LR Initial Publish
Dependencies: X_NUCLEO_IKS01A2 driver_mbed_TH02 mbed LoRaWAN-lib-v1_0_1 SX1272Lib
Fork of Training-Aug2018-SX1272-X-NUCLEO-IKS01A2 by
system/crypto/aes.h@0:6cc76d70e2a1, 2017-04-06 (annotated)
- Committer:
- ubhat
- Date:
- Thu Apr 06 21:59:50 2017 +0000
- Revision:
- 0:6cc76d70e2a1
LoRaWAN SX1272 Application
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
ubhat | 0:6cc76d70e2a1 | 1 | /* |
ubhat | 0:6cc76d70e2a1 | 2 | --------------------------------------------------------------------------- |
ubhat | 0:6cc76d70e2a1 | 3 | Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved. |
ubhat | 0:6cc76d70e2a1 | 4 | |
ubhat | 0:6cc76d70e2a1 | 5 | LICENSE TERMS |
ubhat | 0:6cc76d70e2a1 | 6 | |
ubhat | 0:6cc76d70e2a1 | 7 | The redistribution and use of this software (with or without changes) |
ubhat | 0:6cc76d70e2a1 | 8 | is allowed without the payment of fees or royalties provided that: |
ubhat | 0:6cc76d70e2a1 | 9 | |
ubhat | 0:6cc76d70e2a1 | 10 | 1. source code distributions include the above copyright notice, this |
ubhat | 0:6cc76d70e2a1 | 11 | list of conditions and the following disclaimer; |
ubhat | 0:6cc76d70e2a1 | 12 | |
ubhat | 0:6cc76d70e2a1 | 13 | 2. binary distributions include the above copyright notice, this list |
ubhat | 0:6cc76d70e2a1 | 14 | of conditions and the following disclaimer in their documentation; |
ubhat | 0:6cc76d70e2a1 | 15 | |
ubhat | 0:6cc76d70e2a1 | 16 | 3. the name of the copyright holder is not used to endorse products |
ubhat | 0:6cc76d70e2a1 | 17 | built using this software without specific written permission. |
ubhat | 0:6cc76d70e2a1 | 18 | |
ubhat | 0:6cc76d70e2a1 | 19 | DISCLAIMER |
ubhat | 0:6cc76d70e2a1 | 20 | |
ubhat | 0:6cc76d70e2a1 | 21 | This software is provided 'as is' with no explicit or implied warranties |
ubhat | 0:6cc76d70e2a1 | 22 | in respect of its properties, including, but not limited to, correctness |
ubhat | 0:6cc76d70e2a1 | 23 | and/or fitness for purpose. |
ubhat | 0:6cc76d70e2a1 | 24 | --------------------------------------------------------------------------- |
ubhat | 0:6cc76d70e2a1 | 25 | Issue 09/09/2006 |
ubhat | 0:6cc76d70e2a1 | 26 | |
ubhat | 0:6cc76d70e2a1 | 27 | This is an AES implementation that uses only 8-bit byte operations on the |
ubhat | 0:6cc76d70e2a1 | 28 | cipher state. |
ubhat | 0:6cc76d70e2a1 | 29 | */ |
ubhat | 0:6cc76d70e2a1 | 30 | |
ubhat | 0:6cc76d70e2a1 | 31 | #ifndef AES_H |
ubhat | 0:6cc76d70e2a1 | 32 | #define AES_H |
ubhat | 0:6cc76d70e2a1 | 33 | |
ubhat | 0:6cc76d70e2a1 | 34 | #if 1 |
ubhat | 0:6cc76d70e2a1 | 35 | # define AES_ENC_PREKEYED /* AES encryption with a precomputed key schedule */ |
ubhat | 0:6cc76d70e2a1 | 36 | #endif |
ubhat | 0:6cc76d70e2a1 | 37 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 38 | # define AES_DEC_PREKEYED /* AES decryption with a precomputed key schedule */ |
ubhat | 0:6cc76d70e2a1 | 39 | #endif |
ubhat | 0:6cc76d70e2a1 | 40 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 41 | # define AES_ENC_128_OTFK /* AES encryption with 'on the fly' 128 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 42 | #endif |
ubhat | 0:6cc76d70e2a1 | 43 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 44 | # define AES_DEC_128_OTFK /* AES decryption with 'on the fly' 128 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 45 | #endif |
ubhat | 0:6cc76d70e2a1 | 46 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 47 | # define AES_ENC_256_OTFK /* AES encryption with 'on the fly' 256 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 48 | #endif |
ubhat | 0:6cc76d70e2a1 | 49 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 50 | # define AES_DEC_256_OTFK /* AES decryption with 'on the fly' 256 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 51 | #endif |
ubhat | 0:6cc76d70e2a1 | 52 | |
ubhat | 0:6cc76d70e2a1 | 53 | #define N_ROW 4 |
ubhat | 0:6cc76d70e2a1 | 54 | #define N_COL 4 |
ubhat | 0:6cc76d70e2a1 | 55 | #define N_BLOCK (N_ROW * N_COL) |
ubhat | 0:6cc76d70e2a1 | 56 | #define N_MAX_ROUNDS 14 |
ubhat | 0:6cc76d70e2a1 | 57 | |
ubhat | 0:6cc76d70e2a1 | 58 | typedef uint8_t return_type; |
ubhat | 0:6cc76d70e2a1 | 59 | |
ubhat | 0:6cc76d70e2a1 | 60 | /* Warning: The key length for 256 bit keys overflows a byte |
ubhat | 0:6cc76d70e2a1 | 61 | (see comment below) |
ubhat | 0:6cc76d70e2a1 | 62 | */ |
ubhat | 0:6cc76d70e2a1 | 63 | |
ubhat | 0:6cc76d70e2a1 | 64 | typedef uint8_t length_type; |
ubhat | 0:6cc76d70e2a1 | 65 | |
ubhat | 0:6cc76d70e2a1 | 66 | typedef struct |
ubhat | 0:6cc76d70e2a1 | 67 | { uint8_t ksch[(N_MAX_ROUNDS + 1) * N_BLOCK]; |
ubhat | 0:6cc76d70e2a1 | 68 | uint8_t rnd; |
ubhat | 0:6cc76d70e2a1 | 69 | } aes_context; |
ubhat | 0:6cc76d70e2a1 | 70 | |
ubhat | 0:6cc76d70e2a1 | 71 | /* The following calls are for a precomputed key schedule |
ubhat | 0:6cc76d70e2a1 | 72 | |
ubhat | 0:6cc76d70e2a1 | 73 | NOTE: If the length_type used for the key length is an |
ubhat | 0:6cc76d70e2a1 | 74 | unsigned 8-bit character, a key length of 256 bits must |
ubhat | 0:6cc76d70e2a1 | 75 | be entered as a length in bytes (valid inputs are hence |
ubhat | 0:6cc76d70e2a1 | 76 | 128, 192, 16, 24 and 32). |
ubhat | 0:6cc76d70e2a1 | 77 | */ |
ubhat | 0:6cc76d70e2a1 | 78 | |
ubhat | 0:6cc76d70e2a1 | 79 | #if defined( AES_ENC_PREKEYED ) || defined( AES_DEC_PREKEYED ) |
ubhat | 0:6cc76d70e2a1 | 80 | |
ubhat | 0:6cc76d70e2a1 | 81 | return_type aes_set_key( const uint8_t key[], |
ubhat | 0:6cc76d70e2a1 | 82 | length_type keylen, |
ubhat | 0:6cc76d70e2a1 | 83 | aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 84 | #endif |
ubhat | 0:6cc76d70e2a1 | 85 | |
ubhat | 0:6cc76d70e2a1 | 86 | #if defined( AES_ENC_PREKEYED ) |
ubhat | 0:6cc76d70e2a1 | 87 | |
ubhat | 0:6cc76d70e2a1 | 88 | return_type aes_encrypt( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 89 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 90 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 91 | |
ubhat | 0:6cc76d70e2a1 | 92 | return_type aes_cbc_encrypt( const uint8_t *in, |
ubhat | 0:6cc76d70e2a1 | 93 | uint8_t *out, |
ubhat | 0:6cc76d70e2a1 | 94 | int32_t n_block, |
ubhat | 0:6cc76d70e2a1 | 95 | uint8_t iv[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 96 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 97 | #endif |
ubhat | 0:6cc76d70e2a1 | 98 | |
ubhat | 0:6cc76d70e2a1 | 99 | #if defined( AES_DEC_PREKEYED ) |
ubhat | 0:6cc76d70e2a1 | 100 | |
ubhat | 0:6cc76d70e2a1 | 101 | return_type aes_decrypt( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 102 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 103 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 104 | |
ubhat | 0:6cc76d70e2a1 | 105 | return_type aes_cbc_decrypt( const uint8_t *in, |
ubhat | 0:6cc76d70e2a1 | 106 | uint8_t *out, |
ubhat | 0:6cc76d70e2a1 | 107 | int32_t n_block, |
ubhat | 0:6cc76d70e2a1 | 108 | uint8_t iv[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 109 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 110 | #endif |
ubhat | 0:6cc76d70e2a1 | 111 | |
ubhat | 0:6cc76d70e2a1 | 112 | /* The following calls are for 'on the fly' keying. In this case the |
ubhat | 0:6cc76d70e2a1 | 113 | encryption and decryption keys are different. |
ubhat | 0:6cc76d70e2a1 | 114 | |
ubhat | 0:6cc76d70e2a1 | 115 | The encryption subroutines take a key in an array of bytes in |
ubhat | 0:6cc76d70e2a1 | 116 | key[L] where L is 16, 24 or 32 bytes for key lengths of 128, |
ubhat | 0:6cc76d70e2a1 | 117 | 192, and 256 bits respectively. They then encrypts the input |
ubhat | 0:6cc76d70e2a1 | 118 | data, in[] with this key and put the reult in the output array |
ubhat | 0:6cc76d70e2a1 | 119 | out[]. In addition, the second key array, o_key[L], is used |
ubhat | 0:6cc76d70e2a1 | 120 | to output the key that is needed by the decryption subroutine |
ubhat | 0:6cc76d70e2a1 | 121 | to reverse the encryption operation. The two key arrays can |
ubhat | 0:6cc76d70e2a1 | 122 | be the same array but in this case the original key will be |
ubhat | 0:6cc76d70e2a1 | 123 | overwritten. |
ubhat | 0:6cc76d70e2a1 | 124 | |
ubhat | 0:6cc76d70e2a1 | 125 | In the same way, the decryption subroutines output keys that |
ubhat | 0:6cc76d70e2a1 | 126 | can be used to reverse their effect when used for encryption. |
ubhat | 0:6cc76d70e2a1 | 127 | |
ubhat | 0:6cc76d70e2a1 | 128 | Only 128 and 256 bit keys are supported in these 'on the fly' |
ubhat | 0:6cc76d70e2a1 | 129 | modes. |
ubhat | 0:6cc76d70e2a1 | 130 | */ |
ubhat | 0:6cc76d70e2a1 | 131 | |
ubhat | 0:6cc76d70e2a1 | 132 | #if defined( AES_ENC_128_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 133 | void aes_encrypt_128( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 134 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 135 | const uint8_t key[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 136 | uint8_t o_key[N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 137 | #endif |
ubhat | 0:6cc76d70e2a1 | 138 | |
ubhat | 0:6cc76d70e2a1 | 139 | #if defined( AES_DEC_128_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 140 | void aes_decrypt_128( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 141 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 142 | const uint8_t key[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 143 | uint8_t o_key[N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 144 | #endif |
ubhat | 0:6cc76d70e2a1 | 145 | |
ubhat | 0:6cc76d70e2a1 | 146 | #if defined( AES_ENC_256_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 147 | void aes_encrypt_256( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 148 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 149 | const uint8_t key[2 * N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 150 | uint8_t o_key[2 * N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 151 | #endif |
ubhat | 0:6cc76d70e2a1 | 152 | |
ubhat | 0:6cc76d70e2a1 | 153 | #if defined( AES_DEC_256_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 154 | void aes_decrypt_256( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 155 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 156 | const uint8_t key[2 * N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 157 | uint8_t o_key[2 * N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 158 | #endif |
ubhat | 0:6cc76d70e2a1 | 159 | |
ubhat | 0:6cc76d70e2a1 | 160 | #endif |