Skip to content

Commit a84cac6

Browse files
committed
Added Supported for Cryptoauthlibv3.2.2 and tested for all solutions.
1 parent 6ca5cff commit a84cac6

File tree

481 files changed

+20809
-16922
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

481 files changed

+20809
-16922
lines changed

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/aws_demos.X/nbproject/configurations.xml

+1-3
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,6 @@
267267
<logicalFolder name="f2" displayName="libraries" projectFiles="true">
268268
<logicalFolder name="f3" displayName="3rdparty" projectFiles="true">
269269
<logicalFolder name="f1" displayName="http_parser" projectFiles="true">
270-
<itemPath>../../../../../../../libraries/3rdparty/http_parser/.git</itemPath>
271270
<itemPath>../../../../../../../libraries/3rdparty/http_parser/.mailmap</itemPath>
272271
<itemPath>../../../../../../../libraries/3rdparty/http_parser/.travis.yml</itemPath>
273272
<itemPath>../../../../../../../libraries/3rdparty/http_parser/AUTHORS</itemPath>
@@ -434,7 +433,6 @@
434433
</logicalFolder>
435434
</logicalFolder>
436435
<logicalFolder name="f4" displayName="pkcs11" projectFiles="true">
437-
<itemPath>../../../../../../../libraries/3rdparty/pkcs11/.git</itemPath>
438436
<itemPath>../../../../../../../libraries/3rdparty/pkcs11/pkcs11.h</itemPath>
439437
<itemPath>../../../../../../../libraries/3rdparty/pkcs11/pkcs11f.h</itemPath>
440438
<itemPath>../../../../../../../libraries/3rdparty/pkcs11/pkcs11t.h</itemPath>
@@ -1062,7 +1060,7 @@
10621060
<itemPath>../src/config/aws_demos/library/cryptoauthlib/crypto/atca_crypto_sw_sha2.h</itemPath>
10631061
</logicalFolder>
10641062
<logicalFolder name="f1" displayName="hal" projectFiles="true">
1065-
<itemPath>../src/config/aws_demos/library/cryptoauthlib/hal/ATECC608A_0.c</itemPath>
1063+
<itemPath>../src/config/aws_demos/library/cryptoauthlib/hal/ATECC608_0.c</itemPath>
10661064
<itemPath>../src/config/aws_demos/library/cryptoauthlib/hal/atca_hal.c</itemPath>
10671065
<itemPath>../src/config/aws_demos/library/cryptoauthlib/hal/atca_hal.h</itemPath>
10681066
<itemPath>../src/config/aws_demos/library/cryptoauthlib/hal/atca_start_config.h</itemPath>

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/src/config/aws_demos/aws_demos.xml

+373-741
Large diffs are not rendered by default.

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/src/config/aws_demos/harmony-manifest-success.yml

+9-17
Original file line numberDiff line numberDiff line change
@@ -4,28 +4,20 @@
44

55

66
project: aws_demos
7-
creation_date: 2020-07-16T10:43:54.436+05:30[Asia/Calcutta] # ISO 8601 format: https://www.w3.org/TR/NOTE-datetime
7+
creation_date: 2020-07-31T12:00:32.413+05:30[Asia/Calcutta] # ISO 8601 format: https://www.w3.org/TR/NOTE-datetime
88
operating_system: Windows 10
99
mhc_mode: IDE # [IDE|Standalone|Headless]
10-
mplabx_version: --Please Update your plugin-- # if MPLAB X plugin only
11-
plugin_version: v3.4.2 # if MPLAB X plugin only
10+
mplabx_version: v5.35 # if MPLAB X plugin only
11+
plugin_version: v3.5.1 # if MPLAB X plugin only
1212

1313
modules:
14-
- {name: "amazon-freertos", version: "unknown"}
15-
- {name: "aws_cloud", version: "v3.0.0"}
16-
- {name: "bsp", version: "v3.7.0"}
17-
- {name: "CMSIS-FreeRTOS", version: "unknown"}
18-
- {name: "contentmanager", version: "v1.3.1"}
19-
- {name: "core", version: "v3.7.2"}
20-
- {name: "crypto", version: "v3.5.0"}
21-
- {name: "cryptoauthlib", version: "v3.2.1"}
14+
- {name: "cryptoauthlib", version: "v3.2.2"}
2215
- {name: "csp", version: "v3.7.1"}
16+
- {name: "core", version: "v3.7.2"}
2317
- {name: "dev_packs", version: "v3.7.0"}
24-
- {name: "mhc", version: "v3.4.0"}
25-
- {name: "mplabx-plugin", version: "v3.5.0"}
18+
- {name: "amazon-freertos", version: "unknown"}
19+
- {name: "mhc", version: "unknown"}
20+
- {name: "aws_cloud", version: "unknown"}
2621
- {name: "net", version: "v3.6.1"}
27-
- {name: "wireless", version: "v3.2.0-rc2"}
28-
- {name: "wolfMQTT", version: "v1.2.0"}
29-
- {name: "wolfssl", version: "v4.3.0"}
30-
- {name: "zlib", version: "v1.2.11"}
22+
- {name: "bsp", version: "v3.7.0"}
3123

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/src/config/aws_demos/harmony.prj

+827-845
Large diffs are not rendered by default.

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/src/config/aws_demos/library/cryptoauthlib/atca_basic.c

+33-33
Original file line numberDiff line numberDiff line change
@@ -98,10 +98,10 @@ ATCA_STATUS atcab_init_ext(ATCADevice* device, ATCAIfaceCfg *cfg)
9898
}
9999
#endif
100100

101-
#ifdef ATCA_ATECC608A_SUPPORT
102-
if (cfg->devtype == ATECC608A)
101+
#ifdef ATCA_ATECC608_SUPPORT
102+
if (cfg->devtype == ATECC608)
103103
{
104-
if ((status = atcab_read_bytes_zone(ATCA_ZONE_CONFIG, 0, ATCA_CHIPMODE_OFFSET, &(*device)->mCommands->clock_divider, 1)) != ATCA_SUCCESS)
104+
if ((status = calib_read_bytes_zone(*device, ATCA_ZONE_CONFIG, 0, ATCA_CHIPMODE_OFFSET, &(*device)->mCommands->clock_divider, 1)) != ATCA_SUCCESS)
105105
{
106106
return status;
107107
}
@@ -368,7 +368,7 @@ ATCA_STATUS atcab_aes(uint8_t mode, uint16_t key_id, const uint8_t* aes_in, uint
368368

369369
if (atcab_is_ca_device(dev_type))
370370
{
371-
#if defined(ATCA_ATECC608A_SUPPORT)
371+
#if defined(ATCA_ATECC608_SUPPORT)
372372
status = calib_aes(_gDevice, mode, key_id, aes_in, aes_out);
373373
#endif
374374
}
@@ -402,7 +402,7 @@ ATCA_STATUS atcab_aes_encrypt_ext(ATCADevice device, uint16_t key_id, uint8_t ke
402402

403403
if (atcab_is_ca_device(dev_type))
404404
{
405-
#if defined(ATCA_ATECC608A_SUPPORT)
405+
#if defined(ATCA_ATECC608_SUPPORT)
406406
status = calib_aes_encrypt(device, key_id, key_block, plaintext, ciphertext);
407407
#endif
408408
}
@@ -454,7 +454,7 @@ ATCA_STATUS atcab_aes_decrypt_ext(ATCADevice device, uint16_t key_id, uint8_t ke
454454

455455
if (atcab_is_ca_device(dev_type))
456456
{
457-
#if defined(ATCA_ATECC608A_SUPPORT)
457+
#if defined(ATCA_ATECC608_SUPPORT)
458458
status = calib_aes_decrypt(device, key_id, key_block, ciphertext, plaintext);
459459
#endif
460460
}
@@ -502,7 +502,7 @@ ATCA_STATUS atcab_aes_gfm(const uint8_t* h, const uint8_t* input, uint8_t* outpu
502502

503503
if (atcab_is_ca_device(dev_type))
504504
{
505-
#if defined(ATCA_ATECC608A_SUPPORT)
505+
#if defined(ATCA_ATECC608_SUPPORT)
506506
status = calib_aes_gfm(_gDevice, h, input, output);
507507
#endif
508508
}
@@ -596,7 +596,7 @@ ATCA_STATUS atcab_aes_gcm_init_rand(atca_aes_gcm_ctx_t* ctx, uint16_t key_id, ui
596596
}
597597

598598
/** \brief Process Additional Authenticated Data (AAD) using GCM mode and a
599-
* key within the ATECC608A device.
599+
* key within the ATECC608 device.
600600
*
601601
* This can be called multiple times. atcab_aes_gcm_init() or
602602
* atcab_aes_gcm_init_rand() should be called before the first use of this
@@ -631,7 +631,7 @@ ATCA_STATUS atcab_aes_gcm_aad_update(atca_aes_gcm_ctx_t* ctx, const uint8_t* aad
631631
return status;
632632
}
633633

634-
/** \brief Encrypt data using GCM mode and a key within the ATECC608A device.
634+
/** \brief Encrypt data using GCM mode and a key within the ATECC608 device.
635635
* atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called
636636
* before the first use of this function.
637637
*
@@ -694,7 +694,7 @@ ATCA_STATUS atcab_aes_gcm_encrypt_finish(atca_aes_gcm_ctx_t* ctx, uint8_t* tag,
694694
return status;
695695
}
696696

697-
/** \brief Decrypt data using GCM mode and a key within the ATECC608A device.
697+
/** \brief Decrypt data using GCM mode and a key within the ATECC608 device.
698698
* atcab_aes_gcm_init() or atcab_aes_gcm_init_rand() should be called
699699
* before the first use of this function.
700700
*
@@ -1056,7 +1056,7 @@ ATCA_STATUS atcab_ecdh_ioenc(uint16_t key_id, const uint8_t* public_key, uint8_t
10561056

10571057
if (atcab_is_ca_device(dev_type))
10581058
{
1059-
#ifdef ATCA_ATECC608A_SUPPORT
1059+
#ifdef ATCA_ATECC608_SUPPORT
10601060
status = calib_ecdh_ioenc(_gDevice, key_id, public_key, pms, io_key);
10611061
#endif
10621062
}
@@ -1089,7 +1089,7 @@ ATCA_STATUS atcab_ecdh_tempkey(const uint8_t* public_key, uint8_t* pms)
10891089

10901090
if (atcab_is_ca_device(dev_type))
10911091
{
1092-
#ifdef ATCA_ATECC608A_SUPPORT
1092+
#ifdef ATCA_ATECC608_SUPPORT
10931093
status = calib_ecdh_tempkey(_gDevice, public_key, pms);
10941094
#endif
10951095
}
@@ -1123,7 +1123,7 @@ ATCA_STATUS atcab_ecdh_tempkey_ioenc(const uint8_t* public_key, uint8_t* pms, co
11231123

11241124
if (atcab_is_ca_device(dev_type))
11251125
{
1126-
#ifdef ATCA_ATECC608A_SUPPORT
1126+
#ifdef ATCA_ATECC608_SUPPORT
11271127
status = calib_ecdh_tempkey_ioenc(_gDevice, public_key, pms, io_key);
11281128
#endif
11291129
}
@@ -1383,7 +1383,7 @@ ATCA_STATUS atcab_info(uint8_t* revision)
13831383
}
13841384

13851385
/** \brief Use the Info command to set the persistent latch state for an
1386-
* ATECC608A device.
1386+
* ATECC608 device.
13871387
*
13881388
* \param[out] state Persistent latch state. Set (true) or clear (false).
13891389
*
@@ -1412,7 +1412,7 @@ ATCA_STATUS atcab_info_set_latch(bool state)
14121412
}
14131413

14141414
/** \brief Use the Info command to get the persistent latch current state for
1415-
* an ATECC608A device.
1415+
* an ATECC608 device.
14161416
*
14171417
* \param[out] state The state is returned here. Set (true) or Cler (false).
14181418
*
@@ -1731,7 +1731,7 @@ ATCA_STATUS atcab_mac(uint8_t mode, uint16_t key_id, const uint8_t* challenge, u
17311731
* nonce calculation mode (bit 15).
17321732
* \param[in] num_in Input value to either be included in the nonce
17331733
* calculation in random modes (20 bytes) or to be
1734-
* written directly (32 bytes or 64 bytes(ATECC608A))
1734+
* written directly (32 bytes or 64 bytes(ATECC608))
17351735
* in pass-through mode.
17361736
* \param[out] rand_out If using a random mode, the internally generated
17371737
* 32-byte random number that was used in the nonce
@@ -1794,7 +1794,7 @@ ATCA_STATUS atcab_nonce(const uint8_t* num_in)
17941794
/** \brief Execute a Nonce command in pass-through mode to load one of the
17951795
* device's internal buffers with a fixed value.
17961796
*
1797-
* For the ATECC608A, available targets are TempKey (32 or 64 bytes), Message
1797+
* For the ATECC608, available targets are TempKey (32 or 64 bytes), Message
17981798
* Digest Buffer (32 or 64 bytes), or the Alternate Key Buffer (32 bytes). For
17991799
* all other devices, only TempKey (32 bytes) is available.
18001800
*
@@ -2472,7 +2472,7 @@ ATCA_STATUS atcab_secureboot(uint8_t mode, uint16_t param2, const uint8_t* diges
24722472

24732473
if (atcab_is_ca_device(dev_type))
24742474
{
2475-
#ifdef ATCA_ATECC608A_SUPPORT
2475+
#ifdef ATCA_ATECC608_SUPPORT
24762476
status = calib_secureboot(_gDevice, mode, param2, digest, signature, mac);
24772477
#endif
24782478
}
@@ -2509,7 +2509,7 @@ ATCA_STATUS atcab_secureboot_mac(uint8_t mode, const uint8_t* digest, const uint
25092509

25102510
if (atcab_is_ca_device(dev_type))
25112511
{
2512-
#ifdef ATCA_ATECC608A_SUPPORT
2512+
#ifdef ATCA_ATECC608_SUPPORT
25132513
status = calib_secureboot_mac(_gDevice, mode, digest, signature, num_in, io_key, is_verified);
25142514
#endif
25152515
}
@@ -2527,7 +2527,7 @@ ATCA_STATUS atcab_secureboot_mac(uint8_t mode, const uint8_t* digest, const uint
25272527
/* SelfTest Command */
25282528

25292529
/** \brief Executes the SelfTest command, which performs a test of one or more
2530-
* of the cryptographic engines within the ATECC608A chip.
2530+
* of the cryptographic engines within the ATECC608 chip.
25312531
*
25322532
* \param[in] mode Functions to test. Can be a bit field combining any
25332533
* of the following: SELFTEST_MODE_RNG,
@@ -2546,7 +2546,7 @@ ATCA_STATUS atcab_selftest(uint8_t mode, uint16_t param2, uint8_t* result)
25462546

25472547
if (atcab_is_ca_device(dev_type))
25482548
{
2549-
#ifdef ATCA_ATECC608A_SUPPORT
2549+
#ifdef ATCA_ATECC608_SUPPORT
25502550
status = calib_selftest(_gDevice, mode, param2, result);
25512551
#endif
25522552
}
@@ -2572,12 +2572,12 @@ ATCA_STATUS atcab_selftest(uint8_t mode, uint16_t param2, uint8_t* result)
25722572
* End(2), Public(3), HMACstart(4), HMACend(5),
25732573
* Read_Context(6), or Write_Context(7). Also
25742574
* message digest target location for the
2575-
* ATECC608A.
2575+
* ATECC608.
25762576
* \param[in] length Number of bytes in the message parameter or
25772577
* KeySlot for the HMAC key if Mode is
25782578
* HMACstart(4) or Public(3).
25792579
* \param[in] data_in Message bytes to be hashed or Write_Context if
2580-
* restoring a context on the ATECC608A. Can be
2580+
* restoring a context on the ATECC608. Can be
25812581
* NULL if not required by the mode.
25822582
* \param[out] data_out Data returned by the command (digest or
25832583
* context).
@@ -2704,7 +2704,7 @@ ATCA_STATUS atcab_sha_end(uint8_t* digest, uint16_t length, const uint8_t* messa
27042704
}
27052705

27062706
/** \brief Executes SHA command to read the SHA-256 context back. Only for
2707-
* ATECC608A with SHA-256 contexts. HMAC not supported.
2707+
* ATECC608 with SHA-256 contexts. HMAC not supported.
27082708
*
27092709
* \param[out] context Context data is returned here.
27102710
* \param[in,out] context_size As input, the size of the context buffer in
@@ -2738,7 +2738,7 @@ ATCA_STATUS atcab_sha_read_context(uint8_t* context, uint16_t* context_size)
27382738
}
27392739

27402740
/** \brief Executes SHA command to write (restore) a SHA-256 context into the
2741-
* the device. Only supported for ATECC608A with SHA-256 contexts.
2741+
* the device. Only supported for ATECC608 with SHA-256 contexts.
27422742
*
27432743
* \param[in] context Context data to be restored.
27442744
* \param[in] context_size Size of the context data in bytes.
@@ -2988,7 +2988,7 @@ ATCA_STATUS atcab_sha_hmac_update(atca_hmac_sha256_ctx_t* ctx, const uint8_t* da
29882988
* \param[in] ctx HMAC/SHA-256 context
29892989
* \param[out] digest HMAC/SHA-256 result is returned here (32 bytes).
29902990
* \param[in] target Where to save the digest internal to the device.
2991-
* For ATECC608A, can be SHA_MODE_TARGET_TEMPKEY,
2991+
* For ATECC608, can be SHA_MODE_TARGET_TEMPKEY,
29922992
* SHA_MODE_TARGET_MSGDIGBUF, or SHA_MODE_TARGET_OUT_ONLY.
29932993
* For all other devices, SHA_MODE_TARGET_TEMPKEY is the
29942994
* only option.
@@ -3024,7 +3024,7 @@ ATCA_STATUS atcab_sha_hmac_finish(atca_hmac_sha256_ctx_t* ctx, uint8_t* digest,
30243024
* \param[in] key_slot Slot key id to use for the HMAC calculation
30253025
* \param[out] digest Digest is returned here (32 bytes).
30263026
* \param[in] target Where to save the digest internal to the device.
3027-
* For ATECC608A, can be SHA_MODE_TARGET_TEMPKEY,
3027+
* For ATECC608, can be SHA_MODE_TARGET_TEMPKEY,
30283028
* SHA_MODE_TARGET_MSGDIGBUF, or
30293029
* SHA_MODE_TARGET_OUT_ONLY. For all other devices,
30303030
* SHA_MODE_TARGET_TEMPKEY is the only option.
@@ -3095,7 +3095,7 @@ ATCA_STATUS atcab_sign_base(uint8_t mode, uint16_t key_id, uint8_t* signature)
30953095
/** \brief Executes Sign command, to sign a 32-byte external message using the
30963096
* private key in the specified slot. The message to be signed
30973097
* will be loaded into the Message Digest Buffer to the
3098-
* ATECC608A device or TempKey for other devices.
3098+
* ATECC608 device or TempKey for other devices.
30993099
*
31003100
* \param[in] key_id Slot of the private key to be used to sign the
31013101
* message.
@@ -3211,7 +3211,7 @@ ATCA_STATUS atcab_updateextra(uint8_t mode, uint16_t new_value)
32113211
* public key. In all cases, the signature is an input to the command.
32123212
*
32133213
* For the Stored, External, and ValidateExternal Modes, the contents of
3214-
* TempKey (or Message Digest Buffer in some cases for the ATECC608A) should
3214+
* TempKey (or Message Digest Buffer in some cases for the ATECC608) should
32153215
* contain the 32 byte message.
32163216
*
32173217
* \param[in] mode Verify command mode and options
@@ -3261,7 +3261,7 @@ ATCA_STATUS atcab_verify(uint8_t mode, uint16_t key_id, const uint8_t* signature
32613261
/** \brief Executes the Verify command, which verifies a signature (ECDSA
32623262
* verify operation) with all components (message, signature, and
32633263
* public key) supplied. The message to be signed will be loaded into
3264-
* the Message Digest Buffer to the ATECC608A device or TempKey for
3264+
* the Message Digest Buffer to the ATECC608 device or TempKey for
32653265
* other devices.
32663266
*
32673267
* \param[in] message 32 byte message to be verified. Typically
@@ -3304,7 +3304,7 @@ ATCA_STATUS atcab_verify_extern(const uint8_t* message, const uint8_t* signature
33043304
/** \brief Executes the Verify command with verification MAC, which verifies a
33053305
* signature (ECDSA verify operation) with all components (message,
33063306
* signature, and public key) supplied. This function is only available
3307-
* on the ATECC608A.
3307+
* on the ATECC608.
33083308
*
33093309
* \param[in] message 32 byte message to be verified. Typically
33103310
* the SHA256 hash of the full message.
@@ -3347,7 +3347,7 @@ ATCA_STATUS atcab_verify_extern_mac(const uint8_t* message, const uint8_t* signa
33473347
/** \brief Executes the Verify command, which verifies a signature (ECDSA
33483348
* verify operation) with a public key stored in the device. The
33493349
* message to be signed will be loaded into the Message Digest Buffer
3350-
* to the ATECC608A device or TempKey for other devices.
3350+
* to the ATECC608 device or TempKey for other devices.
33513351
*
33523352
* \param[in] message 32 byte message to be verified. Typically
33533353
* the SHA256 hash of the full message.
@@ -3387,7 +3387,7 @@ ATCA_STATUS atcab_verify_stored(const uint8_t* message, const uint8_t* signature
33873387

33883388
/** \brief Executes the Verify command with verification MAC, which verifies a
33893389
* signature (ECDSA verify operation) with a public key stored in the
3390-
* device. This function is only available on the ATECC608A.
3390+
* device. This function is only available on the ATECC608.
33913391
*
33923392
* \param[in] message 32 byte message to be verified. Typically
33933393
* the SHA256 hash of the full message.

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/src/config/aws_demos/library/cryptoauthlib/atca_cfgs.c

+4-4
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
/** \brief default configuration for an ECCx08A device */
4242
ATCAIfaceCfg cfg_ateccx08a_i2c_default = {
4343
.iface_type = ATCA_I2C_IFACE,
44-
.devtype = ATECC608A,
44+
.devtype = ATECC608,
4545
{
4646
.atcai2c.slave_address = 0xC0,
4747
.atcai2c.bus = 2,
@@ -57,7 +57,7 @@ ATCAIfaceCfg cfg_ateccx08a_i2c_default = {
5757
/** \brief default configuration for an ECCx08A device on the logical SWI bus over UART*/
5858
ATCAIfaceCfg cfg_ateccx08a_swi_default = {
5959
.iface_type = ATCA_SWI_IFACE,
60-
.devtype = ATECC608A,
60+
.devtype = ATECC608,
6161
{
6262
.atcaswi.bus = 4,
6363
},
@@ -70,7 +70,7 @@ ATCAIfaceCfg cfg_ateccx08a_swi_default = {
7070
/** \brief default configuration for Kit protocol over the device's async interface */
7171
ATCAIfaceCfg cfg_ateccx08a_kitcdc_default = {
7272
.iface_type = ATCA_UART_IFACE,
73-
.devtype = ATECC608A,
73+
.devtype = ATECC608,
7474
{
7575
.atcauart.port = 0,
7676
.atcauart.baud = 115200,
@@ -86,7 +86,7 @@ ATCAIfaceCfg cfg_ateccx08a_kitcdc_default = {
8686
/** \brief default configuration for Kit protocol over the device's async interface */
8787
ATCAIfaceCfg cfg_ateccx08a_kithid_default = {
8888
.iface_type = ATCA_HID_IFACE,
89-
.devtype = ATECC608A,
89+
.devtype = ATECC608,
9090
{
9191
.atcahid.dev_interface = ATCA_KIT_AUTO_IFACE,
9292
.atcahid.dev_identity = 0,

projects/microchip/curiosity2_pic32mzef_ecc/mplab/aws_demos/firmware/src/config/aws_demos/library/cryptoauthlib/atca_config.h

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212

1313
/** Include Device Support Options */
1414
#define ATCA_ATECC608A_SUPPORT
15+
#define ATCA_ATECC608_SUPPORT
1516

1617

1718
/* Polling Configuration Options */

0 commit comments

Comments
 (0)