@@ -98,10 +98,10 @@ ATCA_STATUS atcab_init_ext(ATCADevice* device, ATCAIfaceCfg *cfg)
98
98
}
99
99
#endif
100
100
101
- #ifdef ATCA_ATECC608A_SUPPORT
102
- if (cfg -> devtype == ATECC608A )
101
+ #ifdef ATCA_ATECC608_SUPPORT
102
+ if (cfg -> devtype == ATECC608 )
103
103
{
104
- if ((status = atcab_read_bytes_zone ( ATCA_ZONE_CONFIG , 0 , ATCA_CHIPMODE_OFFSET , & (* device )-> mCommands -> clock_divider , 1 )) != ATCA_SUCCESS )
104
+ if ((status = calib_read_bytes_zone ( * device , ATCA_ZONE_CONFIG , 0 , ATCA_CHIPMODE_OFFSET , & (* device )-> mCommands -> clock_divider , 1 )) != ATCA_SUCCESS )
105
105
{
106
106
return status ;
107
107
}
@@ -368,7 +368,7 @@ ATCA_STATUS atcab_aes(uint8_t mode, uint16_t key_id, const uint8_t* aes_in, uint
368
368
369
369
if (atcab_is_ca_device (dev_type ))
370
370
{
371
- #if defined(ATCA_ATECC608A_SUPPORT )
371
+ #if defined(ATCA_ATECC608_SUPPORT )
372
372
status = calib_aes (_gDevice , mode , key_id , aes_in , aes_out );
373
373
#endif
374
374
}
@@ -402,7 +402,7 @@ ATCA_STATUS atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t ke
402
402
403
403
if (atcab_is_ca_device (dev_type ))
404
404
{
405
- #if defined(ATCA_ATECC608A_SUPPORT )
405
+ #if defined(ATCA_ATECC608_SUPPORT )
406
406
status = calib_aes_encrypt (device , key_id , key_block , plaintext , ciphertext );
407
407
#endif
408
408
}
@@ -454,7 +454,7 @@ ATCA_STATUS atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t ke
454
454
455
455
if (atcab_is_ca_device (dev_type ))
456
456
{
457
- #if defined(ATCA_ATECC608A_SUPPORT )
457
+ #if defined(ATCA_ATECC608_SUPPORT )
458
458
status = calib_aes_decrypt (device , key_id , key_block , ciphertext , plaintext );
459
459
#endif
460
460
}
@@ -502,7 +502,7 @@ ATCA_STATUS atcab_aes_gfm(const uint8_t* h, const uint8_t* input, uint8_t* outpu
502
502
503
503
if (atcab_is_ca_device (dev_type ))
504
504
{
505
- #if defined(ATCA_ATECC608A_SUPPORT )
505
+ #if defined(ATCA_ATECC608_SUPPORT )
506
506
status = calib_aes_gfm (_gDevice , h , input , output );
507
507
#endif
508
508
}
@@ -596,7 +596,7 @@ ATCA_STATUS atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t* ctx, uint16_t key_id, ui
596
596
}
597
597
598
598
/** \brief Process Additional Authenticated Data (AAD) using GCM mode and a
599
- * key within the ATECC608A device.
599
+ * key within the ATECC608 device.
600
600
*
601
601
* This can be called multiple times. atcab_aes_gcm_init() or
602
602
* atcab_aes_gcm_init_rand() should be called before the first use of this
@@ -631,7 +631,7 @@ ATCA_STATUS atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t* ctx, const uint8_t* aad
631
631
return status ;
632
632
}
633
633
634
- /** \brief Encrypt data using GCM mode and a key within the ATECC608A device.
634
+ /** \brief Encrypt data using GCM mode and a key within the ATECC608 device.
635
635
* atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called
636
636
* before the first use of this function.
637
637
*
@@ -694,7 +694,7 @@ ATCA_STATUS atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t* ctx, uint8_t* tag,
694
694
return status ;
695
695
}
696
696
697
- /** \brief Decrypt data using GCM mode and a key within the ATECC608A device.
697
+ /** \brief Decrypt data using GCM mode and a key within the ATECC608 device.
698
698
* atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called
699
699
* before the first use of this function.
700
700
*
@@ -1056,7 +1056,7 @@ ATCA_STATUS atcab_ecdh_ioenc(uint16_t key_id, const uint8_t* public_key, uint8_t
1056
1056
1057
1057
if (atcab_is_ca_device (dev_type ))
1058
1058
{
1059
- #ifdef ATCA_ATECC608A_SUPPORT
1059
+ #ifdef ATCA_ATECC608_SUPPORT
1060
1060
status = calib_ecdh_ioenc (_gDevice , key_id , public_key , pms , io_key );
1061
1061
#endif
1062
1062
}
@@ -1089,7 +1089,7 @@ ATCA_STATUS atcab_ecdh_tempkey(const uint8_t* public_key, uint8_t* pms)
1089
1089
1090
1090
if (atcab_is_ca_device (dev_type ))
1091
1091
{
1092
- #ifdef ATCA_ATECC608A_SUPPORT
1092
+ #ifdef ATCA_ATECC608_SUPPORT
1093
1093
status = calib_ecdh_tempkey (_gDevice , public_key , pms );
1094
1094
#endif
1095
1095
}
@@ -1123,7 +1123,7 @@ ATCA_STATUS atcab_ecdh_tempkey_ioenc(const uint8_t* public_key, uint8_t* pms, co
1123
1123
1124
1124
if (atcab_is_ca_device (dev_type ))
1125
1125
{
1126
- #ifdef ATCA_ATECC608A_SUPPORT
1126
+ #ifdef ATCA_ATECC608_SUPPORT
1127
1127
status = calib_ecdh_tempkey_ioenc (_gDevice , public_key , pms , io_key );
1128
1128
#endif
1129
1129
}
@@ -1383,7 +1383,7 @@ ATCA_STATUS atcab_info(uint8_t* revision)
1383
1383
}
1384
1384
1385
1385
/** \brief Use the Info command to set the persistent latch state for an
1386
- * ATECC608A device.
1386
+ * ATECC608 device.
1387
1387
*
1388
1388
* \param[out] state Persistent latch state. Set (true) or clear (false).
1389
1389
*
@@ -1412,7 +1412,7 @@ ATCA_STATUS atcab_info_set_latch(bool state)
1412
1412
}
1413
1413
1414
1414
/** \brief Use the Info command to get the persistent latch current state for
1415
- * an ATECC608A device.
1415
+ * an ATECC608 device.
1416
1416
*
1417
1417
* \param[out] state The state is returned here. Set (true) or Cler (false).
1418
1418
*
@@ -1731,7 +1731,7 @@ ATCA_STATUS atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t* challenge, u
1731
1731
* nonce calculation mode (bit 15).
1732
1732
* \param[in] num_in Input value to either be included in the nonce
1733
1733
* calculation in random modes (20 bytes) or to be
1734
- * written directly (32 bytes or 64 bytes(ATECC608A ))
1734
+ * written directly (32 bytes or 64 bytes(ATECC608 ))
1735
1735
* in pass-through mode.
1736
1736
* \param[out] rand_out If using a random mode, the internally generated
1737
1737
* 32-byte random number that was used in the nonce
@@ -1794,7 +1794,7 @@ ATCA_STATUS atcab_nonce(const uint8_t* num_in)
1794
1794
/** \brief Execute a Nonce command in pass-through mode to load one of the
1795
1795
* device's internal buffers with a fixed value.
1796
1796
*
1797
- * For the ATECC608A , available targets are TempKey (32 or 64 bytes), Message
1797
+ * For the ATECC608 , available targets are TempKey (32 or 64 bytes), Message
1798
1798
* Digest Buffer (32 or 64 bytes), or the Alternate Key Buffer (32 bytes). For
1799
1799
* all other devices, only TempKey (32 bytes) is available.
1800
1800
*
@@ -2472,7 +2472,7 @@ ATCA_STATUS atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t* diges
2472
2472
2473
2473
if (atcab_is_ca_device (dev_type ))
2474
2474
{
2475
- #ifdef ATCA_ATECC608A_SUPPORT
2475
+ #ifdef ATCA_ATECC608_SUPPORT
2476
2476
status = calib_secureboot (_gDevice , mode , param2 , digest , signature , mac );
2477
2477
#endif
2478
2478
}
@@ -2509,7 +2509,7 @@ ATCA_STATUS atcab_secureboot_mac(uint8_t mode, const uint8_t* digest, const uint
2509
2509
2510
2510
if (atcab_is_ca_device (dev_type ))
2511
2511
{
2512
- #ifdef ATCA_ATECC608A_SUPPORT
2512
+ #ifdef ATCA_ATECC608_SUPPORT
2513
2513
status = calib_secureboot_mac (_gDevice , mode , digest , signature , num_in , io_key , is_verified );
2514
2514
#endif
2515
2515
}
@@ -2527,7 +2527,7 @@ ATCA_STATUS atcab_secureboot_mac(uint8_t mode, const uint8_t* digest, const uint
2527
2527
/* SelfTest Command */
2528
2528
2529
2529
/** \brief Executes the SelfTest command, which performs a test of one or more
2530
- * of the cryptographic engines within the ATECC608A chip.
2530
+ * of the cryptographic engines within the ATECC608 chip.
2531
2531
*
2532
2532
* \param[in] mode Functions to test. Can be a bit field combining any
2533
2533
* of the following: SELFTEST_MODE_RNG,
@@ -2546,7 +2546,7 @@ ATCA_STATUS atcab_selftest(uint8_t mode, uint16_t param2, uint8_t* result)
2546
2546
2547
2547
if (atcab_is_ca_device (dev_type ))
2548
2548
{
2549
- #ifdef ATCA_ATECC608A_SUPPORT
2549
+ #ifdef ATCA_ATECC608_SUPPORT
2550
2550
status = calib_selftest (_gDevice , mode , param2 , result );
2551
2551
#endif
2552
2552
}
@@ -2572,12 +2572,12 @@ ATCA_STATUS atcab_selftest(uint8_t mode, uint16_t param2, uint8_t* result)
2572
2572
* End(2), Public(3), HMACstart(4), HMACend(5),
2573
2573
* Read_Context(6), or Write_Context(7). Also
2574
2574
* message digest target location for the
2575
- * ATECC608A .
2575
+ * ATECC608 .
2576
2576
* \param[in] length Number of bytes in the message parameter or
2577
2577
* KeySlot for the HMAC key if Mode is
2578
2578
* HMACstart(4) or Public(3).
2579
2579
* \param[in] data_in Message bytes to be hashed or Write_Context if
2580
- * restoring a context on the ATECC608A . Can be
2580
+ * restoring a context on the ATECC608 . Can be
2581
2581
* NULL if not required by the mode.
2582
2582
* \param[out] data_out Data returned by the command (digest or
2583
2583
* context).
@@ -2704,7 +2704,7 @@ ATCA_STATUS atcab_sha_end(uint8_t* digest, uint16_t length, const uint8_t* messa
2704
2704
}
2705
2705
2706
2706
/** \brief Executes SHA command to read the SHA-256 context back. Only for
2707
- * ATECC608A with SHA-256 contexts. HMAC not supported.
2707
+ * ATECC608 with SHA-256 contexts. HMAC not supported.
2708
2708
*
2709
2709
* \param[out] context Context data is returned here.
2710
2710
* \param[in,out] context_size As input, the size of the context buffer in
@@ -2738,7 +2738,7 @@ ATCA_STATUS atcab_sha_read_context(uint8_t* context, uint16_t* context_size)
2738
2738
}
2739
2739
2740
2740
/** \brief Executes SHA command to write (restore) a SHA-256 context into the
2741
- * the device. Only supported for ATECC608A with SHA-256 contexts.
2741
+ * the device. Only supported for ATECC608 with SHA-256 contexts.
2742
2742
*
2743
2743
* \param[in] context Context data to be restored.
2744
2744
* \param[in] context_size Size of the context data in bytes.
@@ -2988,7 +2988,7 @@ ATCA_STATUS atcab_sha_hmac_update(atca_hmac_sha256_ctx_t* ctx, const uint8_t* da
2988
2988
* \param[in] ctx HMAC/SHA-256 context
2989
2989
* \param[out] digest HMAC/SHA-256 result is returned here (32 bytes).
2990
2990
* \param[in] target Where to save the digest internal to the device.
2991
- * For ATECC608A , can be SHA_MODE_TARGET_TEMPKEY,
2991
+ * For ATECC608 , can be SHA_MODE_TARGET_TEMPKEY,
2992
2992
* SHA_MODE_TARGET_MSGDIGBUF, or SHA_MODE_TARGET_OUT_ONLY.
2993
2993
* For all other devices, SHA_MODE_TARGET_TEMPKEY is the
2994
2994
* only option.
@@ -3024,7 +3024,7 @@ ATCA_STATUS atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t* ctx, uint8_t* digest,
3024
3024
* \param[in] key_slot Slot key id to use for the HMAC calculation
3025
3025
* \param[out] digest Digest is returned here (32 bytes).
3026
3026
* \param[in] target Where to save the digest internal to the device.
3027
- * For ATECC608A , can be SHA_MODE_TARGET_TEMPKEY,
3027
+ * For ATECC608 , can be SHA_MODE_TARGET_TEMPKEY,
3028
3028
* SHA_MODE_TARGET_MSGDIGBUF, or
3029
3029
* SHA_MODE_TARGET_OUT_ONLY. For all other devices,
3030
3030
* SHA_MODE_TARGET_TEMPKEY is the only option.
@@ -3095,7 +3095,7 @@ ATCA_STATUS atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t* signature)
3095
3095
/** \brief Executes Sign command, to sign a 32-byte external message using the
3096
3096
* private key in the specified slot. The message to be signed
3097
3097
* will be loaded into the Message Digest Buffer to the
3098
- * ATECC608A device or TempKey for other devices.
3098
+ * ATECC608 device or TempKey for other devices.
3099
3099
*
3100
3100
* \param[in] key_id Slot of the private key to be used to sign the
3101
3101
* message.
@@ -3211,7 +3211,7 @@ ATCA_STATUS atcab_updateextra(uint8_t mode, uint16_t new_value)
3211
3211
* public key. In all cases, the signature is an input to the command.
3212
3212
*
3213
3213
* For the Stored, External, and ValidateExternal Modes, the contents of
3214
- * TempKey (or Message Digest Buffer in some cases for the ATECC608A ) should
3214
+ * TempKey (or Message Digest Buffer in some cases for the ATECC608 ) should
3215
3215
* contain the 32 byte message.
3216
3216
*
3217
3217
* \param[in] mode Verify command mode and options
@@ -3261,7 +3261,7 @@ ATCA_STATUS atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t* signature
3261
3261
/** \brief Executes the Verify command, which verifies a signature (ECDSA
3262
3262
* verify operation) with all components (message, signature, and
3263
3263
* public key) supplied. The message to be signed will be loaded into
3264
- * the Message Digest Buffer to the ATECC608A device or TempKey for
3264
+ * the Message Digest Buffer to the ATECC608 device or TempKey for
3265
3265
* other devices.
3266
3266
*
3267
3267
* \param[in] message 32 byte message to be verified. Typically
@@ -3304,7 +3304,7 @@ ATCA_STATUS atcab_verify_extern(const uint8_t* message, const uint8_t* signature
3304
3304
/** \brief Executes the Verify command with verification MAC, which verifies a
3305
3305
* signature (ECDSA verify operation) with all components (message,
3306
3306
* signature, and public key) supplied. This function is only available
3307
- * on the ATECC608A .
3307
+ * on the ATECC608 .
3308
3308
*
3309
3309
* \param[in] message 32 byte message to be verified. Typically
3310
3310
* the SHA256 hash of the full message.
@@ -3347,7 +3347,7 @@ ATCA_STATUS atcab_verify_extern_mac(const uint8_t* message, const uint8_t* signa
3347
3347
/** \brief Executes the Verify command, which verifies a signature (ECDSA
3348
3348
* verify operation) with a public key stored in the device. The
3349
3349
* message to be signed will be loaded into the Message Digest Buffer
3350
- * to the ATECC608A device or TempKey for other devices.
3350
+ * to the ATECC608 device or TempKey for other devices.
3351
3351
*
3352
3352
* \param[in] message 32 byte message to be verified. Typically
3353
3353
* the SHA256 hash of the full message.
@@ -3387,7 +3387,7 @@ ATCA_STATUS atcab_verify_stored(const uint8_t* message, const uint8_t* signature
3387
3387
3388
3388
/** \brief Executes the Verify command with verification MAC, which verifies a
3389
3389
* signature (ECDSA verify operation) with a public key stored in the
3390
- * device. This function is only available on the ATECC608A .
3390
+ * device. This function is only available on the ATECC608 .
3391
3391
*
3392
3392
* \param[in] message 32 byte message to be verified. Typically
3393
3393
* the SHA256 hash of the full message.
0 commit comments