1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
23 */
24
25 #include <sys/types.h>
26 #include <sys/systm.h>
27 #include <sys/sysmacros.h>
28 #include <netinet/in.h>
29 #include "aes_impl.h"
30 #ifndef _KERNEL
31 #include <strings.h>
32 #include <stdlib.h>
33 #endif /* !_KERNEL */
34
35 #ifdef __amd64
36
37 #ifdef _KERNEL
38 #include <sys/cpuvar.h> /* cpu_t, CPU */
39 #include <sys/x86_archext.h> /* x86_featureset, X86FSET_AES */
40 #include <sys/disp.h> /* kpreempt_disable(), kpreempt_enable */
41
42 /* Workaround for no XMM kernel thread save/restore */
43 #define KPREEMPT_DISABLE kpreempt_disable()
44 #define KPREEMPT_ENABLE kpreempt_enable()
45
46 #else
47 #include <sys/auxv.h> /* getisax() */
48 #include <sys/auxv_386.h> /* AV_386_AES bit */
49 #define KPREEMPT_DISABLE
50 #define KPREEMPT_ENABLE
51 #endif /* _KERNEL */
52 #endif /* __amd64 */
53
54
55 /*
56 * This file is derived from the file rijndael-alg-fst.c taken from the
57 * "optimized C code v3.0" on the "rijndael home page"
58 * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
59 * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
60 *
61 * The following note is from the original file:
62 */
63
64 /*
65 * rijndael-alg-fst.c
66 *
67 * @version 3.0 (December 2000)
68 *
69 * Optimised ANSI C code for the Rijndael cipher (now AES)
70 *
71 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
72 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
73 * @author Paulo Barreto <paulo.barreto@terra.com.br>
74 *
75 * This code is hereby placed in the public domain.
76 *
77 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
78 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
79 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
80 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
81 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
82 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
83 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
84 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
85 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
86 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
87 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
88 */
89
90 /* EXPORT DELETE START */
91
92 #if defined(sun4u)
93 /* External assembly functions: */
94 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4],
95 uint32_t ct[4]);
96 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4],
97 uint32_t pt[4]);
98
99 #define AES_ENCRYPT_IMPL(a, b, c, d, e) aes_encrypt_impl(a, b, c, d)
100 #define AES_DECRYPT_IMPL(a, b, c, d, e) aes_decrypt_impl(a, b, c, d)
101
102 #elif defined(__amd64)
103
104 /* These functions are used to execute amd64 instructions for AMD or Intel: */
105 extern int rijndael_key_setup_enc_amd64(uint32_t rk[],
106 const uint32_t cipherKey[], int keyBits);
107 extern int rijndael_key_setup_dec_amd64(uint32_t rk[],
108 const uint32_t cipherKey[], int keyBits);
109 extern void aes_encrypt_amd64(const uint32_t rk[], int Nr,
110 const uint32_t pt[4], uint32_t ct[4]);
111 extern void aes_decrypt_amd64(const uint32_t rk[], int Nr,
112 const uint32_t ct[4], uint32_t pt[4]);
113
114 /* These functions are used to execute Intel-specific AES-NI instructions: */
115 extern int rijndael_key_setup_enc_intel(uint32_t rk[],
116 const uint32_t cipherKey[], uint64_t keyBits);
117 extern int rijndael_key_setup_dec_intel(uint32_t rk[],
118 const uint32_t cipherKey[], uint64_t keyBits);
119 extern void aes_encrypt_intel(const uint32_t rk[], int Nr,
120 const uint32_t pt[4], uint32_t ct[4]);
121 extern void aes_decrypt_intel(const uint32_t rk[], int Nr,
122 const uint32_t ct[4], uint32_t pt[4]);
123
124 static int intel_aes_instructions_present(void);
125
126 #define AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d, e)
127 #define AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d, e)
128
129 #else /* Generic C implementation */
130
131 #define AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d)
132 #define AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d)
133 #define rijndael_key_setup_enc_raw rijndael_key_setup_enc
134 #endif /* sun4u || __amd64 */
135
136 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
137 #define AES_BYTE_SWAP
138 #endif
139
140
141 #if !defined(__amd64)
142 /*
143 * Constant tables
144 */
145
146 /*
147 * Te0[x] = S [x].[02, 01, 01, 03];
148 * Te1[x] = S [x].[03, 02, 01, 01];
149 * Te2[x] = S [x].[01, 03, 02, 01];
150 * Te3[x] = S [x].[01, 01, 03, 02];
151 * Te4[x] = S [x].[01, 01, 01, 01];
152 *
153 * Td0[x] = Si[x].[0e, 09, 0d, 0b];
154 * Td1[x] = Si[x].[0b, 0e, 09, 0d];
155 * Td2[x] = Si[x].[0d, 0b, 0e, 09];
156 * Td3[x] = Si[x].[09, 0d, 0b, 0e];
157 * Td4[x] = Si[x].[01, 01, 01, 01];
158 */
159
160 /* Encrypt Sbox constants (for the substitute bytes operation) */
161
162 #ifndef sun4u
163
164 static const uint32_t Te0[256] =
165 {
166 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
167 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
168 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
169 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
170 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
171 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
172 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
173 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
174 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
175 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
176 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
177 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
178 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
179 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
180 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
181 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
182 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
183 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
184 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
185 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
186 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
187 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
188 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
189 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
190 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
191 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
192 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
193 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
194 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
195 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
196 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
197 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
198 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
199 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
200 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
201 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
202 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
203 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
204 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
205 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
206 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
207 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
208 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
209 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
210 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
211 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
212 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
213 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
214 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
215 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
216 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
217 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
218 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
219 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
220 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
221 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
222 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
223 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
224 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
225 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
226 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
227 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
228 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
229 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
230 };
231
232
233 static const uint32_t Te1[256] =
234 {
235 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
236 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
237 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
238 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
239 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
240 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
241 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
242 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
243 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
244 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
245 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
246 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
247 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
248 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
249 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
250 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
251 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
252 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
253 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
254 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
255 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
256 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
257 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
258 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
259 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
260 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
261 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
262 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
263 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
264 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
265 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
266 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
267 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
268 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
269 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
270 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
271 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
272 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
273 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
274 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
275 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
276 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
277 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
278 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
279 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
280 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
281 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
282 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
283 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
284 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
285 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
286 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
287 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
288 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
289 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
290 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
291 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
292 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
293 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
294 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
295 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
296 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
297 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
298 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
299 };
300
301
302 static const uint32_t Te2[256] =
303 {
304 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
305 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
306 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
307 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
308 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
309 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
310 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
311 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
312 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
313 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
314 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
315 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
316 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
317 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
318 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
319 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
320 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
321 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
322 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
323 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
324 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
325 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
326 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
327 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
328 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
329 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
330 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
331 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
332 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
333 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
334 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
335 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
336 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
337 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
338 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
339 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
340 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
341 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
342 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
343 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
344 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
345 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
346 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
347 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
348 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
349 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
350 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
351 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
352 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
353 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
354 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
355 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
356 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
357 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
358 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
359 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
360 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
361 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
362 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
363 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
364 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
365 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
366 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
367 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
368 };
369
370
371 static const uint32_t Te3[256] =
372 {
373 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
374 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
375 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
376 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
377 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
378 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
379 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
380 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
381 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
382 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
383 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
384 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
385 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
386 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
387 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
388 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
389 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
390 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
391 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
392 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
393 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
394 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
395 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
396 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
397 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
398 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
399 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
400 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
401 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
402 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
403 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
404 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
405 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
406 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
407 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
408 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
409 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
410 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
411 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
412 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
413 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
414 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
415 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
416 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
417 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
418 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
419 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
420 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
421 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
422 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
423 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
424 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
425 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
426 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
427 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
428 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
429 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
430 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
431 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
432 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
433 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
434 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
435 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
436 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
437 };
438
439 #endif /* !sun4u */
440
441 static const uint32_t Te4[256] =
442 {
443 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
444 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
445 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
446 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
447 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
448 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
449 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
450 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
451 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
452 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
453 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
454 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
455 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
456 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
457 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
458 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
459 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
460 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
461 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
462 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
463 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
464 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
465 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
466 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
467 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
468 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
469 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
470 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
471 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
472 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
473 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
474 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
475 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
476 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
477 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
478 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
479 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
480 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
481 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
482 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
483 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
484 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
485 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
486 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
487 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
488 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
489 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
490 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
491 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
492 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
493 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
494 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
495 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
496 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
497 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
498 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
499 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
500 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
501 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
502 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
503 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
504 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
505 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
506 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
507 };
508
509 /* Decrypt Sbox constants (for the substitute bytes operation) */
510
511 static const uint32_t Td0[256] =
512 {
513 0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
514 0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
515 0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
516 0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
517 0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
518 0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
519 0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
520 0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
521 0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
522 0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
523 0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
524 0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
525 0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
526 0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
527 0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
528 0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
529 0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
530 0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
531 0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
532 0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
533 0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
534 0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
535 0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
536 0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
537 0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
538 0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
539 0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
540 0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
541 0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
542 0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
543 0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
544 0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
545 0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
546 0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
547 0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
548 0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
549 0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
550 0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
551 0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
552 0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
553 0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
554 0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
555 0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
556 0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
557 0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
558 0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
559 0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
560 0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
561 0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
562 0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
563 0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
564 0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
565 0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
566 0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
567 0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
568 0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
569 0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
570 0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
571 0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
572 0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
573 0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
574 0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
575 0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
576 0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
577 };
578
579 static const uint32_t Td1[256] =
580 {
581 0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
582 0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
583 0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
584 0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
585 0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
586 0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
587 0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
588 0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
589 0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
590 0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
591 0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
592 0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
593 0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
594 0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
595 0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
596 0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
597 0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
598 0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
599 0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
600 0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
601 0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
602 0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
603 0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
604 0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
605 0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
606 0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
607 0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
608 0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
609 0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
610 0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
611 0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
612 0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
613 0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
614 0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
615 0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
616 0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
617 0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
618 0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
619 0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
620 0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
621 0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
622 0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
623 0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
624 0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
625 0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
626 0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
627 0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
628 0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
629 0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
630 0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
631 0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
632 0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
633 0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
634 0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
635 0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
636 0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
637 0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
638 0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
639 0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
640 0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
641 0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
642 0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
643 0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
644 0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
645 };
646
647 static const uint32_t Td2[256] =
648 {
649 0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
650 0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
651 0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
652 0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
653 0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
654 0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
655 0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
656 0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
657 0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
658 0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
659 0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
660 0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
661 0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
662 0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
663 0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
664 0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
665 0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
666 0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
667 0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
668 0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
669 0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
670 0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
671 0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
672 0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
673 0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
674 0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
675 0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
676 0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
677 0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
678 0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
679 0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
680 0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
681 0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
682 0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
683 0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
684 0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
685 0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
686 0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
687 0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
688 0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
689 0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
690 0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
691 0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
692 0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
693 0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
694 0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
695 0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
696 0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
697 0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
698 0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
699 0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
700 0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
701 0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
702 0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
703 0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
704 0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
705 0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
706 0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
707 0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
708 0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
709 0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
710 0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
711 0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
712 0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
713 };
714
715 static const uint32_t Td3[256] =
716 {
717 0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
718 0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
719 0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
720 0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
721 0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
722 0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
723 0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
724 0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
725 0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
726 0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
727 0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
728 0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
729 0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
730 0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
731 0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
732 0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
733 0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
734 0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
735 0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
736 0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
737 0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
738 0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
739 0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
740 0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
741 0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
742 0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
743 0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
744 0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
745 0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
746 0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
747 0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
748 0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
749 0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
750 0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
751 0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
752 0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
753 0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
754 0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
755 0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
756 0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
757 0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
758 0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
759 0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
760 0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
761 0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
762 0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
763 0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
764 0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
765 0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
766 0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
767 0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
768 0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
769 0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
770 0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
771 0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
772 0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
773 0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
774 0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
775 0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
776 0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
777 0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
778 0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
779 0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
780 0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
781 };
782
783 #ifndef sun4u
784
785 static const uint32_t Td4[256] =
786 {
787 0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
788 0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
789 0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
790 0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
791 0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
792 0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
793 0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
794 0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
795 0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
796 0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
797 0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
798 0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
799 0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
800 0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
801 0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
802 0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
803 0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
804 0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
805 0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
806 0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
807 0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
808 0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
809 0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
810 0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
811 0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
812 0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
813 0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
814 0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
815 0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
816 0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
817 0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
818 0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
819 0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
820 0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
821 0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
822 0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
823 0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
824 0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
825 0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
826 0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
827 0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
828 0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
829 0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
830 0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
831 0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
832 0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
833 0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
834 0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
835 0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
836 0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
837 0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
838 0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
839 0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
840 0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
841 0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
842 0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
843 0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
844 0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
845 0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
846 0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
847 0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
848 0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
849 0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
850 0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
851 };
852
853 #endif /* !sun4u */
854
855 /* Rcon is Round Constant; used for encryption key expansion */
856 static const uint32_t rcon[RC_LENGTH] =
857 {
858 /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
859 0x01000000, 0x02000000, 0x04000000, 0x08000000,
860 0x10000000, 0x20000000, 0x40000000, 0x80000000,
861 0x1B000000, 0x36000000
862 };
863
864
865 /*
866 * Expand the cipher key into the encryption key schedule.
867 *
868 * Return the number of rounds for the given cipher key size.
869 * The size of the key schedule depends on the number of rounds
870 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
871 *
872 * Parameters:
873 * rk AES key schedule 32-bit array to be initialized
874 * cipherKey User key
875 * keyBits AES key size (128, 192, or 256 bits)
876 */
877 static int
rijndael_key_setup_enc_raw(uint32_t rk[],const uint32_t cipherKey[],int keyBits)878 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
879 int keyBits)
880 {
881 int i = 0;
882 uint32_t temp;
883
884 rk[0] = cipherKey[0];
885 rk[1] = cipherKey[1];
886 rk[2] = cipherKey[2];
887 rk[3] = cipherKey[3];
888
889 if (keyBits == 128) {
890 for (;;) {
891 temp = rk[3];
892 rk[4] = rk[0] ^
893 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
894 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
895 (Te4[temp & 0xff] & 0x0000ff00) ^
896 (Te4[temp >> 24] & 0x000000ff) ^
897 rcon[i];
898 rk[5] = rk[1] ^ rk[4];
899 rk[6] = rk[2] ^ rk[5];
900 rk[7] = rk[3] ^ rk[6];
901
902 if (++i == 10) {
903 return (10);
904 }
905 rk += 4;
906 }
907 }
908
909 rk[4] = cipherKey[4];
910 rk[5] = cipherKey[5];
911
912 if (keyBits == 192) {
913 for (;;) {
914 temp = rk[5];
915 rk[6] = rk[0] ^
916 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
917 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
918 (Te4[temp & 0xff] & 0x0000ff00) ^
919 (Te4[temp >> 24] & 0x000000ff) ^
920 rcon[i];
921 rk[7] = rk[1] ^ rk[6];
922 rk[8] = rk[2] ^ rk[7];
923 rk[9] = rk[3] ^ rk[8];
924
925 if (++i == 8) {
926 return (12);
927 }
928
929 rk[10] = rk[4] ^ rk[9];
930 rk[11] = rk[5] ^ rk[10];
931 rk += 6;
932 }
933 }
934
935 rk[6] = cipherKey[6];
936 rk[7] = cipherKey[7];
937
938 if (keyBits == 256) {
939 for (;;) {
940 temp = rk[7];
941 rk[8] = rk[0] ^
942 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
943 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
944 (Te4[temp & 0xff] & 0x0000ff00) ^
945 (Te4[temp >> 24] & 0x000000ff) ^
946 rcon[i];
947 rk[9] = rk[1] ^ rk[8];
948 rk[10] = rk[2] ^ rk[9];
949 rk[11] = rk[3] ^ rk[10];
950
951 if (++i == 7) {
952 return (14);
953 }
954 temp = rk[11];
955 rk[12] = rk[4] ^
956 (Te4[temp >> 24] & 0xff000000) ^
957 (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
958 (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
959 (Te4[temp & 0xff] & 0x000000ff);
960 rk[13] = rk[5] ^ rk[12];
961 rk[14] = rk[6] ^ rk[13];
962 rk[15] = rk[7] ^ rk[14];
963
964 rk += 8;
965 }
966 }
967
968 return (0);
969 }
970 #endif /* !__amd64 */
971
972
973 #ifdef sun4u
974
975 /*
976 * Expand the cipher key into the encryption key schedule.
977 * by the sun4u optimized assembly implementation.
978 *
979 * Return the number of rounds for the given cipher key size.
980 * The size of the key schedule depends on the number of rounds
981 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
982 *
983 * Parameters:
984 * rk AES key schedule 64-bit array to be initialized
985 * cipherKey User key
986 * keyBits AES key size (128, 192, or 256 bits)
987 */
988 static int
rijndael_key_setup_enc(uint64_t rk[],const uint32_t cipherKey[],int keyBits)989 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
990 {
991 uint32_t rk1[4 * (MAX_AES_NR + 1)];
992 uint64_t *rk64 = (uint64_t *)rk;
993 uint32_t *rkt;
994 uint64_t t;
995 int i, Nr;
996
997 Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
998
999 for (i = 0; i < 4 * Nr; i++) {
1000 t = (uint64_t)(rk1[i]);
1001 rk64[i] = ((t & 0xff000000) << 11) |
1002 ((t & 0xff0000) << 8) |
1003 ((t & 0xffff) << 3);
1004 }
1005
1006 rkt = (uint32_t *)(&(rk64[4 * Nr]));
1007
1008 for (i = 0; i < 4; i++) {
1009 rkt[i] = rk1[4 * Nr+i];
1010 }
1011
1012 return (Nr);
1013 }
1014
1015
1016 /*
1017 * Expand the cipher key into the decryption key schedule as used
1018 * by the sun4u optimized assembly implementation.
1019 *
1020 * Return the number of rounds for the given cipher key size.
1021 * The size of the key schedule depends on the number of rounds
1022 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1023 *
1024 * Parameters:
1025 * rk AES key schedule 32-bit array to be initialized
1026 * cipherKey User key
1027 * keyBits AES key size (128, 192, or 256 bits)
1028 */
1029 static int
rijndael_key_setup_dec_raw(uint32_t rk[],const uint32_t cipherKey[],int keyBits)1030 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
1031 int keyBits)
1032 {
1033 int Nr, i;
1034 uint32_t temp;
1035
1036 /* expand the cipher key: */
1037 Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1038
1039 /* invert the order of the round keys: */
1040
1041 for (i = 0; i < 2 * Nr + 2; i++) {
1042 temp = rk[i];
1043 rk[i] = rk[4 * Nr - i + 3];
1044 rk[4 * Nr - i + 3] = temp;
1045 }
1046
1047 /*
1048 * apply the inverse MixColumn transform to all
1049 * round keys but the first and the last:
1050 */
1051 for (i = 1; i < Nr; i++) {
1052 rk += 4;
1053 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1054 Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1055 Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1056 Td3[Te4[rk[0] & 0xff] & 0xff];
1057 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1058 Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1059 Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1060 Td3[Te4[rk[1] & 0xff] & 0xff];
1061 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1062 Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1063 Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1064 Td3[Te4[rk[2] & 0xff] & 0xff];
1065 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1066 Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1067 Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1068 Td3[Te4[rk[3] & 0xff] & 0xff];
1069 }
1070
1071 return (Nr);
1072 }
1073
1074
1075 /*
1076 * The size of the key schedule depends on the number of rounds
1077 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1078 *
1079 * Parameters:
1080 * rk AES key schedule 64-bit array to be initialized
1081 * cipherKey User key
1082 * keyBits AES key size (128, 192, or 256 bits)
1083 */
1084 static int
rijndael_key_setup_dec(uint64_t rk[],const uint32_t cipherKey[],int keyBits)1085 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
1086 {
1087 uint32_t rk1[4 * (MAX_AES_NR + 1)];
1088 uint64_t *rk64 = (uint64_t *)rk;
1089 uint32_t *rkt;
1090 uint64_t t;
1091 int i, Nr;
1092
1093 Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
1094 for (i = 0; i < 4 * Nr; i++) {
1095 t = (uint64_t)(rk1[i]);
1096 rk64[i] = ((t & 0xff000000) << 11) |
1097 ((t & 0xff0000) << 8) |
1098 ((t & 0xffff) << 3);
1099 }
1100
1101 rkt = (uint32_t *)(&(rk64[4 * Nr]));
1102
1103 for (i = 0; i < 4; i++) {
1104 rkt[i] = rk1[4 * Nr + i];
1105 }
1106
1107 return (Nr);
1108 }
1109
1110
1111 /*
1112 * Expand the 64-bit AES cipher key array into the encryption and decryption
1113 * key schedules.
1114 *
1115 * Parameters:
1116 * key AES key schedule to be initialized
1117 * keyarr32 User key
1118 * keyBits AES key size (128, 192, or 256 bits)
1119 */
1120 static void
aes_setupkeys(aes_key_t * key,const uint32_t * keyarr32,int keybits)1121 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1122 {
1123 key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1124 keybits);
1125 key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1126 keybits);
1127 key->type = AES_64BIT_KS;
1128 }
1129
1130
1131 #elif defined(__amd64)
1132
1133 /*
1134 * Expand the 32-bit AES cipher key array into the encryption and decryption
1135 * key schedules.
1136 *
1137 * Parameters:
1138 * key AES key schedule to be initialized
1139 * keyarr32 User key
1140 * keyBits AES key size (128, 192, or 256 bits)
1141 */
1142 static void
aes_setupkeys(aes_key_t * key,const uint32_t * keyarr32,int keybits)1143 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1144 {
1145 if (intel_aes_instructions_present()) {
1146 key->flags = INTEL_AES_NI_CAPABLE;
1147 KPREEMPT_DISABLE;
1148 key->nr = rijndael_key_setup_enc_intel(&(key->encr_ks.ks32[0]),
1149 keyarr32, keybits);
1150 key->nr = rijndael_key_setup_dec_intel(&(key->decr_ks.ks32[0]),
1151 keyarr32, keybits);
1152 KPREEMPT_ENABLE;
1153 } else {
1154 key->flags = 0;
1155 key->nr = rijndael_key_setup_enc_amd64(&(key->encr_ks.ks32[0]),
1156 keyarr32, keybits);
1157 key->nr = rijndael_key_setup_dec_amd64(&(key->decr_ks.ks32[0]),
1158 keyarr32, keybits);
1159 }
1160
1161 key->type = AES_32BIT_KS;
1162 }
1163
1164 /*
1165 * Encrypt one block of data. The block is assumed to be an array
1166 * of four uint32_t values, so copy for alignment (and byte-order
1167 * reversal for little endian systems might be necessary on the
1168 * input and output byte streams.
1169 * The size of the key schedule depends on the number of rounds
1170 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1171 *
1172 * Parameters:
1173 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1174 * Nr Number of rounds
1175 * pt Input block (plain text)
1176 * ct Output block (crypto text). Can overlap with pt
1177 * flags Indicates whether we're on Intel AES-NI-capable hardware
1178 */
1179 static void
rijndael_encrypt(const uint32_t rk[],int Nr,const uint32_t pt[4],uint32_t ct[4],int flags)1180 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1181 uint32_t ct[4], int flags) {
1182 if (flags & INTEL_AES_NI_CAPABLE) {
1183 KPREEMPT_DISABLE;
1184 aes_encrypt_intel(rk, Nr, pt, ct);
1185 KPREEMPT_ENABLE;
1186 } else {
1187 aes_encrypt_amd64(rk, Nr, pt, ct);
1188 }
1189 }
1190
1191 /*
1192 * Decrypt one block of data. The block is assumed to be an array
1193 * of four uint32_t values, so copy for alignment (and byte-order
1194 * reversal for little endian systems might be necessary on the
1195 * input and output byte streams.
1196 * The size of the key schedule depends on the number of rounds
1197 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1198 *
1199 * Parameters:
1200 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1201 * Nr Number of rounds
1202 * ct Input block (crypto text)
1203 * pt Output block (plain text). Can overlap with pt
1204 * flags Indicates whether we're on Intel AES-NI-capable hardware
1205 */
1206 static void
rijndael_decrypt(const uint32_t rk[],int Nr,const uint32_t ct[4],uint32_t pt[4],int flags)1207 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1208 uint32_t pt[4], int flags) {
1209 if (flags & INTEL_AES_NI_CAPABLE) {
1210 KPREEMPT_DISABLE;
1211 aes_decrypt_intel(rk, Nr, ct, pt);
1212 KPREEMPT_ENABLE;
1213 } else {
1214 aes_decrypt_amd64(rk, Nr, ct, pt);
1215 }
1216 }
1217
1218
1219 #else /* generic C implementation */
1220
1221 /*
1222 * Expand the cipher key into the decryption key schedule.
1223 * Return the number of rounds for the given cipher key size.
1224 * The size of the key schedule depends on the number of rounds
1225 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1226 *
1227 * Parameters:
1228 * rk AES key schedule 32-bit array to be initialized
1229 * cipherKey User key
1230 * keyBits AES key size (128, 192, or 256 bits)
1231 */
1232 static int
rijndael_key_setup_dec(uint32_t rk[],const uint32_t cipherKey[],int keyBits)1233 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1234 {
1235 int Nr, i, j;
1236 uint32_t temp;
1237
1238 /* expand the cipher key: */
1239 Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1240
1241 /* invert the order of the round keys: */
1242 for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1243 temp = rk[i];
1244 rk[i] = rk[j];
1245 rk[j] = temp;
1246 temp = rk[i + 1];
1247 rk[i + 1] = rk[j + 1];
1248 rk[j + 1] = temp;
1249 temp = rk[i + 2];
1250 rk[i + 2] = rk[j + 2];
1251 rk[j + 2] = temp;
1252 temp = rk[i + 3];
1253 rk[i + 3] = rk[j + 3];
1254 rk[j + 3] = temp;
1255 }
1256
1257 /*
1258 * apply the inverse MixColumn transform to all
1259 * round keys but the first and the last:
1260 */
1261 for (i = 1; i < Nr; i++) {
1262 rk += 4;
1263 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1264 Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1265 Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1266 Td3[Te4[rk[0] & 0xff] & 0xff];
1267 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1268 Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1269 Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1270 Td3[Te4[rk[1] & 0xff] & 0xff];
1271 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1272 Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1273 Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1274 Td3[Te4[rk[2] & 0xff] & 0xff];
1275 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1276 Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1277 Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1278 Td3[Te4[rk[3] & 0xff] & 0xff];
1279 }
1280
1281 return (Nr);
1282 }
1283
1284
1285 /*
1286 * Expand the 32-bit AES cipher key array into the encryption and decryption
1287 * key schedules.
1288 *
1289 * Parameters:
1290 * key AES key schedule to be initialized
1291 * keyarr32 User key
1292 * keyBits AES key size (128, 192, or 256 bits)
1293 */
1294 static void
aes_setupkeys(aes_key_t * key,const uint32_t * keyarr32,int keybits)1295 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1296 {
1297 key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1298 keybits);
1299 key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1300 keybits);
1301 key->type = AES_32BIT_KS;
1302 }
1303
1304
1305 /*
1306 * Encrypt one block of data. The block is assumed to be an array
1307 * of four uint32_t values, so copy for alignment (and byte-order
1308 * reversal for little endian systems might be necessary on the
1309 * input and output byte streams.
1310 * The size of the key schedule depends on the number of rounds
1311 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1312 *
1313 * Parameters:
1314 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1315 * Nr Number of rounds
1316 * pt Input block (plain text)
1317 * ct Output block (crypto text). Can overlap with pt
1318 */
1319 static void
rijndael_encrypt(const uint32_t rk[],int Nr,const uint32_t pt[4],uint32_t ct[4])1320 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1321 uint32_t ct[4])
1322 {
1323 uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1324 int r;
1325
1326 /*
1327 * map byte array block to cipher state
1328 * and add initial round key:
1329 */
1330
1331 s0 = pt[0] ^ rk[0];
1332 s1 = pt[1] ^ rk[1];
1333 s2 = pt[2] ^ rk[2];
1334 s3 = pt[3] ^ rk[3];
1335
1336 /*
1337 * Nr - 1 full rounds:
1338 */
1339
1340 r = Nr >> 1;
1341
1342 for (;;) {
1343 t0 = Te0[s0 >> 24] ^
1344 Te1[(s1 >> 16) & 0xff] ^
1345 Te2[(s2 >> 8) & 0xff] ^
1346 Te3[s3 & 0xff] ^
1347 rk[4];
1348
1349 t1 = Te0[s1 >> 24] ^
1350 Te1[(s2 >> 16) & 0xff] ^
1351 Te2[(s3 >> 8) & 0xff] ^
1352 Te3[s0 & 0xff] ^
1353 rk[5];
1354
1355 t2 = Te0[s2 >> 24] ^
1356 Te1[(s3 >> 16) & 0xff] ^
1357 Te2[(s0 >> 8) & 0xff] ^
1358 Te3[s1 & 0xff] ^
1359 rk[6];
1360
1361 t3 = Te0[s3 >> 24] ^
1362 Te1[(s0 >> 16) & 0xff] ^
1363 Te2[(s1 >> 8) & 0xff] ^
1364 Te3[s2 & 0xff] ^
1365 rk[7];
1366
1367 rk += 8;
1368
1369 if (--r == 0) {
1370 break;
1371 }
1372
1373 s0 = Te0[t0 >> 24] ^
1374 Te1[(t1 >> 16) & 0xff] ^
1375 Te2[(t2 >> 8) & 0xff] ^
1376 Te3[t3 & 0xff] ^
1377 rk[0];
1378
1379 s1 = Te0[t1 >> 24] ^
1380 Te1[(t2 >> 16) & 0xff] ^
1381 Te2[(t3 >> 8) & 0xff] ^
1382 Te3[t0 & 0xff] ^
1383 rk[1];
1384
1385 s2 = Te0[t2 >> 24] ^
1386 Te1[(t3 >> 16) & 0xff] ^
1387 Te2[(t0 >> 8) & 0xff] ^
1388 Te3[t1 & 0xff] ^
1389 rk[2];
1390
1391 s3 = Te0[t3 >> 24] ^
1392 Te1[(t0 >> 16) & 0xff] ^
1393 Te2[(t1 >> 8) & 0xff] ^
1394 Te3[t2 & 0xff] ^
1395 rk[3];
1396 }
1397
1398 /*
1399 * apply last round and
1400 * map cipher state to byte array block:
1401 */
1402
1403 s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1404 (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1405 (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1406 (Te4[t3 & 0xff] & 0x000000ff) ^
1407 rk[0];
1408 ct[0] = s0;
1409
1410 s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1411 (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1412 (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
1413 (Te4[t0 & 0xff] & 0x000000ff) ^
1414 rk[1];
1415 ct[1] = s1;
1416
1417 s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1418 (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1419 (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1420 (Te4[t1 & 0xff] & 0x000000ff) ^
1421 rk[2];
1422 ct[2] = s2;
1423
1424 s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1425 (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1426 (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
1427 (Te4[t2 & 0xff] & 0x000000ff) ^
1428 rk[3];
1429 ct[3] = s3;
1430 }
1431
1432
1433 /*
1434 * Decrypt one block of data. The block is assumed to be an array
1435 * of four uint32_t values, so copy for alignment (and byte-order
1436 * reversal for little endian systems might be necessary on the
1437 * input and output byte streams.
1438 * The size of the key schedule depends on the number of rounds
1439 * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1440 *
1441 * Parameters:
1442 * rk Key schedule, of aes_ks_t (60 32-bit integers)
1443 * Nr Number of rounds
1444 * ct Input block (crypto text)
1445 * pt Output block (plain text). Can overlap with pt
1446 */
1447 static void
rijndael_decrypt(const uint32_t rk[],int Nr,const uint32_t ct[4],uint32_t pt[4])1448 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1449 uint32_t pt[4])
1450 {
1451 uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1452 int r;
1453
1454 /*
1455 * map byte array block to cipher state
1456 * and add initial round key:
1457 */
1458 s0 = ct[0] ^ rk[0];
1459 s1 = ct[1] ^ rk[1];
1460 s2 = ct[2] ^ rk[2];
1461 s3 = ct[3] ^ rk[3];
1462
1463 /*
1464 * Nr - 1 full rounds:
1465 */
1466
1467 r = Nr >> 1;
1468
1469 for (;;) {
1470 t0 = Td0[s0 >> 24] ^
1471 Td1[(s3 >> 16) & 0xff] ^
1472 Td2[(s2 >> 8) & 0xff] ^
1473 Td3[s1 & 0xff] ^
1474 rk[4];
1475
1476 t1 = Td0[s1 >> 24] ^
1477 Td1[(s0 >> 16) & 0xff] ^
1478 Td2[(s3 >> 8) & 0xff] ^
1479 Td3[s2 & 0xff] ^
1480 rk[5];
1481
1482 t2 = Td0[s2 >> 24] ^
1483 Td1[(s1 >> 16) & 0xff] ^
1484 Td2[(s0 >> 8) & 0xff] ^
1485 Td3[s3 & 0xff] ^
1486 rk[6];
1487
1488 t3 = Td0[s3 >> 24] ^
1489 Td1[(s2 >> 16) & 0xff] ^
1490 Td2[(s1 >> 8) & 0xff] ^
1491 Td3[s0 & 0xff] ^
1492 rk[7];
1493
1494 rk += 8;
1495
1496 if (--r == 0) {
1497 break;
1498 }
1499
1500 s0 = Td0[t0 >> 24] ^
1501 Td1[(t3 >> 16) & 0xff] ^
1502 Td2[(t2 >> 8) & 0xff] ^
1503 Td3[t1 & 0xff] ^
1504 rk[0];
1505
1506 s1 = Td0[t1 >> 24] ^
1507 Td1[(t0 >> 16) & 0xff] ^
1508 Td2[(t3 >> 8) & 0xff] ^
1509 Td3[t2 & 0xff] ^
1510 rk[1];
1511
1512 s2 = Td0[t2 >> 24] ^
1513 Td1[(t1 >> 16) & 0xff] ^
1514 Td2[(t0 >> 8) & 0xff] ^
1515 Td3[t3 & 0xff] ^
1516 rk[2];
1517
1518 s3 = Td0[t3 >> 24] ^
1519 Td1[(t2 >> 16) & 0xff] ^
1520 Td2[(t1 >> 8) & 0xff] ^
1521 Td3[t0 & 0xff] ^
1522 rk[3];
1523 }
1524
1525 /*
1526 * apply last round and
1527 * map cipher state to byte array block:
1528 */
1529
1530 s0 = (Td4[t0 >> 24] & 0xff000000) ^
1531 (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1532 (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1533 (Td4[t1 & 0xff] & 0x000000ff) ^
1534 rk[0];
1535 pt[0] = s0;
1536
1537 s1 = (Td4[t1 >> 24] & 0xff000000) ^
1538 (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1539 (Td4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
1540 (Td4[t2 & 0xff] & 0x000000ff) ^
1541 rk[1];
1542 pt[1] = s1;
1543
1544 s2 = (Td4[t2 >> 24] & 0xff000000) ^
1545 (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1546 (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1547 (Td4[t3 & 0xff] & 0x000000ff) ^
1548 rk[2];
1549 pt[2] = s2;
1550
1551 s3 = (Td4[t3 >> 24] & 0xff000000) ^
1552 (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1553 (Td4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
1554 (Td4[t0 & 0xff] & 0x000000ff) ^
1555 rk[3];
1556 pt[3] = s3;
1557 }
1558 #endif /* sun4u, __amd64 */
1559 /* EXPORT DELETE END */
1560
1561
1562 /*
1563 * Initialize AES encryption and decryption key schedules.
1564 *
1565 * Parameters:
1566 * cipherKey User key
1567 * keyBits AES key size (128, 192, or 256 bits)
1568 * keysched AES key schedule to be initialized, of type aes_key_t.
1569 * Allocated by aes_alloc_keysched().
1570 */
1571 void
aes_init_keysched(const uint8_t * cipherKey,uint_t keyBits,void * keysched)1572 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1573 {
1574 /* EXPORT DELETE START */
1575 aes_key_t *newbie = keysched;
1576 uint_t keysize, i, j;
1577 union {
1578 uint64_t ka64[4];
1579 uint32_t ka32[8];
1580 } keyarr;
1581
1582 switch (keyBits) {
1583 case 128:
1584 newbie->nr = 10;
1585 break;
1586
1587 case 192:
1588 newbie->nr = 12;
1589 break;
1590
1591 case 256:
1592 newbie->nr = 14;
1593 break;
1594
1595 default:
1596 /* should never get here */
1597 return;
1598 }
1599 keysize = CRYPTO_BITS2BYTES(keyBits);
1600
1601 /*
1602 * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1603 * 4 bytes in the key. On _BIG_ENDIAN and AMD64, copy the key
1604 * without reversing bytes.
1605 * For AMD64, do not byte swap for aes_setupkeys().
1606 *
1607 * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1608 * X86/AMD64 uses a key schedule array with 32-bit elements.
1609 */
1610 #ifndef AES_BYTE_SWAP
1611 if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1612 for (i = 0, j = 0; j < keysize; i++, j += 8) {
1613 /* LINTED: pointer alignment */
1614 keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1615 }
1616 } else {
1617 bcopy(cipherKey, keyarr.ka32, keysize);
1618 }
1619
1620 #else /* byte swap */
1621 for (i = 0, j = 0; j < keysize; i++, j += 4) {
1622 keyarr.ka32[i] = htonl(*(uint32_t *)(void *)&cipherKey[j]);
1623 }
1624 #endif
1625
1626 aes_setupkeys(newbie, keyarr.ka32, keyBits);
1627 /* EXPORT DELETE END */
1628 }
1629
1630
1631 /*
1632 * Encrypt one block using AES.
1633 * Align if needed and (for x86 32-bit only) byte-swap.
1634 *
1635 * Parameters:
1636 * ks Key schedule, of type aes_key_t
1637 * pt Input block (plain text)
1638 * ct Output block (crypto text). Can overlap with pt
1639 */
1640 int
aes_encrypt_block(const void * ks,const uint8_t * pt,uint8_t * ct)1641 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1642 {
1643 /* EXPORT DELETE START */
1644 aes_key_t *ksch = (aes_key_t *)ks;
1645
1646 #ifndef AES_BYTE_SWAP
1647 if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1648 /* LINTED: pointer alignment */
1649 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1650 /* LINTED: pointer alignment */
1651 (uint32_t *)pt, (uint32_t *)ct, ksch->flags);
1652 } else {
1653 #endif
1654 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1655
1656 /* Copy input block into buffer */
1657 #ifndef AES_BYTE_SWAP
1658 bcopy(pt, &buffer, AES_BLOCK_LEN);
1659
1660 #else /* byte swap */
1661 buffer[0] = htonl(*(uint32_t *)(void *)&pt[0]);
1662 buffer[1] = htonl(*(uint32_t *)(void *)&pt[4]);
1663 buffer[2] = htonl(*(uint32_t *)(void *)&pt[8]);
1664 buffer[3] = htonl(*(uint32_t *)(void *)&pt[12]);
1665 #endif
1666
1667 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1668 buffer, buffer, ksch->flags);
1669
1670 /* Copy result from buffer to output block */
1671 #ifndef AES_BYTE_SWAP
1672 bcopy(&buffer, ct, AES_BLOCK_LEN);
1673 }
1674
1675 #else /* byte swap */
1676 *(uint32_t *)(void *)&ct[0] = htonl(buffer[0]);
1677 *(uint32_t *)(void *)&ct[4] = htonl(buffer[1]);
1678 *(uint32_t *)(void *)&ct[8] = htonl(buffer[2]);
1679 *(uint32_t *)(void *)&ct[12] = htonl(buffer[3]);
1680 #endif
1681 /* EXPORT DELETE END */
1682 return (CRYPTO_SUCCESS);
1683 }
1684
1685
1686 /*
1687 * Decrypt one block using AES.
1688 * Align and byte-swap if needed.
1689 *
1690 * Parameters:
1691 * ks Key schedule, of type aes_key_t
1692 * ct Input block (crypto text)
1693 * pt Output block (plain text). Can overlap with pt
1694 */
1695 int
aes_decrypt_block(const void * ks,const uint8_t * ct,uint8_t * pt)1696 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1697 {
1698 /* EXPORT DELETE START */
1699 aes_key_t *ksch = (aes_key_t *)ks;
1700
1701 #ifndef AES_BYTE_SWAP
1702 if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1703 /* LINTED: pointer alignment */
1704 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1705 /* LINTED: pointer alignment */
1706 (uint32_t *)ct, (uint32_t *)pt, ksch->flags);
1707 } else {
1708 #endif
1709 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1710
1711 /* Copy input block into buffer */
1712 #ifndef AES_BYTE_SWAP
1713 bcopy(ct, &buffer, AES_BLOCK_LEN);
1714
1715 #else /* byte swap */
1716 buffer[0] = htonl(*(uint32_t *)(void *)&ct[0]);
1717 buffer[1] = htonl(*(uint32_t *)(void *)&ct[4]);
1718 buffer[2] = htonl(*(uint32_t *)(void *)&ct[8]);
1719 buffer[3] = htonl(*(uint32_t *)(void *)&ct[12]);
1720 #endif
1721
1722 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1723 buffer, buffer, ksch->flags);
1724
1725 /* Copy result from buffer to output block */
1726 #ifndef AES_BYTE_SWAP
1727 bcopy(&buffer, pt, AES_BLOCK_LEN);
1728 }
1729
1730 #else /* byte swap */
1731 *(uint32_t *)(void *)&pt[0] = htonl(buffer[0]);
1732 *(uint32_t *)(void *)&pt[4] = htonl(buffer[1]);
1733 *(uint32_t *)(void *)&pt[8] = htonl(buffer[2]);
1734 *(uint32_t *)(void *)&pt[12] = htonl(buffer[3]);
1735 #endif
1736
1737 /* EXPORT DELETE END */
1738 return (CRYPTO_SUCCESS);
1739 }
1740
1741
1742 /*
1743 * Allocate key schedule for AES.
1744 *
1745 * Return the pointer and set size to the number of bytes allocated.
1746 * Memory allocated must be freed by the caller when done.
1747 *
1748 * Parameters:
1749 * size Size of key schedule allocated, in bytes
1750 * kmflag Flag passed to kmem_alloc(9F); ignored in userland.
1751 */
1752 /* ARGSUSED */
1753 void *
aes_alloc_keysched(size_t * size,int kmflag)1754 aes_alloc_keysched(size_t *size, int kmflag)
1755 {
1756 /* EXPORT DELETE START */
1757 aes_key_t *keysched;
1758
1759 #ifdef _KERNEL
1760 keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1761 #else /* !_KERNEL */
1762 keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1763 #endif /* _KERNEL */
1764
1765 if (keysched != NULL) {
1766 *size = sizeof (aes_key_t);
1767 return (keysched);
1768 }
1769 /* EXPORT DELETE END */
1770 return (NULL);
1771 }
1772
1773
1774 #ifdef __amd64
1775 /*
1776 * Return 1 if executing on Intel with AES-NI instructions,
1777 * otherwise 0 (i.e., Intel without AES-NI or AMD64).
1778 * Cache the result, as the CPU can't change.
1779 *
1780 * Note: the userland version uses getisax(). The kernel version uses
1781 * global variable x86_featureset.
1782 */
1783 static int
intel_aes_instructions_present(void)1784 intel_aes_instructions_present(void)
1785 {
1786 static int cached_result = -1;
1787
1788 if (cached_result == -1) { /* first time */
1789 #ifdef _KERNEL
1790 cached_result = is_x86_feature(x86_featureset, X86FSET_AES);
1791 #else
1792 uint_t ui = 0;
1793
1794 (void) getisax(&ui, 1);
1795 cached_result = (ui & AV_386_AES) != 0;
1796 #endif /* _KERNEL */
1797 }
1798
1799 return (cached_result);
1800 }
1801 #endif /* __amd64 */
1802