Cryptoverifyaescmac; Table 12-10: Cryptocomputeaescmac Command Example; Table 12-11: Cryptocomputeaescmac Response Example; Table 12-12: Cryptoverifyaescmac Command - Semtech LR1110 User Manual

Hide thumbs Also See for LR1110:
Table of Contents

Advertisement

For example, when using the test vectors of the RFC4493 example 2, we would have:
Message: 6bc1bee2 2e409f96 e93d7e11 7393172a (N=16)
MIC: 070a16b4
Therefore, the CryptoComputeAesCmac( ) command and response will be:

Table 12-10: CryptoComputeAesCmac Command Example

Byte
Data from Host
Data to Host

Table 12-11: CryptoComputeAesCmac Response Example

Byte
0
Data from Host
0x00
Data to Host
Stat1

12.3.6 CryptoVerifyAesCmac

The command CryptoVerifyAesCmac( ) will compute the AES CMAC of the provided data using the specified Key, and
compare the provided MIC with the actual calculated MIC (first 4 bytes of the CMAC).

Table 12-12: CryptoVerifyAesCmac Command

Byte
0
Data from Host
0x05
Data to Host
Stat1

Table 12-13: CryptoVerifyAesCmac

Byte
Data from Host
Data to Host
KeyID: specified Key ID, as defined in
ExpectedMIC: Provided MIC (first 4 bytes of the CMAC).
LR1110
User Manual
Rev.1.0
UM.LR1110.W.APP
March 2020
0
1
KeyID
0x05
0x05
(7:0)
IrqStatus
Stat1
Stat2
(31:24)
1
0x00
CEStatus
1
2
3
Exp.
KeyID
0x06
(7:0)
MIC1
Irq
Irq
Stat2
Status
Status
(31:24)
(23:16)
0
1
0x00
0x00
Stat1
CEStatus
Table 12-1: Cryptographic Keys Usage and
www.semtech.com
2
3
4
0x6b
0xc1
IrqStatus
IrqStatus
(23:16)
(15:8)
2
3
0x00
0x00
0x07
0x0a
4
5
Exp.
Exp
MIC2
MIC3
Irq
Irq
Status
Status
(15:8)
(7:0)
5
...
0xbe
...
IrqStatus
...
(7:0)
4
0x00
0x16
6
7
...
Exp
Data1
...
MIC4
0x00
0x00
...
Derivation. Goes from 0 to 27.
N+3
0x2a
0x00
5
0x00
0xb4
N+7
DataN
0x00
110 of 130
Semtech

Advertisement

Table of Contents
loading

Table of Contents