349 lines
11 KiB
C
349 lines
11 KiB
C
/*!
|
|
* \file secure-element.h
|
|
*
|
|
* \brief Secure Element driver API
|
|
*
|
|
* \copyright Revised BSD License, see section \ref LICENSE.
|
|
*
|
|
* \code
|
|
* ______ _
|
|
* / _____) _ | |
|
|
* ( (____ _____ ____ _| |_ _____ ____| |__
|
|
* \____ \| ___ | (_ _) ___ |/ ___) _ \
|
|
* _____) ) ____| | | || |_| ____( (___| | | |
|
|
* (______/|_____)_|_|_| \__)_____)\____)_| |_|
|
|
* (C)2013 Semtech
|
|
*
|
|
* ___ _____ _ ___ _ _____ ___ ___ ___ ___
|
|
* / __|_ _/_\ / __| |/ / __/ _ \| _ \/ __| __|
|
|
* \__ \ | |/ _ \ (__| ' <| _| (_) | / (__| _|
|
|
* |___/ |_/_/ \_\___|_|\_\_| \___/|_|_\\___|___|
|
|
* embedded.connectivity.solutions===============
|
|
*
|
|
* \endcode
|
|
*
|
|
* \author Miguel Luis ( Semtech )
|
|
*
|
|
* \author Gregory Cristian ( Semtech )
|
|
*
|
|
* \author Daniel Jaeckle ( STACKFORCE )
|
|
*
|
|
* \author Johannes Bruder ( STACKFORCE )
|
|
*
|
|
* \defgroup SECUREELEMENT Secure Element API Definition
|
|
*
|
|
* \{
|
|
*
|
|
*/
|
|
/**
|
|
******************************************************************************
|
|
*
|
|
* Portions COPYRIGHT 2020 STMicroelectronics
|
|
*
|
|
* @file secure-element.h
|
|
* @author MCD Application Team
|
|
* @brief Secure Element driver API
|
|
******************************************************************************
|
|
*/
|
|
#ifndef __SECURE_ELEMENT_H__
|
|
#define __SECURE_ELEMENT_H__
|
|
|
|
#ifdef __cplusplus
|
|
extern "C"
|
|
{
|
|
#endif
|
|
|
|
#include "LoRaMacCrypto.h"
|
|
#include "secure-element-nvm.h"
|
|
#include "LoRaMacVersion.h"
|
|
#include "LoRaMacInterfaces.h"
|
|
|
|
/*
|
|
* CMAC/AES Message Integrity Code (MIC) Block B0 size
|
|
*/
|
|
#define MIC_BLOCK_BX_SIZE 16
|
|
|
|
/*!
|
|
* Return values.
|
|
*/
|
|
typedef enum eSecureElementStatus
|
|
{
|
|
/*!
|
|
* No error occurred
|
|
*/
|
|
SECURE_ELEMENT_SUCCESS = 0,
|
|
/*!
|
|
* CMAC does not match
|
|
*/
|
|
SECURE_ELEMENT_FAIL_CMAC,
|
|
/*!
|
|
* Null pointer exception
|
|
*/
|
|
SECURE_ELEMENT_ERROR_NPE,
|
|
/*!
|
|
* Invalid key identifier exception
|
|
*/
|
|
SECURE_ELEMENT_ERROR_INVALID_KEY_ID,
|
|
/*!
|
|
* Invalid LoRaWAN specification version
|
|
*/
|
|
SECURE_ELEMENT_ERROR_INVALID_LORAWAM_SPEC_VERSION,
|
|
/*!
|
|
* Incompatible buffer size
|
|
*/
|
|
SECURE_ELEMENT_ERROR_BUF_SIZE,
|
|
/*!
|
|
* Undefined Error occurred
|
|
*/
|
|
SECURE_ELEMENT_ERROR,
|
|
/*!
|
|
* Failed to encrypt
|
|
*/
|
|
SECURE_ELEMENT_FAIL_ENCRYPT,
|
|
}SecureElementStatus_t;
|
|
|
|
/*!
|
|
* \brief get the board 64 bits unique ID
|
|
*
|
|
* \param [out] id unique
|
|
*/
|
|
typedef void ( *SecureElementGetUniqueId_t )(uint8_t *id);
|
|
/*!
|
|
* \brief get device address (random generation)
|
|
*
|
|
* \param [out] address unique
|
|
*/
|
|
typedef void ( *SecureElementGetDevAddr_t )(uint32_t *devaddr);
|
|
|
|
/*!
|
|
* Initialization of Secure Element driver
|
|
*
|
|
* \param [in] nvm - Pointer to the non-volatile memory data
|
|
* structure.
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementInit( SecureElementNvmData_t* nvm );
|
|
|
|
/*!
|
|
* Initialize Secure Element parameters with a value provided by MCU platform if current value equal 00..
|
|
*
|
|
* \param [in] seGetUniqueId - Get unique ID callback
|
|
* \param [in] seGetDevAddr - Get DevAddress callback
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementInitMcuID( SecureElementGetUniqueId_t seGetUniqueId, SecureElementGetDevAddr_t seGetDevAddr );
|
|
|
|
/*!
|
|
* Print Root and Session keys if available
|
|
*
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementPrintKeys( void );
|
|
|
|
/*!
|
|
* Print OTAA Session keys if available
|
|
*
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementPrintSessionKeys( ActivationType_t );
|
|
|
|
#if (!defined (LORAWAN_KMS) || (LORAWAN_KMS == 0))
|
|
/*!
|
|
* Gets key item from key list.
|
|
*
|
|
* \param [in] keyID - Key identifier
|
|
* \param [out] keyItem - Key item reference
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementGetKeyByID( KeyIdentifier_t keyID, Key_t **keyItem );
|
|
#else
|
|
/*!
|
|
* Gets key item from key list.
|
|
*
|
|
* \param [in] keyID - Key identifier
|
|
* \param [out] extractable_key - Key item pointer
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementGetKeyByID( KeyIdentifier_t keyID, uint8_t* extractable_key );
|
|
#endif /* LORAWAN_KMS */
|
|
|
|
/*!
|
|
* Remove previously generated dynamic key with "label" from memory
|
|
*
|
|
* \param [in] keyID - Key identifier
|
|
* \param [out] key_label - string of char to identifying targetKeyID label
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementDeleteDynamicKey( KeyIdentifier_t keyID, uint32_t *key_label );
|
|
|
|
/*!
|
|
* Sets a the KMS object handler for a given keyID (reserved to Kms)
|
|
*
|
|
* \param [in] keyID - Key identifier
|
|
* \param [in] keyIndex - Key index value
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetObjHandler( KeyIdentifier_t keyID, uint32_t keyIndex );
|
|
|
|
/*!
|
|
* Sets a key
|
|
*
|
|
* \param [in] keyID - Key identifier
|
|
* \param [in] key - Key value
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetKey( KeyIdentifier_t keyID, uint8_t* key );
|
|
|
|
/*!
|
|
* Sets a key
|
|
*
|
|
* \param [in] KMSKeyBlob - Identifiers structure definition
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetID( SecureElementNvmDevJoinAddrKey_t *KMSKeyBlob );
|
|
|
|
/*!
|
|
* Computes a CMAC of a message using provided initial Bx block
|
|
*
|
|
* \param [in] micBxBuffer - Buffer containing the initial Bx block
|
|
* \param [in] buffer - Data buffer
|
|
* \param [in] size - Data buffer size
|
|
* \param [in] keyID - Key identifier to determine the AES key to be used
|
|
* \param [out] cmac - Computed cmac
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementComputeAesCmac( uint8_t* micBxBuffer, uint8_t* buffer, uint32_t size, KeyIdentifier_t keyID, uint32_t* cmac );
|
|
|
|
/*!
|
|
* Verifies a CMAC (computes and compare with expected cmac)
|
|
*
|
|
* \param [in] buffer - Data buffer
|
|
* \param [in] size - Data buffer size
|
|
* \param [in] expectedCmac - Expected cmac
|
|
* \param [in] keyID - Key identifier to determine the AES key to be used
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementVerifyAesCmac( uint8_t* buffer, uint32_t size, uint32_t expectedCmac, KeyIdentifier_t keyID );
|
|
|
|
/*!
|
|
* Encrypt a buffer
|
|
*
|
|
* \param [in] buffer - Data buffer
|
|
* \param [in] size - Data buffer size
|
|
* \param [in] keyID - Key identifier to determine the AES key to be used
|
|
* \param [out] encBuffer - Encrypted buffer
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementAesEncrypt( uint8_t* buffer, uint32_t size, KeyIdentifier_t keyID, uint8_t* encBuffer );
|
|
|
|
/*!
|
|
* Derives and store a key
|
|
*
|
|
* \param [in] input - Input data from which the key is derived ( 16 byte )
|
|
* \param [in] rootKeyID - Key identifier of the root key to use to perform the derivation
|
|
* \param [in] targetKeyID - Key identifier of the key which will be derived
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementDeriveAndStoreKey( uint8_t* input, KeyIdentifier_t rootKeyID, KeyIdentifier_t targetKeyID );
|
|
|
|
/*!
|
|
* Process JoinAccept message.
|
|
*
|
|
* \param [in] joinReqType - Type of last join-request or rejoin which triggered the join-accept response
|
|
* \param [in] joinEui - Join server EUI (8 byte)
|
|
* \param [in] devNonce - Random value generated by Network Server to prevent replay attacks with previous Join session params
|
|
* \param [in] encJoinAccept - Received encrypted JoinAccept message
|
|
* \param [in] encJoinAcceptSize - Received encrypted JoinAccept message Size
|
|
* \param [out] decJoinAccept - Decrypted and validated JoinAccept message
|
|
* \param [out] versionMinor - Detected LoRaWAN specification version minor field.
|
|
* - 0 -> LoRaWAN 1.0.x
|
|
* - 1 -> LoRaWAN 1.1.x
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementProcessJoinAccept( JoinReqIdentifier_t joinReqType, uint8_t* joinEui,
|
|
uint16_t devNonce, uint8_t* encJoinAccept,
|
|
uint8_t encJoinAcceptSize, uint8_t* decJoinAccept,
|
|
uint8_t* versionMinor );
|
|
|
|
#if (defined( LORAMAC_VERSION ) && ( LORAMAC_VERSION == 0x01000300 ))
|
|
/*!
|
|
* Generates a random number
|
|
*
|
|
* \param [out] randomNum - 32 bit random number
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementRandomNumber( uint32_t* randomNum );
|
|
#endif /* LORAMAC_VERSION */
|
|
|
|
/*!
|
|
* Sets the DevEUI
|
|
*
|
|
* \param [in] devEui - Pointer to the 8-byte devEUI
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetDevEui( uint8_t* devEui );
|
|
|
|
/*!
|
|
* Gets the DevEUI
|
|
*
|
|
* \param [out] devEui - Pointer to the 8-byte devEUI
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementGetDevEui( uint8_t* devEui );
|
|
|
|
/*!
|
|
* Sets the JoinEUI
|
|
*
|
|
* \param [in] joinEui - Pointer to the 8-byte joinEui
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetJoinEui( uint8_t* joinEui );
|
|
|
|
/*!
|
|
* Gets the DevEUI
|
|
*
|
|
* \param [out] joinEui - Pointer to the 8-byte joinEui
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementGetJoinEui( uint8_t* joinEui );
|
|
|
|
/*!
|
|
* Sets the devAddress
|
|
*
|
|
* \param [in] mode - Activation mode (OTAA, ABP)
|
|
* \param [in] devAddr - 32-byte devAddress
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetDevAddr ( ActivationType_t mode, uint32_t devAddr );
|
|
|
|
/*!
|
|
* Gets the devAddress
|
|
*
|
|
* \param [in] mode - Activation mode (OTAA, ABP)
|
|
* \param [out] devAddr - Pointer to the 32-byte devAddress
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementGetDevAddr ( ActivationType_t mode, uint32_t* devAddr );
|
|
/*!
|
|
* Sets the pin
|
|
*
|
|
* \param [in] pin - Pointer to the 4-byte pin
|
|
* \retval - Status of the operation
|
|
*/
|
|
SecureElementStatus_t SecureElementSetPin( uint8_t* pin );
|
|
|
|
/*!
|
|
* Gets the Pin
|
|
*
|
|
* \retval - Pointer to the 4-byte pin
|
|
*/
|
|
uint8_t* SecureElementGetPin( void );
|
|
|
|
/*! \} defgroup SECUREELEMENT */
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif // __SECURE_ELEMENT_H__
|