xref: /titanic_50/usr/src/common/crypto/aes/aes_impl.c (revision 24bb1048b1197ebc9afe761e4098573aeedfe8c9)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 
25 #include <sys/types.h>
26 #include <sys/systm.h>
27 #include <sys/sysmacros.h>
28 #include <netinet/in.h>
29 #include "aes_impl.h"
30 #ifndef	_KERNEL
31 #include <strings.h>
32 #include <stdlib.h>
33 #endif	/* !_KERNEL */
34 
35 #ifdef __amd64
36 
37 #ifdef _KERNEL
38 #include <sys/cpuvar.h>		/* cpu_t, CPU */
39 #include <sys/x86_archext.h>	/* x86_featureset, X86FSET_AES */
40 #include <sys/disp.h>		/* kpreempt_disable(), kpreempt_enable */
41 
42 /* Workaround for no XMM kernel thread save/restore */
43 #define	KPREEMPT_DISABLE	kpreempt_disable()
44 #define	KPREEMPT_ENABLE		kpreempt_enable()
45 
46 #else
47 #include <sys/auxv.h>		/* getisax() */
48 #include <sys/auxv_386.h>	/* AV_386_AES bit */
49 #define	KPREEMPT_DISABLE
50 #define	KPREEMPT_ENABLE
51 #endif	/* _KERNEL */
52 #endif  /* __amd64 */
53 
54 
55 /*
56  * This file is derived from the file  rijndael-alg-fst.c  taken from the
57  * "optimized C code v3.0" on the "rijndael home page"
58  * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
59  * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
60  *
61  * The following note is from the original file:
62  */
63 
64 /*
65  * rijndael-alg-fst.c
66  *
67  * @version 3.0 (December 2000)
68  *
69  * Optimised ANSI C code for the Rijndael cipher (now AES)
70  *
71  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
72  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
73  * @author Paulo Barreto <paulo.barreto@terra.com.br>
74  *
75  * This code is hereby placed in the public domain.
76  *
77  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
78  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
79  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
80  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
81  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
82  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
83  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
84  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
85  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
86  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
87  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
88  */
89 
90 #if defined(sun4u)
91 /* External assembly functions: */
92 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4],
93 	uint32_t ct[4]);
94 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4],
95 	uint32_t pt[4]);
96 
97 #define	AES_ENCRYPT_IMPL(a, b, c, d, e)	aes_encrypt_impl(a, b, c, d)
98 #define	AES_DECRYPT_IMPL(a, b, c, d, e)	aes_decrypt_impl(a, b, c, d)
99 
100 #elif defined(__amd64)
101 
102 /* These functions are used to execute amd64 instructions for AMD or Intel: */
103 extern int rijndael_key_setup_enc_amd64(uint32_t rk[],
104 	const uint32_t cipherKey[], int keyBits);
105 extern int rijndael_key_setup_dec_amd64(uint32_t rk[],
106 	const uint32_t cipherKey[], int keyBits);
107 extern void aes_encrypt_amd64(const uint32_t rk[], int Nr,
108 	const uint32_t pt[4], uint32_t ct[4]);
109 extern void aes_decrypt_amd64(const uint32_t rk[], int Nr,
110 	const uint32_t ct[4], uint32_t pt[4]);
111 
112 /* These functions are used to execute Intel-specific AES-NI instructions: */
113 extern int rijndael_key_setup_enc_intel(uint32_t rk[],
114 	const uint32_t cipherKey[], uint64_t keyBits);
115 extern int rijndael_key_setup_dec_intel(uint32_t rk[],
116 	const uint32_t cipherKey[], uint64_t keyBits);
117 extern void aes_encrypt_intel(const uint32_t rk[], int Nr,
118 	const uint32_t pt[4], uint32_t ct[4]);
119 extern void aes_decrypt_intel(const uint32_t rk[], int Nr,
120 	const uint32_t ct[4], uint32_t pt[4]);
121 
122 static int intel_aes_instructions_present(void);
123 
124 #define	AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d, e)
125 #define	AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d, e)
126 
127 #else /* Generic C implementation */
128 
129 #define	AES_ENCRYPT_IMPL(a, b, c, d, e)	rijndael_encrypt(a, b, c, d)
130 #define	AES_DECRYPT_IMPL(a, b, c, d, e)	rijndael_decrypt(a, b, c, d)
131 #define	rijndael_key_setup_enc_raw	rijndael_key_setup_enc
132 #endif	/* sun4u || __amd64 */
133 
134 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
135 #define	AES_BYTE_SWAP
136 #endif
137 
138 
139 #if !defined(__amd64)
140 /*
141  *  Constant tables
142  */
143 
144 /*
145  * Te0[x] = S [x].[02, 01, 01, 03];
146  * Te1[x] = S [x].[03, 02, 01, 01];
147  * Te2[x] = S [x].[01, 03, 02, 01];
148  * Te3[x] = S [x].[01, 01, 03, 02];
149  * Te4[x] = S [x].[01, 01, 01, 01];
150  *
151  * Td0[x] = Si[x].[0e, 09, 0d, 0b];
152  * Td1[x] = Si[x].[0b, 0e, 09, 0d];
153  * Td2[x] = Si[x].[0d, 0b, 0e, 09];
154  * Td3[x] = Si[x].[09, 0d, 0b, 0e];
155  * Td4[x] = Si[x].[01, 01, 01, 01];
156  */
157 
158 /* Encrypt Sbox constants (for the substitute bytes operation) */
159 
160 #ifndef sun4u
161 
162 static const uint32_t Te0[256] =
163 {
164 	0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
165 	0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
166 	0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
167 	0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
168 	0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
169 	0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
170 	0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
171 	0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
172 	0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
173 	0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
174 	0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
175 	0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
176 	0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
177 	0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
178 	0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
179 	0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
180 	0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
181 	0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
182 	0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
183 	0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
184 	0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
185 	0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
186 	0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
187 	0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
188 	0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
189 	0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
190 	0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
191 	0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
192 	0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
193 	0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
194 	0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
195 	0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
196 	0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
197 	0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
198 	0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
199 	0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
200 	0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
201 	0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
202 	0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
203 	0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
204 	0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
205 	0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
206 	0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
207 	0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
208 	0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
209 	0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
210 	0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
211 	0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
212 	0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
213 	0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
214 	0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
215 	0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
216 	0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
217 	0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
218 	0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
219 	0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
220 	0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
221 	0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
222 	0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
223 	0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
224 	0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
225 	0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
226 	0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
227 	0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
228 };
229 
230 
231 static const uint32_t Te1[256] =
232 {
233 	0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
234 	0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
235 	0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
236 	0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
237 	0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
238 	0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
239 	0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
240 	0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
241 	0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
242 	0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
243 	0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
244 	0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
245 	0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
246 	0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
247 	0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
248 	0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
249 	0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
250 	0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
251 	0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
252 	0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
253 	0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
254 	0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
255 	0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
256 	0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
257 	0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
258 	0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
259 	0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
260 	0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
261 	0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
262 	0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
263 	0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
264 	0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
265 	0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
266 	0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
267 	0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
268 	0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
269 	0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
270 	0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
271 	0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
272 	0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
273 	0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
274 	0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
275 	0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
276 	0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
277 	0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
278 	0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
279 	0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
280 	0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
281 	0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
282 	0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
283 	0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
284 	0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
285 	0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
286 	0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
287 	0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
288 	0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
289 	0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
290 	0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
291 	0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
292 	0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
293 	0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
294 	0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
295 	0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
296 	0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
297 };
298 
299 
300 static const uint32_t Te2[256] =
301 {
302 	0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
303 	0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
304 	0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
305 	0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
306 	0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
307 	0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
308 	0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
309 	0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
310 	0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
311 	0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
312 	0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
313 	0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
314 	0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
315 	0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
316 	0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
317 	0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
318 	0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
319 	0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
320 	0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
321 	0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
322 	0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
323 	0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
324 	0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
325 	0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
326 	0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
327 	0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
328 	0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
329 	0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
330 	0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
331 	0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
332 	0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
333 	0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
334 	0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
335 	0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
336 	0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
337 	0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
338 	0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
339 	0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
340 	0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
341 	0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
342 	0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
343 	0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
344 	0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
345 	0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
346 	0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
347 	0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
348 	0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
349 	0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
350 	0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
351 	0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
352 	0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
353 	0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
354 	0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
355 	0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
356 	0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
357 	0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
358 	0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
359 	0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
360 	0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
361 	0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
362 	0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
363 	0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
364 	0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
365 	0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
366 };
367 
368 
369 static const uint32_t Te3[256] =
370 {
371 	0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
372 	0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
373 	0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
374 	0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
375 	0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
376 	0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
377 	0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
378 	0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
379 	0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
380 	0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
381 	0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
382 	0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
383 	0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
384 	0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
385 	0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
386 	0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
387 	0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
388 	0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
389 	0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
390 	0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
391 	0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
392 	0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
393 	0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
394 	0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
395 	0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
396 	0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
397 	0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
398 	0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
399 	0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
400 	0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
401 	0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
402 	0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
403 	0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
404 	0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
405 	0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
406 	0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
407 	0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
408 	0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
409 	0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
410 	0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
411 	0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
412 	0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
413 	0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
414 	0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
415 	0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
416 	0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
417 	0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
418 	0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
419 	0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
420 	0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
421 	0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
422 	0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
423 	0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
424 	0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
425 	0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
426 	0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
427 	0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
428 	0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
429 	0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
430 	0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
431 	0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
432 	0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
433 	0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
434 	0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
435 };
436 
437 #endif /* !sun4u */
438 
439 static const uint32_t Te4[256] =
440 {
441 	0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
442 	0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
443 	0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
444 	0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
445 	0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
446 	0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
447 	0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
448 	0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
449 	0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
450 	0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
451 	0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
452 	0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
453 	0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
454 	0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
455 	0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
456 	0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
457 	0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
458 	0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
459 	0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
460 	0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
461 	0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
462 	0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
463 	0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
464 	0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
465 	0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
466 	0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
467 	0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
468 	0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
469 	0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
470 	0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
471 	0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
472 	0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
473 	0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
474 	0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
475 	0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
476 	0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
477 	0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
478 	0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
479 	0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
480 	0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
481 	0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
482 	0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
483 	0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
484 	0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
485 	0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
486 	0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
487 	0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
488 	0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
489 	0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
490 	0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
491 	0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
492 	0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
493 	0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
494 	0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
495 	0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
496 	0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
497 	0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
498 	0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
499 	0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
500 	0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
501 	0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
502 	0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
503 	0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
504 	0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
505 };
506 
507 /* Decrypt Sbox constants (for the substitute bytes operation) */
508 
509 static const uint32_t Td0[256] =
510 {
511 	0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
512 	0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
513 	0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
514 	0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
515 	0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
516 	0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
517 	0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
518 	0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
519 	0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
520 	0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
521 	0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
522 	0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
523 	0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
524 	0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
525 	0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
526 	0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
527 	0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
528 	0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
529 	0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
530 	0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
531 	0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
532 	0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
533 	0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
534 	0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
535 	0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
536 	0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
537 	0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
538 	0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
539 	0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
540 	0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
541 	0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
542 	0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
543 	0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
544 	0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
545 	0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
546 	0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
547 	0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
548 	0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
549 	0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
550 	0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
551 	0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
552 	0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
553 	0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
554 	0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
555 	0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
556 	0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
557 	0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
558 	0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
559 	0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
560 	0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
561 	0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
562 	0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
563 	0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
564 	0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
565 	0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
566 	0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
567 	0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
568 	0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
569 	0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
570 	0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
571 	0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
572 	0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
573 	0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
574 	0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
575 };
576 
577 static const uint32_t Td1[256] =
578 {
579 	0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
580 	0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
581 	0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
582 	0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
583 	0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
584 	0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
585 	0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
586 	0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
587 	0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
588 	0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
589 	0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
590 	0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
591 	0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
592 	0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
593 	0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
594 	0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
595 	0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
596 	0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
597 	0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
598 	0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
599 	0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
600 	0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
601 	0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
602 	0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
603 	0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
604 	0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
605 	0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
606 	0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
607 	0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
608 	0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
609 	0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
610 	0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
611 	0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
612 	0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
613 	0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
614 	0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
615 	0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
616 	0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
617 	0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
618 	0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
619 	0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
620 	0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
621 	0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
622 	0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
623 	0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
624 	0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
625 	0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
626 	0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
627 	0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
628 	0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
629 	0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
630 	0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
631 	0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
632 	0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
633 	0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
634 	0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
635 	0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
636 	0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
637 	0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
638 	0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
639 	0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
640 	0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
641 	0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
642 	0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
643 };
644 
645 static const uint32_t Td2[256] =
646 {
647 	0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
648 	0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
649 	0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
650 	0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
651 	0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
652 	0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
653 	0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
654 	0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
655 	0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
656 	0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
657 	0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
658 	0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
659 	0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
660 	0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
661 	0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
662 	0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
663 	0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
664 	0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
665 	0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
666 	0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
667 	0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
668 	0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
669 	0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
670 	0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
671 	0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
672 	0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
673 	0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
674 	0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
675 	0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
676 	0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
677 	0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
678 	0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
679 	0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
680 	0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
681 	0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
682 	0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
683 	0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
684 	0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
685 	0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
686 	0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
687 	0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
688 	0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
689 	0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
690 	0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
691 	0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
692 	0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
693 	0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
694 	0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
695 	0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
696 	0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
697 	0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
698 	0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
699 	0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
700 	0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
701 	0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
702 	0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
703 	0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
704 	0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
705 	0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
706 	0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
707 	0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
708 	0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
709 	0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
710 	0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
711 };
712 
713 static const uint32_t Td3[256] =
714 {
715 	0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
716 	0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
717 	0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
718 	0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
719 	0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
720 	0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
721 	0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
722 	0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
723 	0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
724 	0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
725 	0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
726 	0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
727 	0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
728 	0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
729 	0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
730 	0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
731 	0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
732 	0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
733 	0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
734 	0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
735 	0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
736 	0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
737 	0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
738 	0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
739 	0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
740 	0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
741 	0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
742 	0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
743 	0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
744 	0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
745 	0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
746 	0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
747 	0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
748 	0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
749 	0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
750 	0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
751 	0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
752 	0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
753 	0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
754 	0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
755 	0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
756 	0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
757 	0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
758 	0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
759 	0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
760 	0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
761 	0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
762 	0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
763 	0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
764 	0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
765 	0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
766 	0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
767 	0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
768 	0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
769 	0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
770 	0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
771 	0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
772 	0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
773 	0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
774 	0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
775 	0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
776 	0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
777 	0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
778 	0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
779 };
780 
781 #ifndef sun4u
782 
783 static const uint32_t Td4[256] =
784 {
785 	0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
786 	0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
787 	0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
788 	0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
789 	0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
790 	0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
791 	0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
792 	0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
793 	0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
794 	0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
795 	0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
796 	0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
797 	0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
798 	0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
799 	0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
800 	0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
801 	0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
802 	0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
803 	0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
804 	0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
805 	0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
806 	0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
807 	0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
808 	0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
809 	0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
810 	0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
811 	0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
812 	0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
813 	0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
814 	0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
815 	0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
816 	0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
817 	0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
818 	0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
819 	0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
820 	0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
821 	0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
822 	0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
823 	0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
824 	0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
825 	0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
826 	0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
827 	0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
828 	0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
829 	0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
830 	0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
831 	0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
832 	0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
833 	0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
834 	0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
835 	0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
836 	0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
837 	0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
838 	0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
839 	0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
840 	0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
841 	0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
842 	0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
843 	0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
844 	0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
845 	0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
846 	0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
847 	0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
848 	0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
849 };
850 
851 #endif /* !sun4u */
852 
853 /* Rcon is Round Constant; used for encryption key expansion */
854 static const uint32_t rcon[RC_LENGTH] =
855 {
856 	/* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
857 	0x01000000, 0x02000000, 0x04000000, 0x08000000,
858 	0x10000000, 0x20000000, 0x40000000, 0x80000000,
859 	0x1B000000, 0x36000000
860 };
861 
862 
863 /*
864  * Expand the cipher key into the encryption key schedule.
865  *
866  * Return the number of rounds for the given cipher key size.
867  * The size of the key schedule depends on the number of rounds
868  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
869  *
870  * Parameters:
871  * rk		AES key schedule 32-bit array to be initialized
872  * cipherKey	User key
873  * keyBits	AES key size (128, 192, or 256 bits)
874  */
875 static int
876 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
877     int keyBits)
878 {
879 	int		i = 0;
880 	uint32_t	temp;
881 
882 	rk[0] = cipherKey[0];
883 	rk[1] = cipherKey[1];
884 	rk[2] = cipherKey[2];
885 	rk[3] = cipherKey[3];
886 
887 	if (keyBits == 128) {
888 		for (;;) {
889 			temp  = rk[3];
890 			rk[4] = rk[0] ^
891 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
892 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
893 			    (Te4[temp & 0xff] & 0x0000ff00) ^
894 			    (Te4[temp >> 24] & 0x000000ff) ^
895 			    rcon[i];
896 			rk[5] = rk[1] ^ rk[4];
897 			rk[6] = rk[2] ^ rk[5];
898 			rk[7] = rk[3] ^ rk[6];
899 
900 			if (++i == 10) {
901 				return (10);
902 			}
903 			rk += 4;
904 		}
905 	}
906 
907 	rk[4] = cipherKey[4];
908 	rk[5] = cipherKey[5];
909 
910 	if (keyBits == 192) {
911 		for (;;) {
912 			temp = rk[5];
913 			rk[6] = rk[0] ^
914 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
915 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
916 			    (Te4[temp & 0xff] & 0x0000ff00) ^
917 			    (Te4[temp >> 24] & 0x000000ff) ^
918 			    rcon[i];
919 			rk[7] = rk[1] ^ rk[6];
920 			rk[8] = rk[2] ^ rk[7];
921 			rk[9] = rk[3] ^ rk[8];
922 
923 			if (++i == 8) {
924 				return (12);
925 			}
926 
927 			rk[10] = rk[4] ^ rk[9];
928 			rk[11] = rk[5] ^ rk[10];
929 			rk += 6;
930 		}
931 	}
932 
933 	rk[6] = cipherKey[6];
934 	rk[7] = cipherKey[7];
935 
936 	if (keyBits == 256) {
937 		for (;;) {
938 			temp = rk[7];
939 			rk[8] = rk[0] ^
940 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
941 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
942 			    (Te4[temp & 0xff] & 0x0000ff00) ^
943 			    (Te4[temp >> 24] & 0x000000ff) ^
944 			    rcon[i];
945 			rk[9] = rk[1] ^ rk[8];
946 			rk[10] = rk[2] ^ rk[9];
947 			rk[11] = rk[3] ^ rk[10];
948 
949 			if (++i == 7) {
950 				return (14);
951 			}
952 			temp = rk[11];
953 			rk[12] = rk[4] ^
954 			    (Te4[temp >> 24] & 0xff000000) ^
955 			    (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
956 			    (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
957 			    (Te4[temp & 0xff] & 0x000000ff);
958 			rk[13] = rk[5] ^ rk[12];
959 			rk[14] = rk[6] ^ rk[13];
960 			rk[15] = rk[7] ^ rk[14];
961 
962 			rk += 8;
963 		}
964 	}
965 
966 	return (0);
967 }
968 #endif	/* !__amd64 */
969 
970 
971 #ifdef	sun4u
972 
973 /*
974  * Expand the cipher key into the encryption key schedule.
975  * by the sun4u optimized assembly implementation.
976  *
977  * Return the number of rounds for the given cipher key size.
978  * The size of the key schedule depends on the number of rounds
979  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
980  *
981  * Parameters:
982  * rk		AES key schedule 64-bit array to be initialized
983  * cipherKey	User key
984  * keyBits	AES key size (128, 192, or 256 bits)
985  */
986 static int
987 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
988 {
989 	uint32_t	rk1[4 * (MAX_AES_NR + 1)];
990 	uint64_t	*rk64 = (uint64_t *)rk;
991 	uint32_t	*rkt;
992 	uint64_t	t;
993 	int		i, Nr;
994 
995 	Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
996 
997 	for (i = 0; i < 4 * Nr; i++) {
998 		t = (uint64_t)(rk1[i]);
999 		rk64[i] = ((t & 0xff000000) << 11) |
1000 		    ((t & 0xff0000) << 8) |
1001 		    ((t & 0xffff) << 3);
1002 	}
1003 
1004 	rkt = (uint32_t *)(&(rk64[4 * Nr]));
1005 
1006 	for (i = 0; i < 4; i++) {
1007 		rkt[i] = rk1[4 * Nr+i];
1008 	}
1009 
1010 	return (Nr);
1011 }
1012 
1013 
1014 /*
1015  * Expand the cipher key into the decryption key schedule as used
1016  * by the sun4u optimized assembly implementation.
1017  *
1018  * Return the number of rounds for the given cipher key size.
1019  * The size of the key schedule depends on the number of rounds
1020  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1021  *
1022  * Parameters:
1023  * rk		AES key schedule 32-bit array to be initialized
1024  * cipherKey	User key
1025  * keyBits	AES key size (128, 192, or 256 bits)
1026  */
1027 static int
1028 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
1029     int keyBits)
1030 {
1031 	int		Nr, i;
1032 	uint32_t	temp;
1033 
1034 	/* expand the cipher key: */
1035 	Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1036 
1037 	/* invert the order of the round keys: */
1038 
1039 	for (i = 0; i < 2 * Nr + 2; i++) {
1040 		temp = rk[i];
1041 		rk[i] = rk[4 * Nr - i + 3];
1042 		rk[4 * Nr - i + 3] = temp;
1043 	}
1044 
1045 	/*
1046 	 * apply the inverse MixColumn transform to all
1047 	 * round keys but the first and the last:
1048 	 */
1049 	for (i = 1; i < Nr; i++) {
1050 		rk += 4;
1051 		rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1052 		    Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1053 		    Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1054 		    Td3[Te4[rk[0] & 0xff] & 0xff];
1055 		rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1056 		    Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1057 		    Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1058 		    Td3[Te4[rk[1] & 0xff] & 0xff];
1059 		rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1060 		    Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1061 		    Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1062 		    Td3[Te4[rk[2] & 0xff] & 0xff];
1063 		rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1064 		    Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1065 		    Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1066 		    Td3[Te4[rk[3] & 0xff] & 0xff];
1067 	}
1068 
1069 	return (Nr);
1070 }
1071 
1072 
1073 /*
1074  * The size of the key schedule depends on the number of rounds
1075  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1076  *
1077  * Parameters:
1078  * rk		AES key schedule 64-bit array to be initialized
1079  * cipherKey	User key
1080  * keyBits	AES key size (128, 192, or 256 bits)
1081  */
1082 static int
1083 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
1084 {
1085 	uint32_t	rk1[4 * (MAX_AES_NR + 1)];
1086 	uint64_t	*rk64 = (uint64_t *)rk;
1087 	uint32_t	*rkt;
1088 	uint64_t	t;
1089 	int		i, Nr;
1090 
1091 	Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
1092 	for (i = 0; i < 4 * Nr; i++) {
1093 		t = (uint64_t)(rk1[i]);
1094 		rk64[i] = ((t & 0xff000000) << 11) |
1095 		    ((t & 0xff0000) << 8) |
1096 		    ((t & 0xffff) << 3);
1097 	}
1098 
1099 	rkt = (uint32_t *)(&(rk64[4 * Nr]));
1100 
1101 	for (i = 0; i < 4; i++) {
1102 		rkt[i] = rk1[4 * Nr + i];
1103 	}
1104 
1105 	return (Nr);
1106 }
1107 
1108 
1109 /*
1110  * Expand the 64-bit AES cipher key array into the encryption and decryption
1111  * key schedules.
1112  *
1113  * Parameters:
1114  * key		AES key schedule to be initialized
1115  * keyarr32	User key
1116  * keyBits	AES key size (128, 192, or 256 bits)
1117  */
1118 static void
1119 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1120 {
1121 	key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1122 	    keybits);
1123 	key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1124 	    keybits);
1125 	key->type = AES_64BIT_KS;
1126 }
1127 
1128 
1129 #elif defined(__amd64)
1130 
1131 /*
1132  * Expand the 32-bit AES cipher key array into the encryption and decryption
1133  * key schedules.
1134  *
1135  * Parameters:
1136  * key		AES key schedule to be initialized
1137  * keyarr32	User key
1138  * keyBits	AES key size (128, 192, or 256 bits)
1139  */
1140 static void
1141 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1142 {
1143 	if (intel_aes_instructions_present()) {
1144 		key->flags = INTEL_AES_NI_CAPABLE;
1145 		KPREEMPT_DISABLE;
1146 		key->nr = rijndael_key_setup_enc_intel(&(key->encr_ks.ks32[0]),
1147 		    keyarr32, keybits);
1148 		key->nr = rijndael_key_setup_dec_intel(&(key->decr_ks.ks32[0]),
1149 		    keyarr32, keybits);
1150 		KPREEMPT_ENABLE;
1151 	} else {
1152 		key->flags = 0;
1153 		key->nr = rijndael_key_setup_enc_amd64(&(key->encr_ks.ks32[0]),
1154 		    keyarr32, keybits);
1155 		key->nr = rijndael_key_setup_dec_amd64(&(key->decr_ks.ks32[0]),
1156 		    keyarr32, keybits);
1157 	}
1158 
1159 	key->type = AES_32BIT_KS;
1160 }
1161 
1162 /*
1163  * Encrypt one block of data. The block is assumed to be an array
1164  * of four uint32_t values, so copy for alignment (and byte-order
1165  * reversal for little endian systems might be necessary on the
1166  * input and output byte streams.
1167  * The size of the key schedule depends on the number of rounds
1168  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1169  *
1170  * Parameters:
1171  * rk		Key schedule, of aes_ks_t (60 32-bit integers)
1172  * Nr		Number of rounds
1173  * pt		Input block (plain text)
1174  * ct		Output block (crypto text).  Can overlap with pt
1175  * flags	Indicates whether we're on Intel AES-NI-capable hardware
1176  */
1177 static void
1178 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1179     uint32_t ct[4], int flags) {
1180 	if (flags & INTEL_AES_NI_CAPABLE) {
1181 		KPREEMPT_DISABLE;
1182 		aes_encrypt_intel(rk, Nr, pt, ct);
1183 		KPREEMPT_ENABLE;
1184 	} else {
1185 		aes_encrypt_amd64(rk, Nr, pt, ct);
1186 	}
1187 }
1188 
1189 /*
1190  * Decrypt one block of data. The block is assumed to be an array
1191  * of four uint32_t values, so copy for alignment (and byte-order
1192  * reversal for little endian systems might be necessary on the
1193  * input and output byte streams.
1194  * The size of the key schedule depends on the number of rounds
1195  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1196  *
1197  * Parameters:
1198  * rk		Key schedule, of aes_ks_t (60 32-bit integers)
1199  * Nr		Number of rounds
1200  * ct		Input block (crypto text)
1201  * pt		Output block (plain text). Can overlap with pt
1202  * flags	Indicates whether we're on Intel AES-NI-capable hardware
1203  */
1204 static void
1205 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1206     uint32_t pt[4], int flags) {
1207 	if (flags & INTEL_AES_NI_CAPABLE) {
1208 		KPREEMPT_DISABLE;
1209 		aes_decrypt_intel(rk, Nr, ct, pt);
1210 		KPREEMPT_ENABLE;
1211 	} else {
1212 		aes_decrypt_amd64(rk, Nr, ct, pt);
1213 	}
1214 }
1215 
1216 
1217 #else /* generic C implementation */
1218 
1219 /*
1220  *  Expand the cipher key into the decryption key schedule.
1221  *  Return the number of rounds for the given cipher key size.
1222  *  The size of the key schedule depends on the number of rounds
1223  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1224  *
1225  * Parameters:
1226  * rk		AES key schedule 32-bit array to be initialized
1227  * cipherKey	User key
1228  * keyBits	AES key size (128, 192, or 256 bits)
1229  */
1230 static int
1231 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1232 {
1233 	int	 Nr, i, j;
1234 	uint32_t temp;
1235 
1236 	/* expand the cipher key: */
1237 	Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1238 
1239 	/* invert the order of the round keys: */
1240 	for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1241 		temp = rk[i];
1242 		rk[i] = rk[j];
1243 		rk[j] = temp;
1244 		temp = rk[i + 1];
1245 		rk[i + 1] = rk[j + 1];
1246 		rk[j + 1] = temp;
1247 		temp = rk[i + 2];
1248 		rk[i + 2] = rk[j + 2];
1249 		rk[j + 2] = temp;
1250 		temp = rk[i + 3];
1251 		rk[i + 3] = rk[j + 3];
1252 		rk[j + 3] = temp;
1253 	}
1254 
1255 	/*
1256 	 * apply the inverse MixColumn transform to all
1257 	 * round keys but the first and the last:
1258 	 */
1259 	for (i = 1; i < Nr; i++) {
1260 		rk += 4;
1261 		rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1262 		    Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1263 		    Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1264 		    Td3[Te4[rk[0] & 0xff] & 0xff];
1265 		rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1266 		    Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1267 		    Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1268 		    Td3[Te4[rk[1] & 0xff] & 0xff];
1269 		rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1270 		    Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1271 		    Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1272 		    Td3[Te4[rk[2] & 0xff] & 0xff];
1273 		rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1274 		    Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1275 		    Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1276 		    Td3[Te4[rk[3] & 0xff] & 0xff];
1277 	}
1278 
1279 	return (Nr);
1280 }
1281 
1282 
1283 /*
1284  * Expand the 32-bit AES cipher key array into the encryption and decryption
1285  * key schedules.
1286  *
1287  * Parameters:
1288  * key		AES key schedule to be initialized
1289  * keyarr32	User key
1290  * keyBits	AES key size (128, 192, or 256 bits)
1291  */
1292 static void
1293 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1294 {
1295 	key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1296 	    keybits);
1297 	key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1298 	    keybits);
1299 	key->type = AES_32BIT_KS;
1300 }
1301 
1302 
1303 /*
1304  * Encrypt one block of data. The block is assumed to be an array
1305  * of four uint32_t values, so copy for alignment (and byte-order
1306  * reversal for little endian systems might be necessary on the
1307  * input and output byte streams.
1308  * The size of the key schedule depends on the number of rounds
1309  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1310  *
1311  * Parameters:
1312  * rk	Key schedule, of aes_ks_t (60 32-bit integers)
1313  * Nr	Number of rounds
1314  * pt	Input block (plain text)
1315  * ct	Output block (crypto text).  Can overlap with pt
1316  */
1317 static void
1318 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1319     uint32_t ct[4])
1320 {
1321 	uint32_t	s0, s1, s2, s3, t0, t1, t2, t3;
1322 	int		r;
1323 
1324 	/*
1325 	 * map byte array block to cipher state
1326 	 * and add initial round key:
1327 	 */
1328 
1329 	s0 = pt[0] ^ rk[0];
1330 	s1 = pt[1] ^ rk[1];
1331 	s2 = pt[2] ^ rk[2];
1332 	s3 = pt[3] ^ rk[3];
1333 
1334 	/*
1335 	 * Nr - 1 full rounds:
1336 	 */
1337 
1338 	r = Nr >> 1;
1339 
1340 	for (;;) {
1341 		t0 = Te0[s0 >> 24] ^
1342 		    Te1[(s1 >> 16) & 0xff] ^
1343 		    Te2[(s2 >>  8) & 0xff] ^
1344 		    Te3[s3 & 0xff] ^
1345 		    rk[4];
1346 
1347 		t1 = Te0[s1 >> 24] ^
1348 		    Te1[(s2 >> 16) & 0xff] ^
1349 		    Te2[(s3 >>  8) & 0xff] ^
1350 		    Te3[s0 & 0xff] ^
1351 		    rk[5];
1352 
1353 		t2 = Te0[s2 >> 24] ^
1354 		    Te1[(s3 >> 16) & 0xff] ^
1355 		    Te2[(s0 >>  8) & 0xff] ^
1356 		    Te3[s1 & 0xff] ^
1357 		    rk[6];
1358 
1359 		t3 = Te0[s3 >> 24] ^
1360 		    Te1[(s0 >> 16) & 0xff] ^
1361 		    Te2[(s1 >>  8) & 0xff] ^
1362 		    Te3[s2 & 0xff] ^
1363 		    rk[7];
1364 
1365 		rk += 8;
1366 
1367 		if (--r == 0) {
1368 			break;
1369 		}
1370 
1371 		s0 = Te0[t0 >> 24] ^
1372 		    Te1[(t1 >> 16) & 0xff] ^
1373 		    Te2[(t2 >>  8) & 0xff] ^
1374 		    Te3[t3 & 0xff] ^
1375 		    rk[0];
1376 
1377 		s1 = Te0[t1 >> 24] ^
1378 		    Te1[(t2 >> 16) & 0xff] ^
1379 		    Te2[(t3 >>  8) & 0xff] ^
1380 		    Te3[t0 & 0xff] ^
1381 		    rk[1];
1382 
1383 		s2 = Te0[t2 >> 24] ^
1384 		    Te1[(t3 >> 16) & 0xff] ^
1385 		    Te2[(t0 >>  8) & 0xff] ^
1386 		    Te3[t1 & 0xff] ^
1387 		    rk[2];
1388 
1389 		s3 = Te0[t3 >> 24] ^
1390 		    Te1[(t0 >> 16) & 0xff] ^
1391 		    Te2[(t1 >>  8) & 0xff] ^
1392 		    Te3[t2 & 0xff] ^
1393 		    rk[3];
1394 	}
1395 
1396 	/*
1397 	 * apply last round and
1398 	 * map cipher state to byte array block:
1399 	 */
1400 
1401 	s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1402 	    (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1403 	    (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1404 	    (Te4[t3 & 0xff] & 0x000000ff) ^
1405 	    rk[0];
1406 	ct[0] = s0;
1407 
1408 	s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1409 	    (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1410 	    (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1411 	    (Te4[t0 & 0xff] & 0x000000ff) ^
1412 	    rk[1];
1413 	ct[1] = s1;
1414 
1415 	s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1416 	    (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1417 	    (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1418 	    (Te4[t1 & 0xff] & 0x000000ff) ^
1419 	    rk[2];
1420 	ct[2] = s2;
1421 
1422 	s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1423 	    (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1424 	    (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1425 	    (Te4[t2 & 0xff] & 0x000000ff) ^
1426 	    rk[3];
1427 	ct[3] = s3;
1428 }
1429 
1430 
1431 /*
1432  * Decrypt one block of data. The block is assumed to be an array
1433  * of four uint32_t values, so copy for alignment (and byte-order
1434  * reversal for little endian systems might be necessary on the
1435  * input and output byte streams.
1436  * The size of the key schedule depends on the number of rounds
1437  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1438  *
1439  * Parameters:
1440  * rk	Key schedule, of aes_ks_t (60 32-bit integers)
1441  * Nr	Number of rounds
1442  * ct	Input block (crypto text)
1443  * pt	Output block (plain text). Can overlap with pt
1444  */
1445 static void
1446 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1447     uint32_t pt[4])
1448 {
1449 	uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1450 	int	 r;
1451 
1452 	/*
1453 	 * map byte array block to cipher state
1454 	 * and add initial round key:
1455 	 */
1456 	s0 = ct[0] ^ rk[0];
1457 	s1 = ct[1] ^ rk[1];
1458 	s2 = ct[2] ^ rk[2];
1459 	s3 = ct[3] ^ rk[3];
1460 
1461 	/*
1462 	 * Nr - 1 full rounds:
1463 	 */
1464 
1465 	r = Nr >> 1;
1466 
1467 	for (;;) {
1468 		t0 = Td0[s0 >> 24] ^
1469 		    Td1[(s3 >> 16) & 0xff] ^
1470 		    Td2[(s2 >> 8) & 0xff] ^
1471 		    Td3[s1 & 0xff] ^
1472 		    rk[4];
1473 
1474 		t1 = Td0[s1 >> 24] ^
1475 		    Td1[(s0 >> 16) & 0xff] ^
1476 		    Td2[(s3 >>  8) & 0xff] ^
1477 		    Td3[s2 & 0xff] ^
1478 		    rk[5];
1479 
1480 		t2 = Td0[s2 >> 24] ^
1481 		    Td1[(s1 >> 16) & 0xff] ^
1482 		    Td2[(s0 >>  8) & 0xff] ^
1483 		    Td3[s3 & 0xff] ^
1484 		    rk[6];
1485 
1486 		t3 = Td0[s3 >> 24] ^
1487 		    Td1[(s2 >> 16) & 0xff] ^
1488 		    Td2[(s1 >> 8) & 0xff] ^
1489 		    Td3[s0 & 0xff] ^
1490 		    rk[7];
1491 
1492 		rk += 8;
1493 
1494 		if (--r == 0) {
1495 			break;
1496 		}
1497 
1498 		s0 = Td0[t0 >> 24] ^
1499 		    Td1[(t3 >> 16) & 0xff] ^
1500 		    Td2[(t2 >> 8) & 0xff] ^
1501 		    Td3[t1 & 0xff] ^
1502 		    rk[0];
1503 
1504 		s1 = Td0[t1 >> 24] ^
1505 		    Td1[(t0 >> 16) & 0xff] ^
1506 		    Td2[(t3 >> 8) & 0xff] ^
1507 		    Td3[t2 & 0xff] ^
1508 		    rk[1];
1509 
1510 		s2 = Td0[t2 >> 24] ^
1511 		    Td1[(t1 >> 16) & 0xff] ^
1512 		    Td2[(t0 >> 8) & 0xff] ^
1513 		    Td3[t3 & 0xff] ^
1514 		    rk[2];
1515 
1516 		s3 = Td0[t3 >> 24] ^
1517 		    Td1[(t2 >> 16) & 0xff] ^
1518 		    Td2[(t1 >> 8) & 0xff] ^
1519 		    Td3[t0 & 0xff] ^
1520 		    rk[3];
1521 	}
1522 
1523 	/*
1524 	 * apply last round and
1525 	 * map cipher state to byte array block:
1526 	 */
1527 
1528 	s0 = (Td4[t0 >> 24] & 0xff000000) ^
1529 	    (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1530 	    (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1531 	    (Td4[t1 & 0xff] & 0x000000ff) ^
1532 	    rk[0];
1533 	pt[0] = s0;
1534 
1535 	s1 = (Td4[t1 >> 24] & 0xff000000) ^
1536 	    (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1537 	    (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1538 	    (Td4[t2 & 0xff] & 0x000000ff) ^
1539 	    rk[1];
1540 	pt[1] = s1;
1541 
1542 	s2 = (Td4[t2 >> 24] & 0xff000000) ^
1543 	    (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1544 	    (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1545 	    (Td4[t3 & 0xff] & 0x000000ff) ^
1546 	    rk[2];
1547 	pt[2] = s2;
1548 
1549 	s3 = (Td4[t3 >> 24] & 0xff000000) ^
1550 	    (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1551 	    (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1552 	    (Td4[t0 & 0xff] & 0x000000ff) ^
1553 	    rk[3];
1554 	pt[3] = s3;
1555 }
1556 #endif	/* sun4u, __amd64 */
1557 
1558 
1559 /*
1560  * Initialize AES encryption and decryption key schedules.
1561  *
1562  * Parameters:
1563  * cipherKey	User key
1564  * keyBits	AES key size (128, 192, or 256 bits)
1565  * keysched	AES key schedule to be initialized, of type aes_key_t.
1566  *		Allocated by aes_alloc_keysched().
1567  */
1568 void
1569 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1570 {
1571 	aes_key_t	*newbie = keysched;
1572 	uint_t		keysize, i, j;
1573 	union {
1574 		uint64_t	ka64[4];
1575 		uint32_t	ka32[8];
1576 		} keyarr;
1577 
1578 	switch (keyBits) {
1579 	case 128:
1580 		newbie->nr = 10;
1581 		break;
1582 
1583 	case 192:
1584 		newbie->nr = 12;
1585 		break;
1586 
1587 	case 256:
1588 		newbie->nr = 14;
1589 		break;
1590 
1591 	default:
1592 		/* should never get here */
1593 		return;
1594 	}
1595 	keysize = CRYPTO_BITS2BYTES(keyBits);
1596 
1597 	/*
1598 	 * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1599 	 * 4 bytes in the key.  On _BIG_ENDIAN and AMD64, copy the key
1600 	 * without reversing bytes.
1601 	 * For AMD64, do not byte swap for aes_setupkeys().
1602 	 *
1603 	 * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1604 	 * X86/AMD64  uses a key schedule array with 32-bit elements.
1605 	 */
1606 #ifndef	AES_BYTE_SWAP
1607 	if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1608 		for (i = 0, j = 0; j < keysize; i++, j += 8) {
1609 			/* LINTED: pointer alignment */
1610 			keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1611 		}
1612 	} else {
1613 		bcopy(cipherKey, keyarr.ka32, keysize);
1614 	}
1615 
1616 #else	/* byte swap */
1617 	for (i = 0, j = 0; j < keysize; i++, j += 4) {
1618 		keyarr.ka32[i] = htonl(*(uint32_t *)(void *)&cipherKey[j]);
1619 	}
1620 #endif
1621 
1622 	aes_setupkeys(newbie, keyarr.ka32, keyBits);
1623 }
1624 
1625 
1626 /*
1627  * Encrypt one block using AES.
1628  * Align if needed and (for x86 32-bit only) byte-swap.
1629  *
1630  * Parameters:
1631  * ks	Key schedule, of type aes_key_t
1632  * pt	Input block (plain text)
1633  * ct	Output block (crypto text).  Can overlap with pt
1634  */
1635 int
1636 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1637 {
1638 	aes_key_t	*ksch = (aes_key_t *)ks;
1639 
1640 #ifndef	AES_BYTE_SWAP
1641 	if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1642 		/* LINTED:  pointer alignment */
1643 		AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1644 		    /* LINTED:  pointer alignment */
1645 		    (uint32_t *)pt, (uint32_t *)ct, ksch->flags);
1646 	} else {
1647 #endif
1648 		uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1649 
1650 		/* Copy input block into buffer */
1651 #ifndef	AES_BYTE_SWAP
1652 		bcopy(pt, &buffer, AES_BLOCK_LEN);
1653 
1654 #else	/* byte swap */
1655 		buffer[0] = htonl(*(uint32_t *)(void *)&pt[0]);
1656 		buffer[1] = htonl(*(uint32_t *)(void *)&pt[4]);
1657 		buffer[2] = htonl(*(uint32_t *)(void *)&pt[8]);
1658 		buffer[3] = htonl(*(uint32_t *)(void *)&pt[12]);
1659 #endif
1660 
1661 		AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1662 		    buffer, buffer, ksch->flags);
1663 
1664 		/* Copy result from buffer to output block */
1665 #ifndef	AES_BYTE_SWAP
1666 		bcopy(&buffer, ct, AES_BLOCK_LEN);
1667 	}
1668 
1669 #else	/* byte swap */
1670 		*(uint32_t *)(void *)&ct[0] = htonl(buffer[0]);
1671 		*(uint32_t *)(void *)&ct[4] = htonl(buffer[1]);
1672 		*(uint32_t *)(void *)&ct[8] = htonl(buffer[2]);
1673 		*(uint32_t *)(void *)&ct[12] = htonl(buffer[3]);
1674 #endif
1675 	return (CRYPTO_SUCCESS);
1676 }
1677 
1678 
1679 /*
1680  * Decrypt one block using AES.
1681  * Align and byte-swap if needed.
1682  *
1683  * Parameters:
1684  * ks	Key schedule, of type aes_key_t
1685  * ct	Input block (crypto text)
1686  * pt	Output block (plain text). Can overlap with pt
1687  */
1688 int
1689 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1690 {
1691 	aes_key_t	*ksch = (aes_key_t *)ks;
1692 
1693 #ifndef	AES_BYTE_SWAP
1694 	if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1695 		/* LINTED:  pointer alignment */
1696 		AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1697 		    /* LINTED:  pointer alignment */
1698 		    (uint32_t *)ct, (uint32_t *)pt, ksch->flags);
1699 	} else {
1700 #endif
1701 		uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1702 
1703 		/* Copy input block into buffer */
1704 #ifndef	AES_BYTE_SWAP
1705 		bcopy(ct, &buffer, AES_BLOCK_LEN);
1706 
1707 #else	/* byte swap */
1708 		buffer[0] = htonl(*(uint32_t *)(void *)&ct[0]);
1709 		buffer[1] = htonl(*(uint32_t *)(void *)&ct[4]);
1710 		buffer[2] = htonl(*(uint32_t *)(void *)&ct[8]);
1711 		buffer[3] = htonl(*(uint32_t *)(void *)&ct[12]);
1712 #endif
1713 
1714 		AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1715 		    buffer, buffer, ksch->flags);
1716 
1717 		/* Copy result from buffer to output block */
1718 #ifndef	AES_BYTE_SWAP
1719 		bcopy(&buffer, pt, AES_BLOCK_LEN);
1720 	}
1721 
1722 #else	/* byte swap */
1723 	*(uint32_t *)(void *)&pt[0] = htonl(buffer[0]);
1724 	*(uint32_t *)(void *)&pt[4] = htonl(buffer[1]);
1725 	*(uint32_t *)(void *)&pt[8] = htonl(buffer[2]);
1726 	*(uint32_t *)(void *)&pt[12] = htonl(buffer[3]);
1727 #endif
1728 
1729 	return (CRYPTO_SUCCESS);
1730 }
1731 
1732 
1733 /*
1734  * Allocate key schedule for AES.
1735  *
1736  * Return the pointer and set size to the number of bytes allocated.
1737  * Memory allocated must be freed by the caller when done.
1738  *
1739  * Parameters:
1740  * size		Size of key schedule allocated, in bytes
1741  * kmflag	Flag passed to kmem_alloc(9F); ignored in userland.
1742  */
1743 /* ARGSUSED */
1744 void *
1745 aes_alloc_keysched(size_t *size, int kmflag)
1746 {
1747 	aes_key_t *keysched;
1748 
1749 #ifdef	_KERNEL
1750 	keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1751 #else	/* !_KERNEL */
1752 	keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1753 #endif	/* _KERNEL */
1754 
1755 	if (keysched != NULL) {
1756 		*size = sizeof (aes_key_t);
1757 		return (keysched);
1758 	}
1759 	return (NULL);
1760 }
1761 
1762 
1763 #ifdef __amd64
1764 /*
1765  * Return 1 if executing on Intel with AES-NI instructions,
1766  * otherwise 0 (i.e., Intel without AES-NI or AMD64).
1767  * Cache the result, as the CPU can't change.
1768  *
1769  * Note: the userland version uses getisax().  The kernel version uses
1770  * global variable x86_featureset.
1771  */
1772 static int
1773 intel_aes_instructions_present(void)
1774 {
1775 	static int	cached_result = -1;
1776 
1777 	if (cached_result == -1) { /* first time */
1778 #ifdef _KERNEL
1779 		cached_result = is_x86_feature(x86_featureset, X86FSET_AES);
1780 #else
1781 		uint_t		ui = 0;
1782 
1783 		(void) getisax(&ui, 1);
1784 		cached_result = (ui & AV_386_AES) != 0;
1785 #endif	/* _KERNEL */
1786 	}
1787 
1788 	return (cached_result);
1789 }
1790 #endif	/* __amd64 */
1791