1 /*
   2  * CDDL HEADER START
   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License, Version 1.0 only
   6  * (the "License").  You may not use this file except in compliance
   7  * with the License.
   8  *
   9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
  10  * or http://www.opensolaris.org/os/licensing.
  11  * See the License for the specific language governing permissions
  12  * and limitations under the License.
  13  *
  14  * When distributing Covered Code, include this CDDL HEADER in each
  15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  16  * If applicable, add the following below this CDDL HEADER, with the
  17  * fields enclosed by brackets "[]" replaced with your own identifying
  18  * information: Portions Copyright [yyyy] [name of copyright owner]
  19  *
  20  * CDDL HEADER END
  21  */
  22 /*
  23  * Copyright 2003 Sun Microsystems, Inc.  All rights reserved.
  24  * Use is subject to license terms.
  25  */
  26 
  27 #include <sys/types.h>
  28 #include <sys/systm.h>
  29 #include <sys/ddi.h>
  30 #include <sys/sysmacros.h>
  31 #include <sys/strsun.h>
  32 #include <netinet/in.h>
  33 #include "aes_impl.h"
  34 #ifndef _KERNEL
  35 #include <strings.h>
  36 #include <stdlib.h>
  37 #endif  /* !_KERNEL */
  38 
  39 #pragma ident   "@(#)aes_impl.c 1.2     05/06/08 SMI"
  40 
  41 /*
  42  * This file is derived from the file  rijndael-alg-fst.c  taken from the
  43  * "optimized C code v3.0" on the "rijndael home page"
  44  * (http://www.esat.kuleuven.ac.be/~rijmen/rijndael/)
  45  * pointed by the NIST web-site (http://nist.gov)
  46  *
  47  * The following note is from the original file:
  48  */
  49 
  50 /*
  51  * rijndael-alg-fst.c
  52  *
  53  * @version 3.0 (December 2000)
  54  *
  55  * Optimised ANSI C code for the Rijndael cipher (now AES)
  56  *
  57  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
  58  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
  59  * @author Paulo Barreto <paulo.barreto@terra.com.br>
  60  *
  61  * This code is hereby placed in the public domain.
  62  *
  63  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
  64  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  65  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  66  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
  67  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  68  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  69  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  70  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  71  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  72  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
  73  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  74  */
  75 
  76 /* EXPORT DELETE START */
  77 
  78 #ifndef _RIJNDAEL_TBL_H
  79 #define _RIJNDAEL_TBL_H
  80 
  81 /*
  82  *  Constant tables
  83  */
  84 
  85 /*
  86  * Te0[x] = S [x].[02, 01, 01, 03];
  87  * Te1[x] = S [x].[03, 02, 01, 01];
  88  * Te2[x] = S [x].[01, 03, 02, 01];
  89  * Te3[x] = S [x].[01, 01, 03, 02];
  90  * Te4[x] = S [x].[01, 01, 01, 01];
  91  *
  92  * Td0[x] = Si[x].[0e, 09, 0d, 0b];
  93  * Td1[x] = Si[x].[0b, 0e, 09, 0d];
  94  * Td2[x] = Si[x].[0d, 0b, 0e, 09];
  95  * Td3[x] = Si[x].[09, 0d, 0b, 0e];
  96  * Td4[x] = Si[x].[01, 01, 01, 01];
  97  */
  98 
  99 
 100 static const uint32_t Te0[256] =
 101 {
 102         0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
 103         0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
 104         0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
 105         0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
 106         0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
 107         0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
 108         0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
 109         0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
 110         0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
 111         0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
 112         0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
 113         0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
 114         0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
 115         0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
 116         0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
 117         0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
 118         0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
 119         0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
 120         0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
 121         0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
 122         0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
 123         0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
 124         0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
 125         0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
 126         0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
 127         0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
 128         0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
 129         0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
 130         0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
 131         0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
 132         0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
 133         0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
 134         0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
 135         0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
 136         0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
 137         0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
 138         0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
 139         0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
 140         0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
 141         0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
 142         0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
 143         0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
 144         0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
 145         0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
 146         0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
 147         0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
 148         0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
 149         0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
 150         0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
 151         0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
 152         0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
 153         0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
 154         0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
 155         0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
 156         0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
 157         0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
 158         0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
 159         0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
 160         0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
 161         0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
 162         0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
 163         0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
 164         0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
 165         0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
 166 };
 167 
 168 
 169 static const uint32_t Te1[256] =
 170 {
 171         0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
 172         0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
 173         0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
 174         0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
 175         0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
 176         0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
 177         0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
 178         0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
 179         0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
 180         0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
 181         0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
 182         0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
 183         0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
 184         0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
 185         0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
 186         0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
 187         0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
 188         0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
 189         0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
 190         0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
 191         0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
 192         0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
 193         0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
 194         0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
 195         0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
 196         0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
 197         0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
 198         0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
 199         0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
 200         0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
 201         0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
 202         0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
 203         0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
 204         0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
 205         0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
 206         0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
 207         0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
 208         0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
 209         0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
 210         0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
 211         0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
 212         0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
 213         0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
 214         0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
 215         0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
 216         0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
 217         0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
 218         0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
 219         0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
 220         0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
 221         0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
 222         0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
 223         0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
 224         0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
 225         0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
 226         0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
 227         0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
 228         0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
 229         0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
 230         0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
 231         0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
 232         0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
 233         0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
 234         0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
 235 };
 236 
 237 
 238 static const uint32_t Te2[256] =
 239 {
 240         0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
 241         0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
 242         0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
 243         0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
 244         0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
 245         0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
 246         0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
 247         0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
 248         0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
 249         0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
 250         0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
 251         0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
 252         0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
 253         0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
 254         0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
 255         0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
 256         0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
 257         0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
 258         0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
 259         0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
 260         0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
 261         0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
 262         0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
 263         0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
 264         0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
 265         0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
 266         0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
 267         0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
 268         0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
 269         0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
 270         0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
 271         0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
 272         0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
 273         0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
 274         0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
 275         0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
 276         0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
 277         0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
 278         0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
 279         0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
 280         0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
 281         0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
 282         0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
 283         0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
 284         0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
 285         0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
 286         0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
 287         0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
 288         0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
 289         0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
 290         0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
 291         0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
 292         0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
 293         0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
 294         0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
 295         0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
 296         0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
 297         0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
 298         0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
 299         0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
 300         0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
 301         0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
 302         0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
 303         0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
 304 };
 305 
 306 
 307 static const uint32_t Te3[256] =
 308 {
 309         0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
 310         0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
 311         0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
 312         0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
 313         0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
 314         0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
 315         0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
 316         0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
 317         0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
 318         0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
 319         0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
 320         0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
 321         0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
 322         0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
 323         0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
 324         0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
 325         0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
 326         0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
 327         0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
 328         0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
 329         0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
 330         0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
 331         0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
 332         0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
 333         0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
 334         0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
 335         0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
 336         0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
 337         0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
 338         0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
 339         0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
 340         0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
 341         0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
 342         0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
 343         0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
 344         0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
 345         0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
 346         0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
 347         0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
 348         0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
 349         0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
 350         0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
 351         0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
 352         0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
 353         0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
 354         0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
 355         0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
 356         0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
 357         0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
 358         0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
 359         0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
 360         0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
 361         0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
 362         0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
 363         0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
 364         0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
 365         0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
 366         0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
 367         0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
 368         0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
 369         0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
 370         0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
 371         0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
 372         0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
 373 };
 374 
 375 static const uint32_t Te4[256] =
 376 {
 377         0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
 378         0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
 379         0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
 380         0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
 381         0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
 382         0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
 383         0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
 384         0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
 385         0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
 386         0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
 387         0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
 388         0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
 389         0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
 390         0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
 391         0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
 392         0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
 393         0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
 394         0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
 395         0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
 396         0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
 397         0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
 398         0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
 399         0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
 400         0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
 401         0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
 402         0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
 403         0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
 404         0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
 405         0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
 406         0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
 407         0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
 408         0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
 409         0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
 410         0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
 411         0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
 412         0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
 413         0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
 414         0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
 415         0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
 416         0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
 417         0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
 418         0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
 419         0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
 420         0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
 421         0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
 422         0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
 423         0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
 424         0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
 425         0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
 426         0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
 427         0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
 428         0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
 429         0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
 430         0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
 431         0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
 432         0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
 433         0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
 434         0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
 435         0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
 436         0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
 437         0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
 438         0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
 439         0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
 440         0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
 441 };
 442 
 443 static const uint32_t Td0[256] =
 444 {
 445         0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
 446         0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
 447         0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
 448         0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
 449         0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
 450         0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
 451         0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
 452         0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
 453         0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
 454         0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
 455         0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
 456         0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
 457         0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
 458         0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
 459         0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
 460         0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
 461         0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
 462         0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
 463         0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
 464         0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
 465         0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
 466         0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
 467         0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
 468         0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
 469         0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
 470         0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
 471         0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
 472         0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
 473         0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
 474         0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
 475         0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
 476         0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
 477         0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
 478         0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
 479         0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
 480         0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
 481         0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
 482         0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
 483         0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
 484         0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
 485         0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
 486         0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
 487         0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
 488         0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
 489         0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
 490         0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
 491         0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
 492         0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
 493         0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
 494         0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
 495         0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
 496         0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
 497         0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
 498         0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
 499         0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
 500         0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
 501         0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
 502         0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
 503         0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
 504         0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
 505         0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
 506         0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
 507         0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
 508         0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
 509 };
 510 
 511 static const uint32_t Td1[256] =
 512 {
 513         0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
 514         0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
 515         0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
 516         0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
 517         0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
 518         0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
 519         0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
 520         0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
 521         0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
 522         0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
 523         0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
 524         0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
 525         0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
 526         0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
 527         0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
 528         0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
 529         0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
 530         0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
 531         0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
 532         0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
 533         0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
 534         0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
 535         0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
 536         0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
 537         0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
 538         0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
 539         0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
 540         0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
 541         0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
 542         0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
 543         0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
 544         0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
 545         0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
 546         0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
 547         0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
 548         0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
 549         0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
 550         0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
 551         0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
 552         0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
 553         0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
 554         0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
 555         0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
 556         0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
 557         0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
 558         0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
 559         0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
 560         0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
 561         0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
 562         0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
 563         0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
 564         0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
 565         0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
 566         0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
 567         0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
 568         0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
 569         0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
 570         0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
 571         0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
 572         0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
 573         0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
 574         0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
 575         0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
 576         0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
 577 };
 578 
 579 static const uint32_t Td2[256] =
 580 {
 581         0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
 582         0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
 583         0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
 584         0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
 585         0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
 586         0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
 587         0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
 588         0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
 589         0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
 590         0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
 591         0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
 592         0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
 593         0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
 594         0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
 595         0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
 596         0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
 597         0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
 598         0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
 599         0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
 600         0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
 601         0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
 602         0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
 603         0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
 604         0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
 605         0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
 606         0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
 607         0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
 608         0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
 609         0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
 610         0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
 611         0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
 612         0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
 613         0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
 614         0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
 615         0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
 616         0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
 617         0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
 618         0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
 619         0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
 620         0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
 621         0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
 622         0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
 623         0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
 624         0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
 625         0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
 626         0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
 627         0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
 628         0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
 629         0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
 630         0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
 631         0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
 632         0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
 633         0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
 634         0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
 635         0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
 636         0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
 637         0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
 638         0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
 639         0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
 640         0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
 641         0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
 642         0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
 643         0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
 644         0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
 645 };
 646 
 647 static const uint32_t Td3[256] =
 648 {
 649         0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
 650         0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
 651         0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
 652         0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
 653         0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
 654         0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
 655         0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
 656         0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
 657         0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
 658         0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
 659         0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
 660         0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
 661         0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
 662         0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
 663         0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
 664         0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
 665         0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
 666         0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
 667         0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
 668         0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
 669         0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
 670         0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
 671         0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
 672         0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
 673         0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
 674         0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
 675         0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
 676         0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
 677         0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
 678         0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
 679         0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
 680         0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
 681         0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
 682         0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
 683         0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
 684         0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
 685         0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
 686         0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
 687         0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
 688         0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
 689         0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
 690         0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
 691         0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
 692         0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
 693         0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
 694         0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
 695         0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
 696         0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
 697         0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
 698         0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
 699         0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
 700         0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
 701         0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
 702         0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
 703         0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
 704         0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
 705         0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
 706         0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
 707         0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
 708         0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
 709         0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
 710         0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
 711         0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
 712         0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
 713 };
 714 
 715 
 716 static const uint32_t Td4[256] =
 717 {
 718         0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
 719         0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
 720         0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
 721         0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
 722         0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
 723         0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
 724         0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
 725         0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
 726         0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
 727         0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
 728         0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
 729         0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
 730         0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
 731         0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
 732         0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
 733         0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
 734         0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
 735         0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
 736         0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
 737         0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
 738         0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
 739         0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
 740         0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
 741         0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
 742         0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
 743         0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
 744         0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
 745         0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
 746         0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
 747         0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
 748         0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
 749         0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
 750         0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
 751         0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
 752         0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
 753         0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
 754         0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
 755         0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
 756         0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
 757         0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
 758         0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
 759         0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
 760         0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
 761         0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
 762         0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
 763         0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
 764         0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
 765         0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
 766         0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
 767         0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
 768         0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
 769         0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
 770         0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
 771         0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
 772         0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
 773         0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
 774         0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
 775         0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
 776         0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
 777         0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
 778         0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
 779         0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
 780         0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
 781         0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
 782 };
 783 
 784 static const uint32_t rcon[] =
 785 {
 786         /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 787         0x01000000, 0x02000000, 0x04000000, 0x08000000,
 788         0x10000000, 0x20000000, 0x40000000, 0x80000000,
 789         0x1B000000, 0x36000000
 790 };
 791 #endif
 792 
 793 /*
 794  *  Expand the cipher key into the encryption key schedule.
 795  *  return  the number of rounds for the given cipher key size.
 796  *  The size of the key schedule depends on the number of rounds
 797  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 798  */
 799 static int
 800 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
 801     int keyBits)
 802 {
 803         int             i = 0;
 804         uint32_t        temp;
 805 
 806         rk[0] = cipherKey[0];
 807         rk[1] = cipherKey[1];
 808         rk[2] = cipherKey[2];
 809         rk[3] = cipherKey[3];
 810 
 811         if (keyBits == 128) {
 812                 for (;;) {
 813                         temp  = rk[3];
 814                         rk[4] = rk[0] ^
 815                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 816                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 817                             (Te4[temp & 0xff] & 0x0000ff00) ^
 818                             (Te4[temp >> 24] & 0x000000ff) ^
 819                             rcon[i];
 820                         rk[5] = rk[1] ^ rk[4];
 821                         rk[6] = rk[2] ^ rk[5];
 822                         rk[7] = rk[3] ^ rk[6];
 823 
 824                         if (++i == 10) {
 825                                 return (10);
 826                         }
 827                         rk += 4;
 828                 }
 829         }
 830 
 831         rk[4] = cipherKey[4];
 832         rk[5] = cipherKey[5];
 833 
 834         if (keyBits == 192) {
 835                 for (;;) {
 836                         temp = rk[5];
 837                         rk[6] = rk[0] ^
 838                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 839                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 840                             (Te4[temp & 0xff] & 0x0000ff00) ^
 841                             (Te4[temp >> 24] & 0x000000ff) ^
 842                             rcon[i];
 843                         rk[7] = rk[1] ^ rk[6];
 844                         rk[8] = rk[2] ^ rk[7];
 845                         rk[9] = rk[3] ^ rk[8];
 846 
 847                         if (++i == 8) {
 848                                 return (12);
 849                         }
 850 
 851                         rk[10] = rk[4] ^ rk[9];
 852                         rk[11] = rk[5] ^ rk[10];
 853                         rk += 6;
 854                 }
 855         }
 856 
 857         rk[6] = cipherKey[6];
 858         rk[7] = cipherKey[7];
 859 
 860         if (keyBits == 256) {
 861                 for (;;) {
 862                         temp = rk[7];
 863                         rk[8] = rk[0] ^
 864                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 865                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 866                             (Te4[temp & 0xff] & 0x0000ff00) ^
 867                             (Te4[temp >> 24] & 0x000000ff) ^
 868                             rcon[i];
 869                         rk[9] = rk[1] ^ rk[8];
 870                         rk[10] = rk[2] ^ rk[9];
 871                         rk[11] = rk[3] ^ rk[10];
 872 
 873                         if (++i == 7) {
 874                                 return (14);
 875                         }
 876                         temp = rk[11];
 877                         rk[12] = rk[4] ^
 878                             (Te4[temp >> 24] & 0xff000000) ^
 879                             (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
 880                             (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
 881                             (Te4[temp & 0xff] & 0x000000ff);
 882                         rk[13] = rk[5] ^ rk[12];
 883                         rk[14] = rk[6] ^ rk[13];
 884                         rk[15] = rk[7] ^ rk[14];
 885 
 886                         rk += 8;
 887                 }
 888         }
 889 
 890         return (0);
 891 }
 892 
 893 
 894 #ifdef sun4u
 895 
 896 /*
 897  *  Expand the cipher key into the enryption key schedule as used
 898  *  by the sun4u optimized assembly implementation.
 899  *  return  the number of rounds for the given cipher key size.
 900  *  The size of the key schedule depends on the number of rounds
 901  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 902  */
 903 static int
 904 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
 905 {
 906         uint32_t        rk1[4 * (MAX_AES_NR + 1)];
 907         uint64_t        *rk64 = (uint64_t *)rk;
 908         uint32_t        *rkt;
 909         uint64_t        t;
 910         int             i, Nr;
 911 
 912         Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
 913 
 914         for (i = 0; i < 4 * Nr; i++) {
 915                 t = (uint64_t)(rk1[i]);
 916                 rk64[i] = ((t & 0xff000000) << 11) |
 917                     ((t & 0xff0000) << 8) |
 918                     ((t & 0xffff) << 3);
 919         }
 920 
 921         rkt = (uint32_t *)(&(rk64[4 * Nr]));
 922 
 923         for (i = 0; i < 4; i++) {
 924                 rkt[i] = rk1[4 * Nr+i];
 925         }
 926 
 927         return (Nr);
 928 }
 929 
 930 
 931 /*
 932  *  Expand the cipher key into the decryption key schedule as used
 933  *  by the sun4u optimized assembly implementation.
 934  *  return  the number of rounds for the given cipher key size.
 935  *  The size of the key schedule depends on the number of rounds
 936  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 937  */
 938 static int
 939 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
 940     int keyBits)
 941 {
 942         int             Nr, i;
 943         uint32_t        temp;
 944 
 945         /* expand the cipher key: */
 946         Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
 947 
 948         /* invert the order of the round keys: */
 949 
 950         for (i = 0; i < 2 * Nr + 2; i++) {
 951                 temp = rk[i];
 952                 rk[i] = rk[4 * Nr - i + 3];
 953                 rk[4 * Nr - i + 3] = temp;
 954         }
 955 
 956         /*
 957          * apply the inverse MixColumn transform to all
 958          * round keys but the first and the last:
 959          */
 960         for (i = 1; i < Nr; i++) {
 961                 rk += 4;
 962                 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
 963                     Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
 964                     Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
 965                     Td3[Te4[rk[0] & 0xff] & 0xff];
 966                 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
 967                     Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
 968                     Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
 969                     Td3[Te4[rk[1] & 0xff] & 0xff];
 970                 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
 971                     Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
 972                     Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
 973                     Td3[Te4[rk[2] & 0xff] & 0xff];
 974                 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
 975                     Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
 976                     Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
 977                     Td3[Te4[rk[3] & 0xff] & 0xff];
 978         }
 979 
 980         return (Nr);
 981 }
 982 
 983 
 984 /*
 985  *  The size of the key schedule depends on the number of rounds
 986  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 987  */
 988 int
 989 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
 990 {
 991         uint32_t        rk1[4 * (MAX_AES_NR + 1)];
 992         uint64_t        *rk64 = (uint64_t *)rk;
 993         uint32_t        *rkt;
 994         uint64_t        t;
 995         int             i, Nr;
 996 
 997         Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
 998         for (i = 0; i < 4 * Nr; i++) {
 999                 t = (uint64_t)(rk1[i]);
1000                 rk64[i] = ((t & 0xff000000) << 11) |
1001                     ((t & 0xff0000) << 8) |
1002                     ((t & 0xffff) << 3);
1003         }
1004 
1005         rkt = (uint32_t *)(&(rk64[4 * Nr]));
1006 
1007         for (i = 0; i < 4; i++) {
1008                 rkt[i] = rk1[4 * Nr + i];
1009         }
1010 
1011         return (Nr);
1012 }
1013 
1014 
1015 static void
1016 aes_setupkeys(aes_key_t *key, uint32_t *keyarr32, int keybits)
1017 {
1018         key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1019             keybits);
1020         key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1021             keybits);
1022         key->type = AES_64BIT_KS;
1023 }
1024 
1025 #else /* !sun4u */
1026 
1027 /*
1028  *  Expand the cipher key into the encryption key schedule.
1029  *  return  the number of rounds for the given cipher key size.
1030  *  The size of the key schedule depends on the number of rounds
1031  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1032  */
1033 static int
1034 rijndael_key_setup_enc(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1035 {
1036         return (rijndael_key_setup_enc_raw(rk, cipherKey, keyBits));
1037 }
1038 
1039 
1040 /*
1041  *  Expand the cipher key into the decryption key schedule.
1042  *  @return  the number of rounds for the given cipher key size.
1043  *  The size of the key schedule depends on the number of rounds
1044  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1045  */
1046 static int
1047 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1048 {
1049         int      Nr, i, j;
1050         uint32_t temp;
1051 
1052         /* expand the cipher key: */
1053         Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1054 
1055         /* invert the order of the round keys: */
1056         for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1057                 temp = rk[i];
1058                 rk[i] = rk[j];
1059                 rk[j] = temp;
1060                 temp = rk[i + 1];
1061                 rk[i + 1] = rk[j + 1];
1062                 rk[j + 1] = temp;
1063                 temp = rk[i + 2];
1064                 rk[i + 2] = rk[j + 2];
1065                 rk[j + 2] = temp;
1066                 temp = rk[i + 3];
1067                 rk[i + 3] = rk[j + 3];
1068                 rk[j + 3] = temp;
1069         }
1070 
1071         /*
1072          * apply the inverse MixColumn transform to all
1073          * round keys but the first and the last:
1074          */
1075         for (i = 1; i < Nr; i++) {
1076                 rk += 4;
1077                 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1078                     Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1079                     Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1080                     Td3[Te4[rk[0] & 0xff] & 0xff];
1081                 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1082                     Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1083                     Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1084                     Td3[Te4[rk[1] & 0xff] & 0xff];
1085                 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1086                     Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1087                     Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1088                     Td3[Te4[rk[2] & 0xff] & 0xff];
1089                 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1090                     Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1091                     Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1092                     Td3[Te4[rk[3] & 0xff] & 0xff];
1093         }
1094 
1095         return (Nr);
1096 }
1097 
1098 
1099 static void
1100 aes_setupkeys(aes_key_t *key, uint32_t *keyarr32, int keybits)
1101 {
1102         key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1103             keybits);
1104         key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1105             keybits);
1106         key->type = AES_32BIT_KS;
1107 }
1108 
1109 /*
1110  * Encrypt one block of data. The block is assumed to be an array
1111  * of four uint32_t values, so copy for alignment (and byte-order
1112  * reversal for little endian systems might be necessary on the
1113  * input and output byte streams.
1114  * The size of the key schedule depends on the number of rounds
1115  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1116  */
1117 void
1118 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1119     uint32_t ct[4])
1120 {
1121         uint32_t        s0, s1, s2, s3, t0, t1, t2, t3;
1122         int             r;
1123 
1124         /*
1125          * map byte array block to cipher state
1126          * and add initial round key:
1127          */
1128 
1129         s0 = pt[0] ^ rk[0];
1130         s1 = pt[1] ^ rk[1];
1131         s2 = pt[2] ^ rk[2];
1132         s3 = pt[3] ^ rk[3];
1133 
1134         /*
1135          * Nr - 1 full rounds:
1136          */
1137 
1138         r = Nr >> 1;
1139 
1140         for (;;) {
1141                 t0 = Te0[s0 >> 24] ^
1142                     Te1[(s1 >> 16) & 0xff] ^
1143                     Te2[(s2 >>  8) & 0xff] ^
1144                     Te3[s3 & 0xff] ^
1145                     rk[4];
1146 
1147                 t1 = Te0[s1 >> 24] ^
1148                     Te1[(s2 >> 16) & 0xff] ^
1149                     Te2[(s3 >>  8) & 0xff] ^
1150                     Te3[s0 & 0xff] ^
1151                     rk[5];
1152 
1153                 t2 = Te0[s2 >> 24] ^
1154                     Te1[(s3 >> 16) & 0xff] ^
1155                     Te2[(s0 >>  8) & 0xff] ^
1156                     Te3[s1 & 0xff] ^
1157                     rk[6];
1158 
1159                 t3 = Te0[s3 >> 24] ^
1160                     Te1[(s0 >> 16) & 0xff] ^
1161                     Te2[(s1 >>  8) & 0xff] ^
1162                     Te3[s2 & 0xff] ^
1163                     rk[7];
1164 
1165                 rk += 8;
1166 
1167                 if (--r == 0) {
1168                         break;
1169                 }
1170 
1171                 s0 = Te0[t0 >> 24] ^
1172                     Te1[(t1 >> 16) & 0xff] ^
1173                     Te2[(t2 >>  8) & 0xff] ^
1174                     Te3[t3 & 0xff] ^
1175                     rk[0];
1176 
1177                 s1 = Te0[t1 >> 24] ^
1178                     Te1[(t2 >> 16) & 0xff] ^
1179                     Te2[(t3 >>  8) & 0xff] ^
1180                     Te3[t0 & 0xff] ^
1181                     rk[1];
1182 
1183                 s2 = Te0[t2 >> 24] ^
1184                     Te1[(t3 >> 16) & 0xff] ^
1185                     Te2[(t0 >>  8) & 0xff] ^
1186                     Te3[t1 & 0xff] ^
1187                     rk[2];
1188 
1189                 s3 = Te0[t3 >> 24] ^
1190                     Te1[(t0 >> 16) & 0xff] ^
1191                     Te2[(t1 >>  8) & 0xff] ^
1192                     Te3[t2 & 0xff] ^
1193                     rk[3];
1194         }
1195 
1196         /*
1197          * apply last round and
1198          * map cipher state to byte array block:
1199          */
1200 
1201         s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1202             (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1203             (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1204             (Te4[t3 & 0xff] & 0x000000ff) ^
1205             rk[0];
1206         ct[0] = s0;
1207 
1208         s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1209             (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1210             (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1211             (Te4[t0 & 0xff] & 0x000000ff) ^
1212             rk[1];
1213         ct[1] = s1;
1214 
1215         s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1216             (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1217             (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1218             (Te4[t1 & 0xff] & 0x000000ff) ^
1219             rk[2];
1220         ct[2] = s2;
1221 
1222         s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1223             (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1224             (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1225             (Te4[t2 & 0xff] & 0x000000ff) ^
1226             rk[3];
1227         ct[3] = s3;
1228 }
1229 
1230 
1231 /*
1232  * Decrypt one block of data. The block is assumed to be an array
1233  * of four uint32_t values, so copy for alignment (and byte-order
1234  * reversal for little endian systems might be necessary on the
1235  * input and output byte streams.
1236  * The size of the key schedule depends on the number of rounds
1237  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1238  */
1239 void
1240 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1241     uint32_t pt[4])
1242 {
1243         uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1244         int      r;
1245 
1246         /*
1247          * map byte array block to cipher state
1248          * and add initial round key:
1249          */
1250         s0 = ct[0] ^ rk[0];
1251         s1 = ct[1] ^ rk[1];
1252         s2 = ct[2] ^ rk[2];
1253         s3 = ct[3] ^ rk[3];
1254 
1255         /*
1256          * Nr - 1 full rounds:
1257          */
1258 
1259         r = Nr >> 1;
1260 
1261         for (;;) {
1262                 t0 = Td0[s0 >> 24] ^
1263                     Td1[(s3 >> 16) & 0xff] ^
1264                     Td2[(s2 >> 8) & 0xff] ^
1265                     Td3[s1 & 0xff] ^
1266                     rk[4];
1267 
1268                 t1 = Td0[s1 >> 24] ^
1269                     Td1[(s0 >> 16) & 0xff] ^
1270                     Td2[(s3 >>  8) & 0xff] ^
1271                     Td3[s2 & 0xff] ^
1272                     rk[5];
1273 
1274                 t2 = Td0[s2 >> 24] ^
1275                     Td1[(s1 >> 16) & 0xff] ^
1276                     Td2[(s0 >>  8) & 0xff] ^
1277                     Td3[s3 & 0xff] ^
1278                     rk[6];
1279 
1280                 t3 = Td0[s3 >> 24] ^
1281                     Td1[(s2 >> 16) & 0xff] ^
1282                     Td2[(s1 >> 8) & 0xff] ^
1283                     Td3[s0 & 0xff] ^
1284                     rk[7];
1285 
1286                 rk += 8;
1287 
1288                 if (--r == 0) {
1289                         break;
1290                 }
1291 
1292                 s0 = Td0[t0 >> 24] ^
1293                     Td1[(t3 >> 16) & 0xff] ^
1294                     Td2[(t2 >> 8) & 0xff] ^
1295                     Td3[t1 & 0xff] ^
1296                     rk[0];
1297 
1298                 s1 = Td0[t1 >> 24] ^
1299                     Td1[(t0 >> 16) & 0xff] ^
1300                     Td2[(t3 >> 8) & 0xff] ^
1301                     Td3[t2 & 0xff] ^
1302                     rk[1];
1303 
1304                 s2 = Td0[t2 >> 24] ^
1305                     Td1[(t1 >> 16) & 0xff] ^
1306                     Td2[(t0 >> 8) & 0xff] ^
1307                     Td3[t3 & 0xff] ^
1308                     rk[2];
1309 
1310                 s3 = Td0[t3 >> 24] ^
1311                     Td1[(t2 >> 16) & 0xff] ^
1312                     Td2[(t1 >> 8) & 0xff] ^
1313                     Td3[t0 & 0xff] ^
1314                     rk[3];
1315         }
1316 
1317         /*
1318          * apply last round and
1319          * map cipher state to byte array block:
1320          */
1321 
1322         s0 = (Td4[t0 >> 24] & 0xff000000) ^
1323             (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1324             (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1325             (Td4[t1 & 0xff] & 0x000000ff) ^
1326             rk[0];
1327         pt[0] = s0;
1328 
1329         s1 = (Td4[t1 >> 24] & 0xff000000) ^
1330             (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1331             (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1332             (Td4[t2 & 0xff] & 0x000000ff) ^
1333             rk[1];
1334         pt[1] = s1;
1335 
1336         s2 = (Td4[t2 >> 24] & 0xff000000) ^
1337             (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1338             (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1339             (Td4[t3 & 0xff] & 0x000000ff) ^
1340             rk[2];
1341         pt[2] = s2;
1342 
1343         s3 = (Td4[t3 >> 24] & 0xff000000) ^
1344             (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1345             (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1346             (Td4[t0 & 0xff] & 0x000000ff) ^
1347             rk[3];
1348         pt[3] = s3;
1349 }
1350 
1351 void
1352 aes_encrypt_impl(const aes_ks_t *ks, int Nr, const uint32_t pt[4],
1353     uint32_t ct[4])
1354 {
1355         rijndael_encrypt(&(ks->ks32[0]), Nr, pt, ct);
1356 }
1357 
1358 void
1359 aes_decrypt_impl(const aes_ks_t *ks, int Nr, const uint32_t ct[4],
1360     uint32_t pt[4])
1361 {
1362         rijndael_decrypt(&(ks->ks32[0]), Nr, ct, pt);
1363 }
1364 
1365 #endif /* sun4u */
1366 /* EXPORT DELETE END */
1367 
1368 
1369 /*
1370  * Initialize key schedules for AES
1371  */
1372 void
1373 aes_init_keysched(uint8_t *cipherKey, uint_t keyBits, void *keysched)
1374 {
1375 /* EXPORT DELETE START */
1376         aes_key_t *newbie = keysched;
1377         uint64_t keyarr64[4];
1378         uint32_t *keyarr32 = (uint32_t *)keyarr64;
1379         uint_t keysize, i, j;
1380 
1381         switch (keyBits) {
1382         case 128:
1383                 newbie->nr = 10;
1384                 break;
1385 
1386         case 192:
1387                 newbie->nr = 12;
1388                 break;
1389 
1390         case 256:
1391                 newbie->nr = 14;
1392                 break;
1393 
1394         default:
1395                 /* should never get here */
1396                 return;
1397         }
1398         keysize = keyBits >> 3;
1399 
1400         /*
1401          * The code below, that is always executed on LITTLE_ENDIAN machines,
1402          * reverses every 4 bytes in the key.  On BIG_ENDIAN, the same code
1403          * copies the key without reversing bytes.
1404          */
1405 #ifdef _BIG_ENDIAN
1406         if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1407                 for (i = 0, j = 0; j < keysize; i++, j += 8) {
1408                         /* LINTED: pointer alignment */
1409                         keyarr64[i] = *((uint64_t *)&cipherKey[j]);
1410                 }
1411         } else {
1412 #endif
1413                 for (i = 0, j = 0; j < keysize; i++, j += 4) {
1414                         keyarr32[i] = (((uint32_t)cipherKey[j] << 24) |
1415                             ((uint32_t)cipherKey[j + 1] << 16) |
1416                             ((uint32_t)cipherKey[j + 2] << 8) |
1417                             (uint32_t)cipherKey[j + 3]);
1418                 }
1419 #ifdef _BIG_ENDIAN
1420         }
1421 #endif
1422         aes_setupkeys(newbie, keyarr32, keyBits);
1423 
1424 /* EXPORT DELETE END */
1425 }
1426 
1427 void
1428 aes_encrypt_block(void *ks, uint8_t *pt, uint8_t *ct)
1429 {
1430 /* EXPORT DELETE START */
1431 
1432         aes_key_t *ksch = (aes_key_t *)ks;
1433 
1434 #ifdef _BIG_ENDIAN
1435         if (IS_P2ALIGNED(pt, sizeof (uint32_t)) &&
1436             IS_P2ALIGNED(ct, sizeof (uint32_t))) {
1437                 /* LINTED:  pointer alignment */
1438                 aes_encrypt_impl(&ksch->encr_ks, ksch->nr, (uint32_t *)pt,
1439                     /* LINTED:  pointer alignment */
1440                     (uint32_t *)ct);
1441         } else {
1442 #endif
1443                 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1444 
1445                 buffer[0] = (((uint32_t)pt[0] << 24) | ((uint32_t)pt[1] << 16) |
1446                     ((uint32_t)pt[2] << 8) | (uint32_t)pt[3]);
1447 
1448                 buffer[1] = (((uint32_t)pt[4] << 24) | ((uint32_t)pt[5] << 16) |
1449                     ((uint32_t)pt[6] << 8) | (uint32_t)pt[7]);
1450 
1451                 buffer[2] = (((uint32_t)pt[8] << 24) | ((uint32_t)pt[9] << 16) |
1452                     ((uint32_t)pt[10] << 8) | (uint32_t)pt[11]);
1453 
1454                 buffer[3] = (((uint32_t)pt[12] << 24) |
1455                     ((uint32_t)pt[13] << 16) | ((uint32_t)pt[14] << 8) |
1456                     (uint32_t)pt[15]);
1457 
1458                 aes_encrypt_impl(&ksch->encr_ks, ksch->nr, buffer, buffer);
1459 
1460                 ct[0] = buffer[0] >> 24;
1461                 ct[1] = buffer[0] >> 16;
1462                 ct[2] = buffer[0] >> 8;
1463                 ct[3] = (uint8_t)buffer[0];
1464                 ct[4] = buffer[1] >> 24;
1465                 ct[5] = buffer[1] >> 16;
1466                 ct[6] = buffer[1] >> 8;
1467                 ct[7] = (uint8_t)buffer[1];
1468                 ct[8] = buffer[2] >> 24;
1469                 ct[9] = buffer[2] >> 16;
1470                 ct[10] = buffer[2] >> 8;
1471                 ct[11] = (uint8_t)buffer[2];
1472                 ct[12] = buffer[3] >> 24;
1473                 ct[13] = buffer[3] >> 16;
1474                 ct[14] = buffer[3] >> 8;
1475                 ct[15] = (uint8_t)buffer[3];
1476 #ifdef _BIG_ENDIAN
1477         }
1478 #endif
1479 
1480 /* EXPORT DELETE END */
1481 }
1482 
1483 void
1484 aes_decrypt_block(void *ks, uint8_t *ct, uint8_t *pt)
1485 {
1486 /* EXPORT DELETE START */
1487 
1488         aes_key_t *ksch = (aes_key_t *)ks;
1489 
1490 #ifdef _BIG_ENDIAN
1491         if (IS_P2ALIGNED(ct, sizeof (uint32_t)) &&
1492             IS_P2ALIGNED(pt, sizeof (uint32_t))) {
1493                 /* LINTED:  pointer alignment */
1494                 aes_decrypt_impl(&ksch->decr_ks, ksch->nr, (uint32_t *)ct,
1495                     /* LINTED:  pointer alignment */
1496                     (uint32_t *)pt);
1497         } else {
1498 #endif
1499                 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1500 
1501                 buffer[0] = (((uint32_t)ct[0] << 24) | ((uint32_t)ct[1] << 16) |
1502                     ((uint32_t)ct[2] << 8) | (uint32_t)ct[3]);
1503 
1504                 buffer[1] = (((uint32_t)ct[4] << 24) | ((uint32_t)ct[5] << 16) |
1505                     ((uint32_t)ct[6] << 8) | (uint32_t)ct[7]);
1506 
1507                 buffer[2] = (((uint32_t)ct[8] << 24) | ((uint32_t)ct[9] << 16) |
1508                     ((uint32_t)ct[10] << 8) | (uint32_t)ct[11]);
1509 
1510                 buffer[3] = (((uint32_t)ct[12] << 24) |
1511                     ((uint32_t)ct[13] << 16) | ((uint32_t)ct[14] << 8) |
1512                     (uint32_t)ct[15]);
1513 
1514                 aes_decrypt_impl(&ksch->decr_ks, ksch->nr, buffer, buffer);
1515 
1516                 pt[0] = buffer[0] >> 24;
1517                 pt[1] = buffer[0] >> 16;
1518                 pt[2] = buffer[0] >> 8;
1519                 pt[3] = (uint8_t)buffer[0];
1520                 pt[4] = buffer[1] >> 24;
1521                 pt[5] = buffer[1] >> 16;
1522                 pt[6] = buffer[1] >> 8;
1523                 pt[7] = (uint8_t)buffer[1];
1524                 pt[8] = buffer[2] >> 24;
1525                 pt[9] = buffer[2] >> 16;
1526                 pt[10] = buffer[2] >> 8;
1527                 pt[11] = (uint8_t)buffer[2];
1528                 pt[12] = buffer[3] >> 24;
1529                 pt[13] = buffer[3] >> 16;
1530                 pt[14] = buffer[3] >> 8;
1531                 pt[15] = (uint8_t)buffer[3];
1532 #ifdef _BIG_ENDIAN
1533         }
1534 #endif
1535 
1536 /* EXPORT DELETE END */
1537 }
1538 
1539 /*
1540  * Allocate key schedule for AES
1541  */
1542 /* ARGSUSED */
1543 void *
1544 aes_alloc_keysched(size_t *size, int kmflag)
1545 {
1546 
1547 /* EXPORT DELETE START */
1548 
1549         aes_key_t *keysched;
1550 
1551 #ifdef  _KERNEL
1552         keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1553 #else   /* !_KERNEL */
1554         keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1555 #endif  /* _KERNEL */
1556 
1557         if (keysched != NULL) {
1558                 *size = sizeof (aes_key_t);
1559                 return (keysched);
1560         }
1561 
1562 /* EXPORT DELETE END */
1563 
1564         return (NULL);
1565 }