From 04dcea14217395ee09915aafb4532a6dd495fa53 Mon Sep 17 00:00:00 2001 From: Yann Herklotz Date: Fri, 19 Jun 2020 11:17:51 +0100 Subject: Add CHstone --- benchmarks/CHStone/aes/aes.c | 129 +++++++++ benchmarks/CHStone/aes/aes.h | 83 ++++++ benchmarks/CHStone/aes/aes_dec.c | 136 ++++++++++ benchmarks/CHStone/aes/aes_enc.c | 130 +++++++++ benchmarks/CHStone/aes/aes_func.c | 542 ++++++++++++++++++++++++++++++++++++++ benchmarks/CHStone/aes/aes_key.c | 163 ++++++++++++ 6 files changed, 1183 insertions(+) create mode 100755 benchmarks/CHStone/aes/aes.c create mode 100755 benchmarks/CHStone/aes/aes.h create mode 100755 benchmarks/CHStone/aes/aes_dec.c create mode 100755 benchmarks/CHStone/aes/aes_enc.c create mode 100755 benchmarks/CHStone/aes/aes_func.c create mode 100755 benchmarks/CHStone/aes/aes_key.c (limited to 'benchmarks/CHStone/aes') diff --git a/benchmarks/CHStone/aes/aes.c b/benchmarks/CHStone/aes/aes.c new file mode 100755 index 0000000..a0cdf2d --- /dev/null +++ b/benchmarks/CHStone/aes/aes.c @@ -0,0 +1,129 @@ +/* ++--------------------------------------------------------------------------+ +| CHStone : a suite of benchmark programs for C-based High-Level Synthesis | +| ======================================================================== | +| | +| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, | +| H. Takada and K. Ishii | +| Nagoya University, Japan | +| | +| * Remark : | +| 1. This source code is modified to unify the formats of the benchmark | +| programs in CHStone. | +| 2. Test vectors are added for CHStone. | +| 3. If "main_result" is 0 at the end of the program, the program is | +| correctly executed. | +| 4. Please follow the copyright of each benchmark program. | ++--------------------------------------------------------------------------+ +*/ +/* aes.c */ +/* + * Copyright (C) 2005 + * Akira Iwata & Masayuki Sato + * Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan. + * + * All rights reserved. + * + * This software is written by Masayuki Sato. + * And if you want to contact us, send an email to Kimitake Wakayama + * (wakayama@elcom.nitech.ac.jp) + * + * Redistribution and use in source and binary forms, with or without modification, + * are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. All advertising materials mentioning features or use of this software must + * display the following acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * 4. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. + * AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + * SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, + * IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL, + * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + */ +#include + + +int main_result; + +#include "aes.h" +#include "aes_enc.c" +#include "aes_dec.c" +#include "aes_key.c" +#include "aes_func.c" + +/* ***************** main **************************** */ +int +aes_main (void) +{ +/* ++--------------------------------------------------------------------------+ +| * Test Vectors (added for CHStone) | +| statemt, key : input data | ++--------------------------------------------------------------------------+ +*/ + statemt[0] = 50; + statemt[1] = 67; + statemt[2] = 246; + statemt[3] = 168; + statemt[4] = 136; + statemt[5] = 90; + statemt[6] = 48; + statemt[7] = 141; + statemt[8] = 49; + statemt[9] = 49; + statemt[10] = 152; + statemt[11] = 162; + statemt[12] = 224; + statemt[13] = 55; + statemt[14] = 7; + statemt[15] = 52; + + key[0] = 43; + key[1] = 126; + key[2] = 21; + key[3] = 22; + key[4] = 40; + key[5] = 174; + key[6] = 210; + key[7] = 166; + key[8] = 171; + key[9] = 247; + key[10] = 21; + key[11] = 136; + key[12] = 9; + key[13] = 207; + key[14] = 79; + key[15] = 60; + + encrypt (statemt, key, 128128); + decrypt (statemt, key, 128128); + return 0; +} + +int +main () +{ + main_result = 0; + aes_main (); + printf ("\n%d\n", main_result); + return main_result; + } diff --git a/benchmarks/CHStone/aes/aes.h b/benchmarks/CHStone/aes/aes.h new file mode 100755 index 0000000..792d08f --- /dev/null +++ b/benchmarks/CHStone/aes/aes.h @@ -0,0 +1,83 @@ +/* ++--------------------------------------------------------------------------+ +| CHStone : a suite of benchmark programs for C-based High-Level Synthesis | +| ======================================================================== | +| | +| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, | +| H. Takada and K. Ishii | +| Nagoya University, Japan | +| | +| * Remark : | +| 1. This source code is modified to unify the formats of the benchmark | +| programs in CHStone. | +| 2. Test vectors are added for CHStone. | +| 3. If "main_result" is 0 at the end of the program, the program is | +| correctly executed. | +| 4. Please follow the copyright of each benchmark program. | ++--------------------------------------------------------------------------+ +*/ +/* aes.h */ +/* + * Copyright (C) 2005 + * Akira Iwata & Masayuki Sato + * Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan. + * + * All rights reserved. + * + * This software is written by Masayuki Sato. + * And if you want to contact us, send an email to Kimitake Wakayama + * (wakayama@elcom.nitech.ac.jp) + * + * Redistribution and use in source and binary forms, with or without modification, + * are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. All advertising materials mentioning features or use of this software must + * display the following acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * 4. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. + * AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + * SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, + * IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL, + * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + */ + +/* ************* data type define ************************* */ +int type; +int nb; +int round_val; +int key[32]; +int statemt[32]; +int word[4][120]; + + +/* key generate */ +int KeySchedule (int, int *); +int SubByte (int); + +/* encrypto decrypto */ +void ByteSub_ShiftRow (int *, int); +void InversShiftRow_ByteSub (int *, int); +int MixColumn_AddRoundKey (int *, int, int); +int AddRoundKey_InversMixColumn (int *, int, int); +int AddRoundKey (int *, int, int); +int encrypt (int *, int *, int); +int decrypt (int *, int *, int); diff --git a/benchmarks/CHStone/aes/aes_dec.c b/benchmarks/CHStone/aes/aes_dec.c new file mode 100755 index 0000000..25173f3 --- /dev/null +++ b/benchmarks/CHStone/aes/aes_dec.c @@ -0,0 +1,136 @@ +/* ++--------------------------------------------------------------------------+ +| CHStone : a suite of benchmark programs for C-based High-Level Synthesis | +| ======================================================================== | +| | +| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, | +| H. Takada and K. Ishii | +| Nagoya University, Japan | +| | +| * Remark : | +| 1. This source code is modified to unify the formats of the benchmark | +| programs in CHStone. | +| 2. Test vectors are added for CHStone. | +| 3. If "main_result" is 0 at the end of the program, the program is | +| correctly executed. | +| 4. Please follow the copyright of each benchmark program. | ++--------------------------------------------------------------------------+ +*/ +/* aes_dec.c */ +/* + * Copyright (C) 2005 + * Akira Iwata & Masayuki Sato + * Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan. + * + * All rights reserved. + * + * This software is written by Masayuki Sato. + * And if you want to contact us, send an email to Kimitake Wakayama + * (wakayama@elcom.nitech.ac.jp) + * + * Redistribution and use in source and binary forms, with or without modification, + * are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. All advertising materials mentioning features or use of this software must + * display the following acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * 4. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. + * AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + * SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, + * IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL, + * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + */ +int +decrypt (int statemt[32], int key[32], int type) +{ + int i; +/* ++--------------------------------------------------------------------------+ +| * Test Vector (added for CHStone) | +| out_enc_statemt : expected output data for "decrypt" | ++--------------------------------------------------------------------------+ +*/ + const int out_dec_statemt[16] = + { 0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2, + 0xe0, 0x37, 0x7, 0x34 + }; + KeySchedule (type, key); + + switch (type) + { + case 128128: + round_val = 10; + nb = 4; + break; + case 128192: + case 192192: + round_val = 12; + nb = 6; + break; + case 192128: + round_val = 12; + nb = 4; + break; + case 128256: + case 192256: + round_val = 14; + nb = 8; + break; + case 256128: + round_val = 14; + nb = 4; + break; + case 256192: + round_val = 14; + nb = 6; + break; + case 256256: + round_val = 14; + nb = 8; + break; + } + + AddRoundKey (statemt, type, round_val); + + InversShiftRow_ByteSub (statemt, nb); + + for (i = round_val - 1; i >= 1; --i) + { + AddRoundKey_InversMixColumn (statemt, nb, i); + InversShiftRow_ByteSub (statemt, nb); + } + + AddRoundKey (statemt, type, 0); + + printf ("\ndecrypto message\t"); + for (i = 0; i < ((type % 1000) / 8); ++i) + { + if (statemt[i] < 16) + printf ("0"); + printf ("%x", statemt[i]); + } + + for (i = 0; i < 16; i++) + main_result += (statemt[i] != out_dec_statemt[i]); + + return 0; +} diff --git a/benchmarks/CHStone/aes/aes_enc.c b/benchmarks/CHStone/aes/aes_enc.c new file mode 100755 index 0000000..edeb665 --- /dev/null +++ b/benchmarks/CHStone/aes/aes_enc.c @@ -0,0 +1,130 @@ +/* ++--------------------------------------------------------------------------+ +| CHStone : a suite of benchmark programs for C-based High-Level Synthesis | +| ======================================================================== | +| | +| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, | +| H. Takada and K. Ishii | +| Nagoya University, Japan | +| | +| * Remark : | +| 1. This source code is modified to unify the formats of the benchmark | +| programs in CHStone. | +| 2. Test vectors are added for CHStone. | +| 3. If "main_result" is 0 at the end of the program, the program is | +| correctly executed. | +| 4. Please follow the copyright of each benchmark program. | ++--------------------------------------------------------------------------+ +*/ +/* aes_enc.c */ +/* + * Copyright (C) 2005 + * Akira Iwata & Masayuki Sato + * Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan. + * + * All rights reserved. + * + * This software is written by Masayuki Sato. + * And if you want to contact us, send an email to Kimitake Wakayama + * (wakayama@elcom.nitech.ac.jp) + * + * Redistribution and use in source and binary forms, with or without modification, + * are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. All advertising materials mentioning features or use of this software must + * display the following acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * 4. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. + * AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + * SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, + * IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL, + * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + */ +/* ******* encrypto ************ */ +int +encrypt (int statemt[32], int key[32], int type) +{ + int i; +/* ++--------------------------------------------------------------------------+ +| * Test Vector (added for CHStone) | +| out_enc_statemt : expected output data for "encrypt" | ++--------------------------------------------------------------------------+ +*/ + const int out_enc_statemt[16] = + { 0x39, 0x25, 0x84, 0x1d, 0x2, 0xdc, 0x9, 0xfb, 0xdc, 0x11, 0x85, 0x97, + 0x19, 0x6a, 0xb, 0x32 + }; + + KeySchedule (type, key); + switch (type) + { + case 128128: + round_val = 0; + nb = 4; + break; + case 192128: + round_val = 2; + nb = 4; + break; + case 256128: + round_val = 4; + nb = 4; + break; + case 128192: + case 192192: + round_val = 2; + nb = 6; + break; + case 256192: + round_val = 4; + nb = 6; + break; + case 128256: + case 192256: + case 256256: + round_val = 4; + nb = 8; + break; + } + AddRoundKey (statemt, type, 0); + for (i = 1; i <= round_val + 9; ++i) + { + ByteSub_ShiftRow (statemt, nb); + MixColumn_AddRoundKey (statemt, nb, i); + } + ByteSub_ShiftRow (statemt, nb); + AddRoundKey (statemt, type, i); + + printf ("encrypted message \t"); + for (i = 0; i < nb * 4; ++i) + { + if (statemt[i] < 16) + printf ("0"); + printf ("%x", statemt[i]); + } + + for (i = 0; i < 16; i++) + main_result += (statemt[i] != out_enc_statemt[i]); + + return 0; +} diff --git a/benchmarks/CHStone/aes/aes_func.c b/benchmarks/CHStone/aes/aes_func.c new file mode 100755 index 0000000..9450ddd --- /dev/null +++ b/benchmarks/CHStone/aes/aes_func.c @@ -0,0 +1,542 @@ +/* ++--------------------------------------------------------------------------+ +| CHStone : a suite of benchmark programs for C-based High-Level Synthesis | +| ======================================================================== | +| | +| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, | +| H. Takada and K. Ishii | +| Nagoya University, Japan | +| | +| * Remark : | +| 1. This source code is modified to unify the formats of the benchmark | +| programs in CHStone. | +| 2. Test vectors are added for CHStone. | +| 3. If "main_result" is 0 at the end of the program, the program is | +| correctly executed. | +| 4. Please follow the copyright of each benchmark program. | ++--------------------------------------------------------------------------+ +*/ +/* aes_function.c */ +/* + * Copyright (C) 2005 + * Akira Iwata & Masayuki Sato + * Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan. + * + * All rights reserved. + * + * This software is written by Masayuki Sato. + * And if you want to contact us, send an email to Kimitake Wakayama + * (wakayama@elcom.nitech.ac.jp) + * + * Redistribution and use in source and binary forms, with or without modification, + * are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. All advertising materials mentioning features or use of this software must + * display the following acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * 4. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. + * AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + * SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, + * IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL, + * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + */ +const int Sbox[16][16] = { + {0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, + 0xfe, 0xd7, 0xab, 0x76}, + {0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, + 0x9c, 0xa4, 0x72, 0xc0}, + {0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, + 0x71, 0xd8, 0x31, 0x15}, + {0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, + 0xeb, 0x27, 0xb2, 0x75}, + {0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, + 0x29, 0xe3, 0x2f, 0x84}, + {0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, + 0x4a, 0x4c, 0x58, 0xcf}, + {0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, + 0x50, 0x3c, 0x9f, 0xa8}, + {0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, + 0x10, 0xff, 0xf3, 0xd2}, + {0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, + 0x64, 0x5d, 0x19, 0x73}, + {0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, + 0xde, 0x5e, 0x0b, 0xdb}, + {0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, + 0x91, 0x95, 0xe4, 0x79}, + {0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, + 0x65, 0x7a, 0xae, 0x08}, + {0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, + 0x4b, 0xbd, 0x8b, 0x8a}, + {0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, + 0x86, 0xc1, 0x1d, 0x9e}, + {0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, + 0xce, 0x55, 0x28, 0xdf}, + {0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, + 0xb0, 0x54, 0xbb, 0x16} +}; +const int invSbox[16][16] = { + {0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, + 0x81, 0xf3, 0xd7, 0xfb}, + {0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, + 0xc4, 0xde, 0xe9, 0xcb}, + {0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, + 0x42, 0xfa, 0xc3, 0x4e}, + {0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, + 0x6d, 0x8b, 0xd1, 0x25}, + {0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, + 0x5d, 0x65, 0xb6, 0x92}, + {0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, + 0xa7, 0x8d, 0x9d, 0x84}, + {0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, + 0xb8, 0xb3, 0x45, 0x06}, + {0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, + 0x01, 0x13, 0x8a, 0x6b}, + {0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, + 0xf0, 0xb4, 0xe6, 0x73}, + {0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, + 0x1c, 0x75, 0xdf, 0x6e}, + {0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, + 0xaa, 0x18, 0xbe, 0x1b}, + {0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, + 0x78, 0xcd, 0x5a, 0xf4}, + {0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, + 0x27, 0x80, 0xec, 0x5f}, + {0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, + 0x93, 0xc9, 0x9c, 0xef}, + {0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, + 0x83, 0x53, 0x99, 0x61}, + {0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, + 0x55, 0x21, 0x0c, 0x7d} +}; + +/* ********* ByteSub & ShiftRow ********* */ +void +ByteSub_ShiftRow (int statemt[32], int nb) +{ + int temp; + + switch (nb) + { + case 4: + temp = Sbox[statemt[1] >> 4][statemt[1] & 0xf]; + statemt[1] = Sbox[statemt[5] >> 4][statemt[5] & 0xf]; + statemt[5] = Sbox[statemt[9] >> 4][statemt[9] & 0xf]; + statemt[9] = Sbox[statemt[13] >> 4][statemt[13] & 0xf]; + statemt[13] = temp; + + temp = Sbox[statemt[2] >> 4][statemt[2] & 0xf]; + statemt[2] = Sbox[statemt[10] >> 4][statemt[10] & 0xf]; + statemt[10] = temp; + temp = Sbox[statemt[6] >> 4][statemt[6] & 0xf]; + statemt[6] = Sbox[statemt[14] >> 4][statemt[14] & 0xf]; + statemt[14] = temp; + + temp = Sbox[statemt[3] >> 4][statemt[3] & 0xf]; + statemt[3] = Sbox[statemt[15] >> 4][statemt[15] & 0xf]; + statemt[15] = Sbox[statemt[11] >> 4][statemt[11] & 0xf]; + statemt[11] = Sbox[statemt[7] >> 4][statemt[7] & 0xf]; + statemt[7] = temp; + + statemt[0] = Sbox[statemt[0] >> 4][statemt[0] & 0xf]; + statemt[4] = Sbox[statemt[4] >> 4][statemt[4] & 0xf]; + statemt[8] = Sbox[statemt[8] >> 4][statemt[8] & 0xf]; + statemt[12] = Sbox[statemt[12] >> 4][statemt[12] & 0xf]; + break; + case 6: + temp = Sbox[statemt[1] >> 4][statemt[1] & 0xf]; + statemt[1] = Sbox[statemt[5] >> 4][statemt[5] & 0xf]; + statemt[5] = Sbox[statemt[9] >> 4][statemt[9] & 0xf]; + statemt[9] = Sbox[statemt[13] >> 4][statemt[13] & 0xf]; + statemt[13] = Sbox[statemt[17] >> 4][statemt[17] & 0xf]; + statemt[17] = Sbox[statemt[21] >> 4][statemt[21] & 0xf]; + statemt[21] = temp; + + temp = Sbox[statemt[2] >> 4][statemt[2] & 0xf]; + statemt[2] = Sbox[statemt[10] >> 4][statemt[10] & 0xf]; + statemt[10] = Sbox[statemt[18] >> 4][statemt[18] & 0xf]; + statemt[18] = temp; + temp = Sbox[statemt[6] >> 4][statemt[6] & 0xf]; + statemt[6] = Sbox[statemt[14] >> 4][statemt[14] & 0xf]; + statemt[14] = Sbox[statemt[22] >> 4][statemt[22] & 0xf]; + statemt[22] = temp; + + temp = Sbox[statemt[3] >> 4][statemt[3] & 0xf]; + statemt[3] = Sbox[statemt[15] >> 4][statemt[15] & 0xf]; + statemt[15] = temp; + temp = Sbox[statemt[7] >> 4][statemt[7] & 0xf]; + statemt[7] = Sbox[statemt[19] >> 4][statemt[19] & 0xf]; + statemt[19] = temp; + temp = Sbox[statemt[11] >> 4][statemt[11] & 0xf]; + statemt[11] = Sbox[statemt[23] >> 4][statemt[23] & 0xf]; + statemt[23] = temp; + + statemt[0] = Sbox[statemt[0] >> 4][statemt[0] & 0xf]; + statemt[4] = Sbox[statemt[4] >> 4][statemt[4] & 0xf]; + statemt[8] = Sbox[statemt[8] >> 4][statemt[8] & 0xf]; + statemt[12] = Sbox[statemt[12] >> 4][statemt[12] & 0xf]; + statemt[16] = Sbox[statemt[16] >> 4][statemt[16] & 0xf]; + statemt[20] = Sbox[statemt[20] >> 4][statemt[20] & 0xf]; + break; + case 8: + temp = Sbox[statemt[1] >> 4][statemt[1] & 0xf]; + statemt[1] = Sbox[statemt[5] >> 4][statemt[5] & 0xf]; + statemt[5] = Sbox[statemt[9] >> 4][statemt[9] & 0xf]; + statemt[9] = Sbox[statemt[13] >> 4][statemt[13] & 0xf]; + statemt[13] = Sbox[statemt[17] >> 4][statemt[17] & 0xf]; + statemt[17] = Sbox[statemt[21] >> 4][statemt[21] & 0xf]; + statemt[21] = Sbox[statemt[25] >> 4][statemt[25] & 0xf]; + statemt[25] = Sbox[statemt[29] >> 4][statemt[29] & 0xf]; + statemt[29] = temp; + + temp = Sbox[statemt[2] >> 4][statemt[2] & 0xf]; + statemt[2] = Sbox[statemt[14] >> 4][statemt[14] & 0xf]; + statemt[14] = Sbox[statemt[26] >> 4][statemt[26] & 0xf]; + statemt[26] = Sbox[statemt[6] >> 4][statemt[6] & 0xf]; + statemt[6] = Sbox[statemt[18] >> 4][statemt[18] & 0xf]; + statemt[18] = Sbox[statemt[30] >> 4][statemt[30] & 0xf]; + statemt[30] = Sbox[statemt[10] >> 4][statemt[10] & 0xf]; + statemt[10] = Sbox[statemt[22] >> 4][statemt[22] & 0xf]; + statemt[22] = temp; + + temp = Sbox[statemt[3] >> 4][statemt[3] & 0xf]; + statemt[3] = Sbox[statemt[19] >> 4][statemt[19] & 0xf]; + statemt[19] = temp; + temp = Sbox[statemt[7] >> 4][statemt[7] & 0xf]; + statemt[7] = Sbox[statemt[23] >> 4][statemt[23] & 0xf]; + statemt[23] = temp; + temp = Sbox[statemt[11] >> 4][statemt[11] & 0xf]; + statemt[11] = Sbox[statemt[27] >> 4][statemt[27] & 0xf]; + statemt[27] = temp; + temp = Sbox[statemt[15] >> 4][statemt[15] & 0xf]; + statemt[15] = Sbox[statemt[31] >> 4][statemt[31] & 0xf]; + statemt[31] = temp; + + statemt[0] = Sbox[statemt[0] >> 4][statemt[0] & 0xf]; + statemt[4] = Sbox[statemt[4] >> 4][statemt[4] & 0xf]; + statemt[8] = Sbox[statemt[8] >> 4][statemt[8] & 0xf]; + statemt[12] = Sbox[statemt[12] >> 4][statemt[12] & 0xf]; + statemt[16] = Sbox[statemt[16] >> 4][statemt[16] & 0xf]; + statemt[20] = Sbox[statemt[20] >> 4][statemt[20] & 0xf]; + statemt[24] = Sbox[statemt[24] >> 4][statemt[24] & 0xf]; + statemt[28] = Sbox[statemt[28] >> 4][statemt[28] & 0xf]; + break; + } +} + +int +SubByte (int in) +{ + return Sbox[(in / 16)][(in % 16)]; +} + +/* ********* InversShiftRow & ByteSub ********* */ +void +InversShiftRow_ByteSub (int statemt[32], int nb) +{ + int temp; + + switch (nb) + { + case 4: + temp = invSbox[statemt[13] >> 4][statemt[13] & 0xf]; + statemt[13] = invSbox[statemt[9] >> 4][statemt[9] & 0xf]; + statemt[9] = invSbox[statemt[5] >> 4][statemt[5] & 0xf]; + statemt[5] = invSbox[statemt[1] >> 4][statemt[1] & 0xf]; + statemt[1] = temp; + + temp = invSbox[statemt[14] >> 4][statemt[14] & 0xf]; + statemt[14] = invSbox[statemt[6] >> 4][statemt[6] & 0xf]; + statemt[6] = temp; + temp = invSbox[statemt[2] >> 4][statemt[2] & 0xf]; + statemt[2] = invSbox[statemt[10] >> 4][statemt[10] & 0xf]; + statemt[10] = temp; + + temp = invSbox[statemt[15] >> 4][statemt[15] & 0xf]; + statemt[15] = invSbox[statemt[3] >> 4][statemt[3] & 0xf]; + statemt[3] = invSbox[statemt[7] >> 4][statemt[7] & 0xf]; + statemt[7] = invSbox[statemt[11] >> 4][statemt[11] & 0xf]; + statemt[11] = temp; + + statemt[0] = invSbox[statemt[0] >> 4][statemt[0] & 0xf]; + statemt[4] = invSbox[statemt[4] >> 4][statemt[4] & 0xf]; + statemt[8] = invSbox[statemt[8] >> 4][statemt[8] & 0xf]; + statemt[12] = invSbox[statemt[12] >> 4][statemt[12] & 0xf]; + break; + case 6: + temp = invSbox[statemt[21] >> 4][statemt[21] & 0xf]; + statemt[21] = invSbox[statemt[17] >> 4][statemt[17] & 0xf]; + statemt[17] = invSbox[statemt[13] >> 4][statemt[13] & 0xf]; + statemt[13] = invSbox[statemt[9] >> 4][statemt[9] & 0xf]; + statemt[9] = invSbox[statemt[5] >> 4][statemt[5] & 0xf]; + statemt[5] = invSbox[statemt[1] >> 4][statemt[1] & 0xf]; + statemt[1] = temp; + + temp = invSbox[statemt[22] >> 4][statemt[22] & 0xf]; + statemt[22] = invSbox[statemt[14] >> 4][statemt[14] & 0xf]; + statemt[14] = invSbox[statemt[6] >> 4][statemt[6] & 0xf]; + statemt[6] = temp; + temp = invSbox[statemt[18] >> 4][statemt[18] & 0xf]; + statemt[18] = invSbox[statemt[10] >> 4][statemt[10] & 0xf]; + statemt[10] = invSbox[statemt[2] >> 4][statemt[2] & 0xf]; + statemt[2] = temp; + + temp = invSbox[statemt[15] >> 4][statemt[15] & 0xf]; + statemt[15] = invSbox[statemt[3] >> 4][statemt[3] & 0xf]; + statemt[3] = temp; + temp = invSbox[statemt[19] >> 4][statemt[19] & 0xf]; + statemt[19] = invSbox[statemt[7] >> 4][statemt[7] & 0xf]; + statemt[7] = temp; + temp = invSbox[statemt[23] >> 4][statemt[23] & 0xf]; + statemt[23] = invSbox[statemt[11] >> 4][statemt[11] & 0xf]; + statemt[11] = temp; + + statemt[0] = invSbox[statemt[0] >> 4][statemt[0] & 0xf]; + statemt[4] = invSbox[statemt[4] >> 4][statemt[4] & 0xf]; + statemt[8] = invSbox[statemt[8] >> 4][statemt[8] & 0xf]; + statemt[12] = invSbox[statemt[12] >> 4][statemt[12] & 0xf]; + statemt[16] = invSbox[statemt[16] >> 4][statemt[16] & 0xf]; + statemt[20] = invSbox[statemt[20] >> 4][statemt[20] & 0xf]; + break; + case 8: + temp = invSbox[statemt[29] >> 4][statemt[29] & 0xf]; + statemt[29] = invSbox[statemt[25] >> 4][statemt[25] & 0xf]; + statemt[25] = invSbox[statemt[21] >> 4][statemt[21] & 0xf]; + statemt[21] = invSbox[statemt[17] >> 4][statemt[17] & 0xf]; + statemt[17] = invSbox[statemt[13] >> 4][statemt[13] & 0xf]; + statemt[13] = invSbox[statemt[9] >> 4][statemt[9] & 0xf]; + statemt[9] = invSbox[statemt[5] >> 4][statemt[5] & 0xf]; + statemt[5] = invSbox[statemt[1] >> 4][statemt[1] & 0xf]; + statemt[1] = temp; + + temp = invSbox[statemt[30] >> 4][statemt[30] & 0xf]; + statemt[30] = invSbox[statemt[18] >> 4][statemt[18] & 0xf]; + statemt[18] = invSbox[statemt[6] >> 4][statemt[6] & 0xf]; + statemt[6] = invSbox[statemt[26] >> 4][statemt[26] & 0xf]; + statemt[26] = invSbox[statemt[14] >> 4][statemt[14] & 0xf]; + statemt[14] = invSbox[statemt[2] >> 4][statemt[2] & 0xf]; + statemt[2] = invSbox[statemt[22] >> 4][statemt[22] & 0xf]; + statemt[22] = invSbox[statemt[10] >> 4][statemt[10] & 0xf]; + statemt[10] = temp; + + temp = invSbox[statemt[31] >> 4][statemt[31] & 0xf]; + statemt[31] = invSbox[statemt[15] >> 4][statemt[15] & 0xf]; + statemt[15] = temp; + temp = invSbox[statemt[27] >> 4][statemt[27] & 0xf]; + statemt[27] = invSbox[statemt[11] >> 4][statemt[11] & 0xf]; + statemt[11] = temp; + temp = invSbox[statemt[23] >> 4][statemt[23] & 0xf]; + statemt[23] = invSbox[statemt[7] >> 4][statemt[7] & 0xf]; + statemt[7] = temp; + temp = invSbox[statemt[19] >> 4][statemt[19] & 0xf]; + statemt[19] = invSbox[statemt[3] >> 4][statemt[3] & 0xf]; + statemt[3] = temp; + + statemt[0] = invSbox[statemt[0] >> 4][statemt[0] & 0xf]; + statemt[4] = invSbox[statemt[4] >> 4][statemt[4] & 0xf]; + statemt[8] = invSbox[statemt[8] >> 4][statemt[8] & 0xf]; + statemt[12] = invSbox[statemt[12] >> 4][statemt[12] & 0xf]; + statemt[16] = invSbox[statemt[16] >> 4][statemt[16] & 0xf]; + statemt[20] = invSbox[statemt[20] >> 4][statemt[20] & 0xf]; + statemt[24] = invSbox[statemt[24] >> 4][statemt[24] & 0xf]; + statemt[28] = invSbox[statemt[28] >> 4][statemt[28] & 0xf]; + break; + } +} + +/* ******** MixColumn ********** */ +int +MixColumn_AddRoundKey (int statemt[32], int nb, int n) +{ + int ret[8 * 4], j; + register int x; + + for (j = 0; j < nb; ++j) + { + ret[j * 4] = (statemt[j * 4] << 1); + if ((ret[j * 4] >> 8) == 1) + ret[j * 4] ^= 283; + x = statemt[1 + j * 4]; + x ^= (x << 1); + if ((x >> 8) == 1) + ret[j * 4] ^= (x ^ 283); + else + ret[j * 4] ^= x; + ret[j * 4] ^= + statemt[2 + j * 4] ^ statemt[3 + j * 4] ^ word[0][j + nb * n]; + + ret[1 + j * 4] = (statemt[1 + j * 4] << 1); + if ((ret[1 + j * 4] >> 8) == 1) + ret[1 + j * 4] ^= 283; + x = statemt[2 + j * 4]; + x ^= (x << 1); + if ((x >> 8) == 1) + ret[1 + j * 4] ^= (x ^ 283); + else + ret[1 + j * 4] ^= x; + ret[1 + j * 4] ^= + statemt[3 + j * 4] ^ statemt[j * 4] ^ word[1][j + nb * n]; + + ret[2 + j * 4] = (statemt[2 + j * 4] << 1); + if ((ret[2 + j * 4] >> 8) == 1) + ret[2 + j * 4] ^= 283; + x = statemt[3 + j * 4]; + x ^= (x << 1); + if ((x >> 8) == 1) + ret[2 + j * 4] ^= (x ^ 283); + else + ret[2 + j * 4] ^= x; + ret[2 + j * 4] ^= + statemt[j * 4] ^ statemt[1 + j * 4] ^ word[2][j + nb * n]; + + ret[3 + j * 4] = (statemt[3 + j * 4] << 1); + if ((ret[3 + j * 4] >> 8) == 1) + ret[3 + j * 4] ^= 283; + x = statemt[j * 4]; + x ^= (x << 1); + if ((x >> 8) == 1) + ret[3 + j * 4] ^= (x ^ 283); + else + ret[3 + j * 4] ^= x; + ret[3 + j * 4] ^= + statemt[1 + j * 4] ^ statemt[2 + j * 4] ^ word[3][j + nb * n]; + } + for (j = 0; j < nb; ++j) + { + statemt[j * 4] = ret[j * 4]; + statemt[1 + j * 4] = ret[1 + j * 4]; + statemt[2 + j * 4] = ret[2 + j * 4]; + statemt[3 + j * 4] = ret[3 + j * 4]; + } + return 0; +} + +/* ******** InversMixColumn ********** */ +int +AddRoundKey_InversMixColumn (int statemt[32], int nb, int n) +{ + int ret[8 * 4], i, j; + register int x; + + for (j = 0; j < nb; ++j) + { + statemt[j * 4] ^= word[0][j + nb * n]; + statemt[1 + j * 4] ^= word[1][j + nb * n]; + statemt[2 + j * 4] ^= word[2][j + nb * n]; + statemt[3 + j * 4] ^= word[3][j + nb * n]; + } + for (j = 0; j < nb; ++j) + for (i = 0; i < 4; ++i) + { + x = (statemt[i + j * 4] << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[i + j * 4]; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[i + j * 4]; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + ret[i + j * 4] = x; + + x = (statemt[(i + 1) % 4 + j * 4] << 1); + if ((x >> 8) == 1) + x ^= 283; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[(i + 1) % 4 + j * 4]; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[(i + 1) % 4 + j * 4]; + ret[i + j * 4] ^= x; + + x = (statemt[(i + 2) % 4 + j * 4] << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[(i + 2) % 4 + j * 4]; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[(i + 2) % 4 + j * 4]; + ret[i + j * 4] ^= x; + + x = (statemt[(i + 3) % 4 + j * 4] << 1); + if ((x >> 8) == 1) + x ^= 283; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x = (x << 1); + if ((x >> 8) == 1) + x ^= 283; + x ^= statemt[(i + 3) % 4 + j * 4]; + ret[i + j * 4] ^= x; + } + for (i = 0; i < nb; ++i) + { + statemt[i * 4] = ret[i * 4]; + statemt[1 + i * 4] = ret[1 + i * 4]; + statemt[2 + i * 4] = ret[2 + i * 4]; + statemt[3 + i * 4] = ret[3 + i * 4]; + } + return 0; +} + +/* ******** AddRoundKey ********** */ +int +AddRoundKey (int statemt[32], int type, int n) +{ + int j, nb; + + switch (type) + { + case 128128: + case 192128: + case 256128: + nb = 4; + break; + case 128192: + case 192192: + case 256192: + nb = 6; + break; + case 128256: + case 192256: + case 256256: + nb = 8; + break; + } + for (j = 0; j < nb; ++j) + { + statemt[j * 4] ^= word[0][j + nb * n]; + statemt[1 + j * 4] ^= word[1][j + nb * n]; + statemt[2 + j * 4] ^= word[2][j + nb * n]; + statemt[3 + j * 4] ^= word[3][j + nb * n]; + } + return 0; +} diff --git a/benchmarks/CHStone/aes/aes_key.c b/benchmarks/CHStone/aes/aes_key.c new file mode 100755 index 0000000..cac8412 --- /dev/null +++ b/benchmarks/CHStone/aes/aes_key.c @@ -0,0 +1,163 @@ +/* ++--------------------------------------------------------------------------+ +| CHStone : a suite of benchmark programs for C-based High-Level Synthesis | +| ======================================================================== | +| | +| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, | +| H. Takada and K. Ishii | +| Nagoya University, Japan | +| | +| * Remark : | +| 1. This source code is modified to unify the formats of the benchmark | +| programs in CHStone. | +| 2. Test vectors are added for CHStone. | +| 3. If "main_result" is 0 at the end of the program, the program is | +| correctly executed. | +| 4. Please follow the copyright of each benchmark program. | ++--------------------------------------------------------------------------+ +*/ +/* aes_key.c */ +/* + * Copyright (C) 2005 + * Akira Iwata & Masayuki Sato + * Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan. + * + * All rights reserved. + * + * This software is written by Masayuki Sato. + * And if you want to contact us, send an email to Kimitake Wakayama + * (wakayama@elcom.nitech.ac.jp) + * + * Redistribution and use in source and binary forms, with or without modification, + * are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. All advertising materials mentioning features or use of this software must + * display the following acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * 4. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by Akira Iwata Laboratory, + * Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)." + * + * THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. + * AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + * SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, + * IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL, + * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + */ + +/* **************key generate & key display *******************/ +const int Rcon0[30] = { + 0x01, 0x02, 0x04, 0x08, + 0x10, 0x20, 0x40, 0x80, + 0x1b, 0x36, 0x6c, 0xd8, + 0xab, 0x4d, 0x9a, 0x2f, + 0x5e, 0xbc, 0x63, 0xc6, + 0x97, 0x35, 0x6a, 0xd4, + 0xb3, 0x7d, 0xfa, 0xef, + 0xc5, 0x91, +}; + +/* **************** key expand ************************ */ +int +KeySchedule (int type, int key[32]) +{ + int nk, nb, round_val; + int i, j, temp[4]; + + switch (type) + { + case 128128: + nk = 4; + nb = 4; + round_val = 10; + break; + case 128192: + nk = 4; + nb = 6; + round_val = 12; + break; + case 128256: + nk = 4; + nb = 8; + round_val = 14; + break; + case 192128: + nk = 6; + nb = 4; + round_val = 12; + break; + case 192192: + nk = 6; + nb = 6; + round_val = 12; + break; + case 192256: + nk = 6; + nb = 8; + round_val = 14; + break; + case 256128: + nk = 8; + nb = 4; + round_val = 14; + break; + case 256192: + nk = 8; + nb = 6; + round_val = 14; + break; + case 256256: + nk = 8; + nb = 8; + round_val = 14; + break; + default: + return -1; + } + for (j = 0; j < nk; ++j) + for (i = 0; i < 4; ++i) +/* 0 word */ + word[i][j] = key[i + j * 4]; + +/* expanded key is generated */ + for (j = nk; j < nb * (round_val + 1); ++j) + { + +/* RotByte */ + if ((j % nk) == 0) + { + temp[0] = SubByte (word[1][j - 1]) ^ Rcon0[(j / nk) - 1]; + temp[1] = SubByte (word[2][j - 1]); + temp[2] = SubByte (word[3][j - 1]); + temp[3] = SubByte (word[0][j - 1]); + } + if ((j % nk) != 0) + { + temp[0] = word[0][j - 1]; + temp[1] = word[1][j - 1]; + temp[2] = word[2][j - 1]; + temp[3] = word[3][j - 1]; + } + if (nk > 6 && j % nk == 4) + for (i = 0; i < 4; ++i) + temp[i] = SubByte (temp[i]); + for (i = 0; i < 4; ++i) + word[i][j] = word[i][j - nk] ^ temp[i]; + } + return 0; +} -- cgit