target/arm: Implement pauth_computepac
This is the main crypto routine, an implementation of QARMA. This matches, as much as possible, ARM pseudocode. Signed-off-by: Richard Henderson <richard.henderson@linaro.org> Reviewed-by: Peter Maydell <peter.maydell@linaro.org> Message-id: 20190108223129.5570-28-richard.henderson@linaro.org [PMM: fixed minor checkpatch nits] Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
parent
63ff0ca94c
commit
990870b205
@ -26,10 +26,250 @@
|
||||
#include "tcg/tcg-gvec-desc.h"
|
||||
|
||||
|
||||
static uint64_t pac_cell_shuffle(uint64_t i)
|
||||
{
|
||||
uint64_t o = 0;
|
||||
|
||||
o |= extract64(i, 52, 4);
|
||||
o |= extract64(i, 24, 4) << 4;
|
||||
o |= extract64(i, 44, 4) << 8;
|
||||
o |= extract64(i, 0, 4) << 12;
|
||||
|
||||
o |= extract64(i, 28, 4) << 16;
|
||||
o |= extract64(i, 48, 4) << 20;
|
||||
o |= extract64(i, 4, 4) << 24;
|
||||
o |= extract64(i, 40, 4) << 28;
|
||||
|
||||
o |= extract64(i, 32, 4) << 32;
|
||||
o |= extract64(i, 12, 4) << 36;
|
||||
o |= extract64(i, 56, 4) << 40;
|
||||
o |= extract64(i, 20, 4) << 44;
|
||||
|
||||
o |= extract64(i, 8, 4) << 48;
|
||||
o |= extract64(i, 36, 4) << 52;
|
||||
o |= extract64(i, 16, 4) << 56;
|
||||
o |= extract64(i, 60, 4) << 60;
|
||||
|
||||
return o;
|
||||
}
|
||||
|
||||
static uint64_t pac_cell_inv_shuffle(uint64_t i)
|
||||
{
|
||||
uint64_t o = 0;
|
||||
|
||||
o |= extract64(i, 12, 4);
|
||||
o |= extract64(i, 24, 4) << 4;
|
||||
o |= extract64(i, 48, 4) << 8;
|
||||
o |= extract64(i, 36, 4) << 12;
|
||||
|
||||
o |= extract64(i, 56, 4) << 16;
|
||||
o |= extract64(i, 44, 4) << 20;
|
||||
o |= extract64(i, 4, 4) << 24;
|
||||
o |= extract64(i, 16, 4) << 28;
|
||||
|
||||
o |= i & MAKE_64BIT_MASK(32, 4);
|
||||
o |= extract64(i, 52, 4) << 36;
|
||||
o |= extract64(i, 28, 4) << 40;
|
||||
o |= extract64(i, 8, 4) << 44;
|
||||
|
||||
o |= extract64(i, 20, 4) << 48;
|
||||
o |= extract64(i, 0, 4) << 52;
|
||||
o |= extract64(i, 40, 4) << 56;
|
||||
o |= i & MAKE_64BIT_MASK(60, 4);
|
||||
|
||||
return o;
|
||||
}
|
||||
|
||||
static uint64_t pac_sub(uint64_t i)
|
||||
{
|
||||
static const uint8_t sub[16] = {
|
||||
0xb, 0x6, 0x8, 0xf, 0xc, 0x0, 0x9, 0xe,
|
||||
0x3, 0x7, 0x4, 0x5, 0xd, 0x2, 0x1, 0xa,
|
||||
};
|
||||
uint64_t o = 0;
|
||||
int b;
|
||||
|
||||
for (b = 0; b < 64; b += 16) {
|
||||
o |= (uint64_t)sub[(i >> b) & 0xf] << b;
|
||||
}
|
||||
return o;
|
||||
}
|
||||
|
||||
static uint64_t pac_inv_sub(uint64_t i)
|
||||
{
|
||||
static const uint8_t inv_sub[16] = {
|
||||
0x5, 0xe, 0xd, 0x8, 0xa, 0xb, 0x1, 0x9,
|
||||
0x2, 0x6, 0xf, 0x0, 0x4, 0xc, 0x7, 0x3,
|
||||
};
|
||||
uint64_t o = 0;
|
||||
int b;
|
||||
|
||||
for (b = 0; b < 64; b += 16) {
|
||||
o |= (uint64_t)inv_sub[(i >> b) & 0xf] << b;
|
||||
}
|
||||
return o;
|
||||
}
|
||||
|
||||
static int rot_cell(int cell, int n)
|
||||
{
|
||||
/* 4-bit rotate left by n. */
|
||||
cell |= cell << 4;
|
||||
return extract32(cell, 4 - n, 4);
|
||||
}
|
||||
|
||||
static uint64_t pac_mult(uint64_t i)
|
||||
{
|
||||
uint64_t o = 0;
|
||||
int b;
|
||||
|
||||
for (b = 0; b < 4 * 4; b += 4) {
|
||||
int i0, i4, i8, ic, t0, t1, t2, t3;
|
||||
|
||||
i0 = extract64(i, b, 4);
|
||||
i4 = extract64(i, b + 4 * 4, 4);
|
||||
i8 = extract64(i, b + 8 * 4, 4);
|
||||
ic = extract64(i, b + 12 * 4, 4);
|
||||
|
||||
t0 = rot_cell(i8, 1) ^ rot_cell(i4, 2) ^ rot_cell(i0, 1);
|
||||
t1 = rot_cell(ic, 1) ^ rot_cell(i4, 1) ^ rot_cell(i0, 2);
|
||||
t2 = rot_cell(ic, 2) ^ rot_cell(i8, 1) ^ rot_cell(i0, 1);
|
||||
t3 = rot_cell(ic, 1) ^ rot_cell(i8, 2) ^ rot_cell(i4, 1);
|
||||
|
||||
o |= (uint64_t)t3 << b;
|
||||
o |= (uint64_t)t2 << (b + 4 * 4);
|
||||
o |= (uint64_t)t1 << (b + 8 * 4);
|
||||
o |= (uint64_t)t0 << (b + 12 * 4);
|
||||
}
|
||||
return o;
|
||||
}
|
||||
|
||||
static uint64_t tweak_cell_rot(uint64_t cell)
|
||||
{
|
||||
return (cell >> 1) | (((cell ^ (cell >> 1)) & 1) << 3);
|
||||
}
|
||||
|
||||
static uint64_t tweak_shuffle(uint64_t i)
|
||||
{
|
||||
uint64_t o = 0;
|
||||
|
||||
o |= extract64(i, 16, 4) << 0;
|
||||
o |= extract64(i, 20, 4) << 4;
|
||||
o |= tweak_cell_rot(extract64(i, 24, 4)) << 8;
|
||||
o |= extract64(i, 28, 4) << 12;
|
||||
|
||||
o |= tweak_cell_rot(extract64(i, 44, 4)) << 16;
|
||||
o |= extract64(i, 8, 4) << 20;
|
||||
o |= extract64(i, 12, 4) << 24;
|
||||
o |= tweak_cell_rot(extract64(i, 32, 4)) << 28;
|
||||
|
||||
o |= extract64(i, 48, 4) << 32;
|
||||
o |= extract64(i, 52, 4) << 36;
|
||||
o |= extract64(i, 56, 4) << 40;
|
||||
o |= tweak_cell_rot(extract64(i, 60, 4)) << 44;
|
||||
|
||||
o |= tweak_cell_rot(extract64(i, 0, 4)) << 48;
|
||||
o |= extract64(i, 4, 4) << 52;
|
||||
o |= tweak_cell_rot(extract64(i, 40, 4)) << 56;
|
||||
o |= tweak_cell_rot(extract64(i, 36, 4)) << 60;
|
||||
|
||||
return o;
|
||||
}
|
||||
|
||||
static uint64_t tweak_cell_inv_rot(uint64_t cell)
|
||||
{
|
||||
return ((cell << 1) & 0xf) | ((cell & 1) ^ (cell >> 3));
|
||||
}
|
||||
|
||||
static uint64_t tweak_inv_shuffle(uint64_t i)
|
||||
{
|
||||
uint64_t o = 0;
|
||||
|
||||
o |= tweak_cell_inv_rot(extract64(i, 48, 4));
|
||||
o |= extract64(i, 52, 4) << 4;
|
||||
o |= extract64(i, 20, 4) << 8;
|
||||
o |= extract64(i, 24, 4) << 12;
|
||||
|
||||
o |= extract64(i, 0, 4) << 16;
|
||||
o |= extract64(i, 4, 4) << 20;
|
||||
o |= tweak_cell_inv_rot(extract64(i, 8, 4)) << 24;
|
||||
o |= extract64(i, 12, 4) << 28;
|
||||
|
||||
o |= tweak_cell_inv_rot(extract64(i, 28, 4)) << 32;
|
||||
o |= tweak_cell_inv_rot(extract64(i, 60, 4)) << 36;
|
||||
o |= tweak_cell_inv_rot(extract64(i, 56, 4)) << 40;
|
||||
o |= tweak_cell_inv_rot(extract64(i, 16, 4)) << 44;
|
||||
|
||||
o |= extract64(i, 32, 4) << 48;
|
||||
o |= extract64(i, 36, 4) << 52;
|
||||
o |= extract64(i, 40, 4) << 56;
|
||||
o |= tweak_cell_inv_rot(extract64(i, 44, 4)) << 60;
|
||||
|
||||
return o;
|
||||
}
|
||||
|
||||
static uint64_t pauth_computepac(uint64_t data, uint64_t modifier,
|
||||
ARMPACKey key)
|
||||
{
|
||||
g_assert_not_reached(); /* FIXME */
|
||||
static const uint64_t RC[5] = {
|
||||
0x0000000000000000ull,
|
||||
0x13198A2E03707344ull,
|
||||
0xA4093822299F31D0ull,
|
||||
0x082EFA98EC4E6C89ull,
|
||||
0x452821E638D01377ull,
|
||||
};
|
||||
const uint64_t alpha = 0xC0AC29B7C97C50DDull;
|
||||
/*
|
||||
* Note that in the ARM pseudocode, key0 contains bits <127:64>
|
||||
* and key1 contains bits <63:0> of the 128-bit key.
|
||||
*/
|
||||
uint64_t key0 = key.hi, key1 = key.lo;
|
||||
uint64_t workingval, runningmod, roundkey, modk0;
|
||||
int i;
|
||||
|
||||
modk0 = (key0 << 63) | ((key0 >> 1) ^ (key0 >> 63));
|
||||
runningmod = modifier;
|
||||
workingval = data ^ key0;
|
||||
|
||||
for (i = 0; i <= 4; ++i) {
|
||||
roundkey = key1 ^ runningmod;
|
||||
workingval ^= roundkey;
|
||||
workingval ^= RC[i];
|
||||
if (i > 0) {
|
||||
workingval = pac_cell_shuffle(workingval);
|
||||
workingval = pac_mult(workingval);
|
||||
}
|
||||
workingval = pac_sub(workingval);
|
||||
runningmod = tweak_shuffle(runningmod);
|
||||
}
|
||||
roundkey = modk0 ^ runningmod;
|
||||
workingval ^= roundkey;
|
||||
workingval = pac_cell_shuffle(workingval);
|
||||
workingval = pac_mult(workingval);
|
||||
workingval = pac_sub(workingval);
|
||||
workingval = pac_cell_shuffle(workingval);
|
||||
workingval = pac_mult(workingval);
|
||||
workingval ^= key1;
|
||||
workingval = pac_cell_inv_shuffle(workingval);
|
||||
workingval = pac_inv_sub(workingval);
|
||||
workingval = pac_mult(workingval);
|
||||
workingval = pac_cell_inv_shuffle(workingval);
|
||||
workingval ^= key0;
|
||||
workingval ^= runningmod;
|
||||
for (i = 0; i <= 4; ++i) {
|
||||
workingval = pac_inv_sub(workingval);
|
||||
if (i < 4) {
|
||||
workingval = pac_mult(workingval);
|
||||
workingval = pac_cell_inv_shuffle(workingval);
|
||||
}
|
||||
runningmod = tweak_inv_shuffle(runningmod);
|
||||
roundkey = key1 ^ runningmod;
|
||||
workingval ^= RC[4 - i];
|
||||
workingval ^= roundkey;
|
||||
workingval ^= alpha;
|
||||
}
|
||||
workingval ^= modk0;
|
||||
|
||||
return workingval;
|
||||
}
|
||||
|
||||
static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
|
||||
|
Loading…
Reference in New Issue
Block a user