PandA-2024.02
examples
hls_study
aes_decrypt
optimized
aes_enc.c
Go to the documentation of this file.
1
/*
2
+--------------------------------------------------------------------------+
3
| CHStone : a suite of benchmark programs for C-based High-Level Synthesis |
4
| ======================================================================== |
5
| |
6
| * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, |
7
| H. Takada and K. Ishii |
8
| Nagoya University, Japan |
9
| |
10
| * Remark : |
11
| 1. This source code is modified to unify the formats of the benchmark |
12
| programs in CHStone. |
13
| 2. Test vectors are added for CHStone. |
14
| 3. If "main_result" is 0 at the end of the program, the program is |
15
| correctly executed. |
16
| 4. Please follow the copyright of each benchmark program. |
17
+--------------------------------------------------------------------------+
18
*/
19
/* aes_enc.c */
20
/*
21
* Copyright (C) 2005
22
* Akira Iwata & Masayuki Sato
23
* Akira Iwata Laboratory,
24
* Nagoya Institute of Technology in Japan.
25
*
26
* All rights reserved.
27
*
28
* This software is written by Masayuki Sato.
29
* And if you want to contact us, send an email to Kimitake Wakayama
30
* (wakayama@elcom.nitech.ac.jp)
31
*
32
* Redistribution and use in source and binary forms, with or without modification,
33
* are permitted provided that the following conditions are met:
34
*
35
* 1. Redistributions of source code must retain the above copyright notice,
36
* this list of conditions and the following disclaimer.
37
*
38
* 2. Redistributions in binary form must reproduce the above copyright notice,
39
* this list of conditions and the following disclaimer in the documentation
40
* and/or other materials provided with the distribution.
41
*
42
* 3. All advertising materials mentioning features or use of this software must
43
* display the following acknowledgment:
44
* "This product includes software developed by Akira Iwata Laboratory,
45
* Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)."
46
*
47
* 4. Redistributions of any form whatsoever must retain the following
48
* acknowledgment:
49
* "This product includes software developed by Akira Iwata Laboratory,
50
* Nagoya Institute of Technology in Japan (http://mars.elcom.nitech.ac.jp/)."
51
*
52
* THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY.
53
* AKIRA IWATA LABORATORY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS
54
* SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS,
55
* IN NO EVENT SHALL AKIRA IWATA LABORATORY BE LIABLE FOR ANY SPECIAL,
56
* INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
57
* FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
58
* NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION
59
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
60
*
61
*/
62
/* ******* encrypto ************ */
63
int
64
encrypt
(
int
statemt
[32],
int
key
[32],
int
type
)
65
{
66
int
i;
67
/*
68
+--------------------------------------------------------------------------+
69
| * Test Vector (added for CHStone) |
70
| out_enc_statemt : expected output data for "encrypt" |
71
+--------------------------------------------------------------------------+
72
*/
73
const
int
out_enc_statemt[16] =
74
{ 0x39, 0x25, 0x84, 0x1d, 0x2, 0xdc, 0x9, 0xfb, 0xdc, 0x11, 0x85, 0x97,
75
0x19, 0x6a, 0xb, 0x32
76
};
77
78
KeySchedule
(type, key);
79
switch
(type)
80
{
81
case
128128:
82
i_round
= 0;
83
nb
= 4;
84
break
;
85
case
192128:
86
i_round
= 2;
87
nb
= 4;
88
break
;
89
case
256128:
90
i_round
= 4;
91
nb
= 4;
92
break
;
93
case
128192:
94
case
192192:
95
i_round
= 2;
96
nb
= 6;
97
break
;
98
case
256192:
99
i_round
= 4;
100
nb
= 6;
101
break
;
102
case
128256:
103
case
192256:
104
case
256256:
105
i_round
= 4;
106
nb
= 8;
107
break
;
108
}
109
AddRoundKey
(statemt, type, 0);
110
for
(i = 1; i <=
i_round
+ 9; ++i)
111
{
112
ByteSub_ShiftRow
(statemt,
nb
);
113
MixColumn_AddRoundKey
(statemt,
nb
, i);
114
}
115
ByteSub_ShiftRow
(statemt,
nb
);
116
AddRoundKey
(statemt, type, i);
117
118
printf (
"encrypted message \t"
);
119
for
(i = 0; i <
nb
* 4; ++i)
120
{
121
if
(statemt[i] < 16)
122
printf (
"0"
);
123
printf (
"%x"
, statemt[i]);
124
}
125
126
for
(i = 0; i < 16; i++)
127
main_result
+= (statemt[i] != out_enc_statemt[i]);
128
129
return
0;
130
}
encrypt
int encrypt(int statemt[32], int key[32], int type)
Definition:
aes_enc.c:64
test_panda.type
type
Definition:
test_panda.py:447
AddRoundKey
int AddRoundKey(int *, int, int)
main_result
int main_result
Definition:
mips.c:38
KeySchedule
int KeySchedule(int, int *)
key
int key[32]
Definition:
aes.h:67
statemt
int statemt[32]
Definition:
aes.h:68
ByteSub_ShiftRow
void ByteSub_ShiftRow(int *, int)
nb
int nb
Definition:
aes.h:65
i_round
int i_round
Definition:
aes.h:66
MixColumn_AddRoundKey
int MixColumn_AddRoundKey(int *, int, int)
Generated on Mon Feb 12 2024 13:02:48 for PandA-2024.02 by
1.8.13