Hardware requirements
Micro USB cable
Personal Computer
MCX-W72-EVK board
Board settings
No special settings are required.
Prepare the Demo
Connect a USB cable between the host PC and the EVK board J14.
Open a serial terminal on PC for the serial device with these settings:
115200 baud rate
8 data bits
No parity
One stop bit
No flow control
Download the program to the target board.
Either press the reset button on your board or launch the debugger in your IDE to begin running the demo.
Running the demo
The following lines are printed to the serial terminal when the demo program is executed.
mbedTLS version 2.28.8
fsys=96000000
Using following implementations:
SHA: ELE200 HW accelerated
AES: ELE200 HW accelerated ECB, CBC, CCM and CMAC
AES GCM: Software implementation
DES: Software implementation
Asymmetric cryptography: ELE200 HW accelerated ECDSA and ECDH
SHA-224 test #1: passed
SHA-224 test #2: passed
SHA-224 test #3: passed
SHA-256 test #1: passed
SHA-256 test #2: passed
SHA-256 test #3: passed
SHA-384 test #1: passed
SHA-384 test #2: passed
SHA-384 test #3: passed
SHA-512 test #1: passed
SHA-512 test #2: passed
SHA-512 test #3: passed
AES note: alternative implementation.
AES-ECB-128 (dec): passed
AES-ECB-128 (enc): passed
AES-ECB-192 (dec): passed
AES-ECB-192 (enc): passed
AES-ECB-256 (dec): passed
AES-ECB-256 (enc): passed
AES-CBC-128 (dec): passed
AES-CBC-128 (enc): passed
AES-CBC-192 (dec): passed
AES-CBC-192 (enc): passed
AES-CBC-256 (dec): passed
AES-CBC-256 (enc): passed
AES-CTR-128 (dec): passed
AES-CTR-128 (enc): passed
AES-CTR-128 (dec): passed
AES-CTR-128 (enc): passed
AES-CTR-128 (dec): passed
AES-CTR-128 (enc): passed
GCM note: built-in implementation.
AES-GCM-128 #0 (enc): passed
AES-GCM-128 #0 (dec): passed
AES-GCM-128 #0 split (enc): passed
AES-GCM-128 #0 split (dec): passed
AES-GCM-128 #1 (enc): passed
AES-GCM-128 #1 (dec): passed
AES-GCM-128 #1 split (enc): passed
AES-GCM-128 #1 split (dec): passed
AES-GCM-128 #2 (enc): passed
AES-GCM-128 #2 (dec): passed
AES-GCM-128 #2 split (enc): passed
AES-GCM-128 #2 split (dec): passed
AES-GCM-128 #3 (enc): passed
AES-GCM-128 #3 (dec): passed
AES-GCM-128 #3 split (enc): passed
AES-GCM-128 #3 split (dec): passed
AES-GCM-128 #4 (enc): passed
AES-GCM-128 #4 (dec): passed
AES-GCM-128 #4 split (enc): passed
AES-GCM-128 #4 split (dec): passed
AES-GCM-128 #5 (enc): passed
AES-GCM-128 #5 (dec): passed
AES-GCM-128 #5 split (enc): passed
AES-GCM-128 #5 split (dec): passed
AES-GCM-192 #0 (enc): passed
AES-GCM-192 #0 (dec): passed
AES-GCM-192 #0 split (enc): passed
AES-GCM-192 #0 split (dec): passed
AES-GCM-192 #1 (enc): passed
AES-GCM-192 #1 (dec): passed
AES-GCM-192 #1 split (enc): passed
AES-GCM-192 #1 split (dec): passed
AES-GCM-192 #2 (enc): passed
AES-GCM-192 #2 (dec): passed
AES-GCM-192 #2 split (enc): passed
AES-GCM-192 #2 split (dec): passed
AES-GCM-192 #3 (enc): passed
AES-GCM-192 #3 (dec): passed
AES-GCM-192 #3 split (enc): passed
AES-GCM-192 #3 split (dec): passed
AES-GCM-192 #4 (enc): passed
AES-GCM-192 #4 (dec): passed
AES-GCM-192 #4 split (enc): passed
AES-GCM-192 #4 split (dec): passed
AES-GCM-192 #5 (enc): passed
AES-GCM-192 #5 (dec): passed
AES-GCM-192 #5 split (enc): passed
AES-GCM-192 #5 split (dec): passed
AES-GCM-256 #0 (enc): passed
AES-GCM-256 #0 (dec): passed
AES-GCM-256 #0 split (enc): passed
AES-GCM-256 #0 split (dec): passed
AES-GCM-256 #1 (enc): passed
AES-GCM-256 #1 (dec): passed
AES-GCM-256 #1 split (enc): passed
AES-GCM-256 #1 split (dec): passed
AES-GCM-256 #2 (enc): passed
AES-GCM-256 #2 (dec): passed
AES-GCM-256 #2 split (enc): passed
AES-GCM-256 #2 split (dec): passed
AES-GCM-256 #3 (enc): passed
AES-GCM-256 #3 (dec): passed
AES-GCM-256 #3 split (enc): passed
AES-GCM-256 #3 split (dec): passed
AES-GCM-256 #4 (enc): passed
AES-GCM-256 #4 (dec): passed
AES-GCM-256 #4 split (enc): passed
AES-GCM-256 #4 split (dec): passed
AES-GCM-256 #5 (enc): passed
AES-GCM-256 #5 (dec): passed
AES-GCM-256 #5 split (enc): passed
AES-GCM-256 #5 split (dec): passed
CCM-AES #1: passed
CCM-AES #2: passed
CCM-AES #3: passed
AES 128 CMAC subkey #1: passed
AES 128 CMAC subkey #2: passed
AES 128 CMAC subkey #3: passed
AES 128 CMAC subkey #4: passed
AES 128 CMAC #1: passed
AES 128 CMAC #2: passed
AES 128 CMAC #3: passed
AES 128 CMAC #4: passed
AES 256 CMAC subkey #1: passed
AES 256 CMAC subkey #2: passed
AES 256 CMAC subkey #3: passed
AES 256 CMAC subkey #4: passed
AES 256 CMAC #1: passed
AES 256 CMAC #2: passed
AES 256 CMAC #3: passed
AES 256 CMAC #4: passed
AES CMAC 128 PRF #0: passed
AES CMAC 128 PRF #1: passed
AES CMAC 128 PRF #2: passed
Base64 encoding test: passed
Base64 decoding test: passed
MPI test #1 (mul_mpi): passed
MPI test #2 (div_mpi): passed
MPI test #3 (exp_mod): passed
MPI test #4 (inv_mod): passed
MPI test #5 (simple gcd): passed
RSA key validation: passed
PKCS#1 encryption : passed
PKCS#1 decryption : passed
X.509 certificate load: passed
X.509 signature verify: passed
CAMELLIA-ECB-128 (dec): passed
CAMELLIA-ECB-128 (enc): passed
CAMELLIA-ECB-192 (dec): passed
CAMELLIA-ECB-192 (enc): passed
CAMELLIA-ECB-256 (dec): passed
CAMELLIA-ECB-256 (enc): passed
CAMELLIA-CBC-128 (dec): passed
CAMELLIA-CBC-128 (enc): passed
CAMELLIA-CBC-192 (dec): passed
CAMELLIA-CBC-192 (enc): passed
CAMELLIA-CBC-256 (dec): passed
CAMELLIA-CBC-256 (enc): passed
CAMELLIA-CTR-128 (dec): passed
CAMELLIA-CTR-128 (enc): passed
CAMELLIA-CTR-128 (dec): passed
CAMELLIA-CTR-128 (enc): passed
CAMELLIA-CTR-128 (dec): passed
CAMELLIA-CTR-128 (enc): passed
CTR_DRBG (PR = TRUE) : passed
CTR_DRBG (PR = FALSE): passed
ECP SW test #1 (constant op_count, base point G): passed
ECP SW test #2 (constant op_count, other point): passed
DHM parameter load: passed
ENTROPY test: passed
PBKDF2 (SHA1): skipped
ECDH secp521r1 - #1: passed
ECDH secp384r1 - #2: passed
ECDH secp256r1 - #3: passed
Executed 18 test suites
[ All tests PASS ]