]> git.proxmox.com Git - mirror_zfs-debian.git/blob - module/icp/algs/aes/aes_impl.c
New upstream version 0.7.2
[mirror_zfs-debian.git] / module / icp / algs / aes / aes_impl.c
1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
23 */
24
25 #if defined(_KERNEL) && defined(__amd64)
26 #include <linux/simd_x86.h>
27
28 #define KPREEMPT_DISABLE kfpu_begin()
29 #define KPREEMPT_ENABLE kfpu_end()
30
31 #else
32 #define KPREEMPT_DISABLE
33 #define KPREEMPT_ENABLE
34 #endif /* _KERNEL */
35
36 #include <sys/zfs_context.h>
37 #include <sys/crypto/spi.h>
38 #include <modes/modes.h>
39 #include <aes/aes_impl.h>
40
41
42
43 /*
44 * This file is derived from the file rijndael-alg-fst.c taken from the
45 * "optimized C code v3.0" on the "rijndael home page"
46 * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
47 * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
48 *
49 * The following note is from the original file:
50 */
51
52 /*
53 * rijndael-alg-fst.c
54 *
55 * @version 3.0 (December 2000)
56 *
57 * Optimised ANSI C code for the Rijndael cipher (now AES)
58 *
59 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
60 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
61 * @author Paulo Barreto <paulo.barreto@terra.com.br>
62 *
63 * This code is hereby placed in the public domain.
64 *
65 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
66 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
67 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
68 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
69 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
70 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
71 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
72 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
73 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
74 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
75 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
76 */
77
78 #if defined(__amd64)
79
80 /* These functions are used to execute amd64 instructions for AMD or Intel: */
81 extern int rijndael_key_setup_enc_amd64(uint32_t rk[],
82 const uint32_t cipherKey[], int keyBits);
83 extern int rijndael_key_setup_dec_amd64(uint32_t rk[],
84 const uint32_t cipherKey[], int keyBits);
85 extern void aes_encrypt_amd64(const uint32_t rk[], int Nr,
86 const uint32_t pt[4], uint32_t ct[4]);
87 extern void aes_decrypt_amd64(const uint32_t rk[], int Nr,
88 const uint32_t ct[4], uint32_t pt[4]);
89
90 /* These functions are used to execute Intel-specific AES-NI instructions: */
91 extern int rijndael_key_setup_enc_intel(uint32_t rk[],
92 const uint32_t cipherKey[], uint64_t keyBits);
93 extern int rijndael_key_setup_dec_intel(uint32_t rk[],
94 const uint32_t cipherKey[], uint64_t keyBits);
95 extern void aes_encrypt_intel(const uint32_t rk[], int Nr,
96 const uint32_t pt[4], uint32_t ct[4]);
97 extern void aes_decrypt_intel(const uint32_t rk[], int Nr,
98 const uint32_t ct[4], uint32_t pt[4]);
99
100 static int intel_aes_instructions_present(void);
101
102 #define AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d, e)
103 #define AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d, e)
104
105 #else /* Generic C implementation */
106
107 #define AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d)
108 #define AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d)
109 #define rijndael_key_setup_enc_raw rijndael_key_setup_enc
110 #endif /* __amd64 */
111
112 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
113 #define AES_BYTE_SWAP
114 #endif
115
116
117 #if !defined(__amd64)
118 /*
119 * Constant tables
120 */
121
122 /*
123 * Te0[x] = S [x].[02, 01, 01, 03];
124 * Te1[x] = S [x].[03, 02, 01, 01];
125 * Te2[x] = S [x].[01, 03, 02, 01];
126 * Te3[x] = S [x].[01, 01, 03, 02];
127 * Te4[x] = S [x].[01, 01, 01, 01];
128 *
129 * Td0[x] = Si[x].[0e, 09, 0d, 0b];
130 * Td1[x] = Si[x].[0b, 0e, 09, 0d];
131 * Td2[x] = Si[x].[0d, 0b, 0e, 09];
132 * Td3[x] = Si[x].[09, 0d, 0b, 0e];
133 * Td4[x] = Si[x].[01, 01, 01, 01];
134 */
135
136 /* Encrypt Sbox constants (for the substitute bytes operation) */
137
138 static const uint32_t Te0[256] =
139 {
140 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
141 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
142 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
143 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
144 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
145 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
146 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
147 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
148 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
149 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
150 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
151 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
152 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
153 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
154 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
155 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
156 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
157 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
158 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
159 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
160 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
161 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
162 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
163 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
164 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
165 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
166 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
167 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
168 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
169 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
170 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
171 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
172 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
173 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
174 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
175 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
176 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
177 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
178 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
179 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
180 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
181 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
182 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
183 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
184 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
185 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
186 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
187 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
188 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
189 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
190 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
191 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
192 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
193 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
194 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
195 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
196 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
197 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
198 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
199 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
200 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
201 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
202 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
203 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
204 };
205
206
207 static const uint32_t Te1[256] =
208 {
209 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
210 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
211 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
212 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
213 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
214 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
215 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
216 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
217 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
218 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
219 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
220 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
221 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
222 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
223 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
224 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
225 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
226 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
227 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
228 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
229 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
230 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
231 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
232 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
233 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
234 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
235 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
236 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
237 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
238 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
239 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
240 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
241 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
242 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
243 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
244 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
245 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
246 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
247 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
248 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
249 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
250 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
251 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
252 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
253 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
254 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
255 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
256 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
257 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
258 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
259 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
260 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
261 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
262 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
263 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
264 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
265 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
266 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
267 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
268 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
269 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
270 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
271 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
272 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
273 };
274
275
276 static const uint32_t Te2[256] =
277 {
278 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
279 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
280 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
281 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
282 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
283 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
284 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
285 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
286 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
287 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
288 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
289 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
290 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
291 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
292 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
293 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
294 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
295 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
296 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
297 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
298 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
299 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
300 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
301 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
302 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
303 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
304 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
305 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
306 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
307 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
308 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
309 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
310 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
311 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
312 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
313 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
314 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
315 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
316 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
317 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
318 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
319 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
320 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
321 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
322 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
323 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
324 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
325 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
326 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
327 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
328 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
329 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
330 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
331 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
332 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
333 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
334 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
335 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
336 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
337 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
338 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
339 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
340 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
341 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
342 };
343
344
345 static const uint32_t Te3[256] =
346 {
347 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
348 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
349 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
350 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
351 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
352 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
353 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
354 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
355 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
356 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
357 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
358 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
359 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
360 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
361 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
362 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
363 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
364 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
365 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
366 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
367 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
368 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
369 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
370 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
371 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
372 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
373 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
374 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
375 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
376 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
377 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
378 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
379 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
380 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
381 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
382 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
383 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
384 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
385 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
386 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
387 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
388 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
389 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
390 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
391 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
392 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
393 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
394 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
395 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
396 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
397 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
398 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
399 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
400 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
401 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
402 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
403 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
404 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
405 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
406 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
407 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
408 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
409 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
410 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
411 };
412
413 static const uint32_t Te4[256] =
414 {
415 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
416 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
417 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
418 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
419 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
420 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
421 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
422 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
423 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
424 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
425 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
426 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
427 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
428 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
429 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
430 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
431 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
432 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
433 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
434 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
435 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
436 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
437 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
438 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
439 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
440 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
441 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
442 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
443 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
444 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
445 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
446 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
447 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
448 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
449 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
450 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
451 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
452 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
453 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
454 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
455 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
456 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
457 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
458 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
459 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
460 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
461 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
462 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
463 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
464 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
465 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
466 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
467 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
468 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
469 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
470 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
471 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
472 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
473 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
474 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
475 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
476 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
477 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
478 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
479 };
480
481 /* Decrypt Sbox constants (for the substitute bytes operation) */
482
483 static const uint32_t Td0[256] =
484 {
485 0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
486 0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
487 0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
488 0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
489 0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
490 0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
491 0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
492 0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
493 0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
494 0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
495 0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
496 0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
497 0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
498 0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
499 0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
500 0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
501 0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
502 0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
503 0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
504 0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
505 0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
506 0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
507 0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
508 0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
509 0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
510 0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
511 0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
512 0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
513 0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
514 0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
515 0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
516 0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
517 0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
518 0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
519 0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
520 0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
521 0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
522 0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
523 0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
524 0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
525 0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
526 0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
527 0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
528 0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
529 0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
530 0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
531 0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
532 0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
533 0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
534 0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
535 0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
536 0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
537 0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
538 0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
539 0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
540 0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
541 0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
542 0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
543 0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
544 0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
545 0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
546 0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
547 0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
548 0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
549 };
550
551 static const uint32_t Td1[256] =
552 {
553 0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
554 0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
555 0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
556 0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
557 0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
558 0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
559 0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
560 0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
561 0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
562 0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
563 0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
564 0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
565 0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
566 0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
567 0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
568 0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
569 0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
570 0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
571 0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
572 0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
573 0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
574 0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
575 0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
576 0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
577 0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
578 0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
579 0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
580 0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
581 0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
582 0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
583 0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
584 0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
585 0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
586 0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
587 0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
588 0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
589 0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
590 0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
591 0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
592 0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
593 0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
594 0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
595 0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
596 0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
597 0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
598 0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
599 0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
600 0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
601 0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
602 0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
603 0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
604 0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
605 0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
606 0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
607 0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
608 0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
609 0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
610 0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
611 0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
612 0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
613 0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
614 0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
615 0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
616 0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
617 };
618
619 static const uint32_t Td2[256] =
620 {
621 0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
622 0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
623 0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
624 0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
625 0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
626 0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
627 0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
628 0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
629 0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
630 0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
631 0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
632 0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
633 0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
634 0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
635 0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
636 0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
637 0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
638 0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
639 0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
640 0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
641 0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
642 0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
643 0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
644 0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
645 0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
646 0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
647 0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
648 0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
649 0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
650 0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
651 0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
652 0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
653 0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
654 0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
655 0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
656 0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
657 0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
658 0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
659 0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
660 0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
661 0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
662 0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
663 0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
664 0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
665 0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
666 0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
667 0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
668 0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
669 0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
670 0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
671 0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
672 0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
673 0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
674 0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
675 0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
676 0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
677 0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
678 0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
679 0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
680 0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
681 0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
682 0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
683 0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
684 0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
685 };
686
687 static const uint32_t Td3[256] =
688 {
689 0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
690 0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
691 0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
692 0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
693 0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
694 0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
695 0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
696 0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
697 0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
698 0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
699 0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
700 0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
701 0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
702 0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
703 0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
704 0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
705 0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
706 0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
707 0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
708 0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
709 0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
710 0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
711 0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
712 0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
713 0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
714 0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
715 0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
716 0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
717 0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
718 0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
719 0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
720 0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
721 0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
722 0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
723 0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
724 0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
725 0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
726 0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
727 0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
728 0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
729 0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
730 0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
731 0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
732 0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
733 0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
734 0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
735 0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
736 0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
737 0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
738 0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
739 0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
740 0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
741 0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
742 0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
743 0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
744 0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
745 0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
746 0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
747 0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
748 0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
749 0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
750 0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
751 0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
752 0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
753 };
754
755 static const uint32_t Td4[256] =
756 {
757 0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
758 0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
759 0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
760 0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
761 0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
762 0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
763 0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
764 0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
765 0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
766 0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
767 0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
768 0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
769 0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
770 0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
771 0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
772 0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
773 0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
774 0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
775 0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
776 0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
777 0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
778 0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
779 0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
780 0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
781 0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
782 0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
783 0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
784 0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
785 0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
786 0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
787 0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
788 0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
789 0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
790 0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
791 0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
792 0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
793 0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
794 0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
795 0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
796 0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
797 0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
798 0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
799 0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
800 0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
801 0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
802 0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
803 0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
804 0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
805 0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
806 0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
807 0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
808 0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
809 0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
810 0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
811 0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
812 0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
813 0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
814 0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
815 0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
816 0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
817 0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
818 0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
819 0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
820 0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
821 };
822
823 /* Rcon is Round Constant; used for encryption key expansion */
824 static const uint32_t rcon[RC_LENGTH] =
825 {
826 /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
827 0x01000000, 0x02000000, 0x04000000, 0x08000000,
828 0x10000000, 0x20000000, 0x40000000, 0x80000000,
829 0x1B000000, 0x36000000
830 };
831
832
833 /*
834 * Expand the cipher key into the encryption key schedule.
835 *
836 * Return the number of rounds for the given cipher key size.
837 * The size of the key schedule depends on the number of rounds
838 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
839 *
840 * Parameters:
841 * rk AES key schedule 32-bit array to be initialized
842 * cipherKey User key
843 * keyBits AES key size (128, 192, or 256 bits)
844 */
845 static int
846 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
847 int keyBits)
848 {
849 int i = 0;
850 uint32_t temp;
851
852 rk[0] = cipherKey[0];
853 rk[1] = cipherKey[1];
854 rk[2] = cipherKey[2];
855 rk[3] = cipherKey[3];
856
857 if (keyBits == 128) {
858 for (;;) {
859 temp = rk[3];
860 rk[4] = rk[0] ^
861 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
862 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
863 (Te4[temp & 0xff] & 0x0000ff00) ^
864 (Te4[temp >> 24] & 0x000000ff) ^
865 rcon[i];
866 rk[5] = rk[1] ^ rk[4];
867 rk[6] = rk[2] ^ rk[5];
868 rk[7] = rk[3] ^ rk[6];
869
870 if (++i == 10) {
871 return (10);
872 }
873 rk += 4;
874 }
875 }
876
877 rk[4] = cipherKey[4];
878 rk[5] = cipherKey[5];
879
880 if (keyBits == 192) {
881 for (;;) {
882 temp = rk[5];
883 rk[6] = rk[0] ^
884 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
885 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
886 (Te4[temp & 0xff] & 0x0000ff00) ^
887 (Te4[temp >> 24] & 0x000000ff) ^
888 rcon[i];
889 rk[7] = rk[1] ^ rk[6];
890 rk[8] = rk[2] ^ rk[7];
891 rk[9] = rk[3] ^ rk[8];
892
893 if (++i == 8) {
894 return (12);
895 }
896
897 rk[10] = rk[4] ^ rk[9];
898 rk[11] = rk[5] ^ rk[10];
899 rk += 6;
900 }
901 }
902
903 rk[6] = cipherKey[6];
904 rk[7] = cipherKey[7];
905
906 if (keyBits == 256) {
907 for (;;) {
908 temp = rk[7];
909 rk[8] = rk[0] ^
910 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
911 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
912 (Te4[temp & 0xff] & 0x0000ff00) ^
913 (Te4[temp >> 24] & 0x000000ff) ^
914 rcon[i];
915 rk[9] = rk[1] ^ rk[8];
916 rk[10] = rk[2] ^ rk[9];
917 rk[11] = rk[3] ^ rk[10];
918
919 if (++i == 7) {
920 return (14);
921 }
922 temp = rk[11];
923 rk[12] = rk[4] ^
924 (Te4[temp >> 24] & 0xff000000) ^
925 (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
926 (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
927 (Te4[temp & 0xff] & 0x000000ff);
928 rk[13] = rk[5] ^ rk[12];
929 rk[14] = rk[6] ^ rk[13];
930 rk[15] = rk[7] ^ rk[14];
931
932 rk += 8;
933 }
934 }
935
936 return (0);
937 }
938 #endif /* !__amd64 */
939
940 #if defined(__amd64)
941
942 /*
943 * Expand the 32-bit AES cipher key array into the encryption and decryption
944 * key schedules.
945 *
946 * Parameters:
947 * key AES key schedule to be initialized
948 * keyarr32 User key
949 * keyBits AES key size (128, 192, or 256 bits)
950 */
951 static void
952 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
953 {
954 if (intel_aes_instructions_present()) {
955 key->flags = INTEL_AES_NI_CAPABLE;
956 KPREEMPT_DISABLE;
957 key->nr = rijndael_key_setup_enc_intel(&(key->encr_ks.ks32[0]),
958 keyarr32, keybits);
959 key->nr = rijndael_key_setup_dec_intel(&(key->decr_ks.ks32[0]),
960 keyarr32, keybits);
961 KPREEMPT_ENABLE;
962 } else {
963 key->flags = 0;
964 key->nr = rijndael_key_setup_enc_amd64(&(key->encr_ks.ks32[0]),
965 keyarr32, keybits);
966 key->nr = rijndael_key_setup_dec_amd64(&(key->decr_ks.ks32[0]),
967 keyarr32, keybits);
968 }
969
970 key->type = AES_32BIT_KS;
971 }
972
973 /*
974 * Encrypt one block of data. The block is assumed to be an array
975 * of four uint32_t values, so copy for alignment (and byte-order
976 * reversal for little endian systems might be necessary on the
977 * input and output byte streams.
978 * The size of the key schedule depends on the number of rounds
979 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
980 *
981 * Parameters:
982 * rk Key schedule, of aes_ks_t (60 32-bit integers)
983 * Nr Number of rounds
984 * pt Input block (plain text)
985 * ct Output block (crypto text). Can overlap with pt
986 * flags Indicates whether we're on Intel AES-NI-capable hardware
987 */
988 static void
989 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
990 uint32_t ct[4], int flags)
991 {
992 if (flags & INTEL_AES_NI_CAPABLE) {
993 KPREEMPT_DISABLE;
994 aes_encrypt_intel(rk, Nr, pt, ct);
995 KPREEMPT_ENABLE;
996 } else {
997 aes_encrypt_amd64(rk, Nr, pt, ct);
998 }
999 }
1000
1001 /*
1002 * Decrypt one block of data. The block is assumed to be an array
1003 * of four uint32_t values, so copy for alignment (and byte-order
1004 * reversal for little endian systems might be necessary on the
1005 * input and output byte streams.
1006 * The size of the key schedule depends on the number of rounds
1007 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1008 *
1009 * Parameters:
1010 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1011 * Nr Number of rounds
1012 * ct Input block (crypto text)
1013 * pt Output block (plain text). Can overlap with pt
1014 * flags Indicates whether we're on Intel AES-NI-capable hardware
1015 */
1016 static void
1017 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1018 uint32_t pt[4], int flags)
1019 {
1020 if (flags & INTEL_AES_NI_CAPABLE) {
1021 KPREEMPT_DISABLE;
1022 aes_decrypt_intel(rk, Nr, ct, pt);
1023 KPREEMPT_ENABLE;
1024 } else {
1025 aes_decrypt_amd64(rk, Nr, ct, pt);
1026 }
1027 }
1028
1029
1030 #else /* generic C implementation */
1031
1032 /*
1033 * Expand the cipher key into the decryption key schedule.
1034 * Return the number of rounds for the given cipher key size.
1035 * The size of the key schedule depends on the number of rounds
1036 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1037 *
1038 * Parameters:
1039 * rk AES key schedule 32-bit array to be initialized
1040 * cipherKey User key
1041 * keyBits AES key size (128, 192, or 256 bits)
1042 */
1043 static int
1044 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1045 {
1046 int Nr, i, j;
1047 uint32_t temp;
1048
1049 /* expand the cipher key: */
1050 Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1051
1052 /* invert the order of the round keys: */
1053 for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1054 temp = rk[i];
1055 rk[i] = rk[j];
1056 rk[j] = temp;
1057 temp = rk[i + 1];
1058 rk[i + 1] = rk[j + 1];
1059 rk[j + 1] = temp;
1060 temp = rk[i + 2];
1061 rk[i + 2] = rk[j + 2];
1062 rk[j + 2] = temp;
1063 temp = rk[i + 3];
1064 rk[i + 3] = rk[j + 3];
1065 rk[j + 3] = temp;
1066 }
1067
1068 /*
1069 * apply the inverse MixColumn transform to all
1070 * round keys but the first and the last:
1071 */
1072 for (i = 1; i < Nr; i++) {
1073 rk += 4;
1074 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1075 Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1076 Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1077 Td3[Te4[rk[0] & 0xff] & 0xff];
1078 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1079 Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1080 Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1081 Td3[Te4[rk[1] & 0xff] & 0xff];
1082 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1083 Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1084 Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1085 Td3[Te4[rk[2] & 0xff] & 0xff];
1086 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1087 Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1088 Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1089 Td3[Te4[rk[3] & 0xff] & 0xff];
1090 }
1091
1092 return (Nr);
1093 }
1094
1095
1096 /*
1097 * Expand the 32-bit AES cipher key array into the encryption and decryption
1098 * key schedules.
1099 *
1100 * Parameters:
1101 * key AES key schedule to be initialized
1102 * keyarr32 User key
1103 * keyBits AES key size (128, 192, or 256 bits)
1104 */
1105 static void
1106 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1107 {
1108 key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1109 keybits);
1110 key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1111 keybits);
1112 key->type = AES_32BIT_KS;
1113 }
1114
1115
1116 /*
1117 * Encrypt one block of data. The block is assumed to be an array
1118 * of four uint32_t values, so copy for alignment (and byte-order
1119 * reversal for little endian systems might be necessary on the
1120 * input and output byte streams.
1121 * The size of the key schedule depends on the number of rounds
1122 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1123 *
1124 * Parameters:
1125 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1126 * Nr Number of rounds
1127 * pt Input block (plain text)
1128 * ct Output block (crypto text). Can overlap with pt
1129 */
1130 static void
1131 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1132 uint32_t ct[4])
1133 {
1134 uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1135 int r;
1136
1137 /*
1138 * map byte array block to cipher state
1139 * and add initial round key:
1140 */
1141
1142 s0 = pt[0] ^ rk[0];
1143 s1 = pt[1] ^ rk[1];
1144 s2 = pt[2] ^ rk[2];
1145 s3 = pt[3] ^ rk[3];
1146
1147 /*
1148 * Nr - 1 full rounds:
1149 */
1150
1151 r = Nr >> 1;
1152
1153 for (;;) {
1154 t0 = Te0[s0 >> 24] ^
1155 Te1[(s1 >> 16) & 0xff] ^
1156 Te2[(s2 >> 8) & 0xff] ^
1157 Te3[s3 & 0xff] ^
1158 rk[4];
1159
1160 t1 = Te0[s1 >> 24] ^
1161 Te1[(s2 >> 16) & 0xff] ^
1162 Te2[(s3 >> 8) & 0xff] ^
1163 Te3[s0 & 0xff] ^
1164 rk[5];
1165
1166 t2 = Te0[s2 >> 24] ^
1167 Te1[(s3 >> 16) & 0xff] ^
1168 Te2[(s0 >> 8) & 0xff] ^
1169 Te3[s1 & 0xff] ^
1170 rk[6];
1171
1172 t3 = Te0[s3 >> 24] ^
1173 Te1[(s0 >> 16) & 0xff] ^
1174 Te2[(s1 >> 8) & 0xff] ^
1175 Te3[s2 & 0xff] ^
1176 rk[7];
1177
1178 rk += 8;
1179
1180 if (--r == 0) {
1181 break;
1182 }
1183
1184 s0 = Te0[t0 >> 24] ^
1185 Te1[(t1 >> 16) & 0xff] ^
1186 Te2[(t2 >> 8) & 0xff] ^
1187 Te3[t3 & 0xff] ^
1188 rk[0];
1189
1190 s1 = Te0[t1 >> 24] ^
1191 Te1[(t2 >> 16) & 0xff] ^
1192 Te2[(t3 >> 8) & 0xff] ^
1193 Te3[t0 & 0xff] ^
1194 rk[1];
1195
1196 s2 = Te0[t2 >> 24] ^
1197 Te1[(t3 >> 16) & 0xff] ^
1198 Te2[(t0 >> 8) & 0xff] ^
1199 Te3[t1 & 0xff] ^
1200 rk[2];
1201
1202 s3 = Te0[t3 >> 24] ^
1203 Te1[(t0 >> 16) & 0xff] ^
1204 Te2[(t1 >> 8) & 0xff] ^
1205 Te3[t2 & 0xff] ^
1206 rk[3];
1207 }
1208
1209 /*
1210 * apply last round and
1211 * map cipher state to byte array block:
1212 */
1213
1214 s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1215 (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1216 (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1217 (Te4[t3 & 0xff] & 0x000000ff) ^
1218 rk[0];
1219 ct[0] = s0;
1220
1221 s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1222 (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1223 (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
1224 (Te4[t0 & 0xff] & 0x000000ff) ^
1225 rk[1];
1226 ct[1] = s1;
1227
1228 s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1229 (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1230 (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1231 (Te4[t1 & 0xff] & 0x000000ff) ^
1232 rk[2];
1233 ct[2] = s2;
1234
1235 s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1236 (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1237 (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
1238 (Te4[t2 & 0xff] & 0x000000ff) ^
1239 rk[3];
1240 ct[3] = s3;
1241 }
1242
1243
1244 /*
1245 * Decrypt one block of data. The block is assumed to be an array
1246 * of four uint32_t values, so copy for alignment (and byte-order
1247 * reversal for little endian systems might be necessary on the
1248 * input and output byte streams.
1249 * The size of the key schedule depends on the number of rounds
1250 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1251 *
1252 * Parameters:
1253 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1254 * Nr Number of rounds
1255 * ct Input block (crypto text)
1256 * pt Output block (plain text). Can overlap with pt
1257 */
1258 static void
1259 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1260 uint32_t pt[4])
1261 {
1262 uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1263 int r;
1264
1265 /*
1266 * map byte array block to cipher state
1267 * and add initial round key:
1268 */
1269 s0 = ct[0] ^ rk[0];
1270 s1 = ct[1] ^ rk[1];
1271 s2 = ct[2] ^ rk[2];
1272 s3 = ct[3] ^ rk[3];
1273
1274 /*
1275 * Nr - 1 full rounds:
1276 */
1277
1278 r = Nr >> 1;
1279
1280 for (;;) {
1281 t0 = Td0[s0 >> 24] ^
1282 Td1[(s3 >> 16) & 0xff] ^
1283 Td2[(s2 >> 8) & 0xff] ^
1284 Td3[s1 & 0xff] ^
1285 rk[4];
1286
1287 t1 = Td0[s1 >> 24] ^
1288 Td1[(s0 >> 16) & 0xff] ^
1289 Td2[(s3 >> 8) & 0xff] ^
1290 Td3[s2 & 0xff] ^
1291 rk[5];
1292
1293 t2 = Td0[s2 >> 24] ^
1294 Td1[(s1 >> 16) & 0xff] ^
1295 Td2[(s0 >> 8) & 0xff] ^
1296 Td3[s3 & 0xff] ^
1297 rk[6];
1298
1299 t3 = Td0[s3 >> 24] ^
1300 Td1[(s2 >> 16) & 0xff] ^
1301 Td2[(s1 >> 8) & 0xff] ^
1302 Td3[s0 & 0xff] ^
1303 rk[7];
1304
1305 rk += 8;
1306
1307 if (--r == 0) {
1308 break;
1309 }
1310
1311 s0 = Td0[t0 >> 24] ^
1312 Td1[(t3 >> 16) & 0xff] ^
1313 Td2[(t2 >> 8) & 0xff] ^
1314 Td3[t1 & 0xff] ^
1315 rk[0];
1316
1317 s1 = Td0[t1 >> 24] ^
1318 Td1[(t0 >> 16) & 0xff] ^
1319 Td2[(t3 >> 8) & 0xff] ^
1320 Td3[t2 & 0xff] ^
1321 rk[1];
1322
1323 s2 = Td0[t2 >> 24] ^
1324 Td1[(t1 >> 16) & 0xff] ^
1325 Td2[(t0 >> 8) & 0xff] ^
1326 Td3[t3 & 0xff] ^
1327 rk[2];
1328
1329 s3 = Td0[t3 >> 24] ^
1330 Td1[(t2 >> 16) & 0xff] ^
1331 Td2[(t1 >> 8) & 0xff] ^
1332 Td3[t0 & 0xff] ^
1333 rk[3];
1334 }
1335
1336 /*
1337 * apply last round and
1338 * map cipher state to byte array block:
1339 */
1340
1341 s0 = (Td4[t0 >> 24] & 0xff000000) ^
1342 (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1343 (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1344 (Td4[t1 & 0xff] & 0x000000ff) ^
1345 rk[0];
1346 pt[0] = s0;
1347
1348 s1 = (Td4[t1 >> 24] & 0xff000000) ^
1349 (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1350 (Td4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
1351 (Td4[t2 & 0xff] & 0x000000ff) ^
1352 rk[1];
1353 pt[1] = s1;
1354
1355 s2 = (Td4[t2 >> 24] & 0xff000000) ^
1356 (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1357 (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1358 (Td4[t3 & 0xff] & 0x000000ff) ^
1359 rk[2];
1360 pt[2] = s2;
1361
1362 s3 = (Td4[t3 >> 24] & 0xff000000) ^
1363 (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1364 (Td4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
1365 (Td4[t0 & 0xff] & 0x000000ff) ^
1366 rk[3];
1367 pt[3] = s3;
1368 }
1369 #endif /* __amd64 */
1370
1371
1372 /*
1373 * Initialize AES encryption and decryption key schedules.
1374 *
1375 * Parameters:
1376 * cipherKey User key
1377 * keyBits AES key size (128, 192, or 256 bits)
1378 * keysched AES key schedule to be initialized, of type aes_key_t.
1379 * Allocated by aes_alloc_keysched().
1380 */
1381 void
1382 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1383 {
1384 aes_key_t *newbie = keysched;
1385 uint_t keysize, i, j;
1386 union {
1387 uint64_t ka64[4];
1388 uint32_t ka32[8];
1389 } keyarr;
1390
1391 switch (keyBits) {
1392 case 128:
1393 newbie->nr = 10;
1394 break;
1395
1396 case 192:
1397 newbie->nr = 12;
1398 break;
1399
1400 case 256:
1401 newbie->nr = 14;
1402 break;
1403
1404 default:
1405 /* should never get here */
1406 return;
1407 }
1408 keysize = CRYPTO_BITS2BYTES(keyBits);
1409
1410 /*
1411 * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1412 * 4 bytes in the key. On _BIG_ENDIAN and AMD64, copy the key
1413 * without reversing bytes.
1414 * For AMD64, do not byte swap for aes_setupkeys().
1415 *
1416 * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1417 * X86/AMD64 uses a key schedule array with 32-bit elements.
1418 */
1419 #ifndef AES_BYTE_SWAP
1420 if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1421 for (i = 0, j = 0; j < keysize; i++, j += 8) {
1422 /* LINTED: pointer alignment */
1423 keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1424 }
1425 } else {
1426 bcopy(cipherKey, keyarr.ka32, keysize);
1427 }
1428
1429 #else /* byte swap */
1430 for (i = 0, j = 0; j < keysize; i++, j += 4) {
1431 keyarr.ka32[i] = htonl(*(uint32_t *)(void *)&cipherKey[j]);
1432 }
1433 #endif
1434
1435 aes_setupkeys(newbie, keyarr.ka32, keyBits);
1436 }
1437
1438
1439 /*
1440 * Encrypt one block using AES.
1441 * Align if needed and (for x86 32-bit only) byte-swap.
1442 *
1443 * Parameters:
1444 * ks Key schedule, of type aes_key_t
1445 * pt Input block (plain text)
1446 * ct Output block (crypto text). Can overlap with pt
1447 */
1448 int
1449 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1450 {
1451 aes_key_t *ksch = (aes_key_t *)ks;
1452
1453 #ifndef AES_BYTE_SWAP
1454 if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1455 /* LINTED: pointer alignment */
1456 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1457 /* LINTED: pointer alignment */
1458 (uint32_t *)pt, (uint32_t *)ct, ksch->flags);
1459 } else {
1460 #endif
1461 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1462
1463 /* Copy input block into buffer */
1464 #ifndef AES_BYTE_SWAP
1465 bcopy(pt, &buffer, AES_BLOCK_LEN);
1466
1467 #else /* byte swap */
1468 buffer[0] = htonl(*(uint32_t *)(void *)&pt[0]);
1469 buffer[1] = htonl(*(uint32_t *)(void *)&pt[4]);
1470 buffer[2] = htonl(*(uint32_t *)(void *)&pt[8]);
1471 buffer[3] = htonl(*(uint32_t *)(void *)&pt[12]);
1472 #endif
1473
1474 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1475 buffer, buffer, ksch->flags);
1476
1477 /* Copy result from buffer to output block */
1478 #ifndef AES_BYTE_SWAP
1479 bcopy(&buffer, ct, AES_BLOCK_LEN);
1480 }
1481
1482 #else /* byte swap */
1483 *(uint32_t *)(void *)&ct[0] = htonl(buffer[0]);
1484 *(uint32_t *)(void *)&ct[4] = htonl(buffer[1]);
1485 *(uint32_t *)(void *)&ct[8] = htonl(buffer[2]);
1486 *(uint32_t *)(void *)&ct[12] = htonl(buffer[3]);
1487 #endif
1488 return (CRYPTO_SUCCESS);
1489 }
1490
1491
1492 /*
1493 * Decrypt one block using AES.
1494 * Align and byte-swap if needed.
1495 *
1496 * Parameters:
1497 * ks Key schedule, of type aes_key_t
1498 * ct Input block (crypto text)
1499 * pt Output block (plain text). Can overlap with pt
1500 */
1501 int
1502 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1503 {
1504 aes_key_t *ksch = (aes_key_t *)ks;
1505
1506 #ifndef AES_BYTE_SWAP
1507 if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1508 /* LINTED: pointer alignment */
1509 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1510 /* LINTED: pointer alignment */
1511 (uint32_t *)ct, (uint32_t *)pt, ksch->flags);
1512 } else {
1513 #endif
1514 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1515
1516 /* Copy input block into buffer */
1517 #ifndef AES_BYTE_SWAP
1518 bcopy(ct, &buffer, AES_BLOCK_LEN);
1519
1520 #else /* byte swap */
1521 buffer[0] = htonl(*(uint32_t *)(void *)&ct[0]);
1522 buffer[1] = htonl(*(uint32_t *)(void *)&ct[4]);
1523 buffer[2] = htonl(*(uint32_t *)(void *)&ct[8]);
1524 buffer[3] = htonl(*(uint32_t *)(void *)&ct[12]);
1525 #endif
1526
1527 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1528 buffer, buffer, ksch->flags);
1529
1530 /* Copy result from buffer to output block */
1531 #ifndef AES_BYTE_SWAP
1532 bcopy(&buffer, pt, AES_BLOCK_LEN);
1533 }
1534
1535 #else /* byte swap */
1536 *(uint32_t *)(void *)&pt[0] = htonl(buffer[0]);
1537 *(uint32_t *)(void *)&pt[4] = htonl(buffer[1]);
1538 *(uint32_t *)(void *)&pt[8] = htonl(buffer[2]);
1539 *(uint32_t *)(void *)&pt[12] = htonl(buffer[3]);
1540 #endif
1541
1542 return (CRYPTO_SUCCESS);
1543 }
1544
1545
1546 /*
1547 * Allocate key schedule for AES.
1548 *
1549 * Return the pointer and set size to the number of bytes allocated.
1550 * Memory allocated must be freed by the caller when done.
1551 *
1552 * Parameters:
1553 * size Size of key schedule allocated, in bytes
1554 * kmflag Flag passed to kmem_alloc(9F); ignored in userland.
1555 */
1556 /* ARGSUSED */
1557 void *
1558 aes_alloc_keysched(size_t *size, int kmflag)
1559 {
1560 aes_key_t *keysched;
1561
1562 keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1563 if (keysched != NULL) {
1564 *size = sizeof (aes_key_t);
1565 return (keysched);
1566 }
1567 return (NULL);
1568 }
1569
1570
1571 #ifdef __amd64
1572
1573 #define INTEL_AESNI_FLAG (1 << 25)
1574
1575 /*
1576 * Return 1 if executing on Intel with AES-NI instructions,
1577 * otherwise 0 (i.e., Intel without AES-NI or AMD64).
1578 * Cache the result, as the CPU can't change.
1579 */
1580 static int
1581 intel_aes_instructions_present(void)
1582 {
1583 static int cached_result = -1;
1584 unsigned eax, ebx, ecx, edx;
1585 unsigned func, subfunc;
1586
1587 if (cached_result == -1) { /* first time */
1588 /* check for an intel cpu */
1589 func = 0;
1590 subfunc = 0;
1591
1592 __asm__ __volatile__(
1593 "cpuid"
1594 : "=a" (eax), "=b" (ebx), "=c" (ecx), "=d" (edx)
1595 : "a"(func), "c"(subfunc));
1596
1597 if (memcmp((char *)(&ebx), "Genu", 4) == 0 &&
1598 memcmp((char *)(&edx), "ineI", 4) == 0 &&
1599 memcmp((char *)(&ecx), "ntel", 4) == 0) {
1600 func = 1;
1601 subfunc = 0;
1602
1603 /* check for aes-ni instruction set */
1604 __asm__ __volatile__(
1605 "cpuid"
1606 : "=a" (eax), "=b" (ebx), "=c" (ecx), "=d" (edx)
1607 : "a"(func), "c"(subfunc));
1608
1609 cached_result = !!(ecx & INTEL_AESNI_FLAG);
1610 } else {
1611 cached_result = 0;
1612 }
1613 }
1614
1615 return (cached_result);
1616 }
1617
1618 #endif /* __amd64 */