Cryptocomputeaescmac; Table 10-8: Cryptocomputeaescmac Command; Table 10-9: Cryptocomputeaescmac Response; Table 10-10: Cryptocomputeaescmac Command Example - Semtech LR1121 User Manual

Table of Contents

Advertisement

10.3.5 CryptoComputeAesCmac

Command CryptoComputeAesCmac(...) computes the AES CMAC of the provided data using the specified Key and
returns the MIC.

Table 10-8: CryptoComputeAesCmac Command

Byte
0
Data from Host
0x05
Data to Host
Stat1

Table 10-9: CryptoComputeAesCmac Response

Byte
0
Data from Host
0x00
Data to Host
Stat1
KeyID: Specified Key ID, as defined in
Data1, Data2, ..., DataN: Provided data, considered as byte buffers.
CEStatus: Defined in section
MIC: Message Integrity Check (first 4 bytes of the CMAC).
For example, when using the test vectors of the RFC4493 example 2, we would have:
Message: 6BC1BEE2 2E409F96 E93D7E11 7393172A (N=16)
MIC: 070A16B4

Table 10-10: CryptoComputeAesCmac Command Example

Byte
0
Data from Host
0x05
Data to Host
Stat1

Table 10-11: CryptoComputeAesCmac Response Example

Byte
0
Data from Host
0x00
Data to Host
Stat1
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
1
2
0x05
KeyID (7:0)
IrqStatus
IrqStatus
Stat2
(31:24)
1
0x00
CEStatus
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
1
2
0x05
KeyID (7:0)
IrqStatus
IrqStatus
Stat2
(31:24)
1
0x00
CEStatus
www.semtech.com
3
4
Data1
Data2
IrqStatus
(23:16)
(15:8)
2
3
0x00
0x00
MIC1
MIC2
Derivation; 2, 5, 12-17 are supported.
3
4
0x6b
0xc1
IrqStatus
(23:16)
(15:8)
2
3
0x00
0x00
0x07
0x0a
5
...
Data3
...
IrqStatus
...
(7:0)
4
0x00
MIC3
5
...
0xbe
...
IrqStatus
...
(7:0)
4
0x00
0x16
Proprietary & Confidential
N+2
DataN
0x00
5
0x00
MIC4
18
0x2a
0x00
5
0x00
0xb4
106 of 130
Semtech

Advertisement

Table of Contents
loading

Table of Contents