add rotary
Dependencies: X_NUCLEO_IKS01A1 LoRaWAN-lib SX1272Lib mbed
Fork of Canada-SX1272-LoRaWAN-Bootcamp by
LoRaWAN-SX1272-Mbed-Shield
Overview
LoRaWAN-SX1272-Mbed-Shield application demo is a LoRaWAN Class-A device example project using LoRaWAN-lib and SX1272Lib libraries that send out sensors data.
Prerequisites
1. NUCLEO_L152RE board.
2. SX1272-mbed-shield board.
3. X-NUCLEO-IKS01A1.
4. Grove Red LED.
5. Grove Button.
6. Grove Rotary Angle Sensor.
7. mbed online compiler.
8. Tera Term.
Hardware Configuration
Application 8, 9, 11
1. Connect NUCLEO_L152RE with X-NUCLEO-IKS01A1.
2. On top of X-NUCLEO-IKS01A1, connect SX1272-mbed-shield.
Application 13
1. Connect NUCLEO_L152RE with SX1272-mbed-shield.
2. Connect Grove Red LED with DIO_D6 port on SX1272-mbed-shield.
3. Connect Grove Button with DIO_D8 port on SX1272-mbed-shield.
4. Connect Grove Rotary Angle Sensor with ANA_A1 port SX1272-mbed-shield.
Software Configuration
The end-device must be configured with the following parameters:
- Commissioning.h
- Activation Type: OTA or ABP
- OTA: #define OVER_THE_AIR_ACTIVATION 1
- Network Type: Public or Private
- Public: #define LORAWAN_PUBLIC_NETWORK true
- LORAWAN_DEVICE_EUI (8 Bytes) : Fist 3 Bytes is the Organizationally Unique Identifier (OUI) followed by 5 bytes of unique ID. If not defined by user, then the firmware automatically assigns one to the end-device. (For OTA)
- #define IEEE_OUI 0x00, 0x00, 0x00
- #define LORAWAN_DEVICE_EUI { IEEE_OUI, 0x00, 0x00, 0x00, 0x00, 0x00 }
- #define IEEE_OUI 0x00, 0x00, 0x00
- LORAWAN_APPLICATION_EUI (8 Bytes) (For OTA)
- #define LORAWAN_APPLICATION_EUI { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }
- LORAWAN_APPLICATION_KEY (16 Bytes) (For OTA)
- #define LORAWAN_APPLICATION_KEY { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }
- #define LORAWAN_APPLICATION_KEY { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }
- LORAWAN_DEVICE_ADDRESS (For ABP)
- #define LORAWAN_DEVICE_ADDRESS ( uint32_t )0x0
- LORAWAN_NWKSKEY (For ABP)
- #define LORAWAN_NWKSKEY { 0x2B, 0x7E, 0x15, 0x16, 0x28, 0xAE, 0xD2, 0xA6, 0xAB, 0xF7, 0x15, 0x88, 0x09, 0xCF, 0x4F, 0x3C }
- LORAWAN_APPSKEY (For ABP)
- #define LORAWAN_APPSKEY { 0x2B, 0x7E, 0x15, 0x16, 0x28, 0xAE, 0xD2, 0xA6, 0xAB, 0xF7, 0x15, 0x88, 0x09, 0xCF, 0x4F, 0x3C }
- Activation Type: OTA or ABP
- Configure.h
- Communication Type: Hybrid or FHSS
- Hybrid: #define USE_BAND_915_HYBRID
- Join request Period:
- 5 sec: #define OVER_THE_AIR_ACTIVATION_DUTYCYCLE 5000000 value in us
- TX Period:
- 5 sec: #define APP_TX_DUTYCYCLE 5000000 value in us
- Uplink message: Confirmed or Unconfirmed
- Confirmed: #define LORAWAN_CONFIRMED_MSG_ON 1
- ADR(Adaptive Data Rate): ON or OFF
- OFF: #define LORAWAN_ADR_ON 0
- Default data rate: DR_0 or DR_1 or DR_2 or DR_3 or DR_4
- DR_0: #define LORAWAN_DEFAULT_DATARATE DR_0
- Application Type: 8 (IKS01A1) or 9 (IKS01A1+Cayenne) or 11 (Push Button) or 13 (rotary+Cayenne)
- 9: #define LORAWAN_APP_PORT 9
- Tx Power: 10 to 30
- 20 dBm: #define LORAWAN_TX_POWER TX_POWER_20_DBM
- Communication Type: Hybrid or FHSS
Serial Terminal Display
- Use Tera Term to see the sending message (baud rate: 115200):
- button = 0 (if not press) button = 1 (if pressed)
- rotary = 0 ~ 300
- button = 0 (if not press) button = 1 (if pressed)
system/crypto/aes.h@0:6cc76d70e2a1, 2017-04-06 (annotated)
- Committer:
- ubhat
- Date:
- Thu Apr 06 21:59:50 2017 +0000
- Revision:
- 0:6cc76d70e2a1
LoRaWAN SX1272 Application
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
ubhat | 0:6cc76d70e2a1 | 1 | /* |
ubhat | 0:6cc76d70e2a1 | 2 | --------------------------------------------------------------------------- |
ubhat | 0:6cc76d70e2a1 | 3 | Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved. |
ubhat | 0:6cc76d70e2a1 | 4 | |
ubhat | 0:6cc76d70e2a1 | 5 | LICENSE TERMS |
ubhat | 0:6cc76d70e2a1 | 6 | |
ubhat | 0:6cc76d70e2a1 | 7 | The redistribution and use of this software (with or without changes) |
ubhat | 0:6cc76d70e2a1 | 8 | is allowed without the payment of fees or royalties provided that: |
ubhat | 0:6cc76d70e2a1 | 9 | |
ubhat | 0:6cc76d70e2a1 | 10 | 1. source code distributions include the above copyright notice, this |
ubhat | 0:6cc76d70e2a1 | 11 | list of conditions and the following disclaimer; |
ubhat | 0:6cc76d70e2a1 | 12 | |
ubhat | 0:6cc76d70e2a1 | 13 | 2. binary distributions include the above copyright notice, this list |
ubhat | 0:6cc76d70e2a1 | 14 | of conditions and the following disclaimer in their documentation; |
ubhat | 0:6cc76d70e2a1 | 15 | |
ubhat | 0:6cc76d70e2a1 | 16 | 3. the name of the copyright holder is not used to endorse products |
ubhat | 0:6cc76d70e2a1 | 17 | built using this software without specific written permission. |
ubhat | 0:6cc76d70e2a1 | 18 | |
ubhat | 0:6cc76d70e2a1 | 19 | DISCLAIMER |
ubhat | 0:6cc76d70e2a1 | 20 | |
ubhat | 0:6cc76d70e2a1 | 21 | This software is provided 'as is' with no explicit or implied warranties |
ubhat | 0:6cc76d70e2a1 | 22 | in respect of its properties, including, but not limited to, correctness |
ubhat | 0:6cc76d70e2a1 | 23 | and/or fitness for purpose. |
ubhat | 0:6cc76d70e2a1 | 24 | --------------------------------------------------------------------------- |
ubhat | 0:6cc76d70e2a1 | 25 | Issue 09/09/2006 |
ubhat | 0:6cc76d70e2a1 | 26 | |
ubhat | 0:6cc76d70e2a1 | 27 | This is an AES implementation that uses only 8-bit byte operations on the |
ubhat | 0:6cc76d70e2a1 | 28 | cipher state. |
ubhat | 0:6cc76d70e2a1 | 29 | */ |
ubhat | 0:6cc76d70e2a1 | 30 | |
ubhat | 0:6cc76d70e2a1 | 31 | #ifndef AES_H |
ubhat | 0:6cc76d70e2a1 | 32 | #define AES_H |
ubhat | 0:6cc76d70e2a1 | 33 | |
ubhat | 0:6cc76d70e2a1 | 34 | #if 1 |
ubhat | 0:6cc76d70e2a1 | 35 | # define AES_ENC_PREKEYED /* AES encryption with a precomputed key schedule */ |
ubhat | 0:6cc76d70e2a1 | 36 | #endif |
ubhat | 0:6cc76d70e2a1 | 37 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 38 | # define AES_DEC_PREKEYED /* AES decryption with a precomputed key schedule */ |
ubhat | 0:6cc76d70e2a1 | 39 | #endif |
ubhat | 0:6cc76d70e2a1 | 40 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 41 | # define AES_ENC_128_OTFK /* AES encryption with 'on the fly' 128 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 42 | #endif |
ubhat | 0:6cc76d70e2a1 | 43 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 44 | # define AES_DEC_128_OTFK /* AES decryption with 'on the fly' 128 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 45 | #endif |
ubhat | 0:6cc76d70e2a1 | 46 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 47 | # define AES_ENC_256_OTFK /* AES encryption with 'on the fly' 256 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 48 | #endif |
ubhat | 0:6cc76d70e2a1 | 49 | #if 0 |
ubhat | 0:6cc76d70e2a1 | 50 | # define AES_DEC_256_OTFK /* AES decryption with 'on the fly' 256 bit keying */ |
ubhat | 0:6cc76d70e2a1 | 51 | #endif |
ubhat | 0:6cc76d70e2a1 | 52 | |
ubhat | 0:6cc76d70e2a1 | 53 | #define N_ROW 4 |
ubhat | 0:6cc76d70e2a1 | 54 | #define N_COL 4 |
ubhat | 0:6cc76d70e2a1 | 55 | #define N_BLOCK (N_ROW * N_COL) |
ubhat | 0:6cc76d70e2a1 | 56 | #define N_MAX_ROUNDS 14 |
ubhat | 0:6cc76d70e2a1 | 57 | |
ubhat | 0:6cc76d70e2a1 | 58 | typedef uint8_t return_type; |
ubhat | 0:6cc76d70e2a1 | 59 | |
ubhat | 0:6cc76d70e2a1 | 60 | /* Warning: The key length for 256 bit keys overflows a byte |
ubhat | 0:6cc76d70e2a1 | 61 | (see comment below) |
ubhat | 0:6cc76d70e2a1 | 62 | */ |
ubhat | 0:6cc76d70e2a1 | 63 | |
ubhat | 0:6cc76d70e2a1 | 64 | typedef uint8_t length_type; |
ubhat | 0:6cc76d70e2a1 | 65 | |
ubhat | 0:6cc76d70e2a1 | 66 | typedef struct |
ubhat | 0:6cc76d70e2a1 | 67 | { uint8_t ksch[(N_MAX_ROUNDS + 1) * N_BLOCK]; |
ubhat | 0:6cc76d70e2a1 | 68 | uint8_t rnd; |
ubhat | 0:6cc76d70e2a1 | 69 | } aes_context; |
ubhat | 0:6cc76d70e2a1 | 70 | |
ubhat | 0:6cc76d70e2a1 | 71 | /* The following calls are for a precomputed key schedule |
ubhat | 0:6cc76d70e2a1 | 72 | |
ubhat | 0:6cc76d70e2a1 | 73 | NOTE: If the length_type used for the key length is an |
ubhat | 0:6cc76d70e2a1 | 74 | unsigned 8-bit character, a key length of 256 bits must |
ubhat | 0:6cc76d70e2a1 | 75 | be entered as a length in bytes (valid inputs are hence |
ubhat | 0:6cc76d70e2a1 | 76 | 128, 192, 16, 24 and 32). |
ubhat | 0:6cc76d70e2a1 | 77 | */ |
ubhat | 0:6cc76d70e2a1 | 78 | |
ubhat | 0:6cc76d70e2a1 | 79 | #if defined( AES_ENC_PREKEYED ) || defined( AES_DEC_PREKEYED ) |
ubhat | 0:6cc76d70e2a1 | 80 | |
ubhat | 0:6cc76d70e2a1 | 81 | return_type aes_set_key( const uint8_t key[], |
ubhat | 0:6cc76d70e2a1 | 82 | length_type keylen, |
ubhat | 0:6cc76d70e2a1 | 83 | aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 84 | #endif |
ubhat | 0:6cc76d70e2a1 | 85 | |
ubhat | 0:6cc76d70e2a1 | 86 | #if defined( AES_ENC_PREKEYED ) |
ubhat | 0:6cc76d70e2a1 | 87 | |
ubhat | 0:6cc76d70e2a1 | 88 | return_type aes_encrypt( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 89 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 90 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 91 | |
ubhat | 0:6cc76d70e2a1 | 92 | return_type aes_cbc_encrypt( const uint8_t *in, |
ubhat | 0:6cc76d70e2a1 | 93 | uint8_t *out, |
ubhat | 0:6cc76d70e2a1 | 94 | int32_t n_block, |
ubhat | 0:6cc76d70e2a1 | 95 | uint8_t iv[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 96 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 97 | #endif |
ubhat | 0:6cc76d70e2a1 | 98 | |
ubhat | 0:6cc76d70e2a1 | 99 | #if defined( AES_DEC_PREKEYED ) |
ubhat | 0:6cc76d70e2a1 | 100 | |
ubhat | 0:6cc76d70e2a1 | 101 | return_type aes_decrypt( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 102 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 103 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 104 | |
ubhat | 0:6cc76d70e2a1 | 105 | return_type aes_cbc_decrypt( const uint8_t *in, |
ubhat | 0:6cc76d70e2a1 | 106 | uint8_t *out, |
ubhat | 0:6cc76d70e2a1 | 107 | int32_t n_block, |
ubhat | 0:6cc76d70e2a1 | 108 | uint8_t iv[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 109 | const aes_context ctx[1] ); |
ubhat | 0:6cc76d70e2a1 | 110 | #endif |
ubhat | 0:6cc76d70e2a1 | 111 | |
ubhat | 0:6cc76d70e2a1 | 112 | /* The following calls are for 'on the fly' keying. In this case the |
ubhat | 0:6cc76d70e2a1 | 113 | encryption and decryption keys are different. |
ubhat | 0:6cc76d70e2a1 | 114 | |
ubhat | 0:6cc76d70e2a1 | 115 | The encryption subroutines take a key in an array of bytes in |
ubhat | 0:6cc76d70e2a1 | 116 | key[L] where L is 16, 24 or 32 bytes for key lengths of 128, |
ubhat | 0:6cc76d70e2a1 | 117 | 192, and 256 bits respectively. They then encrypts the input |
ubhat | 0:6cc76d70e2a1 | 118 | data, in[] with this key and put the reult in the output array |
ubhat | 0:6cc76d70e2a1 | 119 | out[]. In addition, the second key array, o_key[L], is used |
ubhat | 0:6cc76d70e2a1 | 120 | to output the key that is needed by the decryption subroutine |
ubhat | 0:6cc76d70e2a1 | 121 | to reverse the encryption operation. The two key arrays can |
ubhat | 0:6cc76d70e2a1 | 122 | be the same array but in this case the original key will be |
ubhat | 0:6cc76d70e2a1 | 123 | overwritten. |
ubhat | 0:6cc76d70e2a1 | 124 | |
ubhat | 0:6cc76d70e2a1 | 125 | In the same way, the decryption subroutines output keys that |
ubhat | 0:6cc76d70e2a1 | 126 | can be used to reverse their effect when used for encryption. |
ubhat | 0:6cc76d70e2a1 | 127 | |
ubhat | 0:6cc76d70e2a1 | 128 | Only 128 and 256 bit keys are supported in these 'on the fly' |
ubhat | 0:6cc76d70e2a1 | 129 | modes. |
ubhat | 0:6cc76d70e2a1 | 130 | */ |
ubhat | 0:6cc76d70e2a1 | 131 | |
ubhat | 0:6cc76d70e2a1 | 132 | #if defined( AES_ENC_128_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 133 | void aes_encrypt_128( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 134 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 135 | const uint8_t key[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 136 | uint8_t o_key[N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 137 | #endif |
ubhat | 0:6cc76d70e2a1 | 138 | |
ubhat | 0:6cc76d70e2a1 | 139 | #if defined( AES_DEC_128_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 140 | void aes_decrypt_128( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 141 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 142 | const uint8_t key[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 143 | uint8_t o_key[N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 144 | #endif |
ubhat | 0:6cc76d70e2a1 | 145 | |
ubhat | 0:6cc76d70e2a1 | 146 | #if defined( AES_ENC_256_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 147 | void aes_encrypt_256( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 148 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 149 | const uint8_t key[2 * N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 150 | uint8_t o_key[2 * N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 151 | #endif |
ubhat | 0:6cc76d70e2a1 | 152 | |
ubhat | 0:6cc76d70e2a1 | 153 | #if defined( AES_DEC_256_OTFK ) |
ubhat | 0:6cc76d70e2a1 | 154 | void aes_decrypt_256( const uint8_t in[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 155 | uint8_t out[N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 156 | const uint8_t key[2 * N_BLOCK], |
ubhat | 0:6cc76d70e2a1 | 157 | uint8_t o_key[2 * N_BLOCK] ); |
ubhat | 0:6cc76d70e2a1 | 158 | #endif |
ubhat | 0:6cc76d70e2a1 | 159 | |
ubhat | 0:6cc76d70e2a1 | 160 | #endif |