xref: /freebsd/crypto/openssl/crypto/perlasm/cbc.pl (revision aa0a1e58)
1#!/usr/local/bin/perl
2
3# void des_ncbc_encrypt(input, output, length, schedule, ivec, enc)
4# des_cblock (*input);
5# des_cblock (*output);
6# long length;
7# des_key_schedule schedule;
8# des_cblock (*ivec);
9# int enc;
10#
11# calls
12# des_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
13#
14
15#&cbc("des_ncbc_encrypt","des_encrypt",0);
16#&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",
17#	1,4,5,3,5,-1);
18#&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",
19#	0,4,5,3,5,-1);
20#&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",
21#	0,6,7,3,4,5);
22#
23# When doing a cipher that needs bigendian order,
24# for encrypt, the iv is kept in bigendian form,
25# while for decrypt, it is kept in little endian.
26sub cbc
27	{
28	local($name,$enc_func,$dec_func,$swap,$iv_off,$enc_off,$p1,$p2,$p3)=@_;
29	# name is the function name
30	# enc_func and dec_func and the functions to call for encrypt/decrypt
31	# swap is true if byte order needs to be reversed
32	# iv_off is parameter number for the iv
33	# enc_off is parameter number for the encrypt/decrypt flag
34	# p1,p2,p3 are the offsets for parameters to be passed to the
35	# underlying calls.
36
37	&function_begin_B($name,"");
38	&comment("");
39
40	$in="esi";
41	$out="edi";
42	$count="ebp";
43
44	&push("ebp");
45	&push("ebx");
46	&push("esi");
47	&push("edi");
48
49	$data_off=4;
50	$data_off+=4 if ($p1 > 0);
51	$data_off+=4 if ($p2 > 0);
52	$data_off+=4 if ($p3 > 0);
53
54	&mov($count,	&wparam(2));	# length
55
56	&comment("getting iv ptr from parameter $iv_off");
57	&mov("ebx",	&wparam($iv_off));	# Get iv ptr
58
59	&mov($in,	&DWP(0,"ebx","",0));#	iv[0]
60	&mov($out,	&DWP(4,"ebx","",0));#	iv[1]
61
62	&push($out);
63	&push($in);
64	&push($out);	# used in decrypt for iv[1]
65	&push($in);	# used in decrypt for iv[0]
66
67	&mov("ebx",	"esp");		# This is the address of tin[2]
68
69	&mov($in,	&wparam(0));	# in
70	&mov($out,	&wparam(1));	# out
71
72	# We have loaded them all, how lets push things
73	&comment("getting encrypt flag from parameter $enc_off");
74	&mov("ecx",	&wparam($enc_off));	# Get enc flag
75	if ($p3 > 0)
76		{
77		&comment("get and push parameter $p3");
78		if ($enc_off != $p3)
79			{ &mov("eax",	&wparam($p3)); &push("eax"); }
80		else	{ &push("ecx"); }
81		}
82	if ($p2 > 0)
83		{
84		&comment("get and push parameter $p2");
85		if ($enc_off != $p2)
86			{ &mov("eax",	&wparam($p2)); &push("eax"); }
87		else	{ &push("ecx"); }
88		}
89	if ($p1 > 0)
90		{
91		&comment("get and push parameter $p1");
92		if ($enc_off != $p1)
93			{ &mov("eax",	&wparam($p1)); &push("eax"); }
94		else	{ &push("ecx"); }
95		}
96	&push("ebx");		# push data/iv
97
98	&cmp("ecx",0);
99	&jz(&label("decrypt"));
100
101	&and($count,0xfffffff8);
102	&mov("eax",	&DWP($data_off,"esp","",0));	# load iv[0]
103	&mov("ebx",	&DWP($data_off+4,"esp","",0));	# load iv[1]
104
105	&jz(&label("encrypt_finish"));
106
107	#############################################################
108
109	&set_label("encrypt_loop");
110	# encrypt start
111	# "eax" and "ebx" hold iv (or the last cipher text)
112
113	&mov("ecx",	&DWP(0,$in,"",0));	# load first 4 bytes
114	&mov("edx",	&DWP(4,$in,"",0));	# second 4 bytes
115
116	&xor("eax",	"ecx");
117	&xor("ebx",	"edx");
118
119	&bswap("eax")	if $swap;
120	&bswap("ebx")	if $swap;
121
122	&mov(&DWP($data_off,"esp","",0),	"eax");	# put in array for call
123	&mov(&DWP($data_off+4,"esp","",0),	"ebx");	#
124
125	&call($enc_func);
126
127	&mov("eax",	&DWP($data_off,"esp","",0));
128	&mov("ebx",	&DWP($data_off+4,"esp","",0));
129
130	&bswap("eax")	if $swap;
131	&bswap("ebx")	if $swap;
132
133	&mov(&DWP(0,$out,"",0),"eax");
134	&mov(&DWP(4,$out,"",0),"ebx");
135
136	# eax and ebx are the next iv.
137
138	&add($in,	8);
139	&add($out,	8);
140
141	&sub($count,	8);
142	&jnz(&label("encrypt_loop"));
143
144###################################################################3
145	&set_label("encrypt_finish");
146	&mov($count,	&wparam(2));	# length
147	&and($count,	7);
148	&jz(&label("finish"));
149	&call(&label("PIC_point"));
150&set_label("PIC_point");
151	&blindpop("edx");
152	&lea("ecx",&DWP(&label("cbc_enc_jmp_table")."-".&label("PIC_point"),"edx"));
153	&mov($count,&DWP(0,"ecx",$count,4))
154	&add($count,"edx");
155	&xor("ecx","ecx");
156	&xor("edx","edx");
157	#&mov($count,&DWP(&label("cbc_enc_jmp_table"),"",$count,4));
158	&jmp_ptr($count);
159
160&set_label("ej7");
161	&xor("edx",		"edx") if $ppro; # ppro friendly
162	&movb(&HB("edx"),	&BP(6,$in,"",0));
163	&shl("edx",8);
164&set_label("ej6");
165	&movb(&HB("edx"),	&BP(5,$in,"",0));
166&set_label("ej5");
167	&movb(&LB("edx"),	&BP(4,$in,"",0));
168&set_label("ej4");
169	&mov("ecx",		&DWP(0,$in,"",0));
170	&jmp(&label("ejend"));
171&set_label("ej3");
172	&movb(&HB("ecx"),	&BP(2,$in,"",0));
173	&xor("ecx",		"ecx") if $ppro; # ppro friendly
174	&shl("ecx",8);
175&set_label("ej2");
176	&movb(&HB("ecx"),	&BP(1,$in,"",0));
177&set_label("ej1");
178	&movb(&LB("ecx"),	&BP(0,$in,"",0));
179&set_label("ejend");
180
181	&xor("eax",	"ecx");
182	&xor("ebx",	"edx");
183
184	&bswap("eax")	if $swap;
185	&bswap("ebx")	if $swap;
186
187	&mov(&DWP($data_off,"esp","",0),	"eax");	# put in array for call
188	&mov(&DWP($data_off+4,"esp","",0),	"ebx");	#
189
190	&call($enc_func);
191
192	&mov("eax",	&DWP($data_off,"esp","",0));
193	&mov("ebx",	&DWP($data_off+4,"esp","",0));
194
195	&bswap("eax")	if $swap;
196	&bswap("ebx")	if $swap;
197
198	&mov(&DWP(0,$out,"",0),"eax");
199	&mov(&DWP(4,$out,"",0),"ebx");
200
201	&jmp(&label("finish"));
202
203	#############################################################
204	#############################################################
205	&set_label("decrypt",1);
206	# decrypt start
207	&and($count,0xfffffff8);
208	# The next 2 instructions are only for if the jz is taken
209	&mov("eax",	&DWP($data_off+8,"esp","",0));	# get iv[0]
210	&mov("ebx",	&DWP($data_off+12,"esp","",0));	# get iv[1]
211	&jz(&label("decrypt_finish"));
212
213	&set_label("decrypt_loop");
214	&mov("eax",	&DWP(0,$in,"",0));	# load first 4 bytes
215	&mov("ebx",	&DWP(4,$in,"",0));	# second 4 bytes
216
217	&bswap("eax")	if $swap;
218	&bswap("ebx")	if $swap;
219
220	&mov(&DWP($data_off,"esp","",0),	"eax");	# put back
221	&mov(&DWP($data_off+4,"esp","",0),	"ebx");	#
222
223	&call($dec_func);
224
225	&mov("eax",	&DWP($data_off,"esp","",0));	# get return
226	&mov("ebx",	&DWP($data_off+4,"esp","",0));	#
227
228	&bswap("eax")	if $swap;
229	&bswap("ebx")	if $swap;
230
231	&mov("ecx",	&DWP($data_off+8,"esp","",0));	# get iv[0]
232	&mov("edx",	&DWP($data_off+12,"esp","",0));	# get iv[1]
233
234	&xor("ecx",	"eax");
235	&xor("edx",	"ebx");
236
237	&mov("eax",	&DWP(0,$in,"",0));	# get old cipher text,
238	&mov("ebx",	&DWP(4,$in,"",0));	# next iv actually
239
240	&mov(&DWP(0,$out,"",0),"ecx");
241	&mov(&DWP(4,$out,"",0),"edx");
242
243	&mov(&DWP($data_off+8,"esp","",0),	"eax");	# save iv
244	&mov(&DWP($data_off+12,"esp","",0),	"ebx");	#
245
246	&add($in,	8);
247	&add($out,	8);
248
249	&sub($count,	8);
250	&jnz(&label("decrypt_loop"));
251############################ ENDIT #######################3
252	&set_label("decrypt_finish");
253	&mov($count,	&wparam(2));	# length
254	&and($count,	7);
255	&jz(&label("finish"));
256
257	&mov("eax",	&DWP(0,$in,"",0));	# load first 4 bytes
258	&mov("ebx",	&DWP(4,$in,"",0));	# second 4 bytes
259
260	&bswap("eax")	if $swap;
261	&bswap("ebx")	if $swap;
262
263	&mov(&DWP($data_off,"esp","",0),	"eax");	# put back
264	&mov(&DWP($data_off+4,"esp","",0),	"ebx");	#
265
266	&call($dec_func);
267
268	&mov("eax",	&DWP($data_off,"esp","",0));	# get return
269	&mov("ebx",	&DWP($data_off+4,"esp","",0));	#
270
271	&bswap("eax")	if $swap;
272	&bswap("ebx")	if $swap;
273
274	&mov("ecx",	&DWP($data_off+8,"esp","",0));	# get iv[0]
275	&mov("edx",	&DWP($data_off+12,"esp","",0));	# get iv[1]
276
277	&xor("ecx",	"eax");
278	&xor("edx",	"ebx");
279
280	# this is for when we exit
281	&mov("eax",	&DWP(0,$in,"",0));	# get old cipher text,
282	&mov("ebx",	&DWP(4,$in,"",0));	# next iv actually
283
284&set_label("dj7");
285	&rotr("edx",	16);
286	&movb(&BP(6,$out,"",0),	&LB("edx"));
287	&shr("edx",16);
288&set_label("dj6");
289	&movb(&BP(5,$out,"",0),	&HB("edx"));
290&set_label("dj5");
291	&movb(&BP(4,$out,"",0),	&LB("edx"));
292&set_label("dj4");
293	&mov(&DWP(0,$out,"",0),	"ecx");
294	&jmp(&label("djend"));
295&set_label("dj3");
296	&rotr("ecx",	16);
297	&movb(&BP(2,$out,"",0),	&LB("ecx"));
298	&shl("ecx",16);
299&set_label("dj2");
300	&movb(&BP(1,$in,"",0),	&HB("ecx"));
301&set_label("dj1");
302	&movb(&BP(0,$in,"",0),	&LB("ecx"));
303&set_label("djend");
304
305	# final iv is still in eax:ebx
306	&jmp(&label("finish"));
307
308
309############################ FINISH #######################3
310	&set_label("finish",1);
311	&mov("ecx",	&wparam($iv_off));	# Get iv ptr
312
313	#################################################
314	$total=16+4;
315	$total+=4 if ($p1 > 0);
316	$total+=4 if ($p2 > 0);
317	$total+=4 if ($p3 > 0);
318	&add("esp",$total);
319
320	&mov(&DWP(0,"ecx","",0),	"eax");	# save iv
321	&mov(&DWP(4,"ecx","",0),	"ebx");	# save iv
322
323	&function_end_A($name);
324
325	&align(64);
326	&set_label("cbc_enc_jmp_table");
327	&data_word("0");
328	&data_word(&label("ej1")."-".&label("PIC_point"));
329	&data_word(&label("ej2")."-".&label("PIC_point"));
330	&data_word(&label("ej3")."-".&label("PIC_point"));
331	&data_word(&label("ej4")."-".&label("PIC_point"));
332	&data_word(&label("ej5")."-".&label("PIC_point"));
333	&data_word(&label("ej6")."-".&label("PIC_point"));
334	&data_word(&label("ej7")."-".&label("PIC_point"));
335	# not used
336	#&set_label("cbc_dec_jmp_table",1);
337	#&data_word("0");
338	#&data_word(&label("dj1")."-".&label("PIC_point"));
339	#&data_word(&label("dj2")."-".&label("PIC_point"));
340	#&data_word(&label("dj3")."-".&label("PIC_point"));
341	#&data_word(&label("dj4")."-".&label("PIC_point"));
342	#&data_word(&label("dj5")."-".&label("PIC_point"));
343	#&data_word(&label("dj6")."-".&label("PIC_point"));
344	#&data_word(&label("dj7")."-".&label("PIC_point"));
345	&align(64);
346
347	&function_end_B($name);
348
349	}
350
3511;
352