xref: /titanic_44/usr/src/common/crypto/aes/aes_impl.c (revision 20e6d5c536ad5b300e7fafb6a92e13040f492977)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <sys/types.h>
29 #include <sys/systm.h>
30 #include <sys/ddi.h>
31 #include <sys/sysmacros.h>
32 #include <sys/strsun.h>
33 #include <netinet/in.h>
34 #include <sys/crypto/spi.h>
35 #include <modes/modes.h>
36 #include "aes_impl.h"
37 #ifndef	_KERNEL
38 #include <strings.h>
39 #include <stdlib.h>
40 #endif	/* !_KERNEL */
41 
42 
43 /*
44  * This file is derived from the file  rijndael-alg-fst.c  taken from the
45  * "optimized C code v3.0" on the "rijndael home page"
46  * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
47  * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
48  *
49  * The following note is from the original file:
50  */
51 
52 /*
53  * rijndael-alg-fst.c
54  *
55  * @version 3.0 (December 2000)
56  *
57  * Optimised ANSI C code for the Rijndael cipher (now AES)
58  *
59  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
60  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
61  * @author Paulo Barreto <paulo.barreto@terra.com.br>
62  *
63  * This code is hereby placed in the public domain.
64  *
65  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
66  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
67  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
68  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
69  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
70  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
71  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
72  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
73  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
74  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
75  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
76  */
77 
78 /* EXPORT DELETE START */
79 
80 #if defined(sun4u) || defined(__amd64)
81 /* External assembly functions: */
82 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4],
83 	uint32_t ct[4]);
84 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4],
85 	uint32_t pt[4]);
86 #define	AES_ENCRYPT_IMPL		aes_encrypt_impl
87 #define	AES_DECRYPT_IMPL		aes_decrypt_impl
88 
89 #ifdef	__amd64
90 extern int rijndael_key_setup_enc(uint32_t rk[], const uint32_t cipherKey[],
91 	int keyBits);
92 extern int rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[],
93 	int keyBits);
94 #endif
95 
96 #else
97 #define	AES_ENCRYPT_IMPL		rijndael_encrypt
98 #define	AES_DECRYPT_IMPL		rijndael_decrypt
99 #define	rijndael_key_setup_enc_raw	rijndael_key_setup_enc
100 #endif	/* sun4u || __amd64 */
101 
102 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
103 #define	AES_BYTE_SWAP
104 #endif
105 
106 #ifndef	__amd64
107 /*
108  *  Constant tables
109  */
110 
111 /*
112  * Te0[x] = S [x].[02, 01, 01, 03];
113  * Te1[x] = S [x].[03, 02, 01, 01];
114  * Te2[x] = S [x].[01, 03, 02, 01];
115  * Te3[x] = S [x].[01, 01, 03, 02];
116  * Te4[x] = S [x].[01, 01, 01, 01];
117  *
118  * Td0[x] = Si[x].[0e, 09, 0d, 0b];
119  * Td1[x] = Si[x].[0b, 0e, 09, 0d];
120  * Td2[x] = Si[x].[0d, 0b, 0e, 09];
121  * Td3[x] = Si[x].[09, 0d, 0b, 0e];
122  * Td4[x] = Si[x].[01, 01, 01, 01];
123  */
124 
125 /* Encrypt Sbox constants (for the substitute bytes operation) */
126 
127 static const uint32_t Te0[256] =
128 {
129 	0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
130 	0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
131 	0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
132 	0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
133 	0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
134 	0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
135 	0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
136 	0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
137 	0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
138 	0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
139 	0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
140 	0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
141 	0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
142 	0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
143 	0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
144 	0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
145 	0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
146 	0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
147 	0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
148 	0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
149 	0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
150 	0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
151 	0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
152 	0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
153 	0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
154 	0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
155 	0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
156 	0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
157 	0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
158 	0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
159 	0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
160 	0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
161 	0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
162 	0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
163 	0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
164 	0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
165 	0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
166 	0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
167 	0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
168 	0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
169 	0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
170 	0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
171 	0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
172 	0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
173 	0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
174 	0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
175 	0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
176 	0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
177 	0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
178 	0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
179 	0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
180 	0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
181 	0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
182 	0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
183 	0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
184 	0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
185 	0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
186 	0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
187 	0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
188 	0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
189 	0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
190 	0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
191 	0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
192 	0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
193 };
194 
195 
196 static const uint32_t Te1[256] =
197 {
198 	0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
199 	0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
200 	0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
201 	0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
202 	0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
203 	0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
204 	0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
205 	0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
206 	0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
207 	0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
208 	0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
209 	0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
210 	0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
211 	0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
212 	0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
213 	0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
214 	0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
215 	0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
216 	0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
217 	0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
218 	0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
219 	0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
220 	0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
221 	0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
222 	0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
223 	0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
224 	0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
225 	0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
226 	0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
227 	0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
228 	0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
229 	0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
230 	0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
231 	0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
232 	0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
233 	0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
234 	0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
235 	0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
236 	0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
237 	0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
238 	0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
239 	0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
240 	0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
241 	0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
242 	0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
243 	0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
244 	0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
245 	0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
246 	0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
247 	0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
248 	0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
249 	0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
250 	0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
251 	0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
252 	0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
253 	0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
254 	0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
255 	0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
256 	0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
257 	0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
258 	0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
259 	0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
260 	0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
261 	0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
262 };
263 
264 
265 static const uint32_t Te2[256] =
266 {
267 	0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
268 	0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
269 	0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
270 	0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
271 	0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
272 	0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
273 	0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
274 	0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
275 	0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
276 	0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
277 	0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
278 	0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
279 	0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
280 	0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
281 	0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
282 	0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
283 	0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
284 	0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
285 	0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
286 	0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
287 	0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
288 	0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
289 	0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
290 	0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
291 	0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
292 	0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
293 	0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
294 	0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
295 	0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
296 	0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
297 	0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
298 	0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
299 	0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
300 	0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
301 	0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
302 	0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
303 	0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
304 	0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
305 	0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
306 	0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
307 	0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
308 	0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
309 	0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
310 	0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
311 	0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
312 	0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
313 	0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
314 	0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
315 	0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
316 	0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
317 	0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
318 	0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
319 	0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
320 	0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
321 	0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
322 	0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
323 	0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
324 	0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
325 	0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
326 	0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
327 	0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
328 	0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
329 	0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
330 	0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
331 };
332 
333 
334 static const uint32_t Te3[256] =
335 {
336 	0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
337 	0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
338 	0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
339 	0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
340 	0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
341 	0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
342 	0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
343 	0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
344 	0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
345 	0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
346 	0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
347 	0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
348 	0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
349 	0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
350 	0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
351 	0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
352 	0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
353 	0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
354 	0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
355 	0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
356 	0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
357 	0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
358 	0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
359 	0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
360 	0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
361 	0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
362 	0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
363 	0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
364 	0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
365 	0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
366 	0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
367 	0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
368 	0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
369 	0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
370 	0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
371 	0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
372 	0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
373 	0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
374 	0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
375 	0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
376 	0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
377 	0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
378 	0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
379 	0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
380 	0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
381 	0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
382 	0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
383 	0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
384 	0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
385 	0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
386 	0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
387 	0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
388 	0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
389 	0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
390 	0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
391 	0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
392 	0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
393 	0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
394 	0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
395 	0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
396 	0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
397 	0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
398 	0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
399 	0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
400 };
401 
402 static const uint32_t Te4[256] =
403 {
404 	0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
405 	0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
406 	0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
407 	0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
408 	0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
409 	0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
410 	0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
411 	0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
412 	0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
413 	0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
414 	0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
415 	0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
416 	0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
417 	0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
418 	0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
419 	0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
420 	0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
421 	0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
422 	0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
423 	0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
424 	0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
425 	0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
426 	0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
427 	0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
428 	0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
429 	0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
430 	0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
431 	0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
432 	0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
433 	0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
434 	0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
435 	0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
436 	0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
437 	0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
438 	0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
439 	0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
440 	0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
441 	0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
442 	0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
443 	0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
444 	0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
445 	0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
446 	0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
447 	0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
448 	0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
449 	0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
450 	0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
451 	0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
452 	0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
453 	0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
454 	0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
455 	0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
456 	0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
457 	0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
458 	0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
459 	0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
460 	0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
461 	0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
462 	0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
463 	0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
464 	0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
465 	0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
466 	0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
467 	0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
468 };
469 
470 /* Decrypt Sbox constants (for the substitute bytes operation) */
471 
472 static const uint32_t Td0[256] =
473 {
474 	0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
475 	0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
476 	0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
477 	0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
478 	0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
479 	0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
480 	0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
481 	0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
482 	0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
483 	0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
484 	0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
485 	0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
486 	0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
487 	0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
488 	0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
489 	0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
490 	0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
491 	0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
492 	0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
493 	0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
494 	0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
495 	0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
496 	0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
497 	0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
498 	0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
499 	0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
500 	0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
501 	0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
502 	0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
503 	0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
504 	0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
505 	0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
506 	0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
507 	0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
508 	0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
509 	0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
510 	0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
511 	0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
512 	0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
513 	0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
514 	0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
515 	0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
516 	0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
517 	0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
518 	0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
519 	0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
520 	0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
521 	0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
522 	0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
523 	0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
524 	0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
525 	0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
526 	0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
527 	0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
528 	0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
529 	0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
530 	0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
531 	0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
532 	0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
533 	0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
534 	0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
535 	0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
536 	0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
537 	0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
538 };
539 
540 static const uint32_t Td1[256] =
541 {
542 	0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
543 	0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
544 	0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
545 	0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
546 	0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
547 	0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
548 	0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
549 	0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
550 	0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
551 	0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
552 	0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
553 	0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
554 	0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
555 	0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
556 	0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
557 	0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
558 	0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
559 	0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
560 	0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
561 	0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
562 	0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
563 	0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
564 	0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
565 	0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
566 	0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
567 	0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
568 	0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
569 	0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
570 	0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
571 	0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
572 	0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
573 	0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
574 	0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
575 	0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
576 	0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
577 	0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
578 	0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
579 	0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
580 	0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
581 	0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
582 	0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
583 	0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
584 	0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
585 	0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
586 	0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
587 	0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
588 	0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
589 	0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
590 	0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
591 	0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
592 	0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
593 	0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
594 	0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
595 	0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
596 	0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
597 	0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
598 	0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
599 	0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
600 	0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
601 	0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
602 	0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
603 	0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
604 	0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
605 	0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
606 };
607 
608 static const uint32_t Td2[256] =
609 {
610 	0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
611 	0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
612 	0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
613 	0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
614 	0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
615 	0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
616 	0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
617 	0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
618 	0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
619 	0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
620 	0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
621 	0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
622 	0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
623 	0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
624 	0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
625 	0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
626 	0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
627 	0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
628 	0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
629 	0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
630 	0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
631 	0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
632 	0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
633 	0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
634 	0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
635 	0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
636 	0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
637 	0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
638 	0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
639 	0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
640 	0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
641 	0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
642 	0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
643 	0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
644 	0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
645 	0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
646 	0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
647 	0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
648 	0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
649 	0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
650 	0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
651 	0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
652 	0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
653 	0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
654 	0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
655 	0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
656 	0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
657 	0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
658 	0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
659 	0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
660 	0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
661 	0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
662 	0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
663 	0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
664 	0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
665 	0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
666 	0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
667 	0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
668 	0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
669 	0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
670 	0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
671 	0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
672 	0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
673 	0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
674 };
675 
676 static const uint32_t Td3[256] =
677 {
678 	0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
679 	0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
680 	0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
681 	0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
682 	0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
683 	0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
684 	0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
685 	0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
686 	0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
687 	0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
688 	0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
689 	0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
690 	0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
691 	0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
692 	0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
693 	0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
694 	0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
695 	0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
696 	0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
697 	0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
698 	0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
699 	0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
700 	0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
701 	0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
702 	0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
703 	0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
704 	0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
705 	0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
706 	0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
707 	0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
708 	0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
709 	0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
710 	0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
711 	0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
712 	0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
713 	0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
714 	0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
715 	0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
716 	0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
717 	0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
718 	0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
719 	0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
720 	0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
721 	0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
722 	0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
723 	0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
724 	0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
725 	0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
726 	0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
727 	0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
728 	0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
729 	0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
730 	0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
731 	0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
732 	0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
733 	0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
734 	0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
735 	0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
736 	0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
737 	0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
738 	0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
739 	0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
740 	0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
741 	0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
742 };
743 
744 
745 static const uint32_t Td4[256] =
746 {
747 	0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
748 	0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
749 	0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
750 	0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
751 	0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
752 	0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
753 	0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
754 	0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
755 	0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
756 	0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
757 	0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
758 	0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
759 	0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
760 	0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
761 	0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
762 	0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
763 	0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
764 	0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
765 	0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
766 	0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
767 	0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
768 	0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
769 	0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
770 	0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
771 	0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
772 	0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
773 	0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
774 	0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
775 	0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
776 	0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
777 	0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
778 	0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
779 	0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
780 	0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
781 	0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
782 	0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
783 	0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
784 	0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
785 	0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
786 	0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
787 	0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
788 	0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
789 	0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
790 	0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
791 	0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
792 	0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
793 	0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
794 	0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
795 	0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
796 	0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
797 	0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
798 	0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
799 	0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
800 	0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
801 	0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
802 	0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
803 	0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
804 	0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
805 	0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
806 	0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
807 	0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
808 	0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
809 	0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
810 	0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
811 };
812 
813 /* Rcon is Round Constant; used for encryption key expansion */
814 static const uint32_t rcon[RC_LENGTH] =
815 {
816 	/* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
817 	0x01000000, 0x02000000, 0x04000000, 0x08000000,
818 	0x10000000, 0x20000000, 0x40000000, 0x80000000,
819 	0x1B000000, 0x36000000
820 };
821 
822 
823 /*
824  * Expand the cipher key into the encryption key schedule.
825  *
826  * Return the number of rounds for the given cipher key size.
827  * The size of the key schedule depends on the number of rounds
828  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
829  *
830  * Parameters:
831  * rk		AES key schedule 32-bit array to be initialized
832  * cipherKey	User key
833  * keyBits	AES key size (128, 192, or 256 bits)
834  */
835 static int
836 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
837     int keyBits)
838 {
839 	int		i = 0;
840 	uint32_t	temp;
841 
842 	rk[0] = cipherKey[0];
843 	rk[1] = cipherKey[1];
844 	rk[2] = cipherKey[2];
845 	rk[3] = cipherKey[3];
846 
847 	if (keyBits == 128) {
848 		for (;;) {
849 			temp  = rk[3];
850 			rk[4] = rk[0] ^
851 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
852 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
853 			    (Te4[temp & 0xff] & 0x0000ff00) ^
854 			    (Te4[temp >> 24] & 0x000000ff) ^
855 			    rcon[i];
856 			rk[5] = rk[1] ^ rk[4];
857 			rk[6] = rk[2] ^ rk[5];
858 			rk[7] = rk[3] ^ rk[6];
859 
860 			if (++i == 10) {
861 				return (10);
862 			}
863 			rk += 4;
864 		}
865 	}
866 
867 	rk[4] = cipherKey[4];
868 	rk[5] = cipherKey[5];
869 
870 	if (keyBits == 192) {
871 		for (;;) {
872 			temp = rk[5];
873 			rk[6] = rk[0] ^
874 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
875 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
876 			    (Te4[temp & 0xff] & 0x0000ff00) ^
877 			    (Te4[temp >> 24] & 0x000000ff) ^
878 			    rcon[i];
879 			rk[7] = rk[1] ^ rk[6];
880 			rk[8] = rk[2] ^ rk[7];
881 			rk[9] = rk[3] ^ rk[8];
882 
883 			if (++i == 8) {
884 				return (12);
885 			}
886 
887 			rk[10] = rk[4] ^ rk[9];
888 			rk[11] = rk[5] ^ rk[10];
889 			rk += 6;
890 		}
891 	}
892 
893 	rk[6] = cipherKey[6];
894 	rk[7] = cipherKey[7];
895 
896 	if (keyBits == 256) {
897 		for (;;) {
898 			temp = rk[7];
899 			rk[8] = rk[0] ^
900 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
901 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
902 			    (Te4[temp & 0xff] & 0x0000ff00) ^
903 			    (Te4[temp >> 24] & 0x000000ff) ^
904 			    rcon[i];
905 			rk[9] = rk[1] ^ rk[8];
906 			rk[10] = rk[2] ^ rk[9];
907 			rk[11] = rk[3] ^ rk[10];
908 
909 			if (++i == 7) {
910 				return (14);
911 			}
912 			temp = rk[11];
913 			rk[12] = rk[4] ^
914 			    (Te4[temp >> 24] & 0xff000000) ^
915 			    (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
916 			    (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
917 			    (Te4[temp & 0xff] & 0x000000ff);
918 			rk[13] = rk[5] ^ rk[12];
919 			rk[14] = rk[6] ^ rk[13];
920 			rk[15] = rk[7] ^ rk[14];
921 
922 			rk += 8;
923 		}
924 	}
925 
926 	return (0);
927 }
928 #endif	/* !__amd64 */
929 
930 
931 #ifdef	sun4u
932 
933 /*
934  * Expand the cipher key into the encryption key schedule.
935  * by the sun4u optimized assembly implementation.
936  *
937  * Return the number of rounds for the given cipher key size.
938  * The size of the key schedule depends on the number of rounds
939  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
940  *
941  * Parameters:
942  * rk		AES key schedule 64-bit array to be initialized
943  * cipherKey	User key
944  * keyBits	AES key size (128, 192, or 256 bits)
945  */
946 static int
947 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
948 {
949 	uint32_t	rk1[4 * (MAX_AES_NR + 1)];
950 	uint64_t	*rk64 = (uint64_t *)rk;
951 	uint32_t	*rkt;
952 	uint64_t	t;
953 	int		i, Nr;
954 
955 	Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
956 
957 	for (i = 0; i < 4 * Nr; i++) {
958 		t = (uint64_t)(rk1[i]);
959 		rk64[i] = ((t & 0xff000000) << 11) |
960 		    ((t & 0xff0000) << 8) |
961 		    ((t & 0xffff) << 3);
962 	}
963 
964 	rkt = (uint32_t *)(&(rk64[4 * Nr]));
965 
966 	for (i = 0; i < 4; i++) {
967 		rkt[i] = rk1[4 * Nr+i];
968 	}
969 
970 	return (Nr);
971 }
972 
973 
974 /*
975  * Expand the cipher key into the decryption key schedule as used
976  * by the sun4u optimized assembly implementation.
977  *
978  * Return the number of rounds for the given cipher key size.
979  * The size of the key schedule depends on the number of rounds
980  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
981  *
982  * Parameters:
983  * rk		AES key schedule 32-bit array to be initialized
984  * cipherKey	User key
985  * keyBits	AES key size (128, 192, or 256 bits)
986  */
987 static int
988 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
989     int keyBits)
990 {
991 	int		Nr, i;
992 	uint32_t	temp;
993 
994 	/* expand the cipher key: */
995 	Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
996 
997 	/* invert the order of the round keys: */
998 
999 	for (i = 0; i < 2 * Nr + 2; i++) {
1000 		temp = rk[i];
1001 		rk[i] = rk[4 * Nr - i + 3];
1002 		rk[4 * Nr - i + 3] = temp;
1003 	}
1004 
1005 	/*
1006 	 * apply the inverse MixColumn transform to all
1007 	 * round keys but the first and the last:
1008 	 */
1009 	for (i = 1; i < Nr; i++) {
1010 		rk += 4;
1011 		rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1012 		    Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1013 		    Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1014 		    Td3[Te4[rk[0] & 0xff] & 0xff];
1015 		rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1016 		    Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1017 		    Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1018 		    Td3[Te4[rk[1] & 0xff] & 0xff];
1019 		rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1020 		    Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1021 		    Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1022 		    Td3[Te4[rk[2] & 0xff] & 0xff];
1023 		rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1024 		    Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1025 		    Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1026 		    Td3[Te4[rk[3] & 0xff] & 0xff];
1027 	}
1028 
1029 	return (Nr);
1030 }
1031 
1032 
1033 /*
1034  * The size of the key schedule depends on the number of rounds
1035  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1036  *
1037  * Parameters:
1038  * rk		AES key schedule 64-bit array to be initialized
1039  * cipherKey	User key
1040  * keyBits	AES key size (128, 192, or 256 bits)
1041  */
1042 static int
1043 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
1044 {
1045 	uint32_t	rk1[4 * (MAX_AES_NR + 1)];
1046 	uint64_t	*rk64 = (uint64_t *)rk;
1047 	uint32_t	*rkt;
1048 	uint64_t	t;
1049 	int		i, Nr;
1050 
1051 	Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
1052 	for (i = 0; i < 4 * Nr; i++) {
1053 		t = (uint64_t)(rk1[i]);
1054 		rk64[i] = ((t & 0xff000000) << 11) |
1055 		    ((t & 0xff0000) << 8) |
1056 		    ((t & 0xffff) << 3);
1057 	}
1058 
1059 	rkt = (uint32_t *)(&(rk64[4 * Nr]));
1060 
1061 	for (i = 0; i < 4; i++) {
1062 		rkt[i] = rk1[4 * Nr + i];
1063 	}
1064 
1065 	return (Nr);
1066 }
1067 
1068 
1069 /*
1070  * Expand the 64-bit AES cipher key array into the encryption and decryption
1071  * key schedules.
1072  *
1073  * Parameters:
1074  * key		AES key schedule to be initialized
1075  * keyarr32	User key
1076  * keyBits	AES key size (128, 192, or 256 bits)
1077  */
1078 static void
1079 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1080 {
1081 	key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1082 	    keybits);
1083 	key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1084 	    keybits);
1085 	key->type = AES_64BIT_KS;
1086 }
1087 
1088 
1089 #elif !defined(__amd64)
1090 
1091 /*
1092  *  Expand the cipher key into the decryption key schedule.
1093  *  Return the number of rounds for the given cipher key size.
1094  *  The size of the key schedule depends on the number of rounds
1095  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1096  *
1097  * Parameters:
1098  * rk		AES key schedule 32-bit array to be initialized
1099  * cipherKey	User key
1100  * keyBits	AES key size (128, 192, or 256 bits)
1101  */
1102 static int
1103 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1104 {
1105 	int	 Nr, i, j;
1106 	uint32_t temp;
1107 
1108 	/* expand the cipher key: */
1109 	Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1110 
1111 	/* invert the order of the round keys: */
1112 	for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1113 		temp = rk[i];
1114 		rk[i] = rk[j];
1115 		rk[j] = temp;
1116 		temp = rk[i + 1];
1117 		rk[i + 1] = rk[j + 1];
1118 		rk[j + 1] = temp;
1119 		temp = rk[i + 2];
1120 		rk[i + 2] = rk[j + 2];
1121 		rk[j + 2] = temp;
1122 		temp = rk[i + 3];
1123 		rk[i + 3] = rk[j + 3];
1124 		rk[j + 3] = temp;
1125 	}
1126 
1127 	/*
1128 	 * apply the inverse MixColumn transform to all
1129 	 * round keys but the first and the last:
1130 	 */
1131 	for (i = 1; i < Nr; i++) {
1132 		rk += 4;
1133 		rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1134 		    Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1135 		    Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1136 		    Td3[Te4[rk[0] & 0xff] & 0xff];
1137 		rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1138 		    Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1139 		    Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1140 		    Td3[Te4[rk[1] & 0xff] & 0xff];
1141 		rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1142 		    Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1143 		    Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1144 		    Td3[Te4[rk[2] & 0xff] & 0xff];
1145 		rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1146 		    Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1147 		    Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1148 		    Td3[Te4[rk[3] & 0xff] & 0xff];
1149 	}
1150 
1151 	return (Nr);
1152 }
1153 
1154 
1155 /*
1156  * Encrypt one block of data. The block is assumed to be an array
1157  * of four uint32_t values, so copy for alignment (and byte-order
1158  * reversal for little endian systems might be necessary on the
1159  * input and output byte streams.
1160  * The size of the key schedule depends on the number of rounds
1161  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1162  *
1163  * Parameters:
1164  * rk	Key schedule, of aes_ks_t (60 32-bit integers)
1165  * Nr	Number of rounds
1166  * pt	Input block (plain text)
1167  * ct	Output block (crypto text).  Can overlap with pt
1168  */
1169 static void
1170 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1171     uint32_t ct[4])
1172 {
1173 	uint32_t	s0, s1, s2, s3, t0, t1, t2, t3;
1174 	int		r;
1175 
1176 	/*
1177 	 * map byte array block to cipher state
1178 	 * and add initial round key:
1179 	 */
1180 
1181 	s0 = pt[0] ^ rk[0];
1182 	s1 = pt[1] ^ rk[1];
1183 	s2 = pt[2] ^ rk[2];
1184 	s3 = pt[3] ^ rk[3];
1185 
1186 	/*
1187 	 * Nr - 1 full rounds:
1188 	 */
1189 
1190 	r = Nr >> 1;
1191 
1192 	for (;;) {
1193 		t0 = Te0[s0 >> 24] ^
1194 		    Te1[(s1 >> 16) & 0xff] ^
1195 		    Te2[(s2 >>  8) & 0xff] ^
1196 		    Te3[s3 & 0xff] ^
1197 		    rk[4];
1198 
1199 		t1 = Te0[s1 >> 24] ^
1200 		    Te1[(s2 >> 16) & 0xff] ^
1201 		    Te2[(s3 >>  8) & 0xff] ^
1202 		    Te3[s0 & 0xff] ^
1203 		    rk[5];
1204 
1205 		t2 = Te0[s2 >> 24] ^
1206 		    Te1[(s3 >> 16) & 0xff] ^
1207 		    Te2[(s0 >>  8) & 0xff] ^
1208 		    Te3[s1 & 0xff] ^
1209 		    rk[6];
1210 
1211 		t3 = Te0[s3 >> 24] ^
1212 		    Te1[(s0 >> 16) & 0xff] ^
1213 		    Te2[(s1 >>  8) & 0xff] ^
1214 		    Te3[s2 & 0xff] ^
1215 		    rk[7];
1216 
1217 		rk += 8;
1218 
1219 		if (--r == 0) {
1220 			break;
1221 		}
1222 
1223 		s0 = Te0[t0 >> 24] ^
1224 		    Te1[(t1 >> 16) & 0xff] ^
1225 		    Te2[(t2 >>  8) & 0xff] ^
1226 		    Te3[t3 & 0xff] ^
1227 		    rk[0];
1228 
1229 		s1 = Te0[t1 >> 24] ^
1230 		    Te1[(t2 >> 16) & 0xff] ^
1231 		    Te2[(t3 >>  8) & 0xff] ^
1232 		    Te3[t0 & 0xff] ^
1233 		    rk[1];
1234 
1235 		s2 = Te0[t2 >> 24] ^
1236 		    Te1[(t3 >> 16) & 0xff] ^
1237 		    Te2[(t0 >>  8) & 0xff] ^
1238 		    Te3[t1 & 0xff] ^
1239 		    rk[2];
1240 
1241 		s3 = Te0[t3 >> 24] ^
1242 		    Te1[(t0 >> 16) & 0xff] ^
1243 		    Te2[(t1 >>  8) & 0xff] ^
1244 		    Te3[t2 & 0xff] ^
1245 		    rk[3];
1246 	}
1247 
1248 	/*
1249 	 * apply last round and
1250 	 * map cipher state to byte array block:
1251 	 */
1252 
1253 	s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1254 	    (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1255 	    (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1256 	    (Te4[t3 & 0xff] & 0x000000ff) ^
1257 	    rk[0];
1258 	ct[0] = s0;
1259 
1260 	s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1261 	    (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1262 	    (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1263 	    (Te4[t0 & 0xff] & 0x000000ff) ^
1264 	    rk[1];
1265 	ct[1] = s1;
1266 
1267 	s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1268 	    (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1269 	    (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1270 	    (Te4[t1 & 0xff] & 0x000000ff) ^
1271 	    rk[2];
1272 	ct[2] = s2;
1273 
1274 	s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1275 	    (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1276 	    (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1277 	    (Te4[t2 & 0xff] & 0x000000ff) ^
1278 	    rk[3];
1279 	ct[3] = s3;
1280 }
1281 
1282 
1283 /*
1284  * Decrypt one block of data. The block is assumed to be an array
1285  * of four uint32_t values, so copy for alignment (and byte-order
1286  * reversal for little endian systems might be necessary on the
1287  * input and output byte streams.
1288  * The size of the key schedule depends on the number of rounds
1289  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1290  *
1291  * Parameters:
1292  * rk	Key schedule, of aes_ks_t (60 32-bit integers)
1293  * Nr	Number of rounds
1294  * ct	Input block (crypto text)
1295  * pt	Output block (plain text). Can overlap with pt
1296  */
1297 static void
1298 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1299     uint32_t pt[4])
1300 {
1301 	uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1302 	int	 r;
1303 
1304 	/*
1305 	 * map byte array block to cipher state
1306 	 * and add initial round key:
1307 	 */
1308 	s0 = ct[0] ^ rk[0];
1309 	s1 = ct[1] ^ rk[1];
1310 	s2 = ct[2] ^ rk[2];
1311 	s3 = ct[3] ^ rk[3];
1312 
1313 	/*
1314 	 * Nr - 1 full rounds:
1315 	 */
1316 
1317 	r = Nr >> 1;
1318 
1319 	for (;;) {
1320 		t0 = Td0[s0 >> 24] ^
1321 		    Td1[(s3 >> 16) & 0xff] ^
1322 		    Td2[(s2 >> 8) & 0xff] ^
1323 		    Td3[s1 & 0xff] ^
1324 		    rk[4];
1325 
1326 		t1 = Td0[s1 >> 24] ^
1327 		    Td1[(s0 >> 16) & 0xff] ^
1328 		    Td2[(s3 >>  8) & 0xff] ^
1329 		    Td3[s2 & 0xff] ^
1330 		    rk[5];
1331 
1332 		t2 = Td0[s2 >> 24] ^
1333 		    Td1[(s1 >> 16) & 0xff] ^
1334 		    Td2[(s0 >>  8) & 0xff] ^
1335 		    Td3[s3 & 0xff] ^
1336 		    rk[6];
1337 
1338 		t3 = Td0[s3 >> 24] ^
1339 		    Td1[(s2 >> 16) & 0xff] ^
1340 		    Td2[(s1 >> 8) & 0xff] ^
1341 		    Td3[s0 & 0xff] ^
1342 		    rk[7];
1343 
1344 		rk += 8;
1345 
1346 		if (--r == 0) {
1347 			break;
1348 		}
1349 
1350 		s0 = Td0[t0 >> 24] ^
1351 		    Td1[(t3 >> 16) & 0xff] ^
1352 		    Td2[(t2 >> 8) & 0xff] ^
1353 		    Td3[t1 & 0xff] ^
1354 		    rk[0];
1355 
1356 		s1 = Td0[t1 >> 24] ^
1357 		    Td1[(t0 >> 16) & 0xff] ^
1358 		    Td2[(t3 >> 8) & 0xff] ^
1359 		    Td3[t2 & 0xff] ^
1360 		    rk[1];
1361 
1362 		s2 = Td0[t2 >> 24] ^
1363 		    Td1[(t1 >> 16) & 0xff] ^
1364 		    Td2[(t0 >> 8) & 0xff] ^
1365 		    Td3[t3 & 0xff] ^
1366 		    rk[2];
1367 
1368 		s3 = Td0[t3 >> 24] ^
1369 		    Td1[(t2 >> 16) & 0xff] ^
1370 		    Td2[(t1 >> 8) & 0xff] ^
1371 		    Td3[t0 & 0xff] ^
1372 		    rk[3];
1373 	}
1374 
1375 	/*
1376 	 * apply last round and
1377 	 * map cipher state to byte array block:
1378 	 */
1379 
1380 	s0 = (Td4[t0 >> 24] & 0xff000000) ^
1381 	    (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1382 	    (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1383 	    (Td4[t1 & 0xff] & 0x000000ff) ^
1384 	    rk[0];
1385 	pt[0] = s0;
1386 
1387 	s1 = (Td4[t1 >> 24] & 0xff000000) ^
1388 	    (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1389 	    (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1390 	    (Td4[t2 & 0xff] & 0x000000ff) ^
1391 	    rk[1];
1392 	pt[1] = s1;
1393 
1394 	s2 = (Td4[t2 >> 24] & 0xff000000) ^
1395 	    (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1396 	    (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1397 	    (Td4[t3 & 0xff] & 0x000000ff) ^
1398 	    rk[2];
1399 	pt[2] = s2;
1400 
1401 	s3 = (Td4[t3 >> 24] & 0xff000000) ^
1402 	    (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1403 	    (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1404 	    (Td4[t0 & 0xff] & 0x000000ff) ^
1405 	    rk[3];
1406 	pt[3] = s3;
1407 }
1408 #endif	/* sun4u, !__amd64 */
1409 
1410 #ifndef	sun4u
1411 /*
1412  * Expand the 32-bit AES cipher key array into the encryption and decryption
1413  * key schedules.
1414  *
1415  * Parameters:
1416  * key		AES key schedule to be initialized
1417  * keyarr32	User key
1418  * keyBits	AES key size (128, 192, or 256 bits)
1419  */
1420 static void
1421 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1422 {
1423 	key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1424 	    keybits);
1425 	key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1426 	    keybits);
1427 	key->type = AES_32BIT_KS;
1428 }
1429 #endif	/* sun4u */
1430 /* EXPORT DELETE END */
1431 
1432 
1433 /*
1434  * Initialize key schedules for AES
1435  *
1436  * Parameters:
1437  * cipherKey	User key
1438  * keyBits	AES key size (128, 192, or 256 bits)
1439  * keysched	AES key schedule to be initialized, of type aes_key_t.
1440  *		Allocated by aes_alloc_keysched().
1441  */
1442 void
1443 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1444 {
1445 /* EXPORT DELETE START */
1446 	aes_key_t	*newbie = keysched;
1447 	uint_t		keysize, i, j;
1448 	union {
1449 		uint64_t	ka64[4];
1450 		uint32_t	ka32[8];
1451 		} keyarr;
1452 
1453 	switch (keyBits) {
1454 	case 128:
1455 		newbie->nr = 10;
1456 		break;
1457 
1458 	case 192:
1459 		newbie->nr = 12;
1460 		break;
1461 
1462 	case 256:
1463 		newbie->nr = 14;
1464 		break;
1465 
1466 	default:
1467 		/* should never get here */
1468 		return;
1469 	}
1470 	keysize = keyBits >> 3;
1471 
1472 	/*
1473 	 * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1474 	 * 4 bytes in the key.  On _BIG_ENDIAN and AMD64, copy the key
1475 	 * without reversing bytes.
1476 	 * For AMD64, do not byte swap for aes_setupkeys().
1477 	 *
1478 	 * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1479 	 * X86/AMD64  uses a key schedule array with 32-bit elements.
1480 	 */
1481 #ifndef	AES_BYTE_SWAP
1482 	if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1483 		for (i = 0, j = 0; j < keysize; i++, j += 8) {
1484 			/* LINTED: pointer alignment */
1485 			keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1486 		}
1487 	} else {
1488 		bcopy(cipherKey, keyarr.ka32, keysize);
1489 	}
1490 
1491 #else	/* byte swap */
1492 	for (i = 0, j = 0; j < keysize; i++, j += 4) {
1493 		keyarr.ka32[i] = (((uint32_t)cipherKey[j] << 24) |
1494 		    ((uint32_t)cipherKey[j + 1] << 16) |
1495 		    ((uint32_t)cipherKey[j + 2] << 8) |
1496 		    (uint32_t)cipherKey[j + 3]);
1497 	}
1498 #endif
1499 
1500 	aes_setupkeys(newbie, keyarr.ka32, keyBits);
1501 /* EXPORT DELETE END */
1502 }
1503 
1504 /*
1505  * Encrypt one block using AES.
1506  * Align if needed and (for x86 32-bit only) byte-swap.
1507  *
1508  * Parameters:
1509  * ks	Key schedule, of type aes_key_t
1510  * pt	Input block (plain text)
1511  * ct	Output block (crypto text).  Can overlap with pt
1512  */
1513 int
1514 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1515 {
1516 /* EXPORT DELETE START */
1517 	aes_key_t	*ksch = (aes_key_t *)ks;
1518 
1519 #ifndef	AES_BYTE_SWAP
1520 	if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1521 		AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1522 		    /* LINTED:  pointer alignment */
1523 		    (uint32_t *)pt, (uint32_t *)ct);
1524 	} else {
1525 #endif
1526 		uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1527 
1528 		/* Copy input block into buffer */
1529 #ifndef	AES_BYTE_SWAP
1530 		bcopy(pt, &buffer, AES_BLOCK_LEN);
1531 
1532 #else	/* byte swap */
1533 		buffer[0] = (((uint32_t)pt[0] << 24) | ((uint32_t)pt[1] << 16) |
1534 		    ((uint32_t)pt[2] << 8) | (uint32_t)pt[3]);
1535 		buffer[1] = (((uint32_t)pt[4] << 24) | ((uint32_t)pt[5] << 16) |
1536 		    ((uint32_t)pt[6] << 8) | (uint32_t)pt[7]);
1537 		buffer[2] = (((uint32_t)pt[8] << 24) | ((uint32_t)pt[9] << 16) |
1538 		    ((uint32_t)pt[10] << 8) | (uint32_t)pt[11]);
1539 		buffer[3] = (((uint32_t)pt[12] << 24) |
1540 		    ((uint32_t)pt[13] << 16) | ((uint32_t)pt[14] << 8) |
1541 		    (uint32_t)pt[15]);
1542 #endif
1543 
1544 		AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1545 		    buffer, buffer);
1546 
1547 		/* Copy result from buffer to output block */
1548 #ifndef	AES_BYTE_SWAP
1549 		bcopy(&buffer, ct, AES_BLOCK_LEN);
1550 	}
1551 
1552 #else	/* byte swap */
1553 		ct[0] = buffer[0] >> 24;
1554 		ct[1] = buffer[0] >> 16;
1555 		ct[2] = buffer[0] >> 8;
1556 		ct[3] = (uint8_t)buffer[0];
1557 		ct[4] = buffer[1] >> 24;
1558 		ct[5] = buffer[1] >> 16;
1559 		ct[6] = buffer[1] >> 8;
1560 		ct[7] = (uint8_t)buffer[1];
1561 		ct[8] = buffer[2] >> 24;
1562 		ct[9] = buffer[2] >> 16;
1563 		ct[10] = buffer[2] >> 8;
1564 		ct[11] = (uint8_t)buffer[2];
1565 		ct[12] = buffer[3] >> 24;
1566 		ct[13] = buffer[3] >> 16;
1567 		ct[14] = buffer[3] >> 8;
1568 		ct[15] = (uint8_t)buffer[3];
1569 #endif
1570 /* EXPORT DELETE END */
1571 	return (CRYPTO_SUCCESS);
1572 }
1573 
1574 /*
1575  * Decrypt one block using AES.
1576  * Align and byte-swap if needed.
1577  *
1578  * Parameters:
1579  * ks	Key schedule, of type aes_key_t
1580  * ct	Input block (crypto text)
1581  * pt	Output block (plain text). Can overlap with pt
1582  */
1583 int
1584 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1585 {
1586 /* EXPORT DELETE START */
1587 	aes_key_t	*ksch = (aes_key_t *)ks;
1588 
1589 #ifndef	AES_BYTE_SWAP
1590 	if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1591 		AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1592 		    /* LINTED:  pointer alignment */
1593 		    (uint32_t *)ct, (uint32_t *)pt);
1594 	} else {
1595 #endif
1596 		uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1597 
1598 		/* Copy input block into buffer */
1599 #ifndef	AES_BYTE_SWAP
1600 		bcopy(ct, &buffer, AES_BLOCK_LEN);
1601 
1602 #else	/* byte swap */
1603 		buffer[0] = (((uint32_t)ct[0] << 24) | ((uint32_t)ct[1] << 16) |
1604 		    ((uint32_t)ct[2] << 8) | (uint32_t)ct[3]);
1605 
1606 		buffer[1] = (((uint32_t)ct[4] << 24) | ((uint32_t)ct[5] << 16) |
1607 		    ((uint32_t)ct[6] << 8) | (uint32_t)ct[7]);
1608 
1609 		buffer[2] = (((uint32_t)ct[8] << 24) | ((uint32_t)ct[9] << 16) |
1610 		    ((uint32_t)ct[10] << 8) | (uint32_t)ct[11]);
1611 
1612 		buffer[3] = (((uint32_t)ct[12] << 24) |
1613 		    ((uint32_t)ct[13] << 16) | ((uint32_t)ct[14] << 8) |
1614 		    (uint32_t)ct[15]);
1615 #endif
1616 
1617 		AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1618 		    buffer, buffer);
1619 
1620 		/* Copy result from buffer to output block */
1621 #ifndef	AES_BYTE_SWAP
1622 		bcopy(&buffer, pt, AES_BLOCK_LEN);
1623 	}
1624 
1625 #else	/* byte swap */
1626 		pt[0] = buffer[0] >> 24;
1627 		pt[1] = buffer[0] >> 16;
1628 		pt[2] = buffer[0] >> 8;
1629 		pt[3] = (uint8_t)buffer[0];
1630 		pt[4] = buffer[1] >> 24;
1631 		pt[5] = buffer[1] >> 16;
1632 		pt[6] = buffer[1] >> 8;
1633 		pt[7] = (uint8_t)buffer[1];
1634 		pt[8] = buffer[2] >> 24;
1635 		pt[9] = buffer[2] >> 16;
1636 		pt[10] = buffer[2] >> 8;
1637 		pt[11] = (uint8_t)buffer[2];
1638 		pt[12] = buffer[3] >> 24;
1639 		pt[13] = buffer[3] >> 16;
1640 		pt[14] = buffer[3] >> 8;
1641 		pt[15] = (uint8_t)buffer[3];
1642 #endif
1643 
1644 /* EXPORT DELETE END */
1645 	return (CRYPTO_SUCCESS);
1646 }
1647 
1648 
1649 /*
1650  * Allocate key schedule for AES.
1651  *
1652  * Return the pointer and set size to the number of bytes allocated.
1653  * Memory allocated must be freed by the caller when done.
1654  *
1655  * Parameters:
1656  * size		Size of key schedule allocated, in bytes
1657  * kmflag	Flag passed to kmem_alloc(9F); ignored in userland.
1658  */
1659 /* ARGSUSED */
1660 void *
1661 aes_alloc_keysched(size_t *size, int kmflag)
1662 {
1663 /* EXPORT DELETE START */
1664 	aes_key_t *keysched;
1665 
1666 #ifdef	_KERNEL
1667 	keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1668 #else	/* !_KERNEL */
1669 	keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1670 #endif	/* _KERNEL */
1671 
1672 	if (keysched != NULL) {
1673 		*size = sizeof (aes_key_t);
1674 		return (keysched);
1675 	}
1676 /* EXPORT DELETE END */
1677 	return (NULL);
1678 }
1679 
1680 void
1681 aes_copy_block(uint8_t *in, uint8_t *out)
1682 {
1683 	if (IS_P2ALIGNED(in, sizeof (uint32_t)) &&
1684 	    IS_P2ALIGNED(out, sizeof (uint32_t))) {
1685 		/* LINTED: pointer alignment */
1686 		*(uint32_t *)&out[0] = *(uint32_t *)&in[0];
1687 		/* LINTED: pointer alignment */
1688 		*(uint32_t *)&out[4] = *(uint32_t *)&in[4];
1689 		/* LINTED: pointer alignment */
1690 		*(uint32_t *)&out[8] = *(uint32_t *)&in[8];
1691 		/* LINTED: pointer alignment */
1692 		*(uint32_t *)&out[12] = *(uint32_t *)&in[12];
1693 	} else {
1694 		AES_COPY_BLOCK(in, out);
1695 	}
1696 }
1697 
1698 /* XOR block of data into dest */
1699 void
1700 aes_xor_block(uint8_t *data, uint8_t *dst)
1701 {
1702 	if (IS_P2ALIGNED(dst, sizeof (uint32_t)) &&
1703 	    IS_P2ALIGNED(data, sizeof (uint32_t))) {
1704 		/* LINTED: pointer alignment */
1705 		*(uint32_t *)&dst[0] ^= *(uint32_t *)&data[0];
1706 		/* LINTED: pointer alignment */
1707 		*(uint32_t *)&dst[4] ^= *(uint32_t *)&data[4];
1708 		/* LINTED: pointer alignment */
1709 		*(uint32_t *)&dst[8] ^= *(uint32_t *)&data[8];
1710 		/* LINTED: pointer alignment */
1711 		*(uint32_t *)&dst[12] ^= *(uint32_t *)&data[12];
1712 	} else {
1713 		AES_XOR_BLOCK(data, dst);
1714 	}
1715 }
1716 
1717 /*
1718  * Encrypt multiple blocks of data according to mode.
1719  */
1720 /* ARGSUSED */
1721 int
1722 aes_encrypt_contiguous_blocks(void *ctx, char *data, size_t length,
1723     crypto_data_t *out)
1724 {
1725 	aes_ctx_t *aes_ctx = ctx;
1726 	int rv;
1727 
1728 	if (aes_ctx->ac_flags & CTR_MODE) {
1729 		rv = ctr_mode_contiguous_blocks(ctx, data, length, out,
1730 		    AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
1731 #ifdef _KERNEL
1732 	} else if (aes_ctx->ac_flags & CCM_MODE) {
1733 		rv = ccm_mode_encrypt_contiguous_blocks(ctx, data, length,
1734 		    out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
1735 		    aes_xor_block);
1736 #endif
1737 	} else if (aes_ctx->ac_flags & CBC_MODE) {
1738 		rv = cbc_encrypt_contiguous_blocks(ctx,
1739 		    data, length, out, AES_BLOCK_LEN, aes_encrypt_block,
1740 		    aes_copy_block, aes_xor_block);
1741 	} else {
1742 		rv = ecb_cipher_contiguous_blocks(ctx, data, length, out,
1743 		    AES_BLOCK_LEN, aes_encrypt_block);
1744 	}
1745 	return (rv);
1746 }
1747 
1748 /*
1749  * Decrypt multiple blocks of data according to mode.
1750  */
1751 int
1752 aes_decrypt_contiguous_blocks(void *ctx, char *data, size_t length,
1753     crypto_data_t *out)
1754 {
1755 	aes_ctx_t *aes_ctx = ctx;
1756 	int rv;
1757 
1758 	if (aes_ctx->ac_flags & CTR_MODE) {
1759 		rv = ctr_mode_contiguous_blocks(ctx, data, length, out,
1760 		    AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
1761 		if (rv == CRYPTO_DATA_LEN_RANGE)
1762 			rv = CRYPTO_ENCRYPTED_DATA_LEN_RANGE;
1763 #ifdef _KERNEL
1764 	} else if (aes_ctx->ac_flags & CCM_MODE) {
1765 		rv = ccm_mode_decrypt_contiguous_blocks(ctx, data, length,
1766 		    out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
1767 		    aes_xor_block);
1768 #endif
1769 	} else if (aes_ctx->ac_flags & CBC_MODE) {
1770 		rv = cbc_decrypt_contiguous_blocks(ctx, data, length, out,
1771 		    AES_BLOCK_LEN, aes_decrypt_block, aes_copy_block,
1772 		    aes_xor_block);
1773 	} else {
1774 		rv = ecb_cipher_contiguous_blocks(ctx, data, length, out,
1775 		    AES_BLOCK_LEN, aes_decrypt_block);
1776 		if (rv == CRYPTO_DATA_LEN_RANGE)
1777 			rv = CRYPTO_ENCRYPTED_DATA_LEN_RANGE;
1778 	}
1779 	return (rv);
1780 }
1781