xref: /titanic_51/usr/src/common/crypto/aes/aes_impl.c (revision 89b43686db1fe9681d80a7cf5662730cb9378cae)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 
25 #include <sys/types.h>
26 #include <sys/systm.h>
27 #include <sys/sysmacros.h>
28 #include <netinet/in.h>
29 #include "aes_impl.h"
30 #ifndef	_KERNEL
31 #include <strings.h>
32 #include <stdlib.h>
33 #endif	/* !_KERNEL */
34 
35 #ifdef __amd64
36 
37 #ifdef _KERNEL
38 #include <sys/cpuvar.h>		/* cpu_t, CPU */
39 #include <sys/x86_archext.h>	/* x86_featureset, X86FSET_AES */
40 #include <sys/disp.h>		/* kpreempt_disable(), kpreempt_enable */
41 
42 /* Workaround for no XMM kernel thread save/restore */
43 #define	KPREEMPT_DISABLE	kpreempt_disable()
44 #define	KPREEMPT_ENABLE		kpreempt_enable()
45 
46 #else
47 #include <sys/auxv.h>		/* getisax() */
48 #include <sys/auxv_386.h>	/* AV_386_AES bit */
49 #define	KPREEMPT_DISABLE
50 #define	KPREEMPT_ENABLE
51 #endif	/* _KERNEL */
52 #endif  /* __amd64 */
53 
54 
55 /*
56  * This file is derived from the file  rijndael-alg-fst.c  taken from the
57  * "optimized C code v3.0" on the "rijndael home page"
58  * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
59  * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
60  *
61  * The following note is from the original file:
62  */
63 
64 /*
65  * rijndael-alg-fst.c
66  *
67  * @version 3.0 (December 2000)
68  *
69  * Optimised ANSI C code for the Rijndael cipher (now AES)
70  *
71  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
72  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
73  * @author Paulo Barreto <paulo.barreto@terra.com.br>
74  *
75  * This code is hereby placed in the public domain.
76  *
77  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
78  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
79  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
80  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
81  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
82  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
83  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
84  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
85  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
86  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
87  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
88  */
89 
90 /* EXPORT DELETE START */
91 
92 #if defined(sun4u)
93 /* External assembly functions: */
94 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4],
95 	uint32_t ct[4]);
96 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4],
97 	uint32_t pt[4]);
98 
99 #define	AES_ENCRYPT_IMPL(a, b, c, d, e)	aes_encrypt_impl(a, b, c, d)
100 #define	AES_DECRYPT_IMPL(a, b, c, d, e)	aes_decrypt_impl(a, b, c, d)
101 
102 #elif defined(__amd64)
103 
104 /* These functions are used to execute amd64 instructions for AMD or Intel: */
105 extern int rijndael_key_setup_enc_amd64(uint32_t rk[],
106 	const uint32_t cipherKey[], int keyBits);
107 extern int rijndael_key_setup_dec_amd64(uint32_t rk[],
108 	const uint32_t cipherKey[], int keyBits);
109 extern void aes_encrypt_amd64(const uint32_t rk[], int Nr,
110 	const uint32_t pt[4], uint32_t ct[4]);
111 extern void aes_decrypt_amd64(const uint32_t rk[], int Nr,
112 	const uint32_t ct[4], uint32_t pt[4]);
113 
114 /* These functions are used to execute Intel-specific AES-NI instructions: */
115 extern int rijndael_key_setup_enc_intel(uint32_t rk[],
116 	const uint32_t cipherKey[], uint64_t keyBits);
117 extern int rijndael_key_setup_dec_intel(uint32_t rk[],
118 	const uint32_t cipherKey[], uint64_t keyBits);
119 extern void aes_encrypt_intel(const uint32_t rk[], int Nr,
120 	const uint32_t pt[4], uint32_t ct[4]);
121 extern void aes_decrypt_intel(const uint32_t rk[], int Nr,
122 	const uint32_t ct[4], uint32_t pt[4]);
123 
124 static int intel_aes_instructions_present(void);
125 
126 #define	AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d, e)
127 #define	AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d, e)
128 
129 #else /* Generic C implementation */
130 
131 #define	AES_ENCRYPT_IMPL(a, b, c, d, e)	rijndael_encrypt(a, b, c, d)
132 #define	AES_DECRYPT_IMPL(a, b, c, d, e)	rijndael_decrypt(a, b, c, d)
133 #define	rijndael_key_setup_enc_raw	rijndael_key_setup_enc
134 #endif	/* sun4u || __amd64 */
135 
136 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
137 #define	AES_BYTE_SWAP
138 #endif
139 
140 
141 #if !defined(__amd64)
142 /*
143  *  Constant tables
144  */
145 
146 /*
147  * Te0[x] = S [x].[02, 01, 01, 03];
148  * Te1[x] = S [x].[03, 02, 01, 01];
149  * Te2[x] = S [x].[01, 03, 02, 01];
150  * Te3[x] = S [x].[01, 01, 03, 02];
151  * Te4[x] = S [x].[01, 01, 01, 01];
152  *
153  * Td0[x] = Si[x].[0e, 09, 0d, 0b];
154  * Td1[x] = Si[x].[0b, 0e, 09, 0d];
155  * Td2[x] = Si[x].[0d, 0b, 0e, 09];
156  * Td3[x] = Si[x].[09, 0d, 0b, 0e];
157  * Td4[x] = Si[x].[01, 01, 01, 01];
158  */
159 
160 /* Encrypt Sbox constants (for the substitute bytes operation) */
161 
162 #ifndef sun4u
163 
164 static const uint32_t Te0[256] =
165 {
166 	0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
167 	0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
168 	0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
169 	0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
170 	0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
171 	0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
172 	0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
173 	0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
174 	0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
175 	0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
176 	0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
177 	0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
178 	0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
179 	0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
180 	0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
181 	0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
182 	0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
183 	0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
184 	0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
185 	0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
186 	0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
187 	0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
188 	0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
189 	0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
190 	0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
191 	0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
192 	0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
193 	0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
194 	0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
195 	0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
196 	0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
197 	0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
198 	0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
199 	0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
200 	0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
201 	0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
202 	0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
203 	0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
204 	0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
205 	0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
206 	0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
207 	0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
208 	0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
209 	0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
210 	0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
211 	0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
212 	0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
213 	0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
214 	0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
215 	0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
216 	0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
217 	0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
218 	0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
219 	0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
220 	0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
221 	0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
222 	0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
223 	0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
224 	0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
225 	0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
226 	0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
227 	0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
228 	0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
229 	0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
230 };
231 
232 
233 static const uint32_t Te1[256] =
234 {
235 	0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
236 	0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
237 	0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
238 	0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
239 	0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
240 	0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
241 	0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
242 	0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
243 	0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
244 	0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
245 	0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
246 	0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
247 	0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
248 	0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
249 	0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
250 	0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
251 	0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
252 	0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
253 	0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
254 	0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
255 	0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
256 	0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
257 	0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
258 	0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
259 	0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
260 	0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
261 	0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
262 	0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
263 	0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
264 	0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
265 	0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
266 	0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
267 	0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
268 	0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
269 	0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
270 	0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
271 	0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
272 	0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
273 	0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
274 	0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
275 	0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
276 	0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
277 	0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
278 	0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
279 	0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
280 	0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
281 	0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
282 	0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
283 	0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
284 	0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
285 	0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
286 	0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
287 	0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
288 	0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
289 	0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
290 	0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
291 	0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
292 	0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
293 	0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
294 	0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
295 	0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
296 	0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
297 	0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
298 	0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
299 };
300 
301 
302 static const uint32_t Te2[256] =
303 {
304 	0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
305 	0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
306 	0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
307 	0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
308 	0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
309 	0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
310 	0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
311 	0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
312 	0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
313 	0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
314 	0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
315 	0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
316 	0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
317 	0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
318 	0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
319 	0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
320 	0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
321 	0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
322 	0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
323 	0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
324 	0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
325 	0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
326 	0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
327 	0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
328 	0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
329 	0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
330 	0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
331 	0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
332 	0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
333 	0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
334 	0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
335 	0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
336 	0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
337 	0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
338 	0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
339 	0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
340 	0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
341 	0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
342 	0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
343 	0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
344 	0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
345 	0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
346 	0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
347 	0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
348 	0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
349 	0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
350 	0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
351 	0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
352 	0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
353 	0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
354 	0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
355 	0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
356 	0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
357 	0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
358 	0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
359 	0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
360 	0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
361 	0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
362 	0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
363 	0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
364 	0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
365 	0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
366 	0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
367 	0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
368 };
369 
370 
371 static const uint32_t Te3[256] =
372 {
373 	0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
374 	0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
375 	0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
376 	0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
377 	0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
378 	0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
379 	0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
380 	0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
381 	0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
382 	0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
383 	0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
384 	0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
385 	0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
386 	0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
387 	0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
388 	0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
389 	0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
390 	0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
391 	0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
392 	0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
393 	0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
394 	0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
395 	0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
396 	0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
397 	0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
398 	0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
399 	0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
400 	0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
401 	0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
402 	0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
403 	0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
404 	0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
405 	0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
406 	0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
407 	0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
408 	0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
409 	0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
410 	0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
411 	0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
412 	0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
413 	0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
414 	0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
415 	0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
416 	0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
417 	0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
418 	0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
419 	0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
420 	0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
421 	0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
422 	0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
423 	0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
424 	0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
425 	0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
426 	0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
427 	0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
428 	0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
429 	0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
430 	0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
431 	0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
432 	0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
433 	0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
434 	0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
435 	0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
436 	0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
437 };
438 
439 #endif /* !sun4u */
440 
441 static const uint32_t Te4[256] =
442 {
443 	0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
444 	0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
445 	0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
446 	0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
447 	0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
448 	0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
449 	0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
450 	0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
451 	0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
452 	0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
453 	0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
454 	0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
455 	0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
456 	0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
457 	0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
458 	0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
459 	0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
460 	0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
461 	0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
462 	0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
463 	0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
464 	0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
465 	0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
466 	0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
467 	0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
468 	0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
469 	0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
470 	0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
471 	0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
472 	0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
473 	0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
474 	0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
475 	0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
476 	0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
477 	0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
478 	0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
479 	0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
480 	0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
481 	0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
482 	0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
483 	0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
484 	0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
485 	0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
486 	0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
487 	0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
488 	0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
489 	0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
490 	0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
491 	0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
492 	0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
493 	0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
494 	0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
495 	0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
496 	0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
497 	0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
498 	0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
499 	0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
500 	0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
501 	0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
502 	0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
503 	0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
504 	0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
505 	0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
506 	0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
507 };
508 
509 /* Decrypt Sbox constants (for the substitute bytes operation) */
510 
511 static const uint32_t Td0[256] =
512 {
513 	0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
514 	0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
515 	0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
516 	0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
517 	0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
518 	0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
519 	0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
520 	0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
521 	0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
522 	0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
523 	0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
524 	0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
525 	0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
526 	0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
527 	0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
528 	0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
529 	0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
530 	0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
531 	0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
532 	0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
533 	0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
534 	0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
535 	0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
536 	0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
537 	0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
538 	0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
539 	0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
540 	0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
541 	0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
542 	0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
543 	0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
544 	0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
545 	0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
546 	0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
547 	0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
548 	0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
549 	0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
550 	0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
551 	0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
552 	0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
553 	0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
554 	0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
555 	0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
556 	0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
557 	0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
558 	0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
559 	0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
560 	0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
561 	0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
562 	0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
563 	0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
564 	0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
565 	0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
566 	0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
567 	0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
568 	0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
569 	0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
570 	0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
571 	0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
572 	0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
573 	0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
574 	0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
575 	0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
576 	0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
577 };
578 
579 static const uint32_t Td1[256] =
580 {
581 	0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
582 	0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
583 	0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
584 	0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
585 	0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
586 	0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
587 	0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
588 	0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
589 	0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
590 	0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
591 	0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
592 	0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
593 	0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
594 	0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
595 	0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
596 	0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
597 	0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
598 	0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
599 	0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
600 	0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
601 	0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
602 	0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
603 	0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
604 	0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
605 	0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
606 	0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
607 	0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
608 	0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
609 	0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
610 	0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
611 	0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
612 	0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
613 	0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
614 	0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
615 	0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
616 	0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
617 	0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
618 	0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
619 	0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
620 	0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
621 	0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
622 	0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
623 	0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
624 	0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
625 	0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
626 	0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
627 	0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
628 	0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
629 	0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
630 	0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
631 	0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
632 	0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
633 	0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
634 	0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
635 	0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
636 	0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
637 	0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
638 	0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
639 	0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
640 	0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
641 	0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
642 	0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
643 	0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
644 	0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
645 };
646 
647 static const uint32_t Td2[256] =
648 {
649 	0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
650 	0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
651 	0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
652 	0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
653 	0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
654 	0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
655 	0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
656 	0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
657 	0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
658 	0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
659 	0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
660 	0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
661 	0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
662 	0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
663 	0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
664 	0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
665 	0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
666 	0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
667 	0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
668 	0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
669 	0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
670 	0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
671 	0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
672 	0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
673 	0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
674 	0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
675 	0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
676 	0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
677 	0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
678 	0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
679 	0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
680 	0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
681 	0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
682 	0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
683 	0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
684 	0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
685 	0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
686 	0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
687 	0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
688 	0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
689 	0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
690 	0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
691 	0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
692 	0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
693 	0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
694 	0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
695 	0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
696 	0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
697 	0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
698 	0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
699 	0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
700 	0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
701 	0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
702 	0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
703 	0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
704 	0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
705 	0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
706 	0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
707 	0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
708 	0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
709 	0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
710 	0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
711 	0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
712 	0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
713 };
714 
715 static const uint32_t Td3[256] =
716 {
717 	0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
718 	0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
719 	0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
720 	0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
721 	0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
722 	0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
723 	0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
724 	0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
725 	0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
726 	0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
727 	0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
728 	0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
729 	0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
730 	0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
731 	0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
732 	0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
733 	0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
734 	0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
735 	0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
736 	0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
737 	0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
738 	0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
739 	0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
740 	0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
741 	0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
742 	0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
743 	0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
744 	0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
745 	0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
746 	0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
747 	0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
748 	0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
749 	0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
750 	0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
751 	0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
752 	0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
753 	0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
754 	0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
755 	0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
756 	0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
757 	0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
758 	0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
759 	0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
760 	0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
761 	0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
762 	0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
763 	0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
764 	0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
765 	0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
766 	0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
767 	0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
768 	0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
769 	0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
770 	0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
771 	0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
772 	0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
773 	0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
774 	0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
775 	0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
776 	0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
777 	0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
778 	0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
779 	0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
780 	0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
781 };
782 
783 #ifndef sun4u
784 
785 static const uint32_t Td4[256] =
786 {
787 	0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
788 	0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
789 	0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
790 	0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
791 	0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
792 	0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
793 	0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
794 	0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
795 	0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
796 	0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
797 	0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
798 	0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
799 	0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
800 	0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
801 	0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
802 	0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
803 	0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
804 	0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
805 	0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
806 	0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
807 	0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
808 	0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
809 	0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
810 	0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
811 	0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
812 	0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
813 	0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
814 	0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
815 	0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
816 	0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
817 	0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
818 	0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
819 	0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
820 	0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
821 	0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
822 	0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
823 	0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
824 	0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
825 	0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
826 	0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
827 	0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
828 	0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
829 	0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
830 	0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
831 	0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
832 	0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
833 	0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
834 	0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
835 	0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
836 	0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
837 	0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
838 	0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
839 	0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
840 	0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
841 	0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
842 	0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
843 	0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
844 	0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
845 	0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
846 	0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
847 	0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
848 	0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
849 	0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
850 	0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
851 };
852 
853 #endif /* !sun4u */
854 
855 /* Rcon is Round Constant; used for encryption key expansion */
856 static const uint32_t rcon[RC_LENGTH] =
857 {
858 	/* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
859 	0x01000000, 0x02000000, 0x04000000, 0x08000000,
860 	0x10000000, 0x20000000, 0x40000000, 0x80000000,
861 	0x1B000000, 0x36000000
862 };
863 
864 
865 /*
866  * Expand the cipher key into the encryption key schedule.
867  *
868  * Return the number of rounds for the given cipher key size.
869  * The size of the key schedule depends on the number of rounds
870  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
871  *
872  * Parameters:
873  * rk		AES key schedule 32-bit array to be initialized
874  * cipherKey	User key
875  * keyBits	AES key size (128, 192, or 256 bits)
876  */
877 static int
878 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
879     int keyBits)
880 {
881 	int		i = 0;
882 	uint32_t	temp;
883 
884 	rk[0] = cipherKey[0];
885 	rk[1] = cipherKey[1];
886 	rk[2] = cipherKey[2];
887 	rk[3] = cipherKey[3];
888 
889 	if (keyBits == 128) {
890 		for (;;) {
891 			temp  = rk[3];
892 			rk[4] = rk[0] ^
893 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
894 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
895 			    (Te4[temp & 0xff] & 0x0000ff00) ^
896 			    (Te4[temp >> 24] & 0x000000ff) ^
897 			    rcon[i];
898 			rk[5] = rk[1] ^ rk[4];
899 			rk[6] = rk[2] ^ rk[5];
900 			rk[7] = rk[3] ^ rk[6];
901 
902 			if (++i == 10) {
903 				return (10);
904 			}
905 			rk += 4;
906 		}
907 	}
908 
909 	rk[4] = cipherKey[4];
910 	rk[5] = cipherKey[5];
911 
912 	if (keyBits == 192) {
913 		for (;;) {
914 			temp = rk[5];
915 			rk[6] = rk[0] ^
916 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
917 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
918 			    (Te4[temp & 0xff] & 0x0000ff00) ^
919 			    (Te4[temp >> 24] & 0x000000ff) ^
920 			    rcon[i];
921 			rk[7] = rk[1] ^ rk[6];
922 			rk[8] = rk[2] ^ rk[7];
923 			rk[9] = rk[3] ^ rk[8];
924 
925 			if (++i == 8) {
926 				return (12);
927 			}
928 
929 			rk[10] = rk[4] ^ rk[9];
930 			rk[11] = rk[5] ^ rk[10];
931 			rk += 6;
932 		}
933 	}
934 
935 	rk[6] = cipherKey[6];
936 	rk[7] = cipherKey[7];
937 
938 	if (keyBits == 256) {
939 		for (;;) {
940 			temp = rk[7];
941 			rk[8] = rk[0] ^
942 			    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
943 			    (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
944 			    (Te4[temp & 0xff] & 0x0000ff00) ^
945 			    (Te4[temp >> 24] & 0x000000ff) ^
946 			    rcon[i];
947 			rk[9] = rk[1] ^ rk[8];
948 			rk[10] = rk[2] ^ rk[9];
949 			rk[11] = rk[3] ^ rk[10];
950 
951 			if (++i == 7) {
952 				return (14);
953 			}
954 			temp = rk[11];
955 			rk[12] = rk[4] ^
956 			    (Te4[temp >> 24] & 0xff000000) ^
957 			    (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
958 			    (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
959 			    (Te4[temp & 0xff] & 0x000000ff);
960 			rk[13] = rk[5] ^ rk[12];
961 			rk[14] = rk[6] ^ rk[13];
962 			rk[15] = rk[7] ^ rk[14];
963 
964 			rk += 8;
965 		}
966 	}
967 
968 	return (0);
969 }
970 #endif	/* !__amd64 */
971 
972 
973 #ifdef	sun4u
974 
975 /*
976  * Expand the cipher key into the encryption key schedule.
977  * by the sun4u optimized assembly implementation.
978  *
979  * Return the number of rounds for the given cipher key size.
980  * The size of the key schedule depends on the number of rounds
981  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
982  *
983  * Parameters:
984  * rk		AES key schedule 64-bit array to be initialized
985  * cipherKey	User key
986  * keyBits	AES key size (128, 192, or 256 bits)
987  */
988 static int
989 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
990 {
991 	uint32_t	rk1[4 * (MAX_AES_NR + 1)];
992 	uint64_t	*rk64 = (uint64_t *)rk;
993 	uint32_t	*rkt;
994 	uint64_t	t;
995 	int		i, Nr;
996 
997 	Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
998 
999 	for (i = 0; i < 4 * Nr; i++) {
1000 		t = (uint64_t)(rk1[i]);
1001 		rk64[i] = ((t & 0xff000000) << 11) |
1002 		    ((t & 0xff0000) << 8) |
1003 		    ((t & 0xffff) << 3);
1004 	}
1005 
1006 	rkt = (uint32_t *)(&(rk64[4 * Nr]));
1007 
1008 	for (i = 0; i < 4; i++) {
1009 		rkt[i] = rk1[4 * Nr+i];
1010 	}
1011 
1012 	return (Nr);
1013 }
1014 
1015 
1016 /*
1017  * Expand the cipher key into the decryption key schedule as used
1018  * by the sun4u optimized assembly implementation.
1019  *
1020  * Return the number of rounds for the given cipher key size.
1021  * The size of the key schedule depends on the number of rounds
1022  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1023  *
1024  * Parameters:
1025  * rk		AES key schedule 32-bit array to be initialized
1026  * cipherKey	User key
1027  * keyBits	AES key size (128, 192, or 256 bits)
1028  */
1029 static int
1030 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
1031     int keyBits)
1032 {
1033 	int		Nr, i;
1034 	uint32_t	temp;
1035 
1036 	/* expand the cipher key: */
1037 	Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1038 
1039 	/* invert the order of the round keys: */
1040 
1041 	for (i = 0; i < 2 * Nr + 2; i++) {
1042 		temp = rk[i];
1043 		rk[i] = rk[4 * Nr - i + 3];
1044 		rk[4 * Nr - i + 3] = temp;
1045 	}
1046 
1047 	/*
1048 	 * apply the inverse MixColumn transform to all
1049 	 * round keys but the first and the last:
1050 	 */
1051 	for (i = 1; i < Nr; i++) {
1052 		rk += 4;
1053 		rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1054 		    Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1055 		    Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1056 		    Td3[Te4[rk[0] & 0xff] & 0xff];
1057 		rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1058 		    Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1059 		    Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1060 		    Td3[Te4[rk[1] & 0xff] & 0xff];
1061 		rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1062 		    Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1063 		    Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1064 		    Td3[Te4[rk[2] & 0xff] & 0xff];
1065 		rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1066 		    Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1067 		    Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1068 		    Td3[Te4[rk[3] & 0xff] & 0xff];
1069 	}
1070 
1071 	return (Nr);
1072 }
1073 
1074 
1075 /*
1076  * The size of the key schedule depends on the number of rounds
1077  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1078  *
1079  * Parameters:
1080  * rk		AES key schedule 64-bit array to be initialized
1081  * cipherKey	User key
1082  * keyBits	AES key size (128, 192, or 256 bits)
1083  */
1084 static int
1085 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
1086 {
1087 	uint32_t	rk1[4 * (MAX_AES_NR + 1)];
1088 	uint64_t	*rk64 = (uint64_t *)rk;
1089 	uint32_t	*rkt;
1090 	uint64_t	t;
1091 	int		i, Nr;
1092 
1093 	Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
1094 	for (i = 0; i < 4 * Nr; i++) {
1095 		t = (uint64_t)(rk1[i]);
1096 		rk64[i] = ((t & 0xff000000) << 11) |
1097 		    ((t & 0xff0000) << 8) |
1098 		    ((t & 0xffff) << 3);
1099 	}
1100 
1101 	rkt = (uint32_t *)(&(rk64[4 * Nr]));
1102 
1103 	for (i = 0; i < 4; i++) {
1104 		rkt[i] = rk1[4 * Nr + i];
1105 	}
1106 
1107 	return (Nr);
1108 }
1109 
1110 
1111 /*
1112  * Expand the 64-bit AES cipher key array into the encryption and decryption
1113  * key schedules.
1114  *
1115  * Parameters:
1116  * key		AES key schedule to be initialized
1117  * keyarr32	User key
1118  * keyBits	AES key size (128, 192, or 256 bits)
1119  */
1120 static void
1121 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1122 {
1123 	key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1124 	    keybits);
1125 	key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1126 	    keybits);
1127 	key->type = AES_64BIT_KS;
1128 }
1129 
1130 
1131 #elif defined(__amd64)
1132 
1133 /*
1134  * Expand the 32-bit AES cipher key array into the encryption and decryption
1135  * key schedules.
1136  *
1137  * Parameters:
1138  * key		AES key schedule to be initialized
1139  * keyarr32	User key
1140  * keyBits	AES key size (128, 192, or 256 bits)
1141  */
1142 static void
1143 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1144 {
1145 	if (intel_aes_instructions_present()) {
1146 		key->flags = INTEL_AES_NI_CAPABLE;
1147 		KPREEMPT_DISABLE;
1148 		key->nr = rijndael_key_setup_enc_intel(&(key->encr_ks.ks32[0]),
1149 		    keyarr32, keybits);
1150 		key->nr = rijndael_key_setup_dec_intel(&(key->decr_ks.ks32[0]),
1151 		    keyarr32, keybits);
1152 		KPREEMPT_ENABLE;
1153 	} else {
1154 		key->flags = 0;
1155 		key->nr = rijndael_key_setup_enc_amd64(&(key->encr_ks.ks32[0]),
1156 		    keyarr32, keybits);
1157 		key->nr = rijndael_key_setup_dec_amd64(&(key->decr_ks.ks32[0]),
1158 		    keyarr32, keybits);
1159 	}
1160 
1161 	key->type = AES_32BIT_KS;
1162 }
1163 
1164 /*
1165  * Encrypt one block of data. The block is assumed to be an array
1166  * of four uint32_t values, so copy for alignment (and byte-order
1167  * reversal for little endian systems might be necessary on the
1168  * input and output byte streams.
1169  * The size of the key schedule depends on the number of rounds
1170  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1171  *
1172  * Parameters:
1173  * rk		Key schedule, of aes_ks_t (60 32-bit integers)
1174  * Nr		Number of rounds
1175  * pt		Input block (plain text)
1176  * ct		Output block (crypto text).  Can overlap with pt
1177  * flags	Indicates whether we're on Intel AES-NI-capable hardware
1178  */
1179 static void
1180 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1181     uint32_t ct[4], int flags) {
1182 	if (flags & INTEL_AES_NI_CAPABLE) {
1183 		KPREEMPT_DISABLE;
1184 		aes_encrypt_intel(rk, Nr, pt, ct);
1185 		KPREEMPT_ENABLE;
1186 	} else {
1187 		aes_encrypt_amd64(rk, Nr, pt, ct);
1188 	}
1189 }
1190 
1191 /*
1192  * Decrypt one block of data. The block is assumed to be an array
1193  * of four uint32_t values, so copy for alignment (and byte-order
1194  * reversal for little endian systems might be necessary on the
1195  * input and output byte streams.
1196  * The size of the key schedule depends on the number of rounds
1197  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1198  *
1199  * Parameters:
1200  * rk		Key schedule, of aes_ks_t (60 32-bit integers)
1201  * Nr		Number of rounds
1202  * ct		Input block (crypto text)
1203  * pt		Output block (plain text). Can overlap with pt
1204  * flags	Indicates whether we're on Intel AES-NI-capable hardware
1205  */
1206 static void
1207 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1208     uint32_t pt[4], int flags) {
1209 	if (flags & INTEL_AES_NI_CAPABLE) {
1210 		KPREEMPT_DISABLE;
1211 		aes_decrypt_intel(rk, Nr, ct, pt);
1212 		KPREEMPT_ENABLE;
1213 	} else {
1214 		aes_decrypt_amd64(rk, Nr, ct, pt);
1215 	}
1216 }
1217 
1218 
1219 #else /* generic C implementation */
1220 
1221 /*
1222  *  Expand the cipher key into the decryption key schedule.
1223  *  Return the number of rounds for the given cipher key size.
1224  *  The size of the key schedule depends on the number of rounds
1225  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1226  *
1227  * Parameters:
1228  * rk		AES key schedule 32-bit array to be initialized
1229  * cipherKey	User key
1230  * keyBits	AES key size (128, 192, or 256 bits)
1231  */
1232 static int
1233 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1234 {
1235 	int	 Nr, i, j;
1236 	uint32_t temp;
1237 
1238 	/* expand the cipher key: */
1239 	Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1240 
1241 	/* invert the order of the round keys: */
1242 	for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1243 		temp = rk[i];
1244 		rk[i] = rk[j];
1245 		rk[j] = temp;
1246 		temp = rk[i + 1];
1247 		rk[i + 1] = rk[j + 1];
1248 		rk[j + 1] = temp;
1249 		temp = rk[i + 2];
1250 		rk[i + 2] = rk[j + 2];
1251 		rk[j + 2] = temp;
1252 		temp = rk[i + 3];
1253 		rk[i + 3] = rk[j + 3];
1254 		rk[j + 3] = temp;
1255 	}
1256 
1257 	/*
1258 	 * apply the inverse MixColumn transform to all
1259 	 * round keys but the first and the last:
1260 	 */
1261 	for (i = 1; i < Nr; i++) {
1262 		rk += 4;
1263 		rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1264 		    Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1265 		    Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1266 		    Td3[Te4[rk[0] & 0xff] & 0xff];
1267 		rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1268 		    Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1269 		    Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1270 		    Td3[Te4[rk[1] & 0xff] & 0xff];
1271 		rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1272 		    Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1273 		    Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1274 		    Td3[Te4[rk[2] & 0xff] & 0xff];
1275 		rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1276 		    Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1277 		    Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1278 		    Td3[Te4[rk[3] & 0xff] & 0xff];
1279 	}
1280 
1281 	return (Nr);
1282 }
1283 
1284 
1285 /*
1286  * Expand the 32-bit AES cipher key array into the encryption and decryption
1287  * key schedules.
1288  *
1289  * Parameters:
1290  * key		AES key schedule to be initialized
1291  * keyarr32	User key
1292  * keyBits	AES key size (128, 192, or 256 bits)
1293  */
1294 static void
1295 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1296 {
1297 	key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1298 	    keybits);
1299 	key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1300 	    keybits);
1301 	key->type = AES_32BIT_KS;
1302 }
1303 
1304 
1305 /*
1306  * Encrypt one block of data. The block is assumed to be an array
1307  * of four uint32_t values, so copy for alignment (and byte-order
1308  * reversal for little endian systems might be necessary on the
1309  * input and output byte streams.
1310  * The size of the key schedule depends on the number of rounds
1311  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1312  *
1313  * Parameters:
1314  * rk	Key schedule, of aes_ks_t (60 32-bit integers)
1315  * Nr	Number of rounds
1316  * pt	Input block (plain text)
1317  * ct	Output block (crypto text).  Can overlap with pt
1318  */
1319 static void
1320 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1321     uint32_t ct[4])
1322 {
1323 	uint32_t	s0, s1, s2, s3, t0, t1, t2, t3;
1324 	int		r;
1325 
1326 	/*
1327 	 * map byte array block to cipher state
1328 	 * and add initial round key:
1329 	 */
1330 
1331 	s0 = pt[0] ^ rk[0];
1332 	s1 = pt[1] ^ rk[1];
1333 	s2 = pt[2] ^ rk[2];
1334 	s3 = pt[3] ^ rk[3];
1335 
1336 	/*
1337 	 * Nr - 1 full rounds:
1338 	 */
1339 
1340 	r = Nr >> 1;
1341 
1342 	for (;;) {
1343 		t0 = Te0[s0 >> 24] ^
1344 		    Te1[(s1 >> 16) & 0xff] ^
1345 		    Te2[(s2 >>  8) & 0xff] ^
1346 		    Te3[s3 & 0xff] ^
1347 		    rk[4];
1348 
1349 		t1 = Te0[s1 >> 24] ^
1350 		    Te1[(s2 >> 16) & 0xff] ^
1351 		    Te2[(s3 >>  8) & 0xff] ^
1352 		    Te3[s0 & 0xff] ^
1353 		    rk[5];
1354 
1355 		t2 = Te0[s2 >> 24] ^
1356 		    Te1[(s3 >> 16) & 0xff] ^
1357 		    Te2[(s0 >>  8) & 0xff] ^
1358 		    Te3[s1 & 0xff] ^
1359 		    rk[6];
1360 
1361 		t3 = Te0[s3 >> 24] ^
1362 		    Te1[(s0 >> 16) & 0xff] ^
1363 		    Te2[(s1 >>  8) & 0xff] ^
1364 		    Te3[s2 & 0xff] ^
1365 		    rk[7];
1366 
1367 		rk += 8;
1368 
1369 		if (--r == 0) {
1370 			break;
1371 		}
1372 
1373 		s0 = Te0[t0 >> 24] ^
1374 		    Te1[(t1 >> 16) & 0xff] ^
1375 		    Te2[(t2 >>  8) & 0xff] ^
1376 		    Te3[t3 & 0xff] ^
1377 		    rk[0];
1378 
1379 		s1 = Te0[t1 >> 24] ^
1380 		    Te1[(t2 >> 16) & 0xff] ^
1381 		    Te2[(t3 >>  8) & 0xff] ^
1382 		    Te3[t0 & 0xff] ^
1383 		    rk[1];
1384 
1385 		s2 = Te0[t2 >> 24] ^
1386 		    Te1[(t3 >> 16) & 0xff] ^
1387 		    Te2[(t0 >>  8) & 0xff] ^
1388 		    Te3[t1 & 0xff] ^
1389 		    rk[2];
1390 
1391 		s3 = Te0[t3 >> 24] ^
1392 		    Te1[(t0 >> 16) & 0xff] ^
1393 		    Te2[(t1 >>  8) & 0xff] ^
1394 		    Te3[t2 & 0xff] ^
1395 		    rk[3];
1396 	}
1397 
1398 	/*
1399 	 * apply last round and
1400 	 * map cipher state to byte array block:
1401 	 */
1402 
1403 	s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1404 	    (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1405 	    (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1406 	    (Te4[t3 & 0xff] & 0x000000ff) ^
1407 	    rk[0];
1408 	ct[0] = s0;
1409 
1410 	s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1411 	    (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1412 	    (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1413 	    (Te4[t0 & 0xff] & 0x000000ff) ^
1414 	    rk[1];
1415 	ct[1] = s1;
1416 
1417 	s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1418 	    (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1419 	    (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1420 	    (Te4[t1 & 0xff] & 0x000000ff) ^
1421 	    rk[2];
1422 	ct[2] = s2;
1423 
1424 	s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1425 	    (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1426 	    (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1427 	    (Te4[t2 & 0xff] & 0x000000ff) ^
1428 	    rk[3];
1429 	ct[3] = s3;
1430 }
1431 
1432 
1433 /*
1434  * Decrypt one block of data. The block is assumed to be an array
1435  * of four uint32_t values, so copy for alignment (and byte-order
1436  * reversal for little endian systems might be necessary on the
1437  * input and output byte streams.
1438  * The size of the key schedule depends on the number of rounds
1439  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1440  *
1441  * Parameters:
1442  * rk	Key schedule, of aes_ks_t (60 32-bit integers)
1443  * Nr	Number of rounds
1444  * ct	Input block (crypto text)
1445  * pt	Output block (plain text). Can overlap with pt
1446  */
1447 static void
1448 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1449     uint32_t pt[4])
1450 {
1451 	uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1452 	int	 r;
1453 
1454 	/*
1455 	 * map byte array block to cipher state
1456 	 * and add initial round key:
1457 	 */
1458 	s0 = ct[0] ^ rk[0];
1459 	s1 = ct[1] ^ rk[1];
1460 	s2 = ct[2] ^ rk[2];
1461 	s3 = ct[3] ^ rk[3];
1462 
1463 	/*
1464 	 * Nr - 1 full rounds:
1465 	 */
1466 
1467 	r = Nr >> 1;
1468 
1469 	for (;;) {
1470 		t0 = Td0[s0 >> 24] ^
1471 		    Td1[(s3 >> 16) & 0xff] ^
1472 		    Td2[(s2 >> 8) & 0xff] ^
1473 		    Td3[s1 & 0xff] ^
1474 		    rk[4];
1475 
1476 		t1 = Td0[s1 >> 24] ^
1477 		    Td1[(s0 >> 16) & 0xff] ^
1478 		    Td2[(s3 >>  8) & 0xff] ^
1479 		    Td3[s2 & 0xff] ^
1480 		    rk[5];
1481 
1482 		t2 = Td0[s2 >> 24] ^
1483 		    Td1[(s1 >> 16) & 0xff] ^
1484 		    Td2[(s0 >>  8) & 0xff] ^
1485 		    Td3[s3 & 0xff] ^
1486 		    rk[6];
1487 
1488 		t3 = Td0[s3 >> 24] ^
1489 		    Td1[(s2 >> 16) & 0xff] ^
1490 		    Td2[(s1 >> 8) & 0xff] ^
1491 		    Td3[s0 & 0xff] ^
1492 		    rk[7];
1493 
1494 		rk += 8;
1495 
1496 		if (--r == 0) {
1497 			break;
1498 		}
1499 
1500 		s0 = Td0[t0 >> 24] ^
1501 		    Td1[(t3 >> 16) & 0xff] ^
1502 		    Td2[(t2 >> 8) & 0xff] ^
1503 		    Td3[t1 & 0xff] ^
1504 		    rk[0];
1505 
1506 		s1 = Td0[t1 >> 24] ^
1507 		    Td1[(t0 >> 16) & 0xff] ^
1508 		    Td2[(t3 >> 8) & 0xff] ^
1509 		    Td3[t2 & 0xff] ^
1510 		    rk[1];
1511 
1512 		s2 = Td0[t2 >> 24] ^
1513 		    Td1[(t1 >> 16) & 0xff] ^
1514 		    Td2[(t0 >> 8) & 0xff] ^
1515 		    Td3[t3 & 0xff] ^
1516 		    rk[2];
1517 
1518 		s3 = Td0[t3 >> 24] ^
1519 		    Td1[(t2 >> 16) & 0xff] ^
1520 		    Td2[(t1 >> 8) & 0xff] ^
1521 		    Td3[t0 & 0xff] ^
1522 		    rk[3];
1523 	}
1524 
1525 	/*
1526 	 * apply last round and
1527 	 * map cipher state to byte array block:
1528 	 */
1529 
1530 	s0 = (Td4[t0 >> 24] & 0xff000000) ^
1531 	    (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1532 	    (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1533 	    (Td4[t1 & 0xff] & 0x000000ff) ^
1534 	    rk[0];
1535 	pt[0] = s0;
1536 
1537 	s1 = (Td4[t1 >> 24] & 0xff000000) ^
1538 	    (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1539 	    (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1540 	    (Td4[t2 & 0xff] & 0x000000ff) ^
1541 	    rk[1];
1542 	pt[1] = s1;
1543 
1544 	s2 = (Td4[t2 >> 24] & 0xff000000) ^
1545 	    (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1546 	    (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1547 	    (Td4[t3 & 0xff] & 0x000000ff) ^
1548 	    rk[2];
1549 	pt[2] = s2;
1550 
1551 	s3 = (Td4[t3 >> 24] & 0xff000000) ^
1552 	    (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1553 	    (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1554 	    (Td4[t0 & 0xff] & 0x000000ff) ^
1555 	    rk[3];
1556 	pt[3] = s3;
1557 }
1558 #endif	/* sun4u, __amd64 */
1559 /* EXPORT DELETE END */
1560 
1561 
1562 /*
1563  * Initialize AES encryption and decryption key schedules.
1564  *
1565  * Parameters:
1566  * cipherKey	User key
1567  * keyBits	AES key size (128, 192, or 256 bits)
1568  * keysched	AES key schedule to be initialized, of type aes_key_t.
1569  *		Allocated by aes_alloc_keysched().
1570  */
1571 void
1572 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1573 {
1574 /* EXPORT DELETE START */
1575 	aes_key_t	*newbie = keysched;
1576 	uint_t		keysize, i, j;
1577 	union {
1578 		uint64_t	ka64[4];
1579 		uint32_t	ka32[8];
1580 		} keyarr;
1581 
1582 	switch (keyBits) {
1583 	case 128:
1584 		newbie->nr = 10;
1585 		break;
1586 
1587 	case 192:
1588 		newbie->nr = 12;
1589 		break;
1590 
1591 	case 256:
1592 		newbie->nr = 14;
1593 		break;
1594 
1595 	default:
1596 		/* should never get here */
1597 		return;
1598 	}
1599 	keysize = CRYPTO_BITS2BYTES(keyBits);
1600 
1601 	/*
1602 	 * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1603 	 * 4 bytes in the key.  On _BIG_ENDIAN and AMD64, copy the key
1604 	 * without reversing bytes.
1605 	 * For AMD64, do not byte swap for aes_setupkeys().
1606 	 *
1607 	 * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1608 	 * X86/AMD64  uses a key schedule array with 32-bit elements.
1609 	 */
1610 #ifndef	AES_BYTE_SWAP
1611 	if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1612 		for (i = 0, j = 0; j < keysize; i++, j += 8) {
1613 			/* LINTED: pointer alignment */
1614 			keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1615 		}
1616 	} else {
1617 		bcopy(cipherKey, keyarr.ka32, keysize);
1618 	}
1619 
1620 #else	/* byte swap */
1621 	for (i = 0, j = 0; j < keysize; i++, j += 4) {
1622 		keyarr.ka32[i] = htonl(*(uint32_t *)(void *)&cipherKey[j]);
1623 	}
1624 #endif
1625 
1626 	aes_setupkeys(newbie, keyarr.ka32, keyBits);
1627 /* EXPORT DELETE END */
1628 }
1629 
1630 
1631 /*
1632  * Encrypt one block using AES.
1633  * Align if needed and (for x86 32-bit only) byte-swap.
1634  *
1635  * Parameters:
1636  * ks	Key schedule, of type aes_key_t
1637  * pt	Input block (plain text)
1638  * ct	Output block (crypto text).  Can overlap with pt
1639  */
1640 int
1641 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1642 {
1643 /* EXPORT DELETE START */
1644 	aes_key_t	*ksch = (aes_key_t *)ks;
1645 
1646 #ifndef	AES_BYTE_SWAP
1647 	if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1648 		/* LINTED:  pointer alignment */
1649 		AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1650 		    /* LINTED:  pointer alignment */
1651 		    (uint32_t *)pt, (uint32_t *)ct, ksch->flags);
1652 	} else {
1653 #endif
1654 		uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1655 
1656 		/* Copy input block into buffer */
1657 #ifndef	AES_BYTE_SWAP
1658 		bcopy(pt, &buffer, AES_BLOCK_LEN);
1659 
1660 #else	/* byte swap */
1661 		buffer[0] = htonl(*(uint32_t *)(void *)&pt[0]);
1662 		buffer[1] = htonl(*(uint32_t *)(void *)&pt[4]);
1663 		buffer[2] = htonl(*(uint32_t *)(void *)&pt[8]);
1664 		buffer[3] = htonl(*(uint32_t *)(void *)&pt[12]);
1665 #endif
1666 
1667 		AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1668 		    buffer, buffer, ksch->flags);
1669 
1670 		/* Copy result from buffer to output block */
1671 #ifndef	AES_BYTE_SWAP
1672 		bcopy(&buffer, ct, AES_BLOCK_LEN);
1673 	}
1674 
1675 #else	/* byte swap */
1676 		*(uint32_t *)(void *)&ct[0] = htonl(buffer[0]);
1677 		*(uint32_t *)(void *)&ct[4] = htonl(buffer[1]);
1678 		*(uint32_t *)(void *)&ct[8] = htonl(buffer[2]);
1679 		*(uint32_t *)(void *)&ct[12] = htonl(buffer[3]);
1680 #endif
1681 /* EXPORT DELETE END */
1682 	return (CRYPTO_SUCCESS);
1683 }
1684 
1685 
1686 /*
1687  * Decrypt one block using AES.
1688  * Align and byte-swap if needed.
1689  *
1690  * Parameters:
1691  * ks	Key schedule, of type aes_key_t
1692  * ct	Input block (crypto text)
1693  * pt	Output block (plain text). Can overlap with pt
1694  */
1695 int
1696 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1697 {
1698 /* EXPORT DELETE START */
1699 	aes_key_t	*ksch = (aes_key_t *)ks;
1700 
1701 #ifndef	AES_BYTE_SWAP
1702 	if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1703 		/* LINTED:  pointer alignment */
1704 		AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1705 		    /* LINTED:  pointer alignment */
1706 		    (uint32_t *)ct, (uint32_t *)pt, ksch->flags);
1707 	} else {
1708 #endif
1709 		uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1710 
1711 		/* Copy input block into buffer */
1712 #ifndef	AES_BYTE_SWAP
1713 		bcopy(ct, &buffer, AES_BLOCK_LEN);
1714 
1715 #else	/* byte swap */
1716 		buffer[0] = htonl(*(uint32_t *)(void *)&ct[0]);
1717 		buffer[1] = htonl(*(uint32_t *)(void *)&ct[4]);
1718 		buffer[2] = htonl(*(uint32_t *)(void *)&ct[8]);
1719 		buffer[3] = htonl(*(uint32_t *)(void *)&ct[12]);
1720 #endif
1721 
1722 		AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1723 		    buffer, buffer, ksch->flags);
1724 
1725 		/* Copy result from buffer to output block */
1726 #ifndef	AES_BYTE_SWAP
1727 		bcopy(&buffer, pt, AES_BLOCK_LEN);
1728 	}
1729 
1730 #else	/* byte swap */
1731 	*(uint32_t *)(void *)&pt[0] = htonl(buffer[0]);
1732 	*(uint32_t *)(void *)&pt[4] = htonl(buffer[1]);
1733 	*(uint32_t *)(void *)&pt[8] = htonl(buffer[2]);
1734 	*(uint32_t *)(void *)&pt[12] = htonl(buffer[3]);
1735 #endif
1736 
1737 /* EXPORT DELETE END */
1738 	return (CRYPTO_SUCCESS);
1739 }
1740 
1741 
1742 /*
1743  * Allocate key schedule for AES.
1744  *
1745  * Return the pointer and set size to the number of bytes allocated.
1746  * Memory allocated must be freed by the caller when done.
1747  *
1748  * Parameters:
1749  * size		Size of key schedule allocated, in bytes
1750  * kmflag	Flag passed to kmem_alloc(9F); ignored in userland.
1751  */
1752 /* ARGSUSED */
1753 void *
1754 aes_alloc_keysched(size_t *size, int kmflag)
1755 {
1756 /* EXPORT DELETE START */
1757 	aes_key_t *keysched;
1758 
1759 #ifdef	_KERNEL
1760 	keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1761 #else	/* !_KERNEL */
1762 	keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1763 #endif	/* _KERNEL */
1764 
1765 	if (keysched != NULL) {
1766 		*size = sizeof (aes_key_t);
1767 		return (keysched);
1768 	}
1769 /* EXPORT DELETE END */
1770 	return (NULL);
1771 }
1772 
1773 
1774 #ifdef __amd64
1775 /*
1776  * Return 1 if executing on Intel with AES-NI instructions,
1777  * otherwise 0 (i.e., Intel without AES-NI or AMD64).
1778  * Cache the result, as the CPU can't change.
1779  *
1780  * Note: the userland version uses getisax().  The kernel version uses
1781  * global variable x86_featureset.
1782  */
1783 static int
1784 intel_aes_instructions_present(void)
1785 {
1786 	static int	cached_result = -1;
1787 
1788 	if (cached_result == -1) { /* first time */
1789 #ifdef _KERNEL
1790 		cached_result = is_x86_feature(x86_featureset, X86FSET_AES);
1791 #else
1792 		uint_t		ui = 0;
1793 
1794 		(void) getisax(&ui, 1);
1795 		cached_result = (ui & AV_386_AES) != 0;
1796 #endif	/* _KERNEL */
1797 	}
1798 
1799 	return (cached_result);
1800 }
1801 #endif	/* __amd64 */
1802