This code uses Semtech's open source LoRaWAN stack ported to mbed environment.

Dependencies:   mbed LoRaWAN-lib SX1272Lib

Committer:
Mehrad
Date:
Thu Jun 09 23:58:16 2016 +0000
Revision:
0:6155544d38b1
The initial commit.

Who changed what in which revision?

UserRevisionLine numberNew contents of line
Mehrad 0:6155544d38b1 1 /**************************************************************************
Mehrad 0:6155544d38b1 2 Copyright (C) 2009 Lander Casado, Philippas Tsigas
Mehrad 0:6155544d38b1 3
Mehrad 0:6155544d38b1 4 All rights reserved.
Mehrad 0:6155544d38b1 5
Mehrad 0:6155544d38b1 6 Permission is hereby granted, free of charge, to any person obtaining
Mehrad 0:6155544d38b1 7 a copy of this software and associated documentation files
Mehrad 0:6155544d38b1 8 (the "Software"), to deal with the Software without restriction, including
Mehrad 0:6155544d38b1 9 without limitation the rights to use, copy, modify, merge, publish,
Mehrad 0:6155544d38b1 10 distribute, sublicense, and/or sell copies of the Software, and to
Mehrad 0:6155544d38b1 11 permit persons to whom the Software is furnished to do so, subject to
Mehrad 0:6155544d38b1 12 the following conditions:
Mehrad 0:6155544d38b1 13
Mehrad 0:6155544d38b1 14 Redistributions of source code must retain the above copyright notice,
Mehrad 0:6155544d38b1 15 this list of conditions and the following disclaimers. Redistributions in
Mehrad 0:6155544d38b1 16 binary form must reproduce the above copyright notice, this list of
Mehrad 0:6155544d38b1 17 conditions and the following disclaimers in the documentation and/or
Mehrad 0:6155544d38b1 18 other materials provided with the distribution.
Mehrad 0:6155544d38b1 19
Mehrad 0:6155544d38b1 20 In no event shall the authors or copyright holders be liable for any special,
Mehrad 0:6155544d38b1 21 incidental, indirect or consequential damages of any kind, or any damages
Mehrad 0:6155544d38b1 22 whatsoever resulting from loss of use, data or profits, whether or not
Mehrad 0:6155544d38b1 23 advised of the possibility of damage, and on any theory of liability,
Mehrad 0:6155544d38b1 24 arising out of or in connection with the use or performance of this software.
Mehrad 0:6155544d38b1 25
Mehrad 0:6155544d38b1 26 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
Mehrad 0:6155544d38b1 27 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
Mehrad 0:6155544d38b1 28 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
Mehrad 0:6155544d38b1 29 CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
Mehrad 0:6155544d38b1 30 LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
Mehrad 0:6155544d38b1 31 FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
Mehrad 0:6155544d38b1 32 DEALINGS WITH THE SOFTWARE
Mehrad 0:6155544d38b1 33
Mehrad 0:6155544d38b1 34 *****************************************************************************/
Mehrad 0:6155544d38b1 35 //#include <sys/param.h>
Mehrad 0:6155544d38b1 36 //#include <sys/systm.h>
Mehrad 0:6155544d38b1 37 #include <stdint.h>
Mehrad 0:6155544d38b1 38 #include "aes.h"
Mehrad 0:6155544d38b1 39 #include "cmac.h"
Mehrad 0:6155544d38b1 40 #include "utilities.h"
Mehrad 0:6155544d38b1 41
Mehrad 0:6155544d38b1 42 #define LSHIFT(v, r) do { \
Mehrad 0:6155544d38b1 43 int32_t i; \
Mehrad 0:6155544d38b1 44 for (i = 0; i < 15; i++) \
Mehrad 0:6155544d38b1 45 (r)[i] = (v)[i] << 1 | (v)[i + 1] >> 7; \
Mehrad 0:6155544d38b1 46 (r)[15] = (v)[15] << 1; \
Mehrad 0:6155544d38b1 47 } while (0)
Mehrad 0:6155544d38b1 48
Mehrad 0:6155544d38b1 49 #define XOR(v, r) do { \
Mehrad 0:6155544d38b1 50 int32_t i; \
Mehrad 0:6155544d38b1 51 for (i = 0; i < 16; i++) \
Mehrad 0:6155544d38b1 52 { \
Mehrad 0:6155544d38b1 53 (r)[i] = (r)[i] ^ (v)[i]; \
Mehrad 0:6155544d38b1 54 } \
Mehrad 0:6155544d38b1 55 } while (0) \
Mehrad 0:6155544d38b1 56
Mehrad 0:6155544d38b1 57
Mehrad 0:6155544d38b1 58 void AES_CMAC_Init(AES_CMAC_CTX *ctx)
Mehrad 0:6155544d38b1 59 {
Mehrad 0:6155544d38b1 60 memset1(ctx->X, 0, sizeof ctx->X);
Mehrad 0:6155544d38b1 61 ctx->M_n = 0;
Mehrad 0:6155544d38b1 62 memset1(ctx->rijndael.ksch, '\0', 240);
Mehrad 0:6155544d38b1 63 }
Mehrad 0:6155544d38b1 64
Mehrad 0:6155544d38b1 65 void AES_CMAC_SetKey(AES_CMAC_CTX *ctx, const uint8_t key[AES_CMAC_KEY_LENGTH])
Mehrad 0:6155544d38b1 66 {
Mehrad 0:6155544d38b1 67 //rijndael_set_key_enc_only(&ctx->rijndael, key, 128);
Mehrad 0:6155544d38b1 68 aes_set_key( key, AES_CMAC_KEY_LENGTH, &ctx->rijndael);
Mehrad 0:6155544d38b1 69 }
Mehrad 0:6155544d38b1 70
Mehrad 0:6155544d38b1 71 void AES_CMAC_Update(AES_CMAC_CTX *ctx, const uint8_t *data, uint32_t len)
Mehrad 0:6155544d38b1 72 {
Mehrad 0:6155544d38b1 73 uint32_t mlen;
Mehrad 0:6155544d38b1 74 uint8_t in[16];
Mehrad 0:6155544d38b1 75
Mehrad 0:6155544d38b1 76 if (ctx->M_n > 0) {
Mehrad 0:6155544d38b1 77 mlen = MIN(16 - ctx->M_n, len);
Mehrad 0:6155544d38b1 78 memcpy1(ctx->M_last + ctx->M_n, data, mlen);
Mehrad 0:6155544d38b1 79 ctx->M_n += mlen;
Mehrad 0:6155544d38b1 80 if (ctx->M_n < 16 || len == mlen)
Mehrad 0:6155544d38b1 81 return;
Mehrad 0:6155544d38b1 82 XOR(ctx->M_last, ctx->X);
Mehrad 0:6155544d38b1 83 //rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X);
Mehrad 0:6155544d38b1 84 aes_encrypt( ctx->X, ctx->X, &ctx->rijndael);
Mehrad 0:6155544d38b1 85 data += mlen;
Mehrad 0:6155544d38b1 86 len -= mlen;
Mehrad 0:6155544d38b1 87 }
Mehrad 0:6155544d38b1 88 while (len > 16) { /* not last block */
Mehrad 0:6155544d38b1 89
Mehrad 0:6155544d38b1 90 XOR(data, ctx->X);
Mehrad 0:6155544d38b1 91 //rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X);
Mehrad 0:6155544d38b1 92
Mehrad 0:6155544d38b1 93 memcpy1(in, &ctx->X[0], 16); //Bestela ez du ondo iten
Mehrad 0:6155544d38b1 94 aes_encrypt( in, in, &ctx->rijndael);
Mehrad 0:6155544d38b1 95 memcpy1(&ctx->X[0], in, 16);
Mehrad 0:6155544d38b1 96
Mehrad 0:6155544d38b1 97 data += 16;
Mehrad 0:6155544d38b1 98 len -= 16;
Mehrad 0:6155544d38b1 99 }
Mehrad 0:6155544d38b1 100 /* potential last block, save it */
Mehrad 0:6155544d38b1 101 memcpy1(ctx->M_last, data, len);
Mehrad 0:6155544d38b1 102 ctx->M_n = len;
Mehrad 0:6155544d38b1 103 }
Mehrad 0:6155544d38b1 104
Mehrad 0:6155544d38b1 105 void AES_CMAC_Final(uint8_t digest[AES_CMAC_DIGEST_LENGTH], AES_CMAC_CTX *ctx)
Mehrad 0:6155544d38b1 106 {
Mehrad 0:6155544d38b1 107 uint8_t K[16];
Mehrad 0:6155544d38b1 108 uint8_t in[16];
Mehrad 0:6155544d38b1 109 /* generate subkey K1 */
Mehrad 0:6155544d38b1 110 memset1(K, '\0', 16);
Mehrad 0:6155544d38b1 111
Mehrad 0:6155544d38b1 112 //rijndael_encrypt(&ctx->rijndael, K, K);
Mehrad 0:6155544d38b1 113
Mehrad 0:6155544d38b1 114 aes_encrypt( K, K, &ctx->rijndael);
Mehrad 0:6155544d38b1 115
Mehrad 0:6155544d38b1 116 if (K[0] & 0x80) {
Mehrad 0:6155544d38b1 117 LSHIFT(K, K);
Mehrad 0:6155544d38b1 118 K[15] ^= 0x87;
Mehrad 0:6155544d38b1 119 } else
Mehrad 0:6155544d38b1 120 LSHIFT(K, K);
Mehrad 0:6155544d38b1 121
Mehrad 0:6155544d38b1 122
Mehrad 0:6155544d38b1 123 if (ctx->M_n == 16) {
Mehrad 0:6155544d38b1 124 /* last block was a complete block */
Mehrad 0:6155544d38b1 125 XOR(K, ctx->M_last);
Mehrad 0:6155544d38b1 126
Mehrad 0:6155544d38b1 127 } else {
Mehrad 0:6155544d38b1 128 /* generate subkey K2 */
Mehrad 0:6155544d38b1 129 if (K[0] & 0x80) {
Mehrad 0:6155544d38b1 130 LSHIFT(K, K);
Mehrad 0:6155544d38b1 131 K[15] ^= 0x87;
Mehrad 0:6155544d38b1 132 } else
Mehrad 0:6155544d38b1 133 LSHIFT(K, K);
Mehrad 0:6155544d38b1 134
Mehrad 0:6155544d38b1 135 /* padding(M_last) */
Mehrad 0:6155544d38b1 136 ctx->M_last[ctx->M_n] = 0x80;
Mehrad 0:6155544d38b1 137 while (++ctx->M_n < 16)
Mehrad 0:6155544d38b1 138 ctx->M_last[ctx->M_n] = 0;
Mehrad 0:6155544d38b1 139
Mehrad 0:6155544d38b1 140 XOR(K, ctx->M_last);
Mehrad 0:6155544d38b1 141
Mehrad 0:6155544d38b1 142
Mehrad 0:6155544d38b1 143 }
Mehrad 0:6155544d38b1 144 XOR(ctx->M_last, ctx->X);
Mehrad 0:6155544d38b1 145
Mehrad 0:6155544d38b1 146 //rijndael_encrypt(&ctx->rijndael, ctx->X, digest);
Mehrad 0:6155544d38b1 147
Mehrad 0:6155544d38b1 148 memcpy1(in, &ctx->X[0], 16); //Bestela ez du ondo iten
Mehrad 0:6155544d38b1 149 aes_encrypt(in, digest, &ctx->rijndael);
Mehrad 0:6155544d38b1 150 memset1(K, 0, sizeof K);
Mehrad 0:6155544d38b1 151
Mehrad 0:6155544d38b1 152 }
Mehrad 0:6155544d38b1 153