Freescale Semiconductor SEC2SWUG specifications Error Handling, = Dpdaesacbcencryptcrypt

Page 6

User Interface

3.2 Error Handling

Due to the asynchronous nature of the device/driver, there are two primary sources of errors:

Syntax or logic. These are returned in the status member of the 'user request' argument and as a return code from ioctl function. Errors of this type are detected by the driver, not by hardware.

Protocol/procedure. These errors are returned only in the status member of the user request argument. Errors of this type are detected by hardware in the course of their execution.

Consequently, the end-user application needs two levels of error checking, the first one after the return from the ioctl function, and the second one after the completion of the request. The second level is possible only if the request was done with at least the notify_on_error member of the user request structure. If the notification/callback function has not been requested, this level of error will be lost.

A code example of the two levels of errors are as follows, using an AES request as an example:

AESA_CRYPT_REQ aesdynReq;

 

..

 

aesdynReq.opId

= DPD_AESA_CBC_ENCRYPT_CRYPT;

aesdynReq.channel

= 0;

aesdynReq.notify

= (void *) notifAes;

aesdynReq.notify_on_error = (void *) notifAes;

aesdynReq.status

= 0;

aesdynReq.inIvBytes

= 16;

aesdynReq.inIvData

= iv_in;

aesdynReq.keyBytes

= 32;

aesdynReq.keyData

= AesKey;

aesdynReq.inBytes

= packet_length;

aesdynReq.inData

= aesData;

aesdynReq.outData

= aesResult;

aesdynReq.outIvBytes

= 16;

aesdynReq.outIvData

= iv_out;

aesdynReq.nextReq

= 0;

status = Ioctl(device, IOCTL_PROC_REQ, &aesdynReq);

if (status != 0) {

printf ("Syntax-Logic Error in dynamic descriptor 0x%x\n", status); .

.

.

}.

SEC 2.0 Reference Device Driver User’s Guide, Rev. 0

6

PRELIMINARY—SUBJECT TO CHANGE WITHOUT NOTICE

Freescale Semiconductor

Image 6
Contents Overview Freescale SemiconductorTerm Meaning Acronyms and AbbreviationsOverview SEC 2.0 Reference Device Driver User’s Guide, RevDevice Driver Components Device Driver ComponentsDevice Driver Structure End-User ApplicationRequest Dispatch Routine Interrupt Service RoutineDriver Initialization Routine Process Request RoutineApplication Interface Deferred Service RoutineUser Interface User InterfaceError Handling = DpdaesacbcencryptcryptChannel Definitions Global Definitions1 I/O Control Codes Second and Third Arguments in the ioctl FunctionReturn Codes Callback Error Status Return CodeOperation ID opId Masks Channel DefinesSEC2PARITYSYSTEMERROR SEC2ADDRESSPROBLEMSEC2CHAERROR SEC2TEAERRORSEC2INVALIDADDRESS SEC2CANCELLEDREQUESTMiscellaneous Request Structures Define DescriptionProcess Request Structures StatusreqNotifyonerror Scatter-Gather Buffer ManagementDirect Scatter-Gather Usage Example DES Requests Individual Request Type DescriptionsRandom Number Requests Rngreq1 ARC4LOADCTXCRYPTREQ ARC4 RequestsDescryptreq Descbccryptreq Valid Descriptors opId2 ARC4LOADKEYCRYPTUNLOADCTXREQ ARC4LOADCTXCRYPTREQ Valid Descriptor opIdARC4LOADKEYCRYPTUNLOADCTXREQ Valid Descriptor opId Hash Requests HashreqHashreq Valid Descriptors 0x4400 opId Hmac Requests HmacpadreqHashreq Valid Descriptors 0x4500 opId AES Requests AesacryptreqHmacpadreq Valid Descriptors opId Aesacryptreq Valid Descriptors opId Integer Public Key RequestsModexpreq Modexpreq Valid Descriptor opIdModssexpreq Valid Descriptor opId ModssexpreqMODR2MODNREQ DpdmmssrsaexpModrrmodpreq Valid Descriptor opId Modrrmodpreq5 MOD2OPREQ 0x5300MOD2OPREQ Valid Descriptors opId Value Function Description ECC Public Key Requests EccpointreqMOD2OPREQ Valid Descriptors opId 2 ECC2OPREQ Eccpointreq Valid Descriptors opIdEccspkbuildreq Valid Descriptor opId EccspkbuildreqECC2OPREQ Valid Descriptors opId DpdecspkbuildulctxIpseccbcreq IPSec RequestsEccptadddblreq Eccptadddblreq Valid Descriptor opIdIpseccbcreq Valid Descriptors opId Descriptors Ipsececbreq Ipsececbreq Valid Descriptors opIdIpsecaescbcreq Ipsecaescbcreq Valid Descriptors opIdIpsecaesecbreq Ipsecespreq Ipsecaesecbreq Valid Descriptors opIdIpsecespreq Valid Descriptors opId Dpdipsecespouttdescbccrptshapad DpdipsecespinsdescbcdcrptshapadDPDIPSECESPOUTTDESCBCCRPTMD5PAD DPDIPSECESPINTDESCBCDCRPTMD5PADCcmpreq 10 802.11 Protocol RequestsSrtp Protocol Requests SrtpreqSample Code DES SampleSrtpreq Valid Descriptors opId Ipsec Sample PRELIMINARY-SUBJECT to Change Without Notice Installation Linux EnvironmentOperation Driver Module License Macro Driver Operation in User ModeVxWorks Environment VxWorks EnvironmentBSP Integration PortingBuilding the Interface Modules VxWorks Interface Module VariablesInterrupt Service Routine Header FilesSource Files Conditional Compilation Debug MessagingDistribution Archive How to Reach Us

SEC2SWUG specifications

Freescale Semiconductor, a prominent player in the semiconductor industry, has made significant strides in developing robust solutions tailored for the automotive and industrial sectors. One such innovation is the SEC2SWUG (Security Configuration to Software User Guide), a comprehensive framework designed to enhance security protocols across various applications.

The SEC2SWUG is particularly vital in an era where cybersecurity threats are increasingly sophisticated. This tool is built to help developers implement security measures seamlessly during the software design phase, ensuring products are resilient against potential vulnerabilities. One of the main features of the SEC2SWUG is its versatility; it can be applied across a wide range of microcontrollers and processors offered by Freescale. This is particularly advantageous for engineers who require a consistent security approach across different platforms.

In terms of technology, the SEC2SWUG incorporates advanced cryptographic algorithms, allowing for data encryption, decryption, and authentication processes. This ensures that sensitive information remains secure, particularly in automotive applications where vehicle-to-everything (V2X) communication is becoming paramount. Moreover, the guide details the implementation of secure boot processes, which verify the integrity of firmware before it executes, bolstering overall system security.

Another key characteristic of SEC2SWUG is its user-friendliness. Freescale has focused on creating a resource that not only provides theoretical knowledge but also practical guidelines, making it easier for developers to integrate security protocols into their projects. The guide features clear annotations, example code snippets, and troubleshooting tips, which enhance the developer experience and facilitate a smoother transition from concept to execution.

Additionally, SEC2SWUG is designed to be scalable. As industries evolve, the demand for security measures will only grow, and this framework ensures that developers can adapt their solutions accordingly. Whether working on embedded systems, IoT applications, or complex automotive networks, the SEC2SWUG offers a robust security foundation.

In conclusion, Freescale Semiconductor's SEC2SWUG is a vital tool for engineers and developers looking to embed security into their applications. With its focus on advanced technologies and user-centric design, the SEC2SWUG stands at the forefront of secure software development, addressing the critical need for safety in interconnected systems.