www.ti.com
2.4.6.1 SA2 Hardware Engine Utilization ......................................................................... 34
2.4.6.2 Supported Cipher Modes .................................................................................. 34
2.4.6.3 Supported Authentication Modes ......................................................................... 34
2.4.6.4 Protocol-Specific SA2 LLD Channel APIs ............................................................... 34
2.4.6.5 Descriptor Protocol-Specific Information Section....................................................... 37
2.5 Command Labels........................................................................................................... 38
2.6 Descriptor Software Information Words ................................................................................. 39
2.7 Security Contexts........................................................................................................... 39
2.7.1 Generating Security Contexts ................................................................................... 39
2.7.2 Security Context Memory Allocation............................................................................ 40
2.8 Security Context Cache ................................................................................................... 40
2.8.1 Security Context Fetch ........................................................................................... 40
2.8.2 Security Context Tiers ............................................................................................ 40
2.8.3 Security Context Identification and Security Context Pointers .............................................. 41
2.8.4 Security Context Cache Control Flags ......................................................................... 41
2.8.5 Context Cache Algorithm......................................................................................... 41
2.9 Packet Header Processor Modules...................................................................................... 41
2.9.1 Command Label Generation..................................................................................... 42
2.9.2 Authentication Tag Verification.................................................................................. 42
2.9.3 Authentication Tag Insertion..................................................................................... 42
2.9.4 Packet Replay Protection ........................................................................................ 42
2.9.5 PHP1................................................................................................................ 42
2.9.5.1 Processing IPsec AH packets with PHP1 ............................................................... 43
2.9.5.2 Processing IPsec ESP Packets with PHP1 ............................................................. 43
2.9.6 PHP 3............................................................................................................... 43
2.9.7 PHP2................................................................................................................ 44
2.9.7.1 Processing SRTP Packets with PHP2 ................................................................... 44
2.9.7.2 Processing Air Cipher packets with PHP2............................................................... 44
2.9.8 Procedure for Downloading Firmware onto the PHP PDSPs ............................................... 45
2.9.8.1 Procedure for Downloading Firmware on the PHP PDSPs ........................................... 45
2.10 Encryption and Decryption Engine....................................................................................... 45
2.11 Authentication Engine ..................................................................................................... 46
2.12 Air Cipher Engine........................................................................................................... 46
2.13 Public Key Accelerator..................................................................................................... 47
2.13.1 Programming Considerations................................................................................... 47
2.13.2 Functional Description PKA Components..................................................................... 47
2.13.3 Configuration and Status Registers............................................................................ 48
2.13.3.1 PKA_APTR, PKA_BPTR, PKA_CPTR, PKA_DPTR Registers....................................... 48
2.13.3.2 PKA_ALENGTH and PKA_BLENGTH Registers....................................................... 49
2.13.3.3 PKA_SHIFT Register....................................................................................... 49
2.13.3.4 PKA_FUNCTION Register................................................................................. 49
2.13.3.5 PKA_COMPARE Register................................................................................. 49
2.13.3.6 PKA_MSW Register ........................................................................................ 50
2.13.3.7 PKA_DIVMSW Register.................................................................................... 50
2.13.4 Vector RAM ....................................................................................................... 50
2.13.4.1 RAM Size Requirements................................................................................... 50
2.13.5 PKA Input Requirements........................................................................................ 51
2.13.6 Result Vector RAM Allocation .................................................................................. 52
2.14 True Random Number Generator........................................................................................ 52
2.14.1 Programming Considerations................................................................................... 52
2.14.2 Initial Latency after Reset ....................................................................................... 53
2.14.3 Random Number Generation................................................................................... 53
2.14.4 Read Random Number.......................................................................................... 53
3
SPRUHZ1–August 2014 Contents
Submit Documentation Feedback
Copyright © 2014, Texas Instruments Incorporated