EEPROM for SX1272
Dependencies: X_NUCLEO_IKS01A1 driver_mbed_TH02 LoRaWAN-lib-v1_0_1 SX1272Lib mbed
Fork of Canada-SX1272-LoRaWAN-Bootcamp by
system/crypto/cmac.cpp@9:4c8f32a4044d, 2018-02-14 (annotated)
- Committer:
- terence304
- Date:
- Wed Feb 14 01:16:06 2018 +0000
- Revision:
- 9:4c8f32a4044d
- Parent:
- 0:6cc76d70e2a1
Update to support NUCLEO_L073RZ
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
ubhat | 0:6cc76d70e2a1 | 1 | /************************************************************************** |
ubhat | 0:6cc76d70e2a1 | 2 | Copyright (C) 2009 Lander Casado, Philippas Tsigas |
ubhat | 0:6cc76d70e2a1 | 3 | |
ubhat | 0:6cc76d70e2a1 | 4 | All rights reserved. |
ubhat | 0:6cc76d70e2a1 | 5 | |
ubhat | 0:6cc76d70e2a1 | 6 | Permission is hereby granted, free of charge, to any person obtaining |
ubhat | 0:6cc76d70e2a1 | 7 | a copy of this software and associated documentation files |
ubhat | 0:6cc76d70e2a1 | 8 | (the "Software"), to deal with the Software without restriction, including |
ubhat | 0:6cc76d70e2a1 | 9 | without limitation the rights to use, copy, modify, merge, publish, |
ubhat | 0:6cc76d70e2a1 | 10 | distribute, sublicense, and/or sell copies of the Software, and to |
ubhat | 0:6cc76d70e2a1 | 11 | permit persons to whom the Software is furnished to do so, subject to |
ubhat | 0:6cc76d70e2a1 | 12 | the following conditions: |
ubhat | 0:6cc76d70e2a1 | 13 | |
ubhat | 0:6cc76d70e2a1 | 14 | Redistributions of source code must retain the above copyright notice, |
ubhat | 0:6cc76d70e2a1 | 15 | this list of conditions and the following disclaimers. Redistributions in |
ubhat | 0:6cc76d70e2a1 | 16 | binary form must reproduce the above copyright notice, this list of |
ubhat | 0:6cc76d70e2a1 | 17 | conditions and the following disclaimers in the documentation and/or |
ubhat | 0:6cc76d70e2a1 | 18 | other materials provided with the distribution. |
ubhat | 0:6cc76d70e2a1 | 19 | |
ubhat | 0:6cc76d70e2a1 | 20 | In no event shall the authors or copyright holders be liable for any special, |
ubhat | 0:6cc76d70e2a1 | 21 | incidental, indirect or consequential damages of any kind, or any damages |
ubhat | 0:6cc76d70e2a1 | 22 | whatsoever resulting from loss of use, data or profits, whether or not |
ubhat | 0:6cc76d70e2a1 | 23 | advised of the possibility of damage, and on any theory of liability, |
ubhat | 0:6cc76d70e2a1 | 24 | arising out of or in connection with the use or performance of this software. |
ubhat | 0:6cc76d70e2a1 | 25 | |
ubhat | 0:6cc76d70e2a1 | 26 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
ubhat | 0:6cc76d70e2a1 | 27 | OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
ubhat | 0:6cc76d70e2a1 | 28 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
ubhat | 0:6cc76d70e2a1 | 29 | CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
ubhat | 0:6cc76d70e2a1 | 30 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING |
ubhat | 0:6cc76d70e2a1 | 31 | FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER |
ubhat | 0:6cc76d70e2a1 | 32 | DEALINGS WITH THE SOFTWARE |
ubhat | 0:6cc76d70e2a1 | 33 | |
ubhat | 0:6cc76d70e2a1 | 34 | *****************************************************************************/ |
ubhat | 0:6cc76d70e2a1 | 35 | //#include <sys/param.h> |
ubhat | 0:6cc76d70e2a1 | 36 | //#include <sys/systm.h> |
ubhat | 0:6cc76d70e2a1 | 37 | #include <stdint.h> |
ubhat | 0:6cc76d70e2a1 | 38 | #include "aes.h" |
ubhat | 0:6cc76d70e2a1 | 39 | #include "cmac.h" |
ubhat | 0:6cc76d70e2a1 | 40 | #include "utilities.h" |
ubhat | 0:6cc76d70e2a1 | 41 | |
ubhat | 0:6cc76d70e2a1 | 42 | #define LSHIFT(v, r) do { \ |
ubhat | 0:6cc76d70e2a1 | 43 | int32_t i; \ |
ubhat | 0:6cc76d70e2a1 | 44 | for (i = 0; i < 15; i++) \ |
ubhat | 0:6cc76d70e2a1 | 45 | (r)[i] = (v)[i] << 1 | (v)[i + 1] >> 7; \ |
ubhat | 0:6cc76d70e2a1 | 46 | (r)[15] = (v)[15] << 1; \ |
ubhat | 0:6cc76d70e2a1 | 47 | } while (0) |
ubhat | 0:6cc76d70e2a1 | 48 | |
ubhat | 0:6cc76d70e2a1 | 49 | #define XOR(v, r) do { \ |
ubhat | 0:6cc76d70e2a1 | 50 | int32_t i; \ |
ubhat | 0:6cc76d70e2a1 | 51 | for (i = 0; i < 16; i++) \ |
ubhat | 0:6cc76d70e2a1 | 52 | { \ |
ubhat | 0:6cc76d70e2a1 | 53 | (r)[i] = (r)[i] ^ (v)[i]; \ |
ubhat | 0:6cc76d70e2a1 | 54 | } \ |
ubhat | 0:6cc76d70e2a1 | 55 | } while (0) \ |
ubhat | 0:6cc76d70e2a1 | 56 | |
ubhat | 0:6cc76d70e2a1 | 57 | |
ubhat | 0:6cc76d70e2a1 | 58 | void AES_CMAC_Init(AES_CMAC_CTX *ctx) |
ubhat | 0:6cc76d70e2a1 | 59 | { |
ubhat | 0:6cc76d70e2a1 | 60 | memset1(ctx->X, 0, sizeof ctx->X); |
ubhat | 0:6cc76d70e2a1 | 61 | ctx->M_n = 0; |
ubhat | 0:6cc76d70e2a1 | 62 | memset1(ctx->rijndael.ksch, '\0', 240); |
ubhat | 0:6cc76d70e2a1 | 63 | } |
ubhat | 0:6cc76d70e2a1 | 64 | |
ubhat | 0:6cc76d70e2a1 | 65 | void AES_CMAC_SetKey(AES_CMAC_CTX *ctx, const uint8_t key[AES_CMAC_KEY_LENGTH]) |
ubhat | 0:6cc76d70e2a1 | 66 | { |
ubhat | 0:6cc76d70e2a1 | 67 | //rijndael_set_key_enc_only(&ctx->rijndael, key, 128); |
ubhat | 0:6cc76d70e2a1 | 68 | aes_set_key( key, AES_CMAC_KEY_LENGTH, &ctx->rijndael); |
ubhat | 0:6cc76d70e2a1 | 69 | } |
ubhat | 0:6cc76d70e2a1 | 70 | |
ubhat | 0:6cc76d70e2a1 | 71 | void AES_CMAC_Update(AES_CMAC_CTX *ctx, const uint8_t *data, uint32_t len) |
ubhat | 0:6cc76d70e2a1 | 72 | { |
ubhat | 0:6cc76d70e2a1 | 73 | uint32_t mlen; |
ubhat | 0:6cc76d70e2a1 | 74 | uint8_t in[16]; |
ubhat | 0:6cc76d70e2a1 | 75 | |
ubhat | 0:6cc76d70e2a1 | 76 | if (ctx->M_n > 0) { |
ubhat | 0:6cc76d70e2a1 | 77 | mlen = MIN(16 - ctx->M_n, len); |
ubhat | 0:6cc76d70e2a1 | 78 | memcpy1(ctx->M_last + ctx->M_n, data, mlen); |
ubhat | 0:6cc76d70e2a1 | 79 | ctx->M_n += mlen; |
ubhat | 0:6cc76d70e2a1 | 80 | if (ctx->M_n < 16 || len == mlen) |
ubhat | 0:6cc76d70e2a1 | 81 | return; |
ubhat | 0:6cc76d70e2a1 | 82 | XOR(ctx->M_last, ctx->X); |
ubhat | 0:6cc76d70e2a1 | 83 | //rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X); |
ubhat | 0:6cc76d70e2a1 | 84 | aes_encrypt( ctx->X, ctx->X, &ctx->rijndael); |
ubhat | 0:6cc76d70e2a1 | 85 | data += mlen; |
ubhat | 0:6cc76d70e2a1 | 86 | len -= mlen; |
ubhat | 0:6cc76d70e2a1 | 87 | } |
ubhat | 0:6cc76d70e2a1 | 88 | while (len > 16) { /* not last block */ |
ubhat | 0:6cc76d70e2a1 | 89 | |
ubhat | 0:6cc76d70e2a1 | 90 | XOR(data, ctx->X); |
ubhat | 0:6cc76d70e2a1 | 91 | //rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X); |
ubhat | 0:6cc76d70e2a1 | 92 | |
ubhat | 0:6cc76d70e2a1 | 93 | memcpy1(in, &ctx->X[0], 16); //Bestela ez du ondo iten |
ubhat | 0:6cc76d70e2a1 | 94 | aes_encrypt( in, in, &ctx->rijndael); |
ubhat | 0:6cc76d70e2a1 | 95 | memcpy1(&ctx->X[0], in, 16); |
ubhat | 0:6cc76d70e2a1 | 96 | |
ubhat | 0:6cc76d70e2a1 | 97 | data += 16; |
ubhat | 0:6cc76d70e2a1 | 98 | len -= 16; |
ubhat | 0:6cc76d70e2a1 | 99 | } |
ubhat | 0:6cc76d70e2a1 | 100 | /* potential last block, save it */ |
ubhat | 0:6cc76d70e2a1 | 101 | memcpy1(ctx->M_last, data, len); |
ubhat | 0:6cc76d70e2a1 | 102 | ctx->M_n = len; |
ubhat | 0:6cc76d70e2a1 | 103 | } |
ubhat | 0:6cc76d70e2a1 | 104 | |
ubhat | 0:6cc76d70e2a1 | 105 | void AES_CMAC_Final(uint8_t digest[AES_CMAC_DIGEST_LENGTH], AES_CMAC_CTX *ctx) |
ubhat | 0:6cc76d70e2a1 | 106 | { |
ubhat | 0:6cc76d70e2a1 | 107 | uint8_t K[16]; |
ubhat | 0:6cc76d70e2a1 | 108 | uint8_t in[16]; |
ubhat | 0:6cc76d70e2a1 | 109 | /* generate subkey K1 */ |
ubhat | 0:6cc76d70e2a1 | 110 | memset1(K, '\0', 16); |
ubhat | 0:6cc76d70e2a1 | 111 | |
ubhat | 0:6cc76d70e2a1 | 112 | //rijndael_encrypt(&ctx->rijndael, K, K); |
ubhat | 0:6cc76d70e2a1 | 113 | |
ubhat | 0:6cc76d70e2a1 | 114 | aes_encrypt( K, K, &ctx->rijndael); |
ubhat | 0:6cc76d70e2a1 | 115 | |
ubhat | 0:6cc76d70e2a1 | 116 | if (K[0] & 0x80) { |
ubhat | 0:6cc76d70e2a1 | 117 | LSHIFT(K, K); |
ubhat | 0:6cc76d70e2a1 | 118 | K[15] ^= 0x87; |
ubhat | 0:6cc76d70e2a1 | 119 | } else |
ubhat | 0:6cc76d70e2a1 | 120 | LSHIFT(K, K); |
ubhat | 0:6cc76d70e2a1 | 121 | |
ubhat | 0:6cc76d70e2a1 | 122 | |
ubhat | 0:6cc76d70e2a1 | 123 | if (ctx->M_n == 16) { |
ubhat | 0:6cc76d70e2a1 | 124 | /* last block was a complete block */ |
ubhat | 0:6cc76d70e2a1 | 125 | XOR(K, ctx->M_last); |
ubhat | 0:6cc76d70e2a1 | 126 | |
ubhat | 0:6cc76d70e2a1 | 127 | } else { |
ubhat | 0:6cc76d70e2a1 | 128 | /* generate subkey K2 */ |
ubhat | 0:6cc76d70e2a1 | 129 | if (K[0] & 0x80) { |
ubhat | 0:6cc76d70e2a1 | 130 | LSHIFT(K, K); |
ubhat | 0:6cc76d70e2a1 | 131 | K[15] ^= 0x87; |
ubhat | 0:6cc76d70e2a1 | 132 | } else |
ubhat | 0:6cc76d70e2a1 | 133 | LSHIFT(K, K); |
ubhat | 0:6cc76d70e2a1 | 134 | |
ubhat | 0:6cc76d70e2a1 | 135 | /* padding(M_last) */ |
ubhat | 0:6cc76d70e2a1 | 136 | ctx->M_last[ctx->M_n] = 0x80; |
ubhat | 0:6cc76d70e2a1 | 137 | while (++ctx->M_n < 16) |
ubhat | 0:6cc76d70e2a1 | 138 | ctx->M_last[ctx->M_n] = 0; |
ubhat | 0:6cc76d70e2a1 | 139 | |
ubhat | 0:6cc76d70e2a1 | 140 | XOR(K, ctx->M_last); |
ubhat | 0:6cc76d70e2a1 | 141 | |
ubhat | 0:6cc76d70e2a1 | 142 | |
ubhat | 0:6cc76d70e2a1 | 143 | } |
ubhat | 0:6cc76d70e2a1 | 144 | XOR(ctx->M_last, ctx->X); |
ubhat | 0:6cc76d70e2a1 | 145 | |
ubhat | 0:6cc76d70e2a1 | 146 | //rijndael_encrypt(&ctx->rijndael, ctx->X, digest); |
ubhat | 0:6cc76d70e2a1 | 147 | |
ubhat | 0:6cc76d70e2a1 | 148 | memcpy1(in, &ctx->X[0], 16); //Bestela ez du ondo iten |
ubhat | 0:6cc76d70e2a1 | 149 | aes_encrypt(in, digest, &ctx->rijndael); |
ubhat | 0:6cc76d70e2a1 | 150 | memset1(K, 0, sizeof K); |
ubhat | 0:6cc76d70e2a1 | 151 | |
ubhat | 0:6cc76d70e2a1 | 152 | } |
ubhat | 0:6cc76d70e2a1 | 153 |