diff options
Diffstat (limited to 'src/lib/libcrypto/perlasm/cbc.pl')
-rw-r--r-- | src/lib/libcrypto/perlasm/cbc.pl | 349 |
1 files changed, 0 insertions, 349 deletions
diff --git a/src/lib/libcrypto/perlasm/cbc.pl b/src/lib/libcrypto/perlasm/cbc.pl deleted file mode 100644 index 6fc2510905..0000000000 --- a/src/lib/libcrypto/perlasm/cbc.pl +++ /dev/null | |||
@@ -1,349 +0,0 @@ | |||
1 | #!/usr/local/bin/perl | ||
2 | |||
3 | # void des_ncbc_encrypt(input, output, length, schedule, ivec, enc) | ||
4 | # des_cblock (*input); | ||
5 | # des_cblock (*output); | ||
6 | # long length; | ||
7 | # des_key_schedule schedule; | ||
8 | # des_cblock (*ivec); | ||
9 | # int enc; | ||
10 | # | ||
11 | # calls | ||
12 | # des_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT); | ||
13 | # | ||
14 | |||
15 | #&cbc("des_ncbc_encrypt","des_encrypt",0); | ||
16 | #&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt", | ||
17 | # 1,4,5,3,5,-1); | ||
18 | #&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt", | ||
19 | # 0,4,5,3,5,-1); | ||
20 | #&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3", | ||
21 | # 0,6,7,3,4,5); | ||
22 | # | ||
23 | # When doing a cipher that needs bigendian order, | ||
24 | # for encrypt, the iv is kept in bigendian form, | ||
25 | # while for decrypt, it is kept in little endian. | ||
26 | sub cbc | ||
27 | { | ||
28 | local($name,$enc_func,$dec_func,$swap,$iv_off,$enc_off,$p1,$p2,$p3)=@_; | ||
29 | # name is the function name | ||
30 | # enc_func and dec_func and the functions to call for encrypt/decrypt | ||
31 | # swap is true if byte order needs to be reversed | ||
32 | # iv_off is parameter number for the iv | ||
33 | # enc_off is parameter number for the encrypt/decrypt flag | ||
34 | # p1,p2,p3 are the offsets for parameters to be passed to the | ||
35 | # underlying calls. | ||
36 | |||
37 | &function_begin_B($name,""); | ||
38 | &comment(""); | ||
39 | |||
40 | $in="esi"; | ||
41 | $out="edi"; | ||
42 | $count="ebp"; | ||
43 | |||
44 | &push("ebp"); | ||
45 | &push("ebx"); | ||
46 | &push("esi"); | ||
47 | &push("edi"); | ||
48 | |||
49 | $data_off=4; | ||
50 | $data_off+=4 if ($p1 > 0); | ||
51 | $data_off+=4 if ($p2 > 0); | ||
52 | $data_off+=4 if ($p3 > 0); | ||
53 | |||
54 | &mov($count, &wparam(2)); # length | ||
55 | |||
56 | &comment("getting iv ptr from parameter $iv_off"); | ||
57 | &mov("ebx", &wparam($iv_off)); # Get iv ptr | ||
58 | |||
59 | &mov($in, &DWP(0,"ebx","",0));# iv[0] | ||
60 | &mov($out, &DWP(4,"ebx","",0));# iv[1] | ||
61 | |||
62 | &push($out); | ||
63 | &push($in); | ||
64 | &push($out); # used in decrypt for iv[1] | ||
65 | &push($in); # used in decrypt for iv[0] | ||
66 | |||
67 | &mov("ebx", "esp"); # This is the address of tin[2] | ||
68 | |||
69 | &mov($in, &wparam(0)); # in | ||
70 | &mov($out, &wparam(1)); # out | ||
71 | |||
72 | # We have loaded them all, how lets push things | ||
73 | &comment("getting encrypt flag from parameter $enc_off"); | ||
74 | &mov("ecx", &wparam($enc_off)); # Get enc flag | ||
75 | if ($p3 > 0) | ||
76 | { | ||
77 | &comment("get and push parameter $p3"); | ||
78 | if ($enc_off != $p3) | ||
79 | { &mov("eax", &wparam($p3)); &push("eax"); } | ||
80 | else { &push("ecx"); } | ||
81 | } | ||
82 | if ($p2 > 0) | ||
83 | { | ||
84 | &comment("get and push parameter $p2"); | ||
85 | if ($enc_off != $p2) | ||
86 | { &mov("eax", &wparam($p2)); &push("eax"); } | ||
87 | else { &push("ecx"); } | ||
88 | } | ||
89 | if ($p1 > 0) | ||
90 | { | ||
91 | &comment("get and push parameter $p1"); | ||
92 | if ($enc_off != $p1) | ||
93 | { &mov("eax", &wparam($p1)); &push("eax"); } | ||
94 | else { &push("ecx"); } | ||
95 | } | ||
96 | &push("ebx"); # push data/iv | ||
97 | |||
98 | &cmp("ecx",0); | ||
99 | &jz(&label("decrypt")); | ||
100 | |||
101 | &and($count,0xfffffff8); | ||
102 | &mov("eax", &DWP($data_off,"esp","",0)); # load iv[0] | ||
103 | &mov("ebx", &DWP($data_off+4,"esp","",0)); # load iv[1] | ||
104 | |||
105 | &jz(&label("encrypt_finish")); | ||
106 | |||
107 | ############################################################# | ||
108 | |||
109 | &set_label("encrypt_loop"); | ||
110 | # encrypt start | ||
111 | # "eax" and "ebx" hold iv (or the last cipher text) | ||
112 | |||
113 | &mov("ecx", &DWP(0,$in,"",0)); # load first 4 bytes | ||
114 | &mov("edx", &DWP(4,$in,"",0)); # second 4 bytes | ||
115 | |||
116 | &xor("eax", "ecx"); | ||
117 | &xor("ebx", "edx"); | ||
118 | |||
119 | &bswap("eax") if $swap; | ||
120 | &bswap("ebx") if $swap; | ||
121 | |||
122 | &mov(&DWP($data_off,"esp","",0), "eax"); # put in array for call | ||
123 | &mov(&DWP($data_off+4,"esp","",0), "ebx"); # | ||
124 | |||
125 | &call($enc_func); | ||
126 | |||
127 | &mov("eax", &DWP($data_off,"esp","",0)); | ||
128 | &mov("ebx", &DWP($data_off+4,"esp","",0)); | ||
129 | |||
130 | &bswap("eax") if $swap; | ||
131 | &bswap("ebx") if $swap; | ||
132 | |||
133 | &mov(&DWP(0,$out,"",0),"eax"); | ||
134 | &mov(&DWP(4,$out,"",0),"ebx"); | ||
135 | |||
136 | # eax and ebx are the next iv. | ||
137 | |||
138 | &add($in, 8); | ||
139 | &add($out, 8); | ||
140 | |||
141 | &sub($count, 8); | ||
142 | &jnz(&label("encrypt_loop")); | ||
143 | |||
144 | ###################################################################3 | ||
145 | &set_label("encrypt_finish"); | ||
146 | &mov($count, &wparam(2)); # length | ||
147 | &and($count, 7); | ||
148 | &jz(&label("finish")); | ||
149 | &call(&label("PIC_point")); | ||
150 | &set_label("PIC_point"); | ||
151 | &blindpop("edx"); | ||
152 | &lea("ecx",&DWP(&label("cbc_enc_jmp_table")."-".&label("PIC_point"),"edx")); | ||
153 | &mov($count,&DWP(0,"ecx",$count,4)) | ||
154 | &add($count,"edx"); | ||
155 | &xor("ecx","ecx"); | ||
156 | &xor("edx","edx"); | ||
157 | #&mov($count,&DWP(&label("cbc_enc_jmp_table"),"",$count,4)); | ||
158 | &jmp_ptr($count); | ||
159 | |||
160 | &set_label("ej7"); | ||
161 | &movb(&HB("edx"), &BP(6,$in,"",0)); | ||
162 | &shl("edx",8); | ||
163 | &set_label("ej6"); | ||
164 | &movb(&HB("edx"), &BP(5,$in,"",0)); | ||
165 | &set_label("ej5"); | ||
166 | &movb(&LB("edx"), &BP(4,$in,"",0)); | ||
167 | &set_label("ej4"); | ||
168 | &mov("ecx", &DWP(0,$in,"",0)); | ||
169 | &jmp(&label("ejend")); | ||
170 | &set_label("ej3"); | ||
171 | &movb(&HB("ecx"), &BP(2,$in,"",0)); | ||
172 | &shl("ecx",8); | ||
173 | &set_label("ej2"); | ||
174 | &movb(&HB("ecx"), &BP(1,$in,"",0)); | ||
175 | &set_label("ej1"); | ||
176 | &movb(&LB("ecx"), &BP(0,$in,"",0)); | ||
177 | &set_label("ejend"); | ||
178 | |||
179 | &xor("eax", "ecx"); | ||
180 | &xor("ebx", "edx"); | ||
181 | |||
182 | &bswap("eax") if $swap; | ||
183 | &bswap("ebx") if $swap; | ||
184 | |||
185 | &mov(&DWP($data_off,"esp","",0), "eax"); # put in array for call | ||
186 | &mov(&DWP($data_off+4,"esp","",0), "ebx"); # | ||
187 | |||
188 | &call($enc_func); | ||
189 | |||
190 | &mov("eax", &DWP($data_off,"esp","",0)); | ||
191 | &mov("ebx", &DWP($data_off+4,"esp","",0)); | ||
192 | |||
193 | &bswap("eax") if $swap; | ||
194 | &bswap("ebx") if $swap; | ||
195 | |||
196 | &mov(&DWP(0,$out,"",0),"eax"); | ||
197 | &mov(&DWP(4,$out,"",0),"ebx"); | ||
198 | |||
199 | &jmp(&label("finish")); | ||
200 | |||
201 | ############################################################# | ||
202 | ############################################################# | ||
203 | &set_label("decrypt",1); | ||
204 | # decrypt start | ||
205 | &and($count,0xfffffff8); | ||
206 | # The next 2 instructions are only for if the jz is taken | ||
207 | &mov("eax", &DWP($data_off+8,"esp","",0)); # get iv[0] | ||
208 | &mov("ebx", &DWP($data_off+12,"esp","",0)); # get iv[1] | ||
209 | &jz(&label("decrypt_finish")); | ||
210 | |||
211 | &set_label("decrypt_loop"); | ||
212 | &mov("eax", &DWP(0,$in,"",0)); # load first 4 bytes | ||
213 | &mov("ebx", &DWP(4,$in,"",0)); # second 4 bytes | ||
214 | |||
215 | &bswap("eax") if $swap; | ||
216 | &bswap("ebx") if $swap; | ||
217 | |||
218 | &mov(&DWP($data_off,"esp","",0), "eax"); # put back | ||
219 | &mov(&DWP($data_off+4,"esp","",0), "ebx"); # | ||
220 | |||
221 | &call($dec_func); | ||
222 | |||
223 | &mov("eax", &DWP($data_off,"esp","",0)); # get return | ||
224 | &mov("ebx", &DWP($data_off+4,"esp","",0)); # | ||
225 | |||
226 | &bswap("eax") if $swap; | ||
227 | &bswap("ebx") if $swap; | ||
228 | |||
229 | &mov("ecx", &DWP($data_off+8,"esp","",0)); # get iv[0] | ||
230 | &mov("edx", &DWP($data_off+12,"esp","",0)); # get iv[1] | ||
231 | |||
232 | &xor("ecx", "eax"); | ||
233 | &xor("edx", "ebx"); | ||
234 | |||
235 | &mov("eax", &DWP(0,$in,"",0)); # get old cipher text, | ||
236 | &mov("ebx", &DWP(4,$in,"",0)); # next iv actually | ||
237 | |||
238 | &mov(&DWP(0,$out,"",0),"ecx"); | ||
239 | &mov(&DWP(4,$out,"",0),"edx"); | ||
240 | |||
241 | &mov(&DWP($data_off+8,"esp","",0), "eax"); # save iv | ||
242 | &mov(&DWP($data_off+12,"esp","",0), "ebx"); # | ||
243 | |||
244 | &add($in, 8); | ||
245 | &add($out, 8); | ||
246 | |||
247 | &sub($count, 8); | ||
248 | &jnz(&label("decrypt_loop")); | ||
249 | ############################ ENDIT #######################3 | ||
250 | &set_label("decrypt_finish"); | ||
251 | &mov($count, &wparam(2)); # length | ||
252 | &and($count, 7); | ||
253 | &jz(&label("finish")); | ||
254 | |||
255 | &mov("eax", &DWP(0,$in,"",0)); # load first 4 bytes | ||
256 | &mov("ebx", &DWP(4,$in,"",0)); # second 4 bytes | ||
257 | |||
258 | &bswap("eax") if $swap; | ||
259 | &bswap("ebx") if $swap; | ||
260 | |||
261 | &mov(&DWP($data_off,"esp","",0), "eax"); # put back | ||
262 | &mov(&DWP($data_off+4,"esp","",0), "ebx"); # | ||
263 | |||
264 | &call($dec_func); | ||
265 | |||
266 | &mov("eax", &DWP($data_off,"esp","",0)); # get return | ||
267 | &mov("ebx", &DWP($data_off+4,"esp","",0)); # | ||
268 | |||
269 | &bswap("eax") if $swap; | ||
270 | &bswap("ebx") if $swap; | ||
271 | |||
272 | &mov("ecx", &DWP($data_off+8,"esp","",0)); # get iv[0] | ||
273 | &mov("edx", &DWP($data_off+12,"esp","",0)); # get iv[1] | ||
274 | |||
275 | &xor("ecx", "eax"); | ||
276 | &xor("edx", "ebx"); | ||
277 | |||
278 | # this is for when we exit | ||
279 | &mov("eax", &DWP(0,$in,"",0)); # get old cipher text, | ||
280 | &mov("ebx", &DWP(4,$in,"",0)); # next iv actually | ||
281 | |||
282 | &set_label("dj7"); | ||
283 | &rotr("edx", 16); | ||
284 | &movb(&BP(6,$out,"",0), &LB("edx")); | ||
285 | &shr("edx",16); | ||
286 | &set_label("dj6"); | ||
287 | &movb(&BP(5,$out,"",0), &HB("edx")); | ||
288 | &set_label("dj5"); | ||
289 | &movb(&BP(4,$out,"",0), &LB("edx")); | ||
290 | &set_label("dj4"); | ||
291 | &mov(&DWP(0,$out,"",0), "ecx"); | ||
292 | &jmp(&label("djend")); | ||
293 | &set_label("dj3"); | ||
294 | &rotr("ecx", 16); | ||
295 | &movb(&BP(2,$out,"",0), &LB("ecx")); | ||
296 | &shl("ecx",16); | ||
297 | &set_label("dj2"); | ||
298 | &movb(&BP(1,$in,"",0), &HB("ecx")); | ||
299 | &set_label("dj1"); | ||
300 | &movb(&BP(0,$in,"",0), &LB("ecx")); | ||
301 | &set_label("djend"); | ||
302 | |||
303 | # final iv is still in eax:ebx | ||
304 | &jmp(&label("finish")); | ||
305 | |||
306 | |||
307 | ############################ FINISH #######################3 | ||
308 | &set_label("finish",1); | ||
309 | &mov("ecx", &wparam($iv_off)); # Get iv ptr | ||
310 | |||
311 | ################################################# | ||
312 | $total=16+4; | ||
313 | $total+=4 if ($p1 > 0); | ||
314 | $total+=4 if ($p2 > 0); | ||
315 | $total+=4 if ($p3 > 0); | ||
316 | &add("esp",$total); | ||
317 | |||
318 | &mov(&DWP(0,"ecx","",0), "eax"); # save iv | ||
319 | &mov(&DWP(4,"ecx","",0), "ebx"); # save iv | ||
320 | |||
321 | &function_end_A($name); | ||
322 | |||
323 | &align(64); | ||
324 | &set_label("cbc_enc_jmp_table"); | ||
325 | &data_word("0"); | ||
326 | &data_word(&label("ej1")."-".&label("PIC_point")); | ||
327 | &data_word(&label("ej2")."-".&label("PIC_point")); | ||
328 | &data_word(&label("ej3")."-".&label("PIC_point")); | ||
329 | &data_word(&label("ej4")."-".&label("PIC_point")); | ||
330 | &data_word(&label("ej5")."-".&label("PIC_point")); | ||
331 | &data_word(&label("ej6")."-".&label("PIC_point")); | ||
332 | &data_word(&label("ej7")."-".&label("PIC_point")); | ||
333 | # not used | ||
334 | #&set_label("cbc_dec_jmp_table",1); | ||
335 | #&data_word("0"); | ||
336 | #&data_word(&label("dj1")."-".&label("PIC_point")); | ||
337 | #&data_word(&label("dj2")."-".&label("PIC_point")); | ||
338 | #&data_word(&label("dj3")."-".&label("PIC_point")); | ||
339 | #&data_word(&label("dj4")."-".&label("PIC_point")); | ||
340 | #&data_word(&label("dj5")."-".&label("PIC_point")); | ||
341 | #&data_word(&label("dj6")."-".&label("PIC_point")); | ||
342 | #&data_word(&label("dj7")."-".&label("PIC_point")); | ||
343 | &align(64); | ||
344 | |||
345 | &function_end_B($name); | ||
346 | |||
347 | } | ||
348 | |||
349 | 1; | ||