if we rotate our onion key, publish a new descriptor, and
[tor.git] / src / common / aes.c
blob088d29a18e3a4f83b78d6373a31fc357f73f1652
1 /* Copyright (c) 2001 Matej Pfajfar.
2 * Copyright (c) 2001-2004, Roger Dingledine.
3 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson. */
4 /* See LICENSE for licensing information */
5 /* $Id$ */
6 const char aes_c_id[] = "$Id$";
8 /**
9 * \file aes.c
10 * \brief Implements the AES cipher (with 128-bit keys and blocks),
11 * and a counter-mode stream cipher on top of AES. This code is
12 * taken from the main Rijndael distribution. (We include this
13 * because many people are running older versions of OpenSSL without
14 * AES support.)
15 **/
17 #include "orconfig.h"
18 #include <openssl/opensslv.h>
19 #include <assert.h>
20 #include <stdlib.h>
21 #include <string.h>
22 #include "aes.h"
23 #include "util.h"
24 #include "log.h"
26 /* Use OpenSSL's AES if we're running 0.9.7 or later. (The f at the end of
27 * the version below means "release"; see opensslv.h) */
28 #if OPENSSL_VERSION_NUMBER >= 0x0090700fl
29 #define USE_OPENSSL_AES
30 #include <openssl/aes.h>
31 #include <openssl/evp.h>
32 #endif
34 /* Benchmarking suggests that using the built-in rijndael below is
35 * significantly faster than using OpenSSL's EVP code (by about 27%)
36 * and faster than using OpenSSL's AES functions (by about 19%).
37 * The counter-mode optimization saves around 5%.
39 #undef USE_OPENSSL_AES
40 #undef USE_OPENSSL_EVP
41 #define USE_RIJNDAEL_COUNTER_OPTIMIZATION
43 /*======================================================================*/
44 /* From rijndael-alg-fst.h */
46 typedef uint64_t u64;
47 typedef uint32_t u32;
48 typedef uint8_t u8;
50 #ifndef USE_OPENSSL_AES
51 #define MAXNR 14
53 static int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/],
54 const u8 cipherKey[], int keyBits);
55 #ifdef USE_RIJNDAEL_COUNTER_OPTIMIZATION
56 static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr,
57 u32 ctr1, u32 ctr0, u8 ct[16]);
58 #else
59 static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr,
60 const u8 pt[16], u8 ct[16]);
61 #endif
62 #endif
64 /*======================================================================*/
65 /* Interface to AES code, and counter implementation */
67 struct aes_cnt_cipher {
68 #if defined(USE_OPENSSL_EVP)
69 EVP_CIPHER_CTX key;
70 #elif defined(USE_OPENSSL_AES)
71 AES_KEY key;
72 #else
73 u32 rk[4*(MAXNR+1)];
74 int nr;
75 #endif
76 u32 counter1;
77 u32 counter0;
78 u8 buf[16];
79 u8 pos;
82 /**
83 * Helper function: set <b>cipher</b>'s internal buffer to the encrypted
84 * value of the current counter.
86 static INLINE void
87 _aes_fill_buf(aes_cnt_cipher_t *cipher)
89 /* We don't currently use OpenSSL's counter mode implementation because:
90 * 1) some versions have known bugs
91 * 2) its attitude towards IVs is not our own
92 * 3) changing the counter position was not trivial, last time I looked.
93 * None of these issues are insurmountable in principle.
95 #if (!defined(USE_OPENSSL_EVP) && !defined(USE_OPENSSL_AES) && \
96 defined(USE_RIJNDAEL_COUNTER_OPTIMIZATION))
97 rijndaelEncrypt(cipher->rk, cipher->nr,
98 cipher->counter1, cipher->counter0, cipher->buf);
99 #else
100 u32 counter0 = cipher->counter0;
101 u32 counter1 = cipher->counter1;
102 u8 buf[16];
103 memset(buf, 0, 8);
104 buf[15] = (counter0 >> 0) & 0xff;
105 buf[14] = (counter0 >> 8) & 0xff;
106 buf[13] = (counter0 >> 16) & 0xff;
107 buf[12] = (counter0 >> 24) & 0xff;
108 buf[11] = (counter1 >> 0) & 0xff;
109 buf[10] = (counter1 >> 8) & 0xff;
110 buf[ 9] = (counter1 >> 16) & 0xff;
111 buf[ 8] = (counter1 >> 24) & 0xff;
113 #if defined(USE_OPENSSL_EVP)
115 int outl=16, inl=16;
116 EVP_EncryptUpdate(&cipher->key, cipher->buf, &outl, buf, inl);
118 #elif defined(USE_OPENSSL_AES)
119 AES_encrypt(buf, cipher->buf, &cipher->key);
120 #else
121 rijndaelEncrypt(cipher->rk, cipher->nr, buf, cipher->buf);
122 #endif
123 #endif
127 * Return a newly allocated counter-mode AES128 cipher implementation.
129 aes_cnt_cipher_t*
130 aes_new_cipher(void)
132 aes_cnt_cipher_t* result = tor_malloc_zero(sizeof(aes_cnt_cipher_t));
134 return result;
137 /** Set the key of <b>cipher</b> to <b>key</b>, which is
138 * <b>key_bits</b> bits long (must be 128, 192, or 256). Also resets
139 * the counter to 0.
141 void
142 aes_set_key(aes_cnt_cipher_t *cipher, const char *key, int key_bits)
144 #if defined(USE_OPENSSL_EVP)
145 const EVP_CIPHER *c;
146 switch (key_bits) {
147 case 128: c = EVP_aes_128_ecb(); break;
148 case 192: c = EVP_aes_192_ecb(); break;
149 case 256: c = EVP_aes_256_ecb(); break;
150 default: tor_assert(0);
152 EVP_EncryptInit(&cipher->key, c, (const unsigned char*)key, NULL);
153 #elif defined(USE_OPENSSL_AES)
154 AES_set_encrypt_key((const unsigned char *)key, key_bits, &(cipher->key));
155 #else
156 cipher->nr = rijndaelKeySetupEnc(cipher->rk, (const unsigned char*)key,
157 key_bits);
158 #endif
159 cipher->counter0 = 0;
160 cipher->counter1 = 0;
161 cipher->pos = 0;
162 _aes_fill_buf(cipher);
165 /** Release storage held by <b>cipher</b>
167 void
168 aes_free_cipher(aes_cnt_cipher_t *cipher)
170 assert(cipher);
171 #ifdef USE_OPENSSL_EVP
172 EVP_CIPHER_CTX_cleanup(&cipher->key);
173 #endif
174 memset(cipher, 0, sizeof(cipher));
175 tor_free(cipher);
178 /** Encrypt <b>len</b> bytes from <b>input</b>, storing the result in
179 * <b>output</b>. Uses the key in <b>cipher</b>, and advances the counter
180 * by <b>len</b> bytes as it encrypts.
182 void
183 aes_crypt(aes_cnt_cipher_t *cipher, const char *input, size_t len,
184 char *output)
186 int c = cipher->pos;
187 if (!len) return;
189 while (1) {
190 do {
191 if (len-- == 0) { cipher->pos = c; return; }
192 *(output++) = *(input++) ^ cipher->buf[c];
193 } while (++c != 16);
194 cipher->pos = c = 0;
195 if (! ++cipher->counter0)
196 ++cipher->counter1;
197 _aes_fill_buf(cipher);
201 /** Return the current value of <b>cipher</b>'s counter. */
203 aes_get_counter(aes_cnt_cipher_t *cipher)
205 u64 counter = cipher->pos;
206 counter |= ((u64)cipher->counter0) << 4;
207 counter |= ((u64)cipher->counter1) << 36;
208 return counter;
211 /** Set <b>cipher</b>'s counter to <b>counter</b>. */
212 void
213 aes_set_counter(aes_cnt_cipher_t *cipher, u64 counter)
215 cipher->pos = (u8)(counter & 0x0f);
216 cipher->counter0 = (u32) ((counter >> 4) & 0xffffffff);
217 cipher->counter1 = (u32) (counter >> 36);
218 _aes_fill_buf(cipher);
221 /** Increment <b>cipher</b>'s counter by <b>delta</b>. */
222 void
223 aes_adjust_counter(aes_cnt_cipher_t *cipher, long delta)
225 u64 counter = aes_get_counter(cipher);
226 counter += delta;
227 aes_set_counter(cipher, counter);
230 #ifndef USE_OPENSSL_AES
231 /*======================================================================*/
232 /* From rijndael-alg-fst.c */
235 * rijndael-alg-fst.c
237 * @version 3.0 (December 2000)
239 * Optimised ANSI C code for the Rijndael cipher (now AES)
241 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
242 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
243 * @author Paulo Barreto <paulo.barreto@terra.com.br>
245 * This code is hereby placed in the public domain.
247 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
248 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
249 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
250 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
251 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
252 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
253 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
254 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
255 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
256 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
257 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
261 Te0[x] = S [x].[02, 01, 01, 03];
262 Te1[x] = S [x].[03, 02, 01, 01];
263 Te2[x] = S [x].[01, 03, 02, 01];
264 Te3[x] = S [x].[01, 01, 03, 02];
265 Te4[x] = S [x].[01, 01, 01, 01];
267 Td0[x] = Si[x].[0e, 09, 0d, 0b];
268 Td1[x] = Si[x].[0b, 0e, 09, 0d];
269 Td2[x] = Si[x].[0d, 0b, 0e, 09];
270 Td3[x] = Si[x].[09, 0d, 0b, 0e];
271 Td4[x] = Si[x].[01, 01, 01, 01];
274 static const u32 Te0[256] = {
275 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
276 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
277 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
278 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
279 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
280 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
281 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
282 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
283 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
284 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
285 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
286 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
287 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
288 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
289 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
290 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
291 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
292 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
293 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
294 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
295 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
296 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
297 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
298 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
299 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
300 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
301 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
302 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
303 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
304 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
305 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
306 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
307 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
308 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
309 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
310 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
311 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
312 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
313 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
314 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
315 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
316 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
317 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
318 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
319 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
320 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
321 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
322 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
323 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
324 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
325 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
326 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
327 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
328 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
329 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
330 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
331 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
332 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
333 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
334 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
335 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
336 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
337 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
338 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
340 static const u32 Te1[256] = {
341 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
342 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
343 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
344 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
345 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
346 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
347 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
348 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
349 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
350 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
351 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
352 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
353 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
354 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
355 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
356 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
357 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
358 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
359 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
360 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
361 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
362 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
363 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
364 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
365 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
366 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
367 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
368 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
369 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
370 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
371 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
372 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
373 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
374 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
375 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
376 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
377 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
378 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
379 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
380 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
381 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
382 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
383 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
384 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
385 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
386 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
387 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
388 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
389 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
390 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
391 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
392 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
393 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
394 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
395 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
396 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
397 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
398 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
399 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
400 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
401 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
402 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
403 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
404 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
406 static const u32 Te2[256] = {
407 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
408 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
409 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
410 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
411 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
412 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
413 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
414 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
415 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
416 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
417 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
418 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
419 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
420 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
421 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
422 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
423 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
424 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
425 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
426 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
427 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
428 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
429 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
430 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
431 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
432 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
433 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
434 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
435 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
436 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
437 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
438 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
439 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
440 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
441 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
442 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
443 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
444 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
445 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
446 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
447 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
448 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
449 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
450 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
451 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
452 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
453 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
454 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
455 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
456 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
457 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
458 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
459 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
460 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
461 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
462 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
463 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
464 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
465 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
466 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
467 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
468 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
469 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
470 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
472 static const u32 Te3[256] = {
474 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
475 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
476 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
477 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
478 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
479 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
480 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
481 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
482 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
483 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
484 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
485 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
486 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
487 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
488 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
489 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
490 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
491 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
492 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
493 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
494 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
495 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
496 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
497 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
498 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
499 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
500 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
501 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
502 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
503 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
504 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
505 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
506 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
507 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
508 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
509 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
510 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
511 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
512 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
513 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
514 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
515 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
516 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
517 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
518 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
519 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
520 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
521 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
522 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
523 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
524 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
525 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
526 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
527 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
528 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
529 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
530 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
531 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
532 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
533 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
534 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
535 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
536 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
537 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
539 static const u32 Te4[256] = {
540 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
541 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
542 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
543 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
544 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
545 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
546 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
547 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
548 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
549 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
550 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
551 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
552 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
553 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
554 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
555 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
556 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
557 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
558 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
559 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
560 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
561 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
562 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
563 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
564 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
565 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
566 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
567 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
568 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
569 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
570 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
571 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
572 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
573 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
574 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
575 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
576 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
577 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
578 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
579 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
580 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
581 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
582 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
583 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
584 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
585 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
586 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
587 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
588 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
589 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
590 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
591 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
592 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
593 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
594 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
595 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
596 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
597 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
598 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
599 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
600 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
601 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
602 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
603 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
606 static const u32 rcon[] = {
607 0x01000000, 0x02000000, 0x04000000, 0x08000000,
608 0x10000000, 0x20000000, 0x40000000, 0x80000000,
609 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
612 #define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrotr(x, 8) & 0xff00ff00)
614 #ifdef _MSC_VER
615 #define GETU32(p) SWAP(*((u32 *)(p)))
616 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); }
617 #else
618 #define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ ((u32)(pt)[2] << 8) ^ ((u32)(pt)[3]))
619 #define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
620 #endif
623 * Expand the cipher key into the encryption key schedule.
625 * @return the number of rounds for the given cipher key size.
628 rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits)
630 int i = 0;
631 u32 temp;
633 rk[0] = GETU32(cipherKey );
634 rk[1] = GETU32(cipherKey + 4);
635 rk[2] = GETU32(cipherKey + 8);
636 rk[3] = GETU32(cipherKey + 12);
637 if (keyBits == 128) {
638 for (;;) {
639 temp = rk[3];
640 rk[4] = rk[0] ^
641 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
642 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
643 (Te4[(temp ) & 0xff] & 0x0000ff00) ^
644 (Te4[(temp >> 24) ] & 0x000000ff) ^
645 rcon[i];
646 rk[5] = rk[1] ^ rk[4];
647 rk[6] = rk[2] ^ rk[5];
648 rk[7] = rk[3] ^ rk[6];
649 if (++i == 10) {
650 return 10;
652 rk += 4;
655 rk[4] = GETU32(cipherKey + 16);
656 rk[5] = GETU32(cipherKey + 20);
657 if (keyBits == 192) {
658 for (;;) {
659 temp = rk[ 5];
660 rk[ 6] = rk[ 0] ^
661 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
662 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
663 (Te4[(temp ) & 0xff] & 0x0000ff00) ^
664 (Te4[(temp >> 24) ] & 0x000000ff) ^
665 rcon[i];
666 rk[ 7] = rk[ 1] ^ rk[ 6];
667 rk[ 8] = rk[ 2] ^ rk[ 7];
668 rk[ 9] = rk[ 3] ^ rk[ 8];
669 if (++i == 8) {
670 return 12;
672 rk[10] = rk[ 4] ^ rk[ 9];
673 rk[11] = rk[ 5] ^ rk[10];
674 rk += 6;
677 rk[6] = GETU32(cipherKey + 24);
678 rk[7] = GETU32(cipherKey + 28);
679 if (keyBits == 256) {
680 for (;;) {
681 temp = rk[ 7];
682 rk[ 8] = rk[ 0] ^
683 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
684 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
685 (Te4[(temp ) & 0xff] & 0x0000ff00) ^
686 (Te4[(temp >> 24) ] & 0x000000ff) ^
687 rcon[i];
688 rk[ 9] = rk[ 1] ^ rk[ 8];
689 rk[10] = rk[ 2] ^ rk[ 9];
690 rk[11] = rk[ 3] ^ rk[10];
691 if (++i == 7) {
692 return 14;
694 temp = rk[11];
695 rk[12] = rk[ 4] ^
696 (Te4[(temp >> 24) ] & 0xff000000) ^
697 (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
698 (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
699 (Te4[(temp ) & 0xff] & 0x000000ff);
700 rk[13] = rk[ 5] ^ rk[12];
701 rk[14] = rk[ 6] ^ rk[13];
702 rk[15] = rk[ 7] ^ rk[14];
704 rk += 8;
707 return 0;
710 #ifdef USE_RIJNDAEL_COUNTER_OPTIMIZATION
711 void
712 rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, u32 ctr1, u32 ctr0, u8 ct[16])
713 #else
714 void
715 rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, const u8 pt[16], u8 ct[16])
716 #endif
718 u32 s0, s1, s2, s3, t0, t1, t2, t3;
719 #ifndef FULL_UNROLL
720 int r;
721 #endif /* ?FULL_UNROLL */
724 * map byte array block to cipher state
725 * and add initial round key:
727 #ifdef USE_RIJNDAEL_COUNTER_OPTIMIZATION
728 s0 = rk[0];
729 s1 = rk[1];
730 s2 = ctr1 ^ rk[2];
731 s3 = ctr0 ^ rk[3];
732 #else
733 s0 = GETU32(pt ) ^ rk[0];
734 s1 = GETU32(pt + 4) ^ rk[1];
735 s2 = GETU32(pt + 8) ^ rk[2];
736 s3 = GETU32(pt + 12) ^ rk[3];
737 #endif
739 #ifdef FULL_UNROLL
740 /* round 1: */
741 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4];
742 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5];
743 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6];
744 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7];
745 /* round 2: */
746 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8];
747 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9];
748 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10];
749 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11];
750 /* round 3: */
751 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12];
752 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13];
753 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14];
754 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[15];
755 /* round 4: */
756 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16];
757 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17];
758 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18];
759 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[19];
760 /* round 5: */
761 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[20];
762 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[21];
763 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[22];
764 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[23];
765 /* round 6: */
766 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[24];
767 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[25];
768 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[26];
769 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[27];
770 /* round 7: */
771 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[28];
772 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[29];
773 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[30];
774 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[31];
775 /* round 8: */
776 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[32];
777 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[33];
778 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[34];
779 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[35];
780 /* round 9: */
781 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[36];
782 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[37];
783 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[38];
784 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[39];
785 if (Nr > 10) {
786 /* round 10: */
787 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[40];
788 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[41];
789 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[42];
790 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[43];
791 /* round 11: */
792 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[44];
793 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[45];
794 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[46];
795 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[47];
796 if (Nr > 12) {
797 /* round 12: */
798 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[48];
799 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[49];
800 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[50];
801 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[51];
802 /* round 13: */
803 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[52];
804 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[53];
805 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[54];
806 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[55];
809 rk += Nr << 2;
810 #else /* !FULL_UNROLL */
812 * Nr - 1 full rounds:
814 r = Nr >> 1;
815 for (;;) {
816 t0 =
817 Te0[(s0 >> 24) ] ^
818 Te1[(s1 >> 16) & 0xff] ^
819 Te2[(s2 >> 8) & 0xff] ^
820 Te3[(s3 ) & 0xff] ^
821 rk[4];
822 t1 =
823 Te0[(s1 >> 24) ] ^
824 Te1[(s2 >> 16) & 0xff] ^
825 Te2[(s3 >> 8) & 0xff] ^
826 Te3[(s0 ) & 0xff] ^
827 rk[5];
828 t2 =
829 Te0[(s2 >> 24) ] ^
830 Te1[(s3 >> 16) & 0xff] ^
831 Te2[(s0 >> 8) & 0xff] ^
832 Te3[(s1 ) & 0xff] ^
833 rk[6];
834 t3 =
835 Te0[(s3 >> 24) ] ^
836 Te1[(s0 >> 16) & 0xff] ^
837 Te2[(s1 >> 8) & 0xff] ^
838 Te3[(s2 ) & 0xff] ^
839 rk[7];
841 rk += 8;
842 if (--r == 0) {
843 break;
846 s0 =
847 Te0[(t0 >> 24) ] ^
848 Te1[(t1 >> 16) & 0xff] ^
849 Te2[(t2 >> 8) & 0xff] ^
850 Te3[(t3 ) & 0xff] ^
851 rk[0];
852 s1 =
853 Te0[(t1 >> 24) ] ^
854 Te1[(t2 >> 16) & 0xff] ^
855 Te2[(t3 >> 8) & 0xff] ^
856 Te3[(t0 ) & 0xff] ^
857 rk[1];
858 s2 =
859 Te0[(t2 >> 24) ] ^
860 Te1[(t3 >> 16) & 0xff] ^
861 Te2[(t0 >> 8) & 0xff] ^
862 Te3[(t1 ) & 0xff] ^
863 rk[2];
864 s3 =
865 Te0[(t3 >> 24) ] ^
866 Te1[(t0 >> 16) & 0xff] ^
867 Te2[(t1 >> 8) & 0xff] ^
868 Te3[(t2 ) & 0xff] ^
869 rk[3];
871 #endif /* ?FULL_UNROLL */
873 * apply last round and
874 * map cipher state to byte array block:
876 s0 =
877 (Te4[(t0 >> 24) ] & 0xff000000) ^
878 (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
879 (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
880 (Te4[(t3 ) & 0xff] & 0x000000ff) ^
881 rk[0];
882 PUTU32(ct , s0);
883 s1 =
884 (Te4[(t1 >> 24) ] & 0xff000000) ^
885 (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
886 (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
887 (Te4[(t0 ) & 0xff] & 0x000000ff) ^
888 rk[1];
889 PUTU32(ct + 4, s1);
890 s2 =
891 (Te4[(t2 >> 24) ] & 0xff000000) ^
892 (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
893 (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
894 (Te4[(t1 ) & 0xff] & 0x000000ff) ^
895 rk[2];
896 PUTU32(ct + 8, s2);
897 s3 =
898 (Te4[(t3 >> 24) ] & 0xff000000) ^
899 (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
900 (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
901 (Te4[(t2 ) & 0xff] & 0x000000ff) ^
902 rk[3];
903 PUTU32(ct + 12, s3);
905 #endif