
ATCA_STATUS atinit (ATCAIface ca_iface)
+
+ +

Performs the HAL initialization by calling intermediate HAL wrapper function. If using the basic API, the atcab_init() function should be called instead.

+
Parameters
+ + +
[in]ca_ifaceDevice to interact with.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atreceive()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atreceive (ATCAIface ca_iface,
uint8_t word_address,
uint8_t * rxdata,
uint16_t * rxlength 
)
+
+ +

Receives data from the device by calling intermediate HAL wrapper function.

+
Parameters
+ + + + + +
[in]ca_ifaceDevice to interact with.
[in]word_addressdevice transaction type
[out]rxdataData received will be returned here.
[in,out]rxlengthAs input, the size of the rxdata buffer. As output, the number of bytes received.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atsend()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS atsend (ATCAIface ca_iface,
uint8_t word_address,
uint8_t * txdata,
int txlength 
)
+
+ +

Sends the data to the device by calling intermediate HAL wrapper function.

+
Parameters
+ + + + + +
[in]ca_ifaceDevice to interact with.
[in]word_addressdevice transaction type
[in]txdataData to be transmitted to the device.
[in]txlengthNumber of bytes to be transmitted to the device.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atsleep()

+ +
+
+ + + + + + + + +
ATCA_STATUS atsleep (ATCAIface ca_iface)
+
+ +

Puts the device into sleep state by calling intermediate HAL wrapper function. The atcab_sleep() function should be used instead.

+
Deprecated:
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
+
Parameters
+ + +
[in]ca_ifaceDevice to interact with.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ atwake()

+ +
+
+ + + + + + + + +
ATCA_STATUS atwake (ATCAIface ca_iface)
+
+ +

Wakes up the device by calling intermediate HAL wrapper function. The atcab_wakeup() function should be used instead.

+
Deprecated:
This function does not have defined behavior when ATCA_HAL_LEGACY_API is undefined.
+
Parameters
+ + +
[in]ca_ifaceDevice to interact with.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ deleteATCAIface()

+ +
+
+ + + + + + + + +
void deleteATCAIface (ATCAIfaceca_iface)
+
+ +

Instruct the HAL driver to release any resources associated with this interface, then delete the object.

+
Parameters
+ + +
[in]ca_ifaceDevice interface.
+
+
+ +
+
+ +

◆ ifacecfg_set_address()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
ATCA_STATUS ifacecfg_set_address (ATCAIfaceCfgcfg,
uint8_t address,
ATCAKitType kitiface 
)
+
+ +

Change the address of the selected device.

+
Parameters
+ + + + +
[in]cfgInterface configuration structure to update
[in]addressDesired address
[in]kitifaceOptional parameter to set the kit iface type
+
+
+ +
+
+ +

◆ ifacetype_is_kit()

+ +
+
+ + + + + + + + +
bool ifacetype_is_kit (ATCAIfaceType iface_type)
+
+ +

Check if the given interface is a "kit protocol" one.

+
Returns
true if the interface type is considered a kit
+ +
+
+ +

◆ initATCAIface()

+ +
+
+ + + + + + + + + + + + + + + + + + +
ATCA_STATUS initATCAIface (ATCAIfaceCfgcfg,
ATCAIface ca_iface 
)
+
+ +

Initializer for ATCAIface objects.

+
Parameters
+ + + +
[in]cfgLogical configuration for the interface
[in]ca_ifaceInterface structure to initialize.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+ +

◆ releaseATCAIface()

+ +
+
+ + + + + + + + +
ATCA_STATUS releaseATCAIface (ATCAIface ca_iface)
+
+ +

Instruct the HAL driver to release any resources associated with this interface.

+
Parameters
+ + +
[in]ca_ifaceDevice interface.
+
+
+
Returns
ATCA_SUCCESS on success, otherwise an error code.
+ +
+
+
diff --git a/a01480.html b/a01480.html index c632b94c4..39593e0cd 100644 --- a/a01480.html +++ b/a01480.html @@ -5,7 +5,7 @@ -CryptoAuthLib: _ascii_kit_host_context Struct Reference +CryptoAuthLib: cryptoauthlib.atcacert Namespace Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,38 +98,703 @@
-
_ascii_kit_host_context Struct Reference
+Data Structures | +Functions
+
cryptoauthlib.atcacert Namespace Reference
- - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Data Fields

-const atca_hal_kit_phy_tphy
 
-uint8_t buffer [(2500)]
 
-ATCADevice device
 
-ATCAIfaceCfg ** iface
 
-size_t iface_count
 
-uint32_t flags
 

+Data Structures

class  atcacert_cert_element_t
 
class  atcacert_cert_loc_t
 
class  atcacert_cert_sn_src_t
 
class  atcacert_cert_type_t
 
class  atcacert_comp_data_t
 
class  atcacert_date_format_t
 
class  atcacert_def_t
 
class  atcacert_device_loc_t
 
class  atcacert_device_zone_t
 
class  atcacert_std_cert_element_t
 
class  atcacert_tm_utc_t
 
class  atcacert_transform_t
 
class  CertStatus
 
+ + + + + + + + + + + + + + + + + + + + + + + + + + +

+Functions

def _atcacert_convert_bytes (kwargs, name, pointer)
 
def _atcacert_convert_enum (kwargs, name, enum)
 
def atcacert_max_cert_size (cert_def, max_cert_size)
 
def atcacert_get_response (device_private_key_slot, challenge, response)
 
def atcacert_read_cert (cert_def, ca_public_key, cert, cert_size)
 
def atcacert_write_cert (cert_def, cert, cert_size)
 
def atcacert_create_csr (csr_def, csr, csr_size)
 
def atcacert_create_csr_pem (csr_def, csr, csr_size)
 
def atcacert_date_enc (date_format, timestamp, formatted_date, formatted_date_size)
 
def atcacert_date_dec (date_format, formatted_date, formatted_date_size, timestamp)
 
def atcacert_date_enc_compcert (issue_date, expire_years, enc_dates)
 
def atcacert_date_dec_compcert (enc_dates, expire_date_format, issue_date, expire_date)
 
def atcacert_date_get_max_date (date_format, timestamp)
 
+

Detailed Description

+
ATCACERT: classes and functions for interacting with compressed certificates
+

Function Documentation

+ +

◆ _atcacert_convert_bytes()

+ +
+
+ + + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert._atcacert_convert_bytes ( kwargs,
 name,
 pointer 
)
+
+protected
+
+
Internal Helper Function: Convert python 'bytes' into memory pointer for ctypes structure
+:param kwargs: kwargs dictionary
+:param name: _field_ name that will be converted
+:param pointer: Conversion Class (resulting type - pointer of type x)
+:return:
+
+
+
+ +

◆ _atcacert_convert_enum()

+ +
+
+ + + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert._atcacert_convert_enum ( kwargs,
 name,
 enum 
)
+
+protected
+
+
Internal Helper Function: Convert python enum into ctypes integer
+:param kwargs: kwargs dictionary
+:param name: _field_ name that will be converted
+:param enum: Conversion Class (resulting type)
+:return:
+
+
+
+ +

◆ atcacert_create_csr()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_create_csr ( csr_def,
 csr,
 csr_size 
)
+
+
Creates a CSR specified by the CSR definition from the ATECC508A device.
+This process involves reading the dynamic CSR data from the device and combining it
+with the template found in the CSR definition, then signing it. Return the CSR int der format
+
+Args:
+    csr_def                 CSR definition describing where to find the dynamic CSR information
+                            on the device and how to incorporate it into the template.
+                            Expects atcacert_def_t.
+    csr                     Buffer to receive the CSR. Expects bytearray.
+    csr_size                As input, the size of the CSR buffer in bytes.
+                            As output, the size of the CSR as PEM returned in cert in bytes.
+                            Expects AtcaReference.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_create_csr_pem()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_create_csr_pem ( csr_def,
 csr,
 csr_size 
)
+
+
Creates a CSR specified by the CSR definition from the ATECC508A device.
+This process involves reading the dynamic CSR data from the device and combining it
+with the template found in the CSR definition, then signing it. Return the CSR int der format
+
+Args:
+    csr_def                 CSR definition describing where to find the dynamic CSR information
+                            on the device and how to incorporate it into the template.
+                            Expects atcacert_def_t.
+    csr                     Buffer to receive the CSR. Expects bytearray.
+    csr_size                As input, the size of the CSR buffer in bytes.
+                            As output, the size of the CSR as PEM returned in cert in bytes.
+                            Expects AtcaReference.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_date_dec()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_date_dec ( date_format,
 formatted_date,
 formatted_date_size,
 timestamp 
)
+
+
Parse a formatted timestamp according to the specified format.
+
+Args:
+    date_format             Format to parse the formatted date as.
+    formatted_date          Formatted date to be parsed.
+    formatted_date_size     Size of the formatted date in bytes.
+    timestamp               Parsed timestamp is returned here. Expects atcacert_tm_utc_t.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_date_dec_compcert()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_date_dec_compcert ( enc_dates,
 expire_date_format,
 issue_date,
 expire_date 
)
+
+
Decode the issue and expire dates from the format used by the compressed certificate.
+
+Args:
+    enc_dates               Encoded date from the compressed certificate. 3 bytes.
+    expire_date_format      Expire date format. Only used to determine max date when no
+                            expiration date is specified by the encoded date.
+    issue_date              Decoded issue date is returned here. Expects atcacert_tm_utc_t.
+    expire_date             Decoded expire date is returned here. If there is no
+                            expiration date, the expire date will be set to a maximum
+                            value for the given expire_date_format. Expects atcacert_tm_utc_t.
+Returns:
+    ATCACERT_E_SUCCESS on success
+
+
+
+ +

◆ atcacert_date_enc()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_date_enc ( date_format,
 timestamp,
 formatted_date,
 formatted_date_size 
)
+
+
Format a timestamp according to the format type.
+
+Args:
+    date_format             Format to use.
+    timestamp               Timestamp to format. Expects atcacert_tm_utc_t.
+    formatted_date          Formatted date will be returned in this buffer.
+                            Expects bytearray.
+    formatted_date_size     As input, the size of the formatted_date buffer.
+                            As output, the size of the returned formatted_date.
+                            Expects AtcaReference.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_date_enc_compcert()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_date_enc_compcert ( issue_date,
 expire_years,
 enc_dates 
)
+
+
Encode the issue and expire dates in the format used by the compressed certificate.
+
+Args:
+    issue_date              Issue date to encode. Note that minutes and seconds will be ignored.
+                            Expects atcacert_tm_utc_t.
+    expire_years            Expire date is expressed as a number of years past the issue date.
+                            0 should be used if there is no expire date.
+    enc_dates               Encoded dates for use in the compressed certificate is returned here.
+                            3 bytes. Expects bytearray.
+
+Returns:
+    ATCACERT_E_SUCCESS on success
+
+
+
+ +

◆ atcacert_date_get_max_date()

+ +
+
+ + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_date_get_max_date ( date_format,
 timestamp 
)
+
+
Return the maximum date available for the given format.
+
+Args:
+    format                  Format to get the max date for.
+    timestamp               Max date is returned here. Expects atcacert_tm_utc_t.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_get_response()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_get_response ( device_private_key_slot,
 challenge,
 response 
)
+
+
Calculates the response to a challenge sent from the host.
+The challenge-response protocol is an ECDSA Sign and Verify. This performs the ECDSA Sign on the
+challenge and returns the signature as the response.
+
+Args:
+    device_private_key_slot         Slot number for the device's private key. This must be the
+                                    same slot used to generate the public key included in the
+                                    device's certificate.
+    challenge                       Challenge to generate the response for. Must be 32 bytes.
+    response                        Response will be returned in this buffer. 64 bytes.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_max_cert_size()

+ +
+
+ + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_max_cert_size ( cert_def,
 max_cert_size 
)
+
+
Return the maximum possible certificate size in bytes for a given
+cert def. Certificate can be variable size, so this gives an
+appropriate buffer size when reading the certificates.
+
+Args:
+    cert_def       Certificate definition to find a max size for.
+                   Expects atcacert_def_t.
+    max_cert_size  Maximum certificate size will be returned here in bytes.
+                   Expects AtcaReference.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_read_cert()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_read_cert ( cert_def,
 ca_public_key,
 cert,
 cert_size 
)
+
+
Reads the certificate specified by the certificate definition from the
+ATECC508A device.
+This process involves reading the dynamic cert data from the device and combining it
+with the template found in the certificate definition.
+
+Args:
+    cert_def                Certificate definition describing where to find the dynamic
+                            certificate information on the device and how to incorporate it
+                            into the template. Expects atcacert_def_t.
+    ca_public_key           The ECC P256 public key of the certificate authority that signed
+                            this certificate. Formatted as the 32 byte X and Y integers
+                            concatenated together (64 bytes total). Set to NULL if the
+                            authority key id is not needed, set properly in the cert_def
+                            template, or stored on the device as specifed in the
+                            cert_def cert_elements.
+    cert                    Buffer to received the certificate. Expects bytearray.
+    cert_size               As input, the size of the cert buffer in bytes.
+                            As output, the size of the certificate returned in cert in bytes.
+                            Expects AtcaReference.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
+ +

◆ atcacert_write_cert()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.atcacert.atcacert_write_cert ( cert_def,
 cert,
 cert_size 
)
+
+
Take a full certificate and write it to the ATECC508A device according to the
+certificate definition.
+
+Args:
+    cert_def                Certificate definition describing where the dynamic certificate
+                            information is and how to store it on the device.
+                            Expects atcacert_def_t.
+    cert                    Full certificate to be stored.
+    cert_size               Size of the full certificate in bytes.
+
+Returns:
+    ATCACERT_E_SUCCESS on success, otherwise an error code.
+
+
+
diff --git a/a01484.html b/a01484.html index d4d525b71..5df6bf06b 100644 --- a/a01484.html +++ b/a01484.html @@ -5,7 +5,7 @@ -CryptoAuthLib: _kit_host_map_entry Struct Reference +CryptoAuthLib: cryptoauthlib.exceptions Namespace Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,30 +98,94 @@
-
_kit_host_map_entry Struct Reference
+Data Structures
+
cryptoauthlib.exceptions Namespace Reference
- -

#include <app/kit_host/ascii_kit_host.h>

- - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

-Data Fields

-const char * id
 
-ATCA_STATUS(* fp_command )(ascii_kit_host_context_t *ctx, int argc, char *argv[], uint8_t *response, size_t *rlen)
 

+Data Structures

class  AssertionFailure
 
class  BadArgumentError
 
class  BadCrcError
 
class  BadOpcodeError
 
class  CheckmacVerifyFailedError
 
class  CommunicationError
 
class  ConfigZoneLockedError
 
class  CrcError
 
class  CryptoError
 
class  DataZoneLockedError
 
class  EccFaultError
 
class  ExecutionError
 
class  FunctionError
 
class  GenericError
 
class  HealthTestError
 
class  InvalidIdentifierError
 
class  InvalidSizeError
 
class  LibraryLoadError
 
class  LibraryMemoryError
 
class  LibraryNotInitialized
 
class  NoDevicesFoundError
 
class  NoResponseError
 
class  NoUseFlagError
 
class  ParityError
 
class  ParseError
 
class  ReceiveError
 
class  ReceiveTimeoutError
 
class  ResyncWithWakeupError
 
class  StatusUnknownError
 
class  TimeOutError
 
class  TransmissionError
 
class  TransmissionTimeoutError
 
class  UnimplementedError
 
class  UnsupportedInterface
 
class  WakeFailedError
 
class  ZoneNotLockedError
 

Detailed Description

-

Used to create command tables for the kit host parser

-
+
Cryptoauthlib Exceptions
+
diff --git a/a01488.html b/a01488.html index 290596590..60c79fc02 100644 --- a/a01488.html +++ b/a01488.html @@ -5,7 +5,7 @@ -CryptoAuthLib: secure_boot_config_bits Struct Reference +CryptoAuthLib: cryptoauthlib.status Namespace Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,41 +98,73 @@
-
secure_boot_config_bits Struct Reference
+Data Structures | +Functions | +Variables
+
cryptoauthlib.status Namespace Reference
- - - - - - - - - - - - - - - + + + +

-Data Fields

-uint16_t secure_boot_mode: 2
 
-uint16_t secure_boot_reserved1: 1
 
-uint16_t secure_boot_persistent_enable: 1
 
-uint16_t secure_boot_rand_nonce: 1
 
-uint16_t secure_boot_reserved2: 3
 
-uint16_t secure_boot_sig_dig: 4
 
-uint16_t secure_boot_pub_key: 4
 

+Data Structures

class  Status
 
+ + + +

+Functions

def check_status (status, *args, **kwargs)
 
+ + +

+Variables

+dict STATUS_EXCEPTION_MAP
 
+

Detailed Description

+
Status codes and status to exception conversions.
+

Function Documentation

+ +

◆ check_status()

+ +
+
+ + + + + + + + + + + + + + + + + + + + + + + + +
def cryptoauthlib.status.check_status ( status,
args,
** kwargs 
)
+
+
Look up the status return code from an API call and raise the exception that matches
+
+
+
diff --git a/a01492.html b/a01492.html deleted file mode 100644 index a0dc9f8c0..000000000 --- a/a01492.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: secure_boot_parameters Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
secure_boot_parameters Struct Reference
-
-
- - - - - - - - -

-Data Fields

-memory_parameters memory_params
 
-atcac_sha2_256_ctx s_sha_context
 
-uint8_t app_digest [ATCA_SHA_DIGEST_SIZE]
 
-
-
- - - - diff --git a/a01496.html b/a01496.html index 51ed07338..198d8f1ba 100644 --- a/a01496.html +++ b/a01496.html @@ -5,7 +5,7 @@ -CryptoAuthLib: memory_parameters Struct Reference +CryptoAuthLib: test_iface Namespace Reference @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,35 +98,49 @@
-
memory_parameters Struct Reference
+Functions
+
test_iface Namespace Reference
- - - - - - - - - - - + + + + + + + + + + + + + + + + +

-Data Fields

-uint32_t start_address
 
-uint32_t memory_size
 
-uint32_t version_info
 
-uint8_t reserved [52]
 
-uint8_t signature [ATCA_SIG_SIZE]
 

+Functions

+def test_iface_init (test_init_with_lib)
 
+def test_iface_cfg_size (test_iface_init)
 
+def test_iface_cfg_ateccx08a_i2c (test_iface_init)
 
+def test_iface_cfg_ateccx08a_swi (test_iface_init)
 
+def test_iface_cfg_ateccx08a_kithid (test_iface_init)
 
+def test_iface_cfg_atsha20xa_i2c (test_iface_init)
 
+def test_iface_cfg_atsha20xa_swi (test_iface_init)
 
+def test_iface_cfg_atsha20xa_kithid (test_iface_init)
 
-
+

Detailed Description

+
These tests verify the structures match the expectation from what is in atca_cfs.c
+If that file has been modified then the tests will fail. If the file has not been
+modified then we can reasonably expect that there is a problem with the ctypes
+definition or assumptions of the platform build and memory alignment is wrong
+
diff --git a/a01500.html b/a01500.html deleted file mode 100644 index b2520a9ae..000000000 --- a/a01500.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: tng_cert_map_element Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
tng_cert_map_element Struct Reference
-
-
- - - - - - -

-Data Fields

-const char * otpcode
 
-const atcacert_def_tcert_def
 
-
-
- - - - diff --git a/a01504.html b/a01504.html deleted file mode 100644 index aad254bdb..000000000 --- a/a01504.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_plib_i2c_api Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_plib_i2c_api Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-atca_i2c_plib_read read
 
-atca_i2c_plib_write write
 
-atca_i2c_plib_is_busy is_busy
 
-atca_i2c_error_get error_get
 
-atca_i2c_plib_transfer_setup transfer_setup
 
-
-
- - - - diff --git a/a01508.html b/a01508.html deleted file mode 100644 index b431eb5cc..000000000 --- a/a01508.html +++ /dev/null @@ -1,173 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_device Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_device Struct Reference
-
-
- -

atca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods - More...

- -

#include <lib/atca_device.h>

- - - - - - - - - - - - - - -

-Data Fields

atca_iface_t mIface
 
uint8_t device_state
 
-uint8_t clock_divider
 
-uint16_t execution_time_msec
 
-void * session_ctx
 
-ctx_cb session_cb
 
-

Detailed Description

-

atca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods

-

Field Documentation

- -

◆ device_state

- -
-
- - - - -
uint8_t atca_device::device_state
-
-

Device Power State

- -
-
- -

◆ mIface

- -
-
- - - - -
atca_iface_t atca_device::mIface
-
-

Physical interface

- -
-
-
-
- - - - diff --git a/a01508.js b/a01508.js deleted file mode 100644 index 9f1d264c7..000000000 --- a/a01508.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01508 = -[ - [ "device_state", "a01508.html#a6ce22e245944629826d4869f69babf81", null ], - [ "mIface", "a01508.html#a725646466f0ea8e0982251189c15724a", null ] -]; \ No newline at end of file diff --git a/a01512.html b/a01512.html deleted file mode 100644 index 0b3697123..000000000 --- a/a01512.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: devtype_names_t Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
devtype_names_t Struct Reference
-
-
- - - - - - -

-Data Fields

-ATCADeviceType devtype
 
-const char * name
 
-
-
- - - - diff --git a/a01516.html b/a01516.html deleted file mode 100644 index 842f55618..000000000 --- a/a01516.html +++ /dev/null @@ -1,281 +0,0 @@ - - - - - - - -CryptoAuthLib: ATCAIfaceCfg Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
ATCAIfaceCfg Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-ATCAIfaceType iface_type
 
-ATCADeviceType devtype
 
-union {
-   struct {
      uint8_t   address
 
-      uint8_t   bus
 
-      uint32_t   baud
 
   }   atcai2c
 
-   struct {
-      uint8_t   address
 
-      uint8_t   bus
 
   }   atcaswi
 
-   struct {
-      uint8_t   bus
 
-      uint8_t   select_pin
 
-      uint32_t   baud
 
   }   atcaspi
 
-   struct {
-      ATCAKitType   dev_interface
 
-      uint8_t   dev_identity
 
-      uint8_t   port
 
-      uint32_t   baud
 
-      uint8_t   wordsize
 
-      uint8_t   parity
 
-      uint8_t   stopbits
 
   }   atcauart
 
-   struct {
-      int   idx
 
-      ATCAKitType   dev_interface
 
-      uint8_t   dev_identity
 
-      uint32_t   vid
 
-      uint32_t   pid
 
-      uint32_t   packetsize
 
   }   atcahid
 
-   struct {
-      ATCAKitType   dev_interface
 
-      uint8_t   dev_identity
 
-      uint32_t   flags
 
   }   atcakit
 
-   struct {
-      ATCA_STATUS(*   halinit )(void *hal, void *cfg)
 
-      ATCA_STATUS(*   halpostinit )(void *iface)
 
-      ATCA_STATUS(*   halsend )(void *iface, uint8_t
-         word_address, uint8_t *txdata,
-          int txlength)
 
-      ATCA_STATUS(*   halreceive )(void *iface, uint8_t
-         word_address, uint8_t *rxdata,
-          uint16_t *rxlength)
 
-      ATCA_STATUS(*   halwake )(void *iface)
 
-      ATCA_STATUS(*   halidle )(void *iface)
 
-      ATCA_STATUS(*   halsleep )(void *iface)
 
-      ATCA_STATUS(*   halrelease )(void *hal_data)
 
   }   atcacustom
 
cfg
 
-uint16_t wake_delay
 
-int rx_retries
 
-void * cfg_data
 
-

Field Documentation

- -

◆ address

- -
-
- - - - -
uint8_t ATCAIfaceCfg::address
-
-

Device address - the upper 7 bits are the I2c address bits

- -
-
-
-
- - - - diff --git a/a01516.js b/a01516.js deleted file mode 100644 index cac799559..000000000 --- a/a01516.js +++ /dev/null @@ -1,4 +0,0 @@ -var a01516 = -[ - [ "address", "a01516.html#a553439e2acc31fe3587a4c883e134b66", null ] -]; \ No newline at end of file diff --git a/a01580.html b/a01580.html deleted file mode 100644 index ed82a0c59..000000000 --- a/a01580.html +++ /dev/null @@ -1,144 +0,0 @@ - - - - - - - -CryptoAuthLib: ATCAHAL_t Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
ATCAHAL_t Struct Reference
-
-
- -

HAL Driver Structure. - More...

- -

#include <lib/atca_iface.h>

- - - - - - - - - - - - - - -

-Data Fields

-ATCA_STATUS(* halinit )(ATCAIface iface, ATCAIfaceCfg *cfg)
 
-ATCA_STATUS(* halpostinit )(ATCAIface iface)
 
-ATCA_STATUS(* halsend )(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength)
 
-ATCA_STATUS(* halreceive )(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength)
 
-ATCA_STATUS(* halcontrol )(ATCAIface iface, uint8_t option, void *param, size_t paramlen)
 
-ATCA_STATUS(* halrelease )(void *hal_data)
 
-

Detailed Description

-

HAL Driver Structure.

-
-
- - - - diff --git a/a01584.html b/a01584.html deleted file mode 100644 index 81d6c838e..000000000 --- a/a01584.html +++ /dev/null @@ -1,195 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_iface Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_iface Struct Reference
-
-
- -

atca_iface is the context structure for a configured interface - More...

- -

#include <lib/atca_iface.h>

- - - - - - - - - - -

-Data Fields

ATCAIfaceCfgmIfaceCFG
 
ATCAHAL_thal
 
ATCAHAL_tphy
 
void * hal_data
 
-

Detailed Description

-

atca_iface is the context structure for a configured interface

-

Field Documentation

- -

◆ hal

- -
-
- - - - -
ATCAHAL_t* atca_iface::hal
-
-

The configured HAL for the interface

- -
-
- -

◆ hal_data

- -
-
- - - - -
void* atca_iface::hal_data
-
-

Pointer to HAL specific context/data

- -
-
- -

◆ mIfaceCFG

- -
-
- - - - -
ATCAIfaceCfg* atca_iface::mIfaceCFG
-
-

Points to previous defined/given Cfg object, the caller manages this

- -
-
- -

◆ phy

- -
-
- - - - -
ATCAHAL_t* atca_iface::phy
-
-

When a HAL is not a "native" hal it needs a physical layer to be associated with it

- -
-
-
-
- - - - diff --git a/a01584.js b/a01584.js deleted file mode 100644 index 178a39854..000000000 --- a/a01584.js +++ /dev/null @@ -1,7 +0,0 @@ -var a01584 = -[ - [ "hal", "a01584.html#a7cee716c7c8c20d0d8aac6243baff819", null ], - [ "hal_data", "a01584.html#ab316c2d139b46380bc97be4d23428caa", null ], - [ "mIfaceCFG", "a01584.html#a093b94b5d693f4e7a8facfc40f1443b0", null ], - [ "phy", "a01584.html#a3ac7e576da4958d6c0488ec606d9cbff", null ] -]; \ No newline at end of file diff --git a/a01588.html b/a01588.html deleted file mode 100644 index 533b2708a..000000000 --- a/a01588.html +++ /dev/null @@ -1,141 +0,0 @@ - - - - - - - -CryptoAuthLib: atcacert_tm_utc_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcacert_tm_utc_s Struct Reference
-
-
- -

#include <lib/atcacert/atcacert_date.h>

- - - - - - - - - - - - - - -

-Data Fields

-int tm_sec
 
-int tm_min
 
-int tm_hour
 
-int tm_mday
 
-int tm_mon
 
-int tm_year
 
-

Detailed Description

-

Holds a broken-down date in UTC. Mimics atcacert_tm_utc_t from time.h.

-
-
- - - - diff --git a/a01592.html b/a01592.html deleted file mode 100644 index fcebe178e..000000000 --- a/a01592.html +++ /dev/null @@ -1,143 +0,0 @@ - - - - - - - -CryptoAuthLib: atcacert_device_loc_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcacert_device_loc_s Struct Reference
-
-
- -

#include <lib/atcacert/atcacert_def.h>

- - - - - - - - - - - - - - - - - -

-Data Fields

-atcacert_device_zone_t zone
 Zone in the device.
 
-uint16_t slot
 Slot within the data zone. Only applies if zone is DEVZONE_DATA.
 
-uint8_t is_genkey
 If true, use GenKey command to get the contents instead of Read.
 
-uint16_t offset
 Byte offset in the zone.
 
-uint16_t count
 Byte count.
 
-

Detailed Description

-

Defines a chunk of data in an ATECC device.

-
-
- - - - diff --git a/a01592.js b/a01592.js deleted file mode 100644 index 437583e5d..000000000 --- a/a01592.js +++ /dev/null @@ -1,8 +0,0 @@ -var a01592 = -[ - [ "count", "a01592.html#a24329906c1970b0510479835d52b70b5", null ], - [ "is_genkey", "a01592.html#a209ce3b19c7ebdd32847334c64a9deb2", null ], - [ "offset", "a01592.html#a6d4c996ba426bfb964f3c2c4d1238f3c", null ], - [ "slot", "a01592.html#ac393a690cd7891565dc679e6ffa4b021", null ], - [ "zone", "a01592.html#af8e8e6406f9252c503f2eaed02f0dbca", null ] -]; \ No newline at end of file diff --git a/a01596.html b/a01596.html deleted file mode 100644 index 0e9b8050a..000000000 --- a/a01596.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: atcacert_cert_loc_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcacert_cert_loc_s Struct Reference
-
-
- -

#include <lib/atcacert/atcacert_def.h>

- - - - - - - - -

-Data Fields

-uint16_t offset
 Byte offset in the certificate template.
 
-uint16_t count
 Byte count. Set to 0 if it doesn't exist.
 
-

Detailed Description

-

Defines a chunk of data in a certificate template.

-
-
- - - - diff --git a/a01596.js b/a01596.js deleted file mode 100644 index 8ddf78761..000000000 --- a/a01596.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01596 = -[ - [ "count", "a01596.html#a2cf939ba243a6dc7c8da9a74040b83f3", null ], - [ "offset", "a01596.html#aee425cdec2c6c77ccb291993a6526d0b", null ] -]; \ No newline at end of file diff --git a/a01600.html b/a01600.html deleted file mode 100644 index b007e4e3a..000000000 --- a/a01600.html +++ /dev/null @@ -1,139 +0,0 @@ - - - - - - - -CryptoAuthLib: atcacert_cert_element_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcacert_cert_element_s Struct Reference
-
-
- -

#include <lib/atcacert/atcacert_def.h>

- - - - - - - - - - - - - - -

-Data Fields

-char id [25]
 ID identifying this element.
 
-atcacert_device_loc_t device_loc
 Location in the device for the element.
 
-atcacert_cert_loc_t cert_loc
 Location in the certificate template for the element.
 
-atcacert_transform_t transforms [2]
 List of transforms from device to cert for this element.
 
-

Detailed Description

-

Defines a generic dynamic element for a certificate including the device and template locations.

-
-
- - - - diff --git a/a01600.js b/a01600.js deleted file mode 100644 index 3de38c04b..000000000 --- a/a01600.js +++ /dev/null @@ -1,7 +0,0 @@ -var a01600 = -[ - [ "cert_loc", "a01600.html#a6a6584538d9ba2e8304e2c103d4501a5", null ], - [ "device_loc", "a01600.html#aaac07ecbeef8734077fec8ea17a7e015", null ], - [ "id", "a01600.html#a437f85f49d7a943a0e9f06353a2b6875", null ], - [ "transforms", "a01600.html#a1e4d5bbf62b7cbe49b6d222d6e124833", null ] -]; \ No newline at end of file diff --git a/a01604.html b/a01604.html deleted file mode 100644 index 163b75c24..000000000 --- a/a01604.html +++ /dev/null @@ -1,136 +0,0 @@ - - - - - - - -CryptoAuthLib: atcacert_def_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcacert_def_s Struct Reference
-
-
- -

#include <lib/atcacert/atcacert_def.h>

- - - - - - - - - - - -

-Data Fields

-atcacert_cert_type_t type
 Certificate type.
 
-atcacert_device_loc_t comp_cert_dev_loc
 Where on the device the compressed cert can be found.
 
-const struct atcacert_def_sca_cert_def
 Certificate definition of the CA certificate.
 
-

Detailed Description

-

Defines a certificate and all the pieces to work with it.

-

If any of the standard certificate elements (std_cert_elements) are not a part of the certificate definition, set their count to 0 to indicate their absence.

-
-
- - - - diff --git a/a01604.js b/a01604.js deleted file mode 100644 index a55a80e6b..000000000 --- a/a01604.js +++ /dev/null @@ -1,6 +0,0 @@ -var a01604 = -[ - [ "ca_cert_def", "a01604.html#ae6dc350fb1a599dd6585c41e34a1e0e8", null ], - [ "comp_cert_dev_loc", "a01604.html#a56f1328d6aec74cd0eb92a30182065b1", null ], - [ "type", "a01604.html#aeb847b88caadd6fad351f4d239edea42", null ] -]; \ No newline at end of file diff --git a/a01608.html b/a01608.html deleted file mode 100644 index 1970e2e83..000000000 --- a/a01608.html +++ /dev/null @@ -1,159 +0,0 @@ - - - - - - - -CryptoAuthLib: atcacert_build_state_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcacert_build_state_s Struct Reference
-
-
- -

#include <lib/atcacert/atcacert_def.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-const atcacert_def_tcert_def
 Certificate definition for the certificate being rebuilt.
 
-uint8_t * cert
 Buffer to contain the rebuilt certificate.
 
-size_t * cert_size
 Current size of the certificate in bytes.
 
-size_t max_cert_size
 Max size of the cert buffer in bytes.
 
-uint8_t is_device_sn
 Indicates the structure contains the device SN.
 
-ATCADeviceType devtype
 Device type info for the certificate being rebuilt.
 
-uint8_t device_sn [9]
 Storage for the device SN, when it's found.
 
-uint8_t is_comp_cert
 Indicates the structure contains the compressed certificate.
 
-uint8_t comp_cert [72]
 Storage for the compressed certificate when it's found.
 
-

Detailed Description

-

Tracks the state of a certificate as it's being rebuilt from device information.

-
-
- - - - diff --git a/a01608.js b/a01608.js deleted file mode 100644 index 8c7dfc690..000000000 --- a/a01608.js +++ /dev/null @@ -1,12 +0,0 @@ -var a01608 = -[ - [ "cert", "a01608.html#a850a129376d4a3dd4c9994d04a9edca7", null ], - [ "cert_def", "a01608.html#a5b6c72f114573cb07932b4c0e089150e", null ], - [ "cert_size", "a01608.html#af8600eedc4cac772aff7257ffcd4a1c0", null ], - [ "comp_cert", "a01608.html#ae6ce8bf9e7b8172f5971f7c6516a79f0", null ], - [ "device_sn", "a01608.html#a4530a3779248463eb6b77176ee656e68", null ], - [ "devtype", "a01608.html#af6d0fd1d866c96c7a9e4bc5425baa094", null ], - [ "is_comp_cert", "a01608.html#abfff7f7f7436a1df82e73b4b070f8ab8", null ], - [ "is_device_sn", "a01608.html#aa0b5050ded24b08d6b0022d543d2ed47", null ], - [ "max_cert_size", "a01608.html#a6e1cb79d9215a84f1e74c989bd0c9987", null ] -]; \ No newline at end of file diff --git a/a01612.html b/a01612.html deleted file mode 100644 index b45a7df24..000000000 --- a/a01612.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: cal_buffer_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cal_buffer_s Struct Reference
-
-
- - - - - - -

-Data Fields

size_t len
 
uint8_t * buf
 
-

Field Documentation

- -

◆ buf

- -
-
- - - - -
uint8_t* cal_buffer_s::buf
-
-

Pointer to the actual buffer

- -
-
- -

◆ len

- -
-
- - - - -
size_t cal_buffer_s::len
-
-

Length of the provided buffer

- -
-
-
-
- - - - diff --git a/a01612.js b/a01612.js deleted file mode 100644 index 13db4004d..000000000 --- a/a01612.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01612 = -[ - [ "buf", "a01612.html#a56ecba8dd00dd0bed1056152f4e9f9dc", null ], - [ "len", "a01612.html#a9e07b6d33b7cdc866e6625c18d9c5f92", null ] -]; \ No newline at end of file diff --git a/a01616.html b/a01616.html deleted file mode 100644 index 438fa4c49..000000000 --- a/a01616.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_sha256_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- - -
- - - - - - - - - - - -

-Data Fields

-uint32_t total_msg_size
 Total number of message bytes processed.
 
-uint32_t block_size
 Number of bytes in current block.
 
-uint8_t block [ATCA_SHA256_BLOCK_SIZE *2]
 Unprocessed message storage.
 
-
-
- - - - diff --git a/a01616.js b/a01616.js deleted file mode 100644 index 5b925046f..000000000 --- a/a01616.js +++ /dev/null @@ -1,6 +0,0 @@ -var a01616 = -[ - [ "block", "a01616.html#a6d3f030387c74b86ec476d0c99a46c34", null ], - [ "block_size", "a01616.html#ae7cf177799e4c934821f6540aa5a33e5", null ], - [ "total_msg_size", "a01616.html#aab3e376d6c18921a1ee303e2b703c668", null ] -]; \ No newline at end of file diff --git a/a01620.html b/a01620.html deleted file mode 100644 index a91006bf9..000000000 --- a/a01620.html +++ /dev/null @@ -1,140 +0,0 @@ - - - - - - - -CryptoAuthLib: ATCAPacket Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
ATCAPacket Struct Reference
-
-
- - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t reserved
 
-uint8_t txsize
 
-uint8_t opcode
 
-uint8_t param1
 
-uint16_t param2
 
-uint8_t data [((198u)) - 6]
 
-uint8_t execTime
 
-
-
- - - - diff --git a/a01624.html b/a01624.html deleted file mode 100644 index b519e27eb..000000000 --- a/a01624.html +++ /dev/null @@ -1,173 +0,0 @@ - - - - - - - -CryptoAuthLib: atsha204a_config_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint32_t SN03
 
-uint32_t RevNum
 
-uint32_t SN47
 
-uint8_t SN8
 
-uint8_t Reserved0
 
-uint8_t I2C_Enable
 
-uint8_t Reserved1
 
-uint8_t I2C_Address
 
-uint8_t Reserved2
 
-uint8_t OTPmode
 
-uint8_t ChipMode
 
-uint16_t SlotConfig [16]
 
-uint16_t Counter [8]
 
-uint8_t LastKeyUse [16]
 
-uint8_t UserExtra
 
-uint8_t Selector
 
-uint8_t LockValue
 
-uint8_t LockConfig
 
-
-
- - - - diff --git a/a01628.html b/a01628.html deleted file mode 100644 index e9a92f75a..000000000 --- a/a01628.html +++ /dev/null @@ -1,188 +0,0 @@ - - - - - - - -CryptoAuthLib: atecc508a_config_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint32_t SN03
 
-uint32_t RevNum
 
-uint32_t SN47
 
-uint8_t SN8
 
-uint8_t Reserved0
 
-uint8_t I2C_Enable
 
-uint8_t Reserved1
 
-uint8_t I2C_Address
 
-uint8_t Reserved2
 
-uint8_t OTPmode
 
-uint8_t ChipMode
 
-uint16_t SlotConfig [16]
 
-uint8_t Counter0 [8]
 
-uint8_t Counter1 [8]
 
-uint8_t LastKeyUse [16]
 
-uint8_t UserExtra
 
-uint8_t Selector
 
-uint8_t LockValue
 
-uint8_t LockConfig
 
-uint16_t SlotLocked
 
-uint16_t RFU
 
-uint32_t X509format
 
-uint16_t KeyConfig [16]
 
-
-
- - - - diff --git a/a01632.html b/a01632.html deleted file mode 100644 index 6ebdb57e4..000000000 --- a/a01632.html +++ /dev/null @@ -1,203 +0,0 @@ - - - - - - - -CryptoAuthLib: atecc608_config_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint32_t SN03
 
-uint32_t RevNum
 
-uint32_t SN47
 
-uint8_t SN8
 
-uint8_t AES_Enable
 
-uint8_t I2C_Enable
 
-uint8_t Reserved1
 
-uint8_t I2C_Address
 
-uint8_t Reserved2
 
-uint8_t CountMatch
 
-uint8_t ChipMode
 
-uint16_t SlotConfig [16]
 
-uint8_t Counter0 [8]
 
-uint8_t Counter1 [8]
 
-uint8_t UseLock
 
-uint8_t VolatileKeyPermission
 
-uint16_t SecureBoot
 
-uint8_t KdflvLoc
 
-uint16_t KdflvStr
 
-uint8_t Reserved3 [9]
 
-uint8_t UserExtra
 
-uint8_t UserExtraAdd
 
-uint8_t LockValue
 
-uint8_t LockConfig
 
-uint16_t SlotLocked
 
-uint16_t ChipOptions
 
-uint32_t X509format
 
-uint16_t KeyConfig [16]
 
-
-
- - - - diff --git a/a01636.html b/a01636.html deleted file mode 100644 index d10760883..000000000 --- a/a01636.html +++ /dev/null @@ -1,132 +0,0 @@ - - - - - - - -CryptoAuthLib: device_execution_time_t Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
device_execution_time_t Struct Reference
-
-
- -

Structure to hold the device execution time and the opcode for the corresponding command. - More...

- -

#include <lib/calib/calib_execution.h>

- - - - - - -

-Data Fields

-uint8_t opcode
 
-uint16_t execution_time_msec
 
-

Detailed Description

-

Structure to hold the device execution time and the opcode for the corresponding command.

-
-
- - - - diff --git a/a01640.html b/a01640.html deleted file mode 100644 index c801e2867..000000000 --- a/a01640.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CL_HashContext Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CL_HashContext Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-uint32_t h [20/4]
 
-uint32_t buf [64/4]
 
-uint32_t byteCount
 
-uint32_t byteCountHi
 
-
-
- - - - diff --git a/a01644.html b/a01644.html deleted file mode 100644 index 5d365e812..000000000 --- a/a01644.html +++ /dev/null @@ -1,135 +0,0 @@ - - - - - - - -CryptoAuthLib: sw_sha256_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
sw_sha256_ctx Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-uint32_t total_msg_size
 Total number of message bytes processed.
 
-uint32_t block_size
 Number of bytes in current block.
 
-uint8_t block [(64) *2]
 Unprocessed message storage.
 
-uint32_t hash [8]
 Hash state.
 
-
-
- - - - diff --git a/a01644.js b/a01644.js deleted file mode 100644 index 4bbfadc9a..000000000 --- a/a01644.js +++ /dev/null @@ -1,7 +0,0 @@ -var a01644 = -[ - [ "block", "a01644.html#a09eac5418660881153169a7eb850dee0", null ], - [ "block_size", "a01644.html#ae49db58199cf54a15c307cb01b738c09", null ], - [ "hash", "a01644.html#a2a42d119518402fa16c3ec9f2b511669", null ], - [ "total_msg_size", "a01644.html#abda48eb7b450d079b3c04ba51d824334", null ] -]; \ No newline at end of file diff --git a/a01648.html b/a01648.html deleted file mode 100644 index 22ba6e9ed..000000000 --- a/a01648.html +++ /dev/null @@ -1,148 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_hal_list_entry_t Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_hal_list_entry_t Struct Reference
-
-
- -

Structure that holds the hal/phy maping for different interface types. - More...

- - - - - - - - -

-Data Fields

-uint8_t iface_type
 
-ATCAHAL_thal
 
ATCAHAL_tphy
 
-

Detailed Description

-

Structure that holds the hal/phy maping for different interface types.

-

Field Documentation

- -

◆ phy

- -
-
- - - - -
ATCAHAL_t* atca_hal_list_entry_t::phy
-
-

Physical interface for the specific HAL

- -
-
-
-
- - - - diff --git a/a01648.js b/a01648.js deleted file mode 100644 index f683ae52c..000000000 --- a/a01648.js +++ /dev/null @@ -1,4 +0,0 @@ -var a01648 = -[ - [ "phy", "a01648.html#afad6f95d2a6e23fe87839c64417111d3", null ] -]; \ No newline at end of file diff --git a/a01652.html b/a01652.html deleted file mode 100644 index ba8d99779..000000000 --- a/a01652.html +++ /dev/null @@ -1,205 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_hal_kit_phy_t Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_hal_kit_phy_t Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

ATCA_STATUS(* send )(void *ctx, uint8_t *txdata, uint16_t txlen)
 
ATCA_STATUS(* recv )(void *ctx, uint8_t *rxdata, uint16_t *rxlen)
 
void *(* packet_alloc )(size_t bytes)
 
void(* packet_free )(void *packet)
 
void * hal_data
 
-

Field Documentation

- -

◆ hal_data

- -
-
- - - - -
void* atca_hal_kit_phy_t::hal_data
-
-

Physical layer context

- -
-
- -

◆ packet_alloc

- -
-
- - - - -
void *(* atca_hal_kit_phy_t::packet_alloc) (size_t bytes)
-
-

Allocate a phy packet

- -
-
- -

◆ packet_free

- -
-
- - - - -
void(* atca_hal_kit_phy_t::packet_free) (void *packet)
-
-

Free a phy packet

- -
-
- -

◆ recv

- -
-
- - - - -
ATCA_STATUS(* atca_hal_kit_phy_t::recv) (void *ctx, uint8_t *rxdata, uint16_t *rxlen)
-
-

Must be a blocking receive

- -
-
- -

◆ send

- -
-
- - - - -
ATCA_STATUS(* atca_hal_kit_phy_t::send) (void *ctx, uint8_t *txdata, uint16_t txlen)
-
-

Must be a blocking send

- -
-
-
-
- - - - diff --git a/a01652.js b/a01652.js deleted file mode 100644 index 7c7261049..000000000 --- a/a01652.js +++ /dev/null @@ -1,8 +0,0 @@ -var a01652 = -[ - [ "hal_data", "a01652.html#afd90dea53ccfe0a8c15b12e5e1afaa35", null ], - [ "packet_alloc", "a01652.html#a72b6c6e17726b3e9db70d78e0c52f02c", null ], - [ "packet_free", "a01652.html#a09209305fd48261b835daf6026b7b659", null ], - [ "recv", "a01652.html#abb9616bec2cdd4f546884a45953cb054", null ], - [ "send", "a01652.html#a36eca94789cf465a9cb13e9a1ad92121", null ] -]; \ No newline at end of file diff --git a/a01656.html b/a01656.html deleted file mode 100644 index ef202f933..000000000 --- a/a01656.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_hal_shm_t Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_hal_shm_t Struct Reference
-
-
- - - - - - - - -

-Data Fields

-int recordedPID
 
-uint8_t sessionID
 
-uint8_t index
 
-
-
- - - - diff --git a/a01660.html b/a01660.html deleted file mode 100644 index 84d939751..000000000 --- a/a01660.html +++ /dev/null @@ -1,144 +0,0 @@ - - - - - - - -CryptoAuthLib: atcaI2Cmaster Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcaI2Cmaster Struct Reference
-
-
- -

this is the hal_data for ATCA HAL for ASF SERCOM - More...

- -

#include <lib/hal/hal_uc3_i2c_asf.h>

- - - - - - - - - - - - - - -

-Data Fields

-int id
 
-i2c_config_t conf
 
-int ref_ct
 
-uint8_t twi_id
 
-avr32_twi_t * twi_master_instance
 
-int bus_index
 
-

Detailed Description

-

this is the hal_data for ATCA HAL for ASF SERCOM

-
-
- - - - diff --git a/a01664.html b/a01664.html deleted file mode 100644 index 3e5a92570..000000000 --- a/a01664.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: i2c_start_instance Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
i2c_start_instance Struct Reference
-
-
- - - - - - -

-Data Fields

-struct i2c_m_sync_desc * i2c_descriptor
 
-start_change_baudrate change_baudrate
 
-
-
- - - - diff --git a/a01668.html b/a01668.html deleted file mode 100644 index 79a907894..000000000 --- a/a01668.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_i2c_host_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_i2c_host_s Struct Reference
-
-
- - - - - - -

-Data Fields

-char i2c_file [16]
 
-int ref_ct
 
-
-
- - - - diff --git a/a01672.html b/a01672.html deleted file mode 100644 index edd432e89..000000000 --- a/a01672.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_spi_host_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_spi_host_s Struct Reference
-
-
- - - - - - -

-Data Fields

-char spi_file [20]
 
-int f_spi
 
-
-
- - - - diff --git a/a01676.html b/a01676.html deleted file mode 100644 index dd113f97e..000000000 --- a/a01676.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_uart_host_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_uart_host_s Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-char uart_file [20]
 
-int fd_uart
 
-int ref_ct
 
-HANDLE hSerial
 
-
-
- - - - diff --git a/a01680.html b/a01680.html deleted file mode 100644 index ee1fdf313..000000000 --- a/a01680.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: i2c_sam0_instance Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
i2c_sam0_instance Struct Reference
-
-
- - - - - - -

-Data Fields

-struct i2c_master_module * i2c_instance
 
-sam0_change_baudrate change_baudrate
 
-
-
- - - - diff --git a/a01684.html b/a01684.html deleted file mode 100644 index 55ad2583b..000000000 --- a/a01684.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: i2c_sam_instance Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
i2c_sam_instance Struct Reference
-
-
- - - - - - -

-Data Fields

-Twi * i2c_instance
 
-sam_change_baudrate change_baudrate
 
-
-
- - - - diff --git a/a01688.html b/a01688.html deleted file mode 100644 index 26662e52c..000000000 --- a/a01688.html +++ /dev/null @@ -1,141 +0,0 @@ - - - - - - - -CryptoAuthLib: atcaSWImaster Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcaSWImaster Struct Reference
-
-
- -

this is the hal_data for ATCA HAL for ASF SERCOM - More...

- -

#include <lib/hal/swi_uart_start.h>

- - - - - - - - - - - - -

-Data Fields

-struct usart_module usart_instance
 
-int ref_ct
 
-int bus_index
 
-struct usart_sync_descriptor USART_SWI
 
-uint32_t sercom_core_freq
 
-

Detailed Description

-

this is the hal_data for ATCA HAL for ASF SERCOM

-
-
- - - - diff --git a/a01692.html b/a01692.html deleted file mode 100644 index e4a0db2af..000000000 --- a/a01692.html +++ /dev/null @@ -1,158 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_temp_key Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_temp_key Struct Reference
-
-
- -

Structure to hold TempKey fields. - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t value [ATCA_KEY_SIZE *2]
 Value of TempKey (64 bytes for ATECC608 only)
 
-unsigned key_id: 4
 If TempKey was derived from a slot or transport key (GenDig or GenKey), that key ID is saved here.
 
-unsigned source_flag: 1
 Indicates id TempKey started from a random nonce (0) or not (1).
 
-unsigned gen_dig_data: 1
 TempKey was derived from the GenDig command.
 
-unsigned gen_key_data: 1
 TempKey was derived from the GenKey command (ATECC devices only).
 
-unsigned no_mac_flag: 1
 TempKey was derived from a key that has the NoMac bit set preventing the use of the MAC command. Known as CheckFlag in ATSHA devices).
 
-unsigned valid: 1
 TempKey is valid.
 
-uint8_t is_64
 TempKey has 64 bytes of valid data.
 
-

Detailed Description

-

Structure to hold TempKey fields.

-
-
- - - - diff --git a/a01692.js b/a01692.js deleted file mode 100644 index 118a3981c..000000000 --- a/a01692.js +++ /dev/null @@ -1,11 +0,0 @@ -var a01692 = -[ - [ "gen_dig_data", "a01692.html#afde9c1e6769f60992c7fb10280cdd199", null ], - [ "gen_key_data", "a01692.html#a82e1988542001c7499700f3e1b191339", null ], - [ "is_64", "a01692.html#a0f766111832176ea2c8eda8fbf13743d", null ], - [ "key_id", "a01692.html#a70b94559475530db2be60e9d30758098", null ], - [ "no_mac_flag", "a01692.html#ae381dabe56bdd77f48a8241050d16d82", null ], - [ "source_flag", "a01692.html#abd69b6707bf73ae91675a6a0a250ca40", null ], - [ "valid", "a01692.html#aadedd52833b6ce041dfb9e923b448481", null ], - [ "value", "a01692.html#abf76b14a42ef4d7f9d57a1d5edc6cf10", null ] -]; \ No newline at end of file diff --git a/a01696.html b/a01696.html deleted file mode 100644 index bb6aba3ed..000000000 --- a/a01696.html +++ /dev/null @@ -1,141 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_include_data_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_include_data_in_out Struct Reference
-
-
- -

Input / output parameters for function atca_include_data(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - -

-Data Fields

-uint8_t * p_temp
 [out] pointer to output buffer
 
-const uint8_t * otp
 [in] pointer to one-time-programming data
 
-const uint8_t * sn
 [in] pointer to serial number data
 
-uint8_t mode
 
-

Detailed Description

-

Input / output parameters for function atca_include_data().

-
-
- - - - diff --git a/a01696.js b/a01696.js deleted file mode 100644 index d940eaa96..000000000 --- a/a01696.js +++ /dev/null @@ -1,6 +0,0 @@ -var a01696 = -[ - [ "otp", "a01447.html#gaf07ffae9f842764c321a060ead038ac2", null ], - [ "p_temp", "a01447.html#ga80ad9effe2957aaa0e604b175fcdbc63", null ], - [ "sn", "a01447.html#ga46b121ddb13c417e4d65a3fc2f6c365b", null ] -]; \ No newline at end of file diff --git a/a01700.html b/a01700.html deleted file mode 100644 index 1db299324..000000000 --- a/a01700.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_nonce_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_nonce_in_out Struct Reference
-
-
- -

Input/output parameters for function atca_nonce(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 [in] Mode parameter used in Nonce command (Param1).
 
-uint16_t zero
 [in] Zero parameter used in Nonce command (Param2).
 
-const uint8_t * num_in
 [in] Pointer to 20-byte NumIn data used in Nonce command.
 
-const uint8_t * rand_out
 [in] Pointer to 32-byte RandOut data from Nonce command.
 
-struct atca_temp_keytemp_key
 [in,out] Pointer to TempKey structure.
 
-

Detailed Description

-

Input/output parameters for function atca_nonce().

-
-
- - - - diff --git a/a01700.js b/a01700.js deleted file mode 100644 index 460afd1dc..000000000 --- a/a01700.js +++ /dev/null @@ -1,8 +0,0 @@ -var a01700 = -[ - [ "mode", "a01447.html#gabaedd7126cc73449d73843ef3b8958c0", null ], - [ "num_in", "a01447.html#ga7627ba268edc51f4e185e956bd215496", null ], - [ "rand_out", "a01447.html#gadc3dc30e978bcf18656aedb6dd4a62f2", null ], - [ "temp_key", "a01447.html#gaf89317aa1f759fc58f67158abd314d1b", null ], - [ "zero", "a01447.html#gaee2c8a03b0aa78ab07b64253f2c48b22", null ] -]; \ No newline at end of file diff --git a/a01704.html b/a01704.html deleted file mode 100644 index cc8da54a1..000000000 --- a/a01704.html +++ /dev/null @@ -1,135 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_io_decrypt_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_io_decrypt_in_out Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-const uint8_t * io_key
 IO protection key (32 bytes).
 
-const uint8_t * out_nonce
 OutNonce returned from command (32 bytes).
 
-uint8_t * data
 As input, encrypted data. As output, decrypted data.
 
-size_t data_size
 Size of data in bytes (32 or 64).
 
-
-
- - - - diff --git a/a01704.js b/a01704.js deleted file mode 100644 index 7c498447b..000000000 --- a/a01704.js +++ /dev/null @@ -1,7 +0,0 @@ -var a01704 = -[ - [ "data", "a01704.html#ab910eb48d182d8f191da149339fd6c51", null ], - [ "data_size", "a01704.html#a1d7f86d28ad089ae4401043c117be844", null ], - [ "io_key", "a01704.html#aa6d2797ec2cdef70aa51438e96e2a301", null ], - [ "out_nonce", "a01704.html#a597e62aa42a9971b98a5d76c7f1baef5", null ] -]; \ No newline at end of file diff --git a/a01708.html b/a01708.html deleted file mode 100644 index 39444da2a..000000000 --- a/a01708.html +++ /dev/null @@ -1,155 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_verify_mac Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_verify_mac Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 Mode (Param1) parameter used in Verify command.
 
-uint16_t key_id
 KeyID (Param2) used in Verify command.
 
-const uint8_t * signature
 Signature used in Verify command (64 bytes).
 
-const uint8_t * other_data
 OtherData used in Verify command (19 bytes).
 
-const uint8_t * msg_dig_buf
 Message digest buffer (64 bytes).
 
-const uint8_t * io_key
 IO protection key value (32 bytes).
 
-const uint8_t * sn
 Serial number (9 bytes).
 
-const atca_temp_key_ttemp_key
 TempKey.
 
-uint8_t * mac
 Calculated verification MAC is returned here (32 bytes).
 
-
-
- - - - diff --git a/a01708.js b/a01708.js deleted file mode 100644 index 5e4b63e99..000000000 --- a/a01708.js +++ /dev/null @@ -1,12 +0,0 @@ -var a01708 = -[ - [ "io_key", "a01708.html#a93cba5300302d50e26f70457f84df0da", null ], - [ "key_id", "a01708.html#ad4c4854451abd367cf8a13aad5f6372b", null ], - [ "mac", "a01708.html#afc99cd20d6193df126ae2b32b42f7546", null ], - [ "mode", "a01708.html#ac90559108804dc16ac1ac91a0212bff9", null ], - [ "msg_dig_buf", "a01708.html#acb0498448f486070d33e121ade525c64", null ], - [ "other_data", "a01708.html#ad89fec1f50b8e8ffc890d3683c4b5afe", null ], - [ "signature", "a01708.html#ad94d1c8d1635e597bd70823a207dc727", null ], - [ "sn", "a01708.html#a5e63ccd727b87d022ed0eedc0446410f", null ], - [ "temp_key", "a01708.html#ac9231df54b2f77c5061bdfbcea927a5e", null ] -]; \ No newline at end of file diff --git a/a01712.html b/a01712.html deleted file mode 100644 index 619ce0f8c..000000000 --- a/a01712.html +++ /dev/null @@ -1,139 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_secureboot_enc_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_secureboot_enc_in_out Struct Reference
-
-
- - - - - - - - - - - - - - - - - -

-Data Fields

-const uint8_t * io_key
 IO protection key value (32 bytes)
 
-const struct atca_temp_keytemp_key
 Current value of TempKey.
 
-const uint8_t * digest
 Plaintext digest as input.
 
-uint8_t * hashed_key
 Calculated key is returned here (32 bytes)
 
-uint8_t * digest_enc
 Encrypted (ciphertext) digest is return here (32 bytes)
 
-
-
- - - - diff --git a/a01712.js b/a01712.js deleted file mode 100644 index d00cb75d4..000000000 --- a/a01712.js +++ /dev/null @@ -1,8 +0,0 @@ -var a01712 = -[ - [ "digest", "a01712.html#a1da30fd41605f42e0b0dd68d75c59bd9", null ], - [ "digest_enc", "a01712.html#aac21cf3b5207c0dc25358d6360953380", null ], - [ "hashed_key", "a01712.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52", null ], - [ "io_key", "a01712.html#aeb02c7cf4fbaf40307821bc38160ab8d", null ], - [ "temp_key", "a01712.html#ac57e99b5d0069d7bd733bcf056cc56e1", null ] -]; \ No newline at end of file diff --git a/a01716.html b/a01716.html deleted file mode 100644 index 015c0c6e7..000000000 --- a/a01716.html +++ /dev/null @@ -1,147 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_secureboot_mac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_secureboot_mac_in_out Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 SecureBoot mode (param1)
 
-uint16_t param2
 SecureBoot param2.
 
-uint16_t secure_boot_config
 SecureBootConfig value from configuration zone.
 
-const uint8_t * hashed_key
 Hashed key. SHA256(IO Protection Key | TempKey)
 
-const uint8_t * digest
 Digest (unencrypted)
 
-const uint8_t * signature
 Signature (can be NULL if not required)
 
-uint8_t * mac
 MAC is returned here.
 
-
-
- - - - diff --git a/a01716.js b/a01716.js deleted file mode 100644 index 3b595b236..000000000 --- a/a01716.js +++ /dev/null @@ -1,10 +0,0 @@ -var a01716 = -[ - [ "digest", "a01716.html#ad3a988f3c029fff3805a8a9dd4caaaa5", null ], - [ "hashed_key", "a01716.html#a9ebeb5a66a80189ae8e7bb2ea97701c9", null ], - [ "mac", "a01716.html#aeb4c9a28028bd625ac3650b39392cf07", null ], - [ "mode", "a01716.html#a2c6c43889156357aee27b3b09657ebd2", null ], - [ "param2", "a01716.html#ac94f545daf7381aeb770fb42b467d338", null ], - [ "secure_boot_config", "a01716.html#a28771c8ed4754eabcb50649d753ee956", null ], - [ "signature", "a01716.html#acafb471d7cc7a71d613503760930d9f5", null ] -]; \ No newline at end of file diff --git a/a01720.html b/a01720.html deleted file mode 100644 index 75853e09a..000000000 --- a/a01720.html +++ /dev/null @@ -1,158 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_mac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_mac_in_out Struct Reference
-
-
- -

Input/output parameters for function atca_mac(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 [in] Mode parameter used in MAC command (Param1).
 
-uint16_t key_id
 [in] KeyID parameter used in MAC command (Param2).
 
-const uint8_t * challenge
 [in] Pointer to 32-byte Challenge data used in MAC command, depending on mode.
 
-const uint8_t * key
 [in] Pointer to 32-byte key used to generate MAC digest.
 
-const uint8_t * otp
 [in] Pointer to 11-byte OTP, optionally included in MAC digest, depending on mode.
 
-const uint8_t * sn
 [in] Pointer to 9-byte SN, optionally included in MAC digest, depending on mode.
 
-uint8_t * response
 [out] Pointer to 32-byte SHA-256 digest (MAC).
 
-struct atca_temp_keytemp_key
 [in,out] Pointer to TempKey structure.
 
-

Detailed Description

-

Input/output parameters for function atca_mac().

-
-
- - - - diff --git a/a01720.js b/a01720.js deleted file mode 100644 index f7f9d18f6..000000000 --- a/a01720.js +++ /dev/null @@ -1,11 +0,0 @@ -var a01720 = -[ - [ "challenge", "a01447.html#gac4c2db1a307043c7677e76310911d944", null ], - [ "key", "a01447.html#ga84ee714046fea52fb6b334e37b958c89", null ], - [ "key_id", "a01447.html#ga326ed9df4c9b966616e0b1a73f1b2796", null ], - [ "mode", "a01447.html#ga25187965ed87f828c98e4a20c93166e8", null ], - [ "otp", "a01447.html#gac9d561caddec61e481d241a88d73b653", null ], - [ "response", "a01447.html#ga3237adaae1e30c7ed469405e1ebfb435", null ], - [ "sn", "a01447.html#gaba323f1307689412ea6cc1e54810edb9", null ], - [ "temp_key", "a01447.html#ga7bf1d912d79b62cc598395642d77365f", null ] -]; \ No newline at end of file diff --git a/a01724.html b/a01724.html deleted file mode 100644 index 09f87ad6e..000000000 --- a/a01724.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_hmac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_hmac_in_out Struct Reference
-
-
- -

Input/output parameters for function atca_hmac(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 [in] Mode parameter used in HMAC command (Param1).
 
-uint16_t key_id
 [in] KeyID parameter used in HMAC command (Param2).
 
-const uint8_t * key
 [in] Pointer to 32-byte key used to generate HMAC digest.
 
-const uint8_t * otp
 [in] Pointer to 11-byte OTP, optionally included in HMAC digest, depending on mode.
 
-const uint8_t * sn
 [in] Pointer to 9-byte SN, optionally included in HMAC digest, depending on mode.
 
-uint8_t * response
 [out] Pointer to 32-byte SHA-256 HMAC digest.
 
-struct atca_temp_keytemp_key
 [in,out] Pointer to TempKey structure.
 
-

Detailed Description

-

Input/output parameters for function atca_hmac().

-
-
- - - - diff --git a/a01724.js b/a01724.js deleted file mode 100644 index 6d1cdcc06..000000000 --- a/a01724.js +++ /dev/null @@ -1,10 +0,0 @@ -var a01724 = -[ - [ "key", "a01447.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0", null ], - [ "key_id", "a01447.html#ga10f04328eda5cffcea79652ac3509c2d", null ], - [ "mode", "a01447.html#ga1616d5efe59851d97fed27b47923c786", null ], - [ "otp", "a01447.html#gaad38386d9ec6afcdcd39eab98e2a4a1c", null ], - [ "response", "a01447.html#gacf6675faad5f7a43ca3fbec2108f57cd", null ], - [ "sn", "a01447.html#gaf0d7fe9a16cad1ba38c7daca4295823b", null ], - [ "temp_key", "a01447.html#ga7507880718dc536d6122f0401073b8c8", null ] -]; \ No newline at end of file diff --git a/a01728.html b/a01728.html deleted file mode 100644 index c39a42b00..000000000 --- a/a01728.html +++ /dev/null @@ -1,170 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_gen_dig_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_gen_dig_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_gen_dig(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t zone
 [in] Zone/Param1 for the GenDig command
 
-uint16_t key_id
 [in] KeyId/Param2 for the GenDig command
 
-uint16_t slot_conf
 [in] Slot config for the GenDig command
 
-uint16_t key_conf
 [in] Key config for the GenDig command
 
-uint8_t slot_locked
 [in] slot locked for the GenDig command
 
-uint32_t counter
 [in] counter for the GenDig command
 
-bool is_key_nomac
 [in] Set to true if the slot pointed to be key_id has the SotConfig.NoMac bit set
 
-const uint8_t * sn
 [in] Device serial number SN[0:8]. Only SN[0:1] and SN[8] are required though.
 
-const uint8_t * stored_value
 [in] 32-byte slot value, config block, OTP block as specified by the Zone/KeyId parameters
 
-const uint8_t * other_data
 [in] 32-byte value for shared nonce zone, 4-byte value if is_key_nomac is true, ignored and/or NULL otherwise
 
-struct atca_temp_keytemp_key
 [inout] Current state of TempKey
 
-

Detailed Description

-

Input/output parameters for function atcah_gen_dig().

-
-
- - - - diff --git a/a01728.js b/a01728.js deleted file mode 100644 index a2ce69154..000000000 --- a/a01728.js +++ /dev/null @@ -1,14 +0,0 @@ -var a01728 = -[ - [ "counter", "a01728.html#adb6743838ca7d8bd3ad390b7608492ba", null ], - [ "is_key_nomac", "a01728.html#a45ea4bd1941244391f04343f993bacf0", null ], - [ "key_conf", "a01728.html#a089cd58d7f5518ee9016eb40c281bdfc", null ], - [ "key_id", "a01728.html#a8bb5e1f0ea943f4749ebf6faa450288b", null ], - [ "other_data", "a01728.html#a3b5c9fd883d9daf4d6a42bbf1aba936d", null ], - [ "slot_conf", "a01728.html#a2d5854b66b7bc7246fa718a5d485d3fb", null ], - [ "slot_locked", "a01728.html#a787c86043a8c305bd23256248614a3f7", null ], - [ "sn", "a01728.html#ad8ca9262cbe607d0c017e12285c3d951", null ], - [ "stored_value", "a01728.html#a4f63b5946df323ef66910d4a0cdf2491", null ], - [ "temp_key", "a01728.html#aa62f8da7dae46c095c603433ae26fedf", null ], - [ "zone", "a01728.html#aa4922c43b6dfecb5e39e286e960cdd88", null ] -]; \ No newline at end of file diff --git a/a01732.html b/a01732.html deleted file mode 100644 index 6022db06b..000000000 --- a/a01732.html +++ /dev/null @@ -1,143 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_diversified_key_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_diversified_key_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_gendivkey(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - -

-Data Fields

-const uint8_t * parent_key
 
-const uint8_t * other_data
 
-const uint8_t * sn
 [in] Device serial number SN[0:8]. Only SN[0:1] and SN[8] are required though.
 
-const uint8_t * input_data
 
-struct atca_temp_keytemp_key
 [inout] Current state of TempKey
 
-

Detailed Description

-

Input/output parameters for function atcah_gendivkey().

-
-
- - - - diff --git a/a01732.js b/a01732.js deleted file mode 100644 index 965eb422a..000000000 --- a/a01732.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01732 = -[ - [ "sn", "a01732.html#ab2ca3ae12be534d58e22bb68d6042ea3", null ], - [ "temp_key", "a01732.html#a8406e4a6d09e2f6b8e3bfc12579d8653", null ] -]; \ No newline at end of file diff --git a/a01736.html b/a01736.html deleted file mode 100644 index 419a1f322..000000000 --- a/a01736.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_write_mac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_write_mac_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t zone
 Zone/Param1 for the Write or PrivWrite command.
 
-uint16_t key_id
 KeyID/Param2 for the Write or PrivWrite command.
 
-const uint8_t * sn
 Device serial number SN[0:8]. Only SN[0:1] and SN[8] are required though.
 
-const uint8_t * input_data
 Data to be encrypted. 32 bytes for Write command, 36 bytes for PrivWrite command.
 
-uint8_t * encrypted_data
 Encrypted version of input_data will be returned here. 32 bytes for Write command, 36 bytes for PrivWrite command.
 
-uint8_t * auth_mac
 Write MAC will be returned here. 32 bytes.
 
-struct atca_temp_keytemp_key
 Current state of TempKey.
 
-

Detailed Description

-

Input/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac().

-
-
- - - - diff --git a/a01736.js b/a01736.js deleted file mode 100644 index a2cdb71ac..000000000 --- a/a01736.js +++ /dev/null @@ -1,10 +0,0 @@ -var a01736 = -[ - [ "auth_mac", "a01736.html#aaa57ce590925c0efe017af1d4457d479", null ], - [ "encrypted_data", "a01736.html#a38f7761577529e0bbf52cd0b8c17658b", null ], - [ "input_data", "a01736.html#a423e1db9e86ff369d49d78d8f5ea2525", null ], - [ "key_id", "a01736.html#a213cc14f2d1c67be382cb8918aca4362", null ], - [ "sn", "a01736.html#a2c43368d48a41123da5f69356b6f29f5", null ], - [ "temp_key", "a01736.html#a8786d124038d3516d98f2456f19985cf", null ], - [ "zone", "a01736.html#adf4e9d92c10469c78810f2881a95843b", null ] -]; \ No newline at end of file diff --git a/a01740.html b/a01740.html deleted file mode 100644 index 1d3ea44cd..000000000 --- a/a01740.html +++ /dev/null @@ -1,150 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_derive_key_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_derive_key_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_derive_key(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 Mode (param 1) of the derive key command.
 
-uint16_t target_key_id
 Key ID (param 2) of the target slot to run the command on.
 
-const uint8_t * sn
 Device serial number SN[0:8]. Only SN[0:1] and SN[8] are required though.
 
-const uint8_t * parent_key
 Parent key to be used in the derive key calculation (32 bytes).
 
-uint8_t * target_key
 Derived key will be returned here (32 bytes).
 
-struct atca_temp_keytemp_key
 Current state of TempKey.
 
-

Detailed Description

-

Input/output parameters for function atcah_derive_key().

-
-
- - - - diff --git a/a01740.js b/a01740.js deleted file mode 100644 index ee1781cbb..000000000 --- a/a01740.js +++ /dev/null @@ -1,9 +0,0 @@ -var a01740 = -[ - [ "mode", "a01740.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9", null ], - [ "parent_key", "a01740.html#ad9e30a4f9006923af0d6668768598737", null ], - [ "sn", "a01740.html#a0e321ea27e36c985abacf4510619c9f0", null ], - [ "target_key", "a01740.html#aa2c05475b504237c0ae9db5d48cbb0fc", null ], - [ "target_key_id", "a01740.html#a5b623ae9fa4501c996e4c54842eaa548", null ], - [ "temp_key", "a01740.html#a1a4a8993461b0675edcb2d162ec8823b", null ] -]; \ No newline at end of file diff --git a/a01744.html b/a01744.html deleted file mode 100644 index 53735109b..000000000 --- a/a01744.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_derive_key_mac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_derive_key_mac_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_derive_key_mac(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 Mode (param 1) of the derive key command.
 
-uint16_t target_key_id
 Key ID (param 2) of the target slot to run the command on.
 
-const uint8_t * sn
 Device serial number SN[0:8]. Only SN[0:1] and SN[8] are required though.
 
-const uint8_t * parent_key
 Parent key to be used in the derive key calculation (32 bytes).
 
-uint8_t * mac
 DeriveKey MAC will be returned here.
 
-

Detailed Description

-

Input/output parameters for function atcah_derive_key_mac().

-
-
- - - - diff --git a/a01744.js b/a01744.js deleted file mode 100644 index 9b92d94a3..000000000 --- a/a01744.js +++ /dev/null @@ -1,8 +0,0 @@ -var a01744 = -[ - [ "mac", "a01744.html#a0576f1886490bbb3656b420f5bb65e65", null ], - [ "mode", "a01744.html#ae33f3603840fd0bb8ada551ff168ea58", null ], - [ "parent_key", "a01744.html#acb88b64064f725ca81245f2afe6f57f5", null ], - [ "sn", "a01744.html#aeb90e80a488f568c4a193c1fe851c5d4", null ], - [ "target_key_id", "a01744.html#ad2a2e2e1126d1c022be6a84af7f5e4e3", null ] -]; \ No newline at end of file diff --git a/a01748.html b/a01748.html deleted file mode 100644 index 8906b898a..000000000 --- a/a01748.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_decrypt_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_decrypt_in_out Struct Reference
-
-
- -

Input/output parameters for function atca_decrypt(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - -

-Data Fields

-uint8_t * crypto_data
 [in,out] Pointer to 32-byte data. Input encrypted data from Read command (Contents field), output decrypted.
 
-struct atca_temp_keytemp_key
 [in,out] Pointer to TempKey structure.
 
-

Detailed Description

-

Input/output parameters for function atca_decrypt().

-
-
- - - - diff --git a/a01748.js b/a01748.js deleted file mode 100644 index c7af863cc..000000000 --- a/a01748.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01748 = -[ - [ "crypto_data", "a01447.html#ga3d18f12db79908a5a1e831367391aa1c", null ], - [ "temp_key", "a01447.html#ga8305d0f433345a973f638dfea229a274", null ] -]; \ No newline at end of file diff --git a/a01752.html b/a01752.html deleted file mode 100644 index b265047b4..000000000 --- a/a01752.html +++ /dev/null @@ -1,193 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_check_mac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_check_mac_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_check_mac(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 [in] CheckMac command Mode
 
-uint16_t key_id
 [in] CheckMac command KeyID
 
-const uint8_t * sn
 [in] Device serial number SN[0:8]. Only SN[0:1] and SN[8] are required though.
 
-const uint8_t * client_chal
 [in] ClientChal data, 32 bytes. Can be NULL if mode[0] is 1.
 
-uint8_t * client_resp
 [out] Calculated ClientResp will be returned here.
 
-const uint8_t * other_data
 [in] OtherData, 13 bytes
 
-const uint8_t * otp
 [in] First 8 bytes of the OTP zone data. Can be NULL is mode[5] is 0.
 
const uint8_t * slot_key
 
const uint8_t * target_key
 
-struct atca_temp_keytemp_key
 [in,out] Current state of TempKey. Required if mode[0] or mode[1] are 1.
 
-

Detailed Description

-

Input/output parameters for function atcah_check_mac().

-

Field Documentation

- -

◆ slot_key

- -
-
- - - - -
const uint8_t* atca_check_mac_in_out::slot_key
-
-

[in] 32 byte key value in the slot specified by slot_id. Can be NULL if mode[1] is 1.

- -
-
- -

◆ target_key

- -
-
- - - - -
const uint8_t* atca_check_mac_in_out::target_key
-
-

[in] If this is not NULL, it assumes CheckMac copy is enabled for the specified key_id (ReadKey=0). If key_id is even, this should be the 32-byte key value for the slot key_id+1, otherwise this should be set to slot_key.

- -
-
-
-
- - - - diff --git a/a01752.js b/a01752.js deleted file mode 100644 index e0a815655..000000000 --- a/a01752.js +++ /dev/null @@ -1,13 +0,0 @@ -var a01752 = -[ - [ "client_chal", "a01752.html#ac4f5b60a59fa29d78c720c2be434c5c3", null ], - [ "client_resp", "a01752.html#a4daaa0bccc92503ccc31eaed78eb7409", null ], - [ "key_id", "a01752.html#a11807b6f83083ad17c66640c77c78973", null ], - [ "mode", "a01752.html#a0619aaead2b82313d761804f40c24926", null ], - [ "other_data", "a01752.html#af2d1c007ab43e8556a917efc5bcee9c8", null ], - [ "otp", "a01752.html#ac97a41612246b0527ed1a242bbe28a99", null ], - [ "slot_key", "a01752.html#aad7093cf772d6e337b3c09af9cea92ac", null ], - [ "sn", "a01752.html#a26f951076270f2389044a69b30c86d74", null ], - [ "target_key", "a01752.html#ae00a5116b4b55fb2bc6546ca3156522e", null ], - [ "temp_key", "a01752.html#a605e9f150203a43a550e68e940233245", null ] -]; \ No newline at end of file diff --git a/a01756.html b/a01756.html deleted file mode 100644 index e0bcecb78..000000000 --- a/a01756.html +++ /dev/null @@ -1,147 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_resp_mac_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_resp_mac_in_out Struct Reference
-
-
- -

Input/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function. - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - -

-Data Fields

-const uint8_t * slot_key
 
-uint8_t mode
 
-uint16_t key_id
 
-const uint8_t * sn
 
-uint8_t * client_resp
 
-uint8_t checkmac_result
 
-uint8_t * mac_output
 
-

Detailed Description

-

Input/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function.

-
-
- - - - diff --git a/a01760.html b/a01760.html deleted file mode 100644 index 5eb5b9307..000000000 --- a/a01760.html +++ /dev/null @@ -1,142 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_verify_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_verify_in_out Struct Reference
-
-
- -

Input/output parameters for function atcah_verify(). - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - -

-Data Fields

-uint16_t curve_type
 [in] Curve type used in Verify command (Param2).
 
-const uint8_t * signature
 [in] Pointer to ECDSA signature to be verified
 
-const uint8_t * public_key
 [in] Pointer to the public key to be used for verification
 
-struct atca_temp_keytemp_key
 [in,out] Pointer to TempKey structure.
 
-

Detailed Description

-

Input/output parameters for function atcah_verify().

-
-
- - - - diff --git a/a01760.js b/a01760.js deleted file mode 100644 index f308c6f1d..000000000 --- a/a01760.js +++ /dev/null @@ -1,7 +0,0 @@ -var a01760 = -[ - [ "curve_type", "a01447.html#gadf3470738c60dbe57b33fb1e6005f40e", null ], - [ "public_key", "a01447.html#gaf61f82fe19690b80bf370b295c58920b", null ], - [ "signature", "a01447.html#gad2e0f0dbb511520e5d79bdb4ab649c22", null ], - [ "temp_key", "a01447.html#ga4409850783c991d3b429ee78e67c9813", null ] -]; \ No newline at end of file diff --git a/a01764.html b/a01764.html deleted file mode 100644 index a5db25dcd..000000000 --- a/a01764.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_gen_key_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_gen_key_in_out Struct Reference
-
-
- -

Input/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function. - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 [in] GenKey Mode
 
-uint16_t key_id
 [in] GenKey KeyID
 
-const uint8_t * public_key
 [in] Public key to be used in the PubKey digest. X and Y integers in big-endian format. 64 bytes for P256 curve.
 
-size_t public_key_size
 [in] Total number of bytes in the public key. 64 bytes for P256 curve.
 
-const uint8_t * other_data
 [in] 3 bytes required when bit 4 of the mode is set. Can be NULL otherwise.
 
-const uint8_t * sn
 [in] Device serial number SN[0:8] (9 bytes). Only SN[0:1] and SN[8] are required though.
 
-struct atca_temp_keytemp_key
 [in,out] As input the current state of TempKey. As output, the resulting PubKEy digest.
 
-

Detailed Description

-

Input/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function.

-
-
- - - - diff --git a/a01764.js b/a01764.js deleted file mode 100644 index 3aef25ba8..000000000 --- a/a01764.js +++ /dev/null @@ -1,10 +0,0 @@ -var a01764 = -[ - [ "key_id", "a01764.html#a2582ecc282bd3d712918e6109a18c7d2", null ], - [ "mode", "a01764.html#afa39cec9e8d332618910a0f519b5b48d", null ], - [ "other_data", "a01764.html#a9aa171dc3ed5403822d780a2d0220d61", null ], - [ "public_key", "a01764.html#ad6eba00bdedd4375c93419eb4cda6850", null ], - [ "public_key_size", "a01764.html#a44b034625f63afcfaab306ac6275cd5b", null ], - [ "sn", "a01764.html#a17c83c0e810b2bf35b364f026e1cecb0", null ], - [ "temp_key", "a01764.html#afa11fd0401f2d8884d385ffc77962ec3", null ] -]; \ No newline at end of file diff --git a/a01768.html b/a01768.html deleted file mode 100644 index 5e7cdcd4f..000000000 --- a/a01768.html +++ /dev/null @@ -1,178 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_sign_internal_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_sign_internal_in_out Struct Reference
-
-
- -

Input/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function. - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-uint8_t mode
 [in] Sign Mode
 
-uint16_t key_id
 [in] Sign KeyID
 
-uint16_t slot_config
 [in] SlotConfig[TempKeyFlags.keyId]
 
-uint16_t key_config
 [in] KeyConfig[TempKeyFlags.keyId]
 
-uint8_t use_flag
 [in] UseFlag[TempKeyFlags.keyId], 0x00 for slots 8 and above and for ATECC508A
 
-uint8_t update_count
 [in] UpdateCount[TempKeyFlags.keyId], 0x00 for slots 8 and above and for ATECC508A
 
-bool is_slot_locked
 [in] Is TempKeyFlags.keyId slot locked.
 
-bool for_invalidate
 [in] Set to true if this will be used for the Verify(Invalidate) command.
 
-const uint8_t * sn
 [in] Device serial number SN[0:8] (9 bytes)
 
-const struct atca_temp_keytemp_key
 [in] The current state of TempKey.
 
-uint8_t * message
 [out] Full 55 byte message the Sign(internal) command will build. Can be NULL if not required.
 
-uint8_t * verify_other_data
 [out] The 19 byte OtherData bytes to be used with the Verify(In/Validate) command. Can be NULL if not required.
 
-uint8_t * digest
 [out] SHA256 digest of the full 55 byte message. Can be NULL if not required.
 
-

Detailed Description

-

Input/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function.

-
-
- - - - diff --git a/a01768.js b/a01768.js deleted file mode 100644 index de13aa458..000000000 --- a/a01768.js +++ /dev/null @@ -1,16 +0,0 @@ -var a01768 = -[ - [ "digest", "a01768.html#a1765e3454849c67fa19a307f724cb8e3", null ], - [ "for_invalidate", "a01768.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7", null ], - [ "is_slot_locked", "a01768.html#a1d994ea91e9234808e6f0320897ab434", null ], - [ "key_config", "a01768.html#a534292cebeb2a65e3198e30061b2c35b", null ], - [ "key_id", "a01768.html#a426f70e97a2f191f021227175699185c", null ], - [ "message", "a01768.html#a5649ccf733b2512db9917036a102fb14", null ], - [ "mode", "a01768.html#a2145615f3148fb8a428657fa8020aad1", null ], - [ "slot_config", "a01768.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154", null ], - [ "sn", "a01768.html#a374985826f0c1b5c6aa52370f9871841", null ], - [ "temp_key", "a01768.html#af8c982fdcb8edc1ff6b1e838fab281ac", null ], - [ "update_count", "a01768.html#afd69516235ce1a7bee9c04146beb93d8", null ], - [ "use_flag", "a01768.html#a4d03aca0b8dd153e5b939a684f7c2955", null ], - [ "verify_other_data", "a01768.html#a2a0f2ee83e6825f92e259ee104fbb67d", null ] -]; \ No newline at end of file diff --git a/a01772.html b/a01772.html deleted file mode 100644 index 6143c7831..000000000 --- a/a01772.html +++ /dev/null @@ -1,141 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_session_key_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_session_key_in_out Struct Reference
-
-
- -

Input/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function. - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - -

-Data Fields

-uint8_t * transport_key
 
-uint16_t transport_key_id
 
-const uint8_t * sn
 
-uint8_t * nonce
 
-uint8_t * session_key
 
-

Detailed Description

-

Input/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function.

-
-
- - - - diff --git a/a01776.html b/a01776.html deleted file mode 100644 index 6ca35449f..000000000 --- a/a01776.html +++ /dev/null @@ -1,141 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_delete_in_out Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_delete_in_out Struct Reference
-
-
- -

Input/Output paramters for calculating the mac.Used with Delete command. - More...

- -

#include <lib/host/atca_host.h>

- - - - - - - - - - - - -

-Data Fields

-uint16_t key_id
 
-const uint8_t * sn
 
-uint8_t * nonce
 
-const uint8_t * key
 
-uint8_t * mac
 
-

Detailed Description

-

Input/Output paramters for calculating the mac.Used with Delete command.

-
-
- - - - diff --git a/a01780.html b/a01780.html deleted file mode 100644 index 174827335..000000000 --- a/a01780.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_x509_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_x509_ctx Struct Reference
-
-
- - - - -

-Data Fields

-void * ptr
 
-
-
- - - - diff --git a/a01784.html b/a01784.html deleted file mode 100644 index e81c8ab8b..000000000 --- a/a01784.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_sha1_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_sha1_ctx Struct Reference
-
-
- - - - - - -

-Data Fields

-mbedtls_md_context_t mctx
 
-void * ptr
 
-
-
- - - - diff --git a/a01788.html b/a01788.html deleted file mode 100644 index 8f99f2251..000000000 --- a/a01788.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_sha2_256_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_sha2_256_ctx Struct Reference
-
-
- - - - - - -

-Data Fields

-mbedtls_md_context_t mctx
 
-void * ptr
 
-
-
- - - - diff --git a/a01792.html b/a01792.html deleted file mode 100644 index f1689921b..000000000 --- a/a01792.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_hmac_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_hmac_ctx Struct Reference
-
-
- - - - - - -

-Data Fields

-mbedtls_md_context_t * mctx
 
-void * ptr
 
-
-
- - - - diff --git a/a01796.html b/a01796.html deleted file mode 100644 index 41b59e051..000000000 --- a/a01796.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_aes_gcm_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_aes_gcm_ctx Struct Reference
-
-
- - - - -

-Data Fields

-mbedtls_cipher_context_t mctx
 
-
-
- - - - diff --git a/a01800.html b/a01800.html deleted file mode 100644 index eb4070b48..000000000 --- a/a01800.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_aes_cmac_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_aes_cmac_ctx Struct Reference
-
-
- - - - - - -

-Data Fields

-mbedtls_cipher_context_t mctx
 
-void * ptr
 
-
-
- - - - diff --git a/a01804.html b/a01804.html deleted file mode 100644 index 4adefaf3e..000000000 --- a/a01804.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: atcac_pk_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atcac_pk_ctx Struct Reference
-
-
- - - - - - -

-Data Fields

-mbedtls_pk_context mctx
 
-void * ptr
 
-
-
- - - - diff --git a/a01808.html b/a01808.html deleted file mode 100644 index 80d88038f..000000000 --- a/a01808.html +++ /dev/null @@ -1,130 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_mbedtls_eckey_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_mbedtls_eckey_s Struct Reference
-
-
- -

#include <lib/mbedtls/atca_mbedtls_wrap.h>

- - - - - - -

-Data Fields

-ATCADevice device
 
-uint16_t handle
 
-

Detailed Description

-

Structure to hold metadata - is written into the mbedtls pk structure as the private key bignum value 'd' which otherwise would be unused. Bignums can be any arbitrary length of bytes
-

-
-
- - - - diff --git a/a01812.html b/a01812.html deleted file mode 100644 index ff89ad00e..000000000 --- a/a01812.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - - - -CryptoAuthLib: atca_evp_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
atca_evp_ctx Struct Reference
-
-
- - - - -

-Data Fields

-void * ptr
 
-
-
- - - - diff --git a/a01816.html b/a01816.html deleted file mode 100644 index 0d2020bf3..000000000 --- a/a01816.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_FUNCTION_LIST Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_FUNCTION_LIST Struct Reference
-
-
- - - - -

-Data Fields

-CK_VERSION version
 
-
-
- - - - diff --git a/a01820.html b/a01820.html deleted file mode 100644 index e0c5c3f63..000000000 --- a/a01820.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_attrib_model_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_attrib_model_s Struct Reference
-
-
- - - - - - -

-Data Fields

-const CK_ATTRIBUTE_TYPE type
 
-const attrib_f func
 
-
-
- - - - diff --git a/a01824.html b/a01824.html deleted file mode 100644 index f18de71f1..000000000 --- a/a01824.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_conf_filedata_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_conf_filedata_s Struct Reference
-
-
- - - - - - -

-Data Fields

-bool initialized
 
-char filename [MAX_CONF_FILE_NAME_SIZE]
 
-
-
- - - - diff --git a/a01828.html b/a01828.html deleted file mode 100644 index 90ab39396..000000000 --- a/a01828.html +++ /dev/null @@ -1,126 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_dev_ctx Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_dev_ctx Struct Reference
-
-
- -

#include <lib/pkcs11/pkcs11_init.h>

- - - - -

-Data Fields

-CK_SESSION_HANDLE session
 
-

Detailed Description

-

Context Tracking Info

-
-
- - - - diff --git a/a01832.html b/a01832.html deleted file mode 100644 index b6dad47a8..000000000 --- a/a01832.html +++ /dev/null @@ -1,126 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_dev_res Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_dev_res Struct Reference
-
-
- -

#include <lib/pkcs11/pkcs11_init.h>

- - - - -

-Data Fields

-pkcs11_dev_ctx contexts [(5u)]
 
-

Detailed Description

-

Reservable Device Resources

-
-
- - - - diff --git a/a01836.html b/a01836.html deleted file mode 100644 index 5b91390e9..000000000 --- a/a01836.html +++ /dev/null @@ -1,158 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_dev_state Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_dev_state Struct Reference
-
-
- -

#include <lib/pkcs11/pkcs11_init.h>

- - - - - - -

-Data Fields

hal_mutex_t dev_lock
 
pkcs11_dev_res resources [PKCS11_MAX_SLOTS_ALLOWED]
 
-

Detailed Description

-

Device state tracker structure

-

Field Documentation

- -

◆ dev_lock

- -
-
- - - - -
hal_mutex_t pkcs11_dev_state::dev_lock
-
-

Lock to protect concurent access to the device

- -
-
- -

◆ resources

- -
-
- - - - -
pkcs11_dev_res pkcs11_dev_state::resources[PKCS11_MAX_SLOTS_ALLOWED]
-
-

Track the usage of device resources

- -
-
-
-
- - - - diff --git a/a01836.js b/a01836.js deleted file mode 100644 index 5cf6b8015..000000000 --- a/a01836.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01836 = -[ - [ "dev_lock", "a01836.html#ab3f47ede65a8383c94edb8ac013cb08c", null ], - [ "resources", "a01836.html#aa10b79b793bf8499c396e5108ed5830c", null ] -]; \ No newline at end of file diff --git a/a01840.html b/a01840.html deleted file mode 100644 index 7efab3e58..000000000 --- a/a01840.html +++ /dev/null @@ -1,260 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_lib_ctx_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_lib_ctx_s Struct Reference
-
-
- -

#include <lib/pkcs11/pkcs11_init.h>

- - - - - - - - - - - - - - - - - - -

-Data Fields

CK_BBOOL initialized
 
CK_C_INITIALIZE_ARGS init_args
 
CK_VOID_PTR lib_lock
 
pkcs11_dev_statedev_state
 
CK_BBOOL dev_lock_enabled
 
CK_VOID_PTR slots
 
CK_ULONG slot_cnt
 
CK_CHAR config_path [200]
 
-

Detailed Description

-

Library Context

-

Field Documentation

- -

◆ config_path

- -
-
- - - - -
CK_CHAR pkcs11_lib_ctx_s::config_path[200]
-
-

Filesystem path where the base config is located

- -
-
- -

◆ dev_lock_enabled

- -
-
- - - - -
CK_BBOOL pkcs11_lib_ctx_s::dev_lock_enabled
-
-

Flag to indicate if a device lock is enabled and configured

- -
-
- -

◆ dev_state

- -
-
- - - - -
pkcs11_dev_state* pkcs11_lib_ctx_s::dev_state
-
-

Device State state and Lock (if configured)

- -
-
- -

◆ init_args

- -
-
- - - - -
CK_C_INITIALIZE_ARGS pkcs11_lib_ctx_s::init_args
-
-

Arguments provided by the app for C_Initialize

- -
-
- -

◆ initialized

- -
-
- - - - -
CK_BBOOL pkcs11_lib_ctx_s::initialized
-
-

Indicates that the library has been initialized

- -
-
- -

◆ lib_lock

- -
-
- - - - -
CK_VOID_PTR pkcs11_lib_ctx_s::lib_lock
-
-

Application Lock for concurrent access to the library if the application will be using threads

- -
-
- -

◆ slot_cnt

- -
-
- - - - -
CK_ULONG pkcs11_lib_ctx_s::slot_cnt
-
-

Number of configured slots

- -
-
- -

◆ slots

- -
-
- - - - -
CK_VOID_PTR pkcs11_lib_ctx_s::slots
-
-

Configured slots in the library

- -
-
-
-
- - - - diff --git a/a01840.js b/a01840.js deleted file mode 100644 index dec810cbb..000000000 --- a/a01840.js +++ /dev/null @@ -1,11 +0,0 @@ -var a01840 = -[ - [ "config_path", "a01840.html#a8974dbe03027c73d7bed3159421c05f7", null ], - [ "dev_lock_enabled", "a01840.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e", null ], - [ "dev_state", "a01840.html#abb83e7378cec1b712fab5974bc82a156", null ], - [ "init_args", "a01840.html#a5387f2fa4d263228dd0056aa1fd308de", null ], - [ "initialized", "a01840.html#afe50a8d16a6f04c64053e09ae4975e38", null ], - [ "lib_lock", "a01840.html#abef716f125614c97e00abcd3e62b98c2", null ], - [ "slot_cnt", "a01840.html#a9054ff97888d7fc21d1006b94808c6d9", null ], - [ "slots", "a01840.html#aa1679efb012be2954b3eaf1881128f8f", null ] -]; \ No newline at end of file diff --git a/a01844.html b/a01844.html deleted file mode 100644 index f22a23878..000000000 --- a/a01844.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_ecc_key_info_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_ecc_key_info_s Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_BYTE ec_key_type
 
-CK_BYTE oid_size
 
-CK_BYTE_PTR curve_oid
 
-CK_BYTE_PTR ec_asn1_header
 
-CK_BYTE_PTR ec_x962_asn1_header
 
-uint16_t asn1_header_sz
 
-CK_ULONG pubkey_sz
 
-CK_ULONG min_msg_sz
 
-CK_ULONG sig_sz
 
-
-
- - - - diff --git a/a01848.html b/a01848.html deleted file mode 100644 index 5ac776b7f..000000000 --- a/a01848.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: pcks11_mech_table_e Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pcks11_mech_table_e Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_MECHANISM_TYPE type
 
-CK_MECHANISM_INFO info
 
-
-
- - - - diff --git a/a01852.html b/a01852.html deleted file mode 100644 index cdfa908d5..000000000 --- a/a01852.html +++ /dev/null @@ -1,209 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_object_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_object_s Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

CK_OBJECT_CLASS class_id
 
CK_ULONG class_type
 
pkcs11_attrib_model const * attributes
 
CK_ULONG count
 
-CK_ULONG size
 
-uint16_t slot
 
-CK_FLAGS flags
 
-CK_UTF8CHAR name [PKCS11_MAX_LABEL_SIZE+1]
 
-CK_VOID_PTR config
 
-CK_VOID_PTR data
 
-ta_element_attributes_t handle_info
 
-

Field Documentation

- -

◆ attributes

- -
-
- - - - -
pkcs11_attrib_model const* pkcs11_object_s::attributes
-
-

List of attribute models this object possesses

- -
-
- -

◆ class_id

- -
-
- - - - -
CK_OBJECT_CLASS pkcs11_object_s::class_id
-
-

The Class Identifier

- -
-
- -

◆ class_type

- -
-
- - - - -
CK_ULONG pkcs11_object_s::class_type
-
-

The Class Type

- -
-
- -

◆ count

- -
-
- - - - -
CK_ULONG pkcs11_object_s::count
-
-

Count of attribute models

- -
-
-
-
- - - - diff --git a/a01852.js b/a01852.js deleted file mode 100644 index 89b4e7269..000000000 --- a/a01852.js +++ /dev/null @@ -1,7 +0,0 @@ -var a01852 = -[ - [ "attributes", "a01852.html#afbc894d3ed866954b79e43b30031f293", null ], - [ "class_id", "a01852.html#a41cd002dd69540506c5894ace65d323f", null ], - [ "class_type", "a01852.html#af1269e61c8cec31c2e85aa6c3bb4873a", null ], - [ "count", "a01852.html#ad28895cf4063a1d3eaa03a343ae7105b", null ] -]; \ No newline at end of file diff --git a/a01856.html b/a01856.html deleted file mode 100644 index 2aaa45e9d..000000000 --- a/a01856.html +++ /dev/null @@ -1,158 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_object_cache_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_object_cache_s Struct Reference
-
-
- - - - - - - - -

-Data Fields

CK_OBJECT_HANDLE handle
 
-CK_SLOT_ID slotid
 
pkcs11_object_ptr object
 
-

Field Documentation

- -

◆ handle

- -
-
- - - - -
CK_OBJECT_HANDLE pkcs11_object_cache_s::handle
-
-

Arbitrary (but unique) non-null identifier for an object

- -
-
- -

◆ object

- -
-
- - - - -
pkcs11_object_ptr pkcs11_object_cache_s::object
-
-

The actual object
-

- -
-
-
-
- - - - diff --git a/a01856.js b/a01856.js deleted file mode 100644 index 042332d96..000000000 --- a/a01856.js +++ /dev/null @@ -1,5 +0,0 @@ -var a01856 = -[ - [ "handle", "a01856.html#a43266d4cee5be05494f466595b968267", null ], - [ "object", "a01856.html#a5fa3f781e1ef2c55de73d5be66214630", null ] -]; \ No newline at end of file diff --git a/a01860.html b/a01860.html deleted file mode 100644 index 8f8a17b4e..000000000 --- a/a01860.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_session_mech_ctx_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_session_mech_ctx_s Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-atcac_hmac_ctx_t hmac
 
-atcac_sha2_256_ctx_t sha256
 
-atca_aes_cmac_ctx_t cmac
 
-atca_aes_cbc_ctx_t cbc
 
-struct {
-   atca_aes_gcm_ctx_t   context
 
-   CK_BYTE   tag_len
 
gcm
 
-struct {
-   uint8_t   iv [TA_AES_GCM_IV_LENGTH]
 
-   uint8_t   aad [ATCA_AES128_BLOCK_SIZE]
 
-   CK_BYTE   aad_len
 
gcm_single
 
-
-
- - - - diff --git a/a01872.html b/a01872.html deleted file mode 100644 index 0185b73c6..000000000 --- a/a01872.html +++ /dev/null @@ -1,159 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_session_ctx_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_session_ctx_s Struct Reference
-
-
- -

#include <lib/pkcs11/pkcs11_session.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_BBOOL initialized
 
-pkcs11_slot_ctx_ptr slot
 
-CK_SESSION_HANDLE handle
 
-CK_STATE state
 
-CK_ULONG error
 
-CK_ATTRIBUTE_PTR attrib_list
 
-CK_ULONG attrib_count
 
-CK_ULONG object_index
 
-CK_ULONG object_count
 
-CK_OBJECT_HANDLE active_object
 
-CK_MECHANISM_TYPE active_mech
 
-pkcs11_session_mech_ctx active_mech_data
 
-

Detailed Description

-

Session Context

-
-
- - - - diff --git a/a01876.html b/a01876.html deleted file mode 100644 index 4e18d2517..000000000 --- a/a01876.html +++ /dev/null @@ -1,174 +0,0 @@ - - - - - - - -CryptoAuthLib: pkcs11_slot_ctx_s Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
pkcs11_slot_ctx_s Struct Reference
-
-
- -

#include <lib/pkcs11/pkcs11_slot.h>

- - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_BYTE slot_state
 
-CK_SLOT_ID slot_id
 
-ATCADevice device_ctx
 
-ATCAIfaceCfg interface_config
 
-CK_SESSION_HANDLE session
 
-atecc608_config_t cfg_zone
 
-CK_FLAGS flags
 
-uint16_t user_pin_handle
 
-uint16_t so_pin_handle
 
-CK_UTF8CHAR label [PKCS11_MAX_LABEL_SIZE+1]
 
-CK_BBOOL logged_in
 
CK_BYTE read_key [32]
 
-

Detailed Description

-

Slot Context

-

Field Documentation

- -

◆ read_key

- -
-
- - - - -
CK_BYTE pkcs11_slot_ctx_s::read_key[32]
-
-

Accepted through C_Login as the user pin

- -
-
-
-
- - - - diff --git a/a01876.js b/a01876.js deleted file mode 100644 index d05e2b039..000000000 --- a/a01876.js +++ /dev/null @@ -1,4 +0,0 @@ -var a01876 = -[ - [ "read_key", "a01876.html#a75cbe04e1812bbae8b4bb552991a1584", null ] -]; \ No newline at end of file diff --git a/a01880.html b/a01880.html deleted file mode 100644 index 89280a27a..000000000 --- a/a01880.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_VERSION Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_VERSION Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_BYTE major
 
-CK_BYTE minor
 
-
-
- - - - diff --git a/a01884.html b/a01884.html deleted file mode 100644 index 7fc1e7919..000000000 --- a/a01884.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_INFO Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_INFO Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_VERSION cryptokiVersion
 
-CK_UTF8CHAR manufacturerID [32]
 
-CK_FLAGS flags
 
-CK_UTF8CHAR libraryDescription [32]
 
-CK_VERSION libraryVersion
 
-
-
- - - - diff --git a/a01888.html b/a01888.html deleted file mode 100644 index 2f01fead5..000000000 --- a/a01888.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SLOT_INFO Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SLOT_INFO Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_UTF8CHAR slotDescription [64]
 
-CK_UTF8CHAR manufacturerID [32]
 
-CK_FLAGS flags
 
-CK_VERSION hardwareVersion
 
-CK_VERSION firmwareVersion
 
-
-
- - - - diff --git a/a01892.html b/a01892.html deleted file mode 100644 index 3d9fc8874..000000000 --- a/a01892.html +++ /dev/null @@ -1,173 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_TOKEN_INFO Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_TOKEN_INFO Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_UTF8CHAR label [32]
 
-CK_UTF8CHAR manufacturerID [32]
 
-CK_UTF8CHAR model [16]
 
-CK_CHAR serialNumber [16]
 
-CK_FLAGS flags
 
-CK_ULONG ulMaxSessionCount
 
-CK_ULONG ulSessionCount
 
-CK_ULONG ulMaxRwSessionCount
 
-CK_ULONG ulRwSessionCount
 
-CK_ULONG ulMaxPinLen
 
-CK_ULONG ulMinPinLen
 
-CK_ULONG ulTotalPublicMemory
 
-CK_ULONG ulFreePublicMemory
 
-CK_ULONG ulTotalPrivateMemory
 
-CK_ULONG ulFreePrivateMemory
 
-CK_VERSION hardwareVersion
 
-CK_VERSION firmwareVersion
 
-CK_CHAR utcTime [16]
 
-
-
- - - - diff --git a/a01896.html b/a01896.html deleted file mode 100644 index 3feb9c119..000000000 --- a/a01896.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SESSION_INFO Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SESSION_INFO Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_SLOT_ID slotID
 
-CK_STATE state
 
-CK_FLAGS flags
 
-CK_ULONG ulDeviceError
 
-
-
- - - - diff --git a/a01900.html b/a01900.html deleted file mode 100644 index 54da4eb15..000000000 --- a/a01900.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_ATTRIBUTE Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_ATTRIBUTE Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_ATTRIBUTE_TYPE type
 
-CK_VOID_PTR pValue
 
-CK_ULONG ulValueLen
 
-
-
- - - - diff --git a/a01904.html b/a01904.html deleted file mode 100644 index 5dd57dc08..000000000 --- a/a01904.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_DATE Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_DATE Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_CHAR year [4]
 
-CK_CHAR month [2]
 
-CK_CHAR day [2]
 
-
-
- - - - diff --git a/a01908.html b/a01908.html deleted file mode 100644 index c541f2d6f..000000000 --- a/a01908.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_MECHANISM Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_MECHANISM Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE mechanism
 
-CK_VOID_PTR pParameter
 
-CK_ULONG ulParameterLen
 
-
-
- - - - diff --git a/a01912.html b/a01912.html deleted file mode 100644 index b78be84c9..000000000 --- a/a01912.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_MECHANISM_INFO Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_MECHANISM_INFO Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_ULONG ulMinKeySize
 
-CK_ULONG ulMaxKeySize
 
-CK_FLAGS flags
 
-
-
- - - - diff --git a/a01916.html b/a01916.html deleted file mode 100644 index 89b45ba8a..000000000 --- a/a01916.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_C_INITIALIZE_ARGS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_C_INITIALIZE_ARGS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_CREATEMUTEX CreateMutex
 
-CK_DESTROYMUTEX DestroyMutex
 
-CK_LOCKMUTEX LockMutex
 
-CK_UNLOCKMUTEX UnlockMutex
 
-CK_FLAGS flags
 
-CK_VOID_PTR pReserved
 
-
-
- - - - diff --git a/a01920.html b/a01920.html deleted file mode 100644 index 9cf9c71d0..000000000 --- a/a01920.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RSA_PKCS_OAEP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RSA_PKCS_OAEP_PARAMS Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE hashAlg
 
-CK_RSA_PKCS_MGF_TYPE mgf
 
-CK_RSA_PKCS_OAEP_SOURCE_TYPE source
 
-CK_VOID_PTR pSourceData
 
-CK_ULONG ulSourceDataLen
 
-
-
- - - - diff --git a/a01924.html b/a01924.html deleted file mode 100644 index 13d34ea26..000000000 --- a/a01924.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RSA_PKCS_PSS_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RSA_PKCS_PSS_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE hashAlg
 
-CK_RSA_PKCS_MGF_TYPE mgf
 
-CK_ULONG sLen
 
-
-
- - - - diff --git a/a01928.html b/a01928.html deleted file mode 100644 index 522dc75fe..000000000 --- a/a01928.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_ECDH1_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_ECDH1_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_EC_KDF_TYPE kdf
 
-CK_ULONG ulSharedDataLen
 
-CK_BYTE_PTR pSharedData
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-
-
- - - - diff --git a/a01932.html b/a01932.html deleted file mode 100644 index 709eab379..000000000 --- a/a01932.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_ECDH2_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_ECDH2_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_EC_KDF_TYPE kdf
 
-CK_ULONG ulSharedDataLen
 
-CK_BYTE_PTR pSharedData
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-CK_ULONG ulPrivateDataLen
 
-CK_OBJECT_HANDLE hPrivateData
 
-CK_ULONG ulPublicDataLen2
 
-CK_BYTE_PTR pPublicData2
 
-
-
- - - - diff --git a/a01936.html b/a01936.html deleted file mode 100644 index c794934f3..000000000 --- a/a01936.html +++ /dev/null @@ -1,149 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_ECMQV_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_ECMQV_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_EC_KDF_TYPE kdf
 
-CK_ULONG ulSharedDataLen
 
-CK_BYTE_PTR pSharedData
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-CK_ULONG ulPrivateDataLen
 
-CK_OBJECT_HANDLE hPrivateData
 
-CK_ULONG ulPublicDataLen2
 
-CK_BYTE_PTR pPublicData2
 
-CK_OBJECT_HANDLE publicKey
 
-
-
- - - - diff --git a/a01940.html b/a01940.html deleted file mode 100644 index 45660f806..000000000 --- a/a01940.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_X9_42_DH1_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_X9_42_DH1_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_X9_42_DH_KDF_TYPE kdf
 
-CK_ULONG ulOtherInfoLen
 
-CK_BYTE_PTR pOtherInfo
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-
-
- - - - diff --git a/a01944.html b/a01944.html deleted file mode 100644 index d69b659f5..000000000 --- a/a01944.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_X9_42_DH2_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_X9_42_DH2_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_X9_42_DH_KDF_TYPE kdf
 
-CK_ULONG ulOtherInfoLen
 
-CK_BYTE_PTR pOtherInfo
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-CK_ULONG ulPrivateDataLen
 
-CK_OBJECT_HANDLE hPrivateData
 
-CK_ULONG ulPublicDataLen2
 
-CK_BYTE_PTR pPublicData2
 
-
-
- - - - diff --git a/a01948.html b/a01948.html deleted file mode 100644 index 3c88b6474..000000000 --- a/a01948.html +++ /dev/null @@ -1,149 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_X9_42_MQV_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_X9_42_MQV_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_X9_42_DH_KDF_TYPE kdf
 
-CK_ULONG ulOtherInfoLen
 
-CK_BYTE_PTR pOtherInfo
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-CK_ULONG ulPrivateDataLen
 
-CK_OBJECT_HANDLE hPrivateData
 
-CK_ULONG ulPublicDataLen2
 
-CK_BYTE_PTR pPublicData2
 
-CK_OBJECT_HANDLE publicKey
 
-
-
- - - - diff --git a/a01952.html b/a01952.html deleted file mode 100644 index 7f153ecfe..000000000 --- a/a01952.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_KEA_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_KEA_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_BBOOL isSender
 
-CK_ULONG ulRandomLen
 
-CK_BYTE_PTR pRandomA
 
-CK_BYTE_PTR pRandomB
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-
-
- - - - diff --git a/a01956.html b/a01956.html deleted file mode 100644 index 4a06070f5..000000000 --- a/a01956.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RC2_CBC_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RC2_CBC_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_ULONG ulEffectiveBits
 
-CK_BYTE iv [8]
 
-
-
- - - - diff --git a/a01960.html b/a01960.html deleted file mode 100644 index e3c00a56b..000000000 --- a/a01960.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RC2_MAC_GENERAL_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RC2_MAC_GENERAL_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_ULONG ulEffectiveBits
 
-CK_ULONG ulMacLength
 
-
-
- - - - diff --git a/a01964.html b/a01964.html deleted file mode 100644 index d06ffbc96..000000000 --- a/a01964.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RC5_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RC5_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_ULONG ulWordsize
 
-CK_ULONG ulRounds
 
-
-
- - - - diff --git a/a01968.html b/a01968.html deleted file mode 100644 index a117ead10..000000000 --- a/a01968.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RC5_CBC_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RC5_CBC_PARAMS Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_ULONG ulWordsize
 
-CK_ULONG ulRounds
 
-CK_BYTE_PTR pIv
 
-CK_ULONG ulIvLen
 
-
-
- - - - diff --git a/a01972.html b/a01972.html deleted file mode 100644 index 7012384bb..000000000 --- a/a01972.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RC5_MAC_GENERAL_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RC5_MAC_GENERAL_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_ULONG ulWordsize
 
-CK_ULONG ulRounds
 
-CK_ULONG ulMacLength
 
-
-
- - - - diff --git a/a01976.html b/a01976.html deleted file mode 100644 index ac7531dda..000000000 --- a/a01976.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_DES_CBC_ENCRYPT_DATA_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_DES_CBC_ENCRYPT_DATA_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_BYTE iv [8]
 
-CK_BYTE_PTR pData
 
-CK_ULONG length
 
-
-
- - - - diff --git a/a01980.html b/a01980.html deleted file mode 100644 index cdd2f3205..000000000 --- a/a01980.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_AES_CBC_ENCRYPT_DATA_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_AES_CBC_ENCRYPT_DATA_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_BYTE iv [16]
 
-CK_BYTE_PTR pData
 
-CK_ULONG length
 
-
-
- - - - diff --git a/a01984.html b/a01984.html deleted file mode 100644 index 33bbc50b6..000000000 --- a/a01984.html +++ /dev/null @@ -1,152 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SKIPJACK_PRIVATE_WRAP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SKIPJACK_PRIVATE_WRAP_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_ULONG ulPasswordLen
 
-CK_BYTE_PTR pPassword
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pPublicData
 
-CK_ULONG ulPAndGLen
 
-CK_ULONG ulQLen
 
-CK_ULONG ulRandomLen
 
-CK_BYTE_PTR pRandomA
 
-CK_BYTE_PTR pPrimeP
 
-CK_BYTE_PTR pBaseG
 
-CK_BYTE_PTR pSubprimeQ
 
-
-
- - - - diff --git a/a01988.html b/a01988.html deleted file mode 100644 index b0e059cb5..000000000 --- a/a01988.html +++ /dev/null @@ -1,161 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SKIPJACK_RELAYX_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SKIPJACK_RELAYX_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_ULONG ulOldWrappedXLen
 
-CK_BYTE_PTR pOldWrappedX
 
-CK_ULONG ulOldPasswordLen
 
-CK_BYTE_PTR pOldPassword
 
-CK_ULONG ulOldPublicDataLen
 
-CK_BYTE_PTR pOldPublicData
 
-CK_ULONG ulOldRandomLen
 
-CK_BYTE_PTR pOldRandomA
 
-CK_ULONG ulNewPasswordLen
 
-CK_BYTE_PTR pNewPassword
 
-CK_ULONG ulNewPublicDataLen
 
-CK_BYTE_PTR pNewPublicData
 
-CK_ULONG ulNewRandomLen
 
-CK_BYTE_PTR pNewRandomA
 
-
-
- - - - diff --git a/a01992.html b/a01992.html deleted file mode 100644 index 2405dd354..000000000 --- a/a01992.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_PBE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_PBE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pInitVector
 
-CK_UTF8CHAR_PTR pPassword
 
-CK_ULONG ulPasswordLen
 
-CK_BYTE_PTR pSalt
 
-CK_ULONG ulSaltLen
 
-CK_ULONG ulIteration
 
-
-
- - - - diff --git a/a01996.html b/a01996.html deleted file mode 100644 index e6d9e221a..000000000 --- a/a01996.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_KEY_WRAP_SET_OAEP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_KEY_WRAP_SET_OAEP_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_BYTE bBC
 
-CK_BYTE_PTR pX
 
-CK_ULONG ulXLen
 
-
-
- - - - diff --git a/a02000.html b/a02000.html deleted file mode 100644 index 79a05b8a7..000000000 --- a/a02000.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SSL3_RANDOM_DATA Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SSL3_RANDOM_DATA Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pClientRandom
 
-CK_ULONG ulClientRandomLen
 
-CK_BYTE_PTR pServerRandom
 
-CK_ULONG ulServerRandomLen
 
-
-
- - - - diff --git a/a02004.html b/a02004.html deleted file mode 100644 index e3b64d11d..000000000 --- a/a02004.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SSL3_MASTER_KEY_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SSL3_MASTER_KEY_DERIVE_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_SSL3_RANDOM_DATA RandomInfo
 
-CK_VERSION_PTR pVersion
 
-
-
- - - - diff --git a/a02008.html b/a02008.html deleted file mode 100644 index 9a28e028f..000000000 --- a/a02008.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SSL3_KEY_MAT_OUT Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SSL3_KEY_MAT_OUT Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_OBJECT_HANDLE hClientMacSecret
 
-CK_OBJECT_HANDLE hServerMacSecret
 
-CK_OBJECT_HANDLE hClientKey
 
-CK_OBJECT_HANDLE hServerKey
 
-CK_BYTE_PTR pIVClient
 
-CK_BYTE_PTR pIVServer
 
-
-
- - - - diff --git a/a02012.html b/a02012.html deleted file mode 100644 index b85e90d22..000000000 --- a/a02012.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SSL3_KEY_MAT_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SSL3_KEY_MAT_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_ULONG ulMacSizeInBits
 
-CK_ULONG ulKeySizeInBits
 
-CK_ULONG ulIVSizeInBits
 
-CK_BBOOL bIsExport
 
-CK_SSL3_RANDOM_DATA RandomInfo
 
-CK_SSL3_KEY_MAT_OUT_PTR pReturnedKeyMaterial
 
-
-
- - - - diff --git a/a02016.html b/a02016.html deleted file mode 100644 index 7f96ee850..000000000 --- a/a02016.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_TLS_PRF_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_TLS_PRF_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pSeed
 
-CK_ULONG ulSeedLen
 
-CK_BYTE_PTR pLabel
 
-CK_ULONG ulLabelLen
 
-CK_BYTE_PTR pOutput
 
-CK_ULONG_PTR pulOutputLen
 
-
-
- - - - diff --git a/a02020.html b/a02020.html deleted file mode 100644 index 6b9bd0c07..000000000 --- a/a02020.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_WTLS_RANDOM_DATA Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_WTLS_RANDOM_DATA Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pClientRandom
 
-CK_ULONG ulClientRandomLen
 
-CK_BYTE_PTR pServerRandom
 
-CK_ULONG ulServerRandomLen
 
-
-
- - - - diff --git a/a02024.html b/a02024.html deleted file mode 100644 index 3aaf49493..000000000 --- a/a02024.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_WTLS_MASTER_KEY_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_WTLS_MASTER_KEY_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE DigestMechanism
 
-CK_WTLS_RANDOM_DATA RandomInfo
 
-CK_BYTE_PTR pVersion
 
-
-
- - - - diff --git a/a02028.html b/a02028.html deleted file mode 100644 index 660906f8e..000000000 --- a/a02028.html +++ /dev/null @@ -1,140 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_WTLS_PRF_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_WTLS_PRF_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE DigestMechanism
 
-CK_BYTE_PTR pSeed
 
-CK_ULONG ulSeedLen
 
-CK_BYTE_PTR pLabel
 
-CK_ULONG ulLabelLen
 
-CK_BYTE_PTR pOutput
 
-CK_ULONG_PTR pulOutputLen
 
-
-
- - - - diff --git a/a02032.html b/a02032.html deleted file mode 100644 index 6e78516ce..000000000 --- a/a02032.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_WTLS_KEY_MAT_OUT Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_WTLS_KEY_MAT_OUT Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_OBJECT_HANDLE hMacSecret
 
-CK_OBJECT_HANDLE hKey
 
-CK_BYTE_PTR pIV
 
-
-
- - - - diff --git a/a02036.html b/a02036.html deleted file mode 100644 index 58baf604e..000000000 --- a/a02036.html +++ /dev/null @@ -1,143 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_WTLS_KEY_MAT_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_WTLS_KEY_MAT_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE DigestMechanism
 
-CK_ULONG ulMacSizeInBits
 
-CK_ULONG ulKeySizeInBits
 
-CK_ULONG ulIVSizeInBits
 
-CK_ULONG ulSequenceNumber
 
-CK_BBOOL bIsExport
 
-CK_WTLS_RANDOM_DATA RandomInfo
 
-CK_WTLS_KEY_MAT_OUT_PTR pReturnedKeyMaterial
 
-
-
- - - - diff --git a/a02040.html b/a02040.html deleted file mode 100644 index 24c182665..000000000 --- a/a02040.html +++ /dev/null @@ -1,143 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_CMS_SIG_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_CMS_SIG_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_OBJECT_HANDLE certificateHandle
 
-CK_MECHANISM_PTR pSigningMechanism
 
-CK_MECHANISM_PTR pDigestMechanism
 
-CK_UTF8CHAR_PTR pContentType
 
-CK_BYTE_PTR pRequestedAttributes
 
-CK_ULONG ulRequestedAttributesLen
 
-CK_BYTE_PTR pRequiredAttributes
 
-CK_ULONG ulRequiredAttributesLen
 
-
-
- - - - diff --git a/a02044.html b/a02044.html deleted file mode 100644 index ad5baeca9..000000000 --- a/a02044.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_KEY_DERIVATION_STRING_DATA Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_KEY_DERIVATION_STRING_DATA Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_BYTE_PTR pData
 
-CK_ULONG ulLen
 
-
-
- - - - diff --git a/a02048.html b/a02048.html deleted file mode 100644 index bb4175ba6..000000000 --- a/a02048.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_PKCS5_PBKD2_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_PKCS5_PBKD2_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE saltSource
 
-CK_VOID_PTR pSaltSourceData
 
-CK_ULONG ulSaltSourceDataLen
 
-CK_ULONG iterations
 
-CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE prf
 
-CK_VOID_PTR pPrfData
 
-CK_ULONG ulPrfDataLen
 
-CK_UTF8CHAR_PTR pPassword
 
-CK_ULONG_PTR ulPasswordLen
 
-
-
- - - - diff --git a/a02052.html b/a02052.html deleted file mode 100644 index 0952853b9..000000000 --- a/a02052.html +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_PKCS5_PBKD2_PARAMS2 Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_PKCS5_PBKD2_PARAMS2 Struct Reference
-
-
- - - - - - - - - - - - - - - - - - - - -

-Data Fields

-CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE saltSource
 
-CK_VOID_PTR pSaltSourceData
 
-CK_ULONG ulSaltSourceDataLen
 
-CK_ULONG iterations
 
-CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE prf
 
-CK_VOID_PTR pPrfData
 
-CK_ULONG ulPrfDataLen
 
-CK_UTF8CHAR_PTR pPassword
 
-CK_ULONG ulPasswordLen
 
-
-
- - - - diff --git a/a02056.html b/a02056.html deleted file mode 100644 index ffd6d34ee..000000000 --- a/a02056.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_OTP_PARAM Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_OTP_PARAM Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_OTP_PARAM_TYPE type
 
-CK_VOID_PTR pValue
 
-CK_ULONG ulValueLen
 
-
-
- - - - diff --git a/a02060.html b/a02060.html deleted file mode 100644 index 84a615f49..000000000 --- a/a02060.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_OTP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_OTP_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_OTP_PARAM_PTR pParams
 
-CK_ULONG ulCount
 
-
-
- - - - diff --git a/a02064.html b/a02064.html deleted file mode 100644 index 9814f7f8c..000000000 --- a/a02064.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_OTP_SIGNATURE_INFO Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_OTP_SIGNATURE_INFO Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_OTP_PARAM_PTR pParams
 
-CK_ULONG ulCount
 
-
-
- - - - diff --git a/a02068.html b/a02068.html deleted file mode 100644 index dec8a793d..000000000 --- a/a02068.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_KIP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_KIP_PARAMS Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_MECHANISM_PTR pMechanism
 
-CK_OBJECT_HANDLE hKey
 
-CK_BYTE_PTR pSeed
 
-CK_ULONG ulSeedLen
 
-
-
- - - - diff --git a/a02072.html b/a02072.html deleted file mode 100644 index 21a9d518f..000000000 --- a/a02072.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_AES_CTR_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_AES_CTR_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_ULONG ulCounterBits
 
-CK_BYTE cb [16]
 
-
-
- - - - diff --git a/a02076.html b/a02076.html deleted file mode 100644 index d31d66074..000000000 --- a/a02076.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_GCM_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_GCM_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pIv
 
-CK_ULONG ulIvLen
 
-CK_ULONG ulIvBits
 
-CK_BYTE_PTR pAAD
 
-CK_ULONG ulAADLen
 
-CK_ULONG ulTagBits
 
-
-
- - - - diff --git a/a02080.html b/a02080.html deleted file mode 100644 index 928d31e58..000000000 --- a/a02080.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_CCM_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_CCM_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_ULONG ulDataLen
 
-CK_BYTE_PTR pNonce
 
-CK_ULONG ulNonceLen
 
-CK_BYTE_PTR pAAD
 
-CK_ULONG ulAADLen
 
-CK_ULONG ulMACLen
 
-
-
- - - - diff --git a/a02084.html b/a02084.html deleted file mode 100644 index cbdf9c211..000000000 --- a/a02084.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_AES_GCM_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_AES_GCM_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pIv
 
-CK_ULONG ulIvLen
 
-CK_ULONG ulIvBits
 
-CK_BYTE_PTR pAAD
 
-CK_ULONG ulAADLen
 
-CK_ULONG ulTagBits
 
-
-
- - - - diff --git a/a02088.html b/a02088.html deleted file mode 100644 index e4a8b791c..000000000 --- a/a02088.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_AES_CCM_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_AES_CCM_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_ULONG ulDataLen
 
-CK_BYTE_PTR pNonce
 
-CK_ULONG ulNonceLen
 
-CK_BYTE_PTR pAAD
 
-CK_ULONG ulAADLen
 
-CK_ULONG ulMACLen
 
-
-
- - - - diff --git a/a02092.html b/a02092.html deleted file mode 100644 index ef9b26879..000000000 --- a/a02092.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_CAMELLIA_CTR_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_CAMELLIA_CTR_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_ULONG ulCounterBits
 
-CK_BYTE cb [16]
 
-
-
- - - - diff --git a/a02096.html b/a02096.html deleted file mode 100644 index 7d0b6588e..000000000 --- a/a02096.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_BYTE iv [16]
 
-CK_BYTE_PTR pData
 
-CK_ULONG length
 
-
-
- - - - diff --git a/a02100.html b/a02100.html deleted file mode 100644 index be102e2f5..000000000 --- a/a02100.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_ARIA_CBC_ENCRYPT_DATA_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_ARIA_CBC_ENCRYPT_DATA_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_BYTE iv [16]
 
-CK_BYTE_PTR pData
 
-CK_ULONG length
 
-
-
- - - - diff --git a/a02104.html b/a02104.html deleted file mode 100644 index 355ec2f01..000000000 --- a/a02104.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_DSA_PARAMETER_GEN_PARAM Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_DSA_PARAMETER_GEN_PARAM Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE hash
 
-CK_BYTE_PTR pSeed
 
-CK_ULONG ulSeedLen
 
-CK_ULONG ulIndex
 
-
-
- - - - diff --git a/a02108.html b/a02108.html deleted file mode 100644 index 1ea0ac89b..000000000 --- a/a02108.html +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_ECDH_AES_KEY_WRAP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_ECDH_AES_KEY_WRAP_PARAMS Struct Reference
-
-
- - - - - - - - - - -

-Data Fields

-CK_ULONG ulAESKeyBits
 
-CK_EC_KDF_TYPE kdf
 
-CK_ULONG ulSharedDataLen
 
-CK_BYTE_PTR pSharedData
 
-
-
- - - - diff --git a/a02112.html b/a02112.html deleted file mode 100644 index c2a97cf7a..000000000 --- a/a02112.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_RSA_AES_KEY_WRAP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_RSA_AES_KEY_WRAP_PARAMS Struct Reference
-
-
- - - - - - -

-Data Fields

-CK_ULONG ulAESKeyBits
 
-CK_RSA_PKCS_OAEP_PARAMS_PTR pOAEPParams
 
-
-
- - - - diff --git a/a02116.html b/a02116.html deleted file mode 100644 index f94dd73ba..000000000 --- a/a02116.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_TLS12_MASTER_KEY_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_TLS12_MASTER_KEY_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_SSL3_RANDOM_DATA RandomInfo
 
-CK_VERSION_PTR pVersion
 
-CK_MECHANISM_TYPE prfHashMechanism
 
-
-
- - - - diff --git a/a02120.html b/a02120.html deleted file mode 100644 index 6c42de38b..000000000 --- a/a02120.html +++ /dev/null @@ -1,140 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_TLS12_KEY_MAT_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_TLS12_KEY_MAT_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - - - -

-Data Fields

-CK_ULONG ulMacSizeInBits
 
-CK_ULONG ulKeySizeInBits
 
-CK_ULONG ulIVSizeInBits
 
-CK_BBOOL bIsExport
 
-CK_SSL3_RANDOM_DATA RandomInfo
 
-CK_SSL3_KEY_MAT_OUT_PTR pReturnedKeyMaterial
 
-CK_MECHANISM_TYPE prfHashMechanism
 
-
-
- - - - diff --git a/a02124.html b/a02124.html deleted file mode 100644 index 385800a59..000000000 --- a/a02124.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_TLS_KDF_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_TLS_KDF_PARAMS Struct Reference
-
-
- - - - - - - - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE prfMechanism
 
-CK_BYTE_PTR pLabel
 
-CK_ULONG ulLabelLength
 
-CK_SSL3_RANDOM_DATA RandomInfo
 
-CK_BYTE_PTR pContextData
 
-CK_ULONG ulContextDataLength
 
-
-
- - - - diff --git a/a02128.html b/a02128.html deleted file mode 100644 index 7d2a1e2e7..000000000 --- a/a02128.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_TLS_MAC_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_TLS_MAC_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_MECHANISM_TYPE prfHashMechanism
 
-CK_ULONG ulMacLength
 
-CK_ULONG ulServerOrClient
 
-
-
- - - - diff --git a/a02132.html b/a02132.html deleted file mode 100644 index 993626bd4..000000000 --- a/a02132.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_GOSTR3410_DERIVE_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_GOSTR3410_DERIVE_PARAMS Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_EC_KDF_TYPE kdf
 
-CK_BYTE_PTR pPublicData
 
-CK_ULONG ulPublicDataLen
 
-CK_BYTE_PTR pUKM
 
-CK_ULONG ulUKMLen
 
-
-
- - - - diff --git a/a02136.html b/a02136.html deleted file mode 100644 index 2949935ea..000000000 --- a/a02136.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_GOSTR3410_KEY_WRAP_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_GOSTR3410_KEY_WRAP_PARAMS Struct Reference
-
-
- - - - - - - - - - - - -

-Data Fields

-CK_BYTE_PTR pWrapOID
 
-CK_ULONG ulWrapOIDLen
 
-CK_BYTE_PTR pUKM
 
-CK_ULONG ulUKMLen
 
-CK_OBJECT_HANDLE hKey
 
-
-
- - - - diff --git a/a02140.html b/a02140.html deleted file mode 100644 index 037178cad..000000000 --- a/a02140.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: CK_SEED_CBC_ENCRYPT_DATA_PARAMS Struct Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
CK_SEED_CBC_ENCRYPT_DATA_PARAMS Struct Reference
-
-
- - - - - - - - -

-Data Fields

-CK_BYTE iv [16]
 
-CK_BYTE_PTR pData
 
-CK_ULONG length
 
-
-
- - - - diff --git a/a02144.html b/a02144.html deleted file mode 100644 index e2c8ec5b8..000000000 --- a/a02144.html +++ /dev/null @@ -1,155 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_aes_cbc_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_aes_cbc_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_aes_cbc_ctx:
-
-
- -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
AES CBC Context

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_aes_cbc_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("device", c_void_p),
-
("key_id", c_uint16),
-
("key_block", c_uint8),
-
("ciphertext", c_char*16)]
-
-
-
-
-
- - - - diff --git a/a02144.png b/a02144.png deleted file mode 100644 index c872329335708c05f01cdddc76ac26d3e9499b25..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 684 zcmeAS@N?(olHy`uVBq!ia0vp^kAOIUgBeH~pNX6eq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB))Safh&$cN;jG%Wd2N=ci1mR(ot3T}if4G4JkRxLPg+tMGf`#j=LL^$ow>&B zX;$;`sNM1%vE@H!#}=-BTD9-rqX?OZf0qt?Q`*)w`N>+D`uK2k2w!fKk-t$wQ zT&{VhzL?BWRpw|9An)CZwVv*U?|oG&&F^QLJBO;ARR6ImX|L*c#?#zif9T0AwVstB zcQ*EFhP&#?`wcM5A9tx_&fULI!igi8nc@CZR)%8Z{f}Oo?tT2HtNY=bzIum?)>;fV zj*BuLuv*8#aIMglVMCubQ$uNtAj6u+T?`4b;VcZVcPKGLpes3WwngC39R-g|XLc-7 zi99ZY>Ug@t>ou08-|ya>IxYLdtAJD){_3GH3y;HvV&gZsSb|Z4dOTFDm_4?POABw*_ zy1Hz#byno*lv%sO_f-ATUp-^}gxk5M#R^MvdQ;!1%YJ=Q^fy+=Nadu-^{&17J5_8? zUyEP0tEc7O@pU5pvL2IoE=R7IWWv2p!xI>ao}11s0)_c!{zGd;8;(vi>IbGP22WQ% Jmvv4FO#s~3KUn|( diff --git a/a02148.html b/a02148.html deleted file mode 100644 index 3399eda6f..000000000 --- a/a02148.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_aes_cmac_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_aes_cmac_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_aes_cmac_ctx:
-
-
- -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
AES CMAC Context

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_aes_cmac_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("cbc_ctx", atca_aes_cbc_ctx),
-
("block_size", c_uint32),
-
("block", c_char*16)]
-
-
-
-
-
- - - - diff --git a/a02148.png b/a02148.png deleted file mode 100644 index e665a377bb7e8744bc71b2b0ce5d1a7e8e8192a6..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 699 zcmV;s0!00ZP)vTJr#LVva2S`&=)l0h|Ns9}lGCUF000SeQchC<|NsC0|NsC0Hv*f~0006; zNkl4z0^x;4#M^`={SCCSHl-L>Af+klH2 z-oLMVGWXV7MoTaL-}^90ehuMDlKu!+lJrNolB7Qdb4@9wF#v$~`2fHm4CMOxj3Yac z>!do2>`1QBhXKGN;R*o$2v-2`N4NrjKf)CN{1L7I;E!+x0Dpul0Qe(Z0l**O3IP5H zR{-!wxB`Gb!W94>C8d-G0ZEdEAY3KMAK@xV{BJW*yT6%^y{hjNLU$ zY*$z!ZF%+%Rm8rsT&!Jk9bytv->R8fUflJ1b4%-5Id>k%RPOOHo13+p_+Ci6Nsg_c z*Cd*DVc%$0J8`X*OVVxH|KOSfn}MqkQ-fO(R?pjWE!X}F*Ro}=YWT#pDZRGN&O+K( zeoXn%wU_&T@|*o?T+jEbNy$IkulLsXdQ<7cHoIB5w7RV=?7#M& - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_aes_ctr_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_aes_ctr_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_aes_ctr_ctx:
-
-
- -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
AES CTR Context

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_aes_ctr_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("key_id", c_uint16),
-
("key_block", c_uint8),
-
("iv", c_char*16),
-
("counter_size", c_uint8)]
-
-
-
-
-
- - - - diff --git a/a02152.png b/a02152.png deleted file mode 100644 index 5c528aa4ef205fe5be02a60d547d03257e41ddea..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 685 zcmeAS@N?(olHy`uVBq!ia0vp^cYrv6gBeJ=etRtdq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB){Wg`SY0?Z@hYFf@r68occNPa4y{p`@MO*o8PBLAPdzRv<)2);H_LWn z%Hi$zo_iPF_MLusPf_&WYp=fwCmU{%2}-DDjh^cHDe_+QG*2V0WlqO}x1GJN@>Aoz z>69(cx%!$WHR=L+`DLfCB`Rz$m!DKKMc-sf^i<`O$A8X?+57cd!`alzKj&qiT1ln! zJ?qO{7d`38`9jM{TRKipT;dwjr=n}LJBCBihl`FJJ$44MLQ94X9j6%^Tx0kcbkLPNkaXfm3=>ev z^o#ME1eBeWGEur{af|9c{-dkS)_30Vn7AbROM2MFV2gHkX|$ z^$KkKwS1TJ-i(jZOJh`T{`{L{IB)*y%3Wp3_q;Q&|E;v1zv^PA+VsYlw=+&hiGAbW zIpqe+x}dJmZTg#oJO732X@;2xM|I;(SSA5j_|I2x+ zpB8mnnohZ+d-|8^@jJU8881tY+*#9p$7}UW^Pp4D!uw2nw^Rg%ZqZiPtncRWH1dki z`?6lg^ZlmM39J0Xo$GyGoSs|NqcSsPgO2J+J3VzzVAy$XI-w-)#4-63KSLcK!x7J8 R>A-}=;OXk;vd$@?2>?;;J|qAD diff --git a/a02156.html b/a02156.html deleted file mode 100644 index ecd4de1d9..000000000 --- a/a02156.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_sha256_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_sha256_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_sha256_ctx:
-
-
- - -cryptoauthlib.atcab.atca_hmac_sha256_ctx - -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
SHA256 context

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_sha256_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("total_msg_size", c_uint32),
-
("block_size", c_uint32),
-
("block", c_char*64*2)]
-
-
-
-
-
- - - - diff --git a/a02156.png b/a02156.png deleted file mode 100644 index c7cd781e322823a29c14e839a9702721f4628ba9..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1182 zcma)6TToMH5dO~z1V{*y(c*<*5!z8ORAJ22U}_>BKnaF$u_j&vA|chm!72rU5sN~4#y+)A-G|+8FAux>?QDTi z5J{t~pa1}9+qWTc06+u;N>>u0xf}28B#gH(Iw9QQa1e0(l|56{soS_d;MlTKd>q3t zA|C(4!&)NemJuh22ZaAYK8Lj?0GtB0BU=)_h9)ZJo9hDI?=3xkwdWmoTA#~%E1cb| zQ^XX1RT?V2H07V4Ll1M+oWXGUE)NXa2xPLh)rAg z4NV9xFXz@rerLVnE|GO?iGlmC_&Rr-q+YJK9GcJW*73gA6kFHEK(gnKOAM5B4B+^Q zF+d>KRZd+n8fk}tvDw3F4-sIYXy$^!t<1$5-cK|OnwTyCXvP4*ni&9yG{o|ZX#hyX z9sn?n5I~dI|1IKN^9*ZZI??HEX@HnmseC-x2=LbWY15KQ#etTYx3%Eov5 z5afkiQAs*>u&HX+Xt~7j>F} zy?^oJ`TG`e$L?R~f>6%Q*98-qnI}|7dvDApqzq=TTWSk5v%AEGNt7a+Y0cZYnOwzl zzb^{fvgyrH^1P@)Y${$jI@lmhHdk$U52Me812uvo5*T{y{0p#)~p%FHCZCdn$N zMuWqVDmxa^TPC$@p|{0BMWf{aPeCmgD(fIF>`9$YJttv1|H0{IM6n8Iy3L`aUhiJ| zCB^o$5ux;u=n`; z*}iDK?TjEDu^;Y)*xzm_-!oSVVKoW}O%l6IDVDF6_+X(q!%jG9%5NO}Uq=2-+eK3| z(^#wsGB$J8FcIXRL-6%$uA>5&{(zUlVcpYN%;BGj1Wys<{E8IUNlY;^i6Bvdwid8g zJ3<2nah=*nRSmY)cfR4T%lg*v*0Stc#PA%$hfShP3|xDWmE4o}WYc9x6+QHDgPvb= z(|;@?*$8ZS++?5l(CqkC#;F*+`;O9dK1=^t`iv9I%Bzh#J_>y_{ahQ+0M>Zs1%H__ zeB)%^OKKO(ct_M08sFDKDPhFl)vrx2hx!>&3X@wJ@bzxP%9F@dx2s0szUr8Q17u+@ zHsn!yU;kNT5f-`*&g70ssCQK!0%*ST*5dmFgC^ixZ8Hz%E64Y+$igcS{lWR)yoA?R z&|_=(SI;f1Lg$35{N`jk41lhtv4M*fD3!00otv1(M3DpfJ@v@hp!TU8;*)^w;R2)~ HOp^OIOCkhp diff --git a/a02160.html b/a02160.html deleted file mode 100644 index 848d0efe6..000000000 --- a/a02160.html +++ /dev/null @@ -1,163 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_aes_gcm_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_aes_gcm_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_aes_gcm_ctx:
-
-
- -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
Context structure for AES GCM operations

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_aes_gcm_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("key_id", c_uint16),
-
("key_block", c_uint8),
-
("cb", c_char*16),
-
("data_size", c_uint32),
-
("aad_size", c_uint32),
-
("h", c_char*16),
-
("j0", c_char*16),
-
("y", c_char*16),
-
("partial_aad", c_char*16),
-
("partial_aad_size", c_uint32),
-
("enc_cb", c_char*16),
-
("ciphertext_block", c_char*16)]
-
-
-
-
-
- - - - diff --git a/a02160.png b/a02160.png deleted file mode 100644 index 8c90a82cad9a37f9f33380b038444e5a09eacc1f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 705 zcmeAS@N?(olHy`uVBq!ia0vp^Pk=apgBeKLUDCV*q@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)?ljp5ts-Bma^gJhtRRk5i&3@gg zVtwytp8S+MYH|N=PQUYN=e_mwCAu4*#`EQ@Pg-r|dGGw@+oq@8F2>xb(7g6^o=X1n zo5v=fPjS^Uki6kMY5V7r^0%>Sld7jHoxEKc{CH=G=cJmJ?_S&7i~0Y&eLJg8J@{vk zv+l)9iT`uTRZsRGfLUJPIcdv*?H+9cO@#~(&hBA2V0B;NXH{+EQ*#f!zHhqwoi6Rx zX1H-cmGJ{Gv;JWJc`I9Yn)s?lHZaI4SL0RXT z?}p0ZMru!wT%5dI^K3zBX4@m7OHN_w;RNs?_`ReBG)x`CPLvnimwh z=%JEYmn``d zp6YSw_{Vy0Y43A&cU50TZu7f*Wv#T;mKUGdk56ikQ}LXCzYz&^RelF{r5}E)VMp7*R diff --git a/a02164.html b/a02164.html deleted file mode 100644 index 723ba0ca6..000000000 --- a/a02164.html +++ /dev/null @@ -1,162 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_aes_ccm_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_aes_ccm_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_aes_ccm_ctx:
-
-
- -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
AES CCM Context

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_aes_ccm_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("cbc_mac_ctx", atca_aes_cbc_ctx),
-
("ctr_ctx", atca_aes_ctr_ctx),
-
("iv_size", c_uint8),
-
("M", c_uint8),
-
("counter", c_char*16),
-
("partial_aad", c_char*16),
-
("partial_aad_size", c_uint32),
-
("text_size", c_uint32),
-
("enc_cb", c_char*16),
-
("data_size", c_uint32),
-
("ciphertext_block", c_char*16)]
-
-
-
-
-
- - - - diff --git a/a02164.png b/a02164.png deleted file mode 100644 index 01e04ab785019a52a59e855a253eedb96ad4dd6c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 688 zcmV;h0#E&kP)vTJr#LVva2S`&=)l0h|Ns9}lGCUF000SeQchC<|NsC0|NsC0Hv*f~0006z zNklyIiyEBAN@k z9Ex>0C&|mXxAEjXS+NzEH1?3><=ov}dzXRa+NDVHaz4~}PF0d5Z{f3&?bcieetWrY z-^s0fTSG0QrNjPgcO}XHf{-Lh4}>I1dLSf8(gRPCG&6G!0DPDi0C?vKlCReTET14b zIr_JJgk*GA0PsOb0)PiX5&%39k^ta=kOTk^gd_lXAS40610e|j9tcSQ@IXicfCoYn z06Y+q0N{a;1c2)?GxH8il6(`AlH`Gqlq3(FkQ^mU<7;R+>+`yi6Dg8(0nL4{l00Yd zb;;>-vP9>baDDKkT=AJK>{O zP}S>C$=0=$xi0h{k~y&(c$ZSGx^>w#^Sw^8Y|D4cbs*WTvVKX9Qu=qjFY;N*!E(*d zStZANvMR#2_v9#g)ObpFt?QXxOG8^X`}SKusNA8n-sZ{^DRq;qW8?0+-`DG;4<#j) z|0+Y0ew<^;(brv)?j?1arfz3KZ=#2iyIv$oKh0pdN|GN!Qj$Cnl9J?sNz%;BIsX91 Wg%}5{*+aGf0000gGW06 diff --git a/a02168.html b/a02168.html deleted file mode 100644 index df87a96ef..000000000 --- a/a02168.html +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_aes_cbcmac_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcab.atca_aes_cbcmac_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_aes_cbcmac_ctx:
-
-
- -
- - - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
AES CBCMAC Context

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcab.atca_aes_cbcmac_ctx._fields_
-
-staticprotected
-
-Initial value:
= [("cbc_ctx", atca_aes_cbc_ctx),
-
("block_size", c_uint8),
-
("block", c_char*16)]
-
-
-
-
-
- - - - diff --git a/a02168.png b/a02168.png deleted file mode 100644 index f2623161b97c9c1cc6143770188ca1f0154857fe..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 713 zcmeAS@N?(olHy`uVBq!ia0vp^KY=)agBeJ^X;N+hQqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#NsBJY5_^Dj46+y*+8Q0T0V@ z{h2@i>)XZTN;)ps=I6n+a+7RCwAmJ2?e!W^pL75h`MH{-$+wyoDRh`$xIrFzmI zmGaOXRp)rKwI;O60eRoAmg!d{?3>~YWN#1O;a%-FY5ue5XMYRhrQ~M3ef|FDu8Y~0 z`D@qivtPY!@{{#ot4-8TMl7-PJf^gzQgf*b3&Xx++zd`a*ZzF%S|xX_Mu2~n+;y95 zYX%qPvy2L2nS2ZzJ&GARTxT&m=v}&y#Z(h!x1GkB?taa3G(s?P|;M# z)bj-D^Xxjx`gw7~!rGU!-q*~@-YKBuIsM1s6L}~88|`2Ab@sEv`giVF*NLs)n3)xC zz5Mi<3VZh}w)2~_9^5-|dBVEeF)`Pz!vE$QTF=Yus;SrmMXDn0I2`&t)$>FMYN+ mQRZ1?0S~H#I4@1XpX>{|jX3VDPc8r^ItEWyKbLh*2~7at%w5C) diff --git a/a02172.html b/a02172.html deleted file mode 100644 index 45b691dc9..000000000 --- a/a02172.html +++ /dev/null @@ -1,130 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcab.atca_hmac_sha256_ctx Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.atcab.atca_hmac_sha256_ctx Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcab.atca_hmac_sha256_ctx:
-
-
- - -cryptoauthlib.atcab.atca_sha256_ctx - -
- - - - - -

-Additional Inherited Members

- Static Protected Attributes inherited from cryptoauthlib.atcab.atca_sha256_ctx
list _fields_
 
-

Detailed Description

-
HMAC-SHA256 context
-
- - - - diff --git a/a02172.png b/a02172.png deleted file mode 100644 index 8507dfbc2a26ce4371b1bd8d3dae7d3054736785..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1175 zcmeAS@N?(olHy`uVBq!ia0y~yU<5K5Iyjhtq`k$_P#`58;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6Mak2}F{Fa=?cBecR%`Jb z6@Te7`Fs7NY}UpP3*XfGy|wjqn{Kti;fLU%{Tzxcr=1egwrR6JV31)j-W+?E{lV12 zc>T0ze)FSSZ!^5ve^YK7WJm^$81QxwYYWW&%3*dxl;rLo%lL_Xt|s+ zH~u`kG+pS7<$_Cs5@#B#4UP9lexJwm*G8Qo=vYcx-DbN9KfUHPDT zyF=HjpA$ zp=kb<#~&*q#N=FD%APU+ZBbC#v^t)V!^MR;_vuQly081zr5to}d778yTp^ls{;{vi zl9GFOtr^#xeRrPW&E_!s*dL67q2DDNSWMo8|GK<7L*HIY`B%p6eT$Xd9U>=PT9H|q zsd;tk{*bL#zJ3VKIb%78;e@gG{u{ejFRuO))VFwP)aqp?x4Qan`4aDXb0f3X4Bzt4 z7CRUgIPe^c&~>!_mdExt;+oDY@BiCZT{qa8Jwd9D(V=d`i`$1G!@d9O5u>gdiQi^3{+O&g;kOUNGfRj3bKjpf$TN0y{@CuhVGdKN zObVZ>^zq6k>9UMV+lyRQOyiz*Q>^2;pVWm9S5~a<=y0=Qc5r!W_r9&;#r-Q<4O%=M z9eG#wol4K_>3H?K{huqt*OSgJUu>i9F}b+h*8nFK!HKcC408R)4{u<2u(*n;AvKcy zLyeSrg6sja`r9mLm_Mkz046BBae*Vk>{bdmZO~y66x?0Jz;}SLqvOU^riPh`+Ww&* zSAQ>6<(}4EBskHnx77R1$I3mfE>l8I-e=liwp$t$Kg!nfu8b2RTK{^@-P85$(_*8b z-feHKt%_JgZY>SG{OQsp_DT~EX1ST0maoj3?&j{^)th{ikD)Sc<=1y>U@_DNjG?8o zqH;DA&zmvJF=S!In})86&*zh6Oc_{{432f>0i&s)HYsBBoZeEAcW)nP^{cImRgF?( zFliT(D{TPA__1{lP8l%=SiRWpu=z#sqtgstQaf%j2{YWfm~6YzhvCH?Gp^O32%C}9 znBxzMulKvlpEOuD=&}Fda5!_VStY`+(TdNgeNsknmestk65jkzI|6jYb=0F3{*@GP zz2Lj-Cox~DG!z(Vr`B%n>^QMKi)R5Bv*1MOt@;b1Oo5@}z0CE$fWu^QSC@TZlXVr8 plAM7dX~6&t(_0KJ0!@j3**$J%udKDvu>lq#44$rjF6*2UngAs!^g{pu diff --git a/a02176.html b/a02176.html deleted file mode 100644 index c6b45943e..000000000 --- a/a02176.html +++ /dev/null @@ -1,162 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_cert_type_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_cert_type_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_cert_type_t:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - -

-Static Public Attributes

-int CERTTYPE_X509 = 0
 
-int CERTTYPE_CUSTOM = 1
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Types of certificates
-
-
- - - - diff --git a/a02176.png b/a02176.png deleted file mode 100644 index c7a175f0e05f813a3842ac2a94f3e423c96f1a18..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1054 zcmeAS@N?(olHy`uVBq!ia0vp^|ADxJgBeK5e>~d=q@)9ULR|m<2Z_IU^R=}9&~gg{ z%>s$(XI>mQZ~!PCJn8ZZpd4pOkY6wZkPimtOtY^rFfgz5ba4!+V0=6G<+j@jJT2`X zEhpal-}#z#^Nk0pZ}<9XZJn9TZgN1~;b*silYtJ4py1}By65788?~PQFa5XlT~|j< z!@LLLf>%YQOEoS?WK)|~q3%yDo7!voK~38^eA>s{^z7U0=YJwh z_Ua2}{{Q?fCHSciv&dte&#AjCYKyPkxNkl=#ryf6%rh4EY-%gFME7eYl}_t^ZSi{F zOpV81mv^sxJKJ;9%IrUPe|G=beyiN^?4p7x$KU;FHNW>?+1S&pboTx@H#?cHT)X~g z7F;gq+Yq*M@AjPs*>6(jULOPxSd1J?r+r`xst6QDuKz`FVTKfBwM8Rrg$7^e<6@?J!e=`d21~!$#-+ zSKah$DEudQzl3Sc=jy-ZbqpJ{pR+UUE+U0dHOIb1fQQ>L^y(U5T!)6PJ@wQ7XEkGT z^_!@B-wMNnqL1GxUy=3mzB-)_3Yc$;yRsK_ojDj z`R^UTb;o*p|I5_a6S>C=pKscemB^d^%s-(p`g!XV_uXGtD21iVy*Uth_Up98Mq91R zWqv;n{1{%Du_n{_&9k*~_3}>vN9m_ zZ`9nPEkC=R7p(e~IZHco=ght5*p45&{p9`?(a@{wudw!=`xzc;s`$LTE;JMv8^El$ a#$J0*cFfAfZNk8u%;4$j=d#Wzp$P!*!7M5O diff --git a/a02180.html b/a02180.html deleted file mode 100644 index 0ec433b11..000000000 --- a/a02180.html +++ /dev/null @@ -1,186 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_cert_sn_src_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_cert_sn_src_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_cert_sn_src_t:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int SNSRC_STORED = 0x0
 
-int SNSRC_STORED_DYNAMIC = 0x7
 
-int SNSRC_DEVICE_SN = 0x8
 
-int SNSRC_SIGNER_ID = 0x9
 
-int SNSRC_PUB_KEY_HASH = 0xA
 
-int SNSRC_DEVICE_SN_HASH = 0xB
 
-int SNSRC_PUB_KEY_HASH_POS = 0xC
 
-int SNSRC_DEVICE_SN_HASH_POS = 0xD
 
-int SNSRC_PUB_KEY_HASH_RAW = 0xE
 
-int SNSRC_DEVICE_SN_HASH_RAW = 0xF
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Sources for the certificate serial number
-
-
- - - - diff --git a/a02180.png b/a02180.png deleted file mode 100644 index 2afbb2698f3a96ff570a38904f5c969709b33c2a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1147 zcmeAS@N?(olHy`uVBq!ia0y~yVB`g|J2;quanNy$47rwlnziU@RZ|bkry^-gRAN%rgSD;vH4I~=bf-*=asU}Grp zFDXuj+`!@Ue zpRFG(;+0O_x*>OW+Le@P+#%N^-)%o@df#qO_B(m?$xj&dZ)=pF2%pa$oZs|fb!UX} z>xFzqxA#@n-A*~a{q&;aCsitsM4PoOUOCVA%01TBqfbt}`tUC_Z=JL|NG4MH?SgHs zm;2H)7PGvQn&+Rfc4}>&#ew(@8>jZATc;*0?tL-u+rbtuN4cl}=JguQ-#Upm_l?>6 z-KENUHWPanJU{4_!M{gkR!5zXk*^Gmb;#@jD=%XOPOeST#0`P{#AuCKhdbN8-` zs*|4>$8C2k`h8@5&7?o^#pm3%I(U3KUvSE8bGzrK^#w)CCp?jNF-vJyQ3eLThf&g| z!rgcCk}Me>Fx_Ev07lW4JMS+kN;6zAJUM~yCPM?m&I!B>9TRwgOpcpmGIuQMof0JU z)1jzb{4+3)9=?-2>mXLq|)>Hi5giSPE?4EN?v z|8_in-s{DgdGXfI*S8-3DHM3^m{17Q?=yd|KTeT7aa;1db#b)qYop_)EBBpCTkK_T@&m z?i5V=+r)eQ$pN>{Q)b6X7gzP!uas7nUZ2wPddGTc$J+s#2d2Xi;Qwz;Kw);iVqcFvC9-&P*kvAdpoV{caDj@|LSJ9Dn} ze~Wx>ka%72){Rj0^6&2xHU!_fyI%kp{N>+4kx>4< - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_device_zone_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_device_zone_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_device_zone_t:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - -

-Static Public Attributes

-int DEVZONE_CONFIG = 0x00
 
-int DEVZONE_OTP = 0x01
 
-int DEVZONE_DATA = 0x02
 
-int DEVZONE_GENKEY = 0x03,
 
-int DEVZONE_NONE = 0x07
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
ATECC device zones. The values match the Zone Encodings as specified in the datasheet
-
-
- - - - diff --git a/a02184.png b/a02184.png deleted file mode 100644 index 2d6f58da0e85484c3c9022a89843dd5a4a0d67f3..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1260 zcmeAS@N?(olHy`uVBq!ia0y~yU=#wfJ2;quq)hUZ1|TIJ;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6rQFlSF{Fa=?cBGMRv8Ge z&fa)x=J)zXt3OR;b_xG}E$gk^v^awlk4v6y`*{u<%=ngY;*81bMAexyo2I6uafMBq zsTtv!w(NtSYI5EAGk-Mhtx_@m{P_oq>fzMAKKA-Cb$hR0bJviRJ>!+vcJIX#;i8k9 zY>e8UojFs(K7V83nj>CD#{D<6BR6*ypFHtr~S3g(FNzP%*;Or6oaCQ1H$7h+tasi1>F2|@Mn!w& zvvpRd%spc2p)_6GZNEUzwqN`(K&T z*PFQ$UU&RH>$~muK|#Uqm0_OSz0c~%PJOQ>t2U!LYxi68jlp_5#ev%A=WAS?x7ORk z`fBK=kUJtaa#!cLeBanE`$tnX+p2O)p_SK`V|n-9_hg;CviF93*e0GVzrtA6*}Q*q z^ep|{+`agUJnb!%9x<-3ExfgL(~QXC|5GkM`~Nm%ZGMEk`|T59e?zv(|FF4dRyNtY z4Cs{pN-s~BHR;LfN{_yO*fc3^rHjiSrMOU~-&P=jU&lH-eoTc0ToWuLW2VgUTRu6H zui^Xyo`f|l3y%NHQFo}0;#7Ekv|}#A*-TXiX&n}a4MGeDy%<=u83oo*f%8K~^{@fY zGFypNtIkwKc!o|*Pz?=jni>+y85R_(TI1-s{?O8zDwBI}U)LVpcI_v>;Cla$HnaXO zd9vYN^pud$y~q4cK5e#{7XN=4V|;hs)6a)*r#`8&zZMa8G9q*3j{ZAw>&%PY=k@KF z+BY|I*Hw`-)0Z}Gd$;dc&3=u@III1oJ9D|ViLW$t_j+G7@zOPK!Ar+|x0___Ubpn| zuU&J60*fykd$x7ZIYdG(2 z61?vX+gFX*IXZVWF6LIapZxX7U3&TACFY59MSlhzS$8hZGt~6?#7V27&MT{WHy2-f zrFC)dk0QO7nm@gc=uKbq|6NXZy4kr|mv4jOSNO|~{-^c3y{?(BnZG!9NuB*HLtD|p zFGn-4AAGFe7ZP)Cnb)c;TWRai(E6@q)!r|wR{1}kCVKnl+EuSU?)bFq*uqJVzl4N- v6@QU4XVt3xU9bR!h43NQlLkD^nSJ&37uvqMs%bw4mP-ttu6{1-oD!M - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_transform_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_transform_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_transform_t:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int TF_NONE = 0x00
 
-int TF_REVERSE = 0x01
 
-int TF_BIN2HEX_UC = 0x02
 
-int TF_BIN2HEX_LC = 0x03
 
-int TF_HEX2BIN_UC = 0x04
 
-int TF_HEX2BIN_LC = 0x05
 
-int TF_BIN2HEX_SPACE_UC = 0x06
 
-int TF_BIN2HEX_SPACE_LC = 0x07
 
-int TF_HEX2BIN_SPACE_UC = 0x08
 
-int TF_HEX2BIN_SPACE_LC = 0x09
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Transforms for converting the device data.
-
-
- - - - diff --git a/a02188.png b/a02188.png deleted file mode 100644 index 00b9905e71eed235eeb12f692b97ca0509bd6124..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1064 zcmeAS@N?(olHy`uVBq!ia0vp^|ADxJgBeK5e>~d=q@)9ULR|m<2Z_IU^R=}9&~gg{ z%>s$(XI>mQZ~!PCJn8ZZpd4pOkY6wZkPimtOtY^rFfecSba4!+V0=6Gb=evPo>ueQ zTh%K6tJ^JB5@&Q@zP$9-lG1)I&JV2u|CL$xs?w+8U8eu%-v9ad z=Jq4;^Z!SDd-I{YqoxOD+}wDVBdg}vgKS}VcZHdO=d{KD$BEVq$9~TLv5Yxk?)}&M zKQlMPTG}(*m`V!c>f1k;O?=y0J5|n}`Z;&L%Gy&u??2~Pxp{H3ZP{A?wRcZURyiKE zSL*(TKNFuw|0?^p?r!vI-qq2k{U^PD#Zu4n&gSo*4HwS(djGz*^G?{=^Q&EN{oiAI zbLA%=W|7BhKBw-os4c&C!@f-I$*th+r;v` zy)jc|x7Bg`Ir}^6*Y7oaCDyvwg73M0&Euc;MQSJ4>3zO_`ozh=^$92D^OWi(*w?|?u1YvYmNEVaqaY#Ldn^=S(-CfiQIMb{KKg;OE-DS%DcNm#b&3= zy*aRX)@$8<@z-aix3Z?}Z2LXGDM~lZ{Kf)sEU - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_date_format_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_date_format_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_date_format_t:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - -

-Static Public Attributes

-int DATEFMT_ISO8601_SEP = 0
 
-int DATEFMT_RFC5280_UTC = 1
 
-int DATEFMT_POSIX_UINT32_BE = 2
 
-int DATEFMT_POSIX_UINT32_LE = 3
 
-int DATEFMT_RFC5280_GEN = 4
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Support Date formats by the atcacert
-
-
- - - - diff --git a/a02192.png b/a02192.png deleted file mode 100644 index 321906c348b39d1188f078987e6da7723118ec36..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1152 zcmeAS@N?(olHy`uVBq!ia0y~yVB`U^J2;quq$-Q*Z6GBb;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6h1=7`F{Fa=?cAHw?kMoM zbbqqc{rg}1xOGBfwfC~QFN?+yFDLPwG%)V=XiJ$f)74Hb z+4Fu{+VzLUMrY3G9Xp=7q_BTYeP2&~?S;$FQ*}1qPdSrkm-_gzW%7NYw3R!~o~fI| zEhBt#LQk=zWpz#Uxrootrk^q}-YqprQ8Fz}@Z@yS+h`o^sJ$Bb;x1kdey_UY}@Kbs9~^-aIcohYuy z9y+m_+11*+zH(Le_p@==zyD2`^yc%1p1sXmKUV5I<;?gSV!G`_(UQ3*e%-a%YjeG> zeD(7>1J8LMru4i^=$e{2wcYEiOOe{v+x3FGpY?1`m}K)XRPyVLPuo_uU!J-#+(zWi z{PWY)l5>h1{>QobNq_J2ba#tYUi0;2&9|64-G2=wf0t}ixi+=XV#oPsJ!O|NPi8#n z0h#~t(DfyEL-!cwvTqM`|Rhk`2Xi;PA~3Hx+vGP`?u`Bg+0~1b5BUvZ}$HAC4cU#5R>Wo z`p@ULzN}oi@qN!8Asw$-)ox_wzMdHz!=gX?eQ{kYjzt_7dmYPq?sTa6t$UKYmu97GoE%n}tztN_W#)ca!M0MR z$2a~N8znKno>%R2EY46Qr(S0Hw;Gq^i0G}=Mys~HKXD@S@jb(rCop(Zo-OzKnHtMKJ-(iD`r*;z zD>~Nf=RKM;ud5?|vevdcPh1l!efZ?}H}jOAFMoLS?qBbW(;C~_cmKXR<8#VR_B(rb zyx;Tgdd?|}6y5Ug>lYOJ+_}4-9~^?9thT#4Wy-`LucUqd7-E}iPyev;X9AWL44$rj JF6*2UngE(W6!riB diff --git a/a02196.html b/a02196.html deleted file mode 100644 index e4325d1eb..000000000 --- a/a02196.html +++ /dev/null @@ -1,180 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_std_cert_element_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_std_cert_element_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_std_cert_element_t:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int STDCERT_PUBLIC_KEY = 0
 
-int STDCERT_SIGNATURE = 1
 
-int STDCERT_ISSUE_DATE = 2
 
-int STDCERT_EXPIRE_DATE = 3
 
-int STDCERT_SIGNER_ID = 4
 
-int STDCERT_CERT_SN = 5
 
-int STDCERT_AUTH_KEY_ID = 6
 
-int STDCERT_SUBJ_KEY_ID = 7
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Standard dynamic certificate elements
-
-
- - - - diff --git a/a02196.png b/a02196.png deleted file mode 100644 index 4a2b44d201a011810b3b8b8217f252fec717f732..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1328 zcmeAS@N?(olHy`uVBq!ia0y~yVAKS%J2;quWKY3ce;_3t;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6Ww)n`V@L(#+qt(lJ=Wr3 zmENg!>3{u4&zhs+IjYv7k0(b}UlMMb*vNK7d+8J&npDKdnfrWDQidEoxAT(<@)U0eSg;OnOf)Xn*OW#^ruw1bGxzWikUuNALSVx zn*DTTrSZ<`uO7eq*T3`r%gLJM-_4AkzMGerpLH_AsC3fuV=j6?C!h;@SFG6o}{B->0%Bn$k5W3QJkdcEr%la;Y?Vp>_3&&-*r z6EuxC^BAS3O>j#ncc2Zuy%hq}rZ#HwjqPOi!eOlW6NB3t~<$S-m z=aj%U^VGC&p?0RGdN;Bctap0w2qzhjS*U$c09Xt(C3d2Y%@f7i_at+eRw-5netH8%AIS7kD{ zE_467+pYcN>oXOb|7(?<2~IzlmR7khIm`Az>fyD=Z<&~y-wBEFFFSSn_l?7h|B{2f zSM9Q@y8I zhv)%QU`#&H^jgKBH&L@e<`WBbq7^f>Je;@8OVf2q&?(j_9UOv!g0bG|C3f8F0;>CHDzDO zulmL9;i2*Nwr}>c#XVhkbkFiOx8lRKPrkhlox%30%q8CX_?6=Q9W$RBOk1Wpzh1vN z;@+kiQHP#?iddtyEq=9F@RLuQCZ7n6mv_CwnEd{#nnm}`k}In%XO$-VpXDl#4V`QD zs=SwP@^!z{^Oc_k*N4ceCb?F7MtM&$+A0?I_WGQaJ0Gq~`n7TH;opLf%Q9zM^+;y7 zGjFpLo_$l*M|b6`S6@th)<&=SEC1$xztXnf9}4{6CSP+;w*D7;oHzKhwR`Z}-pIB8 z<3EL*4pCE@zkFZKuW7Rv-HY73;i=io{8=COt*nZ=w;`tI_KB}+L+&c%yRPxO|Mc$m z&YSmYH_!jI;oA2f$3k3m=6glCv}DX&Wftag^Sp z>;r}LX?IZAo(OSqVVl|20nEpOf|9Vfu>8-cZMl3M$DYZ(z_N|O)78&qol`;+0PaI- AumAu6 diff --git a/a02200.html b/a02200.html deleted file mode 100644 index 52cac60e9..000000000 --- a/a02200.html +++ /dev/null @@ -1,195 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.CertStatus Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.CertStatus Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.CertStatus:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int ATCACERT_E_SUCCESS = 0
 
-int ATCACERT_E_ERROR = 1
 
-int ATCACERT_E_BAD_PARAMS = 2
 
-int ATCACERT_E_BUFFER_TOO_SMALL = 3
 
-int ATCACERT_E_DECODING_ERROR = 4
 
-int ATCACERT_E_INVALID_DATE = 5
 
-int ATCACERT_E_UNIMPLEMENTED = 6
 
-int ATCACERT_E_UNEXPECTED_ELEM_SIZE = 7
 
-int ATCACERT_E_ELEM_MISSING = 8
 
-int ATCACERT_E_ELEM_OUT_OF_BOUNDS = 9
 
-int ATCACERT_E_BAD_CERT = 10
 
-int ATCACERT_E_WRONG_CERT_DEF = 11
 
-int ATCACERT_E_VERIFY_FAILED = 12
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Status codes returned from atcacert commands and their meanings. From atcacert.h
-
-
- - - - diff --git a/a02200.png b/a02200.png deleted file mode 100644 index 2d50c611f2383ea8c9d7af6e7e61344d2e251e3a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1039 zcmeAS@N?(olHy`uVBq!ia0vp^XMnhagBeK9G5xX&NJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIgM<>}%WQo;Ck?(0pf4LDlE z3zmKO=U=nuN#2IHGuJvBzquP~%J{^a>2J4y(+pRRGiQoVB+i(rdkRFnGMlk@uYs}s z^4|$FX3AfCYmj(%@sAx@wYw&MuA8C!n`QInyROC6XP@XM@?CA8`SbkO1BS&CY0uVw zRq$CkFMj>Zi0}4XhtK@kBGWeW<{|`<*37Bc;>p6m|ALiabB5ZC>)A@PW+sG9tISx| z^f8Z(!R)C4LqZ@QGlLi@jQg39(^AC}6_sW=^Etbu1cC|q11w658n1n{D7`cHt%<*q zQf&M6ljd*gU0hcE<4Vi;9&hll!1}O&VC?DxE^lq>~5AXFRB$5oGqh zZzj{_s5#euDb2s*ZF0XqvB+vAN9c@q59*?gA1{(V$dlz(E?2U-s@^F0rS`^Gm&*6r zs5)hq?oHpDQTS#~(Wx!p-ex^}vgZG}o@iUaiK)GbTjCv+lnzTBGI>6|G*FfspNhS}?iIacq^mBqW>mzvaZW&T@BzUi8#bN4q( z-l`R@-CxG{lJ~4vEsL-L?zS-F>;Im^Di(NDErl`?zhmKfhX zb6j}C4qsu@JXllXb?hxD;8kz5rhi`dY|GcmlpBE;s*J5>sNFd5+bXMi3w!?S$lV)m z#l#vf7yZStELH1tX#O2mA2S=?CG4WlY^FC~cf2pRd6huB!L7dDZR_vOEYtlReBr&% zdqb<3<;#rM%;a)gKeMd!-|jTFyK81&PT18OzB_WS{mhjm3zdWZtt(&VqOo?}_nh64 zTUl0a{963+%2T(pJF)V{f-CJ7uhUmbiqPu$rmdlr6e{HtKSfFD*;1g?MES{wJ31n! jfQTzx!cH8MU&tRYRgyh_NwWZ$bs0Qe{an^LB{Ts5T29=S diff --git a/a02204.html b/a02204.html deleted file mode 100644 index 085bde462..000000000 --- a/a02204.html +++ /dev/null @@ -1,206 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_comp_data_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_comp_data_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_comp_data_t:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - - - -

-Static Protected Attributes

-int _pack_ = 1
 
-int _size_ = 72
 
list _fields_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
CTypes definition of certificate signature storage which includes other certificate metadata
-which is why it's often identified as "compresessed cert" for the slot in configurators
-

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcacert.atcacert_comp_data_t._fields_
-
-staticprotected
-
-Initial value:
= [
-
('r', c_uint8*32), # P256 signature 'r' value - big endian
-
('s', c_uint8*32), # P256 signature 's' value - big endian
-
('year', c_uint64, 5), # Years after 2000
-
('month', c_uint64, 4), # Month (0 - 11), see atcacert_tm_utc_t
-
('day', c_uint64, 5), # Day (1 - 31), see atcacert_tm_utc_t
-
('hour', c_uint64, 5), # Hour (0 - 23), see atcacert_tm_utc_t
-
('expire', c_uint64, 5), # Expire years (<=31)
-
('signer_id', c_uint64, 16), # Value used in the siging cert subject name
-
('chain_id', c_uint64, 4), # Revision identifier
-
('template_id', c_uint64, 4), # Location in a chain
-
('reserved_70_4', c_uint64, 4), # Reserved - lower four bits of byte 70
-
('sn_source', c_uint64, 4), # Serial number format, see atcacert_cert_sn_src_t
-
('reserved_71_8', c_uint64, 8) # Reserved - byte 71
-
]
-
-
-
-
-
- - - - diff --git a/a02204.png b/a02204.png deleted file mode 100644 index 69d2020839d9565f9d899fd635c421a5afc74b90..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1163 zcmeAS@N?(olHy`uVBq!ia0y~yU}OifJ2;qu0kC_(}Ls_>w7;rc5|<=HH$pjxt9Mp3(7=xpyFO z-Ra`wv}-T--hb@H_kCs_e_=%V(L3}1Z_<^{>rdKodDnYc9F|8^R1umJ8`Wl{m--Cht9m2?IiN89GR&eu>E}%bc}@Q`qxgWoNTR2eYSJ=V5INl}R!$(&FQu z#y!3+=~3ij@Zj+>!zPa{u-L=z}DSy6~>fV2NZRY%^ z8_gn%?W?DppFh{?aP5J*AJYz3O!~BlQ)}K?FE0(xx<$$|uWXj?FOfdHjZ-fB$+ukV zlo#!p+s|^9?p{{#%1wFFlfJ&98?h0;8`-|eE>BzW_CodLqs3D_@~*61Bt223{0mFF zMd@bE`A;uQ*=zRv=AMnZ(+YQ4%gmCPbmw9u-`m1Je_~{w3Cuil^U>E!YBe*MJ?*Zo z{B=QWeJtPCs}p|}%yG`yCS7duc=dT#-4}1yX;@@wp8q^OeYgB6j=2ll%3hjV=BcgR ztbcXU9r5mJi&B-J4(%2b*6jZ{*Kd;k#sAVXRmw|eIsd-u@#$!laNA{>SzWG^)?eFg zU{k2)@#(uKD7rk1ykxlAGiRxBGTd9s&oJRg;=vD!0*@{v32+n!%w=g%0LD@wLxTpX z)QbFric6;~X?gPQ-*Z*IM+$uJ-UU7?m~nXC;j{bpoZ5TuJ;$RL#de48{#}^mA--qX z2PHn|{qiRtmbIt-{Y+?QD2sP=cA^Q7Qej7b01O>c@a_T3GCby%)lS9#nih*aTdH)` zYR_K%Yme^4nER%z`FB>z-?is`_ras0@4KxWi#O+5?5O^0>T&08{j_-VRA<)8EDwPO3bqQdh3mQ{D_3d;XSgR@5Yca1^~nIJFEU+i|JrE7!U SM{fic8w{SVelF{r5}E)A&M7+p diff --git a/a02208.html b/a02208.html deleted file mode 100644 index 8d9707d82..000000000 --- a/a02208.html +++ /dev/null @@ -1,194 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_device_loc_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_device_loc_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_device_loc_t:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - -

-Static Protected Attributes

-int _pack_ = 1
 
dict _def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
CTypes mirror of atcacert_device_loc_t from atcacert_def.h
-

Field Documentation

- -

◆ _def_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.atcacert.atcacert_device_loc_t._def_
-
-staticprotected
-
-Initial value:
= {
-
'zone': (atcacert_device_zone_t,), # Zone in the device.
-
'slot': (c_uint16,), # Slot within the data zone. Only applies if zone is DEVZONE_DATA.
-
'is_genkey': (c_uint8,), # If true, use GenKey command to get the contents instead of Read.
-
'offset': (c_uint16,), # Byte offset in the zone.
-
'count': (c_uint16,) # Byte count.
-
}
-
-
-
-
-
- - - - diff --git a/a02208.png b/a02208.png deleted file mode 100644 index 62f6dc884a05643c6dadf91a32721ffd08e6a210..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1189 zcmeAS@N?(olHy`uVBq!ia0y~yVB`R@J2;quq|W=+g+NL=z$e7@|Ns9$=8HF9OZyKk zw=mEwkeGhv#eo9{fa1ZEF0TN}ah3%61v3EoU|`NP`w9aCi-D($V@L(#+qrLxK5Ox` zO#kY$^!NTp!tBh4W?b_up5u2fcZ=E7qt}@`_IqfmYO1Oj8+$6S96Hm)+2SxGaznP` znwyoiGiUNvz3+ zkM``Du?tpDPCYB=n7Vj|s&r~vS>w9>rpJEzIpoZ|dgcw&Ufsxfw*=GD#9!W3_!Y9z z((Zpo&hEWu>U6I}D_7q>`|;xTwwX8Or#f)7%w!ejXf)WIz@#XUCg!6c)iEV#k`Tk5 z*mwp7PM4=2RE3x>77K7TGF(^|Zqx_2Pgk$sLdk=2ZuoT|${41b!^@PEs zsHrOZFKP;`T^x0<>)^)vQo*Iq{$=NE(k{RIF240uozLBa)>#u()U9}vtTyd%VgKhD zkdbx&%bMN)GE^s7^DdT%QaRZ6ubD>%LDo*Z}A`u;P^dGA?VRya=*w&hWh zJNdr$4R73+&gom(pE(yf(0M zOUpd=fcb^)SH#%dS6iL2_bIyW`MUPB#Mf()DspJe|+hGWv%zV~I5YC8YzpXOP# z>bT>PQstB4uYG0Y*aa_%dG3pP|LDV+iwY;tPX-4aFv?V#?>gw5-sHhes~7{Oh9IY+ z^69`RzheuGv6kKJ){IGF1)uZh7iIQXAKuYl>DZg!_WGUOiZc&g75E)#Aug7x7 zJL@jJiLbwH5`O(|yxqO{$ZSjZE3y-tvmQhg|BvEMRp7tAqxy5gp$$!o_uOjX|Fbm4 z@yar<=&cemzr)1?v&xcZU48SbYL%P$vAY|7dEI5R`^2wcrNFMs|F(4LzQ2ZrJe&WO z_P+e}Wone=k9-9U@qTL4azs={AJ7&gS>)%@eAB7?{Bi%W&tcv7(8A5 KT-G@yGywpfVhPRw diff --git a/a02212.html b/a02212.html deleted file mode 100644 index 4eaf2d0dd..000000000 --- a/a02212.html +++ /dev/null @@ -1,165 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_cert_loc_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_cert_loc_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_cert_loc_t:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - -

-Static Protected Attributes

-int _pack_ = 1
 
-list _fields_ = [('offset', c_uint16), ('count', c_uint16)]
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
CTypes mirror of atcacert_cert_loc_t from atcacert_def.h
-
-
- - - - diff --git a/a02212.png b/a02212.png deleted file mode 100644 index fb11c84d3bb479d02b5932633ff4399a45c49198..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1116 zcmeAS@N?(olHy`uVBq!ia0vp^KY+M{gBeKv)x8GdNC)_Yxc>kDAIN<1=4)yHq2(3^ zngtTm&%8Kr-~doOc+%w+KsnBmAirP+ARi3OnPy*MU|@dk>Eakt!T5IW>uHZQcv`wo zSx&t7zw^48S-Ft<-NN&3uY7LyOlaV5`6I5_k`TzDr1b5{10|(tV4{TgN0jUJ=^Y-+ z_uu^KePFxhw07SQZ|_|H_N#kaMugnS4Y}v1$to$$zY@A~o|(d-HNfRb^R7KR=2{gBPUL^R{=nKN);*oRWU}I&dUuMk^F(vfF@4Fg1LqD|MR@)g_ zu>KW8f;S%@1JKP337#Y{3by8LzkPO5fwE_HQNg4wD(vc>-c`aj6P`G9*S_ysduYA! zgeNW+SAXX{eZS;ev2#3Q-0!mq9-9I?^5(uz{A*Kj=RvOGZ$JIsuQTP2YiH%U_m>>F zxY9U>`P<>?4<364xeHFQ>7KeIV3N!W#R@r#t>4oUGvcQn7rgmxnseCOtXtno-z4o` z_DZSOP35GU|H0+jn*9k0^DRW3w>qC+wtBsn!p#-YuI5UfW>u_v=B+-lx%^;vRH)Os zXUDchAFC1mpwy-!J(o>?{guZd_PlZVPPWm11vNPRnw;BT{(S3JWqE=L^#kdA;HbIx{>;2t{vMrVY>3Xl05F!zfMo!nb+~H`A%3s+Q%26l`<16 zH?U8<8k6rD;`sR7vih1wFCXk?e0^c!-eRe^KYgE$3!b;)?yFp7{=l^U-en_2xd!#) z=L-HTkA3-C@Vs?A+xhE%B3Jnz$nLMQX21D0%thAvjScTSrScCyW%d1@tC!cX)u|=T zn45p+V~o`4V*fuoZQPE0(ebzGpWt059Xb8sq8a-{3|GENeZFLsyxipX6&u-Ct%_e^ zSW)<9)vEuqwq=FQdo=UhF*}z0uC`ULu4hhqwQALUUH0(Mttud539C(u0M9G?Rc8|> VeSUEAAg~-@@O1TaS?83{1ORnV7%l(+ diff --git a/a02216.html b/a02216.html deleted file mode 100644 index ae871e7e6..000000000 --- a/a02216.html +++ /dev/null @@ -1,193 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_cert_element_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_cert_element_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_cert_element_t:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - -

-Static Protected Attributes

-int _pack_ = 1
 
dict _def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
CTypes mirror of atcacert_cert_element_t from atcacert_def.h
-

Field Documentation

- -

◆ _def_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.atcacert.atcacert_cert_element_t._def_
-
-staticprotected
-
-Initial value:
= {
-
'id': (c_char, 25), # ID identifying this element.
-
'device_loc': (atcacert_device_loc_t,), # Location in the device for the element.
-
'cert_loc': (atcacert_cert_loc_t,), # Location in the certificate template for the element.
-
'transforms': (atcacert_transform_t, 2) # Transforms for converting the device data.
-
}
-
-
-
-
-
- - - - diff --git a/a02216.png b/a02216.png deleted file mode 100644 index ef7064c06cfa394f2a9e14a40cdde5c9f06002e3..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1321 zcmeAS@N?(olHy`uVBq!ia0y~yU=#wfJ2;quq)hUZ1|TIJ;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6Ws9eaV@L(#+qt*P9$5*n zo}Rt+(%=8_H4M_;x5blY@EEAS-LXMwtIFy%r?n3o@VM3+y10nE)lwA{bkpqYF!1tp zX$kaFQtC0+*qQTcy1UDfF8&`5>%)uQzW)>KHLZD{-_(b{%%Am2KA&&-SnHkDVkM=x zW6@&g)}&oA@}KqbqRiG3mm{kyPJgp{uPVF!q_E+USsfkWAD0QI+kTQ&y&NYa_)+WL z?!9uefEKQQqCDltG^5l%%UX@sw$5(%PO>XJcBkyspGm^%N{=RMVz?EM1EM+;Mp~~QP~G3NKRZ@x>>d!co9;@#P2LRDW{_i1Owo_ncz zGgU`ktZ?;Cowu{MY$@GcbLWrV{gcz4hILOW=|4W@&A#OSH_bkkH|<(B&G&ujbME{J zTN1vCtrk;#Dd(^Kar=w3x0}6o-Q6VrPqliY`O}>K8h6id_et+Q&Y4vA@?N|}`_vtB z@6YnDsC&~s)#H-myc^!XZ1clCwXHTymkEE=|Fq=ptB?A6bIMe{6sMY9=4<{K`s{w) zv@^PEjH0ei?abTJ?HBd_@;RgV7Qs7oy*;fCF?*?O-Mv}a)Bf!J?8r&)J};T{FWT!8 z|7SmCf325hR-V5y?`1uC*{baMKNu+_-83hvJYMsp#Amc`*vgRwD8sIcKMZm3U{0>eJ1Nqeaz$Ahu&_Fxox-P z$k`I(4>KlN7ECStoo?B7Ji8|RM%0_z+y3`!XWl+p&YkYw>AvGdujJ1V-u2b%3o7;U zzHL~Xl2;tG$^Pmt{a@##Z?;>-ZWV4>^U~dA z`&|2wzopr0GO;`Z2$lO diff --git a/a02220.html b/a02220.html deleted file mode 100644 index dcf79139e..000000000 --- a/a02220.html +++ /dev/null @@ -1,162 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_def_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_def_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_def_t:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

_def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
CTypes mirror of atcacert_def_t from atcacert_def.h
-
-
- - - - diff --git a/a02220.png b/a02220.png deleted file mode 100644 index 8161cf4cec8c3829e05104d5e958478e70633598..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1091 zcmeAS@N?(olHy`uVBq!ia0vp^cYwHqgBeKfo?QwOkPh$(asB`QKalz2&DYZYL(44; zGz%oApLucMzyY9m@TAKtfO4EAL4LsuKt33lGtIujz`%UY)5S5Qg7NL#zmt||@f_vf zxN7qE`bVo53GAzSBl&jk!cDgBH)b%{b9{_%5jeEQDIslMFyHYrIe}op|6uOctn3*x zrE9b8<(qD^$I5>`^!EAouiN9dxE}uH(N@d-EjTT0U-LC(0A_7I+$wNr2~&gqD^`ZhS!p}2XD98N`7mr-<;!JlpR+g_ z%$^o7Bn0xYGl-GG_?{6tEj27rQE65%pSw#+Aefl`kV!Dmef8f8(dtv{4Fv>wMfOJB z-|$cR+`r2gz8{)ex0qE}FqG@!+K;wtzaKc-drRHAEaz>``7ai;SFDw{z2xY+{MZKm z8+_{@{+hf*TuY;J)zl>y1Y`L8{w`k4QyN?`XX4jr+mws?%ht{=UjE8d)bqY{A&dDO z-~80$b_GGsSDpKpX^->Bi ze7T}N-7SO1a!Xrth2sy=^z@!x!Y!Hc?8c~7_tG?r7ZW^3?lY z^X*+*uGn8M6^^<7es_V?=C){i?u+~W_ASj{cDHWd9Y`dcT)FnO`?a&zEX6++y4b9) ztrJ}~$2cbHYoWsK-RE}1fnuR@gZadxG5fnTu0_Ol|9WzXQOtO%@T!zG;z3rW`bo~8 zo_CZnuRA!kr}FWsxl)Hzj~^@ew><9Eb3v`cTVDGY{Jiyd$~5L3mlogIZDkLwjQw|duJpm!&L2u}r z_3u5fUT)#)(zA-+{FhdD#~=PJ;R2-%i^XGid~56KxN%uQ*VX0C>4z>ZI;TKHRx7t+ ci|1GQkm=^P4Vz{D0kb=Ur>mdKI;Vst0BoT6+W-In diff --git a/a02224.html b/a02224.html deleted file mode 100644 index bd9facaaa..000000000 --- a/a02224.html +++ /dev/null @@ -1,167 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atcacert.atcacert_tm_utc_t Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcacert.atcacert_tm_utc_t Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcacert.atcacert_tm_utc_t:
-
-
- -
- - - - -

-Public Member Functions

-def __init__ (self, *args, **kwargs)
 
- - - -

-Static Protected Attributes

list _fields_
 
-

Detailed Description

-
CTypes mirror of atcacert_tm_utc_t from atcacert_date.h which mimics the posix time structure
-

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.atcacert.atcacert_tm_utc_t._fields_
-
-staticprotected
-
-Initial value:
= [
-
('tm_sec', c_int), # 0 to 59
-
('tm_min', c_int), # 0 to 59
-
('tm_hour', c_int), # 0 to 23
-
('tm_mday', c_int), # 1 to 31
-
('tm_mon', c_int), # 0 to 11
-
('tm_year', c_int), # years since 1900
-
]
-
-
-
-
-
- - - - diff --git a/a02224.png b/a02224.png deleted file mode 100644 index 5889398560987980534c7a53c1a08093f3b065ba..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 688 zcmV;h0#E&kP)vTJr#LVva2S`&=)l0h|Ns9}lGCUF000SeQchC<|NsC0|NsC0Hv*f~0006z zNklsfJ8pl}SL=qWZ(l3vh8pkZ`zOX?VEf8}@KC}^AjylkVKHazsGN%( z55>QnljJqr(5mv@tw=>Dg*_yB4YzdW-fE(I^fi*ahC5r;Q`IHO>-YoRb_*W?D~mb3 zcT-7IGcM86oegwmlKdWAmn5y?x+G~8*Ck1-tfwm?vJ3$57d!x99oEu)JeKlZOLwzf z$#*eb@5}&T7uN*S<%tRMHxlWfPlmN6gQ{gP(- zpLB=gzFBvBDaH8yIb`-wh^HUJA+n#x5xKf?P#)N4o)7y;n#ju;X$Fm4nOjP!<%(|h zIMT!TdYz6A&4`p)F7`uabFa5D@*IP7t6QgxtD7HLlhdb;;-l;L8@hA*IHS4sNO!)N zPr9vjdAN1)f6&bXyFmKqJo(o%RHgd+K(}n)-xl*kx4UVTIao<=WqhuiFLvn8_ij~* zPxkIi_nC~TZacSMJ9Ay*Y+d@}(I3)xea~`*(zef;ZJ(`L<4YN7%7gu$=GJuPlr(wo zR_3azW*F;MC014aHbUd7Yc~vy;zQk2e^6C5!elY4s#?T#RaLFxx~i&H*>pujmf;_T Wb|e=g@kZ7F0000 - - - - - - -CryptoAuthLib: cryptoauthlib.atcaenum.AtcaEnum Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atcaenum.AtcaEnum Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atcaenum.AtcaEnum:
-
-
- - -cryptoauthlib.atcacert.CertStatus -cryptoauthlib.atcacert.atcacert_cert_sn_src_t -cryptoauthlib.atcacert.atcacert_cert_type_t -cryptoauthlib.atcacert.atcacert_date_format_t -cryptoauthlib.atcacert.atcacert_device_zone_t -cryptoauthlib.atcacert.atcacert_std_cert_element_t -cryptoauthlib.atcacert.atcacert_transform_t -cryptoauthlib.iface.ATCADeviceType -cryptoauthlib.iface.ATCAIfaceType -cryptoauthlib.iface.ATCAKitType -cryptoauthlib.status.Status - -
- - - - - - - - - - - - -

-Public Member Functions

-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- - - - - -

-Data Fields

name
 
value
 
-

Detailed Description

-
Overload of standard python enum for some additional convenience features. Assumes closer alignment to C style enums
-where the value is always an integer
-
-
- - - - diff --git a/a02228.png b/a02228.png deleted file mode 100644 index 01547825f3925b3c13ca2ecfb0436155c16bc22d..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 8254 zcmd^Edsq`!-getst=Fn6pa`^ft! z=bZPvzu)_w^e;X4tz5Qo*`h^@R(|pO&krqH^ac)`=+ZYqO{O8&02Ibw9ysEr)9JwF zz_5}?{h`Qi$H!4dS*-*2@81XYhyTRA34VJg=8)&%Mc{t^uze%%$)ZJO55M?)_mTMD zjCA+L{`s#P&pjStV;^gnqIK)n{C3MpMEb}o(!p=#k?-E|^3f9QHm!oeY5d-E=_9Tky)5bVmf%KjDfD| zAv~KFSB}wQxyQiEjuaV|Ye9D>II92n?s&9g6)}s^@h75_DZWSlmnoU(^~b`BrpCp( zwJ-m=jE}NBcES&OLbq0qPS`XNJO< z0X5xQFiQt8@a|9J(wDzc?T&l*5$NeZ?~&Q%;JfyKv*GQf(^U3iXuD4mrP&Yq6VP+*MrzOvY?iJbpA!b^qwxfScwWPBn z@U}4)^m0@Glj@j!L)e05O3z21)0DlmnR~|FW20N{-nuLAQ*o7aPpU#9CVwNlU!J2# zV+V5H>2A*9)D34*EM{Wtx|yJZw+;dj)3mq1r8enl2N*7`BLMoO<|BNIe(<#J`a9W2 ztmVJMEbU_IMh;%{EIPdU*QV&@M4J3G)itEupML5EAeE?@*?;WaN4@}5!g_)J(g$3+ zz8CVZLfosMEl9vM>{wyBqT$YOVuQwD2y%mXe)C;JkQXTY3%5_<`$csIHDa+eTjW)^6-WK{;Di8H92`01% zPD!wI8)|W%xLIiz7;befwgo|AeXFiNW{7elI*s^&wxxm^13uQBaWA>cK)T*JqOEv~ z>qs>Oxn_Zt$A5C7Oy9>!|!C%xwBy=tx%v>n$u#Nakj9S5ot1T~T zN)xndnuM*mTK+yOgUe67Fs@I+#={PIV+N!rag@J$M@-MoIWe(9ddCA^c+4nwgR7l7 z_OlAN0ohjA!nlU9Qt{1*2abEc=*>zqQ$jH9E_|x*@|cyw3n)iUH)ZG&FVQvnS8uCp3e(k0Q6~uN^AE=udln+5#TL7mr6MmQ)K|1rs+@!M*qzoJBYk4P z>tX6aD18n17Qp!*2Eu{T|3QH2!~>cPFpfQ55xAl5K|S?-g)0`XHJqHVWfSdibHdaX zre(h3yB4|NVGEb1RuUV_P90m~@g^y7XN`COk;Y~k{(xfMZz0E+7<1O$)! z7893HFD`NZ8R@y?-pwu}PYkN2dwr=ATplF!dol}WU^UgIjPuMzJ)X2J?g@ez#%|>653<(!=cH$n+lKSq;+lK+ zS`B$Zt~#nF6(go6C1>{f!5(ozwI5TvTbCWB5K1z9d|gHZN36VkI+W*;Uu@t&?8AGqeo$8-3eo{kdj**1JT;}BH-E$D{; zMTX{_Ww((bhO%Sq5~!hy=czAAQTJ9p6F~~vyy&y0ky4Nhw0em*>LydP&C0>~Cpnc( z2%@8dfnVzb@hV@|g82W>OYL4qc)yZE{-d$jhDE%IVCAG_ zCn8DdG|Fq`2a>GNHNTr-k{W}dnY0fNRtOn z&Bjhl#1P3O6U!2u>Z-^k#8M$2oD~@aD>7t1#w6(2Riy#JazgiqU`&4_>_AzUN0W%Jq#I26|gR-#1B%r2r0ht9ZPxDYy1`WN=q%|s& z_pqG%gJ7@{R&|l%4}4EzHM6T%3eFSY5vB#50S;|vhD>wZhVEnD**P&)=IJy$Svz6f z9$)?geRz_}=Tt0BVYQ%zezvUgSlbBq#{D?L$=c=#_%eZJSrA`N^5OM@T+21YhOY32 zb&fr2^EMiLkzJ3C4NTfGPpZsuOXzLa$hmvTI|FB0WzkZ~c$g^J@0!bKd_ICK0V}bD z4MD0g-yjf#J-}@^+s3aRL8khXdhJsnsHDSAE54+!XW7h^m!5hcoYe|WK)e)xK*j0B zNa(!CdPVtD{w0NX-|zY8U#2?#f6yFpqJzi`mdUe4HKi($Vf+~xDtXPKT3B>gk;4(F zWZK20pt?TMR2AAUvoyia_N|2=jyL{8Oz;zDIuF)mfd*YJqt8{|B8N?wl&%IzPjn1NH~?CtlXkLO~%{2Q!{uxB!nin?zg8SxgeXG_QmUVU-6eFAA-KC8XR6eh;Us3)91O@uu^T;dz9+mv7c#SpX?^v;CMZ=D; zue&>va1eA5QqDUZuUKgdD=`l?K@jg`Gc&Ja0nXGU8-+4^YJ+0+L8yFmu&>{^dr1aE zFH+a>htS5wDNh2{@_VDy=B7Zf#I&bk*pXYed-+KD{59NWqKWm&hZeNMK0@ ztb+<#Sl0&Qi~_pnvJSZRxHf7(Nneh=0C(#|T$x-ld|x~-pS33<@fe}(#sQDWn_{j13s8&!XLUOA0SGTjwYCqYnYo~Feon*j z>Ql}fU(9_fO*eP}a2Fd7V0t`5ro3qBcM`8t1pH-UXpo2l5gWZ#GLj5XsteAL)tYzd zu7L2)VqNa>;v3sLw@0>Xm+?;%tcqxbmuRg=!ze1w#CUOSww0hS>-)C2$C?Z|1mIV> z5aK@pW9&yER3t;tNSkVH^c;dTsVEJucD|6Z@AzKus5yKg<Q*%9TRcI34qRsv+=`5i7i_g$ut7(g{Q} z;OJz~SW4}kjr`*E;o%8>!nUSAPm}@aa|2oBuDVPWobbj>msW_X8E z%4`$!3VTbbkI-x|O;6VHW0pi#MkU%ij!%~v!Fg3ilTP9C2rsy;ur864T5KW0uDFHF zTmm4*iWAWqFWbpM@^*jc)rmqU$0i%IG8~9{v+Kxf`1kH=?(GVARw1sYnx$k5PbO-O z`0*lBe#}=>5Bq&k=T=wwFv$EWhOJ+a=ZrO7li$^8(8E@K+aS)fFf5Ryry82W&YlV6 z1_UvC*sTA{+;AH{ap)vYb+{BYh$9n|j%8ZPLhEN+4eHBB#^j+Cv|uL#=>!7$pgT@l z*Efg{u>Ff{Z?tiATX5nv29CQPFA$*~7CpTQ`;yCzJxlRb7W9e%;>=QyniHZk-X8O= zP?awr%7?@!+lD>lSYuQDMmKx?Rj6EEG{lV`t%}m<790@1xqPf)^ZhWfVfKeutnqq z$v1C%m;ml(Q(X^??W`kb5S-+5%PLdVMc0niAwxkg)jDQDtw&~7rV@kX_!hU|1d(=q zM1%L!Dg>dm093kw2s?t~-^zl!z1l?BBX_FnFy=W#n}GBFjW*05Hq(pBiV-pp9XF=X zc1<(4t$y@NzK3*I{|m>c(7bh5IoyJ+Z%|x}?^&4=^^MyNu7G^U90VTaZX86^`A2v| zP|~EvD+eHMyBK?WH3Zc>={>BEOf_hKjVHu&QBGe0;z%3ocN>}6{`*%udkc1bVS)16;ECotj@RADgAUhBx_K zv5IsQf(-RT#1sL}y!1nyCBedDE9OC)6|h3|lfw~j%sQuNGZ`CBcxXiJ@$~n}k=+>s zIcVwn{(|;!=iGqAis@})?6$;GH$v?9zHp`OOq(8-zwGEQRp+@z7NDaM-~%r)$+ zfljn{r4jBAjjS$4Wz zv6bG@4E!Zytqa&>*?UZsJGL7j_OX2a#}GXxeO}`>|EFTobshgZB(zB-mp@VRxTxkd z&wW!pvtl1GfAt#5@jM~COB04+8+d$(c}Ahb$M~1V9Fym4g;Osq%#ad$TFr`lmXK_; zeHSg>#KE)nLe)2F@)3x~(2u$mT^(Mx*eX0ubtZE@i&T(K6$r&s_HUP2BFIpsUSXN& zbxzV;{Wp^9><=Y_Cl&c!*(^{q#~49bTWHVTt2 z$|M!jcdElLg15^_ti_H`9qEHlFY0Y_3b4sF - - - - - - -CryptoAuthLib: cryptoauthlib.atjwt.HwEcAlgorithm Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atjwt.HwEcAlgorithm Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atjwt.HwEcAlgorithm:
-
-
- -
- - - - - - -

-Public Member Functions

-def __init__ (self, hash_alg, slot, iface_cfg)
 
def sign (self, msg, _)
 
- - - - - -

-Protected Attributes

_cfg
 
_slot
 
-

Detailed Description

-
Extended Algorithm with hardware based elliptic curve support
-

Member Function Documentation

- -

◆ sign()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atjwt.HwEcAlgorithm.sign ( self,
 msg,
 _ 
)
-
-
Return a signature of the JWT with hardware ECDSA
-
-
-
-
-
- - - - diff --git a/a02232.js b/a02232.js deleted file mode 100644 index 2906b1882..000000000 --- a/a02232.js +++ /dev/null @@ -1,4 +0,0 @@ -var a02232 = -[ - [ "sign", "a02232.html#a98b230727187cf34e600b9a6ff20cc45", null ] -]; \ No newline at end of file diff --git a/a02232.png b/a02232.png deleted file mode 100644 index 96801137f3d2afdbc8ab2bb78d176c3716de0fa2..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 731 zcmeAS@N?(olHy`uVBq!ia0vp^XMi|>gBeIBMP&T|QqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#Nt+JY5_^Dj46+&7It=z|%5a z|L))a`+uxa&=1UcpEXzJ@RYSa4HMiw{&WdANw{*TShlJ0cvf9$QS|KJ#in*`(%R`c zSM5(O)4g`XMYnOZ;NR5hksesm5$Q$f@l7v1gT0es!iWi&og=Qy#pqekL8ZlrDx5EH9ejA zUbs!gzx1?P`GF~ul}_fr>YMEOy<27f>e=fgJ?r9ulD1igCMg2%;J=*%G_zOw-an`bdL`1?vQd|1KB%phl)$Z%k>8V^Iol@>;Z{#gbL4+4eR z7;Lf*F*LYiDEi|EG`34XC6mWj!t>J#PGwKIuWUZ~hm!oAH*TMw-jllRqm=i>y7Q0c zR_~5wFSa-z@ylS+EU`r^rEhu9_>woTZr;MX_DC4a_F-9B49HU0JL z`~9+Q9}2@Eb)wH5)ki~K)@zxOxhXFmZZLk3S* KKbLh*2~7Y?2}pYY diff --git a/a02236.html b/a02236.html deleted file mode 100644 index efc93c587..000000000 --- a/a02236.html +++ /dev/null @@ -1,221 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atjwt.HwHmacAlgorithm Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atjwt.HwHmacAlgorithm Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atjwt.HwHmacAlgorithm:
-
-
- -
- - - - - - - - -

-Public Member Functions

-def __init__ (self, hash_alg, slot, iface_cfg)
 
def sign (self, msg, _)
 
def verify (self, msg, key, sig)
 
- - - - - -

-Protected Attributes

_cfg
 
_slot
 
-

Detailed Description

-
Extended Algorithm with hardware based HMAC support
-

Member Function Documentation

- -

◆ sign()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atjwt.HwHmacAlgorithm.sign ( self,
 msg,
 _ 
)
-
-
Return a signature of the JWT with hardware SHA256 HMAC and stored key
-
-
-
- -

◆ verify()

- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
def cryptoauthlib.atjwt.HwHmacAlgorithm.verify ( self,
 msg,
 key,
 sig 
)
-
-
Verify a signature using the software HMAC module
-
-
-
-
-
- - - - diff --git a/a02236.js b/a02236.js deleted file mode 100644 index 0f3ff0aa6..000000000 --- a/a02236.js +++ /dev/null @@ -1,5 +0,0 @@ -var a02236 = -[ - [ "sign", "a02236.html#a21a92b8d373a29b54b11448fdb7b2ce4", null ], - [ "verify", "a02236.html#a732d6227271912ac665bc7f27a1012ce", null ] -]; \ No newline at end of file diff --git a/a02236.png b/a02236.png deleted file mode 100644 index 6cb47955eaf11fe367317cccf24fab4e80168e82..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 773 zcmeAS@N?(olHy`uVBq!ia0vp^cY!#7gBeJ!GHK8QQqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#Nr)c)B=-R4~4sd%Ntl0*{Nk z{>4B4#pRDbQ+nb(NA6OHPLO{hXJkgQz9jw#R-sqFf0h1R*S=2IeATM?7pL!wy)_BQxbnSh*{WB| z5stj#q^@MNis6CySB8c}Q|&jJ&q8D-yVofn)zDE3Icu=|rq7KFYaL^E`RcW8xo}m*%f7Vtpn0!*-DbAaKg|TD zmt=SCp1J0Xi(2etZ@!I-vo&tZ+?Bi?xZUq;W`@iq_dEM?ea}SS$+Px3W&Arv?*-p| zpWUz7=KBBtFlASxS-{MdIv)DF(r(ARJ0onB?teVr|2hvx=KRlJe<;SD)R(^#yvyp# zr#m|@Y;)Si>~t%gedp{Kyt|@W-iYf=*xIsma&-6f^)q)an)-O}dIpuFog$yF%>46X zUD~v$B2V{CcGtIad)^D_mr%L+qU=KQuItyeJ?{mUTZPZ`{1nq(vhKo!C;VR<{io|! sOsZKrd9LRq<_viFwfecFg#2aRy^6bOa<#HQFu^i-y85}Sb4q9e0N)sJSO5S3 diff --git a/a02240.html b/a02240.html deleted file mode 100644 index 0a128c275..000000000 --- a/a02240.html +++ /dev/null @@ -1,133 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.atjwt.PyJWT Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.atjwt.PyJWT Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.atjwt.PyJWT:
-
-
- -
- - - - - - -

-Public Member Functions

-def __init__ (self, slot=0, iface_cfg=None, options=None)
 
-def register_algorithm (self, alg_id, algorithm)
 
-

Detailed Description

-
Extended PyJWT class from the pyjwt module
-
-
- - - - diff --git a/a02240.png b/a02240.png deleted file mode 100644 index 3f3529a99d31570e36f04b9ca4edc4fb9f0c1ec3..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 588 zcmeAS@N?(olHy`uVBq!ia0vp^^ME*jgBeKP-)Ykeq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)210I*- z=5s6mtN+W8o@C)L-E_@957S2?Q!LJ%l;7Jr^X8rd9z|h6{VI!>$a%W$3|@b}B>39; zOV!V+HpZw_&a}TYyQJ{j;*9 zyS3zso9WH$pgD0bx=WLOD@#7ln zPTrSHyY_Cs82$WL%e?JhxJ#VYv(374-`RiP<;_)jo_2cg8t(uVQJy`nh-N_*SP{@64b0>vh`7(#>+&%gyWLz2on8+FhG`<=x!;$tr*6 z^;_1xONf8}!dlyN|Ks33;h*JSk7-U@A|d|v+@F=6m;Nh#Rnhc% - - - - - - -CryptoAuthLib: cryptoauthlib.device.AesEnable Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.AesEnable Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.AesEnable:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
AES Enable (608) Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.AesEnable._fields_
-
-staticprotected
-
-Initial value:
= [('Enable', c_uint8, 1),
-
('Reserved', c_uint8, 6)]
-
-
-
-
-
- - - - diff --git a/a02244.png b/a02244.png deleted file mode 100644 index cde2b43f7eb6e314c0744b250d6ca34f189cf2ab..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 688 zcmeAS@N?(olHy`uVBq!ia0vp^2Y@($gBeIxq;!=5Dd_;85ZC|z{{xvX-h3_XKeXJ! zK(jz%`k5C84jcfA2T!`Z0w~8>666=m0OW&#In(Sb3=B-xo-U3d6^w7^-aPkOfv4rT z`P|C?>UNQlOrF(OT=e#@DRW9W@FDTdokM4GQVx0)#jrAXR%tPKTnhfqct$ia&tucY z;^igM2OgzW_3&;ul2|vtes!*?Pk%~;!SsxYPqy#+%%wU(REaeu*C?<~{iJ?ry3leN zjV}~Ce6HgqRI2p4lV}IPazB* zla|{tSV$Y(+`jJXTZ45o%O1K1eT{$Jz2w#W@M?wyvfndP)*5fJ|IT}$&F1&)_-Sv? zE<3ufT<`3vpS7|Rl_v1#zFd7=ylwAFhM@3`$L~IUr@q^pPsrijDeYye1M?QyuJ=alMWR}dCs-7jM%XS*-!iAf+J<-2Jtx)q$2PoE_n%Z3pdRiq=~w_LK$sjR*_blUn8~}QzPRC4<8(LGH^7i& N@O1TaS?83{1OO00C^!HB diff --git a/a02248.html b/a02248.html deleted file mode 100644 index 5bb58a8b4..000000000 --- a/a02248.html +++ /dev/null @@ -1,156 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.I2cEnable Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.I2cEnable Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.I2cEnable:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
I2C Enable Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.I2cEnable._fields_
-
-staticprotected
-
-Initial value:
= [('Enable', c_uint8, 1),
-
('Reserved', c_uint8, 6)]
-
-
-
-
-
- - - - diff --git a/a02248.png b/a02248.png deleted file mode 100644 index 172e4124a24a6611689d9349c9a66c34d26f956a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 680 zcmeAS@N?(olHy`uVBq!ia0vp^yMZ`>gBeJco&6#Sq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)qN^Z?KyM)&g(7bS^Lk-d|PwBX|Jqq zSXTPk%jYB~m8jqGyfnW+-LwACT$R6)cWjqVImW_JcbuDnEj8i$_3W6Rjd#_*CO&m9 z>n~d(rx8;{?8v~|zw*V7fZoe&EOv#btrj`F`&R=hpj?8ZFqr!StaUA1xR8Y%f#<`cK6 zYTtW$bGmMyR&Vw4+1niNFEzC))<1S5uWVz@e}gC1->bNeR{cF`o4;F$`|Nv*-pvwn z?K-!<-O1hHZ~58sU1<5+Y1v%A4RfZgoB#f3!tfm}`8LtqPyEo5xQdj)WYL%B0zuetjZ#LkU1t#MCX7J^R(~sGgh;3K6yM!0?$|UljPn|MAM4xxh5V;OXk;vd$@?2>|>;Q$zp& diff --git a/a02252.html b/a02252.html deleted file mode 100644 index 279b933fe..000000000 --- a/a02252.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.CountMatch Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.CountMatch Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.CountMatch:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
CountMatch (608) Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.CountMatch._fields_
-
-staticprotected
-
-Initial value:
= [('Enable', c_uint8, 1),
-
('Reserved', c_uint8, 3),
-
('CountMatchKey', c_uint8, 4)]
-
-
-
-
-
- - - - diff --git a/a02252.png b/a02252.png deleted file mode 100644 index f47dc75ab55d9fafa32e3e89d635cc1b51a91807..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 689 zcmeAS@N?(olHy`uVBq!ia0vp^$ALJ2gBeK9+A)zINJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIgg@pN$vsbG9N_x8Hg20Sju z_2>TluWxs!NZG+MXjSfnP~8qEk4*({_8mI&hV_8Qr;jb{p1%}rJTCD&+dkW6c;92w ztjR!iSxw>{fg8ov+ePTIxHASz^v} zOM9)L86L^}o_q-vdtYs@ezZ}Pb&|}1^`HKP*?1HQ*ni8oobtM$e%+=2?p#h5k3aV~KT(yNd`#Qr-Xp=UTnsjXatsgJ zKQJ%=wJ`ipv|%{F|B#WPj)R}!gL4H#gZv?8hCc#mN*<`CrRg)MdG@Q@sGQ_~sOVX@ z<6)s$!mImoYuDc0@owwn%4bQ+p6(%=ry07hO_ck)V|HO&TdeLz-@4n$zje0#*%o^) z*1NuH$DOce->j65FV@*+lYKl~_T{y_RkE|g*4my5yY#@w|I>-dOGJw|zq)aMmf*{? z&z|1>v25|j8@+4Q?v>S;_-{>md+~?Np76QL{_gvAcWz}!c1*>UKtH)yt!tm>RBW+Q zjd+{>@7czu1*Jj7S@*xMXqq@}|I0wJe`V|T9bY^%Z~xE#pLg_RPnW-X==smU+Uf6q z2I|$;$=F!&{Jd`S`gN%6)HT7c&g=@>XEtB={Dmv4y_T&FUwQY7spegoo>eYpN8djB z|9I0X?@8u;wtW9@sGQVom#ek%nw0H#ZmNoH*M|uz_ATuyKNG=$|DWOcqt8~J`}EEO P6BmQ0tDnm{r-UW|=`T)6 diff --git a/a02256.html b/a02256.html deleted file mode 100644 index 7d6c9ff58..000000000 --- a/a02256.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.ChipMode508 Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.ChipMode508 Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.ChipMode508:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
ChipMode for 508 Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.ChipMode508._fields_
-
-staticprotected
-
-Initial value:
= [('UserExtraAdd', c_uint8, 1),
-
('TTLenable', c_uint8, 1),
-
('WatchdogDuration', c_uint8, 1)]
-
-
-
-
-
- - - - diff --git a/a02256.png b/a02256.png deleted file mode 100644 index 9aee26315dd34d436f3db010159b6364eb7f9a59..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 704 zcmeAS@N?(olHy`uVBq!ia0vp^mw-5cgBeIh+uvRcq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)q=b5%GPqW^x-=DzU_H;6j^p9zQllJ&*kJ-~Awjt<}(`3ow`6}x#={{B5 zyVS|Ba>)i!&$y+twc@HjF|3%bD;7+sPjC|!`)wyu)n0jaQ{()tZci`T zXnuQ@dbA>DM{RPkVvzOwly8SCs|0WC<(pWvS-*c;i%917`*yjex!<%z9JB4uctoDM zouB;m&!K=ellca_Z!Mlb@zSQ|>)$;x-`ngf=RUk~W!jOcS05ezQ}*9TlYM#h3oGfi zJjwOKw8_9aJ( z9ae?ScR7{*qvWGq`pTl~Q?|w{?%m1xcYDa3#6QzMUFh5%GJR{+|8oIvtN%>1Q+nDJ z{!DA)Q!i1O<@qz0zFD}+mo+^0W77W$)mP>AD=Pk`{n;OKVdW~jRr~X9yTAHZzG{`- z!srRN!q=?&HRavONvmF6KQ%EV6qpu(M7E=l;7l+3@+}N4tZV*q0@E6Ur>mdKI;Vst E01VGfssI20 diff --git a/a02260.html b/a02260.html deleted file mode 100644 index 71b53c079..000000000 --- a/a02260.html +++ /dev/null @@ -1,158 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.ChipMode608 Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.ChipMode608 Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.ChipMode608:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
ChipMode for 608 Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.ChipMode608._fields_
-
-staticprotected
-
-Initial value:
= [('UserExtraAdd', c_uint8, 1),
-
('TTLenable', c_uint8, 1),
-
('WatchdogDuration', c_uint8, 1),
-
('ClockDivider', c_uint8, 5)]
-
-
-
-
-
- - - - diff --git a/a02260.png b/a02260.png deleted file mode 100644 index 12dfa834be50c0651665edc46cb3ea9b85ac99d6..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 700 zcmeAS@N?(olHy`uVBq!ia0vp^mw-5cgBeIh+uvRcq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)7%HUQZb|A$(bCglfL+AOk7f)7ZBBTu1N7@ zAG_Fxs->p)ey5u)H4Q)g_tW%SL5F{!BYRt3s@pVl56sdQ4i(q*MxQ1oH-+&zDHZ&{wEU$k^< z$X@=H6)HdNIboJNb*k(&UOuVgLcPbxxoU{^Pk_D&5PZ3G31O~=JFf1#_i6db8!K1Yo!ZY=y{6>H+mO)OrsyfZg4eA2CGtJRGxTdRr)p^E`<6+oR+ZoL eQc?>3$QqKsQ0wvLq7E>fF?hQAxvX - - - - - - -CryptoAuthLib: cryptoauthlib.device.Counter204 Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.Counter204 Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.Counter204:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
Counter Definition for SHA204 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.Counter204._fields_
-
-staticprotected
-
-Initial value:
= [('UseFlag', c_uint8),
-
('UpdateCount', c_uint8)]
-
-
-
-
-
- - - - diff --git a/a02264.png b/a02264.png deleted file mode 100644 index 41d2b54d59f09c0386454388573e103bd0d8551f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 693 zcmeAS@N?(olHy`uVBq!ia0vp^M}atigBeK9^K~==QqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#NrwJY5_^Dj46+jXt;9fT!iS z{@k1YyZjp`Sl3VVD&^UiU ze@!C9gVu2GmFHg&VZ5nl`u()qJn!Aj)~w0C=kbXtwtBJAS+_~SoA+{sNlt$9eb=^K z#jzo`f?cHCCjxo9+Rw=H9JwAQst z%l~}SnDoaUZaJ87JYdGmyRi%(lJ_z^_*TVo^z~Pk9`}GfigFDfdAeQ%GCXi~WMr@t z5n*`XOai08EiG-kxX+}#bqgk_$a8Udep)Cj;?9>}J?oa+-1{GH9<=iAp15S@ug)j4 z_TPBEev!mqzh@QJ(^Py-B8}e8%3$l7Tl`n`{n0JAW-H`G9h>cb&Xx0()%9QDZ9->W z&6)dtLuqGdY1=#{f6?tGYk2;y{&-`5j@`RIyA#4h=H~DJDz~ufOUI&O>9YLfi~YMc z%Lay2|8X?TiM@L(aj$ci*fN$SydTxOLUvx2J(1XsDcQzbBHGR({>S-s;0^O - - - - - - -CryptoAuthLib: cryptoauthlib.device.SlotConfig Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.SlotConfig Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.SlotConfig:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
Slot Configuration Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.SlotConfig._fields_
-
-staticprotected
-
-Initial value:
= [('ReadKey', c_uint16, 4),
-
('NoMac', c_uint16, 1),
-
('LimitedUse', c_uint16, 1),
-
('EncryptRead', c_uint16, 1),
-
('IsSecret', c_uint16, 1),
-
('WriteKey', c_uint16, 4),
-
('WriteConfig', c_uint16, 4)]
-
-
-
-
-
- - - - diff --git a/a02268.png b/a02268.png deleted file mode 100644 index 4e516a876e191463755b7410252c36a02d472aee..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 684 zcmeAS@N?(olHy`uVBq!ia0vp^dx1EBgBeIxUv7y5QqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#Nt$JzX3_Dj46+y?AN00#D2I z+3)uK7nav;a{RE~_|{~j$t$^ij(lKss_LE+G%L(Q#d2lSJe69JFDfq=FMn~JX+xRH z&6nBIUj+W%K6%N<=f7QJ>7IX^bfu>)le%ZP?|i39{;Qp5Rt7%dcoq00k3U_0@)KLz z^6cz;(o>Zcg{vn5d6C6cCxm~!?E=cwKD-upt9sI&_3tlkf4N_>&ZO9DufBBLsWW+Z zU!Qw_Rc6wk|6Em*z64&FyrduG3KQE}FU_-B3_ljdF&L~}wyb_{+Ohew>Kf-u)aU(L zVaf1d=>m2Jc~)D79~v(h54bz>GuUxeF?F%iSX}8Ov-Yjur{`yZZ4A%e7d6T|Y=IrV38JoQ}olnYM>woe4=XG;4(`+w^ zuU7f|MXvmp?k&?jXAc@h+`ctMFI)DxWa<0we{YqYJZIi^NpjIIqur+Jn{~tD%-sWC zzBWqrl9f8VF*|LF{_KAK&(hAFmvjCrvReym4spNlVi-}nDfn^)6HLee`=R{?)l#QJF?fZ^54c*72iE8`osF6{*&71 z$X^!zdPm!TmjxBS;k=^oEo!3uy0v$I-*pZy_Tk7qdvo%|FpXqck+p?qC#K9RJUDg9 z{R{KI9NsVQ`HQvpQ=Q06mA?zl)ZeuzR>@>y-K+9b0~93Opg><$Unl!)*LBV$8DP3% N@O1TaS?83{1OS#INL2s; diff --git a/a02272.html b/a02272.html deleted file mode 100644 index 18306a22f..000000000 --- a/a02272.html +++ /dev/null @@ -1,156 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.UseLock Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.UseLock Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.UseLock:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
UseLock Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.UseLock._fields_
-
-staticprotected
-
-Initial value:
= [('UseLockEnable', c_uint8, 4),
-
('UseLockKey', c_uint8, 4)]
-
-
-
-
-
- - - - diff --git a/a02272.png b/a02272.png deleted file mode 100644 index e61dfb818ea0a7e4dee4f79738569c20cdedefed..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 659 zcmeAS@N?(olHy`uVBq!ia0vp^n}IlhgBeJsN^N-yq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)pwC&y({R_kP|%lN+&_aIjs5dKBX1`HReW@<%i~aUXm+U^Q@LDh%5h8rF4?9 zTlDAM%H8#rKF{~8{Z_TNE=h-NnloR{{hVrbmCE_z*Cu+Bxms z$7%ZR`C>n1DdTCvhi^$&Cu0!4J<(O6j-uo@6UN=e*FgA9f<^ zckOw&?eO!QgLO}AJ_kNGe1Gfr@3WOJs|z#!zH!UW=w5#Ctw`khWVg8IGem@w!=}cw zURqi9PJPAHRi0AM|9trJr6!W~SMcPC?{f0qeVXm?)~2WYzNy}`#^T3y2H~NCe`OY* zoLOw@{`$^6^MB!Sk2;H2$Hh7AuDL%axh^*MTdnD}$-d>d{9Nh_C)@3!1^ef<+eZ9y+j}c=@0$lNCij1BdCKW~KSOK5JL#o& zcI}&(mGvg<|I733xxtg}9oYE!VSkIt-X`bgg{wU-W$*ZKTi0{_p}DFj<;th2REs?q daGKFwzscm*m9O(Wf`Q40!PC{xWt~$(69BYaL_z=n diff --git a/a02276.html b/a02276.html deleted file mode 100644 index a6da6aef0..000000000 --- a/a02276.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.VolatileKeyPermission Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.VolatileKeyPermission Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.VolatileKeyPermission:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
VolatileKeyPermission Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.VolatileKeyPermission._fields_
-
-staticprotected
-
-Initial value:
= [('VolatileKeyPermitSlot', c_uint8, 4),
-
('Reserved', c_uint8, 3),
-
('VolatileKeyPermitEnable', c_uint8, 1)]
-
-
-
-
-
- - - - diff --git a/a02276.png b/a02276.png deleted file mode 100644 index 061c67024f4a6120508a00596771d65e3715e45a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 776 zcmeAS@N?(olHy`uVBq!ia0y~yU<5K50yvm~3f*F8(FfeDDeT9L6X|kt_V@L(#+qoCFZPwyx zQ8z!k=fAMLD+^PE?d$d1vem1tMFkaWS{{liDa~UI4E?&AL4bj&Vb!X5TlR#~J71Tr zvU*Xy`h!G+$(c`&r5#Q+Z{71Rzcl*jr(i9iWm9xlttx+gQa8XMN5IP|XS>&uX`!L{ z*Cwk)*etj>Ph!=g#UViM=H&-0&NDOIGz7_o`+NvuTd~S+K|a%lunF4#-ie)v+-=>b2?z=i9J`gw_WzDlo7xgof_tVgRx_IxNH(YC`oHKIpt>h|_=0vWGe1+56cI z)eMPEKxu}CbXEq24{I1080LvGFdW#-#K2Gy2IQRwhUtSyU})NCqbqtaTS)Mu4u|Kj zPzDYL#s-zYub3JZvw7FnZJoNS>~Q+!x^1U^otomae5Fa*u74As_@oQg3LQB5(Bskz z-G+yiZ;Ja`RrFUeolsHz`~2nF(3N%dGxKI&`*dxQPFQUBmvh_lwZ6@s8GgA;{$fo? z1^?Vx^S*OlIag$}ZM~2KmY``uXg>*u-` zWgJdr;qqDB3%D~nPV$*`ZoMn)&af*-j!}X+qj?_F2|0tO5tGw+{_-3s3A|MBpWUHz z-R!v6F_o!r?F2W)y)FKKBj-V0`jm6GbPEI>dVl0_&q;51xlTHpFJWItT5oR8=dZK% z{&O~Dd90P)bN`RHO~Q?p*Dm}%WA~-O&fI^k%ZZOxOaZxD&Njc&KDu)A>5%2`{Tu)I zCZAm#&Y%2sxx?e+v$GHKXdPd6+C2JzoT3=R$*RAfKYC3ve{KBmEaQx&iYMi-v@e>? zG^0|~^WP*p(K`pl6g=g@@i<{gye@-_i_B~LNNp=22bq(=Xk%dTboFyt=akR{01tOk AC;$Ke diff --git a/a02280.html b/a02280.html deleted file mode 100644 index f765ff6af..000000000 --- a/a02280.html +++ /dev/null @@ -1,161 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.SecureBoot Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.SecureBoot Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.SecureBoot:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
SecureBoot Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.SecureBoot._fields_
-
-staticprotected
-
-Initial value:
= [('SecureBootMode', c_uint16, 2),
-
('Reserved0', c_uint16, 1),
-
('SecureBootPersistentEnable', c_uint16, 1),
-
('SecureBootRandNonce', c_uint16, 1),
-
('Reserved1', c_uint16, 3),
-
('SecureBootSigDig', c_uint16, 4),
-
('SecureBootPubKey', c_uint16, 4)]
-
-
-
-
-
- - - - diff --git a/a02280.png b/a02280.png deleted file mode 100644 index ff381111ba0752f7ab967fec195cc92b8834f978..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 686 zcmeAS@N?(olHy`uVBq!ia0vp^M}atigBeK9^K~==QqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#Nr=JzX3_Dj46+z1`Prz~gdU zf9}u!`uBupX=k2Z6=Hhgm7GJTXHmhU+SZvjUp7vBa*~sK(ig{w2}}6{!yV#uyCzF4ybFH_L<2_d%@~?iP@PyMr zxob;L<@YL`ye}Z8^0Ik@f~R~7tLLu=Mq+7c>Ff;q&hRq$ombV#+pe7vbLf#?A!BcL zgi9|IgMJGu!w&@=h6C)0j0|=h+zcNaBN!U^4>2*+2#7H}Xx_lU05k|y$&F@^KRqu2 z{ptD1F~VaKe_4bL_m1uMyRI!)%=>(+X3o+>9+#|xG$$?T+tbjjv#s!V(VRu!TFx<> zi}8ng?>{azec6?H)|YcrE8~>C^j;nJs;#ZLJR$$>E;Zvd-I=q@oSzhSxmFsU50{(W z_VJqQ6Z75E+kdQ6{B3rbpYgE5=cPSjbI+!HJL_;aSl(p&yXP4;ZK0l<=GEx^OTD;1 zV88GG(tD9pX105_PmXd<7xO*8zbJ5d?e@j@o-dNlo3Z-lyV~Q6&}{SpBb1PGJB#@F!y0A=bhVju23#9edXDhY5sEA@^@`9i?&t;ucLK6V6OFb?C diff --git a/a02284.html b/a02284.html deleted file mode 100644 index 23c3e9f2b..000000000 --- a/a02284.html +++ /dev/null @@ -1,162 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.ChipOptions Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.ChipOptions Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.ChipOptions:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
ChipOptions Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.ChipOptions._fields_
-
-staticprotected
-
-Initial value:
= [('PowerOnSelfTest', c_uint16, 1),
-
('IoProtectionKeyEnable', c_uint16, 1),
-
('KdfAesEnable', c_uint16, 1),
-
('AutoClearFirstFail', c_uint16, 1),
-
('Reserved', c_uint16, 4),
-
('EcdhProtectionBits', c_uint16, 2),
-
('KdfProtectionBits', c_uint16, 2),
-
('IoProtectionKey', c_uint16, 4)]
-
-
-
-
-
- - - - diff --git a/a02284.png b/a02284.png deleted file mode 100644 index c1a94d00ae4c0e9fb606f7cf8e680ead4f7b66fb..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 694 zcmeAS@N?(olHy`uVBq!ia0vp^CxAGBgBeI>Z$8xoq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)Q*kWRxk%J&>Xx@0iWY*C;su>Jv^g48_Q&%%O`7&ZK_%0(*zw!DjrTn^ zU9SGWaixO$inp8CPE4HsxAOm-ZI?I1PI`F2c9Z)gW0T(*stbhGRA1~#-So$2lCa6{ z8^OIIU7bqI)f1nvoP8hlw=Umd-8qLz!e6!})lU(eG-pY9^OdDVl5gbK{*dd;?C8~s zE`DxwcdN%I`;(3ymnO-ysOW+jVN9HgEvzgI`PaD_!Y*hjtiP_LvbrHhCVPSo^P^a9 zhMbd*3Wf%H4WJ{#^Cj(UFzYS!J@{c^+cgI}J%O>WQr)N8*kVR`t& zc!@`A@5D;3@(jG^E@|wR<#?&9@Z^^WiCfW61=GVOOaDI=(7dH^S3qgUsS8aZ4$ZtG z%NN{@*uU3$LQ=1lGV`s2f9$@TS1|SW3;*l>pKTJ?&YLlMkL{c8$gEv-q)owIX6o&p zkcYpneF>lN@uJt_jcf88yNdr*_g-1M(oK%1)VSUBlI-<;*;6Y$3yZc}PWQTA)G4#@ zmBH0{r`Czizy0NSJn?~7-E;m0mkImSR9^ - - - - - - -CryptoAuthLib: cryptoauthlib.device.X509Format Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.X509Format Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.X509Format:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
X509Format Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.X509Format._fields_
-
-staticprotected
-
-Initial value:
= [('PublicPosition', c_uint8, 4),
-
('TemplateLength', c_uint8, 4)]
-
-
-
-
-
- - - - diff --git a/a02288.png b/a02288.png deleted file mode 100644 index ea0a4e5f824ee98dd1cc7b2fc630a9d11561d73b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 702 zcmeAS@N?(olHy`uVBq!ia0vp^CxAGBgBeI>Z$8xoq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)YcE&{U+>L z_UlcTFRP_fZo8>N->x^;f4|={x9#l&UiNo^wv*;8ycw;{Jl9~S!}FCBre;r?v*700 zdDTmTv_vxBxK0u_sn7cQ)2<q)03u!U}% zcJgUe*2E|EK@Ag@sIzi-R)HC7S(4JWH84DQ{EM+cbPLys^XHXRRyX9xWKYmx77FHO zsL^y_I53%sg~5gt#=TQ#a##_D?X_vG3aOJvw=jo2z*O%zv1 zHMml$DLd`?k*oQsMt7HA`|4x5gv-}@YmroQ^iK14CrzVQ_nc~f?{QScGk$^Li4WZB zo^_@yl3$jn?7VjP+N34#gBm<0sk3&dR9<2OMZ`Zwk*F`lT$O7Zfhmo_)78&qol`;+ E0K3*f8UO$Q diff --git a/a02292.html b/a02292.html deleted file mode 100644 index aec9efd88..000000000 --- a/a02292.html +++ /dev/null @@ -1,164 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.KeyConfig Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.KeyConfig Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.KeyConfig:
-
-
- -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
-

Detailed Description

-
KeyConfig Field Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.KeyConfig._fields_
-
-staticprotected
-
-Initial value:
= [('Private', c_uint16, 1),
-
('PubInfo', c_uint16, 1),
-
('KeyType', c_uint16, 3),
-
('Lockable', c_uint16, 1),
-
('ReqRandom', c_uint16, 1),
-
('ReqAuth', c_uint16, 1),
-
('AuthKey', c_uint16, 4),
-
('PersistentDisable', c_uint16, 1),
-
('RFU', c_uint16, 1),
-
('X509id', c_uint16, 2)]
-
-
-
-
-
- - - - diff --git a/a02292.png b/a02292.png deleted file mode 100644 index dfcb7e20e121b0275745bb70497f628896f39e77..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 689 zcmeAS@N?(olHy`uVBq!ia0vp^`+zurgBeIpcw!$5q@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)*wX&VLIvN8zg=*i+#fN0~;Biiz>DltP}7k3bC~Fj5_(z^O9Hp!}F;L?>shL z%+{>ps*g;~ayu4(EzjrW^R}&BhRqr$q$AE)#L08+Lm?<5$H+|EOg>Xj8XKsw4$iSbJL{9 z-jk;4J&?Eb`Sx~s>6Xvg%Sx|D_RNicwo1u!t6Fq!E!Y09yUSK>4)6b*#ANhO?48X0 zZO=?*+`e)o@2X9lZP2&kL)%QI{%ch%OXZWgK53Q8NfxSZ?(;%Gg+U` z?Ke7-BYOM&N9jpP>)G~mE#90vab4Qpy}|Z(o*g?<{G;jq>vJDoYkazR#q)35e%k|& ztd^BWrYp~Sm0H(1|NHN<%6;kkqw=>eS@Z=gyg4|GTa1t9JjANB>`BD|x diff --git a/a02296.html b/a02296.html deleted file mode 100644 index 12e88e4d3..000000000 --- a/a02296.html +++ /dev/null @@ -1,203 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.Atsha204aConfig Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.Atsha204aConfig Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.Atsha204aConfig:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
ATSHA204A Config Zone Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.Atsha204aConfig._fields_
-
-staticprotected
-
-Initial value:
= [('SN03', c_uint8*4),
-
('RevNum', c_uint8*4),
-
('SN48', c_uint8*5),
-
('Reserved13', c_uint8),
-
('I2C_Enable', I2cEnable),
-
('Reserved15', c_uint8),
-
('I2C_Address', c_uint8),
-
('CheckMacConfig', c_uint8),
-
('OTPmode', c_uint8),
-
('SelectorMode', c_uint8),
-
('SlotConfig', SlotConfig*16),
-
('Counter', Counter204*8),
-
('LastKeyUse', c_uint8*16),
-
('UserExtra', c_uint8),
-
('Selector', c_uint8),
-
('LockValue', c_uint8),
-
('LockConfig', c_uint8)]
-
-
-
-
-
- - - - diff --git a/a02296.png b/a02296.png deleted file mode 100644 index 1e0034a24507a80eddf11e54d61e39044b8e7cf8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1160 zcmeAS@N?(olHy`uVBq!ia0vp^Pk^|CgBeI3*uQ-qkdhAY332`Z|38rV;?396{zJGnA`kL>l&YT*Pqxr?{vk_yE(HH_lX?dC6ax0=FIii)3;|g-gWR!+#bDjU2@v9 z(_e2M3qH5xQe48bBYS7e)W5!bclP-rhMBuXj6Xm974+CL)HCf_|BKxdzGb8x&d?e*tW}8ypFh}xl z@I5A@UD^yk0vwnc*jZH=DoA0(tk0aK_WqEI%adqEPnRc-U?Sg9O=(eMT6Nu)-YN0v z3QATNo?ZRD?B{cX-!m^xKmir)N6M1^WD+wTknYF`OXS2kkh$dbTfbUw2#jM zxwc!DwwWf#$2s>+p2GfW>7$itL2;^!ewjC{aXe+gKXu_=$^O4*zpdoUJf@ageLH;3 z+{uDQ^71LZUTmEH$!5vktXVB*7!cn`j%goywJ5IcKT3+<$t&-9%m-*d) z*q%ts7b`6)|0;Sce8MVL0m0a{?+y0dTj%1ke_ex$(x(MrLb7PqvXeU*9-OXXXehtS z`03*g#;39h>2Ck0Y;Wj!$HibLGJ)ZNBO@mRFfkF&xURi)${ub{mm}Mmf?SR?g9$$e zIm7dGgwyqwfo-|L zb0W@g?bMGvx63WgXZ77R&zGg{shr|Yk$DSNhb- zKu_Uy?3#FZuJ&+dm$exn{a!-EZD1zMJzesFy4@j@-Q(6lJpc z)jMOpzR6;_9Q$>r(cH@-8_KS~n$>;1R{gWhsq#(lA3c7jrSvNQ537*iPfgoanYz2K zE_EJ@jV+@X1Sj5~`s%^sw^~Y%+!-~M9yx*u;}kDV%j@ - - - - - - -CryptoAuthLib: cryptoauthlib.device.Atecc508aConfig Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.Atecc508aConfig Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.Atecc508aConfig:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
ATECC508A Config Zone Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.Atecc508aConfig._fields_
-
-staticprotected
-
-Initial value:
= [('SN03', c_uint8*4),
-
('RevNum', c_uint8*4),
-
('SN48', c_uint8*5),
-
('Reserved13', c_uint8),
-
('I2C_Enable', I2cEnable),
-
('Reserved15', c_uint8),
-
('I2C_Address', c_uint8),
-
('Reserved17', c_uint8),
-
('OTPmode', c_uint8),
-
('ChipMode', ChipMode508),
-
('SlotConfig', SlotConfig*16),
-
('Counter0', c_uint8*8),
-
('Counter1', c_uint8*8),
-
('LastKeyUse', c_uint8*16),
-
('UserExtra', c_uint8),
-
('Selector', c_uint8),
-
('LockValue', c_uint8),
-
('LockConfig', c_uint8),
-
('SlotLocked', c_uint16),
-
('RFU', c_uint16),
-
('X509format', X509Format*4),
-
('KeyConfig', KeyConfig*16)]
-
-
-
-
-
- - - - diff --git a/a02300.png b/a02300.png deleted file mode 100644 index 403869dab9478e99219f4af19f555c781a28f0a4..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1131 zcmeAS@N?(olHy`uVBq!ia0vp^Pl33DgBeKb*WOtGq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)KKvwbsU;d3Ti`SG(mg%S*bwXYTVeXRg1# z_ipmJrI+H8o*h^_W9ItncWt+|N(SVu?V9-|QC1Xn*!2D2wq7!sUGU=*}3%bazFTUc;np{1(eL|!ma>mu3FVKwXR?X?!cb-j%p z84F%q{nhp}eaEkr7p@0St6OZYuCz*IQS{^8(fZ4JRz`>4Ewb>Rmc8qZ^A)3hxs@ds zR~oKiy!~O;ru`nf7Rq_ed*yp+vCEQwR#Pm!X5|N`u4q4$T)%1GYG<*}NjIx*1c&Vp zE|jYhydT6j{p!iLH`x8OLS(D9#O!>`EEt+~Z&BwD&Q!^W-0Ay+R;4ZK6e~`>ty4RL zacR{vlcjcS$F0Aaq3eUc5^A|eAoSl z^C^3LsnR0x=^5R6@`@3`;&Mi&=*{pBi3n-oFB!kI<0mYv+i@ZfY6V?(8F z)2FXhOwW`x(oe7_*fn3O)?tX47|hfF3{{336G&j(St#ISpwA*G__)YRP*567SUFl2 z%>YHo>OZrN^F5Ne8(a5i$KUAtqJo;Hx4mA6PFZ{ZrtPM^7Yq5WB}NBSew&};oO;SO z^7f|e6Gyk)>h^Kd{rqBL*38elQiFeMI|m9rjl6f3fBTf9wqNV(9xhtaX=Fd&dD+~E zbqfzPdHmDfUT}T?T93JHX&OdXpRGONxcAh&GfhQ1vSwbn7j5qMcg>XS9?jXkH=iwc zxBMa-Fs*yFPo2w5u0X~W%O=)-dntM9(C7XsKeyg{d*l07okOLJRa5Ks>;8*7opRs$ z(1cC4jO@>i;&=Uim#cT2;qMM0=X*r#MV8sO<7zBoOLdD|79H2RvZ_1llw-dvf93OU zvnux=@9Owv{img~<4*^l=I;5Gf)nF|-p711Qc(JIIH-5e{$y7do|BrcE;%PaM8+~u cUiroD{lO(ob#CN8V6nj9>FVdQ&MBb@0M^bN$^ZZW diff --git a/a02304.html b/a02304.html deleted file mode 100644 index 62fc953ce..000000000 --- a/a02304.html +++ /dev/null @@ -1,213 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.device.Atecc608Config Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.device.Atecc608Config Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.device.Atecc608Config:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - -

-Static Protected Attributes

list _fields_
 
-int _pack_ = 1
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
ATECC608 Config Zone Definition 

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.device.Atecc608Config._fields_
-
-staticprotected
-
-Initial value:
= [('SN03', c_uint8*4),
-
('RevNum', c_uint8*4),
-
('SN48', c_uint8*5),
-
('AES_Enable', AesEnable),
-
('I2C_Enable', I2cEnable),
-
('Reserved15', c_uint8),
-
('I2C_Address', c_uint8),
-
('Reserved17', c_uint8),
-
('CountMatch', CountMatch),
-
('ChipMode', ChipMode608),
-
('SlotConfig', SlotConfig*16),
-
('Counter0', c_uint8*8),
-
('Counter1', c_uint8*8),
-
('UseLock', UseLock),
-
('VolatileKeyPermission', VolatileKeyPermission),
-
('SecureBoot', SecureBoot),
-
('KdfIvLoc', c_uint8),
-
('KdfIvStr', c_uint8*2),
-
('Reserved68', c_uint8*9),
-
('UserExtra', c_uint8),
-
('UserExtraAdd', c_uint8),
-
('LockValue', c_uint8),
-
('LockConfig', c_uint8),
-
('SlotLocked', c_uint16),
-
('ChipOptions', ChipOptions),
-
('X509format', X509Format*4),
-
('KeyConfig', KeyConfig*16)]
-
-
-
-
-
- - - - diff --git a/a02304.png b/a02304.png deleted file mode 100644 index 4879833a2a745751565a6960a1bd0e8266262af9..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1115 zcmeAS@N?(olHy`uVBq!ia0vp^_kg&AgBeKf&s&-gq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)lXJ zUc6rS0CRCMCwV)GnVnQ~nw|fBK=Gj!fg^$(6oevDhc^5?T-(J#}U&6YW@ zt`>SM+Rpn8S~QW!SNQX{8TwzhU;gjvc7P6X-)5_gYtyST`%{q{KYjpqJi4lX7E zU$SZs|1v-G&+NDbt=iO@qZm$QMmD2$?;Wd=f0gOmoB{Z>tgp?YhGND z_|}kH(RTdK`puCU1Ktj?^C?H^8cyh{0_J8zYURH||Kw!@c}OFUR<`2ORU z!2Nb}wtw`xViX;jVR}5*Mro1L;oZyM{}#~SzpMEByT?;~YkR6B^X1OP-1;J?b}Hsd z(v2@yc28F_X|vg~FerHaq$h8V`}$1%T%g})C%E$d*YfrMb(NH=T;_MzaKC4tpQ^NI z{;SU=(<@$05*D;wtAAmyHMX$XXY2#te?Y>5Z=em094A55K02$!we^m#5l!{jx$=vg#|Z)iB-}S%I#O{_H^w% zwO+DJ@cE;)Yo4yp-L}m*Y3tN$%RfZz-@W|NjEkawCTf~DE9Um}lA9T>M!;^HuKBdKmUCv`fyduF0Im?^Nt3add41p?Op!(-BWk<`quLG zk}P|6RPQW$W$QC#=ZvEVU#=|Ich}Hbp0p-w@iFO;bLRK=ZZrF?y}V<^{in-4T%Ocl zSB?8_t*eyew0HM)XK}%e8llsFw+FkVuvyOQ=m-T9Ybz964A%Z*_#tT(>twp_6|fj! N@O1TaS?83{1OOq2Ae;aI diff --git a/a02308.html b/a02308.html deleted file mode 100644 index fa18073bf..000000000 --- a/a02308.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.CryptoError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.CryptoError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.CryptoError:
-
-
- - -cryptoauthlib.exceptions.AssertionFailure -cryptoauthlib.exceptions.BadArgumentError -cryptoauthlib.exceptions.BadCrcError -cryptoauthlib.exceptions.BadOpcodeError -cryptoauthlib.exceptions.CheckmacVerifyFailedError -cryptoauthlib.exceptions.CommunicationError -cryptoauthlib.exceptions.ConfigZoneLockedError -cryptoauthlib.exceptions.CrcError -cryptoauthlib.exceptions.DataZoneLockedError -cryptoauthlib.exceptions.EccFaultError -cryptoauthlib.exceptions.ExecutionError -cryptoauthlib.exceptions.FunctionError -cryptoauthlib.exceptions.GenericError -cryptoauthlib.exceptions.HealthTestError -cryptoauthlib.exceptions.InvalidIdentifierError -cryptoauthlib.exceptions.InvalidSizeError -cryptoauthlib.exceptions.LibraryLoadError -cryptoauthlib.exceptions.LibraryMemoryError -cryptoauthlib.exceptions.LibraryNotInitialized -cryptoauthlib.exceptions.NoDevicesFoundError -cryptoauthlib.exceptions.NoResponseError -cryptoauthlib.exceptions.NoUseFlagError -cryptoauthlib.exceptions.ParityError -cryptoauthlib.exceptions.ParseError -cryptoauthlib.exceptions.ReceiveError -cryptoauthlib.exceptions.ReceiveTimeoutError -cryptoauthlib.exceptions.ResyncWithWakeupError -cryptoauthlib.exceptions.StatusUnknownError -cryptoauthlib.exceptions.TimeOutError -cryptoauthlib.exceptions.TransmissionError -cryptoauthlib.exceptions.TransmissionTimeoutError -cryptoauthlib.exceptions.UnimplementedError -cryptoauthlib.exceptions.UnsupportedInterface -cryptoauthlib.exceptions.WakeFailedError -cryptoauthlib.exceptions.ZoneNotLockedError - -
-

Detailed Description

-
Standard CryptoAuthLib Exceptions
-
- - - - diff --git a/a02308.png b/a02308.png deleted file mode 100644 index d13f040f67c3080e6583ec804fb369adeb34555d..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 26310 zcmeHwd012T)^%^Ka@DI`t3p+VR~x|rhy#PnRZB4p;r3M8V zBOo$^Kp{*45fLeq0}v1hGm!)cA%rAM`FZgNBiY@=s6rihI97WzqQv| zd-uBeQR7uBHm>;Mi!W9o4t;O&#TQ@VzW73l|Ia1h$aVEAhrwo(`H|yBLZJ}sz8&HE zhCNByw`;rSH<9&kA3uH!j$0C6r-FZ5e$nEnNo^b}iY!vY5kQJhtKeOiJ8 z@v_`oWZtCTZ$GAV^it<0@p$B~qPGx+r%TQ7HSJi(t<1a~Jwg->BdCd^(4WqS9oKKG z5uz#m-RzTbOKi5#>;%x82#vv~>hEx(6yTKQGZbbs@Ku**wh65C`DDHtL*65#<8T0< zeHsf6*zkoJm>t>9TpGG5OL=`5IiE-+I&gbD=t9B`L+C62#40TYA0QP6{gxZ`{w}{& zd>VKU7?lR;H1L^%EQSSocjG zoWlScL`(3ORcZd_Cw5s$ulUzP#{Nr{$Mv`Ex(A-U%#wTm@d@a;N5GSU({TTfpEPgx z&WH5y;R`tQrU~#vLZ;##g{AYL-I%mLvzueZYQIqNrpYlS#WW*m9f8jk{V}h;fwj9S zF=&2P;Ik8o2!c7wsI!S=NT9LzkLS*K)gPdMU*=~IK$nx;I1u~Y>KcM`E-mKPXk=sm z=+ha__P%KD(7KBoFRr<$&)?I{c6&KBKlNP>y(7v-7n4)|6nZiDByd53n8LXy?NR;O zYOcdc9XtBYgCFc&2 z>x*8q>AiHkzQyp+aJyena*@$A^85L-+q1z5fSY>+4&)!MQ<*$K30=!`gEt2_c#=Gv zk9mR*k1Yc4LNX*D1Fsp-GQ(w0W*WwEt@no!yD7M^6=PBzX}Iw~z9Uzrno0aAK2-~& zs%P)&7k#>Q$bKtfUQZ=EAd=;TD~L;%>JI6iCK=v+er8JG+eiJ@5HnvAH(4B{rXTHG z)Y@v<<2&yC%C*z9lJXUyDDL!fG#@*&RdjY<5KX$iWO^gzC^4#a6NAROZ|K(iQOX zrP409U7@FOb_(JU!XDAV0O?`9`O;LLGTD;b!{qmeOhT7ir~qE*7+3U~d;iR?*FL$` zgP!~33jeWm9znbR-6bz5dLzi>5~-zEEkOL*21VI`kUs>4@zLu4L>T{xyM_>gd#!GI zCiTsFJoy_TXy8RfH1$gzMJY5GYH^aL1(QhQ1*EYPh0Afls-m?NsjW&MUPI zq-`(W=5Y%e2D)i#ZHVtn*eU39TpK^=mWMwXj3r(B6a zOx*CurgeY^PZ?oQX+c3ND#o#E>^#;_ZWDB6VAck31dr|;n6tbpyMAFub59r|^JrXr zBSRnlvk$fJ4mCP%=$>kMMD@UgG8r|x!s%%|( z5~8kYaC_5U2Uq6yaUFl{VU4keJt$RsbycMz_3l+@na*%_-Sg_N5EE;lD0kr!>#0wk zzyt^8pFcoM6o|f18u?HlV&X2?uLZZYT^P8PZWD@olxhjlqI{0X6X*3$Z|^;H*#Y9C z<42FW?gWK({E*cD*QxeT#ONQS|N8C(n!2fF)I*my%kaqguernruv+mNy|q@nK!19B zIs_L2!#>WL@}Uk7+c^+B**f#%^N~(oaVV`UFVs+_6JlaJlzYuG$X21$${L#Q^J15z zgGj;}gtZN{W@pm0HOfe1Gga&tA7AovUjnN-%;19B05} z)Ln~n>bG<$p|rtq7R90gOFz}n^4N!-(=nWxL#jK7K39ugq?a zNqN4RQxHEv;n>g7;f1s5h>1H8@Uf-9INbIm1knvY{D9yTVkKRE%Z;IGfhOX&qBVz= zP0kW$4ZvBP*CqO)+hg(| z%UpWJ?7{yngz+cCeu!o65&bX?d`!0`<*J11ID`e!30l&QafwdiW$4pe_T3NjGm~F6 zgC@<-3sa+NDTxEO0yLSG;NIBEn(v+ zik5r_Jg%nWI*)GoRD;>jPFH`s0TxY)}mIv@=ocvR-4;VZ8>E1O*EETmr4@uuZ}C~x^+V5DS#Y5X$Cnx57!aUSvMn3uf^ z@odbk4ws@fB^z`8Mb*KsC|iv>io035 zy(ndkv`krZcU?XGx?1(zLx8pXgAPI=Tk0GM%MpAVu2gFSonze=yK*&(p+;Z*OiRgeZ z%L{KTh=W$(Bpz%Q1uFi@ec$IZ9l=AeI@bggaRhoBgEX49@h1b-Zs_Ac?T{;t^_DMa z8_=FrKfzrUKClEz^F9p6I2{t3of=Uv`O?XCM0tldc-yAkpvbeVcbd zxz<$#tKo7lVSh3wsd=)@W*uvdfYXhF51y%!kIJjB#1(=l}lxzOhp$rzgUtrSw zmY^{mef>}qqOQRW!`bP8!YSsZumiU&9Xn|B`0g?C1ntpk1aT7-4X({I&#%EUn87`# zd3*KA8Dw{CyWl#>s3jQQlSmWT1nryG6$&dvsh4_ul7{&gSQRP^XEs5#qYM<{+R<0m zV@AU+5BZe5-W^g;Z5UN!>i@IoEctGRbot|8xKAUxZg!e4<$cR;>#J%qh=cGNMwYaj zwTmMeB|p$NAK}=s z_Me)*FVlUq!USVNRxr)8U{$W;@Nh+UXQDeZr3g2ST9L=^0sN6j>nzw;*0IEaG^KHA zYe=;(YhvOldY|xih4hLsV@6jXz`BH=^Kq>8&VlYMDPN88P65+TCzeT{7$4d&^mUO! zS?uISjHPGJpm$4tbf3yg2T$2Lm7TMW3dq4K&f{to>P`7NR$rw5jL?#M0xk=|>*;I6 zfeb#B+Ee%?EdW~e-^SHFxeG%-7g|x^4rSn+DWsCs91s(}vxY4*zZF1FIaz56%Bm(2 zckp-3^+A@DgG9X^o0($fD=Se5}ea(md@J({o{Y} z+vYY!mqpKGQZfLZqcY<5KI!GNR9XXG=gz&tmc{uK42&G|X|a|^gVio)Lw7{E>Kj`3 zm`d?7he(Q^3NW28D zYUBN~anx=fb~u8Fgl^P>5H6AHe{!RA%6LB~iZ*=j;1F|Y>U+w7C#K8ejKZYtG_T@} z2AT*9gHoU>BWsnzx`L)OjP`&i@V6Cpw3KE~bdC^AC}i+pnGy9)`!Z^xr_6JkoGHld z2HDk^e!@XY6RhQ|{x`pYynpPb8scsHenShE^^XPB)VxSJ8ESYZH?>fa*uovK`Q_kH z2BT6K7s;U5q-*zr6u;4bY}Qv-ewyopeF0F)8{F?GC9b76N;LcdDlbqJBZdhv2QYh7c32vwHHiWE!Y?(~ zb;7m-41QSxOg^{$%K{e7)DHlQVzpw>+}7G?w3`nz;CWRly|mmF-~BAZj+mJZVcPRt z)Kh?K6u(j|RlH7w?VQSp6a(0?7G2?FH|IA{KAL}2K6-)j@vfwN+@037!&~>Q9%G}I z7RNihE~lXFZD*kcYqqd$oC4L5UMT=+*RdTwL5HMcWFOhO-j!EenuYOR&kPb$&zDb6 zhoUXOBGZ?E+qu-^EBn|%$C;%2g7Nr6=f4E>TU1Cps9r_h2M9WIOYW^)zq_Ca6e z5G7{B)5;}k9Xb`G-LMeZIV}My+_J{KTz8B&X}{2dO9PK`LxeSz(ac)$I{)&_7G~CE z1?+_0%|HuEO+|!rT~-Cv(I#Kv=bn?T$OqvId3^k>CiQnDgE~LnEI>LN9P?Dn#A%tX zuDt=P0|9R^)*Jvo=u=o^>!UGlpWdkKH|G%lR3>#5Jpg?w4%vk{GY^h#G&Q0NZW)`uIba=)!+=M^qft-!?9N z>_1Cc|4#tBsK~82NO|Wz-OAVszL+XVlEy72#D+iE)+kzh3hJ2TmC<6xHikPXLnlsn zoMi-&DiD{gG$d_n!|hqwmO|4``Xo%(9)2IDH|CvgD;r64)8?qDLhMB(AW0e<<)r;S zE+w;QxXZ2`d8ZTb#0v|Bp~d(Q_r-watn%2!`pq0)pVB5A=c^i!q)|jzg)x-jl5ws} zobR^Uy-mZ(BE~vUsl1{dTFMh)1kM9Ix=ApBqjgGxC-k#g=K&O zX^-Q|w2ZvRSQqlWbph2$8+7&qsWN`Vf<^hS#^ON<_kkcW>93NoS6$uom!hQL%9Lka z>pD%w8G{zNvK6;F^p$H_P^CE2Y_bQ9_Dn=f{Ajqxg*dATolD;Z#=}b5powsVk`IXJ z`KDPqR6g4Lts#YG#s}G0R6a_RJxA=gfkiE)&v*ss1|kdtt^A~8;(*lQx0U|0_$Dm} zl%$CurNpOU8ovzbuiyyEJ|H=;1M26F?yjqh6x{L%E##5!s#1R(lsUWC<0{Ipa8@m} ztHEt2x6vci(cons^g^i^Uxv2@wZ^Dw^!@rV0?^C$T-qwihVl!s1i03WUPn2FhmS^Iy<}?&_$ZV3?hV{I+B% z9jhN?fr54Q6hwTOtr&CIl@qULJzRhz*L6F;sIZg3jLv)=Zs|sDW>5KZT*iIl-#RmR zQI}`<$`coEawChG=UanMmOaOXuDFOeVAdQ{Dx=W#Fb=?t**gGkP)Nxfq%%9bqGu2Kz~B{^11yg#*Ru(xq<{h){b0yW*p<&^ZDS;;c<*^QQ_tQ!=# z$$Pt%sy*T-cLfPyc2Jsaf+8Glwiyu=BZ}~o5W?EK7~$p7gdd;?&tX(XvePcdz`#9C z{qMN0ziz6vN&7g$Ybrp|h+q!m+9F{{2yiAaDAz#2iIOrL3w%@3G6TZ`<}>iZaaOE4 z&7i5*26Y&vXt!sNo zI~Pq2HSNaii&{Xj{MGRvnK{w}aIFn*N|d!NMvigpp# zFhc!LCJ)Hi)~qkyyth(sg&Ts>NXJ!&+$w2U@9L)JBWS-dWx z>!@|goPgkQ4wN(eQYD%S-)-Jk%;%wIX8`3qpY#U{r(|KRc}K8V4M2h6_x}+M`+p1w z7Fosl)m(sFep5Gnt=ZEt5t$kZ+lnZJmM1GXLKC`)Ket6E(KaI##xv$ReQ`J$h*rL3 zC?_NiY!6f7KYaufKn2G)skG1{SaJWs93VD?9hgFjpuq#0Hu{s$V8i=Vv)ky4@a01- z9!mEj4O!0IEaHGAl-*^x*(o@`A^!_?_S0_*Zxp=&Kbw3HMNsDstPC-*ovZvxmP74! zVkaFUN<&L#mWb9ESfDl5RxHpO(dtdZBWHCLT>>}waZC$ExVJ5VHvQcBZUlmT1xFsL zcZ1g#?<}HDYEW5C#WQ9ZyeaUQLlDjKbhuTgKcww~&R-T@g#be|SEhgg07L9}XTgge z&AnNwEg+A@h7u?kq9O{^}e#^ zxv#V`;L7`?k*VZ)YsAEIkU~#~;}AoxGuW-Q&LVOGi3J2qQu5GpQVtOmKmgUa(@tYJAd%QRefW55w>DtMlK6W_7NLlQpQxDK}flsHvb( z%imj5g=~Fg{677FyH6YaKI|$g7EK7LZrY46fSfcyOaLmMF=as!8T(xk*-}B9G?c;Z z-V)+uwD8&~wCSFOFqK^+0jodz{RpbK|yRbq~2z|8NkGp|4tG#X>jX zLT~s25YUJnv-khCbws`90=qz6NyMqyQ+yu+5N*Zn*_3yT!n?eWG`*;btOk_wzdqm_ zc7`9_sp=fKZ_>6wwj#EJ6%HdoOk!brq*Hkivza(>P^3;9LHDf!S0)XPC?}>%Rn!^g zh}G#E!tVfGCRF-c*I2S2DkBR-gXIv7_d@z|xH#>d`<-1d)b5qF6Q$B@nzqj;Q)%)0 zsdV(%VdT&Rq>3_=!`$DeiwlR9P88QvKXo>x&Y)-4 z5eN1{*U%%4{CmYUlrPSu--Zm`nR+3J;iE5wPGZ)E!!|)_m%_+0^S5>xt+M2*?dc>_ z%vps!@jK`{R>619SFMXWn70LC(4=J}CWOObNZYvS-dtQ$UT;+{v_b^}yqg z70c#Bnu9%>JkC&zS{7FSm0|8yc1V1KL+wegu2MalPP28LXX1bmLU0BQaLa|ep0`>Z z*6(}QHWX3o6BjFcPh5))9>)B`mC|Ub${5!x0o>Z9QHUn!)+>eyM5P#hIdpQ&7I`ri zThW}A2}((ir-VevO>rBnZK=3VyC@{b|FUk1{+-Rbu-YX-1*FoWW=(y>fm>8|N_Odw zgE}Fvf#%Gm&D_^UXhLgJl~~3rTRs01PMY2}z2p$l7>c50+{WTQ&smH?HSgi+nPiT? zE_)t-qiDx&=a|>`wb!WrPVhFDZVGU`cza&$G(0~(z%0N%FdruP3S1pFmYaPvE>2sa zea}n1lB_M+g;`t1evl_ZHa82(%z9a-gCV3pw^ht*hARF*EQ5@Tg;4Yk9hVhb-OOed zH9Wj9;L&*A=noXv8*x595CtWElMX=d#sVirHE>eg5<;*Qs115A9aog&J5>s{6(Lq@ z!D^NHLyJk*@)Jo{t;lSds^OT8YiqDjxg(F(XAZwUa2@AEJ#Zaq)hdH_hxD0Jd(9T+Sry((-cYWpzzr62NFF#*c@2fRgB`6r%( z*O84iHM}Nf&ETTP?J)4T?aPBaZg--G3Qs56Un{V6&7FvSA(J*5#9%ISFK@+8zy30V z2E#&^pv=OHwlCD50Y;W~+xWeiyfasw3RhioVE>Sr9C~ z71d$9S2sE!!Q!?=usCs>`xbtSrf|-=1 z*GUaci%gsgW>k{tNtxtrKP>nxyxPcL1Ag~mf=H<@dFeG=J8BNWb2^ZfrdWmEf{+UV(`mw^dnwCo+gco)i~3=tiYNVt|NnI;z#

NRF^cOMm3_qkrmw5~T@d-28PM84xN42=5Mt{fMtJ@s>rSRW>;HLb~nCbtxk`w4Q z$NX+GMJJ+&cVO)YK<1MyGN0RyeCW79)#MDB5}ox%gA{SICd6*2>i8j*cQ_bUJm@># zS!xWtfcwD<|zaGm>dP>T*zq4 z|5dEEokX4+hkTg?R;O$OdL*YMt9y3=e|s-Rtk!9Rw~(mW|!>y44Y0H zd;yX&q)w+ka)6#e$iS^?8O1Zr!XF{K=0#xSq|&c=fy(Y8 z@(bz>hq@EqwhlZsAl)T)OEFZZEI`;k1^y$rH75;yly|;I3W!c&2Ko6;U_8dRJRo$I zrAz6yXVL_=75O*<4f;)R6QUt}|JF1__s2AZD1seI49QcyeBcy;)-}UaT1uGEGP|Cl zn1(@3hl3>xv?+}AgQSJ`1W7oQOS^cX;-Z3wGL2-mhMK9h$@3j9qHx!_DDIG({+qr7 z6sAMuT}6BXb2cT-W8UqT#!I-YX(gLIsKm?<}L zoKm-@8!G+0DjkoM{hO}Db}T!*I+R(-I=5R`kti{5#y`^Gn(PrgT97VkStv?Pzt5qu zdt`qr*4c)dm%{r{aBpLF#W!=F?8B%w;@`Yu4mrU#C9vAPt83=ze)@zo+^%cV&AJY^*mK>2e|Nvv z`h+^VpZYjdMk^T3k?)pqlfCVpM=Q&!L6%)Ow|mqVNv?}kj*6iz0qF7=Dnm=Lmn)bp zI#)z_zbdq+m^8~#-t-0Qcje?V@ROjUWdoGnbD>;qb|LDzLj17K+a0x%mJvG-4K`yA zEc?Lc37SZTinF;`iZ@XYT4^-XFqpE)CtLtHtVSWg0Sxx1`sy;tj*96RN1R5BVZvf; z1FqOrekK))Z7rj*wFUfIz8q248aaE2A~igt1k~WQpl?J`(V5cW6NvhTig0StG%K_o z5J}9an*}(tNx=R7EcgkR-_I!w7k_Ab3h!%m()8fP9I?=m;tSjn!+KQ((Q#kqNc<5l zPpw{77pm34$wl_;y!>RF$VQW<`Z@ zA-jDhc2Cvr=@xgItZHPh@Jjzgn)Y&txvSxPkkM0a z0}iB0Wq|`xdlskVg`$`Ajm}^%wG2>4RVrRFI^+&UFygvpI`D~S0LIa?_Ap=y9%Wy- zh;6R>ps%C_*%?35v%gAZJlx2d(S;wbW+~V9rGtb<2U#8O`4~eN9?C_Av3w!#gmPQi zbLSSMSVAI0+fu?Z)HSMbR!pHLh3FDWc{SYaJ*v2oIY1c1$KO% z;eAQekJ-jk@p+2tJ7w)y$4=oKLp_4yohYR@$|eS}m2+f3ax`&3#rR$1x(Tr}-)#K+r&Wdhu8u>_+9MViWv0-$AUEgslvC1T#^wtrobZ{|}}pLP#uo`QAkTRn5r3!Jl` z{vjboNO-$cGIoAc_prz{1(0*2pcn9bGRzOL_pX%vviqr$eBR#}voFWT(Tk0<;|9?( z3OJ9L_>?dKQmNJix;}du4bFjq28L=I-9PX&ANTMowZm#NhRZTkO893(6%j-|QIi1F z(;5?uvh}6TZ#!qut1IvG9IwA;EATUG+o(>ACO$TdI<0*nPD2(ZehaN;q~c`aY~WE! z-E9c4c-VR77)`j(wUn6+*=A}GiV3ER73AZIX8L8`vC6>P3*D`nTKhr%4;~26s=?Ks z)#nSx+dK)Md3urFQ@PRos-|PXoDTxI4s^w-kG#AkQ|rUNB2#e_h6UXLfftT> zB=_9>Ze_;U8^xs!#(^oPS4ZVYsX-3-B-*Kmyo!)bNUloxi>nq6;2kQ`Xm1`H31(t( zk@*!K0SUCc9#qEQVTy@D3{wz(Q?>lHVVWdG8&ppG*ZXmd)7mfH9I&f5bfi5~N~l%n zL@~Nu^57oiw^$k0Y8?x8vRYS(J6YZPPF7O1MqWMxeNH4nCXS`ydKU>)7qOPz$eS)! zKLvvL+F}szXp-|(OQl{rv$^7`s-|BWZ{L(y@>m!^zT`Ll=7E>9_~d)RdSau9YzcPJ1Y-1qa{l(st^IW^AIUKxyb91VrP24z zBbQ2X9L*9W?4H3CEkp&he#4J7hbWeF%9qr2_Qo&!`4oe4nufBwUQWnV%n?LccPPn81QW4%%=EmFbJ0tVzvI&VYqkHCJABX*;xA9|7n%^A<(6ow z-h<^pCr22DgNyV;(1C5U8GYUnYLCLS=sMr7Vt3nRz9$xf#48=Q%<(HnX$gVXl}>JJ z))>mW;xphf=zETML6jgYMG|+Tvp)4h8-{% zoe4{o5O<>=i-KLxXww(9?D7@xoBTkUU0N!(wShEyR+MHVeiL{3CDOWpkE;86H)yZE z(~uIBJ0xc89yD=%hF=0V{CcXS+WRe&V?hP)@1;7-agUraBf5z)CgjBMi#tWs8w@)V z4bz1@ggNFOx2K5%JHh^4;m=~L(8~FPkfjX?{^oNiS91KXi+0f|A6weWgj;LB9n-n> zGRE3W+*fo$Y{bY34x^CbS)pRHkTolI-zUvN%^#SBGHB=Dmd*OgQs-hr;tF%8_blYb z3>?P=MQREQz1s0X3D+D@GUhmA$LGr0&dMzKFaT+6Fh^$r=$(3QKIv26#;fpc4O2ur>I}g61b8)r> z?@^CIv~O-@@`(mute|7^Xo=^3Z$(Y^a$^_hh)qK`abe7fS9#FfmMqYul%suRu}Nvz zM`XaT~Ra|u$}Cv1t7!Q(pereMu`6l&ONWiwy`i;gUv~ZLoy59P z2Ttg!#y<5;&On)I;T?N78W318EHJYMmYI7PG%TXpcSY;Fhs|0YHx>Od>rYYepLffw zVD>qO!$jTDOMtj%u#cg;Sz)^$lf6K>fr%D}Y^1LQWzuRY?pD`p!*&t}M6*t?+*YZI zZJs1cmiJ=_4IpJZ>u@W%5qnii08L)n=GZzDve;66IwB=VyIt9C$j6Q~Rb-f5t<|r% zn$q~_)!@n2fQWLTHn*pPvmdmTCN8ui)vHU7+}m0V&9%U#J_C(QzS!hOiM@@rt=znu9sV~+_`fQXrSmAt0g4ZL9!c z-7Q%6K9TG(RPVL%V(!Vs8Crfo&V9S57^rt|aywtup9*K54DI2Rq&#a8{y-E!G#QdR z!C## zsV5w=WYl(vdr19EqnQJfo|jz{?FWXd=i#H&&KZBA<&79>9mv&Ag7Mdhu(vB_mF@+yG3%%8@wcoUp29bJ_cVrxTthlCn!}SSKqTR|nju z>G99XlBGFsQ#Sl+Cq2I}4CvXvsud53^z0;{XW#L$=_FS5fhjIOP|gh8#9?kwtXY*d zwpoBGX!6OR1#DmNXHdO;4GKUD^>O+JKyq>B8WLoH4o4gq;#nyY%)#o zeR&j)a6%Wl)k;MDc2K{(#FhNH?O)fe41nJI^s>PVFEv>?0#ZayDK}cavYi4(mDIB zUCN8_YbLsArKgbcZ4O+_(nse`Z)#;^4!AuS2ou3^MJd6n6%6x(F3f={!{1P??VeN;^FU zebnQjc^IzeVr!GtRLP{v3*Y+Wpl+oSY`n3b{LcA2+ipC4Vac-w_PW5n?}-Ci;*<_) zLIyb!13s7|S0hR3|JVddKVa=Z@Bi;QE&sZWA|IjZpABQ@6^!KqTGz%UhC69NoSUtf zb2F|qn+cN-rDZiL*RB+!Li$s7yem!dmhrSiC^_mf{K|6``iNidz}dyIM2(M5w>7-U z_l$IOka9GxM=K!=%m6w8at))IdmR2TuFh)FJzpF@=q{TNCKEimsEsgy{35frAdW(s z*PhUgySRW%#tKSmal8bc;g2A8cZ1lK;A&_pk*KA~OEQ({RSrnDz}&ttF;4T*aTc{^ zVZaNk^=B|*>($*5JC@PdTv)19cYJp(E;JGH;)8~~2<-5)oC5K1B1PMa%2O6O)oK6~ zNEd>DeL3{2wH=qk8J+maUpRZGAVn~ZeXXy9g@AVJvVzZ>N9PP-5$Rch({=KtJi&Ode& zeP$9U2a~GxPCxed6xen|-WBl0CC=>6ZNZ88prZ*2RN}xA_fun6@wh}-F?65Lmx)P= zu*(E6SSr-DThu(hf!o;rX{iJLuGGQu&}x(mR(Klw29C5V?Ea}~lMc(1s~oT<)?eykSIlgEp(fZB~BkKD3{gr{II2Eaqz(wW1 z6S$ILhiFe0VP);fz%H`T2D0QUgXu(j9ADLjb7D(nHfBN`8xpU2NyM?uT2Ky7^nyN; znDOOY8uN`?vaU^T(yquim{y6I`KI3Q-O;6Pa;FWEo>WVPjM+X}-x+X5w4pPy0gB%g zGi8J(TQsoZJJBueaoa~kUyQGx4Hp-MZUSR4mI$)YeeU8)j{kLS`QabhnCtje!(ir0 zkJ6Ce^D~LkDY))NXKE%y04+4^9~*yI3tSMSm~(Y-h$?7h#1SS~+xzBv{l8fp*LlZO zZ54IA+KDc3U-ad>|E#@C|C)9Ix-joT#VV4PR||6(Q>+%aiX;Sz9e%^kKNHAqXQv1X z6a3P8!x-*wb!bpa&UHct{VChCVznd0Po#Flbhxz!JbK&kRo(N_?Vt^{iu7`(+q(_) z5uu;$Tny*fzW2j<4v1`ldPj-~ISWnx&WyQf|5R~{e^>l)O@Tl5Hx4uDp6qs(r5(%e ztWXw;X~$M%EOl#~-Z76c`-kB%K8{FyG3YAbGGge;d@bg4LiwrQFEH+rR9 zCu(R`+)^~Yp&G7)7=!9j=@#U6|8HL`G)pHenDqT(xWuY1t`pn2w0wtPo}4*kLL3ma z9vMM?=C6UDSuF(*@yf` zSWVZu)c&GlA%*t#yk$nV&j1b?i6nMHMu4W4QiU-vD%?)>-BIDqpWNQw6}DCUY?8G{U@Vvy{(ygg z;%Zvz3Iyq-%K=H_Aq+}e?-?_yASWSIUb$BPopzG}Q8eqMbUGD5q8=~xO_xmPnHuMO zT6mn{AttZXgeaxXtTaG5Q?xfb_%tj`Ml`M{y8Xx4K-bs6Z zCavQWI;rwJ&8AL8)4LVRPL`<%gJF+?dkti&n4j`>+OJrNW+0v}7Y_??yPYvKd9l?c zfuS8t*)uDbFNd*wx&Tp;q7iTv&1TkZ@td#aO-n6G)*&h_ zr8_;$R*r=(Ho5LTd-tuv5rQE#(9|7tpU9Fxe>SIFtOthXSLh4Dke0*updl@FX3YWS zQKZSNwWnKxh0=fyr<`cmAR0U5S_%4dK(?L&WufC@S-8_q%@tMc*zPkLLoab3v*6IT zN20;ZPw4I^iDrK4Jb($*MIBVpfP4Wk0m`_HFEg7zC9a1ld=Vt(YY{X=TOVCF^S|+{7_p#1?RNb@=UZ3$s zvk5@5x#|U}1q=xWQp+xh)FPrYz`)>zDYiX^&*>6gZWT#YEVZopoWvqIE|FS - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.LibraryLoadError Class Reference - - - - - - - - - - - - - - -

-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.LibraryLoadError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.LibraryLoadError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
CryptpAuthLib failed to Load
-
- - - - diff --git a/a02312.png b/a02312.png deleted file mode 100644 index d652fbed2230747f12561d6f2a07f05d040e9ed8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1198 zcmeAS@N?(olHy`uVBq!ia0vp^e}K4ygBeJEIabyLq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)F96;6SXXLwo$GwyJl6{ z@8_Q1C@v`ZTKngB&mT|C@;}aEeXZ;B{cC0A>02%?_g446`!nmdcHAD;iGNOk1Xi8D z_GjDrLf5XP8P{B0o~-?qb5{Jr>!ulv{w?mDA8voR-B`ZxSv^;s@5h6g_Wz$O|I2@{ zyW`83voB@iT%JT5@#-sm(nUDL_k&_fLI}eLS6jvdt8@)ZKNDi^G*eH}Hws!ZkPi!*jU z^(r^DOwXIyYER1fs`jH%*3-<&Fm6|Wu2IFLKa+QTxUJOowBC94>}lWj7Vlg;Ykqk5 zj?bCW*BpNfO>Hi(KOKF|Y`-kSx5J*BbMLaUcwT#T(0!HetE0j5F1l|&r1VKl?Cc7M zXW`a?Q*S*kSQMBy^DWcKH&O@1y8{%be7);(QDUjWEY`$?U403wmd9Cae3m@%iPFg^ z@rS29g?;u3Gykw%wJn#Se$KbQ1)H|0OKMF_S*!hF<+*d0>Nb4-8vbC9(yWi-hj#MY zc`sbkb?m6!il0Uw0?(SyKh2aba?bX{%LQk|ZTx2Oy%AOT_e|yF;hUNA?CJCSZQqtZ zzFcr?mcF9LrYl?D|GB{Gxo^$%Irl`*ss32R;Q7gJ@1rl<3f3JkKhEcQZ;AMvd*bJ| zZc#reKjrY`C9ak>o>5m={#V$@xv?_DUlC?lbIRz?=gb-RjQ$+Sn|{w^&-`x;3BjaB z6)0Xm$hHbJg(|LCb!*Du)vKbw#1+;b^A29wSGv}}KI-Vk+K1txTbJj3w<-A<9QyX9 z-j6_qRjalhJGSzB{e#fZcCQb&wOXInOWT_3zO8;<6m4q1Uaau>Wvlhgm&BgHB@p8viiZcka@^3C~}zKTzpfax6O_cS>u;lu-Qx*XR9yIdd1AX*`?d zs-ORyM3+{{?pyOS_(zG*v)}U973MBm{rbo3$twKm%WGxkJTH`*@1;^MwfwwO&(~6s z_}I^?$=|KxZ>(5#Z`tiR_a3~E*r(wTdi8h7^vl+NWDbR=FIe>|ch||6x_MTa>sS5y oT~rYo+6^XVJ#gkYxZ)q9i%)9gJ%g5Yz> - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ConfigZoneLockedError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ConfigZoneLockedError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ConfigZoneLockedError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Config Zone Locked
-
- - - - diff --git a/a02316.png b/a02316.png deleted file mode 100644 index bb5cac32262e557b54cd6b0f361ef578e3d2476a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1466 zcmb_cdsLEV9R9SMWiFSc%>ql%jZUUU-f*Cn_W9*4$<0%%C^NFm;RUiRXY-WW#m__+ znwc$BP)yeh)bN_OGRlyNB~mL)MS@ifa4NFT&i>qg+xy4+KJWAV&hI_veV+5XxGNmA zT4uit001i}IFJkgW*7wLSS&#H5^{PLa;)7I8Wm(RnGiVfPRGc5!0~p&C9YwKCfeKE z5q>vQ!bP;DbaMD^0J(o!Ugjmg0l=alC@>)El$pBpbu!y+`Qjl5{7)}U7hTQFJ$oDz zB%XMVufQ5}rTO_s%1)dUuA*?mDtvvH=!8FE3;r?$QmO9BhoVi+sN&-8*<$vQUN`*O zWZ{gh!}~whAyo6@<)(O0t0Wz|=EJ|yr*7WY-&XC3ucwUnkBfi3Wos#`DjEa_sZ_me zHl4Wl=p*M^cc~JOpGlZ&MSH-uG-cd9>C?*HgyDF-jcy`?ey@gikRmiy8Th9D{Nfim zULm;or^_+;`l1GUELFeb6GV`00W1>54CEK@5j}~-RbVR$x0wIlG6e(!S>>2>SM%}; z7h31Tz_#x%kyrZr6U-YOt<1U*rHH=Jx&Q`Z20r%>C79|@s} zW3N{pvnaqiF}JQqLF7;Zv%H9oh1`|F%$NfTZt%d;2E9(2>~X1}9Og|W&wL3H&uEF% zRZdXEhs$uLH#FI3ag$co8wF#P!n1wiX{c{D!y}P)UFP65E_q-~yZC%eJQvBzMmx*0 z9gI)fss%H3HY*f#eZ!rGl7Qd=o3lM)&nZTt)>3tZe)71Zr%PC%Au4~8ogqF%>{gx# zV8rU~VsWGOuzhrPzJSjO5m*kVsGF9{CLR31!{ zMS{xNYIb@E*YDLeS*wSOVq{Lb;N_Xd;UPgbFZbhJDY}ED{1YiZkKO+f2Qu}FdK$BQ ze2UERV?7;0d2|Ob5A;S8j2-mWcU;~L=AVwO&y*3B+FZUfWLh%+s{{F1BpJ{p2xP8G zN!c1EDGZft%>_=ml7N-xHXyE!DlkrFf%9=FxsAl(Dh$*HZ~q_s{`VNsCb)%UCVA%< z+mccvM&wJ%F{y?k`ltq70FTHI59ABah-}~;W}i}^!@Y?9U{H6-Ti!|q4Yeh(aAqk- zym z_;j3!tn1918>4(9`#KCh>_fUo;s?=*Ly)wydZk=u531@mzV7YK@E%@lnm8(~v4=U% zF_M8mdcUFcGD@AA2{{ht@;ZZM!xF1D%i&jB9_mMo z?cx_zfB8Gl2@`K)iGP|v}OU#a$RW+|GBuyXe465-q2~E(`s&6 z0h@0tVk>?~ZCNfHcU@PSAr-5JlNb#*8ByuCjwke7_=*eO(QwhIbj@4R=JR%ruF>oovtnf=IMG4N8ZA7Ll00o5y)^0nP`8Qb< B-1h(g diff --git a/a02320.html b/a02320.html deleted file mode 100644 index e13c286ad..000000000 --- a/a02320.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.DataZoneLockedError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.DataZoneLockedError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.DataZoneLockedError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Configuration Enabled
-
- - - - diff --git a/a02320.png b/a02320.png deleted file mode 100644 index c6c91358b7b90fa3f1bcb64c2f127892e9072a8e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1436 zcmeAS@N?(olHy`uVBq!ia0y~yV3Yu|J2;quB)21rCy^9cz~^Q|CAuFATLc_5#!BA&dkz2I%6j55((qY z4I;^DViS_ioMF1BkmmI(Ev-G~{=VwH_Y{wvc{7Lq#?kk}#`p4~lW*BxUK{iN^5-9` zwTz8_``+7;ysTp8vVHfuB5Ola)6({zur5BcM?NgNciFj_GjHmDIwy0vV`j?I8ER7& z^?oitdgkQ!Mw!p)M|={Ci?r_kyR!U}ykK%#*^%cwYH)|}3n!<2lSFk>P|wWB1ED^e zOI4Omxy10nFor>>VVVf@h2ot{BpdobjIWc@7``o$Xqa$?Nnk<}15*%>gF_c1hle2p zqb8ez!chhmpk#vxGX;_#0+ZSjB_<_Gw285Kda0O(cTHTvn#)}FU#|iZJp~GPg~DdJAx}~WUsG0;&I8mBH)b9 z{+|EOGw*jD`}Fi_#q1rn{-)PtH|yTNl5z36S=>JJf2&UA?Qc3M&!7G}x9+Zw)1-5i zK4+{RSGpzZmrilnzU_aAnWuHmb{HFPL4dV)Z|wqx|l)-;pB=OKj$7O;MRD zJE`Q{^`kk3wfa;1%Fg`TvP(WS_BVUmXX~U@xsk4KD~l{o8opg}uE?kSiFvTC^ttoh zH-)P92E1AA3}4 z8<*StGCo}CAH9PI}3 zl0X%SmEjeyf4|Yz7cCAte|PWWJ)eGTTeWHZ-&&ydKeQ_JM_-$)$dn`U9MSCdE4}^>3Z(%SMT%|$8~3&d;Q1+m_Cj# zes${b!u5M)dd$S+j-<(Ka?jpcz1^>LzfE!9%KKN1Ekrg?-jn<0_z|7E-%{0+_?$Ai zTdlsb2-}Kpe!uU2?f0W!cE8tvCz0RZ9xm$@|FELJ%;@fF_oE@ztGV`meo{0kIqG=2 zrP`E=9cJ;IOBbv*JAOxWbL!Ko`)lg9nb_A>{f#bNv8r+-ZB-?e-Hj0j-bdG~Jp@`>#eYP4{jxu<<`njxg HN@xNA?9G{W diff --git a/a02324.html b/a02324.html deleted file mode 100644 index dd2c79081..000000000 --- a/a02324.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.WakeFailedError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.WakeFailedError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.WakeFailedError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Device Wake failed
-
- - - - diff --git a/a02324.png b/a02324.png deleted file mode 100644 index 453750e1f8a2e057daa049eeab34fbfc9e01ddf3..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1211 zcmeAS@N?(olHy`uVBq!ia0vp^KY_S|gBeH)z2AEbNJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIf!^K@|xsbG9N_wBaLT0AZ7 zFQa_l{qO3ZFW_?VUGnX6)0?+fb})WYVfnALbV>}Dr^}IrO))M z+-kR+o8I%RAfzy(NeRN${$wd-cY^y~+^hN-HI@(cuKavI;k@~NOSV5@-Vt1~|4HFC z<_2?CONJjo6PO$HNnjj!{tkmtz zuIDN}57=b%`rB5_&95@5eSDek?ndj>txro?9Vcz&J7Ik3(I=DMyCv**%ttsu@ z6Sr}~4VjV?;nQ#Jc+T9nl^cFWtl3>_YFD~^ z?PsZ`l+xH=^U9A+e)9jqe6_vD=W0I*y*Tkn?XS~I%y$+y?y*ew_@wqX@zU-)JGb2S z{PbMpiONfFN54t?OeWaN^|!k-9=QI6g<*P;_rIDd*K%*W25Z;v-g4>I3>Cp7#uPYO zYvMGQJ_+(zwTe&l$*NWRL_kDIB=6cEQTh~^sx#Z$Jd0KX{@yw{nlQVsmc=5`!Rcze& zcomnG(t75EvU{eVN^fpk@0_=K=>+}5MZ5i0+|;}MllOY+r?h<8ci;TZZBPGKsTd-< zr*K!rmf1`9I#svc(Meym7#xw!H&%cCcKXJo_fw88wX#>$cb|W@hR?xr-t(28*T>!x zd3^HbJoefBt-5Kud7tHX%w1)5`*UF2{I|YyuQ#;c|9r|V^sCw4)S%F-;amOpX=+)a_`k%*ye!Y$eW0MKXr%ZDH%Rc>j!mM3?Gw%S483s>RKbLh*2~7a_ CCscj_ diff --git a/a02328.html b/a02328.html deleted file mode 100644 index 709c6d885..000000000 --- a/a02328.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.CheckmacVerifyFailedError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.CheckmacVerifyFailedError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.CheckmacVerifyFailedError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
response status byte indicates CheckMac failure (status byte = 0x01)
-
- - - - diff --git a/a02328.png b/a02328.png deleted file mode 100644 index 3aca79394d8f250248cc5bd0898a1c4970502475..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1518 zcmb`H{a4a=6vw}4MyZ&Y4=Y)j<%rCln292$sZ&s-ut!Pl=)}}SzZ#LVrDv^Uz%rx< zL$NF^6cTGrVVFCXGAbcg`H%=UF*Bc_C!>+dzHVoo{Q-S`_dXE^B*C z1j2TiEdT%rLSz^P0AN^%Pc5*9_An%z4;}8?qj!c|EEWh~PE0Y*+!bOsqO-p!RlRI& zZH4TyyeBn~Z{cA|Oe_HDf0mzBc^3fKUIR`m140roci98t-vg+q37O3p=S zq7l0yFoz?5I+k(huk#clfruVPI%68zRTK8;hpKhKYz)SZt5>P4s%r`kIei#HBYNF)+dtq{JzATDi=S4atEo!rQv=01C?r) ziyM}iz7uW1owgIwXa)Bwa`vO>=lIa&TlUhs8&8%(6ku)}#N}N zCv%?Nxi%MmE~8d8WYL{fWNP>NcM03&VY0n?g7I_u&uG3o#ZlW zENPC~s1QZ5trwJN0O&P^0NTML7?NE5XO-GG?MD01&Gv2C4)Y1b)uZ<47#o1{CxDo=CUV1Z(?5T0Nxypd4O6e<>P1VWq0-Bh(7PER3 zX<1Ky;2l9_q$ds5F+G9BkHx%@7nxID_RYXUK1RFL45k5|VF zg(pD4v6(|Y(LTruQDaVSbV1V?>O(fR1KCU7#(U`Kj7pQwUdbnDR(8EKB1V$H_`4<5 z+i@18N z&bk`QG(q24hi`S$H(4zoHbx9dW3&ETGn+@xoN7q~eV%vk^l>LECa(nAnH`y?rF&So zvNO%h-jG-0uPdib|QR3|`zDzp!#$3>Q+_mMw)4m+eKWlnc?f(%MyQ6<}l`Zs6Q(!K8(>F zzAoLx^gixL7mI4N;QvVDJyCP=$-QA2Daq&5fdj^$K}sSWC0T;akaebZ47>=5-C)O0 zI3}k_6>RFl8t;rtDI-hv@}o%ybWQv7S~7VReo~agnB(-Q{sRfTOfOBr>32)haoq?| z*Cyv{YBw~e$5eI(P@k!V?W8orL9yY6?0h(QljAn!7FFll&=ZNGUt^^uh(q@oUTjeK zW;Ap<;O=LllvByN4lwt=u2#O7`E5apcsYyO0T$^sp=o2+&E*b~TchT_BRXUTT$o;` zHC(?woA1`>p9G4SBZFO}a(CB^8Y;)g77NEbl~c##K&U+5!wrT#uf0#pn+p_-mU_;( zQ*rZ0#&oUB4wvZSM}9QtE!9gV@{`5#W|YA|{nW?cPpu7Xhvq1Sh!%cW>QEzX6z&%~1dV diff --git a/a02332.html b/a02332.html deleted file mode 100644 index 6bb44e073..000000000 --- a/a02332.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ParseError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ParseError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ParseError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
response status byte indicates parsing error (status byte = 0x03)
-
- - - - diff --git a/a02332.png b/a02332.png deleted file mode 100644 index df1d494c41511db87f7538b11c16062559cd928c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1152 zcmeAS@N?(olHy`uVBq!ia0vp^cY(NrgBeJMM9Sp=Dd_;85ZC|z{{xvX-h3_XKeXJ! zK(jz%`k5C84jcfA2T!`Z0w~8>666=m0OW&#In(Sb3=AyXo-U3d6^w7^zTLD~fu}A0 zk|$-4xik1q-^`n8dB@M>OfG-(sPX8T zniD_1{4K0K**A0NS^sHgR+oKFowdZG|D({c>^<}AMN`k5IsfV1oug01Kl@KV5L4G> zl=jTMvhu#J@#HB}vsKTX`JXL2%x6EsveS3|+|wk;4W& zcbghJRsj9laY8N6-6dr*cUfacM*GH^N|E<{k2*TE&OJK(!`&rha`*BXi&vz-l`3>` z5mi6<`SITwhx$5Jcy5bsQ#|wE`(5zGn0))Q;-?i!G z^}d6JRy(&p-8dosQ$p=Z)gVKKD~s?QGp_Y#ge`_pmf|-NEHAul)A&mf81S>bQTvXIFaDPBg{cV!vhR=;oahS+Q6S9H0MB`W<32eLeqk z@04Brf|>6=WgPQ*E%D-1cJ=4=i*kN#-Kssw%P^bEJLOGedl)!^mhRm1;+vk966eZ} zRbc{}_NDHvchxlS-Z1L1dY;s>z3f!c3epnY}x2&s+Mud)uo0zB{wt zXzxy1#UK8=?6B##xpFJ6?X#BX%)M3p``xTqyW&%lK9hbP=#pIa-stL`LpNv6)Dmwm zuoC@x%4dJ5_SJote{R2DzFc2MaANeHODj4&&Q84Bdwp}q3DJLh@0Pvp>aaOlZ&0qJ p^sUfZP;fRl_}q32IK7x^A3V)c?$7+P4ZyO3!PC{xWt~$(69DT+LlOW0 diff --git a/a02336.html b/a02336.html deleted file mode 100644 index 30419b092..000000000 --- a/a02336.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.CrcError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.CrcError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.CrcError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
response status byte indicates CRC error (status byte = 0xFF)
-
- - - - diff --git a/a02336.png b/a02336.png deleted file mode 100644 index 60e4450ea27e786c8ca0261faa0c661bd9fb9f7b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1135 zcmeAS@N?(olHy`uVBq!ia0vp^cY(NrgBeJMM9Sp=Dd_;85ZC|z{{xvX-h3_XKeXJ! zK(jz%`k5C84jcfA2T!`Z0w~8>666=m0OW&#In(Sb3=GV_JY5_^Dj46+eLZQ57LTj> z?NxsF{&)6w6$u`lCs(~sSj%`_m|=pL`G2Jrfi_l0mz01zelADU^3;`*CcnRNl-Jwk z$)ukzzyJQ~U8bZ|`!D5G&DA_x-DZ*FhVu^9^j&`)8>puAN$0-oZi~N3|6Yo?oLa0Q zELb^3fBo*RC0`|nJT z+9WKv^O64j=RhmY8*ZE1aU%X9kZD$EEhsqqOqpVfffmDu_B{*<5pCP5_qtt^zLhsk zIwC*E`o1ya0j)fC2B1oY4V||c8+`BZG2}cdV@MF*&de}-hb+U5BX1cFsG%#Fmo#fx zW`x1SCkuASdfqzn*5i^|{tebiHi>%o<&LgiZ80flM>qdxdCzT69;rUldKJ0bPsY>i z4$J!f^T}M+lio~vyDg97_5W$VgSJe2&wo8QWoMsY=9?n-V_wzrSEhddc5U~foSoK& zJN(r5=T^sfhLmZ()m>}4Wll-@axEp!P(k0d4%6I!FFO3@_43J0r%qh)of?~3d17N+ z^4aWJ3;s+yHly*U#p!ParBnT)$}{Dre|hsNtaw{$eA%0C*SDq0?*2Tpa;~4Dv1c3e z^s>rz_s^a=cSH93rQe>nuhc8gmA@gnIOfcge@(B~?6%r`Z&&s{tdLEo-X7(-oIf)w?_u6~pQ+ux74v6Sf5^3ZyKA+o-v08r?|D7{HT6sVHJMwyo8Rud z%1^%eCcg@;mY1EqrFOFY$AXLJFYlZ&Q^k@Y&wUaw)F*8@nPcvI*@W8h14)dbrNG1( zdQ~lN`KqkR@;72x&po}pxZ>;Lce}dd&Fn&T`*%pMT6OQ!mRNPa(5(;EDr##wemeeM zd-s}t;@|s4@m<$G{e4)~rE}d-sW zcxUEkt}Q+7SzfkEX;Ogb#VcH^o?hIyV%utIkJP8li^8kRrao0XUe#;bY3}%QYwt$3 zv&SD^>5I)vh%e8)HEl(f-McqgC+Fneoj$#+S}r&8_`904ZOp&CcklV~E-fwnO<(oP zze{WdD=)2+_?DFQT|6fJ?p4{V(dB2upZYv7FRT2o>2BcpELT5mM&0RA)4Y22<)KVn1pYT~3=ZAe qb9?0~U{VeV%{98+DsX7UA9jHURvN;sc|E|Qfx*+&&t;ucLK6U+WHc54 diff --git a/a02340.html b/a02340.html deleted file mode 100644 index 1b3f75b43..000000000 --- a/a02340.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.StatusUnknownError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.StatusUnknownError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.StatusUnknownError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Response status byte is unknown
-
- - - - diff --git a/a02340.png b/a02340.png deleted file mode 100644 index 4cd4406b1a83938361e3d42afcd6f45e62fc6137..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1292 zcmeAS@N?(olHy`uVBq!ia0y~yVB`U^J2;quq$-Q*Z6GBb;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6WxA(}V@L(#+qti|tuo+g zS^hXm?fw5F?iyd5cDzhlo&Mg@ZNZYSoyM@4Hm3B|e zrn6_vzE=F+x&CvUL|WSKUoWiwvh;j3(rMh|^-0xs-Osw3tXpT!+*{ngre_Yf<((qW zw6{06%$&K`b^c1p%jNnlRwj*;XWoqdGIQ3&gC`pP>GVi_yv6i0+F%(|)uOaNSrV42 zWo45euD|PBXUJo`S+}-Xx=9geQD8jt;WKY8L)-y%%>fTh)l3_P2izs>44wuICC~rr zNi{JtaN9<7v?VY&ObFm$V{qXFF{dPu$*hs@x&5|m@~1{=Pp`v@5>1Yi0)fs^k^E}a z<1$IRYK#B+Pj{!uda}vhTz(uVx3zM^%}q)tbN?Fj$XZY0u`-a0Uw_-gz~hsu?4cP7 z%Rid8TAB2|{e1f4B-1S0s+<_MhbevwjcK)Cx5xSg7 zLG4*{p zpDlma8AZQ((`S5c)>mz6BL9`{`*$gF$`9-A3)(xkr_Wh&@RI*FnJuqx{jgJBF@J4* znxyaP?6Tdh7ab!%KEAPEbd%r&_4UsmT}t^;bne_L-zA+VpNSk@w${aWj_EgE3ERn1 zF}n-O63$#cwoO*Tch=U0=kA(adScTPkneZ!h1ku!S#Q?#Jk=|nlH?k$?Ezopr0JFwiy#N3J diff --git a/a02344.html b/a02344.html deleted file mode 100644 index 676caa594..000000000 --- a/a02344.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.EccFaultError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.EccFaultError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.EccFaultError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
response status byte is ECC fault (status byte = 0x05)
-
- - - - diff --git a/a02344.png b/a02344.png deleted file mode 100644 index 263bec008777fcb84c2922cead372fa519404c53..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1156 zcmeAS@N?(olHy`uVBq!ia0vp^FM+s&gBeJgI@;&~Dd_;85ZC|z{{xvX-h3_XKeXJ! zK(jz%`k5C84jcfA2T!`Z0w~8>666=m0OW&#In(Sb3=Ay%o-U3d6^w7^J}hfi;Az$W zI7jXM|0BVH9E)DudUeyuEI*WE0{^5R;)*R7S_Njzw4N~8$oTdo5OHbll8sLcjpei6 z)MhQuS4~aJdwsB>s-a|`Z@c(;^LvLX`p8$6_(IBYo>FmxzvAw;mpKf#BI&t~Z>9BcW z@v9DfpJtsu;n}98+l|&vIGz5*>~Gfg&phc{&3VI)*7V-H`s2!6D}V0}@B5dJeedab z!MxY>W%|1<9^Fe6m43~;H}i{gxzv)-SOukDlkUy<5?ns(qPI(mo1d3UiZ_^0ehCau zex`=wUzr;8uJFEmeU&@Qe2H>~`ij33s@}3PWETZ7Y*1BaWr!w$(ePWui6fT7(Pas< z<;so@T`&==U~43Cd-}Q`Usmg8-#(tCsdTjTg4FuE`>Z{r%aoL+-a7VsZ~NNm+bk#R zMGHOqpZWzUb}~2aSy_1Dm4{`;-2A%W+{?G8t&9ras-^!p<@ALcVGN>6GT%IUl(VWl z=Y3d&%8o;eq(oi5gz7Ju@v5{u`s>VNz9;Tx{^q*WRAC%CbF!#Q>Xh)6FH}ADm3b6h zo4W61$eOe$>+23$SCn)cH$VS%LVC&TO{LMzTl((tuDsWA*!Zt#rr*`gFLLL++!is1 zz3l83|66_cyqCQC61ru(@Ro_opDx?_=}SVm-{&n}AGDY340$=(_rOlJW2~3fmsy`L z2&=xF5bOH+$DGpkt>(K0asqDhND)dl|Jd7gJ3WV!kP%L@iiS3j3^P6 - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.FunctionError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.FunctionError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.FunctionError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Function could not execute due to incorrect condition / state.
-
- - - - diff --git a/a02348.png b/a02348.png deleted file mode 100644 index c775b976fb936a5b797752367008bba107a4900a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1145 zcmeAS@N?(olHy`uVBq!ia0vp^FMzm%gBeKPY7Q3wQqloFA+G=b{|Cvv`C8h4Xt{-f zW`V@?GcOJtH~!=C$S;@y$Oi*+rrB2*7+6?5T^vIy7~jr)Sk|n-<7WTJ z()Zr~&gF{)TrO_Cy16xH@7ALVI~`ucw+J}#D;OBxKJGemrtZTqbBR|OG_8Z+bvKOBk>Je017dny4ATk%88)lH?~)|i7P1=% z2;MyI+Svir;NmiEhn7@FN14R!>CqoA2g(Qr9*wM#_}|fyRrFb;Sfq4zhH_uWibpCH z`}WE&cIoWU+aMULrhevs_pvJ`+t-^v_fGjGqkO6B*~{L!*IsH^uRlL~|H^GIZ}*)k zw5r_lv`n#3Wfspgp678@;qPL*I-Z2NgzROSSa+2a=L1b z+nT0N4O4AcPp#j3#C(3=B~Q~?X1ks(%CL0si#cE5Tyl0nUUtX3{JW1!u3S@HwBcb_ z#=7p!Yi~zfe4AObZ}sYb;+HD@Lvoq7zP^3*=8B6(C&PNf>;qk2tu3k3pT)0ZJ2A7N zrr=o0<=yA3>>s|l;yd@M;l8}Praw&P?sD_))ZV|i_r9UhBL0fk3+FGrETGHP*72fx z&*uyLmo3HC_OU1}(*JnO+1_{g*3!<7GY>!kR}iSAFGUm-AfyUSVa3#u*p5qiaXEfYS>`7D2(^J63dbsK$i291#+C>1R6j?P=Jb zFRLZ9j~_1%a!G05yY4JsylC!`&W?~R&9^nXJ8~@Kt-JM%g`WL)P0pHi`}*w9sz$Ya zf|;(L=N$8UT{30v_2*~rhur>>JGp#fhu6|qv)JPvanE-$k<^hqw-70YnmT|n^tK~U ze#`aJxeqTX`o<|napcRzTuXi$!1^>$tCDk4{OoS6oqO$`b}pz5<>ypl)xB6WW6qAa z4{a~3a_(Le$j!MMd~s2Pe)lsY+uOT(Meoi#_I&rQSM{@3L{)FS3XY(nb5W*M2AaQC zikJW0nPIo|%PzJ1HE)g{yu4cu8bPI+&;I?&(bRsvAUk&P((@1BX9y}QeKO6fT+wlY z^Yo)<7%-e9^t6e(zn1u Og2B_(&t;ucLK6Urfg5oE diff --git a/a02352.html b/a02352.html deleted file mode 100644 index 27de8a067..000000000 --- a/a02352.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.GenericError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.GenericError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.GenericError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
unspecified error
-
- - - - diff --git a/a02352.png b/a02352.png deleted file mode 100644 index b98fabe9bcd8c914d898a897de7879030fb2c8ba..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1164 zcmeAS@N?(olHy`uVBq!ia0vp^Pk^|CgBeI3*uQ-qkdhAY332`Z|38rV;?396{zJsLCr?$oPa@=iv^ z+rPY4m7O&6C!Z}7kepuRk(R~{CZrUdIS%e%cyPRmv7ywK@zd8ThNr>`?ry)Q^f!EY z#l>LuWCBBiBOfP&7%7bF*%ECBcNqu>-kjzvBp5jXL|m{u;o!1m@y6PhUH-b(N{hVQ zza{=rR$4W6w)*U8S9K@Ig2dR56@TC7%joG+qQSZ|$7{xa@s^dDdGXfIqpy6C(Y@sP zEVsA$+S&`v*MC0Sz9_fqHe=@Q$>GtvM32a&e5(7HCl~1U=$>z+ie749FPF>HQ2i~O zC-+&OT(L!`YAC9oo6+&npNlB|Cz`AswuDDsjpJ&R)1V*UFw(BvG{$;b8A$#xbEC5(#L8gaZhyau zoN0>F?{a+p-(+BV_HFj_n(kTi7Q0%V+%v!M!YW1(~Fr~aQB7`K#Zy28&} zpUvbizk8SWCfIM8g#Oj$E5)hHzn=0vQF?RNTIQX+*Cooeww$WDXgTe~DWM4f DS;8Bt diff --git a/a02356.html b/a02356.html deleted file mode 100644 index 9eb5fd09c..000000000 --- a/a02356.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.BadArgumentError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.BadArgumentError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.BadArgumentError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
bad argument (out of range, null pointer, etc.)
-
- - - - diff --git a/a02356.png b/a02356.png deleted file mode 100644 index 3092aef3bd2b1e9b05a9e14380da15206fff6fc7..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1195 zcmeAS@N?(olHy`uVBq!ia0y~yU}OfeJ2*h(75=&~ASE5(6XN>+|9>F!#hb6C{fCxY z7-$wqOh5DDz<~om@!(09R{-TWOM?7@8Gw8+FlU;5g@J*^%+tj&q=ND7-0Vq<4R~6f zF4Ma7*MARVv#z~?%4wBg=l8qVlTspoO*k6Qsn{~xyJ^*{wXSR_4s0nO3fVR?uU_@; z)z2^5`cH~^LPC%K3UjTSb+Bk=e8rm13eNM{d*bVMT83Vgzkd9+f>_NNqu8cZ@_Bxt zUzdOVS+`-|Q`l2CojUIG<~<>iOz4Q9*Xf?n^&<&{*No$#&_)ZTYvWd z*ZX73wrW-NuObeh#rxYDSG^L4xZ#0Bi@>41s!E??ZCzaQ^o%APZx%R_;8sx0k#b<3 z2iTbkN_i6)C84OXV}~PH6zF~jHl;^wFo}cu$p*fcONvjjFl-kC3m*J$$iZ;oVsTxq z$op?^7#3WdSX=Rrxgo5wYTM1tObzSmCLBD##~>vuq2K@8tdEgl&nm@c(aeZ{>m|I@W0xUUXX(v*%}Y-Oimq!`09KE%=o8`mqux!;6d~3aZ=L_FH^O zy|-ILO!MubMUkQm_P2UhRmrzc?%A`nT9P5)MTg_TMW>e7{Ps2I4eVR`u&KeO$}+UP z`r(qg34VRz3?*Nfnv34gnOv{W%obhn_D+N2f1Nk&kIykR1aLA~S)Epxe{k_;gB8uc zstap;W_?vZv~y15YVGnv$9fYk@SpnO{&&I8ePWTlhjvbJ%v&i}f6IFNw;ArgUJIX+ z>)Xejx$*afob*IvJD%ll*;9oWE@YfwaFBDK$MC>*@6#`b3jB;U_|zFAZQNK2SE-lci<8~QhA&>9zL6tkXDvG5gey`4kVm^V7cF} zt6cw}%x(Rc!Q~YTv{qc61e{r{CdV`@7(XPx# diff --git a/a02360.html b/a02360.html deleted file mode 100644 index 82100407a..000000000 --- a/a02360.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.InvalidIdentifierError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.InvalidIdentifierError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.InvalidIdentifierError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
invalid device id, id not set
-
- - - - diff --git a/a02360.png b/a02360.png deleted file mode 100644 index 63ac603acd261757e8f13ef16e8f64d5e0fd5978..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1294 zcmeAS@N?(olHy`uVBq!ia0y~yVB`g|J2;quWlUerHmkgqeD|W#p$(}I^n<)S*RW5TIWvOq<^*2j%^YB|WB%5O z;(5lKWAps)f3K~((Khp@VgB4z`5QOJyqm0WesYcH_UwJ}|FTb=IaAm6{Y>v1zREpM zC!M*qS<~3~x8S`kd28bLX}r4Qvj`~PV!l>-Zg0+u_qSF!_bodizj@=jMf_`|_uqCq z*VSzM^xx%on)`18Es&cp(4KRmZD!<==Qj+DtIanlN~fg>LP&FI&7~@z7#ZXbh%&U~ zFgTq5swKOLkwMs8@{*!7gMflKkONZ6AfPBsCUbtq`nar>vQf%|T+cAq4i{`K-(g_AR*YSwQK?^gN#Gf$fRt4GnJC7(W7th;sB)ApCH`MzjrP4$i#qwl|C7N6<;weXYo?9Kn4uHE}||FSp#;td}CEy&7$ z{WwoRW#{pgy+&tBCA=@^3b{;Q=O%dJ>Wq6{Db?p>d2bfT_^rHhEys@A^PEk};>|`q zE8~@yZCK`Iy6U8W@N3E5ydAf>m#>jlT_5F9)SsUFCGg6{t@mFYI41TirYu4E+?2ls zvwRe1vH>NR=Uj=gJw2s)r{O!(=bk2e|2tUR&saRO)K^VTUxNL$oBgE4rOCIJ?*1s- z`q|g)RneWgNkXo7#XfbM%D3Kf>(I@4L2-FzD|Lgnom&3z3{W}8q#n!dj+^H3Z}pty z|9PofyzIGRvt24`C$E2;>J~3|F4%0@)*hAkBjQrEwHE$qT%P}ukb*VOOmF&W*C)&j zb`9DL95)#n=DiNJN?~SD%QITyY{sDApa z;X649`LUsQFBdpQtG!+q{&nBY^Lkx>kd*w>+{1Tk`@?Tqta$#;t}y23g41))E%$O1 ze$E&sy?Wd3i>_~rs{iZS-&QT&f8O-eofVHhdq>~+dpf%MC-b#UPm9fxbAM%3t((7h zCPVRM)rQ1~?9V%!-({vRE{lG5{r0kiJtd}H4eO452`kD!zjN`%oEJqkkC(hmjCj5M z6?>GOb2>0~TMSg*+;|$Y@|%(5rzc-!^c>YMzY_Ucf9Z>v@2e-@p4=-;Sv>vHw(k>q z*WTXw#^8xwu$Na}{`=b&8M_28q;&0G-WV%g`qJV*+q^yV4xchR_iwUFms)~|m&A3) z%WrSY-*EBFBDKwZ;yul!i^Z$w-MRcPa#3BuU5nFGj^|!^x^=FitJhtzB9^Dy-|pX5 zux)wIY{%J}hkc@%Pgx&5Id9X?my>sMW<{9)a@=lqXYagN+4AqxKkD}G+P%N&hTHTb z@7}F{e1Ef{&YE}c^dHO5k$(5CUJzK8lz#`6DCOTfX7^4B68iarzmB0+ojo%^0$6e} Nc)I$ztaD0e0suIkV0{1p diff --git a/a02364.html b/a02364.html deleted file mode 100644 index 329c02f39..000000000 --- a/a02364.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.InvalidSizeError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.InvalidSizeError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.InvalidSizeError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Count value is out of range or greater than buffer size.
-
- - - - diff --git a/a02364.png b/a02364.png deleted file mode 100644 index cc2799ed01c1d9457ad0b6a3dbb32f5d48d9f3cd..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1200 zcmeAS@N?(olHy`uVBq!ia0vp^Ux2uSgBeIZ7c?saQqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#LWrJzX3_Dj46+eK>8k0#8f( zOH1E-|2x-rISCvs+y3_6<&^6yxfnmO3jJ4FI%N;1r^}J)Oi?aJn!&_9zPYEDcAQwb z?B02|e}6A1DJ9qbSyRhZwexKBta97?mrBl`KRr8BSg>-w-L}g=dD7Puc`JQ0%2iUz zzx=$Y>h5u&PBoTT8yA;*%g#S7VV=wU@#}@DZ!!+=7p~Gx;eYZa+~N6Rn-%vy_piMd z&!DSRv}}Kr)dE)+JI(1ptLhgvhzWjN046xCmQI<&$?(skoZ*97|Ap_nowNEc2yeE} zntma0FXMrBCMgCRjRlMcnn_?hDBg89&piK7uS%`v0?$j$OtVyMUs%3ynZ!Qp*7bFN zO48gX&0Y8A@)!3>d$T_06sNgPT6>Sdc7yUsKk;MU-#7L)s-0{v<=D%ntNUO3(w!|^ z^5>q`&8|BqmbyIq#^(jPCT}0)?t6N6%h`PPgy-+BT)p;=ttq8g)=_-c)!V6T)kXbz zy{->)ban-HZVBIi;T=c+T}`)Zmt6i!?P|Qg^WL-k?N#X^;_sOb9;uRbd^7Ld9Zk#F zNe8=9iftM0>V+xhJYl~u+r0KR!>=C|^LHornV;MueDc|@rgfDirF+<|_pX0+U46gw z{|4**?Pl&rQ%+jUWVgI)WpnD~yUo`VdhYy`EzzwpJCM3Ds$uivr`Lt9NUmE|E}3J; ze*5FS9{sy7i+8muWUhPt{>uYv&q@0)^sCjjT2H^=+cfdX>o1c%;~$+9EeZGY_~iQQ z;F9%)&wo`+eli^%h8a!!fZ>|X)L?%}mSN9H{f$DAOqld~s;gaRWgG}KlDM7&^pVcfj3_U$Quf7kq+{}(1%U4O{@I0h(n z{)^U&#<{DqmT&x+aPsaW_G#DaLSC3!W&Vs$pF4Znx3!yF%HBo$bie%;q<(wPE#7<2 zqRm$WV@mAgn$)m!`rnp3c`3Dct@8QH8%!^he*3h?ZdTjhwHr0&^tzgBt-Q55KI8tj z=uKbp47K(jE9Tt*~0W%S)WYH)_3d{_l0mimq(4+Fx3I`em(q zs!e0w&9jQtJiF#>Uzf|U*ZQ7n|F(dVHD&P}vkRt4=iipBEhyX1U9Eed^5m!N+LgvJ zq3?|pPw0`+^pH-`Vwe&5V%@Q11JNIAo zi(1!!(Aug0?#~Si{hP$PWz{NnFyVVabLkVG{|vkMBWK)yxikt`wlH|Q`njxgN@xNA DimXl5 diff --git a/a02368.html b/a02368.html deleted file mode 100644 index 11fa89b3b..000000000 --- a/a02368.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.BadCrcError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.BadCrcError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.BadCrcError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
incorrect CRC received
-
- - - - diff --git a/a02368.png b/a02368.png deleted file mode 100644 index ec07a127d558acd5723c32c3f7c5a51ce8553a27..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1160 zcmeAS@N?(olHy`uVBq!ia0vp^kAS#?gBeJkU3mN^kdhAY332`Z|38rV;?396{zJ zANfrFz5h{YAjhJN=(jl*H@{kj@l0sf|F6^{@QbZ+=Faq(i8F6ntvhihXYO*5$C1a* z)SUS7P5toi8A`^*v*UH=w~Ic%Z4z7P_E@*)`;Y3npwu&GwtxPjbL^^w>Lp!+*WObN zjqjg*TwOSG@sn7N@NZ|%lz;varz5hsEWPVya=uY@Kuq6k?&^yRl47Rx3YY#`>>pCx zb>@uwpB?VuDQWxW+Alb9=8rSN4S|L&0=w84>P~Yr{90Cj^!n=R_)@ z3Wfyva2AHwJCqnAj*BuLuv*8#aIMglVMCubQ$uNtAj6u+T?`4b=t|6uc@AGNm+0uI zIwsoL0aWASa&6}lAiqrF^z`tL*8^n)1CK`5Nc} z3JK0#C_0^y^Yee#1g%-8uTTH1YxK8IFjMUFgkxT>9i~jZ{_UB1sG05C44LJVtE1z@ zg|;T0sy&(8cRjn{eVB{NYNbW1L_5BOmT!sdd0P@Rp)VwPZ>Ua)dFQm>>t3zqIu#pw zOGG2SS~I^+cIo7ANm18k1s~n?a?U2Xt8I^NmB(HSxD&tP_{$ZoUM`8w(T3~)Z*ILc zV0jie~DkJ3=j0(6?ONm?~NPXsa0$DM$}exEs1`)XYmYvW!s9CFKaZ8nOu&a zo1gdajf?NptAcy=u9*HXnOmhlP3Z0Wq{q8mT)wc%oBndOa_^F_Io;W@?t|yz`%8)! zMC4W}Et>sf!Nv8LEMr!0dEEn)N>}=*;bpISb9w3ac;8TmR7a?=_wJH7lM)>%RG> zmhV8yKe|_cLdS{kHkVd(oKXA?iZEA~bsy$yiX!igjHGyf$u`-j!f>=y&e3 - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ReceiveError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ReceiveError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ReceiveError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Timed out while waiting for response. Number of bytes received is > 0.
-
- - - - diff --git a/a02372.png b/a02372.png deleted file mode 100644 index c03b3442d8a71817743600b49565db48e3b4423e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1152 zcmeAS@N?(olHy`uVBq!ia0vp^Pl33DgBeKb*WOtGq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)@k}^+c0Y$A%Vz}xW9j3%GiT;Ln0Drj*^YBYa(QRY z?C$Y@FZq}oDE#}*wjRChbM!ASIa=8}-5~Dq-#^|{4UPZLd;Q!<@AQj_dX16wA(FH4V>!bm+=5w9w&oYfj7g3#%QJn-aA4JIS-~WBrtDhVUR{wvZEi|NjauAAMvj%^ZlcL^yJu(8iO zuHmh;$l2?3YQ&*G`z?H2i+}zq*ypnBx5UI}M*KNzw)DA1R_5maTY73)Jn!VcB}MtC zA3H6|oOvn!((KhQj^5ZMBIvoMV?`FL(%+TVx7M7hv(of%U-d9ALTuaYnA5fqrQxhk z?`aitO|f6Q#=N}x<&xT&*S0_FNxfNhE~-EGc+uN^daon4g}UTF7nTtKQHgSg+a95VZmqrk0xr(I(@zUv#QbE z;~gf`D;<)Tmg<~3m0kT=Kh*5+tthe3;_sT>Q_ctJE(<&%GHqwluK2vrgWrN&R5mIt zS|#f8W%)ag$amkOr|Kt1b1g~K*5SVGwmS5_?(DY{u09h|sgJt3tTxi_#?~tjgY=doQugjfA8_pJuC08nbqIA>d%^` zvr4xf`YpX_v;Jwu*Kbch>nL&CE>d;aNZz~3ZE}v?lO&{Q+WWWY?_y)Kr8~E5y*qvB znRmZG?G>NaaUxPLGsI4<4>2p$#f;9X$A0rb2}~IwBeln YuW2p@k_KOn0m}*oPgg&ebxsLQ0F+fMf&c&j diff --git a/a02376.html b/a02376.html deleted file mode 100644 index 181743cc3..000000000 --- a/a02376.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.NoResponseError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.NoResponseError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.NoResponseError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
error while the Command layer is polling for a command response.
-
- - - - diff --git a/a02376.png b/a02376.png deleted file mode 100644 index be4521c001ae537dc011355bf53099ee228929f8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1201 zcmb7^|1;YM7{@=pe_2x(y)3>}bj_Gar)W&pr62*ifOW*hC)uX5U4P8HiUd*he&WdcO8%Y(GhR7F~s z()~fcy4Y0zSz`@k4PuAej42-wT*!-xgI9fvrwKdZs6iy$UKt1;Mnf-hQZpus78_c} z5B94!&%m`*R@OnrPl=*wG(5L97+xill%(X%FW6SQ+9lk@V%bDg$FVu4WEjq-E`}Ef zD}+ugWU{_;Re?qQ0tryLdwO>!yy`qllDAS`%8Z`a#bF1UL`e89{{&W;#+pTIV4&3v zIDABd6k=Z?4Jupq7G^;HS|gFb7zOlQP#cNbK0>UdFoK+IgoB0X{tIewy3Lq}?%#qz zSWe*2@3};+>SYBwuztRIvl5*vQE|ts5TI(KS8b7np5GkKX7|(XsKLF&fDwvu?Hj$B zO5%GUxTtVd(s>@QRCDbw3uj$=3g@(M+{6bAX-E(`Qu9Y&n#OMno z?U;G|#Zz z5npn)GZ8{MDSbQblzNV?VVOY3YZ!6`$mZNTZ`fH0XBXo3Y_jr>aQ=ewG^luev5aOr z7AtTqVkAcL?{ z-9W@2R*uS7ZvbliWrI6RIfmDvWyz!7{i>~(kB->@Y{Vh3LddrP$R8spF=6gn1c%Qj znhktFf(YaF_{6W!bf*OcQF1%Dfk4P>Vm@! - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ResyncWithWakeupError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ResyncWithWakeupError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ResyncWithWakeupError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Re-synchronization succeeded, but only after generating a Wake-up
-
- - - - diff --git a/a02380.png b/a02380.png deleted file mode 100644 index e4d554111508bd048570c7b8057503be86623c2f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1457 zcmbu9ZB&wH7{?#1JZW>iXR9f;LpqvEk3yOYUA`3==YRgc`??DE zk@q;*Z?XpfzyTx%Qvm?wio^xWmmvFbwzwBLHt!1!3$a?QNI3m$Hl?(;$=4H`ys=t7 z-P6;9p!M24653J{{xw+Qdb-6x;pAh!bU z2v+g~+N&VD`L4WGF%@bK7{)y`sOWHnN~AHUO!NC2x!grmc0i4w5?}aLQh#fA3(mWJ zd}@hBAd8OB;FYPi1M(AfD}Srm1eJHH)e*<`lyAf1qvrFvbO8@=pI#XR)2u>Drxj5! z@&VeB_MeD4M8&fP;=g(@crG`O@9N!NRwJO2KoYibNl%k;Ss7p^Lcr?SSe>1V3mz4$ zac^|X@fX_tZiBUR!QfH3eAk>Z_0m-w7zm`U{hY|KSq?(L7U8=TC)eT~`aCgxp6?Mh zVzB4NgsU5 zo3x8*{-rOa5#$`4+6k4O#7sH(Y4uJ~@xhWj^ZYHi}5npPib0 zR~}~SjUBpNOw3~}wAYGW+&tDgtQr#Cy?Q?W$TQM>mg=(f@Ee$9|up2H>Kd5JUUIu zEg^2g#4`TgtSD6{I=HCKyGHDG=!SFJ6OUYzBiv#aEwa28s7Go>w_7X%ky1R-m3$&f zl}S{ezMd;_-cLJFJ>IEEa2Nt5>)J{NGlmAZeaRL!ZOjhr>^TZ!M8l?HP`SQ4T&Ku0 zaRl^+GX9*gmXz&z;Q&s*g9>J@9d9Y9ZWR1TG-+x=Y{MWa=Kkimeo zj+TJIcS!U3u4!{+E8sydjS^iaXllxuGnM8SN!fP@!>3)(ZX-^f=OW+Ho;l zb!nDABKt9`IVe(iDzPY>i`J71i;KTdMNUP6-sPo9P)Wc1rkAhKe5IbG`kF8>)>iEI zTGTJNBWRONi*2h;CgAjr3xaFq=7!LOPd-aInANpIlFDNEe|VTjx1Kw{^Eg)}s|=+b zW-5x%N22c)4i!Id%TFvCNyn` zn$dYZ=zjI<>acqOzPhSj{Z+O6k{*=kLn^O}k6n!S2Yha--Ly$822%}dj(5Sk3g#?pWQ*T+`#kBWVVJap=BkCeeN diff --git a/a02384.html b/a02384.html deleted file mode 100644 index a20b394e1..000000000 --- a/a02384.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ParityError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ParityError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ParityError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
for protocols needing parity
-
- - - - diff --git a/a02384.png b/a02384.png deleted file mode 100644 index 6fd9af9b916b3bdb6bed7a4f14cd38a08504e509..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1155 zcmai!dobGv9Ke5OXpOpDZjUSJ*613R&X7})44wWk%e=)X&O7yp*m;DZY&!hnG`X%9 zL?k*IL941k8##|<-uace&NJdwib`y?U|!39?O(g?kA3gH@9+1Y@8|Bz^7HXDH9l<& z0D!62=U@QhRfs|-^bs2rdWMcTbH6Wx+;ut~60WOvGC6WF(boFw_bTA^-rioM9{9u4 z2Bdc~BfuvRK=Rk(_y+%10C@A17x-CFww^|?$^QNW6A#xUd(ENi%a5$yMP*FTnQ^^Ha46Vyz ziPC+G`^OQ%1Mty>-`EkA`Db<6Y4H9{t{uU3M6t=h@EXD&2QR}gXM4L7uP%H^WO^+n zoZu>(Wg|tIVucMX9~DZER&wjllWEW2>B*~^K{f}cnK0ZVS6A{fV~~i%(^RK3f`G-6 zJRmBhxZ^O-W72$~}TVu1BN zHE;>{?-5~4RefTJEed5?I)g%O^r;~zBkiYA6bfTo(ZZ2a@ocDJ`NI5@0uXd)%w{FJ zJ10-EEU`_*le-*FtUVc9YctHy7_RB2<|?p}-OgHZZyE->JS}3Ia64SA@Tr=8**&_H zY?~myHQ(W4bIw>+xm#6k_5`OIZ-gK>caW+;t$H5Us??ie^!4qbY44(lXsMz#Ja!_v z>9)3fq|!q4%u1=E;suYlmOmZcnBg|p)BosJPp7mrD@e>if<)kRk-!?#B+QDW`4!P`HSs!y!)FaYw0jDX_!1lictxUL^HH0gIc1051)G|=|{Nd7}@ z(Hh|%vIv5P{b~?I+E^?}8aHLkQ%rd-y@>j&W_5RuvFcv;kJHZl^H`xZ z*6&4P2iQzT@ch&q2kecsfkss{zk8g*RLV9VvQ-QkgL^tX+O^~prAU}uY!=%9Z-Y!{wQYTp_; zI$V$q7!xd6C-{Uw5Ok*Du(fF9BICpK ewd(Y`ZKG?$MD1#O$z9}K0AB7s;C;8K!oLA^zdJ(! diff --git a/a02388.html b/a02388.html deleted file mode 100644 index 6a660a6e2..000000000 --- a/a02388.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.TransmissionTimeoutError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.TransmissionTimeoutError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.TransmissionTimeoutError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
for Microchip PHY protocol, timeout on transmission waiting for master
-
- - - - diff --git a/a02388.png b/a02388.png deleted file mode 100644 index 7fd001595dfd60b7920b17a906b399a228159598..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1451 zcmc(fZB&wH7{?#isg{RUJL`oqbt|$V4PQ`GGhLY`RAMAO*+k2VlQ_+k7d5R@*^A}N zM4Y9=&I}bnp(HgyoUhc%q;zPaC{CRsf(JcFDC(ZAvwiC0&e{Fpy08EL{&3&tT)+RF z5fXf8t@T!G007ovgANh^zzPNRcRpS5SG~C}0orUrj)Vp*FE2yw#FUYi(^Br~jEsjD zbWAigH9`JyW;Yi)TSFxT9|s`)_uBJG(Qg2-(gS;Ne`u1Gj;&4Lc*9op+Y@sKmowxr z*y%(O^GGl^i>`5on|o^8BXP)`$Wj)114h)=QRy#s#oWskbaX^NOeijF zM3c$oK7)f~m#e+`5Bl60N+ToQeX!W(g7R#4m5;uA+EC$$!7OZydm=2m;n8<8uD!C6 z=ZX;xsqM^@H8Gp6W!19-KSnQux-bo>4^7-Pv{brq#3fMO%vm zy1(<;@Z+xh2Vt4i^W;qs4@5|O2dQdZXr^_5fr0g$>jetRb;hqZG3S0t+sgGjNLFn@Am9SYOzM9sN6G}Z&cK;x;J45)CM$?=o4OP0(v^>B4+5DR zc95`yOjErhliKviVx-K|HtoXhO)-oa@XWc&cKLnL*I4UWKZ*EG9>r-H;fhulrDlqVXwJG;ggZpcauMYN%H+^5{7fMK_Fi+ z!mGSW7^|G-6mtvj{E8*>*M=>He2O2qMeTizG|HzJgJz1hhP|kWztXOlUsF+#xMgG> zS@eg*QnjnG_RYd)=zRV^HlNp;+`5Iu`Ndz%MRGvFhO}z?F(#DgneMah}0Aqgz{|3<=aO)YF`e7oXcMH z9U7b5-lak-X;`WZ0+5@+c$W;nkr2f;$Tns%n zuue#J)?Tk7W{+1368mSX)3YExYS|8ZbZ%4Edm`vd4ewK8wfn0ypaa>U)mO@dCYe|Z|wO!Dl&HUTfbtO zLxg=!6xxG$A(G8z^6xKv5sM47=-mo&Si$F&LG!8187qfp-Ai3w;LJeu?S28PGhjo XqjOtQOFNO!w+dhbf)5G~oWA}ie4f%Y diff --git a/a02392.html b/a02392.html deleted file mode 100644 index 7e0648162..000000000 --- a/a02392.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ReceiveTimeoutError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ReceiveTimeoutError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ReceiveTimeoutError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
for Microchip PHY protocol, timeout on receipt waiting for master
-
- - - - diff --git a/a02392.png b/a02392.png deleted file mode 100644 index d5d96887812853d2b48f98947aeff922c530309f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1359 zcmeAS@N?(olHy`uVBq!ia0y~yU=#qdJ2;quq{K9ry+BGjz$e7@|Ns9$=8HF9OZyKk zw=mEwkeGhv#eo9{fa1ZEF0TN}ah3%61v3EoU|`NP`w9aC%PmhA$B+ufw{s)Q9$WFa z=szsxc~gJ%{51zLQ|t4cm+uCwQkwaQA#TzI{iRbT<%u7?Yik?NdE{;=GPdVQ@pGpLX=0Kdi4=T>f9PKBK+odD5Jsy`tq) zr|jJQe}er~=Vf2lPqDJm4tw{`{)zw734A9wUe0H`l(u(k;6Gc1;Gn$|oc~oRJpO3$ zh7u;m z8=wBpb7@${!qg#WGsy$UFMY%i!pRb#D&R2HfgzNMk#f#{wi9p5b}zks^z0cOP$-=V zLB{{tJq(R+e^^{oWoq~Ks8>hp0)Wl-_8F_+Vp&Vujl*r z%Wkvd$|oBb-~Mhn!Rm6Rn)CZAscm_&y{8te-k247CggRa*zrdebD})6Po0`EGxw*| z1imv#QMLObT(_;d!W8YeDakilIL78}YjClLZ9hY70723Z{wmhY{ z+P~cV=;DHX{2tyHb{UvX__k0&J@o(UH&OiQ@iT8l*hPPyI8%Fm+vanMe^t($`BuZ& zG1D~m&9yUcT~;g%HOAFNFrJ zMut@^Oq6r#cqasTd2a6(5}Y`1J&TawDrC&<@J-9+)bjAhm%UT^U-Q4TQ%X90TKw|$ zhc$nm&uF*ZFMPsrZ%4<}er^8z_!sY^u6lQ0Yw&q8Z^?Xq=hx{M1MK$8=@Cfwzuv`HYc#+iof9GiGK!;rRiK zdA7p3Sz>R^XK(9Su(PDN{Y~yy@rDy|la$Nm*zgs3od2fLo^!}LqT^_bo{S{t52Xpy za!coj=;>zq@67(U-f@fExqU`kH!kbC_V0~$@Zp%+RIN7G!?TK}TP~TuovE{9**ZU$ zBe(zP&UJIybMm&sE@oN5k9PkjI*3)8DLu;lXI$>#a>V`>a%h9t?4a1V{@UJSVdEYd T#%F@SqL0DT)z4*}Q$iB}h_r6j diff --git a/a02396.html b/a02396.html deleted file mode 100644 index 72714a6ba..000000000 --- a/a02396.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.CommunicationError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.CommunicationError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.CommunicationError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Communication with device failed. Same as in hardware dependent modules.
-
- - - - diff --git a/a02396.png b/a02396.png deleted file mode 100644 index 7d1265230d49196bcc180f1cf0e8a6024311c5b8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1279 zcmeAS@N?(olHy`uVBq!ia0y~yVB`U^J2;quq$-Q*Z6GBb;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6rOVUBF{Fa=?cA4Ts||Qs zj!!OD+WTKP{=fs)jjHCkm&#Tw7f_adxmoqUtCyzdPbVYe$;Z46SPq}j@dA^tq7$D? z%1zt0`r+H(Vb7}*XUvp+z4rGPS%YP_cd&laJGtHD&gaixR=+eh{w=pRHT_AA|>t@1xRKk#5A$5h6ZQO+|xZMz+=2w15B=9bOXBbGAo1p0&513 zCdLKX-*;zluraJL*&x7skfA|gp#Tp6gd3vR?t{^NV5mvg=d$d1@AvoCpIzKd zD&I@k7Q0xw8=k$BcHr9D%^Dxe#S%l5Zj0G(@oG&j?+VPmxrWQrEw=HZV`S@<>+KIh z4OaQFI{2)~)!uRS@;vLMX;YSDxlXFC5^#I(!n-bZC9_2L^o{Qsj+M=Nv-|QA&XZe& zJm0+(lrZ%_f9Xj=`WpY4pLw_*>+kqnYA{RpddkDXjTS2;YZcs0m1WMyR=B^b;q8g) zxXr5RcZFGzJ>=i^iB~1h`As(3VL5M_No0@z-A>cR{7ov`OSzg;a;Gm-Ioba8%98bE z&lM$NnI=DZ{pHLO{qpC65(|4KKI#5)WXbyS=NnBFPsZy2<7HA0Fp3mTu3$X&wrn@; zqf>LK%2V!>cVngWfp(XF2c?Yi?<=?szVWpE`x#nS)$wZP--z3H@2=OJk>@*~A1GnknqZaVfnC$P-z={$Db6Tc3g zuDQH^S^gi$>a3jT4oUu|PPY}+ap`|?wH zvgET_fkhjx3iizN+$_5OV1%9YZ@z?_B_|&noC^OIY0tKJTJL5P%Nvr}=I4zydg_^u zP3=T#xbkACH)rWC!ub#7P1r(5%y1GTev+jC8hTJ_v$+n;>< z*mMhP-%}5sRYYA%F?@G^J@U1My*6_o%i Psu(<7{an^LB{Ts5vj0_= diff --git a/a02400.html b/a02400.html deleted file mode 100644 index a64d8f29a..000000000 --- a/a02400.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.TimeOutError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.TimeOutError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.TimeOutError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Timed out while waiting for response. Number of bytes received is 0.
-
- - - - diff --git a/a02400.png b/a02400.png deleted file mode 100644 index 92b9ed49ab265bb48e537b7e0e9fa5e4d176cda7..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1160 zcmeAS@N?(olHy`uVBq!ia0vp^Pl33DgBeKb*WOtGq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)WaL!>&lJx8@qRExjuDXvY$hd<+D>lnwj46l(cP%AY$Qbjo`xMw0l=? zRQvbnFG)#z_j;Sjt~o~cmic=Bo|TulXZiCV%Wln>S-<}EccZ1Lk4|hqutxvtu`_>) z?-uAipL^2v_XeE1`uxbwKlYlzWo21!zAVmu^WWp- znLW#QUoY`WdzSr$2S{2!opR=k*%J_964WNpRLXeZY!zcerESxvuT@OXlr`K>uqW6x zU&_{Dh?p46)WB=0%5Y->35=M9i4ts|4>`D`#Q1r-q&R~Kbxmf$i*3ig?bNn?ds9%* z)M^v|V|l^A)t78;zKM)=zPV9ZDXSzwX7~175mmv93$spH>L~s@&l4P+6L0lcH?zu5 ztWw`Q;qn4iv9AwO_W^@u*>>JZwdJR>ipyCydd|E%|8BQ)iBaBNt!|#MNR!1(6ZhR} z4U4>4t}dPFE&7i4R9D&4>{_P!{QE0ieqk|Vr%w2HDSmO5cbzi=O?b!9LIPuQ54%@FTC!<_a-1jefbEC7v#LDR2 z+kV+q-$N?6pUU)UHeGg>u{AyVZK?6SNkJQ?x8B10wc;S`>RIwjYnJWz2bYiDd+aJg?G+H^cHQIo*y`E zapjbabN9wr7tT4eYfa9(RQ1L87KH3xXSAnY!TR|ozKHiR@2u|}37D**?-w*}(~@$N z!_$l`r?)%}{~efSv1()G2CZA($HMHn3eP?NldBVF@_bX<&A)N$_IoKQ?Z2oxxvS&L z7T=!-)8ky8^!(#{x=Nw5 - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.BadOpcodeError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.BadOpcodeError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.BadOpcodeError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Opcode is not supported by the device
-
- - - - diff --git a/a02404.png b/a02404.png deleted file mode 100644 index 2063794351374c4d8620de9d04e8b1f53f87cddc..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1201 zcmeAS@N?(olHy`uVBq!ia0vp^zks-dgBeKvyuo%9NJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIgf@pN$vsbG9N_jTWD1D+Q3 z;FaHg+ka$a+Uc}F^tRm9d#PM1=bjeld=^)1NeJdpQWAUmLP_b`6Az>2#Rx^-EkuR z)#9D|=4F0zf7)?QTS=*YW&g9PR=K;0EViHD%Kp<|ygv1v)4KlxRXpz;Tj$rG;`(n4 zw9oz5qgQ=;N}og}-NXfdPLhdrIWh}OsC^M|GSFoBF>fA2LU7r|`Tm>VlwDLWTK%T& z;@(5d4Yrn63=xwTGdGx$z&IfOrNTzetd-p}YRcltOMqHEqb{F*(Wp{xvUPpz$CoGi zRIKOTY=7CWQvLMV&1WaNRILB<{yG2>mC(QY+lzKU2 z&&69jme1=~;JYOg!hi2s^u4ZaKXcjNS6EkW-MYI;;iMb;i_XlupN;$_Pgie0rF1b& z?CuJOY2o_=gs(h)tFrjgCJW|CKcyCg>t!&!+Vk$)1<9wnCGQdv_I(SOwS4j0B{BXl z1G`kDW1ZJeKcn$fljp*A+poFIU;Z}O-}4jvpyI4NDW`-@`Ta@C=L^CfUViXs z@uWc!nil@9*EJ^et4H}l{x>0^*0BmJe4lNfn-;3Oo+&o8bVbj;Um809wQt4KCzcqHcx-N;H=}<2f6#6uFaTzKkAFgmfnp;r*5sf@gz%*J)}jnDkNQn?Cy_=~CBQVmw?tyi7XSbu4!bMv#+ zJHPI{_w~K$o1GPNmE8konlXR5#Von>+iS&N+j8!kIo#*}G5zA_8ENaZUs&Ef&s10N zD)*`V`PQ^Qfgv##U#+f(nws1?|CQ;lg~9HW+o!+Y>RudkzchGzf+UarlV6%u>*}B0 zTwYqF*{i(-8jruT<}ll_=Wb5;w=RC=huC%3TiWk`{j9%Y)hp{=sh6tNZn~})@(=xL x_xJgW+@%4bd%gevUb%YJzdeY61!uXH^>=?Jeh4WDNCXxx44$rjF6*2UngB~?NX!5L diff --git a/a02408.html b/a02408.html deleted file mode 100644 index b690e5f44..000000000 --- a/a02408.html +++ /dev/null @@ -1,124 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ExecutionError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ExecutionError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ExecutionError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
chip was in a state where it could not execute the command, response
-status byte indicates command execution error (status byte = 0x0F)
-
- - - - diff --git a/a02408.png b/a02408.png deleted file mode 100644 index 052c7a5192ef46bda4d547c7451bc1f0a5dec0d5..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1170 zcmeAS@N?(olHy`uVBq!ia0vp^?|`_2gBeI(pQ|1Yq@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)f&d* z_iw_1`#su9m#(KzeyzOYbn3lhJ1&0|T9&;heqNWI;6(G6#=E7B&6t*Y3us1PR9E^W zSG%I@`d)9t6%S^6bad=-mtS?4%e?J?L0+2Gt(5E?uLDaLm;JZM^SN{Gq|N^+>YwKy z6BV?)ynfB=9ZE{_7ZO0^^v7Kt5mQ0L)fQ8-bb}$2Y*muNQ zV%_{R3<=?V+zeq)cQ7P`lEC;-W-Hf!+~QEPiu=UJla_>9>Ul<86)#}+l*@P(AAfYW zvGt^!l2rL+_LFj^?oOX=tUW2U+BENYpNe#>g#P;eT&|c&dzOop^M*wH3!kww`{n&O zz3D4{+C?q7dv;-8^R@+7nz#R)wtP{3ot1-Cx%&ET`_?IVJiGQlt?%mj)SQ{i-KU>Y z5)2bNyTW1G+SrWg8*0lZ1!hJb+1nnS_N{c^p%^6ssxac|A!H*+m`ey+Um^TIGTQ{Bn@*IyL<(ycvj95eS!W=`u)9)K;sD{SOw5Lc}Nhb)`|LS`x?6EchH?*-#&_j zhT2}e$a4K~TyF9gSI?88p1r)dbdyKRR99oI6~Jg( z@!@yU*JjRb8P`=bCy3^??w!43-Q{Bwk7=yG)Z) - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.UnimplementedError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.UnimplementedError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.UnimplementedError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Function or some element of it hasn't been implemented yet
-
- - - - diff --git a/a02412.png b/a02412.png deleted file mode 100644 index a74491da7aff0400a62b0961434fab2919314f47..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1285 zcmeAS@N?(olHy`uVBq!ia0y~yVB`j}J2;qu%E@SQ8PB3T7|;yDM6E#HKnAf@w)09Idn$H3rxO>jy!Yo z)|s5}!?*i&&wbxyU~GL&z5JzmgwOOs<}=kP`<6Vky6^8FI(z2L?JtynC-Jr1yj|m& zR=W1qnKS#G=bscmy(-;-cP8KDnK#Q{82?<9X!!Z(YMrjb(YGJ_Z;U8<-dgiVV9x6c2q9aZ~CeZ!lG3#Wyk3ar6VObNqrYsV*~H>73kx&#@>SJg-A;mkmd=Qtp=>NV0bOc6Mb_ zO9~fAGBGgei;f%LH&>hZbBC8p*B_jtpB(shyB1Tw@KMKo8GkKKiQnCMr=mRN-1H3^ znmgk9a-1!>(&|6ezm1sr@QuvL=GD!ay%V>7UTImoFJrF4N#D7f6e3?umGu0yFK*VC zv(N4%U1ZVs+~>dE=T~0wyA3alBs}+d>ihgED}HyB!}DKUXKTcSlqnG%te$SXI&%HT zou#-LYU2DECLCdM2%YbLP=K2u!(@Q~&qjs@g^55;hY&ZA35o==m_G`2g1kIuaZTF2 z+e8FtNcne=QRUxPaO-@t;sHhHJFzQ||6N}Fsc!Le-_^&@`yRbp>;FEf@aUe``&h)@ zy>ryxP*83klDN^q`*Oadt(ouJ*QZ|^W$&3^{iHTd)r<%epCbdIcyAvL#0yivK{dNDgrDqDt`koxT zdT`4z56)w6YcI}KzWF}Qr@XJ^=c3Y`X%F8mohSd{-MjTK{`>t>b(7tg(RBUp-`Zc- zBU(ycz58eOxA^y=yMNz%0?UxQwxE*au5DJr#2~Lr5&xKtURS9bt3TKSEU*|nUHx3v IIVCg!04UpJIsgCw diff --git a/a02416.html b/a02416.html deleted file mode 100644 index 590ff048e..000000000 --- a/a02416.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.AssertionFailure Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.AssertionFailure Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.AssertionFailure:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Code failed run-time consistency check
-
- - - - diff --git a/a02416.png b/a02416.png deleted file mode 100644 index c1fe815e4eaac0f16b0a3387308bcf0e30c52b7a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1186 zcmeAS@N?(olHy`uVBq!ia0vp^-+;J-gBeIZe)7y4NJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIg<^>lFzsbG9N_vNI=3Op^d z{X&;~uYa_)m-*0xp^9wBS=Xk0gx}3$n|HIyFT@q_?JHBbI@UI1v&YMS{ z+|Ly4lH$LATN%)fJ37m6C@JkbKSS= z&pn-Jx<9>p({0l)l^3)v-afcq0}Pwl``I#nzq@kv+B>!;6=~j$+~;4tH)=n7|Kj3} z8cTXz&9x?ednJBL<$(jy;$+eYJ$yFZLVy^}n_;zbTybes}VuIVra~RHWx7UH@D%?Fswty=y-_|9QW6 z|ATYZ8+;GVxLj1Tg8y9E>rWSNzN=%Ao}gU*Pjt7Kqx6$aF}lZYel6P0Q`)xKD~@gU z{I>8(`+NNFzC2&X?RY6pyly*xow?^H`7hy<_Z^*E{N~w$iBEoiF`vBe_}t((>o!by zGW(18$B;sS$R>n z;^&@L&aOKzmbyKA&F2N-1-A~a|2a+nvRQrUjctpoEM)HKD%58dYg<5eWzx&~G@$C_^W&0nbeenBzVujANcBjeLvOmAroAEBz zLaJ)>?7w;Ohvd%9-~5{E+bhRrTZuifXP#xwzE^h1HpjZ6BlfY;k#)y^>zw2-tB!tn z{&T%`U9r5{M~3P-PjXvdpWk-yp1)i1oNwpLqz^9MY|9rIbT?-CZo@;{G%u-EuAN+V zp1XGK(#l0e+qJJqp3|z7yz?u>E#$xZ)Eb*TE1%qSPR>-j@&B%wU_fZ?VmqUit6ue+ z9LwXIwd&RHFY?LxtLChFb^D9``)#XUg==pJ4c)5&A~Fv7X{wh0V*cD6GtpSmZyB&O OVeoYIb6Mw<&;$S;n^j8y diff --git a/a02420.html b/a02420.html deleted file mode 100644 index 0d5b34da3..000000000 --- a/a02420.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.TransmissionError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.TransmissionError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.TransmissionError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Failed to write
-
- - - - diff --git a/a02420.png b/a02420.png deleted file mode 100644 index 6dd64e49b28adaa0c343d2bbd9cd8e34ede45d77..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1192 zcmaixeK6a19LK*uKb6QzEUD%p@d6H_TW6_l-7iHn;N4w4fFKlT8AS< z6M8e^MkOM}8s{d2RO?DS^oFQX4`nq^u?Cs0oo2u8cDLJZcl-SD`Mf_5e|+x!DhUk< zGQl0g0RT*x!SrwdAXI{4ER1G<${-6Z)}bFpGW2>qD%ZAj85IK}in~jiRn6#{QmI7e z5ml37bZ7ikct`|5`#;0WpmquXLr*3>ATkru)M>h8RP42rD>2t!^)EM`-Hj*7vy)>} z<5NXR1Y=)=*9@%vIg7&L;#hBhSpszW*2V`Q;hs6(d+Nnr2}gSxI5^~<;g>8Pau+s7 z*~;we2Qs;jc4Ix99d<6~dcz6z56mWAiuplr2JyK)7~(HpVJ&H-WIEkXn!1nRXx9>O zG;X>ZKJU14!q9CG5yEDZie2-Yd8&401!RWzo{*VR0OmOb;CVm)1Z)u44F7#Ao`$uz zvH-pkOK`3_1GLv%F_?zRv~$jEJH#sh{S+wg*Z_2g`Zbac06W?g0OAM)kWah;=pbSM zsDAeEqvuUU@m9pQVCJjKl)At33(H z@;T$3nY!M&ogZ+8g!8s=Fz*9~Ce>T`Qmc_(dmkx6fx-+(}$89Nt)i z#kAxB@uouChXc0^Dw4ASLnw)kFNjPz;sorNF8ZzlL z6q3iweT{f|BZ)h>&*BP5-7ln4r;cMn`Q)z%6!#x?RS5Pr?Dyt zS;B?ry|bJ)C@}`lTxjyLP)ydfI?<~9T~Hb}fH|wivaO2lc7UZY1qw$BXDZ6x?l5JS zEs~*K&}&Qu|HtcSgam7SQ=v6#MuqD`t!DC-43EzI=Xf3 zr>frqIndfni-b(|>~nE@SThVP!sB1Z4b&E`YIRR@O227qWT=o)>OW9r`dMpc?rYV8 z^qhh$hJjld?Lk1%SIcrah#dZzRVp1}iQU#zKEV zE4l5V>LG=a68*@c6r-(Vd2~bPle>yN;>u8Y&U(OR zYInxRPq$nvoh^j|{%DFZ-z6*DKv$J=M7% - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.ZoneNotLockedError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.ZoneNotLockedError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.ZoneNotLockedError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
required zone was not locked
-
- - - - diff --git a/a02424.png b/a02424.png deleted file mode 100644 index 90f249614d06eafa89df81a41ffe68406ef24809..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1374 zcmeAS@N?(olHy`uVBq!ia0y~yU=#$hJ2;qu3f*F8(FfeDDeT9L6<)x>KV@L(#+qrM2EwPevxwv`#H=DTY&Dyn}_=RR_z3#O7^j%oe z_{oFl;{Vs{vj3GSy?a;vuWzP`V7a&|5Z4L=tvqktxns8m5`N*fWJ=JbuM9u9;u$Y_ zvLxKTo~^_vr7F1KDzAqUW|sis`I68J)eCz^UL3=o``QAwTa2gXU;C0cU-#8H1~VF^y+)_ z{c3NOM2jV+ZF?{5GHt1!w`5zsaMEiPL2j1L7geI0!~Qmh%`CK;tGc2$C$4wq&1wEZ zf<~)LGta(Qc8&Gw%+e`qBCcNJ3JX4!PH*&%azI#qn6zc-+X3Co!+rf-T$|rUKNz9&7OAd?D6b#vn+o+Ecs=%sN2B! z_Gd|@w6M~m7~{?Ae-}H(+s{q!^az?gbMHBO$uGQ@D<^q`-#>FE?uk6lufCTyb4}CI z>bFkrnAtfA3Fo=!O+T#~%ipm6gQ&t>7lv)Md)0&%1PU=m-EB}2TAlOSq zQa_dgV_iwfYCh+^+7AVf+g+5D_+mSKUYz=1{&k-@@7vF3ADaBCvvt#{UUEp@`s(*f z&{+Q*lCJBY>Zv5gA$0Mpmf+f7 z?3@!y4{YkY>T>P;)E#wA!hh2?o_;N$aCO__T$Z}L42vDxb%DGHuk zC-yJI{Z{qcE9ISQUR;Z<>O1l0#=f@=9<0`4SIbeSxNf#H&3Ord0Cs@>}Zg=BG_6T;$HUR?S8Jc;J-P6{SbFVdQ&MBb@07;UImjD0& diff --git a/a02428.html b/a02428.html deleted file mode 100644 index 56bdc28a0..000000000 --- a/a02428.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.NoDevicesFoundError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.NoDevicesFoundError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.NoDevicesFoundError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
For protocols that support device discovery (kit protocol), no devices were found
-
- - - - diff --git a/a02428.png b/a02428.png deleted file mode 100644 index 77ae686aae4344e9cd336eb38c37194c111bdf1d..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1433 zcmb_cYgkeT7(P^MmAdkA*|ba}tWma^hs=l`tzm+qG<20>Sz3p%yetiunpo{ZWh&~- z19_=X%WYbMmm<7Wla>c8j7$uet~65dX%0|H*;#wGKmFXkAK&f$^FH7EKHr%gVL=WH zTo(WU;6SC2832HBL3`f3*=T-#Iw=h;OLx#B0&O-M+P)ky9m~5@?dOe8{^$bovaPKR z-G>)+Uq!L`sf@620G;2)##zG00Pr4;O5Pgr6=t-wpYwyC{am^GP(-?IwQkP5r@Q^w zz6teAtq_04v61xj_n2V3C%&?1_J^SO9`fS~MF|`zaskCWLLB7GhY$p-+YjNVA*edq z*kU~|`#A^hEm^qxei8wUsXZ4L>EBryUE67y+@*#fv+#C`!ix#PRt_FARmX#%HBcAD zdb0S2A)a(hg&aC>+^0y?N%yNDSB})D%w=_(=qG%q7lRPQ$_(>m zcOYKazu067P&!>6?-Kh2`kT6Qc3!`o2gWZS0%o_vPCz^d#6$N~(H0s@XGh*kU-FtZqD3#twXstiCO&a>cgK7_+#6%+mp5!>Mrn*@MI$xCIOe2b(67k2>Tk^3ImwQx(y!6*e&a!ZrFXFae zfp$(GoM}~BHH0R8qVmEw!xqn2CTO*bUVdxxuzQPXqpe0$+j^?Eyjq;ss7qY6f*QA+ zAPzlVsv^;3pI;7fy79{)?5*mv5!|VhA8dv$DxD*OcGgh}loQ{=9S`?sC4?FnBd5&v zo0)4g{*P!2^-5LmE2Pm9k7FY#kS50rKN(BjH&}dB@9XU}RyCelqs3iYmM>aQFX^?I zWm>{+P!0~yY#%P;dX&cag#U!Z59Qh+6-tTNRSg@TCk+yVhn65C2W44bFt=M@*CUBm zCOu`WU)L+y679xm(x%$A2*YAn8Y)G_3sO)t{`!|O1ugC2r86{QR|(r!hLh#8h|`x+ z%e=eQTdC=e^wgDtNMEVLU)YC8wqTPm;guqzNyuvZ$bl@c?sHnlWJ1b1B$EbEe)du#KI{R`G}8zXS_DB7xhLwsD6PvU9sPi z;X{cV^fru|2$1V%?Gt;_`6sUo>WY`>{k3m|cTD+kjAu zeAA(?$pLvRWitog2m3Okgpac0z&-Ob?$cylaw+>dbh(G9J0!0t+|ZrS6nA3=1FB!u zaP-Y>_OEDbk4Lb!of};+>_g&4%HX@P(`B%X(6g51Bq;|%diwOlOS11WSl#C2J&Vjk zQt=_J7c)lvwXrNz&6ean>w$L$By?ykbf@2pGd@|O@HERVCn4$^sdacFNoaT=kXp}8 z - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.HealthTestError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.HealthTestError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.HealthTestError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Random number generator health test error
-
- - - - diff --git a/a02432.png b/a02432.png deleted file mode 100644 index 3cbb0b9300e54ed2aeb532cebe23cd22ff335cbd..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1197 zcmeAS@N?(olHy`uVBq!ia0vp^pMbc7gBeJ^;&(FyQqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#LVAJY5_^Dj46+eOR_efv2VY zX0ci2fAxJ@T#h2!*Y1AHyQOEBfI_^_2Yn}wh5Cve9bc9->L@*mWsYsQIFT8_${XV)9=`&hw!+15^fzt8-R6Su#t+%B`(+-YgFz{ay* zIy?4w%ddX=Rd$($2;+)Hib|jKYS&ETej>s4{KU-HFH);r;`-N%XWe8h@_BTu(>DH1 z=imFv-5qmYPA`)?p`;`q+zur7FF?3M?TLWX3onKb)>TXn@vr!Q{(RH7)BZ{44)bSx z6OVWDGW;{0z<6Lcn-N3Bbq6+v_fjVq9>g+BGVIA#U~VYqO=0-3u91h~9)_Y1inen7 z?(v73RjMyJsCfeQsl1Ghcj8m2T(GiUw#z@gOeON=DLbEfl}PRK^JeK`Dv>Yhp0vq& zhV3$lYwOSDG4kBEO8JRtLgLT(#%Jr6)=S6a1%58x;*oFJZsT{0DcJAcwdlH;`+i<$ zytdQ2a(n5H28GPqj73S2wXx4`&#~PlD%QDa!-_Q4OWUdz$9~#&*VFCVr6d2ib~@a* zjJuY*wLEpo_H~C29JtdbQ0AZhZb_71YJ%&fZP`zXR`(<24x*#f`TVB^R zhu>QI&X!QSlEt@QX8k>{9W(bv=BA%4Ih}hY<97vLFXD7G+J5?d(c|47lk6{S7u$Pq zuJ)5f8$3SQ)uvyxzO&O|9iQN&J)ZX?zKE6U3C~uk%~Y7Y1Q^znzO3W?`LV)gmk`6B zzIhB6rvGxTv)i5gj=xgrUGGlkCxuDO4fVLA1Yf+>cqq19m@W_!3XH9=(68$n*Q|OK ztFJI$(&z8%fSO-HZ*F}nTw%1~_nPJFSIsi(mn&JlDzjYC{7p!x_SW8b2fLWZOAn+! zF*O6mR{Hr^@Bd~y?ksxtJY!30><0guxq)l!IDp7R~ckn zxKp-$ipoZ%)xEj*`6|Otmt9#`+!Zq^onOt?|GQ0wWo(|M~mU5a-* z_q1l}jo$5h?DN(Y*V*rn)%aFawIfz(_E8_jE!{f;Pp5u~+FBzsZ*!EL=No^+$f9^%uu3Kk6afPdw&C0Q3j83|JO2=H!%+_M#^oy&ed2hP>{*zvMNNE10XtB`H z+Q{Q4ToYHWy0_fEYmfCspz!7R+S996<(WJYD@<);T3K0RRUCK(zn> diff --git a/a02436.html b/a02436.html deleted file mode 100644 index e0859ff60..000000000 --- a/a02436.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.LibraryMemoryError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.LibraryMemoryError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.LibraryMemoryError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
CryptoAuthLib was unable to allocate memory
-
- - - - diff --git a/a02436.png b/a02436.png deleted file mode 100644 index 327c2574bef73e84a984619bdcf1fd7a4ee7b370..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1366 zcmeAS@N?(olHy`uVBq!ia0y~yVB`a`J2;quq~gb~&w!M4fKQ0)|NsAi%olIImi8Z7 zZegHVATj;SivtG^0L6nRU0wl{<17jC3uXZF!N8np_7w&OmWQ4$jv*C{Z|A<9w8=`K z#X5JY@%Q?p?mu6#FujnAU0Xi;ZJdBw;xk40`amzuZ#4^CTy8v0lo3>vba(MMCMYwnRy(?znuEwUmtVBKsa^)9-92;}09^ zF6Cb%``@CkFiGZ(&iDGS=RWyA?&!GjIs6IC9rv4oRz5cC>zDwvTjg;F$4Lt%r(F*< zmWotcF+7m2VP&{&!I1Fw^;Mf5W(KQ$7Y+CyGc>H@Wo}53VNiL@pdiW4aMFUo;~1lZ z5g)^(LWT)F`sh6V7>`SG{ErnhCD}bsT6lOJa}4?=Z^7kRRlEo%_HbE&qR2v(jF6Z*J8c5ywfp?T&7|VtLi@OYHgP zdn-F5I7|d*hqbQRT6;0eNoM(Gma7x5mMfm@lRtDZAyV|}I^o%S%pAS4n>$*A*6+D` zHO}hvt&KiwZ>j8jonE*lbH$!t*|HC2e7~B?DYvup&hE9gcPo@70E}Jj;{3J#3Wc^KGfEw{lnp8MpN>B5WlEZ~NWAwh2FdQ)d z!Nstxkm10s>#Hjz*cnP{7AMLbV`PYxW}{XNBa+O^=z=LhUAFQXGiQFQkZ@1)IyQ0U zq{5VCDKaxPZ5xvHAC%QsnZ(&1{c5rArMYqO`OlA!-?Pn=n>n+(PPDH*xJskm*7mUB z-d~O~GiSDo^>s!|{#%yxetX;R&xaqH{Hn8c(^>2s+1s0zk^6Y({)geE>sPIkll59X zJ*hSMWp-Wh@&!x(Z+xw`;vg`_O=sU*T6w|RRFJz-E$Q;Alxw&4tvG7vuDQ#z@Sj;} zyz;BO65AEmV)F`2BEnqPKKs1ulJA6jn;fU8F1@;Pds)a_ll{LfuD!f+@$)Ui{@c0V ztu3OowAQEY?M|+H`|TcM-@lZVR_nSVc_-|=b|z@$=iJr*$jUz^6soDxEs4p{x45o>Fd9aYu(wik6XR{yER!p*7)FW)^}$P{cm^9&arh9)4C}l4&`2F#=bKdHBKd$<+y4Lo?>MhT%zn^mDP0`&Zvutkote_3Y`j#u fFUV`-^2hcvy!8U-yEv4AB_M;RtDnm{r-UW|K1h1X diff --git a/a02440.html b/a02440.html deleted file mode 100644 index 37299ac9e..000000000 --- a/a02440.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.NoUseFlagError Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.NoUseFlagError Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.NoUseFlagError:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Indication that no dk pk flag is available to perform
-
- - - - diff --git a/a02440.png b/a02440.png deleted file mode 100644 index 3f848cc8dc8c21cf17da074373c77c8b1d5c2003..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1213 zcmeAS@N?(olHy`uVBq!ia0vp^UxB!TgBeJ2T#oesQqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#LVQJY5_^Dj46+eOnC!aa;*Z;jC_mB6A zl9Kzc)mxjRT%N@JTp}j;lbdyGM+ZNc@V%nB^ocLS2lpzb2J4+m>g;Tjb}yN?KsM?3 zl0G>;hB%Qc3=fZgH{88U z<>rescE0s0H&^lO&*@v^vFV!n3U-j_k&3!I+YPU%R7TdmGR?{S7e6!3`SXu&1$Mes zvHD__>%AXLpT6zJ75)6rXUo&xlwMb~E?d54o83AEk1+S?R*%=bI~RQ8$=kVF-8@l| zCi$wD5GeR#LDiR{Mzbzv*^iJ zJDg(IhiT-zVZSol`t6N|UGpCve>a0ieP)?br0nu5OQ)SPs@ZV;_r1D#f6o3Ezf;M) z^`uy^=Hn*0E2VEgu2?sFef&|wqUZK2y?<|3JhytP*`A7d^}0?oAFgSCKK-nF;^_}( ze_WZnZCy6Uq-Q%m?3Jt0_xxo4Wwq!1hvzIyLsL|K+Wk$tw0%dh*WE87lWHc{8NRH( zvva~jm7l5L@B;Fvu<6r3YaW_MC<}PqZ!ApyPv+=f5?1WyqswB&#e6YC6CY9 z+-45Fy6>K=?S|mcTobdn8oR}IvtHeq=(M*@{p^43%QC0_Y@RE&cb$0mp6jXyQiX3# z-~RKNwehxt>-^TdejXnJ4;nTXm@TYs+of?9*4|#`YS+qOW=}UupUw z$8#}@%_0-El4342?^?%fvFdeR%eUR%yLZ_w)yqBiuA)uEqu@V-L&Lt=}#05qkCiHFveYFaOlOT6H2M^!{@HpxZnFp|&B@ ztFG$-`OEs>eVuh;)hcJ%lpU*HiEFP24XxDx5gCj8G*$C|vFBZhy7@-%!%<*C!{F)a K=d#Wzp$Pyq=Tmk7 diff --git a/a02444.html b/a02444.html deleted file mode 100644 index f786a1522..000000000 --- a/a02444.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.LibraryNotInitialized Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.LibraryNotInitialized Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.LibraryNotInitialized:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
Indication that library or context was not initialized prior to an API call
-
- - - - diff --git a/a02444.png b/a02444.png deleted file mode 100644 index 2ddf294bf6bc511c9c1e245b9a0f1bc93395b8c8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1281 zcmeAS@N?(olHy`uVBq!ia0y~yVB`d{J2;qu(#kj0^aB4tp8lLe)cK>r;3&zqMA!pX4iY9r5OoxPBhr8Fj0WhnERKf z&`y`xGi7hx`MuKo^J0}VXU@HCmj1%5GVS!^r_cXR)X&`a?Dx}^na0MyIe#CScfws^ z{nnUCk*k-TJ@bbBjdE#H?PFH|2bUa;jDIu!_L$3|Vl;QZ=OVrGEvEkjI=3d-1*-px z7y79(r^Z_D|E>Jv|Gf^Kd2_;Ueyc}E%S_h4VnS(Y^G(4H5dyhs!Aut~&67b)4gI&p z8BVw?V*IEoqQtl$i%k(kO||G?X#hE!!BI(3h@r{FNri!>v&Dmf1E`rnKt)K2QNcsS zg~?%p2R4OA-YXgUUIqri438i;ped6;rl>UEQ=8~flu-Qp*3|cXe>^sA*8Xqu-(%DE zTYo-Seo{KA{5wuay-wxk&DPJCY`Htt&>JqZ=V#%6v+0~Z|H>rQSKjn4v<=%Rw zx%o;L-)wpIWUhF}WGlh&!Z7t+`h^j#od>CN~}CS?FU69G*HuoE}Qsn%A{FDP7Lze^t1iRJH29{o#p(%_%HarK;1*e z^32=p@O{;sFL%~=yna`gvU9gptKjb~e1~!;-*tI(@7cE)V7eYe@YasJ${$J3tXeGtp9%(}I$^zAnn-|RV$rUeLZ zTe5Y28gI~SxxQ*4)1;m8`Lo;ps#Z)n%HE$BQj~wyU&J#f?yB_?ixVs7E0^?LyD*W% zl%KFD`-QDxbMOei~{d?HFJ*OszzwL6{f5cemZq9AJ>OPm7O|iE* zJ3qe6V9F2t9y?v-)D^`m!Ya2Om)BYOeLJ$RB3^z@^T&C2thqJgCQ9VIyZcP`T4&m< z$FVYk@>e=%e2koHu}tjM;TbM#q^GNBeQLG}LO>M-Ab?C)y=*u^5x$hKEL+ezvYdQf*z7@f3YtVFLy3G{PQiauww9Z^>bP0l+XkK D9OP3B diff --git a/a02448.html b/a02448.html deleted file mode 100644 index a93e0584f..000000000 --- a/a02448.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.exceptions.UnsupportedInterface Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
cryptoauthlib.exceptions.UnsupportedInterface Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.exceptions.UnsupportedInterface:
-
-
- - -cryptoauthlib.exceptions.CryptoError - -
-

Detailed Description

-
"The selected interface is not supported by the library
-
- - - - diff --git a/a02448.png b/a02448.png deleted file mode 100644 index 5785fdc4e76ef8e91a12b151eea3635c1d231623..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1378 zcmeAS@N?(olHy`uVBq!ia0y~yU=#wfJ2;quq)hUZ1|TIJ;1lBd|Nnm=^TnI5rTvGN zTNr2-NK8NT;=q9eK=I&7msbGgI7@>3f*F8(FfeDDeT9L6<*lcSV@L(#+qpN(9vKL* zdQUID^!I}HA=%u986C@;#A>GW&t?~i9~?^qWuJ9byFEZSoGsq({-?^W$MJa0V}RGswfOUCg@Uu5RL`oj9q zX7v%VZ7Q|0^Iv`ueQ2{XW$Q`LOX43p{o;krUFLS5^e-Phh}S$Rv6?#|@qQ^P+qM3p zk#YA=E!CMb-84_0G4b+DTNdbLWZcU>z2o-)`u0{_`2pvjY9uc{rc;2`jO86))wsOjhS~`>axzvyZya+6DuD_*8}s? z`rl>2r}rIL^r|Z_v3h~n6w%o1s)+5;>r<*;mg+dm|DAPXS7h(WrmGQKvu4&t?Ozdo z$>{f$=aJ7IJrCR3%eZcFw5FkHcjM1}8>QZ^y7cAO)@3=C%a7(-dhcr5`+k%CfwP7s zin?}(WL5vos_giyVijO?_H5|A#z|{iHwRRQpLA^5K4aOx=T~i~ztfz#eKJx4xL6nY z;f2o4&YEP&HH&ZG^R`m`EnKs=#QdAk_UbLub6(vJuzNRYcJ)bR!L-vcMH{A{kuI_i zS2O;+&1PTTulwyb-wWO!nJINUX4^Mu*6YbBzmG(+?AoYaZklUQt?rjrwsQ02nLk_q zlrDcga~_b9qrI_p?#!R1e-?Yi{k&FRIxQvbUlcsRgC@<)oHFT*540Hg#jJa~#o+0W SAO677kipZ{&t;ucLK6V50EFED diff --git a/a02452.html b/a02452.html deleted file mode 100644 index da0f7a246..000000000 --- a/a02452.html +++ /dev/null @@ -1,189 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface.ATCAIfaceType Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface.ATCAIfaceType Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface.ATCAIfaceType:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int ATCA_I2C_IFACE = 0
 
-int ATCA_SWI_IFACE = 1
 
-int ATCA_UART_IFACE = 2
 
-int ATCA_SPI_IFACE = 3
 
-int ATCA_HID_IFACE = 4
 
-int ATCA_KIT_IFACE = 5
 
-int ATCA_CUSTOM_IFACE = 6
 
-int ATCA_I2C_GPIO_IFACE = 7
 
-int ATCA_SWI_GPIO_IFACE = 8
 
-int ATCA_SPI_GPIO_IFACE = 9
 
-int ATCA_UNKNOWN_IFACE = 0xFE
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Interface Type Enumerations from atca_iface.h
-
-
- - - - diff --git a/a02452.png b/a02452.png deleted file mode 100644 index d4f9739ecd620cd7fe5cd27ff25687c30fbced4f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1057 zcmeAS@N?(olHy`uVBq!ia0vp^mw~v0gBeJAP0+g!q@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)V#~>v17~ce&gqeCruPDzc!V>(&D3isU*PI zsPaB@L;eI~#)eu;VTK#iNnremI=x9}GAFm-#gHO3C8ghBqN-n0K#+HfUH|&N!2IQv zLV_=?_E_ED@Ly0c_LaO5@7ubgB7EEDb#}an;|-2!(S2fe!}y-u+w+%C|1HaqmKUp> zf67Q~`7vYm6^~>-Pwjd9<#6QV>bpBrPnBIvTJrEK5#w7HgTHGB1EYW|w#+Rw9>nU&l;Vz%nk6kdP+cbC29F8D61_QNb# zbLH;M%MG@Q-8~h*Wa{nSXTO7&%?VuKB< zd7cd0dDF%JTK-M(?7Z;q@@}8pH=8=Yn%y%N{T*_Du>qy_zKgWpyw1^qoI8|HFk-V~kVK8yQTbad!u zM)J-4wMa~GqnfGr(>I+RHEZX1x*XXDCc>5pIL+{`XJ~(=!|bi_ - - - - - - -CryptoAuthLib: cryptoauthlib.iface.ATCAKitType Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface.ATCAKitType Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface.ATCAKitType:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - -

-Static Public Attributes

-int ATCA_KIT_AUTO_IFACE = 0
 
-int ATCA_KIT_I2C_IFACE = 1
 
-int ATCA_KIT_SWI_IFACE = 2
 
-int ATCA_KIT_SPI_IFACE = 3
 
-int ATCA_KIT_UNKNOWN_IFACE = 4
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Interface Type Enumerations for Kit devices
-
-
- - - - diff --git a/a02456.png b/a02456.png deleted file mode 100644 index 79abbf09c101c7601816d2e3052d992db0f8d1d3..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1059 zcmeAS@N?(olHy`uVBq!ia0vp^XMnhagBeK9G5xX&NJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIfh=jq}YQo;Ck?!`;56nI*u zmmGWYcm9tn)21zPSe?G5KIPGlC`HbnOb4TvOu3}tl$0jt%y{_Bn?NuT-yFGKJnh-< zFSZhC&t`uuoni7m@SkP&zpt+6-XC6bGv9#w_V$c@_l$o}Gf@AUmiBK)o<$l^fzqXzH`=5K_jG6Dl4j33$hro#|83vk5O*$AJu-P&si1f02uHbPo7CLjri0^EG zLE&u127gu_hKi5_3=QriFb-7DT9zs0I-{fGSik`R!O9R2afREUvtz}=N*n*R{##?u zPwrT;{_5&azNfo8R;>0vX!7!~51Kb;NzTyws%{U-0HCqmxy7hIdZ@rKP;FIj)lbYF_afhdD z+i8_1E0G;|^_R;0zj`l!?&I0Ke6wky__Kn7`)_BKUEZ1?WqY|i?@n4(ec7_2^-tE_ zwkxglYAL!ZYg>BpQ^ed)(^h`7{o?cV&j0zD@n2nB=3Q-j`IlQr&@xQ;*qnH!Me>2q zX9x=ZoyXMHabhu;NSl#4YndYpgZT?ahQ%2wGma-K%$k^xHmxwDt*P@i4?~Ss0>gpD zOl%A`q%iIUdujG6sR&Lq6fsazk`o0HU!{D`r^%fUem!|pwcWDMH%{m5YyUJkE^qF+ z_ep9>moBm=YVBUVRC?dfG<}OTf0`@{Ie%&1=qBY?NzTY ztlA-VEN9g%5m8UUJnoxkFBw!%vpnOpz(3&i>4=6_NIvx5sl8d-CF! zOU^C}e{8$>m%%>1$*b?Rtn4o4OP+Z}DF2|y@3ps2&(ymqHRG+5L3zX9jrkKS(`{#5 zG7CTcM#e2Y^lsVlNw+%}|27M3w|y)5^vZk5>YV%UW@ZJS(UaM>v~A~`nMJc-{=Hdy z`tQbNd+T4#y{Wt+c^ZF9>_WT5rzMfyF-s2LEiawj*-^E>VtaSTomG?f>@rwe? - - - - - - -CryptoAuthLib: cryptoauthlib.iface.ATCADeviceType Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface.ATCADeviceType Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface.ATCADeviceType:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int ATSHA204A = 0
 
-int ATECC108A = 1
 
-int ATECC508A = 2
 
-int ATECC608A = 3
 
-int ATECC608B = 3
 
-int ATECC608 = 3
 
-int ATSHA206A = 4
 
-int TA100 = 0x10
 
-int TA101 = 0x11
 
-int ECC204 = 0x20
 
-int TA010 = 0x21
 
-int ECC206 = 0x22
 
-int RNG90 = 0x23
 
-int SHA104 = 0x24
 
-int SHA105 = 0x25
 
-int SHA106 = 0x26
 
-int ATCA_DEV_UNKNOWN = 0x7E
 
-int ATCA_DEV_INVALID = 0x7F
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Device Type Enumeration from atca_devtypes.h
-
-
- - - - diff --git a/a02460.png b/a02460.png deleted file mode 100644 index 36d75cc6e8635d9875e12f44caf59fcc394bd902..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1084 zcmeAS@N?(olHy`uVBq!ia0vp^_kp;BgBeH$tT`75q@)9ULR|m<{|{uoc=NTi|Il&^ z1I+@7>1SRXIB)uTESR`^p!}O*+Ozlz zvNdPU>|ZMV^U%J@AMeNht}kD3|71Cn>OSW0&nMq6|NrTjA^X?Fw11X&tL*0X&-}Ug zm*~DCVevin8`rKmeEiIx>>|6gwA~2e7yAzK5T19Phw4jhV_^ZsLmbV1=h+5F4{ zSAXuQXKF~blxMgx^)q7w&>ciG4zO>{y}fP220=kx?dQr$o4~~C^&eQ37BznR`Qw$$ z*D_;&rA0ga)}J$%sdsV7fAP4+d3XND*2`;w%B#Ye_wBGa|Ka?>z`w<>X87y(uMa-| zF>~Vg^*Z^5t89uHM4z7tU)BGzJ@WDIouB9E|91JUyvMF;@%mFrm9L%%pZ|3?uu!vp zo}S*_J3pK9rQ+A#&)8=y6?ZE9waMA_HIM&RKmB7DKX+M9-rU4f(|Koiz7`4=e_7kk zTGzck=HTkjmJe6!?vkwxOv(#2zW@L5bZwvVnp4+fn%3Xj|B+ShBk#NWcYf~ux3b(Y zd77V?ereS!R~yYEQxaWYJNx%_OX0wuF@OK{);D!@KR0nxHQ(Xa2aeyq z@%WL)a_`Sdi|pTqa4IMnU0D9ZYIpaB#0S#yRXR#V3%gU#)D%k2``FKF+jc&^ZV5Ch z^!1$ZrZ7}Fy&N@rAODK_N+yJSLsYjPrb4`^rn^FQ?t`I zT~`0ln%uYE^TN?LL1ByUt*}2T|LC&Y*MECYhbK=vd-Znp+3+{Brv)CPwE73$?@UW*rG{ik*A@dX2AZuD^uIq^#SsiVZra>HKba{CoMD=ik@cy@=mefA`u; z-+Uk|-A_xvUMuX<_AFHQHG^ykX&>B=iUOP=?hyU>2t=48uPlbioVhTFWF zue8YS{r^859e-GTwd6kc)@^Wg`L`}jl>g_iHU*_m(@ob_6xq4DOq=kzvjdm`fW*~v f;!Yf|U)kT+vrRgdq - - - - - - -CryptoAuthLib: cryptoauthlib.iface._U_Address Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._U_Address Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._U_Address:
-
-
- - -cryptoauthlib.library.AtcaUnion - -
- - - - -

-Static Protected Attributes

list _fields_
 
- - - - - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaUnion
-def __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
- Protected Attributes inherited from cryptoauthlib.library.AtcaUnion
_selected
 
-

Detailed Description

-
Hidden union to provide backward compatibility with the api change

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.iface._U_Address._fields_
-
-staticprotected
-
-Initial value:
= [('slave_address', c_uint8),
-
('address', c_uint8)]
-
-
-
-
-
- - - - diff --git a/a02464.png b/a02464.png deleted file mode 100644 index c2c4463ca383a840e72ab9c422d6d5284eebe851..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1007 zcmeAS@N?(olHy`uVBq!ia0vp^`+&HEgBeKXbuN?#QqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#NtVJY5_^Dj46+eS2xM7LTiW z;j)u|<3Da(A+Rs%SI@jXXHu4VYqss^%KXzU;1nUwlJ+dLur@7CJ7)gOn_a)ZChwc` z<>uW=An&K;yvzJD_YR-1>{3sAcDo|L{$I=I#cDHV=084pcl}p+4Xx|xX@7xwpIORP z`0LD>upM^Bn?={1Ka+Fx*DuAE4LS@TRP-4lrf>Zkzkcc8 z>(}nT4gVG&bKjbu;l{&X3<<5TnHxmc@iPFmF+>m);JLXiH(ET$#bx!QUoI{{J%STO zjej+EtT=2}A7|yJwQi<@l2n0<>Bd5(^WTc^E{i|LJEfx|%Srdvb#jU*G+)6U8Og#@~_ta_FLztr)Aa0?GOH4{A;J_i}VR~u6bPT;a0Ei`b*C0 z+_Pn4SpA7tYNcC6h2?+$3%RbU^h>%tRqn3tKss`(Fpuk93cjrcbyxVxighxh)@*_A7L>rULS zyLx~2i>ZovaWeb*Ulz>eyZ2aG>22Mu50A69zOnLsas0|pk{hqUulDXjj_R9OK*DEP)F8TWWUWJm - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCAI2C Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCAI2C Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCAI2C:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - - - -

-Static Protected Attributes

-tuple _anonymous_ = ('u',)
 
dict _map_
 
list _fields_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
I2C/TWI HAL configuration

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.iface._ATCAI2C._fields_
-
-staticprotected
-
-Initial value:
= [('u', _U_Address),
-
('bus', c_uint8),
-
('baud', c_uint32)]
-
-
-
- -

◆ _map_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.iface._ATCAI2C._map_
-
-staticprotected
-
-Initial value:
= {
-
'u': (1,)
-
}
-
-
-
-
-
- - - - diff --git a/a02468.png b/a02468.png deleted file mode 100644 index a485f53b7ff11c03c3785debb938dc68a69cc52e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1103 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*VUj-Cc0uKjh0UUpL} z?U~#8`S;#B{4U8h6u%(1eC^)9?$IV|T#eq`s5Y57^Zg~^aJ@#?6(SoVQV-opOWWt^ zuhROZZOXX=hU|Gq&(utwce3d1K6VFpwnU&@zgnxeU{cz?!2OINc1sU`C|`Hyr>xcC zBDHNfXJ@|iPq9pU_CJvC$eEl-1Yyk7Dsae!sUiL%H$&Q`9EbJSQ(QJPuC*x^^ksh% z$;Xg$x{=|)CK(O}9a0$kE^g8}?Q_V<#iU=RqvOOTFrml5s`@Q*iK-oI8n;HCL36~Vxz0(YhEU;bqqU^Ah%@o~zvV`0l4ty#3K?289ur(bX4 z{0(#Cn7@j9%4P+83bFQdHVu%QaLYYd^3|#j7Vg*fR-IZDs}mjm{NYvS&YQP<~8)opJcK!$@EhD z_vfj*c|s0NT|Lz^@ckd70Cmlhus;uZpRUu+e_<66c{P0L_D3I1JvCYKc*>3n(cO zU~`(WA=grXAz~UcV?!zlj05IeiY+r+6qJnmWjtJtYyuN@tWuThzb)3@Hs$^`p6OvX z=k}$PZuzpRU3XjX{Eip*l^uHTZ#8vF?^hnv?GCOzTbK6i?-1E<7jP@nZpz}7Jf)!(bChQ{>#n}Hh&MoR+PxFm4p&2deXy=x z8@)ET+HgOURQxvn2CsE8cCrV)JKX$V^Gj(_-OUi@xt>WMoLp7@-(!B7{^i}NzdTF+ z?2gVdcD(!X@{85^9*n*B1K$0bZhnQuJ$>7+><_imE*E;mSo$AbyBrh^3)aPa(V28t z;>Dk9A`Z{D{#pM1!tQbnr6f1;hI{**1t-4WD*x-j4p$euE7c3WzYlOZ(z7ncQgEWZ oGP{uAMja5bMpUCkK - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCASWI Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCASWI Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCASWI:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

list _fields_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
SWI (Atmel Single Wire Interface) HAL configuration

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.iface._ATCASWI._fields_
-
-staticprotected
-
-Initial value:
= [('address', c_uint8),
-
('bus', c_uint8)]
-
-
-
-
-
- - - - diff --git a/a02472.png b/a02472.png deleted file mode 100644 index f99eb8d191abe3f5f10c60862fd8817ee84ddace..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1086 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*A`F}CO31C(l3zuR`Ckw;=MdA!+mfUQJTYs`6jXA3FnbIu26RTwy zZcJllY)G{fV2B`vQL`vDa@x$6){YE0O98=&K>a`>mVwK~MRx7C#oF7Z#3w5#NoiDV z-Iw@R`kWnKt$4so^C%U;z@-9rrS4z;Wf^d1LTyuW`n6-w2M+5^To#%dE?(nMb_0jxir^+IJy_REmY8b09chmde zcSZr6;pf7{T=#xD?J#%Ig_$4E%ASf1e|MpD!KcvWUirroPdznSa$d9WDU%5E(&csw zMHU)9S;*TSm1F8T@9&Plm8WFixjOCt&-ZmduZzp}7duZdFUYTv=cMG z!MkhKE8R5RUA~w7L%?qr&h*bT31K+F7DSWEm!VaIiF0sPm z@u5$Q0aBB`KhDr{{;OqkZsJ|r&}rwE@CLjJki5bFQEbI#ao+{=YM)$Dd$zsNZ^;Y` zdj_qYpFX~1{v)OFdwzJl%N70ESqg8fm;B&wxN<>1=$&oA%&%{kv4JlBoV%rDRP`F-kda8dd1 z=IrY7=4JMRd((qlo~XSI-}hIev!iB-eq-DA2$v%Z^p?!&IB|a>b7u!IIRlAnTp~^! b!Y}3bJ<^zvW?^Ik%;^lCu6{1-oD!M<(B<$Z diff --git a/a02476.html b/a02476.html deleted file mode 100644 index af441a3e9..000000000 --- a/a02476.html +++ /dev/null @@ -1,186 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCASPI Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCASPI Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCASPI:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

list _fields_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
SPI HAL configuration

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.iface._ATCASPI._fields_
-
-staticprotected
-
-Initial value:
= [('bus', c_uint8),
-
('select_pin', c_uint8),
-
('baud', c_uint32)]
-
-
-
-
-
- - - - diff --git a/a02476.png b/a02476.png deleted file mode 100644 index 5ca3d60f2f667b057d8c142faa70d790e1124f1e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1092 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*X!?bHe$lnRKj-dC+g3`l8}z#7`ProjEiA zQRfnY^8v>;7M$seo&n^})VY4HT0z8!!}znW%`6eWwF1VUd;hcsR8Da^{5@yqW9t%~ z(-Ut5WuGdEpZIjf%>T-2N6xH~ggYb6P4W4h*&GZ%gyR?tgg0~UjhifaR&C3#GpQzX zC!|_3TK3rS%!)X7kbc?G-&Ib-gJgV zOleW2fufQUP=nyaG(QeYrA2(%)jOVMN5))sa4|XHzI9{XUtV|l^4jSElIF8i1Or|Ag9x4{6sbI@!e*E@Iv6flM^5ae!7Eb?8S-ovuux9nH*B1+(PAhc@ zxp-#LyF!(aZxh#k4_)}C=lSIOvsQ1raB2Q`2MycHqNldMIUoIQOMqs0Uzpm_nrF*f ztvnYRKjKf)y~RWxnk(Ud}(QT-Q%&sB!-|Ykk0*g_$1xW^y-ERy$sL z@zCX{j`*Q&-oKyASNzXaP}%c0#jtGM1Lt!U?Kc3(|)Hx$#lwj*Pwf=IfQ+-==Y zcduxJVnS&}?Hcn8Ws&@r@`At>0@`Zxa$ouV)>v_OhCDaxQttE>LRxz-eR|6MBTnOJ z`ed!`m0MZP_CEXC(J^I@xYzL)cc=Z1)aZWix9lv-*WRktv6jv=FZ|$H8ol4r`Rt=9 zpa0JdI8_7={N;bHJT{GAc*A+y)0&itZ;m;A+&sDVY}e-EpVlGifr5ft=Lo#2)pT{q zOS1p;*4@+P3D^79w&f8nF7oNyfFW`{!AVI8n1Tfb&#rMgXK60@pTY99#xCKB4WRta N;OXk;vd$@?2>{~Z_rCxD diff --git a/a02480.html b/a02480.html deleted file mode 100644 index 30a23a2d3..000000000 --- a/a02480.html +++ /dev/null @@ -1,192 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCAUART Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCAUART Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCAUART:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

dict _def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
Generic UART HAL configuration

Field Documentation

- -

◆ _def_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.iface._ATCAUART._def_
-
-staticprotected
-
-Initial value:
= {
-
'dev_interface': (ATCAKitType,),
-
'dev_identity': (c_uint8,),
-
'port': (c_uint8,),
-
'baud': (c_uint32,),
-
'wordsize': (c_uint8,),
-
'parity': (c_uint8,),
-
'stopbits': (c_uint8,)
-
}
-
-
-
-
-
- - - - diff --git a/a02480.png b/a02480.png deleted file mode 100644 index 3de1101cd3b64079d7657d6c644987a1dca05081..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1091 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*I+~z4T_> znKQlf?(e%00Y8RO6PQ{Ya3xTD7b=(vdt55m7NHOw@TzVO;q@?wsI_W2l>%Z!y% znHg>uDKKo%VP|4EO#-7Ke~Zp(qsbct1kWn7D=BT#0TFAs9U41UEWTP-a&+3KY#tXE zX4m!C%-7T(zIlA%dnT>FZrv(Mt3(z>Kdz42&)y}y$-m&unOisJy)4|fXj|DA4|bus zQitU>@UCzCHF*i2sYd0hsY@10Y4CfzUA&U#>*@~{?$`EOrCiiowl@CxyDQmRLc4@F zGDw|UuzgLkyv53Z(iay?Qctldt-7*iQJ)2qR`QC^|HM4*7ViCVHs&Uucl}-F1vbmL zmjr*SJr&EQ_3+fqQ;SxF*GaAj7O^tkx6^s&>r=A3_(Jx*3VC_f!e?hp+ZRjKbukS| z3%*=YpQ2>aX0zpCK=)d;lbhwuwL*6u-s|z=`~8Lgwl{XX5VIApWcYHhePYLpVA~Uy z*@Lc6?s$=Bd(zm;QfbkCO+@gBW<*X)Rbo7_{sk+8ai-aV>)A$&ZZ?F?+u5;<`I8nq z!?vdm3<;5ZEDX~~Vcgef5l9ni>NsIjq#!5=j6@)@i_hd!^jr7v9L@b}CH0QppWA0t zy5-B7jnUGJ+~q!s1UxR+t$NX7A-C(Uc}K@DQwR1BW(D_G@0B!HEwM5t} zTC93?;`3~tkU1ay8!vhF_ukhmG5Z?VdfakTL00=$wcKkf+`3sbOJ!F`tu^1j`P#0l zR$DuN7B46%wPVrRS+c{wVN?A^vANHxD!E?h2<<%bqU67bM*QOc-aEfLoZ26)cFQZE ze9p6D9}da}IXt$Wvb(OR{nyf++yCh|6ivPSe9DfZxn17={ - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCAHID Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCAHID Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCAHID:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

dict _def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
USB (HID) HAL configuration

Field Documentation

- -

◆ _def_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.iface._ATCAHID._def_
-
-staticprotected
-
-Initial value:
= {
-
'idx': (c_int,),
-
'dev_interface': (ATCAKitType,),
-
'dev_identity': (c_uint8,),
-
'vid': (c_uint32,),
-
'pid': (c_uint32,),
-
'packetsize': (c_uint32,)
-
}
-
-
-
-
-
- - - - diff --git a/a02484.png b/a02484.png deleted file mode 100644 index a9acd34924adbce9746d7beebb9fb9a037287cce..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1081 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*Tj{M+x9it*i@sJ3eRJz~mXY!Oqr%a8ovtglBz&C4TRd~- zPqld-TrYVv&$TA=-8pooM)-Wn&aykq3zeGxcVr#?A5&C++-PkcIK=6`pv?RrPf0A&l$BZRlaE^ zvoE|do_?{!Y2H(Y17>My+eQ@;#e!g0V8xJ zc8QVGQq?vH2%c@`78Hy;*4ojbQ|zcAAXpmly5D`{l1H<+lol}>uIlA|eSgFE!pr5H zQwtY63JHd`NL)KIZ|i*SqntObEz;6-bFP*rE})5m+v~cD5fO({<)hgkB8*E@at~9uz}q+b?z_630bT1 zs;iw{ZS>ajJ1i?20{CqnBQPTyXlS$&%}ul}}kjq`kuTI<0J7rnLW7 z#fpPrbD!Mn7oNK5j$mBQi~0MV|K>9bUevX@{>kA*FTb+j#oab9E{g{ppWN{xZ{8Ql zTuY@z`#a%5w3$oy^d=t`hCjk_3TSAIMYoF{Uh4O4fpWO4>fP*JdHeqaxO{of zxlrw0l=#BSM+#4-+9uvj`|Z^J@7g81@M=RppE`-{@&;REJp O1_n=8KbLh*2~7Y~_Ufkq diff --git a/a02488.html b/a02488.html deleted file mode 100644 index 8f2938713..000000000 --- a/a02488.html +++ /dev/null @@ -1,188 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCAKIT Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCAKIT Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCAKIT:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

dict _def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
Kit (Bridge) HAL Configuration

Field Documentation

- -

◆ _def_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.iface._ATCAKIT._def_
-
-staticprotected
-
-Initial value:
= {
-
'dev_interface': (ATCAKitType,),
-
'dev_identity': (c_uint8,),
-
'flags': (c_uint32,)
-
}
-
-
-
-
-
- - - - diff --git a/a02488.png b/a02488.png deleted file mode 100644 index d26ce5a082f0e2a4fb8f75130dc95a66cc3440f4..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1093 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*X$C#KjB;rw!336ICywJUj^YJa}rK5eg6%C&RLbmM=&o05HsuS7YC z?aExo{K&)i3WFA&y0G`5SHG+3>GDP?*M)|UXIqz)%-!kyyzx_bWk{59S^u5Dwvu^5*8>}p z7JRuP=_ROj*l^3EfNoti%e4D>A*+gJSC=igU*CS~KAX~_=r1u(_%5{aD+^u>wLNi} zE$I5>ju&~hCofwUxw!1tM1+rI#;j$T3XBKlzhGrh&NNwYJ=#fG$b8#~&VKWVWu zYbSOgNgc&-%Be;Xa1qq%>nq@V9*tK6$u z*)JoLzkjl>aZ&kg%N+7^?(CGfjO@QFlUvVNxwsU4Z7}%8%vtucubNQ8r#)6_I@@>uA>fS$otQyHsAE z&0n)M=c?b=gL`QFuL$Ga1v;hVO8@Rq#fowauP zI+oPq;;suNR;|1I`}F6tva2Rd7G;_{Z~dw{=Yk(uy$Xq`s(Qt - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCACUSTOM Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCACUSTOM Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCACUSTOM:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - -

-Static Protected Attributes

list _fields_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
Custom HAL configuration

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.iface._ATCACUSTOM._fields_
-
-staticprotected
-
-Initial value:
= [('halinit', c_void_p),
-
('halpostinit', c_void_p),
-
('halsend', c_void_p),
-
('halreceive', c_void_p),
-
('halwake', c_void_p),
-
('halidle', c_void_p),
-
('halsleep', c_void_p),
-
('halrelease', c_void_p)]
-
-
-
-
-
- - - - diff --git a/a02492.png b/a02492.png deleted file mode 100644 index 38efdfffad3d06087f459f24331b23cf675e61b1..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1125 zcmeAS@N?(olHy`uVBq!ia0vp^*MYc$gBeIVSNAOiQqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#Ns8c)B=-R4~4s`+CwFEsoad zOIAJnJO9U%B$51?XWpgwC2lNVf5g$nKJb&cVvE5-ff+NGPcAkzzC95{T-1(hcMh9iqmco2%B!Z96Sra8&8=nLi8et&`sV>FAk18~$~y-jjAQ;hoI9 z`|FK8(>c#vixJkn>YVoMf8@ENXL8&Tgm7`Iz@ZwZhW(e=8Pu*UiJ5M=X7_R=mQh)3R#sF^@UZxv5Gpi z-cUf0x1?h0zQn)gbN*U=X^vTXKVz+n%hW>;ul<;JZT-%^w>O`6{@!A?Exl^adgtih zA3R=K&XGDSw}E&4&R>(4@R@2FE%zI+-KLmeW%y4qHUXMvKns3xGbr=`+KSW=Ly>7cX!5r-+3y$wxG)RUkP9F z!Ap_e6+1&@KVAxcuI-w^Q<>4c_*#tbr1bvnx>pash@0~%`u_TV=B*ts1ow*nob_7# zeyGx-`>#^hC{EvX(8b07b?%z(Vh@*;@N=#%DehoG`#Lb(s2>|49Ev^~EP@kXK8aCM zDgzTG&Dl>j+)BQFF{m!u_|B~jcQvPNxS^G9Yh85X?fWv9PxaGQf81TpMs|BxrpZ~hSX6M|h6`QAhC~~#t0LM$f^A8_%PCc5j`bX5u z#dr3t7EIO?Jh^|@o34%-LGxFCUnnYA=}{e;VV|a?7Ex#N@gY&?Mh0^p27ob fOA#oO{NmrwZ782_b%7IDATW5k`njxgN@xNAHI6xE diff --git a/a02496.html b/a02496.html deleted file mode 100644 index f5be7bced..000000000 --- a/a02496.html +++ /dev/null @@ -1,194 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface._ATCAIfaceParams Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface._ATCAIfaceParams Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface._ATCAIfaceParams:
-
-
- - -cryptoauthlib.library.AtcaUnion - -
- - - - -

-Static Protected Attributes

list _fields_
 
- - - - - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaUnion
-def __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
- Protected Attributes inherited from cryptoauthlib.library.AtcaUnion
_selected
 
-

Detailed Description

-
HAL Configurations supported by the library (this is a union)

Field Documentation

- -

◆ _fields_

- -
-
- - - - - -
- - - - -
list cryptoauthlib.iface._ATCAIfaceParams._fields_
-
-staticprotected
-
-Initial value:
= [('atcai2c', _ATCAI2C),
-
('atcaswi', _ATCASWI),
-
('atcaspi', _ATCASPI),
-
('atcauart', _ATCAUART),
-
('atcahid', _ATCAHID),
-
('atcakit', _ATCAKIT),
-
('atcacustom', _ATCACUSTOM)]
-
-
-
-
-
- - - - diff --git a/a02496.png b/a02496.png deleted file mode 100644 index a17b19df7d9788209392ea7aa20c6ea1ffe8ed50..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1073 zcmeAS@N?(olHy`uVBq!ia0vp^FMzm%gBeKPY7Q3wQqloFA+G=b{|Cvv`C8h4Xt{-f zW`V@?GcOJtH~!=C$S;@y$Oi*+rrB2*7?}5Xx;TbZFutApcGF@7p0@Z$ zK9hg%f3$XmfZdv^ZB=E?X}?0)k{<|m)C)RsC^sB9lOr#lnzpT_+sHWjk>W)Q54o4( zaqr%D7#Z82IlQRx@SUDDYbz4d_Dx^zy7 zb2-sv?<=MT-53!DorjAU5;(xDcSv%EqF~D-7E6Kboo8$bylL*&9%W> z<}}>0u@{Y%%U$y9-70V->ReISIn=ze}A;yTuM&V&eZRU z`|&_nF!pKKdF@53bOZ!zXII;<&y7`D^j}n5RcTWTC`caZTKQf!VPN=Rq0b=E80Zqe z-qFWhu(rA{(W+-fcr3$)R&3#lKj<5Fb11e5ItU1E?C<+JETzIS$Nw)k~@&ChxOmx_6u@%mVN13?>45Z=60&D-W)7* z`nz^@-;P^f=JP+lKj&ha;c2hiqHE8s=xCXyu&CZTG<<#br?XGax#!joMrHP?slWyB6)f>g@8w vJ~jPySH}%-7(QI2q%^IfyG`H_!ym>+W?qMu1{+NQW^M*gS3j3^P6 diff --git a/a02500.html b/a02500.html deleted file mode 100644 index 83e7710a1..000000000 --- a/a02500.html +++ /dev/null @@ -1,229 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.iface.ATCAIfaceCfg Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.iface.ATCAIfaceCfg Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.iface.ATCAIfaceCfg:
-
-
- - -cryptoauthlib.library.AtcaStructure - -
- - - - - - - - -

-Static Protected Attributes

-tuple _anonymous_ = ('cfg',)
 
dict _map_
 
dict _def_
 
- - - - - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.library.AtcaStructure
-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
Interface configuration structure used by atcab_init()

Field Documentation

- -

◆ _def_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.iface.ATCAIfaceCfg._def_
-
-staticprotected
-
-Initial value:
= {
-
'iface_type': (ATCAIfaceType,),
-
'devtype': (ATCADeviceType,),
-
'cfg': (_ATCAIfaceParams,),
-
'wake_delay': (c_uint16,),
-
'rx_retries': (c_int,),
-
'cfg_data': (c_void_p,)
-
}
-
-
-
- -

◆ _map_

- -
-
- - - - - -
- - - - -
dict cryptoauthlib.iface.ATCAIfaceCfg._map_
-
-staticprotected
-
-Initial value:
= {
-
'cfg': ('iface_type', {
-
ATCAIfaceType.ATCA_I2C_IFACE: 'atcai2c',
-
ATCAIfaceType.ATCA_SWI_IFACE: 'atcaswi',
-
ATCAIfaceType.ATCA_UART_IFACE:'atcauart',
-
ATCAIfaceType.ATCA_SPI_IFACE: 'atcaspi',
-
ATCAIfaceType.ATCA_HID_IFACE: 'atcahid',
-
ATCAIfaceType.ATCA_KIT_IFACE: 'atcakit',
-
ATCAIfaceType.ATCA_CUSTOM_IFACE: 'atcacustom'
-
})
-
}
-
-
-
-
-
- - - - diff --git a/a02500.png b/a02500.png deleted file mode 100644 index 0828a8cbb945d8768413aa38fd24dde6e18d5baa..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1099 zcmeAS@N?(olHy`uVBq!ia0vp^7l62fgBeIJTt4*ukeY{4aTX$WqY_1GmVY! zFUc2at!bYU^k@e2_N26Zp7&Q4z1_v`u(8PiD7Rj$)msuM8d%R562CO#$6V#<`mYUK(xE#@L?v#AgNtg^XuqIf-D`v$Fjjyi%T=6AMMs8>4ES+dhMD7aTaP+V1={ zznpj8T4?vTeRoZNFRM?Qu;sngmRlF3R(Rz_9W!v6r&_h*A(zH_lS%JIewloYo9ZqV zX}R_As+&>^$|CCP-mdw+lI@lIn(LP~_s_Z2{8KN$+-Y_Tw?pZJNp^D&Tz5EXAIea= z`nSVM51Y;pb^$xx*7w~hUQp%kAG%>3%k#c;!F9|}&vBUSb6)y-vGo;|w;4IIDW1)o}#>hxws;1>8kSDQ=Yp87JiZowG<4jf1aeJloYyEqoxjYen>Y$_q%#uK2D^sh$A(vn5o0HU@{{Qc(2+Z~jp00i_ I>zopr0IGfY6aWAK diff --git a/a02504.html b/a02504.html deleted file mode 100644 index 8f39348ca..000000000 --- a/a02504.html +++ /dev/null @@ -1,155 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.library.AtcaReference Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.library.AtcaReference Class Reference
-
-
- - - - - - - - - - - - - - - - - - - - -

-Public Member Functions

-def __init__ (self, value)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __lt__ (self, other)
 
-def __le__ (self, other)
 
-def __gt__ (self, other)
 
-def __ge__ (self, other)
 
-def __int__ (self)
 
-def __str__ (self)
 
- - - -

-Data Fields

value
 
-

Detailed Description

-
A simple wrapper to pass an immutable type to a function for return
-
-
- - - - diff --git a/a02508.html b/a02508.html deleted file mode 100644 index f303c1c0d..000000000 --- a/a02508.html +++ /dev/null @@ -1,147 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.library._CtypeIterator Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.library._CtypeIterator Class Reference
-
-
- - - - - - - - -

-Public Member Functions

-None __init__ (self, obj)
 
-def __iter__ (self)
 
-def __next__ (self)
 
- - - - - - - -

-Protected Attributes

_obj
 
_index
 
_end
 
-

Detailed Description

-
Used to iterate through a ctypes structure or union. This iterator
-returns a tuple of three elements:
-        <field_name>, <field_contents>, <field_info>
-Of course field_info is a tuple of varying size depending on how the
-field was defined (arrays, bitfields, etc)
-
-
- - - - diff --git a/a02512.html b/a02512.html deleted file mode 100644 index 6e8bf3dad..000000000 --- a/a02512.html +++ /dev/null @@ -1,203 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.library.AtcaUnion Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.library.AtcaUnion Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.library.AtcaUnion:
-
-
- - -cryptoauthlib.iface._ATCAIfaceParams -cryptoauthlib.iface._U_Address - -
- - - - - - - - - - - - - - - - - - - - -

-Public Member Functions

-def __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
- - - -

-Protected Attributes

_selected
 
-

Detailed Description

-
 An extended ctypes structure to accept complex inputs 

Member Function Documentation

- -

◆ check_rationality()

- -
-
- - - - - - - - -
def cryptoauthlib.library.AtcaUnion.check_rationality ( cls)
-
-
Perform a rationality check on the structure definition against the expected definition by
-checking structure sizes between the compiled library and the python library
-
-
-
- -

◆ from_definition()

- -
-
- - - - - - - - -
def cryptoauthlib.library.AtcaUnion.from_definition ( cls)
-
-
Trigger _field_ creation from the values provided in _def_ - must be run before the class
-is instantiated
-
-
-
-
-
- - - - diff --git a/a02512.js b/a02512.js deleted file mode 100644 index eb050a85d..000000000 --- a/a02512.js +++ /dev/null @@ -1,5 +0,0 @@ -var a02512 = -[ - [ "check_rationality", "a02512.html#a1f9f23cc775d8b3e461bbfc192134c27", null ], - [ "from_definition", "a02512.html#a3d679310ce9bf2878b4d01871e97c54e", null ] -]; \ No newline at end of file diff --git a/a02512.png b/a02512.png deleted file mode 100644 index d7cb2f857cf53936946700a16cc276f6b5bbe6bb..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1569 zcmb_cX;4#F6n;>(RiHLh#AN_U#1s)lKo+607!{BLhL8*iTcC#eLPVeh6$!LD5JX5o zj4TSH1V};xYK%c50YyX+MInUYK~O*|5)y4w_N|YO9shPZy+7_f_nhyZbLV{Doa~^0 zLq=;htpNbQ$kzvh1pqw=wwYgj0q-dWP!D`;4)VtxSXx?w&C&6RWY&Xf7dz_{8!mT@ zHa9oJ{@{Xc9voZ!Gd3U?fbV}VXZ=zI0IU@HV!UuC^)y%2i8XeHt9qlibi0O#og;uS=Pl_Yuib{kTfi_f}Z7w#=BHoD!I=XpohA zx;=L6GUZ%cwwt|0vbn5$V#?IF8x-qzv7!%0g7I4IJETObMcWBz6O)9HAuVGkoPnX= zT^lY~z+LAoquIoaK$HZq&L?IRp4oaMLYv;$>h)9jC+z2H)fiBv3SLeJLsO;-KY!{n zj^t-;3U~rn+KoJcANPZL_KC75ww~VH^;=LW;zR@XTK-C(^AGj87*G$3{8Y=w*3%CL zSYZv=#&9@W@jrwEstd8TKy&MN2*gZ2#AFuw&@dQ3t`ibzh24zEH|FOuT^Fb}=p*A#+vnxiaAI&2<7 zTljdRG1mfXL{B=93Z)OC5;qlSW;Ax+)9F|co9@I+2nlS7e0U#v!h?=0)E!!l4tAZ)Ve z$!R$D4S%J}1G1#&)HKr40`J!AZXp8Y>|GMzOBcEl4^DML?_cJNC+neHF&@;5_~^KW zteA%@}s5poj-+i?RfoOVumr@D04*gH-V2%!AU=C48Y@)BEvM^B(SkcTM09JT9 zEi)}G9njwjGi;yeY$F9`U|n&2cKi#DU;7`I_G_YnuwT?P^Z%vD%)tx>7MP{)prJRJ!nX!6qh`$n%XZETmBiBNEgwpfMS zB(n$eh&NvVF$~-rXao}J%zU0li)iGCmU!W5a@aLhcPq7p7O9E5zcy0b|8m-I;_XO< z$+=q#g% z4Hvisf!>EDEfwY4-hfx0xoT`j(A3j6!=4EnICylZP9s&le6)&`{=#kbj19RcRwy#u z_exvmteq8#e!HFi*q^mH$L7c4Ey~?M(^ygQr9G`e`JgM+!z_~~5sT@m3<{<60%(z% zW-{`A+T7mLt$$W(P8q+}j#=Q>Zz2b4c1Y!8ynx3!nIF(^;?I$bCbnXyYqq|AKRnC< N-va@dTJNY|{{oAU`pEzQ diff --git a/a02516.html b/a02516.html deleted file mode 100644 index 025520cc4..000000000 --- a/a02516.html +++ /dev/null @@ -1,210 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.library.AtcaStructure Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.library.AtcaStructure Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.library.AtcaStructure:
-
-
- - -cryptoauthlib.atcacert.atcacert_cert_element_t -cryptoauthlib.atcacert.atcacert_cert_loc_t -cryptoauthlib.atcacert.atcacert_comp_data_t -cryptoauthlib.atcacert.atcacert_def_t -cryptoauthlib.atcacert.atcacert_device_loc_t -cryptoauthlib.device.Atecc508aConfig -cryptoauthlib.device.Atecc608Config -cryptoauthlib.device.Atsha204aConfig -cryptoauthlib.iface.ATCAIfaceCfg -cryptoauthlib.iface._ATCACUSTOM -cryptoauthlib.iface._ATCAHID -cryptoauthlib.iface._ATCAI2C -cryptoauthlib.iface._ATCAKIT -cryptoauthlib.iface._ATCASPI -cryptoauthlib.iface._ATCASWI -cryptoauthlib.iface._ATCAUART - -
- - - - - - - - - - - - - - - - - - - - -

-Public Member Functions

-None __init__ (self, *args, **kwargs)
 
def from_definition (cls)
 
def check_rationality (cls)
 
-def get_field_definition (cls, str name)
 
-Any __getattribute__ (self, str name)
 
-def __iter__ (self)
 
-def __str__ (self)
 
-def to_c_code (self, name=None, **kwargs)
 
-def update_from_buffer (self, buffer)
 
-

Detailed Description

-
 An extended ctypes structure to accept complex inputs 

Member Function Documentation

- -

◆ check_rationality()

- -
-
- - - - - - - - -
def cryptoauthlib.library.AtcaStructure.check_rationality ( cls)
-
-
Perform a rationality check on the structure definition against the expected definition by
-checking structure sizes between the compiled library and the python library
-
-
-
- -

◆ from_definition()

- -
-
- - - - - - - - -
def cryptoauthlib.library.AtcaStructure.from_definition ( cls)
-
-
Trigger _field_ creation from the values provided in _def_ - must be run before the class
-is instantiated
-
-
-
-
-
- - - - diff --git a/a02516.js b/a02516.js deleted file mode 100644 index e7c61076c..000000000 --- a/a02516.js +++ /dev/null @@ -1,5 +0,0 @@ -var a02516 = -[ - [ "check_rationality", "a02516.html#a2cd77c54cfde31fcc4fb97ad15223f30", null ], - [ "from_definition", "a02516.html#a7748c2f53682292dd1ea2cb03b8386f5", null ] -]; \ No newline at end of file diff --git a/a02516.png b/a02516.png deleted file mode 100644 index 0419840d4f947bca06a6eb76dce09b1c6ff5d2a5..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11119 zcmd^ldt4LOzCHC(Pm4;`pCT&Io*wO~N>HB4QxAwmURE5CN1zk~281Xiydkw#(W-E+ zo)Q58Q3E<5fV=`jLQoWrh6oY^5<&t}AP*p5fB@lf_kf&ZAKu>2?~mU5>79QVh9TKA zdwthh-?jI}!>$KceYojE4GoP|j$hax(a>0e(a>1h{HLYh%C>loUEs&&!_G$!%+1Y# zQ^~*>DfMCgo?V}x+DK`X)YjI5>+V;1cfsF2ARcjb*8soIALdIkUubA-pK`R{e>CR3 z!Ord|0duWGcX9x|cE*3?gRf4uAG>%HZ!1t*l!kqB<>a>&2g$mtlkHAu{i(RFn`n{s zFv4D2vIgs#@4or@@;G}6Px``vct-DeFVUiW4ff_i;@&LRFmTIA18Hx99)%+%T38Ri z|Jngu$=8-lF`L|pXV@uo_LR^oRb_@`MvYHHKYpn45Q%P|&y$WeT);H<*uK0R6c+xp z@o`_2*R+=ay`DdR{jYPL0cOHW&!ogX))5w2uH^3}ORQ&?V#f<4l8C*o;6|;r*qaUd z{#WwRapc=NgP{>_a;V?zY<1RczuYxA(PKDV#un;UndBw*i!4dbPtZ^Q>>~J9_FWZv zUh&_1zIVTZhVD~)z8n8WL(#Zm*`J0@pD$mM(A01+;f#iOE%xJDRf1rx|Hrk__S%2i zWqK zXEMQtd;m;ulcWX99w&*ViocjL1R_LLITjQJhOt?%=5d{FQ@?U@2Y7&(FDYXmnp!@f zA;LVHyQih1Q5S2q2a$;H15c>*L;?FfCMO?@je~;sQOYgk`KHp%hUZCp!Sn1#|KEYa zjdT6sc-u8=Yz3|T=&diYt(36zj`*+5KAqTo-k*8zMw4a?mfxO%A67>ALhJDK zo-M0$tv{}{RKEA#k^~n3G_i7I4L~3R0B_hjr{WR#p$kB|a*fx=wHoNjM*yb3*U9jC zWJ_v8;0di5Ezy@07%tv2&nj@pJPeOO=p(Gb!tgviogkEA8W_kH7>-&%V*^vvnDk6( z4DLvNKu}cv#hDJ?V3Gr+lPOukuH7t;*yBqstQ#X-?QS6rvbFpS%`t;M^}g6}$H-Sb zjf1@{l{-|Um+wE=;V#EaOvlCwA}Eq2*lpOfoTzX&ZeC!#7fu+AF;{=xC-XAo9&?$B zI5invc;0q4{vKwR!)?x?%q)Fo`?nQN)vn%a^)1YrCa5~%)k9>?!F9JaSKcq;2r}~E zRH@NtHbkNA$u`xbj(8O&`lNz2H9d|bfP<-%iU=zv&#bzY&#?$J=yu&2kFSp#@;poP zP<(I?Gi>cbN+&BEDM^#z+xIJ5qBgLjrE(*qK*ri2<8Q@J?r^B~hU|81#sc!z1==uZ z#lr5iO7qBBli(VoKxGztBU2pTd#F0vz&OtX;4T^qhg__`0mE}>WxV83Ki>^Oiuzzu ztf`K6was~$b0LliJa>+jse~^ z;YJn9cT;q4cJ>IjYwQxezTHa6qJxUXj`9`|cv`yM5ysFMe$Y;1ef57B{P~6UBmdS%P{Ta;Ry8jTVc_u z{lNns4+}9`DG+}xnDhZ@#OG2@Q7k2>B52bzQ~2n5Qy9r>=#-N%b1yl=*gyUL&_4H-FP8-`~2Pq|F7 znLl-@(a}=t`Z|w$0A~dN9$Pm>!tgA{Z%za*5J~t$&Je$P#7hrz5aR3c7<1e3ggwC2 zWMg=#*JVrQ){yx@N1-wD7r#jWr>*o-bFI6qW9)z;s@MFEviM)%Z2nJ#yPQR))g|47 zKjh3y{!c6AXXG~h{V%}gWV||3t?od9)iRSyU^#CGAwqYi4W~u7gk+vW!vNDRig8t=`{;Oxmq*b5{(ZE&3n+q3A@r4>4QzP6s}bT zJQ z54@U|tRz#FBRK+<1HJVRpmMrT&2+DBV>_OAYAc_!iD3yV%LqD=q^hmli>by8ic?Ra zkY`-TVi@ug=y^R!US%(({=ER9&w)&Jsr(bd&2&3B+k0#x%OhCnv|yG=;Fzwtf2cJc zTB(}4t(m~_p!{HF$)2k#ssVbL`$jLHm&aJ+-B2Fd;x8$w2#T$0BSd;q_KxKC%m!3X zG&P-oyAn?g*0JUkFM4~x!Iel#riaC04!YPl!#E{gIc00x^GQFjsNR3(FHbrbMoQNX zoa$z5GYLiVIU;YBeMh)KQ&Xj98oy1HRhG{YR7sYIpUWaX@8lFkFY0FN2^$6Eog=?4r{ZXf6h+?M77oB6fEaCA?pg>MQBE2LW$ zV+X;@0J^yfl#}hNBEe!Qpn>Rh{0M%w)X3u%Gsv zbGq79pK%+4LT%J>3>v%@rKBvxs&AFSOH)PPeu%%C`)S?^vvjrb!JI9it!hJr{$l)0 zVQ3_vxFXTud}~^W;bhvd#9>Li`|ui?9{wpz-2xu z(5CJF@o@R0xM%^FT(HI`M-Q{3S8uuRld{C8BG>iUuf8FWq!{s(sn};W`A#CMwMim> zUEFW=eMP>LAp;Ic1_mhmIga%`w|eFum`MD~>$}DngIg2rDNvtnE~fz;D5Kow^g5 zF)Ih(Q#{x#Tk@VLRkGy0_b*^R`s$ni`4gb=izTAC>jXi^Qov)~TIe``?m^!?TaPyJ z7cji^++s_iot)E)826MG#pf*GRZQmuiX@23j_DtqdDqgMf}cu01zh!5^$rAT+Oqlp z0(ZAvI6!I0H@Ox~$FoUlmlc=LJWDJyDhe(At8!bZ`g?-$kg?}A^GW%p`*Go_mhFtF z6aATHVk!)~fjjLGB84!Mp)i=UYpL;*2al5Q;rw;uoE220R&GV(#I4VaR)3BSpBx;I z67TP8BR{D!H%CUln@A>3PE1V1fUdgc*4yw4U6(9dFlEc@-Zw&{EYsrG}s}G*t7!VtgKi%oMgXwmP59p>%xR*k6I{jIK;|;k1r6 zsqpeg*rG9sHU;m)B#WLB&QQ@F#yif33`bzBp? zK!tQ2iWHGllBWh&a2Y4>6zNiB;96V#dtSpi1|1Bk<-E=p5$9oLA0^VM*aO!fW<ZuzG z)|qg5E47LXFALKzVYnaA-q;n7)uRwtjdIV#4)4zf<>g8B&y;%Mr8hhnFZnpd5r~h{ zOFl6+Myl|scSnS;I|c`9qIX(yZx|CC21`9wb8{$)ks`_K5pVz-Pr{R8?@szdmk2PR z$1whh%rJaxLhCKgj~)bLz-9Wc)UpyLOUV&E$LWL+z3Abk1sv(=tv*h1A%#(Qq4#8) zDiUtP@alyJ>E&bT;z3f4kMXJ`zi`g3oDP!T&?)`Q4F%F1MXAAdRd1Nt?fCupArml~ z^QKqARnL8ZR@Jt8!m=C`&cGo3O47B+J9`%OF&Fbu*UbMC!kiz5`HS8dD?PjT+W6rV;6Kjw zzB^4>EX$<7QS5*e=gjb$>HHtD8Ob7MUtw~`?s7pxVq$XqxOo#Wlpg`1)#vqoqR2dF zHPD#ls*0LhEe-~nkH-7!0BgR)KPaS~2D;ruP?`{RtMi^!skC@5L#DS`B=?oANWq7^ znNXr)mo4sTj6)`1lzOxc771vdE=DbdSM~Dg+2c1kJ!Lcfj3-Se9Z?p^=gh{@J>!bl zl+j9@HH|Z*TY-Si!fm(&Bggq1a`Q>3X~R9qu`yBq^My!ev?_s=Og`|hq~(GKrHNOF zVZq7+9|&HY=htm;_gG@J2VvO(!CswB!zkTsr6s1h_XFK1d}Js*M82HhTxHH~#℘ zQZU0yFUuqDjcReCJG2XTM2I)#jirO2C0)^cax0^8l2`vd-=@?ZJFX~xnqA`nN*Nt- zE`Z&A(Vt;hlrC9fTYCvHA&?=yCGX^E2%68*LlL3*1sG=Z*X)O&L{t}w=EIi1fd5`J zRKJeDhQ%K950U1DzQvW>6fIVxeIVRwyHhuK-CLe7T9MY_XJh;9x{?OhpxLwSO^%(Y zxg;^jTJ*IAJ-(tXS?5|%;8n1WwfhcdI!)vuLri#=m@A(Vrf>rp7X2byXY(rd)F55I zErQO0ZRqhHh*e`{QXM)e7ciwOcp1(+iU*A2DNuc4-*)L~fyhpuhz}zCc;X+v@(4yH zEVD$rPCl;ma9H=t-2okO&T+z$BrJuRVy`{1ig^J7M(ksf;dA>a9{3mFx%tbt)87DMSD8tZH3|JOib@aRV|F{cJ^`I9E zFe(dwXv__*W959qj9Qv^n8i1!{6jU&(*^&IVQ5dPO|)3CQ28TM=_$)R5A}=5gp0Uh zSf+z2vKBG+pPPMN);%-G`VF}R(7e5Ym$`wD5liF8OM+c#Chr5SENN>n0<%et1P2A70D95 z{ML+5g)?4e7zLN5flL~FDj(-J>`0-1a78yBDQJAz`NHhd%;950+!~Bw`}~3y;wzi0 zLpsgAqkX92;?{yi3qG#Ku2iSfsNYR)&>x^LXg|B@fWBEN46i{S!x1zjue3!!f>szU zPXAVF>>v$J$_UMhDL--)vUUO>V#A!oV1TpFP-$%g!8c64@Y^1KQNGTDZde6A`+q}A zJl~m%4pSDJB})*duTOjTirAu0mZrB|ak+nfW#eqCArYC^K9zXrC(rT*MPc+;o+<#9}3Y{qLc zZ7UX=mg_*_3xKj_9w7g9r>ZXn!!Fs1E>B;@P^RXJ!x^i(;fINl>GLZXsIWSq!Wzek z9lqIqc7rBGYM3@ZWFF{0CeC?Q!7}bVoJe>-H4NwUdGGQwSPwz-{ADPQ5bJ=pcR5fj17|4hupxjna>B6)Wixj5lr`=?T`csW?I^CP)^!I;HjfW zGEg1;5UYzVY1Nf1nB)oP4p`4M|sH5B$Nde(*tX~m^`%oC-=t;rd zeU8J`59L*OjU+#eAQTe4DA!?leglaq7Be;%&>6n@A#_gNXLNCQPKV4$oZEgmJYAVT zmZmJ$GKg;$05i%yrwu~;tx5P;;My*N3Q5{W=_@aSr|=llbc{ApPoRhoLbo z)C{|wMAyew{vWe!b?>%pw0yIfwor)AL(%2GfUe{$ALslER*lC3Hx)^ZSZx4XqMo<+ zo)lst_g7sB&+9Zy#CnY3`RlMF z%ix~@{y*_%)b)3M81hFG70NGtS(+O7vOy4mbi_K&n=wXc8*~=kVuCL8|4cJ8#&6=j z;;+GW<;S`Jz5Keg5cHqB0c55T3^x?GE}rk9`lBH*oMee!EWxOpLvjq9pwx^1I--Vq_N)HCDm}sd1qr+KhU*u~ddDJ1ge*2lUuB_kKb+329j} zuDga=BDIQFTd{ensS;P^!-duUK8QWPjFGPSG>m9Gm?V`0nWSZdQora)OxHdhOUV!7 z-DedT4H-wv_w!1X%`32dXMzX<_5p|wcH&4zV2q_=q|Rt?Om$U{QIJon(u~{@2auP6 zS~2dCIKe9=3*$698bIR+%lTApmKmFDzu0)n9KEp_=O%-Ur@SfK$kADhyngl3QfVr|z=7JWO%ME3&A_B@>AN?O=uE2LQ*PuJ0 zF08>IF#Su&6y4E4_Mjv)?^CS?gkM{f56*yPo_PoBh0UXkmF#R&O$(T;e{#C$%Y-d9 z9q5vOW0CsbAbY-icB7ljD1O)aD?iOPfXjdIO;8j+w-vOH0e;Q6QnR;I5r_+Ch+5}kWP(`#{^>f`x~$sDdc^N01LVCcCv94EW>;q`t-(bEn&63#cVjX ziyM=Rm?)HkSB7LID^1^c{?O^e$B-!S?O9g$I8-5k7=6|ssw7~pZB&9qFQsk`mCKr9ND}!nDI5v?NbUk)!;zMFw9$d^Or67D-x|;}B%ar5<;t=D{*8bO)HBWWjl% pgf&4$otOV_yW<7tHMcbUSm(fBU7dD=t+5)82VCt7|Mu0l{|PPF(9{3` diff --git a/a02520.html b/a02520.html deleted file mode 100644 index 09d71e0ba..000000000 --- a/a02520.html +++ /dev/null @@ -1,264 +0,0 @@ - - - - - - - -CryptoAuthLib: cryptoauthlib.status.Status Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib.status.Status Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib.status.Status:
-
-
- - -cryptoauthlib.atcaenum.AtcaEnum - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int ATCA_SUCCESS = 0
 
-int ATCA_CONFIG_ZONE_LOCKED = 0x01
 
-int ATCA_DATA_ZONE_LOCKED = 0x02
 
-int ATCA_WAKE_FAILED = -48
 
-int ATCA_CHECKMAC_VERIFY_FAILED = -47
 
-int ATCA_PARSE_ERROR = -46
 
-int ATCA_STATUS_CRC = -44
 
-int ATCA_STATUS_UNKNOWN = -43
 
-int ATCA_STATUS_ECC = -42
 
-int ATCA_STATUS_SELFTEST_ERROR = -41
 
-int ATCA_FUNC_FAIL = -32
 
-int ATCA_GEN_FAIL = -31
 
-int ATCA_BAD_PARAM = -30
 
-int ATCA_INVALID_ID = -29
 
-int ATCA_INVALID_SIZE = -28
 
-int ATCA_BAD_CRC = -27
 
-int ATCA_RX_FAIL = -26
 
-int ATCA_RX_NO_RESPONSE = -25
 
-int ATCA_RESYNC_WITH_WAKEUP = -24
 
-int ATCA_PARITY_ERROR = -23
 
-int ATCA_TX_TIMEOUT = -22
 
-int ATCA_RX_TIMEOUT = -21
 
-int ATCA_COMM_FAIL = -16
 
-int ATCA_TIMEOUT = -15
 
-int ATCA_BAD_OPCODE = -14
 
-int ATCA_WAKE_SUCCESS = -13
 
-int ATCA_EXECUTION_ERROR = -12
 
-int ATCA_UNIMPLEMENTED = -11
 
-int ATCA_ASSERT_FAILURE = -10
 
-int ATCA_TX_FAIL = -9
 
-int ATCA_NOT_LOCKED = -8
 
-int ATCA_NO_DEVICES = -7
 
-int ATCA_HEALTH_TEST_ERROR = -6
 
-int ATCA_ALLOC_FAILURE = -5
 
-int ATCA_USE_FLAGS_CONSUMED = -4
 
-int ATCA_NOT_INITIALIZED = -3
 
- - - - - - - - - - - - - - - - - -

-Additional Inherited Members

- Public Member Functions inherited from cryptoauthlib.atcaenum.AtcaEnum
-def __str__ (self)
 
-def __eq__ (self, other)
 
-def __ne__ (self, other)
 
-def __int__ (self)
 
-def __hash__ (self)
 
- Data Fields inherited from cryptoauthlib.atcaenum.AtcaEnum
name
 
value
 
-

Detailed Description

-
Status codes returned from cryptoauthlib commands and their meanings. See atca_status.h
-
-
- - - - diff --git a/a02520.png b/a02520.png deleted file mode 100644 index a28756b1ad5fddb733387b96a29c7f8c777d648b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1010 zcmeAS@N?(olHy`uVBq!ia0vp^XMnhagBeK9G5xX&NJ$6ygt-3y{~ySF@#br3|Doj; z2ATyD)6cv(aNqz?Jb2RO6+k)8k|4ie1|S~{%$a6iVPIgc^>lFzsbG9N_vWU@T0E}i zMWI{%|LD4fuC;#epy5EA1y+S%TEmq{c8pk%o3a)7`nCN^omtcOU!2qIK5zD_`xL4@S=5IirxIa zoT^EZvA;IH^g5Pr%&?*JG(&@H3>$;aBO`_c!Rd?)-8*;~B95do98l6@W)LfsWZ2Mw zrlcXA=di&SCN{x|b_J4xg55iMIyzkQPOu101z*0i&u-3rv1RAIk8Cr}d>9loacAj-ubX?O zFOzCt-zPPH`y}(3x(ar4exK4_@h!|{&CH)3y=Ok%wApKN{aZod+*v1EeKv2-NzHoO zzTlOkRrHi+KO*yNjMY!-&fIijjqcO_xlHp8H^{kCja_`)%6!?i zM)Tk5Wj?((?dG!0a)*|kSywQB-ppSMSDy?y=VQIIX!g_Jn=O}CtIpf?)ii$I73W>A zzRmo(=;*e`Q?Ac^wsW^}u}9wjb63_^2@0ORk{Y$YNlB?~kqS2s#V<@up5Gcz zPgvp_)25>P>Aca}EgNm^qU>ZJ1vzi+ei^i@PwAxc`%_mQom+0XT{QbcyU}T@UR%Ha zj|{-Ue&jY(??6epK&_AAhyZ}Rxl+Kve0&$~{C zet#;VUL)u_$vy9cNYGTnbI0|Xzez^Uk2Ji~sdUoze2UldExA9BZB4yovc0E@aV`J3 z#U7iUG(v)VQs%UqdEfPbB8To8Pd>TjywA=F=I4E;l_&+fO-yOMy*+ZD{p{dfXQzGK zcD?4&%66r~y`r0$ytbB#xlSsT`+F`WP9?KX-KhN3G?oA6awkN@bv$Q14xBl0Nh-+S lkBn3@CkCpu2v|L|ueq;M*LR&K1(-V-JYD@<);T3K0RX*a+HU{= diff --git a/a02524.html b/a02524.html deleted file mode 100644 index 7439c3975..000000000 --- a/a02524.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - - - -CryptoAuthLib: setup.CryptoAuthCommandBuildExt Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
setup.CryptoAuthCommandBuildExt Class Reference
-
-
-
-Inheritance diagram for setup.CryptoAuthCommandBuildExt:
-
-
- -
- - - - -

-Public Member Functions

-def build_extension (self, ext)
 
-
-
- - - - diff --git a/a02524.png b/a02524.png deleted file mode 100644 index d75ed9cb539f10b92302a59c9f0a590b99c86670..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 716 zcmV;-0yF)IP)Q0000RP)t-s|Ns90 z008Lh^>vTJr#LVva2S`&=)l0h|Ns9}lGCUF000SeQchC<|NsC0|NsC0Hv*f~00074 zNkl?bFC;@{;2%xo@Tk~9;cBuU;0B}wwmSm{J_O(&9cq^a%;xqKckNh8+iHmdZux0UXH zu5_<`(3GFsQZ7D-m!uJU^yrh-A8V|%+1{nsKWph8l)plWUt62@991c8FKk`iTdMd} zPLs+Hr6HASr99yFRN6{x8h=-+-fo_{z--^Pmx`X|ozl@(ohFta4t<^}wKJ<`&?&X^ zXgcawsc(O*)E}vSa{UQu|E160M>S`u-Ui*qORv19G@ST&3NI?<(fhE$Ds_oxoE{#0 zs-sdlPNPwVd-$o+(d9*@(~WnCJMP%ZF)58lIUJ%Y><3ESS!xFBPkBzX!;H7fR2i>H zD&^eeY?d=#btd!KKg92EnpFSx{MdDnqmCJGYpiE-b}v1>bl<#YB - - - - - - -CryptoAuthLib: setup.CryptoAuthCommandInstall Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
setup.CryptoAuthCommandInstall Class Reference
-
-
-
-Inheritance diagram for setup.CryptoAuthCommandInstall:
-
-
- -
- - - - -

-Public Member Functions

-def run (self)
 
-
-
- - - - diff --git a/a02528.png b/a02528.png deleted file mode 100644 index 9aafe42d92c99d898ccf4f32fa669dc212319fa7..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 646 zcmeAS@N?(olHy`uVBq!ia0vp^M}atigBeK9^K~==QqloFA+G=b{|7Q(y!l$%e`vXd zfo6fk^fNCG95?_J51w>+1yGK&B*-tA0mugfbEer>7#NrYJzX3_Dj46+y*+8Qf`DuJ z{*?Fs|38|%;-Hv8+M16($)#u4h;VGt(R-_X=1d#A+oa~nVk(l&TNF-8#3Ti_$Gkp& zNp$tM_-{!*-I?pmSnK}Ueg65$cuwoYtNXPlKFKe-8@EGKf4#)DB)jn9#Jh5n{)DdE zw&Qf?uEwK9i>AqZ{U!aq+HunKNiZ{)uzDVQU?!H9wwReg{4+zt!=0^19~ZLsMn~AF z<}E1X?>-aAAkeynp+RB^E5i{5T?PfVOhyJn4{nAI$0!B|o=Z#&NfX2v1e(#6+)qd| zvoY|LnzLoX5{V_PDn}ROZ%qDnifz)BO_ed>UbXdmRK9*#Jo`oVV}G4x%jIWzRYq%H z<$tWY@_4`Qv(#B(ufKj?<$L$kr=Jf)t0kZ6JmV`~vGQnd{HxO@UWvI8S>Dan58|(G ztoXj(d)?~Uu6Os@t+@FmlKE`^^vY>Y!khUn%uY?+So>A$c2rK4T=bRehqvb}3p@UX zH6v`VZQ$kSf1 - - - - - - -CryptoAuthLib: setup.BinaryDistribution Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
setup.BinaryDistribution Class Reference
-
-
-
-Inheritance diagram for setup.BinaryDistribution:
-
-
- -
- - - - -

-Public Member Functions

-def has_ext_modules (self)
 
-
-
- - - - diff --git a/a02532.png b/a02532.png deleted file mode 100644 index 60c50d03700950c2ef545e482132b047e72490dc..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 607 zcmeAS@N?(olHy`uVBq!ia0vp^lYlsYgBeI3ZM_4cqyv0HT>t<74`jZ0^R=}9&~gg{ z%>s$(XI>mQZ~!PCJn8ZZpd4pOkY6wZkPimtOtY^rFfhLIba4!+V0=6G_OxaN9#{Xk zs!#vpZA4w05*AH&J=zi^*O0mA(gM$4zU?7%XGlF;P~$s^ednqz|I)V?-Ex_sHp%9Y zwAbqyIWZbK^~FjjmG_tyHfx5S+_(D5>B#k}!N2xQs?|R$oc>ua_w&Ei<#&!x@%SVT zvlm251be!qXfQmGlVdOtd#q_Ici6Ib`4_*+ok@P?etPTcju{ok3_s&66JDBaR*QV)HE+$7;#}|4inT$ao7r-w_ynxKohP?= zi=D&Wd|ut`lh>~0Ou2Q;R<-ze)uU-!{$5Bk2(FmCao&#dDR0CqR-_nDdwL~0Wcrk< z%X{`ui_`vEbS?Yjls%oNU)R4&{T^1XtGj!d&a7X1L*9kv-(MQO_wg>_<*Rl*J+k}n zy7LEWy|&lR$P3=}KKN(4-R@PZ;+3a_gxVep5fYT_lE2TqA!=4ffHE*CFnGH9xvX - - - - - - -CryptoAuthLib: cryptoauthlib_mock.atcab_mock Class Reference - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
- -
cryptoauthlib_mock.atcab_mock Class Reference
-
-
-
-Inheritance diagram for cryptoauthlib_mock.atcab_mock:
-
-
- -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Public Member Functions

-def atcab_init (self)
 
-def atcab_release (self)
 
-def atcab_get_device_type (self)
 
-def atcab_aes (self, mode, key_id, aes_in, aes_out)
 
-def atcab_aes_encrypt (self, key_id, key_block, plaintext, ciphertext)
 
-def atcab_aes_decrypt (self, key_id, key_block, ciphertext, plaintext)
 
-def atcab_aes_gfm (self, hash_key, inp, output)
 
-def atcab_aes_cbc_init (self, ctx, key_id, key_block, iv)
 
-def atcab_aes_cbc_encrypt_block (self, ctx, plaintext, ciphertext)
 
-def atcab_aes_cbc_decrypt_block (self, ctx, ciphertext, plaintext)
 
-def atcab_aes_cmac_init (self, ctx, key_id, key_block)
 
-def atcab_aes_cmac_update (self, ctx, data, data_size)
 
-def atcab_aes_cmac_finish (self, ctx, cmac, size)
 
-def atcab_aes_ctr_init (self, ctx, key_id, key_block, counter_size, iv)
 
-def atcab_aes_ctr_init_rand (self, ctx, key_id, key_block, counter_size, iv)
 
-def atcab_aes_ctr_encrypt_block (self, ctx, plaintext, ciphertext)
 
-def atcab_aes_ctr_decrypt_block (self, ctx, ciphertext, plaintext)
 
-def atcab_aes_gcm_init (self, ctx, key_id, key_block, iv, iv_size)
 
-def atcab_aes_gcm_init_rand (self, ctx, key_id, key_block, rand_size, free_field, free_field_size, iv)
 
-def atcab_aes_gcm_aad_update (self, ctx, aad, aad_size)
 
-def atcab_aes_gcm_encrypt_update (self, ctx, plaintext, plaintext_size, ciphertext)
 
-def atcab_aes_gcm_encrypt_finish (self, ctx, tag, tag_size)
 
-def atcab_aes_gcm_decrypt_update (self, ctx, ciphertext, ciphertext_size, plaintext)
 
-def atcab_aes_gcm_decrypt_finish (self, ctx, tag, tag_size, is_verified)
 
-def atcab_aes_cbcmac_init (self, ctx, key_id, key_block)
 
-def atcab_aes_cbcmac_update (self, ctx, data, data_size)
 
-def atcab_aes_cbcmac_finish (self, ctx, mac, mac_size)
 
-def atcab_aes_ccm_init (self, ctx, key_id, key_block, iv, iv_size, aad_size, text_size, tag_size)
 
-def atcab_aes_ccm_init_rand (self, ctx, key_id, key_block, iv, iv_size, aad_size, text_size, tag_size)
 
-def atcab_aes_ccm_aad_update (self, ctx, aad, aad_size)
 
-def atcab_aes_ccm_aad_finish (self, ctx)
 
-def atcab_aes_ccm_encrypt_update (self, ctx, plaintext, plaintext_size, ciphertext)
 
-def atcab_aes_ccm_decrypt_update (self, ctx, ciphertext, ciphertext_size, plaintext)
 
-def atcab_aes_ccm_encrypt_finish (self, ctx, tag, tag_size)
 
-def atcab_aes_ccm_decrypt_finish (self, ctx, tag, is_verified)
 
-def atcab_checkmac (self, mode, key_id, challenge, response, other_data)
 
-def atcab_counter (self, mode, counter_id, counter_value)
 
-def atcab_counter_increment (self, counter_id, counter_value)
 
-def atcab_counter_read (self, counter_id, counter_value)
 
-def atcab_derivekey (self, mode, target_key, mac)
 
-def atcab_ecdh_base (self, mode, key_id, public_key, pms, out_nonce)
 
-def atcab_ecdh (self, key_id, public_key, pms)
 
-def atcab_ecdh_enc (self, key_id, public_key, pms, read_key, read_key_id, num_in)
 
-def atcab_ecdh_ioenc (self, key_id, public_key, pms, io_key)
 
-def atcab_ecdh_tempkey (self, public_key, pms)
 
-def atcab_ecdh_tempkey_ioenc (self, public_key, pms, io_key)
 
-def atcab_gendig (self, zone, key_id, other_data, other_data_size)
 
-def atcab_genkey_base (self, mode, key_id, other_data, public_key)
 
-def atcab_genkey (self, key_id, public_key)
 
-def atcab_get_pubkey (self, key_id, public_key)
 
-def atcab_hmac (self, mode, key_id, digest)
 
-def atcab_info_base (self, mode, param2, out_data)
 
-def atcab_info (self, revision)
 
-def atcab_info_get_latch (self, state)
 
-def atcab_info_set_latch (self, state)
 
-def atcab_kdf (self, mode, key_id, details, message, out_data, out_nonce)
 
-def atcab_lock (self, mode, summary_crc)
 
-def atcab_lock_config_zone (self)
 
-def atcab_lock_config_zone_crc (self, summary_crc)
 
-def atcab_lock_data_zone (self)
 
-def atcab_lock_data_zone_crc (self, summary_crc)
 
-def atcab_lock_data_slot (self, slot)
 
-def atcab_mac (self, mode, key_id, challenge, digest)
 
-def atcab_nonce_base (self, mode, zero, num_in, rand_out)
 
-def atcab_nonce (self, num_in)
 
-def atcab_nonce_load (self, target, num_in, num_in_size)
 
-def atcab_nonce_rand (self, num_in, rand_out)
 
-def atcab_challenge (self, num_in)
 
-def atcab_challenge_seed_update (self, num_in, rand_out)
 
-def atcab_priv_write (self, key_id, priv_key, write_key_id, write_key, num_in)
 
-def atcab_random (self, random_number)
 
-def atcab_read_zone (self, zone, slot, block, offset, data, length)
 
-def atcab_read_serial_number (self, serial_number)
 
-def atcab_is_slot_locked (self, slot, is_locked)
 
-def atcab_is_locked (self, zone, is_locked)
 
-def atcab_read_enc (self, key_id, block, data, enc_key, enc_key_id, num_in)
 
-def atcab_read_config_zone (self, config_data)
 
-def atcab_cmp_config_zone (self, config_data, same_config)
 
-def atcab_read_sig (self, slot, sig)
 
-def atcab_read_pubkey (self, slot, public_key)
 
-def atcab_read_bytes_zone (self, zone, slot, offset, data, length)
 
-def atcab_secureboot (self, mode, param2, digest, signature, mac)
 
-def atcab_secureboot_mac (self, mode, digest, signature, num_in, io_keys, is_verified)
 
-def atcab_selftest (self, mode, param2, result)
 
-def atcab_sha_base (self, mode, length, message, data_out, data_out_size)
 
-def atcab_sha_start (self)
 
-def atcab_sha_update (self, message)
 
-def atcab_sha_end (self, digest, length, message)
 
-def atcab_sha_read_context (self, context, context_size)
 
-def atcab_sha_write_context (self, context, context_size)
 
-def atcab_sha (self, length, message, digest)
 
-def atcab_hw_sha2_256_init (self, ctx)
 
-def atcab_hw_sha2_256_update (self, ctx, data, data_size)
 
-def atcab_hw_sha2_256_finish (self, ctx, digest)
 
-def atcab_hw_sha2_256 (self, data, data_size, digest)
 
-def atcab_sha_hmac_init (self, ctx, key_slot)
 
-def atcab_sha_hmac_update (self, ctx, data, data_size)
 
-def atcab_sha_hmac_finish (self, ctx, digest, target)
 
-def atcab_sha_hmac (self, data, data_size, key_slot, digest, target)
 
-def atcab_sign_base (self, mode, key_id, signature)
 
-def atcab_sign (self, key_id, msg, signature)
 
-def atcab_sign_internal (self, key_id, is_invalidate, is_full_sn, signature)
 
-def atcab_updateextra (self, mode, new_value)
 
-def atcab_verify (self, mode, key_id, signature, public_key, other_data, mac)
 
-def atcab_verify_extern_stored_mac (self, mode, key_id, message, signature, public_key, num_in, io_key, is_verified)
 
-def atcab_verify_extern (self, message, signature, public_key, is_verified)
 
-def atcab_verify_extern_mac (self, message, signature, public_key, num_in, io_key, is_verified)
 
-def atcab_verify_stored (self, message, signature, key_id, is_verified)
 
-def atcab_verify_stored_mac (self, message, signature, key_id, num_in, io_key, is_verified)
 
-def atcab_verify_validate (self, key_id, signature, other_data, is_verified)
 
-def atcab_verify_invalidate (self, key_id, signature, other_data, is_verified)
 
-def atcab_write (self, zone, address, value, mac)
 
-def atcab_write_zone (self, zone, slot, block, offset, data, length)
 
-def atcab_write_enc (self, key_id, block, data, enc_key, enc_key_id, num_in)
 
-def atcab_write_config_zone (self, conf)
 
-def atcab_write_pubkey (self, slot, public_key)
 
-def atcab_write_bytes_zone (self, zone, slot, offset_bytes, data, length)
 
-def atcab_write_config_counter (self, counter_id, counter_value)
 
-def atcacert_get_response (self, device_private_key_slot, challenge, response)
 
-def atcacert_read_cert (self, cert_def, ca_public_key, cert, cert_size)
 
-def atcacert_write_cert (self, cert_def, cert, cert_size)
 
-def atcacert_create_csr (self, csr_def, csr, csr_size)
 
-def atcacert_create_csr_pem (self, csr_def, csr, csr_size)
 
-def atcacert_date_enc (self, format, timestamp, formatted_date, formatted_date_size)
 
-def atcacert_date_dec (self, format, formatted_date, formatted_date_size, timestamp)
 
-def atcacert_date_enc_compcert (self, issue_date, expire_years, enc_dates)
 
-def atcacert_date_dec_compcert (self, enc_dates, expire_date_format, issue_date, expire_date)
 
-def atcacert_date_get_max_date (self, date_format, timestamp)
 
-def atcacert_max_cert_size (self, cert_def, max_cert_size)
 
-def tng_get_device_pubkey (self, public_key)
 
-def tng_atcacert_max_device_cert_size (self, max_cert_size)
 
-def tng_atcacert_read_device_cert (self, cert, cert_size, signer_cert)
 
-def tng_atcacert_device_public_key (self, public_key, cert)
 
-def tng_atcacert_max_signer_cert_size (self, max_cert_size)
 
-def tng_atcacert_read_signer_cert (self, cert, cert_size)
 
-def tng_atcacert_signer_public_key (self, public_key, cert)
 
-def tng_atcacert_root_cert_size (self, cert_size)
 
-def tng_atcacert_root_cert (self, cert, cert_size)
 
-def tng_atcacert_root_public_key (self, public_key)
 
-def sha206a_generate_derive_key (self, parent_key, derived_key, param1, param2)
 
-def sha206a_diversify_parent_key (self, parent_key, diversified_key)
 
-def sha206a_generate_challenge_response_pair (self, key, challenge, response)
 
-def sha206a_authenticate (self, challenge, expected_response, is_verified)
 
-def sha206a_write_data_store (self, slot, data, block, offset, length, lock_after_write)
 
-def sha206a_read_data_store (self, slot, data, offset, length)
 
-def sha206a_get_data_store_lock_status (self, slot, is_locked)
 
-def sha206a_get_dk_update_count (self, dk_update_count)
 
-def sha206a_get_pk_useflag_count (self, pk_avail_count)
 
-def sha206a_get_dk_useflag_count (self, dk_avail_count)
 
-def sha206a_check_pk_useflag_validity (self, is_consumed)
 
-def sha206a_check_dk_useflag_validity (self, is_consumed)
 
-def sha206a_verify_device_consumption (self, is_consumed)
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-Static Public Attributes

-int r_devtype = 3
 
-create_string_buffer r_aes_out = create_string_buffer(16)
 
value
 
-create_string_buffer r_ciphertext = create_string_buffer(16)
 
-create_string_buffer r_plaintext = create_string_buffer(16)
 
-create_string_buffer r_aes_gfm_output = create_string_buffer(16)
 
-create_string_buffer r_aes_cmac_output = create_string_buffer(16)
 
-create_string_buffer r_aes_ctr_output = create_string_buffer(16)
 
-create_string_buffer r_iv = create_string_buffer(16)
 
-create_string_buffer r_tag = create_string_buffer(16)
 
-c_uint8 r_is_verified = c_uint8()
 
-create_string_buffer r_aes_cbcmac_output = create_string_buffer(16)
 
-c_uint8 r_tag_size = c_uint8()
 
-c_uint32 r_counter_value = c_uint32()
 
-create_string_buffer r_ecdh_pms = create_string_buffer(32)
 
-create_string_buffer r_ecdh_out_nonce = create_string_buffer(32)
 
-create_string_buffer r_genkey_pubkey = create_string_buffer(64)
 
-create_string_buffer r_hmac_digest = create_string_buffer(32)
 
-create_string_buffer r_revision = create_string_buffer(4)
 
-c_uint8 r_latch_state = c_uint8()
 
-create_string_buffer r_kdf_out_data = create_string_buffer(64)
 
-create_string_buffer r_kdf_out_nonce = create_string_buffer(32)
 
-create_string_buffer r_mac_digest = create_string_buffer(32)
 
-create_string_buffer r_nonce_rand_out = create_string_buffer(32)
 
-create_string_buffer r_rand_out = create_string_buffer(32)
 
-create_string_buffer r_read_zone_data = create_string_buffer(32)
 
-create_string_buffer r_ser_num = create_string_buffer(9)
 
-c_uint8 r_is_locked = c_uint8()
 
-create_string_buffer r_read_enc_data = create_string_buffer(32)
 
-create_string_buffer r_read_config_data = create_string_buffer(128)
 
-c_uint8 r_same_config = c_uint8()
 
-create_string_buffer r_read_sig = create_string_buffer(64)
 
-create_string_buffer r_read_pubkey = create_string_buffer(64)
 
-create_string_buffer r_read_bytes_zone_data = create_string_buffer(64)
 
-create_string_buffer r_sboot_mac = create_string_buffer(32)
 
-c_uint8 r_sboot_is_verified = c_uint8()
 
-c_uint8 r_stest_res = c_uint8()
 
-create_string_buffer r_sha_base_data = create_string_buffer(130)
 
-c_uint8 r_sha_base_data_size = c_uint8()
 
-create_string_buffer r_sha_digest = create_string_buffer(32)
 
-create_string_buffer r_sha_context_data = create_string_buffer(130)
 
-c_uint8 r_sha_context_size = c_uint8()
 
-create_string_buffer r_signature = create_string_buffer(64)
 
-create_string_buffer r_mac = create_string_buffer(64)
 
-c_uint8 r_verify_is_verified = c_uint8()
 
-create_string_buffer r_response = create_string_buffer(64)
 
-c_size_t r_cert_size = c_size_t(64)
 
-create_string_buffer r_cert = create_string_buffer(r_cert_size.value)
 
-c_uint8 r_csr_size = c_uint8()
 
-create_string_buffer r_csr = create_string_buffer(64)
 
-create_string_buffer r_formatted_date = create_string_buffer(3)
 
-c_uint8 r_formatted_date_size = c_uint8()
 
-create_string_buffer r_enc_dates = create_string_buffer(3)
 
-c_size_t r_max_cert_size = c_size_t(123)
 
-c_int r_tng_type = c_int(1)
 
-create_string_buffer r_derived_key = create_string_buffer(32)
 
-create_string_buffer r_diversified_key = create_string_buffer(32)
 
-create_string_buffer r_challenge_response = create_string_buffer(32)
 
-c_uint8 r_verify_is_locked = c_uint8()
 
-c_uint8 r_dk_update_count = c_uint8()
 
-c_uint8 r_pk_avail_count = c_uint8()
 
-c_uint8 r_dk_avail_count = c_uint8()
 
-c_uint8 r_verify_is_consumed = c_uint8()
 
-
-
- - - - diff --git a/a02536.png b/a02536.png deleted file mode 100644 index 86aa031606dc7626ea0fb9a72da78d81934ff173..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 619 zcmeAS@N?(olHy`uVBq!ia0vp^2Y@($gBeIxq;!=5Dd_;85ZC|z{{xvX-h3_XKeXJ! zK(jz%`k5C84jcfA2T!`Z0w~8>666=m0OW&#In(Sb3=E9lJY5_^Dj46+y}N0%0*`BX z-mdSz?LR)(XPp?fUwN|8WV!1H9ep;5d=N`ZQ)X5^S;)ya>5B@B$EC@6Owl*AeqDZ9 z#XTYAAOq9odwWE7nN}aamGfNXC(n8AoK*d*?~X52Jh}XZ`h;1VJ_)iuyMKXc{&v+# zf0#G2d2D*}SZ~X>Nl%=={1Ynwf3BUubKA?f`tRlrlVagEcpf;DlfbY*Tc1H<=0(=H z^#^&~#Am#cznxIgc%zl!z;poy27f081{+RBh7T$%3snQeja! zIhmVjEo1QivP|3EUsP5(-nUkHd7}D4Fw=Kqdp(2Pm9Lln%-7C;7xn9VxA$hF`RkQ0 zNk_21)hs*sc(3cB%`dheQfUmiS(e*5`+VQ#WfB|j@0`9}=Bw|@e@X8`BlX))vT{wF zEOPURS-(@}S;&J8>r`K+XZk35N;L~iQ1N$im}E1P f<;)qjXYx{VueY95ntL3WEEqgp{an^LB{Ts5vpE - - - - - - -CryptoAuthLib: License - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
License
-
-
-

Replace mbedTLS ECDH Functions with hardware acceleration & hardware key security.

-

mbedTLS Interface Functions that enable mbedtls objects to use cryptoauthlib functions

-

Replace mbedTLS ECDSA Functions with hardware acceleration & hardware key security.

-

Subject to your compliance with these terms, you may use Microchip software and any derivatives exclusively with Microchip products. It is your responsibility to comply with third party license terms applicable to your use of third party software (including open source software) that may accompany Microchip software.

-

THIS SOFTWARE IS SUPPLIED BY MICROCHIP "AS IS". NO WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, APPLY TO THIS SOFTWARE, INCLUDING ANY IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL MICROCHIP BE LIABLE FOR ANY INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL LOSS, DAMAGE, COST OR EXPENSE OF ANY KIND WHATSOEVER RELATED TO THE SOFTWARE, HOWEVER CAUSED, EVEN IF MICROCHIP HAS BEEN ADVISED OF THE POSSIBILITY OR THE DAMAGES ARE FORESEEABLE. TO THE FULLEST EXTENT ALLOWED BY LAW, MICROCHIP'S TOTAL LIABILITY ON ALL CLAIMS IN ANY WAY RELATED TO THIS SOFTWARE WILL NOT EXCEED THE AMOUNT OF FEES, IF ANY, THAT YOU HAVE PAID DIRECTLY TO MICROCHIP FOR THIS SOFTWARE.

-

(c) 2018 Microchip Technology Inc. and its subsidiaries. You may use this software and any derivatives exclusively with Microchip products.

-

THIS SOFTWARE IS SUPPLIED BY MICROCHIP "AS IS". NO WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, APPLY TO THIS SOFTWARE, INCLUDING ANY IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE, OR ITS INTERACTION WITH MICROCHIP PRODUCTS, COMBINATION WITH ANY OTHER PRODUCTS, OR USE IN ANY APPLICATION.

-

IN NO EVENT WILL MICROCHIP BE LIABLE FOR ANY INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL LOSS, DAMAGE, COST OR EXPENSE OF ANY KIND WHATSOEVER RELATED TO THE SOFTWARE, HOWEVER CAUSED, EVEN IF MICROCHIP HAS BEEN ADVISED OF THE POSSIBILITY OR THE DAMAGES ARE FORESEEABLE. TO THE FULLEST EXTENT ALLOWED BY LAW, MICROCHIPS TOTAL LIABILITY ON ALL CLAIMS IN ANY WAY RELATED TO THIS SOFTWARE WILL NOT EXCEED THE AMOUNT OF FEES, IF ANY, THAT YOU HAVE PAID DIRECTLY TO MICROCHIP FOR THIS SOFTWARE.

-

MICROCHIP PROVIDES THIS SOFTWARE CONDITIONALLY UPON YOUR ACCEPTANCE OF THESE TERMS.

- -

Subject to your compliance with these terms, you may use Microchip software and any derivatives exclusively with Microchip products. It is your responsibility to comply with third party license terms applicable to your use of third party software (including open source software) that may accompany Microchip software.

-

THIS SOFTWARE IS SUPPLIED BY MICROCHIP "AS IS". NO WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, APPLY TO THIS SOFTWARE, INCLUDING ANY IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL MICROCHIP BE LIABLE FOR ANY INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL LOSS, DAMAGE, COST OR EXPENSE OF ANY KIND WHATSOEVER RELATED TO THE SOFTWARE, HOWEVER CAUSED, EVEN IF MICROCHIP HAS BEEN ADVISED OF THE POSSIBILITY OR THE DAMAGES ARE FORESEEABLE. TO THE FULLEST EXTENT ALLOWED BY LAW, MICROCHIP'S TOTAL LIABILITY ON ALL CLAIMS IN ANY WAY RELATED TO THIS SOFTWARE WILL NOT EXCEED THE AMOUNT OF FEES, IF ANY, THAT YOU HAVE PAID DIRECTLY TO MICROCHIP FOR THIS SOFTWARE.

-
-
-
- - - - diff --git a/a02826.html b/a02826.html deleted file mode 100644 index af2c79a37..000000000 --- a/a02826.html +++ /dev/null @@ -1,127 +0,0 @@ - - - - - - - -CryptoAuthLib: IP Protection with Symmetric Authentication - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
IP Protection with Symmetric Authentication
-
-
-

n

-

The IP protection can be easily integrated to the existing projects.The user project should include symmetric_authentication.c & symmetric_authentication.h files which contains the api

-

-User Considerations

-
    -
  • The user should take care on how the master key should be stored on the MCU side.
  • -
  • The api's in the file doesn't do the provisioning of the chip and user should take care of the provisioning.
  • -
-

With the provisioned cryptoauthentication device and after doing the cryptoauthlib initialisation,user should only be calling the function symmetric_authenticate() with its necessary parameters for the authentication. The returned authentication status should be used in the application.

-

-Examples

-

For more information about IP protection and its example project refer Microchip github

-
-
-
- - - - diff --git a/a02827.html b/a02827.html deleted file mode 100644 index 6e8188a0f..000000000 --- a/a02827.html +++ /dev/null @@ -1,345 +0,0 @@ - - - - - - - -CryptoAuthLib: PKCS11 Application Information - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
PKCS11 Application Information
-
-
-

n

-

-Setting up cryptoauthlib as a PKCS11 Provider for your system (LINUX)

-

These instructions are for building, installing and configuring cryptoauthlib as a pkcs11 provider. These instructions are for commonly available Linux systems with package managers.

-

-Update libp11 on the system. The version should be at minimum 0.4.10

-
    -
  • Install the build dependendencies for the system:

    -
    # Debian like systems
    -
    $ sudo apt-get build-dep libengine-pkcs11-openssl1.1
    -
    # RPM based systems
    -
    $ yum-builddep engine-pkcs11
    -
  • -
  • Change to a sane directory

    -
    cd ~
    -
  • -
  • Get the latest version of libp11

    -
    $ git clone https://github.com/OpenSC/libp11.git
    -
  • -
  • Rerun the build configuration tools:

    -
    $ cd libp11
    -
    $ ./bootstrap
    -
    $ ./configure
    -
  • -
  • Build the library:

    -
    $ make
    -
  • -
  • Install the library:

    -
    $ sudo make install
    -
  • -
-

-Build and Install cryptoauthlib with PKCS11 support

-
    -
  • Install the build dependendencies for the system:

    -
    # Debian like systems
    -
    $ sudo apt-get install cmake libudev-dev
    -
    # RPM based systems
    -
    $ yum install cmake
    -
    $ yum install libudev-devel
    -
  • -
  • Change to a sane directory

    -
    cd ~
    -
  • -
  • Get the latest version of cryptoauthlib with PKCS11 support

    -
    $ git clone https://github.com/MicrochipTech/cryptoauthlib
    -
  • -
  • Rerun the build configuration tools:

    -
    $ cd cryptoauthlib
    -
    $ cmake -DATCA_PKCS11=ON .
    -
  • -
  • Build the library:

    -
    $ make
    -
  • -
  • Install the library:

    -
    $ sudo make install
    -
  • -
-

-Configuring the cryptoauthlib PKCS11 library

-

By default the following files will be created.

-
    -
  • /etc/cryptoauthlib/cryptoauthlib.conf

    -
    # Cryptoauthlib Configuration File
    -
    filestore = /var/lib/cryptoauthlib
    -
  • -
  • /var/lib/cryptoauthlib/slot.conf.tmpl

    -
    # Reserved Configuration for a device
    -
    # The objects in this file will be created and marked as undeletable
    -
    # These are processed in order. Configuration parameters must be comma
    -
    # delimited and may not contain spaces
    -
    -
    interface = i2c,0xB0
    -
    freeslots = 1,2,3
    -
    -
    # Slot 0 is the primary private key
    -
    object = private,device,0
    -
    -
    # Slot 10 is the certificate data for the device's public key
    -
    #object = certificate,device,10
    -
    -
    # Slot 12 is the intermedate/signer certificate data
    -
    #object = certificate,signer,12
    -
    -
    # Slot 15 is a public key
    -
    object = public,root,15
    -
  • -
-

-cryptoauthlib.conf

-

This file provides the basic configuation information for the library. The only variable is "filestore" which is where cryptoauthlib will find device specific configuration and where it will store object files from pkcs11 operations.

-

-slot.conf.tmpl

-

This is a template for device configuration files that cryptoauthlib will use to map devices and their resources into pkcs11 tokens and objects.

-

A device file must be named <pkcs11_slot_number>.conf

-

For a single device:

-
$ cd /var/lib/cryptoauthlib
-
$ cp slot.conf.tmpl 0.conf
-

Then edit 0.conf to match the device configuration being used.

-

-interface

-

Allows values: 'hid', 'i2c' If using i2c specify the address in hex for the device. This is in the device format (upper 7 bits define the address) so will not appear the same as the i2cdetect address (lower 7 bits)

-

-freeslots

-

This is a list of slots that may be used by the library when a pkcs11 operation that creates new objects is used. When the library is initialized it will scan for files of the form <pkcs11_slot_num>.<device_slot_num>.conf which defines the object using that device resource.

-

-Using p11-kit-proxy

-

This is an optional step but is very helpful for using multiple pkcs11 libraries in a system. Detailed setup can be found at p11-glue

-
# Debian like systems
-
$ sudo apt-get install p11-kit
-
# RPM based systems
-
$ yum install p11-kit
-
    -
  • Create or edit the global configuration file /etc/pkcs11/pkcs11.conf. The directory /etc/pkcs11 may require creation first.

    -
    # This setting controls whether to load user configuration from the
    -
    # ~/.config/pkcs11 directory. Possible values:
    -
    # none: No user configuration
    -
    # merge: Merge the user config over the system configuration (default)
    -
    # only: Only user configuration, ignore system configuration
    -
    user-config: merge
    -
  • -
  • Create a module configuration file.
      -
    • User module name (only available for a single user): ~/.config/pkcs11/modules/cryptoauthlib.module
    • -
    • Global module name (available to the whole system): /usr/share/p11-kit/modules/cryptoauthlib.module

      -
      module: /usr/lib/libcryptoauth.so
      -
      critical: yes
      -
      trust-policy: yes
      -
      managed: yes
      -
      log-calls: no
      -
    • -
    -
  • -
-

For more details on the configuration files see the configuration documentation.

-

-Without using p11-kit-proxy

-

OpenSSL (via the libp11 project above) and p11tool support p11-kit-proxy natively so do not require additional set up if it is being used. If p11-kit-proxy is not being used then OpenSSL will have to be manually configured to use libp11 and cryptoauthlib

-

This requires editing the default openssl.cnf file. To locate the file being used by the system run the following command:

-
$ openssl version -a | grep OPENSSLDIR:
-
-
OPENSSLDIR: "/usr/lib/ssl"
-

This gives the default path where openssl is compiled to find the openssl.cnf file

-

In this case the file to edit will be /usr/lib/ssl/openssl.cnf

-

This line must be placed at the top, before any sections are defined:

-
openssl_conf = openssl_init
-

This should be added to the bottom of the file:

-
[openssl_init]
-
engines=engine_section
-
-
[engine_section]
-
pkcs11 = pkcs11_section
-
-
[pkcs11_section]
-
engine_id = pkcs11
-
# Wherever the engine installed by libp11 is. For example it could be:
-
# /usr/lib/arm-linux-gnueabihf/engines-1.1/libpkcs11.so
-
dynamic_path = /usr/lib/ssl/engines/libpkcs11.so
-
MODULE_PATH = /usr/lib/libcryptoauth.so
-
init = 0
-

-Testing

-

To use p11tool it has to be installed:

-
# Debian like systems
-
$ sudo apt-get install gnutls-bin
-
# RPM based systems
-
$ yum install gnutls-utils
-

Note: If not using p11-kit-proxy then the provider has to be specified in p11tool calls:

-
$ p11tool --provider=/usr/lib/libcryptoauth.so
-
    -
  • Get the public key for a private key (as defined by the 0.conf file cited above):

    -
    $ p11tool --export-pubkey "pkcs11:token=0123EE;object=device;type=private"
    -
    warning: --login was not specified and it may be required for this operation.
    -
    warning: no --outfile was specified and the public key will be printed on screen.
    -
    -----BEGIN PUBLIC KEY-----
    -
    MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9wzUq1EUAoNrG01rXYjNd35mxKuA
    -
    Ojw/klIrNEBciSLLOTLjs/gvFS7N8AFXDK18vpxxu6ykzF2LRd7RY8yEFw==
    -
    -----END PUBLIC KEY-----
    -
  • -
  • Get the public key and decode it using OpenSSL

    -
    $ p11tool --export-pubkey "pkcs11:token=0123EE;object=device;type=private" | openssl pkey -pubin -text -noout
    -
    warning: --login was not specified and it may be required for this operation.
    -
    warning: no --outfile was specified and the public key will be printed on screen.
    -
    Public-Key: (256 bit)
    -
    pub:
    -
    04:f7:0c:d4:ab:51:14:02:83:6b:1b:4d:6b:5d:88:
    -
    cd:77:7e:66:c4:ab:80:3a:3c:3f:92:52:2b:34:40:
    -
    5c:89:22:cb:39:32:e3:b3:f8:2f:15:2e:cd:f0:01:
    -
    57:0c:ad:7c:be:9c:71:bb:ac:a4:cc:5d:8b:45:de:
    -
    d1:63:cc:84:17
    -
    ASN1 OID: prime256v1
    -
    NIST CURVE: P-256
    -
  • -
  • Create a CSR for the private key

    -
    $ openssl req -engine pkcs11 -key "pkcs11:token=0123EE;object=device;type=private" -keyform engine -new -out new_device.csr -subj "/CN=NEW CSR EXAMPLE"
    -
    engine "pkcs11" set.
    -
    -
    $ cat new_device.csr
    -
    -----BEGIN CERTIFICATE REQUEST-----
    -
    MIHVMHwCAQAwGjEYMBYGA1UEAwwPTkVXIENTUiBFWEFNUExFMFkwEwYHKoZIzj0C
    -
    AQYIKoZIzj0DAQcDQgAE9wzUq1EUAoNrG01rXYjNd35mxKuAOjw/klIrNEBciSLL
    -
    OTLjs/gvFS7N8AFXDK18vpxxu6ykzF2LRd7RY8yEF6AAMAoGCCqGSM49BAMCA0kA
    -
    MEYCIQDUPeLfPcOwtZxYJDYXPdl2UhpReVn6kK2lKCCX6byM8QIhAIfqfnggtcCi
    -
    W21xLAzabr8A4mHyfIIQ1ofYBg8QO9jZ
    -
    -----END CERTIFICATE REQUEST-----
    -
  • -
  • Verify the newly created csr

    -
    $ openssl req -in new_device.csr -verify -text -noout
    -
    verify OK
    -
    Certificate Request:
    -
    Data:
    -
    Version: 1 (0x0)
    -
    Subject: CN = NEW CSR EXAMPLE
    -
    Subject Public Key Info:
    -
    Public Key Algorithm: id-ecPublicKey
    -
    Public-Key: (256 bit)
    -
    pub:
    -
    04:f7:0c:d4:ab:51:14:02:83:6b:1b:4d:6b:5d:88:
    -
    cd:77:7e:66:c4:ab:80:3a:3c:3f:92:52:2b:34:40:
    -
    5c:89:22:cb:39:32:e3:b3:f8:2f:15:2e:cd:f0:01:
    -
    57:0c:ad:7c:be:9c:71:bb:ac:a4:cc:5d:8b:45:de:
    -
    d1:63:cc:84:17
    -
    ASN1 OID: prime256v1
    -
    NIST CURVE: P-256
    -
    Attributes:
    -
    a0:00
    -
    Signature Algorithm: ecdsa-with-SHA256
    -
    30:46:02:21:00:d4:3d:e2:df:3d:c3:b0:b5:9c:58:24:36:17:
    -
    3d:d9:76:52:1a:51:79:59:fa:90:ad:a5:28:20:97:e9:bc:8c:
    -
    f1:02:21:00:87:ea:7e:78:20:b5:c0:a2:5b:6d:71:2c:0c:da:
    -
    6e:bf:00:e2:61:f2:7c:82:10:d6:87:d8:06:0f:10:3b:d8:d9
    -
  • -
-
-
-
- - - - diff --git a/a02828.html b/a02828.html deleted file mode 100644 index 6b5d382f4..000000000 --- a/a02828.html +++ /dev/null @@ -1,118 +0,0 @@ - - - - - - - -CryptoAuthLib: Application Support - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Application Support
-
-
-

This directory is for application specific implementation of various use cases.

-

Methods in this directory provide a simple API to perform potentially complex combinations of calls to the main library or API.

-

app_info_ip_prot

-

app_info_pkcs11

-

app_info_secure_boot

-
-
-
- - - - diff --git a/a02829.html b/a02829.html deleted file mode 100644 index e19a6903f..000000000 --- a/a02829.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - -CryptoAuthLib: Secure boot using ATECC608 - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Secure boot using ATECC608
-
-
-

8

-

The SecureBoot command is a new feature on the ATECC608A device compared to earlier CryptoAuthentication devices from Microchip. This feature helps the MCU to identify fraudulent code installed on it. When this feature is implemented, the MCU can send a firmware digest and signature to the ATECC608. The ATECC608 validates this information (ECDSA verify) and responds to host with a yes or no answer.

-

The ATECC608 provides options to reduce the firmware verification time by storing the signature or digest after a good full verification (FullStore mode of the SecureBoot command).

-
    -
  • When the ATECC608 stores the digest (SecureBootMode is FullDig), the host only needs to send the firmware digest, which is compared to the stored copy. This skips the comparatively lengthy ECDSA verify, speeding up the secure boot process.
  • -
  • When the ATECC608 stores the signature (SecureBootMode is FullSig), the host only needs to send the firmware digest, which is verified against the stored signature using ECDSA. This saves time by not needing to send the signature in the command over the bus.
  • -
-

The ATECC608 also provides wire protection features for the SecureBoot command, which can be used to encrypt the digest being sent from the host to the ATECC608 and add a MAC to the verify result coming back to the host so it can't be forced to a success state. This feature makes use of a shared secret between the host and ATECC608, called the IO protection key.

-

The secure boot feature can be easily integrated to an existing project. The project should include the following files from the secure_boot folder:

-

The project should also implement the following platform-specific APIs:

    -
  • secure_boot_init_memory()
  • -
  • secure_boot_read_memory()
  • -
  • secure_boot_deinit_memory()
  • -
  • secure_boot_mark_full_copy_completion()
  • -
  • secure_boot_check_full_copy_completion()
  • -
  • io_protection_get_key()
  • -
  • io_protection_set_key()
  • -
-

The project can set the secure boot configuration with the following defines:

    -
  • SECURE_BOOT_CONFIGURATION
  • -
  • SECURE_BOOT_DIGEST_ENCRYPT_ENABLED
  • -
  • SECURE_BOOT_UPGRADE_SUPPORT
  • -
-

The secure boot process is performed by initializing CryptoAuthLib and calling the secure_boot_process() function.

-

-Implementation Considerations

-
    -
  • Need to perform SHA256 calculations on the host. CryptoAuthLib provides a software implementation in lib/crypto/atca_crypto_sw_sha2.c
  • -
  • When using the wire protection features:
      -
    • The host needs to be able to generate a nonce (number used once). This is the NumIn parameter to the Nonce command that is sent before the SecureBoot command. The ATECC608 can not be used to generate NumIn, but it should come from a good random or non-repeating source in the host.
    • -
    • If the host has any protected internal memory, it should be used to store its copy of the IO protection key.
    • -
    -
  • -
  • Secure boot depends on proper protections of the boot loader code in the host. If the code can be easily changed, then the secure boot process can be easily skipped. Boot loader should ideally be stored in an immutable (unchangeable) location like a boot ROM or write-protected flash.
  • -
  • Note that these APIs don't provision the ATECC608. They assume the ATECC608 has already been configured and provisioned with the necessary keys for secure boot.
  • -
-

-Examples

-

For more information about secure boot, please see the example implementation project and documentation at: https://github.com/MicrochipTech/cryptoauth_usecase_secureboot

-
-
-
- - - - diff --git a/a02831.html b/a02831.html deleted file mode 100644 index e57b75f7b..000000000 --- a/a02831.html +++ /dev/null @@ -1,121 +0,0 @@ - - - - - - - -CryptoAuthLib: Contribution Guidelines - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Contribution Guidelines
-
-
-

While this is an open source project there are a few considerations that make it somewhat unique in how it is managed. The first issue is that the development workflow is a hybrid between internal development and CI/CD systems and external develop and associated CI/CD systems.

-
    -
  • This project contains a mixture of licenses depending on the section. The vast majority is under a Microchip proprietary license that is restrictive.
  • -
  • Contributors must be aware of the specific license they are working under and must be aware that by submitting the patch that they agree to the terms of the license covering the target file.
  • -
  • Sources contained in the third_party path are covered by true open source licenses and as such are not bound by Microchip's license restrictions.
  • -
  • Third party contributions for HALs must be licensed under MIT, BSD (3 clause), or Apache 2.0 license and are placed in third_party/hal/<platform>
  • -
  • Pull requests (PR) must attest to reviewing of these rules, that licensing terms have been reviewed, the submitter has approval to submit the changes under the target license terms.
  • -
-
-
-
- - - - diff --git a/a02836.html b/a02836.html deleted file mode 100644 index 457485a3f..000000000 --- a/a02836.html +++ /dev/null @@ -1,114 +0,0 @@ - - - - - - - -CryptoAuthLib: openssl directory - Purpose - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
openssl directory - Purpose
-
-
-

This directory contains the interfacing and wrapper functions to integrate openssl as the software crypto library.

-
-
-
- - - - diff --git a/a02837.html b/a02837.html deleted file mode 100644 index 3660ef437..000000000 --- a/a02837.html +++ /dev/null @@ -1,251 +0,0 @@ - - - - - - - -CryptoAuthLib: Python CryptoAuthLib module - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Python CryptoAuthLib module
-
-
-

-Introduction

-

This module provides a thin python ctypes layer to evaluate the cryptoauthlib interface to Microchip CryptoAuthentication devices.

-

-Code Examples

-

Code examples for python are available on github as part of CryptoAuthTools under the python/examples directory

-

-Installation

-

-CryptoAuthLib python module can be installed through Python's pip tool:

-
pip install cryptoauthlib
-

-To upgrade your installation when new releases are made:

-
pip install -U cryptoauthlib
-

-If you ever need to remove your installation:

-
pip uninstall cryptoauthlib
-

-What does python CryptoAuthLib package do?

-

CryptoAuthLib module gives access to most functions available as part of standard cryptoauthlib (which is written in 'C'). These python functions for the most part are very similar to 'C' functions. The module in short acts as a wrapper over the 'C' cryptoauth library functions.

-

Microchip cryptoauthlib product page: Link

-

-Supported hardware

- -

-Supported devices

-

The family of devices supported currently are:

- -

-Using cryptoauthlib python module

-

The following is a 'C' code made using cryptoauthlib 'C' library.

-
#include "cryptoauthlib.h"
-
-
void main()
-
{
-
ATCA_STATUS status;
-
uint8_t revision[4];
-
uint8_t randomnum[32];
-
-
status = atcab_init(cfg_ateccx08a_kitcdc_default);
-
if (status != ATCA_SUCCESS)
-
{
-
printf("Error");
-
exit();
-
}
-
-
status = atcab_info(revision);
-
if (status != ATCA_SUCCESS)
-
{
-
printf("Error");
-
exit();
-
}
-
-
status = atcab_random(randomnum);
-
if (status != ATCA_SUCCESS)
-
{
-
printf("Error");
-
exit();
-
}
-
}
-
#define ATCA_SUCCESS
Definition: atca_status.h:44
-
Single aggregation point for all CryptoAuthLib header files.
-
ATCA_STATUS atcab_random(uint8_t *rand_out)
Executes Random command, which generates a 32 byte random number from the device.
Definition: atca_basic.c:2453
-
ATCA_STATUS atcab_info(uint8_t *revision)
Use the Info command to get the device revision (DevRev).
Definition: atca_basic.c:1693
-
ATCA_STATUS atcab_init(ATCAIfaceCfg *cfg)
Creates a global ATCADevice object used by Basic API.
Definition: atca_basic.c:133
-

The same code in python would be:

-
from cryptoauthlib import *
-
-
ATCA_SUCCESS = 0x00
-
revision = bytearray(4)
-
randomnum = bytearray(32)
-
-
# Locate and load the compiled library
-
load_cryptoauthlib()
-
-
assert ATCA_SUCCESS == atcab_init(cfg_ateccx08a_kithid_default())
-
-
assert ATCA_SUCCESS == atcab_info(revision)
-
print(''.join(['%02X ' % x for x in revision]))
-
-
assert ATCA_SUCCESS == atcab_random(randomnum)
-
print(''.join(['%02X ' % x for x in randomnum]))
-

In the above python code, "import cryptoauthlib" imports the python module. load_cryptoauthlib() function loads the compiled library. The load_cryptoauthlib() is a function that you will not see in the 'C' library, this is a python specific utility function and is required for python scripts to locate and load the compiled library.

-

-In Summary

-

-Step I: Import the module

-
from cryptoauthlib import *
-

-Step II: Initilize the module

-
load_cryptoauthlib()
-
-
assert ATCA_SUCCESS == atcab_init(cfg_ateccx08a_kithid_default())
-

-Step III: Use Cryptoauthlib APIs

-

Call library APIs of your choice

-

-Code portability

-

Microchip's CryptoAuthentication products can now be evaluated with the power and flexibility of python. Once the evaluation stage is done the python code can be ported to 'C' code.

-

As seen above the python API maintains a 1 to 1 equivalence to the 'C' API in order to easy the transition between the two.

-

-Cryptoauthlib module API documentation

-

-help() command

-

All of the python function's documentation can be viewed through python's built in help() function.

-

For example, to get the documentation of atcab_info() function:

-
>>> help(cryptoauthlib.atcab_info)
-
Help on function atcab_info in module cryptoauthlib.atcab:
-
-
atcab_info(revision)
-
Used to get the device revision number. (DevRev)
-
-
Args:
-
revision 4-byte bytearray receiving the revision number
-
from the device. (Expects bytearray)
-
-
Returns:
-
Status code
-

-dir() command

-

The dir command without arguments, return the list of names in the current local scope. With an argument, attempt to return a list of valid attributes for that object. For example dir(cryptoauthlib) will return all the methods available in the cryptoauthlib module.

-

-Code Examples

-

Code examples for python are available on github as part of CryptoAuthTools under the python/examples directory

-

-Tests

-

Module tests can be located in the python/tests of the main cryptoauthlib repository. The README.md has details for how to run the tests. The module tests are not comprehensive for the entire functionality of cryptoauthlib but rather are meant to test the python module code only against the library to ensure the interfaces are correct and ctypes structures match the platform.

-

-Release notes

-

See Release Notes

-
-
-
- - - - diff --git a/a02838.html b/a02838.html deleted file mode 100644 index bae934a59..000000000 --- a/a02838.html +++ /dev/null @@ -1,134 +0,0 @@ - - - - - - - -CryptoAuthLib: Python CryptoAuthLib Module Testing - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Python CryptoAuthLib Module Testing
-
-
-

-Introduction

-

These tests are designed to only test the python interface to the library and are not designed to test the library itself which is covered by the main cryptoauthlib tests

-

-Running

-

The best way to run the test suite is to use tox which can be easily installed with pip:

-
$ pip install tox
-

From the python folder:

-
:~/cryptoauthlib/python $ tox
-

It is possible to directly run tests but requires more setup

-

1) Install pytest

-
$ pip install pytest
-

2) Modify the PYTHONPATH environment variable

-

Windows:

cryptoauthlib/python> set PYTHONPATH=<path_to>/cryptoauthlib/python
-

Linux:

$ export PYTHONPATH=${PYTHONPATH}:<path_to>/cryptoauthlib/python
-

3) Run the tests

$ pytest -vv
-

-Test options

-

There are additional options that can be invoked with the tests that define what tests will be run

-

1) –with-lib will attempt to run tests against the compiled c library. These tests are good for detecting possible platform incompabilities between the C compiler and the expectations of python

-

2) –with-device will attempt to invoke some tests with a real attached device These tests are restricted to only the minimum required to verify the python to library connectivity and are only meant to detect situations can can not be determined from the library tests alone.

-
-
-
- - - - diff --git a/a02839.html b/a02839.html deleted file mode 100644 index fdc590ceb..000000000 --- a/a02839.html +++ /dev/null @@ -1,713 +0,0 @@ - - - - - - - -CryptoAuthLib: Microchip Cryptoauthlib Release Notes - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Microchip Cryptoauthlib Release Notes
-
-
-

-Release v3.7.5 (06/26/2024)

-

-New Features

-
    -
  • In PKCS11 module, added ECCP384,ECCP521,ECCP224 elliptic curves support for ECC key operations, in addition to the existing ECCP256 support
  • -
  • Enhanced certificate related tests to include coverage for ECC204 and TA010 devices
  • -
  • Added a new ATCA_HEAP internal macro check in place of ATCA_NO_HEAP for dynamic memory usages
    -
  • -
  • Added an additional test to validate AES-CBC encrypt/decrypt APIs using CAVP's AES multiblock message test (MMT) sample vectors
  • -
  • See [talib/CHANGES.md] for details on talib module changes
  • -
-

-Fixes

-
    -
  • Fixed atcacert_get_comp_cert() API to support certificates with expiry dates beyond year 2031
  • -
  • Fixed atcacert_read_cert() API to consider serial number as source while processing extracted certificates
  • -
  • Fixed atcacert_write_cert() API to support X509 certificates with an odd byte length, without any additional padding
  • -
  • Fixed calib_execute_send() to consider correct data buffer when ATCA_HAL_LEGACY_API is used
  • -
  • PKCS11 layer fixes/updates
      -
    • Fixed certificate chain/key export failures in ECC608 Trust devices
    • -
    • Fixed memory leak during C_Finalize API call usage in a multi-slot configuration
    • -
    -
  • -
-

-API Changes

-
    -
  • Added atcacert_generate_sn() API in atcacert module to generate certificate serial number from a valid serial number source
  • -
-

-Release v3.7.4 (03/08/2024)

-

-New Features

-
    -
  • Updated wolfSSL interface atcac wrapper APIs usage for AES GCM encrypt/decrypt similar to MbedTLS and openSSL library wrapper APIs
  • -
  • Added package.yml file to support MPLAB Harmony metadata package format
  • -
-

-Fixes

-
    -
  • Fixed calib_wakeup_i2c API to follow specified i2c wakeup sequence for ECC608 devices
  • -
  • PKCS11 layer fixes/updates
      -
    • Lock usage optimization in pkcs11_find_continue API
    • -
    • pkcs11_digest API updates for SHA context memory allocation
    • -
    • pkcs11_token_set_pin API updates to write data based on generated GCM key size
    • -
    -
  • -
  • Fixed atcacert_get_comp_cert API to remove a redundant atcacert_date_enc_compcert call
  • -
  • Resolved build warnings/issues in Windows, Linux and 8-bit (XC8) platforms
  • -
  • wolfSSL's atcac_pk_init_pem wrapper API updates to use wc_ PEM to DER functions
  • -
  • Fixed broken links in README.md files
  • -
-

-Release v3.7.3 (01/31/2024)

-

-New Features

-
    -
  • In PKCS11 module, added cache support to store Key id attribute of key type objects into stack memory and use it for subsequent accesses
  • -
-

-Fixes

-
    -
  • Fixed calib_sha_hmac_finish api to set mode value correctly for ECC204, TA010 and ECC608 devices
  • -
  • Fixed memory leak in MbedTLS configuration
  • -
  • Fixed build errors when a project is generated with PKCS11 Component enabled in MPLAB Harmony Configurator (MHC)
  • -
-

-Release v3.7.2 (01/19/2024)

-

-New Features

-
    -
  • See [talib/CHANGES.md] for details on talib module changes
  • -
-

-Fixes

-
    -
  • Updated PKCS11 token info to list TA101 device details
  • -
  • Fixed compilation errors when ECC508 device is enabled
  • -
  • See [talib/CHANGES.md] for details on talib module fixes
  • -
-

-API Changes

-
    -
  • Added sign and verfy API in talib module to support 1024 bytes ED25519 mode
  • -
-

-Release v3.7.1 (12/15/2023)

-

-New Features

-
    -
  • PKCS11 module enhancements for x509 public key certificates
      -
    • Added more certificate attributes to x509 public key certificates. These attributes include certificate start date, certificate end date, subject, subject key, DER encoded certificate issuer name, DER encoded certificate serial number and hash of the issuer public key.
    • -
    • Added cache support to store these certificates into stack memory and utilize it for parsing the above specified certificate attributes.
    • -
    -
  • -
  • See [talib/CHANGES.md] for details on talib module changes
  • -
-

-Fixes

-
    -
  • Updated atcab_read_config_zone to support SHA106
  • -
  • For Linux platforms, i2c baud rate is always set to 100 khz as the default configuration
  • -
  • Resolved build errors when ATCA_USE_SHARED_MUTEX is disabled
  • -
  • Resolved build error with ATCA_JWT_EN
  • -
-

-API Changes

-
    -
  • Added atcacert_get_subject api to get the subject name from public x509 certificates
  • -
  • Added atcacert_get_issuer api to get the issuer name from public x509 certificates
  • -
  • Updated the atcacert_def_s structure to include x509 full certificates support
  • -
-

-Release v3.7.0 (09/08/2023)

-

-New Features

-
    -
  • Added unified buffer implementation to enable multipart buffer use with APIs that support them.
  • -
  • See [talib/CHANGES.md] for details on talib module changes
  • -
-

-Fixes

-
    -
  • Made atcac structures referencing third party libraries opaque to the user so installed header files are usable by applications without also including the third party headers.
  • -
-

-API Changes

-
    -
  • The software crypto structures are generally no longer typedef'd so they must be declared with the struct keyword. New typedefs were added by appending the suffix _t which allows for the same mechanism for declaring these structure in code if building a standalone application (such as in embedded projects). If dynamically linking with the library and using a third party crypto library one will need to use the _new & _free APIs to allocate these structures for use with the atcac interfaces.
  • -
-

-Release v3.6.1 (07/14/2023)

-

-New Features

-
    -
  • Added support for PIC18 memory model with a MAX_PACKET_SIZE setting.
  • -
  • PKCS11 Improvement to support context reservation automatically for operations that span multiple pkcs11 calls such as login/logout, encrypt/decrypt, etc. This prevents concurrent processes from interupting init-update-finish operations in PKCS11
  • -
  • Added support for data element transfers between trust anchor devices
  • -
-

-Fixes

-
    -
  • PKCS11: resolved issues with configuration directory parsing to ensure configurations parse in the correct order and any extraneous files get properly rejected.
  • -
  • PKCS11: improved public key loading logic for trust anchor handles to use the most appropriate mechanism based on handle configuration.
  • -
  • Fixed minimal kit host implementation in support bridging to SPI by using select and deselect control commands
  • -
-

-Release v3.6.0 (04/04/2023)

-

-New Features

-
    -
  • Compliance certified to CERT-C Level 2 & MISRA 2012. Compliance reports can be requested from your FAE or account manager
  • -
  • Added talib_handle helper functions to determine if a handle access type is allowed in the given auth session
  • -
-

-Fixes

-
    -
  • pkcs11 public key for private keys requiring the token to be logged in will make a best effort to return a value by detecting various storage methods.
  • -
  • pkcs11 encrypt/decrypt update calls return the maximum possible bytes per the selected algorithm.
  • -
  • pkcs7 would return the wrong padding for length % 16 == 0
  • -
  • hmac counter kdf method will default to digest length specified in bits
  • -
-

-API Changes

-
    -
  • ATCA_STATUS enum is now an integer and all APIs return type ATCA_STATUS
  • -
  • atcacert API return type is now ATCA_STATUS rather than int
  • -
  • atcac_sw_sha... API return type is now ATCA_STATUS rather than int
  • -
  • _atcab_exit has been removed (includes _calib_exit and _talib_exit)
  • -
  • _gDevice has been renamed to g_atcab_device_ptr (one should be using atcab_get_device())
  • -
-

-Release v3.5.1 (03/26/2023)

-

-New Features

-
    -
  • Add support for SHA104, SHA105, & SHA106
  • -
-

-Release v3.5.0 (03/14/2023)

-

-New Features

-
    -
  • Add support for ECC204, TA010 and framework for future devices
  • -
-

-Release v3.4.3 (12/23/2022)

-

-New Features

-
    -
  • Add key load mode flags for FCE config command
  • -
-

-Fixes

-
    -
  • WPC certificate reconstruction buffer length was too short
  • -
  • ECC204 block Read/Write did not write remaining bytes if the provided buffer was not padded to a 32 byte bounary
  • -
  • TA100 lock CRC was being passed with the native endianness.
  • -
  • ECC204 nonce command was missing the mode bit to emit a random number when called with the intention of producing random bytes
  • -
-

-Release v3.4.2 (12/04/2022)

-

-Fixes

-
    -
  • PKCS11: Correct init/deinit failures from initialization mutex options. These would manifest as a segmentation fault on deinit, unterminated authorization sessions, or library already initialized return codes based on the configuration and inititialization data.
  • -
  • PKCS11: Added configuration option to always terminate authorization sessions on library initialization to work around applications that may fail to call C_CloseSession or C_Finalize before exiting.
  • -
  • PKCS11: Fix failures in C_DigestInit resulting from failing to check the session state before checking the requested digest mechanism type.
  • -
  • PKCS11: Modify how the library returns public key information based on access levels of the private key (generate from the private key if allowed, read from a linked public key, and finally return data unavailable). For the vast majority of situtations this prevents openssl & libp11 from crashing with segmentation faults if the user fails to provide a pkcs11 URI with pin value specified. These segmentation faults were confirmed to also exist with other PKCS11 libraries - the fundamental problem should be taken up with the maintainers of openssl, libp11, and pkcs11-provider (experimental OpenSSL 3.0 PKCS11 support).
  • -
  • Modified CBC update/finish APIs (added as an experimental API in v3.4.0) to match standard expectations of how the APIs would function. Updated algorithm tests to reflect this usage.
  • -
  • PKCS11: Updated encrypt/decrypt in cbc/cbcpad modes to use the updated algorithm implementations
  • -
  • talib full element read & write functions now account for the maximum packet size based on session state.
  • -
-

-Release v3.4.1 (11/11/2022)

-

-Fixes

-
    -
  • test_atcacert_build_start_signer modified to verify the structure fields since the structure is no longer packed
  • -
  • Python ctypes_to_bytes routine to work for all python versions
  • -
  • Pkcs11 signature rules to match section 5.2 of the specification
  • -
  • Compilation error when PKCS11 monotonic counter is enabled
  • -
  • Compiletion error when no HALs are specified during configuration
  • -
  • Align ECC204 and cryptoauth counter APIs
  • -
-

-Release v3.4.0 (10/27/2022)

-

-New Features

-
    -
  • Added framework for fine grain library configuration including configuration check header files <api>_config_check.h see lib/atca_config_check.h for the top level header
  • -
  • Added WPC application files with reference message generation/parsing and library configuration file to optimize to the smallest footprint
  • -
  • TA100 read/write apis updated to segment incoming buffer into partial read/write operations if it exceeds the maximum supported packet size
  • -
  • Added PKCS7 padding algorithm for use with AES-CBC
  • -
  • Expose PKCS11 configuration options to CMake configuration
  • -
-

-Fixes

-
    -
  • Improve ECC204 apis to match cryptoauthlib apis and abstract the device differences
  • -
  • Support for strict C99 compliance and clean up warnings from -Wall and pedantic levels
  • -
  • Add rsa2048 key size support to talib_rsaenc command
  • -
  • Fix for ta100 devupdate to set the proper auth session exit flags so the library will properly reconnect when the ta100 reboots
  • -
  • Fix ECC608 verify failure when ReqRandom bit is set for a stored public key by using tempkey in this situation rather than the message digest buffer. See the ECC608 datasheet for more details of this special condition
  • -
  • Improve ta100 auth session handling of long messages by reporting the message size exceeds the wrapped message limit earlier in the packet creation process
  • -
  • Fixes and Improvements for PKCS11 interface based on compliance testing
  • -
-

-Release v3.3.3 (10/06/2021)

-

-New features

-
    -
  • Added Zephyr support and zephyr driver api HALs for I2C & SPI. Adding cryptoauthlib to a zephyr project CMakeLists.txt is now possible - use subdirectory(cryptoauthlib/lib). One can also include the repo in the west manifest
  • -
  • Added SWI device support for linux platforms using hardware uarts
  • -
  • Added contributing guidelines and PR process documentation
  • -
  • SWI bitbang driver for harmony - supports Atmel SWI and ECC204 protocols
  • -
-

-Fixes

-
    -
  • Wolfssl build errors when generating MHC projects containing wolfssl
  • -
  • Removed zero length aad limitation in CCM implementation
  • -
  • Changed ECC204 zone identifiers and slot types to align with cryptoauthlib standard forms
  • -
  • XC8/XC16 build warnings
  • -
  • Several pkcs11 fixes - token_init deadlock, null num_in for private key writes, fsecret key length parsing, object_create failing, etc
  • -
  • Null pointer access violation in atcab_release when using a native hal and double free in openssl implementation of atcac_pk_verify
  • -
-

-Release v3.3.2 (06/20/2021)

-

-New features

-
    -
  • All memory allocations now go through the hal_ platform definitions. In harmony these are the OSAL_ fuctions which work with any of the supported RTOS'.
  • -
  • Enable multiple intefaces in the Harmony 3 test project through the user interface.
  • -
  • Kit protocol over UART has been added. This can be paired with the included hosting application
  • -
  • Simple kit protocol hosting application has been added. It is available in app/kit_host and through Harmony 3. This is a preview release of the application.
  • -
-

-Fixes

-
    -
  • Enable ATSHA206A api in the python extension
  • -
  • Made the linux i2c configuration default to 100khz so they should work again without having to make modifications to the baud rate field.
  • -
  • Fix pkcs11 static configuration option when used with the trust platform configuration file
  • -
  • Fix PKCS11 ec_point return value when pValue is null (libp11 checks the size in this manner before requesting it for real).
  • -
  • Fix warnings generated by missing end of file newlines.
  • -
  • Removed legacy (empty) START header references.
  • -
-

-Release v3.3.1 (04/23/2021)

-

-New features

-
    -
  • Core support for kit protocol over serial ports (i.e. tty/COM ports)
  • -
  • PKCS11 support for TA100 auth sessions
  • -
-

-Fixes

-
    -
  • Fix mbedtls integration combinations that would produce unexpected behavior. All variations of sign/verify _ALT now work as expected given a configured key (for example if a key is configured as a stored public and VERIFY_ALT is enabled then library will perform a stored key verify rather than an external public key load and verify)
  • -
  • Added mbedtls integration tests to confirm that integrations are working on a target platform as expected. These generally bootstrap using NIST example vectors before using the validated functions/algorithms to test the remaining integration.
  • -
  • Clean up warnings when run with very strict settings (-Wall -Wextra -pedantic -Werror)
  • -
  • Fix false wake errors when baud rate switching for I2C
  • -
  • Fix for I2C errors that could be created on the bus when there are devices on the bus that support general calls - this fix should also correct linux zero length kernel messages when enabled.
  • -
  • Fix ESP32 HAL to work with the updated HAL structure.
  • -
-

-Release v3.3.0 (01/22/2021)

-

-API Updates

-
    -
  • HAL API has been signifiantly revised to improve portability. This update simplies the requirements of each HAL to only the physical transport mechanisms. Please see the hal porting and library upgrading notes: https://github.com/MicrochipTech/cryptoauthlib/wiki/Upgrading-to-v3.3
  • -
  • Internal structures have been updated by removing obsolete elements and combining mandatory fields. This saves significant memory in both program and data regions.
  • -
  • Inclusive language update: all remaining legacy language elements have been updated. Where this impacts the external API there is the option ATCA_ENABLE_DEPRECATED to use the previous names.
  • -
-

-New features

-
    -
  • ECC204 support has been added with one wire HAL support.
  • -
  • ECC204, SHA206, one wire and single wire (uart and gpio) hals have been added to the Harmony 3 configurator.
  • -
  • PKCS11 support for symmetric (AES & HMAC) keys has been added and enabled for additional mechanisms such as HMAC signing and AES encrypt/decrypt
  • -
-

-Fixes

-
    -
  • pkcs11_token_init had several conditions that were corrected
  • -
  • fix to detect differences in i2c clock rate specifications between flexcom and sercom configurators in Harmony 3 and the emit the correct value for the cryptoauthlib interface config structure.
  • -
-

-Release v3.2.5 (11/30/2020)

-

-New features

-
    -
  • TA100 ShareKey API to drive the sharekey process (requires NDA, consult with your FAE or submit a request through your myMicrochip account)
  • -
  • Additional software crypto library interface functions for asymmetric cryptography (sign, verify, ecdh, etc)
  • -
  • XC8 & XC16 compiler support
  • -
  • AES CCM & CBC-MAC upper layer API using AES-ECB primatives
  • -
-

-Fixes

-
    -
  • TA100 AES-GCM auth session tx packet length when command data is included
  • -
  • PKCS11 Pin length check rejecting valid pin lengths
  • -
  • aes-gcm nist vector test failed with mbedtls crypto backend due to aad update not being executed when aad length was zero
  • -
-

-Release v3.2.4 (10/17/2020)

-

-New features

-
    -
  • Additional TA100 command support (requires NDA, consult with your FAE or submit a request through your myMicrochip account)
  • -
  • Library build and install on linux now also installs the headers that were used to build the library including all configuration files like atca_config.h - customer applications building against the library will need to add the include/cryptoauthlib to their include search paths
  • -
-

-Fixes

-
    -
  • Fixed errors produced when -fno-common was used during build of the library by resolving the variable declaration and exporting macros (tested with static/dynamic linkage on linux & windows platforms)
  • -
  • Added a timeout during i2c plib commands in the Harmony3 hals to prevent system lockups from failed peripheral transfers that don't return errors.
  • -
-

-Release v3.2.3 (09/12/2020)

-

-New features

-
    -
  • Additional TA100 command support (requires NDA, consult with your FAE or submit a request through your myMicrochip account)
  • -
-

-Fixes

-
    -
  • Security patch for USB HALs. Removed deprecated HALs and removed enumeration from the hidapi HAL.
  • -
  • Fix device matching logic to support older kits when using "auto detect" settings in the interface configuration
  • -
  • Fix SPI HAL generation errors for SAMG55 & SAM71 (flexcom) devices
  • -
  • Added a timeout for Harmony I2C calls to prevent infinite loops on peripheral failures. If a loop exists inside the peripheral library then it may still cause processor spins until a watchdog reset.
  • -
-

-Release v3.2.2 (07/28/2020)

-

-New Features

-
    -
  • ATECC608B support added
  • -
-

-Fixes

-
    -
  • Consistent null pointer checks between calib & talib apis. Tracing enabled for most all status changes
  • -
  • Fix for pkcs11 ecdh with the legacy slot write mode and encrypted read to pull the read key id from the correct slot (private key slot | 0x01)
  • -
  • call the proper api from atcab_init_ext so it works with device structures that are not the global instance
  • -
-

-Release v3.2.1 (06/29/2020)

-

-Fixes

-
    -
  • PKCS11 configuration option to set token label to the device serial number
  • -
  • Fix OSX CLANG macro error
  • -
  • Add missing c++ wrapper macros to calib_basic.h
  • -
  • Ensure atcab_init_ext calls atcab_release_ext rather than atcab_release
  • -
-

-Release v3.2.0 (06/10/2020)

-

-New features

-
    -
  • TA100 device support (requires NDA, consult with your FAE or submit a request through your myMicrochip account)
  • -
  • Extension of the existing API to support device context retention to allow multiple independent contexts to be maintained. The application still needs to ensure concurrency protections are used in the application to guard bus communication.
  • -
  • PKCS11 support has been moved into the main library and will be maintained together.
  • -
  • TNG/TFLEX support has been added to PKCS11 so enabling a TNG part in pkcs11 can be done by specifying the part number: device = ATECC608A-TNGTLS
  • -
  • Several cryptographic library integrations have been added to enable additional host/mcu side functionality. This includes replacing cryptoauthlib software implementations of sha1 & sha256 with your preferred library. For example using WolfSSL in Harmony 3 will also enable hardware acceleration of those cryptographic functions. Cryptographic libraries enabled: WolfSSL, mbedTLS, & OpenSSL
  • -
  • Changes to atcacert ("compressed" certificate processing) to enable exact certificate size retrival which will help with some use cases that had issues with the max possible size answers.
  • -
  • Consolidation of HALs into device families rather than exact processor model This should reduce the amount of effort required to port the library to a specific platform if the framework is one that is already known.
  • -
-

-Known issues

-
    -
  • Power modes/states for the TA100 are not automatically controlled by the library so the application has to manually change the power state when lower power modes are required. A command such as the info command will wake the TA100 from sleep but will produce an error. Try another command after the specified time to ensure communication is restored. This behavior is detailed in the datasheet.
  • -
  • Several TA100 commands and features are planned for the next released of the library such as import/export, transfer, and devupdate.
  • -
-

-Release v3.1.1 (03/06/2020)

-
    -
  • Update Trust Flex certificates. Add compile time options to reduce code space by selectively including the trust certificates that are required
  • -
  • Python updates: add sha206 apis. Fix atcab_kdf parameters
  • -
  • Fix compiler warnings in test application files and sha206 api
  • -
-

-Release v3.1.0 (02/05/2020)

-
    -
  • The library is now semantic versioned along with the legacy date versioning. Python will continue to be released with the date version. Version APIs have been updated.
  • -
  • Configuration is done via a configuration file atca_config.h rather than global compiler options. You have to add this file to your project to support this version of the library.
  • -
  • Harmony 3 support has been added. Update harmony configurator (and content loader) or manually clone crytoauthlib into your harmony directory.
  • -
  • Additional Compiler support has been added for IAR-ARM and ARMCC
  • -
-

-Release 11/22/2019

-
    -
  • Patches for CVE-2019-16128 & CVE-2019-16129: Ensure reported packet length is valid for the packet being processed.
  • -
  • Improvement to encrypted read operations to allow supply of a host nonce (prevent replay of a read sequence to the host). Default API is changed but can be reverted by setting the option ATCA_USE_CONSTANT_HOST_NONCE
  • -
  • Added Azure compatible TNGTLS and TNGLORA certificates. Use the TNG client API to retrieve the proper certificate based on the device.
  • -
  • Misc Python updates (updated APIs for encrypted reads to match the C-API change) atcacert_cert_element_t now initializes properly
  • -
-

-Release 08/30/2019

-
    -
  • Added big-endian architecture support
  • -
  • Fixes to atcah_gen_dig() and atcah_nonce()
  • -
-

-Release 05/17/2019

-
    -
  • Added support for TNG devices (cert transforms, new API)
  • -
  • atcab_write_pub_key() now works when the data zone is unlocked
  • -
-

-Release 03/04/2019

-
    -
  • mbed TLS wrapper added
  • -
  • Minor bug fixes
  • -
-

-Release 01/25/2019

-
    -
  • Python JWT support
  • -
  • Python configuration structures added
  • -
  • Restructure of secure boot app
  • -
-

-Release 01/04/2019

-
    -
  • Added GCM functions
  • -
  • Split AES modes into separate files
  • -
  • Bug fix in SWI START driver
  • -
-

-Release 10/25/2018

-
    -
  • Added basic certificate functions to the python wrapper.
  • -
  • Added Espressif ESP32 I2C driver.
  • -
  • Made generic Atmel START drivers to support most MCUs in START.
  • -
  • Added AES-CTR mode functions.
  • -
  • Python wrapper functions now return single values with AtcaReference.
  • -
  • Added mutex support to HAL and better support for freeRTOS.
  • -
-

-Release 08/17/2018

-
    -
  • Better support for multiple kit protocol devices
  • -
-

-Release 07/25/2018

-
    -
  • Clean up python wrapper
  • -
-

-Release 07/18/2018

-
    -
  • Added ATCA_NO_HEAP define to remove use of malloc/free.
  • -
  • Moved PEM functions to their own file in atcacert.
  • -
  • Added wake retry to accomodate power on self test delay.
  • -
  • Added ca_cert_def member to atcacert_def_s so cert chains can be traversed as a linked list.
  • -
-

-Release 03/29/2018

-
    -
  • Added support for response polling by default, which will make commands return faster (define ATCA_NO_POLL to use old delay method).
  • -
  • Removed atcatls related files as they were of limited value.
  • -
  • Test framework generates a prompt before locking test configuration.
  • -
  • Test framework puts device to sleep between tests.
  • -
  • Fixed mode parameter issue in atcah_gen_key_msg().
  • -
  • ATECC608A health test error code added.
  • -
-

-Release 01/15/2018

-
    -
  • Added AES-128 CBC implementation using AES command
  • -
  • Added AES-128 CMAC implementation using AES command
  • -
-

-Release 11/22/2017

-
    -
  • Added support for FLEXCOM6 on SAMG55 driver
  • -
-

-Release 11/17/2017

-
    -
  • Added library support for the ATECC608A device
  • -
  • Added support for Counter command
  • -
  • atca_basic functions and tests now split into multiple files based on command
  • -
  • Added support for multiple base64 encoding rules
  • -
  • Added support for JSON Web Tokens (jwt)
  • -
  • Fixed atcab_write_enc() function to encrypt the data even when the device is unlocked
  • -
  • Fixed atcab_base64encode_() for the extra newline
  • -
  • Updated atcab_ecdh_enc() to work more consistently
  • -
-

-Release 07/01/2017

-
    -
  • Removed assumption of SN[0:1]=0123, SN[8]=EE. SN now needs to be passed in for functions in atca_host and atca_basic functions will now read the config zone for the SN if needed.
  • -
  • Renamed atcab_gendig_host() to atcab_gendig() since it's not a host function. Removed original atcab_gendig(), which had limited scope.
  • -
  • Fixed atcah_hmac() for host side HMAC calculations. Added atcab_hmac().
  • -
  • Removed unnecessary ATCADeviceType parameters from some atca_basic functions.
  • -
  • Added atcacert_create_csr() to create a signed CSR.
  • -
  • New HAL implementation for Kit protocol over HID on Linux. Please see the Incorporating CryptoAuthLib in a Linux project using USB HID devices section in this file for more information.
  • -
  • Added atcacert_write_cert() for writing certificates to the device.
  • -
  • Added support for dynamic length certificate serial numbers in atcacert.
  • -
  • Added atcab_write() for lower level write commands.
  • -
  • Fixed atcah_write_auth_mac(), which had wrong OpCode.
  • -
  • Added atcab_verify() command for lower level verify commands.
  • -
  • Added atcab_verify_stored() for verifying data with a stored public key.
  • -
  • Removed atcab_write_bytes_slot(). Use atcab_write_bytes_zone() instead.
  • -
  • Modified atcab_write_bytes_zone() and atcab_read_bytes_zone() to specify a slot
  • -
  • Added atcab_verify_validate() and atcab_verify_invalidate()
  • -
  • Improvements to host functions to handle more cases.
  • -
  • Added atcab_updateextra(), atcab_derive_key()
  • -
  • Added support for more certificate formats.
  • -
  • Added general purpose hardware SHA256 functions. See atcab_hw_sha2_256().
  • -
  • Removed device specific config read/write. Generic now handles both.
  • -
  • Removed unnecessary response parameter from lock commands.
  • -
  • Enhanced and added unit tests.
  • -
  • Encrypted read and write functions now handle keys with SlotConfig.NoMac set
  • -
  • atcab_cmp_config_zone() handles all devices now.
  • -
  • Fixed some edge cases in atcab_read_bytes_zone().
  • -
  • Updated atSHA() to work with all devices.
  • -
  • Fixed atcacert_get_device_locs() when using stored sn.
  • -
-

-Release 01/08/2016

-
    -
  • New HAL implementations for
      -
    • Single Wire interface for SAMD21 / SAMR21
    • -
    • SAMV71 I2C HAL implementation
    • -
    • XMega A3Bu HAL implementation
    • -
    -
  • -
  • Added atcab_version() method to return current version string of libary to application
  • -
  • New Bus and Discovery API
      -
    • returns a list of ATCA device configurations for each CryptoAuth device found
    • -
    • currently implemented on SAMD21/R21 I2C, SAMV71
    • -
    • additional discovery implementations to come
    • -
    -
  • -
  • TLS APIs solidified and documented
  • -
  • Added missing doxygen documentation for some CryptoAuthLib methods
  • -
  • Stubs for HAL SPI removed as they are unused for SHA204A and ECC508A support
  • -
  • bug fixes
  • -
  • updated atcab_sha() to accept a variable length message that is > 64 bytes and not a multiple of 64 bytes (the SHA block size).
  • -
  • refactored Cert I/O and Cert Data tests to be smaller
  • -
  • 'uncrustify' source formatting
  • -
  • published on GitHub
  • -
-

-Release 9/19/2015

-
    -
  • Kit protocol over HID on Windows
  • -
  • Kit protocol over CDC on Linux
  • -
  • TLS integration with ATECC508A
  • -
  • Certificate I/O and reconstruction
  • -
  • New SHA2 implementation
  • -
  • Major update to API docs, Doxygen files found in cryptoauthlib/docs
  • -
  • load cryptoauthlib/docs/index.html with your browser
  • -
-
-
-
- - - - diff --git a/a02840.html b/a02840.html deleted file mode 100644 index 0c27d6fb3..000000000 --- a/a02840.html +++ /dev/null @@ -1,140 +0,0 @@ - - - - - - - -CryptoAuthLib: Security Policy - - - - - - - - - - - - - - -
-
- - - - - - - - -
-
CryptoAuthLib v3.7.5 -
-
Microchip CryptoAuthentication Library
-
- -   - - - - -
-
-
- - - -
-
- -
-
-
- -
- -
-
- - -
-
-
-
-
-
Loading...
-
Searching...
-
No Matches
-
-
-
-
- -
-
Security Policy
-
-
-

We take the security of cryptoauthlib very seriously. Please submit security vulnerabilities to the Microchip Product Security Incident Response Team (PSIRT) which is responsible for receiving and responding to reports of potential security vulnerabilities in our products, as well as in any related hardware, software, firmware, and tools. Please see below for instructions on how to submit your report.

-

-Supported Versions

-

The previous API version is maintained for a year after a new version is released.

- - - - - - - - - - - - - - - - - -
Version Supported Notes
3.7.x :heavy_check_mark:
3.6.x :heavy_check_mark: Support Ends September 8 2024
3.5.x :heavy_check_mark: Support Ends April 4 2024
3.4.x :heavy_check_mark: Support Ends March 14 2024
3.3.x :x:
3.2.x :x:
< 3.2 :x:
-

-Reporting a Vulnerability

-

How to Report Potential Product Security Vulnerabilities

-

Once a report is received, the PSIRT will take the necessary steps to review the issue and determine what actions might be required to address any potential impacts to our products. Microchip PSIRT follows a coordinated vulnerability responsible disclosure policy that is available for review.

-

Please use the above instructions to securely submit your findings - We ask that you refrain from reporting vulnerabilties through the public github issues system.

-
-
-
- - - - diff --git a/annotated.html b/annotated.html index 552d67799..df2771597 100644 --- a/annotated.html +++ b/annotated.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -102,266 +102,268 @@
Here are the data structures with brief descriptions:
[detail level 123]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
 Ncryptoauthlib
 Ncryptoauthlib
 Ncryptoauthlib_mock
 Nsetup
 C_ascii_kit_host_context
 C_kit_host_map_entry
 Catca_check_mac_in_outInput/output parameters for function atcah_check_mac()
 Catca_decrypt_in_outInput/output parameters for function atca_decrypt()
 Catca_delete_in_outInput/Output paramters for calculating the mac.Used with Delete command
 Catca_derive_key_in_outInput/output parameters for function atcah_derive_key()
 Catca_derive_key_mac_in_outInput/output parameters for function atcah_derive_key_mac()
 Catca_deviceAtca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods
 Catca_diversified_key_in_outInput/output parameters for function atcah_gendivkey()
 Catca_evp_ctx
 Catca_gen_dig_in_outInput/output parameters for function atcah_gen_dig()
 Catca_gen_key_in_outInput/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function
 Catca_hal_kit_phy_t
 Catca_hal_list_entry_tStructure that holds the hal/phy maping for different interface types
 Catca_hal_shm_t
 Catca_hmac_in_outInput/output parameters for function atca_hmac()
 Catca_i2c_host_s
 Catca_ifaceAtca_iface is the context structure for a configured interface
 Catca_include_data_in_outInput / output parameters for function atca_include_data()
 Catca_io_decrypt_in_out
 Catca_mac_in_outInput/output parameters for function atca_mac()
 Catca_mbedtls_eckey_s
 Catca_nonce_in_outInput/output parameters for function atca_nonce()
 Catca_plib_i2c_api
 Catca_resp_mac_in_outInput/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function
 Catca_secureboot_enc_in_out
 Catca_secureboot_mac_in_out
 Catca_session_key_in_outInput/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function
 Catca_sha256_ctx
 Catca_sign_internal_in_outInput/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function
 Catca_spi_host_s
 Catca_temp_keyStructure to hold TempKey fields
 Catca_uart_host_s
 Catca_verify_in_outInput/output parameters for function atcah_verify()
 Catca_verify_mac
 Catca_write_mac_in_outInput/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac()
 Catcac_aes_cmac_ctx
 Catcac_aes_gcm_ctx
 Catcac_hmac_ctx
 Catcac_pk_ctx
 Catcac_sha1_ctx
 Catcac_sha2_256_ctx
 Catcac_x509_ctx
 Catcacert_build_state_s
 Catcacert_cert_element_s
 Catcacert_cert_loc_s
 Catcacert_def_s
 Catcacert_device_loc_s
 Catcacert_tm_utc_s
 CATCAHAL_tHAL Driver Structure
 CatcaI2CmasterThis is the hal_data for ATCA HAL for ASF SERCOM
 CATCAIfaceCfg
 CATCAPacket
 CatcaSWImasterThis is the hal_data for ATCA HAL for ASF SERCOM
 Catecc508a_config_s
 Catecc608_config_s
 Catsha204a_config_s
 Ccal_buffer_s
 CCK_AES_CBC_ENCRYPT_DATA_PARAMS
 CCK_AES_CCM_PARAMS
 CCK_AES_CTR_PARAMS
 CCK_AES_GCM_PARAMS
 CCK_ARIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_ATTRIBUTE
 CCK_C_INITIALIZE_ARGS
 CCK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_CAMELLIA_CTR_PARAMS
 CCK_CCM_PARAMS
 CCK_CMS_SIG_PARAMS
 CCK_DATE
 CCK_DES_CBC_ENCRYPT_DATA_PARAMS
 CCK_DSA_PARAMETER_GEN_PARAM
 CCK_ECDH1_DERIVE_PARAMS
 CCK_ECDH2_DERIVE_PARAMS
 CCK_ECDH_AES_KEY_WRAP_PARAMS
 CCK_ECMQV_DERIVE_PARAMS
 CCK_FUNCTION_LIST
 CCK_GCM_PARAMS
 CCK_GOSTR3410_DERIVE_PARAMS
 CCK_GOSTR3410_KEY_WRAP_PARAMS
 CCK_INFO
 CCK_KEA_DERIVE_PARAMS
 CCK_KEY_DERIVATION_STRING_DATA
 CCK_KEY_WRAP_SET_OAEP_PARAMS
 CCK_KIP_PARAMS
 CCK_MECHANISM
 CCK_MECHANISM_INFO
 CCK_OTP_PARAM
 CCK_OTP_PARAMS
 CCK_OTP_SIGNATURE_INFO
 CCK_PBE_PARAMS
 CCK_PKCS5_PBKD2_PARAMS
 CCK_PKCS5_PBKD2_PARAMS2
 CCK_RC2_CBC_PARAMS
 CCK_RC2_MAC_GENERAL_PARAMS
 CCK_RC5_CBC_PARAMS
 CCK_RC5_MAC_GENERAL_PARAMS
 CCK_RC5_PARAMS
 CCK_RSA_AES_KEY_WRAP_PARAMS
 CCK_RSA_PKCS_OAEP_PARAMS
 CCK_RSA_PKCS_PSS_PARAMS
 CCK_SEED_CBC_ENCRYPT_DATA_PARAMS
 CCK_SESSION_INFO
 CCK_SKIPJACK_PRIVATE_WRAP_PARAMS
 CCK_SKIPJACK_RELAYX_PARAMS
 CCK_SLOT_INFO
 CCK_SSL3_KEY_MAT_OUT
 CCK_SSL3_KEY_MAT_PARAMS
 CCK_SSL3_MASTER_KEY_DERIVE_PARAMS
 CCK_SSL3_RANDOM_DATA
 CCK_TLS12_KEY_MAT_PARAMS
 CCK_TLS12_MASTER_KEY_DERIVE_PARAMS
 CCK_TLS_KDF_PARAMS
 CCK_TLS_MAC_PARAMS
 CCK_TLS_PRF_PARAMS
 CCK_TOKEN_INFO
 CCK_VERSION
 CCK_WTLS_KEY_MAT_OUT
 CCK_WTLS_KEY_MAT_PARAMS
 CCK_WTLS_MASTER_KEY_DERIVE_PARAMS
 CCK_WTLS_PRF_PARAMS
 CCK_WTLS_RANDOM_DATA
 CCK_X9_42_DH1_DERIVE_PARAMS
 CCK_X9_42_DH2_DERIVE_PARAMS
 CCK_X9_42_MQV_DERIVE_PARAMS
 CCL_HashContext
 Cdevice_execution_time_tStructure to hold the device execution time and the opcode for the corresponding command
 Cdevtype_names_t
 Ci2c_sam0_instance
 Ci2c_sam_instance
 Ci2c_start_instance
 Cmemory_parameters
 Cpcks11_mech_table_e
 Cpkcs11_attrib_model_s
 Cpkcs11_conf_filedata_s
 Cpkcs11_dev_ctx
 Cpkcs11_dev_res
 Cpkcs11_dev_state
 Cpkcs11_ecc_key_info_s
 Cpkcs11_lib_ctx_s
 Cpkcs11_object_cache_s
 Cpkcs11_object_s
 Cpkcs11_session_ctx_s
 Cpkcs11_session_mech_ctx_s
 Cpkcs11_slot_ctx_s
 Csecure_boot_config_bits
 Csecure_boot_parameters
 Csw_sha256_ctx
 Ctng_cert_map_element
 C_ascii_kit_host_context
 C_kit_host_map_entry
 Catca_check_mac_in_outInput/output parameters for function atcah_check_mac()
 Catca_decrypt_in_outInput/output parameters for function atca_decrypt()
 Catca_delete_in_outInput/Output paramters for calculating the mac.Used with Delete command
 Catca_derive_key_in_outInput/output parameters for function atcah_derive_key()
 Catca_derive_key_mac_in_outInput/output parameters for function atcah_derive_key_mac()
 Catca_deviceAtca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods
 Catca_diversified_key_in_outInput/output parameters for function atcah_gendivkey()
 Catca_evp_ctx
 Catca_gen_dig_in_outInput/output parameters for function atcah_gen_dig()
 Catca_gen_key_in_outInput/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function
 Catca_hal_kit_phy_t
 Catca_hal_list_entry_tStructure that holds the hal/phy maping for different interface types
 Catca_hal_shm_t
 Catca_hmac_in_outInput/output parameters for function atca_hmac()
 Catca_i2c_host_s
 Catca_ifaceAtca_iface is the context structure for a configured interface
 Catca_include_data_in_outInput / output parameters for function atca_include_data()
 Catca_io_decrypt_in_out
 Catca_mac_in_outInput/output parameters for function atca_mac()
 Catca_mbedtls_eckey_s
 Catca_nonce_in_outInput/output parameters for function atca_nonce()
 Catca_resp_mac_in_outInput/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function
 Catca_secureboot_enc_in_out
 Catca_secureboot_mac_in_out
 Catca_session_key_in_outInput/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function
 Catca_sha256_ctx
 Catca_sign_internal_in_outInput/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function
 Catca_spi_host_s
 Catca_temp_keyStructure to hold TempKey fields
 Catca_uart_host_s
 Catca_verify_in_outInput/output parameters for function atcah_verify()
 Catca_verify_mac
 Catca_write_mac_in_outInput/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac()
 Catcac_aes_cmac_ctx
 Catcac_aes_gcm_ctx
 Catcac_hmac_ctx
 Catcac_pk_ctx
 Catcac_sha1_ctx
 Catcac_sha2_256_ctx
 Catcac_sha2_384_ctx
 Catcac_sha2_512_ctx
 Catcac_x509_ctx
 Catcacert_build_state_s
 Catcacert_cert_element_s
 Catcacert_cert_loc_s
 Catcacert_def_s
 Catcacert_device_loc_s
 Catcacert_tm_utc_s
 CATCAHAL_tHAL Driver Structure
 CatcaI2CmasterThis is the hal_data for ATCA HAL for ASF SERCOM
 CATCAIfaceCfg
 CATCAPacket
 CatcaSWImasterThis is the hal_data for ATCA HAL for ASF SERCOM
 Catecc508a_config_s
 Catecc608_config_s
 Catsha204a_config_s
 Ccal_buffer_s
 CCK_AES_CBC_ENCRYPT_DATA_PARAMS
 CCK_AES_CCM_PARAMS
 CCK_AES_CTR_PARAMS
 CCK_AES_GCM_PARAMS
 CCK_ARIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_ATTRIBUTE
 CCK_C_INITIALIZE_ARGS
 CCK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_CAMELLIA_CTR_PARAMS
 CCK_CCM_PARAMS
 CCK_CMS_SIG_PARAMS
 CCK_DATE
 CCK_DES_CBC_ENCRYPT_DATA_PARAMS
 CCK_DSA_PARAMETER_GEN_PARAM
 CCK_ECDH1_DERIVE_PARAMS
 CCK_ECDH2_DERIVE_PARAMS
 CCK_ECDH_AES_KEY_WRAP_PARAMS
 CCK_ECMQV_DERIVE_PARAMS
 CCK_FUNCTION_LIST
 CCK_GCM_PARAMS
 CCK_GOSTR3410_DERIVE_PARAMS
 CCK_GOSTR3410_KEY_WRAP_PARAMS
 CCK_INFO
 CCK_KEA_DERIVE_PARAMS
 CCK_KEY_DERIVATION_STRING_DATA
 CCK_KEY_WRAP_SET_OAEP_PARAMS
 CCK_KIP_PARAMS
 CCK_MECHANISM
 CCK_MECHANISM_INFO
 CCK_OTP_PARAM
 CCK_OTP_PARAMS
 CCK_OTP_SIGNATURE_INFO
 CCK_PBE_PARAMS
 CCK_PKCS5_PBKD2_PARAMS
 CCK_PKCS5_PBKD2_PARAMS2
 CCK_RC2_CBC_PARAMS
 CCK_RC2_MAC_GENERAL_PARAMS
 CCK_RC5_CBC_PARAMS
 CCK_RC5_MAC_GENERAL_PARAMS
 CCK_RC5_PARAMS
 CCK_RSA_AES_KEY_WRAP_PARAMS
 CCK_RSA_PKCS_OAEP_PARAMS
 CCK_RSA_PKCS_PSS_PARAMS
 CCK_SEED_CBC_ENCRYPT_DATA_PARAMS
 CCK_SESSION_INFO
 CCK_SKIPJACK_PRIVATE_WRAP_PARAMS
 CCK_SKIPJACK_RELAYX_PARAMS
 CCK_SLOT_INFO
 CCK_SSL3_KEY_MAT_OUT
 CCK_SSL3_KEY_MAT_PARAMS
 CCK_SSL3_MASTER_KEY_DERIVE_PARAMS
 CCK_SSL3_RANDOM_DATA
 CCK_TLS12_KEY_MAT_PARAMS
 CCK_TLS12_MASTER_KEY_DERIVE_PARAMS
 CCK_TLS_KDF_PARAMS
 CCK_TLS_MAC_PARAMS
 CCK_TLS_PRF_PARAMS
 CCK_TOKEN_INFO
 CCK_VERSION
 CCK_WTLS_KEY_MAT_OUT
 CCK_WTLS_KEY_MAT_PARAMS
 CCK_WTLS_MASTER_KEY_DERIVE_PARAMS
 CCK_WTLS_PRF_PARAMS
 CCK_WTLS_RANDOM_DATA
 CCK_X9_42_DH1_DERIVE_PARAMS
 CCK_X9_42_DH2_DERIVE_PARAMS
 CCK_X9_42_MQV_DERIVE_PARAMS
 CCL_HashContext
 Cdevice_execution_time_tStructure to hold the device execution time and the opcode for the corresponding command
 Cdevtype_names_t
 Ci2c_sam0_instance
 Ci2c_sam_instance
 Ci2c_start_instance
 Cmemory_parameters
 Cpcks11_mech_table_e
 Cpkcs11_attrib_model_s
 Cpkcs11_conf_filedata_s
 Cpkcs11_dev_ctx
 Cpkcs11_dev_res
 Cpkcs11_dev_state
 Cpkcs11_ecc_key_info_s
 Cpkcs11_key_info_s
 Cpkcs11_lib_ctx_s
 Cpkcs11_object_cache_s
 Cpkcs11_object_s
 Cpkcs11_rsa_key_info_s
 Cpkcs11_session_ctx_s
 Cpkcs11_session_mech_ctx_s
 Cpkcs11_slot_ctx_s
 Csecure_boot_config_bits
 Csecure_boot_parameters
 Ctng_cert_map_element
diff --git a/annotated_dup.js b/annotated_dup.js index 0e13c7398..24a8c79b6 100644 --- a/annotated_dup.js +++ b/annotated_dup.js @@ -1,275 +1,277 @@ var annotated_dup = [ - [ "cryptoauthlib", "a01451.html", [ - [ "atcab", "a01452.html", [ - [ "atca_aes_cbc_ctx", "a02144.html", null ], - [ "atca_aes_cbcmac_ctx", "a02168.html", null ], - [ "atca_aes_ccm_ctx", "a02164.html", null ], - [ "atca_aes_cmac_ctx", "a02148.html", null ], - [ "atca_aes_ctr_ctx", "a02152.html", null ], - [ "atca_aes_gcm_ctx", "a02160.html", null ], - [ "atca_hmac_sha256_ctx", "a02172.html", null ], - [ "atca_sha256_ctx", "a02156.html", null ] + [ "cryptoauthlib", "a01478.html", [ + [ "atcab", "a01479.html", [ + [ "atca_aes_cbc_ctx", "a02179.html", null ], + [ "atca_aes_cbcmac_ctx", "a02203.html", null ], + [ "atca_aes_ccm_ctx", "a02199.html", null ], + [ "atca_aes_cmac_ctx", "a02183.html", null ], + [ "atca_aes_ctr_ctx", "a02187.html", null ], + [ "atca_aes_gcm_ctx", "a02195.html", null ], + [ "atca_hmac_sha256_ctx", "a02207.html", null ], + [ "atca_sha256_ctx", "a02191.html", null ] ] ], - [ "atcacert", "a01453.html", [ - [ "atcacert_cert_element_t", "a02216.html", null ], - [ "atcacert_cert_loc_t", "a02212.html", null ], - [ "atcacert_cert_sn_src_t", "a02180.html", null ], - [ "atcacert_cert_type_t", "a02176.html", null ], - [ "atcacert_comp_data_t", "a02204.html", null ], - [ "atcacert_date_format_t", "a02192.html", null ], - [ "atcacert_def_t", "a02220.html", null ], - [ "atcacert_device_loc_t", "a02208.html", null ], - [ "atcacert_device_zone_t", "a02184.html", null ], - [ "atcacert_std_cert_element_t", "a02196.html", null ], - [ "atcacert_tm_utc_t", "a02224.html", null ], - [ "atcacert_transform_t", "a02188.html", null ], - [ "CertStatus", "a02200.html", null ] + [ "atcacert", "a01480.html", [ + [ "atcacert_cert_element_t", "a02251.html", null ], + [ "atcacert_cert_loc_t", "a02247.html", null ], + [ "atcacert_cert_sn_src_t", "a02215.html", null ], + [ "atcacert_cert_type_t", "a02211.html", null ], + [ "atcacert_comp_data_t", "a02239.html", null ], + [ "atcacert_date_format_t", "a02227.html", null ], + [ "atcacert_def_t", "a02255.html", null ], + [ "atcacert_device_loc_t", "a02243.html", null ], + [ "atcacert_device_zone_t", "a02219.html", null ], + [ "atcacert_std_cert_element_t", "a02231.html", null ], + [ "atcacert_tm_utc_t", "a02259.html", null ], + [ "atcacert_transform_t", "a02223.html", null ], + [ "CertStatus", "a02235.html", null ] ] ], - [ "atcaenum", "a01454.html", [ - [ "AtcaEnum", "a02228.html", null ] + [ "atcaenum", "a01481.html", [ + [ "AtcaEnum", "a02263.html", null ] ] ], - [ "atjwt", "a01455.html", [ - [ "HwEcAlgorithm", "a02232.html", "a02232" ], - [ "HwHmacAlgorithm", "a02236.html", "a02236" ], - [ "PyJWT", "a02240.html", null ] + [ "atjwt", "a01482.html", [ + [ "HwEcAlgorithm", "a02267.html", "a02267" ], + [ "HwHmacAlgorithm", "a02271.html", "a02271" ], + [ "PyJWT", "a02275.html", null ] ] ], - [ "device", "a01456.html", [ - [ "AesEnable", "a02244.html", null ], - [ "Atecc508aConfig", "a02300.html", null ], - [ "Atecc608Config", "a02304.html", null ], - [ "Atsha204aConfig", "a02296.html", null ], - [ "ChipMode508", "a02256.html", null ], - [ "ChipMode608", "a02260.html", null ], - [ "ChipOptions", "a02284.html", null ], - [ "Counter204", "a02264.html", null ], - [ "CountMatch", "a02252.html", null ], - [ "I2cEnable", "a02248.html", null ], - [ "KeyConfig", "a02292.html", null ], - [ "SecureBoot", "a02280.html", null ], - [ "SlotConfig", "a02268.html", null ], - [ "UseLock", "a02272.html", null ], - [ "VolatileKeyPermission", "a02276.html", null ], - [ "X509Format", "a02288.html", null ] + [ "device", "a01483.html", [ + [ "AesEnable", "a02279.html", null ], + [ "Atecc508aConfig", "a02335.html", null ], + [ "Atecc608Config", "a02339.html", null ], + [ "Atsha204aConfig", "a02331.html", null ], + [ "ChipMode508", "a02291.html", null ], + [ "ChipMode608", "a02295.html", null ], + [ "ChipOptions", "a02319.html", null ], + [ "Counter204", "a02299.html", null ], + [ "CountMatch", "a02287.html", null ], + [ "I2cEnable", "a02283.html", null ], + [ "KeyConfig", "a02327.html", null ], + [ "SecureBoot", "a02315.html", null ], + [ "SlotConfig", "a02303.html", null ], + [ "UseLock", "a02307.html", null ], + [ "VolatileKeyPermission", "a02311.html", null ], + [ "X509Format", "a02323.html", null ] ] ], - [ "exceptions", "a01457.html", [ - [ "AssertionFailure", "a02416.html", null ], - [ "BadArgumentError", "a02356.html", null ], - [ "BadCrcError", "a02368.html", null ], - [ "BadOpcodeError", "a02404.html", null ], - [ "CheckmacVerifyFailedError", "a02328.html", null ], - [ "CommunicationError", "a02396.html", null ], - [ "ConfigZoneLockedError", "a02316.html", null ], - [ "CrcError", "a02336.html", null ], - [ "CryptoError", "a02308.html", null ], - [ "DataZoneLockedError", "a02320.html", null ], - [ "EccFaultError", "a02344.html", null ], - [ "ExecutionError", "a02408.html", null ], - [ "FunctionError", "a02348.html", null ], - [ "GenericError", "a02352.html", null ], - [ "HealthTestError", "a02432.html", null ], - [ "InvalidIdentifierError", "a02360.html", null ], - [ "InvalidSizeError", "a02364.html", null ], - [ "LibraryLoadError", "a02312.html", null ], - [ "LibraryMemoryError", "a02436.html", null ], - [ "LibraryNotInitialized", "a02444.html", null ], - [ "NoDevicesFoundError", "a02428.html", null ], - [ "NoResponseError", "a02376.html", null ], - [ "NoUseFlagError", "a02440.html", null ], - [ "ParityError", "a02384.html", null ], - [ "ParseError", "a02332.html", null ], - [ "ReceiveError", "a02372.html", null ], - [ "ReceiveTimeoutError", "a02392.html", null ], - [ "ResyncWithWakeupError", "a02380.html", null ], - [ "StatusUnknownError", "a02340.html", null ], - [ "TimeOutError", "a02400.html", null ], - [ "TransmissionError", "a02420.html", null ], - [ "TransmissionTimeoutError", "a02388.html", null ], - [ "UnimplementedError", "a02412.html", null ], - [ "UnsupportedInterface", "a02448.html", null ], - [ "WakeFailedError", "a02324.html", null ], - [ "ZoneNotLockedError", "a02424.html", null ] + [ "exceptions", "a01484.html", [ + [ "AssertionFailure", "a02451.html", null ], + [ "BadArgumentError", "a02391.html", null ], + [ "BadCrcError", "a02403.html", null ], + [ "BadOpcodeError", "a02439.html", null ], + [ "CheckmacVerifyFailedError", "a02363.html", null ], + [ "CommunicationError", "a02431.html", null ], + [ "ConfigZoneLockedError", "a02351.html", null ], + [ "CrcError", "a02371.html", null ], + [ "CryptoError", "a02343.html", null ], + [ "DataZoneLockedError", "a02355.html", null ], + [ "EccFaultError", "a02379.html", null ], + [ "ExecutionError", "a02443.html", null ], + [ "FunctionError", "a02383.html", null ], + [ "GenericError", "a02387.html", null ], + [ "HealthTestError", "a02467.html", null ], + [ "InvalidIdentifierError", "a02395.html", null ], + [ "InvalidSizeError", "a02399.html", null ], + [ "LibraryLoadError", "a02347.html", null ], + [ "LibraryMemoryError", "a02471.html", null ], + [ "LibraryNotInitialized", "a02479.html", null ], + [ "NoDevicesFoundError", "a02463.html", null ], + [ "NoResponseError", "a02411.html", null ], + [ "NoUseFlagError", "a02475.html", null ], + [ "ParityError", "a02419.html", null ], + [ "ParseError", "a02367.html", null ], + [ "ReceiveError", "a02407.html", null ], + [ "ReceiveTimeoutError", "a02427.html", null ], + [ "ResyncWithWakeupError", "a02415.html", null ], + [ "StatusUnknownError", "a02375.html", null ], + [ "TimeOutError", "a02435.html", null ], + [ "TransmissionError", "a02455.html", null ], + [ "TransmissionTimeoutError", "a02423.html", null ], + [ "UnimplementedError", "a02447.html", null ], + [ "UnsupportedInterface", "a02483.html", null ], + [ "WakeFailedError", "a02359.html", null ], + [ "ZoneNotLockedError", "a02459.html", null ] ] ], - [ "iface", "a01458.html", [ - [ "_ATCACUSTOM", "a02492.html", null ], - [ "_ATCAHID", "a02484.html", null ], - [ "_ATCAI2C", "a02468.html", null ], - [ "_ATCAIfaceParams", "a02496.html", null ], - [ "_ATCAKIT", "a02488.html", null ], - [ "_ATCASPI", "a02476.html", null ], - [ "_ATCASWI", "a02472.html", null ], - [ "_ATCAUART", "a02480.html", null ], - [ "_U_Address", "a02464.html", null ], - [ "ATCADeviceType", "a02460.html", null ], - [ "ATCAIfaceCfg", "a02500.html", null ], - [ "ATCAIfaceType", "a02452.html", null ], - [ "ATCAKitType", "a02456.html", null ] + [ "iface", "a01485.html", [ + [ "_ATCACUSTOM", "a02527.html", null ], + [ "_ATCAHID", "a02519.html", null ], + [ "_ATCAI2C", "a02503.html", null ], + [ "_ATCAIfaceParams", "a02531.html", null ], + [ "_ATCAKIT", "a02523.html", null ], + [ "_ATCASPI", "a02511.html", null ], + [ "_ATCASWI", "a02507.html", null ], + [ "_ATCAUART", "a02515.html", null ], + [ "_U_Address", "a02499.html", null ], + [ "ATCADeviceType", "a02495.html", null ], + [ "ATCAIfaceCfg", "a02535.html", null ], + [ "ATCAIfaceType", "a02487.html", null ], + [ "ATCAKitType", "a02491.html", null ] ] ], - [ "library", "a01459.html", [ - [ "_CtypeIterator", "a02508.html", null ], - [ "AtcaReference", "a02504.html", null ], - [ "AtcaStructure", "a02516.html", "a02516" ], - [ "AtcaUnion", "a02512.html", "a02512" ] + [ "library", "a01486.html", [ + [ "_CtypeIterator", "a02543.html", null ], + [ "AtcaReference", "a02539.html", null ], + [ "AtcaStructure", "a02551.html", "a02551" ], + [ "AtcaUnion", "a02547.html", "a02547" ] ] ], - [ "status", "a01461.html", [ - [ "Status", "a02520.html", null ] + [ "status", "a01488.html", [ + [ "Status", "a02555.html", null ] ] ] ] ], [ "cryptoauthlib_mock", null, [ - [ "atcab_mock", "a02536.html", null ] + [ "atcab_mock", "a02571.html", null ] ] ], [ "setup", null, [ - [ "BinaryDistribution", "a02532.html", null ], - [ "CryptoAuthCommandBuildExt", "a02524.html", null ], - [ "CryptoAuthCommandInstall", "a02528.html", null ] + [ "BinaryDistribution", "a02567.html", null ], + [ "CryptoAuthCommandBuildExt", "a02559.html", null ], + [ "CryptoAuthCommandInstall", "a02563.html", null ] ] ], - [ "_ascii_kit_host_context", "a01480.html", null ], - [ "_kit_host_map_entry", "a01484.html", null ], - [ "atca_check_mac_in_out", "a01752.html", "a01752" ], - [ "atca_decrypt_in_out", "a01748.html", "a01748" ], - [ "atca_delete_in_out", "a01776.html", null ], - [ "atca_derive_key_in_out", "a01740.html", "a01740" ], - [ "atca_derive_key_mac_in_out", "a01744.html", "a01744" ], - [ "atca_device", "a01508.html", "a01508" ], - [ "atca_diversified_key_in_out", "a01732.html", "a01732" ], - [ "atca_evp_ctx", "a01812.html", null ], - [ "atca_gen_dig_in_out", "a01728.html", "a01728" ], - [ "atca_gen_key_in_out", "a01764.html", "a01764" ], - [ "atca_hal_kit_phy_t", "a01652.html", "a01652" ], - [ "atca_hal_list_entry_t", "a01648.html", "a01648" ], - [ "atca_hal_shm_t", "a01656.html", null ], - [ "atca_hmac_in_out", "a01724.html", "a01724" ], - [ "atca_i2c_host_s", "a01668.html", null ], - [ "atca_iface", "a01584.html", "a01584" ], - [ "atca_include_data_in_out", "a01696.html", "a01696" ], - [ "atca_io_decrypt_in_out", "a01704.html", "a01704" ], - [ "atca_mac_in_out", "a01720.html", "a01720" ], - [ "atca_mbedtls_eckey_s", "a01808.html", null ], - [ "atca_nonce_in_out", "a01700.html", "a01700" ], - [ "atca_plib_i2c_api", "a01504.html", null ], - [ "atca_resp_mac_in_out", "a01756.html", null ], - [ "atca_secureboot_enc_in_out", "a01712.html", "a01712" ], - [ "atca_secureboot_mac_in_out", "a01716.html", "a01716" ], - [ "atca_session_key_in_out", "a01772.html", null ], - [ "atca_sha256_ctx", "a01616.html", "a01616" ], - [ "atca_sign_internal_in_out", "a01768.html", "a01768" ], - [ "atca_spi_host_s", "a01672.html", null ], - [ "atca_temp_key", "a01692.html", "a01692" ], - [ "atca_uart_host_s", "a01676.html", null ], - [ "atca_verify_in_out", "a01760.html", "a01760" ], - [ "atca_verify_mac", "a01708.html", "a01708" ], - [ "atca_write_mac_in_out", "a01736.html", "a01736" ], - [ "atcac_aes_cmac_ctx", "a01800.html", null ], - [ "atcac_aes_gcm_ctx", "a01796.html", null ], - [ "atcac_hmac_ctx", "a01792.html", null ], - [ "atcac_pk_ctx", "a01804.html", null ], - [ "atcac_sha1_ctx", "a01784.html", null ], - [ "atcac_sha2_256_ctx", "a01788.html", null ], - [ "atcac_x509_ctx", "a01780.html", null ], - [ "atcacert_build_state_s", "a01608.html", "a01608" ], - [ "atcacert_cert_element_s", "a01600.html", "a01600" ], - [ "atcacert_cert_loc_s", "a01596.html", "a01596" ], - [ "atcacert_def_s", "a01604.html", "a01604" ], - [ "atcacert_device_loc_s", "a01592.html", "a01592" ], - [ "atcacert_tm_utc_s", "a01588.html", null ], - [ "ATCAHAL_t", "a01580.html", null ], - [ "atcaI2Cmaster", "a01660.html", null ], - [ "ATCAIfaceCfg", "a01516.html", "a01516" ], - [ "ATCAPacket", "a01620.html", null ], - [ "atcaSWImaster", "a01688.html", null ], - [ "atecc508a_config_s", "a01628.html", null ], - [ "atecc608_config_s", "a01632.html", null ], - [ "atsha204a_config_s", "a01624.html", null ], - [ "cal_buffer_s", "a01612.html", "a01612" ], - [ "CK_AES_CBC_ENCRYPT_DATA_PARAMS", "a01980.html", null ], - [ "CK_AES_CCM_PARAMS", "a02088.html", null ], - [ "CK_AES_CTR_PARAMS", "a02072.html", null ], - [ "CK_AES_GCM_PARAMS", "a02084.html", null ], - [ "CK_ARIA_CBC_ENCRYPT_DATA_PARAMS", "a02100.html", null ], - [ "CK_ATTRIBUTE", "a01900.html", null ], - [ "CK_C_INITIALIZE_ARGS", "a01916.html", null ], - [ "CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS", "a02096.html", null ], - [ "CK_CAMELLIA_CTR_PARAMS", "a02092.html", null ], - [ "CK_CCM_PARAMS", "a02080.html", null ], - [ "CK_CMS_SIG_PARAMS", "a02040.html", null ], - [ "CK_DATE", "a01904.html", null ], - [ "CK_DES_CBC_ENCRYPT_DATA_PARAMS", "a01976.html", null ], - [ "CK_DSA_PARAMETER_GEN_PARAM", "a02104.html", null ], - [ "CK_ECDH1_DERIVE_PARAMS", "a01928.html", null ], - [ "CK_ECDH2_DERIVE_PARAMS", "a01932.html", null ], - [ "CK_ECDH_AES_KEY_WRAP_PARAMS", "a02108.html", null ], - [ "CK_ECMQV_DERIVE_PARAMS", "a01936.html", null ], - [ "CK_FUNCTION_LIST", "a01816.html", null ], - [ "CK_GCM_PARAMS", "a02076.html", null ], - [ "CK_GOSTR3410_DERIVE_PARAMS", "a02132.html", null ], - [ "CK_GOSTR3410_KEY_WRAP_PARAMS", "a02136.html", null ], - [ "CK_INFO", "a01884.html", null ], - [ "CK_KEA_DERIVE_PARAMS", "a01952.html", null ], - [ "CK_KEY_DERIVATION_STRING_DATA", "a02044.html", null ], - [ "CK_KEY_WRAP_SET_OAEP_PARAMS", "a01996.html", null ], - [ "CK_KIP_PARAMS", "a02068.html", null ], - [ "CK_MECHANISM", "a01908.html", null ], - [ "CK_MECHANISM_INFO", "a01912.html", null ], - [ "CK_OTP_PARAM", "a02056.html", null ], - [ "CK_OTP_PARAMS", "a02060.html", null ], - [ "CK_OTP_SIGNATURE_INFO", "a02064.html", null ], - [ "CK_PBE_PARAMS", "a01992.html", null ], - [ "CK_PKCS5_PBKD2_PARAMS", "a02048.html", null ], - [ "CK_PKCS5_PBKD2_PARAMS2", "a02052.html", null ], - [ "CK_RC2_CBC_PARAMS", "a01956.html", null ], - [ "CK_RC2_MAC_GENERAL_PARAMS", "a01960.html", null ], - [ "CK_RC5_CBC_PARAMS", "a01968.html", null ], - [ "CK_RC5_MAC_GENERAL_PARAMS", "a01972.html", null ], - [ "CK_RC5_PARAMS", "a01964.html", null ], - [ "CK_RSA_AES_KEY_WRAP_PARAMS", "a02112.html", null ], - [ "CK_RSA_PKCS_OAEP_PARAMS", "a01920.html", null ], - [ "CK_RSA_PKCS_PSS_PARAMS", "a01924.html", null ], - [ "CK_SEED_CBC_ENCRYPT_DATA_PARAMS", "a02140.html", null ], - [ "CK_SESSION_INFO", "a01896.html", null ], - [ "CK_SKIPJACK_PRIVATE_WRAP_PARAMS", "a01984.html", null ], - [ "CK_SKIPJACK_RELAYX_PARAMS", "a01988.html", null ], - [ "CK_SLOT_INFO", "a01888.html", null ], - [ "CK_SSL3_KEY_MAT_OUT", "a02008.html", null ], - [ "CK_SSL3_KEY_MAT_PARAMS", "a02012.html", null ], - [ "CK_SSL3_MASTER_KEY_DERIVE_PARAMS", "a02004.html", null ], - [ "CK_SSL3_RANDOM_DATA", "a02000.html", null ], - [ "CK_TLS12_KEY_MAT_PARAMS", "a02120.html", null ], - [ "CK_TLS12_MASTER_KEY_DERIVE_PARAMS", "a02116.html", null ], - [ "CK_TLS_KDF_PARAMS", "a02124.html", null ], - [ "CK_TLS_MAC_PARAMS", "a02128.html", null ], - [ "CK_TLS_PRF_PARAMS", "a02016.html", null ], - [ "CK_TOKEN_INFO", "a01892.html", null ], - [ "CK_VERSION", "a01880.html", null ], - [ "CK_WTLS_KEY_MAT_OUT", "a02032.html", null ], - [ "CK_WTLS_KEY_MAT_PARAMS", "a02036.html", null ], - [ "CK_WTLS_MASTER_KEY_DERIVE_PARAMS", "a02024.html", null ], - [ "CK_WTLS_PRF_PARAMS", "a02028.html", null ], - [ "CK_WTLS_RANDOM_DATA", "a02020.html", null ], - [ "CK_X9_42_DH1_DERIVE_PARAMS", "a01940.html", null ], - [ "CK_X9_42_DH2_DERIVE_PARAMS", "a01944.html", null ], - [ "CK_X9_42_MQV_DERIVE_PARAMS", "a01948.html", null ], - [ "CL_HashContext", "a01640.html", null ], - [ "device_execution_time_t", "a01636.html", null ], - [ "devtype_names_t", "a01512.html", null ], - [ "i2c_sam0_instance", "a01680.html", null ], - [ "i2c_sam_instance", "a01684.html", null ], - [ "i2c_start_instance", "a01664.html", null ], - [ "memory_parameters", "a01496.html", null ], - [ "pcks11_mech_table_e", "a01848.html", null ], - [ "pkcs11_attrib_model_s", "a01820.html", null ], - [ "pkcs11_conf_filedata_s", "a01824.html", null ], - [ "pkcs11_dev_ctx", "a01828.html", null ], - [ "pkcs11_dev_res", "a01832.html", null ], - [ "pkcs11_dev_state", "a01836.html", "a01836" ], - [ "pkcs11_ecc_key_info_s", "a01844.html", null ], - [ "pkcs11_lib_ctx_s", "a01840.html", "a01840" ], - [ "pkcs11_object_cache_s", "a01856.html", "a01856" ], - [ "pkcs11_object_s", "a01852.html", "a01852" ], - [ "pkcs11_session_ctx_s", "a01872.html", null ], - [ "pkcs11_session_mech_ctx_s", "a01860.html", null ], - [ "pkcs11_slot_ctx_s", "a01876.html", "a01876" ], - [ "secure_boot_config_bits", "a01488.html", null ], - [ "secure_boot_parameters", "a01492.html", null ], - [ "sw_sha256_ctx", "a01644.html", "a01644" ], - [ "tng_cert_map_element", "a01500.html", null ] + [ "_ascii_kit_host_context", "a01507.html", null ], + [ "_kit_host_map_entry", "a01511.html", null ], + [ "atca_check_mac_in_out", "a01771.html", "a01771" ], + [ "atca_decrypt_in_out", "a01767.html", "a01767" ], + [ "atca_delete_in_out", "a01795.html", null ], + [ "atca_derive_key_in_out", "a01759.html", "a01759" ], + [ "atca_derive_key_mac_in_out", "a01763.html", "a01763" ], + [ "atca_device", "a01531.html", "a01531" ], + [ "atca_diversified_key_in_out", "a01751.html", "a01751" ], + [ "atca_evp_ctx", "a01827.html", null ], + [ "atca_gen_dig_in_out", "a01747.html", "a01747" ], + [ "atca_gen_key_in_out", "a01783.html", "a01783" ], + [ "atca_hal_kit_phy_t", "a01671.html", "a01671" ], + [ "atca_hal_list_entry_t", "a01667.html", "a01667" ], + [ "atca_hal_shm_t", "a01675.html", null ], + [ "atca_hmac_in_out", "a01743.html", "a01743" ], + [ "atca_i2c_host_s", "a01687.html", null ], + [ "atca_iface", "a01607.html", "a01607" ], + [ "atca_include_data_in_out", "a01715.html", "a01715" ], + [ "atca_io_decrypt_in_out", "a01723.html", "a01723" ], + [ "atca_mac_in_out", "a01739.html", "a01739" ], + [ "atca_mbedtls_eckey_s", "a01823.html", null ], + [ "atca_nonce_in_out", "a01719.html", "a01719" ], + [ "atca_resp_mac_in_out", "a01775.html", null ], + [ "atca_secureboot_enc_in_out", "a01731.html", "a01731" ], + [ "atca_secureboot_mac_in_out", "a01735.html", "a01735" ], + [ "atca_session_key_in_out", "a01791.html", null ], + [ "atca_sha256_ctx", "a01639.html", "a01639" ], + [ "atca_sign_internal_in_out", "a01787.html", "a01787" ], + [ "atca_spi_host_s", "a01691.html", null ], + [ "atca_temp_key", "a01711.html", "a01711" ], + [ "atca_uart_host_s", "a01695.html", null ], + [ "atca_verify_in_out", "a01779.html", "a01779" ], + [ "atca_verify_mac", "a01727.html", "a01727" ], + [ "atca_write_mac_in_out", "a01755.html", "a01755" ], + [ "atcac_aes_cmac_ctx", "a01815.html", null ], + [ "atcac_aes_gcm_ctx", "a01811.html", null ], + [ "atcac_hmac_ctx", "a01807.html", null ], + [ "atcac_pk_ctx", "a01819.html", null ], + [ "atcac_sha1_ctx", "a01803.html", null ], + [ "atcac_sha2_256_ctx", "a01831.html", null ], + [ "atcac_sha2_384_ctx", "a01835.html", null ], + [ "atcac_sha2_512_ctx", "a01839.html", null ], + [ "atcac_x509_ctx", "a01799.html", null ], + [ "atcacert_build_state_s", "a01631.html", "a01631" ], + [ "atcacert_cert_element_s", "a01623.html", "a01623" ], + [ "atcacert_cert_loc_s", "a01619.html", "a01619" ], + [ "atcacert_def_s", "a01627.html", "a01627" ], + [ "atcacert_device_loc_s", "a01615.html", "a01615" ], + [ "atcacert_tm_utc_s", "a01611.html", null ], + [ "ATCAHAL_t", "a01603.html", null ], + [ "atcaI2Cmaster", "a01679.html", null ], + [ "ATCAIfaceCfg", "a01539.html", "a01539" ], + [ "ATCAPacket", "a01643.html", null ], + [ "atcaSWImaster", "a01707.html", null ], + [ "atecc508a_config_s", "a01651.html", null ], + [ "atecc608_config_s", "a01655.html", null ], + [ "atsha204a_config_s", "a01647.html", null ], + [ "cal_buffer_s", "a01635.html", "a01635" ], + [ "CK_AES_CBC_ENCRYPT_DATA_PARAMS", "a02015.html", null ], + [ "CK_AES_CCM_PARAMS", "a02123.html", null ], + [ "CK_AES_CTR_PARAMS", "a02107.html", null ], + [ "CK_AES_GCM_PARAMS", "a02119.html", null ], + [ "CK_ARIA_CBC_ENCRYPT_DATA_PARAMS", "a02135.html", null ], + [ "CK_ATTRIBUTE", "a01935.html", null ], + [ "CK_C_INITIALIZE_ARGS", "a01951.html", null ], + [ "CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS", "a02131.html", null ], + [ "CK_CAMELLIA_CTR_PARAMS", "a02127.html", null ], + [ "CK_CCM_PARAMS", "a02115.html", null ], + [ "CK_CMS_SIG_PARAMS", "a02075.html", null ], + [ "CK_DATE", "a01939.html", null ], + [ "CK_DES_CBC_ENCRYPT_DATA_PARAMS", "a02011.html", null ], + [ "CK_DSA_PARAMETER_GEN_PARAM", "a02139.html", null ], + [ "CK_ECDH1_DERIVE_PARAMS", "a01963.html", null ], + [ "CK_ECDH2_DERIVE_PARAMS", "a01967.html", null ], + [ "CK_ECDH_AES_KEY_WRAP_PARAMS", "a02143.html", null ], + [ "CK_ECMQV_DERIVE_PARAMS", "a01971.html", null ], + [ "CK_FUNCTION_LIST", "a01843.html", null ], + [ "CK_GCM_PARAMS", "a02111.html", null ], + [ "CK_GOSTR3410_DERIVE_PARAMS", "a02167.html", null ], + [ "CK_GOSTR3410_KEY_WRAP_PARAMS", "a02171.html", null ], + [ "CK_INFO", "a01919.html", null ], + [ "CK_KEA_DERIVE_PARAMS", "a01987.html", null ], + [ "CK_KEY_DERIVATION_STRING_DATA", "a02079.html", null ], + [ "CK_KEY_WRAP_SET_OAEP_PARAMS", "a02031.html", null ], + [ "CK_KIP_PARAMS", "a02103.html", null ], + [ "CK_MECHANISM", "a01943.html", null ], + [ "CK_MECHANISM_INFO", "a01947.html", null ], + [ "CK_OTP_PARAM", "a02091.html", null ], + [ "CK_OTP_PARAMS", "a02095.html", null ], + [ "CK_OTP_SIGNATURE_INFO", "a02099.html", null ], + [ "CK_PBE_PARAMS", "a02027.html", null ], + [ "CK_PKCS5_PBKD2_PARAMS", "a02083.html", null ], + [ "CK_PKCS5_PBKD2_PARAMS2", "a02087.html", null ], + [ "CK_RC2_CBC_PARAMS", "a01991.html", null ], + [ "CK_RC2_MAC_GENERAL_PARAMS", "a01995.html", null ], + [ "CK_RC5_CBC_PARAMS", "a02003.html", null ], + [ "CK_RC5_MAC_GENERAL_PARAMS", "a02007.html", null ], + [ "CK_RC5_PARAMS", "a01999.html", null ], + [ "CK_RSA_AES_KEY_WRAP_PARAMS", "a02147.html", null ], + [ "CK_RSA_PKCS_OAEP_PARAMS", "a01955.html", null ], + [ "CK_RSA_PKCS_PSS_PARAMS", "a01959.html", null ], + [ "CK_SEED_CBC_ENCRYPT_DATA_PARAMS", "a02175.html", null ], + [ "CK_SESSION_INFO", "a01931.html", null ], + [ "CK_SKIPJACK_PRIVATE_WRAP_PARAMS", "a02019.html", null ], + [ "CK_SKIPJACK_RELAYX_PARAMS", "a02023.html", null ], + [ "CK_SLOT_INFO", "a01923.html", null ], + [ "CK_SSL3_KEY_MAT_OUT", "a02043.html", null ], + [ "CK_SSL3_KEY_MAT_PARAMS", "a02047.html", null ], + [ "CK_SSL3_MASTER_KEY_DERIVE_PARAMS", "a02039.html", null ], + [ "CK_SSL3_RANDOM_DATA", "a02035.html", null ], + [ "CK_TLS12_KEY_MAT_PARAMS", "a02155.html", null ], + [ "CK_TLS12_MASTER_KEY_DERIVE_PARAMS", "a02151.html", null ], + [ "CK_TLS_KDF_PARAMS", "a02159.html", null ], + [ "CK_TLS_MAC_PARAMS", "a02163.html", null ], + [ "CK_TLS_PRF_PARAMS", "a02051.html", null ], + [ "CK_TOKEN_INFO", "a01927.html", null ], + [ "CK_VERSION", "a01915.html", null ], + [ "CK_WTLS_KEY_MAT_OUT", "a02067.html", null ], + [ "CK_WTLS_KEY_MAT_PARAMS", "a02071.html", null ], + [ "CK_WTLS_MASTER_KEY_DERIVE_PARAMS", "a02059.html", null ], + [ "CK_WTLS_PRF_PARAMS", "a02063.html", null ], + [ "CK_WTLS_RANDOM_DATA", "a02055.html", null ], + [ "CK_X9_42_DH1_DERIVE_PARAMS", "a01975.html", null ], + [ "CK_X9_42_DH2_DERIVE_PARAMS", "a01979.html", null ], + [ "CK_X9_42_MQV_DERIVE_PARAMS", "a01983.html", null ], + [ "CL_HashContext", "a01663.html", null ], + [ "device_execution_time_t", "a01659.html", null ], + [ "devtype_names_t", "a01535.html", null ], + [ "i2c_sam0_instance", "a01699.html", null ], + [ "i2c_sam_instance", "a01703.html", null ], + [ "i2c_start_instance", "a01683.html", null ], + [ "memory_parameters", "a01523.html", null ], + [ "pcks11_mech_table_e", "a01883.html", null ], + [ "pkcs11_attrib_model_s", "a01847.html", null ], + [ "pkcs11_conf_filedata_s", "a01851.html", null ], + [ "pkcs11_dev_ctx", "a01855.html", null ], + [ "pkcs11_dev_res", "a01859.html", null ], + [ "pkcs11_dev_state", "a01863.html", "a01863" ], + [ "pkcs11_ecc_key_info_s", "a01871.html", null ], + [ "pkcs11_key_info_s", "a01879.html", null ], + [ "pkcs11_lib_ctx_s", "a01867.html", "a01867" ], + [ "pkcs11_object_cache_s", "a01891.html", "a01891" ], + [ "pkcs11_object_s", "a01887.html", "a01887" ], + [ "pkcs11_rsa_key_info_s", "a01875.html", null ], + [ "pkcs11_session_ctx_s", "a01907.html", null ], + [ "pkcs11_session_mech_ctx_s", "a01895.html", null ], + [ "pkcs11_slot_ctx_s", "a01911.html", "a01911" ], + [ "secure_boot_config_bits", "a01515.html", null ], + [ "secure_boot_parameters", "a01519.html", null ], + [ "tng_cert_map_element", "a01527.html", null ] ]; \ No newline at end of file diff --git a/classes.html b/classes.html index da18a88dd..c0618c9d5 100644 --- a/classes.html +++ b/classes.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -104,73 +104,73 @@
A
-
AesEnable (cryptoauthlib.device)
AssertionFailure (cryptoauthlib.exceptions)
atca_aes_cbc_ctx (cryptoauthlib.atcab)
atca_aes_cbcmac_ctx (cryptoauthlib.atcab)
atca_aes_ccm_ctx (cryptoauthlib.atcab)
atca_aes_cmac_ctx (cryptoauthlib.atcab)
atca_aes_ctr_ctx (cryptoauthlib.atcab)
atca_aes_gcm_ctx (cryptoauthlib.atcab)
atca_check_mac_in_out
atca_decrypt_in_out
atca_delete_in_out
atca_derive_key_in_out
atca_derive_key_mac_in_out
atca_device
atca_diversified_key_in_out
atca_evp_ctx
atca_gen_dig_in_out
atca_gen_key_in_out
atca_hal_kit_phy_t
atca_hal_list_entry_t
atca_hal_shm_t
atca_hmac_in_out
atca_hmac_sha256_ctx (cryptoauthlib.atcab)
atca_i2c_host_s
atca_iface
atca_include_data_in_out
atca_io_decrypt_in_out
atca_mac_in_out
atca_mbedtls_eckey_s
atca_nonce_in_out
atca_plib_i2c_api
atca_resp_mac_in_out
atca_secureboot_enc_in_out
atca_secureboot_mac_in_out
atca_session_key_in_out
atca_sha256_ctx
atca_sha256_ctx (cryptoauthlib.atcab)
atca_sign_internal_in_out
atca_spi_host_s
atca_temp_key
atca_uart_host_s
atca_verify_in_out
atca_verify_mac
atca_write_mac_in_out
atcab_mock (cryptoauthlib_mock)
atcac_aes_cmac_ctx
atcac_aes_gcm_ctx
atcac_hmac_ctx
atcac_pk_ctx
atcac_sha1_ctx
atcac_sha2_256_ctx
atcac_x509_ctx
atcacert_build_state_s
atcacert_cert_element_s
atcacert_cert_element_t (cryptoauthlib.atcacert)
atcacert_cert_loc_s
atcacert_cert_loc_t (cryptoauthlib.atcacert)
atcacert_cert_sn_src_t (cryptoauthlib.atcacert)
atcacert_cert_type_t (cryptoauthlib.atcacert)
atcacert_comp_data_t (cryptoauthlib.atcacert)
atcacert_date_format_t (cryptoauthlib.atcacert)
atcacert_def_s
atcacert_def_t (cryptoauthlib.atcacert)
atcacert_device_loc_s
atcacert_device_loc_t (cryptoauthlib.atcacert)
atcacert_device_zone_t (cryptoauthlib.atcacert)
atcacert_std_cert_element_t (cryptoauthlib.atcacert)
atcacert_tm_utc_s
atcacert_tm_utc_t (cryptoauthlib.atcacert)
atcacert_transform_t (cryptoauthlib.atcacert)
ATCADeviceType (cryptoauthlib.iface)
AtcaEnum (cryptoauthlib.atcaenum)
ATCAHAL_t
atcaI2Cmaster
ATCAIfaceCfg
ATCAIfaceCfg (cryptoauthlib.iface)
ATCAIfaceType (cryptoauthlib.iface)
ATCAKitType (cryptoauthlib.iface)
ATCAPacket
AtcaReference (cryptoauthlib.library)
AtcaStructure (cryptoauthlib.library)
atcaSWImaster
AtcaUnion (cryptoauthlib.library)
atecc508a_config_s
Atecc508aConfig (cryptoauthlib.device)
atecc608_config_s
Atecc608Config (cryptoauthlib.device)
atsha204a_config_s
Atsha204aConfig (cryptoauthlib.device)
+
AesEnable (cryptoauthlib.device)
AssertionFailure (cryptoauthlib.exceptions)
atca_aes_cbc_ctx (cryptoauthlib.atcab)
atca_aes_cbcmac_ctx (cryptoauthlib.atcab)
atca_aes_ccm_ctx (cryptoauthlib.atcab)
atca_aes_cmac_ctx (cryptoauthlib.atcab)
atca_aes_ctr_ctx (cryptoauthlib.atcab)
atca_aes_gcm_ctx (cryptoauthlib.atcab)
atca_check_mac_in_out
atca_decrypt_in_out
atca_delete_in_out
atca_derive_key_in_out
atca_derive_key_mac_in_out
atca_device
atca_diversified_key_in_out
atca_evp_ctx
atca_gen_dig_in_out
atca_gen_key_in_out
atca_hal_kit_phy_t
atca_hal_list_entry_t
atca_hal_shm_t
atca_hmac_in_out
atca_hmac_sha256_ctx (cryptoauthlib.atcab)
atca_i2c_host_s
atca_iface
atca_include_data_in_out
atca_io_decrypt_in_out
atca_mac_in_out
atca_mbedtls_eckey_s
atca_nonce_in_out
atca_resp_mac_in_out
atca_secureboot_enc_in_out
atca_secureboot_mac_in_out
atca_session_key_in_out
atca_sha256_ctx (cryptoauthlib.atcab)
atca_sha256_ctx
atca_sign_internal_in_out
atca_spi_host_s
atca_temp_key
atca_uart_host_s
atca_verify_in_out
atca_verify_mac
atca_write_mac_in_out
atcab_mock (cryptoauthlib_mock)
atcac_aes_cmac_ctx
atcac_aes_gcm_ctx
atcac_hmac_ctx
atcac_pk_ctx
atcac_sha1_ctx
atcac_sha2_256_ctx
atcac_sha2_384_ctx
atcac_sha2_512_ctx
atcac_x509_ctx
atcacert_build_state_s
atcacert_cert_element_s
atcacert_cert_element_t (cryptoauthlib.atcacert)
atcacert_cert_loc_s
atcacert_cert_loc_t (cryptoauthlib.atcacert)
atcacert_cert_sn_src_t (cryptoauthlib.atcacert)
atcacert_cert_type_t (cryptoauthlib.atcacert)
atcacert_comp_data_t (cryptoauthlib.atcacert)
atcacert_date_format_t (cryptoauthlib.atcacert)
atcacert_def_s
atcacert_def_t (cryptoauthlib.atcacert)
atcacert_device_loc_s
atcacert_device_loc_t (cryptoauthlib.atcacert)
atcacert_device_zone_t (cryptoauthlib.atcacert)
atcacert_std_cert_element_t (cryptoauthlib.atcacert)
atcacert_tm_utc_s
atcacert_tm_utc_t (cryptoauthlib.atcacert)
atcacert_transform_t (cryptoauthlib.atcacert)
ATCADeviceType (cryptoauthlib.iface)
AtcaEnum (cryptoauthlib.atcaenum)
ATCAHAL_t
atcaI2Cmaster
ATCAIfaceCfg
ATCAIfaceCfg (cryptoauthlib.iface)
ATCAIfaceType (cryptoauthlib.iface)
ATCAKitType (cryptoauthlib.iface)
ATCAPacket
AtcaReference (cryptoauthlib.library)
AtcaStructure (cryptoauthlib.library)
atcaSWImaster
AtcaUnion (cryptoauthlib.library)
atecc508a_config_s
Atecc508aConfig (cryptoauthlib.device)
atecc608_config_s
Atecc608Config (cryptoauthlib.device)
atsha204a_config_s
Atsha204aConfig (cryptoauthlib.device)
B
-
BadArgumentError (cryptoauthlib.exceptions)
BadCrcError (cryptoauthlib.exceptions)
BadOpcodeError (cryptoauthlib.exceptions)
BinaryDistribution (setup)
+
BadArgumentError (cryptoauthlib.exceptions)
BadCrcError (cryptoauthlib.exceptions)
BadOpcodeError (cryptoauthlib.exceptions)
BinaryDistribution (setup)
C
-
cal_buffer_s
CertStatus (cryptoauthlib.atcacert)
CheckmacVerifyFailedError (cryptoauthlib.exceptions)
ChipMode508 (cryptoauthlib.device)
ChipMode608 (cryptoauthlib.device)
ChipOptions (cryptoauthlib.device)
CK_AES_CBC_ENCRYPT_DATA_PARAMS
CK_AES_CCM_PARAMS
CK_AES_CTR_PARAMS
CK_AES_GCM_PARAMS
CK_ARIA_CBC_ENCRYPT_DATA_PARAMS
CK_ATTRIBUTE
CK_C_INITIALIZE_ARGS
CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS
CK_CAMELLIA_CTR_PARAMS
CK_CCM_PARAMS
CK_CMS_SIG_PARAMS
CK_DATE
CK_DES_CBC_ENCRYPT_DATA_PARAMS
CK_DSA_PARAMETER_GEN_PARAM
CK_ECDH1_DERIVE_PARAMS
CK_ECDH2_DERIVE_PARAMS
CK_ECDH_AES_KEY_WRAP_PARAMS
CK_ECMQV_DERIVE_PARAMS
CK_FUNCTION_LIST
CK_GCM_PARAMS
CK_GOSTR3410_DERIVE_PARAMS
CK_GOSTR3410_KEY_WRAP_PARAMS
CK_INFO
CK_KEA_DERIVE_PARAMS
CK_KEY_DERIVATION_STRING_DATA
CK_KEY_WRAP_SET_OAEP_PARAMS
CK_KIP_PARAMS
CK_MECHANISM
CK_MECHANISM_INFO
CK_OTP_PARAM
CK_OTP_PARAMS
CK_OTP_SIGNATURE_INFO
CK_PBE_PARAMS
CK_PKCS5_PBKD2_PARAMS
CK_PKCS5_PBKD2_PARAMS2
CK_RC2_CBC_PARAMS
CK_RC2_MAC_GENERAL_PARAMS
CK_RC5_CBC_PARAMS
CK_RC5_MAC_GENERAL_PARAMS
CK_RC5_PARAMS
CK_RSA_AES_KEY_WRAP_PARAMS
CK_RSA_PKCS_OAEP_PARAMS
CK_RSA_PKCS_PSS_PARAMS
CK_SEED_CBC_ENCRYPT_DATA_PARAMS
CK_SESSION_INFO
CK_SKIPJACK_PRIVATE_WRAP_PARAMS
CK_SKIPJACK_RELAYX_PARAMS
CK_SLOT_INFO
CK_SSL3_KEY_MAT_OUT
CK_SSL3_KEY_MAT_PARAMS
CK_SSL3_MASTER_KEY_DERIVE_PARAMS
CK_SSL3_RANDOM_DATA
CK_TLS12_KEY_MAT_PARAMS
CK_TLS12_MASTER_KEY_DERIVE_PARAMS
CK_TLS_KDF_PARAMS
CK_TLS_MAC_PARAMS
CK_TLS_PRF_PARAMS
CK_TOKEN_INFO
CK_VERSION
CK_WTLS_KEY_MAT_OUT
CK_WTLS_KEY_MAT_PARAMS
CK_WTLS_MASTER_KEY_DERIVE_PARAMS
CK_WTLS_PRF_PARAMS
CK_WTLS_RANDOM_DATA
CK_X9_42_DH1_DERIVE_PARAMS
CK_X9_42_DH2_DERIVE_PARAMS
CK_X9_42_MQV_DERIVE_PARAMS
CL_HashContext
CommunicationError (cryptoauthlib.exceptions)
ConfigZoneLockedError (cryptoauthlib.exceptions)
Counter204 (cryptoauthlib.device)
CountMatch (cryptoauthlib.device)
CrcError (cryptoauthlib.exceptions)
CryptoAuthCommandBuildExt (setup)
CryptoAuthCommandInstall (setup)
CryptoError (cryptoauthlib.exceptions)
+
cal_buffer_s
CertStatus (cryptoauthlib.atcacert)
CheckmacVerifyFailedError (cryptoauthlib.exceptions)
ChipMode508 (cryptoauthlib.device)
ChipMode608 (cryptoauthlib.device)
ChipOptions (cryptoauthlib.device)
CK_AES_CBC_ENCRYPT_DATA_PARAMS
CK_AES_CCM_PARAMS
CK_AES_CTR_PARAMS
CK_AES_GCM_PARAMS
CK_ARIA_CBC_ENCRYPT_DATA_PARAMS
CK_ATTRIBUTE
CK_C_INITIALIZE_ARGS
CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS
CK_CAMELLIA_CTR_PARAMS
CK_CCM_PARAMS
CK_CMS_SIG_PARAMS
CK_DATE
CK_DES_CBC_ENCRYPT_DATA_PARAMS
CK_DSA_PARAMETER_GEN_PARAM
CK_ECDH1_DERIVE_PARAMS
CK_ECDH2_DERIVE_PARAMS
CK_ECDH_AES_KEY_WRAP_PARAMS
CK_ECMQV_DERIVE_PARAMS
CK_FUNCTION_LIST
CK_GCM_PARAMS
CK_GOSTR3410_DERIVE_PARAMS
CK_GOSTR3410_KEY_WRAP_PARAMS
CK_INFO
CK_KEA_DERIVE_PARAMS
CK_KEY_DERIVATION_STRING_DATA
CK_KEY_WRAP_SET_OAEP_PARAMS
CK_KIP_PARAMS
CK_MECHANISM
CK_MECHANISM_INFO
CK_OTP_PARAM
CK_OTP_PARAMS
CK_OTP_SIGNATURE_INFO
CK_PBE_PARAMS
CK_PKCS5_PBKD2_PARAMS
CK_PKCS5_PBKD2_PARAMS2
CK_RC2_CBC_PARAMS
CK_RC2_MAC_GENERAL_PARAMS
CK_RC5_CBC_PARAMS
CK_RC5_MAC_GENERAL_PARAMS
CK_RC5_PARAMS
CK_RSA_AES_KEY_WRAP_PARAMS
CK_RSA_PKCS_OAEP_PARAMS
CK_RSA_PKCS_PSS_PARAMS
CK_SEED_CBC_ENCRYPT_DATA_PARAMS
CK_SESSION_INFO
CK_SKIPJACK_PRIVATE_WRAP_PARAMS
CK_SKIPJACK_RELAYX_PARAMS
CK_SLOT_INFO
CK_SSL3_KEY_MAT_OUT
CK_SSL3_KEY_MAT_PARAMS
CK_SSL3_MASTER_KEY_DERIVE_PARAMS
CK_SSL3_RANDOM_DATA
CK_TLS12_KEY_MAT_PARAMS
CK_TLS12_MASTER_KEY_DERIVE_PARAMS
CK_TLS_KDF_PARAMS
CK_TLS_MAC_PARAMS
CK_TLS_PRF_PARAMS
CK_TOKEN_INFO
CK_VERSION
CK_WTLS_KEY_MAT_OUT
CK_WTLS_KEY_MAT_PARAMS
CK_WTLS_MASTER_KEY_DERIVE_PARAMS
CK_WTLS_PRF_PARAMS
CK_WTLS_RANDOM_DATA
CK_X9_42_DH1_DERIVE_PARAMS
CK_X9_42_DH2_DERIVE_PARAMS
CK_X9_42_MQV_DERIVE_PARAMS
CL_HashContext
CommunicationError (cryptoauthlib.exceptions)
ConfigZoneLockedError (cryptoauthlib.exceptions)
Counter204 (cryptoauthlib.device)
CountMatch (cryptoauthlib.device)
CrcError (cryptoauthlib.exceptions)
CryptoAuthCommandBuildExt (setup)
CryptoAuthCommandInstall (setup)
CryptoError (cryptoauthlib.exceptions)
D
-
DataZoneLockedError (cryptoauthlib.exceptions)
device_execution_time_t
devtype_names_t
+
DataZoneLockedError (cryptoauthlib.exceptions)
device_execution_time_t
devtype_names_t
E
-
EccFaultError (cryptoauthlib.exceptions)
ExecutionError (cryptoauthlib.exceptions)
+
EccFaultError (cryptoauthlib.exceptions)
ExecutionError (cryptoauthlib.exceptions)
F
-
FunctionError (cryptoauthlib.exceptions)
+
FunctionError (cryptoauthlib.exceptions)
G
-
GenericError (cryptoauthlib.exceptions)
+
GenericError (cryptoauthlib.exceptions)
H
-
HealthTestError (cryptoauthlib.exceptions)
HwEcAlgorithm (cryptoauthlib.atjwt)
HwHmacAlgorithm (cryptoauthlib.atjwt)
+
HealthTestError (cryptoauthlib.exceptions)
HwEcAlgorithm (cryptoauthlib.atjwt)
HwHmacAlgorithm (cryptoauthlib.atjwt)
I
-
i2c_sam0_instance
i2c_sam_instance
i2c_start_instance
I2cEnable (cryptoauthlib.device)
InvalidIdentifierError (cryptoauthlib.exceptions)
InvalidSizeError (cryptoauthlib.exceptions)
+
i2c_sam0_instance
i2c_sam_instance
i2c_start_instance
I2cEnable (cryptoauthlib.device)
InvalidIdentifierError (cryptoauthlib.exceptions)
InvalidSizeError (cryptoauthlib.exceptions)
K
-
KeyConfig (cryptoauthlib.device)
+
KeyConfig (cryptoauthlib.device)
L
-
LibraryLoadError (cryptoauthlib.exceptions)
LibraryMemoryError (cryptoauthlib.exceptions)
LibraryNotInitialized (cryptoauthlib.exceptions)
+
LibraryLoadError (cryptoauthlib.exceptions)
LibraryMemoryError (cryptoauthlib.exceptions)
LibraryNotInitialized (cryptoauthlib.exceptions)
M
-
memory_parameters
+
memory_parameters
N
-
NoDevicesFoundError (cryptoauthlib.exceptions)
NoResponseError (cryptoauthlib.exceptions)
NoUseFlagError (cryptoauthlib.exceptions)
+
NoDevicesFoundError (cryptoauthlib.exceptions)
NoResponseError (cryptoauthlib.exceptions)
NoUseFlagError (cryptoauthlib.exceptions)
P
-
ParityError (cryptoauthlib.exceptions)
ParseError (cryptoauthlib.exceptions)
pcks11_mech_table_e
pkcs11_attrib_model_s
pkcs11_conf_filedata_s
pkcs11_dev_ctx
pkcs11_dev_res
pkcs11_dev_state
pkcs11_ecc_key_info_s
pkcs11_lib_ctx_s
pkcs11_object_cache_s
pkcs11_object_s
pkcs11_session_ctx_s
pkcs11_session_mech_ctx_s
pkcs11_slot_ctx_s
PyJWT (cryptoauthlib.atjwt)
+
ParityError (cryptoauthlib.exceptions)
ParseError (cryptoauthlib.exceptions)
pcks11_mech_table_e
pkcs11_attrib_model_s
pkcs11_conf_filedata_s
pkcs11_dev_ctx
pkcs11_dev_res
pkcs11_dev_state
pkcs11_ecc_key_info_s
pkcs11_key_info_s
pkcs11_lib_ctx_s
pkcs11_object_cache_s
pkcs11_object_s
pkcs11_rsa_key_info_s
pkcs11_session_ctx_s
pkcs11_session_mech_ctx_s
pkcs11_slot_ctx_s
PyJWT (cryptoauthlib.atjwt)
R
-
ReceiveError (cryptoauthlib.exceptions)
ReceiveTimeoutError (cryptoauthlib.exceptions)
ResyncWithWakeupError (cryptoauthlib.exceptions)
+
ReceiveError (cryptoauthlib.exceptions)
ReceiveTimeoutError (cryptoauthlib.exceptions)
ResyncWithWakeupError (cryptoauthlib.exceptions)
S
-
secure_boot_config_bits
secure_boot_parameters
SecureBoot (cryptoauthlib.device)
SlotConfig (cryptoauthlib.device)
Status (cryptoauthlib.status)
StatusUnknownError (cryptoauthlib.exceptions)
sw_sha256_ctx
+
secure_boot_config_bits
secure_boot_parameters
SecureBoot (cryptoauthlib.device)
SlotConfig (cryptoauthlib.device)
Status (cryptoauthlib.status)
StatusUnknownError (cryptoauthlib.exceptions)
T
-
TimeOutError (cryptoauthlib.exceptions)
tng_cert_map_element
TransmissionError (cryptoauthlib.exceptions)
TransmissionTimeoutError (cryptoauthlib.exceptions)
+
TimeOutError (cryptoauthlib.exceptions)
tng_cert_map_element
TransmissionError (cryptoauthlib.exceptions)
TransmissionTimeoutError (cryptoauthlib.exceptions)
U
-
UnimplementedError (cryptoauthlib.exceptions)
UnsupportedInterface (cryptoauthlib.exceptions)
UseLock (cryptoauthlib.device)
+
UnimplementedError (cryptoauthlib.exceptions)
UnsupportedInterface (cryptoauthlib.exceptions)
UseLock (cryptoauthlib.device)
V
-
VolatileKeyPermission (cryptoauthlib.device)
+
VolatileKeyPermission (cryptoauthlib.device)
W
-
WakeFailedError (cryptoauthlib.exceptions)
+
WakeFailedError (cryptoauthlib.exceptions)
X
-
X509Format (cryptoauthlib.device)
+
X509Format (cryptoauthlib.device)
Z
-
ZoneNotLockedError (cryptoauthlib.exceptions)
+
ZoneNotLockedError (cryptoauthlib.exceptions)
_
-
_ascii_kit_host_context
_ATCACUSTOM (cryptoauthlib.iface)
_ATCAHID (cryptoauthlib.iface)
_ATCAI2C (cryptoauthlib.iface)
_ATCAIfaceParams (cryptoauthlib.iface)
_ATCAKIT (cryptoauthlib.iface)
_ATCASPI (cryptoauthlib.iface)
_ATCASWI (cryptoauthlib.iface)
_ATCAUART (cryptoauthlib.iface)
_CtypeIterator (cryptoauthlib.library)
_kit_host_map_entry
_U_Address (cryptoauthlib.iface)
+
_ascii_kit_host_context
_ATCACUSTOM (cryptoauthlib.iface)
_ATCAHID (cryptoauthlib.iface)
_ATCAI2C (cryptoauthlib.iface)
_ATCAIfaceParams (cryptoauthlib.iface)
_ATCAKIT (cryptoauthlib.iface)
_ATCASPI (cryptoauthlib.iface)
_ATCASWI (cryptoauthlib.iface)
_ATCAUART (cryptoauthlib.iface)
_CtypeIterator (cryptoauthlib.library)
_kit_host_map_entry
_U_Address (cryptoauthlib.iface)
diff --git a/dir_0680cb466dcc0d680630f5d267d4b7d1.html b/dir_0680cb466dcc0d680630f5d267d4b7d1.html index bfca97496..b6d079906 100644 --- a/dir_0680cb466dcc0d680630f5d267d4b7d1.html +++ b/dir_0680cb466dcc0d680630f5d267d4b7d1.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_0da7b7c68dd2857c05256c12c60bb57c.html b/dir_0da7b7c68dd2857c05256c12c60bb57c.html index f46993ba9..a1996efd7 100644 --- a/dir_0da7b7c68dd2857c05256c12c60bb57c.html +++ b/dir_0da7b7c68dd2857c05256c12c60bb57c.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_0f8c318486f9c8f97febe2dc0542d496.html b/dir_0f8c318486f9c8f97febe2dc0542d496.html index cc98e1581..f05bb780a 100644 --- a/dir_0f8c318486f9c8f97febe2dc0542d496.html +++ b/dir_0f8c318486f9c8f97febe2dc0542d496.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,11 +103,11 @@ - - + + - - + +

Files

file  atca_jwt.c
 Utilities to create and verify a JSON Web Token (JWT)
file  atca_jwt.c
 Utilities to create and verify a JSON Web Token (JWT)
 
file  atca_jwt.h
 Utilities to create and verify a JSON Web Token (JWT)
file  atca_jwt.h
 Utilities to create and verify a JSON Web Token (JWT)
 
diff --git a/dir_0f8c318486f9c8f97febe2dc0542d496.js b/dir_0f8c318486f9c8f97febe2dc0542d496.js index abae2587c..7790073a8 100644 --- a/dir_0f8c318486f9c8f97febe2dc0542d496.js +++ b/dir_0f8c318486f9c8f97febe2dc0542d496.js @@ -1,5 +1,5 @@ var dir_0f8c318486f9c8f97febe2dc0542d496 = [ - [ "atca_jwt.c", "a00641.html", null ], - [ "atca_jwt.h", "a00644.html", null ] + [ "atca_jwt.c", "a00656.html", null ], + [ "atca_jwt.h", "a00659.html", null ] ]; \ No newline at end of file diff --git a/dir_18075c3a94726308684965563d2ee6c8.html b/dir_18075c3a94726308684965563d2ee6c8.html index 1dcb30642..b65806a4a 100644 --- a/dir_18075c3a94726308684965563d2ee6c8.html +++ b/dir_18075c3a94726308684965563d2ee6c8.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_26647cdac0a1f8c717d44b4eb3b4ec89.html b/dir_26647cdac0a1f8c717d44b4eb3b4ec89.html index 04636be58..4d957e209 100644 --- a/dir_26647cdac0a1f8c717d44b4eb3b4ec89.html +++ b/dir_26647cdac0a1f8c717d44b4eb3b4ec89.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,53 +103,53 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + +

Files

file  atcacert.h
 Declarations common to all atcacert code.
file  atcacert.h
 Declarations common to all atcacert code.
 
file  atcacert_check_config.h
 Configuration check and defaults for the atcacert module.
file  atcacert_check_config.h
 Configuration check and defaults for the atcacert module.
 
file  atcacert_client.c
 Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.
file  atcacert_client.c
 Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.
 
file  atcacert_client.h
 Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.
file  atcacert_client.h
 Client side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device.
 
file  atcacert_date.c
 Date handling with regard to certificates.
file  atcacert_date.c
 Date handling with regard to certificates.
 
file  atcacert_date.h
 Declarations for date handling with regard to certificates.
file  atcacert_date.h
 Declarations for date handling with regard to certificates.
 
file  atcacert_def.c
 Main certificate definition implementation.
file  atcacert_def.c
 Main certificate definition implementation.
 
file  atcacert_def.h
 Declarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices.
file  atcacert_def.h
 Declarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices.
 
file  atcacert_der.c
 functions required to work with DER encoded data related to X.509 certificates.
file  atcacert_der.c
 functions required to work with DER encoded data related to X.509 certificates.
 
file  atcacert_der.h
 function declarations required to work with DER encoded data related to X.509 certificates.
file  atcacert_der.h
 function declarations required to work with DER encoded data related to X.509 certificates.
 
file  atcacert_host_hw.c
 host side methods using CryptoAuth hardware
file  atcacert_host_hw.c
 host side methods using CryptoAuth hardware
 
file  atcacert_host_hw.h
 host side methods using CryptoAuth hardware
file  atcacert_host_hw.h
 host side methods using CryptoAuth hardware
 
file  atcacert_host_sw.c
 host side methods using software implementations
file  atcacert_host_sw.c
 host side methods using software implementations
 
file  atcacert_host_sw.h
 Host side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library.
file  atcacert_host_sw.h
 Host side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library.
 
file  atcacert_pem.c
 Functions required to work with PEM encoded data related to X.509 certificates.
file  atcacert_pem.c
 Functions required to work with PEM encoded data related to X.509 certificates.
 
file  atcacert_pem.h
 Functions for converting between DER and PEM formats.
file  atcacert_pem.h
 Functions for converting between DER and PEM formats.
 
diff --git a/dir_26647cdac0a1f8c717d44b4eb3b4ec89.js b/dir_26647cdac0a1f8c717d44b4eb3b4ec89.js index 07cdaff1f..9364de8f0 100644 --- a/dir_26647cdac0a1f8c717d44b4eb3b4ec89.js +++ b/dir_26647cdac0a1f8c717d44b4eb3b4ec89.js @@ -1,19 +1,19 @@ var dir_26647cdac0a1f8c717d44b4eb3b4ec89 = [ - [ "atcacert.h", "a00272.html", "a00272" ], - [ "atcacert_check_config.h", "a00275.html", null ], - [ "atcacert_client.c", "a00278.html", "a00278" ], - [ "atcacert_client.h", "a00281.html", "a00281" ], - [ "atcacert_date.c", "a00284.html", "a00284" ], - [ "atcacert_date.h", "a00287.html", "a00287" ], - [ "atcacert_def.c", "a00290.html", "a00290" ], - [ "atcacert_def.h", "a00293.html", "a00293" ], - [ "atcacert_der.c", "a00296.html", null ], - [ "atcacert_der.h", "a00299.html", "a00299" ], - [ "atcacert_host_hw.c", "a00302.html", null ], - [ "atcacert_host_hw.h", "a00305.html", "a00305" ], - [ "atcacert_host_sw.c", "a00308.html", null ], - [ "atcacert_host_sw.h", "a00311.html", "a00311" ], - [ "atcacert_pem.c", "a00314.html", null ], - [ "atcacert_pem.h", "a00317.html", "a00317" ] + [ "atcacert.h", "a00278.html", "a00278" ], + [ "atcacert_check_config.h", "a00281.html", null ], + [ "atcacert_client.c", "a00284.html", "a00284" ], + [ "atcacert_client.h", "a00287.html", "a00287" ], + [ "atcacert_date.c", "a00290.html", "a00290" ], + [ "atcacert_date.h", "a00293.html", "a00293" ], + [ "atcacert_def.c", "a00296.html", "a00296" ], + [ "atcacert_def.h", "a00299.html", "a00299" ], + [ "atcacert_der.c", "a00302.html", null ], + [ "atcacert_der.h", "a00305.html", "a00305" ], + [ "atcacert_host_hw.c", "a00308.html", null ], + [ "atcacert_host_hw.h", "a00311.html", "a00311" ], + [ "atcacert_host_sw.c", "a00314.html", null ], + [ "atcacert_host_sw.h", "a00317.html", "a00317" ], + [ "atcacert_pem.c", "a00320.html", null ], + [ "atcacert_pem.h", "a00323.html", "a00323" ] ]; \ No newline at end of file diff --git a/dir_2d87885bbe6729211aeb398dfc685454.html b/dir_2d87885bbe6729211aeb398dfc685454.html index 76f4ba8c0..1c2a17696 100644 --- a/dir_2d87885bbe6729211aeb398dfc685454.html +++ b/dir_2d87885bbe6729211aeb398dfc685454.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,11 +103,11 @@ - - + + - - + + diff --git a/dir_2d87885bbe6729211aeb398dfc685454.js b/dir_2d87885bbe6729211aeb398dfc685454.js index 32506b357..14a69b739 100644 --- a/dir_2d87885bbe6729211aeb398dfc685454.js +++ b/dir_2d87885bbe6729211aeb398dfc685454.js @@ -1,7 +1,7 @@ var dir_2d87885bbe6729211aeb398dfc685454 = [ - [ "wpc_apis.c", "a00119.html", null ], - [ "wpc_apis.h", "a00122.html", null ], + [ "wpc_apis.c", "a00116.html", null ], + [ "wpc_apis.h", "a00119.html", null ], [ "wpccert_client.c", "a00128.html", "a00128" ], [ "wpccert_client.h", "a00131.html", "a00131" ] ]; \ No newline at end of file diff --git a/dir_39966be8f8e069f6fa92c98611834f6b.html b/dir_39966be8f8e069f6fa92c98611834f6b.html index 3706462c2..5e534092d 100644 --- a/dir_39966be8f8e069f6fa92c98611834f6b.html +++ b/dir_39966be8f8e069f6fa92c98611834f6b.html @@ -31,7 +31,7 @@ @@ -103,17 +103,17 @@

Files

file  wpc_apis.c
 Provides api interfaces for WPC authentication.
file  wpc_apis.c
 Provides api interfaces for WPC authentication.
 
file  wpc_apis.h
 Provides api interfaces for WPC authentication.
file  wpc_apis.h
 Provides api interfaces for WPC authentication.
 
file  wpccert_client.c
 Provides api interfaces for accessing WPC certificates from device.
-
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
- - + + - - + + - - + + - - + +

Files

file  sha1_routines.c
 Software implementation of the SHA1 algorithm.
file  sha1_routines.c
 Software implementation of the SHA1 algorithm.
 
file  sha1_routines.h
 Software implementation of the SHA1 algorithm.
file  sha1_routines.h
 Software implementation of the SHA1 algorithm.
 
file  sha2_routines.c
 Software implementation of the SHA256 algorithm.
file  sha2_routines.c
 Software implementation of the SHA256, SHA384 and SHA512 algorithm.
 
file  sha2_routines.h
 Software implementation of the SHA256 algorithm.
file  sha2_routines.h
 Software implementation of the SHA256, SHA384 and SHA512 algorithm.
 
diff --git a/dir_39966be8f8e069f6fa92c98611834f6b.js b/dir_39966be8f8e069f6fa92c98611834f6b.js index 549469961..cc9969dcf 100644 --- a/dir_39966be8f8e069f6fa92c98611834f6b.js +++ b/dir_39966be8f8e069f6fa92c98611834f6b.js @@ -1,7 +1,7 @@ var dir_39966be8f8e069f6fa92c98611834f6b = [ - [ "sha1_routines.c", "a00494.html", null ], - [ "sha1_routines.h", "a00497.html", "a00497" ], - [ "sha2_routines.c", "a00500.html", null ], - [ "sha2_routines.h", "a00503.html", "a00503" ] + [ "sha1_routines.c", "a00509.html", null ], + [ "sha1_routines.h", "a00512.html", "a00512" ], + [ "sha2_routines.c", "a00515.html", null ], + [ "sha2_routines.h", "a00518.html", null ] ]; \ No newline at end of file diff --git a/dir_6319b470d978b666f57c44c2de446197.html b/dir_6319b470d978b666f57c44c2de446197.html index b133c7587..18c84ba77 100644 --- a/dir_6319b470d978b666f57c44c2de446197.html +++ b/dir_6319b470d978b666f57c44c2de446197.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_67fd8893924321d7b171cf185824f934.html b/dir_67fd8893924321d7b171cf185824f934.html index e47b3fb01..e9fa9336c 100644 --- a/dir_67fd8893924321d7b171cf185824f934.html +++ b/dir_67fd8893924321d7b171cf185824f934.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_695be77052103537ae3c41f50bd7e0cc.html b/dir_695be77052103537ae3c41f50bd7e0cc.html index 5aff9ca8f..4b8e6431f 100644 --- a/dir_695be77052103537ae3c41f50bd7e0cc.html +++ b/dir_695be77052103537ae3c41f50bd7e0cc.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -108,53 +108,56 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + + + +

Files

file  atca_crypto_hw_aes.h
 AES CTR, CBC & CMAC structure definitions.
file  atca_crypto_hw_aes.h
 AES CTR, CBC & CMAC structure definitions.
 
file  atca_crypto_hw_aes_cbc.c
 CryptoAuthLib Basic API methods for AES CBC mode.
file  atca_crypto_hw_aes_cbc.c
 CryptoAuthLib Basic API methods for AES CBC mode.
 
file  atca_crypto_hw_aes_cbcmac.c
 CryptoAuthLib Basic API methods for AES CBC_MAC mode.
file  atca_crypto_hw_aes_cbcmac.c
 CryptoAuthLib Basic API methods for AES CBC_MAC mode.
 
file  atca_crypto_hw_aes_ccm.c
 CryptoAuthLib Basic API methods for AES CCM mode.
file  atca_crypto_hw_aes_ccm.c
 CryptoAuthLib Basic API methods for AES CCM mode.
 
file  atca_crypto_hw_aes_cmac.c
 CryptoAuthLib Basic API methods for AES CBC_MAC mode.
file  atca_crypto_hw_aes_cmac.c
 CryptoAuthLib Basic API methods for AES CBC_MAC mode.
 
file  atca_crypto_hw_aes_ctr.c
 CryptoAuthLib Basic API methods for AES CTR mode.
file  atca_crypto_hw_aes_ctr.c
 CryptoAuthLib Basic API methods for AES CTR mode.
 
file  atca_crypto_pad.c
 Implementation of PKCS7 Padding for block encryption.
file  atca_crypto_pad.c
 Implementation of PKCS7 Padding for block encryption.
 
file  atca_crypto_pbkdf2.c
 Implementation of the PBKDF2 algorithm for use in generating password hashes.
file  atca_crypto_pbkdf2.c
 Implementation of the PBKDF2 algorithm for use in generating password hashes.
 
file  atca_crypto_sw.h
 Common defines for CryptoAuthLib software crypto wrappers.
file  atca_crypto_sw.h
 Common defines for CryptoAuthLib software crypto wrappers.
 
file  atca_crypto_sw_aes_gcm.c
 Common Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation.
file  atca_crypto_sw_aes_cmac.c
 Common Wrapper for host side AES-CMAC implementations that feature update APIs rather than an all at once implementation.
 
file  atca_crypto_sw_sha1.c
 Wrapper API for SHA 1 routines.
file  atca_crypto_sw_aes_gcm.c
 Common Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation.
 
file  atca_crypto_sw_sha1.h
 Wrapper API for SHA 1 routines.
file  atca_crypto_sw_sha1.c
 Wrapper API for SHA 1 routines.
 
file  atca_crypto_sw_sha2.c
 Wrapper API for software SHA 256 routines.
file  atca_crypto_sw_sha1.h
 Wrapper API for SHA 1 routines.
 
file  atca_crypto_sw_sha2.h
 Wrapper API for software SHA 256 routines.
file  atca_crypto_sw_sha2.c
 Wrapper API for software SHA 256 routines.
 
file  crypto_hw_config_check.h
 Consistency checks for configuration options.
file  atca_crypto_sw_sha2.h
 Wrapper API for software SHA 256 routines.
 
file  crypto_sw_config_check.h
 Consistency checks for configuration options.
file  crypto_hw_config_check.h
 Consistency checks for configuration options.
 
file  crypto_sw_config_check.h
 Consistency checks for configuration options.
 
diff --git a/dir_695be77052103537ae3c41f50bd7e0cc.js b/dir_695be77052103537ae3c41f50bd7e0cc.js index 6e05c5423..9885c7bd1 100644 --- a/dir_695be77052103537ae3c41f50bd7e0cc.js +++ b/dir_695be77052103537ae3c41f50bd7e0cc.js @@ -1,20 +1,21 @@ var dir_695be77052103537ae3c41f50bd7e0cc = [ [ "hashes", "dir_39966be8f8e069f6fa92c98611834f6b.html", "dir_39966be8f8e069f6fa92c98611834f6b" ], - [ "atca_crypto_hw_aes.h", "a00446.html", null ], - [ "atca_crypto_hw_aes_cbc.c", "a00449.html", null ], - [ "atca_crypto_hw_aes_cbcmac.c", "a00452.html", null ], - [ "atca_crypto_hw_aes_ccm.c", "a00455.html", null ], - [ "atca_crypto_hw_aes_cmac.c", "a00458.html", null ], - [ "atca_crypto_hw_aes_ctr.c", "a00461.html", null ], - [ "atca_crypto_pad.c", "a00464.html", null ], - [ "atca_crypto_pbkdf2.c", "a00467.html", null ], - [ "atca_crypto_sw.h", "a00470.html", null ], - [ "atca_crypto_sw_aes_gcm.c", "a00473.html", null ], - [ "atca_crypto_sw_sha1.c", "a00476.html", null ], - [ "atca_crypto_sw_sha1.h", "a00479.html", null ], - [ "atca_crypto_sw_sha2.c", "a00482.html", null ], - [ "atca_crypto_sw_sha2.h", "a00485.html", null ], - [ "crypto_hw_config_check.h", "a00488.html", "a00488" ], - [ "crypto_sw_config_check.h", "a00491.html", "a00491" ] + [ "atca_crypto_hw_aes.h", "a00458.html", null ], + [ "atca_crypto_hw_aes_cbc.c", "a00461.html", null ], + [ "atca_crypto_hw_aes_cbcmac.c", "a00464.html", null ], + [ "atca_crypto_hw_aes_ccm.c", "a00467.html", null ], + [ "atca_crypto_hw_aes_cmac.c", "a00470.html", null ], + [ "atca_crypto_hw_aes_ctr.c", "a00473.html", null ], + [ "atca_crypto_pad.c", "a00476.html", null ], + [ "atca_crypto_pbkdf2.c", "a00479.html", null ], + [ "atca_crypto_sw.h", "a00482.html", null ], + [ "atca_crypto_sw_aes_cmac.c", "a00485.html", null ], + [ "atca_crypto_sw_aes_gcm.c", "a00488.html", null ], + [ "atca_crypto_sw_sha1.c", "a00491.html", null ], + [ "atca_crypto_sw_sha1.h", "a00494.html", null ], + [ "atca_crypto_sw_sha2.c", "a00497.html", null ], + [ "atca_crypto_sw_sha2.h", "a00500.html", null ], + [ "crypto_hw_config_check.h", "a00503.html", "a00503" ], + [ "crypto_sw_config_check.h", "a00506.html", "a00506" ] ]; \ No newline at end of file diff --git a/dir_7837fde3ab9c1fb2fc5be7b717af8d79.html b/dir_7837fde3ab9c1fb2fc5be7b717af8d79.html index 008d0de17..60107e039 100644 --- a/dir_7837fde3ab9c1fb2fc5be7b717af8d79.html +++ b/dir_7837fde3ab9c1fb2fc5be7b717af8d79.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_87abda79916a436a3f9fdf465608c5f5.html b/dir_87abda79916a436a3f9fdf465608c5f5.html index 74c4261a1..3ba5474c6 100644 --- a/dir_87abda79916a436a3f9fdf465608c5f5.html +++ b/dir_87abda79916a436a3f9fdf465608c5f5.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_92f10bc6a7ace15606cb0622f4eb49bb.html b/dir_92f10bc6a7ace15606cb0622f4eb49bb.html index edc8e0e81..2c86b2021 100644 --- a/dir_92f10bc6a7ace15606cb0622f4eb49bb.html +++ b/dir_92f10bc6a7ace15606cb0622f4eb49bb.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_97aefd0d527b934f1d99a682da8fe6a9.html b/dir_97aefd0d527b934f1d99a682da8fe6a9.html index f4b28edbe..dc6fc2740 100644 --- a/dir_97aefd0d527b934f1d99a682da8fe6a9.html +++ b/dir_97aefd0d527b934f1d99a682da8fe6a9.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -128,71 +128,71 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + +

Files

file  atca_basic.c
 CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.
file  atca_basic.c
 CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.
 
file  atca_basic.h
 CryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to.
file  atca_basic.h
 CryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to.
 
file  atca_cfgs.c
 a set of default configurations for various ATCA devices and interfaces
file  atca_cfgs.c
 a set of default configurations for various ATCA devices and interfaces
 
file  atca_cfgs.h
 a set of default configurations for various ATCA devices and interfaces
file  atca_cfgs.h
 a set of default configurations for various ATCA devices and interfaces
 
file  atca_compiler.h
 CryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros.
file  atca_compiler.h
 CryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros.
 
file  atca_config_check.h
 Consistency checks for configuration options.
file  atca_config_check.h
 Consistency checks for configuration options.
 
file  atca_debug.c
 Debug/Trace for CryptoAuthLib calls.
file  atca_debug.c
 Debug/Trace for CryptoAuthLib calls.
 
file  atca_device.c
 Microchip CryptoAuth device object.
file  atca_device.c
 Microchip CryptoAuth device object.
 
file  atca_device.h
 Microchip Crypto Auth device object.
file  atca_device.h
 Microchip Crypto Auth device object.
 
file  atca_devtypes.h
 Microchip Crypto Auth.
file  atca_devtypes.h
 Microchip Crypto Auth.
 
file  atca_helpers.c
 Helpers to support the CryptoAuthLib Basic API methods.
file  atca_helpers.c
 Helpers to support the CryptoAuthLib Basic API methods.
 
file  atca_helpers.h
 Helpers to support the CryptoAuthLib Basic API methods.
file  atca_helpers.h
 Helpers to support the CryptoAuthLib Basic API methods.
 
file  atca_iface.c
 Microchip CryptoAuthLib hardware interface object.
file  atca_iface.c
 Microchip CryptoAuthLib hardware interface object.
 
file  atca_iface.h
 Microchip Crypto Auth hardware interface object.
file  atca_iface.h
 Microchip Crypto Auth hardware interface object.
 
file  atca_platform.h
 Configure the platform interfaces for cryptoauthlib.
file  atca_platform.h
 Configure the platform interfaces for cryptoauthlib.
 
file  atca_status.h
 Microchip Crypto Auth status codes.
file  atca_status.h
 Microchip Crypto Auth status codes.
 
file  atca_utils_sizes.c
 API to Return structure sizes of cryptoauthlib structures.
file  atca_utils_sizes.c
 API to Return structure sizes of cryptoauthlib structures.
 
file  atca_version.h
 Microchip CryptoAuth Library Version.
file  atca_version.h
 Microchip CryptoAuth Library Version.
 
file  cal_buffer.c
 Cryptoauthlib buffer management system.
file  cal_buffer.c
 Cryptoauthlib buffer management system.
 
file  cal_buffer.h
 Cryptoauthlib buffer management system.
file  cal_buffer.h
 Cryptoauthlib buffer management system.
 
file  cal_internal.h
 Internal CryptoAuthLib Interfaces.
file  cal_internal.h
 Internal CryptoAuthLib Interfaces.
 
file  cryptoauthlib.h
 Single aggregation point for all CryptoAuthLib header files.
file  cryptoauthlib.h
 Single aggregation point for all CryptoAuthLib header files.
 
diff --git a/dir_97aefd0d527b934f1d99a682da8fe6a9.js b/dir_97aefd0d527b934f1d99a682da8fe6a9.js index d7682c547..e447cdbd2 100644 --- a/dir_97aefd0d527b934f1d99a682da8fe6a9.js +++ b/dir_97aefd0d527b934f1d99a682da8fe6a9.js @@ -10,26 +10,26 @@ var dir_97aefd0d527b934f1d99a682da8fe6a9 = [ "openssl", "dir_ec1cbef6cba079ce838897574eab818a.html", "dir_ec1cbef6cba079ce838897574eab818a" ], [ "pkcs11", "dir_b3c25b642613ea6a80d1cd59c6d313a8.html", "dir_b3c25b642613ea6a80d1cd59c6d313a8" ], [ "wolfssl", "dir_b9d9bcd31faf1443658640fef106169e.html", "dir_b9d9bcd31faf1443658640fef106169e" ], - [ "atca_basic.c", "a00221.html", "a00221" ], - [ "atca_basic.h", "a00224.html", "a00224" ], - [ "atca_cfgs.c", "a00227.html", null ], - [ "atca_cfgs.h", "a00230.html", null ], - [ "atca_compiler.h", "a00233.html", "a00233" ], - [ "atca_config_check.h", "a00800.html", "a00800" ], - [ "atca_debug.c", "a00239.html", null ], - [ "atca_device.c", "a00245.html", "a00245" ], - [ "atca_device.h", "a00248.html", "a00248" ], - [ "atca_devtypes.h", "a00803.html", "a00803" ], - [ "atca_helpers.c", "a00251.html", "a00251" ], - [ "atca_helpers.h", "a00254.html", "a00254" ], - [ "atca_iface.c", "a00806.html", "a00806" ], - [ "atca_iface.h", "a00257.html", "a00257" ], - [ "atca_platform.h", "a00260.html", "a00260" ], - [ "atca_status.h", "a00263.html", "a00263" ], - [ "atca_utils_sizes.c", "a00266.html", null ], - [ "atca_version.h", "a00269.html", null ], - [ "cal_buffer.c", "a00320.html", "a00320" ], - [ "cal_buffer.h", "a00323.html", "a00323" ], - [ "cal_internal.h", "a00326.html", null ], - [ "cryptoauthlib.h", "a00506.html", "a00506" ] + [ "atca_basic.c", "a00227.html", "a00227" ], + [ "atca_basic.h", "a00230.html", "a00230" ], + [ "atca_cfgs.c", "a00233.html", null ], + [ "atca_cfgs.h", "a00236.html", null ], + [ "atca_compiler.h", "a00239.html", "a00239" ], + [ "atca_config_check.h", "a00815.html", "a00815" ], + [ "atca_debug.c", "a00245.html", null ], + [ "atca_device.c", "a00251.html", "a00251" ], + [ "atca_device.h", "a00254.html", "a00254" ], + [ "atca_devtypes.h", "a00818.html", "a00818" ], + [ "atca_helpers.c", "a00257.html", "a00257" ], + [ "atca_helpers.h", "a00260.html", "a00260" ], + [ "atca_iface.c", "a00821.html", "a00821" ], + [ "atca_iface.h", "a00263.html", "a00263" ], + [ "atca_platform.h", "a00266.html", "a00266" ], + [ "atca_status.h", "a00269.html", "a00269" ], + [ "atca_utils_sizes.c", "a00272.html", null ], + [ "atca_version.h", "a00275.html", null ], + [ "cal_buffer.c", "a00326.html", "a00326" ], + [ "cal_buffer.h", "a00329.html", "a00329" ], + [ "cal_internal.h", "a00332.html", null ], + [ "cryptoauthlib.h", "a00521.html", "a00521" ] ]; \ No newline at end of file diff --git a/dir_99d508b4fb3d57104ef2cdbd94e6a78a.html b/dir_99d508b4fb3d57104ef2cdbd94e6a78a.html index 5fd1eede2..4622d4cd9 100644 --- a/dir_99d508b4fb3d57104ef2cdbd94e6a78a.html +++ b/dir_99d508b4fb3d57104ef2cdbd94e6a78a.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_a5bdbfbbaa7895161d62825676df7980.html b/dir_a5bdbfbbaa7895161d62825676df7980.html index 3fbfe384e..c840ac69a 100644 --- a/dir_a5bdbfbbaa7895161d62825676df7980.html +++ b/dir_a5bdbfbbaa7895161d62825676df7980.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_b2187fb9aff39e17c00391b7def58804.html b/dir_b2187fb9aff39e17c00391b7def58804.html index a5b3d670b..955d79b0f 100644 --- a/dir_b2187fb9aff39e17c00391b7def58804.html +++ b/dir_b2187fb9aff39e17c00391b7def58804.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,14 +103,14 @@ - - + + - - + + - - + +

Files

file  atca_host.c
 Host side methods to support CryptoAuth computations.
file  atca_host.c
 Host side methods to support CryptoAuth computations.
 
file  atca_host.h
 Definitions and Prototypes for ATCA Utility Functions.
file  atca_host.h
 Definitions and Prototypes for ATCA Utility Functions.
 
file  atca_host_config_check.h
 Consistency checks for configuration options.
file  atca_host_config_check.h
 Consistency checks for configuration options.
 
diff --git a/dir_b2187fb9aff39e17c00391b7def58804.js b/dir_b2187fb9aff39e17c00391b7def58804.js index 674f2b227..96c87528b 100644 --- a/dir_b2187fb9aff39e17c00391b7def58804.js +++ b/dir_b2187fb9aff39e17c00391b7def58804.js @@ -1,6 +1,6 @@ var dir_b2187fb9aff39e17c00391b7def58804 = [ - [ "atca_host.c", "a00632.html", null ], - [ "atca_host.h", "a00635.html", "a00635" ], - [ "atca_host_config_check.h", "a00638.html", "a00638" ] + [ "atca_host.c", "a00647.html", null ], + [ "atca_host.h", "a00650.html", "a00650" ], + [ "atca_host_config_check.h", "a00653.html", "a00653" ] ]; \ No newline at end of file diff --git a/dir_b3c25b642613ea6a80d1cd59c6d313a8.html b/dir_b3c25b642613ea6a80d1cd59c6d313a8.html index 5ceb5a957..64959ed73 100644 --- a/dir_b3c25b642613ea6a80d1cd59c6d313a8.html +++ b/dir_b3c25b642613ea6a80d1cd59c6d313a8.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,110 +103,110 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + +

Files

file  pkcs11_attrib.c
 PKCS11 Library Object Attributes Handling.
file  pkcs11_attrib.c
 PKCS11 Library Object Attributes Handling.
 
file  pkcs11_attrib.h
 PKCS11 Library Object Attribute Handling.
file  pkcs11_attrib.h
 PKCS11 Library Object Attribute Handling.
 
file  pkcs11_cert.c
 PKCS11 Library Certificate Handling.
file  pkcs11_cert.c
 PKCS11 Library Certificate Handling.
 
file  pkcs11_cert.h
 PKCS11 Library Certificate Handling.
file  pkcs11_cert.h
 PKCS11 Library Certificate Handling.
 
file  pkcs11_config.c
 PKCS11 Library Configuration.
file  pkcs11_config.c
 PKCS11 Library Configuration.
 
file  pkcs11_debug.c
 PKCS11 Library Debugging.
file  pkcs11_debug.c
 PKCS11 Library Debugging.
 
file  pkcs11_debug.h
 PKCS11 Library Debugging.
file  pkcs11_debug.h
 PKCS11 Library Debugging.
 
file  pkcs11_digest.h
 PKCS11 Library Digest (SHA256) Handling.
file  pkcs11_digest.h
 PKCS11 Library Digest (SHA256) Handling.
 
file  pkcs11_encrypt.c
 PKCS11 Library Encrypt Support.
file  pkcs11_encrypt.c
 PKCS11 Library Encrypt Support.
 
file  pkcs11_encrypt.h
 PKCS11 Library AES Support.
file  pkcs11_encrypt.h
 PKCS11 Library AES Support.
 
file  pkcs11_find.c
 PKCS11 Library Object Find/Searching.
file  pkcs11_find.c
 PKCS11 Library Object Find/Searching.
 
file  pkcs11_find.h
 PKCS11 Library Object Find/Searching.
file  pkcs11_find.h
 PKCS11 Library Object Find/Searching.
 
file  pkcs11_info.c
 PKCS11 Library Information Functions.
file  pkcs11_info.c
 PKCS11 Library Information Functions.
 
file  pkcs11_info.h
 PKCS11 Library Information Functions.
file  pkcs11_info.h
 PKCS11 Library Information Functions.
 
file  pkcs11_init.c
 PKCS11 Library Init/Deinit.
file  pkcs11_init.c
 PKCS11 Library Init/Deinit.
 
file  pkcs11_init.h
 PKCS11 Library Initialization & Context.
file  pkcs11_init.h
 PKCS11 Library Initialization & Context.
 
file  pkcs11_key.c
 PKCS11 Library Key Object Handling.
file  pkcs11_key.c
 PKCS11 Library Key Object Handling.
 
file  pkcs11_key.h
 PKCS11 Library Object Handling.
file  pkcs11_key.h
 PKCS11 Library Object Handling.
 
file  pkcs11_main.c
 PKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html.
file  pkcs11_main.c
 PKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html.
 
file  pkcs11_mech.c
 PKCS11 Library Mechanism Handling.
file  pkcs11_mech.c
 PKCS11 Library Mechanism Handling.
 
file  pkcs11_mech.h
 PKCS11 Library Mechanism Handling.
file  pkcs11_mech.h
 PKCS11 Library Mechanism Handling.
 
file  pkcs11_object.c
 PKCS11 Library Object Handling Base.
file  pkcs11_object.c
 PKCS11 Library Object Handling Base.
 
file  pkcs11_object.h
 PKCS11 Library Object Handling.
file  pkcs11_object.h
 PKCS11 Library Object Handling.
 
file  pkcs11_os.c
 PKCS11 Library Operating System Abstraction Functions.
file  pkcs11_os.c
 PKCS11 Library Operating System Abstraction Functions.
 
file  pkcs11_os.h
 PKCS11 Library Operating System Abstraction.
file  pkcs11_os.h
 PKCS11 Library Operating System Abstraction.
 
file  pkcs11_session.c
 PKCS11 Library Session Handling.
file  pkcs11_session.c
 PKCS11 Library Session Handling.
 
file  pkcs11_session.h
 PKCS11 Library Session Management & Context.
file  pkcs11_session.h
 PKCS11 Library Session Management & Context.
 
file  pkcs11_signature.c
 PKCS11 Library Sign/Verify Handling.
file  pkcs11_signature.c
 PKCS11 Library Sign/Verify Handling.
 
file  pkcs11_signature.h
 PKCS11 Library Sign/Verify Handling.
file  pkcs11_signature.h
 PKCS11 Library Sign/Verify Handling.
 
file  pkcs11_slot.c
 PKCS11 Library Slot Handling.
file  pkcs11_slot.c
 PKCS11 Library Slot Handling.
 
file  pkcs11_slot.h
 PKCS11 Library Slot Handling & Context.
file  pkcs11_slot.h
 PKCS11 Library Slot Handling & Context.
 
file  pkcs11_token.c
 PKCS11 Library Token Handling.
file  pkcs11_token.c
 PKCS11 Library Token Handling.
 
file  pkcs11_token.h
 PKCS11 Library Token Management & Context.
file  pkcs11_token.h
 PKCS11 Library Token Management & Context.
 
file  pkcs11_util.c
 PKCS11 Library Utility Functions.
file  pkcs11_util.c
 PKCS11 Library Utility Functions.
 
file  pkcs11_util.h
 PKCS11 Library Utilities.
file  pkcs11_util.h
 PKCS11 Library Utilities.
 
diff --git a/dir_b3c25b642613ea6a80d1cd59c6d313a8.js b/dir_b3c25b642613ea6a80d1cd59c6d313a8.js index 10b53991a..da1068c4b 100644 --- a/dir_b3c25b642613ea6a80d1cd59c6d313a8.js +++ b/dir_b3c25b642613ea6a80d1cd59c6d313a8.js @@ -1,38 +1,38 @@ var dir_b3c25b642613ea6a80d1cd59c6d313a8 = [ - [ "pkcs11_attrib.c", "a00674.html", "a00674" ], - [ "pkcs11_attrib.h", "a00677.html", "a00677" ], - [ "pkcs11_cert.c", "a00680.html", "a00680" ], - [ "pkcs11_cert.h", "a00683.html", "a00683" ], - [ "pkcs11_config.c", "a00785.html", null ], - [ "pkcs11_debug.c", "a00689.html", null ], - [ "pkcs11_debug.h", "a00692.html", null ], - [ "pkcs11_digest.h", "a00698.html", "a00698" ], - [ "pkcs11_encrypt.c", "a00701.html", "a00701" ], - [ "pkcs11_encrypt.h", "a00704.html", "a00704" ], - [ "pkcs11_find.c", "a00707.html", null ], - [ "pkcs11_find.h", "a00710.html", null ], - [ "pkcs11_info.c", "a00713.html", "a00713" ], - [ "pkcs11_info.h", "a00716.html", "a00716" ], - [ "pkcs11_init.c", "a00719.html", "a00719" ], - [ "pkcs11_init.h", "a00722.html", "a00722" ], - [ "pkcs11_key.c", "a00725.html", "a00725" ], - [ "pkcs11_key.h", "a00728.html", "a00728" ], - [ "pkcs11_main.c", "a00731.html", "a00731" ], - [ "pkcs11_mech.c", "a00734.html", null ], - [ "pkcs11_mech.h", "a00737.html", null ], - [ "pkcs11_object.c", "a00740.html", "a00740" ], - [ "pkcs11_object.h", "a00743.html", "a00743" ], - [ "pkcs11_os.c", "a00746.html", "a00746" ], - [ "pkcs11_os.h", "a00749.html", "a00749" ], - [ "pkcs11_session.c", "a00752.html", "a00752" ], - [ "pkcs11_session.h", "a00755.html", "a00755" ], - [ "pkcs11_signature.c", "a00758.html", "a00758" ], - [ "pkcs11_signature.h", "a00761.html", "a00761" ], - [ "pkcs11_slot.c", "a00764.html", "a00764" ], - [ "pkcs11_slot.h", "a00767.html", "a00767" ], - [ "pkcs11_token.c", "a00788.html", "a00788" ], - [ "pkcs11_token.h", "a00770.html", "a00770" ], - [ "pkcs11_util.c", "a00773.html", null ], - [ "pkcs11_util.h", "a00776.html", null ] + [ "pkcs11_attrib.c", "a00689.html", "a00689" ], + [ "pkcs11_attrib.h", "a00692.html", "a00692" ], + [ "pkcs11_cert.c", "a00695.html", "a00695" ], + [ "pkcs11_cert.h", "a00698.html", "a00698" ], + [ "pkcs11_config.c", "a00800.html", null ], + [ "pkcs11_debug.c", "a00704.html", null ], + [ "pkcs11_debug.h", "a00707.html", null ], + [ "pkcs11_digest.h", "a00713.html", "a00713" ], + [ "pkcs11_encrypt.c", "a00716.html", "a00716" ], + [ "pkcs11_encrypt.h", "a00719.html", "a00719" ], + [ "pkcs11_find.c", "a00722.html", null ], + [ "pkcs11_find.h", "a00725.html", null ], + [ "pkcs11_info.c", "a00728.html", "a00728" ], + [ "pkcs11_info.h", "a00731.html", "a00731" ], + [ "pkcs11_init.c", "a00734.html", "a00734" ], + [ "pkcs11_init.h", "a00737.html", "a00737" ], + [ "pkcs11_key.c", "a00740.html", "a00740" ], + [ "pkcs11_key.h", "a00743.html", "a00743" ], + [ "pkcs11_main.c", "a00746.html", "a00746" ], + [ "pkcs11_mech.c", "a00749.html", null ], + [ "pkcs11_mech.h", "a00752.html", null ], + [ "pkcs11_object.c", "a00755.html", "a00755" ], + [ "pkcs11_object.h", "a00758.html", "a00758" ], + [ "pkcs11_os.c", "a00761.html", "a00761" ], + [ "pkcs11_os.h", "a00764.html", "a00764" ], + [ "pkcs11_session.c", "a00767.html", "a00767" ], + [ "pkcs11_session.h", "a00770.html", "a00770" ], + [ "pkcs11_signature.c", "a00773.html", "a00773" ], + [ "pkcs11_signature.h", "a00776.html", "a00776" ], + [ "pkcs11_slot.c", "a00779.html", "a00779" ], + [ "pkcs11_slot.h", "a00782.html", "a00782" ], + [ "pkcs11_token.c", "a00803.html", "a00803" ], + [ "pkcs11_token.h", "a00785.html", "a00785" ], + [ "pkcs11_util.c", "a00788.html", null ], + [ "pkcs11_util.h", "a00791.html", null ] ]; \ No newline at end of file diff --git a/dir_b9d9bcd31faf1443658640fef106169e.html b/dir_b9d9bcd31faf1443658640fef106169e.html index 44cbb7868..6ebf31669 100644 --- a/dir_b9d9bcd31faf1443658640fef106169e.html +++ b/dir_b9d9bcd31faf1443658640fef106169e.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,14 +103,14 @@ - - + + - - + + - - + +

Files

file  atca_wolfssl_interface.c
 Crypto abstraction functions for external host side cryptography.
file  atca_wolfssl_interface.c
 Crypto abstraction functions for external host side cryptography.
 
file  atca_wolfssl_interface.h
 Configuration Check for WolfSSL Integration Support.
file  atca_wolfssl_interface.h
 Configuration Check for WolfSSL Integration Support.
 
file  atca_wolfssl_internal.h
 WolfSSL Integration Support.
file  atca_wolfssl_internal.h
 WolfSSL Integration Support.
 
diff --git a/dir_b9d9bcd31faf1443658640fef106169e.js b/dir_b9d9bcd31faf1443658640fef106169e.js index a058d46f9..6f8065c3d 100644 --- a/dir_b9d9bcd31faf1443658640fef106169e.js +++ b/dir_b9d9bcd31faf1443658640fef106169e.js @@ -1,6 +1,6 @@ var dir_b9d9bcd31faf1443658640fef106169e = [ - [ "atca_wolfssl_interface.c", "a00791.html", null ], - [ "atca_wolfssl_interface.h", "a00794.html", null ], - [ "atca_wolfssl_internal.h", "a00797.html", null ] + [ "atca_wolfssl_interface.c", "a00806.html", null ], + [ "atca_wolfssl_interface.h", "a00809.html", null ], + [ "atca_wolfssl_internal.h", "a00812.html", null ] ]; \ No newline at end of file diff --git a/dir_c4875bffc6c901e8f9ea57d13c10be7a.html b/dir_c4875bffc6c901e8f9ea57d13c10be7a.html index 551c85cef..cc09d42bf 100644 --- a/dir_c4875bffc6c901e8f9ea57d13c10be7a.html +++ b/dir_c4875bffc6c901e8f9ea57d13c10be7a.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,11 +103,11 @@ - - + + - - + +

Files

file  atca_mbedtls_interface.h
 Configuration Check for MbedTLS Integration Support.
file  atca_mbedtls_interface.h
 Configuration Check for MbedTLS Integration Support.
 
file  atca_mbedtls_wrap.c
 Wrapper functions to replace cryptoauthlib software crypto functions with the mbedTLS equivalent.
file  atca_mbedtls_wrap.c
 Wrapper functions to replace cryptoauthlib software crypto functions with the mbedTLS equivalent.
 
diff --git a/dir_c4875bffc6c901e8f9ea57d13c10be7a.js b/dir_c4875bffc6c901e8f9ea57d13c10be7a.js index a73504ceb..cba197859 100644 --- a/dir_c4875bffc6c901e8f9ea57d13c10be7a.js +++ b/dir_c4875bffc6c901e8f9ea57d13c10be7a.js @@ -1,5 +1,5 @@ var dir_c4875bffc6c901e8f9ea57d13c10be7a = [ - [ "atca_mbedtls_interface.h", "a00653.html", "a00653" ], - [ "atca_mbedtls_wrap.c", "a00656.html", "a00656" ] + [ "atca_mbedtls_interface.h", "a00668.html", "a00668" ], + [ "atca_mbedtls_wrap.c", "a00671.html", "a00671" ] ]; \ No newline at end of file diff --git a/dir_d422163b96683743ed3963d4aac17747.html b/dir_d422163b96683743ed3963d4aac17747.html index d72528b79..a135a04f8 100644 --- a/dir_d422163b96683743ed3963d4aac17747.html +++ b/dir_d422163b96683743ed3963d4aac17747.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_dbc902ed54f25d1382ab433b67c4a47f.html b/dir_dbc902ed54f25d1382ab433b67c4a47f.html index 9be6cb1b4..4295900e2 100644 --- a/dir_dbc902ed54f25d1382ab433b67c4a47f.html +++ b/dir_dbc902ed54f25d1382ab433b67c4a47f.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/dir_e870e4dac26de7990352b1cb7547818f.html b/dir_e870e4dac26de7990352b1cb7547818f.html index 1de947f77..6101b76e1 100644 --- a/dir_e870e4dac26de7990352b1cb7547818f.html +++ b/dir_e870e4dac26de7990352b1cb7547818f.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,107 +103,107 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - + - - + + - - + + - + - +

Files

file  atca_hal.c
 low-level HAL - methods used to setup indirection to physical layer interface. this level does the dirty work of abstracting the higher level ATCAIFace methods from the low-level physical interfaces. Its main goal is to keep low-level details from bleeding into the logical interface implemetation.
file  atca_hal.c
 low-level HAL - methods used to setup indirection to physical layer interface. this level does the dirty work of abstracting the higher level ATCAIFace methods from the low-level physical interfaces. Its main goal is to keep low-level details from bleeding into the logical interface implemetation.
 
file  atca_hal.h
 low-level HAL - methods used to setup indirection to physical layer interface
file  atca_hal.h
 low-level HAL - methods used to setup indirection to physical layer interface
 
file  hal_all_platforms_kit_hidapi.c
 HAL for kit protocol over HID for any platform.
file  hal_all_platforms_kit_hidapi.c
 HAL for kit protocol over HID for any platform.
 
file  hal_freertos.c
 FreeRTOS Hardware/OS Abstration Layer.
file  hal_freertos.c
 FreeRTOS Hardware/OS Abstration Layer.
 
file  hal_gpio_harmony.c
 ATCA Hardware abstraction layer for GPIO.
file  hal_gpio_harmony.c
 ATCA Hardware abstraction layer for GPIO.
 
file  hal_i2c_harmony.c
 ATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB.
file  hal_i2c_harmony.c
 ATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB.
 
file  hal_i2c_start.c
 ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.
file  hal_i2c_start.c
 ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.
 
file  hal_i2c_start.h
 ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.
file  hal_i2c_start.h
 ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.
 
file  hal_kit_bridge.c
 Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.
file  hal_kit_bridge.c
 Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.
 
file  hal_kit_bridge.h
 Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.
file  hal_kit_bridge.h
 Kit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit.
 
file  hal_linux.c
 Timer Utility Functions for Linux.
file  hal_linux.c
 Timer Utility Functions for Linux.
 
file  hal_linux_i2c_userspace.c
 ATCA Hardware abstraction layer for Linux using I2C.
file  hal_linux_i2c_userspace.c
 ATCA Hardware abstraction layer for Linux using I2C.
 
file  hal_linux_uart_userspace.c
 ATCA Hardware abstraction layer for Linux using UART.
file  hal_linux_uart_userspace.c
 ATCA Hardware abstraction layer for Linux using UART.
 
file  hal_sam0_i2c_asf.c
 ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.
file  hal_sam0_i2c_asf.c
 ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.
 
file  hal_sam0_i2c_asf.h
 ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.
file  hal_sam0_i2c_asf.h
 ATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers.
 
file  hal_sam_i2c_asf.c
 ATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers.
file  hal_sam_i2c_asf.c
 ATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers.
 
file  hal_sam_i2c_asf.h
 ATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers.
file  hal_sam_i2c_asf.h
 ATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers.
 
file  hal_sam_timer_asf.c
 ATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers.
file  hal_sam_timer_asf.c
 ATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers.
 
file  hal_spi_harmony.c
 ATCA Hardware abstraction layer for SPI over Harmony PLIB.
file  hal_spi_harmony.c
 ATCA Hardware abstraction layer for SPI over Harmony PLIB.
 
file  hal_swi_gpio.c
 ATCA Hardware abstraction layer for 1WIRE or SWI over GPIO.
file  hal_swi_gpio.c
 ATCA Hardware abstraction layer for 1WIRE or SWI over GPIO.
 
file  hal_swi_gpio.h
 ATCA Hardware abstraction layer for SWI over GPIO drivers.
file  hal_swi_gpio.h
 ATCA Hardware abstraction layer for SWI over GPIO drivers.
 
file  hal_swi_uart.c
 ATCA Hardware abstraction layer for SWI over UART drivers.
file  hal_swi_uart.c
 ATCA Hardware abstraction layer for SWI over UART drivers.
 
file  hal_timer_start.c
 ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.
file  hal_timer_start.c
 ATCA Hardware abstraction layer for SAMD21 I2C over START drivers.
 
file  hal_uart_harmony.c
 ATCA Hardware abstraction layer for SWI uart over Harmony PLIB.
file  hal_uart_harmony.c
 ATCA Hardware abstraction layer for SWI uart over Harmony PLIB.
 
file  hal_uc3_i2c_asf.c
 ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.
file  hal_uc3_i2c_asf.c
 ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.
 
file  hal_uc3_i2c_asf.h
 ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.
file  hal_uc3_i2c_asf.h
 ATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers.
 
file  hal_uc3_timer_asf.c
 ATCA Hardware abstraction layer for SAM4S I2C over ASF drivers.
file  hal_uc3_timer_asf.c
 ATCA Hardware abstraction layer for SAM4S I2C over ASF drivers.
 
file  hal_windows.c
 ATCA Hardware abstraction layer for windows timer functions.
file  hal_windows.c
 ATCA Hardware abstraction layer for windows timer functions.
 
file  hal_windows_kit_uart.c
 ATCA Hardware abstraction layer for Windows using UART.
file  hal_windows_kit_uart.c
 ATCA Hardware abstraction layer for Windows using UART.
 
file  kit_protocol.c
 Microchip Crypto Auth hardware interface object.
file  kit_protocol.c
 Microchip Crypto Auth hardware interface object.
 
file  kit_protocol.h
file  kit_protocol.h
 
file  swi_uart_samd21_asf.c
 ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.
file  swi_uart_samd21_asf.c
 ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.
 
file  swi_uart_samd21_asf.h
 ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.
file  swi_uart_samd21_asf.h
 ATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers.
 
file  swi_uart_start.c
file  swi_uart_start.c
 
file  swi_uart_start.h
file  swi_uart_start.h
 
diff --git a/dir_e870e4dac26de7990352b1cb7547818f.js b/dir_e870e4dac26de7990352b1cb7547818f.js index fef7f59ff..cba7f38aa 100644 --- a/dir_e870e4dac26de7990352b1cb7547818f.js +++ b/dir_e870e4dac26de7990352b1cb7547818f.js @@ -1,38 +1,38 @@ var dir_e870e4dac26de7990352b1cb7547818f = [ - [ "atca_hal.c", "a00512.html", "a00512" ], - [ "atca_hal.h", "a00515.html", "a00515" ], - [ "hal_all_platforms_kit_hidapi.c", "a00524.html", "a00524" ], - [ "hal_freertos.c", "a00533.html", "a00533" ], - [ "hal_gpio_harmony.c", "a00536.html", "a00536" ], - [ "hal_i2c_harmony.c", "a00539.html", "a00539" ], - [ "hal_i2c_start.c", "a00542.html", "a00542" ], - [ "hal_i2c_start.h", "a00545.html", null ], - [ "hal_kit_bridge.c", "a00548.html", "a00548" ], - [ "hal_kit_bridge.h", "a00551.html", "a00551" ], - [ "hal_linux.c", "a00554.html", "a00554" ], - [ "hal_linux_i2c_userspace.c", "a00557.html", "a00557" ], - [ "hal_linux_uart_userspace.c", "a00563.html", "a00563" ], - [ "hal_sam0_i2c_asf.c", "a00566.html", "a00566" ], - [ "hal_sam0_i2c_asf.h", "a00569.html", "a00569" ], - [ "hal_sam_i2c_asf.c", "a00572.html", "a00572" ], - [ "hal_sam_i2c_asf.h", "a00575.html", null ], - [ "hal_sam_timer_asf.c", "a00578.html", "a00578" ], - [ "hal_spi_harmony.c", "a00581.html", "a00581" ], - [ "hal_swi_gpio.c", "a00584.html", "a00584" ], - [ "hal_swi_gpio.h", "a00587.html", "a00587" ], - [ "hal_swi_uart.c", "a00590.html", "a00590" ], - [ "hal_timer_start.c", "a00593.html", "a00593" ], - [ "hal_uart_harmony.c", "a00596.html", "a00596" ], - [ "hal_uc3_i2c_asf.c", "a00599.html", "a00599" ], - [ "hal_uc3_i2c_asf.h", "a00602.html", "a00602" ], - [ "hal_uc3_timer_asf.c", "a00605.html", "a00605" ], - [ "hal_windows.c", "a00608.html", "a00608" ], - [ "hal_windows_kit_uart.c", "a00611.html", "a00611" ], - [ "kit_protocol.c", "a00629.html", "a00629" ], - [ "kit_protocol.h", "a00614.html", "a00614" ], - [ "swi_uart_samd21_asf.c", "a00617.html", "a00617" ], - [ "swi_uart_samd21_asf.h", "a00620.html", "a00620" ], - [ "swi_uart_start.c", "a00623.html", "a00623" ], - [ "swi_uart_start.h", "a00626.html", "a00626" ] + [ "atca_hal.c", "a00527.html", "a00527" ], + [ "atca_hal.h", "a00530.html", "a00530" ], + [ "hal_all_platforms_kit_hidapi.c", "a00539.html", "a00539" ], + [ "hal_freertos.c", "a00548.html", "a00548" ], + [ "hal_gpio_harmony.c", "a00551.html", "a00551" ], + [ "hal_i2c_harmony.c", "a00554.html", "a00554" ], + [ "hal_i2c_start.c", "a00557.html", "a00557" ], + [ "hal_i2c_start.h", "a00560.html", null ], + [ "hal_kit_bridge.c", "a00563.html", "a00563" ], + [ "hal_kit_bridge.h", "a00566.html", "a00566" ], + [ "hal_linux.c", "a00569.html", "a00569" ], + [ "hal_linux_i2c_userspace.c", "a00572.html", "a00572" ], + [ "hal_linux_uart_userspace.c", "a00578.html", "a00578" ], + [ "hal_sam0_i2c_asf.c", "a00581.html", "a00581" ], + [ "hal_sam0_i2c_asf.h", "a00584.html", "a00584" ], + [ "hal_sam_i2c_asf.c", "a00587.html", "a00587" ], + [ "hal_sam_i2c_asf.h", "a00590.html", null ], + [ "hal_sam_timer_asf.c", "a00593.html", "a00593" ], + [ "hal_spi_harmony.c", "a00596.html", "a00596" ], + [ "hal_swi_gpio.c", "a00599.html", "a00599" ], + [ "hal_swi_gpio.h", "a00602.html", "a00602" ], + [ "hal_swi_uart.c", "a00605.html", "a00605" ], + [ "hal_timer_start.c", "a00608.html", "a00608" ], + [ "hal_uart_harmony.c", "a00611.html", "a00611" ], + [ "hal_uc3_i2c_asf.c", "a00614.html", "a00614" ], + [ "hal_uc3_i2c_asf.h", "a00617.html", "a00617" ], + [ "hal_uc3_timer_asf.c", "a00620.html", "a00620" ], + [ "hal_windows.c", "a00623.html", "a00623" ], + [ "hal_windows_kit_uart.c", "a00626.html", "a00626" ], + [ "kit_protocol.c", "a00644.html", "a00644" ], + [ "kit_protocol.h", "a00629.html", "a00629" ], + [ "swi_uart_samd21_asf.c", "a00632.html", "a00632" ], + [ "swi_uart_samd21_asf.h", "a00635.html", "a00635" ], + [ "swi_uart_start.c", "a00638.html", "a00638" ], + [ "swi_uart_start.h", "a00641.html", "a00641" ] ]; \ No newline at end of file diff --git a/dir_ec1cbef6cba079ce838897574eab818a.html b/dir_ec1cbef6cba079ce838897574eab818a.html index 390607253..373184d14 100644 --- a/dir_ec1cbef6cba079ce838897574eab818a.html +++ b/dir_ec1cbef6cba079ce838897574eab818a.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,11 +103,11 @@ - - + + - - + +

Files

file  atca_openssl_interface.c
 Crypto abstraction functions for external host side cryptography.
file  atca_openssl_interface.c
 Crypto abstraction functions for external host side cryptography.
 
file  atca_openssl_interface.h
 OpenSSL Integration Support.
file  atca_openssl_interface.h
 OpenSSL Integration Support.
 
diff --git a/dir_ec1cbef6cba079ce838897574eab818a.js b/dir_ec1cbef6cba079ce838897574eab818a.js index b2f3c954b..309ebeec7 100644 --- a/dir_ec1cbef6cba079ce838897574eab818a.js +++ b/dir_ec1cbef6cba079ce838897574eab818a.js @@ -1,5 +1,5 @@ var dir_ec1cbef6cba079ce838897574eab818a = [ - [ "atca_openssl_interface.c", "a00662.html", "a00662" ], - [ "atca_openssl_interface.h", "a00665.html", "a00665" ] + [ "atca_openssl_interface.c", "a00677.html", "a00677" ], + [ "atca_openssl_interface.h", "a00680.html", "a00680" ] ]; \ No newline at end of file diff --git a/dir_fe677a742bdf73affcb7505b38a59233.html b/dir_fe677a742bdf73affcb7505b38a59233.html index 4fc241a56..577a4443e 100644 --- a/dir_fe677a742bdf73affcb7505b38a59233.html +++ b/dir_fe677a742bdf73affcb7505b38a59233.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -103,107 +103,113 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + + + + + + +

Files

file  calib_aes.c
 CryptoAuthLib Basic API methods for AES command.
file  calib_aes.c
 CryptoAuthLib Basic API methods for AES command.
 
file  calib_aes_gcm.c
 CryptoAuthLib Basic API methods for AES GCM mode.
file  calib_aes_gcm.c
 CryptoAuthLib Basic API methods for AES GCM mode.
 
file  calib_aes_gcm.h
 Unity tests for the cryptoauthlib AES GCM functions.
file  calib_aes_gcm.h
 Unity tests for the cryptoauthlib AES GCM functions.
 
file  calib_basic.c
 CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.
file  calib_basic.c
 CryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods.
 
file  calib_checkmac.c
 CryptoAuthLib Basic API methods for CheckMAC command.
file  calib_checkmac.c
 CryptoAuthLib Basic API methods for CheckMAC command.
 
file  calib_command.c
 Microchip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface.
file  calib_command.c
 Microchip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface.
 
file  calib_command.h
 Microchip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch.
file  calib_command.h
 Microchip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch.
 
file  calib_config_check.h
 Consistency checks for configuration options.
file  calib_config_check.h
 Consistency checks for configuration options.
 
file  calib_counter.c
 CryptoAuthLib Basic API methods for Counter command.
file  calib_counter.c
 CryptoAuthLib Basic API methods for Counter command.
 
file  calib_delete.c
 CryptoAuthLib Basic API methods for Delete command.
file  calib_delete.c
 CryptoAuthLib Basic API methods for Delete command.
 
file  calib_derivekey.c
 CryptoAuthLib Basic API methods for DeriveKey command.
file  calib_derivekey.c
 CryptoAuthLib Basic API methods for DeriveKey command.
 
file  calib_device.h
 Microchip Crypto Auth Device Data.
file  calib_device.h
 Microchip Crypto Auth Device Data.
 
file  calib_ecdh.c
 CryptoAuthLib Basic API methods for ECDH command.
file  calib_ecdh.c
 CryptoAuthLib Basic API methods for ECDH command.
 
file  calib_execution.c
 Implements an execution handler that executes a given command on a device and returns the results.
file  calib_execution.c
 Implements an execution handler that executes a given command on a device and returns the results.
 
file  calib_execution.h
 Defines an execution handler that executes a given command on a device and returns the results.
file  calib_execution.h
 Defines an execution handler that executes a given command on a device and returns the results.
 
file  calib_gendig.c
 CryptoAuthLib Basic API methods for GenDig command.
file  calib_gendig.c
 CryptoAuthLib Basic API methods for GenDig command.
 
file  calib_genkey.c
 CryptoAuthLib Basic API methods for GenKey command.
file  calib_genkey.c
 CryptoAuthLib Basic API methods for GenKey command.
 
file  calib_helpers.c
 CryptoAuthLib Basic API - Helper Functions to.
file  calib_helpers.c
 CryptoAuthLib Basic API - Helper Functions to.
 
file  calib_hmac.c
 CryptoAuthLib Basic API methods for HMAC command.
file  calib_hmac.c
 CryptoAuthLib Basic API methods for HMAC command.
 
file  calib_info.c
 CryptoAuthLib Basic API methods for Info command.
file  calib_info.c
 CryptoAuthLib Basic API methods for Info command.
 
file  calib_kdf.c
 CryptoAuthLib Basic API methods for KDF command.
file  calib_kdf.c
 CryptoAuthLib Basic API methods for KDF command.
 
file  calib_lock.c
 CryptoAuthLib Basic API methods for Lock command.
file  calib_lock.c
 CryptoAuthLib Basic API methods for Lock command.
 
file  calib_mac.c
 CryptoAuthLib Basic API methods for MAC command.
file  calib_mac.c
 CryptoAuthLib Basic API methods for MAC command.
 
file  calib_nonce.c
 CryptoAuthLib Basic API methods for Nonce command.
file  calib_nonce.c
 CryptoAuthLib Basic API methods for Nonce command.
 
file  calib_privwrite.c
 CryptoAuthLib Basic API methods for PrivWrite command.
file  calib_packet.c
 CryptoAuthLib API for packet allocation.
 
file  calib_random.c
 CryptoAuthLib Basic API methods for Random command.
file  calib_packet.h
 Defines packet allocation functions.
 
file  calib_read.c
 CryptoAuthLib Basic API methods for Read command.
file  calib_privwrite.c
 CryptoAuthLib Basic API methods for PrivWrite command.
 
file  calib_secureboot.c
 CryptoAuthLib Basic API methods for SecureBoot command.
file  calib_random.c
 CryptoAuthLib Basic API methods for Random command.
 
file  calib_selftest.c
 CryptoAuthLib Basic API methods for SelfTest command.
file  calib_read.c
 CryptoAuthLib Basic API methods for Read command.
 
file  calib_sha.c
 CryptoAuthLib Basic API methods for SHA command.
file  calib_secureboot.c
 CryptoAuthLib Basic API methods for SecureBoot command.
 
file  calib_sign.c
 CryptoAuthLib Basic API methods for Sign command.
file  calib_selftest.c
 CryptoAuthLib Basic API methods for SelfTest command.
 
file  calib_updateextra.c
 CryptoAuthLib Basic API methods for UpdateExtra command.
file  calib_sha.c
 CryptoAuthLib Basic API methods for SHA command.
 
file  calib_verify.c
 CryptoAuthLib Basic API methods for Verify command.
file  calib_sign.c
 CryptoAuthLib Basic API methods for Sign command.
 
file  calib_write.c
 CryptoAuthLib Basic API methods for Write command.
file  calib_updateextra.c
 CryptoAuthLib Basic API methods for UpdateExtra command.
 
file  calib_verify.c
 CryptoAuthLib Basic API methods for Verify command.
 
file  calib_write.c
 CryptoAuthLib Basic API methods for Write command.
 
diff --git a/dir_fe677a742bdf73affcb7505b38a59233.js b/dir_fe677a742bdf73affcb7505b38a59233.js index 87320897a..ae81428ad 100644 --- a/dir_fe677a742bdf73affcb7505b38a59233.js +++ b/dir_fe677a742bdf73affcb7505b38a59233.js @@ -1,37 +1,39 @@ var dir_fe677a742bdf73affcb7505b38a59233 = [ - [ "calib_aes.c", "a00329.html", null ], - [ "calib_aes_gcm.c", "a00332.html", null ], - [ "calib_aes_gcm.h", "a00335.html", null ], - [ "calib_basic.c", "a00338.html", "a00338" ], - [ "calib_checkmac.c", "a00344.html", null ], - [ "calib_command.c", "a00347.html", "a00347" ], - [ "calib_command.h", "a00350.html", "a00350" ], - [ "calib_config_check.h", "a00353.html", "a00353" ], - [ "calib_counter.c", "a00356.html", null ], - [ "calib_delete.c", "a00359.html", null ], - [ "calib_derivekey.c", "a00362.html", null ], - [ "calib_device.h", "a00365.html", null ], - [ "calib_ecdh.c", "a00368.html", null ], - [ "calib_execution.c", "a00371.html", "a00371" ], - [ "calib_execution.h", "a00374.html", "a00374" ], - [ "calib_gendig.c", "a00377.html", null ], - [ "calib_genkey.c", "a00380.html", null ], - [ "calib_helpers.c", "a00383.html", "a00383" ], - [ "calib_hmac.c", "a00386.html", null ], - [ "calib_info.c", "a00389.html", "a00389" ], - [ "calib_kdf.c", "a00392.html", null ], - [ "calib_lock.c", "a00395.html", null ], - [ "calib_mac.c", "a00398.html", null ], - [ "calib_nonce.c", "a00401.html", null ], - [ "calib_privwrite.c", "a00404.html", null ], - [ "calib_random.c", "a00407.html", null ], - [ "calib_read.c", "a00410.html", null ], - [ "calib_secureboot.c", "a00413.html", null ], - [ "calib_selftest.c", "a00416.html", null ], - [ "calib_sha.c", "a00419.html", null ], - [ "calib_sign.c", "a00422.html", null ], - [ "calib_updateextra.c", "a00425.html", null ], - [ "calib_verify.c", "a00428.html", null ], - [ "calib_write.c", "a00431.html", null ] + [ "calib_aes.c", "a00335.html", null ], + [ "calib_aes_gcm.c", "a00338.html", null ], + [ "calib_aes_gcm.h", "a00341.html", null ], + [ "calib_basic.c", "a00344.html", "a00344" ], + [ "calib_checkmac.c", "a00350.html", null ], + [ "calib_command.c", "a00353.html", "a00353" ], + [ "calib_command.h", "a00356.html", "a00356" ], + [ "calib_config_check.h", "a00359.html", "a00359" ], + [ "calib_counter.c", "a00362.html", null ], + [ "calib_delete.c", "a00365.html", null ], + [ "calib_derivekey.c", "a00368.html", null ], + [ "calib_device.h", "a00371.html", null ], + [ "calib_ecdh.c", "a00374.html", null ], + [ "calib_execution.c", "a00377.html", "a00377" ], + [ "calib_execution.h", "a00380.html", "a00380" ], + [ "calib_gendig.c", "a00383.html", null ], + [ "calib_genkey.c", "a00386.html", null ], + [ "calib_helpers.c", "a00389.html", "a00389" ], + [ "calib_hmac.c", "a00392.html", null ], + [ "calib_info.c", "a00395.html", "a00395" ], + [ "calib_kdf.c", "a00398.html", null ], + [ "calib_lock.c", "a00401.html", null ], + [ "calib_mac.c", "a00404.html", null ], + [ "calib_nonce.c", "a00407.html", null ], + [ "calib_packet.c", "a00410.html", null ], + [ "calib_packet.h", "a00413.html", null ], + [ "calib_privwrite.c", "a00416.html", null ], + [ "calib_random.c", "a00419.html", null ], + [ "calib_read.c", "a00422.html", null ], + [ "calib_secureboot.c", "a00425.html", null ], + [ "calib_selftest.c", "a00428.html", null ], + [ "calib_sha.c", "a00431.html", null ], + [ "calib_sign.c", "a00434.html", null ], + [ "calib_updateextra.c", "a00437.html", null ], + [ "calib_verify.c", "a00440.html", null ], + [ "calib_write.c", "a00443.html", null ] ]; \ No newline at end of file diff --git a/files.html b/files.html index 784234576..785c7a345 100644 --- a/files.html +++ b/files.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -141,196 +141,199 @@  tngtls_cert_def_3_device.cTNG TLS device certificate definition  tngtls_cert_def_3_device.hTNG TLS device certificate definition   wpc - wpc_apis.cProvides api interfaces for WPC authentication - wpc_apis.hProvides api interfaces for WPC authentication + wpc_apis.cProvides api interfaces for WPC authentication + wpc_apis.hProvides api interfaces for WPC authentication  wpccert_client.cProvides api interfaces for accessing WPC certificates from device  wpccert_client.hProvides api interfaces for accessing WPC certificates from device   lib   atcacert - atcacert.hDeclarations common to all atcacert code - atcacert_check_config.hConfiguration check and defaults for the atcacert module - atcacert_client.cClient side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device - atcacert_client.hClient side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device - atcacert_date.cDate handling with regard to certificates - atcacert_date.hDeclarations for date handling with regard to certificates - atcacert_def.cMain certificate definition implementation - atcacert_def.hDeclarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices - atcacert_der.cFunctions required to work with DER encoded data related to X.509 certificates - atcacert_der.hFunction declarations required to work with DER encoded data related to X.509 certificates - atcacert_host_hw.cHost side methods using CryptoAuth hardware - atcacert_host_hw.hHost side methods using CryptoAuth hardware - atcacert_host_sw.cHost side methods using software implementations - atcacert_host_sw.hHost side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library - atcacert_pem.cFunctions required to work with PEM encoded data related to X.509 certificates - atcacert_pem.hFunctions for converting between DER and PEM formats + atcacert.hDeclarations common to all atcacert code + atcacert_check_config.hConfiguration check and defaults for the atcacert module + atcacert_client.cClient side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device + atcacert_client.hClient side cert i/o methods. These declarations deal with the client-side, the node being authenticated, of the authentication process. It is assumed the client has an ECC CryptoAuthentication device (e.g. ATECC508A) and the certificates are stored on that device + atcacert_date.cDate handling with regard to certificates + atcacert_date.hDeclarations for date handling with regard to certificates + atcacert_def.cMain certificate definition implementation + atcacert_def.hDeclarations for certificates related to ECC CryptoAuthentication devices. These are the definitions required to define a certificate and its various elements with regards to the CryptoAuthentication ECC devices + atcacert_der.cFunctions required to work with DER encoded data related to X.509 certificates + atcacert_der.hFunction declarations required to work with DER encoded data related to X.509 certificates + atcacert_host_hw.cHost side methods using CryptoAuth hardware + atcacert_host_hw.hHost side methods using CryptoAuth hardware + atcacert_host_sw.cHost side methods using software implementations + atcacert_host_sw.hHost side methods using software implementations. host-side, the one authenticating a client, of the authentication process. Crypto functions are performed using a software library + atcacert_pem.cFunctions required to work with PEM encoded data related to X.509 certificates + atcacert_pem.hFunctions for converting between DER and PEM formats   calib - calib_aes.cCryptoAuthLib Basic API methods for AES command - calib_aes_gcm.cCryptoAuthLib Basic API methods for AES GCM mode - calib_aes_gcm.hUnity tests for the cryptoauthlib AES GCM functions - calib_basic.cCryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods - calib_checkmac.cCryptoAuthLib Basic API methods for CheckMAC command - calib_command.cMicrochip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface - calib_command.hMicrochip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch - calib_config_check.hConsistency checks for configuration options - calib_counter.cCryptoAuthLib Basic API methods for Counter command - calib_delete.cCryptoAuthLib Basic API methods for Delete command - calib_derivekey.cCryptoAuthLib Basic API methods for DeriveKey command - calib_device.hMicrochip Crypto Auth Device Data - calib_ecdh.cCryptoAuthLib Basic API methods for ECDH command - calib_execution.cImplements an execution handler that executes a given command on a device and returns the results - calib_execution.hDefines an execution handler that executes a given command on a device and returns the results - calib_gendig.cCryptoAuthLib Basic API methods for GenDig command - calib_genkey.cCryptoAuthLib Basic API methods for GenKey command - calib_helpers.cCryptoAuthLib Basic API - Helper Functions to - calib_hmac.cCryptoAuthLib Basic API methods for HMAC command - calib_info.cCryptoAuthLib Basic API methods for Info command - calib_kdf.cCryptoAuthLib Basic API methods for KDF command - calib_lock.cCryptoAuthLib Basic API methods for Lock command - calib_mac.cCryptoAuthLib Basic API methods for MAC command - calib_nonce.cCryptoAuthLib Basic API methods for Nonce command - calib_privwrite.cCryptoAuthLib Basic API methods for PrivWrite command - calib_random.cCryptoAuthLib Basic API methods for Random command - calib_read.cCryptoAuthLib Basic API methods for Read command - calib_secureboot.cCryptoAuthLib Basic API methods for SecureBoot command - calib_selftest.cCryptoAuthLib Basic API methods for SelfTest command - calib_sha.cCryptoAuthLib Basic API methods for SHA command - calib_sign.cCryptoAuthLib Basic API methods for Sign command - calib_updateextra.cCryptoAuthLib Basic API methods for UpdateExtra command - calib_verify.cCryptoAuthLib Basic API methods for Verify command - calib_write.cCryptoAuthLib Basic API methods for Write command + calib_aes.cCryptoAuthLib Basic API methods for AES command + calib_aes_gcm.cCryptoAuthLib Basic API methods for AES GCM mode + calib_aes_gcm.hUnity tests for the cryptoauthlib AES GCM functions + calib_basic.cCryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods + calib_checkmac.cCryptoAuthLib Basic API methods for CheckMAC command + calib_command.cMicrochip CryptoAuthentication device command builder - this is the main object that builds the command byte strings for the given device. It does not execute the command. The basic flow is to call a command method to build the command you want given the parameters and then send that byte string through the device interface + calib_command.hMicrochip Crypto Auth device command object - this is a command builder only, it does not send the command. The result of a command method is a fully formed packet, ready to send to the ATCAIFace object to dispatch + calib_config_check.hConsistency checks for configuration options + calib_counter.cCryptoAuthLib Basic API methods for Counter command + calib_delete.cCryptoAuthLib Basic API methods for Delete command + calib_derivekey.cCryptoAuthLib Basic API methods for DeriveKey command + calib_device.hMicrochip Crypto Auth Device Data + calib_ecdh.cCryptoAuthLib Basic API methods for ECDH command + calib_execution.cImplements an execution handler that executes a given command on a device and returns the results + calib_execution.hDefines an execution handler that executes a given command on a device and returns the results + calib_gendig.cCryptoAuthLib Basic API methods for GenDig command + calib_genkey.cCryptoAuthLib Basic API methods for GenKey command + calib_helpers.cCryptoAuthLib Basic API - Helper Functions to + calib_hmac.cCryptoAuthLib Basic API methods for HMAC command + calib_info.cCryptoAuthLib Basic API methods for Info command + calib_kdf.cCryptoAuthLib Basic API methods for KDF command + calib_lock.cCryptoAuthLib Basic API methods for Lock command + calib_mac.cCryptoAuthLib Basic API methods for MAC command + calib_nonce.cCryptoAuthLib Basic API methods for Nonce command + calib_packet.cCryptoAuthLib API for packet allocation + calib_packet.hDefines packet allocation functions + calib_privwrite.cCryptoAuthLib Basic API methods for PrivWrite command + calib_random.cCryptoAuthLib Basic API methods for Random command + calib_read.cCryptoAuthLib Basic API methods for Read command + calib_secureboot.cCryptoAuthLib Basic API methods for SecureBoot command + calib_selftest.cCryptoAuthLib Basic API methods for SelfTest command + calib_sha.cCryptoAuthLib Basic API methods for SHA command + calib_sign.cCryptoAuthLib Basic API methods for Sign command + calib_updateextra.cCryptoAuthLib Basic API methods for UpdateExtra command + calib_verify.cCryptoAuthLib Basic API methods for Verify command + calib_write.cCryptoAuthLib Basic API methods for Write command   crypto   hashes - sha1_routines.cSoftware implementation of the SHA1 algorithm - sha1_routines.hSoftware implementation of the SHA1 algorithm - sha2_routines.cSoftware implementation of the SHA256 algorithm - sha2_routines.hSoftware implementation of the SHA256 algorithm - atca_crypto_hw_aes.hAES CTR, CBC & CMAC structure definitions - atca_crypto_hw_aes_cbc.cCryptoAuthLib Basic API methods for AES CBC mode - atca_crypto_hw_aes_cbcmac.cCryptoAuthLib Basic API methods for AES CBC_MAC mode - atca_crypto_hw_aes_ccm.cCryptoAuthLib Basic API methods for AES CCM mode - atca_crypto_hw_aes_cmac.cCryptoAuthLib Basic API methods for AES CBC_MAC mode - atca_crypto_hw_aes_ctr.cCryptoAuthLib Basic API methods for AES CTR mode - atca_crypto_pad.cImplementation of PKCS7 Padding for block encryption - atca_crypto_pbkdf2.cImplementation of the PBKDF2 algorithm for use in generating password hashes - atca_crypto_sw.hCommon defines for CryptoAuthLib software crypto wrappers - atca_crypto_sw_aes_gcm.cCommon Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation - atca_crypto_sw_sha1.cWrapper API for SHA 1 routines - atca_crypto_sw_sha1.hWrapper API for SHA 1 routines - atca_crypto_sw_sha2.cWrapper API for software SHA 256 routines - atca_crypto_sw_sha2.hWrapper API for software SHA 256 routines - crypto_hw_config_check.hConsistency checks for configuration options - crypto_sw_config_check.hConsistency checks for configuration options + sha1_routines.cSoftware implementation of the SHA1 algorithm + sha1_routines.hSoftware implementation of the SHA1 algorithm + sha2_routines.cSoftware implementation of the SHA256, SHA384 and SHA512 algorithm + sha2_routines.hSoftware implementation of the SHA256, SHA384 and SHA512 algorithm + atca_crypto_hw_aes.hAES CTR, CBC & CMAC structure definitions + atca_crypto_hw_aes_cbc.cCryptoAuthLib Basic API methods for AES CBC mode + atca_crypto_hw_aes_cbcmac.cCryptoAuthLib Basic API methods for AES CBC_MAC mode + atca_crypto_hw_aes_ccm.cCryptoAuthLib Basic API methods for AES CCM mode + atca_crypto_hw_aes_cmac.cCryptoAuthLib Basic API methods for AES CBC_MAC mode + atca_crypto_hw_aes_ctr.cCryptoAuthLib Basic API methods for AES CTR mode + atca_crypto_pad.cImplementation of PKCS7 Padding for block encryption + atca_crypto_pbkdf2.cImplementation of the PBKDF2 algorithm for use in generating password hashes + atca_crypto_sw.hCommon defines for CryptoAuthLib software crypto wrappers + atca_crypto_sw_aes_cmac.cCommon Wrapper for host side AES-CMAC implementations that feature update APIs rather than an all at once implementation + atca_crypto_sw_aes_gcm.cCommon Wrapper for host side AES-GCM implementations that feature update APIs rather than an all at once implementation + atca_crypto_sw_sha1.cWrapper API for SHA 1 routines + atca_crypto_sw_sha1.hWrapper API for SHA 1 routines + atca_crypto_sw_sha2.cWrapper API for software SHA 256 routines + atca_crypto_sw_sha2.hWrapper API for software SHA 256 routines + crypto_hw_config_check.hConsistency checks for configuration options + crypto_sw_config_check.hConsistency checks for configuration options   hal - atca_hal.cLow-level HAL - methods used to setup indirection to physical layer interface. this level does the dirty work of abstracting the higher level ATCAIFace methods from the low-level physical interfaces. Its main goal is to keep low-level details from bleeding into the logical interface implemetation - atca_hal.hLow-level HAL - methods used to setup indirection to physical layer interface - hal_all_platforms_kit_hidapi.cHAL for kit protocol over HID for any platform - hal_freertos.cFreeRTOS Hardware/OS Abstration Layer - hal_gpio_harmony.cATCA Hardware abstraction layer for GPIO - hal_i2c_harmony.cATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB - hal_i2c_start.cATCA Hardware abstraction layer for SAMD21 I2C over START drivers - hal_i2c_start.hATCA Hardware abstraction layer for SAMD21 I2C over START drivers - hal_kit_bridge.cKit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit - hal_kit_bridge.hKit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit - hal_linux.cTimer Utility Functions for Linux - hal_linux_i2c_userspace.cATCA Hardware abstraction layer for Linux using I2C - hal_linux_uart_userspace.cATCA Hardware abstraction layer for Linux using UART - hal_sam0_i2c_asf.cATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers - hal_sam0_i2c_asf.hATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers - hal_sam_i2c_asf.cATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers - hal_sam_i2c_asf.hATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers - hal_sam_timer_asf.cATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers - hal_spi_harmony.cATCA Hardware abstraction layer for SPI over Harmony PLIB - hal_swi_gpio.cATCA Hardware abstraction layer for 1WIRE or SWI over GPIO - hal_swi_gpio.hATCA Hardware abstraction layer for SWI over GPIO drivers - hal_swi_uart.cATCA Hardware abstraction layer for SWI over UART drivers - hal_timer_start.cATCA Hardware abstraction layer for SAMD21 I2C over START drivers - hal_uart_harmony.cATCA Hardware abstraction layer for SWI uart over Harmony PLIB - hal_uc3_i2c_asf.cATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers - hal_uc3_i2c_asf.hATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers - hal_uc3_timer_asf.cATCA Hardware abstraction layer for SAM4S I2C over ASF drivers - hal_windows.cATCA Hardware abstraction layer for windows timer functions - hal_windows_kit_uart.cATCA Hardware abstraction layer for Windows using UART - kit_protocol.cMicrochip Crypto Auth hardware interface object - kit_protocol.h - swi_uart_samd21_asf.cATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers - swi_uart_samd21_asf.hATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers - swi_uart_start.c - swi_uart_start.h + atca_hal.cLow-level HAL - methods used to setup indirection to physical layer interface. this level does the dirty work of abstracting the higher level ATCAIFace methods from the low-level physical interfaces. Its main goal is to keep low-level details from bleeding into the logical interface implemetation + atca_hal.hLow-level HAL - methods used to setup indirection to physical layer interface + hal_all_platforms_kit_hidapi.cHAL for kit protocol over HID for any platform + hal_freertos.cFreeRTOS Hardware/OS Abstration Layer + hal_gpio_harmony.cATCA Hardware abstraction layer for GPIO + hal_i2c_harmony.cATCA Hardware abstraction layer for SAMD21 I2C over Harmony PLIB + hal_i2c_start.cATCA Hardware abstraction layer for SAMD21 I2C over START drivers + hal_i2c_start.hATCA Hardware abstraction layer for SAMD21 I2C over START drivers + hal_kit_bridge.cKit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit + hal_kit_bridge.hKit Bridging HAL for cryptoauthlib. This is not intended to be a zero copy driver. It should work with any interface that confirms to a few basic requirements: a) will accept an arbitrary number of bytes and packetize it if necessary for transmission, b) will block for the duration of the transmit + hal_linux.cTimer Utility Functions for Linux + hal_linux_i2c_userspace.cATCA Hardware abstraction layer for Linux using I2C + hal_linux_uart_userspace.cATCA Hardware abstraction layer for Linux using UART + hal_sam0_i2c_asf.cATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers + hal_sam0_i2c_asf.hATCA Hardware abstraction layer for SAMD21 I2C over ASF drivers + hal_sam_i2c_asf.cATCA Hardware abstraction layer for SAM flexcom & twi I2C over ASF drivers + hal_sam_i2c_asf.hATCA Hardware abstraction layer for SAMG55 I2C over ASF drivers + hal_sam_timer_asf.cATCA Hardware abstraction layer for SAMD21 timer/delay over ASF drivers + hal_spi_harmony.cATCA Hardware abstraction layer for SPI over Harmony PLIB + hal_swi_gpio.cATCA Hardware abstraction layer for 1WIRE or SWI over GPIO + hal_swi_gpio.hATCA Hardware abstraction layer for SWI over GPIO drivers + hal_swi_uart.cATCA Hardware abstraction layer for SWI over UART drivers + hal_timer_start.cATCA Hardware abstraction layer for SAMD21 I2C over START drivers + hal_uart_harmony.cATCA Hardware abstraction layer for SWI uart over Harmony PLIB + hal_uc3_i2c_asf.cATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers + hal_uc3_i2c_asf.hATCA Hardware abstraction layer for SAMV71 I2C over ASF drivers + hal_uc3_timer_asf.cATCA Hardware abstraction layer for SAM4S I2C over ASF drivers + hal_windows.cATCA Hardware abstraction layer for windows timer functions + hal_windows_kit_uart.cATCA Hardware abstraction layer for Windows using UART + kit_protocol.cMicrochip Crypto Auth hardware interface object + kit_protocol.h + swi_uart_samd21_asf.cATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers + swi_uart_samd21_asf.hATXMEGA's ATCA Hardware abstraction layer for SWI interface over UART drivers + swi_uart_start.c + swi_uart_start.h   host - atca_host.cHost side methods to support CryptoAuth computations - atca_host.hDefinitions and Prototypes for ATCA Utility Functions - atca_host_config_check.hConsistency checks for configuration options + atca_host.cHost side methods to support CryptoAuth computations + atca_host.hDefinitions and Prototypes for ATCA Utility Functions + atca_host_config_check.hConsistency checks for configuration options   jwt - atca_jwt.cUtilities to create and verify a JSON Web Token (JWT) - atca_jwt.hUtilities to create and verify a JSON Web Token (JWT) + atca_jwt.cUtilities to create and verify a JSON Web Token (JWT) + atca_jwt.hUtilities to create and verify a JSON Web Token (JWT)   mbedtls - atca_mbedtls_interface.hConfiguration Check for MbedTLS Integration Support - atca_mbedtls_wrap.cWrapper functions to replace cryptoauthlib software crypto functions with the mbedTLS equivalent + atca_mbedtls_interface.hConfiguration Check for MbedTLS Integration Support + atca_mbedtls_wrap.cWrapper functions to replace cryptoauthlib software crypto functions with the mbedTLS equivalent   openssl - atca_openssl_interface.cCrypto abstraction functions for external host side cryptography - atca_openssl_interface.hOpenSSL Integration Support + atca_openssl_interface.cCrypto abstraction functions for external host side cryptography + atca_openssl_interface.hOpenSSL Integration Support   pkcs11 - pkcs11_attrib.cPKCS11 Library Object Attributes Handling - pkcs11_attrib.hPKCS11 Library Object Attribute Handling - pkcs11_cert.cPKCS11 Library Certificate Handling - pkcs11_cert.hPKCS11 Library Certificate Handling - pkcs11_config.cPKCS11 Library Configuration - pkcs11_debug.cPKCS11 Library Debugging - pkcs11_debug.hPKCS11 Library Debugging - pkcs11_digest.hPKCS11 Library Digest (SHA256) Handling - pkcs11_encrypt.cPKCS11 Library Encrypt Support - pkcs11_encrypt.hPKCS11 Library AES Support - pkcs11_find.cPKCS11 Library Object Find/Searching - pkcs11_find.hPKCS11 Library Object Find/Searching - pkcs11_info.cPKCS11 Library Information Functions - pkcs11_info.hPKCS11 Library Information Functions - pkcs11_init.cPKCS11 Library Init/Deinit - pkcs11_init.hPKCS11 Library Initialization & Context - pkcs11_key.cPKCS11 Library Key Object Handling - pkcs11_key.hPKCS11 Library Object Handling - pkcs11_main.cPKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html - pkcs11_mech.cPKCS11 Library Mechanism Handling - pkcs11_mech.hPKCS11 Library Mechanism Handling - pkcs11_object.cPKCS11 Library Object Handling Base - pkcs11_object.hPKCS11 Library Object Handling - pkcs11_os.cPKCS11 Library Operating System Abstraction Functions - pkcs11_os.hPKCS11 Library Operating System Abstraction - pkcs11_session.cPKCS11 Library Session Handling - pkcs11_session.hPKCS11 Library Session Management & Context - pkcs11_signature.cPKCS11 Library Sign/Verify Handling - pkcs11_signature.hPKCS11 Library Sign/Verify Handling - pkcs11_slot.cPKCS11 Library Slot Handling - pkcs11_slot.hPKCS11 Library Slot Handling & Context - pkcs11_token.cPKCS11 Library Token Handling - pkcs11_token.hPKCS11 Library Token Management & Context - pkcs11_util.cPKCS11 Library Utility Functions - pkcs11_util.hPKCS11 Library Utilities + pkcs11_attrib.cPKCS11 Library Object Attributes Handling + pkcs11_attrib.hPKCS11 Library Object Attribute Handling + pkcs11_cert.cPKCS11 Library Certificate Handling + pkcs11_cert.hPKCS11 Library Certificate Handling + pkcs11_config.cPKCS11 Library Configuration + pkcs11_debug.cPKCS11 Library Debugging + pkcs11_debug.hPKCS11 Library Debugging + pkcs11_digest.hPKCS11 Library Digest (SHA256) Handling + pkcs11_encrypt.cPKCS11 Library Encrypt Support + pkcs11_encrypt.hPKCS11 Library AES Support + pkcs11_find.cPKCS11 Library Object Find/Searching + pkcs11_find.hPKCS11 Library Object Find/Searching + pkcs11_info.cPKCS11 Library Information Functions + pkcs11_info.hPKCS11 Library Information Functions + pkcs11_init.cPKCS11 Library Init/Deinit + pkcs11_init.hPKCS11 Library Initialization & Context + pkcs11_key.cPKCS11 Library Key Object Handling + pkcs11_key.hPKCS11 Library Object Handling + pkcs11_main.cPKCS11 Basic library redirects based on the 2.40 specification docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html + pkcs11_mech.cPKCS11 Library Mechanism Handling + pkcs11_mech.hPKCS11 Library Mechanism Handling + pkcs11_object.cPKCS11 Library Object Handling Base + pkcs11_object.hPKCS11 Library Object Handling + pkcs11_os.cPKCS11 Library Operating System Abstraction Functions + pkcs11_os.hPKCS11 Library Operating System Abstraction + pkcs11_session.cPKCS11 Library Session Handling + pkcs11_session.hPKCS11 Library Session Management & Context + pkcs11_signature.cPKCS11 Library Sign/Verify Handling + pkcs11_signature.hPKCS11 Library Sign/Verify Handling + pkcs11_slot.cPKCS11 Library Slot Handling + pkcs11_slot.hPKCS11 Library Slot Handling & Context + pkcs11_token.cPKCS11 Library Token Handling + pkcs11_token.hPKCS11 Library Token Management & Context + pkcs11_util.cPKCS11 Library Utility Functions + pkcs11_util.hPKCS11 Library Utilities   wolfssl - atca_wolfssl_interface.cCrypto abstraction functions for external host side cryptography - atca_wolfssl_interface.hConfiguration Check for WolfSSL Integration Support - atca_wolfssl_internal.hWolfSSL Integration Support - atca_basic.cCryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods - atca_basic.hCryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to - atca_cfgs.cSet of default configurations for various ATCA devices and interfaces - atca_cfgs.hSet of default configurations for various ATCA devices and interfaces - atca_compiler.hCryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros - atca_config_check.hConsistency checks for configuration options - atca_debug.cDebug/Trace for CryptoAuthLib calls - atca_device.cMicrochip CryptoAuth device object - atca_device.hMicrochip Crypto Auth device object - atca_devtypes.hMicrochip Crypto Auth - atca_helpers.cHelpers to support the CryptoAuthLib Basic API methods - atca_helpers.hHelpers to support the CryptoAuthLib Basic API methods - atca_iface.cMicrochip CryptoAuthLib hardware interface object - atca_iface.hMicrochip Crypto Auth hardware interface object - atca_platform.hConfigure the platform interfaces for cryptoauthlib - atca_status.hMicrochip Crypto Auth status codes - atca_utils_sizes.cAPI to Return structure sizes of cryptoauthlib structures - atca_version.hMicrochip CryptoAuth Library Version - cal_buffer.cCryptoauthlib buffer management system - cal_buffer.hCryptoauthlib buffer management system - cal_internal.hInternal CryptoAuthLib Interfaces - cryptoauthlib.hSingle aggregation point for all CryptoAuthLib header files + atca_wolfssl_interface.cCrypto abstraction functions for external host side cryptography + atca_wolfssl_interface.hConfiguration Check for WolfSSL Integration Support + atca_wolfssl_internal.hWolfSSL Integration Support + atca_basic.cCryptoAuthLib Basic API methods. These methods provide a simpler way to access the core crypto methods + atca_basic.hCryptoAuthLib Basic API methods - a simple crypto authentication API. These methods manage a global ATCADevice object behind the scenes. They also manage the wake/idle state transitions so callers don't need to + atca_cfgs.cSet of default configurations for various ATCA devices and interfaces + atca_cfgs.hSet of default configurations for various ATCA devices and interfaces + atca_compiler.hCryptoAuthLiub is meant to be portable across architectures, even non-Microchip architectures and compiler environments. This file is for isolating compiler specific macros + atca_config_check.hConsistency checks for configuration options + atca_debug.cDebug/Trace for CryptoAuthLib calls + atca_device.cMicrochip CryptoAuth device object + atca_device.hMicrochip Crypto Auth device object + atca_devtypes.hMicrochip Crypto Auth + atca_helpers.cHelpers to support the CryptoAuthLib Basic API methods + atca_helpers.hHelpers to support the CryptoAuthLib Basic API methods + atca_iface.cMicrochip CryptoAuthLib hardware interface object + atca_iface.hMicrochip Crypto Auth hardware interface object + atca_platform.hConfigure the platform interfaces for cryptoauthlib + atca_status.hMicrochip Crypto Auth status codes + atca_utils_sizes.cAPI to Return structure sizes of cryptoauthlib structures + atca_version.hMicrochip CryptoAuth Library Version + cal_buffer.cCryptoauthlib buffer management system + cal_buffer.hCryptoauthlib buffer management system + cal_internal.hInternal CryptoAuthLib Interfaces + cryptoauthlib.hSingle aggregation point for all CryptoAuthLib header files
diff --git a/functions.html b/functions.html index c6d6160ee..809abb1d0 100644 --- a/functions.html +++ b/functions.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,203 +100,202 @@
Here is a list of all documented struct and union fields with links to the struct/union documentation for each field:

- a -

- b -

- c -

- d -

- e -

- f -

- g -

- h -

- i -

- k -

- l -

- m -

- n -

- o -

- p -

- r -

- s -

- t -

- u -

- v -

- z -

diff --git a/functions_func.html b/functions_func.html index 37bf081b5..49890748c 100644 --- a/functions_func.html +++ b/functions_func.html @@ -31,7 +31,7 @@ Logo - diff --git a/functions_vars.html b/functions_vars.html index aeb797ae4..6c8983258 100644 --- a/functions_vars.html +++ b/functions_vars.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,199 +100,198 @@  

- a -

- b -

- c -

- d -

- e -

- f -

- g -

- h -

- i -

- k -

- l -

- m -

- n -

- o -

- p -

- r -

- s -

- t -

- u -

- v -

- z -

diff --git a/globals.html b/globals.html index 487360f73..711284c97 100644 --- a/globals.html +++ b/globals.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,537 +100,543 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- a -

diff --git a/globals_b.html b/globals_b.html index fbe2cb8db..4bacef9f2 100644 --- a/globals_b.html +++ b/globals_b.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,10 +101,10 @@

- b -

diff --git a/globals_c.html b/globals_c.html index 3332e407c..7330bc676 100644 --- a/globals_c.html +++ b/globals_c.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,157 +100,157 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- c -

diff --git a/globals_d.html b/globals_d.html index 2229ece34..f120b374e 100644 --- a/globals_d.html +++ b/globals_d.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,27 +100,27 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- d -

diff --git a/globals_defs.html b/globals_defs.html index 07bf69770..266907b8a 100644 --- a/globals_defs.html +++ b/globals_defs.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,232 +100,241 @@  

- a -

diff --git a/globals_defs_b.html b/globals_defs_b.html index 52f7a7a01..5d300f352 100644 --- a/globals_defs_b.html +++ b/globals_defs_b.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,10 +100,10 @@  

- b -

diff --git a/globals_defs_c.html b/globals_defs_c.html index d58d9c3c4..86ebfda3a 100644 --- a/globals_defs_c.html +++ b/globals_defs_c.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,60 +100,60 @@  

- c -

diff --git a/globals_defs_d.html b/globals_defs_d.html index f3ebbe621..2862edf84 100644 --- a/globals_defs_d.html +++ b/globals_defs_d.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,20 +100,20 @@  

- d -

diff --git a/globals_defs_e.html b/globals_defs_e.html index bcc790db3..ed9fbc761 100644 --- a/globals_defs_e.html +++ b/globals_defs_e.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,8 +100,8 @@  

- e -

diff --git a/globals_defs_g.html b/globals_defs_g.html index 39486b9b4..c8cf80190 100644 --- a/globals_defs_g.html +++ b/globals_defs_g.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,33 +100,33 @@  

- g -

diff --git a/globals_defs_h.html b/globals_defs_h.html index 2d97d4c4f..0d3143aa6 100644 --- a/globals_defs_h.html +++ b/globals_defs_h.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,18 +100,18 @@  

- h -

diff --git a/globals_defs_i.html b/globals_defs_i.html index 685d24925..ac60c0600 100644 --- a/globals_defs_i.html +++ b/globals_defs_i.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,25 +100,25 @@  

- i -

diff --git a/globals_defs_k.html b/globals_defs_k.html index c6efba223..dda67648b 100644 --- a/globals_defs_k.html +++ b/globals_defs_k.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,44 +100,44 @@  

- k -

diff --git a/globals_defs_l.html b/globals_defs_l.html index 70928758a..855dd10c6 100644 --- a/globals_defs_l.html +++ b/globals_defs_l.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,17 +100,17 @@  

- l -

diff --git a/globals_defs_m.html b/globals_defs_m.html index 438e6a59b..152fa8bd8 100644 --- a/globals_defs_m.html +++ b/globals_defs_m.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,27 +100,27 @@  

- m -

diff --git a/globals_defs_n.html b/globals_defs_n.html index 1176f8928..5e8d8105b 100644 --- a/globals_defs_n.html +++ b/globals_defs_n.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,32 +100,32 @@  

- n -

diff --git a/globals_defs_o.html b/globals_defs_o.html index 1c705f9c6..0e6fa9539 100644 --- a/globals_defs_o.html +++ b/globals_defs_o.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,7 +100,7 @@  

- o -

diff --git a/globals_defs_p.html b/globals_defs_p.html index 7f29bce03..c701f4fc7 100644 --- a/globals_defs_p.html +++ b/globals_defs_p.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,18 +100,18 @@  

- p -

diff --git a/globals_defs_r.html b/globals_defs_r.html index 850eb2ab5..3b02937b4 100644 --- a/globals_defs_r.html +++ b/globals_defs_r.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,21 +100,21 @@  

- r -

diff --git a/globals_defs_s.html b/globals_defs_s.html index 73a76c1bf..f453b3c41 100644 --- a/globals_defs_s.html +++ b/globals_defs_s.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,68 +100,68 @@  

- s -

diff --git a/globals_defs_u.html b/globals_defs_u.html index 46bf0dad5..b4bbc3d6d 100644 --- a/globals_defs_u.html +++ b/globals_defs_u.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,15 +100,15 @@  

- u -

diff --git a/globals_defs_v.html b/globals_defs_v.html index 2b358bc5e..fc6a70a0a 100644 --- a/globals_defs_v.html +++ b/globals_defs_v.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,35 +100,35 @@  

- v -

diff --git a/globals_defs_w.html b/globals_defs_w.html index e6bec4ff6..a5263bc2c 100644 --- a/globals_defs_w.html +++ b/globals_defs_w.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,17 +100,17 @@  

- w -

diff --git a/globals_e.html b/globals_e.html index efad76ed6..44579a402 100644 --- a/globals_e.html +++ b/globals_e.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,8 +100,8 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- e -

diff --git a/globals_enum.html b/globals_enum.html index 506b7e925..aef30e645 100644 --- a/globals_enum.html +++ b/globals_enum.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -98,13 +98,13 @@
 
diff --git a/globals_eval.html b/globals_eval.html index 265e2f914..c6b8095db 100644 --- a/globals_eval.html +++ b/globals_eval.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,61 +100,61 @@  

- a -

- c -

- d -

- s -

- t -

diff --git a/globals_func.html b/globals_func.html index 957cea75d..2c8792bdd 100644 --- a/globals_func.html +++ b/globals_func.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,268 +100,265 @@  

- a -

diff --git a/globals_func_b.html b/globals_func_b.html index 27fdce485..7ed39a6d2 100644 --- a/globals_func_b.html +++ b/globals_func_b.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
diff --git a/globals_func_c.html b/globals_func_c.html index 341184731..a2b2ac979 100644 --- a/globals_func_c.html +++ b/globals_func_c.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,99 +100,99 @@  

- c -

diff --git a/globals_func_d.html b/globals_func_d.html index 09fb9852b..b90b43928 100644 --- a/globals_func_d.html +++ b/globals_func_d.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,8 +100,8 @@  

- d -

diff --git a/globals_func_h.html b/globals_func_h.html index b13382c19..15f273acc 100644 --- a/globals_func_h.html +++ b/globals_func_h.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,76 +100,76 @@  

- h -

diff --git a/globals_func_i.html b/globals_func_i.html index c102c3002..b934a9f07 100644 --- a/globals_func_i.html +++ b/globals_func_i.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,21 +100,21 @@  

- i -

diff --git a/globals_func_k.html b/globals_func_k.html index 4bb3a01ff..9360743ff 100644 --- a/globals_func_k.html +++ b/globals_func_k.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -106,9 +106,9 @@

- k -

diff --git a/globals_func_l.html b/globals_func_l.html index c3fbae504..38d6a09e7 100644 --- a/globals_func_l.html +++ b/globals_func_l.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,9 +100,9 @@  

- l -

diff --git a/globals_func_n.html b/globals_func_n.html index ddbf823f5..c765f8295 100644 --- a/globals_func_n.html +++ b/globals_func_n.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,7 +100,7 @@  

- n -

diff --git a/globals_func_p.html b/globals_func_p.html index 35f13f426..733580d86 100644 --- a/globals_func_p.html +++ b/globals_func_p.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,42 +100,42 @@  

- p -

diff --git a/globals_func_r.html b/globals_func_r.html index 8780d1ee0..21047e0c0 100644 --- a/globals_func_r.html +++ b/globals_func_r.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,8 +100,8 @@  

- r -

diff --git a/globals_func_s.html b/globals_func_s.html index dd85a5307..3030ec1ad 100644 --- a/globals_func_s.html +++ b/globals_func_s.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -114,13 +114,13 @@

- s -

diff --git a/globals_func_t.html b/globals_func_t.html index 86aeb757d..1fb64f5ec 100644 --- a/globals_func_t.html +++ b/globals_func_t.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,19 +100,19 @@  

- t -

diff --git a/globals_func_w.html b/globals_func_w.html index 1d953683f..266b9eeb3 100644 --- a/globals_func_w.html +++ b/globals_func_w.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,6 +101,7 @@

- w -

diff --git a/globals_g.html b/globals_g.html index bf302441b..3402a0929 100644 --- a/globals_g.html +++ b/globals_g.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,33 +100,33 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- g -

diff --git a/globals_h.html b/globals_h.html index 31067064f..bfb9d8c98 100644 --- a/globals_h.html +++ b/globals_h.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,89 +100,89 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- h -

diff --git a/globals_i.html b/globals_i.html index 1ab2c3fc6..76e8073bf 100644 --- a/globals_i.html +++ b/globals_i.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,40 +100,40 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- i -

diff --git a/globals_k.html b/globals_k.html index e0c243aeb..8c27c0b6b 100644 --- a/globals_k.html +++ b/globals_k.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,44 +100,44 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- k -

diff --git a/globals_l.html b/globals_l.html index 6f6864729..b2f3c15ae 100644 --- a/globals_l.html +++ b/globals_l.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,20 +100,20 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- l -

diff --git a/globals_m.html b/globals_m.html index 226f52059..8f657f6bc 100644 --- a/globals_m.html +++ b/globals_m.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,27 +100,27 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- m -

diff --git a/globals_n.html b/globals_n.html index 35ff1868a..eef194bd4 100644 --- a/globals_n.html +++ b/globals_n.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,33 +100,33 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- n -

diff --git a/globals_o.html b/globals_o.html index 3db8f60eb..a5da27f56 100644 --- a/globals_o.html +++ b/globals_o.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,7 +100,7 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- o -

diff --git a/globals_p.html b/globals_p.html index 288ad0219..953e808b4 100644 --- a/globals_p.html +++ b/globals_p.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,72 +100,72 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- p -

diff --git a/globals_r.html b/globals_r.html index cd63d6059..a09abad5b 100644 --- a/globals_r.html +++ b/globals_r.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,23 +100,23 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- r -

diff --git a/globals_s.html b/globals_s.html index ffb680cae..7c2b03961 100644 --- a/globals_s.html +++ b/globals_s.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,35 +101,35 @@

- s -

diff --git a/globals_t.html b/globals_t.html index 813669900..8788a0956 100644 --- a/globals_t.html +++ b/globals_t.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,29 +100,29 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- t -

diff --git a/globals_type.html b/globals_type.html index e70aad3c8..d81733f24 100644 --- a/globals_type.html +++ b/globals_type.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,41 +100,41 @@  

- a -

- c -

- h -

@@ -144,9 +144,9 @@

- k -

diff --git a/globals_u.html b/globals_u.html index 9aba914c9..b6cf7bb8e 100644 --- a/globals_u.html +++ b/globals_u.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,15 +100,15 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- u -

diff --git a/globals_v.html b/globals_v.html index a624d8569..58d644c8f 100644 --- a/globals_v.html +++ b/globals_v.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,35 +100,35 @@
Here is a list of all documented functions, variables, defines, enums, and typedefs with links to the documentation:

- v -

diff --git a/globals_vars.html b/globals_vars.html index dc7f49c06..8b36add4e 100644 --- a/globals_vars.html +++ b/globals_vars.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -100,26 +100,26 @@  

- a -

- p -

diff --git a/globals_w.html b/globals_w.html index 85ae1756d..df05e6f9e 100644 --- a/globals_w.html +++ b/globals_w.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,17 +101,18 @@

- w -

diff --git a/hierarchy.html b/hierarchy.html index 74cbac6a5..61dec93d2 100644 --- a/hierarchy.html +++ b/hierarchy.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -102,265 +102,267 @@
This inheritance list is sorted roughly, but not completely, alphabetically:
[detail level 123]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
 C_ascii_kit_host_context
 Ccryptoauthlib.library._CtypeIterator
 C_kit_host_map_entry
 Catca_check_mac_in_outInput/output parameters for function atcah_check_mac()
 Catca_decrypt_in_outInput/output parameters for function atca_decrypt()
 Catca_delete_in_outInput/Output paramters for calculating the mac.Used with Delete command
 Catca_derive_key_in_outInput/output parameters for function atcah_derive_key()
 Catca_derive_key_mac_in_outInput/output parameters for function atcah_derive_key_mac()
 Catca_deviceAtca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods
 Catca_diversified_key_in_outInput/output parameters for function atcah_gendivkey()
 Catca_evp_ctx
 Catca_gen_dig_in_outInput/output parameters for function atcah_gen_dig()
 Catca_gen_key_in_outInput/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function
 Catca_hal_kit_phy_t
 Catca_hal_list_entry_tStructure that holds the hal/phy maping for different interface types
 Catca_hal_shm_t
 Catca_hmac_in_outInput/output parameters for function atca_hmac()
 Catca_i2c_host_s
 Catca_ifaceAtca_iface is the context structure for a configured interface
 Catca_include_data_in_outInput / output parameters for function atca_include_data()
 Catca_io_decrypt_in_out
 Catca_mac_in_outInput/output parameters for function atca_mac()
 Catca_mbedtls_eckey_s
 Catca_nonce_in_outInput/output parameters for function atca_nonce()
 Catca_plib_i2c_api
 Catca_resp_mac_in_outInput/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function
 Catca_secureboot_enc_in_out
 Catca_secureboot_mac_in_out
 Catca_session_key_in_outInput/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function
 Catca_sha256_ctx
 Catca_sign_internal_in_outInput/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function
 Catca_spi_host_s
 Catca_temp_keyStructure to hold TempKey fields
 Catca_uart_host_s
 Catca_verify_in_outInput/output parameters for function atcah_verify()
 Catca_verify_mac
 Catca_write_mac_in_outInput/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac()
 Catcac_aes_cmac_ctx
 Catcac_aes_gcm_ctx
 Catcac_hmac_ctx
 Catcac_pk_ctx
 Catcac_sha1_ctx
 Catcac_sha2_256_ctx
 Catcac_x509_ctx
 Catcacert_build_state_s
 Catcacert_cert_element_s
 Catcacert_cert_loc_s
 Catcacert_def_s
 Catcacert_device_loc_s
 Catcacert_tm_utc_s
 CATCAHAL_tHAL Driver Structure
 CatcaI2CmasterThis is the hal_data for ATCA HAL for ASF SERCOM
 CATCAIfaceCfg
 CATCAPacket
 Ccryptoauthlib.library.AtcaReference
 CatcaSWImasterThis is the hal_data for ATCA HAL for ASF SERCOM
 Catecc508a_config_s
 Catecc608_config_s
 Catsha204a_config_s
 Ccal_buffer_s
 CCK_AES_CBC_ENCRYPT_DATA_PARAMS
 CCK_AES_CCM_PARAMS
 CCK_AES_CTR_PARAMS
 CCK_AES_GCM_PARAMS
 CCK_ARIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_ATTRIBUTE
 CCK_C_INITIALIZE_ARGS
 CCK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_CAMELLIA_CTR_PARAMS
 CCK_CCM_PARAMS
 CCK_CMS_SIG_PARAMS
 CCK_DATE
 CCK_DES_CBC_ENCRYPT_DATA_PARAMS
 CCK_DSA_PARAMETER_GEN_PARAM
 CCK_ECDH1_DERIVE_PARAMS
 CCK_ECDH2_DERIVE_PARAMS
 CCK_ECDH_AES_KEY_WRAP_PARAMS
 CCK_ECMQV_DERIVE_PARAMS
 CCK_FUNCTION_LIST
 CCK_GCM_PARAMS
 CCK_GOSTR3410_DERIVE_PARAMS
 CCK_GOSTR3410_KEY_WRAP_PARAMS
 CCK_INFO
 CCK_KEA_DERIVE_PARAMS
 CCK_KEY_DERIVATION_STRING_DATA
 CCK_KEY_WRAP_SET_OAEP_PARAMS
 CCK_KIP_PARAMS
 CCK_MECHANISM
 CCK_MECHANISM_INFO
 CCK_OTP_PARAM
 CCK_OTP_PARAMS
 CCK_OTP_SIGNATURE_INFO
 CCK_PBE_PARAMS
 CCK_PKCS5_PBKD2_PARAMS
 CCK_PKCS5_PBKD2_PARAMS2
 CCK_RC2_CBC_PARAMS
 CCK_RC2_MAC_GENERAL_PARAMS
 CCK_RC5_CBC_PARAMS
 CCK_RC5_MAC_GENERAL_PARAMS
 CCK_RC5_PARAMS
 CCK_RSA_AES_KEY_WRAP_PARAMS
 CCK_RSA_PKCS_OAEP_PARAMS
 CCK_RSA_PKCS_PSS_PARAMS
 CCK_SEED_CBC_ENCRYPT_DATA_PARAMS
 CCK_SESSION_INFO
 CCK_SKIPJACK_PRIVATE_WRAP_PARAMS
 CCK_SKIPJACK_RELAYX_PARAMS
 CCK_SLOT_INFO
 CCK_SSL3_KEY_MAT_OUT
 CCK_SSL3_KEY_MAT_PARAMS
 CCK_SSL3_MASTER_KEY_DERIVE_PARAMS
 CCK_SSL3_RANDOM_DATA
 CCK_TLS12_KEY_MAT_PARAMS
 CCK_TLS12_MASTER_KEY_DERIVE_PARAMS
 CCK_TLS_KDF_PARAMS
 CCK_TLS_MAC_PARAMS
 CCK_TLS_PRF_PARAMS
 CCK_TOKEN_INFO
 CCK_VERSION
 CCK_WTLS_KEY_MAT_OUT
 CCK_WTLS_KEY_MAT_PARAMS
 CCK_WTLS_MASTER_KEY_DERIVE_PARAMS
 CCK_WTLS_PRF_PARAMS
 CCK_WTLS_RANDOM_DATA
 CCK_X9_42_DH1_DERIVE_PARAMS
 CCK_X9_42_DH2_DERIVE_PARAMS
 CCK_X9_42_MQV_DERIVE_PARAMS
 CCL_HashContext
 Cdevice_execution_time_tStructure to hold the device execution time and the opcode for the corresponding command
 Cdevtype_names_t
 CException
 Ci2c_sam0_instance
 Ci2c_sam_instance
 Ci2c_start_instance
 CJwt
 Cmemory_parameters
 Cobject
 Cpcks11_mech_table_e
 Cpkcs11_attrib_model_s
 Cpkcs11_conf_filedata_s
 Cpkcs11_dev_ctx
 Cpkcs11_dev_res
 Cpkcs11_dev_state
 Cpkcs11_ecc_key_info_s
 Cpkcs11_lib_ctx_s
 Cpkcs11_object_cache_s
 Cpkcs11_object_s
 Cpkcs11_session_ctx_s
 Cpkcs11_session_mech_ctx_s
 Cpkcs11_slot_ctx_s
 Csecure_boot_config_bits
 Csecure_boot_parameters
 Csw_sha256_ctx
 Ctng_cert_map_element
 CUnion
 Cbuild_ext
 CDistribution
 CECAlgorithm
 CEnum
 CHMACAlgorithm
 Cinstall
 CStructure
 C_ascii_kit_host_context
 Ccryptoauthlib.library._CtypeIterator
 C_kit_host_map_entry
 Catca_check_mac_in_outInput/output parameters for function atcah_check_mac()
 Catca_decrypt_in_outInput/output parameters for function atca_decrypt()
 Catca_delete_in_outInput/Output paramters for calculating the mac.Used with Delete command
 Catca_derive_key_in_outInput/output parameters for function atcah_derive_key()
 Catca_derive_key_mac_in_outInput/output parameters for function atcah_derive_key_mac()
 Catca_deviceAtca_device is the C object backing ATCADevice. See the atca_device.h file for details on the ATCADevice methods
 Catca_diversified_key_in_outInput/output parameters for function atcah_gendivkey()
 Catca_evp_ctx
 Catca_gen_dig_in_outInput/output parameters for function atcah_gen_dig()
 Catca_gen_key_in_outInput/output parameters for calculating the PubKey digest put into TempKey by the GenKey command with the atcah_gen_key_msg() function
 Catca_hal_kit_phy_t
 Catca_hal_list_entry_tStructure that holds the hal/phy maping for different interface types
 Catca_hal_shm_t
 Catca_hmac_in_outInput/output parameters for function atca_hmac()
 Catca_i2c_host_s
 Catca_ifaceAtca_iface is the context structure for a configured interface
 Catca_include_data_in_outInput / output parameters for function atca_include_data()
 Catca_io_decrypt_in_out
 Catca_mac_in_outInput/output parameters for function atca_mac()
 Catca_mbedtls_eckey_s
 Catca_nonce_in_outInput/output parameters for function atca_nonce()
 Catca_resp_mac_in_outInput/Output parameters for calculating the output response mac in SHA105 device. Used with the atcah_gen_output_resp_mac() function
 Catca_secureboot_enc_in_out
 Catca_secureboot_mac_in_out
 Catca_session_key_in_outInput/Output paramters for calculating the session key by the nonce command. Used with the atcah_gen_session_key() function
 Catca_sha256_ctx
 Catca_sign_internal_in_outInput/output parameters for calculating the message and digest used by the Sign(internal) command. Used with the atcah_sign_internal_msg() function
 Catca_spi_host_s
 Catca_temp_keyStructure to hold TempKey fields
 Catca_uart_host_s
 Catca_verify_in_outInput/output parameters for function atcah_verify()
 Catca_verify_mac
 Catca_write_mac_in_outInput/output parameters for function atcah_write_auth_mac() and atcah_privwrite_auth_mac()
 Catcac_aes_cmac_ctx
 Catcac_aes_gcm_ctx
 Catcac_hmac_ctx
 Catcac_pk_ctx
 Catcac_sha1_ctx
 Catcac_sha2_256_ctx
 Catcac_sha2_384_ctx
 Catcac_sha2_512_ctx
 Catcac_x509_ctx
 Catcacert_build_state_s
 Catcacert_cert_element_s
 Catcacert_cert_loc_s
 Catcacert_def_s
 Catcacert_device_loc_s
 Catcacert_tm_utc_s
 CATCAHAL_tHAL Driver Structure
 CatcaI2CmasterThis is the hal_data for ATCA HAL for ASF SERCOM
 CATCAIfaceCfg
 CATCAPacket
 Ccryptoauthlib.library.AtcaReference
 CatcaSWImasterThis is the hal_data for ATCA HAL for ASF SERCOM
 Catecc508a_config_s
 Catecc608_config_s
 Catsha204a_config_s
 Ccal_buffer_s
 CCK_AES_CBC_ENCRYPT_DATA_PARAMS
 CCK_AES_CCM_PARAMS
 CCK_AES_CTR_PARAMS
 CCK_AES_GCM_PARAMS
 CCK_ARIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_ATTRIBUTE
 CCK_C_INITIALIZE_ARGS
 CCK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS
 CCK_CAMELLIA_CTR_PARAMS
 CCK_CCM_PARAMS
 CCK_CMS_SIG_PARAMS
 CCK_DATE
 CCK_DES_CBC_ENCRYPT_DATA_PARAMS
 CCK_DSA_PARAMETER_GEN_PARAM
 CCK_ECDH1_DERIVE_PARAMS
 CCK_ECDH2_DERIVE_PARAMS
 CCK_ECDH_AES_KEY_WRAP_PARAMS
 CCK_ECMQV_DERIVE_PARAMS
 CCK_FUNCTION_LIST
 CCK_GCM_PARAMS
 CCK_GOSTR3410_DERIVE_PARAMS
 CCK_GOSTR3410_KEY_WRAP_PARAMS
 CCK_INFO
 CCK_KEA_DERIVE_PARAMS
 CCK_KEY_DERIVATION_STRING_DATA
 CCK_KEY_WRAP_SET_OAEP_PARAMS
 CCK_KIP_PARAMS
 CCK_MECHANISM
 CCK_MECHANISM_INFO
 CCK_OTP_PARAM
 CCK_OTP_PARAMS
 CCK_OTP_SIGNATURE_INFO
 CCK_PBE_PARAMS
 CCK_PKCS5_PBKD2_PARAMS
 CCK_PKCS5_PBKD2_PARAMS2
 CCK_RC2_CBC_PARAMS
 CCK_RC2_MAC_GENERAL_PARAMS
 CCK_RC5_CBC_PARAMS
 CCK_RC5_MAC_GENERAL_PARAMS
 CCK_RC5_PARAMS
 CCK_RSA_AES_KEY_WRAP_PARAMS
 CCK_RSA_PKCS_OAEP_PARAMS
 CCK_RSA_PKCS_PSS_PARAMS
 CCK_SEED_CBC_ENCRYPT_DATA_PARAMS
 CCK_SESSION_INFO
 CCK_SKIPJACK_PRIVATE_WRAP_PARAMS
 CCK_SKIPJACK_RELAYX_PARAMS
 CCK_SLOT_INFO
 CCK_SSL3_KEY_MAT_OUT
 CCK_SSL3_KEY_MAT_PARAMS
 CCK_SSL3_MASTER_KEY_DERIVE_PARAMS
 CCK_SSL3_RANDOM_DATA
 CCK_TLS12_KEY_MAT_PARAMS
 CCK_TLS12_MASTER_KEY_DERIVE_PARAMS
 CCK_TLS_KDF_PARAMS
 CCK_TLS_MAC_PARAMS
 CCK_TLS_PRF_PARAMS
 CCK_TOKEN_INFO
 CCK_VERSION
 CCK_WTLS_KEY_MAT_OUT
 CCK_WTLS_KEY_MAT_PARAMS
 CCK_WTLS_MASTER_KEY_DERIVE_PARAMS
 CCK_WTLS_PRF_PARAMS
 CCK_WTLS_RANDOM_DATA
 CCK_X9_42_DH1_DERIVE_PARAMS
 CCK_X9_42_DH2_DERIVE_PARAMS
 CCK_X9_42_MQV_DERIVE_PARAMS
 CCL_HashContext
 Cdevice_execution_time_tStructure to hold the device execution time and the opcode for the corresponding command
 Cdevtype_names_t
 CException
 Ci2c_sam0_instance
 Ci2c_sam_instance
 Ci2c_start_instance
 CJwt
 Cmemory_parameters
 Cobject
 Cpcks11_mech_table_e
 Cpkcs11_attrib_model_s
 Cpkcs11_conf_filedata_s
 Cpkcs11_dev_ctx
 Cpkcs11_dev_res
 Cpkcs11_dev_state
 Cpkcs11_ecc_key_info_s
 Cpkcs11_key_info_s
 Cpkcs11_lib_ctx_s
 Cpkcs11_object_cache_s
 Cpkcs11_object_s
 Cpkcs11_rsa_key_info_s
 Cpkcs11_session_ctx_s
 Cpkcs11_session_mech_ctx_s
 Cpkcs11_slot_ctx_s
 Csecure_boot_config_bits
 Csecure_boot_parameters
 Ctng_cert_map_element
 CUnion
 Cbuild_ext
 CDistribution
 CECAlgorithm
 CEnum
 CHMACAlgorithm
 Cinstall
 CStructure
diff --git a/hierarchy.js b/hierarchy.js index b32f82323..0ef57e570 100644 --- a/hierarchy.js +++ b/hierarchy.js @@ -1,278 +1,280 @@ var hierarchy = [ - [ "_ascii_kit_host_context", "a01480.html", null ], - [ "cryptoauthlib.library._CtypeIterator", "a02508.html", null ], - [ "_kit_host_map_entry", "a01484.html", null ], - [ "atca_check_mac_in_out", "a01752.html", null ], - [ "atca_decrypt_in_out", "a01748.html", null ], - [ "atca_delete_in_out", "a01776.html", null ], - [ "atca_derive_key_in_out", "a01740.html", null ], - [ "atca_derive_key_mac_in_out", "a01744.html", null ], - [ "atca_device", "a01508.html", null ], - [ "atca_diversified_key_in_out", "a01732.html", null ], - [ "atca_evp_ctx", "a01812.html", null ], - [ "atca_gen_dig_in_out", "a01728.html", null ], - [ "atca_gen_key_in_out", "a01764.html", null ], - [ "atca_hal_kit_phy_t", "a01652.html", null ], - [ "atca_hal_list_entry_t", "a01648.html", null ], - [ "atca_hal_shm_t", "a01656.html", null ], - [ "atca_hmac_in_out", "a01724.html", null ], - [ "atca_i2c_host_s", "a01668.html", null ], - [ "atca_iface", "a01584.html", null ], - [ "atca_include_data_in_out", "a01696.html", null ], - [ "atca_io_decrypt_in_out", "a01704.html", null ], - [ "atca_mac_in_out", "a01720.html", null ], - [ "atca_mbedtls_eckey_s", "a01808.html", null ], - [ "atca_nonce_in_out", "a01700.html", null ], - [ "atca_plib_i2c_api", "a01504.html", null ], - [ "atca_resp_mac_in_out", "a01756.html", null ], - [ "atca_secureboot_enc_in_out", "a01712.html", null ], - [ "atca_secureboot_mac_in_out", "a01716.html", null ], - [ "atca_session_key_in_out", "a01772.html", null ], - [ "atca_sha256_ctx", "a01616.html", null ], - [ "atca_sign_internal_in_out", "a01768.html", null ], - [ "atca_spi_host_s", "a01672.html", null ], - [ "atca_temp_key", "a01692.html", null ], - [ "atca_uart_host_s", "a01676.html", null ], - [ "atca_verify_in_out", "a01760.html", null ], - [ "atca_verify_mac", "a01708.html", null ], - [ "atca_write_mac_in_out", "a01736.html", null ], - [ "atcac_aes_cmac_ctx", "a01800.html", null ], - [ "atcac_aes_gcm_ctx", "a01796.html", null ], - [ "atcac_hmac_ctx", "a01792.html", null ], - [ "atcac_pk_ctx", "a01804.html", null ], - [ "atcac_sha1_ctx", "a01784.html", null ], - [ "atcac_sha2_256_ctx", "a01788.html", null ], - [ "atcac_x509_ctx", "a01780.html", null ], - [ "atcacert_build_state_s", "a01608.html", null ], - [ "atcacert_cert_element_s", "a01600.html", null ], - [ "atcacert_cert_loc_s", "a01596.html", null ], - [ "atcacert_def_s", "a01604.html", null ], - [ "atcacert_device_loc_s", "a01592.html", null ], - [ "atcacert_tm_utc_s", "a01588.html", null ], - [ "ATCAHAL_t", "a01580.html", null ], - [ "atcaI2Cmaster", "a01660.html", null ], - [ "ATCAIfaceCfg", "a01516.html", null ], - [ "ATCAPacket", "a01620.html", null ], - [ "cryptoauthlib.library.AtcaReference", "a02504.html", null ], - [ "atcaSWImaster", "a01688.html", null ], - [ "atecc508a_config_s", "a01628.html", null ], - [ "atecc608_config_s", "a01632.html", null ], - [ "atsha204a_config_s", "a01624.html", null ], - [ "cal_buffer_s", "a01612.html", null ], - [ "CK_AES_CBC_ENCRYPT_DATA_PARAMS", "a01980.html", null ], - [ "CK_AES_CCM_PARAMS", "a02088.html", null ], - [ "CK_AES_CTR_PARAMS", "a02072.html", null ], - [ "CK_AES_GCM_PARAMS", "a02084.html", null ], - [ "CK_ARIA_CBC_ENCRYPT_DATA_PARAMS", "a02100.html", null ], - [ "CK_ATTRIBUTE", "a01900.html", null ], - [ "CK_C_INITIALIZE_ARGS", "a01916.html", null ], - [ "CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS", "a02096.html", null ], - [ "CK_CAMELLIA_CTR_PARAMS", "a02092.html", null ], - [ "CK_CCM_PARAMS", "a02080.html", null ], - [ "CK_CMS_SIG_PARAMS", "a02040.html", null ], - [ "CK_DATE", "a01904.html", null ], - [ "CK_DES_CBC_ENCRYPT_DATA_PARAMS", "a01976.html", null ], - [ "CK_DSA_PARAMETER_GEN_PARAM", "a02104.html", null ], - [ "CK_ECDH1_DERIVE_PARAMS", "a01928.html", null ], - [ "CK_ECDH2_DERIVE_PARAMS", "a01932.html", null ], - [ "CK_ECDH_AES_KEY_WRAP_PARAMS", "a02108.html", null ], - [ "CK_ECMQV_DERIVE_PARAMS", "a01936.html", null ], - [ "CK_FUNCTION_LIST", "a01816.html", null ], - [ "CK_GCM_PARAMS", "a02076.html", null ], - [ "CK_GOSTR3410_DERIVE_PARAMS", "a02132.html", null ], - [ "CK_GOSTR3410_KEY_WRAP_PARAMS", "a02136.html", null ], - [ "CK_INFO", "a01884.html", null ], - [ "CK_KEA_DERIVE_PARAMS", "a01952.html", null ], - [ "CK_KEY_DERIVATION_STRING_DATA", "a02044.html", null ], - [ "CK_KEY_WRAP_SET_OAEP_PARAMS", "a01996.html", null ], - [ "CK_KIP_PARAMS", "a02068.html", null ], - [ "CK_MECHANISM", "a01908.html", null ], - [ "CK_MECHANISM_INFO", "a01912.html", null ], - [ "CK_OTP_PARAM", "a02056.html", null ], - [ "CK_OTP_PARAMS", "a02060.html", null ], - [ "CK_OTP_SIGNATURE_INFO", "a02064.html", null ], - [ "CK_PBE_PARAMS", "a01992.html", null ], - [ "CK_PKCS5_PBKD2_PARAMS", "a02048.html", null ], - [ "CK_PKCS5_PBKD2_PARAMS2", "a02052.html", null ], - [ "CK_RC2_CBC_PARAMS", "a01956.html", null ], - [ "CK_RC2_MAC_GENERAL_PARAMS", "a01960.html", null ], - [ "CK_RC5_CBC_PARAMS", "a01968.html", null ], - [ "CK_RC5_MAC_GENERAL_PARAMS", "a01972.html", null ], - [ "CK_RC5_PARAMS", "a01964.html", null ], - [ "CK_RSA_AES_KEY_WRAP_PARAMS", "a02112.html", null ], - [ "CK_RSA_PKCS_OAEP_PARAMS", "a01920.html", null ], - [ "CK_RSA_PKCS_PSS_PARAMS", "a01924.html", null ], - [ "CK_SEED_CBC_ENCRYPT_DATA_PARAMS", "a02140.html", null ], - [ "CK_SESSION_INFO", "a01896.html", null ], - [ "CK_SKIPJACK_PRIVATE_WRAP_PARAMS", "a01984.html", null ], - [ "CK_SKIPJACK_RELAYX_PARAMS", "a01988.html", null ], - [ "CK_SLOT_INFO", "a01888.html", null ], - [ "CK_SSL3_KEY_MAT_OUT", "a02008.html", null ], - [ "CK_SSL3_KEY_MAT_PARAMS", "a02012.html", null ], - [ "CK_SSL3_MASTER_KEY_DERIVE_PARAMS", "a02004.html", null ], - [ "CK_SSL3_RANDOM_DATA", "a02000.html", null ], - [ "CK_TLS12_KEY_MAT_PARAMS", "a02120.html", null ], - [ "CK_TLS12_MASTER_KEY_DERIVE_PARAMS", "a02116.html", null ], - [ "CK_TLS_KDF_PARAMS", "a02124.html", null ], - [ "CK_TLS_MAC_PARAMS", "a02128.html", null ], - [ "CK_TLS_PRF_PARAMS", "a02016.html", null ], - [ "CK_TOKEN_INFO", "a01892.html", null ], - [ "CK_VERSION", "a01880.html", null ], - [ "CK_WTLS_KEY_MAT_OUT", "a02032.html", null ], - [ "CK_WTLS_KEY_MAT_PARAMS", "a02036.html", null ], - [ "CK_WTLS_MASTER_KEY_DERIVE_PARAMS", "a02024.html", null ], - [ "CK_WTLS_PRF_PARAMS", "a02028.html", null ], - [ "CK_WTLS_RANDOM_DATA", "a02020.html", null ], - [ "CK_X9_42_DH1_DERIVE_PARAMS", "a01940.html", null ], - [ "CK_X9_42_DH2_DERIVE_PARAMS", "a01944.html", null ], - [ "CK_X9_42_MQV_DERIVE_PARAMS", "a01948.html", null ], - [ "CL_HashContext", "a01640.html", null ], - [ "device_execution_time_t", "a01636.html", null ], - [ "devtype_names_t", "a01512.html", null ], + [ "_ascii_kit_host_context", "a01507.html", null ], + [ "cryptoauthlib.library._CtypeIterator", "a02543.html", null ], + [ "_kit_host_map_entry", "a01511.html", null ], + [ "atca_check_mac_in_out", "a01771.html", null ], + [ "atca_decrypt_in_out", "a01767.html", null ], + [ "atca_delete_in_out", "a01795.html", null ], + [ "atca_derive_key_in_out", "a01759.html", null ], + [ "atca_derive_key_mac_in_out", "a01763.html", null ], + [ "atca_device", "a01531.html", null ], + [ "atca_diversified_key_in_out", "a01751.html", null ], + [ "atca_evp_ctx", "a01827.html", null ], + [ "atca_gen_dig_in_out", "a01747.html", null ], + [ "atca_gen_key_in_out", "a01783.html", null ], + [ "atca_hal_kit_phy_t", "a01671.html", null ], + [ "atca_hal_list_entry_t", "a01667.html", null ], + [ "atca_hal_shm_t", "a01675.html", null ], + [ "atca_hmac_in_out", "a01743.html", null ], + [ "atca_i2c_host_s", "a01687.html", null ], + [ "atca_iface", "a01607.html", null ], + [ "atca_include_data_in_out", "a01715.html", null ], + [ "atca_io_decrypt_in_out", "a01723.html", null ], + [ "atca_mac_in_out", "a01739.html", null ], + [ "atca_mbedtls_eckey_s", "a01823.html", null ], + [ "atca_nonce_in_out", "a01719.html", null ], + [ "atca_resp_mac_in_out", "a01775.html", null ], + [ "atca_secureboot_enc_in_out", "a01731.html", null ], + [ "atca_secureboot_mac_in_out", "a01735.html", null ], + [ "atca_session_key_in_out", "a01791.html", null ], + [ "atca_sha256_ctx", "a01639.html", null ], + [ "atca_sign_internal_in_out", "a01787.html", null ], + [ "atca_spi_host_s", "a01691.html", null ], + [ "atca_temp_key", "a01711.html", null ], + [ "atca_uart_host_s", "a01695.html", null ], + [ "atca_verify_in_out", "a01779.html", null ], + [ "atca_verify_mac", "a01727.html", null ], + [ "atca_write_mac_in_out", "a01755.html", null ], + [ "atcac_aes_cmac_ctx", "a01815.html", null ], + [ "atcac_aes_gcm_ctx", "a01811.html", null ], + [ "atcac_hmac_ctx", "a01807.html", null ], + [ "atcac_pk_ctx", "a01819.html", null ], + [ "atcac_sha1_ctx", "a01803.html", null ], + [ "atcac_sha2_256_ctx", "a01831.html", null ], + [ "atcac_sha2_384_ctx", "a01835.html", null ], + [ "atcac_sha2_512_ctx", "a01839.html", null ], + [ "atcac_x509_ctx", "a01799.html", null ], + [ "atcacert_build_state_s", "a01631.html", null ], + [ "atcacert_cert_element_s", "a01623.html", null ], + [ "atcacert_cert_loc_s", "a01619.html", null ], + [ "atcacert_def_s", "a01627.html", null ], + [ "atcacert_device_loc_s", "a01615.html", null ], + [ "atcacert_tm_utc_s", "a01611.html", null ], + [ "ATCAHAL_t", "a01603.html", null ], + [ "atcaI2Cmaster", "a01679.html", null ], + [ "ATCAIfaceCfg", "a01539.html", null ], + [ "ATCAPacket", "a01643.html", null ], + [ "cryptoauthlib.library.AtcaReference", "a02539.html", null ], + [ "atcaSWImaster", "a01707.html", null ], + [ "atecc508a_config_s", "a01651.html", null ], + [ "atecc608_config_s", "a01655.html", null ], + [ "atsha204a_config_s", "a01647.html", null ], + [ "cal_buffer_s", "a01635.html", null ], + [ "CK_AES_CBC_ENCRYPT_DATA_PARAMS", "a02015.html", null ], + [ "CK_AES_CCM_PARAMS", "a02123.html", null ], + [ "CK_AES_CTR_PARAMS", "a02107.html", null ], + [ "CK_AES_GCM_PARAMS", "a02119.html", null ], + [ "CK_ARIA_CBC_ENCRYPT_DATA_PARAMS", "a02135.html", null ], + [ "CK_ATTRIBUTE", "a01935.html", null ], + [ "CK_C_INITIALIZE_ARGS", "a01951.html", null ], + [ "CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS", "a02131.html", null ], + [ "CK_CAMELLIA_CTR_PARAMS", "a02127.html", null ], + [ "CK_CCM_PARAMS", "a02115.html", null ], + [ "CK_CMS_SIG_PARAMS", "a02075.html", null ], + [ "CK_DATE", "a01939.html", null ], + [ "CK_DES_CBC_ENCRYPT_DATA_PARAMS", "a02011.html", null ], + [ "CK_DSA_PARAMETER_GEN_PARAM", "a02139.html", null ], + [ "CK_ECDH1_DERIVE_PARAMS", "a01963.html", null ], + [ "CK_ECDH2_DERIVE_PARAMS", "a01967.html", null ], + [ "CK_ECDH_AES_KEY_WRAP_PARAMS", "a02143.html", null ], + [ "CK_ECMQV_DERIVE_PARAMS", "a01971.html", null ], + [ "CK_FUNCTION_LIST", "a01843.html", null ], + [ "CK_GCM_PARAMS", "a02111.html", null ], + [ "CK_GOSTR3410_DERIVE_PARAMS", "a02167.html", null ], + [ "CK_GOSTR3410_KEY_WRAP_PARAMS", "a02171.html", null ], + [ "CK_INFO", "a01919.html", null ], + [ "CK_KEA_DERIVE_PARAMS", "a01987.html", null ], + [ "CK_KEY_DERIVATION_STRING_DATA", "a02079.html", null ], + [ "CK_KEY_WRAP_SET_OAEP_PARAMS", "a02031.html", null ], + [ "CK_KIP_PARAMS", "a02103.html", null ], + [ "CK_MECHANISM", "a01943.html", null ], + [ "CK_MECHANISM_INFO", "a01947.html", null ], + [ "CK_OTP_PARAM", "a02091.html", null ], + [ "CK_OTP_PARAMS", "a02095.html", null ], + [ "CK_OTP_SIGNATURE_INFO", "a02099.html", null ], + [ "CK_PBE_PARAMS", "a02027.html", null ], + [ "CK_PKCS5_PBKD2_PARAMS", "a02083.html", null ], + [ "CK_PKCS5_PBKD2_PARAMS2", "a02087.html", null ], + [ "CK_RC2_CBC_PARAMS", "a01991.html", null ], + [ "CK_RC2_MAC_GENERAL_PARAMS", "a01995.html", null ], + [ "CK_RC5_CBC_PARAMS", "a02003.html", null ], + [ "CK_RC5_MAC_GENERAL_PARAMS", "a02007.html", null ], + [ "CK_RC5_PARAMS", "a01999.html", null ], + [ "CK_RSA_AES_KEY_WRAP_PARAMS", "a02147.html", null ], + [ "CK_RSA_PKCS_OAEP_PARAMS", "a01955.html", null ], + [ "CK_RSA_PKCS_PSS_PARAMS", "a01959.html", null ], + [ "CK_SEED_CBC_ENCRYPT_DATA_PARAMS", "a02175.html", null ], + [ "CK_SESSION_INFO", "a01931.html", null ], + [ "CK_SKIPJACK_PRIVATE_WRAP_PARAMS", "a02019.html", null ], + [ "CK_SKIPJACK_RELAYX_PARAMS", "a02023.html", null ], + [ "CK_SLOT_INFO", "a01923.html", null ], + [ "CK_SSL3_KEY_MAT_OUT", "a02043.html", null ], + [ "CK_SSL3_KEY_MAT_PARAMS", "a02047.html", null ], + [ "CK_SSL3_MASTER_KEY_DERIVE_PARAMS", "a02039.html", null ], + [ "CK_SSL3_RANDOM_DATA", "a02035.html", null ], + [ "CK_TLS12_KEY_MAT_PARAMS", "a02155.html", null ], + [ "CK_TLS12_MASTER_KEY_DERIVE_PARAMS", "a02151.html", null ], + [ "CK_TLS_KDF_PARAMS", "a02159.html", null ], + [ "CK_TLS_MAC_PARAMS", "a02163.html", null ], + [ "CK_TLS_PRF_PARAMS", "a02051.html", null ], + [ "CK_TOKEN_INFO", "a01927.html", null ], + [ "CK_VERSION", "a01915.html", null ], + [ "CK_WTLS_KEY_MAT_OUT", "a02067.html", null ], + [ "CK_WTLS_KEY_MAT_PARAMS", "a02071.html", null ], + [ "CK_WTLS_MASTER_KEY_DERIVE_PARAMS", "a02059.html", null ], + [ "CK_WTLS_PRF_PARAMS", "a02063.html", null ], + [ "CK_WTLS_RANDOM_DATA", "a02055.html", null ], + [ "CK_X9_42_DH1_DERIVE_PARAMS", "a01975.html", null ], + [ "CK_X9_42_DH2_DERIVE_PARAMS", "a01979.html", null ], + [ "CK_X9_42_MQV_DERIVE_PARAMS", "a01983.html", null ], + [ "CL_HashContext", "a01663.html", null ], + [ "device_execution_time_t", "a01659.html", null ], + [ "devtype_names_t", "a01535.html", null ], [ "Exception", null, [ - [ "cryptoauthlib.exceptions.CryptoError", "a02308.html", [ - [ "cryptoauthlib.exceptions.AssertionFailure", "a02416.html", null ], - [ "cryptoauthlib.exceptions.BadArgumentError", "a02356.html", null ], - [ "cryptoauthlib.exceptions.BadCrcError", "a02368.html", null ], - [ "cryptoauthlib.exceptions.BadOpcodeError", "a02404.html", null ], - [ "cryptoauthlib.exceptions.CheckmacVerifyFailedError", "a02328.html", null ], - [ "cryptoauthlib.exceptions.CommunicationError", "a02396.html", null ], - [ "cryptoauthlib.exceptions.ConfigZoneLockedError", "a02316.html", null ], - [ "cryptoauthlib.exceptions.CrcError", "a02336.html", null ], - [ "cryptoauthlib.exceptions.DataZoneLockedError", "a02320.html", null ], - [ "cryptoauthlib.exceptions.EccFaultError", "a02344.html", null ], - [ "cryptoauthlib.exceptions.ExecutionError", "a02408.html", null ], - [ "cryptoauthlib.exceptions.FunctionError", "a02348.html", null ], - [ "cryptoauthlib.exceptions.GenericError", "a02352.html", null ], - [ "cryptoauthlib.exceptions.HealthTestError", "a02432.html", null ], - [ "cryptoauthlib.exceptions.InvalidIdentifierError", "a02360.html", null ], - [ "cryptoauthlib.exceptions.InvalidSizeError", "a02364.html", null ], - [ "cryptoauthlib.exceptions.LibraryLoadError", "a02312.html", null ], - [ "cryptoauthlib.exceptions.LibraryMemoryError", "a02436.html", null ], - [ "cryptoauthlib.exceptions.LibraryNotInitialized", "a02444.html", null ], - [ "cryptoauthlib.exceptions.NoDevicesFoundError", "a02428.html", null ], - [ "cryptoauthlib.exceptions.NoResponseError", "a02376.html", null ], - [ "cryptoauthlib.exceptions.NoUseFlagError", "a02440.html", null ], - [ "cryptoauthlib.exceptions.ParityError", "a02384.html", null ], - [ "cryptoauthlib.exceptions.ParseError", "a02332.html", null ], - [ "cryptoauthlib.exceptions.ReceiveError", "a02372.html", null ], - [ "cryptoauthlib.exceptions.ReceiveTimeoutError", "a02392.html", null ], - [ "cryptoauthlib.exceptions.ResyncWithWakeupError", "a02380.html", null ], - [ "cryptoauthlib.exceptions.StatusUnknownError", "a02340.html", null ], - [ "cryptoauthlib.exceptions.TimeOutError", "a02400.html", null ], - [ "cryptoauthlib.exceptions.TransmissionError", "a02420.html", null ], - [ "cryptoauthlib.exceptions.TransmissionTimeoutError", "a02388.html", null ], - [ "cryptoauthlib.exceptions.UnimplementedError", "a02412.html", null ], - [ "cryptoauthlib.exceptions.UnsupportedInterface", "a02448.html", null ], - [ "cryptoauthlib.exceptions.WakeFailedError", "a02324.html", null ], - [ "cryptoauthlib.exceptions.ZoneNotLockedError", "a02424.html", null ] + [ "cryptoauthlib.exceptions.CryptoError", "a02343.html", [ + [ "cryptoauthlib.exceptions.AssertionFailure", "a02451.html", null ], + [ "cryptoauthlib.exceptions.BadArgumentError", "a02391.html", null ], + [ "cryptoauthlib.exceptions.BadCrcError", "a02403.html", null ], + [ "cryptoauthlib.exceptions.BadOpcodeError", "a02439.html", null ], + [ "cryptoauthlib.exceptions.CheckmacVerifyFailedError", "a02363.html", null ], + [ "cryptoauthlib.exceptions.CommunicationError", "a02431.html", null ], + [ "cryptoauthlib.exceptions.ConfigZoneLockedError", "a02351.html", null ], + [ "cryptoauthlib.exceptions.CrcError", "a02371.html", null ], + [ "cryptoauthlib.exceptions.DataZoneLockedError", "a02355.html", null ], + [ "cryptoauthlib.exceptions.EccFaultError", "a02379.html", null ], + [ "cryptoauthlib.exceptions.ExecutionError", "a02443.html", null ], + [ "cryptoauthlib.exceptions.FunctionError", "a02383.html", null ], + [ "cryptoauthlib.exceptions.GenericError", "a02387.html", null ], + [ "cryptoauthlib.exceptions.HealthTestError", "a02467.html", null ], + [ "cryptoauthlib.exceptions.InvalidIdentifierError", "a02395.html", null ], + [ "cryptoauthlib.exceptions.InvalidSizeError", "a02399.html", null ], + [ "cryptoauthlib.exceptions.LibraryLoadError", "a02347.html", null ], + [ "cryptoauthlib.exceptions.LibraryMemoryError", "a02471.html", null ], + [ "cryptoauthlib.exceptions.LibraryNotInitialized", "a02479.html", null ], + [ "cryptoauthlib.exceptions.NoDevicesFoundError", "a02463.html", null ], + [ "cryptoauthlib.exceptions.NoResponseError", "a02411.html", null ], + [ "cryptoauthlib.exceptions.NoUseFlagError", "a02475.html", null ], + [ "cryptoauthlib.exceptions.ParityError", "a02419.html", null ], + [ "cryptoauthlib.exceptions.ParseError", "a02367.html", null ], + [ "cryptoauthlib.exceptions.ReceiveError", "a02407.html", null ], + [ "cryptoauthlib.exceptions.ReceiveTimeoutError", "a02427.html", null ], + [ "cryptoauthlib.exceptions.ResyncWithWakeupError", "a02415.html", null ], + [ "cryptoauthlib.exceptions.StatusUnknownError", "a02375.html", null ], + [ "cryptoauthlib.exceptions.TimeOutError", "a02435.html", null ], + [ "cryptoauthlib.exceptions.TransmissionError", "a02455.html", null ], + [ "cryptoauthlib.exceptions.TransmissionTimeoutError", "a02423.html", null ], + [ "cryptoauthlib.exceptions.UnimplementedError", "a02447.html", null ], + [ "cryptoauthlib.exceptions.UnsupportedInterface", "a02483.html", null ], + [ "cryptoauthlib.exceptions.WakeFailedError", "a02359.html", null ], + [ "cryptoauthlib.exceptions.ZoneNotLockedError", "a02459.html", null ] ] ] ] ], - [ "i2c_sam0_instance", "a01680.html", null ], - [ "i2c_sam_instance", "a01684.html", null ], - [ "i2c_start_instance", "a01664.html", null ], + [ "i2c_sam0_instance", "a01699.html", null ], + [ "i2c_sam_instance", "a01703.html", null ], + [ "i2c_start_instance", "a01683.html", null ], [ "Jwt", null, [ - [ "cryptoauthlib.atjwt.PyJWT", "a02240.html", null ] + [ "cryptoauthlib.atjwt.PyJWT", "a02275.html", null ] ] ], - [ "memory_parameters", "a01496.html", null ], + [ "memory_parameters", "a01523.html", null ], [ "object", null, [ - [ "cryptoauthlib_mock.atcab_mock", "a02536.html", null ] + [ "cryptoauthlib_mock.atcab_mock", "a02571.html", null ] ] ], - [ "pcks11_mech_table_e", "a01848.html", null ], - [ "pkcs11_attrib_model_s", "a01820.html", null ], - [ "pkcs11_conf_filedata_s", "a01824.html", null ], - [ "pkcs11_dev_ctx", "a01828.html", null ], - [ "pkcs11_dev_res", "a01832.html", null ], - [ "pkcs11_dev_state", "a01836.html", null ], - [ "pkcs11_ecc_key_info_s", "a01844.html", null ], - [ "pkcs11_lib_ctx_s", "a01840.html", null ], - [ "pkcs11_object_cache_s", "a01856.html", null ], - [ "pkcs11_object_s", "a01852.html", null ], - [ "pkcs11_session_ctx_s", "a01872.html", null ], - [ "pkcs11_session_mech_ctx_s", "a01860.html", null ], - [ "pkcs11_slot_ctx_s", "a01876.html", null ], - [ "secure_boot_config_bits", "a01488.html", null ], - [ "secure_boot_parameters", "a01492.html", null ], - [ "sw_sha256_ctx", "a01644.html", null ], - [ "tng_cert_map_element", "a01500.html", null ], + [ "pcks11_mech_table_e", "a01883.html", null ], + [ "pkcs11_attrib_model_s", "a01847.html", null ], + [ "pkcs11_conf_filedata_s", "a01851.html", null ], + [ "pkcs11_dev_ctx", "a01855.html", null ], + [ "pkcs11_dev_res", "a01859.html", null ], + [ "pkcs11_dev_state", "a01863.html", null ], + [ "pkcs11_ecc_key_info_s", "a01871.html", null ], + [ "pkcs11_key_info_s", "a01879.html", null ], + [ "pkcs11_lib_ctx_s", "a01867.html", null ], + [ "pkcs11_object_cache_s", "a01891.html", null ], + [ "pkcs11_object_s", "a01887.html", null ], + [ "pkcs11_rsa_key_info_s", "a01875.html", null ], + [ "pkcs11_session_ctx_s", "a01907.html", null ], + [ "pkcs11_session_mech_ctx_s", "a01895.html", null ], + [ "pkcs11_slot_ctx_s", "a01911.html", null ], + [ "secure_boot_config_bits", "a01515.html", null ], + [ "secure_boot_parameters", "a01519.html", null ], + [ "tng_cert_map_element", "a01527.html", null ], [ "Union", null, [ - [ "cryptoauthlib.library.AtcaUnion", "a02512.html", [ - [ "cryptoauthlib.iface._ATCAIfaceParams", "a02496.html", null ], - [ "cryptoauthlib.iface._U_Address", "a02464.html", null ] + [ "cryptoauthlib.library.AtcaUnion", "a02547.html", [ + [ "cryptoauthlib.iface._ATCAIfaceParams", "a02531.html", null ], + [ "cryptoauthlib.iface._U_Address", "a02499.html", null ] ] ] ] ], [ "build_ext", null, [ - [ "setup.CryptoAuthCommandBuildExt", "a02524.html", null ] + [ "setup.CryptoAuthCommandBuildExt", "a02559.html", null ] ] ], [ "Distribution", null, [ - [ "setup.BinaryDistribution", "a02532.html", null ] + [ "setup.BinaryDistribution", "a02567.html", null ] ] ], [ "ECAlgorithm", null, [ - [ "cryptoauthlib.atjwt.HwEcAlgorithm", "a02232.html", null ] + [ "cryptoauthlib.atjwt.HwEcAlgorithm", "a02267.html", null ] ] ], [ "Enum", null, [ - [ "cryptoauthlib.atcaenum.AtcaEnum", "a02228.html", [ - [ "cryptoauthlib.atcacert.CertStatus", "a02200.html", null ], - [ "cryptoauthlib.atcacert.atcacert_cert_sn_src_t", "a02180.html", null ], - [ "cryptoauthlib.atcacert.atcacert_cert_type_t", "a02176.html", null ], - [ "cryptoauthlib.atcacert.atcacert_date_format_t", "a02192.html", null ], - [ "cryptoauthlib.atcacert.atcacert_device_zone_t", "a02184.html", null ], - [ "cryptoauthlib.atcacert.atcacert_std_cert_element_t", "a02196.html", null ], - [ "cryptoauthlib.atcacert.atcacert_transform_t", "a02188.html", null ], - [ "cryptoauthlib.iface.ATCADeviceType", "a02460.html", null ], - [ "cryptoauthlib.iface.ATCAIfaceType", "a02452.html", null ], - [ "cryptoauthlib.iface.ATCAKitType", "a02456.html", null ], - [ "cryptoauthlib.status.Status", "a02520.html", null ] + [ "cryptoauthlib.atcaenum.AtcaEnum", "a02263.html", [ + [ "cryptoauthlib.atcacert.CertStatus", "a02235.html", null ], + [ "cryptoauthlib.atcacert.atcacert_cert_sn_src_t", "a02215.html", null ], + [ "cryptoauthlib.atcacert.atcacert_cert_type_t", "a02211.html", null ], + [ "cryptoauthlib.atcacert.atcacert_date_format_t", "a02227.html", null ], + [ "cryptoauthlib.atcacert.atcacert_device_zone_t", "a02219.html", null ], + [ "cryptoauthlib.atcacert.atcacert_std_cert_element_t", "a02231.html", null ], + [ "cryptoauthlib.atcacert.atcacert_transform_t", "a02223.html", null ], + [ "cryptoauthlib.iface.ATCADeviceType", "a02495.html", null ], + [ "cryptoauthlib.iface.ATCAIfaceType", "a02487.html", null ], + [ "cryptoauthlib.iface.ATCAKitType", "a02491.html", null ], + [ "cryptoauthlib.status.Status", "a02555.html", null ] ] ] ] ], [ "HMACAlgorithm", null, [ - [ "cryptoauthlib.atjwt.HwHmacAlgorithm", "a02236.html", null ] + [ "cryptoauthlib.atjwt.HwHmacAlgorithm", "a02271.html", null ] ] ], [ "install", null, [ - [ "setup.CryptoAuthCommandInstall", "a02528.html", null ] + [ "setup.CryptoAuthCommandInstall", "a02563.html", null ] ] ], [ "Structure", null, [ - [ "cryptoauthlib.atcab.atca_aes_cbc_ctx", "a02144.html", null ], - [ "cryptoauthlib.atcab.atca_aes_cbcmac_ctx", "a02168.html", null ], - [ "cryptoauthlib.atcab.atca_aes_ccm_ctx", "a02164.html", null ], - [ "cryptoauthlib.atcab.atca_aes_cmac_ctx", "a02148.html", null ], - [ "cryptoauthlib.atcab.atca_aes_ctr_ctx", "a02152.html", null ], - [ "cryptoauthlib.atcab.atca_aes_gcm_ctx", "a02160.html", null ], - [ "cryptoauthlib.atcab.atca_sha256_ctx", "a02156.html", [ - [ "cryptoauthlib.atcab.atca_hmac_sha256_ctx", "a02172.html", null ] + [ "cryptoauthlib.atcab.atca_aes_cbc_ctx", "a02179.html", null ], + [ "cryptoauthlib.atcab.atca_aes_cbcmac_ctx", "a02203.html", null ], + [ "cryptoauthlib.atcab.atca_aes_ccm_ctx", "a02199.html", null ], + [ "cryptoauthlib.atcab.atca_aes_cmac_ctx", "a02183.html", null ], + [ "cryptoauthlib.atcab.atca_aes_ctr_ctx", "a02187.html", null ], + [ "cryptoauthlib.atcab.atca_aes_gcm_ctx", "a02195.html", null ], + [ "cryptoauthlib.atcab.atca_sha256_ctx", "a02191.html", [ + [ "cryptoauthlib.atcab.atca_hmac_sha256_ctx", "a02207.html", null ] ] ], - [ "cryptoauthlib.atcacert.atcacert_tm_utc_t", "a02224.html", null ], - [ "cryptoauthlib.device.AesEnable", "a02244.html", null ], - [ "cryptoauthlib.device.ChipMode508", "a02256.html", null ], - [ "cryptoauthlib.device.ChipMode608", "a02260.html", null ], - [ "cryptoauthlib.device.ChipOptions", "a02284.html", null ], - [ "cryptoauthlib.device.CountMatch", "a02252.html", null ], - [ "cryptoauthlib.device.Counter204", "a02264.html", null ], - [ "cryptoauthlib.device.I2cEnable", "a02248.html", null ], - [ "cryptoauthlib.device.KeyConfig", "a02292.html", null ], - [ "cryptoauthlib.device.SecureBoot", "a02280.html", null ], - [ "cryptoauthlib.device.SlotConfig", "a02268.html", null ], - [ "cryptoauthlib.device.UseLock", "a02272.html", null ], - [ "cryptoauthlib.device.VolatileKeyPermission", "a02276.html", null ], - [ "cryptoauthlib.device.X509Format", "a02288.html", null ], - [ "cryptoauthlib.library.AtcaStructure", "a02516.html", [ - [ "cryptoauthlib.atcacert.atcacert_cert_element_t", "a02216.html", null ], - [ "cryptoauthlib.atcacert.atcacert_cert_loc_t", "a02212.html", null ], - [ "cryptoauthlib.atcacert.atcacert_comp_data_t", "a02204.html", null ], - [ "cryptoauthlib.atcacert.atcacert_def_t", "a02220.html", null ], - [ "cryptoauthlib.atcacert.atcacert_device_loc_t", "a02208.html", null ], - [ "cryptoauthlib.device.Atecc508aConfig", "a02300.html", null ], - [ "cryptoauthlib.device.Atecc608Config", "a02304.html", null ], - [ "cryptoauthlib.device.Atsha204aConfig", "a02296.html", null ], - [ "cryptoauthlib.iface.ATCAIfaceCfg", "a02500.html", null ], - [ "cryptoauthlib.iface._ATCACUSTOM", "a02492.html", null ], - [ "cryptoauthlib.iface._ATCAHID", "a02484.html", null ], - [ "cryptoauthlib.iface._ATCAI2C", "a02468.html", null ], - [ "cryptoauthlib.iface._ATCAKIT", "a02488.html", null ], - [ "cryptoauthlib.iface._ATCASPI", "a02476.html", null ], - [ "cryptoauthlib.iface._ATCASWI", "a02472.html", null ], - [ "cryptoauthlib.iface._ATCAUART", "a02480.html", null ] + [ "cryptoauthlib.atcacert.atcacert_tm_utc_t", "a02259.html", null ], + [ "cryptoauthlib.device.AesEnable", "a02279.html", null ], + [ "cryptoauthlib.device.ChipMode508", "a02291.html", null ], + [ "cryptoauthlib.device.ChipMode608", "a02295.html", null ], + [ "cryptoauthlib.device.ChipOptions", "a02319.html", null ], + [ "cryptoauthlib.device.CountMatch", "a02287.html", null ], + [ "cryptoauthlib.device.Counter204", "a02299.html", null ], + [ "cryptoauthlib.device.I2cEnable", "a02283.html", null ], + [ "cryptoauthlib.device.KeyConfig", "a02327.html", null ], + [ "cryptoauthlib.device.SecureBoot", "a02315.html", null ], + [ "cryptoauthlib.device.SlotConfig", "a02303.html", null ], + [ "cryptoauthlib.device.UseLock", "a02307.html", null ], + [ "cryptoauthlib.device.VolatileKeyPermission", "a02311.html", null ], + [ "cryptoauthlib.device.X509Format", "a02323.html", null ], + [ "cryptoauthlib.library.AtcaStructure", "a02551.html", [ + [ "cryptoauthlib.atcacert.atcacert_cert_element_t", "a02251.html", null ], + [ "cryptoauthlib.atcacert.atcacert_cert_loc_t", "a02247.html", null ], + [ "cryptoauthlib.atcacert.atcacert_comp_data_t", "a02239.html", null ], + [ "cryptoauthlib.atcacert.atcacert_def_t", "a02255.html", null ], + [ "cryptoauthlib.atcacert.atcacert_device_loc_t", "a02243.html", null ], + [ "cryptoauthlib.device.Atecc508aConfig", "a02335.html", null ], + [ "cryptoauthlib.device.Atecc608Config", "a02339.html", null ], + [ "cryptoauthlib.device.Atsha204aConfig", "a02331.html", null ], + [ "cryptoauthlib.iface.ATCAIfaceCfg", "a02535.html", null ], + [ "cryptoauthlib.iface._ATCACUSTOM", "a02527.html", null ], + [ "cryptoauthlib.iface._ATCAHID", "a02519.html", null ], + [ "cryptoauthlib.iface._ATCAI2C", "a02503.html", null ], + [ "cryptoauthlib.iface._ATCAKIT", "a02523.html", null ], + [ "cryptoauthlib.iface._ATCASPI", "a02511.html", null ], + [ "cryptoauthlib.iface._ATCASWI", "a02507.html", null ], + [ "cryptoauthlib.iface._ATCAUART", "a02515.html", null ] ] ] ] ] ]; \ No newline at end of file diff --git a/index.html b/index.html index 0e2eac790..0940ed5c8 100644 --- a/index.html +++ b/index.html @@ -31,7 +31,7 @@ Logo -
CryptoAuthLib v3.7.5 +
CryptoAuthLib v3.7.6
Microchip CryptoAuthentication Library
@@ -101,7 +101,7 @@

-

+

Introduction

This library implements the APIs required to communicate with Microchip Security device. The family of devices supported currently are:

@@ -138,12 +138,12 @@

  • TA010 mikroBUS evaluation board
  • For most development, using socketed top-boards is preferable until your configuration is well tested, then you can commit it to a CryptoAuth Xplained Pro Extension, for example. Keep in mind that once you lock a device, it will not be changeable.

    -

    +

    Examples

    • Install the Trust Platform Design Suite to access Use Case examples for the different Security Solutions (ATECC608, SHA104/105, ECC204, TA010, TA100…)
    -

    +

    Configuration

    In order to properly configured the library there must be a header file in your project named atca_config.h at minimum this needs to contain defines for the hal and device types being used. Most integrations have an configuration mechanism for generating this file. See the atca_config.h.in template which is configured by CMake for Linux, MacOS, & Windows projects.

    An example of the configuration:

    @@ -172,14 +172,14 @@

  • ATCA_NO_HEAP can be used to remove the use of malloc/free from the main library. This can be helpful for smaller MCUs that don't have a heap implemented. If just using the basic API, then there shouldn't be any code changes required. The lower-level API will no longer use the new/delete functions and the init/release functions should be used directly.
  • Some specific options are available in the fully documented configuration files lib/calib/calib_config.h, atca_configuration.h, lib/crypto/crypto_config.h, lib/host/atca_host_config.h which is also the place where features can be selected. We provide some configurations focused on specific use cases and the checks are enabled by default.

    -

    -Release notes

    -

    See Release Notes

    +Release notes

    +

    See Release Notes

    +

    Host Device Support

    -

    CryptoAuthLib will run on a variety of platforms from small micro-controllers to desktop host systems. See hal readme

    +

    CryptoAuthLib will run on a variety of platforms from small micro-controllers to desktop host systems. See hal readme

    Porting requires a time delay function of millisecond resolution (hal_delay_ms) which can be implemented via loop, timer, or rtos sleep/wait and a communication interface.

    -

    +

    CryptoAuthLib Architecture

    Cryptoauthlib API documentation is at https://microchiptech.github.io/cryptoauthlib/

    The library is structured to support portability to:

      @@ -188,12 +188,12 @@

    • multiple chip communication protocols (I2C, SPI, and SWI)

    All platform dependencies are contained within the HAL (hardware abstraction layer).

    -

    +

    Directory Structure

    lib - primary library source code
    lib/atcacert - certificate data and i/o methods
    lib/calib - the Basic Cryptoauth API
    -
    lib/crypto - Software crypto implementations external crypto libraries support (primarily SHA1 and SHA256)
    +
    lib/crypto - Software crypto implementations external crypto libraries support (primarily SHA1 and SHA2)
    lib/hal - hardware abstraction layer code for supporting specific platforms
    lib/host - support functions for common host-side calculations
    lib/jwt - json web token functions
    @@ -203,14 +203,14 @@

    into a project, so it is up to the developer to include or not as needed. Test
    code adds significant bulk to an application - it's not intended to be included
    in production code.
    -

    +

    Tests

    There is a set of integration tests found in the test directory which will at least partially demonstrate the use of the objects. Some tests may depend upon a certain device being configured in a certain way and may not work for all devices or specific configurations of the device. See test readme

    -

    +

    Using CryptoAuthLib (Microchip CryptoAuth Library)

    The best place to start is with the Microchip Trust Platform

    Also application examples are included as part of the Harmony 3 framework and can be copied from the Harmony Content Manager or found with the Harmony 3 Framework Cryptoauthlib_apps

    -

    +

    Incorporating CryptoAuthLib in a Linux project using USB HID devices

    The Linux HID HAL files use the Linux udev development software package.

    To install the udev development package under Ubuntu Linux, please type the following command at the terminal window:

    diff --git a/index.js b/index.js index 22ac2d183..3225961bc 100644 --- a/index.js +++ b/index.js @@ -1,14 +1,14 @@ var index = [ - [ "Introduction", "index.html#autotoc_md50", null ], - [ "Examples", "index.html#autotoc_md51", null ], - [ "Configuration", "index.html#autotoc_md52", null ], - [ "Release notes", "index.html#autotoc_md53", null ], - [ "Host Device Support", "index.html#autotoc_md54", null ], - [ "CryptoAuthLib Architecture", "index.html#autotoc_md55", null ], - [ "Directory Structure", "index.html#autotoc_md56", null ], - [ "Tests", "index.html#autotoc_md57", null ], - [ "Using CryptoAuthLib (Microchip CryptoAuth Library)", "index.html#autotoc_md58", [ - [ "Incorporating CryptoAuthLib in a Linux project using USB HID devices", "index.html#autotoc_md59", null ] + [ "Introduction", "index.html#autotoc_md51", null ], + [ "Examples", "index.html#autotoc_md52", null ], + [ "Configuration", "index.html#autotoc_md53", null ], + [ "Release notes", "index.html#autotoc_md54", null ], + [ "Host Device Support", "index.html#autotoc_md55", null ], + [ "CryptoAuthLib Architecture", "index.html#autotoc_md56", null ], + [ "Directory Structure", "index.html#autotoc_md57", null ], + [ "Tests", "index.html#autotoc_md58", null ], + [ "Using CryptoAuthLib (Microchip CryptoAuth Library)", "index.html#autotoc_md59", [ + [ "Incorporating CryptoAuthLib in a Linux project using USB HID devices", "index.html#autotoc_md60", null ] ] ] ]; \ No newline at end of file diff --git a/modules.html b/modules.html index b795f3b5e..dd3308060 100644 --- a/modules.html +++ b/modules.html @@ -31,7 +31,7 @@ @@ -102,19 +102,19 @@
    Here is a list of all modules:
    -
    CryptoAuthLib v3.7.5 +
    CryptoAuthLib v3.7.6
    Microchip CryptoAuthentication Library
    - - - - - - - - - - - - - + + + + + + + + + + + + +
     TNG API (tng_)These methods provide some convenience functions (mostly around certificates) for TNG devices, which currently include ATECC608A-MAHTN-T
     Basic Crypto API methods (atcab_)These methods provide the most convenient, simple API to CryptoAuth chips
     Configuration (cfg_)Logical device configurations describe the CryptoAuth device type and logical interface
     ATCADevice (atca_)ATCADevice object - composite of command and interface objects
     ATCAIface (atca_)Abstract interface to all CryptoAuth device types. This interface connects to the HAL implementation and abstracts the physical details of the device communication from all the upper layers of CryptoAuthLib
     Certificate manipulation methods (atcacert_)These methods provide convenient ways to perform certification I/O with CryptoAuth chips and perform certificate manipulation in memory
     Basic Crypto API methods for CryptoAuth Devices (calib_)These methods provide a simple API to CryptoAuth chips
     Software crypto methods (atcac_)These methods provide a software implementation of various crypto algorithms
     Hardware abstraction layer (hal_)These methods define the hardware abstraction layer for communicating with a CryptoAuth device
     Host side crypto methods (atcah_)Use these functions if your system does not use an ATCADevice as a host but implements the host in firmware. The functions provide host-side cryptographic functionality for an ATECC client device. They are intended to accompany the CryptoAuthLib functions. They can be called directly from an application, or integrated into an API
     JSON Web Token (JWT) methods (atca_jwt_)Methods for signing and verifying JSON Web Token (JWT) tokens
     mbedTLS Wrapper methods (atca_mbedtls_)These methods are for interfacing cryptoauthlib to mbedtls
     Attributes (pkcs11_attrib_)
     TNG API (tng_)These methods provide some convenience functions (mostly around certificates) for TNG devices, which currently include ATECC608A-MAHTN-T
     Basic Crypto API methods (atcab_)These methods provide the most convenient, simple API to CryptoAuth chips
     Configuration (cfg_)Logical device configurations describe the CryptoAuth device type and logical interface
     ATCADevice (atca_)ATCADevice object - composite of command and interface objects
     ATCAIface (atca_)Abstract interface to all CryptoAuth device types. This interface connects to the HAL implementation and abstracts the physical details of the device communication from all the upper layers of CryptoAuthLib
     Certificate manipulation methods (atcacert_)These methods provide convenient ways to perform certification I/O with CryptoAuth chips and perform certificate manipulation in memory
     Basic Crypto API methods for CryptoAuth Devices (calib_)These methods provide a simple API to CryptoAuth chips
     Software crypto methods (atcac_)These methods provide a software implementation of various crypto algorithms
     Hardware abstraction layer (hal_)These methods define the hardware abstraction layer for communicating with a CryptoAuth device
     Host side crypto methods (atcah_)Use these functions if your system does not use an ATCADevice as a host but implements the host in firmware. The functions provide host-side cryptographic functionality for an ATECC client device. They are intended to accompany the CryptoAuthLib functions. They can be called directly from an application, or integrated into an API
     JSON Web Token (JWT) methods (atca_jwt_)Methods for signing and verifying JSON Web Token (JWT) tokens
     mbedTLS Wrapper methods (atca_mbedtls_)These methods are for interfacing cryptoauthlib to mbedtls
     Attributes (pkcs11_attrib_)
    diff --git a/modules.js b/modules.js index cd90aaed5..6eea94623 100644 --- a/modules.js +++ b/modules.js @@ -1,16 +1,16 @@ var modules = [ - [ "TNG API (tng_)", "a01438.html", "a01438" ], - [ "Basic Crypto API methods (atcab_)", "a01439.html", "a01439" ], - [ "Configuration (cfg_)", "a01440.html", null ], - [ "ATCADevice (atca_)", "a01441.html", "a01441" ], - [ "ATCAIface (atca_)", "a01442.html", "a01442" ], - [ "Certificate manipulation methods (atcacert_)", "a01443.html", "a01443" ], - [ "Basic Crypto API methods for CryptoAuth Devices (calib_)", "a01444.html", "a01444" ], - [ "Software crypto methods (atcac_)", "a01445.html", "a01445" ], - [ "Hardware abstraction layer (hal_)", "a01446.html", "a01446" ], - [ "Host side crypto methods (atcah_)", "a01447.html", "a01447" ], - [ "JSON Web Token (JWT) methods (atca_jwt_)", "a01448.html", null ], - [ "mbedTLS Wrapper methods (atca_mbedtls_)", "a01449.html", "a01449" ], - [ "Attributes (pkcs11_attrib_)", "a01450.html", "a01450" ] + [ "TNG API (tng_)", "a01465.html", "a01465" ], + [ "Basic Crypto API methods (atcab_)", "a01466.html", "a01466" ], + [ "Configuration (cfg_)", "a01467.html", null ], + [ "ATCADevice (atca_)", "a01468.html", "a01468" ], + [ "ATCAIface (atca_)", "a01469.html", "a01469" ], + [ "Certificate manipulation methods (atcacert_)", "a01470.html", "a01470" ], + [ "Basic Crypto API methods for CryptoAuth Devices (calib_)", "a01471.html", "a01471" ], + [ "Software crypto methods (atcac_)", "a01472.html", "a01472" ], + [ "Hardware abstraction layer (hal_)", "a01473.html", "a01473" ], + [ "Host side crypto methods (atcah_)", "a01474.html", "a01474" ], + [ "JSON Web Token (JWT) methods (atca_jwt_)", "a01475.html", null ], + [ "mbedTLS Wrapper methods (atca_mbedtls_)", "a01476.html", "a01476" ], + [ "Attributes (pkcs11_attrib_)", "a01477.html", "a01477" ] ]; \ No newline at end of file diff --git a/namespacemembers.html b/namespacemembers.html index 73c14c242..cec97b88c 100644 --- a/namespacemembers.html +++ b/namespacemembers.html @@ -31,7 +31,7 @@ Logo -
    CryptoAuthLib v3.7.5 +
    CryptoAuthLib v3.7.6
    Microchip CryptoAuthentication Library
    @@ -100,218 +100,218 @@
    Here is a list of all documented namespace members with links to the namespaces they belong to:

    - _ -

    - a -

    - c -

    - g -

    - l -

    - s -

    - t -

    diff --git a/namespacemembers_func.html b/namespacemembers_func.html index 995591d42..58813c6d4 100644 --- a/namespacemembers_func.html +++ b/namespacemembers_func.html @@ -31,7 +31,7 @@ Logo -
    CryptoAuthLib v3.7.5 +
    CryptoAuthLib v3.7.6
    Microchip CryptoAuthentication Library
    @@ -100,218 +100,218 @@  

    - _ -

    - a -

    - c -

    - g -

    - l -

    - s -

    - t -

    diff --git a/namespaces.html b/namespaces.html index d41096a2e..ea0140126 100644 --- a/namespaces.html +++ b/namespaces.html @@ -31,7 +31,7 @@ Logo -
    CryptoAuthLib v3.7.5 +
    CryptoAuthLib v3.7.6
    Microchip CryptoAuthentication Library
    @@ -102,115 +102,115 @@
    Here is a list of all documented namespaces with brief descriptions:
    [detail level 123]
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
     Ncryptoauthlib
     Natcab
     Natcacert
     Natcaenum
     Natjwt
     Ndevice
     Nexceptions
     Niface
     Nlibrary
     Nsha206_api
     Nstatus
     Ntng
     Ntest_device
     Ntest_iface
     Ncryptoauthlib
     Natcab
     Natcacert
     Natcaenum
     Natjwt
     Ndevice
     Nexceptions
     Niface
     Nlibrary
     Nsha206_api
     Nstatus
     Ntng
     Ntest_device
     Ntest_iface
    diff --git a/namespaces_dup.js b/namespaces_dup.js index 3bf1ef21b..8ee037c49 100644 --- a/namespaces_dup.js +++ b/namespaces_dup.js @@ -1,6 +1,6 @@ var namespaces_dup = [ - [ "cryptoauthlib", "a01451.html", "a01451" ], - [ "test_device", "a01468.html", null ], - [ "test_iface", "a01469.html", null ] + [ "cryptoauthlib", "a01478.html", "a01478" ], + [ "test_device", "a01495.html", null ], + [ "test_iface", "a01496.html", null ] ]; \ No newline at end of file diff --git a/navtreedata.js b/navtreedata.js index 07d383fd2..9728da24b 100644 --- a/navtreedata.js +++ b/navtreedata.js @@ -26,199 +26,206 @@ var NAVTREE = [ [ "CryptoAuthLib", "index.html", [ [ "CryptoAuthLib - Microchip CryptoAuthentication Library", "index.html", "index" ], - [ "License", "a02825.html", null ], - [ "IP Protection with Symmetric Authentication", "a02826.html", [ - [ "User Considerations", "a02826.html#autotoc_md0", null ], - [ "Examples", "a02826.html#autotoc_md1", null ] + [ "License", "a02860.html", null ], + [ "IP Protection with Symmetric Authentication", "a02861.html", [ + [ "User Considerations", "a02861.html#autotoc_md0", null ], + [ "Examples", "a02861.html#autotoc_md1", null ] ] ], - [ "PKCS11 Application Information", "a02827.html", [ - [ "Setting up cryptoauthlib as a PKCS11 Provider for your system (LINUX)", "a02827.html#autotoc_md2", [ - [ "Update libp11 on the system. The version should be at minimum 0.4.10", "a02827.html#autotoc_md3", null ], - [ "Build and Install cryptoauthlib with PKCS11 support", "a02827.html#autotoc_md4", null ], - [ "Configuring the cryptoauthlib PKCS11 library", "a02827.html#autotoc_md5", [ - [ "cryptoauthlib.conf", "a02827.html#autotoc_md6", null ], - [ "slot.conf.tmpl", "a02827.html#autotoc_md7", [ - [ "interface", "a02827.html#autotoc_md8", null ], - [ "freeslots", "a02827.html#autotoc_md9", null ] + [ "PKCS11 Application Information", "a02862.html", [ + [ "Setting up cryptoauthlib as a PKCS11 Provider for your system (LINUX)", "a02862.html#autotoc_md2", [ + [ "Update libp11 on the system. The version should be at minimum 0.4.10", "a02862.html#autotoc_md3", null ], + [ "Build and Install cryptoauthlib with PKCS11 support", "a02862.html#autotoc_md4", null ], + [ "Configuring the cryptoauthlib PKCS11 library", "a02862.html#autotoc_md5", [ + [ "cryptoauthlib.conf", "a02862.html#autotoc_md6", null ], + [ "slot.conf.tmpl", "a02862.html#autotoc_md7", [ + [ "interface", "a02862.html#autotoc_md8", null ], + [ "freeslots", "a02862.html#autotoc_md9", null ] ] ] ] ], - [ "Using p11-kit-proxy", "a02827.html#autotoc_md10", null ], - [ "Without using p11-kit-proxy", "a02827.html#autotoc_md11", null ], - [ "Testing", "a02827.html#autotoc_md12", null ] + [ "Using p11-kit-proxy", "a02862.html#autotoc_md10", null ], + [ "Without using p11-kit-proxy", "a02862.html#autotoc_md11", null ], + [ "Testing", "a02862.html#autotoc_md12", null ] ] ] ] ], - [ "Application Support", "a02828.html", null ], - [ "Secure boot using ATECC608", "a02829.html", [ - [ "Implementation Considerations", "a02829.html#autotoc_md13", null ], - [ "Examples", "a02829.html#autotoc_md14", null ] + [ "Application Support", "a02863.html", null ], + [ "Secure boot using ATECC608", "a02864.html", [ + [ "Implementation Considerations", "a02864.html#autotoc_md13", null ], + [ "Examples", "a02864.html#autotoc_md14", null ] ] ], - [ "Contribution Guidelines", "a02831.html", [ - [ "Cryptoauthlib HAL Architecture", "a01446.html#autotoc_md16", null ], - [ "CryptoAuthLib Supported HAL Layers", "a01446.html#autotoc_md18", [ - [ "Microchip Harmony 3 for all PIC32 & ARM products - Use the Harmony 3 Configurator to generate and configure prjects", "a01446.html#autotoc_md19", null ], - [ "Microchip 8 & 16 bit products - AVR, PIC16/18, PIC24/DSPIC", "a01446.html#autotoc_md20", null ], - [ "OS & RTOS integrations", "a01446.html#autotoc_md21", null ], - [ "Legacy Support - Atmel START for AVR, ARM based processesors (SAM)", "a01446.html#autotoc_md22", null ], - [ "Legacy Support - ASF3 for ARM Cortex-m0 & Cortex-m based processors (SAM)", "a01446.html#autotoc_md23", null ] + [ "Contribution Guidelines", "a02866.html", [ + [ "Cryptoauthlib HAL Architecture", "a01473.html#autotoc_md16", null ], + [ "CryptoAuthLib Supported HAL Layers", "a01473.html#autotoc_md18", [ + [ "Microchip Harmony 3 for all PIC32 & ARM products - Use the Harmony 3 Configurator to generate and configure prjects", "a01473.html#autotoc_md19", null ], + [ "Microchip 8 & 16 bit products - AVR, PIC16/18, PIC24/DSPIC", "a01473.html#autotoc_md20", null ], + [ "OS & RTOS integrations", "a01473.html#autotoc_md21", null ], + [ "Legacy Support - Atmel START for AVR, ARM based processesors (SAM)", "a01473.html#autotoc_md22", null ], + [ "Legacy Support - ASF3 for ARM Cortex-m0 & Cortex-m based processors (SAM)", "a01473.html#autotoc_md23", null ] ] ] ] ], - [ "openssl directory - Purpose", "a02836.html", null ], - [ "Python CryptoAuthLib module", "a02837.html", [ - [ "Introduction", "a02837.html#autotoc_md25", [ - [ "Code Examples", "a02837.html#autotoc_md26", null ] + [ "openssl directory - Purpose", "a02871.html", null ], + [ "atcab", "a02872.html", [ + [ "atcab API reference", "a02872.html#autotoc_md24", null ] + ] ], + [ "Python CryptoAuthLib module", "a02873.html", [ + [ "Introduction", "a02873.html#autotoc_md26", [ + [ "Code Examples", "a02873.html#autotoc_md27", null ] ] ], - [ "Installation", "a02837.html#autotoc_md27", [ - [ "CryptoAuthLib python module can be installed through Python's pip tool:", "a02837.html#autotoc_md28", null ], - [ "To upgrade your installation when new releases are made:", "a02837.html#autotoc_md29", null ], - [ "If you ever need to remove your installation:", "a02837.html#autotoc_md30", null ] + [ "Installation", "a02873.html#autotoc_md28", [ + [ "CryptoAuthLib python module can be installed through Python's pip tool:", "a02873.html#autotoc_md29", null ], + [ "To upgrade your installation when new releases are made:", "a02873.html#autotoc_md30", null ], + [ "If you ever need to remove your installation:", "a02873.html#autotoc_md31", null ] ] ], - [ "What does python CryptoAuthLib package do?", "a02837.html#autotoc_md31", null ], - [ "Supported hardware", "a02837.html#autotoc_md32", null ], - [ "Supported devices", "a02837.html#autotoc_md33", null ], - [ "Using cryptoauthlib python module", "a02837.html#autotoc_md34", null ], - [ "In Summary", "a02837.html#autotoc_md35", [ - [ "Step I: Import the module", "a02837.html#autotoc_md36", null ], - [ "Step II: Initilize the module", "a02837.html#autotoc_md37", null ], - [ "Step III: Use Cryptoauthlib APIs", "a02837.html#autotoc_md38", null ] + [ "What does python CryptoAuthLib package do?", "a02873.html#autotoc_md32", null ], + [ "Supported hardware", "a02873.html#autotoc_md33", null ], + [ "Supported devices", "a02873.html#autotoc_md34", null ], + [ "Using cryptoauthlib python module", "a02873.html#autotoc_md35", null ], + [ "In Summary", "a02873.html#autotoc_md36", [ + [ "Step I: Import the module", "a02873.html#autotoc_md37", null ], + [ "Step II: Initilize the module", "a02873.html#autotoc_md38", null ], + [ "Step III: Use Cryptoauthlib APIs", "a02873.html#autotoc_md39", null ] ] ], - [ "Code portability", "a02837.html#autotoc_md39", null ], - [ "Cryptoauthlib module API documentation", "a02837.html#autotoc_md40", [ - [ "help() command", "a02837.html#autotoc_md41", null ], - [ "dir() command", "a02837.html#autotoc_md42", null ] + [ "Code portability", "a02873.html#autotoc_md40", null ], + [ "Cryptoauthlib module API documentation", "a02873.html#autotoc_md41", [ + [ "help() command", "a02873.html#autotoc_md42", null ], + [ "dir() command", "a02873.html#autotoc_md43", null ] ] ], - [ "Code Examples", "a02837.html#autotoc_md43", null ], - [ "Tests", "a02837.html#autotoc_md44", null ], - [ "Release notes", "a02837.html#autotoc_md45", null ] + [ "Code Examples", "a02873.html#autotoc_md44", null ], + [ "Tests", "a02873.html#autotoc_md45", null ], + [ "Release notes", "a02873.html#autotoc_md46", null ] ] ], - [ "Python CryptoAuthLib Module Testing", "a02838.html", [ - [ "Introduction", "a02838.html#autotoc_md47", [ - [ "Running", "a02838.html#autotoc_md48", null ], - [ "Test options", "a02838.html#autotoc_md49", null ] + [ "Python CryptoAuthLib Module Testing", "a02874.html", [ + [ "Introduction", "a02874.html#autotoc_md48", [ + [ "Running", "a02874.html#autotoc_md49", null ], + [ "Test options", "a02874.html#autotoc_md50", null ] ] ] ] ], - [ "Microchip Cryptoauthlib Release Notes", "a02839.html", [ - [ "Release v3.7.5 (06/26/2024)", "a02839.html#autotoc_md61", [ - [ "New Features", "a02839.html#autotoc_md62", null ], - [ "Fixes", "a02839.html#autotoc_md63", null ], - [ "API Changes", "a02839.html#autotoc_md64", null ] + [ "Microchip Cryptoauthlib Release Notes", "a02875.html", [ + [ "Release v3.7.6 (09/26/2026)", "a02875.html#autotoc_md62", [ + [ "New Features", "a02875.html#autotoc_md63", null ], + [ "Fixes", "a02875.html#autotoc_md64", null ] + ] ], + [ "Release v3.7.5 (06/26/2024)", "a02875.html#autotoc_md65", [ + [ "New Features", "a02875.html#autotoc_md66", null ], + [ "Fixes", "a02875.html#autotoc_md67", null ], + [ "API Changes", "a02875.html#autotoc_md68", null ] ] ], - [ "Release v3.7.4 (03/08/2024)", "a02839.html#autotoc_md65", [ - [ "New Features", "a02839.html#autotoc_md66", null ], - [ "Fixes", "a02839.html#autotoc_md67", null ] + [ "Release v3.7.4 (03/08/2024)", "a02875.html#autotoc_md69", [ + [ "New Features", "a02875.html#autotoc_md70", null ], + [ "Fixes", "a02875.html#autotoc_md71", null ] ] ], - [ "Release v3.7.3 (01/31/2024)", "a02839.html#autotoc_md68", [ - [ "New Features", "a02839.html#autotoc_md69", null ], - [ "Fixes", "a02839.html#autotoc_md70", null ] + [ "Release v3.7.3 (01/31/2024)", "a02875.html#autotoc_md72", [ + [ "New Features", "a02875.html#autotoc_md73", null ], + [ "Fixes", "a02875.html#autotoc_md74", null ] ] ], - [ "Release v3.7.2 (01/19/2024)", "a02839.html#autotoc_md71", [ - [ "New Features", "a02839.html#autotoc_md72", null ], - [ "Fixes", "a02839.html#autotoc_md73", null ], - [ "API Changes", "a02839.html#autotoc_md74", null ] + [ "Release v3.7.2 (01/19/2024)", "a02875.html#autotoc_md75", [ + [ "New Features", "a02875.html#autotoc_md76", null ], + [ "Fixes", "a02875.html#autotoc_md77", null ], + [ "API Changes", "a02875.html#autotoc_md78", null ] ] ], - [ "Release v3.7.1 (12/15/2023)", "a02839.html#autotoc_md75", [ - [ "New Features", "a02839.html#autotoc_md76", null ], - [ "Fixes", "a02839.html#autotoc_md77", null ], - [ "API Changes", "a02839.html#autotoc_md78", null ] + [ "Release v3.7.1 (12/15/2023)", "a02875.html#autotoc_md79", [ + [ "New Features", "a02875.html#autotoc_md80", null ], + [ "Fixes", "a02875.html#autotoc_md81", null ], + [ "API Changes", "a02875.html#autotoc_md82", null ] ] ], - [ "Release v3.7.0 (09/08/2023)", "a02839.html#autotoc_md79", [ - [ "New Features", "a02839.html#autotoc_md80", null ], - [ "Fixes", "a02839.html#autotoc_md81", null ], - [ "API Changes", "a02839.html#autotoc_md82", null ] + [ "Release v3.7.0 (09/08/2023)", "a02875.html#autotoc_md83", [ + [ "New Features", "a02875.html#autotoc_md84", null ], + [ "Fixes", "a02875.html#autotoc_md85", null ], + [ "API Changes", "a02875.html#autotoc_md86", null ] ] ], - [ "Release v3.6.1 (07/14/2023)", "a02839.html#autotoc_md83", [ - [ "New Features", "a02839.html#autotoc_md84", null ], - [ "Fixes", "a02839.html#autotoc_md85", null ] + [ "Release v3.6.1 (07/14/2023)", "a02875.html#autotoc_md87", [ + [ "New Features", "a02875.html#autotoc_md88", null ], + [ "Fixes", "a02875.html#autotoc_md89", null ] ] ], - [ "Release v3.6.0 (04/04/2023)", "a02839.html#autotoc_md86", [ - [ "New Features", "a02839.html#autotoc_md87", null ], - [ "Fixes", "a02839.html#autotoc_md88", null ], - [ "API Changes", "a02839.html#autotoc_md89", null ] + [ "Release v3.6.0 (04/04/2023)", "a02875.html#autotoc_md90", [ + [ "New Features", "a02875.html#autotoc_md91", null ], + [ "Fixes", "a02875.html#autotoc_md92", null ], + [ "API Changes", "a02875.html#autotoc_md93", null ] ] ], - [ "Release v3.5.1 (03/26/2023)", "a02839.html#autotoc_md90", [ - [ "New Features", "a02839.html#autotoc_md91", null ] + [ "Release v3.5.1 (03/26/2023)", "a02875.html#autotoc_md94", [ + [ "New Features", "a02875.html#autotoc_md95", null ] ] ], - [ "Release v3.5.0 (03/14/2023)", "a02839.html#autotoc_md92", [ - [ "New Features", "a02839.html#autotoc_md93", null ] + [ "Release v3.5.0 (03/14/2023)", "a02875.html#autotoc_md96", [ + [ "New Features", "a02875.html#autotoc_md97", null ] ] ], - [ "Release v3.4.3 (12/23/2022)", "a02839.html#autotoc_md94", [ - [ "New Features", "a02839.html#autotoc_md95", null ], - [ "Fixes", "a02839.html#autotoc_md96", null ] + [ "Release v3.4.3 (12/23/2022)", "a02875.html#autotoc_md98", [ + [ "New Features", "a02875.html#autotoc_md99", null ], + [ "Fixes", "a02875.html#autotoc_md100", null ] ] ], - [ "Release v3.4.2 (12/04/2022)", "a02839.html#autotoc_md97", [ - [ "Fixes", "a02839.html#autotoc_md98", null ] + [ "Release v3.4.2 (12/04/2022)", "a02875.html#autotoc_md101", [ + [ "Fixes", "a02875.html#autotoc_md102", null ] ] ], - [ "Release v3.4.1 (11/11/2022)", "a02839.html#autotoc_md99", [ - [ "Fixes", "a02839.html#autotoc_md100", null ] + [ "Release v3.4.1 (11/11/2022)", "a02875.html#autotoc_md103", [ + [ "Fixes", "a02875.html#autotoc_md104", null ] ] ], - [ "Release v3.4.0 (10/27/2022)", "a02839.html#autotoc_md101", [ - [ "New Features", "a02839.html#autotoc_md102", null ], - [ "Fixes", "a02839.html#autotoc_md103", null ] + [ "Release v3.4.0 (10/27/2022)", "a02875.html#autotoc_md105", [ + [ "New Features", "a02875.html#autotoc_md106", null ], + [ "Fixes", "a02875.html#autotoc_md107", null ] ] ], - [ "Release v3.3.3 (10/06/2021)", "a02839.html#autotoc_md104", [ - [ "New features", "a02839.html#autotoc_md105", null ], - [ "Fixes", "a02839.html#autotoc_md106", null ] + [ "Release v3.3.3 (10/06/2021)", "a02875.html#autotoc_md108", [ + [ "New features", "a02875.html#autotoc_md109", null ], + [ "Fixes", "a02875.html#autotoc_md110", null ] ] ], - [ "Release v3.3.2 (06/20/2021)", "a02839.html#autotoc_md107", [ - [ "New features", "a02839.html#autotoc_md108", null ], - [ "Fixes", "a02839.html#autotoc_md109", null ] + [ "Release v3.3.2 (06/20/2021)", "a02875.html#autotoc_md111", [ + [ "New features", "a02875.html#autotoc_md112", null ], + [ "Fixes", "a02875.html#autotoc_md113", null ] ] ], - [ "Release v3.3.1 (04/23/2021)", "a02839.html#autotoc_md110", [ - [ "New features", "a02839.html#autotoc_md111", null ], - [ "Fixes", "a02839.html#autotoc_md112", null ] + [ "Release v3.3.1 (04/23/2021)", "a02875.html#autotoc_md114", [ + [ "New features", "a02875.html#autotoc_md115", null ], + [ "Fixes", "a02875.html#autotoc_md116", null ] ] ], - [ "Release v3.3.0 (01/22/2021)", "a02839.html#autotoc_md113", [ - [ "API Updates", "a02839.html#autotoc_md114", null ], - [ "New features", "a02839.html#autotoc_md115", null ], - [ "Fixes", "a02839.html#autotoc_md116", null ] + [ "Release v3.3.0 (01/22/2021)", "a02875.html#autotoc_md117", [ + [ "API Updates", "a02875.html#autotoc_md118", null ], + [ "New features", "a02875.html#autotoc_md119", null ], + [ "Fixes", "a02875.html#autotoc_md120", null ] ] ], - [ "Release v3.2.5 (11/30/2020)", "a02839.html#autotoc_md117", [ - [ "New features", "a02839.html#autotoc_md118", null ], - [ "Fixes", "a02839.html#autotoc_md119", null ] + [ "Release v3.2.5 (11/30/2020)", "a02875.html#autotoc_md121", [ + [ "New features", "a02875.html#autotoc_md122", null ], + [ "Fixes", "a02875.html#autotoc_md123", null ] ] ], - [ "Release v3.2.4 (10/17/2020)", "a02839.html#autotoc_md120", [ - [ "New features", "a02839.html#autotoc_md121", null ], - [ "Fixes", "a02839.html#autotoc_md122", null ] + [ "Release v3.2.4 (10/17/2020)", "a02875.html#autotoc_md124", [ + [ "New features", "a02875.html#autotoc_md125", null ], + [ "Fixes", "a02875.html#autotoc_md126", null ] ] ], - [ "Release v3.2.3 (09/12/2020)", "a02839.html#autotoc_md123", [ - [ "New features", "a02839.html#autotoc_md124", null ], - [ "Fixes", "a02839.html#autotoc_md125", null ] + [ "Release v3.2.3 (09/12/2020)", "a02875.html#autotoc_md127", [ + [ "New features", "a02875.html#autotoc_md128", null ], + [ "Fixes", "a02875.html#autotoc_md129", null ] ] ], - [ "Release v3.2.2 (07/28/2020)", "a02839.html#autotoc_md126", [ - [ "New Features", "a02839.html#autotoc_md127", null ], - [ "Fixes", "a02839.html#autotoc_md128", null ] + [ "Release v3.2.2 (07/28/2020)", "a02875.html#autotoc_md130", [ + [ "New Features", "a02875.html#autotoc_md131", null ], + [ "Fixes", "a02875.html#autotoc_md132", null ] ] ], - [ "Release v3.2.1 (06/29/2020)", "a02839.html#autotoc_md129", [ - [ "Fixes", "a02839.html#autotoc_md130", null ] + [ "Release v3.2.1 (06/29/2020)", "a02875.html#autotoc_md133", [ + [ "Fixes", "a02875.html#autotoc_md134", null ] ] ], - [ "Release v3.2.0 (06/10/2020)", "a02839.html#autotoc_md131", [ - [ "New features", "a02839.html#autotoc_md132", null ], - [ "Known issues", "a02839.html#autotoc_md133", null ] + [ "Release v3.2.0 (06/10/2020)", "a02875.html#autotoc_md135", [ + [ "New features", "a02875.html#autotoc_md136", null ], + [ "Known issues", "a02875.html#autotoc_md137", null ] ] ], - [ "Release v3.1.1 (03/06/2020)", "a02839.html#autotoc_md134", null ], - [ "Release v3.1.0 (02/05/2020)", "a02839.html#autotoc_md135", null ], - [ "Release 11/22/2019", "a02839.html#autotoc_md136", null ], - [ "Release 08/30/2019", "a02839.html#autotoc_md137", null ], - [ "Release 05/17/2019", "a02839.html#autotoc_md138", null ], - [ "Release 03/04/2019", "a02839.html#autotoc_md139", null ], - [ "Release 01/25/2019", "a02839.html#autotoc_md140", null ], - [ "Release 01/04/2019", "a02839.html#autotoc_md141", null ], - [ "Release 10/25/2018", "a02839.html#autotoc_md142", null ], - [ "Release 08/17/2018", "a02839.html#autotoc_md143", null ], - [ "Release 07/25/2018", "a02839.html#autotoc_md144", null ], - [ "Release 07/18/2018", "a02839.html#autotoc_md145", null ], - [ "Release 03/29/2018", "a02839.html#autotoc_md146", null ], - [ "Release 01/15/2018", "a02839.html#autotoc_md147", null ], - [ "Release 11/22/2017", "a02839.html#autotoc_md148", null ], - [ "Release 11/17/2017", "a02839.html#autotoc_md149", null ], - [ "Release 07/01/2017", "a02839.html#autotoc_md150", null ], - [ "Release 01/08/2016", "a02839.html#autotoc_md151", null ], - [ "Release 9/19/2015", "a02839.html#autotoc_md152", null ] + [ "Release v3.1.1 (03/06/2020)", "a02875.html#autotoc_md138", null ], + [ "Release v3.1.0 (02/05/2020)", "a02875.html#autotoc_md139", null ], + [ "Release 11/22/2019", "a02875.html#autotoc_md140", null ], + [ "Release 08/30/2019", "a02875.html#autotoc_md141", null ], + [ "Release 05/17/2019", "a02875.html#autotoc_md142", null ], + [ "Release 03/04/2019", "a02875.html#autotoc_md143", null ], + [ "Release 01/25/2019", "a02875.html#autotoc_md144", null ], + [ "Release 01/04/2019", "a02875.html#autotoc_md145", null ], + [ "Release 10/25/2018", "a02875.html#autotoc_md146", null ], + [ "Release 08/17/2018", "a02875.html#autotoc_md147", null ], + [ "Release 07/25/2018", "a02875.html#autotoc_md148", null ], + [ "Release 07/18/2018", "a02875.html#autotoc_md149", null ], + [ "Release 03/29/2018", "a02875.html#autotoc_md150", null ], + [ "Release 01/15/2018", "a02875.html#autotoc_md151", null ], + [ "Release 11/22/2017", "a02875.html#autotoc_md152", null ], + [ "Release 11/17/2017", "a02875.html#autotoc_md153", null ], + [ "Release 07/01/2017", "a02875.html#autotoc_md154", null ], + [ "Release 01/08/2016", "a02875.html#autotoc_md155", null ], + [ "Release 9/19/2015", "a02875.html#autotoc_md156", null ] ] ], - [ "Security Policy", "a02840.html", [ - [ "Supported Versions", "a02840.html#autotoc_md154", null ], - [ "Reporting a Vulnerability", "a02840.html#autotoc_md155", null ] + [ "Security Policy", "a02876.html", [ + [ "Supported Versions", "a02876.html#autotoc_md158", null ], + [ "Reporting a Vulnerability", "a02876.html#autotoc_md159", null ] ] ], - [ "Deprecated List", "a01436.html", null ], + [ "Deprecated List", "a01463.html", null ], [ "Modules", "modules.html", "modules" ], [ "Namespaces", "namespaces.html", [ [ "Namespace List", "namespaces.html", "namespaces_dup" ], @@ -255,16 +262,16 @@ var NAVTREE = var NAVTREEINDEX = [ "a00005.html", -"a00350.html#a0f2fc749d3d196477b22cbceee856dfb", -"a00350.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39", -"a00533.html", -"a01439.html#ga0777a86aa412a97b19cc72a12c171b94", -"a01443.html#ga7305906995afb21b494446d84298533b", -"a01449.html#ga98d684683ccecd3d56bdf5dc27ae999c", -"a01453.html#a7e05b319688a07bbfeee23895341303e", -"a01764.html#a44b034625f63afcfaab306ac6275cd5b", -"a02376.html", -"dir_fe677a742bdf73affcb7505b38a59233.html" +"a00356.html#a0e74f12b91b93e683f27fb8b4c0bfb2f", +"a00356.html#aa914251d0e03f7d1850ee04296715f14", +"a00506.html#ace1877f29888c93a210f571fc4eff7ee", +"a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5", +"a01470.html#ga4b6db1523875a2b1453ef5e16989ecd4", +"a01474.html#gad2bbb95a1e12c8167ce68884dcf77a4e", +"a01479.html#af312843ce780c0062f9067c182ad2db6", +"a01771.html#aad7093cf772d6e337b3c09af9cea92ac", +"a02383.html", +"dir_0680cb466dcc0d680630f5d267d4b7d1.html" ]; var SYNCONMSG = 'click to disable panel synchronisation'; diff --git a/navtreeindex0.js b/navtreeindex0.js index 030a5f6de..d0313a8b2 100644 --- a/navtreeindex0.js +++ b/navtreeindex0.js @@ -1,253 +1,253 @@ var NAVTREEINDEX0 = { -"a00005.html":[16,0,0,0,0], -"a00005.html#a094aabc034e66d2a1b3ba9324da79010":[16,0,0,0,0,7], -"a00005.html#a12d6e9c4cc705771788c0640aed7caa2":[16,0,0,0,0,0], -"a00005.html#a1e33c650348129b8d82a8370e38b4c6c":[16,0,0,0,0,3], -"a00005.html#a23714cfbe25ea60f74a48c596ec48a6b":[16,0,0,0,0,12], -"a00005.html#a4415f1d4d84a1ccea935cad493dd5074":[16,0,0,0,0,9], -"a00005.html#a9c9123a2363452de20ceefc9b020aac0":[16,0,0,0,0,4], -"a00005.html#ab97f7ad917c2c3293d211f8aad632a7c":[16,0,0,0,0,10], -"a00005.html#ac28d87cbe843ea3b2b69c5a62b14872f":[16,0,0,0,0,11], -"a00005.html#ac55f2b5842936c908254e755bfe3d0f1":[16,0,0,0,0,6], -"a00005.html#ac87eb13206cd4e43575df8845aa094d9":[16,0,0,0,0,1], -"a00005.html#ac98db9b59f5413e7c10d65e00cbff402":[16,0,0,0,0,8], -"a00005.html#ad2ace3d5e5b19b3ff4347376b5b78d85":[16,0,0,0,0,2], -"a00005.html#afbdb8aef5ee59e66c2e7b28f19edc712":[16,0,0,0,0,5], -"a00008.html":[16,0,0,0,1], -"a00008.html#a094aabc034e66d2a1b3ba9324da79010":[16,0,0,0,1,7], -"a00008.html#a12d6e9c4cc705771788c0640aed7caa2":[16,0,0,0,1,0], -"a00008.html#a1e33c650348129b8d82a8370e38b4c6c":[16,0,0,0,1,3], -"a00008.html#a23714cfbe25ea60f74a48c596ec48a6b":[16,0,0,0,1,12], -"a00008.html#a4415f1d4d84a1ccea935cad493dd5074":[16,0,0,0,1,9], -"a00008.html#a9c9123a2363452de20ceefc9b020aac0":[16,0,0,0,1,4], -"a00008.html#ab97f7ad917c2c3293d211f8aad632a7c":[16,0,0,0,1,10], -"a00008.html#ac28d87cbe843ea3b2b69c5a62b14872f":[16,0,0,0,1,11], -"a00008.html#ac55f2b5842936c908254e755bfe3d0f1":[16,0,0,0,1,6], -"a00008.html#ac87eb13206cd4e43575df8845aa094d9":[16,0,0,0,1,1], -"a00008.html#ac98db9b59f5413e7c10d65e00cbff402":[16,0,0,0,1,8], -"a00008.html#ad2ace3d5e5b19b3ff4347376b5b78d85":[16,0,0,0,1,2], -"a00008.html#afbdb8aef5ee59e66c2e7b28f19edc712":[16,0,0,0,1,5], -"a00011.html":[16,0,0,1,0], -"a00011.html#a9a41d1600ffd22de067ded50447d359b":[16,0,0,1,0,0], -"a00014.html":[16,0,0,1,1], -"a00014.html#a9a41d1600ffd22de067ded50447d359b":[16,0,0,1,1,0], -"a00017.html":[16,0,0,2,0], -"a00017.html#a2067eeb11f190a7fb64217f917c3ff76":[16,0,0,2,0,4], -"a00017.html#a9dcff757a8d30cec3b1e209351b16358":[16,0,0,2,0,1], -"a00017.html#ac00c465f600b5dd1dcb85eddff61d93a":[16,0,0,2,0,3], -"a00017.html#ac2fa4cf8af951688c4be97cca0d23b71":[16,0,0,2,0,5], -"a00017.html#ac6f6e7798cc371e9667889cbbb4af330":[16,0,0,2,0,0], -"a00017.html#ac79cbb36e6f0efe9196fa9131ccdb69b":[16,0,0,2,0,2], -"a00020.html":[16,0,0,2,1], -"a00020.html#a2067eeb11f190a7fb64217f917c3ff76":[16,0,0,2,1,8], -"a00020.html#a5ef47c1942cca10be5c5bf17841c8611":[16,0,0,2,1,2], -"a00020.html#a9dcff757a8d30cec3b1e209351b16358":[16,0,0,2,1,5], -"a00020.html#abe18de5c585f639142a5bf7c253e5b7f":[16,0,0,2,1,3], -"a00020.html#ac00c465f600b5dd1dcb85eddff61d93a":[16,0,0,2,1,7], -"a00020.html#ac2fa4cf8af951688c4be97cca0d23b71":[16,0,0,2,1,9], -"a00020.html#ac6f6e7798cc371e9667889cbbb4af330":[16,0,0,2,1,4], -"a00020.html#ac79cbb36e6f0efe9196fa9131ccdb69b":[16,0,0,2,1,6], -"a00038.html":[16,0,0,3,0], -"a00041.html":[16,0,0,4,0], -"a00044.html":[16,0,0,4,1], -"a00044.html#a861a785461af4116bca9343019225abd":[16,0,0,4,1,1], -"a00044.html#af086e6ea3beaf8711ec855ff7dce40b1":[16,0,0,4,1,0], -"a00047.html":[16,0,0,4,2], -"a00047.html#a861a785461af4116bca9343019225abd":[16,0,0,4,2,3], -"a00047.html#af086e6ea3beaf8711ec855ff7dce40b1":[16,0,0,4,2,2], -"a00050.html":[16,0,0,4,3], -"a00056.html":[16,0,0,5,0], -"a00059.html":[16,0,0,5,1], -"a00062.html":[16,0,0,5,2], -"a00065.html":[16,0,0,5,3], -"a00068.html":[16,0,0,5,4], -"a00068.html#a01bf19754baee6ce82ec46f966528262":[16,0,0,5,4,0], -"a00068.html#a22c7ea083197410f396d18fa808e8e0c":[16,0,0,5,4,3], -"a00068.html#a31cf63afba3c936d279a325d71691a68":[16,0,0,5,4,5], -"a00068.html#a82d3c529ed81119a956957052c06e8d7":[16,0,0,5,4,4], -"a00068.html#a857aacbb70f2ea18411f1ca478a0e37f":[16,0,0,5,4,2], -"a00068.html#a8cd0d450da1bf23d0f6784446d35c556":[16,0,0,5,4,7], -"a00068.html#aa3a0387ff2a71684a2992d4661c53331":[16,0,0,5,4,6], -"a00068.html#aa4c31ab35807d8ed51fbecc48866aa04":[16,0,0,5,4,8], -"a00071.html":[16,0,0,5,5], -"a00074.html":[16,0,0,5,6], -"a00077.html":[16,0,0,5,7], -"a00080.html":[16,0,0,5,8], -"a00083.html":[16,0,0,5,9], -"a00086.html":[16,0,0,5,10], -"a00089.html":[16,0,0,5,11], -"a00092.html":[16,0,0,5,12], -"a00095.html":[16,0,0,5,13], -"a00098.html":[16,0,0,5,14], -"a00101.html":[16,0,0,5,15], -"a00104.html":[16,0,0,5,16], -"a00107.html":[16,0,0,5,17], -"a00110.html":[16,0,0,5,18], -"a00113.html":[16,0,0,5,19], -"a00119.html":[16,0,0,6,0], -"a00122.html":[16,0,0,6,1], -"a00128.html":[16,0,0,6,2], -"a00128.html#a76a6ac477f6341e80284c76c38b532ff":[16,0,0,6,2,0], -"a00131.html":[16,0,0,6,3], -"a00131.html#a76a6ac477f6341e80284c76c38b532ff":[16,0,0,6,3,0], -"a00221.html":[16,0,1,10], -"a00224.html":[16,0,1,11], -"a00227.html":[16,0,1,12], -"a00230.html":[16,0,1,13], -"a00233.html":[16,0,1,14], -"a00233.html#a6e61b3a07893501c121343edf3bfcbd8":[16,0,1,14,0], -"a00239.html":[16,0,1,16], -"a00245.html":[16,0,1,17], -"a00248.html":[16,0,1,18], -"a00251.html":[16,0,1,20], -"a00251.html#a04fefe2ff5a7d2e937b2634acd22982a":[16,0,1,20,13], -"a00251.html#a13a4675d782c861977b653e3c2b354ba":[16,0,1,20,20], -"a00251.html#a21594322838322aac744aaf655d77ec8":[16,0,1,20,18], -"a00251.html#a39003da4dc8a0b8999f1325c2f96f641":[16,0,1,20,17], -"a00251.html#a3aa141525a1141f1a290e2a996da0c9c":[16,0,1,20,2], -"a00251.html#a40b70cfab865fa4fd9a5e7a29ca59d38":[16,0,1,20,5], -"a00251.html#a481179181349c801c16fc1ab698f2f24":[16,0,1,20,6], -"a00251.html#a55ba8a1787f69d44d6e40db041fbd786":[16,0,1,20,1], -"a00251.html#a592c23e94097ad5e212beb6390aa88c6":[16,0,1,20,10], -"a00251.html#a6073c5a05e0ad2e738f460e727014553":[16,0,1,20,0], -"a00251.html#a72f385a8eafc464a05acfa54561fed63":[16,0,1,20,8], -"a00251.html#a7371f490659b6fd68739d2b1fee50696":[16,0,1,20,9], -"a00251.html#a78abefc293c0a04d8ef649c94c8a1057":[16,0,1,20,16], -"a00251.html#a7a929bf65cbc777bab7e533a2755cfad":[16,0,1,20,14], -"a00251.html#ab7ca9ee391118aafe6f3cf7df4fa5de3":[16,0,1,20,15], -"a00251.html#ac37b319dabc5b9492a422f6d3d4e118b":[16,0,1,20,7], -"a00251.html#ac873a37c53fdd922d5b36efd737e3ec3":[16,0,1,20,11], -"a00251.html#ad017ae33af5a7ea062cea7d54de675a8":[16,0,1,20,21], -"a00251.html#ad10d15454308230fbef54bdd43001ed2":[16,0,1,20,12], -"a00251.html#ada3308b30b1b1e40abb806dbc5476648":[16,0,1,20,19], -"a00251.html#aeeff0177acf29e6e7b134a14d7119d69":[16,0,1,20,3], -"a00254.html":[16,0,1,21], -"a00257.html":[16,0,1,23], -"a00257.html#af3f726014b044194def151079f1f2d89":[16,0,1,23,22], -"a00260.html":[16,0,1,24], -"a00260.html#a21594322838322aac744aaf655d77ec8":[16,0,1,24,0], -"a00263.html":[16,0,1,25], -"a00263.html#a149bb02116700288df316d5ab391f5d3":[16,0,1,25,30], -"a00263.html#a22c74ba87b45d105867f93c97b6dbe04":[16,0,1,25,3], -"a00263.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5":[16,0,1,25,9], -"a00263.html#a2fefd4147dcde6662dc2bae6adb61237":[16,0,1,25,15], -"a00263.html#a3319805e96477b7b89da0f4a69ef1a83":[16,0,1,25,25], -"a00263.html#a3d393762ff34c052e12509e79d54415f":[16,0,1,25,2], -"a00263.html#a4dbc1891be5e77d93690554e7bb2aa8d":[16,0,1,25,33], -"a00263.html#a54b00d87ad3367d281df208661352063":[16,0,1,25,16], -"a00263.html#a652c8fbaca046330679929610433b987":[16,0,1,25,12], -"a00263.html#a6a0c600725ed81640f2e39c88c864e1c":[16,0,1,25,20], -"a00263.html#a6c467c51b23ea961e1aabd6e98644d47":[16,0,1,25,17], -"a00263.html#a796b7e7bc096ae19c65b701d87b8718f":[16,0,1,25,34], -"a00263.html#a7b4c194a6a86ffadc703b841280778c3":[16,0,1,25,31], -"a00263.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3":[16,0,1,25,14], -"a00263.html#a884d88ac0c809d0801ca4dbe24dac986":[16,0,1,25,26], -"a00263.html#a889853cfab2a19aa22c00d0d19c87bcc":[16,0,1,25,6], -"a00263.html#a8aa6f2e22841fba09b78262c9ce7a728":[16,0,1,25,19], -"a00263.html#a90fced83678233feeb83da9e73579484":[16,0,1,25,11], -"a00263.html#a9198f13b90df739a1ca20f101beccfbb":[16,0,1,25,23], -"a00263.html#a962730477dba3c48a84629c23a0e4a13":[16,0,1,25,7], -"a00263.html#a9fd83db4807d846db39ffe92925dc939":[16,0,1,25,10], -"a00263.html#aa17bd20787fa8dcde44983f25c00d80b":[16,0,1,25,0], -"a00263.html#aa1cd2b6470db000dd151f2a092f41edf":[16,0,1,25,8], -"a00263.html#ab132d69c7f94de708ffef02b6dc69d27":[16,0,1,25,27], -"a00263.html#ab1a2ea3166875b26f91e82767d6e3e1a":[16,0,1,25,22], -"a00263.html#ab5bbd989a822d35a59c9eb6258bf26fc":[16,0,1,25,21], -"a00263.html#abb19bd83c35f7194c30e913a3d4b4137":[16,0,1,25,1], -"a00263.html#ace96e4c864044972f87aef44e8d106ec":[16,0,1,25,13], -"a00263.html#ad4cd022abf0e71d3605a9fc18e8a1ea6":[16,0,1,25,29], -"a00263.html#ad80a997b8786774af268692c936f90d9":[16,0,1,25,32], -"a00263.html#ad878d8797ca33784da8e968cbf17a722":[16,0,1,25,24], -"a00263.html#ae9dd0fe8e48163ddf047629aeb8820e6":[16,0,1,25,5], -"a00263.html#aef8e0056fbad0bd33fcb2213b2f3ae49":[16,0,1,25,18], -"a00263.html#afb58269e38e4025d4e6620c4d1202ee4":[16,0,1,25,35], -"a00263.html#afc6b7767c53326f3520ec83ac02df679":[16,0,1,25,28], -"a00263.html#afe80ac4fce5d1f8edd75a218362779ec":[16,0,1,25,4], -"a00266.html":[16,0,1,26], -"a00269.html":[16,0,1,27], -"a00272.html":[16,0,1,0,0], -"a00275.html":[16,0,1,0,1], -"a00278.html":[16,0,1,0,2], -"a00281.html":[16,0,1,0,3], -"a00284.html":[16,0,1,0,4], -"a00287.html":[16,0,1,0,5], -"a00290.html":[16,0,1,0,6], -"a00293.html":[16,0,1,0,7], -"a00296.html":[16,0,1,0,8], -"a00299.html":[16,0,1,0,9], -"a00302.html":[16,0,1,0,10], -"a00305.html":[16,0,1,0,11], -"a00308.html":[16,0,1,0,12], -"a00311.html":[16,0,1,0,13], -"a00314.html":[16,0,1,0,14], -"a00317.html":[16,0,1,0,15], -"a00317.html#a206c4857a73ccfc7898131b61d43ba67":[16,0,1,0,15,4], -"a00317.html#a32d4e4f417e88b56b9adc5b7c521d545":[16,0,1,0,15,0], -"a00317.html#a5ee7c8e3893e67ae0a622bddc443bcbd":[16,0,1,0,15,1], -"a00317.html#a65ca7cd1f2358ad40ae4c8c13f6d817c":[16,0,1,0,15,3], -"a00317.html#ad3b6773201632141bbc95ca6d43271f9":[16,0,1,0,15,5], -"a00317.html#adfccc0bc91b144dffab3aba96126800f":[16,0,1,0,15,2], -"a00320.html":[16,0,1,28], -"a00320.html#a0890ecff5c568d7ee2d631bd3877fcc6":[16,0,1,28,3], -"a00320.html#a546b07423022359a8b27fcbeadfdd93d":[16,0,1,28,2], -"a00320.html#a923fdd71f9a98e47040d26acb74a0202":[16,0,1,28,0], -"a00320.html#acc0d724d5fc815cc98dea12aa5bb15d0":[16,0,1,28,1], -"a00320.html#af8a1f17b5af51c3539246d03282206a2":[16,0,1,28,4], -"a00323.html":[16,0,1,29], -"a00323.html#a0890ecff5c568d7ee2d631bd3877fcc6":[16,0,1,29,4], -"a00323.html#a546b07423022359a8b27fcbeadfdd93d":[16,0,1,29,3], -"a00323.html#a923fdd71f9a98e47040d26acb74a0202":[16,0,1,29,1], -"a00323.html#acc0d724d5fc815cc98dea12aa5bb15d0":[16,0,1,29,2], -"a00323.html#af8a1f17b5af51c3539246d03282206a2":[16,0,1,29,5], -"a00326.html":[16,0,1,30], -"a00329.html":[16,0,1,1,0], -"a00332.html":[16,0,1,1,1], -"a00335.html":[16,0,1,1,2], -"a00338.html":[16,0,1,1,3], -"a00344.html":[16,0,1,1,4], -"a00347.html":[16,0,1,1,5], -"a00347.html#a53ded4ed630b6ef4d292056c2e6b34f6":[16,0,1,1,5,2], -"a00347.html#a640d3cfd0f5b41f50cea0b987094d8a1":[16,0,1,1,5,3], -"a00347.html#a7723a58d1781b3ba54e8f45d5729b33a":[16,0,1,1,5,1], -"a00347.html#aae5866a78d2f0464b04eee9ef1f97030":[16,0,1,1,5,5], -"a00347.html#ae41108996848638519849163e51cd10a":[16,0,1,1,5,7], -"a00347.html#ae82dca54cc3fd1cc2f1671e98d64df07":[16,0,1,1,5,4], -"a00347.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8":[16,0,1,1,5,6], -"a00347.html#aff659b1042abf6e1376e38ccb4a20f3e":[16,0,1,1,5,0], -"a00350.html":[16,0,1,1,6], -"a00350.html#a01cd269d08661e645b4caee850424130":[16,0,1,1,6,5], -"a00350.html#a01d7437a14fd35ccc926168fb4ca2ca7":[16,0,1,1,6,346], -"a00350.html#a023880ad2167cc0d6cefb7f747b73c92":[16,0,1,1,6,383], -"a00350.html#a027d5e8ae4a55db4ae52a41f3214c861":[16,0,1,1,6,198], -"a00350.html#a02f20fbee84fe680d94b94a2b2828040":[16,0,1,1,6,371], -"a00350.html#a03e556ba7849f28ee8c58df8921cba66":[16,0,1,1,6,168], -"a00350.html#a041cfaec382d0a67dcfe36d43332da48":[16,0,1,1,6,317], -"a00350.html#a041d4cd845319ea0a693a1c4008b2a06":[16,0,1,1,6,173], -"a00350.html#a0543a644422ffc7460eeeb78799bde16":[16,0,1,1,6,172], -"a00350.html#a05c0e401be347897d9573ba58492e570":[16,0,1,1,6,238], -"a00350.html#a05ece414a0596ec9bb75c0ca8ca731dc":[16,0,1,1,6,364], -"a00350.html#a06c1c02df3023d78b6b224060966460f":[16,0,1,1,6,46], -"a00350.html#a07089e8e8b1aa335ddfd37e591f64ebb":[16,0,1,1,6,71], -"a00350.html#a071a95b4b2048e0d879e6e13984e38fd":[16,0,1,1,6,286], -"a00350.html#a07289de41178ecfb6392da31e31e27c3":[16,0,1,1,6,159], -"a00350.html#a08326ee33be4faaec3be800e80c1cc17":[16,0,1,1,6,180], -"a00350.html#a08e8a80be2717ece7c5ed5cc0a27fbab":[16,0,1,1,6,171], -"a00350.html#a090c04fed9d153a97fb77195c7eb2f56":[16,0,1,1,6,65], -"a00350.html#a09ab7fb893534775d506020643820939":[16,0,1,1,6,28], -"a00350.html#a09b26b691e29966bcec1513edf819efe":[16,0,1,1,6,105], -"a00350.html#a09e4830c78dedfa2ce662e0fdbe430e3":[16,0,1,1,6,197], -"a00350.html#a0aac7fbfd425112b4b1e922876532a9e":[16,0,1,1,6,37], -"a00350.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799":[16,0,1,1,6,389], -"a00350.html#a0b47a5e9928b7f3c91db64a9b80fde8b":[16,0,1,1,6,220], -"a00350.html#a0b7d56888416e08f1ff67252072e3cea":[16,0,1,1,6,393], -"a00350.html#a0b96c7eee244d44c648245421745db12":[16,0,1,1,6,42], -"a00350.html#a0bd9324a824410d7787c6fcd6e29d8a2":[16,0,1,1,6,261], -"a00350.html#a0be09b502137446daedc43f1d3e85f86":[16,0,1,1,6,75], -"a00350.html#a0c667e3f6590ac12726cbf4ad2b0f4f5":[16,0,1,1,6,201], -"a00350.html#a0c738f2cc7bf063582c34188f85ddc3c":[16,0,1,1,6,81], -"a00350.html#a0c9c951895abf02992e41c617702c2ea":[16,0,1,1,6,341], -"a00350.html#a0e74f12b91b93e683f27fb8b4c0bfb2f":[16,0,1,1,6,50], -"a00350.html#a0e98e55c91c7559f57fdef4c9969c188":[16,0,1,1,6,361], -"a00350.html#a0f2c0b2e264a88b766811fe4ea0de88f":[16,0,1,1,6,100] +"a00005.html":[17,0,0,0,0], +"a00005.html#a094aabc034e66d2a1b3ba9324da79010":[17,0,0,0,0,7], +"a00005.html#a12d6e9c4cc705771788c0640aed7caa2":[17,0,0,0,0,0], +"a00005.html#a1e33c650348129b8d82a8370e38b4c6c":[17,0,0,0,0,3], +"a00005.html#a23714cfbe25ea60f74a48c596ec48a6b":[17,0,0,0,0,12], +"a00005.html#a4415f1d4d84a1ccea935cad493dd5074":[17,0,0,0,0,9], +"a00005.html#a9c9123a2363452de20ceefc9b020aac0":[17,0,0,0,0,4], +"a00005.html#ab97f7ad917c2c3293d211f8aad632a7c":[17,0,0,0,0,10], +"a00005.html#ac28d87cbe843ea3b2b69c5a62b14872f":[17,0,0,0,0,11], +"a00005.html#ac55f2b5842936c908254e755bfe3d0f1":[17,0,0,0,0,6], +"a00005.html#ac87eb13206cd4e43575df8845aa094d9":[17,0,0,0,0,1], +"a00005.html#ac98db9b59f5413e7c10d65e00cbff402":[17,0,0,0,0,8], +"a00005.html#ad2ace3d5e5b19b3ff4347376b5b78d85":[17,0,0,0,0,2], +"a00005.html#afbdb8aef5ee59e66c2e7b28f19edc712":[17,0,0,0,0,5], +"a00008.html":[17,0,0,0,1], +"a00008.html#a094aabc034e66d2a1b3ba9324da79010":[17,0,0,0,1,7], +"a00008.html#a12d6e9c4cc705771788c0640aed7caa2":[17,0,0,0,1,0], +"a00008.html#a1e33c650348129b8d82a8370e38b4c6c":[17,0,0,0,1,3], +"a00008.html#a23714cfbe25ea60f74a48c596ec48a6b":[17,0,0,0,1,12], +"a00008.html#a4415f1d4d84a1ccea935cad493dd5074":[17,0,0,0,1,9], +"a00008.html#a9c9123a2363452de20ceefc9b020aac0":[17,0,0,0,1,4], +"a00008.html#ab97f7ad917c2c3293d211f8aad632a7c":[17,0,0,0,1,10], +"a00008.html#ac28d87cbe843ea3b2b69c5a62b14872f":[17,0,0,0,1,11], +"a00008.html#ac55f2b5842936c908254e755bfe3d0f1":[17,0,0,0,1,6], +"a00008.html#ac87eb13206cd4e43575df8845aa094d9":[17,0,0,0,1,1], +"a00008.html#ac98db9b59f5413e7c10d65e00cbff402":[17,0,0,0,1,8], +"a00008.html#ad2ace3d5e5b19b3ff4347376b5b78d85":[17,0,0,0,1,2], +"a00008.html#afbdb8aef5ee59e66c2e7b28f19edc712":[17,0,0,0,1,5], +"a00011.html":[17,0,0,1,0], +"a00011.html#a9a41d1600ffd22de067ded50447d359b":[17,0,0,1,0,0], +"a00014.html":[17,0,0,1,1], +"a00014.html#a9a41d1600ffd22de067ded50447d359b":[17,0,0,1,1,0], +"a00017.html":[17,0,0,2,0], +"a00017.html#a2067eeb11f190a7fb64217f917c3ff76":[17,0,0,2,0,4], +"a00017.html#a9dcff757a8d30cec3b1e209351b16358":[17,0,0,2,0,1], +"a00017.html#ac00c465f600b5dd1dcb85eddff61d93a":[17,0,0,2,0,3], +"a00017.html#ac2fa4cf8af951688c4be97cca0d23b71":[17,0,0,2,0,5], +"a00017.html#ac6f6e7798cc371e9667889cbbb4af330":[17,0,0,2,0,0], +"a00017.html#ac79cbb36e6f0efe9196fa9131ccdb69b":[17,0,0,2,0,2], +"a00020.html":[17,0,0,2,1], +"a00020.html#a2067eeb11f190a7fb64217f917c3ff76":[17,0,0,2,1,8], +"a00020.html#a5ef47c1942cca10be5c5bf17841c8611":[17,0,0,2,1,2], +"a00020.html#a9dcff757a8d30cec3b1e209351b16358":[17,0,0,2,1,5], +"a00020.html#abe18de5c585f639142a5bf7c253e5b7f":[17,0,0,2,1,3], +"a00020.html#ac00c465f600b5dd1dcb85eddff61d93a":[17,0,0,2,1,7], +"a00020.html#ac2fa4cf8af951688c4be97cca0d23b71":[17,0,0,2,1,9], +"a00020.html#ac6f6e7798cc371e9667889cbbb4af330":[17,0,0,2,1,4], +"a00020.html#ac79cbb36e6f0efe9196fa9131ccdb69b":[17,0,0,2,1,6], +"a00038.html":[17,0,0,3,0], +"a00041.html":[17,0,0,4,0], +"a00044.html":[17,0,0,4,1], +"a00044.html#a861a785461af4116bca9343019225abd":[17,0,0,4,1,1], +"a00044.html#af086e6ea3beaf8711ec855ff7dce40b1":[17,0,0,4,1,0], +"a00047.html":[17,0,0,4,2], +"a00047.html#a861a785461af4116bca9343019225abd":[17,0,0,4,2,3], +"a00047.html#af086e6ea3beaf8711ec855ff7dce40b1":[17,0,0,4,2,2], +"a00050.html":[17,0,0,4,3], +"a00056.html":[17,0,0,5,0], +"a00059.html":[17,0,0,5,1], +"a00062.html":[17,0,0,5,2], +"a00065.html":[17,0,0,5,3], +"a00068.html":[17,0,0,5,4], +"a00068.html#a01bf19754baee6ce82ec46f966528262":[17,0,0,5,4,0], +"a00068.html#a22c7ea083197410f396d18fa808e8e0c":[17,0,0,5,4,3], +"a00068.html#a31cf63afba3c936d279a325d71691a68":[17,0,0,5,4,5], +"a00068.html#a82d3c529ed81119a956957052c06e8d7":[17,0,0,5,4,4], +"a00068.html#a857aacbb70f2ea18411f1ca478a0e37f":[17,0,0,5,4,2], +"a00068.html#a8cd0d450da1bf23d0f6784446d35c556":[17,0,0,5,4,7], +"a00068.html#aa3a0387ff2a71684a2992d4661c53331":[17,0,0,5,4,6], +"a00068.html#aa4c31ab35807d8ed51fbecc48866aa04":[17,0,0,5,4,8], +"a00071.html":[17,0,0,5,5], +"a00074.html":[17,0,0,5,6], +"a00077.html":[17,0,0,5,7], +"a00080.html":[17,0,0,5,8], +"a00083.html":[17,0,0,5,9], +"a00086.html":[17,0,0,5,10], +"a00089.html":[17,0,0,5,11], +"a00092.html":[17,0,0,5,12], +"a00095.html":[17,0,0,5,13], +"a00098.html":[17,0,0,5,14], +"a00101.html":[17,0,0,5,15], +"a00104.html":[17,0,0,5,16], +"a00107.html":[17,0,0,5,17], +"a00110.html":[17,0,0,5,18], +"a00113.html":[17,0,0,5,19], +"a00116.html":[17,0,0,6,0], +"a00119.html":[17,0,0,6,1], +"a00128.html":[17,0,0,6,2], +"a00128.html#a76a6ac477f6341e80284c76c38b532ff":[17,0,0,6,2,0], +"a00128.html#a9d37502a45846eb04ff3a0824242a99d":[17,0,0,6,2,1], +"a00131.html":[17,0,0,6,3], +"a00131.html#a76a6ac477f6341e80284c76c38b532ff":[17,0,0,6,3,0], +"a00131.html#a9d37502a45846eb04ff3a0824242a99d":[17,0,0,6,3,1], +"a00227.html":[17,0,1,10], +"a00230.html":[17,0,1,11], +"a00233.html":[17,0,1,12], +"a00236.html":[17,0,1,13], +"a00239.html":[17,0,1,14], +"a00239.html#a6e61b3a07893501c121343edf3bfcbd8":[17,0,1,14,0], +"a00245.html":[17,0,1,16], +"a00251.html":[17,0,1,17], +"a00254.html":[17,0,1,18], +"a00257.html":[17,0,1,20], +"a00257.html#a04fefe2ff5a7d2e937b2634acd22982a":[17,0,1,20,13], +"a00257.html#a13a4675d782c861977b653e3c2b354ba":[17,0,1,20,20], +"a00257.html#a21594322838322aac744aaf655d77ec8":[17,0,1,20,18], +"a00257.html#a39003da4dc8a0b8999f1325c2f96f641":[17,0,1,20,17], +"a00257.html#a3aa141525a1141f1a290e2a996da0c9c":[17,0,1,20,2], +"a00257.html#a40b70cfab865fa4fd9a5e7a29ca59d38":[17,0,1,20,5], +"a00257.html#a481179181349c801c16fc1ab698f2f24":[17,0,1,20,6], +"a00257.html#a55ba8a1787f69d44d6e40db041fbd786":[17,0,1,20,1], +"a00257.html#a592c23e94097ad5e212beb6390aa88c6":[17,0,1,20,10], +"a00257.html#a6073c5a05e0ad2e738f460e727014553":[17,0,1,20,0], +"a00257.html#a72f385a8eafc464a05acfa54561fed63":[17,0,1,20,8], +"a00257.html#a7371f490659b6fd68739d2b1fee50696":[17,0,1,20,9], +"a00257.html#a78abefc293c0a04d8ef649c94c8a1057":[17,0,1,20,16], +"a00257.html#a7a929bf65cbc777bab7e533a2755cfad":[17,0,1,20,14], +"a00257.html#ab7ca9ee391118aafe6f3cf7df4fa5de3":[17,0,1,20,15], +"a00257.html#ac37b319dabc5b9492a422f6d3d4e118b":[17,0,1,20,7], +"a00257.html#ac873a37c53fdd922d5b36efd737e3ec3":[17,0,1,20,11], +"a00257.html#ad017ae33af5a7ea062cea7d54de675a8":[17,0,1,20,21], +"a00257.html#ad10d15454308230fbef54bdd43001ed2":[17,0,1,20,12], +"a00257.html#ada3308b30b1b1e40abb806dbc5476648":[17,0,1,20,19], +"a00257.html#ae31a9fd8e9deca79aa5fef0292fe5272":[17,0,1,20,4], +"a00257.html#aeeff0177acf29e6e7b134a14d7119d69":[17,0,1,20,3], +"a00260.html":[17,0,1,21], +"a00263.html":[17,0,1,23], +"a00263.html#af3f726014b044194def151079f1f2d89":[17,0,1,23,22], +"a00266.html":[17,0,1,24], +"a00266.html#a21594322838322aac744aaf655d77ec8":[17,0,1,24,0], +"a00269.html":[17,0,1,25], +"a00269.html#a149bb02116700288df316d5ab391f5d3":[17,0,1,25,30], +"a00269.html#a22c74ba87b45d105867f93c97b6dbe04":[17,0,1,25,3], +"a00269.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5":[17,0,1,25,9], +"a00269.html#a2fefd4147dcde6662dc2bae6adb61237":[17,0,1,25,15], +"a00269.html#a3319805e96477b7b89da0f4a69ef1a83":[17,0,1,25,25], +"a00269.html#a3d393762ff34c052e12509e79d54415f":[17,0,1,25,2], +"a00269.html#a4dbc1891be5e77d93690554e7bb2aa8d":[17,0,1,25,33], +"a00269.html#a54b00d87ad3367d281df208661352063":[17,0,1,25,16], +"a00269.html#a652c8fbaca046330679929610433b987":[17,0,1,25,12], +"a00269.html#a6a0c600725ed81640f2e39c88c864e1c":[17,0,1,25,20], +"a00269.html#a6c467c51b23ea961e1aabd6e98644d47":[17,0,1,25,17], +"a00269.html#a796b7e7bc096ae19c65b701d87b8718f":[17,0,1,25,34], +"a00269.html#a7b4c194a6a86ffadc703b841280778c3":[17,0,1,25,31], +"a00269.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3":[17,0,1,25,14], +"a00269.html#a884d88ac0c809d0801ca4dbe24dac986":[17,0,1,25,26], +"a00269.html#a889853cfab2a19aa22c00d0d19c87bcc":[17,0,1,25,6], +"a00269.html#a8aa6f2e22841fba09b78262c9ce7a728":[17,0,1,25,19], +"a00269.html#a90fced83678233feeb83da9e73579484":[17,0,1,25,11], +"a00269.html#a9198f13b90df739a1ca20f101beccfbb":[17,0,1,25,23], +"a00269.html#a962730477dba3c48a84629c23a0e4a13":[17,0,1,25,7], +"a00269.html#a9fd83db4807d846db39ffe92925dc939":[17,0,1,25,10], +"a00269.html#aa17bd20787fa8dcde44983f25c00d80b":[17,0,1,25,0], +"a00269.html#aa1cd2b6470db000dd151f2a092f41edf":[17,0,1,25,8], +"a00269.html#ab132d69c7f94de708ffef02b6dc69d27":[17,0,1,25,27], +"a00269.html#ab1a2ea3166875b26f91e82767d6e3e1a":[17,0,1,25,22], +"a00269.html#ab5bbd989a822d35a59c9eb6258bf26fc":[17,0,1,25,21], +"a00269.html#abb19bd83c35f7194c30e913a3d4b4137":[17,0,1,25,1], +"a00269.html#ace96e4c864044972f87aef44e8d106ec":[17,0,1,25,13], +"a00269.html#ad4cd022abf0e71d3605a9fc18e8a1ea6":[17,0,1,25,29], +"a00269.html#ad80a997b8786774af268692c936f90d9":[17,0,1,25,32], +"a00269.html#ad878d8797ca33784da8e968cbf17a722":[17,0,1,25,24], +"a00269.html#ae9dd0fe8e48163ddf047629aeb8820e6":[17,0,1,25,5], +"a00269.html#aef8e0056fbad0bd33fcb2213b2f3ae49":[17,0,1,25,18], +"a00269.html#afb58269e38e4025d4e6620c4d1202ee4":[17,0,1,25,35], +"a00269.html#afc6b7767c53326f3520ec83ac02df679":[17,0,1,25,28], +"a00269.html#afe80ac4fce5d1f8edd75a218362779ec":[17,0,1,25,4], +"a00272.html":[17,0,1,26], +"a00275.html":[17,0,1,27], +"a00278.html":[17,0,1,0,0], +"a00281.html":[17,0,1,0,1], +"a00284.html":[17,0,1,0,2], +"a00287.html":[17,0,1,0,3], +"a00290.html":[17,0,1,0,4], +"a00293.html":[17,0,1,0,5], +"a00296.html":[17,0,1,0,6], +"a00299.html":[17,0,1,0,7], +"a00302.html":[17,0,1,0,8], +"a00305.html":[17,0,1,0,9], +"a00308.html":[17,0,1,0,10], +"a00311.html":[17,0,1,0,11], +"a00314.html":[17,0,1,0,12], +"a00317.html":[17,0,1,0,13], +"a00320.html":[17,0,1,0,14], +"a00323.html":[17,0,1,0,15], +"a00323.html#a206c4857a73ccfc7898131b61d43ba67":[17,0,1,0,15,4], +"a00323.html#a32d4e4f417e88b56b9adc5b7c521d545":[17,0,1,0,15,0], +"a00323.html#a5ee7c8e3893e67ae0a622bddc443bcbd":[17,0,1,0,15,1], +"a00323.html#a65ca7cd1f2358ad40ae4c8c13f6d817c":[17,0,1,0,15,3], +"a00323.html#ad3b6773201632141bbc95ca6d43271f9":[17,0,1,0,15,5], +"a00323.html#adfccc0bc91b144dffab3aba96126800f":[17,0,1,0,15,2], +"a00326.html":[17,0,1,28], +"a00326.html#a0890ecff5c568d7ee2d631bd3877fcc6":[17,0,1,28,3], +"a00326.html#a546b07423022359a8b27fcbeadfdd93d":[17,0,1,28,2], +"a00326.html#a923fdd71f9a98e47040d26acb74a0202":[17,0,1,28,0], +"a00326.html#acc0d724d5fc815cc98dea12aa5bb15d0":[17,0,1,28,1], +"a00326.html#af8a1f17b5af51c3539246d03282206a2":[17,0,1,28,4], +"a00329.html":[17,0,1,29], +"a00329.html#a0890ecff5c568d7ee2d631bd3877fcc6":[17,0,1,29,4], +"a00329.html#a546b07423022359a8b27fcbeadfdd93d":[17,0,1,29,3], +"a00329.html#a923fdd71f9a98e47040d26acb74a0202":[17,0,1,29,1], +"a00329.html#acc0d724d5fc815cc98dea12aa5bb15d0":[17,0,1,29,2], +"a00329.html#af8a1f17b5af51c3539246d03282206a2":[17,0,1,29,5], +"a00332.html":[17,0,1,30], +"a00335.html":[17,0,1,1,0], +"a00338.html":[17,0,1,1,1], +"a00341.html":[17,0,1,1,2], +"a00344.html":[17,0,1,1,3], +"a00350.html":[17,0,1,1,4], +"a00353.html":[17,0,1,1,5], +"a00353.html#a53ded4ed630b6ef4d292056c2e6b34f6":[17,0,1,1,5,2], +"a00353.html#a640d3cfd0f5b41f50cea0b987094d8a1":[17,0,1,1,5,3], +"a00353.html#a7723a58d1781b3ba54e8f45d5729b33a":[17,0,1,1,5,1], +"a00353.html#aae5866a78d2f0464b04eee9ef1f97030":[17,0,1,1,5,5], +"a00353.html#ae41108996848638519849163e51cd10a":[17,0,1,1,5,7], +"a00353.html#ae82dca54cc3fd1cc2f1671e98d64df07":[17,0,1,1,5,4], +"a00353.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8":[17,0,1,1,5,6], +"a00353.html#aff659b1042abf6e1376e38ccb4a20f3e":[17,0,1,1,5,0], +"a00356.html":[17,0,1,1,6], +"a00356.html#a01cd269d08661e645b4caee850424130":[17,0,1,1,6,5], +"a00356.html#a01d7437a14fd35ccc926168fb4ca2ca7":[17,0,1,1,6,346], +"a00356.html#a023880ad2167cc0d6cefb7f747b73c92":[17,0,1,1,6,383], +"a00356.html#a027d5e8ae4a55db4ae52a41f3214c861":[17,0,1,1,6,198], +"a00356.html#a02f20fbee84fe680d94b94a2b2828040":[17,0,1,1,6,371], +"a00356.html#a03e556ba7849f28ee8c58df8921cba66":[17,0,1,1,6,168], +"a00356.html#a041cfaec382d0a67dcfe36d43332da48":[17,0,1,1,6,317], +"a00356.html#a041d4cd845319ea0a693a1c4008b2a06":[17,0,1,1,6,173], +"a00356.html#a0543a644422ffc7460eeeb78799bde16":[17,0,1,1,6,172], +"a00356.html#a05c0e401be347897d9573ba58492e570":[17,0,1,1,6,238], +"a00356.html#a05ece414a0596ec9bb75c0ca8ca731dc":[17,0,1,1,6,364], +"a00356.html#a06c1c02df3023d78b6b224060966460f":[17,0,1,1,6,46], +"a00356.html#a07089e8e8b1aa335ddfd37e591f64ebb":[17,0,1,1,6,71], +"a00356.html#a071a95b4b2048e0d879e6e13984e38fd":[17,0,1,1,6,286], +"a00356.html#a07289de41178ecfb6392da31e31e27c3":[17,0,1,1,6,159], +"a00356.html#a08326ee33be4faaec3be800e80c1cc17":[17,0,1,1,6,180], +"a00356.html#a08e8a80be2717ece7c5ed5cc0a27fbab":[17,0,1,1,6,171], +"a00356.html#a090c04fed9d153a97fb77195c7eb2f56":[17,0,1,1,6,65], +"a00356.html#a09ab7fb893534775d506020643820939":[17,0,1,1,6,28], +"a00356.html#a09b26b691e29966bcec1513edf819efe":[17,0,1,1,6,105], +"a00356.html#a09e4830c78dedfa2ce662e0fdbe430e3":[17,0,1,1,6,197], +"a00356.html#a0aac7fbfd425112b4b1e922876532a9e":[17,0,1,1,6,37], +"a00356.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799":[17,0,1,1,6,389], +"a00356.html#a0b47a5e9928b7f3c91db64a9b80fde8b":[17,0,1,1,6,220], +"a00356.html#a0b7d56888416e08f1ff67252072e3cea":[17,0,1,1,6,393], +"a00356.html#a0b96c7eee244d44c648245421745db12":[17,0,1,1,6,42], +"a00356.html#a0bd9324a824410d7787c6fcd6e29d8a2":[17,0,1,1,6,261], +"a00356.html#a0be09b502137446daedc43f1d3e85f86":[17,0,1,1,6,75], +"a00356.html#a0c667e3f6590ac12726cbf4ad2b0f4f5":[17,0,1,1,6,201], +"a00356.html#a0c738f2cc7bf063582c34188f85ddc3c":[17,0,1,1,6,81], +"a00356.html#a0c9c951895abf02992e41c617702c2ea":[17,0,1,1,6,341] }; diff --git a/navtreeindex1.js b/navtreeindex1.js index 14d986deb..3caa6304a 100644 --- a/navtreeindex1.js +++ b/navtreeindex1.js @@ -1,253 +1,253 @@ var NAVTREEINDEX1 = { -"a00350.html#a0f2fc749d3d196477b22cbceee856dfb":[16,0,1,1,6,362], -"a00350.html#a10795619d6fb78965b7e78996261f6cd":[16,0,1,1,6,31], -"a00350.html#a122f4b7b9f1011c04385a7caccc2d536":[16,0,1,1,6,328], -"a00350.html#a1519bbd506095c4db25aad15bbc0735b":[16,0,1,1,6,217], -"a00350.html#a15623038b9b0b4b51243691fe15253e2":[16,0,1,1,6,400], -"a00350.html#a15c3e02dd629f85722f4b74e61f3adca":[16,0,1,1,6,60], -"a00350.html#a15cc6f16cdb8f11b60981af7c3b15ef8":[16,0,1,1,6,77], -"a00350.html#a167bc588244395e98461008070fee8f3":[16,0,1,1,6,97], -"a00350.html#a16f1550cc792fa205acef2106f2fcf54":[16,0,1,1,6,20], -"a00350.html#a170c911bfe1a20e3572bdc5c2cd80c9d":[16,0,1,1,6,103], -"a00350.html#a17980d6743441fa2afd71523006ae058":[16,0,1,1,6,301], -"a00350.html#a17f002359b157bee44a3c071a5a206db":[16,0,1,1,6,48], -"a00350.html#a1887d11853092541df18c2a04fb6b87a":[16,0,1,1,6,87], -"a00350.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2":[16,0,1,1,6,93], -"a00350.html#a1a38e9575eb4f714377889ce5270e60b":[16,0,1,1,6,379], -"a00350.html#a1a551775820d79c59f49068140e40f1b":[16,0,1,1,6,395], -"a00350.html#a1acc7b9af9cf3c6c556bd910ce4f239b":[16,0,1,1,6,376], -"a00350.html#a1b104109ce8d8c8a99484bc52d58460a":[16,0,1,1,6,411], -"a00350.html#a1ba2ec2d321b3f90f53c02c7fb9711f2":[16,0,1,1,6,108], -"a00350.html#a1c0632a1eabc73aaebcb4c7f265b8a00":[16,0,1,1,6,52], -"a00350.html#a1cfd78a07f649bda6cf3b7de35804a90":[16,0,1,1,6,189], -"a00350.html#a1d6d2f2713e845ec3b3bf465025d6858":[16,0,1,1,6,98], -"a00350.html#a1da616e68f89a90e6fa3c920b4708fe2":[16,0,1,1,6,413], -"a00350.html#a1db673cb318ec36ebd0c9c1a5ce301ad":[16,0,1,1,6,106], -"a00350.html#a1dedbfae86a6c38085070160696e00bb":[16,0,1,1,6,247], -"a00350.html#a1e34a5e5e8b86355569f958ecbaff3d4":[16,0,1,1,6,268], -"a00350.html#a1ed0d355896761d1cfef4d3b225fefae":[16,0,1,1,6,257], -"a00350.html#a1ef61cb184d3ff5ef2f8bf9db6521888":[16,0,1,1,6,345], -"a00350.html#a1f9bb707789dc9194b06403113c9dfaf":[16,0,1,1,6,24], -"a00350.html#a203996620baf9cdf0aa01dd719e02d06":[16,0,1,1,6,422], -"a00350.html#a2071156124a692a5f2a5c764c923f731":[16,0,1,1,6,358], -"a00350.html#a20afccf35c609f05a3d7dc70687baa2e":[16,0,1,1,6,303], -"a00350.html#a2197c0ad6c0fbf1c801228de9bf0d2ab":[16,0,1,1,6,312], -"a00350.html#a232e4a2b3f189cc2c3594ce5f18da3aa":[16,0,1,1,6,59], -"a00350.html#a235eb9557fa074bf152f9ce9c5844058":[16,0,1,1,6,146], -"a00350.html#a23673926f1dd2464bd20f6512985d855":[16,0,1,1,6,175], -"a00350.html#a249c12b69d65f6c33568c78b9d9b127d":[16,0,1,1,6,190], -"a00350.html#a269bd52a7856116ebce13c1072f56d9e":[16,0,1,1,6,126], -"a00350.html#a276faf364bbb0e27819842111e08842f":[16,0,1,1,6,40], -"a00350.html#a2809c87d994c49b53e039f752834fc97":[16,0,1,1,6,4], -"a00350.html#a28cccb87be4305fa9469c26b0ca341e8":[16,0,1,1,6,237], -"a00350.html#a28d91425d00258aed31192c90f3dbd2e":[16,0,1,1,6,244], -"a00350.html#a29b582e5069538ee92f5bcd6d1356255":[16,0,1,1,6,251], -"a00350.html#a2a2b74db24609199702267614fc31990":[16,0,1,1,6,295], -"a00350.html#a2aac76b15694b82fda038e127d152297":[16,0,1,1,6,330], -"a00350.html#a2aba96712a9932d61146c43289e9d808":[16,0,1,1,6,343], -"a00350.html#a2addec53a2494a40b9101b78426dad2f":[16,0,1,1,6,134], -"a00350.html#a2b70682af491ce76c45505cabafcf9c0":[16,0,1,1,6,195], -"a00350.html#a2b86bf6731827368bf66eec960c35a32":[16,0,1,1,6,338], -"a00350.html#a2c26247a084a027f06a2aaf692313f12":[16,0,1,1,6,149], -"a00350.html#a2d04ced68d56c0db40b93b767de02089":[16,0,1,1,6,333], -"a00350.html#a2d9e0bcb5ccf94f140b1cd519f407ffa":[16,0,1,1,6,419], -"a00350.html#a2e025044ab9693b267e79f80e0a69cb1":[16,0,1,1,6,222], -"a00350.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675":[16,0,1,1,6,292], -"a00350.html#a30e8f8f4027e2137c11c2fb49b4c2aa6":[16,0,1,1,6,187], -"a00350.html#a3171c7ab4447a2e752706bed1072e694":[16,0,1,1,6,69], -"a00350.html#a32c642907f4f326893fb6fccfce18707":[16,0,1,1,6,221], -"a00350.html#a32d53cee52cd042a31f1adc934ad7a5a":[16,0,1,1,6,15], -"a00350.html#a3495c2fd81985342858bac47300bcdc8":[16,0,1,1,6,141], -"a00350.html#a34be98ca6fb22f331eb62cfc4104ded6":[16,0,1,1,6,178], -"a00350.html#a34ec73cf7504b560883a5d192fe88793":[16,0,1,1,6,7], -"a00350.html#a35246a9bad0d77d26b59b542928c9e34":[16,0,1,1,6,378], -"a00350.html#a36122a4f84ec0c31330c3c0458304029":[16,0,1,1,6,49], -"a00350.html#a376a70cf087e157cbb914d9ca2e5b989":[16,0,1,1,6,307], -"a00350.html#a3785654ccbe309a87213aedb001ca39d":[16,0,1,1,6,233], -"a00350.html#a37e24393c3e995d47a09ad962b6b83de":[16,0,1,1,6,47], -"a00350.html#a3a3d3289c719d81f95b3d025a2564c9f":[16,0,1,1,6,136], -"a00350.html#a3b69501fcc3e0cea0197fc0f6107916a":[16,0,1,1,6,231], -"a00350.html#a3b8fb940e149c6fb29801ef573cc6311":[16,0,1,1,6,420], -"a00350.html#a3bf3b2b477944691143db26f205e7d7f":[16,0,1,1,6,23], -"a00350.html#a3c7444c099cf0f89f754fd3cbec77bf4":[16,0,1,1,6,101], -"a00350.html#a3caf91c8e7ec183e0ad7b93dad9cb548":[16,0,1,1,6,68], -"a00350.html#a3d287922c127b599204ea3bc64d4a825":[16,0,1,1,6,329], -"a00350.html#a3d6ae4ea1e385c2f7521495b53715a3f":[16,0,1,1,6,410], -"a00350.html#a3db7049de685080f046f0b4221de461b":[16,0,1,1,6,334], -"a00350.html#a3f54bd6d53a687ae3660196497e8faa1":[16,0,1,1,6,313], -"a00350.html#a3f7b636ed69136b5e5aa6d172cfd34e9":[16,0,1,1,6,35], -"a00350.html#a3f7d34f0bcacd6c816c2b51cd13f5364":[16,0,1,1,6,398], -"a00350.html#a40d926e0e037fc8bb265bb19f57e5d1a":[16,0,1,1,6,111], -"a00350.html#a411d35690c62060ac4c39588741a808e":[16,0,1,1,6,116], -"a00350.html#a41ad765834ce2cf37241f79b80857f79":[16,0,1,1,6,227], -"a00350.html#a41b6da4df887f3d2d38c26b49168d779":[16,0,1,1,6,355], -"a00350.html#a41beaf29ad684f5fae6046c689d6bcf1":[16,0,1,1,6,265], -"a00350.html#a4203bbb296cd67d035066979657cf979":[16,0,1,1,6,109], -"a00350.html#a427e37c74bad23b251deb2274de6d703":[16,0,1,1,6,252], -"a00350.html#a43bb6027c548274980a3ba42bdef51c9":[16,0,1,1,6,340], -"a00350.html#a43cad9606d9b7c0e5875b1fa66108eb8":[16,0,1,1,6,232], -"a00350.html#a444d3fe4302ca95080d919dc89b1bc52":[16,0,1,1,6,311], -"a00350.html#a447491c6888534a69d8f3a5b446396f8":[16,0,1,1,6,274], -"a00350.html#a44cee4dee17a7c1a2618d11e8e5774dd":[16,0,1,1,6,121], -"a00350.html#a47f281930ad5bc31576ccd06e913563f":[16,0,1,1,6,397], -"a00350.html#a49923a8835f64294a5e9b3660c80dc7e":[16,0,1,1,6,157], -"a00350.html#a49f538b630cc416a8ad1f6d784e3a1e4":[16,0,1,1,6,300], -"a00350.html#a4aa5b68bbd7847f53444608615653832":[16,0,1,1,6,302], -"a00350.html#a4b1f89e4c4a24c058fddb3d936e76017":[16,0,1,1,6,260], -"a00350.html#a4c05f7bd221df19c5c6ad1fe1f4709be":[16,0,1,1,6,62], -"a00350.html#a4c6b67a2a6193a1e317b6ef16ca3fca6":[16,0,1,1,6,401], -"a00350.html#a4c987156ced719bbcf398ab6c76289c0":[16,0,1,1,6,269], -"a00350.html#a4c998ee3d596f3006a4488bd8657df33":[16,0,1,1,6,107], -"a00350.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e":[16,0,1,1,6,323], -"a00350.html#a4e3355c5ab7c48cfe466c9374ccc698e":[16,0,1,1,6,132], -"a00350.html#a4edf9367ffdc790e886166890fc814c1":[16,0,1,1,6,17], -"a00350.html#a516dbf4bbd2c4b366e0306890d0bca56":[16,0,1,1,6,90], -"a00350.html#a51bd4fe709f11b3b50f47c2fb18976ca":[16,0,1,1,6,336], -"a00350.html#a53650471a7eef96ce0ef00cb6b8a6a9b":[16,0,1,1,6,205], -"a00350.html#a53ded4ed630b6ef4d292056c2e6b34f6":[16,0,1,1,6,432], -"a00350.html#a54155caf79f004ccf0a875cf3a0ef05b":[16,0,1,1,6,92], -"a00350.html#a54f085984c6aaf826263a755fd3243d7":[16,0,1,1,6,277], -"a00350.html#a555bdf8fa32d4d47577f7748ca928389":[16,0,1,1,6,95], -"a00350.html#a56306fca73ae0f43053787bafdac6a94":[16,0,1,1,6,210], -"a00350.html#a56448f81a8d04c6871b3422c496bf8b6":[16,0,1,1,6,89], -"a00350.html#a564f52346bfc03bdd50aa7d03974efe7":[16,0,1,1,6,176], -"a00350.html#a56e3f8d816e2068d80003fdee7d58763":[16,0,1,1,6,16], -"a00350.html#a579676fd500ded40bc49dc53231fa658":[16,0,1,1,6,14], -"a00350.html#a5859f9a2eb99b4636c894705047e9344":[16,0,1,1,6,299], -"a00350.html#a5884f043019e78838621ba2402a8cc95":[16,0,1,1,6,387], -"a00350.html#a59b230043c3cd1fa0deafac6225238cb":[16,0,1,1,6,225], -"a00350.html#a5a4ff6025fa5d4d936ededc78be16e47":[16,0,1,1,6,416], -"a00350.html#a5b7ad7c3c75639352af5ad3b1298500c":[16,0,1,1,6,78], -"a00350.html#a5cacc01be37cebf35e300be96893477e":[16,0,1,1,6,161], -"a00350.html#a5cdd382afc6d46da59de60fb35abd611":[16,0,1,1,6,424], -"a00350.html#a5da5f8005c1b2612b998afcbd823c716":[16,0,1,1,6,54], -"a00350.html#a5dcc70feddb0b97c6fa779c6c3c819e6":[16,0,1,1,6,200], -"a00350.html#a5ebee4d7d2d30a88ded25f9a6feecc52":[16,0,1,1,6,6], -"a00350.html#a609531b6e844f5a9eebd7c4dcd869b16":[16,0,1,1,6,162], -"a00350.html#a612cbf6171e9a0a176e0bd2844f49528":[16,0,1,1,6,359], -"a00350.html#a6132b175668ba4d6efecca5986c007c0":[16,0,1,1,6,282], -"a00350.html#a62261a1c6f121c296dce7e0f697c9a4a":[16,0,1,1,6,177], -"a00350.html#a625604e07a0618bd7d514faee5e42fba":[16,0,1,1,6,353], -"a00350.html#a62644ffb962c56fbea154526a2a84b40":[16,0,1,1,6,169], -"a00350.html#a62c9e80674303aea5f92d76c92d30d2b":[16,0,1,1,6,12], -"a00350.html#a640d3cfd0f5b41f50cea0b987094d8a1":[16,0,1,1,6,433], -"a00350.html#a66287a8b6f625f866b5cecc4845993ed":[16,0,1,1,6,133], -"a00350.html#a66a410dde8f388c582495ba315284276":[16,0,1,1,6,55], -"a00350.html#a66dba5e06f73c5df37c9d18409185f4d":[16,0,1,1,6,381], -"a00350.html#a677e57736342aed3a7a40704b82895d9":[16,0,1,1,6,394], -"a00350.html#a67ca82b396385dd18790b48d731dfe15":[16,0,1,1,6,79], -"a00350.html#a67e74cb132024711cf064ff98021d71f":[16,0,1,1,6,115], -"a00350.html#a696c55d8590e9d1ac2571d6921f27573":[16,0,1,1,6,213], -"a00350.html#a69f659af2d835a38a13650b26a5e36d4":[16,0,1,1,6,43], -"a00350.html#a6a6daf9c5640ad80e7af330daad1f6ea":[16,0,1,1,6,120], -"a00350.html#a6bd6b85614792b8dabb6432f7a48151e":[16,0,1,1,6,243], -"a00350.html#a6ce84aad51d25e05139f83ac9ca2b162":[16,0,1,1,6,18], -"a00350.html#a6e53cd97c61a185ca397ebed8dc3edcb":[16,0,1,1,6,63], -"a00350.html#a6e6b931cf58debb1a23b87c16c7b4d47":[16,0,1,1,6,264], -"a00350.html#a6eaf90b702c122de71a18a9b2bd43ba7":[16,0,1,1,6,30], -"a00350.html#a6f746e9967643e3234727eaa5a0b274b":[16,0,1,1,6,188], -"a00350.html#a70457c61d44fbac0cb48727f53c39388":[16,0,1,1,6,202], -"a00350.html#a70f88a123587c96ad7affc1e5dae9002":[16,0,1,1,6,365], -"a00350.html#a71b3c35d021e0ac507fdd6cd9538467f":[16,0,1,1,6,250], -"a00350.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116":[16,0,1,1,6,374], -"a00350.html#a71bd7b920718c3bbf99d78eda569018c":[16,0,1,1,6,211], -"a00350.html#a7216bb6f51f67f09e5372c7f731bf23a":[16,0,1,1,6,143], -"a00350.html#a72cc5ecbdfa169d282776461ce48fda6":[16,0,1,1,6,1], -"a00350.html#a73670681360e1272aa13d1359e7bb275":[16,0,1,1,6,380], -"a00350.html#a7432ca6b291e32e962fabaa6d604a8bc":[16,0,1,1,6,192], -"a00350.html#a74490b179b34f9925e9fe00675e53713":[16,0,1,1,6,369], -"a00350.html#a74a13b4b6304a02b4e006901b6ac1de5":[16,0,1,1,6,29], -"a00350.html#a756539af7bcadf33dd3a9b2f60763f7a":[16,0,1,1,6,41], -"a00350.html#a7599639f80f3ac2a0d22f2857138cb87":[16,0,1,1,6,351], -"a00350.html#a766a94a7e38b558e1165b24de78d21db":[16,0,1,1,6,142], -"a00350.html#a76bf5d4ce89c95c658328fe8e66669e7":[16,0,1,1,6,337], -"a00350.html#a7723a58d1781b3ba54e8f45d5729b33a":[16,0,1,1,6,431], -"a00350.html#a773dce573d9ff453d2f49aa7fc48e210":[16,0,1,1,6,242], -"a00350.html#a77402cc8f4efbba6119bd57717c34ce4":[16,0,1,1,6,212], -"a00350.html#a77a516ab645b681ad7861d8b74e4a115":[16,0,1,1,6,203], -"a00350.html#a798018a4ef489e8fb0a02b5edf7e9d55":[16,0,1,1,6,283], -"a00350.html#a7ae9dcc07ca9d990e9db6d8949ac935a":[16,0,1,1,6,291], -"a00350.html#a7b2f5fb4edfbf4cb719aedbd7215b863":[16,0,1,1,6,11], -"a00350.html#a7b7c499931480a88f6a106644c3d2185":[16,0,1,1,6,366], -"a00350.html#a7b90ca417a76facaeec91d8f2c10f860":[16,0,1,1,6,131], -"a00350.html#a7c365741639a5c7dc29267a130e8d827":[16,0,1,1,6,118], -"a00350.html#a7c675071c7fd650a29594c5fcc9882a1":[16,0,1,1,6,279], -"a00350.html#a7d786006183912073939b3f62075dd27":[16,0,1,1,6,67], -"a00350.html#a7ff1918de6f8238ba4f67d9368e3587d":[16,0,1,1,6,331], -"a00350.html#a80b8b54f333be5a587f22e2d04812de6":[16,0,1,1,6,294], -"a00350.html#a80e6b848030f81d90fbad16844105612":[16,0,1,1,6,22], -"a00350.html#a814ad478cb05af339635633cbcd495b7":[16,0,1,1,6,33], -"a00350.html#a81bab82e6be63d8186b26bb9c3b8732c":[16,0,1,1,6,385], -"a00350.html#a8250b0997534871fdd6ead1c3aa220ba":[16,0,1,1,6,182], -"a00350.html#a830d379174b47b466f5de16fe3345182":[16,0,1,1,6,428], -"a00350.html#a8335b06c5f49c384e2c2f31861865a54":[16,0,1,1,6,19], -"a00350.html#a83a00fa1769c54aeb5ad02bdfba5b3e7":[16,0,1,1,6,129], -"a00350.html#a84f07835d69fed7484299c78f4971a3e":[16,0,1,1,6,152], -"a00350.html#a84f7e63b8711e799da259862b170fd75":[16,0,1,1,6,27], -"a00350.html#a85c326c023bdc268c499eb33375f2270":[16,0,1,1,6,124], -"a00350.html#a868d5d7ce0451e1c8f95f16092cfbc97":[16,0,1,1,6,404], -"a00350.html#a8760372110d92cea3570a5720db05de2":[16,0,1,1,6,73], -"a00350.html#a876298788a9270561dc279b7d4c92cb8":[16,0,1,1,6,259], -"a00350.html#a882f14cac02df8282ccad2a43afc8a23":[16,0,1,1,6,82], -"a00350.html#a88cc1851cedb6f2a73df4618dbc0b165":[16,0,1,1,6,377], -"a00350.html#a890e2e40916e88caf596cff43be8ab23":[16,0,1,1,6,8], -"a00350.html#a896cc15df167f9a04f7e4f84de2bc7d2":[16,0,1,1,6,406], -"a00350.html#a8a5a586bdb0194be827417658836bf9c":[16,0,1,1,6,367], -"a00350.html#a8a5cce3cbccf46b91c8065559ad1a082":[16,0,1,1,6,241], -"a00350.html#a8ad263b7b321311a57db7600f18a555f":[16,0,1,1,6,284], -"a00350.html#a8cbce00b91b0ddfb3264c9c367a3699a":[16,0,1,1,6,2], -"a00350.html#a8cbed81461d4e4c4991c50629b3a5bcd":[16,0,1,1,6,426], -"a00350.html#a8d5f52e7dbb1ea5308517365bbec87b5":[16,0,1,1,6,207], -"a00350.html#a8d9a1e331d54bffb36f7b4e97af5d161":[16,0,1,1,6,167], -"a00350.html#a8e357a6e926176155fe47aba97d915fb":[16,0,1,1,6,94], -"a00350.html#a8e5f11692a8a23e1410d9b5ce8bebc2b":[16,0,1,1,6,86], -"a00350.html#a8f38093650cd530f44dc59e6eb78fa3d":[16,0,1,1,6,415], -"a00350.html#a9088fc1b89c3ca9b58901de000d8d55d":[16,0,1,1,6,110], -"a00350.html#a908aece3a9501eb14a70c2b24a3e4089":[16,0,1,1,6,80], -"a00350.html#a90f529642e87edae132421b3777ec4b1":[16,0,1,1,6,226], -"a00350.html#a90fa979b13088478c8bcf8fd7a6bb541":[16,0,1,1,6,354], -"a00350.html#a9163acda5dd0653f40b6ad445f2c972d":[16,0,1,1,6,160], -"a00350.html#a91ebd87544ccdab3670cfbec8d23bd4a":[16,0,1,1,6,344], -"a00350.html#a921afead5f0a35822bc8263c3a1e1761":[16,0,1,1,6,253], -"a00350.html#a9257968de99742ec468463a72588820f":[16,0,1,1,6,325], -"a00350.html#a93cb0fdfc89b69cb1c4670f30288f2ad":[16,0,1,1,6,104], -"a00350.html#a94608e9994efbb6869e15bf1076c9899":[16,0,1,1,6,128], -"a00350.html#a94d9bf52f1a6c7af3943eb92dd3967ef":[16,0,1,1,6,255], -"a00350.html#a94fc1ff3975c056868a169b1b836f920":[16,0,1,1,6,403], -"a00350.html#a9599c4331857f1daa543a31fcce650fd":[16,0,1,1,6,39], -"a00350.html#a959e54d571acf81b608d5c6d535b0510":[16,0,1,1,6,228], -"a00350.html#a97828be629e8f11561b58cb434c18b21":[16,0,1,1,6,235], -"a00350.html#a97ca81334088c297c577f4b4aaced3cf":[16,0,1,1,6,275], -"a00350.html#a98721952094435f45bffa352dd6848ad":[16,0,1,1,6,273], -"a00350.html#a988fff8295c1914217b8543b614f556c":[16,0,1,1,6,91], -"a00350.html#a98be7c54d55328daa4390a816c9bb243":[16,0,1,1,6,280], -"a00350.html#a99bca33105a872e8a20fe199cc17219b":[16,0,1,1,6,293], -"a00350.html#a9a089181beb38a1e5c5add58e96302bc":[16,0,1,1,6,32], -"a00350.html#a9a7fddf245cba834f86e0b63f2b14dc1":[16,0,1,1,6,270], -"a00350.html#a9b6844bb107f02832a6d827b8c5b0fda":[16,0,1,1,6,372], -"a00350.html#a9b7c3aca6168b52321e1951893efa050":[16,0,1,1,6,339], -"a00350.html#a9c08115363fb521e9fee60849046f820":[16,0,1,1,6,421], -"a00350.html#a9cab0c5dd2e3796497a5237f101f19e0":[16,0,1,1,6,151], -"a00350.html#a9cc740e22e15f08a8b90873a2b3b47e8":[16,0,1,1,6,185], -"a00350.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac":[16,0,1,1,6,196], -"a00350.html#a9e84a71fc7e3ba613779aeb8d740eb23":[16,0,1,1,6,66], -"a00350.html#aa0117f3d3f9a9ae65a3fab1e68b7caef":[16,0,1,1,6,21], -"a00350.html#aa0843d9ec7e246455483a1fb1fdf3a07":[16,0,1,1,6,58], -"a00350.html#aa0eacfa4e596c3eb572753b7f5171276":[16,0,1,1,6,61], -"a00350.html#aa16bfad9cb883d258befaacadb3385ef":[16,0,1,1,6,348], -"a00350.html#aa21e10945076d803129feb07946591f9":[16,0,1,1,6,144], -"a00350.html#aa32b46f2c058ee54377d0cbef1ec8764":[16,0,1,1,6,99], -"a00350.html#aa3984c137090a2d103b2089c7ac31642":[16,0,1,1,6,165], -"a00350.html#aa3f4cdb700e47737058c174a1f156707":[16,0,1,1,6,229], -"a00350.html#aa44ecaa440ab845d5939333171476adf":[16,0,1,1,6,119], -"a00350.html#aa466dfdf174c134a11f578d1731990ef":[16,0,1,1,6,254], -"a00350.html#aa569255bc251cd90cb2d0f6b710164bc":[16,0,1,1,6,64], -"a00350.html#aa5b4cb5be95861466fff33fe0d5a9020":[16,0,1,1,6,206], -"a00350.html#aa667451bf2e061c3e76a7a8a5d8b86d4":[16,0,1,1,6,145], -"a00350.html#aa66ad8429261c1ba13d064d660d6d464":[16,0,1,1,6,305], -"a00350.html#aa72601de2238c09393f120f68abf66a4":[16,0,1,1,6,249], -"a00350.html#aa914251d0e03f7d1850ee04296715f14":[16,0,1,1,6,297], -"a00350.html#aaabcd1e4afb29088a17f7e87e7136e24":[16,0,1,1,6,112], -"a00350.html#aabaee03887c7e4403ac4936d9cde406e":[16,0,1,1,6,26] +"a00356.html#a0e74f12b91b93e683f27fb8b4c0bfb2f":[17,0,1,1,6,50], +"a00356.html#a0e98e55c91c7559f57fdef4c9969c188":[17,0,1,1,6,361], +"a00356.html#a0f2c0b2e264a88b766811fe4ea0de88f":[17,0,1,1,6,100], +"a00356.html#a0f2fc749d3d196477b22cbceee856dfb":[17,0,1,1,6,362], +"a00356.html#a10795619d6fb78965b7e78996261f6cd":[17,0,1,1,6,31], +"a00356.html#a122f4b7b9f1011c04385a7caccc2d536":[17,0,1,1,6,328], +"a00356.html#a1519bbd506095c4db25aad15bbc0735b":[17,0,1,1,6,217], +"a00356.html#a15623038b9b0b4b51243691fe15253e2":[17,0,1,1,6,400], +"a00356.html#a15c3e02dd629f85722f4b74e61f3adca":[17,0,1,1,6,60], +"a00356.html#a15cc6f16cdb8f11b60981af7c3b15ef8":[17,0,1,1,6,77], +"a00356.html#a167bc588244395e98461008070fee8f3":[17,0,1,1,6,97], +"a00356.html#a16f1550cc792fa205acef2106f2fcf54":[17,0,1,1,6,20], +"a00356.html#a170c911bfe1a20e3572bdc5c2cd80c9d":[17,0,1,1,6,103], +"a00356.html#a17980d6743441fa2afd71523006ae058":[17,0,1,1,6,301], +"a00356.html#a17f002359b157bee44a3c071a5a206db":[17,0,1,1,6,48], +"a00356.html#a1887d11853092541df18c2a04fb6b87a":[17,0,1,1,6,87], +"a00356.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2":[17,0,1,1,6,93], +"a00356.html#a1a38e9575eb4f714377889ce5270e60b":[17,0,1,1,6,379], +"a00356.html#a1a551775820d79c59f49068140e40f1b":[17,0,1,1,6,395], +"a00356.html#a1acc7b9af9cf3c6c556bd910ce4f239b":[17,0,1,1,6,376], +"a00356.html#a1b104109ce8d8c8a99484bc52d58460a":[17,0,1,1,6,411], +"a00356.html#a1ba2ec2d321b3f90f53c02c7fb9711f2":[17,0,1,1,6,108], +"a00356.html#a1c0632a1eabc73aaebcb4c7f265b8a00":[17,0,1,1,6,52], +"a00356.html#a1cfd78a07f649bda6cf3b7de35804a90":[17,0,1,1,6,189], +"a00356.html#a1d6d2f2713e845ec3b3bf465025d6858":[17,0,1,1,6,98], +"a00356.html#a1da616e68f89a90e6fa3c920b4708fe2":[17,0,1,1,6,413], +"a00356.html#a1db673cb318ec36ebd0c9c1a5ce301ad":[17,0,1,1,6,106], +"a00356.html#a1dedbfae86a6c38085070160696e00bb":[17,0,1,1,6,247], +"a00356.html#a1e34a5e5e8b86355569f958ecbaff3d4":[17,0,1,1,6,268], +"a00356.html#a1ed0d355896761d1cfef4d3b225fefae":[17,0,1,1,6,257], +"a00356.html#a1ef61cb184d3ff5ef2f8bf9db6521888":[17,0,1,1,6,345], +"a00356.html#a1f9bb707789dc9194b06403113c9dfaf":[17,0,1,1,6,24], +"a00356.html#a203996620baf9cdf0aa01dd719e02d06":[17,0,1,1,6,422], +"a00356.html#a2071156124a692a5f2a5c764c923f731":[17,0,1,1,6,358], +"a00356.html#a20afccf35c609f05a3d7dc70687baa2e":[17,0,1,1,6,303], +"a00356.html#a2197c0ad6c0fbf1c801228de9bf0d2ab":[17,0,1,1,6,312], +"a00356.html#a232e4a2b3f189cc2c3594ce5f18da3aa":[17,0,1,1,6,59], +"a00356.html#a235eb9557fa074bf152f9ce9c5844058":[17,0,1,1,6,146], +"a00356.html#a23673926f1dd2464bd20f6512985d855":[17,0,1,1,6,175], +"a00356.html#a249c12b69d65f6c33568c78b9d9b127d":[17,0,1,1,6,190], +"a00356.html#a269bd52a7856116ebce13c1072f56d9e":[17,0,1,1,6,126], +"a00356.html#a276faf364bbb0e27819842111e08842f":[17,0,1,1,6,40], +"a00356.html#a2809c87d994c49b53e039f752834fc97":[17,0,1,1,6,4], +"a00356.html#a28cccb87be4305fa9469c26b0ca341e8":[17,0,1,1,6,237], +"a00356.html#a28d91425d00258aed31192c90f3dbd2e":[17,0,1,1,6,244], +"a00356.html#a29b582e5069538ee92f5bcd6d1356255":[17,0,1,1,6,251], +"a00356.html#a2a2b74db24609199702267614fc31990":[17,0,1,1,6,295], +"a00356.html#a2aac76b15694b82fda038e127d152297":[17,0,1,1,6,330], +"a00356.html#a2aba96712a9932d61146c43289e9d808":[17,0,1,1,6,343], +"a00356.html#a2addec53a2494a40b9101b78426dad2f":[17,0,1,1,6,134], +"a00356.html#a2b70682af491ce76c45505cabafcf9c0":[17,0,1,1,6,195], +"a00356.html#a2b86bf6731827368bf66eec960c35a32":[17,0,1,1,6,338], +"a00356.html#a2c26247a084a027f06a2aaf692313f12":[17,0,1,1,6,149], +"a00356.html#a2d04ced68d56c0db40b93b767de02089":[17,0,1,1,6,333], +"a00356.html#a2d9e0bcb5ccf94f140b1cd519f407ffa":[17,0,1,1,6,419], +"a00356.html#a2e025044ab9693b267e79f80e0a69cb1":[17,0,1,1,6,222], +"a00356.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675":[17,0,1,1,6,292], +"a00356.html#a30e8f8f4027e2137c11c2fb49b4c2aa6":[17,0,1,1,6,187], +"a00356.html#a3171c7ab4447a2e752706bed1072e694":[17,0,1,1,6,69], +"a00356.html#a32c642907f4f326893fb6fccfce18707":[17,0,1,1,6,221], +"a00356.html#a32d53cee52cd042a31f1adc934ad7a5a":[17,0,1,1,6,15], +"a00356.html#a3495c2fd81985342858bac47300bcdc8":[17,0,1,1,6,141], +"a00356.html#a34be98ca6fb22f331eb62cfc4104ded6":[17,0,1,1,6,178], +"a00356.html#a34ec73cf7504b560883a5d192fe88793":[17,0,1,1,6,7], +"a00356.html#a35246a9bad0d77d26b59b542928c9e34":[17,0,1,1,6,378], +"a00356.html#a36122a4f84ec0c31330c3c0458304029":[17,0,1,1,6,49], +"a00356.html#a376a70cf087e157cbb914d9ca2e5b989":[17,0,1,1,6,307], +"a00356.html#a3785654ccbe309a87213aedb001ca39d":[17,0,1,1,6,233], +"a00356.html#a37e24393c3e995d47a09ad962b6b83de":[17,0,1,1,6,47], +"a00356.html#a3a3d3289c719d81f95b3d025a2564c9f":[17,0,1,1,6,136], +"a00356.html#a3b69501fcc3e0cea0197fc0f6107916a":[17,0,1,1,6,231], +"a00356.html#a3b8fb940e149c6fb29801ef573cc6311":[17,0,1,1,6,420], +"a00356.html#a3bf3b2b477944691143db26f205e7d7f":[17,0,1,1,6,23], +"a00356.html#a3c7444c099cf0f89f754fd3cbec77bf4":[17,0,1,1,6,101], +"a00356.html#a3caf91c8e7ec183e0ad7b93dad9cb548":[17,0,1,1,6,68], +"a00356.html#a3d287922c127b599204ea3bc64d4a825":[17,0,1,1,6,329], +"a00356.html#a3d6ae4ea1e385c2f7521495b53715a3f":[17,0,1,1,6,410], +"a00356.html#a3db7049de685080f046f0b4221de461b":[17,0,1,1,6,334], +"a00356.html#a3f54bd6d53a687ae3660196497e8faa1":[17,0,1,1,6,313], +"a00356.html#a3f7b636ed69136b5e5aa6d172cfd34e9":[17,0,1,1,6,35], +"a00356.html#a3f7d34f0bcacd6c816c2b51cd13f5364":[17,0,1,1,6,398], +"a00356.html#a40d926e0e037fc8bb265bb19f57e5d1a":[17,0,1,1,6,111], +"a00356.html#a411d35690c62060ac4c39588741a808e":[17,0,1,1,6,116], +"a00356.html#a41ad765834ce2cf37241f79b80857f79":[17,0,1,1,6,227], +"a00356.html#a41b6da4df887f3d2d38c26b49168d779":[17,0,1,1,6,355], +"a00356.html#a41beaf29ad684f5fae6046c689d6bcf1":[17,0,1,1,6,265], +"a00356.html#a4203bbb296cd67d035066979657cf979":[17,0,1,1,6,109], +"a00356.html#a427e37c74bad23b251deb2274de6d703":[17,0,1,1,6,252], +"a00356.html#a43bb6027c548274980a3ba42bdef51c9":[17,0,1,1,6,340], +"a00356.html#a43cad9606d9b7c0e5875b1fa66108eb8":[17,0,1,1,6,232], +"a00356.html#a444d3fe4302ca95080d919dc89b1bc52":[17,0,1,1,6,311], +"a00356.html#a447491c6888534a69d8f3a5b446396f8":[17,0,1,1,6,274], +"a00356.html#a44cee4dee17a7c1a2618d11e8e5774dd":[17,0,1,1,6,121], +"a00356.html#a47f281930ad5bc31576ccd06e913563f":[17,0,1,1,6,397], +"a00356.html#a49923a8835f64294a5e9b3660c80dc7e":[17,0,1,1,6,157], +"a00356.html#a49f538b630cc416a8ad1f6d784e3a1e4":[17,0,1,1,6,300], +"a00356.html#a4aa5b68bbd7847f53444608615653832":[17,0,1,1,6,302], +"a00356.html#a4b1f89e4c4a24c058fddb3d936e76017":[17,0,1,1,6,260], +"a00356.html#a4c05f7bd221df19c5c6ad1fe1f4709be":[17,0,1,1,6,62], +"a00356.html#a4c6b67a2a6193a1e317b6ef16ca3fca6":[17,0,1,1,6,401], +"a00356.html#a4c987156ced719bbcf398ab6c76289c0":[17,0,1,1,6,269], +"a00356.html#a4c998ee3d596f3006a4488bd8657df33":[17,0,1,1,6,107], +"a00356.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e":[17,0,1,1,6,323], +"a00356.html#a4e3355c5ab7c48cfe466c9374ccc698e":[17,0,1,1,6,132], +"a00356.html#a4edf9367ffdc790e886166890fc814c1":[17,0,1,1,6,17], +"a00356.html#a516dbf4bbd2c4b366e0306890d0bca56":[17,0,1,1,6,90], +"a00356.html#a51bd4fe709f11b3b50f47c2fb18976ca":[17,0,1,1,6,336], +"a00356.html#a53650471a7eef96ce0ef00cb6b8a6a9b":[17,0,1,1,6,205], +"a00356.html#a53ded4ed630b6ef4d292056c2e6b34f6":[17,0,1,1,6,432], +"a00356.html#a54155caf79f004ccf0a875cf3a0ef05b":[17,0,1,1,6,92], +"a00356.html#a54f085984c6aaf826263a755fd3243d7":[17,0,1,1,6,277], +"a00356.html#a555bdf8fa32d4d47577f7748ca928389":[17,0,1,1,6,95], +"a00356.html#a56306fca73ae0f43053787bafdac6a94":[17,0,1,1,6,210], +"a00356.html#a56448f81a8d04c6871b3422c496bf8b6":[17,0,1,1,6,89], +"a00356.html#a564f52346bfc03bdd50aa7d03974efe7":[17,0,1,1,6,176], +"a00356.html#a56e3f8d816e2068d80003fdee7d58763":[17,0,1,1,6,16], +"a00356.html#a579676fd500ded40bc49dc53231fa658":[17,0,1,1,6,14], +"a00356.html#a5859f9a2eb99b4636c894705047e9344":[17,0,1,1,6,299], +"a00356.html#a5884f043019e78838621ba2402a8cc95":[17,0,1,1,6,387], +"a00356.html#a59b230043c3cd1fa0deafac6225238cb":[17,0,1,1,6,225], +"a00356.html#a5a4ff6025fa5d4d936ededc78be16e47":[17,0,1,1,6,416], +"a00356.html#a5b7ad7c3c75639352af5ad3b1298500c":[17,0,1,1,6,78], +"a00356.html#a5cacc01be37cebf35e300be96893477e":[17,0,1,1,6,161], +"a00356.html#a5cdd382afc6d46da59de60fb35abd611":[17,0,1,1,6,424], +"a00356.html#a5da5f8005c1b2612b998afcbd823c716":[17,0,1,1,6,54], +"a00356.html#a5dcc70feddb0b97c6fa779c6c3c819e6":[17,0,1,1,6,200], +"a00356.html#a5ebee4d7d2d30a88ded25f9a6feecc52":[17,0,1,1,6,6], +"a00356.html#a609531b6e844f5a9eebd7c4dcd869b16":[17,0,1,1,6,162], +"a00356.html#a612cbf6171e9a0a176e0bd2844f49528":[17,0,1,1,6,359], +"a00356.html#a6132b175668ba4d6efecca5986c007c0":[17,0,1,1,6,282], +"a00356.html#a62261a1c6f121c296dce7e0f697c9a4a":[17,0,1,1,6,177], +"a00356.html#a625604e07a0618bd7d514faee5e42fba":[17,0,1,1,6,353], +"a00356.html#a62644ffb962c56fbea154526a2a84b40":[17,0,1,1,6,169], +"a00356.html#a62c9e80674303aea5f92d76c92d30d2b":[17,0,1,1,6,12], +"a00356.html#a640d3cfd0f5b41f50cea0b987094d8a1":[17,0,1,1,6,433], +"a00356.html#a66287a8b6f625f866b5cecc4845993ed":[17,0,1,1,6,133], +"a00356.html#a66a410dde8f388c582495ba315284276":[17,0,1,1,6,55], +"a00356.html#a66dba5e06f73c5df37c9d18409185f4d":[17,0,1,1,6,381], +"a00356.html#a677e57736342aed3a7a40704b82895d9":[17,0,1,1,6,394], +"a00356.html#a67ca82b396385dd18790b48d731dfe15":[17,0,1,1,6,79], +"a00356.html#a67e74cb132024711cf064ff98021d71f":[17,0,1,1,6,115], +"a00356.html#a696c55d8590e9d1ac2571d6921f27573":[17,0,1,1,6,213], +"a00356.html#a69f659af2d835a38a13650b26a5e36d4":[17,0,1,1,6,43], +"a00356.html#a6a6daf9c5640ad80e7af330daad1f6ea":[17,0,1,1,6,120], +"a00356.html#a6bd6b85614792b8dabb6432f7a48151e":[17,0,1,1,6,243], +"a00356.html#a6ce84aad51d25e05139f83ac9ca2b162":[17,0,1,1,6,18], +"a00356.html#a6e53cd97c61a185ca397ebed8dc3edcb":[17,0,1,1,6,63], +"a00356.html#a6e6b931cf58debb1a23b87c16c7b4d47":[17,0,1,1,6,264], +"a00356.html#a6eaf90b702c122de71a18a9b2bd43ba7":[17,0,1,1,6,30], +"a00356.html#a6f746e9967643e3234727eaa5a0b274b":[17,0,1,1,6,188], +"a00356.html#a70457c61d44fbac0cb48727f53c39388":[17,0,1,1,6,202], +"a00356.html#a70f88a123587c96ad7affc1e5dae9002":[17,0,1,1,6,365], +"a00356.html#a71b3c35d021e0ac507fdd6cd9538467f":[17,0,1,1,6,250], +"a00356.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116":[17,0,1,1,6,374], +"a00356.html#a71bd7b920718c3bbf99d78eda569018c":[17,0,1,1,6,211], +"a00356.html#a7216bb6f51f67f09e5372c7f731bf23a":[17,0,1,1,6,143], +"a00356.html#a72cc5ecbdfa169d282776461ce48fda6":[17,0,1,1,6,1], +"a00356.html#a73670681360e1272aa13d1359e7bb275":[17,0,1,1,6,380], +"a00356.html#a7432ca6b291e32e962fabaa6d604a8bc":[17,0,1,1,6,192], +"a00356.html#a74490b179b34f9925e9fe00675e53713":[17,0,1,1,6,369], +"a00356.html#a74a13b4b6304a02b4e006901b6ac1de5":[17,0,1,1,6,29], +"a00356.html#a756539af7bcadf33dd3a9b2f60763f7a":[17,0,1,1,6,41], +"a00356.html#a7599639f80f3ac2a0d22f2857138cb87":[17,0,1,1,6,351], +"a00356.html#a766a94a7e38b558e1165b24de78d21db":[17,0,1,1,6,142], +"a00356.html#a76bf5d4ce89c95c658328fe8e66669e7":[17,0,1,1,6,337], +"a00356.html#a7723a58d1781b3ba54e8f45d5729b33a":[17,0,1,1,6,431], +"a00356.html#a773dce573d9ff453d2f49aa7fc48e210":[17,0,1,1,6,242], +"a00356.html#a77402cc8f4efbba6119bd57717c34ce4":[17,0,1,1,6,212], +"a00356.html#a77a516ab645b681ad7861d8b74e4a115":[17,0,1,1,6,203], +"a00356.html#a798018a4ef489e8fb0a02b5edf7e9d55":[17,0,1,1,6,283], +"a00356.html#a7ae9dcc07ca9d990e9db6d8949ac935a":[17,0,1,1,6,291], +"a00356.html#a7b2f5fb4edfbf4cb719aedbd7215b863":[17,0,1,1,6,11], +"a00356.html#a7b7c499931480a88f6a106644c3d2185":[17,0,1,1,6,366], +"a00356.html#a7b90ca417a76facaeec91d8f2c10f860":[17,0,1,1,6,131], +"a00356.html#a7c365741639a5c7dc29267a130e8d827":[17,0,1,1,6,118], +"a00356.html#a7c675071c7fd650a29594c5fcc9882a1":[17,0,1,1,6,279], +"a00356.html#a7d786006183912073939b3f62075dd27":[17,0,1,1,6,67], +"a00356.html#a7ff1918de6f8238ba4f67d9368e3587d":[17,0,1,1,6,331], +"a00356.html#a80b8b54f333be5a587f22e2d04812de6":[17,0,1,1,6,294], +"a00356.html#a80e6b848030f81d90fbad16844105612":[17,0,1,1,6,22], +"a00356.html#a814ad478cb05af339635633cbcd495b7":[17,0,1,1,6,33], +"a00356.html#a81bab82e6be63d8186b26bb9c3b8732c":[17,0,1,1,6,385], +"a00356.html#a8250b0997534871fdd6ead1c3aa220ba":[17,0,1,1,6,182], +"a00356.html#a830d379174b47b466f5de16fe3345182":[17,0,1,1,6,428], +"a00356.html#a8335b06c5f49c384e2c2f31861865a54":[17,0,1,1,6,19], +"a00356.html#a83a00fa1769c54aeb5ad02bdfba5b3e7":[17,0,1,1,6,129], +"a00356.html#a84f07835d69fed7484299c78f4971a3e":[17,0,1,1,6,152], +"a00356.html#a84f7e63b8711e799da259862b170fd75":[17,0,1,1,6,27], +"a00356.html#a85c326c023bdc268c499eb33375f2270":[17,0,1,1,6,124], +"a00356.html#a868d5d7ce0451e1c8f95f16092cfbc97":[17,0,1,1,6,404], +"a00356.html#a8760372110d92cea3570a5720db05de2":[17,0,1,1,6,73], +"a00356.html#a876298788a9270561dc279b7d4c92cb8":[17,0,1,1,6,259], +"a00356.html#a882f14cac02df8282ccad2a43afc8a23":[17,0,1,1,6,82], +"a00356.html#a88cc1851cedb6f2a73df4618dbc0b165":[17,0,1,1,6,377], +"a00356.html#a890e2e40916e88caf596cff43be8ab23":[17,0,1,1,6,8], +"a00356.html#a896cc15df167f9a04f7e4f84de2bc7d2":[17,0,1,1,6,406], +"a00356.html#a8a5a586bdb0194be827417658836bf9c":[17,0,1,1,6,367], +"a00356.html#a8a5cce3cbccf46b91c8065559ad1a082":[17,0,1,1,6,241], +"a00356.html#a8ad263b7b321311a57db7600f18a555f":[17,0,1,1,6,284], +"a00356.html#a8cbce00b91b0ddfb3264c9c367a3699a":[17,0,1,1,6,2], +"a00356.html#a8cbed81461d4e4c4991c50629b3a5bcd":[17,0,1,1,6,426], +"a00356.html#a8d5f52e7dbb1ea5308517365bbec87b5":[17,0,1,1,6,207], +"a00356.html#a8d9a1e331d54bffb36f7b4e97af5d161":[17,0,1,1,6,167], +"a00356.html#a8e357a6e926176155fe47aba97d915fb":[17,0,1,1,6,94], +"a00356.html#a8e5f11692a8a23e1410d9b5ce8bebc2b":[17,0,1,1,6,86], +"a00356.html#a8f38093650cd530f44dc59e6eb78fa3d":[17,0,1,1,6,415], +"a00356.html#a9088fc1b89c3ca9b58901de000d8d55d":[17,0,1,1,6,110], +"a00356.html#a908aece3a9501eb14a70c2b24a3e4089":[17,0,1,1,6,80], +"a00356.html#a90f529642e87edae132421b3777ec4b1":[17,0,1,1,6,226], +"a00356.html#a90fa979b13088478c8bcf8fd7a6bb541":[17,0,1,1,6,354], +"a00356.html#a9163acda5dd0653f40b6ad445f2c972d":[17,0,1,1,6,160], +"a00356.html#a91ebd87544ccdab3670cfbec8d23bd4a":[17,0,1,1,6,344], +"a00356.html#a921afead5f0a35822bc8263c3a1e1761":[17,0,1,1,6,253], +"a00356.html#a9257968de99742ec468463a72588820f":[17,0,1,1,6,325], +"a00356.html#a93cb0fdfc89b69cb1c4670f30288f2ad":[17,0,1,1,6,104], +"a00356.html#a94608e9994efbb6869e15bf1076c9899":[17,0,1,1,6,128], +"a00356.html#a94d9bf52f1a6c7af3943eb92dd3967ef":[17,0,1,1,6,255], +"a00356.html#a94fc1ff3975c056868a169b1b836f920":[17,0,1,1,6,403], +"a00356.html#a9599c4331857f1daa543a31fcce650fd":[17,0,1,1,6,39], +"a00356.html#a959e54d571acf81b608d5c6d535b0510":[17,0,1,1,6,228], +"a00356.html#a97828be629e8f11561b58cb434c18b21":[17,0,1,1,6,235], +"a00356.html#a97ca81334088c297c577f4b4aaced3cf":[17,0,1,1,6,275], +"a00356.html#a98721952094435f45bffa352dd6848ad":[17,0,1,1,6,273], +"a00356.html#a988fff8295c1914217b8543b614f556c":[17,0,1,1,6,91], +"a00356.html#a98be7c54d55328daa4390a816c9bb243":[17,0,1,1,6,280], +"a00356.html#a99bca33105a872e8a20fe199cc17219b":[17,0,1,1,6,293], +"a00356.html#a9a089181beb38a1e5c5add58e96302bc":[17,0,1,1,6,32], +"a00356.html#a9a7fddf245cba834f86e0b63f2b14dc1":[17,0,1,1,6,270], +"a00356.html#a9b6844bb107f02832a6d827b8c5b0fda":[17,0,1,1,6,372], +"a00356.html#a9b7c3aca6168b52321e1951893efa050":[17,0,1,1,6,339], +"a00356.html#a9c08115363fb521e9fee60849046f820":[17,0,1,1,6,421], +"a00356.html#a9cab0c5dd2e3796497a5237f101f19e0":[17,0,1,1,6,151], +"a00356.html#a9cc740e22e15f08a8b90873a2b3b47e8":[17,0,1,1,6,185], +"a00356.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac":[17,0,1,1,6,196], +"a00356.html#a9e84a71fc7e3ba613779aeb8d740eb23":[17,0,1,1,6,66], +"a00356.html#aa0117f3d3f9a9ae65a3fab1e68b7caef":[17,0,1,1,6,21], +"a00356.html#aa0843d9ec7e246455483a1fb1fdf3a07":[17,0,1,1,6,58], +"a00356.html#aa0eacfa4e596c3eb572753b7f5171276":[17,0,1,1,6,61], +"a00356.html#aa16bfad9cb883d258befaacadb3385ef":[17,0,1,1,6,348], +"a00356.html#aa21e10945076d803129feb07946591f9":[17,0,1,1,6,144], +"a00356.html#aa32b46f2c058ee54377d0cbef1ec8764":[17,0,1,1,6,99], +"a00356.html#aa3984c137090a2d103b2089c7ac31642":[17,0,1,1,6,165], +"a00356.html#aa3f4cdb700e47737058c174a1f156707":[17,0,1,1,6,229], +"a00356.html#aa44ecaa440ab845d5939333171476adf":[17,0,1,1,6,119], +"a00356.html#aa466dfdf174c134a11f578d1731990ef":[17,0,1,1,6,254], +"a00356.html#aa569255bc251cd90cb2d0f6b710164bc":[17,0,1,1,6,64], +"a00356.html#aa5b4cb5be95861466fff33fe0d5a9020":[17,0,1,1,6,206], +"a00356.html#aa667451bf2e061c3e76a7a8a5d8b86d4":[17,0,1,1,6,145], +"a00356.html#aa66ad8429261c1ba13d064d660d6d464":[17,0,1,1,6,305], +"a00356.html#aa72601de2238c09393f120f68abf66a4":[17,0,1,1,6,249] }; diff --git a/navtreeindex10.js b/navtreeindex10.js index 327399bae..046887b23 100644 --- a/navtreeindex10.js +++ b/navtreeindex10.js @@ -1,86 +1,105 @@ var NAVTREEINDEX10 = { -"dir_fe677a742bdf73affcb7505b38a59233.html":[16,0,1,1], -"files.html":[16,0], -"functions.html":[15,3,0], -"functions_func.html":[15,3,1], -"functions_vars.html":[15,3,2], -"globals.html":[16,1,0], -"globals.html":[16,1,0,0], -"globals_b.html":[16,1,0,1], -"globals_c.html":[16,1,0,2], -"globals_d.html":[16,1,0,3], -"globals_defs.html":[16,1,6], -"globals_defs.html":[16,1,6,0], -"globals_defs_b.html":[16,1,6,1], -"globals_defs_c.html":[16,1,6,2], -"globals_defs_d.html":[16,1,6,3], -"globals_defs_e.html":[16,1,6,4], -"globals_defs_g.html":[16,1,6,5], -"globals_defs_h.html":[16,1,6,6], -"globals_defs_i.html":[16,1,6,7], -"globals_defs_k.html":[16,1,6,8], -"globals_defs_l.html":[16,1,6,9], -"globals_defs_m.html":[16,1,6,10], -"globals_defs_n.html":[16,1,6,11], -"globals_defs_o.html":[16,1,6,12], -"globals_defs_p.html":[16,1,6,13], -"globals_defs_r.html":[16,1,6,14], -"globals_defs_s.html":[16,1,6,15], -"globals_defs_u.html":[16,1,6,16], -"globals_defs_v.html":[16,1,6,17], -"globals_defs_w.html":[16,1,6,18], -"globals_e.html":[16,1,0,4], -"globals_enum.html":[16,1,4], -"globals_eval.html":[16,1,5], -"globals_func.html":[16,1,1,0], -"globals_func.html":[16,1,1], -"globals_func_b.html":[16,1,1,1], -"globals_func_c.html":[16,1,1,2], -"globals_func_d.html":[16,1,1,3], -"globals_func_h.html":[16,1,1,4], -"globals_func_i.html":[16,1,1,5], -"globals_func_k.html":[16,1,1,6], -"globals_func_l.html":[16,1,1,7], -"globals_func_n.html":[16,1,1,8], -"globals_func_p.html":[16,1,1,9], -"globals_func_r.html":[16,1,1,10], -"globals_func_s.html":[16,1,1,11], -"globals_func_t.html":[16,1,1,12], -"globals_func_w.html":[16,1,1,13], -"globals_g.html":[16,1,0,5], -"globals_h.html":[16,1,0,6], -"globals_i.html":[16,1,0,7], -"globals_k.html":[16,1,0,8], -"globals_l.html":[16,1,0,9], -"globals_m.html":[16,1,0,10], -"globals_n.html":[16,1,0,11], -"globals_o.html":[16,1,0,12], -"globals_p.html":[16,1,0,13], -"globals_r.html":[16,1,0,14], -"globals_s.html":[16,1,0,15], -"globals_t.html":[16,1,0,16], -"globals_type.html":[16,1,3], -"globals_u.html":[16,1,0,17], -"globals_v.html":[16,1,0,18], -"globals_vars.html":[16,1,2], -"globals_w.html":[16,1,0,19], -"hierarchy.html":[15,2], +"dir_0680cb466dcc0d680630f5d267d4b7d1.html":[17,0,0,4], +"dir_0f8c318486f9c8f97febe2dc0542d496.html":[17,0,1,5], +"dir_18075c3a94726308684965563d2ee6c8.html":[17,0,0,0], +"dir_26647cdac0a1f8c717d44b4eb3b4ec89.html":[17,0,1,0], +"dir_2d87885bbe6729211aeb398dfc685454.html":[17,0,0,6], +"dir_39966be8f8e069f6fa92c98611834f6b.html":[17,0,1,2,0], +"dir_6319b470d978b666f57c44c2de446197.html":[17,0,0,5], +"dir_695be77052103537ae3c41f50bd7e0cc.html":[17,0,1,2], +"dir_87abda79916a436a3f9fdf465608c5f5.html":[17,0,0,1], +"dir_92f10bc6a7ace15606cb0622f4eb49bb.html":[17,0,0,2], +"dir_97aefd0d527b934f1d99a682da8fe6a9.html":[17,0,1], +"dir_b2187fb9aff39e17c00391b7def58804.html":[17,0,1,4], +"dir_b3c25b642613ea6a80d1cd59c6d313a8.html":[17,0,1,8], +"dir_b9d9bcd31faf1443658640fef106169e.html":[17,0,1,9], +"dir_c4875bffc6c901e8f9ea57d13c10be7a.html":[17,0,1,6], +"dir_d422163b96683743ed3963d4aac17747.html":[17,0,0], +"dir_dbc902ed54f25d1382ab433b67c4a47f.html":[17,0,0,3], +"dir_e870e4dac26de7990352b1cb7547818f.html":[17,0,1,3], +"dir_ec1cbef6cba079ce838897574eab818a.html":[17,0,1,7], +"dir_fe677a742bdf73affcb7505b38a59233.html":[17,0,1,1], +"files.html":[17,0], +"functions.html":[16,3,0], +"functions_func.html":[16,3,1], +"functions_vars.html":[16,3,2], +"globals.html":[17,1,0], +"globals.html":[17,1,0,0], +"globals_b.html":[17,1,0,1], +"globals_c.html":[17,1,0,2], +"globals_d.html":[17,1,0,3], +"globals_defs.html":[17,1,6], +"globals_defs.html":[17,1,6,0], +"globals_defs_b.html":[17,1,6,1], +"globals_defs_c.html":[17,1,6,2], +"globals_defs_d.html":[17,1,6,3], +"globals_defs_e.html":[17,1,6,4], +"globals_defs_g.html":[17,1,6,5], +"globals_defs_h.html":[17,1,6,6], +"globals_defs_i.html":[17,1,6,7], +"globals_defs_k.html":[17,1,6,8], +"globals_defs_l.html":[17,1,6,9], +"globals_defs_m.html":[17,1,6,10], +"globals_defs_n.html":[17,1,6,11], +"globals_defs_o.html":[17,1,6,12], +"globals_defs_p.html":[17,1,6,13], +"globals_defs_r.html":[17,1,6,14], +"globals_defs_s.html":[17,1,6,15], +"globals_defs_u.html":[17,1,6,16], +"globals_defs_v.html":[17,1,6,17], +"globals_defs_w.html":[17,1,6,18], +"globals_e.html":[17,1,0,4], +"globals_enum.html":[17,1,4], +"globals_eval.html":[17,1,5], +"globals_func.html":[17,1,1,0], +"globals_func.html":[17,1,1], +"globals_func_b.html":[17,1,1,1], +"globals_func_c.html":[17,1,1,2], +"globals_func_d.html":[17,1,1,3], +"globals_func_h.html":[17,1,1,4], +"globals_func_i.html":[17,1,1,5], +"globals_func_k.html":[17,1,1,6], +"globals_func_l.html":[17,1,1,7], +"globals_func_n.html":[17,1,1,8], +"globals_func_p.html":[17,1,1,9], +"globals_func_r.html":[17,1,1,10], +"globals_func_s.html":[17,1,1,11], +"globals_func_t.html":[17,1,1,12], +"globals_func_w.html":[17,1,1,13], +"globals_g.html":[17,1,0,5], +"globals_h.html":[17,1,0,6], +"globals_i.html":[17,1,0,7], +"globals_k.html":[17,1,0,8], +"globals_l.html":[17,1,0,9], +"globals_m.html":[17,1,0,10], +"globals_n.html":[17,1,0,11], +"globals_o.html":[17,1,0,12], +"globals_p.html":[17,1,0,13], +"globals_r.html":[17,1,0,14], +"globals_s.html":[17,1,0,15], +"globals_t.html":[17,1,0,16], +"globals_type.html":[17,1,3], +"globals_u.html":[17,1,0,17], +"globals_v.html":[17,1,0,18], +"globals_vars.html":[17,1,2], +"globals_w.html":[17,1,0,19], +"hierarchy.html":[16,2], "index.html":[], "index.html":[0], -"index.html#autotoc_md50":[0,0], -"index.html#autotoc_md51":[0,1], -"index.html#autotoc_md52":[0,2], -"index.html#autotoc_md53":[0,3], -"index.html#autotoc_md54":[0,4], -"index.html#autotoc_md55":[0,5], -"index.html#autotoc_md56":[0,6], -"index.html#autotoc_md57":[0,7], -"index.html#autotoc_md58":[0,8], -"index.html#autotoc_md59":[0,8,0], -"modules.html":[13], -"namespacemembers.html":[14,1,0], -"namespacemembers_func.html":[14,1,1], -"namespaces.html":[14,0], +"index.html#autotoc_md51":[0,0], +"index.html#autotoc_md52":[0,1], +"index.html#autotoc_md53":[0,2], +"index.html#autotoc_md54":[0,3], +"index.html#autotoc_md55":[0,4], +"index.html#autotoc_md56":[0,5], +"index.html#autotoc_md57":[0,6], +"index.html#autotoc_md58":[0,7], +"index.html#autotoc_md59":[0,8], +"index.html#autotoc_md60":[0,8,0], +"modules.html":[14], +"namespacemembers.html":[15,1,0], +"namespacemembers_func.html":[15,1,1], +"namespaces.html":[15,0], "pages.html":[] }; diff --git a/navtreeindex2.js b/navtreeindex2.js index c74b638ab..2c5fd208d 100644 --- a/navtreeindex2.js +++ b/navtreeindex2.js @@ -1,253 +1,253 @@ var NAVTREEINDEX2 = { -"a00350.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39":[16,0,1,1,6,246], -"a00350.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0":[16,0,1,1,6,290], -"a00350.html#aabf82974c18252bcd0c48ee99af75dfb":[16,0,1,1,6,388], -"a00350.html#aabff3f5b7f5391c27a0329ff0c997264":[16,0,1,1,6,370], -"a00350.html#aac36b471fe92c252dd02a9d1cc2c65e2":[16,0,1,1,6,332], -"a00350.html#aac4e75cf70cf0cf946216ffefaf65525":[16,0,1,1,6,51], -"a00350.html#aac8020f191ca7ce2b1a81fcede9b5aa2":[16,0,1,1,6,382], -"a00350.html#aacd5623cd6f8eb12e7cdf22941f501dc":[16,0,1,1,6,427], -"a00350.html#aadb200c87d6dedb5768eeb8395e697c2":[16,0,1,1,6,130], -"a00350.html#aadcf0e639c6da291ddcb7fed49f1f967":[16,0,1,1,6,215], -"a00350.html#aae24f308513ed54fc7c41b39bc05760b":[16,0,1,1,6,199], -"a00350.html#aae43276ff3f774ffd928ad1776592c7b":[16,0,1,1,6,390], -"a00350.html#aae5866a78d2f0464b04eee9ef1f97030":[16,0,1,1,6,435], -"a00350.html#aae92bdb9d72ad6bd2193cbf0e672d46e":[16,0,1,1,6,216], -"a00350.html#aaf599e8acc392c2ef07eba93eafc474d":[16,0,1,1,6,258], -"a00350.html#aaffdf30ca558bdd5f772578742835306":[16,0,1,1,6,271], -"a00350.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771":[16,0,1,1,6,96], -"a00350.html#ab09e6f726235fba47a2ea3f49cbfc2cb":[16,0,1,1,6,399], -"a00350.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0":[16,0,1,1,6,85], -"a00350.html#ab1be0c05faf7ef0c161f34cb6b0c4e28":[16,0,1,1,6,150], -"a00350.html#ab24f797b7c19e899ef753d9901850e44":[16,0,1,1,6,13], -"a00350.html#ab2c08e9a862fce29e741ef2b75918a8e":[16,0,1,1,6,34], -"a00350.html#ab45a164ee20c8320318a3bc5e2eaa31f":[16,0,1,1,6,407], -"a00350.html#ab4657866a69a00b9b3bfa4df51521fa6":[16,0,1,1,6,335], -"a00350.html#ab568e0ec9f976d91d7940c227e8d73ee":[16,0,1,1,6,289], -"a00350.html#ab65b17098ebc6027a9240ca84c07ab5c":[16,0,1,1,6,306], -"a00350.html#ab6782a07fce203169aba6dd32f8ab123":[16,0,1,1,6,158], -"a00350.html#ab79b57111a49362bd51922813cb84355":[16,0,1,1,6,154], -"a00350.html#ab887d70e4a421cf2bcab6b77feba4134":[16,0,1,1,6,285], -"a00350.html#aba61a1bd245d7471e59a39577498065b":[16,0,1,1,6,155], -"a00350.html#aba7cf525ec69429e947f294361e1cdab":[16,0,1,1,6,308], -"a00350.html#abaaa930c2275599fcc3d83cfc02bfafe":[16,0,1,1,6,74], -"a00350.html#abae30386c46658676cf11de7bec27138":[16,0,1,1,6,208], -"a00350.html#abbbbd4cd4cc05e2ea023f059676aa37e":[16,0,1,1,6,10], -"a00350.html#abbfeec0d0247336b8c6e993d4db17d11":[16,0,1,1,6,357], -"a00350.html#abc21880360bdce990ad724fa7a7d9bf0":[16,0,1,1,6,153], -"a00350.html#abc722de99f444668d09e3815fcc78400":[16,0,1,1,6,127], -"a00350.html#abd28a29107703b43a734301acf491f5c":[16,0,1,1,6,324], -"a00350.html#abdbb7fc88ccf13d556dce6de3df9ce1b":[16,0,1,1,6,239], -"a00350.html#abe02b5e0e9bb8cb4c2a727549c14ae55":[16,0,1,1,6,386], -"a00350.html#abe16121ea22ed08080997a2cfae1c125":[16,0,1,1,6,25], -"a00350.html#abec02770ab378eea5c604269dc8c024a":[16,0,1,1,6,384], -"a00350.html#abeef4ff866116f4e17a6c3ad94b0a286":[16,0,1,1,6,114], -"a00350.html#abf2bad62bab02224f51d67f6725575a4":[16,0,1,1,6,327], -"a00350.html#ac02ad2aea02f18d833e6e0631ae839ad":[16,0,1,1,6,429], -"a00350.html#ac0386500d37b5502158a62b8d864580f":[16,0,1,1,6,135], -"a00350.html#ac049629a826435702055cc8279db76bb":[16,0,1,1,6,219], -"a00350.html#ac06e8b2502bc78fda0d33dcd3e11525a":[16,0,1,1,6,245], -"a00350.html#ac0fb0edb797b754a069e12931a001257":[16,0,1,1,6,193], -"a00350.html#ac101f854026596231715eca664550e36":[16,0,1,1,6,147], -"a00350.html#ac227802d9a5680688ac4c2b23b38273c":[16,0,1,1,6,56], -"a00350.html#ac2d5b5de26d0318ba6db3ad1055eb6ec":[16,0,1,1,6,148], -"a00350.html#ac3b1177210ba941afa527bacbcfd4fab":[16,0,1,1,6,179], -"a00350.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad":[16,0,1,1,6,117], -"a00350.html#ac3f89b5db216fd58ae2de3ebd52e26c5":[16,0,1,1,6,137], -"a00350.html#ac51f4a863e071bce52c995ddae7e2144":[16,0,1,1,6,287], -"a00350.html#ac6d810ee00947694d9b95d95db0b2f3c":[16,0,1,1,6,139], -"a00350.html#ac75be9d5426dcf6ee196a788a35ee54b":[16,0,1,1,6,417], -"a00350.html#ac7e5a54695b8bd9e5087ebb94df70b39":[16,0,1,1,6,360], -"a00350.html#ac846e3f7c924497d70254125dae38dce":[16,0,1,1,6,310], -"a00350.html#ac892dbe1953c43e7e17b1d51ce967c9e":[16,0,1,1,6,409], -"a00350.html#ac9405ff4647b09a6d8ab7a4d8a091ee8":[16,0,1,1,6,44], -"a00350.html#ac978ae798bc2c020c7b8a2e5a258016e":[16,0,1,1,6,36], -"a00350.html#acbec80dc1b5f24d3013c2a9b06c11bdc":[16,0,1,1,6,84], -"a00350.html#acd5976f898b9f67ea8e21df4e27fb712":[16,0,1,1,6,174], -"a00350.html#acd9a7a2257f664a4f9f674d37eb95bef":[16,0,1,1,6,349], -"a00350.html#ace51b2a4dc8622ac3c03780dc369355e":[16,0,1,1,6,418], -"a00350.html#ace94188e9d741a9b44616474b633064f":[16,0,1,1,6,72], -"a00350.html#aced5221c0f15440eb52fa9f460956443":[16,0,1,1,6,375], -"a00350.html#acf9c81ae1249f3c174ec75cf65517176":[16,0,1,1,6,321], -"a00350.html#acff2b897c994e1444f8e94e638c25c74":[16,0,1,1,6,272], -"a00350.html#ad0c3da8203a3be6755e86cda96e00228":[16,0,1,1,6,288], -"a00350.html#ad10e2a3c801be9002d53af14357dbe9f":[16,0,1,1,6,342], -"a00350.html#ad222baf9301d2d35a5c928a0d91c4335":[16,0,1,1,6,319], -"a00350.html#ad2eacbf59056d95e69b60f21beaafcb1":[16,0,1,1,6,402], -"a00350.html#ad325831ee2326885795706efd7b3b00e":[16,0,1,1,6,88], -"a00350.html#ad3d431e17094b6690d443e0a038da9e2":[16,0,1,1,6,102], -"a00350.html#ad410516c4b4eb448a333eb3ed1f7b288":[16,0,1,1,6,38], -"a00350.html#ad42195362cd7dca0acabc8739c9a6fc4":[16,0,1,1,6,363], -"a00350.html#ad5b035b6f65f87b7fdf75f225a54ce35":[16,0,1,1,6,194], -"a00350.html#ad5b1ead29f3ce3cee52d106af531ab86":[16,0,1,1,6,170], -"a00350.html#ad5c40b78682251cb07855e58bcf29f82":[16,0,1,1,6,412], -"a00350.html#ad6f89d1bb03ed8d84e230bedca57ddd9":[16,0,1,1,6,140], -"a00350.html#ad742aca4fbd1b833423eeb7ce90a6743":[16,0,1,1,6,296], -"a00350.html#ad74ed86697c0977d4e0a2451068b7131":[16,0,1,1,6,298], -"a00350.html#ad792a3c825c32832a9b6292bfe028d32":[16,0,1,1,6,186], -"a00350.html#ad79706b7b1e6c0e0d29afe692d8d5c06":[16,0,1,1,6,316], -"a00350.html#ad7e0df789060db2a9e8339972eac2482":[16,0,1,1,6,240], -"a00350.html#ad83ef570608a572d2dd99e6954e14d40":[16,0,1,1,6,278], -"a00350.html#ada37181a648dd51b374eec1cbb4bbaa3":[16,0,1,1,6,352], -"a00350.html#adb6b7f50e3d8af5d2de64f3bd4c83332":[16,0,1,1,6,256], -"a00350.html#adb7f53410523734e4c9485f2d71e7791":[16,0,1,1,6,414], -"a00350.html#adc25fc4bebaac1582bb57d791f72356d":[16,0,1,1,6,166], -"a00350.html#add994f7919c2f2b076f25ff207432686":[16,0,1,1,6,391], -"a00350.html#addd73b0088cc98d40eaf8b3370f2fc8e":[16,0,1,1,6,230], -"a00350.html#adec1fd29e8c6b2f804fc4050778dafc8":[16,0,1,1,6,183], -"a00350.html#adf58a677811566e8446870523bb65850":[16,0,1,1,6,181], -"a00350.html#adffd78899cf3d3dd18afc5ce3c54acb4":[16,0,1,1,6,267], -"a00350.html#ae16e61d55b371f9c5e31f08f680de609":[16,0,1,1,6,209], -"a00350.html#ae273cfc99b8538b3c81ba8240a6ff425":[16,0,1,1,6,320], -"a00350.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5":[16,0,1,1,6,263], -"a00350.html#ae2b34b443ce2e0f285dd8d6f34f84d70":[16,0,1,1,6,204], -"a00350.html#ae3f2d180d7f35d9a7876a28972f2f587":[16,0,1,1,6,281], -"a00350.html#ae41108996848638519849163e51cd10a":[16,0,1,1,6,437], -"a00350.html#ae496c798891069e04802bbac7d96e0f5":[16,0,1,1,6,122], -"a00350.html#ae52318f0263884ff3a3e67328138cc75":[16,0,1,1,6,70], -"a00350.html#ae56700f2b05067288af3cc4af8e7f34d":[16,0,1,1,6,392], -"a00350.html#ae591dd29af805fc5b63e5b06d5e7c450":[16,0,1,1,6,191], -"a00350.html#ae5ad3c81d0b62f4b86a4a0dc84a79134":[16,0,1,1,6,368], -"a00350.html#ae5da70c1f37ee40a0cf4edc459d5840a":[16,0,1,1,6,262], -"a00350.html#ae757542e1c4d4815e1dc8db034dca476":[16,0,1,1,6,113], -"a00350.html#ae7b4dae38c2b38b25e43dc7ff4959764":[16,0,1,1,6,164], -"a00350.html#ae7cfb9eb789137f5ea9195a7a4f6b11e":[16,0,1,1,6,373], -"a00350.html#ae80ecfb4c696095b5627988cc7c9cde0":[16,0,1,1,6,425], -"a00350.html#ae814b4e63476d137bf226537cb2ff0fc":[16,0,1,1,6,223], -"a00350.html#ae82dca54cc3fd1cc2f1671e98d64df07":[16,0,1,1,6,434], -"a00350.html#ae8b9077022cc706947fdc8b45a573d81":[16,0,1,1,6,45], -"a00350.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0":[16,0,1,1,6,309], -"a00350.html#aeb307ed9134e0fa2f0fcbdaf7b01515d":[16,0,1,1,6,356], -"a00350.html#aeb3783d1cdf4f9c1217d030bc0386fad":[16,0,1,1,6,322], -"a00350.html#aeb7623b070997b65f0bb108abf8e5f44":[16,0,1,1,6,314], -"a00350.html#aed2edebc2be522d7bb38f85d273406f9":[16,0,1,1,6,326], -"a00350.html#aee08925a21e8dbf05f8557617e3f610e":[16,0,1,1,6,224], -"a00350.html#aee1a29942cf2b3637a65506dc6b5d4fe":[16,0,1,1,6,184], -"a00350.html#aee95b219cf932dfedb3a3c5e23d01a9d":[16,0,1,1,6,156], -"a00350.html#aef76930f6d419fc30841be04fe6ac8d6":[16,0,1,1,6,123], -"a00350.html#af0ac761b64981003336d72c34df3d2e3":[16,0,1,1,6,423], -"a00350.html#af0cca41df253e49372d6853d4f5c406b":[16,0,1,1,6,396], -"a00350.html#af120353f5e8e159eaa9c930555b159d5":[16,0,1,1,6,163], -"a00350.html#af12673d4006ff926c863b2d0f9038561":[16,0,1,1,6,315], -"a00350.html#af3461e50ec2b06201d17feee167e0a4b":[16,0,1,1,6,408], -"a00350.html#af3729ff16ba78ef4a6b70c341e81c749":[16,0,1,1,6,405], -"a00350.html#af397e129e4581162f91873358b5f1538":[16,0,1,1,6,57], -"a00350.html#af42b60e97bdf4bf0338b8a5ce420fdc5":[16,0,1,1,6,218], -"a00350.html#af4aab184dc60e2de854994d26d57dfde":[16,0,1,1,6,83], -"a00350.html#af54068dbf6ecb7bf8b1881caa0f3b89f":[16,0,1,1,6,9], -"a00350.html#af5a93b147dd08b111b348edd1bc82fa5":[16,0,1,1,6,248], -"a00350.html#af7ee0188ab539a350a6da19fe3f34a72":[16,0,1,1,6,276], -"a00350.html#af83ceba3654b1b76e216402a023c1578":[16,0,1,1,6,214], -"a00350.html#af9f464ac4065aff75f5967933725d665":[16,0,1,1,6,318], -"a00350.html#afa043ddb1952520a2bba28ac41a98f93":[16,0,1,1,6,53], -"a00350.html#afa19443ca4e054e38a7599c37575678d":[16,0,1,1,6,236], -"a00350.html#afa24177621a8a2fbe041ef0ce73a414d":[16,0,1,1,6,304], -"a00350.html#afab9546447cf1e0020c32d298a1d897f":[16,0,1,1,6,350], -"a00350.html#afabb67121c9c58fac9829287b55a2389":[16,0,1,1,6,3], -"a00350.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8":[16,0,1,1,6,436], -"a00350.html#afbd09beedecedcf316a6c02e40d1e712":[16,0,1,1,6,347], -"a00350.html#afd20c2250b83786f216a100bde94a670":[16,0,1,1,6,125], -"a00350.html#afd812ab5b70a92a4d3a420c4f7106ac5":[16,0,1,1,6,76], -"a00350.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2":[16,0,1,1,6,266], -"a00350.html#afeaf2094813c3184f0f128c37e3297dd":[16,0,1,1,6,234], -"a00350.html#aff659b1042abf6e1376e38ccb4a20f3e":[16,0,1,1,6,430], -"a00350.html#affa79c933fa76585479228b15c2cbc83":[16,0,1,1,6,138], -"a00353.html":[16,0,1,1,7], -"a00353.html#a3801cb49b78666a9cfa602fa74b22da9":[16,0,1,1,7,2], -"a00353.html#a467882792e9ea53b4e596d1be05997a6":[16,0,1,1,7,5], -"a00353.html#a611611e20ca91cad7e9897847b9b355a":[16,0,1,1,7,1], -"a00353.html#a64cbcf66a79f024ae3cce06d1f6731f9":[16,0,1,1,7,13], -"a00353.html#a671b3421327a5c885b0c3e6e1e64afe7":[16,0,1,1,7,10], -"a00353.html#a67ed014df4e1bbbea873ede0e9700e29":[16,0,1,1,7,3], -"a00353.html#a84c51bc36228a8fadd8654bfaae5d58c":[16,0,1,1,7,4], -"a00353.html#a9802710200f050b0e9414bd88cdd8c0d":[16,0,1,1,7,8], -"a00353.html#ab13bbafe02599813084788482536728f":[16,0,1,1,7,6], -"a00353.html#ab46a8196f24bde7c86ac5e3affdc8ff8":[16,0,1,1,7,9], -"a00353.html#ac419953cd10efa4bef6e4efdc9c6cbe9":[16,0,1,1,7,11], -"a00353.html#ac629bf5f0b5d6c64c5393cadd7b7479c":[16,0,1,1,7,7], -"a00353.html#ae841eeabdfbe04dd3241f6fde1a57954":[16,0,1,1,7,12], -"a00353.html#af19794adbeec8b57eb7cbef1f9e21c91":[16,0,1,1,7,0], -"a00356.html":[16,0,1,1,8], -"a00359.html":[16,0,1,1,9], -"a00362.html":[16,0,1,1,10], -"a00365.html":[16,0,1,1,11], -"a00368.html":[16,0,1,1,12], -"a00371.html":[16,0,1,1,13], -"a00371.html#a19fc558e09f03a2f8f5ee89b1e396b2e":[16,0,1,1,13,0], -"a00371.html#aa08ad4e89a8218e9598abbd36c11d07a":[16,0,1,1,13,1], -"a00374.html":[16,0,1,1,14], -"a00374.html#a19fc558e09f03a2f8f5ee89b1e396b2e":[16,0,1,1,14,6], -"a00374.html#a1c46cc5ed5e30945d62e9ea369c94cdb":[16,0,1,1,14,4], -"a00374.html#a525ae62bb76a8ba01d4d85264f832c8e":[16,0,1,1,14,2], -"a00374.html#a55c5fe347b23c42f6359e97ae82b4729":[16,0,1,1,14,5], -"a00374.html#a8dd3e14e93cec4aea30e27104935d51b":[16,0,1,1,14,3], -"a00374.html#aa08ad4e89a8218e9598abbd36c11d07a":[16,0,1,1,14,7], -"a00374.html#ac7946c257bcbaf0e1589e960b83d23df":[16,0,1,1,14,1], -"a00377.html":[16,0,1,1,15], -"a00380.html":[16,0,1,1,16], -"a00383.html":[16,0,1,1,17], -"a00386.html":[16,0,1,1,18], -"a00389.html":[16,0,1,1,19], -"a00392.html":[16,0,1,1,20], -"a00395.html":[16,0,1,1,21], -"a00398.html":[16,0,1,1,22], -"a00401.html":[16,0,1,1,23], -"a00404.html":[16,0,1,1,24], -"a00407.html":[16,0,1,1,25], -"a00410.html":[16,0,1,1,26], -"a00413.html":[16,0,1,1,27], -"a00416.html":[16,0,1,1,28], -"a00419.html":[16,0,1,1,29], -"a00422.html":[16,0,1,1,30], -"a00425.html":[16,0,1,1,31], -"a00428.html":[16,0,1,1,32], -"a00431.html":[16,0,1,1,33], -"a00446.html":[16,0,1,2,1], -"a00449.html":[16,0,1,2,2], -"a00452.html":[16,0,1,2,3], -"a00455.html":[16,0,1,2,4], -"a00458.html":[16,0,1,2,5], -"a00461.html":[16,0,1,2,6], -"a00464.html":[16,0,1,2,7], -"a00467.html":[16,0,1,2,8], -"a00470.html":[16,0,1,2,9], -"a00473.html":[16,0,1,2,10], -"a00476.html":[16,0,1,2,11], -"a00479.html":[16,0,1,2,12], -"a00482.html":[16,0,1,2,13], -"a00485.html":[16,0,1,2,14], -"a00488.html":[16,0,1,2,15], -"a00488.html#a1996786ea061102926ef0ba52a510bfd":[16,0,1,2,15,2], -"a00488.html#a23ae19deaff29f2796c4981962ca9b55":[16,0,1,2,15,0], -"a00488.html#a28cb83338bbbc858be983299cede3ba9":[16,0,1,2,15,6], -"a00488.html#a6569901e92e84b0b448794f8a89d1d9e":[16,0,1,2,15,4], -"a00488.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd":[16,0,1,2,15,5], -"a00488.html#ac2eb887016e59054e626341175577669":[16,0,1,2,15,1], -"a00488.html#ae638244ab3ba72e50b974f763e2abc42":[16,0,1,2,15,3], -"a00488.html#af273e717452d3e5295d20197b4615ed0":[16,0,1,2,15,7], -"a00491.html":[16,0,1,2,16], -"a00491.html#a094297d2dd0a7e2b4606fc37fc797fcd":[16,0,1,2,16,9], -"a00491.html#a18071ade62f5d4b39e444ca87548e31e":[16,0,1,2,16,2], -"a00491.html#a2cf377cd3579f3ba898ec2391835cfd5":[16,0,1,2,16,4], -"a00491.html#a2e5e1b4f8da8d151569d6ff0133b43ec":[16,0,1,2,16,0], -"a00491.html#a5a3020c4884811361247f771da67b9a5":[16,0,1,2,16,1], -"a00491.html#a6d2fa2e22a151bea100d7c7ee84dbe7f":[16,0,1,2,16,5], -"a00491.html#a7eeef6ad76dccb48d8b1741a9254af97":[16,0,1,2,16,10], -"a00491.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[16,0,1,2,16,7], -"a00491.html#a99dab792a5983a089fe816abc57bad25":[16,0,1,2,16,8], -"a00491.html#aa46ae7101b70ba482359edccca83f414":[16,0,1,2,16,3], -"a00491.html#add878e0ecc6c87b683935f418f403c7e":[16,0,1,2,16,6], -"a00494.html":[16,0,1,2,0,0], -"a00497.html":[16,0,1,2,0,1], -"a00500.html":[16,0,1,2,0,2], -"a00503.html":[16,0,1,2,0,3], -"a00506.html":[16,0,1,31], -"a00506.html#a850ec56b408fccccaea5826d452c3a64":[16,0,1,31,3], -"a00506.html#a85e0a506bd6fdae6ce32d5df3a48ac1c":[16,0,1,31,0], -"a00506.html#ae0df4b9151bb3d807bc1c532036c6d88":[16,0,1,31,2], -"a00506.html#ae559b402c678cc51f8252b927b8781e5":[16,0,1,31,1], -"a00512.html":[16,0,1,3,0], -"a00515.html":[16,0,1,3,1], -"a00524.html":[16,0,1,3,2] +"a00356.html#aa914251d0e03f7d1850ee04296715f14":[17,0,1,1,6,297], +"a00356.html#aaabcd1e4afb29088a17f7e87e7136e24":[17,0,1,1,6,112], +"a00356.html#aabaee03887c7e4403ac4936d9cde406e":[17,0,1,1,6,26], +"a00356.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39":[17,0,1,1,6,246], +"a00356.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0":[17,0,1,1,6,290], +"a00356.html#aabf82974c18252bcd0c48ee99af75dfb":[17,0,1,1,6,388], +"a00356.html#aabff3f5b7f5391c27a0329ff0c997264":[17,0,1,1,6,370], +"a00356.html#aac36b471fe92c252dd02a9d1cc2c65e2":[17,0,1,1,6,332], +"a00356.html#aac4e75cf70cf0cf946216ffefaf65525":[17,0,1,1,6,51], +"a00356.html#aac8020f191ca7ce2b1a81fcede9b5aa2":[17,0,1,1,6,382], +"a00356.html#aacd5623cd6f8eb12e7cdf22941f501dc":[17,0,1,1,6,427], +"a00356.html#aadb200c87d6dedb5768eeb8395e697c2":[17,0,1,1,6,130], +"a00356.html#aadcf0e639c6da291ddcb7fed49f1f967":[17,0,1,1,6,215], +"a00356.html#aae24f308513ed54fc7c41b39bc05760b":[17,0,1,1,6,199], +"a00356.html#aae43276ff3f774ffd928ad1776592c7b":[17,0,1,1,6,390], +"a00356.html#aae5866a78d2f0464b04eee9ef1f97030":[17,0,1,1,6,435], +"a00356.html#aae92bdb9d72ad6bd2193cbf0e672d46e":[17,0,1,1,6,216], +"a00356.html#aaf599e8acc392c2ef07eba93eafc474d":[17,0,1,1,6,258], +"a00356.html#aaffdf30ca558bdd5f772578742835306":[17,0,1,1,6,271], +"a00356.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771":[17,0,1,1,6,96], +"a00356.html#ab09e6f726235fba47a2ea3f49cbfc2cb":[17,0,1,1,6,399], +"a00356.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0":[17,0,1,1,6,85], +"a00356.html#ab1be0c05faf7ef0c161f34cb6b0c4e28":[17,0,1,1,6,150], +"a00356.html#ab24f797b7c19e899ef753d9901850e44":[17,0,1,1,6,13], +"a00356.html#ab2c08e9a862fce29e741ef2b75918a8e":[17,0,1,1,6,34], +"a00356.html#ab45a164ee20c8320318a3bc5e2eaa31f":[17,0,1,1,6,407], +"a00356.html#ab4657866a69a00b9b3bfa4df51521fa6":[17,0,1,1,6,335], +"a00356.html#ab568e0ec9f976d91d7940c227e8d73ee":[17,0,1,1,6,289], +"a00356.html#ab65b17098ebc6027a9240ca84c07ab5c":[17,0,1,1,6,306], +"a00356.html#ab6782a07fce203169aba6dd32f8ab123":[17,0,1,1,6,158], +"a00356.html#ab79b57111a49362bd51922813cb84355":[17,0,1,1,6,154], +"a00356.html#ab887d70e4a421cf2bcab6b77feba4134":[17,0,1,1,6,285], +"a00356.html#aba61a1bd245d7471e59a39577498065b":[17,0,1,1,6,155], +"a00356.html#aba7cf525ec69429e947f294361e1cdab":[17,0,1,1,6,308], +"a00356.html#abaaa930c2275599fcc3d83cfc02bfafe":[17,0,1,1,6,74], +"a00356.html#abae30386c46658676cf11de7bec27138":[17,0,1,1,6,208], +"a00356.html#abbbbd4cd4cc05e2ea023f059676aa37e":[17,0,1,1,6,10], +"a00356.html#abbfeec0d0247336b8c6e993d4db17d11":[17,0,1,1,6,357], +"a00356.html#abc21880360bdce990ad724fa7a7d9bf0":[17,0,1,1,6,153], +"a00356.html#abc722de99f444668d09e3815fcc78400":[17,0,1,1,6,127], +"a00356.html#abd28a29107703b43a734301acf491f5c":[17,0,1,1,6,324], +"a00356.html#abdbb7fc88ccf13d556dce6de3df9ce1b":[17,0,1,1,6,239], +"a00356.html#abe02b5e0e9bb8cb4c2a727549c14ae55":[17,0,1,1,6,386], +"a00356.html#abe16121ea22ed08080997a2cfae1c125":[17,0,1,1,6,25], +"a00356.html#abec02770ab378eea5c604269dc8c024a":[17,0,1,1,6,384], +"a00356.html#abeef4ff866116f4e17a6c3ad94b0a286":[17,0,1,1,6,114], +"a00356.html#abf2bad62bab02224f51d67f6725575a4":[17,0,1,1,6,327], +"a00356.html#ac02ad2aea02f18d833e6e0631ae839ad":[17,0,1,1,6,429], +"a00356.html#ac0386500d37b5502158a62b8d864580f":[17,0,1,1,6,135], +"a00356.html#ac049629a826435702055cc8279db76bb":[17,0,1,1,6,219], +"a00356.html#ac06e8b2502bc78fda0d33dcd3e11525a":[17,0,1,1,6,245], +"a00356.html#ac0fb0edb797b754a069e12931a001257":[17,0,1,1,6,193], +"a00356.html#ac101f854026596231715eca664550e36":[17,0,1,1,6,147], +"a00356.html#ac227802d9a5680688ac4c2b23b38273c":[17,0,1,1,6,56], +"a00356.html#ac2d5b5de26d0318ba6db3ad1055eb6ec":[17,0,1,1,6,148], +"a00356.html#ac3b1177210ba941afa527bacbcfd4fab":[17,0,1,1,6,179], +"a00356.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad":[17,0,1,1,6,117], +"a00356.html#ac3f89b5db216fd58ae2de3ebd52e26c5":[17,0,1,1,6,137], +"a00356.html#ac51f4a863e071bce52c995ddae7e2144":[17,0,1,1,6,287], +"a00356.html#ac6d810ee00947694d9b95d95db0b2f3c":[17,0,1,1,6,139], +"a00356.html#ac75be9d5426dcf6ee196a788a35ee54b":[17,0,1,1,6,417], +"a00356.html#ac7e5a54695b8bd9e5087ebb94df70b39":[17,0,1,1,6,360], +"a00356.html#ac846e3f7c924497d70254125dae38dce":[17,0,1,1,6,310], +"a00356.html#ac892dbe1953c43e7e17b1d51ce967c9e":[17,0,1,1,6,409], +"a00356.html#ac9405ff4647b09a6d8ab7a4d8a091ee8":[17,0,1,1,6,44], +"a00356.html#ac978ae798bc2c020c7b8a2e5a258016e":[17,0,1,1,6,36], +"a00356.html#acbec80dc1b5f24d3013c2a9b06c11bdc":[17,0,1,1,6,84], +"a00356.html#acd5976f898b9f67ea8e21df4e27fb712":[17,0,1,1,6,174], +"a00356.html#acd9a7a2257f664a4f9f674d37eb95bef":[17,0,1,1,6,349], +"a00356.html#ace51b2a4dc8622ac3c03780dc369355e":[17,0,1,1,6,418], +"a00356.html#ace94188e9d741a9b44616474b633064f":[17,0,1,1,6,72], +"a00356.html#aced5221c0f15440eb52fa9f460956443":[17,0,1,1,6,375], +"a00356.html#acf9c81ae1249f3c174ec75cf65517176":[17,0,1,1,6,321], +"a00356.html#acff2b897c994e1444f8e94e638c25c74":[17,0,1,1,6,272], +"a00356.html#ad0c3da8203a3be6755e86cda96e00228":[17,0,1,1,6,288], +"a00356.html#ad10e2a3c801be9002d53af14357dbe9f":[17,0,1,1,6,342], +"a00356.html#ad222baf9301d2d35a5c928a0d91c4335":[17,0,1,1,6,319], +"a00356.html#ad2eacbf59056d95e69b60f21beaafcb1":[17,0,1,1,6,402], +"a00356.html#ad325831ee2326885795706efd7b3b00e":[17,0,1,1,6,88], +"a00356.html#ad3d431e17094b6690d443e0a038da9e2":[17,0,1,1,6,102], +"a00356.html#ad410516c4b4eb448a333eb3ed1f7b288":[17,0,1,1,6,38], +"a00356.html#ad42195362cd7dca0acabc8739c9a6fc4":[17,0,1,1,6,363], +"a00356.html#ad5b035b6f65f87b7fdf75f225a54ce35":[17,0,1,1,6,194], +"a00356.html#ad5b1ead29f3ce3cee52d106af531ab86":[17,0,1,1,6,170], +"a00356.html#ad5c40b78682251cb07855e58bcf29f82":[17,0,1,1,6,412], +"a00356.html#ad6f89d1bb03ed8d84e230bedca57ddd9":[17,0,1,1,6,140], +"a00356.html#ad742aca4fbd1b833423eeb7ce90a6743":[17,0,1,1,6,296], +"a00356.html#ad74ed86697c0977d4e0a2451068b7131":[17,0,1,1,6,298], +"a00356.html#ad792a3c825c32832a9b6292bfe028d32":[17,0,1,1,6,186], +"a00356.html#ad79706b7b1e6c0e0d29afe692d8d5c06":[17,0,1,1,6,316], +"a00356.html#ad7e0df789060db2a9e8339972eac2482":[17,0,1,1,6,240], +"a00356.html#ad83ef570608a572d2dd99e6954e14d40":[17,0,1,1,6,278], +"a00356.html#ada37181a648dd51b374eec1cbb4bbaa3":[17,0,1,1,6,352], +"a00356.html#adb6b7f50e3d8af5d2de64f3bd4c83332":[17,0,1,1,6,256], +"a00356.html#adb7f53410523734e4c9485f2d71e7791":[17,0,1,1,6,414], +"a00356.html#adc25fc4bebaac1582bb57d791f72356d":[17,0,1,1,6,166], +"a00356.html#add994f7919c2f2b076f25ff207432686":[17,0,1,1,6,391], +"a00356.html#addd73b0088cc98d40eaf8b3370f2fc8e":[17,0,1,1,6,230], +"a00356.html#adec1fd29e8c6b2f804fc4050778dafc8":[17,0,1,1,6,183], +"a00356.html#adf58a677811566e8446870523bb65850":[17,0,1,1,6,181], +"a00356.html#adffd78899cf3d3dd18afc5ce3c54acb4":[17,0,1,1,6,267], +"a00356.html#ae16e61d55b371f9c5e31f08f680de609":[17,0,1,1,6,209], +"a00356.html#ae273cfc99b8538b3c81ba8240a6ff425":[17,0,1,1,6,320], +"a00356.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5":[17,0,1,1,6,263], +"a00356.html#ae2b34b443ce2e0f285dd8d6f34f84d70":[17,0,1,1,6,204], +"a00356.html#ae3f2d180d7f35d9a7876a28972f2f587":[17,0,1,1,6,281], +"a00356.html#ae41108996848638519849163e51cd10a":[17,0,1,1,6,437], +"a00356.html#ae496c798891069e04802bbac7d96e0f5":[17,0,1,1,6,122], +"a00356.html#ae52318f0263884ff3a3e67328138cc75":[17,0,1,1,6,70], +"a00356.html#ae56700f2b05067288af3cc4af8e7f34d":[17,0,1,1,6,392], +"a00356.html#ae591dd29af805fc5b63e5b06d5e7c450":[17,0,1,1,6,191], +"a00356.html#ae5ad3c81d0b62f4b86a4a0dc84a79134":[17,0,1,1,6,368], +"a00356.html#ae5da70c1f37ee40a0cf4edc459d5840a":[17,0,1,1,6,262], +"a00356.html#ae757542e1c4d4815e1dc8db034dca476":[17,0,1,1,6,113], +"a00356.html#ae7b4dae38c2b38b25e43dc7ff4959764":[17,0,1,1,6,164], +"a00356.html#ae7cfb9eb789137f5ea9195a7a4f6b11e":[17,0,1,1,6,373], +"a00356.html#ae80ecfb4c696095b5627988cc7c9cde0":[17,0,1,1,6,425], +"a00356.html#ae814b4e63476d137bf226537cb2ff0fc":[17,0,1,1,6,223], +"a00356.html#ae82dca54cc3fd1cc2f1671e98d64df07":[17,0,1,1,6,434], +"a00356.html#ae8b9077022cc706947fdc8b45a573d81":[17,0,1,1,6,45], +"a00356.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0":[17,0,1,1,6,309], +"a00356.html#aeb307ed9134e0fa2f0fcbdaf7b01515d":[17,0,1,1,6,356], +"a00356.html#aeb3783d1cdf4f9c1217d030bc0386fad":[17,0,1,1,6,322], +"a00356.html#aeb7623b070997b65f0bb108abf8e5f44":[17,0,1,1,6,314], +"a00356.html#aed2edebc2be522d7bb38f85d273406f9":[17,0,1,1,6,326], +"a00356.html#aee08925a21e8dbf05f8557617e3f610e":[17,0,1,1,6,224], +"a00356.html#aee1a29942cf2b3637a65506dc6b5d4fe":[17,0,1,1,6,184], +"a00356.html#aee95b219cf932dfedb3a3c5e23d01a9d":[17,0,1,1,6,156], +"a00356.html#aef76930f6d419fc30841be04fe6ac8d6":[17,0,1,1,6,123], +"a00356.html#af0ac761b64981003336d72c34df3d2e3":[17,0,1,1,6,423], +"a00356.html#af0cca41df253e49372d6853d4f5c406b":[17,0,1,1,6,396], +"a00356.html#af120353f5e8e159eaa9c930555b159d5":[17,0,1,1,6,163], +"a00356.html#af12673d4006ff926c863b2d0f9038561":[17,0,1,1,6,315], +"a00356.html#af3461e50ec2b06201d17feee167e0a4b":[17,0,1,1,6,408], +"a00356.html#af3729ff16ba78ef4a6b70c341e81c749":[17,0,1,1,6,405], +"a00356.html#af397e129e4581162f91873358b5f1538":[17,0,1,1,6,57], +"a00356.html#af42b60e97bdf4bf0338b8a5ce420fdc5":[17,0,1,1,6,218], +"a00356.html#af4aab184dc60e2de854994d26d57dfde":[17,0,1,1,6,83], +"a00356.html#af54068dbf6ecb7bf8b1881caa0f3b89f":[17,0,1,1,6,9], +"a00356.html#af5a93b147dd08b111b348edd1bc82fa5":[17,0,1,1,6,248], +"a00356.html#af7ee0188ab539a350a6da19fe3f34a72":[17,0,1,1,6,276], +"a00356.html#af83ceba3654b1b76e216402a023c1578":[17,0,1,1,6,214], +"a00356.html#af9f464ac4065aff75f5967933725d665":[17,0,1,1,6,318], +"a00356.html#afa043ddb1952520a2bba28ac41a98f93":[17,0,1,1,6,53], +"a00356.html#afa19443ca4e054e38a7599c37575678d":[17,0,1,1,6,236], +"a00356.html#afa24177621a8a2fbe041ef0ce73a414d":[17,0,1,1,6,304], +"a00356.html#afab9546447cf1e0020c32d298a1d897f":[17,0,1,1,6,350], +"a00356.html#afabb67121c9c58fac9829287b55a2389":[17,0,1,1,6,3], +"a00356.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8":[17,0,1,1,6,436], +"a00356.html#afbd09beedecedcf316a6c02e40d1e712":[17,0,1,1,6,347], +"a00356.html#afd20c2250b83786f216a100bde94a670":[17,0,1,1,6,125], +"a00356.html#afd812ab5b70a92a4d3a420c4f7106ac5":[17,0,1,1,6,76], +"a00356.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2":[17,0,1,1,6,266], +"a00356.html#afeaf2094813c3184f0f128c37e3297dd":[17,0,1,1,6,234], +"a00356.html#aff659b1042abf6e1376e38ccb4a20f3e":[17,0,1,1,6,430], +"a00356.html#affa79c933fa76585479228b15c2cbc83":[17,0,1,1,6,138], +"a00359.html":[17,0,1,1,7], +"a00359.html#a3801cb49b78666a9cfa602fa74b22da9":[17,0,1,1,7,2], +"a00359.html#a467882792e9ea53b4e596d1be05997a6":[17,0,1,1,7,5], +"a00359.html#a611611e20ca91cad7e9897847b9b355a":[17,0,1,1,7,1], +"a00359.html#a64cbcf66a79f024ae3cce06d1f6731f9":[17,0,1,1,7,13], +"a00359.html#a671b3421327a5c885b0c3e6e1e64afe7":[17,0,1,1,7,10], +"a00359.html#a67ed014df4e1bbbea873ede0e9700e29":[17,0,1,1,7,3], +"a00359.html#a84c51bc36228a8fadd8654bfaae5d58c":[17,0,1,1,7,4], +"a00359.html#a9802710200f050b0e9414bd88cdd8c0d":[17,0,1,1,7,8], +"a00359.html#ab13bbafe02599813084788482536728f":[17,0,1,1,7,6], +"a00359.html#ab46a8196f24bde7c86ac5e3affdc8ff8":[17,0,1,1,7,9], +"a00359.html#ac419953cd10efa4bef6e4efdc9c6cbe9":[17,0,1,1,7,11], +"a00359.html#ac629bf5f0b5d6c64c5393cadd7b7479c":[17,0,1,1,7,7], +"a00359.html#ae841eeabdfbe04dd3241f6fde1a57954":[17,0,1,1,7,12], +"a00359.html#af19794adbeec8b57eb7cbef1f9e21c91":[17,0,1,1,7,0], +"a00362.html":[17,0,1,1,8], +"a00365.html":[17,0,1,1,9], +"a00368.html":[17,0,1,1,10], +"a00371.html":[17,0,1,1,11], +"a00374.html":[17,0,1,1,12], +"a00377.html":[17,0,1,1,13], +"a00377.html#a19fc558e09f03a2f8f5ee89b1e396b2e":[17,0,1,1,13,0], +"a00377.html#aa08ad4e89a8218e9598abbd36c11d07a":[17,0,1,1,13,1], +"a00380.html":[17,0,1,1,14], +"a00380.html#a19fc558e09f03a2f8f5ee89b1e396b2e":[17,0,1,1,14,6], +"a00380.html#a1c46cc5ed5e30945d62e9ea369c94cdb":[17,0,1,1,14,4], +"a00380.html#a525ae62bb76a8ba01d4d85264f832c8e":[17,0,1,1,14,2], +"a00380.html#a55c5fe347b23c42f6359e97ae82b4729":[17,0,1,1,14,5], +"a00380.html#a8dd3e14e93cec4aea30e27104935d51b":[17,0,1,1,14,3], +"a00380.html#aa08ad4e89a8218e9598abbd36c11d07a":[17,0,1,1,14,7], +"a00380.html#ac7946c257bcbaf0e1589e960b83d23df":[17,0,1,1,14,1], +"a00383.html":[17,0,1,1,15], +"a00386.html":[17,0,1,1,16], +"a00389.html":[17,0,1,1,17], +"a00392.html":[17,0,1,1,18], +"a00395.html":[17,0,1,1,19], +"a00398.html":[17,0,1,1,20], +"a00401.html":[17,0,1,1,21], +"a00404.html":[17,0,1,1,22], +"a00407.html":[17,0,1,1,23], +"a00410.html":[17,0,1,1,24], +"a00413.html":[17,0,1,1,25], +"a00416.html":[17,0,1,1,26], +"a00419.html":[17,0,1,1,27], +"a00422.html":[17,0,1,1,28], +"a00425.html":[17,0,1,1,29], +"a00428.html":[17,0,1,1,30], +"a00431.html":[17,0,1,1,31], +"a00434.html":[17,0,1,1,32], +"a00437.html":[17,0,1,1,33], +"a00440.html":[17,0,1,1,34], +"a00443.html":[17,0,1,1,35], +"a00458.html":[17,0,1,2,1], +"a00461.html":[17,0,1,2,2], +"a00464.html":[17,0,1,2,3], +"a00467.html":[17,0,1,2,4], +"a00470.html":[17,0,1,2,5], +"a00473.html":[17,0,1,2,6], +"a00476.html":[17,0,1,2,7], +"a00479.html":[17,0,1,2,8], +"a00482.html":[17,0,1,2,9], +"a00485.html":[17,0,1,2,10], +"a00488.html":[17,0,1,2,11], +"a00491.html":[17,0,1,2,12], +"a00494.html":[17,0,1,2,13], +"a00497.html":[17,0,1,2,14], +"a00500.html":[17,0,1,2,15], +"a00503.html":[17,0,1,2,16], +"a00503.html#a1996786ea061102926ef0ba52a510bfd":[17,0,1,2,16,2], +"a00503.html#a23ae19deaff29f2796c4981962ca9b55":[17,0,1,2,16,0], +"a00503.html#a28cb83338bbbc858be983299cede3ba9":[17,0,1,2,16,6], +"a00503.html#a6569901e92e84b0b448794f8a89d1d9e":[17,0,1,2,16,4], +"a00503.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd":[17,0,1,2,16,5], +"a00503.html#ac2eb887016e59054e626341175577669":[17,0,1,2,16,1], +"a00503.html#ae638244ab3ba72e50b974f763e2abc42":[17,0,1,2,16,3], +"a00503.html#af273e717452d3e5295d20197b4615ed0":[17,0,1,2,16,7], +"a00506.html":[17,0,1,2,17], +"a00506.html#a094297d2dd0a7e2b4606fc37fc797fcd":[17,0,1,2,17,18], +"a00506.html#a112f8346894949beab73635af3851822":[17,0,1,2,17,0], +"a00506.html#a18071ade62f5d4b39e444ca87548e31e":[17,0,1,2,17,6], +"a00506.html#a2cf377cd3579f3ba898ec2391835cfd5":[17,0,1,2,17,11], +"a00506.html#a2e5e1b4f8da8d151569d6ff0133b43ec":[17,0,1,2,17,2], +"a00506.html#a372b1be02c2a55afbe5eda47580c7ee8":[17,0,1,2,17,16], +"a00506.html#a51c0870d3a917ac80f7a786feceeba57":[17,0,1,2,17,1], +"a00506.html#a5a3020c4884811361247f771da67b9a5":[17,0,1,2,17,5], +"a00506.html#a6d2fa2e22a151bea100d7c7ee84dbe7f":[17,0,1,2,17,12], +"a00506.html#a7815fa6e2b361a72ae88bb26bea8a9ad":[17,0,1,2,17,17], +"a00506.html#a7eeef6ad76dccb48d8b1741a9254af97":[17,0,1,2,17,19], +"a00506.html#a80bccf213793f64bc90bb751ef12da3a":[17,0,1,2,17,8], +"a00506.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[17,0,1,2,17,14], +"a00506.html#a98bc86a602a329edb27388de020d6282":[17,0,1,2,17,7], +"a00506.html#a99dab792a5983a089fe816abc57bad25":[17,0,1,2,17,15], +"a00506.html#aa46ae7101b70ba482359edccca83f414":[17,0,1,2,17,9], +"a00506.html#ace0d6e503c0db5222207053a7c537103":[17,0,1,2,17,10] }; diff --git a/navtreeindex3.js b/navtreeindex3.js index 94dbec851..de68af850 100644 --- a/navtreeindex3.js +++ b/navtreeindex3.js @@ -1,253 +1,253 @@ var NAVTREEINDEX3 = { -"a00533.html":[16,0,1,3,3], -"a00536.html":[16,0,1,3,4], -"a00536.html#a0509181ebe5c1f3311cacc800796469b":[16,0,1,3,4,4], -"a00536.html#a34a8c0ab6cfceb80c15080b571c0b3f7":[16,0,1,3,4,3], -"a00536.html#a5159dcc0de9cf18a0a46d390fcde3d59":[16,0,1,3,4,0], -"a00536.html#a680903ede9921710475c23f3e0f5c56c":[16,0,1,3,4,1], -"a00536.html#ac4ec5194f4ed97053e725b4f5d3b6db4":[16,0,1,3,4,2], -"a00539.html":[16,0,1,3,5], -"a00542.html":[16,0,1,3,6], -"a00545.html":[16,0,1,3,7], -"a00548.html":[16,0,1,3,8], -"a00551.html":[16,0,1,3,9], -"a00554.html":[16,0,1,3,10], -"a00557.html":[16,0,1,3,11], -"a00563.html":[16,0,1,3,12], -"a00563.html#a1a0256b61c3579519f8cc6d6157bc126":[16,0,1,3,12,4], -"a00563.html#a1c5f894db539ea5cb0d5ae0fa38449d7":[16,0,1,3,12,3], -"a00563.html#a1e0c17bf7342c21ca69d066eefa1f1eb":[16,0,1,3,12,5], -"a00563.html#a41ed83bbc8e0fd3abea7beb513fbdb96":[16,0,1,3,12,1], -"a00563.html#aae0b332270c1e8df223b430d8e8ddbbc":[16,0,1,3,12,6], -"a00563.html#afb6d836af248aed1afe715ae2f2f7c2b":[16,0,1,3,12,2], -"a00566.html":[16,0,1,3,13], -"a00569.html":[16,0,1,3,14], -"a00572.html":[16,0,1,3,15], -"a00575.html":[16,0,1,3,16], -"a00578.html":[16,0,1,3,17], -"a00581.html":[16,0,1,3,18], -"a00584.html":[16,0,1,3,19], -"a00584.html#a1527badd7e7e5f4d1e60eada509b1319":[16,0,1,3,19,2], -"a00584.html#a3415a23c978f3421bc01d069d1ab9180":[16,0,1,3,19,3], -"a00584.html#a56876f187f5f50c3cc8728ee21f0962c":[16,0,1,3,19,1], -"a00584.html#aae0cb0a585b3eb7535c70047bef1f7c6":[16,0,1,3,19,4], -"a00584.html#aaf7a492cce7f9a5fe5b817aae347ba3d":[16,0,1,3,19,0], -"a00584.html#aea9aba476b50f5d4ef082c24f0cb6b68":[16,0,1,3,19,5], -"a00587.html":[16,0,1,3,20], -"a00587.html#a1ce4882b7d053eafcec22cd84fb5727d":[16,0,1,3,20,1], -"a00587.html#a2ced4699fc4ab5162dbb9453edecb32e":[16,0,1,3,20,3], -"a00587.html#a35e9d98d207f17ebac66dc86e29a6464":[16,0,1,3,20,0], -"a00587.html#a60ba93807a2c0ea2ce1432245f3f7da0":[16,0,1,3,20,5], -"a00587.html#abd0d20a34060650b8a2895c17f842f44":[16,0,1,3,20,4], -"a00587.html#ad884cf7d66d88b38180369a791a9824b":[16,0,1,3,20,2], -"a00590.html":[16,0,1,3,21], -"a00593.html":[16,0,1,3,22], -"a00596.html":[16,0,1,3,23], -"a00596.html#a1a0256b61c3579519f8cc6d6157bc126":[16,0,1,3,23,2], -"a00596.html#a1c5f894db539ea5cb0d5ae0fa38449d7":[16,0,1,3,23,1], -"a00596.html#a1e0c17bf7342c21ca69d066eefa1f1eb":[16,0,1,3,23,3], -"a00596.html#aae0b332270c1e8df223b430d8e8ddbbc":[16,0,1,3,23,4], -"a00596.html#afb6d836af248aed1afe715ae2f2f7c2b":[16,0,1,3,23,0], -"a00599.html":[16,0,1,3,24], -"a00602.html":[16,0,1,3,25], -"a00605.html":[16,0,1,3,26], -"a00608.html":[16,0,1,3,27], -"a00611.html":[16,0,1,3,28], -"a00611.html#a1a0256b61c3579519f8cc6d6157bc126":[16,0,1,3,28,4], -"a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7":[16,0,1,3,28,3], -"a00611.html#a1e0c17bf7342c21ca69d066eefa1f1eb":[16,0,1,3,28,5], -"a00611.html#a41ed83bbc8e0fd3abea7beb513fbdb96":[16,0,1,3,28,1], -"a00611.html#aae0b332270c1e8df223b430d8e8ddbbc":[16,0,1,3,28,6], -"a00611.html#afb6d836af248aed1afe715ae2f2f7c2b":[16,0,1,3,28,2], -"a00614.html":[16,0,1,3,30], -"a00617.html":[16,0,1,3,31], -"a00620.html":[16,0,1,3,32], -"a00623.html":[16,0,1,3,33], -"a00626.html":[16,0,1,3,34], -"a00629.html":[16,0,1,3,29], -"a00632.html":[16,0,1,4,0], -"a00635.html":[16,0,1,4,1], -"a00638.html":[16,0,1,4,2], -"a00638.html#a063f7ad7678d60de756ef8526b9dfea1":[16,0,1,4,2,0], -"a00638.html#a0f0e6c501c2dc57b4ed68fe29780b062":[16,0,1,4,2,8], -"a00638.html#a13ed9a07ad5f74cfb67b7582c1b638a3":[16,0,1,4,2,18], -"a00638.html#a1515a97abca19263c1cf16dcbdd01944":[16,0,1,4,2,23], -"a00638.html#a22a85235261861839a0db05649999ef5":[16,0,1,4,2,5], -"a00638.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0":[16,0,1,4,2,24], -"a00638.html#a2ecb26546b49e369aeaf86bccf10a2e9":[16,0,1,4,2,6], -"a00638.html#a33ac8a876197c7774452b7b46411f188":[16,0,1,4,2,16], -"a00638.html#a371384b4f8d818c31dee337aa4e24403":[16,0,1,4,2,7], -"a00638.html#a58d2f9f20485ae35c2208f3bce5cb4a7":[16,0,1,4,2,21], -"a00638.html#a6442329f443943bbc8f3e10dde67930d":[16,0,1,4,2,14], -"a00638.html#a6a86a40deff31dbaf005519aba627991":[16,0,1,4,2,13], -"a00638.html#a70d0b80d637281693321866bd3c2735f":[16,0,1,4,2,9], -"a00638.html#a745b85254a910c7d8edbea41ab927cf4":[16,0,1,4,2,19], -"a00638.html#a879c87175b07e859a15320e199a104a6":[16,0,1,4,2,17], -"a00638.html#aa1d0ffc3e79f52154b2e362b74b7b112":[16,0,1,4,2,20], -"a00638.html#aa5220706535f7367e06aa2aadebc0b57":[16,0,1,4,2,10], -"a00638.html#acd2c32968024ddc7c650102a5076d70b":[16,0,1,4,2,3], -"a00638.html#ad2e1b57a0f8a5dc87427b1eca18ac02f":[16,0,1,4,2,22], -"a00638.html#ada4b87726e822b6e94dcc18eefc39049":[16,0,1,4,2,4], -"a00638.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b":[16,0,1,4,2,2], -"a00638.html#ae427973632a62dfd8f35709c21993190":[16,0,1,4,2,1], -"a00638.html#ae58a45ab173bf9ca7c4cdf4768fcf00e":[16,0,1,4,2,15], -"a00638.html#aec5752be28ebfd8dc506bda7c36b9f7d":[16,0,1,4,2,11], -"a00638.html#af25240ee5ff347e1cf2768bfd513345f":[16,0,1,4,2,12], -"a00641.html":[16,0,1,5,0], -"a00644.html":[16,0,1,5,1], -"a00653.html":[16,0,1,6,0], -"a00653.html#a2cf377cd3579f3ba898ec2391835cfd5":[16,0,1,6,0,2], -"a00653.html#a82cc4e898685eda93b47e741e5b44137":[16,0,1,6,0,6], -"a00653.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[16,0,1,6,0,4], -"a00653.html#a99dab792a5983a089fe816abc57bad25":[16,0,1,6,0,5], -"a00653.html#ace0d6e503c0db5222207053a7c537103":[16,0,1,6,0,1], -"a00653.html#ae0b5716ff6baea028959764dc6d88e96":[16,0,1,6,0,3], -"a00656.html":[16,0,1,6,1], -"a00656.html#a04b292df2006e31743224b66e16a29e9":[16,0,1,6,1,8], -"a00656.html#a107f3a8b6eb198dff510926061cabb43":[16,0,1,6,1,20], -"a00656.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee":[16,0,1,6,1,21], -"a00656.html#a17af2d47faed0774e9277be42512b0f4":[16,0,1,6,1,3], -"a00656.html#a1b8bae42b5963d812f4cf2329807f778":[16,0,1,6,1,25], -"a00656.html#a1caf63c685aa46025eda5e73f8d634b5":[16,0,1,6,1,28], -"a00656.html#a29573bbcca0c005de19ec709109538df":[16,0,1,6,1,18], -"a00656.html#a34f53a6f8a1ef018ef886961e4f60694":[16,0,1,6,1,11], -"a00656.html#a41146dace082e493f250425972a04d7f":[16,0,1,6,1,26], -"a00656.html#a45fef91f1894c03f9fd94d2835a91342":[16,0,1,6,1,22], -"a00656.html#a473ff3c449375989e846d66342333b3a":[16,0,1,6,1,7], -"a00656.html#a5bdd8ba09593bb7a2ce1f48df873250a":[16,0,1,6,1,9], -"a00656.html#a723448315d3bbc03a39104d36fd2b4bc":[16,0,1,6,1,24], -"a00656.html#a757c5734289254c48f43cc26b7d5e6a4":[16,0,1,6,1,13], -"a00656.html#a7b82589420e299091e6b80459bfb90d8":[16,0,1,6,1,12], -"a00656.html#a7cc388d11506f9ef030994fab99cfaa7":[16,0,1,6,1,5], -"a00656.html#a856d7a2b4bdd82d01544cb4ee6048e48":[16,0,1,6,1,10], -"a00656.html#a93806f5fc89ac97ab70e74dc9c41dd76":[16,0,1,6,1,15], -"a00656.html#a9c6a8dc222080952c2541db9cf7cd3c0":[16,0,1,6,1,4], -"a00656.html#a9fb429f011c7df55055763f41b896f28":[16,0,1,6,1,2], -"a00656.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f":[16,0,1,6,1,14], -"a00656.html#abb02186059737ad5fb792665cf0b97dd":[16,0,1,6,1,23], -"a00656.html#ac5f016c7c9fa74cadbd76508e68ffe66":[16,0,1,6,1,19], -"a00656.html#ac9cde02547c1ed0122c87f0a156ee268":[16,0,1,6,1,6], -"a00656.html#acd482e1225ffba53b6bfe903e133a541":[16,0,1,6,1,16], -"a00656.html#aef7827b56555e8efcc4646855335555f":[16,0,1,6,1,17], -"a00656.html#afb989c314b0afecd1202493a3cfee909":[16,0,1,6,1,27], -"a00662.html":[16,0,1,7,0], -"a00662.html#a04b292df2006e31743224b66e16a29e9":[16,0,1,7,0,7], -"a00662.html#a107f3a8b6eb198dff510926061cabb43":[16,0,1,7,0,19], -"a00662.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee":[16,0,1,7,0,20], -"a00662.html#a17af2d47faed0774e9277be42512b0f4":[16,0,1,7,0,2], -"a00662.html#a1b8bae42b5963d812f4cf2329807f778":[16,0,1,7,0,24], -"a00662.html#a1caf63c685aa46025eda5e73f8d634b5":[16,0,1,7,0,27], -"a00662.html#a29573bbcca0c005de19ec709109538df":[16,0,1,7,0,17], -"a00662.html#a34f53a6f8a1ef018ef886961e4f60694":[16,0,1,7,0,10], -"a00662.html#a41146dace082e493f250425972a04d7f":[16,0,1,7,0,25], -"a00662.html#a45fef91f1894c03f9fd94d2835a91342":[16,0,1,7,0,21], -"a00662.html#a473ff3c449375989e846d66342333b3a":[16,0,1,7,0,6], -"a00662.html#a5bdd8ba09593bb7a2ce1f48df873250a":[16,0,1,7,0,8], -"a00662.html#a723448315d3bbc03a39104d36fd2b4bc":[16,0,1,7,0,23], -"a00662.html#a757c5734289254c48f43cc26b7d5e6a4":[16,0,1,7,0,12], -"a00662.html#a7b82589420e299091e6b80459bfb90d8":[16,0,1,7,0,11], -"a00662.html#a7cc388d11506f9ef030994fab99cfaa7":[16,0,1,7,0,4], -"a00662.html#a856d7a2b4bdd82d01544cb4ee6048e48":[16,0,1,7,0,9], -"a00662.html#a93806f5fc89ac97ab70e74dc9c41dd76":[16,0,1,7,0,14], -"a00662.html#a9c6a8dc222080952c2541db9cf7cd3c0":[16,0,1,7,0,3], -"a00662.html#a9fb429f011c7df55055763f41b896f28":[16,0,1,7,0,1], -"a00662.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f":[16,0,1,7,0,13], -"a00662.html#abb02186059737ad5fb792665cf0b97dd":[16,0,1,7,0,22], -"a00662.html#ac5f016c7c9fa74cadbd76508e68ffe66":[16,0,1,7,0,18], -"a00662.html#ac9cde02547c1ed0122c87f0a156ee268":[16,0,1,7,0,5], -"a00662.html#acd482e1225ffba53b6bfe903e133a541":[16,0,1,7,0,15], -"a00662.html#aef7827b56555e8efcc4646855335555f":[16,0,1,7,0,16], -"a00662.html#afb989c314b0afecd1202493a3cfee909":[16,0,1,7,0,26], -"a00665.html":[16,0,1,7,1], -"a00665.html#a2cf377cd3579f3ba898ec2391835cfd5":[16,0,1,7,1,7], -"a00665.html#a82cc4e898685eda93b47e741e5b44137":[16,0,1,7,1,11], -"a00665.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[16,0,1,7,1,9], -"a00665.html#a99dab792a5983a089fe816abc57bad25":[16,0,1,7,1,10], -"a00665.html#ace0d6e503c0db5222207053a7c537103":[16,0,1,7,1,6], -"a00665.html#ae0b5716ff6baea028959764dc6d88e96":[16,0,1,7,1,8], -"a00674.html":[16,0,1,8,0], -"a00677.html":[16,0,1,8,1], -"a00677.html#ac11a80ac0cea6f244191654180db0693":[16,0,1,8,1,1], -"a00680.html":[16,0,1,8,2], -"a00683.html":[16,0,1,8,3], -"a00689.html":[16,0,1,8,5], -"a00692.html":[16,0,1,8,6], -"a00698.html":[16,0,1,8,7], -"a00698.html#a81936ce8429c7a97bc42921589c1522e":[16,0,1,8,7,0], -"a00698.html#a87a4b63b1a4ced5e40a1cc0bbc88599d":[16,0,1,8,7,3], -"a00698.html#a903aed9c7d096dced1233a11539c781d":[16,0,1,8,7,2], -"a00698.html#abd1c9ccc6899b550d241f007fd023d6b":[16,0,1,8,7,1], -"a00701.html":[16,0,1,8,8], -"a00704.html":[16,0,1,8,9], -"a00707.html":[16,0,1,8,10], -"a00710.html":[16,0,1,8,11], -"a00713.html":[16,0,1,8,12], -"a00716.html":[16,0,1,8,13], -"a00719.html":[16,0,1,8,14], -"a00722.html":[16,0,1,8,15], -"a00722.html#a829124de0deebf29734cd6390a232292":[16,0,1,8,15,4], -"a00725.html":[16,0,1,8,16], -"a00728.html":[16,0,1,8,17], -"a00731.html":[16,0,1,8,18], -"a00734.html":[16,0,1,8,19], -"a00737.html":[16,0,1,8,20], -"a00740.html":[16,0,1,8,21], -"a00743.html":[16,0,1,8,22], -"a00746.html":[16,0,1,8,23], -"a00749.html":[16,0,1,8,24], -"a00752.html":[16,0,1,8,25], -"a00755.html":[16,0,1,8,26], -"a00755.html#a9d8980ea83d2e8eb2a9f45210ba5c54d":[16,0,1,8,26,2], -"a00758.html":[16,0,1,8,27], -"a00761.html":[16,0,1,8,28], -"a00764.html":[16,0,1,8,29], -"a00767.html":[16,0,1,8,30], -"a00767.html#a1813685567d78b9f762d2f1eec531616":[16,0,1,8,30,1], -"a00770.html":[16,0,1,8,32], -"a00773.html":[16,0,1,8,33], -"a00776.html":[16,0,1,8,34], -"a00785.html":[16,0,1,8,4], -"a00788.html":[16,0,1,8,31], -"a00791.html":[16,0,1,9,0], -"a00794.html":[16,0,1,9,1], -"a00797.html":[16,0,1,9,2], -"a00800.html":[16,0,1,15], -"a00800.html#a094297d2dd0a7e2b4606fc37fc797fcd":[16,0,1,15,11], -"a00800.html#a2593f45dcf42602b3c334dccb9c52395":[16,0,1,15,0], -"a00800.html#a31c9145169cb4a4e3be509ad04a40b04":[16,0,1,15,4], -"a00800.html#a3d181d31956d42db1d25281deca4c7e3":[16,0,1,15,13], -"a00800.html#a4ff9c0c2785616e560c43e5312f40c0d":[16,0,1,15,14], -"a00800.html#a5965863afba861e5e0e899229da26e83":[16,0,1,15,6], -"a00800.html#a5d69a9273e615d799841edc21bd72dc0":[16,0,1,15,7], -"a00800.html#a7eeef6ad76dccb48d8b1741a9254af97":[16,0,1,15,12], -"a00800.html#a85d4ccd2d66f9b2fd10c7a2e408c4737":[16,0,1,15,5], -"a00800.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[16,0,1,15,9], -"a00800.html#a987213394bc9a51f05c4a5f1b1de69f8":[16,0,1,15,2], -"a00800.html#a99dab792a5983a089fe816abc57bad25":[16,0,1,15,10], -"a00800.html#ab97062ef8dcf4e46b403d9c22aeb22c9":[16,0,1,15,3], -"a00800.html#add878e0ecc6c87b683935f418f403c7e":[16,0,1,15,8], -"a00800.html#afe8da91949841c137ea573c327bff267":[16,0,1,15,1], -"a00803.html":[16,0,1,19], -"a00806.html":[16,0,1,22], -"a01436.html":[12], -"a01438.html":[13,0], -"a01438.html#ga01bf19754baee6ce82ec46f966528262":[13,0,1], -"a01438.html#ga22c7ea083197410f396d18fa808e8e0c":[13,0,4], -"a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5":[13,0,10], -"a01438.html#ga31cf63afba3c936d279a325d71691a68":[13,0,6], -"a01438.html#ga3b8f346977ed8428692d15f74ef12401":[13,0,11], -"a01438.html#ga60599359d5331215ca7fdf6710f0dbb1":[13,0,13], -"a01438.html#ga67606649a5f2261cb6b55478d72bf805":[13,0,2], -"a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a":[13,0,12], -"a01438.html#ga82d3c529ed81119a956957052c06e8d7":[13,0,5], -"a01438.html#ga857aacbb70f2ea18411f1ca478a0e37f":[13,0,3], -"a01438.html#ga8cd0d450da1bf23d0f6784446d35c556":[13,0,8], -"a01438.html#gaa3a0387ff2a71684a2992d4661c53331":[13,0,7], -"a01438.html#gaa4c31ab35807d8ed51fbecc48866aa04":[13,0,9], -"a01438.html#md_app_tng_readme":[13,0,0], -"a01439.html":[13,1], -"a01439.html#ga04fefe2ff5a7d2e937b2634acd22982a":[13,1,163], -"a01439.html#ga0698e0c55ad700fe57498321e842cb38":[13,1,85], -"a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120":[13,1,131] +"a00506.html#ace1877f29888c93a210f571fc4eff7ee":[17,0,1,2,17,3], +"a00506.html#add878e0ecc6c87b683935f418f403c7e":[17,0,1,2,17,13], +"a00506.html#aff63a86885856fcc093664f27af75f27":[17,0,1,2,17,4], +"a00509.html":[17,0,1,2,0,0], +"a00512.html":[17,0,1,2,0,1], +"a00515.html":[17,0,1,2,0,2], +"a00518.html":[17,0,1,2,0,3], +"a00521.html":[17,0,1,31], +"a00521.html#a850ec56b408fccccaea5826d452c3a64":[17,0,1,31,3], +"a00521.html#a85e0a506bd6fdae6ce32d5df3a48ac1c":[17,0,1,31,0], +"a00521.html#ae0df4b9151bb3d807bc1c532036c6d88":[17,0,1,31,2], +"a00521.html#ae559b402c678cc51f8252b927b8781e5":[17,0,1,31,1], +"a00527.html":[17,0,1,3,0], +"a00530.html":[17,0,1,3,1], +"a00539.html":[17,0,1,3,2], +"a00548.html":[17,0,1,3,3], +"a00551.html":[17,0,1,3,4], +"a00551.html#a0509181ebe5c1f3311cacc800796469b":[17,0,1,3,4,4], +"a00551.html#a34a8c0ab6cfceb80c15080b571c0b3f7":[17,0,1,3,4,3], +"a00551.html#a5159dcc0de9cf18a0a46d390fcde3d59":[17,0,1,3,4,0], +"a00551.html#a680903ede9921710475c23f3e0f5c56c":[17,0,1,3,4,1], +"a00551.html#ac4ec5194f4ed97053e725b4f5d3b6db4":[17,0,1,3,4,2], +"a00554.html":[17,0,1,3,5], +"a00557.html":[17,0,1,3,6], +"a00560.html":[17,0,1,3,7], +"a00563.html":[17,0,1,3,8], +"a00566.html":[17,0,1,3,9], +"a00569.html":[17,0,1,3,10], +"a00572.html":[17,0,1,3,11], +"a00578.html":[17,0,1,3,12], +"a00578.html#a1a0256b61c3579519f8cc6d6157bc126":[17,0,1,3,12,4], +"a00578.html#a1c5f894db539ea5cb0d5ae0fa38449d7":[17,0,1,3,12,3], +"a00578.html#a1e0c17bf7342c21ca69d066eefa1f1eb":[17,0,1,3,12,5], +"a00578.html#a41ed83bbc8e0fd3abea7beb513fbdb96":[17,0,1,3,12,1], +"a00578.html#aae0b332270c1e8df223b430d8e8ddbbc":[17,0,1,3,12,6], +"a00578.html#afb6d836af248aed1afe715ae2f2f7c2b":[17,0,1,3,12,2], +"a00581.html":[17,0,1,3,13], +"a00584.html":[17,0,1,3,14], +"a00587.html":[17,0,1,3,15], +"a00590.html":[17,0,1,3,16], +"a00593.html":[17,0,1,3,17], +"a00596.html":[17,0,1,3,18], +"a00599.html":[17,0,1,3,19], +"a00599.html#a1527badd7e7e5f4d1e60eada509b1319":[17,0,1,3,19,2], +"a00599.html#a3415a23c978f3421bc01d069d1ab9180":[17,0,1,3,19,3], +"a00599.html#a56876f187f5f50c3cc8728ee21f0962c":[17,0,1,3,19,1], +"a00599.html#aae0cb0a585b3eb7535c70047bef1f7c6":[17,0,1,3,19,4], +"a00599.html#aaf7a492cce7f9a5fe5b817aae347ba3d":[17,0,1,3,19,0], +"a00599.html#aea9aba476b50f5d4ef082c24f0cb6b68":[17,0,1,3,19,5], +"a00602.html":[17,0,1,3,20], +"a00602.html#a1ce4882b7d053eafcec22cd84fb5727d":[17,0,1,3,20,1], +"a00602.html#a2ced4699fc4ab5162dbb9453edecb32e":[17,0,1,3,20,3], +"a00602.html#a35e9d98d207f17ebac66dc86e29a6464":[17,0,1,3,20,0], +"a00602.html#a60ba93807a2c0ea2ce1432245f3f7da0":[17,0,1,3,20,5], +"a00602.html#abd0d20a34060650b8a2895c17f842f44":[17,0,1,3,20,4], +"a00602.html#ad884cf7d66d88b38180369a791a9824b":[17,0,1,3,20,2], +"a00605.html":[17,0,1,3,21], +"a00608.html":[17,0,1,3,22], +"a00611.html":[17,0,1,3,23], +"a00611.html#a1a0256b61c3579519f8cc6d6157bc126":[17,0,1,3,23,2], +"a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7":[17,0,1,3,23,1], +"a00611.html#a1e0c17bf7342c21ca69d066eefa1f1eb":[17,0,1,3,23,3], +"a00611.html#aae0b332270c1e8df223b430d8e8ddbbc":[17,0,1,3,23,4], +"a00611.html#afb6d836af248aed1afe715ae2f2f7c2b":[17,0,1,3,23,0], +"a00614.html":[17,0,1,3,24], +"a00617.html":[17,0,1,3,25], +"a00620.html":[17,0,1,3,26], +"a00623.html":[17,0,1,3,27], +"a00626.html":[17,0,1,3,28], +"a00626.html#a1a0256b61c3579519f8cc6d6157bc126":[17,0,1,3,28,4], +"a00626.html#a1c5f894db539ea5cb0d5ae0fa38449d7":[17,0,1,3,28,3], +"a00626.html#a1e0c17bf7342c21ca69d066eefa1f1eb":[17,0,1,3,28,5], +"a00626.html#a41ed83bbc8e0fd3abea7beb513fbdb96":[17,0,1,3,28,1], +"a00626.html#aae0b332270c1e8df223b430d8e8ddbbc":[17,0,1,3,28,6], +"a00626.html#afb6d836af248aed1afe715ae2f2f7c2b":[17,0,1,3,28,2], +"a00629.html":[17,0,1,3,30], +"a00632.html":[17,0,1,3,31], +"a00635.html":[17,0,1,3,32], +"a00638.html":[17,0,1,3,33], +"a00641.html":[17,0,1,3,34], +"a00644.html":[17,0,1,3,29], +"a00647.html":[17,0,1,4,0], +"a00650.html":[17,0,1,4,1], +"a00653.html":[17,0,1,4,2], +"a00653.html#a063f7ad7678d60de756ef8526b9dfea1":[17,0,1,4,2,0], +"a00653.html#a0f0e6c501c2dc57b4ed68fe29780b062":[17,0,1,4,2,8], +"a00653.html#a13ed9a07ad5f74cfb67b7582c1b638a3":[17,0,1,4,2,18], +"a00653.html#a1515a97abca19263c1cf16dcbdd01944":[17,0,1,4,2,23], +"a00653.html#a22a85235261861839a0db05649999ef5":[17,0,1,4,2,5], +"a00653.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0":[17,0,1,4,2,24], +"a00653.html#a2ecb26546b49e369aeaf86bccf10a2e9":[17,0,1,4,2,6], +"a00653.html#a33ac8a876197c7774452b7b46411f188":[17,0,1,4,2,16], +"a00653.html#a371384b4f8d818c31dee337aa4e24403":[17,0,1,4,2,7], +"a00653.html#a58d2f9f20485ae35c2208f3bce5cb4a7":[17,0,1,4,2,21], +"a00653.html#a6442329f443943bbc8f3e10dde67930d":[17,0,1,4,2,14], +"a00653.html#a6a86a40deff31dbaf005519aba627991":[17,0,1,4,2,13], +"a00653.html#a70d0b80d637281693321866bd3c2735f":[17,0,1,4,2,9], +"a00653.html#a745b85254a910c7d8edbea41ab927cf4":[17,0,1,4,2,19], +"a00653.html#a879c87175b07e859a15320e199a104a6":[17,0,1,4,2,17], +"a00653.html#aa1d0ffc3e79f52154b2e362b74b7b112":[17,0,1,4,2,20], +"a00653.html#aa5220706535f7367e06aa2aadebc0b57":[17,0,1,4,2,10], +"a00653.html#acd2c32968024ddc7c650102a5076d70b":[17,0,1,4,2,3], +"a00653.html#ad2e1b57a0f8a5dc87427b1eca18ac02f":[17,0,1,4,2,22], +"a00653.html#ada4b87726e822b6e94dcc18eefc39049":[17,0,1,4,2,4], +"a00653.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b":[17,0,1,4,2,2], +"a00653.html#ae427973632a62dfd8f35709c21993190":[17,0,1,4,2,1], +"a00653.html#ae58a45ab173bf9ca7c4cdf4768fcf00e":[17,0,1,4,2,15], +"a00653.html#aec5752be28ebfd8dc506bda7c36b9f7d":[17,0,1,4,2,11], +"a00653.html#af25240ee5ff347e1cf2768bfd513345f":[17,0,1,4,2,12], +"a00656.html":[17,0,1,5,0], +"a00659.html":[17,0,1,5,1], +"a00668.html":[17,0,1,6,0], +"a00668.html#a2cf377cd3579f3ba898ec2391835cfd5":[17,0,1,6,0,2], +"a00668.html#a372b1be02c2a55afbe5eda47580c7ee8":[17,0,1,6,0,6], +"a00668.html#a7815fa6e2b361a72ae88bb26bea8a9ad":[17,0,1,6,0,7], +"a00668.html#a82cc4e898685eda93b47e741e5b44137":[17,0,1,6,0,8], +"a00668.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[17,0,1,6,0,4], +"a00668.html#a99dab792a5983a089fe816abc57bad25":[17,0,1,6,0,5], +"a00668.html#ace0d6e503c0db5222207053a7c537103":[17,0,1,6,0,1], +"a00668.html#ae0b5716ff6baea028959764dc6d88e96":[17,0,1,6,0,3], +"a00671.html":[17,0,1,6,1], +"a00671.html#a04b292df2006e31743224b66e16a29e9":[17,0,1,6,1,8], +"a00671.html#a107f3a8b6eb198dff510926061cabb43":[17,0,1,6,1,20], +"a00671.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee":[17,0,1,6,1,21], +"a00671.html#a17af2d47faed0774e9277be42512b0f4":[17,0,1,6,1,3], +"a00671.html#a1b8bae42b5963d812f4cf2329807f778":[17,0,1,6,1,25], +"a00671.html#a29573bbcca0c005de19ec709109538df":[17,0,1,6,1,18], +"a00671.html#a34f53a6f8a1ef018ef886961e4f60694":[17,0,1,6,1,11], +"a00671.html#a45fef91f1894c03f9fd94d2835a91342":[17,0,1,6,1,22], +"a00671.html#a473ff3c449375989e846d66342333b3a":[17,0,1,6,1,7], +"a00671.html#a5bdd8ba09593bb7a2ce1f48df873250a":[17,0,1,6,1,9], +"a00671.html#a723448315d3bbc03a39104d36fd2b4bc":[17,0,1,6,1,24], +"a00671.html#a757c5734289254c48f43cc26b7d5e6a4":[17,0,1,6,1,13], +"a00671.html#a7b82589420e299091e6b80459bfb90d8":[17,0,1,6,1,12], +"a00671.html#a7cc388d11506f9ef030994fab99cfaa7":[17,0,1,6,1,5], +"a00671.html#a856d7a2b4bdd82d01544cb4ee6048e48":[17,0,1,6,1,10], +"a00671.html#a93806f5fc89ac97ab70e74dc9c41dd76":[17,0,1,6,1,15], +"a00671.html#a9c6a8dc222080952c2541db9cf7cd3c0":[17,0,1,6,1,4], +"a00671.html#a9fb429f011c7df55055763f41b896f28":[17,0,1,6,1,2], +"a00671.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f":[17,0,1,6,1,14], +"a00671.html#abb02186059737ad5fb792665cf0b97dd":[17,0,1,6,1,23], +"a00671.html#ac5f016c7c9fa74cadbd76508e68ffe66":[17,0,1,6,1,19], +"a00671.html#ac9cde02547c1ed0122c87f0a156ee268":[17,0,1,6,1,6], +"a00671.html#acd482e1225ffba53b6bfe903e133a541":[17,0,1,6,1,16], +"a00671.html#aef7827b56555e8efcc4646855335555f":[17,0,1,6,1,17], +"a00677.html":[17,0,1,7,0], +"a00677.html#a04b292df2006e31743224b66e16a29e9":[17,0,1,7,0,7], +"a00677.html#a107f3a8b6eb198dff510926061cabb43":[17,0,1,7,0,19], +"a00677.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee":[17,0,1,7,0,20], +"a00677.html#a17af2d47faed0774e9277be42512b0f4":[17,0,1,7,0,2], +"a00677.html#a1b8bae42b5963d812f4cf2329807f778":[17,0,1,7,0,24], +"a00677.html#a29573bbcca0c005de19ec709109538df":[17,0,1,7,0,17], +"a00677.html#a34f53a6f8a1ef018ef886961e4f60694":[17,0,1,7,0,10], +"a00677.html#a45fef91f1894c03f9fd94d2835a91342":[17,0,1,7,0,21], +"a00677.html#a473ff3c449375989e846d66342333b3a":[17,0,1,7,0,6], +"a00677.html#a5bdd8ba09593bb7a2ce1f48df873250a":[17,0,1,7,0,8], +"a00677.html#a723448315d3bbc03a39104d36fd2b4bc":[17,0,1,7,0,23], +"a00677.html#a757c5734289254c48f43cc26b7d5e6a4":[17,0,1,7,0,12], +"a00677.html#a7b82589420e299091e6b80459bfb90d8":[17,0,1,7,0,11], +"a00677.html#a7cc388d11506f9ef030994fab99cfaa7":[17,0,1,7,0,4], +"a00677.html#a856d7a2b4bdd82d01544cb4ee6048e48":[17,0,1,7,0,9], +"a00677.html#a93806f5fc89ac97ab70e74dc9c41dd76":[17,0,1,7,0,14], +"a00677.html#a9c6a8dc222080952c2541db9cf7cd3c0":[17,0,1,7,0,3], +"a00677.html#a9fb429f011c7df55055763f41b896f28":[17,0,1,7,0,1], +"a00677.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f":[17,0,1,7,0,13], +"a00677.html#abb02186059737ad5fb792665cf0b97dd":[17,0,1,7,0,22], +"a00677.html#ac5f016c7c9fa74cadbd76508e68ffe66":[17,0,1,7,0,18], +"a00677.html#ac9cde02547c1ed0122c87f0a156ee268":[17,0,1,7,0,5], +"a00677.html#acd482e1225ffba53b6bfe903e133a541":[17,0,1,7,0,15], +"a00677.html#aef7827b56555e8efcc4646855335555f":[17,0,1,7,0,16], +"a00680.html":[17,0,1,7,1], +"a00680.html#a2cf377cd3579f3ba898ec2391835cfd5":[17,0,1,7,1,9], +"a00680.html#a372b1be02c2a55afbe5eda47580c7ee8":[17,0,1,7,1,13], +"a00680.html#a7815fa6e2b361a72ae88bb26bea8a9ad":[17,0,1,7,1,14], +"a00680.html#a82cc4e898685eda93b47e741e5b44137":[17,0,1,7,1,15], +"a00680.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[17,0,1,7,1,11], +"a00680.html#a99dab792a5983a089fe816abc57bad25":[17,0,1,7,1,12], +"a00680.html#ace0d6e503c0db5222207053a7c537103":[17,0,1,7,1,8], +"a00680.html#ae0b5716ff6baea028959764dc6d88e96":[17,0,1,7,1,10], +"a00689.html":[17,0,1,8,0], +"a00692.html":[17,0,1,8,1], +"a00692.html#ac11a80ac0cea6f244191654180db0693":[17,0,1,8,1,1], +"a00695.html":[17,0,1,8,2], +"a00698.html":[17,0,1,8,3], +"a00704.html":[17,0,1,8,5], +"a00707.html":[17,0,1,8,6], +"a00713.html":[17,0,1,8,7], +"a00713.html#a81936ce8429c7a97bc42921589c1522e":[17,0,1,8,7,0], +"a00713.html#a87a4b63b1a4ced5e40a1cc0bbc88599d":[17,0,1,8,7,3], +"a00713.html#a903aed9c7d096dced1233a11539c781d":[17,0,1,8,7,2], +"a00713.html#abd1c9ccc6899b550d241f007fd023d6b":[17,0,1,8,7,1], +"a00716.html":[17,0,1,8,8], +"a00719.html":[17,0,1,8,9], +"a00722.html":[17,0,1,8,10], +"a00725.html":[17,0,1,8,11], +"a00728.html":[17,0,1,8,12], +"a00731.html":[17,0,1,8,13], +"a00734.html":[17,0,1,8,14], +"a00737.html":[17,0,1,8,15], +"a00737.html#a829124de0deebf29734cd6390a232292":[17,0,1,8,15,4], +"a00740.html":[17,0,1,8,16], +"a00743.html":[17,0,1,8,17], +"a00746.html":[17,0,1,8,18], +"a00749.html":[17,0,1,8,19], +"a00752.html":[17,0,1,8,20], +"a00755.html":[17,0,1,8,21], +"a00758.html":[17,0,1,8,22], +"a00761.html":[17,0,1,8,23], +"a00764.html":[17,0,1,8,24], +"a00767.html":[17,0,1,8,25], +"a00770.html":[17,0,1,8,26], +"a00770.html#a9d8980ea83d2e8eb2a9f45210ba5c54d":[17,0,1,8,26,2], +"a00773.html":[17,0,1,8,27], +"a00776.html":[17,0,1,8,28], +"a00779.html":[17,0,1,8,29], +"a00782.html":[17,0,1,8,30], +"a00782.html#a1813685567d78b9f762d2f1eec531616":[17,0,1,8,30,1], +"a00785.html":[17,0,1,8,32], +"a00788.html":[17,0,1,8,33], +"a00791.html":[17,0,1,8,34], +"a00800.html":[17,0,1,8,4], +"a00803.html":[17,0,1,8,31], +"a00806.html":[17,0,1,9,0], +"a00809.html":[17,0,1,9,1], +"a00812.html":[17,0,1,9,2], +"a00815.html":[17,0,1,15], +"a00815.html#a094297d2dd0a7e2b4606fc37fc797fcd":[17,0,1,15,14], +"a00815.html#a2593f45dcf42602b3c334dccb9c52395":[17,0,1,15,0], +"a00815.html#a31c9145169cb4a4e3be509ad04a40b04":[17,0,1,15,4], +"a00815.html#a372b1be02c2a55afbe5eda47580c7ee8":[17,0,1,15,12], +"a00815.html#a3d181d31956d42db1d25281deca4c7e3":[17,0,1,15,16], +"a00815.html#a4ff9c0c2785616e560c43e5312f40c0d":[17,0,1,15,17], +"a00815.html#a5965863afba861e5e0e899229da26e83":[17,0,1,15,6], +"a00815.html#a5d69a9273e615d799841edc21bd72dc0":[17,0,1,15,7], +"a00815.html#a7815fa6e2b361a72ae88bb26bea8a9ad":[17,0,1,15,13], +"a00815.html#a7eeef6ad76dccb48d8b1741a9254af97":[17,0,1,15,15], +"a00815.html#a85d4ccd2d66f9b2fd10c7a2e408c4737":[17,0,1,15,5], +"a00815.html#a8e3c7ddf3a16cbdcc42060cdee2d884e":[17,0,1,15,10], +"a00815.html#a987213394bc9a51f05c4a5f1b1de69f8":[17,0,1,15,2], +"a00815.html#a99dab792a5983a089fe816abc57bad25":[17,0,1,15,11], +"a00815.html#ab97062ef8dcf4e46b403d9c22aeb22c9":[17,0,1,15,3], +"a00815.html#abb9e7120857031fdf5f22df3086afab0":[17,0,1,15,8], +"a00815.html#add878e0ecc6c87b683935f418f403c7e":[17,0,1,15,9], +"a00815.html#afe8da91949841c137ea573c327bff267":[17,0,1,15,1], +"a00818.html":[17,0,1,19], +"a00821.html":[17,0,1,22], +"a01463.html":[13], +"a01465.html":[14,0], +"a01465.html#ga01bf19754baee6ce82ec46f966528262":[14,0,1], +"a01465.html#ga22c7ea083197410f396d18fa808e8e0c":[14,0,4] }; diff --git a/navtreeindex4.js b/navtreeindex4.js index f513de832..3b86bb417 100644 --- a/navtreeindex4.js +++ b/navtreeindex4.js @@ -1,253 +1,253 @@ var NAVTREEINDEX4 = { -"a01439.html#ga0777a86aa412a97b19cc72a12c171b94":[13,1,153], -"a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7":[13,1,111], -"a01439.html#ga0cf0048247bb577c85142510225ea960":[13,1,106], -"a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35":[13,1,66], -"a01439.html#ga0d91be168c4b3714cc0177632627bfc3":[13,1,88], -"a01439.html#ga103f4596f0f9590971763592c5233ec3":[13,1,102], -"a01439.html#ga114a721517c95d5ba5fcac5b226669d6":[13,1,25], -"a01439.html#ga13a4675d782c861977b653e3c2b354ba":[13,1,169], -"a01439.html#ga147803646532319e585a0fe7a6c028ef":[13,1,115], -"a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6":[13,1,141], -"a01439.html#ga1c6666c7b4d077fb058adc4971da2160":[13,1,6], -"a01439.html#ga1d6fd831a8125a366504a0ab77b62da8":[13,1,5], -"a01439.html#ga1db86704035048066a370815b657234d":[13,1,122], -"a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2":[13,1,158], -"a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c":[13,1,36], -"a01439.html#ga2239ae3a87c341a48aa108bd82a58552":[13,1,96], -"a01439.html#ga2293df1c1c794496790bae25d3844fa5":[13,1,94], -"a01439.html#ga245f181cbf1ba418e60d060503945c33":[13,1,113], -"a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36":[13,1,73], -"a01439.html#ga25d2895192d93c524f5dba92a492cdfb":[13,1,83], -"a01439.html#ga2649126606db8a0b64ae8e19d09f6600":[13,1,67], -"a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738":[13,1,9], -"a01439.html#ga2b02163fab87313b81dd7f51345d3eb6":[13,1,48], -"a01439.html#ga2c3e18de900ba705192963d08b37f600":[13,1,139], -"a01439.html#ga2ea51a5aafd900c9bdffeffe82274255":[13,1,108], -"a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c":[13,1,45], -"a01439.html#ga310a017cddce9ef05071cb619b4b6db9":[13,1,126], -"a01439.html#ga31d269ccdafd08519a899a8aebf53df1":[13,1,120], -"a01439.html#ga34b7b6d46868f0d63d195216ef9939b1":[13,1,33], -"a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48":[13,1,65], -"a01439.html#ga39003da4dc8a0b8999f1325c2f96f641":[13,1,167], -"a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949":[13,1,130], -"a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4":[13,1,114], -"a01439.html#ga3a4e2ffada9173db1a775a697bbebf18":[13,1,140], -"a01439.html#ga3aa141525a1141f1a290e2a996da0c9c":[13,1,21], -"a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb":[13,1,112], -"a01439.html#ga3f7953865c6091f266e727714e6f91dd":[13,1,42], -"a01439.html#ga40a6c01492a76366f9402302b527c4e1":[13,1,82], -"a01439.html#ga40b70cfab865fa4fd9a5e7a29ca59d38":[13,1,24], -"a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d":[13,1,137], -"a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d":[13,1,75], -"a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d":[13,1,55], -"a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa":[13,1,156], -"a01439.html#ga4805112b62e86b5465e24648504dc374":[13,1,15], -"a01439.html#ga481179181349c801c16fc1ab698f2f24":[13,1,54], -"a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d":[13,1,49], -"a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4":[13,1,46], -"a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc":[13,1,134], -"a01439.html#ga4bf8b665fe1712626a480742c2daa16b":[13,1,56], -"a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17":[13,1,80], -"a01439.html#ga4fa442396dfbb89e59dfca837b565cec":[13,1,101], -"a01439.html#ga51e3ae10f0596d473f646074650904e6":[13,1,37], -"a01439.html#ga5554940ed4c7c7e28652ce6923cf9314":[13,1,18], -"a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29":[13,1,135], -"a01439.html#ga55ba8a1787f69d44d6e40db041fbd786":[13,1,20], -"a01439.html#ga582dc8686f0491ad4292287f6971543c":[13,1,146], -"a01439.html#ga592c23e94097ad5e212beb6390aa88c6":[13,1,160], -"a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee":[13,1,27], -"a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534":[13,1,118], -"a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268":[13,1,133], -"a01439.html#ga6073c5a05e0ad2e738f460e727014553":[13,1,19], -"a01439.html#ga617bdbdce7b5736351d93214d44c5b8f":[13,1,43], -"a01439.html#ga67f2ce6224651d9cc65e9915e35558bd":[13,1,59], -"a01439.html#ga694d921c7bc17a0e158ef96e3d476700":[13,1,138], -"a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8":[13,1,132], -"a01439.html#ga6e19ecd60be4c74665d9ec142e460771":[13,1,61], -"a01439.html#ga6e510e056ea16a0a34b405b7ca378f16":[13,1,31], -"a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f":[13,1,72], -"a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91":[13,1,57], -"a01439.html#ga6fc480ad2824df6309f4f370ffad15f9":[13,1,35], -"a01439.html#ga70751ea87f2cf913986bc7bca2cc661f":[13,1,41], -"a01439.html#ga72f385a8eafc464a05acfa54561fed63":[13,1,99], -"a01439.html#ga7371f490659b6fd68739d2b1fee50696":[13,1,116], -"a01439.html#ga74d1db50562642ce511fa7cbd384c2ab":[13,1,128], -"a01439.html#ga750704332198726725a327344f4f7dd5":[13,1,103], -"a01439.html#ga775bea13de8cc26e61a34ada48358568":[13,1,47], -"a01439.html#ga782ca1e5b1574b2b6793c841be22b28b":[13,1,107], -"a01439.html#ga78a5394997ea31b125cd57d07aa73636":[13,1,155], -"a01439.html#ga78abefc293c0a04d8ef649c94c8a1057":[13,1,166], -"a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412":[13,1,52], -"a01439.html#ga7a929bf65cbc777bab7e533a2755cfad":[13,1,164], -"a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23":[13,1,84], -"a01439.html#ga7e3189411975d835c0115511556302d8":[13,1,76], -"a01439.html#ga8020aa89a5bed09ad35320b78e0fb890":[13,1,89], -"a01439.html#ga802de50265ff91dc30dd7c93d9e026e1":[13,1,79], -"a01439.html#ga806d07982fda5c30755af6b5b4ef9314":[13,1,62], -"a01439.html#ga8105d79d3dd914cf643121ff243b00a3":[13,1,91], -"a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123":[13,1,12], -"a01439.html#ga8742a7be77a2350c069c5c380ac4c635":[13,1,16], -"a01439.html#ga89942894a5a8f82391d74346603aa837":[13,1,98], -"a01439.html#ga8a741e461c20d2a72493bc6178826eb1":[13,1,110], -"a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3":[13,1,104], -"a01439.html#ga92d651c637007f8c3672c3313767c0e7":[13,1,154], -"a01439.html#ga9393b545b2fa1fdd539672a0428a30ab":[13,1,142], -"a01439.html#ga9475e032c388144c5a0df45d1df182a5":[13,1,136], -"a01439.html#ga9506331ea7d454fe3c9b2585128c77aa":[13,1,117], -"a01439.html#ga958190a9182d1b54f82fbca8216406ea":[13,1,87], -"a01439.html#ga9658e84055727e6357cf7ef636b4e398":[13,1,1], -"a01439.html#ga96c434878e1f435e2cda5b0b5fec444f":[13,1,109], -"a01439.html#ga973437347c3261df0b116fec9ee9c378":[13,1,71], -"a01439.html#ga975f7303086190d3b6f76c367583d622":[13,1,38], -"a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791":[13,1,92], -"a01439.html#ga9c5173c7529f898f251814133169ba1d":[13,1,8], -"a01439.html#ga9ee98f13a88710e5234266b4b456b1dc":[13,1,105], -"a01439.html#gaa1d392a2b2ae7a51907cb724f0465741":[13,1,70], -"a01439.html#gaa4be9972396b7cadb08dd8e2199daf08":[13,1,125], -"a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7":[13,1,145], -"a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba":[13,1,4], -"a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043":[13,1,63], -"a01439.html#gaa80d6c193374d363649236778289f2ea":[13,1,157], -"a01439.html#gaa86508958ff3d81f9bd8e79344537218":[13,1,7], -"a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903":[13,1,44], -"a01439.html#gaac8b8555b03b50a118b70cb8387c24ae":[13,1,14], -"a01439.html#gaadde4309089c569fd87c24a1a2326cd4":[13,1,26], -"a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4":[13,1,69], -"a01439.html#gab25ca44957dff1c2df34607738ca3bf7":[13,1,152], -"a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4":[13,1,121], -"a01439.html#gab3fda8219d17d1b7bc50b1040399a47d":[13,1,13], -"a01439.html#gab7ca9ee391118aafe6f3cf7df4fa5de3":[13,1,165], -"a01439.html#gabaaaef242649206029e1c10ac6d1fb7d":[13,1,30], -"a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31":[13,1,34], -"a01439.html#gabf2b29b4d3ae926b63c403d084380dbe":[13,1,150], -"a01439.html#gac244b83b061ffd8ae3d59b5f973baa53":[13,1,39], -"a01439.html#gac37b319dabc5b9492a422f6d3d4e118b":[13,1,93], -"a01439.html#gac395a7e195aa3cf28b48de345755feb0":[13,1,151], -"a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2":[13,1,10], -"a01439.html#gac5f4cc263fd729871446e01cb063f141":[13,1,78], -"a01439.html#gac873a37c53fdd922d5b36efd737e3ec3":[13,1,161], -"a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1":[13,1,3], -"a01439.html#gacd308bac927905d5c59f526b40c63d76":[13,1,64], -"a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8":[13,1,68], -"a01439.html#gacf9a0c7772ebb65b87c4a4788850702b":[13,1,147], -"a01439.html#gad017ae33af5a7ea062cea7d54de675a8":[13,1,170], -"a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1":[13,1,159], -"a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff":[13,1,144], -"a01439.html#gad10d15454308230fbef54bdd43001ed2":[13,1,162], -"a01439.html#gad115ce255664a48b80e90ea19c156b79":[13,1,0], -"a01439.html#gad2096a4618dd37c48ed48847fe63d844":[13,1,50], -"a01439.html#gad3bc620aedd9322d160eece0d8d20c82":[13,1,149], -"a01439.html#gad50eab1ee1abb18515e914a294668907":[13,1,28], -"a01439.html#gad65cf773e03aed93e2a1437f13511a91":[13,1,53], -"a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6":[13,1,17], -"a01439.html#gada2d38835826587970de3868ca48eaa4":[13,1,11], -"a01439.html#gada3308b30b1b1e40abb806dbc5476648":[13,1,168], -"a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08":[13,1,74], -"a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87":[13,1,29], -"a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3":[13,1,81], -"a01439.html#gade49e7746864105730fa7d531645ff62":[13,1,58], -"a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a":[13,1,129], -"a01439.html#gae2cbb1989eff2c66935040f41a593bf6":[13,1,51], -"a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272":[13,1,23], -"a01439.html#gae3343c160e80365b7e96bdfdc9b6365c":[13,1,127], -"a01439.html#gae655ce06583c08169170102fbb0b55c9":[13,1,123], -"a01439.html#gae8cc7670847805423ad591985eecd832":[13,1,143], -"a01439.html#gaead7151af044da249b398dc457fc8e06":[13,1,100], -"a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7":[13,1,119], -"a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b":[13,1,2], -"a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c":[13,1,97], -"a01439.html#gaede6ae09e6192e452ad261f4e15e1c62":[13,1,124], -"a01439.html#gaeee666028a097659af69cc828a6bd68b":[13,1,32], -"a01439.html#gaeeff0177acf29e6e7b134a14d7119d69":[13,1,22], -"a01439.html#gaefce484222bdbedef37787a9b10d4426":[13,1,77], -"a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6":[13,1,90], -"a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0":[13,1,60], -"a01439.html#gaf5059df8d40a5f9f0f5e2004039de424":[13,1,86], -"a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6":[13,1,95], -"a01439.html#gafaccb0c9d12154b0c5b917f89f233721":[13,1,40], -"a01439.html#gaff701132013eaac5600dd9fd6253505d":[13,1,148], -"a01440.html":[13,2], -"a01441.html":[13,3], -"a01441.html#ga054acfe7d4dd4064f9d27a9ea7fc2337":[13,3,1], -"a01441.html#ga3f98e29cffa06446fc91b329703606af":[13,3,4], -"a01441.html#ga765308123cf522f5ec8b528bf4ea1243":[13,3,3], -"a01441.html#ga8eec7f2190d1f9bda6684f5d2177db15":[13,3,6], -"a01441.html#gab729e6c838c0a247d4f226fb92492d96":[13,3,8], -"a01441.html#gac087cf04cd5bd6ff2e026d89bfbf5e12":[13,3,5], -"a01441.html#gad5e12e12d3030e28d75164286df9e5e9":[13,3,7], -"a01441.html#gada27ffa70c78964d3b38abd11c5f4f22":[13,3,2], -"a01442.html":[13,4], -"a01442.html#ga01badea388343bdf5929c5c2be9f426b":[13,4,15], -"a01442.html#ga128f54833b5ed2105dae417333e1d651":[13,4,7], -"a01442.html#ga324cef45a35e02b387001afdc9092778":[13,4,10], -"a01442.html#ga32693c852341e1b946bab3cca5f71761":[13,4,18], -"a01442.html#ga349718dea5d5b558766a31b7dcd7e811":[13,4,6], -"a01442.html#ga386353e8700eec35e4548dfa29f13b8d":[13,4,14], -"a01442.html#ga3a31087729a7a2e9a624572f234809fc":[13,4,24], -"a01442.html#ga4e975805352164dc3a8ff553b42c509f":[13,4,22], -"a01442.html#ga5e4163b8882d4eb42d4d5191c8731da0":[13,4,12], -"a01442.html#ga8e50f9bf69be0910880411e9a0d5bc24":[13,4,20], -"a01442.html#ga9efe98ee7fe9be95593c7177800efd8d":[13,4,21], -"a01442.html#gaa9323be08c4d757019e9863d9a7fb6b1":[13,4,4], -"a01442.html#gaaff5268b9acbf16db03b425e6c54f97c":[13,4,23], -"a01442.html#gab9ee16357a8e397a72eda7e9c8553fb3":[13,4,25], -"a01442.html#gabd4f20b06efedede6bc4a836cfad8f38":[13,4,16], -"a01442.html#gac06336335e5f3191e3b1fc06d2830d96":[13,4,17], -"a01442.html#gac794fffe040e6d47a34c756720f3cbea":[13,4,13], -"a01442.html#gac7f674d4a0afb12d2f3c9c5e98cb1089":[13,4,5], -"a01442.html#gac88ba81abfd42df65c6c0c64414dfc6e":[13,4,11], -"a01442.html#gacb09a6fa845efade7d47796bead14d2c":[13,4,8], -"a01442.html#gad2276d5ebd02613fbeda8ae15b679d1e":[13,4,9], -"a01442.html#gaf8074d759241d3edd6d8ead1d7322a98":[13,4,19], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9":[13,4,5,5], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e":[13,4,5,7], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d":[13,4,5,6], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb":[13,4,5,9], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26":[13,4,5,1], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1":[13,4,5,4], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d":[13,4,5,2], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb":[13,4,5,0], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7":[13,4,5,3], -"a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2":[13,4,5,8], -"a01443.html":[13,5], -"a01443.html#ga0043de3aea86035e05798afc16d516d0":[13,5,23], -"a01443.html#ga01be962d7321095d15547113d727c97d":[13,5,29], -"a01443.html#ga048a6bb9781dbbc402409a172f976f74":[13,5,12], -"a01443.html#ga121ffde3250c4ca6947c680868aa6017":[13,5,39], -"a01443.html#ga143bf9b419fc7a090cb9876436735616":[13,5,71], -"a01443.html#ga1441695a23776f3b38722e51fd3c36e3":[13,5,79], -"a01443.html#ga199c030847111ed09a682ca61b7597a9":[13,5,24], -"a01443.html#ga1c0876228cb459f64347a63f3bae4c73":[13,5,37], -"a01443.html#ga1e4f207e7180d504c5dd369cd20fef21":[13,5,42], -"a01443.html#ga208c468285600790ebcdba55a4ccf3a8":[13,5,50], -"a01443.html#ga2396e500bd36c2316a1a6e13e3117958":[13,5,14], -"a01443.html#ga249c2793a533c5487b5b7b935683a78f":[13,5,34], -"a01443.html#ga25a3291ce46841ca52346b42dc416485":[13,5,82], -"a01443.html#ga28ae8005ca4b109958b090d2079d190b":[13,5,25], -"a01443.html#ga33f676825335d37da36aee1c93463829":[13,5,47], -"a01443.html#ga35593316a537ec58d4a214243be9c862":[13,5,20], -"a01443.html#ga3bddddfbb916fe1dd1e935e454d3265b":[13,5,27], -"a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0":[13,5,68], -"a01443.html#ga42939c26927fb65340ff1ebb2914a976":[13,5,77], -"a01443.html#ga47509d283523ab1892fb8746d6f4e37d":[13,5,7], -"a01443.html#ga4a59e158244def2c79227aa244bd59c2":[13,5,33], -"a01443.html#ga4b6db1523875a2b1453ef5e16989ecd4":[13,5,17], -"a01443.html#ga5430f01929cd7269e04db08d1f28642f":[13,5,36], -"a01443.html#ga5866e20dc2c7f9d788924155eac4fece":[13,5,57], -"a01443.html#ga5973a9cc26357822a232433f57741777":[13,5,30], -"a01443.html#ga5a7cb98e18ad338f2eaf6594acb67c32":[13,5,16], -"a01443.html#ga5bad45c1fda32b7a57275af23ab0f626":[13,5,78], -"a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b":[13,5,72], -"a01443.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb":[13,5,53], -"a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2":[13,5,46], -"a01443.html#ga62604c78d688530173e203b02df180fa":[13,5,11], -"a01443.html#ga63df515d393c9ebb6979d53208263458":[13,5,31], -"a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486":[13,5,43], -"a01443.html#ga6692847d9c41eb73e469df029697a7b9":[13,5,58], -"a01443.html#ga6961d4584f23cfe79ddec69a91e41e03":[13,5,40], -"a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461":[13,5,44], -"a01443.html#ga6e58a9d673118d8075bb4cb4c85ec0cb":[13,5,19], -"a01443.html#ga70deb837a72574263e6fb0721d8e0616":[13,5,32] +"a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5":[14,0,10], +"a01465.html#ga31cf63afba3c936d279a325d71691a68":[14,0,6], +"a01465.html#ga3b8f346977ed8428692d15f74ef12401":[14,0,11], +"a01465.html#ga60599359d5331215ca7fdf6710f0dbb1":[14,0,13], +"a01465.html#ga67606649a5f2261cb6b55478d72bf805":[14,0,2], +"a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a":[14,0,12], +"a01465.html#ga82d3c529ed81119a956957052c06e8d7":[14,0,5], +"a01465.html#ga857aacbb70f2ea18411f1ca478a0e37f":[14,0,3], +"a01465.html#ga8cd0d450da1bf23d0f6784446d35c556":[14,0,8], +"a01465.html#gaa3a0387ff2a71684a2992d4661c53331":[14,0,7], +"a01465.html#gaa4c31ab35807d8ed51fbecc48866aa04":[14,0,9], +"a01465.html#md_app_tng_readme":[14,0,0], +"a01466.html":[14,1], +"a01466.html#ga04fefe2ff5a7d2e937b2634acd22982a":[14,1,163], +"a01466.html#ga0698e0c55ad700fe57498321e842cb38":[14,1,85], +"a01466.html#ga070fa80ac0d76f6816d9f7affbcfb120":[14,1,131], +"a01466.html#ga0777a86aa412a97b19cc72a12c171b94":[14,1,153], +"a01466.html#ga098c4c2c724b90b7e2f4ecf12b9530b7":[14,1,111], +"a01466.html#ga0cf0048247bb577c85142510225ea960":[14,1,106], +"a01466.html#ga0d11f96c8d4b30c7cfb12a106fed7d35":[14,1,66], +"a01466.html#ga0d91be168c4b3714cc0177632627bfc3":[14,1,88], +"a01466.html#ga103f4596f0f9590971763592c5233ec3":[14,1,102], +"a01466.html#ga114a721517c95d5ba5fcac5b226669d6":[14,1,25], +"a01466.html#ga13a4675d782c861977b653e3c2b354ba":[14,1,169], +"a01466.html#ga147803646532319e585a0fe7a6c028ef":[14,1,115], +"a01466.html#ga17bf17c4786be097a0bb111a6f9d8ca6":[14,1,141], +"a01466.html#ga1c6666c7b4d077fb058adc4971da2160":[14,1,6], +"a01466.html#ga1d6fd831a8125a366504a0ab77b62da8":[14,1,5], +"a01466.html#ga1db86704035048066a370815b657234d":[14,1,122], +"a01466.html#ga1f5a6bbcf4f840803635fb8951b3a7e2":[14,1,158], +"a01466.html#ga211c9405bb5049dd4a5da92d25c83f3c":[14,1,36], +"a01466.html#ga2239ae3a87c341a48aa108bd82a58552":[14,1,96], +"a01466.html#ga2293df1c1c794496790bae25d3844fa5":[14,1,94], +"a01466.html#ga245f181cbf1ba418e60d060503945c33":[14,1,113], +"a01466.html#ga25d0626815c3df9dd2b43d72eecd3a36":[14,1,73], +"a01466.html#ga25d2895192d93c524f5dba92a492cdfb":[14,1,83], +"a01466.html#ga2649126606db8a0b64ae8e19d09f6600":[14,1,67], +"a01466.html#ga2ad3270d8bebf6172dc02d0c7d9fb738":[14,1,9], +"a01466.html#ga2b02163fab87313b81dd7f51345d3eb6":[14,1,48], +"a01466.html#ga2c3e18de900ba705192963d08b37f600":[14,1,139], +"a01466.html#ga2ea51a5aafd900c9bdffeffe82274255":[14,1,108], +"a01466.html#ga301d5e57486fefc1bd19da3cddc5bc0c":[14,1,45], +"a01466.html#ga310a017cddce9ef05071cb619b4b6db9":[14,1,126], +"a01466.html#ga31d269ccdafd08519a899a8aebf53df1":[14,1,120], +"a01466.html#ga34b7b6d46868f0d63d195216ef9939b1":[14,1,33], +"a01466.html#ga376b6ae92f14c60fba4ca5c6461e0b48":[14,1,65], +"a01466.html#ga39003da4dc8a0b8999f1325c2f96f641":[14,1,167], +"a01466.html#ga39bd70baa7a4c7f4849fcf8b94d4d949":[14,1,130], +"a01466.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4":[14,1,114], +"a01466.html#ga3a4e2ffada9173db1a775a697bbebf18":[14,1,140], +"a01466.html#ga3aa141525a1141f1a290e2a996da0c9c":[14,1,21], +"a01466.html#ga3ce01f02f456c08891ca1d67cd3ed0eb":[14,1,112], +"a01466.html#ga3f7953865c6091f266e727714e6f91dd":[14,1,42], +"a01466.html#ga40a6c01492a76366f9402302b527c4e1":[14,1,82], +"a01466.html#ga40b70cfab865fa4fd9a5e7a29ca59d38":[14,1,24], +"a01466.html#ga416e4aeacf3acc35b1d5b76028c6947d":[14,1,137], +"a01466.html#ga44aae7e0a28993eb6abf78bb3d42e26d":[14,1,75], +"a01466.html#ga45f1d09a51f7a1f68916536ab5125b9d":[14,1,55], +"a01466.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa":[14,1,156], +"a01466.html#ga4805112b62e86b5465e24648504dc374":[14,1,15], +"a01466.html#ga481179181349c801c16fc1ab698f2f24":[14,1,54], +"a01466.html#ga4882d4c30f1af2d1aab24a0c465f181d":[14,1,49], +"a01466.html#ga4af82005556c549c30e1c4bd35d4f4e4":[14,1,46], +"a01466.html#ga4b76ca12e6f7236d9ef3235b174f48cc":[14,1,134], +"a01466.html#ga4bf8b665fe1712626a480742c2daa16b":[14,1,56], +"a01466.html#ga4df72bf98b5f19668dc402c35fd4ef17":[14,1,80], +"a01466.html#ga4fa442396dfbb89e59dfca837b565cec":[14,1,101], +"a01466.html#ga51e3ae10f0596d473f646074650904e6":[14,1,37], +"a01466.html#ga5554940ed4c7c7e28652ce6923cf9314":[14,1,18], +"a01466.html#ga559add3e8b4f85a9d91fc0ed86aefa29":[14,1,135], +"a01466.html#ga55ba8a1787f69d44d6e40db041fbd786":[14,1,20], +"a01466.html#ga582dc8686f0491ad4292287f6971543c":[14,1,146], +"a01466.html#ga592c23e94097ad5e212beb6390aa88c6":[14,1,160], +"a01466.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee":[14,1,27], +"a01466.html#ga5c11f2012a03ec79cb46de8e03ed0534":[14,1,118], +"a01466.html#ga5c1e598bf3d4d25b522f42d6038a4268":[14,1,133], +"a01466.html#ga6073c5a05e0ad2e738f460e727014553":[14,1,19], +"a01466.html#ga617bdbdce7b5736351d93214d44c5b8f":[14,1,43], +"a01466.html#ga67f2ce6224651d9cc65e9915e35558bd":[14,1,59], +"a01466.html#ga694d921c7bc17a0e158ef96e3d476700":[14,1,138], +"a01466.html#ga69b8282d1b1e0c54b9a7d286fed503b8":[14,1,132], +"a01466.html#ga6e19ecd60be4c74665d9ec142e460771":[14,1,61], +"a01466.html#ga6e510e056ea16a0a34b405b7ca378f16":[14,1,31], +"a01466.html#ga6e74da1e2ef3168e48bbc89c44b16d2f":[14,1,72], +"a01466.html#ga6ed7e645262fcc32b00d8a9facf09e91":[14,1,57], +"a01466.html#ga6fc480ad2824df6309f4f370ffad15f9":[14,1,35], +"a01466.html#ga70751ea87f2cf913986bc7bca2cc661f":[14,1,41], +"a01466.html#ga72f385a8eafc464a05acfa54561fed63":[14,1,99], +"a01466.html#ga7371f490659b6fd68739d2b1fee50696":[14,1,116], +"a01466.html#ga74d1db50562642ce511fa7cbd384c2ab":[14,1,128], +"a01466.html#ga750704332198726725a327344f4f7dd5":[14,1,103], +"a01466.html#ga775bea13de8cc26e61a34ada48358568":[14,1,47], +"a01466.html#ga782ca1e5b1574b2b6793c841be22b28b":[14,1,107], +"a01466.html#ga78a5394997ea31b125cd57d07aa73636":[14,1,155], +"a01466.html#ga78abefc293c0a04d8ef649c94c8a1057":[14,1,166], +"a01466.html#ga7a823d2a391bf80ff336eb2ccbd37412":[14,1,52], +"a01466.html#ga7a929bf65cbc777bab7e533a2755cfad":[14,1,164], +"a01466.html#ga7cd67c03c7184ad041e2c0ad4f27db23":[14,1,84], +"a01466.html#ga7e3189411975d835c0115511556302d8":[14,1,76], +"a01466.html#ga8020aa89a5bed09ad35320b78e0fb890":[14,1,89], +"a01466.html#ga802de50265ff91dc30dd7c93d9e026e1":[14,1,79], +"a01466.html#ga806d07982fda5c30755af6b5b4ef9314":[14,1,62], +"a01466.html#ga8105d79d3dd914cf643121ff243b00a3":[14,1,91], +"a01466.html#ga813fb67193a7c39d02ce7ad8d2d12123":[14,1,12], +"a01466.html#ga8742a7be77a2350c069c5c380ac4c635":[14,1,16], +"a01466.html#ga89942894a5a8f82391d74346603aa837":[14,1,98], +"a01466.html#ga8a741e461c20d2a72493bc6178826eb1":[14,1,110], +"a01466.html#ga8ef47330eef6bc72ae8f7a8ef026dae3":[14,1,104], +"a01466.html#ga92d651c637007f8c3672c3313767c0e7":[14,1,154], +"a01466.html#ga9393b545b2fa1fdd539672a0428a30ab":[14,1,142], +"a01466.html#ga9475e032c388144c5a0df45d1df182a5":[14,1,136], +"a01466.html#ga9506331ea7d454fe3c9b2585128c77aa":[14,1,117], +"a01466.html#ga958190a9182d1b54f82fbca8216406ea":[14,1,87], +"a01466.html#ga9658e84055727e6357cf7ef636b4e398":[14,1,1], +"a01466.html#ga96c434878e1f435e2cda5b0b5fec444f":[14,1,109], +"a01466.html#ga973437347c3261df0b116fec9ee9c378":[14,1,71], +"a01466.html#ga975f7303086190d3b6f76c367583d622":[14,1,38], +"a01466.html#ga98cb802fbb5d78cd552bb05c21d6c791":[14,1,92], +"a01466.html#ga9c5173c7529f898f251814133169ba1d":[14,1,8], +"a01466.html#ga9ee98f13a88710e5234266b4b456b1dc":[14,1,105], +"a01466.html#gaa1d392a2b2ae7a51907cb724f0465741":[14,1,70], +"a01466.html#gaa4be9972396b7cadb08dd8e2199daf08":[14,1,125], +"a01466.html#gaa52cdbbfd2f089d8eb42ef2640204ca7":[14,1,145], +"a01466.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba":[14,1,4], +"a01466.html#gaa7a2f89236943bcd0ed7f6616ccbb043":[14,1,63], +"a01466.html#gaa80d6c193374d363649236778289f2ea":[14,1,157], +"a01466.html#gaa86508958ff3d81f9bd8e79344537218":[14,1,7], +"a01466.html#gaa8b6953ad2c7f749e61566fd38fe6903":[14,1,44], +"a01466.html#gaac8b8555b03b50a118b70cb8387c24ae":[14,1,14], +"a01466.html#gaadde4309089c569fd87c24a1a2326cd4":[14,1,26], +"a01466.html#gab22d2a32e6c32c14c4e58ce794ff3ec4":[14,1,69], +"a01466.html#gab25ca44957dff1c2df34607738ca3bf7":[14,1,152], +"a01466.html#gab3a32e171ca1c30bd31a216b32c9b5a4":[14,1,121], +"a01466.html#gab3fda8219d17d1b7bc50b1040399a47d":[14,1,13], +"a01466.html#gab7ca9ee391118aafe6f3cf7df4fa5de3":[14,1,165], +"a01466.html#gabaaaef242649206029e1c10ac6d1fb7d":[14,1,30], +"a01466.html#gabd5b5206bd54f7e7513a0c21a3ffbe31":[14,1,34], +"a01466.html#gabf2b29b4d3ae926b63c403d084380dbe":[14,1,150], +"a01466.html#gac244b83b061ffd8ae3d59b5f973baa53":[14,1,39], +"a01466.html#gac37b319dabc5b9492a422f6d3d4e118b":[14,1,93], +"a01466.html#gac395a7e195aa3cf28b48de345755feb0":[14,1,151], +"a01466.html#gac55fcbd824ffc9a30c6a5bbafb93aad2":[14,1,10], +"a01466.html#gac5f4cc263fd729871446e01cb063f141":[14,1,78], +"a01466.html#gac873a37c53fdd922d5b36efd737e3ec3":[14,1,161], +"a01466.html#gacc9a58dc49f91674213f34fa7bbd05e1":[14,1,3], +"a01466.html#gacd308bac927905d5c59f526b40c63d76":[14,1,64], +"a01466.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8":[14,1,68], +"a01466.html#gacf9a0c7772ebb65b87c4a4788850702b":[14,1,147], +"a01466.html#gad017ae33af5a7ea062cea7d54de675a8":[14,1,170], +"a01466.html#gad03eaf30d3d776260ad57ff05c2d6aa1":[14,1,159], +"a01466.html#gad08f6cceac6e8147aeb6f665dc0a2aff":[14,1,144], +"a01466.html#gad10d15454308230fbef54bdd43001ed2":[14,1,162], +"a01466.html#gad115ce255664a48b80e90ea19c156b79":[14,1,0], +"a01466.html#gad2096a4618dd37c48ed48847fe63d844":[14,1,50], +"a01466.html#gad3bc620aedd9322d160eece0d8d20c82":[14,1,149], +"a01466.html#gad50eab1ee1abb18515e914a294668907":[14,1,28], +"a01466.html#gad65cf773e03aed93e2a1437f13511a91":[14,1,53], +"a01466.html#gad71a5720ceaddf2c76476aead5f0c3e6":[14,1,17], +"a01466.html#gada2d38835826587970de3868ca48eaa4":[14,1,11], +"a01466.html#gada3308b30b1b1e40abb806dbc5476648":[14,1,168], +"a01466.html#gadac89d52a30b7a11768cf4c5de8d4d08":[14,1,74], +"a01466.html#gadb91d2c3601b95f0ad413cf84a4dfd87":[14,1,29], +"a01466.html#gadd4e462d88600ee2d36c3c5bf699fde3":[14,1,81], +"a01466.html#gade49e7746864105730fa7d531645ff62":[14,1,58], +"a01466.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a":[14,1,129], +"a01466.html#gae2cbb1989eff2c66935040f41a593bf6":[14,1,51], +"a01466.html#gae31a9fd8e9deca79aa5fef0292fe5272":[14,1,23], +"a01466.html#gae3343c160e80365b7e96bdfdc9b6365c":[14,1,127], +"a01466.html#gae655ce06583c08169170102fbb0b55c9":[14,1,123], +"a01466.html#gae8cc7670847805423ad591985eecd832":[14,1,143], +"a01466.html#gaead7151af044da249b398dc457fc8e06":[14,1,100], +"a01466.html#gaeb4a36bc6992612cc3b1f950c0d020b7":[14,1,119], +"a01466.html#gaebaf49a3412181fa47ba3a761c5a2d5b":[14,1,2], +"a01466.html#gaed67d447d547c67b7b8be6b958d1fb5c":[14,1,97], +"a01466.html#gaede6ae09e6192e452ad261f4e15e1c62":[14,1,124], +"a01466.html#gaeee666028a097659af69cc828a6bd68b":[14,1,32], +"a01466.html#gaeeff0177acf29e6e7b134a14d7119d69":[14,1,22], +"a01466.html#gaefce484222bdbedef37787a9b10d4426":[14,1,77], +"a01466.html#gaf29e398e2aca927ab4606aa1ec0308c6":[14,1,90], +"a01466.html#gaf47433a371b9fcb8d65a4214cd9e4fa0":[14,1,60], +"a01466.html#gaf5059df8d40a5f9f0f5e2004039de424":[14,1,86], +"a01466.html#gaf8e10791759a8a5e5dcd82774f4895d6":[14,1,95], +"a01466.html#gafaccb0c9d12154b0c5b917f89f233721":[14,1,40], +"a01466.html#gaff701132013eaac5600dd9fd6253505d":[14,1,148], +"a01467.html":[14,2], +"a01468.html":[14,3], +"a01468.html#ga054acfe7d4dd4064f9d27a9ea7fc2337":[14,3,1], +"a01468.html#ga3f98e29cffa06446fc91b329703606af":[14,3,4], +"a01468.html#ga765308123cf522f5ec8b528bf4ea1243":[14,3,3], +"a01468.html#ga8eec7f2190d1f9bda6684f5d2177db15":[14,3,6], +"a01468.html#gab729e6c838c0a247d4f226fb92492d96":[14,3,8], +"a01468.html#gac087cf04cd5bd6ff2e026d89bfbf5e12":[14,3,5], +"a01468.html#gad5e12e12d3030e28d75164286df9e5e9":[14,3,7], +"a01468.html#gada27ffa70c78964d3b38abd11c5f4f22":[14,3,2], +"a01469.html":[14,4], +"a01469.html#ga01badea388343bdf5929c5c2be9f426b":[14,4,15], +"a01469.html#ga128f54833b5ed2105dae417333e1d651":[14,4,7], +"a01469.html#ga324cef45a35e02b387001afdc9092778":[14,4,10], +"a01469.html#ga32693c852341e1b946bab3cca5f71761":[14,4,18], +"a01469.html#ga349718dea5d5b558766a31b7dcd7e811":[14,4,6], +"a01469.html#ga386353e8700eec35e4548dfa29f13b8d":[14,4,14], +"a01469.html#ga3a31087729a7a2e9a624572f234809fc":[14,4,24], +"a01469.html#ga4e975805352164dc3a8ff553b42c509f":[14,4,22], +"a01469.html#ga5e4163b8882d4eb42d4d5191c8731da0":[14,4,12], +"a01469.html#ga8e50f9bf69be0910880411e9a0d5bc24":[14,4,20], +"a01469.html#ga9efe98ee7fe9be95593c7177800efd8d":[14,4,21], +"a01469.html#gaa9323be08c4d757019e9863d9a7fb6b1":[14,4,4], +"a01469.html#gaaff5268b9acbf16db03b425e6c54f97c":[14,4,23], +"a01469.html#gab9ee16357a8e397a72eda7e9c8553fb3":[14,4,25], +"a01469.html#gabd4f20b06efedede6bc4a836cfad8f38":[14,4,16], +"a01469.html#gac06336335e5f3191e3b1fc06d2830d96":[14,4,17], +"a01469.html#gac794fffe040e6d47a34c756720f3cbea":[14,4,13], +"a01469.html#gac7f674d4a0afb12d2f3c9c5e98cb1089":[14,4,5], +"a01469.html#gac88ba81abfd42df65c6c0c64414dfc6e":[14,4,11], +"a01469.html#gacb09a6fa845efade7d47796bead14d2c":[14,4,8], +"a01469.html#gad2276d5ebd02613fbeda8ae15b679d1e":[14,4,9], +"a01469.html#gaf8074d759241d3edd6d8ead1d7322a98":[14,4,19], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9":[14,4,5,5], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e":[14,4,5,7], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d":[14,4,5,6], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb":[14,4,5,9], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26":[14,4,5,1], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1":[14,4,5,4], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d":[14,4,5,2], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb":[14,4,5,0], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7":[14,4,5,3], +"a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2":[14,4,5,8], +"a01470.html":[14,5], +"a01470.html#ga0043de3aea86035e05798afc16d516d0":[14,5,23], +"a01470.html#ga01be962d7321095d15547113d727c97d":[14,5,29], +"a01470.html#ga048a6bb9781dbbc402409a172f976f74":[14,5,12], +"a01470.html#ga121ffde3250c4ca6947c680868aa6017":[14,5,39], +"a01470.html#ga143bf9b419fc7a090cb9876436735616":[14,5,71], +"a01470.html#ga1441695a23776f3b38722e51fd3c36e3":[14,5,79], +"a01470.html#ga199c030847111ed09a682ca61b7597a9":[14,5,24], +"a01470.html#ga1c0876228cb459f64347a63f3bae4c73":[14,5,37], +"a01470.html#ga1e4f207e7180d504c5dd369cd20fef21":[14,5,42], +"a01470.html#ga208c468285600790ebcdba55a4ccf3a8":[14,5,50], +"a01470.html#ga2396e500bd36c2316a1a6e13e3117958":[14,5,14], +"a01470.html#ga249c2793a533c5487b5b7b935683a78f":[14,5,34], +"a01470.html#ga25a3291ce46841ca52346b42dc416485":[14,5,82], +"a01470.html#ga263eee4dfc30ce4442bfa97f95bd5c30":[14,5,67], +"a01470.html#ga28ae8005ca4b109958b090d2079d190b":[14,5,25], +"a01470.html#ga33f676825335d37da36aee1c93463829":[14,5,47], +"a01470.html#ga35593316a537ec58d4a214243be9c862":[14,5,20], +"a01470.html#ga3bddddfbb916fe1dd1e935e454d3265b":[14,5,27], +"a01470.html#ga40feb31278b164a32fe9bf9c2c5a79c0":[14,5,68], +"a01470.html#ga42939c26927fb65340ff1ebb2914a976":[14,5,77], +"a01470.html#ga47509d283523ab1892fb8746d6f4e37d":[14,5,7], +"a01470.html#ga4a59e158244def2c79227aa244bd59c2":[14,5,33] }; diff --git a/navtreeindex5.js b/navtreeindex5.js index ce9213c28..a3fbb9c8b 100644 --- a/navtreeindex5.js +++ b/navtreeindex5.js @@ -1,253 +1,253 @@ var NAVTREEINDEX5 = { -"a01443.html#ga7305906995afb21b494446d84298533b":[13,5,63], -"a01443.html#ga77184d0c71198b489ea9b57d07da824e":[13,5,38], -"a01443.html#ga79182d181cd8041a0e66e18790dff519":[13,5,60], -"a01443.html#ga7a2e774fc8b12c4045dea335a86afca6":[13,5,8], -"a01443.html#ga7bd1ad830360fc8b988f855da6d0d5ba":[13,5,15], -"a01443.html#ga7eb1ce78d2efb60aa56b929577fa88d2":[13,5,73], -"a01443.html#ga7f12776448f02a8c9862c4af64537017":[13,5,75], -"a01443.html#ga813047a656af7fe578d28fd54c840e8e":[13,5,35], -"a01443.html#ga822ee0620c8d2d12ff971b9b35f9f5cd":[13,5,6], -"a01443.html#ga82a0f236afa03da347abbee1db588cb3":[13,5,51], -"a01443.html#ga883a0c84474150e6b123dfab15a8c929":[13,5,59], -"a01443.html#ga8e3e7c64650c92364bbac17f6a75474a":[13,5,10], -"a01443.html#ga906f310b9518c8f41431b047602cd651":[13,5,70], -"a01443.html#ga949c368ba13b78caee11d2abe60de755":[13,5,49], -"a01443.html#ga9544e4c1c1ae365f90253f8a475e164e":[13,5,66], -"a01443.html#ga9a9769b84557ca2c47fa4442daa9a111":[13,5,65], -"a01443.html#ga9b103dcc50fefcb19514285da7fbe296":[13,5,41], -"a01443.html#ga9b2731e0538062863fdd2816e60787b6":[13,5,22], -"a01443.html#ga9d4810aa2fd1db14a8f91204387fd972":[13,5,54], -"a01443.html#ga9d69be730c8bd7863588c43ebe58b225":[13,5,74], -"a01443.html#gaa530a6a7f90a9a610856701b0220a161":[13,5,67], -"a01443.html#gaab6bdf548ca56cec54441114a3152767":[13,5,45], -"a01443.html#gaafd66d6744314225ead24b3901bd6372":[13,5,13], -"a01443.html#gab22e2c8bf627f700be0e10e331bfdb1f":[13,5,52], -"a01443.html#gab67e7a4c5899ef5402ff44f3f91d20b5":[13,5,80], -"a01443.html#gacb6ecab7acc06102caee5419a01bd803":[13,5,76], -"a01443.html#gacee7e7eb74c022b2ea70c7a549d5f876":[13,5,55], -"a01443.html#gad1de933f825653a1a725b46407adb09e":[13,5,61], -"a01443.html#gad473c89ee9a934029ff87e86fc1c570d":[13,5,26], -"a01443.html#gad97a813a37feaac6770f66846ad4bf27":[13,5,21], -"a01443.html#gadc86044101ad9a87556d49ab8bf892af":[13,5,56], -"a01443.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d":[13,5,18], -"a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7":[13,5,64], -"a01443.html#gae63503395992a60853867e3865f75be0":[13,5,28], -"a01443.html#gaea155533fdd352d6602d3e2fc717930f":[13,5,9], -"a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466":[13,5,62], -"a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62":[13,5,48], -"a01443.html#gafa00725d50c68cfd2e0072bf563491a0":[13,5,81], -"a01443.html#gafd202f259b53d72b0a382f33e99f9065":[13,5,69], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe":[13,5,39,7], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7":[13,5,39,2], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979":[13,5,39,3], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd":[13,5,39,5], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08":[13,5,39,8], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa":[13,5,39,6], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779":[13,5,39,4], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84":[13,5,39,0], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817":[13,5,39,1], -"a01443.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d":[13,5,39,9], -"a01443.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207":[13,5,37,0], -"a01443.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb":[13,5,37,2], -"a01443.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c":[13,5,37,3], -"a01443.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea":[13,5,37,1], -"a01443.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05":[13,5,37,4], -"a01443.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44":[13,5,36,0], -"a01443.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb":[13,5,36,1], -"a01443.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9":[13,5,36,2], -"a01443.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f":[13,5,38,0], -"a01443.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1":[13,5,35,0], -"a01443.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909":[13,5,35,9], -"a01443.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41":[13,5,35,2], -"a01443.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b":[13,5,35,1], -"a01443.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e":[13,5,35,4], -"a01443.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972":[13,5,35,8], -"a01443.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7":[13,5,35,7], -"a01443.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff":[13,5,35,3], -"a01443.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5":[13,5,35,6], -"a01443.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2":[13,5,35,5], -"a01444.html":[13,6], -"a01444.html#ga00e2fc1d5b517b275066c31be0be2304":[13,6,11], -"a01444.html#ga023735b1c0b10e70832d9a957bc99ae3":[13,6,12], -"a01444.html#ga132cfbb5c581c5cc5adf5350d4161966":[13,6,14], -"a01444.html#ga39e3e31e7573d3d73f4b757db7704cce":[13,6,18], -"a01444.html#ga55738f97714ea089a988e1853d8d6224":[13,6,8], -"a01444.html#ga59750d83d93368b2944f57bb38bf4d1f":[13,6,13], -"a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd":[13,6,5], -"a01444.html#ga801b481ac3ff13401fc2a45817d05db4":[13,6,7], -"a01444.html#ga884790e08be94431e1fbe92bf6106e06":[13,6,21], -"a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927":[13,6,9], -"a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0":[13,6,15], -"a01444.html#gac33e6d38d506b4e71618063d1b4a7499":[13,6,16], -"a01444.html#gacd82ed053319a63bbe06755632e377bc":[13,6,17], -"a01444.html#gad26b70951a0da6d80fb98027faae7a1f":[13,6,19], -"a01444.html#gad7d44a63b0871068bc30abb0faed78f9":[13,6,6], -"a01444.html#gae51a67781e9e4618e669db1c999e6ec2":[13,6,10], -"a01444.html#gafbc037d57a4cc4fec6a2f291736170cb":[13,6,20], -"a01444.html#md_lib_calib_README":[13,6,0], -"a01445.html":[13,7], -"a01445.html#md_lib_crypto_README":[13,7,0], -"a01446.html":[13,8], -"a01446.html#autotoc_md16":[13,8,0,0], -"a01446.html#autotoc_md16":[13,8,0,1,0], -"a01446.html#autotoc_md16":[6,0], -"a01446.html#autotoc_md18":[13,8,0,1], -"a01446.html#autotoc_md18":[13,8,0,1,1], -"a01446.html#autotoc_md18":[6,1], -"a01446.html#autotoc_md19":[13,8,0,1,0], -"a01446.html#autotoc_md19":[6,1,0], -"a01446.html#autotoc_md19":[13,8,0,1,1,0], -"a01446.html#autotoc_md20":[6,1,1], -"a01446.html#autotoc_md20":[13,8,0,1,1,1], -"a01446.html#autotoc_md20":[13,8,0,1,1], -"a01446.html#autotoc_md21":[13,8,0,1,1,2], -"a01446.html#autotoc_md21":[13,8,0,1,2], -"a01446.html#autotoc_md21":[6,1,2], -"a01446.html#autotoc_md22":[6,1,3], -"a01446.html#autotoc_md22":[13,8,0,1,3], -"a01446.html#autotoc_md22":[13,8,0,1,1,3], -"a01446.html#autotoc_md23":[13,8,0,1,1,4], -"a01446.html#autotoc_md23":[6,1,4], -"a01446.html#autotoc_md23":[13,8,0,1,4], -"a01446.html#ga003b63648f1a5f9eba274760559688f2":[13,8,86], -"a01446.html#ga025e8f78bfdef446732e3aafacebc857":[13,8,51], -"a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55":[13,8,24], -"a01446.html#ga05700385437884cc7b28c38d33e84f8c":[13,8,33], -"a01446.html#ga06b19a932aea9cf3a5165fefacb24f7b":[13,8,19], -"a01446.html#ga09e7f465a040fbd19ea136269571de3c":[13,8,37], -"a01446.html#ga0b1aad3936bf003686d8db7fa2be5132":[13,8,84], -"a01446.html#ga1236f6d20d3f9402af1f5c3f1adc98e3":[13,8,12], -"a01446.html#ga159bdf9c24e429d54800da1eb1c21058":[13,8,76], -"a01446.html#ga16661176757d0ef155155b07267a44ed":[13,8,71], -"a01446.html#ga17df8d983df73e2e8f62f1236f157909":[13,8,36], -"a01446.html#ga18817a4a7ab5958453eca414e28834ba":[13,8,60], -"a01446.html#ga196dbc62546b39ac3e556a0f7f6b7132":[13,8,77], -"a01446.html#ga19891182689551cc3a88603135959351":[13,8,23], -"a01446.html#ga1c62358b9abc11bc2e52b34c3dd712e0":[13,8,53], -"a01446.html#ga20f197858c01f040ca70cad589fcdabc":[13,8,9], -"a01446.html#ga237aa1d0ee551a61991b52dc7812ff64":[13,8,70], -"a01446.html#ga239b2412c8c0d45c2097a4fa06c9aa53":[13,8,58], -"a01446.html#ga24b3ca4076a0e4093644d4f58cd80a69":[13,8,66], -"a01446.html#ga24d379ed97e2c8ce205abf096707bf99":[13,8,44], -"a01446.html#ga252e365a30f2583dae8a8eac073a9f53":[13,8,79], -"a01446.html#ga31075898964b61f4877ba882477b71c3":[13,8,83], -"a01446.html#ga33fe33933fb59dde6e6fb8975da6c12d":[13,8,82], -"a01446.html#ga3c8d531ea7b725debf75cbbd851f92a0":[13,8,11], -"a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29":[13,8,48], -"a01446.html#ga3f89bae6a625d5f37abdcc99408def27":[13,8,42], -"a01446.html#ga3fd44b390fe7558c882c97faa783c018":[13,8,55], -"a01446.html#ga410c24762579358a576a58610a877e63":[13,8,68], -"a01446.html#ga43e975cd670652e6ae76f390b2e82218":[13,8,45], -"a01446.html#ga4a4d491006d9683d67838963706ac9c1":[13,8,89], -"a01446.html#ga4d01381c1a907ba56368a9313d0b65cb":[13,8,56], -"a01446.html#ga4f82572f05b8587d98bc38601453863e":[13,8,32], -"a01446.html#ga554072f32204a0eb8d7b8c7931e43343":[13,8,81], -"a01446.html#ga56a9e080fb9055109778010912be08ba":[13,8,49], -"a01446.html#ga618291172976da96c4f02dc9200c845c":[13,8,73], -"a01446.html#ga61fae4f7c3849b77ae33e767e137032d":[13,8,16], -"a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff":[13,8,20], -"a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff":[13,8,21], -"a01446.html#ga6bcb25e01ba6242973eedb32fa9dac2a":[13,8,63], -"a01446.html#ga6c3c5f6f46d99838464be80796088baa":[13,8,8], -"a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76":[13,8,28], -"a01446.html#ga6cf45c115bcb721e951e8792e0feb3f0":[13,8,65], -"a01446.html#ga6e1cf53d19f95ce1bcee622e8176b8a9":[13,8,15], -"a01446.html#ga6f06bc1662b3d0361f6a241e1b5612f2":[13,8,52], -"a01446.html#ga73601b3bcebddd5e814e47b9a9c5f2a6":[13,8,22], -"a01446.html#ga7598dfcd6dcac882836544d48356d02f":[13,8,25], -"a01446.html#ga7baebf1b0431d0670517d3788d63b111":[13,8,57], -"a01446.html#ga7e9019810ba5ab81b256282392cd5079":[13,8,31], -"a01446.html#ga8c3f1c6c20d939c4ca976fdda6279359":[13,8,69], -"a01446.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f":[13,8,54], -"a01446.html#ga9186e5235979216330ae580290872c77":[13,8,75], -"a01446.html#ga92cecc8e30a88dee1cbedd49141bc209":[13,8,64], -"a01446.html#ga9317303ada721ff3f97e7aad69437a30":[13,8,35], -"a01446.html#ga93f3dab17c14f71641ca970998ede823":[13,8,88], -"a01446.html#ga9df4dbd666a87efe49578842e53ad91e":[13,8,78], -"a01446.html#gaa7f16d0fbd30e35a1a233166f6f59d06":[13,8,14], -"a01446.html#gaad9da28968a527ce51a2b081461d4cfe":[13,8,29], -"a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d":[13,8,90], -"a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f":[13,8,39], -"a01446.html#gac382cc4431d2d1c721c21a453ba36c22":[13,8,40], -"a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae":[13,8,47], -"a01446.html#gac7644e62498a596c09952ee3b28017b9":[13,8,34], -"a01446.html#gac7f3951634faf0a7c16c234d471c3660":[13,8,62], -"a01446.html#gacadf30e249834f38397a8569c7b798c2":[13,8,46], -"a01446.html#gacb8b202e3e6d66c96262b1ad4126ff6a":[13,8,61], -"a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41":[13,8,87], -"a01446.html#gacc9a889e19d2f1a475a39391565b66dd":[13,8,41], -"a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c":[13,8,43], -"a01446.html#gad640b598d581ee7c8a4c804bee602906":[13,8,85], -"a01446.html#gad6ba20fd0d0d393f0cbf03ea9cb63346":[13,8,72], -"a01446.html#gadc23b8130e72a445f76c68d62e8c95c5":[13,8,30], -"a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1":[13,8,26], -"a01446.html#gadcf53722678e48323751359a04734680":[13,8,50], -"a01446.html#gae2eb00133330119dd9c73d6c5d9fd8dd":[13,8,10], -"a01446.html#gae31246ac870409a3d694c240c6c3498a":[13,8,27], -"a01446.html#gae3e41d9b466fb912625402db629b1a62":[13,8,74], -"a01446.html#gaeb831d9894ce11146bd00c79a98b7f0f":[13,8,67], -"a01446.html#gaf9d9d027ce20f528edea144203141714":[13,8,17], -"a01446.html#gaf9d9d027ce20f528edea144203141714":[13,8,18], -"a01446.html#gafb063a58f6e3b087cf08fce5c66ee422":[13,8,59], -"a01446.html#gafb82c723c3d22673ebf65f89497d2e99":[13,8,13], -"a01446.html#gafbe53519362f18c2688d10da6f7c618f":[13,8,38], -"a01446.html#gafc428980ec95e37eee94813db229fe70":[13,8,80], -"a01446.html#md_lib_hal_README":[13,8,0], -"a01447.html":[13,9], -"a01447.html#ga05323075c94849bf70e84f5a5931f058":[13,9,33], -"a01447.html#ga1039bfbe7e13d614814341bdee6afa7b":[13,9,30], -"a01447.html#ga10f04328eda5cffcea79652ac3509c2d":[13,9,50], -"a01447.html#ga15a78dd66644866b65cd5eda8b1a30d0":[13,9,22], -"a01447.html#ga1616d5efe59851d97fed27b47923c786":[13,9,53], -"a01447.html#ga1f445a11e4da099fec31efd43eadc234":[13,9,23], -"a01447.html#ga1fdcaf886974acc1fcdfc3bace49b700":[13,9,41], -"a01447.html#ga25187965ed87f828c98e4a20c93166e8":[13,9,52], -"a01447.html#ga2b5993f5b7254d8c6e50794824cf47b6":[13,9,28], -"a01447.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe":[13,9,42], -"a01447.html#ga3237adaae1e30c7ed469405e1ebfb435":[13,9,61], -"a01447.html#ga326ed9df4c9b966616e0b1a73f1b2796":[13,9,49], -"a01447.html#ga3d18f12db79908a5a1e831367391aa1c":[13,9,45], -"a01447.html#ga4409850783c991d3b429ee78e67c9813":[13,9,71], -"a01447.html#ga46b121ddb13c417e4d65a3fc2f6c365b":[13,9,64], -"a01447.html#ga4ea861d041b787c766e9a19a0f11421c":[13,9,35], -"a01447.html#ga4ef7d31c60616cf5177f415e32607d10":[13,9,24], -"a01447.html#ga56b92d82ffddbd86c99107b12043f8db":[13,9,32], -"a01447.html#ga572abeaaabf22c386ebcba19b4f6236c":[13,9,37], -"a01447.html#ga62321bafeb0a9dd7c4ce657ece10109f":[13,9,34], -"a01447.html#ga656372cab66beeb5a333e9a33e342017":[13,9,27], -"a01447.html#ga6d3a4804abc8a467154d5abd744c0cea":[13,9,31], -"a01447.html#ga7507880718dc536d6122f0401073b8c8":[13,9,69], -"a01447.html#ga7627ba268edc51f4e185e956bd215496":[13,9,54], -"a01447.html#ga7bf1d912d79b62cc598395642d77365f":[13,9,68], -"a01447.html#ga80ad9effe2957aaa0e604b175fcdbc63":[13,9,58], -"a01447.html#ga8305d0f433345a973f638dfea229a274":[13,9,70], -"a01447.html#ga84ee714046fea52fb6b334e37b958c89":[13,9,47], -"a01447.html#gaad38386d9ec6afcdcd39eab98e2a4a1c":[13,9,57], -"a01447.html#gab2891a03e978d463823775bc1161a06e":[13,9,25], -"a01447.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e":[13,9,40], -"a01447.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0":[13,9,48], -"a01447.html#gaba323f1307689412ea6cc1e54810edb9":[13,9,65], -"a01447.html#gabaedd7126cc73449d73843ef3b8958c0":[13,9,51], -"a01447.html#gac077314e00956519884e609b44b9cbce":[13,9,43], -"a01447.html#gac4c2db1a307043c7677e76310911d944":[13,9,44], -"a01447.html#gac9d561caddec61e481d241a88d73b653":[13,9,56], -"a01447.html#gacf6675faad5f7a43ca3fbec2108f57cd":[13,9,62], -"a01447.html#gad2bbb95a1e12c8167ce68884dcf77a4e":[13,9,39], -"a01447.html#gad2e0f0dbb511520e5d79bdb4ab649c22":[13,9,63], -"a01447.html#gada8cf14261301ec18458cbcbbe3d9b32":[13,9,38], -"a01447.html#gadc3dc30e978bcf18656aedb6dd4a62f2":[13,9,60], -"a01447.html#gadf3470738c60dbe57b33fb1e6005f40e":[13,9,46], -"a01447.html#gae9784404fbe619217879d5d12261c2b8":[13,9,36], -"a01447.html#gaebdc2d83274268bb48fc45e87aef38af":[13,9,29], -"a01447.html#gaee2c8a03b0aa78ab07b64253f2c48b22":[13,9,72], -"a01447.html#gaf07ffae9f842764c321a060ead038ac2":[13,9,55], -"a01447.html#gaf0d7fe9a16cad1ba38c7daca4295823b":[13,9,66], -"a01447.html#gaf61f82fe19690b80bf370b295c58920b":[13,9,59], -"a01447.html#gaf89317aa1f759fc58f67158abd314d1b":[13,9,67], -"a01447.html#gafd8064c07a5f22cdb087c88e1b87c1be":[13,9,26], -"a01448.html":[13,10], -"a01449.html":[13,11], -"a01449.html#ga36d21431afe595eab1b7f7a2330ad727":[13,11,2] +"a01470.html#ga4b6db1523875a2b1453ef5e16989ecd4":[14,5,17], +"a01470.html#ga5430f01929cd7269e04db08d1f28642f":[14,5,36], +"a01470.html#ga5866e20dc2c7f9d788924155eac4fece":[14,5,57], +"a01470.html#ga5973a9cc26357822a232433f57741777":[14,5,30], +"a01470.html#ga5a7cb98e18ad338f2eaf6594acb67c32":[14,5,16], +"a01470.html#ga5bad45c1fda32b7a57275af23ab0f626":[14,5,78], +"a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b":[14,5,72], +"a01470.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb":[14,5,53], +"a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2":[14,5,46], +"a01470.html#ga62604c78d688530173e203b02df180fa":[14,5,11], +"a01470.html#ga63df515d393c9ebb6979d53208263458":[14,5,31], +"a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486":[14,5,43], +"a01470.html#ga6692847d9c41eb73e469df029697a7b9":[14,5,58], +"a01470.html#ga6961d4584f23cfe79ddec69a91e41e03":[14,5,40], +"a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461":[14,5,44], +"a01470.html#ga6e58a9d673118d8075bb4cb4c85ec0cb":[14,5,19], +"a01470.html#ga70deb837a72574263e6fb0721d8e0616":[14,5,32], +"a01470.html#ga7305906995afb21b494446d84298533b":[14,5,63], +"a01470.html#ga77184d0c71198b489ea9b57d07da824e":[14,5,38], +"a01470.html#ga79182d181cd8041a0e66e18790dff519":[14,5,60], +"a01470.html#ga7a2e774fc8b12c4045dea335a86afca6":[14,5,8], +"a01470.html#ga7bd1ad830360fc8b988f855da6d0d5ba":[14,5,15], +"a01470.html#ga7eb1ce78d2efb60aa56b929577fa88d2":[14,5,73], +"a01470.html#ga7f12776448f02a8c9862c4af64537017":[14,5,75], +"a01470.html#ga813047a656af7fe578d28fd54c840e8e":[14,5,35], +"a01470.html#ga822ee0620c8d2d12ff971b9b35f9f5cd":[14,5,6], +"a01470.html#ga82a0f236afa03da347abbee1db588cb3":[14,5,51], +"a01470.html#ga883a0c84474150e6b123dfab15a8c929":[14,5,59], +"a01470.html#ga8e3e7c64650c92364bbac17f6a75474a":[14,5,10], +"a01470.html#ga906f310b9518c8f41431b047602cd651":[14,5,70], +"a01470.html#ga949c368ba13b78caee11d2abe60de755":[14,5,49], +"a01470.html#ga9544e4c1c1ae365f90253f8a475e164e":[14,5,66], +"a01470.html#ga9a9769b84557ca2c47fa4442daa9a111":[14,5,65], +"a01470.html#ga9b103dcc50fefcb19514285da7fbe296":[14,5,41], +"a01470.html#ga9b2731e0538062863fdd2816e60787b6":[14,5,22], +"a01470.html#ga9d4810aa2fd1db14a8f91204387fd972":[14,5,54], +"a01470.html#ga9d69be730c8bd7863588c43ebe58b225":[14,5,74], +"a01470.html#gaab6bdf548ca56cec54441114a3152767":[14,5,45], +"a01470.html#gaafd66d6744314225ead24b3901bd6372":[14,5,13], +"a01470.html#gab22e2c8bf627f700be0e10e331bfdb1f":[14,5,52], +"a01470.html#gab67e7a4c5899ef5402ff44f3f91d20b5":[14,5,80], +"a01470.html#gacb6ecab7acc06102caee5419a01bd803":[14,5,76], +"a01470.html#gacee7e7eb74c022b2ea70c7a549d5f876":[14,5,55], +"a01470.html#gad1de933f825653a1a725b46407adb09e":[14,5,61], +"a01470.html#gad473c89ee9a934029ff87e86fc1c570d":[14,5,26], +"a01470.html#gad97a813a37feaac6770f66846ad4bf27":[14,5,21], +"a01470.html#gadc86044101ad9a87556d49ab8bf892af":[14,5,56], +"a01470.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d":[14,5,18], +"a01470.html#gae5e5dfa5db2ac919c093ed4149ff2bc7":[14,5,64], +"a01470.html#gae63503395992a60853867e3865f75be0":[14,5,28], +"a01470.html#gaea155533fdd352d6602d3e2fc717930f":[14,5,9], +"a01470.html#gaede1f0a4a04cfd720b5fe6a8f56fc466":[14,5,62], +"a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62":[14,5,48], +"a01470.html#gafa00725d50c68cfd2e0072bf563491a0":[14,5,81], +"a01470.html#gafd202f259b53d72b0a382f33e99f9065":[14,5,69], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe":[14,5,39,7], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7":[14,5,39,2], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979":[14,5,39,3], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd":[14,5,39,5], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08":[14,5,39,8], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa":[14,5,39,6], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779":[14,5,39,4], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84":[14,5,39,0], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817":[14,5,39,1], +"a01470.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d":[14,5,39,9], +"a01470.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207":[14,5,37,0], +"a01470.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb":[14,5,37,2], +"a01470.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c":[14,5,37,3], +"a01470.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea":[14,5,37,1], +"a01470.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05":[14,5,37,4], +"a01470.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44":[14,5,36,0], +"a01470.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb":[14,5,36,1], +"a01470.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9":[14,5,36,2], +"a01470.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f":[14,5,38,0], +"a01470.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1":[14,5,35,0], +"a01470.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909":[14,5,35,9], +"a01470.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41":[14,5,35,2], +"a01470.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b":[14,5,35,1], +"a01470.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e":[14,5,35,4], +"a01470.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972":[14,5,35,8], +"a01470.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7":[14,5,35,7], +"a01470.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff":[14,5,35,3], +"a01470.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5":[14,5,35,6], +"a01470.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2":[14,5,35,5], +"a01471.html":[14,6], +"a01471.html#ga00e2fc1d5b517b275066c31be0be2304":[14,6,11], +"a01471.html#ga023735b1c0b10e70832d9a957bc99ae3":[14,6,12], +"a01471.html#ga132cfbb5c581c5cc5adf5350d4161966":[14,6,14], +"a01471.html#ga39e3e31e7573d3d73f4b757db7704cce":[14,6,18], +"a01471.html#ga55738f97714ea089a988e1853d8d6224":[14,6,8], +"a01471.html#ga59750d83d93368b2944f57bb38bf4d1f":[14,6,13], +"a01471.html#ga7c140a1696f5585d61426cdd4ed9c8dd":[14,6,5], +"a01471.html#ga801b481ac3ff13401fc2a45817d05db4":[14,6,7], +"a01471.html#ga884790e08be94431e1fbe92bf6106e06":[14,6,21], +"a01471.html#gab6791f8eef4fb94c44d84f69fa8d7927":[14,6,9], +"a01471.html#gabc7aff4f1707fbe0a05cf416955f43b0":[14,6,15], +"a01471.html#gac33e6d38d506b4e71618063d1b4a7499":[14,6,16], +"a01471.html#gacd82ed053319a63bbe06755632e377bc":[14,6,17], +"a01471.html#gad26b70951a0da6d80fb98027faae7a1f":[14,6,19], +"a01471.html#gad7d44a63b0871068bc30abb0faed78f9":[14,6,6], +"a01471.html#gae51a67781e9e4618e669db1c999e6ec2":[14,6,10], +"a01471.html#gafbc037d57a4cc4fec6a2f291736170cb":[14,6,20], +"a01471.html#md_lib_calib_README":[14,6,0], +"a01472.html":[14,7], +"a01472.html#md_lib_crypto_README":[14,7,0], +"a01473.html":[14,8], +"a01473.html#autotoc_md16":[14,8,0,1,0], +"a01473.html#autotoc_md16":[6,0], +"a01473.html#autotoc_md16":[14,8,0,0], +"a01473.html#autotoc_md18":[6,1], +"a01473.html#autotoc_md18":[14,8,0,1], +"a01473.html#autotoc_md18":[14,8,0,1,1], +"a01473.html#autotoc_md19":[14,8,0,1,1,0], +"a01473.html#autotoc_md19":[6,1,0], +"a01473.html#autotoc_md19":[14,8,0,1,0], +"a01473.html#autotoc_md20":[6,1,1], +"a01473.html#autotoc_md20":[14,8,0,1,1], +"a01473.html#autotoc_md20":[14,8,0,1,1,1], +"a01473.html#autotoc_md21":[14,8,0,1,1,2], +"a01473.html#autotoc_md21":[14,8,0,1,2], +"a01473.html#autotoc_md21":[6,1,2], +"a01473.html#autotoc_md22":[6,1,3], +"a01473.html#autotoc_md22":[14,8,0,1,3], +"a01473.html#autotoc_md22":[14,8,0,1,1,3], +"a01473.html#autotoc_md23":[6,1,4], +"a01473.html#autotoc_md23":[14,8,0,1,4], +"a01473.html#autotoc_md23":[14,8,0,1,1,4], +"a01473.html#ga003b63648f1a5f9eba274760559688f2":[14,8,86], +"a01473.html#ga025e8f78bfdef446732e3aafacebc857":[14,8,51], +"a01473.html#ga0544f36422b5e9a8890fb9c90fc5eb55":[14,8,24], +"a01473.html#ga05700385437884cc7b28c38d33e84f8c":[14,8,33], +"a01473.html#ga06b19a932aea9cf3a5165fefacb24f7b":[14,8,19], +"a01473.html#ga09e7f465a040fbd19ea136269571de3c":[14,8,37], +"a01473.html#ga0b1aad3936bf003686d8db7fa2be5132":[14,8,84], +"a01473.html#ga1236f6d20d3f9402af1f5c3f1adc98e3":[14,8,12], +"a01473.html#ga159bdf9c24e429d54800da1eb1c21058":[14,8,76], +"a01473.html#ga16661176757d0ef155155b07267a44ed":[14,8,71], +"a01473.html#ga17df8d983df73e2e8f62f1236f157909":[14,8,36], +"a01473.html#ga18817a4a7ab5958453eca414e28834ba":[14,8,60], +"a01473.html#ga196dbc62546b39ac3e556a0f7f6b7132":[14,8,77], +"a01473.html#ga19891182689551cc3a88603135959351":[14,8,23], +"a01473.html#ga1c62358b9abc11bc2e52b34c3dd712e0":[14,8,53], +"a01473.html#ga20f197858c01f040ca70cad589fcdabc":[14,8,9], +"a01473.html#ga237aa1d0ee551a61991b52dc7812ff64":[14,8,70], +"a01473.html#ga239b2412c8c0d45c2097a4fa06c9aa53":[14,8,58], +"a01473.html#ga24b3ca4076a0e4093644d4f58cd80a69":[14,8,66], +"a01473.html#ga24d379ed97e2c8ce205abf096707bf99":[14,8,44], +"a01473.html#ga252e365a30f2583dae8a8eac073a9f53":[14,8,79], +"a01473.html#ga31075898964b61f4877ba882477b71c3":[14,8,83], +"a01473.html#ga33fe33933fb59dde6e6fb8975da6c12d":[14,8,82], +"a01473.html#ga3c8d531ea7b725debf75cbbd851f92a0":[14,8,11], +"a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29":[14,8,48], +"a01473.html#ga3f89bae6a625d5f37abdcc99408def27":[14,8,42], +"a01473.html#ga3fd44b390fe7558c882c97faa783c018":[14,8,55], +"a01473.html#ga410c24762579358a576a58610a877e63":[14,8,68], +"a01473.html#ga43e975cd670652e6ae76f390b2e82218":[14,8,45], +"a01473.html#ga4a4d491006d9683d67838963706ac9c1":[14,8,89], +"a01473.html#ga4d01381c1a907ba56368a9313d0b65cb":[14,8,56], +"a01473.html#ga4f82572f05b8587d98bc38601453863e":[14,8,32], +"a01473.html#ga554072f32204a0eb8d7b8c7931e43343":[14,8,81], +"a01473.html#ga56a9e080fb9055109778010912be08ba":[14,8,49], +"a01473.html#ga618291172976da96c4f02dc9200c845c":[14,8,73], +"a01473.html#ga61fae4f7c3849b77ae33e767e137032d":[14,8,16], +"a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff":[14,8,20], +"a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff":[14,8,21], +"a01473.html#ga6bcb25e01ba6242973eedb32fa9dac2a":[14,8,63], +"a01473.html#ga6c3c5f6f46d99838464be80796088baa":[14,8,8], +"a01473.html#ga6ce92f1d10000eb6618fc74c2ca92d76":[14,8,28], +"a01473.html#ga6cf45c115bcb721e951e8792e0feb3f0":[14,8,65], +"a01473.html#ga6e1cf53d19f95ce1bcee622e8176b8a9":[14,8,15], +"a01473.html#ga6f06bc1662b3d0361f6a241e1b5612f2":[14,8,52], +"a01473.html#ga73601b3bcebddd5e814e47b9a9c5f2a6":[14,8,22], +"a01473.html#ga7598dfcd6dcac882836544d48356d02f":[14,8,25], +"a01473.html#ga7baebf1b0431d0670517d3788d63b111":[14,8,57], +"a01473.html#ga7e9019810ba5ab81b256282392cd5079":[14,8,31], +"a01473.html#ga8c3f1c6c20d939c4ca976fdda6279359":[14,8,69], +"a01473.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f":[14,8,54], +"a01473.html#ga9186e5235979216330ae580290872c77":[14,8,75], +"a01473.html#ga92cecc8e30a88dee1cbedd49141bc209":[14,8,64], +"a01473.html#ga9317303ada721ff3f97e7aad69437a30":[14,8,35], +"a01473.html#ga93f3dab17c14f71641ca970998ede823":[14,8,88], +"a01473.html#ga9df4dbd666a87efe49578842e53ad91e":[14,8,78], +"a01473.html#gaa7f16d0fbd30e35a1a233166f6f59d06":[14,8,14], +"a01473.html#gaad9da28968a527ce51a2b081461d4cfe":[14,8,29], +"a01473.html#gaba296f70baf68b768d6c4bb9cf7ba67d":[14,8,90], +"a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f":[14,8,39], +"a01473.html#gac382cc4431d2d1c721c21a453ba36c22":[14,8,40], +"a01473.html#gac5acbcb3cee22506992d838cd8a3e8ae":[14,8,47], +"a01473.html#gac7644e62498a596c09952ee3b28017b9":[14,8,34], +"a01473.html#gac7f3951634faf0a7c16c234d471c3660":[14,8,62], +"a01473.html#gacadf30e249834f38397a8569c7b798c2":[14,8,46], +"a01473.html#gacb8b202e3e6d66c96262b1ad4126ff6a":[14,8,61], +"a01473.html#gacc2a96c86ce4c07249b81bc6a7eb2e41":[14,8,87], +"a01473.html#gacc9a889e19d2f1a475a39391565b66dd":[14,8,41], +"a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c":[14,8,43], +"a01473.html#gad640b598d581ee7c8a4c804bee602906":[14,8,85], +"a01473.html#gad6ba20fd0d0d393f0cbf03ea9cb63346":[14,8,72], +"a01473.html#gadc23b8130e72a445f76c68d62e8c95c5":[14,8,30], +"a01473.html#gadc420e4b166a1b339d1a2687e0f12cb1":[14,8,26], +"a01473.html#gadcf53722678e48323751359a04734680":[14,8,50], +"a01473.html#gae2eb00133330119dd9c73d6c5d9fd8dd":[14,8,10], +"a01473.html#gae31246ac870409a3d694c240c6c3498a":[14,8,27], +"a01473.html#gae3e41d9b466fb912625402db629b1a62":[14,8,74], +"a01473.html#gaeb831d9894ce11146bd00c79a98b7f0f":[14,8,67], +"a01473.html#gaf9d9d027ce20f528edea144203141714":[14,8,18], +"a01473.html#gaf9d9d027ce20f528edea144203141714":[14,8,17], +"a01473.html#gafb063a58f6e3b087cf08fce5c66ee422":[14,8,59], +"a01473.html#gafb82c723c3d22673ebf65f89497d2e99":[14,8,13], +"a01473.html#gafbe53519362f18c2688d10da6f7c618f":[14,8,38], +"a01473.html#gafc428980ec95e37eee94813db229fe70":[14,8,80], +"a01473.html#md_lib_hal_README":[14,8,0], +"a01474.html":[14,9], +"a01474.html#ga05323075c94849bf70e84f5a5931f058":[14,9,33], +"a01474.html#ga1039bfbe7e13d614814341bdee6afa7b":[14,9,30], +"a01474.html#ga10f04328eda5cffcea79652ac3509c2d":[14,9,50], +"a01474.html#ga15a78dd66644866b65cd5eda8b1a30d0":[14,9,22], +"a01474.html#ga1616d5efe59851d97fed27b47923c786":[14,9,53], +"a01474.html#ga1f445a11e4da099fec31efd43eadc234":[14,9,23], +"a01474.html#ga1fdcaf886974acc1fcdfc3bace49b700":[14,9,41], +"a01474.html#ga25187965ed87f828c98e4a20c93166e8":[14,9,52], +"a01474.html#ga2b5993f5b7254d8c6e50794824cf47b6":[14,9,28], +"a01474.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe":[14,9,42], +"a01474.html#ga3237adaae1e30c7ed469405e1ebfb435":[14,9,61], +"a01474.html#ga326ed9df4c9b966616e0b1a73f1b2796":[14,9,49], +"a01474.html#ga3d18f12db79908a5a1e831367391aa1c":[14,9,45], +"a01474.html#ga4409850783c991d3b429ee78e67c9813":[14,9,71], +"a01474.html#ga46b121ddb13c417e4d65a3fc2f6c365b":[14,9,64], +"a01474.html#ga4ea861d041b787c766e9a19a0f11421c":[14,9,35], +"a01474.html#ga4ef7d31c60616cf5177f415e32607d10":[14,9,24], +"a01474.html#ga56b92d82ffddbd86c99107b12043f8db":[14,9,32], +"a01474.html#ga572abeaaabf22c386ebcba19b4f6236c":[14,9,37], +"a01474.html#ga62321bafeb0a9dd7c4ce657ece10109f":[14,9,34], +"a01474.html#ga656372cab66beeb5a333e9a33e342017":[14,9,27], +"a01474.html#ga6d3a4804abc8a467154d5abd744c0cea":[14,9,31], +"a01474.html#ga7507880718dc536d6122f0401073b8c8":[14,9,69], +"a01474.html#ga7627ba268edc51f4e185e956bd215496":[14,9,54], +"a01474.html#ga7bf1d912d79b62cc598395642d77365f":[14,9,68], +"a01474.html#ga80ad9effe2957aaa0e604b175fcdbc63":[14,9,58], +"a01474.html#ga8305d0f433345a973f638dfea229a274":[14,9,70], +"a01474.html#ga84ee714046fea52fb6b334e37b958c89":[14,9,47], +"a01474.html#gaad38386d9ec6afcdcd39eab98e2a4a1c":[14,9,57], +"a01474.html#gab2891a03e978d463823775bc1161a06e":[14,9,25], +"a01474.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e":[14,9,40], +"a01474.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0":[14,9,48], +"a01474.html#gaba323f1307689412ea6cc1e54810edb9":[14,9,65], +"a01474.html#gabaedd7126cc73449d73843ef3b8958c0":[14,9,51], +"a01474.html#gac077314e00956519884e609b44b9cbce":[14,9,43], +"a01474.html#gac4c2db1a307043c7677e76310911d944":[14,9,44], +"a01474.html#gac9d561caddec61e481d241a88d73b653":[14,9,56], +"a01474.html#gacf6675faad5f7a43ca3fbec2108f57cd":[14,9,62] }; diff --git a/navtreeindex6.js b/navtreeindex6.js index ace9133dc..5fd06cdb6 100644 --- a/navtreeindex6.js +++ b/navtreeindex6.js @@ -1,253 +1,253 @@ var NAVTREEINDEX6 = { -"a01449.html#ga98d684683ccecd3d56bdf5dc27ae999c":[13,11,4], -"a01449.html#gaa35682dc98e33ce3d6fad1fc902cdff0":[13,11,3], -"a01449.html#gaa55a112d0b087adc242cc9b0978b5d15":[13,11,5], -"a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6":[13,11,6], -"a01449.html#md_lib_mbedtls_README":[13,11,0], -"a01450.html":[13,12], -"a01450.html#ga01b36384bff05a4dc4476c0764cdc248":[13,12,6], -"a01450.html#ga045a35287c46a29da2ad13e700087e0d":[13,12,72], -"a01450.html#ga128ba07226b7e45772830f06dfde4b71":[13,12,8], -"a01450.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c":[13,12,12], -"a01450.html#ga1b991b6fd8b20f130f9d87b98e590fdb":[13,12,14], -"a01450.html#ga1f3dc3758726bb4737db956e4cd71e91":[13,12,17], -"a01450.html#ga210f4bdbaae1bc2b8e242e1610da4f0f":[13,12,58], -"a01450.html#ga2171c591535849faf017fa126e3a9a48":[13,12,56], -"a01450.html#ga21a9c4115bc535490416e2850a2a45fd":[13,12,19], -"a01450.html#ga230747fbe3b7a13dfda75980844c3e9d":[13,12,111], -"a01450.html#ga236a002e179ed36a0b81399a3e11fcb8":[13,12,85], -"a01450.html#ga23a9b2dc15a447decd10881dde448890":[13,12,23], -"a01450.html#ga27b3652fb8a87f7f40fff10c63316b35":[13,12,91], -"a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da":[13,12,93], -"a01450.html#ga2b726534eedac635b28ccd501c242004":[13,12,45], -"a01450.html#ga2e45ad4ce8c84712c646dddaa99544e3":[13,12,44], -"a01450.html#ga301f7118a227ffedd7f945a9532fc18a":[13,12,5], -"a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25":[13,12,80], -"a01450.html#ga37d93326915dc9b74f2476238f35037c":[13,12,57], -"a01450.html#ga386826845e06a84b36522a2bf49ff6c6":[13,12,53], -"a01450.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb":[13,12,46], -"a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2":[13,12,96], -"a01450.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403":[13,12,18], -"a01450.html#ga3f8a5f0509ef9929f90536b6e255e485":[13,12,16], -"a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa":[13,12,108], -"a01450.html#ga418414364e88d0673b4f6c90cd62ebed":[13,12,97], -"a01450.html#ga42635cbaa2ba78482ae053bea477246a":[13,12,26], -"a01450.html#ga43525e77f9049b545fa09129cacf9c9a":[13,12,84], -"a01450.html#ga44f7303f7073c7f97c3e31ec5db97769":[13,12,107], -"a01450.html#ga46347f830269bfbcbece15951f0c0fa4":[13,12,27], -"a01450.html#ga4641a3dd4da46f801565310f3784a41e":[13,12,87], -"a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df":[13,12,86], -"a01450.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529":[13,12,62], -"a01450.html#ga50e9c64b899d1b2f78c9634298225303":[13,12,71], -"a01450.html#ga54a883eb1608be800f7fbd204665d50d":[13,12,31], -"a01450.html#ga5cdd6e87496f480f42c44430250794bb":[13,12,79], -"a01450.html#ga5e13fc136e0b7f79d22a6b735424a815":[13,12,24], -"a01450.html#ga5f587605d68a7a56012ac337ddaec5e1":[13,12,54], -"a01450.html#ga66e6598e8f5db01e428a46d58b9865fc":[13,12,52], -"a01450.html#ga67ecc1ce8ca0630aebdf3a29e129f531":[13,12,13], -"a01450.html#ga6ef03269a32699359d90901cc84954f3":[13,12,110], -"a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd":[13,12,115], -"a01450.html#ga742c35812a444a87e35150e2332be0c2":[13,12,90], -"a01450.html#ga752412c887c0d900c05b771709ebac83":[13,12,51], -"a01450.html#ga75bdc5d475cd205914b8227c7f08df4c":[13,12,35], -"a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a":[13,12,104], -"a01450.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6":[13,12,20], -"a01450.html#ga7bf2fea766cab4645fe615661bcf0db9":[13,12,98], -"a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45":[13,12,99], -"a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b":[13,12,83], -"a01450.html#ga7fd56486be0426ec029cd60072ef62ba":[13,12,113], -"a01450.html#ga802a061224966a5523beb1ea0a9d9c27":[13,12,30], -"a01450.html#ga82355d41e5303e31cc49df003e9d8c38":[13,12,65], -"a01450.html#ga84673050f913404ec3ae164d4f7a1d9c":[13,12,29], -"a01450.html#ga852f9badf3176a60bfb874fb5d118791":[13,12,94], -"a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd":[13,12,114], -"a01450.html#ga8b1206a513938768655cdd541ffee9b3":[13,12,70], -"a01450.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0":[13,12,34], -"a01450.html#ga8de4193ede04a12ab4e44b8df9eec478":[13,12,103], -"a01450.html#ga945318df98e940ab331931023133ed3d":[13,12,25], -"a01450.html#ga95dcfc50be7ac2cb3ebf58d958f70dde":[13,12,39], -"a01450.html#ga97ee219718545f49ee651cbb00712b8c":[13,12,59], -"a01450.html#ga987853011908614aba0db7c5933b0a20":[13,12,95], -"a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a":[13,12,88], -"a01450.html#gaa4fb93ab28bedada72364e925b3dacbf":[13,12,11], -"a01450.html#gaaad61dc7b2313286bdd049676ef0fd70":[13,12,32], -"a01450.html#gaab9ef494fdc21911e700f2b9d62547ec":[13,12,77], -"a01450.html#gaae56826104269ca730066136fb3eb995":[13,12,76], -"a01450.html#gaae94f85980031bec34148341efd537e3":[13,12,74], -"a01450.html#gaaefbee7a7f8454014a46e969fa9912c3":[13,12,112], -"a01450.html#gab26093f478636b5ba04176c2f81f44c4":[13,12,50], -"a01450.html#gab4a336f9cb4920a9ff8585aec5d90a3f":[13,12,22], -"a01450.html#gab4cf13775c4e92b36156ee92dd52bef5":[13,12,33], -"a01450.html#gab549c4d540cff530f9e4d9bca36e2253":[13,12,9], -"a01450.html#gab735278cab8e184d682b4ed8b12dbb1b":[13,12,92], -"a01450.html#gab7a0a4ff33f2450736d76d453045ad6f":[13,12,48], -"a01450.html#gaba9414cf3fc679beaae1baa5425a6e01":[13,12,67], -"a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80":[13,12,101], -"a01450.html#gabe5aeb6b794d4ca28cb2534fe0a4a159":[13,12,36], -"a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4":[13,12,73], -"a01450.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5":[13,12,10], -"a01450.html#gac545b1d8eeb82e40f7519cdfc5a3427c":[13,12,2], -"a01450.html#gac6ce96c3f4a3b7f24d9420763df121fc":[13,12,42], -"a01450.html#gac80659e1b954f9514723fd6d4429dfb6":[13,12,37], -"a01450.html#gac933291718eb6aa218db1c677e07ab02":[13,12,43], -"a01450.html#gaca7aa4ae8d9592f464dc1b545fead02e":[13,12,47], -"a01450.html#gacf3b4678891994823f2cdd0cb8707ecc":[13,12,105], -"a01450.html#gad28ad989a94c345875dff446ad6c6481":[13,12,49], -"a01450.html#gad2ab78c409dfcbc155d673550cb71736":[13,12,3], -"a01450.html#gad3eaa8d90b81d65f8e585c81c701f893":[13,12,81], -"a01450.html#gad7a0c95a7b810c5534185632b8b58d29":[13,12,7], -"a01450.html#gada0dd5a3d8ae781df05ea016d2f76d16":[13,12,60], -"a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7":[13,12,89], -"a01450.html#gadbc903025f5c5ea06b36fba39f30d305":[13,12,106], -"a01450.html#gadd117013f515b1d441889a24a605bd93":[13,12,38], -"a01450.html#gadd899ffeae0146c08b249e3f551e21f8":[13,12,78], -"a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215":[13,12,109], -"a01450.html#gadfc9281add668a5aff9bbc1253655917":[13,12,15], -"a01450.html#gae0e3060e6ae0dfc17a35881c223d8123":[13,12,75], -"a01450.html#gae2ce0be368072fa83e0b1f5136b7b753":[13,12,4], -"a01450.html#gae795a3fd0467a249eeb075f94bfa0adc":[13,12,41], -"a01450.html#gaeae51e6092fa8c8a58e022fcd8366c45":[13,12,64], -"a01450.html#gaefe33200a70026c7e622b01473d78b66":[13,12,66], -"a01450.html#gaf47613fd93688da939cf4c6998f83d77":[13,12,69], -"a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401":[13,12,100], -"a01450.html#gaf4d4d071deb07e7dcfa489a2a835756d":[13,12,28], -"a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362":[13,12,82], -"a01450.html#gaf63ca32aef7a90f87e94a288de5e82cc":[13,12,55], -"a01450.html#gaf6ecd512fa21851f0bcbc25b90c2b444":[13,12,63], -"a01450.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6":[13,12,68], -"a01450.html#gaf9aab1c3fcf352af53b0e66652fac39d":[13,12,21], -"a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7":[13,12,102], -"a01450.html#gafd4a7d6e142179e46453af11d5da3e91":[13,12,61], -"a01450.html#gaffb75a4d4ba623ee01f31877b56b018e":[13,12,40], -"a01451.html":[14,0,0], -"a01452.html":[14,0,0,0], -"a01452.html#a02089d61678b8d494424c16bb612b8ad":[14,0,0,0,79], -"a01452.html#a03506fe5daef9a019b2688e49af8a725":[14,0,0,0,89], -"a01452.html#a035fb2c7a593d20f479943c0d74df245":[14,0,0,0,70], -"a01452.html#a037d202036ce67334a0dc1dd5b714c3e":[14,0,0,0,78], -"a01452.html#a0589fee6cdf8761c032b330a3079e0e0":[14,0,0,0,100], -"a01452.html#a0738f317bdd3c1decb934971e66ee66c":[14,0,0,0,76], -"a01452.html#a0ae7c88423c60e7dd7fefff75d443c35":[14,0,0,0,68], -"a01452.html#a0cefee590d648d724f343488569c10df":[14,0,0,0,41], -"a01452.html#a0e5230bd79eba76c6350b724d5297310":[14,0,0,0,36], -"a01452.html#a13f0865a1ac2377282b29d6721b5c834":[14,0,0,0,74], -"a01452.html#a14fe9d38029d932b4aef6802bbf078ab":[14,0,0,0,108], -"a01452.html#a18b7743ebac58022a1f704cb3b011803":[14,0,0,0,126], -"a01452.html#a1a3dce72fa3192b1ca917025b8ff4736":[14,0,0,0,27], -"a01452.html#a1b778f3fa3c6d459075500f5248d09c6":[14,0,0,0,24], -"a01452.html#a1c364ea983169ac73197713db23f9a52":[14,0,0,0,12], -"a01452.html#a2087c24eeaa066ab0481265ca17b62fb":[14,0,0,0,57], -"a01452.html#a213e34c48cf1f6a119979ae00acebee5":[14,0,0,0,63], -"a01452.html#a216d7fa1d484d6a4ecf55d7886c355ef":[14,0,0,0,45], -"a01452.html#a29a3eabf3e5e353e52dd52c69ea69ec4":[14,0,0,0,37], -"a01452.html#a323b71e8080719b27a45f63bb8ef6a59":[14,0,0,0,103], -"a01452.html#a384368c23f29b2008c79effe063da77d":[14,0,0,0,73], -"a01452.html#a3a1b9396c4a6aec1fc32839fe681f3a9":[14,0,0,0,52], -"a01452.html#a3e585d7d21fb74154c4e53d541db9e5a":[14,0,0,0,95], -"a01452.html#a3fee574ed2618a6abc770bb1f17dc6b5":[14,0,0,0,105], -"a01452.html#a40bc5aa6ac58d01d4ee7888dddd884bb":[14,0,0,0,40], -"a01452.html#a40e190b9a9b0bb5aa2389cc482f94780":[14,0,0,0,112], -"a01452.html#a4144ba085c025b94f6d39de2ba33dc26":[14,0,0,0,123], -"a01452.html#a49b55d1996aee8c868684a916341522f":[14,0,0,0,98], -"a01452.html#a49f823cd787be6ed036e7bc1e430b384":[14,0,0,0,116], -"a01452.html#a4a9dc88e03b9e5066ff28b8518196ce7":[14,0,0,0,38], -"a01452.html#a4b1ae9a8e89b7038fd5f75686ca97e31":[14,0,0,0,118], -"a01452.html#a4bcf510aa10502e29fe2321486019fb5":[14,0,0,0,104], -"a01452.html#a4c9b8fd51581178ad0d988f64e2df04c":[14,0,0,0,64], -"a01452.html#a544871498712993b7ceb7a0134beac55":[14,0,0,0,31], -"a01452.html#a583ddc1d9adbdceea0a7617c6b87ff8d":[14,0,0,0,97], -"a01452.html#a5af363a108f86f636af7581097b396cd":[14,0,0,0,34], -"a01452.html#a5b7cd7ecd0b2526f1daa7c60ea39c581":[14,0,0,0,32], -"a01452.html#a5db76308f0e51108dea8222f14ac405e":[14,0,0,0,121], -"a01452.html#a5dfdc90856af9f03e09cc280dcfe3de0":[14,0,0,0,87], -"a01452.html#a627d101aa165533d893461f5fb39efa1":[14,0,0,0,119], -"a01452.html#a63e034778c2964569df7a6fb0ec0a8f1":[14,0,0,0,58], -"a01452.html#a64223730cf6d1f1ecb48ebcfaffea75c":[14,0,0,0,75], -"a01452.html#a643bc00f84713b2e8705021f6b2c2d0f":[14,0,0,0,91], -"a01452.html#a64692832da534aacee8a61cef74e9be1":[14,0,0,0,125], -"a01452.html#a692a721d89bd8f4032502f343d3f1718":[14,0,0,0,113], -"a01452.html#a6b784447f8cf2cfc112ab33a4b10ce22":[14,0,0,0,93], -"a01452.html#a6d243431c455704e03f148b9e373db51":[14,0,0,0,102], -"a01452.html#a6f0cb9bd0b1cecd09fa765083d998db1":[14,0,0,0,62], -"a01452.html#a7063655ccab4af3b185ff519a40329e0":[14,0,0,0,94], -"a01452.html#a75272bce518cb8b951b9adae61a02c58":[14,0,0,0,83], -"a01452.html#a760c91e04ad8a62181956b73ada2e384":[14,0,0,0,72], -"a01452.html#a76dda154eba75b7c0c8f6a8fcc5d346a":[14,0,0,0,111], -"a01452.html#a78d906cc88e8efcb280a0869ca7afaf2":[14,0,0,0,20], -"a01452.html#a7e0bc033c11e689570f7aa9431d49d9c":[14,0,0,0,10], -"a01452.html#a7ffc1b8652c148a1c3a86ef80155502c":[14,0,0,0,99], -"a01452.html#a80a2b3fe53dc4caedad79221b05bbdf7":[14,0,0,0,26], -"a01452.html#a837da37427357c91aba40c6becbebfeb":[14,0,0,0,11], -"a01452.html#a84c655ca82b1c0ed968be7d63be4a5f2":[14,0,0,0,49], -"a01452.html#a8728f5f5bf67ede8dce575af486499c9":[14,0,0,0,109], -"a01452.html#a87c05138d598087100ec1e740bf9e221":[14,0,0,0,88], -"a01452.html#a87ec2b9cbb53f9f38df252d6b7508881":[14,0,0,0,29], -"a01452.html#a897a5ee03a68bba8afe2371f89a6d7a5":[14,0,0,0,101], -"a01452.html#a8b0381ac0e872d25df0373d9cd9ce4af":[14,0,0,0,54], -"a01452.html#a8d6436e974c3780cb205261049fbbb87":[14,0,0,0,85], -"a01452.html#a8e85d04188b3d10cccaf6641bf5753fe":[14,0,0,0,48], -"a01452.html#a903f3bc6862860693f3d0c7fcfb68abd":[14,0,0,0,90], -"a01452.html#a90baa667a1e6bb223cda44f4322c2f44":[14,0,0,0,117], -"a01452.html#a91f72328d639d88598498c37cb552ffb":[14,0,0,0,106], -"a01452.html#a99d19bf27efa04318480a3e81f668ae8":[14,0,0,0,15], -"a01452.html#a9a7024193b07e7c98690873e7452f0ad":[14,0,0,0,9], -"a01452.html#aa1e87847ce5fccdef062c9aaa5bea65e":[14,0,0,0,56], -"a01452.html#aa612658a288c6a5cca103e5d3965390c":[14,0,0,0,13], -"a01452.html#aa641b1946cfcb33ac7e353a6ca7285ab":[14,0,0,0,17], -"a01452.html#aa6f667c9ff033cb3e1d8bd1565e080aa":[14,0,0,0,8], -"a01452.html#aac8a5ac8d26586ed7a707ddf2224ecd8":[14,0,0,0,59], -"a01452.html#aadca3cb06b25a8b3b8c6a851ad477db0":[14,0,0,0,115], -"a01452.html#ab078cd0a92f0f235fa36fb06ccf4af19":[14,0,0,0,96], -"a01452.html#ab21835e5b3b868f49faecd453d8da4e3":[14,0,0,0,67], -"a01452.html#ab5ef9981f825f3fe5beb84b4d664f321":[14,0,0,0,21], -"a01452.html#ab78cfabfa12d891830c1147bbc61a2e0":[14,0,0,0,18], -"a01452.html#aba58d5a7562b69d72c33cfda82c2b580":[14,0,0,0,42], -"a01452.html#abcef2cce95ddc7363a687ee4cf238671":[14,0,0,0,60], -"a01452.html#abd3403fcc46a2b82556784e142161c65":[14,0,0,0,86], -"a01452.html#ac0399ab5a8ab2e7682441241fcc98914":[14,0,0,0,19], -"a01452.html#ac67f610115ce611e94d05a87ada77f66":[14,0,0,0,30], -"a01452.html#ac6eb9270fa4c963d6ebba79aea1ddc4b":[14,0,0,0,53], -"a01452.html#ac73a52d0b4b8104accb6f34542d06e85":[14,0,0,0,71], -"a01452.html#ac94db106ce16b83c5f5518cf92e24d4d":[14,0,0,0,84], -"a01452.html#acc277568c5c42424ff90d8bfcee667b8":[14,0,0,0,107], -"a01452.html#acd0f0264807684089bb1ab8bdfcb989f":[14,0,0,0,120], -"a01452.html#acef9ae292bb3e6c3c1c1b16a20bd6494":[14,0,0,0,55], -"a01452.html#ad4c4f17808f4904cef59fb3c6a3060e1":[14,0,0,0,77], -"a01452.html#ad4e841d49e6fd9d67c664f020877e730":[14,0,0,0,80], -"a01452.html#ad7cc965be77a8f829027f9afc21556b5":[14,0,0,0,69], -"a01452.html#ad9bd7c6cc3e26cca5865dda3c02bcce2":[14,0,0,0,39], -"a01452.html#add3fb2f7c78eb84e42bcb17800f2c6de":[14,0,0,0,65], -"a01452.html#ade607e2a5b08d77e4559161dfac0c0e8":[14,0,0,0,44], -"a01452.html#adefdce788a6ef35250f5b1c139454b64":[14,0,0,0,51], -"a01452.html#adf1843ed620eb72a9efc75ff0251efa6":[14,0,0,0,82], -"a01452.html#ae3505ac892b47a7384a9ec95338bee22":[14,0,0,0,50], -"a01452.html#ae3f487577cbb7e66ccb39c8d6ea9a358":[14,0,0,0,35], -"a01452.html#ae40c31b557e83cd4c590288082d07d6e":[14,0,0,0,46], -"a01452.html#ae74a63edf1522697556aa1d98493b15b":[14,0,0,0,92], -"a01452.html#ae8ab769023a1d717198eb06aa17ff8b0":[14,0,0,0,114], -"a01452.html#ae8faf982d17b5fc72231bc648a51063a":[14,0,0,0,124], -"a01452.html#aeae81b172cf9a1b8a85052b9129d9dd1":[14,0,0,0,33], -"a01452.html#aec129bd1fae35bcb87dd129ca4e065ca":[14,0,0,0,61], -"a01452.html#aec84bbc3cc86b716a2996069d5d227c0":[14,0,0,0,28], -"a01452.html#aeccd1e361da41854a45068507ccd9f33":[14,0,0,0,23], -"a01452.html#aefa4891ccc2a860029958f2e80bdef87":[14,0,0,0,25], -"a01452.html#af03e307e61709bff1443d0f72a2efdb9":[14,0,0,0,66], -"a01452.html#af218c61a8dd3d937e5dfd3ad2d0c2701":[14,0,0,0,110], -"a01452.html#af312843ce780c0062f9067c182ad2db6":[14,0,0,0,43], -"a01452.html#af34551008cb67c907488a9403da495ad":[14,0,0,0,22], -"a01452.html#af411b3996170b6dd0e90dc999c896d19":[14,0,0,0,47], -"a01452.html#af5502348939c1db2fdafde42603266f3":[14,0,0,0,16], -"a01452.html#af58b97dc722402be6c65e226a0dd26ae":[14,0,0,0,14], -"a01452.html#afcb4ae6dd50b4449b6de4d1d0754601d":[14,0,0,0,81], -"a01452.html#aff3e1986bf6d79a353f8820fe5ed4306":[14,0,0,0,122], -"a01453.html":[14,0,0,1], -"a01453.html#a0ffefee23107bcbbadef2508ccaaba4f":[14,0,0,1,21], -"a01453.html#a23ff0ccfc75d564fc9f6200ef8cff5fb":[14,0,0,1,19], -"a01453.html#a3b6192388c29b0efb1968d6b44efd712":[14,0,0,1,23], -"a01453.html#a453696e86822c980d8e5b9e6a27eb861":[14,0,0,1,15], -"a01453.html#a4fe33f1da468796b39c80a34e12411fb":[14,0,0,1,24], -"a01453.html#a5c4d1755dfd9a2b378cd45f14de1f1ee":[14,0,0,1,25], -"a01453.html#a6c23b4916b8fa6dc8aa56b45f558d870":[14,0,0,1,16], -"a01453.html#a7910146d6e2097e9fb075a2bf60d1b25":[14,0,0,1,18] +"a01474.html#gad2bbb95a1e12c8167ce68884dcf77a4e":[14,9,39], +"a01474.html#gad2e0f0dbb511520e5d79bdb4ab649c22":[14,9,63], +"a01474.html#gada8cf14261301ec18458cbcbbe3d9b32":[14,9,38], +"a01474.html#gadc3dc30e978bcf18656aedb6dd4a62f2":[14,9,60], +"a01474.html#gadf3470738c60dbe57b33fb1e6005f40e":[14,9,46], +"a01474.html#gae9784404fbe619217879d5d12261c2b8":[14,9,36], +"a01474.html#gaebdc2d83274268bb48fc45e87aef38af":[14,9,29], +"a01474.html#gaee2c8a03b0aa78ab07b64253f2c48b22":[14,9,72], +"a01474.html#gaf07ffae9f842764c321a060ead038ac2":[14,9,55], +"a01474.html#gaf0d7fe9a16cad1ba38c7daca4295823b":[14,9,66], +"a01474.html#gaf61f82fe19690b80bf370b295c58920b":[14,9,59], +"a01474.html#gaf89317aa1f759fc58f67158abd314d1b":[14,9,67], +"a01474.html#gafd8064c07a5f22cdb087c88e1b87c1be":[14,9,26], +"a01475.html":[14,10], +"a01476.html":[14,11], +"a01476.html#ga36d21431afe595eab1b7f7a2330ad727":[14,11,2], +"a01476.html#ga98d684683ccecd3d56bdf5dc27ae999c":[14,11,4], +"a01476.html#gaa35682dc98e33ce3d6fad1fc902cdff0":[14,11,3], +"a01476.html#gaa55a112d0b087adc242cc9b0978b5d15":[14,11,5], +"a01476.html#gad0e60f7088f93556c4a0ac7aff174fe6":[14,11,6], +"a01476.html#md_lib_mbedtls_README":[14,11,0], +"a01477.html":[14,12], +"a01477.html#ga01b36384bff05a4dc4476c0764cdc248":[14,12,6], +"a01477.html#ga045a35287c46a29da2ad13e700087e0d":[14,12,72], +"a01477.html#ga128ba07226b7e45772830f06dfde4b71":[14,12,8], +"a01477.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c":[14,12,12], +"a01477.html#ga1b991b6fd8b20f130f9d87b98e590fdb":[14,12,14], +"a01477.html#ga1f3dc3758726bb4737db956e4cd71e91":[14,12,17], +"a01477.html#ga210f4bdbaae1bc2b8e242e1610da4f0f":[14,12,58], +"a01477.html#ga2171c591535849faf017fa126e3a9a48":[14,12,56], +"a01477.html#ga21a9c4115bc535490416e2850a2a45fd":[14,12,19], +"a01477.html#ga230747fbe3b7a13dfda75980844c3e9d":[14,12,111], +"a01477.html#ga236a002e179ed36a0b81399a3e11fcb8":[14,12,85], +"a01477.html#ga23a9b2dc15a447decd10881dde448890":[14,12,23], +"a01477.html#ga27b3652fb8a87f7f40fff10c63316b35":[14,12,91], +"a01477.html#ga2aac39ede2b43021b63ed6bc7f3f20da":[14,12,93], +"a01477.html#ga2b726534eedac635b28ccd501c242004":[14,12,45], +"a01477.html#ga2e45ad4ce8c84712c646dddaa99544e3":[14,12,44], +"a01477.html#ga301f7118a227ffedd7f945a9532fc18a":[14,12,5], +"a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25":[14,12,80], +"a01477.html#ga37d93326915dc9b74f2476238f35037c":[14,12,57], +"a01477.html#ga386826845e06a84b36522a2bf49ff6c6":[14,12,53], +"a01477.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb":[14,12,46], +"a01477.html#ga3bba79e03141bfb7a9ec76c273db63d2":[14,12,96], +"a01477.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403":[14,12,18], +"a01477.html#ga3f8a5f0509ef9929f90536b6e255e485":[14,12,16], +"a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa":[14,12,108], +"a01477.html#ga418414364e88d0673b4f6c90cd62ebed":[14,12,97], +"a01477.html#ga42635cbaa2ba78482ae053bea477246a":[14,12,26], +"a01477.html#ga43525e77f9049b545fa09129cacf9c9a":[14,12,84], +"a01477.html#ga44f7303f7073c7f97c3e31ec5db97769":[14,12,107], +"a01477.html#ga46347f830269bfbcbece15951f0c0fa4":[14,12,27], +"a01477.html#ga4641a3dd4da46f801565310f3784a41e":[14,12,87], +"a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df":[14,12,86], +"a01477.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529":[14,12,62], +"a01477.html#ga50e9c64b899d1b2f78c9634298225303":[14,12,71], +"a01477.html#ga54a883eb1608be800f7fbd204665d50d":[14,12,31], +"a01477.html#ga5cdd6e87496f480f42c44430250794bb":[14,12,79], +"a01477.html#ga5e13fc136e0b7f79d22a6b735424a815":[14,12,24], +"a01477.html#ga5f587605d68a7a56012ac337ddaec5e1":[14,12,54], +"a01477.html#ga66e6598e8f5db01e428a46d58b9865fc":[14,12,52], +"a01477.html#ga67ecc1ce8ca0630aebdf3a29e129f531":[14,12,13], +"a01477.html#ga6ef03269a32699359d90901cc84954f3":[14,12,110], +"a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd":[14,12,115], +"a01477.html#ga742c35812a444a87e35150e2332be0c2":[14,12,90], +"a01477.html#ga752412c887c0d900c05b771709ebac83":[14,12,51], +"a01477.html#ga75bdc5d475cd205914b8227c7f08df4c":[14,12,35], +"a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a":[14,12,104], +"a01477.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6":[14,12,20], +"a01477.html#ga7bf2fea766cab4645fe615661bcf0db9":[14,12,98], +"a01477.html#ga7e207adf2d26c1d6ea64f7c60252bf45":[14,12,99], +"a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b":[14,12,83], +"a01477.html#ga7fd56486be0426ec029cd60072ef62ba":[14,12,113], +"a01477.html#ga802a061224966a5523beb1ea0a9d9c27":[14,12,30], +"a01477.html#ga82355d41e5303e31cc49df003e9d8c38":[14,12,65], +"a01477.html#ga84673050f913404ec3ae164d4f7a1d9c":[14,12,29], +"a01477.html#ga852f9badf3176a60bfb874fb5d118791":[14,12,94], +"a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd":[14,12,114], +"a01477.html#ga8b1206a513938768655cdd541ffee9b3":[14,12,70], +"a01477.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0":[14,12,34], +"a01477.html#ga8de4193ede04a12ab4e44b8df9eec478":[14,12,103], +"a01477.html#ga945318df98e940ab331931023133ed3d":[14,12,25], +"a01477.html#ga95dcfc50be7ac2cb3ebf58d958f70dde":[14,12,39], +"a01477.html#ga97ee219718545f49ee651cbb00712b8c":[14,12,59], +"a01477.html#ga987853011908614aba0db7c5933b0a20":[14,12,95], +"a01477.html#ga9c471f7e2ca3330cf6d2fa70e12db38a":[14,12,88], +"a01477.html#gaa4fb93ab28bedada72364e925b3dacbf":[14,12,11], +"a01477.html#gaaad61dc7b2313286bdd049676ef0fd70":[14,12,32], +"a01477.html#gaab9ef494fdc21911e700f2b9d62547ec":[14,12,77], +"a01477.html#gaae56826104269ca730066136fb3eb995":[14,12,76], +"a01477.html#gaae94f85980031bec34148341efd537e3":[14,12,74], +"a01477.html#gaaefbee7a7f8454014a46e969fa9912c3":[14,12,112], +"a01477.html#gab26093f478636b5ba04176c2f81f44c4":[14,12,50], +"a01477.html#gab4a336f9cb4920a9ff8585aec5d90a3f":[14,12,22], +"a01477.html#gab4cf13775c4e92b36156ee92dd52bef5":[14,12,33], +"a01477.html#gab549c4d540cff530f9e4d9bca36e2253":[14,12,9], +"a01477.html#gab735278cab8e184d682b4ed8b12dbb1b":[14,12,92], +"a01477.html#gab7a0a4ff33f2450736d76d453045ad6f":[14,12,48], +"a01477.html#gaba9414cf3fc679beaae1baa5425a6e01":[14,12,67], +"a01477.html#gabc10a1f1b90bc7d2fb047db0af539e80":[14,12,101], +"a01477.html#gabe5aeb6b794d4ca28cb2534fe0a4a159":[14,12,36], +"a01477.html#gabff89fd0af2e75ee2db858f9fe934ac4":[14,12,73], +"a01477.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5":[14,12,10], +"a01477.html#gac545b1d8eeb82e40f7519cdfc5a3427c":[14,12,2], +"a01477.html#gac6ce96c3f4a3b7f24d9420763df121fc":[14,12,42], +"a01477.html#gac80659e1b954f9514723fd6d4429dfb6":[14,12,37], +"a01477.html#gac933291718eb6aa218db1c677e07ab02":[14,12,43], +"a01477.html#gaca7aa4ae8d9592f464dc1b545fead02e":[14,12,47], +"a01477.html#gacf3b4678891994823f2cdd0cb8707ecc":[14,12,105], +"a01477.html#gad28ad989a94c345875dff446ad6c6481":[14,12,49], +"a01477.html#gad2ab78c409dfcbc155d673550cb71736":[14,12,3], +"a01477.html#gad3eaa8d90b81d65f8e585c81c701f893":[14,12,81], +"a01477.html#gad7a0c95a7b810c5534185632b8b58d29":[14,12,7], +"a01477.html#gada0dd5a3d8ae781df05ea016d2f76d16":[14,12,60], +"a01477.html#gadb52d31f30bb8f6a66d1851ba0052dc7":[14,12,89], +"a01477.html#gadbc903025f5c5ea06b36fba39f30d305":[14,12,106], +"a01477.html#gadd117013f515b1d441889a24a605bd93":[14,12,38], +"a01477.html#gadd899ffeae0146c08b249e3f551e21f8":[14,12,78], +"a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215":[14,12,109], +"a01477.html#gadfc9281add668a5aff9bbc1253655917":[14,12,15], +"a01477.html#gae0e3060e6ae0dfc17a35881c223d8123":[14,12,75], +"a01477.html#gae2ce0be368072fa83e0b1f5136b7b753":[14,12,4], +"a01477.html#gae795a3fd0467a249eeb075f94bfa0adc":[14,12,41], +"a01477.html#gaeae51e6092fa8c8a58e022fcd8366c45":[14,12,64], +"a01477.html#gaefe33200a70026c7e622b01473d78b66":[14,12,66], +"a01477.html#gaf47613fd93688da939cf4c6998f83d77":[14,12,69], +"a01477.html#gaf4c0c6a2d12d879308f2d42cc61ef401":[14,12,100], +"a01477.html#gaf4d4d071deb07e7dcfa489a2a835756d":[14,12,28], +"a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362":[14,12,82], +"a01477.html#gaf63ca32aef7a90f87e94a288de5e82cc":[14,12,55], +"a01477.html#gaf6ecd512fa21851f0bcbc25b90c2b444":[14,12,63], +"a01477.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6":[14,12,68], +"a01477.html#gaf9aab1c3fcf352af53b0e66652fac39d":[14,12,21], +"a01477.html#gafa471eb33699e2cba5dc3cc50a2d8df7":[14,12,102], +"a01477.html#gafd4a7d6e142179e46453af11d5da3e91":[14,12,61], +"a01477.html#gaffb75a4d4ba623ee01f31877b56b018e":[14,12,40], +"a01478.html":[15,0,0], +"a01479.html":[15,0,0,0], +"a01479.html#a02089d61678b8d494424c16bb612b8ad":[15,0,0,0,79], +"a01479.html#a03506fe5daef9a019b2688e49af8a725":[15,0,0,0,89], +"a01479.html#a035fb2c7a593d20f479943c0d74df245":[15,0,0,0,70], +"a01479.html#a037d202036ce67334a0dc1dd5b714c3e":[15,0,0,0,78], +"a01479.html#a0589fee6cdf8761c032b330a3079e0e0":[15,0,0,0,100], +"a01479.html#a0738f317bdd3c1decb934971e66ee66c":[15,0,0,0,76], +"a01479.html#a0ae7c88423c60e7dd7fefff75d443c35":[15,0,0,0,68], +"a01479.html#a0cefee590d648d724f343488569c10df":[15,0,0,0,41], +"a01479.html#a0e5230bd79eba76c6350b724d5297310":[15,0,0,0,36], +"a01479.html#a13f0865a1ac2377282b29d6721b5c834":[15,0,0,0,74], +"a01479.html#a14fe9d38029d932b4aef6802bbf078ab":[15,0,0,0,108], +"a01479.html#a18b7743ebac58022a1f704cb3b011803":[15,0,0,0,126], +"a01479.html#a1a3dce72fa3192b1ca917025b8ff4736":[15,0,0,0,27], +"a01479.html#a1b778f3fa3c6d459075500f5248d09c6":[15,0,0,0,24], +"a01479.html#a1c364ea983169ac73197713db23f9a52":[15,0,0,0,12], +"a01479.html#a2087c24eeaa066ab0481265ca17b62fb":[15,0,0,0,57], +"a01479.html#a213e34c48cf1f6a119979ae00acebee5":[15,0,0,0,63], +"a01479.html#a216d7fa1d484d6a4ecf55d7886c355ef":[15,0,0,0,45], +"a01479.html#a29a3eabf3e5e353e52dd52c69ea69ec4":[15,0,0,0,37], +"a01479.html#a323b71e8080719b27a45f63bb8ef6a59":[15,0,0,0,103], +"a01479.html#a384368c23f29b2008c79effe063da77d":[15,0,0,0,73], +"a01479.html#a3a1b9396c4a6aec1fc32839fe681f3a9":[15,0,0,0,52], +"a01479.html#a3e585d7d21fb74154c4e53d541db9e5a":[15,0,0,0,95], +"a01479.html#a3fee574ed2618a6abc770bb1f17dc6b5":[15,0,0,0,105], +"a01479.html#a40bc5aa6ac58d01d4ee7888dddd884bb":[15,0,0,0,40], +"a01479.html#a40e190b9a9b0bb5aa2389cc482f94780":[15,0,0,0,112], +"a01479.html#a4144ba085c025b94f6d39de2ba33dc26":[15,0,0,0,123], +"a01479.html#a49b55d1996aee8c868684a916341522f":[15,0,0,0,98], +"a01479.html#a49f823cd787be6ed036e7bc1e430b384":[15,0,0,0,116], +"a01479.html#a4a9dc88e03b9e5066ff28b8518196ce7":[15,0,0,0,38], +"a01479.html#a4b1ae9a8e89b7038fd5f75686ca97e31":[15,0,0,0,118], +"a01479.html#a4bcf510aa10502e29fe2321486019fb5":[15,0,0,0,104], +"a01479.html#a4c9b8fd51581178ad0d988f64e2df04c":[15,0,0,0,64], +"a01479.html#a544871498712993b7ceb7a0134beac55":[15,0,0,0,31], +"a01479.html#a583ddc1d9adbdceea0a7617c6b87ff8d":[15,0,0,0,97], +"a01479.html#a5af363a108f86f636af7581097b396cd":[15,0,0,0,34], +"a01479.html#a5b7cd7ecd0b2526f1daa7c60ea39c581":[15,0,0,0,32], +"a01479.html#a5db76308f0e51108dea8222f14ac405e":[15,0,0,0,121], +"a01479.html#a5dfdc90856af9f03e09cc280dcfe3de0":[15,0,0,0,87], +"a01479.html#a627d101aa165533d893461f5fb39efa1":[15,0,0,0,119], +"a01479.html#a63e034778c2964569df7a6fb0ec0a8f1":[15,0,0,0,58], +"a01479.html#a64223730cf6d1f1ecb48ebcfaffea75c":[15,0,0,0,75], +"a01479.html#a643bc00f84713b2e8705021f6b2c2d0f":[15,0,0,0,91], +"a01479.html#a64692832da534aacee8a61cef74e9be1":[15,0,0,0,125], +"a01479.html#a692a721d89bd8f4032502f343d3f1718":[15,0,0,0,113], +"a01479.html#a6b784447f8cf2cfc112ab33a4b10ce22":[15,0,0,0,93], +"a01479.html#a6d243431c455704e03f148b9e373db51":[15,0,0,0,102], +"a01479.html#a6f0cb9bd0b1cecd09fa765083d998db1":[15,0,0,0,62], +"a01479.html#a7063655ccab4af3b185ff519a40329e0":[15,0,0,0,94], +"a01479.html#a75272bce518cb8b951b9adae61a02c58":[15,0,0,0,83], +"a01479.html#a760c91e04ad8a62181956b73ada2e384":[15,0,0,0,72], +"a01479.html#a76dda154eba75b7c0c8f6a8fcc5d346a":[15,0,0,0,111], +"a01479.html#a78d906cc88e8efcb280a0869ca7afaf2":[15,0,0,0,20], +"a01479.html#a7e0bc033c11e689570f7aa9431d49d9c":[15,0,0,0,10], +"a01479.html#a7ffc1b8652c148a1c3a86ef80155502c":[15,0,0,0,99], +"a01479.html#a80a2b3fe53dc4caedad79221b05bbdf7":[15,0,0,0,26], +"a01479.html#a837da37427357c91aba40c6becbebfeb":[15,0,0,0,11], +"a01479.html#a84c655ca82b1c0ed968be7d63be4a5f2":[15,0,0,0,49], +"a01479.html#a8728f5f5bf67ede8dce575af486499c9":[15,0,0,0,109], +"a01479.html#a87c05138d598087100ec1e740bf9e221":[15,0,0,0,88], +"a01479.html#a87ec2b9cbb53f9f38df252d6b7508881":[15,0,0,0,29], +"a01479.html#a897a5ee03a68bba8afe2371f89a6d7a5":[15,0,0,0,101], +"a01479.html#a8b0381ac0e872d25df0373d9cd9ce4af":[15,0,0,0,54], +"a01479.html#a8d6436e974c3780cb205261049fbbb87":[15,0,0,0,85], +"a01479.html#a8e85d04188b3d10cccaf6641bf5753fe":[15,0,0,0,48], +"a01479.html#a903f3bc6862860693f3d0c7fcfb68abd":[15,0,0,0,90], +"a01479.html#a90baa667a1e6bb223cda44f4322c2f44":[15,0,0,0,117], +"a01479.html#a91f72328d639d88598498c37cb552ffb":[15,0,0,0,106], +"a01479.html#a99d19bf27efa04318480a3e81f668ae8":[15,0,0,0,15], +"a01479.html#a9a7024193b07e7c98690873e7452f0ad":[15,0,0,0,9], +"a01479.html#aa1e87847ce5fccdef062c9aaa5bea65e":[15,0,0,0,56], +"a01479.html#aa612658a288c6a5cca103e5d3965390c":[15,0,0,0,13], +"a01479.html#aa641b1946cfcb33ac7e353a6ca7285ab":[15,0,0,0,17], +"a01479.html#aa6f667c9ff033cb3e1d8bd1565e080aa":[15,0,0,0,8], +"a01479.html#aac8a5ac8d26586ed7a707ddf2224ecd8":[15,0,0,0,59], +"a01479.html#aadca3cb06b25a8b3b8c6a851ad477db0":[15,0,0,0,115], +"a01479.html#ab078cd0a92f0f235fa36fb06ccf4af19":[15,0,0,0,96], +"a01479.html#ab21835e5b3b868f49faecd453d8da4e3":[15,0,0,0,67], +"a01479.html#ab5ef9981f825f3fe5beb84b4d664f321":[15,0,0,0,21], +"a01479.html#ab78cfabfa12d891830c1147bbc61a2e0":[15,0,0,0,18], +"a01479.html#aba58d5a7562b69d72c33cfda82c2b580":[15,0,0,0,42], +"a01479.html#abcef2cce95ddc7363a687ee4cf238671":[15,0,0,0,60], +"a01479.html#abd3403fcc46a2b82556784e142161c65":[15,0,0,0,86], +"a01479.html#ac0399ab5a8ab2e7682441241fcc98914":[15,0,0,0,19], +"a01479.html#ac67f610115ce611e94d05a87ada77f66":[15,0,0,0,30], +"a01479.html#ac6eb9270fa4c963d6ebba79aea1ddc4b":[15,0,0,0,53], +"a01479.html#ac73a52d0b4b8104accb6f34542d06e85":[15,0,0,0,71], +"a01479.html#ac94db106ce16b83c5f5518cf92e24d4d":[15,0,0,0,84], +"a01479.html#acc277568c5c42424ff90d8bfcee667b8":[15,0,0,0,107], +"a01479.html#acd0f0264807684089bb1ab8bdfcb989f":[15,0,0,0,120], +"a01479.html#acef9ae292bb3e6c3c1c1b16a20bd6494":[15,0,0,0,55], +"a01479.html#ad4c4f17808f4904cef59fb3c6a3060e1":[15,0,0,0,77], +"a01479.html#ad4e841d49e6fd9d67c664f020877e730":[15,0,0,0,80], +"a01479.html#ad7cc965be77a8f829027f9afc21556b5":[15,0,0,0,69], +"a01479.html#ad9bd7c6cc3e26cca5865dda3c02bcce2":[15,0,0,0,39], +"a01479.html#add3fb2f7c78eb84e42bcb17800f2c6de":[15,0,0,0,65], +"a01479.html#ade607e2a5b08d77e4559161dfac0c0e8":[15,0,0,0,44], +"a01479.html#adefdce788a6ef35250f5b1c139454b64":[15,0,0,0,51], +"a01479.html#adf1843ed620eb72a9efc75ff0251efa6":[15,0,0,0,82], +"a01479.html#ae3505ac892b47a7384a9ec95338bee22":[15,0,0,0,50], +"a01479.html#ae3f487577cbb7e66ccb39c8d6ea9a358":[15,0,0,0,35], +"a01479.html#ae40c31b557e83cd4c590288082d07d6e":[15,0,0,0,46], +"a01479.html#ae74a63edf1522697556aa1d98493b15b":[15,0,0,0,92], +"a01479.html#ae8ab769023a1d717198eb06aa17ff8b0":[15,0,0,0,114], +"a01479.html#ae8faf982d17b5fc72231bc648a51063a":[15,0,0,0,124], +"a01479.html#aeae81b172cf9a1b8a85052b9129d9dd1":[15,0,0,0,33], +"a01479.html#aec129bd1fae35bcb87dd129ca4e065ca":[15,0,0,0,61], +"a01479.html#aec84bbc3cc86b716a2996069d5d227c0":[15,0,0,0,28], +"a01479.html#aeccd1e361da41854a45068507ccd9f33":[15,0,0,0,23], +"a01479.html#aefa4891ccc2a860029958f2e80bdef87":[15,0,0,0,25], +"a01479.html#af03e307e61709bff1443d0f72a2efdb9":[15,0,0,0,66], +"a01479.html#af218c61a8dd3d937e5dfd3ad2d0c2701":[15,0,0,0,110] }; diff --git a/navtreeindex7.js b/navtreeindex7.js index 1978bf108..3157fe229 100644 --- a/navtreeindex7.js +++ b/navtreeindex7.js @@ -1,253 +1,253 @@ var NAVTREEINDEX7 = { -"a01453.html#a7e05b319688a07bbfeee23895341303e":[14,0,0,1,17], -"a01453.html#a82bd7bbea46866cb644016ea7faff329":[14,0,0,1,20], -"a01453.html#a9c3717acbb392ceed968c1172400e6dd":[14,0,0,1,22], -"a01453.html#aa9c8b1588cae90a37ef827d71e4ae909":[14,0,0,1,13], -"a01453.html#acf013c955f2fd024a8669085dadbd3ba":[14,0,0,1,14], -"a01454.html":[14,0,0,2], -"a01455.html":[14,0,0,3], -"a01456.html":[14,0,0,4], -"a01457.html":[14,0,0,5], -"a01458.html":[14,0,0,6], -"a01458.html#a1b929d7e15620e9c352c3cf1e75e2a22":[14,0,0,6,18], -"a01458.html#a3f0aeae05c5278420c02156257845b1d":[14,0,0,6,13], -"a01458.html#a4638d28e57304b76ce9f50077e6b3b47":[14,0,0,6,19], -"a01458.html#a64fa8e408c7c7abc0999d5b74825e69d":[14,0,0,6,16], -"a01458.html#a88737f422c86c2246a698fd64d59db1a":[14,0,0,6,15], -"a01458.html#acc3d4402aa912d4f90e3298a7e8de20c":[14,0,0,6,17], -"a01458.html#afe3491a94655b07c2608d3451e59d606":[14,0,0,6,14], -"a01459.html":[14,0,0,7], -"a01459.html#a1ce7de010f8d9ae4bc2428ea26fe495f":[14,0,0,7,14], -"a01459.html#a2748ff60b5f1512fbf9f228e4c86598a":[14,0,0,7,21], -"a01459.html#a2a572a1c4153428ddf599aac1054a1c5":[14,0,0,7,6], -"a01459.html#a2da0648c5d2cb3a8da467b8dfac16e8c":[14,0,0,7,24], -"a01459.html#a2e119a638263f674b4441439cf472810":[14,0,0,7,9], -"a01459.html#a30811985170f0083009bbd5439d1bcc2":[14,0,0,7,23], -"a01459.html#a321e7a3f55577a28ad2b2ed4f2ef132c":[14,0,0,7,18], -"a01459.html#a39c2c2660f89a924cd4eef1ae7d672a5":[14,0,0,7,15], -"a01459.html#a4268b8eb517ac8eb32eabcb3bbeb9e75":[14,0,0,7,11], -"a01459.html#a44bdab0afac36d18288aa73ad9b5d341":[14,0,0,7,12], -"a01459.html#a4b3b07664816ecd9b1e69aece27315ed":[14,0,0,7,5], -"a01459.html#a5cc6d0583a5f0554e61e3886c5bf1785":[14,0,0,7,22], -"a01459.html#a7c6a46d9327a395ac4909411d937b193":[14,0,0,7,27], -"a01459.html#a851038e6c6158127d7ecbd1e6580081b":[14,0,0,7,20], -"a01459.html#a9f3720f901ce589dcfd623721b695938":[14,0,0,7,17], -"a01459.html#aa9a021d0bc0272e702a7de499b76683c":[14,0,0,7,28], -"a01459.html#ac4f25f606f7c968b08b874dc8d75ca50":[14,0,0,7,25], -"a01459.html#ac55af04b29df0650b502b9df1db36444":[14,0,0,7,4], -"a01459.html#acafa34b913dba87fe1768f8e18cfd135":[14,0,0,7,19], -"a01459.html#adaf39153cd62515d9750fdb0748dbacc":[14,0,0,7,26], -"a01459.html#af41036c1c577c3ea72112cb347ccaa7f":[14,0,0,7,8], -"a01459.html#af5d2460ce51e3abef1c8065695ba0b63":[14,0,0,7,16], -"a01459.html#af7258b81811d05efc7fdf6152fd10907":[14,0,0,7,13], -"a01459.html#af9181efd0fd60114f021c54a713f13af":[14,0,0,7,10], -"a01459.html#af97b6ad66a6d4bb6a14631fa52059c0b":[14,0,0,7,7], -"a01460.html":[14,0,0,8], -"a01460.html#a0d2a1e79937863b4a48218de3567d996":[14,0,0,8,11], -"a01460.html#a1e60ef1b7888afae74b4e390a358d263":[14,0,0,8,2], -"a01460.html#a1e883095c960da9d48db489a25774042":[14,0,0,8,12], -"a01460.html#a3c5cc4df72fb0dea8534dc7726430063":[14,0,0,8,4], -"a01460.html#a4bc534fea446c5d50d4d3cde1cf4a4dc":[14,0,0,8,6], -"a01460.html#a607ffbecea0980b58be2b31a8b87b983":[14,0,0,8,5], -"a01460.html#a710e3e25bc12a3ecd3051ebbb763c5b0":[14,0,0,8,9], -"a01460.html#abe0624bf06c710473082bfbef52273f3":[14,0,0,8,3], -"a01460.html#ac96ca57f02ed212f0eb5ae95875d952c":[14,0,0,8,7], -"a01460.html#aca369f80d942aad6a827c2817c998df5":[14,0,0,8,0], -"a01460.html#ae27b4776f24b612e4ea9e712c086d22b":[14,0,0,8,8], -"a01460.html#ae4da1b83a8d9d37483a4b179edfeceff":[14,0,0,8,1], -"a01460.html#aeed0ec7ac85e0588bc05822d6d63eaa3":[14,0,0,8,10], -"a01461.html":[14,0,0,9], -"a01461.html#a79e412f95dfbdb782c011ac214270aa3":[14,0,0,9,1], -"a01462.html":[14,0,0,10], -"a01462.html#a08385a0e8b5e7e8dc5de6570b06555a6":[14,0,0,10,5], -"a01462.html#a0c580da1c1d3e54a60be0f05d5d5c1f1":[14,0,0,10,8], -"a01462.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7":[14,0,0,10,9], -"a01462.html#a375f83b01899d081623192f9d4a7e6fe":[14,0,0,10,7], -"a01462.html#a3c1b718b02781b6dbc87f7d6c109d3a6":[14,0,0,10,6], -"a01462.html#a6878e2f1c9330534f8c7950f26e327b0":[14,0,0,10,1], -"a01462.html#a6d3eab271cac5959402b283c5a6046a4":[14,0,0,10,4], -"a01462.html#a7382f6d9830ea03bcbb59f7fae2745e1":[14,0,0,10,0], -"a01462.html#a76d8460082efdbc28d2a68f5648ce8dd":[14,0,0,10,3], -"a01462.html#afc28b6798b670200ecf08645ccaf0e44":[14,0,0,10,2], -"a01468.html":[14,0,1], -"a01469.html":[14,0,2], -"a01480.html":[15,0,3], -"a01484.html":[15,0,4], -"a01488.html":[15,0,148], -"a01492.html":[15,0,149], -"a01496.html":[15,0,134], -"a01500.html":[15,0,151], -"a01504.html":[15,0,26], -"a01508.html":[13,3,0], -"a01508.html#a6ce22e245944629826d4869f69babf81":[13,3,0,0], -"a01508.html#a725646466f0ea8e0982251189c15724a":[13,3,0,1], -"a01512.html":[13,4,0], -"a01516.html":[13,4,1], -"a01516.html#a553439e2acc31fe3587a4c883e134b66":[13,4,1,0], -"a01580.html":[13,4,2], -"a01584.html":[13,4,3], -"a01584.html#a093b94b5d693f4e7a8facfc40f1443b0":[13,4,3,2], -"a01584.html#a3ac7e576da4958d6c0488ec606d9cbff":[13,4,3,3], -"a01584.html#a7cee716c7c8c20d0d8aac6243baff819":[13,4,3,0], -"a01584.html#ab316c2d139b46380bc97be4d23428caa":[13,4,3,1], -"a01588.html":[13,5,0], -"a01592.html":[13,5,1], -"a01592.html#a209ce3b19c7ebdd32847334c64a9deb2":[13,5,1,1], -"a01592.html#a24329906c1970b0510479835d52b70b5":[13,5,1,0], -"a01592.html#a6d4c996ba426bfb964f3c2c4d1238f3c":[13,5,1,2], -"a01592.html#ac393a690cd7891565dc679e6ffa4b021":[13,5,1,3], -"a01592.html#af8e8e6406f9252c503f2eaed02f0dbca":[13,5,1,4], -"a01596.html":[13,5,2], -"a01596.html#a2cf939ba243a6dc7c8da9a74040b83f3":[13,5,2,0], -"a01596.html#aee425cdec2c6c77ccb291993a6526d0b":[13,5,2,1], -"a01600.html":[13,5,3], -"a01600.html#a1e4d5bbf62b7cbe49b6d222d6e124833":[13,5,3,3], -"a01600.html#a437f85f49d7a943a0e9f06353a2b6875":[13,5,3,2], -"a01600.html#a6a6584538d9ba2e8304e2c103d4501a5":[13,5,3,0], -"a01600.html#aaac07ecbeef8734077fec8ea17a7e015":[13,5,3,1], -"a01604.html":[13,5,4], -"a01604.html#a56f1328d6aec74cd0eb92a30182065b1":[13,5,4,1], -"a01604.html#ae6dc350fb1a599dd6585c41e34a1e0e8":[13,5,4,0], -"a01604.html#aeb847b88caadd6fad351f4d239edea42":[13,5,4,2], -"a01608.html":[13,5,5], -"a01608.html#a4530a3779248463eb6b77176ee656e68":[13,5,5,4], -"a01608.html#a5b6c72f114573cb07932b4c0e089150e":[13,5,5,1], -"a01608.html#a6e1cb79d9215a84f1e74c989bd0c9987":[13,5,5,8], -"a01608.html#a850a129376d4a3dd4c9994d04a9edca7":[13,5,5,0], -"a01608.html#aa0b5050ded24b08d6b0022d543d2ed47":[13,5,5,7], -"a01608.html#abfff7f7f7436a1df82e73b4b070f8ab8":[13,5,5,6], -"a01608.html#ae6ce8bf9e7b8172f5971f7c6516a79f0":[13,5,5,3], -"a01608.html#af6d0fd1d866c96c7a9e4bc5425baa094":[13,5,5,5], -"a01608.html#af8600eedc4cac772aff7257ffcd4a1c0":[13,5,5,2], -"a01612.html":[15,0,60], -"a01612.html#a56ecba8dd00dd0bed1056152f4e9f9dc":[15,0,60,0], -"a01612.html#a9e07b6d33b7cdc866e6625c18d9c5f92":[15,0,60,1], -"a01616.html":[13,6,1], -"a01616.html#a6d3f030387c74b86ec476d0c99a46c34":[13,6,1,0], -"a01616.html#aab3e376d6c18921a1ee303e2b703c668":[13,6,1,2], -"a01616.html#ae7cf177799e4c934821f6540aa5a33e5":[13,6,1,1], -"a01620.html":[15,0,55], -"a01624.html":[13,6,2], -"a01628.html":[13,6,3], -"a01632.html":[13,6,4], -"a01636.html":[15,0,129], -"a01640.html":[15,0,128], -"a01644.html":[15,0,150], -"a01644.html#a09eac5418660881153169a7eb850dee0":[15,0,150,0], -"a01644.html#a2a42d119518402fa16c3ec9f2b511669":[15,0,150,2], -"a01644.html#abda48eb7b450d079b3c04ba51d824334":[15,0,150,3], -"a01644.html#ae49db58199cf54a15c307cb01b738c09":[15,0,150,1], -"a01648.html":[15,0,16], -"a01648.html#afad6f95d2a6e23fe87839c64417111d3":[15,0,16,0], -"a01652.html":[13,8,1], -"a01652.html#a09209305fd48261b835daf6026b7b659":[13,8,1,2], -"a01652.html#a36eca94789cf465a9cb13e9a1ad92121":[13,8,1,4], -"a01652.html#a72b6c6e17726b3e9db70d78e0c52f02c":[13,8,1,1], -"a01652.html#abb9616bec2cdd4f546884a45953cb054":[13,8,1,3], -"a01652.html#afd90dea53ccfe0a8c15b12e5e1afaa35":[13,8,1,0], -"a01656.html":[13,8,2], -"a01660.html":[13,8,6], -"a01664.html":[13,8,3], -"a01668.html":[13,8,4], -"a01672.html":[15,0,33], -"a01676.html":[15,0,35], -"a01680.html":[15,0,131], -"a01684.html":[13,8,5], -"a01688.html":[13,8,7], -"a01692.html":[13,9,0], -"a01692.html#a0f766111832176ea2c8eda8fbf13743d":[13,9,0,2], -"a01692.html#a70b94559475530db2be60e9d30758098":[13,9,0,3], -"a01692.html#a82e1988542001c7499700f3e1b191339":[13,9,0,1], -"a01692.html#aadedd52833b6ce041dfb9e923b448481":[13,9,0,6], -"a01692.html#abd69b6707bf73ae91675a6a0a250ca40":[13,9,0,5], -"a01692.html#abf76b14a42ef4d7f9d57a1d5edc6cf10":[13,9,0,7], -"a01692.html#ae381dabe56bdd77f48a8241050d16d82":[13,9,0,4], -"a01692.html#afde9c1e6769f60992c7fb10280cdd199":[13,9,0,0], -"a01696.html":[13,9,1], -"a01700.html":[13,9,2], -"a01704.html":[13,9,3], -"a01704.html#a1d7f86d28ad089ae4401043c117be844":[13,9,3,1], -"a01704.html#a597e62aa42a9971b98a5d76c7f1baef5":[13,9,3,3], -"a01704.html#aa6d2797ec2cdef70aa51438e96e2a301":[13,9,3,2], -"a01704.html#ab910eb48d182d8f191da149339fd6c51":[13,9,3,0], -"a01708.html":[13,9,4], -"a01708.html#a5e63ccd727b87d022ed0eedc0446410f":[13,9,4,7], -"a01708.html#a93cba5300302d50e26f70457f84df0da":[13,9,4,0], -"a01708.html#ac90559108804dc16ac1ac91a0212bff9":[13,9,4,3], -"a01708.html#ac9231df54b2f77c5061bdfbcea927a5e":[13,9,4,8], -"a01708.html#acb0498448f486070d33e121ade525c64":[13,9,4,4], -"a01708.html#ad4c4854451abd367cf8a13aad5f6372b":[13,9,4,1], -"a01708.html#ad89fec1f50b8e8ffc890d3683c4b5afe":[13,9,4,5], -"a01708.html#ad94d1c8d1635e597bd70823a207dc727":[13,9,4,6], -"a01708.html#afc99cd20d6193df126ae2b32b42f7546":[13,9,4,2], -"a01712.html":[13,9,5], -"a01712.html#a1da30fd41605f42e0b0dd68d75c59bd9":[13,9,5,0], -"a01712.html#aac21cf3b5207c0dc25358d6360953380":[13,9,5,1], -"a01712.html#ac57e99b5d0069d7bd733bcf056cc56e1":[13,9,5,4], -"a01712.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52":[13,9,5,2], -"a01712.html#aeb02c7cf4fbaf40307821bc38160ab8d":[13,9,5,3], -"a01716.html":[13,9,6], -"a01716.html#a28771c8ed4754eabcb50649d753ee956":[13,9,6,5], -"a01716.html#a2c6c43889156357aee27b3b09657ebd2":[13,9,6,3], -"a01716.html#a9ebeb5a66a80189ae8e7bb2ea97701c9":[13,9,6,1], -"a01716.html#ac94f545daf7381aeb770fb42b467d338":[13,9,6,4], -"a01716.html#acafb471d7cc7a71d613503760930d9f5":[13,9,6,6], -"a01716.html#ad3a988f3c029fff3805a8a9dd4caaaa5":[13,9,6,0], -"a01716.html#aeb4c9a28028bd625ac3650b39392cf07":[13,9,6,2], -"a01720.html":[13,9,7], -"a01724.html":[13,9,8], -"a01728.html":[13,9,9], -"a01728.html#a089cd58d7f5518ee9016eb40c281bdfc":[13,9,9,2], -"a01728.html#a2d5854b66b7bc7246fa718a5d485d3fb":[13,9,9,5], -"a01728.html#a3b5c9fd883d9daf4d6a42bbf1aba936d":[13,9,9,4], -"a01728.html#a45ea4bd1941244391f04343f993bacf0":[13,9,9,1], -"a01728.html#a4f63b5946df323ef66910d4a0cdf2491":[13,9,9,8], -"a01728.html#a787c86043a8c305bd23256248614a3f7":[13,9,9,6], -"a01728.html#a8bb5e1f0ea943f4749ebf6faa450288b":[13,9,9,3], -"a01728.html#aa4922c43b6dfecb5e39e286e960cdd88":[13,9,9,10], -"a01728.html#aa62f8da7dae46c095c603433ae26fedf":[13,9,9,9], -"a01728.html#ad8ca9262cbe607d0c017e12285c3d951":[13,9,9,7], -"a01728.html#adb6743838ca7d8bd3ad390b7608492ba":[13,9,9,0], -"a01732.html":[13,9,10], -"a01732.html#a8406e4a6d09e2f6b8e3bfc12579d8653":[13,9,10,1], -"a01732.html#ab2ca3ae12be534d58e22bb68d6042ea3":[13,9,10,0], -"a01736.html":[13,9,11], -"a01736.html#a213cc14f2d1c67be382cb8918aca4362":[13,9,11,3], -"a01736.html#a2c43368d48a41123da5f69356b6f29f5":[13,9,11,4], -"a01736.html#a38f7761577529e0bbf52cd0b8c17658b":[13,9,11,1], -"a01736.html#a423e1db9e86ff369d49d78d8f5ea2525":[13,9,11,2], -"a01736.html#a8786d124038d3516d98f2456f19985cf":[13,9,11,5], -"a01736.html#aaa57ce590925c0efe017af1d4457d479":[13,9,11,0], -"a01736.html#adf4e9d92c10469c78810f2881a95843b":[13,9,11,6], -"a01740.html":[13,9,12], -"a01740.html#a0e321ea27e36c985abacf4510619c9f0":[13,9,12,2], -"a01740.html#a1a4a8993461b0675edcb2d162ec8823b":[13,9,12,5], -"a01740.html#a5b623ae9fa4501c996e4c54842eaa548":[13,9,12,4], -"a01740.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9":[13,9,12,0], -"a01740.html#aa2c05475b504237c0ae9db5d48cbb0fc":[13,9,12,3], -"a01740.html#ad9e30a4f9006923af0d6668768598737":[13,9,12,1], -"a01744.html":[13,9,13], -"a01744.html#a0576f1886490bbb3656b420f5bb65e65":[13,9,13,0], -"a01744.html#acb88b64064f725ca81245f2afe6f57f5":[13,9,13,2], -"a01744.html#ad2a2e2e1126d1c022be6a84af7f5e4e3":[13,9,13,4], -"a01744.html#ae33f3603840fd0bb8ada551ff168ea58":[13,9,13,1], -"a01744.html#aeb90e80a488f568c4a193c1fe851c5d4":[13,9,13,3], -"a01748.html":[13,9,14], -"a01752.html":[13,9,15], -"a01752.html#a0619aaead2b82313d761804f40c24926":[13,9,15,3], -"a01752.html#a11807b6f83083ad17c66640c77c78973":[13,9,15,2], -"a01752.html#a26f951076270f2389044a69b30c86d74":[13,9,15,7], -"a01752.html#a4daaa0bccc92503ccc31eaed78eb7409":[13,9,15,1], -"a01752.html#a605e9f150203a43a550e68e940233245":[13,9,15,9], -"a01752.html#aad7093cf772d6e337b3c09af9cea92ac":[13,9,15,6], -"a01752.html#ac4f5b60a59fa29d78c720c2be434c5c3":[13,9,15,0], -"a01752.html#ac97a41612246b0527ed1a242bbe28a99":[13,9,15,5], -"a01752.html#ae00a5116b4b55fb2bc6546ca3156522e":[13,9,15,8], -"a01752.html#af2d1c007ab43e8556a917efc5bcee9c8":[13,9,15,4], -"a01756.html":[13,9,16], -"a01760.html":[13,9,17], -"a01764.html":[13,9,18], -"a01764.html#a17c83c0e810b2bf35b364f026e1cecb0":[13,9,18,5], -"a01764.html#a2582ecc282bd3d712918e6109a18c7d2":[13,9,18,0] +"a01479.html#af312843ce780c0062f9067c182ad2db6":[15,0,0,0,43], +"a01479.html#af34551008cb67c907488a9403da495ad":[15,0,0,0,22], +"a01479.html#af411b3996170b6dd0e90dc999c896d19":[15,0,0,0,47], +"a01479.html#af5502348939c1db2fdafde42603266f3":[15,0,0,0,16], +"a01479.html#af58b97dc722402be6c65e226a0dd26ae":[15,0,0,0,14], +"a01479.html#afcb4ae6dd50b4449b6de4d1d0754601d":[15,0,0,0,81], +"a01479.html#aff3e1986bf6d79a353f8820fe5ed4306":[15,0,0,0,122], +"a01480.html":[15,0,0,1], +"a01480.html#a0ffefee23107bcbbadef2508ccaaba4f":[15,0,0,1,21], +"a01480.html#a23ff0ccfc75d564fc9f6200ef8cff5fb":[15,0,0,1,19], +"a01480.html#a3b6192388c29b0efb1968d6b44efd712":[15,0,0,1,23], +"a01480.html#a453696e86822c980d8e5b9e6a27eb861":[15,0,0,1,15], +"a01480.html#a4fe33f1da468796b39c80a34e12411fb":[15,0,0,1,24], +"a01480.html#a5c4d1755dfd9a2b378cd45f14de1f1ee":[15,0,0,1,25], +"a01480.html#a6c23b4916b8fa6dc8aa56b45f558d870":[15,0,0,1,16], +"a01480.html#a7910146d6e2097e9fb075a2bf60d1b25":[15,0,0,1,18], +"a01480.html#a7e05b319688a07bbfeee23895341303e":[15,0,0,1,17], +"a01480.html#a82bd7bbea46866cb644016ea7faff329":[15,0,0,1,20], +"a01480.html#a9c3717acbb392ceed968c1172400e6dd":[15,0,0,1,22], +"a01480.html#aa9c8b1588cae90a37ef827d71e4ae909":[15,0,0,1,13], +"a01480.html#acf013c955f2fd024a8669085dadbd3ba":[15,0,0,1,14], +"a01481.html":[15,0,0,2], +"a01482.html":[15,0,0,3], +"a01483.html":[15,0,0,4], +"a01484.html":[15,0,0,5], +"a01485.html":[15,0,0,6], +"a01485.html#a1b929d7e15620e9c352c3cf1e75e2a22":[15,0,0,6,18], +"a01485.html#a3f0aeae05c5278420c02156257845b1d":[15,0,0,6,13], +"a01485.html#a4638d28e57304b76ce9f50077e6b3b47":[15,0,0,6,19], +"a01485.html#a64fa8e408c7c7abc0999d5b74825e69d":[15,0,0,6,16], +"a01485.html#a88737f422c86c2246a698fd64d59db1a":[15,0,0,6,15], +"a01485.html#acc3d4402aa912d4f90e3298a7e8de20c":[15,0,0,6,17], +"a01485.html#afe3491a94655b07c2608d3451e59d606":[15,0,0,6,14], +"a01486.html":[15,0,0,7], +"a01486.html#a1ce7de010f8d9ae4bc2428ea26fe495f":[15,0,0,7,14], +"a01486.html#a2748ff60b5f1512fbf9f228e4c86598a":[15,0,0,7,21], +"a01486.html#a2a572a1c4153428ddf599aac1054a1c5":[15,0,0,7,6], +"a01486.html#a2da0648c5d2cb3a8da467b8dfac16e8c":[15,0,0,7,24], +"a01486.html#a2e119a638263f674b4441439cf472810":[15,0,0,7,9], +"a01486.html#a30811985170f0083009bbd5439d1bcc2":[15,0,0,7,23], +"a01486.html#a321e7a3f55577a28ad2b2ed4f2ef132c":[15,0,0,7,18], +"a01486.html#a39c2c2660f89a924cd4eef1ae7d672a5":[15,0,0,7,15], +"a01486.html#a4268b8eb517ac8eb32eabcb3bbeb9e75":[15,0,0,7,11], +"a01486.html#a44bdab0afac36d18288aa73ad9b5d341":[15,0,0,7,12], +"a01486.html#a4b3b07664816ecd9b1e69aece27315ed":[15,0,0,7,5], +"a01486.html#a5cc6d0583a5f0554e61e3886c5bf1785":[15,0,0,7,22], +"a01486.html#a7c6a46d9327a395ac4909411d937b193":[15,0,0,7,27], +"a01486.html#a851038e6c6158127d7ecbd1e6580081b":[15,0,0,7,20], +"a01486.html#a9f3720f901ce589dcfd623721b695938":[15,0,0,7,17], +"a01486.html#aa9a021d0bc0272e702a7de499b76683c":[15,0,0,7,28], +"a01486.html#ac4f25f606f7c968b08b874dc8d75ca50":[15,0,0,7,25], +"a01486.html#ac55af04b29df0650b502b9df1db36444":[15,0,0,7,4], +"a01486.html#acafa34b913dba87fe1768f8e18cfd135":[15,0,0,7,19], +"a01486.html#adaf39153cd62515d9750fdb0748dbacc":[15,0,0,7,26], +"a01486.html#af41036c1c577c3ea72112cb347ccaa7f":[15,0,0,7,8], +"a01486.html#af5d2460ce51e3abef1c8065695ba0b63":[15,0,0,7,16], +"a01486.html#af7258b81811d05efc7fdf6152fd10907":[15,0,0,7,13], +"a01486.html#af9181efd0fd60114f021c54a713f13af":[15,0,0,7,10], +"a01486.html#af97b6ad66a6d4bb6a14631fa52059c0b":[15,0,0,7,7], +"a01487.html":[15,0,0,8], +"a01487.html#a0d2a1e79937863b4a48218de3567d996":[15,0,0,8,11], +"a01487.html#a1e60ef1b7888afae74b4e390a358d263":[15,0,0,8,2], +"a01487.html#a1e883095c960da9d48db489a25774042":[15,0,0,8,12], +"a01487.html#a3c5cc4df72fb0dea8534dc7726430063":[15,0,0,8,4], +"a01487.html#a4bc534fea446c5d50d4d3cde1cf4a4dc":[15,0,0,8,6], +"a01487.html#a607ffbecea0980b58be2b31a8b87b983":[15,0,0,8,5], +"a01487.html#a710e3e25bc12a3ecd3051ebbb763c5b0":[15,0,0,8,9], +"a01487.html#abe0624bf06c710473082bfbef52273f3":[15,0,0,8,3], +"a01487.html#ac96ca57f02ed212f0eb5ae95875d952c":[15,0,0,8,7], +"a01487.html#aca369f80d942aad6a827c2817c998df5":[15,0,0,8,0], +"a01487.html#ae27b4776f24b612e4ea9e712c086d22b":[15,0,0,8,8], +"a01487.html#ae4da1b83a8d9d37483a4b179edfeceff":[15,0,0,8,1], +"a01487.html#aeed0ec7ac85e0588bc05822d6d63eaa3":[15,0,0,8,10], +"a01488.html":[15,0,0,9], +"a01488.html#a79e412f95dfbdb782c011ac214270aa3":[15,0,0,9,1], +"a01489.html":[15,0,0,10], +"a01489.html#a08385a0e8b5e7e8dc5de6570b06555a6":[15,0,0,10,5], +"a01489.html#a0c580da1c1d3e54a60be0f05d5d5c1f1":[15,0,0,10,8], +"a01489.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7":[15,0,0,10,9], +"a01489.html#a375f83b01899d081623192f9d4a7e6fe":[15,0,0,10,7], +"a01489.html#a3c1b718b02781b6dbc87f7d6c109d3a6":[15,0,0,10,6], +"a01489.html#a6878e2f1c9330534f8c7950f26e327b0":[15,0,0,10,1], +"a01489.html#a6d3eab271cac5959402b283c5a6046a4":[15,0,0,10,4], +"a01489.html#a7382f6d9830ea03bcbb59f7fae2745e1":[15,0,0,10,0], +"a01489.html#a76d8460082efdbc28d2a68f5648ce8dd":[15,0,0,10,3], +"a01489.html#afc28b6798b670200ecf08645ccaf0e44":[15,0,0,10,2], +"a01495.html":[15,0,1], +"a01496.html":[15,0,2], +"a01507.html":[16,0,3], +"a01511.html":[16,0,4], +"a01515.html":[16,0,151], +"a01519.html":[16,0,152], +"a01523.html":[16,0,135], +"a01527.html":[16,0,153], +"a01531.html":[14,3,0], +"a01531.html#a6ce22e245944629826d4869f69babf81":[14,3,0,0], +"a01531.html#a725646466f0ea8e0982251189c15724a":[14,3,0,1], +"a01535.html":[14,4,0], +"a01539.html":[14,4,1], +"a01539.html#a553439e2acc31fe3587a4c883e134b66":[14,4,1,0], +"a01603.html":[14,4,2], +"a01607.html":[14,4,3], +"a01607.html#a093b94b5d693f4e7a8facfc40f1443b0":[14,4,3,2], +"a01607.html#a3ac7e576da4958d6c0488ec606d9cbff":[14,4,3,3], +"a01607.html#a7cee716c7c8c20d0d8aac6243baff819":[14,4,3,0], +"a01607.html#ab316c2d139b46380bc97be4d23428caa":[14,4,3,1], +"a01611.html":[14,5,0], +"a01615.html":[14,5,1], +"a01615.html#a209ce3b19c7ebdd32847334c64a9deb2":[14,5,1,1], +"a01615.html#a24329906c1970b0510479835d52b70b5":[14,5,1,0], +"a01615.html#a6d4c996ba426bfb964f3c2c4d1238f3c":[14,5,1,2], +"a01615.html#ac393a690cd7891565dc679e6ffa4b021":[14,5,1,3], +"a01615.html#af8e8e6406f9252c503f2eaed02f0dbca":[14,5,1,4], +"a01619.html":[14,5,2], +"a01619.html#a2cf939ba243a6dc7c8da9a74040b83f3":[14,5,2,0], +"a01619.html#aee425cdec2c6c77ccb291993a6526d0b":[14,5,2,1], +"a01623.html":[14,5,3], +"a01623.html#a1e4d5bbf62b7cbe49b6d222d6e124833":[14,5,3,3], +"a01623.html#a437f85f49d7a943a0e9f06353a2b6875":[14,5,3,2], +"a01623.html#a6a6584538d9ba2e8304e2c103d4501a5":[14,5,3,0], +"a01623.html#aaac07ecbeef8734077fec8ea17a7e015":[14,5,3,1], +"a01627.html":[14,5,4], +"a01627.html#a56f1328d6aec74cd0eb92a30182065b1":[14,5,4,1], +"a01627.html#ae6dc350fb1a599dd6585c41e34a1e0e8":[14,5,4,0], +"a01627.html#aeb847b88caadd6fad351f4d239edea42":[14,5,4,2], +"a01631.html":[14,5,5], +"a01631.html#a4530a3779248463eb6b77176ee656e68":[14,5,5,4], +"a01631.html#a5b6c72f114573cb07932b4c0e089150e":[14,5,5,1], +"a01631.html#a6e1cb79d9215a84f1e74c989bd0c9987":[14,5,5,8], +"a01631.html#a850a129376d4a3dd4c9994d04a9edca7":[14,5,5,0], +"a01631.html#aa0b5050ded24b08d6b0022d543d2ed47":[14,5,5,7], +"a01631.html#abfff7f7f7436a1df82e73b4b070f8ab8":[14,5,5,6], +"a01631.html#ae6ce8bf9e7b8172f5971f7c6516a79f0":[14,5,5,3], +"a01631.html#af6d0fd1d866c96c7a9e4bc5425baa094":[14,5,5,5], +"a01631.html#af8600eedc4cac772aff7257ffcd4a1c0":[14,5,5,2], +"a01635.html":[16,0,61], +"a01635.html#a56ecba8dd00dd0bed1056152f4e9f9dc":[16,0,61,0], +"a01635.html#a9e07b6d33b7cdc866e6625c18d9c5f92":[16,0,61,1], +"a01639.html":[14,6,1], +"a01639.html#a6d3f030387c74b86ec476d0c99a46c34":[14,6,1,0], +"a01639.html#aab3e376d6c18921a1ee303e2b703c668":[14,6,1,2], +"a01639.html#ae7cf177799e4c934821f6540aa5a33e5":[14,6,1,1], +"a01643.html":[16,0,56], +"a01647.html":[14,6,2], +"a01651.html":[14,6,3], +"a01655.html":[14,6,4], +"a01659.html":[16,0,130], +"a01663.html":[16,0,129], +"a01667.html":[16,0,16], +"a01667.html#afad6f95d2a6e23fe87839c64417111d3":[16,0,16,0], +"a01671.html":[14,8,1], +"a01671.html#a09209305fd48261b835daf6026b7b659":[14,8,1,2], +"a01671.html#a36eca94789cf465a9cb13e9a1ad92121":[14,8,1,4], +"a01671.html#a72b6c6e17726b3e9db70d78e0c52f02c":[14,8,1,1], +"a01671.html#abb9616bec2cdd4f546884a45953cb054":[14,8,1,3], +"a01671.html#afd90dea53ccfe0a8c15b12e5e1afaa35":[14,8,1,0], +"a01675.html":[14,8,2], +"a01679.html":[14,8,6], +"a01683.html":[14,8,3], +"a01687.html":[14,8,4], +"a01691.html":[16,0,32], +"a01695.html":[16,0,34], +"a01699.html":[16,0,132], +"a01703.html":[14,8,5], +"a01707.html":[14,8,7], +"a01711.html":[14,9,0], +"a01711.html#a0f766111832176ea2c8eda8fbf13743d":[14,9,0,2], +"a01711.html#a70b94559475530db2be60e9d30758098":[14,9,0,3], +"a01711.html#a82e1988542001c7499700f3e1b191339":[14,9,0,1], +"a01711.html#aadedd52833b6ce041dfb9e923b448481":[14,9,0,6], +"a01711.html#abd69b6707bf73ae91675a6a0a250ca40":[14,9,0,5], +"a01711.html#abf76b14a42ef4d7f9d57a1d5edc6cf10":[14,9,0,7], +"a01711.html#ae381dabe56bdd77f48a8241050d16d82":[14,9,0,4], +"a01711.html#afde9c1e6769f60992c7fb10280cdd199":[14,9,0,0], +"a01715.html":[14,9,1], +"a01719.html":[14,9,2], +"a01723.html":[14,9,3], +"a01723.html#a1d7f86d28ad089ae4401043c117be844":[14,9,3,1], +"a01723.html#a597e62aa42a9971b98a5d76c7f1baef5":[14,9,3,3], +"a01723.html#aa6d2797ec2cdef70aa51438e96e2a301":[14,9,3,2], +"a01723.html#ab910eb48d182d8f191da149339fd6c51":[14,9,3,0], +"a01727.html":[14,9,4], +"a01727.html#a5e63ccd727b87d022ed0eedc0446410f":[14,9,4,7], +"a01727.html#a93cba5300302d50e26f70457f84df0da":[14,9,4,0], +"a01727.html#ac90559108804dc16ac1ac91a0212bff9":[14,9,4,3], +"a01727.html#ac9231df54b2f77c5061bdfbcea927a5e":[14,9,4,8], +"a01727.html#acb0498448f486070d33e121ade525c64":[14,9,4,4], +"a01727.html#ad4c4854451abd367cf8a13aad5f6372b":[14,9,4,1], +"a01727.html#ad89fec1f50b8e8ffc890d3683c4b5afe":[14,9,4,5], +"a01727.html#ad94d1c8d1635e597bd70823a207dc727":[14,9,4,6], +"a01727.html#afc99cd20d6193df126ae2b32b42f7546":[14,9,4,2], +"a01731.html":[14,9,5], +"a01731.html#a1da30fd41605f42e0b0dd68d75c59bd9":[14,9,5,0], +"a01731.html#aac21cf3b5207c0dc25358d6360953380":[14,9,5,1], +"a01731.html#ac57e99b5d0069d7bd733bcf056cc56e1":[14,9,5,4], +"a01731.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52":[14,9,5,2], +"a01731.html#aeb02c7cf4fbaf40307821bc38160ab8d":[14,9,5,3], +"a01735.html":[14,9,6], +"a01735.html#a28771c8ed4754eabcb50649d753ee956":[14,9,6,5], +"a01735.html#a2c6c43889156357aee27b3b09657ebd2":[14,9,6,3], +"a01735.html#a9ebeb5a66a80189ae8e7bb2ea97701c9":[14,9,6,1], +"a01735.html#ac94f545daf7381aeb770fb42b467d338":[14,9,6,4], +"a01735.html#acafb471d7cc7a71d613503760930d9f5":[14,9,6,6], +"a01735.html#ad3a988f3c029fff3805a8a9dd4caaaa5":[14,9,6,0], +"a01735.html#aeb4c9a28028bd625ac3650b39392cf07":[14,9,6,2], +"a01739.html":[14,9,7], +"a01743.html":[14,9,8], +"a01747.html":[14,9,9], +"a01747.html#a089cd58d7f5518ee9016eb40c281bdfc":[14,9,9,2], +"a01747.html#a2d5854b66b7bc7246fa718a5d485d3fb":[14,9,9,5], +"a01747.html#a3b5c9fd883d9daf4d6a42bbf1aba936d":[14,9,9,4], +"a01747.html#a45ea4bd1941244391f04343f993bacf0":[14,9,9,1], +"a01747.html#a4f63b5946df323ef66910d4a0cdf2491":[14,9,9,8], +"a01747.html#a787c86043a8c305bd23256248614a3f7":[14,9,9,6], +"a01747.html#a8bb5e1f0ea943f4749ebf6faa450288b":[14,9,9,3], +"a01747.html#aa4922c43b6dfecb5e39e286e960cdd88":[14,9,9,10], +"a01747.html#aa62f8da7dae46c095c603433ae26fedf":[14,9,9,9], +"a01747.html#ad8ca9262cbe607d0c017e12285c3d951":[14,9,9,7], +"a01747.html#adb6743838ca7d8bd3ad390b7608492ba":[14,9,9,0], +"a01751.html":[14,9,10], +"a01751.html#a8406e4a6d09e2f6b8e3bfc12579d8653":[14,9,10,1], +"a01751.html#ab2ca3ae12be534d58e22bb68d6042ea3":[14,9,10,0], +"a01755.html":[14,9,11], +"a01755.html#a213cc14f2d1c67be382cb8918aca4362":[14,9,11,3], +"a01755.html#a2c43368d48a41123da5f69356b6f29f5":[14,9,11,4], +"a01755.html#a38f7761577529e0bbf52cd0b8c17658b":[14,9,11,1], +"a01755.html#a423e1db9e86ff369d49d78d8f5ea2525":[14,9,11,2], +"a01755.html#a8786d124038d3516d98f2456f19985cf":[14,9,11,5], +"a01755.html#aaa57ce590925c0efe017af1d4457d479":[14,9,11,0], +"a01755.html#adf4e9d92c10469c78810f2881a95843b":[14,9,11,6], +"a01759.html":[14,9,12], +"a01759.html#a0e321ea27e36c985abacf4510619c9f0":[14,9,12,2], +"a01759.html#a1a4a8993461b0675edcb2d162ec8823b":[14,9,12,5], +"a01759.html#a5b623ae9fa4501c996e4c54842eaa548":[14,9,12,4], +"a01759.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9":[14,9,12,0], +"a01759.html#aa2c05475b504237c0ae9db5d48cbb0fc":[14,9,12,3], +"a01759.html#ad9e30a4f9006923af0d6668768598737":[14,9,12,1], +"a01763.html":[14,9,13], +"a01763.html#a0576f1886490bbb3656b420f5bb65e65":[14,9,13,0], +"a01763.html#acb88b64064f725ca81245f2afe6f57f5":[14,9,13,2], +"a01763.html#ad2a2e2e1126d1c022be6a84af7f5e4e3":[14,9,13,4], +"a01763.html#ae33f3603840fd0bb8ada551ff168ea58":[14,9,13,1], +"a01763.html#aeb90e80a488f568c4a193c1fe851c5d4":[14,9,13,3], +"a01767.html":[14,9,14], +"a01771.html":[14,9,15], +"a01771.html#a0619aaead2b82313d761804f40c24926":[14,9,15,3], +"a01771.html#a11807b6f83083ad17c66640c77c78973":[14,9,15,2], +"a01771.html#a26f951076270f2389044a69b30c86d74":[14,9,15,7], +"a01771.html#a4daaa0bccc92503ccc31eaed78eb7409":[14,9,15,1], +"a01771.html#a605e9f150203a43a550e68e940233245":[14,9,15,9] }; diff --git a/navtreeindex8.js b/navtreeindex8.js index cb82d8ffb..9750ffb67 100644 --- a/navtreeindex8.js +++ b/navtreeindex8.js @@ -1,253 +1,253 @@ var NAVTREEINDEX8 = { -"a01764.html#a44b034625f63afcfaab306ac6275cd5b":[13,9,18,4], -"a01764.html#a9aa171dc3ed5403822d780a2d0220d61":[13,9,18,2], -"a01764.html#ad6eba00bdedd4375c93419eb4cda6850":[13,9,18,3], -"a01764.html#afa11fd0401f2d8884d385ffc77962ec3":[13,9,18,6], -"a01764.html#afa39cec9e8d332618910a0f519b5b48d":[13,9,18,1], -"a01768.html":[13,9,19], -"a01768.html#a1765e3454849c67fa19a307f724cb8e3":[13,9,19,0], -"a01768.html#a1d994ea91e9234808e6f0320897ab434":[13,9,19,2], -"a01768.html#a2145615f3148fb8a428657fa8020aad1":[13,9,19,6], -"a01768.html#a2a0f2ee83e6825f92e259ee104fbb67d":[13,9,19,12], -"a01768.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154":[13,9,19,7], -"a01768.html#a374985826f0c1b5c6aa52370f9871841":[13,9,19,8], -"a01768.html#a426f70e97a2f191f021227175699185c":[13,9,19,4], -"a01768.html#a4d03aca0b8dd153e5b939a684f7c2955":[13,9,19,11], -"a01768.html#a534292cebeb2a65e3198e30061b2c35b":[13,9,19,3], -"a01768.html#a5649ccf733b2512db9917036a102fb14":[13,9,19,5], -"a01768.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7":[13,9,19,1], -"a01768.html#af8c982fdcb8edc1ff6b1e838fab281ac":[13,9,19,9], -"a01768.html#afd69516235ce1a7bee9c04146beb93d8":[13,9,19,10], -"a01772.html":[13,9,20], -"a01776.html":[13,9,21], -"a01780.html":[15,0,45], -"a01784.html":[15,0,43], -"a01788.html":[15,0,44], -"a01792.html":[15,0,41], -"a01796.html":[15,0,40], -"a01800.html":[15,0,39], -"a01804.html":[15,0,42], -"a01808.html":[13,11,1], -"a01812.html":[15,0,12], -"a01816.html":[15,0,79], -"a01820.html":[15,0,136], -"a01824.html":[13,12,0], -"a01828.html":[15,0,138], -"a01832.html":[15,0,139], -"a01836.html":[15,0,140], -"a01836.html#aa10b79b793bf8499c396e5108ed5830c":[15,0,140,1], -"a01836.html#ab3f47ede65a8383c94edb8ac013cb08c":[15,0,140,0], -"a01840.html":[15,0,142], -"a01840.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e":[15,0,142,1], -"a01840.html#a5387f2fa4d263228dd0056aa1fd308de":[15,0,142,3], -"a01840.html#a8974dbe03027c73d7bed3159421c05f7":[15,0,142,0], -"a01840.html#a9054ff97888d7fc21d1006b94808c6d9":[15,0,142,6], -"a01840.html#aa1679efb012be2954b3eaf1881128f8f":[15,0,142,7], -"a01840.html#abb83e7378cec1b712fab5974bc82a156":[15,0,142,2], -"a01840.html#abef716f125614c97e00abcd3e62b98c2":[15,0,142,5], -"a01840.html#afe50a8d16a6f04c64053e09ae4975e38":[15,0,142,4], -"a01844.html":[15,0,141], -"a01848.html":[13,12,1], -"a01852.html":[15,0,144], -"a01852.html#a41cd002dd69540506c5894ace65d323f":[15,0,144,1], -"a01852.html#ad28895cf4063a1d3eaa03a343ae7105b":[15,0,144,3], -"a01852.html#af1269e61c8cec31c2e85aa6c3bb4873a":[15,0,144,2], -"a01852.html#afbc894d3ed866954b79e43b30031f293":[15,0,144,0], -"a01856.html":[15,0,143], -"a01856.html#a43266d4cee5be05494f466595b968267":[15,0,143,0], -"a01856.html#a5fa3f781e1ef2c55de73d5be66214630":[15,0,143,1], -"a01860.html":[15,0,146], -"a01872.html":[15,0,145], -"a01876.html":[15,0,147], -"a01876.html#a75cbe04e1812bbae8b4bb552991a1584":[15,0,147,0], -"a01880.html":[15,0,119], -"a01884.html":[15,0,83], -"a01888.html":[15,0,108], -"a01892.html":[15,0,118], -"a01896.html":[15,0,105], -"a01900.html":[15,0,66], -"a01904.html":[15,0,72], -"a01908.html":[15,0,88], -"a01912.html":[15,0,89], -"a01916.html":[15,0,67], -"a01920.html":[15,0,102], -"a01924.html":[15,0,103], -"a01928.html":[15,0,75], -"a01932.html":[15,0,76], -"a01936.html":[15,0,78], -"a01940.html":[15,0,125], -"a01944.html":[15,0,126], -"a01948.html":[15,0,127], -"a01952.html":[15,0,84], -"a01956.html":[15,0,96], -"a01960.html":[15,0,97], -"a01964.html":[15,0,100], -"a01968.html":[15,0,98], -"a01972.html":[15,0,99], -"a01976.html":[15,0,73], -"a01980.html":[15,0,61], -"a01984.html":[15,0,106], -"a01988.html":[15,0,107], -"a01992.html":[15,0,93], -"a01996.html":[15,0,86], -"a02000.html":[15,0,112], -"a02004.html":[15,0,111], -"a02008.html":[15,0,109], -"a02012.html":[15,0,110], -"a02016.html":[15,0,117], -"a02020.html":[15,0,124], -"a02024.html":[15,0,122], -"a02028.html":[15,0,123], -"a02032.html":[15,0,120], -"a02036.html":[15,0,121], -"a02040.html":[15,0,71], -"a02044.html":[15,0,85], -"a02048.html":[15,0,94], -"a02052.html":[15,0,95], -"a02056.html":[15,0,90], -"a02060.html":[15,0,91], -"a02064.html":[15,0,92], -"a02068.html":[15,0,87], -"a02072.html":[15,0,63], -"a02076.html":[15,0,80], -"a02080.html":[15,0,70], -"a02084.html":[15,0,64], -"a02088.html":[15,0,62], -"a02092.html":[15,0,69], -"a02096.html":[15,0,68], -"a02100.html":[15,0,65], -"a02104.html":[15,0,74], -"a02108.html":[15,0,77], -"a02112.html":[15,0,101], -"a02116.html":[15,0,114], -"a02120.html":[15,0,113], -"a02124.html":[15,0,115], -"a02128.html":[15,0,116], -"a02132.html":[15,0,81], -"a02136.html":[15,0,82], -"a02140.html":[15,0,104], -"a02144.html":[15,0,0,0,0], -"a02144.html":[14,0,0,0,0], -"a02148.html":[15,0,0,0,3], -"a02148.html":[14,0,0,0,3], -"a02152.html":[15,0,0,0,4], -"a02152.html":[14,0,0,0,4], -"a02156.html":[15,0,0,0,7], -"a02156.html":[14,0,0,0,7], -"a02160.html":[15,0,0,0,5], -"a02160.html":[14,0,0,0,5], -"a02164.html":[15,0,0,0,2], -"a02164.html":[14,0,0,0,2], -"a02168.html":[15,0,0,0,1], -"a02168.html":[14,0,0,0,1], -"a02172.html":[15,0,0,0,6], -"a02172.html":[14,0,0,0,6], -"a02176.html":[15,0,0,1,3], -"a02176.html":[14,0,0,1,3], -"a02180.html":[15,0,0,1,2], -"a02180.html":[14,0,0,1,2], -"a02184.html":[14,0,0,1,8], -"a02184.html":[15,0,0,1,8], -"a02188.html":[15,0,0,1,11], -"a02188.html":[14,0,0,1,11], -"a02192.html":[15,0,0,1,5], -"a02192.html":[14,0,0,1,5], -"a02196.html":[15,0,0,1,9], -"a02196.html":[14,0,0,1,9], -"a02200.html":[14,0,0,1,12], -"a02200.html":[15,0,0,1,12], -"a02204.html":[15,0,0,1,4], -"a02204.html":[14,0,0,1,4], -"a02208.html":[14,0,0,1,7], -"a02208.html":[15,0,0,1,7], -"a02212.html":[15,0,0,1,1], -"a02212.html":[14,0,0,1,1], -"a02216.html":[15,0,0,1,0], -"a02216.html":[14,0,0,1,0], -"a02220.html":[15,0,0,1,6], -"a02220.html":[14,0,0,1,6], -"a02224.html":[14,0,0,1,10], -"a02224.html":[15,0,0,1,10], -"a02228.html":[14,0,0,2,0], -"a02228.html":[15,0,0,2,0], -"a02232.html":[15,0,0,3,0], -"a02232.html":[14,0,0,3,0], -"a02232.html#a98b230727187cf34e600b9a6ff20cc45":[14,0,0,3,0,0], -"a02232.html#a98b230727187cf34e600b9a6ff20cc45":[15,0,0,3,0,0], -"a02236.html":[15,0,0,3,1], -"a02236.html":[14,0,0,3,1], -"a02236.html#a21a92b8d373a29b54b11448fdb7b2ce4":[15,0,0,3,1,0], -"a02236.html#a21a92b8d373a29b54b11448fdb7b2ce4":[14,0,0,3,1,0], -"a02236.html#a732d6227271912ac665bc7f27a1012ce":[15,0,0,3,1,1], -"a02236.html#a732d6227271912ac665bc7f27a1012ce":[14,0,0,3,1,1], -"a02240.html":[15,0,0,3,2], -"a02240.html":[14,0,0,3,2], -"a02244.html":[14,0,0,4,0], -"a02244.html":[15,0,0,4,0], -"a02248.html":[15,0,0,4,9], -"a02248.html":[14,0,0,4,9], -"a02252.html":[14,0,0,4,8], -"a02252.html":[15,0,0,4,8], -"a02256.html":[14,0,0,4,4], -"a02256.html":[15,0,0,4,4], -"a02260.html":[15,0,0,4,5], -"a02260.html":[14,0,0,4,5], -"a02264.html":[15,0,0,4,7], -"a02264.html":[14,0,0,4,7], -"a02268.html":[14,0,0,4,12], -"a02268.html":[15,0,0,4,12], -"a02272.html":[15,0,0,4,13], -"a02272.html":[14,0,0,4,13], -"a02276.html":[15,0,0,4,14], -"a02276.html":[14,0,0,4,14], -"a02280.html":[15,0,0,4,11], -"a02280.html":[14,0,0,4,11], -"a02284.html":[15,0,0,4,6], -"a02284.html":[14,0,0,4,6], -"a02288.html":[15,0,0,4,15], -"a02288.html":[14,0,0,4,15], -"a02292.html":[15,0,0,4,10], -"a02292.html":[14,0,0,4,10], -"a02296.html":[14,0,0,4,3], -"a02296.html":[15,0,0,4,3], -"a02300.html":[14,0,0,4,1], -"a02300.html":[15,0,0,4,1], -"a02304.html":[14,0,0,4,2], -"a02304.html":[15,0,0,4,2], -"a02308.html":[15,0,0,5,8], -"a02308.html":[14,0,0,5,8], -"a02312.html":[14,0,0,5,17], -"a02312.html":[15,0,0,5,17], -"a02316.html":[14,0,0,5,6], -"a02316.html":[15,0,0,5,6], -"a02320.html":[14,0,0,5,9], -"a02320.html":[15,0,0,5,9], -"a02324.html":[14,0,0,5,34], -"a02324.html":[15,0,0,5,34], -"a02328.html":[14,0,0,5,4], -"a02328.html":[15,0,0,5,4], -"a02332.html":[14,0,0,5,24], -"a02332.html":[15,0,0,5,24], -"a02336.html":[14,0,0,5,7], -"a02336.html":[15,0,0,5,7], -"a02340.html":[15,0,0,5,28], -"a02340.html":[14,0,0,5,28], -"a02344.html":[15,0,0,5,10], -"a02344.html":[14,0,0,5,10], -"a02348.html":[15,0,0,5,12], -"a02348.html":[14,0,0,5,12], -"a02352.html":[15,0,0,5,13], -"a02352.html":[14,0,0,5,13], -"a02356.html":[14,0,0,5,1], -"a02356.html":[15,0,0,5,1], -"a02360.html":[15,0,0,5,15], -"a02360.html":[14,0,0,5,15], -"a02364.html":[14,0,0,5,16], -"a02364.html":[15,0,0,5,16], -"a02368.html":[14,0,0,5,2], -"a02368.html":[15,0,0,5,2], -"a02372.html":[15,0,0,5,25], -"a02372.html":[14,0,0,5,25], -"a02376.html":[15,0,0,5,21] +"a01771.html#aad7093cf772d6e337b3c09af9cea92ac":[14,9,15,6], +"a01771.html#ac4f5b60a59fa29d78c720c2be434c5c3":[14,9,15,0], +"a01771.html#ac97a41612246b0527ed1a242bbe28a99":[14,9,15,5], +"a01771.html#ae00a5116b4b55fb2bc6546ca3156522e":[14,9,15,8], +"a01771.html#af2d1c007ab43e8556a917efc5bcee9c8":[14,9,15,4], +"a01775.html":[14,9,16], +"a01779.html":[14,9,17], +"a01783.html":[14,9,18], +"a01783.html#a17c83c0e810b2bf35b364f026e1cecb0":[14,9,18,5], +"a01783.html#a2582ecc282bd3d712918e6109a18c7d2":[14,9,18,0], +"a01783.html#a44b034625f63afcfaab306ac6275cd5b":[14,9,18,4], +"a01783.html#a9aa171dc3ed5403822d780a2d0220d61":[14,9,18,2], +"a01783.html#ad6eba00bdedd4375c93419eb4cda6850":[14,9,18,3], +"a01783.html#afa11fd0401f2d8884d385ffc77962ec3":[14,9,18,6], +"a01783.html#afa39cec9e8d332618910a0f519b5b48d":[14,9,18,1], +"a01787.html":[14,9,19], +"a01787.html#a1765e3454849c67fa19a307f724cb8e3":[14,9,19,0], +"a01787.html#a1d994ea91e9234808e6f0320897ab434":[14,9,19,2], +"a01787.html#a2145615f3148fb8a428657fa8020aad1":[14,9,19,6], +"a01787.html#a2a0f2ee83e6825f92e259ee104fbb67d":[14,9,19,12], +"a01787.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154":[14,9,19,7], +"a01787.html#a374985826f0c1b5c6aa52370f9871841":[14,9,19,8], +"a01787.html#a426f70e97a2f191f021227175699185c":[14,9,19,4], +"a01787.html#a4d03aca0b8dd153e5b939a684f7c2955":[14,9,19,11], +"a01787.html#a534292cebeb2a65e3198e30061b2c35b":[14,9,19,3], +"a01787.html#a5649ccf733b2512db9917036a102fb14":[14,9,19,5], +"a01787.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7":[14,9,19,1], +"a01787.html#af8c982fdcb8edc1ff6b1e838fab281ac":[14,9,19,9], +"a01787.html#afd69516235ce1a7bee9c04146beb93d8":[14,9,19,10], +"a01791.html":[14,9,20], +"a01795.html":[14,9,21], +"a01799.html":[16,0,46], +"a01803.html":[16,0,42], +"a01807.html":[16,0,40], +"a01811.html":[16,0,39], +"a01815.html":[16,0,38], +"a01819.html":[16,0,41], +"a01823.html":[14,11,1], +"a01827.html":[16,0,12], +"a01831.html":[16,0,43], +"a01835.html":[16,0,44], +"a01839.html":[16,0,45], +"a01843.html":[16,0,80], +"a01847.html":[16,0,137], +"a01851.html":[14,12,0], +"a01855.html":[16,0,139], +"a01859.html":[16,0,140], +"a01863.html":[16,0,141], +"a01863.html#aa10b79b793bf8499c396e5108ed5830c":[16,0,141,1], +"a01863.html#ab3f47ede65a8383c94edb8ac013cb08c":[16,0,141,0], +"a01867.html":[16,0,144], +"a01867.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e":[16,0,144,1], +"a01867.html#a5387f2fa4d263228dd0056aa1fd308de":[16,0,144,3], +"a01867.html#a8974dbe03027c73d7bed3159421c05f7":[16,0,144,0], +"a01867.html#a9054ff97888d7fc21d1006b94808c6d9":[16,0,144,6], +"a01867.html#aa1679efb012be2954b3eaf1881128f8f":[16,0,144,7], +"a01867.html#abb83e7378cec1b712fab5974bc82a156":[16,0,144,2], +"a01867.html#abef716f125614c97e00abcd3e62b98c2":[16,0,144,5], +"a01867.html#afe50a8d16a6f04c64053e09ae4975e38":[16,0,144,4], +"a01871.html":[16,0,142], +"a01875.html":[16,0,147], +"a01879.html":[16,0,143], +"a01883.html":[14,12,1], +"a01887.html":[16,0,146], +"a01887.html#a41cd002dd69540506c5894ace65d323f":[16,0,146,1], +"a01887.html#ad28895cf4063a1d3eaa03a343ae7105b":[16,0,146,3], +"a01887.html#af1269e61c8cec31c2e85aa6c3bb4873a":[16,0,146,2], +"a01887.html#afbc894d3ed866954b79e43b30031f293":[16,0,146,0], +"a01891.html":[16,0,145], +"a01891.html#a43266d4cee5be05494f466595b968267":[16,0,145,0], +"a01891.html#a5fa3f781e1ef2c55de73d5be66214630":[16,0,145,1], +"a01895.html":[16,0,149], +"a01907.html":[16,0,148], +"a01911.html":[16,0,150], +"a01911.html#a75cbe04e1812bbae8b4bb552991a1584":[16,0,150,0], +"a01915.html":[16,0,120], +"a01919.html":[16,0,84], +"a01923.html":[16,0,109], +"a01927.html":[16,0,119], +"a01931.html":[16,0,106], +"a01935.html":[16,0,67], +"a01939.html":[16,0,73], +"a01943.html":[16,0,89], +"a01947.html":[16,0,90], +"a01951.html":[16,0,68], +"a01955.html":[16,0,103], +"a01959.html":[16,0,104], +"a01963.html":[16,0,76], +"a01967.html":[16,0,77], +"a01971.html":[16,0,79], +"a01975.html":[16,0,126], +"a01979.html":[16,0,127], +"a01983.html":[16,0,128], +"a01987.html":[16,0,85], +"a01991.html":[16,0,97], +"a01995.html":[16,0,98], +"a01999.html":[16,0,101], +"a02003.html":[16,0,99], +"a02007.html":[16,0,100], +"a02011.html":[16,0,74], +"a02015.html":[16,0,62], +"a02019.html":[16,0,107], +"a02023.html":[16,0,108], +"a02027.html":[16,0,94], +"a02031.html":[16,0,87], +"a02035.html":[16,0,113], +"a02039.html":[16,0,112], +"a02043.html":[16,0,110], +"a02047.html":[16,0,111], +"a02051.html":[16,0,118], +"a02055.html":[16,0,125], +"a02059.html":[16,0,123], +"a02063.html":[16,0,124], +"a02067.html":[16,0,121], +"a02071.html":[16,0,122], +"a02075.html":[16,0,72], +"a02079.html":[16,0,86], +"a02083.html":[16,0,95], +"a02087.html":[16,0,96], +"a02091.html":[16,0,91], +"a02095.html":[16,0,92], +"a02099.html":[16,0,93], +"a02103.html":[16,0,88], +"a02107.html":[16,0,64], +"a02111.html":[16,0,81], +"a02115.html":[16,0,71], +"a02119.html":[16,0,65], +"a02123.html":[16,0,63], +"a02127.html":[16,0,70], +"a02131.html":[16,0,69], +"a02135.html":[16,0,66], +"a02139.html":[16,0,75], +"a02143.html":[16,0,78], +"a02147.html":[16,0,102], +"a02151.html":[16,0,115], +"a02155.html":[16,0,114], +"a02159.html":[16,0,116], +"a02163.html":[16,0,117], +"a02167.html":[16,0,82], +"a02171.html":[16,0,83], +"a02175.html":[16,0,105], +"a02179.html":[15,0,0,0,0], +"a02179.html":[16,0,0,0,0], +"a02183.html":[15,0,0,0,3], +"a02183.html":[16,0,0,0,3], +"a02187.html":[16,0,0,0,4], +"a02187.html":[15,0,0,0,4], +"a02191.html":[16,0,0,0,7], +"a02191.html":[15,0,0,0,7], +"a02195.html":[15,0,0,0,5], +"a02195.html":[16,0,0,0,5], +"a02199.html":[16,0,0,0,2], +"a02199.html":[15,0,0,0,2], +"a02203.html":[16,0,0,0,1], +"a02203.html":[15,0,0,0,1], +"a02207.html":[15,0,0,0,6], +"a02207.html":[16,0,0,0,6], +"a02211.html":[16,0,0,1,3], +"a02211.html":[15,0,0,1,3], +"a02215.html":[15,0,0,1,2], +"a02215.html":[16,0,0,1,2], +"a02219.html":[16,0,0,1,8], +"a02219.html":[15,0,0,1,8], +"a02223.html":[16,0,0,1,11], +"a02223.html":[15,0,0,1,11], +"a02227.html":[15,0,0,1,5], +"a02227.html":[16,0,0,1,5], +"a02231.html":[16,0,0,1,9], +"a02231.html":[15,0,0,1,9], +"a02235.html":[16,0,0,1,12], +"a02235.html":[15,0,0,1,12], +"a02239.html":[16,0,0,1,4], +"a02239.html":[15,0,0,1,4], +"a02243.html":[15,0,0,1,7], +"a02243.html":[16,0,0,1,7], +"a02247.html":[16,0,0,1,1], +"a02247.html":[15,0,0,1,1], +"a02251.html":[15,0,0,1,0], +"a02251.html":[16,0,0,1,0], +"a02255.html":[16,0,0,1,6], +"a02255.html":[15,0,0,1,6], +"a02259.html":[15,0,0,1,10], +"a02259.html":[16,0,0,1,10], +"a02263.html":[15,0,0,2,0], +"a02263.html":[16,0,0,2,0], +"a02267.html":[15,0,0,3,0], +"a02267.html":[16,0,0,3,0], +"a02267.html#a98b230727187cf34e600b9a6ff20cc45":[15,0,0,3,0,0], +"a02267.html#a98b230727187cf34e600b9a6ff20cc45":[16,0,0,3,0,0], +"a02271.html":[15,0,0,3,1], +"a02271.html":[16,0,0,3,1], +"a02271.html#a21a92b8d373a29b54b11448fdb7b2ce4":[15,0,0,3,1,0], +"a02271.html#a21a92b8d373a29b54b11448fdb7b2ce4":[16,0,0,3,1,0], +"a02271.html#a732d6227271912ac665bc7f27a1012ce":[15,0,0,3,1,1], +"a02271.html#a732d6227271912ac665bc7f27a1012ce":[16,0,0,3,1,1], +"a02275.html":[16,0,0,3,2], +"a02275.html":[15,0,0,3,2], +"a02279.html":[15,0,0,4,0], +"a02279.html":[16,0,0,4,0], +"a02283.html":[15,0,0,4,9], +"a02283.html":[16,0,0,4,9], +"a02287.html":[16,0,0,4,8], +"a02287.html":[15,0,0,4,8], +"a02291.html":[15,0,0,4,4], +"a02291.html":[16,0,0,4,4], +"a02295.html":[16,0,0,4,5], +"a02295.html":[15,0,0,4,5], +"a02299.html":[16,0,0,4,7], +"a02299.html":[15,0,0,4,7], +"a02303.html":[16,0,0,4,12], +"a02303.html":[15,0,0,4,12], +"a02307.html":[16,0,0,4,13], +"a02307.html":[15,0,0,4,13], +"a02311.html":[16,0,0,4,14], +"a02311.html":[15,0,0,4,14], +"a02315.html":[16,0,0,4,11], +"a02315.html":[15,0,0,4,11], +"a02319.html":[16,0,0,4,6], +"a02319.html":[15,0,0,4,6], +"a02323.html":[16,0,0,4,15], +"a02323.html":[15,0,0,4,15], +"a02327.html":[16,0,0,4,10], +"a02327.html":[15,0,0,4,10], +"a02331.html":[15,0,0,4,3], +"a02331.html":[16,0,0,4,3], +"a02335.html":[16,0,0,4,1], +"a02335.html":[15,0,0,4,1], +"a02339.html":[16,0,0,4,2], +"a02339.html":[15,0,0,4,2], +"a02343.html":[16,0,0,5,8], +"a02343.html":[15,0,0,5,8], +"a02347.html":[16,0,0,5,17], +"a02347.html":[15,0,0,5,17], +"a02351.html":[16,0,0,5,6], +"a02351.html":[15,0,0,5,6], +"a02355.html":[15,0,0,5,9], +"a02355.html":[16,0,0,5,9], +"a02359.html":[15,0,0,5,34], +"a02359.html":[16,0,0,5,34], +"a02363.html":[15,0,0,5,4], +"a02363.html":[16,0,0,5,4], +"a02367.html":[15,0,0,5,24], +"a02367.html":[16,0,0,5,24], +"a02371.html":[15,0,0,5,7], +"a02371.html":[16,0,0,5,7], +"a02375.html":[16,0,0,5,28], +"a02375.html":[15,0,0,5,28], +"a02379.html":[15,0,0,5,10], +"a02379.html":[16,0,0,5,10], +"a02383.html":[15,0,0,5,12] }; diff --git a/navtreeindex9.js b/navtreeindex9.js index 09a06943d..6845ae4f0 100644 --- a/navtreeindex9.js +++ b/navtreeindex9.js @@ -1,253 +1,253 @@ var NAVTREEINDEX9 = { -"a02376.html":[14,0,0,5,21], -"a02380.html":[15,0,0,5,27], -"a02380.html":[14,0,0,5,27], -"a02384.html":[14,0,0,5,23], -"a02384.html":[15,0,0,5,23], -"a02388.html":[15,0,0,5,31], -"a02388.html":[14,0,0,5,31], -"a02392.html":[14,0,0,5,26], -"a02392.html":[15,0,0,5,26], -"a02396.html":[14,0,0,5,5], -"a02396.html":[15,0,0,5,5], -"a02400.html":[14,0,0,5,29], -"a02400.html":[15,0,0,5,29], -"a02404.html":[15,0,0,5,3], -"a02404.html":[14,0,0,5,3], -"a02408.html":[14,0,0,5,11], -"a02408.html":[15,0,0,5,11], -"a02412.html":[14,0,0,5,32], -"a02412.html":[15,0,0,5,32], -"a02416.html":[14,0,0,5,0], -"a02416.html":[15,0,0,5,0], -"a02420.html":[15,0,0,5,30], -"a02420.html":[14,0,0,5,30], -"a02424.html":[15,0,0,5,35], -"a02424.html":[14,0,0,5,35], -"a02428.html":[14,0,0,5,20], -"a02428.html":[15,0,0,5,20], -"a02432.html":[15,0,0,5,14], -"a02432.html":[14,0,0,5,14], -"a02436.html":[14,0,0,5,18], -"a02436.html":[15,0,0,5,18], -"a02440.html":[15,0,0,5,22], -"a02440.html":[14,0,0,5,22], -"a02444.html":[14,0,0,5,19], -"a02444.html":[15,0,0,5,19], -"a02448.html":[15,0,0,5,33], -"a02448.html":[14,0,0,5,33], -"a02452.html":[14,0,0,6,11], -"a02452.html":[15,0,0,6,11], -"a02456.html":[14,0,0,6,12], -"a02456.html":[15,0,0,6,12], -"a02460.html":[15,0,0,6,9], -"a02460.html":[14,0,0,6,9], -"a02464.html":[14,0,0,6,8], -"a02464.html":[15,0,0,6,8], -"a02468.html":[15,0,0,6,2], -"a02468.html":[14,0,0,6,2], -"a02472.html":[15,0,0,6,6], -"a02472.html":[14,0,0,6,6], -"a02476.html":[15,0,0,6,5], -"a02476.html":[14,0,0,6,5], -"a02480.html":[15,0,0,6,7], -"a02480.html":[14,0,0,6,7], -"a02484.html":[15,0,0,6,1], -"a02484.html":[14,0,0,6,1], -"a02488.html":[15,0,0,6,4], -"a02488.html":[14,0,0,6,4], -"a02492.html":[14,0,0,6,0], -"a02492.html":[15,0,0,6,0], -"a02496.html":[15,0,0,6,3], -"a02496.html":[14,0,0,6,3], -"a02500.html":[15,0,0,6,10], -"a02500.html":[14,0,0,6,10], -"a02504.html":[15,0,0,7,1], -"a02504.html":[14,0,0,7,1], -"a02508.html":[15,0,0,7,0], -"a02508.html":[14,0,0,7,0], -"a02512.html":[15,0,0,7,3], -"a02512.html":[14,0,0,7,3], -"a02512.html#a1f9f23cc775d8b3e461bbfc192134c27":[15,0,0,7,3,0], -"a02512.html#a1f9f23cc775d8b3e461bbfc192134c27":[14,0,0,7,3,0], -"a02512.html#a3d679310ce9bf2878b4d01871e97c54e":[14,0,0,7,3,1], -"a02512.html#a3d679310ce9bf2878b4d01871e97c54e":[15,0,0,7,3,1], -"a02516.html":[14,0,0,7,2], -"a02516.html":[15,0,0,7,2], -"a02516.html#a2cd77c54cfde31fcc4fb97ad15223f30":[15,0,0,7,2,0], -"a02516.html#a2cd77c54cfde31fcc4fb97ad15223f30":[14,0,0,7,2,0], -"a02516.html#a7748c2f53682292dd1ea2cb03b8386f5":[15,0,0,7,2,1], -"a02516.html#a7748c2f53682292dd1ea2cb03b8386f5":[14,0,0,7,2,1], -"a02520.html":[14,0,0,9,0], -"a02520.html":[15,0,0,8,0], -"a02524.html":[15,0,2,1], -"a02528.html":[15,0,2,2], -"a02532.html":[15,0,2,0], -"a02536.html":[15,0,1,0], -"a02825.html":[1], -"a02826.html":[2], -"a02826.html#autotoc_md0":[2,0], -"a02826.html#autotoc_md1":[2,1], -"a02827.html":[3], -"a02827.html#autotoc_md10":[3,0,3], -"a02827.html#autotoc_md11":[3,0,4], -"a02827.html#autotoc_md12":[3,0,5], -"a02827.html#autotoc_md2":[3,0], -"a02827.html#autotoc_md3":[3,0,0], -"a02827.html#autotoc_md4":[3,0,1], -"a02827.html#autotoc_md5":[3,0,2], -"a02827.html#autotoc_md6":[3,0,2,0], -"a02827.html#autotoc_md7":[3,0,2,1], -"a02827.html#autotoc_md8":[3,0,2,1,0], -"a02827.html#autotoc_md9":[3,0,2,1,1], -"a02828.html":[4], -"a02829.html":[5], -"a02829.html#autotoc_md13":[5,0], -"a02829.html#autotoc_md14":[5,1], -"a02831.html":[6], -"a02836.html":[7], -"a02837.html":[8], -"a02837.html#autotoc_md25":[8,0], -"a02837.html#autotoc_md26":[8,0,0], -"a02837.html#autotoc_md27":[8,1], -"a02837.html#autotoc_md28":[8,1,0], -"a02837.html#autotoc_md29":[8,1,1], -"a02837.html#autotoc_md30":[8,1,2], -"a02837.html#autotoc_md31":[8,2], -"a02837.html#autotoc_md32":[8,3], -"a02837.html#autotoc_md33":[8,4], -"a02837.html#autotoc_md34":[8,5], -"a02837.html#autotoc_md35":[8,6], -"a02837.html#autotoc_md36":[8,6,0], -"a02837.html#autotoc_md37":[8,6,1], -"a02837.html#autotoc_md38":[8,6,2], -"a02837.html#autotoc_md39":[8,7], -"a02837.html#autotoc_md40":[8,8], -"a02837.html#autotoc_md41":[8,8,0], -"a02837.html#autotoc_md42":[8,8,1], -"a02837.html#autotoc_md43":[8,9], -"a02837.html#autotoc_md44":[8,10], -"a02837.html#autotoc_md45":[8,11], -"a02838.html":[9], -"a02838.html#autotoc_md47":[9,0], -"a02838.html#autotoc_md48":[9,0,0], -"a02838.html#autotoc_md49":[9,0,1], -"a02839.html":[10], -"a02839.html#autotoc_md100":[10,12,0], -"a02839.html#autotoc_md101":[10,13], -"a02839.html#autotoc_md102":[10,13,0], -"a02839.html#autotoc_md103":[10,13,1], -"a02839.html#autotoc_md104":[10,14], -"a02839.html#autotoc_md105":[10,14,0], -"a02839.html#autotoc_md106":[10,14,1], -"a02839.html#autotoc_md107":[10,15], -"a02839.html#autotoc_md108":[10,15,0], -"a02839.html#autotoc_md109":[10,15,1], -"a02839.html#autotoc_md110":[10,16], -"a02839.html#autotoc_md111":[10,16,0], -"a02839.html#autotoc_md112":[10,16,1], -"a02839.html#autotoc_md113":[10,17], -"a02839.html#autotoc_md114":[10,17,0], -"a02839.html#autotoc_md115":[10,17,1], -"a02839.html#autotoc_md116":[10,17,2], -"a02839.html#autotoc_md117":[10,18], -"a02839.html#autotoc_md118":[10,18,0], -"a02839.html#autotoc_md119":[10,18,1], -"a02839.html#autotoc_md120":[10,19], -"a02839.html#autotoc_md121":[10,19,0], -"a02839.html#autotoc_md122":[10,19,1], -"a02839.html#autotoc_md123":[10,20], -"a02839.html#autotoc_md124":[10,20,0], -"a02839.html#autotoc_md125":[10,20,1], -"a02839.html#autotoc_md126":[10,21], -"a02839.html#autotoc_md127":[10,21,0], -"a02839.html#autotoc_md128":[10,21,1], -"a02839.html#autotoc_md129":[10,22], -"a02839.html#autotoc_md130":[10,22,0], -"a02839.html#autotoc_md131":[10,23], -"a02839.html#autotoc_md132":[10,23,0], -"a02839.html#autotoc_md133":[10,23,1], -"a02839.html#autotoc_md134":[10,24], -"a02839.html#autotoc_md135":[10,25], -"a02839.html#autotoc_md136":[10,26], -"a02839.html#autotoc_md137":[10,27], -"a02839.html#autotoc_md138":[10,28], -"a02839.html#autotoc_md139":[10,29], -"a02839.html#autotoc_md140":[10,30], -"a02839.html#autotoc_md141":[10,31], -"a02839.html#autotoc_md142":[10,32], -"a02839.html#autotoc_md143":[10,33], -"a02839.html#autotoc_md144":[10,34], -"a02839.html#autotoc_md145":[10,35], -"a02839.html#autotoc_md146":[10,36], -"a02839.html#autotoc_md147":[10,37], -"a02839.html#autotoc_md148":[10,38], -"a02839.html#autotoc_md149":[10,39], -"a02839.html#autotoc_md150":[10,40], -"a02839.html#autotoc_md151":[10,41], -"a02839.html#autotoc_md152":[10,42], -"a02839.html#autotoc_md61":[10,0], -"a02839.html#autotoc_md62":[10,0,0], -"a02839.html#autotoc_md63":[10,0,1], -"a02839.html#autotoc_md64":[10,0,2], -"a02839.html#autotoc_md65":[10,1], -"a02839.html#autotoc_md66":[10,1,0], -"a02839.html#autotoc_md67":[10,1,1], -"a02839.html#autotoc_md68":[10,2], -"a02839.html#autotoc_md69":[10,2,0], -"a02839.html#autotoc_md70":[10,2,1], -"a02839.html#autotoc_md71":[10,3], -"a02839.html#autotoc_md72":[10,3,0], -"a02839.html#autotoc_md73":[10,3,1], -"a02839.html#autotoc_md74":[10,3,2], -"a02839.html#autotoc_md75":[10,4], -"a02839.html#autotoc_md76":[10,4,0], -"a02839.html#autotoc_md77":[10,4,1], -"a02839.html#autotoc_md78":[10,4,2], -"a02839.html#autotoc_md79":[10,5], -"a02839.html#autotoc_md80":[10,5,0], -"a02839.html#autotoc_md81":[10,5,1], -"a02839.html#autotoc_md82":[10,5,2], -"a02839.html#autotoc_md83":[10,6], -"a02839.html#autotoc_md84":[10,6,0], -"a02839.html#autotoc_md85":[10,6,1], -"a02839.html#autotoc_md86":[10,7], -"a02839.html#autotoc_md87":[10,7,0], -"a02839.html#autotoc_md88":[10,7,1], -"a02839.html#autotoc_md89":[10,7,2], -"a02839.html#autotoc_md90":[10,8], -"a02839.html#autotoc_md91":[10,8,0], -"a02839.html#autotoc_md92":[10,9], -"a02839.html#autotoc_md93":[10,9,0], -"a02839.html#autotoc_md94":[10,10], -"a02839.html#autotoc_md95":[10,10,0], -"a02839.html#autotoc_md96":[10,10,1], -"a02839.html#autotoc_md97":[10,11], -"a02839.html#autotoc_md98":[10,11,0], -"a02839.html#autotoc_md99":[10,12], -"a02840.html":[11], -"a02840.html#autotoc_md154":[11,0], -"a02840.html#autotoc_md155":[11,1], -"annotated.html":[15,0], -"classes.html":[15,1], -"dir_0680cb466dcc0d680630f5d267d4b7d1.html":[16,0,0,4], -"dir_0f8c318486f9c8f97febe2dc0542d496.html":[16,0,1,5], -"dir_18075c3a94726308684965563d2ee6c8.html":[16,0,0,0], -"dir_26647cdac0a1f8c717d44b4eb3b4ec89.html":[16,0,1,0], -"dir_2d87885bbe6729211aeb398dfc685454.html":[16,0,0,6], -"dir_39966be8f8e069f6fa92c98611834f6b.html":[16,0,1,2,0], -"dir_6319b470d978b666f57c44c2de446197.html":[16,0,0,5], -"dir_695be77052103537ae3c41f50bd7e0cc.html":[16,0,1,2], -"dir_87abda79916a436a3f9fdf465608c5f5.html":[16,0,0,1], -"dir_92f10bc6a7ace15606cb0622f4eb49bb.html":[16,0,0,2], -"dir_97aefd0d527b934f1d99a682da8fe6a9.html":[16,0,1], -"dir_b2187fb9aff39e17c00391b7def58804.html":[16,0,1,4], -"dir_b3c25b642613ea6a80d1cd59c6d313a8.html":[16,0,1,8], -"dir_b9d9bcd31faf1443658640fef106169e.html":[16,0,1,9], -"dir_c4875bffc6c901e8f9ea57d13c10be7a.html":[16,0,1,6], -"dir_d422163b96683743ed3963d4aac17747.html":[16,0,0], -"dir_dbc902ed54f25d1382ab433b67c4a47f.html":[16,0,0,3], -"dir_e870e4dac26de7990352b1cb7547818f.html":[16,0,1,3], -"dir_ec1cbef6cba079ce838897574eab818a.html":[16,0,1,7] +"a02383.html":[16,0,0,5,12], +"a02387.html":[15,0,0,5,13], +"a02387.html":[16,0,0,5,13], +"a02391.html":[16,0,0,5,1], +"a02391.html":[15,0,0,5,1], +"a02395.html":[16,0,0,5,15], +"a02395.html":[15,0,0,5,15], +"a02399.html":[16,0,0,5,16], +"a02399.html":[15,0,0,5,16], +"a02403.html":[16,0,0,5,2], +"a02403.html":[15,0,0,5,2], +"a02407.html":[16,0,0,5,25], +"a02407.html":[15,0,0,5,25], +"a02411.html":[16,0,0,5,21], +"a02411.html":[15,0,0,5,21], +"a02415.html":[16,0,0,5,27], +"a02415.html":[15,0,0,5,27], +"a02419.html":[15,0,0,5,23], +"a02419.html":[16,0,0,5,23], +"a02423.html":[16,0,0,5,31], +"a02423.html":[15,0,0,5,31], +"a02427.html":[15,0,0,5,26], +"a02427.html":[16,0,0,5,26], +"a02431.html":[16,0,0,5,5], +"a02431.html":[15,0,0,5,5], +"a02435.html":[16,0,0,5,29], +"a02435.html":[15,0,0,5,29], +"a02439.html":[15,0,0,5,3], +"a02439.html":[16,0,0,5,3], +"a02443.html":[16,0,0,5,11], +"a02443.html":[15,0,0,5,11], +"a02447.html":[16,0,0,5,32], +"a02447.html":[15,0,0,5,32], +"a02451.html":[15,0,0,5,0], +"a02451.html":[16,0,0,5,0], +"a02455.html":[16,0,0,5,30], +"a02455.html":[15,0,0,5,30], +"a02459.html":[16,0,0,5,35], +"a02459.html":[15,0,0,5,35], +"a02463.html":[16,0,0,5,20], +"a02463.html":[15,0,0,5,20], +"a02467.html":[16,0,0,5,14], +"a02467.html":[15,0,0,5,14], +"a02471.html":[16,0,0,5,18], +"a02471.html":[15,0,0,5,18], +"a02475.html":[16,0,0,5,22], +"a02475.html":[15,0,0,5,22], +"a02479.html":[16,0,0,5,19], +"a02479.html":[15,0,0,5,19], +"a02483.html":[15,0,0,5,33], +"a02483.html":[16,0,0,5,33], +"a02487.html":[16,0,0,6,11], +"a02487.html":[15,0,0,6,11], +"a02491.html":[16,0,0,6,12], +"a02491.html":[15,0,0,6,12], +"a02495.html":[16,0,0,6,9], +"a02495.html":[15,0,0,6,9], +"a02499.html":[16,0,0,6,8], +"a02499.html":[15,0,0,6,8], +"a02503.html":[15,0,0,6,2], +"a02503.html":[16,0,0,6,2], +"a02507.html":[15,0,0,6,6], +"a02507.html":[16,0,0,6,6], +"a02511.html":[15,0,0,6,5], +"a02511.html":[16,0,0,6,5], +"a02515.html":[15,0,0,6,7], +"a02515.html":[16,0,0,6,7], +"a02519.html":[16,0,0,6,1], +"a02519.html":[15,0,0,6,1], +"a02523.html":[15,0,0,6,4], +"a02523.html":[16,0,0,6,4], +"a02527.html":[16,0,0,6,0], +"a02527.html":[15,0,0,6,0], +"a02531.html":[16,0,0,6,3], +"a02531.html":[15,0,0,6,3], +"a02535.html":[16,0,0,6,10], +"a02535.html":[15,0,0,6,10], +"a02539.html":[16,0,0,7,1], +"a02539.html":[15,0,0,7,1], +"a02543.html":[16,0,0,7,0], +"a02543.html":[15,0,0,7,0], +"a02547.html":[15,0,0,7,3], +"a02547.html":[16,0,0,7,3], +"a02547.html#a1f9f23cc775d8b3e461bbfc192134c27":[15,0,0,7,3,0], +"a02547.html#a1f9f23cc775d8b3e461bbfc192134c27":[16,0,0,7,3,0], +"a02547.html#a3d679310ce9bf2878b4d01871e97c54e":[15,0,0,7,3,1], +"a02547.html#a3d679310ce9bf2878b4d01871e97c54e":[16,0,0,7,3,1], +"a02551.html":[16,0,0,7,2], +"a02551.html":[15,0,0,7,2], +"a02551.html#a2cd77c54cfde31fcc4fb97ad15223f30":[16,0,0,7,2,0], +"a02551.html#a2cd77c54cfde31fcc4fb97ad15223f30":[15,0,0,7,2,0], +"a02551.html#a7748c2f53682292dd1ea2cb03b8386f5":[16,0,0,7,2,1], +"a02551.html#a7748c2f53682292dd1ea2cb03b8386f5":[15,0,0,7,2,1], +"a02555.html":[15,0,0,9,0], +"a02555.html":[16,0,0,8,0], +"a02559.html":[16,0,2,1], +"a02563.html":[16,0,2,2], +"a02567.html":[16,0,2,0], +"a02571.html":[16,0,1,0], +"a02860.html":[1], +"a02861.html":[2], +"a02861.html#autotoc_md0":[2,0], +"a02861.html#autotoc_md1":[2,1], +"a02862.html":[3], +"a02862.html#autotoc_md10":[3,0,3], +"a02862.html#autotoc_md11":[3,0,4], +"a02862.html#autotoc_md12":[3,0,5], +"a02862.html#autotoc_md2":[3,0], +"a02862.html#autotoc_md3":[3,0,0], +"a02862.html#autotoc_md4":[3,0,1], +"a02862.html#autotoc_md5":[3,0,2], +"a02862.html#autotoc_md6":[3,0,2,0], +"a02862.html#autotoc_md7":[3,0,2,1], +"a02862.html#autotoc_md8":[3,0,2,1,0], +"a02862.html#autotoc_md9":[3,0,2,1,1], +"a02863.html":[4], +"a02864.html":[5], +"a02864.html#autotoc_md13":[5,0], +"a02864.html#autotoc_md14":[5,1], +"a02866.html":[6], +"a02871.html":[7], +"a02872.html":[8], +"a02872.html#autotoc_md24":[8,0], +"a02873.html":[9], +"a02873.html#autotoc_md26":[9,0], +"a02873.html#autotoc_md27":[9,0,0], +"a02873.html#autotoc_md28":[9,1], +"a02873.html#autotoc_md29":[9,1,0], +"a02873.html#autotoc_md30":[9,1,1], +"a02873.html#autotoc_md31":[9,1,2], +"a02873.html#autotoc_md32":[9,2], +"a02873.html#autotoc_md33":[9,3], +"a02873.html#autotoc_md34":[9,4], +"a02873.html#autotoc_md35":[9,5], +"a02873.html#autotoc_md36":[9,6], +"a02873.html#autotoc_md37":[9,6,0], +"a02873.html#autotoc_md38":[9,6,1], +"a02873.html#autotoc_md39":[9,6,2], +"a02873.html#autotoc_md40":[9,7], +"a02873.html#autotoc_md41":[9,8], +"a02873.html#autotoc_md42":[9,8,0], +"a02873.html#autotoc_md43":[9,8,1], +"a02873.html#autotoc_md44":[9,9], +"a02873.html#autotoc_md45":[9,10], +"a02873.html#autotoc_md46":[9,11], +"a02874.html":[10], +"a02874.html#autotoc_md48":[10,0], +"a02874.html#autotoc_md49":[10,0,0], +"a02874.html#autotoc_md50":[10,0,1], +"a02875.html":[11], +"a02875.html#autotoc_md100":[11,11,1], +"a02875.html#autotoc_md101":[11,12], +"a02875.html#autotoc_md102":[11,12,0], +"a02875.html#autotoc_md103":[11,13], +"a02875.html#autotoc_md104":[11,13,0], +"a02875.html#autotoc_md105":[11,14], +"a02875.html#autotoc_md106":[11,14,0], +"a02875.html#autotoc_md107":[11,14,1], +"a02875.html#autotoc_md108":[11,15], +"a02875.html#autotoc_md109":[11,15,0], +"a02875.html#autotoc_md110":[11,15,1], +"a02875.html#autotoc_md111":[11,16], +"a02875.html#autotoc_md112":[11,16,0], +"a02875.html#autotoc_md113":[11,16,1], +"a02875.html#autotoc_md114":[11,17], +"a02875.html#autotoc_md115":[11,17,0], +"a02875.html#autotoc_md116":[11,17,1], +"a02875.html#autotoc_md117":[11,18], +"a02875.html#autotoc_md118":[11,18,0], +"a02875.html#autotoc_md119":[11,18,1], +"a02875.html#autotoc_md120":[11,18,2], +"a02875.html#autotoc_md121":[11,19], +"a02875.html#autotoc_md122":[11,19,0], +"a02875.html#autotoc_md123":[11,19,1], +"a02875.html#autotoc_md124":[11,20], +"a02875.html#autotoc_md125":[11,20,0], +"a02875.html#autotoc_md126":[11,20,1], +"a02875.html#autotoc_md127":[11,21], +"a02875.html#autotoc_md128":[11,21,0], +"a02875.html#autotoc_md129":[11,21,1], +"a02875.html#autotoc_md130":[11,22], +"a02875.html#autotoc_md131":[11,22,0], +"a02875.html#autotoc_md132":[11,22,1], +"a02875.html#autotoc_md133":[11,23], +"a02875.html#autotoc_md134":[11,23,0], +"a02875.html#autotoc_md135":[11,24], +"a02875.html#autotoc_md136":[11,24,0], +"a02875.html#autotoc_md137":[11,24,1], +"a02875.html#autotoc_md138":[11,25], +"a02875.html#autotoc_md139":[11,26], +"a02875.html#autotoc_md140":[11,27], +"a02875.html#autotoc_md141":[11,28], +"a02875.html#autotoc_md142":[11,29], +"a02875.html#autotoc_md143":[11,30], +"a02875.html#autotoc_md144":[11,31], +"a02875.html#autotoc_md145":[11,32], +"a02875.html#autotoc_md146":[11,33], +"a02875.html#autotoc_md147":[11,34], +"a02875.html#autotoc_md148":[11,35], +"a02875.html#autotoc_md149":[11,36], +"a02875.html#autotoc_md150":[11,37], +"a02875.html#autotoc_md151":[11,38], +"a02875.html#autotoc_md152":[11,39], +"a02875.html#autotoc_md153":[11,40], +"a02875.html#autotoc_md154":[11,41], +"a02875.html#autotoc_md155":[11,42], +"a02875.html#autotoc_md156":[11,43], +"a02875.html#autotoc_md62":[11,0], +"a02875.html#autotoc_md63":[11,0,0], +"a02875.html#autotoc_md64":[11,0,1], +"a02875.html#autotoc_md65":[11,1], +"a02875.html#autotoc_md66":[11,1,0], +"a02875.html#autotoc_md67":[11,1,1], +"a02875.html#autotoc_md68":[11,1,2], +"a02875.html#autotoc_md69":[11,2], +"a02875.html#autotoc_md70":[11,2,0], +"a02875.html#autotoc_md71":[11,2,1], +"a02875.html#autotoc_md72":[11,3], +"a02875.html#autotoc_md73":[11,3,0], +"a02875.html#autotoc_md74":[11,3,1], +"a02875.html#autotoc_md75":[11,4], +"a02875.html#autotoc_md76":[11,4,0], +"a02875.html#autotoc_md77":[11,4,1], +"a02875.html#autotoc_md78":[11,4,2], +"a02875.html#autotoc_md79":[11,5], +"a02875.html#autotoc_md80":[11,5,0], +"a02875.html#autotoc_md81":[11,5,1], +"a02875.html#autotoc_md82":[11,5,2], +"a02875.html#autotoc_md83":[11,6], +"a02875.html#autotoc_md84":[11,6,0], +"a02875.html#autotoc_md85":[11,6,1], +"a02875.html#autotoc_md86":[11,6,2], +"a02875.html#autotoc_md87":[11,7], +"a02875.html#autotoc_md88":[11,7,0], +"a02875.html#autotoc_md89":[11,7,1], +"a02875.html#autotoc_md90":[11,8], +"a02875.html#autotoc_md91":[11,8,0], +"a02875.html#autotoc_md92":[11,8,1], +"a02875.html#autotoc_md93":[11,8,2], +"a02875.html#autotoc_md94":[11,9], +"a02875.html#autotoc_md95":[11,9,0], +"a02875.html#autotoc_md96":[11,10], +"a02875.html#autotoc_md97":[11,10,0], +"a02875.html#autotoc_md98":[11,11], +"a02875.html#autotoc_md99":[11,11,0], +"a02876.html":[12], +"a02876.html#autotoc_md158":[12,0], +"a02876.html#autotoc_md159":[12,1], +"annotated.html":[16,0], +"classes.html":[16,1] }; diff --git a/pages.html b/pages.html index bcaf8b837..684b5efc1 100644 --- a/pages.html +++ b/pages.html @@ -31,7 +31,7 @@ Logo -
    CryptoAuthLib v3.7.5 +
    CryptoAuthLib v3.7.6
    Microchip CryptoAuthentication Library
    @@ -102,18 +102,19 @@ diff --git a/search/all_0.js b/search/all_0.js index d5a2d22d5..9cc93ed82 100644 --- a/search/all_0.js +++ b/search/all_0.js @@ -1,33 +1,33 @@ var searchData= [ - ['_5farray_5fto_5fcode_0',['_array_to_code',['../a01459.html#ac55af04b29df0650b502b9df1db36444',1,'cryptoauthlib::library']]], - ['_5fascii_5fkit_5fhost_5fcontext_1',['_ascii_kit_host_context',['../a01480.html',1,'']]], - ['_5fatcacert_5fconvert_5fbytes_2',['_atcacert_convert_bytes',['../a01453.html#aa9c8b1588cae90a37ef827d71e4ae909',1,'cryptoauthlib::atcacert']]], - ['_5fatcacert_5fconvert_5fenum_3',['_atcacert_convert_enum',['../a01453.html#acf013c955f2fd024a8669085dadbd3ba',1,'cryptoauthlib::atcacert']]], - ['_5fatcacustom_4',['_ATCACUSTOM',['../a02492.html',1,'cryptoauthlib::iface']]], - ['_5fatcahid_5',['_ATCAHID',['../a02484.html',1,'cryptoauthlib::iface']]], - ['_5fatcai2c_6',['_ATCAI2C',['../a02468.html',1,'cryptoauthlib::iface']]], - ['_5fatcaifaceparams_7',['_ATCAIfaceParams',['../a02496.html',1,'cryptoauthlib::iface']]], - ['_5fatcakit_8',['_ATCAKIT',['../a02488.html',1,'cryptoauthlib::iface']]], - ['_5fatcaspi_9',['_ATCASPI',['../a02476.html',1,'cryptoauthlib::iface']]], - ['_5fatcaswi_10',['_ATCASWI',['../a02472.html',1,'cryptoauthlib::iface']]], - ['_5fatcauart_11',['_ATCAUART',['../a02480.html',1,'cryptoauthlib::iface']]], - ['_5fcheck_5ftype_5frationality_12',['_check_type_rationality',['../a01459.html#a4b3b07664816ecd9b1e69aece27315ed',1,'cryptoauthlib::library']]], - ['_5fconvert_5fpointer_5fto_5flist_13',['_convert_pointer_to_list',['../a01459.html#a2a572a1c4153428ddf599aac1054a1c5',1,'cryptoauthlib::library']]], - ['_5fctype_5ffrom_5fdefinition_14',['_ctype_from_definition',['../a01459.html#af97b6ad66a6d4bb6a14631fa52059c0b',1,'cryptoauthlib::library']]], - ['_5fctypeiterator_15',['_CtypeIterator',['../a02508.html',1,'cryptoauthlib::library']]], - ['_5fdef_5fto_5ffield_16',['_def_to_field',['../a01459.html#af41036c1c577c3ea72112cb347ccaa7f',1,'cryptoauthlib::library']]], - ['_5fforce_5flocal_5flibrary_17',['_force_local_library',['../a01459.html#a2e119a638263f674b4441439cf472810',1,'cryptoauthlib::library']]], - ['_5fget_5fattribute_5ffrom_5fctypes_18',['_get_attribute_from_ctypes',['../a01459.html#af9181efd0fd60114f021c54a713f13af',1,'cryptoauthlib::library']]], - ['_5fget_5ffield_5fdefinition_19',['_get_field_definition',['../a01459.html#a4268b8eb517ac8eb32eabcb3bbeb9e75',1,'cryptoauthlib::library']]], - ['_5fiface_5fload_5fdefault_5fconfig_20',['_iface_load_default_config',['../a01458.html#a3f0aeae05c5278420c02156257845b1d',1,'cryptoauthlib::iface']]], - ['_5fis_5fpointer_21',['_is_pointer',['../a01459.html#a44bdab0afac36d18288aa73ad9b5d341',1,'cryptoauthlib::library']]], - ['_5fkit_5fhost_5fmap_5fentry_22',['_kit_host_map_entry',['../a01484.html',1,'']]], - ['_5fobj_5fto_5fcode_23',['_obj_to_code',['../a01459.html#af7258b81811d05efc7fdf6152fd10907',1,'cryptoauthlib::library']]], - ['_5fobject_5fdefinition_5fcode_24',['_object_definition_code',['../a01459.html#a1ce7de010f8d9ae4bc2428ea26fe495f',1,'cryptoauthlib::library']]], - ['_5fpointer_5fto_5fcode_25',['_pointer_to_code',['../a01459.html#a39c2c2660f89a924cd4eef1ae7d672a5',1,'cryptoauthlib::library']]], - ['_5fstructure_5fto_5fcode_26',['_structure_to_code',['../a01459.html#af5d2460ce51e3abef1c8065695ba0b63',1,'cryptoauthlib::library']]], - ['_5fstructure_5fto_5fstring_27',['_structure_to_string',['../a01459.html#a9f3720f901ce589dcfd623721b695938',1,'cryptoauthlib::library']]], - ['_5fto_5fcode_28',['_to_code',['../a01459.html#a321e7a3f55577a28ad2b2ed4f2ef132c',1,'cryptoauthlib::library']]], - ['_5fu_5faddress_29',['_U_Address',['../a02464.html',1,'cryptoauthlib::iface']]] + ['_5farray_5fto_5fcode_0',['_array_to_code',['../a01486.html#ac55af04b29df0650b502b9df1db36444',1,'cryptoauthlib::library']]], + ['_5fascii_5fkit_5fhost_5fcontext_1',['_ascii_kit_host_context',['../a01507.html',1,'']]], + ['_5fatcacert_5fconvert_5fbytes_2',['_atcacert_convert_bytes',['../a01480.html#aa9c8b1588cae90a37ef827d71e4ae909',1,'cryptoauthlib::atcacert']]], + ['_5fatcacert_5fconvert_5fenum_3',['_atcacert_convert_enum',['../a01480.html#acf013c955f2fd024a8669085dadbd3ba',1,'cryptoauthlib::atcacert']]], + ['_5fatcacustom_4',['_ATCACUSTOM',['../a02527.html',1,'cryptoauthlib::iface']]], + ['_5fatcahid_5',['_ATCAHID',['../a02519.html',1,'cryptoauthlib::iface']]], + ['_5fatcai2c_6',['_ATCAI2C',['../a02503.html',1,'cryptoauthlib::iface']]], + ['_5fatcaifaceparams_7',['_ATCAIfaceParams',['../a02531.html',1,'cryptoauthlib::iface']]], + ['_5fatcakit_8',['_ATCAKIT',['../a02523.html',1,'cryptoauthlib::iface']]], + ['_5fatcaspi_9',['_ATCASPI',['../a02511.html',1,'cryptoauthlib::iface']]], + ['_5fatcaswi_10',['_ATCASWI',['../a02507.html',1,'cryptoauthlib::iface']]], + ['_5fatcauart_11',['_ATCAUART',['../a02515.html',1,'cryptoauthlib::iface']]], + ['_5fcheck_5ftype_5frationality_12',['_check_type_rationality',['../a01486.html#a4b3b07664816ecd9b1e69aece27315ed',1,'cryptoauthlib::library']]], + ['_5fconvert_5fpointer_5fto_5flist_13',['_convert_pointer_to_list',['../a01486.html#a2a572a1c4153428ddf599aac1054a1c5',1,'cryptoauthlib::library']]], + ['_5fctype_5ffrom_5fdefinition_14',['_ctype_from_definition',['../a01486.html#af97b6ad66a6d4bb6a14631fa52059c0b',1,'cryptoauthlib::library']]], + ['_5fctypeiterator_15',['_CtypeIterator',['../a02543.html',1,'cryptoauthlib::library']]], + ['_5fdef_5fto_5ffield_16',['_def_to_field',['../a01486.html#af41036c1c577c3ea72112cb347ccaa7f',1,'cryptoauthlib::library']]], + ['_5fforce_5flocal_5flibrary_17',['_force_local_library',['../a01486.html#a2e119a638263f674b4441439cf472810',1,'cryptoauthlib::library']]], + ['_5fget_5fattribute_5ffrom_5fctypes_18',['_get_attribute_from_ctypes',['../a01486.html#af9181efd0fd60114f021c54a713f13af',1,'cryptoauthlib::library']]], + ['_5fget_5ffield_5fdefinition_19',['_get_field_definition',['../a01486.html#a4268b8eb517ac8eb32eabcb3bbeb9e75',1,'cryptoauthlib::library']]], + ['_5fiface_5fload_5fdefault_5fconfig_20',['_iface_load_default_config',['../a01485.html#a3f0aeae05c5278420c02156257845b1d',1,'cryptoauthlib::iface']]], + ['_5fis_5fpointer_21',['_is_pointer',['../a01486.html#a44bdab0afac36d18288aa73ad9b5d341',1,'cryptoauthlib::library']]], + ['_5fkit_5fhost_5fmap_5fentry_22',['_kit_host_map_entry',['../a01511.html',1,'']]], + ['_5fobj_5fto_5fcode_23',['_obj_to_code',['../a01486.html#af7258b81811d05efc7fdf6152fd10907',1,'cryptoauthlib::library']]], + ['_5fobject_5fdefinition_5fcode_24',['_object_definition_code',['../a01486.html#a1ce7de010f8d9ae4bc2428ea26fe495f',1,'cryptoauthlib::library']]], + ['_5fpointer_5fto_5fcode_25',['_pointer_to_code',['../a01486.html#a39c2c2660f89a924cd4eef1ae7d672a5',1,'cryptoauthlib::library']]], + ['_5fstructure_5fto_5fcode_26',['_structure_to_code',['../a01486.html#af5d2460ce51e3abef1c8065695ba0b63',1,'cryptoauthlib::library']]], + ['_5fstructure_5fto_5fstring_27',['_structure_to_string',['../a01486.html#a9f3720f901ce589dcfd623721b695938',1,'cryptoauthlib::library']]], + ['_5fto_5fcode_28',['_to_code',['../a01486.html#a321e7a3f55577a28ad2b2ed4f2ef132c',1,'cryptoauthlib::library']]], + ['_5fu_5faddress_29',['_U_Address',['../a02499.html',1,'cryptoauthlib::iface']]] ]; diff --git a/search/all_1.js b/search/all_1.js index 060f331f3..35d7b65c5 100644 --- a/search/all_1.js +++ b/search/all_1.js @@ -1,708 +1,717 @@ var searchData= [ - ['address_0',['address',['../a01516.html#a553439e2acc31fe3587a4c883e134b66',1,'ATCAIfaceCfg::address()'],['../a00257.html#af3f726014b044194def151079f1f2d89',1,'address(): atca_iface.h']]], - ['aes_5fcount_1',['AES_COUNT',['../a00350.html#a72cc5ecbdfa169d282776461ce48fda6',1,'calib_command.h']]], - ['aes_5fdata_5fsize_2',['AES_DATA_SIZE',['../a00350.html#a8cbce00b91b0ddfb3264c9c367a3699a',1,'calib_command.h']]], - ['aes_5finput_5fidx_3',['AES_INPUT_IDX',['../a00350.html#afabb67121c9c58fac9829287b55a2389',1,'calib_command.h']]], - ['aes_5fkeyid_5fidx_4',['AES_KEYID_IDX',['../a00350.html#a2809c87d994c49b53e039f752834fc97',1,'calib_command.h']]], - ['aes_5fmode_5fdecrypt_5',['AES_MODE_DECRYPT',['../a00350.html#a01cd269d08661e645b4caee850424130',1,'calib_command.h']]], - ['aes_5fmode_5fencrypt_6',['AES_MODE_ENCRYPT',['../a00350.html#a5ebee4d7d2d30a88ded25f9a6feecc52',1,'calib_command.h']]], - ['aes_5fmode_5fgfm_7',['AES_MODE_GFM',['../a00350.html#a34ec73cf7504b560883a5d192fe88793',1,'calib_command.h']]], - ['aes_5fmode_5fidx_8',['AES_MODE_IDX',['../a00350.html#a890e2e40916e88caf596cff43be8ab23',1,'calib_command.h']]], - ['aes_5fmode_5fkey_5fblock_5fmask_9',['AES_MODE_KEY_BLOCK_MASK',['../a00350.html#af54068dbf6ecb7bf8b1881caa0f3b89f',1,'calib_command.h']]], - ['aes_5fmode_5fkey_5fblock_5fpos_10',['AES_MODE_KEY_BLOCK_POS',['../a00350.html#abbbbd4cd4cc05e2ea023f059676aa37e',1,'calib_command.h']]], - ['aes_5fmode_5fmask_11',['AES_MODE_MASK',['../a00350.html#a7b2f5fb4edfbf4cb719aedbd7215b863',1,'calib_command.h']]], - ['aes_5fmode_5fop_5fmask_12',['AES_MODE_OP_MASK',['../a00350.html#a62c9e80674303aea5f92d76c92d30d2b',1,'calib_command.h']]], - ['aes_5frsp_5fsize_13',['AES_RSP_SIZE',['../a00350.html#ab24f797b7c19e899ef753d9901850e44',1,'calib_command.h']]], - ['aesenable_14',['AesEnable',['../a02244.html',1,'cryptoauthlib::device']]], + ['address_0',['address',['../a01539.html#a553439e2acc31fe3587a4c883e134b66',1,'ATCAIfaceCfg::address()'],['../a00263.html#af3f726014b044194def151079f1f2d89',1,'address(): atca_iface.h']]], + ['aes_5fcount_1',['AES_COUNT',['../a00356.html#a72cc5ecbdfa169d282776461ce48fda6',1,'calib_command.h']]], + ['aes_5fdata_5fsize_2',['AES_DATA_SIZE',['../a00356.html#a8cbce00b91b0ddfb3264c9c367a3699a',1,'calib_command.h']]], + ['aes_5finput_5fidx_3',['AES_INPUT_IDX',['../a00356.html#afabb67121c9c58fac9829287b55a2389',1,'calib_command.h']]], + ['aes_5fkeyid_5fidx_4',['AES_KEYID_IDX',['../a00356.html#a2809c87d994c49b53e039f752834fc97',1,'calib_command.h']]], + ['aes_5fmode_5fdecrypt_5',['AES_MODE_DECRYPT',['../a00356.html#a01cd269d08661e645b4caee850424130',1,'calib_command.h']]], + ['aes_5fmode_5fencrypt_6',['AES_MODE_ENCRYPT',['../a00356.html#a5ebee4d7d2d30a88ded25f9a6feecc52',1,'calib_command.h']]], + ['aes_5fmode_5fgfm_7',['AES_MODE_GFM',['../a00356.html#a34ec73cf7504b560883a5d192fe88793',1,'calib_command.h']]], + ['aes_5fmode_5fidx_8',['AES_MODE_IDX',['../a00356.html#a890e2e40916e88caf596cff43be8ab23',1,'calib_command.h']]], + ['aes_5fmode_5fkey_5fblock_5fmask_9',['AES_MODE_KEY_BLOCK_MASK',['../a00356.html#af54068dbf6ecb7bf8b1881caa0f3b89f',1,'calib_command.h']]], + ['aes_5fmode_5fkey_5fblock_5fpos_10',['AES_MODE_KEY_BLOCK_POS',['../a00356.html#abbbbd4cd4cc05e2ea023f059676aa37e',1,'calib_command.h']]], + ['aes_5fmode_5fmask_11',['AES_MODE_MASK',['../a00356.html#a7b2f5fb4edfbf4cb719aedbd7215b863',1,'calib_command.h']]], + ['aes_5fmode_5fop_5fmask_12',['AES_MODE_OP_MASK',['../a00356.html#a62c9e80674303aea5f92d76c92d30d2b',1,'calib_command.h']]], + ['aes_5frsp_5fsize_13',['AES_RSP_SIZE',['../a00356.html#ab24f797b7c19e899ef753d9901850e44',1,'calib_command.h']]], + ['aesenable_14',['AesEnable',['../a02279.html',1,'cryptoauthlib::device']]], ['api_5f206a_2ec_15',['api_206a.c',['../a00005.html',1,'']]], ['api_5f206a_2eh_16',['api_206a.h',['../a00008.html',1,'']]], - ['application_20support_17',['Application Support',['../a02828.html',1,'']]], + ['application_20support_17',['Application Support',['../a02863.html',1,'']]], ['ascii_5fkit_5fhost_2ec_18',['ascii_kit_host.c',['../a00017.html',1,'']]], ['ascii_5fkit_5fhost_2eh_19',['ascii_kit_host.h',['../a00020.html',1,'']]], - ['assertionfailure_20',['AssertionFailure',['../a02416.html',1,'cryptoauthlib::exceptions']]], - ['atca_5faddress_5fmask_21',['ATCA_ADDRESS_MASK',['../a00350.html#a579676fd500ded40bc49dc53231fa658',1,'calib_command.h']]], - ['atca_5faddress_5fmask_5fconfig_22',['ATCA_ADDRESS_MASK_CONFIG',['../a00350.html#a32d53cee52cd042a31f1adc934ad7a5a',1,'calib_command.h']]], - ['atca_5faddress_5fmask_5fotp_23',['ATCA_ADDRESS_MASK_OTP',['../a00350.html#a56e3f8d816e2068d80003fdee7d58763',1,'calib_command.h']]], - ['atca_5faes_24',['ATCA_AES',['../a00350.html#a4edf9367ffdc790e886166890fc814c1',1,'calib_command.h']]], - ['atca_5faes_5fcbc_5fctx_25',['atca_aes_cbc_ctx',['../a02144.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fcbcmac_5fctx_26',['atca_aes_cbcmac_ctx',['../a02168.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fccm_5fctx_27',['atca_aes_ccm_ctx',['../a02164.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fcmac_5fctx_28',['atca_aes_cmac_ctx',['../a02148.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fctr_5fctx_29',['atca_aes_ctr_ctx',['../a02152.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fgcm_5fctx_30',['atca_aes_gcm_ctx',['../a02160.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fgfm_5fsize_31',['ATCA_AES_GFM_SIZE',['../a00350.html#a6ce84aad51d25e05139f83ac9ca2b162',1,'calib_command.h']]], - ['atca_5faes_5fkey_5ftype_32',['ATCA_AES_KEY_TYPE',['../a00350.html#a8335b06c5f49c384e2c2f31861865a54',1,'calib_command.h']]], - ['atca_5falloc_5ffailure_33',['ATCA_ALLOC_FAILURE',['../a00263.html#aa17bd20787fa8dcde44983f25c00d80b',1,'atca_status.h']]], - ['atca_5fassert_5ffailure_34',['ATCA_ASSERT_FAILURE',['../a00263.html#abb19bd83c35f7194c30e913a3d4b4137',1,'atca_status.h']]], - ['atca_5fb283_5fkey_5ftype_35',['ATCA_B283_KEY_TYPE',['../a00350.html#a16f1550cc792fa205acef2106f2fcf54',1,'calib_command.h']]], - ['atca_5fbad_5fopcode_36',['ATCA_BAD_OPCODE',['../a00263.html#a3d393762ff34c052e12509e79d54415f',1,'atca_status.h']]], - ['atca_5fbad_5fparam_37',['ATCA_BAD_PARAM',['../a00263.html#a22c74ba87b45d105867f93c97b6dbe04',1,'atca_status.h']]], - ['atca_5fbasic_2ec_38',['atca_basic.c',['../a00221.html',1,'']]], - ['atca_5fbasic_2eh_39',['atca_basic.h',['../a00224.html',1,'']]], - ['atca_5fblock_5fsize_40',['ATCA_BLOCK_SIZE',['../a00350.html#aa0117f3d3f9a9ae65a3fab1e68b7caef',1,'calib_command.h']]], - ['atca_5fca2_5fconfig_5fsize_41',['ATCA_CA2_CONFIG_SIZE',['../a00350.html#a80e6b848030f81d90fbad16844105612',1,'calib_command.h']]], - ['atca_5fca2_5fconfig_5fslot_5fsize_42',['ATCA_CA2_CONFIG_SLOT_SIZE',['../a00350.html#a3bf3b2b477944691143db26f205e7d7f',1,'calib_command.h']]], - ['atca_5fcfgs_2ec_43',['atca_cfgs.c',['../a00227.html',1,'']]], - ['atca_5fcfgs_2eh_44',['atca_cfgs.h',['../a00230.html',1,'']]], - ['atca_5fcheck_5finvalid_5fmsg_45',['ATCA_CHECK_INVALID_MSG',['../a00800.html#a2593f45dcf42602b3c334dccb9c52395',1,'atca_config_check.h']]], - ['atca_5fcheck_5fmac_5fin_5fout_46',['atca_check_mac_in_out',['../a01752.html',1,'']]], - ['atca_5fcheck_5fmac_5fin_5fout_5ft_47',['atca_check_mac_in_out_t',['../a01447.html#ga62321bafeb0a9dd7c4ce657ece10109f',1,'atca_host.h']]], - ['atca_5fcheckmac_48',['ATCA_CHECKMAC',['../a00350.html#a1f9bb707789dc9194b06403113c9dfaf',1,'calib_command.h']]], - ['atca_5fcheckmac_5fverify_5ffailed_49',['ATCA_CHECKMAC_VERIFY_FAILED',['../a00263.html#afe80ac4fce5d1f8edd75a218362779ec',1,'atca_status.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fm0_50',['ATCA_CHIPMODE_CLOCK_DIV_M0',['../a00350.html#abe16121ea22ed08080997a2cfae1c125',1,'calib_command.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fm1_51',['ATCA_CHIPMODE_CLOCK_DIV_M1',['../a00350.html#aabaee03887c7e4403ac4936d9cde406e',1,'calib_command.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fm2_52',['ATCA_CHIPMODE_CLOCK_DIV_M2',['../a00350.html#a84f7e63b8711e799da259862b170fd75',1,'calib_command.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fmask_53',['ATCA_CHIPMODE_CLOCK_DIV_MASK',['../a00350.html#a09ab7fb893534775d506020643820939',1,'calib_command.h']]], - ['atca_5fchipmode_5fi2c_5faddress_5fflag_54',['ATCA_CHIPMODE_I2C_ADDRESS_FLAG',['../a00350.html#a74a13b4b6304a02b4e006901b6ac1de5',1,'calib_command.h']]], - ['atca_5fchipmode_5foffset_55',['ATCA_CHIPMODE_OFFSET',['../a00350.html#a6eaf90b702c122de71a18a9b2bd43ba7',1,'calib_command.h']]], - ['atca_5fchipmode_5fttl_5fenable_5fflag_56',['ATCA_CHIPMODE_TTL_ENABLE_FLAG',['../a00350.html#a10795619d6fb78965b7e78996261f6cd',1,'calib_command.h']]], - ['atca_5fchipmode_5fwatchdog_5flong_57',['ATCA_CHIPMODE_WATCHDOG_LONG',['../a00350.html#a9a089181beb38a1e5c5add58e96302bc',1,'calib_command.h']]], - ['atca_5fchipmode_5fwatchdog_5fmask_58',['ATCA_CHIPMODE_WATCHDOG_MASK',['../a00350.html#a814ad478cb05af339635633cbcd495b7',1,'calib_command.h']]], - ['atca_5fchipmode_5fwatchdog_5fshort_59',['ATCA_CHIPMODE_WATCHDOG_SHORT',['../a00350.html#ab2c08e9a862fce29e741ef2b75918a8e',1,'calib_command.h']]], - ['atca_5fcmd_5fsize_5fmax_60',['ATCA_CMD_SIZE_MAX',['../a00350.html#a3f7b636ed69136b5e5aa6d172cfd34e9',1,'calib_command.h']]], - ['atca_5fcmd_5fsize_5fmin_61',['ATCA_CMD_SIZE_MIN',['../a00350.html#ac978ae798bc2c020c7b8a2e5a258016e',1,'calib_command.h']]], - ['atca_5fcomm_5ffail_62',['ATCA_COMM_FAIL',['../a00263.html#ae9dd0fe8e48163ddf047629aeb8820e6',1,'atca_status.h']]], - ['atca_5fcompiler_2eh_63',['atca_compiler.h',['../a00233.html',1,'']]], - ['atca_5fconfig_5fcheck_2eh_64',['atca_config_check.h',['../a00800.html',1,'']]], - ['atca_5fcount_5fidx_65',['ATCA_COUNT_IDX',['../a00350.html#a0aac7fbfd425112b4b1e922876532a9e',1,'calib_command.h']]], - ['atca_5fcount_5fsize_66',['ATCA_COUNT_SIZE',['../a00350.html#ad410516c4b4eb448a333eb3ed1f7b288',1,'calib_command.h']]], - ['atca_5fcounter_67',['ATCA_COUNTER',['../a00350.html#a9599c4331857f1daa543a31fcce650fd',1,'calib_command.h']]], - ['atca_5fcrc_5fsize_68',['ATCA_CRC_SIZE',['../a00350.html#a276faf364bbb0e27819842111e08842f',1,'calib_command.h']]], - ['atca_5fcrypto_5fhw_5faes_2eh_69',['atca_crypto_hw_aes.h',['../a00446.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fcbc_2ec_70',['atca_crypto_hw_aes_cbc.c',['../a00449.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fcbcmac_2ec_71',['atca_crypto_hw_aes_cbcmac.c',['../a00452.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fccm_2ec_72',['atca_crypto_hw_aes_ccm.c',['../a00455.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fcmac_2ec_73',['atca_crypto_hw_aes_cmac.c',['../a00458.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fctr_2ec_74',['atca_crypto_hw_aes_ctr.c',['../a00461.html',1,'']]], - ['atca_5fcrypto_5fpad_2ec_75',['atca_crypto_pad.c',['../a00464.html',1,'']]], - ['atca_5fcrypto_5fpbkdf2_2ec_76',['atca_crypto_pbkdf2.c',['../a00467.html',1,'']]], - ['atca_5fcrypto_5fsha1_5fen_77',['ATCA_CRYPTO_SHA1_EN',['../a00491.html#a2e5e1b4f8da8d151569d6ff0133b43ec',1,'crypto_sw_config_check.h']]], - ['atca_5fcrypto_5fsha2_5fhmac_5fctr_5fen_78',['ATCA_CRYPTO_SHA2_HMAC_CTR_EN',['../a00491.html#a5a3020c4884811361247f771da67b9a5',1,'crypto_sw_config_check.h']]], - ['atca_5fcrypto_5fsha2_5fhmac_5fen_79',['ATCA_CRYPTO_SHA2_HMAC_EN',['../a00491.html#a18071ade62f5d4b39e444ca87548e31e',1,'crypto_sw_config_check.h']]], - ['atca_5fcrypto_5fsw_2eh_80',['atca_crypto_sw.h',['../a00470.html',1,'']]], - ['atca_5fcrypto_5fsw_5faes_5fgcm_2ec_81',['atca_crypto_sw_aes_gcm.c',['../a00473.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha1_2ec_82',['atca_crypto_sw_sha1.c',['../a00476.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha1_2eh_83',['atca_crypto_sw_sha1.h',['../a00479.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha2_2ec_84',['atca_crypto_sw_sha2.c',['../a00482.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha2_2eh_85',['atca_crypto_sw_sha2.h',['../a00485.html',1,'']]], - ['atca_5fcustom_5fiface_86',['ATCA_CUSTOM_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d',1,'atca_iface.h']]], - ['atca_5fdata_5fidx_87',['ATCA_DATA_IDX',['../a00350.html#a756539af7bcadf33dd3a9b2f60763f7a',1,'calib_command.h']]], - ['atca_5fdata_5fsize_88',['ATCA_DATA_SIZE',['../a00350.html#a0b96c7eee244d44c648245421745db12',1,'calib_command.h']]], - ['atca_5fdebug_2ec_89',['atca_debug.c',['../a00239.html',1,'']]], - ['atca_5fdecrypt_5fin_5fout_90',['atca_decrypt_in_out',['../a01748.html',1,'']]], - ['atca_5fdelay_5f10us_91',['atca_delay_10us',['../a01446.html#ga19891182689551cc3a88603135959351',1,'hal_sam_timer_asf.c']]], - ['atca_5fdelay_5fms_92',['atca_delay_ms',['../a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55',1,'hal_sam_timer_asf.c']]], - ['atca_5fdelay_5fus_93',['atca_delay_us',['../a01446.html#ga7598dfcd6dcac882836544d48356d02f',1,'hal_sam_timer_asf.c']]], - ['atca_5fdelete_94',['ATCA_DELETE',['../a00350.html#a69f659af2d835a38a13650b26a5e36d4',1,'calib_command.h']]], - ['atca_5fdelete_5fin_5fout_95',['atca_delete_in_out',['../a01776.html',1,'']]], - ['atca_5fdelete_5fin_5fout_5ft_96',['atca_delete_in_out_t',['../a01447.html#ga4ea861d041b787c766e9a19a0f11421c',1,'atca_host.h']]], - ['atca_5fderive_5fkey_97',['ATCA_DERIVE_KEY',['../a00350.html#ac9405ff4647b09a6d8ab7a4d8a091ee8',1,'calib_command.h']]], - ['atca_5fderive_5fkey_5fin_5fout_98',['atca_derive_key_in_out',['../a01740.html',1,'']]], - ['atca_5fderive_5fkey_5fmac_5fin_5fout_99',['atca_derive_key_mac_in_out',['../a01744.html',1,'']]], - ['atca_5fdevice_100',['atca_device',['../a01508.html',1,'']]], - ['atca_5fdevice_2ec_101',['atca_device.c',['../a00245.html',1,'']]], - ['atca_5fdevice_2eh_102',['atca_device.h',['../a00248.html',1,'']]], - ['atca_5fdevtypes_2eh_103',['atca_devtypes.h',['../a00803.html',1,'']]], - ['atca_5fdiversified_5fkey_5fin_5fout_104',['atca_diversified_key_in_out',['../a01732.html',1,'']]], - ['atca_5fdiversified_5fkey_5fin_5fout_5ft_105',['atca_diversified_key_in_out_t',['../a01447.html#gae9784404fbe619217879d5d12261c2b8',1,'atca_host.h']]], - ['atca_5fecc_5fconfig_5fsize_106',['ATCA_ECC_CONFIG_SIZE',['../a00350.html#ae8b9077022cc706947fdc8b45a573d81',1,'calib_command.h']]], - ['atca_5fecdh_107',['ATCA_ECDH',['../a00350.html#a06c1c02df3023d78b6b224060966460f',1,'calib_command.h']]], - ['atca_5fevp_5fctx_108',['atca_evp_ctx',['../a01812.html',1,'']]], - ['atca_5fexecution_5ferror_109',['ATCA_EXECUTION_ERROR',['../a00263.html#a889853cfab2a19aa22c00d0d19c87bcc',1,'atca_status.h']]], - ['atca_5ffunc_5ffail_110',['ATCA_FUNC_FAIL',['../a00263.html#a962730477dba3c48a84629c23a0e4a13',1,'atca_status.h']]], - ['atca_5fgen_5fdig_5fin_5fout_111',['atca_gen_dig_in_out',['../a01728.html',1,'']]], - ['atca_5fgen_5fdig_5fin_5fout_5ft_112',['atca_gen_dig_in_out_t',['../a01447.html#ga572abeaaabf22c386ebcba19b4f6236c',1,'atca_host.h']]], - ['atca_5fgen_5ffail_113',['ATCA_GEN_FAIL',['../a00263.html#aa1cd2b6470db000dd151f2a092f41edf',1,'atca_status.h']]], - ['atca_5fgen_5fkey_5fin_5fout_114',['atca_gen_key_in_out',['../a01764.html',1,'']]], - ['atca_5fgen_5fkey_5fin_5fout_5ft_115',['atca_gen_key_in_out_t',['../a01447.html#gada8cf14261301ec18458cbcbbe3d9b32',1,'atca_host.h']]], - ['atca_5fgendig_116',['ATCA_GENDIG',['../a00350.html#a37e24393c3e995d47a09ad962b6b83de',1,'calib_command.h']]], - ['atca_5fgenkey_117',['ATCA_GENKEY',['../a00350.html#a17f002359b157bee44a3c071a5a206db',1,'calib_command.h']]], - ['atca_5fhal_2ec_118',['atca_hal.c',['../a00512.html',1,'']]], - ['atca_5fhal_2eh_119',['atca_hal.h',['../a00515.html',1,'']]], - ['atca_5fhal_5fchange_5fbaud_120',['ATCA_HAL_CHANGE_BAUD',['../a01446.html#ga6c3c5f6f46d99838464be80796088baa',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5fdeselect_121',['ATCA_HAL_CONTROL_DESELECT',['../a01446.html#ga20f197858c01f040ca70cad589fcdabc',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5fdirection_122',['ATCA_HAL_CONTROL_DIRECTION',['../a01446.html#gae2eb00133330119dd9c73d6c5d9fd8dd',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5fidle_123',['ATCA_HAL_CONTROL_IDLE',['../a01446.html#ga3c8d531ea7b725debf75cbbd851f92a0',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5freset_124',['ATCA_HAL_CONTROL_RESET',['../a01446.html#ga1236f6d20d3f9402af1f5c3f1adc98e3',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5fselect_125',['ATCA_HAL_CONTROL_SELECT',['../a01446.html#gafb82c723c3d22673ebf65f89497d2e99',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5fsleep_126',['ATCA_HAL_CONTROL_SLEEP',['../a01446.html#gaa7f16d0fbd30e35a1a233166f6f59d06',1,'atca_hal.h']]], - ['atca_5fhal_5fcontrol_5fwake_127',['ATCA_HAL_CONTROL_WAKE',['../a01446.html#ga6e1cf53d19f95ce1bcee622e8176b8a9',1,'atca_hal.h']]], - ['atca_5fhal_5fflush_5fbuffer_128',['ATCA_HAL_FLUSH_BUFFER',['../a01446.html#ga61fae4f7c3849b77ae33e767e137032d',1,'atca_hal.h']]], - ['atca_5fhal_5fkit_5fphy_5ft_129',['atca_hal_kit_phy_t',['../a01652.html',1,'']]], - ['atca_5fhal_5flist_5fentry_5ft_130',['atca_hal_list_entry_t',['../a01648.html',1,'']]], - ['atca_5fhal_5fshm_5ft_131',['atca_hal_shm_t',['../a01656.html',1,'']]], - ['atca_5fhealth_5ftest_5ferror_132',['ATCA_HEALTH_TEST_ERROR',['../a00263.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5',1,'atca_status.h']]], - ['atca_5fhelpers_2ec_133',['atca_helpers.c',['../a00251.html',1,'']]], - ['atca_5fhelpers_2eh_134',['atca_helpers.h',['../a00254.html',1,'']]], - ['atca_5fhid_5fiface_135',['ATCA_HID_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1',1,'atca_iface.h']]], - ['atca_5fhmac_136',['ATCA_HMAC',['../a00350.html#a36122a4f84ec0c31330c3c0458304029',1,'calib_command.h']]], - ['atca_5fhmac_5fin_5fout_137',['atca_hmac_in_out',['../a01724.html',1,'']]], - ['atca_5fhmac_5fsha256_5fctx_138',['atca_hmac_sha256_ctx',['../a02172.html',1,'cryptoauthlib::atcab']]], - ['atca_5fhost_2ec_139',['atca_host.c',['../a00632.html',1,'']]], - ['atca_5fhost_2eh_140',['atca_host.h',['../a00635.html',1,'']]], - ['atca_5fhost_5fconfig_5fcheck_2eh_141',['atca_host_config_check.h',['../a00638.html',1,'']]], - ['atca_5fi2c_5fgpio_5fiface_142',['ATCA_I2C_GPIO_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e',1,'atca_iface.h']]], - ['atca_5fi2c_5fhost_5fs_143',['atca_i2c_host_s',['../a01668.html',1,'']]], - ['atca_5fi2c_5fiface_144',['ATCA_I2C_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb',1,'atca_iface.h']]], - ['atca_5fiface_145',['atca_iface',['../a01584.html',1,'']]], - ['atca_5fiface_2ec_146',['atca_iface.c',['../a00806.html',1,'']]], - ['atca_5fiface_2eh_147',['atca_iface.h',['../a00257.html',1,'']]], - ['atca_5fiface_5fget_5fretries_148',['atca_iface_get_retries',['../a01442.html#ga349718dea5d5b558766a31b7dcd7e811',1,'atca_iface.c']]], - ['atca_5fiface_5fget_5fwake_5fdelay_149',['atca_iface_get_wake_delay',['../a01442.html#ga128f54833b5ed2105dae417333e1d651',1,'atca_iface.c']]], - ['atca_5fiface_5fis_5fkit_150',['atca_iface_is_kit',['../a01442.html#gacb09a6fa845efade7d47796bead14d2c',1,'atca_iface.c']]], - ['atca_5fiface_5fis_5fswi_151',['atca_iface_is_swi',['../a01442.html#gad2276d5ebd02613fbeda8ae15b679d1e',1,'atca_iface.c']]], - ['atca_5fiface_5ft_152',['atca_iface_t',['../a01442.html#gaa9323be08c4d757019e9863d9a7fb6b1',1,'atca_iface.h']]], - ['atca_5finclude_5fdata_5fin_5fout_153',['atca_include_data_in_out',['../a01696.html',1,'']]], - ['atca_5finfo_154',['ATCA_INFO',['../a00350.html#a0e74f12b91b93e683f27fb8b4c0bfb2f',1,'calib_command.h']]], - ['atca_5finvalid_5fid_155',['ATCA_INVALID_ID',['../a00263.html#a9fd83db4807d846db39ffe92925dc939',1,'atca_status.h']]], - ['atca_5finvalid_5fsize_156',['ATCA_INVALID_SIZE',['../a00263.html#a90fced83678233feeb83da9e73579484',1,'atca_status.h']]], - ['atca_5fio_5fdecrypt_5fin_5fout_157',['atca_io_decrypt_in_out',['../a01704.html',1,'']]], - ['atca_5fjwt_2ec_158',['atca_jwt.c',['../a00641.html',1,'']]], - ['atca_5fjwt_2eh_159',['atca_jwt.h',['../a00644.html',1,'']]], - ['atca_5fk283_5fkey_5ftype_160',['ATCA_K283_KEY_TYPE',['../a00350.html#aac4e75cf70cf0cf946216ffefaf65525',1,'calib_command.h']]], - ['atca_5fkdf_161',['ATCA_KDF',['../a00350.html#a1c0632a1eabc73aaebcb4c7f265b8a00',1,'calib_command.h']]], - ['atca_5fkey_5fcount_162',['ATCA_KEY_COUNT',['../a00350.html#afa043ddb1952520a2bba28ac41a98f93',1,'calib_command.h']]], - ['atca_5fkey_5fid_5fmax_163',['ATCA_KEY_ID_MAX',['../a00350.html#a5da5f8005c1b2612b998afcbd823c716',1,'calib_command.h']]], - ['atca_5fkey_5fsize_164',['ATCA_KEY_SIZE',['../a00350.html#a66a410dde8f388c582495ba315284276',1,'calib_command.h']]], - ['atca_5fkit_5fiface_165',['ATCA_KIT_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9',1,'atca_iface.h']]], - ['atca_5flock_166',['ATCA_LOCK',['../a00350.html#ac227802d9a5680688ac4c2b23b38273c',1,'calib_command.h']]], - ['atca_5flocked_167',['ATCA_LOCKED',['../a00350.html#af397e129e4581162f91873358b5f1538',1,'calib_command.h']]], - ['atca_5fmac_168',['ATCA_MAC',['../a00350.html#aa0843d9ec7e246455483a1fb1fdf3a07',1,'calib_command.h']]], - ['atca_5fmac_5fin_5fout_169',['atca_mac_in_out',['../a01720.html',1,'']]], - ['atca_5fmbedtls_5fecdh_5fioprot_5fcb_170',['atca_mbedtls_ecdh_ioprot_cb',['../a01449.html#gaa35682dc98e33ce3d6fad1fc902cdff0',1,'atca_mbedtls_wrap.h']]], - ['atca_5fmbedtls_5fecdh_5fslot_5fcb_171',['atca_mbedtls_ecdh_slot_cb',['../a01449.html#ga98d684683ccecd3d56bdf5dc27ae999c',1,'atca_mbedtls_wrap.h']]], - ['atca_5fmbedtls_5feckey_5fs_172',['atca_mbedtls_eckey_s',['../a01808.html',1,'']]], - ['atca_5fmbedtls_5feckey_5ft_173',['atca_mbedtls_eckey_t',['../a01449.html#ga36d21431afe595eab1b7f7a2330ad727',1,'atca_mbedtls_wrap.h']]], - ['atca_5fmbedtls_5finterface_2eh_174',['atca_mbedtls_interface.h',['../a00653.html',1,'']]], - ['atca_5fmbedtls_5fpk_5finit_175',['atca_mbedtls_pk_init',['../a01449.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01449.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], - ['atca_5fmbedtls_5fpk_5finit_5fext_176',['atca_mbedtls_pk_init_ext',['../a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], - ['atca_5fmbedtls_5fwrap_2ec_177',['atca_mbedtls_wrap.c',['../a00656.html',1,'']]], - ['atca_5fmsg_5fsize_5fdelete_5fmac_178',['ATCA_MSG_SIZE_DELETE_MAC',['../a01447.html#ga15a78dd66644866b65cd5eda8b1a30d0',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fderive_5fkey_179',['ATCA_MSG_SIZE_DERIVE_KEY',['../a01447.html#ga1f445a11e4da099fec31efd43eadc234',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fderive_5fkey_5fmac_180',['ATCA_MSG_SIZE_DERIVE_KEY_MAC',['../a01447.html#ga4ef7d31c60616cf5177f415e32607d10',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fdiversified_5fkey_181',['ATCA_MSG_SIZE_DIVERSIFIED_KEY',['../a01447.html#gab2891a03e978d463823775bc1161a06e',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fencrypt_5fmac_182',['ATCA_MSG_SIZE_ENCRYPT_MAC',['../a01447.html#gafd8064c07a5f22cdb087c88e1b87c1be',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fgen_5fdig_183',['ATCA_MSG_SIZE_GEN_DIG',['../a01447.html#ga656372cab66beeb5a333e9a33e342017',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fmac_184',['ATCA_MSG_SIZE_MAC',['../a01447.html#ga2b5993f5b7254d8c6e50794824cf47b6',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fnonce_185',['ATCA_MSG_SIZE_NONCE',['../a01447.html#gaebdc2d83274268bb48fc45e87aef38af',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fprivwrite_5fmac_186',['ATCA_MSG_SIZE_PRIVWRITE_MAC',['../a01447.html#ga1039bfbe7e13d614814341bdee6afa7b',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fresponse_5fmac_187',['ATCA_MSG_SIZE_RESPONSE_MAC',['../a01447.html#ga6d3a4804abc8a467154d5abd744c0cea',1,'atca_host.h']]], - ['atca_5fmsg_5fsize_5fsession_5fkey_188',['ATCA_MSG_SIZE_SESSION_KEY',['../a01447.html#ga56b92d82ffddbd86c99107b12043f8db',1,'atca_host.h']]], - ['atca_5fno_5fdevices_189',['ATCA_NO_DEVICES',['../a00263.html#a652c8fbaca046330679929610433b987',1,'atca_status.h']]], - ['atca_5fnonce_190',['ATCA_NONCE',['../a00350.html#a232e4a2b3f189cc2c3594ce5f18da3aa',1,'calib_command.h']]], - ['atca_5fnonce_5fin_5fout_191',['atca_nonce_in_out',['../a01700.html',1,'']]], - ['atca_5fnot_5finitialized_192',['ATCA_NOT_INITIALIZED',['../a00263.html#ace96e4c864044972f87aef44e8d106ec',1,'atca_status.h']]], - ['atca_5fnot_5flocked_193',['ATCA_NOT_LOCKED',['../a00263.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3',1,'atca_status.h']]], - ['atca_5fopcode_5fidx_194',['ATCA_OPCODE_IDX',['../a00350.html#a15c3e02dd629f85722f4b74e61f3adca',1,'calib_command.h']]], - ['atca_5fopenssl_5finterface_2ec_195',['atca_openssl_interface.c',['../a00662.html',1,'']]], - ['atca_5fopenssl_5finterface_2eh_196',['atca_openssl_interface.h',['../a00665.html',1,'']]], - ['atca_5fotp_5fblock_5fmax_197',['ATCA_OTP_BLOCK_MAX',['../a00350.html#aa0eacfa4e596c3eb572753b7f5171276',1,'calib_command.h']]], - ['atca_5fotp_5fsize_198',['ATCA_OTP_SIZE',['../a00350.html#a4c05f7bd221df19c5c6ad1fe1f4709be',1,'calib_command.h']]], - ['atca_5fp256_5fkey_5ftype_199',['ATCA_P256_KEY_TYPE',['../a00350.html#a6e53cd97c61a185ca397ebed8dc3edcb',1,'calib_command.h']]], - ['atca_5fpacket_5foverhead_200',['ATCA_PACKET_OVERHEAD',['../a00350.html#aa569255bc251cd90cb2d0f6b710164bc',1,'calib_command.h']]], - ['atca_5fparam1_5fidx_201',['ATCA_PARAM1_IDX',['../a00350.html#a090c04fed9d153a97fb77195c7eb2f56',1,'calib_command.h']]], - ['atca_5fparam2_5fidx_202',['ATCA_PARAM2_IDX',['../a00350.html#a9e84a71fc7e3ba613779aeb8d740eb23',1,'calib_command.h']]], - ['atca_5fparity_5ferror_203',['ATCA_PARITY_ERROR',['../a00263.html#a2fefd4147dcde6662dc2bae6adb61237',1,'atca_status.h']]], - ['atca_5fparse_5ferror_204',['ATCA_PARSE_ERROR',['../a00263.html#a54b00d87ad3367d281df208661352063',1,'atca_status.h']]], - ['atca_5fpause_205',['ATCA_PAUSE',['../a00350.html#a7d786006183912073939b3f62075dd27',1,'calib_command.h']]], - ['atca_5fplatform_2eh_206',['atca_platform.h',['../a00260.html',1,'']]], - ['atca_5fplib_5fi2c_5fapi_207',['atca_plib_i2c_api',['../a01504.html',1,'']]], - ['atca_5fpriv_5fkey_5fsize_208',['ATCA_PRIV_KEY_SIZE',['../a00350.html#a3caf91c8e7ec183e0ad7b93dad9cb548',1,'calib_command.h']]], - ['atca_5fprivwrite_209',['ATCA_PRIVWRITE',['../a00350.html#a3171c7ab4447a2e752706bed1072e694',1,'calib_command.h']]], - ['atca_5fpub_5fkey_5fpad_210',['ATCA_PUB_KEY_PAD',['../a00350.html#ae52318f0263884ff3a3e67328138cc75',1,'calib_command.h']]], - ['atca_5fpub_5fkey_5fsize_211',['ATCA_PUB_KEY_SIZE',['../a00350.html#a07089e8e8b1aa335ddfd37e591f64ebb',1,'calib_command.h']]], - ['atca_5frandom_212',['ATCA_RANDOM',['../a00350.html#ace94188e9d741a9b44616474b633064f',1,'calib_command.h']]], - ['atca_5fread_213',['ATCA_READ',['../a00350.html#a8760372110d92cea3570a5720db05de2',1,'calib_command.h']]], - ['atca_5fresp_5fmac_5fin_5fout_214',['atca_resp_mac_in_out',['../a01756.html',1,'']]], - ['atca_5fresp_5fmac_5fin_5fout_5ft_215',['atca_resp_mac_in_out_t',['../a01447.html#gad2bbb95a1e12c8167ce68884dcf77a4e',1,'atca_host.h']]], - ['atca_5fresync_5fwith_5fwakeup_216',['ATCA_RESYNC_WITH_WAKEUP',['../a00263.html#a6c467c51b23ea961e1aabd6e98644d47',1,'atca_status.h']]], - ['atca_5frsp_5fdata_5fidx_217',['ATCA_RSP_DATA_IDX',['../a00350.html#abaaa930c2275599fcc3d83cfc02bfafe',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f16_218',['ATCA_RSP_SIZE_16',['../a00350.html#a0be09b502137446daedc43f1d3e85f86',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f32_219',['ATCA_RSP_SIZE_32',['../a00350.html#afd812ab5b70a92a4d3a420c4f7106ac5',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f4_220',['ATCA_RSP_SIZE_4',['../a00350.html#a15cc6f16cdb8f11b60981af7c3b15ef8',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f64_221',['ATCA_RSP_SIZE_64',['../a00350.html#a5b7ad7c3c75639352af5ad3b1298500c',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f72_222',['ATCA_RSP_SIZE_72',['../a00350.html#a67ca82b396385dd18790b48d731dfe15',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5fmax_223',['ATCA_RSP_SIZE_MAX',['../a00350.html#a908aece3a9501eb14a70c2b24a3e4089',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5fmin_224',['ATCA_RSP_SIZE_MIN',['../a00350.html#a0c738f2cc7bf063582c34188f85ddc3c',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5fval_225',['ATCA_RSP_SIZE_VAL',['../a00350.html#a882f14cac02df8282ccad2a43afc8a23',1,'calib_command.h']]], - ['atca_5frx_5fcrc_5ferror_226',['ATCA_RX_CRC_ERROR',['../a00263.html#aef8e0056fbad0bd33fcb2213b2f3ae49',1,'atca_status.h']]], - ['atca_5frx_5ffail_227',['ATCA_RX_FAIL',['../a00263.html#a8aa6f2e22841fba09b78262c9ce7a728',1,'atca_status.h']]], - ['atca_5frx_5fno_5fresponse_228',['ATCA_RX_NO_RESPONSE',['../a00263.html#a6a0c600725ed81640f2e39c88c864e1c',1,'atca_status.h']]], - ['atca_5frx_5ftimeout_229',['ATCA_RX_TIMEOUT',['../a00263.html#ab5bbd989a822d35a59c9eb6258bf26fc',1,'atca_status.h']]], - ['atca_5fsecureboot_230',['ATCA_SECUREBOOT',['../a00350.html#af4aab184dc60e2de854994d26d57dfde',1,'calib_command.h']]], - ['atca_5fsecureboot_5fenc_5fin_5fout_231',['atca_secureboot_enc_in_out',['../a01712.html',1,'']]], - ['atca_5fsecureboot_5fmac_5fin_5fout_232',['atca_secureboot_mac_in_out',['../a01716.html',1,'']]], - ['atca_5fselftest_233',['ATCA_SELFTEST',['../a00350.html#acbec80dc1b5f24d3013c2a9b06c11bdc',1,'calib_command.h']]], - ['atca_5fserial_5fnum_5fsize_234',['ATCA_SERIAL_NUM_SIZE',['../a00350.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0',1,'calib_command.h']]], - ['atca_5fsession_5fkey_5fin_5fout_235',['atca_session_key_in_out',['../a01772.html',1,'']]], - ['atca_5fsession_5fkey_5fin_5fout_5ft_236',['atca_session_key_in_out_t',['../a01447.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e',1,'atca_host.h']]], - ['atca_5fsha_237',['ATCA_SHA',['../a00350.html#a8e5f11692a8a23e1410d9b5ce8bebc2b',1,'calib_command.h']]], - ['atca_5fsha256_5fblock_5fsize_238',['ATCA_SHA256_BLOCK_SIZE',['../a00506.html#a85e0a506bd6fdae6ce32d5df3a48ac1c',1,'cryptoauthlib.h']]], - ['atca_5fsha256_5fctx_239',['atca_sha256_ctx',['../a01616.html',1,'atca_sha256_ctx'],['../a02156.html',1,'cryptoauthlib.atcab.atca_sha256_ctx']]], - ['atca_5fsha_5fconfig_5fsize_240',['ATCA_SHA_CONFIG_SIZE',['../a00350.html#a1887d11853092541df18c2a04fb6b87a',1,'calib_command.h']]], - ['atca_5fsha_5fkey_5ftype_241',['ATCA_SHA_KEY_TYPE',['../a00350.html#ad325831ee2326885795706efd7b3b00e',1,'calib_command.h']]], - ['atca_5fsha_5fsupport_242',['ATCA_SHA_SUPPORT',['../a00800.html#afe8da91949841c137ea573c327bff267',1,'atca_config_check.h']]], - ['atca_5fsig_5fsize_243',['ATCA_SIG_SIZE',['../a00350.html#a56448f81a8d04c6871b3422c496bf8b6',1,'calib_command.h']]], - ['atca_5fsign_244',['ATCA_SIGN',['../a00350.html#a516dbf4bbd2c4b366e0306890d0bca56',1,'calib_command.h']]], - ['atca_5fsign_5finternal_5fin_5fout_245',['atca_sign_internal_in_out',['../a01768.html',1,'']]], - ['atca_5fsign_5finternal_5fin_5fout_5ft_246',['atca_sign_internal_in_out_t',['../a01447.html#ga1fdcaf886974acc1fcdfc3bace49b700',1,'atca_host.h']]], - ['atca_5fsmall_5fbuffer_247',['ATCA_SMALL_BUFFER',['../a00263.html#ab1a2ea3166875b26f91e82767d6e3e1a',1,'atca_status.h']]], - ['atca_5fspi_5fgpio_5fiface_248',['ATCA_SPI_GPIO_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb',1,'atca_iface.h']]], - ['atca_5fspi_5fhost_5fs_249',['atca_spi_host_s',['../a01672.html',1,'']]], - ['atca_5fspi_5fiface_250',['ATCA_SPI_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7',1,'atca_iface.h']]], - ['atca_5fstatus_2eh_251',['atca_status.h',['../a00263.html',1,'']]], - ['atca_5fstatus_5fcrc_252',['ATCA_STATUS_CRC',['../a00263.html#a9198f13b90df739a1ca20f101beccfbb',1,'atca_status.h']]], - ['atca_5fstatus_5fecc_253',['ATCA_STATUS_ECC',['../a00263.html#ad878d8797ca33784da8e968cbf17a722',1,'atca_status.h']]], - ['atca_5fstatus_5fselftest_5ferror_254',['ATCA_STATUS_SELFTEST_ERROR',['../a00263.html#a3319805e96477b7b89da0f4a69ef1a83',1,'atca_status.h']]], - ['atca_5fstatus_5funknown_255',['ATCA_STATUS_UNKNOWN',['../a00263.html#a884d88ac0c809d0801ca4dbe24dac986',1,'atca_status.h']]], - ['atca_5fsuccess_256',['ATCA_SUCCESS',['../a00263.html#ab132d69c7f94de708ffef02b6dc69d27',1,'atca_status.h']]], - ['atca_5fswi_5fgpio_5fiface_257',['ATCA_SWI_GPIO_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2',1,'atca_iface.h']]], - ['atca_5fswi_5fiface_258',['ATCA_SWI_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26',1,'atca_iface.h']]], - ['atca_5fswi_5fwake_5fword_5faddr_259',['ATCA_SWI_WAKE_WORD_ADDR',['../a00587.html#a35e9d98d207f17ebac66dc86e29a6464',1,'hal_swi_gpio.h']]], - ['atca_5ftemp_5fkey_260',['atca_temp_key',['../a01692.html',1,'']]], - ['atca_5ftemp_5fkey_5ft_261',['atca_temp_key_t',['../a01447.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe',1,'atca_host.h']]], - ['atca_5ftempkey_5fkeyid_262',['ATCA_TEMPKEY_KEYID',['../a00350.html#a988fff8295c1914217b8543b614f556c',1,'calib_command.h']]], - ['atca_5ftimeout_263',['ATCA_TIMEOUT',['../a00263.html#afc6b7767c53326f3520ec83ac02df679',1,'atca_status.h']]], - ['atca_5ftoo_5fmany_5fcomm_5fretries_264',['ATCA_TOO_MANY_COMM_RETRIES',['../a00263.html#ad4cd022abf0e71d3605a9fc18e8a1ea6',1,'atca_status.h']]], - ['atca_5ftx_5ffail_265',['ATCA_TX_FAIL',['../a00263.html#a149bb02116700288df316d5ab391f5d3',1,'atca_status.h']]], - ['atca_5ftx_5ftimeout_266',['ATCA_TX_TIMEOUT',['../a00263.html#a7b4c194a6a86ffadc703b841280778c3',1,'atca_status.h']]], - ['atca_5fuart_5fhost_5fs_267',['atca_uart_host_s',['../a01676.html',1,'']]], - ['atca_5fuart_5fiface_268',['ATCA_UART_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d',1,'atca_iface.h']]], - ['atca_5funimplemented_269',['ATCA_UNIMPLEMENTED',['../a00263.html#ad80a997b8786774af268692c936f90d9',1,'atca_status.h']]], - ['atca_5funlocked_270',['ATCA_UNLOCKED',['../a00350.html#a54155caf79f004ccf0a875cf3a0ef05b',1,'calib_command.h']]], - ['atca_5funused_5fvar_5fcheck_271',['ATCA_UNUSED_VAR_CHECK',['../a00800.html#a987213394bc9a51f05c4a5f1b1de69f8',1,'atca_config_check.h']]], - ['atca_5fupdate_5fextra_272',['ATCA_UPDATE_EXTRA',['../a00350.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2',1,'calib_command.h']]], - ['atca_5fuse_5fatcab_5ffunctions_273',['ATCA_USE_ATCAB_FUNCTIONS',['../a00800.html#ab97062ef8dcf4e46b403d9c22aeb22c9',1,'atca_config_check.h']]], - ['atca_5fuse_5fflags_5fconsumed_274',['ATCA_USE_FLAGS_CONSUMED',['../a00263.html#a4dbc1891be5e77d93690554e7bb2aa8d',1,'atca_status.h']]], - ['atca_5futils_5fsizes_2ec_275',['atca_utils_sizes.c',['../a00266.html',1,'']]], - ['atca_5fverify_276',['ATCA_VERIFY',['../a00350.html#a8e357a6e926176155fe47aba97d915fb',1,'calib_command.h']]], - ['atca_5fverify_5fin_5fout_277',['atca_verify_in_out',['../a01760.html',1,'']]], - ['atca_5fverify_5fmac_278',['atca_verify_mac',['../a01708.html',1,'']]], - ['atca_5fversion_2eh_279',['atca_version.h',['../a00269.html',1,'']]], - ['atca_5fwake_5ffailed_280',['ATCA_WAKE_FAILED',['../a00263.html#a796b7e7bc096ae19c65b701d87b8718f',1,'atca_status.h']]], - ['atca_5fwake_5fsuccess_281',['ATCA_WAKE_SUCCESS',['../a00263.html#afb58269e38e4025d4e6620c4d1202ee4',1,'atca_status.h']]], - ['atca_5fwolfssl_5finterface_2ec_282',['atca_wolfssl_interface.c',['../a00791.html',1,'']]], - ['atca_5fwolfssl_5finterface_2eh_283',['atca_wolfssl_interface.h',['../a00794.html',1,'']]], - ['atca_5fwolfssl_5finternal_2eh_284',['atca_wolfssl_internal.h',['../a00797.html',1,'']]], - ['atca_5fword_5fsize_285',['ATCA_WORD_SIZE',['../a00350.html#a555bdf8fa32d4d47577f7748ca928389',1,'calib_command.h']]], - ['atca_5fwrite_286',['ATCA_WRITE',['../a00350.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771',1,'calib_command.h']]], - ['atca_5fwrite_5fmac_5fin_5fout_287',['atca_write_mac_in_out',['../a01736.html',1,'']]], - ['atca_5fwrite_5fmac_5fin_5fout_5ft_288',['atca_write_mac_in_out_t',['../a01447.html#gac077314e00956519884e609b44b9cbce',1,'atca_host.h']]], - ['atca_5fzone_5fencrypted_289',['ATCA_ZONE_ENCRYPTED',['../a00350.html#a167bc588244395e98461008070fee8f3',1,'calib_command.h']]], - ['atca_5fzone_5fmask_290',['ATCA_ZONE_MASK',['../a00350.html#a1d6d2f2713e845ec3b3bf465025d6858',1,'calib_command.h']]], - ['atca_5fzone_5freadwrite_5f32_291',['ATCA_ZONE_READWRITE_32',['../a00350.html#aa32b46f2c058ee54377d0cbef1ec8764',1,'calib_command.h']]], - ['atcab_5faes_292',['atcab_aes',['../a01439.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(): atca_basic.c'],['../a01452.html#aa6f667c9ff033cb3e1d8bd1565e080aa',1,'cryptoauthlib.atcab.atcab_aes()'],['../a01439.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(): atca_basic.c']]], - ['atcab_5faes_5fcbc_5fdecrypt_5fblock_293',['atcab_aes_cbc_decrypt_block',['../a01452.html#a9a7024193b07e7c98690873e7452f0ad',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbc_5fdecrypt_5fen_294',['ATCAB_AES_CBC_DECRYPT_EN',['../a00488.html#a23ae19deaff29f2796c4981962ca9b55',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fcbc_5fencrypt_5fblock_295',['atcab_aes_cbc_encrypt_block',['../a01452.html#a7e0bc033c11e689570f7aa9431d49d9c',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbc_5fencrypt_5fen_296',['ATCAB_AES_CBC_ENCRYPT_EN',['../a00488.html#ac2eb887016e59054e626341175577669',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fcbc_5finit_297',['atcab_aes_cbc_init',['../a01452.html#a837da37427357c91aba40c6becbebfeb',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbcmac_5fen_298',['ATCAB_AES_CBCMAC_EN',['../a00488.html#a1996786ea061102926ef0ba52a510bfd',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fcbcmac_5ffinish_299',['atcab_aes_cbcmac_finish',['../a01452.html#a1c364ea983169ac73197713db23f9a52',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbcmac_5finit_300',['atcab_aes_cbcmac_init',['../a01452.html#aa612658a288c6a5cca103e5d3965390c',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbcmac_5fupdate_301',['atcab_aes_cbcmac_update',['../a01452.html#af58b97dc722402be6c65e226a0dd26ae',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5faad_5ffinish_302',['atcab_aes_ccm_aad_finish',['../a01452.html#a99d19bf27efa04318480a3e81f668ae8',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5faad_5fupdate_303',['atcab_aes_ccm_aad_update',['../a01452.html#af5502348939c1db2fdafde42603266f3',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fdecrypt_5ffinish_304',['atcab_aes_ccm_decrypt_finish',['../a01452.html#aa641b1946cfcb33ac7e353a6ca7285ab',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fdecrypt_5fupdate_305',['atcab_aes_ccm_decrypt_update',['../a01452.html#ab78cfabfa12d891830c1147bbc61a2e0',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fen_306',['ATCAB_AES_CCM_EN',['../a00488.html#ae638244ab3ba72e50b974f763e2abc42',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fccm_5fencrypt_5ffinish_307',['atcab_aes_ccm_encrypt_finish',['../a01452.html#ac0399ab5a8ab2e7682441241fcc98914',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fencrypt_5fupdate_308',['atcab_aes_ccm_encrypt_update',['../a01452.html#a78d906cc88e8efcb280a0869ca7afaf2',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5finit_309',['atcab_aes_ccm_init',['../a01452.html#ab5ef9981f825f3fe5beb84b4d664f321',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5finit_5frand_310',['atcab_aes_ccm_init_rand',['../a01452.html#af34551008cb67c907488a9403da495ad',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcmac_5ffinish_311',['atcab_aes_cmac_finish',['../a01452.html#aeccd1e361da41854a45068507ccd9f33',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcmac_5finit_312',['atcab_aes_cmac_init',['../a01452.html#a1b778f3fa3c6d459075500f5248d09c6',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcmac_5fupdate_313',['atcab_aes_cmac_update',['../a01452.html#aefa4891ccc2a860029958f2e80bdef87',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5fdecrypt_5fblock_314',['atcab_aes_ctr_decrypt_block',['../a01452.html#a80a2b3fe53dc4caedad79221b05bbdf7',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5fen_315',['ATCAB_AES_CTR_EN',['../a00488.html#a6569901e92e84b0b448794f8a89d1d9e',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fctr_5fencrypt_5fblock_316',['atcab_aes_ctr_encrypt_block',['../a01452.html#a1a3dce72fa3192b1ca917025b8ff4736',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5finit_317',['atcab_aes_ctr_init',['../a01452.html#aec84bbc3cc86b716a2996069d5d227c0',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5finit_5frand_318',['atcab_aes_ctr_init_rand',['../a01452.html#a87ec2b9cbb53f9f38df252d6b7508881',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5frand_5fiv_5fen_319',['ATCAB_AES_CTR_RAND_IV_EN',['../a00488.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fdecrypt_320',['atcab_aes_decrypt',['../a01439.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(): atca_basic.c'],['../a01452.html#ac67f610115ce611e94d05a87ada77f66',1,'cryptoauthlib.atcab.atcab_aes_decrypt()'],['../a01439.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c']]], - ['atcab_5faes_5fdecrypt_5fext_321',['atcab_aes_decrypt_ext',['../a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c']]], - ['atcab_5faes_5fencrypt_322',['atcab_aes_encrypt',['../a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01452.html#a544871498712993b7ceb7a0134beac55',1,'cryptoauthlib.atcab.atcab_aes_encrypt()']]], - ['atcab_5faes_5fencrypt_5fext_323',['atcab_aes_encrypt_ext',['../a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fextras_5fen_324',['ATCAB_AES_EXTRAS_EN',['../a00488.html#a28cb83338bbbc858be983299cede3ba9',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fgcm_5faad_5fupdate_325',['atcab_aes_gcm_aad_update',['../a01439.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01439.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01452.html#a5b7cd7ecd0b2526f1daa7c60ea39c581',1,'cryptoauthlib.atcab.atcab_aes_gcm_aad_update()']]], - ['atcab_5faes_5fgcm_5faad_5fupdate_5fext_326',['atcab_aes_gcm_aad_update_ext',['../a01439.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01439.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_327',['atcab_aes_gcm_decrypt_finish',['../a01452.html#aeae81b172cf9a1b8a85052b9129d9dd1',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_finish()'],['../a01439.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01439.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_5fext_328',['atcab_aes_gcm_decrypt_finish_ext',['../a01439.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01439.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_329',['atcab_aes_gcm_decrypt_update',['../a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01452.html#a5af363a108f86f636af7581097b396cd',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_update()']]], - ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_5fext_330',['atcab_aes_gcm_decrypt_update_ext',['../a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fencrypt_5ffinish_331',['atcab_aes_gcm_encrypt_finish',['../a01439.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01439.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01452.html#ae3f487577cbb7e66ccb39c8d6ea9a358',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_finish()']]], - ['atcab_5faes_5fgcm_5fencrypt_5ffinish_5fext_332',['atcab_aes_gcm_encrypt_finish_ext',['../a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fencrypt_5fupdate_333',['atcab_aes_gcm_encrypt_update',['../a01452.html#a0e5230bd79eba76c6350b724d5297310',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_update()'],['../a01439.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01439.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fencrypt_5fupdate_5fext_334',['atcab_aes_gcm_encrypt_update_ext',['../a01439.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01439.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5finit_335',['atcab_aes_gcm_init',['../a01439.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01439.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01452.html#a29a3eabf3e5e353e52dd52c69ea69ec4',1,'cryptoauthlib.atcab.atcab_aes_gcm_init()']]], - ['atcab_5faes_5fgcm_5finit_5fext_336',['atcab_aes_gcm_init_ext',['../a01439.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01439.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c']]], - ['atcab_5faes_5fgcm_5finit_5frand_337',['atcab_aes_gcm_init_rand',['../a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c'],['../a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c'],['../a01452.html#a4a9dc88e03b9e5066ff28b8518196ce7',1,'cryptoauthlib.atcab.atcab_aes_gcm_init_rand()']]], - ['atcab_5faes_5fgfm_338',['atcab_aes_gfm',['../a01439.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(const uint8_t *h, const uint8_t *input, uint8_t *output): atca_basic.c'],['../a01439.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(const uint8_t *h, const uint8_t *input, uint8_t *output): atca_basic.c'],['../a01452.html#ad9bd7c6cc3e26cca5865dda3c02bcce2',1,'cryptoauthlib.atcab.atcab_aes_gfm()']]], - ['atcab_5faes_5fgfm_5fen_339',['ATCAB_AES_GFM_EN',['../a00800.html#a31c9145169cb4a4e3be509ad04a40b04',1,'atca_config_check.h']]], - ['atcab_5faes_5fupdate_5fen_340',['ATCAB_AES_UPDATE_EN',['../a00488.html#af273e717452d3e5295d20197b4615ed0',1,'crypto_hw_config_check.h']]], - ['atcab_5fbase64decode_341',['atcab_base64decode',['../a00251.html#a6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c'],['../a01439.html#ga6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c']]], - ['atcab_5fbase64decode_5f_342',['atcab_base64decode_',['../a00251.html#a55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c'],['../a01439.html#ga55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c']]], - ['atcab_5fbase64encode_343',['atcab_base64encode',['../a00251.html#a3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c'],['../a01439.html#ga3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c']]], - ['atcab_5fbase64encode_5f_344',['atcab_base64encode_',['../a00251.html#aeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c'],['../a01439.html#gaeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c']]], - ['atcab_5fbin2hex_345',['atcab_bin2hex',['../a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c'],['../a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c']]], - ['atcab_5fbin2hex_5f_346',['atcab_bin2hex_',['../a00251.html#a40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c'],['../a01439.html#ga40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c']]], - ['atcab_5fchallenge_347',['atcab_challenge',['../a01439.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01439.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01452.html#a40bc5aa6ac58d01d4ee7888dddd884bb',1,'cryptoauthlib.atcab.atcab_challenge()']]], - ['atcab_5fchallenge_5fseed_5fupdate_348',['atcab_challenge_seed_update',['../a01439.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(): atca_basic.c'],['../a01452.html#a0cefee590d648d724f343488569c10df',1,'cryptoauthlib.atcab.atcab_challenge_seed_update()'],['../a01439.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fcheckmac_349',['atcab_checkmac',['../a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01452.html#aba58d5a7562b69d72c33cfda82c2b580',1,'cryptoauthlib.atcab.atcab_checkmac()']]], - ['atcab_5fcheckmac_5fwith_5fresponse_5fmac_350',['atcab_checkmac_with_response_mac',['../a01439.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01439.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c']]], - ['atcab_5fcmp_5fconfig_5fzone_351',['atcab_cmp_config_zone',['../a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c'],['../a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c'],['../a01452.html#af312843ce780c0062f9067c182ad2db6',1,'cryptoauthlib.atcab.atcab_cmp_config_zone()']]], - ['atcab_5fcounter_352',['atcab_counter',['../a01439.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01439.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01452.html#ade607e2a5b08d77e4559161dfac0c0e8',1,'cryptoauthlib.atcab.atcab_counter()']]], - ['atcab_5fcounter_5fincrement_353',['atcab_counter_increment',['../a01439.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(): atca_basic.c'],['../a01452.html#a216d7fa1d484d6a4ecf55d7886c355ef',1,'cryptoauthlib.atcab.atcab_counter_increment()'],['../a01439.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c']]], - ['atcab_5fcounter_5fread_354',['atcab_counter_read',['../a01439.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01439.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01452.html#ae40c31b557e83cd4c590288082d07d6e',1,'cryptoauthlib.atcab.atcab_counter_read()']]], - ['atcab_5fderivekey_355',['atcab_derivekey',['../a01439.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01439.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01452.html#af411b3996170b6dd0e90dc999c896d19',1,'cryptoauthlib.atcab.atcab_derivekey()']]], - ['atcab_5fderivekey_5fext_356',['atcab_derivekey_ext',['../a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c']]], - ['atcab_5fecdh_357',['atcab_ecdh',['../a01439.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01439.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01452.html#a8e85d04188b3d10cccaf6641bf5753fe',1,'cryptoauthlib.atcab.atcab_ecdh(key_id, public_key, pms)']]], - ['atcab_5fecdh_5fbase_358',['atcab_ecdh_base',['../a01452.html#a84c655ca82b1c0ed968be7d63be4a5f2',1,'cryptoauthlib.atcab.atcab_ecdh_base()'],['../a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce): atca_basic.c'],['../a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce): atca_basic.c']]], - ['atcab_5fecdh_5fenc_359',['atcab_ecdh_enc',['../a01439.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01452.html#ae3505ac892b47a7384a9ec95338bee22',1,'cryptoauthlib.atcab.atcab_ecdh_enc()']]], - ['atcab_5fecdh_5fioenc_360',['atcab_ecdh_ioenc',['../a01439.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01439.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01452.html#adefdce788a6ef35250f5b1c139454b64',1,'cryptoauthlib.atcab.atcab_ecdh_ioenc()']]], - ['atcab_5fecdh_5ftempkey_361',['atcab_ecdh_tempkey',['../a01439.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01439.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01452.html#a3a1b9396c4a6aec1fc32839fe681f3a9',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey()']]], - ['atcab_5fecdh_5ftempkey_5fioenc_362',['atcab_ecdh_tempkey_ioenc',['../a01439.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01439.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01452.html#ac6eb9270fa4c963d6ebba79aea1ddc4b',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey_ioenc(public_key, pms, io_key)']]], - ['atcab_5fgendig_363',['atcab_gendig',['../a01452.html#a8b0381ac0e872d25df0373d9cd9ce4af',1,'cryptoauthlib.atcab.atcab_gendig()'],['../a01439.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c'],['../a01439.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c']]], - ['atcab_5fgendivkey_364',['atcab_gendivkey',['../a01439.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c'],['../a01439.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c']]], - ['atcab_5fgenkey_365',['atcab_genkey',['../a01439.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01452.html#acef9ae292bb3e6c3c1c1b16a20bd6494',1,'cryptoauthlib.atcab.atcab_genkey()']]], - ['atcab_5fgenkey_5fbase_366',['atcab_genkey_base',['../a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(): atca_basic.c'],['../a01452.html#aa1e87847ce5fccdef062c9aaa5bea65e',1,'cryptoauthlib.atcab.atcab_genkey_base()'],['../a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fgenkey_5fext_367',['atcab_genkey_ext',['../a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fgenkey_5fmac_5fen_368',['ATCAB_GENKEY_MAC_EN',['../a00800.html#a85d4ccd2d66f9b2fd10c7a2e408c4737',1,'atca_config_check.h']]], - ['atcab_5fget_5fdevice_369',['atcab_get_device',['../a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(void): atca_basic.c'],['../a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(void): atca_basic.c'],['../a01452.html#a2087c24eeaa066ab0481265ca17b62fb',1,'cryptoauthlib.atcab.atcab_get_device()']]], - ['atcab_5fget_5fdevice_5faddress_370',['atcab_get_device_address',['../a01439.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c'],['../a01439.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c']]], - ['atcab_5fget_5fdevice_5ftype_371',['atcab_get_device_type',['../a01439.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(): atca_basic.c'],['../a01452.html#a63e034778c2964569df7a6fb0ec0a8f1',1,'cryptoauthlib.atcab.atcab_get_device_type()'],['../a01439.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(void): atca_basic.c']]], - ['atcab_5fget_5fdevice_5ftype_5fext_372',['atcab_get_device_type_ext',['../a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c'],['../a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c']]], - ['atcab_5fget_5fpubkey_373',['atcab_get_pubkey',['../a01439.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01452.html#aac8a5ac8d26586ed7a707ddf2224ecd8',1,'cryptoauthlib.atcab.atcab_get_pubkey()']]], - ['atcab_5fget_5fpubkey_5fext_374',['atcab_get_pubkey_ext',['../a01439.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fget_5fzone_5fsize_375',['atcab_get_zone_size',['../a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], - ['atcab_5fget_5fzone_5fsize_5fext_376',['atcab_get_zone_size_ext',['../a01439.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01439.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], - ['atcab_5fhex2bin_377',['atcab_hex2bin',['../a01439.html#ga481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c'],['../a00251.html#a481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c']]], - ['atcab_5fhmac_378',['atcab_hmac',['../a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c'],['../a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c'],['../a01452.html#abcef2cce95ddc7363a687ee4cf238671',1,'cryptoauthlib.atcab.atcab_hmac()']]], - ['atcab_5fhw_5fsha2_5f256_379',['atcab_hw_sha2_256',['../a01439.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01439.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01452.html#aec129bd1fae35bcb87dd129ca4e065ca',1,'cryptoauthlib.atcab.atcab_hw_sha2_256()']]], - ['atcab_5fhw_5fsha2_5f256_5ffinish_380',['atcab_hw_sha2_256_finish',['../a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01452.html#a6f0cb9bd0b1cecd09fa765083d998db1',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_finish()']]], - ['atcab_5fhw_5fsha2_5f256_5finit_381',['atcab_hw_sha2_256_init',['../a01439.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(atca_sha256_ctx_t *ctx): atca_basic.c'],['../a01439.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(atca_sha256_ctx_t *ctx): atca_basic.c'],['../a01452.html#a213e34c48cf1f6a119979ae00acebee5',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_init(ctx)']]], - ['atcab_5fhw_5fsha2_5f256_5fupdate_382',['atcab_hw_sha2_256_update',['../a01452.html#a4c9b8fd51581178ad0d988f64e2df04c',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_update()'],['../a01439.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01439.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c']]], - ['atcab_5fidle_383',['atcab_idle',['../a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c'],['../a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c']]], - ['atcab_5finfo_384',['atcab_info',['../a01439.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c'],['../a01439.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c'],['../a01452.html#add3fb2f7c78eb84e42bcb17800f2c6de',1,'cryptoauthlib.atcab.atcab_info()']]], - ['atcab_5finfo_5fbase_385',['atcab_info_base',['../a01439.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(uint8_t mode, uint16_t param2, uint8_t *out_data): atca_basic.c'],['../a01439.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(uint8_t mode, uint16_t param2, uint8_t *out_data): atca_basic.c'],['../a01452.html#af03e307e61709bff1443d0f72a2efdb9',1,'cryptoauthlib.atcab.atcab_info_base()']]], - ['atcab_5finfo_5fchip_5fstatus_386',['atcab_info_chip_status',['../a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c'],['../a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c']]], - ['atcab_5finfo_5fext_387',['atcab_info_ext',['../a01439.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c'],['../a01439.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c']]], - ['atcab_5finfo_5fget_5flatch_388',['atcab_info_get_latch',['../a01452.html#ab21835e5b3b868f49faecd453d8da4e3',1,'cryptoauthlib.atcab.atcab_info_get_latch()'],['../a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(bool *state): atca_basic.c'],['../a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(bool *state): atca_basic.c']]], - ['atcab_5finfo_5flatch_5fen_389',['ATCAB_INFO_LATCH_EN',['../a00800.html#a5965863afba861e5e0e899229da26e83',1,'atca_config_check.h']]], - ['atcab_5finfo_5flock_5fstatus_390',['atcab_info_lock_status',['../a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c'],['../a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c']]], - ['atcab_5finfo_5fset_5flatch_391',['atcab_info_set_latch',['../a01439.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01439.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01452.html#a0ae7c88423c60e7dd7fefff75d443c35',1,'cryptoauthlib.atcab.atcab_info_set_latch()']]], - ['atcab_5finit_392',['atcab_init',['../a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(): atca_basic.c'],['../a01452.html#ad7cc965be77a8f829027f9afc21556b5',1,'cryptoauthlib.atcab.atcab_init()'],['../a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c']]], - ['atcab_5finit_5fdevice_393',['atcab_init_device',['../a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c'],['../a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c']]], - ['atcab_5finit_5fext_394',['atcab_init_ext',['../a01439.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c'],['../a01439.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c']]], - ['atcab_5fis_5fca2_5fdevice_395',['atcab_is_ca2_device',['../a01439.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c'],['../a01439.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c']]], - ['atcab_5fis_5fca_5fdevice_396',['atcab_is_ca_device',['../a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c'],['../a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c']]], - ['atcab_5fis_5fconfig_5flocked_397',['atcab_is_config_locked',['../a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c'],['../a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fconfig_5flocked_5fext_398',['atcab_is_config_locked_ext',['../a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fdata_5flocked_399',['atcab_is_data_locked',['../a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c'],['../a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fdata_5flocked_5fext_400',['atcab_is_data_locked_ext',['../a01439.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01439.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5flocked_401',['atcab_is_locked',['../a01439.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c'],['../a01439.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c'],['../a01452.html#a035fb2c7a593d20f479943c0d74df245',1,'cryptoauthlib.atcab.atcab_is_locked()']]], - ['atcab_5fis_5fprivate_5fext_402',['atcab_is_private_ext',['../a01439.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c'],['../a01439.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c']]], - ['atcab_5fis_5fslot_5flocked_403',['atcab_is_slot_locked',['../a01439.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01439.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01452.html#ac73a52d0b4b8104accb6f34542d06e85',1,'cryptoauthlib.atcab.atcab_is_slot_locked()']]], - ['atcab_5fis_5fslot_5flocked_5fext_404',['atcab_is_slot_locked_ext',['../a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c'],['../a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fta_5fdevice_405',['atcab_is_ta_device',['../a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c'],['../a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c']]], - ['atcab_5fkdf_406',['atcab_kdf',['../a01439.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c'],['../a01439.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c'],['../a01452.html#a760c91e04ad8a62181956b73ada2e384',1,'cryptoauthlib.atcab.atcab_kdf()']]], - ['atcab_5flock_407',['atcab_lock',['../a01439.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01439.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01452.html#a384368c23f29b2008c79effe063da77d',1,'cryptoauthlib.atcab.atcab_lock(mode, summary_crc)']]], - ['atcab_5flock_5fconfig_5fzone_408',['atcab_lock_config_zone',['../a01452.html#a13f0865a1ac2377282b29d6721b5c834',1,'cryptoauthlib.atcab.atcab_lock_config_zone()'],['../a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c'],['../a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c']]], - ['atcab_5flock_5fconfig_5fzone_5fcrc_409',['atcab_lock_config_zone_crc',['../a01439.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01439.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01452.html#a64223730cf6d1f1ecb48ebcfaffea75c',1,'cryptoauthlib.atcab.atcab_lock_config_zone_crc()']]], - ['atcab_5flock_5fconfig_5fzone_5fext_410',['atcab_lock_config_zone_ext',['../a01439.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c'],['../a01439.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c']]], - ['atcab_5flock_5fdata_5fslot_411',['atcab_lock_data_slot',['../a01439.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01439.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01452.html#a0738f317bdd3c1decb934971e66ee66c',1,'cryptoauthlib.atcab.atcab_lock_data_slot()']]], - ['atcab_5flock_5fdata_5fslot_5fext_412',['atcab_lock_data_slot_ext',['../a01439.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c'],['../a01439.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c']]], - ['atcab_5flock_5fdata_5fzone_413',['atcab_lock_data_zone',['../a01439.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(): atca_basic.c'],['../a01452.html#ad4c4f17808f4904cef59fb3c6a3060e1',1,'cryptoauthlib.atcab.atcab_lock_data_zone()'],['../a01439.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(void): atca_basic.c']]], - ['atcab_5flock_5fdata_5fzone_5fcrc_414',['atcab_lock_data_zone_crc',['../a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01452.html#a037d202036ce67334a0dc1dd5b714c3e',1,'cryptoauthlib.atcab.atcab_lock_data_zone_crc()']]], - ['atcab_5flock_5fdata_5fzone_5fext_415',['atcab_lock_data_zone_ext',['../a01439.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c'],['../a01439.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c']]], - ['atcab_5fmac_416',['atcab_mac',['../a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest): atca_basic.c'],['../a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest): atca_basic.c'],['../a01452.html#a02089d61678b8d494424c16bb612b8ad',1,'cryptoauthlib.atcab.atcab_mac()']]], - ['atcab_5fmemset_5fs_417',['atcab_memset_s',['../a00251.html#ac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c'],['../a01439.html#gac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c']]], - ['atcab_5fmock_418',['atcab_mock',['../a02536.html',1,'cryptoauthlib_mock']]], - ['atcab_5fnonce_419',['atcab_nonce',['../a01439.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01439.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01452.html#ad4e841d49e6fd9d67c664f020877e730',1,'cryptoauthlib.atcab.atcab_nonce()']]], - ['atcab_5fnonce_5fbase_420',['atcab_nonce_base',['../a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01452.html#afcb4ae6dd50b4449b6de4d1d0754601d',1,'cryptoauthlib.atcab.atcab_nonce_base()']]], - ['atcab_5fnonce_5fload_421',['atcab_nonce_load',['../a01439.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(): atca_basic.c'],['../a01452.html#adf1843ed620eb72a9efc75ff0251efa6',1,'cryptoauthlib.atcab.atcab_nonce_load()'],['../a01439.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(uint8_t target, const uint8_t *num_in, uint16_t num_in_size): atca_basic.c']]], - ['atcab_5fnonce_5frand_422',['atcab_nonce_rand',['../a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(): atca_basic.c'],['../a01452.html#a75272bce518cb8b951b9adae61a02c58',1,'cryptoauthlib.atcab.atcab_nonce_rand()'],['../a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fnonce_5frand_5fext_423',['atcab_nonce_rand_ext',['../a01439.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01439.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fpbkdf2_5fsha256_5fen_424',['ATCAB_PBKDF2_SHA256_EN',['../a00491.html#aa46ae7101b70ba482359edccca83f414',1,'crypto_sw_config_check.h']]], - ['atcab_5fpointer_5fdelta_425',['atcab_pointer_delta',['../a00251.html#a72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c'],['../a01439.html#ga72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c']]], - ['atcab_5fpriv_5fwrite_426',['atcab_priv_write',['../a01439.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01452.html#ac94db106ce16b83c5f5518cf92e24d4d',1,'cryptoauthlib.atcab.atcab_priv_write()']]], - ['atcab_5frandom_427',['atcab_random',['../a01439.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01439.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01452.html#a8d6436e974c3780cb205261049fbbb87',1,'cryptoauthlib.atcab.atcab_random()']]], - ['atcab_5frandom_5fext_428',['atcab_random_ext',['../a01439.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c'],['../a01439.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fread_5fbytes_5fzone_429',['atcab_read_bytes_zone',['../a01439.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c'],['../a01439.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c'],['../a01452.html#abd3403fcc46a2b82556784e142161c65',1,'cryptoauthlib.atcab.atcab_read_bytes_zone()']]], - ['atcab_5fread_5fconfig_5fzone_430',['atcab_read_config_zone',['../a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01452.html#a5dfdc90856af9f03e09cc280dcfe3de0',1,'cryptoauthlib.atcab.atcab_read_config_zone()']]], - ['atcab_5fread_5fconfig_5fzone_5fext_431',['atcab_read_config_zone_ext',['../a01439.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c'],['../a01439.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c']]], - ['atcab_5fread_5fenc_432',['atcab_read_enc',['../a01439.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01452.html#a87c05138d598087100ec1e740bf9e221',1,'cryptoauthlib.atcab.atcab_read_enc(key_id, block, data, enc_key, enc_key_id, num_in=None)']]], - ['atcab_5fread_5fpubkey_433',['atcab_read_pubkey',['../a01452.html#a03506fe5daef9a019b2688e49af8a725',1,'cryptoauthlib.atcab.atcab_read_pubkey()'],['../a01439.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(uint16_t slot, uint8_t *public_key): atca_basic.c'],['../a01439.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(uint16_t slot, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fread_5fpubkey_5fext_434',['atcab_read_pubkey_ext',['../a01439.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c'],['../a01439.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fread_5fserial_5fnumber_435',['atcab_read_serial_number',['../a01439.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(uint8_t *serial_number): atca_basic.c'],['../a01439.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(uint8_t *serial_number): atca_basic.c'],['../a01452.html#a903f3bc6862860693f3d0c7fcfb68abd',1,'cryptoauthlib.atcab.atcab_read_serial_number()']]], - ['atcab_5fread_5fserial_5fnumber_5fext_436',['atcab_read_serial_number_ext',['../a01439.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c'],['../a01439.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c']]], - ['atcab_5fread_5fsig_437',['atcab_read_sig',['../a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01452.html#a643bc00f84713b2e8705021f6b2c2d0f',1,'cryptoauthlib.atcab.atcab_read_sig()']]], - ['atcab_5fread_5fzone_438',['atcab_read_zone',['../a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01452.html#ae74a63edf1522697556aa1d98493b15b',1,'cryptoauthlib.atcab.atcab_read_zone()']]], - ['atcab_5fread_5fzone_5fext_439',['atcab_read_zone_ext',['../a01439.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c']]], - ['atcab_5frelease_440',['atcab_release',['../a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c'],['../a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c'],['../a01452.html#a6b784447f8cf2cfc112ab33a4b10ce22',1,'cryptoauthlib.atcab.atcab_release()']]], - ['atcab_5frelease_5fext_441',['atcab_release_ext',['../a01439.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c'],['../a01439.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c']]], - ['atcab_5freversal_442',['atcab_reversal',['../a00251.html#a7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c'],['../a01439.html#ga7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c']]], - ['atcab_5fsecureboot_443',['atcab_secureboot',['../a01439.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01439.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01452.html#a7063655ccab4af3b185ff519a40329e0',1,'cryptoauthlib.atcab.atcab_secureboot()']]], - ['atcab_5fsecureboot_5fmac_444',['atcab_secureboot_mac',['../a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01452.html#a3e585d7d21fb74154c4e53d541db9e5a',1,'cryptoauthlib.atcab.atcab_secureboot_mac()']]], - ['atcab_5fselftest_445',['atcab_selftest',['../a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(): atca_basic.c'],['../a01452.html#ab078cd0a92f0f235fa36fb06ccf4af19',1,'cryptoauthlib.atcab.atcab_selftest()'],['../a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c']]], - ['atcab_5fsha_446',['atcab_sha',['../a01439.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(): atca_basic.c'],['../a01452.html#a583ddc1d9adbdceea0a7617c6b87ff8d',1,'cryptoauthlib.atcab.atcab_sha()'],['../a01439.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c']]], - ['atcab_5fsha_5fbase_447',['atcab_sha_base',['../a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c'],['../a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c'],['../a01452.html#a49b55d1996aee8c868684a916341522f',1,'cryptoauthlib.atcab.atcab_sha_base()']]], - ['atcab_5fsha_5fend_448',['atcab_sha_end',['../a01439.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c'],['../a01439.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c'],['../a01452.html#a7ffc1b8652c148a1c3a86ef80155502c',1,'cryptoauthlib.atcab.atcab_sha_end()']]], - ['atcab_5fsha_5fhmac_449',['atcab_sha_hmac',['../a01439.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01439.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01452.html#a0589fee6cdf8761c032b330a3079e0e0',1,'cryptoauthlib.atcab.atcab_sha_hmac()']]], - ['atcab_5fsha_5fhmac_5fext_450',['atcab_sha_hmac_ext',['../a01439.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01439.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c']]], - ['atcab_5fsha_5fhmac_5ffinish_451',['atcab_sha_hmac_finish',['../a01439.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01439.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01452.html#a897a5ee03a68bba8afe2371f89a6d7a5',1,'cryptoauthlib.atcab.atcab_sha_hmac_finish()']]], - ['atcab_5fsha_5fhmac_5finit_452',['atcab_sha_hmac_init',['../a01439.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01439.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01452.html#a6d243431c455704e03f148b9e373db51',1,'cryptoauthlib.atcab.atcab_sha_hmac_init()']]], - ['atcab_5fsha_5fhmac_5fupdate_453',['atcab_sha_hmac_update',['../a01439.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01439.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01452.html#a323b71e8080719b27a45f63bb8ef6a59',1,'cryptoauthlib.atcab.atcab_sha_hmac_update()']]], - ['atcab_5fsha_5fread_5fcontext_454',['atcab_sha_read_context',['../a01439.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01439.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01452.html#a4bcf510aa10502e29fe2321486019fb5',1,'cryptoauthlib.atcab.atcab_sha_read_context(context, context_size)']]], - ['atcab_5fsha_5fstart_455',['atcab_sha_start',['../a01452.html#a3fee574ed2618a6abc770bb1f17dc6b5',1,'cryptoauthlib.atcab.atcab_sha_start()'],['../a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c']]], - ['atcab_5fsha_5fupdate_456',['atcab_sha_update',['../a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c'],['../a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c'],['../a01452.html#a91f72328d639d88598498c37cb552ffb',1,'cryptoauthlib.atcab.atcab_sha_update()']]], - ['atcab_5fsha_5fwrite_5fcontext_457',['atcab_sha_write_context',['../a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c'],['../a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c'],['../a01452.html#acc277568c5c42424ff90d8bfcee667b8',1,'cryptoauthlib.atcab.atcab_sha_write_context()']]], - ['atcab_5fsign_458',['atcab_sign',['../a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(): atca_basic.c'],['../a01452.html#a14fe9d38029d932b4aef6802bbf078ab',1,'cryptoauthlib.atcab.atcab_sign()'],['../a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c']]], - ['atcab_5fsign_5fbase_459',['atcab_sign_base',['../a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01452.html#a8728f5f5bf67ede8dce575af486499c9',1,'cryptoauthlib.atcab.atcab_sign_base()']]], - ['atcab_5fsign_5fext_460',['atcab_sign_ext',['../a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c']]], - ['atcab_5fsign_5finternal_461',['atcab_sign_internal',['../a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(): atca_basic.c'],['../a01452.html#af218c61a8dd3d937e5dfd3ad2d0c2701',1,'cryptoauthlib.atcab.atcab_sign_internal()'],['../a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature): atca_basic.c']]], - ['atcab_5fsleep_462',['atcab_sleep',['../a01439.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c'],['../a01439.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c']]], - ['atcab_5fupdateextra_463',['atcab_updateextra',['../a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01452.html#a76dda154eba75b7c0c8f6a8fcc5d346a',1,'cryptoauthlib.atcab.atcab_updateextra()']]], - ['atcab_5fverify_464',['atcab_verify',['../a01439.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01439.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01452.html#a40e190b9a9b0bb5aa2389cc482f94780',1,'cryptoauthlib.atcab.atcab_verify()']]], - ['atcab_5fverify_5fextern_465',['atcab_verify_extern',['../a01439.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01452.html#a692a721d89bd8f4032502f343d3f1718',1,'cryptoauthlib.atcab.atcab_verify_extern()']]], - ['atcab_5fverify_5fextern_5fext_466',['atcab_verify_extern_ext',['../a01439.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fextern_5fmac_467',['atcab_verify_extern_mac',['../a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01452.html#ae8ab769023a1d717198eb06aa17ff8b0',1,'cryptoauthlib.atcab.atcab_verify_extern_mac(message, signature, public_key, num_in, io_key, is_verified)']]], - ['atcab_5fverify_5fextern_5fstored_5fmac_468',['atcab_verify_extern_stored_mac',['../a01452.html#aadca3cb06b25a8b3b8c6a851ad477db0',1,'cryptoauthlib::atcab']]], - ['atcab_5fverify_5finvalidate_469',['atcab_verify_invalidate',['../a01439.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01439.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01452.html#a49f823cd787be6ed036e7bc1e430b384',1,'cryptoauthlib.atcab.atcab_verify_invalidate()']]], - ['atcab_5fverify_5fmac_5fen_470',['ATCAB_VERIFY_MAC_EN',['../a00800.html#a5d69a9273e615d799841edc21bd72dc0',1,'atca_config_check.h']]], - ['atcab_5fverify_5fstored_471',['atcab_verify_stored',['../a01439.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01439.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01452.html#a90baa667a1e6bb223cda44f4322c2f44',1,'cryptoauthlib.atcab.atcab_verify_stored()']]], - ['atcab_5fverify_5fstored_5fext_472',['atcab_verify_stored_ext',['../a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fstored_5fmac_473',['atcab_verify_stored_mac',['../a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(): atca_basic.c'],['../a01452.html#a4b1ae9a8e89b7038fd5f75686ca97e31',1,'cryptoauthlib.atcab.atcab_verify_stored_mac()'],['../a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fstored_5fwith_5ftempkey_474',['atcab_verify_stored_with_tempkey',['../a01439.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01439.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fvalidate_475',['atcab_verify_validate',['../a01439.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01439.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01452.html#a627d101aa165533d893461f5fb39efa1',1,'cryptoauthlib.atcab.atcab_verify_validate()']]], - ['atcab_5fversion_476',['atcab_version',['../a01439.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c'],['../a01439.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c']]], - ['atcab_5fwakeup_477',['atcab_wakeup',['../a01439.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c'],['../a01439.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c']]], - ['atcab_5fwrite_478',['atcab_write',['../a01439.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c'],['../a01439.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c'],['../a01452.html#acd0f0264807684089bb1ab8bdfcb989f',1,'cryptoauthlib.atcab.atcab_write()']]], - ['atcab_5fwrite_5fbytes_5fzone_479',['atcab_write_bytes_zone',['../a01439.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(): atca_basic.c'],['../a01452.html#a5db76308f0e51108dea8222f14ac405e',1,'cryptoauthlib.atcab.atcab_write_bytes_zone()'],['../a01439.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length): atca_basic.c']]], - ['atcab_5fwrite_5fconfig_5fcounter_480',['atcab_write_config_counter',['../a01439.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c'],['../a01439.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c'],['../a01452.html#aff3e1986bf6d79a353f8820fe5ed4306',1,'cryptoauthlib.atcab.atcab_write_config_counter()']]], - ['atcab_5fwrite_5fconfig_5fzone_481',['atcab_write_config_zone',['../a01439.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01439.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01452.html#a4144ba085c025b94f6d39de2ba33dc26',1,'cryptoauthlib.atcab.atcab_write_config_zone()']]], - ['atcab_5fwrite_5fconfig_5fzone_5fext_482',['atcab_write_config_zone_ext',['../a01439.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c'],['../a01439.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c']]], - ['atcab_5fwrite_5fenc_483',['atcab_write_enc',['../a01439.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(): atca_basic.c'],['../a01452.html#ae8faf982d17b5fc72231bc648a51063a',1,'cryptoauthlib.atcab.atcab_write_enc()'],['../a01439.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c']]], - ['atcab_5fwrite_5fpubkey_484',['atcab_write_pubkey',['../a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01452.html#a64692832da534aacee8a61cef74e9be1',1,'cryptoauthlib.atcab.atcab_write_pubkey()']]], - ['atcab_5fwrite_5fpubkey_5fext_485',['atcab_write_pubkey_ext',['../a01439.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01439.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c']]], - ['atcab_5fwrite_5fzone_486',['atcab_write_zone',['../a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01452.html#a18b7743ebac58022a1f704cb3b011803',1,'cryptoauthlib.atcab.atcab_write_zone()']]], - ['atcab_5fwrite_5fzone_5fext_487',['atcab_write_zone_ext',['../a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c']]], - ['atcac_5faes_5fcmac_5fctx_488',['atcac_aes_cmac_ctx',['../a01800.html',1,'']]], - ['atcac_5faes_5fcmac_5fen_489',['ATCAC_AES_CMAC_EN',['../a00653.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_mbedtls_interface.h'],['../a00665.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_openssl_interface.h']]], - ['atcac_5faes_5fcmac_5ffinish_490',['atcac_aes_cmac_finish',['../a00656.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_mbedtls_wrap.c'],['../a00662.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_openssl_interface.c']]], - ['atcac_5faes_5fcmac_5finit_491',['atcac_aes_cmac_init',['../a00656.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c'],['../a00662.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fcmac_5fupdate_492',['atcac_aes_cmac_update',['../a00656.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5faad_5fupdate_493',['atcac_aes_gcm_aad_update',['../a00662.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_openssl_interface.c'],['../a00656.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_mbedtls_wrap.c']]], - ['atcac_5faes_5fgcm_5fctx_494',['atcac_aes_gcm_ctx',['../a01796.html',1,'']]], - ['atcac_5faes_5fgcm_5fdecrypt_5ffinish_495',['atcac_aes_gcm_decrypt_finish',['../a00656.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_mbedtls_wrap.c'],['../a00662.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fdecrypt_5fstart_496',['atcac_aes_gcm_decrypt_start',['../a00656.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00662.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fdecrypt_5fupdate_497',['atcac_aes_gcm_decrypt_update',['../a00662.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_openssl_interface.c'],['../a00656.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_mbedtls_wrap.c']]], - ['atcac_5faes_5fgcm_5fen_498',['ATCAC_AES_GCM_EN',['../a00653.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_mbedtls_interface.h'],['../a00665.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_openssl_interface.h'],['../a00491.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): crypto_sw_config_check.h']]], - ['atcac_5faes_5fgcm_5fencrypt_5ffinish_499',['atcac_aes_gcm_encrypt_finish',['../a00656.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_mbedtls_wrap.c'],['../a00662.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fencrypt_5fstart_500',['atcac_aes_gcm_encrypt_start',['../a00656.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00662.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fencrypt_5fupdate_501',['atcac_aes_gcm_encrypt_update',['../a00662.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_openssl_interface.c'],['../a00656.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_mbedtls_wrap.c']]], - ['atcac_5fhmac_5fctx_502',['atcac_hmac_ctx',['../a01792.html',1,'']]], - ['atcac_5fpbkdf2_5fsha256_5fen_503',['ATCAC_PBKDF2_SHA256_EN',['../a00491.html#a6d2fa2e22a151bea100d7c7ee84dbe7f',1,'crypto_sw_config_check.h']]], - ['atcac_5fpk_5fctx_504',['atcac_pk_ctx',['../a01804.html',1,'']]], - ['atcac_5fpk_5fderive_505',['atcac_pk_derive',['../a00656.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00662.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], - ['atcac_5fpk_5ffree_506',['atcac_pk_free',['../a00656.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_mbedtls_wrap.c'],['../a00662.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_openssl_interface.c']]], - ['atcac_5fpk_5finit_507',['atcac_pk_init',['../a00656.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_mbedtls_wrap.c'],['../a00662.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_openssl_interface.c']]], - ['atcac_5fpk_5finit_5fpem_508',['atcac_pk_init_pem',['../a00662.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_openssl_interface.c'],['../a00656.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_mbedtls_wrap.c']]], - ['atcac_5fpk_5fpublic_509',['atcac_pk_public',['../a00656.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00662.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], - ['atcac_5fpk_5fsign_510',['atcac_pk_sign',['../a00656.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_mbedtls_wrap.c'],['../a00662.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_openssl_interface.c']]], - ['atcac_5fpk_5fverify_511',['atcac_pk_verify',['../a00656.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_mbedtls_wrap.c'],['../a00662.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_openssl_interface.c']]], - ['atcac_5fpkey_5fen_512',['ATCAC_PKEY_EN',['../a00653.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_mbedtls_interface.h'],['../a00665.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_openssl_interface.h']]], - ['atcac_5frandom_5fen_513',['ATCAC_RANDOM_EN',['../a00800.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): atca_config_check.h'],['../a00491.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): crypto_sw_config_check.h']]], - ['atcac_5fsha1_5fctx_514',['atcac_sha1_ctx',['../a01784.html',1,'']]], - ['atcac_5fsha1_5fen_515',['ATCAC_SHA1_EN',['../a00665.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_openssl_interface.h'],['../a00653.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_mbedtls_interface.h'],['../a00800.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_config_check.h'],['../a00491.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): crypto_sw_config_check.h']]], - ['atcac_5fsha256_5fen_516',['ATCAC_SHA256_EN',['../a00800.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_config_check.h'],['../a00491.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): crypto_sw_config_check.h'],['../a00653.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_mbedtls_interface.h'],['../a00665.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_openssl_interface.h']]], - ['atcac_5fsha256_5fhmac_5ffinish_517',['atcac_sha256_hmac_finish',['../a00656.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_mbedtls_wrap.c'],['../a00662.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_openssl_interface.c']]], - ['atcac_5fsha256_5fhmac_5finit_518',['atcac_sha256_hmac_init',['../a00656.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c'],['../a00662.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c']]], - ['atcac_5fsha256_5fhmac_5fupdate_519',['atcac_sha256_hmac_update',['../a00656.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcac_5fsha2_5f256_5fctx_520',['atcac_sha2_256_ctx',['../a01788.html',1,'']]], - ['atcac_5fsign_5fen_521',['ATCAC_SIGN_EN',['../a00800.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): atca_config_check.h'],['../a00491.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): crypto_sw_config_check.h']]], - ['atcac_5fsw_5frandom_522',['atcac_sw_random',['../a00656.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha1_5ffinish_523',['atcac_sw_sha1_finish',['../a00656.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_mbedtls_wrap.c'],['../a00662.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha1_5finit_524',['atcac_sw_sha1_init',['../a00656.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_mbedtls_wrap.c'],['../a00662.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha1_5fupdate_525',['atcac_sw_sha1_update',['../a00662.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c'],['../a00656.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c']]], - ['atcac_5fsw_5fsha2_5f256_5ffinish_526',['atcac_sw_sha2_256_finish',['../a00656.html#a41146dace082e493f250425972a04d7f',1,'atcac_sw_sha2_256_finish(struct atcac_sha2_256_ctx *ctx, uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE]): atca_mbedtls_wrap.c'],['../a00662.html#a41146dace082e493f250425972a04d7f',1,'atcac_sw_sha2_256_finish(struct atcac_sha2_256_ctx *ctx, uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE]): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha2_5f256_5finit_527',['atcac_sw_sha2_256_init',['../a00656.html#afb989c314b0afecd1202493a3cfee909',1,'atcac_sw_sha2_256_init(struct atcac_sha2_256_ctx *ctx): atca_mbedtls_wrap.c'],['../a00662.html#afb989c314b0afecd1202493a3cfee909',1,'atcac_sw_sha2_256_init(struct atcac_sha2_256_ctx *ctx): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha2_5f256_5fupdate_528',['atcac_sw_sha2_256_update',['../a00656.html#a1caf63c685aa46025eda5e73f8d634b5',1,'atcac_sw_sha2_256_update(struct atcac_sha2_256_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a1caf63c685aa46025eda5e73f8d634b5',1,'atcac_sw_sha2_256_update(struct atcac_sha2_256_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcac_5fverify_5fen_529',['ATCAC_VERIFY_EN',['../a00491.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): crypto_sw_config_check.h'],['../a00800.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): atca_config_check.h']]], - ['atcac_5fx509_5fctx_530',['atcac_x509_ctx',['../a01780.html',1,'']]], - ['atcacert_2eh_531',['atcacert.h',['../a00272.html',1,'']]], - ['atcacert_5fbuild_5fstate_5fs_532',['atcacert_build_state_s',['../a01608.html',1,'']]], - ['atcacert_5fbuild_5fstate_5ft_533',['atcacert_build_state_t',['../a01443.html#ga199c030847111ed09a682ca61b7597a9',1,'atcacert_def.h']]], - ['atcacert_5fcalc_5fexpire_5fyears_534',['atcacert_calc_expire_years',['../a01443.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c'],['../a01443.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c']]], - ['atcacert_5fcert_5felement_5fs_535',['atcacert_cert_element_s',['../a01600.html',1,'']]], - ['atcacert_5fcert_5felement_5ft_536',['atcacert_cert_element_t',['../a01443.html#ga28ae8005ca4b109958b090d2079d190b',1,'atcacert_cert_element_t(): atcacert_def.h'],['../a02216.html',1,'cryptoauthlib.atcacert.atcacert_cert_element_t']]], - ['atcacert_5fcert_5floc_5fs_537',['atcacert_cert_loc_s',['../a01596.html',1,'']]], - ['atcacert_5fcert_5floc_5ft_538',['atcacert_cert_loc_t',['../a01443.html#gad473c89ee9a934029ff87e86fc1c570d',1,'atcacert_cert_loc_t(): atcacert_def.h'],['../a02212.html',1,'cryptoauthlib.atcacert.atcacert_cert_loc_t']]], - ['atcacert_5fcert_5fsn_5fsrc_5fe_539',['atcacert_cert_sn_src_e',['../a01443.html#ga813047a656af7fe578d28fd54c840e8e',1,'atcacert_def.h']]], - ['atcacert_5fcert_5fsn_5fsrc_5ft_540',['atcacert_cert_sn_src_t',['../a01443.html#ga3bddddfbb916fe1dd1e935e454d3265b',1,'atcacert_cert_sn_src_t(): atcacert_def.h'],['../a02180.html',1,'cryptoauthlib.atcacert.atcacert_cert_sn_src_t']]], - ['atcacert_5fcert_5ftype_5fe_541',['atcacert_cert_type_e',['../a01443.html#ga5430f01929cd7269e04db08d1f28642f',1,'atcacert_def.h']]], - ['atcacert_5fcert_5ftype_5ft_542',['atcacert_cert_type_t',['../a01443.html#gae63503395992a60853867e3865f75be0',1,'atcacert_cert_type_t(): atcacert_def.h'],['../a02176.html',1,'cryptoauthlib.atcacert.atcacert_cert_type_t']]], - ['atcacert_5fcheck_5fconfig_2eh_543',['atcacert_check_config.h',['../a00275.html',1,'']]], - ['atcacert_5fclient_2ec_544',['atcacert_client.c',['../a00278.html',1,'']]], - ['atcacert_5fclient_2eh_545',['atcacert_client.h',['../a00281.html',1,'']]], - ['atcacert_5fcomp_5fdata_5ft_546',['atcacert_comp_data_t',['../a02204.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fcreate_5fcsr_547',['atcacert_create_csr',['../a01453.html#a453696e86822c980d8e5b9e6a27eb861',1,'cryptoauthlib.atcacert.atcacert_create_csr()'],['../a01443.html#ga9b103dcc50fefcb19514285da7fbe296',1,'atcacert_create_csr(): atcacert_client.h']]], - ['atcacert_5fcreate_5fcsr_5fpem_548',['atcacert_create_csr_pem',['../a01453.html#a6c23b4916b8fa6dc8aa56b45f558d870',1,'cryptoauthlib.atcacert.atcacert_create_csr_pem()'],['../a01443.html#ga1e4f207e7180d504c5dd369cd20fef21',1,'atcacert_create_csr_pem(const atcacert_def_t *csr_def, char *csr, size_t *csr_size): atcacert_client.h']]], - ['atcacert_5fdate_2ec_549',['atcacert_date.c',['../a00284.html',1,'']]], - ['atcacert_5fdate_2eh_550',['atcacert_date.h',['../a00287.html',1,'']]], - ['atcacert_5fdate_5fcmp_551',['atcacert_date_cmp',['../a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c'],['../a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c']]], - ['atcacert_5fdate_5fdec_552',['atcacert_date_dec',['../a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01453.html#a7e05b319688a07bbfeee23895341303e',1,'cryptoauthlib.atcacert.atcacert_date_dec()']]], - ['atcacert_5fdate_5fdec_5fcompcert_553',['atcacert_date_dec_compcert',['../a01443.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(): atcacert_date.c'],['../a01453.html#a7910146d6e2097e9fb075a2bf60d1b25',1,'cryptoauthlib.atcacert.atcacert_date_dec_compcert()'],['../a01443.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], - ['atcacert_5fdate_5fdec_5fcompcert_5fext_554',['atcacert_date_dec_compcert_ext',['../a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], - ['atcacert_5fdate_5fenc_555',['atcacert_date_enc',['../a01443.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01443.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01453.html#a23ff0ccfc75d564fc9f6200ef8cff5fb',1,'cryptoauthlib.atcacert.atcacert_date_enc()']]], - ['atcacert_5fdate_5fenc_5fcompcert_556',['atcacert_date_enc_compcert',['../a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(): atcacert_date.c'],['../a01453.html#a82bd7bbea46866cb644016ea7faff329',1,'cryptoauthlib.atcacert.atcacert_date_enc_compcert()'],['../a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c']]], - ['atcacert_5fdate_5fenc_5fcompcert_5fext_557',['atcacert_date_enc_compcert_ext',['../a01443.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c'],['../a01443.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c']]], - ['atcacert_5fdate_5fformat_5ft_558',['atcacert_date_format_t',['../a02192.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fdate_5ffrom_5fasn1_5ftag_559',['atcacert_date_from_asn1_tag',['../a01443.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c'],['../a01443.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c']]], - ['atcacert_5fdate_5fget_5fmax_5fdate_560',['atcacert_date_get_max_date',['../a01443.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01443.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01453.html#a0ffefee23107bcbbadef2508ccaaba4f',1,'cryptoauthlib.atcacert.atcacert_date_get_max_date()']]], - ['atcacert_5fdecode_5fpem_561',['atcacert_decode_pem',['../a00317.html#a32d4e4f417e88b56b9adc5b7c521d545',1,'atcacert_pem.h']]], - ['atcacert_5fdecode_5fpem_5fcert_562',['atcacert_decode_pem_cert',['../a00317.html#a5ee7c8e3893e67ae0a622bddc443bcbd',1,'atcacert_pem.h']]], - ['atcacert_5fdecode_5fpem_5fcsr_563',['atcacert_decode_pem_csr',['../a00317.html#adfccc0bc91b144dffab3aba96126800f',1,'atcacert_pem.h']]], - ['atcacert_5fdef_2ec_564',['atcacert_def.c',['../a00290.html',1,'']]], - ['atcacert_5fdef_2eh_565',['atcacert_def.h',['../a00293.html',1,'']]], - ['atcacert_5fdef_5fs_566',['atcacert_def_s',['../a01604.html',1,'']]], - ['atcacert_5fdef_5ft_567',['atcacert_def_t',['../a01443.html#ga01be962d7321095d15547113d727c97d',1,'atcacert_def_t(): atcacert_def.h'],['../a02220.html',1,'cryptoauthlib.atcacert.atcacert_def_t']]], - ['atcacert_5fder_2ec_568',['atcacert_der.c',['../a00296.html',1,'']]], - ['atcacert_5fder_2eh_569',['atcacert_der.h',['../a00299.html',1,'']]], - ['atcacert_5fder_5fdec_5fecdsa_5fsig_5fvalue_570',['atcacert_der_dec_ecdsa_sig_value',['../a01443.html#gab22e2c8bf627f700be0e10e331bfdb1f',1,'atcacert_der.h']]], - ['atcacert_5fder_5fdec_5finteger_571',['atcacert_der_dec_integer',['../a01443.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb',1,'atcacert_der.h']]], - ['atcacert_5fder_5fdec_5flength_572',['atcacert_der_dec_length',['../a01443.html#ga9d4810aa2fd1db14a8f91204387fd972',1,'atcacert_der.h']]], - ['atcacert_5fder_5fenc_5fecdsa_5fsig_5fvalue_573',['atcacert_der_enc_ecdsa_sig_value',['../a01443.html#gacee7e7eb74c022b2ea70c7a549d5f876',1,'atcacert_der.h']]], - ['atcacert_5fder_5fenc_5finteger_574',['atcacert_der_enc_integer',['../a01443.html#gadc86044101ad9a87556d49ab8bf892af',1,'atcacert_der.h']]], - ['atcacert_5fder_5fenc_5flength_575',['atcacert_der_enc_length',['../a01443.html#ga5866e20dc2c7f9d788924155eac4fece',1,'atcacert_der.h']]], - ['atcacert_5fdevice_5floc_5fs_576',['atcacert_device_loc_s',['../a01592.html',1,'']]], - ['atcacert_5fdevice_5floc_5ft_577',['atcacert_device_loc_t',['../a01443.html#ga5973a9cc26357822a232433f57741777',1,'atcacert_device_loc_t(): atcacert_def.h'],['../a02208.html',1,'cryptoauthlib.atcacert.atcacert_device_loc_t']]], - ['atcacert_5fdevice_5fzone_5fe_578',['atcacert_device_zone_e',['../a01443.html#ga1c0876228cb459f64347a63f3bae4c73',1,'atcacert_def.h']]], - ['atcacert_5fdevice_5fzone_5ft_579',['atcacert_device_zone_t',['../a01443.html#ga63df515d393c9ebb6979d53208263458',1,'atcacert_device_zone_t(): atcacert_def.h'],['../a02184.html',1,'cryptoauthlib.atcacert.atcacert_device_zone_t']]], - ['atcacert_5fe_5fbad_5fcert_580',['ATCACERT_E_BAD_CERT',['../a01443.html#ga822ee0620c8d2d12ff971b9b35f9f5cd',1,'atcacert.h']]], - ['atcacert_5fe_5fbad_5fparams_581',['ATCACERT_E_BAD_PARAMS',['../a01443.html#ga47509d283523ab1892fb8746d6f4e37d',1,'atcacert.h']]], - ['atcacert_5fe_5fbuffer_5ftoo_5fsmall_582',['ATCACERT_E_BUFFER_TOO_SMALL',['../a01443.html#ga7a2e774fc8b12c4045dea335a86afca6',1,'atcacert.h']]], - ['atcacert_5fe_5fdecoding_5ferror_583',['ATCACERT_E_DECODING_ERROR',['../a01443.html#gaea155533fdd352d6602d3e2fc717930f',1,'atcacert.h']]], - ['atcacert_5fe_5felem_5fmissing_584',['ATCACERT_E_ELEM_MISSING',['../a01443.html#ga8e3e7c64650c92364bbac17f6a75474a',1,'atcacert.h']]], - ['atcacert_5fe_5felem_5fout_5fof_5fbounds_585',['ATCACERT_E_ELEM_OUT_OF_BOUNDS',['../a01443.html#ga62604c78d688530173e203b02df180fa',1,'atcacert.h']]], - ['atcacert_5fe_5ferror_586',['ATCACERT_E_ERROR',['../a01443.html#ga048a6bb9781dbbc402409a172f976f74',1,'atcacert.h']]], - ['atcacert_5fe_5finvalid_5fdate_587',['ATCACERT_E_INVALID_DATE',['../a01443.html#gaafd66d6744314225ead24b3901bd6372',1,'atcacert.h']]], - ['atcacert_5fe_5finvalid_5ftransform_588',['ATCACERT_E_INVALID_TRANSFORM',['../a01443.html#ga2396e500bd36c2316a1a6e13e3117958',1,'atcacert.h']]], - ['atcacert_5fe_5fsuccess_589',['ATCACERT_E_SUCCESS',['../a01443.html#ga7bd1ad830360fc8b988f855da6d0d5ba',1,'atcacert.h']]], - ['atcacert_5fe_5funexpected_5felem_5fsize_590',['ATCACERT_E_UNEXPECTED_ELEM_SIZE',['../a01443.html#ga5a7cb98e18ad338f2eaf6594acb67c32',1,'atcacert.h']]], - ['atcacert_5fe_5funimplemented_591',['ATCACERT_E_UNIMPLEMENTED',['../a01443.html#ga4b6db1523875a2b1453ef5e16989ecd4',1,'atcacert.h']]], - ['atcacert_5fe_5fverify_5ffailed_592',['ATCACERT_E_VERIFY_FAILED',['../a01443.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d',1,'atcacert.h']]], - ['atcacert_5fen_593',['ATCACERT_EN',['../a00800.html#a3d181d31956d42db1d25281deca4c7e3',1,'atca_config_check.h']]], - ['atcacert_5fencode_5fpem_594',['atcacert_encode_pem',['../a00317.html#a65ca7cd1f2358ad40ae4c8c13f6d817c',1,'atcacert_pem.h']]], - ['atcacert_5fencode_5fpem_5fcert_595',['atcacert_encode_pem_cert',['../a00317.html#a206c4857a73ccfc7898131b61d43ba67',1,'atcacert_pem.h']]], - ['atcacert_5fencode_5fpem_5fcsr_596',['atcacert_encode_pem_csr',['../a00317.html#ad3b6773201632141bbc95ca6d43271f9',1,'atcacert_pem.h']]], - ['atcacert_5fgen_5fchallenge_5fhw_597',['atcacert_gen_challenge_hw',['../a01443.html#ga6692847d9c41eb73e469df029697a7b9',1,'atcacert_host_hw.h']]], - ['atcacert_5fgen_5fchallenge_5fsw_598',['atcacert_gen_challenge_sw',['../a01443.html#ga883a0c84474150e6b123dfab15a8c929',1,'atcacert_host_sw.h']]], - ['atcacert_5fget_5fauth_5fkey_5fid_599',['atcacert_get_auth_key_id',['../a01443.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c'],['../a01443.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c']]], - ['atcacert_5fget_5fcert_5fsn_600',['atcacert_get_cert_sn',['../a01443.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c'],['../a01443.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c']]], - ['atcacert_5fget_5fexpire_5fdate_601',['atcacert_get_expire_date',['../a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], - ['atcacert_5fget_5fissue_5fdate_602',['atcacert_get_issue_date',['../a01443.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01443.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], - ['atcacert_5fget_5fissuer_603',['atcacert_get_issuer',['../a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c'],['../a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c']]], - ['atcacert_5fget_5fresponse_604',['atcacert_get_response',['../a01443.html#ga9a9769b84557ca2c47fa4442daa9a111',1,'atcacert_get_response(): atcacert_client.h'],['../a01453.html#a9c3717acbb392ceed968c1172400e6dd',1,'cryptoauthlib.atcacert.atcacert_get_response()']]], - ['atcacert_5fget_5fsubj_5fkey_5fid_605',['atcacert_get_subj_key_id',['../a01443.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c'],['../a01443.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c']]], - ['atcacert_5fget_5fsubj_5fpublic_5fkey_606',['atcacert_get_subj_public_key',['../a01443.html#gaa530a6a7f90a9a610856701b0220a161',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64]): atcacert_def.c'],['../a01443.html#gaa530a6a7f90a9a610856701b0220a161',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64]): atcacert_def.c']]], - ['atcacert_5fget_5fsubject_607',['atcacert_get_subject',['../a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c'],['../a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c']]], - ['atcacert_5fhost_5fhw_2ec_608',['atcacert_host_hw.c',['../a00302.html',1,'']]], - ['atcacert_5fhost_5fhw_2eh_609',['atcacert_host_hw.h',['../a00305.html',1,'']]], - ['atcacert_5fhost_5fsw_2ec_610',['atcacert_host_sw.c',['../a00308.html',1,'']]], - ['atcacert_5fhost_5fsw_2eh_611',['atcacert_host_sw.h',['../a00311.html',1,'']]], - ['atcacert_5fmax_5fcert_5fsize_612',['atcacert_max_cert_size',['../a01453.html#a3b6192388c29b0efb1968d6b44efd712',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fpem_2ec_613',['atcacert_pem.c',['../a00314.html',1,'']]], - ['atcacert_5fpem_2eh_614',['atcacert_pem.h',['../a00317.html',1,'']]], - ['atcacert_5fread_5fcert_615',['atcacert_read_cert',['../a01453.html#a4fe33f1da468796b39c80a34e12411fb',1,'cryptoauthlib.atcacert.atcacert_read_cert()'],['../a01443.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01443.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fcert_5fext_616',['atcacert_read_cert_ext',['../a01443.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01443.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fcert_5fsize_617',['atcacert_read_cert_size',['../a01443.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01443.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fcert_5fsize_5fext_618',['atcacert_read_cert_size_ext',['../a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fdevice_5floc_619',['atcacert_read_device_loc',['../a01443.html#ga7eb1ce78d2efb60aa56b929577fa88d2',1,'atcacert_client.h']]], - ['atcacert_5fread_5fdevice_5floc_5fext_620',['atcacert_read_device_loc_ext',['../a01443.html#ga9d69be730c8bd7863588c43ebe58b225',1,'atcacert_client.h']]], - ['atcacert_5fread_5fsubj_5fkey_5fid_621',['atcacert_read_subj_key_id',['../a01443.html#ga7f12776448f02a8c9862c4af64537017',1,'atcacert_client.h']]], - ['atcacert_5fread_5fsubj_5fkey_5fid_5fext_622',['atcacert_read_subj_key_id_ext',['../a01443.html#gacb6ecab7acc06102caee5419a01bd803',1,'atcacert_client.h']]], - ['atcacert_5fstd_5fcert_5felement_5fe_623',['atcacert_std_cert_element_e',['../a01443.html#ga77184d0c71198b489ea9b57d07da824e',1,'atcacert_def.h']]], - ['atcacert_5fstd_5fcert_5felement_5ft_624',['atcacert_std_cert_element_t',['../a01443.html#ga70deb837a72574263e6fb0721d8e0616',1,'atcacert_std_cert_element_t(): atcacert_def.h'],['../a02196.html',1,'cryptoauthlib.atcacert.atcacert_std_cert_element_t']]], - ['atcacert_5ftm_5futc_5fs_625',['atcacert_tm_utc_s',['../a01588.html',1,'']]], - ['atcacert_5ftm_5futc_5ft_626',['atcacert_tm_utc_t',['../a01443.html#ga4a59e158244def2c79227aa244bd59c2',1,'atcacert_tm_utc_t(): atcacert_date.h'],['../a02224.html',1,'cryptoauthlib.atcacert.atcacert_tm_utc_t']]], - ['atcacert_5ftransform_5fe_627',['atcacert_transform_e',['../a01443.html#ga121ffde3250c4ca6947c680868aa6017',1,'atcacert_def.h']]], - ['atcacert_5ftransform_5ft_628',['atcacert_transform_t',['../a01443.html#ga249c2793a533c5487b5b7b935683a78f',1,'atcacert_transform_t(): atcacert_def.h'],['../a02188.html',1,'cryptoauthlib.atcacert.atcacert_transform_t']]], - ['atcacert_5fverify_5fcert_5fhw_629',['atcacert_verify_cert_hw',['../a01443.html#ga42939c26927fb65340ff1ebb2914a976',1,'atcacert_host_hw.h']]], - ['atcacert_5fverify_5fcert_5fsw_630',['atcacert_verify_cert_sw',['../a01443.html#ga5bad45c1fda32b7a57275af23ab0f626',1,'atcacert_host_sw.h']]], - ['atcacert_5fverify_5fresponse_5fhw_631',['atcacert_verify_response_hw',['../a01443.html#ga1441695a23776f3b38722e51fd3c36e3',1,'atcacert_host_hw.h']]], - ['atcacert_5fverify_5fresponse_5fsw_632',['atcacert_verify_response_sw',['../a01443.html#gab67e7a4c5899ef5402ff44f3f91d20b5',1,'atcacert_host_sw.h']]], - ['atcacert_5fwrite_5fcert_633',['atcacert_write_cert',['../a01453.html#a5c4d1755dfd9a2b378cd45f14de1f1ee',1,'cryptoauthlib.atcacert.atcacert_write_cert()'],['../a01443.html#gafa00725d50c68cfd2e0072bf563491a0',1,'atcacert_write_cert(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size): atcacert_client.h']]], - ['atcacert_5fwrite_5fcert_5fext_634',['atcacert_write_cert_ext',['../a01443.html#ga25a3291ce46841ca52346b42dc416485',1,'atcacert_client.h']]], - ['atcadevice_20_28atca_5f_29_635',['ATCADevice (atca_)',['../a01441.html',1,'']]], - ['atcadevicestate_636',['ATCADeviceState',['../a01441.html#ga765308123cf522f5ec8b528bf4ea1243',1,'atca_device.h']]], - ['atcadevicetype_637',['ATCADeviceType',['../a02460.html',1,'cryptoauthlib::iface']]], - ['atcaenum_638',['AtcaEnum',['../a02228.html',1,'cryptoauthlib::atcaenum']]], - ['atcah_5fcheck_5fmac_639',['ATCAH_CHECK_MAC',['../a00638.html#a063f7ad7678d60de756ef8526b9dfea1',1,'atca_host_config_check.h']]], - ['atcah_5fconfig_5fto_5fsign_5finternal_640',['ATCAH_CONFIG_TO_SIGN_INTERNAL',['../a00638.html#ae427973632a62dfd8f35709c21993190',1,'atca_host_config_check.h']]], - ['atcah_5fdecrypt_641',['ATCAH_DECRYPT',['../a00638.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b',1,'atca_host_config_check.h']]], - ['atcah_5fdelete_5fmac_642',['ATCAH_DELETE_MAC',['../a00638.html#acd2c32968024ddc7c650102a5076d70b',1,'atca_host_config_check.h']]], - ['atcah_5fderive_5fkey_643',['ATCAH_DERIVE_KEY',['../a00638.html#ada4b87726e822b6e94dcc18eefc39049',1,'atca_host_config_check.h']]], - ['atcah_5fderive_5fkey_5fmac_644',['ATCAH_DERIVE_KEY_MAC',['../a00638.html#a22a85235261861839a0db05649999ef5',1,'atca_host_config_check.h']]], - ['atcah_5fencode_5fcounter_5fmatch_645',['ATCAH_ENCODE_COUNTER_MATCH',['../a00638.html#a2ecb26546b49e369aeaf86bccf10a2e9',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5fkey_5fmsg_646',['ATCAH_GEN_KEY_MSG',['../a00638.html#a371384b4f8d818c31dee337aa4e24403',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5fmac_647',['ATCAH_GEN_MAC',['../a00638.html#a0f0e6c501c2dc57b4ed68fe29780b062',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5foutput_5fresp_5fmac_648',['ATCAH_GEN_OUTPUT_RESP_MAC',['../a00638.html#a70d0b80d637281693321866bd3c2735f',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5fsession_5fkey_649',['ATCAH_GEN_SESSION_KEY',['../a00638.html#aa5220706535f7367e06aa2aadebc0b57',1,'atca_host_config_check.h']]], - ['atcah_5fgendig_650',['ATCAH_GENDIG',['../a00638.html#aec5752be28ebfd8dc506bda7c36b9f7d',1,'atca_host_config_check.h']]], - ['atcah_5fgendivkey_651',['ATCAH_GENDIVKEY',['../a00638.html#af25240ee5ff347e1cf2768bfd513345f',1,'atca_host_config_check.h']]], - ['atcah_5fhmac_652',['ATCAH_HMAC',['../a00638.html#a6a86a40deff31dbaf005519aba627991',1,'atca_host_config_check.h']]], - ['atcah_5finclude_5fdata_653',['ATCAH_INCLUDE_DATA',['../a00638.html#a6442329f443943bbc8f3e10dde67930d',1,'atca_host_config_check.h']]], - ['atcah_5fio_5fdecrypt_654',['ATCAH_IO_DECRYPT',['../a00638.html#ae58a45ab173bf9ca7c4cdf4768fcf00e',1,'atca_host_config_check.h']]], - ['atcah_5fmac_655',['ATCAH_MAC',['../a00638.html#a33ac8a876197c7774452b7b46411f188',1,'atca_host_config_check.h']]], - ['atcah_5fnonce_656',['ATCAH_NONCE',['../a00638.html#a879c87175b07e859a15320e199a104a6',1,'atca_host_config_check.h']]], - ['atcah_5fprivwrite_5fauth_5fmac_657',['ATCAH_PRIVWRITE_AUTH_MAC',['../a00638.html#a13ed9a07ad5f74cfb67b7582c1b638a3',1,'atca_host_config_check.h']]], - ['atcah_5fsecureboot_5fenc_658',['ATCAH_SECUREBOOT_ENC',['../a00638.html#a745b85254a910c7d8edbea41ab927cf4',1,'atca_host_config_check.h']]], - ['atcah_5fsecureboot_5fmac_659',['ATCAH_SECUREBOOT_MAC',['../a00638.html#aa1d0ffc3e79f52154b2e362b74b7b112',1,'atca_host_config_check.h']]], - ['atcah_5fsha256_660',['ATCAH_SHA256',['../a00638.html#a58d2f9f20485ae35c2208f3bce5cb4a7',1,'atca_host_config_check.h']]], - ['atcah_5fsign_5finternal_5fmsg_661',['ATCAH_SIGN_INTERNAL_MSG',['../a00638.html#ad2e1b57a0f8a5dc87427b1eca18ac02f',1,'atca_host_config_check.h']]], - ['atcah_5fverify_5fmac_662',['ATCAH_VERIFY_MAC',['../a00638.html#a1515a97abca19263c1cf16dcbdd01944',1,'atca_host_config_check.h']]], - ['atcah_5fwrite_5fauth_5fmac_663',['ATCAH_WRITE_AUTH_MAC',['../a00638.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0',1,'atca_host_config_check.h']]], - ['atcahal_5ft_664',['ATCAHAL_t',['../a01580.html',1,'']]], - ['atcai2cmaster_665',['atcaI2Cmaster',['../a01660.html',1,'']]], - ['atcai2cmaster_5ft_666',['ATCAI2CMaster_t',['../a01446.html#ga06b19a932aea9cf3a5165fefacb24f7b',1,'hal_uc3_i2c_asf.h']]], - ['atcaiface_20_28atca_5f_29_667',['ATCAIface (atca_)',['../a01442.html',1,'']]], - ['atcaifacecfg_668',['ATCAIfaceCfg',['../a01516.html',1,'ATCAIfaceCfg'],['../a02500.html',1,'cryptoauthlib.iface.ATCAIfaceCfg']]], - ['atcaifacetype_669',['ATCAIfaceType',['../a01442.html#gac7f674d4a0afb12d2f3c9c5e98cb1089',1,'ATCAIfaceType(): atca_iface.h'],['../a02452.html',1,'cryptoauthlib.iface.ATCAIfaceType']]], - ['atcakittype_670',['ATCAKitType',['../a02456.html',1,'cryptoauthlib::iface']]], - ['atcalccrc_671',['atCalcCrc',['../a00350.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c'],['../a00347.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c']]], - ['atcapacket_672',['ATCAPacket',['../a01620.html',1,'']]], - ['atcareference_673',['AtcaReference',['../a02504.html',1,'cryptoauthlib::library']]], - ['atcastructure_674',['AtcaStructure',['../a02516.html',1,'cryptoauthlib::library']]], - ['atcaswimaster_675',['atcaSWImaster',['../a01688.html',1,'']]], - ['atcaswimaster_5ft_676',['ATCASWIMaster_t',['../a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_start.h'],['../a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_samd21_asf.h']]], - ['atcaunion_677',['AtcaUnion',['../a02512.html',1,'cryptoauthlib::library']]], - ['atcheckcrc_678',['atCheckCrc',['../a00350.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c'],['../a00347.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c']]], - ['atcontrol_679',['atcontrol',['../a01442.html#ga324cef45a35e02b387001afdc9092778',1,'atca_iface.c']]], - ['atcrc_680',['atCRC',['../a00347.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c'],['../a00350.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c']]], - ['atecc508a_5fconfig_5fs_681',['atecc508a_config_s',['../a01628.html',1,'']]], - ['atecc508aconfig_682',['Atecc508aConfig',['../a02300.html',1,'cryptoauthlib::device']]], - ['atecc608_5fconfig_5fs_683',['atecc608_config_s',['../a01632.html',1,'']]], - ['atecc608config_684',['Atecc608Config',['../a02304.html',1,'cryptoauthlib::device']]], - ['atgetiface_685',['atGetIFace',['../a01441.html#ga3f98e29cffa06446fc91b329703606af',1,'atca_device.c']]], - ['atgetifacecfg_686',['atgetifacecfg',['../a01442.html#gac88ba81abfd42df65c6c0c64414dfc6e',1,'atca_iface.c']]], - ['atgetifacehaldat_687',['atgetifacehaldat',['../a01442.html#ga5e4163b8882d4eb42d4d5191c8731da0',1,'atca_iface.c']]], - ['atidle_688',['atidle',['../a01442.html#gac794fffe040e6d47a34c756720f3cbea',1,'atca_iface.c']]], - ['atinfo_689',['atInfo',['../a00347.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00350.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], - ['atinit_690',['atinit',['../a01442.html#ga386353e8700eec35e4548dfa29f13b8d',1,'atca_iface.c']]], - ['atiseccfamily_691',['atIsECCFamily',['../a00347.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c'],['../a00350.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c']]], - ['atisshafamily_692',['atIsSHAFamily',['../a00347.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c'],['../a00350.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c']]], - ['atpause_693',['atPause',['../a00347.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00350.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], - ['atreceive_694',['atreceive',['../a01442.html#ga01badea388343bdf5929c5c2be9f426b',1,'atca_iface.c']]], - ['atsend_695',['atsend',['../a01442.html#gabd4f20b06efedede6bc4a836cfad8f38',1,'atca_iface.c']]], - ['atsha204a_696',['ATSHA204A',['../a01441.html#ga054acfe7d4dd4064f9d27a9ea7fc2337',1,'atca_devtypes.h']]], - ['atsha204a_5fconfig_5fs_697',['atsha204a_config_s',['../a01624.html',1,'']]], - ['atsha204aconfig_698',['Atsha204aConfig',['../a02296.html',1,'cryptoauthlib::device']]], - ['atsleep_699',['atsleep',['../a01442.html#gac06336335e5f3191e3b1fc06d2830d96',1,'atca_iface.c']]], - ['attrib_5ff_700',['attrib_f',['../a00677.html#ac11a80ac0cea6f244191654180db0693',1,'pkcs11_attrib.h']]], - ['attributes_701',['attributes',['../a01852.html#afbc894d3ed866954b79e43b30031f293',1,'pkcs11_object_s']]], - ['attributes_20_28pkcs11_5fattrib_5f_29_702',['Attributes (pkcs11_attrib_)',['../a01450.html',1,'']]], - ['atwake_703',['atwake',['../a01442.html#ga32693c852341e1b946bab3cca5f71761',1,'atca_iface.c']]], - ['auth_5fmac_704',['auth_mac',['../a01736.html#aaa57ce590925c0efe017af1d4457d479',1,'atca_write_mac_in_out']]] + ['assertionfailure_20',['AssertionFailure',['../a02451.html',1,'cryptoauthlib::exceptions']]], + ['atca_5faddress_5fmask_21',['ATCA_ADDRESS_MASK',['../a00356.html#a579676fd500ded40bc49dc53231fa658',1,'calib_command.h']]], + ['atca_5faddress_5fmask_5fconfig_22',['ATCA_ADDRESS_MASK_CONFIG',['../a00356.html#a32d53cee52cd042a31f1adc934ad7a5a',1,'calib_command.h']]], + ['atca_5faddress_5fmask_5fotp_23',['ATCA_ADDRESS_MASK_OTP',['../a00356.html#a56e3f8d816e2068d80003fdee7d58763',1,'calib_command.h']]], + ['atca_5faes_24',['ATCA_AES',['../a00356.html#a4edf9367ffdc790e886166890fc814c1',1,'calib_command.h']]], + ['atca_5faes_5fcbc_5fctx_25',['atca_aes_cbc_ctx',['../a02179.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fcbcmac_5fctx_26',['atca_aes_cbcmac_ctx',['../a02203.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fccm_5fctx_27',['atca_aes_ccm_ctx',['../a02199.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fcmac_5fctx_28',['atca_aes_cmac_ctx',['../a02183.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fctr_5fctx_29',['atca_aes_ctr_ctx',['../a02187.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fgcm_5fctx_30',['atca_aes_gcm_ctx',['../a02195.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fgfm_5fsize_31',['ATCA_AES_GFM_SIZE',['../a00356.html#a6ce84aad51d25e05139f83ac9ca2b162',1,'calib_command.h']]], + ['atca_5faes_5fkey_5ftype_32',['ATCA_AES_KEY_TYPE',['../a00356.html#a8335b06c5f49c384e2c2f31861865a54',1,'calib_command.h']]], + ['atca_5falloc_5ffailure_33',['ATCA_ALLOC_FAILURE',['../a00269.html#aa17bd20787fa8dcde44983f25c00d80b',1,'atca_status.h']]], + ['atca_5fassert_5ffailure_34',['ATCA_ASSERT_FAILURE',['../a00269.html#abb19bd83c35f7194c30e913a3d4b4137',1,'atca_status.h']]], + ['atca_5fb283_5fkey_5ftype_35',['ATCA_B283_KEY_TYPE',['../a00356.html#a16f1550cc792fa205acef2106f2fcf54',1,'calib_command.h']]], + ['atca_5fbad_5fopcode_36',['ATCA_BAD_OPCODE',['../a00269.html#a3d393762ff34c052e12509e79d54415f',1,'atca_status.h']]], + ['atca_5fbad_5fparam_37',['ATCA_BAD_PARAM',['../a00269.html#a22c74ba87b45d105867f93c97b6dbe04',1,'atca_status.h']]], + ['atca_5fbasic_2ec_38',['atca_basic.c',['../a00227.html',1,'']]], + ['atca_5fbasic_2eh_39',['atca_basic.h',['../a00230.html',1,'']]], + ['atca_5fblock_5fsize_40',['ATCA_BLOCK_SIZE',['../a00356.html#aa0117f3d3f9a9ae65a3fab1e68b7caef',1,'calib_command.h']]], + ['atca_5fca2_5fconfig_5fsize_41',['ATCA_CA2_CONFIG_SIZE',['../a00356.html#a80e6b848030f81d90fbad16844105612',1,'calib_command.h']]], + ['atca_5fca2_5fconfig_5fslot_5fsize_42',['ATCA_CA2_CONFIG_SLOT_SIZE',['../a00356.html#a3bf3b2b477944691143db26f205e7d7f',1,'calib_command.h']]], + ['atca_5fcfgs_2ec_43',['atca_cfgs.c',['../a00233.html',1,'']]], + ['atca_5fcfgs_2eh_44',['atca_cfgs.h',['../a00236.html',1,'']]], + ['atca_5fcheck_5finvalid_5fmsg_45',['ATCA_CHECK_INVALID_MSG',['../a00815.html#a2593f45dcf42602b3c334dccb9c52395',1,'atca_config_check.h']]], + ['atca_5fcheck_5fmac_5fin_5fout_46',['atca_check_mac_in_out',['../a01771.html',1,'']]], + ['atca_5fcheck_5fmac_5fin_5fout_5ft_47',['atca_check_mac_in_out_t',['../a01474.html#ga62321bafeb0a9dd7c4ce657ece10109f',1,'atca_host.h']]], + ['atca_5fcheckmac_48',['ATCA_CHECKMAC',['../a00356.html#a1f9bb707789dc9194b06403113c9dfaf',1,'calib_command.h']]], + ['atca_5fcheckmac_5fverify_5ffailed_49',['ATCA_CHECKMAC_VERIFY_FAILED',['../a00269.html#afe80ac4fce5d1f8edd75a218362779ec',1,'atca_status.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fm0_50',['ATCA_CHIPMODE_CLOCK_DIV_M0',['../a00356.html#abe16121ea22ed08080997a2cfae1c125',1,'calib_command.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fm1_51',['ATCA_CHIPMODE_CLOCK_DIV_M1',['../a00356.html#aabaee03887c7e4403ac4936d9cde406e',1,'calib_command.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fm2_52',['ATCA_CHIPMODE_CLOCK_DIV_M2',['../a00356.html#a84f7e63b8711e799da259862b170fd75',1,'calib_command.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fmask_53',['ATCA_CHIPMODE_CLOCK_DIV_MASK',['../a00356.html#a09ab7fb893534775d506020643820939',1,'calib_command.h']]], + ['atca_5fchipmode_5fi2c_5faddress_5fflag_54',['ATCA_CHIPMODE_I2C_ADDRESS_FLAG',['../a00356.html#a74a13b4b6304a02b4e006901b6ac1de5',1,'calib_command.h']]], + ['atca_5fchipmode_5foffset_55',['ATCA_CHIPMODE_OFFSET',['../a00356.html#a6eaf90b702c122de71a18a9b2bd43ba7',1,'calib_command.h']]], + ['atca_5fchipmode_5fttl_5fenable_5fflag_56',['ATCA_CHIPMODE_TTL_ENABLE_FLAG',['../a00356.html#a10795619d6fb78965b7e78996261f6cd',1,'calib_command.h']]], + ['atca_5fchipmode_5fwatchdog_5flong_57',['ATCA_CHIPMODE_WATCHDOG_LONG',['../a00356.html#a9a089181beb38a1e5c5add58e96302bc',1,'calib_command.h']]], + ['atca_5fchipmode_5fwatchdog_5fmask_58',['ATCA_CHIPMODE_WATCHDOG_MASK',['../a00356.html#a814ad478cb05af339635633cbcd495b7',1,'calib_command.h']]], + ['atca_5fchipmode_5fwatchdog_5fshort_59',['ATCA_CHIPMODE_WATCHDOG_SHORT',['../a00356.html#ab2c08e9a862fce29e741ef2b75918a8e',1,'calib_command.h']]], + ['atca_5fcmd_5fsize_5fmax_60',['ATCA_CMD_SIZE_MAX',['../a00356.html#a3f7b636ed69136b5e5aa6d172cfd34e9',1,'calib_command.h']]], + ['atca_5fcmd_5fsize_5fmin_61',['ATCA_CMD_SIZE_MIN',['../a00356.html#ac978ae798bc2c020c7b8a2e5a258016e',1,'calib_command.h']]], + ['atca_5fcomm_5ffail_62',['ATCA_COMM_FAIL',['../a00269.html#ae9dd0fe8e48163ddf047629aeb8820e6',1,'atca_status.h']]], + ['atca_5fcompiler_2eh_63',['atca_compiler.h',['../a00239.html',1,'']]], + ['atca_5fconfig_5fcheck_2eh_64',['atca_config_check.h',['../a00815.html',1,'']]], + ['atca_5fcount_5fidx_65',['ATCA_COUNT_IDX',['../a00356.html#a0aac7fbfd425112b4b1e922876532a9e',1,'calib_command.h']]], + ['atca_5fcount_5fsize_66',['ATCA_COUNT_SIZE',['../a00356.html#ad410516c4b4eb448a333eb3ed1f7b288',1,'calib_command.h']]], + ['atca_5fcounter_67',['ATCA_COUNTER',['../a00356.html#a9599c4331857f1daa543a31fcce650fd',1,'calib_command.h']]], + ['atca_5fcrc_5fsize_68',['ATCA_CRC_SIZE',['../a00356.html#a276faf364bbb0e27819842111e08842f',1,'calib_command.h']]], + ['atca_5fcrypto_5faes_5fcmac_5fen_69',['ATCA_CRYPTO_AES_CMAC_EN',['../a00506.html#a112f8346894949beab73635af3851822',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5faes_5fgcm_5fen_70',['ATCA_CRYPTO_AES_GCM_EN',['../a00506.html#a51c0870d3a917ac80f7a786feceeba57',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fhw_5faes_2eh_71',['atca_crypto_hw_aes.h',['../a00458.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fcbc_2ec_72',['atca_crypto_hw_aes_cbc.c',['../a00461.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fcbcmac_2ec_73',['atca_crypto_hw_aes_cbcmac.c',['../a00464.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fccm_2ec_74',['atca_crypto_hw_aes_ccm.c',['../a00467.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fcmac_2ec_75',['atca_crypto_hw_aes_cmac.c',['../a00470.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fctr_2ec_76',['atca_crypto_hw_aes_ctr.c',['../a00473.html',1,'']]], + ['atca_5fcrypto_5fpad_2ec_77',['atca_crypto_pad.c',['../a00476.html',1,'']]], + ['atca_5fcrypto_5fpbkdf2_2ec_78',['atca_crypto_pbkdf2.c',['../a00479.html',1,'']]], + ['atca_5fcrypto_5fsha1_5fen_79',['ATCA_CRYPTO_SHA1_EN',['../a00506.html#a2e5e1b4f8da8d151569d6ff0133b43ec',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha256_5fen_80',['ATCA_CRYPTO_SHA256_EN',['../a00506.html#ace1877f29888c93a210f571fc4eff7ee',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha2_5fen_81',['ATCA_CRYPTO_SHA2_EN',['../a00506.html#aff63a86885856fcc093664f27af75f27',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha2_5fhmac_5fctr_5fen_82',['ATCA_CRYPTO_SHA2_HMAC_CTR_EN',['../a00506.html#a5a3020c4884811361247f771da67b9a5',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha2_5fhmac_5fen_83',['ATCA_CRYPTO_SHA2_HMAC_EN',['../a00506.html#a18071ade62f5d4b39e444ca87548e31e',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha384_5fen_84',['ATCA_CRYPTO_SHA384_EN',['../a00506.html#a98bc86a602a329edb27388de020d6282',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha512_5fen_85',['ATCA_CRYPTO_SHA512_EN',['../a00506.html#a80bccf213793f64bc90bb751ef12da3a',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsw_2eh_86',['atca_crypto_sw.h',['../a00482.html',1,'']]], + ['atca_5fcrypto_5fsw_5faes_5fcmac_2ec_87',['atca_crypto_sw_aes_cmac.c',['../a00485.html',1,'']]], + ['atca_5fcrypto_5fsw_5faes_5fgcm_2ec_88',['atca_crypto_sw_aes_gcm.c',['../a00488.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha1_2ec_89',['atca_crypto_sw_sha1.c',['../a00491.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha1_2eh_90',['atca_crypto_sw_sha1.h',['../a00494.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha2_2ec_91',['atca_crypto_sw_sha2.c',['../a00497.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha2_2eh_92',['atca_crypto_sw_sha2.h',['../a00500.html',1,'']]], + ['atca_5fcustom_5fiface_93',['ATCA_CUSTOM_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d',1,'atca_iface.h']]], + ['atca_5fdata_5fidx_94',['ATCA_DATA_IDX',['../a00356.html#a756539af7bcadf33dd3a9b2f60763f7a',1,'calib_command.h']]], + ['atca_5fdata_5fsize_95',['ATCA_DATA_SIZE',['../a00356.html#a0b96c7eee244d44c648245421745db12',1,'calib_command.h']]], + ['atca_5fdebug_2ec_96',['atca_debug.c',['../a00245.html',1,'']]], + ['atca_5fdecrypt_5fin_5fout_97',['atca_decrypt_in_out',['../a01767.html',1,'']]], + ['atca_5fdelay_5f10us_98',['atca_delay_10us',['../a01473.html#ga19891182689551cc3a88603135959351',1,'hal_sam_timer_asf.c']]], + ['atca_5fdelay_5fms_99',['atca_delay_ms',['../a01473.html#ga0544f36422b5e9a8890fb9c90fc5eb55',1,'hal_sam_timer_asf.c']]], + ['atca_5fdelay_5fus_100',['atca_delay_us',['../a01473.html#ga7598dfcd6dcac882836544d48356d02f',1,'hal_sam_timer_asf.c']]], + ['atca_5fdelete_101',['ATCA_DELETE',['../a00356.html#a69f659af2d835a38a13650b26a5e36d4',1,'calib_command.h']]], + ['atca_5fdelete_5fin_5fout_102',['atca_delete_in_out',['../a01795.html',1,'']]], + ['atca_5fdelete_5fin_5fout_5ft_103',['atca_delete_in_out_t',['../a01474.html#ga4ea861d041b787c766e9a19a0f11421c',1,'atca_host.h']]], + ['atca_5fderive_5fkey_104',['ATCA_DERIVE_KEY',['../a00356.html#ac9405ff4647b09a6d8ab7a4d8a091ee8',1,'calib_command.h']]], + ['atca_5fderive_5fkey_5fin_5fout_105',['atca_derive_key_in_out',['../a01759.html',1,'']]], + ['atca_5fderive_5fkey_5fmac_5fin_5fout_106',['atca_derive_key_mac_in_out',['../a01763.html',1,'']]], + ['atca_5fdevice_107',['atca_device',['../a01531.html',1,'']]], + ['atca_5fdevice_2ec_108',['atca_device.c',['../a00251.html',1,'']]], + ['atca_5fdevice_2eh_109',['atca_device.h',['../a00254.html',1,'']]], + ['atca_5fdevtypes_2eh_110',['atca_devtypes.h',['../a00818.html',1,'']]], + ['atca_5fdiversified_5fkey_5fin_5fout_111',['atca_diversified_key_in_out',['../a01751.html',1,'']]], + ['atca_5fdiversified_5fkey_5fin_5fout_5ft_112',['atca_diversified_key_in_out_t',['../a01474.html#gae9784404fbe619217879d5d12261c2b8',1,'atca_host.h']]], + ['atca_5fecc_5fconfig_5fsize_113',['ATCA_ECC_CONFIG_SIZE',['../a00356.html#ae8b9077022cc706947fdc8b45a573d81',1,'calib_command.h']]], + ['atca_5fecdh_114',['ATCA_ECDH',['../a00356.html#a06c1c02df3023d78b6b224060966460f',1,'calib_command.h']]], + ['atca_5fevp_5fctx_115',['atca_evp_ctx',['../a01827.html',1,'']]], + ['atca_5fexecution_5ferror_116',['ATCA_EXECUTION_ERROR',['../a00269.html#a889853cfab2a19aa22c00d0d19c87bcc',1,'atca_status.h']]], + ['atca_5ffunc_5ffail_117',['ATCA_FUNC_FAIL',['../a00269.html#a962730477dba3c48a84629c23a0e4a13',1,'atca_status.h']]], + ['atca_5fgen_5fdig_5fin_5fout_118',['atca_gen_dig_in_out',['../a01747.html',1,'']]], + ['atca_5fgen_5fdig_5fin_5fout_5ft_119',['atca_gen_dig_in_out_t',['../a01474.html#ga572abeaaabf22c386ebcba19b4f6236c',1,'atca_host.h']]], + ['atca_5fgen_5ffail_120',['ATCA_GEN_FAIL',['../a00269.html#aa1cd2b6470db000dd151f2a092f41edf',1,'atca_status.h']]], + ['atca_5fgen_5fkey_5fin_5fout_121',['atca_gen_key_in_out',['../a01783.html',1,'']]], + ['atca_5fgen_5fkey_5fin_5fout_5ft_122',['atca_gen_key_in_out_t',['../a01474.html#gada8cf14261301ec18458cbcbbe3d9b32',1,'atca_host.h']]], + ['atca_5fgendig_123',['ATCA_GENDIG',['../a00356.html#a37e24393c3e995d47a09ad962b6b83de',1,'calib_command.h']]], + ['atca_5fgenkey_124',['ATCA_GENKEY',['../a00356.html#a17f002359b157bee44a3c071a5a206db',1,'calib_command.h']]], + ['atca_5fhal_2ec_125',['atca_hal.c',['../a00527.html',1,'']]], + ['atca_5fhal_2eh_126',['atca_hal.h',['../a00530.html',1,'']]], + ['atca_5fhal_5fchange_5fbaud_127',['ATCA_HAL_CHANGE_BAUD',['../a01473.html#ga6c3c5f6f46d99838464be80796088baa',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5fdeselect_128',['ATCA_HAL_CONTROL_DESELECT',['../a01473.html#ga20f197858c01f040ca70cad589fcdabc',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5fdirection_129',['ATCA_HAL_CONTROL_DIRECTION',['../a01473.html#gae2eb00133330119dd9c73d6c5d9fd8dd',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5fidle_130',['ATCA_HAL_CONTROL_IDLE',['../a01473.html#ga3c8d531ea7b725debf75cbbd851f92a0',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5freset_131',['ATCA_HAL_CONTROL_RESET',['../a01473.html#ga1236f6d20d3f9402af1f5c3f1adc98e3',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5fselect_132',['ATCA_HAL_CONTROL_SELECT',['../a01473.html#gafb82c723c3d22673ebf65f89497d2e99',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5fsleep_133',['ATCA_HAL_CONTROL_SLEEP',['../a01473.html#gaa7f16d0fbd30e35a1a233166f6f59d06',1,'atca_hal.h']]], + ['atca_5fhal_5fcontrol_5fwake_134',['ATCA_HAL_CONTROL_WAKE',['../a01473.html#ga6e1cf53d19f95ce1bcee622e8176b8a9',1,'atca_hal.h']]], + ['atca_5fhal_5fflush_5fbuffer_135',['ATCA_HAL_FLUSH_BUFFER',['../a01473.html#ga61fae4f7c3849b77ae33e767e137032d',1,'atca_hal.h']]], + ['atca_5fhal_5fkit_5fphy_5ft_136',['atca_hal_kit_phy_t',['../a01671.html',1,'']]], + ['atca_5fhal_5flist_5fentry_5ft_137',['atca_hal_list_entry_t',['../a01667.html',1,'']]], + ['atca_5fhal_5fshm_5ft_138',['atca_hal_shm_t',['../a01675.html',1,'']]], + ['atca_5fhealth_5ftest_5ferror_139',['ATCA_HEALTH_TEST_ERROR',['../a00269.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5',1,'atca_status.h']]], + ['atca_5fhelpers_2ec_140',['atca_helpers.c',['../a00257.html',1,'']]], + ['atca_5fhelpers_2eh_141',['atca_helpers.h',['../a00260.html',1,'']]], + ['atca_5fhid_5fiface_142',['ATCA_HID_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1',1,'atca_iface.h']]], + ['atca_5fhmac_143',['ATCA_HMAC',['../a00356.html#a36122a4f84ec0c31330c3c0458304029',1,'calib_command.h']]], + ['atca_5fhmac_5fin_5fout_144',['atca_hmac_in_out',['../a01743.html',1,'']]], + ['atca_5fhmac_5fsha256_5fctx_145',['atca_hmac_sha256_ctx',['../a02207.html',1,'cryptoauthlib::atcab']]], + ['atca_5fhost_2ec_146',['atca_host.c',['../a00647.html',1,'']]], + ['atca_5fhost_2eh_147',['atca_host.h',['../a00650.html',1,'']]], + ['atca_5fhost_5fconfig_5fcheck_2eh_148',['atca_host_config_check.h',['../a00653.html',1,'']]], + ['atca_5fi2c_5fgpio_5fiface_149',['ATCA_I2C_GPIO_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e',1,'atca_iface.h']]], + ['atca_5fi2c_5fhost_5fs_150',['atca_i2c_host_s',['../a01687.html',1,'']]], + ['atca_5fi2c_5fiface_151',['ATCA_I2C_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb',1,'atca_iface.h']]], + ['atca_5fiface_152',['atca_iface',['../a01607.html',1,'']]], + ['atca_5fiface_2ec_153',['atca_iface.c',['../a00821.html',1,'']]], + ['atca_5fiface_2eh_154',['atca_iface.h',['../a00263.html',1,'']]], + ['atca_5fiface_5fget_5fretries_155',['atca_iface_get_retries',['../a01469.html#ga349718dea5d5b558766a31b7dcd7e811',1,'atca_iface.c']]], + ['atca_5fiface_5fget_5fwake_5fdelay_156',['atca_iface_get_wake_delay',['../a01469.html#ga128f54833b5ed2105dae417333e1d651',1,'atca_iface.c']]], + ['atca_5fiface_5fis_5fkit_157',['atca_iface_is_kit',['../a01469.html#gacb09a6fa845efade7d47796bead14d2c',1,'atca_iface.c']]], + ['atca_5fiface_5fis_5fswi_158',['atca_iface_is_swi',['../a01469.html#gad2276d5ebd02613fbeda8ae15b679d1e',1,'atca_iface.c']]], + ['atca_5fiface_5ft_159',['atca_iface_t',['../a01469.html#gaa9323be08c4d757019e9863d9a7fb6b1',1,'atca_iface.h']]], + ['atca_5finclude_5fdata_5fin_5fout_160',['atca_include_data_in_out',['../a01715.html',1,'']]], + ['atca_5finfo_161',['ATCA_INFO',['../a00356.html#a0e74f12b91b93e683f27fb8b4c0bfb2f',1,'calib_command.h']]], + ['atca_5finvalid_5fid_162',['ATCA_INVALID_ID',['../a00269.html#a9fd83db4807d846db39ffe92925dc939',1,'atca_status.h']]], + ['atca_5finvalid_5fsize_163',['ATCA_INVALID_SIZE',['../a00269.html#a90fced83678233feeb83da9e73579484',1,'atca_status.h']]], + ['atca_5fio_5fdecrypt_5fin_5fout_164',['atca_io_decrypt_in_out',['../a01723.html',1,'']]], + ['atca_5fjwt_2ec_165',['atca_jwt.c',['../a00656.html',1,'']]], + ['atca_5fjwt_2eh_166',['atca_jwt.h',['../a00659.html',1,'']]], + ['atca_5fk283_5fkey_5ftype_167',['ATCA_K283_KEY_TYPE',['../a00356.html#aac4e75cf70cf0cf946216ffefaf65525',1,'calib_command.h']]], + ['atca_5fkdf_168',['ATCA_KDF',['../a00356.html#a1c0632a1eabc73aaebcb4c7f265b8a00',1,'calib_command.h']]], + ['atca_5fkey_5fcount_169',['ATCA_KEY_COUNT',['../a00356.html#afa043ddb1952520a2bba28ac41a98f93',1,'calib_command.h']]], + ['atca_5fkey_5fid_5fmax_170',['ATCA_KEY_ID_MAX',['../a00356.html#a5da5f8005c1b2612b998afcbd823c716',1,'calib_command.h']]], + ['atca_5fkey_5fsize_171',['ATCA_KEY_SIZE',['../a00356.html#a66a410dde8f388c582495ba315284276',1,'calib_command.h']]], + ['atca_5fkit_5fiface_172',['ATCA_KIT_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9',1,'atca_iface.h']]], + ['atca_5flock_173',['ATCA_LOCK',['../a00356.html#ac227802d9a5680688ac4c2b23b38273c',1,'calib_command.h']]], + ['atca_5flocked_174',['ATCA_LOCKED',['../a00356.html#af397e129e4581162f91873358b5f1538',1,'calib_command.h']]], + ['atca_5fmac_175',['ATCA_MAC',['../a00356.html#aa0843d9ec7e246455483a1fb1fdf3a07',1,'calib_command.h']]], + ['atca_5fmac_5fin_5fout_176',['atca_mac_in_out',['../a01739.html',1,'']]], + ['atca_5fmbedtls_5fecdh_5fioprot_5fcb_177',['atca_mbedtls_ecdh_ioprot_cb',['../a01476.html#gaa35682dc98e33ce3d6fad1fc902cdff0',1,'atca_mbedtls_wrap.h']]], + ['atca_5fmbedtls_5fecdh_5fslot_5fcb_178',['atca_mbedtls_ecdh_slot_cb',['../a01476.html#ga98d684683ccecd3d56bdf5dc27ae999c',1,'atca_mbedtls_wrap.h']]], + ['atca_5fmbedtls_5feckey_5fs_179',['atca_mbedtls_eckey_s',['../a01823.html',1,'']]], + ['atca_5fmbedtls_5feckey_5ft_180',['atca_mbedtls_eckey_t',['../a01476.html#ga36d21431afe595eab1b7f7a2330ad727',1,'atca_mbedtls_wrap.h']]], + ['atca_5fmbedtls_5finterface_2eh_181',['atca_mbedtls_interface.h',['../a00668.html',1,'']]], + ['atca_5fmbedtls_5fpk_5finit_182',['atca_mbedtls_pk_init',['../a01476.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01476.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], + ['atca_5fmbedtls_5fpk_5finit_5fext_183',['atca_mbedtls_pk_init_ext',['../a01476.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01476.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], + ['atca_5fmbedtls_5fwrap_2ec_184',['atca_mbedtls_wrap.c',['../a00671.html',1,'']]], + ['atca_5fmsg_5fsize_5fdelete_5fmac_185',['ATCA_MSG_SIZE_DELETE_MAC',['../a01474.html#ga15a78dd66644866b65cd5eda8b1a30d0',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fderive_5fkey_186',['ATCA_MSG_SIZE_DERIVE_KEY',['../a01474.html#ga1f445a11e4da099fec31efd43eadc234',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fderive_5fkey_5fmac_187',['ATCA_MSG_SIZE_DERIVE_KEY_MAC',['../a01474.html#ga4ef7d31c60616cf5177f415e32607d10',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fdiversified_5fkey_188',['ATCA_MSG_SIZE_DIVERSIFIED_KEY',['../a01474.html#gab2891a03e978d463823775bc1161a06e',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fencrypt_5fmac_189',['ATCA_MSG_SIZE_ENCRYPT_MAC',['../a01474.html#gafd8064c07a5f22cdb087c88e1b87c1be',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fgen_5fdig_190',['ATCA_MSG_SIZE_GEN_DIG',['../a01474.html#ga656372cab66beeb5a333e9a33e342017',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fmac_191',['ATCA_MSG_SIZE_MAC',['../a01474.html#ga2b5993f5b7254d8c6e50794824cf47b6',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fnonce_192',['ATCA_MSG_SIZE_NONCE',['../a01474.html#gaebdc2d83274268bb48fc45e87aef38af',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fprivwrite_5fmac_193',['ATCA_MSG_SIZE_PRIVWRITE_MAC',['../a01474.html#ga1039bfbe7e13d614814341bdee6afa7b',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fresponse_5fmac_194',['ATCA_MSG_SIZE_RESPONSE_MAC',['../a01474.html#ga6d3a4804abc8a467154d5abd744c0cea',1,'atca_host.h']]], + ['atca_5fmsg_5fsize_5fsession_5fkey_195',['ATCA_MSG_SIZE_SESSION_KEY',['../a01474.html#ga56b92d82ffddbd86c99107b12043f8db',1,'atca_host.h']]], + ['atca_5fno_5fdevices_196',['ATCA_NO_DEVICES',['../a00269.html#a652c8fbaca046330679929610433b987',1,'atca_status.h']]], + ['atca_5fnonce_197',['ATCA_NONCE',['../a00356.html#a232e4a2b3f189cc2c3594ce5f18da3aa',1,'calib_command.h']]], + ['atca_5fnonce_5fin_5fout_198',['atca_nonce_in_out',['../a01719.html',1,'']]], + ['atca_5fnot_5finitialized_199',['ATCA_NOT_INITIALIZED',['../a00269.html#ace96e4c864044972f87aef44e8d106ec',1,'atca_status.h']]], + ['atca_5fnot_5flocked_200',['ATCA_NOT_LOCKED',['../a00269.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3',1,'atca_status.h']]], + ['atca_5fopcode_5fidx_201',['ATCA_OPCODE_IDX',['../a00356.html#a15c3e02dd629f85722f4b74e61f3adca',1,'calib_command.h']]], + ['atca_5fopenssl_5finterface_2ec_202',['atca_openssl_interface.c',['../a00677.html',1,'']]], + ['atca_5fopenssl_5finterface_2eh_203',['atca_openssl_interface.h',['../a00680.html',1,'']]], + ['atca_5fotp_5fblock_5fmax_204',['ATCA_OTP_BLOCK_MAX',['../a00356.html#aa0eacfa4e596c3eb572753b7f5171276',1,'calib_command.h']]], + ['atca_5fotp_5fsize_205',['ATCA_OTP_SIZE',['../a00356.html#a4c05f7bd221df19c5c6ad1fe1f4709be',1,'calib_command.h']]], + ['atca_5fp256_5fkey_5ftype_206',['ATCA_P256_KEY_TYPE',['../a00356.html#a6e53cd97c61a185ca397ebed8dc3edcb',1,'calib_command.h']]], + ['atca_5fpacket_5foverhead_207',['ATCA_PACKET_OVERHEAD',['../a00356.html#aa569255bc251cd90cb2d0f6b710164bc',1,'calib_command.h']]], + ['atca_5fparam1_5fidx_208',['ATCA_PARAM1_IDX',['../a00356.html#a090c04fed9d153a97fb77195c7eb2f56',1,'calib_command.h']]], + ['atca_5fparam2_5fidx_209',['ATCA_PARAM2_IDX',['../a00356.html#a9e84a71fc7e3ba613779aeb8d740eb23',1,'calib_command.h']]], + ['atca_5fparity_5ferror_210',['ATCA_PARITY_ERROR',['../a00269.html#a2fefd4147dcde6662dc2bae6adb61237',1,'atca_status.h']]], + ['atca_5fparse_5ferror_211',['ATCA_PARSE_ERROR',['../a00269.html#a54b00d87ad3367d281df208661352063',1,'atca_status.h']]], + ['atca_5fpause_212',['ATCA_PAUSE',['../a00356.html#a7d786006183912073939b3f62075dd27',1,'calib_command.h']]], + ['atca_5fplatform_2eh_213',['atca_platform.h',['../a00266.html',1,'']]], + ['atca_5fpriv_5fkey_5fsize_214',['ATCA_PRIV_KEY_SIZE',['../a00356.html#a3caf91c8e7ec183e0ad7b93dad9cb548',1,'calib_command.h']]], + ['atca_5fprivwrite_215',['ATCA_PRIVWRITE',['../a00356.html#a3171c7ab4447a2e752706bed1072e694',1,'calib_command.h']]], + ['atca_5fpub_5fkey_5fpad_216',['ATCA_PUB_KEY_PAD',['../a00356.html#ae52318f0263884ff3a3e67328138cc75',1,'calib_command.h']]], + ['atca_5fpub_5fkey_5fsize_217',['ATCA_PUB_KEY_SIZE',['../a00356.html#a07089e8e8b1aa335ddfd37e591f64ebb',1,'calib_command.h']]], + ['atca_5frandom_218',['ATCA_RANDOM',['../a00356.html#ace94188e9d741a9b44616474b633064f',1,'calib_command.h']]], + ['atca_5fread_219',['ATCA_READ',['../a00356.html#a8760372110d92cea3570a5720db05de2',1,'calib_command.h']]], + ['atca_5fresp_5fmac_5fin_5fout_220',['atca_resp_mac_in_out',['../a01775.html',1,'']]], + ['atca_5fresp_5fmac_5fin_5fout_5ft_221',['atca_resp_mac_in_out_t',['../a01474.html#gad2bbb95a1e12c8167ce68884dcf77a4e',1,'atca_host.h']]], + ['atca_5fresync_5fwith_5fwakeup_222',['ATCA_RESYNC_WITH_WAKEUP',['../a00269.html#a6c467c51b23ea961e1aabd6e98644d47',1,'atca_status.h']]], + ['atca_5frsp_5fdata_5fidx_223',['ATCA_RSP_DATA_IDX',['../a00356.html#abaaa930c2275599fcc3d83cfc02bfafe',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f16_224',['ATCA_RSP_SIZE_16',['../a00356.html#a0be09b502137446daedc43f1d3e85f86',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f32_225',['ATCA_RSP_SIZE_32',['../a00356.html#afd812ab5b70a92a4d3a420c4f7106ac5',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f4_226',['ATCA_RSP_SIZE_4',['../a00356.html#a15cc6f16cdb8f11b60981af7c3b15ef8',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f64_227',['ATCA_RSP_SIZE_64',['../a00356.html#a5b7ad7c3c75639352af5ad3b1298500c',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f72_228',['ATCA_RSP_SIZE_72',['../a00356.html#a67ca82b396385dd18790b48d731dfe15',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5fmax_229',['ATCA_RSP_SIZE_MAX',['../a00356.html#a908aece3a9501eb14a70c2b24a3e4089',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5fmin_230',['ATCA_RSP_SIZE_MIN',['../a00356.html#a0c738f2cc7bf063582c34188f85ddc3c',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5fval_231',['ATCA_RSP_SIZE_VAL',['../a00356.html#a882f14cac02df8282ccad2a43afc8a23',1,'calib_command.h']]], + ['atca_5frx_5fcrc_5ferror_232',['ATCA_RX_CRC_ERROR',['../a00269.html#aef8e0056fbad0bd33fcb2213b2f3ae49',1,'atca_status.h']]], + ['atca_5frx_5ffail_233',['ATCA_RX_FAIL',['../a00269.html#a8aa6f2e22841fba09b78262c9ce7a728',1,'atca_status.h']]], + ['atca_5frx_5fno_5fresponse_234',['ATCA_RX_NO_RESPONSE',['../a00269.html#a6a0c600725ed81640f2e39c88c864e1c',1,'atca_status.h']]], + ['atca_5frx_5ftimeout_235',['ATCA_RX_TIMEOUT',['../a00269.html#ab5bbd989a822d35a59c9eb6258bf26fc',1,'atca_status.h']]], + ['atca_5fsecureboot_236',['ATCA_SECUREBOOT',['../a00356.html#af4aab184dc60e2de854994d26d57dfde',1,'calib_command.h']]], + ['atca_5fsecureboot_5fenc_5fin_5fout_237',['atca_secureboot_enc_in_out',['../a01731.html',1,'']]], + ['atca_5fsecureboot_5fmac_5fin_5fout_238',['atca_secureboot_mac_in_out',['../a01735.html',1,'']]], + ['atca_5fselftest_239',['ATCA_SELFTEST',['../a00356.html#acbec80dc1b5f24d3013c2a9b06c11bdc',1,'calib_command.h']]], + ['atca_5fserial_5fnum_5fsize_240',['ATCA_SERIAL_NUM_SIZE',['../a00356.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0',1,'calib_command.h']]], + ['atca_5fsession_5fkey_5fin_5fout_241',['atca_session_key_in_out',['../a01791.html',1,'']]], + ['atca_5fsession_5fkey_5fin_5fout_5ft_242',['atca_session_key_in_out_t',['../a01474.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e',1,'atca_host.h']]], + ['atca_5fsha_243',['ATCA_SHA',['../a00356.html#a8e5f11692a8a23e1410d9b5ce8bebc2b',1,'calib_command.h']]], + ['atca_5fsha256_5fblock_5fsize_244',['ATCA_SHA256_BLOCK_SIZE',['../a00521.html#a85e0a506bd6fdae6ce32d5df3a48ac1c',1,'cryptoauthlib.h']]], + ['atca_5fsha256_5fctx_245',['atca_sha256_ctx',['../a01639.html',1,'atca_sha256_ctx'],['../a02191.html',1,'cryptoauthlib.atcab.atca_sha256_ctx']]], + ['atca_5fsha_5fconfig_5fsize_246',['ATCA_SHA_CONFIG_SIZE',['../a00356.html#a1887d11853092541df18c2a04fb6b87a',1,'calib_command.h']]], + ['atca_5fsha_5fkey_5ftype_247',['ATCA_SHA_KEY_TYPE',['../a00356.html#ad325831ee2326885795706efd7b3b00e',1,'calib_command.h']]], + ['atca_5fsha_5fsupport_248',['ATCA_SHA_SUPPORT',['../a00815.html#afe8da91949841c137ea573c327bff267',1,'atca_config_check.h']]], + ['atca_5fsig_5fsize_249',['ATCA_SIG_SIZE',['../a00356.html#a56448f81a8d04c6871b3422c496bf8b6',1,'calib_command.h']]], + ['atca_5fsign_250',['ATCA_SIGN',['../a00356.html#a516dbf4bbd2c4b366e0306890d0bca56',1,'calib_command.h']]], + ['atca_5fsign_5finternal_5fin_5fout_251',['atca_sign_internal_in_out',['../a01787.html',1,'']]], + ['atca_5fsign_5finternal_5fin_5fout_5ft_252',['atca_sign_internal_in_out_t',['../a01474.html#ga1fdcaf886974acc1fcdfc3bace49b700',1,'atca_host.h']]], + ['atca_5fsmall_5fbuffer_253',['ATCA_SMALL_BUFFER',['../a00269.html#ab1a2ea3166875b26f91e82767d6e3e1a',1,'atca_status.h']]], + ['atca_5fspi_5fgpio_5fiface_254',['ATCA_SPI_GPIO_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb',1,'atca_iface.h']]], + ['atca_5fspi_5fhost_5fs_255',['atca_spi_host_s',['../a01691.html',1,'']]], + ['atca_5fspi_5fiface_256',['ATCA_SPI_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7',1,'atca_iface.h']]], + ['atca_5fstatus_2eh_257',['atca_status.h',['../a00269.html',1,'']]], + ['atca_5fstatus_5fcrc_258',['ATCA_STATUS_CRC',['../a00269.html#a9198f13b90df739a1ca20f101beccfbb',1,'atca_status.h']]], + ['atca_5fstatus_5fecc_259',['ATCA_STATUS_ECC',['../a00269.html#ad878d8797ca33784da8e968cbf17a722',1,'atca_status.h']]], + ['atca_5fstatus_5fselftest_5ferror_260',['ATCA_STATUS_SELFTEST_ERROR',['../a00269.html#a3319805e96477b7b89da0f4a69ef1a83',1,'atca_status.h']]], + ['atca_5fstatus_5funknown_261',['ATCA_STATUS_UNKNOWN',['../a00269.html#a884d88ac0c809d0801ca4dbe24dac986',1,'atca_status.h']]], + ['atca_5fsuccess_262',['ATCA_SUCCESS',['../a00269.html#ab132d69c7f94de708ffef02b6dc69d27',1,'atca_status.h']]], + ['atca_5fswi_5fgpio_5fiface_263',['ATCA_SWI_GPIO_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2',1,'atca_iface.h']]], + ['atca_5fswi_5fiface_264',['ATCA_SWI_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26',1,'atca_iface.h']]], + ['atca_5fswi_5fwake_5fword_5faddr_265',['ATCA_SWI_WAKE_WORD_ADDR',['../a00602.html#a35e9d98d207f17ebac66dc86e29a6464',1,'hal_swi_gpio.h']]], + ['atca_5ftemp_5fkey_266',['atca_temp_key',['../a01711.html',1,'']]], + ['atca_5ftemp_5fkey_5ft_267',['atca_temp_key_t',['../a01474.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe',1,'atca_host.h']]], + ['atca_5ftempkey_5fkeyid_268',['ATCA_TEMPKEY_KEYID',['../a00356.html#a988fff8295c1914217b8543b614f556c',1,'calib_command.h']]], + ['atca_5ftimeout_269',['ATCA_TIMEOUT',['../a00269.html#afc6b7767c53326f3520ec83ac02df679',1,'atca_status.h']]], + ['atca_5ftoo_5fmany_5fcomm_5fretries_270',['ATCA_TOO_MANY_COMM_RETRIES',['../a00269.html#ad4cd022abf0e71d3605a9fc18e8a1ea6',1,'atca_status.h']]], + ['atca_5ftx_5ffail_271',['ATCA_TX_FAIL',['../a00269.html#a149bb02116700288df316d5ab391f5d3',1,'atca_status.h']]], + ['atca_5ftx_5ftimeout_272',['ATCA_TX_TIMEOUT',['../a00269.html#a7b4c194a6a86ffadc703b841280778c3',1,'atca_status.h']]], + ['atca_5fuart_5fhost_5fs_273',['atca_uart_host_s',['../a01695.html',1,'']]], + ['atca_5fuart_5fiface_274',['ATCA_UART_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d',1,'atca_iface.h']]], + ['atca_5funimplemented_275',['ATCA_UNIMPLEMENTED',['../a00269.html#ad80a997b8786774af268692c936f90d9',1,'atca_status.h']]], + ['atca_5funlocked_276',['ATCA_UNLOCKED',['../a00356.html#a54155caf79f004ccf0a875cf3a0ef05b',1,'calib_command.h']]], + ['atca_5funused_5fvar_5fcheck_277',['ATCA_UNUSED_VAR_CHECK',['../a00815.html#a987213394bc9a51f05c4a5f1b1de69f8',1,'atca_config_check.h']]], + ['atca_5fupdate_5fextra_278',['ATCA_UPDATE_EXTRA',['../a00356.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2',1,'calib_command.h']]], + ['atca_5fuse_5fatcab_5ffunctions_279',['ATCA_USE_ATCAB_FUNCTIONS',['../a00815.html#ab97062ef8dcf4e46b403d9c22aeb22c9',1,'atca_config_check.h']]], + ['atca_5fuse_5fflags_5fconsumed_280',['ATCA_USE_FLAGS_CONSUMED',['../a00269.html#a4dbc1891be5e77d93690554e7bb2aa8d',1,'atca_status.h']]], + ['atca_5futils_5fsizes_2ec_281',['atca_utils_sizes.c',['../a00272.html',1,'']]], + ['atca_5fverify_282',['ATCA_VERIFY',['../a00356.html#a8e357a6e926176155fe47aba97d915fb',1,'calib_command.h']]], + ['atca_5fverify_5fin_5fout_283',['atca_verify_in_out',['../a01779.html',1,'']]], + ['atca_5fverify_5fmac_284',['atca_verify_mac',['../a01727.html',1,'']]], + ['atca_5fversion_2eh_285',['atca_version.h',['../a00275.html',1,'']]], + ['atca_5fwake_5ffailed_286',['ATCA_WAKE_FAILED',['../a00269.html#a796b7e7bc096ae19c65b701d87b8718f',1,'atca_status.h']]], + ['atca_5fwake_5fsuccess_287',['ATCA_WAKE_SUCCESS',['../a00269.html#afb58269e38e4025d4e6620c4d1202ee4',1,'atca_status.h']]], + ['atca_5fwolfssl_5finterface_2ec_288',['atca_wolfssl_interface.c',['../a00806.html',1,'']]], + ['atca_5fwolfssl_5finterface_2eh_289',['atca_wolfssl_interface.h',['../a00809.html',1,'']]], + ['atca_5fwolfssl_5finternal_2eh_290',['atca_wolfssl_internal.h',['../a00812.html',1,'']]], + ['atca_5fword_5fsize_291',['ATCA_WORD_SIZE',['../a00356.html#a555bdf8fa32d4d47577f7748ca928389',1,'calib_command.h']]], + ['atca_5fwrite_292',['ATCA_WRITE',['../a00356.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771',1,'calib_command.h']]], + ['atca_5fwrite_5fmac_5fin_5fout_293',['atca_write_mac_in_out',['../a01755.html',1,'']]], + ['atca_5fwrite_5fmac_5fin_5fout_5ft_294',['atca_write_mac_in_out_t',['../a01474.html#gac077314e00956519884e609b44b9cbce',1,'atca_host.h']]], + ['atca_5fzone_5fencrypted_295',['ATCA_ZONE_ENCRYPTED',['../a00356.html#a167bc588244395e98461008070fee8f3',1,'calib_command.h']]], + ['atca_5fzone_5fmask_296',['ATCA_ZONE_MASK',['../a00356.html#a1d6d2f2713e845ec3b3bf465025d6858',1,'calib_command.h']]], + ['atca_5fzone_5freadwrite_5f32_297',['ATCA_ZONE_READWRITE_32',['../a00356.html#aa32b46f2c058ee54377d0cbef1ec8764',1,'calib_command.h']]], + ['atcab_298',['atcab',['../a02872.html',1,'']]], + ['atcab_5faes_299',['atcab_aes',['../a01466.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(): atca_basic.c'],['../a01479.html#aa6f667c9ff033cb3e1d8bd1565e080aa',1,'cryptoauthlib.atcab.atcab_aes()'],['../a01466.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(): atca_basic.c']]], + ['atcab_5faes_5fcbc_5fdecrypt_5fblock_300',['atcab_aes_cbc_decrypt_block',['../a01479.html#a9a7024193b07e7c98690873e7452f0ad',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbc_5fdecrypt_5fen_301',['ATCAB_AES_CBC_DECRYPT_EN',['../a00503.html#a23ae19deaff29f2796c4981962ca9b55',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fcbc_5fencrypt_5fblock_302',['atcab_aes_cbc_encrypt_block',['../a01479.html#a7e0bc033c11e689570f7aa9431d49d9c',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbc_5fencrypt_5fen_303',['ATCAB_AES_CBC_ENCRYPT_EN',['../a00503.html#ac2eb887016e59054e626341175577669',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fcbc_5finit_304',['atcab_aes_cbc_init',['../a01479.html#a837da37427357c91aba40c6becbebfeb',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbcmac_5fen_305',['ATCAB_AES_CBCMAC_EN',['../a00503.html#a1996786ea061102926ef0ba52a510bfd',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fcbcmac_5ffinish_306',['atcab_aes_cbcmac_finish',['../a01479.html#a1c364ea983169ac73197713db23f9a52',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbcmac_5finit_307',['atcab_aes_cbcmac_init',['../a01479.html#aa612658a288c6a5cca103e5d3965390c',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbcmac_5fupdate_308',['atcab_aes_cbcmac_update',['../a01479.html#af58b97dc722402be6c65e226a0dd26ae',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5faad_5ffinish_309',['atcab_aes_ccm_aad_finish',['../a01479.html#a99d19bf27efa04318480a3e81f668ae8',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5faad_5fupdate_310',['atcab_aes_ccm_aad_update',['../a01479.html#af5502348939c1db2fdafde42603266f3',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fdecrypt_5ffinish_311',['atcab_aes_ccm_decrypt_finish',['../a01479.html#aa641b1946cfcb33ac7e353a6ca7285ab',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fdecrypt_5fupdate_312',['atcab_aes_ccm_decrypt_update',['../a01479.html#ab78cfabfa12d891830c1147bbc61a2e0',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fen_313',['ATCAB_AES_CCM_EN',['../a00503.html#ae638244ab3ba72e50b974f763e2abc42',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fccm_5fencrypt_5ffinish_314',['atcab_aes_ccm_encrypt_finish',['../a01479.html#ac0399ab5a8ab2e7682441241fcc98914',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fencrypt_5fupdate_315',['atcab_aes_ccm_encrypt_update',['../a01479.html#a78d906cc88e8efcb280a0869ca7afaf2',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5finit_316',['atcab_aes_ccm_init',['../a01479.html#ab5ef9981f825f3fe5beb84b4d664f321',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5finit_5frand_317',['atcab_aes_ccm_init_rand',['../a01479.html#af34551008cb67c907488a9403da495ad',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcmac_5ffinish_318',['atcab_aes_cmac_finish',['../a01479.html#aeccd1e361da41854a45068507ccd9f33',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcmac_5finit_319',['atcab_aes_cmac_init',['../a01479.html#a1b778f3fa3c6d459075500f5248d09c6',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcmac_5fupdate_320',['atcab_aes_cmac_update',['../a01479.html#aefa4891ccc2a860029958f2e80bdef87',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5fdecrypt_5fblock_321',['atcab_aes_ctr_decrypt_block',['../a01479.html#a80a2b3fe53dc4caedad79221b05bbdf7',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5fen_322',['ATCAB_AES_CTR_EN',['../a00503.html#a6569901e92e84b0b448794f8a89d1d9e',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fctr_5fencrypt_5fblock_323',['atcab_aes_ctr_encrypt_block',['../a01479.html#a1a3dce72fa3192b1ca917025b8ff4736',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5finit_324',['atcab_aes_ctr_init',['../a01479.html#aec84bbc3cc86b716a2996069d5d227c0',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5finit_5frand_325',['atcab_aes_ctr_init_rand',['../a01479.html#a87ec2b9cbb53f9f38df252d6b7508881',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5frand_5fiv_5fen_326',['ATCAB_AES_CTR_RAND_IV_EN',['../a00503.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fdecrypt_327',['atcab_aes_decrypt',['../a01466.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01466.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01479.html#ac67f610115ce611e94d05a87ada77f66',1,'cryptoauthlib.atcab.atcab_aes_decrypt()']]], + ['atcab_5faes_5fdecrypt_5fext_328',['atcab_aes_decrypt_ext',['../a01466.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01466.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c']]], + ['atcab_5faes_5fencrypt_329',['atcab_aes_encrypt',['../a01466.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01479.html#a544871498712993b7ceb7a0134beac55',1,'cryptoauthlib.atcab.atcab_aes_encrypt()']]], + ['atcab_5faes_5fencrypt_5fext_330',['atcab_aes_encrypt_ext',['../a01466.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c']]], + ['atcab_5faes_5fextras_5fen_331',['ATCAB_AES_EXTRAS_EN',['../a00503.html#a28cb83338bbbc858be983299cede3ba9',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fgcm_5faad_5fupdate_332',['atcab_aes_gcm_aad_update',['../a01479.html#a5b7cd7ecd0b2526f1daa7c60ea39c581',1,'cryptoauthlib.atcab.atcab_aes_gcm_aad_update()'],['../a01466.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01466.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5faad_5fupdate_5fext_333',['atcab_aes_gcm_aad_update_ext',['../a01466.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01466.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_334',['atcab_aes_gcm_decrypt_finish',['../a01466.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01466.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01479.html#aeae81b172cf9a1b8a85052b9129d9dd1',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_finish()']]], + ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_5fext_335',['atcab_aes_gcm_decrypt_finish_ext',['../a01466.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01466.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_336',['atcab_aes_gcm_decrypt_update',['../a01479.html#a5af363a108f86f636af7581097b396cd',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_update()'],['../a01466.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01466.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_5fext_337',['atcab_aes_gcm_decrypt_update_ext',['../a01466.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01466.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fencrypt_5ffinish_338',['atcab_aes_gcm_encrypt_finish',['../a01466.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01466.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01479.html#ae3f487577cbb7e66ccb39c8d6ea9a358',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_finish()']]], + ['atcab_5faes_5fgcm_5fencrypt_5ffinish_5fext_339',['atcab_aes_gcm_encrypt_finish_ext',['../a01466.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01466.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fencrypt_5fupdate_340',['atcab_aes_gcm_encrypt_update',['../a01466.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01479.html#a0e5230bd79eba76c6350b724d5297310',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_update()']]], + ['atcab_5faes_5fgcm_5fencrypt_5fupdate_5fext_341',['atcab_aes_gcm_encrypt_update_ext',['../a01466.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c']]], + ['atcab_5faes_5fgcm_5finit_342',['atcab_aes_gcm_init',['../a01466.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01466.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01479.html#a29a3eabf3e5e353e52dd52c69ea69ec4',1,'cryptoauthlib.atcab.atcab_aes_gcm_init()']]], + ['atcab_5faes_5fgcm_5finit_5fext_343',['atcab_aes_gcm_init_ext',['../a01466.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01466.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5finit_5frand_344',['atcab_aes_gcm_init_rand',['../a01466.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(): atca_basic.c'],['../a01479.html#a4a9dc88e03b9e5066ff28b8518196ce7',1,'cryptoauthlib.atcab.atcab_aes_gcm_init_rand()'],['../a01466.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c']]], + ['atcab_5faes_5fgfm_345',['atcab_aes_gfm',['../a01466.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(): atca_basic.c'],['../a01479.html#ad9bd7c6cc3e26cca5865dda3c02bcce2',1,'cryptoauthlib.atcab.atcab_aes_gfm()'],['../a01466.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(const uint8_t *h, const uint8_t *input, uint8_t *output): atca_basic.c']]], + ['atcab_5faes_5fgfm_5fen_346',['ATCAB_AES_GFM_EN',['../a00815.html#a31c9145169cb4a4e3be509ad04a40b04',1,'atca_config_check.h']]], + ['atcab_5faes_5fupdate_5fen_347',['ATCAB_AES_UPDATE_EN',['../a00503.html#af273e717452d3e5295d20197b4615ed0',1,'crypto_hw_config_check.h']]], + ['atcab_5fbase64decode_348',['atcab_base64decode',['../a00257.html#a6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c'],['../a01466.html#ga6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c']]], + ['atcab_5fbase64decode_5f_349',['atcab_base64decode_',['../a00257.html#a55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c'],['../a01466.html#ga55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c']]], + ['atcab_5fbase64encode_350',['atcab_base64encode',['../a00257.html#a3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c'],['../a01466.html#ga3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c']]], + ['atcab_5fbase64encode_5f_351',['atcab_base64encode_',['../a00257.html#aeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c'],['../a01466.html#gaeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c']]], + ['atcab_5fbin2hex_352',['atcab_bin2hex',['../a00257.html#ae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c'],['../a01466.html#gae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c']]], + ['atcab_5fbin2hex_5f_353',['atcab_bin2hex_',['../a00257.html#a40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c'],['../a01466.html#ga40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c']]], + ['atcab_5fchallenge_354',['atcab_challenge',['../a01466.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01466.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01479.html#a40bc5aa6ac58d01d4ee7888dddd884bb',1,'cryptoauthlib.atcab.atcab_challenge()']]], + ['atcab_5fchallenge_5fseed_5fupdate_355',['atcab_challenge_seed_update',['../a01466.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01479.html#a0cefee590d648d724f343488569c10df',1,'cryptoauthlib.atcab.atcab_challenge_seed_update()']]], + ['atcab_5fcheckmac_356',['atcab_checkmac',['../a01466.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01466.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01479.html#aba58d5a7562b69d72c33cfda82c2b580',1,'cryptoauthlib.atcab.atcab_checkmac()']]], + ['atcab_5fcheckmac_5fwith_5fresponse_5fmac_357',['atcab_checkmac_with_response_mac',['../a01466.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01466.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c']]], + ['atcab_5fcmp_5fconfig_5fzone_358',['atcab_cmp_config_zone',['../a01479.html#af312843ce780c0062f9067c182ad2db6',1,'cryptoauthlib.atcab.atcab_cmp_config_zone()'],['../a01466.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c'],['../a01466.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c']]], + ['atcab_5fcounter_359',['atcab_counter',['../a01466.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01466.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01479.html#ade607e2a5b08d77e4559161dfac0c0e8',1,'cryptoauthlib.atcab.atcab_counter()']]], + ['atcab_5fcounter_5fincrement_360',['atcab_counter_increment',['../a01466.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01466.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01479.html#a216d7fa1d484d6a4ecf55d7886c355ef',1,'cryptoauthlib.atcab.atcab_counter_increment()']]], + ['atcab_5fcounter_5fread_361',['atcab_counter_read',['../a01466.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(): atca_basic.c'],['../a01479.html#ae40c31b557e83cd4c590288082d07d6e',1,'cryptoauthlib.atcab.atcab_counter_read()'],['../a01466.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c']]], + ['atcab_5fderivekey_362',['atcab_derivekey',['../a01466.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01466.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01479.html#af411b3996170b6dd0e90dc999c896d19',1,'cryptoauthlib.atcab.atcab_derivekey()']]], + ['atcab_5fderivekey_5fext_363',['atcab_derivekey_ext',['../a01466.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01466.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c']]], + ['atcab_5fecdh_364',['atcab_ecdh',['../a01466.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(): atca_basic.c'],['../a01479.html#a8e85d04188b3d10cccaf6641bf5753fe',1,'cryptoauthlib.atcab.atcab_ecdh()'],['../a01466.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c']]], + ['atcab_5fecdh_5fbase_365',['atcab_ecdh_base',['../a01466.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce): atca_basic.c'],['../a01466.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce): atca_basic.c'],['../a01479.html#a84c655ca82b1c0ed968be7d63be4a5f2',1,'cryptoauthlib.atcab.atcab_ecdh_base()']]], + ['atcab_5fecdh_5fenc_366',['atcab_ecdh_enc',['../a01466.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#ae3505ac892b47a7384a9ec95338bee22',1,'cryptoauthlib.atcab.atcab_ecdh_enc()']]], + ['atcab_5fecdh_5fioenc_367',['atcab_ecdh_ioenc',['../a01466.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01466.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01479.html#adefdce788a6ef35250f5b1c139454b64',1,'cryptoauthlib.atcab.atcab_ecdh_ioenc()']]], + ['atcab_5fecdh_5ftempkey_368',['atcab_ecdh_tempkey',['../a01466.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01466.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01479.html#a3a1b9396c4a6aec1fc32839fe681f3a9',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey()']]], + ['atcab_5fecdh_5ftempkey_5fioenc_369',['atcab_ecdh_tempkey_ioenc',['../a01466.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(): atca_basic.c'],['../a01479.html#ac6eb9270fa4c963d6ebba79aea1ddc4b',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey_ioenc()'],['../a01466.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c']]], + ['atcab_5fgendig_370',['atcab_gendig',['../a01466.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(): atca_basic.c'],['../a01479.html#a8b0381ac0e872d25df0373d9cd9ce4af',1,'cryptoauthlib.atcab.atcab_gendig()'],['../a01466.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c']]], + ['atcab_5fgendivkey_371',['atcab_gendivkey',['../a01466.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c'],['../a01466.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c']]], + ['atcab_5fgenkey_372',['atcab_genkey',['../a01466.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01479.html#acef9ae292bb3e6c3c1c1b16a20bd6494',1,'cryptoauthlib.atcab.atcab_genkey()']]], + ['atcab_5fgenkey_5fbase_373',['atcab_genkey_base',['../a01466.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c'],['../a01466.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c'],['../a01479.html#aa1e87847ce5fccdef062c9aaa5bea65e',1,'cryptoauthlib.atcab.atcab_genkey_base()']]], + ['atcab_5fgenkey_5fext_374',['atcab_genkey_ext',['../a01466.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fgenkey_5fmac_5fen_375',['ATCAB_GENKEY_MAC_EN',['../a00815.html#a85d4ccd2d66f9b2fd10c7a2e408c4737',1,'atca_config_check.h']]], + ['atcab_5fget_5fdevice_376',['atcab_get_device',['../a01466.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(): atca_basic.c'],['../a01479.html#a2087c24eeaa066ab0481265ca17b62fb',1,'cryptoauthlib.atcab.atcab_get_device()'],['../a01466.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(void): atca_basic.c']]], + ['atcab_5fget_5fdevice_5faddress_377',['atcab_get_device_address',['../a01466.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c'],['../a01466.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c']]], + ['atcab_5fget_5fdevice_5ftype_378',['atcab_get_device_type',['../a01466.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(void): atca_basic.c'],['../a01466.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(void): atca_basic.c'],['../a01479.html#a63e034778c2964569df7a6fb0ec0a8f1',1,'cryptoauthlib.atcab.atcab_get_device_type()']]], + ['atcab_5fget_5fdevice_5ftype_5fext_379',['atcab_get_device_type_ext',['../a01466.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c'],['../a01466.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c']]], + ['atcab_5fget_5fpubkey_380',['atcab_get_pubkey',['../a01466.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01479.html#aac8a5ac8d26586ed7a707ddf2224ecd8',1,'cryptoauthlib.atcab.atcab_get_pubkey()']]], + ['atcab_5fget_5fpubkey_5fext_381',['atcab_get_pubkey_ext',['../a01466.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fget_5fzone_5fsize_382',['atcab_get_zone_size',['../a01466.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01466.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], + ['atcab_5fget_5fzone_5fsize_5fext_383',['atcab_get_zone_size_ext',['../a01466.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01466.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], + ['atcab_5fhex2bin_384',['atcab_hex2bin',['../a00257.html#a481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c'],['../a01466.html#ga481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c']]], + ['atcab_5fhmac_385',['atcab_hmac',['../a01466.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c'],['../a01466.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c'],['../a01479.html#abcef2cce95ddc7363a687ee4cf238671',1,'cryptoauthlib.atcab.atcab_hmac()']]], + ['atcab_5fhw_5fsha2_5f256_386',['atcab_hw_sha2_256',['../a01466.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01466.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01479.html#aec129bd1fae35bcb87dd129ca4e065ca',1,'cryptoauthlib.atcab.atcab_hw_sha2_256()']]], + ['atcab_5fhw_5fsha2_5f256_5ffinish_387',['atcab_hw_sha2_256_finish',['../a01466.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01466.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01479.html#a6f0cb9bd0b1cecd09fa765083d998db1',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_finish()']]], + ['atcab_5fhw_5fsha2_5f256_5finit_388',['atcab_hw_sha2_256_init',['../a01466.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(): atca_basic.c'],['../a01479.html#a213e34c48cf1f6a119979ae00acebee5',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_init()'],['../a01466.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(atca_sha256_ctx_t *ctx): atca_basic.c']]], + ['atcab_5fhw_5fsha2_5f256_5fupdate_389',['atcab_hw_sha2_256_update',['../a01466.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01466.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01479.html#a4c9b8fd51581178ad0d988f64e2df04c',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_update()']]], + ['atcab_5fidle_390',['atcab_idle',['../a01466.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c'],['../a01466.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c']]], + ['atcab_5finfo_391',['atcab_info',['../a01466.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c'],['../a01466.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c'],['../a01479.html#add3fb2f7c78eb84e42bcb17800f2c6de',1,'cryptoauthlib.atcab.atcab_info()']]], + ['atcab_5finfo_5fbase_392',['atcab_info_base',['../a01466.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(uint8_t mode, uint16_t param2, uint8_t *out_data): atca_basic.c'],['../a01466.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(uint8_t mode, uint16_t param2, uint8_t *out_data): atca_basic.c'],['../a01479.html#af03e307e61709bff1443d0f72a2efdb9',1,'cryptoauthlib.atcab.atcab_info_base()']]], + ['atcab_5finfo_5fchip_5fstatus_393',['atcab_info_chip_status',['../a01466.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c'],['../a01466.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c']]], + ['atcab_5finfo_5fext_394',['atcab_info_ext',['../a01466.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c'],['../a01466.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c']]], + ['atcab_5finfo_5fget_5flatch_395',['atcab_info_get_latch',['../a01466.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(): atca_basic.c'],['../a01479.html#ab21835e5b3b868f49faecd453d8da4e3',1,'cryptoauthlib.atcab.atcab_info_get_latch()'],['../a01466.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(bool *state): atca_basic.c']]], + ['atcab_5finfo_5flatch_5fen_396',['ATCAB_INFO_LATCH_EN',['../a00815.html#a5965863afba861e5e0e899229da26e83',1,'atca_config_check.h']]], + ['atcab_5finfo_5flock_5fstatus_397',['atcab_info_lock_status',['../a01466.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c'],['../a01466.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c']]], + ['atcab_5finfo_5fset_5flatch_398',['atcab_info_set_latch',['../a01466.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01466.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01479.html#a0ae7c88423c60e7dd7fefff75d443c35',1,'cryptoauthlib.atcab.atcab_info_set_latch()']]], + ['atcab_5finit_399',['atcab_init',['../a01466.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c'],['../a01466.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c'],['../a01479.html#ad7cc965be77a8f829027f9afc21556b5',1,'cryptoauthlib.atcab.atcab_init()']]], + ['atcab_5finit_5fdevice_400',['atcab_init_device',['../a01466.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c'],['../a01466.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c']]], + ['atcab_5finit_5fext_401',['atcab_init_ext',['../a01466.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c'],['../a01466.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c']]], + ['atcab_5fis_5fca2_5fdevice_402',['atcab_is_ca2_device',['../a01466.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c'],['../a01466.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c']]], + ['atcab_5fis_5fca_5fdevice_403',['atcab_is_ca_device',['../a01466.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c'],['../a01466.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c']]], + ['atcab_5fis_5fconfig_5flocked_404',['atcab_is_config_locked',['../a01466.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c'],['../a01466.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fconfig_5flocked_5fext_405',['atcab_is_config_locked_ext',['../a01466.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01466.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fdata_5flocked_406',['atcab_is_data_locked',['../a01466.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c'],['../a01466.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fdata_5flocked_5fext_407',['atcab_is_data_locked_ext',['../a01466.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01466.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5flocked_408',['atcab_is_locked',['../a01479.html#a035fb2c7a593d20f479943c0d74df245',1,'cryptoauthlib.atcab.atcab_is_locked()'],['../a01466.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c'],['../a01466.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fprivate_5fext_409',['atcab_is_private_ext',['../a01466.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c'],['../a01466.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c']]], + ['atcab_5fis_5fslot_5flocked_410',['atcab_is_slot_locked',['../a01466.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01466.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01479.html#ac73a52d0b4b8104accb6f34542d06e85',1,'cryptoauthlib.atcab.atcab_is_slot_locked()']]], + ['atcab_5fis_5fslot_5flocked_5fext_411',['atcab_is_slot_locked_ext',['../a01466.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c'],['../a01466.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fta_5fdevice_412',['atcab_is_ta_device',['../a01466.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c'],['../a01466.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c']]], + ['atcab_5fkdf_413',['atcab_kdf',['../a01466.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c'],['../a01466.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c'],['../a01479.html#a760c91e04ad8a62181956b73ada2e384',1,'cryptoauthlib.atcab.atcab_kdf(mode, key_id, details, message, out_data, out_nonce)']]], + ['atcab_5flock_414',['atcab_lock',['../a01479.html#a384368c23f29b2008c79effe063da77d',1,'cryptoauthlib.atcab.atcab_lock()'],['../a01466.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01466.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c']]], + ['atcab_5flock_5fconfig_5fzone_415',['atcab_lock_config_zone',['../a01466.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c'],['../a01466.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c'],['../a01479.html#a13f0865a1ac2377282b29d6721b5c834',1,'cryptoauthlib.atcab.atcab_lock_config_zone()']]], + ['atcab_5flock_5fconfig_5fzone_5fcrc_416',['atcab_lock_config_zone_crc',['../a01466.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01466.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01479.html#a64223730cf6d1f1ecb48ebcfaffea75c',1,'cryptoauthlib.atcab.atcab_lock_config_zone_crc()']]], + ['atcab_5flock_5fconfig_5fzone_5fext_417',['atcab_lock_config_zone_ext',['../a01466.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c'],['../a01466.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c']]], + ['atcab_5flock_5fdata_5fslot_418',['atcab_lock_data_slot',['../a01466.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01466.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01479.html#a0738f317bdd3c1decb934971e66ee66c',1,'cryptoauthlib.atcab.atcab_lock_data_slot()']]], + ['atcab_5flock_5fdata_5fslot_5fext_419',['atcab_lock_data_slot_ext',['../a01466.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c'],['../a01466.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c']]], + ['atcab_5flock_5fdata_5fzone_420',['atcab_lock_data_zone',['../a01466.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(void): atca_basic.c'],['../a01466.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(void): atca_basic.c'],['../a01479.html#ad4c4f17808f4904cef59fb3c6a3060e1',1,'cryptoauthlib.atcab.atcab_lock_data_zone()']]], + ['atcab_5flock_5fdata_5fzone_5fcrc_421',['atcab_lock_data_zone_crc',['../a01466.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01466.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01479.html#a037d202036ce67334a0dc1dd5b714c3e',1,'cryptoauthlib.atcab.atcab_lock_data_zone_crc()']]], + ['atcab_5flock_5fdata_5fzone_5fext_422',['atcab_lock_data_zone_ext',['../a01466.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c'],['../a01466.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c']]], + ['atcab_5fmac_423',['atcab_mac',['../a01466.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest): atca_basic.c'],['../a01466.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest): atca_basic.c'],['../a01479.html#a02089d61678b8d494424c16bb612b8ad',1,'cryptoauthlib.atcab.atcab_mac()']]], + ['atcab_5fmemset_5fs_424',['atcab_memset_s',['../a00257.html#ac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c'],['../a01466.html#gac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c']]], + ['atcab_5fmock_425',['atcab_mock',['../a02571.html',1,'cryptoauthlib_mock']]], + ['atcab_5fnonce_426',['atcab_nonce',['../a01466.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01466.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01479.html#ad4e841d49e6fd9d67c664f020877e730',1,'cryptoauthlib.atcab.atcab_nonce()']]], + ['atcab_5fnonce_5fbase_427',['atcab_nonce_base',['../a01466.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01479.html#afcb4ae6dd50b4449b6de4d1d0754601d',1,'cryptoauthlib.atcab.atcab_nonce_base()']]], + ['atcab_5fnonce_5fload_428',['atcab_nonce_load',['../a01466.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(): atca_basic.c'],['../a01479.html#adf1843ed620eb72a9efc75ff0251efa6',1,'cryptoauthlib.atcab.atcab_nonce_load()'],['../a01466.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(uint8_t target, const uint8_t *num_in, uint16_t num_in_size): atca_basic.c']]], + ['atcab_5fnonce_5frand_429',['atcab_nonce_rand',['../a01466.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01479.html#a75272bce518cb8b951b9adae61a02c58',1,'cryptoauthlib.atcab.atcab_nonce_rand()']]], + ['atcab_5fnonce_5frand_5fext_430',['atcab_nonce_rand_ext',['../a01466.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], + ['atcab_5fpbkdf2_5fsha256_5fen_431',['ATCAB_PBKDF2_SHA256_EN',['../a00506.html#aa46ae7101b70ba482359edccca83f414',1,'crypto_sw_config_check.h']]], + ['atcab_5fpointer_5fdelta_432',['atcab_pointer_delta',['../a00257.html#a72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c'],['../a01466.html#ga72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c']]], + ['atcab_5fpriv_5fwrite_433',['atcab_priv_write',['../a01466.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#ac94db106ce16b83c5f5518cf92e24d4d',1,'cryptoauthlib.atcab.atcab_priv_write()']]], + ['atcab_5frandom_434',['atcab_random',['../a01466.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01466.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01479.html#a8d6436e974c3780cb205261049fbbb87',1,'cryptoauthlib.atcab.atcab_random()']]], + ['atcab_5frandom_5fext_435',['atcab_random_ext',['../a01466.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c'],['../a01466.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c']]], + ['atcab_5fread_5fbytes_5fzone_436',['atcab_read_bytes_zone',['../a01466.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c'],['../a01466.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c'],['../a01479.html#abd3403fcc46a2b82556784e142161c65',1,'cryptoauthlib.atcab.atcab_read_bytes_zone()']]], + ['atcab_5fread_5fconfig_5fzone_437',['atcab_read_config_zone',['../a01466.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01466.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01479.html#a5dfdc90856af9f03e09cc280dcfe3de0',1,'cryptoauthlib.atcab.atcab_read_config_zone()']]], + ['atcab_5fread_5fconfig_5fzone_5fext_438',['atcab_read_config_zone_ext',['../a01466.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c'],['../a01466.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c']]], + ['atcab_5fread_5fenc_439',['atcab_read_enc',['../a01466.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#a87c05138d598087100ec1e740bf9e221',1,'cryptoauthlib.atcab.atcab_read_enc()']]], + ['atcab_5fread_5fpubkey_440',['atcab_read_pubkey',['../a01466.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(): atca_basic.c'],['../a01479.html#a03506fe5daef9a019b2688e49af8a725',1,'cryptoauthlib.atcab.atcab_read_pubkey()'],['../a01466.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(uint16_t slot, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fread_5fpubkey_5fext_441',['atcab_read_pubkey_ext',['../a01466.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c'],['../a01466.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fread_5fserial_5fnumber_442',['atcab_read_serial_number',['../a01466.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(uint8_t *serial_number): atca_basic.c'],['../a01466.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(uint8_t *serial_number): atca_basic.c'],['../a01479.html#a903f3bc6862860693f3d0c7fcfb68abd',1,'cryptoauthlib.atcab.atcab_read_serial_number()']]], + ['atcab_5fread_5fserial_5fnumber_5fext_443',['atcab_read_serial_number_ext',['../a01466.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c'],['../a01466.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c']]], + ['atcab_5fread_5fsig_444',['atcab_read_sig',['../a01466.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01466.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01479.html#a643bc00f84713b2e8705021f6b2c2d0f',1,'cryptoauthlib.atcab.atcab_read_sig()']]], + ['atcab_5fread_5fzone_445',['atcab_read_zone',['../a01466.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(): atca_basic.c'],['../a01479.html#ae74a63edf1522697556aa1d98493b15b',1,'cryptoauthlib.atcab.atcab_read_zone()'],['../a01466.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c']]], + ['atcab_5fread_5fzone_5fext_446',['atcab_read_zone_ext',['../a01466.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c']]], + ['atcab_5frelease_447',['atcab_release',['../a01466.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(): atca_basic.c'],['../a01479.html#a6b784447f8cf2cfc112ab33a4b10ce22',1,'cryptoauthlib.atcab.atcab_release()'],['../a01466.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c']]], + ['atcab_5frelease_5fext_448',['atcab_release_ext',['../a01466.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c'],['../a01466.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c']]], + ['atcab_5freversal_449',['atcab_reversal',['../a00257.html#a7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c'],['../a01466.html#ga7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c']]], + ['atcab_5fsecureboot_450',['atcab_secureboot',['../a01466.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01466.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01479.html#a7063655ccab4af3b185ff519a40329e0',1,'cryptoauthlib.atcab.atcab_secureboot()']]], + ['atcab_5fsecureboot_5fmac_451',['atcab_secureboot_mac',['../a01466.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01479.html#a3e585d7d21fb74154c4e53d541db9e5a',1,'cryptoauthlib.atcab.atcab_secureboot_mac(mode, digest, signature, num_in, io_keys, is_verified)']]], + ['atcab_5fselftest_452',['atcab_selftest',['../a01479.html#ab078cd0a92f0f235fa36fb06ccf4af19',1,'cryptoauthlib.atcab.atcab_selftest()'],['../a01466.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c'],['../a01466.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c']]], + ['atcab_5fsha_453',['atcab_sha',['../a01479.html#a583ddc1d9adbdceea0a7617c6b87ff8d',1,'cryptoauthlib.atcab.atcab_sha()'],['../a01466.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c'],['../a01466.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c']]], + ['atcab_5fsha_5fbase_454',['atcab_sha_base',['../a01479.html#a49b55d1996aee8c868684a916341522f',1,'cryptoauthlib.atcab.atcab_sha_base()'],['../a01466.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c'],['../a01466.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c']]], + ['atcab_5fsha_5fend_455',['atcab_sha_end',['../a01479.html#a7ffc1b8652c148a1c3a86ef80155502c',1,'cryptoauthlib.atcab.atcab_sha_end()'],['../a01466.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c'],['../a01466.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c']]], + ['atcab_5fsha_5fhmac_456',['atcab_sha_hmac',['../a01466.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01466.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01479.html#a0589fee6cdf8761c032b330a3079e0e0',1,'cryptoauthlib.atcab.atcab_sha_hmac()']]], + ['atcab_5fsha_5fhmac_5fext_457',['atcab_sha_hmac_ext',['../a01466.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01466.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c']]], + ['atcab_5fsha_5fhmac_5ffinish_458',['atcab_sha_hmac_finish',['../a01479.html#a897a5ee03a68bba8afe2371f89a6d7a5',1,'cryptoauthlib.atcab.atcab_sha_hmac_finish()'],['../a01466.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01466.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c']]], + ['atcab_5fsha_5fhmac_5finit_459',['atcab_sha_hmac_init',['../a01466.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01466.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01479.html#a6d243431c455704e03f148b9e373db51',1,'cryptoauthlib.atcab.atcab_sha_hmac_init(ctx, key_slot)']]], + ['atcab_5fsha_5fhmac_5fupdate_460',['atcab_sha_hmac_update',['../a01479.html#a323b71e8080719b27a45f63bb8ef6a59',1,'cryptoauthlib.atcab.atcab_sha_hmac_update()'],['../a01466.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01466.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c']]], + ['atcab_5fsha_5fread_5fcontext_461',['atcab_sha_read_context',['../a01466.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01466.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01479.html#a4bcf510aa10502e29fe2321486019fb5',1,'cryptoauthlib.atcab.atcab_sha_read_context()']]], + ['atcab_5fsha_5fstart_462',['atcab_sha_start',['../a01466.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01466.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01479.html#a3fee574ed2618a6abc770bb1f17dc6b5',1,'cryptoauthlib.atcab.atcab_sha_start()']]], + ['atcab_5fsha_5fupdate_463',['atcab_sha_update',['../a01466.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c'],['../a01466.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c'],['../a01479.html#a91f72328d639d88598498c37cb552ffb',1,'cryptoauthlib.atcab.atcab_sha_update()']]], + ['atcab_5fsha_5fwrite_5fcontext_464',['atcab_sha_write_context',['../a01466.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c'],['../a01466.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c'],['../a01479.html#acc277568c5c42424ff90d8bfcee667b8',1,'cryptoauthlib.atcab.atcab_sha_write_context()']]], + ['atcab_5fsign_465',['atcab_sign',['../a01466.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01466.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01479.html#a14fe9d38029d932b4aef6802bbf078ab',1,'cryptoauthlib.atcab.atcab_sign()']]], + ['atcab_5fsign_5fbase_466',['atcab_sign_base',['../a01466.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01466.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01479.html#a8728f5f5bf67ede8dce575af486499c9',1,'cryptoauthlib.atcab.atcab_sign_base()']]], + ['atcab_5fsign_5fext_467',['atcab_sign_ext',['../a01466.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01466.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c']]], + ['atcab_5fsign_5finternal_468',['atcab_sign_internal',['../a01479.html#af218c61a8dd3d937e5dfd3ad2d0c2701',1,'cryptoauthlib.atcab.atcab_sign_internal()'],['../a01466.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature): atca_basic.c'],['../a01466.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature): atca_basic.c']]], + ['atcab_5fsleep_469',['atcab_sleep',['../a01466.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c'],['../a01466.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c']]], + ['atcab_5fupdateextra_470',['atcab_updateextra',['../a01466.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01466.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01479.html#a76dda154eba75b7c0c8f6a8fcc5d346a',1,'cryptoauthlib.atcab.atcab_updateextra()']]], + ['atcab_5fverify_471',['atcab_verify',['../a01466.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01466.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01479.html#a40e190b9a9b0bb5aa2389cc482f94780',1,'cryptoauthlib.atcab.atcab_verify()']]], + ['atcab_5fverify_5fextern_472',['atcab_verify_extern',['../a01466.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01479.html#a692a721d89bd8f4032502f343d3f1718',1,'cryptoauthlib.atcab.atcab_verify_extern()']]], + ['atcab_5fverify_5fextern_5fext_473',['atcab_verify_extern_ext',['../a01466.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fextern_5fmac_474',['atcab_verify_extern_mac',['../a01466.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01479.html#ae8ab769023a1d717198eb06aa17ff8b0',1,'cryptoauthlib.atcab.atcab_verify_extern_mac(message, signature, public_key, num_in, io_key, is_verified)']]], + ['atcab_5fverify_5fextern_5fstored_5fmac_475',['atcab_verify_extern_stored_mac',['../a01479.html#aadca3cb06b25a8b3b8c6a851ad477db0',1,'cryptoauthlib::atcab']]], + ['atcab_5fverify_5finvalidate_476',['atcab_verify_invalidate',['../a01466.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01466.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01479.html#a49f823cd787be6ed036e7bc1e430b384',1,'cryptoauthlib.atcab.atcab_verify_invalidate()']]], + ['atcab_5fverify_5fmac_5fen_477',['ATCAB_VERIFY_MAC_EN',['../a00815.html#a5d69a9273e615d799841edc21bd72dc0',1,'atca_config_check.h']]], + ['atcab_5fverify_5fstored_478',['atcab_verify_stored',['../a01479.html#a90baa667a1e6bb223cda44f4322c2f44',1,'cryptoauthlib.atcab.atcab_verify_stored()'],['../a01466.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01466.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fstored_5fext_479',['atcab_verify_stored_ext',['../a01466.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01466.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fstored_5fmac_480',['atcab_verify_stored_mac',['../a01466.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01466.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01479.html#a4b1ae9a8e89b7038fd5f75686ca97e31',1,'cryptoauthlib.atcab.atcab_verify_stored_mac()']]], + ['atcab_5fverify_5fstored_5fwith_5ftempkey_481',['atcab_verify_stored_with_tempkey',['../a01466.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01466.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fvalidate_482',['atcab_verify_validate',['../a01466.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01466.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01479.html#a627d101aa165533d893461f5fb39efa1',1,'cryptoauthlib.atcab.atcab_verify_validate()']]], + ['atcab_5fversion_483',['atcab_version',['../a01466.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c'],['../a01466.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c']]], + ['atcab_5fwakeup_484',['atcab_wakeup',['../a01466.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c'],['../a01466.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c']]], + ['atcab_5fwrite_485',['atcab_write',['../a01466.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(): atca_basic.c'],['../a01479.html#acd0f0264807684089bb1ab8bdfcb989f',1,'cryptoauthlib.atcab.atcab_write()'],['../a01466.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c']]], + ['atcab_5fwrite_5fbytes_5fzone_486',['atcab_write_bytes_zone',['../a01466.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(): atca_basic.c'],['../a01479.html#a5db76308f0e51108dea8222f14ac405e',1,'cryptoauthlib.atcab.atcab_write_bytes_zone()'],['../a01466.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length): atca_basic.c']]], + ['atcab_5fwrite_5fconfig_5fcounter_487',['atcab_write_config_counter',['../a01466.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c'],['../a01466.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c'],['../a01479.html#aff3e1986bf6d79a353f8820fe5ed4306',1,'cryptoauthlib.atcab.atcab_write_config_counter(counter_id, counter_value)']]], + ['atcab_5fwrite_5fconfig_5fzone_488',['atcab_write_config_zone',['../a01479.html#a4144ba085c025b94f6d39de2ba33dc26',1,'cryptoauthlib.atcab.atcab_write_config_zone()'],['../a01466.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01466.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c']]], + ['atcab_5fwrite_5fconfig_5fzone_5fext_489',['atcab_write_config_zone_ext',['../a01466.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c'],['../a01466.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c']]], + ['atcab_5fwrite_5fen_490',['ATCAB_WRITE_EN',['../a00815.html#abb9e7120857031fdf5f22df3086afab0',1,'calib_config_check.h']]], + ['atcab_5fwrite_5fenc_491',['atcab_write_enc',['../a01466.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#ae8faf982d17b5fc72231bc648a51063a',1,'cryptoauthlib.atcab.atcab_write_enc()']]], + ['atcab_5fwrite_5fpubkey_492',['atcab_write_pubkey',['../a01466.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(): atca_basic.c'],['../a01479.html#a64692832da534aacee8a61cef74e9be1',1,'cryptoauthlib.atcab.atcab_write_pubkey()'],['../a01466.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c']]], + ['atcab_5fwrite_5fpubkey_5fext_493',['atcab_write_pubkey_ext',['../a01466.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01466.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c']]], + ['atcab_5fwrite_5fzone_494',['atcab_write_zone',['../a01466.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01479.html#a18b7743ebac58022a1f704cb3b011803',1,'cryptoauthlib.atcab.atcab_write_zone()']]], + ['atcab_5fwrite_5fzone_5fext_495',['atcab_write_zone_ext',['../a01466.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c']]], + ['atcac_5faes_5fcmac_5fctx_496',['atcac_aes_cmac_ctx',['../a01815.html',1,'']]], + ['atcac_5faes_5fcmac_5fen_497',['ATCAC_AES_CMAC_EN',['../a00506.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): crypto_sw_config_check.h'],['../a00668.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_mbedtls_interface.h'],['../a00680.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_openssl_interface.h']]], + ['atcac_5faes_5fcmac_5ffinish_498',['atcac_aes_cmac_finish',['../a00677.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_openssl_interface.c'],['../a00671.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_mbedtls_wrap.c']]], + ['atcac_5faes_5fcmac_5finit_499',['atcac_aes_cmac_init',['../a00677.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c'],['../a00671.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c']]], + ['atcac_5faes_5fcmac_5fupdate_500',['atcac_aes_cmac_update',['../a00671.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_mbedtls_wrap.c'],['../a00677.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5faad_5fupdate_501',['atcac_aes_gcm_aad_update',['../a00671.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_mbedtls_wrap.c'],['../a00677.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fctx_502',['atcac_aes_gcm_ctx',['../a01811.html',1,'']]], + ['atcac_5faes_5fgcm_5fdecrypt_5ffinish_503',['atcac_aes_gcm_decrypt_finish',['../a00677.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_openssl_interface.c'],['../a00671.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_mbedtls_wrap.c']]], + ['atcac_5faes_5fgcm_5fdecrypt_5fstart_504',['atcac_aes_gcm_decrypt_start',['../a00671.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00677.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fdecrypt_5fupdate_505',['atcac_aes_gcm_decrypt_update',['../a00671.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_mbedtls_wrap.c'],['../a00677.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fen_506',['ATCAC_AES_GCM_EN',['../a00506.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): crypto_sw_config_check.h'],['../a00668.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_mbedtls_interface.h'],['../a00680.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_openssl_interface.h']]], + ['atcac_5faes_5fgcm_5fencrypt_5ffinish_507',['atcac_aes_gcm_encrypt_finish',['../a00671.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_mbedtls_wrap.c'],['../a00677.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fencrypt_5fstart_508',['atcac_aes_gcm_encrypt_start',['../a00677.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c'],['../a00671.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c']]], + ['atcac_5faes_5fgcm_5fencrypt_5fupdate_509',['atcac_aes_gcm_encrypt_update',['../a00671.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_mbedtls_wrap.c'],['../a00677.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_openssl_interface.c']]], + ['atcac_5fhmac_5fctx_510',['atcac_hmac_ctx',['../a01807.html',1,'']]], + ['atcac_5fpbkdf2_5fsha256_5fen_511',['ATCAC_PBKDF2_SHA256_EN',['../a00506.html#a6d2fa2e22a151bea100d7c7ee84dbe7f',1,'crypto_sw_config_check.h']]], + ['atcac_5fpk_5fctx_512',['atcac_pk_ctx',['../a01819.html',1,'']]], + ['atcac_5fpk_5fderive_513',['atcac_pk_derive',['../a00671.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00677.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], + ['atcac_5fpk_5ffree_514',['atcac_pk_free',['../a00671.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_mbedtls_wrap.c'],['../a00677.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_openssl_interface.c']]], + ['atcac_5fpk_5finit_515',['atcac_pk_init',['../a00671.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_mbedtls_wrap.c'],['../a00677.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_openssl_interface.c']]], + ['atcac_5fpk_5finit_5fpem_516',['atcac_pk_init_pem',['../a00671.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_mbedtls_wrap.c'],['../a00677.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_openssl_interface.c']]], + ['atcac_5fpk_5fpublic_517',['atcac_pk_public',['../a00671.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00677.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], + ['atcac_5fpk_5fsign_518',['atcac_pk_sign',['../a00671.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_mbedtls_wrap.c'],['../a00677.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_openssl_interface.c']]], + ['atcac_5fpk_5fverify_519',['atcac_pk_verify',['../a00671.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_mbedtls_wrap.c'],['../a00677.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_openssl_interface.c']]], + ['atcac_5fpkey_5fen_520',['ATCAC_PKEY_EN',['../a00668.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_mbedtls_interface.h'],['../a00680.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_openssl_interface.h']]], + ['atcac_5frandom_5fen_521',['ATCAC_RANDOM_EN',['../a00815.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): atca_config_check.h'],['../a00506.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): crypto_sw_config_check.h']]], + ['atcac_5fsha1_5fctx_522',['atcac_sha1_ctx',['../a01803.html',1,'']]], + ['atcac_5fsha1_5fen_523',['ATCAC_SHA1_EN',['../a00815.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_config_check.h'],['../a00506.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): crypto_sw_config_check.h'],['../a00668.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_mbedtls_interface.h'],['../a00680.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_openssl_interface.h']]], + ['atcac_5fsha256_5fen_524',['ATCAC_SHA256_EN',['../a00815.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_config_check.h'],['../a00506.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): crypto_sw_config_check.h'],['../a00668.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_mbedtls_interface.h'],['../a00680.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_openssl_interface.h']]], + ['atcac_5fsha256_5fhmac_5ffinish_525',['atcac_sha256_hmac_finish',['../a00671.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_mbedtls_wrap.c'],['../a00677.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_openssl_interface.c']]], + ['atcac_5fsha256_5fhmac_5finit_526',['atcac_sha256_hmac_init',['../a00671.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c'],['../a00677.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c']]], + ['atcac_5fsha256_5fhmac_5fupdate_527',['atcac_sha256_hmac_update',['../a00671.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00677.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], + ['atcac_5fsha2_5f256_5fctx_528',['atcac_sha2_256_ctx',['../a01831.html',1,'']]], + ['atcac_5fsha2_5f384_5fctx_529',['atcac_sha2_384_ctx',['../a01835.html',1,'']]], + ['atcac_5fsha2_5f512_5fctx_530',['atcac_sha2_512_ctx',['../a01839.html',1,'']]], + ['atcac_5fsha384_5fen_531',['ATCAC_SHA384_EN',['../a00815.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): atca_config_check.h'],['../a00506.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): crypto_sw_config_check.h'],['../a00668.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): atca_mbedtls_interface.h'],['../a00680.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): atca_openssl_interface.h']]], + ['atcac_5fsha512_5fen_532',['ATCAC_SHA512_EN',['../a00680.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): atca_openssl_interface.h'],['../a00668.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): atca_mbedtls_interface.h'],['../a00506.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): crypto_sw_config_check.h'],['../a00815.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): atca_config_check.h']]], + ['atcac_5fsign_5fen_533',['ATCAC_SIGN_EN',['../a00506.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): crypto_sw_config_check.h'],['../a00815.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): atca_config_check.h']]], + ['atcac_5fsw_5frandom_534',['atcac_sw_random',['../a00677.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_openssl_interface.c'],['../a00671.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_mbedtls_wrap.c']]], + ['atcac_5fsw_5fsha1_5ffinish_535',['atcac_sw_sha1_finish',['../a00671.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_mbedtls_wrap.c'],['../a00677.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_openssl_interface.c']]], + ['atcac_5fsw_5fsha1_5finit_536',['atcac_sw_sha1_init',['../a00671.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_mbedtls_wrap.c'],['../a00677.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_openssl_interface.c']]], + ['atcac_5fsw_5fsha1_5fupdate_537',['atcac_sw_sha1_update',['../a00677.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c'],['../a00671.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c']]], + ['atcac_5fverify_5fen_538',['ATCAC_VERIFY_EN',['../a00815.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): atca_config_check.h'],['../a00506.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): crypto_sw_config_check.h']]], + ['atcac_5fx509_5fctx_539',['atcac_x509_ctx',['../a01799.html',1,'']]], + ['atcacert_2eh_540',['atcacert.h',['../a00278.html',1,'']]], + ['atcacert_5fbuild_5fstate_5fs_541',['atcacert_build_state_s',['../a01631.html',1,'']]], + ['atcacert_5fbuild_5fstate_5ft_542',['atcacert_build_state_t',['../a01470.html#ga199c030847111ed09a682ca61b7597a9',1,'atcacert_def.h']]], + ['atcacert_5fcalc_5fexpire_5fyears_543',['atcacert_calc_expire_years',['../a01470.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c'],['../a01470.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c']]], + ['atcacert_5fcert_5felement_5fs_544',['atcacert_cert_element_s',['../a01623.html',1,'']]], + ['atcacert_5fcert_5felement_5ft_545',['atcacert_cert_element_t',['../a01470.html#ga28ae8005ca4b109958b090d2079d190b',1,'atcacert_cert_element_t(): atcacert_def.h'],['../a02251.html',1,'cryptoauthlib.atcacert.atcacert_cert_element_t']]], + ['atcacert_5fcert_5floc_5fs_546',['atcacert_cert_loc_s',['../a01619.html',1,'']]], + ['atcacert_5fcert_5floc_5ft_547',['atcacert_cert_loc_t',['../a01470.html#gad473c89ee9a934029ff87e86fc1c570d',1,'atcacert_cert_loc_t(): atcacert_def.h'],['../a02247.html',1,'cryptoauthlib.atcacert.atcacert_cert_loc_t']]], + ['atcacert_5fcert_5fsn_5fsrc_5fe_548',['atcacert_cert_sn_src_e',['../a01470.html#ga813047a656af7fe578d28fd54c840e8e',1,'atcacert_def.h']]], + ['atcacert_5fcert_5fsn_5fsrc_5ft_549',['atcacert_cert_sn_src_t',['../a01470.html#ga3bddddfbb916fe1dd1e935e454d3265b',1,'atcacert_cert_sn_src_t(): atcacert_def.h'],['../a02215.html',1,'cryptoauthlib.atcacert.atcacert_cert_sn_src_t']]], + ['atcacert_5fcert_5ftype_5fe_550',['atcacert_cert_type_e',['../a01470.html#ga5430f01929cd7269e04db08d1f28642f',1,'atcacert_def.h']]], + ['atcacert_5fcert_5ftype_5ft_551',['atcacert_cert_type_t',['../a01470.html#gae63503395992a60853867e3865f75be0',1,'atcacert_cert_type_t(): atcacert_def.h'],['../a02211.html',1,'cryptoauthlib.atcacert.atcacert_cert_type_t']]], + ['atcacert_5fcheck_5fconfig_2eh_552',['atcacert_check_config.h',['../a00281.html',1,'']]], + ['atcacert_5fclient_2ec_553',['atcacert_client.c',['../a00284.html',1,'']]], + ['atcacert_5fclient_2eh_554',['atcacert_client.h',['../a00287.html',1,'']]], + ['atcacert_5fcomp_5fdata_5ft_555',['atcacert_comp_data_t',['../a02239.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fcreate_5fcsr_556',['atcacert_create_csr',['../a01480.html#a453696e86822c980d8e5b9e6a27eb861',1,'cryptoauthlib.atcacert.atcacert_create_csr()'],['../a01470.html#ga9b103dcc50fefcb19514285da7fbe296',1,'atcacert_create_csr(const atcacert_def_t *csr_def, uint8_t *csr, size_t *csr_size): atcacert_client.h']]], + ['atcacert_5fcreate_5fcsr_5fpem_557',['atcacert_create_csr_pem',['../a01470.html#ga1e4f207e7180d504c5dd369cd20fef21',1,'atcacert_create_csr_pem(): atcacert_client.h'],['../a01480.html#a6c23b4916b8fa6dc8aa56b45f558d870',1,'cryptoauthlib.atcacert.atcacert_create_csr_pem()']]], + ['atcacert_5fdate_2ec_558',['atcacert_date.c',['../a00290.html',1,'']]], + ['atcacert_5fdate_2eh_559',['atcacert_date.h',['../a00293.html',1,'']]], + ['atcacert_5fdate_5fcmp_560',['atcacert_date_cmp',['../a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c'],['../a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c']]], + ['atcacert_5fdate_5fdec_561',['atcacert_date_dec',['../a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01480.html#a7e05b319688a07bbfeee23895341303e',1,'cryptoauthlib.atcacert.atcacert_date_dec()']]], + ['atcacert_5fdate_5fdec_5fcompcert_562',['atcacert_date_dec_compcert',['../a01470.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01470.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01480.html#a7910146d6e2097e9fb075a2bf60d1b25',1,'cryptoauthlib.atcacert.atcacert_date_dec_compcert()']]], + ['atcacert_5fdate_5fdec_5fcompcert_5fext_563',['atcacert_date_dec_compcert_ext',['../a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], + ['atcacert_5fdate_5fenc_564',['atcacert_date_enc',['../a01470.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01470.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01480.html#a23ff0ccfc75d564fc9f6200ef8cff5fb',1,'cryptoauthlib.atcacert.atcacert_date_enc()']]], + ['atcacert_5fdate_5fenc_5fcompcert_565',['atcacert_date_enc_compcert',['../a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c'],['../a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c'],['../a01480.html#a82bd7bbea46866cb644016ea7faff329',1,'cryptoauthlib.atcacert.atcacert_date_enc_compcert()']]], + ['atcacert_5fdate_5fenc_5fcompcert_5fext_566',['atcacert_date_enc_compcert_ext',['../a01470.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c'],['../a01470.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c']]], + ['atcacert_5fdate_5fformat_5ft_567',['atcacert_date_format_t',['../a02227.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fdate_5ffrom_5fasn1_5ftag_568',['atcacert_date_from_asn1_tag',['../a01470.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c'],['../a01470.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c']]], + ['atcacert_5fdate_5fget_5fmax_5fdate_569',['atcacert_date_get_max_date',['../a01480.html#a0ffefee23107bcbbadef2508ccaaba4f',1,'cryptoauthlib.atcacert.atcacert_date_get_max_date()'],['../a01470.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01470.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c']]], + ['atcacert_5fdecode_5fpem_570',['atcacert_decode_pem',['../a00323.html#a32d4e4f417e88b56b9adc5b7c521d545',1,'atcacert_pem.h']]], + ['atcacert_5fdecode_5fpem_5fcert_571',['atcacert_decode_pem_cert',['../a00323.html#a5ee7c8e3893e67ae0a622bddc443bcbd',1,'atcacert_pem.h']]], + ['atcacert_5fdecode_5fpem_5fcsr_572',['atcacert_decode_pem_csr',['../a00323.html#adfccc0bc91b144dffab3aba96126800f',1,'atcacert_pem.h']]], + ['atcacert_5fdef_2ec_573',['atcacert_def.c',['../a00296.html',1,'']]], + ['atcacert_5fdef_2eh_574',['atcacert_def.h',['../a00299.html',1,'']]], + ['atcacert_5fdef_5fs_575',['atcacert_def_s',['../a01627.html',1,'']]], + ['atcacert_5fdef_5ft_576',['atcacert_def_t',['../a01470.html#ga01be962d7321095d15547113d727c97d',1,'atcacert_def_t(): atcacert_def.h'],['../a02255.html',1,'cryptoauthlib.atcacert.atcacert_def_t']]], + ['atcacert_5fder_2ec_577',['atcacert_der.c',['../a00302.html',1,'']]], + ['atcacert_5fder_2eh_578',['atcacert_der.h',['../a00305.html',1,'']]], + ['atcacert_5fder_5fdec_5fecdsa_5fsig_5fvalue_579',['atcacert_der_dec_ecdsa_sig_value',['../a01470.html#gab22e2c8bf627f700be0e10e331bfdb1f',1,'atcacert_der.h']]], + ['atcacert_5fder_5fdec_5finteger_580',['atcacert_der_dec_integer',['../a01470.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb',1,'atcacert_der.h']]], + ['atcacert_5fder_5fdec_5flength_581',['atcacert_der_dec_length',['../a01470.html#ga9d4810aa2fd1db14a8f91204387fd972',1,'atcacert_der.h']]], + ['atcacert_5fder_5fenc_5fecdsa_5fsig_5fvalue_582',['atcacert_der_enc_ecdsa_sig_value',['../a01470.html#gacee7e7eb74c022b2ea70c7a549d5f876',1,'atcacert_der.h']]], + ['atcacert_5fder_5fenc_5finteger_583',['atcacert_der_enc_integer',['../a01470.html#gadc86044101ad9a87556d49ab8bf892af',1,'atcacert_der.h']]], + ['atcacert_5fder_5fenc_5flength_584',['atcacert_der_enc_length',['../a01470.html#ga5866e20dc2c7f9d788924155eac4fece',1,'atcacert_der.h']]], + ['atcacert_5fdevice_5floc_5fs_585',['atcacert_device_loc_s',['../a01615.html',1,'']]], + ['atcacert_5fdevice_5floc_5ft_586',['atcacert_device_loc_t',['../a01470.html#ga5973a9cc26357822a232433f57741777',1,'atcacert_device_loc_t(): atcacert_def.h'],['../a02243.html',1,'cryptoauthlib.atcacert.atcacert_device_loc_t']]], + ['atcacert_5fdevice_5fzone_5fe_587',['atcacert_device_zone_e',['../a01470.html#ga1c0876228cb459f64347a63f3bae4c73',1,'atcacert_def.h']]], + ['atcacert_5fdevice_5fzone_5ft_588',['atcacert_device_zone_t',['../a01470.html#ga63df515d393c9ebb6979d53208263458',1,'atcacert_device_zone_t(): atcacert_def.h'],['../a02219.html',1,'cryptoauthlib.atcacert.atcacert_device_zone_t']]], + ['atcacert_5fe_5fbad_5fcert_589',['ATCACERT_E_BAD_CERT',['../a01470.html#ga822ee0620c8d2d12ff971b9b35f9f5cd',1,'atcacert.h']]], + ['atcacert_5fe_5fbad_5fparams_590',['ATCACERT_E_BAD_PARAMS',['../a01470.html#ga47509d283523ab1892fb8746d6f4e37d',1,'atcacert.h']]], + ['atcacert_5fe_5fbuffer_5ftoo_5fsmall_591',['ATCACERT_E_BUFFER_TOO_SMALL',['../a01470.html#ga7a2e774fc8b12c4045dea335a86afca6',1,'atcacert.h']]], + ['atcacert_5fe_5fdecoding_5ferror_592',['ATCACERT_E_DECODING_ERROR',['../a01470.html#gaea155533fdd352d6602d3e2fc717930f',1,'atcacert.h']]], + ['atcacert_5fe_5felem_5fmissing_593',['ATCACERT_E_ELEM_MISSING',['../a01470.html#ga8e3e7c64650c92364bbac17f6a75474a',1,'atcacert.h']]], + ['atcacert_5fe_5felem_5fout_5fof_5fbounds_594',['ATCACERT_E_ELEM_OUT_OF_BOUNDS',['../a01470.html#ga62604c78d688530173e203b02df180fa',1,'atcacert.h']]], + ['atcacert_5fe_5ferror_595',['ATCACERT_E_ERROR',['../a01470.html#ga048a6bb9781dbbc402409a172f976f74',1,'atcacert.h']]], + ['atcacert_5fe_5finvalid_5fdate_596',['ATCACERT_E_INVALID_DATE',['../a01470.html#gaafd66d6744314225ead24b3901bd6372',1,'atcacert.h']]], + ['atcacert_5fe_5finvalid_5ftransform_597',['ATCACERT_E_INVALID_TRANSFORM',['../a01470.html#ga2396e500bd36c2316a1a6e13e3117958',1,'atcacert.h']]], + ['atcacert_5fe_5fsuccess_598',['ATCACERT_E_SUCCESS',['../a01470.html#ga7bd1ad830360fc8b988f855da6d0d5ba',1,'atcacert.h']]], + ['atcacert_5fe_5funexpected_5felem_5fsize_599',['ATCACERT_E_UNEXPECTED_ELEM_SIZE',['../a01470.html#ga5a7cb98e18ad338f2eaf6594acb67c32',1,'atcacert.h']]], + ['atcacert_5fe_5funimplemented_600',['ATCACERT_E_UNIMPLEMENTED',['../a01470.html#ga4b6db1523875a2b1453ef5e16989ecd4',1,'atcacert.h']]], + ['atcacert_5fe_5fverify_5ffailed_601',['ATCACERT_E_VERIFY_FAILED',['../a01470.html#gae1da5e02cd9b4ee7b8617d7bce0a5b5d',1,'atcacert.h']]], + ['atcacert_5fen_602',['ATCACERT_EN',['../a00815.html#a3d181d31956d42db1d25281deca4c7e3',1,'atca_config_check.h']]], + ['atcacert_5fencode_5fpem_603',['atcacert_encode_pem',['../a00323.html#a65ca7cd1f2358ad40ae4c8c13f6d817c',1,'atcacert_pem.h']]], + ['atcacert_5fencode_5fpem_5fcert_604',['atcacert_encode_pem_cert',['../a00323.html#a206c4857a73ccfc7898131b61d43ba67',1,'atcacert_pem.h']]], + ['atcacert_5fencode_5fpem_5fcsr_605',['atcacert_encode_pem_csr',['../a00323.html#ad3b6773201632141bbc95ca6d43271f9',1,'atcacert_pem.h']]], + ['atcacert_5fgen_5fchallenge_5fhw_606',['atcacert_gen_challenge_hw',['../a01470.html#ga6692847d9c41eb73e469df029697a7b9',1,'atcacert_host_hw.h']]], + ['atcacert_5fgen_5fchallenge_5fsw_607',['atcacert_gen_challenge_sw',['../a01470.html#ga883a0c84474150e6b123dfab15a8c929',1,'atcacert_host_sw.h']]], + ['atcacert_5fget_5fauth_5fkey_5fid_608',['atcacert_get_auth_key_id',['../a01470.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c'],['../a01470.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c']]], + ['atcacert_5fget_5fcert_5fsn_609',['atcacert_get_cert_sn',['../a01470.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c'],['../a01470.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c']]], + ['atcacert_5fget_5fexpire_5fdate_610',['atcacert_get_expire_date',['../a01470.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01470.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], + ['atcacert_5fget_5fissue_5fdate_611',['atcacert_get_issue_date',['../a01470.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01470.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], + ['atcacert_5fget_5fissuer_612',['atcacert_get_issuer',['../a01470.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c'],['../a01470.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c']]], + ['atcacert_5fget_5fresponse_613',['atcacert_get_response',['../a01470.html#ga9a9769b84557ca2c47fa4442daa9a111',1,'atcacert_get_response(): atcacert_client.h'],['../a01480.html#a9c3717acbb392ceed968c1172400e6dd',1,'cryptoauthlib.atcacert.atcacert_get_response()']]], + ['atcacert_5fget_5fsubj_5fkey_5fid_614',['atcacert_get_subj_key_id',['../a01470.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c'],['../a01470.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c']]], + ['atcacert_5fget_5fsubj_5fpublic_5fkey_615',['atcacert_get_subj_public_key',['../a01470.html#ga263eee4dfc30ce4442bfa97f95bd5c30',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *subj_public_key): atcacert_def.c'],['../a01470.html#ga263eee4dfc30ce4442bfa97f95bd5c30',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *subj_public_key): atcacert_def.c']]], + ['atcacert_5fget_5fsubject_616',['atcacert_get_subject',['../a01470.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c'],['../a01470.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c']]], + ['atcacert_5fhost_5fhw_2ec_617',['atcacert_host_hw.c',['../a00308.html',1,'']]], + ['atcacert_5fhost_5fhw_2eh_618',['atcacert_host_hw.h',['../a00311.html',1,'']]], + ['atcacert_5fhost_5fsw_2ec_619',['atcacert_host_sw.c',['../a00314.html',1,'']]], + ['atcacert_5fhost_5fsw_2eh_620',['atcacert_host_sw.h',['../a00317.html',1,'']]], + ['atcacert_5fmax_5fcert_5fsize_621',['atcacert_max_cert_size',['../a01480.html#a3b6192388c29b0efb1968d6b44efd712',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fpem_2ec_622',['atcacert_pem.c',['../a00320.html',1,'']]], + ['atcacert_5fpem_2eh_623',['atcacert_pem.h',['../a00323.html',1,'']]], + ['atcacert_5fread_5fcert_624',['atcacert_read_cert',['../a01470.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01470.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01480.html#a4fe33f1da468796b39c80a34e12411fb',1,'cryptoauthlib.atcacert.atcacert_read_cert()']]], + ['atcacert_5fread_5fcert_5fext_625',['atcacert_read_cert_ext',['../a01470.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01470.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c']]], + ['atcacert_5fread_5fcert_5fsize_626',['atcacert_read_cert_size',['../a01470.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01470.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], + ['atcacert_5fread_5fcert_5fsize_5fext_627',['atcacert_read_cert_size_ext',['../a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], + ['atcacert_5fread_5fdevice_5floc_628',['atcacert_read_device_loc',['../a01470.html#ga7eb1ce78d2efb60aa56b929577fa88d2',1,'atcacert_client.h']]], + ['atcacert_5fread_5fdevice_5floc_5fext_629',['atcacert_read_device_loc_ext',['../a01470.html#ga9d69be730c8bd7863588c43ebe58b225',1,'atcacert_client.h']]], + ['atcacert_5fread_5fsubj_5fkey_5fid_630',['atcacert_read_subj_key_id',['../a01470.html#ga7f12776448f02a8c9862c4af64537017',1,'atcacert_client.h']]], + ['atcacert_5fread_5fsubj_5fkey_5fid_5fext_631',['atcacert_read_subj_key_id_ext',['../a01470.html#gacb6ecab7acc06102caee5419a01bd803',1,'atcacert_client.h']]], + ['atcacert_5fstd_5fcert_5felement_5fe_632',['atcacert_std_cert_element_e',['../a01470.html#ga77184d0c71198b489ea9b57d07da824e',1,'atcacert_def.h']]], + ['atcacert_5fstd_5fcert_5felement_5ft_633',['atcacert_std_cert_element_t',['../a01470.html#ga70deb837a72574263e6fb0721d8e0616',1,'atcacert_std_cert_element_t(): atcacert_def.h'],['../a02231.html',1,'cryptoauthlib.atcacert.atcacert_std_cert_element_t']]], + ['atcacert_5ftm_5futc_5fs_634',['atcacert_tm_utc_s',['../a01611.html',1,'']]], + ['atcacert_5ftm_5futc_5ft_635',['atcacert_tm_utc_t',['../a01470.html#ga4a59e158244def2c79227aa244bd59c2',1,'atcacert_tm_utc_t(): atcacert_date.h'],['../a02259.html',1,'cryptoauthlib.atcacert.atcacert_tm_utc_t']]], + ['atcacert_5ftransform_5fe_636',['atcacert_transform_e',['../a01470.html#ga121ffde3250c4ca6947c680868aa6017',1,'atcacert_def.h']]], + ['atcacert_5ftransform_5ft_637',['atcacert_transform_t',['../a01470.html#ga249c2793a533c5487b5b7b935683a78f',1,'atcacert_transform_t(): atcacert_def.h'],['../a02223.html',1,'cryptoauthlib.atcacert.atcacert_transform_t']]], + ['atcacert_5fverify_5fcert_5fhw_638',['atcacert_verify_cert_hw',['../a01470.html#ga42939c26927fb65340ff1ebb2914a976',1,'atcacert_host_hw.h']]], + ['atcacert_5fverify_5fcert_5fsw_639',['atcacert_verify_cert_sw',['../a01470.html#ga5bad45c1fda32b7a57275af23ab0f626',1,'atcacert_host_sw.h']]], + ['atcacert_5fverify_5fresponse_5fhw_640',['atcacert_verify_response_hw',['../a01470.html#ga1441695a23776f3b38722e51fd3c36e3',1,'atcacert_host_hw.h']]], + ['atcacert_5fverify_5fresponse_5fsw_641',['atcacert_verify_response_sw',['../a01470.html#gab67e7a4c5899ef5402ff44f3f91d20b5',1,'atcacert_host_sw.h']]], + ['atcacert_5fwrite_5fcert_642',['atcacert_write_cert',['../a01470.html#gafa00725d50c68cfd2e0072bf563491a0',1,'atcacert_write_cert(): atcacert_client.h'],['../a01480.html#a5c4d1755dfd9a2b378cd45f14de1f1ee',1,'cryptoauthlib.atcacert.atcacert_write_cert()']]], + ['atcacert_5fwrite_5fcert_5fext_643',['atcacert_write_cert_ext',['../a01470.html#ga25a3291ce46841ca52346b42dc416485',1,'atcacert_client.h']]], + ['atcadevice_20_28atca_5f_29_644',['ATCADevice (atca_)',['../a01468.html',1,'']]], + ['atcadevicestate_645',['ATCADeviceState',['../a01468.html#ga765308123cf522f5ec8b528bf4ea1243',1,'atca_device.h']]], + ['atcadevicetype_646',['ATCADeviceType',['../a02495.html',1,'cryptoauthlib::iface']]], + ['atcaenum_647',['AtcaEnum',['../a02263.html',1,'cryptoauthlib::atcaenum']]], + ['atcah_5fcheck_5fmac_648',['ATCAH_CHECK_MAC',['../a00653.html#a063f7ad7678d60de756ef8526b9dfea1',1,'atca_host_config_check.h']]], + ['atcah_5fconfig_5fto_5fsign_5finternal_649',['ATCAH_CONFIG_TO_SIGN_INTERNAL',['../a00653.html#ae427973632a62dfd8f35709c21993190',1,'atca_host_config_check.h']]], + ['atcah_5fdecrypt_650',['ATCAH_DECRYPT',['../a00653.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b',1,'atca_host_config_check.h']]], + ['atcah_5fdelete_5fmac_651',['ATCAH_DELETE_MAC',['../a00653.html#acd2c32968024ddc7c650102a5076d70b',1,'atca_host_config_check.h']]], + ['atcah_5fderive_5fkey_652',['ATCAH_DERIVE_KEY',['../a00653.html#ada4b87726e822b6e94dcc18eefc39049',1,'atca_host_config_check.h']]], + ['atcah_5fderive_5fkey_5fmac_653',['ATCAH_DERIVE_KEY_MAC',['../a00653.html#a22a85235261861839a0db05649999ef5',1,'atca_host_config_check.h']]], + ['atcah_5fencode_5fcounter_5fmatch_654',['ATCAH_ENCODE_COUNTER_MATCH',['../a00653.html#a2ecb26546b49e369aeaf86bccf10a2e9',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5fkey_5fmsg_655',['ATCAH_GEN_KEY_MSG',['../a00653.html#a371384b4f8d818c31dee337aa4e24403',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5fmac_656',['ATCAH_GEN_MAC',['../a00653.html#a0f0e6c501c2dc57b4ed68fe29780b062',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5foutput_5fresp_5fmac_657',['ATCAH_GEN_OUTPUT_RESP_MAC',['../a00653.html#a70d0b80d637281693321866bd3c2735f',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5fsession_5fkey_658',['ATCAH_GEN_SESSION_KEY',['../a00653.html#aa5220706535f7367e06aa2aadebc0b57',1,'atca_host_config_check.h']]], + ['atcah_5fgendig_659',['ATCAH_GENDIG',['../a00653.html#aec5752be28ebfd8dc506bda7c36b9f7d',1,'atca_host_config_check.h']]], + ['atcah_5fgendivkey_660',['ATCAH_GENDIVKEY',['../a00653.html#af25240ee5ff347e1cf2768bfd513345f',1,'atca_host_config_check.h']]], + ['atcah_5fhmac_661',['ATCAH_HMAC',['../a00653.html#a6a86a40deff31dbaf005519aba627991',1,'atca_host_config_check.h']]], + ['atcah_5finclude_5fdata_662',['ATCAH_INCLUDE_DATA',['../a00653.html#a6442329f443943bbc8f3e10dde67930d',1,'atca_host_config_check.h']]], + ['atcah_5fio_5fdecrypt_663',['ATCAH_IO_DECRYPT',['../a00653.html#ae58a45ab173bf9ca7c4cdf4768fcf00e',1,'atca_host_config_check.h']]], + ['atcah_5fmac_664',['ATCAH_MAC',['../a00653.html#a33ac8a876197c7774452b7b46411f188',1,'atca_host_config_check.h']]], + ['atcah_5fnonce_665',['ATCAH_NONCE',['../a00653.html#a879c87175b07e859a15320e199a104a6',1,'atca_host_config_check.h']]], + ['atcah_5fprivwrite_5fauth_5fmac_666',['ATCAH_PRIVWRITE_AUTH_MAC',['../a00653.html#a13ed9a07ad5f74cfb67b7582c1b638a3',1,'atca_host_config_check.h']]], + ['atcah_5fsecureboot_5fenc_667',['ATCAH_SECUREBOOT_ENC',['../a00653.html#a745b85254a910c7d8edbea41ab927cf4',1,'atca_host_config_check.h']]], + ['atcah_5fsecureboot_5fmac_668',['ATCAH_SECUREBOOT_MAC',['../a00653.html#aa1d0ffc3e79f52154b2e362b74b7b112',1,'atca_host_config_check.h']]], + ['atcah_5fsha256_669',['ATCAH_SHA256',['../a00653.html#a58d2f9f20485ae35c2208f3bce5cb4a7',1,'atca_host_config_check.h']]], + ['atcah_5fsign_5finternal_5fmsg_670',['ATCAH_SIGN_INTERNAL_MSG',['../a00653.html#ad2e1b57a0f8a5dc87427b1eca18ac02f',1,'atca_host_config_check.h']]], + ['atcah_5fverify_5fmac_671',['ATCAH_VERIFY_MAC',['../a00653.html#a1515a97abca19263c1cf16dcbdd01944',1,'atca_host_config_check.h']]], + ['atcah_5fwrite_5fauth_5fmac_672',['ATCAH_WRITE_AUTH_MAC',['../a00653.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0',1,'atca_host_config_check.h']]], + ['atcahal_5ft_673',['ATCAHAL_t',['../a01603.html',1,'']]], + ['atcai2cmaster_674',['atcaI2Cmaster',['../a01679.html',1,'']]], + ['atcai2cmaster_5ft_675',['ATCAI2CMaster_t',['../a01473.html#ga06b19a932aea9cf3a5165fefacb24f7b',1,'hal_uc3_i2c_asf.h']]], + ['atcaiface_20_28atca_5f_29_676',['ATCAIface (atca_)',['../a01469.html',1,'']]], + ['atcaifacecfg_677',['ATCAIfaceCfg',['../a01539.html',1,'ATCAIfaceCfg'],['../a02535.html',1,'cryptoauthlib.iface.ATCAIfaceCfg']]], + ['atcaifacetype_678',['ATCAIfaceType',['../a01469.html#gac7f674d4a0afb12d2f3c9c5e98cb1089',1,'ATCAIfaceType(): atca_iface.h'],['../a02487.html',1,'cryptoauthlib.iface.ATCAIfaceType']]], + ['atcakittype_679',['ATCAKitType',['../a02491.html',1,'cryptoauthlib::iface']]], + ['atcalccrc_680',['atCalcCrc',['../a00356.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c'],['../a00353.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c']]], + ['atcapacket_681',['ATCAPacket',['../a01643.html',1,'']]], + ['atcareference_682',['AtcaReference',['../a02539.html',1,'cryptoauthlib::library']]], + ['atcastructure_683',['AtcaStructure',['../a02551.html',1,'cryptoauthlib::library']]], + ['atcaswimaster_684',['atcaSWImaster',['../a01707.html',1,'']]], + ['atcaswimaster_5ft_685',['ATCASWIMaster_t',['../a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_start.h'],['../a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_samd21_asf.h']]], + ['atcaunion_686',['AtcaUnion',['../a02547.html',1,'cryptoauthlib::library']]], + ['atcheckcrc_687',['atCheckCrc',['../a00353.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c'],['../a00356.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c']]], + ['atcontrol_688',['atcontrol',['../a01469.html#ga324cef45a35e02b387001afdc9092778',1,'atca_iface.c']]], + ['atcrc_689',['atCRC',['../a00353.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c'],['../a00356.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c']]], + ['atecc508a_5fconfig_5fs_690',['atecc508a_config_s',['../a01651.html',1,'']]], + ['atecc508aconfig_691',['Atecc508aConfig',['../a02335.html',1,'cryptoauthlib::device']]], + ['atecc608_5fconfig_5fs_692',['atecc608_config_s',['../a01655.html',1,'']]], + ['atecc608config_693',['Atecc608Config',['../a02339.html',1,'cryptoauthlib::device']]], + ['atgetiface_694',['atGetIFace',['../a01468.html#ga3f98e29cffa06446fc91b329703606af',1,'atca_device.c']]], + ['atgetifacecfg_695',['atgetifacecfg',['../a01469.html#gac88ba81abfd42df65c6c0c64414dfc6e',1,'atca_iface.c']]], + ['atgetifacehaldat_696',['atgetifacehaldat',['../a01469.html#ga5e4163b8882d4eb42d4d5191c8731da0',1,'atca_iface.c']]], + ['atidle_697',['atidle',['../a01469.html#gac794fffe040e6d47a34c756720f3cbea',1,'atca_iface.c']]], + ['atinfo_698',['atInfo',['../a00353.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00356.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], + ['atinit_699',['atinit',['../a01469.html#ga386353e8700eec35e4548dfa29f13b8d',1,'atca_iface.c']]], + ['atiseccfamily_700',['atIsECCFamily',['../a00356.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c'],['../a00353.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c']]], + ['atisshafamily_701',['atIsSHAFamily',['../a00353.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c'],['../a00356.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c']]], + ['atpause_702',['atPause',['../a00353.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00356.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], + ['atreceive_703',['atreceive',['../a01469.html#ga01badea388343bdf5929c5c2be9f426b',1,'atca_iface.c']]], + ['atsend_704',['atsend',['../a01469.html#gabd4f20b06efedede6bc4a836cfad8f38',1,'atca_iface.c']]], + ['atsha204a_705',['ATSHA204A',['../a01468.html#ga054acfe7d4dd4064f9d27a9ea7fc2337',1,'atca_devtypes.h']]], + ['atsha204a_5fconfig_5fs_706',['atsha204a_config_s',['../a01647.html',1,'']]], + ['atsha204aconfig_707',['Atsha204aConfig',['../a02331.html',1,'cryptoauthlib::device']]], + ['atsleep_708',['atsleep',['../a01469.html#gac06336335e5f3191e3b1fc06d2830d96',1,'atca_iface.c']]], + ['attrib_5ff_709',['attrib_f',['../a00692.html#ac11a80ac0cea6f244191654180db0693',1,'pkcs11_attrib.h']]], + ['attributes_710',['attributes',['../a01887.html#afbc894d3ed866954b79e43b30031f293',1,'pkcs11_object_s']]], + ['attributes_20_28pkcs11_5fattrib_5f_29_711',['Attributes (pkcs11_attrib_)',['../a01477.html',1,'']]], + ['atwake_712',['atwake',['../a01469.html#ga32693c852341e1b946bab3cca5f71761',1,'atca_iface.c']]], + ['auth_5fmac_713',['auth_mac',['../a01755.html#aaa57ce590925c0efe017af1d4457d479',1,'atca_write_mac_in_out']]] ]; diff --git a/search/all_10.js b/search/all_10.js index 311c32f94..2b72119ea 100644 --- a/search/all_10.js +++ b/search/all_10.js @@ -1,131 +1,133 @@ var searchData= [ - ['p_5ftemp_0',['p_temp',['../a01447.html#ga80ad9effe2957aaa0e604b175fcdbc63',1,'atca_include_data_in_out']]], - ['packet_5falloc_1',['packet_alloc',['../a01652.html#a72b6c6e17726b3e9db70d78e0c52f02c',1,'atca_hal_kit_phy_t']]], - ['packet_5ffree_2',['packet_free',['../a01652.html#a09209305fd48261b835daf6026b7b659',1,'atca_hal_kit_phy_t']]], - ['packhex_3',['packHex',['../a00251.html#ad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c'],['../a01439.html#gad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c']]], - ['param2_4',['param2',['../a01716.html#ac94f545daf7381aeb770fb42b467d338',1,'atca_secureboot_mac_in_out']]], - ['parent_5fkey_5',['parent_key',['../a01740.html#ad9e30a4f9006923af0d6668768598737',1,'atca_derive_key_in_out::parent_key()'],['../a01744.html#acb88b64064f725ca81245f2afe6f57f5',1,'atca_derive_key_mac_in_out::parent_key()']]], - ['parityerror_6',['ParityError',['../a02384.html',1,'cryptoauthlib::exceptions']]], - ['parseerror_7',['ParseError',['../a02332.html',1,'cryptoauthlib::exceptions']]], - ['pause_5fcount_8',['PAUSE_COUNT',['../a00350.html#aa914251d0e03f7d1850ee04296715f14',1,'calib_command.h']]], - ['pause_5fparam2_5fidx_9',['PAUSE_PARAM2_IDX',['../a00350.html#ad74ed86697c0977d4e0a2451068b7131',1,'calib_command.h']]], - ['pause_5frsp_5fsize_10',['PAUSE_RSP_SIZE',['../a00350.html#a5859f9a2eb99b4636c894705047e9344',1,'calib_command.h']]], - ['pause_5fselect_5fidx_11',['PAUSE_SELECT_IDX',['../a00350.html#a49f538b630cc416a8ad1f6d784e3a1e4',1,'calib_command.h']]], - ['pcks11_5fmech_5ftable_5fe_12',['pcks11_mech_table_e',['../a01848.html',1,'']]], - ['phy_13',['phy',['../a01648.html#afad6f95d2a6e23fe87839c64417111d3',1,'atca_hal_list_entry_t::phy()'],['../a01584.html#a3ac7e576da4958d6c0488ec606d9cbff',1,'atca_iface::phy()']]], - ['pkcs11_20application_20information_14',['PKCS11 Application Information',['../a02827.html',1,'']]], - ['pkcs11_5fattrib_2ec_15',['pkcs11_attrib.c',['../a00674.html',1,'']]], - ['pkcs11_5fattrib_2eh_16',['pkcs11_attrib.h',['../a00677.html',1,'']]], - ['pkcs11_5fattrib_5ffill_17',['pkcs11_attrib_fill',['../a01450.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01450.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c']]], - ['pkcs11_5fattrib_5fmodel_5fs_18',['pkcs11_attrib_model_s',['../a01820.html',1,'']]], - ['pkcs11_5fattrib_5fvalue_19',['pkcs11_attrib_value',['../a01450.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01450.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c']]], - ['pkcs11_5fcert_2ec_20',['pkcs11_cert.c',['../a00680.html',1,'']]], - ['pkcs11_5fcert_2eh_21',['pkcs11_cert.h',['../a00683.html',1,'']]], - ['pkcs11_5fcert_5fwtlspublic_5fattributes_22',['pkcs11_cert_wtlspublic_attributes',['../a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c'],['../a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c']]], - ['pkcs11_5fcert_5fx509_5fattributes_23',['pkcs11_cert_x509_attributes',['../a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c'],['../a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c']]], - ['pkcs11_5fcert_5fx509public_5fattributes_24',['pkcs11_cert_x509public_attributes',['../a01450.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c'],['../a01450.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c']]], - ['pkcs11_5fconf_5ffiledata_5fs_25',['pkcs11_conf_filedata_s',['../a01824.html',1,'']]], - ['pkcs11_5fconfig_2ec_26',['pkcs11_config.c',['../a00785.html',1,'']]], - ['pkcs11_5fdebug_2ec_27',['pkcs11_debug.c',['../a00689.html',1,'']]], - ['pkcs11_5fdebug_2eh_28',['pkcs11_debug.h',['../a00692.html',1,'']]], - ['pkcs11_5fdecrypt_5ffinal_29',['pkcs11_decrypt_final',['../a01450.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c'],['../a01450.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c']]], - ['pkcs11_5fdeinit_30',['pkcs11_deinit',['../a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c'],['../a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c']]], - ['pkcs11_5fdev_5fctx_31',['pkcs11_dev_ctx',['../a01828.html',1,'']]], - ['pkcs11_5fdev_5fres_32',['pkcs11_dev_res',['../a01832.html',1,'']]], - ['pkcs11_5fdev_5fstate_33',['pkcs11_dev_state',['../a01836.html',1,'']]], - ['pkcs11_5fdigest_34',['pkcs11_digest',['../a00698.html#a81936ce8429c7a97bc42921589c1522e',1,'pkcs11_digest.c']]], - ['pkcs11_5fdigest_2eh_35',['pkcs11_digest.h',['../a00698.html',1,'']]], - ['pkcs11_5fdigest_5ffinal_36',['pkcs11_digest_final',['../a00698.html#abd1c9ccc6899b550d241f007fd023d6b',1,'pkcs11_digest.c']]], - ['pkcs11_5fdigest_5finit_37',['pkcs11_digest_init',['../a00698.html#a903aed9c7d096dced1233a11539c781d',1,'pkcs11_digest.c']]], - ['pkcs11_5fdigest_5fupdate_38',['pkcs11_digest_update',['../a00698.html#a87a4b63b1a4ced5e40a1cc0bbc88599d',1,'pkcs11_digest.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp224_39',['pkcs11_ec_pbkey_asn1_hdr_p224',['../a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c'],['../a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp256_40',['pkcs11_ec_pbkey_asn1_hdr_p256',['../a01450.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c'],['../a01450.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp384_41',['pkcs11_ec_pbkey_asn1_hdr_p384',['../a01450.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c'],['../a01450.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp521_42',['pkcs11_ec_pbkey_asn1_hdr_p521',['../a01450.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c'],['../a01450.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c']]], - ['pkcs11_5fecc_5fkey_5finfo_5fs_43',['pkcs11_ecc_key_info_s',['../a01844.html',1,'']]], - ['pkcs11_5fencrypt_2ec_44',['pkcs11_encrypt.c',['../a00701.html',1,'']]], - ['pkcs11_5fencrypt_2eh_45',['pkcs11_encrypt.h',['../a00704.html',1,'']]], - ['pkcs11_5fencrypt_5ffinal_46',['pkcs11_encrypt_final',['../a01450.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c'],['../a01450.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c']]], - ['pkcs11_5ffind_2ec_47',['pkcs11_find.c',['../a00707.html',1,'']]], - ['pkcs11_5ffind_2eh_48',['pkcs11_find.h',['../a00710.html',1,'']]], - ['pkcs11_5fget_5fcontext_49',['pkcs11_get_context',['../a01450.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c'],['../a01450.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c']]], - ['pkcs11_5fget_5flib_5finfo_50',['pkcs11_get_lib_info',['../a01450.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c'],['../a01450.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c']]], - ['pkcs11_5finfo_2ec_51',['pkcs11_info.c',['../a00713.html',1,'']]], - ['pkcs11_5finfo_2eh_52',['pkcs11_info.h',['../a00716.html',1,'']]], - ['pkcs11_5finit_53',['pkcs11_init',['../a01450.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c'],['../a01450.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c']]], - ['pkcs11_5finit_2ec_54',['pkcs11_init.c',['../a00719.html',1,'']]], - ['pkcs11_5finit_2eh_55',['pkcs11_init.h',['../a00722.html',1,'']]], - ['pkcs11_5finit_5fcheck_56',['pkcs11_init_check',['../a01450.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c'],['../a01450.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c']]], - ['pkcs11_5fkey_2ec_57',['pkcs11_key.c',['../a00725.html',1,'']]], - ['pkcs11_5fkey_2eh_58',['pkcs11_key.h',['../a00728.html',1,'']]], - ['pkcs11_5fkey_5fprivate_5fattributes_59',['pkcs11_key_private_attributes',['../a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c'],['../a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c']]], - ['pkcs11_5fkey_5fpublic_5fattributes_60',['pkcs11_key_public_attributes',['../a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c'],['../a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c']]], - ['pkcs11_5fkey_5fsecret_5fattributes_61',['pkcs11_key_secret_attributes',['../a01450.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c'],['../a01450.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c']]], - ['pkcs11_5flib_5fctx_62',['pkcs11_lib_ctx',['../a00722.html#a829124de0deebf29734cd6390a232292',1,'pkcs11_init.h']]], - ['pkcs11_5flib_5fctx_5fs_63',['pkcs11_lib_ctx_s',['../a01840.html',1,'']]], - ['pkcs11_5fmain_2ec_64',['pkcs11_main.c',['../a00731.html',1,'']]], - ['pkcs11_5fmech_2ec_65',['pkcs11_mech.c',['../a00734.html',1,'']]], - ['pkcs11_5fmech_2eh_66',['pkcs11_mech.h',['../a00737.html',1,'']]], - ['pkcs11_5fobject_2ec_67',['pkcs11_object.c',['../a00740.html',1,'']]], - ['pkcs11_5fobject_2eh_68',['pkcs11_object.h',['../a00743.html',1,'']]], - ['pkcs11_5fobject_5fcache_5fs_69',['pkcs11_object_cache_s',['../a01856.html',1,'']]], - ['pkcs11_5fobject_5fcreate_70',['pkcs11_object_create',['../a01450.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c'],['../a01450.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c']]], - ['pkcs11_5fobject_5fdestroy_71',['pkcs11_object_destroy',['../a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c'],['../a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c']]], - ['pkcs11_5fobject_5fis_5fprivate_72',['pkcs11_object_is_private',['../a01450.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c'],['../a01450.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c']]], - ['pkcs11_5fobject_5fmonotonic_5fattributes_73',['pkcs11_object_monotonic_attributes',['../a01450.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c'],['../a01450.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c']]], - ['pkcs11_5fobject_5fs_74',['pkcs11_object_s',['../a01852.html',1,'']]], - ['pkcs11_5fos_2ec_75',['pkcs11_os.c',['../a00746.html',1,'']]], - ['pkcs11_5fos_2eh_76',['pkcs11_os.h',['../a00749.html',1,'']]], - ['pkcs11_5fos_5fcreate_5fmutex_77',['pkcs11_os_create_mutex',['../a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c'],['../a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c']]], - ['pkcs11_5fsession_2ec_78',['pkcs11_session.c',['../a00752.html',1,'']]], - ['pkcs11_5fsession_2eh_79',['pkcs11_session.h',['../a00755.html',1,'']]], - ['pkcs11_5fsession_5fcheck_80',['pkcs11_session_check',['../a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c'],['../a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c']]], - ['pkcs11_5fsession_5fcloseall_81',['pkcs11_session_closeall',['../a01450.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c'],['../a01450.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c']]], - ['pkcs11_5fsession_5fctx_82',['pkcs11_session_ctx',['../a00755.html#a9d8980ea83d2e8eb2a9f45210ba5c54d',1,'pkcs11_session.h']]], - ['pkcs11_5fsession_5fctx_5fs_83',['pkcs11_session_ctx_s',['../a01872.html',1,'']]], - ['pkcs11_5fsession_5fget_5finfo_84',['pkcs11_session_get_info',['../a01450.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c'],['../a01450.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c']]], - ['pkcs11_5fsession_5flogin_85',['pkcs11_session_login',['../a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c'],['../a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c']]], - ['pkcs11_5fsession_5fmech_5fctx_5fs_86',['pkcs11_session_mech_ctx_s',['../a01860.html',1,'']]], - ['pkcs11_5fsignature_2ec_87',['pkcs11_signature.c',['../a00758.html',1,'']]], - ['pkcs11_5fsignature_2eh_88',['pkcs11_signature.h',['../a00761.html',1,'']]], - ['pkcs11_5fsignature_5fsign_89',['pkcs11_signature_sign',['../a01450.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01450.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fsign_5fcontinue_90',['pkcs11_signature_sign_continue',['../a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fsign_5ffinish_91',['pkcs11_signature_sign_finish',['../a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fsign_5finit_92',['pkcs11_signature_sign_init',['../a01450.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01450.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_93',['pkcs11_signature_verify',['../a01450.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01450.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_5fcontinue_94',['pkcs11_signature_verify_continue',['../a01450.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01450.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_5ffinish_95',['pkcs11_signature_verify_finish',['../a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_5finit_96',['pkcs11_signature_verify_init',['../a01450.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01450.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], - ['pkcs11_5fslot_2ec_97',['pkcs11_slot.c',['../a00764.html',1,'']]], - ['pkcs11_5fslot_2eh_98',['pkcs11_slot.h',['../a00767.html',1,'']]], - ['pkcs11_5fslot_5fctx_99',['pkcs11_slot_ctx',['../a00767.html#a1813685567d78b9f762d2f1eec531616',1,'pkcs11_slot.h']]], - ['pkcs11_5fslot_5fctx_5fs_100',['pkcs11_slot_ctx_s',['../a01876.html',1,'']]], - ['pkcs11_5fslot_5fget_5fcontext_101',['pkcs11_slot_get_context',['../a01450.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01450.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c']]], - ['pkcs11_5fslot_5fget_5finfo_102',['pkcs11_slot_get_info',['../a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c'],['../a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c']]], - ['pkcs11_5fslot_5finit_103',['pkcs11_slot_init',['../a01450.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01450.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c']]], - ['pkcs11_5ftoken_2ec_104',['pkcs11_token.c',['../a00788.html',1,'']]], - ['pkcs11_5ftoken_2eh_105',['pkcs11_token.h',['../a00770.html',1,'']]], - ['pkcs11_5ftoken_5fget_5finfo_106',['pkcs11_token_get_info',['../a01450.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c'],['../a01450.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c']]], - ['pkcs11_5ftoken_5finit_107',['pkcs11_token_init',['../a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c'],['../a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c']]], - ['pkcs11_5ftoken_5frandom_108',['pkcs11_token_random',['../a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c'],['../a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c']]], - ['pkcs11_5futil_2ec_109',['pkcs11_util.c',['../a00773.html',1,'']]], - ['pkcs11_5futil_2eh_110',['pkcs11_util.h',['../a00776.html',1,'']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec224_111',['pkcs11_x962_asn1_hdr_ec224',['../a01450.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c'],['../a01450.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec256_112',['pkcs11_x962_asn1_hdr_ec256',['../a01450.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c'],['../a01450.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec384_113',['pkcs11_x962_asn1_hdr_ec384',['../a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c'],['../a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec521_114',['pkcs11_x962_asn1_hdr_ec521',['../a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c'],['../a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c']]], - ['privwrite_5fcount_115',['PRIVWRITE_COUNT',['../a00350.html#a17980d6743441fa2afd71523006ae058',1,'calib_command.h']]], - ['privwrite_5fkeyid_5fidx_116',['PRIVWRITE_KEYID_IDX',['../a00350.html#a4aa5b68bbd7847f53444608615653832',1,'calib_command.h']]], - ['privwrite_5fmac_5fidx_117',['PRIVWRITE_MAC_IDX',['../a00350.html#a20afccf35c609f05a3d7dc70687baa2e',1,'calib_command.h']]], - ['privwrite_5fmode_5fencrypt_118',['PRIVWRITE_MODE_ENCRYPT',['../a00350.html#afa24177621a8a2fbe041ef0ce73a414d',1,'calib_command.h']]], - ['privwrite_5frsp_5fsize_119',['PRIVWRITE_RSP_SIZE',['../a00350.html#aa66ad8429261c1ba13d064d660d6d464',1,'calib_command.h']]], - ['privwrite_5fvalue_5fidx_120',['PRIVWRITE_VALUE_IDX',['../a00350.html#ab65b17098ebc6027a9240ca84c07ab5c',1,'calib_command.h']]], - ['privwrite_5fzone_5fidx_121',['PRIVWRITE_ZONE_IDX',['../a00350.html#a376a70cf087e157cbb914d9ca2e5b989',1,'calib_command.h']]], - ['privwrite_5fzone_5fmask_122',['PRIVWRITE_ZONE_MASK',['../a00350.html#aba7cf525ec69429e947f294361e1cdab',1,'calib_command.h']]], - ['public_5fkey_123',['public_key',['../a01447.html#gaf61f82fe19690b80bf370b295c58920b',1,'atca_verify_in_out::public_key()'],['../a01764.html#ad6eba00bdedd4375c93419eb4cda6850',1,'atca_gen_key_in_out::public_key()']]], - ['public_5fkey_5fsize_124',['public_key_size',['../a01764.html#a44b034625f63afcfaab306ac6275cd5b',1,'atca_gen_key_in_out']]], - ['pyjwt_125',['PyJWT',['../a02240.html',1,'cryptoauthlib::atjwt']]], - ['python_20cryptoauthlib_20module_126',['Python CryptoAuthLib module',['../a02837.html',1,'']]], - ['python_20cryptoauthlib_20module_20testing_127',['Python CryptoAuthLib Module Testing',['../a02838.html',1,'']]] + ['p_5ftemp_0',['p_temp',['../a01474.html#ga80ad9effe2957aaa0e604b175fcdbc63',1,'atca_include_data_in_out']]], + ['packet_5falloc_1',['packet_alloc',['../a01671.html#a72b6c6e17726b3e9db70d78e0c52f02c',1,'atca_hal_kit_phy_t']]], + ['packet_5ffree_2',['packet_free',['../a01671.html#a09209305fd48261b835daf6026b7b659',1,'atca_hal_kit_phy_t']]], + ['packhex_3',['packHex',['../a00257.html#ad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c'],['../a01466.html#gad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c']]], + ['param2_4',['param2',['../a01735.html#ac94f545daf7381aeb770fb42b467d338',1,'atca_secureboot_mac_in_out']]], + ['parent_5fkey_5',['parent_key',['../a01759.html#ad9e30a4f9006923af0d6668768598737',1,'atca_derive_key_in_out::parent_key()'],['../a01763.html#acb88b64064f725ca81245f2afe6f57f5',1,'atca_derive_key_mac_in_out::parent_key()']]], + ['parityerror_6',['ParityError',['../a02419.html',1,'cryptoauthlib::exceptions']]], + ['parseerror_7',['ParseError',['../a02367.html',1,'cryptoauthlib::exceptions']]], + ['pause_5fcount_8',['PAUSE_COUNT',['../a00356.html#aa914251d0e03f7d1850ee04296715f14',1,'calib_command.h']]], + ['pause_5fparam2_5fidx_9',['PAUSE_PARAM2_IDX',['../a00356.html#ad74ed86697c0977d4e0a2451068b7131',1,'calib_command.h']]], + ['pause_5frsp_5fsize_10',['PAUSE_RSP_SIZE',['../a00356.html#a5859f9a2eb99b4636c894705047e9344',1,'calib_command.h']]], + ['pause_5fselect_5fidx_11',['PAUSE_SELECT_IDX',['../a00356.html#a49f538b630cc416a8ad1f6d784e3a1e4',1,'calib_command.h']]], + ['pcks11_5fmech_5ftable_5fe_12',['pcks11_mech_table_e',['../a01883.html',1,'']]], + ['phy_13',['phy',['../a01607.html#a3ac7e576da4958d6c0488ec606d9cbff',1,'atca_iface::phy()'],['../a01667.html#afad6f95d2a6e23fe87839c64417111d3',1,'atca_hal_list_entry_t::phy()']]], + ['pkcs11_20application_20information_14',['PKCS11 Application Information',['../a02862.html',1,'']]], + ['pkcs11_5fattrib_2ec_15',['pkcs11_attrib.c',['../a00689.html',1,'']]], + ['pkcs11_5fattrib_2eh_16',['pkcs11_attrib.h',['../a00692.html',1,'']]], + ['pkcs11_5fattrib_5ffill_17',['pkcs11_attrib_fill',['../a01477.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01477.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c']]], + ['pkcs11_5fattrib_5fmodel_5fs_18',['pkcs11_attrib_model_s',['../a01847.html',1,'']]], + ['pkcs11_5fattrib_5fvalue_19',['pkcs11_attrib_value',['../a01477.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01477.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c']]], + ['pkcs11_5fcert_2ec_20',['pkcs11_cert.c',['../a00695.html',1,'']]], + ['pkcs11_5fcert_2eh_21',['pkcs11_cert.h',['../a00698.html',1,'']]], + ['pkcs11_5fcert_5fwtlspublic_5fattributes_22',['pkcs11_cert_wtlspublic_attributes',['../a01477.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c'],['../a01477.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c']]], + ['pkcs11_5fcert_5fx509_5fattributes_23',['pkcs11_cert_x509_attributes',['../a01477.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c'],['../a01477.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c']]], + ['pkcs11_5fcert_5fx509public_5fattributes_24',['pkcs11_cert_x509public_attributes',['../a01477.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c'],['../a01477.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c']]], + ['pkcs11_5fconf_5ffiledata_5fs_25',['pkcs11_conf_filedata_s',['../a01851.html',1,'']]], + ['pkcs11_5fconfig_2ec_26',['pkcs11_config.c',['../a00800.html',1,'']]], + ['pkcs11_5fdebug_2ec_27',['pkcs11_debug.c',['../a00704.html',1,'']]], + ['pkcs11_5fdebug_2eh_28',['pkcs11_debug.h',['../a00707.html',1,'']]], + ['pkcs11_5fdecrypt_5ffinal_29',['pkcs11_decrypt_final',['../a01477.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c'],['../a01477.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c']]], + ['pkcs11_5fdeinit_30',['pkcs11_deinit',['../a01477.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c'],['../a01477.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c']]], + ['pkcs11_5fdev_5fctx_31',['pkcs11_dev_ctx',['../a01855.html',1,'']]], + ['pkcs11_5fdev_5fres_32',['pkcs11_dev_res',['../a01859.html',1,'']]], + ['pkcs11_5fdev_5fstate_33',['pkcs11_dev_state',['../a01863.html',1,'']]], + ['pkcs11_5fdigest_34',['pkcs11_digest',['../a00713.html#a81936ce8429c7a97bc42921589c1522e',1,'pkcs11_digest.c']]], + ['pkcs11_5fdigest_2eh_35',['pkcs11_digest.h',['../a00713.html',1,'']]], + ['pkcs11_5fdigest_5ffinal_36',['pkcs11_digest_final',['../a00713.html#abd1c9ccc6899b550d241f007fd023d6b',1,'pkcs11_digest.c']]], + ['pkcs11_5fdigest_5finit_37',['pkcs11_digest_init',['../a00713.html#a903aed9c7d096dced1233a11539c781d',1,'pkcs11_digest.c']]], + ['pkcs11_5fdigest_5fupdate_38',['pkcs11_digest_update',['../a00713.html#a87a4b63b1a4ced5e40a1cc0bbc88599d',1,'pkcs11_digest.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp224_39',['pkcs11_ec_pbkey_asn1_hdr_p224',['../a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c'],['../a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp256_40',['pkcs11_ec_pbkey_asn1_hdr_p256',['../a01477.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c'],['../a01477.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp384_41',['pkcs11_ec_pbkey_asn1_hdr_p384',['../a01477.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c'],['../a01477.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp521_42',['pkcs11_ec_pbkey_asn1_hdr_p521',['../a01477.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c'],['../a01477.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c']]], + ['pkcs11_5fecc_5fkey_5finfo_5fs_43',['pkcs11_ecc_key_info_s',['../a01871.html',1,'']]], + ['pkcs11_5fencrypt_2ec_44',['pkcs11_encrypt.c',['../a00716.html',1,'']]], + ['pkcs11_5fencrypt_2eh_45',['pkcs11_encrypt.h',['../a00719.html',1,'']]], + ['pkcs11_5fencrypt_5ffinal_46',['pkcs11_encrypt_final',['../a01477.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c'],['../a01477.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c']]], + ['pkcs11_5ffind_2ec_47',['pkcs11_find.c',['../a00722.html',1,'']]], + ['pkcs11_5ffind_2eh_48',['pkcs11_find.h',['../a00725.html',1,'']]], + ['pkcs11_5fget_5fcontext_49',['pkcs11_get_context',['../a01477.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c'],['../a01477.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c']]], + ['pkcs11_5fget_5flib_5finfo_50',['pkcs11_get_lib_info',['../a01477.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c'],['../a01477.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c']]], + ['pkcs11_5finfo_2ec_51',['pkcs11_info.c',['../a00728.html',1,'']]], + ['pkcs11_5finfo_2eh_52',['pkcs11_info.h',['../a00731.html',1,'']]], + ['pkcs11_5finit_53',['pkcs11_init',['../a01477.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c'],['../a01477.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c']]], + ['pkcs11_5finit_2ec_54',['pkcs11_init.c',['../a00734.html',1,'']]], + ['pkcs11_5finit_2eh_55',['pkcs11_init.h',['../a00737.html',1,'']]], + ['pkcs11_5finit_5fcheck_56',['pkcs11_init_check',['../a01477.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c'],['../a01477.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c']]], + ['pkcs11_5fkey_2ec_57',['pkcs11_key.c',['../a00740.html',1,'']]], + ['pkcs11_5fkey_2eh_58',['pkcs11_key.h',['../a00743.html',1,'']]], + ['pkcs11_5fkey_5finfo_5fs_59',['pkcs11_key_info_s',['../a01879.html',1,'']]], + ['pkcs11_5fkey_5fprivate_5fattributes_60',['pkcs11_key_private_attributes',['../a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c'],['../a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c']]], + ['pkcs11_5fkey_5fpublic_5fattributes_61',['pkcs11_key_public_attributes',['../a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c'],['../a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c']]], + ['pkcs11_5fkey_5fsecret_5fattributes_62',['pkcs11_key_secret_attributes',['../a01477.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c'],['../a01477.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c']]], + ['pkcs11_5flib_5fctx_63',['pkcs11_lib_ctx',['../a00737.html#a829124de0deebf29734cd6390a232292',1,'pkcs11_init.h']]], + ['pkcs11_5flib_5fctx_5fs_64',['pkcs11_lib_ctx_s',['../a01867.html',1,'']]], + ['pkcs11_5fmain_2ec_65',['pkcs11_main.c',['../a00746.html',1,'']]], + ['pkcs11_5fmech_2ec_66',['pkcs11_mech.c',['../a00749.html',1,'']]], + ['pkcs11_5fmech_2eh_67',['pkcs11_mech.h',['../a00752.html',1,'']]], + ['pkcs11_5fobject_2ec_68',['pkcs11_object.c',['../a00755.html',1,'']]], + ['pkcs11_5fobject_2eh_69',['pkcs11_object.h',['../a00758.html',1,'']]], + ['pkcs11_5fobject_5fcache_5fs_70',['pkcs11_object_cache_s',['../a01891.html',1,'']]], + ['pkcs11_5fobject_5fcreate_71',['pkcs11_object_create',['../a01477.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c'],['../a01477.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c']]], + ['pkcs11_5fobject_5fdestroy_72',['pkcs11_object_destroy',['../a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c'],['../a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c']]], + ['pkcs11_5fobject_5fis_5fprivate_73',['pkcs11_object_is_private',['../a01477.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c'],['../a01477.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c']]], + ['pkcs11_5fobject_5fmonotonic_5fattributes_74',['pkcs11_object_monotonic_attributes',['../a01477.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c'],['../a01477.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c']]], + ['pkcs11_5fobject_5fs_75',['pkcs11_object_s',['../a01887.html',1,'']]], + ['pkcs11_5fos_2ec_76',['pkcs11_os.c',['../a00761.html',1,'']]], + ['pkcs11_5fos_2eh_77',['pkcs11_os.h',['../a00764.html',1,'']]], + ['pkcs11_5fos_5fcreate_5fmutex_78',['pkcs11_os_create_mutex',['../a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c'],['../a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c']]], + ['pkcs11_5frsa_5fkey_5finfo_5fs_79',['pkcs11_rsa_key_info_s',['../a01875.html',1,'']]], + ['pkcs11_5fsession_2ec_80',['pkcs11_session.c',['../a00767.html',1,'']]], + ['pkcs11_5fsession_2eh_81',['pkcs11_session.h',['../a00770.html',1,'']]], + ['pkcs11_5fsession_5fcheck_82',['pkcs11_session_check',['../a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c'],['../a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c']]], + ['pkcs11_5fsession_5fcloseall_83',['pkcs11_session_closeall',['../a01477.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c'],['../a01477.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c']]], + ['pkcs11_5fsession_5fctx_84',['pkcs11_session_ctx',['../a00770.html#a9d8980ea83d2e8eb2a9f45210ba5c54d',1,'pkcs11_session.h']]], + ['pkcs11_5fsession_5fctx_5fs_85',['pkcs11_session_ctx_s',['../a01907.html',1,'']]], + ['pkcs11_5fsession_5fget_5finfo_86',['pkcs11_session_get_info',['../a01477.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c'],['../a01477.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c']]], + ['pkcs11_5fsession_5flogin_87',['pkcs11_session_login',['../a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c'],['../a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c']]], + ['pkcs11_5fsession_5fmech_5fctx_5fs_88',['pkcs11_session_mech_ctx_s',['../a01895.html',1,'']]], + ['pkcs11_5fsignature_2ec_89',['pkcs11_signature.c',['../a00773.html',1,'']]], + ['pkcs11_5fsignature_2eh_90',['pkcs11_signature.h',['../a00776.html',1,'']]], + ['pkcs11_5fsignature_5fsign_91',['pkcs11_signature_sign',['../a01477.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01477.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fsign_5fcontinue_92',['pkcs11_signature_sign_continue',['../a01477.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01477.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fsign_5ffinish_93',['pkcs11_signature_sign_finish',['../a01477.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01477.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fsign_5finit_94',['pkcs11_signature_sign_init',['../a01477.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01477.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_95',['pkcs11_signature_verify',['../a01477.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01477.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_5fcontinue_96',['pkcs11_signature_verify_continue',['../a01477.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01477.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_5ffinish_97',['pkcs11_signature_verify_finish',['../a01477.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01477.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_5finit_98',['pkcs11_signature_verify_init',['../a01477.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01477.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], + ['pkcs11_5fslot_2ec_99',['pkcs11_slot.c',['../a00779.html',1,'']]], + ['pkcs11_5fslot_2eh_100',['pkcs11_slot.h',['../a00782.html',1,'']]], + ['pkcs11_5fslot_5fctx_101',['pkcs11_slot_ctx',['../a00782.html#a1813685567d78b9f762d2f1eec531616',1,'pkcs11_slot.h']]], + ['pkcs11_5fslot_5fctx_5fs_102',['pkcs11_slot_ctx_s',['../a01911.html',1,'']]], + ['pkcs11_5fslot_5fget_5fcontext_103',['pkcs11_slot_get_context',['../a01477.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01477.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c']]], + ['pkcs11_5fslot_5fget_5finfo_104',['pkcs11_slot_get_info',['../a01477.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c'],['../a01477.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c']]], + ['pkcs11_5fslot_5finit_105',['pkcs11_slot_init',['../a01477.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01477.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c']]], + ['pkcs11_5ftoken_2ec_106',['pkcs11_token.c',['../a00803.html',1,'']]], + ['pkcs11_5ftoken_2eh_107',['pkcs11_token.h',['../a00785.html',1,'']]], + ['pkcs11_5ftoken_5fget_5finfo_108',['pkcs11_token_get_info',['../a01477.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c'],['../a01477.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c']]], + ['pkcs11_5ftoken_5finit_109',['pkcs11_token_init',['../a01477.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c'],['../a01477.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c']]], + ['pkcs11_5ftoken_5frandom_110',['pkcs11_token_random',['../a01477.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c'],['../a01477.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c']]], + ['pkcs11_5futil_2ec_111',['pkcs11_util.c',['../a00788.html',1,'']]], + ['pkcs11_5futil_2eh_112',['pkcs11_util.h',['../a00791.html',1,'']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec224_113',['pkcs11_x962_asn1_hdr_ec224',['../a01477.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c'],['../a01477.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec256_114',['pkcs11_x962_asn1_hdr_ec256',['../a01477.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c'],['../a01477.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec384_115',['pkcs11_x962_asn1_hdr_ec384',['../a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c'],['../a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec521_116',['pkcs11_x962_asn1_hdr_ec521',['../a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c'],['../a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c']]], + ['privwrite_5fcount_117',['PRIVWRITE_COUNT',['../a00356.html#a17980d6743441fa2afd71523006ae058',1,'calib_command.h']]], + ['privwrite_5fkeyid_5fidx_118',['PRIVWRITE_KEYID_IDX',['../a00356.html#a4aa5b68bbd7847f53444608615653832',1,'calib_command.h']]], + ['privwrite_5fmac_5fidx_119',['PRIVWRITE_MAC_IDX',['../a00356.html#a20afccf35c609f05a3d7dc70687baa2e',1,'calib_command.h']]], + ['privwrite_5fmode_5fencrypt_120',['PRIVWRITE_MODE_ENCRYPT',['../a00356.html#afa24177621a8a2fbe041ef0ce73a414d',1,'calib_command.h']]], + ['privwrite_5frsp_5fsize_121',['PRIVWRITE_RSP_SIZE',['../a00356.html#aa66ad8429261c1ba13d064d660d6d464',1,'calib_command.h']]], + ['privwrite_5fvalue_5fidx_122',['PRIVWRITE_VALUE_IDX',['../a00356.html#ab65b17098ebc6027a9240ca84c07ab5c',1,'calib_command.h']]], + ['privwrite_5fzone_5fidx_123',['PRIVWRITE_ZONE_IDX',['../a00356.html#a376a70cf087e157cbb914d9ca2e5b989',1,'calib_command.h']]], + ['privwrite_5fzone_5fmask_124',['PRIVWRITE_ZONE_MASK',['../a00356.html#aba7cf525ec69429e947f294361e1cdab',1,'calib_command.h']]], + ['public_5fkey_125',['public_key',['../a01474.html#gaf61f82fe19690b80bf370b295c58920b',1,'atca_verify_in_out::public_key()'],['../a01783.html#ad6eba00bdedd4375c93419eb4cda6850',1,'atca_gen_key_in_out::public_key()']]], + ['public_5fkey_5fsize_126',['public_key_size',['../a01783.html#a44b034625f63afcfaab306ac6275cd5b',1,'atca_gen_key_in_out']]], + ['pyjwt_127',['PyJWT',['../a02275.html',1,'cryptoauthlib::atjwt']]], + ['python_20cryptoauthlib_20module_128',['Python CryptoAuthLib module',['../a02873.html',1,'']]], + ['python_20cryptoauthlib_20module_20testing_129',['Python CryptoAuthLib Module Testing',['../a02874.html',1,'']]] ]; diff --git a/search/all_11.js b/search/all_11.js index 56208c26e..c8d0b84d0 100644 --- a/search/all_11.js +++ b/search/all_11.js @@ -1,28 +1,28 @@ var searchData= [ - ['rand_5fout_0',['rand_out',['../a01447.html#gadc3dc30e978bcf18656aedb6dd4a62f2',1,'atca_nonce_in_out']]], - ['random_5fcount_1',['RANDOM_COUNT',['../a00350.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0',1,'calib_command.h']]], - ['random_5fmode_5fidx_2',['RANDOM_MODE_IDX',['../a00350.html#ac846e3f7c924497d70254125dae38dce',1,'calib_command.h']]], - ['random_5fno_5fseed_5fupdate_3',['RANDOM_NO_SEED_UPDATE',['../a00350.html#a444d3fe4302ca95080d919dc89b1bc52',1,'calib_command.h']]], - ['random_5fnum_5fsize_4',['RANDOM_NUM_SIZE',['../a00350.html#a2197c0ad6c0fbf1c801228de9bf0d2ab',1,'calib_command.h']]], - ['random_5fparam2_5fidx_5',['RANDOM_PARAM2_IDX',['../a00350.html#a3f54bd6d53a687ae3660196497e8faa1',1,'calib_command.h']]], - ['random_5frsp_5fsize_6',['RANDOM_RSP_SIZE',['../a00350.html#aeb7623b070997b65f0bb108abf8e5f44',1,'calib_command.h']]], - ['random_5fseed_5fupdate_7',['RANDOM_SEED_UPDATE',['../a00350.html#af12673d4006ff926c863b2d0f9038561',1,'calib_command.h']]], - ['read_5f32_5frsp_5fsize_8',['READ_32_RSP_SIZE',['../a00350.html#ad79706b7b1e6c0e0d29afe692d8d5c06',1,'calib_command.h']]], - ['read_5f4_5frsp_5fsize_9',['READ_4_RSP_SIZE',['../a00350.html#a041cfaec382d0a67dcfe36d43332da48',1,'calib_command.h']]], - ['read_5faddr_5fidx_10',['READ_ADDR_IDX',['../a00350.html#af9f464ac4065aff75f5967933725d665',1,'calib_command.h']]], - ['read_5fcount_11',['READ_COUNT',['../a00350.html#ad222baf9301d2d35a5c928a0d91c4335',1,'calib_command.h']]], - ['read_5fkey_12',['read_key',['../a01876.html#a75cbe04e1812bbae8b4bb552991a1584',1,'pkcs11_slot_ctx_s']]], - ['read_5fzone_5fidx_13',['READ_ZONE_IDX',['../a00350.html#ae273cfc99b8538b3c81ba8240a6ff425',1,'calib_command.h']]], - ['read_5fzone_5fmask_14',['READ_ZONE_MASK',['../a00350.html#acf9c81ae1249f3c174ec75cf65517176',1,'calib_command.h']]], - ['receiveerror_15',['ReceiveError',['../a02372.html',1,'cryptoauthlib::exceptions']]], - ['receivetimeouterror_16',['ReceiveTimeoutError',['../a02392.html',1,'cryptoauthlib::exceptions']]], - ['recv_17',['recv',['../a01652.html#abb9616bec2cdd4f546884a45953cb054',1,'atca_hal_kit_phy_t']]], - ['releaseatcadevice_18',['releaseATCADevice',['../a01441.html#gab729e6c838c0a247d4f226fb92492d96',1,'atca_device.c']]], - ['releaseatcaiface_19',['releaseATCAIface',['../a01442.html#gab9ee16357a8e397a72eda7e9c8553fb3',1,'atca_iface.c']]], - ['resources_20',['resources',['../a01836.html#aa10b79b793bf8499c396e5108ed5830c',1,'pkcs11_dev_state']]], - ['response_21',['response',['../a01447.html#gacf6675faad5f7a43ca3fbec2108f57cd',1,'atca_hmac_in_out::response()'],['../a01447.html#ga3237adaae1e30c7ed469405e1ebfb435',1,'atca_mac_in_out::response()']]], - ['resyncwithwakeuperror_22',['ResyncWithWakeupError',['../a02380.html',1,'cryptoauthlib::exceptions']]], - ['rsa2048_5fkey_5fsize_23',['RSA2048_KEY_SIZE',['../a00350.html#aeb3783d1cdf4f9c1217d030bc0386fad',1,'calib_command.h']]], - ['rx_5ftx_5fdelay_24',['RX_TX_DELAY',['../a00587.html#a60ba93807a2c0ea2ce1432245f3f7da0',1,'hal_swi_gpio.h']]] + ['rand_5fout_0',['rand_out',['../a01474.html#gadc3dc30e978bcf18656aedb6dd4a62f2',1,'atca_nonce_in_out']]], + ['random_5fcount_1',['RANDOM_COUNT',['../a00356.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0',1,'calib_command.h']]], + ['random_5fmode_5fidx_2',['RANDOM_MODE_IDX',['../a00356.html#ac846e3f7c924497d70254125dae38dce',1,'calib_command.h']]], + ['random_5fno_5fseed_5fupdate_3',['RANDOM_NO_SEED_UPDATE',['../a00356.html#a444d3fe4302ca95080d919dc89b1bc52',1,'calib_command.h']]], + ['random_5fnum_5fsize_4',['RANDOM_NUM_SIZE',['../a00356.html#a2197c0ad6c0fbf1c801228de9bf0d2ab',1,'calib_command.h']]], + ['random_5fparam2_5fidx_5',['RANDOM_PARAM2_IDX',['../a00356.html#a3f54bd6d53a687ae3660196497e8faa1',1,'calib_command.h']]], + ['random_5frsp_5fsize_6',['RANDOM_RSP_SIZE',['../a00356.html#aeb7623b070997b65f0bb108abf8e5f44',1,'calib_command.h']]], + ['random_5fseed_5fupdate_7',['RANDOM_SEED_UPDATE',['../a00356.html#af12673d4006ff926c863b2d0f9038561',1,'calib_command.h']]], + ['read_5f32_5frsp_5fsize_8',['READ_32_RSP_SIZE',['../a00356.html#ad79706b7b1e6c0e0d29afe692d8d5c06',1,'calib_command.h']]], + ['read_5f4_5frsp_5fsize_9',['READ_4_RSP_SIZE',['../a00356.html#a041cfaec382d0a67dcfe36d43332da48',1,'calib_command.h']]], + ['read_5faddr_5fidx_10',['READ_ADDR_IDX',['../a00356.html#af9f464ac4065aff75f5967933725d665',1,'calib_command.h']]], + ['read_5fcount_11',['READ_COUNT',['../a00356.html#ad222baf9301d2d35a5c928a0d91c4335',1,'calib_command.h']]], + ['read_5fkey_12',['read_key',['../a01911.html#a75cbe04e1812bbae8b4bb552991a1584',1,'pkcs11_slot_ctx_s']]], + ['read_5fzone_5fidx_13',['READ_ZONE_IDX',['../a00356.html#ae273cfc99b8538b3c81ba8240a6ff425',1,'calib_command.h']]], + ['read_5fzone_5fmask_14',['READ_ZONE_MASK',['../a00356.html#acf9c81ae1249f3c174ec75cf65517176',1,'calib_command.h']]], + ['receiveerror_15',['ReceiveError',['../a02407.html',1,'cryptoauthlib::exceptions']]], + ['receivetimeouterror_16',['ReceiveTimeoutError',['../a02427.html',1,'cryptoauthlib::exceptions']]], + ['recv_17',['recv',['../a01671.html#abb9616bec2cdd4f546884a45953cb054',1,'atca_hal_kit_phy_t']]], + ['releaseatcadevice_18',['releaseATCADevice',['../a01468.html#gab729e6c838c0a247d4f226fb92492d96',1,'atca_device.c']]], + ['releaseatcaiface_19',['releaseATCAIface',['../a01469.html#gab9ee16357a8e397a72eda7e9c8553fb3',1,'atca_iface.c']]], + ['resources_20',['resources',['../a01863.html#aa10b79b793bf8499c396e5108ed5830c',1,'pkcs11_dev_state']]], + ['response_21',['response',['../a01474.html#gacf6675faad5f7a43ca3fbec2108f57cd',1,'atca_hmac_in_out::response()'],['../a01474.html#ga3237adaae1e30c7ed469405e1ebfb435',1,'atca_mac_in_out::response()']]], + ['resyncwithwakeuperror_22',['ResyncWithWakeupError',['../a02415.html',1,'cryptoauthlib::exceptions']]], + ['rsa2048_5fkey_5fsize_23',['RSA2048_KEY_SIZE',['../a00356.html#aeb3783d1cdf4f9c1217d030bc0386fad',1,'calib_command.h']]], + ['rx_5ftx_5fdelay_24',['RX_TX_DELAY',['../a00602.html#a60ba93807a2c0ea2ce1432245f3f7da0',1,'hal_swi_gpio.h']]] ]; diff --git a/search/all_12.js b/search/all_12.js index 584405363..382d11f7f 100644 --- a/search/all_12.js +++ b/search/all_12.js @@ -1,135 +1,134 @@ var searchData= [ - ['secure_20boot_20using_20atecc608_0',['Secure boot using ATECC608',['../a02829.html',1,'']]], + ['secure_20boot_20using_20atecc608_0',['Secure boot using ATECC608',['../a02864.html',1,'']]], ['secure_5fboot_2ec_1',['secure_boot.c',['../a00044.html',1,'']]], ['secure_5fboot_2eh_2',['secure_boot.h',['../a00047.html',1,'']]], - ['secure_5fboot_5fconfig_3',['secure_boot_config',['../a01716.html#a28771c8ed4754eabcb50649d753ee956',1,'atca_secureboot_mac_in_out']]], - ['secure_5fboot_5fconfig_5fbits_4',['secure_boot_config_bits',['../a01488.html',1,'']]], + ['secure_5fboot_5fconfig_3',['secure_boot_config',['../a01735.html#a28771c8ed4754eabcb50649d753ee956',1,'atca_secureboot_mac_in_out']]], + ['secure_5fboot_5fconfig_5fbits_4',['secure_boot_config_bits',['../a01515.html',1,'']]], ['secure_5fboot_5fmemory_2eh_5',['secure_boot_memory.h',['../a00050.html',1,'']]], - ['secure_5fboot_5fparameters_6',['secure_boot_parameters',['../a01492.html',1,'']]], + ['secure_5fboot_5fparameters_6',['secure_boot_parameters',['../a01519.html',1,'']]], ['secure_5fboot_5fprocess_7',['secure_boot_process',['../a00044.html#a861a785461af4116bca9343019225abd',1,'secure_boot_process(void): secure_boot.c'],['../a00047.html#a861a785461af4116bca9343019225abd',1,'secure_boot_process(void): secure_boot.c']]], - ['secureboot_8',['SecureBoot',['../a02280.html',1,'cryptoauthlib::device']]], - ['secureboot_5fcount_5fdig_9',['SECUREBOOT_COUNT_DIG',['../a00350.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e',1,'calib_command.h']]], - ['secureboot_5fcount_5fdig_5fsig_10',['SECUREBOOT_COUNT_DIG_SIG',['../a00350.html#abd28a29107703b43a734301acf491f5c',1,'calib_command.h']]], - ['secureboot_5fdigest_5fsize_11',['SECUREBOOT_DIGEST_SIZE',['../a00350.html#a9257968de99742ec468463a72588820f',1,'calib_command.h']]], - ['secureboot_5fmac_5fsize_12',['SECUREBOOT_MAC_SIZE',['../a00350.html#aed2edebc2be522d7bb38f85d273406f9',1,'calib_command.h']]], - ['secureboot_5fmode_5fenc_5fmac_5fflag_13',['SECUREBOOT_MODE_ENC_MAC_FLAG',['../a00350.html#abf2bad62bab02224f51d67f6725575a4',1,'calib_command.h']]], - ['secureboot_5fmode_5ffull_14',['SECUREBOOT_MODE_FULL',['../a00350.html#a122f4b7b9f1011c04385a7caccc2d536',1,'calib_command.h']]], - ['secureboot_5fmode_5ffull_5fcopy_15',['SECUREBOOT_MODE_FULL_COPY',['../a00350.html#a3d287922c127b599204ea3bc64d4a825',1,'calib_command.h']]], - ['secureboot_5fmode_5ffull_5fstore_16',['SECUREBOOT_MODE_FULL_STORE',['../a00350.html#a2aac76b15694b82fda038e127d152297',1,'calib_command.h']]], - ['secureboot_5fmode_5fidx_17',['SECUREBOOT_MODE_IDX',['../a00350.html#a7ff1918de6f8238ba4f67d9368e3587d',1,'calib_command.h']]], - ['secureboot_5fmode_5fmask_18',['SECUREBOOT_MODE_MASK',['../a00350.html#aac36b471fe92c252dd02a9d1cc2c65e2',1,'calib_command.h']]], - ['secureboot_5fmode_5fprohibit_5fflag_19',['SECUREBOOT_MODE_PROHIBIT_FLAG',['../a00350.html#a2d04ced68d56c0db40b93b767de02089',1,'calib_command.h']]], - ['secureboot_5frsp_5fsize_5fmac_20',['SECUREBOOT_RSP_SIZE_MAC',['../a00350.html#a3db7049de685080f046f0b4221de461b',1,'calib_command.h']]], - ['secureboot_5frsp_5fsize_5fno_5fmac_21',['SECUREBOOT_RSP_SIZE_NO_MAC',['../a00350.html#ab4657866a69a00b9b3bfa4df51521fa6',1,'calib_command.h']]], - ['secureboot_5fsignature_5fsize_22',['SECUREBOOT_SIGNATURE_SIZE',['../a00350.html#a51bd4fe709f11b3b50f47c2fb18976ca',1,'calib_command.h']]], - ['securebootconfig_5fmode_5fdisabled_23',['SECUREBOOTCONFIG_MODE_DISABLED',['../a00350.html#a76bf5d4ce89c95c658328fe8e66669e7',1,'calib_command.h']]], - ['securebootconfig_5fmode_5ffull_5fboth_24',['SECUREBOOTCONFIG_MODE_FULL_BOTH',['../a00350.html#a2b86bf6731827368bf66eec960c35a32',1,'calib_command.h']]], - ['securebootconfig_5fmode_5ffull_5fdig_25',['SECUREBOOTCONFIG_MODE_FULL_DIG',['../a00350.html#a9b7c3aca6168b52321e1951893efa050',1,'calib_command.h']]], - ['securebootconfig_5fmode_5ffull_5fsig_26',['SECUREBOOTCONFIG_MODE_FULL_SIG',['../a00350.html#a43bb6027c548274980a3ba42bdef51c9',1,'calib_command.h']]], - ['securebootconfig_5fmode_5fmask_27',['SECUREBOOTCONFIG_MODE_MASK',['../a00350.html#a0c9c951895abf02992e41c617702c2ea',1,'calib_command.h']]], - ['securebootconfig_5foffset_28',['SECUREBOOTCONFIG_OFFSET',['../a00350.html#ad10e2a3c801be9002d53af14357dbe9f',1,'calib_command.h']]], - ['security_20policy_29',['Security Policy',['../a02840.html',1,'']]], - ['selftest_5fcount_30',['SELFTEST_COUNT',['../a00350.html#a2aba96712a9932d61146c43289e9d808',1,'calib_command.h']]], - ['selftest_5fmode_5faes_31',['SELFTEST_MODE_AES',['../a00350.html#a91ebd87544ccdab3670cfbec8d23bd4a',1,'calib_command.h']]], - ['selftest_5fmode_5fall_32',['SELFTEST_MODE_ALL',['../a00350.html#a1ef61cb184d3ff5ef2f8bf9db6521888',1,'calib_command.h']]], - ['selftest_5fmode_5fecdh_33',['SELFTEST_MODE_ECDH',['../a00350.html#a01d7437a14fd35ccc926168fb4ca2ca7',1,'calib_command.h']]], - ['selftest_5fmode_5fecdsa_5fsign_5fverify_34',['SELFTEST_MODE_ECDSA_SIGN_VERIFY',['../a00350.html#afbd09beedecedcf316a6c02e40d1e712',1,'calib_command.h']]], - ['selftest_5fmode_5fidx_35',['SELFTEST_MODE_IDX',['../a00350.html#aa16bfad9cb883d258befaacadb3385ef',1,'calib_command.h']]], - ['selftest_5fmode_5frng_36',['SELFTEST_MODE_RNG',['../a00350.html#acd9a7a2257f664a4f9f674d37eb95bef',1,'calib_command.h']]], - ['selftest_5fmode_5fsha_37',['SELFTEST_MODE_SHA',['../a00350.html#afab9546447cf1e0020c32d298a1d897f',1,'calib_command.h']]], - ['selftest_5frsp_5fsize_38',['SELFTEST_RSP_SIZE',['../a00350.html#a7599639f80f3ac2a0d22f2857138cb87',1,'calib_command.h']]], - ['send_39',['send',['../a01652.html#a36eca94789cf465a9cb13e9a1ad92121',1,'atca_hal_kit_phy_t']]], - ['sha1_5froutines_2ec_40',['sha1_routines.c',['../a00494.html',1,'']]], - ['sha1_5froutines_2eh_41',['sha1_routines.h',['../a00497.html',1,'']]], - ['sha206a_5fauthenticate_42',['sha206a_authenticate',['../a00005.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a00008.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a01460.html#aca369f80d942aad6a827c2817c998df5',1,'cryptoauthlib.sha206_api.sha206a_authenticate()']]], - ['sha206a_5fcheck_5fdk_5fuseflag_5fvalidity_43',['sha206a_check_dk_useflag_validity',['../a00005.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(): api_206a.c'],['../a01460.html#ae4da1b83a8d9d37483a4b179edfeceff',1,'cryptoauthlib.sha206_api.sha206a_check_dk_useflag_validity()'],['../a00008.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(uint8_t *is_consumed): api_206a.c']]], - ['sha206a_5fcheck_5fpk_5fuseflag_5fvalidity_44',['sha206a_check_pk_useflag_validity',['../a00005.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a00008.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a01460.html#a1e60ef1b7888afae74b4e390a358d263',1,'cryptoauthlib.sha206_api.sha206a_check_pk_useflag_validity()']]], - ['sha206a_5fdiversify_5fparent_5fkey_45',['sha206a_diversify_parent_key',['../a00005.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a00008.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a01460.html#abe0624bf06c710473082bfbef52273f3',1,'cryptoauthlib.sha206_api.sha206a_diversify_parent_key(parent_key, diversified_key)']]], - ['sha206a_5fgenerate_5fchallenge_5fresponse_5fpair_46',['sha206a_generate_challenge_response_pair',['../a01460.html#a3c5cc4df72fb0dea8534dc7726430063',1,'cryptoauthlib.sha206_api.sha206a_generate_challenge_response_pair()'],['../a00005.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c'],['../a00008.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c']]], - ['sha206a_5fgenerate_5fderive_5fkey_47',['sha206a_generate_derive_key',['../a01460.html#a607ffbecea0980b58be2b31a8b87b983',1,'cryptoauthlib.sha206_api.sha206a_generate_derive_key()'],['../a00008.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(uint8_t *parent_key, uint8_t *derived_key, uint8_t param1, uint16_t param2): api_206a.c'],['../a00005.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(uint8_t *parent_key, uint8_t *derived_key, uint8_t param1, uint16_t param2): api_206a.c']]], - ['sha206a_5fget_5fdata_5fstore_5flock_5fstatus_48',['sha206a_get_data_store_lock_status',['../a01460.html#a4bc534fea446c5d50d4d3cde1cf4a4dc',1,'cryptoauthlib.sha206_api.sha206a_get_data_store_lock_status()'],['../a00008.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(uint8_t slot, uint8_t *is_locked): api_206a.c'],['../a00005.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(uint8_t slot, uint8_t *is_locked): api_206a.c']]], - ['sha206a_5fget_5fdk_5fupdate_5fcount_49',['sha206a_get_dk_update_count',['../a01460.html#ac96ca57f02ed212f0eb5ae95875d952c',1,'cryptoauthlib.sha206_api.sha206a_get_dk_update_count()'],['../a00008.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(uint8_t *dk_update_count): api_206a.c'],['../a00005.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(uint8_t *dk_update_count): api_206a.c']]], - ['sha206a_5fget_5fdk_5fuseflag_5fcount_50',['sha206a_get_dk_useflag_count',['../a00005.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(uint8_t *dk_available_count): api_206a.c'],['../a00008.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(uint8_t *dk_available_count): api_206a.c'],['../a01460.html#ae27b4776f24b612e4ea9e712c086d22b',1,'cryptoauthlib.sha206_api.sha206a_get_dk_useflag_count(dk_avail_count)']]], - ['sha206a_5fget_5fpk_5fuseflag_5fcount_51',['sha206a_get_pk_useflag_count',['../a01460.html#a710e3e25bc12a3ecd3051ebbb763c5b0',1,'cryptoauthlib.sha206_api.sha206a_get_pk_useflag_count()'],['../a00005.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(uint8_t *pk_available_count): api_206a.c'],['../a00008.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(uint8_t *pk_available_count): api_206a.c']]], - ['sha206a_5fread_5fdata_5fstore_52',['sha206a_read_data_store',['../a01460.html#aeed0ec7ac85e0588bc05822d6d63eaa3',1,'cryptoauthlib.sha206_api.sha206a_read_data_store()'],['../a00008.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(uint8_t slot, uint8_t *data, uint8_t offset, uint8_t len): api_206a.c'],['../a00005.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(uint8_t slot, uint8_t *data, uint8_t offset, uint8_t len): api_206a.c']]], - ['sha206a_5fverify_5fdevice_5fconsumption_53',['sha206a_verify_device_consumption',['../a01460.html#a0d2a1e79937863b4a48218de3567d996',1,'cryptoauthlib.sha206_api.sha206a_verify_device_consumption()'],['../a00008.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(uint8_t *is_consumed): api_206a.c'],['../a00005.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(uint8_t *is_consumed): api_206a.c']]], - ['sha206a_5fwrite_5fdata_5fstore_54',['sha206a_write_data_store',['../a00005.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a00008.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a01460.html#a1e883095c960da9d48db489a25774042',1,'cryptoauthlib.sha206_api.sha206a_write_data_store()']]], - ['sha2_5froutines_2ec_55',['sha2_routines.c',['../a00500.html',1,'']]], - ['sha2_5froutines_2eh_56',['sha2_routines.h',['../a00503.html',1,'']]], - ['sha_5fcount_5flong_57',['SHA_COUNT_LONG',['../a00350.html#ada37181a648dd51b374eec1cbb4bbaa3',1,'calib_command.h']]], - ['sha_5fmode_5f608_5fhmac_5fend_58',['SHA_MODE_608_HMAC_END',['../a00350.html#a625604e07a0618bd7d514faee5e42fba',1,'calib_command.h']]], - ['sha_5fmode_5fecc204_5fhmac_5fend_59',['SHA_MODE_ECC204_HMAC_END',['../a00350.html#a90fa979b13088478c8bcf8fd7a6bb541',1,'calib_command.h']]], - ['sha_5fmode_5fecc204_5fhmac_5fstart_60',['SHA_MODE_ECC204_HMAC_START',['../a00350.html#a41b6da4df887f3d2d38c26b49168d779',1,'calib_command.h']]], - ['sha_5fmode_5fhmac_5fend_61',['SHA_MODE_HMAC_END',['../a00350.html#aeb307ed9134e0fa2f0fcbdaf7b01515d',1,'calib_command.h']]], - ['sha_5fmode_5fhmac_5fstart_62',['SHA_MODE_HMAC_START',['../a00350.html#abbfeec0d0247336b8c6e993d4db17d11',1,'calib_command.h']]], - ['sha_5fmode_5fhmac_5fupdate_63',['SHA_MODE_HMAC_UPDATE',['../a00350.html#a2071156124a692a5f2a5c764c923f731',1,'calib_command.h']]], - ['sha_5fmode_5fmask_64',['SHA_MODE_MASK',['../a00350.html#a612cbf6171e9a0a176e0bd2844f49528',1,'calib_command.h']]], - ['sha_5fmode_5fread_5fcontext_65',['SHA_MODE_READ_CONTEXT',['../a00350.html#ac7e5a54695b8bd9e5087ebb94df70b39',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fend_66',['SHA_MODE_SHA256_END',['../a00350.html#a0e98e55c91c7559f57fdef4c9969c188',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fpublic_67',['SHA_MODE_SHA256_PUBLIC',['../a00350.html#a0f2fc749d3d196477b22cbceee856dfb',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fstart_68',['SHA_MODE_SHA256_START',['../a00350.html#ad42195362cd7dca0acabc8739c9a6fc4',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fupdate_69',['SHA_MODE_SHA256_UPDATE',['../a00350.html#a05ece414a0596ec9bb75c0ca8ca731dc',1,'calib_command.h']]], - ['sha_5fmode_5ftarget_5fmask_70',['SHA_MODE_TARGET_MASK',['../a00350.html#a70f88a123587c96ad7affc1e5dae9002',1,'calib_command.h']]], - ['sha_5fmode_5ftarget_5fmsgdigbuf_71',['SHA_MODE_TARGET_MSGDIGBUF',['../a00506.html#ae559b402c678cc51f8252b927b8781e5',1,'cryptoauthlib.h']]], - ['sha_5fmode_5ftarget_5fout_5fonly_72',['SHA_MODE_TARGET_OUT_ONLY',['../a00506.html#ae0df4b9151bb3d807bc1c532036c6d88',1,'cryptoauthlib.h']]], - ['sha_5fmode_5ftarget_5ftempkey_73',['SHA_MODE_TARGET_TEMPKEY',['../a00506.html#a850ec56b408fccccaea5826d452c3a64',1,'cryptoauthlib.h']]], - ['sha_5fmode_5fwrite_5fcontext_74',['SHA_MODE_WRITE_CONTEXT',['../a00350.html#a7b7c499931480a88f6a106644c3d2185',1,'calib_command.h']]], - ['sha_5frsp_5fsize_75',['SHA_RSP_SIZE',['../a00350.html#a8a5a586bdb0194be827417658836bf9c',1,'calib_command.h']]], - ['sha_5frsp_5fsize_5flong_76',['SHA_RSP_SIZE_LONG',['../a00350.html#ae5ad3c81d0b62f4b86a4a0dc84a79134',1,'calib_command.h']]], - ['sha_5frsp_5fsize_5fshort_77',['SHA_RSP_SIZE_SHORT',['../a00350.html#a74490b179b34f9925e9fe00675e53713',1,'calib_command.h']]], - ['sign_78',['sign',['../a02236.html#a21a92b8d373a29b54b11448fdb7b2ce4',1,'cryptoauthlib.atjwt.HwHmacAlgorithm.sign()'],['../a02232.html#a98b230727187cf34e600b9a6ff20cc45',1,'cryptoauthlib.atjwt.HwEcAlgorithm.sign()']]], - ['sign_5fcount_79',['SIGN_COUNT',['../a00350.html#aabff3f5b7f5391c27a0329ff0c997264',1,'calib_command.h']]], - ['sign_5fkeyid_5fidx_80',['SIGN_KEYID_IDX',['../a00350.html#a02f20fbee84fe680d94b94a2b2828040',1,'calib_command.h']]], - ['sign_5fmode_5fexternal_81',['SIGN_MODE_EXTERNAL',['../a00350.html#a9b6844bb107f02832a6d827b8c5b0fda',1,'calib_command.h']]], - ['sign_5fmode_5fidx_82',['SIGN_MODE_IDX',['../a00350.html#ae7cfb9eb789137f5ea9195a7a4f6b11e',1,'calib_command.h']]], - ['sign_5fmode_5finclude_5fsn_83',['SIGN_MODE_INCLUDE_SN',['../a00350.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116',1,'calib_command.h']]], - ['sign_5fmode_5finternal_84',['SIGN_MODE_INTERNAL',['../a00350.html#aced5221c0f15440eb52fa9f460956443',1,'calib_command.h']]], - ['sign_5fmode_5finvalidate_85',['SIGN_MODE_INVALIDATE',['../a00350.html#a1acc7b9af9cf3c6c556bd910ce4f239b',1,'calib_command.h']]], - ['sign_5fmode_5fmask_86',['SIGN_MODE_MASK',['../a00350.html#a88cc1851cedb6f2a73df4618dbc0b165',1,'calib_command.h']]], - ['sign_5fmode_5fsource_5fmask_87',['SIGN_MODE_SOURCE_MASK',['../a00350.html#a35246a9bad0d77d26b59b542928c9e34',1,'calib_command.h']]], - ['sign_5fmode_5fsource_5fmsgdigbuf_88',['SIGN_MODE_SOURCE_MSGDIGBUF',['../a00350.html#a1a38e9575eb4f714377889ce5270e60b',1,'calib_command.h']]], - ['sign_5fmode_5fsource_5ftempkey_89',['SIGN_MODE_SOURCE_TEMPKEY',['../a00350.html#a73670681360e1272aa13d1359e7bb275',1,'calib_command.h']]], - ['sign_5frsp_5fsize_90',['SIGN_RSP_SIZE',['../a00350.html#a66dba5e06f73c5df37c9d18409185f4d',1,'calib_command.h']]], - ['signature_91',['signature',['../a01708.html#ad94d1c8d1635e597bd70823a207dc727',1,'atca_verify_mac::signature()'],['../a01447.html#gad2e0f0dbb511520e5d79bdb4ab649c22',1,'atca_verify_in_out::signature()'],['../a01716.html#acafb471d7cc7a71d613503760930d9f5',1,'atca_secureboot_mac_in_out::signature()']]], - ['slot_92',['slot',['../a01592.html#ac393a690cd7891565dc679e6ffa4b021',1,'atcacert_device_loc_s']]], - ['slot_5fcnt_93',['slot_cnt',['../a01840.html#a9054ff97888d7fc21d1006b94808c6d9',1,'pkcs11_lib_ctx_s']]], - ['slot_5fconf_94',['slot_conf',['../a01728.html#a2d5854b66b7bc7246fa718a5d485d3fb',1,'atca_gen_dig_in_out']]], - ['slot_5fconfig_95',['slot_config',['../a01768.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154',1,'atca_sign_internal_in_out']]], - ['slot_5fkey_96',['slot_key',['../a01752.html#aad7093cf772d6e337b3c09af9cea92ac',1,'atca_check_mac_in_out']]], - ['slot_5flocked_97',['slot_locked',['../a01728.html#a787c86043a8c305bd23256248614a3f7',1,'atca_gen_dig_in_out']]], - ['slotconfig_98',['SlotConfig',['../a02268.html',1,'cryptoauthlib::device']]], - ['slots_99',['slots',['../a01840.html#aa1679efb012be2954b3eaf1881128f8f',1,'pkcs11_lib_ctx_s']]], - ['sn_100',['sn',['../a01447.html#ga46b121ddb13c417e4d65a3fc2f6c365b',1,'atca_include_data_in_out::sn()'],['../a01708.html#a5e63ccd727b87d022ed0eedc0446410f',1,'atca_verify_mac::sn()'],['../a01447.html#gaba323f1307689412ea6cc1e54810edb9',1,'atca_mac_in_out::sn()'],['../a01447.html#gaf0d7fe9a16cad1ba38c7daca4295823b',1,'atca_hmac_in_out::sn()'],['../a01728.html#ad8ca9262cbe607d0c017e12285c3d951',1,'atca_gen_dig_in_out::sn()'],['../a01732.html#ab2ca3ae12be534d58e22bb68d6042ea3',1,'atca_diversified_key_in_out::sn()'],['../a01736.html#a2c43368d48a41123da5f69356b6f29f5',1,'atca_write_mac_in_out::sn()'],['../a01768.html#a374985826f0c1b5c6aa52370f9871841',1,'atca_sign_internal_in_out::sn()'],['../a01764.html#a17c83c0e810b2bf35b364f026e1cecb0',1,'atca_gen_key_in_out::sn()'],['../a01752.html#a26f951076270f2389044a69b30c86d74',1,'atca_check_mac_in_out::sn()'],['../a01744.html#aeb90e80a488f568c4a193c1fe851c5d4',1,'atca_derive_key_mac_in_out::sn()'],['../a01740.html#a0e321ea27e36c985abacf4510619c9f0',1,'atca_derive_key_in_out::sn()']]], - ['snsrc_5fdevice_5fsn_101',['SNSRC_DEVICE_SN',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41',1,'atcacert_def.h']]], - ['snsrc_5fdevice_5fsn_5fhash_102',['SNSRC_DEVICE_SN_HASH',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2',1,'atcacert_def.h']]], - ['snsrc_5fdevice_5fsn_5fhash_5fpos_103',['SNSRC_DEVICE_SN_HASH_POS',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7',1,'atcacert_def.h']]], - ['snsrc_5fdevice_5fsn_5fhash_5fraw_104',['SNSRC_DEVICE_SN_HASH_RAW',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909',1,'atcacert_def.h']]], - ['snsrc_5fpub_5fkey_5fhash_105',['SNSRC_PUB_KEY_HASH',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e',1,'atcacert_def.h']]], - ['snsrc_5fpub_5fkey_5fhash_5fpos_106',['SNSRC_PUB_KEY_HASH_POS',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5',1,'atcacert_def.h']]], - ['snsrc_5fpub_5fkey_5fhash_5fraw_107',['SNSRC_PUB_KEY_HASH_RAW',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972',1,'atcacert_def.h']]], - ['snsrc_5fsigner_5fid_108',['SNSRC_SIGNER_ID',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff',1,'atcacert_def.h']]], - ['snsrc_5fstored_109',['SNSRC_STORED',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1',1,'atcacert_def.h']]], - ['snsrc_5fstored_5fdynamic_110',['SNSRC_STORED_DYNAMIC',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b',1,'atcacert_def.h']]], - ['software_20crypto_20methods_20_28atcac_5f_29_111',['Software crypto methods (atcac_)',['../a01445.html',1,'']]], - ['source_5fflag_112',['source_flag',['../a01692.html#abd69b6707bf73ae91675a6a0a250ca40',1,'atca_temp_key']]], - ['status_113',['Status',['../a02520.html',1,'cryptoauthlib::status']]], - ['statusunknownerror_114',['StatusUnknownError',['../a02340.html',1,'cryptoauthlib::exceptions']]], - ['stdcert_5fnum_5felements_115',['STDCERT_NUM_ELEMENTS',['../a01443.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f',1,'atcacert_def.h']]], - ['stored_5fvalue_116',['stored_value',['../a01728.html#a4f63b5946df323ef66910d4a0cdf2491',1,'atca_gen_dig_in_out']]], - ['sw_5fsha256_5fctx_117',['sw_sha256_ctx',['../a01644.html',1,'']]], - ['swi_5fuart_5fdeinit_118',['swi_uart_deinit',['../a01446.html#ga0b1aad3936bf003686d8db7fa2be5132',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fdiscover_5fbuses_119',['swi_uart_discover_buses',['../a01446.html#gad640b598d581ee7c8a4c804bee602906',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5finit_120',['swi_uart_init',['../a01446.html#ga003b63648f1a5f9eba274760559688f2',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fmode_121',['swi_uart_mode',['../a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5freceive_5fbyte_122',['swi_uart_receive_byte',['../a01446.html#ga93f3dab17c14f71641ca970998ede823',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fsamd21_5fasf_2ec_123',['swi_uart_samd21_asf.c',['../a00617.html',1,'']]], - ['swi_5fuart_5fsamd21_5fasf_2eh_124',['swi_uart_samd21_asf.h',['../a00620.html',1,'']]], - ['swi_5fuart_5fsend_5fbyte_125',['swi_uart_send_byte',['../a01446.html#ga4a4d491006d9683d67838963706ac9c1',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fsetbaud_126',['swi_uart_setbaud',['../a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fstart_2ec_127',['swi_uart_start.c',['../a00623.html',1,'']]], - ['swi_5fuart_5fstart_2eh_128',['swi_uart_start.h',['../a00626.html',1,'']]], - ['symmetric_5fauthenticate_129',['symmetric_authenticate',['../a00011.html#a9a41d1600ffd22de067ded50447d359b',1,'symmetric_authenticate(uint8_t slot, const uint8_t *master_key, const uint8_t *rand_number): symmetric_authentication.c'],['../a00014.html#a9a41d1600ffd22de067ded50447d359b',1,'symmetric_authenticate(uint8_t slot, const uint8_t *master_key, const uint8_t *rand_number): symmetric_authentication.c']]], - ['symmetric_5fauthentication_2ec_130',['symmetric_authentication.c',['../a00011.html',1,'']]], - ['symmetric_5fauthentication_2eh_131',['symmetric_authentication.h',['../a00014.html',1,'']]] + ['secureboot_8',['SecureBoot',['../a02315.html',1,'cryptoauthlib::device']]], + ['secureboot_5fcount_5fdig_9',['SECUREBOOT_COUNT_DIG',['../a00356.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e',1,'calib_command.h']]], + ['secureboot_5fcount_5fdig_5fsig_10',['SECUREBOOT_COUNT_DIG_SIG',['../a00356.html#abd28a29107703b43a734301acf491f5c',1,'calib_command.h']]], + ['secureboot_5fdigest_5fsize_11',['SECUREBOOT_DIGEST_SIZE',['../a00356.html#a9257968de99742ec468463a72588820f',1,'calib_command.h']]], + ['secureboot_5fmac_5fsize_12',['SECUREBOOT_MAC_SIZE',['../a00356.html#aed2edebc2be522d7bb38f85d273406f9',1,'calib_command.h']]], + ['secureboot_5fmode_5fenc_5fmac_5fflag_13',['SECUREBOOT_MODE_ENC_MAC_FLAG',['../a00356.html#abf2bad62bab02224f51d67f6725575a4',1,'calib_command.h']]], + ['secureboot_5fmode_5ffull_14',['SECUREBOOT_MODE_FULL',['../a00356.html#a122f4b7b9f1011c04385a7caccc2d536',1,'calib_command.h']]], + ['secureboot_5fmode_5ffull_5fcopy_15',['SECUREBOOT_MODE_FULL_COPY',['../a00356.html#a3d287922c127b599204ea3bc64d4a825',1,'calib_command.h']]], + ['secureboot_5fmode_5ffull_5fstore_16',['SECUREBOOT_MODE_FULL_STORE',['../a00356.html#a2aac76b15694b82fda038e127d152297',1,'calib_command.h']]], + ['secureboot_5fmode_5fidx_17',['SECUREBOOT_MODE_IDX',['../a00356.html#a7ff1918de6f8238ba4f67d9368e3587d',1,'calib_command.h']]], + ['secureboot_5fmode_5fmask_18',['SECUREBOOT_MODE_MASK',['../a00356.html#aac36b471fe92c252dd02a9d1cc2c65e2',1,'calib_command.h']]], + ['secureboot_5fmode_5fprohibit_5fflag_19',['SECUREBOOT_MODE_PROHIBIT_FLAG',['../a00356.html#a2d04ced68d56c0db40b93b767de02089',1,'calib_command.h']]], + ['secureboot_5frsp_5fsize_5fmac_20',['SECUREBOOT_RSP_SIZE_MAC',['../a00356.html#a3db7049de685080f046f0b4221de461b',1,'calib_command.h']]], + ['secureboot_5frsp_5fsize_5fno_5fmac_21',['SECUREBOOT_RSP_SIZE_NO_MAC',['../a00356.html#ab4657866a69a00b9b3bfa4df51521fa6',1,'calib_command.h']]], + ['secureboot_5fsignature_5fsize_22',['SECUREBOOT_SIGNATURE_SIZE',['../a00356.html#a51bd4fe709f11b3b50f47c2fb18976ca',1,'calib_command.h']]], + ['securebootconfig_5fmode_5fdisabled_23',['SECUREBOOTCONFIG_MODE_DISABLED',['../a00356.html#a76bf5d4ce89c95c658328fe8e66669e7',1,'calib_command.h']]], + ['securebootconfig_5fmode_5ffull_5fboth_24',['SECUREBOOTCONFIG_MODE_FULL_BOTH',['../a00356.html#a2b86bf6731827368bf66eec960c35a32',1,'calib_command.h']]], + ['securebootconfig_5fmode_5ffull_5fdig_25',['SECUREBOOTCONFIG_MODE_FULL_DIG',['../a00356.html#a9b7c3aca6168b52321e1951893efa050',1,'calib_command.h']]], + ['securebootconfig_5fmode_5ffull_5fsig_26',['SECUREBOOTCONFIG_MODE_FULL_SIG',['../a00356.html#a43bb6027c548274980a3ba42bdef51c9',1,'calib_command.h']]], + ['securebootconfig_5fmode_5fmask_27',['SECUREBOOTCONFIG_MODE_MASK',['../a00356.html#a0c9c951895abf02992e41c617702c2ea',1,'calib_command.h']]], + ['securebootconfig_5foffset_28',['SECUREBOOTCONFIG_OFFSET',['../a00356.html#ad10e2a3c801be9002d53af14357dbe9f',1,'calib_command.h']]], + ['security_20policy_29',['Security Policy',['../a02876.html',1,'']]], + ['selftest_5fcount_30',['SELFTEST_COUNT',['../a00356.html#a2aba96712a9932d61146c43289e9d808',1,'calib_command.h']]], + ['selftest_5fmode_5faes_31',['SELFTEST_MODE_AES',['../a00356.html#a91ebd87544ccdab3670cfbec8d23bd4a',1,'calib_command.h']]], + ['selftest_5fmode_5fall_32',['SELFTEST_MODE_ALL',['../a00356.html#a1ef61cb184d3ff5ef2f8bf9db6521888',1,'calib_command.h']]], + ['selftest_5fmode_5fecdh_33',['SELFTEST_MODE_ECDH',['../a00356.html#a01d7437a14fd35ccc926168fb4ca2ca7',1,'calib_command.h']]], + ['selftest_5fmode_5fecdsa_5fsign_5fverify_34',['SELFTEST_MODE_ECDSA_SIGN_VERIFY',['../a00356.html#afbd09beedecedcf316a6c02e40d1e712',1,'calib_command.h']]], + ['selftest_5fmode_5fidx_35',['SELFTEST_MODE_IDX',['../a00356.html#aa16bfad9cb883d258befaacadb3385ef',1,'calib_command.h']]], + ['selftest_5fmode_5frng_36',['SELFTEST_MODE_RNG',['../a00356.html#acd9a7a2257f664a4f9f674d37eb95bef',1,'calib_command.h']]], + ['selftest_5fmode_5fsha_37',['SELFTEST_MODE_SHA',['../a00356.html#afab9546447cf1e0020c32d298a1d897f',1,'calib_command.h']]], + ['selftest_5frsp_5fsize_38',['SELFTEST_RSP_SIZE',['../a00356.html#a7599639f80f3ac2a0d22f2857138cb87',1,'calib_command.h']]], + ['send_39',['send',['../a01671.html#a36eca94789cf465a9cb13e9a1ad92121',1,'atca_hal_kit_phy_t']]], + ['sha1_5froutines_2ec_40',['sha1_routines.c',['../a00509.html',1,'']]], + ['sha1_5froutines_2eh_41',['sha1_routines.h',['../a00512.html',1,'']]], + ['sha206a_5fauthenticate_42',['sha206a_authenticate',['../a00005.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a00008.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a01487.html#aca369f80d942aad6a827c2817c998df5',1,'cryptoauthlib.sha206_api.sha206a_authenticate()']]], + ['sha206a_5fcheck_5fdk_5fuseflag_5fvalidity_43',['sha206a_check_dk_useflag_validity',['../a00005.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(): api_206a.c'],['../a01487.html#ae4da1b83a8d9d37483a4b179edfeceff',1,'cryptoauthlib.sha206_api.sha206a_check_dk_useflag_validity()'],['../a00008.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(): api_206a.c']]], + ['sha206a_5fcheck_5fpk_5fuseflag_5fvalidity_44',['sha206a_check_pk_useflag_validity',['../a01487.html#a1e60ef1b7888afae74b4e390a358d263',1,'cryptoauthlib.sha206_api.sha206a_check_pk_useflag_validity()'],['../a00008.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a00005.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c']]], + ['sha206a_5fdiversify_5fparent_5fkey_45',['sha206a_diversify_parent_key',['../a00005.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a00008.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a01487.html#abe0624bf06c710473082bfbef52273f3',1,'cryptoauthlib.sha206_api.sha206a_diversify_parent_key()']]], + ['sha206a_5fgenerate_5fchallenge_5fresponse_5fpair_46',['sha206a_generate_challenge_response_pair',['../a00005.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c'],['../a00008.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c'],['../a01487.html#a3c5cc4df72fb0dea8534dc7726430063',1,'cryptoauthlib.sha206_api.sha206a_generate_challenge_response_pair(key, challenge, response)']]], + ['sha206a_5fgenerate_5fderive_5fkey_47',['sha206a_generate_derive_key',['../a01487.html#a607ffbecea0980b58be2b31a8b87b983',1,'cryptoauthlib.sha206_api.sha206a_generate_derive_key()'],['../a00005.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(uint8_t *parent_key, uint8_t *derived_key, uint8_t param1, uint16_t param2): api_206a.c'],['../a00008.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(uint8_t *parent_key, uint8_t *derived_key, uint8_t param1, uint16_t param2): api_206a.c']]], + ['sha206a_5fget_5fdata_5fstore_5flock_5fstatus_48',['sha206a_get_data_store_lock_status',['../a01487.html#a4bc534fea446c5d50d4d3cde1cf4a4dc',1,'cryptoauthlib.sha206_api.sha206a_get_data_store_lock_status()'],['../a00008.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(uint8_t slot, uint8_t *is_locked): api_206a.c'],['../a00005.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(uint8_t slot, uint8_t *is_locked): api_206a.c']]], + ['sha206a_5fget_5fdk_5fupdate_5fcount_49',['sha206a_get_dk_update_count',['../a01487.html#ac96ca57f02ed212f0eb5ae95875d952c',1,'cryptoauthlib.sha206_api.sha206a_get_dk_update_count()'],['../a00008.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(uint8_t *dk_update_count): api_206a.c'],['../a00005.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(uint8_t *dk_update_count): api_206a.c']]], + ['sha206a_5fget_5fdk_5fuseflag_5fcount_50',['sha206a_get_dk_useflag_count',['../a00005.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(uint8_t *dk_available_count): api_206a.c'],['../a00008.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(uint8_t *dk_available_count): api_206a.c'],['../a01487.html#ae27b4776f24b612e4ea9e712c086d22b',1,'cryptoauthlib.sha206_api.sha206a_get_dk_useflag_count()']]], + ['sha206a_5fget_5fpk_5fuseflag_5fcount_51',['sha206a_get_pk_useflag_count',['../a00005.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(uint8_t *pk_available_count): api_206a.c'],['../a00008.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(uint8_t *pk_available_count): api_206a.c'],['../a01487.html#a710e3e25bc12a3ecd3051ebbb763c5b0',1,'cryptoauthlib.sha206_api.sha206a_get_pk_useflag_count()']]], + ['sha206a_5fread_5fdata_5fstore_52',['sha206a_read_data_store',['../a00008.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(uint8_t slot, uint8_t *data, uint8_t offset, uint8_t len): api_206a.c'],['../a00005.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(uint8_t slot, uint8_t *data, uint8_t offset, uint8_t len): api_206a.c'],['../a01487.html#aeed0ec7ac85e0588bc05822d6d63eaa3',1,'cryptoauthlib.sha206_api.sha206a_read_data_store(slot, data, offset, length)']]], + ['sha206a_5fverify_5fdevice_5fconsumption_53',['sha206a_verify_device_consumption',['../a01487.html#a0d2a1e79937863b4a48218de3567d996',1,'cryptoauthlib.sha206_api.sha206a_verify_device_consumption()'],['../a00008.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(uint8_t *is_consumed): api_206a.c'],['../a00005.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(uint8_t *is_consumed): api_206a.c']]], + ['sha206a_5fwrite_5fdata_5fstore_54',['sha206a_write_data_store',['../a01487.html#a1e883095c960da9d48db489a25774042',1,'cryptoauthlib.sha206_api.sha206a_write_data_store()'],['../a00008.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a00005.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c']]], + ['sha2_5froutines_2ec_55',['sha2_routines.c',['../a00515.html',1,'']]], + ['sha2_5froutines_2eh_56',['sha2_routines.h',['../a00518.html',1,'']]], + ['sha_5fcount_5flong_57',['SHA_COUNT_LONG',['../a00356.html#ada37181a648dd51b374eec1cbb4bbaa3',1,'calib_command.h']]], + ['sha_5fmode_5f608_5fhmac_5fend_58',['SHA_MODE_608_HMAC_END',['../a00356.html#a625604e07a0618bd7d514faee5e42fba',1,'calib_command.h']]], + ['sha_5fmode_5fecc204_5fhmac_5fend_59',['SHA_MODE_ECC204_HMAC_END',['../a00356.html#a90fa979b13088478c8bcf8fd7a6bb541',1,'calib_command.h']]], + ['sha_5fmode_5fecc204_5fhmac_5fstart_60',['SHA_MODE_ECC204_HMAC_START',['../a00356.html#a41b6da4df887f3d2d38c26b49168d779',1,'calib_command.h']]], + ['sha_5fmode_5fhmac_5fend_61',['SHA_MODE_HMAC_END',['../a00356.html#aeb307ed9134e0fa2f0fcbdaf7b01515d',1,'calib_command.h']]], + ['sha_5fmode_5fhmac_5fstart_62',['SHA_MODE_HMAC_START',['../a00356.html#abbfeec0d0247336b8c6e993d4db17d11',1,'calib_command.h']]], + ['sha_5fmode_5fhmac_5fupdate_63',['SHA_MODE_HMAC_UPDATE',['../a00356.html#a2071156124a692a5f2a5c764c923f731',1,'calib_command.h']]], + ['sha_5fmode_5fmask_64',['SHA_MODE_MASK',['../a00356.html#a612cbf6171e9a0a176e0bd2844f49528',1,'calib_command.h']]], + ['sha_5fmode_5fread_5fcontext_65',['SHA_MODE_READ_CONTEXT',['../a00356.html#ac7e5a54695b8bd9e5087ebb94df70b39',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fend_66',['SHA_MODE_SHA256_END',['../a00356.html#a0e98e55c91c7559f57fdef4c9969c188',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fpublic_67',['SHA_MODE_SHA256_PUBLIC',['../a00356.html#a0f2fc749d3d196477b22cbceee856dfb',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fstart_68',['SHA_MODE_SHA256_START',['../a00356.html#ad42195362cd7dca0acabc8739c9a6fc4',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fupdate_69',['SHA_MODE_SHA256_UPDATE',['../a00356.html#a05ece414a0596ec9bb75c0ca8ca731dc',1,'calib_command.h']]], + ['sha_5fmode_5ftarget_5fmask_70',['SHA_MODE_TARGET_MASK',['../a00356.html#a70f88a123587c96ad7affc1e5dae9002',1,'calib_command.h']]], + ['sha_5fmode_5ftarget_5fmsgdigbuf_71',['SHA_MODE_TARGET_MSGDIGBUF',['../a00521.html#ae559b402c678cc51f8252b927b8781e5',1,'cryptoauthlib.h']]], + ['sha_5fmode_5ftarget_5fout_5fonly_72',['SHA_MODE_TARGET_OUT_ONLY',['../a00521.html#ae0df4b9151bb3d807bc1c532036c6d88',1,'cryptoauthlib.h']]], + ['sha_5fmode_5ftarget_5ftempkey_73',['SHA_MODE_TARGET_TEMPKEY',['../a00521.html#a850ec56b408fccccaea5826d452c3a64',1,'cryptoauthlib.h']]], + ['sha_5fmode_5fwrite_5fcontext_74',['SHA_MODE_WRITE_CONTEXT',['../a00356.html#a7b7c499931480a88f6a106644c3d2185',1,'calib_command.h']]], + ['sha_5frsp_5fsize_75',['SHA_RSP_SIZE',['../a00356.html#a8a5a586bdb0194be827417658836bf9c',1,'calib_command.h']]], + ['sha_5frsp_5fsize_5flong_76',['SHA_RSP_SIZE_LONG',['../a00356.html#ae5ad3c81d0b62f4b86a4a0dc84a79134',1,'calib_command.h']]], + ['sha_5frsp_5fsize_5fshort_77',['SHA_RSP_SIZE_SHORT',['../a00356.html#a74490b179b34f9925e9fe00675e53713',1,'calib_command.h']]], + ['sign_78',['sign',['../a02267.html#a98b230727187cf34e600b9a6ff20cc45',1,'cryptoauthlib.atjwt.HwEcAlgorithm.sign()'],['../a02271.html#a21a92b8d373a29b54b11448fdb7b2ce4',1,'cryptoauthlib.atjwt.HwHmacAlgorithm.sign()']]], + ['sign_5fcount_79',['SIGN_COUNT',['../a00356.html#aabff3f5b7f5391c27a0329ff0c997264',1,'calib_command.h']]], + ['sign_5fkeyid_5fidx_80',['SIGN_KEYID_IDX',['../a00356.html#a02f20fbee84fe680d94b94a2b2828040',1,'calib_command.h']]], + ['sign_5fmode_5fexternal_81',['SIGN_MODE_EXTERNAL',['../a00356.html#a9b6844bb107f02832a6d827b8c5b0fda',1,'calib_command.h']]], + ['sign_5fmode_5fidx_82',['SIGN_MODE_IDX',['../a00356.html#ae7cfb9eb789137f5ea9195a7a4f6b11e',1,'calib_command.h']]], + ['sign_5fmode_5finclude_5fsn_83',['SIGN_MODE_INCLUDE_SN',['../a00356.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116',1,'calib_command.h']]], + ['sign_5fmode_5finternal_84',['SIGN_MODE_INTERNAL',['../a00356.html#aced5221c0f15440eb52fa9f460956443',1,'calib_command.h']]], + ['sign_5fmode_5finvalidate_85',['SIGN_MODE_INVALIDATE',['../a00356.html#a1acc7b9af9cf3c6c556bd910ce4f239b',1,'calib_command.h']]], + ['sign_5fmode_5fmask_86',['SIGN_MODE_MASK',['../a00356.html#a88cc1851cedb6f2a73df4618dbc0b165',1,'calib_command.h']]], + ['sign_5fmode_5fsource_5fmask_87',['SIGN_MODE_SOURCE_MASK',['../a00356.html#a35246a9bad0d77d26b59b542928c9e34',1,'calib_command.h']]], + ['sign_5fmode_5fsource_5fmsgdigbuf_88',['SIGN_MODE_SOURCE_MSGDIGBUF',['../a00356.html#a1a38e9575eb4f714377889ce5270e60b',1,'calib_command.h']]], + ['sign_5fmode_5fsource_5ftempkey_89',['SIGN_MODE_SOURCE_TEMPKEY',['../a00356.html#a73670681360e1272aa13d1359e7bb275',1,'calib_command.h']]], + ['sign_5frsp_5fsize_90',['SIGN_RSP_SIZE',['../a00356.html#a66dba5e06f73c5df37c9d18409185f4d',1,'calib_command.h']]], + ['signature_91',['signature',['../a01474.html#gad2e0f0dbb511520e5d79bdb4ab649c22',1,'atca_verify_in_out::signature()'],['../a01735.html#acafb471d7cc7a71d613503760930d9f5',1,'atca_secureboot_mac_in_out::signature()'],['../a01727.html#ad94d1c8d1635e597bd70823a207dc727',1,'atca_verify_mac::signature()']]], + ['slot_92',['slot',['../a01615.html#ac393a690cd7891565dc679e6ffa4b021',1,'atcacert_device_loc_s']]], + ['slot_5fcnt_93',['slot_cnt',['../a01867.html#a9054ff97888d7fc21d1006b94808c6d9',1,'pkcs11_lib_ctx_s']]], + ['slot_5fconf_94',['slot_conf',['../a01747.html#a2d5854b66b7bc7246fa718a5d485d3fb',1,'atca_gen_dig_in_out']]], + ['slot_5fconfig_95',['slot_config',['../a01787.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154',1,'atca_sign_internal_in_out']]], + ['slot_5fkey_96',['slot_key',['../a01771.html#aad7093cf772d6e337b3c09af9cea92ac',1,'atca_check_mac_in_out']]], + ['slot_5flocked_97',['slot_locked',['../a01747.html#a787c86043a8c305bd23256248614a3f7',1,'atca_gen_dig_in_out']]], + ['slotconfig_98',['SlotConfig',['../a02303.html',1,'cryptoauthlib::device']]], + ['slots_99',['slots',['../a01867.html#aa1679efb012be2954b3eaf1881128f8f',1,'pkcs11_lib_ctx_s']]], + ['sn_100',['sn',['../a01474.html#ga46b121ddb13c417e4d65a3fc2f6c365b',1,'atca_include_data_in_out::sn()'],['../a01727.html#a5e63ccd727b87d022ed0eedc0446410f',1,'atca_verify_mac::sn()'],['../a01474.html#gaba323f1307689412ea6cc1e54810edb9',1,'atca_mac_in_out::sn()'],['../a01474.html#gaf0d7fe9a16cad1ba38c7daca4295823b',1,'atca_hmac_in_out::sn()'],['../a01747.html#ad8ca9262cbe607d0c017e12285c3d951',1,'atca_gen_dig_in_out::sn()'],['../a01751.html#ab2ca3ae12be534d58e22bb68d6042ea3',1,'atca_diversified_key_in_out::sn()'],['../a01787.html#a374985826f0c1b5c6aa52370f9871841',1,'atca_sign_internal_in_out::sn()'],['../a01783.html#a17c83c0e810b2bf35b364f026e1cecb0',1,'atca_gen_key_in_out::sn()'],['../a01771.html#a26f951076270f2389044a69b30c86d74',1,'atca_check_mac_in_out::sn()'],['../a01763.html#aeb90e80a488f568c4a193c1fe851c5d4',1,'atca_derive_key_mac_in_out::sn()'],['../a01759.html#a0e321ea27e36c985abacf4510619c9f0',1,'atca_derive_key_in_out::sn()'],['../a01755.html#a2c43368d48a41123da5f69356b6f29f5',1,'atca_write_mac_in_out::sn()']]], + ['snsrc_5fdevice_5fsn_101',['SNSRC_DEVICE_SN',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41',1,'atcacert_def.h']]], + ['snsrc_5fdevice_5fsn_5fhash_102',['SNSRC_DEVICE_SN_HASH',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2',1,'atcacert_def.h']]], + ['snsrc_5fdevice_5fsn_5fhash_5fpos_103',['SNSRC_DEVICE_SN_HASH_POS',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7',1,'atcacert_def.h']]], + ['snsrc_5fdevice_5fsn_5fhash_5fraw_104',['SNSRC_DEVICE_SN_HASH_RAW',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909',1,'atcacert_def.h']]], + ['snsrc_5fpub_5fkey_5fhash_105',['SNSRC_PUB_KEY_HASH',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e',1,'atcacert_def.h']]], + ['snsrc_5fpub_5fkey_5fhash_5fpos_106',['SNSRC_PUB_KEY_HASH_POS',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5',1,'atcacert_def.h']]], + ['snsrc_5fpub_5fkey_5fhash_5fraw_107',['SNSRC_PUB_KEY_HASH_RAW',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972',1,'atcacert_def.h']]], + ['snsrc_5fsigner_5fid_108',['SNSRC_SIGNER_ID',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff',1,'atcacert_def.h']]], + ['snsrc_5fstored_109',['SNSRC_STORED',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1',1,'atcacert_def.h']]], + ['snsrc_5fstored_5fdynamic_110',['SNSRC_STORED_DYNAMIC',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b',1,'atcacert_def.h']]], + ['software_20crypto_20methods_20_28atcac_5f_29_111',['Software crypto methods (atcac_)',['../a01472.html',1,'']]], + ['source_5fflag_112',['source_flag',['../a01711.html#abd69b6707bf73ae91675a6a0a250ca40',1,'atca_temp_key']]], + ['status_113',['Status',['../a02555.html',1,'cryptoauthlib::status']]], + ['statusunknownerror_114',['StatusUnknownError',['../a02375.html',1,'cryptoauthlib::exceptions']]], + ['stdcert_5fnum_5felements_115',['STDCERT_NUM_ELEMENTS',['../a01470.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f',1,'atcacert_def.h']]], + ['stored_5fvalue_116',['stored_value',['../a01747.html#a4f63b5946df323ef66910d4a0cdf2491',1,'atca_gen_dig_in_out']]], + ['swi_5fuart_5fdeinit_117',['swi_uart_deinit',['../a01473.html#ga0b1aad3936bf003686d8db7fa2be5132',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fdiscover_5fbuses_118',['swi_uart_discover_buses',['../a01473.html#gad640b598d581ee7c8a4c804bee602906',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5finit_119',['swi_uart_init',['../a01473.html#ga003b63648f1a5f9eba274760559688f2',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fmode_120',['swi_uart_mode',['../a01473.html#gacc2a96c86ce4c07249b81bc6a7eb2e41',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5freceive_5fbyte_121',['swi_uart_receive_byte',['../a01473.html#ga93f3dab17c14f71641ca970998ede823',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fsamd21_5fasf_2ec_122',['swi_uart_samd21_asf.c',['../a00632.html',1,'']]], + ['swi_5fuart_5fsamd21_5fasf_2eh_123',['swi_uart_samd21_asf.h',['../a00635.html',1,'']]], + ['swi_5fuart_5fsend_5fbyte_124',['swi_uart_send_byte',['../a01473.html#ga4a4d491006d9683d67838963706ac9c1',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fsetbaud_125',['swi_uart_setbaud',['../a01473.html#gaba296f70baf68b768d6c4bb9cf7ba67d',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fstart_2ec_126',['swi_uart_start.c',['../a00638.html',1,'']]], + ['swi_5fuart_5fstart_2eh_127',['swi_uart_start.h',['../a00641.html',1,'']]], + ['symmetric_5fauthenticate_128',['symmetric_authenticate',['../a00011.html#a9a41d1600ffd22de067ded50447d359b',1,'symmetric_authenticate(uint8_t slot, const uint8_t *master_key, const uint8_t *rand_number): symmetric_authentication.c'],['../a00014.html#a9a41d1600ffd22de067ded50447d359b',1,'symmetric_authenticate(uint8_t slot, const uint8_t *master_key, const uint8_t *rand_number): symmetric_authentication.c']]], + ['symmetric_5fauthentication_2ec_129',['symmetric_authentication.c',['../a00011.html',1,'']]], + ['symmetric_5fauthentication_2eh_130',['symmetric_authentication.h',['../a00014.html',1,'']]] ]; diff --git a/search/all_13.js b/search/all_13.js index 23a526497..08abb4d4b 100644 --- a/search/all_13.js +++ b/search/all_13.js @@ -1,43 +1,43 @@ var searchData= [ - ['target_5fkey_0',['target_key',['../a01752.html#ae00a5116b4b55fb2bc6546ca3156522e',1,'atca_check_mac_in_out::target_key()'],['../a01740.html#aa2c05475b504237c0ae9db5d48cbb0fc',1,'atca_derive_key_in_out::target_key()']]], - ['target_5fkey_5fid_1',['target_key_id',['../a01744.html#ad2a2e2e1126d1c022be6a84af7f5e4e3',1,'atca_derive_key_mac_in_out::target_key_id()'],['../a01740.html#a5b623ae9fa4501c996e4c54842eaa548',1,'atca_derive_key_in_out::target_key_id()']]], - ['temp_5fkey_2',['temp_key',['../a01447.html#ga7bf1d912d79b62cc598395642d77365f',1,'atca_mac_in_out::temp_key()'],['../a01447.html#ga4409850783c991d3b429ee78e67c9813',1,'atca_verify_in_out::temp_key()'],['../a01752.html#a605e9f150203a43a550e68e940233245',1,'atca_check_mac_in_out::temp_key()'],['../a01447.html#ga8305d0f433345a973f638dfea229a274',1,'atca_decrypt_in_out::temp_key()'],['../a01740.html#a1a4a8993461b0675edcb2d162ec8823b',1,'atca_derive_key_in_out::temp_key()'],['../a01736.html#a8786d124038d3516d98f2456f19985cf',1,'atca_write_mac_in_out::temp_key()'],['../a01732.html#a8406e4a6d09e2f6b8e3bfc12579d8653',1,'atca_diversified_key_in_out::temp_key()'],['../a01728.html#aa62f8da7dae46c095c603433ae26fedf',1,'atca_gen_dig_in_out::temp_key()'],['../a01447.html#ga7507880718dc536d6122f0401073b8c8',1,'atca_hmac_in_out::temp_key()'],['../a01764.html#afa11fd0401f2d8884d385ffc77962ec3',1,'atca_gen_key_in_out::temp_key()'],['../a01712.html#ac57e99b5d0069d7bd733bcf056cc56e1',1,'atca_secureboot_enc_in_out::temp_key()'],['../a01447.html#gaf89317aa1f759fc58f67158abd314d1b',1,'atca_nonce_in_out::temp_key()'],['../a01708.html#ac9231df54b2f77c5061bdfbcea927a5e',1,'atca_verify_mac::temp_key()'],['../a01768.html#af8c982fdcb8edc1ff6b1e838fab281ac',1,'atca_sign_internal_in_out::temp_key()']]], - ['test_5fdevice_3',['test_device',['../a01468.html',1,'']]], - ['test_5fiface_4',['test_iface',['../a01469.html',1,'']]], - ['tf_5fbin2hex_5flc_5',['TF_BIN2HEX_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979',1,'atcacert_def.h']]], - ['tf_5fbin2hex_5fspace_5flc_6',['TF_BIN2HEX_SPACE_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe',1,'atcacert_def.h']]], - ['tf_5fbin2hex_5fspace_5fuc_7',['TF_BIN2HEX_SPACE_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa',1,'atcacert_def.h']]], - ['tf_5fbin2hex_5fuc_8',['TF_BIN2HEX_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5flc_9',['TF_HEX2BIN_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5fspace_5flc_10',['TF_HEX2BIN_SPACE_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5fspace_5fuc_11',['TF_HEX2BIN_SPACE_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5fuc_12',['TF_HEX2BIN_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779',1,'atcacert_def.h']]], - ['tf_5fnone_13',['TF_NONE',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84',1,'atcacert_def.h']]], - ['tf_5freverse_14',['TF_REVERSE',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817',1,'atcacert_def.h']]], + ['target_5fkey_0',['target_key',['../a01771.html#ae00a5116b4b55fb2bc6546ca3156522e',1,'atca_check_mac_in_out::target_key()'],['../a01759.html#aa2c05475b504237c0ae9db5d48cbb0fc',1,'atca_derive_key_in_out::target_key()']]], + ['target_5fkey_5fid_1',['target_key_id',['../a01763.html#ad2a2e2e1126d1c022be6a84af7f5e4e3',1,'atca_derive_key_mac_in_out::target_key_id()'],['../a01759.html#a5b623ae9fa4501c996e4c54842eaa548',1,'atca_derive_key_in_out::target_key_id()']]], + ['temp_5fkey_2',['temp_key',['../a01474.html#ga7507880718dc536d6122f0401073b8c8',1,'atca_hmac_in_out::temp_key()'],['../a01783.html#afa11fd0401f2d8884d385ffc77962ec3',1,'atca_gen_key_in_out::temp_key()'],['../a01474.html#ga4409850783c991d3b429ee78e67c9813',1,'atca_verify_in_out::temp_key()'],['../a01771.html#a605e9f150203a43a550e68e940233245',1,'atca_check_mac_in_out::temp_key()'],['../a01474.html#ga8305d0f433345a973f638dfea229a274',1,'atca_decrypt_in_out::temp_key()'],['../a01759.html#a1a4a8993461b0675edcb2d162ec8823b',1,'atca_derive_key_in_out::temp_key()'],['../a01755.html#a8786d124038d3516d98f2456f19985cf',1,'atca_write_mac_in_out::temp_key()'],['../a01751.html#a8406e4a6d09e2f6b8e3bfc12579d8653',1,'atca_diversified_key_in_out::temp_key()'],['../a01747.html#aa62f8da7dae46c095c603433ae26fedf',1,'atca_gen_dig_in_out::temp_key()'],['../a01787.html#af8c982fdcb8edc1ff6b1e838fab281ac',1,'atca_sign_internal_in_out::temp_key()'],['../a01474.html#gaf89317aa1f759fc58f67158abd314d1b',1,'atca_nonce_in_out::temp_key()'],['../a01727.html#ac9231df54b2f77c5061bdfbcea927a5e',1,'atca_verify_mac::temp_key()'],['../a01731.html#ac57e99b5d0069d7bd733bcf056cc56e1',1,'atca_secureboot_enc_in_out::temp_key()'],['../a01474.html#ga7bf1d912d79b62cc598395642d77365f',1,'atca_mac_in_out::temp_key()']]], + ['test_5fdevice_3',['test_device',['../a01495.html',1,'']]], + ['test_5fiface_4',['test_iface',['../a01496.html',1,'']]], + ['tf_5fbin2hex_5flc_5',['TF_BIN2HEX_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979',1,'atcacert_def.h']]], + ['tf_5fbin2hex_5fspace_5flc_6',['TF_BIN2HEX_SPACE_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe',1,'atcacert_def.h']]], + ['tf_5fbin2hex_5fspace_5fuc_7',['TF_BIN2HEX_SPACE_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa',1,'atcacert_def.h']]], + ['tf_5fbin2hex_5fuc_8',['TF_BIN2HEX_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5flc_9',['TF_HEX2BIN_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5fspace_5flc_10',['TF_HEX2BIN_SPACE_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5fspace_5fuc_11',['TF_HEX2BIN_SPACE_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5fuc_12',['TF_HEX2BIN_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779',1,'atcacert_def.h']]], + ['tf_5fnone_13',['TF_NONE',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84',1,'atcacert_def.h']]], + ['tf_5freverse_14',['TF_REVERSE',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817',1,'atcacert_def.h']]], ['tflxtls_5fcert_5fdef_5f4_5fdevice_2ec_15',['tflxtls_cert_def_4_device.c',['../a00056.html',1,'']]], ['tflxtls_5fcert_5fdef_5f4_5fdevice_2eh_16',['tflxtls_cert_def_4_device.h',['../a00059.html',1,'']]], - ['timeouterror_17',['TimeOutError',['../a02400.html',1,'cryptoauthlib::exceptions']]], - ['tng_20api_20_28tng_5f_29_18',['TNG API (tng_)',['../a01438.html',1,'']]], - ['tng_20functions_19',['TNG Functions',['../a01438.html',1,'']]], + ['timeouterror_17',['TimeOutError',['../a02435.html',1,'cryptoauthlib::exceptions']]], + ['tng_20api_20_28tng_5f_29_18',['TNG API (tng_)',['../a01465.html',1,'']]], + ['tng_20functions_19',['TNG Functions',['../a01465.html',1,'']]], ['tng_5fatca_2ec_20',['tng_atca.c',['../a00062.html',1,'']]], ['tng_5fatca_2eh_21',['tng_atca.h',['../a00065.html',1,'']]], ['tng_5fatcacert_5fclient_2ec_22',['tng_atcacert_client.c',['../a00068.html',1,'']]], ['tng_5fatcacert_5fclient_2eh_23',['tng_atcacert_client.h',['../a00071.html',1,'']]], - ['tng_5fatcacert_5fdevice_5fpublic_5fkey_24',['tng_atcacert_device_public_key',['../a01462.html#a7382f6d9830ea03bcbb59f7fae2745e1',1,'cryptoauthlib.tng.tng_atcacert_device_public_key()'],['../a01438.html#ga01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a00068.html#a01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c']]], - ['tng_5fatcacert_5fmax_5fdevice_5fcert_5fsize_25',['tng_atcacert_max_device_cert_size',['../a01438.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01438.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01462.html#a6878e2f1c9330534f8c7950f26e327b0',1,'cryptoauthlib.tng.tng_atcacert_max_device_cert_size(max_cert_size)']]], - ['tng_5fatcacert_5fmax_5fsigner_5fcert_5fsize_26',['tng_atcacert_max_signer_cert_size',['../a01462.html#afc28b6798b670200ecf08645ccaf0e44',1,'cryptoauthlib.tng.tng_atcacert_max_signer_cert_size()'],['../a00068.html#a857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01438.html#ga857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c']]], - ['tng_5fatcacert_5fread_5fdevice_5fcert_27',['tng_atcacert_read_device_cert',['../a01462.html#a76d8460082efdbc28d2a68f5648ce8dd',1,'cryptoauthlib.tng.tng_atcacert_read_device_cert()'],['../a01438.html#ga22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert): tng_atcacert_client.c'],['../a00068.html#a22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert): tng_atcacert_client.c']]], - ['tng_5fatcacert_5fread_5fsigner_5fcert_28',['tng_atcacert_read_signer_cert',['../a01438.html#ga82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(): tng_atcacert_client.c'],['../a01462.html#a6d3eab271cac5959402b283c5a6046a4',1,'cryptoauthlib.tng.tng_atcacert_read_signer_cert()'],['../a00068.html#a82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(): tng_atcacert_client.c']]], - ['tng_5fatcacert_5froot_5fcert_29',['tng_atcacert_root_cert',['../a01462.html#a08385a0e8b5e7e8dc5de6570b06555a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert()'],['../a01438.html#ga31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a00068.html#a31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c']]], - ['tng_5fatcacert_5froot_5fcert_5fsize_30',['tng_atcacert_root_cert_size',['../a01462.html#a3c1b718b02781b6dbc87f7d6c109d3a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert_size()'],['../a01438.html#gaa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(size_t *cert_size): tng_atcacert_client.c'],['../a00068.html#aa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(size_t *cert_size): tng_atcacert_client.c']]], - ['tng_5fatcacert_5froot_5fpublic_5fkey_31',['tng_atcacert_root_public_key',['../a01462.html#a375f83b01899d081623192f9d4a7e6fe',1,'cryptoauthlib.tng.tng_atcacert_root_public_key()'],['../a01438.html#ga8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a00068.html#a8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c']]], - ['tng_5fatcacert_5fsigner_5fpublic_5fkey_32',['tng_atcacert_signer_public_key',['../a01438.html#gaa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a00068.html#aa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01462.html#a0c580da1c1d3e54a60be0f05d5d5c1f1',1,'cryptoauthlib.tng.tng_atcacert_signer_public_key()']]], - ['tng_5fcert_5fmap_5felement_33',['tng_cert_map_element',['../a01500.html',1,'']]], - ['tng_5fget_5fdevice_5fcert_5fdef_34',['tng_get_device_cert_def',['../a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c'],['../a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c']]], - ['tng_5fget_5fdevice_5fcert_5fdef_5fext_35',['tng_get_device_cert_def_ext',['../a01438.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c'],['../a01438.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c']]], - ['tng_5fget_5fdevice_5fpubkey_36',['tng_get_device_pubkey',['../a01462.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7',1,'cryptoauthlib.tng.tng_get_device_pubkey()'],['../a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c']]], - ['tng_5fmap_5fget_5fdevice_5fcert_5fdef_37',['tng_map_get_device_cert_def',['../a01438.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c'],['../a01438.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c']]], + ['tng_5fatcacert_5fdevice_5fpublic_5fkey_24',['tng_atcacert_device_public_key',['../a01489.html#a7382f6d9830ea03bcbb59f7fae2745e1',1,'cryptoauthlib.tng.tng_atcacert_device_public_key()'],['../a01465.html#ga01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a00068.html#a01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c']]], + ['tng_5fatcacert_5fmax_5fdevice_5fcert_5fsize_25',['tng_atcacert_max_device_cert_size',['../a01489.html#a6878e2f1c9330534f8c7950f26e327b0',1,'cryptoauthlib.tng.tng_atcacert_max_device_cert_size()'],['../a01465.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01465.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c']]], + ['tng_5fatcacert_5fmax_5fsigner_5fcert_5fsize_26',['tng_atcacert_max_signer_cert_size',['../a01489.html#afc28b6798b670200ecf08645ccaf0e44',1,'cryptoauthlib.tng.tng_atcacert_max_signer_cert_size()'],['../a01465.html#ga857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a00068.html#a857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c']]], + ['tng_5fatcacert_5fread_5fdevice_5fcert_27',['tng_atcacert_read_device_cert',['../a01489.html#a76d8460082efdbc28d2a68f5648ce8dd',1,'cryptoauthlib.tng.tng_atcacert_read_device_cert()'],['../a00068.html#a22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert): tng_atcacert_client.c'],['../a01465.html#ga22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert): tng_atcacert_client.c']]], + ['tng_5fatcacert_5fread_5fsigner_5fcert_28',['tng_atcacert_read_signer_cert',['../a00068.html#a82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01465.html#ga82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01489.html#a6d3eab271cac5959402b283c5a6046a4',1,'cryptoauthlib.tng.tng_atcacert_read_signer_cert()']]], + ['tng_5fatcacert_5froot_5fcert_29',['tng_atcacert_root_cert',['../a00068.html#a31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01465.html#ga31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01489.html#a08385a0e8b5e7e8dc5de6570b06555a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert()']]], + ['tng_5fatcacert_5froot_5fcert_5fsize_30',['tng_atcacert_root_cert_size',['../a00068.html#aa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(size_t *cert_size): tng_atcacert_client.c'],['../a01465.html#gaa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(size_t *cert_size): tng_atcacert_client.c'],['../a01489.html#a3c1b718b02781b6dbc87f7d6c109d3a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert_size()']]], + ['tng_5fatcacert_5froot_5fpublic_5fkey_31',['tng_atcacert_root_public_key',['../a00068.html#a8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a01465.html#ga8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a01489.html#a375f83b01899d081623192f9d4a7e6fe',1,'cryptoauthlib.tng.tng_atcacert_root_public_key()']]], + ['tng_5fatcacert_5fsigner_5fpublic_5fkey_32',['tng_atcacert_signer_public_key',['../a00068.html#aa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01465.html#gaa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01489.html#a0c580da1c1d3e54a60be0f05d5d5c1f1',1,'cryptoauthlib.tng.tng_atcacert_signer_public_key()']]], + ['tng_5fcert_5fmap_5felement_33',['tng_cert_map_element',['../a01527.html',1,'']]], + ['tng_5fget_5fdevice_5fcert_5fdef_34',['tng_get_device_cert_def',['../a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c'],['../a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c']]], + ['tng_5fget_5fdevice_5fcert_5fdef_5fext_35',['tng_get_device_cert_def_ext',['../a01465.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c'],['../a01465.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c']]], + ['tng_5fget_5fdevice_5fpubkey_36',['tng_get_device_pubkey',['../a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01489.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7',1,'cryptoauthlib.tng.tng_get_device_pubkey()']]], + ['tng_5fmap_5fget_5fdevice_5fcert_5fdef_37',['tng_map_get_device_cert_def',['../a01465.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c'],['../a01465.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c']]], ['tng_5froot_5fcert_2ec_38',['tng_root_cert.c',['../a00074.html',1,'']]], ['tng_5froot_5fcert_2eh_39',['tng_root_cert.h',['../a00077.html',1,'']]], ['tnglora_5fcert_5fdef_5f1_5fsigner_2ec_40',['tnglora_cert_def_1_signer.c',['../a00080.html',1,'']]], @@ -52,10 +52,10 @@ var searchData= ['tngtls_5fcert_5fdef_5f2_5fdevice_2eh_49',['tngtls_cert_def_2_device.h',['../a00107.html',1,'']]], ['tngtls_5fcert_5fdef_5f3_5fdevice_2ec_50',['tngtls_cert_def_3_device.c',['../a00110.html',1,'']]], ['tngtls_5fcert_5fdef_5f3_5fdevice_2eh_51',['tngtls_cert_def_3_device.h',['../a00113.html',1,'']]], - ['total_5fmsg_5fsize_52',['total_msg_size',['../a01616.html#aab3e376d6c18921a1ee303e2b703c668',1,'atca_sha256_ctx::total_msg_size()'],['../a01644.html#abda48eb7b450d079b3c04ba51d824334',1,'sw_sha256_ctx::total_msg_size()']]], - ['transforms_53',['transforms',['../a01600.html#a1e4d5bbf62b7cbe49b6d222d6e124833',1,'atcacert_cert_element_s']]], - ['transmissionerror_54',['TransmissionError',['../a02420.html',1,'cryptoauthlib::exceptions']]], - ['transmissiontimeouterror_55',['TransmissionTimeoutError',['../a02388.html',1,'cryptoauthlib::exceptions']]], + ['total_5fmsg_5fsize_52',['total_msg_size',['../a01639.html#aab3e376d6c18921a1ee303e2b703c668',1,'atca_sha256_ctx']]], + ['transforms_53',['transforms',['../a01623.html#a1e4d5bbf62b7cbe49b6d222d6e124833',1,'atcacert_cert_element_s']]], + ['transmissionerror_54',['TransmissionError',['../a02455.html',1,'cryptoauthlib::exceptions']]], + ['transmissiontimeouterror_55',['TransmissionTimeoutError',['../a02423.html',1,'cryptoauthlib::exceptions']]], ['trust_5fpkcs11_5fconfig_2ec_56',['trust_pkcs11_config.c',['../a00038.html',1,'']]], - ['type_57',['type',['../a01604.html#aeb847b88caadd6fad351f4d239edea42',1,'atcacert_def_s']]] + ['type_57',['type',['../a01627.html#aeb847b88caadd6fad351f4d239edea42',1,'atcacert_def_s']]] ]; diff --git a/search/all_14.js b/search/all_14.js index 59d4d959f..026ee3c76 100644 --- a/search/all_14.js +++ b/search/all_14.js @@ -1,17 +1,17 @@ var searchData= [ - ['unimplementederror_0',['UnimplementedError',['../a02412.html',1,'cryptoauthlib::exceptions']]], - ['unsupportedinterface_1',['UnsupportedInterface',['../a02448.html',1,'cryptoauthlib::exceptions']]], - ['unused_5fvar_2',['UNUSED_VAR',['../a00233.html#a6e61b3a07893501c121343edf3bfcbd8',1,'atca_compiler.h']]], - ['update_5fcount_3',['update_count',['../a01768.html#afd69516235ce1a7bee9c04146beb93d8',1,'atca_sign_internal_in_out']]], - ['update_5fcount_4',['UPDATE_COUNT',['../a00350.html#aac8020f191ca7ce2b1a81fcede9b5aa2',1,'calib_command.h']]], - ['update_5fmode_5fdec_5fcounter_5',['UPDATE_MODE_DEC_COUNTER',['../a00350.html#a023880ad2167cc0d6cefb7f747b73c92',1,'calib_command.h']]], - ['update_5fmode_5fidx_6',['UPDATE_MODE_IDX',['../a00350.html#abec02770ab378eea5c604269dc8c024a',1,'calib_command.h']]], - ['update_5fmode_5fselector_7',['UPDATE_MODE_SELECTOR',['../a00350.html#a81bab82e6be63d8186b26bb9c3b8732c',1,'calib_command.h']]], - ['update_5fmode_5fuser_5fextra_8',['UPDATE_MODE_USER_EXTRA',['../a00350.html#abe02b5e0e9bb8cb4c2a727549c14ae55',1,'calib_command.h']]], - ['update_5fmode_5fuser_5fextra_5fadd_9',['UPDATE_MODE_USER_EXTRA_ADD',['../a00350.html#a5884f043019e78838621ba2402a8cc95',1,'calib_command.h']]], - ['update_5frsp_5fsize_10',['UPDATE_RSP_SIZE',['../a00350.html#aabf82974c18252bcd0c48ee99af75dfb',1,'calib_command.h']]], - ['update_5fvalue_5fidx_11',['UPDATE_VALUE_IDX',['../a00350.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799',1,'calib_command.h']]], - ['use_5fflag_12',['use_flag',['../a01768.html#a4d03aca0b8dd153e5b939a684f7c2955',1,'atca_sign_internal_in_out']]], - ['uselock_13',['UseLock',['../a02272.html',1,'cryptoauthlib::device']]] + ['unimplementederror_0',['UnimplementedError',['../a02447.html',1,'cryptoauthlib::exceptions']]], + ['unsupportedinterface_1',['UnsupportedInterface',['../a02483.html',1,'cryptoauthlib::exceptions']]], + ['unused_5fvar_2',['UNUSED_VAR',['../a00239.html#a6e61b3a07893501c121343edf3bfcbd8',1,'atca_compiler.h']]], + ['update_5fcount_3',['update_count',['../a01787.html#afd69516235ce1a7bee9c04146beb93d8',1,'atca_sign_internal_in_out']]], + ['update_5fcount_4',['UPDATE_COUNT',['../a00356.html#aac8020f191ca7ce2b1a81fcede9b5aa2',1,'calib_command.h']]], + ['update_5fmode_5fdec_5fcounter_5',['UPDATE_MODE_DEC_COUNTER',['../a00356.html#a023880ad2167cc0d6cefb7f747b73c92',1,'calib_command.h']]], + ['update_5fmode_5fidx_6',['UPDATE_MODE_IDX',['../a00356.html#abec02770ab378eea5c604269dc8c024a',1,'calib_command.h']]], + ['update_5fmode_5fselector_7',['UPDATE_MODE_SELECTOR',['../a00356.html#a81bab82e6be63d8186b26bb9c3b8732c',1,'calib_command.h']]], + ['update_5fmode_5fuser_5fextra_8',['UPDATE_MODE_USER_EXTRA',['../a00356.html#abe02b5e0e9bb8cb4c2a727549c14ae55',1,'calib_command.h']]], + ['update_5fmode_5fuser_5fextra_5fadd_9',['UPDATE_MODE_USER_EXTRA_ADD',['../a00356.html#a5884f043019e78838621ba2402a8cc95',1,'calib_command.h']]], + ['update_5frsp_5fsize_10',['UPDATE_RSP_SIZE',['../a00356.html#aabf82974c18252bcd0c48ee99af75dfb',1,'calib_command.h']]], + ['update_5fvalue_5fidx_11',['UPDATE_VALUE_IDX',['../a00356.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799',1,'calib_command.h']]], + ['use_5fflag_12',['use_flag',['../a01787.html#a4d03aca0b8dd153e5b939a684f7c2955',1,'atca_sign_internal_in_out']]], + ['uselock_13',['UseLock',['../a02307.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/all_15.js b/search/all_15.js index 7f70de9ca..5bbd7d391 100644 --- a/search/all_15.js +++ b/search/all_15.js @@ -1,37 +1,37 @@ var searchData= [ - ['valid_0',['valid',['../a01692.html#aadedd52833b6ce041dfb9e923b448481',1,'atca_temp_key']]], - ['value_1',['value',['../a01692.html#abf76b14a42ef4d7f9d57a1d5edc6cf10',1,'atca_temp_key']]], - ['verify_2',['verify',['../a02236.html#a732d6227271912ac665bc7f27a1012ce',1,'cryptoauthlib::atjwt::HwHmacAlgorithm']]], - ['verify_5f256_5fexternal_5fcount_3',['VERIFY_256_EXTERNAL_COUNT',['../a00350.html#aae43276ff3f774ffd928ad1776592c7b',1,'calib_command.h']]], - ['verify_5f256_5fkey_5fsize_4',['VERIFY_256_KEY_SIZE',['../a00350.html#add994f7919c2f2b076f25ff207432686',1,'calib_command.h']]], - ['verify_5f256_5fsignature_5fsize_5',['VERIFY_256_SIGNATURE_SIZE',['../a00350.html#ae56700f2b05067288af3cc4af8e7f34d',1,'calib_command.h']]], - ['verify_5f256_5fstored_5fcount_6',['VERIFY_256_STORED_COUNT',['../a00350.html#a0b7d56888416e08f1ff67252072e3cea',1,'calib_command.h']]], - ['verify_5f256_5fvalidate_5fcount_7',['VERIFY_256_VALIDATE_COUNT',['../a00350.html#a677e57736342aed3a7a40704b82895d9',1,'calib_command.h']]], - ['verify_5f283_5fexternal_5fcount_8',['VERIFY_283_EXTERNAL_COUNT',['../a00350.html#a1a551775820d79c59f49068140e40f1b',1,'calib_command.h']]], - ['verify_5f283_5fkey_5fsize_9',['VERIFY_283_KEY_SIZE',['../a00350.html#af0cca41df253e49372d6853d4f5c406b',1,'calib_command.h']]], - ['verify_5f283_5fsignature_5fsize_10',['VERIFY_283_SIGNATURE_SIZE',['../a00350.html#a47f281930ad5bc31576ccd06e913563f',1,'calib_command.h']]], - ['verify_5f283_5fstored_5fcount_11',['VERIFY_283_STORED_COUNT',['../a00350.html#a3f7d34f0bcacd6c816c2b51cd13f5364',1,'calib_command.h']]], - ['verify_5f283_5fvalidate_5fcount_12',['VERIFY_283_VALIDATE_COUNT',['../a00350.html#ab09e6f726235fba47a2ea3f49cbfc2cb',1,'calib_command.h']]], - ['verify_5fdata_5fidx_13',['VERIFY_DATA_IDX',['../a00350.html#a15623038b9b0b4b51243691fe15253e2',1,'calib_command.h']]], - ['verify_5fkey_5fb283_14',['VERIFY_KEY_B283',['../a00350.html#a4c6b67a2a6193a1e317b6ef16ca3fca6',1,'calib_command.h']]], - ['verify_5fkey_5fk283_15',['VERIFY_KEY_K283',['../a00350.html#ad2eacbf59056d95e69b60f21beaafcb1',1,'calib_command.h']]], - ['verify_5fkey_5fp256_16',['VERIFY_KEY_P256',['../a00350.html#a94fc1ff3975c056868a169b1b836f920',1,'calib_command.h']]], - ['verify_5fkeyid_5fidx_17',['VERIFY_KEYID_IDX',['../a00350.html#a868d5d7ce0451e1c8f95f16092cfbc97',1,'calib_command.h']]], - ['verify_5fmode_5fexternal_18',['VERIFY_MODE_EXTERNAL',['../a00350.html#af3729ff16ba78ef4a6b70c341e81c749',1,'calib_command.h']]], - ['verify_5fmode_5fidx_19',['VERIFY_MODE_IDX',['../a00350.html#a896cc15df167f9a04f7e4f84de2bc7d2',1,'calib_command.h']]], - ['verify_5fmode_5finvalidate_20',['VERIFY_MODE_INVALIDATE',['../a00350.html#ab45a164ee20c8320318a3bc5e2eaa31f',1,'calib_command.h']]], - ['verify_5fmode_5fmac_5fflag_21',['VERIFY_MODE_MAC_FLAG',['../a00350.html#af3461e50ec2b06201d17feee167e0a4b',1,'calib_command.h']]], - ['verify_5fmode_5fmask_22',['VERIFY_MODE_MASK',['../a00350.html#ac892dbe1953c43e7e17b1d51ce967c9e',1,'calib_command.h']]], - ['verify_5fmode_5fsource_5fmask_23',['VERIFY_MODE_SOURCE_MASK',['../a00350.html#a3d6ae4ea1e385c2f7521495b53715a3f',1,'calib_command.h']]], - ['verify_5fmode_5fsource_5fmsgdigbuf_24',['VERIFY_MODE_SOURCE_MSGDIGBUF',['../a00350.html#a1b104109ce8d8c8a99484bc52d58460a',1,'calib_command.h']]], - ['verify_5fmode_5fsource_5ftempkey_25',['VERIFY_MODE_SOURCE_TEMPKEY',['../a00350.html#ad5c40b78682251cb07855e58bcf29f82',1,'calib_command.h']]], - ['verify_5fmode_5fstored_26',['VERIFY_MODE_STORED',['../a00350.html#a1da616e68f89a90e6fa3c920b4708fe2',1,'calib_command.h']]], - ['verify_5fmode_5fvalidate_27',['VERIFY_MODE_VALIDATE',['../a00350.html#adb7f53410523734e4c9485f2d71e7791',1,'calib_command.h']]], - ['verify_5fmode_5fvalidate_5fexternal_28',['VERIFY_MODE_VALIDATE_EXTERNAL',['../a00350.html#a8f38093650cd530f44dc59e6eb78fa3d',1,'calib_command.h']]], - ['verify_5fother_5fdata_29',['verify_other_data',['../a01768.html#a2a0f2ee83e6825f92e259ee104fbb67d',1,'atca_sign_internal_in_out']]], - ['verify_5fother_5fdata_5fsize_30',['VERIFY_OTHER_DATA_SIZE',['../a00350.html#a5a4ff6025fa5d4d936ededc78be16e47',1,'calib_command.h']]], - ['verify_5frsp_5fsize_31',['VERIFY_RSP_SIZE',['../a00350.html#ac75be9d5426dcf6ee196a788a35ee54b',1,'calib_command.h']]], - ['verify_5frsp_5fsize_5fmac_32',['VERIFY_RSP_SIZE_MAC',['../a00350.html#ace51b2a4dc8622ac3c03780dc369355e',1,'calib_command.h']]], - ['volatilekeypermission_33',['VolatileKeyPermission',['../a02276.html',1,'cryptoauthlib::device']]] + ['valid_0',['valid',['../a01711.html#aadedd52833b6ce041dfb9e923b448481',1,'atca_temp_key']]], + ['value_1',['value',['../a01711.html#abf76b14a42ef4d7f9d57a1d5edc6cf10',1,'atca_temp_key']]], + ['verify_2',['verify',['../a02271.html#a732d6227271912ac665bc7f27a1012ce',1,'cryptoauthlib::atjwt::HwHmacAlgorithm']]], + ['verify_5f256_5fexternal_5fcount_3',['VERIFY_256_EXTERNAL_COUNT',['../a00356.html#aae43276ff3f774ffd928ad1776592c7b',1,'calib_command.h']]], + ['verify_5f256_5fkey_5fsize_4',['VERIFY_256_KEY_SIZE',['../a00356.html#add994f7919c2f2b076f25ff207432686',1,'calib_command.h']]], + ['verify_5f256_5fsignature_5fsize_5',['VERIFY_256_SIGNATURE_SIZE',['../a00356.html#ae56700f2b05067288af3cc4af8e7f34d',1,'calib_command.h']]], + ['verify_5f256_5fstored_5fcount_6',['VERIFY_256_STORED_COUNT',['../a00356.html#a0b7d56888416e08f1ff67252072e3cea',1,'calib_command.h']]], + ['verify_5f256_5fvalidate_5fcount_7',['VERIFY_256_VALIDATE_COUNT',['../a00356.html#a677e57736342aed3a7a40704b82895d9',1,'calib_command.h']]], + ['verify_5f283_5fexternal_5fcount_8',['VERIFY_283_EXTERNAL_COUNT',['../a00356.html#a1a551775820d79c59f49068140e40f1b',1,'calib_command.h']]], + ['verify_5f283_5fkey_5fsize_9',['VERIFY_283_KEY_SIZE',['../a00356.html#af0cca41df253e49372d6853d4f5c406b',1,'calib_command.h']]], + ['verify_5f283_5fsignature_5fsize_10',['VERIFY_283_SIGNATURE_SIZE',['../a00356.html#a47f281930ad5bc31576ccd06e913563f',1,'calib_command.h']]], + ['verify_5f283_5fstored_5fcount_11',['VERIFY_283_STORED_COUNT',['../a00356.html#a3f7d34f0bcacd6c816c2b51cd13f5364',1,'calib_command.h']]], + ['verify_5f283_5fvalidate_5fcount_12',['VERIFY_283_VALIDATE_COUNT',['../a00356.html#ab09e6f726235fba47a2ea3f49cbfc2cb',1,'calib_command.h']]], + ['verify_5fdata_5fidx_13',['VERIFY_DATA_IDX',['../a00356.html#a15623038b9b0b4b51243691fe15253e2',1,'calib_command.h']]], + ['verify_5fkey_5fb283_14',['VERIFY_KEY_B283',['../a00356.html#a4c6b67a2a6193a1e317b6ef16ca3fca6',1,'calib_command.h']]], + ['verify_5fkey_5fk283_15',['VERIFY_KEY_K283',['../a00356.html#ad2eacbf59056d95e69b60f21beaafcb1',1,'calib_command.h']]], + ['verify_5fkey_5fp256_16',['VERIFY_KEY_P256',['../a00356.html#a94fc1ff3975c056868a169b1b836f920',1,'calib_command.h']]], + ['verify_5fkeyid_5fidx_17',['VERIFY_KEYID_IDX',['../a00356.html#a868d5d7ce0451e1c8f95f16092cfbc97',1,'calib_command.h']]], + ['verify_5fmode_5fexternal_18',['VERIFY_MODE_EXTERNAL',['../a00356.html#af3729ff16ba78ef4a6b70c341e81c749',1,'calib_command.h']]], + ['verify_5fmode_5fidx_19',['VERIFY_MODE_IDX',['../a00356.html#a896cc15df167f9a04f7e4f84de2bc7d2',1,'calib_command.h']]], + ['verify_5fmode_5finvalidate_20',['VERIFY_MODE_INVALIDATE',['../a00356.html#ab45a164ee20c8320318a3bc5e2eaa31f',1,'calib_command.h']]], + ['verify_5fmode_5fmac_5fflag_21',['VERIFY_MODE_MAC_FLAG',['../a00356.html#af3461e50ec2b06201d17feee167e0a4b',1,'calib_command.h']]], + ['verify_5fmode_5fmask_22',['VERIFY_MODE_MASK',['../a00356.html#ac892dbe1953c43e7e17b1d51ce967c9e',1,'calib_command.h']]], + ['verify_5fmode_5fsource_5fmask_23',['VERIFY_MODE_SOURCE_MASK',['../a00356.html#a3d6ae4ea1e385c2f7521495b53715a3f',1,'calib_command.h']]], + ['verify_5fmode_5fsource_5fmsgdigbuf_24',['VERIFY_MODE_SOURCE_MSGDIGBUF',['../a00356.html#a1b104109ce8d8c8a99484bc52d58460a',1,'calib_command.h']]], + ['verify_5fmode_5fsource_5ftempkey_25',['VERIFY_MODE_SOURCE_TEMPKEY',['../a00356.html#ad5c40b78682251cb07855e58bcf29f82',1,'calib_command.h']]], + ['verify_5fmode_5fstored_26',['VERIFY_MODE_STORED',['../a00356.html#a1da616e68f89a90e6fa3c920b4708fe2',1,'calib_command.h']]], + ['verify_5fmode_5fvalidate_27',['VERIFY_MODE_VALIDATE',['../a00356.html#adb7f53410523734e4c9485f2d71e7791',1,'calib_command.h']]], + ['verify_5fmode_5fvalidate_5fexternal_28',['VERIFY_MODE_VALIDATE_EXTERNAL',['../a00356.html#a8f38093650cd530f44dc59e6eb78fa3d',1,'calib_command.h']]], + ['verify_5fother_5fdata_29',['verify_other_data',['../a01787.html#a2a0f2ee83e6825f92e259ee104fbb67d',1,'atca_sign_internal_in_out']]], + ['verify_5fother_5fdata_5fsize_30',['VERIFY_OTHER_DATA_SIZE',['../a00356.html#a5a4ff6025fa5d4d936ededc78be16e47',1,'calib_command.h']]], + ['verify_5frsp_5fsize_31',['VERIFY_RSP_SIZE',['../a00356.html#ac75be9d5426dcf6ee196a788a35ee54b',1,'calib_command.h']]], + ['verify_5frsp_5fsize_5fmac_32',['VERIFY_RSP_SIZE_MAC',['../a00356.html#ace51b2a4dc8622ac3c03780dc369355e',1,'calib_command.h']]], + ['volatilekeypermission_33',['VolatileKeyPermission',['../a02311.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/all_16.js b/search/all_16.js index 9f0092000..d567f7d51 100644 --- a/search/all_16.js +++ b/search/all_16.js @@ -1,20 +1,21 @@ var searchData= [ - ['wakefailederror_0',['WakeFailedError',['../a02324.html',1,'cryptoauthlib::exceptions']]], - ['wpc_5fapis_2ec_1',['wpc_apis.c',['../a00119.html',1,'']]], - ['wpc_5fapis_2eh_2',['wpc_apis.h',['../a00122.html',1,'']]], + ['wakefailederror_0',['WakeFailedError',['../a02359.html',1,'cryptoauthlib::exceptions']]], + ['wpc_5fapis_2ec_1',['wpc_apis.c',['../a00116.html',1,'']]], + ['wpc_5fapis_2eh_2',['wpc_apis.h',['../a00119.html',1,'']]], ['wpccert_5fclient_2ec_3',['wpccert_client.c',['../a00128.html',1,'']]], ['wpccert_5fclient_2eh_4',['wpccert_client.h',['../a00131.html',1,'']]], ['wpccert_5fread_5fcert_5',['wpccert_read_cert',['../a00128.html#a76a6ac477f6341e80284c76c38b532ff',1,'wpccert_read_cert(ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size): wpccert_client.c'],['../a00131.html#a76a6ac477f6341e80284c76c38b532ff',1,'wpccert_read_cert(ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size): wpccert_client.c']]], - ['write_5faddr_5fidx_6',['WRITE_ADDR_IDX',['../a00350.html#a2d9e0bcb5ccf94f140b1cd519f407ffa',1,'calib_command.h']]], - ['write_5fmac_5fsize_7',['WRITE_MAC_SIZE',['../a00350.html#a3b8fb940e149c6fb29801ef573cc6311',1,'calib_command.h']]], - ['write_5fmac_5fvl_5fidx_8',['WRITE_MAC_VL_IDX',['../a00350.html#a9c08115363fb521e9fee60849046f820',1,'calib_command.h']]], - ['write_5fmac_5fvs_5fidx_9',['WRITE_MAC_VS_IDX',['../a00350.html#a203996620baf9cdf0aa01dd719e02d06',1,'calib_command.h']]], - ['write_5frsp_5fsize_10',['WRITE_RSP_SIZE',['../a00350.html#af0ac761b64981003336d72c34df3d2e3',1,'calib_command.h']]], - ['write_5fvalue_5fidx_11',['WRITE_VALUE_IDX',['../a00350.html#a5cdd382afc6d46da59de60fb35abd611',1,'calib_command.h']]], - ['write_5fzone_5fdata_12',['WRITE_ZONE_DATA',['../a00350.html#ae80ecfb4c696095b5627988cc7c9cde0',1,'calib_command.h']]], - ['write_5fzone_5fidx_13',['WRITE_ZONE_IDX',['../a00350.html#a8cbed81461d4e4c4991c50629b3a5bcd',1,'calib_command.h']]], - ['write_5fzone_5fmask_14',['WRITE_ZONE_MASK',['../a00350.html#aacd5623cd6f8eb12e7cdf22941f501dc',1,'calib_command.h']]], - ['write_5fzone_5fotp_15',['WRITE_ZONE_OTP',['../a00350.html#a830d379174b47b466f5de16fe3345182',1,'calib_command.h']]], - ['write_5fzone_5fwith_5fmac_16',['WRITE_ZONE_WITH_MAC',['../a00350.html#ac02ad2aea02f18d833e6e0631ae839ad',1,'calib_command.h']]] + ['wpccert_5fread_5fmfg_5fcert_6',['wpccert_read_mfg_cert',['../a00128.html#a9d37502a45846eb04ff3a0824242a99d',1,'wpccert_read_mfg_cert(ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot): wpccert_client.c'],['../a00131.html#a9d37502a45846eb04ff3a0824242a99d',1,'wpccert_read_mfg_cert(ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot): wpccert_client.c']]], + ['write_5faddr_5fidx_7',['WRITE_ADDR_IDX',['../a00356.html#a2d9e0bcb5ccf94f140b1cd519f407ffa',1,'calib_command.h']]], + ['write_5fmac_5fsize_8',['WRITE_MAC_SIZE',['../a00356.html#a3b8fb940e149c6fb29801ef573cc6311',1,'calib_command.h']]], + ['write_5fmac_5fvl_5fidx_9',['WRITE_MAC_VL_IDX',['../a00356.html#a9c08115363fb521e9fee60849046f820',1,'calib_command.h']]], + ['write_5fmac_5fvs_5fidx_10',['WRITE_MAC_VS_IDX',['../a00356.html#a203996620baf9cdf0aa01dd719e02d06',1,'calib_command.h']]], + ['write_5frsp_5fsize_11',['WRITE_RSP_SIZE',['../a00356.html#af0ac761b64981003336d72c34df3d2e3',1,'calib_command.h']]], + ['write_5fvalue_5fidx_12',['WRITE_VALUE_IDX',['../a00356.html#a5cdd382afc6d46da59de60fb35abd611',1,'calib_command.h']]], + ['write_5fzone_5fdata_13',['WRITE_ZONE_DATA',['../a00356.html#ae80ecfb4c696095b5627988cc7c9cde0',1,'calib_command.h']]], + ['write_5fzone_5fidx_14',['WRITE_ZONE_IDX',['../a00356.html#a8cbed81461d4e4c4991c50629b3a5bcd',1,'calib_command.h']]], + ['write_5fzone_5fmask_15',['WRITE_ZONE_MASK',['../a00356.html#aacd5623cd6f8eb12e7cdf22941f501dc',1,'calib_command.h']]], + ['write_5fzone_5fotp_16',['WRITE_ZONE_OTP',['../a00356.html#a830d379174b47b466f5de16fe3345182',1,'calib_command.h']]], + ['write_5fzone_5fwith_5fmac_17',['WRITE_ZONE_WITH_MAC',['../a00356.html#ac02ad2aea02f18d833e6e0631ae839ad',1,'calib_command.h']]] ]; diff --git a/search/all_17.js b/search/all_17.js index 56a490d52..bcb0fd65a 100644 --- a/search/all_17.js +++ b/search/all_17.js @@ -1,4 +1,4 @@ var searchData= [ - ['x509format_0',['X509Format',['../a02288.html',1,'cryptoauthlib::device']]] + ['x509format_0',['X509Format',['../a02323.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/all_18.js b/search/all_18.js index fe0471f79..ad1c4918d 100644 --- a/search/all_18.js +++ b/search/all_18.js @@ -1,6 +1,6 @@ var searchData= [ - ['zero_0',['zero',['../a01447.html#gaee2c8a03b0aa78ab07b64253f2c48b22',1,'atca_nonce_in_out']]], - ['zone_1',['zone',['../a01592.html#af8e8e6406f9252c503f2eaed02f0dbca',1,'atcacert_device_loc_s::zone()'],['../a01728.html#aa4922c43b6dfecb5e39e286e960cdd88',1,'atca_gen_dig_in_out::zone()'],['../a01736.html#adf4e9d92c10469c78810f2881a95843b',1,'atca_write_mac_in_out::zone()']]], - ['zonenotlockederror_2',['ZoneNotLockedError',['../a02424.html',1,'cryptoauthlib::exceptions']]] + ['zero_0',['zero',['../a01474.html#gaee2c8a03b0aa78ab07b64253f2c48b22',1,'atca_nonce_in_out']]], + ['zone_1',['zone',['../a01615.html#af8e8e6406f9252c503f2eaed02f0dbca',1,'atcacert_device_loc_s::zone()'],['../a01747.html#aa4922c43b6dfecb5e39e286e960cdd88',1,'atca_gen_dig_in_out::zone()'],['../a01755.html#adf4e9d92c10469c78810f2881a95843b',1,'atca_write_mac_in_out::zone()']]], + ['zonenotlockederror_2',['ZoneNotLockedError',['../a02459.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/all_2.js b/search/all_2.js index a209d8b84..936d0b735 100644 --- a/search/all_2.js +++ b/search/all_2.js @@ -1,17 +1,17 @@ var searchData= [ - ['badargumenterror_0',['BadArgumentError',['../a02356.html',1,'cryptoauthlib::exceptions']]], - ['badcrcerror_1',['BadCrcError',['../a02368.html',1,'cryptoauthlib::exceptions']]], - ['badopcodeerror_2',['BadOpcodeError',['../a02404.html',1,'cryptoauthlib::exceptions']]], - ['basic_20crypto_20api_20methods_20_28atcab_5f_29_3',['Basic Crypto API methods (atcab_)',['../a01439.html',1,'']]], - ['basic_20crypto_20api_20methods_20for_20cryptoauth_20devices_20_28calib_5f_29_4',['Basic Crypto API methods for CryptoAuth Devices (calib_)',['../a01444.html',1,'']]], - ['binarydistribution_5',['BinaryDistribution',['../a02532.html',1,'setup']]], + ['badargumenterror_0',['BadArgumentError',['../a02391.html',1,'cryptoauthlib::exceptions']]], + ['badcrcerror_1',['BadCrcError',['../a02403.html',1,'cryptoauthlib::exceptions']]], + ['badopcodeerror_2',['BadOpcodeError',['../a02439.html',1,'cryptoauthlib::exceptions']]], + ['basic_20crypto_20api_20methods_20_28atcab_5f_29_3',['Basic Crypto API methods (atcab_)',['../a01466.html',1,'']]], + ['basic_20crypto_20api_20methods_20for_20cryptoauth_20devices_20_28calib_5f_29_4',['Basic Crypto API methods for CryptoAuth Devices (calib_)',['../a01471.html',1,'']]], + ['binarydistribution_5',['BinaryDistribution',['../a02567.html',1,'setup']]], ['bind_5fhost_5fand_5fsecure_5felement_5fwith_5fio_5fprotection_6',['bind_host_and_secure_element_with_io_protection',['../a00044.html#af086e6ea3beaf8711ec855ff7dce40b1',1,'bind_host_and_secure_element_with_io_protection(uint16_t slot): secure_boot.c'],['../a00047.html#af086e6ea3beaf8711ec855ff7dce40b1',1,'bind_host_and_secure_element_with_io_protection(uint16_t slot): secure_boot.c']]], - ['bit_5fdelay_5f1h_7',['BIT_DELAY_1H',['../a00587.html#a1ce4882b7d053eafcec22cd84fb5727d',1,'hal_swi_gpio.h']]], - ['bit_5fdelay_5f1l_8',['BIT_DELAY_1L',['../a00587.html#ad884cf7d66d88b38180369a791a9824b',1,'hal_swi_gpio.h']]], - ['bit_5fdelay_5f5_9',['BIT_DELAY_5',['../a00587.html#a2ced4699fc4ab5162dbb9453edecb32e',1,'hal_swi_gpio.h']]], - ['bit_5fdelay_5f7_10',['BIT_DELAY_7',['../a00587.html#abd0d20a34060650b8a2895c17f842f44',1,'hal_swi_gpio.h']]], - ['block_11',['block',['../a01644.html#a09eac5418660881153169a7eb850dee0',1,'sw_sha256_ctx::block()'],['../a01616.html#a6d3f030387c74b86ec476d0c99a46c34',1,'atca_sha256_ctx::block()']]], - ['block_5fsize_12',['block_size',['../a01616.html#ae7cf177799e4c934821f6540aa5a33e5',1,'atca_sha256_ctx::block_size()'],['../a01644.html#ae49db58199cf54a15c307cb01b738c09',1,'sw_sha256_ctx::block_size()']]], - ['buf_13',['buf',['../a01612.html#a56ecba8dd00dd0bed1056152f4e9f9dc',1,'cal_buffer_s']]] + ['bit_5fdelay_5f1h_7',['BIT_DELAY_1H',['../a00602.html#a1ce4882b7d053eafcec22cd84fb5727d',1,'hal_swi_gpio.h']]], + ['bit_5fdelay_5f1l_8',['BIT_DELAY_1L',['../a00602.html#ad884cf7d66d88b38180369a791a9824b',1,'hal_swi_gpio.h']]], + ['bit_5fdelay_5f5_9',['BIT_DELAY_5',['../a00602.html#a2ced4699fc4ab5162dbb9453edecb32e',1,'hal_swi_gpio.h']]], + ['bit_5fdelay_5f7_10',['BIT_DELAY_7',['../a00602.html#abd0d20a34060650b8a2895c17f842f44',1,'hal_swi_gpio.h']]], + ['block_11',['block',['../a01639.html#a6d3f030387c74b86ec476d0c99a46c34',1,'atca_sha256_ctx']]], + ['block_5fsize_12',['block_size',['../a01639.html#ae7cf177799e4c934821f6540aa5a33e5',1,'atca_sha256_ctx']]], + ['buf_13',['buf',['../a01635.html#a56ecba8dd00dd0bed1056152f4e9f9dc',1,'cal_buffer_s']]] ]; diff --git a/search/all_3.js b/search/all_3.js index b58ff44b5..b80e5b210 100644 --- a/search/all_3.js +++ b/search/all_3.js @@ -1,320 +1,322 @@ var searchData= [ - ['atcab_0',['atcab',['../a01452.html',1,'cryptoauthlib']]], - ['atcacert_1',['atcacert',['../a01453.html',1,'cryptoauthlib']]], - ['atcaenum_2',['atcaenum',['../a01454.html',1,'cryptoauthlib']]], - ['atjwt_3',['atjwt',['../a01455.html',1,'cryptoauthlib']]], - ['c_5fcancelfunction_4',['C_CancelFunction',['../a01450.html#gac545b1d8eeb82e40f7519cdfc5a3427c',1,'pkcs11_main.c']]], - ['c_5fcloseallsessions_5',['C_CloseAllSessions',['../a01450.html#gad2ab78c409dfcbc155d673550cb71736',1,'pkcs11_main.c']]], - ['c_5fclosesession_6',['C_CloseSession',['../a01450.html#gae2ce0be368072fa83e0b1f5136b7b753',1,'pkcs11_main.c']]], - ['c_5fcopyobject_7',['C_CopyObject',['../a01450.html#ga301f7118a227ffedd7f945a9532fc18a',1,'pkcs11_main.c']]], - ['c_5fcreateobject_8',['C_CreateObject',['../a01450.html#ga01b36384bff05a4dc4476c0764cdc248',1,'pkcs11_main.c']]], - ['c_5fdecrypt_9',['C_Decrypt',['../a01450.html#gad7a0c95a7b810c5534185632b8b58d29',1,'pkcs11_main.c']]], - ['c_5fdecryptdigestupdate_10',['C_DecryptDigestUpdate',['../a01450.html#ga128ba07226b7e45772830f06dfde4b71',1,'pkcs11_main.c']]], - ['c_5fdecryptfinal_11',['C_DecryptFinal',['../a01450.html#gab549c4d540cff530f9e4d9bca36e2253',1,'pkcs11_main.c']]], - ['c_5fdecryptinit_12',['C_DecryptInit',['../a01450.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5',1,'pkcs11_main.c']]], - ['c_5fdecryptupdate_13',['C_DecryptUpdate',['../a01450.html#gaa4fb93ab28bedada72364e925b3dacbf',1,'pkcs11_main.c']]], - ['c_5fdecryptverifyupdate_14',['C_DecryptVerifyUpdate',['../a01450.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c',1,'pkcs11_main.c']]], - ['c_5fderivekey_15',['C_DeriveKey',['../a01450.html#ga67ecc1ce8ca0630aebdf3a29e129f531',1,'pkcs11_main.c']]], - ['c_5fdestroyobject_16',['C_DestroyObject',['../a01450.html#ga1b991b6fd8b20f130f9d87b98e590fdb',1,'pkcs11_main.c']]], - ['c_5fdigest_17',['C_Digest',['../a01450.html#gadfc9281add668a5aff9bbc1253655917',1,'pkcs11_main.c']]], - ['c_5fdigestencryptupdate_18',['C_DigestEncryptUpdate',['../a01450.html#ga3f8a5f0509ef9929f90536b6e255e485',1,'pkcs11_main.c']]], - ['c_5fdigestfinal_19',['C_DigestFinal',['../a01450.html#ga1f3dc3758726bb4737db956e4cd71e91',1,'pkcs11_main.c']]], - ['c_5fdigestinit_20',['C_DigestInit',['../a01450.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403',1,'pkcs11_main.c']]], - ['c_5fdigestkey_21',['C_DigestKey',['../a01450.html#ga21a9c4115bc535490416e2850a2a45fd',1,'pkcs11_main.c']]], - ['c_5fdigestupdate_22',['C_DigestUpdate',['../a01450.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6',1,'pkcs11_main.c']]], - ['c_5fencrypt_23',['C_Encrypt',['../a01450.html#gaf9aab1c3fcf352af53b0e66652fac39d',1,'pkcs11_main.c']]], - ['c_5fencryptfinal_24',['C_EncryptFinal',['../a01450.html#gab4a336f9cb4920a9ff8585aec5d90a3f',1,'pkcs11_main.c']]], - ['c_5fencryptinit_25',['C_EncryptInit',['../a01450.html#ga23a9b2dc15a447decd10881dde448890',1,'pkcs11_main.c']]], - ['c_5fencryptupdate_26',['C_EncryptUpdate',['../a01450.html#ga5e13fc136e0b7f79d22a6b735424a815',1,'pkcs11_main.c']]], - ['c_5ffinalize_27',['C_Finalize',['../a01450.html#ga945318df98e940ab331931023133ed3d',1,'pkcs11_main.c']]], - ['c_5ffindobjects_28',['C_FindObjects',['../a01450.html#ga42635cbaa2ba78482ae053bea477246a',1,'pkcs11_main.c']]], - ['c_5ffindobjectsfinal_29',['C_FindObjectsFinal',['../a01450.html#ga46347f830269bfbcbece15951f0c0fa4',1,'pkcs11_main.c']]], - ['c_5ffindobjectsinit_30',['C_FindObjectsInit',['../a01450.html#gaf4d4d071deb07e7dcfa489a2a835756d',1,'pkcs11_main.c']]], - ['c_5fgeneratekey_31',['C_GenerateKey',['../a01450.html#ga84673050f913404ec3ae164d4f7a1d9c',1,'pkcs11_main.c']]], - ['c_5fgeneratekeypair_32',['C_GenerateKeyPair',['../a01450.html#ga802a061224966a5523beb1ea0a9d9c27',1,'pkcs11_main.c']]], - ['c_5fgeneraterandom_33',['C_GenerateRandom',['../a01450.html#ga54a883eb1608be800f7fbd204665d50d',1,'pkcs11_main.c']]], - ['c_5fgetattributevalue_34',['C_GetAttributeValue',['../a01450.html#gaaad61dc7b2313286bdd049676ef0fd70',1,'pkcs11_main.c']]], - ['c_5fgetfunctionlist_35',['C_GetFunctionList',['../a01450.html#gab4cf13775c4e92b36156ee92dd52bef5',1,'pkcs11_main.c']]], - ['c_5fgetfunctionstatus_36',['C_GetFunctionStatus',['../a01450.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0',1,'pkcs11_main.c']]], - ['c_5fgetinfo_37',['C_GetInfo',['../a01450.html#ga75bdc5d475cd205914b8227c7f08df4c',1,'pkcs11_main.c']]], - ['c_5fgetmechanisminfo_38',['C_GetMechanismInfo',['../a01450.html#gabe5aeb6b794d4ca28cb2534fe0a4a159',1,'pkcs11_main.c']]], - ['c_5fgetmechanismlist_39',['C_GetMechanismList',['../a01450.html#gac80659e1b954f9514723fd6d4429dfb6',1,'pkcs11_main.c']]], - ['c_5fgetobjectsize_40',['C_GetObjectSize',['../a01450.html#gadd117013f515b1d441889a24a605bd93',1,'pkcs11_main.c']]], - ['c_5fgetoperationstate_41',['C_GetOperationState',['../a01450.html#ga95dcfc50be7ac2cb3ebf58d958f70dde',1,'pkcs11_main.c']]], - ['c_5fgetsessioninfo_42',['C_GetSessionInfo',['../a01450.html#gaffb75a4d4ba623ee01f31877b56b018e',1,'pkcs11_main.c']]], - ['c_5fgetslotinfo_43',['C_GetSlotInfo',['../a01450.html#gae795a3fd0467a249eeb075f94bfa0adc',1,'pkcs11_main.c']]], - ['c_5fgetslotlist_44',['C_GetSlotList',['../a01450.html#gac6ce96c3f4a3b7f24d9420763df121fc',1,'pkcs11_main.c']]], - ['c_5fgettokeninfo_45',['C_GetTokenInfo',['../a01450.html#gac933291718eb6aa218db1c677e07ab02',1,'pkcs11_main.c']]], - ['c_5finitialize_46',['C_Initialize',['../a01450.html#ga2e45ad4ce8c84712c646dddaa99544e3',1,'pkcs11_main.c']]], - ['c_5finitpin_47',['C_InitPIN',['../a01450.html#ga2b726534eedac635b28ccd501c242004',1,'pkcs11_main.c']]], - ['c_5finittoken_48',['C_InitToken',['../a01450.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb',1,'pkcs11_main.c']]], - ['c_5flogin_49',['C_Login',['../a01450.html#gaca7aa4ae8d9592f464dc1b545fead02e',1,'pkcs11_main.c']]], - ['c_5flogout_50',['C_Logout',['../a01450.html#gab7a0a4ff33f2450736d76d453045ad6f',1,'pkcs11_main.c']]], - ['c_5fopensession_51',['C_OpenSession',['../a01450.html#gad28ad989a94c345875dff446ad6c6481',1,'pkcs11_main.c']]], - ['c_5fseedrandom_52',['C_SeedRandom',['../a01450.html#gab26093f478636b5ba04176c2f81f44c4',1,'pkcs11_main.c']]], - ['c_5fsetattributevalue_53',['C_SetAttributeValue',['../a01450.html#ga752412c887c0d900c05b771709ebac83',1,'pkcs11_main.c']]], - ['c_5fsetoperationstate_54',['C_SetOperationState',['../a01450.html#ga66e6598e8f5db01e428a46d58b9865fc',1,'pkcs11_main.c']]], - ['c_5fsetpin_55',['C_SetPIN',['../a01450.html#ga386826845e06a84b36522a2bf49ff6c6',1,'pkcs11_main.c']]], - ['c_5fsign_56',['C_Sign',['../a01450.html#ga5f587605d68a7a56012ac337ddaec5e1',1,'pkcs11_main.c']]], - ['c_5fsignencryptupdate_57',['C_SignEncryptUpdate',['../a01450.html#gaf63ca32aef7a90f87e94a288de5e82cc',1,'pkcs11_main.c']]], - ['c_5fsignfinal_58',['C_SignFinal',['../a01450.html#ga2171c591535849faf017fa126e3a9a48',1,'pkcs11_main.c']]], - ['c_5fsigninit_59',['C_SignInit',['../a01450.html#ga37d93326915dc9b74f2476238f35037c',1,'pkcs11_main.c']]], - ['c_5fsignrecover_60',['C_SignRecover',['../a01450.html#ga210f4bdbaae1bc2b8e242e1610da4f0f',1,'pkcs11_main.c']]], - ['c_5fsignrecoverinit_61',['C_SignRecoverInit',['../a01450.html#ga97ee219718545f49ee651cbb00712b8c',1,'pkcs11_main.c']]], - ['c_5fsignupdate_62',['C_SignUpdate',['../a01450.html#gada0dd5a3d8ae781df05ea016d2f76d16',1,'pkcs11_main.c']]], - ['c_5funwrapkey_63',['C_UnwrapKey',['../a01450.html#gafd4a7d6e142179e46453af11d5da3e91',1,'pkcs11_main.c']]], - ['c_5fverify_64',['C_Verify',['../a01450.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529',1,'pkcs11_main.c']]], - ['c_5fverifyfinal_65',['C_VerifyFinal',['../a01450.html#gaf6ecd512fa21851f0bcbc25b90c2b444',1,'pkcs11_main.c']]], - ['c_5fverifyinit_66',['C_VerifyInit',['../a01450.html#gaeae51e6092fa8c8a58e022fcd8366c45',1,'pkcs11_main.c']]], - ['c_5fverifyrecover_67',['C_VerifyRecover',['../a01450.html#ga82355d41e5303e31cc49df003e9d8c38',1,'pkcs11_main.c']]], - ['c_5fverifyrecoverinit_68',['C_VerifyRecoverInit',['../a01450.html#gaefe33200a70026c7e622b01473d78b66',1,'pkcs11_main.c']]], - ['c_5fverifyupdate_69',['C_VerifyUpdate',['../a01450.html#gaba9414cf3fc679beaae1baa5425a6e01',1,'pkcs11_main.c']]], - ['c_5fwaitforslotevent_70',['C_WaitForSlotEvent',['../a01450.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6',1,'pkcs11_main.c']]], - ['c_5fwrapkey_71',['C_WrapKey',['../a01450.html#gaf47613fd93688da939cf4c6998f83d77',1,'pkcs11_main.c']]], - ['ca_5fcert_5fdef_72',['ca_cert_def',['../a01604.html#ae6dc350fb1a599dd6585c41e34a1e0e8',1,'atcacert_def_s']]], - ['cal_5fbuf_5finit_5fconst_5fptr_73',['cal_buf_init_const_ptr',['../a00320.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c'],['../a00323.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c']]], - ['cal_5fbuf_5fread_5fbytes_74',['cal_buf_read_bytes',['../a00320.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c'],['../a00323.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c']]], - ['cal_5fbuf_5fread_5fnumber_75',['cal_buf_read_number',['../a00320.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00323.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c']]], - ['cal_5fbuf_5fwrite_5fbytes_76',['cal_buf_write_bytes',['../a00320.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c'],['../a00323.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c']]], - ['cal_5fbuf_5fwrite_5fnumber_77',['cal_buf_write_number',['../a00320.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00323.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c']]], - ['cal_5fbuffer_2ec_78',['cal_buffer.c',['../a00320.html',1,'']]], - ['cal_5fbuffer_2eh_79',['cal_buffer.h',['../a00323.html',1,'']]], - ['cal_5fbuffer_5fs_80',['cal_buffer_s',['../a01612.html',1,'']]], - ['cal_5finternal_2eh_81',['cal_internal.h',['../a00326.html',1,'']]], - ['calib_20directory_20_2d_20purpose_82',['calib directory - Purpose',['../a01444.html',1,'']]], - ['calib_5faes_2ec_83',['calib_aes.c',['../a00329.html',1,'']]], - ['calib_5faes_5fgcm_2ec_84',['calib_aes_gcm.c',['../a00332.html',1,'']]], - ['calib_5faes_5fgcm_2eh_85',['calib_aes_gcm.h',['../a00335.html',1,'']]], - ['calib_5fbasic_2ec_86',['calib_basic.c',['../a00338.html',1,'']]], - ['calib_5fca2_5fget_5faddr_87',['calib_ca2_get_addr',['../a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], - ['calib_5fca2_5fis_5fconfig_5flocked_88',['calib_ca2_is_config_locked',['../a01444.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01444.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], - ['calib_5fca2_5fis_5fdata_5flocked_89',['calib_ca2_is_data_locked',['../a01444.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01444.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], - ['calib_5fca2_5fis_5flocked_90',['calib_ca2_is_locked',['../a01444.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c'],['../a01444.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c']]], - ['calib_5fcheckmac_2ec_91',['calib_checkmac.c',['../a00344.html',1,'']]], - ['calib_5fcommand_2ec_92',['calib_command.c',['../a00347.html',1,'']]], - ['calib_5fcommand_2eh_93',['calib_command.h',['../a00350.html',1,'']]], - ['calib_5fconfig_5fcheck_2eh_94',['calib_config_check.h',['../a00353.html',1,'']]], - ['calib_5fcounter_2ec_95',['calib_counter.c',['../a00356.html',1,'']]], - ['calib_5fdelete_2ec_96',['calib_delete.c',['../a00359.html',1,'']]], - ['calib_5fderivekey_2ec_97',['calib_derivekey.c',['../a00362.html',1,'']]], - ['calib_5fdevice_2eh_98',['calib_device.h',['../a00365.html',1,'']]], - ['calib_5fecdh_2ec_99',['calib_ecdh.c',['../a00368.html',1,'']]], - ['calib_5fexecute_5fcommand_100',['calib_execute_command',['../a00374.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c'],['../a00371.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c']]], - ['calib_5fexecution_2ec_101',['calib_execution.c',['../a00371.html',1,'']]], - ['calib_5fexecution_2eh_102',['calib_execution.h',['../a00374.html',1,'']]], - ['calib_5fexit_103',['calib_exit',['../a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c'],['../a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c']]], - ['calib_5fgendig_2ec_104',['calib_gendig.c',['../a00377.html',1,'']]], - ['calib_5fgenkey_2ec_105',['calib_genkey.c',['../a00380.html',1,'']]], - ['calib_5fget_5faddr_106',['calib_get_addr',['../a01444.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01444.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], - ['calib_5fget_5fdevicetype_107',['calib_get_devicetype',['../a01444.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c'],['../a01444.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c']]], - ['calib_5fget_5fexecution_5ftime_108',['calib_get_execution_time',['../a00374.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c'],['../a00371.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c']]], - ['calib_5fget_5fzone_5fsize_109',['calib_get_zone_size',['../a01444.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c'],['../a01444.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c']]], - ['calib_5fhelpers_2ec_110',['calib_helpers.c',['../a00383.html',1,'']]], - ['calib_5fhmac_2ec_111',['calib_hmac.c',['../a00386.html',1,'']]], - ['calib_5fidle_112',['calib_idle',['../a01444.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c'],['../a01444.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c']]], - ['calib_5finfo_113',['calib_info',['../a01444.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c'],['../a01444.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c']]], - ['calib_5finfo_2ec_114',['calib_info.c',['../a00389.html',1,'']]], - ['calib_5finfo_5fbase_115',['calib_info_base',['../a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c'],['../a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c']]], - ['calib_5finfo_5fchip_5fstatus_116',['calib_info_chip_status',['../a01444.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c'],['../a01444.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c']]], - ['calib_5finfo_5flatch_5fen_117',['CALIB_INFO_LATCH_EN',['../a00353.html#af19794adbeec8b57eb7cbef1f9e21c91',1,'calib_config_check.h']]], - ['calib_5finfo_5flock_5fstatus_118',['calib_info_lock_status',['../a01444.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c'],['../a01444.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c']]], - ['calib_5finfo_5fprivkey_5fvalid_119',['calib_info_privkey_valid',['../a01444.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c'],['../a01444.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c']]], - ['calib_5fkdf_2ec_120',['calib_kdf.c',['../a00392.html',1,'']]], - ['calib_5flock_2ec_121',['calib_lock.c',['../a00395.html',1,'']]], - ['calib_5flock_5fca2_5fen_122',['CALIB_LOCK_CA2_EN',['../a00353.html#a611611e20ca91cad7e9897847b9b355a',1,'calib_config_check.h']]], - ['calib_5flock_5fen_123',['CALIB_LOCK_EN',['../a00353.html#a3801cb49b78666a9cfa602fa74b22da9',1,'calib_config_check.h']]], - ['calib_5fmac_2ec_124',['calib_mac.c',['../a00398.html',1,'']]], - ['calib_5fnonce_2ec_125',['calib_nonce.c',['../a00401.html',1,'']]], - ['calib_5fprivwrite_2ec_126',['calib_privwrite.c',['../a00404.html',1,'']]], - ['calib_5frandom_2ec_127',['calib_random.c',['../a00407.html',1,'']]], - ['calib_5fread_2ec_128',['calib_read.c',['../a00410.html',1,'']]], - ['calib_5fread_5fen_129',['CALIB_READ_EN',['../a00353.html#a67ed014df4e1bbbea873ede0e9700e29',1,'calib_config_check.h']]], - ['calib_5fsecureboot_2ec_130',['calib_secureboot.c',['../a00413.html',1,'']]], - ['calib_5fselftest_2ec_131',['calib_selftest.c',['../a00416.html',1,'']]], - ['calib_5fsha_2ec_132',['calib_sha.c',['../a00419.html',1,'']]], - ['calib_5fsha_5fcontext_5fen_133',['CALIB_SHA_CONTEXT_EN',['../a00353.html#a84c51bc36228a8fadd8654bfaae5d58c',1,'calib_config_check.h']]], - ['calib_5fsha_5fen_134',['CALIB_SHA_EN',['../a00353.html#a467882792e9ea53b4e596d1be05997a6',1,'calib_config_check.h']]], - ['calib_5fsha_5fhmac_5fen_135',['CALIB_SHA_HMAC_EN',['../a00353.html#ab13bbafe02599813084788482536728f',1,'calib_config_check.h']]], - ['calib_5fsign_2ec_136',['calib_sign.c',['../a00422.html',1,'']]], - ['calib_5fsign_5fca2_5fen_137',['CALIB_SIGN_CA2_EN',['../a00353.html#ac629bf5f0b5d6c64c5393cadd7b7479c',1,'calib_config_check.h']]], - ['calib_5fsign_5fen_138',['CALIB_SIGN_EN',['../a00353.html#a9802710200f050b0e9414bd88cdd8c0d',1,'calib_config_check.h']]], - ['calib_5fsleep_139',['calib_sleep',['../a01444.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c'],['../a01444.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c']]], - ['calib_5fswi_5fflag_5fcmd_140',['CALIB_SWI_FLAG_CMD',['../a00374.html#ac7946c257bcbaf0e1589e960b83d23df',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5fidle_141',['CALIB_SWI_FLAG_IDLE',['../a00374.html#a525ae62bb76a8ba01d4d85264f832c8e',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5fsleep_142',['CALIB_SWI_FLAG_SLEEP',['../a00374.html#a8dd3e14e93cec4aea30e27104935d51b',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5ftx_143',['CALIB_SWI_FLAG_TX',['../a00374.html#a1c46cc5ed5e30945d62e9ea369c94cdb',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5fwake_144',['CALIB_SWI_FLAG_WAKE',['../a00374.html#a55c5fe347b23c42f6359e97ae82b4729',1,'calib_execution.h']]], - ['calib_5fupdateextra_2ec_145',['calib_updateextra.c',['../a00425.html',1,'']]], - ['calib_5fupdateextra_5fen_146',['CALIB_UPDATEEXTRA_EN',['../a00353.html#ab46a8196f24bde7c86ac5e3affdc8ff8',1,'calib_config_check.h']]], - ['calib_5fverify_2ec_147',['calib_verify.c',['../a00428.html',1,'']]], - ['calib_5fverify_5fen_148',['CALIB_VERIFY_EN',['../a00353.html#a671b3421327a5c885b0c3e6e1e64afe7',1,'calib_config_check.h']]], - ['calib_5fverify_5fmac_5fen_149',['CALIB_VERIFY_MAC_EN',['../a00353.html#ac419953cd10efa4bef6e4efdc9c6cbe9',1,'calib_config_check.h']]], - ['calib_5fverify_5fstored_5fen_150',['CALIB_VERIFY_STORED_EN',['../a00353.html#ae841eeabdfbe04dd3241f6fde1a57954',1,'calib_config_check.h']]], - ['calib_5fwakeup_151',['calib_wakeup',['../a01444.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c'],['../a01444.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c']]], - ['calib_5fwakeup_5fi2c_152',['calib_wakeup_i2c',['../a01444.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c'],['../a01444.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c']]], - ['calib_5fwrite_2ec_153',['calib_write.c',['../a00431.html',1,'']]], - ['calib_5fwrite_5fenc_5fen_154',['CALIB_WRITE_ENC_EN',['../a00353.html#a64cbcf66a79f024ae3cce06d1f6731f9',1,'calib_config_check.h']]], - ['cert_155',['cert',['../a01608.html#a850a129376d4a3dd4c9994d04a9edca7',1,'atcacert_build_state_s']]], - ['cert_5fdef_156',['cert_def',['../a01608.html#a5b6c72f114573cb07932b4c0e089150e',1,'atcacert_build_state_s']]], - ['cert_5floc_157',['cert_loc',['../a01600.html#a6a6584538d9ba2e8304e2c103d4501a5',1,'atcacert_cert_element_s']]], - ['cert_5fsize_158',['cert_size',['../a01608.html#af8600eedc4cac772aff7257ffcd4a1c0',1,'atcacert_build_state_s']]], - ['certificate_20manipulation_20methods_20_28atcacert_5f_29_159',['Certificate manipulation methods (atcacert_)',['../a01443.html',1,'']]], - ['certstatus_160',['CertStatus',['../a02200.html',1,'cryptoauthlib::atcacert']]], - ['certtype_5fcustom_161',['CERTTYPE_CUSTOM',['../a01443.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb',1,'atcacert_def.h']]], - ['certtype_5fx509_162',['CERTTYPE_X509',['../a01443.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44',1,'atcacert_def.h']]], - ['certtype_5fx509_5ffull_5fstored_163',['CERTTYPE_X509_FULL_STORED',['../a01443.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9',1,'atcacert_def.h']]], - ['cfg_5fateccx08a_5fi2c_5fdefault_164',['cfg_ateccx08a_i2c_default',['../a01458.html#afe3491a94655b07c2608d3451e59d606',1,'cryptoauthlib::iface']]], - ['cfg_5fateccx08a_5fkithid_5fdefault_165',['cfg_ateccx08a_kithid_default',['../a01458.html#a88737f422c86c2246a698fd64d59db1a',1,'cryptoauthlib::iface']]], - ['cfg_5fateccx08a_5fswi_5fdefault_166',['cfg_ateccx08a_swi_default',['../a01458.html#a64fa8e408c7c7abc0999d5b74825e69d',1,'cryptoauthlib::iface']]], - ['cfg_5fatsha20xa_5fi2c_5fdefault_167',['cfg_atsha20xa_i2c_default',['../a01458.html#acc3d4402aa912d4f90e3298a7e8de20c',1,'cryptoauthlib::iface']]], - ['cfg_5fatsha20xa_5fkithid_5fdefault_168',['cfg_atsha20xa_kithid_default',['../a01458.html#a1b929d7e15620e9c352c3cf1e75e2a22',1,'cryptoauthlib::iface']]], - ['cfg_5fatsha20xa_5fswi_5fdefault_169',['cfg_atsha20xa_swi_default',['../a01458.html#a4638d28e57304b76ce9f50077e6b3b47',1,'cryptoauthlib::iface']]], - ['challenge_170',['challenge',['../a01447.html#gac4c2db1a307043c7677e76310911d944',1,'atca_mac_in_out']]], - ['change_5fi2c_5fspeed_171',['change_i2c_speed',['../a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1',1,'hal_i2c_harmony.c']]], - ['check_5frationality_172',['check_rationality',['../a02516.html#a2cd77c54cfde31fcc4fb97ad15223f30',1,'cryptoauthlib.library.AtcaStructure.check_rationality()'],['../a02512.html#a1f9f23cc775d8b3e461bbfc192134c27',1,'cryptoauthlib.library.AtcaUnion.check_rationality()']]], - ['check_5fstatus_173',['check_status',['../a01461.html#a79e412f95dfbdb782c011ac214270aa3',1,'cryptoauthlib::status']]], - ['checkmac_5fclient_5fchallenge_5fidx_174',['CHECKMAC_CLIENT_CHALLENGE_IDX',['../a00350.html#a0f2c0b2e264a88b766811fe4ea0de88f',1,'calib_command.h']]], - ['checkmac_5fclient_5fchallenge_5fsize_175',['CHECKMAC_CLIENT_CHALLENGE_SIZE',['../a00350.html#a3c7444c099cf0f89f754fd3cbec77bf4',1,'calib_command.h']]], - ['checkmac_5fclient_5fcommand_5fsize_176',['CHECKMAC_CLIENT_COMMAND_SIZE',['../a00350.html#ad3d431e17094b6690d443e0a038da9e2',1,'calib_command.h']]], - ['checkmac_5fclient_5fresponse_5fidx_177',['CHECKMAC_CLIENT_RESPONSE_IDX',['../a00350.html#a170c911bfe1a20e3572bdc5c2cd80c9d',1,'calib_command.h']]], - ['checkmac_5fclient_5fresponse_5fsize_178',['CHECKMAC_CLIENT_RESPONSE_SIZE',['../a00350.html#a93cb0fdfc89b69cb1c4670f30288f2ad',1,'calib_command.h']]], - ['checkmac_5fcmd_5fmatch_179',['CHECKMAC_CMD_MATCH',['../a00350.html#a09b26b691e29966bcec1513edf819efe',1,'calib_command.h']]], - ['checkmac_5fcmd_5fmismatch_180',['CHECKMAC_CMD_MISMATCH',['../a00350.html#a1db673cb318ec36ebd0c9c1a5ce301ad',1,'calib_command.h']]], - ['checkmac_5fcount_181',['CHECKMAC_COUNT',['../a00350.html#a4c998ee3d596f3006a4488bd8657df33',1,'calib_command.h']]], - ['checkmac_5fdata_5fidx_182',['CHECKMAC_DATA_IDX',['../a00350.html#a1ba2ec2d321b3f90f53c02c7fb9711f2',1,'calib_command.h']]], - ['checkmac_5fkeyid_5fidx_183',['CHECKMAC_KEYID_IDX',['../a00350.html#a4203bbb296cd67d035066979657cf979',1,'calib_command.h']]], - ['checkmac_5fmode_5fblock1_5ftempkey_184',['CHECKMAC_MODE_BLOCK1_TEMPKEY',['../a00350.html#a9088fc1b89c3ca9b58901de000d8d55d',1,'calib_command.h']]], - ['checkmac_5fmode_5fblock2_5ftempkey_185',['CHECKMAC_MODE_BLOCK2_TEMPKEY',['../a00350.html#a40d926e0e037fc8bb265bb19f57e5d1a',1,'calib_command.h']]], - ['checkmac_5fmode_5fchallenge_186',['CHECKMAC_MODE_CHALLENGE',['../a00350.html#aaabcd1e4afb29088a17f7e87e7136e24',1,'calib_command.h']]], - ['checkmac_5fmode_5fidx_187',['CHECKMAC_MODE_IDX',['../a00350.html#ae757542e1c4d4815e1dc8db034dca476',1,'calib_command.h']]], - ['checkmac_5fmode_5finclude_5fotp_5f64_188',['CHECKMAC_MODE_INCLUDE_OTP_64',['../a00350.html#abeef4ff866116f4e17a6c3ad94b0a286',1,'calib_command.h']]], - ['checkmac_5fmode_5fmask_189',['CHECKMAC_MODE_MASK',['../a00350.html#a67e74cb132024711cf064ff98021d71f',1,'calib_command.h']]], - ['checkmac_5fmode_5foutput_5fmac_5fresponse_190',['CHECKMAC_MODE_OUTPUT_MAC_RESPONSE',['../a00350.html#a411d35690c62060ac4c39588741a808e',1,'calib_command.h']]], - ['checkmac_5fmode_5fsource_5fflag_5fmatch_191',['CHECKMAC_MODE_SOURCE_FLAG_MATCH',['../a00350.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad',1,'calib_command.h']]], - ['checkmac_5fother_5fdata_5fsize_192',['CHECKMAC_OTHER_DATA_SIZE',['../a00350.html#a7c365741639a5c7dc29267a130e8d827',1,'calib_command.h']]], - ['checkmac_5frsp_5fsize_193',['CHECKMAC_RSP_SIZE',['../a00350.html#aa44ecaa440ab845d5939333171476adf',1,'calib_command.h']]], - ['checkmacverifyfailederror_194',['CheckmacVerifyFailedError',['../a02328.html',1,'cryptoauthlib::exceptions']]], - ['chipmode508_195',['ChipMode508',['../a02256.html',1,'cryptoauthlib::device']]], - ['chipmode608_196',['ChipMode608',['../a02260.html',1,'cryptoauthlib::device']]], - ['chipoptions_197',['ChipOptions',['../a02284.html',1,'cryptoauthlib::device']]], - ['ck_5faes_5fcbc_5fencrypt_5fdata_5fparams_198',['CK_AES_CBC_ENCRYPT_DATA_PARAMS',['../a01980.html',1,'']]], - ['ck_5faes_5fccm_5fparams_199',['CK_AES_CCM_PARAMS',['../a02088.html',1,'']]], - ['ck_5faes_5fctr_5fparams_200',['CK_AES_CTR_PARAMS',['../a02072.html',1,'']]], - ['ck_5faes_5fgcm_5fparams_201',['CK_AES_GCM_PARAMS',['../a02084.html',1,'']]], - ['ck_5faria_5fcbc_5fencrypt_5fdata_5fparams_202',['CK_ARIA_CBC_ENCRYPT_DATA_PARAMS',['../a02100.html',1,'']]], - ['ck_5fattribute_203',['CK_ATTRIBUTE',['../a01900.html',1,'']]], - ['ck_5fc_5finitialize_5fargs_204',['CK_C_INITIALIZE_ARGS',['../a01916.html',1,'']]], - ['ck_5fcamellia_5fcbc_5fencrypt_5fdata_5fparams_205',['CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS',['../a02096.html',1,'']]], - ['ck_5fcamellia_5fctr_5fparams_206',['CK_CAMELLIA_CTR_PARAMS',['../a02092.html',1,'']]], - ['ck_5fccm_5fparams_207',['CK_CCM_PARAMS',['../a02080.html',1,'']]], - ['ck_5fcms_5fsig_5fparams_208',['CK_CMS_SIG_PARAMS',['../a02040.html',1,'']]], - ['ck_5fdate_209',['CK_DATE',['../a01904.html',1,'']]], - ['ck_5fdes_5fcbc_5fencrypt_5fdata_5fparams_210',['CK_DES_CBC_ENCRYPT_DATA_PARAMS',['../a01976.html',1,'']]], - ['ck_5fdsa_5fparameter_5fgen_5fparam_211',['CK_DSA_PARAMETER_GEN_PARAM',['../a02104.html',1,'']]], - ['ck_5fecdh1_5fderive_5fparams_212',['CK_ECDH1_DERIVE_PARAMS',['../a01928.html',1,'']]], - ['ck_5fecdh2_5fderive_5fparams_213',['CK_ECDH2_DERIVE_PARAMS',['../a01932.html',1,'']]], - ['ck_5fecdh_5faes_5fkey_5fwrap_5fparams_214',['CK_ECDH_AES_KEY_WRAP_PARAMS',['../a02108.html',1,'']]], - ['ck_5fecmqv_5fderive_5fparams_215',['CK_ECMQV_DERIVE_PARAMS',['../a01936.html',1,'']]], - ['ck_5ffunction_5flist_216',['CK_FUNCTION_LIST',['../a01816.html',1,'']]], - ['ck_5fgcm_5fparams_217',['CK_GCM_PARAMS',['../a02076.html',1,'']]], - ['ck_5fgostr3410_5fderive_5fparams_218',['CK_GOSTR3410_DERIVE_PARAMS',['../a02132.html',1,'']]], - ['ck_5fgostr3410_5fkey_5fwrap_5fparams_219',['CK_GOSTR3410_KEY_WRAP_PARAMS',['../a02136.html',1,'']]], - ['ck_5finfo_220',['CK_INFO',['../a01884.html',1,'']]], - ['ck_5fkea_5fderive_5fparams_221',['CK_KEA_DERIVE_PARAMS',['../a01952.html',1,'']]], - ['ck_5fkey_5fderivation_5fstring_5fdata_222',['CK_KEY_DERIVATION_STRING_DATA',['../a02044.html',1,'']]], - ['ck_5fkey_5fwrap_5fset_5foaep_5fparams_223',['CK_KEY_WRAP_SET_OAEP_PARAMS',['../a01996.html',1,'']]], - ['ck_5fkip_5fparams_224',['CK_KIP_PARAMS',['../a02068.html',1,'']]], - ['ck_5fmechanism_225',['CK_MECHANISM',['../a01908.html',1,'']]], - ['ck_5fmechanism_5finfo_226',['CK_MECHANISM_INFO',['../a01912.html',1,'']]], - ['ck_5fotp_5fparam_227',['CK_OTP_PARAM',['../a02056.html',1,'']]], - ['ck_5fotp_5fparams_228',['CK_OTP_PARAMS',['../a02060.html',1,'']]], - ['ck_5fotp_5fsignature_5finfo_229',['CK_OTP_SIGNATURE_INFO',['../a02064.html',1,'']]], - ['ck_5fpbe_5fparams_230',['CK_PBE_PARAMS',['../a01992.html',1,'']]], - ['ck_5fpkcs5_5fpbkd2_5fparams_231',['CK_PKCS5_PBKD2_PARAMS',['../a02048.html',1,'']]], - ['ck_5fpkcs5_5fpbkd2_5fparams2_232',['CK_PKCS5_PBKD2_PARAMS2',['../a02052.html',1,'']]], - ['ck_5frc2_5fcbc_5fparams_233',['CK_RC2_CBC_PARAMS',['../a01956.html',1,'']]], - ['ck_5frc2_5fmac_5fgeneral_5fparams_234',['CK_RC2_MAC_GENERAL_PARAMS',['../a01960.html',1,'']]], - ['ck_5frc5_5fcbc_5fparams_235',['CK_RC5_CBC_PARAMS',['../a01968.html',1,'']]], - ['ck_5frc5_5fmac_5fgeneral_5fparams_236',['CK_RC5_MAC_GENERAL_PARAMS',['../a01972.html',1,'']]], - ['ck_5frc5_5fparams_237',['CK_RC5_PARAMS',['../a01964.html',1,'']]], - ['ck_5frsa_5faes_5fkey_5fwrap_5fparams_238',['CK_RSA_AES_KEY_WRAP_PARAMS',['../a02112.html',1,'']]], - ['ck_5frsa_5fpkcs_5foaep_5fparams_239',['CK_RSA_PKCS_OAEP_PARAMS',['../a01920.html',1,'']]], - ['ck_5frsa_5fpkcs_5fpss_5fparams_240',['CK_RSA_PKCS_PSS_PARAMS',['../a01924.html',1,'']]], - ['ck_5fseed_5fcbc_5fencrypt_5fdata_5fparams_241',['CK_SEED_CBC_ENCRYPT_DATA_PARAMS',['../a02140.html',1,'']]], - ['ck_5fsession_5finfo_242',['CK_SESSION_INFO',['../a01896.html',1,'']]], - ['ck_5fskipjack_5fprivate_5fwrap_5fparams_243',['CK_SKIPJACK_PRIVATE_WRAP_PARAMS',['../a01984.html',1,'']]], - ['ck_5fskipjack_5frelayx_5fparams_244',['CK_SKIPJACK_RELAYX_PARAMS',['../a01988.html',1,'']]], - ['ck_5fslot_5finfo_245',['CK_SLOT_INFO',['../a01888.html',1,'']]], - ['ck_5fssl3_5fkey_5fmat_5fout_246',['CK_SSL3_KEY_MAT_OUT',['../a02008.html',1,'']]], - ['ck_5fssl3_5fkey_5fmat_5fparams_247',['CK_SSL3_KEY_MAT_PARAMS',['../a02012.html',1,'']]], - ['ck_5fssl3_5fmaster_5fkey_5fderive_5fparams_248',['CK_SSL3_MASTER_KEY_DERIVE_PARAMS',['../a02004.html',1,'']]], - ['ck_5fssl3_5frandom_5fdata_249',['CK_SSL3_RANDOM_DATA',['../a02000.html',1,'']]], - ['ck_5ftls12_5fkey_5fmat_5fparams_250',['CK_TLS12_KEY_MAT_PARAMS',['../a02120.html',1,'']]], - ['ck_5ftls12_5fmaster_5fkey_5fderive_5fparams_251',['CK_TLS12_MASTER_KEY_DERIVE_PARAMS',['../a02116.html',1,'']]], - ['ck_5ftls_5fkdf_5fparams_252',['CK_TLS_KDF_PARAMS',['../a02124.html',1,'']]], - ['ck_5ftls_5fmac_5fparams_253',['CK_TLS_MAC_PARAMS',['../a02128.html',1,'']]], - ['ck_5ftls_5fprf_5fparams_254',['CK_TLS_PRF_PARAMS',['../a02016.html',1,'']]], - ['ck_5ftoken_5finfo_255',['CK_TOKEN_INFO',['../a01892.html',1,'']]], - ['ck_5fversion_256',['CK_VERSION',['../a01880.html',1,'']]], - ['ck_5fwtls_5fkey_5fmat_5fout_257',['CK_WTLS_KEY_MAT_OUT',['../a02032.html',1,'']]], - ['ck_5fwtls_5fkey_5fmat_5fparams_258',['CK_WTLS_KEY_MAT_PARAMS',['../a02036.html',1,'']]], - ['ck_5fwtls_5fmaster_5fkey_5fderive_5fparams_259',['CK_WTLS_MASTER_KEY_DERIVE_PARAMS',['../a02024.html',1,'']]], - ['ck_5fwtls_5fprf_5fparams_260',['CK_WTLS_PRF_PARAMS',['../a02028.html',1,'']]], - ['ck_5fwtls_5frandom_5fdata_261',['CK_WTLS_RANDOM_DATA',['../a02020.html',1,'']]], - ['ck_5fx9_5f42_5fdh1_5fderive_5fparams_262',['CK_X9_42_DH1_DERIVE_PARAMS',['../a01940.html',1,'']]], - ['ck_5fx9_5f42_5fdh2_5fderive_5fparams_263',['CK_X9_42_DH2_DERIVE_PARAMS',['../a01944.html',1,'']]], - ['ck_5fx9_5f42_5fmqv_5fderive_5fparams_264',['CK_X9_42_MQV_DERIVE_PARAMS',['../a01948.html',1,'']]], - ['cl_5fhashcontext_265',['CL_HashContext',['../a01640.html',1,'']]], - ['class_5fid_266',['class_id',['../a01852.html#a41cd002dd69540506c5894ace65d323f',1,'pkcs11_object_s']]], - ['class_5ftype_267',['class_type',['../a01852.html#af1269e61c8cec31c2e85aa6c3bb4873a',1,'pkcs11_object_s']]], - ['client_5fchal_268',['client_chal',['../a01752.html#ac4f5b60a59fa29d78c720c2be434c5c3',1,'atca_check_mac_in_out']]], - ['client_5fresp_269',['client_resp',['../a01752.html#a4daaa0bccc92503ccc31eaed78eb7409',1,'atca_check_mac_in_out']]], - ['cmd_5fstatus_5fbyte_5fcomm_270',['CMD_STATUS_BYTE_COMM',['../a00350.html#a6a6daf9c5640ad80e7af330daad1f6ea',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fecc_271',['CMD_STATUS_BYTE_ECC',['../a00350.html#a44cee4dee17a7c1a2618d11e8e5774dd',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fexec_272',['CMD_STATUS_BYTE_EXEC',['../a00350.html#ae496c798891069e04802bbac7d96e0f5',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fparse_273',['CMD_STATUS_BYTE_PARSE',['../a00350.html#aef76930f6d419fc30841be04fe6ac8d6',1,'calib_command.h']]], - ['cmd_5fstatus_5fsuccess_274',['CMD_STATUS_SUCCESS',['../a00350.html#a85c326c023bdc268c499eb33375f2270',1,'calib_command.h']]], - ['cmd_5fstatus_5fwakeup_275',['CMD_STATUS_WAKEUP',['../a00350.html#afd20c2250b83786f216a100bde94a670',1,'calib_command.h']]], - ['communicationerror_276',['CommunicationError',['../a02396.html',1,'cryptoauthlib::exceptions']]], - ['comp_5fcert_277',['comp_cert',['../a01608.html#ae6ce8bf9e7b8172f5971f7c6516a79f0',1,'atcacert_build_state_s']]], - ['comp_5fcert_5fdev_5floc_278',['comp_cert_dev_loc',['../a01604.html#a56f1328d6aec74cd0eb92a30182065b1',1,'atcacert_def_s']]], - ['config_5fpath_279',['config_path',['../a01840.html#a8974dbe03027c73d7bed3159421c05f7',1,'pkcs11_lib_ctx_s']]], - ['configuration_20_28cfg_5f_29_280',['Configuration (cfg_)',['../a01440.html',1,'']]], - ['configzonelockederror_281',['ConfigZoneLockedError',['../a02316.html',1,'cryptoauthlib::exceptions']]], - ['contribution_20guidelines_282',['Contribution Guidelines',['../a02831.html',1,'']]], - ['count_283',['count',['../a01592.html#a24329906c1970b0510479835d52b70b5',1,'atcacert_device_loc_s::count()'],['../a01596.html#a2cf939ba243a6dc7c8da9a74040b83f3',1,'atcacert_cert_loc_s::count()'],['../a01852.html#ad28895cf4063a1d3eaa03a343ae7105b',1,'pkcs11_object_s::count()']]], - ['counter_284',['counter',['../a01728.html#adb6743838ca7d8bd3ad390b7608492ba',1,'atca_gen_dig_in_out']]], - ['counter204_285',['Counter204',['../a02264.html',1,'cryptoauthlib::device']]], - ['counter_5fkeyid_5fidx_286',['COUNTER_KEYID_IDX',['../a00350.html#a269bd52a7856116ebce13c1072f56d9e',1,'calib_command.h']]], - ['counter_5fmax_5fvalue_287',['COUNTER_MAX_VALUE',['../a00350.html#abc722de99f444668d09e3815fcc78400',1,'calib_command.h']]], - ['counter_5fmax_5fvalue_5fca2_288',['COUNTER_MAX_VALUE_CA2',['../a00350.html#a94608e9994efbb6869e15bf1076c9899',1,'calib_command.h']]], - ['counter_5fmode_5fidx_289',['COUNTER_MODE_IDX',['../a00350.html#a83a00fa1769c54aeb5ad02bdfba5b3e7',1,'calib_command.h']]], - ['counter_5fmode_5fincrement_290',['COUNTER_MODE_INCREMENT',['../a00350.html#aadb200c87d6dedb5768eeb8395e697c2',1,'calib_command.h']]], - ['counter_5fmode_5fmask_291',['COUNTER_MODE_MASK',['../a00350.html#a7b90ca417a76facaeec91d8f2c10f860',1,'calib_command.h']]], - ['counter_5fmode_5fread_292',['COUNTER_MODE_READ',['../a00350.html#a4e3355c5ab7c48cfe466c9374ccc698e',1,'calib_command.h']]], - ['counter_5frsp_5fsize_293',['COUNTER_RSP_SIZE',['../a00350.html#a66287a8b6f625f866b5cecc4845993ed',1,'calib_command.h']]], - ['counter_5fsize_294',['COUNTER_SIZE',['../a00350.html#a2addec53a2494a40b9101b78426dad2f',1,'calib_command.h']]], - ['countmatch_295',['CountMatch',['../a02252.html',1,'cryptoauthlib::device']]], - ['crcerror_296',['CrcError',['../a02336.html',1,'cryptoauthlib::exceptions']]], - ['crypto_20directory_20_2d_20purpose_297',['crypto directory - Purpose',['../a01445.html',1,'']]], - ['crypto_5fdata_298',['crypto_data',['../a01447.html#ga3d18f12db79908a5a1e831367391aa1c',1,'atca_decrypt_in_out']]], - ['crypto_5fhw_5fconfig_5fcheck_2eh_299',['crypto_hw_config_check.h',['../a00488.html',1,'']]], - ['crypto_5fsw_5fconfig_5fcheck_2eh_300',['crypto_sw_config_check.h',['../a00491.html',1,'']]], - ['cryptoauthcommandbuildext_301',['CryptoAuthCommandBuildExt',['../a02524.html',1,'setup']]], - ['cryptoauthcommandinstall_302',['CryptoAuthCommandInstall',['../a02528.html',1,'setup']]], - ['cryptoauthlib_303',['cryptoauthlib',['../a01451.html',1,'']]], - ['cryptoauthlib_20_2d_20microchip_20cryptoauthentication_20library_304',['CryptoAuthLib - Microchip CryptoAuthentication Library',['../index.html',1,'']]], - ['cryptoauthlib_2eh_305',['cryptoauthlib.h',['../a00506.html',1,'']]], - ['cryptoerror_306',['CryptoError',['../a02308.html',1,'cryptoauthlib::exceptions']]], - ['ctx_5fcb_307',['ctx_cb',['../a01441.html#gada27ffa70c78964d3b38abd11c5f4f22',1,'atca_device.h']]], - ['ctypes_5fto_5fbytes_308',['ctypes_to_bytes',['../a01459.html#acafa34b913dba87fe1768f8e18cfd135',1,'cryptoauthlib::library']]], - ['curve_5ftype_309',['curve_type',['../a01447.html#gadf3470738c60dbe57b33fb1e6005f40e',1,'atca_verify_in_out']]], - ['device_310',['device',['../a01456.html',1,'cryptoauthlib']]], - ['exceptions_311',['exceptions',['../a01457.html',1,'cryptoauthlib']]], - ['iface_312',['iface',['../a01458.html',1,'cryptoauthlib']]], - ['library_313',['library',['../a01459.html',1,'cryptoauthlib']]], - ['sha206_5fapi_314',['sha206_api',['../a01460.html',1,'cryptoauthlib']]], - ['status_315',['status',['../a01461.html',1,'cryptoauthlib']]], - ['tng_316',['tng',['../a01462.html',1,'cryptoauthlib']]] + ['atcab_0',['atcab',['../a01479.html',1,'cryptoauthlib']]], + ['atcacert_1',['atcacert',['../a01480.html',1,'cryptoauthlib']]], + ['atcaenum_2',['atcaenum',['../a01481.html',1,'cryptoauthlib']]], + ['atjwt_3',['atjwt',['../a01482.html',1,'cryptoauthlib']]], + ['c_5fcancelfunction_4',['C_CancelFunction',['../a01477.html#gac545b1d8eeb82e40f7519cdfc5a3427c',1,'pkcs11_main.c']]], + ['c_5fcloseallsessions_5',['C_CloseAllSessions',['../a01477.html#gad2ab78c409dfcbc155d673550cb71736',1,'pkcs11_main.c']]], + ['c_5fclosesession_6',['C_CloseSession',['../a01477.html#gae2ce0be368072fa83e0b1f5136b7b753',1,'pkcs11_main.c']]], + ['c_5fcopyobject_7',['C_CopyObject',['../a01477.html#ga301f7118a227ffedd7f945a9532fc18a',1,'pkcs11_main.c']]], + ['c_5fcreateobject_8',['C_CreateObject',['../a01477.html#ga01b36384bff05a4dc4476c0764cdc248',1,'pkcs11_main.c']]], + ['c_5fdecrypt_9',['C_Decrypt',['../a01477.html#gad7a0c95a7b810c5534185632b8b58d29',1,'pkcs11_main.c']]], + ['c_5fdecryptdigestupdate_10',['C_DecryptDigestUpdate',['../a01477.html#ga128ba07226b7e45772830f06dfde4b71',1,'pkcs11_main.c']]], + ['c_5fdecryptfinal_11',['C_DecryptFinal',['../a01477.html#gab549c4d540cff530f9e4d9bca36e2253',1,'pkcs11_main.c']]], + ['c_5fdecryptinit_12',['C_DecryptInit',['../a01477.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5',1,'pkcs11_main.c']]], + ['c_5fdecryptupdate_13',['C_DecryptUpdate',['../a01477.html#gaa4fb93ab28bedada72364e925b3dacbf',1,'pkcs11_main.c']]], + ['c_5fdecryptverifyupdate_14',['C_DecryptVerifyUpdate',['../a01477.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c',1,'pkcs11_main.c']]], + ['c_5fderivekey_15',['C_DeriveKey',['../a01477.html#ga67ecc1ce8ca0630aebdf3a29e129f531',1,'pkcs11_main.c']]], + ['c_5fdestroyobject_16',['C_DestroyObject',['../a01477.html#ga1b991b6fd8b20f130f9d87b98e590fdb',1,'pkcs11_main.c']]], + ['c_5fdigest_17',['C_Digest',['../a01477.html#gadfc9281add668a5aff9bbc1253655917',1,'pkcs11_main.c']]], + ['c_5fdigestencryptupdate_18',['C_DigestEncryptUpdate',['../a01477.html#ga3f8a5f0509ef9929f90536b6e255e485',1,'pkcs11_main.c']]], + ['c_5fdigestfinal_19',['C_DigestFinal',['../a01477.html#ga1f3dc3758726bb4737db956e4cd71e91',1,'pkcs11_main.c']]], + ['c_5fdigestinit_20',['C_DigestInit',['../a01477.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403',1,'pkcs11_main.c']]], + ['c_5fdigestkey_21',['C_DigestKey',['../a01477.html#ga21a9c4115bc535490416e2850a2a45fd',1,'pkcs11_main.c']]], + ['c_5fdigestupdate_22',['C_DigestUpdate',['../a01477.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6',1,'pkcs11_main.c']]], + ['c_5fencrypt_23',['C_Encrypt',['../a01477.html#gaf9aab1c3fcf352af53b0e66652fac39d',1,'pkcs11_main.c']]], + ['c_5fencryptfinal_24',['C_EncryptFinal',['../a01477.html#gab4a336f9cb4920a9ff8585aec5d90a3f',1,'pkcs11_main.c']]], + ['c_5fencryptinit_25',['C_EncryptInit',['../a01477.html#ga23a9b2dc15a447decd10881dde448890',1,'pkcs11_main.c']]], + ['c_5fencryptupdate_26',['C_EncryptUpdate',['../a01477.html#ga5e13fc136e0b7f79d22a6b735424a815',1,'pkcs11_main.c']]], + ['c_5ffinalize_27',['C_Finalize',['../a01477.html#ga945318df98e940ab331931023133ed3d',1,'pkcs11_main.c']]], + ['c_5ffindobjects_28',['C_FindObjects',['../a01477.html#ga42635cbaa2ba78482ae053bea477246a',1,'pkcs11_main.c']]], + ['c_5ffindobjectsfinal_29',['C_FindObjectsFinal',['../a01477.html#ga46347f830269bfbcbece15951f0c0fa4',1,'pkcs11_main.c']]], + ['c_5ffindobjectsinit_30',['C_FindObjectsInit',['../a01477.html#gaf4d4d071deb07e7dcfa489a2a835756d',1,'pkcs11_main.c']]], + ['c_5fgeneratekey_31',['C_GenerateKey',['../a01477.html#ga84673050f913404ec3ae164d4f7a1d9c',1,'pkcs11_main.c']]], + ['c_5fgeneratekeypair_32',['C_GenerateKeyPair',['../a01477.html#ga802a061224966a5523beb1ea0a9d9c27',1,'pkcs11_main.c']]], + ['c_5fgeneraterandom_33',['C_GenerateRandom',['../a01477.html#ga54a883eb1608be800f7fbd204665d50d',1,'pkcs11_main.c']]], + ['c_5fgetattributevalue_34',['C_GetAttributeValue',['../a01477.html#gaaad61dc7b2313286bdd049676ef0fd70',1,'pkcs11_main.c']]], + ['c_5fgetfunctionlist_35',['C_GetFunctionList',['../a01477.html#gab4cf13775c4e92b36156ee92dd52bef5',1,'pkcs11_main.c']]], + ['c_5fgetfunctionstatus_36',['C_GetFunctionStatus',['../a01477.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0',1,'pkcs11_main.c']]], + ['c_5fgetinfo_37',['C_GetInfo',['../a01477.html#ga75bdc5d475cd205914b8227c7f08df4c',1,'pkcs11_main.c']]], + ['c_5fgetmechanisminfo_38',['C_GetMechanismInfo',['../a01477.html#gabe5aeb6b794d4ca28cb2534fe0a4a159',1,'pkcs11_main.c']]], + ['c_5fgetmechanismlist_39',['C_GetMechanismList',['../a01477.html#gac80659e1b954f9514723fd6d4429dfb6',1,'pkcs11_main.c']]], + ['c_5fgetobjectsize_40',['C_GetObjectSize',['../a01477.html#gadd117013f515b1d441889a24a605bd93',1,'pkcs11_main.c']]], + ['c_5fgetoperationstate_41',['C_GetOperationState',['../a01477.html#ga95dcfc50be7ac2cb3ebf58d958f70dde',1,'pkcs11_main.c']]], + ['c_5fgetsessioninfo_42',['C_GetSessionInfo',['../a01477.html#gaffb75a4d4ba623ee01f31877b56b018e',1,'pkcs11_main.c']]], + ['c_5fgetslotinfo_43',['C_GetSlotInfo',['../a01477.html#gae795a3fd0467a249eeb075f94bfa0adc',1,'pkcs11_main.c']]], + ['c_5fgetslotlist_44',['C_GetSlotList',['../a01477.html#gac6ce96c3f4a3b7f24d9420763df121fc',1,'pkcs11_main.c']]], + ['c_5fgettokeninfo_45',['C_GetTokenInfo',['../a01477.html#gac933291718eb6aa218db1c677e07ab02',1,'pkcs11_main.c']]], + ['c_5finitialize_46',['C_Initialize',['../a01477.html#ga2e45ad4ce8c84712c646dddaa99544e3',1,'pkcs11_main.c']]], + ['c_5finitpin_47',['C_InitPIN',['../a01477.html#ga2b726534eedac635b28ccd501c242004',1,'pkcs11_main.c']]], + ['c_5finittoken_48',['C_InitToken',['../a01477.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb',1,'pkcs11_main.c']]], + ['c_5flogin_49',['C_Login',['../a01477.html#gaca7aa4ae8d9592f464dc1b545fead02e',1,'pkcs11_main.c']]], + ['c_5flogout_50',['C_Logout',['../a01477.html#gab7a0a4ff33f2450736d76d453045ad6f',1,'pkcs11_main.c']]], + ['c_5fopensession_51',['C_OpenSession',['../a01477.html#gad28ad989a94c345875dff446ad6c6481',1,'pkcs11_main.c']]], + ['c_5fseedrandom_52',['C_SeedRandom',['../a01477.html#gab26093f478636b5ba04176c2f81f44c4',1,'pkcs11_main.c']]], + ['c_5fsetattributevalue_53',['C_SetAttributeValue',['../a01477.html#ga752412c887c0d900c05b771709ebac83',1,'pkcs11_main.c']]], + ['c_5fsetoperationstate_54',['C_SetOperationState',['../a01477.html#ga66e6598e8f5db01e428a46d58b9865fc',1,'pkcs11_main.c']]], + ['c_5fsetpin_55',['C_SetPIN',['../a01477.html#ga386826845e06a84b36522a2bf49ff6c6',1,'pkcs11_main.c']]], + ['c_5fsign_56',['C_Sign',['../a01477.html#ga5f587605d68a7a56012ac337ddaec5e1',1,'pkcs11_main.c']]], + ['c_5fsignencryptupdate_57',['C_SignEncryptUpdate',['../a01477.html#gaf63ca32aef7a90f87e94a288de5e82cc',1,'pkcs11_main.c']]], + ['c_5fsignfinal_58',['C_SignFinal',['../a01477.html#ga2171c591535849faf017fa126e3a9a48',1,'pkcs11_main.c']]], + ['c_5fsigninit_59',['C_SignInit',['../a01477.html#ga37d93326915dc9b74f2476238f35037c',1,'pkcs11_main.c']]], + ['c_5fsignrecover_60',['C_SignRecover',['../a01477.html#ga210f4bdbaae1bc2b8e242e1610da4f0f',1,'pkcs11_main.c']]], + ['c_5fsignrecoverinit_61',['C_SignRecoverInit',['../a01477.html#ga97ee219718545f49ee651cbb00712b8c',1,'pkcs11_main.c']]], + ['c_5fsignupdate_62',['C_SignUpdate',['../a01477.html#gada0dd5a3d8ae781df05ea016d2f76d16',1,'pkcs11_main.c']]], + ['c_5funwrapkey_63',['C_UnwrapKey',['../a01477.html#gafd4a7d6e142179e46453af11d5da3e91',1,'pkcs11_main.c']]], + ['c_5fverify_64',['C_Verify',['../a01477.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529',1,'pkcs11_main.c']]], + ['c_5fverifyfinal_65',['C_VerifyFinal',['../a01477.html#gaf6ecd512fa21851f0bcbc25b90c2b444',1,'pkcs11_main.c']]], + ['c_5fverifyinit_66',['C_VerifyInit',['../a01477.html#gaeae51e6092fa8c8a58e022fcd8366c45',1,'pkcs11_main.c']]], + ['c_5fverifyrecover_67',['C_VerifyRecover',['../a01477.html#ga82355d41e5303e31cc49df003e9d8c38',1,'pkcs11_main.c']]], + ['c_5fverifyrecoverinit_68',['C_VerifyRecoverInit',['../a01477.html#gaefe33200a70026c7e622b01473d78b66',1,'pkcs11_main.c']]], + ['c_5fverifyupdate_69',['C_VerifyUpdate',['../a01477.html#gaba9414cf3fc679beaae1baa5425a6e01',1,'pkcs11_main.c']]], + ['c_5fwaitforslotevent_70',['C_WaitForSlotEvent',['../a01477.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6',1,'pkcs11_main.c']]], + ['c_5fwrapkey_71',['C_WrapKey',['../a01477.html#gaf47613fd93688da939cf4c6998f83d77',1,'pkcs11_main.c']]], + ['ca_5fcert_5fdef_72',['ca_cert_def',['../a01627.html#ae6dc350fb1a599dd6585c41e34a1e0e8',1,'atcacert_def_s']]], + ['cal_5fbuf_5finit_5fconst_5fptr_73',['cal_buf_init_const_ptr',['../a00326.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c'],['../a00329.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c']]], + ['cal_5fbuf_5fread_5fbytes_74',['cal_buf_read_bytes',['../a00326.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c'],['../a00329.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c']]], + ['cal_5fbuf_5fread_5fnumber_75',['cal_buf_read_number',['../a00326.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00329.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c']]], + ['cal_5fbuf_5fwrite_5fbytes_76',['cal_buf_write_bytes',['../a00326.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c'],['../a00329.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c']]], + ['cal_5fbuf_5fwrite_5fnumber_77',['cal_buf_write_number',['../a00326.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00329.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c']]], + ['cal_5fbuffer_2ec_78',['cal_buffer.c',['../a00326.html',1,'']]], + ['cal_5fbuffer_2eh_79',['cal_buffer.h',['../a00329.html',1,'']]], + ['cal_5fbuffer_5fs_80',['cal_buffer_s',['../a01635.html',1,'']]], + ['cal_5finternal_2eh_81',['cal_internal.h',['../a00332.html',1,'']]], + ['calib_20directory_20_2d_20purpose_82',['calib directory - Purpose',['../a01471.html',1,'']]], + ['calib_5faes_2ec_83',['calib_aes.c',['../a00335.html',1,'']]], + ['calib_5faes_5fgcm_2ec_84',['calib_aes_gcm.c',['../a00338.html',1,'']]], + ['calib_5faes_5fgcm_2eh_85',['calib_aes_gcm.h',['../a00341.html',1,'']]], + ['calib_5fbasic_2ec_86',['calib_basic.c',['../a00344.html',1,'']]], + ['calib_5fca2_5fget_5faddr_87',['calib_ca2_get_addr',['../a01471.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01471.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], + ['calib_5fca2_5fis_5fconfig_5flocked_88',['calib_ca2_is_config_locked',['../a01471.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01471.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], + ['calib_5fca2_5fis_5fdata_5flocked_89',['calib_ca2_is_data_locked',['../a01471.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01471.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], + ['calib_5fca2_5fis_5flocked_90',['calib_ca2_is_locked',['../a01471.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c'],['../a01471.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c']]], + ['calib_5fcheckmac_2ec_91',['calib_checkmac.c',['../a00350.html',1,'']]], + ['calib_5fcommand_2ec_92',['calib_command.c',['../a00353.html',1,'']]], + ['calib_5fcommand_2eh_93',['calib_command.h',['../a00356.html',1,'']]], + ['calib_5fconfig_5fcheck_2eh_94',['calib_config_check.h',['../a00359.html',1,'']]], + ['calib_5fcounter_2ec_95',['calib_counter.c',['../a00362.html',1,'']]], + ['calib_5fdelete_2ec_96',['calib_delete.c',['../a00365.html',1,'']]], + ['calib_5fderivekey_2ec_97',['calib_derivekey.c',['../a00368.html',1,'']]], + ['calib_5fdevice_2eh_98',['calib_device.h',['../a00371.html',1,'']]], + ['calib_5fecdh_2ec_99',['calib_ecdh.c',['../a00374.html',1,'']]], + ['calib_5fexecute_5fcommand_100',['calib_execute_command',['../a00377.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c'],['../a00380.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c']]], + ['calib_5fexecution_2ec_101',['calib_execution.c',['../a00377.html',1,'']]], + ['calib_5fexecution_2eh_102',['calib_execution.h',['../a00380.html',1,'']]], + ['calib_5fexit_103',['calib_exit',['../a01471.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c'],['../a01471.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c']]], + ['calib_5fgendig_2ec_104',['calib_gendig.c',['../a00383.html',1,'']]], + ['calib_5fgenkey_2ec_105',['calib_genkey.c',['../a00386.html',1,'']]], + ['calib_5fget_5faddr_106',['calib_get_addr',['../a01471.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01471.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], + ['calib_5fget_5fdevicetype_107',['calib_get_devicetype',['../a01471.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c'],['../a01471.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c']]], + ['calib_5fget_5fexecution_5ftime_108',['calib_get_execution_time',['../a00377.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c'],['../a00380.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c']]], + ['calib_5fget_5fzone_5fsize_109',['calib_get_zone_size',['../a01471.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c'],['../a01471.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c']]], + ['calib_5fhelpers_2ec_110',['calib_helpers.c',['../a00389.html',1,'']]], + ['calib_5fhmac_2ec_111',['calib_hmac.c',['../a00392.html',1,'']]], + ['calib_5fidle_112',['calib_idle',['../a01471.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c'],['../a01471.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c']]], + ['calib_5finfo_113',['calib_info',['../a01471.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c'],['../a01471.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c']]], + ['calib_5finfo_2ec_114',['calib_info.c',['../a00395.html',1,'']]], + ['calib_5finfo_5fbase_115',['calib_info_base',['../a01471.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c'],['../a01471.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c']]], + ['calib_5finfo_5fchip_5fstatus_116',['calib_info_chip_status',['../a01471.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c'],['../a01471.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c']]], + ['calib_5finfo_5flatch_5fen_117',['CALIB_INFO_LATCH_EN',['../a00359.html#af19794adbeec8b57eb7cbef1f9e21c91',1,'calib_config_check.h']]], + ['calib_5finfo_5flock_5fstatus_118',['calib_info_lock_status',['../a01471.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c'],['../a01471.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c']]], + ['calib_5finfo_5fprivkey_5fvalid_119',['calib_info_privkey_valid',['../a01471.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c'],['../a01471.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c']]], + ['calib_5fkdf_2ec_120',['calib_kdf.c',['../a00398.html',1,'']]], + ['calib_5flock_2ec_121',['calib_lock.c',['../a00401.html',1,'']]], + ['calib_5flock_5fca2_5fen_122',['CALIB_LOCK_CA2_EN',['../a00359.html#a611611e20ca91cad7e9897847b9b355a',1,'calib_config_check.h']]], + ['calib_5flock_5fen_123',['CALIB_LOCK_EN',['../a00359.html#a3801cb49b78666a9cfa602fa74b22da9',1,'calib_config_check.h']]], + ['calib_5fmac_2ec_124',['calib_mac.c',['../a00404.html',1,'']]], + ['calib_5fnonce_2ec_125',['calib_nonce.c',['../a00407.html',1,'']]], + ['calib_5fpacket_2ec_126',['calib_packet.c',['../a00410.html',1,'']]], + ['calib_5fpacket_2eh_127',['calib_packet.h',['../a00413.html',1,'']]], + ['calib_5fprivwrite_2ec_128',['calib_privwrite.c',['../a00416.html',1,'']]], + ['calib_5frandom_2ec_129',['calib_random.c',['../a00419.html',1,'']]], + ['calib_5fread_2ec_130',['calib_read.c',['../a00422.html',1,'']]], + ['calib_5fread_5fen_131',['CALIB_READ_EN',['../a00359.html#a67ed014df4e1bbbea873ede0e9700e29',1,'calib_config_check.h']]], + ['calib_5fsecureboot_2ec_132',['calib_secureboot.c',['../a00425.html',1,'']]], + ['calib_5fselftest_2ec_133',['calib_selftest.c',['../a00428.html',1,'']]], + ['calib_5fsha_2ec_134',['calib_sha.c',['../a00431.html',1,'']]], + ['calib_5fsha_5fcontext_5fen_135',['CALIB_SHA_CONTEXT_EN',['../a00359.html#a84c51bc36228a8fadd8654bfaae5d58c',1,'calib_config_check.h']]], + ['calib_5fsha_5fen_136',['CALIB_SHA_EN',['../a00359.html#a467882792e9ea53b4e596d1be05997a6',1,'calib_config_check.h']]], + ['calib_5fsha_5fhmac_5fen_137',['CALIB_SHA_HMAC_EN',['../a00359.html#ab13bbafe02599813084788482536728f',1,'calib_config_check.h']]], + ['calib_5fsign_2ec_138',['calib_sign.c',['../a00434.html',1,'']]], + ['calib_5fsign_5fca2_5fen_139',['CALIB_SIGN_CA2_EN',['../a00359.html#ac629bf5f0b5d6c64c5393cadd7b7479c',1,'calib_config_check.h']]], + ['calib_5fsign_5fen_140',['CALIB_SIGN_EN',['../a00359.html#a9802710200f050b0e9414bd88cdd8c0d',1,'calib_config_check.h']]], + ['calib_5fsleep_141',['calib_sleep',['../a01471.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c'],['../a01471.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c']]], + ['calib_5fswi_5fflag_5fcmd_142',['CALIB_SWI_FLAG_CMD',['../a00380.html#ac7946c257bcbaf0e1589e960b83d23df',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5fidle_143',['CALIB_SWI_FLAG_IDLE',['../a00380.html#a525ae62bb76a8ba01d4d85264f832c8e',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5fsleep_144',['CALIB_SWI_FLAG_SLEEP',['../a00380.html#a8dd3e14e93cec4aea30e27104935d51b',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5ftx_145',['CALIB_SWI_FLAG_TX',['../a00380.html#a1c46cc5ed5e30945d62e9ea369c94cdb',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5fwake_146',['CALIB_SWI_FLAG_WAKE',['../a00380.html#a55c5fe347b23c42f6359e97ae82b4729',1,'calib_execution.h']]], + ['calib_5fupdateextra_2ec_147',['calib_updateextra.c',['../a00437.html',1,'']]], + ['calib_5fupdateextra_5fen_148',['CALIB_UPDATEEXTRA_EN',['../a00359.html#ab46a8196f24bde7c86ac5e3affdc8ff8',1,'calib_config_check.h']]], + ['calib_5fverify_2ec_149',['calib_verify.c',['../a00440.html',1,'']]], + ['calib_5fverify_5fen_150',['CALIB_VERIFY_EN',['../a00359.html#a671b3421327a5c885b0c3e6e1e64afe7',1,'calib_config_check.h']]], + ['calib_5fverify_5fmac_5fen_151',['CALIB_VERIFY_MAC_EN',['../a00359.html#ac419953cd10efa4bef6e4efdc9c6cbe9',1,'calib_config_check.h']]], + ['calib_5fverify_5fstored_5fen_152',['CALIB_VERIFY_STORED_EN',['../a00359.html#ae841eeabdfbe04dd3241f6fde1a57954',1,'calib_config_check.h']]], + ['calib_5fwakeup_153',['calib_wakeup',['../a01471.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c'],['../a01471.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c']]], + ['calib_5fwakeup_5fi2c_154',['calib_wakeup_i2c',['../a01471.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c'],['../a01471.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c']]], + ['calib_5fwrite_2ec_155',['calib_write.c',['../a00443.html',1,'']]], + ['calib_5fwrite_5fenc_5fen_156',['CALIB_WRITE_ENC_EN',['../a00359.html#a64cbcf66a79f024ae3cce06d1f6731f9',1,'calib_config_check.h']]], + ['cert_157',['cert',['../a01631.html#a850a129376d4a3dd4c9994d04a9edca7',1,'atcacert_build_state_s']]], + ['cert_5fdef_158',['cert_def',['../a01631.html#a5b6c72f114573cb07932b4c0e089150e',1,'atcacert_build_state_s']]], + ['cert_5floc_159',['cert_loc',['../a01623.html#a6a6584538d9ba2e8304e2c103d4501a5',1,'atcacert_cert_element_s']]], + ['cert_5fsize_160',['cert_size',['../a01631.html#af8600eedc4cac772aff7257ffcd4a1c0',1,'atcacert_build_state_s']]], + ['certificate_20manipulation_20methods_20_28atcacert_5f_29_161',['Certificate manipulation methods (atcacert_)',['../a01470.html',1,'']]], + ['certstatus_162',['CertStatus',['../a02235.html',1,'cryptoauthlib::atcacert']]], + ['certtype_5fcustom_163',['CERTTYPE_CUSTOM',['../a01470.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb',1,'atcacert_def.h']]], + ['certtype_5fx509_164',['CERTTYPE_X509',['../a01470.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44',1,'atcacert_def.h']]], + ['certtype_5fx509_5ffull_5fstored_165',['CERTTYPE_X509_FULL_STORED',['../a01470.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9',1,'atcacert_def.h']]], + ['cfg_5fateccx08a_5fi2c_5fdefault_166',['cfg_ateccx08a_i2c_default',['../a01485.html#afe3491a94655b07c2608d3451e59d606',1,'cryptoauthlib::iface']]], + ['cfg_5fateccx08a_5fkithid_5fdefault_167',['cfg_ateccx08a_kithid_default',['../a01485.html#a88737f422c86c2246a698fd64d59db1a',1,'cryptoauthlib::iface']]], + ['cfg_5fateccx08a_5fswi_5fdefault_168',['cfg_ateccx08a_swi_default',['../a01485.html#a64fa8e408c7c7abc0999d5b74825e69d',1,'cryptoauthlib::iface']]], + ['cfg_5fatsha20xa_5fi2c_5fdefault_169',['cfg_atsha20xa_i2c_default',['../a01485.html#acc3d4402aa912d4f90e3298a7e8de20c',1,'cryptoauthlib::iface']]], + ['cfg_5fatsha20xa_5fkithid_5fdefault_170',['cfg_atsha20xa_kithid_default',['../a01485.html#a1b929d7e15620e9c352c3cf1e75e2a22',1,'cryptoauthlib::iface']]], + ['cfg_5fatsha20xa_5fswi_5fdefault_171',['cfg_atsha20xa_swi_default',['../a01485.html#a4638d28e57304b76ce9f50077e6b3b47',1,'cryptoauthlib::iface']]], + ['challenge_172',['challenge',['../a01474.html#gac4c2db1a307043c7677e76310911d944',1,'atca_mac_in_out']]], + ['change_5fi2c_5fspeed_173',['change_i2c_speed',['../a01473.html#gadc420e4b166a1b339d1a2687e0f12cb1',1,'hal_i2c_harmony.c']]], + ['check_5frationality_174',['check_rationality',['../a02551.html#a2cd77c54cfde31fcc4fb97ad15223f30',1,'cryptoauthlib.library.AtcaStructure.check_rationality()'],['../a02547.html#a1f9f23cc775d8b3e461bbfc192134c27',1,'cryptoauthlib.library.AtcaUnion.check_rationality()']]], + ['check_5fstatus_175',['check_status',['../a01488.html#a79e412f95dfbdb782c011ac214270aa3',1,'cryptoauthlib::status']]], + ['checkmac_5fclient_5fchallenge_5fidx_176',['CHECKMAC_CLIENT_CHALLENGE_IDX',['../a00356.html#a0f2c0b2e264a88b766811fe4ea0de88f',1,'calib_command.h']]], + ['checkmac_5fclient_5fchallenge_5fsize_177',['CHECKMAC_CLIENT_CHALLENGE_SIZE',['../a00356.html#a3c7444c099cf0f89f754fd3cbec77bf4',1,'calib_command.h']]], + ['checkmac_5fclient_5fcommand_5fsize_178',['CHECKMAC_CLIENT_COMMAND_SIZE',['../a00356.html#ad3d431e17094b6690d443e0a038da9e2',1,'calib_command.h']]], + ['checkmac_5fclient_5fresponse_5fidx_179',['CHECKMAC_CLIENT_RESPONSE_IDX',['../a00356.html#a170c911bfe1a20e3572bdc5c2cd80c9d',1,'calib_command.h']]], + ['checkmac_5fclient_5fresponse_5fsize_180',['CHECKMAC_CLIENT_RESPONSE_SIZE',['../a00356.html#a93cb0fdfc89b69cb1c4670f30288f2ad',1,'calib_command.h']]], + ['checkmac_5fcmd_5fmatch_181',['CHECKMAC_CMD_MATCH',['../a00356.html#a09b26b691e29966bcec1513edf819efe',1,'calib_command.h']]], + ['checkmac_5fcmd_5fmismatch_182',['CHECKMAC_CMD_MISMATCH',['../a00356.html#a1db673cb318ec36ebd0c9c1a5ce301ad',1,'calib_command.h']]], + ['checkmac_5fcount_183',['CHECKMAC_COUNT',['../a00356.html#a4c998ee3d596f3006a4488bd8657df33',1,'calib_command.h']]], + ['checkmac_5fdata_5fidx_184',['CHECKMAC_DATA_IDX',['../a00356.html#a1ba2ec2d321b3f90f53c02c7fb9711f2',1,'calib_command.h']]], + ['checkmac_5fkeyid_5fidx_185',['CHECKMAC_KEYID_IDX',['../a00356.html#a4203bbb296cd67d035066979657cf979',1,'calib_command.h']]], + ['checkmac_5fmode_5fblock1_5ftempkey_186',['CHECKMAC_MODE_BLOCK1_TEMPKEY',['../a00356.html#a9088fc1b89c3ca9b58901de000d8d55d',1,'calib_command.h']]], + ['checkmac_5fmode_5fblock2_5ftempkey_187',['CHECKMAC_MODE_BLOCK2_TEMPKEY',['../a00356.html#a40d926e0e037fc8bb265bb19f57e5d1a',1,'calib_command.h']]], + ['checkmac_5fmode_5fchallenge_188',['CHECKMAC_MODE_CHALLENGE',['../a00356.html#aaabcd1e4afb29088a17f7e87e7136e24',1,'calib_command.h']]], + ['checkmac_5fmode_5fidx_189',['CHECKMAC_MODE_IDX',['../a00356.html#ae757542e1c4d4815e1dc8db034dca476',1,'calib_command.h']]], + ['checkmac_5fmode_5finclude_5fotp_5f64_190',['CHECKMAC_MODE_INCLUDE_OTP_64',['../a00356.html#abeef4ff866116f4e17a6c3ad94b0a286',1,'calib_command.h']]], + ['checkmac_5fmode_5fmask_191',['CHECKMAC_MODE_MASK',['../a00356.html#a67e74cb132024711cf064ff98021d71f',1,'calib_command.h']]], + ['checkmac_5fmode_5foutput_5fmac_5fresponse_192',['CHECKMAC_MODE_OUTPUT_MAC_RESPONSE',['../a00356.html#a411d35690c62060ac4c39588741a808e',1,'calib_command.h']]], + ['checkmac_5fmode_5fsource_5fflag_5fmatch_193',['CHECKMAC_MODE_SOURCE_FLAG_MATCH',['../a00356.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad',1,'calib_command.h']]], + ['checkmac_5fother_5fdata_5fsize_194',['CHECKMAC_OTHER_DATA_SIZE',['../a00356.html#a7c365741639a5c7dc29267a130e8d827',1,'calib_command.h']]], + ['checkmac_5frsp_5fsize_195',['CHECKMAC_RSP_SIZE',['../a00356.html#aa44ecaa440ab845d5939333171476adf',1,'calib_command.h']]], + ['checkmacverifyfailederror_196',['CheckmacVerifyFailedError',['../a02363.html',1,'cryptoauthlib::exceptions']]], + ['chipmode508_197',['ChipMode508',['../a02291.html',1,'cryptoauthlib::device']]], + ['chipmode608_198',['ChipMode608',['../a02295.html',1,'cryptoauthlib::device']]], + ['chipoptions_199',['ChipOptions',['../a02319.html',1,'cryptoauthlib::device']]], + ['ck_5faes_5fcbc_5fencrypt_5fdata_5fparams_200',['CK_AES_CBC_ENCRYPT_DATA_PARAMS',['../a02015.html',1,'']]], + ['ck_5faes_5fccm_5fparams_201',['CK_AES_CCM_PARAMS',['../a02123.html',1,'']]], + ['ck_5faes_5fctr_5fparams_202',['CK_AES_CTR_PARAMS',['../a02107.html',1,'']]], + ['ck_5faes_5fgcm_5fparams_203',['CK_AES_GCM_PARAMS',['../a02119.html',1,'']]], + ['ck_5faria_5fcbc_5fencrypt_5fdata_5fparams_204',['CK_ARIA_CBC_ENCRYPT_DATA_PARAMS',['../a02135.html',1,'']]], + ['ck_5fattribute_205',['CK_ATTRIBUTE',['../a01935.html',1,'']]], + ['ck_5fc_5finitialize_5fargs_206',['CK_C_INITIALIZE_ARGS',['../a01951.html',1,'']]], + ['ck_5fcamellia_5fcbc_5fencrypt_5fdata_5fparams_207',['CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS',['../a02131.html',1,'']]], + ['ck_5fcamellia_5fctr_5fparams_208',['CK_CAMELLIA_CTR_PARAMS',['../a02127.html',1,'']]], + ['ck_5fccm_5fparams_209',['CK_CCM_PARAMS',['../a02115.html',1,'']]], + ['ck_5fcms_5fsig_5fparams_210',['CK_CMS_SIG_PARAMS',['../a02075.html',1,'']]], + ['ck_5fdate_211',['CK_DATE',['../a01939.html',1,'']]], + ['ck_5fdes_5fcbc_5fencrypt_5fdata_5fparams_212',['CK_DES_CBC_ENCRYPT_DATA_PARAMS',['../a02011.html',1,'']]], + ['ck_5fdsa_5fparameter_5fgen_5fparam_213',['CK_DSA_PARAMETER_GEN_PARAM',['../a02139.html',1,'']]], + ['ck_5fecdh1_5fderive_5fparams_214',['CK_ECDH1_DERIVE_PARAMS',['../a01963.html',1,'']]], + ['ck_5fecdh2_5fderive_5fparams_215',['CK_ECDH2_DERIVE_PARAMS',['../a01967.html',1,'']]], + ['ck_5fecdh_5faes_5fkey_5fwrap_5fparams_216',['CK_ECDH_AES_KEY_WRAP_PARAMS',['../a02143.html',1,'']]], + ['ck_5fecmqv_5fderive_5fparams_217',['CK_ECMQV_DERIVE_PARAMS',['../a01971.html',1,'']]], + ['ck_5ffunction_5flist_218',['CK_FUNCTION_LIST',['../a01843.html',1,'']]], + ['ck_5fgcm_5fparams_219',['CK_GCM_PARAMS',['../a02111.html',1,'']]], + ['ck_5fgostr3410_5fderive_5fparams_220',['CK_GOSTR3410_DERIVE_PARAMS',['../a02167.html',1,'']]], + ['ck_5fgostr3410_5fkey_5fwrap_5fparams_221',['CK_GOSTR3410_KEY_WRAP_PARAMS',['../a02171.html',1,'']]], + ['ck_5finfo_222',['CK_INFO',['../a01919.html',1,'']]], + ['ck_5fkea_5fderive_5fparams_223',['CK_KEA_DERIVE_PARAMS',['../a01987.html',1,'']]], + ['ck_5fkey_5fderivation_5fstring_5fdata_224',['CK_KEY_DERIVATION_STRING_DATA',['../a02079.html',1,'']]], + ['ck_5fkey_5fwrap_5fset_5foaep_5fparams_225',['CK_KEY_WRAP_SET_OAEP_PARAMS',['../a02031.html',1,'']]], + ['ck_5fkip_5fparams_226',['CK_KIP_PARAMS',['../a02103.html',1,'']]], + ['ck_5fmechanism_227',['CK_MECHANISM',['../a01943.html',1,'']]], + ['ck_5fmechanism_5finfo_228',['CK_MECHANISM_INFO',['../a01947.html',1,'']]], + ['ck_5fotp_5fparam_229',['CK_OTP_PARAM',['../a02091.html',1,'']]], + ['ck_5fotp_5fparams_230',['CK_OTP_PARAMS',['../a02095.html',1,'']]], + ['ck_5fotp_5fsignature_5finfo_231',['CK_OTP_SIGNATURE_INFO',['../a02099.html',1,'']]], + ['ck_5fpbe_5fparams_232',['CK_PBE_PARAMS',['../a02027.html',1,'']]], + ['ck_5fpkcs5_5fpbkd2_5fparams_233',['CK_PKCS5_PBKD2_PARAMS',['../a02083.html',1,'']]], + ['ck_5fpkcs5_5fpbkd2_5fparams2_234',['CK_PKCS5_PBKD2_PARAMS2',['../a02087.html',1,'']]], + ['ck_5frc2_5fcbc_5fparams_235',['CK_RC2_CBC_PARAMS',['../a01991.html',1,'']]], + ['ck_5frc2_5fmac_5fgeneral_5fparams_236',['CK_RC2_MAC_GENERAL_PARAMS',['../a01995.html',1,'']]], + ['ck_5frc5_5fcbc_5fparams_237',['CK_RC5_CBC_PARAMS',['../a02003.html',1,'']]], + ['ck_5frc5_5fmac_5fgeneral_5fparams_238',['CK_RC5_MAC_GENERAL_PARAMS',['../a02007.html',1,'']]], + ['ck_5frc5_5fparams_239',['CK_RC5_PARAMS',['../a01999.html',1,'']]], + ['ck_5frsa_5faes_5fkey_5fwrap_5fparams_240',['CK_RSA_AES_KEY_WRAP_PARAMS',['../a02147.html',1,'']]], + ['ck_5frsa_5fpkcs_5foaep_5fparams_241',['CK_RSA_PKCS_OAEP_PARAMS',['../a01955.html',1,'']]], + ['ck_5frsa_5fpkcs_5fpss_5fparams_242',['CK_RSA_PKCS_PSS_PARAMS',['../a01959.html',1,'']]], + ['ck_5fseed_5fcbc_5fencrypt_5fdata_5fparams_243',['CK_SEED_CBC_ENCRYPT_DATA_PARAMS',['../a02175.html',1,'']]], + ['ck_5fsession_5finfo_244',['CK_SESSION_INFO',['../a01931.html',1,'']]], + ['ck_5fskipjack_5fprivate_5fwrap_5fparams_245',['CK_SKIPJACK_PRIVATE_WRAP_PARAMS',['../a02019.html',1,'']]], + ['ck_5fskipjack_5frelayx_5fparams_246',['CK_SKIPJACK_RELAYX_PARAMS',['../a02023.html',1,'']]], + ['ck_5fslot_5finfo_247',['CK_SLOT_INFO',['../a01923.html',1,'']]], + ['ck_5fssl3_5fkey_5fmat_5fout_248',['CK_SSL3_KEY_MAT_OUT',['../a02043.html',1,'']]], + ['ck_5fssl3_5fkey_5fmat_5fparams_249',['CK_SSL3_KEY_MAT_PARAMS',['../a02047.html',1,'']]], + ['ck_5fssl3_5fmaster_5fkey_5fderive_5fparams_250',['CK_SSL3_MASTER_KEY_DERIVE_PARAMS',['../a02039.html',1,'']]], + ['ck_5fssl3_5frandom_5fdata_251',['CK_SSL3_RANDOM_DATA',['../a02035.html',1,'']]], + ['ck_5ftls12_5fkey_5fmat_5fparams_252',['CK_TLS12_KEY_MAT_PARAMS',['../a02155.html',1,'']]], + ['ck_5ftls12_5fmaster_5fkey_5fderive_5fparams_253',['CK_TLS12_MASTER_KEY_DERIVE_PARAMS',['../a02151.html',1,'']]], + ['ck_5ftls_5fkdf_5fparams_254',['CK_TLS_KDF_PARAMS',['../a02159.html',1,'']]], + ['ck_5ftls_5fmac_5fparams_255',['CK_TLS_MAC_PARAMS',['../a02163.html',1,'']]], + ['ck_5ftls_5fprf_5fparams_256',['CK_TLS_PRF_PARAMS',['../a02051.html',1,'']]], + ['ck_5ftoken_5finfo_257',['CK_TOKEN_INFO',['../a01927.html',1,'']]], + ['ck_5fversion_258',['CK_VERSION',['../a01915.html',1,'']]], + ['ck_5fwtls_5fkey_5fmat_5fout_259',['CK_WTLS_KEY_MAT_OUT',['../a02067.html',1,'']]], + ['ck_5fwtls_5fkey_5fmat_5fparams_260',['CK_WTLS_KEY_MAT_PARAMS',['../a02071.html',1,'']]], + ['ck_5fwtls_5fmaster_5fkey_5fderive_5fparams_261',['CK_WTLS_MASTER_KEY_DERIVE_PARAMS',['../a02059.html',1,'']]], + ['ck_5fwtls_5fprf_5fparams_262',['CK_WTLS_PRF_PARAMS',['../a02063.html',1,'']]], + ['ck_5fwtls_5frandom_5fdata_263',['CK_WTLS_RANDOM_DATA',['../a02055.html',1,'']]], + ['ck_5fx9_5f42_5fdh1_5fderive_5fparams_264',['CK_X9_42_DH1_DERIVE_PARAMS',['../a01975.html',1,'']]], + ['ck_5fx9_5f42_5fdh2_5fderive_5fparams_265',['CK_X9_42_DH2_DERIVE_PARAMS',['../a01979.html',1,'']]], + ['ck_5fx9_5f42_5fmqv_5fderive_5fparams_266',['CK_X9_42_MQV_DERIVE_PARAMS',['../a01983.html',1,'']]], + ['cl_5fhashcontext_267',['CL_HashContext',['../a01663.html',1,'']]], + ['class_5fid_268',['class_id',['../a01887.html#a41cd002dd69540506c5894ace65d323f',1,'pkcs11_object_s']]], + ['class_5ftype_269',['class_type',['../a01887.html#af1269e61c8cec31c2e85aa6c3bb4873a',1,'pkcs11_object_s']]], + ['client_5fchal_270',['client_chal',['../a01771.html#ac4f5b60a59fa29d78c720c2be434c5c3',1,'atca_check_mac_in_out']]], + ['client_5fresp_271',['client_resp',['../a01771.html#a4daaa0bccc92503ccc31eaed78eb7409',1,'atca_check_mac_in_out']]], + ['cmd_5fstatus_5fbyte_5fcomm_272',['CMD_STATUS_BYTE_COMM',['../a00356.html#a6a6daf9c5640ad80e7af330daad1f6ea',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fecc_273',['CMD_STATUS_BYTE_ECC',['../a00356.html#a44cee4dee17a7c1a2618d11e8e5774dd',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fexec_274',['CMD_STATUS_BYTE_EXEC',['../a00356.html#ae496c798891069e04802bbac7d96e0f5',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fparse_275',['CMD_STATUS_BYTE_PARSE',['../a00356.html#aef76930f6d419fc30841be04fe6ac8d6',1,'calib_command.h']]], + ['cmd_5fstatus_5fsuccess_276',['CMD_STATUS_SUCCESS',['../a00356.html#a85c326c023bdc268c499eb33375f2270',1,'calib_command.h']]], + ['cmd_5fstatus_5fwakeup_277',['CMD_STATUS_WAKEUP',['../a00356.html#afd20c2250b83786f216a100bde94a670',1,'calib_command.h']]], + ['communicationerror_278',['CommunicationError',['../a02431.html',1,'cryptoauthlib::exceptions']]], + ['comp_5fcert_279',['comp_cert',['../a01631.html#ae6ce8bf9e7b8172f5971f7c6516a79f0',1,'atcacert_build_state_s']]], + ['comp_5fcert_5fdev_5floc_280',['comp_cert_dev_loc',['../a01627.html#a56f1328d6aec74cd0eb92a30182065b1',1,'atcacert_def_s']]], + ['config_5fpath_281',['config_path',['../a01867.html#a8974dbe03027c73d7bed3159421c05f7',1,'pkcs11_lib_ctx_s']]], + ['configuration_20_28cfg_5f_29_282',['Configuration (cfg_)',['../a01467.html',1,'']]], + ['configzonelockederror_283',['ConfigZoneLockedError',['../a02351.html',1,'cryptoauthlib::exceptions']]], + ['contribution_20guidelines_284',['Contribution Guidelines',['../a02866.html',1,'']]], + ['count_285',['count',['../a01615.html#a24329906c1970b0510479835d52b70b5',1,'atcacert_device_loc_s::count()'],['../a01619.html#a2cf939ba243a6dc7c8da9a74040b83f3',1,'atcacert_cert_loc_s::count()'],['../a01887.html#ad28895cf4063a1d3eaa03a343ae7105b',1,'pkcs11_object_s::count()']]], + ['counter_286',['counter',['../a01747.html#adb6743838ca7d8bd3ad390b7608492ba',1,'atca_gen_dig_in_out']]], + ['counter204_287',['Counter204',['../a02299.html',1,'cryptoauthlib::device']]], + ['counter_5fkeyid_5fidx_288',['COUNTER_KEYID_IDX',['../a00356.html#a269bd52a7856116ebce13c1072f56d9e',1,'calib_command.h']]], + ['counter_5fmax_5fvalue_289',['COUNTER_MAX_VALUE',['../a00356.html#abc722de99f444668d09e3815fcc78400',1,'calib_command.h']]], + ['counter_5fmax_5fvalue_5fca2_290',['COUNTER_MAX_VALUE_CA2',['../a00356.html#a94608e9994efbb6869e15bf1076c9899',1,'calib_command.h']]], + ['counter_5fmode_5fidx_291',['COUNTER_MODE_IDX',['../a00356.html#a83a00fa1769c54aeb5ad02bdfba5b3e7',1,'calib_command.h']]], + ['counter_5fmode_5fincrement_292',['COUNTER_MODE_INCREMENT',['../a00356.html#aadb200c87d6dedb5768eeb8395e697c2',1,'calib_command.h']]], + ['counter_5fmode_5fmask_293',['COUNTER_MODE_MASK',['../a00356.html#a7b90ca417a76facaeec91d8f2c10f860',1,'calib_command.h']]], + ['counter_5fmode_5fread_294',['COUNTER_MODE_READ',['../a00356.html#a4e3355c5ab7c48cfe466c9374ccc698e',1,'calib_command.h']]], + ['counter_5frsp_5fsize_295',['COUNTER_RSP_SIZE',['../a00356.html#a66287a8b6f625f866b5cecc4845993ed',1,'calib_command.h']]], + ['counter_5fsize_296',['COUNTER_SIZE',['../a00356.html#a2addec53a2494a40b9101b78426dad2f',1,'calib_command.h']]], + ['countmatch_297',['CountMatch',['../a02287.html',1,'cryptoauthlib::device']]], + ['crcerror_298',['CrcError',['../a02371.html',1,'cryptoauthlib::exceptions']]], + ['crypto_20directory_20_2d_20purpose_299',['crypto directory - Purpose',['../a01472.html',1,'']]], + ['crypto_5fdata_300',['crypto_data',['../a01474.html#ga3d18f12db79908a5a1e831367391aa1c',1,'atca_decrypt_in_out']]], + ['crypto_5fhw_5fconfig_5fcheck_2eh_301',['crypto_hw_config_check.h',['../a00503.html',1,'']]], + ['crypto_5fsw_5fconfig_5fcheck_2eh_302',['crypto_sw_config_check.h',['../a00506.html',1,'']]], + ['cryptoauthcommandbuildext_303',['CryptoAuthCommandBuildExt',['../a02559.html',1,'setup']]], + ['cryptoauthcommandinstall_304',['CryptoAuthCommandInstall',['../a02563.html',1,'setup']]], + ['cryptoauthlib_305',['cryptoauthlib',['../a01478.html',1,'']]], + ['cryptoauthlib_20_2d_20microchip_20cryptoauthentication_20library_306',['CryptoAuthLib - Microchip CryptoAuthentication Library',['../index.html',1,'']]], + ['cryptoauthlib_2eh_307',['cryptoauthlib.h',['../a00521.html',1,'']]], + ['cryptoerror_308',['CryptoError',['../a02343.html',1,'cryptoauthlib::exceptions']]], + ['ctx_5fcb_309',['ctx_cb',['../a01468.html#gada27ffa70c78964d3b38abd11c5f4f22',1,'atca_device.h']]], + ['ctypes_5fto_5fbytes_310',['ctypes_to_bytes',['../a01486.html#acafa34b913dba87fe1768f8e18cfd135',1,'cryptoauthlib::library']]], + ['curve_5ftype_311',['curve_type',['../a01474.html#gadf3470738c60dbe57b33fb1e6005f40e',1,'atca_verify_in_out']]], + ['device_312',['device',['../a01483.html',1,'cryptoauthlib']]], + ['exceptions_313',['exceptions',['../a01484.html',1,'cryptoauthlib']]], + ['iface_314',['iface',['../a01485.html',1,'cryptoauthlib']]], + ['library_315',['library',['../a01486.html',1,'cryptoauthlib']]], + ['sha206_5fapi_316',['sha206_api',['../a01487.html',1,'cryptoauthlib']]], + ['status_317',['status',['../a01488.html',1,'cryptoauthlib']]], + ['tng_318',['tng',['../a01489.html',1,'cryptoauthlib']]] ]; diff --git a/search/all_4.js b/search/all_4.js index b46a67960..67e013b6c 100644 --- a/search/all_4.js +++ b/search/all_4.js @@ -1,39 +1,39 @@ var searchData= [ - ['data_0',['data',['../a01704.html#ab910eb48d182d8f191da149339fd6c51',1,'atca_io_decrypt_in_out']]], - ['data_5fsize_1',['data_size',['../a01704.html#a1d7f86d28ad089ae4401043c117be844',1,'atca_io_decrypt_in_out']]], - ['datazonelockederror_2',['DataZoneLockedError',['../a02320.html',1,'cryptoauthlib::exceptions']]], - ['datefmt_5fiso8601_5fsep_3',['DATEFMT_ISO8601_SEP',['../a01443.html#ga6e58a9d673118d8075bb4cb4c85ec0cb',1,'atcacert_date.h']]], - ['datefmt_5fposix_5fuint32_5fbe_4',['DATEFMT_POSIX_UINT32_BE',['../a01443.html#ga35593316a537ec58d4a214243be9c862',1,'atcacert_date.h']]], - ['datefmt_5fposix_5fuint32_5fle_5',['DATEFMT_POSIX_UINT32_LE',['../a01443.html#gad97a813a37feaac6770f66846ad4bf27',1,'atcacert_date.h']]], - ['datefmt_5frfc5280_5fgen_6',['DATEFMT_RFC5280_GEN',['../a01443.html#ga9b2731e0538062863fdd2816e60787b6',1,'atcacert_date.h']]], - ['datefmt_5frfc5280_5futc_7',['DATEFMT_RFC5280_UTC',['../a01443.html#ga0043de3aea86035e05798afc16d516d0',1,'atcacert_date.h']]], - ['deleteatcadevice_8',['deleteATCADevice',['../a01441.html#gac087cf04cd5bd6ff2e026d89bfbf5e12',1,'atca_device.c']]], - ['deleteatcaiface_9',['deleteATCAIface',['../a01442.html#gaf8074d759241d3edd6d8ead1d7322a98',1,'atca_iface.c']]], - ['deprecated_20list_10',['Deprecated List',['../a01436.html',1,'']]], - ['derive_5fkey_5fcount_5flarge_11',['DERIVE_KEY_COUNT_LARGE',['../a00350.html#ac0386500d37b5502158a62b8d864580f',1,'calib_command.h']]], - ['derive_5fkey_5fcount_5fsmall_12',['DERIVE_KEY_COUNT_SMALL',['../a00350.html#a3a3d3289c719d81f95b3d025a2564c9f',1,'calib_command.h']]], - ['derive_5fkey_5fmac_5fidx_13',['DERIVE_KEY_MAC_IDX',['../a00350.html#ac3f89b5db216fd58ae2de3ebd52e26c5',1,'calib_command.h']]], - ['derive_5fkey_5fmac_5fsize_14',['DERIVE_KEY_MAC_SIZE',['../a00350.html#affa79c933fa76585479228b15c2cbc83',1,'calib_command.h']]], - ['derive_5fkey_5fmode_15',['DERIVE_KEY_MODE',['../a00350.html#ac6d810ee00947694d9b95d95db0b2f3c',1,'calib_command.h']]], - ['derive_5fkey_5frandom_5fflag_16',['DERIVE_KEY_RANDOM_FLAG',['../a00350.html#ad6f89d1bb03ed8d84e230bedca57ddd9',1,'calib_command.h']]], - ['derive_5fkey_5frandom_5fidx_17',['DERIVE_KEY_RANDOM_IDX',['../a00350.html#a3495c2fd81985342858bac47300bcdc8',1,'calib_command.h']]], - ['derive_5fkey_5frsp_5fsize_18',['DERIVE_KEY_RSP_SIZE',['../a00350.html#a766a94a7e38b558e1165b24de78d21db',1,'calib_command.h']]], - ['derive_5fkey_5ftargetkey_5fidx_19',['DERIVE_KEY_TARGETKEY_IDX',['../a00350.html#a7216bb6f51f67f09e5372c7f731bf23a',1,'calib_command.h']]], - ['dev_5flock_20',['dev_lock',['../a01836.html#ab3f47ede65a8383c94edb8ac013cb08c',1,'pkcs11_dev_state']]], - ['dev_5flock_5fenabled_21',['dev_lock_enabled',['../a01840.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e',1,'pkcs11_lib_ctx_s']]], - ['dev_5fstate_22',['dev_state',['../a01840.html#abb83e7378cec1b712fab5974bc82a156',1,'pkcs11_lib_ctx_s']]], - ['device_5fexecution_5ftime_5ft_23',['device_execution_time_t',['../a01636.html',1,'']]], - ['device_5floc_24',['device_loc',['../a01600.html#aaac07ecbeef8734077fec8ea17a7e015',1,'atcacert_cert_element_s']]], - ['device_5fsn_25',['device_sn',['../a01608.html#a4530a3779248463eb6b77176ee656e68',1,'atcacert_build_state_s']]], - ['device_5fstate_26',['device_state',['../a01508.html#a6ce22e245944629826d4869f69babf81',1,'atca_device']]], - ['devtype_27',['devtype',['../a01608.html#af6d0fd1d866c96c7a9e4bc5425baa094',1,'atcacert_build_state_s']]], - ['devtype_5fnames_5ft_28',['devtype_names_t',['../a01512.html',1,'']]], - ['devzone_5fconfig_29',['DEVZONE_CONFIG',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207',1,'atcacert_def.h']]], - ['devzone_5fdata_30',['DEVZONE_DATA',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb',1,'atcacert_def.h']]], - ['devzone_5fgenkey_31',['DEVZONE_GENKEY',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c',1,'atcacert_def.h']]], - ['devzone_5fnone_32',['DEVZONE_NONE',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05',1,'atcacert_def.h']]], - ['devzone_5fotp_33',['DEVZONE_OTP',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea',1,'atcacert_def.h']]], - ['digest_34',['digest',['../a01768.html#a1765e3454849c67fa19a307f724cb8e3',1,'atca_sign_internal_in_out::digest()'],['../a01716.html#ad3a988f3c029fff3805a8a9dd4caaaa5',1,'atca_secureboot_mac_in_out::digest()'],['../a01712.html#a1da30fd41605f42e0b0dd68d75c59bd9',1,'atca_secureboot_enc_in_out::digest()']]], - ['digest_5fenc_35',['digest_enc',['../a01712.html#aac21cf3b5207c0dc25358d6360953380',1,'atca_secureboot_enc_in_out']]] + ['data_0',['data',['../a01723.html#ab910eb48d182d8f191da149339fd6c51',1,'atca_io_decrypt_in_out']]], + ['data_5fsize_1',['data_size',['../a01723.html#a1d7f86d28ad089ae4401043c117be844',1,'atca_io_decrypt_in_out']]], + ['datazonelockederror_2',['DataZoneLockedError',['../a02355.html',1,'cryptoauthlib::exceptions']]], + ['datefmt_5fiso8601_5fsep_3',['DATEFMT_ISO8601_SEP',['../a01470.html#ga6e58a9d673118d8075bb4cb4c85ec0cb',1,'atcacert_date.h']]], + ['datefmt_5fposix_5fuint32_5fbe_4',['DATEFMT_POSIX_UINT32_BE',['../a01470.html#ga35593316a537ec58d4a214243be9c862',1,'atcacert_date.h']]], + ['datefmt_5fposix_5fuint32_5fle_5',['DATEFMT_POSIX_UINT32_LE',['../a01470.html#gad97a813a37feaac6770f66846ad4bf27',1,'atcacert_date.h']]], + ['datefmt_5frfc5280_5fgen_6',['DATEFMT_RFC5280_GEN',['../a01470.html#ga9b2731e0538062863fdd2816e60787b6',1,'atcacert_date.h']]], + ['datefmt_5frfc5280_5futc_7',['DATEFMT_RFC5280_UTC',['../a01470.html#ga0043de3aea86035e05798afc16d516d0',1,'atcacert_date.h']]], + ['deleteatcadevice_8',['deleteATCADevice',['../a01468.html#gac087cf04cd5bd6ff2e026d89bfbf5e12',1,'atca_device.c']]], + ['deleteatcaiface_9',['deleteATCAIface',['../a01469.html#gaf8074d759241d3edd6d8ead1d7322a98',1,'atca_iface.c']]], + ['deprecated_20list_10',['Deprecated List',['../a01463.html',1,'']]], + ['derive_5fkey_5fcount_5flarge_11',['DERIVE_KEY_COUNT_LARGE',['../a00356.html#ac0386500d37b5502158a62b8d864580f',1,'calib_command.h']]], + ['derive_5fkey_5fcount_5fsmall_12',['DERIVE_KEY_COUNT_SMALL',['../a00356.html#a3a3d3289c719d81f95b3d025a2564c9f',1,'calib_command.h']]], + ['derive_5fkey_5fmac_5fidx_13',['DERIVE_KEY_MAC_IDX',['../a00356.html#ac3f89b5db216fd58ae2de3ebd52e26c5',1,'calib_command.h']]], + ['derive_5fkey_5fmac_5fsize_14',['DERIVE_KEY_MAC_SIZE',['../a00356.html#affa79c933fa76585479228b15c2cbc83',1,'calib_command.h']]], + ['derive_5fkey_5fmode_15',['DERIVE_KEY_MODE',['../a00356.html#ac6d810ee00947694d9b95d95db0b2f3c',1,'calib_command.h']]], + ['derive_5fkey_5frandom_5fflag_16',['DERIVE_KEY_RANDOM_FLAG',['../a00356.html#ad6f89d1bb03ed8d84e230bedca57ddd9',1,'calib_command.h']]], + ['derive_5fkey_5frandom_5fidx_17',['DERIVE_KEY_RANDOM_IDX',['../a00356.html#a3495c2fd81985342858bac47300bcdc8',1,'calib_command.h']]], + ['derive_5fkey_5frsp_5fsize_18',['DERIVE_KEY_RSP_SIZE',['../a00356.html#a766a94a7e38b558e1165b24de78d21db',1,'calib_command.h']]], + ['derive_5fkey_5ftargetkey_5fidx_19',['DERIVE_KEY_TARGETKEY_IDX',['../a00356.html#a7216bb6f51f67f09e5372c7f731bf23a',1,'calib_command.h']]], + ['dev_5flock_20',['dev_lock',['../a01863.html#ab3f47ede65a8383c94edb8ac013cb08c',1,'pkcs11_dev_state']]], + ['dev_5flock_5fenabled_21',['dev_lock_enabled',['../a01867.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e',1,'pkcs11_lib_ctx_s']]], + ['dev_5fstate_22',['dev_state',['../a01867.html#abb83e7378cec1b712fab5974bc82a156',1,'pkcs11_lib_ctx_s']]], + ['device_5fexecution_5ftime_5ft_23',['device_execution_time_t',['../a01659.html',1,'']]], + ['device_5floc_24',['device_loc',['../a01623.html#aaac07ecbeef8734077fec8ea17a7e015',1,'atcacert_cert_element_s']]], + ['device_5fsn_25',['device_sn',['../a01631.html#a4530a3779248463eb6b77176ee656e68',1,'atcacert_build_state_s']]], + ['device_5fstate_26',['device_state',['../a01531.html#a6ce22e245944629826d4869f69babf81',1,'atca_device']]], + ['devtype_27',['devtype',['../a01631.html#af6d0fd1d866c96c7a9e4bc5425baa094',1,'atcacert_build_state_s']]], + ['devtype_5fnames_5ft_28',['devtype_names_t',['../a01535.html',1,'']]], + ['devzone_5fconfig_29',['DEVZONE_CONFIG',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207',1,'atcacert_def.h']]], + ['devzone_5fdata_30',['DEVZONE_DATA',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb',1,'atcacert_def.h']]], + ['devzone_5fgenkey_31',['DEVZONE_GENKEY',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c',1,'atcacert_def.h']]], + ['devzone_5fnone_32',['DEVZONE_NONE',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05',1,'atcacert_def.h']]], + ['devzone_5fotp_33',['DEVZONE_OTP',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea',1,'atcacert_def.h']]], + ['digest_34',['digest',['../a01787.html#a1765e3454849c67fa19a307f724cb8e3',1,'atca_sign_internal_in_out::digest()'],['../a01735.html#ad3a988f3c029fff3805a8a9dd4caaaa5',1,'atca_secureboot_mac_in_out::digest()'],['../a01731.html#a1da30fd41605f42e0b0dd68d75c59bd9',1,'atca_secureboot_enc_in_out::digest()']]], + ['digest_5fenc_35',['digest_enc',['../a01731.html#aac21cf3b5207c0dc25358d6360953380',1,'atca_secureboot_enc_in_out']]] ]; diff --git a/search/all_5.js b/search/all_5.js index 473ee68bd..b51fc7c5b 100644 --- a/search/all_5.js +++ b/search/all_5.js @@ -1,8 +1,8 @@ var searchData= [ - ['eccfaulterror_0',['EccFaultError',['../a02344.html',1,'cryptoauthlib::exceptions']]], - ['ecdh_5fkey_5fsize_1',['ECDH_KEY_SIZE',['../a00350.html#aa21e10945076d803129feb07946591f9',1,'calib_command.h']]], - ['ecdh_5frsp_5fsize_2',['ECDH_RSP_SIZE',['../a00350.html#aa667451bf2e061c3e76a7a8a5d8b86d4',1,'calib_command.h']]], - ['encrypted_5fdata_3',['encrypted_data',['../a01736.html#a38f7761577529e0bbf52cd0b8c17658b',1,'atca_write_mac_in_out']]], - ['executionerror_4',['ExecutionError',['../a02408.html',1,'cryptoauthlib::exceptions']]] + ['eccfaulterror_0',['EccFaultError',['../a02379.html',1,'cryptoauthlib::exceptions']]], + ['ecdh_5fkey_5fsize_1',['ECDH_KEY_SIZE',['../a00356.html#aa21e10945076d803129feb07946591f9',1,'calib_command.h']]], + ['ecdh_5frsp_5fsize_2',['ECDH_RSP_SIZE',['../a00356.html#aa667451bf2e061c3e76a7a8a5d8b86d4',1,'calib_command.h']]], + ['encrypted_5fdata_3',['encrypted_data',['../a01755.html#a38f7761577529e0bbf52cd0b8c17658b',1,'atca_write_mac_in_out']]], + ['executionerror_4',['ExecutionError',['../a02443.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/all_6.js b/search/all_6.js index 661f651bb..cb35fe25c 100644 --- a/search/all_6.js +++ b/search/all_6.js @@ -1,6 +1,6 @@ var searchData= [ - ['for_5finvalidate_0',['for_invalidate',['../a01768.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7',1,'atca_sign_internal_in_out']]], - ['from_5fdefinition_1',['from_definition',['../a02512.html#a3d679310ce9bf2878b4d01871e97c54e',1,'cryptoauthlib.library.AtcaUnion.from_definition()'],['../a02516.html#a7748c2f53682292dd1ea2cb03b8386f5',1,'cryptoauthlib.library.AtcaStructure.from_definition()']]], - ['functionerror_2',['FunctionError',['../a02348.html',1,'cryptoauthlib::exceptions']]] + ['for_5finvalidate_0',['for_invalidate',['../a01787.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7',1,'atca_sign_internal_in_out']]], + ['from_5fdefinition_1',['from_definition',['../a02547.html#a3d679310ce9bf2878b4d01871e97c54e',1,'cryptoauthlib.library.AtcaUnion.from_definition()'],['../a02551.html#a7748c2f53682292dd1ea2cb03b8386f5',1,'cryptoauthlib.library.AtcaStructure.from_definition()']]], + ['functionerror_2',['FunctionError',['../a02383.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/all_7.js b/search/all_7.js index 440145e50..6f60c85d1 100644 --- a/search/all_7.js +++ b/search/all_7.js @@ -1,41 +1,41 @@ var searchData= [ - ['gen_5fdig_5fdata_0',['gen_dig_data',['../a01692.html#afde9c1e6769f60992c7fb10280cdd199',1,'atca_temp_key']]], - ['gen_5fkey_5fdata_1',['gen_key_data',['../a01692.html#a82e1988542001c7499700f3e1b191339',1,'atca_temp_key']]], - ['gendig_5fcount_2',['GENDIG_COUNT',['../a00350.html#a235eb9557fa074bf152f9ce9c5844058',1,'calib_command.h']]], - ['gendig_5fdata_5fidx_3',['GENDIG_DATA_IDX',['../a00350.html#ac101f854026596231715eca664550e36',1,'calib_command.h']]], - ['gendig_5fkeyid_5fidx_4',['GENDIG_KEYID_IDX',['../a00350.html#ac2d5b5de26d0318ba6db3ad1055eb6ec',1,'calib_command.h']]], - ['gendig_5frsp_5fsize_5',['GENDIG_RSP_SIZE',['../a00350.html#a2c26247a084a027f06a2aaf692313f12',1,'calib_command.h']]], - ['gendig_5fuse_5ftempkey_5fbit_6',['GENDIG_USE_TEMPKEY_BIT',['../a00350.html#ab1be0c05faf7ef0c161f34cb6b0c4e28',1,'calib_command.h']]], - ['gendig_5fzone_5fconfig_7',['GENDIG_ZONE_CONFIG',['../a00350.html#a9cab0c5dd2e3796497a5237f101f19e0',1,'calib_command.h']]], - ['gendig_5fzone_5fcounter_8',['GENDIG_ZONE_COUNTER',['../a00350.html#a84f07835d69fed7484299c78f4971a3e',1,'calib_command.h']]], - ['gendig_5fzone_5fdata_9',['GENDIG_ZONE_DATA',['../a00350.html#abc21880360bdce990ad724fa7a7d9bf0',1,'calib_command.h']]], - ['gendig_5fzone_5fidx_10',['GENDIG_ZONE_IDX',['../a00350.html#ab79b57111a49362bd51922813cb84355',1,'calib_command.h']]], - ['gendig_5fzone_5fkey_5fconfig_11',['GENDIG_ZONE_KEY_CONFIG',['../a00350.html#aba61a1bd245d7471e59a39577498065b',1,'calib_command.h']]], - ['gendig_5fzone_5fotp_12',['GENDIG_ZONE_OTP',['../a00350.html#aee95b219cf932dfedb3a3c5e23d01a9d',1,'calib_command.h']]], - ['gendig_5fzone_5fshared_5fnonce_13',['GENDIG_ZONE_SHARED_NONCE',['../a00350.html#a49923a8835f64294a5e9b3660c80dc7e',1,'calib_command.h']]], - ['genericerror_14',['GenericError',['../a02352.html',1,'cryptoauthlib::exceptions']]], - ['genkey_5fcount_15',['GENKEY_COUNT',['../a00350.html#ab6782a07fce203169aba6dd32f8ab123',1,'calib_command.h']]], - ['genkey_5fcount_5fdata_16',['GENKEY_COUNT_DATA',['../a00350.html#a07289de41178ecfb6392da31e31e27c3',1,'calib_command.h']]], - ['genkey_5fdata_5fidx_17',['GENKEY_DATA_IDX',['../a00350.html#a9163acda5dd0653f40b6ad445f2c972d',1,'calib_command.h']]], - ['genkey_5fkeyid_5fidx_18',['GENKEY_KEYID_IDX',['../a00350.html#a5cacc01be37cebf35e300be96893477e',1,'calib_command.h']]], - ['genkey_5fmode_5fdigest_19',['GENKEY_MODE_DIGEST',['../a00350.html#a609531b6e844f5a9eebd7c4dcd869b16',1,'calib_command.h']]], - ['genkey_5fmode_5fidx_20',['GENKEY_MODE_IDX',['../a00350.html#af120353f5e8e159eaa9c930555b159d5',1,'calib_command.h']]], - ['genkey_5fmode_5fmac_21',['GENKEY_MODE_MAC',['../a00350.html#ae7b4dae38c2b38b25e43dc7ff4959764',1,'calib_command.h']]], - ['genkey_5fmode_5fmask_22',['GENKEY_MODE_MASK',['../a00350.html#aa3984c137090a2d103b2089c7ac31642',1,'calib_command.h']]], - ['genkey_5fmode_5fprivate_23',['GENKEY_MODE_PRIVATE',['../a00350.html#adc25fc4bebaac1582bb57d791f72356d',1,'calib_command.h']]], - ['genkey_5fmode_5fpubkey_5fdigest_24',['GENKEY_MODE_PUBKEY_DIGEST',['../a00350.html#a8d9a1e331d54bffb36f7b4e97af5d161',1,'calib_command.h']]], - ['genkey_5fmode_5fpublic_25',['GENKEY_MODE_PUBLIC',['../a00350.html#a03e556ba7849f28ee8c58df8921cba66',1,'calib_command.h']]], - ['genkey_5fother_5fdata_5fsize_26',['GENKEY_OTHER_DATA_SIZE',['../a00350.html#a62644ffb962c56fbea154526a2a84b40',1,'calib_command.h']]], - ['genkey_5fprivate_5fto_5ftempkey_27',['GENKEY_PRIVATE_TO_TEMPKEY',['../a00350.html#ad5b1ead29f3ce3cee52d106af531ab86',1,'calib_command.h']]], - ['genkey_5frsp_5fsize_5flong_28',['GENKEY_RSP_SIZE_LONG',['../a00350.html#a08e8a80be2717ece7c5ed5cc0a27fbab',1,'calib_command.h']]], - ['genkey_5frsp_5fsize_5fshort_29',['GENKEY_RSP_SIZE_SHORT',['../a00350.html#a0543a644422ffc7460eeeb78799bde16',1,'calib_command.h']]], - ['get_5fcryptoauthlib_30',['get_cryptoauthlib',['../a01459.html#a851038e6c6158127d7ecbd1e6580081b',1,'cryptoauthlib::library']]], - ['get_5fctype_5farray_5finstance_31',['get_ctype_array_instance',['../a01459.html#a2748ff60b5f1512fbf9f228e4c86598a',1,'cryptoauthlib::library']]], - ['get_5fctype_5fby_5fname_32',['get_ctype_by_name',['../a01459.html#a5cc6d0583a5f0554e61e3886c5bf1785',1,'cryptoauthlib::library']]], - ['get_5fctype_5fstructure_5finstance_33',['get_ctype_structure_instance',['../a01459.html#a30811985170f0083009bbd5439d1bcc2',1,'cryptoauthlib::library']]], - ['get_5fdevice_5fname_34',['get_device_name',['../a01459.html#a2da0648c5d2cb3a8da467b8dfac16e8c',1,'cryptoauthlib::library']]], - ['get_5fdevice_5fname_5fwith_5fdevice_5fid_35',['get_device_name_with_device_id',['../a01459.html#ac4f25f606f7c968b08b874dc8d75ca50',1,'cryptoauthlib::library']]], - ['get_5fdevice_5ftype_5fid_36',['get_device_type_id',['../a01459.html#adaf39153cd62515d9750fdb0748dbacc',1,'cryptoauthlib::library']]], - ['get_5fsize_5fby_5fname_37',['get_size_by_name',['../a01459.html#a7c6a46d9327a395ac4909411d937b193',1,'cryptoauthlib::library']]] + ['gen_5fdig_5fdata_0',['gen_dig_data',['../a01711.html#afde9c1e6769f60992c7fb10280cdd199',1,'atca_temp_key']]], + ['gen_5fkey_5fdata_1',['gen_key_data',['../a01711.html#a82e1988542001c7499700f3e1b191339',1,'atca_temp_key']]], + ['gendig_5fcount_2',['GENDIG_COUNT',['../a00356.html#a235eb9557fa074bf152f9ce9c5844058',1,'calib_command.h']]], + ['gendig_5fdata_5fidx_3',['GENDIG_DATA_IDX',['../a00356.html#ac101f854026596231715eca664550e36',1,'calib_command.h']]], + ['gendig_5fkeyid_5fidx_4',['GENDIG_KEYID_IDX',['../a00356.html#ac2d5b5de26d0318ba6db3ad1055eb6ec',1,'calib_command.h']]], + ['gendig_5frsp_5fsize_5',['GENDIG_RSP_SIZE',['../a00356.html#a2c26247a084a027f06a2aaf692313f12',1,'calib_command.h']]], + ['gendig_5fuse_5ftempkey_5fbit_6',['GENDIG_USE_TEMPKEY_BIT',['../a00356.html#ab1be0c05faf7ef0c161f34cb6b0c4e28',1,'calib_command.h']]], + ['gendig_5fzone_5fconfig_7',['GENDIG_ZONE_CONFIG',['../a00356.html#a9cab0c5dd2e3796497a5237f101f19e0',1,'calib_command.h']]], + ['gendig_5fzone_5fcounter_8',['GENDIG_ZONE_COUNTER',['../a00356.html#a84f07835d69fed7484299c78f4971a3e',1,'calib_command.h']]], + ['gendig_5fzone_5fdata_9',['GENDIG_ZONE_DATA',['../a00356.html#abc21880360bdce990ad724fa7a7d9bf0',1,'calib_command.h']]], + ['gendig_5fzone_5fidx_10',['GENDIG_ZONE_IDX',['../a00356.html#ab79b57111a49362bd51922813cb84355',1,'calib_command.h']]], + ['gendig_5fzone_5fkey_5fconfig_11',['GENDIG_ZONE_KEY_CONFIG',['../a00356.html#aba61a1bd245d7471e59a39577498065b',1,'calib_command.h']]], + ['gendig_5fzone_5fotp_12',['GENDIG_ZONE_OTP',['../a00356.html#aee95b219cf932dfedb3a3c5e23d01a9d',1,'calib_command.h']]], + ['gendig_5fzone_5fshared_5fnonce_13',['GENDIG_ZONE_SHARED_NONCE',['../a00356.html#a49923a8835f64294a5e9b3660c80dc7e',1,'calib_command.h']]], + ['genericerror_14',['GenericError',['../a02387.html',1,'cryptoauthlib::exceptions']]], + ['genkey_5fcount_15',['GENKEY_COUNT',['../a00356.html#ab6782a07fce203169aba6dd32f8ab123',1,'calib_command.h']]], + ['genkey_5fcount_5fdata_16',['GENKEY_COUNT_DATA',['../a00356.html#a07289de41178ecfb6392da31e31e27c3',1,'calib_command.h']]], + ['genkey_5fdata_5fidx_17',['GENKEY_DATA_IDX',['../a00356.html#a9163acda5dd0653f40b6ad445f2c972d',1,'calib_command.h']]], + ['genkey_5fkeyid_5fidx_18',['GENKEY_KEYID_IDX',['../a00356.html#a5cacc01be37cebf35e300be96893477e',1,'calib_command.h']]], + ['genkey_5fmode_5fdigest_19',['GENKEY_MODE_DIGEST',['../a00356.html#a609531b6e844f5a9eebd7c4dcd869b16',1,'calib_command.h']]], + ['genkey_5fmode_5fidx_20',['GENKEY_MODE_IDX',['../a00356.html#af120353f5e8e159eaa9c930555b159d5',1,'calib_command.h']]], + ['genkey_5fmode_5fmac_21',['GENKEY_MODE_MAC',['../a00356.html#ae7b4dae38c2b38b25e43dc7ff4959764',1,'calib_command.h']]], + ['genkey_5fmode_5fmask_22',['GENKEY_MODE_MASK',['../a00356.html#aa3984c137090a2d103b2089c7ac31642',1,'calib_command.h']]], + ['genkey_5fmode_5fprivate_23',['GENKEY_MODE_PRIVATE',['../a00356.html#adc25fc4bebaac1582bb57d791f72356d',1,'calib_command.h']]], + ['genkey_5fmode_5fpubkey_5fdigest_24',['GENKEY_MODE_PUBKEY_DIGEST',['../a00356.html#a8d9a1e331d54bffb36f7b4e97af5d161',1,'calib_command.h']]], + ['genkey_5fmode_5fpublic_25',['GENKEY_MODE_PUBLIC',['../a00356.html#a03e556ba7849f28ee8c58df8921cba66',1,'calib_command.h']]], + ['genkey_5fother_5fdata_5fsize_26',['GENKEY_OTHER_DATA_SIZE',['../a00356.html#a62644ffb962c56fbea154526a2a84b40',1,'calib_command.h']]], + ['genkey_5fprivate_5fto_5ftempkey_27',['GENKEY_PRIVATE_TO_TEMPKEY',['../a00356.html#ad5b1ead29f3ce3cee52d106af531ab86',1,'calib_command.h']]], + ['genkey_5frsp_5fsize_5flong_28',['GENKEY_RSP_SIZE_LONG',['../a00356.html#a08e8a80be2717ece7c5ed5cc0a27fbab',1,'calib_command.h']]], + ['genkey_5frsp_5fsize_5fshort_29',['GENKEY_RSP_SIZE_SHORT',['../a00356.html#a0543a644422ffc7460eeeb78799bde16',1,'calib_command.h']]], + ['get_5fcryptoauthlib_30',['get_cryptoauthlib',['../a01486.html#a851038e6c6158127d7ecbd1e6580081b',1,'cryptoauthlib::library']]], + ['get_5fctype_5farray_5finstance_31',['get_ctype_array_instance',['../a01486.html#a2748ff60b5f1512fbf9f228e4c86598a',1,'cryptoauthlib::library']]], + ['get_5fctype_5fby_5fname_32',['get_ctype_by_name',['../a01486.html#a5cc6d0583a5f0554e61e3886c5bf1785',1,'cryptoauthlib::library']]], + ['get_5fctype_5fstructure_5finstance_33',['get_ctype_structure_instance',['../a01486.html#a30811985170f0083009bbd5439d1bcc2',1,'cryptoauthlib::library']]], + ['get_5fdevice_5fname_34',['get_device_name',['../a01486.html#a2da0648c5d2cb3a8da467b8dfac16e8c',1,'cryptoauthlib::library']]], + ['get_5fdevice_5fname_5fwith_5fdevice_5fid_35',['get_device_name_with_device_id',['../a01486.html#ac4f25f606f7c968b08b874dc8d75ca50',1,'cryptoauthlib::library']]], + ['get_5fdevice_5ftype_5fid_36',['get_device_type_id',['../a01486.html#adaf39153cd62515d9750fdb0748dbacc',1,'cryptoauthlib::library']]], + ['get_5fsize_5fby_5fname_37',['get_size_by_name',['../a01486.html#a7c6a46d9327a395ac4909411d937b193',1,'cryptoauthlib::library']]] ]; diff --git a/search/all_8.js b/search/all_8.js index c4beac53b..662f5ddb5 100644 --- a/search/all_8.js +++ b/search/all_8.js @@ -1,124 +1,123 @@ var searchData= [ - ['hal_0',['hal',['../a01584.html#a7cee716c7c8c20d0d8aac6243baff819',1,'atca_iface']]], - ['hal_20directory_20_2d_20purpose_1',['HAL Directory - Purpose',['../a01446.html',1,'']]], - ['hal_5fall_5fplatforms_5fkit_5fhidapi_2ec_2',['hal_all_platforms_kit_hidapi.c',['../a00524.html',1,'']]], - ['hal_5fcheck_5fpid_3',['hal_check_pid',['../a01446.html#gae31246ac870409a3d694c240c6c3498a',1,'hal_linux.c']]], - ['hal_5fcheck_5fwake_4',['hal_check_wake',['../a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c'],['../a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c']]], - ['hal_5fcreate_5fmutex_5',['hal_create_mutex',['../a01446.html#gaad9da28968a527ce51a2b081461d4cfe',1,'hal_freertos.c']]], - ['hal_5fdata_6',['hal_data',['../a01652.html#afd90dea53ccfe0a8c15b12e5e1afaa35',1,'atca_hal_kit_phy_t::hal_data()'],['../a01584.html#ab316c2d139b46380bc97be4d23428caa',1,'atca_iface::hal_data()']]], - ['hal_5fdelay_5fms_7',['hal_delay_ms',['../a01446.html#gadc23b8130e72a445f76c68d62e8c95c5',1,'hal_linux.c']]], - ['hal_5fdelay_5fus_8',['hal_delay_us',['../a01446.html#ga7e9019810ba5ab81b256282392cd5079',1,'hal_linux.c']]], - ['hal_5ffreertos_2ec_9',['hal_freertos.c',['../a00533.html',1,'']]], - ['hal_5fgpio_5fharmony_2ec_10',['hal_gpio_harmony.c',['../a00536.html',1,'']]], - ['hal_5fgpio_5finit_11',['hal_gpio_init',['../a00536.html#a5159dcc0de9cf18a0a46d390fcde3d59',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5fpost_5finit_12',['hal_gpio_post_init',['../a00536.html#a680903ede9921710475c23f3e0f5c56c',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5freceive_13',['hal_gpio_receive',['../a00536.html#ac4ec5194f4ed97053e725b4f5d3b6db4',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5frelease_14',['hal_gpio_release',['../a00536.html#a34a8c0ab6cfceb80c15080b571c0b3f7',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5fsend_15',['hal_gpio_send',['../a00536.html#a0509181ebe5c1f3311cacc800796469b',1,'hal_gpio_harmony.c']]], - ['hal_5fi2c_5fcontrol_16',['hal_i2c_control',['../a01446.html#ga4f82572f05b8587d98bc38601453863e',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fdiscover_5fbuses_17',['hal_i2c_discover_buses',['../a01446.html#ga05700385437884cc7b28c38d33e84f8c',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fdiscover_5fdevices_18',['hal_i2c_discover_devices',['../a01446.html#gac7644e62498a596c09952ee3b28017b9',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fharmony_2ec_19',['hal_i2c_harmony.c',['../a00539.html',1,'']]], - ['hal_5fi2c_5fidle_20',['hal_i2c_idle',['../a01446.html#ga9317303ada721ff3f97e7aad69437a30',1,'hal_i2c_start.c']]], - ['hal_5fi2c_5finit_21',['hal_i2c_init',['../a01446.html#ga09e7f465a040fbd19ea136269571de3c',1,'hal_i2c_init(void *hal, ATCAIfaceCfg *cfg): hal_i2c_start.c'],['../a01446.html#ga17df8d983df73e2e8f62f1236f157909',1,'hal_i2c_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_i2c_harmony.c']]], - ['hal_5fi2c_5fpost_5finit_22',['hal_i2c_post_init',['../a01446.html#gafbe53519362f18c2688d10da6f7c618f',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5freceive_23',['hal_i2c_receive',['../a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5frelease_24',['hal_i2c_release',['../a01446.html#gac382cc4431d2d1c721c21a453ba36c22',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fsend_25',['hal_i2c_send',['../a01446.html#gacc9a889e19d2f1a475a39391565b66dd',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fsleep_26',['hal_i2c_sleep',['../a01446.html#ga3f89bae6a625d5f37abdcc99408def27',1,'hal_i2c_start.c']]], - ['hal_5fi2c_5fstart_2ec_27',['hal_i2c_start.c',['../a00542.html',1,'']]], - ['hal_5fi2c_5fstart_2eh_28',['hal_i2c_start.h',['../a00545.html',1,'']]], - ['hal_5fi2c_5fwake_29',['hal_i2c_wake',['../a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c',1,'hal_i2c_start.c']]], - ['hal_5fiface_5finit_30',['hal_iface_init',['../a01446.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c'],['../a01446.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c']]], - ['hal_5fiface_5fregister_5fhal_31',['hal_iface_register_hal',['../a01446.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c'],['../a01446.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c']]], - ['hal_5fiface_5frelease_32',['hal_iface_release',['../a01446.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c'],['../a01446.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c']]], - ['hal_5fis_5fcommand_5fword_33',['hal_is_command_word',['../a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c'],['../a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c']]], - ['hal_5fkit_5fattach_5fphy_34',['hal_kit_attach_phy',['../a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c'],['../a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c']]], - ['hal_5fkit_5fbridge_2ec_35',['hal_kit_bridge.c',['../a00548.html',1,'']]], - ['hal_5fkit_5fbridge_2eh_36',['hal_kit_bridge.h',['../a00551.html',1,'']]], - ['hal_5fkit_5fcontrol_37',['hal_kit_control',['../a01446.html#ga56a9e080fb9055109778010912be08ba',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5fhid_5fcontrol_38',['hal_kit_hid_control',['../a01446.html#gadcf53722678e48323751359a04734680',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5finit_39',['hal_kit_hid_init',['../a01446.html#ga025e8f78bfdef446732e3aafacebc857',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5fpost_5finit_40',['hal_kit_hid_post_init',['../a01446.html#ga6f06bc1662b3d0361f6a241e1b5612f2',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5freceive_41',['hal_kit_hid_receive',['../a01446.html#ga1c62358b9abc11bc2e52b34c3dd712e0',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5frelease_42',['hal_kit_hid_release',['../a01446.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5fsend_43',['hal_kit_hid_send',['../a01446.html#ga3fd44b390fe7558c882c97faa783c018',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5finit_44',['hal_kit_init',['../a01446.html#ga4d01381c1a907ba56368a9313d0b65cb',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5fpost_5finit_45',['hal_kit_post_init',['../a01446.html#ga7baebf1b0431d0670517d3788d63b111',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5freceive_46',['hal_kit_receive',['../a01446.html#ga239b2412c8c0d45c2097a4fa06c9aa53',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5frelease_47',['hal_kit_release',['../a01446.html#gafb063a58f6e3b087cf08fce5c66ee422',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5fsend_48',['hal_kit_send',['../a01446.html#ga18817a4a7ab5958453eca414e28834ba',1,'hal_kit_bridge.c']]], - ['hal_5flinux_2ec_49',['hal_linux.c',['../a00554.html',1,'']]], - ['hal_5flinux_5fi2c_5fuserspace_2ec_50',['hal_linux_i2c_userspace.c',['../a00557.html',1,'']]], - ['hal_5flinux_5fuart_5fuserspace_2ec_51',['hal_linux_uart_userspace.c',['../a00563.html',1,'']]], - ['hal_5fmutex_5ft_52',['hal_mutex_t',['../a01446.html#ga73601b3bcebddd5e814e47b9a9c5f2a6',1,'atca_hal.h']]], - ['hal_5frtos_5fdelay_5fms_53',['hal_rtos_delay_ms',['../a01446.html#gacb8b202e3e6d66c96262b1ad4126ff6a',1,'hal_freertos.c']]], - ['hal_5fsam0_5fi2c_5fasf_2ec_54',['hal_sam0_i2c_asf.c',['../a00566.html',1,'']]], - ['hal_5fsam0_5fi2c_5fasf_2eh_55',['hal_sam0_i2c_asf.h',['../a00569.html',1,'']]], - ['hal_5fsam_5fi2c_5fasf_2ec_56',['hal_sam_i2c_asf.c',['../a00572.html',1,'']]], - ['hal_5fsam_5fi2c_5fasf_2eh_57',['hal_sam_i2c_asf.h',['../a00575.html',1,'']]], - ['hal_5fsam_5ftimer_5fasf_2ec_58',['hal_sam_timer_asf.c',['../a00578.html',1,'']]], - ['hal_5fspi_5fcontrol_59',['hal_spi_control',['../a01446.html#gac7f3951634faf0a7c16c234d471c3660',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fdeselect_60',['hal_spi_deselect',['../a01446.html#ga6bcb25e01ba6242973eedb32fa9dac2a',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fdiscover_5fbuses_61',['hal_spi_discover_buses',['../a01446.html#ga92cecc8e30a88dee1cbedd49141bc209',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fdiscover_5fdevices_62',['hal_spi_discover_devices',['../a01446.html#ga6cf45c115bcb721e951e8792e0feb3f0',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fharmony_2ec_63',['hal_spi_harmony.c',['../a00581.html',1,'']]], - ['hal_5fspi_5finit_64',['hal_spi_init',['../a01446.html#ga24b3ca4076a0e4093644d4f58cd80a69',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fpost_5finit_65',['hal_spi_post_init',['../a01446.html#gaeb831d9894ce11146bd00c79a98b7f0f',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5freceive_66',['hal_spi_receive',['../a01446.html#ga410c24762579358a576a58610a877e63',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5frelease_67',['hal_spi_release',['../a01446.html#ga8c3f1c6c20d939c4ca976fdda6279359',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fselect_68',['hal_spi_select',['../a01446.html#ga237aa1d0ee551a61991b52dc7812ff64',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fsend_69',['hal_spi_send',['../a01446.html#ga16661176757d0ef155155b07267a44ed',1,'hal_spi_harmony.c']]], - ['hal_5fswi_5fcontrol_70',['hal_swi_control',['../a01446.html#gad6ba20fd0d0d393f0cbf03ea9cb63346',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fgpio_2ec_71',['hal_swi_gpio.c',['../a00584.html',1,'']]], - ['hal_5fswi_5fgpio_2eh_72',['hal_swi_gpio.h',['../a00587.html',1,'']]], - ['hal_5fswi_5fgpio_5fcontrol_73',['hal_swi_gpio_control',['../a00584.html#aaf7a492cce7f9a5fe5b817aae347ba3d',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5finit_74',['hal_swi_gpio_init',['../a00584.html#a56876f187f5f50c3cc8728ee21f0962c',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5fpost_5finit_75',['hal_swi_gpio_post_init',['../a00584.html#a1527badd7e7e5f4d1e60eada509b1319',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5freceive_76',['hal_swi_gpio_receive',['../a00584.html#a3415a23c978f3421bc01d069d1ab9180',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5frelease_77',['hal_swi_gpio_release',['../a00584.html#aae0cb0a585b3eb7535c70047bef1f7c6',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5fsend_78',['hal_swi_gpio_send',['../a00584.html#aea9aba476b50f5d4ef082c24f0cb6b68',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fidle_79',['hal_swi_idle',['../a01446.html#ga618291172976da96c4f02dc9200c845c',1,'hal_swi_uart.c']]], - ['hal_5fswi_5finit_80',['hal_swi_init',['../a01446.html#gae3e41d9b466fb912625402db629b1a62',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fpost_5finit_81',['hal_swi_post_init',['../a01446.html#ga9186e5235979216330ae580290872c77',1,'hal_swi_uart.c']]], - ['hal_5fswi_5freceive_82',['hal_swi_receive',['../a01446.html#ga159bdf9c24e429d54800da1eb1c21058',1,'hal_swi_uart.c']]], - ['hal_5fswi_5frelease_83',['hal_swi_release',['../a01446.html#ga196dbc62546b39ac3e556a0f7f6b7132',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fsend_84',['hal_swi_send',['../a01446.html#ga9df4dbd666a87efe49578842e53ad91e',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fsleep_85',['hal_swi_sleep',['../a01446.html#ga252e365a30f2583dae8a8eac073a9f53',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fuart_2ec_86',['hal_swi_uart.c',['../a00590.html',1,'']]], - ['hal_5fswi_5fwake_87',['hal_swi_wake',['../a01446.html#gafc428980ec95e37eee94813db229fe70',1,'hal_swi_uart.c']]], - ['hal_5ftimer_5fstart_2ec_88',['hal_timer_start.c',['../a00593.html',1,'']]], - ['hal_5fuart_5fcontrol_89',['hal_uart_control',['../a00563.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_linux_uart_userspace.c'],['../a00611.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_windows_kit_uart.c']]], - ['hal_5fuart_5fharmony_2ec_90',['hal_uart_harmony.c',['../a00596.html',1,'']]], - ['hal_5fuart_5finit_91',['hal_uart_init',['../a00563.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_linux_uart_userspace.c'],['../a00596.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_uart_harmony.c'],['../a00611.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_windows_kit_uart.c']]], - ['hal_5fuart_5fpost_5finit_92',['hal_uart_post_init',['../a00563.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_linux_uart_userspace.c'],['../a00596.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_uart_harmony.c'],['../a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_windows_kit_uart.c']]], - ['hal_5fuart_5freceive_93',['hal_uart_receive',['../a00563.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_linux_uart_userspace.c'],['../a00596.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_uart_harmony.c'],['../a00611.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_windows_kit_uart.c']]], - ['hal_5fuart_5frelease_94',['hal_uart_release',['../a00563.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_linux_uart_userspace.c'],['../a00596.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_uart_harmony.c'],['../a00611.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_windows_kit_uart.c']]], - ['hal_5fuart_5fsend_95',['hal_uart_send',['../a00563.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_linux_uart_userspace.c'],['../a00596.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_uart_harmony.c'],['../a00611.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_windows_kit_uart.c']]], - ['hal_5fuc3_5fi2c_5fasf_2ec_96',['hal_uc3_i2c_asf.c',['../a00599.html',1,'']]], - ['hal_5fuc3_5fi2c_5fasf_2eh_97',['hal_uc3_i2c_asf.h',['../a00602.html',1,'']]], - ['hal_5fuc3_5ftimer_5fasf_2ec_98',['hal_uc3_timer_asf.c',['../a00605.html',1,'']]], - ['hal_5fwindows_2ec_99',['hal_windows.c',['../a00608.html',1,'']]], - ['hal_5fwindows_5fkit_5fuart_2ec_100',['hal_windows_kit_uart.c',['../a00611.html',1,'']]], - ['handle_101',['handle',['../a01856.html#a43266d4cee5be05494f466595b968267',1,'pkcs11_object_cache_s']]], - ['hardware_20abstraction_20layer_20_28hal_5f_29_102',['Hardware abstraction layer (hal_)',['../a01446.html',1,'']]], - ['hash_103',['hash',['../a01644.html#a2a42d119518402fa16c3ec9f2b511669',1,'sw_sha256_ctx']]], - ['hashed_5fkey_104',['hashed_key',['../a01712.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52',1,'atca_secureboot_enc_in_out::hashed_key()'],['../a01716.html#a9ebeb5a66a80189ae8e7bb2ea97701c9',1,'atca_secureboot_mac_in_out::hashed_key()']]], - ['healthtesterror_105',['HealthTestError',['../a02432.html',1,'cryptoauthlib::exceptions']]], - ['hmac_5fcount_106',['HMAC_COUNT',['../a00350.html#a041d4cd845319ea0a693a1c4008b2a06',1,'calib_command.h']]], - ['hmac_5fdigest_5fsize_107',['HMAC_DIGEST_SIZE',['../a00350.html#acd5976f898b9f67ea8e21df4e27fb712',1,'calib_command.h']]], - ['hmac_5fkeyid_5fidx_108',['HMAC_KEYID_IDX',['../a00350.html#a23673926f1dd2464bd20f6512985d855',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5ffullsn_109',['HMAC_MODE_FLAG_FULLSN',['../a00350.html#a564f52346bfc03bdd50aa7d03974efe7',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5fotp64_110',['HMAC_MODE_FLAG_OTP64',['../a00350.html#a62261a1c6f121c296dce7e0f697c9a4a',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5fotp88_111',['HMAC_MODE_FLAG_OTP88',['../a00350.html#a34be98ca6fb22f331eb62cfc4104ded6',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5ftk_5fnorand_112',['HMAC_MODE_FLAG_TK_NORAND',['../a00350.html#ac3b1177210ba941afa527bacbcfd4fab',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5ftk_5frand_113',['HMAC_MODE_FLAG_TK_RAND',['../a00350.html#a08326ee33be4faaec3be800e80c1cc17',1,'calib_command.h']]], - ['hmac_5fmode_5fidx_114',['HMAC_MODE_IDX',['../a00350.html#adf58a677811566e8446870523bb65850',1,'calib_command.h']]], - ['hmac_5fmode_5fmask_115',['HMAC_MODE_MASK',['../a00350.html#a8250b0997534871fdd6ead1c3aa220ba',1,'calib_command.h']]], - ['hmac_5frsp_5fsize_116',['HMAC_RSP_SIZE',['../a00350.html#adec1fd29e8c6b2f804fc4050778dafc8',1,'calib_command.h']]], - ['host_20side_20crypto_20methods_20_28atcah_5f_29_117',['Host side crypto methods (atcah_)',['../a01447.html',1,'']]], - ['hostlib_5fcert_5fen_118',['HOSTLIB_CERT_EN',['../a00653.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_mbedtls_interface.h'],['../a00665.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_openssl_interface.h']]], - ['hwecalgorithm_119',['HwEcAlgorithm',['../a02232.html',1,'cryptoauthlib::atjwt']]], - ['hwhmacalgorithm_120',['HwHmacAlgorithm',['../a02236.html',1,'cryptoauthlib::atjwt']]] + ['hal_0',['hal',['../a01607.html#a7cee716c7c8c20d0d8aac6243baff819',1,'atca_iface']]], + ['hal_20directory_20_2d_20purpose_1',['HAL Directory - Purpose',['../a01473.html',1,'']]], + ['hal_5fall_5fplatforms_5fkit_5fhidapi_2ec_2',['hal_all_platforms_kit_hidapi.c',['../a00539.html',1,'']]], + ['hal_5fcheck_5fpid_3',['hal_check_pid',['../a01473.html#gae31246ac870409a3d694c240c6c3498a',1,'hal_linux.c']]], + ['hal_5fcheck_5fwake_4',['hal_check_wake',['../a01473.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c'],['../a01473.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c']]], + ['hal_5fcreate_5fmutex_5',['hal_create_mutex',['../a01473.html#gaad9da28968a527ce51a2b081461d4cfe',1,'hal_freertos.c']]], + ['hal_5fdata_6',['hal_data',['../a01671.html#afd90dea53ccfe0a8c15b12e5e1afaa35',1,'atca_hal_kit_phy_t::hal_data()'],['../a01607.html#ab316c2d139b46380bc97be4d23428caa',1,'atca_iface::hal_data()']]], + ['hal_5fdelay_5fms_7',['hal_delay_ms',['../a01473.html#gadc23b8130e72a445f76c68d62e8c95c5',1,'hal_linux.c']]], + ['hal_5fdelay_5fus_8',['hal_delay_us',['../a01473.html#ga7e9019810ba5ab81b256282392cd5079',1,'hal_linux.c']]], + ['hal_5ffreertos_2ec_9',['hal_freertos.c',['../a00548.html',1,'']]], + ['hal_5fgpio_5fharmony_2ec_10',['hal_gpio_harmony.c',['../a00551.html',1,'']]], + ['hal_5fgpio_5finit_11',['hal_gpio_init',['../a00551.html#a5159dcc0de9cf18a0a46d390fcde3d59',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5fpost_5finit_12',['hal_gpio_post_init',['../a00551.html#a680903ede9921710475c23f3e0f5c56c',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5freceive_13',['hal_gpio_receive',['../a00551.html#ac4ec5194f4ed97053e725b4f5d3b6db4',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5frelease_14',['hal_gpio_release',['../a00551.html#a34a8c0ab6cfceb80c15080b571c0b3f7',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5fsend_15',['hal_gpio_send',['../a00551.html#a0509181ebe5c1f3311cacc800796469b',1,'hal_gpio_harmony.c']]], + ['hal_5fi2c_5fcontrol_16',['hal_i2c_control',['../a01473.html#ga4f82572f05b8587d98bc38601453863e',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fdiscover_5fbuses_17',['hal_i2c_discover_buses',['../a01473.html#ga05700385437884cc7b28c38d33e84f8c',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fdiscover_5fdevices_18',['hal_i2c_discover_devices',['../a01473.html#gac7644e62498a596c09952ee3b28017b9',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fharmony_2ec_19',['hal_i2c_harmony.c',['../a00554.html',1,'']]], + ['hal_5fi2c_5fidle_20',['hal_i2c_idle',['../a01473.html#ga9317303ada721ff3f97e7aad69437a30',1,'hal_i2c_start.c']]], + ['hal_5fi2c_5finit_21',['hal_i2c_init',['../a01473.html#ga09e7f465a040fbd19ea136269571de3c',1,'hal_i2c_init(void *hal, ATCAIfaceCfg *cfg): hal_i2c_start.c'],['../a01473.html#ga17df8d983df73e2e8f62f1236f157909',1,'hal_i2c_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_i2c_harmony.c']]], + ['hal_5fi2c_5fpost_5finit_22',['hal_i2c_post_init',['../a01473.html#gafbe53519362f18c2688d10da6f7c618f',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5freceive_23',['hal_i2c_receive',['../a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5frelease_24',['hal_i2c_release',['../a01473.html#gac382cc4431d2d1c721c21a453ba36c22',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fsend_25',['hal_i2c_send',['../a01473.html#gacc9a889e19d2f1a475a39391565b66dd',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fsleep_26',['hal_i2c_sleep',['../a01473.html#ga3f89bae6a625d5f37abdcc99408def27',1,'hal_i2c_start.c']]], + ['hal_5fi2c_5fstart_2ec_27',['hal_i2c_start.c',['../a00557.html',1,'']]], + ['hal_5fi2c_5fstart_2eh_28',['hal_i2c_start.h',['../a00560.html',1,'']]], + ['hal_5fi2c_5fwake_29',['hal_i2c_wake',['../a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c',1,'hal_i2c_start.c']]], + ['hal_5fiface_5finit_30',['hal_iface_init',['../a01473.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c'],['../a01473.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c']]], + ['hal_5fiface_5fregister_5fhal_31',['hal_iface_register_hal',['../a01473.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c'],['../a01473.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c']]], + ['hal_5fiface_5frelease_32',['hal_iface_release',['../a01473.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c'],['../a01473.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c']]], + ['hal_5fis_5fcommand_5fword_33',['hal_is_command_word',['../a01473.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c'],['../a01473.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c']]], + ['hal_5fkit_5fattach_5fphy_34',['hal_kit_attach_phy',['../a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c'],['../a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c']]], + ['hal_5fkit_5fbridge_2ec_35',['hal_kit_bridge.c',['../a00563.html',1,'']]], + ['hal_5fkit_5fbridge_2eh_36',['hal_kit_bridge.h',['../a00566.html',1,'']]], + ['hal_5fkit_5fcontrol_37',['hal_kit_control',['../a01473.html#ga56a9e080fb9055109778010912be08ba',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5fhid_5fcontrol_38',['hal_kit_hid_control',['../a01473.html#gadcf53722678e48323751359a04734680',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5finit_39',['hal_kit_hid_init',['../a01473.html#ga025e8f78bfdef446732e3aafacebc857',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5fpost_5finit_40',['hal_kit_hid_post_init',['../a01473.html#ga6f06bc1662b3d0361f6a241e1b5612f2',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5freceive_41',['hal_kit_hid_receive',['../a01473.html#ga1c62358b9abc11bc2e52b34c3dd712e0',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5frelease_42',['hal_kit_hid_release',['../a01473.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5fsend_43',['hal_kit_hid_send',['../a01473.html#ga3fd44b390fe7558c882c97faa783c018',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5finit_44',['hal_kit_init',['../a01473.html#ga4d01381c1a907ba56368a9313d0b65cb',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5fpost_5finit_45',['hal_kit_post_init',['../a01473.html#ga7baebf1b0431d0670517d3788d63b111',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5freceive_46',['hal_kit_receive',['../a01473.html#ga239b2412c8c0d45c2097a4fa06c9aa53',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5frelease_47',['hal_kit_release',['../a01473.html#gafb063a58f6e3b087cf08fce5c66ee422',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5fsend_48',['hal_kit_send',['../a01473.html#ga18817a4a7ab5958453eca414e28834ba',1,'hal_kit_bridge.c']]], + ['hal_5flinux_2ec_49',['hal_linux.c',['../a00569.html',1,'']]], + ['hal_5flinux_5fi2c_5fuserspace_2ec_50',['hal_linux_i2c_userspace.c',['../a00572.html',1,'']]], + ['hal_5flinux_5fuart_5fuserspace_2ec_51',['hal_linux_uart_userspace.c',['../a00578.html',1,'']]], + ['hal_5fmutex_5ft_52',['hal_mutex_t',['../a01473.html#ga73601b3bcebddd5e814e47b9a9c5f2a6',1,'atca_hal.h']]], + ['hal_5frtos_5fdelay_5fms_53',['hal_rtos_delay_ms',['../a01473.html#gacb8b202e3e6d66c96262b1ad4126ff6a',1,'hal_freertos.c']]], + ['hal_5fsam0_5fi2c_5fasf_2ec_54',['hal_sam0_i2c_asf.c',['../a00581.html',1,'']]], + ['hal_5fsam0_5fi2c_5fasf_2eh_55',['hal_sam0_i2c_asf.h',['../a00584.html',1,'']]], + ['hal_5fsam_5fi2c_5fasf_2ec_56',['hal_sam_i2c_asf.c',['../a00587.html',1,'']]], + ['hal_5fsam_5fi2c_5fasf_2eh_57',['hal_sam_i2c_asf.h',['../a00590.html',1,'']]], + ['hal_5fsam_5ftimer_5fasf_2ec_58',['hal_sam_timer_asf.c',['../a00593.html',1,'']]], + ['hal_5fspi_5fcontrol_59',['hal_spi_control',['../a01473.html#gac7f3951634faf0a7c16c234d471c3660',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fdeselect_60',['hal_spi_deselect',['../a01473.html#ga6bcb25e01ba6242973eedb32fa9dac2a',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fdiscover_5fbuses_61',['hal_spi_discover_buses',['../a01473.html#ga92cecc8e30a88dee1cbedd49141bc209',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fdiscover_5fdevices_62',['hal_spi_discover_devices',['../a01473.html#ga6cf45c115bcb721e951e8792e0feb3f0',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fharmony_2ec_63',['hal_spi_harmony.c',['../a00596.html',1,'']]], + ['hal_5fspi_5finit_64',['hal_spi_init',['../a01473.html#ga24b3ca4076a0e4093644d4f58cd80a69',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fpost_5finit_65',['hal_spi_post_init',['../a01473.html#gaeb831d9894ce11146bd00c79a98b7f0f',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5freceive_66',['hal_spi_receive',['../a01473.html#ga410c24762579358a576a58610a877e63',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5frelease_67',['hal_spi_release',['../a01473.html#ga8c3f1c6c20d939c4ca976fdda6279359',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fselect_68',['hal_spi_select',['../a01473.html#ga237aa1d0ee551a61991b52dc7812ff64',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fsend_69',['hal_spi_send',['../a01473.html#ga16661176757d0ef155155b07267a44ed',1,'hal_spi_harmony.c']]], + ['hal_5fswi_5fcontrol_70',['hal_swi_control',['../a01473.html#gad6ba20fd0d0d393f0cbf03ea9cb63346',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fgpio_2ec_71',['hal_swi_gpio.c',['../a00599.html',1,'']]], + ['hal_5fswi_5fgpio_2eh_72',['hal_swi_gpio.h',['../a00602.html',1,'']]], + ['hal_5fswi_5fgpio_5fcontrol_73',['hal_swi_gpio_control',['../a00599.html#aaf7a492cce7f9a5fe5b817aae347ba3d',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5finit_74',['hal_swi_gpio_init',['../a00599.html#a56876f187f5f50c3cc8728ee21f0962c',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5fpost_5finit_75',['hal_swi_gpio_post_init',['../a00599.html#a1527badd7e7e5f4d1e60eada509b1319',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5freceive_76',['hal_swi_gpio_receive',['../a00599.html#a3415a23c978f3421bc01d069d1ab9180',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5frelease_77',['hal_swi_gpio_release',['../a00599.html#aae0cb0a585b3eb7535c70047bef1f7c6',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5fsend_78',['hal_swi_gpio_send',['../a00599.html#aea9aba476b50f5d4ef082c24f0cb6b68',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fidle_79',['hal_swi_idle',['../a01473.html#ga618291172976da96c4f02dc9200c845c',1,'hal_swi_uart.c']]], + ['hal_5fswi_5finit_80',['hal_swi_init',['../a01473.html#gae3e41d9b466fb912625402db629b1a62',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fpost_5finit_81',['hal_swi_post_init',['../a01473.html#ga9186e5235979216330ae580290872c77',1,'hal_swi_uart.c']]], + ['hal_5fswi_5freceive_82',['hal_swi_receive',['../a01473.html#ga159bdf9c24e429d54800da1eb1c21058',1,'hal_swi_uart.c']]], + ['hal_5fswi_5frelease_83',['hal_swi_release',['../a01473.html#ga196dbc62546b39ac3e556a0f7f6b7132',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fsend_84',['hal_swi_send',['../a01473.html#ga9df4dbd666a87efe49578842e53ad91e',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fsleep_85',['hal_swi_sleep',['../a01473.html#ga252e365a30f2583dae8a8eac073a9f53',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fuart_2ec_86',['hal_swi_uart.c',['../a00605.html',1,'']]], + ['hal_5fswi_5fwake_87',['hal_swi_wake',['../a01473.html#gafc428980ec95e37eee94813db229fe70',1,'hal_swi_uart.c']]], + ['hal_5ftimer_5fstart_2ec_88',['hal_timer_start.c',['../a00608.html',1,'']]], + ['hal_5fuart_5fcontrol_89',['hal_uart_control',['../a00578.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_linux_uart_userspace.c'],['../a00626.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_windows_kit_uart.c']]], + ['hal_5fuart_5fharmony_2ec_90',['hal_uart_harmony.c',['../a00611.html',1,'']]], + ['hal_5fuart_5finit_91',['hal_uart_init',['../a00578.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_linux_uart_userspace.c'],['../a00611.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_uart_harmony.c'],['../a00626.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_windows_kit_uart.c']]], + ['hal_5fuart_5fpost_5finit_92',['hal_uart_post_init',['../a00578.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_linux_uart_userspace.c'],['../a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_uart_harmony.c'],['../a00626.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_windows_kit_uart.c']]], + ['hal_5fuart_5freceive_93',['hal_uart_receive',['../a00578.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_linux_uart_userspace.c'],['../a00611.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_uart_harmony.c'],['../a00626.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_windows_kit_uart.c']]], + ['hal_5fuart_5frelease_94',['hal_uart_release',['../a00578.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_linux_uart_userspace.c'],['../a00611.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_uart_harmony.c'],['../a00626.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_windows_kit_uart.c']]], + ['hal_5fuart_5fsend_95',['hal_uart_send',['../a00578.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_linux_uart_userspace.c'],['../a00611.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_uart_harmony.c'],['../a00626.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_windows_kit_uart.c']]], + ['hal_5fuc3_5fi2c_5fasf_2ec_96',['hal_uc3_i2c_asf.c',['../a00614.html',1,'']]], + ['hal_5fuc3_5fi2c_5fasf_2eh_97',['hal_uc3_i2c_asf.h',['../a00617.html',1,'']]], + ['hal_5fuc3_5ftimer_5fasf_2ec_98',['hal_uc3_timer_asf.c',['../a00620.html',1,'']]], + ['hal_5fwindows_2ec_99',['hal_windows.c',['../a00623.html',1,'']]], + ['hal_5fwindows_5fkit_5fuart_2ec_100',['hal_windows_kit_uart.c',['../a00626.html',1,'']]], + ['handle_101',['handle',['../a01891.html#a43266d4cee5be05494f466595b968267',1,'pkcs11_object_cache_s']]], + ['hardware_20abstraction_20layer_20_28hal_5f_29_102',['Hardware abstraction layer (hal_)',['../a01473.html',1,'']]], + ['hashed_5fkey_103',['hashed_key',['../a01731.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52',1,'atca_secureboot_enc_in_out::hashed_key()'],['../a01735.html#a9ebeb5a66a80189ae8e7bb2ea97701c9',1,'atca_secureboot_mac_in_out::hashed_key()']]], + ['healthtesterror_104',['HealthTestError',['../a02467.html',1,'cryptoauthlib::exceptions']]], + ['hmac_5fcount_105',['HMAC_COUNT',['../a00356.html#a041d4cd845319ea0a693a1c4008b2a06',1,'calib_command.h']]], + ['hmac_5fdigest_5fsize_106',['HMAC_DIGEST_SIZE',['../a00356.html#acd5976f898b9f67ea8e21df4e27fb712',1,'calib_command.h']]], + ['hmac_5fkeyid_5fidx_107',['HMAC_KEYID_IDX',['../a00356.html#a23673926f1dd2464bd20f6512985d855',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5ffullsn_108',['HMAC_MODE_FLAG_FULLSN',['../a00356.html#a564f52346bfc03bdd50aa7d03974efe7',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5fotp64_109',['HMAC_MODE_FLAG_OTP64',['../a00356.html#a62261a1c6f121c296dce7e0f697c9a4a',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5fotp88_110',['HMAC_MODE_FLAG_OTP88',['../a00356.html#a34be98ca6fb22f331eb62cfc4104ded6',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5ftk_5fnorand_111',['HMAC_MODE_FLAG_TK_NORAND',['../a00356.html#ac3b1177210ba941afa527bacbcfd4fab',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5ftk_5frand_112',['HMAC_MODE_FLAG_TK_RAND',['../a00356.html#a08326ee33be4faaec3be800e80c1cc17',1,'calib_command.h']]], + ['hmac_5fmode_5fidx_113',['HMAC_MODE_IDX',['../a00356.html#adf58a677811566e8446870523bb65850',1,'calib_command.h']]], + ['hmac_5fmode_5fmask_114',['HMAC_MODE_MASK',['../a00356.html#a8250b0997534871fdd6ead1c3aa220ba',1,'calib_command.h']]], + ['hmac_5frsp_5fsize_115',['HMAC_RSP_SIZE',['../a00356.html#adec1fd29e8c6b2f804fc4050778dafc8',1,'calib_command.h']]], + ['host_20side_20crypto_20methods_20_28atcah_5f_29_116',['Host side crypto methods (atcah_)',['../a01474.html',1,'']]], + ['hostlib_5fcert_5fen_117',['HOSTLIB_CERT_EN',['../a00668.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_mbedtls_interface.h'],['../a00680.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_openssl_interface.h']]], + ['hwecalgorithm_118',['HwEcAlgorithm',['../a02267.html',1,'cryptoauthlib::atjwt']]], + ['hwhmacalgorithm_119',['HwHmacAlgorithm',['../a02271.html',1,'cryptoauthlib::atjwt']]] ]; diff --git a/search/all_9.js b/search/all_9.js index 2fc7927e7..3d497c756 100644 --- a/search/all_9.js +++ b/search/all_9.js @@ -1,56 +1,56 @@ var searchData= [ - ['i2c_5fsam0_5finstance_0',['i2c_sam0_instance',['../a01680.html',1,'']]], - ['i2c_5fsam_5finstance_1',['i2c_sam_instance',['../a01684.html',1,'']]], - ['i2c_5fstart_5finstance_2',['i2c_start_instance',['../a01664.html',1,'']]], - ['i2cenable_3',['I2cEnable',['../a02248.html',1,'cryptoauthlib::device']]], - ['id_4',['id',['../a01600.html#a437f85f49d7a943a0e9f06353a2b6875',1,'atcacert_cert_element_s']]], - ['iface_5fget_5fdevice_5ftype_5fby_5fname_5',['iface_get_device_type_by_name',['../a01442.html#ga8e50f9bf69be0910880411e9a0d5bc24',1,'atca_iface.c']]], - ['ifacecfg_5fget_5faddress_6',['ifacecfg_get_address',['../a01442.html#ga9efe98ee7fe9be95593c7177800efd8d',1,'atca_iface.c']]], - ['ifacecfg_5fset_5faddress_7',['ifacecfg_set_address',['../a01442.html#ga4e975805352164dc3a8ff553b42c509f',1,'atca_iface.c']]], - ['ifacetype_5fis_5fkit_8',['ifacetype_is_kit',['../a01442.html#gaaff5268b9acbf16db03b425e6c54f97c',1,'atca_iface.c']]], - ['info_5fcount_9',['INFO_COUNT',['../a00350.html#aee1a29942cf2b3637a65506dc6b5d4fe',1,'calib_command.h']]], - ['info_5fdriver_5fstate_5fmask_10',['INFO_DRIVER_STATE_MASK',['../a00350.html#a9cc740e22e15f08a8b90873a2b3b47e8',1,'calib_command.h']]], - ['info_5fmode_5fchip_5fstatus_11',['INFO_MODE_CHIP_STATUS',['../a00350.html#ad792a3c825c32832a9b6292bfe028d32',1,'calib_command.h']]], - ['info_5fmode_5fgpio_12',['INFO_MODE_GPIO',['../a00350.html#a30e8f8f4027e2137c11c2fb49b4c2aa6',1,'calib_command.h']]], - ['info_5fmode_5fkey_5fvalid_13',['INFO_MODE_KEY_VALID',['../a00350.html#a6f746e9967643e3234727eaa5a0b274b',1,'calib_command.h']]], - ['info_5fmode_5flock_5fstatus_14',['INFO_MODE_LOCK_STATUS',['../a00350.html#a1cfd78a07f649bda6cf3b7de35804a90',1,'calib_command.h']]], - ['info_5fmode_5fmax_15',['INFO_MODE_MAX',['../a00350.html#a249c12b69d65f6c33568c78b9d9b127d',1,'calib_command.h']]], - ['info_5fmode_5frevision_16',['INFO_MODE_REVISION',['../a00350.html#ae591dd29af805fc5b63e5b06d5e7c450',1,'calib_command.h']]], - ['info_5fmode_5fstate_17',['INFO_MODE_STATE',['../a00350.html#a7432ca6b291e32e962fabaa6d604a8bc',1,'calib_command.h']]], - ['info_5fmode_5fvol_5fkey_5fpermit_18',['INFO_MODE_VOL_KEY_PERMIT',['../a00350.html#ac0fb0edb797b754a069e12931a001257',1,'calib_command.h']]], - ['info_5fno_5fstate_19',['INFO_NO_STATE',['../a00350.html#ad5b035b6f65f87b7fdf75f225a54ce35',1,'calib_command.h']]], - ['info_5foutput_5fstate_5fmask_20',['INFO_OUTPUT_STATE_MASK',['../a00350.html#a2b70682af491ce76c45505cabafcf9c0',1,'calib_command.h']]], - ['info_5fparam1_5fidx_21',['INFO_PARAM1_IDX',['../a00350.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac',1,'calib_command.h']]], - ['info_5fparam2_5fidx_22',['INFO_PARAM2_IDX',['../a00350.html#a09e4830c78dedfa2ce662e0fdbe430e3',1,'calib_command.h']]], - ['info_5fparam2_5flatch_5fclear_23',['INFO_PARAM2_LATCH_CLEAR',['../a00350.html#a027d5e8ae4a55db4ae52a41f3214c861',1,'calib_command.h']]], - ['info_5fparam2_5flatch_5fset_24',['INFO_PARAM2_LATCH_SET',['../a00350.html#aae24f308513ed54fc7c41b39bc05760b',1,'calib_command.h']]], - ['info_5fparam2_5fset_5flatch_5fstate_25',['INFO_PARAM2_SET_LATCH_STATE',['../a00350.html#a5dcc70feddb0b97c6fa779c6c3c819e6',1,'calib_command.h']]], - ['info_5frsp_5fsize_26',['INFO_RSP_SIZE',['../a00350.html#a0c667e3f6590ac12726cbf4ad2b0f4f5',1,'calib_command.h']]], - ['info_5fsize_27',['INFO_SIZE',['../a00350.html#a70457c61d44fbac0cb48727f53c39388',1,'calib_command.h']]], - ['init_5fargs_28',['init_args',['../a01840.html#a5387f2fa4d263228dd0056aa1fd308de',1,'pkcs11_lib_ctx_s']]], - ['initatcadevice_29',['initATCADevice',['../a01441.html#ga8eec7f2190d1f9bda6684f5d2177db15',1,'atca_device.c']]], - ['initatcaiface_30',['initATCAIface',['../a01442.html#ga3a31087729a7a2e9a624572f234809fc',1,'atca_iface.c']]], - ['initialized_31',['initialized',['../a01840.html#afe50a8d16a6f04c64053e09ae4975e38',1,'pkcs11_lib_ctx_s']]], - ['input_5fdata_32',['input_data',['../a01736.html#a423e1db9e86ff369d49d78d8f5ea2525',1,'atca_write_mac_in_out']]], - ['invalididentifiererror_33',['InvalidIdentifierError',['../a02360.html',1,'cryptoauthlib::exceptions']]], - ['invalidsizeerror_34',['InvalidSizeError',['../a02364.html',1,'cryptoauthlib::exceptions']]], - ['io_5fkey_35',['io_key',['../a01704.html#aa6d2797ec2cdef70aa51438e96e2a301',1,'atca_io_decrypt_in_out::io_key()'],['../a01708.html#a93cba5300302d50e26f70457f84df0da',1,'atca_verify_mac::io_key()'],['../a01712.html#aeb02c7cf4fbaf40307821bc38160ab8d',1,'atca_secureboot_enc_in_out::io_key()']]], + ['i2c_5fsam0_5finstance_0',['i2c_sam0_instance',['../a01699.html',1,'']]], + ['i2c_5fsam_5finstance_1',['i2c_sam_instance',['../a01703.html',1,'']]], + ['i2c_5fstart_5finstance_2',['i2c_start_instance',['../a01683.html',1,'']]], + ['i2cenable_3',['I2cEnable',['../a02283.html',1,'cryptoauthlib::device']]], + ['id_4',['id',['../a01623.html#a437f85f49d7a943a0e9f06353a2b6875',1,'atcacert_cert_element_s']]], + ['iface_5fget_5fdevice_5ftype_5fby_5fname_5',['iface_get_device_type_by_name',['../a01469.html#ga8e50f9bf69be0910880411e9a0d5bc24',1,'atca_iface.c']]], + ['ifacecfg_5fget_5faddress_6',['ifacecfg_get_address',['../a01469.html#ga9efe98ee7fe9be95593c7177800efd8d',1,'atca_iface.c']]], + ['ifacecfg_5fset_5faddress_7',['ifacecfg_set_address',['../a01469.html#ga4e975805352164dc3a8ff553b42c509f',1,'atca_iface.c']]], + ['ifacetype_5fis_5fkit_8',['ifacetype_is_kit',['../a01469.html#gaaff5268b9acbf16db03b425e6c54f97c',1,'atca_iface.c']]], + ['info_5fcount_9',['INFO_COUNT',['../a00356.html#aee1a29942cf2b3637a65506dc6b5d4fe',1,'calib_command.h']]], + ['info_5fdriver_5fstate_5fmask_10',['INFO_DRIVER_STATE_MASK',['../a00356.html#a9cc740e22e15f08a8b90873a2b3b47e8',1,'calib_command.h']]], + ['info_5fmode_5fchip_5fstatus_11',['INFO_MODE_CHIP_STATUS',['../a00356.html#ad792a3c825c32832a9b6292bfe028d32',1,'calib_command.h']]], + ['info_5fmode_5fgpio_12',['INFO_MODE_GPIO',['../a00356.html#a30e8f8f4027e2137c11c2fb49b4c2aa6',1,'calib_command.h']]], + ['info_5fmode_5fkey_5fvalid_13',['INFO_MODE_KEY_VALID',['../a00356.html#a6f746e9967643e3234727eaa5a0b274b',1,'calib_command.h']]], + ['info_5fmode_5flock_5fstatus_14',['INFO_MODE_LOCK_STATUS',['../a00356.html#a1cfd78a07f649bda6cf3b7de35804a90',1,'calib_command.h']]], + ['info_5fmode_5fmax_15',['INFO_MODE_MAX',['../a00356.html#a249c12b69d65f6c33568c78b9d9b127d',1,'calib_command.h']]], + ['info_5fmode_5frevision_16',['INFO_MODE_REVISION',['../a00356.html#ae591dd29af805fc5b63e5b06d5e7c450',1,'calib_command.h']]], + ['info_5fmode_5fstate_17',['INFO_MODE_STATE',['../a00356.html#a7432ca6b291e32e962fabaa6d604a8bc',1,'calib_command.h']]], + ['info_5fmode_5fvol_5fkey_5fpermit_18',['INFO_MODE_VOL_KEY_PERMIT',['../a00356.html#ac0fb0edb797b754a069e12931a001257',1,'calib_command.h']]], + ['info_5fno_5fstate_19',['INFO_NO_STATE',['../a00356.html#ad5b035b6f65f87b7fdf75f225a54ce35',1,'calib_command.h']]], + ['info_5foutput_5fstate_5fmask_20',['INFO_OUTPUT_STATE_MASK',['../a00356.html#a2b70682af491ce76c45505cabafcf9c0',1,'calib_command.h']]], + ['info_5fparam1_5fidx_21',['INFO_PARAM1_IDX',['../a00356.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac',1,'calib_command.h']]], + ['info_5fparam2_5fidx_22',['INFO_PARAM2_IDX',['../a00356.html#a09e4830c78dedfa2ce662e0fdbe430e3',1,'calib_command.h']]], + ['info_5fparam2_5flatch_5fclear_23',['INFO_PARAM2_LATCH_CLEAR',['../a00356.html#a027d5e8ae4a55db4ae52a41f3214c861',1,'calib_command.h']]], + ['info_5fparam2_5flatch_5fset_24',['INFO_PARAM2_LATCH_SET',['../a00356.html#aae24f308513ed54fc7c41b39bc05760b',1,'calib_command.h']]], + ['info_5fparam2_5fset_5flatch_5fstate_25',['INFO_PARAM2_SET_LATCH_STATE',['../a00356.html#a5dcc70feddb0b97c6fa779c6c3c819e6',1,'calib_command.h']]], + ['info_5frsp_5fsize_26',['INFO_RSP_SIZE',['../a00356.html#a0c667e3f6590ac12726cbf4ad2b0f4f5',1,'calib_command.h']]], + ['info_5fsize_27',['INFO_SIZE',['../a00356.html#a70457c61d44fbac0cb48727f53c39388',1,'calib_command.h']]], + ['init_5fargs_28',['init_args',['../a01867.html#a5387f2fa4d263228dd0056aa1fd308de',1,'pkcs11_lib_ctx_s']]], + ['initatcadevice_29',['initATCADevice',['../a01468.html#ga8eec7f2190d1f9bda6684f5d2177db15',1,'atca_device.c']]], + ['initatcaiface_30',['initATCAIface',['../a01469.html#ga3a31087729a7a2e9a624572f234809fc',1,'atca_iface.c']]], + ['initialized_31',['initialized',['../a01867.html#afe50a8d16a6f04c64053e09ae4975e38',1,'pkcs11_lib_ctx_s']]], + ['input_5fdata_32',['input_data',['../a01755.html#a423e1db9e86ff369d49d78d8f5ea2525',1,'atca_write_mac_in_out']]], + ['invalididentifiererror_33',['InvalidIdentifierError',['../a02395.html',1,'cryptoauthlib::exceptions']]], + ['invalidsizeerror_34',['InvalidSizeError',['../a02399.html',1,'cryptoauthlib::exceptions']]], + ['io_5fkey_35',['io_key',['../a01723.html#aa6d2797ec2cdef70aa51438e96e2a301',1,'atca_io_decrypt_in_out::io_key()'],['../a01727.html#a93cba5300302d50e26f70457f84df0da',1,'atca_verify_mac::io_key()'],['../a01731.html#aeb02c7cf4fbaf40307821bc38160ab8d',1,'atca_secureboot_enc_in_out::io_key()']]], ['io_5fprotection_5fkey_2eh_36',['io_protection_key.h',['../a00041.html',1,'']]], - ['ip_20protection_20with_20symmetric_20authentication_37',['IP Protection with Symmetric Authentication',['../a02826.html',1,'']]], - ['is_5f64_38',['is_64',['../a01692.html#a0f766111832176ea2c8eda8fbf13743d',1,'atca_temp_key']]], - ['is_5fcomp_5fcert_39',['is_comp_cert',['../a01608.html#abfff7f7f7436a1df82e73b4b070f8ab8',1,'atcacert_build_state_s']]], - ['is_5fdevice_5fsn_40',['is_device_sn',['../a01608.html#aa0b5050ded24b08d6b0022d543d2ed47',1,'atcacert_build_state_s']]], - ['is_5fgenkey_41',['is_genkey',['../a01592.html#a209ce3b19c7ebdd32847334c64a9deb2',1,'atcacert_device_loc_s']]], - ['is_5fkey_5fnomac_42',['is_key_nomac',['../a01728.html#a45ea4bd1941244391f04343f993bacf0',1,'atca_gen_dig_in_out']]], - ['is_5fslot_5flocked_43',['is_slot_locked',['../a01768.html#a1d994ea91e9234808e6f0320897ab434',1,'atca_sign_internal_in_out']]], - ['isalpha_44',['isAlpha',['../a01439.html#ga592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c'],['../a00251.html#a592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c']]], - ['isatcaerror_45',['isATCAError',['../a00350.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c'],['../a00347.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c']]], - ['isbase64_46',['isBase64',['../a00251.html#ac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c'],['../a01439.html#gac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c']]], - ['isbase64digit_47',['isBase64Digit',['../a00251.html#ad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c'],['../a01439.html#gad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c']]], - ['isblankspace_48',['isBlankSpace',['../a00251.html#a04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c'],['../a01439.html#ga04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c']]], - ['isdigit_49',['isDigit',['../a00251.html#a7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c'],['../a01439.html#ga7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c']]], - ['ishex_50',['isHex',['../a00251.html#ab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c'],['../a01439.html#gab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c']]], - ['ishexalpha_51',['isHexAlpha',['../a00251.html#a78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c'],['../a01439.html#ga78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c']]], - ['ishexdigit_52',['isHexDigit',['../a00251.html#a39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c'],['../a01439.html#ga39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c']]] + ['ip_20protection_20with_20symmetric_20authentication_37',['IP Protection with Symmetric Authentication',['../a02861.html',1,'']]], + ['is_5f64_38',['is_64',['../a01711.html#a0f766111832176ea2c8eda8fbf13743d',1,'atca_temp_key']]], + ['is_5fcomp_5fcert_39',['is_comp_cert',['../a01631.html#abfff7f7f7436a1df82e73b4b070f8ab8',1,'atcacert_build_state_s']]], + ['is_5fdevice_5fsn_40',['is_device_sn',['../a01631.html#aa0b5050ded24b08d6b0022d543d2ed47',1,'atcacert_build_state_s']]], + ['is_5fgenkey_41',['is_genkey',['../a01615.html#a209ce3b19c7ebdd32847334c64a9deb2',1,'atcacert_device_loc_s']]], + ['is_5fkey_5fnomac_42',['is_key_nomac',['../a01747.html#a45ea4bd1941244391f04343f993bacf0',1,'atca_gen_dig_in_out']]], + ['is_5fslot_5flocked_43',['is_slot_locked',['../a01787.html#a1d994ea91e9234808e6f0320897ab434',1,'atca_sign_internal_in_out']]], + ['isalpha_44',['isAlpha',['../a01466.html#ga592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c'],['../a00257.html#a592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c']]], + ['isatcaerror_45',['isATCAError',['../a00356.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c'],['../a00353.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c']]], + ['isbase64_46',['isBase64',['../a00257.html#ac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c'],['../a01466.html#gac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c']]], + ['isbase64digit_47',['isBase64Digit',['../a00257.html#ad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c'],['../a01466.html#gad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c']]], + ['isblankspace_48',['isBlankSpace',['../a00257.html#a04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c'],['../a01466.html#ga04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c']]], + ['isdigit_49',['isDigit',['../a00257.html#a7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c'],['../a01466.html#ga7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c']]], + ['ishex_50',['isHex',['../a00257.html#ab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c'],['../a01466.html#gab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c']]], + ['ishexalpha_51',['isHexAlpha',['../a00257.html#a78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c'],['../a01466.html#ga78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c']]], + ['ishexdigit_52',['isHexDigit',['../a00257.html#a39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c'],['../a01466.html#ga39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c']]] ]; diff --git a/search/all_a.js b/search/all_a.js index 3f7456f19..ef857b105 100644 --- a/search/all_a.js +++ b/search/all_a.js @@ -1,4 +1,4 @@ var searchData= [ - ['json_20web_20token_20_28jwt_29_20methods_20_28atca_5fjwt_5f_29_0',['JSON Web Token (JWT) methods (atca_jwt_)',['../a01448.html',1,'']]] + ['json_20web_20token_20_28jwt_29_20methods_20_28atca_5fjwt_5f_29_0',['JSON Web Token (JWT) methods (atca_jwt_)',['../a01475.html',1,'']]] ]; diff --git a/search/all_b.js b/search/all_b.js index bd9a0154a..8aec41f70 100644 --- a/search/all_b.js +++ b/search/all_b.js @@ -1,48 +1,48 @@ var searchData= [ - ['kdf_5fdetails_5faes_5fkey_5floc_5fmask_0',['KDF_DETAILS_AES_KEY_LOC_MASK',['../a00350.html#a77a516ab645b681ad7861d8b74e4a115',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5finput_1',['KDF_DETAILS_HKDF_MSG_LOC_INPUT',['../a00350.html#ae2b34b443ce2e0f285dd8d6f34f84d70',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fiv_2',['KDF_DETAILS_HKDF_MSG_LOC_IV',['../a00350.html#a53650471a7eef96ce0ef00cb6b8a6a9b',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fmask_3',['KDF_DETAILS_HKDF_MSG_LOC_MASK',['../a00350.html#aa5b4cb5be95861466fff33fe0d5a9020',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fslot_4',['KDF_DETAILS_HKDF_MSG_LOC_SLOT',['../a00350.html#a8d5f52e7dbb1ea5308517365bbec87b5',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5ftempkey_5',['KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY',['../a00350.html#abae30386c46658676cf11de7bec27138',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fzero_5fkey_6',['KDF_DETAILS_HKDF_ZERO_KEY',['../a00350.html#ae16e61d55b371f9c5e31f08f680de609',1,'calib_command.h']]], - ['kdf_5fdetails_5fidx_7',['KDF_DETAILS_IDX',['../a00350.html#a56306fca73ae0f43053787bafdac6a94',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5faead_5fmask_8',['KDF_DETAILS_PRF_AEAD_MASK',['../a00350.html#a71bd7b920718c3bbf99d78eda569018c',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5faead_5fmode0_9',['KDF_DETAILS_PRF_AEAD_MODE0',['../a00350.html#a77402cc8f4efbba6119bd57717c34ce4',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5faead_5fmode1_10',['KDF_DETAILS_PRF_AEAD_MODE1',['../a00350.html#a696c55d8590e9d1ac2571d6921f27573',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f16_11',['KDF_DETAILS_PRF_KEY_LEN_16',['../a00350.html#af83ceba3654b1b76e216402a023c1578',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f32_12',['KDF_DETAILS_PRF_KEY_LEN_32',['../a00350.html#aadcf0e639c6da291ddcb7fed49f1f967',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f48_13',['KDF_DETAILS_PRF_KEY_LEN_48',['../a00350.html#aae92bdb9d72ad6bd2193cbf0e672d46e',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f64_14',['KDF_DETAILS_PRF_KEY_LEN_64',['../a00350.html#a1519bbd506095c4db25aad15bbc0735b',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5fmask_15',['KDF_DETAILS_PRF_KEY_LEN_MASK',['../a00350.html#af42b60e97bdf4bf0338b8a5ce420fdc5',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5ftarget_5flen_5f32_16',['KDF_DETAILS_PRF_TARGET_LEN_32',['../a00350.html#ac049629a826435702055cc8279db76bb',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5ftarget_5flen_5f64_17',['KDF_DETAILS_PRF_TARGET_LEN_64',['../a00350.html#a0b47a5e9928b7f3c91db64a9b80fde8b',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5ftarget_5flen_5fmask_18',['KDF_DETAILS_PRF_TARGET_LEN_MASK',['../a00350.html#a32c642907f4f326893fb6fccfce18707',1,'calib_command.h']]], - ['kdf_5fdetails_5fsize_19',['KDF_DETAILS_SIZE',['../a00350.html#a2e025044ab9693b267e79f80e0a69cb1',1,'calib_command.h']]], - ['kdf_5fkeyid_5fidx_20',['KDF_KEYID_IDX',['../a00350.html#ae814b4e63476d137bf226537cb2ff0fc',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5faes_21',['KDF_MODE_ALG_AES',['../a00350.html#aee08925a21e8dbf05f8557617e3f610e',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5fhkdf_22',['KDF_MODE_ALG_HKDF',['../a00350.html#a59b230043c3cd1fa0deafac6225238cb',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5fmask_23',['KDF_MODE_ALG_MASK',['../a00350.html#a90f529642e87edae132421b3777ec4b1',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5fprf_24',['KDF_MODE_ALG_PRF',['../a00350.html#a41ad765834ce2cf37241f79b80857f79',1,'calib_command.h']]], - ['kdf_5fmode_5fidx_25',['KDF_MODE_IDX',['../a00350.html#a959e54d571acf81b608d5c6d535b0510',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5faltkeybuf_26',['KDF_MODE_SOURCE_ALTKEYBUF',['../a00350.html#aa3f4cdb700e47737058c174a1f156707',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5fmask_27',['KDF_MODE_SOURCE_MASK',['../a00350.html#addd73b0088cc98d40eaf8b3370f2fc8e',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5fslot_28',['KDF_MODE_SOURCE_SLOT',['../a00350.html#a3b69501fcc3e0cea0197fc0f6107916a',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5ftempkey_29',['KDF_MODE_SOURCE_TEMPKEY',['../a00350.html#a43cad9606d9b7c0e5875b1fa66108eb8',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5ftempkey_5fup_30',['KDF_MODE_SOURCE_TEMPKEY_UP',['../a00350.html#a3785654ccbe309a87213aedb001ca39d',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5faltkeybuf_31',['KDF_MODE_TARGET_ALTKEYBUF',['../a00350.html#afeaf2094813c3184f0f128c37e3297dd',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5fmask_32',['KDF_MODE_TARGET_MASK',['../a00350.html#a97828be629e8f11561b58cb434c18b21',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5foutput_33',['KDF_MODE_TARGET_OUTPUT',['../a00350.html#afa19443ca4e054e38a7599c37575678d',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5foutput_5fenc_34',['KDF_MODE_TARGET_OUTPUT_ENC',['../a00350.html#a28cccb87be4305fa9469c26b0ca341e8',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5fslot_35',['KDF_MODE_TARGET_SLOT',['../a00350.html#a05c0e401be347897d9573ba58492e570',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5ftempkey_36',['KDF_MODE_TARGET_TEMPKEY',['../a00350.html#abdbb7fc88ccf13d556dce6de3df9ce1b',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5ftempkey_5fup_37',['KDF_MODE_TARGET_TEMPKEY_UP',['../a00350.html#ad7e0df789060db2a9e8339972eac2482',1,'calib_command.h']]], - ['key_38',['key',['../a01447.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0',1,'atca_hmac_in_out::key()'],['../a01447.html#ga84ee714046fea52fb6b334e37b958c89',1,'atca_mac_in_out::key()']]], - ['key_5fconf_39',['key_conf',['../a01728.html#a089cd58d7f5518ee9016eb40c281bdfc',1,'atca_gen_dig_in_out']]], - ['key_5fconfig_40',['key_config',['../a01768.html#a534292cebeb2a65e3198e30061b2c35b',1,'atca_sign_internal_in_out']]], - ['key_5fid_41',['key_id',['../a01768.html#a426f70e97a2f191f021227175699185c',1,'atca_sign_internal_in_out::key_id()'],['../a01764.html#a2582ecc282bd3d712918e6109a18c7d2',1,'atca_gen_key_in_out::key_id()'],['../a01752.html#a11807b6f83083ad17c66640c77c78973',1,'atca_check_mac_in_out::key_id()'],['../a01736.html#a213cc14f2d1c67be382cb8918aca4362',1,'atca_write_mac_in_out::key_id()'],['../a01728.html#a8bb5e1f0ea943f4749ebf6faa450288b',1,'atca_gen_dig_in_out::key_id()'],['../a01447.html#ga10f04328eda5cffcea79652ac3509c2d',1,'atca_hmac_in_out::key_id()'],['../a01447.html#ga326ed9df4c9b966616e0b1a73f1b2796',1,'atca_mac_in_out::key_id()'],['../a01708.html#ad4c4854451abd367cf8a13aad5f6372b',1,'atca_verify_mac::key_id()'],['../a01692.html#a70b94559475530db2be60e9d30758098',1,'atca_temp_key::key_id()']]], - ['keyconfig_42',['KeyConfig',['../a02292.html',1,'cryptoauthlib::device']]], + ['kdf_5fdetails_5faes_5fkey_5floc_5fmask_0',['KDF_DETAILS_AES_KEY_LOC_MASK',['../a00356.html#a77a516ab645b681ad7861d8b74e4a115',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5finput_1',['KDF_DETAILS_HKDF_MSG_LOC_INPUT',['../a00356.html#ae2b34b443ce2e0f285dd8d6f34f84d70',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fiv_2',['KDF_DETAILS_HKDF_MSG_LOC_IV',['../a00356.html#a53650471a7eef96ce0ef00cb6b8a6a9b',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fmask_3',['KDF_DETAILS_HKDF_MSG_LOC_MASK',['../a00356.html#aa5b4cb5be95861466fff33fe0d5a9020',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fslot_4',['KDF_DETAILS_HKDF_MSG_LOC_SLOT',['../a00356.html#a8d5f52e7dbb1ea5308517365bbec87b5',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5ftempkey_5',['KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY',['../a00356.html#abae30386c46658676cf11de7bec27138',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fzero_5fkey_6',['KDF_DETAILS_HKDF_ZERO_KEY',['../a00356.html#ae16e61d55b371f9c5e31f08f680de609',1,'calib_command.h']]], + ['kdf_5fdetails_5fidx_7',['KDF_DETAILS_IDX',['../a00356.html#a56306fca73ae0f43053787bafdac6a94',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5faead_5fmask_8',['KDF_DETAILS_PRF_AEAD_MASK',['../a00356.html#a71bd7b920718c3bbf99d78eda569018c',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5faead_5fmode0_9',['KDF_DETAILS_PRF_AEAD_MODE0',['../a00356.html#a77402cc8f4efbba6119bd57717c34ce4',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5faead_5fmode1_10',['KDF_DETAILS_PRF_AEAD_MODE1',['../a00356.html#a696c55d8590e9d1ac2571d6921f27573',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f16_11',['KDF_DETAILS_PRF_KEY_LEN_16',['../a00356.html#af83ceba3654b1b76e216402a023c1578',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f32_12',['KDF_DETAILS_PRF_KEY_LEN_32',['../a00356.html#aadcf0e639c6da291ddcb7fed49f1f967',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f48_13',['KDF_DETAILS_PRF_KEY_LEN_48',['../a00356.html#aae92bdb9d72ad6bd2193cbf0e672d46e',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f64_14',['KDF_DETAILS_PRF_KEY_LEN_64',['../a00356.html#a1519bbd506095c4db25aad15bbc0735b',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5fmask_15',['KDF_DETAILS_PRF_KEY_LEN_MASK',['../a00356.html#af42b60e97bdf4bf0338b8a5ce420fdc5',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5ftarget_5flen_5f32_16',['KDF_DETAILS_PRF_TARGET_LEN_32',['../a00356.html#ac049629a826435702055cc8279db76bb',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5ftarget_5flen_5f64_17',['KDF_DETAILS_PRF_TARGET_LEN_64',['../a00356.html#a0b47a5e9928b7f3c91db64a9b80fde8b',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5ftarget_5flen_5fmask_18',['KDF_DETAILS_PRF_TARGET_LEN_MASK',['../a00356.html#a32c642907f4f326893fb6fccfce18707',1,'calib_command.h']]], + ['kdf_5fdetails_5fsize_19',['KDF_DETAILS_SIZE',['../a00356.html#a2e025044ab9693b267e79f80e0a69cb1',1,'calib_command.h']]], + ['kdf_5fkeyid_5fidx_20',['KDF_KEYID_IDX',['../a00356.html#ae814b4e63476d137bf226537cb2ff0fc',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5faes_21',['KDF_MODE_ALG_AES',['../a00356.html#aee08925a21e8dbf05f8557617e3f610e',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5fhkdf_22',['KDF_MODE_ALG_HKDF',['../a00356.html#a59b230043c3cd1fa0deafac6225238cb',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5fmask_23',['KDF_MODE_ALG_MASK',['../a00356.html#a90f529642e87edae132421b3777ec4b1',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5fprf_24',['KDF_MODE_ALG_PRF',['../a00356.html#a41ad765834ce2cf37241f79b80857f79',1,'calib_command.h']]], + ['kdf_5fmode_5fidx_25',['KDF_MODE_IDX',['../a00356.html#a959e54d571acf81b608d5c6d535b0510',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5faltkeybuf_26',['KDF_MODE_SOURCE_ALTKEYBUF',['../a00356.html#aa3f4cdb700e47737058c174a1f156707',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5fmask_27',['KDF_MODE_SOURCE_MASK',['../a00356.html#addd73b0088cc98d40eaf8b3370f2fc8e',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5fslot_28',['KDF_MODE_SOURCE_SLOT',['../a00356.html#a3b69501fcc3e0cea0197fc0f6107916a',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5ftempkey_29',['KDF_MODE_SOURCE_TEMPKEY',['../a00356.html#a43cad9606d9b7c0e5875b1fa66108eb8',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5ftempkey_5fup_30',['KDF_MODE_SOURCE_TEMPKEY_UP',['../a00356.html#a3785654ccbe309a87213aedb001ca39d',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5faltkeybuf_31',['KDF_MODE_TARGET_ALTKEYBUF',['../a00356.html#afeaf2094813c3184f0f128c37e3297dd',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5fmask_32',['KDF_MODE_TARGET_MASK',['../a00356.html#a97828be629e8f11561b58cb434c18b21',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5foutput_33',['KDF_MODE_TARGET_OUTPUT',['../a00356.html#afa19443ca4e054e38a7599c37575678d',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5foutput_5fenc_34',['KDF_MODE_TARGET_OUTPUT_ENC',['../a00356.html#a28cccb87be4305fa9469c26b0ca341e8',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5fslot_35',['KDF_MODE_TARGET_SLOT',['../a00356.html#a05c0e401be347897d9573ba58492e570',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5ftempkey_36',['KDF_MODE_TARGET_TEMPKEY',['../a00356.html#abdbb7fc88ccf13d556dce6de3df9ce1b',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5ftempkey_5fup_37',['KDF_MODE_TARGET_TEMPKEY_UP',['../a00356.html#ad7e0df789060db2a9e8339972eac2482',1,'calib_command.h']]], + ['key_38',['key',['../a01474.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0',1,'atca_hmac_in_out::key()'],['../a01474.html#ga84ee714046fea52fb6b334e37b958c89',1,'atca_mac_in_out::key()']]], + ['key_5fconf_39',['key_conf',['../a01747.html#a089cd58d7f5518ee9016eb40c281bdfc',1,'atca_gen_dig_in_out']]], + ['key_5fconfig_40',['key_config',['../a01787.html#a534292cebeb2a65e3198e30061b2c35b',1,'atca_sign_internal_in_out']]], + ['key_5fid_41',['key_id',['../a01787.html#a426f70e97a2f191f021227175699185c',1,'atca_sign_internal_in_out::key_id()'],['../a01783.html#a2582ecc282bd3d712918e6109a18c7d2',1,'atca_gen_key_in_out::key_id()'],['../a01771.html#a11807b6f83083ad17c66640c77c78973',1,'atca_check_mac_in_out::key_id()'],['../a01755.html#a213cc14f2d1c67be382cb8918aca4362',1,'atca_write_mac_in_out::key_id()'],['../a01747.html#a8bb5e1f0ea943f4749ebf6faa450288b',1,'atca_gen_dig_in_out::key_id()'],['../a01474.html#ga10f04328eda5cffcea79652ac3509c2d',1,'atca_hmac_in_out::key_id()'],['../a01474.html#ga326ed9df4c9b966616e0b1a73f1b2796',1,'atca_mac_in_out::key_id()'],['../a01727.html#ad4c4854451abd367cf8a13aad5f6372b',1,'atca_verify_mac::key_id()'],['../a01711.html#a70b94559475530db2be60e9d30758098',1,'atca_temp_key::key_id()']]], + ['keyconfig_42',['KeyConfig',['../a02327.html',1,'cryptoauthlib::device']]], ['kit_5fhost_5fformat_5fresponse_43',['kit_host_format_response',['../a00017.html#ac6f6e7798cc371e9667889cbbb4af330',1,'kit_host_format_response(uint8_t *response, size_t rlen, ATCA_STATUS status, uint8_t *data, size_t dlen): ascii_kit_host.c'],['../a00020.html#ac6f6e7798cc371e9667889cbbb4af330',1,'kit_host_format_response(uint8_t *response, size_t rlen, ATCA_STATUS status, uint8_t *data, size_t dlen): ascii_kit_host.c']]], ['kit_5fhost_5finit_44',['kit_host_init',['../a00017.html#a9dcff757a8d30cec3b1e209351b16358',1,'kit_host_init(ascii_kit_host_context_t *ctx, ATCAIfaceCfg *iface[], const size_t iface_count, const atca_hal_kit_phy_t *phy, const uint32_t flags): ascii_kit_host.c'],['../a00020.html#a9dcff757a8d30cec3b1e209351b16358',1,'kit_host_init(ascii_kit_host_context_t *ctx, ATCAIfaceCfg *iface[], const size_t iface_count, const atca_hal_kit_phy_t *phy, const uint32_t flags): ascii_kit_host.c']]], ['kit_5fhost_5finit_5fphy_45',['kit_host_init_phy',['../a00017.html#ac79cbb36e6f0efe9196fa9131ccdb69b',1,'kit_host_init_phy(atca_hal_kit_phy_t *phy, ATCAIface iface): ascii_kit_host.c'],['../a00020.html#ac79cbb36e6f0efe9196fa9131ccdb69b',1,'kit_host_init_phy(atca_hal_kit_phy_t *phy, ATCAIface iface): ascii_kit_host.c']]], @@ -50,10 +50,10 @@ var searchData= ['kit_5fhost_5fprocess_5fcmd_47',['kit_host_process_cmd',['../a00017.html#ac00c465f600b5dd1dcb85eddff61d93a',1,'kit_host_process_cmd(ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen): ascii_kit_host.c'],['../a00020.html#ac00c465f600b5dd1dcb85eddff61d93a',1,'kit_host_process_cmd(ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen): ascii_kit_host.c']]], ['kit_5fhost_5fprocess_5fline_48',['kit_host_process_line',['../a00017.html#a2067eeb11f190a7fb64217f917c3ff76',1,'kit_host_process_line(ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen): ascii_kit_host.c'],['../a00020.html#a2067eeb11f190a7fb64217f917c3ff76',1,'kit_host_process_line(ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen): ascii_kit_host.c']]], ['kit_5fhost_5ftask_49',['kit_host_task',['../a00017.html#ac2fa4cf8af951688c4be97cca0d23b71',1,'kit_host_task(ascii_kit_host_context_t *ctx): ascii_kit_host.c'],['../a00020.html#ac2fa4cf8af951688c4be97cca0d23b71',1,'kit_host_task(ascii_kit_host_context_t *ctx): ascii_kit_host.c']]], - ['kit_5fid_5ffrom_5fdevtype_50',['kit_id_from_devtype',['../a01446.html#ga554072f32204a0eb8d7b8c7931e43343',1,'kit_protocol.c']]], - ['kit_5finterface_51',['kit_interface',['../a01446.html#ga33fe33933fb59dde6e6fb8975da6c12d',1,'kit_protocol.c']]], - ['kit_5finterface_5ffrom_5fkittype_52',['kit_interface_from_kittype',['../a01446.html#ga31075898964b61f4877ba882477b71c3',1,'kit_protocol.c']]], + ['kit_5fid_5ffrom_5fdevtype_50',['kit_id_from_devtype',['../a01473.html#ga554072f32204a0eb8d7b8c7931e43343',1,'kit_protocol.c']]], + ['kit_5finterface_51',['kit_interface',['../a01473.html#ga33fe33933fb59dde6e6fb8975da6c12d',1,'kit_protocol.c']]], + ['kit_5finterface_5ffrom_5fkittype_52',['kit_interface_from_kittype',['../a01473.html#ga31075898964b61f4877ba882477b71c3',1,'kit_protocol.c']]], ['kit_5fmessage_5fsize_5fmax_53',['KIT_MESSAGE_SIZE_MAX',['../a00020.html#a5ef47c1942cca10be5c5bf17841c8611',1,'ascii_kit_host.h']]], - ['kit_5fprotocol_2ec_54',['kit_protocol.c',['../a00629.html',1,'']]], - ['kit_5fprotocol_2eh_55',['kit_protocol.h',['../a00614.html',1,'']]] + ['kit_5fprotocol_2ec_54',['kit_protocol.c',['../a00644.html',1,'']]], + ['kit_5fprotocol_2eh_55',['kit_protocol.h',['../a00629.html',1,'']]] ]; diff --git a/search/all_c.js b/search/all_c.js index f07a9a7ce..35882cad6 100644 --- a/search/all_c.js +++ b/search/all_c.js @@ -1,24 +1,24 @@ var searchData= [ - ['len_0',['len',['../a01612.html#a9e07b6d33b7cdc866e6625c18d9c5f92',1,'cal_buffer_s']]], - ['lib_5flock_1',['lib_lock',['../a01840.html#abef716f125614c97e00abcd3e62b98c2',1,'pkcs11_lib_ctx_s']]], - ['lib_5fstrcasestr_2',['lib_strcasestr',['../a00251.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c'],['../a00260.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c']]], - ['lib_5ftolower_3',['lib_tolower',['../a00251.html#ada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c'],['../a01439.html#gada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c']]], - ['lib_5ftoupper_4',['lib_toupper',['../a00251.html#a13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c'],['../a01439.html#ga13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c']]], - ['libraryloaderror_5',['LibraryLoadError',['../a02312.html',1,'cryptoauthlib::exceptions']]], - ['librarymemoryerror_6',['LibraryMemoryError',['../a02436.html',1,'cryptoauthlib::exceptions']]], - ['librarynotinitialized_7',['LibraryNotInitialized',['../a02444.html',1,'cryptoauthlib::exceptions']]], - ['license_8',['License',['../a02825.html',1,'']]], - ['load_5fcryptoauthlib_9',['load_cryptoauthlib',['../a01459.html#aa9a021d0bc0272e702a7de499b76683c',1,'cryptoauthlib::library']]], - ['lock_5fcount_10',['LOCK_COUNT',['../a00350.html#a8a5cce3cbccf46b91c8065559ad1a082',1,'calib_command.h']]], - ['lock_5frsp_5fsize_11',['LOCK_RSP_SIZE',['../a00350.html#a773dce573d9ff453d2f49aa7fc48e210',1,'calib_command.h']]], - ['lock_5fsummary_5fidx_12',['LOCK_SUMMARY_IDX',['../a00350.html#a6bd6b85614792b8dabb6432f7a48151e',1,'calib_command.h']]], - ['lock_5fzone_5fca2_5fconfig_13',['LOCK_ZONE_CA2_CONFIG',['../a00350.html#a28d91425d00258aed31192c90f3dbd2e',1,'calib_command.h']]], - ['lock_5fzone_5fca2_5fdata_14',['LOCK_ZONE_CA2_DATA',['../a00350.html#ac06e8b2502bc78fda0d33dcd3e11525a',1,'calib_command.h']]], - ['lock_5fzone_5fconfig_15',['LOCK_ZONE_CONFIG',['../a00350.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39',1,'calib_command.h']]], - ['lock_5fzone_5fdata_16',['LOCK_ZONE_DATA',['../a00350.html#a1dedbfae86a6c38085070160696e00bb',1,'calib_command.h']]], - ['lock_5fzone_5fdata_5fslot_17',['LOCK_ZONE_DATA_SLOT',['../a00350.html#af5a93b147dd08b111b348edd1bc82fa5',1,'calib_command.h']]], - ['lock_5fzone_5fidx_18',['LOCK_ZONE_IDX',['../a00350.html#aa72601de2238c09393f120f68abf66a4',1,'calib_command.h']]], - ['lock_5fzone_5fmask_19',['LOCK_ZONE_MASK',['../a00350.html#a71b3c35d021e0ac507fdd6cd9538467f',1,'calib_command.h']]], - ['lock_5fzone_5fno_5fcrc_20',['LOCK_ZONE_NO_CRC',['../a00350.html#a29b582e5069538ee92f5bcd6d1356255',1,'calib_command.h']]] + ['len_0',['len',['../a01635.html#a9e07b6d33b7cdc866e6625c18d9c5f92',1,'cal_buffer_s']]], + ['lib_5flock_1',['lib_lock',['../a01867.html#abef716f125614c97e00abcd3e62b98c2',1,'pkcs11_lib_ctx_s']]], + ['lib_5fstrcasestr_2',['lib_strcasestr',['../a00257.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c'],['../a00266.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c']]], + ['lib_5ftolower_3',['lib_tolower',['../a00257.html#ada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c'],['../a01466.html#gada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c']]], + ['lib_5ftoupper_4',['lib_toupper',['../a00257.html#a13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c'],['../a01466.html#ga13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c']]], + ['libraryloaderror_5',['LibraryLoadError',['../a02347.html',1,'cryptoauthlib::exceptions']]], + ['librarymemoryerror_6',['LibraryMemoryError',['../a02471.html',1,'cryptoauthlib::exceptions']]], + ['librarynotinitialized_7',['LibraryNotInitialized',['../a02479.html',1,'cryptoauthlib::exceptions']]], + ['license_8',['License',['../a02860.html',1,'']]], + ['load_5fcryptoauthlib_9',['load_cryptoauthlib',['../a01486.html#aa9a021d0bc0272e702a7de499b76683c',1,'cryptoauthlib::library']]], + ['lock_5fcount_10',['LOCK_COUNT',['../a00356.html#a8a5cce3cbccf46b91c8065559ad1a082',1,'calib_command.h']]], + ['lock_5frsp_5fsize_11',['LOCK_RSP_SIZE',['../a00356.html#a773dce573d9ff453d2f49aa7fc48e210',1,'calib_command.h']]], + ['lock_5fsummary_5fidx_12',['LOCK_SUMMARY_IDX',['../a00356.html#a6bd6b85614792b8dabb6432f7a48151e',1,'calib_command.h']]], + ['lock_5fzone_5fca2_5fconfig_13',['LOCK_ZONE_CA2_CONFIG',['../a00356.html#a28d91425d00258aed31192c90f3dbd2e',1,'calib_command.h']]], + ['lock_5fzone_5fca2_5fdata_14',['LOCK_ZONE_CA2_DATA',['../a00356.html#ac06e8b2502bc78fda0d33dcd3e11525a',1,'calib_command.h']]], + ['lock_5fzone_5fconfig_15',['LOCK_ZONE_CONFIG',['../a00356.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39',1,'calib_command.h']]], + ['lock_5fzone_5fdata_16',['LOCK_ZONE_DATA',['../a00356.html#a1dedbfae86a6c38085070160696e00bb',1,'calib_command.h']]], + ['lock_5fzone_5fdata_5fslot_17',['LOCK_ZONE_DATA_SLOT',['../a00356.html#af5a93b147dd08b111b348edd1bc82fa5',1,'calib_command.h']]], + ['lock_5fzone_5fidx_18',['LOCK_ZONE_IDX',['../a00356.html#aa72601de2238c09393f120f68abf66a4',1,'calib_command.h']]], + ['lock_5fzone_5fmask_19',['LOCK_ZONE_MASK',['../a00356.html#a71b3c35d021e0ac507fdd6cd9538467f',1,'calib_command.h']]], + ['lock_5fzone_5fno_5fcrc_20',['LOCK_ZONE_NO_CRC',['../a00356.html#a29b582e5069538ee92f5bcd6d1356255',1,'calib_command.h']]] ]; diff --git a/search/all_d.js b/search/all_d.js index 218c6b629..cc8088300 100644 --- a/search/all_d.js +++ b/search/all_d.js @@ -1,35 +1,35 @@ var searchData= [ - ['mac_0',['mac',['../a01708.html#afc99cd20d6193df126ae2b32b42f7546',1,'atca_verify_mac::mac()'],['../a01716.html#aeb4c9a28028bd625ac3650b39392cf07',1,'atca_secureboot_mac_in_out::mac()'],['../a01744.html#a0576f1886490bbb3656b420f5bb65e65',1,'atca_derive_key_mac_in_out::mac()']]], - ['mac_5fchallenge_5fidx_1',['MAC_CHALLENGE_IDX',['../a00350.html#a427e37c74bad23b251deb2274de6d703',1,'calib_command.h']]], - ['mac_5fchallenge_5fsize_2',['MAC_CHALLENGE_SIZE',['../a00350.html#a921afead5f0a35822bc8263c3a1e1761',1,'calib_command.h']]], - ['mac_5fcount_5flong_3',['MAC_COUNT_LONG',['../a00350.html#aa466dfdf174c134a11f578d1731990ef',1,'calib_command.h']]], - ['mac_5fcount_5fshort_4',['MAC_COUNT_SHORT',['../a00350.html#a94d9bf52f1a6c7af3943eb92dd3967ef',1,'calib_command.h']]], - ['mac_5fkeyid_5fidx_5',['MAC_KEYID_IDX',['../a00350.html#adb6b7f50e3d8af5d2de64f3bd4c83332',1,'calib_command.h']]], - ['mac_5fmode_5fblock1_5ftempkey_6',['MAC_MODE_BLOCK1_TEMPKEY',['../a00350.html#a1ed0d355896761d1cfef4d3b225fefae',1,'calib_command.h']]], - ['mac_5fmode_5fblock2_5ftempkey_7',['MAC_MODE_BLOCK2_TEMPKEY',['../a00350.html#aaf599e8acc392c2ef07eba93eafc474d',1,'calib_command.h']]], - ['mac_5fmode_5fchallenge_8',['MAC_MODE_CHALLENGE',['../a00350.html#a876298788a9270561dc279b7d4c92cb8',1,'calib_command.h']]], - ['mac_5fmode_5fidx_9',['MAC_MODE_IDX',['../a00350.html#a4b1f89e4c4a24c058fddb3d936e76017',1,'calib_command.h']]], - ['mac_5fmode_5finclude_5fotp_5f64_10',['MAC_MODE_INCLUDE_OTP_64',['../a00350.html#a0bd9324a824410d7787c6fcd6e29d8a2',1,'calib_command.h']]], - ['mac_5fmode_5finclude_5fotp_5f88_11',['MAC_MODE_INCLUDE_OTP_88',['../a00350.html#ae5da70c1f37ee40a0cf4edc459d5840a',1,'calib_command.h']]], - ['mac_5fmode_5finclude_5fsn_12',['MAC_MODE_INCLUDE_SN',['../a00350.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5',1,'calib_command.h']]], - ['mac_5fmode_5fmask_13',['MAC_MODE_MASK',['../a00350.html#a6e6b931cf58debb1a23b87c16c7b4d47',1,'calib_command.h']]], - ['mac_5fmode_5fpassthrough_14',['MAC_MODE_PASSTHROUGH',['../a00350.html#a41beaf29ad684f5fae6046c689d6bcf1',1,'calib_command.h']]], - ['mac_5fmode_5fptnonce_5ftempkey_15',['MAC_MODE_PTNONCE_TEMPKEY',['../a00350.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2',1,'calib_command.h']]], - ['mac_5fmode_5fsource_5fflag_5fmatch_16',['MAC_MODE_SOURCE_FLAG_MATCH',['../a00350.html#adffd78899cf3d3dd18afc5ce3c54acb4',1,'calib_command.h']]], - ['mac_5fmode_5fuse_5ftempkey_5fmask_17',['MAC_MODE_USE_TEMPKEY_MASK',['../a01447.html#ga05323075c94849bf70e84f5a5931f058',1,'atca_host.h']]], - ['mac_5frsp_5fsize_18',['MAC_RSP_SIZE',['../a00350.html#a1e34a5e5e8b86355569f958ecbaff3d4',1,'calib_command.h']]], - ['mac_5fsize_19',['MAC_SIZE',['../a00350.html#a4c987156ced719bbcf398ab6c76289c0',1,'calib_command.h']]], - ['max_5fcert_5fsize_20',['max_cert_size',['../a01608.html#a6e1cb79d9215a84f1e74c989bd0c9987',1,'atcacert_build_state_s']]], - ['max_5fswi_5fbuses_21',['MAX_SWI_BUSES',['../a01446.html#gaf9d9d027ce20f528edea144203141714',1,'MAX_SWI_BUSES(): swi_uart_samd21_asf.h'],['../a01446.html#gaf9d9d027ce20f528edea144203141714',1,'MAX_SWI_BUSES(): swi_uart_start.h']]], - ['mbedtls_20directory_20_2d_20purpose_22',['mbedtls directory - Purpose',['../a01449.html',1,'']]], - ['mbedtls_20wrapper_20methods_20_28atca_5fmbedtls_5f_29_23',['mbedTLS Wrapper methods (atca_mbedtls_)',['../a01449.html',1,'']]], - ['memory_5fparameters_24',['memory_parameters',['../a01496.html',1,'']]], - ['message_25',['message',['../a01768.html#a5649ccf733b2512db9917036a102fb14',1,'atca_sign_internal_in_out']]], - ['microchip_20cryptoauthlib_20release_20notes_26',['Microchip Cryptoauthlib Release Notes',['../a02839.html',1,'']]], - ['miface_27',['mIface',['../a01508.html#a725646466f0ea8e0982251189c15724a',1,'atca_device']]], - ['mifacecfg_28',['mIfaceCFG',['../a01584.html#a093b94b5d693f4e7a8facfc40f1443b0',1,'atca_iface']]], - ['mode_29',['mode',['../a01768.html#a2145615f3148fb8a428657fa8020aad1',1,'atca_sign_internal_in_out::mode()'],['../a01764.html#afa39cec9e8d332618910a0f519b5b48d',1,'atca_gen_key_in_out::mode()'],['../a01752.html#a0619aaead2b82313d761804f40c24926',1,'atca_check_mac_in_out::mode()'],['../a01744.html#ae33f3603840fd0bb8ada551ff168ea58',1,'atca_derive_key_mac_in_out::mode()'],['../a01740.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9',1,'atca_derive_key_in_out::mode()'],['../a01447.html#ga1616d5efe59851d97fed27b47923c786',1,'atca_hmac_in_out::mode()'],['../a01447.html#ga25187965ed87f828c98e4a20c93166e8',1,'atca_mac_in_out::mode()'],['../a01716.html#a2c6c43889156357aee27b3b09657ebd2',1,'atca_secureboot_mac_in_out::mode()'],['../a01708.html#ac90559108804dc16ac1ac91a0212bff9',1,'atca_verify_mac::mode()'],['../a01447.html#gabaedd7126cc73449d73843ef3b8958c0',1,'atca_nonce_in_out::mode()']]], - ['msg_5fdig_5fbuf_30',['msg_dig_buf',['../a01708.html#acb0498448f486070d33e121ade525c64',1,'atca_verify_mac']]], - ['multipart_5fbuf_5fen_31',['MULTIPART_BUF_EN',['../a00800.html#a4ff9c0c2785616e560c43e5312f40c0d',1,'atca_config_check.h']]] + ['mac_0',['mac',['../a01727.html#afc99cd20d6193df126ae2b32b42f7546',1,'atca_verify_mac::mac()'],['../a01735.html#aeb4c9a28028bd625ac3650b39392cf07',1,'atca_secureboot_mac_in_out::mac()'],['../a01763.html#a0576f1886490bbb3656b420f5bb65e65',1,'atca_derive_key_mac_in_out::mac()']]], + ['mac_5fchallenge_5fidx_1',['MAC_CHALLENGE_IDX',['../a00356.html#a427e37c74bad23b251deb2274de6d703',1,'calib_command.h']]], + ['mac_5fchallenge_5fsize_2',['MAC_CHALLENGE_SIZE',['../a00356.html#a921afead5f0a35822bc8263c3a1e1761',1,'calib_command.h']]], + ['mac_5fcount_5flong_3',['MAC_COUNT_LONG',['../a00356.html#aa466dfdf174c134a11f578d1731990ef',1,'calib_command.h']]], + ['mac_5fcount_5fshort_4',['MAC_COUNT_SHORT',['../a00356.html#a94d9bf52f1a6c7af3943eb92dd3967ef',1,'calib_command.h']]], + ['mac_5fkeyid_5fidx_5',['MAC_KEYID_IDX',['../a00356.html#adb6b7f50e3d8af5d2de64f3bd4c83332',1,'calib_command.h']]], + ['mac_5fmode_5fblock1_5ftempkey_6',['MAC_MODE_BLOCK1_TEMPKEY',['../a00356.html#a1ed0d355896761d1cfef4d3b225fefae',1,'calib_command.h']]], + ['mac_5fmode_5fblock2_5ftempkey_7',['MAC_MODE_BLOCK2_TEMPKEY',['../a00356.html#aaf599e8acc392c2ef07eba93eafc474d',1,'calib_command.h']]], + ['mac_5fmode_5fchallenge_8',['MAC_MODE_CHALLENGE',['../a00356.html#a876298788a9270561dc279b7d4c92cb8',1,'calib_command.h']]], + ['mac_5fmode_5fidx_9',['MAC_MODE_IDX',['../a00356.html#a4b1f89e4c4a24c058fddb3d936e76017',1,'calib_command.h']]], + ['mac_5fmode_5finclude_5fotp_5f64_10',['MAC_MODE_INCLUDE_OTP_64',['../a00356.html#a0bd9324a824410d7787c6fcd6e29d8a2',1,'calib_command.h']]], + ['mac_5fmode_5finclude_5fotp_5f88_11',['MAC_MODE_INCLUDE_OTP_88',['../a00356.html#ae5da70c1f37ee40a0cf4edc459d5840a',1,'calib_command.h']]], + ['mac_5fmode_5finclude_5fsn_12',['MAC_MODE_INCLUDE_SN',['../a00356.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5',1,'calib_command.h']]], + ['mac_5fmode_5fmask_13',['MAC_MODE_MASK',['../a00356.html#a6e6b931cf58debb1a23b87c16c7b4d47',1,'calib_command.h']]], + ['mac_5fmode_5fpassthrough_14',['MAC_MODE_PASSTHROUGH',['../a00356.html#a41beaf29ad684f5fae6046c689d6bcf1',1,'calib_command.h']]], + ['mac_5fmode_5fptnonce_5ftempkey_15',['MAC_MODE_PTNONCE_TEMPKEY',['../a00356.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2',1,'calib_command.h']]], + ['mac_5fmode_5fsource_5fflag_5fmatch_16',['MAC_MODE_SOURCE_FLAG_MATCH',['../a00356.html#adffd78899cf3d3dd18afc5ce3c54acb4',1,'calib_command.h']]], + ['mac_5fmode_5fuse_5ftempkey_5fmask_17',['MAC_MODE_USE_TEMPKEY_MASK',['../a01474.html#ga05323075c94849bf70e84f5a5931f058',1,'atca_host.h']]], + ['mac_5frsp_5fsize_18',['MAC_RSP_SIZE',['../a00356.html#a1e34a5e5e8b86355569f958ecbaff3d4',1,'calib_command.h']]], + ['mac_5fsize_19',['MAC_SIZE',['../a00356.html#a4c987156ced719bbcf398ab6c76289c0',1,'calib_command.h']]], + ['max_5fcert_5fsize_20',['max_cert_size',['../a01631.html#a6e1cb79d9215a84f1e74c989bd0c9987',1,'atcacert_build_state_s']]], + ['max_5fswi_5fbuses_21',['MAX_SWI_BUSES',['../a01473.html#gaf9d9d027ce20f528edea144203141714',1,'MAX_SWI_BUSES(): swi_uart_samd21_asf.h'],['../a01473.html#gaf9d9d027ce20f528edea144203141714',1,'MAX_SWI_BUSES(): swi_uart_start.h']]], + ['mbedtls_20directory_20_2d_20purpose_22',['mbedtls directory - Purpose',['../a01476.html',1,'']]], + ['mbedtls_20wrapper_20methods_20_28atca_5fmbedtls_5f_29_23',['mbedTLS Wrapper methods (atca_mbedtls_)',['../a01476.html',1,'']]], + ['memory_5fparameters_24',['memory_parameters',['../a01523.html',1,'']]], + ['message_25',['message',['../a01787.html#a5649ccf733b2512db9917036a102fb14',1,'atca_sign_internal_in_out']]], + ['microchip_20cryptoauthlib_20release_20notes_26',['Microchip Cryptoauthlib Release Notes',['../a02875.html',1,'']]], + ['miface_27',['mIface',['../a01531.html#a725646466f0ea8e0982251189c15724a',1,'atca_device']]], + ['mifacecfg_28',['mIfaceCFG',['../a01607.html#a093b94b5d693f4e7a8facfc40f1443b0',1,'atca_iface']]], + ['mode_29',['mode',['../a01787.html#a2145615f3148fb8a428657fa8020aad1',1,'atca_sign_internal_in_out::mode()'],['../a01783.html#afa39cec9e8d332618910a0f519b5b48d',1,'atca_gen_key_in_out::mode()'],['../a01771.html#a0619aaead2b82313d761804f40c24926',1,'atca_check_mac_in_out::mode()'],['../a01763.html#ae33f3603840fd0bb8ada551ff168ea58',1,'atca_derive_key_mac_in_out::mode()'],['../a01759.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9',1,'atca_derive_key_in_out::mode()'],['../a01474.html#ga1616d5efe59851d97fed27b47923c786',1,'atca_hmac_in_out::mode()'],['../a01474.html#ga25187965ed87f828c98e4a20c93166e8',1,'atca_mac_in_out::mode()'],['../a01735.html#a2c6c43889156357aee27b3b09657ebd2',1,'atca_secureboot_mac_in_out::mode()'],['../a01727.html#ac90559108804dc16ac1ac91a0212bff9',1,'atca_verify_mac::mode()'],['../a01474.html#gabaedd7126cc73449d73843ef3b8958c0',1,'atca_nonce_in_out::mode()']]], + ['msg_5fdig_5fbuf_30',['msg_dig_buf',['../a01727.html#acb0498448f486070d33e121ade525c64',1,'atca_verify_mac']]], + ['multipart_5fbuf_5fen_31',['MULTIPART_BUF_EN',['../a00815.html#a4ff9c0c2785616e560c43e5312f40c0d',1,'atca_config_check.h']]] ]; diff --git a/search/all_e.js b/search/all_e.js index 42345d35f..7f8c8ca77 100644 --- a/search/all_e.js +++ b/search/all_e.js @@ -1,35 +1,35 @@ var searchData= [ - ['newatcadevice_0',['newATCADevice',['../a01441.html#gad5e12e12d3030e28d75164286df9e5e9',1,'atca_device.c']]], - ['no_5fmac_5fflag_1',['no_mac_flag',['../a01692.html#ae381dabe56bdd77f48a8241050d16d82',1,'atca_temp_key']]], - ['nodevicesfounderror_2',['NoDevicesFoundError',['../a02428.html',1,'cryptoauthlib::exceptions']]], - ['nonce_5fcount_5flong_3',['NONCE_COUNT_LONG',['../a00350.html#a9a7fddf245cba834f86e0b63f2b14dc1',1,'calib_command.h']]], - ['nonce_5fcount_5flong_5f64_4',['NONCE_COUNT_LONG_64',['../a00350.html#aaffdf30ca558bdd5f772578742835306',1,'calib_command.h']]], - ['nonce_5fcount_5fshort_5',['NONCE_COUNT_SHORT',['../a00350.html#acff2b897c994e1444f8e94e638c25c74',1,'calib_command.h']]], - ['nonce_5finput_5fidx_6',['NONCE_INPUT_IDX',['../a00350.html#a98721952094435f45bffa352dd6848ad',1,'calib_command.h']]], - ['nonce_5fmode_5fgen_5fsession_5fkey_7',['NONCE_MODE_GEN_SESSION_KEY',['../a00350.html#a447491c6888534a69d8f3a5b446396f8',1,'calib_command.h']]], - ['nonce_5fmode_5fidx_8',['NONCE_MODE_IDX',['../a00350.html#a97ca81334088c297c577f4b4aaced3cf',1,'calib_command.h']]], - ['nonce_5fmode_5finput_5flen_5f32_9',['NONCE_MODE_INPUT_LEN_32',['../a00350.html#af7ee0188ab539a350a6da19fe3f34a72',1,'calib_command.h']]], - ['nonce_5fmode_5finput_5flen_5f64_10',['NONCE_MODE_INPUT_LEN_64',['../a00350.html#a54f085984c6aaf826263a755fd3243d7',1,'calib_command.h']]], - ['nonce_5fmode_5finput_5flen_5fmask_11',['NONCE_MODE_INPUT_LEN_MASK',['../a00350.html#ad83ef570608a572d2dd99e6954e14d40',1,'calib_command.h']]], - ['nonce_5fmode_5finvalid_12',['NONCE_MODE_INVALID',['../a00350.html#a7c675071c7fd650a29594c5fcc9882a1',1,'calib_command.h']]], - ['nonce_5fmode_5fmask_13',['NONCE_MODE_MASK',['../a00350.html#a98be7c54d55328daa4390a816c9bb243',1,'calib_command.h']]], - ['nonce_5fmode_5fno_5fseed_5fupdate_14',['NONCE_MODE_NO_SEED_UPDATE',['../a00350.html#ae3f2d180d7f35d9a7876a28972f2f587',1,'calib_command.h']]], - ['nonce_5fmode_5fpassthrough_15',['NONCE_MODE_PASSTHROUGH',['../a00350.html#a6132b175668ba4d6efecca5986c007c0',1,'calib_command.h']]], - ['nonce_5fmode_5fseed_5fupdate_16',['NONCE_MODE_SEED_UPDATE',['../a00350.html#a798018a4ef489e8fb0a02b5edf7e9d55',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5faltkeybuf_17',['NONCE_MODE_TARGET_ALTKEYBUF',['../a00350.html#a8ad263b7b321311a57db7600f18a555f',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5fmask_18',['NONCE_MODE_TARGET_MASK',['../a00350.html#ab887d70e4a421cf2bcab6b77feba4134',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5fmsgdigbuf_19',['NONCE_MODE_TARGET_MSGDIGBUF',['../a00350.html#a071a95b4b2048e0d879e6e13984e38fd',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5ftempkey_20',['NONCE_MODE_TARGET_TEMPKEY',['../a00350.html#ac51f4a863e071bce52c995ddae7e2144',1,'calib_command.h']]], - ['nonce_5fnumin_5fsize_21',['NONCE_NUMIN_SIZE',['../a00350.html#ad0c3da8203a3be6755e86cda96e00228',1,'calib_command.h']]], - ['nonce_5fnumin_5fsize_5fpassthrough_22',['NONCE_NUMIN_SIZE_PASSTHROUGH',['../a00350.html#ab568e0ec9f976d91d7940c227e8d73ee',1,'calib_command.h']]], - ['nonce_5fparam2_5fidx_23',['NONCE_PARAM2_IDX',['../a00350.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0',1,'calib_command.h']]], - ['nonce_5frsp_5fsize_5flong_24',['NONCE_RSP_SIZE_LONG',['../a00350.html#a7ae9dcc07ca9d990e9db6d8949ac935a',1,'calib_command.h']]], - ['nonce_5frsp_5fsize_5fshort_25',['NONCE_RSP_SIZE_SHORT',['../a00350.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675',1,'calib_command.h']]], - ['nonce_5fzero_5fcalc_5fmask_26',['NONCE_ZERO_CALC_MASK',['../a00350.html#a99bca33105a872e8a20fe199cc17219b',1,'calib_command.h']]], - ['nonce_5fzero_5fcalc_5frandom_27',['NONCE_ZERO_CALC_RANDOM',['../a00350.html#a80b8b54f333be5a587f22e2d04812de6',1,'calib_command.h']]], - ['nonce_5fzero_5fcalc_5ftempkey_28',['NONCE_ZERO_CALC_TEMPKEY',['../a00350.html#a2a2b74db24609199702267614fc31990',1,'calib_command.h']]], - ['noresponseerror_29',['NoResponseError',['../a02376.html',1,'cryptoauthlib::exceptions']]], - ['nouseflagerror_30',['NoUseFlagError',['../a02440.html',1,'cryptoauthlib::exceptions']]], - ['num_5fin_31',['num_in',['../a01447.html#ga7627ba268edc51f4e185e956bd215496',1,'atca_nonce_in_out']]] + ['newatcadevice_0',['newATCADevice',['../a01468.html#gad5e12e12d3030e28d75164286df9e5e9',1,'atca_device.c']]], + ['no_5fmac_5fflag_1',['no_mac_flag',['../a01711.html#ae381dabe56bdd77f48a8241050d16d82',1,'atca_temp_key']]], + ['nodevicesfounderror_2',['NoDevicesFoundError',['../a02463.html',1,'cryptoauthlib::exceptions']]], + ['nonce_5fcount_5flong_3',['NONCE_COUNT_LONG',['../a00356.html#a9a7fddf245cba834f86e0b63f2b14dc1',1,'calib_command.h']]], + ['nonce_5fcount_5flong_5f64_4',['NONCE_COUNT_LONG_64',['../a00356.html#aaffdf30ca558bdd5f772578742835306',1,'calib_command.h']]], + ['nonce_5fcount_5fshort_5',['NONCE_COUNT_SHORT',['../a00356.html#acff2b897c994e1444f8e94e638c25c74',1,'calib_command.h']]], + ['nonce_5finput_5fidx_6',['NONCE_INPUT_IDX',['../a00356.html#a98721952094435f45bffa352dd6848ad',1,'calib_command.h']]], + ['nonce_5fmode_5fgen_5fsession_5fkey_7',['NONCE_MODE_GEN_SESSION_KEY',['../a00356.html#a447491c6888534a69d8f3a5b446396f8',1,'calib_command.h']]], + ['nonce_5fmode_5fidx_8',['NONCE_MODE_IDX',['../a00356.html#a97ca81334088c297c577f4b4aaced3cf',1,'calib_command.h']]], + ['nonce_5fmode_5finput_5flen_5f32_9',['NONCE_MODE_INPUT_LEN_32',['../a00356.html#af7ee0188ab539a350a6da19fe3f34a72',1,'calib_command.h']]], + ['nonce_5fmode_5finput_5flen_5f64_10',['NONCE_MODE_INPUT_LEN_64',['../a00356.html#a54f085984c6aaf826263a755fd3243d7',1,'calib_command.h']]], + ['nonce_5fmode_5finput_5flen_5fmask_11',['NONCE_MODE_INPUT_LEN_MASK',['../a00356.html#ad83ef570608a572d2dd99e6954e14d40',1,'calib_command.h']]], + ['nonce_5fmode_5finvalid_12',['NONCE_MODE_INVALID',['../a00356.html#a7c675071c7fd650a29594c5fcc9882a1',1,'calib_command.h']]], + ['nonce_5fmode_5fmask_13',['NONCE_MODE_MASK',['../a00356.html#a98be7c54d55328daa4390a816c9bb243',1,'calib_command.h']]], + ['nonce_5fmode_5fno_5fseed_5fupdate_14',['NONCE_MODE_NO_SEED_UPDATE',['../a00356.html#ae3f2d180d7f35d9a7876a28972f2f587',1,'calib_command.h']]], + ['nonce_5fmode_5fpassthrough_15',['NONCE_MODE_PASSTHROUGH',['../a00356.html#a6132b175668ba4d6efecca5986c007c0',1,'calib_command.h']]], + ['nonce_5fmode_5fseed_5fupdate_16',['NONCE_MODE_SEED_UPDATE',['../a00356.html#a798018a4ef489e8fb0a02b5edf7e9d55',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5faltkeybuf_17',['NONCE_MODE_TARGET_ALTKEYBUF',['../a00356.html#a8ad263b7b321311a57db7600f18a555f',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5fmask_18',['NONCE_MODE_TARGET_MASK',['../a00356.html#ab887d70e4a421cf2bcab6b77feba4134',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5fmsgdigbuf_19',['NONCE_MODE_TARGET_MSGDIGBUF',['../a00356.html#a071a95b4b2048e0d879e6e13984e38fd',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5ftempkey_20',['NONCE_MODE_TARGET_TEMPKEY',['../a00356.html#ac51f4a863e071bce52c995ddae7e2144',1,'calib_command.h']]], + ['nonce_5fnumin_5fsize_21',['NONCE_NUMIN_SIZE',['../a00356.html#ad0c3da8203a3be6755e86cda96e00228',1,'calib_command.h']]], + ['nonce_5fnumin_5fsize_5fpassthrough_22',['NONCE_NUMIN_SIZE_PASSTHROUGH',['../a00356.html#ab568e0ec9f976d91d7940c227e8d73ee',1,'calib_command.h']]], + ['nonce_5fparam2_5fidx_23',['NONCE_PARAM2_IDX',['../a00356.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0',1,'calib_command.h']]], + ['nonce_5frsp_5fsize_5flong_24',['NONCE_RSP_SIZE_LONG',['../a00356.html#a7ae9dcc07ca9d990e9db6d8949ac935a',1,'calib_command.h']]], + ['nonce_5frsp_5fsize_5fshort_25',['NONCE_RSP_SIZE_SHORT',['../a00356.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675',1,'calib_command.h']]], + ['nonce_5fzero_5fcalc_5fmask_26',['NONCE_ZERO_CALC_MASK',['../a00356.html#a99bca33105a872e8a20fe199cc17219b',1,'calib_command.h']]], + ['nonce_5fzero_5fcalc_5frandom_27',['NONCE_ZERO_CALC_RANDOM',['../a00356.html#a80b8b54f333be5a587f22e2d04812de6',1,'calib_command.h']]], + ['nonce_5fzero_5fcalc_5ftempkey_28',['NONCE_ZERO_CALC_TEMPKEY',['../a00356.html#a2a2b74db24609199702267614fc31990',1,'calib_command.h']]], + ['noresponseerror_29',['NoResponseError',['../a02411.html',1,'cryptoauthlib::exceptions']]], + ['nouseflagerror_30',['NoUseFlagError',['../a02475.html',1,'cryptoauthlib::exceptions']]], + ['num_5fin_31',['num_in',['../a01474.html#ga7627ba268edc51f4e185e956bd215496',1,'atca_nonce_in_out']]] ]; diff --git a/search/all_f.js b/search/all_f.js index 9b1f5801a..a1232eba7 100644 --- a/search/all_f.js +++ b/search/all_f.js @@ -1,10 +1,10 @@ var searchData= [ - ['object_0',['object',['../a01856.html#a5fa3f781e1ef2c55de73d5be66214630',1,'pkcs11_object_cache_s']]], - ['offset_1',['offset',['../a01592.html#a6d4c996ba426bfb964f3c2c4d1238f3c',1,'atcacert_device_loc_s::offset()'],['../a01596.html#aee425cdec2c6c77ccb291993a6526d0b',1,'atcacert_cert_loc_s::offset()']]], - ['openssl_20directory_20_2d_20purpose_2',['openssl directory - Purpose',['../a02836.html',1,'']]], - ['other_5fdata_3',['other_data',['../a01708.html#ad89fec1f50b8e8ffc890d3683c4b5afe',1,'atca_verify_mac::other_data()'],['../a01728.html#a3b5c9fd883d9daf4d6a42bbf1aba936d',1,'atca_gen_dig_in_out::other_data()'],['../a01752.html#af2d1c007ab43e8556a917efc5bcee9c8',1,'atca_check_mac_in_out::other_data()'],['../a01764.html#a9aa171dc3ed5403822d780a2d0220d61',1,'atca_gen_key_in_out::other_data()']]], - ['otp_4',['otp',['../a01447.html#gaf07ffae9f842764c321a060ead038ac2',1,'atca_include_data_in_out::otp()'],['../a01447.html#gac9d561caddec61e481d241a88d73b653',1,'atca_mac_in_out::otp()'],['../a01447.html#gaad38386d9ec6afcdcd39eab98e2a4a1c',1,'atca_hmac_in_out::otp()'],['../a01752.html#ac97a41612246b0527ed1a242bbe28a99',1,'atca_check_mac_in_out::otp()']]], - ['out_5fnonce_5',['out_nonce',['../a01704.html#a597e62aa42a9971b98a5d76c7f1baef5',1,'atca_io_decrypt_in_out']]], - ['outnonce_5fsize_6',['OUTNONCE_SIZE',['../a00350.html#ad742aca4fbd1b833423eeb7ce90a6743',1,'calib_command.h']]] + ['object_0',['object',['../a01891.html#a5fa3f781e1ef2c55de73d5be66214630',1,'pkcs11_object_cache_s']]], + ['offset_1',['offset',['../a01615.html#a6d4c996ba426bfb964f3c2c4d1238f3c',1,'atcacert_device_loc_s::offset()'],['../a01619.html#aee425cdec2c6c77ccb291993a6526d0b',1,'atcacert_cert_loc_s::offset()']]], + ['openssl_20directory_20_2d_20purpose_2',['openssl directory - Purpose',['../a02871.html',1,'']]], + ['other_5fdata_3',['other_data',['../a01727.html#ad89fec1f50b8e8ffc890d3683c4b5afe',1,'atca_verify_mac::other_data()'],['../a01747.html#a3b5c9fd883d9daf4d6a42bbf1aba936d',1,'atca_gen_dig_in_out::other_data()'],['../a01771.html#af2d1c007ab43e8556a917efc5bcee9c8',1,'atca_check_mac_in_out::other_data()'],['../a01783.html#a9aa171dc3ed5403822d780a2d0220d61',1,'atca_gen_key_in_out::other_data()']]], + ['otp_4',['otp',['../a01474.html#gaf07ffae9f842764c321a060ead038ac2',1,'atca_include_data_in_out::otp()'],['../a01474.html#gac9d561caddec61e481d241a88d73b653',1,'atca_mac_in_out::otp()'],['../a01474.html#gaad38386d9ec6afcdcd39eab98e2a4a1c',1,'atca_hmac_in_out::otp()'],['../a01771.html#ac97a41612246b0527ed1a242bbe28a99',1,'atca_check_mac_in_out::otp()']]], + ['out_5fnonce_5',['out_nonce',['../a01723.html#a597e62aa42a9971b98a5d76c7f1baef5',1,'atca_io_decrypt_in_out']]], + ['outnonce_5fsize_6',['OUTNONCE_SIZE',['../a00356.html#ad742aca4fbd1b833423eeb7ce90a6743',1,'calib_command.h']]] ]; diff --git a/search/classes_0.js b/search/classes_0.js index 6fae3e6b6..627d3a98b 100644 --- a/search/classes_0.js +++ b/search/classes_0.js @@ -1,15 +1,15 @@ var searchData= [ - ['_5fascii_5fkit_5fhost_5fcontext_0',['_ascii_kit_host_context',['../a01480.html',1,'']]], - ['_5fatcacustom_1',['_ATCACUSTOM',['../a02492.html',1,'cryptoauthlib::iface']]], - ['_5fatcahid_2',['_ATCAHID',['../a02484.html',1,'cryptoauthlib::iface']]], - ['_5fatcai2c_3',['_ATCAI2C',['../a02468.html',1,'cryptoauthlib::iface']]], - ['_5fatcaifaceparams_4',['_ATCAIfaceParams',['../a02496.html',1,'cryptoauthlib::iface']]], - ['_5fatcakit_5',['_ATCAKIT',['../a02488.html',1,'cryptoauthlib::iface']]], - ['_5fatcaspi_6',['_ATCASPI',['../a02476.html',1,'cryptoauthlib::iface']]], - ['_5fatcaswi_7',['_ATCASWI',['../a02472.html',1,'cryptoauthlib::iface']]], - ['_5fatcauart_8',['_ATCAUART',['../a02480.html',1,'cryptoauthlib::iface']]], - ['_5fctypeiterator_9',['_CtypeIterator',['../a02508.html',1,'cryptoauthlib::library']]], - ['_5fkit_5fhost_5fmap_5fentry_10',['_kit_host_map_entry',['../a01484.html',1,'']]], - ['_5fu_5faddress_11',['_U_Address',['../a02464.html',1,'cryptoauthlib::iface']]] + ['_5fascii_5fkit_5fhost_5fcontext_0',['_ascii_kit_host_context',['../a01507.html',1,'']]], + ['_5fatcacustom_1',['_ATCACUSTOM',['../a02527.html',1,'cryptoauthlib::iface']]], + ['_5fatcahid_2',['_ATCAHID',['../a02519.html',1,'cryptoauthlib::iface']]], + ['_5fatcai2c_3',['_ATCAI2C',['../a02503.html',1,'cryptoauthlib::iface']]], + ['_5fatcaifaceparams_4',['_ATCAIfaceParams',['../a02531.html',1,'cryptoauthlib::iface']]], + ['_5fatcakit_5',['_ATCAKIT',['../a02523.html',1,'cryptoauthlib::iface']]], + ['_5fatcaspi_6',['_ATCASPI',['../a02511.html',1,'cryptoauthlib::iface']]], + ['_5fatcaswi_7',['_ATCASWI',['../a02507.html',1,'cryptoauthlib::iface']]], + ['_5fatcauart_8',['_ATCAUART',['../a02515.html',1,'cryptoauthlib::iface']]], + ['_5fctypeiterator_9',['_CtypeIterator',['../a02543.html',1,'cryptoauthlib::library']]], + ['_5fkit_5fhost_5fmap_5fentry_10',['_kit_host_map_entry',['../a01511.html',1,'']]], + ['_5fu_5faddress_11',['_U_Address',['../a02499.html',1,'cryptoauthlib::iface']]] ]; diff --git a/search/classes_1.js b/search/classes_1.js index 17c153308..0e67a35d3 100644 --- a/search/classes_1.js +++ b/search/classes_1.js @@ -1,90 +1,91 @@ var searchData= [ - ['aesenable_0',['AesEnable',['../a02244.html',1,'cryptoauthlib::device']]], - ['assertionfailure_1',['AssertionFailure',['../a02416.html',1,'cryptoauthlib::exceptions']]], - ['atca_5faes_5fcbc_5fctx_2',['atca_aes_cbc_ctx',['../a02144.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fcbcmac_5fctx_3',['atca_aes_cbcmac_ctx',['../a02168.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fccm_5fctx_4',['atca_aes_ccm_ctx',['../a02164.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fcmac_5fctx_5',['atca_aes_cmac_ctx',['../a02148.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fctr_5fctx_6',['atca_aes_ctr_ctx',['../a02152.html',1,'cryptoauthlib::atcab']]], - ['atca_5faes_5fgcm_5fctx_7',['atca_aes_gcm_ctx',['../a02160.html',1,'cryptoauthlib::atcab']]], - ['atca_5fcheck_5fmac_5fin_5fout_8',['atca_check_mac_in_out',['../a01752.html',1,'']]], - ['atca_5fdecrypt_5fin_5fout_9',['atca_decrypt_in_out',['../a01748.html',1,'']]], - ['atca_5fdelete_5fin_5fout_10',['atca_delete_in_out',['../a01776.html',1,'']]], - ['atca_5fderive_5fkey_5fin_5fout_11',['atca_derive_key_in_out',['../a01740.html',1,'']]], - ['atca_5fderive_5fkey_5fmac_5fin_5fout_12',['atca_derive_key_mac_in_out',['../a01744.html',1,'']]], - ['atca_5fdevice_13',['atca_device',['../a01508.html',1,'']]], - ['atca_5fdiversified_5fkey_5fin_5fout_14',['atca_diversified_key_in_out',['../a01732.html',1,'']]], - ['atca_5fevp_5fctx_15',['atca_evp_ctx',['../a01812.html',1,'']]], - ['atca_5fgen_5fdig_5fin_5fout_16',['atca_gen_dig_in_out',['../a01728.html',1,'']]], - ['atca_5fgen_5fkey_5fin_5fout_17',['atca_gen_key_in_out',['../a01764.html',1,'']]], - ['atca_5fhal_5fkit_5fphy_5ft_18',['atca_hal_kit_phy_t',['../a01652.html',1,'']]], - ['atca_5fhal_5flist_5fentry_5ft_19',['atca_hal_list_entry_t',['../a01648.html',1,'']]], - ['atca_5fhal_5fshm_5ft_20',['atca_hal_shm_t',['../a01656.html',1,'']]], - ['atca_5fhmac_5fin_5fout_21',['atca_hmac_in_out',['../a01724.html',1,'']]], - ['atca_5fhmac_5fsha256_5fctx_22',['atca_hmac_sha256_ctx',['../a02172.html',1,'cryptoauthlib::atcab']]], - ['atca_5fi2c_5fhost_5fs_23',['atca_i2c_host_s',['../a01668.html',1,'']]], - ['atca_5fiface_24',['atca_iface',['../a01584.html',1,'']]], - ['atca_5finclude_5fdata_5fin_5fout_25',['atca_include_data_in_out',['../a01696.html',1,'']]], - ['atca_5fio_5fdecrypt_5fin_5fout_26',['atca_io_decrypt_in_out',['../a01704.html',1,'']]], - ['atca_5fmac_5fin_5fout_27',['atca_mac_in_out',['../a01720.html',1,'']]], - ['atca_5fmbedtls_5feckey_5fs_28',['atca_mbedtls_eckey_s',['../a01808.html',1,'']]], - ['atca_5fnonce_5fin_5fout_29',['atca_nonce_in_out',['../a01700.html',1,'']]], - ['atca_5fplib_5fi2c_5fapi_30',['atca_plib_i2c_api',['../a01504.html',1,'']]], - ['atca_5fresp_5fmac_5fin_5fout_31',['atca_resp_mac_in_out',['../a01756.html',1,'']]], - ['atca_5fsecureboot_5fenc_5fin_5fout_32',['atca_secureboot_enc_in_out',['../a01712.html',1,'']]], - ['atca_5fsecureboot_5fmac_5fin_5fout_33',['atca_secureboot_mac_in_out',['../a01716.html',1,'']]], - ['atca_5fsession_5fkey_5fin_5fout_34',['atca_session_key_in_out',['../a01772.html',1,'']]], - ['atca_5fsha256_5fctx_35',['atca_sha256_ctx',['../a01616.html',1,'atca_sha256_ctx'],['../a02156.html',1,'cryptoauthlib.atcab.atca_sha256_ctx']]], - ['atca_5fsign_5finternal_5fin_5fout_36',['atca_sign_internal_in_out',['../a01768.html',1,'']]], - ['atca_5fspi_5fhost_5fs_37',['atca_spi_host_s',['../a01672.html',1,'']]], - ['atca_5ftemp_5fkey_38',['atca_temp_key',['../a01692.html',1,'']]], - ['atca_5fuart_5fhost_5fs_39',['atca_uart_host_s',['../a01676.html',1,'']]], - ['atca_5fverify_5fin_5fout_40',['atca_verify_in_out',['../a01760.html',1,'']]], - ['atca_5fverify_5fmac_41',['atca_verify_mac',['../a01708.html',1,'']]], - ['atca_5fwrite_5fmac_5fin_5fout_42',['atca_write_mac_in_out',['../a01736.html',1,'']]], - ['atcab_5fmock_43',['atcab_mock',['../a02536.html',1,'cryptoauthlib_mock']]], - ['atcac_5faes_5fcmac_5fctx_44',['atcac_aes_cmac_ctx',['../a01800.html',1,'']]], - ['atcac_5faes_5fgcm_5fctx_45',['atcac_aes_gcm_ctx',['../a01796.html',1,'']]], - ['atcac_5fhmac_5fctx_46',['atcac_hmac_ctx',['../a01792.html',1,'']]], - ['atcac_5fpk_5fctx_47',['atcac_pk_ctx',['../a01804.html',1,'']]], - ['atcac_5fsha1_5fctx_48',['atcac_sha1_ctx',['../a01784.html',1,'']]], - ['atcac_5fsha2_5f256_5fctx_49',['atcac_sha2_256_ctx',['../a01788.html',1,'']]], - ['atcac_5fx509_5fctx_50',['atcac_x509_ctx',['../a01780.html',1,'']]], - ['atcacert_5fbuild_5fstate_5fs_51',['atcacert_build_state_s',['../a01608.html',1,'']]], - ['atcacert_5fcert_5felement_5fs_52',['atcacert_cert_element_s',['../a01600.html',1,'']]], - ['atcacert_5fcert_5felement_5ft_53',['atcacert_cert_element_t',['../a02216.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fcert_5floc_5fs_54',['atcacert_cert_loc_s',['../a01596.html',1,'']]], - ['atcacert_5fcert_5floc_5ft_55',['atcacert_cert_loc_t',['../a02212.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fcert_5fsn_5fsrc_5ft_56',['atcacert_cert_sn_src_t',['../a02180.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fcert_5ftype_5ft_57',['atcacert_cert_type_t',['../a02176.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fcomp_5fdata_5ft_58',['atcacert_comp_data_t',['../a02204.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fdate_5fformat_5ft_59',['atcacert_date_format_t',['../a02192.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fdef_5fs_60',['atcacert_def_s',['../a01604.html',1,'']]], - ['atcacert_5fdef_5ft_61',['atcacert_def_t',['../a02220.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fdevice_5floc_5fs_62',['atcacert_device_loc_s',['../a01592.html',1,'']]], - ['atcacert_5fdevice_5floc_5ft_63',['atcacert_device_loc_t',['../a02208.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fdevice_5fzone_5ft_64',['atcacert_device_zone_t',['../a02184.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fstd_5fcert_5felement_5ft_65',['atcacert_std_cert_element_t',['../a02196.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5ftm_5futc_5fs_66',['atcacert_tm_utc_s',['../a01588.html',1,'']]], - ['atcacert_5ftm_5futc_5ft_67',['atcacert_tm_utc_t',['../a02224.html',1,'cryptoauthlib::atcacert']]], - ['atcacert_5ftransform_5ft_68',['atcacert_transform_t',['../a02188.html',1,'cryptoauthlib::atcacert']]], - ['atcadevicetype_69',['ATCADeviceType',['../a02460.html',1,'cryptoauthlib::iface']]], - ['atcaenum_70',['AtcaEnum',['../a02228.html',1,'cryptoauthlib::atcaenum']]], - ['atcahal_5ft_71',['ATCAHAL_t',['../a01580.html',1,'']]], - ['atcai2cmaster_72',['atcaI2Cmaster',['../a01660.html',1,'']]], - ['atcaifacecfg_73',['ATCAIfaceCfg',['../a01516.html',1,'ATCAIfaceCfg'],['../a02500.html',1,'cryptoauthlib.iface.ATCAIfaceCfg']]], - ['atcaifacetype_74',['ATCAIfaceType',['../a02452.html',1,'cryptoauthlib::iface']]], - ['atcakittype_75',['ATCAKitType',['../a02456.html',1,'cryptoauthlib::iface']]], - ['atcapacket_76',['ATCAPacket',['../a01620.html',1,'']]], - ['atcareference_77',['AtcaReference',['../a02504.html',1,'cryptoauthlib::library']]], - ['atcastructure_78',['AtcaStructure',['../a02516.html',1,'cryptoauthlib::library']]], - ['atcaswimaster_79',['atcaSWImaster',['../a01688.html',1,'']]], - ['atcaunion_80',['AtcaUnion',['../a02512.html',1,'cryptoauthlib::library']]], - ['atecc508a_5fconfig_5fs_81',['atecc508a_config_s',['../a01628.html',1,'']]], - ['atecc508aconfig_82',['Atecc508aConfig',['../a02300.html',1,'cryptoauthlib::device']]], - ['atecc608_5fconfig_5fs_83',['atecc608_config_s',['../a01632.html',1,'']]], - ['atecc608config_84',['Atecc608Config',['../a02304.html',1,'cryptoauthlib::device']]], - ['atsha204a_5fconfig_5fs_85',['atsha204a_config_s',['../a01624.html',1,'']]], - ['atsha204aconfig_86',['Atsha204aConfig',['../a02296.html',1,'cryptoauthlib::device']]] + ['aesenable_0',['AesEnable',['../a02279.html',1,'cryptoauthlib::device']]], + ['assertionfailure_1',['AssertionFailure',['../a02451.html',1,'cryptoauthlib::exceptions']]], + ['atca_5faes_5fcbc_5fctx_2',['atca_aes_cbc_ctx',['../a02179.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fcbcmac_5fctx_3',['atca_aes_cbcmac_ctx',['../a02203.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fccm_5fctx_4',['atca_aes_ccm_ctx',['../a02199.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fcmac_5fctx_5',['atca_aes_cmac_ctx',['../a02183.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fctr_5fctx_6',['atca_aes_ctr_ctx',['../a02187.html',1,'cryptoauthlib::atcab']]], + ['atca_5faes_5fgcm_5fctx_7',['atca_aes_gcm_ctx',['../a02195.html',1,'cryptoauthlib::atcab']]], + ['atca_5fcheck_5fmac_5fin_5fout_8',['atca_check_mac_in_out',['../a01771.html',1,'']]], + ['atca_5fdecrypt_5fin_5fout_9',['atca_decrypt_in_out',['../a01767.html',1,'']]], + ['atca_5fdelete_5fin_5fout_10',['atca_delete_in_out',['../a01795.html',1,'']]], + ['atca_5fderive_5fkey_5fin_5fout_11',['atca_derive_key_in_out',['../a01759.html',1,'']]], + ['atca_5fderive_5fkey_5fmac_5fin_5fout_12',['atca_derive_key_mac_in_out',['../a01763.html',1,'']]], + ['atca_5fdevice_13',['atca_device',['../a01531.html',1,'']]], + ['atca_5fdiversified_5fkey_5fin_5fout_14',['atca_diversified_key_in_out',['../a01751.html',1,'']]], + ['atca_5fevp_5fctx_15',['atca_evp_ctx',['../a01827.html',1,'']]], + ['atca_5fgen_5fdig_5fin_5fout_16',['atca_gen_dig_in_out',['../a01747.html',1,'']]], + ['atca_5fgen_5fkey_5fin_5fout_17',['atca_gen_key_in_out',['../a01783.html',1,'']]], + ['atca_5fhal_5fkit_5fphy_5ft_18',['atca_hal_kit_phy_t',['../a01671.html',1,'']]], + ['atca_5fhal_5flist_5fentry_5ft_19',['atca_hal_list_entry_t',['../a01667.html',1,'']]], + ['atca_5fhal_5fshm_5ft_20',['atca_hal_shm_t',['../a01675.html',1,'']]], + ['atca_5fhmac_5fin_5fout_21',['atca_hmac_in_out',['../a01743.html',1,'']]], + ['atca_5fhmac_5fsha256_5fctx_22',['atca_hmac_sha256_ctx',['../a02207.html',1,'cryptoauthlib::atcab']]], + ['atca_5fi2c_5fhost_5fs_23',['atca_i2c_host_s',['../a01687.html',1,'']]], + ['atca_5fiface_24',['atca_iface',['../a01607.html',1,'']]], + ['atca_5finclude_5fdata_5fin_5fout_25',['atca_include_data_in_out',['../a01715.html',1,'']]], + ['atca_5fio_5fdecrypt_5fin_5fout_26',['atca_io_decrypt_in_out',['../a01723.html',1,'']]], + ['atca_5fmac_5fin_5fout_27',['atca_mac_in_out',['../a01739.html',1,'']]], + ['atca_5fmbedtls_5feckey_5fs_28',['atca_mbedtls_eckey_s',['../a01823.html',1,'']]], + ['atca_5fnonce_5fin_5fout_29',['atca_nonce_in_out',['../a01719.html',1,'']]], + ['atca_5fresp_5fmac_5fin_5fout_30',['atca_resp_mac_in_out',['../a01775.html',1,'']]], + ['atca_5fsecureboot_5fenc_5fin_5fout_31',['atca_secureboot_enc_in_out',['../a01731.html',1,'']]], + ['atca_5fsecureboot_5fmac_5fin_5fout_32',['atca_secureboot_mac_in_out',['../a01735.html',1,'']]], + ['atca_5fsession_5fkey_5fin_5fout_33',['atca_session_key_in_out',['../a01791.html',1,'']]], + ['atca_5fsha256_5fctx_34',['atca_sha256_ctx',['../a01639.html',1,'atca_sha256_ctx'],['../a02191.html',1,'cryptoauthlib.atcab.atca_sha256_ctx']]], + ['atca_5fsign_5finternal_5fin_5fout_35',['atca_sign_internal_in_out',['../a01787.html',1,'']]], + ['atca_5fspi_5fhost_5fs_36',['atca_spi_host_s',['../a01691.html',1,'']]], + ['atca_5ftemp_5fkey_37',['atca_temp_key',['../a01711.html',1,'']]], + ['atca_5fuart_5fhost_5fs_38',['atca_uart_host_s',['../a01695.html',1,'']]], + ['atca_5fverify_5fin_5fout_39',['atca_verify_in_out',['../a01779.html',1,'']]], + ['atca_5fverify_5fmac_40',['atca_verify_mac',['../a01727.html',1,'']]], + ['atca_5fwrite_5fmac_5fin_5fout_41',['atca_write_mac_in_out',['../a01755.html',1,'']]], + ['atcab_5fmock_42',['atcab_mock',['../a02571.html',1,'cryptoauthlib_mock']]], + ['atcac_5faes_5fcmac_5fctx_43',['atcac_aes_cmac_ctx',['../a01815.html',1,'']]], + ['atcac_5faes_5fgcm_5fctx_44',['atcac_aes_gcm_ctx',['../a01811.html',1,'']]], + ['atcac_5fhmac_5fctx_45',['atcac_hmac_ctx',['../a01807.html',1,'']]], + ['atcac_5fpk_5fctx_46',['atcac_pk_ctx',['../a01819.html',1,'']]], + ['atcac_5fsha1_5fctx_47',['atcac_sha1_ctx',['../a01803.html',1,'']]], + ['atcac_5fsha2_5f256_5fctx_48',['atcac_sha2_256_ctx',['../a01831.html',1,'']]], + ['atcac_5fsha2_5f384_5fctx_49',['atcac_sha2_384_ctx',['../a01835.html',1,'']]], + ['atcac_5fsha2_5f512_5fctx_50',['atcac_sha2_512_ctx',['../a01839.html',1,'']]], + ['atcac_5fx509_5fctx_51',['atcac_x509_ctx',['../a01799.html',1,'']]], + ['atcacert_5fbuild_5fstate_5fs_52',['atcacert_build_state_s',['../a01631.html',1,'']]], + ['atcacert_5fcert_5felement_5fs_53',['atcacert_cert_element_s',['../a01623.html',1,'']]], + ['atcacert_5fcert_5felement_5ft_54',['atcacert_cert_element_t',['../a02251.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fcert_5floc_5fs_55',['atcacert_cert_loc_s',['../a01619.html',1,'']]], + ['atcacert_5fcert_5floc_5ft_56',['atcacert_cert_loc_t',['../a02247.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fcert_5fsn_5fsrc_5ft_57',['atcacert_cert_sn_src_t',['../a02215.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fcert_5ftype_5ft_58',['atcacert_cert_type_t',['../a02211.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fcomp_5fdata_5ft_59',['atcacert_comp_data_t',['../a02239.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fdate_5fformat_5ft_60',['atcacert_date_format_t',['../a02227.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fdef_5fs_61',['atcacert_def_s',['../a01627.html',1,'']]], + ['atcacert_5fdef_5ft_62',['atcacert_def_t',['../a02255.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fdevice_5floc_5fs_63',['atcacert_device_loc_s',['../a01615.html',1,'']]], + ['atcacert_5fdevice_5floc_5ft_64',['atcacert_device_loc_t',['../a02243.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fdevice_5fzone_5ft_65',['atcacert_device_zone_t',['../a02219.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fstd_5fcert_5felement_5ft_66',['atcacert_std_cert_element_t',['../a02231.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5ftm_5futc_5fs_67',['atcacert_tm_utc_s',['../a01611.html',1,'']]], + ['atcacert_5ftm_5futc_5ft_68',['atcacert_tm_utc_t',['../a02259.html',1,'cryptoauthlib::atcacert']]], + ['atcacert_5ftransform_5ft_69',['atcacert_transform_t',['../a02223.html',1,'cryptoauthlib::atcacert']]], + ['atcadevicetype_70',['ATCADeviceType',['../a02495.html',1,'cryptoauthlib::iface']]], + ['atcaenum_71',['AtcaEnum',['../a02263.html',1,'cryptoauthlib::atcaenum']]], + ['atcahal_5ft_72',['ATCAHAL_t',['../a01603.html',1,'']]], + ['atcai2cmaster_73',['atcaI2Cmaster',['../a01679.html',1,'']]], + ['atcaifacecfg_74',['ATCAIfaceCfg',['../a01539.html',1,'ATCAIfaceCfg'],['../a02535.html',1,'cryptoauthlib.iface.ATCAIfaceCfg']]], + ['atcaifacetype_75',['ATCAIfaceType',['../a02487.html',1,'cryptoauthlib::iface']]], + ['atcakittype_76',['ATCAKitType',['../a02491.html',1,'cryptoauthlib::iface']]], + ['atcapacket_77',['ATCAPacket',['../a01643.html',1,'']]], + ['atcareference_78',['AtcaReference',['../a02539.html',1,'cryptoauthlib::library']]], + ['atcastructure_79',['AtcaStructure',['../a02551.html',1,'cryptoauthlib::library']]], + ['atcaswimaster_80',['atcaSWImaster',['../a01707.html',1,'']]], + ['atcaunion_81',['AtcaUnion',['../a02547.html',1,'cryptoauthlib::library']]], + ['atecc508a_5fconfig_5fs_82',['atecc508a_config_s',['../a01651.html',1,'']]], + ['atecc508aconfig_83',['Atecc508aConfig',['../a02335.html',1,'cryptoauthlib::device']]], + ['atecc608_5fconfig_5fs_84',['atecc608_config_s',['../a01655.html',1,'']]], + ['atecc608config_85',['Atecc608Config',['../a02339.html',1,'cryptoauthlib::device']]], + ['atsha204a_5fconfig_5fs_86',['atsha204a_config_s',['../a01647.html',1,'']]], + ['atsha204aconfig_87',['Atsha204aConfig',['../a02331.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/classes_10.js b/search/classes_10.js index 3b512ffeb..2e3d6429d 100644 --- a/search/classes_10.js +++ b/search/classes_10.js @@ -1,10 +1,9 @@ var searchData= [ - ['secure_5fboot_5fconfig_5fbits_0',['secure_boot_config_bits',['../a01488.html',1,'']]], - ['secure_5fboot_5fparameters_1',['secure_boot_parameters',['../a01492.html',1,'']]], - ['secureboot_2',['SecureBoot',['../a02280.html',1,'cryptoauthlib::device']]], - ['slotconfig_3',['SlotConfig',['../a02268.html',1,'cryptoauthlib::device']]], - ['status_4',['Status',['../a02520.html',1,'cryptoauthlib::status']]], - ['statusunknownerror_5',['StatusUnknownError',['../a02340.html',1,'cryptoauthlib::exceptions']]], - ['sw_5fsha256_5fctx_6',['sw_sha256_ctx',['../a01644.html',1,'']]] + ['secure_5fboot_5fconfig_5fbits_0',['secure_boot_config_bits',['../a01515.html',1,'']]], + ['secure_5fboot_5fparameters_1',['secure_boot_parameters',['../a01519.html',1,'']]], + ['secureboot_2',['SecureBoot',['../a02315.html',1,'cryptoauthlib::device']]], + ['slotconfig_3',['SlotConfig',['../a02303.html',1,'cryptoauthlib::device']]], + ['status_4',['Status',['../a02555.html',1,'cryptoauthlib::status']]], + ['statusunknownerror_5',['StatusUnknownError',['../a02375.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_11.js b/search/classes_11.js index b577f7423..a5948acde 100644 --- a/search/classes_11.js +++ b/search/classes_11.js @@ -1,7 +1,7 @@ var searchData= [ - ['timeouterror_0',['TimeOutError',['../a02400.html',1,'cryptoauthlib::exceptions']]], - ['tng_5fcert_5fmap_5felement_1',['tng_cert_map_element',['../a01500.html',1,'']]], - ['transmissionerror_2',['TransmissionError',['../a02420.html',1,'cryptoauthlib::exceptions']]], - ['transmissiontimeouterror_3',['TransmissionTimeoutError',['../a02388.html',1,'cryptoauthlib::exceptions']]] + ['timeouterror_0',['TimeOutError',['../a02435.html',1,'cryptoauthlib::exceptions']]], + ['tng_5fcert_5fmap_5felement_1',['tng_cert_map_element',['../a01527.html',1,'']]], + ['transmissionerror_2',['TransmissionError',['../a02455.html',1,'cryptoauthlib::exceptions']]], + ['transmissiontimeouterror_3',['TransmissionTimeoutError',['../a02423.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_12.js b/search/classes_12.js index 6212ce3e1..e5fd27e1a 100644 --- a/search/classes_12.js +++ b/search/classes_12.js @@ -1,6 +1,6 @@ var searchData= [ - ['unimplementederror_0',['UnimplementedError',['../a02412.html',1,'cryptoauthlib::exceptions']]], - ['unsupportedinterface_1',['UnsupportedInterface',['../a02448.html',1,'cryptoauthlib::exceptions']]], - ['uselock_2',['UseLock',['../a02272.html',1,'cryptoauthlib::device']]] + ['unimplementederror_0',['UnimplementedError',['../a02447.html',1,'cryptoauthlib::exceptions']]], + ['unsupportedinterface_1',['UnsupportedInterface',['../a02483.html',1,'cryptoauthlib::exceptions']]], + ['uselock_2',['UseLock',['../a02307.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/classes_13.js b/search/classes_13.js index 674edc1b2..7c224fb3f 100644 --- a/search/classes_13.js +++ b/search/classes_13.js @@ -1,4 +1,4 @@ var searchData= [ - ['volatilekeypermission_0',['VolatileKeyPermission',['../a02276.html',1,'cryptoauthlib::device']]] + ['volatilekeypermission_0',['VolatileKeyPermission',['../a02311.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/classes_14.js b/search/classes_14.js index 28adbdf6c..620b6b005 100644 --- a/search/classes_14.js +++ b/search/classes_14.js @@ -1,4 +1,4 @@ var searchData= [ - ['wakefailederror_0',['WakeFailedError',['../a02324.html',1,'cryptoauthlib::exceptions']]] + ['wakefailederror_0',['WakeFailedError',['../a02359.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_15.js b/search/classes_15.js index 56a490d52..bcb0fd65a 100644 --- a/search/classes_15.js +++ b/search/classes_15.js @@ -1,4 +1,4 @@ var searchData= [ - ['x509format_0',['X509Format',['../a02288.html',1,'cryptoauthlib::device']]] + ['x509format_0',['X509Format',['../a02323.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/classes_16.js b/search/classes_16.js index ced793e9a..a8060131c 100644 --- a/search/classes_16.js +++ b/search/classes_16.js @@ -1,4 +1,4 @@ var searchData= [ - ['zonenotlockederror_0',['ZoneNotLockedError',['../a02424.html',1,'cryptoauthlib::exceptions']]] + ['zonenotlockederror_0',['ZoneNotLockedError',['../a02459.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_2.js b/search/classes_2.js index c215b435e..09ba76673 100644 --- a/search/classes_2.js +++ b/search/classes_2.js @@ -1,7 +1,7 @@ var searchData= [ - ['badargumenterror_0',['BadArgumentError',['../a02356.html',1,'cryptoauthlib::exceptions']]], - ['badcrcerror_1',['BadCrcError',['../a02368.html',1,'cryptoauthlib::exceptions']]], - ['badopcodeerror_2',['BadOpcodeError',['../a02404.html',1,'cryptoauthlib::exceptions']]], - ['binarydistribution_3',['BinaryDistribution',['../a02532.html',1,'setup']]] + ['badargumenterror_0',['BadArgumentError',['../a02391.html',1,'cryptoauthlib::exceptions']]], + ['badcrcerror_1',['BadCrcError',['../a02403.html',1,'cryptoauthlib::exceptions']]], + ['badopcodeerror_2',['BadOpcodeError',['../a02439.html',1,'cryptoauthlib::exceptions']]], + ['binarydistribution_3',['BinaryDistribution',['../a02567.html',1,'setup']]] ]; diff --git a/search/classes_3.js b/search/classes_3.js index e86d9dd53..7a7733dc9 100644 --- a/search/classes_3.js +++ b/search/classes_3.js @@ -1,85 +1,85 @@ var searchData= [ - ['cal_5fbuffer_5fs_0',['cal_buffer_s',['../a01612.html',1,'']]], - ['certstatus_1',['CertStatus',['../a02200.html',1,'cryptoauthlib::atcacert']]], - ['checkmacverifyfailederror_2',['CheckmacVerifyFailedError',['../a02328.html',1,'cryptoauthlib::exceptions']]], - ['chipmode508_3',['ChipMode508',['../a02256.html',1,'cryptoauthlib::device']]], - ['chipmode608_4',['ChipMode608',['../a02260.html',1,'cryptoauthlib::device']]], - ['chipoptions_5',['ChipOptions',['../a02284.html',1,'cryptoauthlib::device']]], - ['ck_5faes_5fcbc_5fencrypt_5fdata_5fparams_6',['CK_AES_CBC_ENCRYPT_DATA_PARAMS',['../a01980.html',1,'']]], - ['ck_5faes_5fccm_5fparams_7',['CK_AES_CCM_PARAMS',['../a02088.html',1,'']]], - ['ck_5faes_5fctr_5fparams_8',['CK_AES_CTR_PARAMS',['../a02072.html',1,'']]], - ['ck_5faes_5fgcm_5fparams_9',['CK_AES_GCM_PARAMS',['../a02084.html',1,'']]], - ['ck_5faria_5fcbc_5fencrypt_5fdata_5fparams_10',['CK_ARIA_CBC_ENCRYPT_DATA_PARAMS',['../a02100.html',1,'']]], - ['ck_5fattribute_11',['CK_ATTRIBUTE',['../a01900.html',1,'']]], - ['ck_5fc_5finitialize_5fargs_12',['CK_C_INITIALIZE_ARGS',['../a01916.html',1,'']]], - ['ck_5fcamellia_5fcbc_5fencrypt_5fdata_5fparams_13',['CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS',['../a02096.html',1,'']]], - ['ck_5fcamellia_5fctr_5fparams_14',['CK_CAMELLIA_CTR_PARAMS',['../a02092.html',1,'']]], - ['ck_5fccm_5fparams_15',['CK_CCM_PARAMS',['../a02080.html',1,'']]], - ['ck_5fcms_5fsig_5fparams_16',['CK_CMS_SIG_PARAMS',['../a02040.html',1,'']]], - ['ck_5fdate_17',['CK_DATE',['../a01904.html',1,'']]], - ['ck_5fdes_5fcbc_5fencrypt_5fdata_5fparams_18',['CK_DES_CBC_ENCRYPT_DATA_PARAMS',['../a01976.html',1,'']]], - ['ck_5fdsa_5fparameter_5fgen_5fparam_19',['CK_DSA_PARAMETER_GEN_PARAM',['../a02104.html',1,'']]], - ['ck_5fecdh1_5fderive_5fparams_20',['CK_ECDH1_DERIVE_PARAMS',['../a01928.html',1,'']]], - ['ck_5fecdh2_5fderive_5fparams_21',['CK_ECDH2_DERIVE_PARAMS',['../a01932.html',1,'']]], - ['ck_5fecdh_5faes_5fkey_5fwrap_5fparams_22',['CK_ECDH_AES_KEY_WRAP_PARAMS',['../a02108.html',1,'']]], - ['ck_5fecmqv_5fderive_5fparams_23',['CK_ECMQV_DERIVE_PARAMS',['../a01936.html',1,'']]], - ['ck_5ffunction_5flist_24',['CK_FUNCTION_LIST',['../a01816.html',1,'']]], - ['ck_5fgcm_5fparams_25',['CK_GCM_PARAMS',['../a02076.html',1,'']]], - ['ck_5fgostr3410_5fderive_5fparams_26',['CK_GOSTR3410_DERIVE_PARAMS',['../a02132.html',1,'']]], - ['ck_5fgostr3410_5fkey_5fwrap_5fparams_27',['CK_GOSTR3410_KEY_WRAP_PARAMS',['../a02136.html',1,'']]], - ['ck_5finfo_28',['CK_INFO',['../a01884.html',1,'']]], - ['ck_5fkea_5fderive_5fparams_29',['CK_KEA_DERIVE_PARAMS',['../a01952.html',1,'']]], - ['ck_5fkey_5fderivation_5fstring_5fdata_30',['CK_KEY_DERIVATION_STRING_DATA',['../a02044.html',1,'']]], - ['ck_5fkey_5fwrap_5fset_5foaep_5fparams_31',['CK_KEY_WRAP_SET_OAEP_PARAMS',['../a01996.html',1,'']]], - ['ck_5fkip_5fparams_32',['CK_KIP_PARAMS',['../a02068.html',1,'']]], - ['ck_5fmechanism_33',['CK_MECHANISM',['../a01908.html',1,'']]], - ['ck_5fmechanism_5finfo_34',['CK_MECHANISM_INFO',['../a01912.html',1,'']]], - ['ck_5fotp_5fparam_35',['CK_OTP_PARAM',['../a02056.html',1,'']]], - ['ck_5fotp_5fparams_36',['CK_OTP_PARAMS',['../a02060.html',1,'']]], - ['ck_5fotp_5fsignature_5finfo_37',['CK_OTP_SIGNATURE_INFO',['../a02064.html',1,'']]], - ['ck_5fpbe_5fparams_38',['CK_PBE_PARAMS',['../a01992.html',1,'']]], - ['ck_5fpkcs5_5fpbkd2_5fparams_39',['CK_PKCS5_PBKD2_PARAMS',['../a02048.html',1,'']]], - ['ck_5fpkcs5_5fpbkd2_5fparams2_40',['CK_PKCS5_PBKD2_PARAMS2',['../a02052.html',1,'']]], - ['ck_5frc2_5fcbc_5fparams_41',['CK_RC2_CBC_PARAMS',['../a01956.html',1,'']]], - ['ck_5frc2_5fmac_5fgeneral_5fparams_42',['CK_RC2_MAC_GENERAL_PARAMS',['../a01960.html',1,'']]], - ['ck_5frc5_5fcbc_5fparams_43',['CK_RC5_CBC_PARAMS',['../a01968.html',1,'']]], - ['ck_5frc5_5fmac_5fgeneral_5fparams_44',['CK_RC5_MAC_GENERAL_PARAMS',['../a01972.html',1,'']]], - ['ck_5frc5_5fparams_45',['CK_RC5_PARAMS',['../a01964.html',1,'']]], - ['ck_5frsa_5faes_5fkey_5fwrap_5fparams_46',['CK_RSA_AES_KEY_WRAP_PARAMS',['../a02112.html',1,'']]], - ['ck_5frsa_5fpkcs_5foaep_5fparams_47',['CK_RSA_PKCS_OAEP_PARAMS',['../a01920.html',1,'']]], - ['ck_5frsa_5fpkcs_5fpss_5fparams_48',['CK_RSA_PKCS_PSS_PARAMS',['../a01924.html',1,'']]], - ['ck_5fseed_5fcbc_5fencrypt_5fdata_5fparams_49',['CK_SEED_CBC_ENCRYPT_DATA_PARAMS',['../a02140.html',1,'']]], - ['ck_5fsession_5finfo_50',['CK_SESSION_INFO',['../a01896.html',1,'']]], - ['ck_5fskipjack_5fprivate_5fwrap_5fparams_51',['CK_SKIPJACK_PRIVATE_WRAP_PARAMS',['../a01984.html',1,'']]], - ['ck_5fskipjack_5frelayx_5fparams_52',['CK_SKIPJACK_RELAYX_PARAMS',['../a01988.html',1,'']]], - ['ck_5fslot_5finfo_53',['CK_SLOT_INFO',['../a01888.html',1,'']]], - ['ck_5fssl3_5fkey_5fmat_5fout_54',['CK_SSL3_KEY_MAT_OUT',['../a02008.html',1,'']]], - ['ck_5fssl3_5fkey_5fmat_5fparams_55',['CK_SSL3_KEY_MAT_PARAMS',['../a02012.html',1,'']]], - ['ck_5fssl3_5fmaster_5fkey_5fderive_5fparams_56',['CK_SSL3_MASTER_KEY_DERIVE_PARAMS',['../a02004.html',1,'']]], - ['ck_5fssl3_5frandom_5fdata_57',['CK_SSL3_RANDOM_DATA',['../a02000.html',1,'']]], - ['ck_5ftls12_5fkey_5fmat_5fparams_58',['CK_TLS12_KEY_MAT_PARAMS',['../a02120.html',1,'']]], - ['ck_5ftls12_5fmaster_5fkey_5fderive_5fparams_59',['CK_TLS12_MASTER_KEY_DERIVE_PARAMS',['../a02116.html',1,'']]], - ['ck_5ftls_5fkdf_5fparams_60',['CK_TLS_KDF_PARAMS',['../a02124.html',1,'']]], - ['ck_5ftls_5fmac_5fparams_61',['CK_TLS_MAC_PARAMS',['../a02128.html',1,'']]], - ['ck_5ftls_5fprf_5fparams_62',['CK_TLS_PRF_PARAMS',['../a02016.html',1,'']]], - ['ck_5ftoken_5finfo_63',['CK_TOKEN_INFO',['../a01892.html',1,'']]], - ['ck_5fversion_64',['CK_VERSION',['../a01880.html',1,'']]], - ['ck_5fwtls_5fkey_5fmat_5fout_65',['CK_WTLS_KEY_MAT_OUT',['../a02032.html',1,'']]], - ['ck_5fwtls_5fkey_5fmat_5fparams_66',['CK_WTLS_KEY_MAT_PARAMS',['../a02036.html',1,'']]], - ['ck_5fwtls_5fmaster_5fkey_5fderive_5fparams_67',['CK_WTLS_MASTER_KEY_DERIVE_PARAMS',['../a02024.html',1,'']]], - ['ck_5fwtls_5fprf_5fparams_68',['CK_WTLS_PRF_PARAMS',['../a02028.html',1,'']]], - ['ck_5fwtls_5frandom_5fdata_69',['CK_WTLS_RANDOM_DATA',['../a02020.html',1,'']]], - ['ck_5fx9_5f42_5fdh1_5fderive_5fparams_70',['CK_X9_42_DH1_DERIVE_PARAMS',['../a01940.html',1,'']]], - ['ck_5fx9_5f42_5fdh2_5fderive_5fparams_71',['CK_X9_42_DH2_DERIVE_PARAMS',['../a01944.html',1,'']]], - ['ck_5fx9_5f42_5fmqv_5fderive_5fparams_72',['CK_X9_42_MQV_DERIVE_PARAMS',['../a01948.html',1,'']]], - ['cl_5fhashcontext_73',['CL_HashContext',['../a01640.html',1,'']]], - ['communicationerror_74',['CommunicationError',['../a02396.html',1,'cryptoauthlib::exceptions']]], - ['configzonelockederror_75',['ConfigZoneLockedError',['../a02316.html',1,'cryptoauthlib::exceptions']]], - ['counter204_76',['Counter204',['../a02264.html',1,'cryptoauthlib::device']]], - ['countmatch_77',['CountMatch',['../a02252.html',1,'cryptoauthlib::device']]], - ['crcerror_78',['CrcError',['../a02336.html',1,'cryptoauthlib::exceptions']]], - ['cryptoauthcommandbuildext_79',['CryptoAuthCommandBuildExt',['../a02524.html',1,'setup']]], - ['cryptoauthcommandinstall_80',['CryptoAuthCommandInstall',['../a02528.html',1,'setup']]], - ['cryptoerror_81',['CryptoError',['../a02308.html',1,'cryptoauthlib::exceptions']]] + ['cal_5fbuffer_5fs_0',['cal_buffer_s',['../a01635.html',1,'']]], + ['certstatus_1',['CertStatus',['../a02235.html',1,'cryptoauthlib::atcacert']]], + ['checkmacverifyfailederror_2',['CheckmacVerifyFailedError',['../a02363.html',1,'cryptoauthlib::exceptions']]], + ['chipmode508_3',['ChipMode508',['../a02291.html',1,'cryptoauthlib::device']]], + ['chipmode608_4',['ChipMode608',['../a02295.html',1,'cryptoauthlib::device']]], + ['chipoptions_5',['ChipOptions',['../a02319.html',1,'cryptoauthlib::device']]], + ['ck_5faes_5fcbc_5fencrypt_5fdata_5fparams_6',['CK_AES_CBC_ENCRYPT_DATA_PARAMS',['../a02015.html',1,'']]], + ['ck_5faes_5fccm_5fparams_7',['CK_AES_CCM_PARAMS',['../a02123.html',1,'']]], + ['ck_5faes_5fctr_5fparams_8',['CK_AES_CTR_PARAMS',['../a02107.html',1,'']]], + ['ck_5faes_5fgcm_5fparams_9',['CK_AES_GCM_PARAMS',['../a02119.html',1,'']]], + ['ck_5faria_5fcbc_5fencrypt_5fdata_5fparams_10',['CK_ARIA_CBC_ENCRYPT_DATA_PARAMS',['../a02135.html',1,'']]], + ['ck_5fattribute_11',['CK_ATTRIBUTE',['../a01935.html',1,'']]], + ['ck_5fc_5finitialize_5fargs_12',['CK_C_INITIALIZE_ARGS',['../a01951.html',1,'']]], + ['ck_5fcamellia_5fcbc_5fencrypt_5fdata_5fparams_13',['CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS',['../a02131.html',1,'']]], + ['ck_5fcamellia_5fctr_5fparams_14',['CK_CAMELLIA_CTR_PARAMS',['../a02127.html',1,'']]], + ['ck_5fccm_5fparams_15',['CK_CCM_PARAMS',['../a02115.html',1,'']]], + ['ck_5fcms_5fsig_5fparams_16',['CK_CMS_SIG_PARAMS',['../a02075.html',1,'']]], + ['ck_5fdate_17',['CK_DATE',['../a01939.html',1,'']]], + ['ck_5fdes_5fcbc_5fencrypt_5fdata_5fparams_18',['CK_DES_CBC_ENCRYPT_DATA_PARAMS',['../a02011.html',1,'']]], + ['ck_5fdsa_5fparameter_5fgen_5fparam_19',['CK_DSA_PARAMETER_GEN_PARAM',['../a02139.html',1,'']]], + ['ck_5fecdh1_5fderive_5fparams_20',['CK_ECDH1_DERIVE_PARAMS',['../a01963.html',1,'']]], + ['ck_5fecdh2_5fderive_5fparams_21',['CK_ECDH2_DERIVE_PARAMS',['../a01967.html',1,'']]], + ['ck_5fecdh_5faes_5fkey_5fwrap_5fparams_22',['CK_ECDH_AES_KEY_WRAP_PARAMS',['../a02143.html',1,'']]], + ['ck_5fecmqv_5fderive_5fparams_23',['CK_ECMQV_DERIVE_PARAMS',['../a01971.html',1,'']]], + ['ck_5ffunction_5flist_24',['CK_FUNCTION_LIST',['../a01843.html',1,'']]], + ['ck_5fgcm_5fparams_25',['CK_GCM_PARAMS',['../a02111.html',1,'']]], + ['ck_5fgostr3410_5fderive_5fparams_26',['CK_GOSTR3410_DERIVE_PARAMS',['../a02167.html',1,'']]], + ['ck_5fgostr3410_5fkey_5fwrap_5fparams_27',['CK_GOSTR3410_KEY_WRAP_PARAMS',['../a02171.html',1,'']]], + ['ck_5finfo_28',['CK_INFO',['../a01919.html',1,'']]], + ['ck_5fkea_5fderive_5fparams_29',['CK_KEA_DERIVE_PARAMS',['../a01987.html',1,'']]], + ['ck_5fkey_5fderivation_5fstring_5fdata_30',['CK_KEY_DERIVATION_STRING_DATA',['../a02079.html',1,'']]], + ['ck_5fkey_5fwrap_5fset_5foaep_5fparams_31',['CK_KEY_WRAP_SET_OAEP_PARAMS',['../a02031.html',1,'']]], + ['ck_5fkip_5fparams_32',['CK_KIP_PARAMS',['../a02103.html',1,'']]], + ['ck_5fmechanism_33',['CK_MECHANISM',['../a01943.html',1,'']]], + ['ck_5fmechanism_5finfo_34',['CK_MECHANISM_INFO',['../a01947.html',1,'']]], + ['ck_5fotp_5fparam_35',['CK_OTP_PARAM',['../a02091.html',1,'']]], + ['ck_5fotp_5fparams_36',['CK_OTP_PARAMS',['../a02095.html',1,'']]], + ['ck_5fotp_5fsignature_5finfo_37',['CK_OTP_SIGNATURE_INFO',['../a02099.html',1,'']]], + ['ck_5fpbe_5fparams_38',['CK_PBE_PARAMS',['../a02027.html',1,'']]], + ['ck_5fpkcs5_5fpbkd2_5fparams_39',['CK_PKCS5_PBKD2_PARAMS',['../a02083.html',1,'']]], + ['ck_5fpkcs5_5fpbkd2_5fparams2_40',['CK_PKCS5_PBKD2_PARAMS2',['../a02087.html',1,'']]], + ['ck_5frc2_5fcbc_5fparams_41',['CK_RC2_CBC_PARAMS',['../a01991.html',1,'']]], + ['ck_5frc2_5fmac_5fgeneral_5fparams_42',['CK_RC2_MAC_GENERAL_PARAMS',['../a01995.html',1,'']]], + ['ck_5frc5_5fcbc_5fparams_43',['CK_RC5_CBC_PARAMS',['../a02003.html',1,'']]], + ['ck_5frc5_5fmac_5fgeneral_5fparams_44',['CK_RC5_MAC_GENERAL_PARAMS',['../a02007.html',1,'']]], + ['ck_5frc5_5fparams_45',['CK_RC5_PARAMS',['../a01999.html',1,'']]], + ['ck_5frsa_5faes_5fkey_5fwrap_5fparams_46',['CK_RSA_AES_KEY_WRAP_PARAMS',['../a02147.html',1,'']]], + ['ck_5frsa_5fpkcs_5foaep_5fparams_47',['CK_RSA_PKCS_OAEP_PARAMS',['../a01955.html',1,'']]], + ['ck_5frsa_5fpkcs_5fpss_5fparams_48',['CK_RSA_PKCS_PSS_PARAMS',['../a01959.html',1,'']]], + ['ck_5fseed_5fcbc_5fencrypt_5fdata_5fparams_49',['CK_SEED_CBC_ENCRYPT_DATA_PARAMS',['../a02175.html',1,'']]], + ['ck_5fsession_5finfo_50',['CK_SESSION_INFO',['../a01931.html',1,'']]], + ['ck_5fskipjack_5fprivate_5fwrap_5fparams_51',['CK_SKIPJACK_PRIVATE_WRAP_PARAMS',['../a02019.html',1,'']]], + ['ck_5fskipjack_5frelayx_5fparams_52',['CK_SKIPJACK_RELAYX_PARAMS',['../a02023.html',1,'']]], + ['ck_5fslot_5finfo_53',['CK_SLOT_INFO',['../a01923.html',1,'']]], + ['ck_5fssl3_5fkey_5fmat_5fout_54',['CK_SSL3_KEY_MAT_OUT',['../a02043.html',1,'']]], + ['ck_5fssl3_5fkey_5fmat_5fparams_55',['CK_SSL3_KEY_MAT_PARAMS',['../a02047.html',1,'']]], + ['ck_5fssl3_5fmaster_5fkey_5fderive_5fparams_56',['CK_SSL3_MASTER_KEY_DERIVE_PARAMS',['../a02039.html',1,'']]], + ['ck_5fssl3_5frandom_5fdata_57',['CK_SSL3_RANDOM_DATA',['../a02035.html',1,'']]], + ['ck_5ftls12_5fkey_5fmat_5fparams_58',['CK_TLS12_KEY_MAT_PARAMS',['../a02155.html',1,'']]], + ['ck_5ftls12_5fmaster_5fkey_5fderive_5fparams_59',['CK_TLS12_MASTER_KEY_DERIVE_PARAMS',['../a02151.html',1,'']]], + ['ck_5ftls_5fkdf_5fparams_60',['CK_TLS_KDF_PARAMS',['../a02159.html',1,'']]], + ['ck_5ftls_5fmac_5fparams_61',['CK_TLS_MAC_PARAMS',['../a02163.html',1,'']]], + ['ck_5ftls_5fprf_5fparams_62',['CK_TLS_PRF_PARAMS',['../a02051.html',1,'']]], + ['ck_5ftoken_5finfo_63',['CK_TOKEN_INFO',['../a01927.html',1,'']]], + ['ck_5fversion_64',['CK_VERSION',['../a01915.html',1,'']]], + ['ck_5fwtls_5fkey_5fmat_5fout_65',['CK_WTLS_KEY_MAT_OUT',['../a02067.html',1,'']]], + ['ck_5fwtls_5fkey_5fmat_5fparams_66',['CK_WTLS_KEY_MAT_PARAMS',['../a02071.html',1,'']]], + ['ck_5fwtls_5fmaster_5fkey_5fderive_5fparams_67',['CK_WTLS_MASTER_KEY_DERIVE_PARAMS',['../a02059.html',1,'']]], + ['ck_5fwtls_5fprf_5fparams_68',['CK_WTLS_PRF_PARAMS',['../a02063.html',1,'']]], + ['ck_5fwtls_5frandom_5fdata_69',['CK_WTLS_RANDOM_DATA',['../a02055.html',1,'']]], + ['ck_5fx9_5f42_5fdh1_5fderive_5fparams_70',['CK_X9_42_DH1_DERIVE_PARAMS',['../a01975.html',1,'']]], + ['ck_5fx9_5f42_5fdh2_5fderive_5fparams_71',['CK_X9_42_DH2_DERIVE_PARAMS',['../a01979.html',1,'']]], + ['ck_5fx9_5f42_5fmqv_5fderive_5fparams_72',['CK_X9_42_MQV_DERIVE_PARAMS',['../a01983.html',1,'']]], + ['cl_5fhashcontext_73',['CL_HashContext',['../a01663.html',1,'']]], + ['communicationerror_74',['CommunicationError',['../a02431.html',1,'cryptoauthlib::exceptions']]], + ['configzonelockederror_75',['ConfigZoneLockedError',['../a02351.html',1,'cryptoauthlib::exceptions']]], + ['counter204_76',['Counter204',['../a02299.html',1,'cryptoauthlib::device']]], + ['countmatch_77',['CountMatch',['../a02287.html',1,'cryptoauthlib::device']]], + ['crcerror_78',['CrcError',['../a02371.html',1,'cryptoauthlib::exceptions']]], + ['cryptoauthcommandbuildext_79',['CryptoAuthCommandBuildExt',['../a02559.html',1,'setup']]], + ['cryptoauthcommandinstall_80',['CryptoAuthCommandInstall',['../a02563.html',1,'setup']]], + ['cryptoerror_81',['CryptoError',['../a02343.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_4.js b/search/classes_4.js index 173479485..b71aaef05 100644 --- a/search/classes_4.js +++ b/search/classes_4.js @@ -1,6 +1,6 @@ var searchData= [ - ['datazonelockederror_0',['DataZoneLockedError',['../a02320.html',1,'cryptoauthlib::exceptions']]], - ['device_5fexecution_5ftime_5ft_1',['device_execution_time_t',['../a01636.html',1,'']]], - ['devtype_5fnames_5ft_2',['devtype_names_t',['../a01512.html',1,'']]] + ['datazonelockederror_0',['DataZoneLockedError',['../a02355.html',1,'cryptoauthlib::exceptions']]], + ['device_5fexecution_5ftime_5ft_1',['device_execution_time_t',['../a01659.html',1,'']]], + ['devtype_5fnames_5ft_2',['devtype_names_t',['../a01535.html',1,'']]] ]; diff --git a/search/classes_5.js b/search/classes_5.js index 621c2feda..854309053 100644 --- a/search/classes_5.js +++ b/search/classes_5.js @@ -1,5 +1,5 @@ var searchData= [ - ['eccfaulterror_0',['EccFaultError',['../a02344.html',1,'cryptoauthlib::exceptions']]], - ['executionerror_1',['ExecutionError',['../a02408.html',1,'cryptoauthlib::exceptions']]] + ['eccfaulterror_0',['EccFaultError',['../a02379.html',1,'cryptoauthlib::exceptions']]], + ['executionerror_1',['ExecutionError',['../a02443.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_6.js b/search/classes_6.js index 6153494de..746ad144f 100644 --- a/search/classes_6.js +++ b/search/classes_6.js @@ -1,4 +1,4 @@ var searchData= [ - ['functionerror_0',['FunctionError',['../a02348.html',1,'cryptoauthlib::exceptions']]] + ['functionerror_0',['FunctionError',['../a02383.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_7.js b/search/classes_7.js index 4a804c1ff..86f848dd8 100644 --- a/search/classes_7.js +++ b/search/classes_7.js @@ -1,4 +1,4 @@ var searchData= [ - ['genericerror_0',['GenericError',['../a02352.html',1,'cryptoauthlib::exceptions']]] + ['genericerror_0',['GenericError',['../a02387.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_8.js b/search/classes_8.js index 4ce37923c..a86863a6a 100644 --- a/search/classes_8.js +++ b/search/classes_8.js @@ -1,6 +1,6 @@ var searchData= [ - ['healthtesterror_0',['HealthTestError',['../a02432.html',1,'cryptoauthlib::exceptions']]], - ['hwecalgorithm_1',['HwEcAlgorithm',['../a02232.html',1,'cryptoauthlib::atjwt']]], - ['hwhmacalgorithm_2',['HwHmacAlgorithm',['../a02236.html',1,'cryptoauthlib::atjwt']]] + ['healthtesterror_0',['HealthTestError',['../a02467.html',1,'cryptoauthlib::exceptions']]], + ['hwecalgorithm_1',['HwEcAlgorithm',['../a02267.html',1,'cryptoauthlib::atjwt']]], + ['hwhmacalgorithm_2',['HwHmacAlgorithm',['../a02271.html',1,'cryptoauthlib::atjwt']]] ]; diff --git a/search/classes_9.js b/search/classes_9.js index ed8971ea0..6850a873a 100644 --- a/search/classes_9.js +++ b/search/classes_9.js @@ -1,9 +1,9 @@ var searchData= [ - ['i2c_5fsam0_5finstance_0',['i2c_sam0_instance',['../a01680.html',1,'']]], - ['i2c_5fsam_5finstance_1',['i2c_sam_instance',['../a01684.html',1,'']]], - ['i2c_5fstart_5finstance_2',['i2c_start_instance',['../a01664.html',1,'']]], - ['i2cenable_3',['I2cEnable',['../a02248.html',1,'cryptoauthlib::device']]], - ['invalididentifiererror_4',['InvalidIdentifierError',['../a02360.html',1,'cryptoauthlib::exceptions']]], - ['invalidsizeerror_5',['InvalidSizeError',['../a02364.html',1,'cryptoauthlib::exceptions']]] + ['i2c_5fsam0_5finstance_0',['i2c_sam0_instance',['../a01699.html',1,'']]], + ['i2c_5fsam_5finstance_1',['i2c_sam_instance',['../a01703.html',1,'']]], + ['i2c_5fstart_5finstance_2',['i2c_start_instance',['../a01683.html',1,'']]], + ['i2cenable_3',['I2cEnable',['../a02283.html',1,'cryptoauthlib::device']]], + ['invalididentifiererror_4',['InvalidIdentifierError',['../a02395.html',1,'cryptoauthlib::exceptions']]], + ['invalidsizeerror_5',['InvalidSizeError',['../a02399.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_a.js b/search/classes_a.js index d345ee09b..058381190 100644 --- a/search/classes_a.js +++ b/search/classes_a.js @@ -1,4 +1,4 @@ var searchData= [ - ['keyconfig_0',['KeyConfig',['../a02292.html',1,'cryptoauthlib::device']]] + ['keyconfig_0',['KeyConfig',['../a02327.html',1,'cryptoauthlib::device']]] ]; diff --git a/search/classes_b.js b/search/classes_b.js index 9bbf70f82..fe52e2b94 100644 --- a/search/classes_b.js +++ b/search/classes_b.js @@ -1,6 +1,6 @@ var searchData= [ - ['libraryloaderror_0',['LibraryLoadError',['../a02312.html',1,'cryptoauthlib::exceptions']]], - ['librarymemoryerror_1',['LibraryMemoryError',['../a02436.html',1,'cryptoauthlib::exceptions']]], - ['librarynotinitialized_2',['LibraryNotInitialized',['../a02444.html',1,'cryptoauthlib::exceptions']]] + ['libraryloaderror_0',['LibraryLoadError',['../a02347.html',1,'cryptoauthlib::exceptions']]], + ['librarymemoryerror_1',['LibraryMemoryError',['../a02471.html',1,'cryptoauthlib::exceptions']]], + ['librarynotinitialized_2',['LibraryNotInitialized',['../a02479.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_c.js b/search/classes_c.js index 958612d4d..03a109090 100644 --- a/search/classes_c.js +++ b/search/classes_c.js @@ -1,4 +1,4 @@ var searchData= [ - ['memory_5fparameters_0',['memory_parameters',['../a01496.html',1,'']]] + ['memory_5fparameters_0',['memory_parameters',['../a01523.html',1,'']]] ]; diff --git a/search/classes_d.js b/search/classes_d.js index e3d153e19..09117e482 100644 --- a/search/classes_d.js +++ b/search/classes_d.js @@ -1,6 +1,6 @@ var searchData= [ - ['nodevicesfounderror_0',['NoDevicesFoundError',['../a02428.html',1,'cryptoauthlib::exceptions']]], - ['noresponseerror_1',['NoResponseError',['../a02376.html',1,'cryptoauthlib::exceptions']]], - ['nouseflagerror_2',['NoUseFlagError',['../a02440.html',1,'cryptoauthlib::exceptions']]] + ['nodevicesfounderror_0',['NoDevicesFoundError',['../a02463.html',1,'cryptoauthlib::exceptions']]], + ['noresponseerror_1',['NoResponseError',['../a02411.html',1,'cryptoauthlib::exceptions']]], + ['nouseflagerror_2',['NoUseFlagError',['../a02475.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/classes_e.js b/search/classes_e.js index a95441434..59335a496 100644 --- a/search/classes_e.js +++ b/search/classes_e.js @@ -1,19 +1,21 @@ var searchData= [ - ['parityerror_0',['ParityError',['../a02384.html',1,'cryptoauthlib::exceptions']]], - ['parseerror_1',['ParseError',['../a02332.html',1,'cryptoauthlib::exceptions']]], - ['pcks11_5fmech_5ftable_5fe_2',['pcks11_mech_table_e',['../a01848.html',1,'']]], - ['pkcs11_5fattrib_5fmodel_5fs_3',['pkcs11_attrib_model_s',['../a01820.html',1,'']]], - ['pkcs11_5fconf_5ffiledata_5fs_4',['pkcs11_conf_filedata_s',['../a01824.html',1,'']]], - ['pkcs11_5fdev_5fctx_5',['pkcs11_dev_ctx',['../a01828.html',1,'']]], - ['pkcs11_5fdev_5fres_6',['pkcs11_dev_res',['../a01832.html',1,'']]], - ['pkcs11_5fdev_5fstate_7',['pkcs11_dev_state',['../a01836.html',1,'']]], - ['pkcs11_5fecc_5fkey_5finfo_5fs_8',['pkcs11_ecc_key_info_s',['../a01844.html',1,'']]], - ['pkcs11_5flib_5fctx_5fs_9',['pkcs11_lib_ctx_s',['../a01840.html',1,'']]], - ['pkcs11_5fobject_5fcache_5fs_10',['pkcs11_object_cache_s',['../a01856.html',1,'']]], - ['pkcs11_5fobject_5fs_11',['pkcs11_object_s',['../a01852.html',1,'']]], - ['pkcs11_5fsession_5fctx_5fs_12',['pkcs11_session_ctx_s',['../a01872.html',1,'']]], - ['pkcs11_5fsession_5fmech_5fctx_5fs_13',['pkcs11_session_mech_ctx_s',['../a01860.html',1,'']]], - ['pkcs11_5fslot_5fctx_5fs_14',['pkcs11_slot_ctx_s',['../a01876.html',1,'']]], - ['pyjwt_15',['PyJWT',['../a02240.html',1,'cryptoauthlib::atjwt']]] + ['parityerror_0',['ParityError',['../a02419.html',1,'cryptoauthlib::exceptions']]], + ['parseerror_1',['ParseError',['../a02367.html',1,'cryptoauthlib::exceptions']]], + ['pcks11_5fmech_5ftable_5fe_2',['pcks11_mech_table_e',['../a01883.html',1,'']]], + ['pkcs11_5fattrib_5fmodel_5fs_3',['pkcs11_attrib_model_s',['../a01847.html',1,'']]], + ['pkcs11_5fconf_5ffiledata_5fs_4',['pkcs11_conf_filedata_s',['../a01851.html',1,'']]], + ['pkcs11_5fdev_5fctx_5',['pkcs11_dev_ctx',['../a01855.html',1,'']]], + ['pkcs11_5fdev_5fres_6',['pkcs11_dev_res',['../a01859.html',1,'']]], + ['pkcs11_5fdev_5fstate_7',['pkcs11_dev_state',['../a01863.html',1,'']]], + ['pkcs11_5fecc_5fkey_5finfo_5fs_8',['pkcs11_ecc_key_info_s',['../a01871.html',1,'']]], + ['pkcs11_5fkey_5finfo_5fs_9',['pkcs11_key_info_s',['../a01879.html',1,'']]], + ['pkcs11_5flib_5fctx_5fs_10',['pkcs11_lib_ctx_s',['../a01867.html',1,'']]], + ['pkcs11_5fobject_5fcache_5fs_11',['pkcs11_object_cache_s',['../a01891.html',1,'']]], + ['pkcs11_5fobject_5fs_12',['pkcs11_object_s',['../a01887.html',1,'']]], + ['pkcs11_5frsa_5fkey_5finfo_5fs_13',['pkcs11_rsa_key_info_s',['../a01875.html',1,'']]], + ['pkcs11_5fsession_5fctx_5fs_14',['pkcs11_session_ctx_s',['../a01907.html',1,'']]], + ['pkcs11_5fsession_5fmech_5fctx_5fs_15',['pkcs11_session_mech_ctx_s',['../a01895.html',1,'']]], + ['pkcs11_5fslot_5fctx_5fs_16',['pkcs11_slot_ctx_s',['../a01911.html',1,'']]], + ['pyjwt_17',['PyJWT',['../a02275.html',1,'cryptoauthlib::atjwt']]] ]; diff --git a/search/classes_f.js b/search/classes_f.js index c43b68d85..91da911f6 100644 --- a/search/classes_f.js +++ b/search/classes_f.js @@ -1,6 +1,6 @@ var searchData= [ - ['receiveerror_0',['ReceiveError',['../a02372.html',1,'cryptoauthlib::exceptions']]], - ['receivetimeouterror_1',['ReceiveTimeoutError',['../a02392.html',1,'cryptoauthlib::exceptions']]], - ['resyncwithwakeuperror_2',['ResyncWithWakeupError',['../a02380.html',1,'cryptoauthlib::exceptions']]] + ['receiveerror_0',['ReceiveError',['../a02407.html',1,'cryptoauthlib::exceptions']]], + ['receivetimeouterror_1',['ReceiveTimeoutError',['../a02427.html',1,'cryptoauthlib::exceptions']]], + ['resyncwithwakeuperror_2',['ResyncWithWakeupError',['../a02415.html',1,'cryptoauthlib::exceptions']]] ]; diff --git a/search/defines_0.js b/search/defines_0.js index 9e7cffca1..8e21e5228 100644 --- a/search/defines_0.js +++ b/search/defines_0.js @@ -1,195 +1,204 @@ var searchData= [ - ['aes_5fcount_0',['AES_COUNT',['../a00350.html#a72cc5ecbdfa169d282776461ce48fda6',1,'calib_command.h']]], - ['aes_5fdata_5fsize_1',['AES_DATA_SIZE',['../a00350.html#a8cbce00b91b0ddfb3264c9c367a3699a',1,'calib_command.h']]], - ['aes_5finput_5fidx_2',['AES_INPUT_IDX',['../a00350.html#afabb67121c9c58fac9829287b55a2389',1,'calib_command.h']]], - ['aes_5fkeyid_5fidx_3',['AES_KEYID_IDX',['../a00350.html#a2809c87d994c49b53e039f752834fc97',1,'calib_command.h']]], - ['aes_5fmode_5fdecrypt_4',['AES_MODE_DECRYPT',['../a00350.html#a01cd269d08661e645b4caee850424130',1,'calib_command.h']]], - ['aes_5fmode_5fencrypt_5',['AES_MODE_ENCRYPT',['../a00350.html#a5ebee4d7d2d30a88ded25f9a6feecc52',1,'calib_command.h']]], - ['aes_5fmode_5fgfm_6',['AES_MODE_GFM',['../a00350.html#a34ec73cf7504b560883a5d192fe88793',1,'calib_command.h']]], - ['aes_5fmode_5fidx_7',['AES_MODE_IDX',['../a00350.html#a890e2e40916e88caf596cff43be8ab23',1,'calib_command.h']]], - ['aes_5fmode_5fkey_5fblock_5fmask_8',['AES_MODE_KEY_BLOCK_MASK',['../a00350.html#af54068dbf6ecb7bf8b1881caa0f3b89f',1,'calib_command.h']]], - ['aes_5fmode_5fkey_5fblock_5fpos_9',['AES_MODE_KEY_BLOCK_POS',['../a00350.html#abbbbd4cd4cc05e2ea023f059676aa37e',1,'calib_command.h']]], - ['aes_5fmode_5fmask_10',['AES_MODE_MASK',['../a00350.html#a7b2f5fb4edfbf4cb719aedbd7215b863',1,'calib_command.h']]], - ['aes_5fmode_5fop_5fmask_11',['AES_MODE_OP_MASK',['../a00350.html#a62c9e80674303aea5f92d76c92d30d2b',1,'calib_command.h']]], - ['aes_5frsp_5fsize_12',['AES_RSP_SIZE',['../a00350.html#ab24f797b7c19e899ef753d9901850e44',1,'calib_command.h']]], - ['atca_5faddress_5fmask_13',['ATCA_ADDRESS_MASK',['../a00350.html#a579676fd500ded40bc49dc53231fa658',1,'calib_command.h']]], - ['atca_5faddress_5fmask_5fconfig_14',['ATCA_ADDRESS_MASK_CONFIG',['../a00350.html#a32d53cee52cd042a31f1adc934ad7a5a',1,'calib_command.h']]], - ['atca_5faddress_5fmask_5fotp_15',['ATCA_ADDRESS_MASK_OTP',['../a00350.html#a56e3f8d816e2068d80003fdee7d58763',1,'calib_command.h']]], - ['atca_5faes_16',['ATCA_AES',['../a00350.html#a4edf9367ffdc790e886166890fc814c1',1,'calib_command.h']]], - ['atca_5faes_5fgfm_5fsize_17',['ATCA_AES_GFM_SIZE',['../a00350.html#a6ce84aad51d25e05139f83ac9ca2b162',1,'calib_command.h']]], - ['atca_5faes_5fkey_5ftype_18',['ATCA_AES_KEY_TYPE',['../a00350.html#a8335b06c5f49c384e2c2f31861865a54',1,'calib_command.h']]], - ['atca_5falloc_5ffailure_19',['ATCA_ALLOC_FAILURE',['../a00263.html#aa17bd20787fa8dcde44983f25c00d80b',1,'atca_status.h']]], - ['atca_5fassert_5ffailure_20',['ATCA_ASSERT_FAILURE',['../a00263.html#abb19bd83c35f7194c30e913a3d4b4137',1,'atca_status.h']]], - ['atca_5fb283_5fkey_5ftype_21',['ATCA_B283_KEY_TYPE',['../a00350.html#a16f1550cc792fa205acef2106f2fcf54',1,'calib_command.h']]], - ['atca_5fbad_5fopcode_22',['ATCA_BAD_OPCODE',['../a00263.html#a3d393762ff34c052e12509e79d54415f',1,'atca_status.h']]], - ['atca_5fbad_5fparam_23',['ATCA_BAD_PARAM',['../a00263.html#a22c74ba87b45d105867f93c97b6dbe04',1,'atca_status.h']]], - ['atca_5fblock_5fsize_24',['ATCA_BLOCK_SIZE',['../a00350.html#aa0117f3d3f9a9ae65a3fab1e68b7caef',1,'calib_command.h']]], - ['atca_5fca2_5fconfig_5fsize_25',['ATCA_CA2_CONFIG_SIZE',['../a00350.html#a80e6b848030f81d90fbad16844105612',1,'calib_command.h']]], - ['atca_5fca2_5fconfig_5fslot_5fsize_26',['ATCA_CA2_CONFIG_SLOT_SIZE',['../a00350.html#a3bf3b2b477944691143db26f205e7d7f',1,'calib_command.h']]], - ['atca_5fcheck_5finvalid_5fmsg_27',['ATCA_CHECK_INVALID_MSG',['../a00800.html#a2593f45dcf42602b3c334dccb9c52395',1,'atca_config_check.h']]], - ['atca_5fcheckmac_28',['ATCA_CHECKMAC',['../a00350.html#a1f9bb707789dc9194b06403113c9dfaf',1,'calib_command.h']]], - ['atca_5fcheckmac_5fverify_5ffailed_29',['ATCA_CHECKMAC_VERIFY_FAILED',['../a00263.html#afe80ac4fce5d1f8edd75a218362779ec',1,'atca_status.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fm0_30',['ATCA_CHIPMODE_CLOCK_DIV_M0',['../a00350.html#abe16121ea22ed08080997a2cfae1c125',1,'calib_command.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fm1_31',['ATCA_CHIPMODE_CLOCK_DIV_M1',['../a00350.html#aabaee03887c7e4403ac4936d9cde406e',1,'calib_command.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fm2_32',['ATCA_CHIPMODE_CLOCK_DIV_M2',['../a00350.html#a84f7e63b8711e799da259862b170fd75',1,'calib_command.h']]], - ['atca_5fchipmode_5fclock_5fdiv_5fmask_33',['ATCA_CHIPMODE_CLOCK_DIV_MASK',['../a00350.html#a09ab7fb893534775d506020643820939',1,'calib_command.h']]], - ['atca_5fchipmode_5fi2c_5faddress_5fflag_34',['ATCA_CHIPMODE_I2C_ADDRESS_FLAG',['../a00350.html#a74a13b4b6304a02b4e006901b6ac1de5',1,'calib_command.h']]], - ['atca_5fchipmode_5foffset_35',['ATCA_CHIPMODE_OFFSET',['../a00350.html#a6eaf90b702c122de71a18a9b2bd43ba7',1,'calib_command.h']]], - ['atca_5fchipmode_5fttl_5fenable_5fflag_36',['ATCA_CHIPMODE_TTL_ENABLE_FLAG',['../a00350.html#a10795619d6fb78965b7e78996261f6cd',1,'calib_command.h']]], - ['atca_5fchipmode_5fwatchdog_5flong_37',['ATCA_CHIPMODE_WATCHDOG_LONG',['../a00350.html#a9a089181beb38a1e5c5add58e96302bc',1,'calib_command.h']]], - ['atca_5fchipmode_5fwatchdog_5fmask_38',['ATCA_CHIPMODE_WATCHDOG_MASK',['../a00350.html#a814ad478cb05af339635633cbcd495b7',1,'calib_command.h']]], - ['atca_5fchipmode_5fwatchdog_5fshort_39',['ATCA_CHIPMODE_WATCHDOG_SHORT',['../a00350.html#ab2c08e9a862fce29e741ef2b75918a8e',1,'calib_command.h']]], - ['atca_5fcmd_5fsize_5fmax_40',['ATCA_CMD_SIZE_MAX',['../a00350.html#a3f7b636ed69136b5e5aa6d172cfd34e9',1,'calib_command.h']]], - ['atca_5fcmd_5fsize_5fmin_41',['ATCA_CMD_SIZE_MIN',['../a00350.html#ac978ae798bc2c020c7b8a2e5a258016e',1,'calib_command.h']]], - ['atca_5fcomm_5ffail_42',['ATCA_COMM_FAIL',['../a00263.html#ae9dd0fe8e48163ddf047629aeb8820e6',1,'atca_status.h']]], - ['atca_5fcount_5fidx_43',['ATCA_COUNT_IDX',['../a00350.html#a0aac7fbfd425112b4b1e922876532a9e',1,'calib_command.h']]], - ['atca_5fcount_5fsize_44',['ATCA_COUNT_SIZE',['../a00350.html#ad410516c4b4eb448a333eb3ed1f7b288',1,'calib_command.h']]], - ['atca_5fcounter_45',['ATCA_COUNTER',['../a00350.html#a9599c4331857f1daa543a31fcce650fd',1,'calib_command.h']]], - ['atca_5fcrc_5fsize_46',['ATCA_CRC_SIZE',['../a00350.html#a276faf364bbb0e27819842111e08842f',1,'calib_command.h']]], - ['atca_5fcrypto_5fsha1_5fen_47',['ATCA_CRYPTO_SHA1_EN',['../a00491.html#a2e5e1b4f8da8d151569d6ff0133b43ec',1,'crypto_sw_config_check.h']]], - ['atca_5fcrypto_5fsha2_5fhmac_5fctr_5fen_48',['ATCA_CRYPTO_SHA2_HMAC_CTR_EN',['../a00491.html#a5a3020c4884811361247f771da67b9a5',1,'crypto_sw_config_check.h']]], - ['atca_5fcrypto_5fsha2_5fhmac_5fen_49',['ATCA_CRYPTO_SHA2_HMAC_EN',['../a00491.html#a18071ade62f5d4b39e444ca87548e31e',1,'crypto_sw_config_check.h']]], - ['atca_5fdata_5fidx_50',['ATCA_DATA_IDX',['../a00350.html#a756539af7bcadf33dd3a9b2f60763f7a',1,'calib_command.h']]], - ['atca_5fdata_5fsize_51',['ATCA_DATA_SIZE',['../a00350.html#a0b96c7eee244d44c648245421745db12',1,'calib_command.h']]], - ['atca_5fdelete_52',['ATCA_DELETE',['../a00350.html#a69f659af2d835a38a13650b26a5e36d4',1,'calib_command.h']]], - ['atca_5fderive_5fkey_53',['ATCA_DERIVE_KEY',['../a00350.html#ac9405ff4647b09a6d8ab7a4d8a091ee8',1,'calib_command.h']]], - ['atca_5fecc_5fconfig_5fsize_54',['ATCA_ECC_CONFIG_SIZE',['../a00350.html#ae8b9077022cc706947fdc8b45a573d81',1,'calib_command.h']]], - ['atca_5fecdh_55',['ATCA_ECDH',['../a00350.html#a06c1c02df3023d78b6b224060966460f',1,'calib_command.h']]], - ['atca_5fexecution_5ferror_56',['ATCA_EXECUTION_ERROR',['../a00263.html#a889853cfab2a19aa22c00d0d19c87bcc',1,'atca_status.h']]], - ['atca_5ffunc_5ffail_57',['ATCA_FUNC_FAIL',['../a00263.html#a962730477dba3c48a84629c23a0e4a13',1,'atca_status.h']]], - ['atca_5fgen_5ffail_58',['ATCA_GEN_FAIL',['../a00263.html#aa1cd2b6470db000dd151f2a092f41edf',1,'atca_status.h']]], - ['atca_5fgendig_59',['ATCA_GENDIG',['../a00350.html#a37e24393c3e995d47a09ad962b6b83de',1,'calib_command.h']]], - ['atca_5fgenkey_60',['ATCA_GENKEY',['../a00350.html#a17f002359b157bee44a3c071a5a206db',1,'calib_command.h']]], - ['atca_5fhealth_5ftest_5ferror_61',['ATCA_HEALTH_TEST_ERROR',['../a00263.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5',1,'atca_status.h']]], - ['atca_5fhmac_62',['ATCA_HMAC',['../a00350.html#a36122a4f84ec0c31330c3c0458304029',1,'calib_command.h']]], - ['atca_5finfo_63',['ATCA_INFO',['../a00350.html#a0e74f12b91b93e683f27fb8b4c0bfb2f',1,'calib_command.h']]], - ['atca_5finvalid_5fid_64',['ATCA_INVALID_ID',['../a00263.html#a9fd83db4807d846db39ffe92925dc939',1,'atca_status.h']]], - ['atca_5finvalid_5fsize_65',['ATCA_INVALID_SIZE',['../a00263.html#a90fced83678233feeb83da9e73579484',1,'atca_status.h']]], - ['atca_5fk283_5fkey_5ftype_66',['ATCA_K283_KEY_TYPE',['../a00350.html#aac4e75cf70cf0cf946216ffefaf65525',1,'calib_command.h']]], - ['atca_5fkdf_67',['ATCA_KDF',['../a00350.html#a1c0632a1eabc73aaebcb4c7f265b8a00',1,'calib_command.h']]], - ['atca_5fkey_5fcount_68',['ATCA_KEY_COUNT',['../a00350.html#afa043ddb1952520a2bba28ac41a98f93',1,'calib_command.h']]], - ['atca_5fkey_5fid_5fmax_69',['ATCA_KEY_ID_MAX',['../a00350.html#a5da5f8005c1b2612b998afcbd823c716',1,'calib_command.h']]], - ['atca_5fkey_5fsize_70',['ATCA_KEY_SIZE',['../a00350.html#a66a410dde8f388c582495ba315284276',1,'calib_command.h']]], - ['atca_5flock_71',['ATCA_LOCK',['../a00350.html#ac227802d9a5680688ac4c2b23b38273c',1,'calib_command.h']]], - ['atca_5flocked_72',['ATCA_LOCKED',['../a00350.html#af397e129e4581162f91873358b5f1538',1,'calib_command.h']]], - ['atca_5fmac_73',['ATCA_MAC',['../a00350.html#aa0843d9ec7e246455483a1fb1fdf3a07',1,'calib_command.h']]], - ['atca_5fno_5fdevices_74',['ATCA_NO_DEVICES',['../a00263.html#a652c8fbaca046330679929610433b987',1,'atca_status.h']]], - ['atca_5fnonce_75',['ATCA_NONCE',['../a00350.html#a232e4a2b3f189cc2c3594ce5f18da3aa',1,'calib_command.h']]], - ['atca_5fnot_5finitialized_76',['ATCA_NOT_INITIALIZED',['../a00263.html#ace96e4c864044972f87aef44e8d106ec',1,'atca_status.h']]], - ['atca_5fnot_5flocked_77',['ATCA_NOT_LOCKED',['../a00263.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3',1,'atca_status.h']]], - ['atca_5fopcode_5fidx_78',['ATCA_OPCODE_IDX',['../a00350.html#a15c3e02dd629f85722f4b74e61f3adca',1,'calib_command.h']]], - ['atca_5fotp_5fblock_5fmax_79',['ATCA_OTP_BLOCK_MAX',['../a00350.html#aa0eacfa4e596c3eb572753b7f5171276',1,'calib_command.h']]], - ['atca_5fotp_5fsize_80',['ATCA_OTP_SIZE',['../a00350.html#a4c05f7bd221df19c5c6ad1fe1f4709be',1,'calib_command.h']]], - ['atca_5fp256_5fkey_5ftype_81',['ATCA_P256_KEY_TYPE',['../a00350.html#a6e53cd97c61a185ca397ebed8dc3edcb',1,'calib_command.h']]], - ['atca_5fpacket_5foverhead_82',['ATCA_PACKET_OVERHEAD',['../a00350.html#aa569255bc251cd90cb2d0f6b710164bc',1,'calib_command.h']]], - ['atca_5fparam1_5fidx_83',['ATCA_PARAM1_IDX',['../a00350.html#a090c04fed9d153a97fb77195c7eb2f56',1,'calib_command.h']]], - ['atca_5fparam2_5fidx_84',['ATCA_PARAM2_IDX',['../a00350.html#a9e84a71fc7e3ba613779aeb8d740eb23',1,'calib_command.h']]], - ['atca_5fparity_5ferror_85',['ATCA_PARITY_ERROR',['../a00263.html#a2fefd4147dcde6662dc2bae6adb61237',1,'atca_status.h']]], - ['atca_5fparse_5ferror_86',['ATCA_PARSE_ERROR',['../a00263.html#a54b00d87ad3367d281df208661352063',1,'atca_status.h']]], - ['atca_5fpause_87',['ATCA_PAUSE',['../a00350.html#a7d786006183912073939b3f62075dd27',1,'calib_command.h']]], - ['atca_5fpriv_5fkey_5fsize_88',['ATCA_PRIV_KEY_SIZE',['../a00350.html#a3caf91c8e7ec183e0ad7b93dad9cb548',1,'calib_command.h']]], - ['atca_5fprivwrite_89',['ATCA_PRIVWRITE',['../a00350.html#a3171c7ab4447a2e752706bed1072e694',1,'calib_command.h']]], - ['atca_5fpub_5fkey_5fpad_90',['ATCA_PUB_KEY_PAD',['../a00350.html#ae52318f0263884ff3a3e67328138cc75',1,'calib_command.h']]], - ['atca_5fpub_5fkey_5fsize_91',['ATCA_PUB_KEY_SIZE',['../a00350.html#a07089e8e8b1aa335ddfd37e591f64ebb',1,'calib_command.h']]], - ['atca_5frandom_92',['ATCA_RANDOM',['../a00350.html#ace94188e9d741a9b44616474b633064f',1,'calib_command.h']]], - ['atca_5fread_93',['ATCA_READ',['../a00350.html#a8760372110d92cea3570a5720db05de2',1,'calib_command.h']]], - ['atca_5fresync_5fwith_5fwakeup_94',['ATCA_RESYNC_WITH_WAKEUP',['../a00263.html#a6c467c51b23ea961e1aabd6e98644d47',1,'atca_status.h']]], - ['atca_5frsp_5fdata_5fidx_95',['ATCA_RSP_DATA_IDX',['../a00350.html#abaaa930c2275599fcc3d83cfc02bfafe',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f16_96',['ATCA_RSP_SIZE_16',['../a00350.html#a0be09b502137446daedc43f1d3e85f86',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f32_97',['ATCA_RSP_SIZE_32',['../a00350.html#afd812ab5b70a92a4d3a420c4f7106ac5',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f4_98',['ATCA_RSP_SIZE_4',['../a00350.html#a15cc6f16cdb8f11b60981af7c3b15ef8',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f64_99',['ATCA_RSP_SIZE_64',['../a00350.html#a5b7ad7c3c75639352af5ad3b1298500c',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5f72_100',['ATCA_RSP_SIZE_72',['../a00350.html#a67ca82b396385dd18790b48d731dfe15',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5fmax_101',['ATCA_RSP_SIZE_MAX',['../a00350.html#a908aece3a9501eb14a70c2b24a3e4089',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5fmin_102',['ATCA_RSP_SIZE_MIN',['../a00350.html#a0c738f2cc7bf063582c34188f85ddc3c',1,'calib_command.h']]], - ['atca_5frsp_5fsize_5fval_103',['ATCA_RSP_SIZE_VAL',['../a00350.html#a882f14cac02df8282ccad2a43afc8a23',1,'calib_command.h']]], - ['atca_5frx_5fcrc_5ferror_104',['ATCA_RX_CRC_ERROR',['../a00263.html#aef8e0056fbad0bd33fcb2213b2f3ae49',1,'atca_status.h']]], - ['atca_5frx_5ffail_105',['ATCA_RX_FAIL',['../a00263.html#a8aa6f2e22841fba09b78262c9ce7a728',1,'atca_status.h']]], - ['atca_5frx_5fno_5fresponse_106',['ATCA_RX_NO_RESPONSE',['../a00263.html#a6a0c600725ed81640f2e39c88c864e1c',1,'atca_status.h']]], - ['atca_5frx_5ftimeout_107',['ATCA_RX_TIMEOUT',['../a00263.html#ab5bbd989a822d35a59c9eb6258bf26fc',1,'atca_status.h']]], - ['atca_5fsecureboot_108',['ATCA_SECUREBOOT',['../a00350.html#af4aab184dc60e2de854994d26d57dfde',1,'calib_command.h']]], - ['atca_5fselftest_109',['ATCA_SELFTEST',['../a00350.html#acbec80dc1b5f24d3013c2a9b06c11bdc',1,'calib_command.h']]], - ['atca_5fserial_5fnum_5fsize_110',['ATCA_SERIAL_NUM_SIZE',['../a00350.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0',1,'calib_command.h']]], - ['atca_5fsha_111',['ATCA_SHA',['../a00350.html#a8e5f11692a8a23e1410d9b5ce8bebc2b',1,'calib_command.h']]], - ['atca_5fsha256_5fblock_5fsize_112',['ATCA_SHA256_BLOCK_SIZE',['../a00506.html#a85e0a506bd6fdae6ce32d5df3a48ac1c',1,'cryptoauthlib.h']]], - ['atca_5fsha_5fconfig_5fsize_113',['ATCA_SHA_CONFIG_SIZE',['../a00350.html#a1887d11853092541df18c2a04fb6b87a',1,'calib_command.h']]], - ['atca_5fsha_5fkey_5ftype_114',['ATCA_SHA_KEY_TYPE',['../a00350.html#ad325831ee2326885795706efd7b3b00e',1,'calib_command.h']]], - ['atca_5fsha_5fsupport_115',['ATCA_SHA_SUPPORT',['../a00800.html#afe8da91949841c137ea573c327bff267',1,'atca_config_check.h']]], - ['atca_5fsig_5fsize_116',['ATCA_SIG_SIZE',['../a00350.html#a56448f81a8d04c6871b3422c496bf8b6',1,'calib_command.h']]], - ['atca_5fsign_117',['ATCA_SIGN',['../a00350.html#a516dbf4bbd2c4b366e0306890d0bca56',1,'calib_command.h']]], - ['atca_5fsmall_5fbuffer_118',['ATCA_SMALL_BUFFER',['../a00263.html#ab1a2ea3166875b26f91e82767d6e3e1a',1,'atca_status.h']]], - ['atca_5fstatus_5fcrc_119',['ATCA_STATUS_CRC',['../a00263.html#a9198f13b90df739a1ca20f101beccfbb',1,'atca_status.h']]], - ['atca_5fstatus_5fecc_120',['ATCA_STATUS_ECC',['../a00263.html#ad878d8797ca33784da8e968cbf17a722',1,'atca_status.h']]], - ['atca_5fstatus_5fselftest_5ferror_121',['ATCA_STATUS_SELFTEST_ERROR',['../a00263.html#a3319805e96477b7b89da0f4a69ef1a83',1,'atca_status.h']]], - ['atca_5fstatus_5funknown_122',['ATCA_STATUS_UNKNOWN',['../a00263.html#a884d88ac0c809d0801ca4dbe24dac986',1,'atca_status.h']]], - ['atca_5fsuccess_123',['ATCA_SUCCESS',['../a00263.html#ab132d69c7f94de708ffef02b6dc69d27',1,'atca_status.h']]], - ['atca_5fswi_5fwake_5fword_5faddr_124',['ATCA_SWI_WAKE_WORD_ADDR',['../a00587.html#a35e9d98d207f17ebac66dc86e29a6464',1,'hal_swi_gpio.h']]], - ['atca_5ftempkey_5fkeyid_125',['ATCA_TEMPKEY_KEYID',['../a00350.html#a988fff8295c1914217b8543b614f556c',1,'calib_command.h']]], - ['atca_5ftimeout_126',['ATCA_TIMEOUT',['../a00263.html#afc6b7767c53326f3520ec83ac02df679',1,'atca_status.h']]], - ['atca_5ftoo_5fmany_5fcomm_5fretries_127',['ATCA_TOO_MANY_COMM_RETRIES',['../a00263.html#ad4cd022abf0e71d3605a9fc18e8a1ea6',1,'atca_status.h']]], - ['atca_5ftx_5ffail_128',['ATCA_TX_FAIL',['../a00263.html#a149bb02116700288df316d5ab391f5d3',1,'atca_status.h']]], - ['atca_5ftx_5ftimeout_129',['ATCA_TX_TIMEOUT',['../a00263.html#a7b4c194a6a86ffadc703b841280778c3',1,'atca_status.h']]], - ['atca_5funimplemented_130',['ATCA_UNIMPLEMENTED',['../a00263.html#ad80a997b8786774af268692c936f90d9',1,'atca_status.h']]], - ['atca_5funlocked_131',['ATCA_UNLOCKED',['../a00350.html#a54155caf79f004ccf0a875cf3a0ef05b',1,'calib_command.h']]], - ['atca_5funused_5fvar_5fcheck_132',['ATCA_UNUSED_VAR_CHECK',['../a00800.html#a987213394bc9a51f05c4a5f1b1de69f8',1,'atca_config_check.h']]], - ['atca_5fupdate_5fextra_133',['ATCA_UPDATE_EXTRA',['../a00350.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2',1,'calib_command.h']]], - ['atca_5fuse_5fatcab_5ffunctions_134',['ATCA_USE_ATCAB_FUNCTIONS',['../a00800.html#ab97062ef8dcf4e46b403d9c22aeb22c9',1,'atca_config_check.h']]], - ['atca_5fuse_5fflags_5fconsumed_135',['ATCA_USE_FLAGS_CONSUMED',['../a00263.html#a4dbc1891be5e77d93690554e7bb2aa8d',1,'atca_status.h']]], - ['atca_5fverify_136',['ATCA_VERIFY',['../a00350.html#a8e357a6e926176155fe47aba97d915fb',1,'calib_command.h']]], - ['atca_5fwake_5ffailed_137',['ATCA_WAKE_FAILED',['../a00263.html#a796b7e7bc096ae19c65b701d87b8718f',1,'atca_status.h']]], - ['atca_5fwake_5fsuccess_138',['ATCA_WAKE_SUCCESS',['../a00263.html#afb58269e38e4025d4e6620c4d1202ee4',1,'atca_status.h']]], - ['atca_5fword_5fsize_139',['ATCA_WORD_SIZE',['../a00350.html#a555bdf8fa32d4d47577f7748ca928389',1,'calib_command.h']]], - ['atca_5fwrite_140',['ATCA_WRITE',['../a00350.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771',1,'calib_command.h']]], - ['atca_5fzone_5fencrypted_141',['ATCA_ZONE_ENCRYPTED',['../a00350.html#a167bc588244395e98461008070fee8f3',1,'calib_command.h']]], - ['atca_5fzone_5fmask_142',['ATCA_ZONE_MASK',['../a00350.html#a1d6d2f2713e845ec3b3bf465025d6858',1,'calib_command.h']]], - ['atca_5fzone_5freadwrite_5f32_143',['ATCA_ZONE_READWRITE_32',['../a00350.html#aa32b46f2c058ee54377d0cbef1ec8764',1,'calib_command.h']]], - ['atcab_5faes_5fcbc_5fdecrypt_5fen_144',['ATCAB_AES_CBC_DECRYPT_EN',['../a00488.html#a23ae19deaff29f2796c4981962ca9b55',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fcbc_5fencrypt_5fen_145',['ATCAB_AES_CBC_ENCRYPT_EN',['../a00488.html#ac2eb887016e59054e626341175577669',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fcbcmac_5fen_146',['ATCAB_AES_CBCMAC_EN',['../a00488.html#a1996786ea061102926ef0ba52a510bfd',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fccm_5fen_147',['ATCAB_AES_CCM_EN',['../a00488.html#ae638244ab3ba72e50b974f763e2abc42',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fctr_5fen_148',['ATCAB_AES_CTR_EN',['../a00488.html#a6569901e92e84b0b448794f8a89d1d9e',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fctr_5frand_5fiv_5fen_149',['ATCAB_AES_CTR_RAND_IV_EN',['../a00488.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fextras_5fen_150',['ATCAB_AES_EXTRAS_EN',['../a00488.html#a28cb83338bbbc858be983299cede3ba9',1,'crypto_hw_config_check.h']]], - ['atcab_5faes_5fgfm_5fen_151',['ATCAB_AES_GFM_EN',['../a00800.html#a31c9145169cb4a4e3be509ad04a40b04',1,'atca_config_check.h']]], - ['atcab_5faes_5fupdate_5fen_152',['ATCAB_AES_UPDATE_EN',['../a00488.html#af273e717452d3e5295d20197b4615ed0',1,'crypto_hw_config_check.h']]], - ['atcab_5fgenkey_5fmac_5fen_153',['ATCAB_GENKEY_MAC_EN',['../a00800.html#a85d4ccd2d66f9b2fd10c7a2e408c4737',1,'atca_config_check.h']]], - ['atcab_5finfo_5flatch_5fen_154',['ATCAB_INFO_LATCH_EN',['../a00800.html#a5965863afba861e5e0e899229da26e83',1,'atca_config_check.h']]], - ['atcab_5fpbkdf2_5fsha256_5fen_155',['ATCAB_PBKDF2_SHA256_EN',['../a00491.html#aa46ae7101b70ba482359edccca83f414',1,'crypto_sw_config_check.h']]], - ['atcab_5fverify_5fmac_5fen_156',['ATCAB_VERIFY_MAC_EN',['../a00800.html#a5d69a9273e615d799841edc21bd72dc0',1,'atca_config_check.h']]], - ['atcac_5faes_5fcmac_5fen_157',['ATCAC_AES_CMAC_EN',['../a00665.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_openssl_interface.h'],['../a00653.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_mbedtls_interface.h']]], - ['atcac_5faes_5fgcm_5fen_158',['ATCAC_AES_GCM_EN',['../a00491.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): crypto_sw_config_check.h'],['../a00653.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_mbedtls_interface.h'],['../a00665.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_openssl_interface.h']]], - ['atcac_5fpbkdf2_5fsha256_5fen_159',['ATCAC_PBKDF2_SHA256_EN',['../a00491.html#a6d2fa2e22a151bea100d7c7ee84dbe7f',1,'crypto_sw_config_check.h']]], - ['atcac_5fpkey_5fen_160',['ATCAC_PKEY_EN',['../a00653.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_mbedtls_interface.h'],['../a00665.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_openssl_interface.h']]], - ['atcac_5frandom_5fen_161',['ATCAC_RANDOM_EN',['../a00800.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): atca_config_check.h'],['../a00491.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): crypto_sw_config_check.h']]], - ['atcac_5fsha1_5fen_162',['ATCAC_SHA1_EN',['../a00653.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_mbedtls_interface.h'],['../a00665.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_openssl_interface.h'],['../a00491.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): crypto_sw_config_check.h'],['../a00800.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_config_check.h']]], - ['atcac_5fsha256_5fen_163',['ATCAC_SHA256_EN',['../a00800.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_config_check.h'],['../a00491.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): crypto_sw_config_check.h'],['../a00653.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_mbedtls_interface.h'],['../a00665.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_openssl_interface.h']]], - ['atcac_5fsign_5fen_164',['ATCAC_SIGN_EN',['../a00800.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): atca_config_check.h'],['../a00491.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): crypto_sw_config_check.h']]], - ['atcac_5fverify_5fen_165',['ATCAC_VERIFY_EN',['../a00800.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): atca_config_check.h'],['../a00491.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): crypto_sw_config_check.h']]], - ['atcacert_5fen_166',['ATCACERT_EN',['../a00800.html#a3d181d31956d42db1d25281deca4c7e3',1,'atca_config_check.h']]], - ['atcah_5fcheck_5fmac_167',['ATCAH_CHECK_MAC',['../a00638.html#a063f7ad7678d60de756ef8526b9dfea1',1,'atca_host_config_check.h']]], - ['atcah_5fconfig_5fto_5fsign_5finternal_168',['ATCAH_CONFIG_TO_SIGN_INTERNAL',['../a00638.html#ae427973632a62dfd8f35709c21993190',1,'atca_host_config_check.h']]], - ['atcah_5fdecrypt_169',['ATCAH_DECRYPT',['../a00638.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b',1,'atca_host_config_check.h']]], - ['atcah_5fdelete_5fmac_170',['ATCAH_DELETE_MAC',['../a00638.html#acd2c32968024ddc7c650102a5076d70b',1,'atca_host_config_check.h']]], - ['atcah_5fderive_5fkey_171',['ATCAH_DERIVE_KEY',['../a00638.html#ada4b87726e822b6e94dcc18eefc39049',1,'atca_host_config_check.h']]], - ['atcah_5fderive_5fkey_5fmac_172',['ATCAH_DERIVE_KEY_MAC',['../a00638.html#a22a85235261861839a0db05649999ef5',1,'atca_host_config_check.h']]], - ['atcah_5fencode_5fcounter_5fmatch_173',['ATCAH_ENCODE_COUNTER_MATCH',['../a00638.html#a2ecb26546b49e369aeaf86bccf10a2e9',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5fkey_5fmsg_174',['ATCAH_GEN_KEY_MSG',['../a00638.html#a371384b4f8d818c31dee337aa4e24403',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5fmac_175',['ATCAH_GEN_MAC',['../a00638.html#a0f0e6c501c2dc57b4ed68fe29780b062',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5foutput_5fresp_5fmac_176',['ATCAH_GEN_OUTPUT_RESP_MAC',['../a00638.html#a70d0b80d637281693321866bd3c2735f',1,'atca_host_config_check.h']]], - ['atcah_5fgen_5fsession_5fkey_177',['ATCAH_GEN_SESSION_KEY',['../a00638.html#aa5220706535f7367e06aa2aadebc0b57',1,'atca_host_config_check.h']]], - ['atcah_5fgendig_178',['ATCAH_GENDIG',['../a00638.html#aec5752be28ebfd8dc506bda7c36b9f7d',1,'atca_host_config_check.h']]], - ['atcah_5fgendivkey_179',['ATCAH_GENDIVKEY',['../a00638.html#af25240ee5ff347e1cf2768bfd513345f',1,'atca_host_config_check.h']]], - ['atcah_5fhmac_180',['ATCAH_HMAC',['../a00638.html#a6a86a40deff31dbaf005519aba627991',1,'atca_host_config_check.h']]], - ['atcah_5finclude_5fdata_181',['ATCAH_INCLUDE_DATA',['../a00638.html#a6442329f443943bbc8f3e10dde67930d',1,'atca_host_config_check.h']]], - ['atcah_5fio_5fdecrypt_182',['ATCAH_IO_DECRYPT',['../a00638.html#ae58a45ab173bf9ca7c4cdf4768fcf00e',1,'atca_host_config_check.h']]], - ['atcah_5fmac_183',['ATCAH_MAC',['../a00638.html#a33ac8a876197c7774452b7b46411f188',1,'atca_host_config_check.h']]], - ['atcah_5fnonce_184',['ATCAH_NONCE',['../a00638.html#a879c87175b07e859a15320e199a104a6',1,'atca_host_config_check.h']]], - ['atcah_5fprivwrite_5fauth_5fmac_185',['ATCAH_PRIVWRITE_AUTH_MAC',['../a00638.html#a13ed9a07ad5f74cfb67b7582c1b638a3',1,'atca_host_config_check.h']]], - ['atcah_5fsecureboot_5fenc_186',['ATCAH_SECUREBOOT_ENC',['../a00638.html#a745b85254a910c7d8edbea41ab927cf4',1,'atca_host_config_check.h']]], - ['atcah_5fsecureboot_5fmac_187',['ATCAH_SECUREBOOT_MAC',['../a00638.html#aa1d0ffc3e79f52154b2e362b74b7b112',1,'atca_host_config_check.h']]], - ['atcah_5fsha256_188',['ATCAH_SHA256',['../a00638.html#a58d2f9f20485ae35c2208f3bce5cb4a7',1,'atca_host_config_check.h']]], - ['atcah_5fsign_5finternal_5fmsg_189',['ATCAH_SIGN_INTERNAL_MSG',['../a00638.html#ad2e1b57a0f8a5dc87427b1eca18ac02f',1,'atca_host_config_check.h']]], - ['atcah_5fverify_5fmac_190',['ATCAH_VERIFY_MAC',['../a00638.html#a1515a97abca19263c1cf16dcbdd01944',1,'atca_host_config_check.h']]], - ['atcah_5fwrite_5fauth_5fmac_191',['ATCAH_WRITE_AUTH_MAC',['../a00638.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0',1,'atca_host_config_check.h']]] + ['aes_5fcount_0',['AES_COUNT',['../a00356.html#a72cc5ecbdfa169d282776461ce48fda6',1,'calib_command.h']]], + ['aes_5fdata_5fsize_1',['AES_DATA_SIZE',['../a00356.html#a8cbce00b91b0ddfb3264c9c367a3699a',1,'calib_command.h']]], + ['aes_5finput_5fidx_2',['AES_INPUT_IDX',['../a00356.html#afabb67121c9c58fac9829287b55a2389',1,'calib_command.h']]], + ['aes_5fkeyid_5fidx_3',['AES_KEYID_IDX',['../a00356.html#a2809c87d994c49b53e039f752834fc97',1,'calib_command.h']]], + ['aes_5fmode_5fdecrypt_4',['AES_MODE_DECRYPT',['../a00356.html#a01cd269d08661e645b4caee850424130',1,'calib_command.h']]], + ['aes_5fmode_5fencrypt_5',['AES_MODE_ENCRYPT',['../a00356.html#a5ebee4d7d2d30a88ded25f9a6feecc52',1,'calib_command.h']]], + ['aes_5fmode_5fgfm_6',['AES_MODE_GFM',['../a00356.html#a34ec73cf7504b560883a5d192fe88793',1,'calib_command.h']]], + ['aes_5fmode_5fidx_7',['AES_MODE_IDX',['../a00356.html#a890e2e40916e88caf596cff43be8ab23',1,'calib_command.h']]], + ['aes_5fmode_5fkey_5fblock_5fmask_8',['AES_MODE_KEY_BLOCK_MASK',['../a00356.html#af54068dbf6ecb7bf8b1881caa0f3b89f',1,'calib_command.h']]], + ['aes_5fmode_5fkey_5fblock_5fpos_9',['AES_MODE_KEY_BLOCK_POS',['../a00356.html#abbbbd4cd4cc05e2ea023f059676aa37e',1,'calib_command.h']]], + ['aes_5fmode_5fmask_10',['AES_MODE_MASK',['../a00356.html#a7b2f5fb4edfbf4cb719aedbd7215b863',1,'calib_command.h']]], + ['aes_5fmode_5fop_5fmask_11',['AES_MODE_OP_MASK',['../a00356.html#a62c9e80674303aea5f92d76c92d30d2b',1,'calib_command.h']]], + ['aes_5frsp_5fsize_12',['AES_RSP_SIZE',['../a00356.html#ab24f797b7c19e899ef753d9901850e44',1,'calib_command.h']]], + ['atca_5faddress_5fmask_13',['ATCA_ADDRESS_MASK',['../a00356.html#a579676fd500ded40bc49dc53231fa658',1,'calib_command.h']]], + ['atca_5faddress_5fmask_5fconfig_14',['ATCA_ADDRESS_MASK_CONFIG',['../a00356.html#a32d53cee52cd042a31f1adc934ad7a5a',1,'calib_command.h']]], + ['atca_5faddress_5fmask_5fotp_15',['ATCA_ADDRESS_MASK_OTP',['../a00356.html#a56e3f8d816e2068d80003fdee7d58763',1,'calib_command.h']]], + ['atca_5faes_16',['ATCA_AES',['../a00356.html#a4edf9367ffdc790e886166890fc814c1',1,'calib_command.h']]], + ['atca_5faes_5fgfm_5fsize_17',['ATCA_AES_GFM_SIZE',['../a00356.html#a6ce84aad51d25e05139f83ac9ca2b162',1,'calib_command.h']]], + ['atca_5faes_5fkey_5ftype_18',['ATCA_AES_KEY_TYPE',['../a00356.html#a8335b06c5f49c384e2c2f31861865a54',1,'calib_command.h']]], + ['atca_5falloc_5ffailure_19',['ATCA_ALLOC_FAILURE',['../a00269.html#aa17bd20787fa8dcde44983f25c00d80b',1,'atca_status.h']]], + ['atca_5fassert_5ffailure_20',['ATCA_ASSERT_FAILURE',['../a00269.html#abb19bd83c35f7194c30e913a3d4b4137',1,'atca_status.h']]], + ['atca_5fb283_5fkey_5ftype_21',['ATCA_B283_KEY_TYPE',['../a00356.html#a16f1550cc792fa205acef2106f2fcf54',1,'calib_command.h']]], + ['atca_5fbad_5fopcode_22',['ATCA_BAD_OPCODE',['../a00269.html#a3d393762ff34c052e12509e79d54415f',1,'atca_status.h']]], + ['atca_5fbad_5fparam_23',['ATCA_BAD_PARAM',['../a00269.html#a22c74ba87b45d105867f93c97b6dbe04',1,'atca_status.h']]], + ['atca_5fblock_5fsize_24',['ATCA_BLOCK_SIZE',['../a00356.html#aa0117f3d3f9a9ae65a3fab1e68b7caef',1,'calib_command.h']]], + ['atca_5fca2_5fconfig_5fsize_25',['ATCA_CA2_CONFIG_SIZE',['../a00356.html#a80e6b848030f81d90fbad16844105612',1,'calib_command.h']]], + ['atca_5fca2_5fconfig_5fslot_5fsize_26',['ATCA_CA2_CONFIG_SLOT_SIZE',['../a00356.html#a3bf3b2b477944691143db26f205e7d7f',1,'calib_command.h']]], + ['atca_5fcheck_5finvalid_5fmsg_27',['ATCA_CHECK_INVALID_MSG',['../a00815.html#a2593f45dcf42602b3c334dccb9c52395',1,'atca_config_check.h']]], + ['atca_5fcheckmac_28',['ATCA_CHECKMAC',['../a00356.html#a1f9bb707789dc9194b06403113c9dfaf',1,'calib_command.h']]], + ['atca_5fcheckmac_5fverify_5ffailed_29',['ATCA_CHECKMAC_VERIFY_FAILED',['../a00269.html#afe80ac4fce5d1f8edd75a218362779ec',1,'atca_status.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fm0_30',['ATCA_CHIPMODE_CLOCK_DIV_M0',['../a00356.html#abe16121ea22ed08080997a2cfae1c125',1,'calib_command.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fm1_31',['ATCA_CHIPMODE_CLOCK_DIV_M1',['../a00356.html#aabaee03887c7e4403ac4936d9cde406e',1,'calib_command.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fm2_32',['ATCA_CHIPMODE_CLOCK_DIV_M2',['../a00356.html#a84f7e63b8711e799da259862b170fd75',1,'calib_command.h']]], + ['atca_5fchipmode_5fclock_5fdiv_5fmask_33',['ATCA_CHIPMODE_CLOCK_DIV_MASK',['../a00356.html#a09ab7fb893534775d506020643820939',1,'calib_command.h']]], + ['atca_5fchipmode_5fi2c_5faddress_5fflag_34',['ATCA_CHIPMODE_I2C_ADDRESS_FLAG',['../a00356.html#a74a13b4b6304a02b4e006901b6ac1de5',1,'calib_command.h']]], + ['atca_5fchipmode_5foffset_35',['ATCA_CHIPMODE_OFFSET',['../a00356.html#a6eaf90b702c122de71a18a9b2bd43ba7',1,'calib_command.h']]], + ['atca_5fchipmode_5fttl_5fenable_5fflag_36',['ATCA_CHIPMODE_TTL_ENABLE_FLAG',['../a00356.html#a10795619d6fb78965b7e78996261f6cd',1,'calib_command.h']]], + ['atca_5fchipmode_5fwatchdog_5flong_37',['ATCA_CHIPMODE_WATCHDOG_LONG',['../a00356.html#a9a089181beb38a1e5c5add58e96302bc',1,'calib_command.h']]], + ['atca_5fchipmode_5fwatchdog_5fmask_38',['ATCA_CHIPMODE_WATCHDOG_MASK',['../a00356.html#a814ad478cb05af339635633cbcd495b7',1,'calib_command.h']]], + ['atca_5fchipmode_5fwatchdog_5fshort_39',['ATCA_CHIPMODE_WATCHDOG_SHORT',['../a00356.html#ab2c08e9a862fce29e741ef2b75918a8e',1,'calib_command.h']]], + ['atca_5fcmd_5fsize_5fmax_40',['ATCA_CMD_SIZE_MAX',['../a00356.html#a3f7b636ed69136b5e5aa6d172cfd34e9',1,'calib_command.h']]], + ['atca_5fcmd_5fsize_5fmin_41',['ATCA_CMD_SIZE_MIN',['../a00356.html#ac978ae798bc2c020c7b8a2e5a258016e',1,'calib_command.h']]], + ['atca_5fcomm_5ffail_42',['ATCA_COMM_FAIL',['../a00269.html#ae9dd0fe8e48163ddf047629aeb8820e6',1,'atca_status.h']]], + ['atca_5fcount_5fidx_43',['ATCA_COUNT_IDX',['../a00356.html#a0aac7fbfd425112b4b1e922876532a9e',1,'calib_command.h']]], + ['atca_5fcount_5fsize_44',['ATCA_COUNT_SIZE',['../a00356.html#ad410516c4b4eb448a333eb3ed1f7b288',1,'calib_command.h']]], + ['atca_5fcounter_45',['ATCA_COUNTER',['../a00356.html#a9599c4331857f1daa543a31fcce650fd',1,'calib_command.h']]], + ['atca_5fcrc_5fsize_46',['ATCA_CRC_SIZE',['../a00356.html#a276faf364bbb0e27819842111e08842f',1,'calib_command.h']]], + ['atca_5fcrypto_5faes_5fcmac_5fen_47',['ATCA_CRYPTO_AES_CMAC_EN',['../a00506.html#a112f8346894949beab73635af3851822',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5faes_5fgcm_5fen_48',['ATCA_CRYPTO_AES_GCM_EN',['../a00506.html#a51c0870d3a917ac80f7a786feceeba57',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha1_5fen_49',['ATCA_CRYPTO_SHA1_EN',['../a00506.html#a2e5e1b4f8da8d151569d6ff0133b43ec',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha256_5fen_50',['ATCA_CRYPTO_SHA256_EN',['../a00506.html#ace1877f29888c93a210f571fc4eff7ee',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha2_5fen_51',['ATCA_CRYPTO_SHA2_EN',['../a00506.html#aff63a86885856fcc093664f27af75f27',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha2_5fhmac_5fctr_5fen_52',['ATCA_CRYPTO_SHA2_HMAC_CTR_EN',['../a00506.html#a5a3020c4884811361247f771da67b9a5',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha2_5fhmac_5fen_53',['ATCA_CRYPTO_SHA2_HMAC_EN',['../a00506.html#a18071ade62f5d4b39e444ca87548e31e',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha384_5fen_54',['ATCA_CRYPTO_SHA384_EN',['../a00506.html#a98bc86a602a329edb27388de020d6282',1,'crypto_sw_config_check.h']]], + ['atca_5fcrypto_5fsha512_5fen_55',['ATCA_CRYPTO_SHA512_EN',['../a00506.html#a80bccf213793f64bc90bb751ef12da3a',1,'crypto_sw_config_check.h']]], + ['atca_5fdata_5fidx_56',['ATCA_DATA_IDX',['../a00356.html#a756539af7bcadf33dd3a9b2f60763f7a',1,'calib_command.h']]], + ['atca_5fdata_5fsize_57',['ATCA_DATA_SIZE',['../a00356.html#a0b96c7eee244d44c648245421745db12',1,'calib_command.h']]], + ['atca_5fdelete_58',['ATCA_DELETE',['../a00356.html#a69f659af2d835a38a13650b26a5e36d4',1,'calib_command.h']]], + ['atca_5fderive_5fkey_59',['ATCA_DERIVE_KEY',['../a00356.html#ac9405ff4647b09a6d8ab7a4d8a091ee8',1,'calib_command.h']]], + ['atca_5fecc_5fconfig_5fsize_60',['ATCA_ECC_CONFIG_SIZE',['../a00356.html#ae8b9077022cc706947fdc8b45a573d81',1,'calib_command.h']]], + ['atca_5fecdh_61',['ATCA_ECDH',['../a00356.html#a06c1c02df3023d78b6b224060966460f',1,'calib_command.h']]], + ['atca_5fexecution_5ferror_62',['ATCA_EXECUTION_ERROR',['../a00269.html#a889853cfab2a19aa22c00d0d19c87bcc',1,'atca_status.h']]], + ['atca_5ffunc_5ffail_63',['ATCA_FUNC_FAIL',['../a00269.html#a962730477dba3c48a84629c23a0e4a13',1,'atca_status.h']]], + ['atca_5fgen_5ffail_64',['ATCA_GEN_FAIL',['../a00269.html#aa1cd2b6470db000dd151f2a092f41edf',1,'atca_status.h']]], + ['atca_5fgendig_65',['ATCA_GENDIG',['../a00356.html#a37e24393c3e995d47a09ad962b6b83de',1,'calib_command.h']]], + ['atca_5fgenkey_66',['ATCA_GENKEY',['../a00356.html#a17f002359b157bee44a3c071a5a206db',1,'calib_command.h']]], + ['atca_5fhealth_5ftest_5ferror_67',['ATCA_HEALTH_TEST_ERROR',['../a00269.html#a2fb44bc6d1bd34f7b22e9d05e8e638a5',1,'atca_status.h']]], + ['atca_5fhmac_68',['ATCA_HMAC',['../a00356.html#a36122a4f84ec0c31330c3c0458304029',1,'calib_command.h']]], + ['atca_5finfo_69',['ATCA_INFO',['../a00356.html#a0e74f12b91b93e683f27fb8b4c0bfb2f',1,'calib_command.h']]], + ['atca_5finvalid_5fid_70',['ATCA_INVALID_ID',['../a00269.html#a9fd83db4807d846db39ffe92925dc939',1,'atca_status.h']]], + ['atca_5finvalid_5fsize_71',['ATCA_INVALID_SIZE',['../a00269.html#a90fced83678233feeb83da9e73579484',1,'atca_status.h']]], + ['atca_5fk283_5fkey_5ftype_72',['ATCA_K283_KEY_TYPE',['../a00356.html#aac4e75cf70cf0cf946216ffefaf65525',1,'calib_command.h']]], + ['atca_5fkdf_73',['ATCA_KDF',['../a00356.html#a1c0632a1eabc73aaebcb4c7f265b8a00',1,'calib_command.h']]], + ['atca_5fkey_5fcount_74',['ATCA_KEY_COUNT',['../a00356.html#afa043ddb1952520a2bba28ac41a98f93',1,'calib_command.h']]], + ['atca_5fkey_5fid_5fmax_75',['ATCA_KEY_ID_MAX',['../a00356.html#a5da5f8005c1b2612b998afcbd823c716',1,'calib_command.h']]], + ['atca_5fkey_5fsize_76',['ATCA_KEY_SIZE',['../a00356.html#a66a410dde8f388c582495ba315284276',1,'calib_command.h']]], + ['atca_5flock_77',['ATCA_LOCK',['../a00356.html#ac227802d9a5680688ac4c2b23b38273c',1,'calib_command.h']]], + ['atca_5flocked_78',['ATCA_LOCKED',['../a00356.html#af397e129e4581162f91873358b5f1538',1,'calib_command.h']]], + ['atca_5fmac_79',['ATCA_MAC',['../a00356.html#aa0843d9ec7e246455483a1fb1fdf3a07',1,'calib_command.h']]], + ['atca_5fno_5fdevices_80',['ATCA_NO_DEVICES',['../a00269.html#a652c8fbaca046330679929610433b987',1,'atca_status.h']]], + ['atca_5fnonce_81',['ATCA_NONCE',['../a00356.html#a232e4a2b3f189cc2c3594ce5f18da3aa',1,'calib_command.h']]], + ['atca_5fnot_5finitialized_82',['ATCA_NOT_INITIALIZED',['../a00269.html#ace96e4c864044972f87aef44e8d106ec',1,'atca_status.h']]], + ['atca_5fnot_5flocked_83',['ATCA_NOT_LOCKED',['../a00269.html#a7c3366f0cbffb0ecdaa06a3581bcf9d3',1,'atca_status.h']]], + ['atca_5fopcode_5fidx_84',['ATCA_OPCODE_IDX',['../a00356.html#a15c3e02dd629f85722f4b74e61f3adca',1,'calib_command.h']]], + ['atca_5fotp_5fblock_5fmax_85',['ATCA_OTP_BLOCK_MAX',['../a00356.html#aa0eacfa4e596c3eb572753b7f5171276',1,'calib_command.h']]], + ['atca_5fotp_5fsize_86',['ATCA_OTP_SIZE',['../a00356.html#a4c05f7bd221df19c5c6ad1fe1f4709be',1,'calib_command.h']]], + ['atca_5fp256_5fkey_5ftype_87',['ATCA_P256_KEY_TYPE',['../a00356.html#a6e53cd97c61a185ca397ebed8dc3edcb',1,'calib_command.h']]], + ['atca_5fpacket_5foverhead_88',['ATCA_PACKET_OVERHEAD',['../a00356.html#aa569255bc251cd90cb2d0f6b710164bc',1,'calib_command.h']]], + ['atca_5fparam1_5fidx_89',['ATCA_PARAM1_IDX',['../a00356.html#a090c04fed9d153a97fb77195c7eb2f56',1,'calib_command.h']]], + ['atca_5fparam2_5fidx_90',['ATCA_PARAM2_IDX',['../a00356.html#a9e84a71fc7e3ba613779aeb8d740eb23',1,'calib_command.h']]], + ['atca_5fparity_5ferror_91',['ATCA_PARITY_ERROR',['../a00269.html#a2fefd4147dcde6662dc2bae6adb61237',1,'atca_status.h']]], + ['atca_5fparse_5ferror_92',['ATCA_PARSE_ERROR',['../a00269.html#a54b00d87ad3367d281df208661352063',1,'atca_status.h']]], + ['atca_5fpause_93',['ATCA_PAUSE',['../a00356.html#a7d786006183912073939b3f62075dd27',1,'calib_command.h']]], + ['atca_5fpriv_5fkey_5fsize_94',['ATCA_PRIV_KEY_SIZE',['../a00356.html#a3caf91c8e7ec183e0ad7b93dad9cb548',1,'calib_command.h']]], + ['atca_5fprivwrite_95',['ATCA_PRIVWRITE',['../a00356.html#a3171c7ab4447a2e752706bed1072e694',1,'calib_command.h']]], + ['atca_5fpub_5fkey_5fpad_96',['ATCA_PUB_KEY_PAD',['../a00356.html#ae52318f0263884ff3a3e67328138cc75',1,'calib_command.h']]], + ['atca_5fpub_5fkey_5fsize_97',['ATCA_PUB_KEY_SIZE',['../a00356.html#a07089e8e8b1aa335ddfd37e591f64ebb',1,'calib_command.h']]], + ['atca_5frandom_98',['ATCA_RANDOM',['../a00356.html#ace94188e9d741a9b44616474b633064f',1,'calib_command.h']]], + ['atca_5fread_99',['ATCA_READ',['../a00356.html#a8760372110d92cea3570a5720db05de2',1,'calib_command.h']]], + ['atca_5fresync_5fwith_5fwakeup_100',['ATCA_RESYNC_WITH_WAKEUP',['../a00269.html#a6c467c51b23ea961e1aabd6e98644d47',1,'atca_status.h']]], + ['atca_5frsp_5fdata_5fidx_101',['ATCA_RSP_DATA_IDX',['../a00356.html#abaaa930c2275599fcc3d83cfc02bfafe',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f16_102',['ATCA_RSP_SIZE_16',['../a00356.html#a0be09b502137446daedc43f1d3e85f86',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f32_103',['ATCA_RSP_SIZE_32',['../a00356.html#afd812ab5b70a92a4d3a420c4f7106ac5',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f4_104',['ATCA_RSP_SIZE_4',['../a00356.html#a15cc6f16cdb8f11b60981af7c3b15ef8',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f64_105',['ATCA_RSP_SIZE_64',['../a00356.html#a5b7ad7c3c75639352af5ad3b1298500c',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5f72_106',['ATCA_RSP_SIZE_72',['../a00356.html#a67ca82b396385dd18790b48d731dfe15',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5fmax_107',['ATCA_RSP_SIZE_MAX',['../a00356.html#a908aece3a9501eb14a70c2b24a3e4089',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5fmin_108',['ATCA_RSP_SIZE_MIN',['../a00356.html#a0c738f2cc7bf063582c34188f85ddc3c',1,'calib_command.h']]], + ['atca_5frsp_5fsize_5fval_109',['ATCA_RSP_SIZE_VAL',['../a00356.html#a882f14cac02df8282ccad2a43afc8a23',1,'calib_command.h']]], + ['atca_5frx_5fcrc_5ferror_110',['ATCA_RX_CRC_ERROR',['../a00269.html#aef8e0056fbad0bd33fcb2213b2f3ae49',1,'atca_status.h']]], + ['atca_5frx_5ffail_111',['ATCA_RX_FAIL',['../a00269.html#a8aa6f2e22841fba09b78262c9ce7a728',1,'atca_status.h']]], + ['atca_5frx_5fno_5fresponse_112',['ATCA_RX_NO_RESPONSE',['../a00269.html#a6a0c600725ed81640f2e39c88c864e1c',1,'atca_status.h']]], + ['atca_5frx_5ftimeout_113',['ATCA_RX_TIMEOUT',['../a00269.html#ab5bbd989a822d35a59c9eb6258bf26fc',1,'atca_status.h']]], + ['atca_5fsecureboot_114',['ATCA_SECUREBOOT',['../a00356.html#af4aab184dc60e2de854994d26d57dfde',1,'calib_command.h']]], + ['atca_5fselftest_115',['ATCA_SELFTEST',['../a00356.html#acbec80dc1b5f24d3013c2a9b06c11bdc',1,'calib_command.h']]], + ['atca_5fserial_5fnum_5fsize_116',['ATCA_SERIAL_NUM_SIZE',['../a00356.html#ab112a8a280ac5ad6e11b5fe2cc0be0a0',1,'calib_command.h']]], + ['atca_5fsha_117',['ATCA_SHA',['../a00356.html#a8e5f11692a8a23e1410d9b5ce8bebc2b',1,'calib_command.h']]], + ['atca_5fsha256_5fblock_5fsize_118',['ATCA_SHA256_BLOCK_SIZE',['../a00521.html#a85e0a506bd6fdae6ce32d5df3a48ac1c',1,'cryptoauthlib.h']]], + ['atca_5fsha_5fconfig_5fsize_119',['ATCA_SHA_CONFIG_SIZE',['../a00356.html#a1887d11853092541df18c2a04fb6b87a',1,'calib_command.h']]], + ['atca_5fsha_5fkey_5ftype_120',['ATCA_SHA_KEY_TYPE',['../a00356.html#ad325831ee2326885795706efd7b3b00e',1,'calib_command.h']]], + ['atca_5fsha_5fsupport_121',['ATCA_SHA_SUPPORT',['../a00815.html#afe8da91949841c137ea573c327bff267',1,'atca_config_check.h']]], + ['atca_5fsig_5fsize_122',['ATCA_SIG_SIZE',['../a00356.html#a56448f81a8d04c6871b3422c496bf8b6',1,'calib_command.h']]], + ['atca_5fsign_123',['ATCA_SIGN',['../a00356.html#a516dbf4bbd2c4b366e0306890d0bca56',1,'calib_command.h']]], + ['atca_5fsmall_5fbuffer_124',['ATCA_SMALL_BUFFER',['../a00269.html#ab1a2ea3166875b26f91e82767d6e3e1a',1,'atca_status.h']]], + ['atca_5fstatus_5fcrc_125',['ATCA_STATUS_CRC',['../a00269.html#a9198f13b90df739a1ca20f101beccfbb',1,'atca_status.h']]], + ['atca_5fstatus_5fecc_126',['ATCA_STATUS_ECC',['../a00269.html#ad878d8797ca33784da8e968cbf17a722',1,'atca_status.h']]], + ['atca_5fstatus_5fselftest_5ferror_127',['ATCA_STATUS_SELFTEST_ERROR',['../a00269.html#a3319805e96477b7b89da0f4a69ef1a83',1,'atca_status.h']]], + ['atca_5fstatus_5funknown_128',['ATCA_STATUS_UNKNOWN',['../a00269.html#a884d88ac0c809d0801ca4dbe24dac986',1,'atca_status.h']]], + ['atca_5fsuccess_129',['ATCA_SUCCESS',['../a00269.html#ab132d69c7f94de708ffef02b6dc69d27',1,'atca_status.h']]], + ['atca_5fswi_5fwake_5fword_5faddr_130',['ATCA_SWI_WAKE_WORD_ADDR',['../a00602.html#a35e9d98d207f17ebac66dc86e29a6464',1,'hal_swi_gpio.h']]], + ['atca_5ftempkey_5fkeyid_131',['ATCA_TEMPKEY_KEYID',['../a00356.html#a988fff8295c1914217b8543b614f556c',1,'calib_command.h']]], + ['atca_5ftimeout_132',['ATCA_TIMEOUT',['../a00269.html#afc6b7767c53326f3520ec83ac02df679',1,'atca_status.h']]], + ['atca_5ftoo_5fmany_5fcomm_5fretries_133',['ATCA_TOO_MANY_COMM_RETRIES',['../a00269.html#ad4cd022abf0e71d3605a9fc18e8a1ea6',1,'atca_status.h']]], + ['atca_5ftx_5ffail_134',['ATCA_TX_FAIL',['../a00269.html#a149bb02116700288df316d5ab391f5d3',1,'atca_status.h']]], + ['atca_5ftx_5ftimeout_135',['ATCA_TX_TIMEOUT',['../a00269.html#a7b4c194a6a86ffadc703b841280778c3',1,'atca_status.h']]], + ['atca_5funimplemented_136',['ATCA_UNIMPLEMENTED',['../a00269.html#ad80a997b8786774af268692c936f90d9',1,'atca_status.h']]], + ['atca_5funlocked_137',['ATCA_UNLOCKED',['../a00356.html#a54155caf79f004ccf0a875cf3a0ef05b',1,'calib_command.h']]], + ['atca_5funused_5fvar_5fcheck_138',['ATCA_UNUSED_VAR_CHECK',['../a00815.html#a987213394bc9a51f05c4a5f1b1de69f8',1,'atca_config_check.h']]], + ['atca_5fupdate_5fextra_139',['ATCA_UPDATE_EXTRA',['../a00356.html#a19c9a91ccf069c8bc7afa0d5a2bc6fd2',1,'calib_command.h']]], + ['atca_5fuse_5fatcab_5ffunctions_140',['ATCA_USE_ATCAB_FUNCTIONS',['../a00815.html#ab97062ef8dcf4e46b403d9c22aeb22c9',1,'atca_config_check.h']]], + ['atca_5fuse_5fflags_5fconsumed_141',['ATCA_USE_FLAGS_CONSUMED',['../a00269.html#a4dbc1891be5e77d93690554e7bb2aa8d',1,'atca_status.h']]], + ['atca_5fverify_142',['ATCA_VERIFY',['../a00356.html#a8e357a6e926176155fe47aba97d915fb',1,'calib_command.h']]], + ['atca_5fwake_5ffailed_143',['ATCA_WAKE_FAILED',['../a00269.html#a796b7e7bc096ae19c65b701d87b8718f',1,'atca_status.h']]], + ['atca_5fwake_5fsuccess_144',['ATCA_WAKE_SUCCESS',['../a00269.html#afb58269e38e4025d4e6620c4d1202ee4',1,'atca_status.h']]], + ['atca_5fword_5fsize_145',['ATCA_WORD_SIZE',['../a00356.html#a555bdf8fa32d4d47577f7748ca928389',1,'calib_command.h']]], + ['atca_5fwrite_146',['ATCA_WRITE',['../a00356.html#ab04d6b6e9e5a2c4c28733a6f4f3b0771',1,'calib_command.h']]], + ['atca_5fzone_5fencrypted_147',['ATCA_ZONE_ENCRYPTED',['../a00356.html#a167bc588244395e98461008070fee8f3',1,'calib_command.h']]], + ['atca_5fzone_5fmask_148',['ATCA_ZONE_MASK',['../a00356.html#a1d6d2f2713e845ec3b3bf465025d6858',1,'calib_command.h']]], + ['atca_5fzone_5freadwrite_5f32_149',['ATCA_ZONE_READWRITE_32',['../a00356.html#aa32b46f2c058ee54377d0cbef1ec8764',1,'calib_command.h']]], + ['atcab_5faes_5fcbc_5fdecrypt_5fen_150',['ATCAB_AES_CBC_DECRYPT_EN',['../a00503.html#a23ae19deaff29f2796c4981962ca9b55',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fcbc_5fencrypt_5fen_151',['ATCAB_AES_CBC_ENCRYPT_EN',['../a00503.html#ac2eb887016e59054e626341175577669',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fcbcmac_5fen_152',['ATCAB_AES_CBCMAC_EN',['../a00503.html#a1996786ea061102926ef0ba52a510bfd',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fccm_5fen_153',['ATCAB_AES_CCM_EN',['../a00503.html#ae638244ab3ba72e50b974f763e2abc42',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fctr_5fen_154',['ATCAB_AES_CTR_EN',['../a00503.html#a6569901e92e84b0b448794f8a89d1d9e',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fctr_5frand_5fiv_5fen_155',['ATCAB_AES_CTR_RAND_IV_EN',['../a00503.html#a6bc2ac5d33ff89c89ddb1b53a0e021dd',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fextras_5fen_156',['ATCAB_AES_EXTRAS_EN',['../a00503.html#a28cb83338bbbc858be983299cede3ba9',1,'crypto_hw_config_check.h']]], + ['atcab_5faes_5fgfm_5fen_157',['ATCAB_AES_GFM_EN',['../a00815.html#a31c9145169cb4a4e3be509ad04a40b04',1,'atca_config_check.h']]], + ['atcab_5faes_5fupdate_5fen_158',['ATCAB_AES_UPDATE_EN',['../a00503.html#af273e717452d3e5295d20197b4615ed0',1,'crypto_hw_config_check.h']]], + ['atcab_5fgenkey_5fmac_5fen_159',['ATCAB_GENKEY_MAC_EN',['../a00815.html#a85d4ccd2d66f9b2fd10c7a2e408c4737',1,'atca_config_check.h']]], + ['atcab_5finfo_5flatch_5fen_160',['ATCAB_INFO_LATCH_EN',['../a00815.html#a5965863afba861e5e0e899229da26e83',1,'atca_config_check.h']]], + ['atcab_5fpbkdf2_5fsha256_5fen_161',['ATCAB_PBKDF2_SHA256_EN',['../a00506.html#aa46ae7101b70ba482359edccca83f414',1,'crypto_sw_config_check.h']]], + ['atcab_5fverify_5fmac_5fen_162',['ATCAB_VERIFY_MAC_EN',['../a00815.html#a5d69a9273e615d799841edc21bd72dc0',1,'atca_config_check.h']]], + ['atcab_5fwrite_5fen_163',['ATCAB_WRITE_EN',['../a00815.html#abb9e7120857031fdf5f22df3086afab0',1,'calib_config_check.h']]], + ['atcac_5faes_5fcmac_5fen_164',['ATCAC_AES_CMAC_EN',['../a00680.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_openssl_interface.h'],['../a00506.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): crypto_sw_config_check.h'],['../a00668.html#ace0d6e503c0db5222207053a7c537103',1,'ATCAC_AES_CMAC_EN(): atca_mbedtls_interface.h']]], + ['atcac_5faes_5fgcm_5fen_165',['ATCAC_AES_GCM_EN',['../a00668.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_mbedtls_interface.h'],['../a00680.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): atca_openssl_interface.h'],['../a00506.html#a2cf377cd3579f3ba898ec2391835cfd5',1,'ATCAC_AES_GCM_EN(): crypto_sw_config_check.h']]], + ['atcac_5fpbkdf2_5fsha256_5fen_166',['ATCAC_PBKDF2_SHA256_EN',['../a00506.html#a6d2fa2e22a151bea100d7c7ee84dbe7f',1,'crypto_sw_config_check.h']]], + ['atcac_5fpkey_5fen_167',['ATCAC_PKEY_EN',['../a00668.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_mbedtls_interface.h'],['../a00680.html#ae0b5716ff6baea028959764dc6d88e96',1,'ATCAC_PKEY_EN(): atca_openssl_interface.h']]], + ['atcac_5frandom_5fen_168',['ATCAC_RANDOM_EN',['../a00815.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): atca_config_check.h'],['../a00506.html#add878e0ecc6c87b683935f418f403c7e',1,'ATCAC_RANDOM_EN(): crypto_sw_config_check.h']]], + ['atcac_5fsha1_5fen_169',['ATCAC_SHA1_EN',['../a00815.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_config_check.h'],['../a00506.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): crypto_sw_config_check.h'],['../a00668.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_mbedtls_interface.h'],['../a00680.html#a8e3c7ddf3a16cbdcc42060cdee2d884e',1,'ATCAC_SHA1_EN(): atca_openssl_interface.h']]], + ['atcac_5fsha256_5fen_170',['ATCAC_SHA256_EN',['../a00506.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): crypto_sw_config_check.h'],['../a00680.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_openssl_interface.h'],['../a00668.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_mbedtls_interface.h'],['../a00815.html#a99dab792a5983a089fe816abc57bad25',1,'ATCAC_SHA256_EN(): atca_config_check.h']]], + ['atcac_5fsha384_5fen_171',['ATCAC_SHA384_EN',['../a00815.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): atca_config_check.h'],['../a00506.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): crypto_sw_config_check.h'],['../a00668.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): atca_mbedtls_interface.h'],['../a00680.html#a372b1be02c2a55afbe5eda47580c7ee8',1,'ATCAC_SHA384_EN(): atca_openssl_interface.h']]], + ['atcac_5fsha512_5fen_172',['ATCAC_SHA512_EN',['../a00815.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): atca_config_check.h'],['../a00506.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): crypto_sw_config_check.h'],['../a00668.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): atca_mbedtls_interface.h'],['../a00680.html#a7815fa6e2b361a72ae88bb26bea8a9ad',1,'ATCAC_SHA512_EN(): atca_openssl_interface.h']]], + ['atcac_5fsign_5fen_173',['ATCAC_SIGN_EN',['../a00815.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): atca_config_check.h'],['../a00506.html#a094297d2dd0a7e2b4606fc37fc797fcd',1,'ATCAC_SIGN_EN(): crypto_sw_config_check.h']]], + ['atcac_5fverify_5fen_174',['ATCAC_VERIFY_EN',['../a00815.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): atca_config_check.h'],['../a00506.html#a7eeef6ad76dccb48d8b1741a9254af97',1,'ATCAC_VERIFY_EN(): crypto_sw_config_check.h']]], + ['atcacert_5fen_175',['ATCACERT_EN',['../a00815.html#a3d181d31956d42db1d25281deca4c7e3',1,'atca_config_check.h']]], + ['atcah_5fcheck_5fmac_176',['ATCAH_CHECK_MAC',['../a00653.html#a063f7ad7678d60de756ef8526b9dfea1',1,'atca_host_config_check.h']]], + ['atcah_5fconfig_5fto_5fsign_5finternal_177',['ATCAH_CONFIG_TO_SIGN_INTERNAL',['../a00653.html#ae427973632a62dfd8f35709c21993190',1,'atca_host_config_check.h']]], + ['atcah_5fdecrypt_178',['ATCAH_DECRYPT',['../a00653.html#ae22d9aedde79fd4e9b29ff7cfd6c0e3b',1,'atca_host_config_check.h']]], + ['atcah_5fdelete_5fmac_179',['ATCAH_DELETE_MAC',['../a00653.html#acd2c32968024ddc7c650102a5076d70b',1,'atca_host_config_check.h']]], + ['atcah_5fderive_5fkey_180',['ATCAH_DERIVE_KEY',['../a00653.html#ada4b87726e822b6e94dcc18eefc39049',1,'atca_host_config_check.h']]], + ['atcah_5fderive_5fkey_5fmac_181',['ATCAH_DERIVE_KEY_MAC',['../a00653.html#a22a85235261861839a0db05649999ef5',1,'atca_host_config_check.h']]], + ['atcah_5fencode_5fcounter_5fmatch_182',['ATCAH_ENCODE_COUNTER_MATCH',['../a00653.html#a2ecb26546b49e369aeaf86bccf10a2e9',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5fkey_5fmsg_183',['ATCAH_GEN_KEY_MSG',['../a00653.html#a371384b4f8d818c31dee337aa4e24403',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5fmac_184',['ATCAH_GEN_MAC',['../a00653.html#a0f0e6c501c2dc57b4ed68fe29780b062',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5foutput_5fresp_5fmac_185',['ATCAH_GEN_OUTPUT_RESP_MAC',['../a00653.html#a70d0b80d637281693321866bd3c2735f',1,'atca_host_config_check.h']]], + ['atcah_5fgen_5fsession_5fkey_186',['ATCAH_GEN_SESSION_KEY',['../a00653.html#aa5220706535f7367e06aa2aadebc0b57',1,'atca_host_config_check.h']]], + ['atcah_5fgendig_187',['ATCAH_GENDIG',['../a00653.html#aec5752be28ebfd8dc506bda7c36b9f7d',1,'atca_host_config_check.h']]], + ['atcah_5fgendivkey_188',['ATCAH_GENDIVKEY',['../a00653.html#af25240ee5ff347e1cf2768bfd513345f',1,'atca_host_config_check.h']]], + ['atcah_5fhmac_189',['ATCAH_HMAC',['../a00653.html#a6a86a40deff31dbaf005519aba627991',1,'atca_host_config_check.h']]], + ['atcah_5finclude_5fdata_190',['ATCAH_INCLUDE_DATA',['../a00653.html#a6442329f443943bbc8f3e10dde67930d',1,'atca_host_config_check.h']]], + ['atcah_5fio_5fdecrypt_191',['ATCAH_IO_DECRYPT',['../a00653.html#ae58a45ab173bf9ca7c4cdf4768fcf00e',1,'atca_host_config_check.h']]], + ['atcah_5fmac_192',['ATCAH_MAC',['../a00653.html#a33ac8a876197c7774452b7b46411f188',1,'atca_host_config_check.h']]], + ['atcah_5fnonce_193',['ATCAH_NONCE',['../a00653.html#a879c87175b07e859a15320e199a104a6',1,'atca_host_config_check.h']]], + ['atcah_5fprivwrite_5fauth_5fmac_194',['ATCAH_PRIVWRITE_AUTH_MAC',['../a00653.html#a13ed9a07ad5f74cfb67b7582c1b638a3',1,'atca_host_config_check.h']]], + ['atcah_5fsecureboot_5fenc_195',['ATCAH_SECUREBOOT_ENC',['../a00653.html#a745b85254a910c7d8edbea41ab927cf4',1,'atca_host_config_check.h']]], + ['atcah_5fsecureboot_5fmac_196',['ATCAH_SECUREBOOT_MAC',['../a00653.html#aa1d0ffc3e79f52154b2e362b74b7b112',1,'atca_host_config_check.h']]], + ['atcah_5fsha256_197',['ATCAH_SHA256',['../a00653.html#a58d2f9f20485ae35c2208f3bce5cb4a7',1,'atca_host_config_check.h']]], + ['atcah_5fsign_5finternal_5fmsg_198',['ATCAH_SIGN_INTERNAL_MSG',['../a00653.html#ad2e1b57a0f8a5dc87427b1eca18ac02f',1,'atca_host_config_check.h']]], + ['atcah_5fverify_5fmac_199',['ATCAH_VERIFY_MAC',['../a00653.html#a1515a97abca19263c1cf16dcbdd01944',1,'atca_host_config_check.h']]], + ['atcah_5fwrite_5fauth_5fmac_200',['ATCAH_WRITE_AUTH_MAC',['../a00653.html#a23dc9d3c6d3f23ac7463ef0fe29e25f0',1,'atca_host_config_check.h']]] ]; diff --git a/search/defines_1.js b/search/defines_1.js index 3329d17fa..dd3453a97 100644 --- a/search/defines_1.js +++ b/search/defines_1.js @@ -1,7 +1,7 @@ var searchData= [ - ['bit_5fdelay_5f1h_0',['BIT_DELAY_1H',['../a00587.html#a1ce4882b7d053eafcec22cd84fb5727d',1,'hal_swi_gpio.h']]], - ['bit_5fdelay_5f1l_1',['BIT_DELAY_1L',['../a00587.html#ad884cf7d66d88b38180369a791a9824b',1,'hal_swi_gpio.h']]], - ['bit_5fdelay_5f5_2',['BIT_DELAY_5',['../a00587.html#a2ced4699fc4ab5162dbb9453edecb32e',1,'hal_swi_gpio.h']]], - ['bit_5fdelay_5f7_3',['BIT_DELAY_7',['../a00587.html#abd0d20a34060650b8a2895c17f842f44',1,'hal_swi_gpio.h']]] + ['bit_5fdelay_5f1h_0',['BIT_DELAY_1H',['../a00602.html#a1ce4882b7d053eafcec22cd84fb5727d',1,'hal_swi_gpio.h']]], + ['bit_5fdelay_5f1l_1',['BIT_DELAY_1L',['../a00602.html#ad884cf7d66d88b38180369a791a9824b',1,'hal_swi_gpio.h']]], + ['bit_5fdelay_5f5_2',['BIT_DELAY_5',['../a00602.html#a2ced4699fc4ab5162dbb9453edecb32e',1,'hal_swi_gpio.h']]], + ['bit_5fdelay_5f7_3',['BIT_DELAY_7',['../a00602.html#abd0d20a34060650b8a2895c17f842f44',1,'hal_swi_gpio.h']]] ]; diff --git a/search/defines_10.js b/search/defines_10.js index d413a4f5c..a8a590e34 100644 --- a/search/defines_10.js +++ b/search/defines_10.js @@ -1,12 +1,12 @@ var searchData= [ - ['unused_5fvar_0',['UNUSED_VAR',['../a00233.html#a6e61b3a07893501c121343edf3bfcbd8',1,'atca_compiler.h']]], - ['update_5fcount_1',['UPDATE_COUNT',['../a00350.html#aac8020f191ca7ce2b1a81fcede9b5aa2',1,'calib_command.h']]], - ['update_5fmode_5fdec_5fcounter_2',['UPDATE_MODE_DEC_COUNTER',['../a00350.html#a023880ad2167cc0d6cefb7f747b73c92',1,'calib_command.h']]], - ['update_5fmode_5fidx_3',['UPDATE_MODE_IDX',['../a00350.html#abec02770ab378eea5c604269dc8c024a',1,'calib_command.h']]], - ['update_5fmode_5fselector_4',['UPDATE_MODE_SELECTOR',['../a00350.html#a81bab82e6be63d8186b26bb9c3b8732c',1,'calib_command.h']]], - ['update_5fmode_5fuser_5fextra_5',['UPDATE_MODE_USER_EXTRA',['../a00350.html#abe02b5e0e9bb8cb4c2a727549c14ae55',1,'calib_command.h']]], - ['update_5fmode_5fuser_5fextra_5fadd_6',['UPDATE_MODE_USER_EXTRA_ADD',['../a00350.html#a5884f043019e78838621ba2402a8cc95',1,'calib_command.h']]], - ['update_5frsp_5fsize_7',['UPDATE_RSP_SIZE',['../a00350.html#aabf82974c18252bcd0c48ee99af75dfb',1,'calib_command.h']]], - ['update_5fvalue_5fidx_8',['UPDATE_VALUE_IDX',['../a00350.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799',1,'calib_command.h']]] + ['unused_5fvar_0',['UNUSED_VAR',['../a00239.html#a6e61b3a07893501c121343edf3bfcbd8',1,'atca_compiler.h']]], + ['update_5fcount_1',['UPDATE_COUNT',['../a00356.html#aac8020f191ca7ce2b1a81fcede9b5aa2',1,'calib_command.h']]], + ['update_5fmode_5fdec_5fcounter_2',['UPDATE_MODE_DEC_COUNTER',['../a00356.html#a023880ad2167cc0d6cefb7f747b73c92',1,'calib_command.h']]], + ['update_5fmode_5fidx_3',['UPDATE_MODE_IDX',['../a00356.html#abec02770ab378eea5c604269dc8c024a',1,'calib_command.h']]], + ['update_5fmode_5fselector_4',['UPDATE_MODE_SELECTOR',['../a00356.html#a81bab82e6be63d8186b26bb9c3b8732c',1,'calib_command.h']]], + ['update_5fmode_5fuser_5fextra_5',['UPDATE_MODE_USER_EXTRA',['../a00356.html#abe02b5e0e9bb8cb4c2a727549c14ae55',1,'calib_command.h']]], + ['update_5fmode_5fuser_5fextra_5fadd_6',['UPDATE_MODE_USER_EXTRA_ADD',['../a00356.html#a5884f043019e78838621ba2402a8cc95',1,'calib_command.h']]], + ['update_5frsp_5fsize_7',['UPDATE_RSP_SIZE',['../a00356.html#aabf82974c18252bcd0c48ee99af75dfb',1,'calib_command.h']]], + ['update_5fvalue_5fidx_8',['UPDATE_VALUE_IDX',['../a00356.html#a0aacda6ef1cf79b10b3a2a7e2e9d8799',1,'calib_command.h']]] ]; diff --git a/search/defines_11.js b/search/defines_11.js index 344de4cec..a7c3ef349 100644 --- a/search/defines_11.js +++ b/search/defines_11.js @@ -1,32 +1,32 @@ var searchData= [ - ['verify_5f256_5fexternal_5fcount_0',['VERIFY_256_EXTERNAL_COUNT',['../a00350.html#aae43276ff3f774ffd928ad1776592c7b',1,'calib_command.h']]], - ['verify_5f256_5fkey_5fsize_1',['VERIFY_256_KEY_SIZE',['../a00350.html#add994f7919c2f2b076f25ff207432686',1,'calib_command.h']]], - ['verify_5f256_5fsignature_5fsize_2',['VERIFY_256_SIGNATURE_SIZE',['../a00350.html#ae56700f2b05067288af3cc4af8e7f34d',1,'calib_command.h']]], - ['verify_5f256_5fstored_5fcount_3',['VERIFY_256_STORED_COUNT',['../a00350.html#a0b7d56888416e08f1ff67252072e3cea',1,'calib_command.h']]], - ['verify_5f256_5fvalidate_5fcount_4',['VERIFY_256_VALIDATE_COUNT',['../a00350.html#a677e57736342aed3a7a40704b82895d9',1,'calib_command.h']]], - ['verify_5f283_5fexternal_5fcount_5',['VERIFY_283_EXTERNAL_COUNT',['../a00350.html#a1a551775820d79c59f49068140e40f1b',1,'calib_command.h']]], - ['verify_5f283_5fkey_5fsize_6',['VERIFY_283_KEY_SIZE',['../a00350.html#af0cca41df253e49372d6853d4f5c406b',1,'calib_command.h']]], - ['verify_5f283_5fsignature_5fsize_7',['VERIFY_283_SIGNATURE_SIZE',['../a00350.html#a47f281930ad5bc31576ccd06e913563f',1,'calib_command.h']]], - ['verify_5f283_5fstored_5fcount_8',['VERIFY_283_STORED_COUNT',['../a00350.html#a3f7d34f0bcacd6c816c2b51cd13f5364',1,'calib_command.h']]], - ['verify_5f283_5fvalidate_5fcount_9',['VERIFY_283_VALIDATE_COUNT',['../a00350.html#ab09e6f726235fba47a2ea3f49cbfc2cb',1,'calib_command.h']]], - ['verify_5fdata_5fidx_10',['VERIFY_DATA_IDX',['../a00350.html#a15623038b9b0b4b51243691fe15253e2',1,'calib_command.h']]], - ['verify_5fkey_5fb283_11',['VERIFY_KEY_B283',['../a00350.html#a4c6b67a2a6193a1e317b6ef16ca3fca6',1,'calib_command.h']]], - ['verify_5fkey_5fk283_12',['VERIFY_KEY_K283',['../a00350.html#ad2eacbf59056d95e69b60f21beaafcb1',1,'calib_command.h']]], - ['verify_5fkey_5fp256_13',['VERIFY_KEY_P256',['../a00350.html#a94fc1ff3975c056868a169b1b836f920',1,'calib_command.h']]], - ['verify_5fkeyid_5fidx_14',['VERIFY_KEYID_IDX',['../a00350.html#a868d5d7ce0451e1c8f95f16092cfbc97',1,'calib_command.h']]], - ['verify_5fmode_5fexternal_15',['VERIFY_MODE_EXTERNAL',['../a00350.html#af3729ff16ba78ef4a6b70c341e81c749',1,'calib_command.h']]], - ['verify_5fmode_5fidx_16',['VERIFY_MODE_IDX',['../a00350.html#a896cc15df167f9a04f7e4f84de2bc7d2',1,'calib_command.h']]], - ['verify_5fmode_5finvalidate_17',['VERIFY_MODE_INVALIDATE',['../a00350.html#ab45a164ee20c8320318a3bc5e2eaa31f',1,'calib_command.h']]], - ['verify_5fmode_5fmac_5fflag_18',['VERIFY_MODE_MAC_FLAG',['../a00350.html#af3461e50ec2b06201d17feee167e0a4b',1,'calib_command.h']]], - ['verify_5fmode_5fmask_19',['VERIFY_MODE_MASK',['../a00350.html#ac892dbe1953c43e7e17b1d51ce967c9e',1,'calib_command.h']]], - ['verify_5fmode_5fsource_5fmask_20',['VERIFY_MODE_SOURCE_MASK',['../a00350.html#a3d6ae4ea1e385c2f7521495b53715a3f',1,'calib_command.h']]], - ['verify_5fmode_5fsource_5fmsgdigbuf_21',['VERIFY_MODE_SOURCE_MSGDIGBUF',['../a00350.html#a1b104109ce8d8c8a99484bc52d58460a',1,'calib_command.h']]], - ['verify_5fmode_5fsource_5ftempkey_22',['VERIFY_MODE_SOURCE_TEMPKEY',['../a00350.html#ad5c40b78682251cb07855e58bcf29f82',1,'calib_command.h']]], - ['verify_5fmode_5fstored_23',['VERIFY_MODE_STORED',['../a00350.html#a1da616e68f89a90e6fa3c920b4708fe2',1,'calib_command.h']]], - ['verify_5fmode_5fvalidate_24',['VERIFY_MODE_VALIDATE',['../a00350.html#adb7f53410523734e4c9485f2d71e7791',1,'calib_command.h']]], - ['verify_5fmode_5fvalidate_5fexternal_25',['VERIFY_MODE_VALIDATE_EXTERNAL',['../a00350.html#a8f38093650cd530f44dc59e6eb78fa3d',1,'calib_command.h']]], - ['verify_5fother_5fdata_5fsize_26',['VERIFY_OTHER_DATA_SIZE',['../a00350.html#a5a4ff6025fa5d4d936ededc78be16e47',1,'calib_command.h']]], - ['verify_5frsp_5fsize_27',['VERIFY_RSP_SIZE',['../a00350.html#ac75be9d5426dcf6ee196a788a35ee54b',1,'calib_command.h']]], - ['verify_5frsp_5fsize_5fmac_28',['VERIFY_RSP_SIZE_MAC',['../a00350.html#ace51b2a4dc8622ac3c03780dc369355e',1,'calib_command.h']]] + ['verify_5f256_5fexternal_5fcount_0',['VERIFY_256_EXTERNAL_COUNT',['../a00356.html#aae43276ff3f774ffd928ad1776592c7b',1,'calib_command.h']]], + ['verify_5f256_5fkey_5fsize_1',['VERIFY_256_KEY_SIZE',['../a00356.html#add994f7919c2f2b076f25ff207432686',1,'calib_command.h']]], + ['verify_5f256_5fsignature_5fsize_2',['VERIFY_256_SIGNATURE_SIZE',['../a00356.html#ae56700f2b05067288af3cc4af8e7f34d',1,'calib_command.h']]], + ['verify_5f256_5fstored_5fcount_3',['VERIFY_256_STORED_COUNT',['../a00356.html#a0b7d56888416e08f1ff67252072e3cea',1,'calib_command.h']]], + ['verify_5f256_5fvalidate_5fcount_4',['VERIFY_256_VALIDATE_COUNT',['../a00356.html#a677e57736342aed3a7a40704b82895d9',1,'calib_command.h']]], + ['verify_5f283_5fexternal_5fcount_5',['VERIFY_283_EXTERNAL_COUNT',['../a00356.html#a1a551775820d79c59f49068140e40f1b',1,'calib_command.h']]], + ['verify_5f283_5fkey_5fsize_6',['VERIFY_283_KEY_SIZE',['../a00356.html#af0cca41df253e49372d6853d4f5c406b',1,'calib_command.h']]], + ['verify_5f283_5fsignature_5fsize_7',['VERIFY_283_SIGNATURE_SIZE',['../a00356.html#a47f281930ad5bc31576ccd06e913563f',1,'calib_command.h']]], + ['verify_5f283_5fstored_5fcount_8',['VERIFY_283_STORED_COUNT',['../a00356.html#a3f7d34f0bcacd6c816c2b51cd13f5364',1,'calib_command.h']]], + ['verify_5f283_5fvalidate_5fcount_9',['VERIFY_283_VALIDATE_COUNT',['../a00356.html#ab09e6f726235fba47a2ea3f49cbfc2cb',1,'calib_command.h']]], + ['verify_5fdata_5fidx_10',['VERIFY_DATA_IDX',['../a00356.html#a15623038b9b0b4b51243691fe15253e2',1,'calib_command.h']]], + ['verify_5fkey_5fb283_11',['VERIFY_KEY_B283',['../a00356.html#a4c6b67a2a6193a1e317b6ef16ca3fca6',1,'calib_command.h']]], + ['verify_5fkey_5fk283_12',['VERIFY_KEY_K283',['../a00356.html#ad2eacbf59056d95e69b60f21beaafcb1',1,'calib_command.h']]], + ['verify_5fkey_5fp256_13',['VERIFY_KEY_P256',['../a00356.html#a94fc1ff3975c056868a169b1b836f920',1,'calib_command.h']]], + ['verify_5fkeyid_5fidx_14',['VERIFY_KEYID_IDX',['../a00356.html#a868d5d7ce0451e1c8f95f16092cfbc97',1,'calib_command.h']]], + ['verify_5fmode_5fexternal_15',['VERIFY_MODE_EXTERNAL',['../a00356.html#af3729ff16ba78ef4a6b70c341e81c749',1,'calib_command.h']]], + ['verify_5fmode_5fidx_16',['VERIFY_MODE_IDX',['../a00356.html#a896cc15df167f9a04f7e4f84de2bc7d2',1,'calib_command.h']]], + ['verify_5fmode_5finvalidate_17',['VERIFY_MODE_INVALIDATE',['../a00356.html#ab45a164ee20c8320318a3bc5e2eaa31f',1,'calib_command.h']]], + ['verify_5fmode_5fmac_5fflag_18',['VERIFY_MODE_MAC_FLAG',['../a00356.html#af3461e50ec2b06201d17feee167e0a4b',1,'calib_command.h']]], + ['verify_5fmode_5fmask_19',['VERIFY_MODE_MASK',['../a00356.html#ac892dbe1953c43e7e17b1d51ce967c9e',1,'calib_command.h']]], + ['verify_5fmode_5fsource_5fmask_20',['VERIFY_MODE_SOURCE_MASK',['../a00356.html#a3d6ae4ea1e385c2f7521495b53715a3f',1,'calib_command.h']]], + ['verify_5fmode_5fsource_5fmsgdigbuf_21',['VERIFY_MODE_SOURCE_MSGDIGBUF',['../a00356.html#a1b104109ce8d8c8a99484bc52d58460a',1,'calib_command.h']]], + ['verify_5fmode_5fsource_5ftempkey_22',['VERIFY_MODE_SOURCE_TEMPKEY',['../a00356.html#ad5c40b78682251cb07855e58bcf29f82',1,'calib_command.h']]], + ['verify_5fmode_5fstored_23',['VERIFY_MODE_STORED',['../a00356.html#a1da616e68f89a90e6fa3c920b4708fe2',1,'calib_command.h']]], + ['verify_5fmode_5fvalidate_24',['VERIFY_MODE_VALIDATE',['../a00356.html#adb7f53410523734e4c9485f2d71e7791',1,'calib_command.h']]], + ['verify_5fmode_5fvalidate_5fexternal_25',['VERIFY_MODE_VALIDATE_EXTERNAL',['../a00356.html#a8f38093650cd530f44dc59e6eb78fa3d',1,'calib_command.h']]], + ['verify_5fother_5fdata_5fsize_26',['VERIFY_OTHER_DATA_SIZE',['../a00356.html#a5a4ff6025fa5d4d936ededc78be16e47',1,'calib_command.h']]], + ['verify_5frsp_5fsize_27',['VERIFY_RSP_SIZE',['../a00356.html#ac75be9d5426dcf6ee196a788a35ee54b',1,'calib_command.h']]], + ['verify_5frsp_5fsize_5fmac_28',['VERIFY_RSP_SIZE_MAC',['../a00356.html#ace51b2a4dc8622ac3c03780dc369355e',1,'calib_command.h']]] ]; diff --git a/search/defines_12.js b/search/defines_12.js index ae67dfd42..5896354fe 100644 --- a/search/defines_12.js +++ b/search/defines_12.js @@ -1,14 +1,14 @@ var searchData= [ - ['write_5faddr_5fidx_0',['WRITE_ADDR_IDX',['../a00350.html#a2d9e0bcb5ccf94f140b1cd519f407ffa',1,'calib_command.h']]], - ['write_5fmac_5fsize_1',['WRITE_MAC_SIZE',['../a00350.html#a3b8fb940e149c6fb29801ef573cc6311',1,'calib_command.h']]], - ['write_5fmac_5fvl_5fidx_2',['WRITE_MAC_VL_IDX',['../a00350.html#a9c08115363fb521e9fee60849046f820',1,'calib_command.h']]], - ['write_5fmac_5fvs_5fidx_3',['WRITE_MAC_VS_IDX',['../a00350.html#a203996620baf9cdf0aa01dd719e02d06',1,'calib_command.h']]], - ['write_5frsp_5fsize_4',['WRITE_RSP_SIZE',['../a00350.html#af0ac761b64981003336d72c34df3d2e3',1,'calib_command.h']]], - ['write_5fvalue_5fidx_5',['WRITE_VALUE_IDX',['../a00350.html#a5cdd382afc6d46da59de60fb35abd611',1,'calib_command.h']]], - ['write_5fzone_5fdata_6',['WRITE_ZONE_DATA',['../a00350.html#ae80ecfb4c696095b5627988cc7c9cde0',1,'calib_command.h']]], - ['write_5fzone_5fidx_7',['WRITE_ZONE_IDX',['../a00350.html#a8cbed81461d4e4c4991c50629b3a5bcd',1,'calib_command.h']]], - ['write_5fzone_5fmask_8',['WRITE_ZONE_MASK',['../a00350.html#aacd5623cd6f8eb12e7cdf22941f501dc',1,'calib_command.h']]], - ['write_5fzone_5fotp_9',['WRITE_ZONE_OTP',['../a00350.html#a830d379174b47b466f5de16fe3345182',1,'calib_command.h']]], - ['write_5fzone_5fwith_5fmac_10',['WRITE_ZONE_WITH_MAC',['../a00350.html#ac02ad2aea02f18d833e6e0631ae839ad',1,'calib_command.h']]] + ['write_5faddr_5fidx_0',['WRITE_ADDR_IDX',['../a00356.html#a2d9e0bcb5ccf94f140b1cd519f407ffa',1,'calib_command.h']]], + ['write_5fmac_5fsize_1',['WRITE_MAC_SIZE',['../a00356.html#a3b8fb940e149c6fb29801ef573cc6311',1,'calib_command.h']]], + ['write_5fmac_5fvl_5fidx_2',['WRITE_MAC_VL_IDX',['../a00356.html#a9c08115363fb521e9fee60849046f820',1,'calib_command.h']]], + ['write_5fmac_5fvs_5fidx_3',['WRITE_MAC_VS_IDX',['../a00356.html#a203996620baf9cdf0aa01dd719e02d06',1,'calib_command.h']]], + ['write_5frsp_5fsize_4',['WRITE_RSP_SIZE',['../a00356.html#af0ac761b64981003336d72c34df3d2e3',1,'calib_command.h']]], + ['write_5fvalue_5fidx_5',['WRITE_VALUE_IDX',['../a00356.html#a5cdd382afc6d46da59de60fb35abd611',1,'calib_command.h']]], + ['write_5fzone_5fdata_6',['WRITE_ZONE_DATA',['../a00356.html#ae80ecfb4c696095b5627988cc7c9cde0',1,'calib_command.h']]], + ['write_5fzone_5fidx_7',['WRITE_ZONE_IDX',['../a00356.html#a8cbed81461d4e4c4991c50629b3a5bcd',1,'calib_command.h']]], + ['write_5fzone_5fmask_8',['WRITE_ZONE_MASK',['../a00356.html#aacd5623cd6f8eb12e7cdf22941f501dc',1,'calib_command.h']]], + ['write_5fzone_5fotp_9',['WRITE_ZONE_OTP',['../a00356.html#a830d379174b47b466f5de16fe3345182',1,'calib_command.h']]], + ['write_5fzone_5fwith_5fmac_10',['WRITE_ZONE_WITH_MAC',['../a00356.html#ac02ad2aea02f18d833e6e0631ae839ad',1,'calib_command.h']]] ]; diff --git a/search/defines_2.js b/search/defines_2.js index 17fba405e..d2d7b293a 100644 --- a/search/defines_2.js +++ b/search/defines_2.js @@ -1,57 +1,57 @@ var searchData= [ - ['calib_5finfo_5flatch_5fen_0',['CALIB_INFO_LATCH_EN',['../a00353.html#af19794adbeec8b57eb7cbef1f9e21c91',1,'calib_config_check.h']]], - ['calib_5flock_5fca2_5fen_1',['CALIB_LOCK_CA2_EN',['../a00353.html#a611611e20ca91cad7e9897847b9b355a',1,'calib_config_check.h']]], - ['calib_5flock_5fen_2',['CALIB_LOCK_EN',['../a00353.html#a3801cb49b78666a9cfa602fa74b22da9',1,'calib_config_check.h']]], - ['calib_5fread_5fen_3',['CALIB_READ_EN',['../a00353.html#a67ed014df4e1bbbea873ede0e9700e29',1,'calib_config_check.h']]], - ['calib_5fsha_5fcontext_5fen_4',['CALIB_SHA_CONTEXT_EN',['../a00353.html#a84c51bc36228a8fadd8654bfaae5d58c',1,'calib_config_check.h']]], - ['calib_5fsha_5fen_5',['CALIB_SHA_EN',['../a00353.html#a467882792e9ea53b4e596d1be05997a6',1,'calib_config_check.h']]], - ['calib_5fsha_5fhmac_5fen_6',['CALIB_SHA_HMAC_EN',['../a00353.html#ab13bbafe02599813084788482536728f',1,'calib_config_check.h']]], - ['calib_5fsign_5fca2_5fen_7',['CALIB_SIGN_CA2_EN',['../a00353.html#ac629bf5f0b5d6c64c5393cadd7b7479c',1,'calib_config_check.h']]], - ['calib_5fsign_5fen_8',['CALIB_SIGN_EN',['../a00353.html#a9802710200f050b0e9414bd88cdd8c0d',1,'calib_config_check.h']]], - ['calib_5fswi_5fflag_5fcmd_9',['CALIB_SWI_FLAG_CMD',['../a00374.html#ac7946c257bcbaf0e1589e960b83d23df',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5fidle_10',['CALIB_SWI_FLAG_IDLE',['../a00374.html#a525ae62bb76a8ba01d4d85264f832c8e',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5fsleep_11',['CALIB_SWI_FLAG_SLEEP',['../a00374.html#a8dd3e14e93cec4aea30e27104935d51b',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5ftx_12',['CALIB_SWI_FLAG_TX',['../a00374.html#a1c46cc5ed5e30945d62e9ea369c94cdb',1,'calib_execution.h']]], - ['calib_5fswi_5fflag_5fwake_13',['CALIB_SWI_FLAG_WAKE',['../a00374.html#a55c5fe347b23c42f6359e97ae82b4729',1,'calib_execution.h']]], - ['calib_5fupdateextra_5fen_14',['CALIB_UPDATEEXTRA_EN',['../a00353.html#ab46a8196f24bde7c86ac5e3affdc8ff8',1,'calib_config_check.h']]], - ['calib_5fverify_5fen_15',['CALIB_VERIFY_EN',['../a00353.html#a671b3421327a5c885b0c3e6e1e64afe7',1,'calib_config_check.h']]], - ['calib_5fverify_5fmac_5fen_16',['CALIB_VERIFY_MAC_EN',['../a00353.html#ac419953cd10efa4bef6e4efdc9c6cbe9',1,'calib_config_check.h']]], - ['calib_5fverify_5fstored_5fen_17',['CALIB_VERIFY_STORED_EN',['../a00353.html#ae841eeabdfbe04dd3241f6fde1a57954',1,'calib_config_check.h']]], - ['calib_5fwrite_5fenc_5fen_18',['CALIB_WRITE_ENC_EN',['../a00353.html#a64cbcf66a79f024ae3cce06d1f6731f9',1,'calib_config_check.h']]], - ['checkmac_5fclient_5fchallenge_5fidx_19',['CHECKMAC_CLIENT_CHALLENGE_IDX',['../a00350.html#a0f2c0b2e264a88b766811fe4ea0de88f',1,'calib_command.h']]], - ['checkmac_5fclient_5fchallenge_5fsize_20',['CHECKMAC_CLIENT_CHALLENGE_SIZE',['../a00350.html#a3c7444c099cf0f89f754fd3cbec77bf4',1,'calib_command.h']]], - ['checkmac_5fclient_5fcommand_5fsize_21',['CHECKMAC_CLIENT_COMMAND_SIZE',['../a00350.html#ad3d431e17094b6690d443e0a038da9e2',1,'calib_command.h']]], - ['checkmac_5fclient_5fresponse_5fidx_22',['CHECKMAC_CLIENT_RESPONSE_IDX',['../a00350.html#a170c911bfe1a20e3572bdc5c2cd80c9d',1,'calib_command.h']]], - ['checkmac_5fclient_5fresponse_5fsize_23',['CHECKMAC_CLIENT_RESPONSE_SIZE',['../a00350.html#a93cb0fdfc89b69cb1c4670f30288f2ad',1,'calib_command.h']]], - ['checkmac_5fcmd_5fmatch_24',['CHECKMAC_CMD_MATCH',['../a00350.html#a09b26b691e29966bcec1513edf819efe',1,'calib_command.h']]], - ['checkmac_5fcmd_5fmismatch_25',['CHECKMAC_CMD_MISMATCH',['../a00350.html#a1db673cb318ec36ebd0c9c1a5ce301ad',1,'calib_command.h']]], - ['checkmac_5fcount_26',['CHECKMAC_COUNT',['../a00350.html#a4c998ee3d596f3006a4488bd8657df33',1,'calib_command.h']]], - ['checkmac_5fdata_5fidx_27',['CHECKMAC_DATA_IDX',['../a00350.html#a1ba2ec2d321b3f90f53c02c7fb9711f2',1,'calib_command.h']]], - ['checkmac_5fkeyid_5fidx_28',['CHECKMAC_KEYID_IDX',['../a00350.html#a4203bbb296cd67d035066979657cf979',1,'calib_command.h']]], - ['checkmac_5fmode_5fblock1_5ftempkey_29',['CHECKMAC_MODE_BLOCK1_TEMPKEY',['../a00350.html#a9088fc1b89c3ca9b58901de000d8d55d',1,'calib_command.h']]], - ['checkmac_5fmode_5fblock2_5ftempkey_30',['CHECKMAC_MODE_BLOCK2_TEMPKEY',['../a00350.html#a40d926e0e037fc8bb265bb19f57e5d1a',1,'calib_command.h']]], - ['checkmac_5fmode_5fchallenge_31',['CHECKMAC_MODE_CHALLENGE',['../a00350.html#aaabcd1e4afb29088a17f7e87e7136e24',1,'calib_command.h']]], - ['checkmac_5fmode_5fidx_32',['CHECKMAC_MODE_IDX',['../a00350.html#ae757542e1c4d4815e1dc8db034dca476',1,'calib_command.h']]], - ['checkmac_5fmode_5finclude_5fotp_5f64_33',['CHECKMAC_MODE_INCLUDE_OTP_64',['../a00350.html#abeef4ff866116f4e17a6c3ad94b0a286',1,'calib_command.h']]], - ['checkmac_5fmode_5fmask_34',['CHECKMAC_MODE_MASK',['../a00350.html#a67e74cb132024711cf064ff98021d71f',1,'calib_command.h']]], - ['checkmac_5fmode_5foutput_5fmac_5fresponse_35',['CHECKMAC_MODE_OUTPUT_MAC_RESPONSE',['../a00350.html#a411d35690c62060ac4c39588741a808e',1,'calib_command.h']]], - ['checkmac_5fmode_5fsource_5fflag_5fmatch_36',['CHECKMAC_MODE_SOURCE_FLAG_MATCH',['../a00350.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad',1,'calib_command.h']]], - ['checkmac_5fother_5fdata_5fsize_37',['CHECKMAC_OTHER_DATA_SIZE',['../a00350.html#a7c365741639a5c7dc29267a130e8d827',1,'calib_command.h']]], - ['checkmac_5frsp_5fsize_38',['CHECKMAC_RSP_SIZE',['../a00350.html#aa44ecaa440ab845d5939333171476adf',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fcomm_39',['CMD_STATUS_BYTE_COMM',['../a00350.html#a6a6daf9c5640ad80e7af330daad1f6ea',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fecc_40',['CMD_STATUS_BYTE_ECC',['../a00350.html#a44cee4dee17a7c1a2618d11e8e5774dd',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fexec_41',['CMD_STATUS_BYTE_EXEC',['../a00350.html#ae496c798891069e04802bbac7d96e0f5',1,'calib_command.h']]], - ['cmd_5fstatus_5fbyte_5fparse_42',['CMD_STATUS_BYTE_PARSE',['../a00350.html#aef76930f6d419fc30841be04fe6ac8d6',1,'calib_command.h']]], - ['cmd_5fstatus_5fsuccess_43',['CMD_STATUS_SUCCESS',['../a00350.html#a85c326c023bdc268c499eb33375f2270',1,'calib_command.h']]], - ['cmd_5fstatus_5fwakeup_44',['CMD_STATUS_WAKEUP',['../a00350.html#afd20c2250b83786f216a100bde94a670',1,'calib_command.h']]], - ['counter_5fkeyid_5fidx_45',['COUNTER_KEYID_IDX',['../a00350.html#a269bd52a7856116ebce13c1072f56d9e',1,'calib_command.h']]], - ['counter_5fmax_5fvalue_46',['COUNTER_MAX_VALUE',['../a00350.html#abc722de99f444668d09e3815fcc78400',1,'calib_command.h']]], - ['counter_5fmax_5fvalue_5fca2_47',['COUNTER_MAX_VALUE_CA2',['../a00350.html#a94608e9994efbb6869e15bf1076c9899',1,'calib_command.h']]], - ['counter_5fmode_5fidx_48',['COUNTER_MODE_IDX',['../a00350.html#a83a00fa1769c54aeb5ad02bdfba5b3e7',1,'calib_command.h']]], - ['counter_5fmode_5fincrement_49',['COUNTER_MODE_INCREMENT',['../a00350.html#aadb200c87d6dedb5768eeb8395e697c2',1,'calib_command.h']]], - ['counter_5fmode_5fmask_50',['COUNTER_MODE_MASK',['../a00350.html#a7b90ca417a76facaeec91d8f2c10f860',1,'calib_command.h']]], - ['counter_5fmode_5fread_51',['COUNTER_MODE_READ',['../a00350.html#a4e3355c5ab7c48cfe466c9374ccc698e',1,'calib_command.h']]], - ['counter_5frsp_5fsize_52',['COUNTER_RSP_SIZE',['../a00350.html#a66287a8b6f625f866b5cecc4845993ed',1,'calib_command.h']]], - ['counter_5fsize_53',['COUNTER_SIZE',['../a00350.html#a2addec53a2494a40b9101b78426dad2f',1,'calib_command.h']]] + ['calib_5finfo_5flatch_5fen_0',['CALIB_INFO_LATCH_EN',['../a00359.html#af19794adbeec8b57eb7cbef1f9e21c91',1,'calib_config_check.h']]], + ['calib_5flock_5fca2_5fen_1',['CALIB_LOCK_CA2_EN',['../a00359.html#a611611e20ca91cad7e9897847b9b355a',1,'calib_config_check.h']]], + ['calib_5flock_5fen_2',['CALIB_LOCK_EN',['../a00359.html#a3801cb49b78666a9cfa602fa74b22da9',1,'calib_config_check.h']]], + ['calib_5fread_5fen_3',['CALIB_READ_EN',['../a00359.html#a67ed014df4e1bbbea873ede0e9700e29',1,'calib_config_check.h']]], + ['calib_5fsha_5fcontext_5fen_4',['CALIB_SHA_CONTEXT_EN',['../a00359.html#a84c51bc36228a8fadd8654bfaae5d58c',1,'calib_config_check.h']]], + ['calib_5fsha_5fen_5',['CALIB_SHA_EN',['../a00359.html#a467882792e9ea53b4e596d1be05997a6',1,'calib_config_check.h']]], + ['calib_5fsha_5fhmac_5fen_6',['CALIB_SHA_HMAC_EN',['../a00359.html#ab13bbafe02599813084788482536728f',1,'calib_config_check.h']]], + ['calib_5fsign_5fca2_5fen_7',['CALIB_SIGN_CA2_EN',['../a00359.html#ac629bf5f0b5d6c64c5393cadd7b7479c',1,'calib_config_check.h']]], + ['calib_5fsign_5fen_8',['CALIB_SIGN_EN',['../a00359.html#a9802710200f050b0e9414bd88cdd8c0d',1,'calib_config_check.h']]], + ['calib_5fswi_5fflag_5fcmd_9',['CALIB_SWI_FLAG_CMD',['../a00380.html#ac7946c257bcbaf0e1589e960b83d23df',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5fidle_10',['CALIB_SWI_FLAG_IDLE',['../a00380.html#a525ae62bb76a8ba01d4d85264f832c8e',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5fsleep_11',['CALIB_SWI_FLAG_SLEEP',['../a00380.html#a8dd3e14e93cec4aea30e27104935d51b',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5ftx_12',['CALIB_SWI_FLAG_TX',['../a00380.html#a1c46cc5ed5e30945d62e9ea369c94cdb',1,'calib_execution.h']]], + ['calib_5fswi_5fflag_5fwake_13',['CALIB_SWI_FLAG_WAKE',['../a00380.html#a55c5fe347b23c42f6359e97ae82b4729',1,'calib_execution.h']]], + ['calib_5fupdateextra_5fen_14',['CALIB_UPDATEEXTRA_EN',['../a00359.html#ab46a8196f24bde7c86ac5e3affdc8ff8',1,'calib_config_check.h']]], + ['calib_5fverify_5fen_15',['CALIB_VERIFY_EN',['../a00359.html#a671b3421327a5c885b0c3e6e1e64afe7',1,'calib_config_check.h']]], + ['calib_5fverify_5fmac_5fen_16',['CALIB_VERIFY_MAC_EN',['../a00359.html#ac419953cd10efa4bef6e4efdc9c6cbe9',1,'calib_config_check.h']]], + ['calib_5fverify_5fstored_5fen_17',['CALIB_VERIFY_STORED_EN',['../a00359.html#ae841eeabdfbe04dd3241f6fde1a57954',1,'calib_config_check.h']]], + ['calib_5fwrite_5fenc_5fen_18',['CALIB_WRITE_ENC_EN',['../a00359.html#a64cbcf66a79f024ae3cce06d1f6731f9',1,'calib_config_check.h']]], + ['checkmac_5fclient_5fchallenge_5fidx_19',['CHECKMAC_CLIENT_CHALLENGE_IDX',['../a00356.html#a0f2c0b2e264a88b766811fe4ea0de88f',1,'calib_command.h']]], + ['checkmac_5fclient_5fchallenge_5fsize_20',['CHECKMAC_CLIENT_CHALLENGE_SIZE',['../a00356.html#a3c7444c099cf0f89f754fd3cbec77bf4',1,'calib_command.h']]], + ['checkmac_5fclient_5fcommand_5fsize_21',['CHECKMAC_CLIENT_COMMAND_SIZE',['../a00356.html#ad3d431e17094b6690d443e0a038da9e2',1,'calib_command.h']]], + ['checkmac_5fclient_5fresponse_5fidx_22',['CHECKMAC_CLIENT_RESPONSE_IDX',['../a00356.html#a170c911bfe1a20e3572bdc5c2cd80c9d',1,'calib_command.h']]], + ['checkmac_5fclient_5fresponse_5fsize_23',['CHECKMAC_CLIENT_RESPONSE_SIZE',['../a00356.html#a93cb0fdfc89b69cb1c4670f30288f2ad',1,'calib_command.h']]], + ['checkmac_5fcmd_5fmatch_24',['CHECKMAC_CMD_MATCH',['../a00356.html#a09b26b691e29966bcec1513edf819efe',1,'calib_command.h']]], + ['checkmac_5fcmd_5fmismatch_25',['CHECKMAC_CMD_MISMATCH',['../a00356.html#a1db673cb318ec36ebd0c9c1a5ce301ad',1,'calib_command.h']]], + ['checkmac_5fcount_26',['CHECKMAC_COUNT',['../a00356.html#a4c998ee3d596f3006a4488bd8657df33',1,'calib_command.h']]], + ['checkmac_5fdata_5fidx_27',['CHECKMAC_DATA_IDX',['../a00356.html#a1ba2ec2d321b3f90f53c02c7fb9711f2',1,'calib_command.h']]], + ['checkmac_5fkeyid_5fidx_28',['CHECKMAC_KEYID_IDX',['../a00356.html#a4203bbb296cd67d035066979657cf979',1,'calib_command.h']]], + ['checkmac_5fmode_5fblock1_5ftempkey_29',['CHECKMAC_MODE_BLOCK1_TEMPKEY',['../a00356.html#a9088fc1b89c3ca9b58901de000d8d55d',1,'calib_command.h']]], + ['checkmac_5fmode_5fblock2_5ftempkey_30',['CHECKMAC_MODE_BLOCK2_TEMPKEY',['../a00356.html#a40d926e0e037fc8bb265bb19f57e5d1a',1,'calib_command.h']]], + ['checkmac_5fmode_5fchallenge_31',['CHECKMAC_MODE_CHALLENGE',['../a00356.html#aaabcd1e4afb29088a17f7e87e7136e24',1,'calib_command.h']]], + ['checkmac_5fmode_5fidx_32',['CHECKMAC_MODE_IDX',['../a00356.html#ae757542e1c4d4815e1dc8db034dca476',1,'calib_command.h']]], + ['checkmac_5fmode_5finclude_5fotp_5f64_33',['CHECKMAC_MODE_INCLUDE_OTP_64',['../a00356.html#abeef4ff866116f4e17a6c3ad94b0a286',1,'calib_command.h']]], + ['checkmac_5fmode_5fmask_34',['CHECKMAC_MODE_MASK',['../a00356.html#a67e74cb132024711cf064ff98021d71f',1,'calib_command.h']]], + ['checkmac_5fmode_5foutput_5fmac_5fresponse_35',['CHECKMAC_MODE_OUTPUT_MAC_RESPONSE',['../a00356.html#a411d35690c62060ac4c39588741a808e',1,'calib_command.h']]], + ['checkmac_5fmode_5fsource_5fflag_5fmatch_36',['CHECKMAC_MODE_SOURCE_FLAG_MATCH',['../a00356.html#ac3ca4e46c6a0fb69ba0dfa5fe88ed9ad',1,'calib_command.h']]], + ['checkmac_5fother_5fdata_5fsize_37',['CHECKMAC_OTHER_DATA_SIZE',['../a00356.html#a7c365741639a5c7dc29267a130e8d827',1,'calib_command.h']]], + ['checkmac_5frsp_5fsize_38',['CHECKMAC_RSP_SIZE',['../a00356.html#aa44ecaa440ab845d5939333171476adf',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fcomm_39',['CMD_STATUS_BYTE_COMM',['../a00356.html#a6a6daf9c5640ad80e7af330daad1f6ea',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fecc_40',['CMD_STATUS_BYTE_ECC',['../a00356.html#a44cee4dee17a7c1a2618d11e8e5774dd',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fexec_41',['CMD_STATUS_BYTE_EXEC',['../a00356.html#ae496c798891069e04802bbac7d96e0f5',1,'calib_command.h']]], + ['cmd_5fstatus_5fbyte_5fparse_42',['CMD_STATUS_BYTE_PARSE',['../a00356.html#aef76930f6d419fc30841be04fe6ac8d6',1,'calib_command.h']]], + ['cmd_5fstatus_5fsuccess_43',['CMD_STATUS_SUCCESS',['../a00356.html#a85c326c023bdc268c499eb33375f2270',1,'calib_command.h']]], + ['cmd_5fstatus_5fwakeup_44',['CMD_STATUS_WAKEUP',['../a00356.html#afd20c2250b83786f216a100bde94a670',1,'calib_command.h']]], + ['counter_5fkeyid_5fidx_45',['COUNTER_KEYID_IDX',['../a00356.html#a269bd52a7856116ebce13c1072f56d9e',1,'calib_command.h']]], + ['counter_5fmax_5fvalue_46',['COUNTER_MAX_VALUE',['../a00356.html#abc722de99f444668d09e3815fcc78400',1,'calib_command.h']]], + ['counter_5fmax_5fvalue_5fca2_47',['COUNTER_MAX_VALUE_CA2',['../a00356.html#a94608e9994efbb6869e15bf1076c9899',1,'calib_command.h']]], + ['counter_5fmode_5fidx_48',['COUNTER_MODE_IDX',['../a00356.html#a83a00fa1769c54aeb5ad02bdfba5b3e7',1,'calib_command.h']]], + ['counter_5fmode_5fincrement_49',['COUNTER_MODE_INCREMENT',['../a00356.html#aadb200c87d6dedb5768eeb8395e697c2',1,'calib_command.h']]], + ['counter_5fmode_5fmask_50',['COUNTER_MODE_MASK',['../a00356.html#a7b90ca417a76facaeec91d8f2c10f860',1,'calib_command.h']]], + ['counter_5fmode_5fread_51',['COUNTER_MODE_READ',['../a00356.html#a4e3355c5ab7c48cfe466c9374ccc698e',1,'calib_command.h']]], + ['counter_5frsp_5fsize_52',['COUNTER_RSP_SIZE',['../a00356.html#a66287a8b6f625f866b5cecc4845993ed',1,'calib_command.h']]], + ['counter_5fsize_53',['COUNTER_SIZE',['../a00356.html#a2addec53a2494a40b9101b78426dad2f',1,'calib_command.h']]] ]; diff --git a/search/defines_3.js b/search/defines_3.js index 8b669882f..b6d203ca8 100644 --- a/search/defines_3.js +++ b/search/defines_3.js @@ -1,12 +1,12 @@ var searchData= [ - ['derive_5fkey_5fcount_5flarge_0',['DERIVE_KEY_COUNT_LARGE',['../a00350.html#ac0386500d37b5502158a62b8d864580f',1,'calib_command.h']]], - ['derive_5fkey_5fcount_5fsmall_1',['DERIVE_KEY_COUNT_SMALL',['../a00350.html#a3a3d3289c719d81f95b3d025a2564c9f',1,'calib_command.h']]], - ['derive_5fkey_5fmac_5fidx_2',['DERIVE_KEY_MAC_IDX',['../a00350.html#ac3f89b5db216fd58ae2de3ebd52e26c5',1,'calib_command.h']]], - ['derive_5fkey_5fmac_5fsize_3',['DERIVE_KEY_MAC_SIZE',['../a00350.html#affa79c933fa76585479228b15c2cbc83',1,'calib_command.h']]], - ['derive_5fkey_5fmode_4',['DERIVE_KEY_MODE',['../a00350.html#ac6d810ee00947694d9b95d95db0b2f3c',1,'calib_command.h']]], - ['derive_5fkey_5frandom_5fflag_5',['DERIVE_KEY_RANDOM_FLAG',['../a00350.html#ad6f89d1bb03ed8d84e230bedca57ddd9',1,'calib_command.h']]], - ['derive_5fkey_5frandom_5fidx_6',['DERIVE_KEY_RANDOM_IDX',['../a00350.html#a3495c2fd81985342858bac47300bcdc8',1,'calib_command.h']]], - ['derive_5fkey_5frsp_5fsize_7',['DERIVE_KEY_RSP_SIZE',['../a00350.html#a766a94a7e38b558e1165b24de78d21db',1,'calib_command.h']]], - ['derive_5fkey_5ftargetkey_5fidx_8',['DERIVE_KEY_TARGETKEY_IDX',['../a00350.html#a7216bb6f51f67f09e5372c7f731bf23a',1,'calib_command.h']]] + ['derive_5fkey_5fcount_5flarge_0',['DERIVE_KEY_COUNT_LARGE',['../a00356.html#ac0386500d37b5502158a62b8d864580f',1,'calib_command.h']]], + ['derive_5fkey_5fcount_5fsmall_1',['DERIVE_KEY_COUNT_SMALL',['../a00356.html#a3a3d3289c719d81f95b3d025a2564c9f',1,'calib_command.h']]], + ['derive_5fkey_5fmac_5fidx_2',['DERIVE_KEY_MAC_IDX',['../a00356.html#ac3f89b5db216fd58ae2de3ebd52e26c5',1,'calib_command.h']]], + ['derive_5fkey_5fmac_5fsize_3',['DERIVE_KEY_MAC_SIZE',['../a00356.html#affa79c933fa76585479228b15c2cbc83',1,'calib_command.h']]], + ['derive_5fkey_5fmode_4',['DERIVE_KEY_MODE',['../a00356.html#ac6d810ee00947694d9b95d95db0b2f3c',1,'calib_command.h']]], + ['derive_5fkey_5frandom_5fflag_5',['DERIVE_KEY_RANDOM_FLAG',['../a00356.html#ad6f89d1bb03ed8d84e230bedca57ddd9',1,'calib_command.h']]], + ['derive_5fkey_5frandom_5fidx_6',['DERIVE_KEY_RANDOM_IDX',['../a00356.html#a3495c2fd81985342858bac47300bcdc8',1,'calib_command.h']]], + ['derive_5fkey_5frsp_5fsize_7',['DERIVE_KEY_RSP_SIZE',['../a00356.html#a766a94a7e38b558e1165b24de78d21db',1,'calib_command.h']]], + ['derive_5fkey_5ftargetkey_5fidx_8',['DERIVE_KEY_TARGETKEY_IDX',['../a00356.html#a7216bb6f51f67f09e5372c7f731bf23a',1,'calib_command.h']]] ]; diff --git a/search/defines_4.js b/search/defines_4.js index 4cac6d28b..7bdf4263d 100644 --- a/search/defines_4.js +++ b/search/defines_4.js @@ -1,5 +1,5 @@ var searchData= [ - ['ecdh_5fkey_5fsize_0',['ECDH_KEY_SIZE',['../a00350.html#aa21e10945076d803129feb07946591f9',1,'calib_command.h']]], - ['ecdh_5frsp_5fsize_1',['ECDH_RSP_SIZE',['../a00350.html#aa667451bf2e061c3e76a7a8a5d8b86d4',1,'calib_command.h']]] + ['ecdh_5fkey_5fsize_0',['ECDH_KEY_SIZE',['../a00356.html#aa21e10945076d803129feb07946591f9',1,'calib_command.h']]], + ['ecdh_5frsp_5fsize_1',['ECDH_RSP_SIZE',['../a00356.html#aa667451bf2e061c3e76a7a8a5d8b86d4',1,'calib_command.h']]] ]; diff --git a/search/defines_5.js b/search/defines_5.js index 96ab31d8e..8a77d1faf 100644 --- a/search/defines_5.js +++ b/search/defines_5.js @@ -1,30 +1,30 @@ var searchData= [ - ['gendig_5fcount_0',['GENDIG_COUNT',['../a00350.html#a235eb9557fa074bf152f9ce9c5844058',1,'calib_command.h']]], - ['gendig_5fdata_5fidx_1',['GENDIG_DATA_IDX',['../a00350.html#ac101f854026596231715eca664550e36',1,'calib_command.h']]], - ['gendig_5fkeyid_5fidx_2',['GENDIG_KEYID_IDX',['../a00350.html#ac2d5b5de26d0318ba6db3ad1055eb6ec',1,'calib_command.h']]], - ['gendig_5frsp_5fsize_3',['GENDIG_RSP_SIZE',['../a00350.html#a2c26247a084a027f06a2aaf692313f12',1,'calib_command.h']]], - ['gendig_5fuse_5ftempkey_5fbit_4',['GENDIG_USE_TEMPKEY_BIT',['../a00350.html#ab1be0c05faf7ef0c161f34cb6b0c4e28',1,'calib_command.h']]], - ['gendig_5fzone_5fconfig_5',['GENDIG_ZONE_CONFIG',['../a00350.html#a9cab0c5dd2e3796497a5237f101f19e0',1,'calib_command.h']]], - ['gendig_5fzone_5fcounter_6',['GENDIG_ZONE_COUNTER',['../a00350.html#a84f07835d69fed7484299c78f4971a3e',1,'calib_command.h']]], - ['gendig_5fzone_5fdata_7',['GENDIG_ZONE_DATA',['../a00350.html#abc21880360bdce990ad724fa7a7d9bf0',1,'calib_command.h']]], - ['gendig_5fzone_5fidx_8',['GENDIG_ZONE_IDX',['../a00350.html#ab79b57111a49362bd51922813cb84355',1,'calib_command.h']]], - ['gendig_5fzone_5fkey_5fconfig_9',['GENDIG_ZONE_KEY_CONFIG',['../a00350.html#aba61a1bd245d7471e59a39577498065b',1,'calib_command.h']]], - ['gendig_5fzone_5fotp_10',['GENDIG_ZONE_OTP',['../a00350.html#aee95b219cf932dfedb3a3c5e23d01a9d',1,'calib_command.h']]], - ['gendig_5fzone_5fshared_5fnonce_11',['GENDIG_ZONE_SHARED_NONCE',['../a00350.html#a49923a8835f64294a5e9b3660c80dc7e',1,'calib_command.h']]], - ['genkey_5fcount_12',['GENKEY_COUNT',['../a00350.html#ab6782a07fce203169aba6dd32f8ab123',1,'calib_command.h']]], - ['genkey_5fcount_5fdata_13',['GENKEY_COUNT_DATA',['../a00350.html#a07289de41178ecfb6392da31e31e27c3',1,'calib_command.h']]], - ['genkey_5fdata_5fidx_14',['GENKEY_DATA_IDX',['../a00350.html#a9163acda5dd0653f40b6ad445f2c972d',1,'calib_command.h']]], - ['genkey_5fkeyid_5fidx_15',['GENKEY_KEYID_IDX',['../a00350.html#a5cacc01be37cebf35e300be96893477e',1,'calib_command.h']]], - ['genkey_5fmode_5fdigest_16',['GENKEY_MODE_DIGEST',['../a00350.html#a609531b6e844f5a9eebd7c4dcd869b16',1,'calib_command.h']]], - ['genkey_5fmode_5fidx_17',['GENKEY_MODE_IDX',['../a00350.html#af120353f5e8e159eaa9c930555b159d5',1,'calib_command.h']]], - ['genkey_5fmode_5fmac_18',['GENKEY_MODE_MAC',['../a00350.html#ae7b4dae38c2b38b25e43dc7ff4959764',1,'calib_command.h']]], - ['genkey_5fmode_5fmask_19',['GENKEY_MODE_MASK',['../a00350.html#aa3984c137090a2d103b2089c7ac31642',1,'calib_command.h']]], - ['genkey_5fmode_5fprivate_20',['GENKEY_MODE_PRIVATE',['../a00350.html#adc25fc4bebaac1582bb57d791f72356d',1,'calib_command.h']]], - ['genkey_5fmode_5fpubkey_5fdigest_21',['GENKEY_MODE_PUBKEY_DIGEST',['../a00350.html#a8d9a1e331d54bffb36f7b4e97af5d161',1,'calib_command.h']]], - ['genkey_5fmode_5fpublic_22',['GENKEY_MODE_PUBLIC',['../a00350.html#a03e556ba7849f28ee8c58df8921cba66',1,'calib_command.h']]], - ['genkey_5fother_5fdata_5fsize_23',['GENKEY_OTHER_DATA_SIZE',['../a00350.html#a62644ffb962c56fbea154526a2a84b40',1,'calib_command.h']]], - ['genkey_5fprivate_5fto_5ftempkey_24',['GENKEY_PRIVATE_TO_TEMPKEY',['../a00350.html#ad5b1ead29f3ce3cee52d106af531ab86',1,'calib_command.h']]], - ['genkey_5frsp_5fsize_5flong_25',['GENKEY_RSP_SIZE_LONG',['../a00350.html#a08e8a80be2717ece7c5ed5cc0a27fbab',1,'calib_command.h']]], - ['genkey_5frsp_5fsize_5fshort_26',['GENKEY_RSP_SIZE_SHORT',['../a00350.html#a0543a644422ffc7460eeeb78799bde16',1,'calib_command.h']]] + ['gendig_5fcount_0',['GENDIG_COUNT',['../a00356.html#a235eb9557fa074bf152f9ce9c5844058',1,'calib_command.h']]], + ['gendig_5fdata_5fidx_1',['GENDIG_DATA_IDX',['../a00356.html#ac101f854026596231715eca664550e36',1,'calib_command.h']]], + ['gendig_5fkeyid_5fidx_2',['GENDIG_KEYID_IDX',['../a00356.html#ac2d5b5de26d0318ba6db3ad1055eb6ec',1,'calib_command.h']]], + ['gendig_5frsp_5fsize_3',['GENDIG_RSP_SIZE',['../a00356.html#a2c26247a084a027f06a2aaf692313f12',1,'calib_command.h']]], + ['gendig_5fuse_5ftempkey_5fbit_4',['GENDIG_USE_TEMPKEY_BIT',['../a00356.html#ab1be0c05faf7ef0c161f34cb6b0c4e28',1,'calib_command.h']]], + ['gendig_5fzone_5fconfig_5',['GENDIG_ZONE_CONFIG',['../a00356.html#a9cab0c5dd2e3796497a5237f101f19e0',1,'calib_command.h']]], + ['gendig_5fzone_5fcounter_6',['GENDIG_ZONE_COUNTER',['../a00356.html#a84f07835d69fed7484299c78f4971a3e',1,'calib_command.h']]], + ['gendig_5fzone_5fdata_7',['GENDIG_ZONE_DATA',['../a00356.html#abc21880360bdce990ad724fa7a7d9bf0',1,'calib_command.h']]], + ['gendig_5fzone_5fidx_8',['GENDIG_ZONE_IDX',['../a00356.html#ab79b57111a49362bd51922813cb84355',1,'calib_command.h']]], + ['gendig_5fzone_5fkey_5fconfig_9',['GENDIG_ZONE_KEY_CONFIG',['../a00356.html#aba61a1bd245d7471e59a39577498065b',1,'calib_command.h']]], + ['gendig_5fzone_5fotp_10',['GENDIG_ZONE_OTP',['../a00356.html#aee95b219cf932dfedb3a3c5e23d01a9d',1,'calib_command.h']]], + ['gendig_5fzone_5fshared_5fnonce_11',['GENDIG_ZONE_SHARED_NONCE',['../a00356.html#a49923a8835f64294a5e9b3660c80dc7e',1,'calib_command.h']]], + ['genkey_5fcount_12',['GENKEY_COUNT',['../a00356.html#ab6782a07fce203169aba6dd32f8ab123',1,'calib_command.h']]], + ['genkey_5fcount_5fdata_13',['GENKEY_COUNT_DATA',['../a00356.html#a07289de41178ecfb6392da31e31e27c3',1,'calib_command.h']]], + ['genkey_5fdata_5fidx_14',['GENKEY_DATA_IDX',['../a00356.html#a9163acda5dd0653f40b6ad445f2c972d',1,'calib_command.h']]], + ['genkey_5fkeyid_5fidx_15',['GENKEY_KEYID_IDX',['../a00356.html#a5cacc01be37cebf35e300be96893477e',1,'calib_command.h']]], + ['genkey_5fmode_5fdigest_16',['GENKEY_MODE_DIGEST',['../a00356.html#a609531b6e844f5a9eebd7c4dcd869b16',1,'calib_command.h']]], + ['genkey_5fmode_5fidx_17',['GENKEY_MODE_IDX',['../a00356.html#af120353f5e8e159eaa9c930555b159d5',1,'calib_command.h']]], + ['genkey_5fmode_5fmac_18',['GENKEY_MODE_MAC',['../a00356.html#ae7b4dae38c2b38b25e43dc7ff4959764',1,'calib_command.h']]], + ['genkey_5fmode_5fmask_19',['GENKEY_MODE_MASK',['../a00356.html#aa3984c137090a2d103b2089c7ac31642',1,'calib_command.h']]], + ['genkey_5fmode_5fprivate_20',['GENKEY_MODE_PRIVATE',['../a00356.html#adc25fc4bebaac1582bb57d791f72356d',1,'calib_command.h']]], + ['genkey_5fmode_5fpubkey_5fdigest_21',['GENKEY_MODE_PUBKEY_DIGEST',['../a00356.html#a8d9a1e331d54bffb36f7b4e97af5d161',1,'calib_command.h']]], + ['genkey_5fmode_5fpublic_22',['GENKEY_MODE_PUBLIC',['../a00356.html#a03e556ba7849f28ee8c58df8921cba66',1,'calib_command.h']]], + ['genkey_5fother_5fdata_5fsize_23',['GENKEY_OTHER_DATA_SIZE',['../a00356.html#a62644ffb962c56fbea154526a2a84b40',1,'calib_command.h']]], + ['genkey_5fprivate_5fto_5ftempkey_24',['GENKEY_PRIVATE_TO_TEMPKEY',['../a00356.html#ad5b1ead29f3ce3cee52d106af531ab86',1,'calib_command.h']]], + ['genkey_5frsp_5fsize_5flong_25',['GENKEY_RSP_SIZE_LONG',['../a00356.html#a08e8a80be2717ece7c5ed5cc0a27fbab',1,'calib_command.h']]], + ['genkey_5frsp_5fsize_5fshort_26',['GENKEY_RSP_SIZE_SHORT',['../a00356.html#a0543a644422ffc7460eeeb78799bde16',1,'calib_command.h']]] ]; diff --git a/search/defines_6.js b/search/defines_6.js index 4066d802e..6ef9ba027 100644 --- a/search/defines_6.js +++ b/search/defines_6.js @@ -1,15 +1,15 @@ var searchData= [ - ['hmac_5fcount_0',['HMAC_COUNT',['../a00350.html#a041d4cd845319ea0a693a1c4008b2a06',1,'calib_command.h']]], - ['hmac_5fdigest_5fsize_1',['HMAC_DIGEST_SIZE',['../a00350.html#acd5976f898b9f67ea8e21df4e27fb712',1,'calib_command.h']]], - ['hmac_5fkeyid_5fidx_2',['HMAC_KEYID_IDX',['../a00350.html#a23673926f1dd2464bd20f6512985d855',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5ffullsn_3',['HMAC_MODE_FLAG_FULLSN',['../a00350.html#a564f52346bfc03bdd50aa7d03974efe7',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5fotp64_4',['HMAC_MODE_FLAG_OTP64',['../a00350.html#a62261a1c6f121c296dce7e0f697c9a4a',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5fotp88_5',['HMAC_MODE_FLAG_OTP88',['../a00350.html#a34be98ca6fb22f331eb62cfc4104ded6',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5ftk_5fnorand_6',['HMAC_MODE_FLAG_TK_NORAND',['../a00350.html#ac3b1177210ba941afa527bacbcfd4fab',1,'calib_command.h']]], - ['hmac_5fmode_5fflag_5ftk_5frand_7',['HMAC_MODE_FLAG_TK_RAND',['../a00350.html#a08326ee33be4faaec3be800e80c1cc17',1,'calib_command.h']]], - ['hmac_5fmode_5fidx_8',['HMAC_MODE_IDX',['../a00350.html#adf58a677811566e8446870523bb65850',1,'calib_command.h']]], - ['hmac_5fmode_5fmask_9',['HMAC_MODE_MASK',['../a00350.html#a8250b0997534871fdd6ead1c3aa220ba',1,'calib_command.h']]], - ['hmac_5frsp_5fsize_10',['HMAC_RSP_SIZE',['../a00350.html#adec1fd29e8c6b2f804fc4050778dafc8',1,'calib_command.h']]], - ['hostlib_5fcert_5fen_11',['HOSTLIB_CERT_EN',['../a00653.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_mbedtls_interface.h'],['../a00665.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_openssl_interface.h']]] + ['hmac_5fcount_0',['HMAC_COUNT',['../a00356.html#a041d4cd845319ea0a693a1c4008b2a06',1,'calib_command.h']]], + ['hmac_5fdigest_5fsize_1',['HMAC_DIGEST_SIZE',['../a00356.html#acd5976f898b9f67ea8e21df4e27fb712',1,'calib_command.h']]], + ['hmac_5fkeyid_5fidx_2',['HMAC_KEYID_IDX',['../a00356.html#a23673926f1dd2464bd20f6512985d855',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5ffullsn_3',['HMAC_MODE_FLAG_FULLSN',['../a00356.html#a564f52346bfc03bdd50aa7d03974efe7',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5fotp64_4',['HMAC_MODE_FLAG_OTP64',['../a00356.html#a62261a1c6f121c296dce7e0f697c9a4a',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5fotp88_5',['HMAC_MODE_FLAG_OTP88',['../a00356.html#a34be98ca6fb22f331eb62cfc4104ded6',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5ftk_5fnorand_6',['HMAC_MODE_FLAG_TK_NORAND',['../a00356.html#ac3b1177210ba941afa527bacbcfd4fab',1,'calib_command.h']]], + ['hmac_5fmode_5fflag_5ftk_5frand_7',['HMAC_MODE_FLAG_TK_RAND',['../a00356.html#a08326ee33be4faaec3be800e80c1cc17',1,'calib_command.h']]], + ['hmac_5fmode_5fidx_8',['HMAC_MODE_IDX',['../a00356.html#adf58a677811566e8446870523bb65850',1,'calib_command.h']]], + ['hmac_5fmode_5fmask_9',['HMAC_MODE_MASK',['../a00356.html#a8250b0997534871fdd6ead1c3aa220ba',1,'calib_command.h']]], + ['hmac_5frsp_5fsize_10',['HMAC_RSP_SIZE',['../a00356.html#adec1fd29e8c6b2f804fc4050778dafc8',1,'calib_command.h']]], + ['hostlib_5fcert_5fen_11',['HOSTLIB_CERT_EN',['../a00668.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_mbedtls_interface.h'],['../a00680.html#a82cc4e898685eda93b47e741e5b44137',1,'HOSTLIB_CERT_EN(): atca_openssl_interface.h']]] ]; diff --git a/search/defines_7.js b/search/defines_7.js index 08b314029..ae3310daa 100644 --- a/search/defines_7.js +++ b/search/defines_7.js @@ -1,22 +1,22 @@ var searchData= [ - ['info_5fcount_0',['INFO_COUNT',['../a00350.html#aee1a29942cf2b3637a65506dc6b5d4fe',1,'calib_command.h']]], - ['info_5fdriver_5fstate_5fmask_1',['INFO_DRIVER_STATE_MASK',['../a00350.html#a9cc740e22e15f08a8b90873a2b3b47e8',1,'calib_command.h']]], - ['info_5fmode_5fchip_5fstatus_2',['INFO_MODE_CHIP_STATUS',['../a00350.html#ad792a3c825c32832a9b6292bfe028d32',1,'calib_command.h']]], - ['info_5fmode_5fgpio_3',['INFO_MODE_GPIO',['../a00350.html#a30e8f8f4027e2137c11c2fb49b4c2aa6',1,'calib_command.h']]], - ['info_5fmode_5fkey_5fvalid_4',['INFO_MODE_KEY_VALID',['../a00350.html#a6f746e9967643e3234727eaa5a0b274b',1,'calib_command.h']]], - ['info_5fmode_5flock_5fstatus_5',['INFO_MODE_LOCK_STATUS',['../a00350.html#a1cfd78a07f649bda6cf3b7de35804a90',1,'calib_command.h']]], - ['info_5fmode_5fmax_6',['INFO_MODE_MAX',['../a00350.html#a249c12b69d65f6c33568c78b9d9b127d',1,'calib_command.h']]], - ['info_5fmode_5frevision_7',['INFO_MODE_REVISION',['../a00350.html#ae591dd29af805fc5b63e5b06d5e7c450',1,'calib_command.h']]], - ['info_5fmode_5fstate_8',['INFO_MODE_STATE',['../a00350.html#a7432ca6b291e32e962fabaa6d604a8bc',1,'calib_command.h']]], - ['info_5fmode_5fvol_5fkey_5fpermit_9',['INFO_MODE_VOL_KEY_PERMIT',['../a00350.html#ac0fb0edb797b754a069e12931a001257',1,'calib_command.h']]], - ['info_5fno_5fstate_10',['INFO_NO_STATE',['../a00350.html#ad5b035b6f65f87b7fdf75f225a54ce35',1,'calib_command.h']]], - ['info_5foutput_5fstate_5fmask_11',['INFO_OUTPUT_STATE_MASK',['../a00350.html#a2b70682af491ce76c45505cabafcf9c0',1,'calib_command.h']]], - ['info_5fparam1_5fidx_12',['INFO_PARAM1_IDX',['../a00350.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac',1,'calib_command.h']]], - ['info_5fparam2_5fidx_13',['INFO_PARAM2_IDX',['../a00350.html#a09e4830c78dedfa2ce662e0fdbe430e3',1,'calib_command.h']]], - ['info_5fparam2_5flatch_5fclear_14',['INFO_PARAM2_LATCH_CLEAR',['../a00350.html#a027d5e8ae4a55db4ae52a41f3214c861',1,'calib_command.h']]], - ['info_5fparam2_5flatch_5fset_15',['INFO_PARAM2_LATCH_SET',['../a00350.html#aae24f308513ed54fc7c41b39bc05760b',1,'calib_command.h']]], - ['info_5fparam2_5fset_5flatch_5fstate_16',['INFO_PARAM2_SET_LATCH_STATE',['../a00350.html#a5dcc70feddb0b97c6fa779c6c3c819e6',1,'calib_command.h']]], - ['info_5frsp_5fsize_17',['INFO_RSP_SIZE',['../a00350.html#a0c667e3f6590ac12726cbf4ad2b0f4f5',1,'calib_command.h']]], - ['info_5fsize_18',['INFO_SIZE',['../a00350.html#a70457c61d44fbac0cb48727f53c39388',1,'calib_command.h']]] + ['info_5fcount_0',['INFO_COUNT',['../a00356.html#aee1a29942cf2b3637a65506dc6b5d4fe',1,'calib_command.h']]], + ['info_5fdriver_5fstate_5fmask_1',['INFO_DRIVER_STATE_MASK',['../a00356.html#a9cc740e22e15f08a8b90873a2b3b47e8',1,'calib_command.h']]], + ['info_5fmode_5fchip_5fstatus_2',['INFO_MODE_CHIP_STATUS',['../a00356.html#ad792a3c825c32832a9b6292bfe028d32',1,'calib_command.h']]], + ['info_5fmode_5fgpio_3',['INFO_MODE_GPIO',['../a00356.html#a30e8f8f4027e2137c11c2fb49b4c2aa6',1,'calib_command.h']]], + ['info_5fmode_5fkey_5fvalid_4',['INFO_MODE_KEY_VALID',['../a00356.html#a6f746e9967643e3234727eaa5a0b274b',1,'calib_command.h']]], + ['info_5fmode_5flock_5fstatus_5',['INFO_MODE_LOCK_STATUS',['../a00356.html#a1cfd78a07f649bda6cf3b7de35804a90',1,'calib_command.h']]], + ['info_5fmode_5fmax_6',['INFO_MODE_MAX',['../a00356.html#a249c12b69d65f6c33568c78b9d9b127d',1,'calib_command.h']]], + ['info_5fmode_5frevision_7',['INFO_MODE_REVISION',['../a00356.html#ae591dd29af805fc5b63e5b06d5e7c450',1,'calib_command.h']]], + ['info_5fmode_5fstate_8',['INFO_MODE_STATE',['../a00356.html#a7432ca6b291e32e962fabaa6d604a8bc',1,'calib_command.h']]], + ['info_5fmode_5fvol_5fkey_5fpermit_9',['INFO_MODE_VOL_KEY_PERMIT',['../a00356.html#ac0fb0edb797b754a069e12931a001257',1,'calib_command.h']]], + ['info_5fno_5fstate_10',['INFO_NO_STATE',['../a00356.html#ad5b035b6f65f87b7fdf75f225a54ce35',1,'calib_command.h']]], + ['info_5foutput_5fstate_5fmask_11',['INFO_OUTPUT_STATE_MASK',['../a00356.html#a2b70682af491ce76c45505cabafcf9c0',1,'calib_command.h']]], + ['info_5fparam1_5fidx_12',['INFO_PARAM1_IDX',['../a00356.html#a9d72194dbe94bd2f5d3b0e9aa2dc85ac',1,'calib_command.h']]], + ['info_5fparam2_5fidx_13',['INFO_PARAM2_IDX',['../a00356.html#a09e4830c78dedfa2ce662e0fdbe430e3',1,'calib_command.h']]], + ['info_5fparam2_5flatch_5fclear_14',['INFO_PARAM2_LATCH_CLEAR',['../a00356.html#a027d5e8ae4a55db4ae52a41f3214c861',1,'calib_command.h']]], + ['info_5fparam2_5flatch_5fset_15',['INFO_PARAM2_LATCH_SET',['../a00356.html#aae24f308513ed54fc7c41b39bc05760b',1,'calib_command.h']]], + ['info_5fparam2_5fset_5flatch_5fstate_16',['INFO_PARAM2_SET_LATCH_STATE',['../a00356.html#a5dcc70feddb0b97c6fa779c6c3c819e6',1,'calib_command.h']]], + ['info_5frsp_5fsize_17',['INFO_RSP_SIZE',['../a00356.html#a0c667e3f6590ac12726cbf4ad2b0f4f5',1,'calib_command.h']]], + ['info_5fsize_18',['INFO_SIZE',['../a00356.html#a70457c61d44fbac0cb48727f53c39388',1,'calib_command.h']]] ]; diff --git a/search/defines_8.js b/search/defines_8.js index e044b15b3..de11c9d42 100644 --- a/search/defines_8.js +++ b/search/defines_8.js @@ -1,42 +1,42 @@ var searchData= [ - ['kdf_5fdetails_5faes_5fkey_5floc_5fmask_0',['KDF_DETAILS_AES_KEY_LOC_MASK',['../a00350.html#a77a516ab645b681ad7861d8b74e4a115',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5finput_1',['KDF_DETAILS_HKDF_MSG_LOC_INPUT',['../a00350.html#ae2b34b443ce2e0f285dd8d6f34f84d70',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fiv_2',['KDF_DETAILS_HKDF_MSG_LOC_IV',['../a00350.html#a53650471a7eef96ce0ef00cb6b8a6a9b',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fmask_3',['KDF_DETAILS_HKDF_MSG_LOC_MASK',['../a00350.html#aa5b4cb5be95861466fff33fe0d5a9020',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fslot_4',['KDF_DETAILS_HKDF_MSG_LOC_SLOT',['../a00350.html#a8d5f52e7dbb1ea5308517365bbec87b5',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5ftempkey_5',['KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY',['../a00350.html#abae30386c46658676cf11de7bec27138',1,'calib_command.h']]], - ['kdf_5fdetails_5fhkdf_5fzero_5fkey_6',['KDF_DETAILS_HKDF_ZERO_KEY',['../a00350.html#ae16e61d55b371f9c5e31f08f680de609',1,'calib_command.h']]], - ['kdf_5fdetails_5fidx_7',['KDF_DETAILS_IDX',['../a00350.html#a56306fca73ae0f43053787bafdac6a94',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5faead_5fmask_8',['KDF_DETAILS_PRF_AEAD_MASK',['../a00350.html#a71bd7b920718c3bbf99d78eda569018c',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5faead_5fmode0_9',['KDF_DETAILS_PRF_AEAD_MODE0',['../a00350.html#a77402cc8f4efbba6119bd57717c34ce4',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5faead_5fmode1_10',['KDF_DETAILS_PRF_AEAD_MODE1',['../a00350.html#a696c55d8590e9d1ac2571d6921f27573',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f16_11',['KDF_DETAILS_PRF_KEY_LEN_16',['../a00350.html#af83ceba3654b1b76e216402a023c1578',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f32_12',['KDF_DETAILS_PRF_KEY_LEN_32',['../a00350.html#aadcf0e639c6da291ddcb7fed49f1f967',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f48_13',['KDF_DETAILS_PRF_KEY_LEN_48',['../a00350.html#aae92bdb9d72ad6bd2193cbf0e672d46e',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5f64_14',['KDF_DETAILS_PRF_KEY_LEN_64',['../a00350.html#a1519bbd506095c4db25aad15bbc0735b',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5fkey_5flen_5fmask_15',['KDF_DETAILS_PRF_KEY_LEN_MASK',['../a00350.html#af42b60e97bdf4bf0338b8a5ce420fdc5',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5ftarget_5flen_5f32_16',['KDF_DETAILS_PRF_TARGET_LEN_32',['../a00350.html#ac049629a826435702055cc8279db76bb',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5ftarget_5flen_5f64_17',['KDF_DETAILS_PRF_TARGET_LEN_64',['../a00350.html#a0b47a5e9928b7f3c91db64a9b80fde8b',1,'calib_command.h']]], - ['kdf_5fdetails_5fprf_5ftarget_5flen_5fmask_18',['KDF_DETAILS_PRF_TARGET_LEN_MASK',['../a00350.html#a32c642907f4f326893fb6fccfce18707',1,'calib_command.h']]], - ['kdf_5fdetails_5fsize_19',['KDF_DETAILS_SIZE',['../a00350.html#a2e025044ab9693b267e79f80e0a69cb1',1,'calib_command.h']]], - ['kdf_5fkeyid_5fidx_20',['KDF_KEYID_IDX',['../a00350.html#ae814b4e63476d137bf226537cb2ff0fc',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5faes_21',['KDF_MODE_ALG_AES',['../a00350.html#aee08925a21e8dbf05f8557617e3f610e',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5fhkdf_22',['KDF_MODE_ALG_HKDF',['../a00350.html#a59b230043c3cd1fa0deafac6225238cb',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5fmask_23',['KDF_MODE_ALG_MASK',['../a00350.html#a90f529642e87edae132421b3777ec4b1',1,'calib_command.h']]], - ['kdf_5fmode_5falg_5fprf_24',['KDF_MODE_ALG_PRF',['../a00350.html#a41ad765834ce2cf37241f79b80857f79',1,'calib_command.h']]], - ['kdf_5fmode_5fidx_25',['KDF_MODE_IDX',['../a00350.html#a959e54d571acf81b608d5c6d535b0510',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5faltkeybuf_26',['KDF_MODE_SOURCE_ALTKEYBUF',['../a00350.html#aa3f4cdb700e47737058c174a1f156707',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5fmask_27',['KDF_MODE_SOURCE_MASK',['../a00350.html#addd73b0088cc98d40eaf8b3370f2fc8e',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5fslot_28',['KDF_MODE_SOURCE_SLOT',['../a00350.html#a3b69501fcc3e0cea0197fc0f6107916a',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5ftempkey_29',['KDF_MODE_SOURCE_TEMPKEY',['../a00350.html#a43cad9606d9b7c0e5875b1fa66108eb8',1,'calib_command.h']]], - ['kdf_5fmode_5fsource_5ftempkey_5fup_30',['KDF_MODE_SOURCE_TEMPKEY_UP',['../a00350.html#a3785654ccbe309a87213aedb001ca39d',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5faltkeybuf_31',['KDF_MODE_TARGET_ALTKEYBUF',['../a00350.html#afeaf2094813c3184f0f128c37e3297dd',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5fmask_32',['KDF_MODE_TARGET_MASK',['../a00350.html#a97828be629e8f11561b58cb434c18b21',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5foutput_33',['KDF_MODE_TARGET_OUTPUT',['../a00350.html#afa19443ca4e054e38a7599c37575678d',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5foutput_5fenc_34',['KDF_MODE_TARGET_OUTPUT_ENC',['../a00350.html#a28cccb87be4305fa9469c26b0ca341e8',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5fslot_35',['KDF_MODE_TARGET_SLOT',['../a00350.html#a05c0e401be347897d9573ba58492e570',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5ftempkey_36',['KDF_MODE_TARGET_TEMPKEY',['../a00350.html#abdbb7fc88ccf13d556dce6de3df9ce1b',1,'calib_command.h']]], - ['kdf_5fmode_5ftarget_5ftempkey_5fup_37',['KDF_MODE_TARGET_TEMPKEY_UP',['../a00350.html#ad7e0df789060db2a9e8339972eac2482',1,'calib_command.h']]], + ['kdf_5fdetails_5faes_5fkey_5floc_5fmask_0',['KDF_DETAILS_AES_KEY_LOC_MASK',['../a00356.html#a77a516ab645b681ad7861d8b74e4a115',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5finput_1',['KDF_DETAILS_HKDF_MSG_LOC_INPUT',['../a00356.html#ae2b34b443ce2e0f285dd8d6f34f84d70',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fiv_2',['KDF_DETAILS_HKDF_MSG_LOC_IV',['../a00356.html#a53650471a7eef96ce0ef00cb6b8a6a9b',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fmask_3',['KDF_DETAILS_HKDF_MSG_LOC_MASK',['../a00356.html#aa5b4cb5be95861466fff33fe0d5a9020',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5fslot_4',['KDF_DETAILS_HKDF_MSG_LOC_SLOT',['../a00356.html#a8d5f52e7dbb1ea5308517365bbec87b5',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fmsg_5floc_5ftempkey_5',['KDF_DETAILS_HKDF_MSG_LOC_TEMPKEY',['../a00356.html#abae30386c46658676cf11de7bec27138',1,'calib_command.h']]], + ['kdf_5fdetails_5fhkdf_5fzero_5fkey_6',['KDF_DETAILS_HKDF_ZERO_KEY',['../a00356.html#ae16e61d55b371f9c5e31f08f680de609',1,'calib_command.h']]], + ['kdf_5fdetails_5fidx_7',['KDF_DETAILS_IDX',['../a00356.html#a56306fca73ae0f43053787bafdac6a94',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5faead_5fmask_8',['KDF_DETAILS_PRF_AEAD_MASK',['../a00356.html#a71bd7b920718c3bbf99d78eda569018c',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5faead_5fmode0_9',['KDF_DETAILS_PRF_AEAD_MODE0',['../a00356.html#a77402cc8f4efbba6119bd57717c34ce4',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5faead_5fmode1_10',['KDF_DETAILS_PRF_AEAD_MODE1',['../a00356.html#a696c55d8590e9d1ac2571d6921f27573',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f16_11',['KDF_DETAILS_PRF_KEY_LEN_16',['../a00356.html#af83ceba3654b1b76e216402a023c1578',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f32_12',['KDF_DETAILS_PRF_KEY_LEN_32',['../a00356.html#aadcf0e639c6da291ddcb7fed49f1f967',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f48_13',['KDF_DETAILS_PRF_KEY_LEN_48',['../a00356.html#aae92bdb9d72ad6bd2193cbf0e672d46e',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5f64_14',['KDF_DETAILS_PRF_KEY_LEN_64',['../a00356.html#a1519bbd506095c4db25aad15bbc0735b',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5fkey_5flen_5fmask_15',['KDF_DETAILS_PRF_KEY_LEN_MASK',['../a00356.html#af42b60e97bdf4bf0338b8a5ce420fdc5',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5ftarget_5flen_5f32_16',['KDF_DETAILS_PRF_TARGET_LEN_32',['../a00356.html#ac049629a826435702055cc8279db76bb',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5ftarget_5flen_5f64_17',['KDF_DETAILS_PRF_TARGET_LEN_64',['../a00356.html#a0b47a5e9928b7f3c91db64a9b80fde8b',1,'calib_command.h']]], + ['kdf_5fdetails_5fprf_5ftarget_5flen_5fmask_18',['KDF_DETAILS_PRF_TARGET_LEN_MASK',['../a00356.html#a32c642907f4f326893fb6fccfce18707',1,'calib_command.h']]], + ['kdf_5fdetails_5fsize_19',['KDF_DETAILS_SIZE',['../a00356.html#a2e025044ab9693b267e79f80e0a69cb1',1,'calib_command.h']]], + ['kdf_5fkeyid_5fidx_20',['KDF_KEYID_IDX',['../a00356.html#ae814b4e63476d137bf226537cb2ff0fc',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5faes_21',['KDF_MODE_ALG_AES',['../a00356.html#aee08925a21e8dbf05f8557617e3f610e',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5fhkdf_22',['KDF_MODE_ALG_HKDF',['../a00356.html#a59b230043c3cd1fa0deafac6225238cb',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5fmask_23',['KDF_MODE_ALG_MASK',['../a00356.html#a90f529642e87edae132421b3777ec4b1',1,'calib_command.h']]], + ['kdf_5fmode_5falg_5fprf_24',['KDF_MODE_ALG_PRF',['../a00356.html#a41ad765834ce2cf37241f79b80857f79',1,'calib_command.h']]], + ['kdf_5fmode_5fidx_25',['KDF_MODE_IDX',['../a00356.html#a959e54d571acf81b608d5c6d535b0510',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5faltkeybuf_26',['KDF_MODE_SOURCE_ALTKEYBUF',['../a00356.html#aa3f4cdb700e47737058c174a1f156707',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5fmask_27',['KDF_MODE_SOURCE_MASK',['../a00356.html#addd73b0088cc98d40eaf8b3370f2fc8e',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5fslot_28',['KDF_MODE_SOURCE_SLOT',['../a00356.html#a3b69501fcc3e0cea0197fc0f6107916a',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5ftempkey_29',['KDF_MODE_SOURCE_TEMPKEY',['../a00356.html#a43cad9606d9b7c0e5875b1fa66108eb8',1,'calib_command.h']]], + ['kdf_5fmode_5fsource_5ftempkey_5fup_30',['KDF_MODE_SOURCE_TEMPKEY_UP',['../a00356.html#a3785654ccbe309a87213aedb001ca39d',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5faltkeybuf_31',['KDF_MODE_TARGET_ALTKEYBUF',['../a00356.html#afeaf2094813c3184f0f128c37e3297dd',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5fmask_32',['KDF_MODE_TARGET_MASK',['../a00356.html#a97828be629e8f11561b58cb434c18b21',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5foutput_33',['KDF_MODE_TARGET_OUTPUT',['../a00356.html#afa19443ca4e054e38a7599c37575678d',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5foutput_5fenc_34',['KDF_MODE_TARGET_OUTPUT_ENC',['../a00356.html#a28cccb87be4305fa9469c26b0ca341e8',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5fslot_35',['KDF_MODE_TARGET_SLOT',['../a00356.html#a05c0e401be347897d9573ba58492e570',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5ftempkey_36',['KDF_MODE_TARGET_TEMPKEY',['../a00356.html#abdbb7fc88ccf13d556dce6de3df9ce1b',1,'calib_command.h']]], + ['kdf_5fmode_5ftarget_5ftempkey_5fup_37',['KDF_MODE_TARGET_TEMPKEY_UP',['../a00356.html#ad7e0df789060db2a9e8339972eac2482',1,'calib_command.h']]], ['kit_5fmessage_5fsize_5fmax_38',['KIT_MESSAGE_SIZE_MAX',['../a00020.html#a5ef47c1942cca10be5c5bf17841c8611',1,'ascii_kit_host.h']]] ]; diff --git a/search/defines_9.js b/search/defines_9.js index ea99cc887..df14abe69 100644 --- a/search/defines_9.js +++ b/search/defines_9.js @@ -1,14 +1,14 @@ var searchData= [ - ['lock_5fcount_0',['LOCK_COUNT',['../a00350.html#a8a5cce3cbccf46b91c8065559ad1a082',1,'calib_command.h']]], - ['lock_5frsp_5fsize_1',['LOCK_RSP_SIZE',['../a00350.html#a773dce573d9ff453d2f49aa7fc48e210',1,'calib_command.h']]], - ['lock_5fsummary_5fidx_2',['LOCK_SUMMARY_IDX',['../a00350.html#a6bd6b85614792b8dabb6432f7a48151e',1,'calib_command.h']]], - ['lock_5fzone_5fca2_5fconfig_3',['LOCK_ZONE_CA2_CONFIG',['../a00350.html#a28d91425d00258aed31192c90f3dbd2e',1,'calib_command.h']]], - ['lock_5fzone_5fca2_5fdata_4',['LOCK_ZONE_CA2_DATA',['../a00350.html#ac06e8b2502bc78fda0d33dcd3e11525a',1,'calib_command.h']]], - ['lock_5fzone_5fconfig_5',['LOCK_ZONE_CONFIG',['../a00350.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39',1,'calib_command.h']]], - ['lock_5fzone_5fdata_6',['LOCK_ZONE_DATA',['../a00350.html#a1dedbfae86a6c38085070160696e00bb',1,'calib_command.h']]], - ['lock_5fzone_5fdata_5fslot_7',['LOCK_ZONE_DATA_SLOT',['../a00350.html#af5a93b147dd08b111b348edd1bc82fa5',1,'calib_command.h']]], - ['lock_5fzone_5fidx_8',['LOCK_ZONE_IDX',['../a00350.html#aa72601de2238c09393f120f68abf66a4',1,'calib_command.h']]], - ['lock_5fzone_5fmask_9',['LOCK_ZONE_MASK',['../a00350.html#a71b3c35d021e0ac507fdd6cd9538467f',1,'calib_command.h']]], - ['lock_5fzone_5fno_5fcrc_10',['LOCK_ZONE_NO_CRC',['../a00350.html#a29b582e5069538ee92f5bcd6d1356255',1,'calib_command.h']]] + ['lock_5fcount_0',['LOCK_COUNT',['../a00356.html#a8a5cce3cbccf46b91c8065559ad1a082',1,'calib_command.h']]], + ['lock_5frsp_5fsize_1',['LOCK_RSP_SIZE',['../a00356.html#a773dce573d9ff453d2f49aa7fc48e210',1,'calib_command.h']]], + ['lock_5fsummary_5fidx_2',['LOCK_SUMMARY_IDX',['../a00356.html#a6bd6b85614792b8dabb6432f7a48151e',1,'calib_command.h']]], + ['lock_5fzone_5fca2_5fconfig_3',['LOCK_ZONE_CA2_CONFIG',['../a00356.html#a28d91425d00258aed31192c90f3dbd2e',1,'calib_command.h']]], + ['lock_5fzone_5fca2_5fdata_4',['LOCK_ZONE_CA2_DATA',['../a00356.html#ac06e8b2502bc78fda0d33dcd3e11525a',1,'calib_command.h']]], + ['lock_5fzone_5fconfig_5',['LOCK_ZONE_CONFIG',['../a00356.html#aabbc0da0b4fd66c3aa75ae0cc3a62e39',1,'calib_command.h']]], + ['lock_5fzone_5fdata_6',['LOCK_ZONE_DATA',['../a00356.html#a1dedbfae86a6c38085070160696e00bb',1,'calib_command.h']]], + ['lock_5fzone_5fdata_5fslot_7',['LOCK_ZONE_DATA_SLOT',['../a00356.html#af5a93b147dd08b111b348edd1bc82fa5',1,'calib_command.h']]], + ['lock_5fzone_5fidx_8',['LOCK_ZONE_IDX',['../a00356.html#aa72601de2238c09393f120f68abf66a4',1,'calib_command.h']]], + ['lock_5fzone_5fmask_9',['LOCK_ZONE_MASK',['../a00356.html#a71b3c35d021e0ac507fdd6cd9538467f',1,'calib_command.h']]], + ['lock_5fzone_5fno_5fcrc_10',['LOCK_ZONE_NO_CRC',['../a00356.html#a29b582e5069538ee92f5bcd6d1356255',1,'calib_command.h']]] ]; diff --git a/search/defines_a.js b/search/defines_a.js index 9f0700875..3a0bee371 100644 --- a/search/defines_a.js +++ b/search/defines_a.js @@ -1,22 +1,22 @@ var searchData= [ - ['mac_5fchallenge_5fidx_0',['MAC_CHALLENGE_IDX',['../a00350.html#a427e37c74bad23b251deb2274de6d703',1,'calib_command.h']]], - ['mac_5fchallenge_5fsize_1',['MAC_CHALLENGE_SIZE',['../a00350.html#a921afead5f0a35822bc8263c3a1e1761',1,'calib_command.h']]], - ['mac_5fcount_5flong_2',['MAC_COUNT_LONG',['../a00350.html#aa466dfdf174c134a11f578d1731990ef',1,'calib_command.h']]], - ['mac_5fcount_5fshort_3',['MAC_COUNT_SHORT',['../a00350.html#a94d9bf52f1a6c7af3943eb92dd3967ef',1,'calib_command.h']]], - ['mac_5fkeyid_5fidx_4',['MAC_KEYID_IDX',['../a00350.html#adb6b7f50e3d8af5d2de64f3bd4c83332',1,'calib_command.h']]], - ['mac_5fmode_5fblock1_5ftempkey_5',['MAC_MODE_BLOCK1_TEMPKEY',['../a00350.html#a1ed0d355896761d1cfef4d3b225fefae',1,'calib_command.h']]], - ['mac_5fmode_5fblock2_5ftempkey_6',['MAC_MODE_BLOCK2_TEMPKEY',['../a00350.html#aaf599e8acc392c2ef07eba93eafc474d',1,'calib_command.h']]], - ['mac_5fmode_5fchallenge_7',['MAC_MODE_CHALLENGE',['../a00350.html#a876298788a9270561dc279b7d4c92cb8',1,'calib_command.h']]], - ['mac_5fmode_5fidx_8',['MAC_MODE_IDX',['../a00350.html#a4b1f89e4c4a24c058fddb3d936e76017',1,'calib_command.h']]], - ['mac_5fmode_5finclude_5fotp_5f64_9',['MAC_MODE_INCLUDE_OTP_64',['../a00350.html#a0bd9324a824410d7787c6fcd6e29d8a2',1,'calib_command.h']]], - ['mac_5fmode_5finclude_5fotp_5f88_10',['MAC_MODE_INCLUDE_OTP_88',['../a00350.html#ae5da70c1f37ee40a0cf4edc459d5840a',1,'calib_command.h']]], - ['mac_5fmode_5finclude_5fsn_11',['MAC_MODE_INCLUDE_SN',['../a00350.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5',1,'calib_command.h']]], - ['mac_5fmode_5fmask_12',['MAC_MODE_MASK',['../a00350.html#a6e6b931cf58debb1a23b87c16c7b4d47',1,'calib_command.h']]], - ['mac_5fmode_5fpassthrough_13',['MAC_MODE_PASSTHROUGH',['../a00350.html#a41beaf29ad684f5fae6046c689d6bcf1',1,'calib_command.h']]], - ['mac_5fmode_5fptnonce_5ftempkey_14',['MAC_MODE_PTNONCE_TEMPKEY',['../a00350.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2',1,'calib_command.h']]], - ['mac_5fmode_5fsource_5fflag_5fmatch_15',['MAC_MODE_SOURCE_FLAG_MATCH',['../a00350.html#adffd78899cf3d3dd18afc5ce3c54acb4',1,'calib_command.h']]], - ['mac_5frsp_5fsize_16',['MAC_RSP_SIZE',['../a00350.html#a1e34a5e5e8b86355569f958ecbaff3d4',1,'calib_command.h']]], - ['mac_5fsize_17',['MAC_SIZE',['../a00350.html#a4c987156ced719bbcf398ab6c76289c0',1,'calib_command.h']]], - ['multipart_5fbuf_5fen_18',['MULTIPART_BUF_EN',['../a00800.html#a4ff9c0c2785616e560c43e5312f40c0d',1,'atca_config_check.h']]] + ['mac_5fchallenge_5fidx_0',['MAC_CHALLENGE_IDX',['../a00356.html#a427e37c74bad23b251deb2274de6d703',1,'calib_command.h']]], + ['mac_5fchallenge_5fsize_1',['MAC_CHALLENGE_SIZE',['../a00356.html#a921afead5f0a35822bc8263c3a1e1761',1,'calib_command.h']]], + ['mac_5fcount_5flong_2',['MAC_COUNT_LONG',['../a00356.html#aa466dfdf174c134a11f578d1731990ef',1,'calib_command.h']]], + ['mac_5fcount_5fshort_3',['MAC_COUNT_SHORT',['../a00356.html#a94d9bf52f1a6c7af3943eb92dd3967ef',1,'calib_command.h']]], + ['mac_5fkeyid_5fidx_4',['MAC_KEYID_IDX',['../a00356.html#adb6b7f50e3d8af5d2de64f3bd4c83332',1,'calib_command.h']]], + ['mac_5fmode_5fblock1_5ftempkey_5',['MAC_MODE_BLOCK1_TEMPKEY',['../a00356.html#a1ed0d355896761d1cfef4d3b225fefae',1,'calib_command.h']]], + ['mac_5fmode_5fblock2_5ftempkey_6',['MAC_MODE_BLOCK2_TEMPKEY',['../a00356.html#aaf599e8acc392c2ef07eba93eafc474d',1,'calib_command.h']]], + ['mac_5fmode_5fchallenge_7',['MAC_MODE_CHALLENGE',['../a00356.html#a876298788a9270561dc279b7d4c92cb8',1,'calib_command.h']]], + ['mac_5fmode_5fidx_8',['MAC_MODE_IDX',['../a00356.html#a4b1f89e4c4a24c058fddb3d936e76017',1,'calib_command.h']]], + ['mac_5fmode_5finclude_5fotp_5f64_9',['MAC_MODE_INCLUDE_OTP_64',['../a00356.html#a0bd9324a824410d7787c6fcd6e29d8a2',1,'calib_command.h']]], + ['mac_5fmode_5finclude_5fotp_5f88_10',['MAC_MODE_INCLUDE_OTP_88',['../a00356.html#ae5da70c1f37ee40a0cf4edc459d5840a',1,'calib_command.h']]], + ['mac_5fmode_5finclude_5fsn_11',['MAC_MODE_INCLUDE_SN',['../a00356.html#ae2afa3244b7efc9ffd9a93dd6e5b71b5',1,'calib_command.h']]], + ['mac_5fmode_5fmask_12',['MAC_MODE_MASK',['../a00356.html#a6e6b931cf58debb1a23b87c16c7b4d47',1,'calib_command.h']]], + ['mac_5fmode_5fpassthrough_13',['MAC_MODE_PASSTHROUGH',['../a00356.html#a41beaf29ad684f5fae6046c689d6bcf1',1,'calib_command.h']]], + ['mac_5fmode_5fptnonce_5ftempkey_14',['MAC_MODE_PTNONCE_TEMPKEY',['../a00356.html#afe14a4d41dbd21bb5cfdd9c17f22d2d2',1,'calib_command.h']]], + ['mac_5fmode_5fsource_5fflag_5fmatch_15',['MAC_MODE_SOURCE_FLAG_MATCH',['../a00356.html#adffd78899cf3d3dd18afc5ce3c54acb4',1,'calib_command.h']]], + ['mac_5frsp_5fsize_16',['MAC_RSP_SIZE',['../a00356.html#a1e34a5e5e8b86355569f958ecbaff3d4',1,'calib_command.h']]], + ['mac_5fsize_17',['MAC_SIZE',['../a00356.html#a4c987156ced719bbcf398ab6c76289c0',1,'calib_command.h']]], + ['multipart_5fbuf_5fen_18',['MULTIPART_BUF_EN',['../a00815.html#a4ff9c0c2785616e560c43e5312f40c0d',1,'atca_config_check.h']]] ]; diff --git a/search/defines_b.js b/search/defines_b.js index bea782b0f..a2e5c9b80 100644 --- a/search/defines_b.js +++ b/search/defines_b.js @@ -1,29 +1,29 @@ var searchData= [ - ['nonce_5fcount_5flong_0',['NONCE_COUNT_LONG',['../a00350.html#a9a7fddf245cba834f86e0b63f2b14dc1',1,'calib_command.h']]], - ['nonce_5fcount_5flong_5f64_1',['NONCE_COUNT_LONG_64',['../a00350.html#aaffdf30ca558bdd5f772578742835306',1,'calib_command.h']]], - ['nonce_5fcount_5fshort_2',['NONCE_COUNT_SHORT',['../a00350.html#acff2b897c994e1444f8e94e638c25c74',1,'calib_command.h']]], - ['nonce_5finput_5fidx_3',['NONCE_INPUT_IDX',['../a00350.html#a98721952094435f45bffa352dd6848ad',1,'calib_command.h']]], - ['nonce_5fmode_5fgen_5fsession_5fkey_4',['NONCE_MODE_GEN_SESSION_KEY',['../a00350.html#a447491c6888534a69d8f3a5b446396f8',1,'calib_command.h']]], - ['nonce_5fmode_5fidx_5',['NONCE_MODE_IDX',['../a00350.html#a97ca81334088c297c577f4b4aaced3cf',1,'calib_command.h']]], - ['nonce_5fmode_5finput_5flen_5f32_6',['NONCE_MODE_INPUT_LEN_32',['../a00350.html#af7ee0188ab539a350a6da19fe3f34a72',1,'calib_command.h']]], - ['nonce_5fmode_5finput_5flen_5f64_7',['NONCE_MODE_INPUT_LEN_64',['../a00350.html#a54f085984c6aaf826263a755fd3243d7',1,'calib_command.h']]], - ['nonce_5fmode_5finput_5flen_5fmask_8',['NONCE_MODE_INPUT_LEN_MASK',['../a00350.html#ad83ef570608a572d2dd99e6954e14d40',1,'calib_command.h']]], - ['nonce_5fmode_5finvalid_9',['NONCE_MODE_INVALID',['../a00350.html#a7c675071c7fd650a29594c5fcc9882a1',1,'calib_command.h']]], - ['nonce_5fmode_5fmask_10',['NONCE_MODE_MASK',['../a00350.html#a98be7c54d55328daa4390a816c9bb243',1,'calib_command.h']]], - ['nonce_5fmode_5fno_5fseed_5fupdate_11',['NONCE_MODE_NO_SEED_UPDATE',['../a00350.html#ae3f2d180d7f35d9a7876a28972f2f587',1,'calib_command.h']]], - ['nonce_5fmode_5fpassthrough_12',['NONCE_MODE_PASSTHROUGH',['../a00350.html#a6132b175668ba4d6efecca5986c007c0',1,'calib_command.h']]], - ['nonce_5fmode_5fseed_5fupdate_13',['NONCE_MODE_SEED_UPDATE',['../a00350.html#a798018a4ef489e8fb0a02b5edf7e9d55',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5faltkeybuf_14',['NONCE_MODE_TARGET_ALTKEYBUF',['../a00350.html#a8ad263b7b321311a57db7600f18a555f',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5fmask_15',['NONCE_MODE_TARGET_MASK',['../a00350.html#ab887d70e4a421cf2bcab6b77feba4134',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5fmsgdigbuf_16',['NONCE_MODE_TARGET_MSGDIGBUF',['../a00350.html#a071a95b4b2048e0d879e6e13984e38fd',1,'calib_command.h']]], - ['nonce_5fmode_5ftarget_5ftempkey_17',['NONCE_MODE_TARGET_TEMPKEY',['../a00350.html#ac51f4a863e071bce52c995ddae7e2144',1,'calib_command.h']]], - ['nonce_5fnumin_5fsize_18',['NONCE_NUMIN_SIZE',['../a00350.html#ad0c3da8203a3be6755e86cda96e00228',1,'calib_command.h']]], - ['nonce_5fnumin_5fsize_5fpassthrough_19',['NONCE_NUMIN_SIZE_PASSTHROUGH',['../a00350.html#ab568e0ec9f976d91d7940c227e8d73ee',1,'calib_command.h']]], - ['nonce_5fparam2_5fidx_20',['NONCE_PARAM2_IDX',['../a00350.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0',1,'calib_command.h']]], - ['nonce_5frsp_5fsize_5flong_21',['NONCE_RSP_SIZE_LONG',['../a00350.html#a7ae9dcc07ca9d990e9db6d8949ac935a',1,'calib_command.h']]], - ['nonce_5frsp_5fsize_5fshort_22',['NONCE_RSP_SIZE_SHORT',['../a00350.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675',1,'calib_command.h']]], - ['nonce_5fzero_5fcalc_5fmask_23',['NONCE_ZERO_CALC_MASK',['../a00350.html#a99bca33105a872e8a20fe199cc17219b',1,'calib_command.h']]], - ['nonce_5fzero_5fcalc_5frandom_24',['NONCE_ZERO_CALC_RANDOM',['../a00350.html#a80b8b54f333be5a587f22e2d04812de6',1,'calib_command.h']]], - ['nonce_5fzero_5fcalc_5ftempkey_25',['NONCE_ZERO_CALC_TEMPKEY',['../a00350.html#a2a2b74db24609199702267614fc31990',1,'calib_command.h']]] + ['nonce_5fcount_5flong_0',['NONCE_COUNT_LONG',['../a00356.html#a9a7fddf245cba834f86e0b63f2b14dc1',1,'calib_command.h']]], + ['nonce_5fcount_5flong_5f64_1',['NONCE_COUNT_LONG_64',['../a00356.html#aaffdf30ca558bdd5f772578742835306',1,'calib_command.h']]], + ['nonce_5fcount_5fshort_2',['NONCE_COUNT_SHORT',['../a00356.html#acff2b897c994e1444f8e94e638c25c74',1,'calib_command.h']]], + ['nonce_5finput_5fidx_3',['NONCE_INPUT_IDX',['../a00356.html#a98721952094435f45bffa352dd6848ad',1,'calib_command.h']]], + ['nonce_5fmode_5fgen_5fsession_5fkey_4',['NONCE_MODE_GEN_SESSION_KEY',['../a00356.html#a447491c6888534a69d8f3a5b446396f8',1,'calib_command.h']]], + ['nonce_5fmode_5fidx_5',['NONCE_MODE_IDX',['../a00356.html#a97ca81334088c297c577f4b4aaced3cf',1,'calib_command.h']]], + ['nonce_5fmode_5finput_5flen_5f32_6',['NONCE_MODE_INPUT_LEN_32',['../a00356.html#af7ee0188ab539a350a6da19fe3f34a72',1,'calib_command.h']]], + ['nonce_5fmode_5finput_5flen_5f64_7',['NONCE_MODE_INPUT_LEN_64',['../a00356.html#a54f085984c6aaf826263a755fd3243d7',1,'calib_command.h']]], + ['nonce_5fmode_5finput_5flen_5fmask_8',['NONCE_MODE_INPUT_LEN_MASK',['../a00356.html#ad83ef570608a572d2dd99e6954e14d40',1,'calib_command.h']]], + ['nonce_5fmode_5finvalid_9',['NONCE_MODE_INVALID',['../a00356.html#a7c675071c7fd650a29594c5fcc9882a1',1,'calib_command.h']]], + ['nonce_5fmode_5fmask_10',['NONCE_MODE_MASK',['../a00356.html#a98be7c54d55328daa4390a816c9bb243',1,'calib_command.h']]], + ['nonce_5fmode_5fno_5fseed_5fupdate_11',['NONCE_MODE_NO_SEED_UPDATE',['../a00356.html#ae3f2d180d7f35d9a7876a28972f2f587',1,'calib_command.h']]], + ['nonce_5fmode_5fpassthrough_12',['NONCE_MODE_PASSTHROUGH',['../a00356.html#a6132b175668ba4d6efecca5986c007c0',1,'calib_command.h']]], + ['nonce_5fmode_5fseed_5fupdate_13',['NONCE_MODE_SEED_UPDATE',['../a00356.html#a798018a4ef489e8fb0a02b5edf7e9d55',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5faltkeybuf_14',['NONCE_MODE_TARGET_ALTKEYBUF',['../a00356.html#a8ad263b7b321311a57db7600f18a555f',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5fmask_15',['NONCE_MODE_TARGET_MASK',['../a00356.html#ab887d70e4a421cf2bcab6b77feba4134',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5fmsgdigbuf_16',['NONCE_MODE_TARGET_MSGDIGBUF',['../a00356.html#a071a95b4b2048e0d879e6e13984e38fd',1,'calib_command.h']]], + ['nonce_5fmode_5ftarget_5ftempkey_17',['NONCE_MODE_TARGET_TEMPKEY',['../a00356.html#ac51f4a863e071bce52c995ddae7e2144',1,'calib_command.h']]], + ['nonce_5fnumin_5fsize_18',['NONCE_NUMIN_SIZE',['../a00356.html#ad0c3da8203a3be6755e86cda96e00228',1,'calib_command.h']]], + ['nonce_5fnumin_5fsize_5fpassthrough_19',['NONCE_NUMIN_SIZE_PASSTHROUGH',['../a00356.html#ab568e0ec9f976d91d7940c227e8d73ee',1,'calib_command.h']]], + ['nonce_5fparam2_5fidx_20',['NONCE_PARAM2_IDX',['../a00356.html#aabd0af10b17e4e1c4bf7a4cfd3cca1f0',1,'calib_command.h']]], + ['nonce_5frsp_5fsize_5flong_21',['NONCE_RSP_SIZE_LONG',['../a00356.html#a7ae9dcc07ca9d990e9db6d8949ac935a',1,'calib_command.h']]], + ['nonce_5frsp_5fsize_5fshort_22',['NONCE_RSP_SIZE_SHORT',['../a00356.html#a2ecf97f43e4b2fbe3f329bb7c8e3b675',1,'calib_command.h']]], + ['nonce_5fzero_5fcalc_5fmask_23',['NONCE_ZERO_CALC_MASK',['../a00356.html#a99bca33105a872e8a20fe199cc17219b',1,'calib_command.h']]], + ['nonce_5fzero_5fcalc_5frandom_24',['NONCE_ZERO_CALC_RANDOM',['../a00356.html#a80b8b54f333be5a587f22e2d04812de6',1,'calib_command.h']]], + ['nonce_5fzero_5fcalc_5ftempkey_25',['NONCE_ZERO_CALC_TEMPKEY',['../a00356.html#a2a2b74db24609199702267614fc31990',1,'calib_command.h']]] ]; diff --git a/search/defines_c.js b/search/defines_c.js index 9c5b2f750..54af33661 100644 --- a/search/defines_c.js +++ b/search/defines_c.js @@ -1,4 +1,4 @@ var searchData= [ - ['outnonce_5fsize_0',['OUTNONCE_SIZE',['../a00350.html#ad742aca4fbd1b833423eeb7ce90a6743',1,'calib_command.h']]] + ['outnonce_5fsize_0',['OUTNONCE_SIZE',['../a00356.html#ad742aca4fbd1b833423eeb7ce90a6743',1,'calib_command.h']]] ]; diff --git a/search/defines_d.js b/search/defines_d.js index cac64ddcc..af044468f 100644 --- a/search/defines_d.js +++ b/search/defines_d.js @@ -1,15 +1,15 @@ var searchData= [ - ['pause_5fcount_0',['PAUSE_COUNT',['../a00350.html#aa914251d0e03f7d1850ee04296715f14',1,'calib_command.h']]], - ['pause_5fparam2_5fidx_1',['PAUSE_PARAM2_IDX',['../a00350.html#ad74ed86697c0977d4e0a2451068b7131',1,'calib_command.h']]], - ['pause_5frsp_5fsize_2',['PAUSE_RSP_SIZE',['../a00350.html#a5859f9a2eb99b4636c894705047e9344',1,'calib_command.h']]], - ['pause_5fselect_5fidx_3',['PAUSE_SELECT_IDX',['../a00350.html#a49f538b630cc416a8ad1f6d784e3a1e4',1,'calib_command.h']]], - ['privwrite_5fcount_4',['PRIVWRITE_COUNT',['../a00350.html#a17980d6743441fa2afd71523006ae058',1,'calib_command.h']]], - ['privwrite_5fkeyid_5fidx_5',['PRIVWRITE_KEYID_IDX',['../a00350.html#a4aa5b68bbd7847f53444608615653832',1,'calib_command.h']]], - ['privwrite_5fmac_5fidx_6',['PRIVWRITE_MAC_IDX',['../a00350.html#a20afccf35c609f05a3d7dc70687baa2e',1,'calib_command.h']]], - ['privwrite_5fmode_5fencrypt_7',['PRIVWRITE_MODE_ENCRYPT',['../a00350.html#afa24177621a8a2fbe041ef0ce73a414d',1,'calib_command.h']]], - ['privwrite_5frsp_5fsize_8',['PRIVWRITE_RSP_SIZE',['../a00350.html#aa66ad8429261c1ba13d064d660d6d464',1,'calib_command.h']]], - ['privwrite_5fvalue_5fidx_9',['PRIVWRITE_VALUE_IDX',['../a00350.html#ab65b17098ebc6027a9240ca84c07ab5c',1,'calib_command.h']]], - ['privwrite_5fzone_5fidx_10',['PRIVWRITE_ZONE_IDX',['../a00350.html#a376a70cf087e157cbb914d9ca2e5b989',1,'calib_command.h']]], - ['privwrite_5fzone_5fmask_11',['PRIVWRITE_ZONE_MASK',['../a00350.html#aba7cf525ec69429e947f294361e1cdab',1,'calib_command.h']]] + ['pause_5fcount_0',['PAUSE_COUNT',['../a00356.html#aa914251d0e03f7d1850ee04296715f14',1,'calib_command.h']]], + ['pause_5fparam2_5fidx_1',['PAUSE_PARAM2_IDX',['../a00356.html#ad74ed86697c0977d4e0a2451068b7131',1,'calib_command.h']]], + ['pause_5frsp_5fsize_2',['PAUSE_RSP_SIZE',['../a00356.html#a5859f9a2eb99b4636c894705047e9344',1,'calib_command.h']]], + ['pause_5fselect_5fidx_3',['PAUSE_SELECT_IDX',['../a00356.html#a49f538b630cc416a8ad1f6d784e3a1e4',1,'calib_command.h']]], + ['privwrite_5fcount_4',['PRIVWRITE_COUNT',['../a00356.html#a17980d6743441fa2afd71523006ae058',1,'calib_command.h']]], + ['privwrite_5fkeyid_5fidx_5',['PRIVWRITE_KEYID_IDX',['../a00356.html#a4aa5b68bbd7847f53444608615653832',1,'calib_command.h']]], + ['privwrite_5fmac_5fidx_6',['PRIVWRITE_MAC_IDX',['../a00356.html#a20afccf35c609f05a3d7dc70687baa2e',1,'calib_command.h']]], + ['privwrite_5fmode_5fencrypt_7',['PRIVWRITE_MODE_ENCRYPT',['../a00356.html#afa24177621a8a2fbe041ef0ce73a414d',1,'calib_command.h']]], + ['privwrite_5frsp_5fsize_8',['PRIVWRITE_RSP_SIZE',['../a00356.html#aa66ad8429261c1ba13d064d660d6d464',1,'calib_command.h']]], + ['privwrite_5fvalue_5fidx_9',['PRIVWRITE_VALUE_IDX',['../a00356.html#ab65b17098ebc6027a9240ca84c07ab5c',1,'calib_command.h']]], + ['privwrite_5fzone_5fidx_10',['PRIVWRITE_ZONE_IDX',['../a00356.html#a376a70cf087e157cbb914d9ca2e5b989',1,'calib_command.h']]], + ['privwrite_5fzone_5fmask_11',['PRIVWRITE_ZONE_MASK',['../a00356.html#aba7cf525ec69429e947f294361e1cdab',1,'calib_command.h']]] ]; diff --git a/search/defines_e.js b/search/defines_e.js index d887bb18a..ec48e89f6 100644 --- a/search/defines_e.js +++ b/search/defines_e.js @@ -1,18 +1,18 @@ var searchData= [ - ['random_5fcount_0',['RANDOM_COUNT',['../a00350.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0',1,'calib_command.h']]], - ['random_5fmode_5fidx_1',['RANDOM_MODE_IDX',['../a00350.html#ac846e3f7c924497d70254125dae38dce',1,'calib_command.h']]], - ['random_5fno_5fseed_5fupdate_2',['RANDOM_NO_SEED_UPDATE',['../a00350.html#a444d3fe4302ca95080d919dc89b1bc52',1,'calib_command.h']]], - ['random_5fnum_5fsize_3',['RANDOM_NUM_SIZE',['../a00350.html#a2197c0ad6c0fbf1c801228de9bf0d2ab',1,'calib_command.h']]], - ['random_5fparam2_5fidx_4',['RANDOM_PARAM2_IDX',['../a00350.html#a3f54bd6d53a687ae3660196497e8faa1',1,'calib_command.h']]], - ['random_5frsp_5fsize_5',['RANDOM_RSP_SIZE',['../a00350.html#aeb7623b070997b65f0bb108abf8e5f44',1,'calib_command.h']]], - ['random_5fseed_5fupdate_6',['RANDOM_SEED_UPDATE',['../a00350.html#af12673d4006ff926c863b2d0f9038561',1,'calib_command.h']]], - ['read_5f32_5frsp_5fsize_7',['READ_32_RSP_SIZE',['../a00350.html#ad79706b7b1e6c0e0d29afe692d8d5c06',1,'calib_command.h']]], - ['read_5f4_5frsp_5fsize_8',['READ_4_RSP_SIZE',['../a00350.html#a041cfaec382d0a67dcfe36d43332da48',1,'calib_command.h']]], - ['read_5faddr_5fidx_9',['READ_ADDR_IDX',['../a00350.html#af9f464ac4065aff75f5967933725d665',1,'calib_command.h']]], - ['read_5fcount_10',['READ_COUNT',['../a00350.html#ad222baf9301d2d35a5c928a0d91c4335',1,'calib_command.h']]], - ['read_5fzone_5fidx_11',['READ_ZONE_IDX',['../a00350.html#ae273cfc99b8538b3c81ba8240a6ff425',1,'calib_command.h']]], - ['read_5fzone_5fmask_12',['READ_ZONE_MASK',['../a00350.html#acf9c81ae1249f3c174ec75cf65517176',1,'calib_command.h']]], - ['rsa2048_5fkey_5fsize_13',['RSA2048_KEY_SIZE',['../a00350.html#aeb3783d1cdf4f9c1217d030bc0386fad',1,'calib_command.h']]], - ['rx_5ftx_5fdelay_14',['RX_TX_DELAY',['../a00587.html#a60ba93807a2c0ea2ce1432245f3f7da0',1,'hal_swi_gpio.h']]] + ['random_5fcount_0',['RANDOM_COUNT',['../a00356.html#ae91d272f84bc3ad357ff6ed2e9c9a6b0',1,'calib_command.h']]], + ['random_5fmode_5fidx_1',['RANDOM_MODE_IDX',['../a00356.html#ac846e3f7c924497d70254125dae38dce',1,'calib_command.h']]], + ['random_5fno_5fseed_5fupdate_2',['RANDOM_NO_SEED_UPDATE',['../a00356.html#a444d3fe4302ca95080d919dc89b1bc52',1,'calib_command.h']]], + ['random_5fnum_5fsize_3',['RANDOM_NUM_SIZE',['../a00356.html#a2197c0ad6c0fbf1c801228de9bf0d2ab',1,'calib_command.h']]], + ['random_5fparam2_5fidx_4',['RANDOM_PARAM2_IDX',['../a00356.html#a3f54bd6d53a687ae3660196497e8faa1',1,'calib_command.h']]], + ['random_5frsp_5fsize_5',['RANDOM_RSP_SIZE',['../a00356.html#aeb7623b070997b65f0bb108abf8e5f44',1,'calib_command.h']]], + ['random_5fseed_5fupdate_6',['RANDOM_SEED_UPDATE',['../a00356.html#af12673d4006ff926c863b2d0f9038561',1,'calib_command.h']]], + ['read_5f32_5frsp_5fsize_7',['READ_32_RSP_SIZE',['../a00356.html#ad79706b7b1e6c0e0d29afe692d8d5c06',1,'calib_command.h']]], + ['read_5f4_5frsp_5fsize_8',['READ_4_RSP_SIZE',['../a00356.html#a041cfaec382d0a67dcfe36d43332da48',1,'calib_command.h']]], + ['read_5faddr_5fidx_9',['READ_ADDR_IDX',['../a00356.html#af9f464ac4065aff75f5967933725d665',1,'calib_command.h']]], + ['read_5fcount_10',['READ_COUNT',['../a00356.html#ad222baf9301d2d35a5c928a0d91c4335',1,'calib_command.h']]], + ['read_5fzone_5fidx_11',['READ_ZONE_IDX',['../a00356.html#ae273cfc99b8538b3c81ba8240a6ff425',1,'calib_command.h']]], + ['read_5fzone_5fmask_12',['READ_ZONE_MASK',['../a00356.html#acf9c81ae1249f3c174ec75cf65517176',1,'calib_command.h']]], + ['rsa2048_5fkey_5fsize_13',['RSA2048_KEY_SIZE',['../a00356.html#aeb3783d1cdf4f9c1217d030bc0386fad',1,'calib_command.h']]], + ['rx_5ftx_5fdelay_14',['RX_TX_DELAY',['../a00602.html#a60ba93807a2c0ea2ce1432245f3f7da0',1,'hal_swi_gpio.h']]] ]; diff --git a/search/defines_f.js b/search/defines_f.js index 7d7886843..eb96354ac 100644 --- a/search/defines_f.js +++ b/search/defines_f.js @@ -1,65 +1,65 @@ var searchData= [ - ['secureboot_5fcount_5fdig_0',['SECUREBOOT_COUNT_DIG',['../a00350.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e',1,'calib_command.h']]], - ['secureboot_5fcount_5fdig_5fsig_1',['SECUREBOOT_COUNT_DIG_SIG',['../a00350.html#abd28a29107703b43a734301acf491f5c',1,'calib_command.h']]], - ['secureboot_5fdigest_5fsize_2',['SECUREBOOT_DIGEST_SIZE',['../a00350.html#a9257968de99742ec468463a72588820f',1,'calib_command.h']]], - ['secureboot_5fmac_5fsize_3',['SECUREBOOT_MAC_SIZE',['../a00350.html#aed2edebc2be522d7bb38f85d273406f9',1,'calib_command.h']]], - ['secureboot_5fmode_5fenc_5fmac_5fflag_4',['SECUREBOOT_MODE_ENC_MAC_FLAG',['../a00350.html#abf2bad62bab02224f51d67f6725575a4',1,'calib_command.h']]], - ['secureboot_5fmode_5ffull_5',['SECUREBOOT_MODE_FULL',['../a00350.html#a122f4b7b9f1011c04385a7caccc2d536',1,'calib_command.h']]], - ['secureboot_5fmode_5ffull_5fcopy_6',['SECUREBOOT_MODE_FULL_COPY',['../a00350.html#a3d287922c127b599204ea3bc64d4a825',1,'calib_command.h']]], - ['secureboot_5fmode_5ffull_5fstore_7',['SECUREBOOT_MODE_FULL_STORE',['../a00350.html#a2aac76b15694b82fda038e127d152297',1,'calib_command.h']]], - ['secureboot_5fmode_5fidx_8',['SECUREBOOT_MODE_IDX',['../a00350.html#a7ff1918de6f8238ba4f67d9368e3587d',1,'calib_command.h']]], - ['secureboot_5fmode_5fmask_9',['SECUREBOOT_MODE_MASK',['../a00350.html#aac36b471fe92c252dd02a9d1cc2c65e2',1,'calib_command.h']]], - ['secureboot_5fmode_5fprohibit_5fflag_10',['SECUREBOOT_MODE_PROHIBIT_FLAG',['../a00350.html#a2d04ced68d56c0db40b93b767de02089',1,'calib_command.h']]], - ['secureboot_5frsp_5fsize_5fmac_11',['SECUREBOOT_RSP_SIZE_MAC',['../a00350.html#a3db7049de685080f046f0b4221de461b',1,'calib_command.h']]], - ['secureboot_5frsp_5fsize_5fno_5fmac_12',['SECUREBOOT_RSP_SIZE_NO_MAC',['../a00350.html#ab4657866a69a00b9b3bfa4df51521fa6',1,'calib_command.h']]], - ['secureboot_5fsignature_5fsize_13',['SECUREBOOT_SIGNATURE_SIZE',['../a00350.html#a51bd4fe709f11b3b50f47c2fb18976ca',1,'calib_command.h']]], - ['securebootconfig_5fmode_5fdisabled_14',['SECUREBOOTCONFIG_MODE_DISABLED',['../a00350.html#a76bf5d4ce89c95c658328fe8e66669e7',1,'calib_command.h']]], - ['securebootconfig_5fmode_5ffull_5fboth_15',['SECUREBOOTCONFIG_MODE_FULL_BOTH',['../a00350.html#a2b86bf6731827368bf66eec960c35a32',1,'calib_command.h']]], - ['securebootconfig_5fmode_5ffull_5fdig_16',['SECUREBOOTCONFIG_MODE_FULL_DIG',['../a00350.html#a9b7c3aca6168b52321e1951893efa050',1,'calib_command.h']]], - ['securebootconfig_5fmode_5ffull_5fsig_17',['SECUREBOOTCONFIG_MODE_FULL_SIG',['../a00350.html#a43bb6027c548274980a3ba42bdef51c9',1,'calib_command.h']]], - ['securebootconfig_5fmode_5fmask_18',['SECUREBOOTCONFIG_MODE_MASK',['../a00350.html#a0c9c951895abf02992e41c617702c2ea',1,'calib_command.h']]], - ['securebootconfig_5foffset_19',['SECUREBOOTCONFIG_OFFSET',['../a00350.html#ad10e2a3c801be9002d53af14357dbe9f',1,'calib_command.h']]], - ['selftest_5fcount_20',['SELFTEST_COUNT',['../a00350.html#a2aba96712a9932d61146c43289e9d808',1,'calib_command.h']]], - ['selftest_5fmode_5faes_21',['SELFTEST_MODE_AES',['../a00350.html#a91ebd87544ccdab3670cfbec8d23bd4a',1,'calib_command.h']]], - ['selftest_5fmode_5fall_22',['SELFTEST_MODE_ALL',['../a00350.html#a1ef61cb184d3ff5ef2f8bf9db6521888',1,'calib_command.h']]], - ['selftest_5fmode_5fecdh_23',['SELFTEST_MODE_ECDH',['../a00350.html#a01d7437a14fd35ccc926168fb4ca2ca7',1,'calib_command.h']]], - ['selftest_5fmode_5fecdsa_5fsign_5fverify_24',['SELFTEST_MODE_ECDSA_SIGN_VERIFY',['../a00350.html#afbd09beedecedcf316a6c02e40d1e712',1,'calib_command.h']]], - ['selftest_5fmode_5fidx_25',['SELFTEST_MODE_IDX',['../a00350.html#aa16bfad9cb883d258befaacadb3385ef',1,'calib_command.h']]], - ['selftest_5fmode_5frng_26',['SELFTEST_MODE_RNG',['../a00350.html#acd9a7a2257f664a4f9f674d37eb95bef',1,'calib_command.h']]], - ['selftest_5fmode_5fsha_27',['SELFTEST_MODE_SHA',['../a00350.html#afab9546447cf1e0020c32d298a1d897f',1,'calib_command.h']]], - ['selftest_5frsp_5fsize_28',['SELFTEST_RSP_SIZE',['../a00350.html#a7599639f80f3ac2a0d22f2857138cb87',1,'calib_command.h']]], - ['sha_5fcount_5flong_29',['SHA_COUNT_LONG',['../a00350.html#ada37181a648dd51b374eec1cbb4bbaa3',1,'calib_command.h']]], - ['sha_5fmode_5f608_5fhmac_5fend_30',['SHA_MODE_608_HMAC_END',['../a00350.html#a625604e07a0618bd7d514faee5e42fba',1,'calib_command.h']]], - ['sha_5fmode_5fecc204_5fhmac_5fend_31',['SHA_MODE_ECC204_HMAC_END',['../a00350.html#a90fa979b13088478c8bcf8fd7a6bb541',1,'calib_command.h']]], - ['sha_5fmode_5fecc204_5fhmac_5fstart_32',['SHA_MODE_ECC204_HMAC_START',['../a00350.html#a41b6da4df887f3d2d38c26b49168d779',1,'calib_command.h']]], - ['sha_5fmode_5fhmac_5fend_33',['SHA_MODE_HMAC_END',['../a00350.html#aeb307ed9134e0fa2f0fcbdaf7b01515d',1,'calib_command.h']]], - ['sha_5fmode_5fhmac_5fstart_34',['SHA_MODE_HMAC_START',['../a00350.html#abbfeec0d0247336b8c6e993d4db17d11',1,'calib_command.h']]], - ['sha_5fmode_5fhmac_5fupdate_35',['SHA_MODE_HMAC_UPDATE',['../a00350.html#a2071156124a692a5f2a5c764c923f731',1,'calib_command.h']]], - ['sha_5fmode_5fmask_36',['SHA_MODE_MASK',['../a00350.html#a612cbf6171e9a0a176e0bd2844f49528',1,'calib_command.h']]], - ['sha_5fmode_5fread_5fcontext_37',['SHA_MODE_READ_CONTEXT',['../a00350.html#ac7e5a54695b8bd9e5087ebb94df70b39',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fend_38',['SHA_MODE_SHA256_END',['../a00350.html#a0e98e55c91c7559f57fdef4c9969c188',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fpublic_39',['SHA_MODE_SHA256_PUBLIC',['../a00350.html#a0f2fc749d3d196477b22cbceee856dfb',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fstart_40',['SHA_MODE_SHA256_START',['../a00350.html#ad42195362cd7dca0acabc8739c9a6fc4',1,'calib_command.h']]], - ['sha_5fmode_5fsha256_5fupdate_41',['SHA_MODE_SHA256_UPDATE',['../a00350.html#a05ece414a0596ec9bb75c0ca8ca731dc',1,'calib_command.h']]], - ['sha_5fmode_5ftarget_5fmask_42',['SHA_MODE_TARGET_MASK',['../a00350.html#a70f88a123587c96ad7affc1e5dae9002',1,'calib_command.h']]], - ['sha_5fmode_5ftarget_5fmsgdigbuf_43',['SHA_MODE_TARGET_MSGDIGBUF',['../a00506.html#ae559b402c678cc51f8252b927b8781e5',1,'cryptoauthlib.h']]], - ['sha_5fmode_5ftarget_5fout_5fonly_44',['SHA_MODE_TARGET_OUT_ONLY',['../a00506.html#ae0df4b9151bb3d807bc1c532036c6d88',1,'cryptoauthlib.h']]], - ['sha_5fmode_5ftarget_5ftempkey_45',['SHA_MODE_TARGET_TEMPKEY',['../a00506.html#a850ec56b408fccccaea5826d452c3a64',1,'cryptoauthlib.h']]], - ['sha_5fmode_5fwrite_5fcontext_46',['SHA_MODE_WRITE_CONTEXT',['../a00350.html#a7b7c499931480a88f6a106644c3d2185',1,'calib_command.h']]], - ['sha_5frsp_5fsize_47',['SHA_RSP_SIZE',['../a00350.html#a8a5a586bdb0194be827417658836bf9c',1,'calib_command.h']]], - ['sha_5frsp_5fsize_5flong_48',['SHA_RSP_SIZE_LONG',['../a00350.html#ae5ad3c81d0b62f4b86a4a0dc84a79134',1,'calib_command.h']]], - ['sha_5frsp_5fsize_5fshort_49',['SHA_RSP_SIZE_SHORT',['../a00350.html#a74490b179b34f9925e9fe00675e53713',1,'calib_command.h']]], - ['sign_5fcount_50',['SIGN_COUNT',['../a00350.html#aabff3f5b7f5391c27a0329ff0c997264',1,'calib_command.h']]], - ['sign_5fkeyid_5fidx_51',['SIGN_KEYID_IDX',['../a00350.html#a02f20fbee84fe680d94b94a2b2828040',1,'calib_command.h']]], - ['sign_5fmode_5fexternal_52',['SIGN_MODE_EXTERNAL',['../a00350.html#a9b6844bb107f02832a6d827b8c5b0fda',1,'calib_command.h']]], - ['sign_5fmode_5fidx_53',['SIGN_MODE_IDX',['../a00350.html#ae7cfb9eb789137f5ea9195a7a4f6b11e',1,'calib_command.h']]], - ['sign_5fmode_5finclude_5fsn_54',['SIGN_MODE_INCLUDE_SN',['../a00350.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116',1,'calib_command.h']]], - ['sign_5fmode_5finternal_55',['SIGN_MODE_INTERNAL',['../a00350.html#aced5221c0f15440eb52fa9f460956443',1,'calib_command.h']]], - ['sign_5fmode_5finvalidate_56',['SIGN_MODE_INVALIDATE',['../a00350.html#a1acc7b9af9cf3c6c556bd910ce4f239b',1,'calib_command.h']]], - ['sign_5fmode_5fmask_57',['SIGN_MODE_MASK',['../a00350.html#a88cc1851cedb6f2a73df4618dbc0b165',1,'calib_command.h']]], - ['sign_5fmode_5fsource_5fmask_58',['SIGN_MODE_SOURCE_MASK',['../a00350.html#a35246a9bad0d77d26b59b542928c9e34',1,'calib_command.h']]], - ['sign_5fmode_5fsource_5fmsgdigbuf_59',['SIGN_MODE_SOURCE_MSGDIGBUF',['../a00350.html#a1a38e9575eb4f714377889ce5270e60b',1,'calib_command.h']]], - ['sign_5fmode_5fsource_5ftempkey_60',['SIGN_MODE_SOURCE_TEMPKEY',['../a00350.html#a73670681360e1272aa13d1359e7bb275',1,'calib_command.h']]], - ['sign_5frsp_5fsize_61',['SIGN_RSP_SIZE',['../a00350.html#a66dba5e06f73c5df37c9d18409185f4d',1,'calib_command.h']]] + ['secureboot_5fcount_5fdig_0',['SECUREBOOT_COUNT_DIG',['../a00356.html#a4d6eb2ea4f3b5be450c0579f75fc7f6e',1,'calib_command.h']]], + ['secureboot_5fcount_5fdig_5fsig_1',['SECUREBOOT_COUNT_DIG_SIG',['../a00356.html#abd28a29107703b43a734301acf491f5c',1,'calib_command.h']]], + ['secureboot_5fdigest_5fsize_2',['SECUREBOOT_DIGEST_SIZE',['../a00356.html#a9257968de99742ec468463a72588820f',1,'calib_command.h']]], + ['secureboot_5fmac_5fsize_3',['SECUREBOOT_MAC_SIZE',['../a00356.html#aed2edebc2be522d7bb38f85d273406f9',1,'calib_command.h']]], + ['secureboot_5fmode_5fenc_5fmac_5fflag_4',['SECUREBOOT_MODE_ENC_MAC_FLAG',['../a00356.html#abf2bad62bab02224f51d67f6725575a4',1,'calib_command.h']]], + ['secureboot_5fmode_5ffull_5',['SECUREBOOT_MODE_FULL',['../a00356.html#a122f4b7b9f1011c04385a7caccc2d536',1,'calib_command.h']]], + ['secureboot_5fmode_5ffull_5fcopy_6',['SECUREBOOT_MODE_FULL_COPY',['../a00356.html#a3d287922c127b599204ea3bc64d4a825',1,'calib_command.h']]], + ['secureboot_5fmode_5ffull_5fstore_7',['SECUREBOOT_MODE_FULL_STORE',['../a00356.html#a2aac76b15694b82fda038e127d152297',1,'calib_command.h']]], + ['secureboot_5fmode_5fidx_8',['SECUREBOOT_MODE_IDX',['../a00356.html#a7ff1918de6f8238ba4f67d9368e3587d',1,'calib_command.h']]], + ['secureboot_5fmode_5fmask_9',['SECUREBOOT_MODE_MASK',['../a00356.html#aac36b471fe92c252dd02a9d1cc2c65e2',1,'calib_command.h']]], + ['secureboot_5fmode_5fprohibit_5fflag_10',['SECUREBOOT_MODE_PROHIBIT_FLAG',['../a00356.html#a2d04ced68d56c0db40b93b767de02089',1,'calib_command.h']]], + ['secureboot_5frsp_5fsize_5fmac_11',['SECUREBOOT_RSP_SIZE_MAC',['../a00356.html#a3db7049de685080f046f0b4221de461b',1,'calib_command.h']]], + ['secureboot_5frsp_5fsize_5fno_5fmac_12',['SECUREBOOT_RSP_SIZE_NO_MAC',['../a00356.html#ab4657866a69a00b9b3bfa4df51521fa6',1,'calib_command.h']]], + ['secureboot_5fsignature_5fsize_13',['SECUREBOOT_SIGNATURE_SIZE',['../a00356.html#a51bd4fe709f11b3b50f47c2fb18976ca',1,'calib_command.h']]], + ['securebootconfig_5fmode_5fdisabled_14',['SECUREBOOTCONFIG_MODE_DISABLED',['../a00356.html#a76bf5d4ce89c95c658328fe8e66669e7',1,'calib_command.h']]], + ['securebootconfig_5fmode_5ffull_5fboth_15',['SECUREBOOTCONFIG_MODE_FULL_BOTH',['../a00356.html#a2b86bf6731827368bf66eec960c35a32',1,'calib_command.h']]], + ['securebootconfig_5fmode_5ffull_5fdig_16',['SECUREBOOTCONFIG_MODE_FULL_DIG',['../a00356.html#a9b7c3aca6168b52321e1951893efa050',1,'calib_command.h']]], + ['securebootconfig_5fmode_5ffull_5fsig_17',['SECUREBOOTCONFIG_MODE_FULL_SIG',['../a00356.html#a43bb6027c548274980a3ba42bdef51c9',1,'calib_command.h']]], + ['securebootconfig_5fmode_5fmask_18',['SECUREBOOTCONFIG_MODE_MASK',['../a00356.html#a0c9c951895abf02992e41c617702c2ea',1,'calib_command.h']]], + ['securebootconfig_5foffset_19',['SECUREBOOTCONFIG_OFFSET',['../a00356.html#ad10e2a3c801be9002d53af14357dbe9f',1,'calib_command.h']]], + ['selftest_5fcount_20',['SELFTEST_COUNT',['../a00356.html#a2aba96712a9932d61146c43289e9d808',1,'calib_command.h']]], + ['selftest_5fmode_5faes_21',['SELFTEST_MODE_AES',['../a00356.html#a91ebd87544ccdab3670cfbec8d23bd4a',1,'calib_command.h']]], + ['selftest_5fmode_5fall_22',['SELFTEST_MODE_ALL',['../a00356.html#a1ef61cb184d3ff5ef2f8bf9db6521888',1,'calib_command.h']]], + ['selftest_5fmode_5fecdh_23',['SELFTEST_MODE_ECDH',['../a00356.html#a01d7437a14fd35ccc926168fb4ca2ca7',1,'calib_command.h']]], + ['selftest_5fmode_5fecdsa_5fsign_5fverify_24',['SELFTEST_MODE_ECDSA_SIGN_VERIFY',['../a00356.html#afbd09beedecedcf316a6c02e40d1e712',1,'calib_command.h']]], + ['selftest_5fmode_5fidx_25',['SELFTEST_MODE_IDX',['../a00356.html#aa16bfad9cb883d258befaacadb3385ef',1,'calib_command.h']]], + ['selftest_5fmode_5frng_26',['SELFTEST_MODE_RNG',['../a00356.html#acd9a7a2257f664a4f9f674d37eb95bef',1,'calib_command.h']]], + ['selftest_5fmode_5fsha_27',['SELFTEST_MODE_SHA',['../a00356.html#afab9546447cf1e0020c32d298a1d897f',1,'calib_command.h']]], + ['selftest_5frsp_5fsize_28',['SELFTEST_RSP_SIZE',['../a00356.html#a7599639f80f3ac2a0d22f2857138cb87',1,'calib_command.h']]], + ['sha_5fcount_5flong_29',['SHA_COUNT_LONG',['../a00356.html#ada37181a648dd51b374eec1cbb4bbaa3',1,'calib_command.h']]], + ['sha_5fmode_5f608_5fhmac_5fend_30',['SHA_MODE_608_HMAC_END',['../a00356.html#a625604e07a0618bd7d514faee5e42fba',1,'calib_command.h']]], + ['sha_5fmode_5fecc204_5fhmac_5fend_31',['SHA_MODE_ECC204_HMAC_END',['../a00356.html#a90fa979b13088478c8bcf8fd7a6bb541',1,'calib_command.h']]], + ['sha_5fmode_5fecc204_5fhmac_5fstart_32',['SHA_MODE_ECC204_HMAC_START',['../a00356.html#a41b6da4df887f3d2d38c26b49168d779',1,'calib_command.h']]], + ['sha_5fmode_5fhmac_5fend_33',['SHA_MODE_HMAC_END',['../a00356.html#aeb307ed9134e0fa2f0fcbdaf7b01515d',1,'calib_command.h']]], + ['sha_5fmode_5fhmac_5fstart_34',['SHA_MODE_HMAC_START',['../a00356.html#abbfeec0d0247336b8c6e993d4db17d11',1,'calib_command.h']]], + ['sha_5fmode_5fhmac_5fupdate_35',['SHA_MODE_HMAC_UPDATE',['../a00356.html#a2071156124a692a5f2a5c764c923f731',1,'calib_command.h']]], + ['sha_5fmode_5fmask_36',['SHA_MODE_MASK',['../a00356.html#a612cbf6171e9a0a176e0bd2844f49528',1,'calib_command.h']]], + ['sha_5fmode_5fread_5fcontext_37',['SHA_MODE_READ_CONTEXT',['../a00356.html#ac7e5a54695b8bd9e5087ebb94df70b39',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fend_38',['SHA_MODE_SHA256_END',['../a00356.html#a0e98e55c91c7559f57fdef4c9969c188',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fpublic_39',['SHA_MODE_SHA256_PUBLIC',['../a00356.html#a0f2fc749d3d196477b22cbceee856dfb',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fstart_40',['SHA_MODE_SHA256_START',['../a00356.html#ad42195362cd7dca0acabc8739c9a6fc4',1,'calib_command.h']]], + ['sha_5fmode_5fsha256_5fupdate_41',['SHA_MODE_SHA256_UPDATE',['../a00356.html#a05ece414a0596ec9bb75c0ca8ca731dc',1,'calib_command.h']]], + ['sha_5fmode_5ftarget_5fmask_42',['SHA_MODE_TARGET_MASK',['../a00356.html#a70f88a123587c96ad7affc1e5dae9002',1,'calib_command.h']]], + ['sha_5fmode_5ftarget_5fmsgdigbuf_43',['SHA_MODE_TARGET_MSGDIGBUF',['../a00521.html#ae559b402c678cc51f8252b927b8781e5',1,'cryptoauthlib.h']]], + ['sha_5fmode_5ftarget_5fout_5fonly_44',['SHA_MODE_TARGET_OUT_ONLY',['../a00521.html#ae0df4b9151bb3d807bc1c532036c6d88',1,'cryptoauthlib.h']]], + ['sha_5fmode_5ftarget_5ftempkey_45',['SHA_MODE_TARGET_TEMPKEY',['../a00521.html#a850ec56b408fccccaea5826d452c3a64',1,'cryptoauthlib.h']]], + ['sha_5fmode_5fwrite_5fcontext_46',['SHA_MODE_WRITE_CONTEXT',['../a00356.html#a7b7c499931480a88f6a106644c3d2185',1,'calib_command.h']]], + ['sha_5frsp_5fsize_47',['SHA_RSP_SIZE',['../a00356.html#a8a5a586bdb0194be827417658836bf9c',1,'calib_command.h']]], + ['sha_5frsp_5fsize_5flong_48',['SHA_RSP_SIZE_LONG',['../a00356.html#ae5ad3c81d0b62f4b86a4a0dc84a79134',1,'calib_command.h']]], + ['sha_5frsp_5fsize_5fshort_49',['SHA_RSP_SIZE_SHORT',['../a00356.html#a74490b179b34f9925e9fe00675e53713',1,'calib_command.h']]], + ['sign_5fcount_50',['SIGN_COUNT',['../a00356.html#aabff3f5b7f5391c27a0329ff0c997264',1,'calib_command.h']]], + ['sign_5fkeyid_5fidx_51',['SIGN_KEYID_IDX',['../a00356.html#a02f20fbee84fe680d94b94a2b2828040',1,'calib_command.h']]], + ['sign_5fmode_5fexternal_52',['SIGN_MODE_EXTERNAL',['../a00356.html#a9b6844bb107f02832a6d827b8c5b0fda',1,'calib_command.h']]], + ['sign_5fmode_5fidx_53',['SIGN_MODE_IDX',['../a00356.html#ae7cfb9eb789137f5ea9195a7a4f6b11e',1,'calib_command.h']]], + ['sign_5fmode_5finclude_5fsn_54',['SIGN_MODE_INCLUDE_SN',['../a00356.html#a71b7f8f45dbbe8c19c0e5c6c41fcf116',1,'calib_command.h']]], + ['sign_5fmode_5finternal_55',['SIGN_MODE_INTERNAL',['../a00356.html#aced5221c0f15440eb52fa9f460956443',1,'calib_command.h']]], + ['sign_5fmode_5finvalidate_56',['SIGN_MODE_INVALIDATE',['../a00356.html#a1acc7b9af9cf3c6c556bd910ce4f239b',1,'calib_command.h']]], + ['sign_5fmode_5fmask_57',['SIGN_MODE_MASK',['../a00356.html#a88cc1851cedb6f2a73df4618dbc0b165',1,'calib_command.h']]], + ['sign_5fmode_5fsource_5fmask_58',['SIGN_MODE_SOURCE_MASK',['../a00356.html#a35246a9bad0d77d26b59b542928c9e34',1,'calib_command.h']]], + ['sign_5fmode_5fsource_5fmsgdigbuf_59',['SIGN_MODE_SOURCE_MSGDIGBUF',['../a00356.html#a1a38e9575eb4f714377889ce5270e60b',1,'calib_command.h']]], + ['sign_5fmode_5fsource_5ftempkey_60',['SIGN_MODE_SOURCE_TEMPKEY',['../a00356.html#a73670681360e1272aa13d1359e7bb275',1,'calib_command.h']]], + ['sign_5frsp_5fsize_61',['SIGN_RSP_SIZE',['../a00356.html#a66dba5e06f73c5df37c9d18409185f4d',1,'calib_command.h']]] ]; diff --git a/search/enums_0.js b/search/enums_0.js index 38953e2d3..cf71c8de1 100644 --- a/search/enums_0.js +++ b/search/enums_0.js @@ -1,10 +1,10 @@ var searchData= [ - ['atcacert_5fcert_5fsn_5fsrc_5fe_0',['atcacert_cert_sn_src_e',['../a01443.html#ga813047a656af7fe578d28fd54c840e8e',1,'atcacert_def.h']]], - ['atcacert_5fcert_5ftype_5fe_1',['atcacert_cert_type_e',['../a01443.html#ga5430f01929cd7269e04db08d1f28642f',1,'atcacert_def.h']]], - ['atcacert_5fdevice_5fzone_5fe_2',['atcacert_device_zone_e',['../a01443.html#ga1c0876228cb459f64347a63f3bae4c73',1,'atcacert_def.h']]], - ['atcacert_5fstd_5fcert_5felement_5fe_3',['atcacert_std_cert_element_e',['../a01443.html#ga77184d0c71198b489ea9b57d07da824e',1,'atcacert_def.h']]], - ['atcacert_5ftransform_5fe_4',['atcacert_transform_e',['../a01443.html#ga121ffde3250c4ca6947c680868aa6017',1,'atcacert_def.h']]], - ['atcadevicestate_5',['ATCADeviceState',['../a01441.html#ga765308123cf522f5ec8b528bf4ea1243',1,'atca_device.h']]], - ['atcaifacetype_6',['ATCAIfaceType',['../a01442.html#gac7f674d4a0afb12d2f3c9c5e98cb1089',1,'atca_iface.h']]] + ['atcacert_5fcert_5fsn_5fsrc_5fe_0',['atcacert_cert_sn_src_e',['../a01470.html#ga813047a656af7fe578d28fd54c840e8e',1,'atcacert_def.h']]], + ['atcacert_5fcert_5ftype_5fe_1',['atcacert_cert_type_e',['../a01470.html#ga5430f01929cd7269e04db08d1f28642f',1,'atcacert_def.h']]], + ['atcacert_5fdevice_5fzone_5fe_2',['atcacert_device_zone_e',['../a01470.html#ga1c0876228cb459f64347a63f3bae4c73',1,'atcacert_def.h']]], + ['atcacert_5fstd_5fcert_5felement_5fe_3',['atcacert_std_cert_element_e',['../a01470.html#ga77184d0c71198b489ea9b57d07da824e',1,'atcacert_def.h']]], + ['atcacert_5ftransform_5fe_4',['atcacert_transform_e',['../a01470.html#ga121ffde3250c4ca6947c680868aa6017',1,'atcacert_def.h']]], + ['atcadevicestate_5',['ATCADeviceState',['../a01468.html#ga765308123cf522f5ec8b528bf4ea1243',1,'atca_device.h']]], + ['atcaifacetype_6',['ATCAIfaceType',['../a01469.html#gac7f674d4a0afb12d2f3c9c5e98cb1089',1,'atca_iface.h']]] ]; diff --git a/search/enumvalues_0.js b/search/enumvalues_0.js index 6c0c5cd35..6c84d6eb9 100644 --- a/search/enumvalues_0.js +++ b/search/enumvalues_0.js @@ -1,13 +1,13 @@ var searchData= [ - ['atca_5fcustom_5fiface_0',['ATCA_CUSTOM_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d',1,'atca_iface.h']]], - ['atca_5fhid_5fiface_1',['ATCA_HID_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1',1,'atca_iface.h']]], - ['atca_5fi2c_5fgpio_5fiface_2',['ATCA_I2C_GPIO_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e',1,'atca_iface.h']]], - ['atca_5fi2c_5fiface_3',['ATCA_I2C_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb',1,'atca_iface.h']]], - ['atca_5fkit_5fiface_4',['ATCA_KIT_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9',1,'atca_iface.h']]], - ['atca_5fspi_5fgpio_5fiface_5',['ATCA_SPI_GPIO_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb',1,'atca_iface.h']]], - ['atca_5fspi_5fiface_6',['ATCA_SPI_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7',1,'atca_iface.h']]], - ['atca_5fswi_5fgpio_5fiface_7',['ATCA_SWI_GPIO_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2',1,'atca_iface.h']]], - ['atca_5fswi_5fiface_8',['ATCA_SWI_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26',1,'atca_iface.h']]], - ['atca_5fuart_5fiface_9',['ATCA_UART_IFACE',['../a01442.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d',1,'atca_iface.h']]] + ['atca_5fcustom_5fiface_0',['ATCA_CUSTOM_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1da1522f46e7dbd1a928ff130594561d',1,'atca_iface.h']]], + ['atca_5fhid_5fiface_1',['ATCA_HID_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a7da282c54282a02f5650c38a85d0dfb1',1,'atca_iface.h']]], + ['atca_5fi2c_5fgpio_5fiface_2',['ATCA_I2C_GPIO_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a1b4b0b9522bab920782f2d781c9e489e',1,'atca_iface.h']]], + ['atca_5fi2c_5fiface_3',['ATCA_I2C_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a872efba3aa5b7890acfe0f1e0e453bcb',1,'atca_iface.h']]], + ['atca_5fkit_5fiface_4',['ATCA_KIT_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a0c22b107512100a364378a0bbf6bdfb9',1,'atca_iface.h']]], + ['atca_5fspi_5fgpio_5fiface_5',['ATCA_SPI_GPIO_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a28c752d380cea80d9d35735979e623eb',1,'atca_iface.h']]], + ['atca_5fspi_5fiface_6',['ATCA_SPI_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a8d50943acfc67f797b9c8fbf565deeb7',1,'atca_iface.h']]], + ['atca_5fswi_5fgpio_5fiface_7',['ATCA_SWI_GPIO_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089ab38797147196617d79ba041c899fdee2',1,'atca_iface.h']]], + ['atca_5fswi_5fiface_8',['ATCA_SWI_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a2ce2e46b7f4245ab3d750ea2805fdc26',1,'atca_iface.h']]], + ['atca_5fuart_5fiface_9',['ATCA_UART_IFACE',['../a01469.html#ggac7f674d4a0afb12d2f3c9c5e98cb1089a80ec8c070f1c711f2b16ad39d2a0486d',1,'atca_iface.h']]] ]; diff --git a/search/enumvalues_1.js b/search/enumvalues_1.js index 8623a31a3..56f706d42 100644 --- a/search/enumvalues_1.js +++ b/search/enumvalues_1.js @@ -1,6 +1,6 @@ var searchData= [ - ['certtype_5fcustom_0',['CERTTYPE_CUSTOM',['../a01443.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb',1,'atcacert_def.h']]], - ['certtype_5fx509_1',['CERTTYPE_X509',['../a01443.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44',1,'atcacert_def.h']]], - ['certtype_5fx509_5ffull_5fstored_2',['CERTTYPE_X509_FULL_STORED',['../a01443.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9',1,'atcacert_def.h']]] + ['certtype_5fcustom_0',['CERTTYPE_CUSTOM',['../a01470.html#gga5430f01929cd7269e04db08d1f28642fa92c401741edaf606af7056851db7dddb',1,'atcacert_def.h']]], + ['certtype_5fx509_1',['CERTTYPE_X509',['../a01470.html#gga5430f01929cd7269e04db08d1f28642fa82bc16ac5283813ee3ffe7cddf8e2b44',1,'atcacert_def.h']]], + ['certtype_5fx509_5ffull_5fstored_2',['CERTTYPE_X509_FULL_STORED',['../a01470.html#gga5430f01929cd7269e04db08d1f28642faf730d348a740f9194f3749740317d8c9',1,'atcacert_def.h']]] ]; diff --git a/search/enumvalues_2.js b/search/enumvalues_2.js index c4e303304..f0e9e8fe1 100644 --- a/search/enumvalues_2.js +++ b/search/enumvalues_2.js @@ -1,8 +1,8 @@ var searchData= [ - ['devzone_5fconfig_0',['DEVZONE_CONFIG',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207',1,'atcacert_def.h']]], - ['devzone_5fdata_1',['DEVZONE_DATA',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb',1,'atcacert_def.h']]], - ['devzone_5fgenkey_2',['DEVZONE_GENKEY',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c',1,'atcacert_def.h']]], - ['devzone_5fnone_3',['DEVZONE_NONE',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05',1,'atcacert_def.h']]], - ['devzone_5fotp_4',['DEVZONE_OTP',['../a01443.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea',1,'atcacert_def.h']]] + ['devzone_5fconfig_0',['DEVZONE_CONFIG',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73a4856bc2fcbda0be68832968204126207',1,'atcacert_def.h']]], + ['devzone_5fdata_1',['DEVZONE_DATA',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73a774ecb8e950d309498a9aa64933d95cb',1,'atcacert_def.h']]], + ['devzone_5fgenkey_2',['DEVZONE_GENKEY',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73ac3368649c98478c1e81edbdea07a5f6c',1,'atcacert_def.h']]], + ['devzone_5fnone_3',['DEVZONE_NONE',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73afe6b6aedf2a765638f3c62817db11f05',1,'atcacert_def.h']]], + ['devzone_5fotp_4',['DEVZONE_OTP',['../a01470.html#gga1c0876228cb459f64347a63f3bae4c73ae42ffc066a13ac1f38195d2cf4e60cea',1,'atcacert_def.h']]] ]; diff --git a/search/enumvalues_3.js b/search/enumvalues_3.js index 1858a9cc0..bca9f069d 100644 --- a/search/enumvalues_3.js +++ b/search/enumvalues_3.js @@ -1,14 +1,14 @@ var searchData= [ - ['snsrc_5fdevice_5fsn_0',['SNSRC_DEVICE_SN',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41',1,'atcacert_def.h']]], - ['snsrc_5fdevice_5fsn_5fhash_1',['SNSRC_DEVICE_SN_HASH',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2',1,'atcacert_def.h']]], - ['snsrc_5fdevice_5fsn_5fhash_5fpos_2',['SNSRC_DEVICE_SN_HASH_POS',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7',1,'atcacert_def.h']]], - ['snsrc_5fdevice_5fsn_5fhash_5fraw_3',['SNSRC_DEVICE_SN_HASH_RAW',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909',1,'atcacert_def.h']]], - ['snsrc_5fpub_5fkey_5fhash_4',['SNSRC_PUB_KEY_HASH',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e',1,'atcacert_def.h']]], - ['snsrc_5fpub_5fkey_5fhash_5fpos_5',['SNSRC_PUB_KEY_HASH_POS',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5',1,'atcacert_def.h']]], - ['snsrc_5fpub_5fkey_5fhash_5fraw_6',['SNSRC_PUB_KEY_HASH_RAW',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972',1,'atcacert_def.h']]], - ['snsrc_5fsigner_5fid_7',['SNSRC_SIGNER_ID',['../a01443.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff',1,'atcacert_def.h']]], - ['snsrc_5fstored_8',['SNSRC_STORED',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1',1,'atcacert_def.h']]], - ['snsrc_5fstored_5fdynamic_9',['SNSRC_STORED_DYNAMIC',['../a01443.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b',1,'atcacert_def.h']]], - ['stdcert_5fnum_5felements_10',['STDCERT_NUM_ELEMENTS',['../a01443.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f',1,'atcacert_def.h']]] + ['snsrc_5fdevice_5fsn_0',['SNSRC_DEVICE_SN',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea338258d51f0eb1c5d7ef9f0e639f5e41',1,'atcacert_def.h']]], + ['snsrc_5fdevice_5fsn_5fhash_1',['SNSRC_DEVICE_SN_HASH',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eaffba4ece10bc933c6b408a2b4e234ab2',1,'atcacert_def.h']]], + ['snsrc_5fdevice_5fsn_5fhash_5fpos_2',['SNSRC_DEVICE_SN_HASH_POS',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eab87e9124d93ca45243eacac5b96452b7',1,'atcacert_def.h']]], + ['snsrc_5fdevice_5fsn_5fhash_5fraw_3',['SNSRC_DEVICE_SN_HASH_RAW',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea2d608b2eeb6da309c1e9b2af7060d909',1,'atcacert_def.h']]], + ['snsrc_5fpub_5fkey_5fhash_4',['SNSRC_PUB_KEY_HASH',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea5dadea2da6020b492727eb1da6c4bb1e',1,'atcacert_def.h']]], + ['snsrc_5fpub_5fkey_5fhash_5fpos_5',['SNSRC_PUB_KEY_HASH_POS',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eacaf00502661bc7b9c260ca68831928b5',1,'atcacert_def.h']]], + ['snsrc_5fpub_5fkey_5fhash_5fraw_6',['SNSRC_PUB_KEY_HASH_RAW',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea83bf725c47007c842da4a8e93b1bf972',1,'atcacert_def.h']]], + ['snsrc_5fsigner_5fid_7',['SNSRC_SIGNER_ID',['../a01470.html#gga813047a656af7fe578d28fd54c840e8eabda5814e7da6c10dc243749dea79ffff',1,'atcacert_def.h']]], + ['snsrc_5fstored_8',['SNSRC_STORED',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea1b3e4833214ba25ba3d665135b2b6cd1',1,'atcacert_def.h']]], + ['snsrc_5fstored_5fdynamic_9',['SNSRC_STORED_DYNAMIC',['../a01470.html#gga813047a656af7fe578d28fd54c840e8ea4c213faf0171fcc6aeb27a1ca344342b',1,'atcacert_def.h']]], + ['stdcert_5fnum_5felements_10',['STDCERT_NUM_ELEMENTS',['../a01470.html#gga77184d0c71198b489ea9b57d07da824ead9a44768825ebcc67750d8e4172dc60f',1,'atcacert_def.h']]] ]; diff --git a/search/enumvalues_4.js b/search/enumvalues_4.js index 3fc50ed1f..16afa9c44 100644 --- a/search/enumvalues_4.js +++ b/search/enumvalues_4.js @@ -1,13 +1,13 @@ var searchData= [ - ['tf_5fbin2hex_5flc_0',['TF_BIN2HEX_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979',1,'atcacert_def.h']]], - ['tf_5fbin2hex_5fspace_5flc_1',['TF_BIN2HEX_SPACE_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe',1,'atcacert_def.h']]], - ['tf_5fbin2hex_5fspace_5fuc_2',['TF_BIN2HEX_SPACE_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa',1,'atcacert_def.h']]], - ['tf_5fbin2hex_5fuc_3',['TF_BIN2HEX_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5flc_4',['TF_HEX2BIN_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5fspace_5flc_5',['TF_HEX2BIN_SPACE_LC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5fspace_5fuc_6',['TF_HEX2BIN_SPACE_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08',1,'atcacert_def.h']]], - ['tf_5fhex2bin_5fuc_7',['TF_HEX2BIN_UC',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779',1,'atcacert_def.h']]], - ['tf_5fnone_8',['TF_NONE',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84',1,'atcacert_def.h']]], - ['tf_5freverse_9',['TF_REVERSE',['../a01443.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817',1,'atcacert_def.h']]] + ['tf_5fbin2hex_5flc_0',['TF_BIN2HEX_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a2682cdac7651ff7c68303c6b240b4979',1,'atcacert_def.h']]], + ['tf_5fbin2hex_5fspace_5flc_1',['TF_BIN2HEX_SPACE_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a0cc6a8630e1d28499201e23f355a89fe',1,'atcacert_def.h']]], + ['tf_5fbin2hex_5fspace_5fuc_2',['TF_BIN2HEX_SPACE_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a651f9d504c16191f36cf1b1762d8c0aa',1,'atcacert_def.h']]], + ['tf_5fbin2hex_5fuc_3',['TF_BIN2HEX_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a25e35bbc33f0152a8bc24e07f1a71bf7',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5flc_4',['TF_HEX2BIN_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a55a7f98db8c5480ffb0d2456a91689fd',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5fspace_5flc_5',['TF_HEX2BIN_SPACE_LC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017af1a0d28ef10a4e4f74d6bfbfc371300d',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5fspace_5fuc_6',['TF_HEX2BIN_SPACE_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017a62b34cc88494773ef3035a91deaafd08',1,'atcacert_def.h']]], + ['tf_5fhex2bin_5fuc_7',['TF_HEX2BIN_UC',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017aacc5e6c227eb55801343878d1dd6b779',1,'atcacert_def.h']]], + ['tf_5fnone_8',['TF_NONE',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017ac87f695cb78c44a56c6306e226c87d84',1,'atcacert_def.h']]], + ['tf_5freverse_9',['TF_REVERSE',['../a01470.html#gga121ffde3250c4ca6947c680868aa6017acfa23727589758659b759cc4c1b8e817',1,'atcacert_def.h']]] ]; diff --git a/search/files_0.js b/search/files_0.js index 0b4dcf43f..7c50b7c80 100644 --- a/search/files_0.js +++ b/search/files_0.js @@ -4,66 +4,67 @@ var searchData= ['api_5f206a_2eh_1',['api_206a.h',['../a00008.html',1,'']]], ['ascii_5fkit_5fhost_2ec_2',['ascii_kit_host.c',['../a00017.html',1,'']]], ['ascii_5fkit_5fhost_2eh_3',['ascii_kit_host.h',['../a00020.html',1,'']]], - ['atca_5fbasic_2ec_4',['atca_basic.c',['../a00221.html',1,'']]], - ['atca_5fbasic_2eh_5',['atca_basic.h',['../a00224.html',1,'']]], - ['atca_5fcfgs_2ec_6',['atca_cfgs.c',['../a00227.html',1,'']]], - ['atca_5fcfgs_2eh_7',['atca_cfgs.h',['../a00230.html',1,'']]], - ['atca_5fcompiler_2eh_8',['atca_compiler.h',['../a00233.html',1,'']]], - ['atca_5fconfig_5fcheck_2eh_9',['atca_config_check.h',['../a00800.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_2eh_10',['atca_crypto_hw_aes.h',['../a00446.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fcbc_2ec_11',['atca_crypto_hw_aes_cbc.c',['../a00449.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fcbcmac_2ec_12',['atca_crypto_hw_aes_cbcmac.c',['../a00452.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fccm_2ec_13',['atca_crypto_hw_aes_ccm.c',['../a00455.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fcmac_2ec_14',['atca_crypto_hw_aes_cmac.c',['../a00458.html',1,'']]], - ['atca_5fcrypto_5fhw_5faes_5fctr_2ec_15',['atca_crypto_hw_aes_ctr.c',['../a00461.html',1,'']]], - ['atca_5fcrypto_5fpad_2ec_16',['atca_crypto_pad.c',['../a00464.html',1,'']]], - ['atca_5fcrypto_5fpbkdf2_2ec_17',['atca_crypto_pbkdf2.c',['../a00467.html',1,'']]], - ['atca_5fcrypto_5fsw_2eh_18',['atca_crypto_sw.h',['../a00470.html',1,'']]], - ['atca_5fcrypto_5fsw_5faes_5fgcm_2ec_19',['atca_crypto_sw_aes_gcm.c',['../a00473.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha1_2ec_20',['atca_crypto_sw_sha1.c',['../a00476.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha1_2eh_21',['atca_crypto_sw_sha1.h',['../a00479.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha2_2ec_22',['atca_crypto_sw_sha2.c',['../a00482.html',1,'']]], - ['atca_5fcrypto_5fsw_5fsha2_2eh_23',['atca_crypto_sw_sha2.h',['../a00485.html',1,'']]], - ['atca_5fdebug_2ec_24',['atca_debug.c',['../a00239.html',1,'']]], - ['atca_5fdevice_2ec_25',['atca_device.c',['../a00245.html',1,'']]], - ['atca_5fdevice_2eh_26',['atca_device.h',['../a00248.html',1,'']]], - ['atca_5fdevtypes_2eh_27',['atca_devtypes.h',['../a00803.html',1,'']]], - ['atca_5fhal_2ec_28',['atca_hal.c',['../a00512.html',1,'']]], - ['atca_5fhal_2eh_29',['atca_hal.h',['../a00515.html',1,'']]], - ['atca_5fhelpers_2ec_30',['atca_helpers.c',['../a00251.html',1,'']]], - ['atca_5fhelpers_2eh_31',['atca_helpers.h',['../a00254.html',1,'']]], - ['atca_5fhost_2ec_32',['atca_host.c',['../a00632.html',1,'']]], - ['atca_5fhost_2eh_33',['atca_host.h',['../a00635.html',1,'']]], - ['atca_5fhost_5fconfig_5fcheck_2eh_34',['atca_host_config_check.h',['../a00638.html',1,'']]], - ['atca_5fiface_2ec_35',['atca_iface.c',['../a00806.html',1,'']]], - ['atca_5fiface_2eh_36',['atca_iface.h',['../a00257.html',1,'']]], - ['atca_5fjwt_2ec_37',['atca_jwt.c',['../a00641.html',1,'']]], - ['atca_5fjwt_2eh_38',['atca_jwt.h',['../a00644.html',1,'']]], - ['atca_5fmbedtls_5finterface_2eh_39',['atca_mbedtls_interface.h',['../a00653.html',1,'']]], - ['atca_5fmbedtls_5fwrap_2ec_40',['atca_mbedtls_wrap.c',['../a00656.html',1,'']]], - ['atca_5fopenssl_5finterface_2ec_41',['atca_openssl_interface.c',['../a00662.html',1,'']]], - ['atca_5fopenssl_5finterface_2eh_42',['atca_openssl_interface.h',['../a00665.html',1,'']]], - ['atca_5fplatform_2eh_43',['atca_platform.h',['../a00260.html',1,'']]], - ['atca_5fstatus_2eh_44',['atca_status.h',['../a00263.html',1,'']]], - ['atca_5futils_5fsizes_2ec_45',['atca_utils_sizes.c',['../a00266.html',1,'']]], - ['atca_5fversion_2eh_46',['atca_version.h',['../a00269.html',1,'']]], - ['atca_5fwolfssl_5finterface_2ec_47',['atca_wolfssl_interface.c',['../a00791.html',1,'']]], - ['atca_5fwolfssl_5finterface_2eh_48',['atca_wolfssl_interface.h',['../a00794.html',1,'']]], - ['atca_5fwolfssl_5finternal_2eh_49',['atca_wolfssl_internal.h',['../a00797.html',1,'']]], - ['atcacert_2eh_50',['atcacert.h',['../a00272.html',1,'']]], - ['atcacert_5fcheck_5fconfig_2eh_51',['atcacert_check_config.h',['../a00275.html',1,'']]], - ['atcacert_5fclient_2ec_52',['atcacert_client.c',['../a00278.html',1,'']]], - ['atcacert_5fclient_2eh_53',['atcacert_client.h',['../a00281.html',1,'']]], - ['atcacert_5fdate_2ec_54',['atcacert_date.c',['../a00284.html',1,'']]], - ['atcacert_5fdate_2eh_55',['atcacert_date.h',['../a00287.html',1,'']]], - ['atcacert_5fdef_2ec_56',['atcacert_def.c',['../a00290.html',1,'']]], - ['atcacert_5fdef_2eh_57',['atcacert_def.h',['../a00293.html',1,'']]], - ['atcacert_5fder_2ec_58',['atcacert_der.c',['../a00296.html',1,'']]], - ['atcacert_5fder_2eh_59',['atcacert_der.h',['../a00299.html',1,'']]], - ['atcacert_5fhost_5fhw_2ec_60',['atcacert_host_hw.c',['../a00302.html',1,'']]], - ['atcacert_5fhost_5fhw_2eh_61',['atcacert_host_hw.h',['../a00305.html',1,'']]], - ['atcacert_5fhost_5fsw_2ec_62',['atcacert_host_sw.c',['../a00308.html',1,'']]], - ['atcacert_5fhost_5fsw_2eh_63',['atcacert_host_sw.h',['../a00311.html',1,'']]], - ['atcacert_5fpem_2ec_64',['atcacert_pem.c',['../a00314.html',1,'']]], - ['atcacert_5fpem_2eh_65',['atcacert_pem.h',['../a00317.html',1,'']]] + ['atca_5fbasic_2ec_4',['atca_basic.c',['../a00227.html',1,'']]], + ['atca_5fbasic_2eh_5',['atca_basic.h',['../a00230.html',1,'']]], + ['atca_5fcfgs_2ec_6',['atca_cfgs.c',['../a00233.html',1,'']]], + ['atca_5fcfgs_2eh_7',['atca_cfgs.h',['../a00236.html',1,'']]], + ['atca_5fcompiler_2eh_8',['atca_compiler.h',['../a00239.html',1,'']]], + ['atca_5fconfig_5fcheck_2eh_9',['atca_config_check.h',['../a00815.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_2eh_10',['atca_crypto_hw_aes.h',['../a00458.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fcbc_2ec_11',['atca_crypto_hw_aes_cbc.c',['../a00461.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fcbcmac_2ec_12',['atca_crypto_hw_aes_cbcmac.c',['../a00464.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fccm_2ec_13',['atca_crypto_hw_aes_ccm.c',['../a00467.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fcmac_2ec_14',['atca_crypto_hw_aes_cmac.c',['../a00470.html',1,'']]], + ['atca_5fcrypto_5fhw_5faes_5fctr_2ec_15',['atca_crypto_hw_aes_ctr.c',['../a00473.html',1,'']]], + ['atca_5fcrypto_5fpad_2ec_16',['atca_crypto_pad.c',['../a00476.html',1,'']]], + ['atca_5fcrypto_5fpbkdf2_2ec_17',['atca_crypto_pbkdf2.c',['../a00479.html',1,'']]], + ['atca_5fcrypto_5fsw_2eh_18',['atca_crypto_sw.h',['../a00482.html',1,'']]], + ['atca_5fcrypto_5fsw_5faes_5fcmac_2ec_19',['atca_crypto_sw_aes_cmac.c',['../a00485.html',1,'']]], + ['atca_5fcrypto_5fsw_5faes_5fgcm_2ec_20',['atca_crypto_sw_aes_gcm.c',['../a00488.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha1_2ec_21',['atca_crypto_sw_sha1.c',['../a00491.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha1_2eh_22',['atca_crypto_sw_sha1.h',['../a00494.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha2_2ec_23',['atca_crypto_sw_sha2.c',['../a00497.html',1,'']]], + ['atca_5fcrypto_5fsw_5fsha2_2eh_24',['atca_crypto_sw_sha2.h',['../a00500.html',1,'']]], + ['atca_5fdebug_2ec_25',['atca_debug.c',['../a00245.html',1,'']]], + ['atca_5fdevice_2ec_26',['atca_device.c',['../a00251.html',1,'']]], + ['atca_5fdevice_2eh_27',['atca_device.h',['../a00254.html',1,'']]], + ['atca_5fdevtypes_2eh_28',['atca_devtypes.h',['../a00818.html',1,'']]], + ['atca_5fhal_2ec_29',['atca_hal.c',['../a00527.html',1,'']]], + ['atca_5fhal_2eh_30',['atca_hal.h',['../a00530.html',1,'']]], + ['atca_5fhelpers_2ec_31',['atca_helpers.c',['../a00257.html',1,'']]], + ['atca_5fhelpers_2eh_32',['atca_helpers.h',['../a00260.html',1,'']]], + ['atca_5fhost_2ec_33',['atca_host.c',['../a00647.html',1,'']]], + ['atca_5fhost_2eh_34',['atca_host.h',['../a00650.html',1,'']]], + ['atca_5fhost_5fconfig_5fcheck_2eh_35',['atca_host_config_check.h',['../a00653.html',1,'']]], + ['atca_5fiface_2ec_36',['atca_iface.c',['../a00821.html',1,'']]], + ['atca_5fiface_2eh_37',['atca_iface.h',['../a00263.html',1,'']]], + ['atca_5fjwt_2ec_38',['atca_jwt.c',['../a00656.html',1,'']]], + ['atca_5fjwt_2eh_39',['atca_jwt.h',['../a00659.html',1,'']]], + ['atca_5fmbedtls_5finterface_2eh_40',['atca_mbedtls_interface.h',['../a00668.html',1,'']]], + ['atca_5fmbedtls_5fwrap_2ec_41',['atca_mbedtls_wrap.c',['../a00671.html',1,'']]], + ['atca_5fopenssl_5finterface_2ec_42',['atca_openssl_interface.c',['../a00677.html',1,'']]], + ['atca_5fopenssl_5finterface_2eh_43',['atca_openssl_interface.h',['../a00680.html',1,'']]], + ['atca_5fplatform_2eh_44',['atca_platform.h',['../a00266.html',1,'']]], + ['atca_5fstatus_2eh_45',['atca_status.h',['../a00269.html',1,'']]], + ['atca_5futils_5fsizes_2ec_46',['atca_utils_sizes.c',['../a00272.html',1,'']]], + ['atca_5fversion_2eh_47',['atca_version.h',['../a00275.html',1,'']]], + ['atca_5fwolfssl_5finterface_2ec_48',['atca_wolfssl_interface.c',['../a00806.html',1,'']]], + ['atca_5fwolfssl_5finterface_2eh_49',['atca_wolfssl_interface.h',['../a00809.html',1,'']]], + ['atca_5fwolfssl_5finternal_2eh_50',['atca_wolfssl_internal.h',['../a00812.html',1,'']]], + ['atcacert_2eh_51',['atcacert.h',['../a00278.html',1,'']]], + ['atcacert_5fcheck_5fconfig_2eh_52',['atcacert_check_config.h',['../a00281.html',1,'']]], + ['atcacert_5fclient_2ec_53',['atcacert_client.c',['../a00284.html',1,'']]], + ['atcacert_5fclient_2eh_54',['atcacert_client.h',['../a00287.html',1,'']]], + ['atcacert_5fdate_2ec_55',['atcacert_date.c',['../a00290.html',1,'']]], + ['atcacert_5fdate_2eh_56',['atcacert_date.h',['../a00293.html',1,'']]], + ['atcacert_5fdef_2ec_57',['atcacert_def.c',['../a00296.html',1,'']]], + ['atcacert_5fdef_2eh_58',['atcacert_def.h',['../a00299.html',1,'']]], + ['atcacert_5fder_2ec_59',['atcacert_der.c',['../a00302.html',1,'']]], + ['atcacert_5fder_2eh_60',['atcacert_der.h',['../a00305.html',1,'']]], + ['atcacert_5fhost_5fhw_2ec_61',['atcacert_host_hw.c',['../a00308.html',1,'']]], + ['atcacert_5fhost_5fhw_2eh_62',['atcacert_host_hw.h',['../a00311.html',1,'']]], + ['atcacert_5fhost_5fsw_2ec_63',['atcacert_host_sw.c',['../a00314.html',1,'']]], + ['atcacert_5fhost_5fsw_2eh_64',['atcacert_host_sw.h',['../a00317.html',1,'']]], + ['atcacert_5fpem_2ec_65',['atcacert_pem.c',['../a00320.html',1,'']]], + ['atcacert_5fpem_2eh_66',['atcacert_pem.h',['../a00323.html',1,'']]] ]; diff --git a/search/files_1.js b/search/files_1.js index 984018ff8..239ca3005 100644 --- a/search/files_1.js +++ b/search/files_1.js @@ -1,43 +1,45 @@ var searchData= [ - ['cal_5fbuffer_2ec_0',['cal_buffer.c',['../a00320.html',1,'']]], - ['cal_5fbuffer_2eh_1',['cal_buffer.h',['../a00323.html',1,'']]], - ['cal_5finternal_2eh_2',['cal_internal.h',['../a00326.html',1,'']]], - ['calib_5faes_2ec_3',['calib_aes.c',['../a00329.html',1,'']]], - ['calib_5faes_5fgcm_2ec_4',['calib_aes_gcm.c',['../a00332.html',1,'']]], - ['calib_5faes_5fgcm_2eh_5',['calib_aes_gcm.h',['../a00335.html',1,'']]], - ['calib_5fbasic_2ec_6',['calib_basic.c',['../a00338.html',1,'']]], - ['calib_5fcheckmac_2ec_7',['calib_checkmac.c',['../a00344.html',1,'']]], - ['calib_5fcommand_2ec_8',['calib_command.c',['../a00347.html',1,'']]], - ['calib_5fcommand_2eh_9',['calib_command.h',['../a00350.html',1,'']]], - ['calib_5fconfig_5fcheck_2eh_10',['calib_config_check.h',['../a00353.html',1,'']]], - ['calib_5fcounter_2ec_11',['calib_counter.c',['../a00356.html',1,'']]], - ['calib_5fdelete_2ec_12',['calib_delete.c',['../a00359.html',1,'']]], - ['calib_5fderivekey_2ec_13',['calib_derivekey.c',['../a00362.html',1,'']]], - ['calib_5fdevice_2eh_14',['calib_device.h',['../a00365.html',1,'']]], - ['calib_5fecdh_2ec_15',['calib_ecdh.c',['../a00368.html',1,'']]], - ['calib_5fexecution_2ec_16',['calib_execution.c',['../a00371.html',1,'']]], - ['calib_5fexecution_2eh_17',['calib_execution.h',['../a00374.html',1,'']]], - ['calib_5fgendig_2ec_18',['calib_gendig.c',['../a00377.html',1,'']]], - ['calib_5fgenkey_2ec_19',['calib_genkey.c',['../a00380.html',1,'']]], - ['calib_5fhelpers_2ec_20',['calib_helpers.c',['../a00383.html',1,'']]], - ['calib_5fhmac_2ec_21',['calib_hmac.c',['../a00386.html',1,'']]], - ['calib_5finfo_2ec_22',['calib_info.c',['../a00389.html',1,'']]], - ['calib_5fkdf_2ec_23',['calib_kdf.c',['../a00392.html',1,'']]], - ['calib_5flock_2ec_24',['calib_lock.c',['../a00395.html',1,'']]], - ['calib_5fmac_2ec_25',['calib_mac.c',['../a00398.html',1,'']]], - ['calib_5fnonce_2ec_26',['calib_nonce.c',['../a00401.html',1,'']]], - ['calib_5fprivwrite_2ec_27',['calib_privwrite.c',['../a00404.html',1,'']]], - ['calib_5frandom_2ec_28',['calib_random.c',['../a00407.html',1,'']]], - ['calib_5fread_2ec_29',['calib_read.c',['../a00410.html',1,'']]], - ['calib_5fsecureboot_2ec_30',['calib_secureboot.c',['../a00413.html',1,'']]], - ['calib_5fselftest_2ec_31',['calib_selftest.c',['../a00416.html',1,'']]], - ['calib_5fsha_2ec_32',['calib_sha.c',['../a00419.html',1,'']]], - ['calib_5fsign_2ec_33',['calib_sign.c',['../a00422.html',1,'']]], - ['calib_5fupdateextra_2ec_34',['calib_updateextra.c',['../a00425.html',1,'']]], - ['calib_5fverify_2ec_35',['calib_verify.c',['../a00428.html',1,'']]], - ['calib_5fwrite_2ec_36',['calib_write.c',['../a00431.html',1,'']]], - ['crypto_5fhw_5fconfig_5fcheck_2eh_37',['crypto_hw_config_check.h',['../a00488.html',1,'']]], - ['crypto_5fsw_5fconfig_5fcheck_2eh_38',['crypto_sw_config_check.h',['../a00491.html',1,'']]], - ['cryptoauthlib_2eh_39',['cryptoauthlib.h',['../a00506.html',1,'']]] + ['cal_5fbuffer_2ec_0',['cal_buffer.c',['../a00326.html',1,'']]], + ['cal_5fbuffer_2eh_1',['cal_buffer.h',['../a00329.html',1,'']]], + ['cal_5finternal_2eh_2',['cal_internal.h',['../a00332.html',1,'']]], + ['calib_5faes_2ec_3',['calib_aes.c',['../a00335.html',1,'']]], + ['calib_5faes_5fgcm_2ec_4',['calib_aes_gcm.c',['../a00338.html',1,'']]], + ['calib_5faes_5fgcm_2eh_5',['calib_aes_gcm.h',['../a00341.html',1,'']]], + ['calib_5fbasic_2ec_6',['calib_basic.c',['../a00344.html',1,'']]], + ['calib_5fcheckmac_2ec_7',['calib_checkmac.c',['../a00350.html',1,'']]], + ['calib_5fcommand_2ec_8',['calib_command.c',['../a00353.html',1,'']]], + ['calib_5fcommand_2eh_9',['calib_command.h',['../a00356.html',1,'']]], + ['calib_5fconfig_5fcheck_2eh_10',['calib_config_check.h',['../a00359.html',1,'']]], + ['calib_5fcounter_2ec_11',['calib_counter.c',['../a00362.html',1,'']]], + ['calib_5fdelete_2ec_12',['calib_delete.c',['../a00365.html',1,'']]], + ['calib_5fderivekey_2ec_13',['calib_derivekey.c',['../a00368.html',1,'']]], + ['calib_5fdevice_2eh_14',['calib_device.h',['../a00371.html',1,'']]], + ['calib_5fecdh_2ec_15',['calib_ecdh.c',['../a00374.html',1,'']]], + ['calib_5fexecution_2ec_16',['calib_execution.c',['../a00377.html',1,'']]], + ['calib_5fexecution_2eh_17',['calib_execution.h',['../a00380.html',1,'']]], + ['calib_5fgendig_2ec_18',['calib_gendig.c',['../a00383.html',1,'']]], + ['calib_5fgenkey_2ec_19',['calib_genkey.c',['../a00386.html',1,'']]], + ['calib_5fhelpers_2ec_20',['calib_helpers.c',['../a00389.html',1,'']]], + ['calib_5fhmac_2ec_21',['calib_hmac.c',['../a00392.html',1,'']]], + ['calib_5finfo_2ec_22',['calib_info.c',['../a00395.html',1,'']]], + ['calib_5fkdf_2ec_23',['calib_kdf.c',['../a00398.html',1,'']]], + ['calib_5flock_2ec_24',['calib_lock.c',['../a00401.html',1,'']]], + ['calib_5fmac_2ec_25',['calib_mac.c',['../a00404.html',1,'']]], + ['calib_5fnonce_2ec_26',['calib_nonce.c',['../a00407.html',1,'']]], + ['calib_5fpacket_2ec_27',['calib_packet.c',['../a00410.html',1,'']]], + ['calib_5fpacket_2eh_28',['calib_packet.h',['../a00413.html',1,'']]], + ['calib_5fprivwrite_2ec_29',['calib_privwrite.c',['../a00416.html',1,'']]], + ['calib_5frandom_2ec_30',['calib_random.c',['../a00419.html',1,'']]], + ['calib_5fread_2ec_31',['calib_read.c',['../a00422.html',1,'']]], + ['calib_5fsecureboot_2ec_32',['calib_secureboot.c',['../a00425.html',1,'']]], + ['calib_5fselftest_2ec_33',['calib_selftest.c',['../a00428.html',1,'']]], + ['calib_5fsha_2ec_34',['calib_sha.c',['../a00431.html',1,'']]], + ['calib_5fsign_2ec_35',['calib_sign.c',['../a00434.html',1,'']]], + ['calib_5fupdateextra_2ec_36',['calib_updateextra.c',['../a00437.html',1,'']]], + ['calib_5fverify_2ec_37',['calib_verify.c',['../a00440.html',1,'']]], + ['calib_5fwrite_2ec_38',['calib_write.c',['../a00443.html',1,'']]], + ['crypto_5fhw_5fconfig_5fcheck_2eh_39',['crypto_hw_config_check.h',['../a00503.html',1,'']]], + ['crypto_5fsw_5fconfig_5fcheck_2eh_40',['crypto_sw_config_check.h',['../a00506.html',1,'']]], + ['cryptoauthlib_2eh_41',['cryptoauthlib.h',['../a00521.html',1,'']]] ]; diff --git a/search/files_2.js b/search/files_2.js index c8299fa65..1a316ec38 100644 --- a/search/files_2.js +++ b/search/files_2.js @@ -1,30 +1,30 @@ var searchData= [ - ['hal_5fall_5fplatforms_5fkit_5fhidapi_2ec_0',['hal_all_platforms_kit_hidapi.c',['../a00524.html',1,'']]], - ['hal_5ffreertos_2ec_1',['hal_freertos.c',['../a00533.html',1,'']]], - ['hal_5fgpio_5fharmony_2ec_2',['hal_gpio_harmony.c',['../a00536.html',1,'']]], - ['hal_5fi2c_5fharmony_2ec_3',['hal_i2c_harmony.c',['../a00539.html',1,'']]], - ['hal_5fi2c_5fstart_2ec_4',['hal_i2c_start.c',['../a00542.html',1,'']]], - ['hal_5fi2c_5fstart_2eh_5',['hal_i2c_start.h',['../a00545.html',1,'']]], - ['hal_5fkit_5fbridge_2ec_6',['hal_kit_bridge.c',['../a00548.html',1,'']]], - ['hal_5fkit_5fbridge_2eh_7',['hal_kit_bridge.h',['../a00551.html',1,'']]], - ['hal_5flinux_2ec_8',['hal_linux.c',['../a00554.html',1,'']]], - ['hal_5flinux_5fi2c_5fuserspace_2ec_9',['hal_linux_i2c_userspace.c',['../a00557.html',1,'']]], - ['hal_5flinux_5fuart_5fuserspace_2ec_10',['hal_linux_uart_userspace.c',['../a00563.html',1,'']]], - ['hal_5fsam0_5fi2c_5fasf_2ec_11',['hal_sam0_i2c_asf.c',['../a00566.html',1,'']]], - ['hal_5fsam0_5fi2c_5fasf_2eh_12',['hal_sam0_i2c_asf.h',['../a00569.html',1,'']]], - ['hal_5fsam_5fi2c_5fasf_2ec_13',['hal_sam_i2c_asf.c',['../a00572.html',1,'']]], - ['hal_5fsam_5fi2c_5fasf_2eh_14',['hal_sam_i2c_asf.h',['../a00575.html',1,'']]], - ['hal_5fsam_5ftimer_5fasf_2ec_15',['hal_sam_timer_asf.c',['../a00578.html',1,'']]], - ['hal_5fspi_5fharmony_2ec_16',['hal_spi_harmony.c',['../a00581.html',1,'']]], - ['hal_5fswi_5fgpio_2ec_17',['hal_swi_gpio.c',['../a00584.html',1,'']]], - ['hal_5fswi_5fgpio_2eh_18',['hal_swi_gpio.h',['../a00587.html',1,'']]], - ['hal_5fswi_5fuart_2ec_19',['hal_swi_uart.c',['../a00590.html',1,'']]], - ['hal_5ftimer_5fstart_2ec_20',['hal_timer_start.c',['../a00593.html',1,'']]], - ['hal_5fuart_5fharmony_2ec_21',['hal_uart_harmony.c',['../a00596.html',1,'']]], - ['hal_5fuc3_5fi2c_5fasf_2ec_22',['hal_uc3_i2c_asf.c',['../a00599.html',1,'']]], - ['hal_5fuc3_5fi2c_5fasf_2eh_23',['hal_uc3_i2c_asf.h',['../a00602.html',1,'']]], - ['hal_5fuc3_5ftimer_5fasf_2ec_24',['hal_uc3_timer_asf.c',['../a00605.html',1,'']]], - ['hal_5fwindows_2ec_25',['hal_windows.c',['../a00608.html',1,'']]], - ['hal_5fwindows_5fkit_5fuart_2ec_26',['hal_windows_kit_uart.c',['../a00611.html',1,'']]] + ['hal_5fall_5fplatforms_5fkit_5fhidapi_2ec_0',['hal_all_platforms_kit_hidapi.c',['../a00539.html',1,'']]], + ['hal_5ffreertos_2ec_1',['hal_freertos.c',['../a00548.html',1,'']]], + ['hal_5fgpio_5fharmony_2ec_2',['hal_gpio_harmony.c',['../a00551.html',1,'']]], + ['hal_5fi2c_5fharmony_2ec_3',['hal_i2c_harmony.c',['../a00554.html',1,'']]], + ['hal_5fi2c_5fstart_2ec_4',['hal_i2c_start.c',['../a00557.html',1,'']]], + ['hal_5fi2c_5fstart_2eh_5',['hal_i2c_start.h',['../a00560.html',1,'']]], + ['hal_5fkit_5fbridge_2ec_6',['hal_kit_bridge.c',['../a00563.html',1,'']]], + ['hal_5fkit_5fbridge_2eh_7',['hal_kit_bridge.h',['../a00566.html',1,'']]], + ['hal_5flinux_2ec_8',['hal_linux.c',['../a00569.html',1,'']]], + ['hal_5flinux_5fi2c_5fuserspace_2ec_9',['hal_linux_i2c_userspace.c',['../a00572.html',1,'']]], + ['hal_5flinux_5fuart_5fuserspace_2ec_10',['hal_linux_uart_userspace.c',['../a00578.html',1,'']]], + ['hal_5fsam0_5fi2c_5fasf_2ec_11',['hal_sam0_i2c_asf.c',['../a00581.html',1,'']]], + ['hal_5fsam0_5fi2c_5fasf_2eh_12',['hal_sam0_i2c_asf.h',['../a00584.html',1,'']]], + ['hal_5fsam_5fi2c_5fasf_2ec_13',['hal_sam_i2c_asf.c',['../a00587.html',1,'']]], + ['hal_5fsam_5fi2c_5fasf_2eh_14',['hal_sam_i2c_asf.h',['../a00590.html',1,'']]], + ['hal_5fsam_5ftimer_5fasf_2ec_15',['hal_sam_timer_asf.c',['../a00593.html',1,'']]], + ['hal_5fspi_5fharmony_2ec_16',['hal_spi_harmony.c',['../a00596.html',1,'']]], + ['hal_5fswi_5fgpio_2ec_17',['hal_swi_gpio.c',['../a00599.html',1,'']]], + ['hal_5fswi_5fgpio_2eh_18',['hal_swi_gpio.h',['../a00602.html',1,'']]], + ['hal_5fswi_5fuart_2ec_19',['hal_swi_uart.c',['../a00605.html',1,'']]], + ['hal_5ftimer_5fstart_2ec_20',['hal_timer_start.c',['../a00608.html',1,'']]], + ['hal_5fuart_5fharmony_2ec_21',['hal_uart_harmony.c',['../a00611.html',1,'']]], + ['hal_5fuc3_5fi2c_5fasf_2ec_22',['hal_uc3_i2c_asf.c',['../a00614.html',1,'']]], + ['hal_5fuc3_5fi2c_5fasf_2eh_23',['hal_uc3_i2c_asf.h',['../a00617.html',1,'']]], + ['hal_5fuc3_5ftimer_5fasf_2ec_24',['hal_uc3_timer_asf.c',['../a00620.html',1,'']]], + ['hal_5fwindows_2ec_25',['hal_windows.c',['../a00623.html',1,'']]], + ['hal_5fwindows_5fkit_5fuart_2ec_26',['hal_windows_kit_uart.c',['../a00626.html',1,'']]] ]; diff --git a/search/files_4.js b/search/files_4.js index d744829d7..2bad076c0 100644 --- a/search/files_4.js +++ b/search/files_4.js @@ -1,5 +1,5 @@ var searchData= [ - ['kit_5fprotocol_2ec_0',['kit_protocol.c',['../a00629.html',1,'']]], - ['kit_5fprotocol_2eh_1',['kit_protocol.h',['../a00614.html',1,'']]] + ['kit_5fprotocol_2ec_0',['kit_protocol.c',['../a00644.html',1,'']]], + ['kit_5fprotocol_2eh_1',['kit_protocol.h',['../a00629.html',1,'']]] ]; diff --git a/search/files_5.js b/search/files_5.js index e6bb83fb9..5cbc3bb50 100644 --- a/search/files_5.js +++ b/search/files_5.js @@ -1,38 +1,38 @@ var searchData= [ - ['pkcs11_5fattrib_2ec_0',['pkcs11_attrib.c',['../a00674.html',1,'']]], - ['pkcs11_5fattrib_2eh_1',['pkcs11_attrib.h',['../a00677.html',1,'']]], - ['pkcs11_5fcert_2ec_2',['pkcs11_cert.c',['../a00680.html',1,'']]], - ['pkcs11_5fcert_2eh_3',['pkcs11_cert.h',['../a00683.html',1,'']]], - ['pkcs11_5fconfig_2ec_4',['pkcs11_config.c',['../a00785.html',1,'']]], - ['pkcs11_5fdebug_2ec_5',['pkcs11_debug.c',['../a00689.html',1,'']]], - ['pkcs11_5fdebug_2eh_6',['pkcs11_debug.h',['../a00692.html',1,'']]], - ['pkcs11_5fdigest_2eh_7',['pkcs11_digest.h',['../a00698.html',1,'']]], - ['pkcs11_5fencrypt_2ec_8',['pkcs11_encrypt.c',['../a00701.html',1,'']]], - ['pkcs11_5fencrypt_2eh_9',['pkcs11_encrypt.h',['../a00704.html',1,'']]], - ['pkcs11_5ffind_2ec_10',['pkcs11_find.c',['../a00707.html',1,'']]], - ['pkcs11_5ffind_2eh_11',['pkcs11_find.h',['../a00710.html',1,'']]], - ['pkcs11_5finfo_2ec_12',['pkcs11_info.c',['../a00713.html',1,'']]], - ['pkcs11_5finfo_2eh_13',['pkcs11_info.h',['../a00716.html',1,'']]], - ['pkcs11_5finit_2ec_14',['pkcs11_init.c',['../a00719.html',1,'']]], - ['pkcs11_5finit_2eh_15',['pkcs11_init.h',['../a00722.html',1,'']]], - ['pkcs11_5fkey_2ec_16',['pkcs11_key.c',['../a00725.html',1,'']]], - ['pkcs11_5fkey_2eh_17',['pkcs11_key.h',['../a00728.html',1,'']]], - ['pkcs11_5fmain_2ec_18',['pkcs11_main.c',['../a00731.html',1,'']]], - ['pkcs11_5fmech_2ec_19',['pkcs11_mech.c',['../a00734.html',1,'']]], - ['pkcs11_5fmech_2eh_20',['pkcs11_mech.h',['../a00737.html',1,'']]], - ['pkcs11_5fobject_2ec_21',['pkcs11_object.c',['../a00740.html',1,'']]], - ['pkcs11_5fobject_2eh_22',['pkcs11_object.h',['../a00743.html',1,'']]], - ['pkcs11_5fos_2ec_23',['pkcs11_os.c',['../a00746.html',1,'']]], - ['pkcs11_5fos_2eh_24',['pkcs11_os.h',['../a00749.html',1,'']]], - ['pkcs11_5fsession_2ec_25',['pkcs11_session.c',['../a00752.html',1,'']]], - ['pkcs11_5fsession_2eh_26',['pkcs11_session.h',['../a00755.html',1,'']]], - ['pkcs11_5fsignature_2ec_27',['pkcs11_signature.c',['../a00758.html',1,'']]], - ['pkcs11_5fsignature_2eh_28',['pkcs11_signature.h',['../a00761.html',1,'']]], - ['pkcs11_5fslot_2ec_29',['pkcs11_slot.c',['../a00764.html',1,'']]], - ['pkcs11_5fslot_2eh_30',['pkcs11_slot.h',['../a00767.html',1,'']]], - ['pkcs11_5ftoken_2ec_31',['pkcs11_token.c',['../a00788.html',1,'']]], - ['pkcs11_5ftoken_2eh_32',['pkcs11_token.h',['../a00770.html',1,'']]], - ['pkcs11_5futil_2ec_33',['pkcs11_util.c',['../a00773.html',1,'']]], - ['pkcs11_5futil_2eh_34',['pkcs11_util.h',['../a00776.html',1,'']]] + ['pkcs11_5fattrib_2ec_0',['pkcs11_attrib.c',['../a00689.html',1,'']]], + ['pkcs11_5fattrib_2eh_1',['pkcs11_attrib.h',['../a00692.html',1,'']]], + ['pkcs11_5fcert_2ec_2',['pkcs11_cert.c',['../a00695.html',1,'']]], + ['pkcs11_5fcert_2eh_3',['pkcs11_cert.h',['../a00698.html',1,'']]], + ['pkcs11_5fconfig_2ec_4',['pkcs11_config.c',['../a00800.html',1,'']]], + ['pkcs11_5fdebug_2ec_5',['pkcs11_debug.c',['../a00704.html',1,'']]], + ['pkcs11_5fdebug_2eh_6',['pkcs11_debug.h',['../a00707.html',1,'']]], + ['pkcs11_5fdigest_2eh_7',['pkcs11_digest.h',['../a00713.html',1,'']]], + ['pkcs11_5fencrypt_2ec_8',['pkcs11_encrypt.c',['../a00716.html',1,'']]], + ['pkcs11_5fencrypt_2eh_9',['pkcs11_encrypt.h',['../a00719.html',1,'']]], + ['pkcs11_5ffind_2ec_10',['pkcs11_find.c',['../a00722.html',1,'']]], + ['pkcs11_5ffind_2eh_11',['pkcs11_find.h',['../a00725.html',1,'']]], + ['pkcs11_5finfo_2ec_12',['pkcs11_info.c',['../a00728.html',1,'']]], + ['pkcs11_5finfo_2eh_13',['pkcs11_info.h',['../a00731.html',1,'']]], + ['pkcs11_5finit_2ec_14',['pkcs11_init.c',['../a00734.html',1,'']]], + ['pkcs11_5finit_2eh_15',['pkcs11_init.h',['../a00737.html',1,'']]], + ['pkcs11_5fkey_2ec_16',['pkcs11_key.c',['../a00740.html',1,'']]], + ['pkcs11_5fkey_2eh_17',['pkcs11_key.h',['../a00743.html',1,'']]], + ['pkcs11_5fmain_2ec_18',['pkcs11_main.c',['../a00746.html',1,'']]], + ['pkcs11_5fmech_2ec_19',['pkcs11_mech.c',['../a00749.html',1,'']]], + ['pkcs11_5fmech_2eh_20',['pkcs11_mech.h',['../a00752.html',1,'']]], + ['pkcs11_5fobject_2ec_21',['pkcs11_object.c',['../a00755.html',1,'']]], + ['pkcs11_5fobject_2eh_22',['pkcs11_object.h',['../a00758.html',1,'']]], + ['pkcs11_5fos_2ec_23',['pkcs11_os.c',['../a00761.html',1,'']]], + ['pkcs11_5fos_2eh_24',['pkcs11_os.h',['../a00764.html',1,'']]], + ['pkcs11_5fsession_2ec_25',['pkcs11_session.c',['../a00767.html',1,'']]], + ['pkcs11_5fsession_2eh_26',['pkcs11_session.h',['../a00770.html',1,'']]], + ['pkcs11_5fsignature_2ec_27',['pkcs11_signature.c',['../a00773.html',1,'']]], + ['pkcs11_5fsignature_2eh_28',['pkcs11_signature.h',['../a00776.html',1,'']]], + ['pkcs11_5fslot_2ec_29',['pkcs11_slot.c',['../a00779.html',1,'']]], + ['pkcs11_5fslot_2eh_30',['pkcs11_slot.h',['../a00782.html',1,'']]], + ['pkcs11_5ftoken_2ec_31',['pkcs11_token.c',['../a00803.html',1,'']]], + ['pkcs11_5ftoken_2eh_32',['pkcs11_token.h',['../a00785.html',1,'']]], + ['pkcs11_5futil_2ec_33',['pkcs11_util.c',['../a00788.html',1,'']]], + ['pkcs11_5futil_2eh_34',['pkcs11_util.h',['../a00791.html',1,'']]] ]; diff --git a/search/files_6.js b/search/files_6.js index e7f51f119..741542829 100644 --- a/search/files_6.js +++ b/search/files_6.js @@ -3,14 +3,14 @@ var searchData= ['secure_5fboot_2ec_0',['secure_boot.c',['../a00044.html',1,'']]], ['secure_5fboot_2eh_1',['secure_boot.h',['../a00047.html',1,'']]], ['secure_5fboot_5fmemory_2eh_2',['secure_boot_memory.h',['../a00050.html',1,'']]], - ['sha1_5froutines_2ec_3',['sha1_routines.c',['../a00494.html',1,'']]], - ['sha1_5froutines_2eh_4',['sha1_routines.h',['../a00497.html',1,'']]], - ['sha2_5froutines_2ec_5',['sha2_routines.c',['../a00500.html',1,'']]], - ['sha2_5froutines_2eh_6',['sha2_routines.h',['../a00503.html',1,'']]], - ['swi_5fuart_5fsamd21_5fasf_2ec_7',['swi_uart_samd21_asf.c',['../a00617.html',1,'']]], - ['swi_5fuart_5fsamd21_5fasf_2eh_8',['swi_uart_samd21_asf.h',['../a00620.html',1,'']]], - ['swi_5fuart_5fstart_2ec_9',['swi_uart_start.c',['../a00623.html',1,'']]], - ['swi_5fuart_5fstart_2eh_10',['swi_uart_start.h',['../a00626.html',1,'']]], + ['sha1_5froutines_2ec_3',['sha1_routines.c',['../a00509.html',1,'']]], + ['sha1_5froutines_2eh_4',['sha1_routines.h',['../a00512.html',1,'']]], + ['sha2_5froutines_2ec_5',['sha2_routines.c',['../a00515.html',1,'']]], + ['sha2_5froutines_2eh_6',['sha2_routines.h',['../a00518.html',1,'']]], + ['swi_5fuart_5fsamd21_5fasf_2ec_7',['swi_uart_samd21_asf.c',['../a00632.html',1,'']]], + ['swi_5fuart_5fsamd21_5fasf_2eh_8',['swi_uart_samd21_asf.h',['../a00635.html',1,'']]], + ['swi_5fuart_5fstart_2ec_9',['swi_uart_start.c',['../a00638.html',1,'']]], + ['swi_5fuart_5fstart_2eh_10',['swi_uart_start.h',['../a00641.html',1,'']]], ['symmetric_5fauthentication_2ec_11',['symmetric_authentication.c',['../a00011.html',1,'']]], ['symmetric_5fauthentication_2eh_12',['symmetric_authentication.h',['../a00014.html',1,'']]] ]; diff --git a/search/files_8.js b/search/files_8.js index eca620f97..0553f81a9 100644 --- a/search/files_8.js +++ b/search/files_8.js @@ -1,7 +1,7 @@ var searchData= [ - ['wpc_5fapis_2ec_0',['wpc_apis.c',['../a00119.html',1,'']]], - ['wpc_5fapis_2eh_1',['wpc_apis.h',['../a00122.html',1,'']]], + ['wpc_5fapis_2ec_0',['wpc_apis.c',['../a00116.html',1,'']]], + ['wpc_5fapis_2eh_1',['wpc_apis.h',['../a00119.html',1,'']]], ['wpccert_5fclient_2ec_2',['wpccert_client.c',['../a00128.html',1,'']]], ['wpccert_5fclient_2eh_3',['wpccert_client.h',['../a00131.html',1,'']]] ]; diff --git a/search/functions_0.js b/search/functions_0.js index a71c0aa87..357c9a3ab 100644 --- a/search/functions_0.js +++ b/search/functions_0.js @@ -1,21 +1,21 @@ var searchData= [ - ['_5farray_5fto_5fcode_0',['_array_to_code',['../a01459.html#ac55af04b29df0650b502b9df1db36444',1,'cryptoauthlib::library']]], - ['_5fatcacert_5fconvert_5fbytes_1',['_atcacert_convert_bytes',['../a01453.html#aa9c8b1588cae90a37ef827d71e4ae909',1,'cryptoauthlib::atcacert']]], - ['_5fatcacert_5fconvert_5fenum_2',['_atcacert_convert_enum',['../a01453.html#acf013c955f2fd024a8669085dadbd3ba',1,'cryptoauthlib::atcacert']]], - ['_5fcheck_5ftype_5frationality_3',['_check_type_rationality',['../a01459.html#a4b3b07664816ecd9b1e69aece27315ed',1,'cryptoauthlib::library']]], - ['_5fconvert_5fpointer_5fto_5flist_4',['_convert_pointer_to_list',['../a01459.html#a2a572a1c4153428ddf599aac1054a1c5',1,'cryptoauthlib::library']]], - ['_5fctype_5ffrom_5fdefinition_5',['_ctype_from_definition',['../a01459.html#af97b6ad66a6d4bb6a14631fa52059c0b',1,'cryptoauthlib::library']]], - ['_5fdef_5fto_5ffield_6',['_def_to_field',['../a01459.html#af41036c1c577c3ea72112cb347ccaa7f',1,'cryptoauthlib::library']]], - ['_5fforce_5flocal_5flibrary_7',['_force_local_library',['../a01459.html#a2e119a638263f674b4441439cf472810',1,'cryptoauthlib::library']]], - ['_5fget_5fattribute_5ffrom_5fctypes_8',['_get_attribute_from_ctypes',['../a01459.html#af9181efd0fd60114f021c54a713f13af',1,'cryptoauthlib::library']]], - ['_5fget_5ffield_5fdefinition_9',['_get_field_definition',['../a01459.html#a4268b8eb517ac8eb32eabcb3bbeb9e75',1,'cryptoauthlib::library']]], - ['_5fiface_5fload_5fdefault_5fconfig_10',['_iface_load_default_config',['../a01458.html#a3f0aeae05c5278420c02156257845b1d',1,'cryptoauthlib::iface']]], - ['_5fis_5fpointer_11',['_is_pointer',['../a01459.html#a44bdab0afac36d18288aa73ad9b5d341',1,'cryptoauthlib::library']]], - ['_5fobj_5fto_5fcode_12',['_obj_to_code',['../a01459.html#af7258b81811d05efc7fdf6152fd10907',1,'cryptoauthlib::library']]], - ['_5fobject_5fdefinition_5fcode_13',['_object_definition_code',['../a01459.html#a1ce7de010f8d9ae4bc2428ea26fe495f',1,'cryptoauthlib::library']]], - ['_5fpointer_5fto_5fcode_14',['_pointer_to_code',['../a01459.html#a39c2c2660f89a924cd4eef1ae7d672a5',1,'cryptoauthlib::library']]], - ['_5fstructure_5fto_5fcode_15',['_structure_to_code',['../a01459.html#af5d2460ce51e3abef1c8065695ba0b63',1,'cryptoauthlib::library']]], - ['_5fstructure_5fto_5fstring_16',['_structure_to_string',['../a01459.html#a9f3720f901ce589dcfd623721b695938',1,'cryptoauthlib::library']]], - ['_5fto_5fcode_17',['_to_code',['../a01459.html#a321e7a3f55577a28ad2b2ed4f2ef132c',1,'cryptoauthlib::library']]] + ['_5farray_5fto_5fcode_0',['_array_to_code',['../a01486.html#ac55af04b29df0650b502b9df1db36444',1,'cryptoauthlib::library']]], + ['_5fatcacert_5fconvert_5fbytes_1',['_atcacert_convert_bytes',['../a01480.html#aa9c8b1588cae90a37ef827d71e4ae909',1,'cryptoauthlib::atcacert']]], + ['_5fatcacert_5fconvert_5fenum_2',['_atcacert_convert_enum',['../a01480.html#acf013c955f2fd024a8669085dadbd3ba',1,'cryptoauthlib::atcacert']]], + ['_5fcheck_5ftype_5frationality_3',['_check_type_rationality',['../a01486.html#a4b3b07664816ecd9b1e69aece27315ed',1,'cryptoauthlib::library']]], + ['_5fconvert_5fpointer_5fto_5flist_4',['_convert_pointer_to_list',['../a01486.html#a2a572a1c4153428ddf599aac1054a1c5',1,'cryptoauthlib::library']]], + ['_5fctype_5ffrom_5fdefinition_5',['_ctype_from_definition',['../a01486.html#af97b6ad66a6d4bb6a14631fa52059c0b',1,'cryptoauthlib::library']]], + ['_5fdef_5fto_5ffield_6',['_def_to_field',['../a01486.html#af41036c1c577c3ea72112cb347ccaa7f',1,'cryptoauthlib::library']]], + ['_5fforce_5flocal_5flibrary_7',['_force_local_library',['../a01486.html#a2e119a638263f674b4441439cf472810',1,'cryptoauthlib::library']]], + ['_5fget_5fattribute_5ffrom_5fctypes_8',['_get_attribute_from_ctypes',['../a01486.html#af9181efd0fd60114f021c54a713f13af',1,'cryptoauthlib::library']]], + ['_5fget_5ffield_5fdefinition_9',['_get_field_definition',['../a01486.html#a4268b8eb517ac8eb32eabcb3bbeb9e75',1,'cryptoauthlib::library']]], + ['_5fiface_5fload_5fdefault_5fconfig_10',['_iface_load_default_config',['../a01485.html#a3f0aeae05c5278420c02156257845b1d',1,'cryptoauthlib::iface']]], + ['_5fis_5fpointer_11',['_is_pointer',['../a01486.html#a44bdab0afac36d18288aa73ad9b5d341',1,'cryptoauthlib::library']]], + ['_5fobj_5fto_5fcode_12',['_obj_to_code',['../a01486.html#af7258b81811d05efc7fdf6152fd10907',1,'cryptoauthlib::library']]], + ['_5fobject_5fdefinition_5fcode_13',['_object_definition_code',['../a01486.html#a1ce7de010f8d9ae4bc2428ea26fe495f',1,'cryptoauthlib::library']]], + ['_5fpointer_5fto_5fcode_14',['_pointer_to_code',['../a01486.html#a39c2c2660f89a924cd4eef1ae7d672a5',1,'cryptoauthlib::library']]], + ['_5fstructure_5fto_5fcode_15',['_structure_to_code',['../a01486.html#af5d2460ce51e3abef1c8065695ba0b63',1,'cryptoauthlib::library']]], + ['_5fstructure_5fto_5fstring_16',['_structure_to_string',['../a01486.html#a9f3720f901ce589dcfd623721b695938',1,'cryptoauthlib::library']]], + ['_5fto_5fcode_17',['_to_code',['../a01486.html#a321e7a3f55577a28ad2b2ed4f2ef132c',1,'cryptoauthlib::library']]] ]; diff --git a/search/functions_1.js b/search/functions_1.js index b7ede30dd..5e6e6e883 100644 --- a/search/functions_1.js +++ b/search/functions_1.js @@ -1,290 +1,287 @@ var searchData= [ - ['atca_5fdelay_5f10us_0',['atca_delay_10us',['../a01446.html#ga19891182689551cc3a88603135959351',1,'hal_sam_timer_asf.c']]], - ['atca_5fdelay_5fms_1',['atca_delay_ms',['../a01446.html#ga0544f36422b5e9a8890fb9c90fc5eb55',1,'hal_sam_timer_asf.c']]], - ['atca_5fdelay_5fus_2',['atca_delay_us',['../a01446.html#ga7598dfcd6dcac882836544d48356d02f',1,'hal_sam_timer_asf.c']]], - ['atca_5fiface_5fget_5fretries_3',['atca_iface_get_retries',['../a01442.html#ga349718dea5d5b558766a31b7dcd7e811',1,'atca_iface.c']]], - ['atca_5fiface_5fget_5fwake_5fdelay_4',['atca_iface_get_wake_delay',['../a01442.html#ga128f54833b5ed2105dae417333e1d651',1,'atca_iface.c']]], - ['atca_5fiface_5fis_5fkit_5',['atca_iface_is_kit',['../a01442.html#gacb09a6fa845efade7d47796bead14d2c',1,'atca_iface.c']]], - ['atca_5fiface_5fis_5fswi_6',['atca_iface_is_swi',['../a01442.html#gad2276d5ebd02613fbeda8ae15b679d1e',1,'atca_iface.c']]], - ['atca_5fmbedtls_5fecdh_5fioprot_5fcb_7',['atca_mbedtls_ecdh_ioprot_cb',['../a01449.html#gaa35682dc98e33ce3d6fad1fc902cdff0',1,'atca_mbedtls_wrap.h']]], - ['atca_5fmbedtls_5fecdh_5fslot_5fcb_8',['atca_mbedtls_ecdh_slot_cb',['../a01449.html#ga98d684683ccecd3d56bdf5dc27ae999c',1,'atca_mbedtls_wrap.h']]], - ['atca_5fmbedtls_5fpk_5finit_9',['atca_mbedtls_pk_init',['../a01449.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01449.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], - ['atca_5fmbedtls_5fpk_5finit_5fext_10',['atca_mbedtls_pk_init_ext',['../a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01449.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], - ['atcab_5faes_11',['atcab_aes',['../a01439.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out): atca_basic.c'],['../a01439.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out): atca_basic.c'],['../a01452.html#aa6f667c9ff033cb3e1d8bd1565e080aa',1,'cryptoauthlib.atcab.atcab_aes(mode, key_id, aes_in, aes_out)']]], - ['atcab_5faes_5fcbc_5fdecrypt_5fblock_12',['atcab_aes_cbc_decrypt_block',['../a01452.html#a9a7024193b07e7c98690873e7452f0ad',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbc_5fencrypt_5fblock_13',['atcab_aes_cbc_encrypt_block',['../a01452.html#a7e0bc033c11e689570f7aa9431d49d9c',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbc_5finit_14',['atcab_aes_cbc_init',['../a01452.html#a837da37427357c91aba40c6becbebfeb',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbcmac_5ffinish_15',['atcab_aes_cbcmac_finish',['../a01452.html#a1c364ea983169ac73197713db23f9a52',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbcmac_5finit_16',['atcab_aes_cbcmac_init',['../a01452.html#aa612658a288c6a5cca103e5d3965390c',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcbcmac_5fupdate_17',['atcab_aes_cbcmac_update',['../a01452.html#af58b97dc722402be6c65e226a0dd26ae',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5faad_5ffinish_18',['atcab_aes_ccm_aad_finish',['../a01452.html#a99d19bf27efa04318480a3e81f668ae8',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5faad_5fupdate_19',['atcab_aes_ccm_aad_update',['../a01452.html#af5502348939c1db2fdafde42603266f3',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fdecrypt_5ffinish_20',['atcab_aes_ccm_decrypt_finish',['../a01452.html#aa641b1946cfcb33ac7e353a6ca7285ab',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fdecrypt_5fupdate_21',['atcab_aes_ccm_decrypt_update',['../a01452.html#ab78cfabfa12d891830c1147bbc61a2e0',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fencrypt_5ffinish_22',['atcab_aes_ccm_encrypt_finish',['../a01452.html#ac0399ab5a8ab2e7682441241fcc98914',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5fencrypt_5fupdate_23',['atcab_aes_ccm_encrypt_update',['../a01452.html#a78d906cc88e8efcb280a0869ca7afaf2',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5finit_24',['atcab_aes_ccm_init',['../a01452.html#ab5ef9981f825f3fe5beb84b4d664f321',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fccm_5finit_5frand_25',['atcab_aes_ccm_init_rand',['../a01452.html#af34551008cb67c907488a9403da495ad',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcmac_5ffinish_26',['atcab_aes_cmac_finish',['../a01452.html#aeccd1e361da41854a45068507ccd9f33',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcmac_5finit_27',['atcab_aes_cmac_init',['../a01452.html#a1b778f3fa3c6d459075500f5248d09c6',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fcmac_5fupdate_28',['atcab_aes_cmac_update',['../a01452.html#aefa4891ccc2a860029958f2e80bdef87',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5fdecrypt_5fblock_29',['atcab_aes_ctr_decrypt_block',['../a01452.html#a80a2b3fe53dc4caedad79221b05bbdf7',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5fencrypt_5fblock_30',['atcab_aes_ctr_encrypt_block',['../a01452.html#a1a3dce72fa3192b1ca917025b8ff4736',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5finit_31',['atcab_aes_ctr_init',['../a01452.html#aec84bbc3cc86b716a2996069d5d227c0',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fctr_5finit_5frand_32',['atcab_aes_ctr_init_rand',['../a01452.html#a87ec2b9cbb53f9f38df252d6b7508881',1,'cryptoauthlib::atcab']]], - ['atcab_5faes_5fdecrypt_33',['atcab_aes_decrypt',['../a01439.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01439.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01452.html#ac67f610115ce611e94d05a87ada77f66',1,'cryptoauthlib.atcab.atcab_aes_decrypt()']]], - ['atcab_5faes_5fdecrypt_5fext_34',['atcab_aes_decrypt_ext',['../a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01439.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c']]], - ['atcab_5faes_5fencrypt_35',['atcab_aes_encrypt',['../a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(): atca_basic.c'],['../a01452.html#a544871498712993b7ceb7a0134beac55',1,'cryptoauthlib.atcab.atcab_aes_encrypt()'],['../a01439.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fencrypt_5fext_36',['atcab_aes_encrypt_ext',['../a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01439.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5faad_5fupdate_37',['atcab_aes_gcm_aad_update',['../a01439.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01439.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01452.html#a5b7cd7ecd0b2526f1daa7c60ea39c581',1,'cryptoauthlib.atcab.atcab_aes_gcm_aad_update()']]], - ['atcab_5faes_5fgcm_5faad_5fupdate_5fext_38',['atcab_aes_gcm_aad_update_ext',['../a01439.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01439.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_39',['atcab_aes_gcm_decrypt_finish',['../a01439.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01439.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01452.html#aeae81b172cf9a1b8a85052b9129d9dd1',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_finish()']]], - ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_5fext_40',['atcab_aes_gcm_decrypt_finish_ext',['../a01439.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01439.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_41',['atcab_aes_gcm_decrypt_update',['../a01452.html#a5af363a108f86f636af7581097b396cd',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_update()'],['../a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01439.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_5fext_42',['atcab_aes_gcm_decrypt_update_ext',['../a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01439.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fencrypt_5ffinish_43',['atcab_aes_gcm_encrypt_finish',['../a01439.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01439.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01452.html#ae3f487577cbb7e66ccb39c8d6ea9a358',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_finish()']]], - ['atcab_5faes_5fgcm_5fencrypt_5ffinish_5fext_44',['atcab_aes_gcm_encrypt_finish_ext',['../a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01439.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fencrypt_5fupdate_45',['atcab_aes_gcm_encrypt_update',['../a01439.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(): atca_basic.c'],['../a01452.html#a0e5230bd79eba76c6350b724d5297310',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_update()'],['../a01439.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5fencrypt_5fupdate_5fext_46',['atcab_aes_gcm_encrypt_update_ext',['../a01439.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01439.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c']]], - ['atcab_5faes_5fgcm_5finit_47',['atcab_aes_gcm_init',['../a01439.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01439.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01452.html#a29a3eabf3e5e353e52dd52c69ea69ec4',1,'cryptoauthlib.atcab.atcab_aes_gcm_init()']]], - ['atcab_5faes_5fgcm_5finit_5fext_48',['atcab_aes_gcm_init_ext',['../a01439.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01439.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c']]], - ['atcab_5faes_5fgcm_5finit_5frand_49',['atcab_aes_gcm_init_rand',['../a01452.html#a4a9dc88e03b9e5066ff28b8518196ce7',1,'cryptoauthlib.atcab.atcab_aes_gcm_init_rand()'],['../a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c'],['../a01439.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c']]], - ['atcab_5faes_5fgfm_50',['atcab_aes_gfm',['../a01439.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(const uint8_t *h, const uint8_t *input, uint8_t *output): atca_basic.c'],['../a01439.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(const uint8_t *h, const uint8_t *input, uint8_t *output): atca_basic.c'],['../a01452.html#ad9bd7c6cc3e26cca5865dda3c02bcce2',1,'cryptoauthlib.atcab.atcab_aes_gfm()']]], - ['atcab_5fbase64decode_51',['atcab_base64decode',['../a00251.html#a6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c'],['../a01439.html#ga6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c']]], - ['atcab_5fbase64decode_5f_52',['atcab_base64decode_',['../a00251.html#a55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c'],['../a01439.html#ga55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c']]], - ['atcab_5fbase64encode_53',['atcab_base64encode',['../a00251.html#a3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c'],['../a01439.html#ga3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c']]], - ['atcab_5fbase64encode_5f_54',['atcab_base64encode_',['../a00251.html#aeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c'],['../a01439.html#gaeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c']]], - ['atcab_5fbin2hex_55',['atcab_bin2hex',['../a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c'],['../a01439.html#gae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c']]], - ['atcab_5fbin2hex_5f_56',['atcab_bin2hex_',['../a00251.html#a40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c'],['../a01439.html#ga40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c']]], - ['atcab_5fchallenge_57',['atcab_challenge',['../a01439.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01439.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01452.html#a40bc5aa6ac58d01d4ee7888dddd884bb',1,'cryptoauthlib.atcab.atcab_challenge(num_in)']]], - ['atcab_5fchallenge_5fseed_5fupdate_58',['atcab_challenge_seed_update',['../a01452.html#a0cefee590d648d724f343488569c10df',1,'cryptoauthlib.atcab.atcab_challenge_seed_update()'],['../a01439.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01439.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fcheckmac_59',['atcab_checkmac',['../a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01439.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01452.html#aba58d5a7562b69d72c33cfda82c2b580',1,'cryptoauthlib.atcab.atcab_checkmac()']]], - ['atcab_5fcheckmac_5fwith_5fresponse_5fmac_60',['atcab_checkmac_with_response_mac',['../a01439.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01439.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c']]], - ['atcab_5fcmp_5fconfig_5fzone_61',['atcab_cmp_config_zone',['../a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c'],['../a01439.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c'],['../a01452.html#af312843ce780c0062f9067c182ad2db6',1,'cryptoauthlib.atcab.atcab_cmp_config_zone()']]], - ['atcab_5fcounter_62',['atcab_counter',['../a01439.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01439.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01452.html#ade607e2a5b08d77e4559161dfac0c0e8',1,'cryptoauthlib.atcab.atcab_counter()']]], - ['atcab_5fcounter_5fincrement_63',['atcab_counter_increment',['../a01439.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01439.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01452.html#a216d7fa1d484d6a4ecf55d7886c355ef',1,'cryptoauthlib.atcab.atcab_counter_increment(counter_id, counter_value)']]], - ['atcab_5fcounter_5fread_64',['atcab_counter_read',['../a01452.html#ae40c31b557e83cd4c590288082d07d6e',1,'cryptoauthlib.atcab.atcab_counter_read()'],['../a01439.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01439.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c']]], - ['atcab_5fderivekey_65',['atcab_derivekey',['../a01439.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01439.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01452.html#af411b3996170b6dd0e90dc999c896d19',1,'cryptoauthlib.atcab.atcab_derivekey()']]], - ['atcab_5fderivekey_5fext_66',['atcab_derivekey_ext',['../a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01439.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c']]], - ['atcab_5fecdh_67',['atcab_ecdh',['../a01439.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01439.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01452.html#a8e85d04188b3d10cccaf6641bf5753fe',1,'cryptoauthlib.atcab.atcab_ecdh()']]], - ['atcab_5fecdh_5fbase_68',['atcab_ecdh_base',['../a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(): atca_basic.c'],['../a01452.html#a84c655ca82b1c0ed968be7d63be4a5f2',1,'cryptoauthlib.atcab.atcab_ecdh_base()'],['../a01439.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce): atca_basic.c']]], - ['atcab_5fecdh_5fenc_69',['atcab_ecdh_enc',['../a01439.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01452.html#ae3505ac892b47a7384a9ec95338bee22',1,'cryptoauthlib.atcab.atcab_ecdh_enc()']]], - ['atcab_5fecdh_5fioenc_70',['atcab_ecdh_ioenc',['../a01439.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01439.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01452.html#adefdce788a6ef35250f5b1c139454b64',1,'cryptoauthlib.atcab.atcab_ecdh_ioenc()']]], - ['atcab_5fecdh_5ftempkey_71',['atcab_ecdh_tempkey',['../a01439.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(): atca_basic.c'],['../a01452.html#a3a1b9396c4a6aec1fc32839fe681f3a9',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey()'],['../a01439.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(const uint8_t *public_key, uint8_t *pms): atca_basic.c']]], - ['atcab_5fecdh_5ftempkey_5fioenc_72',['atcab_ecdh_tempkey_ioenc',['../a01439.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01439.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01452.html#ac6eb9270fa4c963d6ebba79aea1ddc4b',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey_ioenc()']]], - ['atcab_5fgendig_73',['atcab_gendig',['../a01439.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c'],['../a01439.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c'],['../a01452.html#a8b0381ac0e872d25df0373d9cd9ce4af',1,'cryptoauthlib.atcab.atcab_gendig()']]], - ['atcab_5fgendivkey_74',['atcab_gendivkey',['../a01439.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c'],['../a01439.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c']]], - ['atcab_5fgenkey_75',['atcab_genkey',['../a01439.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(): atca_basic.c'],['../a01452.html#acef9ae292bb3e6c3c1c1b16a20bd6494',1,'cryptoauthlib.atcab.atcab_genkey()'],['../a01439.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fgenkey_5fbase_76',['atcab_genkey_base',['../a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c'],['../a01439.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c'],['../a01452.html#aa1e87847ce5fccdef062c9aaa5bea65e',1,'cryptoauthlib.atcab.atcab_genkey_base()']]], - ['atcab_5fgenkey_5fext_77',['atcab_genkey_ext',['../a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fget_5fdevice_78',['atcab_get_device',['../a01452.html#a2087c24eeaa066ab0481265ca17b62fb',1,'cryptoauthlib.atcab.atcab_get_device()'],['../a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(void): atca_basic.c'],['../a01439.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(void): atca_basic.c']]], - ['atcab_5fget_5fdevice_5faddress_79',['atcab_get_device_address',['../a01439.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c'],['../a01439.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c']]], - ['atcab_5fget_5fdevice_5ftype_80',['atcab_get_device_type',['../a01439.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(): atca_basic.c'],['../a01452.html#a63e034778c2964569df7a6fb0ec0a8f1',1,'cryptoauthlib.atcab.atcab_get_device_type()'],['../a01439.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(void): atca_basic.c']]], - ['atcab_5fget_5fdevice_5ftype_5fext_81',['atcab_get_device_type_ext',['../a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c'],['../a01439.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c']]], - ['atcab_5fget_5fpubkey_82',['atcab_get_pubkey',['../a01439.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01452.html#aac8a5ac8d26586ed7a707ddf2224ecd8',1,'cryptoauthlib.atcab.atcab_get_pubkey()']]], - ['atcab_5fget_5fpubkey_5fext_83',['atcab_get_pubkey_ext',['../a01439.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01439.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fget_5fzone_5fsize_84',['atcab_get_zone_size',['../a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01439.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], - ['atcab_5fget_5fzone_5fsize_5fext_85',['atcab_get_zone_size_ext',['../a01439.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01439.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], - ['atcab_5fhex2bin_86',['atcab_hex2bin',['../a00251.html#a481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c'],['../a01439.html#ga481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c']]], - ['atcab_5fhmac_87',['atcab_hmac',['../a01452.html#abcef2cce95ddc7363a687ee4cf238671',1,'cryptoauthlib.atcab.atcab_hmac()'],['../a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c'],['../a01439.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c']]], - ['atcab_5fhw_5fsha2_5f256_88',['atcab_hw_sha2_256',['../a01439.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01439.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01452.html#aec129bd1fae35bcb87dd129ca4e065ca',1,'cryptoauthlib.atcab.atcab_hw_sha2_256()']]], - ['atcab_5fhw_5fsha2_5f256_5ffinish_89',['atcab_hw_sha2_256_finish',['../a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01439.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01452.html#a6f0cb9bd0b1cecd09fa765083d998db1',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_finish()']]], - ['atcab_5fhw_5fsha2_5f256_5finit_90',['atcab_hw_sha2_256_init',['../a01439.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(): atca_basic.c'],['../a01452.html#a213e34c48cf1f6a119979ae00acebee5',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_init()'],['../a01439.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(atca_sha256_ctx_t *ctx): atca_basic.c']]], - ['atcab_5fhw_5fsha2_5f256_5fupdate_91',['atcab_hw_sha2_256_update',['../a01439.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01439.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01452.html#a4c9b8fd51581178ad0d988f64e2df04c',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_update()']]], - ['atcab_5fidle_92',['atcab_idle',['../a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c'],['../a01439.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c']]], - ['atcab_5finfo_93',['atcab_info',['../a01452.html#add3fb2f7c78eb84e42bcb17800f2c6de',1,'cryptoauthlib.atcab.atcab_info()'],['../a01439.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c'],['../a01439.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c']]], - ['atcab_5finfo_5fbase_94',['atcab_info_base',['../a01439.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(): atca_basic.c'],['../a01452.html#af03e307e61709bff1443d0f72a2efdb9',1,'cryptoauthlib.atcab.atcab_info_base()'],['../a01439.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(uint8_t mode, uint16_t param2, uint8_t *out_data): atca_basic.c']]], - ['atcab_5finfo_5fchip_5fstatus_95',['atcab_info_chip_status',['../a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c'],['../a01439.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c']]], - ['atcab_5finfo_5fext_96',['atcab_info_ext',['../a01439.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c'],['../a01439.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c']]], - ['atcab_5finfo_5fget_5flatch_97',['atcab_info_get_latch',['../a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(): atca_basic.c'],['../a01452.html#ab21835e5b3b868f49faecd453d8da4e3',1,'cryptoauthlib.atcab.atcab_info_get_latch()'],['../a01439.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(bool *state): atca_basic.c']]], - ['atcab_5finfo_5flock_5fstatus_98',['atcab_info_lock_status',['../a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c'],['../a01439.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c']]], - ['atcab_5finfo_5fset_5flatch_99',['atcab_info_set_latch',['../a01439.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01439.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01452.html#a0ae7c88423c60e7dd7fefff75d443c35',1,'cryptoauthlib.atcab.atcab_info_set_latch(state)']]], - ['atcab_5finit_100',['atcab_init',['../a01452.html#ad7cc965be77a8f829027f9afc21556b5',1,'cryptoauthlib.atcab.atcab_init()'],['../a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c'],['../a01439.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c']]], - ['atcab_5finit_5fdevice_101',['atcab_init_device',['../a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c'],['../a01439.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c']]], - ['atcab_5finit_5fext_102',['atcab_init_ext',['../a01439.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c'],['../a01439.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c']]], - ['atcab_5fis_5fca2_5fdevice_103',['atcab_is_ca2_device',['../a01439.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c'],['../a01439.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c']]], - ['atcab_5fis_5fca_5fdevice_104',['atcab_is_ca_device',['../a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c'],['../a01439.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c']]], - ['atcab_5fis_5fconfig_5flocked_105',['atcab_is_config_locked',['../a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c'],['../a01439.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fconfig_5flocked_5fext_106',['atcab_is_config_locked_ext',['../a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01439.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fdata_5flocked_107',['atcab_is_data_locked',['../a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c'],['../a01439.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fdata_5flocked_5fext_108',['atcab_is_data_locked_ext',['../a01439.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01439.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5flocked_109',['atcab_is_locked',['../a01452.html#a035fb2c7a593d20f479943c0d74df245',1,'cryptoauthlib.atcab.atcab_is_locked()'],['../a01439.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c'],['../a01439.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fprivate_5fext_110',['atcab_is_private_ext',['../a01439.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c'],['../a01439.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c']]], - ['atcab_5fis_5fslot_5flocked_111',['atcab_is_slot_locked',['../a01439.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01439.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01452.html#ac73a52d0b4b8104accb6f34542d06e85',1,'cryptoauthlib.atcab.atcab_is_slot_locked()']]], - ['atcab_5fis_5fslot_5flocked_5fext_112',['atcab_is_slot_locked_ext',['../a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c'],['../a01439.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c']]], - ['atcab_5fis_5fta_5fdevice_113',['atcab_is_ta_device',['../a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c'],['../a01439.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c']]], - ['atcab_5fkdf_114',['atcab_kdf',['../a01439.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(): atca_basic.c'],['../a01452.html#a760c91e04ad8a62181956b73ada2e384',1,'cryptoauthlib.atcab.atcab_kdf()'],['../a01439.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c']]], - ['atcab_5flock_115',['atcab_lock',['../a01439.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01439.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01452.html#a384368c23f29b2008c79effe063da77d',1,'cryptoauthlib.atcab.atcab_lock()']]], - ['atcab_5flock_5fconfig_5fzone_116',['atcab_lock_config_zone',['../a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c'],['../a01439.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c'],['../a01452.html#a13f0865a1ac2377282b29d6721b5c834',1,'cryptoauthlib.atcab.atcab_lock_config_zone()']]], - ['atcab_5flock_5fconfig_5fzone_5fcrc_117',['atcab_lock_config_zone_crc',['../a01439.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(): atca_basic.c'],['../a01452.html#a64223730cf6d1f1ecb48ebcfaffea75c',1,'cryptoauthlib.atcab.atcab_lock_config_zone_crc()'],['../a01439.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c']]], - ['atcab_5flock_5fconfig_5fzone_5fext_118',['atcab_lock_config_zone_ext',['../a01439.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c'],['../a01439.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c']]], - ['atcab_5flock_5fdata_5fslot_119',['atcab_lock_data_slot',['../a01439.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01439.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01452.html#a0738f317bdd3c1decb934971e66ee66c',1,'cryptoauthlib.atcab.atcab_lock_data_slot()']]], - ['atcab_5flock_5fdata_5fslot_5fext_120',['atcab_lock_data_slot_ext',['../a01439.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c'],['../a01439.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c']]], - ['atcab_5flock_5fdata_5fzone_121',['atcab_lock_data_zone',['../a01439.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(): atca_basic.c'],['../a01452.html#ad4c4f17808f4904cef59fb3c6a3060e1',1,'cryptoauthlib.atcab.atcab_lock_data_zone()'],['../a01439.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(void): atca_basic.c']]], - ['atcab_5flock_5fdata_5fzone_5fcrc_122',['atcab_lock_data_zone_crc',['../a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01439.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01452.html#a037d202036ce67334a0dc1dd5b714c3e',1,'cryptoauthlib.atcab.atcab_lock_data_zone_crc()']]], - ['atcab_5flock_5fdata_5fzone_5fext_123',['atcab_lock_data_zone_ext',['../a01439.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c'],['../a01439.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c']]], - ['atcab_5fmac_124',['atcab_mac',['../a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(): atca_basic.c'],['../a01452.html#a02089d61678b8d494424c16bb612b8ad',1,'cryptoauthlib.atcab.atcab_mac()'],['../a01439.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest): atca_basic.c']]], - ['atcab_5fmemset_5fs_125',['atcab_memset_s',['../a00251.html#ac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c'],['../a01439.html#gac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c']]], - ['atcab_5fnonce_126',['atcab_nonce',['../a01439.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01439.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01452.html#ad4e841d49e6fd9d67c664f020877e730',1,'cryptoauthlib.atcab.atcab_nonce()']]], - ['atcab_5fnonce_5fbase_127',['atcab_nonce_base',['../a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01439.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01452.html#afcb4ae6dd50b4449b6de4d1d0754601d',1,'cryptoauthlib.atcab.atcab_nonce_base()']]], - ['atcab_5fnonce_5fload_128',['atcab_nonce_load',['../a01439.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(uint8_t target, const uint8_t *num_in, uint16_t num_in_size): atca_basic.c'],['../a01439.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(uint8_t target, const uint8_t *num_in, uint16_t num_in_size): atca_basic.c'],['../a01452.html#adf1843ed620eb72a9efc75ff0251efa6',1,'cryptoauthlib.atcab.atcab_nonce_load()']]], - ['atcab_5fnonce_5frand_129',['atcab_nonce_rand',['../a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01439.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01452.html#a75272bce518cb8b951b9adae61a02c58',1,'cryptoauthlib.atcab.atcab_nonce_rand()']]], - ['atcab_5fnonce_5frand_5fext_130',['atcab_nonce_rand_ext',['../a01439.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01439.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fpointer_5fdelta_131',['atcab_pointer_delta',['../a01439.html#ga72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c'],['../a00251.html#a72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c']]], - ['atcab_5fpriv_5fwrite_132',['atcab_priv_write',['../a01439.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01452.html#ac94db106ce16b83c5f5518cf92e24d4d',1,'cryptoauthlib.atcab.atcab_priv_write()']]], - ['atcab_5frandom_133',['atcab_random',['../a01439.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01439.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01452.html#a8d6436e974c3780cb205261049fbbb87',1,'cryptoauthlib.atcab.atcab_random()']]], - ['atcab_5frandom_5fext_134',['atcab_random_ext',['../a01439.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c'],['../a01439.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c']]], - ['atcab_5fread_5fbytes_5fzone_135',['atcab_read_bytes_zone',['../a01439.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(): atca_basic.c'],['../a01452.html#abd3403fcc46a2b82556784e142161c65',1,'cryptoauthlib.atcab.atcab_read_bytes_zone()'],['../a01439.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c']]], - ['atcab_5fread_5fconfig_5fzone_136',['atcab_read_config_zone',['../a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01439.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01452.html#a5dfdc90856af9f03e09cc280dcfe3de0',1,'cryptoauthlib.atcab.atcab_read_config_zone()']]], - ['atcab_5fread_5fconfig_5fzone_5fext_137',['atcab_read_config_zone_ext',['../a01439.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c'],['../a01439.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c']]], - ['atcab_5fread_5fenc_138',['atcab_read_enc',['../a01452.html#a87c05138d598087100ec1e740bf9e221',1,'cryptoauthlib.atcab.atcab_read_enc()'],['../a01439.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c']]], - ['atcab_5fread_5fpubkey_139',['atcab_read_pubkey',['../a01439.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(): atca_basic.c'],['../a01452.html#a03506fe5daef9a019b2688e49af8a725',1,'cryptoauthlib.atcab.atcab_read_pubkey()'],['../a01439.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(uint16_t slot, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fread_5fpubkey_5fext_140',['atcab_read_pubkey_ext',['../a01439.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c'],['../a01439.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c']]], - ['atcab_5fread_5fserial_5fnumber_141',['atcab_read_serial_number',['../a01439.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(): atca_basic.c'],['../a01452.html#a903f3bc6862860693f3d0c7fcfb68abd',1,'cryptoauthlib.atcab.atcab_read_serial_number()'],['../a01439.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(uint8_t *serial_number): atca_basic.c']]], - ['atcab_5fread_5fserial_5fnumber_5fext_142',['atcab_read_serial_number_ext',['../a01439.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c'],['../a01439.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c']]], - ['atcab_5fread_5fsig_143',['atcab_read_sig',['../a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01439.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01452.html#a643bc00f84713b2e8705021f6b2c2d0f',1,'cryptoauthlib.atcab.atcab_read_sig(slot, sig)']]], - ['atcab_5fread_5fzone_144',['atcab_read_zone',['../a01452.html#ae74a63edf1522697556aa1d98493b15b',1,'cryptoauthlib.atcab.atcab_read_zone()'],['../a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c']]], - ['atcab_5fread_5fzone_5fext_145',['atcab_read_zone_ext',['../a01439.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c']]], - ['atcab_5frelease_146',['atcab_release',['../a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c'],['../a01439.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c'],['../a01452.html#a6b784447f8cf2cfc112ab33a4b10ce22',1,'cryptoauthlib.atcab.atcab_release()']]], - ['atcab_5frelease_5fext_147',['atcab_release_ext',['../a01439.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c'],['../a01439.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c']]], - ['atcab_5freversal_148',['atcab_reversal',['../a00251.html#a7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c'],['../a01439.html#ga7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c']]], - ['atcab_5fsecureboot_149',['atcab_secureboot',['../a01439.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01439.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01452.html#a7063655ccab4af3b185ff519a40329e0',1,'cryptoauthlib.atcab.atcab_secureboot()']]], - ['atcab_5fsecureboot_5fmac_150',['atcab_secureboot_mac',['../a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01452.html#a3e585d7d21fb74154c4e53d541db9e5a',1,'cryptoauthlib.atcab.atcab_secureboot_mac(mode, digest, signature, num_in, io_keys, is_verified)']]], - ['atcab_5fselftest_151',['atcab_selftest',['../a01452.html#ab078cd0a92f0f235fa36fb06ccf4af19',1,'cryptoauthlib.atcab.atcab_selftest()'],['../a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c'],['../a01439.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c']]], - ['atcab_5fsha_152',['atcab_sha',['../a01439.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c'],['../a01439.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c'],['../a01452.html#a583ddc1d9adbdceea0a7617c6b87ff8d',1,'cryptoauthlib.atcab.atcab_sha()']]], - ['atcab_5fsha_5fbase_153',['atcab_sha_base',['../a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c'],['../a01439.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c'],['../a01452.html#a49b55d1996aee8c868684a916341522f',1,'cryptoauthlib.atcab.atcab_sha_base()']]], - ['atcab_5fsha_5fend_154',['atcab_sha_end',['../a01439.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(): atca_basic.c'],['../a01452.html#a7ffc1b8652c148a1c3a86ef80155502c',1,'cryptoauthlib.atcab.atcab_sha_end()'],['../a01439.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c']]], - ['atcab_5fsha_5fhmac_155',['atcab_sha_hmac',['../a01439.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01439.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01452.html#a0589fee6cdf8761c032b330a3079e0e0',1,'cryptoauthlib.atcab.atcab_sha_hmac()']]], - ['atcab_5fsha_5fhmac_5fext_156',['atcab_sha_hmac_ext',['../a01439.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01439.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c']]], - ['atcab_5fsha_5fhmac_5ffinish_157',['atcab_sha_hmac_finish',['../a01439.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01439.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01452.html#a897a5ee03a68bba8afe2371f89a6d7a5',1,'cryptoauthlib.atcab.atcab_sha_hmac_finish()']]], - ['atcab_5fsha_5fhmac_5finit_158',['atcab_sha_hmac_init',['../a01439.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01439.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01452.html#a6d243431c455704e03f148b9e373db51',1,'cryptoauthlib.atcab.atcab_sha_hmac_init()']]], - ['atcab_5fsha_5fhmac_5fupdate_159',['atcab_sha_hmac_update',['../a01439.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01439.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01452.html#a323b71e8080719b27a45f63bb8ef6a59',1,'cryptoauthlib.atcab.atcab_sha_hmac_update(ctx, data, data_size)']]], - ['atcab_5fsha_5fread_5fcontext_160',['atcab_sha_read_context',['../a01452.html#a4bcf510aa10502e29fe2321486019fb5',1,'cryptoauthlib.atcab.atcab_sha_read_context()'],['../a01439.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01439.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c']]], - ['atcab_5fsha_5fstart_161',['atcab_sha_start',['../a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01439.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01452.html#a3fee574ed2618a6abc770bb1f17dc6b5',1,'cryptoauthlib.atcab.atcab_sha_start()']]], - ['atcab_5fsha_5fupdate_162',['atcab_sha_update',['../a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c'],['../a01439.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c'],['../a01452.html#a91f72328d639d88598498c37cb552ffb',1,'cryptoauthlib.atcab.atcab_sha_update()']]], - ['atcab_5fsha_5fwrite_5fcontext_163',['atcab_sha_write_context',['../a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(): atca_basic.c'],['../a01452.html#acc277568c5c42424ff90d8bfcee667b8',1,'cryptoauthlib.atcab.atcab_sha_write_context()'],['../a01439.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c']]], - ['atcab_5fsign_164',['atcab_sign',['../a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01439.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01452.html#a14fe9d38029d932b4aef6802bbf078ab',1,'cryptoauthlib.atcab.atcab_sign()']]], - ['atcab_5fsign_5fbase_165',['atcab_sign_base',['../a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01439.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01452.html#a8728f5f5bf67ede8dce575af486499c9',1,'cryptoauthlib.atcab.atcab_sign_base()']]], - ['atcab_5fsign_5fext_166',['atcab_sign_ext',['../a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01439.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c']]], - ['atcab_5fsign_5finternal_167',['atcab_sign_internal',['../a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(): atca_basic.c'],['../a01452.html#af218c61a8dd3d937e5dfd3ad2d0c2701',1,'cryptoauthlib.atcab.atcab_sign_internal()'],['../a01439.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature): atca_basic.c']]], - ['atcab_5fsleep_168',['atcab_sleep',['../a01439.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c'],['../a01439.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c']]], - ['atcab_5fupdateextra_169',['atcab_updateextra',['../a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01439.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01452.html#a76dda154eba75b7c0c8f6a8fcc5d346a',1,'cryptoauthlib.atcab.atcab_updateextra()']]], - ['atcab_5fverify_170',['atcab_verify',['../a01439.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01439.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01452.html#a40e190b9a9b0bb5aa2389cc482f94780',1,'cryptoauthlib.atcab.atcab_verify()']]], - ['atcab_5fverify_5fextern_171',['atcab_verify_extern',['../a01439.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01452.html#a692a721d89bd8f4032502f343d3f1718',1,'cryptoauthlib.atcab.atcab_verify_extern()']]], - ['atcab_5fverify_5fextern_5fext_172',['atcab_verify_extern_ext',['../a01439.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fextern_5fmac_173',['atcab_verify_extern_mac',['../a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01439.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01452.html#ae8ab769023a1d717198eb06aa17ff8b0',1,'cryptoauthlib.atcab.atcab_verify_extern_mac(message, signature, public_key, num_in, io_key, is_verified)']]], - ['atcab_5fverify_5fextern_5fstored_5fmac_174',['atcab_verify_extern_stored_mac',['../a01452.html#aadca3cb06b25a8b3b8c6a851ad477db0',1,'cryptoauthlib::atcab']]], - ['atcab_5fverify_5finvalidate_175',['atcab_verify_invalidate',['../a01439.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(): atca_basic.c'],['../a01452.html#a49f823cd787be6ed036e7bc1e430b384',1,'cryptoauthlib.atcab.atcab_verify_invalidate()'],['../a01439.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fstored_176',['atcab_verify_stored',['../a01439.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01439.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01452.html#a90baa667a1e6bb223cda44f4322c2f44',1,'cryptoauthlib.atcab.atcab_verify_stored()']]], - ['atcab_5fverify_5fstored_5fext_177',['atcab_verify_stored_ext',['../a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01439.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fstored_5fmac_178',['atcab_verify_stored_mac',['../a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(): atca_basic.c'],['../a01452.html#a4b1ae9a8e89b7038fd5f75686ca97e31',1,'cryptoauthlib.atcab.atcab_verify_stored_mac()'],['../a01439.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fstored_5fwith_5ftempkey_179',['atcab_verify_stored_with_tempkey',['../a01439.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01439.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], - ['atcab_5fverify_5fvalidate_180',['atcab_verify_validate',['../a01439.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01439.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01452.html#a627d101aa165533d893461f5fb39efa1',1,'cryptoauthlib.atcab.atcab_verify_validate()']]], - ['atcab_5fversion_181',['atcab_version',['../a01439.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c'],['../a01439.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c']]], - ['atcab_5fwakeup_182',['atcab_wakeup',['../a01439.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c'],['../a01439.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c']]], - ['atcab_5fwrite_183',['atcab_write',['../a01439.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c'],['../a01439.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c'],['../a01452.html#acd0f0264807684089bb1ab8bdfcb989f',1,'cryptoauthlib.atcab.atcab_write()']]], - ['atcab_5fwrite_5fbytes_5fzone_184',['atcab_write_bytes_zone',['../a01439.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length): atca_basic.c'],['../a01439.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length): atca_basic.c'],['../a01452.html#a5db76308f0e51108dea8222f14ac405e',1,'cryptoauthlib.atcab.atcab_write_bytes_zone()']]], - ['atcab_5fwrite_5fconfig_5fcounter_185',['atcab_write_config_counter',['../a01439.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(): atca_basic.c'],['../a01452.html#aff3e1986bf6d79a353f8820fe5ed4306',1,'cryptoauthlib.atcab.atcab_write_config_counter()'],['../a01439.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c']]], - ['atcab_5fwrite_5fconfig_5fzone_186',['atcab_write_config_zone',['../a01439.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01439.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01452.html#a4144ba085c025b94f6d39de2ba33dc26',1,'cryptoauthlib.atcab.atcab_write_config_zone()']]], - ['atcab_5fwrite_5fconfig_5fzone_5fext_187',['atcab_write_config_zone_ext',['../a01439.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c'],['../a01439.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c']]], - ['atcab_5fwrite_5fenc_188',['atcab_write_enc',['../a01452.html#ae8faf982d17b5fc72231bc648a51063a',1,'cryptoauthlib.atcab.atcab_write_enc()'],['../a01439.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01439.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c']]], - ['atcab_5fwrite_5fpubkey_189',['atcab_write_pubkey',['../a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01439.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01452.html#a64692832da534aacee8a61cef74e9be1',1,'cryptoauthlib.atcab.atcab_write_pubkey()']]], - ['atcab_5fwrite_5fpubkey_5fext_190',['atcab_write_pubkey_ext',['../a01439.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01439.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c']]], - ['atcab_5fwrite_5fzone_191',['atcab_write_zone',['../a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01452.html#a18b7743ebac58022a1f704cb3b011803',1,'cryptoauthlib.atcab.atcab_write_zone()']]], - ['atcab_5fwrite_5fzone_5fext_192',['atcab_write_zone_ext',['../a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01439.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c']]], - ['atcac_5faes_5fcmac_5ffinish_193',['atcac_aes_cmac_finish',['../a00656.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_mbedtls_wrap.c'],['../a00662.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_openssl_interface.c']]], - ['atcac_5faes_5fcmac_5finit_194',['atcac_aes_cmac_init',['../a00656.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c'],['../a00662.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fcmac_5fupdate_195',['atcac_aes_cmac_update',['../a00656.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5faad_5fupdate_196',['atcac_aes_gcm_aad_update',['../a00662.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_openssl_interface.c'],['../a00656.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_mbedtls_wrap.c']]], - ['atcac_5faes_5fgcm_5fdecrypt_5ffinish_197',['atcac_aes_gcm_decrypt_finish',['../a00656.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_mbedtls_wrap.c'],['../a00662.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fdecrypt_5fstart_198',['atcac_aes_gcm_decrypt_start',['../a00656.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00662.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fdecrypt_5fupdate_199',['atcac_aes_gcm_decrypt_update',['../a00656.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_mbedtls_wrap.c'],['../a00662.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fencrypt_5ffinish_200',['atcac_aes_gcm_encrypt_finish',['../a00656.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_mbedtls_wrap.c'],['../a00662.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fencrypt_5fstart_201',['atcac_aes_gcm_encrypt_start',['../a00656.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00662.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], - ['atcac_5faes_5fgcm_5fencrypt_5fupdate_202',['atcac_aes_gcm_encrypt_update',['../a00656.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_mbedtls_wrap.c'],['../a00662.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_openssl_interface.c']]], - ['atcac_5fpk_5fderive_203',['atcac_pk_derive',['../a00656.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00662.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], - ['atcac_5fpk_5ffree_204',['atcac_pk_free',['../a00656.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_mbedtls_wrap.c'],['../a00662.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_openssl_interface.c']]], - ['atcac_5fpk_5finit_205',['atcac_pk_init',['../a00656.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_mbedtls_wrap.c'],['../a00662.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_openssl_interface.c']]], - ['atcac_5fpk_5finit_5fpem_206',['atcac_pk_init_pem',['../a00656.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_mbedtls_wrap.c'],['../a00662.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_openssl_interface.c']]], - ['atcac_5fpk_5fpublic_207',['atcac_pk_public',['../a00662.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c'],['../a00656.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c']]], - ['atcac_5fpk_5fsign_208',['atcac_pk_sign',['../a00656.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_mbedtls_wrap.c'],['../a00662.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_openssl_interface.c']]], - ['atcac_5fpk_5fverify_209',['atcac_pk_verify',['../a00656.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_mbedtls_wrap.c'],['../a00662.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_openssl_interface.c']]], - ['atcac_5fsha256_5fhmac_5ffinish_210',['atcac_sha256_hmac_finish',['../a00656.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_mbedtls_wrap.c'],['../a00662.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_openssl_interface.c']]], - ['atcac_5fsha256_5fhmac_5finit_211',['atcac_sha256_hmac_init',['../a00656.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c'],['../a00662.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c']]], - ['atcac_5fsha256_5fhmac_5fupdate_212',['atcac_sha256_hmac_update',['../a00656.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcac_5fsw_5frandom_213',['atcac_sw_random',['../a00656.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha1_5ffinish_214',['atcac_sw_sha1_finish',['../a00656.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_mbedtls_wrap.c'],['../a00662.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha1_5finit_215',['atcac_sw_sha1_init',['../a00656.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_mbedtls_wrap.c'],['../a00662.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha1_5fupdate_216',['atcac_sw_sha1_update',['../a00656.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha2_5f256_5ffinish_217',['atcac_sw_sha2_256_finish',['../a00656.html#a41146dace082e493f250425972a04d7f',1,'atcac_sw_sha2_256_finish(struct atcac_sha2_256_ctx *ctx, uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE]): atca_mbedtls_wrap.c'],['../a00662.html#a41146dace082e493f250425972a04d7f',1,'atcac_sw_sha2_256_finish(struct atcac_sha2_256_ctx *ctx, uint8_t digest[ATCA_SHA2_256_DIGEST_SIZE]): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha2_5f256_5finit_218',['atcac_sw_sha2_256_init',['../a00656.html#afb989c314b0afecd1202493a3cfee909',1,'atcac_sw_sha2_256_init(struct atcac_sha2_256_ctx *ctx): atca_mbedtls_wrap.c'],['../a00662.html#afb989c314b0afecd1202493a3cfee909',1,'atcac_sw_sha2_256_init(struct atcac_sha2_256_ctx *ctx): atca_openssl_interface.c']]], - ['atcac_5fsw_5fsha2_5f256_5fupdate_219',['atcac_sw_sha2_256_update',['../a00656.html#a1caf63c685aa46025eda5e73f8d634b5',1,'atcac_sw_sha2_256_update(struct atcac_sha2_256_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00662.html#a1caf63c685aa46025eda5e73f8d634b5',1,'atcac_sw_sha2_256_update(struct atcac_sha2_256_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], - ['atcacert_5fcalc_5fexpire_5fyears_220',['atcacert_calc_expire_years',['../a01443.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c'],['../a01443.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c']]], - ['atcacert_5fcreate_5fcsr_221',['atcacert_create_csr',['../a01453.html#a453696e86822c980d8e5b9e6a27eb861',1,'cryptoauthlib.atcacert.atcacert_create_csr()'],['../a01443.html#ga9b103dcc50fefcb19514285da7fbe296',1,'atcacert_create_csr(const atcacert_def_t *csr_def, uint8_t *csr, size_t *csr_size): atcacert_client.h']]], - ['atcacert_5fcreate_5fcsr_5fpem_222',['atcacert_create_csr_pem',['../a01443.html#ga1e4f207e7180d504c5dd369cd20fef21',1,'atcacert_create_csr_pem(): atcacert_client.h'],['../a01453.html#a6c23b4916b8fa6dc8aa56b45f558d870',1,'cryptoauthlib.atcacert.atcacert_create_csr_pem()']]], - ['atcacert_5fdate_5fcmp_223',['atcacert_date_cmp',['../a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c'],['../a01443.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c']]], - ['atcacert_5fdate_5fdec_224',['atcacert_date_dec',['../a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01443.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01453.html#a7e05b319688a07bbfeee23895341303e',1,'cryptoauthlib.atcacert.atcacert_date_dec()']]], - ['atcacert_5fdate_5fdec_5fcompcert_225',['atcacert_date_dec_compcert',['../a01443.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(): atcacert_date.c'],['../a01453.html#a7910146d6e2097e9fb075a2bf60d1b25',1,'cryptoauthlib.atcacert.atcacert_date_dec_compcert()'],['../a01443.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], - ['atcacert_5fdate_5fdec_5fcompcert_5fext_226',['atcacert_date_dec_compcert_ext',['../a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01443.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], - ['atcacert_5fdate_5fenc_227',['atcacert_date_enc',['../a01443.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01443.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01453.html#a23ff0ccfc75d564fc9f6200ef8cff5fb',1,'cryptoauthlib.atcacert.atcacert_date_enc(date_format, timestamp, formatted_date, formatted_date_size)']]], - ['atcacert_5fdate_5fenc_5fcompcert_228',['atcacert_date_enc_compcert',['../a01453.html#a82bd7bbea46866cb644016ea7faff329',1,'cryptoauthlib.atcacert.atcacert_date_enc_compcert()'],['../a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c'],['../a01443.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c']]], - ['atcacert_5fdate_5fenc_5fcompcert_5fext_229',['atcacert_date_enc_compcert_ext',['../a01443.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c'],['../a01443.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c']]], - ['atcacert_5fdate_5ffrom_5fasn1_5ftag_230',['atcacert_date_from_asn1_tag',['../a01443.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c'],['../a01443.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c']]], - ['atcacert_5fdate_5fget_5fmax_5fdate_231',['atcacert_date_get_max_date',['../a01443.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01443.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01453.html#a0ffefee23107bcbbadef2508ccaaba4f',1,'cryptoauthlib.atcacert.atcacert_date_get_max_date()']]], - ['atcacert_5fdecode_5fpem_232',['atcacert_decode_pem',['../a00317.html#a32d4e4f417e88b56b9adc5b7c521d545',1,'atcacert_pem.h']]], - ['atcacert_5fdecode_5fpem_5fcert_233',['atcacert_decode_pem_cert',['../a00317.html#a5ee7c8e3893e67ae0a622bddc443bcbd',1,'atcacert_pem.h']]], - ['atcacert_5fdecode_5fpem_5fcsr_234',['atcacert_decode_pem_csr',['../a00317.html#adfccc0bc91b144dffab3aba96126800f',1,'atcacert_pem.h']]], - ['atcacert_5fder_5fdec_5fecdsa_5fsig_5fvalue_235',['atcacert_der_dec_ecdsa_sig_value',['../a01443.html#gab22e2c8bf627f700be0e10e331bfdb1f',1,'atcacert_der.h']]], - ['atcacert_5fder_5fdec_5finteger_236',['atcacert_der_dec_integer',['../a01443.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb',1,'atcacert_der.h']]], - ['atcacert_5fder_5fdec_5flength_237',['atcacert_der_dec_length',['../a01443.html#ga9d4810aa2fd1db14a8f91204387fd972',1,'atcacert_der.h']]], - ['atcacert_5fder_5fenc_5fecdsa_5fsig_5fvalue_238',['atcacert_der_enc_ecdsa_sig_value',['../a01443.html#gacee7e7eb74c022b2ea70c7a549d5f876',1,'atcacert_der.h']]], - ['atcacert_5fder_5fenc_5finteger_239',['atcacert_der_enc_integer',['../a01443.html#gadc86044101ad9a87556d49ab8bf892af',1,'atcacert_der.h']]], - ['atcacert_5fder_5fenc_5flength_240',['atcacert_der_enc_length',['../a01443.html#ga5866e20dc2c7f9d788924155eac4fece',1,'atcacert_der.h']]], - ['atcacert_5fencode_5fpem_241',['atcacert_encode_pem',['../a00317.html#a65ca7cd1f2358ad40ae4c8c13f6d817c',1,'atcacert_pem.h']]], - ['atcacert_5fencode_5fpem_5fcert_242',['atcacert_encode_pem_cert',['../a00317.html#a206c4857a73ccfc7898131b61d43ba67',1,'atcacert_pem.h']]], - ['atcacert_5fencode_5fpem_5fcsr_243',['atcacert_encode_pem_csr',['../a00317.html#ad3b6773201632141bbc95ca6d43271f9',1,'atcacert_pem.h']]], - ['atcacert_5fgen_5fchallenge_5fhw_244',['atcacert_gen_challenge_hw',['../a01443.html#ga6692847d9c41eb73e469df029697a7b9',1,'atcacert_host_hw.h']]], - ['atcacert_5fgen_5fchallenge_5fsw_245',['atcacert_gen_challenge_sw',['../a01443.html#ga883a0c84474150e6b123dfab15a8c929',1,'atcacert_host_sw.h']]], - ['atcacert_5fget_5fauth_5fkey_5fid_246',['atcacert_get_auth_key_id',['../a01443.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c'],['../a01443.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c']]], - ['atcacert_5fget_5fcert_5fsn_247',['atcacert_get_cert_sn',['../a01443.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c'],['../a01443.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c']]], - ['atcacert_5fget_5fexpire_5fdate_248',['atcacert_get_expire_date',['../a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01443.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], - ['atcacert_5fget_5fissue_5fdate_249',['atcacert_get_issue_date',['../a01443.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01443.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], - ['atcacert_5fget_5fissuer_250',['atcacert_get_issuer',['../a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c'],['../a01443.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c']]], - ['atcacert_5fget_5fresponse_251',['atcacert_get_response',['../a01443.html#ga9a9769b84557ca2c47fa4442daa9a111',1,'atcacert_get_response(): atcacert_client.h'],['../a01453.html#a9c3717acbb392ceed968c1172400e6dd',1,'cryptoauthlib.atcacert.atcacert_get_response()']]], - ['atcacert_5fget_5fsubj_5fkey_5fid_252',['atcacert_get_subj_key_id',['../a01443.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c'],['../a01443.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c']]], - ['atcacert_5fget_5fsubj_5fpublic_5fkey_253',['atcacert_get_subj_public_key',['../a01443.html#gaa530a6a7f90a9a610856701b0220a161',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64]): atcacert_def.c'],['../a01443.html#gaa530a6a7f90a9a610856701b0220a161',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_public_key[64]): atcacert_def.c']]], - ['atcacert_5fget_5fsubject_254',['atcacert_get_subject',['../a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c'],['../a01443.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c']]], - ['atcacert_5fmax_5fcert_5fsize_255',['atcacert_max_cert_size',['../a01453.html#a3b6192388c29b0efb1968d6b44efd712',1,'cryptoauthlib::atcacert']]], - ['atcacert_5fread_5fcert_256',['atcacert_read_cert',['../a01443.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01443.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01453.html#a4fe33f1da468796b39c80a34e12411fb',1,'cryptoauthlib.atcacert.atcacert_read_cert()']]], - ['atcacert_5fread_5fcert_5fext_257',['atcacert_read_cert_ext',['../a01443.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01443.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fcert_5fsize_258',['atcacert_read_cert_size',['../a01443.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01443.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fcert_5fsize_5fext_259',['atcacert_read_cert_size_ext',['../a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01443.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], - ['atcacert_5fread_5fdevice_5floc_260',['atcacert_read_device_loc',['../a01443.html#ga7eb1ce78d2efb60aa56b929577fa88d2',1,'atcacert_client.h']]], - ['atcacert_5fread_5fdevice_5floc_5fext_261',['atcacert_read_device_loc_ext',['../a01443.html#ga9d69be730c8bd7863588c43ebe58b225',1,'atcacert_client.h']]], - ['atcacert_5fread_5fsubj_5fkey_5fid_262',['atcacert_read_subj_key_id',['../a01443.html#ga7f12776448f02a8c9862c4af64537017',1,'atcacert_client.h']]], - ['atcacert_5fread_5fsubj_5fkey_5fid_5fext_263',['atcacert_read_subj_key_id_ext',['../a01443.html#gacb6ecab7acc06102caee5419a01bd803',1,'atcacert_client.h']]], - ['atcacert_5fverify_5fcert_5fhw_264',['atcacert_verify_cert_hw',['../a01443.html#ga42939c26927fb65340ff1ebb2914a976',1,'atcacert_host_hw.h']]], - ['atcacert_5fverify_5fcert_5fsw_265',['atcacert_verify_cert_sw',['../a01443.html#ga5bad45c1fda32b7a57275af23ab0f626',1,'atcacert_host_sw.h']]], - ['atcacert_5fverify_5fresponse_5fhw_266',['atcacert_verify_response_hw',['../a01443.html#ga1441695a23776f3b38722e51fd3c36e3',1,'atcacert_host_hw.h']]], - ['atcacert_5fverify_5fresponse_5fsw_267',['atcacert_verify_response_sw',['../a01443.html#gab67e7a4c5899ef5402ff44f3f91d20b5',1,'atcacert_host_sw.h']]], - ['atcacert_5fwrite_5fcert_268',['atcacert_write_cert',['../a01443.html#gafa00725d50c68cfd2e0072bf563491a0',1,'atcacert_write_cert(): atcacert_client.h'],['../a01453.html#a5c4d1755dfd9a2b378cd45f14de1f1ee',1,'cryptoauthlib.atcacert.atcacert_write_cert()']]], - ['atcacert_5fwrite_5fcert_5fext_269',['atcacert_write_cert_ext',['../a01443.html#ga25a3291ce46841ca52346b42dc416485',1,'atcacert_client.h']]], - ['atcalccrc_270',['atCalcCrc',['../a00347.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c'],['../a00350.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c']]], - ['atcheckcrc_271',['atCheckCrc',['../a00347.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c'],['../a00350.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c']]], - ['atcontrol_272',['atcontrol',['../a01442.html#ga324cef45a35e02b387001afdc9092778',1,'atca_iface.c']]], - ['atcrc_273',['atCRC',['../a00347.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c'],['../a00350.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c']]], - ['atgetiface_274',['atGetIFace',['../a01441.html#ga3f98e29cffa06446fc91b329703606af',1,'atca_device.c']]], - ['atgetifacecfg_275',['atgetifacecfg',['../a01442.html#gac88ba81abfd42df65c6c0c64414dfc6e',1,'atca_iface.c']]], - ['atgetifacehaldat_276',['atgetifacehaldat',['../a01442.html#ga5e4163b8882d4eb42d4d5191c8731da0',1,'atca_iface.c']]], - ['atidle_277',['atidle',['../a01442.html#gac794fffe040e6d47a34c756720f3cbea',1,'atca_iface.c']]], - ['atinfo_278',['atInfo',['../a00347.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00350.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], - ['atinit_279',['atinit',['../a01442.html#ga386353e8700eec35e4548dfa29f13b8d',1,'atca_iface.c']]], - ['atiseccfamily_280',['atIsECCFamily',['../a00350.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c'],['../a00347.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c']]], - ['atisshafamily_281',['atIsSHAFamily',['../a00347.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c'],['../a00350.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c']]], - ['atpause_282',['atPause',['../a00347.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00350.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], - ['atreceive_283',['atreceive',['../a01442.html#ga01badea388343bdf5929c5c2be9f426b',1,'atca_iface.c']]], - ['atsend_284',['atsend',['../a01442.html#gabd4f20b06efedede6bc4a836cfad8f38',1,'atca_iface.c']]], - ['atsleep_285',['atsleep',['../a01442.html#gac06336335e5f3191e3b1fc06d2830d96',1,'atca_iface.c']]], - ['atwake_286',['atwake',['../a01442.html#ga32693c852341e1b946bab3cca5f71761',1,'atca_iface.c']]] + ['atca_5fdelay_5f10us_0',['atca_delay_10us',['../a01473.html#ga19891182689551cc3a88603135959351',1,'hal_sam_timer_asf.c']]], + ['atca_5fdelay_5fms_1',['atca_delay_ms',['../a01473.html#ga0544f36422b5e9a8890fb9c90fc5eb55',1,'hal_sam_timer_asf.c']]], + ['atca_5fdelay_5fus_2',['atca_delay_us',['../a01473.html#ga7598dfcd6dcac882836544d48356d02f',1,'hal_sam_timer_asf.c']]], + ['atca_5fiface_5fget_5fretries_3',['atca_iface_get_retries',['../a01469.html#ga349718dea5d5b558766a31b7dcd7e811',1,'atca_iface.c']]], + ['atca_5fiface_5fget_5fwake_5fdelay_4',['atca_iface_get_wake_delay',['../a01469.html#ga128f54833b5ed2105dae417333e1d651',1,'atca_iface.c']]], + ['atca_5fiface_5fis_5fkit_5',['atca_iface_is_kit',['../a01469.html#gacb09a6fa845efade7d47796bead14d2c',1,'atca_iface.c']]], + ['atca_5fiface_5fis_5fswi_6',['atca_iface_is_swi',['../a01469.html#gad2276d5ebd02613fbeda8ae15b679d1e',1,'atca_iface.c']]], + ['atca_5fmbedtls_5fecdh_5fioprot_5fcb_7',['atca_mbedtls_ecdh_ioprot_cb',['../a01476.html#gaa35682dc98e33ce3d6fad1fc902cdff0',1,'atca_mbedtls_wrap.h']]], + ['atca_5fmbedtls_5fecdh_5fslot_5fcb_8',['atca_mbedtls_ecdh_slot_cb',['../a01476.html#ga98d684683ccecd3d56bdf5dc27ae999c',1,'atca_mbedtls_wrap.h']]], + ['atca_5fmbedtls_5fpk_5finit_9',['atca_mbedtls_pk_init',['../a01476.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01476.html#gaa55a112d0b087adc242cc9b0978b5d15',1,'atca_mbedtls_pk_init(mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], + ['atca_5fmbedtls_5fpk_5finit_5fext_10',['atca_mbedtls_pk_init_ext',['../a01476.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c'],['../a01476.html#gad0e60f7088f93556c4a0ac7aff174fe6',1,'atca_mbedtls_pk_init_ext(ATCADevice device, mbedtls_pk_context *pkey, const uint16_t slotid): atca_mbedtls_wrap.c']]], + ['atcab_5faes_11',['atcab_aes',['../a01466.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out): atca_basic.c'],['../a01466.html#gad115ce255664a48b80e90ea19c156b79',1,'atcab_aes(uint8_t mode, uint16_t key_id, const uint8_t *aes_in, uint8_t *aes_out): atca_basic.c'],['../a01479.html#aa6f667c9ff033cb3e1d8bd1565e080aa',1,'cryptoauthlib.atcab.atcab_aes(mode, key_id, aes_in, aes_out)']]], + ['atcab_5faes_5fcbc_5fdecrypt_5fblock_12',['atcab_aes_cbc_decrypt_block',['../a01479.html#a9a7024193b07e7c98690873e7452f0ad',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbc_5fencrypt_5fblock_13',['atcab_aes_cbc_encrypt_block',['../a01479.html#a7e0bc033c11e689570f7aa9431d49d9c',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbc_5finit_14',['atcab_aes_cbc_init',['../a01479.html#a837da37427357c91aba40c6becbebfeb',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbcmac_5ffinish_15',['atcab_aes_cbcmac_finish',['../a01479.html#a1c364ea983169ac73197713db23f9a52',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbcmac_5finit_16',['atcab_aes_cbcmac_init',['../a01479.html#aa612658a288c6a5cca103e5d3965390c',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcbcmac_5fupdate_17',['atcab_aes_cbcmac_update',['../a01479.html#af58b97dc722402be6c65e226a0dd26ae',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5faad_5ffinish_18',['atcab_aes_ccm_aad_finish',['../a01479.html#a99d19bf27efa04318480a3e81f668ae8',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5faad_5fupdate_19',['atcab_aes_ccm_aad_update',['../a01479.html#af5502348939c1db2fdafde42603266f3',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fdecrypt_5ffinish_20',['atcab_aes_ccm_decrypt_finish',['../a01479.html#aa641b1946cfcb33ac7e353a6ca7285ab',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fdecrypt_5fupdate_21',['atcab_aes_ccm_decrypt_update',['../a01479.html#ab78cfabfa12d891830c1147bbc61a2e0',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fencrypt_5ffinish_22',['atcab_aes_ccm_encrypt_finish',['../a01479.html#ac0399ab5a8ab2e7682441241fcc98914',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5fencrypt_5fupdate_23',['atcab_aes_ccm_encrypt_update',['../a01479.html#a78d906cc88e8efcb280a0869ca7afaf2',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5finit_24',['atcab_aes_ccm_init',['../a01479.html#ab5ef9981f825f3fe5beb84b4d664f321',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fccm_5finit_5frand_25',['atcab_aes_ccm_init_rand',['../a01479.html#af34551008cb67c907488a9403da495ad',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcmac_5ffinish_26',['atcab_aes_cmac_finish',['../a01479.html#aeccd1e361da41854a45068507ccd9f33',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcmac_5finit_27',['atcab_aes_cmac_init',['../a01479.html#a1b778f3fa3c6d459075500f5248d09c6',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fcmac_5fupdate_28',['atcab_aes_cmac_update',['../a01479.html#aefa4891ccc2a860029958f2e80bdef87',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5fdecrypt_5fblock_29',['atcab_aes_ctr_decrypt_block',['../a01479.html#a80a2b3fe53dc4caedad79221b05bbdf7',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5fencrypt_5fblock_30',['atcab_aes_ctr_encrypt_block',['../a01479.html#a1a3dce72fa3192b1ca917025b8ff4736',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5finit_31',['atcab_aes_ctr_init',['../a01479.html#aec84bbc3cc86b716a2996069d5d227c0',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fctr_5finit_5frand_32',['atcab_aes_ctr_init_rand',['../a01479.html#a87ec2b9cbb53f9f38df252d6b7508881',1,'cryptoauthlib::atcab']]], + ['atcab_5faes_5fdecrypt_33',['atcab_aes_decrypt',['../a01466.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01466.html#ga9658e84055727e6357cf7ef636b4e398',1,'atcab_aes_decrypt(uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01479.html#ac67f610115ce611e94d05a87ada77f66',1,'cryptoauthlib.atcab.atcab_aes_decrypt()']]], + ['atcab_5faes_5fdecrypt_5fext_34',['atcab_aes_decrypt_ext',['../a01466.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c'],['../a01466.html#gaebaf49a3412181fa47ba3a761c5a2d5b',1,'atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *ciphertext, uint8_t *plaintext): atca_basic.c']]], + ['atcab_5faes_5fencrypt_35',['atcab_aes_encrypt',['../a01466.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(): atca_basic.c'],['../a01479.html#a544871498712993b7ceb7a0134beac55',1,'cryptoauthlib.atcab.atcab_aes_encrypt()'],['../a01466.html#gacc9a58dc49f91674213f34fa7bbd05e1',1,'atcab_aes_encrypt(uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c']]], + ['atcab_5faes_5fencrypt_5fext_36',['atcab_aes_encrypt_ext',['../a01466.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gaa5c5cba4f9be5bc0e4b1c5691f60e4ba',1,'atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t key_block, const uint8_t *plaintext, uint8_t *ciphertext): atca_basic.c']]], + ['atcab_5faes_5fgcm_5faad_5fupdate_37',['atcab_aes_gcm_aad_update',['../a01466.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01466.html#ga1d6fd831a8125a366504a0ab77b62da8',1,'atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01479.html#a5b7cd7ecd0b2526f1daa7c60ea39c581',1,'cryptoauthlib.atcab.atcab_aes_gcm_aad_update()']]], + ['atcab_5faes_5fgcm_5faad_5fupdate_5fext_38',['atcab_aes_gcm_aad_update_ext',['../a01466.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c'],['../a01466.html#ga1c6666c7b4d077fb058adc4971da2160',1,'atcab_aes_gcm_aad_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *aad, uint32_t aad_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_39',['atcab_aes_gcm_decrypt_finish',['../a01466.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01466.html#gaa86508958ff3d81f9bd8e79344537218',1,'atcab_aes_gcm_decrypt_finish(atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01479.html#aeae81b172cf9a1b8a85052b9129d9dd1',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_finish()']]], + ['atcab_5faes_5fgcm_5fdecrypt_5ffinish_5fext_40',['atcab_aes_gcm_decrypt_finish_ext',['../a01466.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c'],['../a01466.html#ga9c5173c7529f898f251814133169ba1d',1,'atcab_aes_gcm_decrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *tag, size_t tag_size, bool *is_verified): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_41',['atcab_aes_gcm_decrypt_update',['../a01466.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01466.html#ga2ad3270d8bebf6172dc02d0c7d9fb738',1,'atcab_aes_gcm_decrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01479.html#a5af363a108f86f636af7581097b396cd',1,'cryptoauthlib.atcab.atcab_aes_gcm_decrypt_update()']]], + ['atcab_5faes_5fgcm_5fdecrypt_5fupdate_5fext_42',['atcab_aes_gcm_decrypt_update_ext',['../a01466.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c'],['../a01466.html#gac55fcbd824ffc9a30c6a5bbafb93aad2',1,'atcab_aes_gcm_decrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *ciphertext, uint32_t ciphertext_size, uint8_t *plaintext): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fencrypt_5ffinish_43',['atcab_aes_gcm_encrypt_finish',['../a01466.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01466.html#gada2d38835826587970de3868ca48eaa4',1,'atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01479.html#ae3f487577cbb7e66ccb39c8d6ea9a358',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_finish()']]], + ['atcab_5faes_5fgcm_5fencrypt_5ffinish_5fext_44',['atcab_aes_gcm_encrypt_finish_ext',['../a01466.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c'],['../a01466.html#ga813fb67193a7c39d02ce7ad8d2d12123',1,'atcab_aes_gcm_encrypt_finish_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint8_t *tag, size_t tag_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5fencrypt_5fupdate_45',['atcab_aes_gcm_encrypt_update',['../a01466.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gab3fda8219d17d1b7bc50b1040399a47d',1,'atcab_aes_gcm_encrypt_update(atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01479.html#a0e5230bd79eba76c6350b724d5297310',1,'cryptoauthlib.atcab.atcab_aes_gcm_encrypt_update()']]], + ['atcab_5faes_5fgcm_5fencrypt_5fupdate_5fext_46',['atcab_aes_gcm_encrypt_update_ext',['../a01466.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c'],['../a01466.html#gaac8b8555b03b50a118b70cb8387c24ae',1,'atcab_aes_gcm_encrypt_update_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, const uint8_t *plaintext, uint32_t plaintext_size, uint8_t *ciphertext): atca_basic.c']]], + ['atcab_5faes_5fgcm_5finit_47',['atcab_aes_gcm_init',['../a01466.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01466.html#ga4805112b62e86b5465e24648504dc374',1,'atcab_aes_gcm_init(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01479.html#a29a3eabf3e5e353e52dd52c69ea69ec4',1,'cryptoauthlib.atcab.atcab_aes_gcm_init()']]], + ['atcab_5faes_5fgcm_5finit_5fext_48',['atcab_aes_gcm_init_ext',['../a01466.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c'],['../a01466.html#ga8742a7be77a2350c069c5c380ac4c635',1,'atcab_aes_gcm_init_ext(ATCADevice device, atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, const uint8_t *iv, size_t iv_size): atca_basic.c']]], + ['atcab_5faes_5fgcm_5finit_5frand_49',['atcab_aes_gcm_init_rand',['../a01479.html#a4a9dc88e03b9e5066ff28b8518196ce7',1,'cryptoauthlib.atcab.atcab_aes_gcm_init_rand()'],['../a01466.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c'],['../a01466.html#gad71a5720ceaddf2c76476aead5f0c3e6',1,'atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t *ctx, uint16_t key_id, uint8_t key_block, size_t rand_size, const uint8_t *free_field, size_t free_field_size, uint8_t *iv): atca_basic.c']]], + ['atcab_5faes_5fgfm_50',['atcab_aes_gfm',['../a01466.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(): atca_basic.c'],['../a01479.html#ad9bd7c6cc3e26cca5865dda3c02bcce2',1,'cryptoauthlib.atcab.atcab_aes_gfm()'],['../a01466.html#ga5554940ed4c7c7e28652ce6923cf9314',1,'atcab_aes_gfm(const uint8_t *h, const uint8_t *input, uint8_t *output): atca_basic.c']]], + ['atcab_5fbase64decode_51',['atcab_base64decode',['../a00257.html#a6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c'],['../a01466.html#ga6073c5a05e0ad2e738f460e727014553',1,'atcab_base64decode(const char *encoded, size_t encoded_len, uint8_t *byte_array, size_t *array_len): atca_helpers.c']]], + ['atcab_5fbase64decode_5f_52',['atcab_base64decode_',['../a00257.html#a55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c'],['../a01466.html#ga55ba8a1787f69d44d6e40db041fbd786',1,'atcab_base64decode_(const char *encoded, size_t encoded_size, uint8_t *data, size_t *data_size, const uint8_t *rules): atca_helpers.c']]], + ['atcab_5fbase64encode_53',['atcab_base64encode',['../a00257.html#a3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c'],['../a01466.html#ga3aa141525a1141f1a290e2a996da0c9c',1,'atcab_base64encode(const uint8_t *byte_array, size_t array_len, char *encoded, size_t *encoded_len): atca_helpers.c']]], + ['atcab_5fbase64encode_5f_54',['atcab_base64encode_',['../a00257.html#aeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c'],['../a01466.html#gaeeff0177acf29e6e7b134a14d7119d69',1,'atcab_base64encode_(const uint8_t *data, size_t data_size, char *encoded, size_t *encoded_size, const uint8_t *rules): atca_helpers.c']]], + ['atcab_5fbin2hex_55',['atcab_bin2hex',['../a00257.html#ae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c'],['../a01466.html#gae31a9fd8e9deca79aa5fef0292fe5272',1,'atcab_bin2hex(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size): atca_helpers.c']]], + ['atcab_5fbin2hex_5f_56',['atcab_bin2hex_',['../a00257.html#a40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c'],['../a01466.html#ga40b70cfab865fa4fd9a5e7a29ca59d38',1,'atcab_bin2hex_(const uint8_t *bin, size_t bin_size, char *hex, size_t *hex_size, bool is_pretty, bool is_space, bool is_upper): atca_helpers.c']]], + ['atcab_5fchallenge_57',['atcab_challenge',['../a01466.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01466.html#ga114a721517c95d5ba5fcac5b226669d6',1,'atcab_challenge(const uint8_t *num_in): atca_basic.c'],['../a01479.html#a40bc5aa6ac58d01d4ee7888dddd884bb',1,'cryptoauthlib.atcab.atcab_challenge(num_in)']]], + ['atcab_5fchallenge_5fseed_5fupdate_58',['atcab_challenge_seed_update',['../a01479.html#a0cefee590d648d724f343488569c10df',1,'cryptoauthlib.atcab.atcab_challenge_seed_update()'],['../a01466.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#gaadde4309089c569fd87c24a1a2326cd4',1,'atcab_challenge_seed_update(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], + ['atcab_5fcheckmac_59',['atcab_checkmac',['../a01466.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01466.html#ga5ba49c05f7b3fb5acaf55df993ccd3ee',1,'atcab_checkmac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data): atca_basic.c'],['../a01479.html#aba58d5a7562b69d72c33cfda82c2b580',1,'cryptoauthlib.atcab.atcab_checkmac()']]], + ['atcab_5fcheckmac_5fwith_5fresponse_5fmac_60',['atcab_checkmac_with_response_mac',['../a01466.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01466.html#gad50eab1ee1abb18515e914a294668907',1,'atcab_checkmac_with_response_mac(uint8_t mode, const uint8_t *challenge, const uint8_t *response, const uint8_t *other_data, uint8_t *mac): atca_basic.c']]], + ['atcab_5fcmp_5fconfig_5fzone_61',['atcab_cmp_config_zone',['../a01479.html#af312843ce780c0062f9067c182ad2db6',1,'cryptoauthlib.atcab.atcab_cmp_config_zone()'],['../a01466.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c'],['../a01466.html#gadb91d2c3601b95f0ad413cf84a4dfd87',1,'atcab_cmp_config_zone(uint8_t *config_data, bool *same_config): atca_basic.c']]], + ['atcab_5fcounter_62',['atcab_counter',['../a01466.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01466.html#gabaaaef242649206029e1c10ac6d1fb7d',1,'atcab_counter(uint8_t mode, uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01479.html#ade607e2a5b08d77e4559161dfac0c0e8',1,'cryptoauthlib.atcab.atcab_counter()']]], + ['atcab_5fcounter_5fincrement_63',['atcab_counter_increment',['../a01466.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01466.html#ga6e510e056ea16a0a34b405b7ca378f16',1,'atcab_counter_increment(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01479.html#a216d7fa1d484d6a4ecf55d7886c355ef',1,'cryptoauthlib.atcab.atcab_counter_increment(counter_id, counter_value)']]], + ['atcab_5fcounter_5fread_64',['atcab_counter_read',['../a01479.html#ae40c31b557e83cd4c590288082d07d6e',1,'cryptoauthlib.atcab.atcab_counter_read()'],['../a01466.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c'],['../a01466.html#gaeee666028a097659af69cc828a6bd68b',1,'atcab_counter_read(uint16_t counter_id, uint32_t *counter_value): atca_basic.c']]], + ['atcab_5fderivekey_65',['atcab_derivekey',['../a01466.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01466.html#ga34b7b6d46868f0d63d195216ef9939b1',1,'atcab_derivekey(uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01479.html#af411b3996170b6dd0e90dc999c896d19',1,'cryptoauthlib.atcab.atcab_derivekey()']]], + ['atcab_5fderivekey_5fext_66',['atcab_derivekey_ext',['../a01466.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c'],['../a01466.html#gabd5b5206bd54f7e7513a0c21a3ffbe31',1,'atcab_derivekey_ext(ATCADevice device, uint8_t mode, uint16_t key_id, const uint8_t *mac): atca_basic.c']]], + ['atcab_5fecdh_67',['atcab_ecdh',['../a01466.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01466.html#ga6fc480ad2824df6309f4f370ffad15f9',1,'atcab_ecdh(uint16_t key_id, const uint8_t *public_key, uint8_t *pms): atca_basic.c'],['../a01479.html#a8e85d04188b3d10cccaf6641bf5753fe',1,'cryptoauthlib.atcab.atcab_ecdh()']]], + ['atcab_5fecdh_5fbase_68',['atcab_ecdh_base',['../a01466.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(): atca_basic.c'],['../a01479.html#a84c655ca82b1c0ed968be7d63be4a5f2',1,'cryptoauthlib.atcab.atcab_ecdh_base()'],['../a01466.html#ga211c9405bb5049dd4a5da92d25c83f3c',1,'atcab_ecdh_base(uint8_t mode, uint16_t key_id, const uint8_t *public_key, uint8_t *pms, uint8_t *out_nonce): atca_basic.c']]], + ['atcab_5fecdh_5fenc_69',['atcab_ecdh_enc',['../a01466.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#ga51e3ae10f0596d473f646074650904e6',1,'atcab_ecdh_enc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *read_key, uint16_t read_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#ae3505ac892b47a7384a9ec95338bee22',1,'cryptoauthlib.atcab.atcab_ecdh_enc()']]], + ['atcab_5fecdh_5fioenc_70',['atcab_ecdh_ioenc',['../a01466.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01466.html#ga975f7303086190d3b6f76c367583d622',1,'atcab_ecdh_ioenc(uint16_t key_id, const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01479.html#adefdce788a6ef35250f5b1c139454b64',1,'cryptoauthlib.atcab.atcab_ecdh_ioenc()']]], + ['atcab_5fecdh_5ftempkey_71',['atcab_ecdh_tempkey',['../a01466.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(): atca_basic.c'],['../a01479.html#a3a1b9396c4a6aec1fc32839fe681f3a9',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey()'],['../a01466.html#gac244b83b061ffd8ae3d59b5f973baa53',1,'atcab_ecdh_tempkey(const uint8_t *public_key, uint8_t *pms): atca_basic.c']]], + ['atcab_5fecdh_5ftempkey_5fioenc_72',['atcab_ecdh_tempkey_ioenc',['../a01466.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01466.html#gafaccb0c9d12154b0c5b917f89f233721',1,'atcab_ecdh_tempkey_ioenc(const uint8_t *public_key, uint8_t *pms, const uint8_t *io_key): atca_basic.c'],['../a01479.html#ac6eb9270fa4c963d6ebba79aea1ddc4b',1,'cryptoauthlib.atcab.atcab_ecdh_tempkey_ioenc()']]], + ['atcab_5fgendig_73',['atcab_gendig',['../a01466.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c'],['../a01466.html#ga70751ea87f2cf913986bc7bca2cc661f',1,'atcab_gendig(uint8_t zone, uint16_t key_id, const uint8_t *other_data, uint8_t other_data_size): atca_basic.c'],['../a01479.html#a8b0381ac0e872d25df0373d9cd9ce4af',1,'cryptoauthlib.atcab.atcab_gendig()']]], + ['atcab_5fgendivkey_74',['atcab_gendivkey',['../a01466.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c'],['../a01466.html#ga3f7953865c6091f266e727714e6f91dd',1,'atcab_gendivkey(const uint8_t *other_data): atca_basic.c']]], + ['atcab_5fgenkey_75',['atcab_genkey',['../a01466.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#ga617bdbdce7b5736351d93214d44c5b8f',1,'atcab_genkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01479.html#acef9ae292bb3e6c3c1c1b16a20bd6494',1,'cryptoauthlib.atcab.atcab_genkey()']]], + ['atcab_5fgenkey_5fbase_76',['atcab_genkey_base',['../a01466.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c'],['../a01466.html#gaa8b6953ad2c7f749e61566fd38fe6903',1,'atcab_genkey_base(uint8_t mode, uint16_t key_id, const uint8_t *other_data, uint8_t *public_key): atca_basic.c'],['../a01479.html#aa1e87847ce5fccdef062c9aaa5bea65e',1,'cryptoauthlib.atcab.atcab_genkey_base()']]], + ['atcab_5fgenkey_5fext_77',['atcab_genkey_ext',['../a01466.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#ga301d5e57486fefc1bd19da3cddc5bc0c',1,'atcab_genkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fget_5fdevice_78',['atcab_get_device',['../a01466.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(): atca_basic.c'],['../a01479.html#a2087c24eeaa066ab0481265ca17b62fb',1,'cryptoauthlib.atcab.atcab_get_device()'],['../a01466.html#ga4af82005556c549c30e1c4bd35d4f4e4',1,'atcab_get_device(void): atca_basic.c']]], + ['atcab_5fget_5fdevice_5faddress_79',['atcab_get_device_address',['../a01466.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c'],['../a01466.html#ga775bea13de8cc26e61a34ada48358568',1,'atcab_get_device_address(ATCADevice device): atca_basic.c']]], + ['atcab_5fget_5fdevice_5ftype_80',['atcab_get_device_type',['../a01466.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(void): atca_basic.c'],['../a01466.html#ga2b02163fab87313b81dd7f51345d3eb6',1,'atcab_get_device_type(void): atca_basic.c'],['../a01479.html#a63e034778c2964569df7a6fb0ec0a8f1',1,'cryptoauthlib.atcab.atcab_get_device_type()']]], + ['atcab_5fget_5fdevice_5ftype_5fext_81',['atcab_get_device_type_ext',['../a01466.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c'],['../a01466.html#ga4882d4c30f1af2d1aab24a0c465f181d',1,'atcab_get_device_type_ext(ATCADevice device): atca_basic.c']]], + ['atcab_5fget_5fpubkey_82',['atcab_get_pubkey',['../a01479.html#aac8a5ac8d26586ed7a707ddf2224ecd8',1,'cryptoauthlib.atcab.atcab_get_pubkey()'],['../a01466.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#gad2096a4618dd37c48ed48847fe63d844',1,'atcab_get_pubkey(uint16_t key_id, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fget_5fpubkey_5fext_83',['atcab_get_pubkey_ext',['../a01466.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c'],['../a01466.html#gae2cbb1989eff2c66935040f41a593bf6',1,'atcab_get_pubkey_ext(ATCADevice device, uint16_t key_id, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fget_5fzone_5fsize_84',['atcab_get_zone_size',['../a01466.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01466.html#ga7a823d2a391bf80ff336eb2ccbd37412',1,'atcab_get_zone_size(uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], + ['atcab_5fget_5fzone_5fsize_5fext_85',['atcab_get_zone_size_ext',['../a01466.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c'],['../a01466.html#gad65cf773e03aed93e2a1437f13511a91',1,'atcab_get_zone_size_ext(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): atca_basic.c']]], + ['atcab_5fhex2bin_86',['atcab_hex2bin',['../a00257.html#a481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c'],['../a01466.html#ga481179181349c801c16fc1ab698f2f24',1,'atcab_hex2bin(const char *ascii_hex, size_t ascii_hex_len, uint8_t *binary, size_t *bin_len): atca_helpers.c']]], + ['atcab_5fhmac_87',['atcab_hmac',['../a01466.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(): atca_basic.c'],['../a01479.html#abcef2cce95ddc7363a687ee4cf238671',1,'cryptoauthlib.atcab.atcab_hmac()'],['../a01466.html#ga45f1d09a51f7a1f68916536ab5125b9d',1,'atcab_hmac(uint8_t mode, uint16_t key_id, uint8_t *digest): atca_basic.c']]], + ['atcab_5fhw_5fsha2_5f256_88',['atcab_hw_sha2_256',['../a01466.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01466.html#ga4bf8b665fe1712626a480742c2daa16b',1,'atcab_hw_sha2_256(const uint8_t *data, size_t data_size, uint8_t *digest): atca_basic.c'],['../a01479.html#aec129bd1fae35bcb87dd129ca4e065ca',1,'cryptoauthlib.atcab.atcab_hw_sha2_256()']]], + ['atcab_5fhw_5fsha2_5f256_5ffinish_89',['atcab_hw_sha2_256_finish',['../a01466.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01466.html#ga6ed7e645262fcc32b00d8a9facf09e91',1,'atcab_hw_sha2_256_finish(atca_sha256_ctx_t *ctx, uint8_t *digest): atca_basic.c'],['../a01479.html#a6f0cb9bd0b1cecd09fa765083d998db1',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_finish()']]], + ['atcab_5fhw_5fsha2_5f256_5finit_90',['atcab_hw_sha2_256_init',['../a01466.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(): atca_basic.c'],['../a01479.html#a213e34c48cf1f6a119979ae00acebee5',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_init()'],['../a01466.html#gade49e7746864105730fa7d531645ff62',1,'atcab_hw_sha2_256_init(atca_sha256_ctx_t *ctx): atca_basic.c']]], + ['atcab_5fhw_5fsha2_5f256_5fupdate_91',['atcab_hw_sha2_256_update',['../a01466.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01466.html#ga67f2ce6224651d9cc65e9915e35558bd',1,'atcab_hw_sha2_256_update(atca_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01479.html#a4c9b8fd51581178ad0d988f64e2df04c',1,'cryptoauthlib.atcab.atcab_hw_sha2_256_update()']]], + ['atcab_5fidle_92',['atcab_idle',['../a01466.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c'],['../a01466.html#gaf47433a371b9fcb8d65a4214cd9e4fa0',1,'atcab_idle(void): atca_basic.c']]], + ['atcab_5finfo_93',['atcab_info',['../a01466.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(): atca_basic.c'],['../a01479.html#add3fb2f7c78eb84e42bcb17800f2c6de',1,'cryptoauthlib.atcab.atcab_info()'],['../a01466.html#ga6e19ecd60be4c74665d9ec142e460771',1,'atcab_info(uint8_t *revision): atca_basic.c']]], + ['atcab_5finfo_5fbase_94',['atcab_info_base',['../a01466.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(): atca_basic.c'],['../a01479.html#af03e307e61709bff1443d0f72a2efdb9',1,'cryptoauthlib.atcab.atcab_info_base()'],['../a01466.html#ga806d07982fda5c30755af6b5b4ef9314',1,'atcab_info_base(uint8_t mode, uint16_t param2, uint8_t *out_data): atca_basic.c']]], + ['atcab_5finfo_5fchip_5fstatus_95',['atcab_info_chip_status',['../a01466.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c'],['../a01466.html#gaa7a2f89236943bcd0ed7f6616ccbb043',1,'atcab_info_chip_status(uint8_t *chip_status): atca_basic.c']]], + ['atcab_5finfo_5fext_96',['atcab_info_ext',['../a01466.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c'],['../a01466.html#gacd308bac927905d5c59f526b40c63d76',1,'atcab_info_ext(ATCADevice device, uint8_t *revision): atca_basic.c']]], + ['atcab_5finfo_5fget_5flatch_97',['atcab_info_get_latch',['../a01466.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(bool *state): atca_basic.c'],['../a01466.html#ga376b6ae92f14c60fba4ca5c6461e0b48',1,'atcab_info_get_latch(bool *state): atca_basic.c'],['../a01479.html#ab21835e5b3b868f49faecd453d8da4e3',1,'cryptoauthlib.atcab.atcab_info_get_latch()']]], + ['atcab_5finfo_5flock_5fstatus_98',['atcab_info_lock_status',['../a01466.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c'],['../a01466.html#ga0d11f96c8d4b30c7cfb12a106fed7d35',1,'atcab_info_lock_status(uint16_t param2, uint8_t *is_locked): atca_basic.c']]], + ['atcab_5finfo_5fset_5flatch_99',['atcab_info_set_latch',['../a01466.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01466.html#ga2649126606db8a0b64ae8e19d09f6600',1,'atcab_info_set_latch(bool state): atca_basic.c'],['../a01479.html#a0ae7c88423c60e7dd7fefff75d443c35',1,'cryptoauthlib.atcab.atcab_info_set_latch(state)']]], + ['atcab_5finit_100',['atcab_init',['../a01479.html#ad7cc965be77a8f829027f9afc21556b5',1,'cryptoauthlib.atcab.atcab_init()'],['../a01466.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c'],['../a01466.html#gacdc4fa3d2f2f6d197af8c10ab1f288b8',1,'atcab_init(ATCAIfaceCfg *cfg): atca_basic.c']]], + ['atcab_5finit_5fdevice_101',['atcab_init_device',['../a01466.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c'],['../a01466.html#gab22d2a32e6c32c14c4e58ce794ff3ec4',1,'atcab_init_device(ATCADevice ca_device): atca_basic.c']]], + ['atcab_5finit_5fext_102',['atcab_init_ext',['../a01466.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c'],['../a01466.html#gaa1d392a2b2ae7a51907cb724f0465741',1,'atcab_init_ext(ATCADevice *device, ATCAIfaceCfg *cfg): atca_basic.c']]], + ['atcab_5fis_5fca2_5fdevice_103',['atcab_is_ca2_device',['../a01466.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c'],['../a01466.html#ga973437347c3261df0b116fec9ee9c378',1,'atcab_is_ca2_device(ATCADeviceType dev_type): atca_basic.c']]], + ['atcab_5fis_5fca_5fdevice_104',['atcab_is_ca_device',['../a01466.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c'],['../a01466.html#ga6e74da1e2ef3168e48bbc89c44b16d2f',1,'atcab_is_ca_device(ATCADeviceType dev_type): atca_basic.c']]], + ['atcab_5fis_5fconfig_5flocked_105',['atcab_is_config_locked',['../a01466.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c'],['../a01466.html#ga25d0626815c3df9dd2b43d72eecd3a36',1,'atcab_is_config_locked(bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fconfig_5flocked_5fext_106',['atcab_is_config_locked_ext',['../a01466.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01466.html#gadac89d52a30b7a11768cf4c5de8d4d08',1,'atcab_is_config_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fdata_5flocked_107',['atcab_is_data_locked',['../a01466.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c'],['../a01466.html#ga44aae7e0a28993eb6abf78bb3d42e26d',1,'atcab_is_data_locked(bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fdata_5flocked_5fext_108',['atcab_is_data_locked_ext',['../a01466.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c'],['../a01466.html#ga7e3189411975d835c0115511556302d8',1,'atcab_is_data_locked_ext(ATCADevice device, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5flocked_109',['atcab_is_locked',['../a01466.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(): atca_basic.c'],['../a01479.html#a035fb2c7a593d20f479943c0d74df245',1,'cryptoauthlib.atcab.atcab_is_locked()'],['../a01466.html#gaefce484222bdbedef37787a9b10d4426',1,'atcab_is_locked(uint8_t zone, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fprivate_5fext_110',['atcab_is_private_ext',['../a01466.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c'],['../a01466.html#gac5f4cc263fd729871446e01cb063f141',1,'atcab_is_private_ext(ATCADevice device, uint16_t slot, bool *is_private): atca_basic.c']]], + ['atcab_5fis_5fslot_5flocked_111',['atcab_is_slot_locked',['../a01466.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01466.html#ga802de50265ff91dc30dd7c93d9e026e1',1,'atcab_is_slot_locked(uint16_t slot, bool *is_locked): atca_basic.c'],['../a01479.html#ac73a52d0b4b8104accb6f34542d06e85',1,'cryptoauthlib.atcab.atcab_is_slot_locked()']]], + ['atcab_5fis_5fslot_5flocked_5fext_112',['atcab_is_slot_locked_ext',['../a01466.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c'],['../a01466.html#ga4df72bf98b5f19668dc402c35fd4ef17',1,'atcab_is_slot_locked_ext(ATCADevice device, uint16_t slot, bool *is_locked): atca_basic.c']]], + ['atcab_5fis_5fta_5fdevice_113',['atcab_is_ta_device',['../a01466.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c'],['../a01466.html#gadd4e462d88600ee2d36c3c5bf699fde3',1,'atcab_is_ta_device(ATCADeviceType dev_type): atca_basic.c']]], + ['atcab_5fkdf_114',['atcab_kdf',['../a01466.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c'],['../a01466.html#ga40a6c01492a76366f9402302b527c4e1',1,'atcab_kdf(uint8_t mode, uint16_t key_id, const uint32_t details, const uint8_t *message, uint8_t *out_data, uint8_t *out_nonce): atca_basic.c'],['../a01479.html#a760c91e04ad8a62181956b73ada2e384',1,'cryptoauthlib.atcab.atcab_kdf()']]], + ['atcab_5flock_115',['atcab_lock',['../a01466.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01466.html#ga25d2895192d93c524f5dba92a492cdfb',1,'atcab_lock(uint8_t mode, uint16_t summary_crc): atca_basic.c'],['../a01479.html#a384368c23f29b2008c79effe063da77d',1,'cryptoauthlib.atcab.atcab_lock(mode, summary_crc)']]], + ['atcab_5flock_5fconfig_5fzone_116',['atcab_lock_config_zone',['../a01479.html#a13f0865a1ac2377282b29d6721b5c834',1,'cryptoauthlib.atcab.atcab_lock_config_zone()'],['../a01466.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c'],['../a01466.html#ga7cd67c03c7184ad041e2c0ad4f27db23',1,'atcab_lock_config_zone(void): atca_basic.c']]], + ['atcab_5flock_5fconfig_5fzone_5fcrc_117',['atcab_lock_config_zone_crc',['../a01466.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01466.html#ga0698e0c55ad700fe57498321e842cb38',1,'atcab_lock_config_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01479.html#a64223730cf6d1f1ecb48ebcfaffea75c',1,'cryptoauthlib.atcab.atcab_lock_config_zone_crc()']]], + ['atcab_5flock_5fconfig_5fzone_5fext_118',['atcab_lock_config_zone_ext',['../a01466.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c'],['../a01466.html#gaf5059df8d40a5f9f0f5e2004039de424',1,'atcab_lock_config_zone_ext(ATCADevice device): atca_basic.c']]], + ['atcab_5flock_5fdata_5fslot_119',['atcab_lock_data_slot',['../a01479.html#a0738f317bdd3c1decb934971e66ee66c',1,'cryptoauthlib.atcab.atcab_lock_data_slot()'],['../a01466.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c'],['../a01466.html#ga958190a9182d1b54f82fbca8216406ea',1,'atcab_lock_data_slot(uint16_t slot): atca_basic.c']]], + ['atcab_5flock_5fdata_5fslot_5fext_120',['atcab_lock_data_slot_ext',['../a01466.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c'],['../a01466.html#ga0d91be168c4b3714cc0177632627bfc3',1,'atcab_lock_data_slot_ext(ATCADevice device, uint16_t slot): atca_basic.c']]], + ['atcab_5flock_5fdata_5fzone_121',['atcab_lock_data_zone',['../a01466.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(void): atca_basic.c'],['../a01466.html#ga8020aa89a5bed09ad35320b78e0fb890',1,'atcab_lock_data_zone(void): atca_basic.c'],['../a01479.html#ad4c4f17808f4904cef59fb3c6a3060e1',1,'cryptoauthlib.atcab.atcab_lock_data_zone()']]], + ['atcab_5flock_5fdata_5fzone_5fcrc_122',['atcab_lock_data_zone_crc',['../a01466.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01466.html#gaf29e398e2aca927ab4606aa1ec0308c6',1,'atcab_lock_data_zone_crc(uint16_t summary_crc): atca_basic.c'],['../a01479.html#a037d202036ce67334a0dc1dd5b714c3e',1,'cryptoauthlib.atcab.atcab_lock_data_zone_crc()']]], + ['atcab_5flock_5fdata_5fzone_5fext_123',['atcab_lock_data_zone_ext',['../a01466.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c'],['../a01466.html#ga8105d79d3dd914cf643121ff243b00a3',1,'atcab_lock_data_zone_ext(ATCADevice device): atca_basic.c']]], + ['atcab_5fmac_124',['atcab_mac',['../a01466.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(): atca_basic.c'],['../a01479.html#a02089d61678b8d494424c16bb612b8ad',1,'cryptoauthlib.atcab.atcab_mac()'],['../a01466.html#ga98cb802fbb5d78cd552bb05c21d6c791',1,'atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t *challenge, uint8_t *digest): atca_basic.c']]], + ['atcab_5fmemset_5fs_125',['atcab_memset_s',['../a00257.html#ac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c'],['../a01466.html#gac37b319dabc5b9492a422f6d3d4e118b',1,'atcab_memset_s(void *dest, size_t destsz, int ch, size_t count): atca_helpers.c']]], + ['atcab_5fnonce_126',['atcab_nonce',['../a01466.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01466.html#ga2293df1c1c794496790bae25d3844fa5',1,'atcab_nonce(const uint8_t *num_in): atca_basic.c'],['../a01479.html#ad4e841d49e6fd9d67c664f020877e730',1,'cryptoauthlib.atcab.atcab_nonce()']]], + ['atcab_5fnonce_5fbase_127',['atcab_nonce_base',['../a01466.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#gaf8e10791759a8a5e5dcd82774f4895d6',1,'atcab_nonce_base(uint8_t mode, uint16_t zero, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01479.html#afcb4ae6dd50b4449b6de4d1d0754601d',1,'cryptoauthlib.atcab.atcab_nonce_base()']]], + ['atcab_5fnonce_5fload_128',['atcab_nonce_load',['../a01466.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(uint8_t target, const uint8_t *num_in, uint16_t num_in_size): atca_basic.c'],['../a01466.html#ga2239ae3a87c341a48aa108bd82a58552',1,'atcab_nonce_load(uint8_t target, const uint8_t *num_in, uint16_t num_in_size): atca_basic.c'],['../a01479.html#adf1843ed620eb72a9efc75ff0251efa6',1,'cryptoauthlib.atcab.atcab_nonce_load()']]], + ['atcab_5fnonce_5frand_129',['atcab_nonce_rand',['../a01466.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#gaed67d447d547c67b7b8be6b958d1fb5c',1,'atcab_nonce_rand(const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01479.html#a75272bce518cb8b951b9adae61a02c58',1,'cryptoauthlib.atcab.atcab_nonce_rand()']]], + ['atcab_5fnonce_5frand_5fext_130',['atcab_nonce_rand_ext',['../a01466.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c'],['../a01466.html#ga89942894a5a8f82391d74346603aa837',1,'atcab_nonce_rand_ext(ATCADevice device, const uint8_t *num_in, uint8_t *rand_out): atca_basic.c']]], + ['atcab_5fpointer_5fdelta_131',['atcab_pointer_delta',['../a00257.html#a72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c'],['../a01466.html#ga72f385a8eafc464a05acfa54561fed63',1,'atcab_pointer_delta(const void *start, const void *end): atca_helpers.c']]], + ['atcab_5fpriv_5fwrite_132',['atcab_priv_write',['../a01466.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#gaead7151af044da249b398dc457fc8e06',1,'atcab_priv_write(uint16_t key_id, const uint8_t priv_key[36], uint16_t write_key_id, const uint8_t write_key[32], const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#ac94db106ce16b83c5f5518cf92e24d4d',1,'cryptoauthlib.atcab.atcab_priv_write()']]], + ['atcab_5frandom_133',['atcab_random',['../a01466.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01466.html#ga4fa442396dfbb89e59dfca837b565cec',1,'atcab_random(uint8_t *rand_out): atca_basic.c'],['../a01479.html#a8d6436e974c3780cb205261049fbbb87',1,'cryptoauthlib.atcab.atcab_random()']]], + ['atcab_5frandom_5fext_134',['atcab_random_ext',['../a01466.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c'],['../a01466.html#ga103f4596f0f9590971763592c5233ec3',1,'atcab_random_ext(ATCADevice device, uint8_t *rand_out): atca_basic.c']]], + ['atcab_5fread_5fbytes_5fzone_135',['atcab_read_bytes_zone',['../a01466.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c'],['../a01466.html#ga750704332198726725a327344f4f7dd5',1,'atcab_read_bytes_zone(uint8_t zone, uint16_t slot, size_t offset, uint8_t *data, size_t length): atca_basic.c'],['../a01479.html#abd3403fcc46a2b82556784e142161c65',1,'cryptoauthlib.atcab.atcab_read_bytes_zone()']]], + ['atcab_5fread_5fconfig_5fzone_136',['atcab_read_config_zone',['../a01466.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01466.html#ga8ef47330eef6bc72ae8f7a8ef026dae3',1,'atcab_read_config_zone(uint8_t *config_data): atca_basic.c'],['../a01479.html#a5dfdc90856af9f03e09cc280dcfe3de0',1,'cryptoauthlib.atcab.atcab_read_config_zone()']]], + ['atcab_5fread_5fconfig_5fzone_5fext_137',['atcab_read_config_zone_ext',['../a01466.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c'],['../a01466.html#ga9ee98f13a88710e5234266b4b456b1dc',1,'atcab_read_config_zone_ext(ATCADevice device, uint8_t *config_data): atca_basic.c']]], + ['atcab_5fread_5fenc_138',['atcab_read_enc',['../a01466.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(): atca_basic.c'],['../a01479.html#a87c05138d598087100ec1e740bf9e221',1,'cryptoauthlib.atcab.atcab_read_enc()'],['../a01466.html#ga0cf0048247bb577c85142510225ea960',1,'atcab_read_enc(uint16_t key_id, uint8_t block, uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c']]], + ['atcab_5fread_5fpubkey_139',['atcab_read_pubkey',['../a01466.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(): atca_basic.c'],['../a01479.html#a03506fe5daef9a019b2688e49af8a725',1,'cryptoauthlib.atcab.atcab_read_pubkey()'],['../a01466.html#ga782ca1e5b1574b2b6793c841be22b28b',1,'atcab_read_pubkey(uint16_t slot, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fread_5fpubkey_5fext_140',['atcab_read_pubkey_ext',['../a01466.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c'],['../a01466.html#ga2ea51a5aafd900c9bdffeffe82274255',1,'atcab_read_pubkey_ext(ATCADevice device, uint16_t slot, uint8_t *public_key): atca_basic.c']]], + ['atcab_5fread_5fserial_5fnumber_141',['atcab_read_serial_number',['../a01466.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(): atca_basic.c'],['../a01479.html#a903f3bc6862860693f3d0c7fcfb68abd',1,'cryptoauthlib.atcab.atcab_read_serial_number()'],['../a01466.html#ga96c434878e1f435e2cda5b0b5fec444f',1,'atcab_read_serial_number(uint8_t *serial_number): atca_basic.c']]], + ['atcab_5fread_5fserial_5fnumber_5fext_142',['atcab_read_serial_number_ext',['../a01466.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c'],['../a01466.html#ga8a741e461c20d2a72493bc6178826eb1',1,'atcab_read_serial_number_ext(ATCADevice device, uint8_t *serial_number): atca_basic.c']]], + ['atcab_5fread_5fsig_143',['atcab_read_sig',['../a01466.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01466.html#ga098c4c2c724b90b7e2f4ecf12b9530b7',1,'atcab_read_sig(uint16_t slot, uint8_t *sig): atca_basic.c'],['../a01479.html#a643bc00f84713b2e8705021f6b2c2d0f',1,'cryptoauthlib.atcab.atcab_read_sig()']]], + ['atcab_5fread_5fzone_144',['atcab_read_zone',['../a01466.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#ga3ce01f02f456c08891ca1d67cd3ed0eb',1,'atcab_read_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01479.html#ae74a63edf1522697556aa1d98493b15b',1,'cryptoauthlib.atcab.atcab_read_zone()']]], + ['atcab_5fread_5fzone_5fext_145',['atcab_read_zone_ext',['../a01466.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#ga245f181cbf1ba418e60d060503945c33',1,'atcab_read_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint8_t *data, uint8_t len): atca_basic.c']]], + ['atcab_5frelease_146',['atcab_release',['../a01466.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c'],['../a01466.html#ga3a061c1f96bb641b36fc56b6cb2dd4e4',1,'atcab_release(void): atca_basic.c'],['../a01479.html#a6b784447f8cf2cfc112ab33a4b10ce22',1,'cryptoauthlib.atcab.atcab_release()']]], + ['atcab_5frelease_5fext_147',['atcab_release_ext',['../a01466.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c'],['../a01466.html#ga147803646532319e585a0fe7a6c028ef',1,'atcab_release_ext(ATCADevice *device): atca_basic.c']]], + ['atcab_5freversal_148',['atcab_reversal',['../a00257.html#a7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c'],['../a01466.html#ga7371f490659b6fd68739d2b1fee50696',1,'atcab_reversal(const uint8_t *bin, size_t bin_size, uint8_t *dest, size_t *dest_size): atca_helpers.c']]], + ['atcab_5fsecureboot_149',['atcab_secureboot',['../a01466.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01466.html#ga9506331ea7d454fe3c9b2585128c77aa',1,'atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t *digest, const uint8_t *signature, uint8_t *mac): atca_basic.c'],['../a01479.html#a7063655ccab4af3b185ff519a40329e0',1,'cryptoauthlib.atcab.atcab_secureboot(mode, param2, digest, signature, mac)']]], + ['atcab_5fsecureboot_5fmac_150',['atcab_secureboot_mac',['../a01479.html#a3e585d7d21fb74154c4e53d541db9e5a',1,'cryptoauthlib.atcab.atcab_secureboot_mac()'],['../a01466.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga5c11f2012a03ec79cb46de8e03ed0534',1,'atcab_secureboot_mac(uint8_t mode, const uint8_t *digest, const uint8_t *signature, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c']]], + ['atcab_5fselftest_151',['atcab_selftest',['../a01466.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c'],['../a01466.html#gaeb4a36bc6992612cc3b1f950c0d020b7',1,'atcab_selftest(uint8_t mode, uint16_t param2, uint8_t *result): atca_basic.c'],['../a01479.html#ab078cd0a92f0f235fa36fb06ccf4af19',1,'cryptoauthlib.atcab.atcab_selftest()']]], + ['atcab_5fsha_152',['atcab_sha',['../a01466.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c'],['../a01466.html#ga31d269ccdafd08519a899a8aebf53df1',1,'atcab_sha(uint16_t length, const uint8_t *message, uint8_t *digest): atca_basic.c'],['../a01479.html#a583ddc1d9adbdceea0a7617c6b87ff8d',1,'cryptoauthlib.atcab.atcab_sha(length, message, digest)']]], + ['atcab_5fsha_5fbase_153',['atcab_sha_base',['../a01479.html#a49b55d1996aee8c868684a916341522f',1,'cryptoauthlib.atcab.atcab_sha_base()'],['../a01466.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c'],['../a01466.html#gab3a32e171ca1c30bd31a216b32c9b5a4',1,'atcab_sha_base(uint8_t mode, uint16_t length, const uint8_t *data_in, uint8_t *data_out, uint16_t *data_out_size): atca_basic.c']]], + ['atcab_5fsha_5fend_154',['atcab_sha_end',['../a01466.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c'],['../a01466.html#ga1db86704035048066a370815b657234d',1,'atcab_sha_end(uint8_t *digest, uint16_t length, const uint8_t *message): atca_basic.c'],['../a01479.html#a7ffc1b8652c148a1c3a86ef80155502c',1,'cryptoauthlib.atcab.atcab_sha_end()']]], + ['atcab_5fsha_5fhmac_155',['atcab_sha_hmac',['../a01466.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01466.html#gae655ce06583c08169170102fbb0b55c9',1,'atcab_sha_hmac(const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01479.html#a0589fee6cdf8761c032b330a3079e0e0',1,'cryptoauthlib.atcab.atcab_sha_hmac()']]], + ['atcab_5fsha_5fhmac_5fext_156',['atcab_sha_hmac_ext',['../a01466.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01466.html#gaede6ae09e6192e452ad261f4e15e1c62',1,'atcab_sha_hmac_ext(ATCADevice device, const uint8_t *data, size_t data_size, uint16_t key_slot, uint8_t *digest, uint8_t target): atca_basic.c']]], + ['atcab_5fsha_5fhmac_5ffinish_157',['atcab_sha_hmac_finish',['../a01466.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01466.html#gaa4be9972396b7cadb08dd8e2199daf08',1,'atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t *ctx, uint8_t *digest, uint8_t target): atca_basic.c'],['../a01479.html#a897a5ee03a68bba8afe2371f89a6d7a5',1,'cryptoauthlib.atcab.atcab_sha_hmac_finish()']]], + ['atcab_5fsha_5fhmac_5finit_158',['atcab_sha_hmac_init',['../a01466.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01466.html#ga310a017cddce9ef05071cb619b4b6db9',1,'atcab_sha_hmac_init(atca_hmac_sha256_ctx_t *ctx, uint16_t key_slot): atca_basic.c'],['../a01479.html#a6d243431c455704e03f148b9e373db51',1,'cryptoauthlib.atcab.atcab_sha_hmac_init(ctx, key_slot)']]], + ['atcab_5fsha_5fhmac_5fupdate_159',['atcab_sha_hmac_update',['../a01479.html#a323b71e8080719b27a45f63bb8ef6a59',1,'cryptoauthlib.atcab.atcab_sha_hmac_update()'],['../a01466.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c'],['../a01466.html#gae3343c160e80365b7e96bdfdc9b6365c',1,'atcab_sha_hmac_update(atca_hmac_sha256_ctx_t *ctx, const uint8_t *data, size_t data_size): atca_basic.c']]], + ['atcab_5fsha_5fread_5fcontext_160',['atcab_sha_read_context',['../a01466.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01466.html#ga74d1db50562642ce511fa7cbd384c2ab',1,'atcab_sha_read_context(uint8_t *context, uint16_t *context_size): atca_basic.c'],['../a01479.html#a4bcf510aa10502e29fe2321486019fb5',1,'cryptoauthlib.atcab.atcab_sha_read_context()']]], + ['atcab_5fsha_5fstart_161',['atcab_sha_start',['../a01466.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01466.html#gae0a7ef89fce4cbd0ee1c76759cd93b9a',1,'atcab_sha_start(void): atca_basic.c'],['../a01479.html#a3fee574ed2618a6abc770bb1f17dc6b5',1,'cryptoauthlib.atcab.atcab_sha_start()']]], + ['atcab_5fsha_5fupdate_162',['atcab_sha_update',['../a01466.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(): atca_basic.c'],['../a01479.html#a91f72328d639d88598498c37cb552ffb',1,'cryptoauthlib.atcab.atcab_sha_update()'],['../a01466.html#ga39bd70baa7a4c7f4849fcf8b94d4d949',1,'atcab_sha_update(const uint8_t *message): atca_basic.c']]], + ['atcab_5fsha_5fwrite_5fcontext_163',['atcab_sha_write_context',['../a01466.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c'],['../a01466.html#ga070fa80ac0d76f6816d9f7affbcfb120',1,'atcab_sha_write_context(const uint8_t *context, uint16_t context_size): atca_basic.c'],['../a01479.html#acc277568c5c42424ff90d8bfcee667b8',1,'cryptoauthlib.atcab.atcab_sha_write_context()']]], + ['atcab_5fsign_164',['atcab_sign',['../a01466.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01466.html#ga69b8282d1b1e0c54b9a7d286fed503b8',1,'atcab_sign(uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01479.html#a14fe9d38029d932b4aef6802bbf078ab',1,'cryptoauthlib.atcab.atcab_sign(key_id, msg, signature)']]], + ['atcab_5fsign_5fbase_165',['atcab_sign_base',['../a01479.html#a8728f5f5bf67ede8dce575af486499c9',1,'cryptoauthlib.atcab.atcab_sign_base()'],['../a01466.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c'],['../a01466.html#ga5c1e598bf3d4d25b522f42d6038a4268',1,'atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t *signature): atca_basic.c']]], + ['atcab_5fsign_5fext_166',['atcab_sign_ext',['../a01466.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c'],['../a01466.html#ga4b76ca12e6f7236d9ef3235b174f48cc',1,'atcab_sign_ext(ATCADevice device, uint16_t key_id, const uint8_t *msg, uint8_t *signature): atca_basic.c']]], + ['atcab_5fsign_5finternal_167',['atcab_sign_internal',['../a01466.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature): atca_basic.c'],['../a01466.html#ga559add3e8b4f85a9d91fc0ed86aefa29',1,'atcab_sign_internal(uint16_t key_id, bool is_invalidate, bool is_full_sn, uint8_t *signature): atca_basic.c'],['../a01479.html#af218c61a8dd3d937e5dfd3ad2d0c2701',1,'cryptoauthlib.atcab.atcab_sign_internal()']]], + ['atcab_5fsleep_168',['atcab_sleep',['../a01466.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c'],['../a01466.html#ga9475e032c388144c5a0df45d1df182a5',1,'atcab_sleep(void): atca_basic.c']]], + ['atcab_5fupdateextra_169',['atcab_updateextra',['../a01479.html#a76dda154eba75b7c0c8f6a8fcc5d346a',1,'cryptoauthlib.atcab.atcab_updateextra()'],['../a01466.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c'],['../a01466.html#ga416e4aeacf3acc35b1d5b76028c6947d',1,'atcab_updateextra(uint8_t mode, uint16_t new_value): atca_basic.c']]], + ['atcab_5fverify_170',['atcab_verify',['../a01466.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01466.html#ga694d921c7bc17a0e158ef96e3d476700',1,'atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t *signature, const uint8_t *public_key, const uint8_t *other_data, uint8_t *mac): atca_basic.c'],['../a01479.html#a40e190b9a9b0bb5aa2389cc482f94780',1,'cryptoauthlib.atcab.atcab_verify()']]], + ['atcab_5fverify_5fextern_171',['atcab_verify_extern',['../a01466.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga2c3e18de900ba705192963d08b37f600',1,'atcab_verify_extern(const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01479.html#a692a721d89bd8f4032502f343d3f1718',1,'cryptoauthlib.atcab.atcab_verify_extern()']]], + ['atcab_5fverify_5fextern_5fext_172',['atcab_verify_extern_ext',['../a01466.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c'],['../a01466.html#ga3a4e2ffada9173db1a775a697bbebf18',1,'atcab_verify_extern_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, const uint8_t *public_key, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fextern_5fmac_173',['atcab_verify_extern_mac',['../a01466.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(): atca_basic.c'],['../a01479.html#ae8ab769023a1d717198eb06aa17ff8b0',1,'cryptoauthlib.atcab.atcab_verify_extern_mac()'],['../a01466.html#ga17bf17c4786be097a0bb111a6f9d8ca6',1,'atcab_verify_extern_mac(): atca_basic.c']]], + ['atcab_5fverify_5fextern_5fstored_5fmac_174',['atcab_verify_extern_stored_mac',['../a01479.html#aadca3cb06b25a8b3b8c6a851ad477db0',1,'cryptoauthlib::atcab']]], + ['atcab_5fverify_5finvalidate_175',['atcab_verify_invalidate',['../a01466.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01466.html#ga9393b545b2fa1fdd539672a0428a30ab',1,'atcab_verify_invalidate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c'],['../a01479.html#a49f823cd787be6ed036e7bc1e430b384',1,'cryptoauthlib.atcab.atcab_verify_invalidate()']]], + ['atcab_5fverify_5fstored_176',['atcab_verify_stored',['../a01466.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01466.html#gae8cc7670847805423ad591985eecd832',1,'atcab_verify_stored(const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01479.html#a90baa667a1e6bb223cda44f4322c2f44',1,'cryptoauthlib.atcab.atcab_verify_stored()']]], + ['atcab_5fverify_5fstored_5fext_177',['atcab_verify_stored_ext',['../a01466.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01466.html#gad08f6cceac6e8147aeb6f665dc0a2aff',1,'atcab_verify_stored_ext(ATCADevice device, const uint8_t *message, const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fstored_5fmac_178',['atcab_verify_stored_mac',['../a01466.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01466.html#gaa52cdbbfd2f089d8eb42ef2640204ca7',1,'atcab_verify_stored_mac(const uint8_t *message, const uint8_t *signature, uint16_t key_id, const uint8_t *num_in, const uint8_t *io_key, bool *is_verified): atca_basic.c'],['../a01479.html#a4b1ae9a8e89b7038fd5f75686ca97e31',1,'cryptoauthlib.atcab.atcab_verify_stored_mac()']]], + ['atcab_5fverify_5fstored_5fwith_5ftempkey_179',['atcab_verify_stored_with_tempkey',['../a01466.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c'],['../a01466.html#ga582dc8686f0491ad4292287f6971543c',1,'atcab_verify_stored_with_tempkey(const uint8_t *signature, uint16_t key_id, bool *is_verified): atca_basic.c']]], + ['atcab_5fverify_5fvalidate_180',['atcab_verify_validate',['../a01466.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(): atca_basic.c'],['../a01479.html#a627d101aa165533d893461f5fb39efa1',1,'cryptoauthlib.atcab.atcab_verify_validate()'],['../a01466.html#gacf9a0c7772ebb65b87c4a4788850702b',1,'atcab_verify_validate(uint16_t key_id, const uint8_t *signature, const uint8_t *other_data, bool *is_verified): atca_basic.c']]], + ['atcab_5fversion_181',['atcab_version',['../a01466.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c'],['../a01466.html#gaff701132013eaac5600dd9fd6253505d',1,'atcab_version(char *ver_str): atca_basic.c']]], + ['atcab_5fwakeup_182',['atcab_wakeup',['../a01466.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c'],['../a01466.html#gad3bc620aedd9322d160eece0d8d20c82',1,'atcab_wakeup(void): atca_basic.c']]], + ['atcab_5fwrite_183',['atcab_write',['../a01466.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c'],['../a01466.html#gabf2b29b4d3ae926b63c403d084380dbe',1,'atcab_write(uint8_t zone, uint16_t address, const uint8_t *value, const uint8_t *mac): atca_basic.c'],['../a01479.html#acd0f0264807684089bb1ab8bdfcb989f',1,'cryptoauthlib.atcab.atcab_write()']]], + ['atcab_5fwrite_5fbytes_5fzone_184',['atcab_write_bytes_zone',['../a01466.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length): atca_basic.c'],['../a01466.html#gac395a7e195aa3cf28b48de345755feb0',1,'atcab_write_bytes_zone(uint8_t zone, uint16_t slot, size_t offset_bytes, const uint8_t *data, size_t length): atca_basic.c'],['../a01479.html#a5db76308f0e51108dea8222f14ac405e',1,'cryptoauthlib.atcab.atcab_write_bytes_zone()']]], + ['atcab_5fwrite_5fconfig_5fcounter_185',['atcab_write_config_counter',['../a01466.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c'],['../a01466.html#gab25ca44957dff1c2df34607738ca3bf7',1,'atcab_write_config_counter(uint16_t counter_id, uint32_t counter_value): atca_basic.c'],['../a01479.html#aff3e1986bf6d79a353f8820fe5ed4306',1,'cryptoauthlib.atcab.atcab_write_config_counter()']]], + ['atcab_5fwrite_5fconfig_5fzone_186',['atcab_write_config_zone',['../a01466.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01466.html#ga0777a86aa412a97b19cc72a12c171b94',1,'atcab_write_config_zone(const uint8_t *config_data): atca_basic.c'],['../a01479.html#a4144ba085c025b94f6d39de2ba33dc26',1,'cryptoauthlib.atcab.atcab_write_config_zone()']]], + ['atcab_5fwrite_5fconfig_5fzone_5fext_187',['atcab_write_config_zone_ext',['../a01466.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c'],['../a01466.html#ga92d651c637007f8c3672c3313767c0e7',1,'atcab_write_config_zone_ext(ATCADevice device, const uint8_t *config_data): atca_basic.c']]], + ['atcab_5fwrite_5fenc_188',['atcab_write_enc',['../a01466.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01466.html#ga78a5394997ea31b125cd57d07aa73636',1,'atcab_write_enc(uint16_t key_id, uint8_t block, const uint8_t *data, const uint8_t *enc_key, const uint16_t enc_key_id, const uint8_t num_in[(20)]): atca_basic.c'],['../a01479.html#ae8faf982d17b5fc72231bc648a51063a',1,'cryptoauthlib.atcab.atcab_write_enc()']]], + ['atcab_5fwrite_5fpubkey_189',['atcab_write_pubkey',['../a01466.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01466.html#ga47cbedeb3c3e9f7cbf2b9433cd60d1aa',1,'atcab_write_pubkey(uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01479.html#a64692832da534aacee8a61cef74e9be1',1,'cryptoauthlib.atcab.atcab_write_pubkey()']]], + ['atcab_5fwrite_5fpubkey_5fext_190',['atcab_write_pubkey_ext',['../a01466.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c'],['../a01466.html#gaa80d6c193374d363649236778289f2ea',1,'atcab_write_pubkey_ext(ATCADevice device, uint16_t slot, const uint8_t *public_key): atca_basic.c']]], + ['atcab_5fwrite_5fzone_191',['atcab_write_zone',['../a01466.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#ga1f5a6bbcf4f840803635fb8951b3a7e2',1,'atcab_write_zone(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01479.html#a18b7743ebac58022a1f704cb3b011803',1,'cryptoauthlib.atcab.atcab_write_zone()']]], + ['atcab_5fwrite_5fzone_5fext_192',['atcab_write_zone_ext',['../a01466.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c'],['../a01466.html#gad03eaf30d3d776260ad57ff05c2d6aa1',1,'atcab_write_zone_ext(ATCADevice device, uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, const uint8_t *data, uint8_t len): atca_basic.c']]], + ['atcac_5faes_5fcmac_5ffinish_193',['atcac_aes_cmac_finish',['../a00671.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_mbedtls_wrap.c'],['../a00677.html#a9fb429f011c7df55055763f41b896f28',1,'atcac_aes_cmac_finish(struct atcac_aes_cmac_ctx *ctx, uint8_t *cmac, size_t *cmac_size): atca_openssl_interface.c']]], + ['atcac_5faes_5fcmac_5finit_194',['atcac_aes_cmac_init',['../a00677.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c'],['../a00671.html#a17af2d47faed0774e9277be42512b0f4',1,'atcac_aes_cmac_init(struct atcac_aes_cmac_ctx *ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c']]], + ['atcac_5faes_5fcmac_5fupdate_195',['atcac_aes_cmac_update',['../a00671.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_mbedtls_wrap.c'],['../a00677.html#a9c6a8dc222080952c2541db9cf7cd3c0',1,'atcac_aes_cmac_update(struct atcac_aes_cmac_ctx *ctx, const uint8_t *data, const size_t data_size): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5faad_5fupdate_196',['atcac_aes_gcm_aad_update',['../a00671.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_mbedtls_wrap.c'],['../a00677.html#a7cc388d11506f9ef030994fab99cfaa7',1,'atcac_aes_gcm_aad_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *aad, const size_t aad_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fdecrypt_5ffinish_197',['atcac_aes_gcm_decrypt_finish',['../a00671.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_mbedtls_wrap.c'],['../a00677.html#ac9cde02547c1ed0122c87f0a156ee268',1,'atcac_aes_gcm_decrypt_finish(struct atcac_aes_gcm_ctx *ctx, const uint8_t *tag, size_t tag_len, bool *is_verified): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fdecrypt_5fstart_198',['atcac_aes_gcm_decrypt_start',['../a00671.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00677.html#a473ff3c449375989e846d66342333b3a',1,'atcac_aes_gcm_decrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fdecrypt_5fupdate_199',['atcac_aes_gcm_decrypt_update',['../a00671.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_mbedtls_wrap.c'],['../a00677.html#a04b292df2006e31743224b66e16a29e9',1,'atcac_aes_gcm_decrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *ciphertext, const size_t ct_len, uint8_t *plaintext, size_t *pt_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fencrypt_5ffinish_200',['atcac_aes_gcm_encrypt_finish',['../a00671.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_mbedtls_wrap.c'],['../a00677.html#a5bdd8ba09593bb7a2ce1f48df873250a',1,'atcac_aes_gcm_encrypt_finish(struct atcac_aes_gcm_ctx *ctx, uint8_t *tag, size_t tag_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fencrypt_5fstart_201',['atcac_aes_gcm_encrypt_start',['../a00671.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_mbedtls_wrap.c'],['../a00677.html#a856d7a2b4bdd82d01544cb4ee6048e48',1,'atcac_aes_gcm_encrypt_start(struct atcac_aes_gcm_ctx *ctx, const uint8_t *key, const uint8_t key_len, const uint8_t *iv, const uint8_t iv_len): atca_openssl_interface.c']]], + ['atcac_5faes_5fgcm_5fencrypt_5fupdate_202',['atcac_aes_gcm_encrypt_update',['../a00671.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_mbedtls_wrap.c'],['../a00677.html#a34f53a6f8a1ef018ef886961e4f60694',1,'atcac_aes_gcm_encrypt_update(struct atcac_aes_gcm_ctx *ctx, const uint8_t *plaintext, const size_t pt_len, uint8_t *ciphertext, size_t *ct_len): atca_openssl_interface.c']]], + ['atcac_5fpk_5fderive_203',['atcac_pk_derive',['../a00671.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00677.html#a7b82589420e299091e6b80459bfb90d8',1,'atcac_pk_derive(struct atcac_pk_ctx *private_ctx, struct atcac_pk_ctx *public_ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], + ['atcac_5fpk_5ffree_204',['atcac_pk_free',['../a00671.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_mbedtls_wrap.c'],['../a00677.html#a757c5734289254c48f43cc26b7d5e6a4',1,'atcac_pk_free(struct atcac_pk_ctx *ctx): atca_openssl_interface.c']]], + ['atcac_5fpk_5finit_205',['atcac_pk_init',['../a00677.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_openssl_interface.c'],['../a00671.html#aa1cfc16d20a4a93bc8cc45f68bd6a74f',1,'atcac_pk_init(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, uint8_t key_type, bool pubkey): atca_mbedtls_wrap.c']]], + ['atcac_5fpk_5finit_5fpem_206',['atcac_pk_init_pem',['../a00671.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_mbedtls_wrap.c'],['../a00677.html#a93806f5fc89ac97ab70e74dc9c41dd76',1,'atcac_pk_init_pem(struct atcac_pk_ctx *ctx, const uint8_t *buf, size_t buflen, bool pubkey): atca_openssl_interface.c']]], + ['atcac_5fpk_5fpublic_207',['atcac_pk_public',['../a00671.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_mbedtls_wrap.c'],['../a00677.html#acd482e1225ffba53b6bfe903e133a541',1,'atcac_pk_public(struct atcac_pk_ctx *ctx, uint8_t *buf, size_t *buflen): atca_openssl_interface.c']]], + ['atcac_5fpk_5fsign_208',['atcac_pk_sign',['../a00671.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_mbedtls_wrap.c'],['../a00677.html#aef7827b56555e8efcc4646855335555f',1,'atcac_pk_sign(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, uint8_t *signature, size_t *sig_len): atca_openssl_interface.c']]], + ['atcac_5fpk_5fverify_209',['atcac_pk_verify',['../a00671.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_mbedtls_wrap.c'],['../a00677.html#a29573bbcca0c005de19ec709109538df',1,'atcac_pk_verify(struct atcac_pk_ctx *ctx, const uint8_t *digest, size_t dig_len, const uint8_t *signature, size_t sig_len): atca_openssl_interface.c']]], + ['atcac_5fsha256_5fhmac_5ffinish_210',['atcac_sha256_hmac_finish',['../a00671.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_mbedtls_wrap.c'],['../a00677.html#ac5f016c7c9fa74cadbd76508e68ffe66',1,'atcac_sha256_hmac_finish(struct atcac_hmac_ctx *ctx, uint8_t *digest, size_t *digest_len): atca_openssl_interface.c']]], + ['atcac_5fsha256_5fhmac_5finit_211',['atcac_sha256_hmac_init',['../a00671.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_mbedtls_wrap.c'],['../a00677.html#a107f3a8b6eb198dff510926061cabb43',1,'atcac_sha256_hmac_init(struct atcac_hmac_ctx *ctx, struct atcac_sha2_256_ctx *sha256_ctx, const uint8_t *key, const uint8_t key_len): atca_openssl_interface.c']]], + ['atcac_5fsha256_5fhmac_5fupdate_212',['atcac_sha256_hmac_update',['../a00671.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00677.html#a15fed8a07cb9fef1f7cb0dc5fffcbfee',1,'atcac_sha256_hmac_update(struct atcac_hmac_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], + ['atcac_5fsw_5frandom_213',['atcac_sw_random',['../a00671.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00677.html#a45fef91f1894c03f9fd94d2835a91342',1,'atcac_sw_random(uint8_t *data, size_t data_size): atca_openssl_interface.c']]], + ['atcac_5fsw_5fsha1_5ffinish_214',['atcac_sw_sha1_finish',['../a00671.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_mbedtls_wrap.c'],['../a00677.html#abb02186059737ad5fb792665cf0b97dd',1,'atcac_sw_sha1_finish(struct atcac_sha1_ctx *ctx, uint8_t digest[ATCA_SHA1_DIGEST_SIZE]): atca_openssl_interface.c']]], + ['atcac_5fsw_5fsha1_5finit_215',['atcac_sw_sha1_init',['../a00671.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_mbedtls_wrap.c'],['../a00677.html#a723448315d3bbc03a39104d36fd2b4bc',1,'atcac_sw_sha1_init(struct atcac_sha1_ctx *ctx): atca_openssl_interface.c']]], + ['atcac_5fsw_5fsha1_5fupdate_216',['atcac_sw_sha1_update',['../a00671.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_mbedtls_wrap.c'],['../a00677.html#a1b8bae42b5963d812f4cf2329807f778',1,'atcac_sw_sha1_update(struct atcac_sha1_ctx *ctx, const uint8_t *data, size_t data_size): atca_openssl_interface.c']]], + ['atcacert_5fcalc_5fexpire_5fyears_217',['atcacert_calc_expire_years',['../a01470.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c'],['../a01470.html#ga6961d4584f23cfe79ddec69a91e41e03',1,'atcacert_calc_expire_years(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, int issue_tm_year, uint8_t *expire_years): atcacert_def.c']]], + ['atcacert_5fcreate_5fcsr_218',['atcacert_create_csr',['../a01470.html#ga9b103dcc50fefcb19514285da7fbe296',1,'atcacert_create_csr(): atcacert_client.h'],['../a01480.html#a453696e86822c980d8e5b9e6a27eb861',1,'cryptoauthlib.atcacert.atcacert_create_csr()']]], + ['atcacert_5fcreate_5fcsr_5fpem_219',['atcacert_create_csr_pem',['../a01470.html#ga1e4f207e7180d504c5dd369cd20fef21',1,'atcacert_create_csr_pem(): atcacert_client.h'],['../a01480.html#a6c23b4916b8fa6dc8aa56b45f558d870',1,'cryptoauthlib.atcacert.atcacert_create_csr_pem()']]], + ['atcacert_5fdate_5fcmp_220',['atcacert_date_cmp',['../a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c'],['../a01470.html#ga6609f17be8ee9ba67f9c50a3790b9486',1,'atcacert_date_cmp(const atcacert_tm_utc_t *timestamp1, const atcacert_tm_utc_t *timestamp2): atcacert_date.c']]], + ['atcacert_5fdate_5fdec_221',['atcacert_date_dec',['../a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01470.html#ga6a6ba4b1c683a72bd3bd34badbed7461',1,'atcacert_date_dec(atcacert_date_format_t format, const uint8_t *formatted_date, size_t formatted_date_size, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01480.html#a7e05b319688a07bbfeee23895341303e',1,'cryptoauthlib.atcacert.atcacert_date_dec(date_format, formatted_date, formatted_date_size, timestamp)']]], + ['atcacert_5fdate_5fdec_5fcompcert_222',['atcacert_date_dec_compcert',['../a01480.html#a7910146d6e2097e9fb075a2bf60d1b25',1,'cryptoauthlib.atcacert.atcacert_date_dec_compcert()'],['../a01470.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01470.html#gaab6bdf548ca56cec54441114a3152767',1,'atcacert_date_dec_compcert(const uint8_t enc_dates[3], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], + ['atcacert_5fdate_5fdec_5fcompcert_5fext_223',['atcacert_date_dec_compcert_ext',['../a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c'],['../a01470.html#ga5d9b9329445d9ac59e306531b9bc65f2',1,'atcacert_date_dec_compcert_ext(const uint8_t comp_cert[72u], atcacert_date_format_t expire_date_format, atcacert_tm_utc_t *issue_date, atcacert_tm_utc_t *expire_date): atcacert_date.c']]], + ['atcacert_5fdate_5fenc_224',['atcacert_date_enc',['../a01470.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01470.html#ga33f676825335d37da36aee1c93463829',1,'atcacert_date_enc(atcacert_date_format_t format, const atcacert_tm_utc_t *timestamp, uint8_t *formatted_date, size_t *formatted_date_size): atcacert_date.c'],['../a01480.html#a23ff0ccfc75d564fc9f6200ef8cff5fb',1,'cryptoauthlib.atcacert.atcacert_date_enc(date_format, timestamp, formatted_date, formatted_date_size)']]], + ['atcacert_5fdate_5fenc_5fcompcert_225',['atcacert_date_enc_compcert',['../a01480.html#a82bd7bbea46866cb644016ea7faff329',1,'cryptoauthlib.atcacert.atcacert_date_enc_compcert()'],['../a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c'],['../a01470.html#gaef5c4497cd5a21ae7952658aa9dc7a62',1,'atcacert_date_enc_compcert(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t enc_dates[3]): atcacert_date.c']]], + ['atcacert_5fdate_5fenc_5fcompcert_5fext_226',['atcacert_date_enc_compcert_ext',['../a01470.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c'],['../a01470.html#ga949c368ba13b78caee11d2abe60de755',1,'atcacert_date_enc_compcert_ext(const atcacert_tm_utc_t *issue_date, uint8_t expire_years, uint8_t comp_cert[72u]): atcacert_date.c']]], + ['atcacert_5fdate_5ffrom_5fasn1_5ftag_227',['atcacert_date_from_asn1_tag',['../a01470.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c'],['../a01470.html#ga208c468285600790ebcdba55a4ccf3a8',1,'atcacert_date_from_asn1_tag(const uint8_t tag): atcacert_date.c']]], + ['atcacert_5fdate_5fget_5fmax_5fdate_228',['atcacert_date_get_max_date',['../a01470.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01470.html#ga82a0f236afa03da347abbee1db588cb3',1,'atcacert_date_get_max_date(atcacert_date_format_t format, atcacert_tm_utc_t *timestamp): atcacert_date.c'],['../a01480.html#a0ffefee23107bcbbadef2508ccaaba4f',1,'cryptoauthlib.atcacert.atcacert_date_get_max_date()']]], + ['atcacert_5fdecode_5fpem_229',['atcacert_decode_pem',['../a00323.html#a32d4e4f417e88b56b9adc5b7c521d545',1,'atcacert_pem.h']]], + ['atcacert_5fdecode_5fpem_5fcert_230',['atcacert_decode_pem_cert',['../a00323.html#a5ee7c8e3893e67ae0a622bddc443bcbd',1,'atcacert_pem.h']]], + ['atcacert_5fdecode_5fpem_5fcsr_231',['atcacert_decode_pem_csr',['../a00323.html#adfccc0bc91b144dffab3aba96126800f',1,'atcacert_pem.h']]], + ['atcacert_5fder_5fdec_5fecdsa_5fsig_5fvalue_232',['atcacert_der_dec_ecdsa_sig_value',['../a01470.html#gab22e2c8bf627f700be0e10e331bfdb1f',1,'atcacert_der.h']]], + ['atcacert_5fder_5fdec_5finteger_233',['atcacert_der_dec_integer',['../a01470.html#ga5d7eff7a29bc02cfe16bc3d25e3ef2eb',1,'atcacert_der.h']]], + ['atcacert_5fder_5fdec_5flength_234',['atcacert_der_dec_length',['../a01470.html#ga9d4810aa2fd1db14a8f91204387fd972',1,'atcacert_der.h']]], + ['atcacert_5fder_5fenc_5fecdsa_5fsig_5fvalue_235',['atcacert_der_enc_ecdsa_sig_value',['../a01470.html#gacee7e7eb74c022b2ea70c7a549d5f876',1,'atcacert_der.h']]], + ['atcacert_5fder_5fenc_5finteger_236',['atcacert_der_enc_integer',['../a01470.html#gadc86044101ad9a87556d49ab8bf892af',1,'atcacert_der.h']]], + ['atcacert_5fder_5fenc_5flength_237',['atcacert_der_enc_length',['../a01470.html#ga5866e20dc2c7f9d788924155eac4fece',1,'atcacert_der.h']]], + ['atcacert_5fencode_5fpem_238',['atcacert_encode_pem',['../a00323.html#a65ca7cd1f2358ad40ae4c8c13f6d817c',1,'atcacert_pem.h']]], + ['atcacert_5fencode_5fpem_5fcert_239',['atcacert_encode_pem_cert',['../a00323.html#a206c4857a73ccfc7898131b61d43ba67',1,'atcacert_pem.h']]], + ['atcacert_5fencode_5fpem_5fcsr_240',['atcacert_encode_pem_csr',['../a00323.html#ad3b6773201632141bbc95ca6d43271f9',1,'atcacert_pem.h']]], + ['atcacert_5fgen_5fchallenge_5fhw_241',['atcacert_gen_challenge_hw',['../a01470.html#ga6692847d9c41eb73e469df029697a7b9',1,'atcacert_host_hw.h']]], + ['atcacert_5fgen_5fchallenge_5fsw_242',['atcacert_gen_challenge_sw',['../a01470.html#ga883a0c84474150e6b123dfab15a8c929',1,'atcacert_host_sw.h']]], + ['atcacert_5fget_5fauth_5fkey_5fid_243',['atcacert_get_auth_key_id',['../a01470.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c'],['../a01470.html#ga79182d181cd8041a0e66e18790dff519',1,'atcacert_get_auth_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t auth_key_id[20]): atcacert_def.c']]], + ['atcacert_5fget_5fcert_5fsn_244',['atcacert_get_cert_sn',['../a01470.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c'],['../a01470.html#gad1de933f825653a1a725b46407adb09e',1,'atcacert_get_cert_sn(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t *cert_sn, size_t *cert_sn_size): atcacert_def.c']]], + ['atcacert_5fget_5fexpire_5fdate_245',['atcacert_get_expire_date',['../a01470.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01470.html#gaede1f0a4a04cfd720b5fe6a8f56fc466',1,'atcacert_get_expire_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], + ['atcacert_5fget_5fissue_5fdate_246',['atcacert_get_issue_date',['../a01470.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c'],['../a01470.html#ga7305906995afb21b494446d84298533b',1,'atcacert_get_issue_date(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, atcacert_tm_utc_t *timestamp): atcacert_def.c']]], + ['atcacert_5fget_5fissuer_247',['atcacert_get_issuer',['../a01470.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c'],['../a01470.html#gae5e5dfa5db2ac919c093ed4149ff2bc7',1,'atcacert_get_issuer(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t cert_issuer[128]): atcacert_def.c']]], + ['atcacert_5fget_5fresponse_248',['atcacert_get_response',['../a01470.html#ga9a9769b84557ca2c47fa4442daa9a111',1,'atcacert_get_response(): atcacert_client.h'],['../a01480.html#a9c3717acbb392ceed968c1172400e6dd',1,'cryptoauthlib.atcacert.atcacert_get_response()']]], + ['atcacert_5fget_5fsubj_5fkey_5fid_249',['atcacert_get_subj_key_id',['../a01470.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c'],['../a01470.html#ga9544e4c1c1ae365f90253f8a475e164e',1,'atcacert_get_subj_key_id(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, uint8_t subj_key_id[20]): atcacert_def.c']]], + ['atcacert_5fget_5fsubj_5fpublic_5fkey_250',['atcacert_get_subj_public_key',['../a01470.html#ga263eee4dfc30ce4442bfa97f95bd5c30',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *subj_public_key): atcacert_def.c'],['../a01470.html#ga263eee4dfc30ce4442bfa97f95bd5c30',1,'atcacert_get_subj_public_key(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *subj_public_key): atcacert_def.c']]], + ['atcacert_5fget_5fsubject_251',['atcacert_get_subject',['../a01470.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c'],['../a01470.html#ga40feb31278b164a32fe9bf9c2c5a79c0',1,'atcacert_get_subject(const atcacert_def_t *cert_def, const uint8_t *cert, size_t cert_size, cal_buffer *cert_subj_buf): atcacert_def.c']]], + ['atcacert_5fmax_5fcert_5fsize_252',['atcacert_max_cert_size',['../a01480.html#a3b6192388c29b0efb1968d6b44efd712',1,'cryptoauthlib::atcacert']]], + ['atcacert_5fread_5fcert_253',['atcacert_read_cert',['../a01470.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01470.html#gafd202f259b53d72b0a382f33e99f9065',1,'atcacert_read_cert(const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01480.html#a4fe33f1da468796b39c80a34e12411fb',1,'cryptoauthlib.atcacert.atcacert_read_cert()']]], + ['atcacert_5fread_5fcert_5fext_254',['atcacert_read_cert_ext',['../a01470.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c'],['../a01470.html#ga906f310b9518c8f41431b047602cd651',1,'atcacert_read_cert_ext(ATCADevice device, const atcacert_def_t *cert_def, const uint8_t ca_public_key[64], uint8_t *cert, size_t *cert_size): atcacert_client.c']]], + ['atcacert_5fread_5fcert_5fsize_255',['atcacert_read_cert_size',['../a01470.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01470.html#ga143bf9b419fc7a090cb9876436735616',1,'atcacert_read_cert_size(const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], + ['atcacert_5fread_5fcert_5fsize_5fext_256',['atcacert_read_cert_size_ext',['../a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c'],['../a01470.html#ga5ce46e6e2ed2703edd506e3613c65d0b',1,'atcacert_read_cert_size_ext(ATCADevice device, const atcacert_def_t *cert_def, size_t *cert_size): atcacert_client.c']]], + ['atcacert_5fread_5fdevice_5floc_257',['atcacert_read_device_loc',['../a01470.html#ga7eb1ce78d2efb60aa56b929577fa88d2',1,'atcacert_client.h']]], + ['atcacert_5fread_5fdevice_5floc_5fext_258',['atcacert_read_device_loc_ext',['../a01470.html#ga9d69be730c8bd7863588c43ebe58b225',1,'atcacert_client.h']]], + ['atcacert_5fread_5fsubj_5fkey_5fid_259',['atcacert_read_subj_key_id',['../a01470.html#ga7f12776448f02a8c9862c4af64537017',1,'atcacert_client.h']]], + ['atcacert_5fread_5fsubj_5fkey_5fid_5fext_260',['atcacert_read_subj_key_id_ext',['../a01470.html#gacb6ecab7acc06102caee5419a01bd803',1,'atcacert_client.h']]], + ['atcacert_5fverify_5fcert_5fhw_261',['atcacert_verify_cert_hw',['../a01470.html#ga42939c26927fb65340ff1ebb2914a976',1,'atcacert_host_hw.h']]], + ['atcacert_5fverify_5fcert_5fsw_262',['atcacert_verify_cert_sw',['../a01470.html#ga5bad45c1fda32b7a57275af23ab0f626',1,'atcacert_host_sw.h']]], + ['atcacert_5fverify_5fresponse_5fhw_263',['atcacert_verify_response_hw',['../a01470.html#ga1441695a23776f3b38722e51fd3c36e3',1,'atcacert_host_hw.h']]], + ['atcacert_5fverify_5fresponse_5fsw_264',['atcacert_verify_response_sw',['../a01470.html#gab67e7a4c5899ef5402ff44f3f91d20b5',1,'atcacert_host_sw.h']]], + ['atcacert_5fwrite_5fcert_265',['atcacert_write_cert',['../a01470.html#gafa00725d50c68cfd2e0072bf563491a0',1,'atcacert_write_cert(): atcacert_client.h'],['../a01480.html#a5c4d1755dfd9a2b378cd45f14de1f1ee',1,'cryptoauthlib.atcacert.atcacert_write_cert()']]], + ['atcacert_5fwrite_5fcert_5fext_266',['atcacert_write_cert_ext',['../a01470.html#ga25a3291ce46841ca52346b42dc416485',1,'atcacert_client.h']]], + ['atcalccrc_267',['atCalcCrc',['../a00353.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c'],['../a00356.html#aff659b1042abf6e1376e38ccb4a20f3e',1,'atCalcCrc(ATCAPacket *packet): calib_command.c']]], + ['atcheckcrc_268',['atCheckCrc',['../a00353.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c'],['../a00356.html#a7723a58d1781b3ba54e8f45d5729b33a',1,'atCheckCrc(const uint8_t *response): calib_command.c']]], + ['atcontrol_269',['atcontrol',['../a01469.html#ga324cef45a35e02b387001afdc9092778',1,'atca_iface.c']]], + ['atcrc_270',['atCRC',['../a00353.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c'],['../a00356.html#a53ded4ed630b6ef4d292056c2e6b34f6',1,'atCRC(size_t length, const uint8_t *data, uint8_t *crc_le): calib_command.c']]], + ['atgetiface_271',['atGetIFace',['../a01468.html#ga3f98e29cffa06446fc91b329703606af',1,'atca_device.c']]], + ['atgetifacecfg_272',['atgetifacecfg',['../a01469.html#gac88ba81abfd42df65c6c0c64414dfc6e',1,'atca_iface.c']]], + ['atgetifacehaldat_273',['atgetifacehaldat',['../a01469.html#ga5e4163b8882d4eb42d4d5191c8731da0',1,'atca_iface.c']]], + ['atidle_274',['atidle',['../a01469.html#gac794fffe040e6d47a34c756720f3cbea',1,'atca_iface.c']]], + ['atinfo_275',['atInfo',['../a00353.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00356.html#a640d3cfd0f5b41f50cea0b987094d8a1',1,'atInfo(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], + ['atinit_276',['atinit',['../a01469.html#ga386353e8700eec35e4548dfa29f13b8d',1,'atca_iface.c']]], + ['atiseccfamily_277',['atIsECCFamily',['../a00356.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c'],['../a00353.html#ae82dca54cc3fd1cc2f1671e98d64df07',1,'atIsECCFamily(ATCADeviceType device_type): calib_command.c']]], + ['atisshafamily_278',['atIsSHAFamily',['../a00353.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c'],['../a00356.html#aae5866a78d2f0464b04eee9ef1f97030',1,'atIsSHAFamily(ATCADeviceType device_type): calib_command.c']]], + ['atpause_279',['atPause',['../a00353.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c'],['../a00356.html#afaf2ec3ff6b7feba0ca50a9b4f8d3ad8',1,'atPause(ATCADeviceType device_type, ATCAPacket *packet): calib_command.c']]], + ['atreceive_280',['atreceive',['../a01469.html#ga01badea388343bdf5929c5c2be9f426b',1,'atca_iface.c']]], + ['atsend_281',['atsend',['../a01469.html#gabd4f20b06efedede6bc4a836cfad8f38',1,'atca_iface.c']]], + ['atsleep_282',['atsleep',['../a01469.html#gac06336335e5f3191e3b1fc06d2830d96',1,'atca_iface.c']]], + ['atwake_283',['atwake',['../a01469.html#ga32693c852341e1b946bab3cca5f71761',1,'atca_iface.c']]] ]; diff --git a/search/functions_10.js b/search/functions_10.js index 4ce876e85..bc5877554 100644 --- a/search/functions_10.js +++ b/search/functions_10.js @@ -1,4 +1,4 @@ var searchData= [ - ['verify_0',['verify',['../a02236.html#a732d6227271912ac665bc7f27a1012ce',1,'cryptoauthlib::atjwt::HwHmacAlgorithm']]] + ['verify_0',['verify',['../a02271.html#a732d6227271912ac665bc7f27a1012ce',1,'cryptoauthlib::atjwt::HwHmacAlgorithm']]] ]; diff --git a/search/functions_11.js b/search/functions_11.js index 42595bb3f..0d9c50c7f 100644 --- a/search/functions_11.js +++ b/search/functions_11.js @@ -1,4 +1,5 @@ var searchData= [ - ['wpccert_5fread_5fcert_0',['wpccert_read_cert',['../a00128.html#a76a6ac477f6341e80284c76c38b532ff',1,'wpccert_read_cert(ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size): wpccert_client.c'],['../a00131.html#a76a6ac477f6341e80284c76c38b532ff',1,'wpccert_read_cert(ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size): wpccert_client.c']]] + ['wpccert_5fread_5fcert_0',['wpccert_read_cert',['../a00128.html#a76a6ac477f6341e80284c76c38b532ff',1,'wpccert_read_cert(ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size): wpccert_client.c'],['../a00131.html#a76a6ac477f6341e80284c76c38b532ff',1,'wpccert_read_cert(ATCADevice device, const atcacert_def_t *cert_def, uint8_t *cert, size_t *cert_size): wpccert_client.c']]], + ['wpccert_5fread_5fmfg_5fcert_1',['wpccert_read_mfg_cert',['../a00128.html#a9d37502a45846eb04ff3a0824242a99d',1,'wpccert_read_mfg_cert(ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot): wpccert_client.c'],['../a00131.html#a9d37502a45846eb04ff3a0824242a99d',1,'wpccert_read_mfg_cert(ATCADevice device, uint8_t *cert, size_t *cert_size, uint8_t slot): wpccert_client.c']]] ]; diff --git a/search/functions_3.js b/search/functions_3.js index 2e59f6529..dbc0cf349 100644 --- a/search/functions_3.js +++ b/search/functions_3.js @@ -1,105 +1,105 @@ var searchData= [ - ['c_5fcancelfunction_0',['C_CancelFunction',['../a01450.html#gac545b1d8eeb82e40f7519cdfc5a3427c',1,'pkcs11_main.c']]], - ['c_5fcloseallsessions_1',['C_CloseAllSessions',['../a01450.html#gad2ab78c409dfcbc155d673550cb71736',1,'pkcs11_main.c']]], - ['c_5fclosesession_2',['C_CloseSession',['../a01450.html#gae2ce0be368072fa83e0b1f5136b7b753',1,'pkcs11_main.c']]], - ['c_5fcopyobject_3',['C_CopyObject',['../a01450.html#ga301f7118a227ffedd7f945a9532fc18a',1,'pkcs11_main.c']]], - ['c_5fcreateobject_4',['C_CreateObject',['../a01450.html#ga01b36384bff05a4dc4476c0764cdc248',1,'pkcs11_main.c']]], - ['c_5fdecrypt_5',['C_Decrypt',['../a01450.html#gad7a0c95a7b810c5534185632b8b58d29',1,'pkcs11_main.c']]], - ['c_5fdecryptdigestupdate_6',['C_DecryptDigestUpdate',['../a01450.html#ga128ba07226b7e45772830f06dfde4b71',1,'pkcs11_main.c']]], - ['c_5fdecryptfinal_7',['C_DecryptFinal',['../a01450.html#gab549c4d540cff530f9e4d9bca36e2253',1,'pkcs11_main.c']]], - ['c_5fdecryptinit_8',['C_DecryptInit',['../a01450.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5',1,'pkcs11_main.c']]], - ['c_5fdecryptupdate_9',['C_DecryptUpdate',['../a01450.html#gaa4fb93ab28bedada72364e925b3dacbf',1,'pkcs11_main.c']]], - ['c_5fdecryptverifyupdate_10',['C_DecryptVerifyUpdate',['../a01450.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c',1,'pkcs11_main.c']]], - ['c_5fderivekey_11',['C_DeriveKey',['../a01450.html#ga67ecc1ce8ca0630aebdf3a29e129f531',1,'pkcs11_main.c']]], - ['c_5fdestroyobject_12',['C_DestroyObject',['../a01450.html#ga1b991b6fd8b20f130f9d87b98e590fdb',1,'pkcs11_main.c']]], - ['c_5fdigest_13',['C_Digest',['../a01450.html#gadfc9281add668a5aff9bbc1253655917',1,'pkcs11_main.c']]], - ['c_5fdigestencryptupdate_14',['C_DigestEncryptUpdate',['../a01450.html#ga3f8a5f0509ef9929f90536b6e255e485',1,'pkcs11_main.c']]], - ['c_5fdigestfinal_15',['C_DigestFinal',['../a01450.html#ga1f3dc3758726bb4737db956e4cd71e91',1,'pkcs11_main.c']]], - ['c_5fdigestinit_16',['C_DigestInit',['../a01450.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403',1,'pkcs11_main.c']]], - ['c_5fdigestkey_17',['C_DigestKey',['../a01450.html#ga21a9c4115bc535490416e2850a2a45fd',1,'pkcs11_main.c']]], - ['c_5fdigestupdate_18',['C_DigestUpdate',['../a01450.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6',1,'pkcs11_main.c']]], - ['c_5fencrypt_19',['C_Encrypt',['../a01450.html#gaf9aab1c3fcf352af53b0e66652fac39d',1,'pkcs11_main.c']]], - ['c_5fencryptfinal_20',['C_EncryptFinal',['../a01450.html#gab4a336f9cb4920a9ff8585aec5d90a3f',1,'pkcs11_main.c']]], - ['c_5fencryptinit_21',['C_EncryptInit',['../a01450.html#ga23a9b2dc15a447decd10881dde448890',1,'pkcs11_main.c']]], - ['c_5fencryptupdate_22',['C_EncryptUpdate',['../a01450.html#ga5e13fc136e0b7f79d22a6b735424a815',1,'pkcs11_main.c']]], - ['c_5ffinalize_23',['C_Finalize',['../a01450.html#ga945318df98e940ab331931023133ed3d',1,'pkcs11_main.c']]], - ['c_5ffindobjects_24',['C_FindObjects',['../a01450.html#ga42635cbaa2ba78482ae053bea477246a',1,'pkcs11_main.c']]], - ['c_5ffindobjectsfinal_25',['C_FindObjectsFinal',['../a01450.html#ga46347f830269bfbcbece15951f0c0fa4',1,'pkcs11_main.c']]], - ['c_5ffindobjectsinit_26',['C_FindObjectsInit',['../a01450.html#gaf4d4d071deb07e7dcfa489a2a835756d',1,'pkcs11_main.c']]], - ['c_5fgeneratekey_27',['C_GenerateKey',['../a01450.html#ga84673050f913404ec3ae164d4f7a1d9c',1,'pkcs11_main.c']]], - ['c_5fgeneratekeypair_28',['C_GenerateKeyPair',['../a01450.html#ga802a061224966a5523beb1ea0a9d9c27',1,'pkcs11_main.c']]], - ['c_5fgeneraterandom_29',['C_GenerateRandom',['../a01450.html#ga54a883eb1608be800f7fbd204665d50d',1,'pkcs11_main.c']]], - ['c_5fgetattributevalue_30',['C_GetAttributeValue',['../a01450.html#gaaad61dc7b2313286bdd049676ef0fd70',1,'pkcs11_main.c']]], - ['c_5fgetfunctionlist_31',['C_GetFunctionList',['../a01450.html#gab4cf13775c4e92b36156ee92dd52bef5',1,'pkcs11_main.c']]], - ['c_5fgetfunctionstatus_32',['C_GetFunctionStatus',['../a01450.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0',1,'pkcs11_main.c']]], - ['c_5fgetinfo_33',['C_GetInfo',['../a01450.html#ga75bdc5d475cd205914b8227c7f08df4c',1,'pkcs11_main.c']]], - ['c_5fgetmechanisminfo_34',['C_GetMechanismInfo',['../a01450.html#gabe5aeb6b794d4ca28cb2534fe0a4a159',1,'pkcs11_main.c']]], - ['c_5fgetmechanismlist_35',['C_GetMechanismList',['../a01450.html#gac80659e1b954f9514723fd6d4429dfb6',1,'pkcs11_main.c']]], - ['c_5fgetobjectsize_36',['C_GetObjectSize',['../a01450.html#gadd117013f515b1d441889a24a605bd93',1,'pkcs11_main.c']]], - ['c_5fgetoperationstate_37',['C_GetOperationState',['../a01450.html#ga95dcfc50be7ac2cb3ebf58d958f70dde',1,'pkcs11_main.c']]], - ['c_5fgetsessioninfo_38',['C_GetSessionInfo',['../a01450.html#gaffb75a4d4ba623ee01f31877b56b018e',1,'pkcs11_main.c']]], - ['c_5fgetslotinfo_39',['C_GetSlotInfo',['../a01450.html#gae795a3fd0467a249eeb075f94bfa0adc',1,'pkcs11_main.c']]], - ['c_5fgetslotlist_40',['C_GetSlotList',['../a01450.html#gac6ce96c3f4a3b7f24d9420763df121fc',1,'pkcs11_main.c']]], - ['c_5fgettokeninfo_41',['C_GetTokenInfo',['../a01450.html#gac933291718eb6aa218db1c677e07ab02',1,'pkcs11_main.c']]], - ['c_5finitialize_42',['C_Initialize',['../a01450.html#ga2e45ad4ce8c84712c646dddaa99544e3',1,'pkcs11_main.c']]], - ['c_5finitpin_43',['C_InitPIN',['../a01450.html#ga2b726534eedac635b28ccd501c242004',1,'pkcs11_main.c']]], - ['c_5finittoken_44',['C_InitToken',['../a01450.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb',1,'pkcs11_main.c']]], - ['c_5flogin_45',['C_Login',['../a01450.html#gaca7aa4ae8d9592f464dc1b545fead02e',1,'pkcs11_main.c']]], - ['c_5flogout_46',['C_Logout',['../a01450.html#gab7a0a4ff33f2450736d76d453045ad6f',1,'pkcs11_main.c']]], - ['c_5fopensession_47',['C_OpenSession',['../a01450.html#gad28ad989a94c345875dff446ad6c6481',1,'pkcs11_main.c']]], - ['c_5fseedrandom_48',['C_SeedRandom',['../a01450.html#gab26093f478636b5ba04176c2f81f44c4',1,'pkcs11_main.c']]], - ['c_5fsetattributevalue_49',['C_SetAttributeValue',['../a01450.html#ga752412c887c0d900c05b771709ebac83',1,'pkcs11_main.c']]], - ['c_5fsetoperationstate_50',['C_SetOperationState',['../a01450.html#ga66e6598e8f5db01e428a46d58b9865fc',1,'pkcs11_main.c']]], - ['c_5fsetpin_51',['C_SetPIN',['../a01450.html#ga386826845e06a84b36522a2bf49ff6c6',1,'pkcs11_main.c']]], - ['c_5fsign_52',['C_Sign',['../a01450.html#ga5f587605d68a7a56012ac337ddaec5e1',1,'pkcs11_main.c']]], - ['c_5fsignencryptupdate_53',['C_SignEncryptUpdate',['../a01450.html#gaf63ca32aef7a90f87e94a288de5e82cc',1,'pkcs11_main.c']]], - ['c_5fsignfinal_54',['C_SignFinal',['../a01450.html#ga2171c591535849faf017fa126e3a9a48',1,'pkcs11_main.c']]], - ['c_5fsigninit_55',['C_SignInit',['../a01450.html#ga37d93326915dc9b74f2476238f35037c',1,'pkcs11_main.c']]], - ['c_5fsignrecover_56',['C_SignRecover',['../a01450.html#ga210f4bdbaae1bc2b8e242e1610da4f0f',1,'pkcs11_main.c']]], - ['c_5fsignrecoverinit_57',['C_SignRecoverInit',['../a01450.html#ga97ee219718545f49ee651cbb00712b8c',1,'pkcs11_main.c']]], - ['c_5fsignupdate_58',['C_SignUpdate',['../a01450.html#gada0dd5a3d8ae781df05ea016d2f76d16',1,'pkcs11_main.c']]], - ['c_5funwrapkey_59',['C_UnwrapKey',['../a01450.html#gafd4a7d6e142179e46453af11d5da3e91',1,'pkcs11_main.c']]], - ['c_5fverify_60',['C_Verify',['../a01450.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529',1,'pkcs11_main.c']]], - ['c_5fverifyfinal_61',['C_VerifyFinal',['../a01450.html#gaf6ecd512fa21851f0bcbc25b90c2b444',1,'pkcs11_main.c']]], - ['c_5fverifyinit_62',['C_VerifyInit',['../a01450.html#gaeae51e6092fa8c8a58e022fcd8366c45',1,'pkcs11_main.c']]], - ['c_5fverifyrecover_63',['C_VerifyRecover',['../a01450.html#ga82355d41e5303e31cc49df003e9d8c38',1,'pkcs11_main.c']]], - ['c_5fverifyrecoverinit_64',['C_VerifyRecoverInit',['../a01450.html#gaefe33200a70026c7e622b01473d78b66',1,'pkcs11_main.c']]], - ['c_5fverifyupdate_65',['C_VerifyUpdate',['../a01450.html#gaba9414cf3fc679beaae1baa5425a6e01',1,'pkcs11_main.c']]], - ['c_5fwaitforslotevent_66',['C_WaitForSlotEvent',['../a01450.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6',1,'pkcs11_main.c']]], - ['c_5fwrapkey_67',['C_WrapKey',['../a01450.html#gaf47613fd93688da939cf4c6998f83d77',1,'pkcs11_main.c']]], - ['cal_5fbuf_5finit_5fconst_5fptr_68',['cal_buf_init_const_ptr',['../a00320.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c'],['../a00323.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c']]], - ['cal_5fbuf_5fread_5fbytes_69',['cal_buf_read_bytes',['../a00320.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c'],['../a00323.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c']]], - ['cal_5fbuf_5fread_5fnumber_70',['cal_buf_read_number',['../a00320.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00323.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c']]], - ['cal_5fbuf_5fwrite_5fbytes_71',['cal_buf_write_bytes',['../a00320.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c'],['../a00323.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c']]], - ['cal_5fbuf_5fwrite_5fnumber_72',['cal_buf_write_number',['../a00320.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00323.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c']]], - ['calib_5fca2_5fget_5faddr_73',['calib_ca2_get_addr',['../a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01444.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], - ['calib_5fca2_5fis_5fconfig_5flocked_74',['calib_ca2_is_config_locked',['../a01444.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01444.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], - ['calib_5fca2_5fis_5fdata_5flocked_75',['calib_ca2_is_data_locked',['../a01444.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01444.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], - ['calib_5fca2_5fis_5flocked_76',['calib_ca2_is_locked',['../a01444.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c'],['../a01444.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c']]], - ['calib_5fexecute_5fcommand_77',['calib_execute_command',['../a00371.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c'],['../a00374.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c']]], - ['calib_5fexit_78',['calib_exit',['../a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c'],['../a01444.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c']]], - ['calib_5fget_5faddr_79',['calib_get_addr',['../a01444.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01444.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], - ['calib_5fget_5fdevicetype_80',['calib_get_devicetype',['../a01444.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c'],['../a01444.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c']]], - ['calib_5fget_5fexecution_5ftime_81',['calib_get_execution_time',['../a00371.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c'],['../a00374.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c']]], - ['calib_5fget_5fzone_5fsize_82',['calib_get_zone_size',['../a01444.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c'],['../a01444.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c']]], - ['calib_5fidle_83',['calib_idle',['../a01444.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c'],['../a01444.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c']]], - ['calib_5finfo_84',['calib_info',['../a01444.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c'],['../a01444.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c']]], - ['calib_5finfo_5fbase_85',['calib_info_base',['../a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c'],['../a01444.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c']]], - ['calib_5finfo_5fchip_5fstatus_86',['calib_info_chip_status',['../a01444.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c'],['../a01444.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c']]], - ['calib_5finfo_5flock_5fstatus_87',['calib_info_lock_status',['../a01444.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c'],['../a01444.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c']]], - ['calib_5finfo_5fprivkey_5fvalid_88',['calib_info_privkey_valid',['../a01444.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c'],['../a01444.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c']]], - ['calib_5fsleep_89',['calib_sleep',['../a01444.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c'],['../a01444.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c']]], - ['calib_5fwakeup_90',['calib_wakeup',['../a01444.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c'],['../a01444.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c']]], - ['calib_5fwakeup_5fi2c_91',['calib_wakeup_i2c',['../a01444.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c'],['../a01444.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c']]], - ['cfg_5fateccx08a_5fi2c_5fdefault_92',['cfg_ateccx08a_i2c_default',['../a01458.html#afe3491a94655b07c2608d3451e59d606',1,'cryptoauthlib::iface']]], - ['cfg_5fateccx08a_5fkithid_5fdefault_93',['cfg_ateccx08a_kithid_default',['../a01458.html#a88737f422c86c2246a698fd64d59db1a',1,'cryptoauthlib::iface']]], - ['cfg_5fateccx08a_5fswi_5fdefault_94',['cfg_ateccx08a_swi_default',['../a01458.html#a64fa8e408c7c7abc0999d5b74825e69d',1,'cryptoauthlib::iface']]], - ['cfg_5fatsha20xa_5fi2c_5fdefault_95',['cfg_atsha20xa_i2c_default',['../a01458.html#acc3d4402aa912d4f90e3298a7e8de20c',1,'cryptoauthlib::iface']]], - ['cfg_5fatsha20xa_5fkithid_5fdefault_96',['cfg_atsha20xa_kithid_default',['../a01458.html#a1b929d7e15620e9c352c3cf1e75e2a22',1,'cryptoauthlib::iface']]], - ['cfg_5fatsha20xa_5fswi_5fdefault_97',['cfg_atsha20xa_swi_default',['../a01458.html#a4638d28e57304b76ce9f50077e6b3b47',1,'cryptoauthlib::iface']]], - ['change_5fi2c_5fspeed_98',['change_i2c_speed',['../a01446.html#gadc420e4b166a1b339d1a2687e0f12cb1',1,'hal_i2c_harmony.c']]], - ['check_5frationality_99',['check_rationality',['../a02516.html#a2cd77c54cfde31fcc4fb97ad15223f30',1,'cryptoauthlib.library.AtcaStructure.check_rationality()'],['../a02512.html#a1f9f23cc775d8b3e461bbfc192134c27',1,'cryptoauthlib.library.AtcaUnion.check_rationality()']]], - ['check_5fstatus_100',['check_status',['../a01461.html#a79e412f95dfbdb782c011ac214270aa3',1,'cryptoauthlib::status']]], - ['ctypes_5fto_5fbytes_101',['ctypes_to_bytes',['../a01459.html#acafa34b913dba87fe1768f8e18cfd135',1,'cryptoauthlib::library']]] + ['c_5fcancelfunction_0',['C_CancelFunction',['../a01477.html#gac545b1d8eeb82e40f7519cdfc5a3427c',1,'pkcs11_main.c']]], + ['c_5fcloseallsessions_1',['C_CloseAllSessions',['../a01477.html#gad2ab78c409dfcbc155d673550cb71736',1,'pkcs11_main.c']]], + ['c_5fclosesession_2',['C_CloseSession',['../a01477.html#gae2ce0be368072fa83e0b1f5136b7b753',1,'pkcs11_main.c']]], + ['c_5fcopyobject_3',['C_CopyObject',['../a01477.html#ga301f7118a227ffedd7f945a9532fc18a',1,'pkcs11_main.c']]], + ['c_5fcreateobject_4',['C_CreateObject',['../a01477.html#ga01b36384bff05a4dc4476c0764cdc248',1,'pkcs11_main.c']]], + ['c_5fdecrypt_5',['C_Decrypt',['../a01477.html#gad7a0c95a7b810c5534185632b8b58d29',1,'pkcs11_main.c']]], + ['c_5fdecryptdigestupdate_6',['C_DecryptDigestUpdate',['../a01477.html#ga128ba07226b7e45772830f06dfde4b71',1,'pkcs11_main.c']]], + ['c_5fdecryptfinal_7',['C_DecryptFinal',['../a01477.html#gab549c4d540cff530f9e4d9bca36e2253',1,'pkcs11_main.c']]], + ['c_5fdecryptinit_8',['C_DecryptInit',['../a01477.html#gac0bf030d8e5ff01fda7754a5b8b7a8e5',1,'pkcs11_main.c']]], + ['c_5fdecryptupdate_9',['C_DecryptUpdate',['../a01477.html#gaa4fb93ab28bedada72364e925b3dacbf',1,'pkcs11_main.c']]], + ['c_5fdecryptverifyupdate_10',['C_DecryptVerifyUpdate',['../a01477.html#ga1aeef6ac02d5fb7d84c37cbec5ee180c',1,'pkcs11_main.c']]], + ['c_5fderivekey_11',['C_DeriveKey',['../a01477.html#ga67ecc1ce8ca0630aebdf3a29e129f531',1,'pkcs11_main.c']]], + ['c_5fdestroyobject_12',['C_DestroyObject',['../a01477.html#ga1b991b6fd8b20f130f9d87b98e590fdb',1,'pkcs11_main.c']]], + ['c_5fdigest_13',['C_Digest',['../a01477.html#gadfc9281add668a5aff9bbc1253655917',1,'pkcs11_main.c']]], + ['c_5fdigestencryptupdate_14',['C_DigestEncryptUpdate',['../a01477.html#ga3f8a5f0509ef9929f90536b6e255e485',1,'pkcs11_main.c']]], + ['c_5fdigestfinal_15',['C_DigestFinal',['../a01477.html#ga1f3dc3758726bb4737db956e4cd71e91',1,'pkcs11_main.c']]], + ['c_5fdigestinit_16',['C_DigestInit',['../a01477.html#ga3f6bcb9f9be8a7822d9d8f7c44c33403',1,'pkcs11_main.c']]], + ['c_5fdigestkey_17',['C_DigestKey',['../a01477.html#ga21a9c4115bc535490416e2850a2a45fd',1,'pkcs11_main.c']]], + ['c_5fdigestupdate_18',['C_DigestUpdate',['../a01477.html#ga7a8189a6963fbcfdfe2bebe20a8bf3b6',1,'pkcs11_main.c']]], + ['c_5fencrypt_19',['C_Encrypt',['../a01477.html#gaf9aab1c3fcf352af53b0e66652fac39d',1,'pkcs11_main.c']]], + ['c_5fencryptfinal_20',['C_EncryptFinal',['../a01477.html#gab4a336f9cb4920a9ff8585aec5d90a3f',1,'pkcs11_main.c']]], + ['c_5fencryptinit_21',['C_EncryptInit',['../a01477.html#ga23a9b2dc15a447decd10881dde448890',1,'pkcs11_main.c']]], + ['c_5fencryptupdate_22',['C_EncryptUpdate',['../a01477.html#ga5e13fc136e0b7f79d22a6b735424a815',1,'pkcs11_main.c']]], + ['c_5ffinalize_23',['C_Finalize',['../a01477.html#ga945318df98e940ab331931023133ed3d',1,'pkcs11_main.c']]], + ['c_5ffindobjects_24',['C_FindObjects',['../a01477.html#ga42635cbaa2ba78482ae053bea477246a',1,'pkcs11_main.c']]], + ['c_5ffindobjectsfinal_25',['C_FindObjectsFinal',['../a01477.html#ga46347f830269bfbcbece15951f0c0fa4',1,'pkcs11_main.c']]], + ['c_5ffindobjectsinit_26',['C_FindObjectsInit',['../a01477.html#gaf4d4d071deb07e7dcfa489a2a835756d',1,'pkcs11_main.c']]], + ['c_5fgeneratekey_27',['C_GenerateKey',['../a01477.html#ga84673050f913404ec3ae164d4f7a1d9c',1,'pkcs11_main.c']]], + ['c_5fgeneratekeypair_28',['C_GenerateKeyPair',['../a01477.html#ga802a061224966a5523beb1ea0a9d9c27',1,'pkcs11_main.c']]], + ['c_5fgeneraterandom_29',['C_GenerateRandom',['../a01477.html#ga54a883eb1608be800f7fbd204665d50d',1,'pkcs11_main.c']]], + ['c_5fgetattributevalue_30',['C_GetAttributeValue',['../a01477.html#gaaad61dc7b2313286bdd049676ef0fd70',1,'pkcs11_main.c']]], + ['c_5fgetfunctionlist_31',['C_GetFunctionList',['../a01477.html#gab4cf13775c4e92b36156ee92dd52bef5',1,'pkcs11_main.c']]], + ['c_5fgetfunctionstatus_32',['C_GetFunctionStatus',['../a01477.html#ga8c5d2e29d7fbf26f5a916cb3017aebe0',1,'pkcs11_main.c']]], + ['c_5fgetinfo_33',['C_GetInfo',['../a01477.html#ga75bdc5d475cd205914b8227c7f08df4c',1,'pkcs11_main.c']]], + ['c_5fgetmechanisminfo_34',['C_GetMechanismInfo',['../a01477.html#gabe5aeb6b794d4ca28cb2534fe0a4a159',1,'pkcs11_main.c']]], + ['c_5fgetmechanismlist_35',['C_GetMechanismList',['../a01477.html#gac80659e1b954f9514723fd6d4429dfb6',1,'pkcs11_main.c']]], + ['c_5fgetobjectsize_36',['C_GetObjectSize',['../a01477.html#gadd117013f515b1d441889a24a605bd93',1,'pkcs11_main.c']]], + ['c_5fgetoperationstate_37',['C_GetOperationState',['../a01477.html#ga95dcfc50be7ac2cb3ebf58d958f70dde',1,'pkcs11_main.c']]], + ['c_5fgetsessioninfo_38',['C_GetSessionInfo',['../a01477.html#gaffb75a4d4ba623ee01f31877b56b018e',1,'pkcs11_main.c']]], + ['c_5fgetslotinfo_39',['C_GetSlotInfo',['../a01477.html#gae795a3fd0467a249eeb075f94bfa0adc',1,'pkcs11_main.c']]], + ['c_5fgetslotlist_40',['C_GetSlotList',['../a01477.html#gac6ce96c3f4a3b7f24d9420763df121fc',1,'pkcs11_main.c']]], + ['c_5fgettokeninfo_41',['C_GetTokenInfo',['../a01477.html#gac933291718eb6aa218db1c677e07ab02',1,'pkcs11_main.c']]], + ['c_5finitialize_42',['C_Initialize',['../a01477.html#ga2e45ad4ce8c84712c646dddaa99544e3',1,'pkcs11_main.c']]], + ['c_5finitpin_43',['C_InitPIN',['../a01477.html#ga2b726534eedac635b28ccd501c242004',1,'pkcs11_main.c']]], + ['c_5finittoken_44',['C_InitToken',['../a01477.html#ga3bac1f2e5a7bc50d4d27fb2360eaadcb',1,'pkcs11_main.c']]], + ['c_5flogin_45',['C_Login',['../a01477.html#gaca7aa4ae8d9592f464dc1b545fead02e',1,'pkcs11_main.c']]], + ['c_5flogout_46',['C_Logout',['../a01477.html#gab7a0a4ff33f2450736d76d453045ad6f',1,'pkcs11_main.c']]], + ['c_5fopensession_47',['C_OpenSession',['../a01477.html#gad28ad989a94c345875dff446ad6c6481',1,'pkcs11_main.c']]], + ['c_5fseedrandom_48',['C_SeedRandom',['../a01477.html#gab26093f478636b5ba04176c2f81f44c4',1,'pkcs11_main.c']]], + ['c_5fsetattributevalue_49',['C_SetAttributeValue',['../a01477.html#ga752412c887c0d900c05b771709ebac83',1,'pkcs11_main.c']]], + ['c_5fsetoperationstate_50',['C_SetOperationState',['../a01477.html#ga66e6598e8f5db01e428a46d58b9865fc',1,'pkcs11_main.c']]], + ['c_5fsetpin_51',['C_SetPIN',['../a01477.html#ga386826845e06a84b36522a2bf49ff6c6',1,'pkcs11_main.c']]], + ['c_5fsign_52',['C_Sign',['../a01477.html#ga5f587605d68a7a56012ac337ddaec5e1',1,'pkcs11_main.c']]], + ['c_5fsignencryptupdate_53',['C_SignEncryptUpdate',['../a01477.html#gaf63ca32aef7a90f87e94a288de5e82cc',1,'pkcs11_main.c']]], + ['c_5fsignfinal_54',['C_SignFinal',['../a01477.html#ga2171c591535849faf017fa126e3a9a48',1,'pkcs11_main.c']]], + ['c_5fsigninit_55',['C_SignInit',['../a01477.html#ga37d93326915dc9b74f2476238f35037c',1,'pkcs11_main.c']]], + ['c_5fsignrecover_56',['C_SignRecover',['../a01477.html#ga210f4bdbaae1bc2b8e242e1610da4f0f',1,'pkcs11_main.c']]], + ['c_5fsignrecoverinit_57',['C_SignRecoverInit',['../a01477.html#ga97ee219718545f49ee651cbb00712b8c',1,'pkcs11_main.c']]], + ['c_5fsignupdate_58',['C_SignUpdate',['../a01477.html#gada0dd5a3d8ae781df05ea016d2f76d16',1,'pkcs11_main.c']]], + ['c_5funwrapkey_59',['C_UnwrapKey',['../a01477.html#gafd4a7d6e142179e46453af11d5da3e91',1,'pkcs11_main.c']]], + ['c_5fverify_60',['C_Verify',['../a01477.html#ga4e5f5ad0a6c7c6083ad3d780cc6d5529',1,'pkcs11_main.c']]], + ['c_5fverifyfinal_61',['C_VerifyFinal',['../a01477.html#gaf6ecd512fa21851f0bcbc25b90c2b444',1,'pkcs11_main.c']]], + ['c_5fverifyinit_62',['C_VerifyInit',['../a01477.html#gaeae51e6092fa8c8a58e022fcd8366c45',1,'pkcs11_main.c']]], + ['c_5fverifyrecover_63',['C_VerifyRecover',['../a01477.html#ga82355d41e5303e31cc49df003e9d8c38',1,'pkcs11_main.c']]], + ['c_5fverifyrecoverinit_64',['C_VerifyRecoverInit',['../a01477.html#gaefe33200a70026c7e622b01473d78b66',1,'pkcs11_main.c']]], + ['c_5fverifyupdate_65',['C_VerifyUpdate',['../a01477.html#gaba9414cf3fc679beaae1baa5425a6e01',1,'pkcs11_main.c']]], + ['c_5fwaitforslotevent_66',['C_WaitForSlotEvent',['../a01477.html#gaf76ed663f4f2dd4da2c69a498cd4a1e6',1,'pkcs11_main.c']]], + ['c_5fwrapkey_67',['C_WrapKey',['../a01477.html#gaf47613fd93688da939cf4c6998f83d77',1,'pkcs11_main.c']]], + ['cal_5fbuf_5finit_5fconst_5fptr_68',['cal_buf_init_const_ptr',['../a00326.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c'],['../a00329.html#a923fdd71f9a98e47040d26acb74a0202',1,'cal_buf_init_const_ptr(size_t len, const uint8_t *message): cal_buffer.c']]], + ['cal_5fbuf_5fread_5fbytes_69',['cal_buf_read_bytes',['../a00326.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c'],['../a00329.html#acc0d724d5fc815cc98dea12aa5bb15d0',1,'cal_buf_read_bytes(cal_buffer *cab, size_t offset, void *dest, size_t length): cal_buffer.c']]], + ['cal_5fbuf_5fread_5fnumber_70',['cal_buf_read_number',['../a00326.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00329.html#a546b07423022359a8b27fcbeadfdd93d',1,'cal_buf_read_number(cal_buffer *cab, size_t offset, void *dest, size_t num_size, bool buf_big_endian): cal_buffer.c']]], + ['cal_5fbuf_5fwrite_5fbytes_71',['cal_buf_write_bytes',['../a00326.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c'],['../a00329.html#a0890ecff5c568d7ee2d631bd3877fcc6',1,'cal_buf_write_bytes(cal_buffer *cab, size_t offset, const void *source, size_t length): cal_buffer.c']]], + ['cal_5fbuf_5fwrite_5fnumber_72',['cal_buf_write_number',['../a00326.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c'],['../a00329.html#af8a1f17b5af51c3539246d03282206a2',1,'cal_buf_write_number(cal_buffer *cab, size_t offset, const void *source, size_t num_size, bool buf_big_endian): cal_buffer.c']]], + ['calib_5fca2_5fget_5faddr_73',['calib_ca2_get_addr',['../a01471.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01471.html#ga7c140a1696f5585d61426cdd4ed9c8dd',1,'calib_ca2_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], + ['calib_5fca2_5fis_5fconfig_5flocked_74',['calib_ca2_is_config_locked',['../a01471.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01471.html#gad7d44a63b0871068bc30abb0faed78f9',1,'calib_ca2_is_config_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], + ['calib_5fca2_5fis_5fdata_5flocked_75',['calib_ca2_is_data_locked',['../a01471.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c'],['../a01471.html#ga801b481ac3ff13401fc2a45817d05db4',1,'calib_ca2_is_data_locked(ATCADevice device, bool *is_locked): calib_helpers.c']]], + ['calib_5fca2_5fis_5flocked_76',['calib_ca2_is_locked',['../a01471.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c'],['../a01471.html#ga55738f97714ea089a988e1853d8d6224',1,'calib_ca2_is_locked(ATCADevice device, uint8_t zone, bool *is_locked): calib_helpers.c']]], + ['calib_5fexecute_5fcommand_77',['calib_execute_command',['../a00377.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c'],['../a00380.html#a19fc558e09f03a2f8f5ee89b1e396b2e',1,'calib_execute_command(ATCAPacket *packet, ATCADevice device): calib_execution.c']]], + ['calib_5fexit_78',['calib_exit',['../a01471.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c'],['../a01471.html#gab6791f8eef4fb94c44d84f69fa8d7927',1,'calib_exit(ATCADevice device): calib_basic.c']]], + ['calib_5fget_5faddr_79',['calib_get_addr',['../a01471.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c'],['../a01471.html#gae51a67781e9e4618e669db1c999e6ec2',1,'calib_get_addr(uint8_t zone, uint16_t slot, uint8_t block, uint8_t offset, uint16_t *addr): calib_basic.c']]], + ['calib_5fget_5fdevicetype_80',['calib_get_devicetype',['../a01471.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c'],['../a01471.html#ga00e2fc1d5b517b275066c31be0be2304',1,'calib_get_devicetype(uint8_t revision[4]): calib_helpers.c']]], + ['calib_5fget_5fexecution_5ftime_81',['calib_get_execution_time',['../a00377.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c'],['../a00380.html#aa08ad4e89a8218e9598abbd36c11d07a',1,'calib_get_execution_time(uint8_t opcode, ATCADevice device): calib_execution.c']]], + ['calib_5fget_5fzone_5fsize_82',['calib_get_zone_size',['../a01471.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c'],['../a01471.html#ga023735b1c0b10e70832d9a957bc99ae3',1,'calib_get_zone_size(ATCADevice device, uint8_t zone, uint16_t slot, size_t *size): calib_basic.c']]], + ['calib_5fidle_83',['calib_idle',['../a01471.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c'],['../a01471.html#ga59750d83d93368b2944f57bb38bf4d1f',1,'calib_idle(ATCADevice device): calib_basic.c']]], + ['calib_5finfo_84',['calib_info',['../a01471.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c'],['../a01471.html#ga132cfbb5c581c5cc5adf5350d4161966',1,'calib_info(ATCADevice device, uint8_t *revision): calib_info.c']]], + ['calib_5finfo_5fbase_85',['calib_info_base',['../a01471.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c'],['../a01471.html#gabc7aff4f1707fbe0a05cf416955f43b0',1,'calib_info_base(ATCADevice device, uint8_t mode, uint16_t param2, uint8_t *out_data): calib_info.c']]], + ['calib_5finfo_5fchip_5fstatus_86',['calib_info_chip_status',['../a01471.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c'],['../a01471.html#gac33e6d38d506b4e71618063d1b4a7499',1,'calib_info_chip_status(ATCADevice device, uint8_t *chip_status): calib_info.c']]], + ['calib_5finfo_5flock_5fstatus_87',['calib_info_lock_status',['../a01471.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c'],['../a01471.html#gacd82ed053319a63bbe06755632e377bc',1,'calib_info_lock_status(ATCADevice device, uint16_t param2, uint8_t *is_locked): calib_info.c']]], + ['calib_5finfo_5fprivkey_5fvalid_88',['calib_info_privkey_valid',['../a01471.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c'],['../a01471.html#ga39e3e31e7573d3d73f4b757db7704cce',1,'calib_info_privkey_valid(ATCADevice device, uint16_t key_id, uint8_t *is_valid): calib_info.c']]], + ['calib_5fsleep_89',['calib_sleep',['../a01471.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c'],['../a01471.html#gad26b70951a0da6d80fb98027faae7a1f',1,'calib_sleep(ATCADevice device): calib_basic.c']]], + ['calib_5fwakeup_90',['calib_wakeup',['../a01471.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c'],['../a01471.html#gafbc037d57a4cc4fec6a2f291736170cb',1,'calib_wakeup(ATCADevice device): calib_basic.c']]], + ['calib_5fwakeup_5fi2c_91',['calib_wakeup_i2c',['../a01471.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c'],['../a01471.html#ga884790e08be94431e1fbe92bf6106e06',1,'calib_wakeup_i2c(ATCADevice device): calib_basic.c']]], + ['cfg_5fateccx08a_5fi2c_5fdefault_92',['cfg_ateccx08a_i2c_default',['../a01485.html#afe3491a94655b07c2608d3451e59d606',1,'cryptoauthlib::iface']]], + ['cfg_5fateccx08a_5fkithid_5fdefault_93',['cfg_ateccx08a_kithid_default',['../a01485.html#a88737f422c86c2246a698fd64d59db1a',1,'cryptoauthlib::iface']]], + ['cfg_5fateccx08a_5fswi_5fdefault_94',['cfg_ateccx08a_swi_default',['../a01485.html#a64fa8e408c7c7abc0999d5b74825e69d',1,'cryptoauthlib::iface']]], + ['cfg_5fatsha20xa_5fi2c_5fdefault_95',['cfg_atsha20xa_i2c_default',['../a01485.html#acc3d4402aa912d4f90e3298a7e8de20c',1,'cryptoauthlib::iface']]], + ['cfg_5fatsha20xa_5fkithid_5fdefault_96',['cfg_atsha20xa_kithid_default',['../a01485.html#a1b929d7e15620e9c352c3cf1e75e2a22',1,'cryptoauthlib::iface']]], + ['cfg_5fatsha20xa_5fswi_5fdefault_97',['cfg_atsha20xa_swi_default',['../a01485.html#a4638d28e57304b76ce9f50077e6b3b47',1,'cryptoauthlib::iface']]], + ['change_5fi2c_5fspeed_98',['change_i2c_speed',['../a01473.html#gadc420e4b166a1b339d1a2687e0f12cb1',1,'hal_i2c_harmony.c']]], + ['check_5frationality_99',['check_rationality',['../a02551.html#a2cd77c54cfde31fcc4fb97ad15223f30',1,'cryptoauthlib.library.AtcaStructure.check_rationality()'],['../a02547.html#a1f9f23cc775d8b3e461bbfc192134c27',1,'cryptoauthlib.library.AtcaUnion.check_rationality()']]], + ['check_5fstatus_100',['check_status',['../a01488.html#a79e412f95dfbdb782c011ac214270aa3',1,'cryptoauthlib::status']]], + ['ctypes_5fto_5fbytes_101',['ctypes_to_bytes',['../a01486.html#acafa34b913dba87fe1768f8e18cfd135',1,'cryptoauthlib::library']]] ]; diff --git a/search/functions_4.js b/search/functions_4.js index 0b5a77170..640a0e874 100644 --- a/search/functions_4.js +++ b/search/functions_4.js @@ -1,5 +1,5 @@ var searchData= [ - ['deleteatcadevice_0',['deleteATCADevice',['../a01441.html#gac087cf04cd5bd6ff2e026d89bfbf5e12',1,'atca_device.c']]], - ['deleteatcaiface_1',['deleteATCAIface',['../a01442.html#gaf8074d759241d3edd6d8ead1d7322a98',1,'atca_iface.c']]] + ['deleteatcadevice_0',['deleteATCADevice',['../a01468.html#gac087cf04cd5bd6ff2e026d89bfbf5e12',1,'atca_device.c']]], + ['deleteatcaiface_1',['deleteATCAIface',['../a01469.html#gaf8074d759241d3edd6d8ead1d7322a98',1,'atca_iface.c']]] ]; diff --git a/search/functions_5.js b/search/functions_5.js index 28d2649eb..e14b4cb97 100644 --- a/search/functions_5.js +++ b/search/functions_5.js @@ -1,4 +1,4 @@ var searchData= [ - ['from_5fdefinition_0',['from_definition',['../a02512.html#a3d679310ce9bf2878b4d01871e97c54e',1,'cryptoauthlib.library.AtcaUnion.from_definition()'],['../a02516.html#a7748c2f53682292dd1ea2cb03b8386f5',1,'cryptoauthlib.library.AtcaStructure.from_definition()']]] + ['from_5fdefinition_0',['from_definition',['../a02547.html#a3d679310ce9bf2878b4d01871e97c54e',1,'cryptoauthlib.library.AtcaUnion.from_definition()'],['../a02551.html#a7748c2f53682292dd1ea2cb03b8386f5',1,'cryptoauthlib.library.AtcaStructure.from_definition()']]] ]; diff --git a/search/functions_6.js b/search/functions_6.js index e2ae353e0..4d56e8331 100644 --- a/search/functions_6.js +++ b/search/functions_6.js @@ -1,11 +1,11 @@ var searchData= [ - ['get_5fcryptoauthlib_0',['get_cryptoauthlib',['../a01459.html#a851038e6c6158127d7ecbd1e6580081b',1,'cryptoauthlib::library']]], - ['get_5fctype_5farray_5finstance_1',['get_ctype_array_instance',['../a01459.html#a2748ff60b5f1512fbf9f228e4c86598a',1,'cryptoauthlib::library']]], - ['get_5fctype_5fby_5fname_2',['get_ctype_by_name',['../a01459.html#a5cc6d0583a5f0554e61e3886c5bf1785',1,'cryptoauthlib::library']]], - ['get_5fctype_5fstructure_5finstance_3',['get_ctype_structure_instance',['../a01459.html#a30811985170f0083009bbd5439d1bcc2',1,'cryptoauthlib::library']]], - ['get_5fdevice_5fname_4',['get_device_name',['../a01459.html#a2da0648c5d2cb3a8da467b8dfac16e8c',1,'cryptoauthlib::library']]], - ['get_5fdevice_5fname_5fwith_5fdevice_5fid_5',['get_device_name_with_device_id',['../a01459.html#ac4f25f606f7c968b08b874dc8d75ca50',1,'cryptoauthlib::library']]], - ['get_5fdevice_5ftype_5fid_6',['get_device_type_id',['../a01459.html#adaf39153cd62515d9750fdb0748dbacc',1,'cryptoauthlib::library']]], - ['get_5fsize_5fby_5fname_7',['get_size_by_name',['../a01459.html#a7c6a46d9327a395ac4909411d937b193',1,'cryptoauthlib::library']]] + ['get_5fcryptoauthlib_0',['get_cryptoauthlib',['../a01486.html#a851038e6c6158127d7ecbd1e6580081b',1,'cryptoauthlib::library']]], + ['get_5fctype_5farray_5finstance_1',['get_ctype_array_instance',['../a01486.html#a2748ff60b5f1512fbf9f228e4c86598a',1,'cryptoauthlib::library']]], + ['get_5fctype_5fby_5fname_2',['get_ctype_by_name',['../a01486.html#a5cc6d0583a5f0554e61e3886c5bf1785',1,'cryptoauthlib::library']]], + ['get_5fctype_5fstructure_5finstance_3',['get_ctype_structure_instance',['../a01486.html#a30811985170f0083009bbd5439d1bcc2',1,'cryptoauthlib::library']]], + ['get_5fdevice_5fname_4',['get_device_name',['../a01486.html#a2da0648c5d2cb3a8da467b8dfac16e8c',1,'cryptoauthlib::library']]], + ['get_5fdevice_5fname_5fwith_5fdevice_5fid_5',['get_device_name_with_device_id',['../a01486.html#ac4f25f606f7c968b08b874dc8d75ca50',1,'cryptoauthlib::library']]], + ['get_5fdevice_5ftype_5fid_6',['get_device_type_id',['../a01486.html#adaf39153cd62515d9750fdb0748dbacc',1,'cryptoauthlib::library']]], + ['get_5fsize_5fby_5fname_7',['get_size_by_name',['../a01486.html#a7c6a46d9327a395ac4909411d937b193',1,'cryptoauthlib::library']]] ]; diff --git a/search/functions_7.js b/search/functions_7.js index 8de206b7d..e0c651f70 100644 --- a/search/functions_7.js +++ b/search/functions_7.js @@ -1,73 +1,73 @@ var searchData= [ - ['hal_5fcheck_5fpid_0',['hal_check_pid',['../a01446.html#gae31246ac870409a3d694c240c6c3498a',1,'hal_linux.c']]], - ['hal_5fcheck_5fwake_1',['hal_check_wake',['../a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c'],['../a01446.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c']]], - ['hal_5fcreate_5fmutex_2',['hal_create_mutex',['../a01446.html#gaad9da28968a527ce51a2b081461d4cfe',1,'hal_freertos.c']]], - ['hal_5fdelay_5fms_3',['hal_delay_ms',['../a01446.html#gadc23b8130e72a445f76c68d62e8c95c5',1,'hal_linux.c']]], - ['hal_5fdelay_5fus_4',['hal_delay_us',['../a01446.html#ga7e9019810ba5ab81b256282392cd5079',1,'hal_linux.c']]], - ['hal_5fgpio_5finit_5',['hal_gpio_init',['../a00536.html#a5159dcc0de9cf18a0a46d390fcde3d59',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5fpost_5finit_6',['hal_gpio_post_init',['../a00536.html#a680903ede9921710475c23f3e0f5c56c',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5freceive_7',['hal_gpio_receive',['../a00536.html#ac4ec5194f4ed97053e725b4f5d3b6db4',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5frelease_8',['hal_gpio_release',['../a00536.html#a34a8c0ab6cfceb80c15080b571c0b3f7',1,'hal_gpio_harmony.c']]], - ['hal_5fgpio_5fsend_9',['hal_gpio_send',['../a00536.html#a0509181ebe5c1f3311cacc800796469b',1,'hal_gpio_harmony.c']]], - ['hal_5fi2c_5fcontrol_10',['hal_i2c_control',['../a01446.html#ga4f82572f05b8587d98bc38601453863e',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fdiscover_5fbuses_11',['hal_i2c_discover_buses',['../a01446.html#ga05700385437884cc7b28c38d33e84f8c',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fdiscover_5fdevices_12',['hal_i2c_discover_devices',['../a01446.html#gac7644e62498a596c09952ee3b28017b9',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fidle_13',['hal_i2c_idle',['../a01446.html#ga9317303ada721ff3f97e7aad69437a30',1,'hal_i2c_start.c']]], - ['hal_5fi2c_5finit_14',['hal_i2c_init',['../a01446.html#ga17df8d983df73e2e8f62f1236f157909',1,'hal_i2c_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_i2c_harmony.c'],['../a01446.html#ga09e7f465a040fbd19ea136269571de3c',1,'hal_i2c_init(void *hal, ATCAIfaceCfg *cfg): hal_i2c_start.c']]], - ['hal_5fi2c_5fpost_5finit_15',['hal_i2c_post_init',['../a01446.html#gafbe53519362f18c2688d10da6f7c618f',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5freceive_16',['hal_i2c_receive',['../a01446.html#gac1baf65047dc3efe1f14f1b79b62c04f',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5frelease_17',['hal_i2c_release',['../a01446.html#gac382cc4431d2d1c721c21a453ba36c22',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fsend_18',['hal_i2c_send',['../a01446.html#gacc9a889e19d2f1a475a39391565b66dd',1,'hal_i2c_harmony.c']]], - ['hal_5fi2c_5fsleep_19',['hal_i2c_sleep',['../a01446.html#ga3f89bae6a625d5f37abdcc99408def27',1,'hal_i2c_start.c']]], - ['hal_5fi2c_5fwake_20',['hal_i2c_wake',['../a01446.html#gad4df1b6755e2d5b5d9e810371e45ca8c',1,'hal_i2c_start.c']]], - ['hal_5fiface_5finit_21',['hal_iface_init',['../a01446.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c'],['../a01446.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c']]], - ['hal_5fiface_5fregister_5fhal_22',['hal_iface_register_hal',['../a01446.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c'],['../a01446.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c']]], - ['hal_5fiface_5frelease_23',['hal_iface_release',['../a01446.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c'],['../a01446.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c']]], - ['hal_5fis_5fcommand_5fword_24',['hal_is_command_word',['../a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c'],['../a01446.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c']]], - ['hal_5fkit_5fattach_5fphy_25',['hal_kit_attach_phy',['../a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c'],['../a01446.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c']]], - ['hal_5fkit_5fcontrol_26',['hal_kit_control',['../a01446.html#ga56a9e080fb9055109778010912be08ba',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5fhid_5fcontrol_27',['hal_kit_hid_control',['../a01446.html#gadcf53722678e48323751359a04734680',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5finit_28',['hal_kit_hid_init',['../a01446.html#ga025e8f78bfdef446732e3aafacebc857',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5fpost_5finit_29',['hal_kit_hid_post_init',['../a01446.html#ga6f06bc1662b3d0361f6a241e1b5612f2',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5freceive_30',['hal_kit_hid_receive',['../a01446.html#ga1c62358b9abc11bc2e52b34c3dd712e0',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5frelease_31',['hal_kit_hid_release',['../a01446.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5fhid_5fsend_32',['hal_kit_hid_send',['../a01446.html#ga3fd44b390fe7558c882c97faa783c018',1,'hal_all_platforms_kit_hidapi.c']]], - ['hal_5fkit_5finit_33',['hal_kit_init',['../a01446.html#ga4d01381c1a907ba56368a9313d0b65cb',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5fpost_5finit_34',['hal_kit_post_init',['../a01446.html#ga7baebf1b0431d0670517d3788d63b111',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5freceive_35',['hal_kit_receive',['../a01446.html#ga239b2412c8c0d45c2097a4fa06c9aa53',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5frelease_36',['hal_kit_release',['../a01446.html#gafb063a58f6e3b087cf08fce5c66ee422',1,'hal_kit_bridge.c']]], - ['hal_5fkit_5fsend_37',['hal_kit_send',['../a01446.html#ga18817a4a7ab5958453eca414e28834ba',1,'hal_kit_bridge.c']]], - ['hal_5frtos_5fdelay_5fms_38',['hal_rtos_delay_ms',['../a01446.html#gacb8b202e3e6d66c96262b1ad4126ff6a',1,'hal_freertos.c']]], - ['hal_5fspi_5fcontrol_39',['hal_spi_control',['../a01446.html#gac7f3951634faf0a7c16c234d471c3660',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fdeselect_40',['hal_spi_deselect',['../a01446.html#ga6bcb25e01ba6242973eedb32fa9dac2a',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fdiscover_5fbuses_41',['hal_spi_discover_buses',['../a01446.html#ga92cecc8e30a88dee1cbedd49141bc209',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fdiscover_5fdevices_42',['hal_spi_discover_devices',['../a01446.html#ga6cf45c115bcb721e951e8792e0feb3f0',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5finit_43',['hal_spi_init',['../a01446.html#ga24b3ca4076a0e4093644d4f58cd80a69',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fpost_5finit_44',['hal_spi_post_init',['../a01446.html#gaeb831d9894ce11146bd00c79a98b7f0f',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5freceive_45',['hal_spi_receive',['../a01446.html#ga410c24762579358a576a58610a877e63',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5frelease_46',['hal_spi_release',['../a01446.html#ga8c3f1c6c20d939c4ca976fdda6279359',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fselect_47',['hal_spi_select',['../a01446.html#ga237aa1d0ee551a61991b52dc7812ff64',1,'hal_spi_harmony.c']]], - ['hal_5fspi_5fsend_48',['hal_spi_send',['../a01446.html#ga16661176757d0ef155155b07267a44ed',1,'hal_spi_harmony.c']]], - ['hal_5fswi_5fcontrol_49',['hal_swi_control',['../a01446.html#gad6ba20fd0d0d393f0cbf03ea9cb63346',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fgpio_5fcontrol_50',['hal_swi_gpio_control',['../a00584.html#aaf7a492cce7f9a5fe5b817aae347ba3d',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5finit_51',['hal_swi_gpio_init',['../a00584.html#a56876f187f5f50c3cc8728ee21f0962c',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5fpost_5finit_52',['hal_swi_gpio_post_init',['../a00584.html#a1527badd7e7e5f4d1e60eada509b1319',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5freceive_53',['hal_swi_gpio_receive',['../a00584.html#a3415a23c978f3421bc01d069d1ab9180',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5frelease_54',['hal_swi_gpio_release',['../a00584.html#aae0cb0a585b3eb7535c70047bef1f7c6',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fgpio_5fsend_55',['hal_swi_gpio_send',['../a00584.html#aea9aba476b50f5d4ef082c24f0cb6b68',1,'hal_swi_gpio.c']]], - ['hal_5fswi_5fidle_56',['hal_swi_idle',['../a01446.html#ga618291172976da96c4f02dc9200c845c',1,'hal_swi_uart.c']]], - ['hal_5fswi_5finit_57',['hal_swi_init',['../a01446.html#gae3e41d9b466fb912625402db629b1a62',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fpost_5finit_58',['hal_swi_post_init',['../a01446.html#ga9186e5235979216330ae580290872c77',1,'hal_swi_uart.c']]], - ['hal_5fswi_5freceive_59',['hal_swi_receive',['../a01446.html#ga159bdf9c24e429d54800da1eb1c21058',1,'hal_swi_uart.c']]], - ['hal_5fswi_5frelease_60',['hal_swi_release',['../a01446.html#ga196dbc62546b39ac3e556a0f7f6b7132',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fsend_61',['hal_swi_send',['../a01446.html#ga9df4dbd666a87efe49578842e53ad91e',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fsleep_62',['hal_swi_sleep',['../a01446.html#ga252e365a30f2583dae8a8eac073a9f53',1,'hal_swi_uart.c']]], - ['hal_5fswi_5fwake_63',['hal_swi_wake',['../a01446.html#gafc428980ec95e37eee94813db229fe70',1,'hal_swi_uart.c']]], - ['hal_5fuart_5fcontrol_64',['hal_uart_control',['../a00563.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_linux_uart_userspace.c'],['../a00611.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_windows_kit_uart.c']]], - ['hal_5fuart_5finit_65',['hal_uart_init',['../a00563.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_linux_uart_userspace.c'],['../a00596.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_uart_harmony.c'],['../a00611.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_windows_kit_uart.c']]], - ['hal_5fuart_5fpost_5finit_66',['hal_uart_post_init',['../a00596.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_uart_harmony.c'],['../a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_windows_kit_uart.c'],['../a00563.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_linux_uart_userspace.c']]], - ['hal_5fuart_5freceive_67',['hal_uart_receive',['../a00563.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_linux_uart_userspace.c'],['../a00596.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_uart_harmony.c'],['../a00611.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_windows_kit_uart.c']]], - ['hal_5fuart_5frelease_68',['hal_uart_release',['../a00563.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_linux_uart_userspace.c'],['../a00596.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_uart_harmony.c'],['../a00611.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_windows_kit_uart.c']]], - ['hal_5fuart_5fsend_69',['hal_uart_send',['../a00563.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_linux_uart_userspace.c'],['../a00596.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_uart_harmony.c'],['../a00611.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_windows_kit_uart.c']]] + ['hal_5fcheck_5fpid_0',['hal_check_pid',['../a01473.html#gae31246ac870409a3d694c240c6c3498a',1,'hal_linux.c']]], + ['hal_5fcheck_5fwake_1',['hal_check_wake',['../a01473.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c'],['../a01473.html#ga6ce92f1d10000eb6618fc74c2ca92d76',1,'hal_check_wake(const uint8_t *response, int response_size): atca_hal.c']]], + ['hal_5fcreate_5fmutex_2',['hal_create_mutex',['../a01473.html#gaad9da28968a527ce51a2b081461d4cfe',1,'hal_freertos.c']]], + ['hal_5fdelay_5fms_3',['hal_delay_ms',['../a01473.html#gadc23b8130e72a445f76c68d62e8c95c5',1,'hal_linux.c']]], + ['hal_5fdelay_5fus_4',['hal_delay_us',['../a01473.html#ga7e9019810ba5ab81b256282392cd5079',1,'hal_linux.c']]], + ['hal_5fgpio_5finit_5',['hal_gpio_init',['../a00551.html#a5159dcc0de9cf18a0a46d390fcde3d59',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5fpost_5finit_6',['hal_gpio_post_init',['../a00551.html#a680903ede9921710475c23f3e0f5c56c',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5freceive_7',['hal_gpio_receive',['../a00551.html#ac4ec5194f4ed97053e725b4f5d3b6db4',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5frelease_8',['hal_gpio_release',['../a00551.html#a34a8c0ab6cfceb80c15080b571c0b3f7',1,'hal_gpio_harmony.c']]], + ['hal_5fgpio_5fsend_9',['hal_gpio_send',['../a00551.html#a0509181ebe5c1f3311cacc800796469b',1,'hal_gpio_harmony.c']]], + ['hal_5fi2c_5fcontrol_10',['hal_i2c_control',['../a01473.html#ga4f82572f05b8587d98bc38601453863e',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fdiscover_5fbuses_11',['hal_i2c_discover_buses',['../a01473.html#ga05700385437884cc7b28c38d33e84f8c',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fdiscover_5fdevices_12',['hal_i2c_discover_devices',['../a01473.html#gac7644e62498a596c09952ee3b28017b9',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fidle_13',['hal_i2c_idle',['../a01473.html#ga9317303ada721ff3f97e7aad69437a30',1,'hal_i2c_start.c']]], + ['hal_5fi2c_5finit_14',['hal_i2c_init',['../a01473.html#ga17df8d983df73e2e8f62f1236f157909',1,'hal_i2c_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_i2c_harmony.c'],['../a01473.html#ga09e7f465a040fbd19ea136269571de3c',1,'hal_i2c_init(void *hal, ATCAIfaceCfg *cfg): hal_i2c_start.c']]], + ['hal_5fi2c_5fpost_5finit_15',['hal_i2c_post_init',['../a01473.html#gafbe53519362f18c2688d10da6f7c618f',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5freceive_16',['hal_i2c_receive',['../a01473.html#gac1baf65047dc3efe1f14f1b79b62c04f',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5frelease_17',['hal_i2c_release',['../a01473.html#gac382cc4431d2d1c721c21a453ba36c22',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fsend_18',['hal_i2c_send',['../a01473.html#gacc9a889e19d2f1a475a39391565b66dd',1,'hal_i2c_harmony.c']]], + ['hal_5fi2c_5fsleep_19',['hal_i2c_sleep',['../a01473.html#ga3f89bae6a625d5f37abdcc99408def27',1,'hal_i2c_start.c']]], + ['hal_5fi2c_5fwake_20',['hal_i2c_wake',['../a01473.html#gad4df1b6755e2d5b5d9e810371e45ca8c',1,'hal_i2c_start.c']]], + ['hal_5fiface_5finit_21',['hal_iface_init',['../a01473.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c'],['../a01473.html#ga24d379ed97e2c8ce205abf096707bf99',1,'hal_iface_init(ATCAIfaceCfg *cfg, ATCAHAL_t **hal, ATCAHAL_t **phy): atca_hal.c']]], + ['hal_5fiface_5fregister_5fhal_22',['hal_iface_register_hal',['../a01473.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c'],['../a01473.html#ga43e975cd670652e6ae76f390b2e82218',1,'hal_iface_register_hal(ATCAIfaceType iface_type, ATCAHAL_t *hal, ATCAHAL_t **old_hal, ATCAHAL_t *phy, ATCAHAL_t **old_phy): atca_hal.c']]], + ['hal_5fiface_5frelease_23',['hal_iface_release',['../a01473.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c'],['../a01473.html#gacadf30e249834f38397a8569c7b798c2',1,'hal_iface_release(ATCAIfaceType iface_type, void *hal_data): atca_hal.c']]], + ['hal_5fis_5fcommand_5fword_24',['hal_is_command_word',['../a01473.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c'],['../a01473.html#gac5acbcb3cee22506992d838cd8a3e8ae',1,'hal_is_command_word(uint8_t word_address): atca_hal.c']]], + ['hal_5fkit_5fattach_5fphy_25',['hal_kit_attach_phy',['../a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c'],['../a01473.html#ga3f5bce4e9ee06a3b564052b2bd202c29',1,'hal_kit_attach_phy(ATCAIfaceCfg *cfg, atca_hal_kit_phy_t *phy): hal_kit_bridge.c']]], + ['hal_5fkit_5fcontrol_26',['hal_kit_control',['../a01473.html#ga56a9e080fb9055109778010912be08ba',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5fhid_5fcontrol_27',['hal_kit_hid_control',['../a01473.html#gadcf53722678e48323751359a04734680',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5finit_28',['hal_kit_hid_init',['../a01473.html#ga025e8f78bfdef446732e3aafacebc857',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5fpost_5finit_29',['hal_kit_hid_post_init',['../a01473.html#ga6f06bc1662b3d0361f6a241e1b5612f2',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5freceive_30',['hal_kit_hid_receive',['../a01473.html#ga1c62358b9abc11bc2e52b34c3dd712e0',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5frelease_31',['hal_kit_hid_release',['../a01473.html#ga8c7b9adb28b4bbdee8d5cd78ab16255f',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5fhid_5fsend_32',['hal_kit_hid_send',['../a01473.html#ga3fd44b390fe7558c882c97faa783c018',1,'hal_all_platforms_kit_hidapi.c']]], + ['hal_5fkit_5finit_33',['hal_kit_init',['../a01473.html#ga4d01381c1a907ba56368a9313d0b65cb',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5fpost_5finit_34',['hal_kit_post_init',['../a01473.html#ga7baebf1b0431d0670517d3788d63b111',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5freceive_35',['hal_kit_receive',['../a01473.html#ga239b2412c8c0d45c2097a4fa06c9aa53',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5frelease_36',['hal_kit_release',['../a01473.html#gafb063a58f6e3b087cf08fce5c66ee422',1,'hal_kit_bridge.c']]], + ['hal_5fkit_5fsend_37',['hal_kit_send',['../a01473.html#ga18817a4a7ab5958453eca414e28834ba',1,'hal_kit_bridge.c']]], + ['hal_5frtos_5fdelay_5fms_38',['hal_rtos_delay_ms',['../a01473.html#gacb8b202e3e6d66c96262b1ad4126ff6a',1,'hal_freertos.c']]], + ['hal_5fspi_5fcontrol_39',['hal_spi_control',['../a01473.html#gac7f3951634faf0a7c16c234d471c3660',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fdeselect_40',['hal_spi_deselect',['../a01473.html#ga6bcb25e01ba6242973eedb32fa9dac2a',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fdiscover_5fbuses_41',['hal_spi_discover_buses',['../a01473.html#ga92cecc8e30a88dee1cbedd49141bc209',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fdiscover_5fdevices_42',['hal_spi_discover_devices',['../a01473.html#ga6cf45c115bcb721e951e8792e0feb3f0',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5finit_43',['hal_spi_init',['../a01473.html#ga24b3ca4076a0e4093644d4f58cd80a69',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fpost_5finit_44',['hal_spi_post_init',['../a01473.html#gaeb831d9894ce11146bd00c79a98b7f0f',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5freceive_45',['hal_spi_receive',['../a01473.html#ga410c24762579358a576a58610a877e63',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5frelease_46',['hal_spi_release',['../a01473.html#ga8c3f1c6c20d939c4ca976fdda6279359',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fselect_47',['hal_spi_select',['../a01473.html#ga237aa1d0ee551a61991b52dc7812ff64',1,'hal_spi_harmony.c']]], + ['hal_5fspi_5fsend_48',['hal_spi_send',['../a01473.html#ga16661176757d0ef155155b07267a44ed',1,'hal_spi_harmony.c']]], + ['hal_5fswi_5fcontrol_49',['hal_swi_control',['../a01473.html#gad6ba20fd0d0d393f0cbf03ea9cb63346',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fgpio_5fcontrol_50',['hal_swi_gpio_control',['../a00599.html#aaf7a492cce7f9a5fe5b817aae347ba3d',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5finit_51',['hal_swi_gpio_init',['../a00599.html#a56876f187f5f50c3cc8728ee21f0962c',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5fpost_5finit_52',['hal_swi_gpio_post_init',['../a00599.html#a1527badd7e7e5f4d1e60eada509b1319',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5freceive_53',['hal_swi_gpio_receive',['../a00599.html#a3415a23c978f3421bc01d069d1ab9180',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5frelease_54',['hal_swi_gpio_release',['../a00599.html#aae0cb0a585b3eb7535c70047bef1f7c6',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fgpio_5fsend_55',['hal_swi_gpio_send',['../a00599.html#aea9aba476b50f5d4ef082c24f0cb6b68',1,'hal_swi_gpio.c']]], + ['hal_5fswi_5fidle_56',['hal_swi_idle',['../a01473.html#ga618291172976da96c4f02dc9200c845c',1,'hal_swi_uart.c']]], + ['hal_5fswi_5finit_57',['hal_swi_init',['../a01473.html#gae3e41d9b466fb912625402db629b1a62',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fpost_5finit_58',['hal_swi_post_init',['../a01473.html#ga9186e5235979216330ae580290872c77',1,'hal_swi_uart.c']]], + ['hal_5fswi_5freceive_59',['hal_swi_receive',['../a01473.html#ga159bdf9c24e429d54800da1eb1c21058',1,'hal_swi_uart.c']]], + ['hal_5fswi_5frelease_60',['hal_swi_release',['../a01473.html#ga196dbc62546b39ac3e556a0f7f6b7132',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fsend_61',['hal_swi_send',['../a01473.html#ga9df4dbd666a87efe49578842e53ad91e',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fsleep_62',['hal_swi_sleep',['../a01473.html#ga252e365a30f2583dae8a8eac073a9f53',1,'hal_swi_uart.c']]], + ['hal_5fswi_5fwake_63',['hal_swi_wake',['../a01473.html#gafc428980ec95e37eee94813db229fe70',1,'hal_swi_uart.c']]], + ['hal_5fuart_5fcontrol_64',['hal_uart_control',['../a00578.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_linux_uart_userspace.c'],['../a00626.html#a41ed83bbc8e0fd3abea7beb513fbdb96',1,'hal_uart_control(ATCAIface iface, uint8_t option, void *param, size_t paramlen): hal_windows_kit_uart.c']]], + ['hal_5fuart_5finit_65',['hal_uart_init',['../a00578.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_linux_uart_userspace.c'],['../a00611.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_uart_harmony.c'],['../a00626.html#afb6d836af248aed1afe715ae2f2f7c2b',1,'hal_uart_init(ATCAIface iface, ATCAIfaceCfg *cfg): hal_windows_kit_uart.c']]], + ['hal_5fuart_5fpost_5finit_66',['hal_uart_post_init',['../a00611.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_uart_harmony.c'],['../a00626.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_windows_kit_uart.c'],['../a00578.html#a1c5f894db539ea5cb0d5ae0fa38449d7',1,'hal_uart_post_init(ATCAIface iface): hal_linux_uart_userspace.c']]], + ['hal_5fuart_5freceive_67',['hal_uart_receive',['../a00578.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_linux_uart_userspace.c'],['../a00611.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_uart_harmony.c'],['../a00626.html#a1a0256b61c3579519f8cc6d6157bc126',1,'hal_uart_receive(ATCAIface iface, uint8_t word_address, uint8_t *rxdata, uint16_t *rxlength): hal_windows_kit_uart.c']]], + ['hal_5fuart_5frelease_68',['hal_uart_release',['../a00578.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_linux_uart_userspace.c'],['../a00611.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_uart_harmony.c'],['../a00626.html#a1e0c17bf7342c21ca69d066eefa1f1eb',1,'hal_uart_release(void *hal_data): hal_windows_kit_uart.c']]], + ['hal_5fuart_5fsend_69',['hal_uart_send',['../a00578.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_linux_uart_userspace.c'],['../a00611.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_uart_harmony.c'],['../a00626.html#aae0b332270c1e8df223b430d8e8ddbbc',1,'hal_uart_send(ATCAIface iface, uint8_t word_address, uint8_t *txdata, int txlength): hal_windows_kit_uart.c']]] ]; diff --git a/search/functions_8.js b/search/functions_8.js index da4752be7..9602b0204 100644 --- a/search/functions_8.js +++ b/search/functions_8.js @@ -1,18 +1,18 @@ var searchData= [ - ['iface_5fget_5fdevice_5ftype_5fby_5fname_0',['iface_get_device_type_by_name',['../a01442.html#ga8e50f9bf69be0910880411e9a0d5bc24',1,'atca_iface.c']]], - ['ifacecfg_5fget_5faddress_1',['ifacecfg_get_address',['../a01442.html#ga9efe98ee7fe9be95593c7177800efd8d',1,'atca_iface.c']]], - ['ifacecfg_5fset_5faddress_2',['ifacecfg_set_address',['../a01442.html#ga4e975805352164dc3a8ff553b42c509f',1,'atca_iface.c']]], - ['ifacetype_5fis_5fkit_3',['ifacetype_is_kit',['../a01442.html#gaaff5268b9acbf16db03b425e6c54f97c',1,'atca_iface.c']]], - ['initatcadevice_4',['initATCADevice',['../a01441.html#ga8eec7f2190d1f9bda6684f5d2177db15',1,'atca_device.c']]], - ['initatcaiface_5',['initATCAIface',['../a01442.html#ga3a31087729a7a2e9a624572f234809fc',1,'atca_iface.c']]], - ['isalpha_6',['isAlpha',['../a00251.html#a592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c'],['../a01439.html#ga592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c']]], - ['isatcaerror_7',['isATCAError',['../a00347.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c'],['../a00350.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c']]], - ['isbase64_8',['isBase64',['../a00251.html#ac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c'],['../a01439.html#gac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c']]], - ['isbase64digit_9',['isBase64Digit',['../a00251.html#ad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c'],['../a01439.html#gad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c']]], - ['isblankspace_10',['isBlankSpace',['../a00251.html#a04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c'],['../a01439.html#ga04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c']]], - ['isdigit_11',['isDigit',['../a00251.html#a7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c'],['../a01439.html#ga7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c']]], - ['ishex_12',['isHex',['../a00251.html#ab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c'],['../a01439.html#gab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c']]], - ['ishexalpha_13',['isHexAlpha',['../a00251.html#a78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c'],['../a01439.html#ga78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c']]], - ['ishexdigit_14',['isHexDigit',['../a00251.html#a39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c'],['../a01439.html#ga39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c']]] + ['iface_5fget_5fdevice_5ftype_5fby_5fname_0',['iface_get_device_type_by_name',['../a01469.html#ga8e50f9bf69be0910880411e9a0d5bc24',1,'atca_iface.c']]], + ['ifacecfg_5fget_5faddress_1',['ifacecfg_get_address',['../a01469.html#ga9efe98ee7fe9be95593c7177800efd8d',1,'atca_iface.c']]], + ['ifacecfg_5fset_5faddress_2',['ifacecfg_set_address',['../a01469.html#ga4e975805352164dc3a8ff553b42c509f',1,'atca_iface.c']]], + ['ifacetype_5fis_5fkit_3',['ifacetype_is_kit',['../a01469.html#gaaff5268b9acbf16db03b425e6c54f97c',1,'atca_iface.c']]], + ['initatcadevice_4',['initATCADevice',['../a01468.html#ga8eec7f2190d1f9bda6684f5d2177db15',1,'atca_device.c']]], + ['initatcaiface_5',['initATCAIface',['../a01469.html#ga3a31087729a7a2e9a624572f234809fc',1,'atca_iface.c']]], + ['isalpha_6',['isAlpha',['../a00257.html#a592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c'],['../a01466.html#ga592c23e94097ad5e212beb6390aa88c6',1,'isAlpha(char c): atca_helpers.c']]], + ['isatcaerror_7',['isATCAError',['../a00353.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c'],['../a00356.html#ae41108996848638519849163e51cd10a',1,'isATCAError(uint8_t *data): calib_command.c']]], + ['isbase64_8',['isBase64',['../a00257.html#ac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c'],['../a01466.html#gac873a37c53fdd922d5b36efd737e3ec3',1,'isBase64(char c, const uint8_t *rules): atca_helpers.c']]], + ['isbase64digit_9',['isBase64Digit',['../a00257.html#ad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c'],['../a01466.html#gad10d15454308230fbef54bdd43001ed2',1,'isBase64Digit(char c, const uint8_t *rules): atca_helpers.c']]], + ['isblankspace_10',['isBlankSpace',['../a00257.html#a04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c'],['../a01466.html#ga04fefe2ff5a7d2e937b2634acd22982a',1,'isBlankSpace(char c): atca_helpers.c']]], + ['isdigit_11',['isDigit',['../a00257.html#a7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c'],['../a01466.html#ga7a929bf65cbc777bab7e533a2755cfad',1,'isDigit(char c): atca_helpers.c']]], + ['ishex_12',['isHex',['../a00257.html#ab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c'],['../a01466.html#gab7ca9ee391118aafe6f3cf7df4fa5de3',1,'isHex(char c): atca_helpers.c']]], + ['ishexalpha_13',['isHexAlpha',['../a00257.html#a78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c'],['../a01466.html#ga78abefc293c0a04d8ef649c94c8a1057',1,'isHexAlpha(char c): atca_helpers.c']]], + ['ishexdigit_14',['isHexDigit',['../a00257.html#a39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c'],['../a01466.html#ga39003da4dc8a0b8999f1325c2f96f641',1,'isHexDigit(char c): atca_helpers.c']]] ]; diff --git a/search/functions_9.js b/search/functions_9.js index 101566ecf..fe1f41323 100644 --- a/search/functions_9.js +++ b/search/functions_9.js @@ -6,7 +6,7 @@ var searchData= ['kit_5fhost_5fprocess_5fcmd_3',['kit_host_process_cmd',['../a00017.html#ac00c465f600b5dd1dcb85eddff61d93a',1,'kit_host_process_cmd(ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen): ascii_kit_host.c'],['../a00020.html#ac00c465f600b5dd1dcb85eddff61d93a',1,'kit_host_process_cmd(ascii_kit_host_context_t *ctx, const kit_host_map_entry_t *cmd_list, int argc, char *argv[], uint8_t *response, size_t *rlen): ascii_kit_host.c']]], ['kit_5fhost_5fprocess_5fline_4',['kit_host_process_line',['../a00017.html#a2067eeb11f190a7fb64217f917c3ff76',1,'kit_host_process_line(ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen): ascii_kit_host.c'],['../a00020.html#a2067eeb11f190a7fb64217f917c3ff76',1,'kit_host_process_line(ascii_kit_host_context_t *ctx, uint8_t *input_line, size_t ilen, uint8_t *response, size_t *rlen): ascii_kit_host.c']]], ['kit_5fhost_5ftask_5',['kit_host_task',['../a00017.html#ac2fa4cf8af951688c4be97cca0d23b71',1,'kit_host_task(ascii_kit_host_context_t *ctx): ascii_kit_host.c'],['../a00020.html#ac2fa4cf8af951688c4be97cca0d23b71',1,'kit_host_task(ascii_kit_host_context_t *ctx): ascii_kit_host.c']]], - ['kit_5fid_5ffrom_5fdevtype_6',['kit_id_from_devtype',['../a01446.html#ga554072f32204a0eb8d7b8c7931e43343',1,'kit_protocol.c']]], - ['kit_5finterface_7',['kit_interface',['../a01446.html#ga33fe33933fb59dde6e6fb8975da6c12d',1,'kit_protocol.c']]], - ['kit_5finterface_5ffrom_5fkittype_8',['kit_interface_from_kittype',['../a01446.html#ga31075898964b61f4877ba882477b71c3',1,'kit_protocol.c']]] + ['kit_5fid_5ffrom_5fdevtype_6',['kit_id_from_devtype',['../a01473.html#ga554072f32204a0eb8d7b8c7931e43343',1,'kit_protocol.c']]], + ['kit_5finterface_7',['kit_interface',['../a01473.html#ga33fe33933fb59dde6e6fb8975da6c12d',1,'kit_protocol.c']]], + ['kit_5finterface_5ffrom_5fkittype_8',['kit_interface_from_kittype',['../a01473.html#ga31075898964b61f4877ba882477b71c3',1,'kit_protocol.c']]] ]; diff --git a/search/functions_a.js b/search/functions_a.js index ff289e109..ca5a6766c 100644 --- a/search/functions_a.js +++ b/search/functions_a.js @@ -1,7 +1,7 @@ var searchData= [ - ['lib_5fstrcasestr_0',['lib_strcasestr',['../a00251.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c'],['../a00260.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c']]], - ['lib_5ftolower_1',['lib_tolower',['../a00251.html#ada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c'],['../a01439.html#gada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c']]], - ['lib_5ftoupper_2',['lib_toupper',['../a00251.html#a13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c'],['../a01439.html#ga13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c']]], - ['load_5fcryptoauthlib_3',['load_cryptoauthlib',['../a01459.html#aa9a021d0bc0272e702a7de499b76683c',1,'cryptoauthlib::library']]] + ['lib_5fstrcasestr_0',['lib_strcasestr',['../a00257.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c'],['../a00266.html#a21594322838322aac744aaf655d77ec8',1,'lib_strcasestr(const char *haystack, const char *needle): atca_helpers.c']]], + ['lib_5ftolower_1',['lib_tolower',['../a00257.html#ada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c'],['../a01466.html#gada3308b30b1b1e40abb806dbc5476648',1,'lib_tolower(char c): atca_helpers.c']]], + ['lib_5ftoupper_2',['lib_toupper',['../a00257.html#a13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c'],['../a01466.html#ga13a4675d782c861977b653e3c2b354ba',1,'lib_toupper(char c): atca_helpers.c']]], + ['load_5fcryptoauthlib_3',['load_cryptoauthlib',['../a01486.html#aa9a021d0bc0272e702a7de499b76683c',1,'cryptoauthlib::library']]] ]; diff --git a/search/functions_b.js b/search/functions_b.js index 07f29a994..f89d2b1bd 100644 --- a/search/functions_b.js +++ b/search/functions_b.js @@ -1,4 +1,4 @@ var searchData= [ - ['newatcadevice_0',['newATCADevice',['../a01441.html#gad5e12e12d3030e28d75164286df9e5e9',1,'atca_device.c']]] + ['newatcadevice_0',['newATCADevice',['../a01468.html#gad5e12e12d3030e28d75164286df9e5e9',1,'atca_device.c']]] ]; diff --git a/search/functions_c.js b/search/functions_c.js index 6ab09000f..ddb773d62 100644 --- a/search/functions_c.js +++ b/search/functions_c.js @@ -1,39 +1,39 @@ var searchData= [ - ['packhex_0',['packHex',['../a01439.html#gad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c'],['../a00251.html#ad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c']]], - ['pkcs11_5fattrib_5ffill_1',['pkcs11_attrib_fill',['../a01450.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01450.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c']]], - ['pkcs11_5fattrib_5fvalue_2',['pkcs11_attrib_value',['../a01450.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01450.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c']]], - ['pkcs11_5fdecrypt_5ffinal_3',['pkcs11_decrypt_final',['../a01450.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c'],['../a01450.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c']]], - ['pkcs11_5fdeinit_4',['pkcs11_deinit',['../a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c'],['../a01450.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c']]], - ['pkcs11_5fdigest_5',['pkcs11_digest',['../a00698.html#a81936ce8429c7a97bc42921589c1522e',1,'pkcs11_digest.c']]], - ['pkcs11_5fdigest_5ffinal_6',['pkcs11_digest_final',['../a00698.html#abd1c9ccc6899b550d241f007fd023d6b',1,'pkcs11_digest.c']]], - ['pkcs11_5fdigest_5finit_7',['pkcs11_digest_init',['../a00698.html#a903aed9c7d096dced1233a11539c781d',1,'pkcs11_digest.c']]], - ['pkcs11_5fdigest_5fupdate_8',['pkcs11_digest_update',['../a00698.html#a87a4b63b1a4ced5e40a1cc0bbc88599d',1,'pkcs11_digest.c']]], - ['pkcs11_5fencrypt_5ffinal_9',['pkcs11_encrypt_final',['../a01450.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c'],['../a01450.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c']]], - ['pkcs11_5fget_5fcontext_10',['pkcs11_get_context',['../a01450.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c'],['../a01450.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c']]], - ['pkcs11_5fget_5flib_5finfo_11',['pkcs11_get_lib_info',['../a01450.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c'],['../a01450.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c']]], - ['pkcs11_5finit_12',['pkcs11_init',['../a01450.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c'],['../a01450.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c']]], - ['pkcs11_5finit_5fcheck_13',['pkcs11_init_check',['../a01450.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c'],['../a01450.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c']]], - ['pkcs11_5fobject_5fcreate_14',['pkcs11_object_create',['../a01450.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c'],['../a01450.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c']]], - ['pkcs11_5fobject_5fdestroy_15',['pkcs11_object_destroy',['../a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c'],['../a01450.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c']]], - ['pkcs11_5fobject_5fis_5fprivate_16',['pkcs11_object_is_private',['../a01450.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c'],['../a01450.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c']]], - ['pkcs11_5fos_5fcreate_5fmutex_17',['pkcs11_os_create_mutex',['../a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c'],['../a01450.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c']]], - ['pkcs11_5fsession_5fcheck_18',['pkcs11_session_check',['../a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c'],['../a01450.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c']]], - ['pkcs11_5fsession_5fcloseall_19',['pkcs11_session_closeall',['../a01450.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c'],['../a01450.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c']]], - ['pkcs11_5fsession_5fget_5finfo_20',['pkcs11_session_get_info',['../a01450.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c'],['../a01450.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c']]], - ['pkcs11_5fsession_5flogin_21',['pkcs11_session_login',['../a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c'],['../a01450.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c']]], - ['pkcs11_5fsignature_5fsign_22',['pkcs11_signature_sign',['../a01450.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01450.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fsign_5fcontinue_23',['pkcs11_signature_sign_continue',['../a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01450.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fsign_5ffinish_24',['pkcs11_signature_sign_finish',['../a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01450.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fsign_5finit_25',['pkcs11_signature_sign_init',['../a01450.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01450.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_26',['pkcs11_signature_verify',['../a01450.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01450.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_5fcontinue_27',['pkcs11_signature_verify_continue',['../a01450.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01450.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_5ffinish_28',['pkcs11_signature_verify_finish',['../a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01450.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], - ['pkcs11_5fsignature_5fverify_5finit_29',['pkcs11_signature_verify_init',['../a01450.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01450.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], - ['pkcs11_5fslot_5fget_5fcontext_30',['pkcs11_slot_get_context',['../a01450.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01450.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c']]], - ['pkcs11_5fslot_5fget_5finfo_31',['pkcs11_slot_get_info',['../a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c'],['../a01450.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c']]], - ['pkcs11_5fslot_5finit_32',['pkcs11_slot_init',['../a01450.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01450.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c']]], - ['pkcs11_5ftoken_5fget_5finfo_33',['pkcs11_token_get_info',['../a01450.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c'],['../a01450.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c']]], - ['pkcs11_5ftoken_5finit_34',['pkcs11_token_init',['../a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c'],['../a01450.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c']]], - ['pkcs11_5ftoken_5frandom_35',['pkcs11_token_random',['../a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c'],['../a01450.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c']]] + ['packhex_0',['packHex',['../a01466.html#gad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c'],['../a00257.html#ad017ae33af5a7ea062cea7d54de675a8',1,'packHex(const char *ascii_hex, size_t ascii_hex_len, char *packed_hex, size_t *packed_len): atca_helpers.c']]], + ['pkcs11_5fattrib_5ffill_1',['pkcs11_attrib_fill',['../a01477.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01477.html#ga8b1206a513938768655cdd541ffee9b3',1,'pkcs11_attrib_fill(CK_ATTRIBUTE_PTR pAttribute, const void *pData, const CK_ULONG ulSize): pkcs11_attrib.c']]], + ['pkcs11_5fattrib_5fvalue_2',['pkcs11_attrib_value',['../a01477.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c'],['../a01477.html#ga50e9c64b899d1b2f78c9634298225303',1,'pkcs11_attrib_value(CK_ATTRIBUTE_PTR pAttribute, const CK_ULONG ulValue, const CK_ULONG ulSize): pkcs11_attrib.c']]], + ['pkcs11_5fdecrypt_5ffinal_3',['pkcs11_decrypt_final',['../a01477.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c'],['../a01477.html#ga045a35287c46a29da2ad13e700087e0d',1,'pkcs11_decrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen): pkcs11_encrypt.c']]], + ['pkcs11_5fdeinit_4',['pkcs11_deinit',['../a01477.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c'],['../a01477.html#gabff89fd0af2e75ee2db858f9fe934ac4',1,'pkcs11_deinit(CK_VOID_PTR pReserved): pkcs11_init.c']]], + ['pkcs11_5fdigest_5',['pkcs11_digest',['../a00713.html#a81936ce8429c7a97bc42921589c1522e',1,'pkcs11_digest.c']]], + ['pkcs11_5fdigest_5ffinal_6',['pkcs11_digest_final',['../a00713.html#abd1c9ccc6899b550d241f007fd023d6b',1,'pkcs11_digest.c']]], + ['pkcs11_5fdigest_5finit_7',['pkcs11_digest_init',['../a00713.html#a903aed9c7d096dced1233a11539c781d',1,'pkcs11_digest.c']]], + ['pkcs11_5fdigest_5fupdate_8',['pkcs11_digest_update',['../a00713.html#a87a4b63b1a4ced5e40a1cc0bbc88599d',1,'pkcs11_digest.c']]], + ['pkcs11_5fencrypt_5ffinal_9',['pkcs11_encrypt_final',['../a01477.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c'],['../a01477.html#gaae94f85980031bec34148341efd537e3',1,'pkcs11_encrypt_final(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedData, CK_ULONG_PTR pulEncryptedDataLen): pkcs11_encrypt.c']]], + ['pkcs11_5fget_5fcontext_10',['pkcs11_get_context',['../a01477.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c'],['../a01477.html#gae0e3060e6ae0dfc17a35881c223d8123',1,'pkcs11_get_context(void): pkcs11_init.c']]], + ['pkcs11_5fget_5flib_5finfo_11',['pkcs11_get_lib_info',['../a01477.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c'],['../a01477.html#gaae56826104269ca730066136fb3eb995',1,'pkcs11_get_lib_info(CK_INFO_PTR pInfo): pkcs11_info.c']]], + ['pkcs11_5finit_12',['pkcs11_init',['../a01477.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c'],['../a01477.html#gaab9ef494fdc21911e700f2b9d62547ec',1,'pkcs11_init(CK_C_INITIALIZE_ARGS const *pInitArgs): pkcs11_init.c']]], + ['pkcs11_5finit_5fcheck_13',['pkcs11_init_check',['../a01477.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c'],['../a01477.html#gadd899ffeae0146c08b249e3f551e21f8',1,'pkcs11_init_check(pkcs11_lib_ctx_ptr *ppContext, CK_BBOOL lock): pkcs11_init.c']]], + ['pkcs11_5fobject_5fcreate_14',['pkcs11_object_create',['../a01477.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c'],['../a01477.html#ga5cdd6e87496f480f42c44430250794bb',1,'pkcs11_object_create(CK_SESSION_HANDLE hSession, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phObject): pkcs11_object.c']]], + ['pkcs11_5fobject_5fdestroy_15',['pkcs11_object_destroy',['../a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c'],['../a01477.html#ga34dbd233b6ac0bf1d2aa2be541d66b25',1,'pkcs11_object_destroy(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hObject): pkcs11_object.c']]], + ['pkcs11_5fobject_5fis_5fprivate_16',['pkcs11_object_is_private',['../a01477.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c'],['../a01477.html#gad3eaa8d90b81d65f8e585c81c701f893',1,'pkcs11_object_is_private(pkcs11_object_ptr pObject, CK_BBOOL *is_private, pkcs11_session_ctx_ptr pSession): pkcs11_object.c']]], + ['pkcs11_5fos_5fcreate_5fmutex_17',['pkcs11_os_create_mutex',['../a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c'],['../a01477.html#gaf5f1c5e6c5bf8d91f2090ee4bbe20362',1,'pkcs11_os_create_mutex(CK_VOID_PTR_PTR ppMutex): pkcs11_os.c']]], + ['pkcs11_5fsession_5fcheck_18',['pkcs11_session_check',['../a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c'],['../a01477.html#ga7eb04614661e0cedf6cb926787f5ff9b',1,'pkcs11_session_check(pkcs11_session_ctx_ptr *pSession, CK_SESSION_HANDLE hSession): pkcs11_session.c']]], + ['pkcs11_5fsession_5fcloseall_19',['pkcs11_session_closeall',['../a01477.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c'],['../a01477.html#ga43525e77f9049b545fa09129cacf9c9a',1,'pkcs11_session_closeall(CK_SLOT_ID slotID): pkcs11_session.c']]], + ['pkcs11_5fsession_5fget_5finfo_20',['pkcs11_session_get_info',['../a01477.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c'],['../a01477.html#ga236a002e179ed36a0b81399a3e11fcb8',1,'pkcs11_session_get_info(CK_SESSION_HANDLE hSession, CK_SESSION_INFO_PTR pInfo): pkcs11_session.c']]], + ['pkcs11_5fsession_5flogin_21',['pkcs11_session_login',['../a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c'],['../a01477.html#ga4d70fd7e9799d0428c308a3e1ed146df',1,'pkcs11_session_login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen): pkcs11_session.c']]], + ['pkcs11_5fsignature_5fsign_22',['pkcs11_signature_sign',['../a01477.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01477.html#ga4641a3dd4da46f801565310f3784a41e',1,'pkcs11_signature_sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fsign_5fcontinue_23',['pkcs11_signature_sign_continue',['../a01477.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01477.html#ga9c471f7e2ca3330cf6d2fa70e12db38a',1,'pkcs11_signature_sign_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fsign_5ffinish_24',['pkcs11_signature_sign_finish',['../a01477.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c'],['../a01477.html#gadb52d31f30bb8f6a66d1851ba0052dc7',1,'pkcs11_signature_sign_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG_PTR pulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fsign_5finit_25',['pkcs11_signature_sign_init',['../a01477.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01477.html#ga742c35812a444a87e35150e2332be0c2',1,'pkcs11_signature_sign_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_26',['pkcs11_signature_verify',['../a01477.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01477.html#ga27b3652fb8a87f7f40fff10c63316b35',1,'pkcs11_signature_verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_5fcontinue_27',['pkcs11_signature_verify_continue',['../a01477.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c'],['../a01477.html#gab735278cab8e184d682b4ed8b12dbb1b',1,'pkcs11_signature_verify_continue(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, CK_ULONG ulPartLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_5ffinish_28',['pkcs11_signature_verify_finish',['../a01477.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c'],['../a01477.html#ga2aac39ede2b43021b63ed6bc7f3f20da',1,'pkcs11_signature_verify_finish(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen): pkcs11_signature.c']]], + ['pkcs11_5fsignature_5fverify_5finit_29',['pkcs11_signature_verify_init',['../a01477.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c'],['../a01477.html#ga852f9badf3176a60bfb874fb5d118791',1,'pkcs11_signature_verify_init(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey): pkcs11_signature.c']]], + ['pkcs11_5fslot_5fget_5fcontext_30',['pkcs11_slot_get_context',['../a01477.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01477.html#ga987853011908614aba0db7c5933b0a20',1,'pkcs11_slot_get_context(pkcs11_lib_ctx_ptr lib_ctx, CK_SLOT_ID slotID): pkcs11_slot.c']]], + ['pkcs11_5fslot_5fget_5finfo_31',['pkcs11_slot_get_info',['../a01477.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c'],['../a01477.html#ga3bba79e03141bfb7a9ec76c273db63d2',1,'pkcs11_slot_get_info(CK_SLOT_ID slotID, CK_SLOT_INFO_PTR pInfo): pkcs11_slot.c']]], + ['pkcs11_5fslot_5finit_32',['pkcs11_slot_init',['../a01477.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c'],['../a01477.html#ga418414364e88d0673b4f6c90cd62ebed',1,'pkcs11_slot_init(CK_SLOT_ID slotID): pkcs11_slot.c']]], + ['pkcs11_5ftoken_5fget_5finfo_33',['pkcs11_token_get_info',['../a01477.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c'],['../a01477.html#ga7bf2fea766cab4645fe615661bcf0db9',1,'pkcs11_token_get_info(CK_SLOT_ID slotID, CK_TOKEN_INFO_PTR pInfo): pkcs11_token.c']]], + ['pkcs11_5ftoken_5finit_34',['pkcs11_token_init',['../a01477.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c'],['../a01477.html#ga7e207adf2d26c1d6ea64f7c60252bf45',1,'pkcs11_token_init(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_PTR pLabel): pkcs11_token.c']]], + ['pkcs11_5ftoken_5frandom_35',['pkcs11_token_random',['../a01477.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c'],['../a01477.html#gaf4c0c6a2d12d879308f2d42cc61ef401',1,'pkcs11_token_random(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen): pkcs11_token.c']]] ]; diff --git a/search/functions_d.js b/search/functions_d.js index ac6e36470..930b114f2 100644 --- a/search/functions_d.js +++ b/search/functions_d.js @@ -1,5 +1,5 @@ var searchData= [ - ['releaseatcadevice_0',['releaseATCADevice',['../a01441.html#gab729e6c838c0a247d4f226fb92492d96',1,'atca_device.c']]], - ['releaseatcaiface_1',['releaseATCAIface',['../a01442.html#gab9ee16357a8e397a72eda7e9c8553fb3',1,'atca_iface.c']]] + ['releaseatcadevice_0',['releaseATCADevice',['../a01468.html#gab729e6c838c0a247d4f226fb92492d96',1,'atca_device.c']]], + ['releaseatcaiface_1',['releaseATCAIface',['../a01469.html#gab9ee16357a8e397a72eda7e9c8553fb3',1,'atca_iface.c']]] ]; diff --git a/search/functions_e.js b/search/functions_e.js index 6bc6125b0..5d7c4ee0c 100644 --- a/search/functions_e.js +++ b/search/functions_e.js @@ -1,26 +1,26 @@ var searchData= [ ['secure_5fboot_5fprocess_0',['secure_boot_process',['../a00044.html#a861a785461af4116bca9343019225abd',1,'secure_boot_process(void): secure_boot.c'],['../a00047.html#a861a785461af4116bca9343019225abd',1,'secure_boot_process(void): secure_boot.c']]], - ['sha206a_5fauthenticate_1',['sha206a_authenticate',['../a00005.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a00008.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a01460.html#aca369f80d942aad6a827c2817c998df5',1,'cryptoauthlib.sha206_api.sha206a_authenticate()']]], - ['sha206a_5fcheck_5fdk_5fuseflag_5fvalidity_2',['sha206a_check_dk_useflag_validity',['../a00005.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a00008.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a01460.html#ae4da1b83a8d9d37483a4b179edfeceff',1,'cryptoauthlib.sha206_api.sha206a_check_dk_useflag_validity()']]], - ['sha206a_5fcheck_5fpk_5fuseflag_5fvalidity_3',['sha206a_check_pk_useflag_validity',['../a00005.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a00008.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a01460.html#a1e60ef1b7888afae74b4e390a358d263',1,'cryptoauthlib.sha206_api.sha206a_check_pk_useflag_validity()']]], - ['sha206a_5fdiversify_5fparent_5fkey_4',['sha206a_diversify_parent_key',['../a00005.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a00008.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a01460.html#abe0624bf06c710473082bfbef52273f3',1,'cryptoauthlib.sha206_api.sha206a_diversify_parent_key(parent_key, diversified_key)']]], - ['sha206a_5fgenerate_5fchallenge_5fresponse_5fpair_5',['sha206a_generate_challenge_response_pair',['../a01460.html#a3c5cc4df72fb0dea8534dc7726430063',1,'cryptoauthlib.sha206_api.sha206a_generate_challenge_response_pair()'],['../a00008.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c'],['../a00005.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c']]], - ['sha206a_5fgenerate_5fderive_5fkey_6',['sha206a_generate_derive_key',['../a00008.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(): api_206a.c'],['../a01460.html#a607ffbecea0980b58be2b31a8b87b983',1,'cryptoauthlib.sha206_api.sha206a_generate_derive_key()'],['../a00005.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(uint8_t *parent_key, uint8_t *derived_key, uint8_t param1, uint16_t param2): api_206a.c']]], - ['sha206a_5fget_5fdata_5fstore_5flock_5fstatus_7',['sha206a_get_data_store_lock_status',['../a00008.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(): api_206a.c'],['../a01460.html#a4bc534fea446c5d50d4d3cde1cf4a4dc',1,'cryptoauthlib.sha206_api.sha206a_get_data_store_lock_status()'],['../a00005.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(uint8_t slot, uint8_t *is_locked): api_206a.c']]], - ['sha206a_5fget_5fdk_5fupdate_5fcount_8',['sha206a_get_dk_update_count',['../a00008.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(): api_206a.c'],['../a01460.html#ac96ca57f02ed212f0eb5ae95875d952c',1,'cryptoauthlib.sha206_api.sha206a_get_dk_update_count()'],['../a00005.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(uint8_t *dk_update_count): api_206a.c']]], - ['sha206a_5fget_5fdk_5fuseflag_5fcount_9',['sha206a_get_dk_useflag_count',['../a00008.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(): api_206a.c'],['../a01460.html#ae27b4776f24b612e4ea9e712c086d22b',1,'cryptoauthlib.sha206_api.sha206a_get_dk_useflag_count()'],['../a00005.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(uint8_t *dk_available_count): api_206a.c']]], - ['sha206a_5fget_5fpk_5fuseflag_5fcount_10',['sha206a_get_pk_useflag_count',['../a00008.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(): api_206a.c'],['../a01460.html#a710e3e25bc12a3ecd3051ebbb763c5b0',1,'cryptoauthlib.sha206_api.sha206a_get_pk_useflag_count()'],['../a00005.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(uint8_t *pk_available_count): api_206a.c']]], - ['sha206a_5fread_5fdata_5fstore_11',['sha206a_read_data_store',['../a00008.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(): api_206a.c'],['../a01460.html#aeed0ec7ac85e0588bc05822d6d63eaa3',1,'cryptoauthlib.sha206_api.sha206a_read_data_store()'],['../a00005.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(uint8_t slot, uint8_t *data, uint8_t offset, uint8_t len): api_206a.c']]], - ['sha206a_5fverify_5fdevice_5fconsumption_12',['sha206a_verify_device_consumption',['../a00008.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(): api_206a.c'],['../a01460.html#a0d2a1e79937863b4a48218de3567d996',1,'cryptoauthlib.sha206_api.sha206a_verify_device_consumption()'],['../a00005.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(uint8_t *is_consumed): api_206a.c']]], - ['sha206a_5fwrite_5fdata_5fstore_13',['sha206a_write_data_store',['../a00005.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a00008.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a01460.html#a1e883095c960da9d48db489a25774042',1,'cryptoauthlib.sha206_api.sha206a_write_data_store()']]], - ['sign_14',['sign',['../a02236.html#a21a92b8d373a29b54b11448fdb7b2ce4',1,'cryptoauthlib.atjwt.HwHmacAlgorithm.sign()'],['../a02232.html#a98b230727187cf34e600b9a6ff20cc45',1,'cryptoauthlib.atjwt.HwEcAlgorithm.sign()']]], - ['swi_5fuart_5fdeinit_15',['swi_uart_deinit',['../a01446.html#ga0b1aad3936bf003686d8db7fa2be5132',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fdiscover_5fbuses_16',['swi_uart_discover_buses',['../a01446.html#gad640b598d581ee7c8a4c804bee602906',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5finit_17',['swi_uart_init',['../a01446.html#ga003b63648f1a5f9eba274760559688f2',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fmode_18',['swi_uart_mode',['../a01446.html#gacc2a96c86ce4c07249b81bc6a7eb2e41',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5freceive_5fbyte_19',['swi_uart_receive_byte',['../a01446.html#ga93f3dab17c14f71641ca970998ede823',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fsend_5fbyte_20',['swi_uart_send_byte',['../a01446.html#ga4a4d491006d9683d67838963706ac9c1',1,'swi_uart_samd21_asf.c']]], - ['swi_5fuart_5fsetbaud_21',['swi_uart_setbaud',['../a01446.html#gaba296f70baf68b768d6c4bb9cf7ba67d',1,'swi_uart_samd21_asf.c']]], + ['sha206a_5fauthenticate_1',['sha206a_authenticate',['../a00005.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a00008.html#a12d6e9c4cc705771788c0640aed7caa2',1,'sha206a_authenticate(uint8_t *challenge, uint8_t *expected_response, uint8_t *is_authenticated): api_206a.c'],['../a01487.html#aca369f80d942aad6a827c2817c998df5',1,'cryptoauthlib.sha206_api.sha206a_authenticate()']]], + ['sha206a_5fcheck_5fdk_5fuseflag_5fvalidity_2',['sha206a_check_dk_useflag_validity',['../a00005.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a00008.html#ac87eb13206cd4e43575df8845aa094d9',1,'sha206a_check_dk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a01487.html#ae4da1b83a8d9d37483a4b179edfeceff',1,'cryptoauthlib.sha206_api.sha206a_check_dk_useflag_validity()']]], + ['sha206a_5fcheck_5fpk_5fuseflag_5fvalidity_3',['sha206a_check_pk_useflag_validity',['../a00005.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a00008.html#ad2ace3d5e5b19b3ff4347376b5b78d85',1,'sha206a_check_pk_useflag_validity(uint8_t *is_consumed): api_206a.c'],['../a01487.html#a1e60ef1b7888afae74b4e390a358d263',1,'cryptoauthlib.sha206_api.sha206a_check_pk_useflag_validity()']]], + ['sha206a_5fdiversify_5fparent_5fkey_4',['sha206a_diversify_parent_key',['../a00005.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a00008.html#a1e33c650348129b8d82a8370e38b4c6c',1,'sha206a_diversify_parent_key(uint8_t *parent_key, uint8_t *diversified_key): api_206a.c'],['../a01487.html#abe0624bf06c710473082bfbef52273f3',1,'cryptoauthlib.sha206_api.sha206a_diversify_parent_key(parent_key, diversified_key)']]], + ['sha206a_5fgenerate_5fchallenge_5fresponse_5fpair_5',['sha206a_generate_challenge_response_pair',['../a01487.html#a3c5cc4df72fb0dea8534dc7726430063',1,'cryptoauthlib.sha206_api.sha206a_generate_challenge_response_pair()'],['../a00008.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c'],['../a00005.html#a9c9123a2363452de20ceefc9b020aac0',1,'sha206a_generate_challenge_response_pair(uint8_t *key, uint8_t *challenge, uint8_t *response): api_206a.c']]], + ['sha206a_5fgenerate_5fderive_5fkey_6',['sha206a_generate_derive_key',['../a00008.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(): api_206a.c'],['../a01487.html#a607ffbecea0980b58be2b31a8b87b983',1,'cryptoauthlib.sha206_api.sha206a_generate_derive_key()'],['../a00005.html#afbdb8aef5ee59e66c2e7b28f19edc712',1,'sha206a_generate_derive_key(uint8_t *parent_key, uint8_t *derived_key, uint8_t param1, uint16_t param2): api_206a.c']]], + ['sha206a_5fget_5fdata_5fstore_5flock_5fstatus_7',['sha206a_get_data_store_lock_status',['../a00008.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(): api_206a.c'],['../a01487.html#a4bc534fea446c5d50d4d3cde1cf4a4dc',1,'cryptoauthlib.sha206_api.sha206a_get_data_store_lock_status()'],['../a00005.html#ac55f2b5842936c908254e755bfe3d0f1',1,'sha206a_get_data_store_lock_status(uint8_t slot, uint8_t *is_locked): api_206a.c']]], + ['sha206a_5fget_5fdk_5fupdate_5fcount_8',['sha206a_get_dk_update_count',['../a00008.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(): api_206a.c'],['../a01487.html#ac96ca57f02ed212f0eb5ae95875d952c',1,'cryptoauthlib.sha206_api.sha206a_get_dk_update_count()'],['../a00005.html#a094aabc034e66d2a1b3ba9324da79010',1,'sha206a_get_dk_update_count(uint8_t *dk_update_count): api_206a.c']]], + ['sha206a_5fget_5fdk_5fuseflag_5fcount_9',['sha206a_get_dk_useflag_count',['../a00008.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(): api_206a.c'],['../a01487.html#ae27b4776f24b612e4ea9e712c086d22b',1,'cryptoauthlib.sha206_api.sha206a_get_dk_useflag_count()'],['../a00005.html#ac98db9b59f5413e7c10d65e00cbff402',1,'sha206a_get_dk_useflag_count(uint8_t *dk_available_count): api_206a.c']]], + ['sha206a_5fget_5fpk_5fuseflag_5fcount_10',['sha206a_get_pk_useflag_count',['../a00008.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(): api_206a.c'],['../a01487.html#a710e3e25bc12a3ecd3051ebbb763c5b0',1,'cryptoauthlib.sha206_api.sha206a_get_pk_useflag_count()'],['../a00005.html#a4415f1d4d84a1ccea935cad493dd5074',1,'sha206a_get_pk_useflag_count(uint8_t *pk_available_count): api_206a.c']]], + ['sha206a_5fread_5fdata_5fstore_11',['sha206a_read_data_store',['../a00008.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(): api_206a.c'],['../a01487.html#aeed0ec7ac85e0588bc05822d6d63eaa3',1,'cryptoauthlib.sha206_api.sha206a_read_data_store()'],['../a00005.html#ab97f7ad917c2c3293d211f8aad632a7c',1,'sha206a_read_data_store(uint8_t slot, uint8_t *data, uint8_t offset, uint8_t len): api_206a.c']]], + ['sha206a_5fverify_5fdevice_5fconsumption_12',['sha206a_verify_device_consumption',['../a00008.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(): api_206a.c'],['../a01487.html#a0d2a1e79937863b4a48218de3567d996',1,'cryptoauthlib.sha206_api.sha206a_verify_device_consumption()'],['../a00005.html#ac28d87cbe843ea3b2b69c5a62b14872f',1,'sha206a_verify_device_consumption(uint8_t *is_consumed): api_206a.c']]], + ['sha206a_5fwrite_5fdata_5fstore_13',['sha206a_write_data_store',['../a00005.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a00008.html#a23714cfbe25ea60f74a48c596ec48a6b',1,'sha206a_write_data_store(uint8_t slot, uint8_t *data, uint8_t block, uint8_t offset, uint8_t len, bool lock_after_write): api_206a.c'],['../a01487.html#a1e883095c960da9d48db489a25774042',1,'cryptoauthlib.sha206_api.sha206a_write_data_store()']]], + ['sign_14',['sign',['../a02271.html#a21a92b8d373a29b54b11448fdb7b2ce4',1,'cryptoauthlib.atjwt.HwHmacAlgorithm.sign()'],['../a02267.html#a98b230727187cf34e600b9a6ff20cc45',1,'cryptoauthlib.atjwt.HwEcAlgorithm.sign()']]], + ['swi_5fuart_5fdeinit_15',['swi_uart_deinit',['../a01473.html#ga0b1aad3936bf003686d8db7fa2be5132',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fdiscover_5fbuses_16',['swi_uart_discover_buses',['../a01473.html#gad640b598d581ee7c8a4c804bee602906',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5finit_17',['swi_uart_init',['../a01473.html#ga003b63648f1a5f9eba274760559688f2',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fmode_18',['swi_uart_mode',['../a01473.html#gacc2a96c86ce4c07249b81bc6a7eb2e41',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5freceive_5fbyte_19',['swi_uart_receive_byte',['../a01473.html#ga93f3dab17c14f71641ca970998ede823',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fsend_5fbyte_20',['swi_uart_send_byte',['../a01473.html#ga4a4d491006d9683d67838963706ac9c1',1,'swi_uart_samd21_asf.c']]], + ['swi_5fuart_5fsetbaud_21',['swi_uart_setbaud',['../a01473.html#gaba296f70baf68b768d6c4bb9cf7ba67d',1,'swi_uart_samd21_asf.c']]], ['symmetric_5fauthenticate_22',['symmetric_authenticate',['../a00011.html#a9a41d1600ffd22de067ded50447d359b',1,'symmetric_authenticate(uint8_t slot, const uint8_t *master_key, const uint8_t *rand_number): symmetric_authentication.c'],['../a00014.html#a9a41d1600ffd22de067ded50447d359b',1,'symmetric_authenticate(uint8_t slot, const uint8_t *master_key, const uint8_t *rand_number): symmetric_authentication.c']]] ]; diff --git a/search/functions_f.js b/search/functions_f.js index e3523a04c..78213c215 100644 --- a/search/functions_f.js +++ b/search/functions_f.js @@ -1,16 +1,16 @@ var searchData= [ - ['tng_5fatcacert_5fdevice_5fpublic_5fkey_0',['tng_atcacert_device_public_key',['../a01438.html#ga01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(): tng_atcacert_client.c'],['../a01462.html#a7382f6d9830ea03bcbb59f7fae2745e1',1,'cryptoauthlib.tng.tng_atcacert_device_public_key()'],['../a00068.html#a01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c']]], - ['tng_5fatcacert_5fmax_5fdevice_5fcert_5fsize_1',['tng_atcacert_max_device_cert_size',['../a01438.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01438.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01462.html#a6878e2f1c9330534f8c7950f26e327b0',1,'cryptoauthlib.tng.tng_atcacert_max_device_cert_size()']]], - ['tng_5fatcacert_5fmax_5fsigner_5fcert_5fsize_2',['tng_atcacert_max_signer_cert_size',['../a00068.html#a857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01438.html#ga857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01462.html#afc28b6798b670200ecf08645ccaf0e44',1,'cryptoauthlib.tng.tng_atcacert_max_signer_cert_size()']]], - ['tng_5fatcacert_5fread_5fdevice_5fcert_3',['tng_atcacert_read_device_cert',['../a01438.html#ga22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(): tng_atcacert_client.c'],['../a01462.html#a76d8460082efdbc28d2a68f5648ce8dd',1,'cryptoauthlib.tng.tng_atcacert_read_device_cert()'],['../a00068.html#a22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert): tng_atcacert_client.c']]], - ['tng_5fatcacert_5fread_5fsigner_5fcert_4',['tng_atcacert_read_signer_cert',['../a00068.html#a82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01438.html#ga82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01462.html#a6d3eab271cac5959402b283c5a6046a4',1,'cryptoauthlib.tng.tng_atcacert_read_signer_cert()']]], - ['tng_5fatcacert_5froot_5fcert_5',['tng_atcacert_root_cert',['../a00068.html#a31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01438.html#ga31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01462.html#a08385a0e8b5e7e8dc5de6570b06555a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert()']]], - ['tng_5fatcacert_5froot_5fcert_5fsize_6',['tng_atcacert_root_cert_size',['../a00068.html#aa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(): tng_atcacert_client.c'],['../a01462.html#a3c1b718b02781b6dbc87f7d6c109d3a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert_size()'],['../a01438.html#gaa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(size_t *cert_size): tng_atcacert_client.c']]], - ['tng_5fatcacert_5froot_5fpublic_5fkey_7',['tng_atcacert_root_public_key',['../a00068.html#a8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a01438.html#ga8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a01462.html#a375f83b01899d081623192f9d4a7e6fe',1,'cryptoauthlib.tng.tng_atcacert_root_public_key()']]], - ['tng_5fatcacert_5fsigner_5fpublic_5fkey_8',['tng_atcacert_signer_public_key',['../a00068.html#aa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01438.html#gaa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01462.html#a0c580da1c1d3e54a60be0f05d5d5c1f1',1,'cryptoauthlib.tng.tng_atcacert_signer_public_key()']]], - ['tng_5fget_5fdevice_5fcert_5fdef_9',['tng_get_device_cert_def',['../a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c'],['../a01438.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c']]], - ['tng_5fget_5fdevice_5fcert_5fdef_5fext_10',['tng_get_device_cert_def_ext',['../a01438.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c'],['../a01438.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c']]], - ['tng_5fget_5fdevice_5fpubkey_11',['tng_get_device_pubkey',['../a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01438.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01462.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7',1,'cryptoauthlib.tng.tng_get_device_pubkey()']]], - ['tng_5fmap_5fget_5fdevice_5fcert_5fdef_12',['tng_map_get_device_cert_def',['../a01438.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c'],['../a01438.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c']]] + ['tng_5fatcacert_5fdevice_5fpublic_5fkey_0',['tng_atcacert_device_public_key',['../a01465.html#ga01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(): tng_atcacert_client.c'],['../a01489.html#a7382f6d9830ea03bcbb59f7fae2745e1',1,'cryptoauthlib.tng.tng_atcacert_device_public_key()'],['../a00068.html#a01bf19754baee6ce82ec46f966528262',1,'tng_atcacert_device_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c']]], + ['tng_5fatcacert_5fmax_5fdevice_5fcert_5fsize_1',['tng_atcacert_max_device_cert_size',['../a01465.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01465.html#ga67606649a5f2261cb6b55478d72bf805',1,'tng_atcacert_max_device_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01489.html#a6878e2f1c9330534f8c7950f26e327b0',1,'cryptoauthlib.tng.tng_atcacert_max_device_cert_size()']]], + ['tng_5fatcacert_5fmax_5fsigner_5fcert_5fsize_2',['tng_atcacert_max_signer_cert_size',['../a00068.html#a857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01465.html#ga857aacbb70f2ea18411f1ca478a0e37f',1,'tng_atcacert_max_signer_cert_size(size_t *max_cert_size): tng_atcacert_client.c'],['../a01489.html#afc28b6798b670200ecf08645ccaf0e44',1,'cryptoauthlib.tng.tng_atcacert_max_signer_cert_size()']]], + ['tng_5fatcacert_5fread_5fdevice_5fcert_3',['tng_atcacert_read_device_cert',['../a01465.html#ga22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(): tng_atcacert_client.c'],['../a01489.html#a76d8460082efdbc28d2a68f5648ce8dd',1,'cryptoauthlib.tng.tng_atcacert_read_device_cert()'],['../a00068.html#a22c7ea083197410f396d18fa808e8e0c',1,'tng_atcacert_read_device_cert(uint8_t *cert, size_t *cert_size, const uint8_t *signer_cert): tng_atcacert_client.c']]], + ['tng_5fatcacert_5fread_5fsigner_5fcert_4',['tng_atcacert_read_signer_cert',['../a00068.html#a82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01465.html#ga82d3c529ed81119a956957052c06e8d7',1,'tng_atcacert_read_signer_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01489.html#a6d3eab271cac5959402b283c5a6046a4',1,'cryptoauthlib.tng.tng_atcacert_read_signer_cert()']]], + ['tng_5fatcacert_5froot_5fcert_5',['tng_atcacert_root_cert',['../a00068.html#a31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01465.html#ga31cf63afba3c936d279a325d71691a68',1,'tng_atcacert_root_cert(uint8_t *cert, size_t *cert_size): tng_atcacert_client.c'],['../a01489.html#a08385a0e8b5e7e8dc5de6570b06555a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert()']]], + ['tng_5fatcacert_5froot_5fcert_5fsize_6',['tng_atcacert_root_cert_size',['../a00068.html#aa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(): tng_atcacert_client.c'],['../a01489.html#a3c1b718b02781b6dbc87f7d6c109d3a6',1,'cryptoauthlib.tng.tng_atcacert_root_cert_size()'],['../a01465.html#gaa3a0387ff2a71684a2992d4661c53331',1,'tng_atcacert_root_cert_size(size_t *cert_size): tng_atcacert_client.c']]], + ['tng_5fatcacert_5froot_5fpublic_5fkey_7',['tng_atcacert_root_public_key',['../a00068.html#a8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a01465.html#ga8cd0d450da1bf23d0f6784446d35c556',1,'tng_atcacert_root_public_key(uint8_t *public_key): tng_atcacert_client.c'],['../a01489.html#a375f83b01899d081623192f9d4a7e6fe',1,'cryptoauthlib.tng.tng_atcacert_root_public_key()']]], + ['tng_5fatcacert_5fsigner_5fpublic_5fkey_8',['tng_atcacert_signer_public_key',['../a00068.html#aa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01465.html#gaa4c31ab35807d8ed51fbecc48866aa04',1,'tng_atcacert_signer_public_key(uint8_t *public_key, uint8_t *cert): tng_atcacert_client.c'],['../a01489.html#a0c580da1c1d3e54a60be0f05d5d5c1f1',1,'cryptoauthlib.tng.tng_atcacert_signer_public_key()']]], + ['tng_5fget_5fdevice_5fcert_5fdef_9',['tng_get_device_cert_def',['../a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c'],['../a01465.html#ga28c369c92f1a7c2f61512cde463b8ff5',1,'tng_get_device_cert_def(const atcacert_def_t **cert_def): tng_atca.c']]], + ['tng_5fget_5fdevice_5fcert_5fdef_5fext_10',['tng_get_device_cert_def_ext',['../a01465.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c'],['../a01465.html#ga3b8f346977ed8428692d15f74ef12401',1,'tng_get_device_cert_def_ext(ATCADevice device, const atcacert_def_t **cert_def): tng_atca.c']]], + ['tng_5fget_5fdevice_5fpubkey_11',['tng_get_device_pubkey',['../a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01465.html#ga6bdd6b8ace7a98b7efbc13f85ffaac1a',1,'tng_get_device_pubkey(uint8_t *public_key): tng_atca.c'],['../a01489.html#a2eb63fc0cf6c9ce8744fd5ab3524a9e7',1,'cryptoauthlib.tng.tng_get_device_pubkey()']]], + ['tng_5fmap_5fget_5fdevice_5fcert_5fdef_12',['tng_map_get_device_cert_def',['../a01465.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c'],['../a01465.html#ga60599359d5331215ca7fdf6710f0dbb1',1,'tng_map_get_device_cert_def(int index): tng_atca.c']]] ]; diff --git a/search/groups_0.js b/search/groups_0.js index 94ad670e1..ab8615d24 100644 --- a/search/groups_0.js +++ b/search/groups_0.js @@ -1,6 +1,6 @@ var searchData= [ - ['atcadevice_20_28atca_5f_29_0',['ATCADevice (atca_)',['../a01441.html',1,'']]], - ['atcaiface_20_28atca_5f_29_1',['ATCAIface (atca_)',['../a01442.html',1,'']]], - ['attributes_20_28pkcs11_5fattrib_5f_29_2',['Attributes (pkcs11_attrib_)',['../a01450.html',1,'']]] + ['atcadevice_20_28atca_5f_29_0',['ATCADevice (atca_)',['../a01468.html',1,'']]], + ['atcaiface_20_28atca_5f_29_1',['ATCAIface (atca_)',['../a01469.html',1,'']]], + ['attributes_20_28pkcs11_5fattrib_5f_29_2',['Attributes (pkcs11_attrib_)',['../a01477.html',1,'']]] ]; diff --git a/search/groups_1.js b/search/groups_1.js index 4cb00288e..2c20a83a8 100644 --- a/search/groups_1.js +++ b/search/groups_1.js @@ -1,5 +1,5 @@ var searchData= [ - ['basic_20crypto_20api_20methods_20_28atcab_5f_29_0',['Basic Crypto API methods (atcab_)',['../a01439.html',1,'']]], - ['basic_20crypto_20api_20methods_20for_20cryptoauth_20devices_20_28calib_5f_29_1',['Basic Crypto API methods for CryptoAuth Devices (calib_)',['../a01444.html',1,'']]] + ['basic_20crypto_20api_20methods_20_28atcab_5f_29_0',['Basic Crypto API methods (atcab_)',['../a01466.html',1,'']]], + ['basic_20crypto_20api_20methods_20for_20cryptoauth_20devices_20_28calib_5f_29_1',['Basic Crypto API methods for CryptoAuth Devices (calib_)',['../a01471.html',1,'']]] ]; diff --git a/search/groups_2.js b/search/groups_2.js index 74cfa2aba..191981902 100644 --- a/search/groups_2.js +++ b/search/groups_2.js @@ -1,5 +1,5 @@ var searchData= [ - ['certificate_20manipulation_20methods_20_28atcacert_5f_29_0',['Certificate manipulation methods (atcacert_)',['../a01443.html',1,'']]], - ['configuration_20_28cfg_5f_29_1',['Configuration (cfg_)',['../a01440.html',1,'']]] + ['certificate_20manipulation_20methods_20_28atcacert_5f_29_0',['Certificate manipulation methods (atcacert_)',['../a01470.html',1,'']]], + ['configuration_20_28cfg_5f_29_1',['Configuration (cfg_)',['../a01467.html',1,'']]] ]; diff --git a/search/groups_3.js b/search/groups_3.js index 66dfe316c..7c49dfc05 100644 --- a/search/groups_3.js +++ b/search/groups_3.js @@ -1,5 +1,5 @@ var searchData= [ - ['hardware_20abstraction_20layer_20_28hal_5f_29_0',['Hardware abstraction layer (hal_)',['../a01446.html',1,'']]], - ['host_20side_20crypto_20methods_20_28atcah_5f_29_1',['Host side crypto methods (atcah_)',['../a01447.html',1,'']]] + ['hardware_20abstraction_20layer_20_28hal_5f_29_0',['Hardware abstraction layer (hal_)',['../a01473.html',1,'']]], + ['host_20side_20crypto_20methods_20_28atcah_5f_29_1',['Host side crypto methods (atcah_)',['../a01474.html',1,'']]] ]; diff --git a/search/groups_4.js b/search/groups_4.js index 3f7456f19..ef857b105 100644 --- a/search/groups_4.js +++ b/search/groups_4.js @@ -1,4 +1,4 @@ var searchData= [ - ['json_20web_20token_20_28jwt_29_20methods_20_28atca_5fjwt_5f_29_0',['JSON Web Token (JWT) methods (atca_jwt_)',['../a01448.html',1,'']]] + ['json_20web_20token_20_28jwt_29_20methods_20_28atca_5fjwt_5f_29_0',['JSON Web Token (JWT) methods (atca_jwt_)',['../a01475.html',1,'']]] ]; diff --git a/search/groups_5.js b/search/groups_5.js index 415955d60..eae774b84 100644 --- a/search/groups_5.js +++ b/search/groups_5.js @@ -1,4 +1,4 @@ var searchData= [ - ['mbedtls_20wrapper_20methods_20_28atca_5fmbedtls_5f_29_0',['mbedTLS Wrapper methods (atca_mbedtls_)',['../a01449.html',1,'']]] + ['mbedtls_20wrapper_20methods_20_28atca_5fmbedtls_5f_29_0',['mbedTLS Wrapper methods (atca_mbedtls_)',['../a01476.html',1,'']]] ]; diff --git a/search/groups_6.js b/search/groups_6.js index acc06efc0..1ae8af431 100644 --- a/search/groups_6.js +++ b/search/groups_6.js @@ -1,4 +1,4 @@ var searchData= [ - ['software_20crypto_20methods_20_28atcac_5f_29_0',['Software crypto methods (atcac_)',['../a01445.html',1,'']]] + ['software_20crypto_20methods_20_28atcac_5f_29_0',['Software crypto methods (atcac_)',['../a01472.html',1,'']]] ]; diff --git a/search/groups_7.js b/search/groups_7.js index 20f4debdf..4bb73df52 100644 --- a/search/groups_7.js +++ b/search/groups_7.js @@ -1,4 +1,4 @@ var searchData= [ - ['tng_20api_20_28tng_5f_29_0',['TNG API (tng_)',['../a01438.html',1,'']]] + ['tng_20api_20_28tng_5f_29_0',['TNG API (tng_)',['../a01465.html',1,'']]] ]; diff --git a/search/namespaces_0.js b/search/namespaces_0.js index 315bd2ae0..7873a83d8 100644 --- a/search/namespaces_0.js +++ b/search/namespaces_0.js @@ -1,15 +1,15 @@ var searchData= [ - ['atcab_0',['atcab',['../a01452.html',1,'cryptoauthlib']]], - ['atcacert_1',['atcacert',['../a01453.html',1,'cryptoauthlib']]], - ['atcaenum_2',['atcaenum',['../a01454.html',1,'cryptoauthlib']]], - ['atjwt_3',['atjwt',['../a01455.html',1,'cryptoauthlib']]], - ['cryptoauthlib_4',['cryptoauthlib',['../a01451.html',1,'']]], - ['device_5',['device',['../a01456.html',1,'cryptoauthlib']]], - ['exceptions_6',['exceptions',['../a01457.html',1,'cryptoauthlib']]], - ['iface_7',['iface',['../a01458.html',1,'cryptoauthlib']]], - ['library_8',['library',['../a01459.html',1,'cryptoauthlib']]], - ['sha206_5fapi_9',['sha206_api',['../a01460.html',1,'cryptoauthlib']]], - ['status_10',['status',['../a01461.html',1,'cryptoauthlib']]], - ['tng_11',['tng',['../a01462.html',1,'cryptoauthlib']]] + ['atcab_0',['atcab',['../a01479.html',1,'cryptoauthlib']]], + ['atcacert_1',['atcacert',['../a01480.html',1,'cryptoauthlib']]], + ['atcaenum_2',['atcaenum',['../a01481.html',1,'cryptoauthlib']]], + ['atjwt_3',['atjwt',['../a01482.html',1,'cryptoauthlib']]], + ['cryptoauthlib_4',['cryptoauthlib',['../a01478.html',1,'']]], + ['device_5',['device',['../a01483.html',1,'cryptoauthlib']]], + ['exceptions_6',['exceptions',['../a01484.html',1,'cryptoauthlib']]], + ['iface_7',['iface',['../a01485.html',1,'cryptoauthlib']]], + ['library_8',['library',['../a01486.html',1,'cryptoauthlib']]], + ['sha206_5fapi_9',['sha206_api',['../a01487.html',1,'cryptoauthlib']]], + ['status_10',['status',['../a01488.html',1,'cryptoauthlib']]], + ['tng_11',['tng',['../a01489.html',1,'cryptoauthlib']]] ]; diff --git a/search/namespaces_1.js b/search/namespaces_1.js index 3d41bac14..f6ee3d75d 100644 --- a/search/namespaces_1.js +++ b/search/namespaces_1.js @@ -1,5 +1,5 @@ var searchData= [ - ['test_5fdevice_0',['test_device',['../a01468.html',1,'']]], - ['test_5fiface_1',['test_iface',['../a01469.html',1,'']]] + ['test_5fdevice_0',['test_device',['../a01495.html',1,'']]], + ['test_5fiface_1',['test_iface',['../a01496.html',1,'']]] ]; diff --git a/search/pages_0.js b/search/pages_0.js index 13e73215c..64265c713 100644 --- a/search/pages_0.js +++ b/search/pages_0.js @@ -1,4 +1,5 @@ var searchData= [ - ['application_20support_0',['Application Support',['../a02828.html',1,'']]] + ['application_20support_0',['Application Support',['../a02863.html',1,'']]], + ['atcab_1',['atcab',['../a02872.html',1,'']]] ]; diff --git a/search/pages_1.js b/search/pages_1.js index 743234306..57b43c4e2 100644 --- a/search/pages_1.js +++ b/search/pages_1.js @@ -1,7 +1,7 @@ var searchData= [ - ['calib_20directory_20_2d_20purpose_0',['calib directory - Purpose',['../a01444.html',1,'']]], - ['contribution_20guidelines_1',['Contribution Guidelines',['../a02831.html',1,'']]], - ['crypto_20directory_20_2d_20purpose_2',['crypto directory - Purpose',['../a01445.html',1,'']]], + ['calib_20directory_20_2d_20purpose_0',['calib directory - Purpose',['../a01471.html',1,'']]], + ['contribution_20guidelines_1',['Contribution Guidelines',['../a02866.html',1,'']]], + ['crypto_20directory_20_2d_20purpose_2',['crypto directory - Purpose',['../a01472.html',1,'']]], ['cryptoauthlib_20_2d_20microchip_20cryptoauthentication_20library_3',['CryptoAuthLib - Microchip CryptoAuthentication Library',['../index.html',1,'']]] ]; diff --git a/search/pages_2.js b/search/pages_2.js index 4eca05eee..508fb613a 100644 --- a/search/pages_2.js +++ b/search/pages_2.js @@ -1,4 +1,4 @@ var searchData= [ - ['deprecated_20list_0',['Deprecated List',['../a01436.html',1,'']]] + ['deprecated_20list_0',['Deprecated List',['../a01463.html',1,'']]] ]; diff --git a/search/pages_3.js b/search/pages_3.js index 42d20293a..fe49b4da5 100644 --- a/search/pages_3.js +++ b/search/pages_3.js @@ -1,4 +1,4 @@ var searchData= [ - ['hal_20directory_20_2d_20purpose_0',['HAL Directory - Purpose',['../a01446.html',1,'']]] + ['hal_20directory_20_2d_20purpose_0',['HAL Directory - Purpose',['../a01473.html',1,'']]] ]; diff --git a/search/pages_4.js b/search/pages_4.js index 836c4947c..7cc8041f5 100644 --- a/search/pages_4.js +++ b/search/pages_4.js @@ -1,4 +1,4 @@ var searchData= [ - ['ip_20protection_20with_20symmetric_20authentication_0',['IP Protection with Symmetric Authentication',['../a02826.html',1,'']]] + ['ip_20protection_20with_20symmetric_20authentication_0',['IP Protection with Symmetric Authentication',['../a02861.html',1,'']]] ]; diff --git a/search/pages_5.js b/search/pages_5.js index 6f74dad09..e6d60f9de 100644 --- a/search/pages_5.js +++ b/search/pages_5.js @@ -1,4 +1,4 @@ var searchData= [ - ['license_0',['License',['../a02825.html',1,'']]] + ['license_0',['License',['../a02860.html',1,'']]] ]; diff --git a/search/pages_6.js b/search/pages_6.js index e459c2c18..683fb762f 100644 --- a/search/pages_6.js +++ b/search/pages_6.js @@ -1,5 +1,5 @@ var searchData= [ - ['mbedtls_20directory_20_2d_20purpose_0',['mbedtls directory - Purpose',['../a01449.html',1,'']]], - ['microchip_20cryptoauthlib_20release_20notes_1',['Microchip Cryptoauthlib Release Notes',['../a02839.html',1,'']]] + ['mbedtls_20directory_20_2d_20purpose_0',['mbedtls directory - Purpose',['../a01476.html',1,'']]], + ['microchip_20cryptoauthlib_20release_20notes_1',['Microchip Cryptoauthlib Release Notes',['../a02875.html',1,'']]] ]; diff --git a/search/pages_7.js b/search/pages_7.js index 6724f1211..72c2e8bf7 100644 --- a/search/pages_7.js +++ b/search/pages_7.js @@ -1,4 +1,4 @@ var searchData= [ - ['openssl_20directory_20_2d_20purpose_0',['openssl directory - Purpose',['../a02836.html',1,'']]] + ['openssl_20directory_20_2d_20purpose_0',['openssl directory - Purpose',['../a02871.html',1,'']]] ]; diff --git a/search/pages_8.js b/search/pages_8.js index 6c51264e5..7ab1a0905 100644 --- a/search/pages_8.js +++ b/search/pages_8.js @@ -1,6 +1,6 @@ var searchData= [ - ['pkcs11_20application_20information_0',['PKCS11 Application Information',['../a02827.html',1,'']]], - ['python_20cryptoauthlib_20module_1',['Python CryptoAuthLib module',['../a02837.html',1,'']]], - ['python_20cryptoauthlib_20module_20testing_2',['Python CryptoAuthLib Module Testing',['../a02838.html',1,'']]] + ['pkcs11_20application_20information_0',['PKCS11 Application Information',['../a02862.html',1,'']]], + ['python_20cryptoauthlib_20module_1',['Python CryptoAuthLib module',['../a02873.html',1,'']]], + ['python_20cryptoauthlib_20module_20testing_2',['Python CryptoAuthLib Module Testing',['../a02874.html',1,'']]] ]; diff --git a/search/pages_9.js b/search/pages_9.js index 2c0ae140d..88f293dbf 100644 --- a/search/pages_9.js +++ b/search/pages_9.js @@ -1,5 +1,5 @@ var searchData= [ - ['secure_20boot_20using_20atecc608_0',['Secure boot using ATECC608',['../a02829.html',1,'']]], - ['security_20policy_1',['Security Policy',['../a02840.html',1,'']]] + ['secure_20boot_20using_20atecc608_0',['Secure boot using ATECC608',['../a02864.html',1,'']]], + ['security_20policy_1',['Security Policy',['../a02876.html',1,'']]] ]; diff --git a/search/pages_a.js b/search/pages_a.js index 79f195b2a..6bea953f7 100644 --- a/search/pages_a.js +++ b/search/pages_a.js @@ -1,4 +1,4 @@ var searchData= [ - ['tng_20functions_0',['TNG Functions',['../a01438.html',1,'']]] + ['tng_20functions_0',['TNG Functions',['../a01465.html',1,'']]] ]; diff --git a/search/typedefs_0.js b/search/typedefs_0.js index 4551c70d8..83409c342 100644 --- a/search/typedefs_0.js +++ b/search/typedefs_0.js @@ -1,29 +1,29 @@ var searchData= [ - ['atca_5fcheck_5fmac_5fin_5fout_5ft_0',['atca_check_mac_in_out_t',['../a01447.html#ga62321bafeb0a9dd7c4ce657ece10109f',1,'atca_host.h']]], - ['atca_5fdelete_5fin_5fout_5ft_1',['atca_delete_in_out_t',['../a01447.html#ga4ea861d041b787c766e9a19a0f11421c',1,'atca_host.h']]], - ['atca_5fdiversified_5fkey_5fin_5fout_5ft_2',['atca_diversified_key_in_out_t',['../a01447.html#gae9784404fbe619217879d5d12261c2b8',1,'atca_host.h']]], - ['atca_5fgen_5fdig_5fin_5fout_5ft_3',['atca_gen_dig_in_out_t',['../a01447.html#ga572abeaaabf22c386ebcba19b4f6236c',1,'atca_host.h']]], - ['atca_5fgen_5fkey_5fin_5fout_5ft_4',['atca_gen_key_in_out_t',['../a01447.html#gada8cf14261301ec18458cbcbbe3d9b32',1,'atca_host.h']]], - ['atca_5fiface_5ft_5',['atca_iface_t',['../a01442.html#gaa9323be08c4d757019e9863d9a7fb6b1',1,'atca_iface.h']]], - ['atca_5fmbedtls_5feckey_5ft_6',['atca_mbedtls_eckey_t',['../a01449.html#ga36d21431afe595eab1b7f7a2330ad727',1,'atca_mbedtls_wrap.h']]], - ['atca_5fresp_5fmac_5fin_5fout_5ft_7',['atca_resp_mac_in_out_t',['../a01447.html#gad2bbb95a1e12c8167ce68884dcf77a4e',1,'atca_host.h']]], - ['atca_5fsession_5fkey_5fin_5fout_5ft_8',['atca_session_key_in_out_t',['../a01447.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e',1,'atca_host.h']]], - ['atca_5fsign_5finternal_5fin_5fout_5ft_9',['atca_sign_internal_in_out_t',['../a01447.html#ga1fdcaf886974acc1fcdfc3bace49b700',1,'atca_host.h']]], - ['atca_5ftemp_5fkey_5ft_10',['atca_temp_key_t',['../a01447.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe',1,'atca_host.h']]], - ['atca_5fwrite_5fmac_5fin_5fout_5ft_11',['atca_write_mac_in_out_t',['../a01447.html#gac077314e00956519884e609b44b9cbce',1,'atca_host.h']]], - ['atcacert_5fbuild_5fstate_5ft_12',['atcacert_build_state_t',['../a01443.html#ga199c030847111ed09a682ca61b7597a9',1,'atcacert_def.h']]], - ['atcacert_5fcert_5felement_5ft_13',['atcacert_cert_element_t',['../a01443.html#ga28ae8005ca4b109958b090d2079d190b',1,'atcacert_def.h']]], - ['atcacert_5fcert_5floc_5ft_14',['atcacert_cert_loc_t',['../a01443.html#gad473c89ee9a934029ff87e86fc1c570d',1,'atcacert_def.h']]], - ['atcacert_5fcert_5fsn_5fsrc_5ft_15',['atcacert_cert_sn_src_t',['../a01443.html#ga3bddddfbb916fe1dd1e935e454d3265b',1,'atcacert_def.h']]], - ['atcacert_5fcert_5ftype_5ft_16',['atcacert_cert_type_t',['../a01443.html#gae63503395992a60853867e3865f75be0',1,'atcacert_def.h']]], - ['atcacert_5fdef_5ft_17',['atcacert_def_t',['../a01443.html#ga01be962d7321095d15547113d727c97d',1,'atcacert_def.h']]], - ['atcacert_5fdevice_5floc_5ft_18',['atcacert_device_loc_t',['../a01443.html#ga5973a9cc26357822a232433f57741777',1,'atcacert_def.h']]], - ['atcacert_5fdevice_5fzone_5ft_19',['atcacert_device_zone_t',['../a01443.html#ga63df515d393c9ebb6979d53208263458',1,'atcacert_def.h']]], - ['atcacert_5fstd_5fcert_5felement_5ft_20',['atcacert_std_cert_element_t',['../a01443.html#ga70deb837a72574263e6fb0721d8e0616',1,'atcacert_def.h']]], - ['atcacert_5ftm_5futc_5ft_21',['atcacert_tm_utc_t',['../a01443.html#ga4a59e158244def2c79227aa244bd59c2',1,'atcacert_date.h']]], - ['atcacert_5ftransform_5ft_22',['atcacert_transform_t',['../a01443.html#ga249c2793a533c5487b5b7b935683a78f',1,'atcacert_def.h']]], - ['atcai2cmaster_5ft_23',['ATCAI2CMaster_t',['../a01446.html#ga06b19a932aea9cf3a5165fefacb24f7b',1,'hal_uc3_i2c_asf.h']]], - ['atcaswimaster_5ft_24',['ATCASWIMaster_t',['../a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_samd21_asf.h'],['../a01446.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_start.h']]], - ['attrib_5ff_25',['attrib_f',['../a00677.html#ac11a80ac0cea6f244191654180db0693',1,'pkcs11_attrib.h']]] + ['atca_5fcheck_5fmac_5fin_5fout_5ft_0',['atca_check_mac_in_out_t',['../a01474.html#ga62321bafeb0a9dd7c4ce657ece10109f',1,'atca_host.h']]], + ['atca_5fdelete_5fin_5fout_5ft_1',['atca_delete_in_out_t',['../a01474.html#ga4ea861d041b787c766e9a19a0f11421c',1,'atca_host.h']]], + ['atca_5fdiversified_5fkey_5fin_5fout_5ft_2',['atca_diversified_key_in_out_t',['../a01474.html#gae9784404fbe619217879d5d12261c2b8',1,'atca_host.h']]], + ['atca_5fgen_5fdig_5fin_5fout_5ft_3',['atca_gen_dig_in_out_t',['../a01474.html#ga572abeaaabf22c386ebcba19b4f6236c',1,'atca_host.h']]], + ['atca_5fgen_5fkey_5fin_5fout_5ft_4',['atca_gen_key_in_out_t',['../a01474.html#gada8cf14261301ec18458cbcbbe3d9b32',1,'atca_host.h']]], + ['atca_5fiface_5ft_5',['atca_iface_t',['../a01469.html#gaa9323be08c4d757019e9863d9a7fb6b1',1,'atca_iface.h']]], + ['atca_5fmbedtls_5feckey_5ft_6',['atca_mbedtls_eckey_t',['../a01476.html#ga36d21431afe595eab1b7f7a2330ad727',1,'atca_mbedtls_wrap.h']]], + ['atca_5fresp_5fmac_5fin_5fout_5ft_7',['atca_resp_mac_in_out_t',['../a01474.html#gad2bbb95a1e12c8167ce68884dcf77a4e',1,'atca_host.h']]], + ['atca_5fsession_5fkey_5fin_5fout_5ft_8',['atca_session_key_in_out_t',['../a01474.html#gab6d36ecdb6ea5e3c4024e2d10e82cd6e',1,'atca_host.h']]], + ['atca_5fsign_5finternal_5fin_5fout_5ft_9',['atca_sign_internal_in_out_t',['../a01474.html#ga1fdcaf886974acc1fcdfc3bace49b700',1,'atca_host.h']]], + ['atca_5ftemp_5fkey_5ft_10',['atca_temp_key_t',['../a01474.html#ga2eb5b7f0471f9f14bd78c63104fb4cfe',1,'atca_host.h']]], + ['atca_5fwrite_5fmac_5fin_5fout_5ft_11',['atca_write_mac_in_out_t',['../a01474.html#gac077314e00956519884e609b44b9cbce',1,'atca_host.h']]], + ['atcacert_5fbuild_5fstate_5ft_12',['atcacert_build_state_t',['../a01470.html#ga199c030847111ed09a682ca61b7597a9',1,'atcacert_def.h']]], + ['atcacert_5fcert_5felement_5ft_13',['atcacert_cert_element_t',['../a01470.html#ga28ae8005ca4b109958b090d2079d190b',1,'atcacert_def.h']]], + ['atcacert_5fcert_5floc_5ft_14',['atcacert_cert_loc_t',['../a01470.html#gad473c89ee9a934029ff87e86fc1c570d',1,'atcacert_def.h']]], + ['atcacert_5fcert_5fsn_5fsrc_5ft_15',['atcacert_cert_sn_src_t',['../a01470.html#ga3bddddfbb916fe1dd1e935e454d3265b',1,'atcacert_def.h']]], + ['atcacert_5fcert_5ftype_5ft_16',['atcacert_cert_type_t',['../a01470.html#gae63503395992a60853867e3865f75be0',1,'atcacert_def.h']]], + ['atcacert_5fdef_5ft_17',['atcacert_def_t',['../a01470.html#ga01be962d7321095d15547113d727c97d',1,'atcacert_def.h']]], + ['atcacert_5fdevice_5floc_5ft_18',['atcacert_device_loc_t',['../a01470.html#ga5973a9cc26357822a232433f57741777',1,'atcacert_def.h']]], + ['atcacert_5fdevice_5fzone_5ft_19',['atcacert_device_zone_t',['../a01470.html#ga63df515d393c9ebb6979d53208263458',1,'atcacert_def.h']]], + ['atcacert_5fstd_5fcert_5felement_5ft_20',['atcacert_std_cert_element_t',['../a01470.html#ga70deb837a72574263e6fb0721d8e0616',1,'atcacert_def.h']]], + ['atcacert_5ftm_5futc_5ft_21',['atcacert_tm_utc_t',['../a01470.html#ga4a59e158244def2c79227aa244bd59c2',1,'atcacert_date.h']]], + ['atcacert_5ftransform_5ft_22',['atcacert_transform_t',['../a01470.html#ga249c2793a533c5487b5b7b935683a78f',1,'atcacert_def.h']]], + ['atcai2cmaster_5ft_23',['ATCAI2CMaster_t',['../a01473.html#ga06b19a932aea9cf3a5165fefacb24f7b',1,'hal_uc3_i2c_asf.h']]], + ['atcaswimaster_5ft_24',['ATCASWIMaster_t',['../a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_samd21_asf.h'],['../a01473.html#ga626ead73d3ae1cc2ed09d5fa509f80ff',1,'ATCASWIMaster_t(): swi_uart_start.h']]], + ['attrib_5ff_25',['attrib_f',['../a00692.html#ac11a80ac0cea6f244191654180db0693',1,'pkcs11_attrib.h']]] ]; diff --git a/search/typedefs_1.js b/search/typedefs_1.js index 4e24fd820..da684cac6 100644 --- a/search/typedefs_1.js +++ b/search/typedefs_1.js @@ -1,4 +1,4 @@ var searchData= [ - ['ctx_5fcb_0',['ctx_cb',['../a01441.html#gada27ffa70c78964d3b38abd11c5f4f22',1,'atca_device.h']]] + ['ctx_5fcb_0',['ctx_cb',['../a01468.html#gada27ffa70c78964d3b38abd11c5f4f22',1,'atca_device.h']]] ]; diff --git a/search/typedefs_2.js b/search/typedefs_2.js index 73a1e8635..58e0dd6be 100644 --- a/search/typedefs_2.js +++ b/search/typedefs_2.js @@ -1,4 +1,4 @@ var searchData= [ - ['hal_5fmutex_5ft_0',['hal_mutex_t',['../a01446.html#ga73601b3bcebddd5e814e47b9a9c5f2a6',1,'atca_hal.h']]] + ['hal_5fmutex_5ft_0',['hal_mutex_t',['../a01473.html#ga73601b3bcebddd5e814e47b9a9c5f2a6',1,'atca_hal.h']]] ]; diff --git a/search/typedefs_4.js b/search/typedefs_4.js index ea7bfd331..88e542dab 100644 --- a/search/typedefs_4.js +++ b/search/typedefs_4.js @@ -1,6 +1,6 @@ var searchData= [ - ['pkcs11_5flib_5fctx_0',['pkcs11_lib_ctx',['../a00722.html#a829124de0deebf29734cd6390a232292',1,'pkcs11_init.h']]], - ['pkcs11_5fsession_5fctx_1',['pkcs11_session_ctx',['../a00755.html#a9d8980ea83d2e8eb2a9f45210ba5c54d',1,'pkcs11_session.h']]], - ['pkcs11_5fslot_5fctx_2',['pkcs11_slot_ctx',['../a00767.html#a1813685567d78b9f762d2f1eec531616',1,'pkcs11_slot.h']]] + ['pkcs11_5flib_5fctx_0',['pkcs11_lib_ctx',['../a00737.html#a829124de0deebf29734cd6390a232292',1,'pkcs11_init.h']]], + ['pkcs11_5fsession_5fctx_1',['pkcs11_session_ctx',['../a00770.html#a9d8980ea83d2e8eb2a9f45210ba5c54d',1,'pkcs11_session.h']]], + ['pkcs11_5fslot_5fctx_2',['pkcs11_slot_ctx',['../a00782.html#a1813685567d78b9f762d2f1eec531616',1,'pkcs11_slot.h']]] ]; diff --git a/search/variables_0.js b/search/variables_0.js index e1066356c..62b370b13 100644 --- a/search/variables_0.js +++ b/search/variables_0.js @@ -1,6 +1,6 @@ var searchData= [ - ['address_0',['address',['../a01516.html#a553439e2acc31fe3587a4c883e134b66',1,'ATCAIfaceCfg::address()'],['../a00257.html#af3f726014b044194def151079f1f2d89',1,'address(): atca_iface.h']]], - ['attributes_1',['attributes',['../a01852.html#afbc894d3ed866954b79e43b30031f293',1,'pkcs11_object_s']]], - ['auth_5fmac_2',['auth_mac',['../a01736.html#aaa57ce590925c0efe017af1d4457d479',1,'atca_write_mac_in_out']]] + ['address_0',['address',['../a01539.html#a553439e2acc31fe3587a4c883e134b66',1,'ATCAIfaceCfg::address()'],['../a00263.html#af3f726014b044194def151079f1f2d89',1,'address(): atca_iface.h']]], + ['attributes_1',['attributes',['../a01887.html#afbc894d3ed866954b79e43b30031f293',1,'pkcs11_object_s']]], + ['auth_5fmac_2',['auth_mac',['../a01755.html#aaa57ce590925c0efe017af1d4457d479',1,'atca_write_mac_in_out']]] ]; diff --git a/search/variables_1.js b/search/variables_1.js index 84d46d20d..ff6a106f8 100644 --- a/search/variables_1.js +++ b/search/variables_1.js @@ -1,6 +1,6 @@ var searchData= [ - ['block_0',['block',['../a01616.html#a6d3f030387c74b86ec476d0c99a46c34',1,'atca_sha256_ctx::block()'],['../a01644.html#a09eac5418660881153169a7eb850dee0',1,'sw_sha256_ctx::block()']]], - ['block_5fsize_1',['block_size',['../a01616.html#ae7cf177799e4c934821f6540aa5a33e5',1,'atca_sha256_ctx::block_size()'],['../a01644.html#ae49db58199cf54a15c307cb01b738c09',1,'sw_sha256_ctx::block_size()']]], - ['buf_2',['buf',['../a01612.html#a56ecba8dd00dd0bed1056152f4e9f9dc',1,'cal_buffer_s']]] + ['block_0',['block',['../a01639.html#a6d3f030387c74b86ec476d0c99a46c34',1,'atca_sha256_ctx']]], + ['block_5fsize_1',['block_size',['../a01639.html#ae7cf177799e4c934821f6540aa5a33e5',1,'atca_sha256_ctx']]], + ['buf_2',['buf',['../a01635.html#a56ecba8dd00dd0bed1056152f4e9f9dc',1,'cal_buffer_s']]] ]; diff --git a/search/variables_10.js b/search/variables_10.js index ff18bd01b..ed286d451 100644 --- a/search/variables_10.js +++ b/search/variables_10.js @@ -1,16 +1,16 @@ var searchData= [ - ['secure_5fboot_5fconfig_0',['secure_boot_config',['../a01716.html#a28771c8ed4754eabcb50649d753ee956',1,'atca_secureboot_mac_in_out']]], - ['send_1',['send',['../a01652.html#a36eca94789cf465a9cb13e9a1ad92121',1,'atca_hal_kit_phy_t']]], - ['signature_2',['signature',['../a01708.html#ad94d1c8d1635e597bd70823a207dc727',1,'atca_verify_mac::signature()'],['../a01716.html#acafb471d7cc7a71d613503760930d9f5',1,'atca_secureboot_mac_in_out::signature()'],['../a01447.html#gad2e0f0dbb511520e5d79bdb4ab649c22',1,'atca_verify_in_out::signature()']]], - ['slot_3',['slot',['../a01592.html#ac393a690cd7891565dc679e6ffa4b021',1,'atcacert_device_loc_s']]], - ['slot_5fcnt_4',['slot_cnt',['../a01840.html#a9054ff97888d7fc21d1006b94808c6d9',1,'pkcs11_lib_ctx_s']]], - ['slot_5fconf_5',['slot_conf',['../a01728.html#a2d5854b66b7bc7246fa718a5d485d3fb',1,'atca_gen_dig_in_out']]], - ['slot_5fconfig_6',['slot_config',['../a01768.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154',1,'atca_sign_internal_in_out']]], - ['slot_5fkey_7',['slot_key',['../a01752.html#aad7093cf772d6e337b3c09af9cea92ac',1,'atca_check_mac_in_out']]], - ['slot_5flocked_8',['slot_locked',['../a01728.html#a787c86043a8c305bd23256248614a3f7',1,'atca_gen_dig_in_out']]], - ['slots_9',['slots',['../a01840.html#aa1679efb012be2954b3eaf1881128f8f',1,'pkcs11_lib_ctx_s']]], - ['sn_10',['sn',['../a01768.html#a374985826f0c1b5c6aa52370f9871841',1,'atca_sign_internal_in_out::sn()'],['../a01708.html#a5e63ccd727b87d022ed0eedc0446410f',1,'atca_verify_mac::sn()'],['../a01764.html#a17c83c0e810b2bf35b364f026e1cecb0',1,'atca_gen_key_in_out::sn()'],['../a01752.html#a26f951076270f2389044a69b30c86d74',1,'atca_check_mac_in_out::sn()'],['../a01744.html#aeb90e80a488f568c4a193c1fe851c5d4',1,'atca_derive_key_mac_in_out::sn()'],['../a01740.html#a0e321ea27e36c985abacf4510619c9f0',1,'atca_derive_key_in_out::sn()'],['../a01736.html#a2c43368d48a41123da5f69356b6f29f5',1,'atca_write_mac_in_out::sn()'],['../a01732.html#ab2ca3ae12be534d58e22bb68d6042ea3',1,'atca_diversified_key_in_out::sn()'],['../a01728.html#ad8ca9262cbe607d0c017e12285c3d951',1,'atca_gen_dig_in_out::sn()'],['../a01447.html#gaf0d7fe9a16cad1ba38c7daca4295823b',1,'atca_hmac_in_out::sn()'],['../a01447.html#gaba323f1307689412ea6cc1e54810edb9',1,'atca_mac_in_out::sn()'],['../a01447.html#ga46b121ddb13c417e4d65a3fc2f6c365b',1,'atca_include_data_in_out::sn()']]], - ['source_5fflag_11',['source_flag',['../a01692.html#abd69b6707bf73ae91675a6a0a250ca40',1,'atca_temp_key']]], - ['stored_5fvalue_12',['stored_value',['../a01728.html#a4f63b5946df323ef66910d4a0cdf2491',1,'atca_gen_dig_in_out']]] + ['secure_5fboot_5fconfig_0',['secure_boot_config',['../a01735.html#a28771c8ed4754eabcb50649d753ee956',1,'atca_secureboot_mac_in_out']]], + ['send_1',['send',['../a01671.html#a36eca94789cf465a9cb13e9a1ad92121',1,'atca_hal_kit_phy_t']]], + ['signature_2',['signature',['../a01727.html#ad94d1c8d1635e597bd70823a207dc727',1,'atca_verify_mac::signature()'],['../a01735.html#acafb471d7cc7a71d613503760930d9f5',1,'atca_secureboot_mac_in_out::signature()'],['../a01474.html#gad2e0f0dbb511520e5d79bdb4ab649c22',1,'atca_verify_in_out::signature()']]], + ['slot_3',['slot',['../a01615.html#ac393a690cd7891565dc679e6ffa4b021',1,'atcacert_device_loc_s']]], + ['slot_5fcnt_4',['slot_cnt',['../a01867.html#a9054ff97888d7fc21d1006b94808c6d9',1,'pkcs11_lib_ctx_s']]], + ['slot_5fconf_5',['slot_conf',['../a01747.html#a2d5854b66b7bc7246fa718a5d485d3fb',1,'atca_gen_dig_in_out']]], + ['slot_5fconfig_6',['slot_config',['../a01787.html#a2d4bcfad9f46cf09e3fc2e2d5e67c154',1,'atca_sign_internal_in_out']]], + ['slot_5fkey_7',['slot_key',['../a01771.html#aad7093cf772d6e337b3c09af9cea92ac',1,'atca_check_mac_in_out']]], + ['slot_5flocked_8',['slot_locked',['../a01747.html#a787c86043a8c305bd23256248614a3f7',1,'atca_gen_dig_in_out']]], + ['slots_9',['slots',['../a01867.html#aa1679efb012be2954b3eaf1881128f8f',1,'pkcs11_lib_ctx_s']]], + ['sn_10',['sn',['../a01787.html#a374985826f0c1b5c6aa52370f9871841',1,'atca_sign_internal_in_out::sn()'],['../a01727.html#a5e63ccd727b87d022ed0eedc0446410f',1,'atca_verify_mac::sn()'],['../a01783.html#a17c83c0e810b2bf35b364f026e1cecb0',1,'atca_gen_key_in_out::sn()'],['../a01771.html#a26f951076270f2389044a69b30c86d74',1,'atca_check_mac_in_out::sn()'],['../a01763.html#aeb90e80a488f568c4a193c1fe851c5d4',1,'atca_derive_key_mac_in_out::sn()'],['../a01759.html#a0e321ea27e36c985abacf4510619c9f0',1,'atca_derive_key_in_out::sn()'],['../a01755.html#a2c43368d48a41123da5f69356b6f29f5',1,'atca_write_mac_in_out::sn()'],['../a01751.html#ab2ca3ae12be534d58e22bb68d6042ea3',1,'atca_diversified_key_in_out::sn()'],['../a01747.html#ad8ca9262cbe607d0c017e12285c3d951',1,'atca_gen_dig_in_out::sn()'],['../a01474.html#gaf0d7fe9a16cad1ba38c7daca4295823b',1,'atca_hmac_in_out::sn()'],['../a01474.html#gaba323f1307689412ea6cc1e54810edb9',1,'atca_mac_in_out::sn()'],['../a01474.html#ga46b121ddb13c417e4d65a3fc2f6c365b',1,'atca_include_data_in_out::sn()']]], + ['source_5fflag_11',['source_flag',['../a01711.html#abd69b6707bf73ae91675a6a0a250ca40',1,'atca_temp_key']]], + ['stored_5fvalue_12',['stored_value',['../a01747.html#a4f63b5946df323ef66910d4a0cdf2491',1,'atca_gen_dig_in_out']]] ]; diff --git a/search/variables_11.js b/search/variables_11.js index 6429033fe..5dbd793d1 100644 --- a/search/variables_11.js +++ b/search/variables_11.js @@ -1,9 +1,9 @@ var searchData= [ - ['target_5fkey_0',['target_key',['../a01752.html#ae00a5116b4b55fb2bc6546ca3156522e',1,'atca_check_mac_in_out::target_key()'],['../a01740.html#aa2c05475b504237c0ae9db5d48cbb0fc',1,'atca_derive_key_in_out::target_key()']]], - ['target_5fkey_5fid_1',['target_key_id',['../a01740.html#a5b623ae9fa4501c996e4c54842eaa548',1,'atca_derive_key_in_out::target_key_id()'],['../a01744.html#ad2a2e2e1126d1c022be6a84af7f5e4e3',1,'atca_derive_key_mac_in_out::target_key_id()']]], - ['temp_5fkey_2',['temp_key',['../a01736.html#a8786d124038d3516d98f2456f19985cf',1,'atca_write_mac_in_out::temp_key()'],['../a01768.html#af8c982fdcb8edc1ff6b1e838fab281ac',1,'atca_sign_internal_in_out::temp_key()'],['../a01764.html#afa11fd0401f2d8884d385ffc77962ec3',1,'atca_gen_key_in_out::temp_key()'],['../a01447.html#ga4409850783c991d3b429ee78e67c9813',1,'atca_verify_in_out::temp_key()'],['../a01752.html#a605e9f150203a43a550e68e940233245',1,'atca_check_mac_in_out::temp_key()'],['../a01447.html#ga8305d0f433345a973f638dfea229a274',1,'atca_decrypt_in_out::temp_key()'],['../a01740.html#a1a4a8993461b0675edcb2d162ec8823b',1,'atca_derive_key_in_out::temp_key()'],['../a01732.html#a8406e4a6d09e2f6b8e3bfc12579d8653',1,'atca_diversified_key_in_out::temp_key()'],['../a01728.html#aa62f8da7dae46c095c603433ae26fedf',1,'atca_gen_dig_in_out::temp_key()'],['../a01447.html#ga7507880718dc536d6122f0401073b8c8',1,'atca_hmac_in_out::temp_key()'],['../a01447.html#ga7bf1d912d79b62cc598395642d77365f',1,'atca_mac_in_out::temp_key()'],['../a01712.html#ac57e99b5d0069d7bd733bcf056cc56e1',1,'atca_secureboot_enc_in_out::temp_key()'],['../a01708.html#ac9231df54b2f77c5061bdfbcea927a5e',1,'atca_verify_mac::temp_key()'],['../a01447.html#gaf89317aa1f759fc58f67158abd314d1b',1,'atca_nonce_in_out::temp_key()']]], - ['total_5fmsg_5fsize_3',['total_msg_size',['../a01616.html#aab3e376d6c18921a1ee303e2b703c668',1,'atca_sha256_ctx::total_msg_size()'],['../a01644.html#abda48eb7b450d079b3c04ba51d824334',1,'sw_sha256_ctx::total_msg_size()']]], - ['transforms_4',['transforms',['../a01600.html#a1e4d5bbf62b7cbe49b6d222d6e124833',1,'atcacert_cert_element_s']]], - ['type_5',['type',['../a01604.html#aeb847b88caadd6fad351f4d239edea42',1,'atcacert_def_s']]] + ['target_5fkey_0',['target_key',['../a01771.html#ae00a5116b4b55fb2bc6546ca3156522e',1,'atca_check_mac_in_out::target_key()'],['../a01759.html#aa2c05475b504237c0ae9db5d48cbb0fc',1,'atca_derive_key_in_out::target_key()']]], + ['target_5fkey_5fid_1',['target_key_id',['../a01759.html#a5b623ae9fa4501c996e4c54842eaa548',1,'atca_derive_key_in_out::target_key_id()'],['../a01763.html#ad2a2e2e1126d1c022be6a84af7f5e4e3',1,'atca_derive_key_mac_in_out::target_key_id()']]], + ['temp_5fkey_2',['temp_key',['../a01751.html#a8406e4a6d09e2f6b8e3bfc12579d8653',1,'atca_diversified_key_in_out::temp_key()'],['../a01787.html#af8c982fdcb8edc1ff6b1e838fab281ac',1,'atca_sign_internal_in_out::temp_key()'],['../a01783.html#afa11fd0401f2d8884d385ffc77962ec3',1,'atca_gen_key_in_out::temp_key()'],['../a01474.html#ga4409850783c991d3b429ee78e67c9813',1,'atca_verify_in_out::temp_key()'],['../a01771.html#a605e9f150203a43a550e68e940233245',1,'atca_check_mac_in_out::temp_key()'],['../a01474.html#ga8305d0f433345a973f638dfea229a274',1,'atca_decrypt_in_out::temp_key()'],['../a01759.html#a1a4a8993461b0675edcb2d162ec8823b',1,'atca_derive_key_in_out::temp_key()'],['../a01755.html#a8786d124038d3516d98f2456f19985cf',1,'atca_write_mac_in_out::temp_key()'],['../a01747.html#aa62f8da7dae46c095c603433ae26fedf',1,'atca_gen_dig_in_out::temp_key()'],['../a01474.html#ga7507880718dc536d6122f0401073b8c8',1,'atca_hmac_in_out::temp_key()'],['../a01474.html#ga7bf1d912d79b62cc598395642d77365f',1,'atca_mac_in_out::temp_key()'],['../a01731.html#ac57e99b5d0069d7bd733bcf056cc56e1',1,'atca_secureboot_enc_in_out::temp_key()'],['../a01727.html#ac9231df54b2f77c5061bdfbcea927a5e',1,'atca_verify_mac::temp_key()'],['../a01474.html#gaf89317aa1f759fc58f67158abd314d1b',1,'atca_nonce_in_out::temp_key()']]], + ['total_5fmsg_5fsize_3',['total_msg_size',['../a01639.html#aab3e376d6c18921a1ee303e2b703c668',1,'atca_sha256_ctx']]], + ['transforms_4',['transforms',['../a01623.html#a1e4d5bbf62b7cbe49b6d222d6e124833',1,'atcacert_cert_element_s']]], + ['type_5',['type',['../a01627.html#aeb847b88caadd6fad351f4d239edea42',1,'atcacert_def_s']]] ]; diff --git a/search/variables_12.js b/search/variables_12.js index 22efa999c..8b9c7b006 100644 --- a/search/variables_12.js +++ b/search/variables_12.js @@ -1,5 +1,5 @@ var searchData= [ - ['update_5fcount_0',['update_count',['../a01768.html#afd69516235ce1a7bee9c04146beb93d8',1,'atca_sign_internal_in_out']]], - ['use_5fflag_1',['use_flag',['../a01768.html#a4d03aca0b8dd153e5b939a684f7c2955',1,'atca_sign_internal_in_out']]] + ['update_5fcount_0',['update_count',['../a01787.html#afd69516235ce1a7bee9c04146beb93d8',1,'atca_sign_internal_in_out']]], + ['use_5fflag_1',['use_flag',['../a01787.html#a4d03aca0b8dd153e5b939a684f7c2955',1,'atca_sign_internal_in_out']]] ]; diff --git a/search/variables_13.js b/search/variables_13.js index 3b9860609..622caabf3 100644 --- a/search/variables_13.js +++ b/search/variables_13.js @@ -1,6 +1,6 @@ var searchData= [ - ['valid_0',['valid',['../a01692.html#aadedd52833b6ce041dfb9e923b448481',1,'atca_temp_key']]], - ['value_1',['value',['../a01692.html#abf76b14a42ef4d7f9d57a1d5edc6cf10',1,'atca_temp_key']]], - ['verify_5fother_5fdata_2',['verify_other_data',['../a01768.html#a2a0f2ee83e6825f92e259ee104fbb67d',1,'atca_sign_internal_in_out']]] + ['valid_0',['valid',['../a01711.html#aadedd52833b6ce041dfb9e923b448481',1,'atca_temp_key']]], + ['value_1',['value',['../a01711.html#abf76b14a42ef4d7f9d57a1d5edc6cf10',1,'atca_temp_key']]], + ['verify_5fother_5fdata_2',['verify_other_data',['../a01787.html#a2a0f2ee83e6825f92e259ee104fbb67d',1,'atca_sign_internal_in_out']]] ]; diff --git a/search/variables_14.js b/search/variables_14.js index db2228e95..b28d1b6b8 100644 --- a/search/variables_14.js +++ b/search/variables_14.js @@ -1,5 +1,5 @@ var searchData= [ - ['zero_0',['zero',['../a01447.html#gaee2c8a03b0aa78ab07b64253f2c48b22',1,'atca_nonce_in_out']]], - ['zone_1',['zone',['../a01592.html#af8e8e6406f9252c503f2eaed02f0dbca',1,'atcacert_device_loc_s::zone()'],['../a01728.html#aa4922c43b6dfecb5e39e286e960cdd88',1,'atca_gen_dig_in_out::zone()'],['../a01736.html#adf4e9d92c10469c78810f2881a95843b',1,'atca_write_mac_in_out::zone()']]] + ['zero_0',['zero',['../a01474.html#gaee2c8a03b0aa78ab07b64253f2c48b22',1,'atca_nonce_in_out']]], + ['zone_1',['zone',['../a01615.html#af8e8e6406f9252c503f2eaed02f0dbca',1,'atcacert_device_loc_s::zone()'],['../a01747.html#aa4922c43b6dfecb5e39e286e960cdd88',1,'atca_gen_dig_in_out::zone()'],['../a01755.html#adf4e9d92c10469c78810f2881a95843b',1,'atca_write_mac_in_out::zone()']]] ]; diff --git a/search/variables_2.js b/search/variables_2.js index 505eebcff..eb90e7ace 100644 --- a/search/variables_2.js +++ b/search/variables_2.js @@ -1,20 +1,20 @@ var searchData= [ - ['ca_5fcert_5fdef_0',['ca_cert_def',['../a01604.html#ae6dc350fb1a599dd6585c41e34a1e0e8',1,'atcacert_def_s']]], - ['cert_1',['cert',['../a01608.html#a850a129376d4a3dd4c9994d04a9edca7',1,'atcacert_build_state_s']]], - ['cert_5fdef_2',['cert_def',['../a01608.html#a5b6c72f114573cb07932b4c0e089150e',1,'atcacert_build_state_s']]], - ['cert_5floc_3',['cert_loc',['../a01600.html#a6a6584538d9ba2e8304e2c103d4501a5',1,'atcacert_cert_element_s']]], - ['cert_5fsize_4',['cert_size',['../a01608.html#af8600eedc4cac772aff7257ffcd4a1c0',1,'atcacert_build_state_s']]], - ['challenge_5',['challenge',['../a01447.html#gac4c2db1a307043c7677e76310911d944',1,'atca_mac_in_out']]], - ['class_5fid_6',['class_id',['../a01852.html#a41cd002dd69540506c5894ace65d323f',1,'pkcs11_object_s']]], - ['class_5ftype_7',['class_type',['../a01852.html#af1269e61c8cec31c2e85aa6c3bb4873a',1,'pkcs11_object_s']]], - ['client_5fchal_8',['client_chal',['../a01752.html#ac4f5b60a59fa29d78c720c2be434c5c3',1,'atca_check_mac_in_out']]], - ['client_5fresp_9',['client_resp',['../a01752.html#a4daaa0bccc92503ccc31eaed78eb7409',1,'atca_check_mac_in_out']]], - ['comp_5fcert_10',['comp_cert',['../a01608.html#ae6ce8bf9e7b8172f5971f7c6516a79f0',1,'atcacert_build_state_s']]], - ['comp_5fcert_5fdev_5floc_11',['comp_cert_dev_loc',['../a01604.html#a56f1328d6aec74cd0eb92a30182065b1',1,'atcacert_def_s']]], - ['config_5fpath_12',['config_path',['../a01840.html#a8974dbe03027c73d7bed3159421c05f7',1,'pkcs11_lib_ctx_s']]], - ['count_13',['count',['../a01592.html#a24329906c1970b0510479835d52b70b5',1,'atcacert_device_loc_s::count()'],['../a01596.html#a2cf939ba243a6dc7c8da9a74040b83f3',1,'atcacert_cert_loc_s::count()'],['../a01852.html#ad28895cf4063a1d3eaa03a343ae7105b',1,'pkcs11_object_s::count()']]], - ['counter_14',['counter',['../a01728.html#adb6743838ca7d8bd3ad390b7608492ba',1,'atca_gen_dig_in_out']]], - ['crypto_5fdata_15',['crypto_data',['../a01447.html#ga3d18f12db79908a5a1e831367391aa1c',1,'atca_decrypt_in_out']]], - ['curve_5ftype_16',['curve_type',['../a01447.html#gadf3470738c60dbe57b33fb1e6005f40e',1,'atca_verify_in_out']]] + ['ca_5fcert_5fdef_0',['ca_cert_def',['../a01627.html#ae6dc350fb1a599dd6585c41e34a1e0e8',1,'atcacert_def_s']]], + ['cert_1',['cert',['../a01631.html#a850a129376d4a3dd4c9994d04a9edca7',1,'atcacert_build_state_s']]], + ['cert_5fdef_2',['cert_def',['../a01631.html#a5b6c72f114573cb07932b4c0e089150e',1,'atcacert_build_state_s']]], + ['cert_5floc_3',['cert_loc',['../a01623.html#a6a6584538d9ba2e8304e2c103d4501a5',1,'atcacert_cert_element_s']]], + ['cert_5fsize_4',['cert_size',['../a01631.html#af8600eedc4cac772aff7257ffcd4a1c0',1,'atcacert_build_state_s']]], + ['challenge_5',['challenge',['../a01474.html#gac4c2db1a307043c7677e76310911d944',1,'atca_mac_in_out']]], + ['class_5fid_6',['class_id',['../a01887.html#a41cd002dd69540506c5894ace65d323f',1,'pkcs11_object_s']]], + ['class_5ftype_7',['class_type',['../a01887.html#af1269e61c8cec31c2e85aa6c3bb4873a',1,'pkcs11_object_s']]], + ['client_5fchal_8',['client_chal',['../a01771.html#ac4f5b60a59fa29d78c720c2be434c5c3',1,'atca_check_mac_in_out']]], + ['client_5fresp_9',['client_resp',['../a01771.html#a4daaa0bccc92503ccc31eaed78eb7409',1,'atca_check_mac_in_out']]], + ['comp_5fcert_10',['comp_cert',['../a01631.html#ae6ce8bf9e7b8172f5971f7c6516a79f0',1,'atcacert_build_state_s']]], + ['comp_5fcert_5fdev_5floc_11',['comp_cert_dev_loc',['../a01627.html#a56f1328d6aec74cd0eb92a30182065b1',1,'atcacert_def_s']]], + ['config_5fpath_12',['config_path',['../a01867.html#a8974dbe03027c73d7bed3159421c05f7',1,'pkcs11_lib_ctx_s']]], + ['count_13',['count',['../a01615.html#a24329906c1970b0510479835d52b70b5',1,'atcacert_device_loc_s::count()'],['../a01619.html#a2cf939ba243a6dc7c8da9a74040b83f3',1,'atcacert_cert_loc_s::count()'],['../a01887.html#ad28895cf4063a1d3eaa03a343ae7105b',1,'pkcs11_object_s::count()']]], + ['counter_14',['counter',['../a01747.html#adb6743838ca7d8bd3ad390b7608492ba',1,'atca_gen_dig_in_out']]], + ['crypto_5fdata_15',['crypto_data',['../a01474.html#ga3d18f12db79908a5a1e831367391aa1c',1,'atca_decrypt_in_out']]], + ['curve_5ftype_16',['curve_type',['../a01474.html#gadf3470738c60dbe57b33fb1e6005f40e',1,'atca_verify_in_out']]] ]; diff --git a/search/variables_3.js b/search/variables_3.js index ed8c0a97a..bf73dd007 100644 --- a/search/variables_3.js +++ b/search/variables_3.js @@ -1,14 +1,14 @@ var searchData= [ - ['data_0',['data',['../a01704.html#ab910eb48d182d8f191da149339fd6c51',1,'atca_io_decrypt_in_out']]], - ['data_5fsize_1',['data_size',['../a01704.html#a1d7f86d28ad089ae4401043c117be844',1,'atca_io_decrypt_in_out']]], - ['dev_5flock_2',['dev_lock',['../a01836.html#ab3f47ede65a8383c94edb8ac013cb08c',1,'pkcs11_dev_state']]], - ['dev_5flock_5fenabled_3',['dev_lock_enabled',['../a01840.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e',1,'pkcs11_lib_ctx_s']]], - ['dev_5fstate_4',['dev_state',['../a01840.html#abb83e7378cec1b712fab5974bc82a156',1,'pkcs11_lib_ctx_s']]], - ['device_5floc_5',['device_loc',['../a01600.html#aaac07ecbeef8734077fec8ea17a7e015',1,'atcacert_cert_element_s']]], - ['device_5fsn_6',['device_sn',['../a01608.html#a4530a3779248463eb6b77176ee656e68',1,'atcacert_build_state_s']]], - ['device_5fstate_7',['device_state',['../a01508.html#a6ce22e245944629826d4869f69babf81',1,'atca_device']]], - ['devtype_8',['devtype',['../a01608.html#af6d0fd1d866c96c7a9e4bc5425baa094',1,'atcacert_build_state_s']]], - ['digest_9',['digest',['../a01712.html#a1da30fd41605f42e0b0dd68d75c59bd9',1,'atca_secureboot_enc_in_out::digest()'],['../a01716.html#ad3a988f3c029fff3805a8a9dd4caaaa5',1,'atca_secureboot_mac_in_out::digest()'],['../a01768.html#a1765e3454849c67fa19a307f724cb8e3',1,'atca_sign_internal_in_out::digest()']]], - ['digest_5fenc_10',['digest_enc',['../a01712.html#aac21cf3b5207c0dc25358d6360953380',1,'atca_secureboot_enc_in_out']]] + ['data_0',['data',['../a01723.html#ab910eb48d182d8f191da149339fd6c51',1,'atca_io_decrypt_in_out']]], + ['data_5fsize_1',['data_size',['../a01723.html#a1d7f86d28ad089ae4401043c117be844',1,'atca_io_decrypt_in_out']]], + ['dev_5flock_2',['dev_lock',['../a01863.html#ab3f47ede65a8383c94edb8ac013cb08c',1,'pkcs11_dev_state']]], + ['dev_5flock_5fenabled_3',['dev_lock_enabled',['../a01867.html#a31a7ed21d4bb2c00b9d7cc4c0f60e21e',1,'pkcs11_lib_ctx_s']]], + ['dev_5fstate_4',['dev_state',['../a01867.html#abb83e7378cec1b712fab5974bc82a156',1,'pkcs11_lib_ctx_s']]], + ['device_5floc_5',['device_loc',['../a01623.html#aaac07ecbeef8734077fec8ea17a7e015',1,'atcacert_cert_element_s']]], + ['device_5fsn_6',['device_sn',['../a01631.html#a4530a3779248463eb6b77176ee656e68',1,'atcacert_build_state_s']]], + ['device_5fstate_7',['device_state',['../a01531.html#a6ce22e245944629826d4869f69babf81',1,'atca_device']]], + ['devtype_8',['devtype',['../a01631.html#af6d0fd1d866c96c7a9e4bc5425baa094',1,'atcacert_build_state_s']]], + ['digest_9',['digest',['../a01731.html#a1da30fd41605f42e0b0dd68d75c59bd9',1,'atca_secureboot_enc_in_out::digest()'],['../a01735.html#ad3a988f3c029fff3805a8a9dd4caaaa5',1,'atca_secureboot_mac_in_out::digest()'],['../a01787.html#a1765e3454849c67fa19a307f724cb8e3',1,'atca_sign_internal_in_out::digest()']]], + ['digest_5fenc_10',['digest_enc',['../a01731.html#aac21cf3b5207c0dc25358d6360953380',1,'atca_secureboot_enc_in_out']]] ]; diff --git a/search/variables_4.js b/search/variables_4.js index 67325ff5e..c0d44f7df 100644 --- a/search/variables_4.js +++ b/search/variables_4.js @@ -1,4 +1,4 @@ var searchData= [ - ['encrypted_5fdata_0',['encrypted_data',['../a01736.html#a38f7761577529e0bbf52cd0b8c17658b',1,'atca_write_mac_in_out']]] + ['encrypted_5fdata_0',['encrypted_data',['../a01755.html#a38f7761577529e0bbf52cd0b8c17658b',1,'atca_write_mac_in_out']]] ]; diff --git a/search/variables_5.js b/search/variables_5.js index 71b5826ce..8f70cfd65 100644 --- a/search/variables_5.js +++ b/search/variables_5.js @@ -1,4 +1,4 @@ var searchData= [ - ['for_5finvalidate_0',['for_invalidate',['../a01768.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7',1,'atca_sign_internal_in_out']]] + ['for_5finvalidate_0',['for_invalidate',['../a01787.html#a64fcd7cc6f939f51fa2a0dfa9156d4d7',1,'atca_sign_internal_in_out']]] ]; diff --git a/search/variables_6.js b/search/variables_6.js index c1e35c004..952ca2345 100644 --- a/search/variables_6.js +++ b/search/variables_6.js @@ -1,5 +1,5 @@ var searchData= [ - ['gen_5fdig_5fdata_0',['gen_dig_data',['../a01692.html#afde9c1e6769f60992c7fb10280cdd199',1,'atca_temp_key']]], - ['gen_5fkey_5fdata_1',['gen_key_data',['../a01692.html#a82e1988542001c7499700f3e1b191339',1,'atca_temp_key']]] + ['gen_5fdig_5fdata_0',['gen_dig_data',['../a01711.html#afde9c1e6769f60992c7fb10280cdd199',1,'atca_temp_key']]], + ['gen_5fkey_5fdata_1',['gen_key_data',['../a01711.html#a82e1988542001c7499700f3e1b191339',1,'atca_temp_key']]] ]; diff --git a/search/variables_7.js b/search/variables_7.js index 5ab07114a..d02b4b9d6 100644 --- a/search/variables_7.js +++ b/search/variables_7.js @@ -1,8 +1,7 @@ var searchData= [ - ['hal_0',['hal',['../a01584.html#a7cee716c7c8c20d0d8aac6243baff819',1,'atca_iface']]], - ['hal_5fdata_1',['hal_data',['../a01584.html#ab316c2d139b46380bc97be4d23428caa',1,'atca_iface::hal_data()'],['../a01652.html#afd90dea53ccfe0a8c15b12e5e1afaa35',1,'atca_hal_kit_phy_t::hal_data()']]], - ['handle_2',['handle',['../a01856.html#a43266d4cee5be05494f466595b968267',1,'pkcs11_object_cache_s']]], - ['hash_3',['hash',['../a01644.html#a2a42d119518402fa16c3ec9f2b511669',1,'sw_sha256_ctx']]], - ['hashed_5fkey_4',['hashed_key',['../a01712.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52',1,'atca_secureboot_enc_in_out::hashed_key()'],['../a01716.html#a9ebeb5a66a80189ae8e7bb2ea97701c9',1,'atca_secureboot_mac_in_out::hashed_key()']]] + ['hal_0',['hal',['../a01607.html#a7cee716c7c8c20d0d8aac6243baff819',1,'atca_iface']]], + ['hal_5fdata_1',['hal_data',['../a01607.html#ab316c2d139b46380bc97be4d23428caa',1,'atca_iface::hal_data()'],['../a01671.html#afd90dea53ccfe0a8c15b12e5e1afaa35',1,'atca_hal_kit_phy_t::hal_data()']]], + ['handle_2',['handle',['../a01891.html#a43266d4cee5be05494f466595b968267',1,'pkcs11_object_cache_s']]], + ['hashed_5fkey_3',['hashed_key',['../a01731.html#acd3e2d26c9053f2b5cf1aaf2e8dceb52',1,'atca_secureboot_enc_in_out::hashed_key()'],['../a01735.html#a9ebeb5a66a80189ae8e7bb2ea97701c9',1,'atca_secureboot_mac_in_out::hashed_key()']]] ]; diff --git a/search/variables_8.js b/search/variables_8.js index 63feccf5a..e9773bfea 100644 --- a/search/variables_8.js +++ b/search/variables_8.js @@ -1,14 +1,14 @@ var searchData= [ - ['id_0',['id',['../a01600.html#a437f85f49d7a943a0e9f06353a2b6875',1,'atcacert_cert_element_s']]], - ['init_5fargs_1',['init_args',['../a01840.html#a5387f2fa4d263228dd0056aa1fd308de',1,'pkcs11_lib_ctx_s']]], - ['initialized_2',['initialized',['../a01840.html#afe50a8d16a6f04c64053e09ae4975e38',1,'pkcs11_lib_ctx_s']]], - ['input_5fdata_3',['input_data',['../a01736.html#a423e1db9e86ff369d49d78d8f5ea2525',1,'atca_write_mac_in_out']]], - ['io_5fkey_4',['io_key',['../a01704.html#aa6d2797ec2cdef70aa51438e96e2a301',1,'atca_io_decrypt_in_out::io_key()'],['../a01708.html#a93cba5300302d50e26f70457f84df0da',1,'atca_verify_mac::io_key()'],['../a01712.html#aeb02c7cf4fbaf40307821bc38160ab8d',1,'atca_secureboot_enc_in_out::io_key()']]], - ['is_5f64_5',['is_64',['../a01692.html#a0f766111832176ea2c8eda8fbf13743d',1,'atca_temp_key']]], - ['is_5fcomp_5fcert_6',['is_comp_cert',['../a01608.html#abfff7f7f7436a1df82e73b4b070f8ab8',1,'atcacert_build_state_s']]], - ['is_5fdevice_5fsn_7',['is_device_sn',['../a01608.html#aa0b5050ded24b08d6b0022d543d2ed47',1,'atcacert_build_state_s']]], - ['is_5fgenkey_8',['is_genkey',['../a01592.html#a209ce3b19c7ebdd32847334c64a9deb2',1,'atcacert_device_loc_s']]], - ['is_5fkey_5fnomac_9',['is_key_nomac',['../a01728.html#a45ea4bd1941244391f04343f993bacf0',1,'atca_gen_dig_in_out']]], - ['is_5fslot_5flocked_10',['is_slot_locked',['../a01768.html#a1d994ea91e9234808e6f0320897ab434',1,'atca_sign_internal_in_out']]] + ['id_0',['id',['../a01623.html#a437f85f49d7a943a0e9f06353a2b6875',1,'atcacert_cert_element_s']]], + ['init_5fargs_1',['init_args',['../a01867.html#a5387f2fa4d263228dd0056aa1fd308de',1,'pkcs11_lib_ctx_s']]], + ['initialized_2',['initialized',['../a01867.html#afe50a8d16a6f04c64053e09ae4975e38',1,'pkcs11_lib_ctx_s']]], + ['input_5fdata_3',['input_data',['../a01755.html#a423e1db9e86ff369d49d78d8f5ea2525',1,'atca_write_mac_in_out']]], + ['io_5fkey_4',['io_key',['../a01723.html#aa6d2797ec2cdef70aa51438e96e2a301',1,'atca_io_decrypt_in_out::io_key()'],['../a01727.html#a93cba5300302d50e26f70457f84df0da',1,'atca_verify_mac::io_key()'],['../a01731.html#aeb02c7cf4fbaf40307821bc38160ab8d',1,'atca_secureboot_enc_in_out::io_key()']]], + ['is_5f64_5',['is_64',['../a01711.html#a0f766111832176ea2c8eda8fbf13743d',1,'atca_temp_key']]], + ['is_5fcomp_5fcert_6',['is_comp_cert',['../a01631.html#abfff7f7f7436a1df82e73b4b070f8ab8',1,'atcacert_build_state_s']]], + ['is_5fdevice_5fsn_7',['is_device_sn',['../a01631.html#aa0b5050ded24b08d6b0022d543d2ed47',1,'atcacert_build_state_s']]], + ['is_5fgenkey_8',['is_genkey',['../a01615.html#a209ce3b19c7ebdd32847334c64a9deb2',1,'atcacert_device_loc_s']]], + ['is_5fkey_5fnomac_9',['is_key_nomac',['../a01747.html#a45ea4bd1941244391f04343f993bacf0',1,'atca_gen_dig_in_out']]], + ['is_5fslot_5flocked_10',['is_slot_locked',['../a01787.html#a1d994ea91e9234808e6f0320897ab434',1,'atca_sign_internal_in_out']]] ]; diff --git a/search/variables_9.js b/search/variables_9.js index d3411ef3c..3a0678865 100644 --- a/search/variables_9.js +++ b/search/variables_9.js @@ -1,7 +1,7 @@ var searchData= [ - ['key_0',['key',['../a01447.html#ga84ee714046fea52fb6b334e37b958c89',1,'atca_mac_in_out::key()'],['../a01447.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0',1,'atca_hmac_in_out::key()']]], - ['key_5fconf_1',['key_conf',['../a01728.html#a089cd58d7f5518ee9016eb40c281bdfc',1,'atca_gen_dig_in_out']]], - ['key_5fconfig_2',['key_config',['../a01768.html#a534292cebeb2a65e3198e30061b2c35b',1,'atca_sign_internal_in_out']]], - ['key_5fid_3',['key_id',['../a01692.html#a70b94559475530db2be60e9d30758098',1,'atca_temp_key::key_id()'],['../a01708.html#ad4c4854451abd367cf8a13aad5f6372b',1,'atca_verify_mac::key_id()'],['../a01447.html#ga326ed9df4c9b966616e0b1a73f1b2796',1,'atca_mac_in_out::key_id()'],['../a01447.html#ga10f04328eda5cffcea79652ac3509c2d',1,'atca_hmac_in_out::key_id()'],['../a01728.html#a8bb5e1f0ea943f4749ebf6faa450288b',1,'atca_gen_dig_in_out::key_id()'],['../a01736.html#a213cc14f2d1c67be382cb8918aca4362',1,'atca_write_mac_in_out::key_id()'],['../a01752.html#a11807b6f83083ad17c66640c77c78973',1,'atca_check_mac_in_out::key_id()'],['../a01764.html#a2582ecc282bd3d712918e6109a18c7d2',1,'atca_gen_key_in_out::key_id()'],['../a01768.html#a426f70e97a2f191f021227175699185c',1,'atca_sign_internal_in_out::key_id()']]] + ['key_0',['key',['../a01474.html#ga84ee714046fea52fb6b334e37b958c89',1,'atca_mac_in_out::key()'],['../a01474.html#gab6fe3f8a17d3a68f63c9c537cadd0fd0',1,'atca_hmac_in_out::key()']]], + ['key_5fconf_1',['key_conf',['../a01747.html#a089cd58d7f5518ee9016eb40c281bdfc',1,'atca_gen_dig_in_out']]], + ['key_5fconfig_2',['key_config',['../a01787.html#a534292cebeb2a65e3198e30061b2c35b',1,'atca_sign_internal_in_out']]], + ['key_5fid_3',['key_id',['../a01711.html#a70b94559475530db2be60e9d30758098',1,'atca_temp_key::key_id()'],['../a01727.html#ad4c4854451abd367cf8a13aad5f6372b',1,'atca_verify_mac::key_id()'],['../a01474.html#ga326ed9df4c9b966616e0b1a73f1b2796',1,'atca_mac_in_out::key_id()'],['../a01474.html#ga10f04328eda5cffcea79652ac3509c2d',1,'atca_hmac_in_out::key_id()'],['../a01747.html#a8bb5e1f0ea943f4749ebf6faa450288b',1,'atca_gen_dig_in_out::key_id()'],['../a01755.html#a213cc14f2d1c67be382cb8918aca4362',1,'atca_write_mac_in_out::key_id()'],['../a01771.html#a11807b6f83083ad17c66640c77c78973',1,'atca_check_mac_in_out::key_id()'],['../a01783.html#a2582ecc282bd3d712918e6109a18c7d2',1,'atca_gen_key_in_out::key_id()'],['../a01787.html#a426f70e97a2f191f021227175699185c',1,'atca_sign_internal_in_out::key_id()']]] ]; diff --git a/search/variables_a.js b/search/variables_a.js index 75369badc..02a8a7f25 100644 --- a/search/variables_a.js +++ b/search/variables_a.js @@ -1,5 +1,5 @@ var searchData= [ - ['len_0',['len',['../a01612.html#a9e07b6d33b7cdc866e6625c18d9c5f92',1,'cal_buffer_s']]], - ['lib_5flock_1',['lib_lock',['../a01840.html#abef716f125614c97e00abcd3e62b98c2',1,'pkcs11_lib_ctx_s']]] + ['len_0',['len',['../a01635.html#a9e07b6d33b7cdc866e6625c18d9c5f92',1,'cal_buffer_s']]], + ['lib_5flock_1',['lib_lock',['../a01867.html#abef716f125614c97e00abcd3e62b98c2',1,'pkcs11_lib_ctx_s']]] ]; diff --git a/search/variables_b.js b/search/variables_b.js index 31b254f0c..02269ec57 100644 --- a/search/variables_b.js +++ b/search/variables_b.js @@ -1,10 +1,10 @@ var searchData= [ - ['mac_0',['mac',['../a01716.html#aeb4c9a28028bd625ac3650b39392cf07',1,'atca_secureboot_mac_in_out::mac()'],['../a01744.html#a0576f1886490bbb3656b420f5bb65e65',1,'atca_derive_key_mac_in_out::mac()'],['../a01708.html#afc99cd20d6193df126ae2b32b42f7546',1,'atca_verify_mac::mac()']]], - ['max_5fcert_5fsize_1',['max_cert_size',['../a01608.html#a6e1cb79d9215a84f1e74c989bd0c9987',1,'atcacert_build_state_s']]], - ['message_2',['message',['../a01768.html#a5649ccf733b2512db9917036a102fb14',1,'atca_sign_internal_in_out']]], - ['miface_3',['mIface',['../a01508.html#a725646466f0ea8e0982251189c15724a',1,'atca_device']]], - ['mifacecfg_4',['mIfaceCFG',['../a01584.html#a093b94b5d693f4e7a8facfc40f1443b0',1,'atca_iface']]], - ['mode_5',['mode',['../a01716.html#a2c6c43889156357aee27b3b09657ebd2',1,'atca_secureboot_mac_in_out::mode()'],['../a01768.html#a2145615f3148fb8a428657fa8020aad1',1,'atca_sign_internal_in_out::mode()'],['../a01764.html#afa39cec9e8d332618910a0f519b5b48d',1,'atca_gen_key_in_out::mode()'],['../a01752.html#a0619aaead2b82313d761804f40c24926',1,'atca_check_mac_in_out::mode()'],['../a01744.html#ae33f3603840fd0bb8ada551ff168ea58',1,'atca_derive_key_mac_in_out::mode()'],['../a01740.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9',1,'atca_derive_key_in_out::mode()'],['../a01447.html#ga1616d5efe59851d97fed27b47923c786',1,'atca_hmac_in_out::mode()'],['../a01447.html#ga25187965ed87f828c98e4a20c93166e8',1,'atca_mac_in_out::mode()'],['../a01708.html#ac90559108804dc16ac1ac91a0212bff9',1,'atca_verify_mac::mode()'],['../a01447.html#gabaedd7126cc73449d73843ef3b8958c0',1,'atca_nonce_in_out::mode()']]], - ['msg_5fdig_5fbuf_6',['msg_dig_buf',['../a01708.html#acb0498448f486070d33e121ade525c64',1,'atca_verify_mac']]] + ['mac_0',['mac',['../a01735.html#aeb4c9a28028bd625ac3650b39392cf07',1,'atca_secureboot_mac_in_out::mac()'],['../a01763.html#a0576f1886490bbb3656b420f5bb65e65',1,'atca_derive_key_mac_in_out::mac()'],['../a01727.html#afc99cd20d6193df126ae2b32b42f7546',1,'atca_verify_mac::mac()']]], + ['max_5fcert_5fsize_1',['max_cert_size',['../a01631.html#a6e1cb79d9215a84f1e74c989bd0c9987',1,'atcacert_build_state_s']]], + ['message_2',['message',['../a01787.html#a5649ccf733b2512db9917036a102fb14',1,'atca_sign_internal_in_out']]], + ['miface_3',['mIface',['../a01531.html#a725646466f0ea8e0982251189c15724a',1,'atca_device']]], + ['mifacecfg_4',['mIfaceCFG',['../a01607.html#a093b94b5d693f4e7a8facfc40f1443b0',1,'atca_iface']]], + ['mode_5',['mode',['../a01735.html#a2c6c43889156357aee27b3b09657ebd2',1,'atca_secureboot_mac_in_out::mode()'],['../a01787.html#a2145615f3148fb8a428657fa8020aad1',1,'atca_sign_internal_in_out::mode()'],['../a01783.html#afa39cec9e8d332618910a0f519b5b48d',1,'atca_gen_key_in_out::mode()'],['../a01771.html#a0619aaead2b82313d761804f40c24926',1,'atca_check_mac_in_out::mode()'],['../a01763.html#ae33f3603840fd0bb8ada551ff168ea58',1,'atca_derive_key_mac_in_out::mode()'],['../a01759.html#a81da1f6ee5cdd6f3270f68b4df7ee8d9',1,'atca_derive_key_in_out::mode()'],['../a01474.html#ga1616d5efe59851d97fed27b47923c786',1,'atca_hmac_in_out::mode()'],['../a01474.html#ga25187965ed87f828c98e4a20c93166e8',1,'atca_mac_in_out::mode()'],['../a01727.html#ac90559108804dc16ac1ac91a0212bff9',1,'atca_verify_mac::mode()'],['../a01474.html#gabaedd7126cc73449d73843ef3b8958c0',1,'atca_nonce_in_out::mode()']]], + ['msg_5fdig_5fbuf_6',['msg_dig_buf',['../a01727.html#acb0498448f486070d33e121ade525c64',1,'atca_verify_mac']]] ]; diff --git a/search/variables_c.js b/search/variables_c.js index 1ab634bdc..86ffb9a0a 100644 --- a/search/variables_c.js +++ b/search/variables_c.js @@ -1,5 +1,5 @@ var searchData= [ - ['no_5fmac_5fflag_0',['no_mac_flag',['../a01692.html#ae381dabe56bdd77f48a8241050d16d82',1,'atca_temp_key']]], - ['num_5fin_1',['num_in',['../a01447.html#ga7627ba268edc51f4e185e956bd215496',1,'atca_nonce_in_out']]] + ['no_5fmac_5fflag_0',['no_mac_flag',['../a01711.html#ae381dabe56bdd77f48a8241050d16d82',1,'atca_temp_key']]], + ['num_5fin_1',['num_in',['../a01474.html#ga7627ba268edc51f4e185e956bd215496',1,'atca_nonce_in_out']]] ]; diff --git a/search/variables_d.js b/search/variables_d.js index f6ab22c13..ae3715790 100644 --- a/search/variables_d.js +++ b/search/variables_d.js @@ -1,8 +1,8 @@ var searchData= [ - ['object_0',['object',['../a01856.html#a5fa3f781e1ef2c55de73d5be66214630',1,'pkcs11_object_cache_s']]], - ['offset_1',['offset',['../a01592.html#a6d4c996ba426bfb964f3c2c4d1238f3c',1,'atcacert_device_loc_s::offset()'],['../a01596.html#aee425cdec2c6c77ccb291993a6526d0b',1,'atcacert_cert_loc_s::offset()']]], - ['other_5fdata_2',['other_data',['../a01708.html#ad89fec1f50b8e8ffc890d3683c4b5afe',1,'atca_verify_mac::other_data()'],['../a01728.html#a3b5c9fd883d9daf4d6a42bbf1aba936d',1,'atca_gen_dig_in_out::other_data()'],['../a01752.html#af2d1c007ab43e8556a917efc5bcee9c8',1,'atca_check_mac_in_out::other_data()'],['../a01764.html#a9aa171dc3ed5403822d780a2d0220d61',1,'atca_gen_key_in_out::other_data()']]], - ['otp_3',['otp',['../a01447.html#gaf07ffae9f842764c321a060ead038ac2',1,'atca_include_data_in_out::otp()'],['../a01447.html#gac9d561caddec61e481d241a88d73b653',1,'atca_mac_in_out::otp()'],['../a01447.html#gaad38386d9ec6afcdcd39eab98e2a4a1c',1,'atca_hmac_in_out::otp()'],['../a01752.html#ac97a41612246b0527ed1a242bbe28a99',1,'atca_check_mac_in_out::otp()']]], - ['out_5fnonce_4',['out_nonce',['../a01704.html#a597e62aa42a9971b98a5d76c7f1baef5',1,'atca_io_decrypt_in_out']]] + ['object_0',['object',['../a01891.html#a5fa3f781e1ef2c55de73d5be66214630',1,'pkcs11_object_cache_s']]], + ['offset_1',['offset',['../a01615.html#a6d4c996ba426bfb964f3c2c4d1238f3c',1,'atcacert_device_loc_s::offset()'],['../a01619.html#aee425cdec2c6c77ccb291993a6526d0b',1,'atcacert_cert_loc_s::offset()']]], + ['other_5fdata_2',['other_data',['../a01727.html#ad89fec1f50b8e8ffc890d3683c4b5afe',1,'atca_verify_mac::other_data()'],['../a01747.html#a3b5c9fd883d9daf4d6a42bbf1aba936d',1,'atca_gen_dig_in_out::other_data()'],['../a01771.html#af2d1c007ab43e8556a917efc5bcee9c8',1,'atca_check_mac_in_out::other_data()'],['../a01783.html#a9aa171dc3ed5403822d780a2d0220d61',1,'atca_gen_key_in_out::other_data()']]], + ['otp_3',['otp',['../a01474.html#gaf07ffae9f842764c321a060ead038ac2',1,'atca_include_data_in_out::otp()'],['../a01474.html#gac9d561caddec61e481d241a88d73b653',1,'atca_mac_in_out::otp()'],['../a01474.html#gaad38386d9ec6afcdcd39eab98e2a4a1c',1,'atca_hmac_in_out::otp()'],['../a01771.html#ac97a41612246b0527ed1a242bbe28a99',1,'atca_check_mac_in_out::otp()']]], + ['out_5fnonce_4',['out_nonce',['../a01723.html#a597e62aa42a9971b98a5d76c7f1baef5',1,'atca_io_decrypt_in_out']]] ]; diff --git a/search/variables_e.js b/search/variables_e.js index 23fba5f79..8e74468c7 100644 --- a/search/variables_e.js +++ b/search/variables_e.js @@ -1,26 +1,26 @@ var searchData= [ - ['p_5ftemp_0',['p_temp',['../a01447.html#ga80ad9effe2957aaa0e604b175fcdbc63',1,'atca_include_data_in_out']]], - ['packet_5falloc_1',['packet_alloc',['../a01652.html#a72b6c6e17726b3e9db70d78e0c52f02c',1,'atca_hal_kit_phy_t']]], - ['packet_5ffree_2',['packet_free',['../a01652.html#a09209305fd48261b835daf6026b7b659',1,'atca_hal_kit_phy_t']]], - ['param2_3',['param2',['../a01716.html#ac94f545daf7381aeb770fb42b467d338',1,'atca_secureboot_mac_in_out']]], - ['parent_5fkey_4',['parent_key',['../a01740.html#ad9e30a4f9006923af0d6668768598737',1,'atca_derive_key_in_out::parent_key()'],['../a01744.html#acb88b64064f725ca81245f2afe6f57f5',1,'atca_derive_key_mac_in_out::parent_key()']]], - ['phy_5',['phy',['../a01584.html#a3ac7e576da4958d6c0488ec606d9cbff',1,'atca_iface::phy()'],['../a01648.html#afad6f95d2a6e23fe87839c64417111d3',1,'atca_hal_list_entry_t::phy()']]], - ['pkcs11_5fcert_5fwtlspublic_5fattributes_6',['pkcs11_cert_wtlspublic_attributes',['../a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c'],['../a01450.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c']]], - ['pkcs11_5fcert_5fx509_5fattributes_7',['pkcs11_cert_x509_attributes',['../a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c'],['../a01450.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c']]], - ['pkcs11_5fcert_5fx509public_5fattributes_8',['pkcs11_cert_x509public_attributes',['../a01450.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c'],['../a01450.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp224_9',['pkcs11_ec_pbkey_asn1_hdr_p224',['../a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c'],['../a01450.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp256_10',['pkcs11_ec_pbkey_asn1_hdr_p256',['../a01450.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c'],['../a01450.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp384_11',['pkcs11_ec_pbkey_asn1_hdr_p384',['../a01450.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c'],['../a01450.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c']]], - ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp521_12',['pkcs11_ec_pbkey_asn1_hdr_p521',['../a01450.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c'],['../a01450.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c']]], - ['pkcs11_5fkey_5fprivate_5fattributes_13',['pkcs11_key_private_attributes',['../a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c'],['../a01450.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c']]], - ['pkcs11_5fkey_5fpublic_5fattributes_14',['pkcs11_key_public_attributes',['../a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c'],['../a01450.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c']]], - ['pkcs11_5fkey_5fsecret_5fattributes_15',['pkcs11_key_secret_attributes',['../a01450.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c'],['../a01450.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c']]], - ['pkcs11_5fobject_5fmonotonic_5fattributes_16',['pkcs11_object_monotonic_attributes',['../a01450.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c'],['../a01450.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec224_17',['pkcs11_x962_asn1_hdr_ec224',['../a01450.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c'],['../a01450.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec256_18',['pkcs11_x962_asn1_hdr_ec256',['../a01450.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c'],['../a01450.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec384_19',['pkcs11_x962_asn1_hdr_ec384',['../a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c'],['../a01450.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c']]], - ['pkcs11_5fx962_5fasn1_5fhdr_5fec521_20',['pkcs11_x962_asn1_hdr_ec521',['../a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c'],['../a01450.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c']]], - ['public_5fkey_21',['public_key',['../a01447.html#gaf61f82fe19690b80bf370b295c58920b',1,'atca_verify_in_out::public_key()'],['../a01764.html#ad6eba00bdedd4375c93419eb4cda6850',1,'atca_gen_key_in_out::public_key()']]], - ['public_5fkey_5fsize_22',['public_key_size',['../a01764.html#a44b034625f63afcfaab306ac6275cd5b',1,'atca_gen_key_in_out']]] + ['p_5ftemp_0',['p_temp',['../a01474.html#ga80ad9effe2957aaa0e604b175fcdbc63',1,'atca_include_data_in_out']]], + ['packet_5falloc_1',['packet_alloc',['../a01671.html#a72b6c6e17726b3e9db70d78e0c52f02c',1,'atca_hal_kit_phy_t']]], + ['packet_5ffree_2',['packet_free',['../a01671.html#a09209305fd48261b835daf6026b7b659',1,'atca_hal_kit_phy_t']]], + ['param2_3',['param2',['../a01735.html#ac94f545daf7381aeb770fb42b467d338',1,'atca_secureboot_mac_in_out']]], + ['parent_5fkey_4',['parent_key',['../a01759.html#ad9e30a4f9006923af0d6668768598737',1,'atca_derive_key_in_out::parent_key()'],['../a01763.html#acb88b64064f725ca81245f2afe6f57f5',1,'atca_derive_key_mac_in_out::parent_key()']]], + ['phy_5',['phy',['../a01607.html#a3ac7e576da4958d6c0488ec606d9cbff',1,'atca_iface::phy()'],['../a01667.html#afad6f95d2a6e23fe87839c64417111d3',1,'atca_hal_list_entry_t::phy()']]], + ['pkcs11_5fcert_5fwtlspublic_5fattributes_6',['pkcs11_cert_wtlspublic_attributes',['../a01477.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c'],['../a01477.html#gabc10a1f1b90bc7d2fb047db0af539e80',1,'pkcs11_cert_wtlspublic_attributes(): pkcs11_cert.c']]], + ['pkcs11_5fcert_5fx509_5fattributes_7',['pkcs11_cert_x509_attributes',['../a01477.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c'],['../a01477.html#gafa471eb33699e2cba5dc3cc50a2d8df7',1,'pkcs11_cert_x509_attributes(): pkcs11_cert.c']]], + ['pkcs11_5fcert_5fx509public_5fattributes_8',['pkcs11_cert_x509public_attributes',['../a01477.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c'],['../a01477.html#ga8de4193ede04a12ab4e44b8df9eec478',1,'pkcs11_cert_x509public_attributes(): pkcs11_cert.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp224_9',['pkcs11_ec_pbkey_asn1_hdr_p224',['../a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c'],['../a01477.html#ga7711abc98f6c6d6536c2a4d0065e1b4a',1,'pkcs11_ec_pbkey_asn1_hdr_p224(): pkcs11_key.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp256_10',['pkcs11_ec_pbkey_asn1_hdr_p256',['../a01477.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c'],['../a01477.html#gacf3b4678891994823f2cdd0cb8707ecc',1,'pkcs11_ec_pbkey_asn1_hdr_p256(): pkcs11_key.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp384_11',['pkcs11_ec_pbkey_asn1_hdr_p384',['../a01477.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c'],['../a01477.html#gadbc903025f5c5ea06b36fba39f30d305',1,'pkcs11_ec_pbkey_asn1_hdr_p384(): pkcs11_key.c']]], + ['pkcs11_5fec_5fpbkey_5fasn1_5fhdr_5fp521_12',['pkcs11_ec_pbkey_asn1_hdr_p521',['../a01477.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c'],['../a01477.html#ga44f7303f7073c7f97c3e31ec5db97769',1,'pkcs11_ec_pbkey_asn1_hdr_p521(): pkcs11_key.c']]], + ['pkcs11_5fkey_5fprivate_5fattributes_13',['pkcs11_key_private_attributes',['../a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c'],['../a01477.html#ga40d8e67ef0fae7bdc2dca013ad8410aa',1,'pkcs11_key_private_attributes(): pkcs11_key.c']]], + ['pkcs11_5fkey_5fpublic_5fattributes_14',['pkcs11_key_public_attributes',['../a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c'],['../a01477.html#gadf3e8d1e6b01d9fe85f54c9478d8d215',1,'pkcs11_key_public_attributes(): pkcs11_key.c']]], + ['pkcs11_5fkey_5fsecret_5fattributes_15',['pkcs11_key_secret_attributes',['../a01477.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c'],['../a01477.html#ga6ef03269a32699359d90901cc84954f3',1,'pkcs11_key_secret_attributes(): pkcs11_key.c']]], + ['pkcs11_5fobject_5fmonotonic_5fattributes_16',['pkcs11_object_monotonic_attributes',['../a01477.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c'],['../a01477.html#ga230747fbe3b7a13dfda75980844c3e9d',1,'pkcs11_object_monotonic_attributes(): pkcs11_object.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec224_17',['pkcs11_x962_asn1_hdr_ec224',['../a01477.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c'],['../a01477.html#gaaefbee7a7f8454014a46e969fa9912c3',1,'pkcs11_x962_asn1_hdr_ec224(): pkcs11_key.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec256_18',['pkcs11_x962_asn1_hdr_ec256',['../a01477.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c'],['../a01477.html#ga7fd56486be0426ec029cd60072ef62ba',1,'pkcs11_x962_asn1_hdr_ec256(): pkcs11_key.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec384_19',['pkcs11_x962_asn1_hdr_ec384',['../a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c'],['../a01477.html#ga8ad0d2db3944821eb471e1a6e61532dd',1,'pkcs11_x962_asn1_hdr_ec384(): pkcs11_key.c']]], + ['pkcs11_5fx962_5fasn1_5fhdr_5fec521_20',['pkcs11_x962_asn1_hdr_ec521',['../a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c'],['../a01477.html#ga70a8c1bb6cec2636b206c588dc6354fd',1,'pkcs11_x962_asn1_hdr_ec521(): pkcs11_key.c']]], + ['public_5fkey_21',['public_key',['../a01474.html#gaf61f82fe19690b80bf370b295c58920b',1,'atca_verify_in_out::public_key()'],['../a01783.html#ad6eba00bdedd4375c93419eb4cda6850',1,'atca_gen_key_in_out::public_key()']]], + ['public_5fkey_5fsize_22',['public_key_size',['../a01783.html#a44b034625f63afcfaab306ac6275cd5b',1,'atca_gen_key_in_out']]] ]; diff --git a/search/variables_f.js b/search/variables_f.js index 5dd056ad6..bc79d227a 100644 --- a/search/variables_f.js +++ b/search/variables_f.js @@ -1,8 +1,8 @@ var searchData= [ - ['rand_5fout_0',['rand_out',['../a01447.html#gadc3dc30e978bcf18656aedb6dd4a62f2',1,'atca_nonce_in_out']]], - ['read_5fkey_1',['read_key',['../a01876.html#a75cbe04e1812bbae8b4bb552991a1584',1,'pkcs11_slot_ctx_s']]], - ['recv_2',['recv',['../a01652.html#abb9616bec2cdd4f546884a45953cb054',1,'atca_hal_kit_phy_t']]], - ['resources_3',['resources',['../a01836.html#aa10b79b793bf8499c396e5108ed5830c',1,'pkcs11_dev_state']]], - ['response_4',['response',['../a01447.html#ga3237adaae1e30c7ed469405e1ebfb435',1,'atca_mac_in_out::response()'],['../a01447.html#gacf6675faad5f7a43ca3fbec2108f57cd',1,'atca_hmac_in_out::response()']]] + ['rand_5fout_0',['rand_out',['../a01474.html#gadc3dc30e978bcf18656aedb6dd4a62f2',1,'atca_nonce_in_out']]], + ['read_5fkey_1',['read_key',['../a01911.html#a75cbe04e1812bbae8b4bb552991a1584',1,'pkcs11_slot_ctx_s']]], + ['recv_2',['recv',['../a01671.html#abb9616bec2cdd4f546884a45953cb054',1,'atca_hal_kit_phy_t']]], + ['resources_3',['resources',['../a01863.html#aa10b79b793bf8499c396e5108ed5830c',1,'pkcs11_dev_state']]], + ['response_4',['response',['../a01474.html#ga3237adaae1e30c7ed469405e1ebfb435',1,'atca_mac_in_out::response()'],['../a01474.html#gacf6675faad5f7a43ca3fbec2108f57cd',1,'atca_hmac_in_out::response()']]] ];