Home
last modified time | relevance | path

Searched refs:keyID (Results 1 – 6 of 6) sorted by relevance

/loramac-node-3.7.0/src/peripherals/soft-se/
Dsoft-se.c53 static SecureElementStatus_t GetKeyByID( KeyIdentifier_t keyID, Key_t** keyItem ) in GetKeyByID() argument
57 if( SeNvm->KeyList[i].KeyID == keyID ) in GetKeyByID()
78 …tStatus_t ComputeCmac( uint8_t* micBxBuffer, uint8_t* buffer, uint16_t size, KeyIdentifier_t keyID, in ComputeCmac() argument
92 SecureElementStatus_t retval = GetKeyByID( keyID, &keyItem ); in ComputeCmac()
165 SecureElementStatus_t SecureElementSetKey( KeyIdentifier_t keyID, uint8_t* key ) in SecureElementSetKey() argument
174 if( SeNvm->KeyList[i].KeyID == keyID ) in SecureElementSetKey()
176 …if( ( keyID == MC_KEY_0 ) || ( keyID == MC_KEY_1 ) || ( keyID == MC_KEY_2 ) || ( keyID == MC_KEY_3… in SecureElementSetKey()
198 KeyIdentifier_t keyID, uint32_t* cmac ) in SecureElementComputeAesCmac() argument
200 if( keyID >= LORAMAC_CRYPTO_MULTICAST_KEYS ) in SecureElementComputeAesCmac()
206 return ComputeCmac( micBxBuffer, buffer, size, keyID, cmac ); in SecureElementComputeAesCmac()
[all …]
/loramac-node-3.7.0/src/peripherals/lr1110-se/
Dlr1110-se.c123 SecureElementStatus_t SecureElementSetKey( KeyIdentifier_t keyID, uint8_t* key ) in SecureElementSetKey() argument
132 …if( ( keyID == MC_KEY_0 ) || ( keyID == MC_KEY_1 ) || ( keyID == MC_KEY_2 ) || ( keyID == MC_KEY_3… in SecureElementSetKey()
137 convert_key_id_from_se_to_lr1110( keyID ), key ); in SecureElementSetKey()
147 …o_set_key( &LR1110, ( lr1110_crypto_status_t* ) &status, convert_key_id_from_se_to_lr1110( keyID ), in SecureElementSetKey()
158 KeyIdentifier_t keyID, uint32_t* cmac ) in SecureElementComputeAesCmac() argument
177 … convert_key_id_from_se_to_lr1110( keyID ), localbuffer, localSize, in SecureElementComputeAesCmac()
184 KeyIdentifier_t keyID ) in SecureElementVerifyAesCmac() argument
194 convert_key_id_from_se_to_lr1110( keyID ), buffer, size, in SecureElementVerifyAesCmac()
200 …cureElementStatus_t SecureElementAesEncrypt( uint8_t* buffer, uint16_t size, KeyIdentifier_t keyID, in SecureElementAesEncrypt() argument
210 if( keyID < SLOT_RAND_ZERO_KEY ) in SecureElementAesEncrypt()
[all …]
/loramac-node-3.7.0/src/mac/
DLoRaMacCrypto.c132 static LoRaMacCryptoStatus_t PayloadEncrypt( uint8_t* buffer, int16_t size, KeyIdentifier_t keyID, … in PayloadEncrypt() argument
162 if( SecureElementAesEncrypt( aBlock, 16, keyID, sBlock ) != SECURE_ELEMENT_SUCCESS ) in PayloadEncrypt()
274 static LoRaMacCryptoStatus_t PrepareB0( uint16_t msgLen, KeyIdentifier_t keyID, bool isAck, uint8_t… in PrepareB0() argument
338 static LoRaMacCryptoStatus_t ComputeCmacB0( uint8_t* msg, uint16_t len, KeyIdentifier_t keyID, bool… in ComputeCmacB0() argument
352 PrepareB0( len, keyID, isAck, dir, devAddr, fCnt, micBuff ); in ComputeCmacB0()
354 if( SecureElementComputeAesCmac( micBuff, msg, len, keyID, cmac ) != SECURE_ELEMENT_SUCCESS ) in ComputeCmacB0()
374 static LoRaMacCryptoStatus_t VerifyCmacB0( uint8_t* msg, uint16_t len, KeyIdentifier_t keyID, bool … in VerifyCmacB0() argument
389 PrepareB0( len, keyID, isAck, dir, devAddr, fCnt, micBuff ); in VerifyCmacB0()
395 … retval = SecureElementVerifyAesCmac( micBuff, ( len + MIC_BLOCK_BX_SIZE ), expectedCmac, keyID ); in VerifyCmacB0()
423 static LoRaMacCryptoStatus_t PrepareB1( uint16_t msgLen, KeyIdentifier_t keyID, bool isAck, uint8_t… in PrepareB1() argument
[all …]
Dsecure-element.h105 SecureElementStatus_t SecureElementSetKey( KeyIdentifier_t keyID, uint8_t* key );
117 …mac( uint8_t* micBxBuffer, uint8_t* buffer, uint16_t size, KeyIdentifier_t keyID, uint32_t* cmac );
128 …ementVerifyAesCmac( uint8_t* buffer, uint16_t size, uint32_t expectedCmac, KeyIdentifier_t keyID );
139 … SecureElementAesEncrypt( uint8_t* buffer, uint16_t size, KeyIdentifier_t keyID, uint8_t* encBuffe…
DLoRaMacCrypto.h235 LoRaMacCryptoStatus_t LoRaMacCryptoSetKey( KeyIdentifier_t keyID, uint8_t* key );
311 LoRaMacCryptoStatus_t LoRaMacCryptoDeriveMcRootKey( uint8_t versionMinor, KeyIdentifier_t keyID );
321 LoRaMacCryptoStatus_t LoRaMacCryptoDeriveMcKEKey( KeyIdentifier_t keyID );
/loramac-node-3.7.0/src/peripherals/atecc608a-tnglora-se/
Datecc608a-tnglora-se.c182 SecureElementStatus_t GetKeyByID( KeyIdentifier_t keyID, Key_t** keyItem ) in GetKeyByID() argument
186 if( KeyList[i].KeyID == keyID ) in GetKeyByID()
207 …tStatus_t ComputeCmac( uint8_t* micBxBuffer, uint8_t* buffer, uint16_t size, KeyIdentifier_t keyID, in ComputeCmac() argument
218 SecureElementStatus_t retval = GetKeyByID( keyID, &keyItem ); in ComputeCmac()
306 SecureElementStatus_t SecureElementSetKey( KeyIdentifier_t keyID, uint8_t* key ) in SecureElementSetKey() argument
313 KeyIdentifier_t keyID, uint32_t* cmac ) in SecureElementComputeAesCmac() argument
315 if( keyID >= LORAMAC_CRYPTO_MULTICAST_KEYS ) in SecureElementComputeAesCmac()
320 return ComputeCmac( micBxBuffer, buffer, size, keyID, cmac ); in SecureElementComputeAesCmac()
324 KeyIdentifier_t keyID ) in SecureElementVerifyAesCmac() argument
334 retval = ComputeCmac( NULL, buffer, size, keyID, &compCmac ); in SecureElementVerifyAesCmac()
[all …]