intiial commit
Dependencies: MAX8614X USBDevice max32630hsp_test
main.cpp@18:a0356b3e6ed9, 2018-08-16 (annotated)
- Committer:
- phonemacro
- Date:
- Thu Aug 16 22:44:42 2018 +0000
- Revision:
- 18:a0356b3e6ed9
- Parent:
- 17:e260080d3468
- Child:
- 20:39857996a7c7
minor changes;
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
phonemacro | 0:9e5a4f845510 | 1 | /********************************************************************** |
phonemacro | 1:854f8a89a527 | 2 | * Copyright (C) 2018 Maxim Integrated Products, Inc., All Rights Reserved. |
phonemacro | 0:9e5a4f845510 | 3 | * |
phonemacro | 0:9e5a4f845510 | 4 | * Permission is hereby granted, free of charge, to any person obtaining a |
phonemacro | 0:9e5a4f845510 | 5 | * copy of this software and associated documentation files (the "Software"), |
phonemacro | 0:9e5a4f845510 | 6 | * to deal in the Software without restriction, including without limitation |
phonemacro | 0:9e5a4f845510 | 7 | * the rights to use, copy, modify, merge, publish, distribute, sublicense, |
phonemacro | 0:9e5a4f845510 | 8 | * and/or sell copies of the Software, and to permit persons to whom the |
phonemacro | 0:9e5a4f845510 | 9 | * Software is furnished to do so, subject to the following conditions: |
phonemacro | 0:9e5a4f845510 | 10 | * |
phonemacro | 0:9e5a4f845510 | 11 | * The above copyright notice and this permission notice shall be included |
phonemacro | 0:9e5a4f845510 | 12 | * in all copies or substantial portions of the Software. |
phonemacro | 0:9e5a4f845510 | 13 | * |
phonemacro | 0:9e5a4f845510 | 14 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
phonemacro | 0:9e5a4f845510 | 15 | * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
phonemacro | 0:9e5a4f845510 | 16 | * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. |
phonemacro | 0:9e5a4f845510 | 17 | * IN NO EVENT SHALL MAXIM INTEGRATED BE LIABLE FOR ANY CLAIM, DAMAGES |
phonemacro | 0:9e5a4f845510 | 18 | * OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, |
phonemacro | 0:9e5a4f845510 | 19 | * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR |
phonemacro | 0:9e5a4f845510 | 20 | * OTHER DEALINGS IN THE SOFTWARE. |
phonemacro | 0:9e5a4f845510 | 21 | * |
phonemacro | 0:9e5a4f845510 | 22 | * Except as contained in this notice, the name of Maxim Integrated |
phonemacro | 0:9e5a4f845510 | 23 | * Products, Inc. shall not be used except as stated in the Maxim Integrated |
phonemacro | 0:9e5a4f845510 | 24 | * Products, Inc. Branding Policy. |
phonemacro | 0:9e5a4f845510 | 25 | * |
phonemacro | 0:9e5a4f845510 | 26 | * The mere transfer of this software does not imply any licenses |
phonemacro | 0:9e5a4f845510 | 27 | * of trade secrets, proprietary technology, copyrights, patents, |
phonemacro | 0:9e5a4f845510 | 28 | * trademarks, maskwork rights, or any other form of intellectual |
phonemacro | 0:9e5a4f845510 | 29 | * property whatsoever. Maxim Integrated Products, Inc. retains all |
phonemacro | 0:9e5a4f845510 | 30 | * ownership rights. |
phonemacro | 0:9e5a4f845510 | 31 | **********************************************************************/ |
phonemacro | 0:9e5a4f845510 | 32 | |
phonemacro | 0:9e5a4f845510 | 33 | |
phonemacro | 0:9e5a4f845510 | 34 | #include "mbed.h" |
phonemacro | 0:9e5a4f845510 | 35 | //#include "max32630fthr.h" |
phonemacro | 0:9e5a4f845510 | 36 | #include "max32630hsp.h" |
phonemacro | 0:9e5a4f845510 | 37 | #include "MAX8614X.h" |
phonemacro | 0:9e5a4f845510 | 38 | #include "USBSerial.h" |
phonemacro | 16:d0f8cf9f160d | 39 | void executeSha256(MAX8614X &m, uint8_t *challenge, unsigned int challengeLen, bool romID, uint32_t *response); |
phonemacro | 16:d0f8cf9f160d | 40 | bool isTheChipAuthenicated(uint32_t *expectedResponse, uint32_t *chipResponse); |
phonemacro | 7:5b7f7ec9efe0 | 41 | |
phonemacro | 16:d0f8cf9f160d | 42 | #define RESPONSE_LEN32 8 |
phonemacro | 0:9e5a4f845510 | 43 | |
phonemacro | 0:9e5a4f845510 | 44 | MAX32630HSP icarus(MAX32630HSP::VIO_1V8); |
phonemacro | 0:9e5a4f845510 | 45 | // MAX32630FTHR mbed_board(MAX32630FTHR::VIO_1V8); |
phonemacro | 0:9e5a4f845510 | 46 | SPI spi(P5_1, P5_2, P5_0); /* mosi, miso, sclk */ |
phonemacro | 3:2272f89aad7e | 47 | //DigitalOut cs(P3_0); |
phonemacro | 3:2272f89aad7e | 48 | DigitalOut cs(P5_3); |
phonemacro | 18:a0356b3e6ed9 | 49 | PinName interrupt_pin = P3_2; |
phonemacro | 0:9e5a4f845510 | 50 | // Virtual serial port over USB |
phonemacro | 0:9e5a4f845510 | 51 | USBSerial microUSB; |
phonemacro | 0:9e5a4f845510 | 52 | |
phonemacro | 0:9e5a4f845510 | 53 | DigitalOut rLED(LED1); |
phonemacro | 0:9e5a4f845510 | 54 | DigitalOut gLED(LED2); |
phonemacro | 0:9e5a4f845510 | 55 | DigitalOut bLED(LED3); |
phonemacro | 0:9e5a4f845510 | 56 | int main() |
phonemacro | 0:9e5a4f845510 | 57 | { |
phonemacro | 7:5b7f7ec9efe0 | 58 | #define CHALLENGE_SZ_NO_SECRET 20 |
phonemacro | 15:2616528b4007 | 59 | uint8_t challenge_A[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM |
phonemacro | 15:2616528b4007 | 60 | 0x00, 0x00, 0x00, 0x01, |
phonemacro | 15:2616528b4007 | 61 | 0x00, 0x00, 0x00, 0x00, |
phonemacro | 15:2616528b4007 | 62 | 0x00, 0x00, 0x00, 0x00, |
phonemacro | 15:2616528b4007 | 63 | 0x00, 0x00, 0x00, 0x00, |
phonemacro | 15:2616528b4007 | 64 | 0x00, 0x00, 0x00, 0x00 |
phonemacro | 15:2616528b4007 | 65 | }; |
phonemacro | 10:0b940aff3bb8 | 66 | uint8_t challenge_1[CHALLENGE_SZ_NO_SECRET] = { // 160 bit |
phonemacro | 10:0b940aff3bb8 | 67 | 0x5e, 0x81, 0x35, 0x24, |
phonemacro | 10:0b940aff3bb8 | 68 | 0x56, 0x63, 0xd6, 0x09, |
phonemacro | 10:0b940aff3bb8 | 69 | 0x99, 0x8d, 0x7b, 0x0d, |
phonemacro | 10:0b940aff3bb8 | 70 | 0x52, 0x12, 0x84, 0x65, |
phonemacro | 10:0b940aff3bb8 | 71 | 0xcd, 0x0d, 0xe3, 0x01 |
phonemacro | 4:46919eec2c28 | 72 | }; |
phonemacro | 4:46919eec2c28 | 73 | |
phonemacro | 14:1939758a03cf | 74 | uint8_t challenge_2[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM |
phonemacro | 13:97854f761347 | 75 | 0xd2, 0xaa, 0x84, 0xc5, |
phonemacro | 13:97854f761347 | 76 | 0x72, 0x77, 0xf7, 0xe5, |
phonemacro | 13:97854f761347 | 77 | 0xdb, 0x8f, 0xd6, 0x12, |
phonemacro | 13:97854f761347 | 78 | 0x96, 0xce, 0x69, 0xf2, |
phonemacro | 13:97854f761347 | 79 | 0x4e, 0xc5, 0x7a, 0xe8 |
phonemacro | 13:97854f761347 | 80 | }; |
phonemacro | 14:1939758a03cf | 81 | |
phonemacro | 14:1939758a03cf | 82 | uint8_t challenge_3[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM |
phonemacro | 14:1939758a03cf | 83 | 0x21, 0x20, 0x22, 0x80, |
phonemacro | 14:1939758a03cf | 84 | 0xcc, 0x9d, 0x45, 0xaa, |
phonemacro | 14:1939758a03cf | 85 | 0xb8, 0x13, 0x3e, 0x96, |
phonemacro | 14:1939758a03cf | 86 | 0xd6, 0x53, 0x38, 0x0d, |
phonemacro | 14:1939758a03cf | 87 | 0x2a, 0xd5, 0xdd, 0x6b |
phonemacro | 14:1939758a03cf | 88 | }; |
phonemacro | 15:2616528b4007 | 89 | uint8_t challenge_4[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM |
phonemacro | 15:2616528b4007 | 90 | 0x4c, 0x3c, 0x0a, 0xca, |
phonemacro | 15:2616528b4007 | 91 | 0x61, 0x8a, 0xbd, 0xf2, |
phonemacro | 15:2616528b4007 | 92 | 0x34, 0xd8, 0xb3, 0x41, |
phonemacro | 15:2616528b4007 | 93 | 0x12, 0x89, 0xf3, 0x78, |
phonemacro | 15:2616528b4007 | 94 | 0x65, 0xb6, 0x0d, 0xeb |
phonemacro | 15:2616528b4007 | 95 | }; |
phonemacro | 16:d0f8cf9f160d | 96 | uint32_t expectedResponse_1_romID[RESPONSE_LEN32] = { // 160 bit, no ROM |
phonemacro | 16:d0f8cf9f160d | 97 | 0xfe3f805f, |
phonemacro | 16:d0f8cf9f160d | 98 | 0x0af066bc, |
phonemacro | 16:d0f8cf9f160d | 99 | 0xda0f55e2, |
phonemacro | 16:d0f8cf9f160d | 100 | 0x0020ac16, |
phonemacro | 16:d0f8cf9f160d | 101 | 0x13fa3406, |
phonemacro | 16:d0f8cf9f160d | 102 | 0x59d0e5ae, |
phonemacro | 16:d0f8cf9f160d | 103 | 0x79def309, |
phonemacro | 16:d0f8cf9f160d | 104 | 0x685981a3 |
phonemacro | 16:d0f8cf9f160d | 105 | }; |
phonemacro | 17:e260080d3468 | 106 | uint32_t expectedResponse_2_noRomID[RESPONSE_LEN32] = { // 160 bit, no ROM |
phonemacro | 17:e260080d3468 | 107 | 0x1a7135a2, |
phonemacro | 17:e260080d3468 | 108 | 0x51b99ca8, |
phonemacro | 17:e260080d3468 | 109 | 0xbdd9245e, |
phonemacro | 17:e260080d3468 | 110 | 0xb9c8e758, |
phonemacro | 17:e260080d3468 | 111 | 0x770ec1c4, |
phonemacro | 17:e260080d3468 | 112 | 0x474ffcc7, |
phonemacro | 17:e260080d3468 | 113 | 0x828afe4d, |
phonemacro | 17:e260080d3468 | 114 | 0x9cb3de6d |
phonemacro | 17:e260080d3468 | 115 | }; |
phonemacro | 16:d0f8cf9f160d | 116 | uint32_t chip_response[RESPONSE_LEN32]; |
phonemacro | 16:d0f8cf9f160d | 117 | bool valid = 0; |
phonemacro | 16:d0f8cf9f160d | 118 | |
phonemacro | 5:df9f75bee8ac | 119 | #define MAC_SZ 32 |
phonemacro | 7:5b7f7ec9efe0 | 120 | |
phonemacro | 0:9e5a4f845510 | 121 | |
phonemacro | 0:9e5a4f845510 | 122 | // daplink.printf("daplink serial port\r\n"); |
phonemacro | 0:9e5a4f845510 | 123 | // microUSB.printf("micro USB serial port\r\n"); |
phonemacro | 0:9e5a4f845510 | 124 | rLED = LED_ON; |
phonemacro | 0:9e5a4f845510 | 125 | gLED = LED_ON; |
phonemacro | 0:9e5a4f845510 | 126 | bLED = LED_OFF; |
phonemacro | 0:9e5a4f845510 | 127 | |
phonemacro | 0:9e5a4f845510 | 128 | rLED = LED_OFF; |
phonemacro | 1:854f8a89a527 | 129 | printf("\r\n\rmax86140 authenication software\r\n"); |
phonemacro | 11:ec7998257ec2 | 130 | MAX8614X m(spi,cs,interrupt_pin); |
phonemacro | 18:a0356b3e6ed9 | 131 | m.init(); |
phonemacro | 11:ec7998257ec2 | 132 | // MAX8614X m(spi,cs,interrupt_pin); |
phonemacro | 7:5b7f7ec9efe0 | 133 | // m.readRegister(MAX8614X::MAX8614X_PART_ID_REG, data, 1); |
phonemacro | 7:5b7f7ec9efe0 | 134 | // printf("device id should be 0x24, reg %02X = %02X\r\n", MAX8614X::MAX8614X_PART_ID_REG, data[0]); |
phonemacro | 3:2272f89aad7e | 135 | |
phonemacro | 17:e260080d3468 | 136 | //● Compare MAC from MAX86140 wth Host's precalculated MAC. |
phonemacro | 17:e260080d3468 | 137 | // executeSha256(m, challenge_A, CHALLENGE_SZ_NO_SECRET, 1, chip_response); |
phonemacro | 17:e260080d3468 | 138 | |
phonemacro | 16:d0f8cf9f160d | 139 | executeSha256(m, challenge_1, CHALLENGE_SZ_NO_SECRET, 1, chip_response); |
phonemacro | 17:e260080d3468 | 140 | //● Check PASS or FAIL. |
phonemacro | 16:d0f8cf9f160d | 141 | valid = isTheChipAuthenicated(chip_response, expectedResponse_1_romID); |
phonemacro | 16:d0f8cf9f160d | 142 | if (valid) |
phonemacro | 16:d0f8cf9f160d | 143 | printf("\r\n Challenge 1 passed\r\n\r\n"); |
phonemacro | 16:d0f8cf9f160d | 144 | else |
phonemacro | 16:d0f8cf9f160d | 145 | printf("\r\n Challenge 1 failed\r\n\r\n"); |
phonemacro | 17:e260080d3468 | 146 | |
phonemacro | 17:e260080d3468 | 147 | executeSha256(m, challenge_2, CHALLENGE_SZ_NO_SECRET, 0, chip_response); |
phonemacro | 17:e260080d3468 | 148 | valid = isTheChipAuthenicated(chip_response, expectedResponse_2_noRomID); |
phonemacro | 17:e260080d3468 | 149 | if (valid) |
phonemacro | 17:e260080d3468 | 150 | printf("\r\n Challenge 2 passed\r\n\r\n"); |
phonemacro | 17:e260080d3468 | 151 | else |
phonemacro | 17:e260080d3468 | 152 | printf("\r\n Challenge 2 failed\r\n\r\n"); |
phonemacro | 16:d0f8cf9f160d | 153 | // executeSha256(m, challenge_3, CHALLENGE_SZ_NO_SECRET, 1); |
phonemacro | 16:d0f8cf9f160d | 154 | // executeSha256(m, challenge_4, CHALLENGE_SZ_NO_SECRET, 0); |
phonemacro | 17:e260080d3468 | 155 | //● Check PASS or FAIL. |
phonemacro | 17:e260080d3468 | 156 | //● Disable SHA_EN bit ( Write 0 to SHA_EN bit). |
phonemacro | 18:a0356b3e6ed9 | 157 | m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG, 0); |
phonemacro | 0:9e5a4f845510 | 158 | while(1) { |
phonemacro | 1:854f8a89a527 | 159 | gLED = !gLED; |
phonemacro | 0:9e5a4f845510 | 160 | wait(1.0); |
phonemacro | 0:9e5a4f845510 | 161 | } |
phonemacro | 0:9e5a4f845510 | 162 | } |
phonemacro | 0:9e5a4f845510 | 163 | |
phonemacro | 16:d0f8cf9f160d | 164 | bool isTheChipAuthenicated(uint32_t *expectedResponse, uint32_t * chipResponse) |
phonemacro | 16:d0f8cf9f160d | 165 | { |
phonemacro | 16:d0f8cf9f160d | 166 | int i; |
phonemacro | 16:d0f8cf9f160d | 167 | for (i = 0; i < RESPONSE_LEN32; i++) { |
phonemacro | 16:d0f8cf9f160d | 168 | if (expectedResponse[i] != chipResponse[i]) |
phonemacro | 16:d0f8cf9f160d | 169 | return 0; |
phonemacro | 16:d0f8cf9f160d | 170 | } |
phonemacro | 16:d0f8cf9f160d | 171 | return 1; |
phonemacro | 16:d0f8cf9f160d | 172 | } |
phonemacro | 16:d0f8cf9f160d | 173 | |
phonemacro | 10:0b940aff3bb8 | 174 | #if 0 |
phonemacro | 7:5b7f7ec9efe0 | 175 | void transformData(uint8_t *inData, uint8_t *outData, unsigned int challengeLen) |
phonemacro | 7:5b7f7ec9efe0 | 176 | { |
phonemacro | 7:5b7f7ec9efe0 | 177 | int i, j, k; |
phonemacro | 7:5b7f7ec9efe0 | 178 | k = 0; |
phonemacro | 7:5b7f7ec9efe0 | 179 | for (i = 0; i < (challengeLen/4); i++) { |
phonemacro | 7:5b7f7ec9efe0 | 180 | for (j = 3; j >= 0; j--) { |
phonemacro | 7:5b7f7ec9efe0 | 181 | outData[j+(i*4)] = inData[k]; |
phonemacro | 7:5b7f7ec9efe0 | 182 | k++; |
phonemacro | 7:5b7f7ec9efe0 | 183 | } |
phonemacro | 7:5b7f7ec9efe0 | 184 | } |
phonemacro | 7:5b7f7ec9efe0 | 185 | } |
phonemacro | 10:0b940aff3bb8 | 186 | #endif |
phonemacro | 10:0b940aff3bb8 | 187 | void transformData(uint8_t *inData, uint8_t *outData, unsigned int challengeLen) |
phonemacro | 10:0b940aff3bb8 | 188 | { |
phonemacro | 10:0b940aff3bb8 | 189 | int i, j, k; |
phonemacro | 10:0b940aff3bb8 | 190 | k = 0; |
phonemacro | 10:0b940aff3bb8 | 191 | for (i = 0; i < (challengeLen/4); i++) { |
phonemacro | 10:0b940aff3bb8 | 192 | for (j = 3; j >= 0; j--) { |
phonemacro | 10:0b940aff3bb8 | 193 | outData[j+(i*4)] = inData[k]; |
phonemacro | 10:0b940aff3bb8 | 194 | // printf("%02X ",inData[k]); |
phonemacro | 10:0b940aff3bb8 | 195 | k++; |
phonemacro | 10:0b940aff3bb8 | 196 | } |
phonemacro | 10:0b940aff3bb8 | 197 | // printf("\r\n"); |
phonemacro | 10:0b940aff3bb8 | 198 | } |
phonemacro | 10:0b940aff3bb8 | 199 | for (i=0; i < challengeLen; i++) { |
phonemacro | 10:0b940aff3bb8 | 200 | // if (!(i % 4)) |
phonemacro | 10:0b940aff3bb8 | 201 | // printf("\r\n "); |
phonemacro | 10:0b940aff3bb8 | 202 | // printf("%02X ",outData[i]); |
phonemacro | 10:0b940aff3bb8 | 203 | } |
phonemacro | 10:0b940aff3bb8 | 204 | } |
phonemacro | 7:5b7f7ec9efe0 | 205 | |
phonemacro | 7:5b7f7ec9efe0 | 206 | |
phonemacro | 16:d0f8cf9f160d | 207 | void executeSha256(MAX8614X &m, uint8_t *challenge, unsigned int challengeLen, bool romID, uint32_t *response) |
phonemacro | 7:5b7f7ec9efe0 | 208 | { |
phonemacro | 10:0b940aff3bb8 | 209 | int i, j, k; |
phonemacro | 7:5b7f7ec9efe0 | 210 | uint8_t macData[256]; |
phonemacro | 10:0b940aff3bb8 | 211 | uint8_t inData[256]; |
phonemacro | 7:5b7f7ec9efe0 | 212 | uint8_t xData[256]; |
phonemacro | 10:0b940aff3bb8 | 213 | uint32_t x32Data[64]; |
phonemacro | 7:5b7f7ec9efe0 | 214 | uint32_t tmpData; |
phonemacro | 10:0b940aff3bb8 | 215 | const unsigned int responseLen32 = 8; |
phonemacro | 7:5b7f7ec9efe0 | 216 | uint8_t data[5]; |
phonemacro | 11:ec7998257ec2 | 217 | |
phonemacro | 18:a0356b3e6ed9 | 218 | //● Enable SHA_DONE Interrupt |
phonemacro | 7:5b7f7ec9efe0 | 219 | m.writeRegister(MAX8614X::MAX8614X_INT_ENABLE2_REG, MAX8614X::MAX8614X_IE_SHA_DONE_EN); |
phonemacro | 7:5b7f7ec9efe0 | 220 | |
phonemacro | 7:5b7f7ec9efe0 | 221 | m.writeRegister(MAX8614X::MAX8614X_INT_ENABLE1_REG, 0); // Disable all other interrupts |
phonemacro | 7:5b7f7ec9efe0 | 222 | |
phonemacro | 13:97854f761347 | 223 | //- Enable SHA_EN bit. |
phonemacro | 7:5b7f7ec9efe0 | 224 | m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG,MAX8614X::MAX8614X_SHACFG_SHA_EN); |
phonemacro | 7:5b7f7ec9efe0 | 225 | |
phonemacro | 18:a0356b3e6ed9 | 226 | //● Write 160-bit random challenge value to RAM using registers MEM_IDX and MEM_DATA. |
phonemacro | 7:5b7f7ec9efe0 | 227 | // Enable Memory Write, Select Bank 0, address 0x00 to 0xFF |
phonemacro | 7:5b7f7ec9efe0 | 228 | m.writeRegister(MAX8614X::MAX8614X_MEMORY_CONTROL_REG, MAX8614X::MAX8614X_MEMCNTRL_WR_EN_MASK | MAX8614X::MAX8614X_MEMCNTRL_BANK0_MASK); |
phonemacro | 7:5b7f7ec9efe0 | 229 | |
phonemacro | 7:5b7f7ec9efe0 | 230 | printf("\r\n Raw Input Data\r\n\r\n"); |
phonemacro | 7:5b7f7ec9efe0 | 231 | for (i = 0; i < challengeLen; i++) { |
phonemacro | 10:0b940aff3bb8 | 232 | if (!(i % 4)) |
phonemacro | 10:0b940aff3bb8 | 233 | printf("\r\n "); |
phonemacro | 10:0b940aff3bb8 | 234 | printf("%02x", challenge[i]); |
phonemacro | 7:5b7f7ec9efe0 | 235 | } |
phonemacro | 7:5b7f7ec9efe0 | 236 | printf("\r\n"); |
phonemacro | 10:0b940aff3bb8 | 237 | #if 0 |
phonemacro | 7:5b7f7ec9efe0 | 238 | k = 0; |
phonemacro | 10:0b940aff3bb8 | 239 | for (i = 0; i < (challengeLen/4); i++) { |
phonemacro | 10:0b940aff3bb8 | 240 | for (j = 3; j >= 0; j--) { |
phonemacro | 10:0b940aff3bb8 | 241 | |
phonemacro | 10:0b940aff3bb8 | 242 | inData[j+(i*4)] = challenge[k]; |
phonemacro | 10:0b940aff3bb8 | 243 | k++; |
phonemacro | 7:5b7f7ec9efe0 | 244 | } |
phonemacro | 10:0b940aff3bb8 | 245 | } |
phonemacro | 10:0b940aff3bb8 | 246 | #endif |
phonemacro | 10:0b940aff3bb8 | 247 | |
phonemacro | 10:0b940aff3bb8 | 248 | transformData(challenge, xData, challengeLen); |
phonemacro | 7:5b7f7ec9efe0 | 249 | |
phonemacro | 7:5b7f7ec9efe0 | 250 | printf("\r\n Transformed Input Data\r\n\r\n"); |
phonemacro | 10:0b940aff3bb8 | 251 | for (i = 0; i < challengeLen; i++) { |
phonemacro | 7:5b7f7ec9efe0 | 252 | if (!(i % 4)) |
phonemacro | 7:5b7f7ec9efe0 | 253 | printf("\r\n "); |
phonemacro | 7:5b7f7ec9efe0 | 254 | printf("%02x", xData[i]); |
phonemacro | 7:5b7f7ec9efe0 | 255 | } |
phonemacro | 7:5b7f7ec9efe0 | 256 | printf("\r\n "); |
phonemacro | 7:5b7f7ec9efe0 | 257 | printf("\r\n "); |
phonemacro | 7:5b7f7ec9efe0 | 258 | |
phonemacro | 10:0b940aff3bb8 | 259 | for (i = 0; i < (challengeLen); i++) { |
phonemacro | 7:5b7f7ec9efe0 | 260 | m.writeRegister(MAX8614X::MAX8614X_MEMORY_INDEX_REG, i); |
phonemacro | 7:5b7f7ec9efe0 | 261 | m.writeRegister(MAX8614X::MAX8614X_MEMORY_DATA_REG, xData[i]); |
phonemacro | 10:0b940aff3bb8 | 262 | //} |
phonemacro | 10:0b940aff3bb8 | 263 | } |
phonemacro | 7:5b7f7ec9efe0 | 264 | printf("%\r\n"); |
phonemacro | 7:5b7f7ec9efe0 | 265 | // The message block consists of a 160-bit secret, a 160-bit challenge and 192 bits of constant data. Optionally, the 64-bit |
phonemacro | 7:5b7f7ec9efe0 | 266 | // ROM ID replaces 64 of the 192 bits of constant data used in the hash operation. 16 bits out of the 160-bit secret and 16 |
phonemacro | 7:5b7f7ec9efe0 | 267 | // bits of ROM ID are programmable–8 bits each in metal and 8 bits each in OTP bits |
phonemacro | 13:97854f761347 | 268 | //- Write command, with ROM ID (0x35) or without ROM ID (0x36), to SHA_CMD register |
phonemacro | 12:fc888315e5fd | 269 | if (romID) { |
phonemacro | 12:fc888315e5fd | 270 | printf("ROMID \r\n"); |
phonemacro | 13:97854f761347 | 271 | // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG, MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID); |
phonemacro | 12:fc888315e5fd | 272 | m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG, MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID); |
phonemacro | 17:e260080d3468 | 273 | // wait(1); |
phonemacro | 12:fc888315e5fd | 274 | } |
phonemacro | 12:fc888315e5fd | 275 | else |
phonemacro | 12:fc888315e5fd | 276 | { |
phonemacro | 12:fc888315e5fd | 277 | printf("no ROMID \r\n"); |
phonemacro | 13:97854f761347 | 278 | // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID); |
phonemacro | 12:fc888315e5fd | 279 | m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID); |
phonemacro | 17:e260080d3468 | 280 | // wait(1); |
phonemacro | 12:fc888315e5fd | 281 | } |
phonemacro | 12:fc888315e5fd | 282 | |
phonemacro | 12:fc888315e5fd | 283 | |
phonemacro | 12:fc888315e5fd | 284 | // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID); |
phonemacro | 7:5b7f7ec9efe0 | 285 | // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID); |
phonemacro | 7:5b7f7ec9efe0 | 286 | |
phonemacro | 7:5b7f7ec9efe0 | 287 | |
phonemacro | 10:0b940aff3bb8 | 288 | m.readRegister(MAX8614X::MAX8614X_SHA_CMD_REG, data, 1); |
phonemacro | 14:1939758a03cf | 289 | /// printf("sha cmd reg should be 0x35 mac rom id, reg %02X = %02X\r\n", MAX8614X::MAX8614X_SHA_CMD_REG, data[0]); |
phonemacro | 10:0b940aff3bb8 | 290 | m.readRegister(MAX8614X::MAX8614X_INT_STATUS2_REG, data, 1); |
phonemacro | 14:1939758a03cf | 291 | /// printf("int status2, reg %02X = %X\r\n", MAX8614X::MAX8614X_INT_STATUS2_REG, data[0]); |
phonemacro | 7:5b7f7ec9efe0 | 292 | //● Write 1 to SHA_START and 1 to SHA_EN bit. |
phonemacro | 7:5b7f7ec9efe0 | 293 | m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG,MAX8614X::MAX8614X_SHACFG_SHA_EN | MAX8614X::MAX8614X_SHACFG_SHA_START); |
phonemacro | 10:0b940aff3bb8 | 294 | m.readRegister(MAX8614X::MAX8614X_SHA_CFG_REG, data, 1); |
phonemacro | 14:1939758a03cf | 295 | /// printf("sha CFG reg should be 0x3, reg %02X = %02X\r\n", MAX8614X::MAX8614X_SHA_CFG_REG, data[0]); |
phonemacro | 7:5b7f7ec9efe0 | 296 | |
phonemacro | 18:a0356b3e6ed9 | 297 | //● Wait for SHA_DONE. |
phonemacro | 7:5b7f7ec9efe0 | 298 | data[0] = 0; |
phonemacro | 17:e260080d3468 | 299 | k = 0; |
phonemacro | 17:e260080d3468 | 300 | while(!data[0] && k < 100) { |
phonemacro | 7:5b7f7ec9efe0 | 301 | m.readRegister(MAX8614X::MAX8614X_INT_STATUS2_REG, data, 1); |
phonemacro | 17:e260080d3468 | 302 | k++; |
phonemacro | 7:5b7f7ec9efe0 | 303 | } |
phonemacro | 7:5b7f7ec9efe0 | 304 | // ● Read 256 MAC value from RAM using registers MEM_IDX and MEM_DATA. |
phonemacro | 10:0b940aff3bb8 | 305 | printf("\r\n Raw Output\r\n\r\n"); |
phonemacro | 7:5b7f7ec9efe0 | 306 | for (i = 64; i < 64+32; i++) { |
phonemacro | 7:5b7f7ec9efe0 | 307 | if (!(i % 4)) |
phonemacro | 7:5b7f7ec9efe0 | 308 | printf("\r\n "); |
phonemacro | 7:5b7f7ec9efe0 | 309 | m.writeRegister(MAX8614X::MAX8614X_MEMORY_INDEX_REG, i); |
phonemacro | 7:5b7f7ec9efe0 | 310 | m.readRegister(MAX8614X::MAX8614X_MEMORY_DATA_REG, data, 1); |
phonemacro | 10:0b940aff3bb8 | 311 | xData[i-64] = data[0]; |
phonemacro | 7:5b7f7ec9efe0 | 312 | printf("%02x", data[0]); |
phonemacro | 7:5b7f7ec9efe0 | 313 | } |
phonemacro | 10:0b940aff3bb8 | 314 | printf("%\r\n"); |
phonemacro | 10:0b940aff3bb8 | 315 | |
phonemacro | 10:0b940aff3bb8 | 316 | transformData(xData,macData, 32); |
phonemacro | 10:0b940aff3bb8 | 317 | #if 0 |
phonemacro | 10:0b940aff3bb8 | 318 | printf("\r\n Formatted Response\r\n\r\n"); |
phonemacro | 10:0b940aff3bb8 | 319 | for (i = 0; i < 32; i++) { |
phonemacro | 10:0b940aff3bb8 | 320 | if (!(i % 4)) |
phonemacro | 10:0b940aff3bb8 | 321 | printf("\r\n "); |
phonemacro | 10:0b940aff3bb8 | 322 | printf("%02x", macData[i]); |
phonemacro | 10:0b940aff3bb8 | 323 | } |
phonemacro | 10:0b940aff3bb8 | 324 | printf("\r\n\r\n"); |
phonemacro | 10:0b940aff3bb8 | 325 | |
phonemacro | 10:0b940aff3bb8 | 326 | #endif |
phonemacro | 10:0b940aff3bb8 | 327 | // transform data to Little-Endian |
phonemacro | 10:0b940aff3bb8 | 328 | k = 0; |
phonemacro | 10:0b940aff3bb8 | 329 | for (i = 0; i < (responseLen32); i++) { |
phonemacro | 10:0b940aff3bb8 | 330 | tmpData = challenge[i]; |
phonemacro | 10:0b940aff3bb8 | 331 | x32Data[i] = 0; |
phonemacro | 10:0b940aff3bb8 | 332 | for (j = 3; j >= 0; j--) { |
phonemacro | 10:0b940aff3bb8 | 333 | x32Data[i] = x32Data[i] << 8; |
phonemacro | 10:0b940aff3bb8 | 334 | x32Data[i] |= macData[k] & 0xFF; |
phonemacro | 10:0b940aff3bb8 | 335 | k++; |
phonemacro | 10:0b940aff3bb8 | 336 | } |
phonemacro | 10:0b940aff3bb8 | 337 | |
phonemacro | 10:0b940aff3bb8 | 338 | } |
phonemacro | 10:0b940aff3bb8 | 339 | |
phonemacro | 10:0b940aff3bb8 | 340 | printf("\r\n Formatted Response\r\n\r\n"); |
phonemacro | 10:0b940aff3bb8 | 341 | for (i = 0; i < responseLen32; i++) { |
phonemacro | 10:0b940aff3bb8 | 342 | printf(" %08X \r\n",x32Data[i]); |
phonemacro | 16:d0f8cf9f160d | 343 | response[i] = x32Data[i]; |
phonemacro | 10:0b940aff3bb8 | 344 | } |
phonemacro | 10:0b940aff3bb8 | 345 | |
phonemacro | 10:0b940aff3bb8 | 346 | |
phonemacro | 7:5b7f7ec9efe0 | 347 | } |