crypto.hh (13168:4965381c122d) crypto.hh (13169:eb3b2bea4231)
1/*
2 * Copyright (c) 2018 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software

--- 38 unchanged lines hidden (view full) ---

47{
48 enum SHAOp : uint8_t
49 {
50 CHOOSE = 0,
51 PARITY,
52 MAJORITY
53 };
54
1/*
2 * Copyright (c) 2018 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software

--- 38 unchanged lines hidden (view full) ---

47{
48 enum SHAOp : uint8_t
49 {
50 CHOOSE = 0,
51 PARITY,
52 MAJORITY
53 };
54
55 /** Look up table for subByttes transformation */
56 static const uint8_t aesSBOX[256];
57
58 /** Look up table for inverse subBytes transformation */
59 static const uint8_t aesInvSBOX[256];
60
61 static const uint8_t aesSHIFT[16];
62 static const uint8_t aesINVSHIFT[16];
63
64 /**
65 * Look up table for Finite Field logarithm where the base
66 * is the element {03} in the field G(256)
67 */
68 static const uint8_t aesFFLOG[256];
69
70 /**
71 * Look up table for {03}^X where {03} and X are elements
72 * in the filed G(256)
73 */
74 static const uint8_t aesFFEXP[256];
75
76 /** Finite field multiplication of two elements in the field G(256) */
77 uint8_t aesFFMul(uint8_t a, uint8_t b);
78
79 uint8_t aesFFMul2(uint8_t a)
80 {
81 return ((a & 0x80) ? ((a << 1) ^ 0x1b) : (a << 1));
82 }
83
84 void aesSubBytes(uint8_t *output, uint8_t *input);
85 void aesInvSubBytes(uint8_t *output, uint8_t *input);
86 void aesShiftRows(uint8_t *output, uint8_t *input);
87 void aesInvShiftRows(uint8_t *output, uint8_t *input);
88 void aesAddRoundKey(uint8_t *output, uint8_t *input, uint8_t *key);
89
55 uint32_t ror(uint32_t x, uint8_t shift)
56 {
57 return (x >> shift) | (x << (32 - shift));
58 }
59
60 uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z)
61 {
62 return (((Y ^ Z) & X) ^ Z);

--- 24 unchanged lines hidden (view full) ---

87 void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op);
88
89 void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input);
90 void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z,
91 uint8_t *output, uint8_t *input, uint8_t *input2);
92 void store1Reg(uint8_t *output, uint32_t *X);
93
94 public:
90 uint32_t ror(uint32_t x, uint8_t shift)
91 {
92 return (x >> shift) | (x << (32 - shift));
93 }
94
95 uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z)
96 {
97 return (((Y ^ Z) & X) ^ Z);

--- 24 unchanged lines hidden (view full) ---

122 void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op);
123
124 void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input);
125 void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z,
126 uint8_t *output, uint8_t *input, uint8_t *input2);
127 void store1Reg(uint8_t *output, uint32_t *X);
128
129 public:
130 void aesMixColumns(uint8_t *output, uint8_t *input);
131 void aesInvMixColumns(uint8_t *output, uint8_t *input);
132 void aesEncrypt(uint8_t *output, uint8_t *input, uint8_t *key);
133 void aesDecrypt(uint8_t *output, uint8_t *input, uint8_t *key);
95 void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2);
96 void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2);
97 void sha256Su0(uint8_t *output, uint8_t *input);
98 void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2);
99
100 void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2);
101 void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2);
102 void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2);
103 void sha1H(uint8_t *output, uint8_t *input);
104 void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2);
105 void sha1Su1(uint8_t *output, uint8_t *input);
106};
107
108} // namespace ArmISA
109
110#endif //__ARCH_ARM_INSTS_CRYPTO_HH__
134 void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2);
135 void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2);
136 void sha256Su0(uint8_t *output, uint8_t *input);
137 void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2);
138
139 void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2);
140 void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2);
141 void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2);
142 void sha1H(uint8_t *output, uint8_t *input);
143 void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2);
144 void sha1Su1(uint8_t *output, uint8_t *input);
145};
146
147} // namespace ArmISA
148
149#endif //__ARCH_ARM_INSTS_CRYPTO_HH__