PDF Download
1 Environment Setup 2 Serial Console 3 Command detail and testing result 3.1 KeyIn Setting 3.2 IvIn Setting 3.3 Show Data Memory 3.4 Fill AAD Memory 3.5 Fill DataIn Memory 3.6 Encrypt Data 3.7 Decrypt Data 3.8 Bypass Data 3.9 Clone Memory 3.10 Loop verification 4 Revision History Return to Top

AES256GCM10G25G IP Demo Instruction