• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /**
2  *
3  * aes.c - integrated in QEMU by Fabrice Bellard from the OpenSSL project.
4  */
5 /*
6  * rijndael-alg-fst.c
7  *
8  * @version 3.0 (December 2000)
9  *
10  * Optimised ANSI C code for the Rijndael cipher (now AES)
11  *
12  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
13  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
14  * @author Paulo Barreto <paulo.barreto@terra.com.br>
15  *
16  * This code is hereby placed in the public domain.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
19  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
25  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
26  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
27  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
28  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  */
30 #include "qemu-common.h"
31 #include "qemu/aes.h"
32 
33 typedef uint32_t u32;
34 typedef uint8_t u8;
35 
36 /* This controls loop-unrolling in aes_core.c */
37 #undef FULL_UNROLL
38 # define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ ((u32)(pt)[2] <<  8) ^ ((u32)(pt)[3]))
39 # define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >>  8); (ct)[3] = (u8)(st); }
40 
41 /*
42 AES_Te0[x] = S [x].[02, 01, 01, 03];
43 AES_Te1[x] = S [x].[03, 02, 01, 01];
44 AES_Te2[x] = S [x].[01, 03, 02, 01];
45 AES_Te3[x] = S [x].[01, 01, 03, 02];
46 AES_Te4[x] = S [x].[01, 01, 01, 01];
47 
48 AES_Td0[x] = Si[x].[0e, 09, 0d, 0b];
49 AES_Td1[x] = Si[x].[0b, 0e, 09, 0d];
50 AES_Td2[x] = Si[x].[0d, 0b, 0e, 09];
51 AES_Td3[x] = Si[x].[09, 0d, 0b, 0e];
52 AES_Td4[x] = Si[x].[01, 01, 01, 01];
53 */
54 
55 const uint32_t AES_Te0[256] = {
56     0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
57     0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
58     0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
59     0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
60     0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
61     0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
62     0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
63     0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
64     0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
65     0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
66     0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
67     0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
68     0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
69     0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
70     0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
71     0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
72     0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
73     0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
74     0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
75     0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
76     0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
77     0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
78     0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
79     0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
80     0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
81     0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
82     0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
83     0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
84     0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
85     0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
86     0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
87     0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
88     0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
89     0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
90     0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
91     0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
92     0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
93     0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
94     0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
95     0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
96     0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
97     0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
98     0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
99     0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
100     0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
101     0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
102     0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
103     0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
104     0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
105     0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
106     0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
107     0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
108     0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
109     0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
110     0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
111     0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
112     0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
113     0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
114     0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
115     0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
116     0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
117     0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
118     0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
119     0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
120 };
121 const uint32_t AES_Te1[256] = {
122     0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
123     0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
124     0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
125     0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
126     0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
127     0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
128     0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
129     0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
130     0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
131     0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
132     0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
133     0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
134     0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
135     0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
136     0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
137     0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
138     0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
139     0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
140     0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
141     0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
142     0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
143     0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
144     0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
145     0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
146     0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
147     0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
148     0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
149     0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
150     0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
151     0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
152     0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
153     0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
154     0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
155     0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
156     0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
157     0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
158     0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
159     0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
160     0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
161     0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
162     0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
163     0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
164     0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
165     0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
166     0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
167     0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
168     0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
169     0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
170     0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
171     0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
172     0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
173     0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
174     0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
175     0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
176     0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
177     0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
178     0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
179     0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
180     0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
181     0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
182     0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
183     0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
184     0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
185     0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
186 };
187 const uint32_t AES_Te2[256] = {
188     0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
189     0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
190     0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
191     0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
192     0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
193     0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
194     0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
195     0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
196     0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
197     0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
198     0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
199     0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
200     0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
201     0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
202     0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
203     0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
204     0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
205     0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
206     0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
207     0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
208     0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
209     0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
210     0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
211     0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
212     0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
213     0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
214     0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
215     0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
216     0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
217     0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
218     0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
219     0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
220     0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
221     0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
222     0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
223     0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
224     0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
225     0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
226     0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
227     0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
228     0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
229     0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
230     0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
231     0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
232     0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
233     0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
234     0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
235     0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
236     0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
237     0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
238     0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
239     0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
240     0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
241     0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
242     0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
243     0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
244     0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
245     0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
246     0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
247     0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
248     0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
249     0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
250     0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
251     0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
252 };
253 const uint32_t AES_Te3[256] = {
254 
255     0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
256     0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
257     0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
258     0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
259     0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
260     0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
261     0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
262     0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
263     0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
264     0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
265     0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
266     0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
267     0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
268     0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
269     0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
270     0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
271     0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
272     0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
273     0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
274     0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
275     0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
276     0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
277     0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
278     0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
279     0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
280     0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
281     0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
282     0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
283     0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
284     0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
285     0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
286     0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
287     0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
288     0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
289     0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
290     0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
291     0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
292     0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
293     0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
294     0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
295     0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
296     0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
297     0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
298     0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
299     0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
300     0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
301     0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
302     0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
303     0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
304     0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
305     0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
306     0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
307     0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
308     0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
309     0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
310     0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
311     0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
312     0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
313     0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
314     0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
315     0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
316     0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
317     0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
318     0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
319 };
320 const uint32_t AES_Te4[256] = {
321     0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
322     0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
323     0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
324     0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
325     0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
326     0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
327     0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
328     0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
329     0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
330     0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
331     0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
332     0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
333     0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
334     0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
335     0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
336     0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
337     0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
338     0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
339     0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
340     0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
341     0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
342     0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
343     0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
344     0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
345     0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
346     0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
347     0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
348     0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
349     0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
350     0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
351     0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
352     0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
353     0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
354     0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
355     0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
356     0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
357     0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
358     0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
359     0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
360     0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
361     0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
362     0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
363     0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
364     0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
365     0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
366     0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
367     0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
368     0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
369     0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
370     0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
371     0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
372     0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
373     0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
374     0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
375     0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
376     0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
377     0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
378     0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
379     0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
380     0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
381     0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
382     0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
383     0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
384     0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
385 };
386 const uint32_t AES_Td0[256] = {
387     0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
388     0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
389     0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
390     0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
391     0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
392     0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
393     0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
394     0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
395     0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
396     0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
397     0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
398     0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
399     0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
400     0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
401     0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
402     0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
403     0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
404     0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
405     0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
406     0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
407     0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
408     0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
409     0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
410     0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
411     0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
412     0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
413     0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
414     0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
415     0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
416     0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
417     0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
418     0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
419     0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
420     0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
421     0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
422     0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
423     0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
424     0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
425     0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
426     0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
427     0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
428     0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
429     0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
430     0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
431     0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
432     0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
433     0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
434     0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
435     0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
436     0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
437     0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
438     0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
439     0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
440     0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
441     0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
442     0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
443     0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
444     0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
445     0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
446     0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
447     0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
448     0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
449     0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
450     0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U,
451 };
452 const uint32_t AES_Td1[256] = {
453     0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
454     0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
455     0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
456     0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
457     0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
458     0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
459     0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
460     0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
461     0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
462     0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
463     0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
464     0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
465     0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
466     0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
467     0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
468     0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
469     0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
470     0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
471     0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
472     0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
473     0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
474     0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
475     0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
476     0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
477     0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
478     0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
479     0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
480     0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
481     0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
482     0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
483     0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
484     0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
485     0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
486     0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
487     0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
488     0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
489     0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
490     0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
491     0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
492     0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
493     0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
494     0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
495     0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
496     0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
497     0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
498     0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
499     0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
500     0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
501     0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
502     0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
503     0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
504     0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
505     0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
506     0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
507     0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
508     0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
509     0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
510     0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
511     0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
512     0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
513     0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
514     0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
515     0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
516     0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U,
517 };
518 const uint32_t AES_Td2[256] = {
519     0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
520     0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
521     0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
522     0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
523     0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
524     0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
525     0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
526     0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
527     0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
528     0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
529     0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
530     0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
531     0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
532     0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
533     0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
534     0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
535     0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
536     0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
537     0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
538     0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
539 
540     0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
541     0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
542     0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
543     0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
544     0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
545     0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
546     0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
547     0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
548     0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
549     0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
550     0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
551     0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
552     0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
553     0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
554     0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
555     0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
556     0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
557     0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
558     0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
559     0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
560     0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
561     0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
562     0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
563     0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
564     0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
565     0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
566     0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
567     0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
568     0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
569     0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
570     0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
571     0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
572     0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
573     0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
574     0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
575     0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
576     0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
577     0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
578     0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
579     0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
580     0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
581     0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
582     0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
583     0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U,
584 };
585 const uint32_t AES_Td3[256] = {
586     0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
587     0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
588     0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
589     0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
590     0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
591     0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
592     0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
593     0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
594     0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
595     0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
596     0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
597     0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
598     0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
599     0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
600     0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
601     0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
602     0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
603     0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
604     0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
605     0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
606     0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
607     0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
608     0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
609     0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
610     0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
611     0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
612     0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
613     0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
614     0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
615     0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
616     0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
617     0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
618     0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
619     0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
620     0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
621     0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
622     0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
623     0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
624     0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
625     0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
626     0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
627     0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
628     0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
629     0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
630     0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
631     0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
632     0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
633     0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
634     0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
635     0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
636     0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
637     0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
638     0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
639     0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
640     0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
641     0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
642     0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
643     0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
644     0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
645     0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
646     0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
647     0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
648     0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
649     0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U,
650 };
651 const uint32_t AES_Td4[256] = {
652     0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
653     0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
654     0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
655     0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
656     0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
657     0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
658     0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
659     0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
660     0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
661     0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
662     0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
663     0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
664     0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
665     0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
666     0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
667     0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
668     0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
669     0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
670     0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
671     0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
672     0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
673     0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
674     0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
675     0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
676     0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
677     0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
678     0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
679     0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
680     0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
681     0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
682     0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
683     0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
684     0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
685     0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
686     0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
687     0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
688     0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
689     0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
690     0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
691     0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
692     0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
693     0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
694     0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
695     0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
696     0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
697     0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
698     0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
699     0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
700     0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
701     0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
702     0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
703     0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
704     0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
705     0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
706     0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
707     0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
708     0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
709     0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
710     0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
711     0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
712     0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
713     0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
714     0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
715     0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU,
716 };
717 static const u32 rcon[] = {
718 	0x01000000, 0x02000000, 0x04000000, 0x08000000,
719 	0x10000000, 0x20000000, 0x40000000, 0x80000000,
720 	0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
721 };
722 
723 /**
724  * Expand the cipher key into the encryption key schedule.
725  */
AES_set_encrypt_key(const unsigned char * userKey,const int bits,AES_KEY * key)726 int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
727 			AES_KEY *key) {
728 
729 	u32 *rk;
730    	int i = 0;
731 	u32 temp;
732 
733 	if (!userKey || !key)
734 		return -1;
735 	if (bits != 128 && bits != 192 && bits != 256)
736 		return -2;
737 
738 	rk = key->rd_key;
739 
740 	if (bits==128)
741 		key->rounds = 10;
742 	else if (bits==192)
743 		key->rounds = 12;
744 	else
745 		key->rounds = 14;
746 
747 	rk[0] = GETU32(userKey     );
748 	rk[1] = GETU32(userKey +  4);
749 	rk[2] = GETU32(userKey +  8);
750 	rk[3] = GETU32(userKey + 12);
751 	if (bits == 128) {
752 		while (1) {
753 			temp  = rk[3];
754 			rk[4] = rk[0] ^
755                                 (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
756                                 (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
757                                 (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
758                                 (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
759 				rcon[i];
760 			rk[5] = rk[1] ^ rk[4];
761 			rk[6] = rk[2] ^ rk[5];
762 			rk[7] = rk[3] ^ rk[6];
763 			if (++i == 10) {
764 				return 0;
765 			}
766 			rk += 4;
767 		}
768 	}
769 	rk[4] = GETU32(userKey + 16);
770 	rk[5] = GETU32(userKey + 20);
771 	if (bits == 192) {
772 		while (1) {
773 			temp = rk[ 5];
774 			rk[ 6] = rk[ 0] ^
775                                 (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
776                                 (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
777                                 (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
778                                 (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
779 				rcon[i];
780 			rk[ 7] = rk[ 1] ^ rk[ 6];
781 			rk[ 8] = rk[ 2] ^ rk[ 7];
782 			rk[ 9] = rk[ 3] ^ rk[ 8];
783 			if (++i == 8) {
784 				return 0;
785 			}
786 			rk[10] = rk[ 4] ^ rk[ 9];
787 			rk[11] = rk[ 5] ^ rk[10];
788 			rk += 6;
789 		}
790 	}
791 	rk[6] = GETU32(userKey + 24);
792 	rk[7] = GETU32(userKey + 28);
793 	if (bits == 256) {
794 		while (1) {
795 			temp = rk[ 7];
796 			rk[ 8] = rk[ 0] ^
797                                 (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
798                                 (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
799                                 (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
800                                 (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
801 				rcon[i];
802 			rk[ 9] = rk[ 1] ^ rk[ 8];
803 			rk[10] = rk[ 2] ^ rk[ 9];
804 			rk[11] = rk[ 3] ^ rk[10];
805 			if (++i == 7) {
806 				return 0;
807 			}
808 			temp = rk[11];
809 			rk[12] = rk[ 4] ^
810                                 (AES_Te4[(temp >> 24)       ] & 0xff000000) ^
811                                 (AES_Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
812                                 (AES_Te4[(temp >>  8) & 0xff] & 0x0000ff00) ^
813                                 (AES_Te4[(temp      ) & 0xff] & 0x000000ff);
814 			rk[13] = rk[ 5] ^ rk[12];
815 			rk[14] = rk[ 6] ^ rk[13];
816 			rk[15] = rk[ 7] ^ rk[14];
817 
818 			rk += 8;
819         	}
820 	}
821 	return 0;
822 }
823 
824 /**
825  * Expand the cipher key into the decryption key schedule.
826  */
AES_set_decrypt_key(const unsigned char * userKey,const int bits,AES_KEY * key)827 int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
828 			 AES_KEY *key) {
829 
830         u32 *rk;
831 	int i, j, status;
832 	u32 temp;
833 
834 	/* first, start with an encryption schedule */
835 	status = AES_set_encrypt_key(userKey, bits, key);
836 	if (status < 0)
837 		return status;
838 
839 	rk = key->rd_key;
840 
841 	/* invert the order of the round keys: */
842 	for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
843 		temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
844 		temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
845 		temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
846 		temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
847 	}
848 	/* apply the inverse MixColumn transform to all round keys but the first and the last: */
849 	for (i = 1; i < (key->rounds); i++) {
850 		rk += 4;
851 		rk[0] =
852                         AES_Td0[AES_Te4[(rk[0] >> 24)       ] & 0xff] ^
853                         AES_Td1[AES_Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
854                         AES_Td2[AES_Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
855                         AES_Td3[AES_Te4[(rk[0]      ) & 0xff] & 0xff];
856 		rk[1] =
857                         AES_Td0[AES_Te4[(rk[1] >> 24)       ] & 0xff] ^
858                         AES_Td1[AES_Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
859                         AES_Td2[AES_Te4[(rk[1] >>  8) & 0xff] & 0xff] ^
860                         AES_Td3[AES_Te4[(rk[1]      ) & 0xff] & 0xff];
861 		rk[2] =
862                         AES_Td0[AES_Te4[(rk[2] >> 24)       ] & 0xff] ^
863                         AES_Td1[AES_Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
864                         AES_Td2[AES_Te4[(rk[2] >>  8) & 0xff] & 0xff] ^
865                         AES_Td3[AES_Te4[(rk[2]      ) & 0xff] & 0xff];
866 		rk[3] =
867                         AES_Td0[AES_Te4[(rk[3] >> 24)       ] & 0xff] ^
868                         AES_Td1[AES_Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
869                         AES_Td2[AES_Te4[(rk[3] >>  8) & 0xff] & 0xff] ^
870                         AES_Td3[AES_Te4[(rk[3]      ) & 0xff] & 0xff];
871 	}
872 	return 0;
873 }
874 
875 #ifndef AES_ASM
876 /*
877  * Encrypt a single block
878  * in and out can overlap
879  */
AES_encrypt(const unsigned char * in,unsigned char * out,const AES_KEY * key)880 void AES_encrypt(const unsigned char *in, unsigned char *out,
881 		 const AES_KEY *key) {
882 
883 	const u32 *rk;
884 	u32 s0, s1, s2, s3, t0, t1, t2, t3;
885 #ifndef FULL_UNROLL
886 	int r;
887 #endif /* ?FULL_UNROLL */
888 
889 	assert(in && out && key);
890 	rk = key->rd_key;
891 
892 	/*
893 	 * map byte array block to cipher state
894 	 * and add initial round key:
895 	 */
896 	s0 = GETU32(in     ) ^ rk[0];
897 	s1 = GETU32(in +  4) ^ rk[1];
898 	s2 = GETU32(in +  8) ^ rk[2];
899 	s3 = GETU32(in + 12) ^ rk[3];
900 #ifdef FULL_UNROLL
901 	/* round 1: */
902         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[ 4];
903         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[ 5];
904         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[ 6];
905         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[ 7];
906    	/* round 2: */
907         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[ 8];
908         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[ 9];
909         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[10];
910         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[11];
911 	/* round 3: */
912         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[12];
913         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[13];
914         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[14];
915         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[15];
916    	/* round 4: */
917         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[16];
918         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[17];
919         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[18];
920         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[19];
921 	/* round 5: */
922         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[20];
923         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[21];
924         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[22];
925         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[23];
926    	/* round 6: */
927         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[24];
928         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[25];
929         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[26];
930         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[27];
931 	/* round 7: */
932         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[28];
933         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[29];
934         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[30];
935         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[31];
936    	/* round 8: */
937         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[32];
938         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[33];
939         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[34];
940         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[35];
941 	/* round 9: */
942         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[36];
943         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[37];
944         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[38];
945         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[39];
946     if (key->rounds > 10) {
947         /* round 10: */
948         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[40];
949         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[41];
950         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[42];
951         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[43];
952         /* round 11: */
953         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[44];
954         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[45];
955         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[46];
956         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[47];
957         if (key->rounds > 12) {
958             /* round 12: */
959             s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[48];
960             s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[49];
961             s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[50];
962             s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[51];
963             /* round 13: */
964             t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[52];
965             t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[53];
966             t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[54];
967             t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[55];
968         }
969     }
970     rk += key->rounds << 2;
971 #else  /* !FULL_UNROLL */
972     /*
973      * Nr - 1 full rounds:
974      */
975     r = key->rounds >> 1;
976     for (;;) {
977         t0 =
978             AES_Te0[(s0 >> 24)       ] ^
979             AES_Te1[(s1 >> 16) & 0xff] ^
980             AES_Te2[(s2 >>  8) & 0xff] ^
981             AES_Te3[(s3      ) & 0xff] ^
982             rk[4];
983         t1 =
984             AES_Te0[(s1 >> 24)       ] ^
985             AES_Te1[(s2 >> 16) & 0xff] ^
986             AES_Te2[(s3 >>  8) & 0xff] ^
987             AES_Te3[(s0      ) & 0xff] ^
988             rk[5];
989         t2 =
990             AES_Te0[(s2 >> 24)       ] ^
991             AES_Te1[(s3 >> 16) & 0xff] ^
992             AES_Te2[(s0 >>  8) & 0xff] ^
993             AES_Te3[(s1      ) & 0xff] ^
994             rk[6];
995         t3 =
996             AES_Te0[(s3 >> 24)       ] ^
997             AES_Te1[(s0 >> 16) & 0xff] ^
998             AES_Te2[(s1 >>  8) & 0xff] ^
999             AES_Te3[(s2      ) & 0xff] ^
1000             rk[7];
1001 
1002         rk += 8;
1003         if (--r == 0) {
1004             break;
1005         }
1006 
1007         s0 =
1008             AES_Te0[(t0 >> 24)       ] ^
1009             AES_Te1[(t1 >> 16) & 0xff] ^
1010             AES_Te2[(t2 >>  8) & 0xff] ^
1011             AES_Te3[(t3      ) & 0xff] ^
1012             rk[0];
1013         s1 =
1014             AES_Te0[(t1 >> 24)       ] ^
1015             AES_Te1[(t2 >> 16) & 0xff] ^
1016             AES_Te2[(t3 >>  8) & 0xff] ^
1017             AES_Te3[(t0      ) & 0xff] ^
1018             rk[1];
1019         s2 =
1020             AES_Te0[(t2 >> 24)       ] ^
1021             AES_Te1[(t3 >> 16) & 0xff] ^
1022             AES_Te2[(t0 >>  8) & 0xff] ^
1023             AES_Te3[(t1      ) & 0xff] ^
1024             rk[2];
1025         s3 =
1026             AES_Te0[(t3 >> 24)       ] ^
1027             AES_Te1[(t0 >> 16) & 0xff] ^
1028             AES_Te2[(t1 >>  8) & 0xff] ^
1029             AES_Te3[(t2      ) & 0xff] ^
1030             rk[3];
1031     }
1032 #endif /* ?FULL_UNROLL */
1033     /*
1034 	 * apply last round and
1035 	 * map cipher state to byte array block:
1036 	 */
1037 	s0 =
1038                 (AES_Te4[(t0 >> 24)       ] & 0xff000000) ^
1039                 (AES_Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1040                 (AES_Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1041                 (AES_Te4[(t3      ) & 0xff] & 0x000000ff) ^
1042 		rk[0];
1043 	PUTU32(out     , s0);
1044 	s1 =
1045                 (AES_Te4[(t1 >> 24)       ] & 0xff000000) ^
1046                 (AES_Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1047                 (AES_Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1048                 (AES_Te4[(t0      ) & 0xff] & 0x000000ff) ^
1049 		rk[1];
1050 	PUTU32(out +  4, s1);
1051 	s2 =
1052                 (AES_Te4[(t2 >> 24)       ] & 0xff000000) ^
1053                 (AES_Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1054                 (AES_Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1055                 (AES_Te4[(t1      ) & 0xff] & 0x000000ff) ^
1056 		rk[2];
1057 	PUTU32(out +  8, s2);
1058 	s3 =
1059                 (AES_Te4[(t3 >> 24)       ] & 0xff000000) ^
1060                 (AES_Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1061                 (AES_Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1062                 (AES_Te4[(t2      ) & 0xff] & 0x000000ff) ^
1063 		rk[3];
1064 	PUTU32(out + 12, s3);
1065 }
1066 
1067 /*
1068  * Decrypt a single block
1069  * in and out can overlap
1070  */
AES_decrypt(const unsigned char * in,unsigned char * out,const AES_KEY * key)1071 void AES_decrypt(const unsigned char *in, unsigned char *out,
1072 		 const AES_KEY *key) {
1073 
1074 	const u32 *rk;
1075 	u32 s0, s1, s2, s3, t0, t1, t2, t3;
1076 #ifndef FULL_UNROLL
1077 	int r;
1078 #endif /* ?FULL_UNROLL */
1079 
1080 	assert(in && out && key);
1081 	rk = key->rd_key;
1082 
1083 	/*
1084 	 * map byte array block to cipher state
1085 	 * and add initial round key:
1086 	 */
1087     s0 = GETU32(in     ) ^ rk[0];
1088     s1 = GETU32(in +  4) ^ rk[1];
1089     s2 = GETU32(in +  8) ^ rk[2];
1090     s3 = GETU32(in + 12) ^ rk[3];
1091 #ifdef FULL_UNROLL
1092     /* round 1: */
1093     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[ 4];
1094     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[ 5];
1095     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[ 6];
1096     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[ 7];
1097     /* round 2: */
1098     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[ 8];
1099     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[ 9];
1100     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[10];
1101     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[11];
1102     /* round 3: */
1103     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[12];
1104     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[13];
1105     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[14];
1106     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[15];
1107     /* round 4: */
1108     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[16];
1109     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[17];
1110     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[18];
1111     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[19];
1112     /* round 5: */
1113     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[20];
1114     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[21];
1115     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[22];
1116     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[23];
1117     /* round 6: */
1118     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[24];
1119     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[25];
1120     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[26];
1121     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[27];
1122     /* round 7: */
1123     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[28];
1124     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[29];
1125     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[30];
1126     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[31];
1127     /* round 8: */
1128     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[32];
1129     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[33];
1130     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[34];
1131     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[35];
1132     /* round 9: */
1133     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[36];
1134     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[37];
1135     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[38];
1136     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[39];
1137     if (key->rounds > 10) {
1138         /* round 10: */
1139         s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[40];
1140         s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[41];
1141         s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[42];
1142         s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[43];
1143         /* round 11: */
1144         t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[44];
1145         t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[45];
1146         t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[46];
1147         t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[47];
1148         if (key->rounds > 12) {
1149             /* round 12: */
1150             s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[48];
1151             s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[49];
1152             s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[50];
1153             s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[51];
1154             /* round 13: */
1155             t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[52];
1156             t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[53];
1157             t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[54];
1158             t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[55];
1159         }
1160     }
1161 	rk += key->rounds << 2;
1162 #else  /* !FULL_UNROLL */
1163     /*
1164      * Nr - 1 full rounds:
1165      */
1166     r = key->rounds >> 1;
1167     for (;;) {
1168         t0 =
1169             AES_Td0[(s0 >> 24)       ] ^
1170             AES_Td1[(s3 >> 16) & 0xff] ^
1171             AES_Td2[(s2 >>  8) & 0xff] ^
1172             AES_Td3[(s1      ) & 0xff] ^
1173             rk[4];
1174         t1 =
1175             AES_Td0[(s1 >> 24)       ] ^
1176             AES_Td1[(s0 >> 16) & 0xff] ^
1177             AES_Td2[(s3 >>  8) & 0xff] ^
1178             AES_Td3[(s2      ) & 0xff] ^
1179             rk[5];
1180         t2 =
1181             AES_Td0[(s2 >> 24)       ] ^
1182             AES_Td1[(s1 >> 16) & 0xff] ^
1183             AES_Td2[(s0 >>  8) & 0xff] ^
1184             AES_Td3[(s3      ) & 0xff] ^
1185             rk[6];
1186         t3 =
1187             AES_Td0[(s3 >> 24)       ] ^
1188             AES_Td1[(s2 >> 16) & 0xff] ^
1189             AES_Td2[(s1 >>  8) & 0xff] ^
1190             AES_Td3[(s0      ) & 0xff] ^
1191             rk[7];
1192 
1193         rk += 8;
1194         if (--r == 0) {
1195             break;
1196         }
1197 
1198         s0 =
1199             AES_Td0[(t0 >> 24)       ] ^
1200             AES_Td1[(t3 >> 16) & 0xff] ^
1201             AES_Td2[(t2 >>  8) & 0xff] ^
1202             AES_Td3[(t1      ) & 0xff] ^
1203             rk[0];
1204         s1 =
1205             AES_Td0[(t1 >> 24)       ] ^
1206             AES_Td1[(t0 >> 16) & 0xff] ^
1207             AES_Td2[(t3 >>  8) & 0xff] ^
1208             AES_Td3[(t2      ) & 0xff] ^
1209             rk[1];
1210         s2 =
1211             AES_Td0[(t2 >> 24)       ] ^
1212             AES_Td1[(t1 >> 16) & 0xff] ^
1213             AES_Td2[(t0 >>  8) & 0xff] ^
1214             AES_Td3[(t3      ) & 0xff] ^
1215             rk[2];
1216         s3 =
1217             AES_Td0[(t3 >> 24)       ] ^
1218             AES_Td1[(t2 >> 16) & 0xff] ^
1219             AES_Td2[(t1 >>  8) & 0xff] ^
1220             AES_Td3[(t0      ) & 0xff] ^
1221             rk[3];
1222     }
1223 #endif /* ?FULL_UNROLL */
1224     /*
1225 	 * apply last round and
1226 	 * map cipher state to byte array block:
1227 	 */
1228    	s0 =
1229                 (AES_Td4[(t0 >> 24)       ] & 0xff000000) ^
1230                 (AES_Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1231                 (AES_Td4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1232                 (AES_Td4[(t1      ) & 0xff] & 0x000000ff) ^
1233    		rk[0];
1234 	PUTU32(out     , s0);
1235    	s1 =
1236                 (AES_Td4[(t1 >> 24)       ] & 0xff000000) ^
1237                 (AES_Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1238                 (AES_Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1239                 (AES_Td4[(t2      ) & 0xff] & 0x000000ff) ^
1240    		rk[1];
1241 	PUTU32(out +  4, s1);
1242    	s2 =
1243                 (AES_Td4[(t2 >> 24)       ] & 0xff000000) ^
1244                 (AES_Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1245                 (AES_Td4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1246                 (AES_Td4[(t3      ) & 0xff] & 0x000000ff) ^
1247    		rk[2];
1248 	PUTU32(out +  8, s2);
1249    	s3 =
1250                 (AES_Td4[(t3 >> 24)       ] & 0xff000000) ^
1251                 (AES_Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1252                 (AES_Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1253                 (AES_Td4[(t0      ) & 0xff] & 0x000000ff) ^
1254    		rk[3];
1255 	PUTU32(out + 12, s3);
1256 }
1257 
1258 #endif /* AES_ASM */
1259 
AES_cbc_encrypt(const unsigned char * in,unsigned char * out,const unsigned long length,const AES_KEY * key,unsigned char * ivec,const int enc)1260 void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
1261 		     const unsigned long length, const AES_KEY *key,
1262 		     unsigned char *ivec, const int enc)
1263 {
1264 
1265 	unsigned long n;
1266 	unsigned long len = length;
1267 	unsigned char tmp[AES_BLOCK_SIZE];
1268 
1269 	assert(in && out && key && ivec);
1270 
1271 	if (enc) {
1272 		while (len >= AES_BLOCK_SIZE) {
1273 			for(n=0; n < AES_BLOCK_SIZE; ++n)
1274 				tmp[n] = in[n] ^ ivec[n];
1275 			AES_encrypt(tmp, out, key);
1276 			memcpy(ivec, out, AES_BLOCK_SIZE);
1277 			len -= AES_BLOCK_SIZE;
1278 			in += AES_BLOCK_SIZE;
1279 			out += AES_BLOCK_SIZE;
1280 		}
1281 		if (len) {
1282 			for(n=0; n < len; ++n)
1283 				tmp[n] = in[n] ^ ivec[n];
1284 			for(n=len; n < AES_BLOCK_SIZE; ++n)
1285 				tmp[n] = ivec[n];
1286 			AES_encrypt(tmp, tmp, key);
1287 			memcpy(out, tmp, AES_BLOCK_SIZE);
1288 			memcpy(ivec, tmp, AES_BLOCK_SIZE);
1289 		}
1290 	} else {
1291 		while (len >= AES_BLOCK_SIZE) {
1292 			memcpy(tmp, in, AES_BLOCK_SIZE);
1293 			AES_decrypt(in, out, key);
1294 			for(n=0; n < AES_BLOCK_SIZE; ++n)
1295 				out[n] ^= ivec[n];
1296 			memcpy(ivec, tmp, AES_BLOCK_SIZE);
1297 			len -= AES_BLOCK_SIZE;
1298 			in += AES_BLOCK_SIZE;
1299 			out += AES_BLOCK_SIZE;
1300 		}
1301 		if (len) {
1302 			memcpy(tmp, in, AES_BLOCK_SIZE);
1303 			AES_decrypt(tmp, tmp, key);
1304 			for(n=0; n < len; ++n)
1305 				out[n] = tmp[n] ^ ivec[n];
1306 			memcpy(ivec, tmp, AES_BLOCK_SIZE);
1307 		}
1308 	}
1309 }
1310