Driver for CC3000 Wi-Fi module
Dependencies: NVIC_set_all_priorities
Dependents: CC3000_Simple_Socket Wi-Go_IOT_Demo
Information
The current code has been reworked to a full object oriented application and contains an mbed socket compatible API.
CC3000 Wi-Fi module library
Info
This is the low level driver for TI's SimpleLink CC3000 device.
Port from Avnet's Wi-Go KEIL code (based on TI's CC3000 code).
Special thanks to Jim Carver from Avnet for providing the Wi-Go board and for his assistance.
Differences with TI's original code
The code functionality stays exactly the same.
In order to make it easier to use the code, following changes were made :
- Addition of a tool to shift all IRQ priorities to a lower level since it is very important to keep the SPI handler at the highest system priority, the WLAN interrupt the second highest and all other system interrupts at a lower priority, so their handlers can be preempted by the CC3000 interrupts.
- Addition of low level I/O controls and conditional compiler controls in cc3000_common.h.
- CC3000 initialisation, pin declarations, SPI and WLAN irq priorities are set in
Init_HostDriver
, we need to call this function at the start of the main function. - The SPI and HCI code are joined into one file.
- The include list has been rearranged - Only
#include "wlan.h"
is needed in the user API.
- Part of the CC3000's user eeprom memory is used to store additional info (52 bytes in NVMEM_USER_FILE_1):
# bytes | Description | Info |
1 | First time config parameter | Useful when connecting |
2 | Firmware updater version | used with the Firmware update tool |
2 | Service Pack version | used with the Firmware update tool |
3 | Driver Version | used with the Firmware update tool |
3 | Firmware Version | used with the Firmware update tool |
1 | CIK validation (Client Interface Key) | |
40 | CIK data (Client Interface Key) | used with the exosite |
Using the Library
A user API is needed to access the CC3000 functions.
Examples:
- Internet Of Things full WiGo demo (SmartConfig - WebServer - Exosite - Android sensor Fusion App)
- CC3000_Simple_Socket
Using the library with other processors
cc3000_common.cpp
loads the irq tool for all targets:
All current mbed targets are supported by this library.
#include "NVIC_set_all_priorities.h"
All low level settings that need to change are available in cc3000_common.h
//***************************************************************************** // PIN CONTROLS & COMPILE CONTROLS //***************************************************************************** // Compiler control #define CC3000_UNENCRYPTED_SMART_CONFIG // No encryption //#define CC3000_TINY_DRIVER // Driver for small memory model CPUs //Interrupt controls #define NVIC_ALL_IRQ NVIC_set_all_irq_priorities(3); // Set ALL interrupt priorities to level 3 #define NVIC_SPI_IRQ NVIC_SetPriority(SPI0_IRQn, 0x0); // Wi-Fi SPI interrupt must be higher priority than SysTick #define NVIC_PORT_IRQ NVIC_SetPriority(PORTA_IRQn, 0x1); #define NVIC_SYSTICK_IRQ NVIC_SetPriority(SysTick_IRQn, 0x2); // SysTick set to lower priority than Wi-Fi SPI bus interrupt //#define NVIC_ADC_IRQ NVIC_SetPriority(ADC0_IRQn, 0x3); // ADC is the lowest of all // Wlan controls #define WLAN_ISF_PCR PORTA->PCR[16] #define WLAN_ISF_ISFR PORTA->ISFR #define WLAN_ISF_MASK (1<<16) #define WLAN_ASSERT_CS wlan_cs = 0; //CS : active low #define WLAN_DEASSERT_CS wlan_cs = 1; #define WLAN_ASSERT_EN wlan_en = 1; //EN : active high #define WLAN_DEASSERT_EN wlan_en = 0; #define WLAN_READ_IRQ wlan_int #define WLAN_ENABLE_IRQ wlan_int.fall(&WLAN_IRQHandler); #define WLAN_DISABLE_IRQ wlan_int.fall(NULL); #define WLAN_IRQ_PIN_CREATE InterruptIn wlan_int (PTA16); #define WLAN_EN_PIN_CREATE DigitalOut wlan_en (PTA13); #define WLAN_CS_PIN_CREATE DigitalOut wlan_cs (PTD0); #define WLAN_SPI_PORT_CREATE SPI wlan(PTD2, PTD3, PTC5); // mosi, miso, sclk #define WLAN_SPI_PORT_INIT wlan.format(8,1); #define WLAN_SPI_SET_FREQ wlan.frequency(12000000); #define WLAN_SPI_SET_IRQ_HANDLER wlan_int.fall(&WLAN_IRQHandler); #define WLAN_SPI_WRITE wlan.write(*data++); #define WLAN_SPI_READ wlan.write(0x03); // !! DO NOT MODIFY the 0x03 parameter (CC3000 will not respond).
API documentation
Due to a little problem with the links on the mbed site, the API documentation is not directly accessible (will be solved in a next release).
Currently, it is only accessible by adding modules.html
to the API doc link: http://mbed.org/users/frankvnk/code/CC3000_Hostdriver/docs/tip/modules.html
security.cpp@0:c44f0314d6ec, 2013-06-28 (annotated)
- Committer:
- frankvnk
- Date:
- Fri Jun 28 17:48:37 2013 +0000
- Revision:
- 0:c44f0314d6ec
- Child:
- 1:bbcaf0b2f367
Initial release
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
frankvnk | 0:c44f0314d6ec | 1 | /***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 2 | * |
frankvnk | 0:c44f0314d6ec | 3 | * security.c - CC3000 Host Driver Implementation. |
frankvnk | 0:c44f0314d6ec | 4 | * Copyright (C) 2011 Texas Instruments Incorporated - http://www.ti.com/ |
frankvnk | 0:c44f0314d6ec | 5 | * |
frankvnk | 0:c44f0314d6ec | 6 | * Redistribution and use in source and binary forms, with or without |
frankvnk | 0:c44f0314d6ec | 7 | * modification, are permitted provided that the following conditions |
frankvnk | 0:c44f0314d6ec | 8 | * are met: |
frankvnk | 0:c44f0314d6ec | 9 | * |
frankvnk | 0:c44f0314d6ec | 10 | * Redistributions of source code must retain the above copyright |
frankvnk | 0:c44f0314d6ec | 11 | * notice, this list of conditions and the following disclaimer. |
frankvnk | 0:c44f0314d6ec | 12 | * |
frankvnk | 0:c44f0314d6ec | 13 | * Redistributions in binary form must reproduce the above copyright |
frankvnk | 0:c44f0314d6ec | 14 | * notice, this list of conditions and the following disclaimer in the |
frankvnk | 0:c44f0314d6ec | 15 | * documentation and/or other materials provided with the |
frankvnk | 0:c44f0314d6ec | 16 | * distribution. |
frankvnk | 0:c44f0314d6ec | 17 | * |
frankvnk | 0:c44f0314d6ec | 18 | * Neither the name of Texas Instruments Incorporated nor the names of |
frankvnk | 0:c44f0314d6ec | 19 | * its contributors may be used to endorse or promote products derived |
frankvnk | 0:c44f0314d6ec | 20 | * from this software without specific prior written permission. |
frankvnk | 0:c44f0314d6ec | 21 | * |
frankvnk | 0:c44f0314d6ec | 22 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
frankvnk | 0:c44f0314d6ec | 23 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
frankvnk | 0:c44f0314d6ec | 24 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
frankvnk | 0:c44f0314d6ec | 25 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
frankvnk | 0:c44f0314d6ec | 26 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
frankvnk | 0:c44f0314d6ec | 27 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
frankvnk | 0:c44f0314d6ec | 28 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
frankvnk | 0:c44f0314d6ec | 29 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
frankvnk | 0:c44f0314d6ec | 30 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
frankvnk | 0:c44f0314d6ec | 31 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
frankvnk | 0:c44f0314d6ec | 32 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
frankvnk | 0:c44f0314d6ec | 33 | * |
frankvnk | 0:c44f0314d6ec | 34 | *****************************************************************************/ |
frankvnk | 0:c44f0314d6ec | 35 | |
frankvnk | 0:c44f0314d6ec | 36 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 37 | // |
frankvnk | 0:c44f0314d6ec | 38 | //! \addtogroup security_api |
frankvnk | 0:c44f0314d6ec | 39 | //! @{ |
frankvnk | 0:c44f0314d6ec | 40 | // |
frankvnk | 0:c44f0314d6ec | 41 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 42 | |
frankvnk | 0:c44f0314d6ec | 43 | #include "security.h" |
frankvnk | 0:c44f0314d6ec | 44 | |
frankvnk | 0:c44f0314d6ec | 45 | #ifndef CC3000_UNENCRYPTED_SMART_CONFIG |
frankvnk | 0:c44f0314d6ec | 46 | // foreward sbox |
frankvnk | 0:c44f0314d6ec | 47 | const unsigned char sbox[256] = { |
frankvnk | 0:c44f0314d6ec | 48 | //0 1 2 3 4 5 6 7 8 9 A B C D E F |
frankvnk | 0:c44f0314d6ec | 49 | 0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76, //0 |
frankvnk | 0:c44f0314d6ec | 50 | 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0, //1 |
frankvnk | 0:c44f0314d6ec | 51 | 0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15, //2 |
frankvnk | 0:c44f0314d6ec | 52 | 0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75, //3 |
frankvnk | 0:c44f0314d6ec | 53 | 0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84, //4 |
frankvnk | 0:c44f0314d6ec | 54 | 0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf, //5 |
frankvnk | 0:c44f0314d6ec | 55 | 0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8, //6 |
frankvnk | 0:c44f0314d6ec | 56 | 0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2, //7 |
frankvnk | 0:c44f0314d6ec | 57 | 0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73, //8 |
frankvnk | 0:c44f0314d6ec | 58 | 0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb, //9 |
frankvnk | 0:c44f0314d6ec | 59 | 0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79, //A |
frankvnk | 0:c44f0314d6ec | 60 | 0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08, //B |
frankvnk | 0:c44f0314d6ec | 61 | 0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a, //C |
frankvnk | 0:c44f0314d6ec | 62 | 0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e, //D |
frankvnk | 0:c44f0314d6ec | 63 | 0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf, //E |
frankvnk | 0:c44f0314d6ec | 64 | 0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16 }; //F |
frankvnk | 0:c44f0314d6ec | 65 | // inverse sbox |
frankvnk | 0:c44f0314d6ec | 66 | const unsigned char rsbox[256] = |
frankvnk | 0:c44f0314d6ec | 67 | { 0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb |
frankvnk | 0:c44f0314d6ec | 68 | , 0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb |
frankvnk | 0:c44f0314d6ec | 69 | , 0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e |
frankvnk | 0:c44f0314d6ec | 70 | , 0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25 |
frankvnk | 0:c44f0314d6ec | 71 | , 0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92 |
frankvnk | 0:c44f0314d6ec | 72 | , 0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84 |
frankvnk | 0:c44f0314d6ec | 73 | , 0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06 |
frankvnk | 0:c44f0314d6ec | 74 | , 0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b |
frankvnk | 0:c44f0314d6ec | 75 | , 0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73 |
frankvnk | 0:c44f0314d6ec | 76 | , 0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e |
frankvnk | 0:c44f0314d6ec | 77 | , 0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b |
frankvnk | 0:c44f0314d6ec | 78 | , 0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4 |
frankvnk | 0:c44f0314d6ec | 79 | , 0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f |
frankvnk | 0:c44f0314d6ec | 80 | , 0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef |
frankvnk | 0:c44f0314d6ec | 81 | , 0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61 |
frankvnk | 0:c44f0314d6ec | 82 | , 0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d }; |
frankvnk | 0:c44f0314d6ec | 83 | // round constant |
frankvnk | 0:c44f0314d6ec | 84 | const unsigned char Rcon[11] = {0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36}; |
frankvnk | 0:c44f0314d6ec | 85 | |
frankvnk | 0:c44f0314d6ec | 86 | |
frankvnk | 0:c44f0314d6ec | 87 | unsigned char expandedKey[176]; |
frankvnk | 0:c44f0314d6ec | 88 | |
frankvnk | 0:c44f0314d6ec | 89 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 90 | // |
frankvnk | 0:c44f0314d6ec | 91 | //! expandKey |
frankvnk | 0:c44f0314d6ec | 92 | //! |
frankvnk | 0:c44f0314d6ec | 93 | //! @param key AES128 key - 16 bytes |
frankvnk | 0:c44f0314d6ec | 94 | //! @param expandedKey expanded AES128 key |
frankvnk | 0:c44f0314d6ec | 95 | //! |
frankvnk | 0:c44f0314d6ec | 96 | //! @return none |
frankvnk | 0:c44f0314d6ec | 97 | //! |
frankvnk | 0:c44f0314d6ec | 98 | //! @brief expend a 16 bytes key for AES128 implementation |
frankvnk | 0:c44f0314d6ec | 99 | //! |
frankvnk | 0:c44f0314d6ec | 100 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 101 | |
frankvnk | 0:c44f0314d6ec | 102 | void expandKey(unsigned char *expandedKey, |
frankvnk | 0:c44f0314d6ec | 103 | unsigned char *key) |
frankvnk | 0:c44f0314d6ec | 104 | { |
frankvnk | 0:c44f0314d6ec | 105 | unsigned short ii, buf1; |
frankvnk | 0:c44f0314d6ec | 106 | for (ii=0;ii<16;ii++) |
frankvnk | 0:c44f0314d6ec | 107 | expandedKey[ii] = key[ii]; |
frankvnk | 0:c44f0314d6ec | 108 | for (ii=1;ii<11;ii++) |
frankvnk | 0:c44f0314d6ec | 109 | { |
frankvnk | 0:c44f0314d6ec | 110 | buf1 = expandedKey[ii*16 - 4]; |
frankvnk | 0:c44f0314d6ec | 111 | expandedKey[ii*16 + 0] = sbox[expandedKey[ii*16 - 3]]^expandedKey[(ii-1)*16 + 0]^Rcon[ii]; |
frankvnk | 0:c44f0314d6ec | 112 | expandedKey[ii*16 + 1] = sbox[expandedKey[ii*16 - 2]]^expandedKey[(ii-1)*16 + 1]; |
frankvnk | 0:c44f0314d6ec | 113 | expandedKey[ii*16 + 2] = sbox[expandedKey[ii*16 - 1]]^expandedKey[(ii-1)*16 + 2]; |
frankvnk | 0:c44f0314d6ec | 114 | expandedKey[ii*16 + 3] = sbox[buf1 ]^expandedKey[(ii-1)*16 + 3]; |
frankvnk | 0:c44f0314d6ec | 115 | expandedKey[ii*16 + 4] = expandedKey[(ii-1)*16 + 4]^expandedKey[ii*16 + 0]; |
frankvnk | 0:c44f0314d6ec | 116 | expandedKey[ii*16 + 5] = expandedKey[(ii-1)*16 + 5]^expandedKey[ii*16 + 1]; |
frankvnk | 0:c44f0314d6ec | 117 | expandedKey[ii*16 + 6] = expandedKey[(ii-1)*16 + 6]^expandedKey[ii*16 + 2]; |
frankvnk | 0:c44f0314d6ec | 118 | expandedKey[ii*16 + 7] = expandedKey[(ii-1)*16 + 7]^expandedKey[ii*16 + 3]; |
frankvnk | 0:c44f0314d6ec | 119 | expandedKey[ii*16 + 8] = expandedKey[(ii-1)*16 + 8]^expandedKey[ii*16 + 4]; |
frankvnk | 0:c44f0314d6ec | 120 | expandedKey[ii*16 + 9] = expandedKey[(ii-1)*16 + 9]^expandedKey[ii*16 + 5]; |
frankvnk | 0:c44f0314d6ec | 121 | expandedKey[ii*16 +10] = expandedKey[(ii-1)*16 +10]^expandedKey[ii*16 + 6]; |
frankvnk | 0:c44f0314d6ec | 122 | expandedKey[ii*16 +11] = expandedKey[(ii-1)*16 +11]^expandedKey[ii*16 + 7]; |
frankvnk | 0:c44f0314d6ec | 123 | expandedKey[ii*16 +12] = expandedKey[(ii-1)*16 +12]^expandedKey[ii*16 + 8]; |
frankvnk | 0:c44f0314d6ec | 124 | expandedKey[ii*16 +13] = expandedKey[(ii-1)*16 +13]^expandedKey[ii*16 + 9]; |
frankvnk | 0:c44f0314d6ec | 125 | expandedKey[ii*16 +14] = expandedKey[(ii-1)*16 +14]^expandedKey[ii*16 +10]; |
frankvnk | 0:c44f0314d6ec | 126 | expandedKey[ii*16 +15] = expandedKey[(ii-1)*16 +15]^expandedKey[ii*16 +11]; |
frankvnk | 0:c44f0314d6ec | 127 | } |
frankvnk | 0:c44f0314d6ec | 128 | |
frankvnk | 0:c44f0314d6ec | 129 | } |
frankvnk | 0:c44f0314d6ec | 130 | |
frankvnk | 0:c44f0314d6ec | 131 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 132 | // |
frankvnk | 0:c44f0314d6ec | 133 | //! galois_mul2 |
frankvnk | 0:c44f0314d6ec | 134 | //! |
frankvnk | 0:c44f0314d6ec | 135 | //! @param value argument to multiply |
frankvnk | 0:c44f0314d6ec | 136 | //! |
frankvnk | 0:c44f0314d6ec | 137 | //! @return multiplied argument |
frankvnk | 0:c44f0314d6ec | 138 | //! |
frankvnk | 0:c44f0314d6ec | 139 | //! @brief multiply by 2 in the galois field |
frankvnk | 0:c44f0314d6ec | 140 | //! |
frankvnk | 0:c44f0314d6ec | 141 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 142 | |
frankvnk | 0:c44f0314d6ec | 143 | unsigned char galois_mul2(unsigned char value) |
frankvnk | 0:c44f0314d6ec | 144 | { |
frankvnk | 0:c44f0314d6ec | 145 | if (value>>7) |
frankvnk | 0:c44f0314d6ec | 146 | { |
frankvnk | 0:c44f0314d6ec | 147 | value = value << 1; |
frankvnk | 0:c44f0314d6ec | 148 | return (value^0x1b); |
frankvnk | 0:c44f0314d6ec | 149 | } else |
frankvnk | 0:c44f0314d6ec | 150 | return value<<1; |
frankvnk | 0:c44f0314d6ec | 151 | } |
frankvnk | 0:c44f0314d6ec | 152 | |
frankvnk | 0:c44f0314d6ec | 153 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 154 | // |
frankvnk | 0:c44f0314d6ec | 155 | //! aes_encr |
frankvnk | 0:c44f0314d6ec | 156 | //! |
frankvnk | 0:c44f0314d6ec | 157 | //! @param[in] expandedKey expanded AES128 key |
frankvnk | 0:c44f0314d6ec | 158 | //! @param[in/out] state 16 bytes of plain text and cipher text |
frankvnk | 0:c44f0314d6ec | 159 | //! |
frankvnk | 0:c44f0314d6ec | 160 | //! @return none |
frankvnk | 0:c44f0314d6ec | 161 | //! |
frankvnk | 0:c44f0314d6ec | 162 | //! @brief internal implementation of AES128 encryption. |
frankvnk | 0:c44f0314d6ec | 163 | //! straight forward aes encryption implementation |
frankvnk | 0:c44f0314d6ec | 164 | //! first the group of operations |
frankvnk | 0:c44f0314d6ec | 165 | //! - addRoundKey |
frankvnk | 0:c44f0314d6ec | 166 | //! - subbytes |
frankvnk | 0:c44f0314d6ec | 167 | //! - shiftrows |
frankvnk | 0:c44f0314d6ec | 168 | //! - mixcolums |
frankvnk | 0:c44f0314d6ec | 169 | //! is executed 9 times, after this addroundkey to finish the 9th |
frankvnk | 0:c44f0314d6ec | 170 | //! round, after that the 10th round without mixcolums |
frankvnk | 0:c44f0314d6ec | 171 | //! no further subfunctions to save cycles for function calls |
frankvnk | 0:c44f0314d6ec | 172 | //! no structuring with "for (....)" to save cycles. |
frankvnk | 0:c44f0314d6ec | 173 | //! |
frankvnk | 0:c44f0314d6ec | 174 | //! |
frankvnk | 0:c44f0314d6ec | 175 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 176 | |
frankvnk | 0:c44f0314d6ec | 177 | void aes_encr(unsigned char *state, unsigned char *expandedKey) |
frankvnk | 0:c44f0314d6ec | 178 | { |
frankvnk | 0:c44f0314d6ec | 179 | unsigned char buf1, buf2, buf3, round; |
frankvnk | 0:c44f0314d6ec | 180 | |
frankvnk | 0:c44f0314d6ec | 181 | for (round = 0; round < 9; round ++) |
frankvnk | 0:c44f0314d6ec | 182 | { |
frankvnk | 0:c44f0314d6ec | 183 | // addroundkey, sbox and shiftrows |
frankvnk | 0:c44f0314d6ec | 184 | // row 0 |
frankvnk | 0:c44f0314d6ec | 185 | state[ 0] = sbox[(state[ 0] ^ expandedKey[(round*16) ])]; |
frankvnk | 0:c44f0314d6ec | 186 | state[ 4] = sbox[(state[ 4] ^ expandedKey[(round*16) + 4])]; |
frankvnk | 0:c44f0314d6ec | 187 | state[ 8] = sbox[(state[ 8] ^ expandedKey[(round*16) + 8])]; |
frankvnk | 0:c44f0314d6ec | 188 | state[12] = sbox[(state[12] ^ expandedKey[(round*16) + 12])]; |
frankvnk | 0:c44f0314d6ec | 189 | // row 1 |
frankvnk | 0:c44f0314d6ec | 190 | buf1 = state[1] ^ expandedKey[(round*16) + 1]; |
frankvnk | 0:c44f0314d6ec | 191 | state[ 1] = sbox[(state[ 5] ^ expandedKey[(round*16) + 5])]; |
frankvnk | 0:c44f0314d6ec | 192 | state[ 5] = sbox[(state[ 9] ^ expandedKey[(round*16) + 9])]; |
frankvnk | 0:c44f0314d6ec | 193 | state[ 9] = sbox[(state[13] ^ expandedKey[(round*16) + 13])]; |
frankvnk | 0:c44f0314d6ec | 194 | state[13] = sbox[buf1]; |
frankvnk | 0:c44f0314d6ec | 195 | // row 2 |
frankvnk | 0:c44f0314d6ec | 196 | buf1 = state[2] ^ expandedKey[(round*16) + 2]; |
frankvnk | 0:c44f0314d6ec | 197 | buf2 = state[6] ^ expandedKey[(round*16) + 6]; |
frankvnk | 0:c44f0314d6ec | 198 | state[ 2] = sbox[(state[10] ^ expandedKey[(round*16) + 10])]; |
frankvnk | 0:c44f0314d6ec | 199 | state[ 6] = sbox[(state[14] ^ expandedKey[(round*16) + 14])]; |
frankvnk | 0:c44f0314d6ec | 200 | state[10] = sbox[buf1]; |
frankvnk | 0:c44f0314d6ec | 201 | state[14] = sbox[buf2]; |
frankvnk | 0:c44f0314d6ec | 202 | // row 3 |
frankvnk | 0:c44f0314d6ec | 203 | buf1 = state[15] ^ expandedKey[(round*16) + 15]; |
frankvnk | 0:c44f0314d6ec | 204 | state[15] = sbox[(state[11] ^ expandedKey[(round*16) + 11])]; |
frankvnk | 0:c44f0314d6ec | 205 | state[11] = sbox[(state[ 7] ^ expandedKey[(round*16) + 7])]; |
frankvnk | 0:c44f0314d6ec | 206 | state[ 7] = sbox[(state[ 3] ^ expandedKey[(round*16) + 3])]; |
frankvnk | 0:c44f0314d6ec | 207 | state[ 3] = sbox[buf1]; |
frankvnk | 0:c44f0314d6ec | 208 | |
frankvnk | 0:c44f0314d6ec | 209 | // mixcolums ////////// |
frankvnk | 0:c44f0314d6ec | 210 | // col1 |
frankvnk | 0:c44f0314d6ec | 211 | buf1 = state[0] ^ state[1] ^ state[2] ^ state[3]; |
frankvnk | 0:c44f0314d6ec | 212 | buf2 = state[0]; |
frankvnk | 0:c44f0314d6ec | 213 | buf3 = state[0]^state[1]; buf3=galois_mul2(buf3); state[0] = state[0] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 214 | buf3 = state[1]^state[2]; buf3=galois_mul2(buf3); state[1] = state[1] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 215 | buf3 = state[2]^state[3]; buf3=galois_mul2(buf3); state[2] = state[2] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 216 | buf3 = state[3]^buf2; buf3=galois_mul2(buf3); state[3] = state[3] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 217 | // col2 |
frankvnk | 0:c44f0314d6ec | 218 | buf1 = state[4] ^ state[5] ^ state[6] ^ state[7]; |
frankvnk | 0:c44f0314d6ec | 219 | buf2 = state[4]; |
frankvnk | 0:c44f0314d6ec | 220 | buf3 = state[4]^state[5]; buf3=galois_mul2(buf3); state[4] = state[4] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 221 | buf3 = state[5]^state[6]; buf3=galois_mul2(buf3); state[5] = state[5] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 222 | buf3 = state[6]^state[7]; buf3=galois_mul2(buf3); state[6] = state[6] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 223 | buf3 = state[7]^buf2; buf3=galois_mul2(buf3); state[7] = state[7] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 224 | // col3 |
frankvnk | 0:c44f0314d6ec | 225 | buf1 = state[8] ^ state[9] ^ state[10] ^ state[11]; |
frankvnk | 0:c44f0314d6ec | 226 | buf2 = state[8]; |
frankvnk | 0:c44f0314d6ec | 227 | buf3 = state[8]^state[9]; buf3=galois_mul2(buf3); state[8] = state[8] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 228 | buf3 = state[9]^state[10]; buf3=galois_mul2(buf3); state[9] = state[9] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 229 | buf3 = state[10]^state[11]; buf3=galois_mul2(buf3); state[10] = state[10] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 230 | buf3 = state[11]^buf2; buf3=galois_mul2(buf3); state[11] = state[11] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 231 | // col4 |
frankvnk | 0:c44f0314d6ec | 232 | buf1 = state[12] ^ state[13] ^ state[14] ^ state[15]; |
frankvnk | 0:c44f0314d6ec | 233 | buf2 = state[12]; |
frankvnk | 0:c44f0314d6ec | 234 | buf3 = state[12]^state[13]; buf3=galois_mul2(buf3); state[12] = state[12] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 235 | buf3 = state[13]^state[14]; buf3=galois_mul2(buf3); state[13] = state[13] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 236 | buf3 = state[14]^state[15]; buf3=galois_mul2(buf3); state[14] = state[14] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 237 | buf3 = state[15]^buf2; buf3=galois_mul2(buf3); state[15] = state[15] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 238 | |
frankvnk | 0:c44f0314d6ec | 239 | } |
frankvnk | 0:c44f0314d6ec | 240 | // 10th round without mixcols |
frankvnk | 0:c44f0314d6ec | 241 | state[ 0] = sbox[(state[ 0] ^ expandedKey[(round*16) ])]; |
frankvnk | 0:c44f0314d6ec | 242 | state[ 4] = sbox[(state[ 4] ^ expandedKey[(round*16) + 4])]; |
frankvnk | 0:c44f0314d6ec | 243 | state[ 8] = sbox[(state[ 8] ^ expandedKey[(round*16) + 8])]; |
frankvnk | 0:c44f0314d6ec | 244 | state[12] = sbox[(state[12] ^ expandedKey[(round*16) + 12])]; |
frankvnk | 0:c44f0314d6ec | 245 | // row 1 |
frankvnk | 0:c44f0314d6ec | 246 | buf1 = state[1] ^ expandedKey[(round*16) + 1]; |
frankvnk | 0:c44f0314d6ec | 247 | state[ 1] = sbox[(state[ 5] ^ expandedKey[(round*16) + 5])]; |
frankvnk | 0:c44f0314d6ec | 248 | state[ 5] = sbox[(state[ 9] ^ expandedKey[(round*16) + 9])]; |
frankvnk | 0:c44f0314d6ec | 249 | state[ 9] = sbox[(state[13] ^ expandedKey[(round*16) + 13])]; |
frankvnk | 0:c44f0314d6ec | 250 | state[13] = sbox[buf1]; |
frankvnk | 0:c44f0314d6ec | 251 | // row 2 |
frankvnk | 0:c44f0314d6ec | 252 | buf1 = state[2] ^ expandedKey[(round*16) + 2]; |
frankvnk | 0:c44f0314d6ec | 253 | buf2 = state[6] ^ expandedKey[(round*16) + 6]; |
frankvnk | 0:c44f0314d6ec | 254 | state[ 2] = sbox[(state[10] ^ expandedKey[(round*16) + 10])]; |
frankvnk | 0:c44f0314d6ec | 255 | state[ 6] = sbox[(state[14] ^ expandedKey[(round*16) + 14])]; |
frankvnk | 0:c44f0314d6ec | 256 | state[10] = sbox[buf1]; |
frankvnk | 0:c44f0314d6ec | 257 | state[14] = sbox[buf2]; |
frankvnk | 0:c44f0314d6ec | 258 | // row 3 |
frankvnk | 0:c44f0314d6ec | 259 | buf1 = state[15] ^ expandedKey[(round*16) + 15]; |
frankvnk | 0:c44f0314d6ec | 260 | state[15] = sbox[(state[11] ^ expandedKey[(round*16) + 11])]; |
frankvnk | 0:c44f0314d6ec | 261 | state[11] = sbox[(state[ 7] ^ expandedKey[(round*16) + 7])]; |
frankvnk | 0:c44f0314d6ec | 262 | state[ 7] = sbox[(state[ 3] ^ expandedKey[(round*16) + 3])]; |
frankvnk | 0:c44f0314d6ec | 263 | state[ 3] = sbox[buf1]; |
frankvnk | 0:c44f0314d6ec | 264 | // last addroundkey |
frankvnk | 0:c44f0314d6ec | 265 | state[ 0]^=expandedKey[160]; |
frankvnk | 0:c44f0314d6ec | 266 | state[ 1]^=expandedKey[161]; |
frankvnk | 0:c44f0314d6ec | 267 | state[ 2]^=expandedKey[162]; |
frankvnk | 0:c44f0314d6ec | 268 | state[ 3]^=expandedKey[163]; |
frankvnk | 0:c44f0314d6ec | 269 | state[ 4]^=expandedKey[164]; |
frankvnk | 0:c44f0314d6ec | 270 | state[ 5]^=expandedKey[165]; |
frankvnk | 0:c44f0314d6ec | 271 | state[ 6]^=expandedKey[166]; |
frankvnk | 0:c44f0314d6ec | 272 | state[ 7]^=expandedKey[167]; |
frankvnk | 0:c44f0314d6ec | 273 | state[ 8]^=expandedKey[168]; |
frankvnk | 0:c44f0314d6ec | 274 | state[ 9]^=expandedKey[169]; |
frankvnk | 0:c44f0314d6ec | 275 | state[10]^=expandedKey[170]; |
frankvnk | 0:c44f0314d6ec | 276 | state[11]^=expandedKey[171]; |
frankvnk | 0:c44f0314d6ec | 277 | state[12]^=expandedKey[172]; |
frankvnk | 0:c44f0314d6ec | 278 | state[13]^=expandedKey[173]; |
frankvnk | 0:c44f0314d6ec | 279 | state[14]^=expandedKey[174]; |
frankvnk | 0:c44f0314d6ec | 280 | state[15]^=expandedKey[175]; |
frankvnk | 0:c44f0314d6ec | 281 | } |
frankvnk | 0:c44f0314d6ec | 282 | |
frankvnk | 0:c44f0314d6ec | 283 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 284 | // |
frankvnk | 0:c44f0314d6ec | 285 | //! aes_decr |
frankvnk | 0:c44f0314d6ec | 286 | //! |
frankvnk | 0:c44f0314d6ec | 287 | //! @param[in] expandedKey expanded AES128 key |
frankvnk | 0:c44f0314d6ec | 288 | //! @param[in\out] state 16 bytes of cipher text and plain text |
frankvnk | 0:c44f0314d6ec | 289 | //! |
frankvnk | 0:c44f0314d6ec | 290 | //! @return none |
frankvnk | 0:c44f0314d6ec | 291 | //! |
frankvnk | 0:c44f0314d6ec | 292 | //! @brief internal implementation of AES128 decryption. |
frankvnk | 0:c44f0314d6ec | 293 | //! straight forward aes decryption implementation |
frankvnk | 0:c44f0314d6ec | 294 | //! the order of substeps is the exact reverse of decryption |
frankvnk | 0:c44f0314d6ec | 295 | //! inverse functions: |
frankvnk | 0:c44f0314d6ec | 296 | //! - addRoundKey is its own inverse |
frankvnk | 0:c44f0314d6ec | 297 | //! - rsbox is inverse of sbox |
frankvnk | 0:c44f0314d6ec | 298 | //! - rightshift instead of leftshift |
frankvnk | 0:c44f0314d6ec | 299 | //! - invMixColumns = barreto + mixColumns |
frankvnk | 0:c44f0314d6ec | 300 | //! no further subfunctions to save cycles for function calls |
frankvnk | 0:c44f0314d6ec | 301 | //! no structuring with "for (....)" to save cycles |
frankvnk | 0:c44f0314d6ec | 302 | //! |
frankvnk | 0:c44f0314d6ec | 303 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 304 | |
frankvnk | 0:c44f0314d6ec | 305 | void aes_decr(unsigned char *state, unsigned char *expandedKey) |
frankvnk | 0:c44f0314d6ec | 306 | { |
frankvnk | 0:c44f0314d6ec | 307 | unsigned char buf1, buf2, buf3; |
frankvnk | 0:c44f0314d6ec | 308 | signed char round; |
frankvnk | 0:c44f0314d6ec | 309 | round = 9; |
frankvnk | 0:c44f0314d6ec | 310 | |
frankvnk | 0:c44f0314d6ec | 311 | // initial addroundkey |
frankvnk | 0:c44f0314d6ec | 312 | state[ 0]^=expandedKey[160]; |
frankvnk | 0:c44f0314d6ec | 313 | state[ 1]^=expandedKey[161]; |
frankvnk | 0:c44f0314d6ec | 314 | state[ 2]^=expandedKey[162]; |
frankvnk | 0:c44f0314d6ec | 315 | state[ 3]^=expandedKey[163]; |
frankvnk | 0:c44f0314d6ec | 316 | state[ 4]^=expandedKey[164]; |
frankvnk | 0:c44f0314d6ec | 317 | state[ 5]^=expandedKey[165]; |
frankvnk | 0:c44f0314d6ec | 318 | state[ 6]^=expandedKey[166]; |
frankvnk | 0:c44f0314d6ec | 319 | state[ 7]^=expandedKey[167]; |
frankvnk | 0:c44f0314d6ec | 320 | state[ 8]^=expandedKey[168]; |
frankvnk | 0:c44f0314d6ec | 321 | state[ 9]^=expandedKey[169]; |
frankvnk | 0:c44f0314d6ec | 322 | state[10]^=expandedKey[170]; |
frankvnk | 0:c44f0314d6ec | 323 | state[11]^=expandedKey[171]; |
frankvnk | 0:c44f0314d6ec | 324 | state[12]^=expandedKey[172]; |
frankvnk | 0:c44f0314d6ec | 325 | state[13]^=expandedKey[173]; |
frankvnk | 0:c44f0314d6ec | 326 | state[14]^=expandedKey[174]; |
frankvnk | 0:c44f0314d6ec | 327 | state[15]^=expandedKey[175]; |
frankvnk | 0:c44f0314d6ec | 328 | |
frankvnk | 0:c44f0314d6ec | 329 | // 10th round without mixcols |
frankvnk | 0:c44f0314d6ec | 330 | state[ 0] = rsbox[state[ 0]] ^ expandedKey[(round*16) ]; |
frankvnk | 0:c44f0314d6ec | 331 | state[ 4] = rsbox[state[ 4]] ^ expandedKey[(round*16) + 4]; |
frankvnk | 0:c44f0314d6ec | 332 | state[ 8] = rsbox[state[ 8]] ^ expandedKey[(round*16) + 8]; |
frankvnk | 0:c44f0314d6ec | 333 | state[12] = rsbox[state[12]] ^ expandedKey[(round*16) + 12]; |
frankvnk | 0:c44f0314d6ec | 334 | // row 1 |
frankvnk | 0:c44f0314d6ec | 335 | buf1 = rsbox[state[13]] ^ expandedKey[(round*16) + 1]; |
frankvnk | 0:c44f0314d6ec | 336 | state[13] = rsbox[state[ 9]] ^ expandedKey[(round*16) + 13]; |
frankvnk | 0:c44f0314d6ec | 337 | state[ 9] = rsbox[state[ 5]] ^ expandedKey[(round*16) + 9]; |
frankvnk | 0:c44f0314d6ec | 338 | state[ 5] = rsbox[state[ 1]] ^ expandedKey[(round*16) + 5]; |
frankvnk | 0:c44f0314d6ec | 339 | state[ 1] = buf1; |
frankvnk | 0:c44f0314d6ec | 340 | // row 2 |
frankvnk | 0:c44f0314d6ec | 341 | buf1 = rsbox[state[ 2]] ^ expandedKey[(round*16) + 10]; |
frankvnk | 0:c44f0314d6ec | 342 | buf2 = rsbox[state[ 6]] ^ expandedKey[(round*16) + 14]; |
frankvnk | 0:c44f0314d6ec | 343 | state[ 2] = rsbox[state[10]] ^ expandedKey[(round*16) + 2]; |
frankvnk | 0:c44f0314d6ec | 344 | state[ 6] = rsbox[state[14]] ^ expandedKey[(round*16) + 6]; |
frankvnk | 0:c44f0314d6ec | 345 | state[10] = buf1; |
frankvnk | 0:c44f0314d6ec | 346 | state[14] = buf2; |
frankvnk | 0:c44f0314d6ec | 347 | // row 3 |
frankvnk | 0:c44f0314d6ec | 348 | buf1 = rsbox[state[ 3]] ^ expandedKey[(round*16) + 15]; |
frankvnk | 0:c44f0314d6ec | 349 | state[ 3] = rsbox[state[ 7]] ^ expandedKey[(round*16) + 3]; |
frankvnk | 0:c44f0314d6ec | 350 | state[ 7] = rsbox[state[11]] ^ expandedKey[(round*16) + 7]; |
frankvnk | 0:c44f0314d6ec | 351 | state[11] = rsbox[state[15]] ^ expandedKey[(round*16) + 11]; |
frankvnk | 0:c44f0314d6ec | 352 | state[15] = buf1; |
frankvnk | 0:c44f0314d6ec | 353 | |
frankvnk | 0:c44f0314d6ec | 354 | for (round = 8; round >= 0; round--) |
frankvnk | 0:c44f0314d6ec | 355 | { |
frankvnk | 0:c44f0314d6ec | 356 | // barreto |
frankvnk | 0:c44f0314d6ec | 357 | //col1 |
frankvnk | 0:c44f0314d6ec | 358 | buf1 = galois_mul2(galois_mul2(state[0]^state[2])); |
frankvnk | 0:c44f0314d6ec | 359 | buf2 = galois_mul2(galois_mul2(state[1]^state[3])); |
frankvnk | 0:c44f0314d6ec | 360 | state[0] ^= buf1; state[1] ^= buf2; state[2] ^= buf1; state[3] ^= buf2; |
frankvnk | 0:c44f0314d6ec | 361 | //col2 |
frankvnk | 0:c44f0314d6ec | 362 | buf1 = galois_mul2(galois_mul2(state[4]^state[6])); |
frankvnk | 0:c44f0314d6ec | 363 | buf2 = galois_mul2(galois_mul2(state[5]^state[7])); |
frankvnk | 0:c44f0314d6ec | 364 | state[4] ^= buf1; state[5] ^= buf2; state[6] ^= buf1; state[7] ^= buf2; |
frankvnk | 0:c44f0314d6ec | 365 | //col3 |
frankvnk | 0:c44f0314d6ec | 366 | buf1 = galois_mul2(galois_mul2(state[8]^state[10])); |
frankvnk | 0:c44f0314d6ec | 367 | buf2 = galois_mul2(galois_mul2(state[9]^state[11])); |
frankvnk | 0:c44f0314d6ec | 368 | state[8] ^= buf1; state[9] ^= buf2; state[10] ^= buf1; state[11] ^= buf2; |
frankvnk | 0:c44f0314d6ec | 369 | //col4 |
frankvnk | 0:c44f0314d6ec | 370 | buf1 = galois_mul2(galois_mul2(state[12]^state[14])); |
frankvnk | 0:c44f0314d6ec | 371 | buf2 = galois_mul2(galois_mul2(state[13]^state[15])); |
frankvnk | 0:c44f0314d6ec | 372 | state[12] ^= buf1; state[13] ^= buf2; state[14] ^= buf1; state[15] ^= buf2; |
frankvnk | 0:c44f0314d6ec | 373 | // mixcolums ////////// |
frankvnk | 0:c44f0314d6ec | 374 | // col1 |
frankvnk | 0:c44f0314d6ec | 375 | buf1 = state[0] ^ state[1] ^ state[2] ^ state[3]; |
frankvnk | 0:c44f0314d6ec | 376 | buf2 = state[0]; |
frankvnk | 0:c44f0314d6ec | 377 | buf3 = state[0]^state[1]; buf3=galois_mul2(buf3); state[0] = state[0] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 378 | buf3 = state[1]^state[2]; buf3=galois_mul2(buf3); state[1] = state[1] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 379 | buf3 = state[2]^state[3]; buf3=galois_mul2(buf3); state[2] = state[2] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 380 | buf3 = state[3]^buf2; buf3=galois_mul2(buf3); state[3] = state[3] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 381 | // col2 |
frankvnk | 0:c44f0314d6ec | 382 | buf1 = state[4] ^ state[5] ^ state[6] ^ state[7]; |
frankvnk | 0:c44f0314d6ec | 383 | buf2 = state[4]; |
frankvnk | 0:c44f0314d6ec | 384 | buf3 = state[4]^state[5]; buf3=galois_mul2(buf3); state[4] = state[4] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 385 | buf3 = state[5]^state[6]; buf3=galois_mul2(buf3); state[5] = state[5] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 386 | buf3 = state[6]^state[7]; buf3=galois_mul2(buf3); state[6] = state[6] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 387 | buf3 = state[7]^buf2; buf3=galois_mul2(buf3); state[7] = state[7] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 388 | // col3 |
frankvnk | 0:c44f0314d6ec | 389 | buf1 = state[8] ^ state[9] ^ state[10] ^ state[11]; |
frankvnk | 0:c44f0314d6ec | 390 | buf2 = state[8]; |
frankvnk | 0:c44f0314d6ec | 391 | buf3 = state[8]^state[9]; buf3=galois_mul2(buf3); state[8] = state[8] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 392 | buf3 = state[9]^state[10]; buf3=galois_mul2(buf3); state[9] = state[9] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 393 | buf3 = state[10]^state[11]; buf3=galois_mul2(buf3); state[10] = state[10] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 394 | buf3 = state[11]^buf2; buf3=galois_mul2(buf3); state[11] = state[11] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 395 | // col4 |
frankvnk | 0:c44f0314d6ec | 396 | buf1 = state[12] ^ state[13] ^ state[14] ^ state[15]; |
frankvnk | 0:c44f0314d6ec | 397 | buf2 = state[12]; |
frankvnk | 0:c44f0314d6ec | 398 | buf3 = state[12]^state[13]; buf3=galois_mul2(buf3); state[12] = state[12] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 399 | buf3 = state[13]^state[14]; buf3=galois_mul2(buf3); state[13] = state[13] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 400 | buf3 = state[14]^state[15]; buf3=galois_mul2(buf3); state[14] = state[14] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 401 | buf3 = state[15]^buf2; buf3=galois_mul2(buf3); state[15] = state[15] ^ buf3 ^ buf1; |
frankvnk | 0:c44f0314d6ec | 402 | |
frankvnk | 0:c44f0314d6ec | 403 | // addroundkey, rsbox and shiftrows |
frankvnk | 0:c44f0314d6ec | 404 | // row 0 |
frankvnk | 0:c44f0314d6ec | 405 | state[ 0] = rsbox[state[ 0]] ^ expandedKey[(round*16) ]; |
frankvnk | 0:c44f0314d6ec | 406 | state[ 4] = rsbox[state[ 4]] ^ expandedKey[(round*16) + 4]; |
frankvnk | 0:c44f0314d6ec | 407 | state[ 8] = rsbox[state[ 8]] ^ expandedKey[(round*16) + 8]; |
frankvnk | 0:c44f0314d6ec | 408 | state[12] = rsbox[state[12]] ^ expandedKey[(round*16) + 12]; |
frankvnk | 0:c44f0314d6ec | 409 | // row 1 |
frankvnk | 0:c44f0314d6ec | 410 | buf1 = rsbox[state[13]] ^ expandedKey[(round*16) + 1]; |
frankvnk | 0:c44f0314d6ec | 411 | state[13] = rsbox[state[ 9]] ^ expandedKey[(round*16) + 13]; |
frankvnk | 0:c44f0314d6ec | 412 | state[ 9] = rsbox[state[ 5]] ^ expandedKey[(round*16) + 9]; |
frankvnk | 0:c44f0314d6ec | 413 | state[ 5] = rsbox[state[ 1]] ^ expandedKey[(round*16) + 5]; |
frankvnk | 0:c44f0314d6ec | 414 | state[ 1] = buf1; |
frankvnk | 0:c44f0314d6ec | 415 | // row 2 |
frankvnk | 0:c44f0314d6ec | 416 | buf1 = rsbox[state[ 2]] ^ expandedKey[(round*16) + 10]; |
frankvnk | 0:c44f0314d6ec | 417 | buf2 = rsbox[state[ 6]] ^ expandedKey[(round*16) + 14]; |
frankvnk | 0:c44f0314d6ec | 418 | state[ 2] = rsbox[state[10]] ^ expandedKey[(round*16) + 2]; |
frankvnk | 0:c44f0314d6ec | 419 | state[ 6] = rsbox[state[14]] ^ expandedKey[(round*16) + 6]; |
frankvnk | 0:c44f0314d6ec | 420 | state[10] = buf1; |
frankvnk | 0:c44f0314d6ec | 421 | state[14] = buf2; |
frankvnk | 0:c44f0314d6ec | 422 | // row 3 |
frankvnk | 0:c44f0314d6ec | 423 | buf1 = rsbox[state[ 3]] ^ expandedKey[(round*16) + 15]; |
frankvnk | 0:c44f0314d6ec | 424 | state[ 3] = rsbox[state[ 7]] ^ expandedKey[(round*16) + 3]; |
frankvnk | 0:c44f0314d6ec | 425 | state[ 7] = rsbox[state[11]] ^ expandedKey[(round*16) + 7]; |
frankvnk | 0:c44f0314d6ec | 426 | state[11] = rsbox[state[15]] ^ expandedKey[(round*16) + 11]; |
frankvnk | 0:c44f0314d6ec | 427 | state[15] = buf1; |
frankvnk | 0:c44f0314d6ec | 428 | } |
frankvnk | 0:c44f0314d6ec | 429 | |
frankvnk | 0:c44f0314d6ec | 430 | } |
frankvnk | 0:c44f0314d6ec | 431 | |
frankvnk | 0:c44f0314d6ec | 432 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 433 | // |
frankvnk | 0:c44f0314d6ec | 434 | //! aes_encrypt |
frankvnk | 0:c44f0314d6ec | 435 | //! |
frankvnk | 0:c44f0314d6ec | 436 | //! @param[in] key AES128 key of size 16 bytes |
frankvnk | 0:c44f0314d6ec | 437 | //! @param[in\out] state 16 bytes of plain text and cipher text |
frankvnk | 0:c44f0314d6ec | 438 | //! |
frankvnk | 0:c44f0314d6ec | 439 | //! @return none |
frankvnk | 0:c44f0314d6ec | 440 | //! |
frankvnk | 0:c44f0314d6ec | 441 | //! @brief AES128 encryption: |
frankvnk | 0:c44f0314d6ec | 442 | //! Given AES128 key and 16 bytes plain text, cipher text of 16 bytes |
frankvnk | 0:c44f0314d6ec | 443 | //! is computed. The AES implementation is in mode ECB (Electronic |
frankvnk | 0:c44f0314d6ec | 444 | //! Code Book). |
frankvnk | 0:c44f0314d6ec | 445 | //! |
frankvnk | 0:c44f0314d6ec | 446 | //! |
frankvnk | 0:c44f0314d6ec | 447 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 448 | |
frankvnk | 0:c44f0314d6ec | 449 | void aes_encrypt(unsigned char *state, |
frankvnk | 0:c44f0314d6ec | 450 | unsigned char *key) |
frankvnk | 0:c44f0314d6ec | 451 | { |
frankvnk | 0:c44f0314d6ec | 452 | // expand the key into 176 bytes |
frankvnk | 0:c44f0314d6ec | 453 | expandKey(expandedKey, key); |
frankvnk | 0:c44f0314d6ec | 454 | aes_encr(state, expandedKey); |
frankvnk | 0:c44f0314d6ec | 455 | } |
frankvnk | 0:c44f0314d6ec | 456 | |
frankvnk | 0:c44f0314d6ec | 457 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 458 | // |
frankvnk | 0:c44f0314d6ec | 459 | //! aes_decrypt |
frankvnk | 0:c44f0314d6ec | 460 | //! |
frankvnk | 0:c44f0314d6ec | 461 | //! @param[in] key AES128 key of size 16 bytes |
frankvnk | 0:c44f0314d6ec | 462 | //! @param[in\out] state 16 bytes of cipher text and plain text |
frankvnk | 0:c44f0314d6ec | 463 | //! |
frankvnk | 0:c44f0314d6ec | 464 | //! @return none |
frankvnk | 0:c44f0314d6ec | 465 | //! |
frankvnk | 0:c44f0314d6ec | 466 | //! @brief AES128 decryption: |
frankvnk | 0:c44f0314d6ec | 467 | //! Given AES128 key and 16 bytes cipher text, plain text of 16 bytes |
frankvnk | 0:c44f0314d6ec | 468 | //! is computed The AES implementation is in mode ECB |
frankvnk | 0:c44f0314d6ec | 469 | //! (Electronic Code Book). |
frankvnk | 0:c44f0314d6ec | 470 | //! |
frankvnk | 0:c44f0314d6ec | 471 | //! |
frankvnk | 0:c44f0314d6ec | 472 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 473 | |
frankvnk | 0:c44f0314d6ec | 474 | void aes_decrypt(unsigned char *state, |
frankvnk | 0:c44f0314d6ec | 475 | unsigned char *key) |
frankvnk | 0:c44f0314d6ec | 476 | { |
frankvnk | 0:c44f0314d6ec | 477 | expandKey(expandedKey, key); // expand the key into 176 bytes |
frankvnk | 0:c44f0314d6ec | 478 | aes_decr(state, expandedKey); |
frankvnk | 0:c44f0314d6ec | 479 | } |
frankvnk | 0:c44f0314d6ec | 480 | |
frankvnk | 0:c44f0314d6ec | 481 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 482 | // |
frankvnk | 0:c44f0314d6ec | 483 | //! aes_read_key |
frankvnk | 0:c44f0314d6ec | 484 | //! |
frankvnk | 0:c44f0314d6ec | 485 | //! @param[out] key AES128 key of size 16 bytes |
frankvnk | 0:c44f0314d6ec | 486 | //! |
frankvnk | 0:c44f0314d6ec | 487 | //! @return on success 0, error otherwise. |
frankvnk | 0:c44f0314d6ec | 488 | //! |
frankvnk | 0:c44f0314d6ec | 489 | //! @brief Reads AES128 key from EEPROM |
frankvnk | 0:c44f0314d6ec | 490 | //! Reads the AES128 key from fileID #12 in EEPROM |
frankvnk | 0:c44f0314d6ec | 491 | //! returns an error if the key does not exist. |
frankvnk | 0:c44f0314d6ec | 492 | //! |
frankvnk | 0:c44f0314d6ec | 493 | //! |
frankvnk | 0:c44f0314d6ec | 494 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 495 | |
frankvnk | 0:c44f0314d6ec | 496 | signed long aes_read_key(unsigned char *key) |
frankvnk | 0:c44f0314d6ec | 497 | { |
frankvnk | 0:c44f0314d6ec | 498 | signed long returnValue; |
frankvnk | 0:c44f0314d6ec | 499 | |
frankvnk | 0:c44f0314d6ec | 500 | returnValue = nvmem_read(NVMEM_AES128_KEY_FILEID, AES128_KEY_SIZE, 0, key); |
frankvnk | 0:c44f0314d6ec | 501 | |
frankvnk | 0:c44f0314d6ec | 502 | return returnValue; |
frankvnk | 0:c44f0314d6ec | 503 | } |
frankvnk | 0:c44f0314d6ec | 504 | |
frankvnk | 0:c44f0314d6ec | 505 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 506 | // |
frankvnk | 0:c44f0314d6ec | 507 | //! aes_write_key |
frankvnk | 0:c44f0314d6ec | 508 | //! |
frankvnk | 0:c44f0314d6ec | 509 | //! @param[out] key AES128 key of size 16 bytes |
frankvnk | 0:c44f0314d6ec | 510 | //! |
frankvnk | 0:c44f0314d6ec | 511 | //! @return on success 0, error otherwise. |
frankvnk | 0:c44f0314d6ec | 512 | //! |
frankvnk | 0:c44f0314d6ec | 513 | //! @brief writes AES128 key from EEPROM |
frankvnk | 0:c44f0314d6ec | 514 | //! Writes the AES128 key to fileID #12 in EEPROM |
frankvnk | 0:c44f0314d6ec | 515 | //! |
frankvnk | 0:c44f0314d6ec | 516 | //! |
frankvnk | 0:c44f0314d6ec | 517 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 518 | |
frankvnk | 0:c44f0314d6ec | 519 | signed long aes_write_key(unsigned char *key) |
frankvnk | 0:c44f0314d6ec | 520 | { |
frankvnk | 0:c44f0314d6ec | 521 | signed long returnValue; |
frankvnk | 0:c44f0314d6ec | 522 | |
frankvnk | 0:c44f0314d6ec | 523 | returnValue = nvmem_write(NVMEM_AES128_KEY_FILEID, AES128_KEY_SIZE, 0, key); |
frankvnk | 0:c44f0314d6ec | 524 | |
frankvnk | 0:c44f0314d6ec | 525 | return returnValue; |
frankvnk | 0:c44f0314d6ec | 526 | } |
frankvnk | 0:c44f0314d6ec | 527 | |
frankvnk | 0:c44f0314d6ec | 528 | #endif //CC3000_UNENCRYPTED_SMART_CONFIG |
frankvnk | 0:c44f0314d6ec | 529 | |
frankvnk | 0:c44f0314d6ec | 530 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 531 | // |
frankvnk | 0:c44f0314d6ec | 532 | // Close the Doxygen group. |
frankvnk | 0:c44f0314d6ec | 533 | //! @} |
frankvnk | 0:c44f0314d6ec | 534 | // |
frankvnk | 0:c44f0314d6ec | 535 | //***************************************************************************** |
frankvnk | 0:c44f0314d6ec | 536 |