xref: /openbmc/u-boot/lib/aes.c (revision 989ce049)
1 /*
2  * Copyright (c) 2011 The Chromium OS Authors.
3  * (C) Copyright 2011 NVIDIA Corporation www.nvidia.com
4  *
5  * SPDX-License-Identifier:	GPL-2.0+
6  */
7 
8 /*
9  * advanced encryption standard
10  * author: karl malbrain, malbrain@yahoo.com
11  *
12  * This work, including the source code, documentation
13  * and related data, is placed into the public domain.
14  *
15  * The orginal author is Karl Malbrain.
16  *
17  * THIS SOFTWARE IS PROVIDED AS-IS WITHOUT WARRANTY
18  * OF ANY KIND, NOT EVEN THE IMPLIED WARRANTY OF
19  * MERCHANTABILITY. THE AUTHOR OF THIS SOFTWARE,
20  * ASSUMES _NO_ RESPONSIBILITY FOR ANY CONSEQUENCE
21  * RESULTING FROM THE USE, MODIFICATION, OR
22  * REDISTRIBUTION OF THIS SOFTWARE.
23 */
24 
25 #include <common.h>
26 #include "aes.h"
27 
28 /* forward s-box */
29 static const u8 sbox[256] = {
30 	0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5,
31 	0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76,
32 	0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0,
33 	0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0,
34 	0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc,
35 	0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15,
36 	0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a,
37 	0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75,
38 	0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0,
39 	0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84,
40 	0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b,
41 	0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf,
42 	0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85,
43 	0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8,
44 	0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5,
45 	0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2,
46 	0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17,
47 	0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73,
48 	0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88,
49 	0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb,
50 	0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c,
51 	0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79,
52 	0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9,
53 	0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08,
54 	0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6,
55 	0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a,
56 	0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e,
57 	0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e,
58 	0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94,
59 	0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf,
60 	0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68,
61 	0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16
62 };
63 
64 /* inverse s-box */
65 static const u8 inv_sbox[256] = {
66 	0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38,
67 	0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb,
68 	0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87,
69 	0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb,
70 	0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d,
71 	0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e,
72 	0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2,
73 	0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25,
74 	0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16,
75 	0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92,
76 	0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda,
77 	0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84,
78 	0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a,
79 	0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06,
80 	0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02,
81 	0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b,
82 	0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea,
83 	0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73,
84 	0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85,
85 	0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e,
86 	0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89,
87 	0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b,
88 	0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20,
89 	0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4,
90 	0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31,
91 	0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f,
92 	0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d,
93 	0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef,
94 	0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0,
95 	0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61,
96 	0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26,
97 	0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d
98 };
99 
100 /* combined Xtimes2[Sbox[]] */
101 static const u8 x2_sbox[256] = {
102 	0xc6, 0xf8, 0xee, 0xf6, 0xff, 0xd6, 0xde, 0x91,
103 	0x60, 0x02, 0xce, 0x56, 0xe7, 0xb5, 0x4d, 0xec,
104 	0x8f, 0x1f, 0x89, 0xfa, 0xef, 0xb2, 0x8e, 0xfb,
105 	0x41, 0xb3, 0x5f, 0x45, 0x23, 0x53, 0xe4, 0x9b,
106 	0x75, 0xe1, 0x3d, 0x4c, 0x6c, 0x7e, 0xf5, 0x83,
107 	0x68, 0x51, 0xd1, 0xf9, 0xe2, 0xab, 0x62, 0x2a,
108 	0x08, 0x95, 0x46, 0x9d, 0x30, 0x37, 0x0a, 0x2f,
109 	0x0e, 0x24, 0x1b, 0xdf, 0xcd, 0x4e, 0x7f, 0xea,
110 	0x12, 0x1d, 0x58, 0x34, 0x36, 0xdc, 0xb4, 0x5b,
111 	0xa4, 0x76, 0xb7, 0x7d, 0x52, 0xdd, 0x5e, 0x13,
112 	0xa6, 0xb9, 0x00, 0xc1, 0x40, 0xe3, 0x79, 0xb6,
113 	0xd4, 0x8d, 0x67, 0x72, 0x94, 0x98, 0xb0, 0x85,
114 	0xbb, 0xc5, 0x4f, 0xed, 0x86, 0x9a, 0x66, 0x11,
115 	0x8a, 0xe9, 0x04, 0xfe, 0xa0, 0x78, 0x25, 0x4b,
116 	0xa2, 0x5d, 0x80, 0x05, 0x3f, 0x21, 0x70, 0xf1,
117 	0x63, 0x77, 0xaf, 0x42, 0x20, 0xe5, 0xfd, 0xbf,
118 	0x81, 0x18, 0x26, 0xc3, 0xbe, 0x35, 0x88, 0x2e,
119 	0x93, 0x55, 0xfc, 0x7a, 0xc8, 0xba, 0x32, 0xe6,
120 	0xc0, 0x19, 0x9e, 0xa3, 0x44, 0x54, 0x3b, 0x0b,
121 	0x8c, 0xc7, 0x6b, 0x28, 0xa7, 0xbc, 0x16, 0xad,
122 	0xdb, 0x64, 0x74, 0x14, 0x92, 0x0c, 0x48, 0xb8,
123 	0x9f, 0xbd, 0x43, 0xc4, 0x39, 0x31, 0xd3, 0xf2,
124 	0xd5, 0x8b, 0x6e, 0xda, 0x01, 0xb1, 0x9c, 0x49,
125 	0xd8, 0xac, 0xf3, 0xcf, 0xca, 0xf4, 0x47, 0x10,
126 	0x6f, 0xf0, 0x4a, 0x5c, 0x38, 0x57, 0x73, 0x97,
127 	0xcb, 0xa1, 0xe8, 0x3e, 0x96, 0x61, 0x0d, 0x0f,
128 	0xe0, 0x7c, 0x71, 0xcc, 0x90, 0x06, 0xf7, 0x1c,
129 	0xc2, 0x6a, 0xae, 0x69, 0x17, 0x99, 0x3a, 0x27,
130 	0xd9, 0xeb, 0x2b, 0x22, 0xd2, 0xa9, 0x07, 0x33,
131 	0x2d, 0x3c, 0x15, 0xc9, 0x87, 0xaa, 0x50, 0xa5,
132 	0x03, 0x59, 0x09, 0x1a, 0x65, 0xd7, 0x84, 0xd0,
133 	0x82, 0x29, 0x5a, 0x1e, 0x7b, 0xa8, 0x6d, 0x2c
134 };
135 
136 /* combined Xtimes3[Sbox[]] */
137 static const u8 x3_sbox[256] = {
138 	0xa5, 0x84, 0x99, 0x8d, 0x0d, 0xbd, 0xb1, 0x54,
139 	0x50, 0x03, 0xa9, 0x7d, 0x19, 0x62, 0xe6, 0x9a,
140 	0x45, 0x9d, 0x40, 0x87, 0x15, 0xeb, 0xc9, 0x0b,
141 	0xec, 0x67, 0xfd, 0xea, 0xbf, 0xf7, 0x96, 0x5b,
142 	0xc2, 0x1c, 0xae, 0x6a, 0x5a, 0x41, 0x02, 0x4f,
143 	0x5c, 0xf4, 0x34, 0x08, 0x93, 0x73, 0x53, 0x3f,
144 	0x0c, 0x52, 0x65, 0x5e, 0x28, 0xa1, 0x0f, 0xb5,
145 	0x09, 0x36, 0x9b, 0x3d, 0x26, 0x69, 0xcd, 0x9f,
146 	0x1b, 0x9e, 0x74, 0x2e, 0x2d, 0xb2, 0xee, 0xfb,
147 	0xf6, 0x4d, 0x61, 0xce, 0x7b, 0x3e, 0x71, 0x97,
148 	0xf5, 0x68, 0x00, 0x2c, 0x60, 0x1f, 0xc8, 0xed,
149 	0xbe, 0x46, 0xd9, 0x4b, 0xde, 0xd4, 0xe8, 0x4a,
150 	0x6b, 0x2a, 0xe5, 0x16, 0xc5, 0xd7, 0x55, 0x94,
151 	0xcf, 0x10, 0x06, 0x81, 0xf0, 0x44, 0xba, 0xe3,
152 	0xf3, 0xfe, 0xc0, 0x8a, 0xad, 0xbc, 0x48, 0x04,
153 	0xdf, 0xc1, 0x75, 0x63, 0x30, 0x1a, 0x0e, 0x6d,
154 	0x4c, 0x14, 0x35, 0x2f, 0xe1, 0xa2, 0xcc, 0x39,
155 	0x57, 0xf2, 0x82, 0x47, 0xac, 0xe7, 0x2b, 0x95,
156 	0xa0, 0x98, 0xd1, 0x7f, 0x66, 0x7e, 0xab, 0x83,
157 	0xca, 0x29, 0xd3, 0x3c, 0x79, 0xe2, 0x1d, 0x76,
158 	0x3b, 0x56, 0x4e, 0x1e, 0xdb, 0x0a, 0x6c, 0xe4,
159 	0x5d, 0x6e, 0xef, 0xa6, 0xa8, 0xa4, 0x37, 0x8b,
160 	0x32, 0x43, 0x59, 0xb7, 0x8c, 0x64, 0xd2, 0xe0,
161 	0xb4, 0xfa, 0x07, 0x25, 0xaf, 0x8e, 0xe9, 0x18,
162 	0xd5, 0x88, 0x6f, 0x72, 0x24, 0xf1, 0xc7, 0x51,
163 	0x23, 0x7c, 0x9c, 0x21, 0xdd, 0xdc, 0x86, 0x85,
164 	0x90, 0x42, 0xc4, 0xaa, 0xd8, 0x05, 0x01, 0x12,
165 	0xa3, 0x5f, 0xf9, 0xd0, 0x91, 0x58, 0x27, 0xb9,
166 	0x38, 0x13, 0xb3, 0x33, 0xbb, 0x70, 0x89, 0xa7,
167 	0xb6, 0x22, 0x92, 0x20, 0x49, 0xff, 0x78, 0x7a,
168 	0x8f, 0xf8, 0x80, 0x17, 0xda, 0x31, 0xc6, 0xb8,
169 	0xc3, 0xb0, 0x77, 0x11, 0xcb, 0xfc, 0xd6, 0x3a
170 };
171 
172 /*
173  * modular multiplication tables based on:
174  *
175  * Xtime2[x] = (x & 0x80 ? 0x1b : 0) ^ (x + x)
176  * Xtime3[x] = x^Xtime2[x];
177  */
178 static const u8 x_time_9[256] = {
179 	0x00, 0x09, 0x12, 0x1b, 0x24, 0x2d, 0x36, 0x3f,
180 	0x48, 0x41, 0x5a, 0x53, 0x6c, 0x65, 0x7e, 0x77,
181 	0x90, 0x99, 0x82, 0x8b, 0xb4, 0xbd, 0xa6, 0xaf,
182 	0xd8, 0xd1, 0xca, 0xc3, 0xfc, 0xf5, 0xee, 0xe7,
183 	0x3b, 0x32, 0x29, 0x20, 0x1f, 0x16, 0x0d, 0x04,
184 	0x73, 0x7a, 0x61, 0x68, 0x57, 0x5e, 0x45, 0x4c,
185 	0xab, 0xa2, 0xb9, 0xb0, 0x8f, 0x86, 0x9d, 0x94,
186 	0xe3, 0xea, 0xf1, 0xf8, 0xc7, 0xce, 0xd5, 0xdc,
187 	0x76, 0x7f, 0x64, 0x6d, 0x52, 0x5b, 0x40, 0x49,
188 	0x3e, 0x37, 0x2c, 0x25, 0x1a, 0x13, 0x08, 0x01,
189 	0xe6, 0xef, 0xf4, 0xfd, 0xc2, 0xcb, 0xd0, 0xd9,
190 	0xae, 0xa7, 0xbc, 0xb5, 0x8a, 0x83, 0x98, 0x91,
191 	0x4d, 0x44, 0x5f, 0x56, 0x69, 0x60, 0x7b, 0x72,
192 	0x05, 0x0c, 0x17, 0x1e, 0x21, 0x28, 0x33, 0x3a,
193 	0xdd, 0xd4, 0xcf, 0xc6, 0xf9, 0xf0, 0xeb, 0xe2,
194 	0x95, 0x9c, 0x87, 0x8e, 0xb1, 0xb8, 0xa3, 0xaa,
195 	0xec, 0xe5, 0xfe, 0xf7, 0xc8, 0xc1, 0xda, 0xd3,
196 	0xa4, 0xad, 0xb6, 0xbf, 0x80, 0x89, 0x92, 0x9b,
197 	0x7c, 0x75, 0x6e, 0x67, 0x58, 0x51, 0x4a, 0x43,
198 	0x34, 0x3d, 0x26, 0x2f, 0x10, 0x19, 0x02, 0x0b,
199 	0xd7, 0xde, 0xc5, 0xcc, 0xf3, 0xfa, 0xe1, 0xe8,
200 	0x9f, 0x96, 0x8d, 0x84, 0xbb, 0xb2, 0xa9, 0xa0,
201 	0x47, 0x4e, 0x55, 0x5c, 0x63, 0x6a, 0x71, 0x78,
202 	0x0f, 0x06, 0x1d, 0x14, 0x2b, 0x22, 0x39, 0x30,
203 	0x9a, 0x93, 0x88, 0x81, 0xbe, 0xb7, 0xac, 0xa5,
204 	0xd2, 0xdb, 0xc0, 0xc9, 0xf6, 0xff, 0xe4, 0xed,
205 	0x0a, 0x03, 0x18, 0x11, 0x2e, 0x27, 0x3c, 0x35,
206 	0x42, 0x4b, 0x50, 0x59, 0x66, 0x6f, 0x74, 0x7d,
207 	0xa1, 0xa8, 0xb3, 0xba, 0x85, 0x8c, 0x97, 0x9e,
208 	0xe9, 0xe0, 0xfb, 0xf2, 0xcd, 0xc4, 0xdf, 0xd6,
209 	0x31, 0x38, 0x23, 0x2a, 0x15, 0x1c, 0x07, 0x0e,
210 	0x79, 0x70, 0x6b, 0x62, 0x5d, 0x54, 0x4f, 0x46
211 };
212 
213 static const u8 x_time_b[256] = {
214 	0x00, 0x0b, 0x16, 0x1d, 0x2c, 0x27, 0x3a, 0x31,
215 	0x58, 0x53, 0x4e, 0x45, 0x74, 0x7f, 0x62, 0x69,
216 	0xb0, 0xbb, 0xa6, 0xad, 0x9c, 0x97, 0x8a, 0x81,
217 	0xe8, 0xe3, 0xfe, 0xf5, 0xc4, 0xcf, 0xd2, 0xd9,
218 	0x7b, 0x70, 0x6d, 0x66, 0x57, 0x5c, 0x41, 0x4a,
219 	0x23, 0x28, 0x35, 0x3e, 0x0f, 0x04, 0x19, 0x12,
220 	0xcb, 0xc0, 0xdd, 0xd6, 0xe7, 0xec, 0xf1, 0xfa,
221 	0x93, 0x98, 0x85, 0x8e, 0xbf, 0xb4, 0xa9, 0xa2,
222 	0xf6, 0xfd, 0xe0, 0xeb, 0xda, 0xd1, 0xcc, 0xc7,
223 	0xae, 0xa5, 0xb8, 0xb3, 0x82, 0x89, 0x94, 0x9f,
224 	0x46, 0x4d, 0x50, 0x5b, 0x6a, 0x61, 0x7c, 0x77,
225 	0x1e, 0x15, 0x08, 0x03, 0x32, 0x39, 0x24, 0x2f,
226 	0x8d, 0x86, 0x9b, 0x90, 0xa1, 0xaa, 0xb7, 0xbc,
227 	0xd5, 0xde, 0xc3, 0xc8, 0xf9, 0xf2, 0xef, 0xe4,
228 	0x3d, 0x36, 0x2b, 0x20, 0x11, 0x1a, 0x07, 0x0c,
229 	0x65, 0x6e, 0x73, 0x78, 0x49, 0x42, 0x5f, 0x54,
230 	0xf7, 0xfc, 0xe1, 0xea, 0xdb, 0xd0, 0xcd, 0xc6,
231 	0xaf, 0xa4, 0xb9, 0xb2, 0x83, 0x88, 0x95, 0x9e,
232 	0x47, 0x4c, 0x51, 0x5a, 0x6b, 0x60, 0x7d, 0x76,
233 	0x1f, 0x14, 0x09, 0x02, 0x33, 0x38, 0x25, 0x2e,
234 	0x8c, 0x87, 0x9a, 0x91, 0xa0, 0xab, 0xb6, 0xbd,
235 	0xd4, 0xdf, 0xc2, 0xc9, 0xf8, 0xf3, 0xee, 0xe5,
236 	0x3c, 0x37, 0x2a, 0x21, 0x10, 0x1b, 0x06, 0x0d,
237 	0x64, 0x6f, 0x72, 0x79, 0x48, 0x43, 0x5e, 0x55,
238 	0x01, 0x0a, 0x17, 0x1c, 0x2d, 0x26, 0x3b, 0x30,
239 	0x59, 0x52, 0x4f, 0x44, 0x75, 0x7e, 0x63, 0x68,
240 	0xb1, 0xba, 0xa7, 0xac, 0x9d, 0x96, 0x8b, 0x80,
241 	0xe9, 0xe2, 0xff, 0xf4, 0xc5, 0xce, 0xd3, 0xd8,
242 	0x7a, 0x71, 0x6c, 0x67, 0x56, 0x5d, 0x40, 0x4b,
243 	0x22, 0x29, 0x34, 0x3f, 0x0e, 0x05, 0x18, 0x13,
244 	0xca, 0xc1, 0xdc, 0xd7, 0xe6, 0xed, 0xf0, 0xfb,
245 	0x92, 0x99, 0x84, 0x8f, 0xbe, 0xb5, 0xa8, 0xa3
246 };
247 
248 static const u8 x_time_d[256] = {
249 	0x00, 0x0d, 0x1a, 0x17, 0x34, 0x39, 0x2e, 0x23,
250 	0x68, 0x65, 0x72, 0x7f, 0x5c, 0x51, 0x46, 0x4b,
251 	0xd0, 0xdd, 0xca, 0xc7, 0xe4, 0xe9, 0xfe, 0xf3,
252 	0xb8, 0xb5, 0xa2, 0xaf, 0x8c, 0x81, 0x96, 0x9b,
253 	0xbb, 0xb6, 0xa1, 0xac, 0x8f, 0x82, 0x95, 0x98,
254 	0xd3, 0xde, 0xc9, 0xc4, 0xe7, 0xea, 0xfd, 0xf0,
255 	0x6b, 0x66, 0x71, 0x7c, 0x5f, 0x52, 0x45, 0x48,
256 	0x03, 0x0e, 0x19, 0x14, 0x37, 0x3a, 0x2d, 0x20,
257 	0x6d, 0x60, 0x77, 0x7a, 0x59, 0x54, 0x43, 0x4e,
258 	0x05, 0x08, 0x1f, 0x12, 0x31, 0x3c, 0x2b, 0x26,
259 	0xbd, 0xb0, 0xa7, 0xaa, 0x89, 0x84, 0x93, 0x9e,
260 	0xd5, 0xd8, 0xcf, 0xc2, 0xe1, 0xec, 0xfb, 0xf6,
261 	0xd6, 0xdb, 0xcc, 0xc1, 0xe2, 0xef, 0xf8, 0xf5,
262 	0xbe, 0xb3, 0xa4, 0xa9, 0x8a, 0x87, 0x90, 0x9d,
263 	0x06, 0x0b, 0x1c, 0x11, 0x32, 0x3f, 0x28, 0x25,
264 	0x6e, 0x63, 0x74, 0x79, 0x5a, 0x57, 0x40, 0x4d,
265 	0xda, 0xd7, 0xc0, 0xcd, 0xee, 0xe3, 0xf4, 0xf9,
266 	0xb2, 0xbf, 0xa8, 0xa5, 0x86, 0x8b, 0x9c, 0x91,
267 	0x0a, 0x07, 0x10, 0x1d, 0x3e, 0x33, 0x24, 0x29,
268 	0x62, 0x6f, 0x78, 0x75, 0x56, 0x5b, 0x4c, 0x41,
269 	0x61, 0x6c, 0x7b, 0x76, 0x55, 0x58, 0x4f, 0x42,
270 	0x09, 0x04, 0x13, 0x1e, 0x3d, 0x30, 0x27, 0x2a,
271 	0xb1, 0xbc, 0xab, 0xa6, 0x85, 0x88, 0x9f, 0x92,
272 	0xd9, 0xd4, 0xc3, 0xce, 0xed, 0xe0, 0xf7, 0xfa,
273 	0xb7, 0xba, 0xad, 0xa0, 0x83, 0x8e, 0x99, 0x94,
274 	0xdf, 0xd2, 0xc5, 0xc8, 0xeb, 0xe6, 0xf1, 0xfc,
275 	0x67, 0x6a, 0x7d, 0x70, 0x53, 0x5e, 0x49, 0x44,
276 	0x0f, 0x02, 0x15, 0x18, 0x3b, 0x36, 0x21, 0x2c,
277 	0x0c, 0x01, 0x16, 0x1b, 0x38, 0x35, 0x22, 0x2f,
278 	0x64, 0x69, 0x7e, 0x73, 0x50, 0x5d, 0x4a, 0x47,
279 	0xdc, 0xd1, 0xc6, 0xcb, 0xe8, 0xe5, 0xf2, 0xff,
280 	0xb4, 0xb9, 0xae, 0xa3, 0x80, 0x8d, 0x9a, 0x97
281 };
282 
283 static const u8 x_time_e[256] = {
284 	0x00, 0x0e, 0x1c, 0x12, 0x38, 0x36, 0x24, 0x2a,
285 	0x70, 0x7e, 0x6c, 0x62, 0x48, 0x46, 0x54, 0x5a,
286 	0xe0, 0xee, 0xfc, 0xf2, 0xd8, 0xd6, 0xc4, 0xca,
287 	0x90, 0x9e, 0x8c, 0x82, 0xa8, 0xa6, 0xb4, 0xba,
288 	0xdb, 0xd5, 0xc7, 0xc9, 0xe3, 0xed, 0xff, 0xf1,
289 	0xab, 0xa5, 0xb7, 0xb9, 0x93, 0x9d, 0x8f, 0x81,
290 	0x3b, 0x35, 0x27, 0x29, 0x03, 0x0d, 0x1f, 0x11,
291 	0x4b, 0x45, 0x57, 0x59, 0x73, 0x7d, 0x6f, 0x61,
292 	0xad, 0xa3, 0xb1, 0xbf, 0x95, 0x9b, 0x89, 0x87,
293 	0xdd, 0xd3, 0xc1, 0xcf, 0xe5, 0xeb, 0xf9, 0xf7,
294 	0x4d, 0x43, 0x51, 0x5f, 0x75, 0x7b, 0x69, 0x67,
295 	0x3d, 0x33, 0x21, 0x2f, 0x05, 0x0b, 0x19, 0x17,
296 	0x76, 0x78, 0x6a, 0x64, 0x4e, 0x40, 0x52, 0x5c,
297 	0x06, 0x08, 0x1a, 0x14, 0x3e, 0x30, 0x22, 0x2c,
298 	0x96, 0x98, 0x8a, 0x84, 0xae, 0xa0, 0xb2, 0xbc,
299 	0xe6, 0xe8, 0xfa, 0xf4, 0xde, 0xd0, 0xc2, 0xcc,
300 	0x41, 0x4f, 0x5d, 0x53, 0x79, 0x77, 0x65, 0x6b,
301 	0x31, 0x3f, 0x2d, 0x23, 0x09, 0x07, 0x15, 0x1b,
302 	0xa1, 0xaf, 0xbd, 0xb3, 0x99, 0x97, 0x85, 0x8b,
303 	0xd1, 0xdf, 0xcd, 0xc3, 0xe9, 0xe7, 0xf5, 0xfb,
304 	0x9a, 0x94, 0x86, 0x88, 0xa2, 0xac, 0xbe, 0xb0,
305 	0xea, 0xe4, 0xf6, 0xf8, 0xd2, 0xdc, 0xce, 0xc0,
306 	0x7a, 0x74, 0x66, 0x68, 0x42, 0x4c, 0x5e, 0x50,
307 	0x0a, 0x04, 0x16, 0x18, 0x32, 0x3c, 0x2e, 0x20,
308 	0xec, 0xe2, 0xf0, 0xfe, 0xd4, 0xda, 0xc8, 0xc6,
309 	0x9c, 0x92, 0x80, 0x8e, 0xa4, 0xaa, 0xb8, 0xb6,
310 	0x0c, 0x02, 0x10, 0x1e, 0x34, 0x3a, 0x28, 0x26,
311 	0x7c, 0x72, 0x60, 0x6e, 0x44, 0x4a, 0x58, 0x56,
312 	0x37, 0x39, 0x2b, 0x25, 0x0f, 0x01, 0x13, 0x1d,
313 	0x47, 0x49, 0x5b, 0x55, 0x7f, 0x71, 0x63, 0x6d,
314 	0xd7, 0xd9, 0xcb, 0xc5, 0xef, 0xe1, 0xf3, 0xfd,
315 	0xa7, 0xa9, 0xbb, 0xb5, 0x9f, 0x91, 0x83, 0x8d
316 };
317 
318 /*
319  * Exchanges columns in each of 4 rows
320  * row0 - unchanged, row1- shifted left 1,
321  * row2 - shifted left 2 and row3 - shifted left 3
322  */
323 static void shift_rows(u8 *state)
324 {
325 	u8 tmp;
326 
327 	/* just substitute row 0 */
328 	state[0] = sbox[state[0]];
329 	state[4] = sbox[state[4]];
330 	state[8] = sbox[state[8]];
331 	state[12] = sbox[state[12]];
332 
333 	/* rotate row 1 */
334 	tmp = sbox[state[1]];
335 	state[1] = sbox[state[5]];
336 	state[5] = sbox[state[9]];
337 	state[9] = sbox[state[13]];
338 	state[13] = tmp;
339 
340 	/* rotate row 2 */
341 	tmp = sbox[state[2]];
342 	state[2] = sbox[state[10]];
343 	state[10] = tmp;
344 	tmp = sbox[state[6]];
345 	state[6] = sbox[state[14]];
346 	state[14] = tmp;
347 
348 	/* rotate row 3 */
349 	tmp = sbox[state[15]];
350 	state[15] = sbox[state[11]];
351 	state[11] = sbox[state[7]];
352 	state[7] = sbox[state[3]];
353 	state[3] = tmp;
354 }
355 
356 /*
357  * restores columns in each of 4 rows
358  * row0 - unchanged, row1- shifted right 1,
359  * row2 - shifted right 2 and row3 - shifted right 3
360  */
361 static void inv_shift_rows(u8 *state)
362 {
363 	u8 tmp;
364 
365 	/* restore row 0 */
366 	state[0] = inv_sbox[state[0]];
367 	state[4] = inv_sbox[state[4]];
368 	state[8] = inv_sbox[state[8]];
369 	state[12] = inv_sbox[state[12]];
370 
371 	/* restore row 1 */
372 	tmp = inv_sbox[state[13]];
373 	state[13] = inv_sbox[state[9]];
374 	state[9] = inv_sbox[state[5]];
375 	state[5] = inv_sbox[state[1]];
376 	state[1] = tmp;
377 
378 	/* restore row 2 */
379 	tmp = inv_sbox[state[2]];
380 	state[2] = inv_sbox[state[10]];
381 	state[10] = tmp;
382 	tmp = inv_sbox[state[6]];
383 	state[6] = inv_sbox[state[14]];
384 	state[14] = tmp;
385 
386 	/* restore row 3 */
387 	tmp = inv_sbox[state[3]];
388 	state[3] = inv_sbox[state[7]];
389 	state[7] = inv_sbox[state[11]];
390 	state[11] = inv_sbox[state[15]];
391 	state[15] = tmp;
392 }
393 
394 /* recombine and mix each row in a column */
395 static void mix_sub_columns(u8 *state)
396 {
397 	u8 tmp[4 * AES_STATECOLS];
398 
399 	/* mixing column 0 */
400 	tmp[0] = x2_sbox[state[0]] ^ x3_sbox[state[5]] ^
401 		 sbox[state[10]] ^ sbox[state[15]];
402 	tmp[1] = sbox[state[0]] ^ x2_sbox[state[5]] ^
403 		 x3_sbox[state[10]] ^ sbox[state[15]];
404 	tmp[2] = sbox[state[0]] ^ sbox[state[5]] ^
405 		 x2_sbox[state[10]] ^ x3_sbox[state[15]];
406 	tmp[3] = x3_sbox[state[0]] ^ sbox[state[5]] ^
407 		 sbox[state[10]] ^ x2_sbox[state[15]];
408 
409 	/* mixing column 1 */
410 	tmp[4] = x2_sbox[state[4]] ^ x3_sbox[state[9]] ^
411 		 sbox[state[14]] ^ sbox[state[3]];
412 	tmp[5] = sbox[state[4]] ^ x2_sbox[state[9]] ^
413 		 x3_sbox[state[14]] ^ sbox[state[3]];
414 	tmp[6] = sbox[state[4]] ^ sbox[state[9]] ^
415 		 x2_sbox[state[14]] ^ x3_sbox[state[3]];
416 	tmp[7] = x3_sbox[state[4]] ^ sbox[state[9]] ^
417 		 sbox[state[14]] ^ x2_sbox[state[3]];
418 
419 	/* mixing column 2 */
420 	tmp[8] = x2_sbox[state[8]] ^ x3_sbox[state[13]] ^
421 		 sbox[state[2]] ^ sbox[state[7]];
422 	tmp[9] = sbox[state[8]] ^ x2_sbox[state[13]] ^
423 		 x3_sbox[state[2]] ^ sbox[state[7]];
424 	tmp[10] = sbox[state[8]] ^ sbox[state[13]] ^
425 		  x2_sbox[state[2]] ^ x3_sbox[state[7]];
426 	tmp[11] = x3_sbox[state[8]] ^ sbox[state[13]] ^
427 		  sbox[state[2]] ^ x2_sbox[state[7]];
428 
429 	/* mixing column 3 */
430 	tmp[12] = x2_sbox[state[12]] ^ x3_sbox[state[1]] ^
431 		  sbox[state[6]] ^ sbox[state[11]];
432 	tmp[13] = sbox[state[12]] ^ x2_sbox[state[1]] ^
433 		  x3_sbox[state[6]] ^ sbox[state[11]];
434 	tmp[14] = sbox[state[12]] ^ sbox[state[1]] ^
435 		  x2_sbox[state[6]] ^ x3_sbox[state[11]];
436 	tmp[15] = x3_sbox[state[12]] ^ sbox[state[1]] ^
437 		  sbox[state[6]] ^ x2_sbox[state[11]];
438 
439 	memcpy(state, tmp, sizeof(tmp));
440 }
441 
442 /* restore and un-mix each row in a column */
443 static void inv_mix_sub_columns(u8 *state)
444 {
445 	u8 tmp[4 * AES_STATECOLS];
446 	int  i;
447 
448 	/* restore column 0 */
449 	tmp[0] = x_time_e[state[0]] ^ x_time_b[state[1]] ^
450 		 x_time_d[state[2]] ^ x_time_9[state[3]];
451 	tmp[5] = x_time_9[state[0]] ^ x_time_e[state[1]] ^
452 		 x_time_b[state[2]] ^ x_time_d[state[3]];
453 	tmp[10] = x_time_d[state[0]] ^ x_time_9[state[1]] ^
454 		  x_time_e[state[2]] ^ x_time_b[state[3]];
455 	tmp[15] = x_time_b[state[0]] ^ x_time_d[state[1]] ^
456 		  x_time_9[state[2]] ^ x_time_e[state[3]];
457 
458 	/* restore column 1 */
459 	tmp[4] = x_time_e[state[4]] ^ x_time_b[state[5]] ^
460 		 x_time_d[state[6]] ^ x_time_9[state[7]];
461 	tmp[9] = x_time_9[state[4]] ^ x_time_e[state[5]] ^
462 		 x_time_b[state[6]] ^ x_time_d[state[7]];
463 	tmp[14] = x_time_d[state[4]] ^ x_time_9[state[5]] ^
464 		  x_time_e[state[6]] ^ x_time_b[state[7]];
465 	tmp[3] = x_time_b[state[4]] ^ x_time_d[state[5]] ^
466 		 x_time_9[state[6]] ^ x_time_e[state[7]];
467 
468 	/* restore column 2 */
469 	tmp[8] = x_time_e[state[8]] ^ x_time_b[state[9]] ^
470 		 x_time_d[state[10]] ^ x_time_9[state[11]];
471 	tmp[13] = x_time_9[state[8]] ^ x_time_e[state[9]] ^
472 		  x_time_b[state[10]] ^ x_time_d[state[11]];
473 	tmp[2] = x_time_d[state[8]] ^ x_time_9[state[9]] ^
474 		 x_time_e[state[10]] ^ x_time_b[state[11]];
475 	tmp[7] = x_time_b[state[8]] ^ x_time_d[state[9]] ^
476 		 x_time_9[state[10]] ^ x_time_e[state[11]];
477 
478 	/* restore column 3 */
479 	tmp[12] = x_time_e[state[12]] ^ x_time_b[state[13]] ^
480 		  x_time_d[state[14]] ^ x_time_9[state[15]];
481 	tmp[1] = x_time_9[state[12]] ^ x_time_e[state[13]] ^
482 		 x_time_b[state[14]] ^ x_time_d[state[15]];
483 	tmp[6] = x_time_d[state[12]] ^ x_time_9[state[13]] ^
484 		 x_time_e[state[14]] ^ x_time_b[state[15]];
485 	tmp[11] = x_time_b[state[12]] ^ x_time_d[state[13]] ^
486 		  x_time_9[state[14]] ^ x_time_e[state[15]];
487 
488 	for (i = 0; i < 4 * AES_STATECOLS; i++)
489 		state[i] = inv_sbox[tmp[i]];
490 }
491 
492 /*
493  * encrypt/decrypt columns of the key
494  * n.b. you can replace this with byte-wise xor if you wish.
495  */
496 static void add_round_key(u32 *state, u32 *key)
497 {
498 	int idx;
499 
500 	for (idx = 0; idx < 4; idx++)
501 		state[idx] ^= key[idx];
502 }
503 
504 static u8 rcon[11] = {
505 	0x00, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36
506 };
507 
508 /* produce AES_STATECOLS bytes for each round */
509 void aes_expand_key(u8 *key, u8 *expkey)
510 {
511 	u8 tmp0, tmp1, tmp2, tmp3, tmp4;
512 	u32 idx;
513 
514 	memcpy(expkey, key, AES_KEYCOLS * 4);
515 
516 	for (idx = AES_KEYCOLS; idx < AES_STATECOLS * (AES_ROUNDS + 1); idx++) {
517 		tmp0 = expkey[4*idx - 4];
518 		tmp1 = expkey[4*idx - 3];
519 		tmp2 = expkey[4*idx - 2];
520 		tmp3 = expkey[4*idx - 1];
521 		if (!(idx % AES_KEYCOLS)) {
522 			tmp4 = tmp3;
523 			tmp3 = sbox[tmp0];
524 			tmp0 = sbox[tmp1] ^ rcon[idx / AES_KEYCOLS];
525 			tmp1 = sbox[tmp2];
526 			tmp2 = sbox[tmp4];
527 		} else if ((AES_KEYCOLS > 6) && (idx % AES_KEYCOLS == 4)) {
528 			tmp0 = sbox[tmp0];
529 			tmp1 = sbox[tmp1];
530 			tmp2 = sbox[tmp2];
531 			tmp3 = sbox[tmp3];
532 		}
533 
534 		expkey[4*idx+0] = expkey[4*idx - 4*AES_KEYCOLS + 0] ^ tmp0;
535 		expkey[4*idx+1] = expkey[4*idx - 4*AES_KEYCOLS + 1] ^ tmp1;
536 		expkey[4*idx+2] = expkey[4*idx - 4*AES_KEYCOLS + 2] ^ tmp2;
537 		expkey[4*idx+3] = expkey[4*idx - 4*AES_KEYCOLS + 3] ^ tmp3;
538 	}
539 }
540 
541 /* encrypt one 128 bit block */
542 void aes_encrypt(u8 *in, u8 *expkey, u8 *out)
543 {
544 	u8 state[AES_STATECOLS * 4];
545 	u32 round;
546 
547 	memcpy(state, in, AES_STATECOLS * 4);
548 	add_round_key((u32 *)state, (u32 *)expkey);
549 
550 	for (round = 1; round < AES_ROUNDS + 1; round++) {
551 		if (round < AES_ROUNDS)
552 			mix_sub_columns(state);
553 		else
554 			shift_rows(state);
555 
556 		add_round_key((u32 *)state,
557 			      (u32 *)expkey + round * AES_STATECOLS);
558 	}
559 
560 	memcpy(out, state, sizeof(state));
561 }
562 
563 void aes_decrypt(u8 *in, u8 *expkey, u8 *out)
564 {
565 	u8 state[AES_STATECOLS * 4];
566 	int round;
567 
568 	memcpy(state, in, sizeof(state));
569 
570 	add_round_key((u32 *)state,
571 		      (u32 *)expkey + AES_ROUNDS * AES_STATECOLS);
572 	inv_shift_rows(state);
573 
574 	for (round = AES_ROUNDS; round--; ) {
575 		add_round_key((u32 *)state,
576 			      (u32 *)expkey + round * AES_STATECOLS);
577 		if (round)
578 			inv_mix_sub_columns(state);
579 	}
580 
581 	memcpy(out, state, sizeof(state));
582 }
583