Visible to Intel only — GUID: chq1644352860111
Ixiasoft
1. Introduction
2. Interface Overview
3. Parameters
4. Designing with the IP Core
5. Block Description
6. Cryptographic IP Data Profiles
7. Configuration Registers
8. Design Example
9. Symmetric Cryptographic Intel FPGA Hard IP User Guide Archives
10. Document Revision History for the Symmetric Cryptographic Intel FPGA Hard IP User Guide
4.1. Installing and Licensing Intel® FPGA IP Cores
4.2. Specifying the IP Core Parameters and Options
4.3. Generated File Structure
4.4. Symmetric Cryptographic IP Core Flow
4.5. Dynamically Disabling SM4 Capability
4.6. Error Handling
4.7. Error Reporting
4.8. Resetting the IP Core
4.9. Channel Definition and Allocation
4.10. Byte Ordering
4.11. AXI-ST Single Packet Mode
4.12. AXI-ST Multiple Packet Mode
7.1. Cryptographic Primary Control Register
7.2. Cryptographic Secondary Control Register
7.3. Cryptographic Primary Status Register
7.4. Cryptographic Error Status Register
7.5. Cryptographic Error Control Register
7.6. Cryptographic Packet Error Control 1 Register
7.7. Cryptographic Packet Error Control 2 Register
7.8. Cryptographic Error Code Control 1 Register
7.9. Cryptographic Error Code Control 2 Register
7.10. Cryptographic Error Code Internal Control Register
7.11. Cryptographic Internal Error Control Register
7.12. Cryptographic First Error Log Register
7.13. Cryptographic Packet Error Log 1 Register
7.14. Cryptographic Packet Error Log 2 Register
7.15. Cryptographic Internal Error Log Register
7.16. Cryptographic Wall Clock LSB Register
7.17. Cryptographic Wall Clock MSB Register
7.18. Ternary Control Register
Visible to Intel only — GUID: chq1644352860111
Ixiasoft
4.4. Symmetric Cryptographic IP Core Flow
This section describes the generic flow for the Symmetric Cryptographic Intel FPGA Hard IP.
To enable the flow, the FPGA must enter the User mode and the AES/SM4 Inline Cryptographic Accelerator is in the User Configuration state.
- You drive all the clocks into the Symmetric Cryptographic IP core.
- You set the bits to deassert resets to the Symmetric Cryptographic IP cores.
- You configured the IP as described in Specifying the IP Core Parameters and Options or by updating the register bits in the configuration block of the AXI-Lite interface.
- You start creating the packets in a format specified during the IP parameter configuration.
- You stream in the packets.
- You collect the packets streamed out from the AES/SM4 Inline Cryptographic Accelerator and send them to your logic.
- You must stop sending packets to the Symmetric Cryptographic IP core if any error signal is asserted in the AXI-ST interface.
- You must then handle the error received in the AXI-ST interface.
Note: The error handling is out of scope of the Symmetric Cryptographic IP core.
- You can then assert the subsystem_cold_rst_n signal and reprogram the Symmetric Cryptographic IP core registers for the desired configuration. Then, deassert the subsystem_cold_rst_n signal and start streaming packets again.