intiial commit

Dependencies:   MAX8614X USBDevice max32630hsp_test

Committer:
phonemacro
Date:
Thu Aug 16 23:46:00 2018 +0000
Revision:
20:39857996a7c7
Parent:
18:a0356b3e6ed9
Child:
21:0a4f90fb3451
Six Challenges added

Who changed what in which revision?

UserRevisionLine numberNew contents of line
phonemacro 0:9e5a4f845510 1 /**********************************************************************
phonemacro 1:854f8a89a527 2 * Copyright (C) 2018 Maxim Integrated Products, Inc., All Rights Reserved.
phonemacro 0:9e5a4f845510 3 *
phonemacro 0:9e5a4f845510 4 * Permission is hereby granted, free of charge, to any person obtaining a
phonemacro 0:9e5a4f845510 5 * copy of this software and associated documentation files (the "Software"),
phonemacro 0:9e5a4f845510 6 * to deal in the Software without restriction, including without limitation
phonemacro 0:9e5a4f845510 7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
phonemacro 0:9e5a4f845510 8 * and/or sell copies of the Software, and to permit persons to whom the
phonemacro 0:9e5a4f845510 9 * Software is furnished to do so, subject to the following conditions:
phonemacro 0:9e5a4f845510 10 *
phonemacro 0:9e5a4f845510 11 * The above copyright notice and this permission notice shall be included
phonemacro 0:9e5a4f845510 12 * in all copies or substantial portions of the Software.
phonemacro 0:9e5a4f845510 13 *
phonemacro 0:9e5a4f845510 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
phonemacro 0:9e5a4f845510 15 * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
phonemacro 0:9e5a4f845510 16 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
phonemacro 0:9e5a4f845510 17 * IN NO EVENT SHALL MAXIM INTEGRATED BE LIABLE FOR ANY CLAIM, DAMAGES
phonemacro 0:9e5a4f845510 18 * OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
phonemacro 0:9e5a4f845510 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
phonemacro 0:9e5a4f845510 20 * OTHER DEALINGS IN THE SOFTWARE.
phonemacro 0:9e5a4f845510 21 *
phonemacro 0:9e5a4f845510 22 * Except as contained in this notice, the name of Maxim Integrated
phonemacro 0:9e5a4f845510 23 * Products, Inc. shall not be used except as stated in the Maxim Integrated
phonemacro 0:9e5a4f845510 24 * Products, Inc. Branding Policy.
phonemacro 0:9e5a4f845510 25 *
phonemacro 0:9e5a4f845510 26 * The mere transfer of this software does not imply any licenses
phonemacro 0:9e5a4f845510 27 * of trade secrets, proprietary technology, copyrights, patents,
phonemacro 0:9e5a4f845510 28 * trademarks, maskwork rights, or any other form of intellectual
phonemacro 0:9e5a4f845510 29 * property whatsoever. Maxim Integrated Products, Inc. retains all
phonemacro 0:9e5a4f845510 30 * ownership rights.
phonemacro 0:9e5a4f845510 31 **********************************************************************/
phonemacro 0:9e5a4f845510 32
phonemacro 0:9e5a4f845510 33
phonemacro 0:9e5a4f845510 34 #include "mbed.h"
phonemacro 0:9e5a4f845510 35 //#include "max32630fthr.h"
phonemacro 0:9e5a4f845510 36 #include "max32630hsp.h"
phonemacro 0:9e5a4f845510 37 #include "MAX8614X.h"
phonemacro 0:9e5a4f845510 38 #include "USBSerial.h"
phonemacro 16:d0f8cf9f160d 39 void executeSha256(MAX8614X &m, uint8_t *challenge, unsigned int challengeLen, bool romID, uint32_t *response);
phonemacro 16:d0f8cf9f160d 40 bool isTheChipAuthenicated(uint32_t *expectedResponse, uint32_t *chipResponse);
phonemacro 7:5b7f7ec9efe0 41
phonemacro 16:d0f8cf9f160d 42 #define RESPONSE_LEN32 8
phonemacro 0:9e5a4f845510 43
phonemacro 0:9e5a4f845510 44 MAX32630HSP icarus(MAX32630HSP::VIO_1V8);
phonemacro 0:9e5a4f845510 45 // MAX32630FTHR mbed_board(MAX32630FTHR::VIO_1V8);
phonemacro 0:9e5a4f845510 46 SPI spi(P5_1, P5_2, P5_0); /* mosi, miso, sclk */
phonemacro 3:2272f89aad7e 47 //DigitalOut cs(P3_0);
phonemacro 3:2272f89aad7e 48 DigitalOut cs(P5_3);
phonemacro 18:a0356b3e6ed9 49 PinName interrupt_pin = P3_2;
phonemacro 0:9e5a4f845510 50 // Virtual serial port over USB
phonemacro 0:9e5a4f845510 51 USBSerial microUSB;
phonemacro 0:9e5a4f845510 52
phonemacro 0:9e5a4f845510 53 DigitalOut rLED(LED1);
phonemacro 0:9e5a4f845510 54 DigitalOut gLED(LED2);
phonemacro 0:9e5a4f845510 55 DigitalOut bLED(LED3);
phonemacro 0:9e5a4f845510 56 int main()
phonemacro 0:9e5a4f845510 57 {
phonemacro 7:5b7f7ec9efe0 58 #define CHALLENGE_SZ_NO_SECRET 20
phonemacro 15:2616528b4007 59 uint8_t challenge_A[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 15:2616528b4007 60 0x00, 0x00, 0x00, 0x01,
phonemacro 15:2616528b4007 61 0x00, 0x00, 0x00, 0x00,
phonemacro 15:2616528b4007 62 0x00, 0x00, 0x00, 0x00,
phonemacro 15:2616528b4007 63 0x00, 0x00, 0x00, 0x00,
phonemacro 15:2616528b4007 64 0x00, 0x00, 0x00, 0x00
phonemacro 15:2616528b4007 65 };
phonemacro 20:39857996a7c7 66 uint32_t expectedResponse_A_romID[RESPONSE_LEN32] = { // 160 bit, no ROM
phonemacro 20:39857996a7c7 67 0xf987d79a,
phonemacro 20:39857996a7c7 68 0xeb778ec7,
phonemacro 20:39857996a7c7 69 0x33861bc8,
phonemacro 20:39857996a7c7 70 0x745d4082,
phonemacro 20:39857996a7c7 71 0x921e02fe,
phonemacro 20:39857996a7c7 72 0x727d93c8,
phonemacro 20:39857996a7c7 73 0x218e53ee,
phonemacro 20:39857996a7c7 74 0x904e0c6b
phonemacro 20:39857996a7c7 75 };
phonemacro 10:0b940aff3bb8 76 uint8_t challenge_1[CHALLENGE_SZ_NO_SECRET] = { // 160 bit
phonemacro 10:0b940aff3bb8 77 0x5e, 0x81, 0x35, 0x24,
phonemacro 10:0b940aff3bb8 78 0x56, 0x63, 0xd6, 0x09,
phonemacro 10:0b940aff3bb8 79 0x99, 0x8d, 0x7b, 0x0d,
phonemacro 10:0b940aff3bb8 80 0x52, 0x12, 0x84, 0x65,
phonemacro 10:0b940aff3bb8 81 0xcd, 0x0d, 0xe3, 0x01
phonemacro 4:46919eec2c28 82 };
phonemacro 20:39857996a7c7 83 uint32_t expectedResponse_1_romID[RESPONSE_LEN32] = { // 160 bit
phonemacro 20:39857996a7c7 84 0xfe3f805f,
phonemacro 20:39857996a7c7 85 0x0af066bc,
phonemacro 20:39857996a7c7 86 0xda0f55e2,
phonemacro 20:39857996a7c7 87 0x0020ac16,
phonemacro 20:39857996a7c7 88 0x13fa3406,
phonemacro 20:39857996a7c7 89 0x59d0e5ae,
phonemacro 20:39857996a7c7 90 0x79def309,
phonemacro 20:39857996a7c7 91 0x685981a3
phonemacro 20:39857996a7c7 92 };
phonemacro 4:46919eec2c28 93
phonemacro 14:1939758a03cf 94 uint8_t challenge_2[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 13:97854f761347 95 0xd2, 0xaa, 0x84, 0xc5,
phonemacro 13:97854f761347 96 0x72, 0x77, 0xf7, 0xe5,
phonemacro 13:97854f761347 97 0xdb, 0x8f, 0xd6, 0x12,
phonemacro 13:97854f761347 98 0x96, 0xce, 0x69, 0xf2,
phonemacro 13:97854f761347 99 0x4e, 0xc5, 0x7a, 0xe8
phonemacro 13:97854f761347 100 };
phonemacro 14:1939758a03cf 101
phonemacro 17:e260080d3468 102 uint32_t expectedResponse_2_noRomID[RESPONSE_LEN32] = { // 160 bit, no ROM
phonemacro 17:e260080d3468 103 0x1a7135a2,
phonemacro 17:e260080d3468 104 0x51b99ca8,
phonemacro 17:e260080d3468 105 0xbdd9245e,
phonemacro 17:e260080d3468 106 0xb9c8e758,
phonemacro 17:e260080d3468 107 0x770ec1c4,
phonemacro 17:e260080d3468 108 0x474ffcc7,
phonemacro 17:e260080d3468 109 0x828afe4d,
phonemacro 17:e260080d3468 110 0x9cb3de6d
phonemacro 17:e260080d3468 111 };
phonemacro 20:39857996a7c7 112 uint8_t challenge_3[CHALLENGE_SZ_NO_SECRET] = { // 160 bit
phonemacro 20:39857996a7c7 113 0x21, 0x20, 0x22, 0x80,
phonemacro 20:39857996a7c7 114 0xcc, 0x9d, 0x45, 0xaa,
phonemacro 20:39857996a7c7 115 0xb8, 0x13, 0x3e, 0x96,
phonemacro 20:39857996a7c7 116 0xd6, 0x53, 0x38, 0x0d,
phonemacro 20:39857996a7c7 117 0x2a, 0xd5, 0xdd, 0x6b
phonemacro 20:39857996a7c7 118 };
phonemacro 20:39857996a7c7 119 uint32_t expectedResponse_3_romID[RESPONSE_LEN32] = { // 160 bit
phonemacro 20:39857996a7c7 120 0xe7750b8d,
phonemacro 20:39857996a7c7 121 0xe29d9279,
phonemacro 20:39857996a7c7 122 0x7cdc7053,
phonemacro 20:39857996a7c7 123 0xa9f92519,
phonemacro 20:39857996a7c7 124 0xa1e59d93,
phonemacro 20:39857996a7c7 125 0x19cd930d,
phonemacro 20:39857996a7c7 126 0xfb0fc974,
phonemacro 20:39857996a7c7 127 0x2da0781e
phonemacro 20:39857996a7c7 128 };
phonemacro 20:39857996a7c7 129 uint8_t challenge_4[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 20:39857996a7c7 130 0x4c, 0x3c, 0x0a, 0xca,
phonemacro 20:39857996a7c7 131 0x61, 0x8a, 0xbd, 0xf2,
phonemacro 20:39857996a7c7 132 0x34, 0xd8, 0xb3, 0x41,
phonemacro 20:39857996a7c7 133 0x12, 0x89, 0xf3, 0x78,
phonemacro 20:39857996a7c7 134 0x65, 0xb6, 0x0d, 0xeb
phonemacro 20:39857996a7c7 135 };
phonemacro 20:39857996a7c7 136 uint32_t expectedResponse_4_noRomID[RESPONSE_LEN32] = { // 160 bit, no ROM
phonemacro 20:39857996a7c7 137 0xae740f91,
phonemacro 20:39857996a7c7 138 0x8d6f2d58,
phonemacro 20:39857996a7c7 139 0x7486b0ba,
phonemacro 20:39857996a7c7 140 0xe9a84580,
phonemacro 20:39857996a7c7 141 0xfe9ce593,
phonemacro 20:39857996a7c7 142 0x58d66c7d,
phonemacro 20:39857996a7c7 143 0xc993d165,
phonemacro 20:39857996a7c7 144 0xe5ae5983
phonemacro 20:39857996a7c7 145 };
phonemacro 16:d0f8cf9f160d 146 uint32_t chip_response[RESPONSE_LEN32];
phonemacro 16:d0f8cf9f160d 147 bool valid = 0;
phonemacro 16:d0f8cf9f160d 148
phonemacro 5:df9f75bee8ac 149 #define MAC_SZ 32
phonemacro 7:5b7f7ec9efe0 150
phonemacro 0:9e5a4f845510 151
phonemacro 0:9e5a4f845510 152 // daplink.printf("daplink serial port\r\n");
phonemacro 0:9e5a4f845510 153 // microUSB.printf("micro USB serial port\r\n");
phonemacro 0:9e5a4f845510 154 rLED = LED_ON;
phonemacro 0:9e5a4f845510 155 gLED = LED_ON;
phonemacro 0:9e5a4f845510 156 bLED = LED_OFF;
phonemacro 0:9e5a4f845510 157
phonemacro 0:9e5a4f845510 158 rLED = LED_OFF;
phonemacro 1:854f8a89a527 159 printf("\r\n\rmax86140 authenication software\r\n");
phonemacro 11:ec7998257ec2 160 MAX8614X m(spi,cs,interrupt_pin);
phonemacro 18:a0356b3e6ed9 161 m.init();
phonemacro 11:ec7998257ec2 162 // MAX8614X m(spi,cs,interrupt_pin);
phonemacro 7:5b7f7ec9efe0 163 // m.readRegister(MAX8614X::MAX8614X_PART_ID_REG, data, 1);
phonemacro 7:5b7f7ec9efe0 164 // printf("device id should be 0x24, reg %02X = %02X\r\n", MAX8614X::MAX8614X_PART_ID_REG, data[0]);
phonemacro 3:2272f89aad7e 165
phonemacro 17:e260080d3468 166 //● Compare MAC from MAX86140 wth Host's precalculated MAC.
phonemacro 20:39857996a7c7 167 executeSha256(m, challenge_A, CHALLENGE_SZ_NO_SECRET, 1, chip_response);
phonemacro 20:39857996a7c7 168 //● Check PASS or FAIL.
phonemacro 20:39857996a7c7 169 valid = isTheChipAuthenicated(chip_response, expectedResponse_A_romID);
phonemacro 20:39857996a7c7 170 if (valid)
phonemacro 20:39857996a7c7 171 printf("\r\n Challenge A passed\r\n\r\n");
phonemacro 20:39857996a7c7 172 else
phonemacro 20:39857996a7c7 173 printf("\r\n Challenge A failed\r\n\r\n");
phonemacro 17:e260080d3468 174
phonemacro 20:39857996a7c7 175 //● Compare MAC from MAX86140 wth Host's precalculated MAC.
phonemacro 16:d0f8cf9f160d 176 executeSha256(m, challenge_1, CHALLENGE_SZ_NO_SECRET, 1, chip_response);
phonemacro 17:e260080d3468 177 //● Check PASS or FAIL.
phonemacro 16:d0f8cf9f160d 178 valid = isTheChipAuthenicated(chip_response, expectedResponse_1_romID);
phonemacro 16:d0f8cf9f160d 179 if (valid)
phonemacro 16:d0f8cf9f160d 180 printf("\r\n Challenge 1 passed\r\n\r\n");
phonemacro 16:d0f8cf9f160d 181 else
phonemacro 16:d0f8cf9f160d 182 printf("\r\n Challenge 1 failed\r\n\r\n");
phonemacro 17:e260080d3468 183
phonemacro 17:e260080d3468 184 executeSha256(m, challenge_2, CHALLENGE_SZ_NO_SECRET, 0, chip_response);
phonemacro 17:e260080d3468 185 valid = isTheChipAuthenicated(chip_response, expectedResponse_2_noRomID);
phonemacro 17:e260080d3468 186 if (valid)
phonemacro 17:e260080d3468 187 printf("\r\n Challenge 2 passed\r\n\r\n");
phonemacro 17:e260080d3468 188 else
phonemacro 17:e260080d3468 189 printf("\r\n Challenge 2 failed\r\n\r\n");
phonemacro 20:39857996a7c7 190
phonemacro 20:39857996a7c7 191 executeSha256(m, challenge_3, CHALLENGE_SZ_NO_SECRET, 1, chip_response);
phonemacro 20:39857996a7c7 192 valid = isTheChipAuthenicated(chip_response, expectedResponse_3_romID);
phonemacro 20:39857996a7c7 193 if (valid)
phonemacro 20:39857996a7c7 194 printf("\r\n Challenge 3 passed\r\n\r\n");
phonemacro 20:39857996a7c7 195 else
phonemacro 20:39857996a7c7 196 printf("\r\n Challenge 3 failed\r\n\r\n");
phonemacro 20:39857996a7c7 197
phonemacro 20:39857996a7c7 198 executeSha256(m, challenge_4, CHALLENGE_SZ_NO_SECRET, 0, chip_response);
phonemacro 20:39857996a7c7 199 valid = isTheChipAuthenicated(chip_response, expectedResponse_4_noRomID);
phonemacro 20:39857996a7c7 200 if (valid)
phonemacro 20:39857996a7c7 201 printf("\r\n Challenge 4 passed\r\n\r\n");
phonemacro 20:39857996a7c7 202 else
phonemacro 20:39857996a7c7 203 printf("\r\n Challenge 4 failed\r\n\r\n");
phonemacro 20:39857996a7c7 204
phonemacro 17:e260080d3468 205 //● Disable SHA_EN bit ( Write 0 to SHA_EN bit).
phonemacro 18:a0356b3e6ed9 206 m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG, 0);
phonemacro 0:9e5a4f845510 207 while(1) {
phonemacro 1:854f8a89a527 208 gLED = !gLED;
phonemacro 0:9e5a4f845510 209 wait(1.0);
phonemacro 0:9e5a4f845510 210 }
phonemacro 0:9e5a4f845510 211 }
phonemacro 0:9e5a4f845510 212
phonemacro 16:d0f8cf9f160d 213 bool isTheChipAuthenicated(uint32_t *expectedResponse, uint32_t * chipResponse)
phonemacro 16:d0f8cf9f160d 214 {
phonemacro 16:d0f8cf9f160d 215 int i;
phonemacro 16:d0f8cf9f160d 216 for (i = 0; i < RESPONSE_LEN32; i++) {
phonemacro 16:d0f8cf9f160d 217 if (expectedResponse[i] != chipResponse[i])
phonemacro 16:d0f8cf9f160d 218 return 0;
phonemacro 16:d0f8cf9f160d 219 }
phonemacro 16:d0f8cf9f160d 220 return 1;
phonemacro 16:d0f8cf9f160d 221 }
phonemacro 16:d0f8cf9f160d 222
phonemacro 10:0b940aff3bb8 223 #if 0
phonemacro 7:5b7f7ec9efe0 224 void transformData(uint8_t *inData, uint8_t *outData, unsigned int challengeLen)
phonemacro 7:5b7f7ec9efe0 225 {
phonemacro 7:5b7f7ec9efe0 226 int i, j, k;
phonemacro 7:5b7f7ec9efe0 227 k = 0;
phonemacro 7:5b7f7ec9efe0 228 for (i = 0; i < (challengeLen/4); i++) {
phonemacro 7:5b7f7ec9efe0 229 for (j = 3; j >= 0; j--) {
phonemacro 7:5b7f7ec9efe0 230 outData[j+(i*4)] = inData[k];
phonemacro 7:5b7f7ec9efe0 231 k++;
phonemacro 7:5b7f7ec9efe0 232 }
phonemacro 7:5b7f7ec9efe0 233 }
phonemacro 7:5b7f7ec9efe0 234 }
phonemacro 10:0b940aff3bb8 235 #endif
phonemacro 10:0b940aff3bb8 236 void transformData(uint8_t *inData, uint8_t *outData, unsigned int challengeLen)
phonemacro 10:0b940aff3bb8 237 {
phonemacro 10:0b940aff3bb8 238 int i, j, k;
phonemacro 10:0b940aff3bb8 239 k = 0;
phonemacro 10:0b940aff3bb8 240 for (i = 0; i < (challengeLen/4); i++) {
phonemacro 10:0b940aff3bb8 241 for (j = 3; j >= 0; j--) {
phonemacro 10:0b940aff3bb8 242 outData[j+(i*4)] = inData[k];
phonemacro 10:0b940aff3bb8 243 // printf("%02X ",inData[k]);
phonemacro 10:0b940aff3bb8 244 k++;
phonemacro 10:0b940aff3bb8 245 }
phonemacro 10:0b940aff3bb8 246 // printf("\r\n");
phonemacro 10:0b940aff3bb8 247 }
phonemacro 10:0b940aff3bb8 248 for (i=0; i < challengeLen; i++) {
phonemacro 10:0b940aff3bb8 249 // if (!(i % 4))
phonemacro 10:0b940aff3bb8 250 // printf("\r\n ");
phonemacro 10:0b940aff3bb8 251 // printf("%02X ",outData[i]);
phonemacro 10:0b940aff3bb8 252 }
phonemacro 10:0b940aff3bb8 253 }
phonemacro 7:5b7f7ec9efe0 254
phonemacro 7:5b7f7ec9efe0 255
phonemacro 16:d0f8cf9f160d 256 void executeSha256(MAX8614X &m, uint8_t *challenge, unsigned int challengeLen, bool romID, uint32_t *response)
phonemacro 7:5b7f7ec9efe0 257 {
phonemacro 10:0b940aff3bb8 258 int i, j, k;
phonemacro 7:5b7f7ec9efe0 259 uint8_t macData[256];
phonemacro 10:0b940aff3bb8 260 uint8_t inData[256];
phonemacro 7:5b7f7ec9efe0 261 uint8_t xData[256];
phonemacro 10:0b940aff3bb8 262 uint32_t x32Data[64];
phonemacro 7:5b7f7ec9efe0 263 uint32_t tmpData;
phonemacro 10:0b940aff3bb8 264 const unsigned int responseLen32 = 8;
phonemacro 7:5b7f7ec9efe0 265 uint8_t data[5];
phonemacro 11:ec7998257ec2 266
phonemacro 18:a0356b3e6ed9 267 //● Enable SHA_DONE Interrupt
phonemacro 7:5b7f7ec9efe0 268 m.writeRegister(MAX8614X::MAX8614X_INT_ENABLE2_REG, MAX8614X::MAX8614X_IE_SHA_DONE_EN);
phonemacro 7:5b7f7ec9efe0 269
phonemacro 7:5b7f7ec9efe0 270 m.writeRegister(MAX8614X::MAX8614X_INT_ENABLE1_REG, 0); // Disable all other interrupts
phonemacro 7:5b7f7ec9efe0 271
phonemacro 13:97854f761347 272 //- Enable SHA_EN bit.
phonemacro 7:5b7f7ec9efe0 273 m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG,MAX8614X::MAX8614X_SHACFG_SHA_EN);
phonemacro 7:5b7f7ec9efe0 274
phonemacro 18:a0356b3e6ed9 275 //● Write 160-bit random challenge value to RAM using registers MEM_IDX and MEM_DATA.
phonemacro 7:5b7f7ec9efe0 276 // Enable Memory Write, Select Bank 0, address 0x00 to 0xFF
phonemacro 7:5b7f7ec9efe0 277 m.writeRegister(MAX8614X::MAX8614X_MEMORY_CONTROL_REG, MAX8614X::MAX8614X_MEMCNTRL_WR_EN_MASK | MAX8614X::MAX8614X_MEMCNTRL_BANK0_MASK);
phonemacro 7:5b7f7ec9efe0 278
phonemacro 7:5b7f7ec9efe0 279 printf("\r\n Raw Input Data\r\n\r\n");
phonemacro 7:5b7f7ec9efe0 280 for (i = 0; i < challengeLen; i++) {
phonemacro 10:0b940aff3bb8 281 if (!(i % 4))
phonemacro 10:0b940aff3bb8 282 printf("\r\n ");
phonemacro 10:0b940aff3bb8 283 printf("%02x", challenge[i]);
phonemacro 7:5b7f7ec9efe0 284 }
phonemacro 7:5b7f7ec9efe0 285 printf("\r\n");
phonemacro 10:0b940aff3bb8 286 #if 0
phonemacro 7:5b7f7ec9efe0 287 k = 0;
phonemacro 10:0b940aff3bb8 288 for (i = 0; i < (challengeLen/4); i++) {
phonemacro 10:0b940aff3bb8 289 for (j = 3; j >= 0; j--) {
phonemacro 10:0b940aff3bb8 290
phonemacro 10:0b940aff3bb8 291 inData[j+(i*4)] = challenge[k];
phonemacro 10:0b940aff3bb8 292 k++;
phonemacro 7:5b7f7ec9efe0 293 }
phonemacro 10:0b940aff3bb8 294 }
phonemacro 10:0b940aff3bb8 295 #endif
phonemacro 10:0b940aff3bb8 296
phonemacro 10:0b940aff3bb8 297 transformData(challenge, xData, challengeLen);
phonemacro 7:5b7f7ec9efe0 298
phonemacro 7:5b7f7ec9efe0 299 printf("\r\n Transformed Input Data\r\n\r\n");
phonemacro 10:0b940aff3bb8 300 for (i = 0; i < challengeLen; i++) {
phonemacro 7:5b7f7ec9efe0 301 if (!(i % 4))
phonemacro 7:5b7f7ec9efe0 302 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 303 printf("%02x", xData[i]);
phonemacro 7:5b7f7ec9efe0 304 }
phonemacro 7:5b7f7ec9efe0 305 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 306 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 307
phonemacro 10:0b940aff3bb8 308 for (i = 0; i < (challengeLen); i++) {
phonemacro 7:5b7f7ec9efe0 309 m.writeRegister(MAX8614X::MAX8614X_MEMORY_INDEX_REG, i);
phonemacro 7:5b7f7ec9efe0 310 m.writeRegister(MAX8614X::MAX8614X_MEMORY_DATA_REG, xData[i]);
phonemacro 10:0b940aff3bb8 311 //}
phonemacro 10:0b940aff3bb8 312 }
phonemacro 7:5b7f7ec9efe0 313 printf("%\r\n");
phonemacro 7:5b7f7ec9efe0 314 // The message block consists of a 160-bit secret, a 160-bit challenge and 192 bits of constant data. Optionally, the 64-bit
phonemacro 7:5b7f7ec9efe0 315 // ROM ID replaces 64 of the 192 bits of constant data used in the hash operation. 16 bits out of the 160-bit secret and 16
phonemacro 7:5b7f7ec9efe0 316 // bits of ROM ID are programmable–8 bits each in metal and 8 bits each in OTP bits
phonemacro 13:97854f761347 317 //- Write command, with ROM ID (0x35) or without ROM ID (0x36), to SHA_CMD register
phonemacro 12:fc888315e5fd 318 if (romID) {
phonemacro 12:fc888315e5fd 319 printf("ROMID \r\n");
phonemacro 13:97854f761347 320 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG, MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID);
phonemacro 12:fc888315e5fd 321 m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG, MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID);
phonemacro 17:e260080d3468 322 // wait(1);
phonemacro 12:fc888315e5fd 323 }
phonemacro 12:fc888315e5fd 324 else
phonemacro 12:fc888315e5fd 325 {
phonemacro 12:fc888315e5fd 326 printf("no ROMID \r\n");
phonemacro 13:97854f761347 327 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID);
phonemacro 12:fc888315e5fd 328 m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID);
phonemacro 17:e260080d3468 329 // wait(1);
phonemacro 12:fc888315e5fd 330 }
phonemacro 12:fc888315e5fd 331
phonemacro 12:fc888315e5fd 332
phonemacro 12:fc888315e5fd 333 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID);
phonemacro 7:5b7f7ec9efe0 334 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID);
phonemacro 7:5b7f7ec9efe0 335
phonemacro 7:5b7f7ec9efe0 336
phonemacro 10:0b940aff3bb8 337 m.readRegister(MAX8614X::MAX8614X_SHA_CMD_REG, data, 1);
phonemacro 14:1939758a03cf 338 /// printf("sha cmd reg should be 0x35 mac rom id, reg %02X = %02X\r\n", MAX8614X::MAX8614X_SHA_CMD_REG, data[0]);
phonemacro 10:0b940aff3bb8 339 m.readRegister(MAX8614X::MAX8614X_INT_STATUS2_REG, data, 1);
phonemacro 14:1939758a03cf 340 /// printf("int status2, reg %02X = %X\r\n", MAX8614X::MAX8614X_INT_STATUS2_REG, data[0]);
phonemacro 7:5b7f7ec9efe0 341 //● Write 1 to SHA_START and 1 to SHA_EN bit.
phonemacro 7:5b7f7ec9efe0 342 m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG,MAX8614X::MAX8614X_SHACFG_SHA_EN | MAX8614X::MAX8614X_SHACFG_SHA_START);
phonemacro 10:0b940aff3bb8 343 m.readRegister(MAX8614X::MAX8614X_SHA_CFG_REG, data, 1);
phonemacro 14:1939758a03cf 344 /// printf("sha CFG reg should be 0x3, reg %02X = %02X\r\n", MAX8614X::MAX8614X_SHA_CFG_REG, data[0]);
phonemacro 7:5b7f7ec9efe0 345
phonemacro 18:a0356b3e6ed9 346 //● Wait for SHA_DONE.
phonemacro 7:5b7f7ec9efe0 347 data[0] = 0;
phonemacro 17:e260080d3468 348 k = 0;
phonemacro 17:e260080d3468 349 while(!data[0] && k < 100) {
phonemacro 7:5b7f7ec9efe0 350 m.readRegister(MAX8614X::MAX8614X_INT_STATUS2_REG, data, 1);
phonemacro 17:e260080d3468 351 k++;
phonemacro 7:5b7f7ec9efe0 352 }
phonemacro 7:5b7f7ec9efe0 353 // ● Read 256 MAC value from RAM using registers MEM_IDX and MEM_DATA.
phonemacro 10:0b940aff3bb8 354 printf("\r\n Raw Output\r\n\r\n");
phonemacro 7:5b7f7ec9efe0 355 for (i = 64; i < 64+32; i++) {
phonemacro 7:5b7f7ec9efe0 356 if (!(i % 4))
phonemacro 7:5b7f7ec9efe0 357 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 358 m.writeRegister(MAX8614X::MAX8614X_MEMORY_INDEX_REG, i);
phonemacro 7:5b7f7ec9efe0 359 m.readRegister(MAX8614X::MAX8614X_MEMORY_DATA_REG, data, 1);
phonemacro 10:0b940aff3bb8 360 xData[i-64] = data[0];
phonemacro 7:5b7f7ec9efe0 361 printf("%02x", data[0]);
phonemacro 7:5b7f7ec9efe0 362 }
phonemacro 10:0b940aff3bb8 363 printf("%\r\n");
phonemacro 10:0b940aff3bb8 364
phonemacro 10:0b940aff3bb8 365 transformData(xData,macData, 32);
phonemacro 10:0b940aff3bb8 366 #if 0
phonemacro 10:0b940aff3bb8 367 printf("\r\n Formatted Response\r\n\r\n");
phonemacro 10:0b940aff3bb8 368 for (i = 0; i < 32; i++) {
phonemacro 10:0b940aff3bb8 369 if (!(i % 4))
phonemacro 10:0b940aff3bb8 370 printf("\r\n ");
phonemacro 10:0b940aff3bb8 371 printf("%02x", macData[i]);
phonemacro 10:0b940aff3bb8 372 }
phonemacro 10:0b940aff3bb8 373 printf("\r\n\r\n");
phonemacro 10:0b940aff3bb8 374
phonemacro 10:0b940aff3bb8 375 #endif
phonemacro 10:0b940aff3bb8 376 // transform data to Little-Endian
phonemacro 10:0b940aff3bb8 377 k = 0;
phonemacro 10:0b940aff3bb8 378 for (i = 0; i < (responseLen32); i++) {
phonemacro 10:0b940aff3bb8 379 tmpData = challenge[i];
phonemacro 10:0b940aff3bb8 380 x32Data[i] = 0;
phonemacro 10:0b940aff3bb8 381 for (j = 3; j >= 0; j--) {
phonemacro 10:0b940aff3bb8 382 x32Data[i] = x32Data[i] << 8;
phonemacro 10:0b940aff3bb8 383 x32Data[i] |= macData[k] & 0xFF;
phonemacro 10:0b940aff3bb8 384 k++;
phonemacro 10:0b940aff3bb8 385 }
phonemacro 10:0b940aff3bb8 386
phonemacro 10:0b940aff3bb8 387 }
phonemacro 10:0b940aff3bb8 388
phonemacro 10:0b940aff3bb8 389 printf("\r\n Formatted Response\r\n\r\n");
phonemacro 10:0b940aff3bb8 390 for (i = 0; i < responseLen32; i++) {
phonemacro 10:0b940aff3bb8 391 printf(" %08X \r\n",x32Data[i]);
phonemacro 16:d0f8cf9f160d 392 response[i] = x32Data[i];
phonemacro 10:0b940aff3bb8 393 }
phonemacro 10:0b940aff3bb8 394
phonemacro 10:0b940aff3bb8 395
phonemacro 7:5b7f7ec9efe0 396 }