qemu/crypto/aes.c
<<
>>
Prefs
   1/**
   2 *
   3 * aes.c - integrated in QEMU by Fabrice Bellard from the OpenSSL project.
   4 */
   5/*
   6 * rijndael-alg-fst.c
   7 *
   8 * @version 3.0 (December 2000)
   9 *
  10 * Optimised ANSI C code for the Rijndael cipher (now AES)
  11 *
  12 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
  13 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
  14 * @author Paulo Barreto <paulo.barreto@terra.com.br>
  15 *
  16 * This code is hereby placed in the public domain.
  17 *
  18 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
  19 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  20 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  21 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
  22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  25 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  26 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  27 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
  28 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  29 */
  30#include "qemu/osdep.h"
  31#include "qemu/bswap.h"
  32#include "qemu/bitops.h"
  33#include "crypto/aes.h"
  34#include "crypto/aes-round.h"
  35
  36typedef uint32_t u32;
  37typedef uint8_t u8;
  38
  39/* This controls loop-unrolling in aes_core.c */
  40#undef FULL_UNROLL
  41# define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ ((u32)(pt)[2] <<  8) ^ ((u32)(pt)[3]))
  42# define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >>  8); (ct)[3] = (u8)(st); }
  43
  44const uint8_t AES_sbox[256] = {
  45    0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5,
  46    0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76,
  47    0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0,
  48    0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0,
  49    0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F, 0xF7, 0xCC,
  50    0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15,
  51    0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A,
  52    0x07, 0x12, 0x80, 0xE2, 0xEB, 0x27, 0xB2, 0x75,
  53    0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0,
  54    0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84,
  55    0x53, 0xD1, 0x00, 0xED, 0x20, 0xFC, 0xB1, 0x5B,
  56    0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF,
  57    0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85,
  58    0x45, 0xF9, 0x02, 0x7F, 0x50, 0x3C, 0x9F, 0xA8,
  59    0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5,
  60    0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2,
  61    0xCD, 0x0C, 0x13, 0xEC, 0x5F, 0x97, 0x44, 0x17,
  62    0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73,
  63    0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88,
  64    0x46, 0xEE, 0xB8, 0x14, 0xDE, 0x5E, 0x0B, 0xDB,
  65    0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C,
  66    0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79,
  67    0xE7, 0xC8, 0x37, 0x6D, 0x8D, 0xD5, 0x4E, 0xA9,
  68    0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08,
  69    0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6,
  70    0xE8, 0xDD, 0x74, 0x1F, 0x4B, 0xBD, 0x8B, 0x8A,
  71    0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E,
  72    0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E,
  73    0xE1, 0xF8, 0x98, 0x11, 0x69, 0xD9, 0x8E, 0x94,
  74    0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF,
  75    0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68,
  76    0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16,
  77};
  78
  79const uint8_t AES_isbox[256] = {
  80    0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38,
  81    0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB,
  82    0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87,
  83    0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB,
  84    0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2, 0x23, 0x3D,
  85    0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
  86    0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2,
  87    0x76, 0x5B, 0xA2, 0x49, 0x6D, 0x8B, 0xD1, 0x25,
  88    0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16,
  89    0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92,
  90    0x6C, 0x70, 0x48, 0x50, 0xFD, 0xED, 0xB9, 0xDA,
  91    0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84,
  92    0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A,
  93    0xF7, 0xE4, 0x58, 0x05, 0xB8, 0xB3, 0x45, 0x06,
  94    0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02,
  95    0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B,
  96    0x3A, 0x91, 0x11, 0x41, 0x4F, 0x67, 0xDC, 0xEA,
  97    0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73,
  98    0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85,
  99    0xE2, 0xF9, 0x37, 0xE8, 0x1C, 0x75, 0xDF, 0x6E,
 100    0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89,
 101    0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B,
 102    0xFC, 0x56, 0x3E, 0x4B, 0xC6, 0xD2, 0x79, 0x20,
 103    0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4,
 104    0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31,
 105    0xB1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xEC, 0x5F,
 106    0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D,
 107    0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF,
 108    0xA0, 0xE0, 0x3B, 0x4D, 0xAE, 0x2A, 0xF5, 0xB0,
 109    0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
 110    0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26,
 111    0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D,
 112};
 113
 114/* AES ShiftRows, for complete unrolling. */
 115#define AES_SH(X)   (((X) * 5) & 15)
 116
 117/* AES InvShiftRows, for complete unrolling. */
 118#define AES_ISH(X)  (((X) * 13) & 15)
 119
 120/*
 121 * MixColumns lookup table, for use with rot32.
 122 */
 123static const uint32_t AES_mc_rot[256] = {
 124    0x00000000, 0x03010102, 0x06020204, 0x05030306,
 125    0x0c040408, 0x0f05050a, 0x0a06060c, 0x0907070e,
 126    0x18080810, 0x1b090912, 0x1e0a0a14, 0x1d0b0b16,
 127    0x140c0c18, 0x170d0d1a, 0x120e0e1c, 0x110f0f1e,
 128    0x30101020, 0x33111122, 0x36121224, 0x35131326,
 129    0x3c141428, 0x3f15152a, 0x3a16162c, 0x3917172e,
 130    0x28181830, 0x2b191932, 0x2e1a1a34, 0x2d1b1b36,
 131    0x241c1c38, 0x271d1d3a, 0x221e1e3c, 0x211f1f3e,
 132    0x60202040, 0x63212142, 0x66222244, 0x65232346,
 133    0x6c242448, 0x6f25254a, 0x6a26264c, 0x6927274e,
 134    0x78282850, 0x7b292952, 0x7e2a2a54, 0x7d2b2b56,
 135    0x742c2c58, 0x772d2d5a, 0x722e2e5c, 0x712f2f5e,
 136    0x50303060, 0x53313162, 0x56323264, 0x55333366,
 137    0x5c343468, 0x5f35356a, 0x5a36366c, 0x5937376e,
 138    0x48383870, 0x4b393972, 0x4e3a3a74, 0x4d3b3b76,
 139    0x443c3c78, 0x473d3d7a, 0x423e3e7c, 0x413f3f7e,
 140    0xc0404080, 0xc3414182, 0xc6424284, 0xc5434386,
 141    0xcc444488, 0xcf45458a, 0xca46468c, 0xc947478e,
 142    0xd8484890, 0xdb494992, 0xde4a4a94, 0xdd4b4b96,
 143    0xd44c4c98, 0xd74d4d9a, 0xd24e4e9c, 0xd14f4f9e,
 144    0xf05050a0, 0xf35151a2, 0xf65252a4, 0xf55353a6,
 145    0xfc5454a8, 0xff5555aa, 0xfa5656ac, 0xf95757ae,
 146    0xe85858b0, 0xeb5959b2, 0xee5a5ab4, 0xed5b5bb6,
 147    0xe45c5cb8, 0xe75d5dba, 0xe25e5ebc, 0xe15f5fbe,
 148    0xa06060c0, 0xa36161c2, 0xa66262c4, 0xa56363c6,
 149    0xac6464c8, 0xaf6565ca, 0xaa6666cc, 0xa96767ce,
 150    0xb86868d0, 0xbb6969d2, 0xbe6a6ad4, 0xbd6b6bd6,
 151    0xb46c6cd8, 0xb76d6dda, 0xb26e6edc, 0xb16f6fde,
 152    0x907070e0, 0x937171e2, 0x967272e4, 0x957373e6,
 153    0x9c7474e8, 0x9f7575ea, 0x9a7676ec, 0x997777ee,
 154    0x887878f0, 0x8b7979f2, 0x8e7a7af4, 0x8d7b7bf6,
 155    0x847c7cf8, 0x877d7dfa, 0x827e7efc, 0x817f7ffe,
 156    0x9b80801b, 0x98818119, 0x9d82821f, 0x9e83831d,
 157    0x97848413, 0x94858511, 0x91868617, 0x92878715,
 158    0x8388880b, 0x80898909, 0x858a8a0f, 0x868b8b0d,
 159    0x8f8c8c03, 0x8c8d8d01, 0x898e8e07, 0x8a8f8f05,
 160    0xab90903b, 0xa8919139, 0xad92923f, 0xae93933d,
 161    0xa7949433, 0xa4959531, 0xa1969637, 0xa2979735,
 162    0xb398982b, 0xb0999929, 0xb59a9a2f, 0xb69b9b2d,
 163    0xbf9c9c23, 0xbc9d9d21, 0xb99e9e27, 0xba9f9f25,
 164    0xfba0a05b, 0xf8a1a159, 0xfda2a25f, 0xfea3a35d,
 165    0xf7a4a453, 0xf4a5a551, 0xf1a6a657, 0xf2a7a755,
 166    0xe3a8a84b, 0xe0a9a949, 0xe5aaaa4f, 0xe6abab4d,
 167    0xefacac43, 0xecadad41, 0xe9aeae47, 0xeaafaf45,
 168    0xcbb0b07b, 0xc8b1b179, 0xcdb2b27f, 0xceb3b37d,
 169    0xc7b4b473, 0xc4b5b571, 0xc1b6b677, 0xc2b7b775,
 170    0xd3b8b86b, 0xd0b9b969, 0xd5baba6f, 0xd6bbbb6d,
 171    0xdfbcbc63, 0xdcbdbd61, 0xd9bebe67, 0xdabfbf65,
 172    0x5bc0c09b, 0x58c1c199, 0x5dc2c29f, 0x5ec3c39d,
 173    0x57c4c493, 0x54c5c591, 0x51c6c697, 0x52c7c795,
 174    0x43c8c88b, 0x40c9c989, 0x45caca8f, 0x46cbcb8d,
 175    0x4fcccc83, 0x4ccdcd81, 0x49cece87, 0x4acfcf85,
 176    0x6bd0d0bb, 0x68d1d1b9, 0x6dd2d2bf, 0x6ed3d3bd,
 177    0x67d4d4b3, 0x64d5d5b1, 0x61d6d6b7, 0x62d7d7b5,
 178    0x73d8d8ab, 0x70d9d9a9, 0x75dadaaf, 0x76dbdbad,
 179    0x7fdcdca3, 0x7cdddda1, 0x79dedea7, 0x7adfdfa5,
 180    0x3be0e0db, 0x38e1e1d9, 0x3de2e2df, 0x3ee3e3dd,
 181    0x37e4e4d3, 0x34e5e5d1, 0x31e6e6d7, 0x32e7e7d5,
 182    0x23e8e8cb, 0x20e9e9c9, 0x25eaeacf, 0x26ebebcd,
 183    0x2fececc3, 0x2cededc1, 0x29eeeec7, 0x2aefefc5,
 184    0x0bf0f0fb, 0x08f1f1f9, 0x0df2f2ff, 0x0ef3f3fd,
 185    0x07f4f4f3, 0x04f5f5f1, 0x01f6f6f7, 0x02f7f7f5,
 186    0x13f8f8eb, 0x10f9f9e9, 0x15fafaef, 0x16fbfbed,
 187    0x1ffcfce3, 0x1cfdfde1, 0x19fefee7, 0x1affffe5,
 188};
 189
 190/*
 191 * Inverse MixColumns lookup table, for use with rot32.
 192 */
 193static const uint32_t AES_imc_rot[256] = {
 194    0x00000000, 0x0b0d090e, 0x161a121c, 0x1d171b12,
 195    0x2c342438, 0x27392d36, 0x3a2e3624, 0x31233f2a,
 196    0x58684870, 0x5365417e, 0x4e725a6c, 0x457f5362,
 197    0x745c6c48, 0x7f516546, 0x62467e54, 0x694b775a,
 198    0xb0d090e0, 0xbbdd99ee, 0xa6ca82fc, 0xadc78bf2,
 199    0x9ce4b4d8, 0x97e9bdd6, 0x8afea6c4, 0x81f3afca,
 200    0xe8b8d890, 0xe3b5d19e, 0xfea2ca8c, 0xf5afc382,
 201    0xc48cfca8, 0xcf81f5a6, 0xd296eeb4, 0xd99be7ba,
 202    0x7bbb3bdb, 0x70b632d5, 0x6da129c7, 0x66ac20c9,
 203    0x578f1fe3, 0x5c8216ed, 0x41950dff, 0x4a9804f1,
 204    0x23d373ab, 0x28de7aa5, 0x35c961b7, 0x3ec468b9,
 205    0x0fe75793, 0x04ea5e9d, 0x19fd458f, 0x12f04c81,
 206    0xcb6bab3b, 0xc066a235, 0xdd71b927, 0xd67cb029,
 207    0xe75f8f03, 0xec52860d, 0xf1459d1f, 0xfa489411,
 208    0x9303e34b, 0x980eea45, 0x8519f157, 0x8e14f859,
 209    0xbf37c773, 0xb43ace7d, 0xa92dd56f, 0xa220dc61,
 210    0xf66d76ad, 0xfd607fa3, 0xe07764b1, 0xeb7a6dbf,
 211    0xda595295, 0xd1545b9b, 0xcc434089, 0xc74e4987,
 212    0xae053edd, 0xa50837d3, 0xb81f2cc1, 0xb31225cf,
 213    0x82311ae5, 0x893c13eb, 0x942b08f9, 0x9f2601f7,
 214    0x46bde64d, 0x4db0ef43, 0x50a7f451, 0x5baafd5f,
 215    0x6a89c275, 0x6184cb7b, 0x7c93d069, 0x779ed967,
 216    0x1ed5ae3d, 0x15d8a733, 0x08cfbc21, 0x03c2b52f,
 217    0x32e18a05, 0x39ec830b, 0x24fb9819, 0x2ff69117,
 218    0x8dd64d76, 0x86db4478, 0x9bcc5f6a, 0x90c15664,
 219    0xa1e2694e, 0xaaef6040, 0xb7f87b52, 0xbcf5725c,
 220    0xd5be0506, 0xdeb30c08, 0xc3a4171a, 0xc8a91e14,
 221    0xf98a213e, 0xf2872830, 0xef903322, 0xe49d3a2c,
 222    0x3d06dd96, 0x360bd498, 0x2b1ccf8a, 0x2011c684,
 223    0x1132f9ae, 0x1a3ff0a0, 0x0728ebb2, 0x0c25e2bc,
 224    0x656e95e6, 0x6e639ce8, 0x737487fa, 0x78798ef4,
 225    0x495ab1de, 0x4257b8d0, 0x5f40a3c2, 0x544daacc,
 226    0xf7daec41, 0xfcd7e54f, 0xe1c0fe5d, 0xeacdf753,
 227    0xdbeec879, 0xd0e3c177, 0xcdf4da65, 0xc6f9d36b,
 228    0xafb2a431, 0xa4bfad3f, 0xb9a8b62d, 0xb2a5bf23,
 229    0x83868009, 0x888b8907, 0x959c9215, 0x9e919b1b,
 230    0x470a7ca1, 0x4c0775af, 0x51106ebd, 0x5a1d67b3,
 231    0x6b3e5899, 0x60335197, 0x7d244a85, 0x7629438b,
 232    0x1f6234d1, 0x146f3ddf, 0x097826cd, 0x02752fc3,
 233    0x335610e9, 0x385b19e7, 0x254c02f5, 0x2e410bfb,
 234    0x8c61d79a, 0x876cde94, 0x9a7bc586, 0x9176cc88,
 235    0xa055f3a2, 0xab58faac, 0xb64fe1be, 0xbd42e8b0,
 236    0xd4099fea, 0xdf0496e4, 0xc2138df6, 0xc91e84f8,
 237    0xf83dbbd2, 0xf330b2dc, 0xee27a9ce, 0xe52aa0c0,
 238    0x3cb1477a, 0x37bc4e74, 0x2aab5566, 0x21a65c68,
 239    0x10856342, 0x1b886a4c, 0x069f715e, 0x0d927850,
 240    0x64d90f0a, 0x6fd40604, 0x72c31d16, 0x79ce1418,
 241    0x48ed2b32, 0x43e0223c, 0x5ef7392e, 0x55fa3020,
 242    0x01b79aec, 0x0aba93e2, 0x17ad88f0, 0x1ca081fe,
 243    0x2d83bed4, 0x268eb7da, 0x3b99acc8, 0x3094a5c6,
 244    0x59dfd29c, 0x52d2db92, 0x4fc5c080, 0x44c8c98e,
 245    0x75ebf6a4, 0x7ee6ffaa, 0x63f1e4b8, 0x68fcedb6,
 246    0xb1670a0c, 0xba6a0302, 0xa77d1810, 0xac70111e,
 247    0x9d532e34, 0x965e273a, 0x8b493c28, 0x80443526,
 248    0xe90f427c, 0xe2024b72, 0xff155060, 0xf418596e,
 249    0xc53b6644, 0xce366f4a, 0xd3217458, 0xd82c7d56,
 250    0x7a0ca137, 0x7101a839, 0x6c16b32b, 0x671bba25,
 251    0x5638850f, 0x5d358c01, 0x40229713, 0x4b2f9e1d,
 252    0x2264e947, 0x2969e049, 0x347efb5b, 0x3f73f255,
 253    0x0e50cd7f, 0x055dc471, 0x184adf63, 0x1347d66d,
 254    0xcadc31d7, 0xc1d138d9, 0xdcc623cb, 0xd7cb2ac5,
 255    0xe6e815ef, 0xede51ce1, 0xf0f207f3, 0xfbff0efd,
 256    0x92b479a7, 0x99b970a9, 0x84ae6bbb, 0x8fa362b5,
 257    0xbe805d9f, 0xb58d5491, 0xa89a4f83, 0xa397468d,
 258};
 259
 260
 261/*
 262AES_Te0[x] = S [x].[02, 01, 01, 03];
 263AES_Te1[x] = S [x].[03, 02, 01, 01];
 264AES_Te2[x] = S [x].[01, 03, 02, 01];
 265AES_Te3[x] = S [x].[01, 01, 03, 02];
 266AES_Te4[x] = S [x].[01, 01, 01, 01];
 267
 268AES_Td0[x] = Si[x].[0e, 09, 0d, 0b];
 269AES_Td1[x] = Si[x].[0b, 0e, 09, 0d];
 270AES_Td2[x] = Si[x].[0d, 0b, 0e, 09];
 271AES_Td3[x] = Si[x].[09, 0d, 0b, 0e];
 272AES_Td4[x] = Si[x].[01, 01, 01, 01];
 273*/
 274
 275const uint32_t AES_Te0[256] = {
 276    0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
 277    0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
 278    0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
 279    0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
 280    0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
 281    0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
 282    0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
 283    0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
 284    0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
 285    0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
 286    0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
 287    0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
 288    0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
 289    0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
 290    0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
 291    0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
 292    0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
 293    0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
 294    0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
 295    0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
 296    0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
 297    0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
 298    0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
 299    0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
 300    0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
 301    0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
 302    0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
 303    0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
 304    0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
 305    0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
 306    0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
 307    0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
 308    0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
 309    0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
 310    0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
 311    0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
 312    0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
 313    0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
 314    0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
 315    0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
 316    0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
 317    0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
 318    0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
 319    0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
 320    0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
 321    0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
 322    0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
 323    0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
 324    0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
 325    0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
 326    0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
 327    0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
 328    0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
 329    0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
 330    0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
 331    0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
 332    0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
 333    0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
 334    0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
 335    0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
 336    0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
 337    0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
 338    0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
 339    0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
 340};
 341
 342static const uint32_t AES_Te1[256] = {
 343    0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
 344    0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
 345    0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
 346    0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
 347    0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
 348    0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
 349    0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
 350    0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
 351    0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
 352    0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
 353    0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
 354    0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
 355    0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
 356    0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
 357    0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
 358    0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
 359    0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
 360    0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
 361    0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
 362    0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
 363    0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
 364    0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
 365    0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
 366    0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
 367    0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
 368    0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
 369    0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
 370    0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
 371    0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
 372    0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
 373    0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
 374    0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
 375    0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
 376    0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
 377    0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
 378    0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
 379    0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
 380    0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
 381    0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
 382    0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
 383    0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
 384    0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
 385    0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
 386    0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
 387    0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
 388    0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
 389    0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
 390    0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
 391    0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
 392    0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
 393    0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
 394    0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
 395    0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
 396    0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
 397    0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
 398    0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
 399    0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
 400    0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
 401    0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
 402    0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
 403    0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
 404    0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
 405    0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
 406    0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
 407};
 408
 409static const uint32_t AES_Te2[256] = {
 410    0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
 411    0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
 412    0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
 413    0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
 414    0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
 415    0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
 416    0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
 417    0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
 418    0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
 419    0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
 420    0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
 421    0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
 422    0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
 423    0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
 424    0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
 425    0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
 426    0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
 427    0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
 428    0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
 429    0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
 430    0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
 431    0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
 432    0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
 433    0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
 434    0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
 435    0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
 436    0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
 437    0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
 438    0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
 439    0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
 440    0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
 441    0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
 442    0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
 443    0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
 444    0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
 445    0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
 446    0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
 447    0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
 448    0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
 449    0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
 450    0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
 451    0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
 452    0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
 453    0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
 454    0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
 455    0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
 456    0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
 457    0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
 458    0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
 459    0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
 460    0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
 461    0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
 462    0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
 463    0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
 464    0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
 465    0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
 466    0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
 467    0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
 468    0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
 469    0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
 470    0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
 471    0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
 472    0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
 473    0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
 474};
 475
 476static const uint32_t AES_Te3[256] = {
 477    0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
 478    0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
 479    0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
 480    0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
 481    0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
 482    0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
 483    0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
 484    0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
 485    0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
 486    0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
 487    0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
 488    0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
 489    0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
 490    0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
 491    0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
 492    0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
 493    0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
 494    0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
 495    0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
 496    0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
 497    0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
 498    0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
 499    0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
 500    0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
 501    0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
 502    0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
 503    0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
 504    0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
 505    0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
 506    0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
 507    0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
 508    0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
 509    0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
 510    0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
 511    0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
 512    0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
 513    0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
 514    0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
 515    0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
 516    0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
 517    0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
 518    0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
 519    0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
 520    0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
 521    0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
 522    0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
 523    0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
 524    0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
 525    0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
 526    0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
 527    0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
 528    0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
 529    0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
 530    0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
 531    0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
 532    0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
 533    0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
 534    0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
 535    0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
 536    0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
 537    0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
 538    0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
 539    0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
 540    0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
 541};
 542
 543static const uint32_t AES_Te4[256] = {
 544    0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
 545    0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
 546    0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
 547    0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
 548    0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
 549    0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
 550    0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
 551    0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
 552    0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
 553    0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
 554    0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
 555    0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
 556    0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
 557    0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
 558    0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
 559    0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
 560    0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
 561    0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
 562    0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
 563    0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
 564    0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
 565    0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
 566    0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
 567    0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
 568    0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
 569    0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
 570    0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
 571    0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
 572    0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
 573    0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
 574    0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
 575    0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
 576    0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
 577    0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
 578    0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
 579    0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
 580    0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
 581    0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
 582    0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
 583    0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
 584    0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
 585    0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
 586    0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
 587    0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
 588    0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
 589    0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
 590    0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
 591    0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
 592    0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
 593    0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
 594    0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
 595    0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
 596    0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
 597    0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
 598    0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
 599    0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
 600    0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
 601    0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
 602    0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
 603    0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
 604    0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
 605    0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
 606    0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
 607    0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
 608};
 609
 610const uint32_t AES_Td0[256] = {
 611    0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
 612    0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
 613    0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
 614    0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
 615    0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
 616    0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
 617    0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
 618    0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
 619    0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
 620    0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
 621    0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
 622    0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
 623    0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
 624    0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
 625    0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
 626    0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
 627    0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
 628    0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
 629    0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
 630    0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
 631    0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
 632    0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
 633    0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
 634    0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
 635    0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
 636    0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
 637    0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
 638    0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
 639    0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
 640    0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
 641    0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
 642    0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
 643    0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
 644    0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
 645    0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
 646    0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
 647    0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
 648    0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
 649    0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
 650    0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
 651    0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
 652    0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
 653    0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
 654    0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
 655    0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
 656    0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
 657    0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
 658    0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
 659    0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
 660    0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
 661    0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
 662    0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
 663    0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
 664    0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
 665    0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
 666    0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
 667    0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
 668    0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
 669    0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
 670    0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
 671    0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
 672    0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
 673    0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
 674    0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U,
 675};
 676
 677static const uint32_t AES_Td1[256] = {
 678    0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
 679    0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
 680    0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
 681    0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
 682    0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
 683    0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
 684    0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
 685    0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
 686    0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
 687    0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
 688    0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
 689    0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
 690    0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
 691    0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
 692    0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
 693    0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
 694    0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
 695    0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
 696    0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
 697    0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
 698    0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
 699    0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
 700    0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
 701    0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
 702    0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
 703    0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
 704    0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
 705    0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
 706    0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
 707    0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
 708    0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
 709    0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
 710    0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
 711    0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
 712    0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
 713    0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
 714    0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
 715    0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
 716    0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
 717    0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
 718    0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
 719    0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
 720    0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
 721    0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
 722    0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
 723    0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
 724    0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
 725    0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
 726    0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
 727    0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
 728    0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
 729    0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
 730    0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
 731    0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
 732    0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
 733    0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
 734    0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
 735    0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
 736    0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
 737    0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
 738    0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
 739    0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
 740    0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
 741    0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U,
 742};
 743
 744static const uint32_t AES_Td2[256] = {
 745    0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
 746    0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
 747    0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
 748    0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
 749    0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
 750    0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
 751    0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
 752    0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
 753    0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
 754    0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
 755    0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
 756    0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
 757    0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
 758    0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
 759    0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
 760    0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
 761    0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
 762    0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
 763    0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
 764    0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
 765
 766    0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
 767    0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
 768    0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
 769    0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
 770    0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
 771    0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
 772    0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
 773    0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
 774    0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
 775    0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
 776    0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
 777    0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
 778    0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
 779    0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
 780    0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
 781    0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
 782    0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
 783    0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
 784    0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
 785    0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
 786    0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
 787    0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
 788    0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
 789    0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
 790    0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
 791    0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
 792    0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
 793    0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
 794    0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
 795    0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
 796    0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
 797    0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
 798    0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
 799    0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
 800    0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
 801    0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
 802    0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
 803    0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
 804    0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
 805    0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
 806    0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
 807    0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
 808    0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
 809    0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U,
 810};
 811
 812static const uint32_t AES_Td3[256] = {
 813    0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
 814    0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
 815    0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
 816    0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
 817    0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
 818    0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
 819    0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
 820    0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
 821    0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
 822    0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
 823    0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
 824    0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
 825    0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
 826    0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
 827    0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
 828    0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
 829    0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
 830    0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
 831    0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
 832    0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
 833    0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
 834    0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
 835    0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
 836    0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
 837    0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
 838    0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
 839    0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
 840    0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
 841    0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
 842    0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
 843    0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
 844    0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
 845    0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
 846    0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
 847    0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
 848    0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
 849    0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
 850    0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
 851    0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
 852    0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
 853    0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
 854    0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
 855    0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
 856    0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
 857    0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
 858    0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
 859    0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
 860    0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
 861    0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
 862    0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
 863    0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
 864    0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
 865    0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
 866    0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
 867    0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
 868    0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
 869    0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
 870    0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
 871    0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
 872    0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
 873    0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
 874    0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
 875    0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
 876    0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U,
 877};
 878
 879static const uint32_t AES_Td4[256] = {
 880    0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
 881    0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
 882    0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
 883    0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
 884    0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
 885    0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
 886    0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
 887    0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
 888    0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
 889    0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
 890    0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
 891    0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
 892    0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
 893    0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
 894    0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
 895    0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
 896    0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
 897    0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
 898    0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
 899    0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
 900    0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
 901    0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
 902    0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
 903    0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
 904    0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
 905    0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
 906    0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
 907    0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
 908    0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
 909    0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
 910    0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
 911    0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
 912    0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
 913    0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
 914    0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
 915    0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
 916    0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
 917    0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
 918    0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
 919    0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
 920    0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
 921    0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
 922    0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
 923    0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
 924    0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
 925    0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
 926    0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
 927    0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
 928    0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
 929    0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
 930    0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
 931    0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
 932    0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
 933    0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
 934    0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
 935    0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
 936    0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
 937    0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
 938    0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
 939    0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
 940    0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
 941    0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
 942    0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
 943    0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU,
 944};
 945
 946static const u32 rcon[] = {
 947        0x01000000, 0x02000000, 0x04000000, 0x08000000,
 948        0x10000000, 0x20000000, 0x40000000, 0x80000000,
 949        0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 950};
 951
 952/*
 953 * Perform MixColumns.
 954 */
 955static inline void
 956aesenc_MC_swap(AESState *r, const AESState *st, bool swap)
 957{
 958    int swap_b = swap * 0xf;
 959    int swap_w = swap * 0x3;
 960    bool be = HOST_BIG_ENDIAN ^ swap;
 961    uint32_t t;
 962
 963    /* Note that AES_mc_rot is encoded for little-endian. */
 964    t = (      AES_mc_rot[st->b[swap_b ^ 0x0]] ^
 965         rol32(AES_mc_rot[st->b[swap_b ^ 0x1]], 8) ^
 966         rol32(AES_mc_rot[st->b[swap_b ^ 0x2]], 16) ^
 967         rol32(AES_mc_rot[st->b[swap_b ^ 0x3]], 24));
 968    if (be) {
 969        t = bswap32(t);
 970    }
 971    r->w[swap_w ^ 0] = t;
 972
 973    t = (      AES_mc_rot[st->b[swap_b ^ 0x4]] ^
 974         rol32(AES_mc_rot[st->b[swap_b ^ 0x5]], 8) ^
 975         rol32(AES_mc_rot[st->b[swap_b ^ 0x6]], 16) ^
 976         rol32(AES_mc_rot[st->b[swap_b ^ 0x7]], 24));
 977    if (be) {
 978        t = bswap32(t);
 979    }
 980    r->w[swap_w ^ 1] = t;
 981
 982    t = (      AES_mc_rot[st->b[swap_b ^ 0x8]] ^
 983         rol32(AES_mc_rot[st->b[swap_b ^ 0x9]], 8) ^
 984         rol32(AES_mc_rot[st->b[swap_b ^ 0xA]], 16) ^
 985         rol32(AES_mc_rot[st->b[swap_b ^ 0xB]], 24));
 986    if (be) {
 987        t = bswap32(t);
 988    }
 989    r->w[swap_w ^ 2] = t;
 990
 991    t = (      AES_mc_rot[st->b[swap_b ^ 0xC]] ^
 992         rol32(AES_mc_rot[st->b[swap_b ^ 0xD]], 8) ^
 993         rol32(AES_mc_rot[st->b[swap_b ^ 0xE]], 16) ^
 994         rol32(AES_mc_rot[st->b[swap_b ^ 0xF]], 24));
 995    if (be) {
 996        t = bswap32(t);
 997    }
 998    r->w[swap_w ^ 3] = t;
 999}
1000
1001void aesenc_MC_gen(AESState *r, const AESState *st)
1002{
1003    aesenc_MC_swap(r, st, false);
1004}
1005
1006void aesenc_MC_genrev(AESState *r, const AESState *st)
1007{
1008    aesenc_MC_swap(r, st, true);
1009}
1010
1011/*
1012 * Perform SubBytes + ShiftRows + AddRoundKey.
1013 */
1014static inline void
1015aesenc_SB_SR_AK_swap(AESState *ret, const AESState *st,
1016                     const AESState *rk, bool swap)
1017{
1018    const int swap_b = swap ? 15 : 0;
1019    AESState t;
1020
1021    t.b[swap_b ^ 0x0] = AES_sbox[st->b[swap_b ^ AES_SH(0x0)]];
1022    t.b[swap_b ^ 0x1] = AES_sbox[st->b[swap_b ^ AES_SH(0x1)]];
1023    t.b[swap_b ^ 0x2] = AES_sbox[st->b[swap_b ^ AES_SH(0x2)]];
1024    t.b[swap_b ^ 0x3] = AES_sbox[st->b[swap_b ^ AES_SH(0x3)]];
1025    t.b[swap_b ^ 0x4] = AES_sbox[st->b[swap_b ^ AES_SH(0x4)]];
1026    t.b[swap_b ^ 0x5] = AES_sbox[st->b[swap_b ^ AES_SH(0x5)]];
1027    t.b[swap_b ^ 0x6] = AES_sbox[st->b[swap_b ^ AES_SH(0x6)]];
1028    t.b[swap_b ^ 0x7] = AES_sbox[st->b[swap_b ^ AES_SH(0x7)]];
1029    t.b[swap_b ^ 0x8] = AES_sbox[st->b[swap_b ^ AES_SH(0x8)]];
1030    t.b[swap_b ^ 0x9] = AES_sbox[st->b[swap_b ^ AES_SH(0x9)]];
1031    t.b[swap_b ^ 0xa] = AES_sbox[st->b[swap_b ^ AES_SH(0xA)]];
1032    t.b[swap_b ^ 0xb] = AES_sbox[st->b[swap_b ^ AES_SH(0xB)]];
1033    t.b[swap_b ^ 0xc] = AES_sbox[st->b[swap_b ^ AES_SH(0xC)]];
1034    t.b[swap_b ^ 0xd] = AES_sbox[st->b[swap_b ^ AES_SH(0xD)]];
1035    t.b[swap_b ^ 0xe] = AES_sbox[st->b[swap_b ^ AES_SH(0xE)]];
1036    t.b[swap_b ^ 0xf] = AES_sbox[st->b[swap_b ^ AES_SH(0xF)]];
1037
1038    /*
1039     * Perform the AddRoundKey with generic vectors.
1040     * This may be expanded to either host integer or host vector code.
1041     * The key and output endianness match, so no bswap required.
1042     */
1043    ret->v = t.v ^ rk->v;
1044}
1045
1046void aesenc_SB_SR_AK_gen(AESState *r, const AESState *s, const AESState *k)
1047{
1048    aesenc_SB_SR_AK_swap(r, s, k, false);
1049}
1050
1051void aesenc_SB_SR_AK_genrev(AESState *r, const AESState *s, const AESState *k)
1052{
1053    aesenc_SB_SR_AK_swap(r, s, k, true);
1054}
1055
1056/*
1057 * Perform SubBytes + ShiftRows + MixColumns + AddRoundKey.
1058 */
1059static inline void
1060aesenc_SB_SR_MC_AK_swap(AESState *r, const AESState *st,
1061                        const AESState *rk, bool swap)
1062{
1063    int swap_b = swap * 0xf;
1064    int swap_w = swap * 0x3;
1065    bool be = HOST_BIG_ENDIAN ^ swap;
1066    uint32_t w0, w1, w2, w3;
1067
1068    w0 = (AES_Te0[st->b[swap_b ^ AES_SH(0x0)]] ^
1069          AES_Te1[st->b[swap_b ^ AES_SH(0x1)]] ^
1070          AES_Te2[st->b[swap_b ^ AES_SH(0x2)]] ^
1071          AES_Te3[st->b[swap_b ^ AES_SH(0x3)]]);
1072
1073    w1 = (AES_Te0[st->b[swap_b ^ AES_SH(0x4)]] ^
1074          AES_Te1[st->b[swap_b ^ AES_SH(0x5)]] ^
1075          AES_Te2[st->b[swap_b ^ AES_SH(0x6)]] ^
1076          AES_Te3[st->b[swap_b ^ AES_SH(0x7)]]);
1077
1078    w2 = (AES_Te0[st->b[swap_b ^ AES_SH(0x8)]] ^
1079          AES_Te1[st->b[swap_b ^ AES_SH(0x9)]] ^
1080          AES_Te2[st->b[swap_b ^ AES_SH(0xA)]] ^
1081          AES_Te3[st->b[swap_b ^ AES_SH(0xB)]]);
1082
1083    w3 = (AES_Te0[st->b[swap_b ^ AES_SH(0xC)]] ^
1084          AES_Te1[st->b[swap_b ^ AES_SH(0xD)]] ^
1085          AES_Te2[st->b[swap_b ^ AES_SH(0xE)]] ^
1086          AES_Te3[st->b[swap_b ^ AES_SH(0xF)]]);
1087
1088    /* Note that AES_TeX is encoded for big-endian. */
1089    if (!be) {
1090        w0 = bswap32(w0);
1091        w1 = bswap32(w1);
1092        w2 = bswap32(w2);
1093        w3 = bswap32(w3);
1094    }
1095
1096    r->w[swap_w ^ 0] = rk->w[swap_w ^ 0] ^ w0;
1097    r->w[swap_w ^ 1] = rk->w[swap_w ^ 1] ^ w1;
1098    r->w[swap_w ^ 2] = rk->w[swap_w ^ 2] ^ w2;
1099    r->w[swap_w ^ 3] = rk->w[swap_w ^ 3] ^ w3;
1100}
1101
1102void aesenc_SB_SR_MC_AK_gen(AESState *r, const AESState *st,
1103                            const AESState *rk)
1104{
1105    aesenc_SB_SR_MC_AK_swap(r, st, rk, false);
1106}
1107
1108void aesenc_SB_SR_MC_AK_genrev(AESState *r, const AESState *st,
1109                               const AESState *rk)
1110{
1111    aesenc_SB_SR_MC_AK_swap(r, st, rk, true);
1112}
1113
1114/*
1115 * Perform InvMixColumns.
1116 */
1117static inline void
1118aesdec_IMC_swap(AESState *r, const AESState *st, bool swap)
1119{
1120    int swap_b = swap * 0xf;
1121    int swap_w = swap * 0x3;
1122    bool be = HOST_BIG_ENDIAN ^ swap;
1123    uint32_t t;
1124
1125    /* Note that AES_imc_rot is encoded for little-endian. */
1126    t = (      AES_imc_rot[st->b[swap_b ^ 0x0]] ^
1127         rol32(AES_imc_rot[st->b[swap_b ^ 0x1]], 8) ^
1128         rol32(AES_imc_rot[st->b[swap_b ^ 0x2]], 16) ^
1129         rol32(AES_imc_rot[st->b[swap_b ^ 0x3]], 24));
1130    if (be) {
1131        t = bswap32(t);
1132    }
1133    r->w[swap_w ^ 0] = t;
1134
1135    t = (      AES_imc_rot[st->b[swap_b ^ 0x4]] ^
1136         rol32(AES_imc_rot[st->b[swap_b ^ 0x5]], 8) ^
1137         rol32(AES_imc_rot[st->b[swap_b ^ 0x6]], 16) ^
1138         rol32(AES_imc_rot[st->b[swap_b ^ 0x7]], 24));
1139    if (be) {
1140        t = bswap32(t);
1141    }
1142    r->w[swap_w ^ 1] = t;
1143
1144    t = (      AES_imc_rot[st->b[swap_b ^ 0x8]] ^
1145         rol32(AES_imc_rot[st->b[swap_b ^ 0x9]], 8) ^
1146         rol32(AES_imc_rot[st->b[swap_b ^ 0xA]], 16) ^
1147         rol32(AES_imc_rot[st->b[swap_b ^ 0xB]], 24));
1148    if (be) {
1149        t = bswap32(t);
1150    }
1151    r->w[swap_w ^ 2] = t;
1152
1153    t = (      AES_imc_rot[st->b[swap_b ^ 0xC]] ^
1154         rol32(AES_imc_rot[st->b[swap_b ^ 0xD]], 8) ^
1155         rol32(AES_imc_rot[st->b[swap_b ^ 0xE]], 16) ^
1156         rol32(AES_imc_rot[st->b[swap_b ^ 0xF]], 24));
1157    if (be) {
1158        t = bswap32(t);
1159    }
1160    r->w[swap_w ^ 3] = t;
1161}
1162
1163void aesdec_IMC_gen(AESState *r, const AESState *st)
1164{
1165    aesdec_IMC_swap(r, st, false);
1166}
1167
1168void aesdec_IMC_genrev(AESState *r, const AESState *st)
1169{
1170    aesdec_IMC_swap(r, st, true);
1171}
1172
1173/*
1174 * Perform InvSubBytes + InvShiftRows + AddRoundKey.
1175 */
1176static inline void
1177aesdec_ISB_ISR_AK_swap(AESState *ret, const AESState *st,
1178                       const AESState *rk, bool swap)
1179{
1180    const int swap_b = swap ? 15 : 0;
1181    AESState t;
1182
1183    t.b[swap_b ^ 0x0] = AES_isbox[st->b[swap_b ^ AES_ISH(0x0)]];
1184    t.b[swap_b ^ 0x1] = AES_isbox[st->b[swap_b ^ AES_ISH(0x1)]];
1185    t.b[swap_b ^ 0x2] = AES_isbox[st->b[swap_b ^ AES_ISH(0x2)]];
1186    t.b[swap_b ^ 0x3] = AES_isbox[st->b[swap_b ^ AES_ISH(0x3)]];
1187    t.b[swap_b ^ 0x4] = AES_isbox[st->b[swap_b ^ AES_ISH(0x4)]];
1188    t.b[swap_b ^ 0x5] = AES_isbox[st->b[swap_b ^ AES_ISH(0x5)]];
1189    t.b[swap_b ^ 0x6] = AES_isbox[st->b[swap_b ^ AES_ISH(0x6)]];
1190    t.b[swap_b ^ 0x7] = AES_isbox[st->b[swap_b ^ AES_ISH(0x7)]];
1191    t.b[swap_b ^ 0x8] = AES_isbox[st->b[swap_b ^ AES_ISH(0x8)]];
1192    t.b[swap_b ^ 0x9] = AES_isbox[st->b[swap_b ^ AES_ISH(0x9)]];
1193    t.b[swap_b ^ 0xa] = AES_isbox[st->b[swap_b ^ AES_ISH(0xA)]];
1194    t.b[swap_b ^ 0xb] = AES_isbox[st->b[swap_b ^ AES_ISH(0xB)]];
1195    t.b[swap_b ^ 0xc] = AES_isbox[st->b[swap_b ^ AES_ISH(0xC)]];
1196    t.b[swap_b ^ 0xd] = AES_isbox[st->b[swap_b ^ AES_ISH(0xD)]];
1197    t.b[swap_b ^ 0xe] = AES_isbox[st->b[swap_b ^ AES_ISH(0xE)]];
1198    t.b[swap_b ^ 0xf] = AES_isbox[st->b[swap_b ^ AES_ISH(0xF)]];
1199
1200    /*
1201     * Perform the AddRoundKey with generic vectors.
1202     * This may be expanded to either host integer or host vector code.
1203     * The key and output endianness match, so no bswap required.
1204     */
1205    ret->v = t.v ^ rk->v;
1206}
1207
1208void aesdec_ISB_ISR_AK_gen(AESState *r, const AESState *s, const AESState *k)
1209{
1210    aesdec_ISB_ISR_AK_swap(r, s, k, false);
1211}
1212
1213void aesdec_ISB_ISR_AK_genrev(AESState *r, const AESState *s, const AESState *k)
1214{
1215    aesdec_ISB_ISR_AK_swap(r, s, k, true);
1216}
1217
1218/*
1219 * Perform InvSubBytes + InvShiftRows + InvMixColumns + AddRoundKey.
1220 */
1221static inline void
1222aesdec_ISB_ISR_IMC_AK_swap(AESState *r, const AESState *st,
1223                           const AESState *rk, bool swap)
1224{
1225    int swap_b = swap * 0xf;
1226    int swap_w = swap * 0x3;
1227    bool be = HOST_BIG_ENDIAN ^ swap;
1228    uint32_t w0, w1, w2, w3;
1229
1230    w0 = (AES_Td0[st->b[swap_b ^ AES_ISH(0x0)]] ^
1231          AES_Td1[st->b[swap_b ^ AES_ISH(0x1)]] ^
1232          AES_Td2[st->b[swap_b ^ AES_ISH(0x2)]] ^
1233          AES_Td3[st->b[swap_b ^ AES_ISH(0x3)]]);
1234
1235    w1 = (AES_Td0[st->b[swap_b ^ AES_ISH(0x4)]] ^
1236          AES_Td1[st->b[swap_b ^ AES_ISH(0x5)]] ^
1237          AES_Td2[st->b[swap_b ^ AES_ISH(0x6)]] ^
1238          AES_Td3[st->b[swap_b ^ AES_ISH(0x7)]]);
1239
1240    w2 = (AES_Td0[st->b[swap_b ^ AES_ISH(0x8)]] ^
1241          AES_Td1[st->b[swap_b ^ AES_ISH(0x9)]] ^
1242          AES_Td2[st->b[swap_b ^ AES_ISH(0xA)]] ^
1243          AES_Td3[st->b[swap_b ^ AES_ISH(0xB)]]);
1244
1245    w3 = (AES_Td0[st->b[swap_b ^ AES_ISH(0xC)]] ^
1246          AES_Td1[st->b[swap_b ^ AES_ISH(0xD)]] ^
1247          AES_Td2[st->b[swap_b ^ AES_ISH(0xE)]] ^
1248          AES_Td3[st->b[swap_b ^ AES_ISH(0xF)]]);
1249
1250    /* Note that AES_TdX is encoded for big-endian. */
1251    if (!be) {
1252        w0 = bswap32(w0);
1253        w1 = bswap32(w1);
1254        w2 = bswap32(w2);
1255        w3 = bswap32(w3);
1256    }
1257
1258    r->w[swap_w ^ 0] = rk->w[swap_w ^ 0] ^ w0;
1259    r->w[swap_w ^ 1] = rk->w[swap_w ^ 1] ^ w1;
1260    r->w[swap_w ^ 2] = rk->w[swap_w ^ 2] ^ w2;
1261    r->w[swap_w ^ 3] = rk->w[swap_w ^ 3] ^ w3;
1262}
1263
1264void aesdec_ISB_ISR_IMC_AK_gen(AESState *r, const AESState *st,
1265                               const AESState *rk)
1266{
1267    aesdec_ISB_ISR_IMC_AK_swap(r, st, rk, false);
1268}
1269
1270void aesdec_ISB_ISR_IMC_AK_genrev(AESState *r, const AESState *st,
1271                                  const AESState *rk)
1272{
1273    aesdec_ISB_ISR_IMC_AK_swap(r, st, rk, true);
1274}
1275
1276void aesdec_ISB_ISR_AK_IMC_gen(AESState *ret, const AESState *st,
1277                               const AESState *rk)
1278{
1279    aesdec_ISB_ISR_AK_gen(ret, st, rk);
1280    aesdec_IMC_gen(ret, ret);
1281}
1282
1283void aesdec_ISB_ISR_AK_IMC_genrev(AESState *ret, const AESState *st,
1284                                  const AESState *rk)
1285{
1286    aesdec_ISB_ISR_AK_genrev(ret, st, rk);
1287    aesdec_IMC_genrev(ret, ret);
1288}
1289
1290/**
1291 * Expand the cipher key into the encryption key schedule.
1292 */
1293int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
1294                        AES_KEY *key) {
1295
1296        u32 *rk;
1297        int i = 0;
1298        u32 temp;
1299
1300        if (!userKey || !key)
1301                return -1;
1302        if (bits != 128 && bits != 192 && bits != 256)
1303                return -2;
1304
1305        rk = key->rd_key;
1306
1307        if (bits == 128)
1308                key->rounds = 10;
1309        else if (bits == 192)
1310                key->rounds = 12;
1311        else
1312                key->rounds = 14;
1313
1314        rk[0] = GETU32(userKey     );
1315        rk[1] = GETU32(userKey +  4);
1316        rk[2] = GETU32(userKey +  8);
1317        rk[3] = GETU32(userKey + 12);
1318        if (bits == 128) {
1319                while (1) {
1320                        temp  = rk[3];
1321                        rk[4] = rk[0] ^
1322                                (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
1323                                (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
1324                                (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
1325                                (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
1326                                rcon[i];
1327                        rk[5] = rk[1] ^ rk[4];
1328                        rk[6] = rk[2] ^ rk[5];
1329                        rk[7] = rk[3] ^ rk[6];
1330                        if (++i == 10) {
1331                                return 0;
1332                        }
1333                        rk += 4;
1334                }
1335        }
1336        rk[4] = GETU32(userKey + 16);
1337        rk[5] = GETU32(userKey + 20);
1338        if (bits == 192) {
1339                while (1) {
1340                        temp = rk[ 5];
1341                        rk[ 6] = rk[ 0] ^
1342                                (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
1343                                (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
1344                                (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
1345                                (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
1346                                rcon[i];
1347                        rk[ 7] = rk[ 1] ^ rk[ 6];
1348                        rk[ 8] = rk[ 2] ^ rk[ 7];
1349                        rk[ 9] = rk[ 3] ^ rk[ 8];
1350                        if (++i == 8) {
1351                                return 0;
1352                        }
1353                        rk[10] = rk[ 4] ^ rk[ 9];
1354                        rk[11] = rk[ 5] ^ rk[10];
1355                        rk += 6;
1356                }
1357        }
1358        rk[6] = GETU32(userKey + 24);
1359        rk[7] = GETU32(userKey + 28);
1360        if (bits == 256) {
1361                while (1) {
1362                        temp = rk[ 7];
1363                        rk[ 8] = rk[ 0] ^
1364                                (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
1365                                (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
1366                                (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
1367                                (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
1368                                rcon[i];
1369                        rk[ 9] = rk[ 1] ^ rk[ 8];
1370                        rk[10] = rk[ 2] ^ rk[ 9];
1371                        rk[11] = rk[ 3] ^ rk[10];
1372                        if (++i == 7) {
1373                                return 0;
1374                        }
1375                        temp = rk[11];
1376                        rk[12] = rk[ 4] ^
1377                                (AES_Te4[(temp >> 24)       ] & 0xff000000) ^
1378                                (AES_Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
1379                                (AES_Te4[(temp >>  8) & 0xff] & 0x0000ff00) ^
1380                                (AES_Te4[(temp      ) & 0xff] & 0x000000ff);
1381                        rk[13] = rk[ 5] ^ rk[12];
1382                        rk[14] = rk[ 6] ^ rk[13];
1383                        rk[15] = rk[ 7] ^ rk[14];
1384
1385                        rk += 8;
1386                }
1387        }
1388        abort();
1389}
1390
1391/**
1392 * Expand the cipher key into the decryption key schedule.
1393 */
1394int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
1395                         AES_KEY *key) {
1396
1397        u32 *rk;
1398        int i, j, status;
1399        u32 temp;
1400
1401        /* first, start with an encryption schedule */
1402        status = AES_set_encrypt_key(userKey, bits, key);
1403        if (status < 0)
1404                return status;
1405
1406        rk = key->rd_key;
1407
1408        /* invert the order of the round keys: */
1409        for (i = 0, j = 4 * (key->rounds); i < j; i += 4, j -= 4) {
1410                temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
1411                temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
1412                temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
1413                temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
1414        }
1415        /* apply the inverse MixColumn transform to all round keys but the first and the last: */
1416        for (i = 1; i < (key->rounds); i++) {
1417                rk += 4;
1418                rk[0] =
1419                        AES_Td0[AES_Te4[(rk[0] >> 24)       ] & 0xff] ^
1420                        AES_Td1[AES_Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1421                        AES_Td2[AES_Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1422                        AES_Td3[AES_Te4[(rk[0]      ) & 0xff] & 0xff];
1423                rk[1] =
1424                        AES_Td0[AES_Te4[(rk[1] >> 24)       ] & 0xff] ^
1425                        AES_Td1[AES_Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1426                        AES_Td2[AES_Te4[(rk[1] >>  8) & 0xff] & 0xff] ^
1427                        AES_Td3[AES_Te4[(rk[1]      ) & 0xff] & 0xff];
1428                rk[2] =
1429                        AES_Td0[AES_Te4[(rk[2] >> 24)       ] & 0xff] ^
1430                        AES_Td1[AES_Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1431                        AES_Td2[AES_Te4[(rk[2] >>  8) & 0xff] & 0xff] ^
1432                        AES_Td3[AES_Te4[(rk[2]      ) & 0xff] & 0xff];
1433                rk[3] =
1434                        AES_Td0[AES_Te4[(rk[3] >> 24)       ] & 0xff] ^
1435                        AES_Td1[AES_Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1436                        AES_Td2[AES_Te4[(rk[3] >>  8) & 0xff] & 0xff] ^
1437                        AES_Td3[AES_Te4[(rk[3]      ) & 0xff] & 0xff];
1438        }
1439        return 0;
1440}
1441
1442#ifndef AES_ASM
1443/*
1444 * Encrypt a single block
1445 * in and out can overlap
1446 */
1447void AES_encrypt(const unsigned char *in, unsigned char *out,
1448                 const AES_KEY *key) {
1449
1450        const u32 *rk;
1451        u32 s0, s1, s2, s3, t0, t1, t2, t3;
1452#ifndef FULL_UNROLL
1453        int r;
1454#endif /* ?FULL_UNROLL */
1455
1456        assert(in && out && key);
1457        rk = key->rd_key;
1458
1459        /*
1460         * map byte array block to cipher state
1461         * and add initial round key:
1462         */
1463        s0 = GETU32(in     ) ^ rk[0];
1464        s1 = GETU32(in +  4) ^ rk[1];
1465        s2 = GETU32(in +  8) ^ rk[2];
1466        s3 = GETU32(in + 12) ^ rk[3];
1467#ifdef FULL_UNROLL
1468        /* round 1: */
1469        t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[ 4];
1470        t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[ 5];
1471        t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[ 6];
1472        t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[ 7];
1473        /* round 2: */
1474        s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[ 8];
1475        s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[ 9];
1476        s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[10];
1477        s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[11];
1478        /* round 3: */
1479        t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[12];
1480        t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[13];
1481        t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[14];
1482        t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[15];
1483        /* round 4: */
1484        s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[16];
1485        s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[17];
1486        s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[18];
1487        s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[19];
1488        /* round 5: */
1489        t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[20];
1490        t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[21];
1491        t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[22];
1492        t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[23];
1493        /* round 6: */
1494        s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[24];
1495        s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[25];
1496        s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[26];
1497        s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[27];
1498        /* round 7: */
1499        t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[28];
1500        t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[29];
1501        t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[30];
1502        t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[31];
1503        /* round 8: */
1504        s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[32];
1505        s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[33];
1506        s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[34];
1507        s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[35];
1508        /* round 9: */
1509        t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[36];
1510        t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[37];
1511        t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[38];
1512        t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[39];
1513    if (key->rounds > 10) {
1514        /* round 10: */
1515        s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[40];
1516        s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[41];
1517        s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[42];
1518        s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[43];
1519        /* round 11: */
1520        t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[44];
1521        t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[45];
1522        t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[46];
1523        t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[47];
1524        if (key->rounds > 12) {
1525            /* round 12: */
1526            s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[48];
1527            s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[49];
1528            s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[50];
1529            s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[51];
1530            /* round 13: */
1531            t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[52];
1532            t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[53];
1533            t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[54];
1534            t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[55];
1535        }
1536    }
1537    rk += key->rounds << 2;
1538#else  /* !FULL_UNROLL */
1539    /*
1540     * Nr - 1 full rounds:
1541     */
1542    r = key->rounds >> 1;
1543    for (;;) {
1544        t0 =
1545            AES_Te0[(s0 >> 24)       ] ^
1546            AES_Te1[(s1 >> 16) & 0xff] ^
1547            AES_Te2[(s2 >>  8) & 0xff] ^
1548            AES_Te3[(s3      ) & 0xff] ^
1549            rk[4];
1550        t1 =
1551            AES_Te0[(s1 >> 24)       ] ^
1552            AES_Te1[(s2 >> 16) & 0xff] ^
1553            AES_Te2[(s3 >>  8) & 0xff] ^
1554            AES_Te3[(s0      ) & 0xff] ^
1555            rk[5];
1556        t2 =
1557            AES_Te0[(s2 >> 24)       ] ^
1558            AES_Te1[(s3 >> 16) & 0xff] ^
1559            AES_Te2[(s0 >>  8) & 0xff] ^
1560            AES_Te3[(s1      ) & 0xff] ^
1561            rk[6];
1562        t3 =
1563            AES_Te0[(s3 >> 24)       ] ^
1564            AES_Te1[(s0 >> 16) & 0xff] ^
1565            AES_Te2[(s1 >>  8) & 0xff] ^
1566            AES_Te3[(s2      ) & 0xff] ^
1567            rk[7];
1568
1569        rk += 8;
1570        if (--r == 0) {
1571            break;
1572        }
1573
1574        s0 =
1575            AES_Te0[(t0 >> 24)       ] ^
1576            AES_Te1[(t1 >> 16) & 0xff] ^
1577            AES_Te2[(t2 >>  8) & 0xff] ^
1578            AES_Te3[(t3      ) & 0xff] ^
1579            rk[0];
1580        s1 =
1581            AES_Te0[(t1 >> 24)       ] ^
1582            AES_Te1[(t2 >> 16) & 0xff] ^
1583            AES_Te2[(t3 >>  8) & 0xff] ^
1584            AES_Te3[(t0      ) & 0xff] ^
1585            rk[1];
1586        s2 =
1587            AES_Te0[(t2 >> 24)       ] ^
1588            AES_Te1[(t3 >> 16) & 0xff] ^
1589            AES_Te2[(t0 >>  8) & 0xff] ^
1590            AES_Te3[(t1      ) & 0xff] ^
1591            rk[2];
1592        s3 =
1593            AES_Te0[(t3 >> 24)       ] ^
1594            AES_Te1[(t0 >> 16) & 0xff] ^
1595            AES_Te2[(t1 >>  8) & 0xff] ^
1596            AES_Te3[(t2      ) & 0xff] ^
1597            rk[3];
1598    }
1599#endif /* ?FULL_UNROLL */
1600    /*
1601         * apply last round and
1602         * map cipher state to byte array block:
1603         */
1604        s0 =
1605                (AES_Te4[(t0 >> 24)       ] & 0xff000000) ^
1606                (AES_Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1607                (AES_Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1608                (AES_Te4[(t3      ) & 0xff] & 0x000000ff) ^
1609                rk[0];
1610        PUTU32(out     , s0);
1611        s1 =
1612                (AES_Te4[(t1 >> 24)       ] & 0xff000000) ^
1613                (AES_Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1614                (AES_Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1615                (AES_Te4[(t0      ) & 0xff] & 0x000000ff) ^
1616                rk[1];
1617        PUTU32(out +  4, s1);
1618        s2 =
1619                (AES_Te4[(t2 >> 24)       ] & 0xff000000) ^
1620                (AES_Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1621                (AES_Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1622                (AES_Te4[(t1      ) & 0xff] & 0x000000ff) ^
1623                rk[2];
1624        PUTU32(out +  8, s2);
1625        s3 =
1626                (AES_Te4[(t3 >> 24)       ] & 0xff000000) ^
1627                (AES_Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1628                (AES_Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1629                (AES_Te4[(t2      ) & 0xff] & 0x000000ff) ^
1630                rk[3];
1631        PUTU32(out + 12, s3);
1632}
1633
1634/*
1635 * Decrypt a single block
1636 * in and out can overlap
1637 */
1638void AES_decrypt(const unsigned char *in, unsigned char *out,
1639                 const AES_KEY *key) {
1640
1641        const u32 *rk;
1642        u32 s0, s1, s2, s3, t0, t1, t2, t3;
1643#ifndef FULL_UNROLL
1644        int r;
1645#endif /* ?FULL_UNROLL */
1646
1647        assert(in && out && key);
1648        rk = key->rd_key;
1649
1650        /*
1651         * map byte array block to cipher state
1652         * and add initial round key:
1653         */
1654    s0 = GETU32(in     ) ^ rk[0];
1655    s1 = GETU32(in +  4) ^ rk[1];
1656    s2 = GETU32(in +  8) ^ rk[2];
1657    s3 = GETU32(in + 12) ^ rk[3];
1658#ifdef FULL_UNROLL
1659    /* round 1: */
1660    t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[ 4];
1661    t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[ 5];
1662    t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[ 6];
1663    t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[ 7];
1664    /* round 2: */
1665    s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[ 8];
1666    s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[ 9];
1667    s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[10];
1668    s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[11];
1669    /* round 3: */
1670    t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[12];
1671    t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[13];
1672    t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[14];
1673    t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[15];
1674    /* round 4: */
1675    s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[16];
1676    s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[17];
1677    s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[18];
1678    s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[19];
1679    /* round 5: */
1680    t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[20];
1681    t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[21];
1682    t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[22];
1683    t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[23];
1684    /* round 6: */
1685    s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[24];
1686    s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[25];
1687    s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[26];
1688    s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[27];
1689    /* round 7: */
1690    t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[28];
1691    t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[29];
1692    t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[30];
1693    t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[31];
1694    /* round 8: */
1695    s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[32];
1696    s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[33];
1697    s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[34];
1698    s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[35];
1699    /* round 9: */
1700    t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[36];
1701    t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[37];
1702    t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[38];
1703    t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[39];
1704    if (key->rounds > 10) {
1705        /* round 10: */
1706        s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[40];
1707        s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[41];
1708        s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[42];
1709        s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[43];
1710        /* round 11: */
1711        t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[44];
1712        t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[45];
1713        t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[46];
1714        t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[47];
1715        if (key->rounds > 12) {
1716            /* round 12: */
1717            s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[48];
1718            s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[49];
1719            s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[50];
1720            s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[51];
1721            /* round 13: */
1722            t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[52];
1723            t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[53];
1724            t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[54];
1725            t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[55];
1726        }
1727    }
1728        rk += key->rounds << 2;
1729#else  /* !FULL_UNROLL */
1730    /*
1731     * Nr - 1 full rounds:
1732     */
1733    r = key->rounds >> 1;
1734    for (;;) {
1735        t0 =
1736            AES_Td0[(s0 >> 24)       ] ^
1737            AES_Td1[(s3 >> 16) & 0xff] ^
1738            AES_Td2[(s2 >>  8) & 0xff] ^
1739            AES_Td3[(s1      ) & 0xff] ^
1740            rk[4];
1741        t1 =
1742            AES_Td0[(s1 >> 24)       ] ^
1743            AES_Td1[(s0 >> 16) & 0xff] ^
1744            AES_Td2[(s3 >>  8) & 0xff] ^
1745            AES_Td3[(s2      ) & 0xff] ^
1746            rk[5];
1747        t2 =
1748            AES_Td0[(s2 >> 24)       ] ^
1749            AES_Td1[(s1 >> 16) & 0xff] ^
1750            AES_Td2[(s0 >>  8) & 0xff] ^
1751            AES_Td3[(s3      ) & 0xff] ^
1752            rk[6];
1753        t3 =
1754            AES_Td0[(s3 >> 24)       ] ^
1755            AES_Td1[(s2 >> 16) & 0xff] ^
1756            AES_Td2[(s1 >>  8) & 0xff] ^
1757            AES_Td3[(s0      ) & 0xff] ^
1758            rk[7];
1759
1760        rk += 8;
1761        if (--r == 0) {
1762            break;
1763        }
1764
1765        s0 =
1766            AES_Td0[(t0 >> 24)       ] ^
1767            AES_Td1[(t3 >> 16) & 0xff] ^
1768            AES_Td2[(t2 >>  8) & 0xff] ^
1769            AES_Td3[(t1      ) & 0xff] ^
1770            rk[0];
1771        s1 =
1772            AES_Td0[(t1 >> 24)       ] ^
1773            AES_Td1[(t0 >> 16) & 0xff] ^
1774            AES_Td2[(t3 >>  8) & 0xff] ^
1775            AES_Td3[(t2      ) & 0xff] ^
1776            rk[1];
1777        s2 =
1778            AES_Td0[(t2 >> 24)       ] ^
1779            AES_Td1[(t1 >> 16) & 0xff] ^
1780            AES_Td2[(t0 >>  8) & 0xff] ^
1781            AES_Td3[(t3      ) & 0xff] ^
1782            rk[2];
1783        s3 =
1784            AES_Td0[(t3 >> 24)       ] ^
1785            AES_Td1[(t2 >> 16) & 0xff] ^
1786            AES_Td2[(t1 >>  8) & 0xff] ^
1787            AES_Td3[(t0      ) & 0xff] ^
1788            rk[3];
1789    }
1790#endif /* ?FULL_UNROLL */
1791    /*
1792         * apply last round and
1793         * map cipher state to byte array block:
1794         */
1795        s0 =
1796                (AES_Td4[(t0 >> 24)       ] & 0xff000000) ^
1797                (AES_Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1798                (AES_Td4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1799                (AES_Td4[(t1      ) & 0xff] & 0x000000ff) ^
1800                rk[0];
1801        PUTU32(out     , s0);
1802        s1 =
1803                (AES_Td4[(t1 >> 24)       ] & 0xff000000) ^
1804                (AES_Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1805                (AES_Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1806                (AES_Td4[(t2      ) & 0xff] & 0x000000ff) ^
1807                rk[1];
1808        PUTU32(out +  4, s1);
1809        s2 =
1810                (AES_Td4[(t2 >> 24)       ] & 0xff000000) ^
1811                (AES_Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1812                (AES_Td4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1813                (AES_Td4[(t3      ) & 0xff] & 0x000000ff) ^
1814                rk[2];
1815        PUTU32(out +  8, s2);
1816        s3 =
1817                (AES_Td4[(t3 >> 24)       ] & 0xff000000) ^
1818                (AES_Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1819                (AES_Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1820                (AES_Td4[(t0      ) & 0xff] & 0x000000ff) ^
1821                rk[3];
1822        PUTU32(out + 12, s3);
1823}
1824
1825#endif /* AES_ASM */
1826