Cryptoverifyaescmac; Table 10-12: Cryptoverifyaescmac Command; Table 10-13: Cryptoverifyaescmac Response - Semtech LR1121 User Manual

Table of Contents

Advertisement

10.3.6 CryptoVerifyAesCmac

Command CryptoVerifyAesCmac(...) computes the AES CMAC of the provided data using the specified Key, and
compares the provided MIC with the actual calculated MIC (first 4 bytes of the CMAC).

Table 10-12: CryptoVerifyAesCmac Command

Byte
0
Data from Host
0x05
Data to Host
Stat1

Table 10-13: CryptoVerifyAesCmac Response

Byte
Data from Host
Data to Host
KeyID: Specified Key ID, as defined in
ExpectedMIC: Provided MIC (first 4 bytes of the CMAC).
Data1, Data2 to DataN: Provided data, considered as byte buffers.
CEStatus: Defined in section
If the 2 MICs are identical, the command returns CRYP_API_SUCCESS, otherwise, CRYP_API_FAIL_CMAC.
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
1
2
3
KeyID
Expected
0x06
(7:0)
MIC1
IrqStatus
IrqStatus
Stat2
(31:24)
(23:16)
0
0x00
Stat1
Table 10-1: Cryptographic Keys Usage and
CEStatus on page
103.
www.semtech.com
4
5
Expected
Expected
Expected
MIC2
MIC3
MIC4
IrqStatus
IrqStatus
0x00
(15:8)
(7:0)
1
0x00
CEStatus
Derivation. 2, 5; 12-25 are possible.
6
7
...
Data1
...
0x00
...
Proprietary & Confidential
N+6
DataN
0x00
107 of 130
Semtech

Advertisement

Table of Contents
loading

Table of Contents