2014-12-02 19:10:06 -05:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "device.h"
|
2019-01-08 14:56:58 -05:00
|
|
|
#include "hardware/Serial.h"
|
2019-01-12 09:12:51 -05:00
|
|
|
#include "hardware/LED.h"
|
2019-02-07 12:36:40 -05:00
|
|
|
#include "hardware/Crypto.h"
|
2019-01-08 14:56:58 -05:00
|
|
|
#include "util/FIFO16.h"
|
2019-01-08 16:24:29 -05:00
|
|
|
#include "util/time.h"
|
2014-12-02 19:10:06 -05:00
|
|
|
#include "KISS.h"
|
|
|
|
|
2019-01-08 14:56:58 -05:00
|
|
|
uint8_t packet_queue[CONFIG_QUEUE_SIZE];
|
|
|
|
uint8_t tx_buffer[AX25_MAX_FRAME_LEN];
|
|
|
|
volatile uint8_t queue_height = 0;
|
|
|
|
volatile size_t queued_bytes = 0;
|
|
|
|
volatile size_t queue_cursor = 0;
|
|
|
|
volatile size_t current_packet_start = 0;
|
|
|
|
|
|
|
|
FIFOBuffer16 packet_starts;
|
|
|
|
size_t packet_starts_buf[CONFIG_QUEUE_MAX_LENGTH+1];
|
|
|
|
|
|
|
|
FIFOBuffer16 packet_lengths;
|
|
|
|
size_t packet_lengths_buf[CONFIG_QUEUE_MAX_LENGTH+1];
|
|
|
|
|
2014-12-02 19:10:06 -05:00
|
|
|
AX25Ctx *ax25ctx;
|
|
|
|
Afsk *channel;
|
|
|
|
Serial *serial;
|
2019-01-12 10:30:26 -05:00
|
|
|
volatile ticks_t last_serial_read = 0;
|
2014-12-02 19:10:06 -05:00
|
|
|
size_t frame_len;
|
|
|
|
bool IN_FRAME;
|
|
|
|
bool ESCAPE;
|
|
|
|
|
|
|
|
uint8_t command = CMD_UNKNOWN;
|
|
|
|
unsigned long custom_preamble = CONFIG_AFSK_PREAMBLE_LEN;
|
|
|
|
unsigned long custom_tail = CONFIG_AFSK_TRAILER_LEN;
|
|
|
|
|
|
|
|
unsigned long slotTime = 200;
|
2018-12-29 09:57:49 -05:00
|
|
|
uint8_t p = CONFIG_CSMA_P;
|
2014-12-02 19:10:06 -05:00
|
|
|
|
|
|
|
void kiss_init(AX25Ctx *ax25, Afsk *afsk, Serial *ser) {
|
|
|
|
ax25ctx = ax25;
|
|
|
|
serial = ser;
|
|
|
|
channel = afsk;
|
2019-01-08 14:56:58 -05:00
|
|
|
|
|
|
|
memset(packet_queue, 0, sizeof(packet_queue));
|
|
|
|
memset(packet_starts_buf, 0, sizeof(packet_starts));
|
|
|
|
memset(packet_lengths_buf, 0, sizeof(packet_lengths));
|
|
|
|
|
|
|
|
fifo16_init(&packet_starts, packet_starts_buf, sizeof(packet_starts_buf));
|
|
|
|
fifo16_init(&packet_lengths, packet_lengths_buf, sizeof(packet_lengths_buf));
|
|
|
|
}
|
|
|
|
|
|
|
|
void kiss_poll(void) {
|
2019-02-04 11:02:19 -05:00
|
|
|
while (!fifo_isempty_locked(&uart0FIFO)) {
|
|
|
|
char sbyte = fifo_pop_locked(&uart0FIFO);
|
2019-01-08 14:56:58 -05:00
|
|
|
kiss_serialCallback(sbyte);
|
2019-01-08 16:24:29 -05:00
|
|
|
last_serial_read = timer_clock();
|
2019-01-08 14:56:58 -05:00
|
|
|
}
|
2014-12-02 19:10:06 -05:00
|
|
|
}
|
|
|
|
|
2019-01-12 10:30:26 -05:00
|
|
|
#if CONFIG_BENCHMARK_MODE
|
|
|
|
size_t decodes = 0;
|
|
|
|
#endif
|
2014-12-02 19:10:06 -05:00
|
|
|
void kiss_messageCallback(AX25Ctx *ctx) {
|
2019-01-12 10:30:26 -05:00
|
|
|
#if CONFIG_BENCHMARK_MODE
|
|
|
|
decodes++;
|
|
|
|
printf("%d\r\n", decodes);
|
|
|
|
#else
|
2019-02-07 12:36:40 -05:00
|
|
|
bool integrity_ok = false;
|
|
|
|
if (crypto_enabled()) {
|
|
|
|
size_t rxpos = 0;
|
|
|
|
|
|
|
|
// Get padding size
|
|
|
|
uint8_t padding = ctx->buf[rxpos++];
|
|
|
|
size_t data_length = ctx->frame_len - 2 - 1 - CRYPTO_HMAC_SIZE - CRYPTO_KEY_SIZE;
|
|
|
|
size_t hmac_offset = ctx->frame_len - 2 - CRYPTO_HMAC_SIZE;
|
|
|
|
|
|
|
|
// Get HMAC
|
|
|
|
uint8_t hmac[CRYPTO_HMAC_SIZE];
|
|
|
|
memset(hmac, 0x00, CRYPTO_HMAC_SIZE);
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_HMAC_SIZE; i++) {
|
|
|
|
size_t pos = hmac_offset + i;
|
|
|
|
hmac[i] = ctx->buf[pos];
|
|
|
|
}
|
|
|
|
|
|
|
|
// Calculate HMAC
|
|
|
|
crypto_generate_hmac(ctx->buf, ctx->frame_len-2-CRYPTO_HMAC_SIZE);
|
|
|
|
bool HMAC_ok = true;
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_HMAC_SIZE; i++) {
|
|
|
|
if (hmac[i] != crypto_work_block[i]) {
|
|
|
|
HMAC_ok = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (HMAC_ok) {
|
|
|
|
// Get IV
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_KEY_SIZE; i++) {
|
|
|
|
crypto_work_block[i] = ctx->buf[rxpos++];
|
|
|
|
}
|
|
|
|
|
|
|
|
crypto_set_iv_from_workblock();
|
|
|
|
crypto_prepare();
|
|
|
|
uint8_t blocks = data_length / CRYPTO_KEY_SIZE;
|
|
|
|
|
|
|
|
size_t decrypted_pos = 0;
|
|
|
|
for (uint8_t block = 0; block < blocks; block++) {
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_KEY_SIZE; i++) {
|
|
|
|
crypto_work_block[i] = ctx->buf[rxpos++];
|
|
|
|
}
|
|
|
|
crypto_decrypt_block(crypto_work_block);
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_KEY_SIZE; i++) {
|
|
|
|
ctx->buf[decrypted_pos++] = crypto_work_block[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ctx->frame_len = data_length - padding;
|
|
|
|
integrity_ok = true;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
integrity_ok = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (integrity_ok) {
|
|
|
|
fputc(FEND, &serial->uart0);
|
|
|
|
fputc(0x00, &serial->uart0);
|
|
|
|
for (unsigned i = 0; i < ctx->frame_len-2; i++) {
|
|
|
|
uint8_t b = ctx->buf[i];
|
|
|
|
if (b == FEND) {
|
|
|
|
fputc(FESC, &serial->uart0);
|
|
|
|
fputc(TFEND, &serial->uart0);
|
|
|
|
} else if (b == FESC) {
|
|
|
|
fputc(FESC, &serial->uart0);
|
|
|
|
fputc(TFESC, &serial->uart0);
|
|
|
|
} else {
|
|
|
|
fputc(b, &serial->uart0);
|
|
|
|
}
|
2019-01-12 10:30:26 -05:00
|
|
|
}
|
2019-02-07 12:36:40 -05:00
|
|
|
fputc(FEND, &serial->uart0);
|
2014-12-02 19:10:06 -05:00
|
|
|
}
|
2019-01-12 10:30:26 -05:00
|
|
|
#endif
|
2014-12-02 19:10:06 -05:00
|
|
|
}
|
|
|
|
|
2019-01-08 14:56:58 -05:00
|
|
|
void kiss_csma(void) {
|
|
|
|
if (queue_height > 0) {
|
2019-01-08 16:24:29 -05:00
|
|
|
#if BITRATE == 2400
|
|
|
|
if (!channel->hdlc.dcd) {
|
|
|
|
ticks_t timeout = last_serial_read + ms_to_ticks(CONFIG_SERIAL_TIMEOUT_MS);
|
|
|
|
if (timer_clock() > timeout) {
|
|
|
|
if (p == 255) {
|
|
|
|
kiss_flushQueue();
|
|
|
|
} else {
|
|
|
|
// TODO: Implement real CSMA
|
2019-01-27 15:00:22 -05:00
|
|
|
kiss_flushQueue();
|
2019-01-08 16:24:29 -05:00
|
|
|
}
|
|
|
|
}
|
2014-12-02 19:10:06 -05:00
|
|
|
}
|
2019-01-08 16:24:29 -05:00
|
|
|
#else
|
|
|
|
if (!channel->hdlc.dcd) {
|
|
|
|
if (p == 255) {
|
|
|
|
kiss_flushQueue();
|
|
|
|
} else {
|
|
|
|
// TODO: Implement real CSMA
|
2019-01-27 15:00:22 -05:00
|
|
|
kiss_flushQueue();
|
2019-01-08 16:24:29 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2018-04-24 08:34:59 -04:00
|
|
|
}
|
2019-01-08 14:56:58 -05:00
|
|
|
}
|
2018-04-24 08:34:59 -04:00
|
|
|
|
2019-01-08 14:56:58 -05:00
|
|
|
volatile bool queue_flushing = false;
|
|
|
|
void kiss_flushQueue(void) {
|
|
|
|
if (!queue_flushing) {
|
|
|
|
queue_flushing = true;
|
|
|
|
|
|
|
|
size_t processed = 0;
|
|
|
|
for (size_t n = 0; n < queue_height; n++) {
|
|
|
|
size_t start = fifo16_pop_locked(&packet_starts);
|
|
|
|
size_t length = fifo16_pop_locked(&packet_lengths);
|
|
|
|
|
2019-02-07 12:36:40 -05:00
|
|
|
if (crypto_enabled()) {
|
|
|
|
uint8_t padding = CRYPTO_KEY_SIZE - (length % CRYPTO_KEY_SIZE);
|
|
|
|
if (padding == CRYPTO_KEY_SIZE) padding = 0;
|
|
|
|
|
|
|
|
uint8_t blocks = (length + padding) / CRYPTO_KEY_SIZE;
|
|
|
|
|
|
|
|
if (crypto_generate_iv()) {
|
|
|
|
crypto_prepare();
|
|
|
|
|
|
|
|
size_t tx_pos = 0;
|
|
|
|
tx_buffer[tx_pos++] = padding;
|
|
|
|
|
|
|
|
uint8_t *iv = crypto_get_iv();
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_KEY_SIZE; i++) {
|
|
|
|
tx_buffer[tx_pos++] = iv[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
// Encrypt each block
|
|
|
|
for (uint8_t i = 0; i < blocks; i++) {
|
|
|
|
if (i < blocks-1 || padding == 0) {
|
|
|
|
for (uint8_t j = 0; j < CRYPTO_KEY_SIZE; j++) {
|
|
|
|
size_t pos = (start+j)%CONFIG_QUEUE_SIZE;
|
|
|
|
crypto_work_block[j] = packet_queue[pos];
|
|
|
|
}
|
|
|
|
start += CRYPTO_KEY_SIZE;
|
|
|
|
} else {
|
|
|
|
for (uint8_t j = 0; j < CRYPTO_KEY_SIZE - padding; j++) {
|
|
|
|
size_t pos = (start+j)%CONFIG_QUEUE_SIZE;
|
|
|
|
crypto_work_block[j] = packet_queue[pos];
|
|
|
|
}
|
|
|
|
for (uint8_t j = 0; j < padding; j++) {
|
|
|
|
crypto_work_block[j] = 0xFF;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
crypto_encrypt_block(crypto_work_block);
|
|
|
|
|
|
|
|
for (uint8_t j = 0; j < CRYPTO_KEY_SIZE; j++) {
|
|
|
|
tx_buffer[tx_pos++] = crypto_work_block[j];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Genereate MAC
|
|
|
|
crypto_generate_hmac(tx_buffer, tx_pos);
|
|
|
|
for (uint8_t i = 0; i < CRYPTO_HMAC_SIZE; i++) {
|
|
|
|
tx_buffer[tx_pos++] = crypto_work_block[i];
|
|
|
|
}
|
2019-01-08 14:56:58 -05:00
|
|
|
|
2019-02-07 12:36:40 -05:00
|
|
|
// Check size and send
|
|
|
|
if (tx_pos <= AX25_MAX_FRAME_LEN) {
|
|
|
|
ax25_sendRaw(ax25ctx, tx_buffer, tx_pos);
|
|
|
|
processed++;
|
|
|
|
} else {
|
|
|
|
processed++;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
LED_indicate_error_crypto();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
for (size_t i = 0; i < length; i++) {
|
|
|
|
size_t pos = (start+i)%CONFIG_QUEUE_SIZE;
|
|
|
|
tx_buffer[i] = packet_queue[pos];
|
|
|
|
}
|
|
|
|
|
|
|
|
ax25_sendRaw(ax25ctx, tx_buffer, length);
|
|
|
|
processed++;
|
|
|
|
}
|
2019-01-08 14:56:58 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if (processed < queue_height) {
|
|
|
|
while (true) {
|
|
|
|
LED_TX_ON();
|
|
|
|
LED_RX_ON();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
queue_height = 0;
|
|
|
|
queued_bytes = 0;
|
|
|
|
queue_flushing = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-02 19:10:06 -05:00
|
|
|
void kiss_serialCallback(uint8_t sbyte) {
|
|
|
|
if (IN_FRAME && sbyte == FEND && command == CMD_DATA) {
|
|
|
|
IN_FRAME = false;
|
2019-01-08 14:56:58 -05:00
|
|
|
|
|
|
|
if (queue_height < CONFIG_QUEUE_MAX_LENGTH && queued_bytes < CONFIG_QUEUE_SIZE) {
|
|
|
|
queue_height++;
|
|
|
|
size_t s = current_packet_start;
|
|
|
|
size_t e = queue_cursor-1; if (e == -1) e = CONFIG_QUEUE_SIZE-1;
|
|
|
|
size_t l = (s < e) ? e - s + 1 : CONFIG_QUEUE_SIZE - s + e + 1;
|
|
|
|
|
|
|
|
fifo16_push_locked(&packet_starts, s);
|
|
|
|
fifo16_push_locked(&packet_lengths, l);
|
|
|
|
|
|
|
|
current_packet_start = queue_cursor;
|
|
|
|
}
|
|
|
|
|
2014-12-02 19:10:06 -05:00
|
|
|
} else if (sbyte == FEND) {
|
|
|
|
IN_FRAME = true;
|
|
|
|
command = CMD_UNKNOWN;
|
|
|
|
frame_len = 0;
|
2019-02-07 12:36:40 -05:00
|
|
|
} else if (IN_FRAME && frame_len < AX25_MAX_PAYLOAD) {
|
2014-12-02 19:10:06 -05:00
|
|
|
// Have a look at the command byte first
|
|
|
|
if (frame_len == 0 && command == CMD_UNKNOWN) {
|
2019-01-07 06:09:41 -05:00
|
|
|
// OpenModem supports only one HDLC port, so we
|
2014-12-02 19:10:06 -05:00
|
|
|
// strip off the port nibble of the command byte
|
|
|
|
sbyte = sbyte & 0x0F;
|
|
|
|
command = sbyte;
|
2019-01-08 14:56:58 -05:00
|
|
|
if (command == CMD_DATA) current_packet_start = queue_cursor;
|
2014-12-02 19:10:06 -05:00
|
|
|
} else if (command == CMD_DATA) {
|
|
|
|
if (sbyte == FESC) {
|
|
|
|
ESCAPE = true;
|
|
|
|
} else {
|
|
|
|
if (ESCAPE) {
|
|
|
|
if (sbyte == TFEND) sbyte = FEND;
|
|
|
|
if (sbyte == TFESC) sbyte = FESC;
|
|
|
|
ESCAPE = false;
|
|
|
|
}
|
2019-01-08 14:56:58 -05:00
|
|
|
if (queue_height < CONFIG_QUEUE_MAX_LENGTH && queued_bytes < CONFIG_QUEUE_SIZE) {
|
|
|
|
queued_bytes++;
|
|
|
|
packet_queue[queue_cursor++] = sbyte;
|
|
|
|
if (queue_cursor == CONFIG_QUEUE_SIZE) queue_cursor = 0;
|
|
|
|
}
|
2014-12-02 19:10:06 -05:00
|
|
|
}
|
|
|
|
} else if (command == CMD_TXDELAY) {
|
|
|
|
custom_preamble = sbyte * 10UL;
|
|
|
|
} else if (command == CMD_TXTAIL) {
|
|
|
|
custom_tail = sbyte * 10;
|
|
|
|
} else if (command == CMD_SLOTTIME) {
|
|
|
|
slotTime = sbyte * 10;
|
|
|
|
} else if (command == CMD_P) {
|
|
|
|
p = sbyte;
|
2019-01-08 14:56:58 -05:00
|
|
|
} else if (command == CMD_FLUSHQUEUE) {
|
|
|
|
kiss_flushQueue();
|
2019-01-12 09:12:51 -05:00
|
|
|
} else if (command == CMD_LED_INTENSITY) {
|
|
|
|
if (sbyte == FESC) {
|
|
|
|
ESCAPE = true;
|
|
|
|
} else {
|
|
|
|
if (ESCAPE) {
|
|
|
|
if (sbyte == TFEND) sbyte = FEND;
|
|
|
|
if (sbyte == TFESC) sbyte = FESC;
|
|
|
|
ESCAPE = false;
|
|
|
|
}
|
|
|
|
LED_setIntensity(sbyte);
|
|
|
|
}
|
2018-04-24 08:34:59 -04:00
|
|
|
}
|
2014-12-02 19:10:06 -05:00
|
|
|
|
|
|
|
}
|
|
|
|
}
|