The debugging of the algorithm porting encryption chip contains 2 parts: Communication Debugging and Algorithm debugging. Before talking about the communication debugging skills, the next chapter will be the algorithm debugging problems in the analysis and summary, to help customers to complete the debugging smoothly.
Frequently asked questions in algorithmic debugging:
1. Do not build your own project
When porting the algorithm, the customer does not need to create a new project, directly open the existing routines to program.
2, remember not to adjust online
The encryption chip belongs to the security chip, does not support the online debugging, can only download the algorithm, through the algorithm instruction verifies the function is normal.
3. Understanding the architecture is the premise
The encryption chip is divided into the driving layer and the application layer, the instruction of the user MCU will be resolved in the driving layer first, so the user should learn to locate the driving layer problem. The chip returns the 6d00, 6E00 all belong to the communication instruction error status code, encountered this kind of error to check the instruction itself to have the question. When the chip returns 6A80 it belongs to the application layer algorithm exception. When the code execution completes return 1, the encryption chip will output 9000 of the correct status code, if return 0, the output 6A80 error message.
4, abnormal first want size end
LKT Series chip size end mode, such as encountering the algorithm function anomalies, can consider this as a starting point, and our technical staff to communicate confirmation. Ensure that the encryption chip and the original algorithm operating platform storage mode consistent.
5. Use the communication buffer
The user should use the output buffer in the law process to fill in the various process data produced in the algorithm running, and print out the output, and analyze the data to locate the reason of the algorithm anomaly.
UART interface algorithm debugging technique of porting encryption chip--algorithm debugging