S32K314 importing ECC public key ImportEccKeyReq function returns error 0x055A5A399

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 
已解决

S32K314 importing ECC public key ImportEccKeyReq function returns error 0x055A5A399

跳至解决方案
1,840 次查看
铅笔
Contributor II
const hseKeyGroupCfgEntry_t NVM_Catalog [] =
{
    /*  keyType                 numOfKeySlots   maxKeyBitLen  */                                                                      \
    /* CUST keys */                                                                                                                   \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_SHE, 12U, HSE_KEY128_BITS}, /* MASTER_ECU_KEY, BOOT_MAC_KEY, KEY_1 to KEY_10 */ \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, HSE_KEY_TYPE_AES, 4U, HSE_KEY128_BITS},                                                     \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, HSE_KEY_TYPE_AES, 7U, HSE_KEY256_BITS},  /* HMAC key */                                     \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, HSE_KEY_TYPE_HMAC, 2U, HSE_KEY512_BITS}, /* ECC keys */                                     \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, WRP_KEY_TYPE_ECC_PAIR, 3U, WRP_ECC_KEY_SIZE},                                               \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, WRP_KEY_TYPE_ECC_PUB, 1U, WRP_ECC_KEY_SIZE},                                                \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, WRP_KEY_TYPE_ECC_PUB_EXT, 1U, WRP_ECC_KEY_SIZE}, /* RSA keys */                             \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, HSE_KEY_TYPE_RSA_PAIR, 2U, HSE_KEY4096_BITS},                                               \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, HSE_KEY_TYPE_RSA_PUB, 1U, HSE_KEY4096_BITS},                                                \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_CUST, HSE_KEY_TYPE_RSA_PUB_EXT, 1U, HSE_KEY4096_BITS}, /* OEM keys */                             \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, HSE_KEY_TYPE_AES, 3U, HSE_KEY128_BITS},                                                      \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, HSE_KEY_TYPE_AES, 3U, HSE_KEY256_BITS},   /* HMAC key */                                     \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, HSE_KEY_TYPE_HMAC, 1U, HSE_KEY1024_BITS}, /* ECC keys */                                     \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, WRP_KEY_TYPE_ECC_PAIR, 1U, WRP_ECC_KEY_SIZE},                                                \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, WRP_KEY_TYPE_ECC_PUB, 1U, WRP_ECC_KEY_SIZE},                                                 \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, WRP_KEY_TYPE_ECC_PUB_EXT, 1U, WRP_ECC_KEY_SIZE}, /* RSA keys */                              \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, HSE_KEY_TYPE_RSA_PAIR, 1U, HSE_KEY4096_BITS},                                                \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, HSE_KEY_TYPE_RSA_PUB, 1U, HSE_KEY4096_BITS},                                                 \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_OEM, HSE_KEY_TYPE_RSA_PUB_EXT, 1U, HSE_KEY4096_BITS},                                             \
    {HSE_MU0_MASK, HSE_KEY_OWNER_OEM, WRP_KEY_TYPE_ECC_PUB, 1U, WRP_ECC_KEY_SIZE},                                                    \
    {                                                                                                                                 \
            0U, 0U, 0U, 0U, 0U                                                                                                        \
    }
};

const hseKeyGroupCfgEntry_t RAM_Catalog [] =
{
    /*  keyType                   numOfKeySlots maxKeyBitLen*/                                        \
    /* Symetric key */                                                                                \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_SHE, 1U, HSE_KEY128_BITS}, /* KEY_RAM */        \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_AES, 10U, HSE_KEY128_BITS},                     \
    {HSE_MU0_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_AES, 10U, HSE_KEY256_BITS},     /* HMAC key */     \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_HMAC, 6U, HSE_KEY1024_BITS}, /* RSA key */      \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_RSA_PUB, 2U, HSE_KEY2048_BITS},                 \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_RSA_PUB_EXT, 1U, HSE_KEY1024_BITS},             \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, WRP_KEY_TYPE_ECC_PAIR, 2U, WRP_ECC_KEY_SIZE},                \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, WRP_KEY_TYPE_ECC_PUB, 5U, WRP_ECC_KEY_SIZE},                 \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_SHARED_SECRET, 2U, HSE_KEY638_BITS},            \
    {HSE_ALL_MU_MASK, HSE_KEY_OWNER_ANY, HSE_KEY_TYPE_SHARED_SECRET, 2U, HSE_KEY2048_BITS},           \
    {                                                                                                 \
            0U, 0U, 0U, 0U, 0U                                                                        \
    }
};
 
void HSE_CryptoKeyTest(void)
{
    hseSrvResponse_t HseResponse;
 
    hseKeyHandle_t eccRAMKeyHandle = HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE; 
    hseKeyHandle_t DHSharedSecretRAMKeyHandle = HSE_DEMO_DH_SHARED_SECRET_HANDLE;
    hseKeyHandle_t AESDerivedKeyInfoHandle0 = HSE_DEMO_RAM_AES256_KEY0;
    hseKeyHandle_t AESDerivedKeyInfoHandle1 = HSE_DEMO_RAM_AES128_KEY1;
    hseKeyHandle_t ImportEccPubRAMKeyHandle = HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE;
 
    /* Generate ECC key pair in RAM */
    HseResponse = GenerateEccKeyAndExportPublic(HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE, HSE_EC_SEC_SECP256R1, (HSE_KF_USAGE_EXCHANGE | HSE_KF_ACCESS_EXPORTABLE), eccP256PubKeyGet);
printf("hse_step3: %X\n\r", HseResponse);

 

    /* Import ECC Key */
    HseResponse = ImportEccKeyReq(
        HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE,
        HSE_KEY_TYPE_ECC_PUB,
        HSE_KF_USAGE_EXCHANGE,
        HSE_EC_SEC_SECP256R1,
        KeyBitLen(HSE_EC_SEC_SECP256R1),
        eccP256PubKeyGet,
        NULL);
 
    printf("hse_step4: %X\n\r", HseResponse);
   
    /* Compute DH Shared Secret (ECDH) */
    HseResponse = DHSharedSecretCompute(
        HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE,
        HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE,
        &DHSharedSecretRAMKeyHandle,
        RAM_KEY,
        KeyBitLen(HSE_EC_SEC_SECP256R1));
    printf("hse_step5: %X\n\r", HseResponse);
 
GenerateEccKeyAndExportPublic先生成密钥对并导出公钥到eccP256PubKeyGet[64],再将该生成的公钥通过ImportEccKeyReq导入密钥槽返回0x055A5A399错误,Based on the S32K344 DEMO, please help analyze the reason.
0 项奖励
回复
1 解答
921 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Hi @铅笔 

1. It depends on the state of the cache memory. Based on the previous program or data flow, the parameters might or might not be present in physical memory. So, if the data cache is enabled, it could work in some cases—but in others, it might not. It's responsibility of user to keep all the data objects used for communication with HSE in non-cacheable memory.

2. Well, the key allocator doesn’t seem to be fully reliable. It tries to select the best available key slot, but it appears to malfunction when there are two identical key groups.

Regards,
Lukas

在原帖中查看解决方案

0 项奖励
回复
14 回复数
1,673 次查看
铅笔
Contributor II

1、Log of the cache not closed:

_0-1758286321615.png

2、Disable the cache, but steps 6 and 7 respond with an incorrect log:

_1-1758286486295.png

3、Close the cache and inject a fake swap key into the corresponding key slot log after the key exchange step in step 5:

_2-1758287145438.png

_3-1758287337483.png

 

 

0 项奖励
回复
1,512 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Is it possible to share simple project to reproduce it on my side?

0 项奖励
回复
1,339 次查看
铅笔
Contributor II
 
0 项奖励
回复
1,279 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Here's the problem:

I can see that you have two groups for SHARED_SECRET in RAM catalog:

lukaszadrapa_0-1759315389746.png

When computing shared secret, key handle 0x00020900 (RAM catalog, group 9, key 0) is passed to the function:

lukaszadrapa_1-1759315447506.png

However, when you step over the function, the key allocator selects key handle 0x00020800 (RAM catalog, group 8, key 0):

lukaszadrapa_2-1759315511660.png

So, the shared secret is stored to 0x00020800. 

But then, in your function KdfSP800_56C_ONESTEP_ReqTest_demo, you configure the original key handle 0x00020900 as a source key handle. Not the one that was assigned by key allocator:

lukaszadrapa_3-1759316571551.png

So, that's the reason why the key slot looks like empty - because it is actually empty. You need to select a key handle which was allocated by key allocator. 

Regards,

Lukas 

 

0 项奖励
回复
1,051 次查看
铅笔
Contributor II

Hi:

I try to remove one group of SHARED_SECRET in RAM catalog and disable cache,that i can get the right result. Now i have two questions:

1、If the cache is not disabled, why does the ImportEccKeyReq step report the 55A5A399 error, while all other steps are correct?

_1-1760169336909.png

2、If there are two groups for SHARED_SECRET in the RAM catalog, why would it cause the error shown in the image below?

_2-1760169752672.png

Thank you!

0 项奖励
回复
922 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Hi @铅笔 

1. It depends on the state of the cache memory. Based on the previous program or data flow, the parameters might or might not be present in physical memory. So, if the data cache is enabled, it could work in some cases—but in others, it might not. It's responsibility of user to keep all the data objects used for communication with HSE in non-cacheable memory.

2. Well, the key allocator doesn’t seem to be fully reliable. It tries to select the best available key slot, but it appears to malfunction when there are two identical key groups.

Regards,
Lukas

0 项奖励
回复
789 次查看
铅笔
Contributor II
Thank you very much!
0 项奖励
回复
1,339 次查看
铅笔
Contributor II
Providing the C file can be added to your project to help with verification. Thank you.
0 项奖励
回复
1,838 次查看
铅笔
Contributor II
First generate the key pair and export the public key to eccP256PubKeyGet[64], then import the generated public key through ImportEccKeyReq into the key slot, returning error 0x055A5A399.Based on the S32K344 DEMO, please help analyze the reason.
0 项奖励
回复
1,802 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

Hi @铅笔 

I did quick test on my side and it works as expected:

lukaszadrapa_0-1758110932489.png

My project is attached. 

Have you tried to disable data cache?

Regards,

Lukas

0 项奖励
回复
1,754 次查看
铅笔
Contributor II
I compared the DEMO you provided in the attachment with mine, and they are consistent. Currently, I have tried both scenarios with caching enabled and disabled, and the phenomena are as follows:
1. With caching enabled, but the sending and receiving variables were placed in the corresponding no-cache section, the results are as previously mentioned; reading the version number and generating the shared key are normal, but importing the public key using ImportEccKeyReq returned an error 0x055A5A399, preventing subsequent key exchange and key derivation steps from proceeding. 2. With caching disabled, the public key import using ImportEccKeyReq (step 4) and the key exchange DHSharedSecretCompute (step 5) returned normally, but the subsequent key derivation steps KdfSP800_56C_ONESTEP_ReqTest_demo (step 6) and HSEKeyDeriveExtractKeyReq (step 7) returned a key slot empty error 0xA5AA5317. Based on the above attempts, after step 5 DHSharedSecretCompute, I imported a 32-byte fake shared key into the corresponding shared key slot using ImportSharedKeyReq(&SHARED_ImportSecret_1_0), and steps 6 and 7 returned correctly and derived the corresponding key, which leads me to conclude that although step 4 ImportEccKeyReq function returned normally, it did not successfully import the public key. The current running project is based on a newly created S32K314 project in S32DS, and then I imported the corresponding functional files from the HSE DEMO; I'm not sure if this affects the execution results. I have tried many methods and still cannot solve the problem, please help analyze the issue, thank you.
0 项奖励
回复
1,750 次查看
铅笔
Contributor II
uint8_t sharedSecretKey[32] =
{ 0x00, 0xd0, 0x07, 0xe1, 0xb9, 0xaf, 0xcc, 0x31, 0x2e, 0xec, 0x9c, 0xec, 0xff,
0xa0, 0x28, 0x07, 0x52, 0xbb, 0xd1, 0x95, 0x31, 0x82, 0xed, 0xef, 0x12,
0xf3, 0xfc, 0x36, 0x6e, 0x8f, 0x43, 0x56
};

void HSE_CryptoKeyTest(void)
{
hseSrvResponse_t HseResponse;

hseKeyHandle_t eccRAMKeyHandle = HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE;
hseKeyHandle_t DHSharedSecretRAMKeyHandle = HSE_DEMO_DH_SHARED_SECRET_HANDLE;

hseKeyHandle_t AESDerivedKeyInfoHandle0 = HSE_DEMO_RAM_AES256_KEY0;
hseKeyHandle_t AESDerivedKeyInfoHandle1 = HSE_DEMO_RAM_AES128_KEY1;
hseKeyHandle_t ImportEccPubRAMKeyHandle = HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE;


HseResponse = GenerateEccKeyAndExportPublic(HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE, HSE_EC_SEC_SECP256R1, (HSE_KF_USAGE_EXCHANGE | HSE_KF_ACCESS_EXPORTABLE), eccP256PubKeyGet);
printf("hse_step3: %X\n\r", HseResponse);

HseResponse = ImportEccKeyReq(
HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE,
HSE_KEY_TYPE_ECC_PUB,
(HSE_KF_USAGE_EXCHANGE | HSE_KF_ACCESS_EXPORTABLE),
HSE_EC_SEC_SECP256R1,
KeyBitLen(HSE_EC_SEC_SECP256R1),
eccP256PubKeyGet,
NULL);
printf("hse_step4: %X\n\r", HseResponse);

HseResponse = DHSharedSecretCompute(
HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE,
HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE,
&DHSharedSecretRAMKeyHandle,
RAM_KEY,
KeyBitLen(HSE_EC_SEC_SECP256R1));
printf("hse_step5: %X\n\r", HseResponse);

// ImportSharedKeyReq(&SHARED_ImportSecret_1_0);


HseResponse = KdfSP800_56C_ONESTEP_ReqTest_demo();
printf("hse_step6: %X\n\r", HseResponse);

HseResponse = HSEKeyDeriveExtractKeyReq
(
KdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.targetKeyHandle,
0,
&AESDerivedKeyInfoHandle1,
RAM_KEY,
aes128KeyInfo
);
printf("hse_step7: %X\n\r", HseResponse);
}
0 项奖励
回复
1,715 次查看
lukaszadrapa
NXP TechSupport
NXP TechSupport

What is inside KdfSP800_56C_ONESTEP_ReqTest_demo()? It looks like wrong key handle is used in this function. 

0 项奖励
回复
1,705 次查看
铅笔
Contributor II
hseKdfSP800_56COneStepScheme_t KdfSP800_56C_ONESTEP_Scheme_1_0 =
{
.salt = {
.saltKeyHandle = HSE_INVALID_KEY_HANDLE,
.saltLength = 0,
.pSalt = NULL
},
.kdfCommon = {
.prfAlgo = HSE_KDF_SHA2_256,
.srcKeyHandle = HSE_INVALID_KEY_HANDLE,
.targetKeyHandle = HSE_INVALID_KEY_HANDLE,
.keyMatLen = BITS_TO_BYTES(256UL),
.kdfPrf = HSE_KDF_PRF_HASH,
.pInfo = (HOST_ADDR)KdfSP800_56C_ONESTEP_FixedInfo_1_0,
.infoLength = ARRAY_SIZE(KdfSP800_56C_ONESTEP_FixedInfo_1_0)
}
};

hseSrvResponse_t KdfSP800_56C_ONESTEP_ReqTest_demo()
{
hseSrvResponse_t hseResponse;
hseKeyHandle_t DHSharedSecretRAMKeyHandle = HSE_DEMO_DH_SHARED_SECRET_HANDLE;

hseResponse = HKF_AllocKeySlot(RAM_KEY, HSE_KEY_TYPE_SHARED_SECRET, KdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.keyMatLen * 8U, &targetSharedSecretKey_0);

KdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.srcKeyHandle = DHSharedSecretRAMKeyHandle;
KdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.targetKeyHandle = targetSharedSecretKey_0;

hseResponse = KdfSP800_56C_ONESTEP_Test_0(&KdfSP800_56C_ONESTEP_Scheme_1_0);

return hseResponse;
}

static hseSrvResponse_t KdfSP800_56C_ONESTEP_Test_0(hseKdfSP800_56COneStepScheme_t *pKdfScheme)
{
hseSrvResponse_t hseResponse;

hseResponse = HSEKdfSP800_56COneStepReq(pKdfScheme);

return hseResponse;
}
0 项奖励
回复
%3CLINGO-SUB%20id%3D%22lingo-sub-2170895%22%20slang%3D%22zh-CN%22%20mode%3D%22CREATE%22%3ES32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2170895%22%20slang%3D%22zh-CN%22%20mode%3D%22CREATE%22%3E%3CDIV%3E%3CDIV%3E%3CDIV%3E%3CSPAN%3Econst%3C%2FSPAN%3E%20%3CSPAN%3EhseKeyGroupCfgEntry_t%3C%2FSPAN%3E%20%3CSPAN%3ENVM_Catalog%3C%2FSPAN%3E%20%3CSPAN%3E%5B%5D%3C%2FSPAN%3E%3CSPAN%3E%20%3D%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%7B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20%26nbsp%3BkeyType%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20numOfKeySlots%20%26nbsp%3B%20maxKeyBitLen%20%26nbsp%3B*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20CUST%20keys%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_SHE%2C%20%3C%2FSPAN%3E%3CSPAN%3E12U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY128_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20MASTER_ECU_KEY%2C%20BOOT_MAC_KEY%2C%20KEY_1%20to%20KEY_10%20*%2F%3C%2FSPAN%3E%20%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20HSE_KEY_TYPE_AES%2C%20%3C%2FSPAN%3E%3CSPAN%3E4U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY128_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20HSE_KEY_TYPE_AES%2C%20%3C%2FSPAN%3E%3CSPAN%3E7U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY256_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%2F*%20HMAC%20key%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20HSE_KEY_TYPE_HMAC%2C%20%3C%2FSPAN%3E%3CSPAN%3E2U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY512_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20ECC%20keys%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20WRP_KEY_TYPE_ECC_PAIR%2C%20%3C%2FSPAN%3E%3CSPAN%3E3U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20WRP_KEY_TYPE_ECC_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20WRP_KEY_TYPE_ECC_PUB_EXT%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20RSA%20keys%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20HSE_KEY_TYPE_RSA_PAIR%2C%20%3C%2FSPAN%3E%3CSPAN%3E2U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY4096_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20HSE_KEY_TYPE_RSA_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY4096_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_CUST%2C%20HSE_KEY_TYPE_RSA_PUB_EXT%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY4096_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20OEM%20keys%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20HSE_KEY_TYPE_AES%2C%20%3C%2FSPAN%3E%3CSPAN%3E3U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY128_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20HSE_KEY_TYPE_AES%2C%20%3C%2FSPAN%3E%3CSPAN%3E3U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY256_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%2F*%20HMAC%20key%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20HSE_KEY_TYPE_HMAC%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY1024_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20ECC%20keys%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20WRP_KEY_TYPE_ECC_PAIR%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20WRP_KEY_TYPE_ECC_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20WRP_KEY_TYPE_ECC_PUB_EXT%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20RSA%20keys%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20HSE_KEY_TYPE_RSA_PAIR%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY4096_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20HSE_KEY_TYPE_RSA_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY4096_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20HSE_KEY_TYPE_RSA_PUB_EXT%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY4096_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_MU0_MASK%2C%20HSE_KEY_OWNER_OEM%2C%20WRP_KEY_TYPE_ECC_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7D%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%7D%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CBR%20%2F%3E%3CDIV%3E%3CSPAN%3Econst%3C%2FSPAN%3E%20%3CSPAN%3EhseKeyGroupCfgEntry_t%3C%2FSPAN%3E%20%3CSPAN%3ERAM_Catalog%3C%2FSPAN%3E%20%3CSPAN%3E%5B%5D%3C%2FSPAN%3E%3CSPAN%3E%20%3D%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%7B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20%26nbsp%3BkeyType%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20numOfKeySlots%20maxKeyBitLen*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20Symetric%20key%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_SHE%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY128_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20KEY_RAM%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_AES%2C%20%3C%2FSPAN%3E%3CSPAN%3E10U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY128_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_MU0_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_AES%2C%20%3C%2FSPAN%3E%3CSPAN%3E10U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY256_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%2F*%20HMAC%20key%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_HMAC%2C%20%3C%2FSPAN%3E%3CSPAN%3E6U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY1024_BITS%7D%2C%3C%2FSPAN%3E%3CSPAN%3E%20%2F*%20RSA%20key%20*%2F%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_RSA_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E2U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY2048_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_RSA_PUB_EXT%2C%20%3C%2FSPAN%3E%3CSPAN%3E1U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY1024_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20WRP_KEY_TYPE_ECC_PAIR%2C%20%3C%2FSPAN%3E%3CSPAN%3E2U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20WRP_KEY_TYPE_ECC_PUB%2C%20%3C%2FSPAN%3E%3CSPAN%3E5U%3C%2FSPAN%3E%3CSPAN%3E%2C%20WRP_ECC_KEY_SIZE%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_SHARED_SECRET%2C%20%3C%2FSPAN%3E%3CSPAN%3E2U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY638_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7BHSE_ALL_MU_MASK%2C%20HSE_KEY_OWNER_ANY%2C%20HSE_KEY_TYPE_SHARED_SECRET%2C%20%3C%2FSPAN%3E%3CSPAN%3E2U%3C%2FSPAN%3E%3CSPAN%3E%2C%20HSE_KEY2048_BITS%7D%2C%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3E0U%3C%2FSPAN%3E%3CSPAN%3E%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%5C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%7D%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%7D%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3Evoid%3C%2FSPAN%3E%20%3CSPAN%3EHSE_CryptoKeyTest%3C%2FSPAN%3E%3CSPAN%3E(%3C%2FSPAN%3E%3CSPAN%3Evoid%3C%2FSPAN%3E%3CSPAN%3E)%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%7B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EhseSrvResponse_t%3C%2FSPAN%3E%20%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EhseKeyHandle_t%3C%2FSPAN%3E%20%3CSPAN%3EeccRAMKeyHandle%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EhseKeyHandle_t%3C%2FSPAN%3E%20%3CSPAN%3EDHSharedSecretRAMKeyHandle%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20HSE_DEMO_DH_SHARED_SECRET_HANDLE%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EhseKeyHandle_t%3C%2FSPAN%3E%20%3CSPAN%3EAESDerivedKeyInfoHandle0%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20HSE_DEMO_RAM_AES256_KEY0%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EhseKeyHandle_t%3C%2FSPAN%3E%20%3CSPAN%3EAESDerivedKeyInfoHandle1%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20HSE_DEMO_RAM_AES128_KEY1%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EhseKeyHandle_t%3C%2FSPAN%3E%20%3CSPAN%3EImportEccPubRAMKeyHandle%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE%3B%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20Generate%20ECC%20key%20pair%20in%20RAM%20*%2F%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20%3C%2FSPAN%3E%3CSPAN%3EGenerateEccKeyAndExportPublic%3C%2FSPAN%3E%3CSPAN%3E(HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE%2C%20HSE_EC_SEC_SECP256R1%2C%20(HSE_KF_USAGE_EXCHANGE%20%7C%20HSE_KF_ACCESS_EXPORTABLE)%2C%20%3C%2FSPAN%3E%3CSPAN%3EeccP256PubKeyGet%3C%2FSPAN%3E%3CSPAN%3E)%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3Eprintf%3C%2FSPAN%3E%3CSPAN%3E(%3C%2FSPAN%3E%3CSPAN%3E%22hse_step3%3A%20%3C%2FSPAN%3E%3CSPAN%3E%25X%3C%2FSPAN%3E%3CSPAN%3E%5Cn%5Cr%3C%2FSPAN%3E%3CSPAN%3E%22%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E)%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CBR%20%2F%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20Import%20ECC%20Key%20*%2F%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20%3C%2FSPAN%3E%3CSPAN%3EImportEccKeyReq%3C%2FSPAN%3E%3CSPAN%3E(%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE%2C%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20HSE_KEY_TYPE_ECC_PUB%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20HSE_KF_USAGE_EXCHANGE%2C%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20HSE_EC_SEC_SECP256R1%2C%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EKeyBitLen%3C%2FSPAN%3E%3CSPAN%3E(HSE_EC_SEC_SECP256R1)%2C%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EeccP256PubKeyGet%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3ENULL%3C%2FSPAN%3E%3CSPAN%3E)%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3Eprintf%3C%2FSPAN%3E%3CSPAN%3E(%3C%2FSPAN%3E%3CSPAN%3E%22hse_step4%3A%20%3C%2FSPAN%3E%3CSPAN%3E%25X%3C%2FSPAN%3E%3CSPAN%3E%5Cn%5Cr%3C%2FSPAN%3E%3CSPAN%3E%22%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E)%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%2F*%20Compute%20DH%20Shared%20Secret%20(ECDH)%20*%2F%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E%20%3D%20%3C%2FSPAN%3E%3CSPAN%3EDHSharedSecretCompute%3C%2FSPAN%3E%3CSPAN%3E(%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26amp%3B%3C%2FSPAN%3E%3CSPAN%3EDHSharedSecretRAMKeyHandle%3C%2FSPAN%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20RAM_KEY%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EKeyBitLen%3C%2FSPAN%3E%3CSPAN%3E(HSE_EC_SEC_SECP256R1))%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%20%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3Eprintf%3C%2FSPAN%3E%3CSPAN%3E(%3C%2FSPAN%3E%3CSPAN%3E%22hse_step5%3A%20%3C%2FSPAN%3E%3CSPAN%3E%25X%3C%2FSPAN%3E%3CSPAN%3E%5Cn%5Cr%3C%2FSPAN%3E%3CSPAN%3E%22%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3C%2FSPAN%3E%3CSPAN%3EHseResponse%3C%2FSPAN%3E%3CSPAN%3E)%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3EGenerateEccKeyAndExportPublic%E5%85%88%E7%94%9F%E6%88%90%E5%AF%86%E9%92%A5%E5%AF%B9%E5%B9%B6%E5%AF%BC%E5%87%BA%E5%85%AC%E9%92%A5%E5%88%B0eccP256PubKeyGet%5B64%5D%EF%BC%8C%E5%86%8D%E5%B0%86%E8%AF%A5%E7%94%9F%E6%88%90%E7%9A%84%E5%85%AC%E9%92%A5%E9%80%9A%E8%BF%87ImportEccKeyReq%E5%AF%BC%E5%85%A5%E5%AF%86%E9%92%A5%E6%A7%BD%E8%BF%94%E5%9B%9E0x055A5A399%E9%94%99%E8%AF%AF%EF%BC%8CBased%20on%20the%20S32K344%20DEMO%2C%20please%20help%20analyze%20the%20reason.%3C%2FSPAN%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2187987%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2187987%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%E9%9D%9E%E5%B8%B8%E6%84%9F%E8%B0%A2%EF%BC%81%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2184546%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2184546%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F254898%22%20target%3D%22_blank%22%3E%40%E9%93%85%E7%AC%94%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E1.%E8%BF%99%E5%8F%96%E5%86%B3%E4%BA%8E%E9%AB%98%E9%80%9F%E7%BC%93%E5%86%B2%E5%AD%98%E5%82%A8%E5%99%A8%E7%9A%84%E7%8A%B6%E6%80%81%E3%80%82%E6%A0%B9%E6%8D%AE%E4%B9%8B%E5%89%8D%E7%9A%84%E7%A8%8B%E5%BA%8F%E6%88%96%E6%95%B0%E6%8D%AE%E6%B5%81%EF%BC%8C%E5%8F%82%E6%95%B0%E5%8F%AF%E8%83%BD%E5%AD%98%E5%9C%A8%E4%BA%8E%E7%89%A9%E7%90%86%E5%86%85%E5%AD%98%E4%B8%AD%EF%BC%8C%E4%B9%9F%E5%8F%AF%E8%83%BD%E4%B8%8D%E5%AD%98%E5%9C%A8%E3%80%82%E5%9B%A0%E6%AD%A4%EF%BC%8C%E5%A6%82%E6%9E%9C%E5%90%AF%E7%94%A8%E4%BA%86%E6%95%B0%E6%8D%AE%E7%BC%93%E5%AD%98%EF%BC%8C%E5%9C%A8%E6%9F%90%E4%BA%9B%E6%83%85%E5%86%B5%E4%B8%8B%E5%8F%AF%E4%BB%A5%E6%AD%A3%E5%B8%B8%E5%B7%A5%E4%BD%9C%EF%BC%8C%E4%BD%86%E5%9C%A8%E5%85%B6%E4%BB%96%E6%83%85%E5%86%B5%E4%B8%8B%E5%8F%AF%E8%83%BD%E5%B0%B1%E4%B8%8D%E8%A1%8C%E4%BA%86%E3%80%82%E7%94%A8%E6%88%B7%E6%9C%89%E8%B4%A3%E4%BB%BB%E5%B0%86%E7%94%A8%E4%BA%8E%E4%B8%8E%20HSE%20%E9%80%9A%E4%BF%A1%E7%9A%84%E6%89%80%E6%9C%89%E6%95%B0%E6%8D%AE%E5%AF%B9%E8%B1%A1%E4%BF%9D%E5%AD%98%E5%9C%A8%E9%9D%9E%E7%BC%93%E5%AD%98%E5%86%85%E5%AD%98%E4%B8%AD%E3%80%82%3C%2FP%3E%0A%3CP%3E2.%E5%AF%86%E9%92%A5%E5%88%86%E9%85%8D%E5%99%A8%E4%BC%BC%E4%B9%8E%E5%B9%B6%E4%B8%8D%E5%AE%8C%E5%85%A8%E5%8F%AF%E9%9D%A0%E3%80%82%E5%AE%83%E4%BC%9A%E5%B0%9D%E8%AF%95%E9%80%89%E6%8B%A9%E6%9C%80%E4%BD%B3%E7%9A%84%E5%8F%AF%E7%94%A8%E9%94%AE%E6%A7%BD%EF%BC%8C%E4%BD%86%E5%BD%93%E6%9C%89%E4%B8%A4%E4%B8%AA%E7%9B%B8%E5%90%8C%E7%9A%84%E9%94%AE%E7%BB%84%E6%97%B6%EF%BC%8C%E5%AE%83%E4%BC%BC%E4%B9%8E%E4%BC%9A%E5%87%BA%E7%8E%B0%E6%95%85%E9%9A%9C%E3%80%82%3C%2FP%3E%0A%3CP%3E%E9%97%AE%E5%80%99%EF%BC%8C%3CBR%20%2F%3ELukas%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2184239%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2184239%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%E6%82%A8%E5%A5%BD%EF%BC%9A%3C%2FP%3E%3CP%3E%E6%88%91%E5%B0%9D%E8%AF%95%E5%88%A0%E9%99%A4%3CSPAN%3ERAM%20%E7%9B%AE%E5%BD%95%E4%B8%AD%E7%9A%84%3C%2FSPAN%3E%E4%B8%80%E7%BB%84SHARED_SECRET%EF%BC%8C%E5%B9%B6%E7%A6%81%E7%94%A8%E7%BC%93%E5%AD%98%EF%BC%8C%E8%BF%99%E6%A0%B7%E5%B0%B1%E8%83%BD%E5%BE%97%E5%88%B0%E6%AD%A3%E7%A1%AE%E7%9A%84%E7%BB%93%E6%9E%9C%E3%80%82%E7%8E%B0%E5%9C%A8%E6%88%91%E6%9C%89%E4%B8%A4%E4%B8%AA%E9%97%AE%E9%A2%98%EF%BC%9A%3C%2FP%3E%3CP%3E%3CSPAN%3E1%E3%80%81%E5%A6%82%E6%9E%9C%E6%9C%AA%E7%A6%81%E7%94%A8%E7%BC%93%E5%AD%98%EF%BC%8C%E4%B8%BA%E4%BB%80%E4%B9%88%20ImportEccKeyReq%20%E6%AD%A5%E9%AA%A4%E4%BC%9A%E6%8A%A5%E5%91%8A%2055A5A399%20%E9%94%99%E8%AF%AF%EF%BC%8C%E8%80%8C%E5%85%B6%E4%BB%96%E6%AD%A5%E9%AA%A4%E9%83%BD%E6%AD%A3%E7%A1%AE%EF%BC%9F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22_1-1760169336909.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22_1-1760169336909.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F360346iF070094526C7C3C5%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22_1-1760169336909.png%22%20alt%3D%22_1-1760169336909.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E2%E3%80%81%E5%A6%82%E6%9E%9C%3CSPAN%3ERAM%20%E7%9B%AE%E5%BD%95%E4%B8%AD%E6%9C%89%E4%B8%A4%E4%B8%AA%20SHARED_SECRET%20%E7%BB%84%EF%BC%8C%E4%B8%BA%E4%BB%80%E4%B9%88%E4%BC%9A%E5%AF%BC%E8%87%B4%E4%B8%8B%E5%9B%BE%E6%89%80%E7%A4%BA%E7%9A%84%E9%94%99%E8%AF%AF%EF%BC%9F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22_2-1760169752672.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22_2-1760169752672.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F360347iAAC86480BCAB8074%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22_2-1760169752672.png%22%20alt%3D%22_2-1760169752672.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%E8%B0%A2%E8%B0%A2%EF%BC%81%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2178734%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2178734%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%E9%97%AE%E9%A2%98%E5%B0%B1%E5%9C%A8%E8%BF%99%E9%87%8C%EF%BC%9A%3C%2FP%3E%0A%3CP%3E%E6%88%91%E7%9C%8B%E5%88%B0%20RAM%20%E7%9B%AE%E5%BD%95%E4%B8%AD%E6%9C%89%E4%B8%A4%E4%B8%AA%20SHARED_SECRET%20%E7%BB%84%EF%BC%9A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lukaszadrapa_0-1759315389746.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22lukaszadrapa_0-1759315389746.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F359156i1E5E9BDB44027F4E%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22lukaszadrapa_0-1759315389746.png%22%20alt%3D%22lukaszadrapa_0-1759315389746.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%E8%AE%A1%E7%AE%97%E5%85%B1%E4%BA%AB%E7%A7%98%E5%AF%86%E6%97%B6%EF%BC%8C%E5%AF%86%E9%92%A5%E5%8F%A5%E6%9F%84%200x00020%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3E9%3C%2FSTRONG%3E%3C%2FFONT%3E00%20%EF%BC%88RAM%20%E7%9B%AE%E5%BD%95%EF%BC%8C%E7%BB%84%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3E9%3C%2FSTRONG%3E%3C%2FFONT%3E%EF%BC%8C%E5%AF%86%E9%92%A5%200%EF%BC%89%E4%BC%A0%E9%80%92%E7%BB%99%E5%87%BD%E6%95%B0%EF%BC%9A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lukaszadrapa_1-1759315447506.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22lukaszadrapa_1-1759315447506.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F359158i0A03836FFC7C98AA%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22lukaszadrapa_1-1759315447506.png%22%20alt%3D%22lukaszadrapa_1-1759315447506.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%E4%BD%86%E6%98%AF%EF%BC%8C%E5%BD%93%E6%82%A8%E8%B7%A8%E8%BF%87%E8%AF%A5%E5%87%BD%E6%95%B0%E6%97%B6%EF%BC%8C%E9%94%AE%E5%88%86%E9%85%8D%E5%99%A8%E4%BC%9A%E9%80%89%E6%8B%A9%E9%94%AE%E6%9F%84%200x00020%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3E8%3C%2FSTRONG%3E%3C%2FFONT%3E00%EF%BC%88RAM%20%E7%9B%AE%E5%BD%95%EF%BC%8C%E7%BB%84%20%3CSTRONG%3E%3CFONT%20color%3D%22%23FF0000%22%3E8%3C%2FFONT%3E%3C%2FSTRONG%3E%E9%94%AE%200%EF%BC%89%EF%BC%9A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lukaszadrapa_2-1759315511660.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22lukaszadrapa_2-1759315511660.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F359159i41C70D2EED375145%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22lukaszadrapa_2-1759315511660.png%22%20alt%3D%22lukaszadrapa_2-1759315511660.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%E5%9B%A0%E6%AD%A4%EF%BC%8C%E5%85%B1%E4%BA%AB%E7%A7%98%E5%AF%86%E8%A2%AB%E5%AD%98%E5%82%A8%E5%88%B0%200x00020%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3E8%3C%2FSTRONG%3E%3C%2FFONT%3E00.%20%3C%2FP%3E%0A%3CP%3E%E4%BD%86%E6%98%AF%EF%BC%8C%E5%9C%A8%E5%87%BD%E6%95%B0%20KdfSP800_56C_ONESTEP_ReqTest_demo%20%E4%B8%AD%EF%BC%8C%E6%82%A8%E5%B0%86%E5%8E%9F%E5%A7%8B%E5%AF%86%E9%92%A5%E5%8F%A5%E6%9F%84%200x00020900%20%E9%85%8D%E7%BD%AE%E4%B8%BA%E6%BA%90%E5%AF%86%E9%92%A5%E5%8F%A5%E6%9F%84%E3%80%82%E8%80%8C%E4%B8%8D%E6%98%AF%E9%92%A5%E5%8C%99%E5%88%86%E9%85%8D%E5%99%A8%E5%88%86%E9%85%8D%E7%9A%84%E9%82%A3%E4%B8%AA%EF%BC%9A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lukaszadrapa_3-1759316571551.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22lukaszadrapa_3-1759316571551.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F359161i3C927AFF5A022359%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22lukaszadrapa_3-1759316571551.png%22%20alt%3D%22lukaszadrapa_3-1759316571551.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%E6%89%80%E4%BB%A5%EF%BC%8C%E8%BF%99%E5%B0%B1%E6%98%AF%E9%92%A5%E5%8C%99%E6%A7%BD%E7%9C%8B%E8%B5%B7%E6%9D%A5%E5%83%8F%E7%A9%BA%E7%9A%84%E5%8E%9F%E5%9B%A0--%E5%9B%A0%E4%B8%BA%E5%AE%83%E5%AE%9E%E9%99%85%E4%B8%8A%E6%98%AF%E7%A9%BA%E7%9A%84%E3%80%82%E6%82%A8%E9%9C%80%E8%A6%81%E9%80%89%E6%8B%A9%E7%94%B1%E9%94%AE%E5%88%86%E9%85%8D%E5%99%A8%E5%88%86%E9%85%8D%E7%9A%84%E9%94%AE%E5%8F%A5%E6%9F%84%E3%80%82%20%3C%2FP%3E%0A%3CP%3E%E6%AD%A4%E8%87%B4%EF%BC%8C%3C%2FP%3E%0A%3CP%3E%E5%8D%A2%E5%8D%A1%E6%96%AF%20%3C%2FP%3E%0A%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2178050%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2178050%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%E5%8F%AF%E5%B0%86%20C%20%E6%96%87%E4%BB%B6%E6%B7%BB%E5%8A%A0%E5%88%B0%E9%A1%B9%E7%9B%AE%E4%B8%AD%EF%BC%8C%E4%BB%A5%E5%B8%AE%E5%8A%A9%E9%AA%8C%E8%AF%81%E3%80%82%E8%B0%A2%E8%B0%A2%E3%80%82%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2174069%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2174069%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%E6%98%AF%E5%90%A6%E6%9C%89%E5%8F%AF%E8%83%BD%E5%88%86%E4%BA%AB%E7%AE%80%E5%8D%95%E7%9A%84%E9%A1%B9%E7%9B%AE%EF%BC%8C%E4%BB%A5%E4%BE%BF%E5%9C%A8%E6%88%91%E8%BF%99%E8%BE%B9%E8%BF%9B%E8%A1%8C%E5%A4%8D%E5%88%B6%EF%BC%9F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2172814%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3E%E5%9B%9E%E5%A4%8D%EF%BC%9A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2172814%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E1%E3%80%81%3CSPAN%3E%E6%9C%AA%E5%85%B3%E9%97%AD%E7%BC%93%E5%AD%98%E7%9A%84%E6%97%A5%E5%BF%97%EF%BC%9A%201.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22_0-1758286321615.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22_0-1758286321615.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F357767i91B18969389A5D47%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22_0-1758286321615.png%22%20alt%3D%22_0-1758286321615.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E2%3CSPAN%3E%E3%80%81%E7%A6%81%E7%94%A8%E7%BC%93%E5%AD%98%EF%BC%8C%E4%BD%86%E6%AD%A5%E9%AA%A4%206%20%E5%92%8C%207%20%E6%98%BE%E7%A4%BA%E7%9A%84%E6%97%A5%E5%BF%97%E4%B8%8D%E6%AD%A3%E7%A1%AE%EF%BC%9A%203%E3%80%81%E7%A6%81%E7%94%A8%E7%BC%93%E5%AD%98%EF%BC%8C%E4%BD%86%E6%AD%A5%E9%AA%A4%206%20%E5%92%8C%207%20%E6%98%BE%E7%A4%BA%E7%9A%84%E6%97%A5%E5%BF%97%E4%B8%8D%E6%AD%A3%E7%A1%AE%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22_1-1758286486295.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22_1-1758286486295.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F357768i1298FC673707F264%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22_1-1758286486295.png%22%20alt%3D%22_1-1758286486295.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E3%E3%80%81%3CSPAN%3E%E5%9C%A8%E6%AD%A5%E9%AA%A4%205%20%E4%B8%AD%E7%9A%84%E5%AF%86%E9%92%A5%E4%BA%A4%E6%8D%A2%E6%AD%A5%E9%AA%A4%E4%B9%8B%E5%90%8E%EF%BC%8C%E5%85%B3%E9%97%AD%E7%BC%93%E5%AD%98%E5%B9%B6%E5%90%91%E7%9B%B8%E5%BA%94%E7%9A%84%E5%AF%86%E9%92%A5%E6%A7%BD%E6%97%A5%E5%BF%97%E4%B8%AD%E6%B3%A8%E5%85%A5%E4%B8%80%E4%B8%AA%E4%BC%AA%E9%80%A0%E7%9A%84%E4%BA%A4%E6%8D%A2%E5%AF%86%E9%92%A5%E3%80%82%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22_2-1758287145438.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22_2-1758287145438.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F357769i64C257B4DF2D1B99%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22_2-1758287145438.png%22%20alt%3D%22_2-1758287145438.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22_3-1758287337483.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22_3-1758287337483.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F357771iE530CA9E92CB5AEB%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22_3-1758287337483.png%22%20alt%3D%22_3-1758287337483.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2172783%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2172783%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3EhseKdfSP800_56COneStepScheme_t%20KdfSP800_56C_ONESTEP_Scheme_1_0%20%3D%3CBR%20%2F%3E%7B%3CBR%20%2F%3E.salt%3D%20%7B%3CBR%20%2F%3E.saltKeyHandle%3D%20HSE_INVALID_KEY_HANDLE%2C%3CBR%20%2F%3E.saltLength%3D%200%2C%3CBR%20%2F%3E.pSalt%3D%20NULL%3CBR%20%2F%3E%7D%2C%3CBR%20%2F%3E.kdfCommon%3D%20%7B%3CBR%20%2F%3E.prfAlgo%3D%20HSE_KDF_SHA2_256%2C%3CBR%20%2F%3E.srcKeyHandle%3D%20HSE_INVALID_KEY_HANDLE%2C%3CBR%20%2F%3E.targetKeyHandle%3D%20HSE_INVALID_KEY_HANDLE%2C%3CBR%20%2F%3E.keyMatLen%3D%20BITS_TO_BYTES(256UL)%2C%3CBR%20%2F%3E.kdfPrf%3D%20HSE_KDF_PRF_HASH%EF%BC%8C%3CBR%20%2F%3E.pInfo%3D%20(HOST_ADDR)KdfSP800_56C_ONESTEP_FixedInfo_1_0%2C%3CBR%20%2F%3E.infoLength%3D%20ARRAY_SIZE(KdfSP800_56C_ONESTEP_FixedInfo_1_0)%3CBR%20%2F%3E%7D%3CBR%20%2F%3E%7D%3B%3CBR%20%2F%3E%3CBR%20%2F%3EhseSrvResponse_t%20KdfSP800_56C_ONESTEP_ReqTest_demo()%3CBR%20%2F%3E%7B%3CBR%20%2F%3EhseSrvResponse_t%20hseResponse%EF%BC%9B%3CBR%20%2F%3EhseKeyHandle_t%20DHSharedSecretRAMKeyHandle%20%3D%20HSE_DEMO_DH_SHARED_SECRET_HANDLE%3B%3CBR%20%2F%3E%3CBR%20%2F%3EhseResponse%20%3D%20HKF_AllocKeySlot(RAM_KEY%2C%20HSE_KEY_TYPE_SHARED_SECRET%2C%20KdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.keyMatLen%20*%208U%2C%26amp%3BtargetSharedSecretKey_0)%3B%3CBR%20%2F%3E%3CBR%20%2F%3EKdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.srcKeyHandle%3D%20DHSharedSecretRAMKeyHandle%3B%3CBR%20%2F%3EKdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.targetKeyHandle%3D%20targetSharedSecretKey_0%3B%3CBR%20%2F%3E%3CBR%20%2F%3EhseResponse%20%3D%20KdfSP800_56C_ONESTEP_Test_0(%26amp%3BKdfSP800_56C_ONESTEP_Scheme_1_0)%3B%3CBR%20%2F%3E%3CBR%20%2F%3Ereturn%20hseResponse%EF%BC%9B%3CBR%20%2F%3E%7D%3CBR%20%2F%3E%3CBR%20%2F%3Estatic%20hseSrvResponse_t%20KdfSP800_56C_ONESTEP_Test_0(hseKdfSP800_56COneStepScheme_t%20*pKdfScheme)%3CBR%20%2F%3E%7B%3CBR%20%2F%3EhseSrvResponse_t%20hseResponse%EF%BC%9B%3CBR%20%2F%3E%3CBR%20%2F%3EhseResponse%20%3D%20HSEKdfSP800_56COneStepReq(pKdfScheme)%3B%3CBR%20%2F%3E%3CBR%20%2F%3Ereturn%20hseResponse%3B%3CBR%20%2F%3E%7D%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2172716%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2172716%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EKdfSP800_56C_ONESTEP_ReqTest_demo()%20%E5%86%85%E6%9C%89%E4%BB%80%E4%B9%88%EF%BC%9F%E8%AF%A5%E5%8A%9F%E8%83%BD%E4%BC%BC%E4%B9%8E%E4%BD%BF%E7%94%A8%E4%BA%86%E9%94%99%E8%AF%AF%E7%9A%84%E9%94%AE%E6%9F%84%E3%80%82%20%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2171839%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2171839%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3Euint8_t%20sharedSecretKey%5B32%5D%20%3D%3CBR%20%2F%3E%7B%200x00%2C%200xd0%2C%200x07%2C%200xe1%2C%200xb9%2C%200xaf%2C%200xcc%2C%200x31%2C%200x2e%2C%200xec%2C%200x9c%2C%200xec%2C%200xff%E3%80%81%3CBR%20%2F%3E0xa0%2C%200x28%2C%200x07%2C%200x52%2C%200xbb%2C%200xd1%2C%200x95%2C%200x31%2C%200x82%2C%200xed%2C%200xef%2C%200x12%2C%3CBR%20%2F%3E0xf3%2C%200xfc%2C%200x36%2C%200x6e%2C%200x8f%2C%200x43%2C%200x56%3CBR%20%2F%3E%7D%EF%BC%9B%3CBR%20%2F%3E%3CBR%20%2F%3Evoid%20HSE_CryptoKeyTest(void)%3CBR%20%2F%3E%7B%3CBR%20%2F%3EhseSrvResponse_t%20HseResponse%3B%3CBR%20%2F%3E%3CBR%20%2F%3EhseKeyHandle_t%20eccRAMKeyHandle%20%3D%20HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE%EF%BC%9B%3CBR%20%2F%3EhseKeyHandle_t%20DHSharedSecretRAMKeyHandle%20%3D%20HSE_DEMO_DH_SHARED_SECRET_HANDLE%EF%BC%9B%3CBR%20%2F%3E%3CBR%20%2F%3EhseKeyHandle_t%20AESDerivedKeyInfoHandle0%20%3D%20HSE_DEMO_RAM_AES256_KEY0%EF%BC%9B%3CBR%20%2F%3EhseKeyHandle_t%20AESDerivedKeyInfoHandle1%20%3D%20HSE_DEMO_RAM_AES128_KEY1%EF%BC%9B%3CBR%20%2F%3EhseKeyHandle_t%20ImportEccPubRAMKeyHandle%20%3D%20HSE_DEMO_RAM_ECC_PUB_KEY_HANDLE%EF%BC%9B%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3EHseResponse%20%3D%20GenerateEccKeyAndExportPublic(HSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE%2C%20HSE_EC_SEC_SECP256R1%2C%20(HSE_KF_USAGE_EXCHANGE%20%7C%20HSE_KF_ACCESS_EXPORTABLE)%2C%20eccP256PubKeyGet)%3B%3CBR%20%2F%3Eprintf(%22hse_step3%EF%BC%9A%25X%5Cn%5Cr%22%2C%20HseResponse%EF%BC%89%EF%BC%9B%3CBR%20%2F%3E%3CBR%20%2F%3EHseResponse%20%3D%20ImportEccKeyReq(%3CBR%20%2F%3EHSE_DEMO_RAM_ECC_PUB_KEY_HANDLE%2C%3CBR%20%2F%3EHSE_KEY_TYPE_ECC_PUB%E3%80%81%3CBR%20%2F%3E(HSE_KF_USAGE_EXCHANGE%20%7C%20HSE_KF_ACCESS_EXPORTABLE)%2C%3CBR%20%2F%3EHSE_EC_SEC_SECP256R1%2C%3CBR%20%2F%3EKeyBitLen(HSE_EC_SEC_SECP256R1)%2C%3CBR%20%2F%3EeccP256PubKeyGet%2C%3CBR%20%2F%3ENULL)%EF%BC%9B%3CBR%20%2F%3Eprintf(%22hse_step4%EF%BC%9A%25X%5Cn%5Cr%22%2C%20HseResponse)%EF%BC%9B%3CBR%20%2F%3E%3CBR%20%2F%3EHseResponse%20%3D%20DHSharedSecretCompute(%3CBR%20%2F%3EHSE_DEMO_RAM_ECC_PUB_KEY_HANDLE%2C%3CBR%20%2F%3EHSE_DEMO_RAM_ECC_PAIR_KEY_HANDLE%2C%3CBR%20%2F%3E%26amp%3B%20DHSharedSecretRAMKeyHandle%2C%3CBR%20%2F%3ERAM_KEY%2C%3CBR%20%2F%3EKeyBitLen(HSE_EC_SEC_SECP256R1))%3B%3CBR%20%2F%3Eprintf(%22hse_step5%EF%BC%9A%25X%5Cn%5Cr%22%2C%20HseResponse)%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%2F%2F%20ImportSharedKeyReq(%26amp%3BSHARED_ImportSecret_1_0)%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3EHseResponse%20%3D%20KdfSP800_56C_ONESTEP_ReqTest_demo()%3B%3CBR%20%2F%3Eprintf(%22hse_step6%EF%BC%9A%25X%5Cn%5Cr%22%2C%20HseResponse)%3B%3CBR%20%2F%3E%3CBR%20%2F%3EHseResponse%20%3D%20HSEKeyDeriveExtractKeyReq%3CBR%20%2F%3E(%3CBR%20%2F%3EKdfSP800_56C_ONESTEP_Scheme_1_0.kdfCommon.targetKeyHandle%E3%80%81%3CBR%20%2F%3E0%2C%3CBR%20%2F%3E%26amp%3B%20AESDerivedKeyInfoHandle1%2C%3CBR%20%2F%3ERAM_KEY%2C%3CBR%20%2F%3Eaes128KeyInfo%3CBR%20%2F%3E)%3B%3CBR%20%2F%3Eprintf(%22hse_step7%3A%25X%5Cn%5Cr%22%2C%20HseResponse)%3B%3CBR%20%2F%3E%7D%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2171800%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2171800%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%E6%88%91%E6%AF%94%E8%BE%83%E4%BA%86%E6%82%A8%E5%9C%A8%E9%99%84%E4%BB%B6%E4%B8%AD%E6%8F%90%E4%BE%9B%E7%9A%84%20DEMO%20%E5%92%8C%E6%88%91%E7%9A%84%20DEMO%EF%BC%8C%E5%AE%83%E4%BB%AC%E6%98%AF%E4%B8%80%E8%87%B4%E7%9A%84%E3%80%82%E7%9B%AE%E5%89%8D%EF%BC%8C%E6%88%91%E5%B0%9D%E8%AF%95%E4%BA%86%E5%90%AF%E7%94%A8%E5%92%8C%E7%A6%81%E7%94%A8%E7%BC%93%E5%AD%98%E7%9A%84%E4%B8%A4%E7%A7%8D%E6%83%85%E5%86%B5%EF%BC%8C%E7%8E%B0%E8%B1%A1%E5%A6%82%E4%B8%8B%EF%BC%9A%3CBR%20%2F%3E1.%E5%90%AF%E7%94%A8%E7%BC%93%E5%AD%98%E5%90%8E%EF%BC%8C%E5%8F%91%E9%80%81%E5%92%8C%E6%8E%A5%E6%94%B6%E5%8F%98%E9%87%8F%E8%A2%AB%E7%BD%AE%E4%BA%8E%E7%9B%B8%E5%BA%94%E7%9A%84%E6%97%A0%E7%BC%93%E5%AD%98%E9%83%A8%E5%88%86%EF%BC%8C%E7%BB%93%E6%9E%9C%E5%A6%82%E5%89%8D%E6%89%80%E8%BF%B0%EF%BC%9B%E8%AF%BB%E5%8F%96%E7%89%88%E6%9C%AC%E5%8F%B7%E5%92%8C%E7%94%9F%E6%88%90%E5%85%B1%E4%BA%AB%E5%AF%86%E9%92%A5%E6%AD%A3%E5%B8%B8%EF%BC%8C%E4%BD%86%E4%BD%BF%E7%94%A8%20ImportEccKeyReq%20%E5%AF%BC%E5%85%A5%E5%85%AC%E9%92%A5%E6%97%B6%E8%BF%94%E5%9B%9E%E9%94%99%E8%AF%AF%200x055A5A399%EF%BC%8C%E5%AF%BC%E8%87%B4%E5%90%8E%E7%BB%AD%E7%9A%84%E5%AF%86%E9%92%A5%E4%BA%A4%E6%8D%A2%E5%92%8C%E5%AF%86%E9%92%A5%E7%94%9F%E6%88%90%E6%AD%A5%E9%AA%A4%E6%97%A0%E6%B3%95%E7%BB%A7%E7%BB%AD%E3%80%822.%E7%A6%81%E7%94%A8%E7%BC%93%E5%AD%98%E5%90%8E%EF%BC%8C%E4%BD%BF%E7%94%A8%20ImportEccKeyReq%20%E5%AF%BC%E5%85%A5%E5%85%AC%E9%92%A5%EF%BC%88%E6%AD%A5%E9%AA%A4%204%EF%BC%89%E5%92%8C%E5%AF%86%E9%92%A5%E4%BA%A4%E6%8D%A2%20DHSharedSecretCompute%EF%BC%88%E6%AD%A5%E9%AA%A4%205%EF%BC%89%E8%BF%94%E5%9B%9E%E6%AD%A3%E5%B8%B8%EF%BC%8C%E4%BD%86%E9%9A%8F%E5%90%8E%E7%9A%84%E5%AF%86%E9%92%A5%E7%94%9F%E6%88%90%E6%AD%A5%E9%AA%A4%20KdfSP800_56C_ONESTEP_ReqTest_demo%20%EF%BC%88%E6%AD%A5%E9%AA%A4%206%EF%BC%89%E5%92%8C%20HSEKeyDeriveExtractKeyReq%20%EF%BC%88%E6%AD%A5%E9%AA%A4%207%EF%BC%89%E8%BF%94%E5%9B%9E%E5%AF%86%E9%92%A5%E6%A7%BD%E4%B8%BA%E7%A9%BA%E9%94%99%E8%AF%AF%200xA5AA5317%E3%80%82%E5%9F%BA%E4%BA%8E%E4%B8%8A%E8%BF%B0%E5%B0%9D%E8%AF%95%EF%BC%8C%E5%9C%A8%E6%AD%A5%E9%AA%A4%205%20dhSharedSecretCompute%20%E4%B9%8B%E5%90%8E%EF%BC%8C%E6%88%91%E4%BD%BF%E7%94%A8%20importSharedKeyreq%20(%26amp%3B%20Shared_import_1_0)%20%E5%B0%86%E4%B8%80%E4%B8%AA%2032%20%E5%AD%97%E8%8A%82%E7%9A%84%E5%81%87%E5%85%B1%E4%BA%AB%E5%AF%86%E9%92%A5%E5%AF%BC%E5%85%A5%E5%88%B0%E7%9B%B8%E5%BA%94%E7%9A%84%E5%85%B1%E4%BA%AB%E5%AF%86%E9%92%A5%E6%A7%BD%E4%B8%AD%EF%BC%8C%E6%AD%A5%E9%AA%A4%206%20%E5%92%8C%207%20%E6%AD%A3%E7%A1%AE%E8%BF%94%E5%9B%9E%E5%B9%B6%E6%B4%BE%E7%94%9F%E4%BA%86%E7%9B%B8%E5%BA%94%E7%9A%84%E5%AF%86%E9%92%A5%EF%BC%8C%E8%BF%99%E4%BD%BF%E6%88%91%E5%BE%97%E5%87%BA%E7%BB%93%E8%AE%BA%EF%BC%8C%E5%B0%BD%E7%AE%A1%E6%AD%A5%E9%AA%A4%204%20Importecckeyreq%20%E5%87%BD%E6%95%B0%E8%BF%94%E5%9B%9E%E6%AD%A3%E5%B8%B8%EF%BC%8C%E4%BD%86%E5%AE%83%E6%B2%A1%E6%9C%89%E6%88%90%E5%8A%9F%E5%AF%BC%E5%85%A5%E5%85%AC%E9%92%A5%E3%80%82%E5%BD%93%E5%89%8D%E8%BF%90%E8%A1%8C%E7%9A%84%E9%A1%B9%E7%9B%AE%E6%98%AF%E5%9F%BA%E4%BA%8E%E5%9C%A8%20S32DS%20%E4%B8%AD%E6%96%B0%E5%BB%BA%E7%9A%84%20S32K314%20%E9%A1%B9%E7%9B%AE%EF%BC%8C%E7%84%B6%E5%90%8E%E6%88%91%E4%BB%8E%20HSE%20DEMO%20%E4%B8%AD%E5%AF%BC%E5%85%A5%E4%BA%86%E7%9B%B8%E5%BA%94%E7%9A%84%E5%8A%9F%E8%83%BD%E6%96%87%E4%BB%B6%EF%BC%9B%E6%88%91%E4%B8%8D%E7%A1%AE%E5%AE%9A%E8%BF%99%E6%98%AF%E5%90%A6%E4%BC%9A%E5%BD%B1%E5%93%8D%E6%89%A7%E8%A1%8C%E7%BB%93%E6%9E%9C%E3%80%82%E6%88%91%E5%B0%9D%E8%AF%95%E4%BA%86%E5%BE%88%E5%A4%9A%E6%96%B9%E6%B3%95%EF%BC%8C%E4%BD%86%E4%BB%8D%E7%84%B6%E6%97%A0%E6%B3%95%E8%A7%A3%E5%86%B3%E9%97%AE%E9%A2%98%EF%BC%8C%E8%AF%B7%E5%B8%AE%E5%8A%A9%E5%88%86%E6%9E%90%E4%B8%80%E4%B8%8B%E8%BF%99%E4%B8%AA%E9%97%AE%E9%A2%98%EF%BC%8C%E8%B0%A2%E8%B0%A2%E3%80%82%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2171116%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2171116%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F254898%22%20target%3D%22_blank%22%3E%40%E9%93%85%E7%AC%94%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%E6%88%91%E5%9C%A8%E8%87%AA%E5%B7%B1%E8%BF%99%E8%BE%B9%E8%BF%9B%E8%A1%8C%E4%BA%86%E5%BF%AB%E9%80%9F%E6%B5%8B%E8%AF%95%EF%BC%8C%E7%BB%93%E6%9E%9C%E4%B8%8E%E9%A2%84%E6%9C%9F%E7%9A%84%E4%B8%80%E6%A0%B7%EF%BC%9A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lukaszadrapa_0-1758110932489.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22lukaszadrapa_0-1758110932489.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F357311iA5C8AEC344B4F8A6%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22lukaszadrapa_0-1758110932489.png%22%20alt%3D%22lukaszadrapa_0-1758110932489.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%E6%88%91%E7%9A%84%E9%A1%B9%E7%9B%AE%E9%99%84%E5%90%8E%E3%80%82%20%3C%2FP%3E%0A%3CP%3E%E6%82%A8%E5%B0%9D%E8%AF%95%E8%BF%87%E7%A6%81%E7%94%A8%E6%95%B0%E6%8D%AE%E7%BC%93%E5%AD%98%E5%90%97%EF%BC%9F%3C%2FP%3E%0A%3CP%3E%E6%AD%A4%E8%87%B4%EF%BC%8C%3C%2FP%3E%0A%3CP%3ELukas%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2170902%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K314%20importing%20ECC%20public%20key%20ImportEccKeyReq%20function%20returns%20error%200x055A5A399%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2170902%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%E9%A6%96%E5%85%88%E7%94%9F%E6%88%90%E5%AF%86%E9%92%A5%E5%AF%B9%E5%B9%B6%E5%AF%BC%E5%87%BA%E5%85%AC%E9%92%A5%E5%88%B0%20eccP256PubKeyGet%5B64%5D%EF%BC%8C%E7%84%B6%E5%90%8E%E9%80%9A%E8%BF%87%20ImportEccKeyReq%20%E5%B0%86%E7%94%9F%E6%88%90%E7%9A%84%E5%85%AC%E9%92%A5%E5%AF%BC%E5%85%A5%E5%AF%86%E9%92%A5%E6%A7%BD%EF%BC%8C%E8%BF%94%E5%9B%9E%E9%94%99%E8%AF%AF%200x055A5A399%E3%80%82%E6%A0%B9%E6%8D%AE%20S32K344%20%E6%BC%94%E7%A4%BA%EF%BC%8C%E8%AF%B7%E5%B8%AE%E5%8A%A9%E5%88%86%E6%9E%90%E5%8E%9F%E5%9B%A0%E3%80%82%3C%2FLINGO-BODY%3E