SWRU543B January 2019 – June 2025 CC3230S , CC3230SF , CC3235MODS , CC3235MODSF , CC3235S , CC3235SF
Table 17-3 lists the memory-mapped registers for the AES. All register offset addresses not listed in Table 17-3 should be considered as reserved locations and the register contents should not be modified.
| Offset | Acronym | Register Name | Section |
|---|---|---|---|
| 0h | AES_KEY2_6 | Key register | Section 17.4.1 |
| 4h | AES_KEY2_7 | Key register | Section 17.4.2 |
| 8h | AES_KEY2_4 | Key register | Section 17.4.3 |
| Ch | AES_KEY2_5 | Key register | Section 17.4.4 |
| 10h | AES_KEY2_2 | Key register | Section 17.4.5 |
| 14h | AES_KEY2_3 | Key register | Section 17.4.6 |
| 18h | AES_KEY2_0 | Key register | Section 17.4.7 |
| 1Ch | AES_KEY2_1 | Key register | Section 17.4.8 |
| 20h | AES_KEY1_6 | Key register | Section 17.4.9 |
| 24h | AES_KEY1_7 | Key register | Section 17.4.10 |
| 28h | AES_KEY1_4 | Key register | Section 17.4.11 |
| 2Ch | AES_KEY1_5 | Key register | Section 17.4.12 |
| 30h | AES_KEY1_2 | Key register | Section 17.4.13 |
| 34h | AES_KEY1_3 | Key register | Section 17.4.14 |
| 38h | AES_KEY1_0 | Key register | Section 17.4.15 |
| 3Ch | AES_KEY1_1 | Key register | Section 17.4.16 |
| 40h | AES_IV_IN_0 | Section 17.4.17 | |
| 44h | AES_IV_IN_1 | Section 17.4.18 | |
| 48h | AES_IV_IN_2 | Section 17.4.19 | |
| 4Ch | AES_IV_IN_3 | Section 17.4.20 | |
| 50h | AES_CTRL | Section 17.4.21 | |
| 54h | AES_C_LENGTH_0 | Section 17.4.22 | |
| 58h | AES_C_LENGTH_1 | Section 17.4.23 | |
| 5Ch | AES_AUTH_LENGTH | Section 17.4.24 | |
| 60h | AES_DATA_IN_0 | Data register | Section 17.4.25 |
| 64h | AES_DATA_IN_1 | Data register | Section 17.4.26 |
| 68h | AES_DATA_IN_2 | Data register | Section 17.4.27 |
| 6Ch | AES_DATA_IN_3 | Data register | Section 17.4.28 |
| 70h | AES_TAG_OUT_0 | Section 17.4.29 | |
| 74h | AES_TAG_OUT_1 | Section 17.4.30 | |
| 78h | AES_TAG_OUT_2 | Section 17.4.31 | |
| 7Ch | AES_TAG_OUT_3 | Section 17.4.32 | |
| 80h | AES_REVISION | Section 17.4.33 | |
| 84h | AES_SYSCONFIG | Section 17.4.34 | |
| 8Ch | AES_IRQSTATUS | Section 17.4.35 | |
| 90h | AES_IRQENABLE | Section 17.4.36 | |
| B8h | CRYPTOCLKEN | Section 17.4.37 | |
| 820h | DTHE_AES_IM | AES Interrupt Mask Set register | Section 17.4.38 |
| 824h | DTHE_AES_RIS | AES Interrupt Raw Interrupt Status register | Section 17.4.39 |
| 828h | DTHE_AES_MIS | AES Interrupt Masked interrupt Status register | Section 17.4.40 |
| 82Ch | DTHE_AES_IC | AES Interrupt Clear Interrupt Status register | Section 17.4.41 |
AES_KEY2_6 is shown in Figure 17-14 and described in Table 17-4.
Return to Summary Table.
XTS second key, CBC-MAC third key.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_7 is shown in Figure 17-15 and described in Table 17-5.
Return to Summary Table.
XTS second key (MSW for 256-bit key), CBC-MAC third key (MSW).
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_4 is shown in Figure 17-16 and described in Table 17-6.
Return to Summary Table.
XTS/CCM second key, CBC-MAC third key (LSW).
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_5 is shown in Figure 17-17 and described in Table 17-7.
Return to Summary Table.
XTS second key (MSW for 192-bit key), CBC-MAC third key.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_2 is shown in Figure 17-18 and described in Table 17-8.
Return to Summary Table.
XTS/CCM/CBC-MAC second key, hash key input
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_3 is shown in Figure 17-19 and described in Table 17-9.
Return to Summary Table.
XTS second key (MSW for 128-bit key), CCM/CBC-MAC second key (MSW), hash key input (MSW).
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_0 is shown in Figure 17-20 and described in Table 17-10.
Return to Summary Table.
XTS/CCM/CBC-MAC second key (LSW), hash key input (LSW).
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY2_1 is shown in Figure 17-21 and described in Table 17-11.
Return to Summary Table.
XTS/CCM/CBC-MAC second key (LSW), hash key input.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_6 is shown in Figure 17-22 and described in Table 17-12.
Return to Summary Table.
Key (LSW for 256-bit key)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_7 is shown in Figure 17-23 and described in Table 17-13.
Return to Summary Table.
Key (MSW for 256-bit key)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_4 is shown in Figure 17-24 and described in Table 17-14.
Return to Summary Table.
Key (LSW for 192-bit key)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_5 is shown in Figure 17-25 and described in Table 17-15.
Return to Summary Table.
Key (MSW for 192-bit key)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_2 is shown in Figure 17-26 and described in Table 17-16.
Return to Summary Table.
Key ? Missing content here?
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_3 is shown in Figure 17-27 and described in Table 17-17.
Return to Summary Table.
Key (MSW for 128-bit key)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_0 is shown in Figure 17-28 and described in Table 17-18.
Return to Summary Table.
Key (LSW for 128-bit key)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_KEY1_1 is shown in Figure 17-29 and described in Table 17-19.
Return to Summary Table.
Key ? Missing content here?
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| KEY | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | KEY | R/W | 0h | Key data |
AES_IV_IN_0 is shown in Figure 17-30 and described in Table 17-20.
Return to Summary Table.
Initialization vector input (LSW)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | IV data |
AES_IV_IN_1 is shown in Figure 17-31 and described in Table 17-21.
Return to Summary Table.
Initialization vector input
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | IV data |
AES_IV_IN_2 is shown in Figure 17-32 and described in Table 17-22.
Return to Summary Table.
Initialization vector input
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | IV data |
AES_IV_IN_3 is shown in Figure 17-33 and described in Table 17-23.
Return to Summary Table.
Initialization vector input (MSW)
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | IV data |
AES_CTRL is shown in Figure 17-34 and described in Table 17-24.
Return to Summary Table.
Determines the mode of operation of the AES engine.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| CONTEXT_READY | SAVE_CONTEXT_READY | SAVE_CONTEXT | RESERVED | CCM_M | |||
| RO-1h | RO-0h | R/W-0h | R-X | R/W-0h | |||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| CCM_M | CCM_L | CCM | GCM | ||||
| R/W-0h | R/W-0h | R/W-0h | R/W-0h | ||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| CBCMAC | F9 | F8 | XTS | CFB | ICM | CTR_WIDTH | |
| R/W-0h | R/W-0h | R/W-0h | R/W-0h | R/W-0h | R/W-0h | R/W-0h | |
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| CTR_WIDTH | CTR | MODE | KEY_SIZE | DIRECTION | INPUT_READY | OUTPUT_READY | |
| R/W-0h | R/W-0h | R/W-0h | R/W-0h | R/W-0h | RO-0h | RO-0h | |
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31 | CONTEXT_READY | RO | 1h | If 1, this read-only status bit indicates that the context data registers can be overwritten, and the host is permitted to write the next context. |
| 30 | SAVE_CONTEXT_READY | RO | 0h | If 1, this read-only status bit indicates that an AES authentication TAG or IV blocks are available for the host to retrieve. This bit is only asserted if the ‘save_context’ bit is set to 1. The bit is mutually exclusive with the ‘context_ready’ bit. |
| 29 | SAVE_CONTEXT | R/W | 0h | This bit indicates that an authentication TAG or result IV must be stored as a result context. If this bit is set, context output DMA or interrupt are asserted if the operation is finished and related signals are enabled. |
| 28-25 | RESERVED | R | X | |
| 24-22 | CCM_M | R/W | 0h | Defines “M” that indicated the length of the authentication field for CCM operations; the authentication field length equals two times (the value of CCM-M plus one). The AES engine always returns a 128-bit authentication field, of which the M least significant bytes are valid. All values are supported. |
| 21-19 | CCM_L | R/W | 0h | Defines “L” that indicated the width of the length field for CCM operations; the length field in bytes equals the value of CMM-L plus one. Supported values for L are (programmed value): 2 (1), 4 (3) and 8 (7). |
| 18 | CCM | R/W | 0h | AES-CCM is selected; this is a combined mode, using AES for both authentication and encryption. No additional mode selection is required. 0h = Other mode selected 1h = CCM mode selected |
| 17-16 | GCM | R/W | 0h | AES-GCM mode is selected; this is a combined mode, using the Galois field multiplier GF(2128) for authentication and AES-CTR mode for encryption, the bits specify the GCM mode. 0h = No operation 1h = GHASH with H loaded and Y0-encrypted forced to zero 2h = GHASH with H loaded and Y0-encrypted calculated internally 3h = Autonomous GHASH (both H and Y0-encrypted calculated internally) |
| 15 | CBCMAC | R/W | 0h | AES-CBC MAC is selected; the Direction bit must be set to 1 for this mode. 0h = Other mode selected 1h = CBCMAC mode selected |
| 14 | F9 | R/W | 0h | AES f9 mode is selected; the AES key size must be set to 128-bit for this mode. 0h = Other mode selected 1h = f9 selected |
| 13 | F8 | R/W | 0h | AES f8 mode is selected; the AES key size must be set to 128-bit for this mode. 0h = Other mode selected 1h = f8 selected |
| 12-11 | XTS | R/W | 0h | AES-XTS operation is selected; the bits specify the XTS mode. 0h = No operation 1h = Previous/intermediate tweak value and j loaded (value is loaded through IV, j is loaded through the AAD length register) 2h = Key2, i and j loaded (i is loaded through IV, j is loaded through the AAD length register) 3h = Key2 and i loaded, j=0 (i is loaded through IV) |
| 10 | CFB | R/W | 0h | Full block AES cipher feedback mode (CFB128) is selected. 0h = Other mode selected 1h = CFB selected |
| 9 | ICM | R/W | 0h | AES integer counter mode (ICM) is selected, this is a counter mode with a 16-bit wide counter. 0h = Other mode selected 1h = ICM mode selected |
| 8-7 | CTR_WIDTH | R/W | 0h | Specifies the counter width for AES-CTR mode 0h = Counter is 32 bits 1h = Counter is 64 bits 2h = Counter is 128 bits 3h = Counter is 192 bits |
| 6 | CTR | R/W | 0h | This bit must also be set for GCM and CCM, when encryption or decryption is required. 0h = Other mode selected 1h = Counter mode |
| 5 | MODE | R/W | 0h | ECB/CBC mode 0h = ECB mode 1h = CBC mode |
| 4-3 | KEY_SIZE | R/W | 0h | Key Size 0h = Reserved 1h = Key is 128 bits 2h = Key is 192 bits 3h = Key is 256 |
| 2 | DIRECTION | R/W | 0h | If set to 1, an encrypt operation is performed. If set to 0, a decrypt operation is performed. 0h = Decryption is selected 1h = Encryption is selected |
| 1 | INPUT_READY | RO | 0h | If 1, this read-only status bit indicates that the 16-byte input buffer is empty, and the host is permitted to write the next block of data. |
| 0 | OUTPUT_READY | RO | 0h | If 1, this read-only status bit indicates that an AES output block is available for the host to retrieve. |
AES_C_LENGTH_0 is shown in Figure 17-35 and described in Table 17-25.
Return to Summary Table.
Crypto data length registers (LSW and MSW) store the cryptographic data length in bytes for all modes. Once processing with this context is started, this length decrements to zero. Data lengths up to (261 – 1) bytes are allowed.
For GCM, any value up to 236 – 32 bytes can be used. This is because a 32-bit counter mode is used; the maximum number of 128-bit blocks is 232 – 2, resulting in a maximum number of bytes of 236 – 32.
A write to this register triggers the engine to start using this context. This is valid for all modes except GCM and CCM.
For the combined modes, this length does not include the authentication-only data; the authentication length is specified in the AES_AUTH_LENGTH register below.
All modes must have a length > 0. For the combined modes, it is allowed to have one of the lengths equal to zero.
For the basic encryption modes (ECB/CBC/CTR/ICM/CFB128) it is allowed to program zero to the length field; in that case the length is assumed infinite.
All data must be byte (8-bit) aligned; bit aligned data streams are not supported by the AES Engine.
For a host read operation, these registers return all-zeroes.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| LENGTH | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | LENGTH | R/W | 0h | Data length (LSW) |
AES_C_LENGTH_1 is shown in Figure 17-36 and described in Table 17-26.
Return to Summary Table.
Crypto data length registers (LSW and MSW) store the cryptographic data length in bytes for all modes. Once processing with this context is started, this length decrements to zero. Data lengths up to (261 – 1) bytes are allowed.
For GCM, any value up to 236 – 32 bytes can be used. This is because a 32-bit counter mode is used; the maximum number of 128-bit blocks is 232 – 2, resulting in a maximum number of bytes of 236 – 32.
A write to this register triggers the engine to start using this context. This is valid for all modes except GCM and CCM.
For the combined modes, this length does not include the authentication-only data; the authentication length is specified in the AES_AUTH_LENGTH register below.
All modes must have a length > 0. For the combined modes, it is allowed to have one of the lengths equal to zero.
For the basic encryption modes (ECB/CBC/CTR/ICM/CFB128) it is allowed to program zero to the length field; in that case the length is assumed infinite.
All data must be byte (8-bit) aligned; bit aligned data streams are not supported by the AES Engine.
For a host read operation, these registers return all-zeroes.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | LENGTH | ||||||||||||||
| R-X | R/W-0h | ||||||||||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| LENGTH | |||||||||||||||
| R/W-0h | |||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-29 | RESERVED | R | X | |
| 28-0 | LENGTH | R/W | 0h | Data length (MSW) |
AES_AUTH_LENGTH is shown in Figure 17-37 and described in Table 17-27.
Return to Summary Table.
AAD data length. The authentication length register store the authentication data length in bytes for combined modes only (GCM or CCM).
Supported AAD-lengths for CCM are from 0 to (216 – 28) bytes. For GCM any value up to (232 – 1) bytes can be used. Once processing with this context is started, this length decrements to zero.
A write to this register triggers the engine to start using this context for GCM and CCM. For XTS this register is optionally used to load ‘j’. Loading of ‘j’ is only required if ‘j’ != 0. ‘j’ is a 28-bit value and must be written to bits [31-4] of this register. ‘j’ represents the sequential number of the 128-bit block inside the data unit. For the first block in a unit, this value is zero. It is not required to provide a ‘j’ for each new data block within a unit. It is possible to start with a ‘j’ unequal to zero. For a Host read operation, these registers return all-zeroes.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| AUTH | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | AUTH | R/W | 0h | Data |
AES_DATA_IN_0 is shown in Figure 17-38 and described in Table 17-28.
Return to Summary Table.
Data register to read and write plaintext and ciphertext (MSW).
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | Data to encrypt or decrypt |
AES_DATA_IN_1 is shown in Figure 17-39 and described in Table 17-29.
Return to Summary Table.
Data register to read and write plaintext and ciphertext.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | Data to encrypt or decrypt |
AES_DATA_IN_2 is shown in Figure 17-40 and described in Table 17-30.
Return to Summary Table.
Data register to read and write plaintext and ciphertext.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | Data to encrypt or decrypt |
AES_DATA_IN_3 is shown in Figure 17-41 and described in Table 17-31.
Return to Summary Table.
Data register to read and write plaintext and ciphertext (LSW).
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DATA | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DATA | R/W | 0h | Data to encrypt or decrypt |
AES_TAG_OUT_0 is shown in Figure 17-42 and described in Table 17-32.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| HASH | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | HASH | R/W | 0h | Hash result (MSW) |
AES_TAG_OUT_1 is shown in Figure 17-43 and described in Table 17-33.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| HASH | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | HASH | R/W | 0h | Hash result (MSW) |
AES_TAG_OUT_2 is shown in Figure 17-44 and described in Table 17-34.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| HASH | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | HASH | R/W | 0h | Hash result (MSW) |
AES_TAG_OUT_3 is shown in Figure 17-45 and described in Table 17-35.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| HASH | |||||||||||||||||||||||||||||||
| R/W-0h | |||||||||||||||||||||||||||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | HASH | R/W | 0h | Hash result (LSW) |
AES_REVISION is shown in Figure 17-46 and described in Table 17-36.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| SCHEME | RESERVED | FUNC | |||||
| RO-0h | R-X | RO-0h | |||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| FUNC | |||||||
| RO-0h | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| R_RTL | X_MAJOR | ||||||
| RO-0h | RO-0h | ||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| CUSTOM | Y_MINOR | ||||||
| RO-0h | RO-0h | ||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-30 | SCHEME | RO | 0h | Used to distinguish between old scheme and current. 0h = (Read): Legacy ASP or WTBU scheme 1h = (Read): Highlander 0.8 scheme |
| 29-28 | RESERVED | R | X | |
| 27-16 | FUNC | RO | 0h | Function indicates a software compatible module family. If there is no level of software compatibility, a new Func number (and hence REVISION) should be assigned. |
| 15-11 | R_RTL | RO | 0h | RTL Version (R), maintained by IP design owner. RTL follows a numbering such as X.Y.R.Z which are explained in this table. R changes ONLY when: (1) PDS uploads occur which may have been due to spec changes (2) Bug fixes occur (3) Resets to 0 when X or Y changes. Design team has an internal Z (customer-invisible) number which increments on every drop that happens due to DV and RTL updates. Z resets to 0 when R increments. |
| 10-8 | X_MAJOR | RO | 0h | Major Revision (X), maintained by IP specification owner. X changes ONLY when: (1) There is a major feature addition. An example would be adding master mode to Utopia Level2. The Func field (or class/type in old PID format) remains the same. X does NOT change due to: (1) Bug fixes (2) Change in feature parameters. |
| 7-6 | CUSTOM | RO | 0h | Indicates a special version for a particular device. Consequence of use may avoid use of standard Chip Support Library (CSL) / Drivers. 0h = (Read): Non-custom (standard) revision |
| 5-0 | Y_MINOR | RO | 0h | Minor Revision (Y), maintained by IP specification owner. Y changes ONLY when: (1) Features are scaled (up or down). Flexibility exists in that this feature scalability may either be represented in the Y change or a specific register in the IP that indicates which features are exactly available. (2) When feature creeps from Is-Not list to Is list. But this may not be the case once it sees silicon; in which case X changes. Y does NOT change due to: (1) Bug fixes (2) Typos or clarifications (3) major functional or feature changes, additions, and deletions. Instead, these changes may be reflected through R, S, and X, as applicable. Spec owner maintains a customer-invisible number 'S' which changes due to: (1) Typos and clarifications (2) Bug documentation. Note that this bug is not due to a spec change but due to implementation. Nevertheless, the spec tracks the IP bugs. An RTL release (say for silicon PG1.1) that occurs due to bug fix should document the corresponding spec number (X.Y.S) in its release notes. |
AES_SYSCONFIG is shown in Figure 17-47 and described in Table 17-37.
Return to Summary Table.
This register configures the DMA signals.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | MAP_CONTEXT_OUT_ON_DATA_OUT | DMA_REQ_CONTEXT_OUT_EN | |||||
| R-X | R/W-0h | R/W-0h | |||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| DMA_REQ_CONTEXT_IN_EN | DMA_REQ_DATA_OUT_EN | DMA_REQ_DATA_IN_EN | RESERVED | ||||
| R/W-0h | R/W-0h | R/W-0h | R-X | ||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-10 | RESERVED | R | X | |
| 9 | MAP_CONTEXT_OUT_ON_DATA_OUT | R/W | 0h | If set to 1, the two context out requests (dma_req_context_out_en, Bit [8] above, and context_out interrupt enable, Bit [3] of AES_IRQENABLE register) are mapped on the corresponding data output request bit. In this case, the original ‘context out’ bit values are ignored. |
| 8 | DMA_REQ_CONTEXT_OUT_EN | R/W | 0h | If set to 1, the DMA context output request is enabled (for context data out, for example, TAG for authentication modes). 0h = DMA disabled 1h = DMA enabled |
| 7 | DMA_REQ_CONTEXT_IN_EN | R/W | 0h | If set to 1, the DMA context request is enabled. 0h = DMA disabled 1h = DMA enabled |
| 6 | DMA_REQ_DATA_OUT_EN | R/W | 0h | If set to 1, the DMA output request is enabled. 0h = DMA disabled 1h = DMA enabled |
| 5 | DMA_REQ_DATA_IN_EN | R/W | 0h | If set to 1, the DMA input request is enabled. 0h = DMA disabled 1h = DMA enabled |
| 4-0 | RESERVED | R | X |
AES_IRQSTATUS is shown in Figure 17-48 and described in Table 17-38.
Return to Summary Table.
This register indicates the interrupt status. If one of the interrupt bits is set, the interrupt output is asserted.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | CONTEXT_OUT | DATA_OUT | DATA_IN | CONTEXT_IN | |||
| R-X | R/W-0h | R/W-0h | R/W-0h | R/W-0h | |||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-4 | RESERVED | R | X | |
| 3 | CONTEXT_OUT | R/W | 0h | This bit indicates authentication tag (and IV) interrupts are active, and triggers the interrupt output. |
| 2 | DATA_OUT | R/W | 0h | This bit indicates data output interrupt is active, and triggers the interrupt output |
| 1 | DATA_IN | R/W | 0h | This bit indicates data input interrupt is active, and triggers the interrupt output |
| 0 | CONTEXT_IN | R/W | 0h | This bit indicates context interrupt is active, and triggers the interrupt output. |
AES_IRQENABLE is shown in Figure 17-49 and described in Table 17-39.
Return to Summary Table.
This register contains an enable bit for each unique interrupt generated by the module. It matches the layout of AES_IRQSTATUS register. An interrupt is enabled when the bit in this register is set to 1. An interrupt that is enabled is propagated to the SINTREQUEST_x output. All interrupts must be enabled explicitly by writing this register.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | CONTEXT_OUT | DATA_OUT | DATA_IN | CONTEXT_IN | |||
| R-X | R/W-0h | R/W-0h | R/W-0h | R/W-0h | |||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-4 | RESERVED | R | X | |
| 3 | CONTEXT_OUT | R/W | 0h | This bit indicates authentication tag (and IV) interrupts are active, and triggers the interrupt output. |
| 2 | DATA_OUT | R/W | 0h | This bit indicates data output interrupt is active, and triggers the interrupt output |
| 1 | DATA_IN | R/W | 0h | This bit indicates data input interrupt is active, and triggers the interrupt output |
| 0 | CONTEXT_IN | R/W | 0h | This bit indicates context interrupt is active, and triggers the interrupt output. |
CRYPTOCLKEN is shown in Figure 17-50 and described in Table 17-40.
Return to Summary Table.
Physical address: 0x4402 50B8. CRYPTO_CLK_GATING
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | RUNCLKEN | ||||||
| R-X | R/W-0h | ||||||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-1 | RESERVED | R | X | |
| 0 | RUNCLKEN | R/W | 0h | CRYPTO_RUN_CLK_ENABLE: 0h = Enable the crypto clock during run 1h = Disable the crypto clock during run |
DTHE_AES_IM is shown in Figure 17-51 and described in Table 17-41.
Return to Summary Table.
The interrupt mask set register controls which interrupt source interrupts the processor.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | Dout | Din | Cout | Cin | |||
| R-X | R/W-1h | R/W-1h | R/W-1h | R/W-1h | |||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-4 | RESERVED | R | X | |
| 3 | Dout | R/W | 1h | Data out: This interrupt is raised when DMA finishes writing last word of the process result. |
| 2 | Din | R/W | 1h | Data in: This interrupt is raised when DMA writes last word of input data to internal FIFO of the engine. |
| 1 | Cout | R/W | 1h | Context out: This interrupt is raised when DMA completes the output context movement from internal register. |
| 0 | Cin | R/W | 1h | Context in: This interrupt is raised when DMA completes context write to internal register. |
DTHE_AES_RIS is shown in Figure 17-52 and described in Table 17-42.
Return to Summary Table.
AES Raw Interrupt status register.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | Dout | Din | Cout | Cin | |||
| R-X | R-0h | R-0h | R-0h | R-0h | |||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-4 | RESERVED | R | X | |
| 3 | Dout | R | 0h | Output data movement is done |
| 2 | Din | R | 0h | Input data movement is done |
| 1 | Cout | R | 0h | Context output is done |
| 0 | Cin | R | 0h | Context input is done |
DTHE_AES_MIS is shown in Figure 17-53 and described in Table 17-43.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | Dout | Din | Cout | Cin | |||
| R-X | R-0h | R-0h | R-0h | R-0h | |||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-4 | RESERVED | R | X | |
| 3 | Dout | R | 0h | Output data movement is done |
| 2 | Din | R | 0h | Input data movement is done |
| 1 | Cout | R | 0h | Context output is done |
| 0 | Cin | R | 0h | Context input is done |
DTHE_AES_IC is shown in Figure 17-54 and described in Table 17-44.
Return to Summary Table.
| 31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
| RESERVED | |||||||
| R-X | |||||||
| 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
| RESERVED | |||||||
| R-X | |||||||
| 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
| RESERVED | |||||||
| R-X | |||||||
| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
| RESERVED | Dout | Din | Cout | Cin | |||
| R-X | WC-0h | WC-0h | WC-0h | WC-0h | |||
| LEGEND: R/W = Read/Write; R = Read only; W1toCl = Write 1 to clear bit; -n = value after reset |
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-4 | RESERVED | R | X | |
| 3 | Dout | WC | 0h | Clear “output data movement done” flag |
| 2 | Din | WC | 0h | Clear “input data movement done” flag |
| 1 | Cout | WC | 0h | Clear “context output done” flag |
| 0 | Cin | WC | 0h | Clear “context input done” flag |