LR1110
User Manual
Rev.1.0
UM.LR1110.W.APP
March 2020
110 of 130
Semtech
For example, when using the test vectors of the RFC4493 example 2, we would have:
•
Message: 6bc1bee2 2e409f96 e93d7e11 7393172a (N=16)
•
MIC: 070a16b4
Therefore, the
CryptoComputeAesCmac
( ) command and response will be:
Table 12-10: CryptoComputeAesCmac Command Example
Table 12-11: CryptoComputeAesCmac Response Example
12.3.6
CryptoVerifyAesCmac
The command
CryptoVerifyAesCmac( )
will compute the AES CMAC of the provided data using the specified Key, and
compare the provided MIC with the actual calculated MIC (first 4 bytes of the CMAC).
•
KeyID
: specified Key ID, as defined in
Table 12-1: Cryptographic Keys Usage and Derivation
. Goes from 0 to 27.
•
ExpectedMIC
: Provided MIC (first 4 bytes of the CMAC).
Byte
0
1
2
3
4
5
…
N+3
Data from Host
0x05
0x05
KeyID
(7:0)
0x6b
0xc1
0xbe
...
0x2a
Data to Host
Stat1
Stat2
IrqStatus
(31:24)
IrqStatus
(23:16)
IrqStatus
(15:8)
IrqStatus
(7:0)
…
0x00
Byte
0
1
2
3
4
5
Data from Host
0x00
0x00
0x00
0x00
0x00
0x00
Data to Host
Stat1
CEStatus
0x07
0x0a
0x16
0xb4
Table 12-12: CryptoVerifyAesCmac Command
Byte
0
1
2
3
4
5
6
7
…
N+7
Data from Host
0x05
0x06
KeyID
(7:0)
Exp.
MIC1
Exp.
MIC2
Exp
MIC3
Exp
MIC4
Data1
…
DataN
Data to Host
Stat1
Stat2
Irq
Status
(31:24)
Irq
Status
(23:16)
Irq
Status
(15:8)
Irq
Status
(7:0)
0x00
0x00
…
0x00
Table 12-13: CryptoVerifyAesCmac
Byte
0
1
Data from Host
0x00
0x00
Data to Host
Stat1
CEStatus