-- Hoogle documentation, generated by Haddock -- See Hoogle, http://www.haskell.org/hoogle/ -- | Symbolic bit vectors: Bit-precise verification and automatic C-code generation. -- -- Express properties about bit-precise Haskell programs and -- automatically prove them using SMT solvers. Automatically generate C -- programs from Haskell functions. The SBV library adds support for -- symbolic bit vectors, allowing formal models of bit-precise programs -- to be created. -- --
-- $ ghci -XScopedTypeVariables -- Prelude> :m Data.SBV -- Prelude Data.SBV> prove $ \(x::SWord8) -> x `shiftL` 2 .== 4*x -- Q.E.D. -- Prelude Data.SBV> prove $ forAll ["x"] $ \(x::SWord8) -> x `shiftL` 2 .== x -- Falsifiable. Counter-example: -- x = 128 :: SWord8 ---- -- The library introduces the following types and concepts: -- --
-- >>> prove $ \x -> x `shiftL` 2 .== 4 * (x :: SWord8) -- Q.E.D. ---- --
-- >>> prove $ forAll ["x"] $ \x -> x `shiftL` 2 .== (x :: SWord8) -- Falsifiable. Counter-example: -- x = 51 :: SWord8 ---- -- The function prove has the following type: -- --
-- prove :: Provable a => a -> IO ThmResult ---- -- The class Provable comes with instances for n-ary predicates, -- for arbitrary n. The predicates are just regular Haskell functions -- over symbolic signed and unsigned bit-vectors. Functions for checking -- satisfiability (sat and allSat) are also provided. -- -- In particular, the sbv library introduces the types: -- --
-- signCast . unsignCast = id -- unsingCast . signCast = id ---- -- Note that one naive way to implement both these operations is simply -- to compute fromBitsLE . blastLE, i.e., first get all the bits -- of the word and then reconstruct in the target type. While this is -- semantically correct, it generates a lot of code (both during proofs -- via SMT-Lib, and when compiled to C). The goal of this class is to -- avoid that cost, so these operations can be compiled very efficiently, -- they will essentially become no-op's. -- -- Minimal complete definition: All, no defaults. class SignCast a b | a -> b, b -> a signCast :: SignCast a b => a -> b unsignCast :: SignCast a b => b -> a -- | Implements polynomial addition, multiplication, division, and modulus -- operations over GF(2^n). NB. Similar to bvQuotRem, division by -- 0 is interpreted as follows: -- --
-- x pDivMod 0 = (0, x) ---- -- for all x (including 0) -- -- Minimal complete definiton: pMult, pDivMod, -- showPolynomial class Bits a => Polynomial a where polynomial = foldr (flip setBit) 0 pAdd = xor pDiv x y = fst (pDivMod x y) pMod x y = snd (pDivMod x y) showPoly = showPolynomial False polynomial :: Polynomial a => [Int] -> a pAdd :: Polynomial a => a -> a -> a pMult :: Polynomial a => (a, a, [Int]) -> a pDiv :: Polynomial a => a -> a -> a pMod :: Polynomial a => a -> a -> a pDivMod :: Polynomial a => a -> a -> (a, a) showPoly :: Polynomial a => a -> String showPolynomial :: Polynomial a => Bool -> a -> String -- | Compute CRCs over bit-vectors. The call crcBV n m p computes -- the CRC of the message m with respect to polynomial -- p. The inputs are assumed to be blasted big-endian. The -- number n specifies how many bits of CRC is needed. Note that -- n is actually the degree of the polynomial p, and -- thus it seems redundant to pass it in. However, in a typical proof -- context, the polynomial can be symbolic, so we cannot compute the -- degree easily. While this can be worked-around by generating code that -- accounts for all possible degrees, the resulting code would be -- unnecessarily big and complicated, and much harder to reason with. -- (Also note that a CRC is just the remainder from the polynomial -- division, but this routine is much faster in practice.) -- -- NB. The nth bit of the polynomial p must be -- set for the CRC to be computed correctly. Note that the polynomial -- argument p will not even have this bit present most of the -- time, as it will typically contain bits 0 through -- n-1 as usual in the CRC literature. The higher order -- nth bit is simply assumed to be set, as it does not make -- sense to use a polynomial of a lesser degree. This is usually not a -- problem since CRC polynomials are designed and expressed this way. -- -- NB. The literature on CRC's has many variants on how CRC's are -- computed. We follow the painless guide -- (http://www.ross.net/crc/download/crc_v3.txt) and compute the -- CRC as follows: -- --
-- x bvQuotRem 0 = (0, x) ---- -- Note that our instances implement this law even when x is -- 0 itself. -- -- Minimal complete definition: bvQuotRem class BVDivisible a bvQuotRem :: BVDivisible a => a -> a -> (a, a) -- | The Boolean class: a generalization of Haskell's Bool -- type Haskell Bool and SBV's SBool are instances of -- this class, unifying the treatment of boolean values. -- -- Minimal complete definition: true, bnot, -- &&& However, it's advisable to define false, -- and ||| as well (typically), for clarity. class Boolean b where false = bnot true a ||| b = bnot (bnot a &&& bnot b) a ~& b = bnot (a &&& b) a ~| b = bnot (a ||| b) a <+> b = (a &&& bnot b) ||| (bnot a &&& b) a <=> b = (a &&& b) ||| (bnot a &&& bnot b) a ==> b = bnot a ||| b fromBool True = true fromBool False = false true :: Boolean b => b false :: Boolean b => b bnot :: Boolean b => b -> b (&&&) :: Boolean b => b -> b -> b (|||) :: Boolean b => b -> b -> b (~&) :: Boolean b => b -> b -> b (~|) :: Boolean b => b -> b -> b (<+>) :: Boolean b => b -> b -> b (==>) :: Boolean b => b -> b -> b (<=>) :: Boolean b => b -> b -> b fromBool :: Boolean b => Bool -> b -- | Generalization of and bAnd :: Boolean b => [b] -> b -- | Generalization of or bOr :: Boolean b => [b] -> b -- | Generalization of any bAny :: Boolean b => (a -> b) -> [a] -> b -- | Generalization of all bAll :: Boolean b => (a -> b) -> [a] -> b -- | PrettyNum class captures printing of numbers in hex and binary -- formats; also supporting negative numbers. -- -- Minimal complete definition: hexS and binS class PrettyNum a hexS :: PrettyNum a => a -> String binS :: PrettyNum a => a -> String hex :: PrettyNum a => a -> String bin :: PrettyNum a => a -> String -- | A more convenient interface for reading binary numbers, also supports -- negative numbers readBin :: Num a => String -> a -- | Uninterpreted constants and functions. An uninterpreted constant is a -- value that is indexed by its name. The only property the prover -- assumes about these values are that they are equivalent to themselves; -- i.e., (for functions) they return the same results when applied to -- same arguments. We support uninterpreted-functions as a general means -- of black-box'ing operations that are irrelevant for the -- purposes of the proof; i.e., when the proofs can be performed without -- any knowledge about the function itself. -- -- Minimal complete definition: uninterpretWithHandle. However, -- most instances in practice are already provided by SBV, so end-users -- should not need to define their own instances. class Uninterpreted a where uninterpret = snd . uninterpretWithHandle uninterpretWithHandle = sbvUninterpret Nothing cgUninterpret nm code v = snd $ sbvUninterpret (Just (code, v)) nm uninterpret :: Uninterpreted a => String -> a uninterpretWithHandle :: Uninterpreted a => String -> (SBVUF, a) cgUninterpret :: Uninterpreted a => String -> [String] -> a -> a sbvUninterpret :: Uninterpreted a => Maybe ([String], a) -> String -> (SBVUF, a) -- | An uninterpreted function handle. This is the handle to be used for -- adding axioms about uninterpreted constants/functions. Note that we -- will leave this abstract for safety purposes data SBVUF -- | Get the name associated with the uninterpreted-value; useful when -- constructing axioms about this UI. sbvUFName :: SBVUF -> String -- | Add a user specified axiom to the generated SMT-Lib file. Note that -- the input is a mere string; we perform no checking on the input that -- it's well-formed or is sensical. A separate formalization of SMT-Lib -- would be very useful here. addAxiom :: String -> [String] -> Symbolic () -- | A predicate is a symbolic program that returns a (symbolic) boolean -- value. For all intents and purposes, it can be treated as an n-ary -- function from symbolic-values to a boolean. The Symbolic monad -- captures the underlying representation, and can/should be ignored by -- the users of the library, unless you are building further utilities on -- top of SBV itself. Instead, simply use the Predicate type when -- necessary. type Predicate = Symbolic SBool -- | A type a is provable if we can turn it into a predicate. Note -- that a predicate can be made from a curried function of arbitrary -- arity, where each element is either a symbolic type or up-to a 7-tuple -- of symbolic-types. So predicates can be constructed from almost -- arbitrary Haskell functions that have arbitrary shapes. (See the -- instance declarations below.) class Provable a forAll_ :: Provable a => a -> Predicate forAll :: Provable a => [String] -> a -> Predicate forSome_ :: Provable a => a -> Predicate forSome :: Provable a => [String] -> a -> Predicate -- | Equality as a proof method. Allows for very concise construction of -- equivalence proofs, which is very typical in bit-precise proofs. class Equality a (===) :: Equality a => a -> a -> IO ThmResult -- | Prove a predicate, equivalent to proveWith -- defaultSMTCfg prove :: Provable a => a -> IO ThmResult -- | Proves the predicate using the given SMT-solver proveWith :: Provable a => SMTConfig -> a -> IO ThmResult -- | Checks theoremhood isTheorem :: Provable a => a -> IO Bool -- | Checks theoremhood within the given time limit of i seconds. -- Returns Nothing if times out, or the result wrapped in a -- Just otherwise. isTheoremWithin :: Provable a => Int -> a -> IO (Maybe Bool) -- | Find a satisfying assignment for a predicate, equivalent to -- satWith defaultSMTCfg sat :: Provable a => a -> IO SatResult -- | Find a satisfying assignment using the given SMT-solver satWith :: Provable a => SMTConfig -> a -> IO SatResult -- | Checks satisfiability isSatisfiable :: Provable a => a -> IO Bool -- | Checks satisfiability within the given time limit of i -- seconds. Returns Nothing if times out, or the result wrapped -- in a Just otherwise. isSatisfiableWithin :: Provable a => Int -> a -> IO (Maybe Bool) -- | Return all satisfying assignments for a predicate, equivalent to -- allSatWith defaultSMTCfg. Satisfying -- assignments are constructed lazily, so they will be available as -- returned by the solver and on demand. -- -- NB. Uninterpreted constant/function values and counter-examples for -- array values are ignored for the purposes of allSat. -- That is, only the satisfying assignments modulo uninterpreted -- functions and array inputs will be returned. This is due to the -- limitation of not having a robust means of getting a function -- counter-example back from the SMT solver. allSat :: Provable a => a -> IO AllSatResult -- | Find all satisfying assignments using the given SMT-solver allSatWith :: Provable a => SMTConfig -> a -> IO AllSatResult -- | Returns the number of models that satisfy the predicate, as it would -- be returned by allSat. Note that the number of models is always -- a finite number, and hence this will always return a result. Of -- course, computing it might take quite long, as it literally generates -- and counts the number of satisfying models. numberOfModels :: Provable a => a -> IO Int -- | Adding arbitrary constraints. constrain :: SBool -> Symbolic () -- | Adding a probabilistic constraint. The Double argument is the -- probability threshold. Probabilistic constraints are useful for -- genTest and quickCheck calls where we restrict our -- attention to interesting parts of the input domain. pConstrain :: Double -> SBool -> Symbolic () -- | Check if the given constraints are satisfiable, equivalent to -- isVacuousWith defaultSMTCfg. This call can be -- used to ensure that the specified constraints (via constrain) -- are satisfiable, i.e., that the proof involving these constraints is -- not passing vacuously. Here is an example. Consider the following -- predicate: -- --
-- >>> let pred = do { x <- forall "x"; constrain $ x .< x; return $ x .>= (5 :: SWord8) }
--
--
-- This predicate asserts that all 8-bit values are larger than 5,
-- subject to the constraint that the values considered satisfy x
-- .< x, i.e., they are less than themselves. Since there are no
-- values that satisfy this constraint, the proof will pass vacuously:
--
-- -- >>> prove pred -- Q.E.D. ---- -- We can use isVacuous to make sure to see that the pass was -- vacuous: -- --
-- >>> isVacuous pred -- True ---- -- While the above example is trivial, things can get complicated if -- there are multiple constraints with non-straightforward relations; so -- if constraints are used one should make sure to check the predicate is -- not vacuously true. Here's an example that is not vacuous: -- --
-- >>> let pred' = do { x <- forall "x"; constrain $ x .> 6; return $ x .>= (5 :: SWord8) }
--
--
-- This time the proof passes as expected:
--
-- -- >>> prove pred' -- Q.E.D. ---- -- And the proof is not vacuous: -- --
-- >>> isVacuous pred' -- False --isVacuous :: Provable a => a -> IO Bool -- | Determine if the constraints are vacuous using the given SMT-solver isVacuousWith :: Provable a => SMTConfig -> a -> IO Bool -- | Minimizes a cost function with respect to a constraint. Examples: -- --
-- >>> minimize Quantified sum 3 (bAll (.> (10 :: SInteger))) -- Just [11,11,11] --minimize :: (SatModel a, SymWord a, Show a, SymWord c, Show c) => OptimizeOpts -> ([SBV a] -> SBV c) -> Int -> ([SBV a] -> SBool) -> IO (Maybe [a]) -- | Maximizes a cost function with respect to a constraint. Examples: -- --
-- >>> maximize Quantified sum 3 (bAll (.< (10 :: SInteger))) -- Just [9,9,9] --maximize :: (SatModel a, SymWord a, Show a, SymWord c, Show c) => OptimizeOpts -> ([SBV a] -> SBV c) -> Int -> ([SBV a] -> SBool) -> IO (Maybe [a]) -- | Variant of optimizeWith using z3 optimize :: (SatModel a, SymWord a, Show a, SymWord c, Show c) => OptimizeOpts -> (SBV c -> SBV c -> SBool) -> ([SBV a] -> SBV c) -> Int -> ([SBV a] -> SBool) -> IO (Maybe [a]) -- | Variant of minimize allowing the use of a user specified -- solver. minimizeWith :: (SatModel a, SymWord a, Show a, SymWord c, Show c) => SMTConfig -> OptimizeOpts -> ([SBV a] -> SBV c) -> Int -> ([SBV a] -> SBool) -> IO (Maybe [a]) -- | Variant of maximize allowing the use of a user specified -- solver. maximizeWith :: (SatModel a, SymWord a, Show a, SymWord c, Show c) => SMTConfig -> OptimizeOpts -> ([SBV a] -> SBV c) -> Int -> ([SBV a] -> SBool) -> IO (Maybe [a]) -- | Symbolic optimization. Generalization on minimize and -- maximize that allows arbitrary cost functions and comparisons. optimizeWith :: (SatModel a, SymWord a, Show a, SymWord c, Show c) => SMTConfig -> OptimizeOpts -> (SBV c -> SBV c -> SBool) -> ([SBV a] -> SBV c) -> Int -> ([SBV a] -> SBool) -> IO (Maybe [a]) -- | Given a symbolic computation that produces a value, compute the -- expected value that value would take if this computation is run with -- its free variables drawn from uniform distributions of its respective -- values, satisfying the given constraints specified by -- constrain and pConstrain calls. This is equivalent -- to calling expectedValueWith the following parameters: verbose, -- warm-up round count of 10000, no maximum iteration count, and -- with convergence margin 0.0001. expectedValue :: Outputtable a => Symbolic a -> IO [Double] -- | Generalized version of expectedValue, allowing the user to -- specify the warm-up count and the convergence factor. Maximum -- iteration count can also be specified, at which point convergence -- won't be sought. The boolean controls verbosity. expectedValueWith :: Outputtable a => Bool -> Int -> Maybe Int -> Double -> Symbolic a -> IO [Double] -- | A prove call results in a ThmResult newtype ThmResult ThmResult :: SMTResult -> ThmResult -- | A sat call results in a SatResult The reason for -- having a separate SatResult is to have a more meaningful -- Show instance. newtype SatResult SatResult :: SMTResult -> SatResult -- | An allSat call results in a AllSatResult. The boolean -- says whether we should warn the user about prefix-existentials. newtype AllSatResult AllSatResult :: (Bool, [SMTResult]) -> AllSatResult -- | The result of an SMT solver call. Each constructor is tagged with the -- SMTConfig that created it so that further tools can inspect it -- and build layers of results, if needed. For ordinary uses of the -- library, this type should not be needed, instead use the accessor -- functions on it. (Custom Show instances and model extractors.) data SMTResult -- | Unsatisfiable Unsatisfiable :: SMTConfig -> SMTResult -- | Satisfiable with model Satisfiable :: SMTConfig -> SMTModel -> SMTResult -- | Prover returned unknown, with a potential (possibly bogus) model Unknown :: SMTConfig -> SMTModel -> SMTResult -- | Prover errored out ProofError :: SMTConfig -> [String] -> SMTResult -- | Computation timed out (see the timeout combinator) TimeOut :: SMTConfig -> SMTResult -- | Instances of SatModel can be automatically extracted from -- models returned by the solvers. The idea is that the sbv -- infrastructure provides a stream of CW's (constant-words) -- coming from the solver, and the type a is interpreted based -- on these constants. Many typical instances are already provided, so -- new instances can be declared with relative ease. -- -- Minimum complete definition: parseCWs class SatModel a where cvtModel f x = x >>= \ (a, r) -> f a >>= \ b -> return (b, r) parseCWs :: SatModel a => [CW] -> Maybe (a, [CW]) cvtModel :: SatModel a => (a -> Maybe b) -> Maybe (a, [CW]) -> Maybe (b, [CW]) -- | Various SMT results that we can extract models out of. class Modelable a where extractModel a = case getModel a of { Right (_, b) -> Just b _ -> Nothing } modelExists :: Modelable a => a -> Bool getModel :: (Modelable a, SatModel b) => a -> Either String (Bool, b) extractModel :: (Modelable a, SatModel b) => a -> Maybe b -- | Given an allSat call, we typically want to iterate over it -- and print the results in sequence. The displayModels function -- automates this task by calling disp on each result, -- consecutively. The first Int argument to disp 'is the -- current model number. The second argument is a tuple, where the first -- element indicates whether the model is alleged (i.e., if the solver is -- not sure, returing Unknown) displayModels :: SatModel a => (Int -> (Bool, a) -> IO ()) -> AllSatResult -> IO Int -- | Return all the models from an allSat call, similar to -- extractModel but is suitable for the case of multiple results. extractModels :: SatModel a => AllSatResult -> [a] -- | Solver configuration data SMTConfig SMTConfig :: Bool -> Bool -> Maybe Int -> Int -> SMTSolver -> Maybe FilePath -> Bool -> SMTConfig -- | Debug mode verbose :: SMTConfig -> Bool -- | Print timing information on how long different phases took -- (construction, solving, etc.) timing :: SMTConfig -> Bool -- | How much time to give to the solver. (In seconds) timeOut :: SMTConfig -> Maybe Int -- | Print literals in this base printBase :: SMTConfig -> Int -- | The actual SMT solver solver :: SMTConfig -> SMTSolver -- | If Just, the generated SMT script will be put in this file (for -- debugging purposes mostly) smtFile :: SMTConfig -> Maybe FilePath -- | If True, we'll treat the solver as using SMTLib2 input format. -- Otherwise, SMTLib1 useSMTLib2 :: SMTConfig -> Bool -- | Optimizer configuration. Note that iterative and quantified approaches -- are in general not interchangeable. For instance, iterative solutions -- will loop infinitely when there is no optimal value, but quantified -- solutions can handle such problems. Of course, quantified problems are -- harder for SMT solvers, naturally. data OptimizeOpts -- | Iteratively search. if True, it will be reporting progress Iterative :: Bool -> OptimizeOpts -- | Use quantifiers Quantified :: OptimizeOpts -- | An SMT solver data SMTSolver SMTSolver :: String -> String -> [String] -> SMTEngine -> SMTSolver -- | Printable name of the solver name :: SMTSolver -> String -- | The path to its executable executable :: SMTSolver -> String -- | Options to provide to the solver options :: SMTSolver -> [String] -- | The solver engine, responsible for interpreting solver output engine :: SMTSolver -> SMTEngine -- | Default configuration for the Yices SMT Solver. yices :: SMTConfig -- | Default configuration for the Z3 SMT solver z3 :: SMTConfig -- | The default solver used by SBV. This is currently set to z3. defaultSMTCfg :: SMTConfig -- | A Symbolic computation. Represented by a reader monad carrying the -- state of the computation, layered on top of IO for creating unique -- references to hold onto intermediate results. data Symbolic a output :: Outputtable a => a -> Symbolic a -- | A SymWord is a potential symbolic bitvector that can be created -- instances of to be fed to a symbolic program. Note that these methods -- are typically not needed in casual uses with prove, -- sat, allSat etc, as default instances automatically -- provide the necessary bits. -- -- Minimal complete definiton: forall, forall_, exists, exists_, literal, -- fromCW class (HasSignAndSize a, Ord a) => SymWord a where mkForallVars n = mapM (const forall_) [1 .. n] mkExistVars n = mapM (const exists_) [1 .. n] mkFreeVars n = mapM (const free_) [1 .. n] unliteral (SBV _ (Left c)) = Just $ fromCW c unliteral _ = Nothing isConcrete (SBV _ (Left _)) = True isConcrete _ = False isSymbolic = not . isConcrete isConcretely s p | Just i <- unliteral s = p i | True = False forall :: SymWord a => String -> Symbolic (SBV a) forall_ :: SymWord a => Symbolic (SBV a) mkForallVars :: SymWord a => Int -> Symbolic [SBV a] exists :: SymWord a => String -> Symbolic (SBV a) exists_ :: SymWord a => Symbolic (SBV a) mkExistVars :: SymWord a => Int -> Symbolic [SBV a] free :: SymWord a => String -> Symbolic (SBV a) free_ :: SymWord a => Symbolic (SBV a) mkFreeVars :: SymWord a => Int -> Symbolic [SBV a] literal :: SymWord a => a -> SBV a unliteral :: SymWord a => SBV a -> Maybe a fromCW :: SymWord a => CW -> a isConcrete :: SymWord a => SBV a -> Bool isSymbolic :: SymWord a => SBV a -> Bool isConcretely :: SymWord a => SBV a -> (a -> Bool) -> Bool mbMaxBound, mbMinBound :: SymWord a => Maybe a -- | Compiles to SMT-Lib and returns the resulting program as a string. -- Useful for saving the result to a file for off-line analysis, for -- instance if you have an SMT solver that's not natively supported -- out-of-the box by the SBV library. If smtLib2 parameter is -- False, then we will generate SMTLib1 output, otherwise we will -- generate SMTLib2 output compileToSMTLib :: Provable a => Bool -> a -> IO String -- | Generate a set of concrete test values from a symbolic program. The -- output can be rendered as test vectors in different languages as -- necessary. Use the function output call to indicate what fields -- should be in the test result. (Also see constrain and -- pConstrain for filtering acceptable test values.) genTest :: Outputtable a => Int -> Symbolic a -> IO TestVectors -- | Retrieve the test vectors for further processing. This function is -- useful in cases where renderTest is not sufficient and custom -- output (or further preprocessing) is needed. getTestValues :: TestVectors -> [([CW], [CW])] -- | Type of test vectors (abstract) data TestVectors -- | Test output style data TestStyle -- | As a Haskell value with given name Haskell :: String -> TestStyle -- | As a C array of structs with given name C :: String -> TestStyle -- | As a Forte/Verilog value with given name. If the boolean is True then -- vectors are blasted big-endian, otherwise little-endian The indices -- are the split points on bit-vectors for input and output values Forte :: String -> Bool -> ([Int], [Int]) -> TestStyle -- | Render the test as a Haskell value with the given name n. renderTest :: TestStyle -> TestVectors -> String -- | CW represents a concrete word of a fixed size: Endianness is -- mostly irrelevant (see the FromBits class). For signed words, -- the most significant digit is considered to be the sign. data CW CW :: !Bool -> !Size -> !Integer -> CW -- | Is the word signed? cwSigned :: CW -> !Bool -- | Size of the word (unbounded if Nothing) cwSize :: CW -> !Size -- | The underlying value, represented as a Haskell Integer cwVal :: CW -> !Integer newtype Size Size :: Maybe Int -> Size unSize :: Size -> Maybe Int -- | Convert a CW to a Haskell boolean cwToBool :: CW -> Bool -- | The code-generation monad. Allows for precise layout of input values -- reference parameters (for returning composite values in languages such -- as C), and return values. data SBVCodeGen a -- | Sets RTC (run-time-checks) for index-out-of-bounds, shift-with-large -- value etc. on/off. Default: False. cgPerformRTCs :: Bool -> SBVCodeGen () -- | Sets driver program run time values, useful for generating programs -- with fixed drivers for testing. Default: None, i.e., use random -- values. cgSetDriverValues :: [Integer] -> SBVCodeGen () -- | Should we generate a driver program? Default: True. When a -- library is generated, it will have a driver if any of the contituent -- functions has a driver. (See compileToCLib.) cgGenerateDriver :: Bool -> SBVCodeGen () -- | Should we generate a Makefile? Default: True. cgGenerateMakefile :: Bool -> SBVCodeGen () -- | Creates an atomic input in the generated code. cgInput :: SymWord a => String -> SBVCodeGen (SBV a) -- | Creates an array input in the generated code. cgInputArr :: SymWord a => Int -> String -> SBVCodeGen [SBV a] -- | Creates an atomic output in the generated code. cgOutput :: SymWord a => String -> SBV a -> SBVCodeGen () -- | Creates an array output in the generated code. cgOutputArr :: SymWord a => String -> [SBV a] -> SBVCodeGen () -- | Creates a returned (unnamed) value in the generated code. cgReturn :: SymWord a => SBV a -> SBVCodeGen () -- | Creates a returned (unnamed) array value in the generated code. cgReturnArr :: SymWord a => [SBV a] -> SBVCodeGen () -- | Adds the given lines to the header file generated, useful for -- generating programs with uninterpreted functions. cgAddPrototype :: [String] -> SBVCodeGen () -- | Adds the given lines to the program file generated, useful for -- generating programs with uninterpreted functions. cgAddDecl :: [String] -> SBVCodeGen () -- | Adds the given words to the compiler options in the generated -- Makefile, useful for linking extra stuff in cgAddLDFlags :: [String] -> SBVCodeGen () -- | Sets number of bits to be used for representing the SInteger -- type in the generated C code. The argument must be one of 8, -- 16, 32, or 64. Note that this is -- essentially unsafe as the semantics of unbounded Haskell integers -- becomes reduced to the corresponding bit size, as typical in most C -- implementations. cgIntegerSize :: Int -> SBVCodeGen () -- | Given a symbolic computation, render it as an equivalent collection of -- files that make up a C program: -- --
-- step1 : LDX #8 ; load X immediate with the integer 8 -- step2 : LDA #0 ; load A immediate with the integer 0 -- step3 : LOOP ROR F1 ; rotate F1 right circular through C -- step4 : BCC ZCOEF ; branch to ZCOEF if C = 0 -- step5 : CLC ; set C to 0 -- step6 : ADC F2 ; set A to A+F2+C and C to the carry -- step7 : ZCOEF ROR A ; rotate A right circular through C -- step8 : ROR LOW ; rotate LOW right circular through C -- step9 : DEX ; set X to X-1 -- step10: BNE LOOP ; branch to LOOP if Z = 0 ---- -- This program came to be known as the Legato's challenge in the -- community, where the challenge was to prove that it indeed does -- perform multiplication. This file formalizes the Mostek architecture -- in Haskell and proves that Legato's algorithm is indeed correct. module Data.SBV.Examples.BitPrecise.Legato -- | The memory is addressed by 32-bit words. type Address = SWord32 -- | We model only two registers of Mostek that is used in the above -- algorithm, can add more. data Register RegX :: Register RegA :: Register -- | The carry flag (FlagC) and the zero flag (FlagZ) data Flag FlagC :: Flag FlagZ :: Flag -- | Mostek was an 8-bit machine. type Value = SWord8 -- | Convenient synonym for symbolic machine bits. type Bit = SBool -- | Register bank type Registers = Array Register Value -- | Flag bank type Flags = Array Flag Bit -- | The memory maps 32-bit words to 8-bit words. (The Model -- data-type is defined later, depending on the verification model used.) type Memory = Model Word32 Word8 -- | Abstraction of the machine: The CPU consists of memory, registers, and -- flags. Unlike traditional hardware, we assume the program is stored in -- some other memory area that we need not model. (No self modifying -- programs!) data Mostek Mostek :: Memory -> Registers -> Flags -> Mostek memory :: Mostek -> Memory registers :: Mostek -> Registers flags :: Mostek -> Flags -- | Given a machine state, compute a value out of it type Extract a = Mostek -> a -- | Programs are essentially state transformers (on the machine state) type Program = Mostek -> Mostek -- | Get the value of a given register getReg :: Register -> Extract Value -- | Set the value of a given register setReg :: Register -> Value -> Program -- | Get the value of a flag getFlag :: Flag -> Extract Bit -- | Set the value of a flag setFlag :: Flag -> Bit -> Program -- | Read memory peek :: Address -> Extract Value -- | Write to memory poke :: Address -> Value -> Program -- | Checking overflow. In Legato's multipler the ADC instruction -- needs to see if the expression x + y + c overflowed, as checked by -- this function. Note that we verify the correctness of this check -- separately below in checkOverflowCorrect. checkOverflow :: SWord8 -> SWord8 -> SBool -> SBool -- | Correctness theorem for our checkOverflow implementation. -- -- We have: -- --
-- >>> checkOverflowCorrect -- Q.E.D. --checkOverflowCorrect :: IO ThmResult -- | An instruction is modeled as a Program transformer. We model -- mostek programs in direct continuation passing style. type Instruction = Program -> Program -- | LDX: Set register X to value v ldx :: Value -> Instruction -- | LDA: Set register A to value v lda :: Value -> Instruction -- | CLC: Clear the carry flag clc :: Instruction -- | ROR, memory version: Rotate the value at memory location a to -- the right by 1 bit, using the carry flag as a transfer position. That -- is, the final bit of the memory location becomes the new carry and the -- carry moves over to the first bit. This very instruction is one of the -- reasons why Legato's multiplier is quite hard to understand and is -- typically presented as a verification challenge. rorM :: Address -> Instruction -- | ROR, register version: Same as rorM, except through register -- r. rorR :: Register -> Instruction -- | BCC: branch to label l if the carry flag is false bcc :: Program -> Instruction -- | ADC: Increment the value of register A by the value of memory -- contents at address a, using the carry-bit as the carry-in -- for the addition. adc :: Address -> Instruction -- | DEX: Decrement the value of register X dex :: Instruction -- | BNE: Branch if the zero-flag is false bne :: Program -> Instruction -- | The end combinator stops our program, providing the -- final continuation that does nothing. end :: Program -- | Parameterized by the addresses of locations of the factors -- (F1 and F2), the following program multiplies them, -- storing the low-byte of the result in the memory location -- lowAddr, and the high-byte in register A. The -- implementation is a direct transliteration of Legato's algorithm given -- at the top, using our notation. legato :: Address -> Address -> Address -> Program -- | Given address/value pairs for F1 and F2, and the location of where the -- low-byte of the result should go, runLegato takes an -- arbitrary machine state m and returns the high and low bytes -- of the multiplication. runLegato :: (Address, Value) -> (Address, Value) -> Address -> Mostek -> (Value, Value) -- | Helper synonym for capturing relevant bits of Mostek type InitVals = (Value, Value, Value, Bit, Bit) -- | Create an instance of the Mostek machine, initialized by the memory -- and the relevant values of the registers and the flags initMachine :: Memory -> InitVals -> Mostek -- | The correctness theorem. For all possible memory configurations, the -- factors (x and y below), the location of the -- low-byte result and the initial-values of registers and the flags, -- this function will return True only if running Legato's algorithm does -- indeed compute the product of x and y correctly. legatoIsCorrect :: Memory -> (Address, Value) -> (Address, Value) -> Address -> InitVals -> SBool -- | Choose the appropriate array model to be used for modeling the memory. -- (See Memory.) The SFunArray is the function based model. -- SArray is the SMT-Lib array's based model. type Model = SFunArray -- | The correctness theorem. On a decent MacBook Pro, this proof takes -- about 3 minutes with the SFunArray memory model and about 30 -- minutes with the SArray model, using yices as the SMT solver correctnessTheorem :: IO ThmResult -- | Generate a C program that implements Legato's algorithm automatically. legatoInC :: IO () instance Eq Register instance Ord Register instance Ix Register instance Bounded Register instance Enum Register instance Eq Flag instance Ord Flag instance Ix Flag instance Bounded Flag instance Enum Flag instance Mergeable Mostek -- | The PrefixSum algorithm over power-lists and proof of the -- Ladner-Fischer implementation. See -- http://www.cs.utexas.edu/users/psp/powerlist.pdf and -- http://www.cs.utexas.edu/~plaxton/c/337/05f/slides/ParallelRecursion-4.pdf. module Data.SBV.Examples.BitPrecise.PrefixSum -- | A poor man's representation of powerlists and basic operations on -- them: http://www.cs.utexas.edu/users/psp/powerlist.pdf. We -- merely represent power-lists by ordinary lists. type PowerList a = [a] -- | The tie operator, concatenation. tiePL :: PowerList a -> PowerList a -> PowerList a -- | The zip operator, zips the power-lists of the same size, returns a -- powerlist of double the size. zipPL :: PowerList a -> PowerList a -> PowerList a -- | Inverse of zipping. unzipPL :: PowerList a -> (PowerList a, PowerList a) -- | Reference prefix sum (ps) is simply Haskell's scanl1 -- function. ps :: (a, a -> a -> a) -> PowerList a -> PowerList a -- | The Ladner-Fischer (lf) implementation of prefix-sum. See -- http://www.cs.utexas.edu/~plaxton/c/337/05f/slides/ParallelRecursion-4.pdf -- or pg. 16 of http://www.cs.utexas.edu/users/psp/powerlist.pdf. lf :: (a, a -> a -> a) -> PowerList a -> PowerList a -- | Correctness theorem, for a powerlist of given size, an associative -- operator, and its left-unit element. flIsCorrect :: Int -> (forall a. (OrdSymbolic a, Bits a) => (a, a -> a -> a)) -> Symbolic SBool -- | Proves Ladner-Fischer is equivalent to reference specification for -- addition. 0 is the left-unit element, and we use a power-list -- of size 8. thm1 :: IO ThmResult -- | Proves Ladner-Fischer is equivalent to reference specification for the -- function max. 0 is the left-unit element, and we use -- a power-list of size 16. thm2 :: IO ThmResult -- | Try proving correctness for an arbitrary operator. This proof will -- not go through since the SMT solver does not know that the -- operator associative and has the given left-unit element. We have: -- --
-- >>> thm3 -- Falsifiable. Counter-example: -- s0 = 0 :: SWord32 -- s1 = 0 :: SWord32 -- s2 = 0 :: SWord32 -- s3 = 0 :: SWord32 -- s4 = 0 :: SWord32 -- s5 = 0 :: SWord32 -- s6 = 0 :: SWord32 -- s7 = 3221225472 :: SWord32 -- -- uninterpreted: u -- u = 0 -- -- uninterpreted: flOp -- flOp 0 3221225472 = 2147483648 -- flOp 0 2147483648 = 3758096384 -- flOp _ _ = 0 ---- -- You can verify that the above function for flOp is not -- associative: -- --
-- ghci> flOp 3221225472 (flOp 2147483648 3221225472) -- 0 -- ghci> flOp (flOp 3221225472 2147483648) 3221225472 -- 2147483648 ---- -- Also, the unit 0 is clearly not a left-unit for -- flOp, as the third equation for flOp will simply map -- many elements to 0. (NB. We need to use yices for this proof -- as the uninterpreted function examples are only supported through the -- yices interface currently.) thm3 :: IO ThmResult -- | Generate an instance of the prefix-sum problem for an arbitrary -- operator, by telling the SMT solver the necessary axioms for -- associativity and left-unit. The first argument states how wide the -- power list should be. genPrefixSumInstance :: Int -> Symbolic SBool -- | Prove the generic problem for powerlists of given sizes. Note that -- this will only work for Yices-1. This is due to the fact that Yices-2 -- follows the SMT-Lib standard and does not accept bit-vector problems -- with quantified axioms in them, while Yices-1 did allow for that. The -- crux of the problem is that there are no SMT-Lib logics that combine -- BV's and quantifiers, see: -- http://goedel.cs.uiowa.edu/smtlib/logics.html. So we are stuck -- until new powerful logics are added to SMT-Lib. -- -- Here, we explicitly tell SBV to use Yices-1 that did not have that -- limitation. Tweak the executable location accordingly below for your -- platform.. -- -- We have: -- --
-- >>> prefixSum 2 -- Q.E.D. ---- --
-- >>> prefixSum 4 -- Q.E.D. ---- -- Note that these proofs tend to run long. Also, Yices ran out of memory -- and crashed on my box when I tried for size 8, after running -- for about 2.5 minutes.. prefixSum :: Int -> IO ThmResult -- | A symbolic trace can help illustrate the action of Ladner-Fischer. -- This generator produces the actions of Ladner-Fischer for addition, -- showing how the computation proceeds: -- --
-- >>> ladnerFischerTrace 8 -- INPUTS -- s0 :: SWord8 -- s1 :: SWord8 -- s2 :: SWord8 -- s3 :: SWord8 -- s4 :: SWord8 -- s5 :: SWord8 -- s6 :: SWord8 -- s7 :: SWord8 -- CONSTANTS -- s_2 = False -- s_1 = True -- TABLES -- ARRAYS -- UNINTERPRETED CONSTANTS -- USER GIVEN CODE SEGMENTS -- AXIOMS -- DEFINE -- s8 :: SWord8 = s0 + s1 -- s9 :: SWord8 = s2 + s8 -- s10 :: SWord8 = s2 + s3 -- s11 :: SWord8 = s8 + s10 -- s12 :: SWord8 = s4 + s11 -- s13 :: SWord8 = s4 + s5 -- s14 :: SWord8 = s11 + s13 -- s15 :: SWord8 = s6 + s14 -- s16 :: SWord8 = s6 + s7 -- s17 :: SWord8 = s13 + s16 -- s18 :: SWord8 = s11 + s17 -- CONSTRAINTS -- OUTPUTS -- s0 -- s8 -- s9 -- s11 -- s12 -- s14 -- s15 -- s18 --ladnerFischerTrace :: Int -> IO () -- | Trace generator for the reference spec. It clearly demonstrates that -- the reference implementation fewer operations, but is not -- parallelizable at all: -- --
-- >>> scanlTrace 8 -- INPUTS -- s0 :: SWord8 -- s1 :: SWord8 -- s2 :: SWord8 -- s3 :: SWord8 -- s4 :: SWord8 -- s5 :: SWord8 -- s6 :: SWord8 -- s7 :: SWord8 -- CONSTANTS -- s_2 = False -- s_1 = True -- TABLES -- ARRAYS -- UNINTERPRETED CONSTANTS -- USER GIVEN CODE SEGMENTS -- AXIOMS -- DEFINE -- s8 :: SWord8 = s0 + s1 -- s9 :: SWord8 = s2 + s8 -- s10 :: SWord8 = s3 + s9 -- s11 :: SWord8 = s4 + s10 -- s12 :: SWord8 = s5 + s11 -- s13 :: SWord8 = s6 + s12 -- s14 :: SWord8 = s7 + s13 -- CONSTRAINTS -- OUTPUTS -- s0 -- s8 -- s9 -- s10 -- s11 -- s12 -- s13 -- s14 --scanlTrace :: Int -> IO () -- | Simple code generation example. module Data.SBV.Examples.CodeGeneration.AddSub -- | Simple function that returns add/sum of args addSub :: SWord8 -> SWord8 -> (SWord8, SWord8) -- | Generate C code for addSub. Here's the output showing the generated C -- code: -- --
-- >>> genAddSub
-- == BEGIN: "Makefile" ================
-- # Makefile for addSub. Automatically generated by SBV. Do not edit!
--
-- # include any user-defined .mk file in the current directory.
-- -include *.mk
--
-- CC=gcc
-- CCFLAGS?=-Wall -O3 -DNDEBUG -fomit-frame-pointer
--
-- all: addSub_driver
--
-- addSub.o: addSub.c addSub.h
-- ${CC} ${CCFLAGS} -c $< -o $@
--
-- addSub_driver.o: addSub_driver.c
-- ${CC} ${CCFLAGS} -c $< -o $@
--
-- addSub_driver: addSub.o addSub_driver.o
-- ${CC} ${CCFLAGS} $^ -o $@
--
-- clean:
-- rm -f *.o
--
-- veryclean: clean
-- rm -f addSub_driver
-- == END: "Makefile" ==================
-- == BEGIN: "addSub.h" ================
-- /* Header file for addSub. Automatically generated by SBV. Do not edit! */
--
-- #ifndef __addSub__HEADER_INCLUDED__
-- #define __addSub__HEADER_INCLUDED__
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
--
-- /* The boolean type */
-- typedef bool SBool;
--
-- /* Unsigned bit-vectors */
-- typedef uint8_t SWord8 ;
-- typedef uint16_t SWord16;
-- typedef uint32_t SWord32;
-- typedef uint64_t SWord64;
--
-- /* Signed bit-vectors */
-- typedef int8_t SInt8 ;
-- typedef int16_t SInt16;
-- typedef int32_t SInt32;
-- typedef int64_t SInt64;
--
-- /* Entry point prototype: */
-- void addSub(const SWord8 x, const SWord8 y, SWord8 *sum,
-- SWord8 *dif);
--
-- #endif /* __addSub__HEADER_INCLUDED__ */
-- == END: "addSub.h" ==================
-- == BEGIN: "addSub_driver.c" ================
-- /* Example driver program for addSub. */
-- /* Automatically generated by SBV. Edit as you see fit! */
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
-- #include <stdio.h>
-- #include "addSub.h"
--
-- int main(void)
-- {
-- SWord8 sum;
-- SWord8 dif;
--
-- addSub(132, 241, &sum, &dif);
--
-- printf("addSub(132, 241, &sum, &dif) ->\n");
-- printf(" sum = %"PRIu8"\n", sum);
-- printf(" dif = %"PRIu8"\n", dif);
--
-- return 0;
-- }
-- == END: "addSub_driver.c" ==================
-- == BEGIN: "addSub.c" ================
-- /* File: "addSub.c". Automatically generated by SBV. Do not edit! */
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
-- #include "addSub.h"
--
-- void addSub(const SWord8 x, const SWord8 y, SWord8 *sum,
-- SWord8 *dif)
-- {
-- const SWord8 s0 = x;
-- const SWord8 s1 = y;
-- const SWord8 s2 = s0 + s1;
-- const SWord8 s3 = s0 - s1;
--
-- *sum = s2;
-- *dif = s3;
-- }
-- == END: "addSub.c" ==================
--
genAddSub :: IO ()
-- | Computing the CRC symbolically, using the USB polynomial. We also
-- generating C code for it as well. This example demonstrates the use of
-- the crcBV function, along with how CRC's can be computed
-- mathematically using polynomial division. While the results are the
-- same (i.e., proven equivalent, see crcGood below), the internal
-- CRC implementation generates much better code, compare cg1 vs
-- cg2 below.
module Data.SBV.Examples.CodeGeneration.CRC_USB5
-- | The USB CRC polynomial: x^5 + x^2 + 1. Although this
-- polynomial needs just 6 bits to represent (5 if higher order bit is
-- implicitly assumed to be set), we'll simply use a 16 bit number for
-- its representation to keep things simple for code generation purposes.
usb5 :: SWord16
-- | Given an 11 bit message, compute the CRC of it using the USB
-- polynomial, which is 5 bits, and then append it to the msg to get a
-- 16-bit word. Again, the incoming 11-bits is represented as a 16-bit
-- word, with 5 highest bits essentially ignored for input purposes.
crcUSB :: SWord16 -> SWord16
-- | Alternate method for computing the CRC, mathematically. We
-- shift the number to the left by 5, and then compute the remainder from
-- the polynomial division by the USB polynomial. The result is then
-- appended to the end of the message.
crcUSB' :: SWord16 -> SWord16
-- | Prove that the custom crcBV function is equivalent to the
-- mathematical definition of CRC's for 11 bit messages. We have:
--
-- -- >>> crcGood -- Q.E.D. --crcGood :: IO ThmResult -- | Generate a C function to compute the USB CRC, using the internal CRC -- function. cg1 :: IO () -- | Generate a C function to compute the USB CRC, using the mathematical -- definition of the CRCs. Whule this version generates functionally -- eqivalent C code, it's less efficient; it has about 30% more code. So, -- the above version is preferable for code generation purposes. cg2 :: IO () -- | Computing Fibonacci numbers and generating C code. Inspired by Lee -- Pike's original implementation, modified for inclusion in the package. -- It illustrates symbolic termination issues one can have when working -- with recursive algorithms and how to deal with such, eventually -- generating good C code. module Data.SBV.Examples.CodeGeneration.Fibonacci -- | This is a naive implementation of fibonacci, and will work fine -- (albeit slow) for concrete inputs: -- --
-- >>> map fib0 [0..6] -- [0 :: SWord64,1 :: SWord64,1 :: SWord64,2 :: SWord64,3 :: SWord64,5 :: SWord64,8 :: SWord64] ---- -- However, it is not suitable for doing proofs or generating code, as it -- is not symbolically terminating when it is called with a symbolic -- value n. When we recursively call fib0 on -- n-1 (or n-2), the test against 0 will -- always explore both branches since the result will be symbolic, hence -- will not terminate. (An integrated theorem prover can establish -- termination after a certain number of unrollings, but this would be -- quite expensive to implement, and would be impractical.) fib0 :: SWord64 -> SWord64 -- | The recursion-depth limited version of fibonacci. Limiting the maximum -- number to be 20, we can say: -- --
-- >>> map (fib1 20) [0..6] -- [0 :: SWord64,1 :: SWord64,1 :: SWord64,2 :: SWord64,3 :: SWord64,5 :: SWord64,8 :: SWord64] ---- -- The function will work correctly, so long as the index we query is at -- most top, and otherwise will return the value at -- top. Note that we also use accumulating parameters here for -- efficiency, although this is orthogonal to the termination concern. -- -- A note on modular arithmetic: The 64-bit word we use to represent the -- values will of course eventually overflow, beware! Fibonacci is a fast -- growing function.. fib1 :: SWord64 -> SWord64 -> SWord64 -- | We can generate code for fib1 using the genFib1 action. -- Note that the generated code will grow larger as we pick larger values -- of top, but only linearly, thanks to the accumulating -- parameter trick used by fib1. The following is an excerpt from -- the code generated for the call genFib1 10, where the code -- will work correctly for indexes up to 10: -- --
-- SWord64 fib1(const SWord64 x)
-- {
-- const SWord64 s0 = x;
-- const SBool s2 = s0 == 0x0000000000000000ULL;
-- const SBool s4 = s0 == 0x0000000000000001ULL;
-- const SBool s6 = s0 == 0x0000000000000002ULL;
-- const SBool s8 = s0 == 0x0000000000000003ULL;
-- const SBool s10 = s0 == 0x0000000000000004ULL;
-- const SBool s12 = s0 == 0x0000000000000005ULL;
-- const SBool s14 = s0 == 0x0000000000000006ULL;
-- const SBool s17 = s0 == 0x0000000000000007ULL;
-- const SBool s19 = s0 == 0x0000000000000008ULL;
-- const SBool s22 = s0 == 0x0000000000000009ULL;
-- const SWord64 s25 = s22 ? 0x0000000000000022ULL : 0x0000000000000037ULL;
-- const SWord64 s26 = s19 ? 0x0000000000000015ULL : s25;
-- const SWord64 s27 = s17 ? 0x000000000000000dULL : s26;
-- const SWord64 s28 = s14 ? 0x0000000000000008ULL : s27;
-- const SWord64 s29 = s12 ? 0x0000000000000005ULL : s28;
-- const SWord64 s30 = s10 ? 0x0000000000000003ULL : s29;
-- const SWord64 s31 = s8 ? 0x0000000000000002ULL : s30;
-- const SWord64 s32 = s6 ? 0x0000000000000001ULL : s31;
-- const SWord64 s33 = s4 ? 0x0000000000000001ULL : s32;
-- const SWord64 s34 = s2 ? 0x0000000000000000ULL : s33;
--
-- return s34;
-- }
--
genFib1 :: SWord64 -> IO ()
-- | Compute the fibonacci numbers statically at code-generation
-- time and put them in a table, accessed by the select call.
fib2 :: SWord64 -> SWord64 -> SWord64
-- | Once we have fib2, we can generate the C code
-- straightforwardly. Below is an excerpt from the code that SBV
-- generates for the call genFib2 64. Note that this code is a
-- constant-time look-up table implementation of fibonacci, with no
-- run-time overhead. The index can be made arbitrarily large, naturally.
-- (Note that this function returns 0 if the index is larger
-- than 64, as specified by the call to select with default
-- 0.)
--
--
-- SWord64 fibLookup(const SWord64 x)
-- {
-- const SWord64 s0 = x;
-- static const SWord64 table0[] = {
-- 0x0000000000000000ULL, 0x0000000000000001ULL,
-- 0x0000000000000001ULL, 0x0000000000000002ULL,
-- 0x0000000000000003ULL, 0x0000000000000005ULL,
-- 0x0000000000000008ULL, 0x000000000000000dULL,
-- 0x0000000000000015ULL, 0x0000000000000022ULL,
-- 0x0000000000000037ULL, 0x0000000000000059ULL,
-- 0x0000000000000090ULL, 0x00000000000000e9ULL,
-- 0x0000000000000179ULL, 0x0000000000000262ULL,
-- 0x00000000000003dbULL, 0x000000000000063dULL,
-- 0x0000000000000a18ULL, 0x0000000000001055ULL,
-- 0x0000000000001a6dULL, 0x0000000000002ac2ULL,
-- 0x000000000000452fULL, 0x0000000000006ff1ULL,
-- 0x000000000000b520ULL, 0x0000000000012511ULL,
-- 0x000000000001da31ULL, 0x000000000002ff42ULL,
-- 0x000000000004d973ULL, 0x000000000007d8b5ULL,
-- 0x00000000000cb228ULL, 0x0000000000148addULL,
-- 0x0000000000213d05ULL, 0x000000000035c7e2ULL,
-- 0x00000000005704e7ULL, 0x00000000008cccc9ULL,
-- 0x0000000000e3d1b0ULL, 0x0000000001709e79ULL,
-- 0x0000000002547029ULL, 0x0000000003c50ea2ULL,
-- 0x0000000006197ecbULL, 0x0000000009de8d6dULL,
-- 0x000000000ff80c38ULL, 0x0000000019d699a5ULL,
-- 0x0000000029cea5ddULL, 0x0000000043a53f82ULL,
-- 0x000000006d73e55fULL, 0x00000000b11924e1ULL,
-- 0x000000011e8d0a40ULL, 0x00000001cfa62f21ULL,
-- 0x00000002ee333961ULL, 0x00000004bdd96882ULL,
-- 0x00000007ac0ca1e3ULL, 0x0000000c69e60a65ULL,
-- 0x0000001415f2ac48ULL, 0x000000207fd8b6adULL,
-- 0x0000003495cb62f5ULL, 0x0000005515a419a2ULL,
-- 0x00000089ab6f7c97ULL, 0x000000dec1139639ULL,
-- 0x000001686c8312d0ULL, 0x000002472d96a909ULL,
-- 0x000003af9a19bbd9ULL, 0x000005f6c7b064e2ULL, 0x000009a661ca20bbULL
-- };
-- const SWord64 s65 = s0 >= 65 ? 0x0000000000000000ULL : table0[s0];
--
-- return s65;
-- }
--
genFib2 :: SWord64 -> IO ()
-- | Computing GCD symbolically, and generating C code for it. This example
-- illustrates symbolic termination related issues when programming with
-- SBV, when the termination of a recursive algorithm crucially depends
-- on the value of a symbolic variable. The technique we use is to
-- statically enforce termination by using a recursion depth counter.
module Data.SBV.Examples.CodeGeneration.GCD
-- | The symbolic GCD algorithm, over two 8-bit numbers. We define sgcd
-- a 0 to be a for all a, which implies sgcd 0
-- 0 = 0. Note that this is essentially Euclid's algorithm, except
-- with a recursion depth counter. We need the depth counter since the
-- algorithm is not symbolically terminating, as we don't have a
-- means of determining that the second argument (b) will
-- eventually reach 0 in a symbolic context. Hence we stop after 12
-- iterations. Why 12? We've empirically determined that this algorithm
-- will recurse at most 12 times for arbitrary 8-bit numbers. Of course,
-- this is a claim that we shall prove below.
sgcd :: SWord8 -> SWord8 -> SWord8
-- | We have:
--
-- -- >>> prove sgcdIsCorrect -- Q.E.D. --sgcdIsCorrect :: SWord8 -> SWord8 -> SWord8 -> SBool -- | This call will generate the required C files. The following is the -- function body generated for sgcd. (We are not showing the -- generated header, Makefile, and the driver programs for -- brevity.) Note that the generated function is a constant time -- algorithm for GCD. It is not necessarily fastest, but it will take -- precisely the same amount of time for all values of x and -- y. -- --
-- /* File: "sgcd.c". Automatically generated by SBV. Do not edit! */
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
-- #include "sgcd.h"
--
-- SWord8 sgcd(const SWord8 x, const SWord8 y)
-- {
-- const SWord8 s0 = x;
-- const SWord8 s1 = y;
-- const SBool s3 = s1 == 0;
-- const SWord8 s4 = (s1 == 0) ? s0 : (s0 % s1);
-- const SWord8 s5 = s3 ? s0 : s4;
-- const SBool s6 = 0 == s5;
-- const SWord8 s7 = (s5 == 0) ? s1 : (s1 % s5);
-- const SWord8 s8 = s6 ? s1 : s7;
-- const SBool s9 = 0 == s8;
-- const SWord8 s10 = (s8 == 0) ? s5 : (s5 % s8);
-- const SWord8 s11 = s9 ? s5 : s10;
-- const SBool s12 = 0 == s11;
-- const SWord8 s13 = (s11 == 0) ? s8 : (s8 % s11);
-- const SWord8 s14 = s12 ? s8 : s13;
-- const SBool s15 = 0 == s14;
-- const SWord8 s16 = (s14 == 0) ? s11 : (s11 % s14);
-- const SWord8 s17 = s15 ? s11 : s16;
-- const SBool s18 = 0 == s17;
-- const SWord8 s19 = (s17 == 0) ? s14 : (s14 % s17);
-- const SWord8 s20 = s18 ? s14 : s19;
-- const SBool s21 = 0 == s20;
-- const SWord8 s22 = (s20 == 0) ? s17 : (s17 % s20);
-- const SWord8 s23 = s21 ? s17 : s22;
-- const SBool s24 = 0 == s23;
-- const SWord8 s25 = (s23 == 0) ? s20 : (s20 % s23);
-- const SWord8 s26 = s24 ? s20 : s25;
-- const SBool s27 = 0 == s26;
-- const SWord8 s28 = (s26 == 0) ? s23 : (s23 % s26);
-- const SWord8 s29 = s27 ? s23 : s28;
-- const SBool s30 = 0 == s29;
-- const SWord8 s31 = (s29 == 0) ? s26 : (s26 % s29);
-- const SWord8 s32 = s30 ? s26 : s31;
-- const SBool s33 = 0 == s32;
-- const SWord8 s34 = (s32 == 0) ? s29 : (s29 % s32);
-- const SWord8 s35 = s33 ? s29 : s34;
-- const SBool s36 = 0 == s35;
-- const SWord8 s37 = s36 ? s32 : s35;
-- const SWord8 s38 = s33 ? s29 : s37;
-- const SWord8 s39 = s30 ? s26 : s38;
-- const SWord8 s40 = s27 ? s23 : s39;
-- const SWord8 s41 = s24 ? s20 : s40;
-- const SWord8 s42 = s21 ? s17 : s41;
-- const SWord8 s43 = s18 ? s14 : s42;
-- const SWord8 s44 = s15 ? s11 : s43;
-- const SWord8 s45 = s12 ? s8 : s44;
-- const SWord8 s46 = s9 ? s5 : s45;
-- const SWord8 s47 = s6 ? s1 : s46;
-- const SWord8 s48 = s3 ? s0 : s47;
--
-- return s48;
-- }
--
genGCDInC :: IO ()
-- | Computing population-counts (number of set bits) and autimatically
-- generating C code.
module Data.SBV.Examples.CodeGeneration.PopulationCount
-- | Given a 64-bit quantity, the simplest (and obvious) way to count the
-- number of bits that are set in it is to simply walk through all the
-- bits and add 1 to a running count. This is slow, as it requires 64
-- iterations, but is simple and easy to convince yourself that it is
-- correct. For instance:
--
-- -- >>> popCountSlow 0x0123456789ABCDEF -- 32 :: SWord8 --popCountSlow :: SWord64 -> SWord8 -- | Faster version. This is essentially the same algorithm, except we go 8 -- bits at a time instead of one by one, by using a precomputed table of -- population-count values for each byte. This algorithm loops -- only 8 times, and hence is at least 8 times more efficient. popCountFast :: SWord64 -> SWord8 -- | Look-up table, containing population counts for all possible 8-bit -- value, from 0 to 255. Note that we do not "hard-code" the values, but -- merely use the slow version to compute them. pop8 :: [SWord8] -- | States the correctness of faster population-count algorithm, with -- respect to the reference slow version. (We use yices here as it's -- quite fast for this problem. Z3 seems to take much longer.) We have: -- --
-- >>> proveWith yices fastPopCountIsCorrect -- Q.E.D. --fastPopCountIsCorrect :: SWord64 -> SBool -- | Not only we can prove that faster version is correct, but we can also -- automatically generate C code to compute population-counts for us. -- This action will generate all the C files that you will need, -- including a driver program for test purposes. -- -- Below is the generated header file for popCountFast: -- --
-- >>> genPopCountInC
-- == BEGIN: "Makefile" ================
-- # Makefile for popCount. Automatically generated by SBV. Do not edit!
--
-- # include any user-defined .mk file in the current directory.
-- -include *.mk
--
-- CC=gcc
-- CCFLAGS?=-Wall -O3 -DNDEBUG -fomit-frame-pointer
--
-- all: popCount_driver
--
-- popCount.o: popCount.c popCount.h
-- ${CC} ${CCFLAGS} -c $< -o $@
--
-- popCount_driver.o: popCount_driver.c
-- ${CC} ${CCFLAGS} -c $< -o $@
--
-- popCount_driver: popCount.o popCount_driver.o
-- ${CC} ${CCFLAGS} $^ -o $@
--
-- clean:
-- rm -f *.o
--
-- veryclean: clean
-- rm -f popCount_driver
-- == END: "Makefile" ==================
-- == BEGIN: "popCount.h" ================
-- /* Header file for popCount. Automatically generated by SBV. Do not edit! */
--
-- #ifndef __popCount__HEADER_INCLUDED__
-- #define __popCount__HEADER_INCLUDED__
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
--
-- /* The boolean type */
-- typedef bool SBool;
--
-- /* Unsigned bit-vectors */
-- typedef uint8_t SWord8 ;
-- typedef uint16_t SWord16;
-- typedef uint32_t SWord32;
-- typedef uint64_t SWord64;
--
-- /* Signed bit-vectors */
-- typedef int8_t SInt8 ;
-- typedef int16_t SInt16;
-- typedef int32_t SInt32;
-- typedef int64_t SInt64;
--
-- /* Entry point prototype: */
-- SWord8 popCount(const SWord64 x);
--
-- #endif /* __popCount__HEADER_INCLUDED__ */
-- == END: "popCount.h" ==================
-- == BEGIN: "popCount_driver.c" ================
-- /* Example driver program for popCount. */
-- /* Automatically generated by SBV. Edit as you see fit! */
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
-- #include <stdio.h>
-- #include "popCount.h"
--
-- int main(void)
-- {
-- const SWord8 __result = popCount(0x1b02e143e4f0e0e5ULL);
--
-- printf("popCount(0x1b02e143e4f0e0e5ULL) = %"PRIu8"\n", __result);
--
-- return 0;
-- }
-- == END: "popCount_driver.c" ==================
-- == BEGIN: "popCount.c" ================
-- /* File: "popCount.c". Automatically generated by SBV. Do not edit! */
--
-- #include <inttypes.h>
-- #include <stdint.h>
-- #include <stdbool.h>
-- #include "popCount.h"
--
-- SWord8 popCount(const SWord64 x)
-- {
-- const SWord64 s0 = x;
-- static const SWord8 table0[] = {
-- 0, 1, 1, 2, 1, 2, 2, 3, 1, 2, 2, 3, 2, 3, 3, 4, 1, 2, 2, 3, 2, 3,
-- 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, 1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4,
-- 3, 4, 4, 5, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, 1, 2,
-- 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, 2, 3, 3, 4, 3, 4, 4, 5,
-- 3, 4, 4, 5, 4, 5, 5, 6, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5,
-- 5, 6, 3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, 1, 2, 2, 3,
-- 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4,
-- 4, 5, 4, 5, 5, 6, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6,
-- 3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, 2, 3, 3, 4, 3, 4,
-- 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, 3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6,
-- 5, 6, 6, 7, 3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, 4, 5,
-- 5, 6, 5, 6, 6, 7, 5, 6, 6, 7, 6, 7, 7, 8
-- };
-- const SWord64 s11 = s0 & 0x00000000000000ffULL;
-- const SWord8 s12 = table0[s11];
-- const SWord64 s13 = s0 >> 8;
-- const SWord64 s14 = 0x00000000000000ffULL & s13;
-- const SWord8 s15 = table0[s14];
-- const SWord8 s16 = s12 + s15;
-- const SWord64 s17 = s13 >> 8;
-- const SWord64 s18 = 0x00000000000000ffULL & s17;
-- const SWord8 s19 = table0[s18];
-- const SWord8 s20 = s16 + s19;
-- const SWord64 s21 = s17 >> 8;
-- const SWord64 s22 = 0x00000000000000ffULL & s21;
-- const SWord8 s23 = table0[s22];
-- const SWord8 s24 = s20 + s23;
-- const SWord64 s25 = s21 >> 8;
-- const SWord64 s26 = 0x00000000000000ffULL & s25;
-- const SWord8 s27 = table0[s26];
-- const SWord8 s28 = s24 + s27;
-- const SWord64 s29 = s25 >> 8;
-- const SWord64 s30 = 0x00000000000000ffULL & s29;
-- const SWord8 s31 = table0[s30];
-- const SWord8 s32 = s28 + s31;
-- const SWord64 s33 = s29 >> 8;
-- const SWord64 s34 = 0x00000000000000ffULL & s33;
-- const SWord8 s35 = table0[s34];
-- const SWord8 s36 = s32 + s35;
-- const SWord64 s37 = s33 >> 8;
-- const SWord64 s38 = 0x00000000000000ffULL & s37;
-- const SWord8 s39 = table0[s38];
-- const SWord8 s40 = s36 + s39;
--
-- return s40;
-- }
-- == END: "popCount.c" ==================
--
genPopCountInC :: IO ()
-- | Demonstrates the use of uninterpreted functions for the purposes of
-- code generation. This facility is important when we want to take
-- advantage of native libraries in the target platform, or when we'd
-- like to hand-generate code for certain functions for various purposes,
-- such as efficiency, or reliability.
module Data.SBV.Examples.CodeGeneration.Uninterpreted
-- | A definition of shiftLeft that can deal with variable length shifts.
-- (Note that the `shiftL` method from the Bits class
-- requires an Int shift amount.) Unfortunately, this'll generate
-- rather clumsy C code due to the use of tables etc., so we uninterpret
-- it for code generation purposes using the cgUninterpret
-- function.
shiftLeft :: SWord32 -> SWord32 -> SWord32
-- | Test function that uses shiftLeft defined above. When used as a normal
-- Haskell function or in verification the definition is fully used,
-- i.e., no uninterpretation happens. To wit, we have:
--
-- -- >>> tstShiftLeft 3 4 5 -- 224 :: SWord32 ---- --
-- >>> prove $ \x y -> tstShiftLeft x y 0 .== x + y -- Q.E.D. --tstShiftLeft :: SWord32 -> SWord32 -> SWord32 -> SWord32 -- | Generate C code for tstShiftLeft. In this case, SBV will *use* -- the user given definition verbatim, instead of generating code for it. -- (Also see the functions cgAddDecl, cgAddLDFlags, and -- cgAddPrototype.) genCCode :: IO () -- | An implementation of AES (Advanced Encryption Standard), using SBV. -- For details on AES, see FIPS-197: -- http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. -- -- We do a T-box implementation, which leads to good C code as we can -- take advantage of look-up tables. Note that we make virtually no -- attempt to optimize our Haskell code. The concern here is not with -- getting Haskell running fast at all. The idea is to program the T-Box -- implementation as naturally and clearly as possible in Haskell, and -- have SBV's code-generator generate fast C code automatically. -- Therefore, we merely use ordinary Haskell lists as our -- data-structures, and do not bother with any unboxing or strictness -- annotations. Thus, we achieve the separation of concerns: Correctness -- via clairty and simplicity and proofs on the Haskell side, performance -- by relying on SBV's code generator. If necessary, the generated code -- can be FFI'd back into Haskell to complete the loop. -- -- All 3 valid key sizes (128, 192, and 256) as required by the FIPS-197 -- standard are supported. module Data.SBV.Examples.Crypto.AES -- | An element of the Galois Field 2^8, which are essentially polynomials -- with maximum degree 7. They are conveniently represented as values -- between 0 and 255. type GF28 = SWord8 -- | Multiplication in GF(2^8). This is simple polynomial multipliation, -- followed by the irreducible polynomial x^8+x^5+x^3+x^1+1. We -- simply use the pMult function exported by SBV to do the -- operation. gf28Mult :: GF28 -> GF28 -> GF28 -- | Exponentiation by a constant in GF(2^8). The implementation uses the -- usual square-and-multiply trick to speed up the computation. gf28Pow :: GF28 -> Int -> GF28 -- | Computing inverses in GF(2^8). By the mathematical properties of -- GF(2^8) and the particular irreducible polynomial used -- x^8+x^5+x^3+x^1+1, it turns out that raising to the 254 power -- gives us the multiplicative inverse. Of course, we can prove this -- using SBV: -- --
-- >>> prove $ \x -> x ./= 0 ==> x `gf28Mult` gf28Inverse x .== 1 -- Q.E.D. ---- -- Note that we exclude 0 in our theorem, as it does not have a -- multiplicative inverse. gf28Inverse :: GF28 -> GF28 -- | AES state. The state consists of four 32-bit words, each of which is -- in turn treated as four GF28's, i.e., 4 bytes. The T-Box -- implementation keeps the four-bytes together for efficient -- representation. type State = [SWord32] -- | The key, which can be 128, 192, or 256 bits. Represented as a sequence -- of 32-bit words. type Key = [SWord32] -- | The key schedule. AES executes in rounds, and it treats first and last -- round keys slightly differently than the middle ones. We reflect that -- choice by being explicit about it in our type. The length of the -- middle list of keys depends on the key-size, which in turn determines -- the number of rounds. type KS = (Key, [Key], Key) -- | Conversion from 32-bit words to 4 constituent bytes. toBytes :: SWord32 -> [GF28] -- | Conversion from 4 bytes, back to a 32-bit row, inverse of -- toBytes above. We have the following simple theorems stating -- this relationship formally: -- --
-- >>> prove $ \a b c d -> toBytes (fromBytes [a, b, c, d]) .== [a, b, c, d] -- Q.E.D. ---- --
-- >>> prove $ \r -> fromBytes (toBytes r) .== r -- Q.E.D. --fromBytes :: [GF28] -> SWord32 -- | Rotating a state row by a fixed amount to the right. rotR :: [GF28] -> Int -> [GF28] -- | Definition of round-constants, as specified in Section 5.2 of the AES -- standard. roundConstants :: [GF28] -- | The InvMixColumns transformation, as described in Section -- 5.3.3 of the standard. Note that this transformation is only used -- explicitly during key-expansion in the T-Box implementation of AES. invMixColumns :: State -> State -- | Key expansion. Starting with the given key, returns an infinite -- sequence of words, as described by the AES standard, Section 5.2, -- Figure 11. keyExpansion :: Int -> Key -> [Key] -- | The values of the AES S-box table. Note that we describe the S-box -- programmatically using the mathematical construction given in Section -- 5.1.1 of the standard. However, the code-generation will turn this -- into a mere look-up table, as it is just a constant table, all -- computation being done at "compile-time". sboxTable :: [GF28] -- | The sbox transformation. We simply select from the sbox table. Note -- that we are obliged to give a default value (here 0) to be -- used if the index is out-of-bounds as required by SBV's select -- function. However, that will never happen since the table has all 256 -- elements in it. sbox :: GF28 -> GF28 -- | The values of the inverse S-box table. Again, the construction is -- programmatic. unSBoxTable :: [GF28] -- | The inverse s-box transformation. unSBox :: GF28 -> GF28 -- | Prove that the sbox and unSBox are inverses. We have: -- --
-- >>> prove sboxInverseCorrect -- Q.E.D. --sboxInverseCorrect :: GF28 -> SBool -- | Adding the round-key to the current state. We simply exploit the fact -- that addition is just xor in implementing this transformation. addRoundKey :: Key -> State -> State -- | T-box table generation function for encryption t0Func :: GF28 -> [GF28] -- | First look-up table used in encryption t0 :: GF28 -> SWord32 -- | Second look-up table used in encryption t1 :: GF28 -> SWord32 -- | Third look-up table used in encryption t2 :: GF28 -> SWord32 -- | Fourth look-up table used in encryption t3 :: GF28 -> SWord32 -- | T-box table generating function for decryption u0Func :: GF28 -> [GF28] -- | First look-up table used in decryption u0 :: GF28 -> SWord32 -- | Second look-up table used in decryption u1 :: GF28 -> SWord32 -- | Third look-up table used in decryption u2 :: GF28 -> SWord32 -- | Fourth look-up table used in decryption u3 :: GF28 -> SWord32 -- | Generic round function. Given the function to perform one round, a -- key-schedule, and a starting state, it performs the AES rounds. doRounds :: (Bool -> State -> Key -> State) -> KS -> State -> State -- | One encryption round. The first argument indicates whether this is the -- final round or not, in which case the construction is slightly -- different. aesRound :: Bool -> State -> Key -> State -- | One decryption round. Similar to the encryption round, the first -- argument indicates whether this is the final round or not. aesInvRound :: Bool -> State -> Key -> State -- | Key schedule. Given a 128, 192, or 256 bit key, expand it to get -- key-schedules for encryption and decryption. The key is given as a -- sequence of 32-bit words. (4 elements for 128-bits, 6 for 192, and 8 -- for 256.) aesKeySchedule :: Key -> (KS, KS) -- | Block encryption. The first argument is the plain-text, which must -- have precisely 4 elements, for a total of 128-bits of input. The -- second argument is the key-schedule to be used, obtained by a call to -- aesKeySchedule. The output will always have 4 32-bit words, -- which is the cipher-text. aesEncrypt :: [SWord32] -> KS -> [SWord32] -- | Block decryption. The arguments are the same as in aesEncrypt, -- except the first argument is the cipher-text and the output is the -- corresponding plain-text. aesDecrypt :: [SWord32] -> KS -> [SWord32] -- | 128-bit encryption test, from Appendix C.1 of the AES standard: -- --
-- >>> map hex t128Enc -- ["69c4e0d8","6a7b0430","d8cdb780","70b4c55a"] --t128Enc :: [SWord32] -- | 128-bit decryption test, from Appendix C.1 of the AES standard: -- --
-- >>> map hex t128Dec -- ["00112233","44556677","8899aabb","ccddeeff"] --t128Dec :: [SWord32] -- | 192-bit encryption test, from Appendix C.2 of the AES standard: -- --
-- >>> map hex t192Enc -- ["dda97ca4","864cdfe0","6eaf70a0","ec0d7191"] --t192Enc :: [SWord32] -- | 192-bit decryption test, from Appendix C.2 of the AES standard: -- --
-- >>> map hex t192Dec -- ["00112233","44556677","8899aabb","ccddeeff"] --t192Dec :: [SWord32] -- | 256-bit encryption, from Appendix C.3 of the AES standard: -- --
-- >>> map hex t256Enc -- ["8ea2b7ca","516745bf","eafc4990","4b496089"] --t256Enc :: [SWord32] -- | 256-bit decryption, from Appendix C.3 of the AES standard: -- --
-- >>> map hex t256Dec -- ["00112233","44556677","8899aabb","ccddeeff"] --t256Dec :: [SWord32] -- | Correctness theorem for 128-bit AES. Ideally, we would run: -- --
-- prove aes128IsCorrect ---- -- to get a proof automatically. Unfortunately, while SBV will -- successfully generate the proof obligation for this theorem and ship -- it to the SMT solver, it would be naive to expect the SMT-solver to -- finish that proof in any reasonable time with the currently available -- SMT solving technologies. Instead, we can issue: -- --
-- quickCheck aes128IsCorrect ---- -- and get some degree of confidence in our code. Similar predicates can -- be easily constructed for 192, and 256 bit cases as well. aes128IsCorrect :: (SWord32, SWord32, SWord32, SWord32) -> (SWord32, SWord32, SWord32, SWord32) -> SBool -- | Code generation for 128-bit AES encryption. -- -- The following sample from the generated code-lines show how T-Boxes -- are rendered as C arrays: -- --
-- static const SWord32 table1[] = {
-- 0xc66363a5UL, 0xf87c7c84UL, 0xee777799UL, 0xf67b7b8dUL,
-- 0xfff2f20dUL, 0xd66b6bbdUL, 0xde6f6fb1UL, 0x91c5c554UL,
-- 0x60303050UL, 0x02010103UL, 0xce6767a9UL, 0x562b2b7dUL,
-- 0xe7fefe19UL, 0xb5d7d762UL, 0x4dababe6UL, 0xec76769aUL,
-- ...
-- }
--
--
-- The generated program has 5 tables (one sbox table, and 4-Tboxes), all
-- converted to fast C arrays. Here is a sample of the generated
-- straightline C-code:
--
-- -- const SWord8 s1915 = (SWord8) s1912; -- const SWord8 s1916 = table0[s1915]; -- const SWord16 s1917 = (((SWord16) s1914) << 8) | ((SWord16) s1916); -- const SWord32 s1918 = (((SWord32) s1911) << 16) | ((SWord32) s1917); -- const SWord32 s1919 = s1844 ^ s1918; -- const SWord32 s1920 = s1903 ^ s1919; ---- -- The GNU C-compiler does a fine job of optimizing this straightline -- code to generate a fairly efficient C implementation. cgAES128BlockEncrypt :: IO () -- | Components of the AES-128 implementation that the library is generated -- from aes128LibComponents :: [(String, SBVCodeGen ())] -- | Generate a C library, containing functions for performing 128-bit -- encdeckey-expansion. A note on performance: In a very rough -- speed test, the generated code was able to do 6.3 million block -- encryptions per second on a decent MacBook Pro. On the same machine, -- OpenSSL reports 8.2 million block encryptions per second. So, the -- generated code is about 25% slower as compared to the highly optimized -- OpenSSL implementation. (Note that the speed test was done somewhat -- simplistically, so these numbers should be considered very rough -- estimates.) cgAES128Library :: IO () -- | An implementation of RC4 (AKA Rivest Cipher 4 or Alleged RC4/ARC4), -- using SBV. For information on RC4, see: -- http://en.wikipedia.org/wiki/RC4. -- -- We make no effort to optimize the code, and instead focus on a clear -- implementation. In fact, the RC4 algorithm relies on in-place update -- of its state heavily for efficiency, and is therefore unsuitable for a -- purely functional implementation. module Data.SBV.Examples.Crypto.RC4 -- | RC4 State contains 256 8-bit values. We use the symbolically -- accessible full-binary type STree to represent the state, since -- RC4 needs access to the array via a symbolic index and it's important -- to minimize access time. type S = STree Word8 Word8 -- | Construct the fully balanced initial tree, where the leaves are simply -- the numbers 0 through 255. initS :: S -- | The key is a stream of Word8 values. type Key = [SWord8] -- | Represents the current state of the RC4 stream: it is the S -- array along with the i and j index values used by -- the PRGA. type RC4 = (S, SWord8, SWord8) -- | Swaps two elements in the RC4 array. swap :: SWord8 -> SWord8 -> S -> S -- | Implements the PRGA used in RC4. We return the new state and the next -- key value generated. prga :: RC4 -> (SWord8, RC4) -- | Constructs the state to be used by the PRGA using the given key. initRC4 :: Key -> S -- | The key-schedule. Note that this function returns an infinite list. keySchedule :: Key -> [SWord8] -- | Generate a key-schedule from a given key-string. keyScheduleString :: String -> [SWord8] -- | RC4 encryption. We generate key-words and xor it with the input. The -- following test-vectors are from Wikipedia -- http://en.wikipedia.org/wiki/RC4: -- --
-- >>> concatMap hex $ encrypt "Key" "Plaintext" -- "bbf316e8d940af0ad3" ---- --
-- >>> concatMap hex $ encrypt "Wiki" "pedia" -- "1021bf0420" ---- --
-- >>> concatMap hex $ encrypt "Secret" "Attack at dawn" -- "45a01f645fc35b383552544b9bf5" --encrypt :: String -> String -> [SWord8] -- | RC4 decryption. Essentially the same as decryption. For the above test -- vectors we have: -- --
-- >>> decrypt "Key" [0xbb, 0xf3, 0x16, 0xe8, 0xd9, 0x40, 0xaf, 0x0a, 0xd3] -- "Plaintext" ---- --
-- >>> decrypt "Wiki" [0x10, 0x21, 0xbf, 0x04, 0x20] -- "pedia" ---- --
-- >>> decrypt "Secret" [0x45, 0xa0, 0x1f, 0x64, 0x5f, 0xc3, 0x5b, 0x38, 0x35, 0x52, 0x54, 0x4b, 0x9b, 0xf5] -- "Attack at dawn" --decrypt :: String -> [SWord8] -> String -- | Prove that round-trip encryption/decryption leaves the plain-text -- unchanged. The theorem is stated parametrically over key and -- plain-text sizes. The expression performs the proof for a 40-bit key -- (5 bytes) and 40-bit plaintext (again 5 bytes). -- -- Note that this theorem is trivial to prove, since it is essentially -- establishing xor'in the same value twice leaves a word unchanged -- (i.e., x xor y xor y = x). However, the proof -- takes quite a while to complete, as it gives rise to a fairly large -- symbolic trace. rc4IsCorrect :: IO ThmResult -- | This program demonstrates the use of the existentials and the QBVF -- (quantified bit-vector solver). We generate CRC polynomials of degree -- 16 that can be used for messages of size 48-bits. The query finds all -- such polynomials that have hamming distance is at least 4. That is, if -- the CRC can't tell two different 48-bit messages apart, then they must -- differ in at least 4 bits. module Data.SBV.Examples.Existentials.CRCPolynomial -- | SBV doesn't support 48 bit words natively. So, we represent them as a -- tuple, 32 high-bits and 16 low-bits. type SWord48 = (SWord32, SWord16) -- | Compute the 16 bit CRC of a 48 bit message, using the given polynomial crc_48_16 :: SWord48 -> SWord16 -> [SBool] -- | Count the differing bits in the message and the corresponding CRC diffCount :: (SWord48, [SBool]) -> (SWord48, [SBool]) -> SWord8 -- | Given a hamming distance value hd, crcGood returns -- true if the 16 bit polynomial can distinguish all messages -- that has at most hd different bits. Note that we express this -- conversely: If the sent and received messages are -- different, then it must be the case that that must differ from each -- other (including CRCs), in more than hd bits. crcGood :: SWord8 -> SWord16 -> SWord48 -> SWord48 -> SBool -- | Generate good CRC polynomials for 48-bit words, given the hamming -- distance hd. genPoly :: SWord8 -> IO () -- | Find and display all degree 16 polynomials with hamming distance at -- least 4, for 48 bit messages. -- -- When run, this function prints: -- --
-- Polynomial #1. x^16 + x^2 + x + 1 -- Polynomial #2. x^16 + x^15 + x^2 + 1 -- Polynomial #3. x^16 + x^15 + x^14 + 1 -- Polynomial #4. x^16 + x^15 + x^2 + x + 1 -- Polynomial #5. x^16 + x^14 + x + 1 -- ... ---- -- Note that different runs can produce different results, depending on -- the random numbers used by the solver, solver version, etc. (Also, the -- solver will take some time to generate these results. On my machine, -- the first five polynomials were generated in about 5 minutes.) findHD4Polynomials :: IO () -- | Simple usage of polynomials over GF(2^n), using Rijndael's finite -- field: -- http://en.wikipedia.org/wiki/Finite_field_arithmetic#Rijndael.27s_finite_field -- -- The functions available are: -- --
-- if (a, b) = x pDivMod y then x = y pMult a + b ---- -- being careful about y = 0. When divisor is 0, then quotient -- is defined to be 0 and the remainder is the numerator. (Note that -- addition is simply xor in GF(2^8).) polyDivMod :: GF28 -> GF28 -> SBool -- | Queries testGF28 :: IO () -- | Solves the following puzzle: -- --
-- You and a friend pass by a standard coin operated vending machine and you decide to get a candy bar. -- The price is US $0.95, but after checking your pockets you only have a dollar (US $1) and the machine -- only takes coins. You turn to your friend and have this conversation: -- you: Hey, do you have change for a dollar? -- friend: Let's see. I have 6 US coins but, although they add up to a US $1.15, I can't break a dollar. -- you: Huh? Can you make change for half a dollar? -- friend: No. -- you: How about a quarter? -- friend: Nope, and before you ask I cant make change for a dime or nickel either. -- you: Really? and these six coins are all US government coins currently in production? -- friend: Yes. -- you: Well can you just put your coins into the vending machine and buy me a candy bar, and I'll pay you back? -- friend: Sorry, I would like to but I cant with the coins I have. -- What coins are your friend holding? ---- -- To be fair, the problem has no solution mathematically. But -- there is a solution when one takes into account that vending machines -- typically do not take the 50 cent coins! module Data.SBV.Examples.Puzzles.Coins -- | We will represent coins with 16-bit words (more than enough precision -- for coins). type Coin = SWord16 -- | Create a coin. The argument Int argument just used for naming the -- coin. Note that we constrain the value to be one of the valid U.S. -- coin values as we create it. mkCoin :: Int -> Symbolic Coin -- | Return all combinations of a sequence of values. combinations :: [a] -> [[a]] -- | Constraint 1: Cannot make change for a dollar. c1 :: [Coin] -> SBool -- | Constraint 2: Cannot make change for half a dollar. c2 :: [Coin] -> SBool -- | Constraint 3: Cannot make change for a quarter. c3 :: [Coin] -> SBool -- | Constraint 4: Cannot make change for a dime. c4 :: [Coin] -> SBool -- | Constraint 5: Cannot make change for a nickel c5 :: [Coin] -> SBool -- | Constraint 6: Cannot buy the candy either. Here's where we need to -- have the extra knowledge that the vending machines do not take 50 cent -- coins. c6 :: [Coin] -> SBool -- | Solve the puzzle. We have: -- --
-- >>> puzzle -- Satisfiable. Model: -- c1 = 50 :: SWord16 -- c2 = 25 :: SWord16 -- c3 = 10 :: SWord16 -- c4 = 10 :: SWord16 -- c5 = 10 :: SWord16 -- c6 = 10 :: SWord16 ---- -- i.e., your friend has 4 dimes, a quarter, and a half dollar. puzzle :: IO SatResult -- | Consider the sentence: -- --
-- In this sentence, the number of occurrences of 0 is _, of 1 is _, of 2 is _, -- of 3 is _, of 4 is _, of 5 is _, of 6 is _, of 7 is _, of 8 is _, and of 9 is _. ---- -- The puzzle is to fill the blanks with numbers, such that the sentence -- will be correct. There are precisely two solutions to this puzzle, -- both of which are found by SBV successfully. -- -- References: -- --
-- >>> solve -- Solution #1 -- In this sentence, the number of occurrences of 0 is 1, of 1 is 11, of 2 is 2, of 3 is 1, of 4 is 1, of 5 is 1, of 6 is 1, of 7 is 1, of 8 is 1, of 9 is 1. -- Solution #2 -- In this sentence, the number of occurrences of 0 is 1, of 1 is 7, of 2 is 3, of 3 is 2, of 4 is 1, of 5 is 1, of 6 is 1, of 7 is 2, of 8 is 1, of 9 is 1. -- Found: 2 solution(s). --solve :: IO () -- | Puzzle: Spend exactly 100 dollars and buy exactly 100 animals. Dogs -- cost 15 dollars, cats cost 1 dollar, and mice cost 25 cents each. You -- have to buy at least one of each. How many of each should you buy? module Data.SBV.Examples.Puzzles.DogCatMouse -- | Use 16-bit words to represent the counts, much larger than we actually -- need, but no harm. type Count = SWord16 -- | Codes the puzzle statement, more or less directly using SBV. puzzle :: Count -> Count -> Count -> SBool -- | Prints the only solution: -- --
-- >>> solve -- Solution #1: -- dog = 3 :: SWord16 -- cat = 41 :: SWord16 -- mouse = 56 :: SWord16 -- This is the only solution. --solve :: IO AllSatResult -- | A solution to Project Euler problem #185: -- http://projecteuler.net/index.php?section=problems&id=185 module Data.SBV.Examples.Puzzles.Euler185 -- | The given guesses and the correct digit counts, encoded as a simple -- list. guesses :: [(String, SWord8)] -- | Encode the problem, note that we check digits are within 0-9 as we use -- 8-bit words to represent them. Otherwise, the constraints are simply -- generated by zipping the alleged solution with each guess, and making -- sure the number of matching digits match what's given in the problem -- statement. euler185 :: Symbolic SBool -- | Print out the solution nicely. We have: -- --
-- >>> solve -- 4640261571849533 -- Number of solutions: 1 --solve :: IO () -- | Solves the magic-square puzzle. An NxN magic square is one where all -- entries are filled with numbers from 1 to NxN such that sums of all -- rows, columns and diagonals is the same. module Data.SBV.Examples.Puzzles.MagicSquare -- | Use 32-bit words for elements. type Elem = SWord32 -- | A row is a list of elements type Row = [Elem] -- | The puzzle board is a list of rows type Board = [Row] -- | Checks that all elements in a list are within bounds check :: Elem -> Elem -> [Elem] -> SBool -- | Get the diagonal of a square matrix diag :: [[a]] -> [a] -- | Test if a given board is a magic square isMagic :: Board -> SBool -- | Group a list of elements in the sublists of length i chunk :: Int -> [a] -> [[a]] -- | Given n, magic n prints all solutions to the -- nxn magic square problem magic :: Int -> IO () -- | Solves the NQueens puzzle: -- http://en.wikipedia.org/wiki/Eight_queens_puzzle module Data.SBV.Examples.Puzzles.NQueens -- | A solution is a sequence of row-numbers where queens should be placed type Solution = [SWord8] -- | Checks that a given solution of n-queens is valid, i.e., no -- queen captures any other. isValid :: Int -> Solution -> SBool -- | Given n, it solves the n-queens puzzle, printing all -- possible solutions. nQueens :: Int -> IO () -- | The Sudoku solver, quintessential SMT solver example! module Data.SBV.Examples.Puzzles.Sudoku -- | A row is a sequence of 8-bit words, too large indeed for representing -- 1-9, but does not harm type Row = [SWord8] -- | A Sudoku board is a sequence of 9 rows type Board = [Row] -- | Given a series of elements, make sure they are all different and they -- all are numbers between 1 and 9 check :: [SWord8] -> SBool -- | Given a full Sudoku board, check that it is valid valid :: Board -> SBool -- | A puzzle is a pair: First is the number of missing elements, second is -- a function that given that many elements returns the final board. type Puzzle = (Int, [SWord8] -> Board) -- | Solve a given puzzle and print the results solve :: Puzzle -> IO () -- | Helper function to display results nicely, not really needed, but -- helps presentation dispSolution :: Puzzle -> (Bool, [Word8]) -> IO () -- | Find all solutions to a puzzle solveAll :: Puzzle -> IO () -- | Find an arbitrary good board puzzle0 :: Puzzle -- | A random puzzle, found on the internet.. puzzle1 :: Puzzle -- | Another random puzzle, found on the internet.. puzzle2 :: Puzzle -- | Another random puzzle, found on the internet.. puzzle3 :: Puzzle -- | According to the web, this is the toughest sudoku puzzle ever.. It -- even has a name: Al Escargot: -- http://zonkedyak.blogspot.com/2006/11/worlds-hardest-sudoku-puzzle-al.html puzzle4 :: Puzzle -- | This one has been called diabolical, apparently puzzle5 :: Puzzle -- | The following is nefarious according to -- http://haskell.org/haskellwiki/Sudoku puzzle6 :: Puzzle -- | Solve them all, this takes a fraction of a second to run for each case allPuzzles :: IO () -- | The famous U2 bridge crossing puzzle: -- http://www.brainj.net/puzzle.php?id=u2 module Data.SBV.Examples.Puzzles.U2Bridge -- | U2 band members data U2Member Bono :: U2Member Edge :: U2Member Adam :: U2Member Larry :: U2Member -- | Model time using 32 bits type Time = SWord32 -- | Each member gets an 8-bit id type SU2Member = SWord8 -- | Bono's ID bono :: SU2Member -- | Edge's ID edge :: SU2Member -- | Adam's ID adam :: SU2Member -- | Larry's ID larry :: SU2Member -- | Is this a valid person? isU2Member :: SU2Member -> SBool -- | Crossing times for each member of the band crossTime :: SU2Member -> Time -- | Location of the flash type Location = SBool -- | We represent this side of the bridge as here, and arbitrarily -- as false here :: Location -- | We represent other side of the bridge as there, and arbitrarily -- as true there :: Location -- | The status of the puzzle after each move data Status Status :: Time -> Location -> Location -> Location -> Location -> Location -> Status -- | elapsed time time :: Status -> Time -- | location of the flash flash :: Status -> Location -- | location of Bono lBono :: Status -> Location -- | location of Edge lEdge :: Status -> Location -- | location of Adam lAdam :: Status -> Location -- | location of Larry lLarry :: Status -> Location -- | Start configuration, time elapsed is 0 and everybody is here start :: Status -- | A puzzle move is modeled as a state-transformer type Move a = State Status a -- | Read the state via an accessor function peek :: (Status -> a) -> Move a -- | Given an arbitrary member, return his location whereIs :: SU2Member -> Move SBool -- | Transferring the flash to the other side xferFlash :: Move () -- | Transferring a person to the other side xferPerson :: SU2Member -> Move () -- | Increment the time, when only one person crosses bumpTime1 :: SU2Member -> Move () -- | Increment the time, when two people cross together bumpTime2 :: SU2Member -> SU2Member -> Move () -- | Symbolic version of when whenS :: SBool -> Move () -> Move () -- | Move one member, remembering to take the flash move1 :: SU2Member -> Move () -- | Move two members, again with the flash move2 :: SU2Member -> SU2Member -> Move () -- | A move action is a sequence of triples. The first component is -- symbolically True if only one member crosses. (In this case the third -- element of the triple is irrelevant.) If the first component is -- (symbolically) False, then both members move together type Actions = [(SBool, SU2Member, SU2Member)] -- | Run a sequence of given actions. run :: Actions -> Move [Status] -- | Check if a given sequence of actions is valid, i.e., they must all -- cross the bridge according to the rules and in less than 17 seconds isValid :: Actions -> SBool -- | See if there is a solution that has precisely n steps solveN :: Int -> IO Bool -- | Solve the U2-bridge crossing puzzle, starting by testing solutions -- with increasing number of steps, until we find one. We have: -- --
-- >>> solveU2 -- Checking for solutions with 1 move. -- Checking for solutions with 2 moves. -- Checking for solutions with 3 moves. -- Checking for solutions with 4 moves. -- Checking for solutions with 5 moves. -- Solution #1: -- 0 --> Edge, Bono -- 2 <-- Bono -- 3 --> Larry, Adam -- 13 <-- Edge -- 15 --> Edge, Bono -- Total time: 17 -- Solution #2: -- 0 --> Edge, Bono -- 2 <-- Edge -- 4 --> Larry, Adam -- 14 <-- Bono -- 15 --> Edge, Bono -- Total time: 17 -- Found: 2 solutions with 5 moves. ---- -- Finding all possible solutions to the puzzle. solveU2 :: IO () instance Show U2Member instance Enum U2Member instance SatModel U2Member instance Mergeable a => Mergeable (Move a) instance Mergeable Status -- | Formalizes and proves the following theorem, about arithmetic, -- uninterpreted functions, and arrays. (For reference, see -- http://research.microsoft.com/en-us/um/redmond/projects/z3/fmcad06-slides.pdf -- slide number 24): -- --
-- x + 2 = y implies f (read (write (a, x, 3), y - 2)) = f (y - x + 1) ---- -- We interpret the types as follows (other interpretations certainly -- possible): -- --
-- >>> proveThm1 -- Q.E.D. --proveThm1 :: IO () -- | This version directly uses SMT-arrays and hence does not need an -- initializer. Reading an element before writing to it returns an -- arbitrary value. type B = SArray Word32 Word32 -- | Same as thm1, except we don't need an initializer with the -- SArray model. thm2 :: SWord32 -> SWord32 -> B -> SBool -- | Prints Q.E.D. when run, as expected: -- --
-- >>> proveThm2 -- Q.E.D. --proveThm2 :: IO () -- | Demonstrates function counter-examples module Data.SBV.Examples.Uninterpreted.Function -- | An uninterpreted function f :: SWord8 -> SWord8 -> SWord16 -- | Asserts that f x z == f (y+2) z whenever x == y+2. -- Naturally correct: -- --
-- >>> prove thmGood -- Q.E.D. --thmGood :: SWord8 -> SWord8 -> SWord8 -> SBool -- | Asserts that f is commutative; which is not necessarily true! -- Indeed, the SMT solver returns a counter-example function that is not -- commutative. (Note that we have to use Yices as Z3 function -- counterexamples are not yet supported by sbv.) We have: -- --
-- >>> proveWith yices $ forAll ["x", "y"] thmBad -- Falsifiable. Counter-example: -- x = 0 :: SWord8 -- y = 128 :: SWord8 -- -- uninterpreted: f -- f 128 0 = 32768 -- f _ _ = 0 ---- -- Note how the counterexample function f returned by Yices -- violates commutativity; thus providing evidence that the asserted -- theorem is not valid. thmBad :: SWord8 -> SWord8 -> SBool