gem5 v24.0.0.0
Loading...
Searching...
No Matches
crypto.hh
Go to the documentation of this file.
1/*
2 * Copyright (c) 2018 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder. You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
13 *
14 * Redistribution and use in source and binary forms, with or without
15 * modification, are permitted provided that the following conditions are
16 * met: redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer;
18 * redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution;
21 * neither the name of the copyright holders nor the names of its
22 * contributors may be used to endorse or promote products derived from
23 * this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
29 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
31 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
35 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
37
38#ifndef __ARCH_ARM_INSTS_CRYPTO_HH__
39#define __ARCH_ARM_INSTS_CRYPTO_HH__
40
41#include <cstdint>
42
43namespace gem5
44{
45
46namespace ArmISA {
47
48class Crypto
49{
50 enum SHAOp : uint8_t
51 {
52 CHOOSE = 0,
55 };
56
58 static const uint8_t aesSBOX[256];
59
61 static const uint8_t aesInvSBOX[256];
62
63 static const uint8_t aesSHIFT[16];
64 static const uint8_t aesINVSHIFT[16];
65
70 static const uint8_t aesFFLOG[256];
71
76 static const uint8_t aesFFEXP[256];
77
79 uint8_t aesFFMul(uint8_t a, uint8_t b);
80
81 uint8_t aesFFMul2(uint8_t a)
82 {
83 return ((a & 0x80) ? ((a << 1) ^ 0x1b) : (a << 1));
84 }
85
86 void aesSubBytes(uint8_t *output, uint8_t *input);
87 void aesInvSubBytes(uint8_t *output, uint8_t *input);
88 void aesShiftRows(uint8_t *output, uint8_t *input);
89 void aesInvShiftRows(uint8_t *output, uint8_t *input);
90 void aesAddRoundKey(uint8_t *output, uint8_t *input, uint8_t *key);
91
92 uint32_t ror(uint32_t x, uint8_t shift)
93 {
94 return (x >> shift) | (x << (32 - shift));
95 }
96
97 uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z)
98 {
99 return (((Y ^ Z) & X) ^ Z);
100 }
101
102 uint32_t parity(uint32_t X, uint32_t Y, uint32_t Z)
103 {
104 return (X ^ Y ^ Z);
105 }
106
107 uint32_t majority(uint32_t X, uint32_t Y, uint32_t Z)
108 {
109 return ((X & Y) | ((X | Y) & Z));
110 }
111
112 uint32_t sigma0(uint32_t X)
113 {
114 return ror(X,2) ^ ror(X,13) ^ ror(X,22);
115 }
116
117 uint32_t sigma1(uint32_t X)
118 {
119 return ror(X,6) ^ ror(X,11) ^ ror(X,25);
120 }
121
122 void sha256Op(uint32_t *X, uint32_t *Y, uint32_t *Z);
123 void sha1Op(uint8_t *output, uint8_t *input, uint8_t *input2, SHAOp op);
124 void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op);
125
126 void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input);
127 void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z,
128 uint8_t *output, uint8_t *input, uint8_t *input2);
129 void store1Reg(uint8_t *output, uint32_t *X);
130
131 public:
132 void aesMixColumns(uint8_t *output, uint8_t *input);
133 void aesInvMixColumns(uint8_t *output, uint8_t *input);
134 void aesEncrypt(uint8_t *output, uint8_t *input, uint8_t *key);
135 void aesDecrypt(uint8_t *output, uint8_t *input, uint8_t *key);
136 void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2);
137 void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2);
138 void sha256Su0(uint8_t *output, uint8_t *input);
139 void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2);
140
141 void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2);
142 void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2);
143 void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2);
144 void sha1H(uint8_t *output, uint8_t *input);
145 void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2);
146 void sha1Su1(uint8_t *output, uint8_t *input);
147};
148
149} // namespace ArmISA
150} // namespace gem5
151
152#endif //__ARCH_ARM_INSTS_CRYPTO_HH__
static const uint8_t aesSHIFT[16]
Definition crypto.hh:63
uint32_t sigma1(uint32_t X)
Definition crypto.hh:117
void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input)
Definition crypto.cc:479
void aesSubBytes(uint8_t *output, uint8_t *input)
Definition crypto.cc:181
static const uint8_t aesSBOX[256]
Look up table for subByttes transformation.
Definition crypto.hh:58
void aesInvShiftRows(uint8_t *output, uint8_t *input)
Definition crypto.cc:205
void sha1Su1(uint8_t *output, uint8_t *input)
Definition crypto.cc:463
void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:409
void aesShiftRows(uint8_t *output, uint8_t *input)
Definition crypto.cc:197
void aesDecrypt(uint8_t *output, uint8_t *input, uint8_t *key)
Definition crypto.cc:267
void sha1Op(uint8_t *output, uint8_t *input, uint8_t *input2, SHAOp op)
Definition crypto.cc:396
void aesMixColumns(uint8_t *output, uint8_t *input)
Definition crypto.cc:222
uint32_t parity(uint32_t X, uint32_t Y, uint32_t Z)
Definition crypto.hh:102
uint32_t sigma0(uint32_t X)
Definition crypto.hh:112
static const uint8_t aesFFLOG[256]
Look up table for Finite Field logarithm where the base is the element {03} in the field G(256)
Definition crypto.hh:70
uint8_t aesFFMul2(uint8_t a)
Definition crypto.hh:81
uint32_t majority(uint32_t X, uint32_t Y, uint32_t Z)
Definition crypto.hh:107
void sha256Su0(uint8_t *output, uint8_t *input)
Definition crypto.cc:346
static const uint8_t aesInvSBOX[256]
Look up table for inverse subBytes transformation.
Definition crypto.hh:61
void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:322
void sha1H(uint8_t *output, uint8_t *input)
Definition crypto.cc:436
void sha256Op(uint32_t *X, uint32_t *Y, uint32_t *Z)
Definition crypto.cc:278
uint32_t ror(uint32_t x, uint8_t shift)
Definition crypto.hh:92
void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:418
void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:445
static const uint8_t aesINVSHIFT[16]
Definition crypto.hh:64
void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:369
void aesAddRoundKey(uint8_t *output, uint8_t *input, uint8_t *key)
Definition crypto.cc:213
void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:427
void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op)
Definition crypto.cc:298
void aesInvSubBytes(uint8_t *output, uint8_t *input)
Definition crypto.cc:189
static const uint8_t aesFFEXP[256]
Look up table for {03}^X where {03} and X are elements in the filed G(256)
Definition crypto.hh:76
uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z)
Definition crypto.hh:97
void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:334
void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z, uint8_t *output, uint8_t *input, uint8_t *input2)
Definition crypto.cc:492
uint8_t aesFFMul(uint8_t a, uint8_t b)
Finite field multiplication of two elements in the field G(256)
Definition crypto.cc:166
void aesInvMixColumns(uint8_t *output, uint8_t *input)
Definition crypto.cc:240
void store1Reg(uint8_t *output, uint32_t *X)
Definition crypto.cc:508
void aesEncrypt(uint8_t *output, uint8_t *input, uint8_t *key)
Definition crypto.cc:256
Bitfield< 7 > b
Bitfield< 8 > a
Definition misc_types.hh:66
Bitfield< 6, 5 > shift
Definition types.hh:117
Bitfield< 3 > x
Definition pagetable.hh:73
Bitfield< 4 > op
Definition types.hh:83
Copyright (c) 2024 - Pranith Kumar Copyright (c) 2020 Inria All rights reserved.
Definition binary32.hh:36
static void output(const char *filename)
Definition debug.cc:60

Generated on Tue Jun 18 2024 16:23:56 for gem5 by doxygen 1.11.0