1 /*
   2  * CDDL HEADER START
   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 /*
  22  * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
  23  */
  24 
  25 #include <sys/types.h>
  26 #include <sys/systm.h>
  27 #include <sys/sysmacros.h>
  28 #include <netinet/in.h>
  29 #include "aes_impl.h"
  30 #ifndef _KERNEL
  31 #include <strings.h>
  32 #include <stdlib.h>
  33 #endif  /* !_KERNEL */
  34 
  35 #ifdef __amd64
  36 
  37 #ifdef _KERNEL
  38 #include <sys/cpuvar.h>           /* cpu_t, CPU */
  39 #include <sys/x86_archext.h>      /* x86_featureset, X86FSET_AES */
  40 #include <sys/disp.h>             /* kpreempt_disable(), kpreempt_enable */
  41 
  42 /* Workaround for no XMM kernel thread save/restore */
  43 #define KPREEMPT_DISABLE        kpreempt_disable()
  44 #define KPREEMPT_ENABLE         kpreempt_enable()
  45 
  46 #else
  47 #include <sys/auxv.h>             /* getisax() */
  48 #include <sys/auxv_386.h> /* AV_386_AES bit */
  49 #define KPREEMPT_DISABLE
  50 #define KPREEMPT_ENABLE
  51 #endif  /* _KERNEL */
  52 #endif  /* __amd64 */
  53 
  54 
  55 /*
  56  * This file is derived from the file  rijndael-alg-fst.c  taken from the
  57  * "optimized C code v3.0" on the "rijndael home page"
  58  * http://www.iaik.tu-graz.ac.at/research/krypto/AES/old/~rijmen/rijndael/
  59  * pointed by the NIST web-site http://csrc.nist.gov/archive/aes/
  60  *
  61  * The following note is from the original file:
  62  */
  63 
  64 /*
  65  * rijndael-alg-fst.c
  66  *
  67  * @version 3.0 (December 2000)
  68  *
  69  * Optimised ANSI C code for the Rijndael cipher (now AES)
  70  *
  71  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
  72  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
  73  * @author Paulo Barreto <paulo.barreto@terra.com.br>
  74  *
  75  * This code is hereby placed in the public domain.
  76  *
  77  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
  78  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  79  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  80  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
  81  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  82  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  83  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  84  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  85  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  86  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
  87  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  88  */
  89 
  90 /* EXPORT DELETE START */
  91 
  92 #if defined(sun4u)
  93 /* External assembly functions: */
  94 extern void aes_encrypt_impl(const uint32_t rk[], int Nr, const uint32_t pt[4],
  95         uint32_t ct[4]);
  96 extern void aes_decrypt_impl(const uint32_t rk[], int Nr, const uint32_t ct[4],
  97         uint32_t pt[4]);
  98 
  99 #define AES_ENCRYPT_IMPL(a, b, c, d, e) aes_encrypt_impl(a, b, c, d)
 100 #define AES_DECRYPT_IMPL(a, b, c, d, e) aes_decrypt_impl(a, b, c, d)
 101 
 102 #elif defined(__amd64)
 103 
 104 /* These functions are used to execute amd64 instructions for AMD or Intel: */
 105 extern int rijndael_key_setup_enc_amd64(uint32_t rk[],
 106         const uint32_t cipherKey[], int keyBits);
 107 extern int rijndael_key_setup_dec_amd64(uint32_t rk[],
 108         const uint32_t cipherKey[], int keyBits);
 109 extern void aes_encrypt_amd64(const uint32_t rk[], int Nr,
 110         const uint32_t pt[4], uint32_t ct[4]);
 111 extern void aes_decrypt_amd64(const uint32_t rk[], int Nr,
 112         const uint32_t ct[4], uint32_t pt[4]);
 113 
 114 /* These functions are used to execute Intel-specific AES-NI instructions: */
 115 extern int rijndael_key_setup_enc_intel(uint32_t rk[],
 116         const uint32_t cipherKey[], uint64_t keyBits);
 117 extern int rijndael_key_setup_dec_intel(uint32_t rk[],
 118         const uint32_t cipherKey[], uint64_t keyBits);
 119 extern void aes_encrypt_intel(const uint32_t rk[], int Nr,
 120         const uint32_t pt[4], uint32_t ct[4]);
 121 extern void aes_decrypt_intel(const uint32_t rk[], int Nr,
 122         const uint32_t ct[4], uint32_t pt[4]);
 123 
 124 static int intel_aes_instructions_present(void);
 125 
 126 #define AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d, e)
 127 #define AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d, e)
 128 
 129 #else /* Generic C implementation */
 130 
 131 #define AES_ENCRYPT_IMPL(a, b, c, d, e) rijndael_encrypt(a, b, c, d)
 132 #define AES_DECRYPT_IMPL(a, b, c, d, e) rijndael_decrypt(a, b, c, d)
 133 #define rijndael_key_setup_enc_raw      rijndael_key_setup_enc
 134 #endif  /* sun4u || __amd64 */
 135 
 136 #if defined(_LITTLE_ENDIAN) && !defined(__amd64)
 137 #define AES_BYTE_SWAP
 138 #endif
 139 
 140 
 141 #if !defined(__amd64)
 142 /*
 143  *  Constant tables
 144  */
 145 
 146 /*
 147  * Te0[x] = S [x].[02, 01, 01, 03];
 148  * Te1[x] = S [x].[03, 02, 01, 01];
 149  * Te2[x] = S [x].[01, 03, 02, 01];
 150  * Te3[x] = S [x].[01, 01, 03, 02];
 151  * Te4[x] = S [x].[01, 01, 01, 01];
 152  *
 153  * Td0[x] = Si[x].[0e, 09, 0d, 0b];
 154  * Td1[x] = Si[x].[0b, 0e, 09, 0d];
 155  * Td2[x] = Si[x].[0d, 0b, 0e, 09];
 156  * Td3[x] = Si[x].[09, 0d, 0b, 0e];
 157  * Td4[x] = Si[x].[01, 01, 01, 01];
 158  */
 159 
 160 /* Encrypt Sbox constants (for the substitute bytes operation) */
 161 
 162 #ifndef sun4u
 163 
 164 static const uint32_t Te0[256] =
 165 {
 166         0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
 167         0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
 168         0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
 169         0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
 170         0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
 171         0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
 172         0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
 173         0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
 174         0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
 175         0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
 176         0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
 177         0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
 178         0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
 179         0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
 180         0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
 181         0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
 182         0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
 183         0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
 184         0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
 185         0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
 186         0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
 187         0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
 188         0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
 189         0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
 190         0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
 191         0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
 192         0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
 193         0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
 194         0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
 195         0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
 196         0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
 197         0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
 198         0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
 199         0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
 200         0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
 201         0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
 202         0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
 203         0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
 204         0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
 205         0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
 206         0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
 207         0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
 208         0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
 209         0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
 210         0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
 211         0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
 212         0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
 213         0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
 214         0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
 215         0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
 216         0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
 217         0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
 218         0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
 219         0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
 220         0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
 221         0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
 222         0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
 223         0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
 224         0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
 225         0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
 226         0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
 227         0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
 228         0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
 229         0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU
 230 };
 231 
 232 
 233 static const uint32_t Te1[256] =
 234 {
 235         0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
 236         0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
 237         0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
 238         0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
 239         0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
 240         0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
 241         0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
 242         0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
 243         0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
 244         0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
 245         0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
 246         0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
 247         0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
 248         0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
 249         0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
 250         0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
 251         0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
 252         0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
 253         0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
 254         0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
 255         0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
 256         0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
 257         0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
 258         0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
 259         0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
 260         0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
 261         0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
 262         0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
 263         0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
 264         0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
 265         0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
 266         0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
 267         0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
 268         0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
 269         0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
 270         0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
 271         0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
 272         0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
 273         0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
 274         0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
 275         0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
 276         0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
 277         0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
 278         0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
 279         0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
 280         0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
 281         0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
 282         0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
 283         0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
 284         0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
 285         0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
 286         0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
 287         0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
 288         0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
 289         0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
 290         0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
 291         0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
 292         0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
 293         0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
 294         0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
 295         0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
 296         0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
 297         0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
 298         0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U
 299 };
 300 
 301 
 302 static const uint32_t Te2[256] =
 303 {
 304         0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
 305         0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
 306         0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
 307         0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
 308         0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
 309         0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
 310         0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
 311         0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
 312         0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
 313         0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
 314         0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
 315         0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
 316         0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
 317         0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
 318         0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
 319         0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
 320         0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
 321         0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
 322         0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
 323         0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
 324         0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
 325         0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
 326         0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
 327         0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
 328         0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
 329         0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
 330         0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
 331         0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
 332         0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
 333         0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
 334         0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
 335         0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
 336         0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
 337         0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
 338         0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
 339         0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
 340         0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
 341         0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
 342         0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
 343         0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
 344         0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
 345         0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
 346         0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
 347         0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
 348         0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
 349         0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
 350         0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
 351         0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
 352         0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
 353         0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
 354         0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
 355         0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
 356         0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
 357         0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
 358         0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
 359         0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
 360         0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
 361         0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
 362         0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
 363         0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
 364         0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
 365         0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
 366         0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
 367         0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U
 368 };
 369 
 370 
 371 static const uint32_t Te3[256] =
 372 {
 373         0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
 374         0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
 375         0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
 376         0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
 377         0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
 378         0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
 379         0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
 380         0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
 381         0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
 382         0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
 383         0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
 384         0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
 385         0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
 386         0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
 387         0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
 388         0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
 389         0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
 390         0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
 391         0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
 392         0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
 393         0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
 394         0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
 395         0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
 396         0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
 397         0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
 398         0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
 399         0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
 400         0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
 401         0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
 402         0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
 403         0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
 404         0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
 405         0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
 406         0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
 407         0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
 408         0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
 409         0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
 410         0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
 411         0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
 412         0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
 413         0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
 414         0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
 415         0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
 416         0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
 417         0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
 418         0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
 419         0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
 420         0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
 421         0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
 422         0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
 423         0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
 424         0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
 425         0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
 426         0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
 427         0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
 428         0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
 429         0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
 430         0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
 431         0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
 432         0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
 433         0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
 434         0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
 435         0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
 436         0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU
 437 };
 438 
 439 #endif /* !sun4u */
 440 
 441 static const uint32_t Te4[256] =
 442 {
 443         0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
 444         0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
 445         0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
 446         0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
 447         0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
 448         0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
 449         0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
 450         0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
 451         0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
 452         0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
 453         0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
 454         0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
 455         0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
 456         0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
 457         0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
 458         0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
 459         0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
 460         0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
 461         0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
 462         0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
 463         0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
 464         0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
 465         0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
 466         0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
 467         0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
 468         0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
 469         0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
 470         0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
 471         0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
 472         0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
 473         0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
 474         0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
 475         0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
 476         0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
 477         0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
 478         0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
 479         0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
 480         0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
 481         0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
 482         0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
 483         0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
 484         0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
 485         0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
 486         0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
 487         0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
 488         0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
 489         0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
 490         0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
 491         0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
 492         0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
 493         0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
 494         0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
 495         0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
 496         0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
 497         0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
 498         0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
 499         0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
 500         0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
 501         0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
 502         0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
 503         0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
 504         0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
 505         0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
 506         0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U
 507 };
 508 
 509 /* Decrypt Sbox constants (for the substitute bytes operation) */
 510 
 511 static const uint32_t Td0[256] =
 512 {
 513         0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
 514         0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
 515         0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
 516         0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
 517         0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
 518         0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
 519         0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
 520         0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
 521         0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
 522         0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
 523         0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
 524         0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
 525         0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
 526         0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
 527         0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
 528         0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
 529         0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
 530         0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
 531         0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
 532         0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
 533         0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
 534         0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
 535         0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
 536         0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
 537         0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
 538         0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
 539         0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
 540         0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
 541         0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
 542         0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
 543         0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
 544         0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
 545         0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
 546         0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
 547         0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
 548         0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
 549         0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
 550         0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
 551         0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
 552         0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
 553         0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
 554         0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
 555         0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
 556         0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
 557         0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
 558         0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
 559         0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
 560         0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
 561         0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
 562         0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
 563         0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
 564         0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
 565         0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
 566         0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
 567         0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
 568         0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
 569         0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
 570         0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
 571         0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
 572         0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
 573         0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
 574         0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
 575         0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
 576         0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U
 577 };
 578 
 579 static const uint32_t Td1[256] =
 580 {
 581         0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
 582         0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
 583         0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
 584         0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
 585         0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
 586         0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
 587         0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
 588         0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
 589         0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
 590         0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
 591         0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
 592         0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
 593         0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
 594         0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
 595         0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
 596         0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
 597         0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
 598         0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
 599         0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
 600         0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
 601         0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
 602         0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
 603         0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
 604         0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
 605         0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
 606         0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
 607         0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
 608         0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
 609         0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
 610         0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
 611         0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
 612         0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
 613         0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
 614         0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
 615         0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
 616         0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
 617         0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
 618         0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
 619         0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
 620         0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
 621         0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
 622         0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
 623         0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
 624         0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
 625         0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
 626         0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
 627         0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
 628         0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
 629         0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
 630         0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
 631         0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
 632         0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
 633         0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
 634         0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
 635         0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
 636         0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
 637         0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
 638         0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
 639         0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
 640         0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
 641         0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
 642         0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
 643         0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
 644         0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U
 645 };
 646 
 647 static const uint32_t Td2[256] =
 648 {
 649         0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
 650         0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
 651         0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
 652         0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
 653         0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
 654         0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
 655         0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
 656         0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
 657         0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
 658         0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
 659         0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
 660         0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
 661         0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
 662         0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
 663         0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
 664         0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
 665         0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
 666         0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
 667         0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
 668         0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
 669         0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
 670         0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
 671         0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
 672         0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
 673         0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
 674         0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
 675         0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
 676         0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
 677         0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
 678         0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
 679         0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
 680         0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
 681         0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
 682         0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
 683         0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
 684         0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
 685         0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
 686         0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
 687         0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
 688         0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
 689         0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
 690         0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
 691         0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
 692         0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
 693         0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
 694         0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
 695         0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
 696         0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
 697         0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
 698         0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
 699         0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
 700         0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
 701         0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
 702         0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
 703         0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
 704         0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
 705         0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
 706         0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
 707         0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
 708         0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
 709         0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
 710         0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
 711         0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
 712         0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U
 713 };
 714 
 715 static const uint32_t Td3[256] =
 716 {
 717         0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
 718         0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
 719         0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
 720         0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
 721         0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
 722         0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
 723         0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
 724         0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
 725         0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
 726         0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
 727         0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
 728         0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
 729         0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
 730         0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
 731         0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
 732         0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
 733         0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
 734         0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
 735         0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
 736         0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
 737         0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
 738         0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
 739         0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
 740         0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
 741         0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
 742         0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
 743         0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
 744         0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
 745         0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
 746         0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
 747         0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
 748         0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
 749         0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
 750         0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
 751         0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
 752         0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
 753         0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
 754         0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
 755         0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
 756         0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
 757         0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
 758         0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
 759         0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
 760         0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
 761         0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
 762         0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
 763         0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
 764         0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
 765         0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
 766         0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
 767         0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
 768         0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
 769         0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
 770         0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
 771         0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
 772         0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
 773         0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
 774         0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
 775         0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
 776         0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
 777         0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
 778         0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
 779         0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
 780         0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U
 781 };
 782 
 783 #ifndef sun4u
 784 
 785 static const uint32_t Td4[256] =
 786 {
 787         0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
 788         0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
 789         0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
 790         0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
 791         0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
 792         0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
 793         0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
 794         0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
 795         0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
 796         0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
 797         0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
 798         0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
 799         0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
 800         0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
 801         0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
 802         0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
 803         0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
 804         0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
 805         0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
 806         0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
 807         0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
 808         0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
 809         0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
 810         0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
 811         0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
 812         0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
 813         0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
 814         0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
 815         0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
 816         0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
 817         0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
 818         0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
 819         0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
 820         0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
 821         0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
 822         0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
 823         0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
 824         0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
 825         0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
 826         0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
 827         0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
 828         0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
 829         0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
 830         0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
 831         0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
 832         0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
 833         0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
 834         0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
 835         0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
 836         0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
 837         0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
 838         0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
 839         0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
 840         0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
 841         0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
 842         0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
 843         0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
 844         0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
 845         0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
 846         0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
 847         0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
 848         0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
 849         0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
 850         0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU
 851 };
 852 
 853 #endif /* !sun4u */
 854 
 855 /* Rcon is Round Constant; used for encryption key expansion */
 856 static const uint32_t rcon[RC_LENGTH] =
 857 {
 858         /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 859         0x01000000, 0x02000000, 0x04000000, 0x08000000,
 860         0x10000000, 0x20000000, 0x40000000, 0x80000000,
 861         0x1B000000, 0x36000000
 862 };
 863 
 864 
 865 /*
 866  * Expand the cipher key into the encryption key schedule.
 867  *
 868  * Return the number of rounds for the given cipher key size.
 869  * The size of the key schedule depends on the number of rounds
 870  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 871  *
 872  * Parameters:
 873  * rk           AES key schedule 32-bit array to be initialized
 874  * cipherKey    User key
 875  * keyBits      AES key size (128, 192, or 256 bits)
 876  */
 877 static int
 878 rijndael_key_setup_enc_raw(uint32_t rk[], const uint32_t cipherKey[],
 879     int keyBits)
 880 {
 881         int             i = 0;
 882         uint32_t        temp;
 883 
 884         rk[0] = cipherKey[0];
 885         rk[1] = cipherKey[1];
 886         rk[2] = cipherKey[2];
 887         rk[3] = cipherKey[3];
 888 
 889         if (keyBits == 128) {
 890                 for (;;) {
 891                         temp  = rk[3];
 892                         rk[4] = rk[0] ^
 893                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 894                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 895                             (Te4[temp & 0xff] & 0x0000ff00) ^
 896                             (Te4[temp >> 24] & 0x000000ff) ^
 897                             rcon[i];
 898                         rk[5] = rk[1] ^ rk[4];
 899                         rk[6] = rk[2] ^ rk[5];
 900                         rk[7] = rk[3] ^ rk[6];
 901 
 902                         if (++i == 10) {
 903                                 return (10);
 904                         }
 905                         rk += 4;
 906                 }
 907         }
 908 
 909         rk[4] = cipherKey[4];
 910         rk[5] = cipherKey[5];
 911 
 912         if (keyBits == 192) {
 913                 for (;;) {
 914                         temp = rk[5];
 915                         rk[6] = rk[0] ^
 916                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 917                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 918                             (Te4[temp & 0xff] & 0x0000ff00) ^
 919                             (Te4[temp >> 24] & 0x000000ff) ^
 920                             rcon[i];
 921                         rk[7] = rk[1] ^ rk[6];
 922                         rk[8] = rk[2] ^ rk[7];
 923                         rk[9] = rk[3] ^ rk[8];
 924 
 925                         if (++i == 8) {
 926                                 return (12);
 927                         }
 928 
 929                         rk[10] = rk[4] ^ rk[9];
 930                         rk[11] = rk[5] ^ rk[10];
 931                         rk += 6;
 932                 }
 933         }
 934 
 935         rk[6] = cipherKey[6];
 936         rk[7] = cipherKey[7];
 937 
 938         if (keyBits == 256) {
 939                 for (;;) {
 940                         temp = rk[7];
 941                         rk[8] = rk[0] ^
 942                             (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
 943                             (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
 944                             (Te4[temp & 0xff] & 0x0000ff00) ^
 945                             (Te4[temp >> 24] & 0x000000ff) ^
 946                             rcon[i];
 947                         rk[9] = rk[1] ^ rk[8];
 948                         rk[10] = rk[2] ^ rk[9];
 949                         rk[11] = rk[3] ^ rk[10];
 950 
 951                         if (++i == 7) {
 952                                 return (14);
 953                         }
 954                         temp = rk[11];
 955                         rk[12] = rk[4] ^
 956                             (Te4[temp >> 24] & 0xff000000) ^
 957                             (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
 958                             (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
 959                             (Te4[temp & 0xff] & 0x000000ff);
 960                         rk[13] = rk[5] ^ rk[12];
 961                         rk[14] = rk[6] ^ rk[13];
 962                         rk[15] = rk[7] ^ rk[14];
 963 
 964                         rk += 8;
 965                 }
 966         }
 967 
 968         return (0);
 969 }
 970 #endif  /* !__amd64 */
 971 
 972 
 973 #ifdef  sun4u
 974 
 975 /*
 976  * Expand the cipher key into the encryption key schedule.
 977  * by the sun4u optimized assembly implementation.
 978  *
 979  * Return the number of rounds for the given cipher key size.
 980  * The size of the key schedule depends on the number of rounds
 981  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
 982  *
 983  * Parameters:
 984  * rk           AES key schedule 64-bit array to be initialized
 985  * cipherKey    User key
 986  * keyBits      AES key size (128, 192, or 256 bits)
 987  */
 988 static int
 989 rijndael_key_setup_enc(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
 990 {
 991         uint32_t        rk1[4 * (MAX_AES_NR + 1)];
 992         uint64_t        *rk64 = (uint64_t *)rk;
 993         uint32_t        *rkt;
 994         uint64_t        t;
 995         int             i, Nr;
 996 
 997         Nr = rijndael_key_setup_enc_raw(rk1, cipherKey, keyBits);
 998 
 999         for (i = 0; i < 4 * Nr; i++) {
1000                 t = (uint64_t)(rk1[i]);
1001                 rk64[i] = ((t & 0xff000000) << 11) |
1002                     ((t & 0xff0000) << 8) |
1003                     ((t & 0xffff) << 3);
1004         }
1005 
1006         rkt = (uint32_t *)(&(rk64[4 * Nr]));
1007 
1008         for (i = 0; i < 4; i++) {
1009                 rkt[i] = rk1[4 * Nr+i];
1010         }
1011 
1012         return (Nr);
1013 }
1014 
1015 
1016 /*
1017  * Expand the cipher key into the decryption key schedule as used
1018  * by the sun4u optimized assembly implementation.
1019  *
1020  * Return the number of rounds for the given cipher key size.
1021  * The size of the key schedule depends on the number of rounds
1022  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1023  *
1024  * Parameters:
1025  * rk           AES key schedule 32-bit array to be initialized
1026  * cipherKey    User key
1027  * keyBits      AES key size (128, 192, or 256 bits)
1028  */
1029 static int
1030 rijndael_key_setup_dec_raw(uint32_t rk[], const uint32_t cipherKey[],
1031     int keyBits)
1032 {
1033         int             Nr, i;
1034         uint32_t        temp;
1035 
1036         /* expand the cipher key: */
1037         Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1038 
1039         /* invert the order of the round keys: */
1040 
1041         for (i = 0; i < 2 * Nr + 2; i++) {
1042                 temp = rk[i];
1043                 rk[i] = rk[4 * Nr - i + 3];
1044                 rk[4 * Nr - i + 3] = temp;
1045         }
1046 
1047         /*
1048          * apply the inverse MixColumn transform to all
1049          * round keys but the first and the last:
1050          */
1051         for (i = 1; i < Nr; i++) {
1052                 rk += 4;
1053                 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1054                     Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1055                     Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1056                     Td3[Te4[rk[0] & 0xff] & 0xff];
1057                 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1058                     Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1059                     Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1060                     Td3[Te4[rk[1] & 0xff] & 0xff];
1061                 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1062                     Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1063                     Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1064                     Td3[Te4[rk[2] & 0xff] & 0xff];
1065                 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1066                     Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1067                     Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1068                     Td3[Te4[rk[3] & 0xff] & 0xff];
1069         }
1070 
1071         return (Nr);
1072 }
1073 
1074 
1075 /*
1076  * The size of the key schedule depends on the number of rounds
1077  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1078  *
1079  * Parameters:
1080  * rk           AES key schedule 64-bit array to be initialized
1081  * cipherKey    User key
1082  * keyBits      AES key size (128, 192, or 256 bits)
1083  */
1084 static int
1085 rijndael_key_setup_dec(uint64_t rk[], const uint32_t cipherKey[], int keyBits)
1086 {
1087         uint32_t        rk1[4 * (MAX_AES_NR + 1)];
1088         uint64_t        *rk64 = (uint64_t *)rk;
1089         uint32_t        *rkt;
1090         uint64_t        t;
1091         int             i, Nr;
1092 
1093         Nr = rijndael_key_setup_dec_raw(rk1, cipherKey, keyBits);
1094         for (i = 0; i < 4 * Nr; i++) {
1095                 t = (uint64_t)(rk1[i]);
1096                 rk64[i] = ((t & 0xff000000) << 11) |
1097                     ((t & 0xff0000) << 8) |
1098                     ((t & 0xffff) << 3);
1099         }
1100 
1101         rkt = (uint32_t *)(&(rk64[4 * Nr]));
1102 
1103         for (i = 0; i < 4; i++) {
1104                 rkt[i] = rk1[4 * Nr + i];
1105         }
1106 
1107         return (Nr);
1108 }
1109 
1110 
1111 /*
1112  * Expand the 64-bit AES cipher key array into the encryption and decryption
1113  * key schedules.
1114  *
1115  * Parameters:
1116  * key          AES key schedule to be initialized
1117  * keyarr32     User key
1118  * keyBits      AES key size (128, 192, or 256 bits)
1119  */
1120 static void
1121 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1122 {
1123         key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks64[0]), keyarr32,
1124             keybits);
1125         key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks64[0]), keyarr32,
1126             keybits);
1127         key->type = AES_64BIT_KS;
1128 }
1129 
1130 
1131 #elif defined(__amd64)
1132 
1133 /*
1134  * Expand the 32-bit AES cipher key array into the encryption and decryption
1135  * key schedules.
1136  *
1137  * Parameters:
1138  * key          AES key schedule to be initialized
1139  * keyarr32     User key
1140  * keyBits      AES key size (128, 192, or 256 bits)
1141  */
1142 static void
1143 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1144 {
1145         if (intel_aes_instructions_present()) {
1146                 key->flags = INTEL_AES_NI_CAPABLE;
1147                 KPREEMPT_DISABLE;
1148                 key->nr = rijndael_key_setup_enc_intel(&(key->encr_ks.ks32[0]),
1149                     keyarr32, keybits);
1150                 key->nr = rijndael_key_setup_dec_intel(&(key->decr_ks.ks32[0]),
1151                     keyarr32, keybits);
1152                 KPREEMPT_ENABLE;
1153         } else {
1154                 key->flags = 0;
1155                 key->nr = rijndael_key_setup_enc_amd64(&(key->encr_ks.ks32[0]),
1156                     keyarr32, keybits);
1157                 key->nr = rijndael_key_setup_dec_amd64(&(key->decr_ks.ks32[0]),
1158                     keyarr32, keybits);
1159         }
1160 
1161         key->type = AES_32BIT_KS;
1162 }
1163 
1164 /*
1165  * Encrypt one block of data. The block is assumed to be an array
1166  * of four uint32_t values, so copy for alignment (and byte-order
1167  * reversal for little endian systems might be necessary on the
1168  * input and output byte streams.
1169  * The size of the key schedule depends on the number of rounds
1170  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1171  *
1172  * Parameters:
1173  * rk           Key schedule, of aes_ks_t (60 32-bit integers)
1174  * Nr           Number of rounds
1175  * pt           Input block (plain text)
1176  * ct           Output block (crypto text).  Can overlap with pt
1177  * flags        Indicates whether we're on Intel AES-NI-capable hardware
1178  */
1179 static void
1180 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1181     uint32_t ct[4], int flags) {
1182         if (flags & INTEL_AES_NI_CAPABLE) {
1183                 KPREEMPT_DISABLE;
1184                 aes_encrypt_intel(rk, Nr, pt, ct);
1185                 KPREEMPT_ENABLE;
1186         } else {
1187                 aes_encrypt_amd64(rk, Nr, pt, ct);
1188         }
1189 }
1190 
1191 /*
1192  * Decrypt one block of data. The block is assumed to be an array
1193  * of four uint32_t values, so copy for alignment (and byte-order
1194  * reversal for little endian systems might be necessary on the
1195  * input and output byte streams.
1196  * The size of the key schedule depends on the number of rounds
1197  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1198  *
1199  * Parameters:
1200  * rk           Key schedule, of aes_ks_t (60 32-bit integers)
1201  * Nr           Number of rounds
1202  * ct           Input block (crypto text)
1203  * pt           Output block (plain text). Can overlap with pt
1204  * flags        Indicates whether we're on Intel AES-NI-capable hardware
1205  */
1206 static void
1207 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1208     uint32_t pt[4], int flags) {
1209         if (flags & INTEL_AES_NI_CAPABLE) {
1210                 KPREEMPT_DISABLE;
1211                 aes_decrypt_intel(rk, Nr, ct, pt);
1212                 KPREEMPT_ENABLE;
1213         } else {
1214                 aes_decrypt_amd64(rk, Nr, ct, pt);
1215         }
1216 }
1217 
1218 
1219 #else /* generic C implementation */
1220 
1221 /*
1222  *  Expand the cipher key into the decryption key schedule.
1223  *  Return the number of rounds for the given cipher key size.
1224  *  The size of the key schedule depends on the number of rounds
1225  *  (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1226  *
1227  * Parameters:
1228  * rk           AES key schedule 32-bit array to be initialized
1229  * cipherKey    User key
1230  * keyBits      AES key size (128, 192, or 256 bits)
1231  */
1232 static int
1233 rijndael_key_setup_dec(uint32_t rk[], const uint32_t cipherKey[], int keyBits)
1234 {
1235         int      Nr, i, j;
1236         uint32_t temp;
1237 
1238         /* expand the cipher key: */
1239         Nr = rijndael_key_setup_enc_raw(rk, cipherKey, keyBits);
1240 
1241         /* invert the order of the round keys: */
1242         for (i = 0, j = 4 * Nr; i < j; i += 4, j -= 4) {
1243                 temp = rk[i];
1244                 rk[i] = rk[j];
1245                 rk[j] = temp;
1246                 temp = rk[i + 1];
1247                 rk[i + 1] = rk[j + 1];
1248                 rk[j + 1] = temp;
1249                 temp = rk[i + 2];
1250                 rk[i + 2] = rk[j + 2];
1251                 rk[j + 2] = temp;
1252                 temp = rk[i + 3];
1253                 rk[i + 3] = rk[j + 3];
1254                 rk[j + 3] = temp;
1255         }
1256 
1257         /*
1258          * apply the inverse MixColumn transform to all
1259          * round keys but the first and the last:
1260          */
1261         for (i = 1; i < Nr; i++) {
1262                 rk += 4;
1263                 rk[0] = Td0[Te4[rk[0] >> 24] & 0xff] ^
1264                     Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1265                     Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
1266                     Td3[Te4[rk[0] & 0xff] & 0xff];
1267                 rk[1] = Td0[Te4[rk[1] >> 24] & 0xff] ^
1268                     Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1269                     Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
1270                     Td3[Te4[rk[1] & 0xff] & 0xff];
1271                 rk[2] = Td0[Te4[rk[2] >> 24] & 0xff] ^
1272                     Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1273                     Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
1274                     Td3[Te4[rk[2] & 0xff] & 0xff];
1275                 rk[3] = Td0[Te4[rk[3] >> 24] & 0xff] ^
1276                     Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1277                     Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
1278                     Td3[Te4[rk[3] & 0xff] & 0xff];
1279         }
1280 
1281         return (Nr);
1282 }
1283 
1284 
1285 /*
1286  * Expand the 32-bit AES cipher key array into the encryption and decryption
1287  * key schedules.
1288  *
1289  * Parameters:
1290  * key          AES key schedule to be initialized
1291  * keyarr32     User key
1292  * keyBits      AES key size (128, 192, or 256 bits)
1293  */
1294 static void
1295 aes_setupkeys(aes_key_t *key, const uint32_t *keyarr32, int keybits)
1296 {
1297         key->nr = rijndael_key_setup_enc(&(key->encr_ks.ks32[0]), keyarr32,
1298             keybits);
1299         key->nr = rijndael_key_setup_dec(&(key->decr_ks.ks32[0]), keyarr32,
1300             keybits);
1301         key->type = AES_32BIT_KS;
1302 }
1303 
1304 
1305 /*
1306  * Encrypt one block of data. The block is assumed to be an array
1307  * of four uint32_t values, so copy for alignment (and byte-order
1308  * reversal for little endian systems might be necessary on the
1309  * input and output byte streams.
1310  * The size of the key schedule depends on the number of rounds
1311  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1312  *
1313  * Parameters:
1314  * rk   Key schedule, of aes_ks_t (60 32-bit integers)
1315  * Nr   Number of rounds
1316  * pt   Input block (plain text)
1317  * ct   Output block (crypto text).  Can overlap with pt
1318  */
1319 static void
1320 rijndael_encrypt(const uint32_t rk[], int Nr, const uint32_t pt[4],
1321     uint32_t ct[4])
1322 {
1323         uint32_t        s0, s1, s2, s3, t0, t1, t2, t3;
1324         int             r;
1325 
1326         /*
1327          * map byte array block to cipher state
1328          * and add initial round key:
1329          */
1330 
1331         s0 = pt[0] ^ rk[0];
1332         s1 = pt[1] ^ rk[1];
1333         s2 = pt[2] ^ rk[2];
1334         s3 = pt[3] ^ rk[3];
1335 
1336         /*
1337          * Nr - 1 full rounds:
1338          */
1339 
1340         r = Nr >> 1;
1341 
1342         for (;;) {
1343                 t0 = Te0[s0 >> 24] ^
1344                     Te1[(s1 >> 16) & 0xff] ^
1345                     Te2[(s2 >>  8) & 0xff] ^
1346                     Te3[s3 & 0xff] ^
1347                     rk[4];
1348 
1349                 t1 = Te0[s1 >> 24] ^
1350                     Te1[(s2 >> 16) & 0xff] ^
1351                     Te2[(s3 >>  8) & 0xff] ^
1352                     Te3[s0 & 0xff] ^
1353                     rk[5];
1354 
1355                 t2 = Te0[s2 >> 24] ^
1356                     Te1[(s3 >> 16) & 0xff] ^
1357                     Te2[(s0 >>  8) & 0xff] ^
1358                     Te3[s1 & 0xff] ^
1359                     rk[6];
1360 
1361                 t3 = Te0[s3 >> 24] ^
1362                     Te1[(s0 >> 16) & 0xff] ^
1363                     Te2[(s1 >>  8) & 0xff] ^
1364                     Te3[s2 & 0xff] ^
1365                     rk[7];
1366 
1367                 rk += 8;
1368 
1369                 if (--r == 0) {
1370                         break;
1371                 }
1372 
1373                 s0 = Te0[t0 >> 24] ^
1374                     Te1[(t1 >> 16) & 0xff] ^
1375                     Te2[(t2 >>  8) & 0xff] ^
1376                     Te3[t3 & 0xff] ^
1377                     rk[0];
1378 
1379                 s1 = Te0[t1 >> 24] ^
1380                     Te1[(t2 >> 16) & 0xff] ^
1381                     Te2[(t3 >>  8) & 0xff] ^
1382                     Te3[t0 & 0xff] ^
1383                     rk[1];
1384 
1385                 s2 = Te0[t2 >> 24] ^
1386                     Te1[(t3 >> 16) & 0xff] ^
1387                     Te2[(t0 >>  8) & 0xff] ^
1388                     Te3[t1 & 0xff] ^
1389                     rk[2];
1390 
1391                 s3 = Te0[t3 >> 24] ^
1392                     Te1[(t0 >> 16) & 0xff] ^
1393                     Te2[(t1 >>  8) & 0xff] ^
1394                     Te3[t2 & 0xff] ^
1395                     rk[3];
1396         }
1397 
1398         /*
1399          * apply last round and
1400          * map cipher state to byte array block:
1401          */
1402 
1403         s0 = (Te4[(t0 >> 24)] & 0xff000000) ^
1404             (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1405             (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1406             (Te4[t3 & 0xff] & 0x000000ff) ^
1407             rk[0];
1408         ct[0] = s0;
1409 
1410         s1 = (Te4[(t1 >> 24)] & 0xff000000) ^
1411             (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1412             (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1413             (Te4[t0 & 0xff] & 0x000000ff) ^
1414             rk[1];
1415         ct[1] = s1;
1416 
1417         s2 = (Te4[(t2 >> 24)] & 0xff000000) ^
1418             (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1419             (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1420             (Te4[t1 & 0xff] & 0x000000ff) ^
1421             rk[2];
1422         ct[2] = s2;
1423 
1424         s3 = (Te4[(t3 >> 24)] & 0xff000000) ^
1425             (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1426             (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1427             (Te4[t2 & 0xff] & 0x000000ff) ^
1428             rk[3];
1429         ct[3] = s3;
1430 }
1431 
1432 
1433 /*
1434  * Decrypt one block of data. The block is assumed to be an array
1435  * of four uint32_t values, so copy for alignment (and byte-order
1436  * reversal for little endian systems might be necessary on the
1437  * input and output byte streams.
1438  * The size of the key schedule depends on the number of rounds
1439  * (which can be computed from the size of the key), i.e. 4*(Nr + 1).
1440  *
1441  * Parameters:
1442  * rk   Key schedule, of aes_ks_t (60 32-bit integers)
1443  * Nr   Number of rounds
1444  * ct   Input block (crypto text)
1445  * pt   Output block (plain text). Can overlap with pt
1446  */
1447 static void
1448 rijndael_decrypt(const uint32_t rk[], int Nr, const uint32_t ct[4],
1449     uint32_t pt[4])
1450 {
1451         uint32_t s0, s1, s2, s3, t0, t1, t2, t3;
1452         int      r;
1453 
1454         /*
1455          * map byte array block to cipher state
1456          * and add initial round key:
1457          */
1458         s0 = ct[0] ^ rk[0];
1459         s1 = ct[1] ^ rk[1];
1460         s2 = ct[2] ^ rk[2];
1461         s3 = ct[3] ^ rk[3];
1462 
1463         /*
1464          * Nr - 1 full rounds:
1465          */
1466 
1467         r = Nr >> 1;
1468 
1469         for (;;) {
1470                 t0 = Td0[s0 >> 24] ^
1471                     Td1[(s3 >> 16) & 0xff] ^
1472                     Td2[(s2 >> 8) & 0xff] ^
1473                     Td3[s1 & 0xff] ^
1474                     rk[4];
1475 
1476                 t1 = Td0[s1 >> 24] ^
1477                     Td1[(s0 >> 16) & 0xff] ^
1478                     Td2[(s3 >>  8) & 0xff] ^
1479                     Td3[s2 & 0xff] ^
1480                     rk[5];
1481 
1482                 t2 = Td0[s2 >> 24] ^
1483                     Td1[(s1 >> 16) & 0xff] ^
1484                     Td2[(s0 >>  8) & 0xff] ^
1485                     Td3[s3 & 0xff] ^
1486                     rk[6];
1487 
1488                 t3 = Td0[s3 >> 24] ^
1489                     Td1[(s2 >> 16) & 0xff] ^
1490                     Td2[(s1 >> 8) & 0xff] ^
1491                     Td3[s0 & 0xff] ^
1492                     rk[7];
1493 
1494                 rk += 8;
1495 
1496                 if (--r == 0) {
1497                         break;
1498                 }
1499 
1500                 s0 = Td0[t0 >> 24] ^
1501                     Td1[(t3 >> 16) & 0xff] ^
1502                     Td2[(t2 >> 8) & 0xff] ^
1503                     Td3[t1 & 0xff] ^
1504                     rk[0];
1505 
1506                 s1 = Td0[t1 >> 24] ^
1507                     Td1[(t0 >> 16) & 0xff] ^
1508                     Td2[(t3 >> 8) & 0xff] ^
1509                     Td3[t2 & 0xff] ^
1510                     rk[1];
1511 
1512                 s2 = Td0[t2 >> 24] ^
1513                     Td1[(t1 >> 16) & 0xff] ^
1514                     Td2[(t0 >> 8) & 0xff] ^
1515                     Td3[t3 & 0xff] ^
1516                     rk[2];
1517 
1518                 s3 = Td0[t3 >> 24] ^
1519                     Td1[(t2 >> 16) & 0xff] ^
1520                     Td2[(t1 >> 8) & 0xff] ^
1521                     Td3[t0 & 0xff] ^
1522                     rk[3];
1523         }
1524 
1525         /*
1526          * apply last round and
1527          * map cipher state to byte array block:
1528          */
1529 
1530         s0 = (Td4[t0 >> 24] & 0xff000000) ^
1531             (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1532             (Td4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1533             (Td4[t1 & 0xff] & 0x000000ff) ^
1534             rk[0];
1535         pt[0] = s0;
1536 
1537         s1 = (Td4[t1 >> 24] & 0xff000000) ^
1538             (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1539             (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1540             (Td4[t2 & 0xff] & 0x000000ff) ^
1541             rk[1];
1542         pt[1] = s1;
1543 
1544         s2 = (Td4[t2 >> 24] & 0xff000000) ^
1545             (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1546             (Td4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1547             (Td4[t3 & 0xff] & 0x000000ff) ^
1548             rk[2];
1549         pt[2] = s2;
1550 
1551         s3 = (Td4[t3 >> 24] & 0xff000000) ^
1552             (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1553             (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1554             (Td4[t0 & 0xff] & 0x000000ff) ^
1555             rk[3];
1556         pt[3] = s3;
1557 }
1558 #endif  /* sun4u, __amd64 */
1559 /* EXPORT DELETE END */
1560 
1561 
1562 /*
1563  * Initialize AES encryption and decryption key schedules.
1564  *
1565  * Parameters:
1566  * cipherKey    User key
1567  * keyBits      AES key size (128, 192, or 256 bits)
1568  * keysched     AES key schedule to be initialized, of type aes_key_t.
1569  *              Allocated by aes_alloc_keysched().
1570  */
1571 void
1572 aes_init_keysched(const uint8_t *cipherKey, uint_t keyBits, void *keysched)
1573 {
1574 /* EXPORT DELETE START */
1575         aes_key_t       *newbie = keysched;
1576         uint_t          keysize, i, j;
1577         union {
1578                 uint64_t        ka64[4];
1579                 uint32_t        ka32[8];
1580                 } keyarr;
1581 
1582         switch (keyBits) {
1583         case 128:
1584                 newbie->nr = 10;
1585                 break;
1586 
1587         case 192:
1588                 newbie->nr = 12;
1589                 break;
1590 
1591         case 256:
1592                 newbie->nr = 14;
1593                 break;
1594 
1595         default:
1596                 /* should never get here */
1597                 return;
1598         }
1599         keysize = CRYPTO_BITS2BYTES(keyBits);
1600 
1601         /*
1602          * For _LITTLE_ENDIAN machines (except AMD64), reverse every
1603          * 4 bytes in the key.  On _BIG_ENDIAN and AMD64, copy the key
1604          * without reversing bytes.
1605          * For AMD64, do not byte swap for aes_setupkeys().
1606          *
1607          * SPARCv8/v9 uses a key schedule array with 64-bit elements.
1608          * X86/AMD64  uses a key schedule array with 32-bit elements.
1609          */
1610 #ifndef AES_BYTE_SWAP
1611         if (IS_P2ALIGNED(cipherKey, sizeof (uint64_t))) {
1612                 for (i = 0, j = 0; j < keysize; i++, j += 8) {
1613                         /* LINTED: pointer alignment */
1614                         keyarr.ka64[i] = *((uint64_t *)&cipherKey[j]);
1615                 }
1616         } else {
1617                 bcopy(cipherKey, keyarr.ka32, keysize);
1618         }
1619 
1620 #else   /* byte swap */
1621         for (i = 0, j = 0; j < keysize; i++, j += 4) {
1622                 keyarr.ka32[i] = htonl(*(uint32_t *)(void *)&cipherKey[j]);
1623         }
1624 #endif
1625 
1626         aes_setupkeys(newbie, keyarr.ka32, keyBits);
1627 /* EXPORT DELETE END */
1628 }
1629 
1630 
1631 /*
1632  * Encrypt one block using AES.
1633  * Align if needed and (for x86 32-bit only) byte-swap.
1634  *
1635  * Parameters:
1636  * ks   Key schedule, of type aes_key_t
1637  * pt   Input block (plain text)
1638  * ct   Output block (crypto text).  Can overlap with pt
1639  */
1640 int
1641 aes_encrypt_block(const void *ks, const uint8_t *pt, uint8_t *ct)
1642 {
1643 /* EXPORT DELETE START */
1644         aes_key_t       *ksch = (aes_key_t *)ks;
1645 
1646 #ifndef AES_BYTE_SWAP
1647         if (IS_P2ALIGNED2(pt, ct, sizeof (uint32_t))) {
1648                 /* LINTED:  pointer alignment */
1649                 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1650                     /* LINTED:  pointer alignment */
1651                     (uint32_t *)pt, (uint32_t *)ct, ksch->flags);
1652         } else {
1653 #endif
1654                 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1655 
1656                 /* Copy input block into buffer */
1657 #ifndef AES_BYTE_SWAP
1658                 bcopy(pt, &buffer, AES_BLOCK_LEN);
1659 
1660 #else   /* byte swap */
1661                 buffer[0] = htonl(*(uint32_t *)(void *)&pt[0]);
1662                 buffer[1] = htonl(*(uint32_t *)(void *)&pt[4]);
1663                 buffer[2] = htonl(*(uint32_t *)(void *)&pt[8]);
1664                 buffer[3] = htonl(*(uint32_t *)(void *)&pt[12]);
1665 #endif
1666 
1667                 AES_ENCRYPT_IMPL(&ksch->encr_ks.ks32[0], ksch->nr,
1668                     buffer, buffer, ksch->flags);
1669 
1670                 /* Copy result from buffer to output block */
1671 #ifndef AES_BYTE_SWAP
1672                 bcopy(&buffer, ct, AES_BLOCK_LEN);
1673         }
1674 
1675 #else   /* byte swap */
1676                 *(uint32_t *)(void *)&ct[0] = htonl(buffer[0]);
1677                 *(uint32_t *)(void *)&ct[4] = htonl(buffer[1]);
1678                 *(uint32_t *)(void *)&ct[8] = htonl(buffer[2]);
1679                 *(uint32_t *)(void *)&ct[12] = htonl(buffer[3]);
1680 #endif
1681 /* EXPORT DELETE END */
1682         return (CRYPTO_SUCCESS);
1683 }
1684 
1685 
1686 /*
1687  * Decrypt one block using AES.
1688  * Align and byte-swap if needed.
1689  *
1690  * Parameters:
1691  * ks   Key schedule, of type aes_key_t
1692  * ct   Input block (crypto text)
1693  * pt   Output block (plain text). Can overlap with pt
1694  */
1695 int
1696 aes_decrypt_block(const void *ks, const uint8_t *ct, uint8_t *pt)
1697 {
1698 /* EXPORT DELETE START */
1699         aes_key_t       *ksch = (aes_key_t *)ks;
1700 
1701 #ifndef AES_BYTE_SWAP
1702         if (IS_P2ALIGNED2(ct, pt, sizeof (uint32_t))) {
1703                 /* LINTED:  pointer alignment */
1704                 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1705                     /* LINTED:  pointer alignment */
1706                     (uint32_t *)ct, (uint32_t *)pt, ksch->flags);
1707         } else {
1708 #endif
1709                 uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
1710 
1711                 /* Copy input block into buffer */
1712 #ifndef AES_BYTE_SWAP
1713                 bcopy(ct, &buffer, AES_BLOCK_LEN);
1714 
1715 #else   /* byte swap */
1716                 buffer[0] = htonl(*(uint32_t *)(void *)&ct[0]);
1717                 buffer[1] = htonl(*(uint32_t *)(void *)&ct[4]);
1718                 buffer[2] = htonl(*(uint32_t *)(void *)&ct[8]);
1719                 buffer[3] = htonl(*(uint32_t *)(void *)&ct[12]);
1720 #endif
1721 
1722                 AES_DECRYPT_IMPL(&ksch->decr_ks.ks32[0], ksch->nr,
1723                     buffer, buffer, ksch->flags);
1724 
1725                 /* Copy result from buffer to output block */
1726 #ifndef AES_BYTE_SWAP
1727                 bcopy(&buffer, pt, AES_BLOCK_LEN);
1728         }
1729 
1730 #else   /* byte swap */
1731         *(uint32_t *)(void *)&pt[0] = htonl(buffer[0]);
1732         *(uint32_t *)(void *)&pt[4] = htonl(buffer[1]);
1733         *(uint32_t *)(void *)&pt[8] = htonl(buffer[2]);
1734         *(uint32_t *)(void *)&pt[12] = htonl(buffer[3]);
1735 #endif
1736 
1737 /* EXPORT DELETE END */
1738         return (CRYPTO_SUCCESS);
1739 }
1740 
1741 
1742 /*
1743  * Allocate key schedule for AES.
1744  *
1745  * Return the pointer and set size to the number of bytes allocated.
1746  * Memory allocated must be freed by the caller when done.
1747  *
1748  * Parameters:
1749  * size         Size of key schedule allocated, in bytes
1750  * kmflag       Flag passed to kmem_alloc(9F); ignored in userland.
1751  */
1752 /* ARGSUSED */
1753 void *
1754 aes_alloc_keysched(size_t *size, int kmflag)
1755 {
1756 /* EXPORT DELETE START */
1757         aes_key_t *keysched;
1758 
1759 #ifdef  _KERNEL
1760         keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
1761 #else   /* !_KERNEL */
1762         keysched = (aes_key_t *)malloc(sizeof (aes_key_t));
1763 #endif  /* _KERNEL */
1764 
1765         if (keysched != NULL) {
1766                 *size = sizeof (aes_key_t);
1767                 return (keysched);
1768         }
1769 /* EXPORT DELETE END */
1770         return (NULL);
1771 }
1772 
1773 
1774 #ifdef __amd64
1775 /*
1776  * Return 1 if executing on Intel with AES-NI instructions,
1777  * otherwise 0 (i.e., Intel without AES-NI or AMD64).
1778  * Cache the result, as the CPU can't change.
1779  *
1780  * Note: the userland version uses getisax().  The kernel version uses
1781  * global variable x86_featureset.
1782  */
1783 static int
1784 intel_aes_instructions_present(void)
1785 {
1786         static int      cached_result = -1;
1787 
1788         if (cached_result == -1) { /* first time */
1789 #ifdef _KERNEL
1790                 cached_result = is_x86_feature(x86_featureset, X86FSET_AES);
1791 #else
1792                 uint_t          ui = 0;
1793 
1794                 (void) getisax(&ui, 1);
1795                 cached_result = (ui & AV_386_AES) != 0;
1796 #endif  /* _KERNEL */
1797         }
1798 
1799         return (cached_result);
1800 }
1801 #endif  /* __amd64 */