|
/* STSAFE_A110 */ |
|
{ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Echo */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Reset */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Generate Random */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Start Session */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Decrement zone counter */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Read zone */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Update zone */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Increment zone counter */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Derive LORA key */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Generate MAC */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Verify MAC */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Unwrap issuer envelope */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Delete MAC */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Hibernate */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Wrap Local Envelope */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Unwrap Local Envelope */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Put attribute */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Generate key */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Put key */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Configure */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Query */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Get Signature */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Generate Signature */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Verify Signature */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Establish Key */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Standby */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Verify Password */ |
|
STSAFEA_EXEC_TIME_DEFAULT, /* Encrypt */ |
|
STSAFEA_EXEC_TIME_DEFAULT /* Decrypt */ |
We are currently working with the STSAFE-A110 secure element and noticed that the response wait times for all commands are set to
STSAFEA_EXEC_TIME_DEFAULT(500 ms). In contrast, the STSAFE-A120 uses more fine-grained timing values. Would it be possible to refine the timings for the STSAFE-A110 as well? This would make interactions with the STSAFE-A110 faster and more responsive, particularly since we plan to use STSELib to establish a TLS/SSL connection with MbedTLS.STSELib/services/stsafea/stsafea_timings.c
Lines 58 to 88 in c196d23