Datasheet

Table Of Contents
Table 43-89. ZpEcDsaQuickVerify Service Parameters
Parameter Type Direction Location Data Length Before
Executing
the Service
After
Executing
the Service
pu1ModCnsBase pu1 I Crypto
RAM
u2ModLength + 4 +
u2MaxLength + 12
Base of
modulus P
Base of
modulus P
u2Option u2 I Option
related to the
called service
(see below)
u2ModLength u2 I Length of
modulus P
Length of
modulus P
pu1OrderPointBase pu1 I Crypto
RAM
u2ScalarLength
+ 4
Order of the
Point A in the
elliptic curve
Unchanged
pu1PointSignature pu1 I Any RAM 2*u2ScalarLength
+ 8
Signature(r,
s)
Corrupted
pu1HashBase (see
Note 1)
pu1 I Crypto
RAM
u2MaxLength + 4 Base of the
hash value
resulting from
the previous
SHA
Corrupted
u2ScalarLength u2 I Length of
scalar
Length of
scalar
pu1PointABase pu1 I/O Crypto
RAM
(3*u2ModLength
+ 12) * (2(WA-2))
Generator
point
Corrupted
pu1PointPublicKeyGen pu1 I/O Crypto
RAM
(3*u2ModLength
+ 12) * (2(WB-2))
Public Key
point
Corrupted
pu1AWorkBase pu1 I Crypto
RAM
(u2ModLength + 4)
+ (8*u2MaxLength
+ 44)
Parameter a
of the elliptic
curve and
Workspace
Corrupted
Note: 
1. 1. The hash value calculus is defined by the ECDSA norm and depends on the elliptic curve
domain parameters. To construct the input parameter, the 4 Most Significant Bytes must be set to
zero.
A suggested parameters placement in Crypto RAM is:
ModCnsBase
OrderPointBase
Signature may be placed here or in Classical RAM
HashBase
SAM D5x/E5x Family Data Sheet
Public Key Cryptography Controller (PUKCC)
© 2019 Microchip Technology Inc.
Datasheet
DS60001507E-page 1539