1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <sys/types.h> 27 #include <sys/systm.h> 28 #include <sys/ddi.h> 29 #include <sys/sysmacros.h> 30 #include <sys/strsun.h> 31 #include <netinet/in.h> 32 #include <sys/crypto/spi.h> 33 #include <modes/modes.h> 34 #include "aes_impl.h" 35 #ifndef _KERNEL 36 #include <strings.h> 37 #include <stdlib.h> 38 #endif /* !_KERNEL */ 39 40 41 /* 42 * This file is derived from the file rijndael-alg-fst.c taken from the 43 * "optimized C code v3.0" on the "rijndael home page" 44 * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/ 45 * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/ 46 * 47 * The following note is from the original file: 48 */ 49 50 /* 51 * rijndael-alg-fst.c 52 * 53 * @version 3.0 (December 2000) 54 * 55 * Optimised ANSI C code for the Rijndael cipher (now AES) 56 * 57 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> 58 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> 59 * @author Paulo Barreto <paulo.barreto@terra.com.br> 60 * 61 * This code is hereby placed in the public domain. 62 * 63 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS 64 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 65 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 66 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE 67 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 68 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 69 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 70 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 71 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE 72 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, 73 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 74 */ 75 76 /* EXPORT DELETE START */ 77 78 #if defined(sun4u) || defined(__amd64) 79 /* External assembly functions: */ 80 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4], 81 uint32_t ct[4]); 82 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4], 83 uint32_t pt[4]); 84 #define AES_ENCRYPT_IMPL aes_encrypt_impl 85 #define AES_DECRYPT_IMPL aes_decrypt_impl 86 87 #ifdef __amd64 88 extern int rijndael_key_setup_enc(uint32_t rk[], const uint32_t cipherKey[], 89 int keyBits); 90 extern int rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], 91 int keyBits); 92 #endif 93 94 #else 95 #define AES_ENCRYPT_IMPL rijndael_encrypt 96 #define AES_DECRYPT_IMPL rijndael_decrypt 97 #define rijndael_key_setup_enc_raw rijndael_key_setup_enc 98 #endif /* sun4u || __amd64 */ 99 100 #if defined(_LITTLE_ENDIAN) && !defined(__amd64) 101 #define AES_BYTE_SWAP 102 #endif 103 104 105 #if !defined(__amd64) 106 /* 107 * Constant tables 108 */ 109 110 /* 111 * Te0[x] = S [x].[02, 01, 01, 03]; 112 * Te1[x] = S [x].[03, 02, 01, 01]; 113 * Te2[x] = S [x].[01, 03, 02, 01]; 114 * Te3[x] = S [x].[01, 01, 03, 02]; 115 * Te4[x] = S [x].[01, 01, 01, 01]; 116 * 117 * Td0[x] = Si[x].[0e, 09, 0d, 0b]; 118 * Td1[x] = Si[x].[0b, 0e, 09, 0d]; 119 * Td2[x] = Si[x].[0d, 0b, 0e, 09]; 120 * Td3[x] = Si[x].[09, 0d, 0b, 0e]; 121 * Td4[x] = Si[x].[01, 01, 01, 01]; 122 */ 123 124 /* Encrypt Sbox constants (for the substitute bytes operation) */ 125 126 #ifndef sun4u 127 128 static const uint32_t Te0[256] = 129 { 130 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU, 131 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U, 132 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU, 133 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU, 134 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U, 135 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU, 136 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU, 137 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU, 138 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU, 139 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU, 140 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U, 141 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU, 142 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU, 143 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U, 144 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU, 145 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU, 146 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU, 147 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU, 148 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU, 149 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U, 150 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU, 151 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU, 152 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU, 153 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU, 154 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U, 155 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U, 156 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U, 157 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U, 158 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU, 159 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U, 160 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U, 161 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU, 162 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU, 163 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U, 164 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U, 165 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U, 166 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU, 167 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U, 168 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU, 169 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U, 170 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU, 171 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U, 172 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U, 173 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU, 174 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U, 175 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U, 176 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U, 177 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U, 178 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U, 179 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U, 180 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U, 181 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U, 182 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU, 183 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U, 184 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U, 185 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U, 186 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U, 187 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U, 188 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U, 189 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU, 190 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U, 191 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U, 192 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U, 193 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU 194 }; 195 196 197 static const uint32_t Te1[256] = 198 { 199 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU, 200 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U, 201 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU, 202 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U, 203 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU, 204 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U, 205 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU, 206 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U, 207 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U, 208 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU, 209 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U, 210 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U, 211 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U, 212 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU, 213 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U, 214 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U, 215 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU, 216 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U, 217 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U, 218 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U, 219 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU, 220 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU, 221 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U, 222 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU, 223 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU, 224 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U, 225 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU, 226 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U, 227 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU, 228 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U, 229 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U, 230 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U, 231 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU, 232 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U, 233 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU, 234 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U, 235 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU, 236 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U, 237 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U, 238 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU, 239 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU, 240 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU, 241 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U, 242 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U, 243 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU, 244 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U, 245 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU, 246 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U, 247 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU, 248 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U, 249 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU, 250 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU, 251 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U, 252 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU, 253 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U, 254 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU, 255 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U, 256 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U, 257 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U, 258 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU, 259 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU, 260 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U, 261 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU, 262 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U 263 }; 264 265 266 static const uint32_t Te2[256] = 267 { 268 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU, 269 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U, 270 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU, 271 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U, 272 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU, 273 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U, 274 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU, 275 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U, 276 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U, 277 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU, 278 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U, 279 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U, 280 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U, 281 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU, 282 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U, 283 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U, 284 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU, 285 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U, 286 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U, 287 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U, 288 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU, 289 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU, 290 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U, 291 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU, 292 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU, 293 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U, 294 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU, 295 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U, 296 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU, 297 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U, 298 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U, 299 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U, 300 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU, 301 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U, 302 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU, 303 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U, 304 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU, 305 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U, 306 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U, 307 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU, 308 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU, 309 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU, 310 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U, 311 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U, 312 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU, 313 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U, 314 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU, 315 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U, 316 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU, 317 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U, 318 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU, 319 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU, 320 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U, 321 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU, 322 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U, 323 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU, 324 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U, 325 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U, 326 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U, 327 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU, 328 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU, 329 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U, 330 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU, 331 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U 332 }; 333 334 335 static const uint32_t Te3[256] = 336 { 337 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U, 338 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U, 339 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U, 340 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU, 341 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU, 342 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU, 343 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U, 344 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU, 345 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU, 346 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U, 347 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U, 348 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU, 349 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU, 350 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU, 351 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU, 352 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU, 353 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U, 354 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU, 355 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU, 356 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U, 357 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U, 358 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U, 359 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U, 360 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U, 361 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU, 362 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U, 363 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU, 364 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU, 365 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U, 366 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U, 367 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U, 368 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU, 369 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U, 370 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU, 371 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU, 372 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U, 373 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U, 374 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU, 375 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U, 376 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU, 377 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U, 378 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U, 379 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U, 380 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U, 381 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU, 382 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U, 383 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU, 384 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U, 385 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU, 386 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U, 387 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU, 388 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU, 389 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU, 390 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU, 391 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U, 392 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U, 393 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U, 394 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U, 395 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U, 396 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U, 397 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU, 398 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U, 399 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU, 400 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU 401 }; 402 403 #endif /* !sun4u */ 404 static const uint32_t Te4[256] = 405 { 406 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU, 407 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U, 408 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU, 409 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U, 410 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU, 411 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U, 412 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU, 413 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U, 414 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U, 415 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU, 416 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U, 417 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U, 418 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U, 419 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU, 420 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U, 421 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U, 422 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU, 423 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U, 424 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U, 425 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U, 426 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU, 427 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU, 428 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U, 429 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU, 430 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU, 431 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U, 432 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU, 433 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U, 434 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU, 435 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U, 436 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U, 437 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U, 438 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU, 439 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U, 440 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU, 441 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U, 442 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU, 443 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U, 444 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U, 445 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU, 446 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU, 447 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU, 448 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U, 449 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U, 450 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU, 451 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U, 452 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU, 453 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U, 454 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU, 455 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U, 456 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU, 457 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU, 458 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U, 459 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU, 460 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U, 461 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU, 462 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U, 463 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U, 464 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U, 465 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU, 466 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU, 467 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U, 468 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU, 469 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U 470 }; 471 472 /* Decrypt Sbox constants (for the substitute bytes operation) */ 473 474 static const uint32_t Td0[256] = 475 { 476 0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U, 477 0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U, 478 0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U, 479 0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU, 480 0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U, 481 0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U, 482 0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU, 483 0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U, 484 0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU, 485 0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U, 486 0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U, 487 0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U, 488 0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U, 489 0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU, 490 0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U, 491 0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU, 492 0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U, 493 0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU, 494 0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U, 495 0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U, 496 0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U, 497 0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU, 498 0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U, 499 0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU, 500 0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U, 501 0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU, 502 0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U, 503 0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU, 504 0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU, 505 0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U, 506 0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU, 507 0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U, 508 0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU, 509 0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U, 510 0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U, 511 0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U, 512 0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU, 513 0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U, 514 0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U, 515 0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU, 516 0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U, 517 0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U, 518 0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U, 519 0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U, 520 0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U, 521 0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU, 522 0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U, 523 0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U, 524 0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U, 525 0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U, 526 0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U, 527 0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU, 528 0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU, 529 0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU, 530 0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU, 531 0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U, 532 0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U, 533 0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU, 534 0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU, 535 0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U, 536 0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU, 537 0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U, 538 0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U, 539 0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U 540 }; 541 542 static const uint32_t Td1[256] = 543 { 544 0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU, 545 0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U, 546 0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU, 547 0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U, 548 0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U, 549 0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U, 550 0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U, 551 0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U, 552 0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U, 553 0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU, 554 0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU, 555 0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU, 556 0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U, 557 0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU, 558 0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U, 559 0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U, 560 0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U, 561 0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU, 562 0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU, 563 0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U, 564 0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU, 565 0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U, 566 0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU, 567 0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU, 568 0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U, 569 0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U, 570 0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U, 571 0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU, 572 0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U, 573 0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU, 574 0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U, 575 0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U, 576 0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U, 577 0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU, 578 0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U, 579 0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U, 580 0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U, 581 0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U, 582 0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U, 583 0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U, 584 0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU, 585 0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU, 586 0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U, 587 0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU, 588 0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U, 589 0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU, 590 0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU, 591 0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U, 592 0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU, 593 0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U, 594 0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U, 595 0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U, 596 0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U, 597 0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U, 598 0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U, 599 0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U, 600 0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU, 601 0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U, 602 0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U, 603 0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU, 604 0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U, 605 0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U, 606 0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U, 607 0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U 608 }; 609 610 static const uint32_t Td2[256] = 611 { 612 0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U, 613 0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U, 614 0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U, 615 0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U, 616 0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU, 617 0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U, 618 0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U, 619 0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U, 620 0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U, 621 0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU, 622 0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U, 623 0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U, 624 0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU, 625 0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U, 626 0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U, 627 0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U, 628 0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U, 629 0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U, 630 0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U, 631 0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU, 632 0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U, 633 0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U, 634 0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U, 635 0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U, 636 0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U, 637 0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU, 638 0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU, 639 0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U, 640 0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU, 641 0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U, 642 0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU, 643 0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU, 644 0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU, 645 0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU, 646 0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U, 647 0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U, 648 0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U, 649 0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U, 650 0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U, 651 0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U, 652 0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U, 653 0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU, 654 0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU, 655 0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U, 656 0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U, 657 0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU, 658 0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU, 659 0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U, 660 0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U, 661 0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U, 662 0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U, 663 0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U, 664 0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U, 665 0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U, 666 0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU, 667 0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U, 668 0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U, 669 0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U, 670 0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U, 671 0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U, 672 0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U, 673 0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU, 674 0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U, 675 0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U 676 }; 677 678 static const uint32_t Td3[256] = 679 { 680 0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU, 681 0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU, 682 0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U, 683 0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U, 684 0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU, 685 0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU, 686 0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U, 687 0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU, 688 0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U, 689 0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU, 690 0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U, 691 0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U, 692 0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U, 693 0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U, 694 0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U, 695 0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU, 696 0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU, 697 0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U, 698 0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U, 699 0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU, 700 0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU, 701 0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U, 702 0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U, 703 0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U, 704 0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U, 705 0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU, 706 0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U, 707 0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U, 708 0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU, 709 0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU, 710 0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U, 711 0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U, 712 0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U, 713 0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU, 714 0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U, 715 0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U, 716 0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U, 717 0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U, 718 0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U, 719 0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U, 720 0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U, 721 0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU, 722 0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U, 723 0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U, 724 0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU, 725 0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU, 726 0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U, 727 0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU, 728 0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U, 729 0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U, 730 0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U, 731 0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U, 732 0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U, 733 0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U, 734 0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU, 735 0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU, 736 0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU, 737 0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU, 738 0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U, 739 0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U, 740 0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U, 741 0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU, 742 0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U, 743 0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U 744 }; 745 746 #ifndef sun4u 747 748 static const uint32_t Td4[256] = 749 { 750 0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U, 751 0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U, 752 0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU, 753 0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU, 754 0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U, 755 0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U, 756 0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U, 757 0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU, 758 0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U, 759 0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU, 760 0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU, 761 0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU, 762 0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U, 763 0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U, 764 0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U, 765 0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U, 766 0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U, 767 0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U, 768 0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU, 769 0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U, 770 0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U, 771 0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU, 772 0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U, 773 0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U, 774 0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U, 775 0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU, 776 0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U, 777 0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U, 778 0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU, 779 0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U, 780 0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U, 781 0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU, 782 0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U, 783 0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU, 784 0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU, 785 0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U, 786 0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U, 787 0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U, 788 0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U, 789 0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU, 790 0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U, 791 0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U, 792 0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU, 793 0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU, 794 0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU, 795 0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U, 796 0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU, 797 0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U, 798 0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U, 799 0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U, 800 0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U, 801 0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU, 802 0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U, 803 0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU, 804 0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU, 805 0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU, 806 0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU, 807 0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U, 808 0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU, 809 0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U, 810 0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU, 811 0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U, 812 0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U, 813 0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU 814 }; 815 816 #endif /* !sun4u */ 817 /* Rcon is Round Constant; used for encryption key expansion */ 818 static const uint32_t rcon[RC_LENGTH] = 819 { 820 /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */ 821 0x01000000, 0x02000000, 0x04000000, 0x08000000, 822 0x10000000, 0x20000000, 0x40000000, 0x80000000, 823 0x1B000000, 0x36000000 824 }; 825 826 827 /* 828 * Expand the cipher key into the encryption key schedule. 829 * 830 * Return the number of rounds for the given cipher key size. 831 * The size of the key schedule depends on the number of rounds 832 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 833 * 834 * Parameters: 835 * rk AES key schedule 32-bit array to be initialized 836 * cipherKey User key 837 * keyBits AES key size (128, 192, or 256 bits) 838 */ 839 static int 840 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[], 841 int keyBits) 842 { 843 int i = 0; 844 uint32_t temp; 845 846 rk[0] = cipherKey[0]; 847 rk[1] = cipherKey[1]; 848 rk[2] = cipherKey[2]; 849 rk[3] = cipherKey[3]; 850 851 if (keyBits == 128) { 852 for (;;) { 853 temp = rk[3]; 854 rk[4] = rk[0] ^ 855 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^ 856 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^ 857 (Te4[temp & 0xff] & 0x0000ff00) ^ 858 (Te4[temp >> 24] & 0x000000ff) ^ 859 rcon[i]; 860 rk[5] = rk[1] ^ rk[4]; 861 rk[6] = rk[2] ^ rk[5]; 862 rk[7] = rk[3] ^ rk[6]; 863 864 if (++i == 10) { 865 return (10); 866 } 867 rk += 4; 868 } 869 } 870 871 rk[4] = cipherKey[4]; 872 rk[5] = cipherKey[5]; 873 874 if (keyBits == 192) { 875 for (;;) { 876 temp = rk[5]; 877 rk[6] = rk[0] ^ 878 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^ 879 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^ 880 (Te4[temp & 0xff] & 0x0000ff00) ^ 881 (Te4[temp >> 24] & 0x000000ff) ^ 882 rcon[i]; 883 rk[7] = rk[1] ^ rk[6]; 884 rk[8] = rk[2] ^ rk[7]; 885 rk[9] = rk[3] ^ rk[8]; 886 887 if (++i == 8) { 888 return (12); 889 } 890 891 rk[10] = rk[4] ^ rk[9]; 892 rk[11] = rk[5] ^ rk[10]; 893 rk += 6; 894 } 895 } 896 897 rk[6] = cipherKey[6]; 898 rk[7] = cipherKey[7]; 899 900 if (keyBits == 256) { 901 for (;;) { 902 temp = rk[7]; 903 rk[8] = rk[0] ^ 904 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^ 905 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^ 906 (Te4[temp & 0xff] & 0x0000ff00) ^ 907 (Te4[temp >> 24] & 0x000000ff) ^ 908 rcon[i]; 909 rk[9] = rk[1] ^ rk[8]; 910 rk[10] = rk[2] ^ rk[9]; 911 rk[11] = rk[3] ^ rk[10]; 912 913 if (++i == 7) { 914 return (14); 915 } 916 temp = rk[11]; 917 rk[12] = rk[4] ^ 918 (Te4[temp >> 24] & 0xff000000) ^ 919 (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^ 920 (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^ 921 (Te4[temp & 0xff] & 0x000000ff); 922 rk[13] = rk[5] ^ rk[12]; 923 rk[14] = rk[6] ^ rk[13]; 924 rk[15] = rk[7] ^ rk[14]; 925 926 rk += 8; 927 } 928 } 929 930 return (0); 931 } 932 #endif /* !__amd64 */ 933 934 935 #ifdef sun4u 936 937 /* 938 * Expand the cipher key into the encryption key schedule. 939 * by the sun4u optimized assembly implementation. 940 * 941 * Return the number of rounds for the given cipher key size. 942 * The size of the key schedule depends on the number of rounds 943 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 944 * 945 * Parameters: 946 * rk AES key schedule 64-bit array to be initialized 947 * cipherKey User key 948 * keyBits AES key size (128, 192, or 256 bits) 949 */ 950 static int 951 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits) 952 { 953 uint32_t rk1[4 * (MAX_AES_NR + 1)]; 954 uint64_t *rk64 = (uint64_t *)rk; 955 uint32_t *rkt; 956 uint64_t t; 957 int i, Nr; 958 959 Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits); 960 961 for (i = 0; i < 4 * Nr; i++) { 962 t = (uint64_t)(rk1[i]); 963 rk64[i] = ((t & 0xff000000) << 11) | 964 ((t & 0xff0000) << 8) | 965 ((t & 0xffff) << 3); 966 } 967 968 rkt = (uint32_t *)(&(rk64[4 * Nr])); 969 970 for (i = 0; i < 4; i++) { 971 rkt[i] = rk1[4 * Nr+i]; 972 } 973 974 return (Nr); 975 } 976 977 978 /* 979 * Expand the cipher key into the decryption key schedule as used 980 * by the sun4u optimized assembly implementation. 981 * 982 * Return the number of rounds for the given cipher key size. 983 * The size of the key schedule depends on the number of rounds 984 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 985 * 986 * Parameters: 987 * rk AES key schedule 32-bit array to be initialized 988 * cipherKey User key 989 * keyBits AES key size (128, 192, or 256 bits) 990 */ 991 static int 992 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[], 993 int keyBits) 994 { 995 int Nr, i; 996 uint32_t temp; 997 998 /* expand the cipher key: */ 999 Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits); 1000 1001 /* invert the order of the round keys: */ 1002 1003 for (i = 0; i < 2 * Nr + 2; i++) { 1004 temp = rk[i]; 1005 rk[i] = rk[4 * Nr - i + 3]; 1006 rk[4 * Nr - i + 3] = temp; 1007 } 1008 1009 /* 1010 * apply the inverse MixColumn transform to all 1011 * round keys but the first and the last: 1012 */ 1013 for (i = 1; i < Nr; i++) { 1014 rk += 4; 1015 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^ 1016 Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^ 1017 Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^ 1018 Td3[Te4[rk[0] & 0xff] & 0xff]; 1019 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^ 1020 Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^ 1021 Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^ 1022 Td3[Te4[rk[1] & 0xff] & 0xff]; 1023 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^ 1024 Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^ 1025 Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^ 1026 Td3[Te4[rk[2] & 0xff] & 0xff]; 1027 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^ 1028 Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^ 1029 Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^ 1030 Td3[Te4[rk[3] & 0xff] & 0xff]; 1031 } 1032 1033 return (Nr); 1034 } 1035 1036 1037 /* 1038 * The size of the key schedule depends on the number of rounds 1039 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 1040 * 1041 * Parameters: 1042 * rk AES key schedule 64-bit array to be initialized 1043 * cipherKey User key 1044 * keyBits AES key size (128, 192, or 256 bits) 1045 */ 1046 static int 1047 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits) 1048 { 1049 uint32_t rk1[4 * (MAX_AES_NR + 1)]; 1050 uint64_t *rk64 = (uint64_t *)rk; 1051 uint32_t *rkt; 1052 uint64_t t; 1053 int i, Nr; 1054 1055 Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits); 1056 for (i = 0; i < 4 * Nr; i++) { 1057 t = (uint64_t)(rk1[i]); 1058 rk64[i] = ((t & 0xff000000) << 11) | 1059 ((t & 0xff0000) << 8) | 1060 ((t & 0xffff) << 3); 1061 } 1062 1063 rkt = (uint32_t *)(&(rk64[4 * Nr])); 1064 1065 for (i = 0; i < 4; i++) { 1066 rkt[i] = rk1[4 * Nr + i]; 1067 } 1068 1069 return (Nr); 1070 } 1071 1072 1073 /* 1074 * Expand the 64-bit AES cipher key array into the encryption and decryption 1075 * key schedules. 1076 * 1077 * Parameters: 1078 * key AES key schedule to be initialized 1079 * keyarr32 User key 1080 * keyBits AES key size (128, 192, or 256 bits) 1081 */ 1082 static void 1083 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits) 1084 { 1085 key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32, 1086 keybits); 1087 key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32, 1088 keybits); 1089 key->type = AES_64BIT_KS; 1090 } 1091 1092 1093 #elif !defined(__amd64) 1094 1095 /* 1096 * Expand the cipher key into the decryption key schedule. 1097 * Return the number of rounds for the given cipher key size. 1098 * The size of the key schedule depends on the number of rounds 1099 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 1100 * 1101 * Parameters: 1102 * rk AES key schedule 32-bit array to be initialized 1103 * cipherKey User key 1104 * keyBits AES key size (128, 192, or 256 bits) 1105 */ 1106 static int 1107 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits) 1108 { 1109 int Nr, i, j; 1110 uint32_t temp; 1111 1112 /* expand the cipher key: */ 1113 Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits); 1114 1115 /* invert the order of the round keys: */ 1116 for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) { 1117 temp = rk[i]; 1118 rk[i] = rk[j]; 1119 rk[j] = temp; 1120 temp = rk[i + 1]; 1121 rk[i + 1] = rk[j + 1]; 1122 rk[j + 1] = temp; 1123 temp = rk[i + 2]; 1124 rk[i + 2] = rk[j + 2]; 1125 rk[j + 2] = temp; 1126 temp = rk[i + 3]; 1127 rk[i + 3] = rk[j + 3]; 1128 rk[j + 3] = temp; 1129 } 1130 1131 /* 1132 * apply the inverse MixColumn transform to all 1133 * round keys but the first and the last: 1134 */ 1135 for (i = 1; i < Nr; i++) { 1136 rk += 4; 1137 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^ 1138 Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^ 1139 Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^ 1140 Td3[Te4[rk[0] & 0xff] & 0xff]; 1141 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^ 1142 Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^ 1143 Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^ 1144 Td3[Te4[rk[1] & 0xff] & 0xff]; 1145 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^ 1146 Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^ 1147 Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^ 1148 Td3[Te4[rk[2] & 0xff] & 0xff]; 1149 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^ 1150 Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^ 1151 Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^ 1152 Td3[Te4[rk[3] & 0xff] & 0xff]; 1153 } 1154 1155 return (Nr); 1156 } 1157 1158 1159 /* 1160 * Encrypt one block of data. The block is assumed to be an array 1161 * of four uint32_t values, so copy for alignment (and byte-order 1162 * reversal for little endian systems might be necessary on the 1163 * input and output byte streams. 1164 * The size of the key schedule depends on the number of rounds 1165 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 1166 * 1167 * Parameters: 1168 * rk Key schedule, of aes_ks_t (60 32-bit integers) 1169 * Nr Number of rounds 1170 * pt Input block (plain text) 1171 * ct Output block (crypto text). Can overlap with pt 1172 */ 1173 static void 1174 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4], 1175 uint32_t ct[4]) 1176 { 1177 uint32_t s0, s1, s2, s3, t0, t1, t2, t3; 1178 int r; 1179 1180 /* 1181 * map byte array block to cipher state 1182 * and add initial round key: 1183 */ 1184 1185 s0 = pt[0] ^ rk[0]; 1186 s1 = pt[1] ^ rk[1]; 1187 s2 = pt[2] ^ rk[2]; 1188 s3 = pt[3] ^ rk[3]; 1189 1190 /* 1191 * Nr - 1 full rounds: 1192 */ 1193 1194 r = Nr >> 1; 1195 1196 for (;;) { 1197 t0 = Te0[s0 >> 24] ^ 1198 Te1[(s1 >> 16) & 0xff] ^ 1199 Te2[(s2 >> 8) & 0xff] ^ 1200 Te3[s3 & 0xff] ^ 1201 rk[4]; 1202 1203 t1 = Te0[s1 >> 24] ^ 1204 Te1[(s2 >> 16) & 0xff] ^ 1205 Te2[(s3 >> 8) & 0xff] ^ 1206 Te3[s0 & 0xff] ^ 1207 rk[5]; 1208 1209 t2 = Te0[s2 >> 24] ^ 1210 Te1[(s3 >> 16) & 0xff] ^ 1211 Te2[(s0 >> 8) & 0xff] ^ 1212 Te3[s1 & 0xff] ^ 1213 rk[6]; 1214 1215 t3 = Te0[s3 >> 24] ^ 1216 Te1[(s0 >> 16) & 0xff] ^ 1217 Te2[(s1 >> 8) & 0xff] ^ 1218 Te3[s2 & 0xff] ^ 1219 rk[7]; 1220 1221 rk += 8; 1222 1223 if (--r == 0) { 1224 break; 1225 } 1226 1227 s0 = Te0[t0 >> 24] ^ 1228 Te1[(t1 >> 16) & 0xff] ^ 1229 Te2[(t2 >> 8) & 0xff] ^ 1230 Te3[t3 & 0xff] ^ 1231 rk[0]; 1232 1233 s1 = Te0[t1 >> 24] ^ 1234 Te1[(t2 >> 16) & 0xff] ^ 1235 Te2[(t3 >> 8) & 0xff] ^ 1236 Te3[t0 & 0xff] ^ 1237 rk[1]; 1238 1239 s2 = Te0[t2 >> 24] ^ 1240 Te1[(t3 >> 16) & 0xff] ^ 1241 Te2[(t0 >> 8) & 0xff] ^ 1242 Te3[t1 & 0xff] ^ 1243 rk[2]; 1244 1245 s3 = Te0[t3 >> 24] ^ 1246 Te1[(t0 >> 16) & 0xff] ^ 1247 Te2[(t1 >> 8) & 0xff] ^ 1248 Te3[t2 & 0xff] ^ 1249 rk[3]; 1250 } 1251 1252 /* 1253 * apply last round and 1254 * map cipher state to byte array block: 1255 */ 1256 1257 s0 = (Te4[(t0 >> 24)] & 0xff000000) ^ 1258 (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^ 1259 (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^ 1260 (Te4[t3 & 0xff] & 0x000000ff) ^ 1261 rk[0]; 1262 ct[0] = s0; 1263 1264 s1 = (Te4[(t1 >> 24)] & 0xff000000) ^ 1265 (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^ 1266 (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^ 1267 (Te4[t0 & 0xff] & 0x000000ff) ^ 1268 rk[1]; 1269 ct[1] = s1; 1270 1271 s2 = (Te4[(t2 >> 24)] & 0xff000000) ^ 1272 (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^ 1273 (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^ 1274 (Te4[t1 & 0xff] & 0x000000ff) ^ 1275 rk[2]; 1276 ct[2] = s2; 1277 1278 s3 = (Te4[(t3 >> 24)] & 0xff000000) ^ 1279 (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^ 1280 (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^ 1281 (Te4[t2 & 0xff] & 0x000000ff) ^ 1282 rk[3]; 1283 ct[3] = s3; 1284 } 1285 1286 1287 /* 1288 * Decrypt one block of data. The block is assumed to be an array 1289 * of four uint32_t values, so copy for alignment (and byte-order 1290 * reversal for little endian systems might be necessary on the 1291 * input and output byte streams. 1292 * The size of the key schedule depends on the number of rounds 1293 * (which can be computed from the size of the key), i.e. 4*(Nr + 1). 1294 * 1295 * Parameters: 1296 * rk Key schedule, of aes_ks_t (60 32-bit integers) 1297 * Nr Number of rounds 1298 * ct Input block (crypto text) 1299 * pt Output block (plain text). Can overlap with pt 1300 */ 1301 static void 1302 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4], 1303 uint32_t pt[4]) 1304 { 1305 uint32_t s0, s1, s2, s3, t0, t1, t2, t3; 1306 int r; 1307 1308 /* 1309 * map byte array block to cipher state 1310 * and add initial round key: 1311 */ 1312 s0 = ct[0] ^ rk[0]; 1313 s1 = ct[1] ^ rk[1]; 1314 s2 = ct[2] ^ rk[2]; 1315 s3 = ct[3] ^ rk[3]; 1316 1317 /* 1318 * Nr - 1 full rounds: 1319 */ 1320 1321 r = Nr >> 1; 1322 1323 for (;;) { 1324 t0 = Td0[s0 >> 24] ^ 1325 Td1[(s3 >> 16) & 0xff] ^ 1326 Td2[(s2 >> 8) & 0xff] ^ 1327 Td3[s1 & 0xff] ^ 1328 rk[4]; 1329 1330 t1 = Td0[s1 >> 24] ^ 1331 Td1[(s0 >> 16) & 0xff] ^ 1332 Td2[(s3 >> 8) & 0xff] ^ 1333 Td3[s2 & 0xff] ^ 1334 rk[5]; 1335 1336 t2 = Td0[s2 >> 24] ^ 1337 Td1[(s1 >> 16) & 0xff] ^ 1338 Td2[(s0 >> 8) & 0xff] ^ 1339 Td3[s3 & 0xff] ^ 1340 rk[6]; 1341 1342 t3 = Td0[s3 >> 24] ^ 1343 Td1[(s2 >> 16) & 0xff] ^ 1344 Td2[(s1 >> 8) & 0xff] ^ 1345 Td3[s0 & 0xff] ^ 1346 rk[7]; 1347 1348 rk += 8; 1349 1350 if (--r == 0) { 1351 break; 1352 } 1353 1354 s0 = Td0[t0 >> 24] ^ 1355 Td1[(t3 >> 16) & 0xff] ^ 1356 Td2[(t2 >> 8) & 0xff] ^ 1357 Td3[t1 & 0xff] ^ 1358 rk[0]; 1359 1360 s1 = Td0[t1 >> 24] ^ 1361 Td1[(t0 >> 16) & 0xff] ^ 1362 Td2[(t3 >> 8) & 0xff] ^ 1363 Td3[t2 & 0xff] ^ 1364 rk[1]; 1365 1366 s2 = Td0[t2 >> 24] ^ 1367 Td1[(t1 >> 16) & 0xff] ^ 1368 Td2[(t0 >> 8) & 0xff] ^ 1369 Td3[t3 & 0xff] ^ 1370 rk[2]; 1371 1372 s3 = Td0[t3 >> 24] ^ 1373 Td1[(t2 >> 16) & 0xff] ^ 1374 Td2[(t1 >> 8) & 0xff] ^ 1375 Td3[t0 & 0xff] ^ 1376 rk[3]; 1377 } 1378 1379 /* 1380 * apply last round and 1381 * map cipher state to byte array block: 1382 */ 1383 1384 s0 = (Td4[t0 >> 24] & 0xff000000) ^ 1385 (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^ 1386 (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^ 1387 (Td4[t1 & 0xff] & 0x000000ff) ^ 1388 rk[0]; 1389 pt[0] = s0; 1390 1391 s1 = (Td4[t1 >> 24] & 0xff000000) ^ 1392 (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^ 1393 (Td4[(t3 >> 8) & 0xff] & 0x0000ff00) ^ 1394 (Td4[t2 & 0xff] & 0x000000ff) ^ 1395 rk[1]; 1396 pt[1] = s1; 1397 1398 s2 = (Td4[t2 >> 24] & 0xff000000) ^ 1399 (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^ 1400 (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^ 1401 (Td4[t3 & 0xff] & 0x000000ff) ^ 1402 rk[2]; 1403 pt[2] = s2; 1404 1405 s3 = (Td4[t3 >> 24] & 0xff000000) ^ 1406 (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^ 1407 (Td4[(t1 >> 8) & 0xff] & 0x0000ff00) ^ 1408 (Td4[t0 & 0xff] & 0x000000ff) ^ 1409 rk[3]; 1410 pt[3] = s3; 1411 } 1412 #endif /* sun4u, !__amd64 */ 1413 1414 #ifndef sun4u 1415 /* 1416 * Expand the 32-bit AES cipher key array into the encryption and decryption 1417 * key schedules. 1418 * 1419 * Parameters: 1420 * key AES key schedule to be initialized 1421 * keyarr32 User key 1422 * keyBits AES key size (128, 192, or 256 bits) 1423 */ 1424 static void 1425 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits) 1426 { 1427 key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32, 1428 keybits); 1429 key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32, 1430 keybits); 1431 key->type = AES_32BIT_KS; 1432 } 1433 #endif /* sun4u */ 1434 /* EXPORT DELETE END */ 1435 1436 1437 /* 1438 * Initialize key schedules for AES 1439 * 1440 * Parameters: 1441 * cipherKey User key 1442 * keyBits AES key size (128, 192, or 256 bits) 1443 * keysched AES key schedule to be initialized, of type aes_key_t. 1444 * Allocated by aes_alloc_keysched(). 1445 */ 1446 void 1447 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched) 1448 { 1449 /* EXPORT DELETE START */ 1450 aes_key_t *newbie = keysched; 1451 uint_t keysize, i, j; 1452 union { 1453 uint64_t ka64[4]; 1454 uint32_t ka32[8]; 1455 } keyarr; 1456 1457 switch (keyBits) { 1458 case 128: 1459 newbie->nr = 10; 1460 break; 1461 1462 case 192: 1463 newbie->nr = 12; 1464 break; 1465 1466 case 256: 1467 newbie->nr = 14; 1468 break; 1469 1470 default: 1471 /* should never get here */ 1472 return; 1473 } 1474 keysize = keyBits >> 3; 1475 1476 /* 1477 * For _LITTLE_ENDIAN machines (except AMD64), reverse every 1478 * 4 bytes in the key. On _BIG_ENDIAN and AMD64, copy the key 1479 * without reversing bytes. 1480 * For AMD64, do not byte swap for aes_setupkeys(). 1481 * 1482 * SPARCv8/v9 uses a key schedule array with 64-bit elements. 1483 * X86/AMD64 uses a key schedule array with 32-bit elements. 1484 */ 1485 #ifndef AES_BYTE_SWAP 1486 if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) { 1487 for (i = 0, j = 0; j < keysize; i++, j += 8) { 1488 /* LINTED: pointer alignment */ 1489 keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]); 1490 } 1491 } else { 1492 bcopy(cipherKey, keyarr.ka32, keysize); 1493 } 1494 1495 #else /* byte swap */ 1496 for (i = 0, j = 0; j < keysize; i++, j += 4) { 1497 keyarr.ka32[i] = htonl(*(uint32_t *)(void *)&cipherKey[j]); 1498 } 1499 #endif 1500 1501 aes_setupkeys(newbie, keyarr.ka32, keyBits); 1502 /* EXPORT DELETE END */ 1503 } 1504 1505 /* 1506 * Encrypt one block using AES. 1507 * Align if needed and (for x86 32-bit only) byte-swap. 1508 * 1509 * Parameters: 1510 * ks Key schedule, of type aes_key_t 1511 * pt Input block (plain text) 1512 * ct Output block (crypto text). Can overlap with pt 1513 */ 1514 int 1515 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct) 1516 { 1517 /* EXPORT DELETE START */ 1518 aes_key_t *ksch = (aes_key_t *)ks; 1519 1520 #ifndef AES_BYTE_SWAP 1521 if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) { 1522 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr, 1523 /* LINTED: pointer alignment */ 1524 (uint32_t *)pt, (uint32_t *)ct); 1525 } else { 1526 #endif 1527 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)]; 1528 1529 /* Copy input block into buffer */ 1530 #ifndef AES_BYTE_SWAP 1531 bcopy(pt, &buffer, AES_BLOCK_LEN); 1532 1533 #else /* byte swap */ 1534 buffer[0] = htonl(*(uint32_t *)(void *)&pt[0]); 1535 buffer[1] = htonl(*(uint32_t *)(void *)&pt[4]); 1536 buffer[2] = htonl(*(uint32_t *)(void *)&pt[8]); 1537 buffer[3] = htonl(*(uint32_t *)(void *)&pt[12]); 1538 #endif 1539 1540 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr, 1541 buffer, buffer); 1542 1543 /* Copy result from buffer to output block */ 1544 #ifndef AES_BYTE_SWAP 1545 bcopy(&buffer, ct, AES_BLOCK_LEN); 1546 } 1547 1548 #else /* byte swap */ 1549 *(uint32_t *)(void *)&ct[0] = htonl(buffer[0]); 1550 *(uint32_t *)(void *)&ct[4] = htonl(buffer[1]); 1551 *(uint32_t *)(void *)&ct[8] = htonl(buffer[2]); 1552 *(uint32_t *)(void *)&ct[12] = htonl(buffer[3]); 1553 #endif 1554 /* EXPORT DELETE END */ 1555 return (CRYPTO_SUCCESS); 1556 } 1557 1558 /* 1559 * Decrypt one block using AES. 1560 * Align and byte-swap if needed. 1561 * 1562 * Parameters: 1563 * ks Key schedule, of type aes_key_t 1564 * ct Input block (crypto text) 1565 * pt Output block (plain text). Can overlap with pt 1566 */ 1567 int 1568 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt) 1569 { 1570 /* EXPORT DELETE START */ 1571 aes_key_t *ksch = (aes_key_t *)ks; 1572 1573 #ifndef AES_BYTE_SWAP 1574 if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) { 1575 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr, 1576 /* LINTED: pointer alignment */ 1577 (uint32_t *)ct, (uint32_t *)pt); 1578 } else { 1579 #endif 1580 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)]; 1581 1582 /* Copy input block into buffer */ 1583 #ifndef AES_BYTE_SWAP 1584 bcopy(ct, &buffer, AES_BLOCK_LEN); 1585 1586 #else /* byte swap */ 1587 buffer[0] = htonl(*(uint32_t *)(void *)&ct[0]); 1588 buffer[1] = htonl(*(uint32_t *)(void *)&ct[4]); 1589 buffer[2] = htonl(*(uint32_t *)(void *)&ct[8]); 1590 buffer[3] = htonl(*(uint32_t *)(void *)&ct[12]); 1591 #endif 1592 1593 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr, 1594 buffer, buffer); 1595 1596 /* Copy result from buffer to output block */ 1597 #ifndef AES_BYTE_SWAP 1598 bcopy(&buffer, pt, AES_BLOCK_LEN); 1599 } 1600 1601 #else /* byte swap */ 1602 *(uint32_t *)(void *)&pt[0] = htonl(buffer[0]); 1603 *(uint32_t *)(void *)&pt[4] = htonl(buffer[1]); 1604 *(uint32_t *)(void *)&pt[8] = htonl(buffer[2]); 1605 *(uint32_t *)(void *)&pt[12] = htonl(buffer[3]); 1606 #endif 1607 1608 /* EXPORT DELETE END */ 1609 return (CRYPTO_SUCCESS); 1610 } 1611 1612 1613 /* 1614 * Allocate key schedule for AES. 1615 * 1616 * Return the pointer and set size to the number of bytes allocated. 1617 * Memory allocated must be freed by the caller when done. 1618 * 1619 * Parameters: 1620 * size Size of key schedule allocated, in bytes 1621 * kmflag Flag passed to kmem_alloc(9F); ignored in userland. 1622 */ 1623 /* ARGSUSED */ 1624 void * 1625 aes_alloc_keysched(size_t *size, int kmflag) 1626 { 1627 /* EXPORT DELETE START */ 1628 aes_key_t *keysched; 1629 1630 #ifdef _KERNEL 1631 keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag); 1632 #else /* !_KERNEL */ 1633 keysched = (aes_key_t *)malloc(sizeof (aes_key_t)); 1634 #endif /* _KERNEL */ 1635 1636 if (keysched != NULL) { 1637 *size = sizeof (aes_key_t); 1638 return (keysched); 1639 } 1640 /* EXPORT DELETE END */ 1641 return (NULL); 1642 } 1643 1644 void 1645 aes_copy_block(uint8_t *in, uint8_t *out) 1646 { 1647 if (IS_P2ALIGNED(in, sizeof (uint32_t)) && 1648 IS_P2ALIGNED(out, sizeof (uint32_t))) { 1649 /* LINTED: pointer alignment */ 1650 *(uint32_t *)&out[0] = *(uint32_t *)&in[0]; 1651 /* LINTED: pointer alignment */ 1652 *(uint32_t *)&out[4] = *(uint32_t *)&in[4]; 1653 /* LINTED: pointer alignment */ 1654 *(uint32_t *)&out[8] = *(uint32_t *)&in[8]; 1655 /* LINTED: pointer alignment */ 1656 *(uint32_t *)&out[12] = *(uint32_t *)&in[12]; 1657 } else { 1658 AES_COPY_BLOCK(in, out); 1659 } 1660 } 1661 1662 /* XOR block of data into dest */ 1663 void 1664 aes_xor_block(uint8_t *data, uint8_t *dst) 1665 { 1666 if (IS_P2ALIGNED(dst, sizeof (uint32_t)) && 1667 IS_P2ALIGNED(data, sizeof (uint32_t))) { 1668 /* LINTED: pointer alignment */ 1669 *(uint32_t *)&dst[0] ^= *(uint32_t *)&data[0]; 1670 /* LINTED: pointer alignment */ 1671 *(uint32_t *)&dst[4] ^= *(uint32_t *)&data[4]; 1672 /* LINTED: pointer alignment */ 1673 *(uint32_t *)&dst[8] ^= *(uint32_t *)&data[8]; 1674 /* LINTED: pointer alignment */ 1675 *(uint32_t *)&dst[12] ^= *(uint32_t *)&data[12]; 1676 } else { 1677 AES_XOR_BLOCK(data, dst); 1678 } 1679 } 1680 1681 /* 1682 * Encrypt multiple blocks of data according to mode. 1683 */ 1684 /* ARGSUSED */ 1685 int 1686 aes_encrypt_contiguous_blocks(void *ctx, char *data, size_t length, 1687 crypto_data_t *out) 1688 { 1689 aes_ctx_t *aes_ctx = ctx; 1690 int rv; 1691 1692 if (aes_ctx->ac_flags & CTR_MODE) { 1693 rv = ctr_mode_contiguous_blocks(ctx, data, length, out, 1694 AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block); 1695 #ifdef _KERNEL 1696 } else if (aes_ctx->ac_flags & CCM_MODE) { 1697 rv = ccm_mode_encrypt_contiguous_blocks(ctx, data, length, 1698 out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block, 1699 aes_xor_block); 1700 } else if (aes_ctx->ac_flags & (GCM_MODE|GMAC_MODE)) { 1701 rv = gcm_mode_encrypt_contiguous_blocks(ctx, data, length, 1702 out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block, 1703 aes_xor_block); 1704 #endif 1705 } else if (aes_ctx->ac_flags & CBC_MODE) { 1706 rv = cbc_encrypt_contiguous_blocks(ctx, 1707 data, length, out, AES_BLOCK_LEN, aes_encrypt_block, 1708 aes_copy_block, aes_xor_block); 1709 } else { 1710 rv = ecb_cipher_contiguous_blocks(ctx, data, length, out, 1711 AES_BLOCK_LEN, aes_encrypt_block); 1712 } 1713 return (rv); 1714 } 1715 1716 /* 1717 * Decrypt multiple blocks of data according to mode. 1718 */ 1719 int 1720 aes_decrypt_contiguous_blocks(void *ctx, char *data, size_t length, 1721 crypto_data_t *out) 1722 { 1723 aes_ctx_t *aes_ctx = ctx; 1724 int rv; 1725 1726 if (aes_ctx->ac_flags & CTR_MODE) { 1727 rv = ctr_mode_contiguous_blocks(ctx, data, length, out, 1728 AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block); 1729 if (rv == CRYPTO_DATA_LEN_RANGE) 1730 rv = CRYPTO_ENCRYPTED_DATA_LEN_RANGE; 1731 #ifdef _KERNEL 1732 } else if (aes_ctx->ac_flags & CCM_MODE) { 1733 rv = ccm_mode_decrypt_contiguous_blocks(ctx, data, length, 1734 out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block, 1735 aes_xor_block); 1736 } else if (aes_ctx->ac_flags & (GCM_MODE|GMAC_MODE)) { 1737 rv = gcm_mode_decrypt_contiguous_blocks(ctx, data, length, 1738 out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block, 1739 aes_xor_block); 1740 #endif 1741 } else if (aes_ctx->ac_flags & CBC_MODE) { 1742 rv = cbc_decrypt_contiguous_blocks(ctx, data, length, out, 1743 AES_BLOCK_LEN, aes_decrypt_block, aes_copy_block, 1744 aes_xor_block); 1745 } else { 1746 rv = ecb_cipher_contiguous_blocks(ctx, data, length, out, 1747 AES_BLOCK_LEN, aes_decrypt_block); 1748 if (rv == CRYPTO_DATA_LEN_RANGE) 1749 rv = CRYPTO_ENCRYPTED_DATA_LEN_RANGE; 1750 } 1751 return (rv); 1752 } 1753