1 /*
   2  * CDDL HEADER START
   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 /*
  22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
  23  * Use is subject to license terms.
  24  */
  25 
  26 #pragma ident   "%Z%%M% %I%     %E% SMI"
  27 
  28 #include <sys/types.h>
  29 #include <sys/systm.h>
  30 #include <sys/ddi.h>
  31 #include <sys/sysmacros.h>
  32 #include <sys/strsun.h>
  33 #include <netinet/in.h>
  34 #include <sys/crypto/spi.h>
  35 #include <modes/modes.h>
  36 #include "aes_impl.h"
  37 #ifndef _KERNEL
  38 #include <strings.h>
  39 #include <stdlib.h>
  40 #endif  /* !_KERNEL */
  41 
  42 
  43 /*
  44  * This file is derived from the file  rijndael-alg-fst.c  taken from the
  45  * "optimized C code v3.0" on the "rijndael home page"
  46  * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
  47  * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
  48  *
  49  * The following note is from the original file:
  50  */
  51 
  52 /*
  53  * rijndael-alg-fst.c
  54  *
  55  * @version 3.0 (December 2000)
  56  *
  57  * Optimised ANSI C code for the Rijndael cipher (now AES)
  58  *
  59  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
  60  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
  61  * @author Paulo Barreto <paulo.barreto@terra.com.br>
  62  *
  63  * This code is hereby placed in the public domain.
  64  *
  65  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
  66  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  67  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  68  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
  69  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  70  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  71  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  72  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  73  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  74  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
  75  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  76  */
  77 
  78 /* EXPORT DELETE START */
  79 
  80 #if defined(sun4u) || defined(__amd64)
  81 /* External assembly functions: */
  82 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4],
  83         uint32_t ct[4]);
  84 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4],
  85         uint32_t pt[4]);
  86 #define AES_ENCRYPT_IMPL                aes_encrypt_impl
  87 #define AES_DECRYPT_IMPL                aes_decrypt_impl
  88 
  89 #ifdef  __amd64
  90 extern int rijndael_key_setup_enc(uint32_t rk[], const uint32_t cipherKey[],
  91         int keyBits);
  92 extern int rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[],
  93         int keyBits);
  94 #endif
  95 
  96 #else
  97 #define AES_ENCRYPT_IMPL                rijndael_encrypt
  98 #define AES_DECRYPT_IMPL                rijndael_decrypt
  99 #define rijndael_key_setup_enc_raw      rijndael_key_setup_enc
 100 #endif  /* sun4u || __amd64 */
 101 
 102 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
 103 #define AES_BYTE_SWAP
 104 #endif
 105 
 106 #ifndef __amd64
 107 /*
 108  *  Constant tables
 109  */
 110 
 111 /*
 112  * Te0[x] = S [x].[02, 01, 01, 03];
 113  * Te1[x] = S [x].[03, 02, 01, 01];
 114  * Te2[x] = S [x].[01, 03, 02, 01];
 115  * Te3[x] = S [x].[01, 01, 03, 02];
 116  * Te4[x] = S [x].[01, 01, 01, 01];
 117  *
 118  * Td0[x] = Si[x].[0e, 09, 0d, 0b];
 119  * Td1[x] = Si[x].[0b, 0e, 09, 0d];
 120  * Td2[x] = Si[x].[0d, 0b, 0e, 09];
 121  * Td3[x] = Si[x].[09, 0d, 0b, 0e];
 122  * Td4[x] = Si[x].[01, 01, 01, 01];
 123  */
 124 
 125 /* Encrypt Sbox constants (for the substitute bytes operation) */
 126 
 127 static const uint32_t Te0[256] =
 128 {
 129         0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
 130         0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
 131         0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
 132         0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
 133         0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
 134         0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
 135         0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
 136         0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
 137         0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
 138         0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
 139         0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
 140         0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
 141         0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
 142         0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
 143         0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
 144         0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
 145         0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
 146         0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
 147         0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
 148         0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
 149         0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
 150         0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
 151         0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
 152         0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
 153         0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
 154         0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
 155         0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
 156         0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
 157         0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
 158         0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
 159         0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
 160         0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
 161         0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
 162         0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
 163         0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
 164         0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
 165         0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
 166         0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
 167         0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
 168         0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
 169         0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
 170         0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
 171         0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
 172         0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
 173         0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
 174         0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
 175         0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
 176         0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
 177         0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
 178         0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
 179         0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
 180         0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
 181         0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
 182         0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
 183         0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
 184         0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
 185         0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
 186         0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
 187         0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
 188         0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
 189         0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
 190         0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
 191         0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
 192         0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
 193 };
 194 
 195 
 196 static const uint32_t Te1[256] =
 197 {
 198         0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
 199         0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
 200         0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
 201         0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
 202         0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
 203         0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
 204         0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
 205         0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
 206         0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
 207         0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
 208         0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
 209         0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
 210         0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
 211         0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
 212         0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
 213         0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
 214         0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
 215         0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
 216         0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
 217         0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
 218         0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
 219         0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
 220         0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
 221         0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
 222         0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
 223         0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
 224         0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
 225         0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
 226         0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
 227         0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
 228         0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
 229         0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
 230         0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
 231         0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
 232         0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
 233         0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
 234         0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
 235         0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
 236         0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
 237         0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
 238         0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
 239         0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
 240         0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
 241         0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
 242         0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
 243         0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
 244         0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
 245         0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
 246         0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
 247         0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
 248         0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
 249         0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
 250         0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
 251         0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
 252         0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
 253         0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
 254         0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
 255         0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
 256         0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
 257         0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
 258         0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
 259         0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
 260         0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
 261         0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
 262 };
 263 
 264 
 265 static const uint32_t Te2[256] =
 266 {
 267         0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
 268         0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
 269         0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
 270         0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
 271         0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
 272         0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
 273         0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
 274         0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
 275         0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
 276         0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
 277         0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
 278         0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
 279         0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
 280         0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
 281         0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
 282         0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
 283         0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
 284         0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
 285         0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
 286         0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
 287         0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
 288         0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
 289         0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
 290         0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
 291         0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
 292         0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
 293         0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
 294         0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
 295         0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
 296         0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
 297         0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
 298         0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
 299         0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
 300         0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
 301         0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
 302         0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
 303         0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
 304         0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
 305         0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
 306         0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
 307         0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
 308         0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
 309         0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
 310         0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
 311         0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
 312         0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
 313         0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
 314         0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
 315         0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
 316         0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
 317         0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
 318         0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
 319         0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
 320         0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
 321         0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
 322         0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
 323         0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
 324         0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
 325         0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
 326         0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
 327         0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
 328         0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
 329         0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
 330         0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
 331 };
 332 
 333 
 334 static const uint32_t Te3[256] =
 335 {
 336         0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
 337         0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
 338         0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
 339         0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
 340         0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
 341         0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
 342         0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
 343         0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
 344         0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
 345         0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
 346         0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
 347         0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
 348         0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
 349         0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
 350         0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
 351         0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
 352         0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
 353         0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
 354         0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
 355         0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
 356         0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
 357         0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
 358         0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
 359         0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
 360         0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
 361         0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
 362         0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
 363         0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
 364         0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
 365         0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
 366         0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
 367         0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
 368         0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
 369         0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
 370         0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
 371         0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
 372         0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
 373         0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
 374         0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
 375         0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
 376         0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
 377         0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
 378         0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
 379         0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
 380         0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
 381         0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
 382         0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
 383         0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
 384         0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
 385         0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
 386         0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
 387         0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
 388         0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
 389         0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
 390         0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
 391         0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
 392         0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
 393         0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
 394         0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
 395         0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
 396         0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
 397         0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
 398         0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
 399         0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
 400 };
 401 
 402 static const uint32_t Te4[256] =
 403 {
 404         0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
 405         0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
 406         0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
 407         0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
 408         0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
 409         0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
 410         0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
 411         0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
 412         0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
 413         0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
 414         0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
 415         0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
 416         0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
 417         0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
 418         0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
 419         0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
 420         0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
 421         0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
 422         0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
 423         0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
 424         0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
 425         0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
 426         0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
 427         0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
 428         0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
 429         0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
 430         0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
 431         0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
 432         0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
 433         0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
 434         0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
 435         0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
 436         0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
 437         0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
 438         0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
 439         0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
 440         0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
 441         0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
 442         0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
 443         0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
 444         0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
 445         0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
 446         0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
 447         0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
 448         0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
 449         0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
 450         0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
 451         0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
 452         0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
 453         0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
 454         0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
 455         0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
 456         0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
 457         0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
 458         0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
 459         0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
 460         0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
 461         0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
 462         0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
 463         0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
 464         0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
 465         0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
 466         0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
 467         0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
 468 };
 469 
 470 /* Decrypt Sbox constants (for the substitute bytes operation) */
 471 
 472 static const uint32_t Td0[256] =
 473 {
 474         0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
 475         0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
 476         0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
 477         0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
 478         0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
 479         0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
 480         0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
 481         0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
 482         0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
 483         0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
 484         0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
 485         0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
 486         0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
 487         0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
 488         0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
 489         0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
 490         0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
 491         0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
 492         0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
 493         0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
 494         0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
 495         0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
 496         0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
 497         0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
 498         0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
 499         0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
 500         0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
 501         0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
 502         0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
 503         0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
 504         0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
 505         0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
 506         0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
 507         0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
 508         0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
 509         0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
 510         0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
 511         0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
 512         0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
 513         0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
 514         0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
 515         0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
 516         0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
 517         0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
 518         0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
 519         0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
 520         0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
 521         0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
 522         0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
 523         0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
 524         0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
 525         0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
 526         0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
 527         0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
 528         0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
 529         0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
 530         0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
 531         0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
 532         0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
 533         0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
 534         0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
 535         0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
 536         0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
 537         0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
 538 };
 539 
 540 static const uint32_t Td1[256] =
 541 {
 542         0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
 543         0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
 544         0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
 545         0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
 546         0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
 547         0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
 548         0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
 549         0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
 550         0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
 551         0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
 552         0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
 553         0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
 554         0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
 555         0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
 556         0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
 557         0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
 558         0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
 559         0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
 560         0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
 561         0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
 562         0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
 563         0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
 564         0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
 565         0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
 566         0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
 567         0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
 568         0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
 569         0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
 570         0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
 571         0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
 572         0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
 573         0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
 574         0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
 575         0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
 576         0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
 577         0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
 578         0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
 579         0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
 580         0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
 581         0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
 582         0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
 583         0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
 584         0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
 585         0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
 586         0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
 587         0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
 588         0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
 589         0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
 590         0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
 591         0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
 592         0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
 593         0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
 594         0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
 595         0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
 596         0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
 597         0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
 598         0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
 599         0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
 600         0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
 601         0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
 602         0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
 603         0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
 604         0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
 605         0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
 606 };
 607 
 608 static const uint32_t Td2[256] =
 609 {
 610         0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
 611         0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
 612         0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
 613         0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
 614         0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
 615         0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
 616         0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
 617         0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
 618         0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
 619         0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
 620         0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
 621         0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
 622         0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
 623         0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
 624         0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
 625         0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
 626         0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
 627         0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
 628         0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
 629         0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
 630         0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
 631         0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
 632         0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
 633         0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
 634         0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
 635         0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
 636         0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
 637         0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
 638         0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
 639         0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
 640         0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
 641         0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
 642         0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
 643         0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
 644         0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
 645         0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
 646         0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
 647         0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
 648         0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
 649         0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
 650         0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
 651         0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
 652         0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
 653         0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
 654         0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
 655         0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
 656         0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
 657         0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
 658         0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
 659         0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
 660         0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
 661         0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
 662         0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
 663         0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
 664         0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
 665         0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
 666         0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
 667         0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
 668         0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
 669         0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
 670         0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
 671         0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
 672         0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
 673         0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
 674 };
 675 
 676 static const uint32_t Td3[256] =
 677 {
 678         0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
 679         0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
 680         0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
 681         0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
 682         0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
 683         0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
 684         0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
 685         0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
 686         0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
 687         0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
 688         0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
 689         0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
 690         0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
 691         0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
 692         0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
 693         0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
 694         0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
 695         0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
 696         0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
 697         0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
 698         0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
 699         0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
 700         0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
 701         0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
 702         0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
 703         0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
 704         0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
 705         0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
 706         0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
 707         0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
 708         0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
 709         0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
 710         0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
 711         0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
 712         0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
 713         0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
 714         0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
 715         0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
 716         0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
 717         0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
 718         0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
 719         0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
 720         0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
 721         0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
 722         0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
 723         0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
 724         0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
 725         0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
 726         0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
 727         0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
 728         0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
 729         0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
 730         0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
 731         0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
 732         0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
 733         0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
 734         0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
 735         0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
 736         0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
 737         0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
 738         0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
 739         0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
 740         0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
 741         0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
 742 };
 743 
 744 
 745 static const uint32_t Td4[256] =
 746 {
 747         0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
 748         0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
 749         0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
 750         0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
 751         0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
 752         0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
 753         0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
 754         0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
 755         0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
 756         0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
 757         0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
 758         0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
 759         0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
 760         0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
 761         0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
 762         0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
 763         0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
 764         0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
 765         0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
 766         0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
 767         0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
 768         0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
 769         0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
 770         0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
 771         0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
 772         0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
 773         0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
 774         0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
 775         0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
 776         0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
 777         0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
 778         0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
 779         0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
 780         0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
 781         0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
 782         0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
 783         0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
 784         0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
 785         0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
 786         0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
 787         0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
 788         0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
 789         0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
 790         0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
 791         0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
 792         0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
 793         0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
 794         0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
 795         0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
 796         0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
 797         0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
 798         0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
 799         0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
 800         0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
 801         0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
 802         0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
 803         0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
 804         0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
 805         0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
 806         0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
 807         0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
 808         0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
 809         0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
 810         0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
 811 };
 812 
 813 /* Rcon is Round Constant; used for encryption key expansion */
 814 static const uint32_t rcon[RC_LENGTH] =
 815 {
 816         /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 817         0x01000000, 0x02000000, 0x04000000, 0x08000000,
 818         0x10000000, 0x20000000, 0x40000000, 0x80000000,
 819         0x1B000000, 0x36000000
 820 };
 821 
 822 
 823 /*
 824  * Expand the cipher key into the encryption key schedule.
 825  *
 826  * Return the number of rounds for the given cipher key size.
 827  * The size of the key schedule depends on the number of rounds
 828  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 829  *
 830  * Parameters:
 831  * rk           AES key schedule 32-bit array to be initialized
 832  * cipherKey    User key
 833  * keyBits      AES key size (128, 192, or 256 bits)
 834  */
 835 static int
 836 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
 837     int keyBits)
 838 {
 839         int             i = 0;
 840         uint32_t        temp;
 841 
 842         rk[0] = cipherKey[0];
 843         rk[1] = cipherKey[1];
 844         rk[2] = cipherKey[2];
 845         rk[3] = cipherKey[3];
 846 
 847         if (keyBits == 128) {
 848                 for (;;) {
 849                         temp  = rk[3];
 850                         rk[4] = rk[0] ^
 851                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 852                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 853                             (Te4[temp & 0xff] & 0x0000ff00) ^
 854                             (Te4[temp >> 24] & 0x000000ff) ^
 855                             rcon[i];
 856                         rk[5] = rk[1] ^ rk[4];
 857                         rk[6] = rk[2] ^ rk[5];
 858                         rk[7] = rk[3] ^ rk[6];
 859 
 860                         if (++i == 10) {
 861                                 return (10);
 862                         }
 863                         rk += 4;
 864                 }
 865         }
 866 
 867         rk[4] = cipherKey[4];
 868         rk[5] = cipherKey[5];
 869 
 870         if (keyBits == 192) {
 871                 for (;;) {
 872                         temp = rk[5];
 873                         rk[6] = rk[0] ^
 874                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 875                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 876                             (Te4[temp & 0xff] & 0x0000ff00) ^
 877                             (Te4[temp >> 24] & 0x000000ff) ^
 878                             rcon[i];
 879                         rk[7] = rk[1] ^ rk[6];
 880                         rk[8] = rk[2] ^ rk[7];
 881                         rk[9] = rk[3] ^ rk[8];
 882 
 883                         if (++i == 8) {
 884                                 return (12);
 885                         }
 886 
 887                         rk[10] = rk[4] ^ rk[9];
 888                         rk[11] = rk[5] ^ rk[10];
 889                         rk += 6;
 890                 }
 891         }
 892 
 893         rk[6] = cipherKey[6];
 894         rk[7] = cipherKey[7];
 895 
 896         if (keyBits == 256) {
 897                 for (;;) {
 898                         temp = rk[7];
 899                         rk[8] = rk[0] ^
 900                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 901                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 902                             (Te4[temp & 0xff] & 0x0000ff00) ^
 903                             (Te4[temp >> 24] & 0x000000ff) ^
 904                             rcon[i];
 905                         rk[9] = rk[1] ^ rk[8];
 906                         rk[10] = rk[2] ^ rk[9];
 907                         rk[11] = rk[3] ^ rk[10];
 908 
 909                         if (++i == 7) {
 910                                 return (14);
 911                         }
 912                         temp = rk[11];
 913                         rk[12] = rk[4] ^
 914                             (Te4[temp >> 24] & 0xff000000) ^
 915                             (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
 916                             (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
 917                             (Te4[temp & 0xff] & 0x000000ff);
 918                         rk[13] = rk[5] ^ rk[12];
 919                         rk[14] = rk[6] ^ rk[13];
 920                         rk[15] = rk[7] ^ rk[14];
 921 
 922                         rk += 8;
 923                 }
 924         }
 925 
 926         return (0);
 927 }
 928 #endif  /* !__amd64 */
 929 
 930 
 931 #ifdef  sun4u
 932 
 933 /*
 934  * Expand the cipher key into the encryption key schedule.
 935  * by the sun4u optimized assembly implementation.
 936  *
 937  * Return the number of rounds for the given cipher key size.
 938  * The size of the key schedule depends on the number of rounds
 939  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 940  *
 941  * Parameters:
 942  * rk           AES key schedule 64-bit array to be initialized
 943  * cipherKey    User key
 944  * keyBits      AES key size (128, 192, or 256 bits)
 945  */
 946 static int
 947 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
 948 {
 949         uint32_t        rk1[4 * (MAX_AES_NR + 1)];
 950         uint64_t        *rk64 = (uint64_t *)rk;
 951         uint32_t        *rkt;
 952         uint64_t        t;
 953         int             i, Nr;
 954 
 955         Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
 956 
 957         for (i = 0; i < 4 * Nr; i++) {
 958                 t = (uint64_t)(rk1[i]);
 959                 rk64[i] = ((t & 0xff000000) << 11) |
 960                     ((t & 0xff0000) << 8) |
 961                     ((t & 0xffff) << 3);
 962         }
 963 
 964         rkt = (uint32_t *)(&(rk64[4 * Nr]));
 965 
 966         for (i = 0; i < 4; i++) {
 967                 rkt[i] = rk1[4 * Nr+i];
 968         }
 969 
 970         return (Nr);
 971 }
 972 
 973 
 974 /*
 975  * Expand the cipher key into the decryption key schedule as used
 976  * by the sun4u optimized assembly implementation.
 977  *
 978  * Return the number of rounds for the given cipher key size.
 979  * The size of the key schedule depends on the number of rounds
 980  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 981  *
 982  * Parameters:
 983  * rk           AES key schedule 32-bit array to be initialized
 984  * cipherKey    User key
 985  * keyBits      AES key size (128, 192, or 256 bits)
 986  */
 987 static int
 988 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
 989     int keyBits)
 990 {
 991         int             Nr, i;
 992         uint32_t        temp;
 993 
 994         /* expand the cipher key: */
 995         Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
 996 
 997         /* invert the order of the round keys: */
 998 
 999         for (i = 0; i < 2 * Nr + 2; i++) {
1000                 temp = rk[i];
1001                 rk[i] = rk[4 * Nr - i + 3];
1002                 rk[4 * Nr - i + 3] = temp;
1003         }
1004 
1005         /*
1006          * apply the inverse MixColumn transform to all
1007          * round keys but the first and the last:
1008          */
1009         for (i = 1; i < Nr; i++) {
1010                 rk += 4;
1011                 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1012                     Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1013                     Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1014                     Td3[Te4[rk[0] & 0xff] & 0xff];
1015                 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1016                     Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1017                     Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1018                     Td3[Te4[rk[1] & 0xff] & 0xff];
1019                 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1020                     Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1021                     Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1022                     Td3[Te4[rk[2] & 0xff] & 0xff];
1023                 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1024                     Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1025                     Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1026                     Td3[Te4[rk[3] & 0xff] & 0xff];
1027         }
1028 
1029         return (Nr);
1030 }
1031 
1032 
1033 /*
1034  * The size of the key schedule depends on the number of rounds
1035  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1036  *
1037  * Parameters:
1038  * rk           AES key schedule 64-bit array to be initialized
1039  * cipherKey    User key
1040  * keyBits      AES key size (128, 192, or 256 bits)
1041  */
1042 static int
1043 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
1044 {
1045         uint32_t        rk1[4 * (MAX_AES_NR + 1)];
1046         uint64_t        *rk64 = (uint64_t *)rk;
1047         uint32_t        *rkt;
1048         uint64_t        t;
1049         int             i, Nr;
1050 
1051         Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
1052         for (i = 0; i < 4 * Nr; i++) {
1053                 t = (uint64_t)(rk1[i]);
1054                 rk64[i] = ((t & 0xff000000) << 11) |
1055                     ((t & 0xff0000) << 8) |
1056                     ((t & 0xffff) << 3);
1057         }
1058 
1059         rkt = (uint32_t *)(&(rk64[4 * Nr]));
1060 
1061         for (i = 0; i < 4; i++) {
1062                 rkt[i] = rk1[4 * Nr + i];
1063         }
1064 
1065         return (Nr);
1066 }
1067 
1068 
1069 /*
1070  * Expand the 64-bit AES cipher key array into the encryption and decryption
1071  * key schedules.
1072  *
1073  * Parameters:
1074  * key          AES key schedule to be initialized
1075  * keyarr32     User key
1076  * keyBits      AES key size (128, 192, or 256 bits)
1077  */
1078 static void
1079 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1080 {
1081         key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1082             keybits);
1083         key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1084             keybits);
1085         key->type = AES_64BIT_KS;
1086 }
1087 
1088 
1089 #elif !defined(__amd64)
1090 
1091 /*
1092  *  Expand the cipher key into the decryption key schedule.
1093  *  Return the number of rounds for the given cipher key size.
1094  *  The size of the key schedule depends on the number of rounds
1095  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1096  *
1097  * Parameters:
1098  * rk           AES key schedule 32-bit array to be initialized
1099  * cipherKey    User key
1100  * keyBits      AES key size (128, 192, or 256 bits)
1101  */
1102 static int
1103 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1104 {
1105         int      Nr, i, j;
1106         uint32_t temp;
1107 
1108         /* expand the cipher key: */
1109         Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1110 
1111         /* invert the order of the round keys: */
1112         for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1113                 temp = rk[i];
1114                 rk[i] = rk[j];
1115                 rk[j] = temp;
1116                 temp = rk[i + 1];
1117                 rk[i + 1] = rk[j + 1];
1118                 rk[j + 1] = temp;
1119                 temp = rk[i + 2];
1120                 rk[i + 2] = rk[j + 2];
1121                 rk[j + 2] = temp;
1122                 temp = rk[i + 3];
1123                 rk[i + 3] = rk[j + 3];
1124                 rk[j + 3] = temp;
1125         }
1126 
1127         /*
1128          * apply the inverse MixColumn transform to all
1129          * round keys but the first and the last:
1130          */
1131         for (i = 1; i < Nr; i++) {
1132                 rk += 4;
1133                 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1134                     Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1135                     Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1136                     Td3[Te4[rk[0] & 0xff] & 0xff];
1137                 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1138                     Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1139                     Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1140                     Td3[Te4[rk[1] & 0xff] & 0xff];
1141                 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1142                     Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1143                     Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1144                     Td3[Te4[rk[2] & 0xff] & 0xff];
1145                 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1146                     Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1147                     Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1148                     Td3[Te4[rk[3] & 0xff] & 0xff];
1149         }
1150 
1151         return (Nr);
1152 }
1153 
1154 
1155 /*
1156  * Encrypt one block of data. The block is assumed to be an array
1157  * of four uint32_t values, so copy for alignment (and byte-order
1158  * reversal for little endian systems might be necessary on the
1159  * input and output byte streams.
1160  * The size of the key schedule depends on the number of rounds
1161  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1162  *
1163  * Parameters:
1164  * rk   Key schedule, of aes_ks_t (60 32-bit integers)
1165  * Nr   Number of rounds
1166  * pt   Input block (plain text)
1167  * ct   Output block (crypto text).  Can overlap with pt
1168  */
1169 static void
1170 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1171     uint32_t ct[4])
1172 {
1173         uint32_t        s0, s1, s2, s3, t0, t1, t2, t3;
1174         int             r;
1175 
1176         /*
1177          * map byte array block to cipher state
1178          * and add initial round key:
1179          */
1180 
1181         s0 = pt[0] ^ rk[0];
1182         s1 = pt[1] ^ rk[1];
1183         s2 = pt[2] ^ rk[2];
1184         s3 = pt[3] ^ rk[3];
1185 
1186         /*
1187          * Nr - 1 full rounds:
1188          */
1189 
1190         r = Nr >> 1;
1191 
1192         for (;;) {
1193                 t0 = Te0[s0 >> 24] ^
1194                     Te1[(s1 >> 16) & 0xff] ^
1195                     Te2[(s2 >>  8) & 0xff] ^
1196                     Te3[s3 & 0xff] ^
1197                     rk[4];
1198 
1199                 t1 = Te0[s1 >> 24] ^
1200                     Te1[(s2 >> 16) & 0xff] ^
1201                     Te2[(s3 >>  8) & 0xff] ^
1202                     Te3[s0 & 0xff] ^
1203                     rk[5];
1204 
1205                 t2 = Te0[s2 >> 24] ^
1206                     Te1[(s3 >> 16) & 0xff] ^
1207                     Te2[(s0 >>  8) & 0xff] ^
1208                     Te3[s1 & 0xff] ^
1209                     rk[6];
1210 
1211                 t3 = Te0[s3 >> 24] ^
1212                     Te1[(s0 >> 16) & 0xff] ^
1213                     Te2[(s1 >>  8) & 0xff] ^
1214                     Te3[s2 & 0xff] ^
1215                     rk[7];
1216 
1217                 rk += 8;
1218 
1219                 if (--r == 0) {
1220                         break;
1221                 }
1222 
1223                 s0 = Te0[t0 >> 24] ^
1224                     Te1[(t1 >> 16) & 0xff] ^
1225                     Te2[(t2 >>  8) & 0xff] ^
1226                     Te3[t3 & 0xff] ^
1227                     rk[0];
1228 
1229                 s1 = Te0[t1 >> 24] ^
1230                     Te1[(t2 >> 16) & 0xff] ^
1231                     Te2[(t3 >>  8) & 0xff] ^
1232                     Te3[t0 & 0xff] ^
1233                     rk[1];
1234 
1235                 s2 = Te0[t2 >> 24] ^
1236                     Te1[(t3 >> 16) & 0xff] ^
1237                     Te2[(t0 >>  8) & 0xff] ^
1238                     Te3[t1 & 0xff] ^
1239                     rk[2];
1240 
1241                 s3 = Te0[t3 >> 24] ^
1242                     Te1[(t0 >> 16) & 0xff] ^
1243                     Te2[(t1 >>  8) & 0xff] ^
1244                     Te3[t2 & 0xff] ^
1245                     rk[3];
1246         }
1247 
1248         /*
1249          * apply last round and
1250          * map cipher state to byte array block:
1251          */
1252 
1253         s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1254             (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1255             (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1256             (Te4[t3 & 0xff] & 0x000000ff) ^
1257             rk[0];
1258         ct[0] = s0;
1259 
1260         s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1261             (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1262             (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1263             (Te4[t0 & 0xff] & 0x000000ff) ^
1264             rk[1];
1265         ct[1] = s1;
1266 
1267         s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1268             (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1269             (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1270             (Te4[t1 & 0xff] & 0x000000ff) ^
1271             rk[2];
1272         ct[2] = s2;
1273 
1274         s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1275             (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1276             (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1277             (Te4[t2 & 0xff] & 0x000000ff) ^
1278             rk[3];
1279         ct[3] = s3;
1280 }
1281 
1282 
1283 /*
1284  * Decrypt one block of data. The block is assumed to be an array
1285  * of four uint32_t values, so copy for alignment (and byte-order
1286  * reversal for little endian systems might be necessary on the
1287  * input and output byte streams.
1288  * The size of the key schedule depends on the number of rounds
1289  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1290  *
1291  * Parameters:
1292  * rk   Key schedule, of aes_ks_t (60 32-bit integers)
1293  * Nr   Number of rounds
1294  * ct   Input block (crypto text)
1295  * pt   Output block (plain text). Can overlap with pt
1296  */
1297 static void
1298 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1299     uint32_t pt[4])
1300 {
1301         uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1302         int      r;
1303 
1304         /*
1305          * map byte array block to cipher state
1306          * and add initial round key:
1307          */
1308         s0 = ct[0] ^ rk[0];
1309         s1 = ct[1] ^ rk[1];
1310         s2 = ct[2] ^ rk[2];
1311         s3 = ct[3] ^ rk[3];
1312 
1313         /*
1314          * Nr - 1 full rounds:
1315          */
1316 
1317         r = Nr >> 1;
1318 
1319         for (;;) {
1320                 t0 = Td0[s0 >> 24] ^
1321                     Td1[(s3 >> 16) & 0xff] ^
1322                     Td2[(s2 >> 8) & 0xff] ^
1323                     Td3[s1 & 0xff] ^
1324                     rk[4];
1325 
1326                 t1 = Td0[s1 >> 24] ^
1327                     Td1[(s0 >> 16) & 0xff] ^
1328                     Td2[(s3 >>  8) & 0xff] ^
1329                     Td3[s2 & 0xff] ^
1330                     rk[5];
1331 
1332                 t2 = Td0[s2 >> 24] ^
1333                     Td1[(s1 >> 16) & 0xff] ^
1334                     Td2[(s0 >>  8) & 0xff] ^
1335                     Td3[s3 & 0xff] ^
1336                     rk[6];
1337 
1338                 t3 = Td0[s3 >> 24] ^
1339                     Td1[(s2 >> 16) & 0xff] ^
1340                     Td2[(s1 >> 8) & 0xff] ^
1341                     Td3[s0 & 0xff] ^
1342                     rk[7];
1343 
1344                 rk += 8;
1345 
1346                 if (--r == 0) {
1347                         break;
1348                 }
1349 
1350                 s0 = Td0[t0 >> 24] ^
1351                     Td1[(t3 >> 16) & 0xff] ^
1352                     Td2[(t2 >> 8) & 0xff] ^
1353                     Td3[t1 & 0xff] ^
1354                     rk[0];
1355 
1356                 s1 = Td0[t1 >> 24] ^
1357                     Td1[(t0 >> 16) & 0xff] ^
1358                     Td2[(t3 >> 8) & 0xff] ^
1359                     Td3[t2 & 0xff] ^
1360                     rk[1];
1361 
1362                 s2 = Td0[t2 >> 24] ^
1363                     Td1[(t1 >> 16) & 0xff] ^
1364                     Td2[(t0 >> 8) & 0xff] ^
1365                     Td3[t3 & 0xff] ^
1366                     rk[2];
1367 
1368                 s3 = Td0[t3 >> 24] ^
1369                     Td1[(t2 >> 16) & 0xff] ^
1370                     Td2[(t1 >> 8) & 0xff] ^
1371                     Td3[t0 & 0xff] ^
1372                     rk[3];
1373         }
1374 
1375         /*
1376          * apply last round and
1377          * map cipher state to byte array block:
1378          */
1379 
1380         s0 = (Td4[t0 >> 24] & 0xff000000) ^
1381             (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1382             (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1383             (Td4[t1 & 0xff] & 0x000000ff) ^
1384             rk[0];
1385         pt[0] = s0;
1386 
1387         s1 = (Td4[t1 >> 24] & 0xff000000) ^
1388             (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1389             (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1390             (Td4[t2 & 0xff] & 0x000000ff) ^
1391             rk[1];
1392         pt[1] = s1;
1393 
1394         s2 = (Td4[t2 >> 24] & 0xff000000) ^
1395             (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1396             (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1397             (Td4[t3 & 0xff] & 0x000000ff) ^
1398             rk[2];
1399         pt[2] = s2;
1400 
1401         s3 = (Td4[t3 >> 24] & 0xff000000) ^
1402             (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1403             (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1404             (Td4[t0 & 0xff] & 0x000000ff) ^
1405             rk[3];
1406         pt[3] = s3;
1407 }
1408 #endif  /* sun4u, !__amd64 */
1409 
1410 #ifndef sun4u
1411 /*
1412  * Expand the 32-bit AES cipher key array into the encryption and decryption
1413  * key schedules.
1414  *
1415  * Parameters:
1416  * key          AES key schedule to be initialized
1417  * keyarr32     User key
1418  * keyBits      AES key size (128, 192, or 256 bits)
1419  */
1420 static void
1421 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1422 {
1423         key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1424             keybits);
1425         key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1426             keybits);
1427         key->type = AES_32BIT_KS;
1428 }
1429 #endif  /* sun4u */
1430 /* EXPORT DELETE END */
1431 
1432 
1433 /*
1434  * Initialize key schedules for AES
1435  *
1436  * Parameters:
1437  * cipherKey    User key
1438  * keyBits      AES key size (128, 192, or 256 bits)
1439  * keysched     AES key schedule to be initialized, of type aes_key_t.
1440  *              Allocated by aes_alloc_keysched().
1441  */
1442 void
1443 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1444 {
1445 /* EXPORT DELETE START */
1446         aes_key_t       *newbie = keysched;
1447         uint_t          keysize, i, j;
1448         union {
1449                 uint64_t        ka64[4];
1450                 uint32_t        ka32[8];
1451                 } keyarr;
1452 
1453         switch (keyBits) {
1454         case 128:
1455                 newbie->nr = 10;
1456                 break;
1457 
1458         case 192:
1459                 newbie->nr = 12;
1460                 break;
1461 
1462         case 256:
1463                 newbie->nr = 14;
1464                 break;
1465 
1466         default:
1467                 /* should never get here */
1468                 return;
1469         }
1470         keysize = keyBits >> 3;
1471 
1472         /*
1473          * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1474          * 4 bytes in the key.  On _BIG_ENDIAN and AMD64, copy the key
1475          * without reversing bytes.
1476          * For AMD64, do not byte swap for aes_setupkeys().
1477          *
1478          * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1479          * X86/AMD64  uses a key schedule array with 32-bit elements.
1480          */
1481 #ifndef AES_BYTE_SWAP
1482         if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1483                 for (i = 0, j = 0; j < keysize; i++, j += 8) {
1484                         /* LINTED: pointer alignment */
1485                         keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1486                 }
1487         } else {
1488                 bcopy(cipherKey, keyarr.ka32, keysize);
1489         }
1490 
1491 #else   /* byte swap */
1492         for (i = 0, j = 0; j < keysize; i++, j += 4) {
1493                 keyarr.ka32[i] = (((uint32_t)cipherKey[j] << 24) |
1494                     ((uint32_t)cipherKey[j + 1] << 16) |
1495                     ((uint32_t)cipherKey[j + 2] << 8) |
1496                     (uint32_t)cipherKey[j + 3]);
1497         }
1498 #endif
1499 
1500         aes_setupkeys(newbie, keyarr.ka32, keyBits);
1501 /* EXPORT DELETE END */
1502 }
1503 
1504 /*
1505  * Encrypt one block using AES.
1506  * Align if needed and (for x86 32-bit only) byte-swap.
1507  *
1508  * Parameters:
1509  * ks   Key schedule, of type aes_key_t
1510  * pt   Input block (plain text)
1511  * ct   Output block (crypto text).  Can overlap with pt
1512  */
1513 int
1514 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1515 {
1516 /* EXPORT DELETE START */
1517         aes_key_t       *ksch = (aes_key_t *)ks;
1518 
1519 #ifndef AES_BYTE_SWAP
1520         if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1521                 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1522                     /* LINTED:  pointer alignment */
1523                     (uint32_t *)pt, (uint32_t *)ct);
1524         } else {
1525 #endif
1526                 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1527 
1528                 /* Copy input block into buffer */
1529 #ifndef AES_BYTE_SWAP
1530                 bcopy(pt, &buffer, AES_BLOCK_LEN);
1531 
1532 #else   /* byte swap */
1533                 buffer[0] = (((uint32_t)pt[0] << 24) | ((uint32_t)pt[1] << 16) |
1534                     ((uint32_t)pt[2] << 8) | (uint32_t)pt[3]);
1535                 buffer[1] = (((uint32_t)pt[4] << 24) | ((uint32_t)pt[5] << 16) |
1536                     ((uint32_t)pt[6] << 8) | (uint32_t)pt[7]);
1537                 buffer[2] = (((uint32_t)pt[8] << 24) | ((uint32_t)pt[9] << 16) |
1538                     ((uint32_t)pt[10] << 8) | (uint32_t)pt[11]);
1539                 buffer[3] = (((uint32_t)pt[12] << 24) |
1540                     ((uint32_t)pt[13] << 16) | ((uint32_t)pt[14] << 8) |
1541                     (uint32_t)pt[15]);
1542 #endif
1543 
1544                 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1545                     buffer, buffer);
1546 
1547                 /* Copy result from buffer to output block */
1548 #ifndef AES_BYTE_SWAP
1549                 bcopy(&buffer, ct, AES_BLOCK_LEN);
1550         }
1551 
1552 #else   /* byte swap */
1553                 ct[0] = buffer[0] >> 24;
1554                 ct[1] = buffer[0] >> 16;
1555                 ct[2] = buffer[0] >> 8;
1556                 ct[3] = (uint8_t)buffer[0];
1557                 ct[4] = buffer[1] >> 24;
1558                 ct[5] = buffer[1] >> 16;
1559                 ct[6] = buffer[1] >> 8;
1560                 ct[7] = (uint8_t)buffer[1];
1561                 ct[8] = buffer[2] >> 24;
1562                 ct[9] = buffer[2] >> 16;
1563                 ct[10] = buffer[2] >> 8;
1564                 ct[11] = (uint8_t)buffer[2];
1565                 ct[12] = buffer[3] >> 24;
1566                 ct[13] = buffer[3] >> 16;
1567                 ct[14] = buffer[3] >> 8;
1568                 ct[15] = (uint8_t)buffer[3];
1569 #endif
1570 /* EXPORT DELETE END */
1571         return (CRYPTO_SUCCESS);
1572 }
1573 
1574 /*
1575  * Decrypt one block using AES.
1576  * Align and byte-swap if needed.
1577  *
1578  * Parameters:
1579  * ks   Key schedule, of type aes_key_t
1580  * ct   Input block (crypto text)
1581  * pt   Output block (plain text). Can overlap with pt
1582  */
1583 int
1584 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1585 {
1586 /* EXPORT DELETE START */
1587         aes_key_t       *ksch = (aes_key_t *)ks;
1588 
1589 #ifndef AES_BYTE_SWAP
1590         if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1591                 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1592                     /* LINTED:  pointer alignment */
1593                     (uint32_t *)ct, (uint32_t *)pt);
1594         } else {
1595 #endif
1596                 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1597 
1598                 /* Copy input block into buffer */
1599 #ifndef AES_BYTE_SWAP
1600                 bcopy(ct, &buffer, AES_BLOCK_LEN);
1601 
1602 #else   /* byte swap */
1603                 buffer[0] = (((uint32_t)ct[0] << 24) | ((uint32_t)ct[1] << 16) |
1604                     ((uint32_t)ct[2] << 8) | (uint32_t)ct[3]);
1605 
1606                 buffer[1] = (((uint32_t)ct[4] << 24) | ((uint32_t)ct[5] << 16) |
1607                     ((uint32_t)ct[6] << 8) | (uint32_t)ct[7]);
1608 
1609                 buffer[2] = (((uint32_t)ct[8] << 24) | ((uint32_t)ct[9] << 16) |
1610                     ((uint32_t)ct[10] << 8) | (uint32_t)ct[11]);
1611 
1612                 buffer[3] = (((uint32_t)ct[12] << 24) |
1613                     ((uint32_t)ct[13] << 16) | ((uint32_t)ct[14] << 8) |
1614                     (uint32_t)ct[15]);
1615 #endif
1616 
1617                 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1618                     buffer, buffer);
1619 
1620                 /* Copy result from buffer to output block */
1621 #ifndef AES_BYTE_SWAP
1622                 bcopy(&buffer, pt, AES_BLOCK_LEN);
1623         }
1624 
1625 #else   /* byte swap */
1626                 pt[0] = buffer[0] >> 24;
1627                 pt[1] = buffer[0] >> 16;
1628                 pt[2] = buffer[0] >> 8;
1629                 pt[3] = (uint8_t)buffer[0];
1630                 pt[4] = buffer[1] >> 24;
1631                 pt[5] = buffer[1] >> 16;
1632                 pt[6] = buffer[1] >> 8;
1633                 pt[7] = (uint8_t)buffer[1];
1634                 pt[8] = buffer[2] >> 24;
1635                 pt[9] = buffer[2] >> 16;
1636                 pt[10] = buffer[2] >> 8;
1637                 pt[11] = (uint8_t)buffer[2];
1638                 pt[12] = buffer[3] >> 24;
1639                 pt[13] = buffer[3] >> 16;
1640                 pt[14] = buffer[3] >> 8;
1641                 pt[15] = (uint8_t)buffer[3];
1642 #endif
1643 
1644 /* EXPORT DELETE END */
1645         return (CRYPTO_SUCCESS);
1646 }
1647 
1648 
1649 /*
1650  * Allocate key schedule for AES.
1651  *
1652  * Return the pointer and set size to the number of bytes allocated.
1653  * Memory allocated must be freed by the caller when done.
1654  *
1655  * Parameters:
1656  * size         Size of key schedule allocated, in bytes
1657  * kmflag       Flag passed to kmem_alloc(9F); ignored in userland.
1658  */
1659 /* ARGSUSED */
1660 void *
1661 aes_alloc_keysched(size_t *size, int kmflag)
1662 {
1663 /* EXPORT DELETE START */
1664         aes_key_t *keysched;
1665 
1666 #ifdef  _KERNEL
1667         keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1668 #else   /* !_KERNEL */
1669         keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1670 #endif  /* _KERNEL */
1671 
1672         if (keysched != NULL) {
1673                 *size = sizeof (aes_key_t);
1674                 return (keysched);
1675         }
1676 /* EXPORT DELETE END */
1677         return (NULL);
1678 }
1679 
1680 void
1681 aes_copy_block(uint8_t *in, uint8_t *out)
1682 {
1683         if (IS_P2ALIGNED(in, sizeof (uint32_t)) &&
1684             IS_P2ALIGNED(out, sizeof (uint32_t))) {
1685                 /* LINTED: pointer alignment */
1686                 *(uint32_t *)&out[0] = *(uint32_t *)&in[0];
1687                 /* LINTED: pointer alignment */
1688                 *(uint32_t *)&out[4] = *(uint32_t *)&in[4];
1689                 /* LINTED: pointer alignment */
1690                 *(uint32_t *)&out[8] = *(uint32_t *)&in[8];
1691                 /* LINTED: pointer alignment */
1692                 *(uint32_t *)&out[12] = *(uint32_t *)&in[12];
1693         } else {
1694                 AES_COPY_BLOCK(in, out);
1695         }
1696 }
1697 
1698 /* XOR block of data into dest */
1699 void
1700 aes_xor_block(uint8_t *data, uint8_t *dst)
1701 {
1702         if (IS_P2ALIGNED(dst, sizeof (uint32_t)) &&
1703             IS_P2ALIGNED(data, sizeof (uint32_t))) {
1704                 /* LINTED: pointer alignment */
1705                 *(uint32_t *)&dst[0] ^= *(uint32_t *)&data[0];
1706                 /* LINTED: pointer alignment */
1707                 *(uint32_t *)&dst[4] ^= *(uint32_t *)&data[4];
1708                 /* LINTED: pointer alignment */
1709                 *(uint32_t *)&dst[8] ^= *(uint32_t *)&data[8];
1710                 /* LINTED: pointer alignment */
1711                 *(uint32_t *)&dst[12] ^= *(uint32_t *)&data[12];
1712         } else {
1713                 AES_XOR_BLOCK(data, dst);
1714         }
1715 }
1716 
1717 /*
1718  * Encrypt multiple blocks of data according to mode.
1719  */
1720 /* ARGSUSED */
1721 int
1722 aes_encrypt_contiguous_blocks(void *ctx, char *data, size_t length,
1723     crypto_data_t *out)
1724 {
1725         aes_ctx_t *aes_ctx = ctx;
1726         int rv;
1727 
1728         if (aes_ctx->ac_flags & CTR_MODE) {
1729                 rv = ctr_mode_contiguous_blocks(ctx, data, length, out,
1730                     AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
1731 #ifdef _KERNEL
1732         } else if (aes_ctx->ac_flags & CCM_MODE) {
1733                 rv = ccm_mode_encrypt_contiguous_blocks(ctx, data, length,
1734                     out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
1735                     aes_xor_block);
1736 #endif
1737         } else if (aes_ctx->ac_flags & CBC_MODE) {
1738                 rv = cbc_encrypt_contiguous_blocks(ctx,
1739                     data, length, out, AES_BLOCK_LEN, aes_encrypt_block,
1740                     aes_copy_block, aes_xor_block);
1741         } else {
1742                 rv = ecb_cipher_contiguous_blocks(ctx, data, length, out,
1743                     AES_BLOCK_LEN, aes_encrypt_block);
1744         }
1745         return (rv);
1746 }
1747 
1748 /*
1749  * Decrypt multiple blocks of data according to mode.
1750  */
1751 int
1752 aes_decrypt_contiguous_blocks(void *ctx, char *data, size_t length,
1753     crypto_data_t *out)
1754 {
1755         aes_ctx_t *aes_ctx = ctx;
1756         int rv;
1757 
1758         if (aes_ctx->ac_flags & CTR_MODE) {
1759                 rv = ctr_mode_contiguous_blocks(ctx, data, length, out,
1760                     AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
1761                 if (rv == CRYPTO_DATA_LEN_RANGE)
1762                         rv = CRYPTO_ENCRYPTED_DATA_LEN_RANGE;
1763 #ifdef _KERNEL
1764         } else if (aes_ctx->ac_flags & CCM_MODE) {
1765                 rv = ccm_mode_decrypt_contiguous_blocks(ctx, data, length,
1766                     out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
1767                     aes_xor_block);
1768 #endif
1769         } else if (aes_ctx->ac_flags & CBC_MODE) {
1770                 rv = cbc_decrypt_contiguous_blocks(ctx, data, length, out,
1771                     AES_BLOCK_LEN, aes_decrypt_block, aes_copy_block,
1772                     aes_xor_block);
1773         } else {
1774                 rv = ecb_cipher_contiguous_blocks(ctx, data, length, out,
1775                     AES_BLOCK_LEN, aes_decrypt_block);
1776                 if (rv == CRYPTO_DATA_LEN_RANGE)
1777                         rv = CRYPTO_ENCRYPTED_DATA_LEN_RANGE;
1778         }
1779         return (rv);
1780 }