fix up contrib/checkOptionDocs.pl to match current practice (asciidoc manpage, no...
[tor.git] / src / common / aes.c
bloba17328317e05b3bf878807c4073121195e261189
1 /* Copyright (c) 2001, Matej Pfajfar.
2 * Copyright (c) 2001-2004, Roger Dingledine.
3 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
4 * Copyright (c) 2007-2010, The Tor Project, Inc. */
5 /* See LICENSE for licensing information */
7 /**
8 * \file aes.c
9 * \brief Implements the AES cipher (with 128-bit keys and blocks),
10 * and a counter-mode stream cipher on top of AES. This code is
11 * taken from the main Rijndael distribution. (We include this
12 * because many people are running older versions of OpenSSL without
13 * AES support.)
14 **/
16 #include "orconfig.h"
17 #include <openssl/opensslv.h>
18 #include <assert.h>
19 #include <stdlib.h>
20 #include <string.h>
21 #include "compat.h"
22 #include "aes.h"
23 #include "util.h"
24 #include "torlog.h"
26 /* We have 3 strategies for getting AES: Via OpenSSL's AES_encrypt function,
27 * via OpenSSL's EVP_EncryptUpdate function, or via the built-in AES
28 * implementation below. */
30 /** Defined iff we're using OpenSSL's AES functions for AES. */
31 #undef USE_OPENSSL_AES
32 /** Defined iff we're using OpenSSL's EVP code for AES. */
33 #undef USE_OPENSSL_EVP
34 /** Defined iff we're using Tor's internal AES implementation, defined
35 * below. */
36 #undef USE_BUILTIN_AES
38 /* Figure out our CPU type. We use this to pick an AES implementation.
39 * Macros are as listed at http://predef.sourceforge.net/prearch.html
41 #if (defined(i386) || defined(__i386__) || defined(__i386) || defined(_X86_) \
42 || defined(_M_IX86) || defined(__THW_INTEL__) || defined(__I86__))
43 # define CPU_IS_X86
44 #elif (defined(__amd64__) || defined(__amd64) || \
45 defined(__x86_64__) || defined(__x86_64) || \
46 defined(_M_X64))
47 # define CPU_IS_X86_64
48 #elif (defined(__ia64__) || defined(__ia64) || defined(_IA64) || \
49 defined(_M_IA64))
50 # define CPU_IS_IA64
51 #elif (defined(__sparc__) || defined(__sparc))
52 # define CPU_IS_SPARC
53 #elif (defined(__arm__) || defined (__TARGET_ARCH_ARM))
54 # define CPU_IS_ARM
55 #endif
57 /* Here we pick which to use, if none is force-defined. See
58 * http://archives.seul.org/or/dev/Feb-2007/msg00045.html
59 * for a summary of the most recent benchmarking results that led to this
60 * nutty decision tree.
62 #if (!defined(USE_BUILTIN_AES) && \
63 !defined(USE_OPENSSL_AES) && \
64 !defined(USE_OPENSSL_EVP))
66 /* OpenSSL 0.9.7 was the first to support AES. It was slower than our
67 * built-in implementation.
68 * OpenSSL 0.9.8 added assembly implementations for i386 and ia64.
69 * Either the i386 stuff isn't used for x86-64, or it isn't faster.
70 * OpenSSL 0.9.9 (not yet out) has added assembly implementations for
71 * x86_64 (aka amd64), sparc9, and arm
73 * Note: the "f" at the end of OpenSSL version numbers below means
74 * "release". */
75 # if defined(CPU_IS_X86) || defined(CPU_IS_IA64)
76 # if OPENSSL_VERSION_NUMBER >= 0x0090800fL
77 # define USE_OPENSSL_AES
78 # endif
79 # endif
81 # if defined(CPU_IS_X86_64) || defined(CPU_IS_ARM) || defined(CPU_IS_SPARC)
82 # if OPENSSL_VERSION_NUMBER >= 0x0090900fL
83 # define USE_OPENSSL_AES
84 # endif
85 # endif
87 /* Otherwise, use the built-in implementation below. */
88 # ifndef USE_OPENSSL_AES
89 # define USE_BUILTIN_AES
90 # endif
91 #endif /* endif need to pick a method */
93 /* Include OpenSSL headers as needed. */
94 #ifdef USE_OPENSSL_AES
95 # include <openssl/aes.h>
96 #endif
97 #ifdef USE_OPENSSL_EVP
98 # include <openssl/evp.h>
99 #endif
101 /* Figure out which AES optimizations to use. */
102 #ifdef USE_BUILTIN_AES
103 # define USE_RIJNDAEL_COUNTER_OPTIMIZATION
104 # if 0 && (defined(__powerpc__) || defined(__powerpc64__))
105 /* XXXX do more experimentation before concluding this is actually
106 * a good idea. */
107 # define FULL_UNROLL
108 # endif
109 #endif
111 /*======================================================================*/
112 /* From rijndael-alg-fst.h */
114 typedef uint64_t u64;
115 typedef uint32_t u32;
116 typedef uint8_t u8;
118 #ifdef USE_BUILTIN_AES
119 #define MAXNR 14
121 static int rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/],
122 const u8 cipherKey[], int keyBits);
123 #ifdef USE_RIJNDAEL_COUNTER_OPTIMIZATION
124 static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr,
125 u32 ctr3, u32 ctr2,
126 u32 ctr1, u32 ctr0, u8 ct[16]);
127 #else
128 static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr,
129 const u8 pt[16], u8 ct[16]);
130 #endif
131 #endif
133 /*======================================================================*/
134 /* Interface to AES code, and counter implementation */
136 /** Implements an AES counter-mode cipher. */
137 struct aes_cnt_cipher {
138 /** This next element (however it's defined) is the AES key. */
139 #if defined(USE_OPENSSL_EVP)
140 EVP_CIPHER_CTX key;
141 #elif defined(USE_OPENSSL_AES)
142 AES_KEY key;
143 #else
144 u32 rk[4*(MAXNR+1)];
145 int nr;
146 #endif
148 #if !defined(WORDS_BIGENDIAN) || defined(USE_RIJNDAEL_COUNTER_OPTIMIZATION)
149 #define USING_COUNTER_VARS
150 /** These four values, together, implement a 128-bit counter, with
151 * counter0 as the low-order word and counter3 as the high-order word. */
152 u32 counter3;
153 u32 counter2;
154 u32 counter1;
155 u32 counter0;
156 #endif
158 #ifndef USE_RIJNDAEL_COUNTER_OPTIMIZATION
159 #define USING_COUNTER_BUFS
160 union {
161 /** The counter, in big-endian order, as bytes. */
162 u8 buf[16];
163 /** The counter, in big-endian order, as big-endian words. Note that
164 * on big-endian platforms, this is redundant with counter3...0,
165 * so we just use these values instead. */
166 u32 buf32[4];
167 } ctr_buf;
168 #endif
169 /** The encrypted value of ctr_buf. */
170 u8 buf[16];
171 /** Our current stream position within buf. */
172 u8 pos;
175 #if !defined(USING_COUNTER_VARS)
176 #define COUNTER(c, n) ((c)->ctr_buf.buf32[3-(n)])
177 #else
178 #define COUNTER(c, n) ((c)->counter ## n)
179 #endif
182 * Helper function: set <b>cipher</b>'s internal buffer to the encrypted
183 * value of the current counter.
185 static INLINE void
186 _aes_fill_buf(aes_cnt_cipher_t *cipher)
188 /* We don't currently use OpenSSL's counter mode implementation because:
189 * 1) some versions have known bugs
190 * 2) its attitude towards IVs is not our own
191 * 3) changing the counter position was not trivial, last time I looked.
192 * None of these issues are insurmountable in principle.
194 #if defined(USE_BUILTIN_AES) && defined(USE_RIJNDAEL_COUNTER_OPTIMIZATION)
195 rijndaelEncrypt(cipher->rk, cipher->nr,
196 cipher->counter3, cipher->counter2,
197 cipher->counter1, cipher->counter0, cipher->buf);
198 #else
200 #if defined(USE_OPENSSL_EVP)
202 int outl=16, inl=16;
203 EVP_EncryptUpdate(&cipher->key, cipher->buf, &outl,
204 cipher->ctr_buf.buf, inl);
206 #elif defined(USE_OPENSSL_AES)
207 AES_encrypt(cipher->ctr_buf.buf, cipher->buf, &cipher->key);
208 #else
209 rijndaelEncrypt(cipher->rk, cipher->nr, cipher->ctr_buf.buf, cipher->buf);
210 #endif
211 #endif
215 * Return a newly allocated counter-mode AES128 cipher implementation.
217 aes_cnt_cipher_t*
218 aes_new_cipher(void)
220 aes_cnt_cipher_t* result = tor_malloc_zero(sizeof(aes_cnt_cipher_t));
222 return result;
225 /** Set the key of <b>cipher</b> to <b>key</b>, which is
226 * <b>key_bits</b> bits long (must be 128, 192, or 256). Also resets
227 * the counter to 0.
229 void
230 aes_set_key(aes_cnt_cipher_t *cipher, const char *key, int key_bits)
232 #if defined(USE_OPENSSL_EVP)
233 const EVP_CIPHER *c;
234 switch (key_bits) {
235 case 128: c = EVP_aes_128_ecb(); break;
236 case 192: c = EVP_aes_192_ecb(); break;
237 case 256: c = EVP_aes_256_ecb(); break;
238 default: tor_assert(0);
240 EVP_EncryptInit(&cipher->key, c, (const unsigned char*)key, NULL);
241 #elif defined(USE_OPENSSL_AES)
242 AES_set_encrypt_key((const unsigned char *)key, key_bits, &(cipher->key));
243 #else
244 cipher->nr = rijndaelKeySetupEnc(cipher->rk, (const unsigned char*)key,
245 key_bits);
246 #endif
247 #ifdef USING_COUNTER_VARS
248 cipher->counter0 = 0;
249 cipher->counter1 = 0;
250 cipher->counter2 = 0;
251 cipher->counter3 = 0;
252 #endif
253 #ifdef USING_COUNTER_BUFS
254 memset(cipher->ctr_buf.buf, 0, sizeof(cipher->ctr_buf.buf));
255 #endif
257 cipher->pos = 0;
258 _aes_fill_buf(cipher);
261 /** Release storage held by <b>cipher</b>
263 void
264 aes_free_cipher(aes_cnt_cipher_t *cipher)
266 if (!cipher)
267 return;
268 #ifdef USE_OPENSSL_EVP
269 EVP_CIPHER_CTX_cleanup(&cipher->key);
270 #endif
271 memset(cipher, 0, sizeof(aes_cnt_cipher_t));
272 tor_free(cipher);
275 #if defined(USING_COUNTER_VARS) && defined(USING_COUNTER_BUFS)
276 #define UPDATE_CTR_BUF(c, n) STMT_BEGIN \
277 (c)->ctr_buf.buf32[3-(n)] = htonl((c)->counter ## n); \
278 STMT_END
279 #else
280 #define UPDATE_CTR_BUF(c, n)
281 #endif
283 /** Encrypt <b>len</b> bytes from <b>input</b>, storing the result in
284 * <b>output</b>. Uses the key in <b>cipher</b>, and advances the counter
285 * by <b>len</b> bytes as it encrypts.
287 void
288 aes_crypt(aes_cnt_cipher_t *cipher, const char *input, size_t len,
289 char *output)
292 /* XXXX This function is up to 5% of our runtime in some profiles;
293 * we should look into unrolling some of the loops; taking advantage
294 * of alignment, using a bigger buffer, and so on. Not till after 0.1.2.x,
295 * though. */
296 int c = cipher->pos;
297 if (PREDICT_UNLIKELY(!len)) return;
299 while (1) {
300 do {
301 if (len-- == 0) { cipher->pos = c; return; }
302 *(output++) = *(input++) ^ cipher->buf[c];
303 } while (++c != 16);
304 cipher->pos = c = 0;
305 if (PREDICT_UNLIKELY(! ++COUNTER(cipher, 0))) {
306 if (PREDICT_UNLIKELY(! ++COUNTER(cipher, 1))) {
307 if (PREDICT_UNLIKELY(! ++COUNTER(cipher, 2))) {
308 ++COUNTER(cipher, 3);
309 UPDATE_CTR_BUF(cipher, 3);
311 UPDATE_CTR_BUF(cipher, 2);
313 UPDATE_CTR_BUF(cipher, 1);
315 UPDATE_CTR_BUF(cipher, 0);
316 _aes_fill_buf(cipher);
320 /** Encrypt <b>len</b> bytes from <b>input</b>, storing the results in place.
321 * Uses the key in <b>cipher</b>, and advances the counter by <b>len</b> bytes
322 * as it encrypts.
324 void
325 aes_crypt_inplace(aes_cnt_cipher_t *cipher, char *data, size_t len)
328 /* XXXX This function is up to 5% of our runtime in some profiles;
329 * we should look into unrolling some of the loops; taking advantage
330 * of alignment, using a bigger buffer, and so on. Not till after 0.1.2.x,
331 * though. */
332 int c = cipher->pos;
333 if (PREDICT_UNLIKELY(!len)) return;
335 while (1) {
336 do {
337 if (len-- == 0) { cipher->pos = c; return; }
338 *(data++) ^= cipher->buf[c];
339 } while (++c != 16);
340 cipher->pos = c = 0;
341 if (PREDICT_UNLIKELY(! ++COUNTER(cipher, 0))) {
342 if (PREDICT_UNLIKELY(! ++COUNTER(cipher, 1))) {
343 if (PREDICT_UNLIKELY(! ++COUNTER(cipher, 2))) {
344 ++COUNTER(cipher, 3);
345 UPDATE_CTR_BUF(cipher, 3);
347 UPDATE_CTR_BUF(cipher, 2);
349 UPDATE_CTR_BUF(cipher, 1);
351 UPDATE_CTR_BUF(cipher, 0);
352 _aes_fill_buf(cipher);
356 /** Reset the 128-bit counter of <b>cipher</b> to the 16-bit big-endian value
357 * in <b>iv</b>. */
358 void
359 aes_set_iv(aes_cnt_cipher_t *cipher, const char *iv)
361 #ifdef USING_COUNTER_VARS
362 cipher->counter3 = ntohl(get_uint32(iv));
363 cipher->counter2 = ntohl(get_uint32(iv+4));
364 cipher->counter1 = ntohl(get_uint32(iv+8));
365 cipher->counter0 = ntohl(get_uint32(iv+12));
366 #endif
367 cipher->pos = 0;
368 #ifndef USE_RIJNDAEL_COUNTER_OPTIMIZATION
369 memcpy(cipher->ctr_buf.buf, iv, 16);
370 #endif
372 _aes_fill_buf(cipher);
375 #ifdef USE_BUILTIN_AES
376 /*======================================================================*/
377 /* From rijndael-alg-fst.c */
380 * rijndael-alg-fst.c
382 * @version 3.0 (December 2000)
384 * Optimized ANSI C code for the Rijndael cipher (now AES)
386 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
387 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
388 * @author Paulo Barreto <paulo.barreto@terra.com.br>
390 * This code is hereby placed in the public domain.
392 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
393 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
394 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
395 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
396 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
397 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
398 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
399 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
400 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
401 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
402 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
406 Te0[x] = S [x].[02, 01, 01, 03];
407 Te1[x] = S [x].[03, 02, 01, 01];
408 Te2[x] = S [x].[01, 03, 02, 01];
409 Te3[x] = S [x].[01, 01, 03, 02];
410 Te4[x] = S [x].[01, 01, 01, 01];
412 Td0[x] = Si[x].[0e, 09, 0d, 0b];
413 Td1[x] = Si[x].[0b, 0e, 09, 0d];
414 Td2[x] = Si[x].[0d, 0b, 0e, 09];
415 Td3[x] = Si[x].[09, 0d, 0b, 0e];
416 Td4[x] = Si[x].[01, 01, 01, 01];
419 static const u32 Te0[256] = {
420 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
421 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
422 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
423 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
424 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
425 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
426 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
427 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
428 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
429 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
430 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
431 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
432 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
433 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
434 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
435 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
436 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
437 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
438 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
439 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
440 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
441 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
442 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
443 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
444 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
445 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
446 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
447 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
448 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
449 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
450 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
451 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
452 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
453 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
454 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
455 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
456 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
457 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
458 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
459 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
460 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
461 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
462 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
463 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
464 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
465 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
466 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
467 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
468 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
469 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
470 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
471 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
472 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
473 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
474 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
475 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
476 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
477 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
478 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
479 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
480 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
481 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
482 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
483 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
485 static const u32 Te1[256] = {
486 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
487 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
488 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
489 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
490 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
491 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
492 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
493 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
494 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
495 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
496 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
497 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
498 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
499 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
500 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
501 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
502 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
503 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
504 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
505 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
506 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
507 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
508 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
509 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
510 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
511 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
512 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
513 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
514 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
515 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
516 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
517 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
518 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
519 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
520 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
521 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
522 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
523 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
524 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
525 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
526 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
527 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
528 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
529 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
530 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
531 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
532 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
533 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
534 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
535 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
536 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
537 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
538 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
539 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
540 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
541 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
542 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
543 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
544 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
545 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
546 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
547 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
548 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
549 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
551 static const u32 Te2[256] = {
552 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
553 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
554 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
555 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
556 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
557 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
558 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
559 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
560 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
561 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
562 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
563 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
564 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
565 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
566 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
567 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
568 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
569 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
570 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
571 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
572 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
573 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
574 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
575 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
576 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
577 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
578 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
579 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
580 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
581 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
582 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
583 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
584 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
585 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
586 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
587 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
588 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
589 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
590 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
591 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
592 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
593 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
594 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
595 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
596 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
597 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
598 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
599 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
600 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
601 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
602 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
603 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
604 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
605 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
606 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
607 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
608 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
609 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
610 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
611 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
612 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
613 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
614 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
615 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
617 static const u32 Te3[256] = {
619 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
620 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
621 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
622 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
623 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
624 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
625 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
626 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
627 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
628 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
629 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
630 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
631 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
632 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
633 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
634 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
635 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
636 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
637 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
638 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
639 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
640 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
641 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
642 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
643 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
644 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
645 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
646 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
647 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
648 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
649 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
650 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
651 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
652 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
653 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
654 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
655 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
656 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
657 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
658 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
659 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
660 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
661 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
662 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
663 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
664 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
665 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
666 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
667 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
668 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
669 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
670 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
671 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
672 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
673 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
674 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
675 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
676 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
677 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
678 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
679 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
680 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
681 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
682 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
684 static const u32 Te4[256] = {
685 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
686 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
687 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
688 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
689 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
690 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
691 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
692 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
693 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
694 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
695 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
696 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
697 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
698 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
699 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
700 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
701 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
702 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
703 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
704 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
705 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
706 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
707 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
708 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
709 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
710 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
711 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
712 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
713 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
714 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
715 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
716 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
717 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
718 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
719 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
720 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
721 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
722 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
723 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
724 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
725 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
726 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
727 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
728 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
729 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
730 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
731 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
732 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
733 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
734 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
735 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
736 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
737 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
738 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
739 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
740 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
741 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
742 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
743 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
744 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
745 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
746 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
747 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
748 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
751 static const u32 rcon[] = {
752 0x01000000, 0x02000000, 0x04000000, 0x08000000,
753 0x10000000, 0x20000000, 0x40000000, 0x80000000,
754 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
757 #define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrotr(x, 8) & 0xff00ff00)
759 #ifdef _MSC_VER
760 #define GETU32(p) SWAP(*((u32 *)(p)))
761 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); }
762 #else
763 #define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ ((u32)(pt)[2] << 8) ^ ((u32)(pt)[3]))
764 #define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
765 #endif
768 * Expand the cipher key into the encryption key schedule.
770 * @return the number of rounds for the given cipher key size.
772 static int
773 rijndaelKeySetupEnc(u32 rk[/*4*(Nr + 1)*/], const u8 cipherKey[], int keyBits)
775 int i = 0;
776 u32 temp;
778 rk[0] = GETU32(cipherKey );
779 rk[1] = GETU32(cipherKey + 4);
780 rk[2] = GETU32(cipherKey + 8);
781 rk[3] = GETU32(cipherKey + 12);
782 if (keyBits == 128) {
783 for (;;) {
784 temp = rk[3];
785 rk[4] = rk[0] ^
786 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
787 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
788 (Te4[(temp ) & 0xff] & 0x0000ff00) ^
789 (Te4[(temp >> 24) ] & 0x000000ff) ^
790 rcon[i];
791 rk[5] = rk[1] ^ rk[4];
792 rk[6] = rk[2] ^ rk[5];
793 rk[7] = rk[3] ^ rk[6];
794 if (++i == 10) {
795 return 10;
797 rk += 4;
800 rk[4] = GETU32(cipherKey + 16);
801 rk[5] = GETU32(cipherKey + 20);
802 if (keyBits == 192) {
803 for (;;) {
804 temp = rk[ 5];
805 rk[ 6] = rk[ 0] ^
806 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
807 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
808 (Te4[(temp ) & 0xff] & 0x0000ff00) ^
809 (Te4[(temp >> 24) ] & 0x000000ff) ^
810 rcon[i];
811 rk[ 7] = rk[ 1] ^ rk[ 6];
812 rk[ 8] = rk[ 2] ^ rk[ 7];
813 rk[ 9] = rk[ 3] ^ rk[ 8];
814 if (++i == 8) {
815 return 12;
817 rk[10] = rk[ 4] ^ rk[ 9];
818 rk[11] = rk[ 5] ^ rk[10];
819 rk += 6;
822 rk[6] = GETU32(cipherKey + 24);
823 rk[7] = GETU32(cipherKey + 28);
824 if (keyBits == 256) {
825 for (;;) {
826 temp = rk[ 7];
827 rk[ 8] = rk[ 0] ^
828 (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
829 (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
830 (Te4[(temp ) & 0xff] & 0x0000ff00) ^
831 (Te4[(temp >> 24) ] & 0x000000ff) ^
832 rcon[i];
833 rk[ 9] = rk[ 1] ^ rk[ 8];
834 rk[10] = rk[ 2] ^ rk[ 9];
835 rk[11] = rk[ 3] ^ rk[10];
836 if (++i == 7) {
837 return 14;
839 temp = rk[11];
840 rk[12] = rk[ 4] ^
841 (Te4[(temp >> 24) ] & 0xff000000) ^
842 (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
843 (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
844 (Te4[(temp ) & 0xff] & 0x000000ff);
845 rk[13] = rk[ 5] ^ rk[12];
846 rk[14] = rk[ 6] ^ rk[13];
847 rk[15] = rk[ 7] ^ rk[14];
849 rk += 8;
852 return 0;
855 #ifdef USE_RIJNDAEL_COUNTER_OPTIMIZATION
856 static void
857 rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, u32 ctr3, u32 ctr2, u32 ctr1, u32 ctr0, u8 ct[16])
858 #else
859 static void
860 rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, const u8 pt[16], u8 ct[16])
861 #endif
863 u32 s0, s1, s2, s3, t0, t1, t2, t3;
864 #ifndef FULL_UNROLL
865 int r;
866 #endif /* ?FULL_UNROLL */
869 * map byte array block to cipher state
870 * and add initial round key:
872 #ifdef USE_RIJNDAEL_COUNTER_OPTIMIZATION
873 s0 = ctr3 ^ rk[0];
874 s1 = ctr2 ^ rk[1];
875 s2 = ctr1 ^ rk[2];
876 s3 = ctr0 ^ rk[3];
877 #else
878 s0 = GETU32(pt ) ^ rk[0];
879 s1 = GETU32(pt + 4) ^ rk[1];
880 s2 = GETU32(pt + 8) ^ rk[2];
881 s3 = GETU32(pt + 12) ^ rk[3];
882 #endif
884 #ifdef FULL_UNROLL
885 /* round 1: */
886 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4];
887 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5];
888 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6];
889 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7];
890 /* round 2: */
891 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8];
892 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9];
893 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10];
894 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11];
895 /* round 3: */
896 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12];
897 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13];
898 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14];
899 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[15];
900 /* round 4: */
901 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16];
902 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17];
903 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18];
904 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[19];
905 /* round 5: */
906 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[20];
907 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[21];
908 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[22];
909 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[23];
910 /* round 6: */
911 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[24];
912 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[25];
913 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[26];
914 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[27];
915 /* round 7: */
916 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[28];
917 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[29];
918 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[30];
919 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[31];
920 /* round 8: */
921 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[32];
922 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[33];
923 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[34];
924 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[35];
925 /* round 9: */
926 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[36];
927 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[37];
928 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[38];
929 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[39];
930 if (Nr > 10) {
931 /* round 10: */
932 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[40];
933 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[41];
934 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[42];
935 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[43];
936 /* round 11: */
937 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[44];
938 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[45];
939 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[46];
940 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[47];
941 if (Nr > 12) {
942 /* round 12: */
943 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[48];
944 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[49];
945 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[50];
946 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[51];
947 /* round 13: */
948 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[52];
949 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[53];
950 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[54];
951 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[55];
954 rk += Nr << 2;
955 #else /* !FULL_UNROLL */
957 * Nr - 1 full rounds:
959 r = Nr >> 1;
960 for (;;) {
961 t0 =
962 Te0[(s0 >> 24) ] ^
963 Te1[(s1 >> 16) & 0xff] ^
964 Te2[(s2 >> 8) & 0xff] ^
965 Te3[(s3 ) & 0xff] ^
966 rk[4];
967 t1 =
968 Te0[(s1 >> 24) ] ^
969 Te1[(s2 >> 16) & 0xff] ^
970 Te2[(s3 >> 8) & 0xff] ^
971 Te3[(s0 ) & 0xff] ^
972 rk[5];
973 t2 =
974 Te0[(s2 >> 24) ] ^
975 Te1[(s3 >> 16) & 0xff] ^
976 Te2[(s0 >> 8) & 0xff] ^
977 Te3[(s1 ) & 0xff] ^
978 rk[6];
979 t3 =
980 Te0[(s3 >> 24) ] ^
981 Te1[(s0 >> 16) & 0xff] ^
982 Te2[(s1 >> 8) & 0xff] ^
983 Te3[(s2 ) & 0xff] ^
984 rk[7];
986 rk += 8;
987 if (--r == 0) {
988 break;
991 s0 =
992 Te0[(t0 >> 24) ] ^
993 Te1[(t1 >> 16) & 0xff] ^
994 Te2[(t2 >> 8) & 0xff] ^
995 Te3[(t3 ) & 0xff] ^
996 rk[0];
997 s1 =
998 Te0[(t1 >> 24) ] ^
999 Te1[(t2 >> 16) & 0xff] ^
1000 Te2[(t3 >> 8) & 0xff] ^
1001 Te3[(t0 ) & 0xff] ^
1002 rk[1];
1003 s2 =
1004 Te0[(t2 >> 24) ] ^
1005 Te1[(t3 >> 16) & 0xff] ^
1006 Te2[(t0 >> 8) & 0xff] ^
1007 Te3[(t1 ) & 0xff] ^
1008 rk[2];
1009 s3 =
1010 Te0[(t3 >> 24) ] ^
1011 Te1[(t0 >> 16) & 0xff] ^
1012 Te2[(t1 >> 8) & 0xff] ^
1013 Te3[(t2 ) & 0xff] ^
1014 rk[3];
1016 #endif /* ?FULL_UNROLL */
1018 * apply last round and
1019 * map cipher state to byte array block:
1021 s0 =
1022 (Te4[(t0 >> 24) ] & 0xff000000) ^
1023 (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1024 (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
1025 (Te4[(t3 ) & 0xff] & 0x000000ff) ^
1026 rk[0];
1027 PUTU32(ct , s0);
1028 s1 =
1029 (Te4[(t1 >> 24) ] & 0xff000000) ^
1030 (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1031 (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
1032 (Te4[(t0 ) & 0xff] & 0x000000ff) ^
1033 rk[1];
1034 PUTU32(ct + 4, s1);
1035 s2 =
1036 (Te4[(t2 >> 24) ] & 0xff000000) ^
1037 (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1038 (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
1039 (Te4[(t1 ) & 0xff] & 0x000000ff) ^
1040 rk[2];
1041 PUTU32(ct + 8, s2);
1042 s3 =
1043 (Te4[(t3 >> 24) ] & 0xff000000) ^
1044 (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1045 (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
1046 (Te4[(t2 ) & 0xff] & 0x000000ff) ^
1047 rk[3];
1048 PUTU32(ct + 12, s3);
1050 #endif
1052 #ifdef AES_BENCHMARK
1054 main(int c, char **v)
1056 int i;
1057 char blob[509]; /* the size of a cell payload. */
1058 char blob_out[509];
1059 aes_cnt_cipher_t *cipher = aes_new_cipher();
1060 aes_set_key(cipher, "aesbenchmarkkey!", 128);
1061 memset(blob, 'z', sizeof(blob));
1063 for (i=0;i<1000000; ++i) {
1064 aes_crypt(cipher, blob, sizeof(blob), blob_out);
1066 return 0;
1068 #endif