xref: /openbmc/qemu/crypto/aes.c (revision 30d0647b)
1 /**
2  *
3  * aes.c - integrated in QEMU by Fabrice Bellard from the OpenSSL project.
4  */
5 /*
6  * rijndael-alg-fst.c
7  *
8  * @version 3.0 (December 2000)
9  *
10  * Optimised ANSI C code for the Rijndael cipher (now AES)
11  *
12  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
13  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
14  * @author Paulo Barreto <paulo.barreto@terra.com.br>
15  *
16  * This code is hereby placed in the public domain.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
19  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
25  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
26  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
27  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
28  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  */
30 #include "qemu/osdep.h"
31 #include "qemu/bswap.h"
32 #include "qemu/bitops.h"
33 #include "crypto/aes.h"
34 #include "crypto/aes-round.h"
35 
36 typedef uint32_t u32;
37 typedef uint8_t u8;
38 
39 /* This controls loop-unrolling in aes_core.c */
40 #undef FULL_UNROLL
41 # define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ ((u32)(pt)[2] <<  8) ^ ((u32)(pt)[3]))
42 # define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >>  8); (ct)[3] = (u8)(st); }
43 
44 const uint8_t AES_sbox[256] = {
45     0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5,
46     0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76,
47     0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0,
48     0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0,
49     0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F, 0xF7, 0xCC,
50     0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15,
51     0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A,
52     0x07, 0x12, 0x80, 0xE2, 0xEB, 0x27, 0xB2, 0x75,
53     0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0,
54     0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84,
55     0x53, 0xD1, 0x00, 0xED, 0x20, 0xFC, 0xB1, 0x5B,
56     0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF,
57     0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85,
58     0x45, 0xF9, 0x02, 0x7F, 0x50, 0x3C, 0x9F, 0xA8,
59     0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5,
60     0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2,
61     0xCD, 0x0C, 0x13, 0xEC, 0x5F, 0x97, 0x44, 0x17,
62     0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73,
63     0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88,
64     0x46, 0xEE, 0xB8, 0x14, 0xDE, 0x5E, 0x0B, 0xDB,
65     0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C,
66     0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79,
67     0xE7, 0xC8, 0x37, 0x6D, 0x8D, 0xD5, 0x4E, 0xA9,
68     0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08,
69     0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6,
70     0xE8, 0xDD, 0x74, 0x1F, 0x4B, 0xBD, 0x8B, 0x8A,
71     0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E,
72     0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E,
73     0xE1, 0xF8, 0x98, 0x11, 0x69, 0xD9, 0x8E, 0x94,
74     0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF,
75     0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68,
76     0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16,
77 };
78 
79 const uint8_t AES_isbox[256] = {
80     0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38,
81     0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB,
82     0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87,
83     0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB,
84     0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2, 0x23, 0x3D,
85     0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
86     0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2,
87     0x76, 0x5B, 0xA2, 0x49, 0x6D, 0x8B, 0xD1, 0x25,
88     0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16,
89     0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92,
90     0x6C, 0x70, 0x48, 0x50, 0xFD, 0xED, 0xB9, 0xDA,
91     0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84,
92     0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A,
93     0xF7, 0xE4, 0x58, 0x05, 0xB8, 0xB3, 0x45, 0x06,
94     0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02,
95     0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B,
96     0x3A, 0x91, 0x11, 0x41, 0x4F, 0x67, 0xDC, 0xEA,
97     0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73,
98     0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85,
99     0xE2, 0xF9, 0x37, 0xE8, 0x1C, 0x75, 0xDF, 0x6E,
100     0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89,
101     0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B,
102     0xFC, 0x56, 0x3E, 0x4B, 0xC6, 0xD2, 0x79, 0x20,
103     0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4,
104     0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31,
105     0xB1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xEC, 0x5F,
106     0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D,
107     0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF,
108     0xA0, 0xE0, 0x3B, 0x4D, 0xAE, 0x2A, 0xF5, 0xB0,
109     0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
110     0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26,
111     0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D,
112 };
113 
114 /* AES ShiftRows, for complete unrolling. */
115 #define AES_SH(X)   (((X) * 5) & 15)
116 
117 /* AES InvShiftRows, for complete unrolling. */
118 #define AES_ISH(X)  (((X) * 13) & 15)
119 
120 /*
121  * MixColumns lookup table, for use with rot32.
122  */
123 static const uint32_t AES_mc_rot[256] = {
124     0x00000000, 0x03010102, 0x06020204, 0x05030306,
125     0x0c040408, 0x0f05050a, 0x0a06060c, 0x0907070e,
126     0x18080810, 0x1b090912, 0x1e0a0a14, 0x1d0b0b16,
127     0x140c0c18, 0x170d0d1a, 0x120e0e1c, 0x110f0f1e,
128     0x30101020, 0x33111122, 0x36121224, 0x35131326,
129     0x3c141428, 0x3f15152a, 0x3a16162c, 0x3917172e,
130     0x28181830, 0x2b191932, 0x2e1a1a34, 0x2d1b1b36,
131     0x241c1c38, 0x271d1d3a, 0x221e1e3c, 0x211f1f3e,
132     0x60202040, 0x63212142, 0x66222244, 0x65232346,
133     0x6c242448, 0x6f25254a, 0x6a26264c, 0x6927274e,
134     0x78282850, 0x7b292952, 0x7e2a2a54, 0x7d2b2b56,
135     0x742c2c58, 0x772d2d5a, 0x722e2e5c, 0x712f2f5e,
136     0x50303060, 0x53313162, 0x56323264, 0x55333366,
137     0x5c343468, 0x5f35356a, 0x5a36366c, 0x5937376e,
138     0x48383870, 0x4b393972, 0x4e3a3a74, 0x4d3b3b76,
139     0x443c3c78, 0x473d3d7a, 0x423e3e7c, 0x413f3f7e,
140     0xc0404080, 0xc3414182, 0xc6424284, 0xc5434386,
141     0xcc444488, 0xcf45458a, 0xca46468c, 0xc947478e,
142     0xd8484890, 0xdb494992, 0xde4a4a94, 0xdd4b4b96,
143     0xd44c4c98, 0xd74d4d9a, 0xd24e4e9c, 0xd14f4f9e,
144     0xf05050a0, 0xf35151a2, 0xf65252a4, 0xf55353a6,
145     0xfc5454a8, 0xff5555aa, 0xfa5656ac, 0xf95757ae,
146     0xe85858b0, 0xeb5959b2, 0xee5a5ab4, 0xed5b5bb6,
147     0xe45c5cb8, 0xe75d5dba, 0xe25e5ebc, 0xe15f5fbe,
148     0xa06060c0, 0xa36161c2, 0xa66262c4, 0xa56363c6,
149     0xac6464c8, 0xaf6565ca, 0xaa6666cc, 0xa96767ce,
150     0xb86868d0, 0xbb6969d2, 0xbe6a6ad4, 0xbd6b6bd6,
151     0xb46c6cd8, 0xb76d6dda, 0xb26e6edc, 0xb16f6fde,
152     0x907070e0, 0x937171e2, 0x967272e4, 0x957373e6,
153     0x9c7474e8, 0x9f7575ea, 0x9a7676ec, 0x997777ee,
154     0x887878f0, 0x8b7979f2, 0x8e7a7af4, 0x8d7b7bf6,
155     0x847c7cf8, 0x877d7dfa, 0x827e7efc, 0x817f7ffe,
156     0x9b80801b, 0x98818119, 0x9d82821f, 0x9e83831d,
157     0x97848413, 0x94858511, 0x91868617, 0x92878715,
158     0x8388880b, 0x80898909, 0x858a8a0f, 0x868b8b0d,
159     0x8f8c8c03, 0x8c8d8d01, 0x898e8e07, 0x8a8f8f05,
160     0xab90903b, 0xa8919139, 0xad92923f, 0xae93933d,
161     0xa7949433, 0xa4959531, 0xa1969637, 0xa2979735,
162     0xb398982b, 0xb0999929, 0xb59a9a2f, 0xb69b9b2d,
163     0xbf9c9c23, 0xbc9d9d21, 0xb99e9e27, 0xba9f9f25,
164     0xfba0a05b, 0xf8a1a159, 0xfda2a25f, 0xfea3a35d,
165     0xf7a4a453, 0xf4a5a551, 0xf1a6a657, 0xf2a7a755,
166     0xe3a8a84b, 0xe0a9a949, 0xe5aaaa4f, 0xe6abab4d,
167     0xefacac43, 0xecadad41, 0xe9aeae47, 0xeaafaf45,
168     0xcbb0b07b, 0xc8b1b179, 0xcdb2b27f, 0xceb3b37d,
169     0xc7b4b473, 0xc4b5b571, 0xc1b6b677, 0xc2b7b775,
170     0xd3b8b86b, 0xd0b9b969, 0xd5baba6f, 0xd6bbbb6d,
171     0xdfbcbc63, 0xdcbdbd61, 0xd9bebe67, 0xdabfbf65,
172     0x5bc0c09b, 0x58c1c199, 0x5dc2c29f, 0x5ec3c39d,
173     0x57c4c493, 0x54c5c591, 0x51c6c697, 0x52c7c795,
174     0x43c8c88b, 0x40c9c989, 0x45caca8f, 0x46cbcb8d,
175     0x4fcccc83, 0x4ccdcd81, 0x49cece87, 0x4acfcf85,
176     0x6bd0d0bb, 0x68d1d1b9, 0x6dd2d2bf, 0x6ed3d3bd,
177     0x67d4d4b3, 0x64d5d5b1, 0x61d6d6b7, 0x62d7d7b5,
178     0x73d8d8ab, 0x70d9d9a9, 0x75dadaaf, 0x76dbdbad,
179     0x7fdcdca3, 0x7cdddda1, 0x79dedea7, 0x7adfdfa5,
180     0x3be0e0db, 0x38e1e1d9, 0x3de2e2df, 0x3ee3e3dd,
181     0x37e4e4d3, 0x34e5e5d1, 0x31e6e6d7, 0x32e7e7d5,
182     0x23e8e8cb, 0x20e9e9c9, 0x25eaeacf, 0x26ebebcd,
183     0x2fececc3, 0x2cededc1, 0x29eeeec7, 0x2aefefc5,
184     0x0bf0f0fb, 0x08f1f1f9, 0x0df2f2ff, 0x0ef3f3fd,
185     0x07f4f4f3, 0x04f5f5f1, 0x01f6f6f7, 0x02f7f7f5,
186     0x13f8f8eb, 0x10f9f9e9, 0x15fafaef, 0x16fbfbed,
187     0x1ffcfce3, 0x1cfdfde1, 0x19fefee7, 0x1affffe5,
188 };
189 
190 /*
191  * Inverse MixColumns lookup table, for use with rot32.
192  */
193 static const uint32_t AES_imc_rot[256] = {
194     0x00000000, 0x0b0d090e, 0x161a121c, 0x1d171b12,
195     0x2c342438, 0x27392d36, 0x3a2e3624, 0x31233f2a,
196     0x58684870, 0x5365417e, 0x4e725a6c, 0x457f5362,
197     0x745c6c48, 0x7f516546, 0x62467e54, 0x694b775a,
198     0xb0d090e0, 0xbbdd99ee, 0xa6ca82fc, 0xadc78bf2,
199     0x9ce4b4d8, 0x97e9bdd6, 0x8afea6c4, 0x81f3afca,
200     0xe8b8d890, 0xe3b5d19e, 0xfea2ca8c, 0xf5afc382,
201     0xc48cfca8, 0xcf81f5a6, 0xd296eeb4, 0xd99be7ba,
202     0x7bbb3bdb, 0x70b632d5, 0x6da129c7, 0x66ac20c9,
203     0x578f1fe3, 0x5c8216ed, 0x41950dff, 0x4a9804f1,
204     0x23d373ab, 0x28de7aa5, 0x35c961b7, 0x3ec468b9,
205     0x0fe75793, 0x04ea5e9d, 0x19fd458f, 0x12f04c81,
206     0xcb6bab3b, 0xc066a235, 0xdd71b927, 0xd67cb029,
207     0xe75f8f03, 0xec52860d, 0xf1459d1f, 0xfa489411,
208     0x9303e34b, 0x980eea45, 0x8519f157, 0x8e14f859,
209     0xbf37c773, 0xb43ace7d, 0xa92dd56f, 0xa220dc61,
210     0xf66d76ad, 0xfd607fa3, 0xe07764b1, 0xeb7a6dbf,
211     0xda595295, 0xd1545b9b, 0xcc434089, 0xc74e4987,
212     0xae053edd, 0xa50837d3, 0xb81f2cc1, 0xb31225cf,
213     0x82311ae5, 0x893c13eb, 0x942b08f9, 0x9f2601f7,
214     0x46bde64d, 0x4db0ef43, 0x50a7f451, 0x5baafd5f,
215     0x6a89c275, 0x6184cb7b, 0x7c93d069, 0x779ed967,
216     0x1ed5ae3d, 0x15d8a733, 0x08cfbc21, 0x03c2b52f,
217     0x32e18a05, 0x39ec830b, 0x24fb9819, 0x2ff69117,
218     0x8dd64d76, 0x86db4478, 0x9bcc5f6a, 0x90c15664,
219     0xa1e2694e, 0xaaef6040, 0xb7f87b52, 0xbcf5725c,
220     0xd5be0506, 0xdeb30c08, 0xc3a4171a, 0xc8a91e14,
221     0xf98a213e, 0xf2872830, 0xef903322, 0xe49d3a2c,
222     0x3d06dd96, 0x360bd498, 0x2b1ccf8a, 0x2011c684,
223     0x1132f9ae, 0x1a3ff0a0, 0x0728ebb2, 0x0c25e2bc,
224     0x656e95e6, 0x6e639ce8, 0x737487fa, 0x78798ef4,
225     0x495ab1de, 0x4257b8d0, 0x5f40a3c2, 0x544daacc,
226     0xf7daec41, 0xfcd7e54f, 0xe1c0fe5d, 0xeacdf753,
227     0xdbeec879, 0xd0e3c177, 0xcdf4da65, 0xc6f9d36b,
228     0xafb2a431, 0xa4bfad3f, 0xb9a8b62d, 0xb2a5bf23,
229     0x83868009, 0x888b8907, 0x959c9215, 0x9e919b1b,
230     0x470a7ca1, 0x4c0775af, 0x51106ebd, 0x5a1d67b3,
231     0x6b3e5899, 0x60335197, 0x7d244a85, 0x7629438b,
232     0x1f6234d1, 0x146f3ddf, 0x097826cd, 0x02752fc3,
233     0x335610e9, 0x385b19e7, 0x254c02f5, 0x2e410bfb,
234     0x8c61d79a, 0x876cde94, 0x9a7bc586, 0x9176cc88,
235     0xa055f3a2, 0xab58faac, 0xb64fe1be, 0xbd42e8b0,
236     0xd4099fea, 0xdf0496e4, 0xc2138df6, 0xc91e84f8,
237     0xf83dbbd2, 0xf330b2dc, 0xee27a9ce, 0xe52aa0c0,
238     0x3cb1477a, 0x37bc4e74, 0x2aab5566, 0x21a65c68,
239     0x10856342, 0x1b886a4c, 0x069f715e, 0x0d927850,
240     0x64d90f0a, 0x6fd40604, 0x72c31d16, 0x79ce1418,
241     0x48ed2b32, 0x43e0223c, 0x5ef7392e, 0x55fa3020,
242     0x01b79aec, 0x0aba93e2, 0x17ad88f0, 0x1ca081fe,
243     0x2d83bed4, 0x268eb7da, 0x3b99acc8, 0x3094a5c6,
244     0x59dfd29c, 0x52d2db92, 0x4fc5c080, 0x44c8c98e,
245     0x75ebf6a4, 0x7ee6ffaa, 0x63f1e4b8, 0x68fcedb6,
246     0xb1670a0c, 0xba6a0302, 0xa77d1810, 0xac70111e,
247     0x9d532e34, 0x965e273a, 0x8b493c28, 0x80443526,
248     0xe90f427c, 0xe2024b72, 0xff155060, 0xf418596e,
249     0xc53b6644, 0xce366f4a, 0xd3217458, 0xd82c7d56,
250     0x7a0ca137, 0x7101a839, 0x6c16b32b, 0x671bba25,
251     0x5638850f, 0x5d358c01, 0x40229713, 0x4b2f9e1d,
252     0x2264e947, 0x2969e049, 0x347efb5b, 0x3f73f255,
253     0x0e50cd7f, 0x055dc471, 0x184adf63, 0x1347d66d,
254     0xcadc31d7, 0xc1d138d9, 0xdcc623cb, 0xd7cb2ac5,
255     0xe6e815ef, 0xede51ce1, 0xf0f207f3, 0xfbff0efd,
256     0x92b479a7, 0x99b970a9, 0x84ae6bbb, 0x8fa362b5,
257     0xbe805d9f, 0xb58d5491, 0xa89a4f83, 0xa397468d,
258 };
259 
260 
261 /*
262 AES_Te0[x] = S [x].[02, 01, 01, 03];
263 AES_Te1[x] = S [x].[03, 02, 01, 01];
264 AES_Te2[x] = S [x].[01, 03, 02, 01];
265 AES_Te3[x] = S [x].[01, 01, 03, 02];
266 AES_Te4[x] = S [x].[01, 01, 01, 01];
267 
268 AES_Td0[x] = Si[x].[0e, 09, 0d, 0b];
269 AES_Td1[x] = Si[x].[0b, 0e, 09, 0d];
270 AES_Td2[x] = Si[x].[0d, 0b, 0e, 09];
271 AES_Td3[x] = Si[x].[09, 0d, 0b, 0e];
272 AES_Td4[x] = Si[x].[01, 01, 01, 01];
273 */
274 
275 static const uint32_t AES_Te0[256] = {
276     0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
277     0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
278     0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
279     0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
280     0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
281     0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
282     0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
283     0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
284     0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
285     0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
286     0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
287     0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
288     0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
289     0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
290     0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
291     0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
292     0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
293     0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
294     0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
295     0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
296     0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
297     0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
298     0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
299     0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
300     0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
301     0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
302     0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
303     0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
304     0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
305     0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
306     0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
307     0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
308     0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
309     0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
310     0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
311     0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
312     0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
313     0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
314     0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
315     0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
316     0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
317     0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
318     0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
319     0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
320     0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
321     0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
322     0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
323     0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
324     0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
325     0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
326     0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
327     0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
328     0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
329     0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
330     0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
331     0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
332     0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
333     0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
334     0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
335     0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
336     0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
337     0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
338     0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
339     0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
340 };
341 
342 static const uint32_t AES_Te1[256] = {
343     0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
344     0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
345     0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
346     0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
347     0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
348     0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
349     0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
350     0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
351     0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
352     0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
353     0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
354     0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
355     0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
356     0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
357     0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
358     0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
359     0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
360     0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
361     0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
362     0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
363     0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
364     0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
365     0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
366     0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
367     0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
368     0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
369     0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
370     0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
371     0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
372     0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
373     0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
374     0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
375     0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
376     0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
377     0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
378     0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
379     0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
380     0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
381     0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
382     0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
383     0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
384     0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
385     0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
386     0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
387     0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
388     0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
389     0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
390     0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
391     0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
392     0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
393     0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
394     0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
395     0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
396     0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
397     0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
398     0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
399     0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
400     0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
401     0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
402     0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
403     0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
404     0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
405     0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
406     0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
407 };
408 
409 static const uint32_t AES_Te2[256] = {
410     0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
411     0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
412     0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
413     0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
414     0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
415     0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
416     0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
417     0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
418     0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
419     0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
420     0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
421     0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
422     0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
423     0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
424     0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
425     0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
426     0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
427     0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
428     0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
429     0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
430     0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
431     0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
432     0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
433     0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
434     0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
435     0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
436     0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
437     0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
438     0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
439     0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
440     0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
441     0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
442     0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
443     0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
444     0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
445     0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
446     0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
447     0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
448     0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
449     0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
450     0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
451     0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
452     0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
453     0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
454     0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
455     0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
456     0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
457     0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
458     0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
459     0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
460     0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
461     0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
462     0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
463     0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
464     0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
465     0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
466     0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
467     0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
468     0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
469     0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
470     0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
471     0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
472     0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
473     0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
474 };
475 
476 static const uint32_t AES_Te3[256] = {
477     0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
478     0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
479     0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
480     0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
481     0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
482     0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
483     0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
484     0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
485     0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
486     0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
487     0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
488     0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
489     0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
490     0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
491     0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
492     0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
493     0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
494     0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
495     0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
496     0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
497     0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
498     0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
499     0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
500     0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
501     0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
502     0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
503     0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
504     0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
505     0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
506     0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
507     0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
508     0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
509     0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
510     0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
511     0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
512     0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
513     0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
514     0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
515     0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
516     0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
517     0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
518     0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
519     0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
520     0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
521     0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
522     0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
523     0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
524     0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
525     0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
526     0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
527     0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
528     0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
529     0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
530     0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
531     0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
532     0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
533     0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
534     0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
535     0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
536     0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
537     0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
538     0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
539     0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
540     0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
541 };
542 
543 static const uint32_t AES_Te4[256] = {
544     0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
545     0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
546     0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
547     0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
548     0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
549     0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
550     0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
551     0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
552     0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
553     0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
554     0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
555     0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
556     0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
557     0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
558     0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
559     0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
560     0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
561     0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
562     0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
563     0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
564     0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
565     0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
566     0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
567     0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
568     0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
569     0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
570     0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
571     0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
572     0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
573     0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
574     0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
575     0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
576     0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
577     0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
578     0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
579     0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
580     0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
581     0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
582     0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
583     0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
584     0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
585     0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
586     0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
587     0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
588     0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
589     0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
590     0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
591     0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
592     0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
593     0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
594     0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
595     0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
596     0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
597     0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
598     0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
599     0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
600     0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
601     0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
602     0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
603     0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
604     0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
605     0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
606     0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
607     0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
608 };
609 
610 static const uint32_t AES_Td0[256] = {
611     0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
612     0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
613     0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
614     0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
615     0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
616     0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
617     0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
618     0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
619     0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
620     0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
621     0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
622     0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
623     0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
624     0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
625     0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
626     0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
627     0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
628     0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
629     0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
630     0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
631     0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
632     0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
633     0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
634     0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
635     0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
636     0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
637     0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
638     0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
639     0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
640     0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
641     0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
642     0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
643     0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
644     0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
645     0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
646     0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
647     0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
648     0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
649     0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
650     0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
651     0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
652     0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
653     0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
654     0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
655     0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
656     0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
657     0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
658     0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
659     0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
660     0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
661     0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
662     0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
663     0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
664     0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
665     0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
666     0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
667     0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
668     0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
669     0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
670     0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
671     0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
672     0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
673     0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
674     0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U,
675 };
676 
677 static const uint32_t AES_Td1[256] = {
678     0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
679     0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
680     0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
681     0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
682     0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
683     0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
684     0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
685     0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
686     0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
687     0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
688     0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
689     0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
690     0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
691     0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
692     0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
693     0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
694     0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
695     0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
696     0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
697     0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
698     0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
699     0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
700     0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
701     0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
702     0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
703     0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
704     0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
705     0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
706     0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
707     0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
708     0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
709     0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
710     0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
711     0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
712     0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
713     0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
714     0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
715     0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
716     0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
717     0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
718     0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
719     0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
720     0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
721     0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
722     0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
723     0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
724     0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
725     0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
726     0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
727     0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
728     0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
729     0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
730     0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
731     0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
732     0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
733     0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
734     0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
735     0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
736     0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
737     0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
738     0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
739     0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
740     0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
741     0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U,
742 };
743 
744 static const uint32_t AES_Td2[256] = {
745     0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
746     0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
747     0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
748     0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
749     0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
750     0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
751     0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
752     0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
753     0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
754     0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
755     0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
756     0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
757     0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
758     0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
759     0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
760     0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
761     0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
762     0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
763     0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
764     0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
765 
766     0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
767     0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
768     0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
769     0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
770     0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
771     0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
772     0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
773     0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
774     0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
775     0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
776     0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
777     0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
778     0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
779     0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
780     0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
781     0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
782     0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
783     0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
784     0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
785     0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
786     0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
787     0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
788     0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
789     0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
790     0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
791     0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
792     0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
793     0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
794     0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
795     0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
796     0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
797     0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
798     0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
799     0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
800     0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
801     0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
802     0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
803     0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
804     0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
805     0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
806     0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
807     0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
808     0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
809     0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U,
810 };
811 
812 static const uint32_t AES_Td3[256] = {
813     0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
814     0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
815     0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
816     0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
817     0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
818     0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
819     0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
820     0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
821     0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
822     0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
823     0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
824     0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
825     0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
826     0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
827     0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
828     0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
829     0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
830     0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
831     0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
832     0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
833     0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
834     0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
835     0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
836     0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
837     0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
838     0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
839     0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
840     0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
841     0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
842     0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
843     0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
844     0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
845     0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
846     0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
847     0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
848     0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
849     0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
850     0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
851     0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
852     0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
853     0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
854     0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
855     0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
856     0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
857     0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
858     0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
859     0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
860     0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
861     0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
862     0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
863     0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
864     0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
865     0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
866     0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
867     0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
868     0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
869     0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
870     0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
871     0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
872     0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
873     0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
874     0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
875     0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
876     0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U,
877 };
878 
879 static const uint32_t AES_Td4[256] = {
880     0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
881     0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
882     0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
883     0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
884     0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
885     0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
886     0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
887     0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
888     0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
889     0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
890     0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
891     0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
892     0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
893     0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
894     0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
895     0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
896     0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
897     0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
898     0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
899     0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
900     0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
901     0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
902     0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
903     0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
904     0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
905     0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
906     0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
907     0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
908     0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
909     0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
910     0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
911     0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
912     0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
913     0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
914     0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
915     0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
916     0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
917     0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
918     0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
919     0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
920     0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
921     0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
922     0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
923     0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
924     0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
925     0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
926     0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
927     0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
928     0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
929     0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
930     0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
931     0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
932     0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
933     0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
934     0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
935     0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
936     0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
937     0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
938     0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
939     0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
940     0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
941     0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
942     0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
943     0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU,
944 };
945 
946 static const u32 rcon[] = {
947         0x01000000, 0x02000000, 0x04000000, 0x08000000,
948         0x10000000, 0x20000000, 0x40000000, 0x80000000,
949         0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
950 };
951 
952 /*
953  * Perform MixColumns.
954  */
955 static inline void
956 aesenc_MC_swap(AESState *r, const AESState *st, bool swap)
957 {
958     int swap_b = swap * 0xf;
959     int swap_w = swap * 0x3;
960     bool be = HOST_BIG_ENDIAN ^ swap;
961     uint32_t t;
962 
963     /* Note that AES_mc_rot is encoded for little-endian. */
964     t = (      AES_mc_rot[st->b[swap_b ^ 0x0]] ^
965          rol32(AES_mc_rot[st->b[swap_b ^ 0x1]], 8) ^
966          rol32(AES_mc_rot[st->b[swap_b ^ 0x2]], 16) ^
967          rol32(AES_mc_rot[st->b[swap_b ^ 0x3]], 24));
968     if (be) {
969         t = bswap32(t);
970     }
971     r->w[swap_w ^ 0] = t;
972 
973     t = (      AES_mc_rot[st->b[swap_b ^ 0x4]] ^
974          rol32(AES_mc_rot[st->b[swap_b ^ 0x5]], 8) ^
975          rol32(AES_mc_rot[st->b[swap_b ^ 0x6]], 16) ^
976          rol32(AES_mc_rot[st->b[swap_b ^ 0x7]], 24));
977     if (be) {
978         t = bswap32(t);
979     }
980     r->w[swap_w ^ 1] = t;
981 
982     t = (      AES_mc_rot[st->b[swap_b ^ 0x8]] ^
983          rol32(AES_mc_rot[st->b[swap_b ^ 0x9]], 8) ^
984          rol32(AES_mc_rot[st->b[swap_b ^ 0xA]], 16) ^
985          rol32(AES_mc_rot[st->b[swap_b ^ 0xB]], 24));
986     if (be) {
987         t = bswap32(t);
988     }
989     r->w[swap_w ^ 2] = t;
990 
991     t = (      AES_mc_rot[st->b[swap_b ^ 0xC]] ^
992          rol32(AES_mc_rot[st->b[swap_b ^ 0xD]], 8) ^
993          rol32(AES_mc_rot[st->b[swap_b ^ 0xE]], 16) ^
994          rol32(AES_mc_rot[st->b[swap_b ^ 0xF]], 24));
995     if (be) {
996         t = bswap32(t);
997     }
998     r->w[swap_w ^ 3] = t;
999 }
1000 
1001 void aesenc_MC_gen(AESState *r, const AESState *st)
1002 {
1003     aesenc_MC_swap(r, st, false);
1004 }
1005 
1006 void aesenc_MC_genrev(AESState *r, const AESState *st)
1007 {
1008     aesenc_MC_swap(r, st, true);
1009 }
1010 
1011 /*
1012  * Perform SubBytes + ShiftRows + AddRoundKey.
1013  */
1014 static inline void
1015 aesenc_SB_SR_AK_swap(AESState *ret, const AESState *st,
1016                      const AESState *rk, bool swap)
1017 {
1018     const int swap_b = swap ? 15 : 0;
1019     AESState t;
1020 
1021     t.b[swap_b ^ 0x0] = AES_sbox[st->b[swap_b ^ AES_SH(0x0)]];
1022     t.b[swap_b ^ 0x1] = AES_sbox[st->b[swap_b ^ AES_SH(0x1)]];
1023     t.b[swap_b ^ 0x2] = AES_sbox[st->b[swap_b ^ AES_SH(0x2)]];
1024     t.b[swap_b ^ 0x3] = AES_sbox[st->b[swap_b ^ AES_SH(0x3)]];
1025     t.b[swap_b ^ 0x4] = AES_sbox[st->b[swap_b ^ AES_SH(0x4)]];
1026     t.b[swap_b ^ 0x5] = AES_sbox[st->b[swap_b ^ AES_SH(0x5)]];
1027     t.b[swap_b ^ 0x6] = AES_sbox[st->b[swap_b ^ AES_SH(0x6)]];
1028     t.b[swap_b ^ 0x7] = AES_sbox[st->b[swap_b ^ AES_SH(0x7)]];
1029     t.b[swap_b ^ 0x8] = AES_sbox[st->b[swap_b ^ AES_SH(0x8)]];
1030     t.b[swap_b ^ 0x9] = AES_sbox[st->b[swap_b ^ AES_SH(0x9)]];
1031     t.b[swap_b ^ 0xa] = AES_sbox[st->b[swap_b ^ AES_SH(0xA)]];
1032     t.b[swap_b ^ 0xb] = AES_sbox[st->b[swap_b ^ AES_SH(0xB)]];
1033     t.b[swap_b ^ 0xc] = AES_sbox[st->b[swap_b ^ AES_SH(0xC)]];
1034     t.b[swap_b ^ 0xd] = AES_sbox[st->b[swap_b ^ AES_SH(0xD)]];
1035     t.b[swap_b ^ 0xe] = AES_sbox[st->b[swap_b ^ AES_SH(0xE)]];
1036     t.b[swap_b ^ 0xf] = AES_sbox[st->b[swap_b ^ AES_SH(0xF)]];
1037 
1038     /*
1039      * Perform the AddRoundKey with generic vectors.
1040      * This may be expanded to either host integer or host vector code.
1041      * The key and output endianness match, so no bswap required.
1042      */
1043     ret->v = t.v ^ rk->v;
1044 }
1045 
1046 void aesenc_SB_SR_AK_gen(AESState *r, const AESState *s, const AESState *k)
1047 {
1048     aesenc_SB_SR_AK_swap(r, s, k, false);
1049 }
1050 
1051 void aesenc_SB_SR_AK_genrev(AESState *r, const AESState *s, const AESState *k)
1052 {
1053     aesenc_SB_SR_AK_swap(r, s, k, true);
1054 }
1055 
1056 /*
1057  * Perform SubBytes + ShiftRows + MixColumns + AddRoundKey.
1058  */
1059 static inline void
1060 aesenc_SB_SR_MC_AK_swap(AESState *r, const AESState *st,
1061                         const AESState *rk, bool swap)
1062 {
1063     int swap_b = swap * 0xf;
1064     int swap_w = swap * 0x3;
1065     bool be = HOST_BIG_ENDIAN ^ swap;
1066     uint32_t w0, w1, w2, w3;
1067 
1068     w0 = (AES_Te0[st->b[swap_b ^ AES_SH(0x0)]] ^
1069           AES_Te1[st->b[swap_b ^ AES_SH(0x1)]] ^
1070           AES_Te2[st->b[swap_b ^ AES_SH(0x2)]] ^
1071           AES_Te3[st->b[swap_b ^ AES_SH(0x3)]]);
1072 
1073     w1 = (AES_Te0[st->b[swap_b ^ AES_SH(0x4)]] ^
1074           AES_Te1[st->b[swap_b ^ AES_SH(0x5)]] ^
1075           AES_Te2[st->b[swap_b ^ AES_SH(0x6)]] ^
1076           AES_Te3[st->b[swap_b ^ AES_SH(0x7)]]);
1077 
1078     w2 = (AES_Te0[st->b[swap_b ^ AES_SH(0x8)]] ^
1079           AES_Te1[st->b[swap_b ^ AES_SH(0x9)]] ^
1080           AES_Te2[st->b[swap_b ^ AES_SH(0xA)]] ^
1081           AES_Te3[st->b[swap_b ^ AES_SH(0xB)]]);
1082 
1083     w3 = (AES_Te0[st->b[swap_b ^ AES_SH(0xC)]] ^
1084           AES_Te1[st->b[swap_b ^ AES_SH(0xD)]] ^
1085           AES_Te2[st->b[swap_b ^ AES_SH(0xE)]] ^
1086           AES_Te3[st->b[swap_b ^ AES_SH(0xF)]]);
1087 
1088     /* Note that AES_TeX is encoded for big-endian. */
1089     if (!be) {
1090         w0 = bswap32(w0);
1091         w1 = bswap32(w1);
1092         w2 = bswap32(w2);
1093         w3 = bswap32(w3);
1094     }
1095 
1096     r->w[swap_w ^ 0] = rk->w[swap_w ^ 0] ^ w0;
1097     r->w[swap_w ^ 1] = rk->w[swap_w ^ 1] ^ w1;
1098     r->w[swap_w ^ 2] = rk->w[swap_w ^ 2] ^ w2;
1099     r->w[swap_w ^ 3] = rk->w[swap_w ^ 3] ^ w3;
1100 }
1101 
1102 void aesenc_SB_SR_MC_AK_gen(AESState *r, const AESState *st,
1103                             const AESState *rk)
1104 {
1105     aesenc_SB_SR_MC_AK_swap(r, st, rk, false);
1106 }
1107 
1108 void aesenc_SB_SR_MC_AK_genrev(AESState *r, const AESState *st,
1109                                const AESState *rk)
1110 {
1111     aesenc_SB_SR_MC_AK_swap(r, st, rk, true);
1112 }
1113 
1114 /*
1115  * Perform InvMixColumns.
1116  */
1117 static inline void
1118 aesdec_IMC_swap(AESState *r, const AESState *st, bool swap)
1119 {
1120     int swap_b = swap * 0xf;
1121     int swap_w = swap * 0x3;
1122     bool be = HOST_BIG_ENDIAN ^ swap;
1123     uint32_t t;
1124 
1125     /* Note that AES_imc_rot is encoded for little-endian. */
1126     t = (      AES_imc_rot[st->b[swap_b ^ 0x0]] ^
1127          rol32(AES_imc_rot[st->b[swap_b ^ 0x1]], 8) ^
1128          rol32(AES_imc_rot[st->b[swap_b ^ 0x2]], 16) ^
1129          rol32(AES_imc_rot[st->b[swap_b ^ 0x3]], 24));
1130     if (be) {
1131         t = bswap32(t);
1132     }
1133     r->w[swap_w ^ 0] = t;
1134 
1135     t = (      AES_imc_rot[st->b[swap_b ^ 0x4]] ^
1136          rol32(AES_imc_rot[st->b[swap_b ^ 0x5]], 8) ^
1137          rol32(AES_imc_rot[st->b[swap_b ^ 0x6]], 16) ^
1138          rol32(AES_imc_rot[st->b[swap_b ^ 0x7]], 24));
1139     if (be) {
1140         t = bswap32(t);
1141     }
1142     r->w[swap_w ^ 1] = t;
1143 
1144     t = (      AES_imc_rot[st->b[swap_b ^ 0x8]] ^
1145          rol32(AES_imc_rot[st->b[swap_b ^ 0x9]], 8) ^
1146          rol32(AES_imc_rot[st->b[swap_b ^ 0xA]], 16) ^
1147          rol32(AES_imc_rot[st->b[swap_b ^ 0xB]], 24));
1148     if (be) {
1149         t = bswap32(t);
1150     }
1151     r->w[swap_w ^ 2] = t;
1152 
1153     t = (      AES_imc_rot[st->b[swap_b ^ 0xC]] ^
1154          rol32(AES_imc_rot[st->b[swap_b ^ 0xD]], 8) ^
1155          rol32(AES_imc_rot[st->b[swap_b ^ 0xE]], 16) ^
1156          rol32(AES_imc_rot[st->b[swap_b ^ 0xF]], 24));
1157     if (be) {
1158         t = bswap32(t);
1159     }
1160     r->w[swap_w ^ 3] = t;
1161 }
1162 
1163 void aesdec_IMC_gen(AESState *r, const AESState *st)
1164 {
1165     aesdec_IMC_swap(r, st, false);
1166 }
1167 
1168 void aesdec_IMC_genrev(AESState *r, const AESState *st)
1169 {
1170     aesdec_IMC_swap(r, st, true);
1171 }
1172 
1173 /*
1174  * Perform InvSubBytes + InvShiftRows + AddRoundKey.
1175  */
1176 static inline void
1177 aesdec_ISB_ISR_AK_swap(AESState *ret, const AESState *st,
1178                        const AESState *rk, bool swap)
1179 {
1180     const int swap_b = swap ? 15 : 0;
1181     AESState t;
1182 
1183     t.b[swap_b ^ 0x0] = AES_isbox[st->b[swap_b ^ AES_ISH(0x0)]];
1184     t.b[swap_b ^ 0x1] = AES_isbox[st->b[swap_b ^ AES_ISH(0x1)]];
1185     t.b[swap_b ^ 0x2] = AES_isbox[st->b[swap_b ^ AES_ISH(0x2)]];
1186     t.b[swap_b ^ 0x3] = AES_isbox[st->b[swap_b ^ AES_ISH(0x3)]];
1187     t.b[swap_b ^ 0x4] = AES_isbox[st->b[swap_b ^ AES_ISH(0x4)]];
1188     t.b[swap_b ^ 0x5] = AES_isbox[st->b[swap_b ^ AES_ISH(0x5)]];
1189     t.b[swap_b ^ 0x6] = AES_isbox[st->b[swap_b ^ AES_ISH(0x6)]];
1190     t.b[swap_b ^ 0x7] = AES_isbox[st->b[swap_b ^ AES_ISH(0x7)]];
1191     t.b[swap_b ^ 0x8] = AES_isbox[st->b[swap_b ^ AES_ISH(0x8)]];
1192     t.b[swap_b ^ 0x9] = AES_isbox[st->b[swap_b ^ AES_ISH(0x9)]];
1193     t.b[swap_b ^ 0xa] = AES_isbox[st->b[swap_b ^ AES_ISH(0xA)]];
1194     t.b[swap_b ^ 0xb] = AES_isbox[st->b[swap_b ^ AES_ISH(0xB)]];
1195     t.b[swap_b ^ 0xc] = AES_isbox[st->b[swap_b ^ AES_ISH(0xC)]];
1196     t.b[swap_b ^ 0xd] = AES_isbox[st->b[swap_b ^ AES_ISH(0xD)]];
1197     t.b[swap_b ^ 0xe] = AES_isbox[st->b[swap_b ^ AES_ISH(0xE)]];
1198     t.b[swap_b ^ 0xf] = AES_isbox[st->b[swap_b ^ AES_ISH(0xF)]];
1199 
1200     /*
1201      * Perform the AddRoundKey with generic vectors.
1202      * This may be expanded to either host integer or host vector code.
1203      * The key and output endianness match, so no bswap required.
1204      */
1205     ret->v = t.v ^ rk->v;
1206 }
1207 
1208 void aesdec_ISB_ISR_AK_gen(AESState *r, const AESState *s, const AESState *k)
1209 {
1210     aesdec_ISB_ISR_AK_swap(r, s, k, false);
1211 }
1212 
1213 void aesdec_ISB_ISR_AK_genrev(AESState *r, const AESState *s, const AESState *k)
1214 {
1215     aesdec_ISB_ISR_AK_swap(r, s, k, true);
1216 }
1217 
1218 /*
1219  * Perform InvSubBytes + InvShiftRows + InvMixColumns + AddRoundKey.
1220  */
1221 static inline void
1222 aesdec_ISB_ISR_IMC_AK_swap(AESState *r, const AESState *st,
1223                            const AESState *rk, bool swap)
1224 {
1225     int swap_b = swap * 0xf;
1226     int swap_w = swap * 0x3;
1227     bool be = HOST_BIG_ENDIAN ^ swap;
1228     uint32_t w0, w1, w2, w3;
1229 
1230     w0 = (AES_Td0[st->b[swap_b ^ AES_ISH(0x0)]] ^
1231           AES_Td1[st->b[swap_b ^ AES_ISH(0x1)]] ^
1232           AES_Td2[st->b[swap_b ^ AES_ISH(0x2)]] ^
1233           AES_Td3[st->b[swap_b ^ AES_ISH(0x3)]]);
1234 
1235     w1 = (AES_Td0[st->b[swap_b ^ AES_ISH(0x4)]] ^
1236           AES_Td1[st->b[swap_b ^ AES_ISH(0x5)]] ^
1237           AES_Td2[st->b[swap_b ^ AES_ISH(0x6)]] ^
1238           AES_Td3[st->b[swap_b ^ AES_ISH(0x7)]]);
1239 
1240     w2 = (AES_Td0[st->b[swap_b ^ AES_ISH(0x8)]] ^
1241           AES_Td1[st->b[swap_b ^ AES_ISH(0x9)]] ^
1242           AES_Td2[st->b[swap_b ^ AES_ISH(0xA)]] ^
1243           AES_Td3[st->b[swap_b ^ AES_ISH(0xB)]]);
1244 
1245     w3 = (AES_Td0[st->b[swap_b ^ AES_ISH(0xC)]] ^
1246           AES_Td1[st->b[swap_b ^ AES_ISH(0xD)]] ^
1247           AES_Td2[st->b[swap_b ^ AES_ISH(0xE)]] ^
1248           AES_Td3[st->b[swap_b ^ AES_ISH(0xF)]]);
1249 
1250     /* Note that AES_TdX is encoded for big-endian. */
1251     if (!be) {
1252         w0 = bswap32(w0);
1253         w1 = bswap32(w1);
1254         w2 = bswap32(w2);
1255         w3 = bswap32(w3);
1256     }
1257 
1258     r->w[swap_w ^ 0] = rk->w[swap_w ^ 0] ^ w0;
1259     r->w[swap_w ^ 1] = rk->w[swap_w ^ 1] ^ w1;
1260     r->w[swap_w ^ 2] = rk->w[swap_w ^ 2] ^ w2;
1261     r->w[swap_w ^ 3] = rk->w[swap_w ^ 3] ^ w3;
1262 }
1263 
1264 void aesdec_ISB_ISR_IMC_AK_gen(AESState *r, const AESState *st,
1265                                const AESState *rk)
1266 {
1267     aesdec_ISB_ISR_IMC_AK_swap(r, st, rk, false);
1268 }
1269 
1270 void aesdec_ISB_ISR_IMC_AK_genrev(AESState *r, const AESState *st,
1271                                   const AESState *rk)
1272 {
1273     aesdec_ISB_ISR_IMC_AK_swap(r, st, rk, true);
1274 }
1275 
1276 void aesdec_ISB_ISR_AK_IMC_gen(AESState *ret, const AESState *st,
1277                                const AESState *rk)
1278 {
1279     aesdec_ISB_ISR_AK_gen(ret, st, rk);
1280     aesdec_IMC_gen(ret, ret);
1281 }
1282 
1283 void aesdec_ISB_ISR_AK_IMC_genrev(AESState *ret, const AESState *st,
1284                                   const AESState *rk)
1285 {
1286     aesdec_ISB_ISR_AK_genrev(ret, st, rk);
1287     aesdec_IMC_genrev(ret, ret);
1288 }
1289 
1290 /**
1291  * Expand the cipher key into the encryption key schedule.
1292  */
1293 int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
1294                         AES_KEY *key) {
1295 
1296         u32 *rk;
1297         int i = 0;
1298         u32 temp;
1299 
1300         if (!userKey || !key)
1301                 return -1;
1302         if (bits != 128 && bits != 192 && bits != 256)
1303                 return -2;
1304 
1305         rk = key->rd_key;
1306 
1307         if (bits == 128)
1308                 key->rounds = 10;
1309         else if (bits == 192)
1310                 key->rounds = 12;
1311         else
1312                 key->rounds = 14;
1313 
1314         rk[0] = GETU32(userKey     );
1315         rk[1] = GETU32(userKey +  4);
1316         rk[2] = GETU32(userKey +  8);
1317         rk[3] = GETU32(userKey + 12);
1318         if (bits == 128) {
1319                 while (1) {
1320                         temp  = rk[3];
1321                         rk[4] = rk[0] ^
1322                                 (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
1323                                 (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
1324                                 (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
1325                                 (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
1326                                 rcon[i];
1327                         rk[5] = rk[1] ^ rk[4];
1328                         rk[6] = rk[2] ^ rk[5];
1329                         rk[7] = rk[3] ^ rk[6];
1330                         if (++i == 10) {
1331                                 return 0;
1332                         }
1333                         rk += 4;
1334                 }
1335         }
1336         rk[4] = GETU32(userKey + 16);
1337         rk[5] = GETU32(userKey + 20);
1338         if (bits == 192) {
1339                 while (1) {
1340                         temp = rk[ 5];
1341                         rk[ 6] = rk[ 0] ^
1342                                 (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
1343                                 (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
1344                                 (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
1345                                 (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
1346                                 rcon[i];
1347                         rk[ 7] = rk[ 1] ^ rk[ 6];
1348                         rk[ 8] = rk[ 2] ^ rk[ 7];
1349                         rk[ 9] = rk[ 3] ^ rk[ 8];
1350                         if (++i == 8) {
1351                                 return 0;
1352                         }
1353                         rk[10] = rk[ 4] ^ rk[ 9];
1354                         rk[11] = rk[ 5] ^ rk[10];
1355                         rk += 6;
1356                 }
1357         }
1358         rk[6] = GETU32(userKey + 24);
1359         rk[7] = GETU32(userKey + 28);
1360         if (bits == 256) {
1361                 while (1) {
1362                         temp = rk[ 7];
1363                         rk[ 8] = rk[ 0] ^
1364                                 (AES_Te4[(temp >> 16) & 0xff] & 0xff000000) ^
1365                                 (AES_Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
1366                                 (AES_Te4[(temp      ) & 0xff] & 0x0000ff00) ^
1367                                 (AES_Te4[(temp >> 24)       ] & 0x000000ff) ^
1368                                 rcon[i];
1369                         rk[ 9] = rk[ 1] ^ rk[ 8];
1370                         rk[10] = rk[ 2] ^ rk[ 9];
1371                         rk[11] = rk[ 3] ^ rk[10];
1372                         if (++i == 7) {
1373                                 return 0;
1374                         }
1375                         temp = rk[11];
1376                         rk[12] = rk[ 4] ^
1377                                 (AES_Te4[(temp >> 24)       ] & 0xff000000) ^
1378                                 (AES_Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
1379                                 (AES_Te4[(temp >>  8) & 0xff] & 0x0000ff00) ^
1380                                 (AES_Te4[(temp      ) & 0xff] & 0x000000ff);
1381                         rk[13] = rk[ 5] ^ rk[12];
1382                         rk[14] = rk[ 6] ^ rk[13];
1383                         rk[15] = rk[ 7] ^ rk[14];
1384 
1385                         rk += 8;
1386                 }
1387         }
1388         abort();
1389 }
1390 
1391 /**
1392  * Expand the cipher key into the decryption key schedule.
1393  */
1394 int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
1395                          AES_KEY *key) {
1396 
1397         u32 *rk;
1398         int i, j, status;
1399         u32 temp;
1400 
1401         /* first, start with an encryption schedule */
1402         status = AES_set_encrypt_key(userKey, bits, key);
1403         if (status < 0)
1404                 return status;
1405 
1406         rk = key->rd_key;
1407 
1408         /* invert the order of the round keys: */
1409         for (i = 0, j = 4 * (key->rounds); i < j; i += 4, j -= 4) {
1410                 temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
1411                 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
1412                 temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
1413                 temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
1414         }
1415         /* apply the inverse MixColumn transform to all round keys but the first and the last: */
1416         for (i = 1; i < (key->rounds); i++) {
1417                 rk += 4;
1418                 rk[0] =
1419                         AES_Td0[AES_Te4[(rk[0] >> 24)       ] & 0xff] ^
1420                         AES_Td1[AES_Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
1421                         AES_Td2[AES_Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
1422                         AES_Td3[AES_Te4[(rk[0]      ) & 0xff] & 0xff];
1423                 rk[1] =
1424                         AES_Td0[AES_Te4[(rk[1] >> 24)       ] & 0xff] ^
1425                         AES_Td1[AES_Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
1426                         AES_Td2[AES_Te4[(rk[1] >>  8) & 0xff] & 0xff] ^
1427                         AES_Td3[AES_Te4[(rk[1]      ) & 0xff] & 0xff];
1428                 rk[2] =
1429                         AES_Td0[AES_Te4[(rk[2] >> 24)       ] & 0xff] ^
1430                         AES_Td1[AES_Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
1431                         AES_Td2[AES_Te4[(rk[2] >>  8) & 0xff] & 0xff] ^
1432                         AES_Td3[AES_Te4[(rk[2]      ) & 0xff] & 0xff];
1433                 rk[3] =
1434                         AES_Td0[AES_Te4[(rk[3] >> 24)       ] & 0xff] ^
1435                         AES_Td1[AES_Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
1436                         AES_Td2[AES_Te4[(rk[3] >>  8) & 0xff] & 0xff] ^
1437                         AES_Td3[AES_Te4[(rk[3]      ) & 0xff] & 0xff];
1438         }
1439         return 0;
1440 }
1441 
1442 #ifndef AES_ASM
1443 /*
1444  * Encrypt a single block
1445  * in and out can overlap
1446  */
1447 void AES_encrypt(const unsigned char *in, unsigned char *out,
1448                  const AES_KEY *key) {
1449 
1450         const u32 *rk;
1451         u32 s0, s1, s2, s3, t0, t1, t2, t3;
1452 #ifndef FULL_UNROLL
1453         int r;
1454 #endif /* ?FULL_UNROLL */
1455 
1456         assert(in && out && key);
1457         rk = key->rd_key;
1458 
1459         /*
1460          * map byte array block to cipher state
1461          * and add initial round key:
1462          */
1463         s0 = GETU32(in     ) ^ rk[0];
1464         s1 = GETU32(in +  4) ^ rk[1];
1465         s2 = GETU32(in +  8) ^ rk[2];
1466         s3 = GETU32(in + 12) ^ rk[3];
1467 #ifdef FULL_UNROLL
1468         /* round 1: */
1469         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[ 4];
1470         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[ 5];
1471         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[ 6];
1472         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[ 7];
1473         /* round 2: */
1474         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[ 8];
1475         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[ 9];
1476         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[10];
1477         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[11];
1478         /* round 3: */
1479         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[12];
1480         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[13];
1481         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[14];
1482         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[15];
1483         /* round 4: */
1484         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[16];
1485         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[17];
1486         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[18];
1487         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[19];
1488         /* round 5: */
1489         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[20];
1490         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[21];
1491         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[22];
1492         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[23];
1493         /* round 6: */
1494         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[24];
1495         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[25];
1496         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[26];
1497         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[27];
1498         /* round 7: */
1499         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[28];
1500         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[29];
1501         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[30];
1502         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[31];
1503         /* round 8: */
1504         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[32];
1505         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[33];
1506         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[34];
1507         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[35];
1508         /* round 9: */
1509         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[36];
1510         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[37];
1511         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[38];
1512         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[39];
1513     if (key->rounds > 10) {
1514         /* round 10: */
1515         s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[40];
1516         s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[41];
1517         s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[42];
1518         s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[43];
1519         /* round 11: */
1520         t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[44];
1521         t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[45];
1522         t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[46];
1523         t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[47];
1524         if (key->rounds > 12) {
1525             /* round 12: */
1526             s0 = AES_Te0[t0 >> 24] ^ AES_Te1[(t1 >> 16) & 0xff] ^ AES_Te2[(t2 >>  8) & 0xff] ^ AES_Te3[t3 & 0xff] ^ rk[48];
1527             s1 = AES_Te0[t1 >> 24] ^ AES_Te1[(t2 >> 16) & 0xff] ^ AES_Te2[(t3 >>  8) & 0xff] ^ AES_Te3[t0 & 0xff] ^ rk[49];
1528             s2 = AES_Te0[t2 >> 24] ^ AES_Te1[(t3 >> 16) & 0xff] ^ AES_Te2[(t0 >>  8) & 0xff] ^ AES_Te3[t1 & 0xff] ^ rk[50];
1529             s3 = AES_Te0[t3 >> 24] ^ AES_Te1[(t0 >> 16) & 0xff] ^ AES_Te2[(t1 >>  8) & 0xff] ^ AES_Te3[t2 & 0xff] ^ rk[51];
1530             /* round 13: */
1531             t0 = AES_Te0[s0 >> 24] ^ AES_Te1[(s1 >> 16) & 0xff] ^ AES_Te2[(s2 >>  8) & 0xff] ^ AES_Te3[s3 & 0xff] ^ rk[52];
1532             t1 = AES_Te0[s1 >> 24] ^ AES_Te1[(s2 >> 16) & 0xff] ^ AES_Te2[(s3 >>  8) & 0xff] ^ AES_Te3[s0 & 0xff] ^ rk[53];
1533             t2 = AES_Te0[s2 >> 24] ^ AES_Te1[(s3 >> 16) & 0xff] ^ AES_Te2[(s0 >>  8) & 0xff] ^ AES_Te3[s1 & 0xff] ^ rk[54];
1534             t3 = AES_Te0[s3 >> 24] ^ AES_Te1[(s0 >> 16) & 0xff] ^ AES_Te2[(s1 >>  8) & 0xff] ^ AES_Te3[s2 & 0xff] ^ rk[55];
1535         }
1536     }
1537     rk += key->rounds << 2;
1538 #else  /* !FULL_UNROLL */
1539     /*
1540      * Nr - 1 full rounds:
1541      */
1542     r = key->rounds >> 1;
1543     for (;;) {
1544         t0 =
1545             AES_Te0[(s0 >> 24)       ] ^
1546             AES_Te1[(s1 >> 16) & 0xff] ^
1547             AES_Te2[(s2 >>  8) & 0xff] ^
1548             AES_Te3[(s3      ) & 0xff] ^
1549             rk[4];
1550         t1 =
1551             AES_Te0[(s1 >> 24)       ] ^
1552             AES_Te1[(s2 >> 16) & 0xff] ^
1553             AES_Te2[(s3 >>  8) & 0xff] ^
1554             AES_Te3[(s0      ) & 0xff] ^
1555             rk[5];
1556         t2 =
1557             AES_Te0[(s2 >> 24)       ] ^
1558             AES_Te1[(s3 >> 16) & 0xff] ^
1559             AES_Te2[(s0 >>  8) & 0xff] ^
1560             AES_Te3[(s1      ) & 0xff] ^
1561             rk[6];
1562         t3 =
1563             AES_Te0[(s3 >> 24)       ] ^
1564             AES_Te1[(s0 >> 16) & 0xff] ^
1565             AES_Te2[(s1 >>  8) & 0xff] ^
1566             AES_Te3[(s2      ) & 0xff] ^
1567             rk[7];
1568 
1569         rk += 8;
1570         if (--r == 0) {
1571             break;
1572         }
1573 
1574         s0 =
1575             AES_Te0[(t0 >> 24)       ] ^
1576             AES_Te1[(t1 >> 16) & 0xff] ^
1577             AES_Te2[(t2 >>  8) & 0xff] ^
1578             AES_Te3[(t3      ) & 0xff] ^
1579             rk[0];
1580         s1 =
1581             AES_Te0[(t1 >> 24)       ] ^
1582             AES_Te1[(t2 >> 16) & 0xff] ^
1583             AES_Te2[(t3 >>  8) & 0xff] ^
1584             AES_Te3[(t0      ) & 0xff] ^
1585             rk[1];
1586         s2 =
1587             AES_Te0[(t2 >> 24)       ] ^
1588             AES_Te1[(t3 >> 16) & 0xff] ^
1589             AES_Te2[(t0 >>  8) & 0xff] ^
1590             AES_Te3[(t1      ) & 0xff] ^
1591             rk[2];
1592         s3 =
1593             AES_Te0[(t3 >> 24)       ] ^
1594             AES_Te1[(t0 >> 16) & 0xff] ^
1595             AES_Te2[(t1 >>  8) & 0xff] ^
1596             AES_Te3[(t2      ) & 0xff] ^
1597             rk[3];
1598     }
1599 #endif /* ?FULL_UNROLL */
1600     /*
1601          * apply last round and
1602          * map cipher state to byte array block:
1603          */
1604         s0 =
1605                 (AES_Te4[(t0 >> 24)       ] & 0xff000000) ^
1606                 (AES_Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1607                 (AES_Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1608                 (AES_Te4[(t3      ) & 0xff] & 0x000000ff) ^
1609                 rk[0];
1610         PUTU32(out     , s0);
1611         s1 =
1612                 (AES_Te4[(t1 >> 24)       ] & 0xff000000) ^
1613                 (AES_Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1614                 (AES_Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1615                 (AES_Te4[(t0      ) & 0xff] & 0x000000ff) ^
1616                 rk[1];
1617         PUTU32(out +  4, s1);
1618         s2 =
1619                 (AES_Te4[(t2 >> 24)       ] & 0xff000000) ^
1620                 (AES_Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1621                 (AES_Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1622                 (AES_Te4[(t1      ) & 0xff] & 0x000000ff) ^
1623                 rk[2];
1624         PUTU32(out +  8, s2);
1625         s3 =
1626                 (AES_Te4[(t3 >> 24)       ] & 0xff000000) ^
1627                 (AES_Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1628                 (AES_Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1629                 (AES_Te4[(t2      ) & 0xff] & 0x000000ff) ^
1630                 rk[3];
1631         PUTU32(out + 12, s3);
1632 }
1633 
1634 /*
1635  * Decrypt a single block
1636  * in and out can overlap
1637  */
1638 void AES_decrypt(const unsigned char *in, unsigned char *out,
1639                  const AES_KEY *key) {
1640 
1641         const u32 *rk;
1642         u32 s0, s1, s2, s3, t0, t1, t2, t3;
1643 #ifndef FULL_UNROLL
1644         int r;
1645 #endif /* ?FULL_UNROLL */
1646 
1647         assert(in && out && key);
1648         rk = key->rd_key;
1649 
1650         /*
1651          * map byte array block to cipher state
1652          * and add initial round key:
1653          */
1654     s0 = GETU32(in     ) ^ rk[0];
1655     s1 = GETU32(in +  4) ^ rk[1];
1656     s2 = GETU32(in +  8) ^ rk[2];
1657     s3 = GETU32(in + 12) ^ rk[3];
1658 #ifdef FULL_UNROLL
1659     /* round 1: */
1660     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[ 4];
1661     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[ 5];
1662     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[ 6];
1663     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[ 7];
1664     /* round 2: */
1665     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[ 8];
1666     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[ 9];
1667     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[10];
1668     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[11];
1669     /* round 3: */
1670     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[12];
1671     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[13];
1672     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[14];
1673     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[15];
1674     /* round 4: */
1675     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[16];
1676     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[17];
1677     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[18];
1678     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[19];
1679     /* round 5: */
1680     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[20];
1681     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[21];
1682     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[22];
1683     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[23];
1684     /* round 6: */
1685     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[24];
1686     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[25];
1687     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[26];
1688     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[27];
1689     /* round 7: */
1690     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[28];
1691     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[29];
1692     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[30];
1693     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[31];
1694     /* round 8: */
1695     s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[32];
1696     s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[33];
1697     s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[34];
1698     s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[35];
1699     /* round 9: */
1700     t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[36];
1701     t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[37];
1702     t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[38];
1703     t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[39];
1704     if (key->rounds > 10) {
1705         /* round 10: */
1706         s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[40];
1707         s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[41];
1708         s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[42];
1709         s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[43];
1710         /* round 11: */
1711         t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[44];
1712         t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[45];
1713         t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[46];
1714         t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[47];
1715         if (key->rounds > 12) {
1716             /* round 12: */
1717             s0 = AES_Td0[t0 >> 24] ^ AES_Td1[(t3 >> 16) & 0xff] ^ AES_Td2[(t2 >>  8) & 0xff] ^ AES_Td3[t1 & 0xff] ^ rk[48];
1718             s1 = AES_Td0[t1 >> 24] ^ AES_Td1[(t0 >> 16) & 0xff] ^ AES_Td2[(t3 >>  8) & 0xff] ^ AES_Td3[t2 & 0xff] ^ rk[49];
1719             s2 = AES_Td0[t2 >> 24] ^ AES_Td1[(t1 >> 16) & 0xff] ^ AES_Td2[(t0 >>  8) & 0xff] ^ AES_Td3[t3 & 0xff] ^ rk[50];
1720             s3 = AES_Td0[t3 >> 24] ^ AES_Td1[(t2 >> 16) & 0xff] ^ AES_Td2[(t1 >>  8) & 0xff] ^ AES_Td3[t0 & 0xff] ^ rk[51];
1721             /* round 13: */
1722             t0 = AES_Td0[s0 >> 24] ^ AES_Td1[(s3 >> 16) & 0xff] ^ AES_Td2[(s2 >>  8) & 0xff] ^ AES_Td3[s1 & 0xff] ^ rk[52];
1723             t1 = AES_Td0[s1 >> 24] ^ AES_Td1[(s0 >> 16) & 0xff] ^ AES_Td2[(s3 >>  8) & 0xff] ^ AES_Td3[s2 & 0xff] ^ rk[53];
1724             t2 = AES_Td0[s2 >> 24] ^ AES_Td1[(s1 >> 16) & 0xff] ^ AES_Td2[(s0 >>  8) & 0xff] ^ AES_Td3[s3 & 0xff] ^ rk[54];
1725             t3 = AES_Td0[s3 >> 24] ^ AES_Td1[(s2 >> 16) & 0xff] ^ AES_Td2[(s1 >>  8) & 0xff] ^ AES_Td3[s0 & 0xff] ^ rk[55];
1726         }
1727     }
1728         rk += key->rounds << 2;
1729 #else  /* !FULL_UNROLL */
1730     /*
1731      * Nr - 1 full rounds:
1732      */
1733     r = key->rounds >> 1;
1734     for (;;) {
1735         t0 =
1736             AES_Td0[(s0 >> 24)       ] ^
1737             AES_Td1[(s3 >> 16) & 0xff] ^
1738             AES_Td2[(s2 >>  8) & 0xff] ^
1739             AES_Td3[(s1      ) & 0xff] ^
1740             rk[4];
1741         t1 =
1742             AES_Td0[(s1 >> 24)       ] ^
1743             AES_Td1[(s0 >> 16) & 0xff] ^
1744             AES_Td2[(s3 >>  8) & 0xff] ^
1745             AES_Td3[(s2      ) & 0xff] ^
1746             rk[5];
1747         t2 =
1748             AES_Td0[(s2 >> 24)       ] ^
1749             AES_Td1[(s1 >> 16) & 0xff] ^
1750             AES_Td2[(s0 >>  8) & 0xff] ^
1751             AES_Td3[(s3      ) & 0xff] ^
1752             rk[6];
1753         t3 =
1754             AES_Td0[(s3 >> 24)       ] ^
1755             AES_Td1[(s2 >> 16) & 0xff] ^
1756             AES_Td2[(s1 >>  8) & 0xff] ^
1757             AES_Td3[(s0      ) & 0xff] ^
1758             rk[7];
1759 
1760         rk += 8;
1761         if (--r == 0) {
1762             break;
1763         }
1764 
1765         s0 =
1766             AES_Td0[(t0 >> 24)       ] ^
1767             AES_Td1[(t3 >> 16) & 0xff] ^
1768             AES_Td2[(t2 >>  8) & 0xff] ^
1769             AES_Td3[(t1      ) & 0xff] ^
1770             rk[0];
1771         s1 =
1772             AES_Td0[(t1 >> 24)       ] ^
1773             AES_Td1[(t0 >> 16) & 0xff] ^
1774             AES_Td2[(t3 >>  8) & 0xff] ^
1775             AES_Td3[(t2      ) & 0xff] ^
1776             rk[1];
1777         s2 =
1778             AES_Td0[(t2 >> 24)       ] ^
1779             AES_Td1[(t1 >> 16) & 0xff] ^
1780             AES_Td2[(t0 >>  8) & 0xff] ^
1781             AES_Td3[(t3      ) & 0xff] ^
1782             rk[2];
1783         s3 =
1784             AES_Td0[(t3 >> 24)       ] ^
1785             AES_Td1[(t2 >> 16) & 0xff] ^
1786             AES_Td2[(t1 >>  8) & 0xff] ^
1787             AES_Td3[(t0      ) & 0xff] ^
1788             rk[3];
1789     }
1790 #endif /* ?FULL_UNROLL */
1791     /*
1792          * apply last round and
1793          * map cipher state to byte array block:
1794          */
1795         s0 =
1796                 (AES_Td4[(t0 >> 24)       ] & 0xff000000) ^
1797                 (AES_Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
1798                 (AES_Td4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
1799                 (AES_Td4[(t1      ) & 0xff] & 0x000000ff) ^
1800                 rk[0];
1801         PUTU32(out     , s0);
1802         s1 =
1803                 (AES_Td4[(t1 >> 24)       ] & 0xff000000) ^
1804                 (AES_Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
1805                 (AES_Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
1806                 (AES_Td4[(t2      ) & 0xff] & 0x000000ff) ^
1807                 rk[1];
1808         PUTU32(out +  4, s1);
1809         s2 =
1810                 (AES_Td4[(t2 >> 24)       ] & 0xff000000) ^
1811                 (AES_Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
1812                 (AES_Td4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
1813                 (AES_Td4[(t3      ) & 0xff] & 0x000000ff) ^
1814                 rk[2];
1815         PUTU32(out +  8, s2);
1816         s3 =
1817                 (AES_Td4[(t3 >> 24)       ] & 0xff000000) ^
1818                 (AES_Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
1819                 (AES_Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
1820                 (AES_Td4[(t0      ) & 0xff] & 0x000000ff) ^
1821                 rk[3];
1822         PUTU32(out + 12, s3);
1823 }
1824 
1825 #endif /* AES_ASM */
1826