aeskey.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474
  1. /*
  2. ---------------------------------------------------------------------------
  3. Copyright (c) 2003, Dr Brian Gladman <brg@gladman.me.uk>, Worcester, UK.
  4. All rights reserved.
  5. LICENSE TERMS
  6. The free distribution and use of this software in both source and binary
  7. form is allowed (with or without changes) provided that:
  8. 1. distributions of this source code include the above copyright
  9. notice, this list of conditions and the following disclaimer;
  10. 2. distributions in binary form include the above copyright
  11. notice, this list of conditions and the following disclaimer
  12. in the documentation and/or other associated materials;
  13. 3. the copyright holder's name is not used to endorse products
  14. built using this software without specific written permission.
  15. ALTERNATIVELY, provided that this notice is retained in full, this product
  16. may be distributed under the terms of the GNU General Public License (GPL),
  17. in which case the provisions of the GPL apply INSTEAD OF those given above.
  18. DISCLAIMER
  19. This software is provided 'as is' with no explicit or implied warranties
  20. in respect of its properties, including, but not limited to, correctness
  21. and/or fitness for purpose.
  22. ---------------------------------------------------------------------------
  23. Issue Date: 26/08/2003
  24. */
  25. /*! \file
  26. *
  27. * \brief This file contains the code for implementing the key schedule for AES
  28. * (Rijndael) for block and key sizes of 16, 24, and 32 bytes. See aesopt.h
  29. * for further details including optimisation.
  30. *
  31. * \author Dr Brian Gladman <brg@gladman.me.uk>
  32. */
  33. #if defined(__cplusplus)
  34. extern "C"
  35. {
  36. #endif
  37. #ifndef HAVE_CRYPTO
  38. #include "aesopt.h"
  39. /* Initialise the key schedule from the user supplied key. The key
  40. length can be specified in bytes, with legal values of 16, 24
  41. and 32, or in bits, with legal values of 128, 192 and 256. These
  42. values correspond with Nk values of 4, 6 and 8 respectively.
  43. The following macros implement a single cycle in the key
  44. schedule generation process. The number of cycles needed
  45. for each cx->n_col and nk value is:
  46. nk = 4 5 6 7 8
  47. ------------------------------
  48. cx->n_col = 4 10 9 8 7 7
  49. cx->n_col = 5 14 11 10 9 9
  50. cx->n_col = 6 19 15 12 11 11
  51. cx->n_col = 7 21 19 16 13 14
  52. cx->n_col = 8 29 23 19 17 14
  53. */
  54. #define ke4(k,i) \
  55. { k[4*(i)+4] = ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; k[4*(i)+5] = ss[1] ^= ss[0]; \
  56. k[4*(i)+6] = ss[2] ^= ss[1]; k[4*(i)+7] = ss[3] ^= ss[2]; \
  57. }
  58. #define kel4(k,i) \
  59. { k[4*(i)+4] = ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; k[4*(i)+5] = ss[1] ^= ss[0]; \
  60. k[4*(i)+6] = ss[2] ^= ss[1]; k[4*(i)+7] = ss[3] ^= ss[2]; \
  61. }
  62. #define ke6(k,i) \
  63. { k[6*(i)+ 6] = ss[0] ^= ls_box(ss[5],3) ^ t_use(r,c)[i]; k[6*(i)+ 7] = ss[1] ^= ss[0]; \
  64. k[6*(i)+ 8] = ss[2] ^= ss[1]; k[6*(i)+ 9] = ss[3] ^= ss[2]; \
  65. k[6*(i)+10] = ss[4] ^= ss[3]; k[6*(i)+11] = ss[5] ^= ss[4]; \
  66. }
  67. #define kel6(k,i) \
  68. { k[6*(i)+ 6] = ss[0] ^= ls_box(ss[5],3) ^ t_use(r,c)[i]; k[6*(i)+ 7] = ss[1] ^= ss[0]; \
  69. k[6*(i)+ 8] = ss[2] ^= ss[1]; k[6*(i)+ 9] = ss[3] ^= ss[2]; \
  70. }
  71. #define ke8(k,i) \
  72. { k[8*(i)+ 8] = ss[0] ^= ls_box(ss[7],3) ^ t_use(r,c)[i]; k[8*(i)+ 9] = ss[1] ^= ss[0]; \
  73. k[8*(i)+10] = ss[2] ^= ss[1]; k[8*(i)+11] = ss[3] ^= ss[2]; \
  74. k[8*(i)+12] = ss[4] ^= ls_box(ss[3],0); k[8*(i)+13] = ss[5] ^= ss[4]; \
  75. k[8*(i)+14] = ss[6] ^= ss[5]; k[8*(i)+15] = ss[7] ^= ss[6]; \
  76. }
  77. #define kel8(k,i) \
  78. { k[8*(i)+ 8] = ss[0] ^= ls_box(ss[7],3) ^ t_use(r,c)[i]; k[8*(i)+ 9] = ss[1] ^= ss[0]; \
  79. k[8*(i)+10] = ss[2] ^= ss[1]; k[8*(i)+11] = ss[3] ^= ss[2]; \
  80. }
  81. #if defined(ENCRYPTION_KEY_SCHEDULE)
  82. #if defined(AES_128) || defined(AES_VAR)
  83. aes_rval aes_encrypt_key128(const void *in_key, aes_encrypt_ctx cx[1])
  84. { aes_32t ss[4];
  85. cx->ks[0] = ss[0] = word_in(in_key, 0);
  86. cx->ks[1] = ss[1] = word_in(in_key, 1);
  87. cx->ks[2] = ss[2] = word_in(in_key, 2);
  88. cx->ks[3] = ss[3] = word_in(in_key, 3);
  89. #if ENC_UNROLL == NONE
  90. { aes_32t i;
  91. for(i = 0; i < ((11 * N_COLS - 1) / 4); ++i)
  92. ke4(cx->ks, i);
  93. }
  94. #else
  95. ke4(cx->ks, 0); ke4(cx->ks, 1);
  96. ke4(cx->ks, 2); ke4(cx->ks, 3);
  97. ke4(cx->ks, 4); ke4(cx->ks, 5);
  98. ke4(cx->ks, 6); ke4(cx->ks, 7);
  99. ke4(cx->ks, 8); kel4(cx->ks, 9);
  100. #endif
  101. /* cx->ks[45] ^ cx->ks[52] ^ cx->ks[53] is zero for a 256 bit */
  102. /* key and must be non-zero for 128 and 192 bits keys */
  103. cx->ks[53] = cx->ks[45] = 0;
  104. cx->ks[52] = 10;
  105. #ifdef AES_ERR_CHK
  106. return aes_good;
  107. #endif
  108. }
  109. #endif
  110. #if defined(AES_192) || defined(AES_VAR)
  111. aes_rval aes_encrypt_key192(const void *in_key, aes_encrypt_ctx cx[1])
  112. { aes_32t ss[6];
  113. cx->ks[0] = ss[0] = word_in(in_key, 0);
  114. cx->ks[1] = ss[1] = word_in(in_key, 1);
  115. cx->ks[2] = ss[2] = word_in(in_key, 2);
  116. cx->ks[3] = ss[3] = word_in(in_key, 3);
  117. cx->ks[4] = ss[4] = word_in(in_key, 4);
  118. cx->ks[5] = ss[5] = word_in(in_key, 5);
  119. #if ENC_UNROLL == NONE
  120. { aes_32t i;
  121. for(i = 0; i < (13 * N_COLS - 1) / 6; ++i)
  122. ke6(cx->ks, i);
  123. }
  124. #else
  125. ke6(cx->ks, 0); ke6(cx->ks, 1);
  126. ke6(cx->ks, 2); ke6(cx->ks, 3);
  127. ke6(cx->ks, 4); ke6(cx->ks, 5);
  128. ke6(cx->ks, 6); kel6(cx->ks, 7);
  129. #endif
  130. /* cx->ks[45] ^ cx->ks[52] ^ cx->ks[53] is zero for a 256 bit */
  131. /* key and must be non-zero for 128 and 192 bits keys */
  132. cx->ks[53] = cx->ks[45];
  133. cx->ks[52] = 12;
  134. #ifdef AES_ERR_CHK
  135. return aes_good;
  136. #endif
  137. }
  138. #endif
  139. #if defined(AES_256) || defined(AES_VAR)
  140. aes_rval aes_encrypt_key256(const void *in_key, aes_encrypt_ctx cx[1])
  141. { aes_32t ss[8];
  142. cx->ks[0] = ss[0] = word_in(in_key, 0);
  143. cx->ks[1] = ss[1] = word_in(in_key, 1);
  144. cx->ks[2] = ss[2] = word_in(in_key, 2);
  145. cx->ks[3] = ss[3] = word_in(in_key, 3);
  146. cx->ks[4] = ss[4] = word_in(in_key, 4);
  147. cx->ks[5] = ss[5] = word_in(in_key, 5);
  148. cx->ks[6] = ss[6] = word_in(in_key, 6);
  149. cx->ks[7] = ss[7] = word_in(in_key, 7);
  150. #if ENC_UNROLL == NONE
  151. { aes_32t i;
  152. for(i = 0; i < (15 * N_COLS - 1) / 8; ++i)
  153. ke8(cx->ks, i);
  154. }
  155. #else
  156. ke8(cx->ks, 0); ke8(cx->ks, 1);
  157. ke8(cx->ks, 2); ke8(cx->ks, 3);
  158. ke8(cx->ks, 4); ke8(cx->ks, 5);
  159. kel8(cx->ks, 6);
  160. #endif
  161. #ifdef AES_ERR_CHK
  162. return aes_good;
  163. #endif
  164. }
  165. #endif
  166. #if defined(AES_VAR)
  167. aes_rval aes_encrypt_key(const void *in_key, int key_len, aes_encrypt_ctx cx[1])
  168. {
  169. switch(key_len)
  170. {
  171. #ifdef AES_ERR_CHK
  172. case 16: case 128: return aes_encrypt_key128(in_key, cx);
  173. case 24: case 192: return aes_encrypt_key192(in_key, cx);
  174. case 32: case 256: return aes_encrypt_key256(in_key, cx);
  175. default: return aes_error;
  176. #else
  177. case 16: case 128: aes_encrypt_key128(in_key, cx); return;
  178. case 24: case 192: aes_encrypt_key192(in_key, cx); return;
  179. case 32: case 256: aes_encrypt_key256(in_key, cx); return;
  180. #endif
  181. }
  182. }
  183. #endif
  184. #endif
  185. #if defined(DECRYPTION_KEY_SCHEDULE)
  186. #if DEC_ROUND == NO_TABLES
  187. #define ff(x) (x)
  188. #else
  189. #define ff(x) inv_mcol(x)
  190. #ifdef dec_imvars
  191. #define d_vars dec_imvars
  192. #endif
  193. #endif
  194. #if 1
  195. #define kdf4(k,i) \
  196. { ss[0] = ss[0] ^ ss[2] ^ ss[1] ^ ss[3]; ss[1] = ss[1] ^ ss[3]; ss[2] = ss[2] ^ ss[3]; ss[3] = ss[3]; \
  197. ss[4] = ls_box(ss[(i+3) % 4], 3) ^ t_use(r,c)[i]; ss[i % 4] ^= ss[4]; \
  198. ss[4] ^= k[4*(i)]; k[4*(i)+4] = ff(ss[4]); ss[4] ^= k[4*(i)+1]; k[4*(i)+5] = ff(ss[4]); \
  199. ss[4] ^= k[4*(i)+2]; k[4*(i)+6] = ff(ss[4]); ss[4] ^= k[4*(i)+3]; k[4*(i)+7] = ff(ss[4]); \
  200. }
  201. #define kd4(k,i) \
  202. { ss[4] = ls_box(ss[(i+3) % 4], 3) ^ t_use(r,c)[i]; ss[i % 4] ^= ss[4]; ss[4] = ff(ss[4]); \
  203. k[4*(i)+4] = ss[4] ^= k[4*(i)]; k[4*(i)+5] = ss[4] ^= k[4*(i)+1]; \
  204. k[4*(i)+6] = ss[4] ^= k[4*(i)+2]; k[4*(i)+7] = ss[4] ^= k[4*(i)+3]; \
  205. }
  206. #define kdl4(k,i) \
  207. { ss[4] = ls_box(ss[(i+3) % 4], 3) ^ t_use(r,c)[i]; ss[i % 4] ^= ss[4]; \
  208. k[4*(i)+4] = (ss[0] ^= ss[1]) ^ ss[2] ^ ss[3]; k[4*(i)+5] = ss[1] ^ ss[3]; \
  209. k[4*(i)+6] = ss[0]; k[4*(i)+7] = ss[1]; \
  210. }
  211. #else
  212. #define kdf4(k,i) \
  213. { ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; k[4*(i)+ 4] = ff(ss[0]); ss[1] ^= ss[0]; k[4*(i)+ 5] = ff(ss[1]); \
  214. ss[2] ^= ss[1]; k[4*(i)+ 6] = ff(ss[2]); ss[3] ^= ss[2]; k[4*(i)+ 7] = ff(ss[3]); \
  215. }
  216. #define kd4(k,i) \
  217. { ss[4] = ls_box(ss[3],3) ^ t_use(r,c)[i]; \
  218. ss[0] ^= ss[4]; ss[4] = ff(ss[4]); k[4*(i)+ 4] = ss[4] ^= k[4*(i)]; \
  219. ss[1] ^= ss[0]; k[4*(i)+ 5] = ss[4] ^= k[4*(i)+ 1]; \
  220. ss[2] ^= ss[1]; k[4*(i)+ 6] = ss[4] ^= k[4*(i)+ 2]; \
  221. ss[3] ^= ss[2]; k[4*(i)+ 7] = ss[4] ^= k[4*(i)+ 3]; \
  222. }
  223. #define kdl4(k,i) \
  224. { ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; k[4*(i)+ 4] = ss[0]; ss[1] ^= ss[0]; k[4*(i)+ 5] = ss[1]; \
  225. ss[2] ^= ss[1]; k[4*(i)+ 6] = ss[2]; ss[3] ^= ss[2]; k[4*(i)+ 7] = ss[3]; \
  226. }
  227. #endif
  228. #define kdf6(k,i) \
  229. { ss[0] ^= ls_box(ss[5],3) ^ t_use(r,c)[i]; k[6*(i)+ 6] = ff(ss[0]); ss[1] ^= ss[0]; k[6*(i)+ 7] = ff(ss[1]); \
  230. ss[2] ^= ss[1]; k[6*(i)+ 8] = ff(ss[2]); ss[3] ^= ss[2]; k[6*(i)+ 9] = ff(ss[3]); \
  231. ss[4] ^= ss[3]; k[6*(i)+10] = ff(ss[4]); ss[5] ^= ss[4]; k[6*(i)+11] = ff(ss[5]); \
  232. }
  233. #define kd6(k,i) \
  234. { ss[6] = ls_box(ss[5],3) ^ t_use(r,c)[i]; \
  235. ss[0] ^= ss[6]; ss[6] = ff(ss[6]); k[6*(i)+ 6] = ss[6] ^= k[6*(i)]; \
  236. ss[1] ^= ss[0]; k[6*(i)+ 7] = ss[6] ^= k[6*(i)+ 1]; \
  237. ss[2] ^= ss[1]; k[6*(i)+ 8] = ss[6] ^= k[6*(i)+ 2]; \
  238. ss[3] ^= ss[2]; k[6*(i)+ 9] = ss[6] ^= k[6*(i)+ 3]; \
  239. ss[4] ^= ss[3]; k[6*(i)+10] = ss[6] ^= k[6*(i)+ 4]; \
  240. ss[5] ^= ss[4]; k[6*(i)+11] = ss[6] ^= k[6*(i)+ 5]; \
  241. }
  242. #define kdl6(k,i) \
  243. { ss[0] ^= ls_box(ss[5],3) ^ t_use(r,c)[i]; k[6*(i)+ 6] = ss[0]; ss[1] ^= ss[0]; k[6*(i)+ 7] = ss[1]; \
  244. ss[2] ^= ss[1]; k[6*(i)+ 8] = ss[2]; ss[3] ^= ss[2]; k[6*(i)+ 9] = ss[3]; \
  245. }
  246. #define kdf8(k,i) \
  247. { ss[0] ^= ls_box(ss[7],3) ^ t_use(r,c)[i]; k[8*(i)+ 8] = ff(ss[0]); ss[1] ^= ss[0]; k[8*(i)+ 9] = ff(ss[1]); \
  248. ss[2] ^= ss[1]; k[8*(i)+10] = ff(ss[2]); ss[3] ^= ss[2]; k[8*(i)+11] = ff(ss[3]); \
  249. ss[4] ^= ls_box(ss[3],0); k[8*(i)+12] = ff(ss[4]); ss[5] ^= ss[4]; k[8*(i)+13] = ff(ss[5]); \
  250. ss[6] ^= ss[5]; k[8*(i)+14] = ff(ss[6]); ss[7] ^= ss[6]; k[8*(i)+15] = ff(ss[7]); \
  251. }
  252. #define kd8(k,i) \
  253. { aes_32t g = ls_box(ss[7],3) ^ t_use(r,c)[i]; \
  254. ss[0] ^= g; g = ff(g); k[8*(i)+ 8] = g ^= k[8*(i)]; \
  255. ss[1] ^= ss[0]; k[8*(i)+ 9] = g ^= k[8*(i)+ 1]; \
  256. ss[2] ^= ss[1]; k[8*(i)+10] = g ^= k[8*(i)+ 2]; \
  257. ss[3] ^= ss[2]; k[8*(i)+11] = g ^= k[8*(i)+ 3]; \
  258. g = ls_box(ss[3],0); \
  259. ss[4] ^= g; g = ff(g); k[8*(i)+12] = g ^= k[8*(i)+ 4]; \
  260. ss[5] ^= ss[4]; k[8*(i)+13] = g ^= k[8*(i)+ 5]; \
  261. ss[6] ^= ss[5]; k[8*(i)+14] = g ^= k[8*(i)+ 6]; \
  262. ss[7] ^= ss[6]; k[8*(i)+15] = g ^= k[8*(i)+ 7]; \
  263. }
  264. #define kdl8(k,i) \
  265. { ss[0] ^= ls_box(ss[7],3) ^ t_use(r,c)[i]; k[8*(i)+ 8] = ss[0]; ss[1] ^= ss[0]; k[8*(i)+ 9] = ss[1]; \
  266. ss[2] ^= ss[1]; k[8*(i)+10] = ss[2]; ss[3] ^= ss[2]; k[8*(i)+11] = ss[3]; \
  267. }
  268. #if defined(AES_128) || defined(AES_VAR)
  269. aes_rval aes_decrypt_key128(const void *in_key, aes_decrypt_ctx cx[1])
  270. { aes_32t ss[5];
  271. #ifdef d_vars
  272. d_vars;
  273. #endif
  274. cx->ks[0] = ss[0] = word_in(in_key, 0);
  275. cx->ks[1] = ss[1] = word_in(in_key, 1);
  276. cx->ks[2] = ss[2] = word_in(in_key, 2);
  277. cx->ks[3] = ss[3] = word_in(in_key, 3);
  278. #if DEC_UNROLL == NONE
  279. { aes_32t i;
  280. for(i = 0; i < (11 * N_COLS - 1) / 4; ++i)
  281. ke4(cx->ks, i);
  282. #if !(DEC_ROUND == NO_TABLES)
  283. for(i = N_COLS; i < 10 * N_COLS; ++i)
  284. cx->ks[i] = inv_mcol(cx->ks[i]);
  285. #endif
  286. }
  287. #else
  288. kdf4(cx->ks, 0); kd4(cx->ks, 1);
  289. kd4(cx->ks, 2); kd4(cx->ks, 3);
  290. kd4(cx->ks, 4); kd4(cx->ks, 5);
  291. kd4(cx->ks, 6); kd4(cx->ks, 7);
  292. kd4(cx->ks, 8); kdl4(cx->ks, 9);
  293. #endif
  294. /* cx->ks[45] ^ cx->ks[52] ^ cx->ks[53] is zero for a 256 bit */
  295. /* key and must be non-zero for 128 and 192 bits keys */
  296. cx->ks[53] = cx->ks[45] = 0;
  297. cx->ks[52] = 10;
  298. #ifdef AES_ERR_CHK
  299. return aes_good;
  300. #endif
  301. }
  302. #endif
  303. #if defined(AES_192) || defined(AES_VAR)
  304. aes_rval aes_decrypt_key192(const void *in_key, aes_decrypt_ctx cx[1])
  305. { aes_32t ss[7];
  306. #ifdef d_vars
  307. d_vars;
  308. #endif
  309. cx->ks[0] = ss[0] = word_in(in_key, 0);
  310. cx->ks[1] = ss[1] = word_in(in_key, 1);
  311. cx->ks[2] = ss[2] = word_in(in_key, 2);
  312. cx->ks[3] = ss[3] = word_in(in_key, 3);
  313. #if DEC_UNROLL == NONE
  314. cx->ks[4] = ss[4] = word_in(in_key, 4);
  315. cx->ks[5] = ss[5] = word_in(in_key, 5);
  316. { aes_32t i;
  317. for(i = 0; i < (13 * N_COLS - 1) / 6; ++i)
  318. ke6(cx->ks, i);
  319. #if !(DEC_ROUND == NO_TABLES)
  320. for(i = N_COLS; i < 12 * N_COLS; ++i)
  321. cx->ks[i] = inv_mcol(cx->ks[i]);
  322. #endif
  323. }
  324. #else
  325. cx->ks[4] = ff(ss[4] = word_in(in_key, 4));
  326. cx->ks[5] = ff(ss[5] = word_in(in_key, 5));
  327. kdf6(cx->ks, 0); kd6(cx->ks, 1);
  328. kd6(cx->ks, 2); kd6(cx->ks, 3);
  329. kd6(cx->ks, 4); kd6(cx->ks, 5);
  330. kd6(cx->ks, 6); kdl6(cx->ks, 7);
  331. #endif
  332. /* cx->ks[45] ^ cx->ks[52] ^ cx->ks[53] is zero for a 256 bit */
  333. /* key and must be non-zero for 128 and 192 bits keys */
  334. cx->ks[53] = cx->ks[45];
  335. cx->ks[52] = 12;
  336. #ifdef AES_ERR_CHK
  337. return aes_good;
  338. #endif
  339. }
  340. #endif
  341. #if defined(AES_256) || defined(AES_VAR)
  342. aes_rval aes_decrypt_key256(const void *in_key, aes_decrypt_ctx cx[1])
  343. { aes_32t ss[8];
  344. #ifdef d_vars
  345. d_vars;
  346. #endif
  347. cx->ks[0] = ss[0] = word_in(in_key, 0);
  348. cx->ks[1] = ss[1] = word_in(in_key, 1);
  349. cx->ks[2] = ss[2] = word_in(in_key, 2);
  350. cx->ks[3] = ss[3] = word_in(in_key, 3);
  351. #if DEC_UNROLL == NONE
  352. cx->ks[4] = ss[4] = word_in(in_key, 4);
  353. cx->ks[5] = ss[5] = word_in(in_key, 5);
  354. cx->ks[6] = ss[6] = word_in(in_key, 6);
  355. cx->ks[7] = ss[7] = word_in(in_key, 7);
  356. { aes_32t i;
  357. for(i = 0; i < (15 * N_COLS - 1) / 8; ++i)
  358. ke8(cx->ks, i);
  359. #if !(DEC_ROUND == NO_TABLES)
  360. for(i = N_COLS; i < 14 * N_COLS; ++i)
  361. cx->ks[i] = inv_mcol(cx->ks[i]);
  362. #endif
  363. }
  364. #else
  365. cx->ks[4] = ff(ss[4] = word_in(in_key, 4));
  366. cx->ks[5] = ff(ss[5] = word_in(in_key, 5));
  367. cx->ks[6] = ff(ss[6] = word_in(in_key, 6));
  368. cx->ks[7] = ff(ss[7] = word_in(in_key, 7));
  369. kdf8(cx->ks, 0); kd8(cx->ks, 1);
  370. kd8(cx->ks, 2); kd8(cx->ks, 3);
  371. kd8(cx->ks, 4); kd8(cx->ks, 5);
  372. kdl8(cx->ks, 6);
  373. #endif
  374. #ifdef AES_ERR_CHK
  375. return aes_good;
  376. #endif
  377. }
  378. #endif
  379. #if defined(AES_VAR)
  380. aes_rval aes_decrypt_key(const void *in_key, int key_len, aes_decrypt_ctx cx[1])
  381. {
  382. switch(key_len)
  383. {
  384. #ifdef AES_ERR_CHK
  385. case 16: case 128: return aes_decrypt_key128(in_key, cx);
  386. case 24: case 192: return aes_decrypt_key192(in_key, cx);
  387. case 32: case 256: return aes_decrypt_key256(in_key, cx);
  388. default: return aes_error;
  389. #else
  390. case 16: case 128: aes_decrypt_key128(in_key, cx); return;
  391. case 24: case 192: aes_decrypt_key192(in_key, cx); return;
  392. case 32: case 256: aes_decrypt_key256(in_key, cx); return;
  393. #endif
  394. }
  395. }
  396. #endif
  397. #endif
  398. #endif /* !HAVE_CRYPTO */
  399. #if defined(__cplusplus)
  400. }
  401. #endif