PandA-2024.02
examples
hls_study
aes_encrypt
optimized
aes_dec.c
Go to the documentation of this file.
1
/*
2
+--------------------------------------------------------------------------+
3
| CHStone : a suite of benchmark programs for C-based High-Level Synthesis |
4
| ======================================================================== |
5
| |
6
| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, |
7
| H. Takada and K. Ishii |
8
| Nagoya University, Japan |
9
| |
10
| * Remark : |
11
| 1. This source code is modified to unify the formats of the benchmark |
12
| programs in CHStone. |
13
| 2. Test vectors are added for CHStone. |
14
| 3. If "main_result" is 0 at the end of the program, the program is |
15
| correctly executed. |
16
| 4. Please follow the copyright of each benchmark program. |
17
+--------------------------------------------------------------------------+
18
*/
19
/* aes_dec.c */
20
/*
21
* Copyright (C) 2005
22
* Akira Iwata & Masayuki Sato
23
* Akira Iwata Laboratory,
24
* Nagoya Institute of Technology in Japan.
25
*
26
* All rights reserved.
27
*
28
* This software is written by Masayuki Sato.
29
* And if you want to contact us, send an email to Kimitake Wakayama
30
* (wakayama@elcom.nitech.ac.jp)
31
*
32
* Redistribution and use in source and binary forms, with or without modification,
33
* are permitted provided that the following conditions are met:
34
*
35
* 1. Redistributions of source code must retain the above copyright notice,
36
* this list of conditions and the following disclaimer.
37
*
38
* 2. Redistributions in binary form must reproduce the above copyright notice,
39
* this list of conditions and the following disclaimer in the documentation
40
* and/or other materials provided with the distribution.
41
*
42
* 3. All advertising materials mentioning features or use of this software must
43
* display the following acknowledgment:
44
* "This product includes software developed by Akira Iwata Laboratory,
45
* Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)."
46
*
47
* 4. Redistributions of any form whatsoever must retain the following
48
* acknowledgment:
49
* "This product includes software developed by Akira Iwata Laboratory,
50
* Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)."
51
*
52
* THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY.
53
* AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS
54
* SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS,
55
* IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL,
56
* INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
57
* FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
58
* NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION
59
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
60
*
61
*/
62
int
63
decrypt
(
int
statemt
[32],
int
key
[32],
int
type
)
64
{
65
int
i;
66
/*
67
+--------------------------------------------------------------------------+
68
| * Test Vector (added for CHStone) |
69
| out_enc_statemt : expected output data for "decrypt" |
70
+--------------------------------------------------------------------------+
71
*/
72
const
int
out_dec_statemt[16] =
73
{ 0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2,
74
0xe0, 0x37, 0x7, 0x34
75
};
76
KeySchedule
(type, key);
77
78
switch
(type)
79
{
80
case
128128:
81
i_round
= 10;
82
nb
= 4;
83
break
;
84
case
128192:
85
case
192192:
86
i_round
= 12;
87
nb
= 6;
88
break
;
89
case
192128:
90
i_round
= 12;
91
nb
= 4;
92
break
;
93
case
128256:
94
case
192256:
95
i_round
= 14;
96
nb
= 8;
97
break
;
98
case
256128:
99
i_round
= 14;
100
nb
= 4;
101
break
;
102
case
256192:
103
i_round
= 14;
104
nb
= 6;
105
break
;
106
case
256256:
107
i_round
= 14;
108
nb
= 8;
109
break
;
110
}
111
112
AddRoundKey
(statemt, type,
i_round
);
113
114
InversShiftRow_ByteSub
(statemt,
nb
);
115
116
for
(i =
i_round
- 1; i >= 1; --i)
117
{
118
AddRoundKey_InversMixColumn
(statemt,
nb
, i);
119
InversShiftRow_ByteSub
(statemt,
nb
);
120
}
121
122
AddRoundKey
(statemt, type, 0);
123
124
printf (
"\ndecrypto message\t"
);
125
for
(i = 0; i < ((type % 1000) / 8); ++i)
126
{
127
if
(statemt[i] < 16)
128
printf (
"0"
);
129
printf (
"%x"
, statemt[i]);
130
}
131
132
for
(i = 0; i < 16; i++)
133
main_result
+= (statemt[i] != out_dec_statemt[i]);
134
135
return
0;
136
}
test_panda.type
type
Definition:
test_panda.py:447
AddRoundKey
int AddRoundKey(int *, int, int)
main_result
int main_result
Definition:
mips.c:38
KeySchedule
int KeySchedule(int, int *)
key
int key[32]
Definition:
aes.h:67
decrypt
int decrypt(int statemt[32], int key[32], int type)
Definition:
aes_dec.c:63
statemt
int statemt[32]
Definition:
aes.h:68
InversShiftRow_ByteSub
void InversShiftRow_ByteSub(int *, int)
nb
int nb
Definition:
aes.h:65
AddRoundKey_InversMixColumn
int AddRoundKey_InversMixColumn(int *, int, int)
i_round
int i_round
Definition:
aes.h:66
Generated on Mon Feb 12 2024 13:02:48 for PandA-2024.02 by
1.8.13