- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi All
I found the demo snip.easy_setup/easy_setup_client/easy_setup_cooee.exe was not open source.
And the aes_ccm_decrypt in SDK was not open source also.
For Present Demo Algorithm, we wanna know if the algorithm is standard or encapsulated by broadcom ?
Calculate Base:
nonce(8Bytes) + "wiced"(5Bytes)
Device_secret_key(Device_Vendor_ID)
AAD(Header)
PlainTex
Result: Header+CipherText+MIC.
Result = > Array
Multicast Address 4 and 5 store Cipher data.
802.11Header : Frame:Duration: 01:00:5E:7E:Array[0]:Array[1]:Address2:Adress3
802.11Header : Frame:Duration: 01:00:5E:7E:Array[2]:Array[3]:Address2:Adress3
................
...............
802.11Header : Frame:Duration: 01:00:5E:7E:Array
WICED MODULE filter the Multicast IE header and distill the Array[0-N].
CipherArray= Array
Array[0-9], 10bytes is Plain text, we can get nounce 8byte, content length of cipherText.
Device_secret_key is stored in DCT, we can get, the demo preset value is "abcdabcdabcdabcd"
AAD is from first 10bytes plain text
Array[10-N] is ciphered text.
call "aes_ccm_decrypt" we can get de-encrypted plained text. it is TLV. so we can get ssid and password.
If the Source code for calculating the CipherTex or static lib of algorithm can be released? So that we can develop the Client Configuration APP.
Regards
Harry
Solved! Go to Solution.
- Labels:
-
SPI
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The algorithm was designed by Broadcom however it uses standard cryptographic functions such as AES CCM. The easy setup executable uses the Bouncy Castle cryptographic library (www.bouncycastle.org) and in particular uses the CcmBlockCipher with AesFastEngine.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The algorithm was designed by Broadcom however it uses standard cryptographic functions such as AES CCM. The easy setup executable uses the Bouncy Castle cryptographic library (www.bouncycastle.org) and in particular uses the CcmBlockCipher with AesFastEngine.