intiial commit

Dependencies:   MAX8614X USBDevice max32630hsp_test

Committer:
phonemacro
Date:
Thu Aug 16 22:30:29 2018 +0000
Revision:
17:e260080d3468
Parent:
16:d0f8cf9f160d
Child:
18:a0356b3e6ed9
challenge 2 compare added

Who changed what in which revision?

UserRevisionLine numberNew contents of line
phonemacro 0:9e5a4f845510 1 /**********************************************************************
phonemacro 1:854f8a89a527 2 * Copyright (C) 2018 Maxim Integrated Products, Inc., All Rights Reserved.
phonemacro 0:9e5a4f845510 3 *
phonemacro 0:9e5a4f845510 4 * Permission is hereby granted, free of charge, to any person obtaining a
phonemacro 0:9e5a4f845510 5 * copy of this software and associated documentation files (the "Software"),
phonemacro 0:9e5a4f845510 6 * to deal in the Software without restriction, including without limitation
phonemacro 0:9e5a4f845510 7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
phonemacro 0:9e5a4f845510 8 * and/or sell copies of the Software, and to permit persons to whom the
phonemacro 0:9e5a4f845510 9 * Software is furnished to do so, subject to the following conditions:
phonemacro 0:9e5a4f845510 10 *
phonemacro 0:9e5a4f845510 11 * The above copyright notice and this permission notice shall be included
phonemacro 0:9e5a4f845510 12 * in all copies or substantial portions of the Software.
phonemacro 0:9e5a4f845510 13 *
phonemacro 0:9e5a4f845510 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
phonemacro 0:9e5a4f845510 15 * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
phonemacro 0:9e5a4f845510 16 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
phonemacro 0:9e5a4f845510 17 * IN NO EVENT SHALL MAXIM INTEGRATED BE LIABLE FOR ANY CLAIM, DAMAGES
phonemacro 0:9e5a4f845510 18 * OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
phonemacro 0:9e5a4f845510 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
phonemacro 0:9e5a4f845510 20 * OTHER DEALINGS IN THE SOFTWARE.
phonemacro 0:9e5a4f845510 21 *
phonemacro 0:9e5a4f845510 22 * Except as contained in this notice, the name of Maxim Integrated
phonemacro 0:9e5a4f845510 23 * Products, Inc. shall not be used except as stated in the Maxim Integrated
phonemacro 0:9e5a4f845510 24 * Products, Inc. Branding Policy.
phonemacro 0:9e5a4f845510 25 *
phonemacro 0:9e5a4f845510 26 * The mere transfer of this software does not imply any licenses
phonemacro 0:9e5a4f845510 27 * of trade secrets, proprietary technology, copyrights, patents,
phonemacro 0:9e5a4f845510 28 * trademarks, maskwork rights, or any other form of intellectual
phonemacro 0:9e5a4f845510 29 * property whatsoever. Maxim Integrated Products, Inc. retains all
phonemacro 0:9e5a4f845510 30 * ownership rights.
phonemacro 0:9e5a4f845510 31 **********************************************************************/
phonemacro 0:9e5a4f845510 32
phonemacro 0:9e5a4f845510 33
phonemacro 0:9e5a4f845510 34 #include "mbed.h"
phonemacro 0:9e5a4f845510 35 //#include "max32630fthr.h"
phonemacro 0:9e5a4f845510 36 #include "max32630hsp.h"
phonemacro 0:9e5a4f845510 37 #include "MAX8614X.h"
phonemacro 0:9e5a4f845510 38 #include "USBSerial.h"
phonemacro 16:d0f8cf9f160d 39 void executeSha256(MAX8614X &m, uint8_t *challenge, unsigned int challengeLen, bool romID, uint32_t *response);
phonemacro 16:d0f8cf9f160d 40 bool isTheChipAuthenicated(uint32_t *expectedResponse, uint32_t *chipResponse);
phonemacro 7:5b7f7ec9efe0 41
phonemacro 16:d0f8cf9f160d 42 #define RESPONSE_LEN32 8
phonemacro 0:9e5a4f845510 43
phonemacro 0:9e5a4f845510 44 MAX32630HSP icarus(MAX32630HSP::VIO_1V8);
phonemacro 0:9e5a4f845510 45 // MAX32630FTHR mbed_board(MAX32630FTHR::VIO_1V8);
phonemacro 0:9e5a4f845510 46 SPI spi(P5_1, P5_2, P5_0); /* mosi, miso, sclk */
phonemacro 3:2272f89aad7e 47 //DigitalOut cs(P3_0);
phonemacro 3:2272f89aad7e 48 DigitalOut cs(P5_3);
phonemacro 6:0ec9dd0e8eb0 49 //PinName interrupt_pin = P3_3;
phonemacro 6:0ec9dd0e8eb0 50 //PinnName interrupt_pin = P5_7;
phonemacro 6:0ec9dd0e8eb0 51 //PinName interrupt_pin = P5_5;
phonemacro 6:0ec9dd0e8eb0 52 //PinName interrupt_pin = P3_6;
phonemacro 6:0ec9dd0e8eb0 53 //PinName interrupt_pin = P3_7;
phonemacro 6:0ec9dd0e8eb0 54 //PinName interrupt_pin = P3_2;
phonemacro 6:0ec9dd0e8eb0 55 PinName interrupt_pin = P5_4;
phonemacro 0:9e5a4f845510 56 // Virtual serial port over USB
phonemacro 0:9e5a4f845510 57 USBSerial microUSB;
phonemacro 0:9e5a4f845510 58
phonemacro 0:9e5a4f845510 59 DigitalOut rLED(LED1);
phonemacro 0:9e5a4f845510 60 DigitalOut gLED(LED2);
phonemacro 0:9e5a4f845510 61 DigitalOut bLED(LED3);
phonemacro 0:9e5a4f845510 62 int main()
phonemacro 0:9e5a4f845510 63 {
phonemacro 7:5b7f7ec9efe0 64 #define CHALLENGE_SZ_NO_SECRET 20
phonemacro 15:2616528b4007 65 uint8_t challenge_A[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 15:2616528b4007 66 0x00, 0x00, 0x00, 0x01,
phonemacro 15:2616528b4007 67 0x00, 0x00, 0x00, 0x00,
phonemacro 15:2616528b4007 68 0x00, 0x00, 0x00, 0x00,
phonemacro 15:2616528b4007 69 0x00, 0x00, 0x00, 0x00,
phonemacro 15:2616528b4007 70 0x00, 0x00, 0x00, 0x00
phonemacro 15:2616528b4007 71 };
phonemacro 10:0b940aff3bb8 72 uint8_t challenge_1[CHALLENGE_SZ_NO_SECRET] = { // 160 bit
phonemacro 10:0b940aff3bb8 73 0x5e, 0x81, 0x35, 0x24,
phonemacro 10:0b940aff3bb8 74 0x56, 0x63, 0xd6, 0x09,
phonemacro 10:0b940aff3bb8 75 0x99, 0x8d, 0x7b, 0x0d,
phonemacro 10:0b940aff3bb8 76 0x52, 0x12, 0x84, 0x65,
phonemacro 10:0b940aff3bb8 77 0xcd, 0x0d, 0xe3, 0x01
phonemacro 4:46919eec2c28 78 };
phonemacro 4:46919eec2c28 79
phonemacro 14:1939758a03cf 80 uint8_t challenge_2[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 13:97854f761347 81 0xd2, 0xaa, 0x84, 0xc5,
phonemacro 13:97854f761347 82 0x72, 0x77, 0xf7, 0xe5,
phonemacro 13:97854f761347 83 0xdb, 0x8f, 0xd6, 0x12,
phonemacro 13:97854f761347 84 0x96, 0xce, 0x69, 0xf2,
phonemacro 13:97854f761347 85 0x4e, 0xc5, 0x7a, 0xe8
phonemacro 13:97854f761347 86 };
phonemacro 14:1939758a03cf 87
phonemacro 14:1939758a03cf 88 uint8_t challenge_3[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 14:1939758a03cf 89 0x21, 0x20, 0x22, 0x80,
phonemacro 14:1939758a03cf 90 0xcc, 0x9d, 0x45, 0xaa,
phonemacro 14:1939758a03cf 91 0xb8, 0x13, 0x3e, 0x96,
phonemacro 14:1939758a03cf 92 0xd6, 0x53, 0x38, 0x0d,
phonemacro 14:1939758a03cf 93 0x2a, 0xd5, 0xdd, 0x6b
phonemacro 14:1939758a03cf 94 };
phonemacro 15:2616528b4007 95 uint8_t challenge_4[CHALLENGE_SZ_NO_SECRET] = { // 160 bit, no ROM
phonemacro 15:2616528b4007 96 0x4c, 0x3c, 0x0a, 0xca,
phonemacro 15:2616528b4007 97 0x61, 0x8a, 0xbd, 0xf2,
phonemacro 15:2616528b4007 98 0x34, 0xd8, 0xb3, 0x41,
phonemacro 15:2616528b4007 99 0x12, 0x89, 0xf3, 0x78,
phonemacro 15:2616528b4007 100 0x65, 0xb6, 0x0d, 0xeb
phonemacro 15:2616528b4007 101 };
phonemacro 16:d0f8cf9f160d 102 uint32_t expectedResponse_1_romID[RESPONSE_LEN32] = { // 160 bit, no ROM
phonemacro 16:d0f8cf9f160d 103 0xfe3f805f,
phonemacro 16:d0f8cf9f160d 104 0x0af066bc,
phonemacro 16:d0f8cf9f160d 105 0xda0f55e2,
phonemacro 16:d0f8cf9f160d 106 0x0020ac16,
phonemacro 16:d0f8cf9f160d 107 0x13fa3406,
phonemacro 16:d0f8cf9f160d 108 0x59d0e5ae,
phonemacro 16:d0f8cf9f160d 109 0x79def309,
phonemacro 16:d0f8cf9f160d 110 0x685981a3
phonemacro 16:d0f8cf9f160d 111 };
phonemacro 17:e260080d3468 112 uint32_t expectedResponse_2_noRomID[RESPONSE_LEN32] = { // 160 bit, no ROM
phonemacro 17:e260080d3468 113 0x1a7135a2,
phonemacro 17:e260080d3468 114 0x51b99ca8,
phonemacro 17:e260080d3468 115 0xbdd9245e,
phonemacro 17:e260080d3468 116 0xb9c8e758,
phonemacro 17:e260080d3468 117 0x770ec1c4,
phonemacro 17:e260080d3468 118 0x474ffcc7,
phonemacro 17:e260080d3468 119 0x828afe4d,
phonemacro 17:e260080d3468 120 0x9cb3de6d
phonemacro 17:e260080d3468 121 };
phonemacro 16:d0f8cf9f160d 122 uint32_t chip_response[RESPONSE_LEN32];
phonemacro 16:d0f8cf9f160d 123 bool valid = 0;
phonemacro 16:d0f8cf9f160d 124
phonemacro 5:df9f75bee8ac 125 #define MAC_SZ 32
phonemacro 7:5b7f7ec9efe0 126
phonemacro 0:9e5a4f845510 127
phonemacro 0:9e5a4f845510 128 // daplink.printf("daplink serial port\r\n");
phonemacro 0:9e5a4f845510 129 // microUSB.printf("micro USB serial port\r\n");
phonemacro 0:9e5a4f845510 130 rLED = LED_ON;
phonemacro 0:9e5a4f845510 131 gLED = LED_ON;
phonemacro 0:9e5a4f845510 132 bLED = LED_OFF;
phonemacro 0:9e5a4f845510 133
phonemacro 0:9e5a4f845510 134 rLED = LED_OFF;
phonemacro 1:854f8a89a527 135 printf("\r\n\rmax86140 authenication software\r\n");
phonemacro 11:ec7998257ec2 136 MAX8614X m(spi,cs,interrupt_pin);
phonemacro 11:ec7998257ec2 137 // MAX8614X m(spi,cs,interrupt_pin);
phonemacro 7:5b7f7ec9efe0 138 // m.readRegister(MAX8614X::MAX8614X_PART_ID_REG, data, 1);
phonemacro 7:5b7f7ec9efe0 139 // printf("device id should be 0x24, reg %02X = %02X\r\n", MAX8614X::MAX8614X_PART_ID_REG, data[0]);
phonemacro 3:2272f89aad7e 140
phonemacro 17:e260080d3468 141 //● Compare MAC from MAX86140 wth Host's precalculated MAC.
phonemacro 17:e260080d3468 142 // executeSha256(m, challenge_A, CHALLENGE_SZ_NO_SECRET, 1, chip_response);
phonemacro 17:e260080d3468 143
phonemacro 16:d0f8cf9f160d 144 executeSha256(m, challenge_1, CHALLENGE_SZ_NO_SECRET, 1, chip_response);
phonemacro 17:e260080d3468 145 //● Check PASS or FAIL.
phonemacro 16:d0f8cf9f160d 146 valid = isTheChipAuthenicated(chip_response, expectedResponse_1_romID);
phonemacro 16:d0f8cf9f160d 147 if (valid)
phonemacro 16:d0f8cf9f160d 148 printf("\r\n Challenge 1 passed\r\n\r\n");
phonemacro 16:d0f8cf9f160d 149 else
phonemacro 16:d0f8cf9f160d 150 printf("\r\n Challenge 1 failed\r\n\r\n");
phonemacro 17:e260080d3468 151
phonemacro 17:e260080d3468 152 executeSha256(m, challenge_2, CHALLENGE_SZ_NO_SECRET, 0, chip_response);
phonemacro 17:e260080d3468 153 valid = isTheChipAuthenicated(chip_response, expectedResponse_2_noRomID);
phonemacro 17:e260080d3468 154 if (valid)
phonemacro 17:e260080d3468 155 printf("\r\n Challenge 2 passed\r\n\r\n");
phonemacro 17:e260080d3468 156 else
phonemacro 17:e260080d3468 157 printf("\r\n Challenge 2 failed\r\n\r\n");
phonemacro 16:d0f8cf9f160d 158 // executeSha256(m, challenge_3, CHALLENGE_SZ_NO_SECRET, 1);
phonemacro 16:d0f8cf9f160d 159 // executeSha256(m, challenge_4, CHALLENGE_SZ_NO_SECRET, 0);
phonemacro 17:e260080d3468 160 //● Check PASS or FAIL.
phonemacro 17:e260080d3468 161 //● Disable SHA_EN bit ( Write 0 to SHA_EN bit).
phonemacro 0:9e5a4f845510 162 while(1) {
phonemacro 1:854f8a89a527 163 gLED = !gLED;
phonemacro 0:9e5a4f845510 164 wait(1.0);
phonemacro 0:9e5a4f845510 165 }
phonemacro 0:9e5a4f845510 166 }
phonemacro 0:9e5a4f845510 167
phonemacro 16:d0f8cf9f160d 168 bool isTheChipAuthenicated(uint32_t *expectedResponse, uint32_t * chipResponse)
phonemacro 16:d0f8cf9f160d 169 {
phonemacro 16:d0f8cf9f160d 170 int i;
phonemacro 16:d0f8cf9f160d 171 for (i = 0; i < RESPONSE_LEN32; i++) {
phonemacro 16:d0f8cf9f160d 172 if (expectedResponse[i] != chipResponse[i])
phonemacro 16:d0f8cf9f160d 173 return 0;
phonemacro 16:d0f8cf9f160d 174 }
phonemacro 16:d0f8cf9f160d 175 return 1;
phonemacro 16:d0f8cf9f160d 176 }
phonemacro 16:d0f8cf9f160d 177
phonemacro 10:0b940aff3bb8 178 #if 0
phonemacro 7:5b7f7ec9efe0 179 void transformData(uint8_t *inData, uint8_t *outData, unsigned int challengeLen)
phonemacro 7:5b7f7ec9efe0 180 {
phonemacro 7:5b7f7ec9efe0 181 int i, j, k;
phonemacro 7:5b7f7ec9efe0 182 k = 0;
phonemacro 7:5b7f7ec9efe0 183 for (i = 0; i < (challengeLen/4); i++) {
phonemacro 7:5b7f7ec9efe0 184 for (j = 3; j >= 0; j--) {
phonemacro 7:5b7f7ec9efe0 185 outData[j+(i*4)] = inData[k];
phonemacro 7:5b7f7ec9efe0 186 k++;
phonemacro 7:5b7f7ec9efe0 187 }
phonemacro 7:5b7f7ec9efe0 188 }
phonemacro 7:5b7f7ec9efe0 189 }
phonemacro 10:0b940aff3bb8 190 #endif
phonemacro 10:0b940aff3bb8 191 void transformData(uint8_t *inData, uint8_t *outData, unsigned int challengeLen)
phonemacro 10:0b940aff3bb8 192 {
phonemacro 10:0b940aff3bb8 193 int i, j, k;
phonemacro 10:0b940aff3bb8 194 k = 0;
phonemacro 10:0b940aff3bb8 195 for (i = 0; i < (challengeLen/4); i++) {
phonemacro 10:0b940aff3bb8 196 for (j = 3; j >= 0; j--) {
phonemacro 10:0b940aff3bb8 197 outData[j+(i*4)] = inData[k];
phonemacro 10:0b940aff3bb8 198 // printf("%02X ",inData[k]);
phonemacro 10:0b940aff3bb8 199 k++;
phonemacro 10:0b940aff3bb8 200 }
phonemacro 10:0b940aff3bb8 201 // printf("\r\n");
phonemacro 10:0b940aff3bb8 202 }
phonemacro 10:0b940aff3bb8 203 for (i=0; i < challengeLen; i++) {
phonemacro 10:0b940aff3bb8 204 // if (!(i % 4))
phonemacro 10:0b940aff3bb8 205 // printf("\r\n ");
phonemacro 10:0b940aff3bb8 206 // printf("%02X ",outData[i]);
phonemacro 10:0b940aff3bb8 207 }
phonemacro 10:0b940aff3bb8 208 }
phonemacro 7:5b7f7ec9efe0 209
phonemacro 7:5b7f7ec9efe0 210
phonemacro 16:d0f8cf9f160d 211 void executeSha256(MAX8614X &m, uint8_t *challenge, unsigned int challengeLen, bool romID, uint32_t *response)
phonemacro 7:5b7f7ec9efe0 212 {
phonemacro 10:0b940aff3bb8 213 int i, j, k;
phonemacro 7:5b7f7ec9efe0 214 uint8_t macData[256];
phonemacro 10:0b940aff3bb8 215 uint8_t inData[256];
phonemacro 7:5b7f7ec9efe0 216 uint8_t xData[256];
phonemacro 10:0b940aff3bb8 217 uint32_t x32Data[64];
phonemacro 7:5b7f7ec9efe0 218 uint32_t tmpData;
phonemacro 10:0b940aff3bb8 219 const unsigned int responseLen32 = 8;
phonemacro 7:5b7f7ec9efe0 220 uint8_t data[5];
phonemacro 11:ec7998257ec2 221
phonemacro 13:97854f761347 222 //- Enable SHA_DONE Interrupt
phonemacro 7:5b7f7ec9efe0 223 m.writeRegister(MAX8614X::MAX8614X_INT_ENABLE2_REG, MAX8614X::MAX8614X_IE_SHA_DONE_EN);
phonemacro 7:5b7f7ec9efe0 224
phonemacro 7:5b7f7ec9efe0 225 m.writeRegister(MAX8614X::MAX8614X_INT_ENABLE1_REG, 0); // Disable all other interrupts
phonemacro 7:5b7f7ec9efe0 226
phonemacro 13:97854f761347 227 //- Enable SHA_EN bit.
phonemacro 7:5b7f7ec9efe0 228 m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG,MAX8614X::MAX8614X_SHACFG_SHA_EN);
phonemacro 7:5b7f7ec9efe0 229
phonemacro 13:97854f761347 230 //- Write 160-bit random challenge value to RAM using registers MEM_IDX and MEM_DATA.
phonemacro 7:5b7f7ec9efe0 231 // Enable Memory Write, Select Bank 0, address 0x00 to 0xFF
phonemacro 7:5b7f7ec9efe0 232 m.writeRegister(MAX8614X::MAX8614X_MEMORY_CONTROL_REG, MAX8614X::MAX8614X_MEMCNTRL_WR_EN_MASK | MAX8614X::MAX8614X_MEMCNTRL_BANK0_MASK);
phonemacro 7:5b7f7ec9efe0 233
phonemacro 7:5b7f7ec9efe0 234 printf("\r\n Raw Input Data\r\n\r\n");
phonemacro 7:5b7f7ec9efe0 235 for (i = 0; i < challengeLen; i++) {
phonemacro 10:0b940aff3bb8 236 if (!(i % 4))
phonemacro 10:0b940aff3bb8 237 printf("\r\n ");
phonemacro 10:0b940aff3bb8 238 printf("%02x", challenge[i]);
phonemacro 7:5b7f7ec9efe0 239 }
phonemacro 7:5b7f7ec9efe0 240 printf("\r\n");
phonemacro 10:0b940aff3bb8 241 #if 0
phonemacro 7:5b7f7ec9efe0 242 k = 0;
phonemacro 10:0b940aff3bb8 243 for (i = 0; i < (challengeLen/4); i++) {
phonemacro 10:0b940aff3bb8 244 for (j = 3; j >= 0; j--) {
phonemacro 10:0b940aff3bb8 245
phonemacro 10:0b940aff3bb8 246 inData[j+(i*4)] = challenge[k];
phonemacro 10:0b940aff3bb8 247 k++;
phonemacro 7:5b7f7ec9efe0 248 }
phonemacro 10:0b940aff3bb8 249 }
phonemacro 10:0b940aff3bb8 250 #endif
phonemacro 10:0b940aff3bb8 251
phonemacro 10:0b940aff3bb8 252 transformData(challenge, xData, challengeLen);
phonemacro 7:5b7f7ec9efe0 253
phonemacro 7:5b7f7ec9efe0 254 printf("\r\n Transformed Input Data\r\n\r\n");
phonemacro 10:0b940aff3bb8 255 for (i = 0; i < challengeLen; i++) {
phonemacro 7:5b7f7ec9efe0 256 if (!(i % 4))
phonemacro 7:5b7f7ec9efe0 257 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 258 printf("%02x", xData[i]);
phonemacro 7:5b7f7ec9efe0 259 }
phonemacro 7:5b7f7ec9efe0 260 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 261 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 262
phonemacro 10:0b940aff3bb8 263 for (i = 0; i < (challengeLen); i++) {
phonemacro 7:5b7f7ec9efe0 264 m.writeRegister(MAX8614X::MAX8614X_MEMORY_INDEX_REG, i);
phonemacro 7:5b7f7ec9efe0 265 m.writeRegister(MAX8614X::MAX8614X_MEMORY_DATA_REG, xData[i]);
phonemacro 10:0b940aff3bb8 266 //}
phonemacro 10:0b940aff3bb8 267 }
phonemacro 7:5b7f7ec9efe0 268 printf("%\r\n");
phonemacro 7:5b7f7ec9efe0 269 // The message block consists of a 160-bit secret, a 160-bit challenge and 192 bits of constant data. Optionally, the 64-bit
phonemacro 7:5b7f7ec9efe0 270 // ROM ID replaces 64 of the 192 bits of constant data used in the hash operation. 16 bits out of the 160-bit secret and 16
phonemacro 7:5b7f7ec9efe0 271 // bits of ROM ID are programmable–8 bits each in metal and 8 bits each in OTP bits
phonemacro 13:97854f761347 272 //- Write command, with ROM ID (0x35) or without ROM ID (0x36), to SHA_CMD register
phonemacro 12:fc888315e5fd 273 if (romID) {
phonemacro 12:fc888315e5fd 274 printf("ROMID \r\n");
phonemacro 13:97854f761347 275 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG, MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID);
phonemacro 12:fc888315e5fd 276 m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG, MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID);
phonemacro 17:e260080d3468 277 // wait(1);
phonemacro 12:fc888315e5fd 278 }
phonemacro 12:fc888315e5fd 279 else
phonemacro 12:fc888315e5fd 280 {
phonemacro 12:fc888315e5fd 281 printf("no ROMID \r\n");
phonemacro 13:97854f761347 282 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID);
phonemacro 12:fc888315e5fd 283 m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID);
phonemacro 17:e260080d3468 284 // wait(1);
phonemacro 12:fc888315e5fd 285 }
phonemacro 12:fc888315e5fd 286
phonemacro 12:fc888315e5fd 287
phonemacro 12:fc888315e5fd 288 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_ROM_ID);
phonemacro 7:5b7f7ec9efe0 289 // m.writeRegister(MAX8614X::MAX8614X_SHA_CMD_REG,MAX8614X::MAX8614X_SHACMD_MAC_NO_ROM_ID);
phonemacro 7:5b7f7ec9efe0 290
phonemacro 7:5b7f7ec9efe0 291
phonemacro 10:0b940aff3bb8 292 m.readRegister(MAX8614X::MAX8614X_SHA_CMD_REG, data, 1);
phonemacro 14:1939758a03cf 293 /// printf("sha cmd reg should be 0x35 mac rom id, reg %02X = %02X\r\n", MAX8614X::MAX8614X_SHA_CMD_REG, data[0]);
phonemacro 10:0b940aff3bb8 294 m.readRegister(MAX8614X::MAX8614X_INT_STATUS2_REG, data, 1);
phonemacro 14:1939758a03cf 295 /// printf("int status2, reg %02X = %X\r\n", MAX8614X::MAX8614X_INT_STATUS2_REG, data[0]);
phonemacro 7:5b7f7ec9efe0 296 //● Write 1 to SHA_START and 1 to SHA_EN bit.
phonemacro 7:5b7f7ec9efe0 297 m.writeRegister(MAX8614X::MAX8614X_SHA_CFG_REG,MAX8614X::MAX8614X_SHACFG_SHA_EN | MAX8614X::MAX8614X_SHACFG_SHA_START);
phonemacro 10:0b940aff3bb8 298 m.readRegister(MAX8614X::MAX8614X_SHA_CFG_REG, data, 1);
phonemacro 14:1939758a03cf 299 /// printf("sha CFG reg should be 0x3, reg %02X = %02X\r\n", MAX8614X::MAX8614X_SHA_CFG_REG, data[0]);
phonemacro 7:5b7f7ec9efe0 300
phonemacro 10:0b940aff3bb8 301 //● Wait for SHA_DONE interrupt.
phonemacro 7:5b7f7ec9efe0 302 data[0] = 0;
phonemacro 17:e260080d3468 303 k = 0;
phonemacro 17:e260080d3468 304 while(!data[0] && k < 100) {
phonemacro 7:5b7f7ec9efe0 305 m.readRegister(MAX8614X::MAX8614X_INT_STATUS2_REG, data, 1);
phonemacro 17:e260080d3468 306 k++;
phonemacro 7:5b7f7ec9efe0 307 }
phonemacro 7:5b7f7ec9efe0 308 // ● Read 256 MAC value from RAM using registers MEM_IDX and MEM_DATA.
phonemacro 10:0b940aff3bb8 309 printf("\r\n Raw Output\r\n\r\n");
phonemacro 7:5b7f7ec9efe0 310 for (i = 64; i < 64+32; i++) {
phonemacro 7:5b7f7ec9efe0 311 if (!(i % 4))
phonemacro 7:5b7f7ec9efe0 312 printf("\r\n ");
phonemacro 7:5b7f7ec9efe0 313 m.writeRegister(MAX8614X::MAX8614X_MEMORY_INDEX_REG, i);
phonemacro 7:5b7f7ec9efe0 314 m.readRegister(MAX8614X::MAX8614X_MEMORY_DATA_REG, data, 1);
phonemacro 10:0b940aff3bb8 315 xData[i-64] = data[0];
phonemacro 7:5b7f7ec9efe0 316 printf("%02x", data[0]);
phonemacro 7:5b7f7ec9efe0 317 }
phonemacro 10:0b940aff3bb8 318 printf("%\r\n");
phonemacro 10:0b940aff3bb8 319
phonemacro 10:0b940aff3bb8 320 transformData(xData,macData, 32);
phonemacro 10:0b940aff3bb8 321 #if 0
phonemacro 10:0b940aff3bb8 322 printf("\r\n Formatted Response\r\n\r\n");
phonemacro 10:0b940aff3bb8 323 for (i = 0; i < 32; i++) {
phonemacro 10:0b940aff3bb8 324 if (!(i % 4))
phonemacro 10:0b940aff3bb8 325 printf("\r\n ");
phonemacro 10:0b940aff3bb8 326 printf("%02x", macData[i]);
phonemacro 10:0b940aff3bb8 327 }
phonemacro 10:0b940aff3bb8 328 printf("\r\n\r\n");
phonemacro 10:0b940aff3bb8 329
phonemacro 10:0b940aff3bb8 330 #endif
phonemacro 10:0b940aff3bb8 331 // transform data to Little-Endian
phonemacro 10:0b940aff3bb8 332 k = 0;
phonemacro 10:0b940aff3bb8 333 for (i = 0; i < (responseLen32); i++) {
phonemacro 10:0b940aff3bb8 334 tmpData = challenge[i];
phonemacro 10:0b940aff3bb8 335 x32Data[i] = 0;
phonemacro 10:0b940aff3bb8 336 for (j = 3; j >= 0; j--) {
phonemacro 10:0b940aff3bb8 337 x32Data[i] = x32Data[i] << 8;
phonemacro 10:0b940aff3bb8 338 x32Data[i] |= macData[k] & 0xFF;
phonemacro 10:0b940aff3bb8 339 k++;
phonemacro 10:0b940aff3bb8 340 }
phonemacro 10:0b940aff3bb8 341
phonemacro 10:0b940aff3bb8 342 }
phonemacro 10:0b940aff3bb8 343
phonemacro 10:0b940aff3bb8 344 printf("\r\n Formatted Response\r\n\r\n");
phonemacro 10:0b940aff3bb8 345 for (i = 0; i < responseLen32; i++) {
phonemacro 10:0b940aff3bb8 346 printf(" %08X \r\n",x32Data[i]);
phonemacro 16:d0f8cf9f160d 347 response[i] = x32Data[i];
phonemacro 10:0b940aff3bb8 348 }
phonemacro 10:0b940aff3bb8 349
phonemacro 10:0b940aff3bb8 350
phonemacro 7:5b7f7ec9efe0 351 }