mirror of
https://github.com/esp-rs/esp-hal.git
synced 2025-09-30 22:01:11 +00:00

* Unify the system peripheral Whilst the PCR, SYSTEM and DPORT peripherals are different, we currently use them all in the same way. This PR unifies the peripheral name in the hal to `SYSTEM`. The idea is that they all do the same sort of thing, so we can collect them under the same name, and later down the line we can being to expose differences under an extended API. The benifits to this are imo quite big, the examples now are all identical, which makes things easier for esp-wifi, and paves a path towards the multichip hal. Why not do this in the PAC? Imo the pac should be as close to the hardware as possible, and the HAL is where we should abstractions such as this. * changelog
86 lines
2.5 KiB
Rust
86 lines
2.5 KiB
Rust
//! Encrypt/Decrypt a message using AES.
|
|
|
|
#![no_std]
|
|
#![no_main]
|
|
use aes::{
|
|
cipher::{generic_array::GenericArray, BlockDecrypt, BlockEncrypt, KeyInit},
|
|
Aes128 as Aes128SW,
|
|
};
|
|
use esp32h2_hal::{
|
|
aes::{Aes, Mode},
|
|
clock::ClockControl,
|
|
peripherals::Peripherals,
|
|
prelude::*,
|
|
systimer::SystemTimer,
|
|
};
|
|
use esp_backtrace as _;
|
|
use esp_println::println;
|
|
|
|
#[entry]
|
|
fn main() -> ! {
|
|
let peripherals = Peripherals::take();
|
|
let system = peripherals.SYSTEM.split();
|
|
let _clocks = ClockControl::boot_defaults(system.clock_control).freeze();
|
|
|
|
let mut aes = Aes::new(peripherals.AES);
|
|
|
|
let keytext = "SUp4SeCp@sSw0rd".as_bytes();
|
|
let plaintext = "message".as_bytes();
|
|
|
|
// create an array with aes128 key size
|
|
let mut keybuf = [0_u8; 16];
|
|
keybuf[..keytext.len()].copy_from_slice(keytext);
|
|
|
|
// create an array with aes block size
|
|
let mut block_buf = [0_u8; 16];
|
|
block_buf[..plaintext.len()].copy_from_slice(plaintext);
|
|
|
|
let mut block = block_buf.clone();
|
|
let pre_hw_encrypt = SystemTimer::now();
|
|
aes.process(&mut block, Mode::Encryption128, &keybuf);
|
|
let post_hw_encrypt = SystemTimer::now();
|
|
println!(
|
|
"it took {} cycles for hw encrypt",
|
|
post_hw_encrypt - pre_hw_encrypt
|
|
);
|
|
let hw_encrypted = block.clone();
|
|
let pre_hw_decrypt = SystemTimer::now();
|
|
aes.process(&mut block, Mode::Decryption128, &keybuf);
|
|
let post_hw_decrypt = SystemTimer::now();
|
|
println!(
|
|
"it took {} cycles for hw decrypt",
|
|
post_hw_decrypt - pre_hw_decrypt
|
|
);
|
|
let hw_decrypted = block;
|
|
|
|
let key = GenericArray::from(keybuf);
|
|
let mut block = GenericArray::from(block_buf);
|
|
let cipher = Aes128SW::new(&key);
|
|
let pre_sw_encrypt = SystemTimer::now();
|
|
cipher.encrypt_block(&mut block);
|
|
let post_sw_encrypt = SystemTimer::now();
|
|
println!(
|
|
"it took {} cycles for sw encrypt",
|
|
post_sw_encrypt - pre_sw_encrypt
|
|
);
|
|
let sw_encrypted = block.clone();
|
|
let pre_sw_decrypt = SystemTimer::now();
|
|
cipher.decrypt_block(&mut block);
|
|
let post_sw_decrypt = SystemTimer::now();
|
|
println!(
|
|
"it took {} cycles for sw decrypt",
|
|
post_sw_decrypt - pre_sw_decrypt
|
|
);
|
|
let sw_decrypted = block;
|
|
|
|
assert!(eq(&sw_encrypted.into(), &hw_encrypted));
|
|
assert!(eq(&sw_decrypted.into(), &hw_decrypted));
|
|
|
|
println!("done");
|
|
|
|
loop {}
|
|
}
|
|
fn eq(slice1: &[u8; 16], slice2: &[u8; 16]) -> bool {
|
|
slice1.iter().zip(slice2.iter()).all(|(a, b)| a == b)
|
|
}
|