crypto.hh (13168:4965381c122d) | crypto.hh (13169:eb3b2bea4231) |
---|---|
1/* 2 * Copyright (c) 2018 ARM Limited 3 * All rights reserved 4 * 5 * The license below extends only to copyright in the software and shall 6 * not be construed as granting a license to any other intellectual 7 * property including but not limited to intellectual property relating 8 * to a hardware implementation of the functionality of the software --- 38 unchanged lines hidden (view full) --- 47{ 48 enum SHAOp : uint8_t 49 { 50 CHOOSE = 0, 51 PARITY, 52 MAJORITY 53 }; 54 | 1/* 2 * Copyright (c) 2018 ARM Limited 3 * All rights reserved 4 * 5 * The license below extends only to copyright in the software and shall 6 * not be construed as granting a license to any other intellectual 7 * property including but not limited to intellectual property relating 8 * to a hardware implementation of the functionality of the software --- 38 unchanged lines hidden (view full) --- 47{ 48 enum SHAOp : uint8_t 49 { 50 CHOOSE = 0, 51 PARITY, 52 MAJORITY 53 }; 54 |
55 /** Look up table for subByttes transformation */ 56 static const uint8_t aesSBOX[256]; 57 58 /** Look up table for inverse subBytes transformation */ 59 static const uint8_t aesInvSBOX[256]; 60 61 static const uint8_t aesSHIFT[16]; 62 static const uint8_t aesINVSHIFT[16]; 63 64 /** 65 * Look up table for Finite Field logarithm where the base 66 * is the element {03} in the field G(256) 67 */ 68 static const uint8_t aesFFLOG[256]; 69 70 /** 71 * Look up table for {03}^X where {03} and X are elements 72 * in the filed G(256) 73 */ 74 static const uint8_t aesFFEXP[256]; 75 76 /** Finite field multiplication of two elements in the field G(256) */ 77 uint8_t aesFFMul(uint8_t a, uint8_t b); 78 79 uint8_t aesFFMul2(uint8_t a) 80 { 81 return ((a & 0x80) ? ((a << 1) ^ 0x1b) : (a << 1)); 82 } 83 84 void aesSubBytes(uint8_t *output, uint8_t *input); 85 void aesInvSubBytes(uint8_t *output, uint8_t *input); 86 void aesShiftRows(uint8_t *output, uint8_t *input); 87 void aesInvShiftRows(uint8_t *output, uint8_t *input); 88 void aesAddRoundKey(uint8_t *output, uint8_t *input, uint8_t *key); 89 |
|
55 uint32_t ror(uint32_t x, uint8_t shift) 56 { 57 return (x >> shift) | (x << (32 - shift)); 58 } 59 60 uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z) 61 { 62 return (((Y ^ Z) & X) ^ Z); --- 24 unchanged lines hidden (view full) --- 87 void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op); 88 89 void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input); 90 void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z, 91 uint8_t *output, uint8_t *input, uint8_t *input2); 92 void store1Reg(uint8_t *output, uint32_t *X); 93 94 public: | 90 uint32_t ror(uint32_t x, uint8_t shift) 91 { 92 return (x >> shift) | (x << (32 - shift)); 93 } 94 95 uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z) 96 { 97 return (((Y ^ Z) & X) ^ Z); --- 24 unchanged lines hidden (view full) --- 122 void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op); 123 124 void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input); 125 void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z, 126 uint8_t *output, uint8_t *input, uint8_t *input2); 127 void store1Reg(uint8_t *output, uint32_t *X); 128 129 public: |
130 void aesMixColumns(uint8_t *output, uint8_t *input); 131 void aesInvMixColumns(uint8_t *output, uint8_t *input); 132 void aesEncrypt(uint8_t *output, uint8_t *input, uint8_t *key); 133 void aesDecrypt(uint8_t *output, uint8_t *input, uint8_t *key); |
|
95 void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2); 96 void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2); 97 void sha256Su0(uint8_t *output, uint8_t *input); 98 void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2); 99 100 void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2); 101 void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2); 102 void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2); 103 void sha1H(uint8_t *output, uint8_t *input); 104 void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2); 105 void sha1Su1(uint8_t *output, uint8_t *input); 106}; 107 108} // namespace ArmISA 109 110#endif //__ARCH_ARM_INSTS_CRYPTO_HH__ | 134 void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2); 135 void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2); 136 void sha256Su0(uint8_t *output, uint8_t *input); 137 void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2); 138 139 void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2); 140 void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2); 141 void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2); 142 void sha1H(uint8_t *output, uint8_t *input); 143 void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2); 144 void sha1Su1(uint8_t *output, uint8_t *input); 145}; 146 147} // namespace ArmISA 148 149#endif //__ARCH_ARM_INSTS_CRYPTO_HH__ |