Freescale Semiconductor SEC2SWUG Operation ID opId Masks, Return Codes, Channel Defines

Page 8

User Interface

Table 3. Channel Defines

DefineDescription

NUM_AFHAS Number of ARC4 CHAs

NUM_DESAS Number of DES CHAs

NUM_MDHAS Number of MD CHAs

NUM_RNGAS Number of RNG CHAs

NUM_PKHAS Number of PK CHAs

NUM_AESAS Number of AESA CHAs

The NUM_CHAS definition contains the total number of crypto hardware accelerators (CHAs) in SEC2 and is simply defined as the sum of the individual channels.

The device name is defined as /dev/sec2.

3.3.3 Operation ID (opId) Masks

Operation Ids can be broken down into two parts, the group or type of request and the request index or descriptor within a group or type. This is provided to help understand the structuring of the opIds. It is not specifically needed within a user application.

Table 4. Request Operation ID Mask

Define

Description

Value

DESC_TYPE_MASK

The mask for the group or type of an opId

0xFF00

DESC_NUM_MASK

The mask for the request index or descriptor within that group or type

0x00FF

3.3.4 Return Codes

A complete list of the error status results that may be returned to the callback routines follows:

Table 5. Callback Error Status Return Code

Define

SEC2_SUCCESS

SEC2_MEMORY_ALLOCATION

SEC2_INVALID_CHANNEL

SEC2_INVALID_CHA_TYPE SEC2_INVALID_OPERATION_ID SEC2_CHANNEL_NOT_AVAILABLE

Description

Value

Successful completion of request

0

Driver can’t obtain memory from the host operating

0xE004FFFF

system

 

Channel specification was out of range. This exists for

0xE004FFFE

legacy compatibility, and has no relevance for SEC2

 

Requested CHA doesn’t exist

0xE004FFFD

Requested opID is out of range for this request type

0xE004FFFC

Requested channel was not available. This error

0xE004FFFB

exists for legacy compatibility reasons, and has no

 

relevance for SEC2

 

SEC 2.0 Reference Device Driver User’s Guide, Rev. 0

8

PRELIMINARY—SUBJECT TO CHANGE WITHOUT NOTICE

Freescale Semiconductor

Image 8
Contents Overview Freescale SemiconductorAcronyms and Abbreviations OverviewTerm Meaning SEC 2.0 Reference Device Driver User’s Guide, RevDevice Driver Components Device Driver StructureDevice Driver Components End-User ApplicationInterrupt Service Routine Driver Initialization RoutineRequest Dispatch Routine Process Request RoutineDeferred Service Routine User InterfaceApplication Interface User InterfaceError Handling = DpdaesacbcencryptcryptGlobal Definitions 1 I/O Control CodesChannel Definitions Second and Third Arguments in the ioctl FunctionCallback Error Status Return Code Operation ID opId MasksReturn Codes Channel DefinesSEC2ADDRESSPROBLEM SEC2CHAERRORSEC2PARITYSYSTEMERROR SEC2TEAERRORSEC2CANCELLEDREQUEST Miscellaneous Request StructuresSEC2INVALIDADDRESS Define DescriptionProcess Request Structures StatusreqNotifyonerror Scatter-Gather Buffer ManagementDirect Scatter-Gather Usage Example Individual Request Type Descriptions Random Number RequestsDES Requests RngreqARC4 Requests Descryptreq1 ARC4LOADCTXCRYPTREQ Descbccryptreq Valid Descriptors opIdARC4LOADKEYCRYPTUNLOADCTXREQ Valid Descriptor opId 2 ARC4LOADKEYCRYPTUNLOADCTXREQARC4LOADCTXCRYPTREQ Valid Descriptor opId Hashreq Valid Descriptors 0x4400 opId Hash RequestsHashreq Hashreq Valid Descriptors 0x4500 opId Hmac RequestsHmacpadreq Hmacpadreq Valid Descriptors opId AES RequestsAesacryptreq Integer Public Key Requests ModexpreqAesacryptreq Valid Descriptors opId Modexpreq Valid Descriptor opIdModssexpreq MODR2MODNREQModssexpreq Valid Descriptor opId DpdmmssrsaexpModrrmodpreq 5 MOD2OPREQModrrmodpreq Valid Descriptor opId 0x5300MOD2OPREQ Valid Descriptors opId Value Function Description MOD2OPREQ Valid Descriptors opId ECC Public Key RequestsEccpointreq 2 ECC2OPREQ Eccpointreq Valid Descriptors opIdEccspkbuildreq ECC2OPREQ Valid Descriptors opIdEccspkbuildreq Valid Descriptor opId DpdecspkbuildulctxIPSec Requests EccptadddblreqIpseccbcreq Eccptadddblreq Valid Descriptor opIdIpseccbcreq Valid Descriptors opId Descriptors Ipsececbreq Ipsececbreq Valid Descriptors opIdIpsecaescbcreq Ipsecaescbcreq Valid Descriptors opIdIpsecaesecbreq Ipsecespreq Ipsecaesecbreq Valid Descriptors opIdIpsecespreq Valid Descriptors opId Dpdipsecespinsdescbcdcrptshapad DPDIPSECESPOUTTDESCBCCRPTMD5PADDpdipsecespouttdescbccrptshapad DPDIPSECESPINTDESCBCDCRPTMD5PAD10 802.11 Protocol Requests Srtp Protocol RequestsCcmpreq SrtpreqSrtpreq Valid Descriptors opId Sample CodeDES Sample Ipsec Sample PRELIMINARY-SUBJECT to Change Without Notice Operation InstallationLinux Environment Driver Operation in User Mode VxWorks EnvironmentDriver Module License Macro VxWorks EnvironmentPorting Building the Interface ModulesBSP Integration VxWorks Interface Module VariablesSource Files Interrupt Service RoutineHeader Files Distribution Archive Conditional CompilationDebug Messaging How to Reach Us

SEC2SWUG specifications

Freescale Semiconductor, a prominent player in the semiconductor industry, has made significant strides in developing robust solutions tailored for the automotive and industrial sectors. One such innovation is the SEC2SWUG (Security Configuration to Software User Guide), a comprehensive framework designed to enhance security protocols across various applications.

The SEC2SWUG is particularly vital in an era where cybersecurity threats are increasingly sophisticated. This tool is built to help developers implement security measures seamlessly during the software design phase, ensuring products are resilient against potential vulnerabilities. One of the main features of the SEC2SWUG is its versatility; it can be applied across a wide range of microcontrollers and processors offered by Freescale. This is particularly advantageous for engineers who require a consistent security approach across different platforms.

In terms of technology, the SEC2SWUG incorporates advanced cryptographic algorithms, allowing for data encryption, decryption, and authentication processes. This ensures that sensitive information remains secure, particularly in automotive applications where vehicle-to-everything (V2X) communication is becoming paramount. Moreover, the guide details the implementation of secure boot processes, which verify the integrity of firmware before it executes, bolstering overall system security.

Another key characteristic of SEC2SWUG is its user-friendliness. Freescale has focused on creating a resource that not only provides theoretical knowledge but also practical guidelines, making it easier for developers to integrate security protocols into their projects. The guide features clear annotations, example code snippets, and troubleshooting tips, which enhance the developer experience and facilitate a smoother transition from concept to execution.

Additionally, SEC2SWUG is designed to be scalable. As industries evolve, the demand for security measures will only grow, and this framework ensures that developers can adapt their solutions accordingly. Whether working on embedded systems, IoT applications, or complex automotive networks, the SEC2SWUG offers a robust security foundation.

In conclusion, Freescale Semiconductor's SEC2SWUG is a vital tool for engineers and developers looking to embed security into their applications. With its focus on advanced technologies and user-centric design, the SEC2SWUG stands at the forefront of secure software development, addressing the critical need for safety in interconnected systems.