EasyManua.ls Logo

Semtech LR1110 - Cryptoverifyaescmac; Table 12-10: Cryptocomputeaescmac Command Example; Table 12-11: Cryptocomputeaescmac Response Example; Table 12-12: Cryptoverifyaescmac Command

Semtech LR1110
130 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
LR1110
User Manual Rev.1.0
UM.LR1110.W.APP March 2020
110 of 130
Semtech
www.semtech.com
For example, when using the test vectors of the RFC4493 example 2, we would have:
Message: 6bc1bee2 2e409f96 e93d7e11 7393172a (N=16)
MIC: 070a16b4
Therefore, the CryptoComputeAesCmac( ) command and response will be:
Table 12-10: CryptoComputeAesCmac Command Example
Table 12-11: CryptoComputeAesCmac Response Example
12.3.6 CryptoVerifyAesCmac
The command CryptoVerifyAesCmac( ) will compute the AES CMAC of the provided data using the specified Key, and
compare the provided MIC with the actual calculated MIC (first 4 bytes of the CMAC).
KeyID: specified Key ID, as defined in Table 12-1: Cryptographic Keys Usage and Derivation. Goes from 0 to 27.
ExpectedMIC: Provided MIC (first 4 bytes of the CMAC).
Byte 0 1 2 3 4 5 N+3
Data from Host 0x05 0x05
KeyID
(7:0)
0x6b 0xc1 0xbe ... 0x2a
Data to Host Stat1 Stat2
IrqStatus
(31:24)
IrqStatus
(23:16)
IrqStatus
(15:8)
IrqStatus
(7:0)
0x00
Byte 0 1 2 3 4 5
Data from Host 0x00 0x00 0x00 0x00 0x00 0x00
Data to Host Stat1 CEStatus 0x07 0x0a 0x16 0xb4
Table 12-12: CryptoVerifyAesCmac Command
Byte 0 1 2 3 4 5 6 7 N+7
Data from Host 0x05 0x06
KeyID
(7:0)
Exp.
MIC1
Exp.
MIC2
Exp
MIC3
Exp
MIC4
Data1 DataN
Data to Host Stat1 Stat2
Irq
Status
(31:24)
Irq
Status
(23:16)
Irq
Status
(15:8)
Irq
Status
(7:0)
0x00 0x00 0x00
Table 12-13: CryptoVerifyAesCmac
Byte 0 1
Data from Host 0x00 0x00
Data to Host Stat1 CEStatus

Table of Contents