|
/**
|
|
* \file avs_aes.c
|
|
* \brief AES Avalon IP Core software driver
|
|
*
|
|
* This file is part of the project avs_aes
|
|
* see: http://opencores.org/project,avs_aes
|
|
*
|
|
* \section AUTHORS
|
|
* Thomas Ruschival -- ruschi@opencores.org (www.ruschival.de)
|
|
*
|
|
* \section LICENSE
|
|
* Copyright (c) 2009, Authors and opencores.org
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without modification,
|
|
* are permitted provided that the following conditions are met:
|
|
* * Redistributions of source code must retain the above copyright notice,
|
|
* this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright notice,
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
* and/or other materials provided with the distribution.
|
|
* * Neither the name of the organization nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software without
|
|
* specific prior written permission.
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
|
|
* OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
|
|
* THE POSSIBILITY OF SUCH DAMAGE
|
|
*/
|
|
|
|
|
#include <avs_aes.h>
|
#include <avs_aes.h>
|
#include <string.h>
|
#include <string.h>
|
|
|
|
/**
|
|
* \brief setup the context to be used later.
|
|
* initializes the pointers to the correct memory locations
|
|
* \param context : struct grouping address information
|
|
*/
|
void avs_aes_init(avs_aes_handle* context){
|
void avs_aes_init(avs_aes_handle* context){
|
context->key = (unsigned int*) KEY_ADDR;
|
context->key = (unsigned int*) KEY_ADDR;
|
context->payload= (unsigned int*) DATA_ADDR;
|
context->payload= (unsigned int*) DATA_ADDR;
|
context->result = (unsigned int*) RESULT_ADDR;
|
context->result = (unsigned int*) RESULT_ADDR;
|
context->control = (unsigned int*) AESCTRLWD;
|
context->control = (unsigned int*) AESCTRLWD;
|
*(context->control) = 0x00000000;
|
*(context->control) = 0x00000000;
|
}
|
}
|
|
|
|
|
|
/**
|
|
* \brief setup the context to be used later.
|
|
* initializes the pointers to the correct memory locations
|
|
* \param context struct grouping address information
|
|
* \param key user key to load
|
|
*/
|
void avs_aes_setKey(avs_aes_handle* context, unsigned int* key){
|
void avs_aes_setKey(avs_aes_handle* context, unsigned int* key){
|
int i=0;
|
int i=0;
|
unsigned int* target_ptr = (unsigned int* )context->key;
|
unsigned int* target_ptr = (unsigned int* )context->key;
|
// Invalidate old key;
|
// Invalidate old key;
|
*(context->control) &= (~0x00000080);
|
*(context->control) &= (~0x00000080);
|
for(i=0; i<KEYWORDS; i++){
|
for(i=0; i<KEYWORDS; i++){
|
*(target_ptr++) = *(key++);
|
*(target_ptr++) = *(key++);
|
}
|
}
|
// validate key;
|
// validate key;
|
*(context->control) |= 0x00000080;
|
*(context->control) |= 0x00000080;
|
}
|
}
|
|
|
|
|
|
/**
|
|
* \brief loads payload for processing to the core
|
|
* basically memcopy...
|
|
* \param context struct grouping address information
|
|
* \param payload user data to be processed
|
|
*/
|
void avs_aes_setPayload(avs_aes_handle* context, unsigned int* payload){
|
void avs_aes_setPayload(avs_aes_handle* context, unsigned int* payload){
|
int i=0;
|
int i=0;
|
unsigned int* target_ptr = (unsigned int* )context->payload;
|
unsigned int* target_ptr = (unsigned int* )context->payload;
|
for(i=0; i<4; i++){
|
for(i=0; i<4; i++){
|
*(target_ptr++) = *(payload++);
|
*(target_ptr++) = *(payload++);
|
}
|
}
|
}
|
}
|
|
|
|
|
|
|
|
/**
|
|
* \brief set the KEY_VALID flag in the control word
|
|
* used to signal the completion of writing the key ( \ref avs_aes_setKey )
|
|
* \param context struct grouping address information
|
|
*/
|
void avs_aes_setKeyvalid(avs_aes_handle* context){
|
void avs_aes_setKeyvalid(avs_aes_handle* context){
|
*(context->control) |= 0x00000080;
|
*(context->control) |= 0x00000080;
|
}
|
}
|
|
|
|
|
|
/**
|
|
* \brief set the ENCRYPT flag in the control word
|
|
* start encryption of (hopefully) previously loaded payload
|
|
* \param context struct grouping address information
|
|
*/
|
void avs_aes_encrypt(avs_aes_handle* context){
|
void avs_aes_encrypt(avs_aes_handle* context){
|
*(context->control) |= 0x00000001;
|
*(context->control) |= 0x00000001;
|
}
|
}
|
|
|
|
/**
|
|
* \brief set the DECRYPT flag in the control word
|
|
* start encryption of (hopefully) previously loaded payload
|
|
* \param context struct grouping address information
|
|
*/
|
void avs_aes_decrypt(avs_aes_handle* context){
|
void avs_aes_decrypt(avs_aes_handle* context){
|
*(context->control) |= 0x00000002;
|
*(context->control) |= 0x00000002;
|
}
|
}
|
|
|
|
/**
|
|
* \brief checks the COMPLETED flag
|
|
* can be used for ugly polling the slave if IRQs are not used
|
|
* \param context struct grouping address information
|
|
* \return 1 if still computing 0 if done.
|
|
*/
|
int avs_aes_isBusy(avs_aes_handle* context){
|
int avs_aes_isBusy(avs_aes_handle* context){
|
unsigned int mycontrol = *(context->control);
|
unsigned int mycontrol = *(context->control);
|
return mycontrol & 0x03;
|
return mycontrol & 0x03;
|
}
|
}
|
|
|