/* * Copyright (c) 2018 ARM Limited * All rights reserved * * The license below extends only to copyright in the software and shall * not be construed as granting a license to any other intellectual * property including but not limited to intellectual property relating * to a hardware implementation of the functionality of the software * licensed hereunder. You may use the software subject to the license * terms below provided that you ensure that this notice is replicated * unmodified and in its entirety in all distributions of the software, * modified or unmodified, in source code or in binary form. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer; * redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution; * neither the name of the copyright holders nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * Authors: Matt Horsnell * Prakash Ramrakhyani */ #ifndef __ARCH_ARM_INSTS_CRYPTO_HH__ #define __ARCH_ARM_INSTS_CRYPTO_HH__ namespace ArmISA { class Crypto { enum SHAOp : uint8_t { CHOOSE = 0, PARITY, MAJORITY }; /** Look up table for subByttes transformation */ static const uint8_t aesSBOX[256]; /** Look up table for inverse subBytes transformation */ static const uint8_t aesInvSBOX[256]; static const uint8_t aesSHIFT[16]; static const uint8_t aesINVSHIFT[16]; /** * Look up table for Finite Field logarithm where the base * is the element {03} in the field G(256) */ static const uint8_t aesFFLOG[256]; /** * Look up table for {03}^X where {03} and X are elements * in the filed G(256) */ static const uint8_t aesFFEXP[256]; /** Finite field multiplication of two elements in the field G(256) */ uint8_t aesFFMul(uint8_t a, uint8_t b); uint8_t aesFFMul2(uint8_t a) { return ((a & 0x80) ? ((a << 1) ^ 0x1b) : (a << 1)); } void aesSubBytes(uint8_t *output, uint8_t *input); void aesInvSubBytes(uint8_t *output, uint8_t *input); void aesShiftRows(uint8_t *output, uint8_t *input); void aesInvShiftRows(uint8_t *output, uint8_t *input); void aesAddRoundKey(uint8_t *output, uint8_t *input, uint8_t *key); uint32_t ror(uint32_t x, uint8_t shift) { return (x >> shift) | (x << (32 - shift)); } uint32_t choose(uint32_t X, uint32_t Y, uint32_t Z) { return (((Y ^ Z) & X) ^ Z); } uint32_t parity(uint32_t X, uint32_t Y, uint32_t Z) { return (X ^ Y ^ Z); } uint32_t majority(uint32_t X, uint32_t Y, uint32_t Z) { return ((X & Y) | ((X | Y) & Z)); } uint32_t sigma0(uint32_t X) { return ror(X,2) ^ ror(X,13) ^ ror(X,22); } uint32_t sigma1(uint32_t X) { return ror(X,6) ^ ror(X,11) ^ ror(X,25); } void sha256Op(uint32_t *X, uint32_t *Y, uint32_t *Z); void sha1Op(uint8_t *output, uint8_t *input, uint8_t *input2, SHAOp op); void _sha1Op(uint32_t *X, uint32_t *Y, uint32_t *Z, SHAOp op); void load2Reg(uint32_t *X, uint32_t *Y, uint8_t *output, uint8_t *input); void load3Reg(uint32_t *X, uint32_t *Y, uint32_t *Z, uint8_t *output, uint8_t *input, uint8_t *input2); void store1Reg(uint8_t *output, uint32_t *X); public: void aesMixColumns(uint8_t *output, uint8_t *input); void aesInvMixColumns(uint8_t *output, uint8_t *input); void aesEncrypt(uint8_t *output, uint8_t *input, uint8_t *key); void aesDecrypt(uint8_t *output, uint8_t *input, uint8_t *key); void sha256H(uint8_t *output, uint8_t *input, uint8_t *input2); void sha256H2(uint8_t *output, uint8_t *input, uint8_t *input2); void sha256Su0(uint8_t *output, uint8_t *input); void sha256Su1(uint8_t *output, uint8_t *input, uint8_t *input2); void sha1C(uint8_t *output, uint8_t *input, uint8_t *input2); void sha1P(uint8_t *output, uint8_t *input, uint8_t *input2); void sha1M(uint8_t *output, uint8_t *input, uint8_t *input2); void sha1H(uint8_t *output, uint8_t *input); void sha1Su0(uint8_t *output, uint8_t *input, uint8_t *input2); void sha1Su1(uint8_t *output, uint8_t *input); }; } // namespace ArmISA #endif //__ARCH_ARM_INSTS_CRYPTO_HH__