For example, when using the test vectors of the RFC4493 example 2, we would have:
•
Message: 6bc1bee2 2e409f96 e93d7e11 7393172a (N=16)
•
MIC: 070a16b4
Therefore, the CryptoComputeAesCmac( ) command and response will be:
Table 12-10: CryptoComputeAesCmac Command Example
Byte
Data from Host
Data to Host
Table 12-11: CryptoComputeAesCmac Response Example
Byte
0
Data from Host
0x00
Data to Host
Stat1
12.3.6 CryptoVerifyAesCmac
The command CryptoVerifyAesCmac( ) will compute the AES CMAC of the provided data using the specified Key, and
compare the provided MIC with the actual calculated MIC (first 4 bytes of the CMAC).
Table 12-12: CryptoVerifyAesCmac Command
Byte
0
Data from Host
0x05
Data to Host
Stat1
Table 12-13: CryptoVerifyAesCmac
Byte
Data from Host
Data to Host
•
KeyID: specified Key ID, as defined in
•
ExpectedMIC: Provided MIC (first 4 bytes of the CMAC).
LR1110
User Manual
Rev.1.0
UM.LR1110.W.APP
March 2020
0
1
KeyID
0x05
0x05
(7:0)
IrqStatus
Stat1
Stat2
(31:24)
1
0x00
CEStatus
1
2
3
Exp.
KeyID
0x06
(7:0)
MIC1
Irq
Irq
Stat2
Status
Status
(31:24)
(23:16)
0
1
0x00
0x00
Stat1
CEStatus
Table 12-1: Cryptographic Keys Usage and
www.semtech.com
2
3
4
0x6b
0xc1
IrqStatus
IrqStatus
(23:16)
(15:8)
2
3
0x00
0x00
0x07
0x0a
4
5
Exp.
Exp
MIC2
MIC3
Irq
Irq
Status
Status
(15:8)
(7:0)
5
...
0xbe
...
IrqStatus
...
(7:0)
4
0x00
0x16
6
7
...
Exp
Data1
...
MIC4
0x00
0x00
...
Derivation. Goes from 0 to 27.
N+3
0x2a
0x00
5
0x00
0xb4
N+7
DataN
0x00
110 of 130
Semtech