I wrote that other post. Asking the programmer who got it working, everything needs to be byte-reversed, keys and all FIFO data..
It looks like the SKHA was a piece of IP that was designed to be little-endian (possibly for matching CPUs) and it was dropped into the big-endian Coldfire without any consideration being given to the problems that causes. Or even mentioning this anywhere in the documentation.
Chapter 30 in the MCF5235 manual looks to be almost identical to Chapter 28 in the MCF5271 manual. The only difference is that the MCF5235 chapter warns that the MCF5232-4 don't have the SKHA. So they're the same hardware.
Searching Freescale for "SKHA" doesn't find any little-endian chips with an "SKHA" in them. Searching for "Encryption" finds this training course:
Training Information Page
The above includes the text:
In order to help increase performance some new features have been added to the HAs.
These changes are available starting with the MCF532x and MCF537x family
devices. The updated modules are programmable for big or little endian modes,
where the original HA implementations only supported little endian data.
Programmable DMA request capability has also been added to the SKHA
and MDHA blocks.
It also refers to the SKHA (in the MCF54xx chips) in the Performance Graph as "Talitos".
Searching for that finds ONE mention of that name in the "MPC185 Security Co-Processor User's Manual". So it looks like the SKHA design might have come from the MPC line. The word "Talitos" also finds other MPC and DSP core documents.
Reading through THAT manual:
NOTE
The execution units used in the MPC185 are identical to those used in previous
security processors, and are natively little endian. Register values are shown in
a big endian format to assist in debug in a 60x (big endian) environment. Much
of the following detail is required only for debug and operation of the MPC185
in target mode. When operating as an initiator, the device drivers abstract
register-level operations, and the crypto-channels and controller operate the
execution units
So if you want to know how to use the MCF SKHA you should start by reading the MCP150 manual. This is a standalone encryption chip rather than a module inside a micro.
Except the above effectively says "you don't have to worry about which way around the bytes are as the device drivers handle all that for you". Device drivers?
Maybe MQX or the Processor Expert has drivers for this hardware. Does anyone know?
Tom