Smart-Home am Beispiel der Präsenzerkennung im Raum Projektarbeit Lennart Heimbs, Johannes Krug, Sebastian Dohle und Kevin Holzschuh bei Prof. Oliver Hofmann SS2019
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

README.MD 2.6KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. ### Arduino
  2. just run the sketched aftel loading the libraries.
  3. ### Raspberry pi
  4. install
  5. ```
  6. sudo make install
  7. cd examples_Rpi
  8. make
  9. ```
  10. What to do after changes to the library
  11. ```
  12. sudo make clean
  13. sudo make install
  14. cd examples_Rpi
  15. make clean
  16. make
  17. ```
  18. What to do after changes to a sketch
  19. ```
  20. cd examples_Rpi
  21. make <sketch>
  22. or
  23. make clean
  24. make
  25. ```
  26. How to start a sketch
  27. ```
  28. cd examples_Rpi
  29. sudo ./<sketch>
  30. ```
  31. This is a derived work from Brian Gladman's AES implementation for byte-oriented
  32. processors, here's the licence terms:
  33. /*
  34. ---------------------------------------------------------------------------
  35. Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved.
  36. LICENSE TERMS
  37. The redistribution and use of this software (with or without changes)
  38. is allowed without the payment of fees or royalties provided that:
  39. 1. source code distributions include the above copyright notice, this
  40. list of conditions and the following disclaimer;
  41. 2. binary distributions include the above copyright notice, this list
  42. of conditions and the following disclaimer in their documentation;
  43. 3. the name of the copyright holder is not used to endorse products
  44. built using this software without specific written permission.
  45. DISCLAIMER
  46. This software is provided 'as is' with no explicit or implied warranties
  47. in respect of its properties, including, but not limited to, correctness
  48. and/or fitness for purpose.
  49. ---------------------------------------------------------------------------
  50. Issue 09/09/2006
  51. This is an AES implementation that uses only 8-bit byte operations on the
  52. cipher state (there are options to use 32-bit types if available).
  53. The combination of mix columns and byte substitution used here is based on
  54. that developed by Karl Malbrain. His contribution is acknowledged.
  55. */
  56. /* This version derived by Mark Tillotson 2012-01-23, tidied up, slimmed down
  57. and tailored to 8-bit microcontroller abilities and Arduino datatypes.
  58. The s-box and inverse s-box were retained as tables (0.5kB PROGMEM) but all
  59. the other transformations are coded to save table space. Many efficiency
  60. improvments to the routines mix_sub_columns() and inv_mix_sub_columns()
  61. (mainly common sub-expression elimination).
  62. Only the routines with precalculated subkey schedule are retained (together
  63. with set_key() - this does however mean each AES object takes 240 bytes of
  64. RAM, alas)
  65. The CBC routines side-effect the iv argument (so that successive calls work
  66. together correctly).
  67. All the encryption and decryption routines work with plain == cipher for
  68. in-place encryption, note.
  69. */