A very easy to understand LoRaWAN-node code.

Dependencies:   LoRaWAN-lib SX1272Lib X_NUCLEO_IKS01A1 mbed

Important parameters:

• In comissioning.h: DevEUI, AppEUI, AppKEY, DevADR, NwksKEY, AppsKEY, OTAA and public network. Frequency and channel block to use, confirmed or unconfirmed messages, app port, app data size and OTAA and Tx duty cycles.

• In LoRaMac.h: Maximum payload and MAC commands length, receive delays, max FCNT, adr ack limit, timeout and delay, max ack retries, rssi threshold and sync words.

• In LoRaMac.cpp: Maximum payload, MAC commands and FRMpayload length.

• In LoRaMac-board.h: Tx power, data rates and band settings.

NOTE: Please refer to LoRaWAN regional parameters (page 12 for US band) to know which parameters you can modify.

Committer:
dgabino
Date:
Tue Apr 03 17:09:34 2018 +0000
Revision:
0:60ff878b27b8
A simpler way to customize your LoRaWAN payload

Who changed what in which revision?

UserRevisionLine numberNew contents of line
dgabino 0:60ff878b27b8 1 /**************************************************************************
dgabino 0:60ff878b27b8 2 Copyright (C) 2009 Lander Casado, Philippas Tsigas
dgabino 0:60ff878b27b8 3
dgabino 0:60ff878b27b8 4 All rights reserved.
dgabino 0:60ff878b27b8 5
dgabino 0:60ff878b27b8 6 Permission is hereby granted, free of charge, to any person obtaining
dgabino 0:60ff878b27b8 7 a copy of this software and associated documentation files
dgabino 0:60ff878b27b8 8 (the "Software"), to deal with the Software without restriction, including
dgabino 0:60ff878b27b8 9 without limitation the rights to use, copy, modify, merge, publish,
dgabino 0:60ff878b27b8 10 distribute, sublicense, and/or sell copies of the Software, and to
dgabino 0:60ff878b27b8 11 permit persons to whom the Software is furnished to do so, subject to
dgabino 0:60ff878b27b8 12 the following conditions:
dgabino 0:60ff878b27b8 13
dgabino 0:60ff878b27b8 14 Redistributions of source code must retain the above copyright notice,
dgabino 0:60ff878b27b8 15 this list of conditions and the following disclaimers. Redistributions in
dgabino 0:60ff878b27b8 16 binary form must reproduce the above copyright notice, this list of
dgabino 0:60ff878b27b8 17 conditions and the following disclaimers in the documentation and/or
dgabino 0:60ff878b27b8 18 other materials provided with the distribution.
dgabino 0:60ff878b27b8 19
dgabino 0:60ff878b27b8 20 In no event shall the authors or copyright holders be liable for any special,
dgabino 0:60ff878b27b8 21 incidental, indirect or consequential damages of any kind, or any damages
dgabino 0:60ff878b27b8 22 whatsoever resulting from loss of use, data or profits, whether or not
dgabino 0:60ff878b27b8 23 advised of the possibility of damage, and on any theory of liability,
dgabino 0:60ff878b27b8 24 arising out of or in connection with the use or performance of this software.
dgabino 0:60ff878b27b8 25
dgabino 0:60ff878b27b8 26 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
dgabino 0:60ff878b27b8 27 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
dgabino 0:60ff878b27b8 28 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
dgabino 0:60ff878b27b8 29 CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
dgabino 0:60ff878b27b8 30 LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
dgabino 0:60ff878b27b8 31 FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
dgabino 0:60ff878b27b8 32 DEALINGS WITH THE SOFTWARE
dgabino 0:60ff878b27b8 33
dgabino 0:60ff878b27b8 34 *****************************************************************************/
dgabino 0:60ff878b27b8 35 //#include <sys/param.h>
dgabino 0:60ff878b27b8 36 //#include <sys/systm.h>
dgabino 0:60ff878b27b8 37 #include <stdint.h>
dgabino 0:60ff878b27b8 38 #include "aes.h"
dgabino 0:60ff878b27b8 39 #include "cmac.h"
dgabino 0:60ff878b27b8 40 #include "utilities.h"
dgabino 0:60ff878b27b8 41
dgabino 0:60ff878b27b8 42 #define LSHIFT(v, r) do { \
dgabino 0:60ff878b27b8 43 int32_t i; \
dgabino 0:60ff878b27b8 44 for (i = 0; i < 15; i++) \
dgabino 0:60ff878b27b8 45 (r)[i] = (v)[i] << 1 | (v)[i + 1] >> 7; \
dgabino 0:60ff878b27b8 46 (r)[15] = (v)[15] << 1; \
dgabino 0:60ff878b27b8 47 } while (0)
dgabino 0:60ff878b27b8 48
dgabino 0:60ff878b27b8 49 #define XOR(v, r) do { \
dgabino 0:60ff878b27b8 50 int32_t i; \
dgabino 0:60ff878b27b8 51 for (i = 0; i < 16; i++) \
dgabino 0:60ff878b27b8 52 { \
dgabino 0:60ff878b27b8 53 (r)[i] = (r)[i] ^ (v)[i]; \
dgabino 0:60ff878b27b8 54 } \
dgabino 0:60ff878b27b8 55 } while (0) \
dgabino 0:60ff878b27b8 56
dgabino 0:60ff878b27b8 57
dgabino 0:60ff878b27b8 58 void AES_CMAC_Init(AES_CMAC_CTX *ctx)
dgabino 0:60ff878b27b8 59 {
dgabino 0:60ff878b27b8 60 memset1(ctx->X, 0, sizeof ctx->X);
dgabino 0:60ff878b27b8 61 ctx->M_n = 0;
dgabino 0:60ff878b27b8 62 memset1(ctx->rijndael.ksch, '\0', 240);
dgabino 0:60ff878b27b8 63 }
dgabino 0:60ff878b27b8 64
dgabino 0:60ff878b27b8 65 void AES_CMAC_SetKey(AES_CMAC_CTX *ctx, const uint8_t key[AES_CMAC_KEY_LENGTH])
dgabino 0:60ff878b27b8 66 {
dgabino 0:60ff878b27b8 67 //rijndael_set_key_enc_only(&ctx->rijndael, key, 128);
dgabino 0:60ff878b27b8 68 aes_set_key( key, AES_CMAC_KEY_LENGTH, &ctx->rijndael);
dgabino 0:60ff878b27b8 69 }
dgabino 0:60ff878b27b8 70
dgabino 0:60ff878b27b8 71 void AES_CMAC_Update(AES_CMAC_CTX *ctx, const uint8_t *data, uint32_t len)
dgabino 0:60ff878b27b8 72 {
dgabino 0:60ff878b27b8 73 uint32_t mlen;
dgabino 0:60ff878b27b8 74 uint8_t in[16];
dgabino 0:60ff878b27b8 75
dgabino 0:60ff878b27b8 76 if (ctx->M_n > 0) {
dgabino 0:60ff878b27b8 77 mlen = MIN(16 - ctx->M_n, len);
dgabino 0:60ff878b27b8 78 memcpy1(ctx->M_last + ctx->M_n, data, mlen);
dgabino 0:60ff878b27b8 79 ctx->M_n += mlen;
dgabino 0:60ff878b27b8 80 if (ctx->M_n < 16 || len == mlen)
dgabino 0:60ff878b27b8 81 return;
dgabino 0:60ff878b27b8 82 XOR(ctx->M_last, ctx->X);
dgabino 0:60ff878b27b8 83 //rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X);
dgabino 0:60ff878b27b8 84 aes_encrypt( ctx->X, ctx->X, &ctx->rijndael);
dgabino 0:60ff878b27b8 85 data += mlen;
dgabino 0:60ff878b27b8 86 len -= mlen;
dgabino 0:60ff878b27b8 87 }
dgabino 0:60ff878b27b8 88 while (len > 16) { /* not last block */
dgabino 0:60ff878b27b8 89
dgabino 0:60ff878b27b8 90 XOR(data, ctx->X);
dgabino 0:60ff878b27b8 91 //rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X);
dgabino 0:60ff878b27b8 92
dgabino 0:60ff878b27b8 93 memcpy1(in, &ctx->X[0], 16); //Bestela ez du ondo iten
dgabino 0:60ff878b27b8 94 aes_encrypt( in, in, &ctx->rijndael);
dgabino 0:60ff878b27b8 95 memcpy1(&ctx->X[0], in, 16);
dgabino 0:60ff878b27b8 96
dgabino 0:60ff878b27b8 97 data += 16;
dgabino 0:60ff878b27b8 98 len -= 16;
dgabino 0:60ff878b27b8 99 }
dgabino 0:60ff878b27b8 100 /* potential last block, save it */
dgabino 0:60ff878b27b8 101 memcpy1(ctx->M_last, data, len);
dgabino 0:60ff878b27b8 102 ctx->M_n = len;
dgabino 0:60ff878b27b8 103 }
dgabino 0:60ff878b27b8 104
dgabino 0:60ff878b27b8 105 void AES_CMAC_Final(uint8_t digest[AES_CMAC_DIGEST_LENGTH], AES_CMAC_CTX *ctx)
dgabino 0:60ff878b27b8 106 {
dgabino 0:60ff878b27b8 107 uint8_t K[16];
dgabino 0:60ff878b27b8 108 uint8_t in[16];
dgabino 0:60ff878b27b8 109 /* generate subkey K1 */
dgabino 0:60ff878b27b8 110 memset1(K, '\0', 16);
dgabino 0:60ff878b27b8 111
dgabino 0:60ff878b27b8 112 //rijndael_encrypt(&ctx->rijndael, K, K);
dgabino 0:60ff878b27b8 113
dgabino 0:60ff878b27b8 114 aes_encrypt( K, K, &ctx->rijndael);
dgabino 0:60ff878b27b8 115
dgabino 0:60ff878b27b8 116 if (K[0] & 0x80) {
dgabino 0:60ff878b27b8 117 LSHIFT(K, K);
dgabino 0:60ff878b27b8 118 K[15] ^= 0x87;
dgabino 0:60ff878b27b8 119 } else
dgabino 0:60ff878b27b8 120 LSHIFT(K, K);
dgabino 0:60ff878b27b8 121
dgabino 0:60ff878b27b8 122
dgabino 0:60ff878b27b8 123 if (ctx->M_n == 16) {
dgabino 0:60ff878b27b8 124 /* last block was a complete block */
dgabino 0:60ff878b27b8 125 XOR(K, ctx->M_last);
dgabino 0:60ff878b27b8 126
dgabino 0:60ff878b27b8 127 } else {
dgabino 0:60ff878b27b8 128 /* generate subkey K2 */
dgabino 0:60ff878b27b8 129 if (K[0] & 0x80) {
dgabino 0:60ff878b27b8 130 LSHIFT(K, K);
dgabino 0:60ff878b27b8 131 K[15] ^= 0x87;
dgabino 0:60ff878b27b8 132 } else
dgabino 0:60ff878b27b8 133 LSHIFT(K, K);
dgabino 0:60ff878b27b8 134
dgabino 0:60ff878b27b8 135 /* padding(M_last) */
dgabino 0:60ff878b27b8 136 ctx->M_last[ctx->M_n] = 0x80;
dgabino 0:60ff878b27b8 137 while (++ctx->M_n < 16)
dgabino 0:60ff878b27b8 138 ctx->M_last[ctx->M_n] = 0;
dgabino 0:60ff878b27b8 139
dgabino 0:60ff878b27b8 140 XOR(K, ctx->M_last);
dgabino 0:60ff878b27b8 141
dgabino 0:60ff878b27b8 142
dgabino 0:60ff878b27b8 143 }
dgabino 0:60ff878b27b8 144 XOR(ctx->M_last, ctx->X);
dgabino 0:60ff878b27b8 145
dgabino 0:60ff878b27b8 146 //rijndael_encrypt(&ctx->rijndael, ctx->X, digest);
dgabino 0:60ff878b27b8 147
dgabino 0:60ff878b27b8 148 memcpy1(in, &ctx->X[0], 16); //Bestela ez du ondo iten
dgabino 0:60ff878b27b8 149 aes_encrypt(in, digest, &ctx->rijndael);
dgabino 0:60ff878b27b8 150 memset1(K, 0, sizeof K);
dgabino 0:60ff878b27b8 151
dgabino 0:60ff878b27b8 152 }
dgabino 0:60ff878b27b8 153