/*
|
* Copyright (c) 2019-2023 Beijing Hanwei Innovation Technology Ltd. Co. and
|
* its subsidiaries and affiliates (collectly called MKSEMI).
|
*
|
* All rights reserved.
|
*
|
* Redistribution and use in source and binary forms, with or without
|
* modification, are permitted provided that the following conditions are met:
|
*
|
* 1. Redistributions of source code must retain the above copyright notice,
|
* this list of conditions and the following disclaimer.
|
*
|
* 2. Redistributions in binary form, except as embedded into an MKSEMI
|
* integrated circuit in a product or a software update for such product,
|
* must reproduce the above copyright notice, this list of conditions and
|
* the following disclaimer in the documentation and/or other materials
|
* provided with the distribution.
|
*
|
* 3. Neither the name of MKSEMI nor the names of its contributors may be used
|
* to endorse or promote products derived from this software without
|
* specific prior written permission.
|
*
|
* 4. This software, with or without modification, must only be used with a
|
* MKSEMI integrated circuit.
|
*
|
* 5. Any software provided in binary form under this license must not be
|
* reverse engineered, decompiled, modified and/or disassembled.
|
*
|
* THIS SOFTWARE IS PROVIDED BY MKSEMI "AS IS" AND ANY EXPRESS OR IMPLIED
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
* MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
* DISCLAIMED. IN NO EVENT SHALL MKSEMI OR CONTRIBUTORS BE LIABLE FOR ANY
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
*/
|
|
#include "mk_aes.h"
|
#include "mk_trace.h"
|
#include "mk_reset.h"
|
#include "mk_calib.h"
|
#include "mk_wdt.h"
|
#include "libc_rom.h"
|
#include "board.h"
|
|
// Key: 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32 0x32
|
|
// 0123456789987654
|
static uint8_t ecb_input[16] = {0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x39, 0x38, 0x37, 0x36, 0x35, 0x34};
|
static uint8_t ecb_cipher[16] = {0xCE, 0xA0, 0x69, 0x6A, 0xF8, 0xAE, 0xF4, 0x01, 0x83, 0x34, 0x42, 0xA0, 0x2F, 0x89, 0x07, 0x76};
|
static uint8_t ecb_output[16];
|
|
// plaintext: ABCDEFGHIJKLMNOP
|
static uint8_t cbc_input[16] = {0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x4B, 0x4C, 0x4D, 0x4E, 0x4F, 0x50};
|
static uint8_t cbc_iv[16] = {0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30};
|
static uint8_t cbc_cipher[16] = {0x9D, 0x53, 0xBB, 0xEF, 0x51, 0x0F, 0xEC, 0xD4, 0x4D, 0xC7, 0xAC, 0xD7, 0x94, 0x9F, 0xE7, 0x0D};
|
static uint8_t cbc_output[16];
|
|
// plaintext: ABCDEFGHIJKLMNOP
|
static uint8_t ctr_input[16] = {0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x4B, 0x4C, 0x4D, 0x4E, 0x4F, 0x50};
|
static uint8_t ctr_cipher[16] = {0xAF, 0xBC, 0x2F, 0xC0, 0xB8, 0xFB, 0x5E, 0x99, 0x7E, 0xC3, 0x19, 0x5E, 0xE8, 0xFF, 0x31, 0x32};
|
static uint8_t ctr_initial_counter[16] = {0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30};
|
static uint8_t ctr_output[16];
|
|
static uint8_t nonce[13] = {0xAC, 0xDE, 0x48, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x09, 0x05};
|
// additional authenticated data
|
static uint8_t auth_data[30] = {0x4A, 0xEF, 0x02, 0x00, 0x00, 0x00, 0x00, 0x48, 0xDE, 0xAC, 0x01, 0x00, 0x00, 0x00, 0x00,
|
0x48, 0xDE, 0xAC, 0x0D, 0x09, 0x00, 0x00, 0x00, 0x01, 0x02, 0x0F, 0x01, 0x00, 0x80, 0x3F};
|
// Plaintext Data
|
static uint8_t plaintext_data[3] = {0x41, 0x43, 0x4B};
|
|
// AuthData = AddAuthData || PlaintextData
|
// sizeof(Authdata) >= sizeof(auth_data) + sizeof(plaintext_data) + 18
|
static uint8_t AuthData[60] = {0};
|
|
// Cipher Data||Encrypted Authentication Tag Data (Length of Tag-Data = mac_size)
|
static uint8_t cipher_data[] = {0x0B, 0xC7, 0x5A, 0xFE, 0x9f, 0xCF, 0xFB};
|
|
// output buffer
|
// Security level 5: ENC-MIC-32 ==> mac_size = 4
|
// Security level 6: ENC-MIC-64 ==> mac_size = 8
|
// Security level 7: ENC-MIC-128 ==> mac_size = 16
|
static uint8_t mac_size = 4;
|
|
// sizeof(output) >= sizeof(plaintext_data) + mac_size
|
static uint8_t output[20];
|
|
static struct AES_CCM_CONTEXT_T cxt;
|
|
volatile static uint8_t aes_done = 0;
|
|
static void aes_ecb_callback(void *dev, uint32_t len)
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES ECB done, len = %d\r\n", len);
|
|
for (uint32_t i = 0; i < len; i++)
|
{
|
if (ecb_cipher[i] != ecb_output[i])
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES ECB result does not match\r\n");
|
break;
|
}
|
}
|
|
aes_done = 1;
|
}
|
|
static void aes_cbc_callback(void *dev, uint32_t len)
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CBC done, len = %d\r\n", len);
|
for (uint32_t i = 0; i < len; i++)
|
{
|
if (cbc_cipher[i] != cbc_output[i])
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CBC result does not match\r\n");
|
break;
|
}
|
}
|
|
aes_done = 1;
|
}
|
|
static void aes_ctr_callback(void *dev, uint32_t len)
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CTR done, len = %d\r\n", len);
|
for (uint32_t i = 0; i < len; i++)
|
{
|
if (ctr_cipher[i] != ctr_output[i])
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CTR result does not match\r\n");
|
break;
|
}
|
}
|
|
aes_done = 1;
|
}
|
|
static void aes_ccm_encypt_callback(void *dev, uint32_t len)
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CCM ENCYPT done, Cipher Data len = %d,", len - mac_size);
|
LOG_INFO(TRACE_MODULE_APP | TRACE_NO_OPTION, "Tag-Data len = %d\r\n", mac_size);
|
for (uint32_t i = 0; i < len; i++)
|
{
|
if (cipher_data[i] != output[i])
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CCM result does not match\r\n");
|
break;
|
}
|
}
|
|
aes_done = 1;
|
}
|
|
static void aes_ccm_decrypt_callback(void *dev, uint32_t len)
|
{
|
for (uint32_t i = 0; i < len; i++)
|
{
|
if (plaintext_data[i] != output[i])
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CCM DECRYPT result does not match\r\n");
|
break;
|
}
|
}
|
|
if (AES_MIN_VALID == aes_ccm_dec_mic_isvalid(AES_ID0))
|
{
|
LOG_INFO(TRACE_MODULE_APP, "AES CCM DECRYPT done, Plaintext Data len = %d\r\n", len);
|
LOG_INFO(TRACE_MODULE_APP, "MACTag verification is valid\r\n");
|
}
|
else
|
{
|
LOG_INFO(TRACE_MODULE_APP, "MACTag verification is invalid\r\n");
|
}
|
|
aes_done = 1;
|
}
|
|
static struct AES_CFG_T usr_aes_cfg = {
|
.key = {0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32, 0x32},
|
.int_en = false,
|
.dma_en = true,
|
.din_burst_size = 1,
|
.dout_burst_size = 1,
|
};
|
|
int main(void)
|
{
|
board_clock_run();
|
board_pins_config();
|
board_debug_console_open(TRACE_PORT_UART0);
|
// Reset reason
|
reset_cause_get();
|
reset_cause_clear();
|
|
// Chip calibration
|
calib_chip();
|
|
// Disable watchdog timer
|
wdt_close(WDT_ID0);
|
LOG_INFO(TRACE_MODULE_APP, "AES example\r\n");
|
|
gpio_open();
|
board_configure();
|
|
aes_open(AES_ID0, &usr_aes_cfg);
|
|
aes_done = 0;
|
aes_crypt_ecb(AES_ID0, AES_DIR_ENCRYPT, ecb_input, ecb_output, 16, aes_ecb_callback);
|
while (aes_done == 0)
|
{
|
}
|
aes_done = 0;
|
aes_crypt_cbc(AES_ID0, AES_DIR_ENCRYPT, cbc_iv, cbc_input, cbc_output, 16, aes_cbc_callback);
|
while (aes_done == 0)
|
{
|
}
|
|
aes_done = 0;
|
aes_crypt_ctr(AES_ID0, ctr_initial_counter, ctr_input, ctr_output, 16, aes_ctr_callback);
|
while (aes_done == 0)
|
{
|
}
|
|
uint8_t tmp_key[16] = {0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf};
|
aes_update_key(AES_ID0, tmp_key);
|
aes_done = 0;
|
cxt.adata = auth_data;
|
cxt.adata_len = sizeof(auth_data);
|
cxt.data_in = plaintext_data;
|
cxt.data_in_len = sizeof(plaintext_data);
|
cxt.nonce = nonce;
|
// CCM nonce size [7 ... 13]
|
cxt.nonce_size = sizeof(nonce);
|
cxt.input_buf = AuthData;
|
// input_buf_size >= adata_len + data_in_len + 18
|
cxt.input_buf_size = sizeof(AuthData);
|
cxt.output_buf = output;
|
// Encrypt mode: output_buf_size >= data_in_len + mac_size
|
// Decrypt mode: output_buf_size >= data_in_len - mac_size
|
cxt.output_buf_size = sizeof(output);
|
|
// CCM mac size [4, 6, 8, 10, 12, 14, 16]
|
// CCM* mac size [0, 4, 8, 16]
|
cxt.mac_size = mac_size;
|
aes_crypt_ccm(AES_ID0, AES_CCM_STAR_ENCRYPT_AND_AUTH, &cxt, aes_ccm_encypt_callback);
|
while (aes_done == 0)
|
{
|
}
|
|
aes_done = 0;
|
cxt.adata = auth_data;
|
cxt.adata_len = sizeof(auth_data);
|
cxt.data_in = cipher_data;
|
cxt.data_in_len = sizeof(cipher_data);
|
cxt.nonce = nonce;
|
cxt.nonce_size = sizeof(nonce);
|
cxt.input_buf = AuthData;
|
cxt.input_buf_size = sizeof(AuthData);
|
cxt.output_buf = output;
|
cxt.output_buf_size = sizeof(output);
|
cxt.mac_size = mac_size;
|
aes_crypt_ccm(AES_ID0, AES_CCM_STAR_DECRYPT_AND_AUTH, &cxt, aes_ccm_decrypt_callback);
|
while (aes_done == 0)
|
{
|
}
|
|
LOG_INFO(TRACE_MODULE_APP, "End of AES example\r\n");
|
|
while (1)
|
{
|
}
|
}
|