10.3.5 CryptoComputeAesCmac
Command CryptoComputeAesCmac(...) computes the AES CMAC of the provided data using the specified Key and
returns the MIC.
Table 10-8: CryptoComputeAesCmac Command
Byte
0
Data from Host
0x05
Data to Host
Stat1
Table 10-9: CryptoComputeAesCmac Response
Byte
0
Data from Host
0x00
Data to Host
Stat1
•
KeyID: Specified Key ID, as defined in
•
Data1, Data2, ..., DataN: Provided data, considered as byte buffers.
•
CEStatus: Defined in section
•
MIC: Message Integrity Check (first 4 bytes of the CMAC).
For example, when using the test vectors of the RFC4493 example 2, we would have:
•
Message: 6BC1BEE2 2E409F96 E93D7E11 7393172A (N=16)
•
MIC: 070A16B4
Table 10-10: CryptoComputeAesCmac Command Example
Byte
0
Data from Host
0x05
Data to Host
Stat1
Table 10-11: CryptoComputeAesCmac Response Example
Byte
0
Data from Host
0x00
Data to Host
Stat1
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
1
2
0x05
KeyID (7:0)
IrqStatus
IrqStatus
Stat2
(31:24)
1
0x00
CEStatus
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
1
2
0x05
KeyID (7:0)
IrqStatus
IrqStatus
Stat2
(31:24)
1
0x00
CEStatus
www.semtech.com
3
4
Data1
Data2
IrqStatus
(23:16)
(15:8)
2
3
0x00
0x00
MIC1
MIC2
Derivation; 2, 5, 12-17 are supported.
3
4
0x6b
0xc1
IrqStatus
(23:16)
(15:8)
2
3
0x00
0x00
0x07
0x0a
5
...
Data3
...
IrqStatus
...
(7:0)
4
0x00
MIC3
5
...
0xbe
...
IrqStatus
...
(7:0)
4
0x00
0x16
Proprietary & Confidential
N+2
DataN
0x00
5
0x00
MIC4
18
0x2a
0x00
5
0x00
0xb4
106 of 130
Semtech