160 lines
3.3 KiB
Raku
160 lines
3.3 KiB
Raku
#!/usr/local/bin/perl
|
|
#!/usr/local/bin/perl
|
|
|
|
$prog="bf586.pl";
|
|
|
|
# base code is in microsft
|
|
# op dest, source
|
|
# format.
|
|
#
|
|
|
|
if ( ($ARGV[0] eq "elf"))
|
|
{ require "x86unix.pl"; }
|
|
elsif ( ($ARGV[0] eq "a.out"))
|
|
{ $aout=1; require "x86unix.pl"; }
|
|
elsif ( ($ARGV[0] eq "sol"))
|
|
{ $sol=1; require "x86unix.pl"; }
|
|
elsif ( ($ARGV[0] eq "cpp"))
|
|
{ $cpp=1; require "x86unix.pl"; }
|
|
elsif ( ($ARGV[0] eq "win32"))
|
|
{ require "x86ms.pl"; }
|
|
else
|
|
{
|
|
print STDERR <<"EOF";
|
|
Pick one target type from
|
|
elf - linux, FreeBSD etc
|
|
a.out - old linux
|
|
sol - x86 solaris
|
|
cpp - format so x86unix.cpp can be used
|
|
win32 - Windows 95/Windows NT
|
|
EOF
|
|
exit(1);
|
|
}
|
|
|
|
&comment("Don't even think of reading this code");
|
|
&comment("It was automatically generated by $prog");
|
|
&comment("Which is a perl program used to generate the x86 assember for");
|
|
&comment("any of elf, a.out, Win32, or Solaris");
|
|
&comment("It can be found in SSLeay 0.7.0+");
|
|
&comment("eric <eay\@cryptsoft.com>");
|
|
&comment("");
|
|
|
|
&file("bfx86xxxx");
|
|
|
|
$BF_ROUNDS=16;
|
|
$BF_OFF=($BF_ROUNDS+2)*4;
|
|
$L="ecx";
|
|
$R="edx";
|
|
$P="edi";
|
|
$tot="esi";
|
|
$tmp1="eax";
|
|
$tmp2="ebx";
|
|
$tmp3="ebp";
|
|
|
|
&des_encrypt("BF_encrypt");
|
|
|
|
&file_end();
|
|
|
|
sub des_encrypt
|
|
{
|
|
local($name)=@_;
|
|
|
|
&function_begin($name,3,"");
|
|
|
|
&comment("");
|
|
&comment("Load the 2 words");
|
|
&mov("eax",&wparam(0));
|
|
&mov($L,&DWP(0,"eax","",0));
|
|
&mov($R,&DWP(4,"eax","",0));
|
|
|
|
&comment("");
|
|
&comment("P pointer, s and enc flag");
|
|
&mov($P,&wparam(1));
|
|
|
|
&xor( $tmp1, $tmp1);
|
|
&xor( $tmp2, $tmp2);
|
|
|
|
# encrypting part
|
|
|
|
&mov("ebp",&wparam(2)); # get encrypt flag
|
|
&cmp("ebp","0");
|
|
&je(&label("start_decrypt"));
|
|
|
|
&xor($L,&DWP(0,$P,"",0));
|
|
for ($i=0; $i<$BF_ROUNDS; $i+=2)
|
|
{
|
|
&comment("");
|
|
&comment("Round $i");
|
|
&BF_ENCRYPT($i+1,$R,$L,$P,$tot,$tmp1,$tmp2,$tmp3);
|
|
|
|
&comment("");
|
|
&comment("Round ".sprintf("%d",$i+1));
|
|
&BF_ENCRYPT($i+2,$L,$R,$P,$tot,$tmp1,$tmp2,$tmp3);
|
|
}
|
|
&xor($R,&DWP(($BF_ROUNDS+1)*4,$P,"",0));
|
|
|
|
&mov("eax",&wparam(0));
|
|
&mov(&DWP(0,"eax","",0),$R);
|
|
&mov(&DWP(4,"eax","",0),$L);
|
|
&function_end_A($name);
|
|
|
|
&set_label("start_decrypt");
|
|
|
|
&xor($L,&DWP(($BF_ROUNDS+1)*4,$P,"",0));
|
|
for ($i=$BF_ROUNDS; $i>0; $i-=2)
|
|
{
|
|
&comment("");
|
|
&comment("Round $i");
|
|
&BF_ENCRYPT($i,$R,$L,$P,$tot,$tmp1,$tmp2,$tmp3);
|
|
&comment("");
|
|
&comment("Round ".sprintf("%d",$i-1));
|
|
&BF_ENCRYPT($i-1,$L,$R,$P,$tot,$tmp1,$tmp2,$tmp3);
|
|
}
|
|
&xor($R,&DWP(0,$P,"",0));
|
|
|
|
&mov("eax",&wparam(0));
|
|
&mov(&DWP(0,"eax","",0),$R);
|
|
&mov(&DWP(4,"eax","",0),$L);
|
|
&function_end_A($name);
|
|
|
|
&function_end_B($name);
|
|
}
|
|
|
|
sub BF_ENCRYPT
|
|
{
|
|
local($i,$L,$R,$P,$tot,$tmp1,$tmp2,$tmp3)=@_;
|
|
|
|
&rotr( $R, 16);
|
|
&mov( $tot, &DWP(&n2a($i*4),$P,"",0));
|
|
|
|
&movb( &LB($tmp1), &HB($R));
|
|
&movb( &LB($tmp2), &LB($R));
|
|
|
|
&rotr( $R, 16);
|
|
&xor( $L, $tot);
|
|
|
|
&mov( $tot, &DWP(&n2a($BF_OFF+0x0000),$P,$tmp1,4));
|
|
&mov( $tmp3, &DWP(&n2a($BF_OFF+0x0400),$P,$tmp2,4));
|
|
|
|
&movb( &LB($tmp1), &HB($R));
|
|
&movb( &LB($tmp2), &LB($R));
|
|
|
|
&add( $tot, $tmp3);
|
|
&mov( $tmp1, &DWP(&n2a($BF_OFF+0x0800),$P,$tmp1,4)); # delay
|
|
|
|
&xor( $tot, $tmp1);
|
|
&mov( $tmp3, &DWP(&n2a($BF_OFF+0x0C00),$P,$tmp2,4));
|
|
|
|
&add( $tot, $tmp3);
|
|
&xor( $tmp1, $tmp1);
|
|
|
|
&xor( $L, $tot);
|
|
# delay
|
|
}
|
|
|
|
sub n2a
|
|
{
|
|
sprintf("%d",$_[0]);
|
|
}
|
|
|