VeraCrypt/src/Crypto/AesSmall_x86.asm
2016-05-10 22:24:06 +02:00

1445 lines
37 KiB
NASM

; ---------------------------------------------------------------------------
; Copyright (c) 1998-2007, Brian Gladman, Worcester, UK. All rights reserved.
;
; LICENSE TERMS
;
; The free distribution and use of this software is allowed (with or without
; changes) provided that:
;
; 1. source code distributions include the above copyright notice, this
; list of conditions and the following disclaimer;
;
; 2. binary distributions include the above copyright notice, this list
; of conditions and the following disclaimer in their documentation;
;
; 3. the name of the copyright holder is not used to endorse products
; built using this software without specific written permission.
;
; DISCLAIMER
;
; This software is provided 'as is' with no explicit or implied warranties
; in respect of its properties, including, but not limited to, correctness
; and/or fitness for purpose.
; ---------------------------------------------------------------------------
; Issue 20/12/2007
;
; This code requires either ASM_X86_V2 or ASM_X86_V2C to be set in aesopt.h
; and the same define to be set here as well. If AES_V2C is set this file
; requires the C files aeskey.c and aestab.c for support.
; An AES implementation for x86 processors using the YASM (or NASM) assembler.
; This is a full assembler implementation covering encryption, decryption and
; key scheduling. It uses 2k bytes of tables but its encryption and decryption
; performance is very close to that obtained using large tables. Key schedule
; expansion is slower for both encryption and decryption but this is likely to
; be offset by the much smaller load that this version places on the processor
; cache. I acknowledge the contribution made by Daniel Bernstein to aspects of
; the design of the AES round function used here.
;
; This code provides the standard AES block size (128 bits, 16 bytes) and the
; three standard AES key sizes (128, 192 and 256 bits). It has the same call
; interface as my C implementation. The ebx, esi, edi and ebp registers are
; preserved across calls but eax, ecx and edx and the artihmetic status flags
; are not. Although this is a full assembler implementation, it can be used
; in conjunction with my C code which provides faster key scheduling using
; large tables. In this case aeskey.c should be compiled with ASM_X86_V2C
; defined. It is also important that the defines below match those used in the
; C code. This code uses the VC++ register saving conentions; if it is used
; with another compiler, conventions for using and saving registers may need
; to be checked (and calling conventions). The YASM command line for the VC++
; custom build step is:
;
; yasm -Xvc -f win32 -D <Z> -o "$(TargetDir)\$(InputName).obj" "$(InputPath)"
;
; For the cryptlib build this is (pcg):
;
; yasm -Xvc -f win32 -D ASM_X86_V2C -o aescrypt2.obj aes_x86_v2.asm
;
; where <Z> is ASM_X86_V2 or ASM_X86_V2C. The calling intefaces are:
;
; AES_RETURN aes_encrypt(const unsigned char in_blk[],
; unsigned char out_blk[], const aes_encrypt_ctx cx[1]);
;
; AES_RETURN aes_decrypt(const unsigned char in_blk[],
; unsigned char out_blk[], const aes_decrypt_ctx cx[1]);
;
; AES_RETURN aes_encrypt_key<NNN>(const unsigned char key[],
; const aes_encrypt_ctx cx[1]);
;
; AES_RETURN aes_decrypt_key<NNN>(const unsigned char key[],
; const aes_decrypt_ctx cx[1]);
;
; AES_RETURN aes_encrypt_key(const unsigned char key[],
; unsigned int len, const aes_decrypt_ctx cx[1]);
;
; AES_RETURN aes_decrypt_key(const unsigned char key[],
; unsigned int len, const aes_decrypt_ctx cx[1]);
;
; where <NNN> is 128, 102 or 256. In the last two calls the length can be in
; either bits or bytes.
; The DLL interface must use the _stdcall convention in which the number
; of bytes of parameter space is added after an @ to the sutine's name.
; We must also remove our parameters from the stack before return (see
; the do_exit macro). Define DLL_EXPORT for the Dynamic Link Library version.
;
; Adapted for TrueCrypt:
; - All tables generated at run-time
; - Adapted for 16-bit environment
;
CPU 386
USE16
SEGMENT _TEXT PUBLIC CLASS=CODE USE16
SEGMENT _DATA PUBLIC CLASS=DATA USE16
GROUP DGROUP _TEXT _DATA
extern _aes_dec_tab ; Aestab.c
extern _aes_enc_tab
; %define DLL_EXPORT
; The size of the code can be reduced by using functions for the encryption
; and decryption rounds in place of macro expansion
%define REDUCE_CODE_SIZE
; Comment in/out the following lines to obtain the desired subroutines. These
; selections MUST match those in the C header file aes.h
; %define AES_128 ; define if AES with 128 bit keys is needed
; %define AES_192 ; define if AES with 192 bit keys is needed
%define AES_256 ; define if AES with 256 bit keys is needed
; %define AES_VAR ; define if a variable key size is needed
%define ENCRYPTION ; define if encryption is needed
%define DECRYPTION ; define if decryption is needed
; %define AES_REV_DKS ; define if key decryption schedule is reversed
%ifndef ASM_X86_V2C
%define ENCRYPTION_KEY_SCHEDULE ; define if encryption key expansion is needed
%define DECRYPTION_KEY_SCHEDULE ; define if decryption key expansion is needed
%endif
; The encryption key schedule has the following in memory layout where N is the
; number of rounds (10, 12 or 14):
;
; lo: | input key (round 0) | ; each round is four 32-bit words
; | encryption round 1 |
; | encryption round 2 |
; ....
; | encryption round N-1 |
; hi: | encryption round N |
;
; The decryption key schedule is normally set up so that it has the same
; layout as above by actually reversing the order of the encryption key
; schedule in memory (this happens when AES_REV_DKS is set):
;
; lo: | decryption round 0 | = | encryption round N |
; | decryption round 1 | = INV_MIX_COL[ | encryption round N-1 | ]
; | decryption round 2 | = INV_MIX_COL[ | encryption round N-2 | ]
; .... ....
; | decryption round N-1 | = INV_MIX_COL[ | encryption round 1 | ]
; hi: | decryption round N | = | input key (round 0) |
;
; with rounds except the first and last modified using inv_mix_column()
; But if AES_REV_DKS is NOT set the order of keys is left as it is for
; encryption so that it has to be accessed in reverse when used for
; decryption (although the inverse mix column modifications are done)
;
; lo: | decryption round 0 | = | input key (round 0) |
; | decryption round 1 | = INV_MIX_COL[ | encryption round 1 | ]
; | decryption round 2 | = INV_MIX_COL[ | encryption round 2 | ]
; .... ....
; | decryption round N-1 | = INV_MIX_COL[ | encryption round N-1 | ]
; hi: | decryption round N | = | encryption round N |
;
; This layout is faster when the assembler key scheduling provided here
; is used.
;
; End of user defines
%ifdef AES_VAR
%ifndef AES_128
%define AES_128
%endif
%ifndef AES_192
%define AES_192
%endif
%ifndef AES_256
%define AES_256
%endif
%endif
%ifdef AES_VAR
%define KS_LENGTH 60
%elifdef AES_256
%define KS_LENGTH 60
%elifdef AES_192
%define KS_LENGTH 52
%else
%define KS_LENGTH 44
%endif
; These macros implement stack based local variables
%macro save 2
mov [esp+4*%1],%2
%endmacro
%macro restore 2
mov %1,[esp+4*%2]
%endmacro
%ifdef REDUCE_CODE_SIZE
%macro mf_call 1
call %1
%endmacro
%else
%macro mf_call 1
%1
%endmacro
%endif
; the DLL has to implement the _stdcall calling interface on return
; In this case we have to take our parameters (3 4-byte pointers)
; off the stack
%define parms 12
%macro do_name 1-2 parms
%ifndef DLL_EXPORT
global %1
%1:
%else
global %1@%2
export %1@%2
%1@%2:
%endif
%endmacro
%macro do_call 1-2 parms
%ifndef DLL_EXPORT
call %1
add esp,%2
%else
call %1@%2
%endif
%endmacro
%macro do_exit 0-1 parms
%ifdef DLL_EXPORT
ret %1
%else
ret
%endif
%endmacro
; finite field multiplies by {02}, {04} and {08}
%define f2(x) ((x<<1)^(((x>>7)&1)*0x11b))
%define f4(x) ((x<<2)^(((x>>6)&1)*0x11b)^(((x>>6)&2)*0x11b))
%define f8(x) ((x<<3)^(((x>>5)&1)*0x11b)^(((x>>5)&2)*0x11b)^(((x>>5)&4)*0x11b))
; finite field multiplies required in table generation
%define f3(x) (f2(x) ^ x)
%define f9(x) (f8(x) ^ x)
%define fb(x) (f8(x) ^ f2(x) ^ x)
%define fd(x) (f8(x) ^ f4(x) ^ x)
%define fe(x) (f8(x) ^ f4(x) ^ f2(x))
%define etab_0(x) [_aes_enc_tab+4+8*x]
%define etab_1(x) [_aes_enc_tab+3+8*x]
%define etab_2(x) [_aes_enc_tab+2+8*x]
%define etab_3(x) [_aes_enc_tab+1+8*x]
%define etab_b(x) byte [_aes_enc_tab+1+8*x] ; used with movzx for 0x000000xx
%define etab_w(x) word [_aes_enc_tab+8*x] ; used with movzx for 0x0000xx00
%define btab_0(x) [_aes_enc_tab+6+8*x]
%define btab_1(x) [_aes_enc_tab+5+8*x]
%define btab_2(x) [_aes_enc_tab+4+8*x]
%define btab_3(x) [_aes_enc_tab+3+8*x]
; ROUND FUNCTION. Build column[2] on ESI and column[3] on EDI that have the
; round keys pre-loaded. Build column[0] in EBP and column[1] in EBX.
;
; Input:
;
; EAX column[0]
; EBX column[1]
; ECX column[2]
; EDX column[3]
; ESI column key[round][2]
; EDI column key[round][3]
; EBP scratch
;
; Output:
;
; EBP column[0] unkeyed
; EBX column[1] unkeyed
; ESI column[2] keyed
; EDI column[3] keyed
; EAX scratch
; ECX scratch
; EDX scratch
%macro rnd_fun 2
rol ebx,16
%1 esi, cl, 0, ebp
%1 esi, dh, 1, ebp
%1 esi, bh, 3, ebp
%1 edi, dl, 0, ebp
%1 edi, ah, 1, ebp
%1 edi, bl, 2, ebp
%2 ebp, al, 0, ebp
shr ebx,16
and eax,0xffff0000
or eax,ebx
shr edx,16
%1 ebp, ah, 1, ebx
%1 ebp, dh, 3, ebx
%2 ebx, dl, 2, ebx
%1 ebx, ch, 1, edx
%1 ebx, al, 0, edx
shr eax,16
shr ecx,16
%1 ebp, cl, 2, edx
%1 edi, ch, 3, edx
%1 esi, al, 2, edx
%1 ebx, ah, 3, edx
%endmacro
; Basic MOV and XOR Operations for normal rounds
%macro nr_xor 4
movzx %4,%2
xor %1,etab_%3(%4)
%endmacro
%macro nr_mov 4
movzx %4,%2
mov %1,etab_%3(%4)
%endmacro
; Basic MOV and XOR Operations for last round
%if 1
%macro lr_xor 4
movzx %4,%2
movzx %4,etab_b(%4)
%if %3 != 0
shl %4,8*%3
%endif
xor %1,%4
%endmacro
%macro lr_mov 4
movzx %4,%2
movzx %1,etab_b(%4)
%if %3 != 0
shl %1,8*%3
%endif
%endmacro
%else ; less effective but worth leaving as an option
%macro lr_xor 4
movzx %4,%2
mov %4,btab_%3(%4)
and %4,0x000000ff << 8 * %3
xor %1,%4
%endmacro
%macro lr_mov 4
movzx %4,%2
mov %1,btab_%3(%4)
and %1,0x000000ff << 8 * %3
%endmacro
%endif
; Apply S-Box to the 4 bytes in a 32-bit word and rotate byte positions
%ifdef REDUCE_CODE_SIZE
l3s_col:
movzx ecx,al ; in eax
movzx ecx, etab_b(ecx) ; out eax
xor edx,ecx ; scratch ecx,edx
movzx ecx,ah
movzx ecx, etab_b(ecx)
shl ecx,8
xor edx,ecx
shr eax,16
movzx ecx,al
movzx ecx, etab_b(ecx)
shl ecx,16
xor edx,ecx
movzx ecx,ah
movzx ecx, etab_b(ecx)
shl ecx,24
xor edx,ecx
mov eax,edx
ret
%else
%macro l3s_col 0
movzx ecx,al ; in eax
movzx ecx, etab_b(ecx) ; out eax
xor edx,ecx ; scratch ecx,edx
movzx ecx,ah
movzx ecx, etab_b(ecx)
shl ecx,8
xor edx,ecx
shr eax,16
movzx ecx,al
movzx ecx, etab_b(ecx)
shl ecx,16
xor edx,ecx
movzx ecx,ah
movzx ecx, etab_b(ecx)
shl ecx,24
xor edx,ecx
mov eax,edx
%endmacro
%endif
; offsets to parameters
in_blk equ 2 ; input byte array address parameter
out_blk equ 4 ; output byte array address parameter
ctx equ 6 ; AES context structure
stk_spc equ 20 ; stack space
%ifdef ENCRYPTION
; %define ENCRYPTION_TABLE
%ifdef REDUCE_CODE_SIZE
enc_round:
sub sp, 2
add ebp,16
save 1,ebp
mov esi,[ebp+8]
mov edi,[ebp+12]
rnd_fun nr_xor, nr_mov
mov eax,ebp
mov ecx,esi
mov edx,edi
restore ebp,1
xor eax,[ebp]
xor ebx,[ebp+4]
add sp, 2
ret
%else
%macro enc_round 0
add ebp,16
save 0,ebp
mov esi,[ebp+8]
mov edi,[ebp+12]
rnd_fun nr_xor, nr_mov
mov eax,ebp
mov ecx,esi
mov edx,edi
restore ebp,0
xor eax,[ebp]
xor ebx,[ebp+4]
%endmacro
%endif
%macro enc_last_round 0
add ebp,16
save 0,ebp
mov esi,[ebp+8]
mov edi,[ebp+12]
rnd_fun lr_xor, lr_mov
mov eax,ebp
restore ebp,0
xor eax,[ebp]
xor ebx,[ebp+4]
%endmacro
section _TEXT
; AES Encryption Subroutine
do_name _aes_encrypt,12
mov ax, sp
movzx esp, ax
sub esp,stk_spc
mov [esp+16],ebp
mov [esp+12],ebx
mov [esp+ 8],esi
mov [esp+ 4],edi
movzx esi,word [esp+in_blk+stk_spc] ; input pointer
mov eax,[esi ]
mov ebx,[esi+ 4]
mov ecx,[esi+ 8]
mov edx,[esi+12]
movzx ebp,word [esp+ctx+stk_spc] ; key pointer
movzx edi,byte [ebp+4*KS_LENGTH]
xor eax,[ebp ]
xor ebx,[ebp+ 4]
xor ecx,[ebp+ 8]
xor edx,[ebp+12]
; determine the number of rounds
%ifndef AES_256
cmp edi,10*16
je .3
cmp edi,12*16
je .2
cmp edi,14*16
je .1
mov eax,-1
jmp .5
%endif
.1: mf_call enc_round
mf_call enc_round
.2: mf_call enc_round
mf_call enc_round
.3: mf_call enc_round
mf_call enc_round
mf_call enc_round
mf_call enc_round
mf_call enc_round
mf_call enc_round
mf_call enc_round
mf_call enc_round
mf_call enc_round
enc_last_round
movzx edx,word [esp+out_blk+stk_spc]
mov [edx],eax
mov [edx+4],ebx
mov [edx+8],esi
mov [edx+12],edi
xor eax,eax
.5: mov ebp,[esp+16]
mov ebx,[esp+12]
mov esi,[esp+ 8]
mov edi,[esp+ 4]
add esp,stk_spc
do_exit 12
%endif
%macro f_key 2
push ecx
push edx
mov edx,esi
ror eax,8
mf_call l3s_col
mov esi,eax
pop edx
pop ecx
xor esi,rc_val
mov [ebp+%1*%2],esi
xor edi,esi
mov [ebp+%1*%2+4],edi
xor ecx,edi
mov [ebp+%1*%2+8],ecx
xor edx,ecx
mov [ebp+%1*%2+12],edx
mov eax,edx
%if %2 == 24
%if %1 < 7
xor eax,[ebp+%1*%2+16-%2]
mov [ebp+%1*%2+16],eax
xor eax,[ebp+%1*%2+20-%2]
mov [ebp+%1*%2+20],eax
%endif
%elif %2 == 32
%if %1 < 6
push ecx
push edx
mov edx,[ebp+%1*%2+16-%2]
mf_call l3s_col
pop edx
pop ecx
mov [ebp+%1*%2+16],eax
xor eax,[ebp+%1*%2+20-%2]
mov [ebp+%1*%2+20],eax
xor eax,[ebp+%1*%2+24-%2]
mov [ebp+%1*%2+24],eax
xor eax,[ebp+%1*%2+28-%2]
mov [ebp+%1*%2+28],eax
%endif
%endif
%assign rc_val f2(rc_val)
%endmacro
%ifdef ENCRYPTION_KEY_SCHEDULE
%ifdef AES_128
%ifndef ENCRYPTION_TABLE
; %define ENCRYPTION_TABLE
%endif
%assign rc_val 1
do_name _aes_encrypt_key128,8
push ebp
push ebx
push esi
push edi
mov ebp,[esp+24]
mov [ebp+4*KS_LENGTH],dword 10*16
mov ebx,[esp+20]
mov esi,[ebx]
mov [ebp],esi
mov edi,[ebx+4]
mov [ebp+4],edi
mov ecx,[ebx+8]
mov [ebp+8],ecx
mov edx,[ebx+12]
mov [ebp+12],edx
add ebp,16
mov eax,edx
f_key 0,16 ; 11 * 4 = 44 unsigned longs
f_key 1,16 ; 4 + 4 * 10 generated = 44
f_key 2,16
f_key 3,16
f_key 4,16
f_key 5,16
f_key 6,16
f_key 7,16
f_key 8,16
f_key 9,16
pop edi
pop esi
pop ebx
pop ebp
xor eax,eax
do_exit 8
%endif
%ifdef AES_192
%ifndef ENCRYPTION_TABLE
; %define ENCRYPTION_TABLE
%endif
%assign rc_val 1
do_name _aes_encrypt_key192,8
push ebp
push ebx
push esi
push edi
mov ebp,[esp+24]
mov [ebp+4*KS_LENGTH],dword 12 * 16
mov ebx,[esp+20]
mov esi,[ebx]
mov [ebp],esi
mov edi,[ebx+4]
mov [ebp+4],edi
mov ecx,[ebx+8]
mov [ebp+8],ecx
mov edx,[ebx+12]
mov [ebp+12],edx
mov eax,[ebx+16]
mov [ebp+16],eax
mov eax,[ebx+20]
mov [ebp+20],eax
add ebp,24
f_key 0,24 ; 13 * 4 = 52 unsigned longs
f_key 1,24 ; 6 + 6 * 8 generated = 54
f_key 2,24
f_key 3,24
f_key 4,24
f_key 5,24
f_key 6,24
f_key 7,24
pop edi
pop esi
pop ebx
pop ebp
xor eax,eax
do_exit 8
%endif
%ifdef AES_256
%ifndef ENCRYPTION_TABLE
; %define ENCRYPTION_TABLE
%endif
%assign rc_val 1
do_name _aes_encrypt_key256,8
mov ax, sp
movzx esp, ax
push ebp
push ebx
push esi
push edi
movzx ebp, word [esp+20] ; ks
mov [ebp+4*KS_LENGTH],dword 14 * 16
movzx ebx, word [esp+18] ; key
mov esi,[ebx]
mov [ebp],esi
mov edi,[ebx+4]
mov [ebp+4],edi
mov ecx,[ebx+8]
mov [ebp+8],ecx
mov edx,[ebx+12]
mov [ebp+12],edx
mov eax,[ebx+16]
mov [ebp+16],eax
mov eax,[ebx+20]
mov [ebp+20],eax
mov eax,[ebx+24]
mov [ebp+24],eax
mov eax,[ebx+28]
mov [ebp+28],eax
add ebp,32
f_key 0,32 ; 15 * 4 = 60 unsigned longs
f_key 1,32 ; 8 + 8 * 7 generated = 64
f_key 2,32
f_key 3,32
f_key 4,32
f_key 5,32
f_key 6,32
pop edi
pop esi
pop ebx
pop ebp
xor eax,eax
do_exit 8
%endif
%ifdef AES_VAR
%ifndef ENCRYPTION_TABLE
; %define ENCRYPTION_TABLE
%endif
do_name _aes_encrypt_key,12
mov ecx,[esp+4]
mov eax,[esp+8]
mov edx,[esp+12]
push edx
push ecx
cmp eax,16
je .1
cmp eax,128
je .1
cmp eax,24
je .2
cmp eax,192
je .2
cmp eax,32
je .3
cmp eax,256
je .3
mov eax,-1
add esp,8
do_exit 12
.1: do_call _aes_encrypt_key128,8
do_exit 12
.2: do_call _aes_encrypt_key192,8
do_exit 12
.3: do_call _aes_encrypt_key256,8
do_exit 12
%endif
%endif
%ifdef ENCRYPTION_TABLE
; S-box data - 256 entries
section _DATA
%define u8(x) 0, x, x, f3(x), f2(x), x, x, f3(x)
_aes_enc_tab:
db u8(0x63),u8(0x7c),u8(0x77),u8(0x7b),u8(0xf2),u8(0x6b),u8(0x6f),u8(0xc5)
db u8(0x30),u8(0x01),u8(0x67),u8(0x2b),u8(0xfe),u8(0xd7),u8(0xab),u8(0x76)
db u8(0xca),u8(0x82),u8(0xc9),u8(0x7d),u8(0xfa),u8(0x59),u8(0x47),u8(0xf0)
db u8(0xad),u8(0xd4),u8(0xa2),u8(0xaf),u8(0x9c),u8(0xa4),u8(0x72),u8(0xc0)
db u8(0xb7),u8(0xfd),u8(0x93),u8(0x26),u8(0x36),u8(0x3f),u8(0xf7),u8(0xcc)
db u8(0x34),u8(0xa5),u8(0xe5),u8(0xf1),u8(0x71),u8(0xd8),u8(0x31),u8(0x15)
db u8(0x04),u8(0xc7),u8(0x23),u8(0xc3),u8(0x18),u8(0x96),u8(0x05),u8(0x9a)
db u8(0x07),u8(0x12),u8(0x80),u8(0xe2),u8(0xeb),u8(0x27),u8(0xb2),u8(0x75)
db u8(0x09),u8(0x83),u8(0x2c),u8(0x1a),u8(0x1b),u8(0x6e),u8(0x5a),u8(0xa0)
db u8(0x52),u8(0x3b),u8(0xd6),u8(0xb3),u8(0x29),u8(0xe3),u8(0x2f),u8(0x84)
db u8(0x53),u8(0xd1),u8(0x00),u8(0xed),u8(0x20),u8(0xfc),u8(0xb1),u8(0x5b)
db u8(0x6a),u8(0xcb),u8(0xbe),u8(0x39),u8(0x4a),u8(0x4c),u8(0x58),u8(0xcf)
db u8(0xd0),u8(0xef),u8(0xaa),u8(0xfb),u8(0x43),u8(0x4d),u8(0x33),u8(0x85)
db u8(0x45),u8(0xf9),u8(0x02),u8(0x7f),u8(0x50),u8(0x3c),u8(0x9f),u8(0xa8)
db u8(0x51),u8(0xa3),u8(0x40),u8(0x8f),u8(0x92),u8(0x9d),u8(0x38),u8(0xf5)
db u8(0xbc),u8(0xb6),u8(0xda),u8(0x21),u8(0x10),u8(0xff),u8(0xf3),u8(0xd2)
db u8(0xcd),u8(0x0c),u8(0x13),u8(0xec),u8(0x5f),u8(0x97),u8(0x44),u8(0x17)
db u8(0xc4),u8(0xa7),u8(0x7e),u8(0x3d),u8(0x64),u8(0x5d),u8(0x19),u8(0x73)
db u8(0x60),u8(0x81),u8(0x4f),u8(0xdc),u8(0x22),u8(0x2a),u8(0x90),u8(0x88)
db u8(0x46),u8(0xee),u8(0xb8),u8(0x14),u8(0xde),u8(0x5e),u8(0x0b),u8(0xdb)
db u8(0xe0),u8(0x32),u8(0x3a),u8(0x0a),u8(0x49),u8(0x06),u8(0x24),u8(0x5c)
db u8(0xc2),u8(0xd3),u8(0xac),u8(0x62),u8(0x91),u8(0x95),u8(0xe4),u8(0x79)
db u8(0xe7),u8(0xc8),u8(0x37),u8(0x6d),u8(0x8d),u8(0xd5),u8(0x4e),u8(0xa9)
db u8(0x6c),u8(0x56),u8(0xf4),u8(0xea),u8(0x65),u8(0x7a),u8(0xae),u8(0x08)
db u8(0xba),u8(0x78),u8(0x25),u8(0x2e),u8(0x1c),u8(0xa6),u8(0xb4),u8(0xc6)
db u8(0xe8),u8(0xdd),u8(0x74),u8(0x1f),u8(0x4b),u8(0xbd),u8(0x8b),u8(0x8a)
db u8(0x70),u8(0x3e),u8(0xb5),u8(0x66),u8(0x48),u8(0x03),u8(0xf6),u8(0x0e)
db u8(0x61),u8(0x35),u8(0x57),u8(0xb9),u8(0x86),u8(0xc1),u8(0x1d),u8(0x9e)
db u8(0xe1),u8(0xf8),u8(0x98),u8(0x11),u8(0x69),u8(0xd9),u8(0x8e),u8(0x94)
db u8(0x9b),u8(0x1e),u8(0x87),u8(0xe9),u8(0xce),u8(0x55),u8(0x28),u8(0xdf)
db u8(0x8c),u8(0xa1),u8(0x89),u8(0x0d),u8(0xbf),u8(0xe6),u8(0x42),u8(0x68)
db u8(0x41),u8(0x99),u8(0x2d),u8(0x0f),u8(0xb0),u8(0x54),u8(0xbb),u8(0x16)
%endif
%ifdef DECRYPTION
; %define DECRYPTION_TABLE
%define dtab_0(x) [_aes_dec_tab+ 8*x]
%define dtab_1(x) [_aes_dec_tab+3+8*x]
%define dtab_2(x) [_aes_dec_tab+2+8*x]
%define dtab_3(x) [_aes_dec_tab+1+8*x]
%define dtab_x(x) byte [_aes_dec_tab+7+8*x]
%macro irn_fun 2
rol eax,16
%1 esi, cl, 0, ebp
%1 esi, bh, 1, ebp
%1 esi, al, 2, ebp
%1 edi, dl, 0, ebp
%1 edi, ch, 1, ebp
%1 edi, ah, 3, ebp
%2 ebp, bl, 0, ebp
shr eax,16
and ebx,0xffff0000
or ebx,eax
shr ecx,16
%1 ebp, bh, 1, eax
%1 ebp, ch, 3, eax
%2 eax, cl, 2, ecx
%1 eax, bl, 0, ecx
%1 eax, dh, 1, ecx
shr ebx,16
shr edx,16
%1 esi, dh, 3, ecx
%1 ebp, dl, 2, ecx
%1 eax, bh, 3, ecx
%1 edi, bl, 2, ecx
%endmacro
; Basic MOV and XOR Operations for normal rounds
%macro ni_xor 4
movzx %4,%2
xor %1,dtab_%3(%4)
%endmacro
%macro ni_mov 4
movzx %4,%2
mov %1,dtab_%3(%4)
%endmacro
; Basic MOV and XOR Operations for last round
%macro li_xor 4
movzx %4,%2
movzx %4,dtab_x(%4)
%if %3 != 0
shl %4,8*%3
%endif
xor %1,%4
%endmacro
%macro li_mov 4
movzx %4,%2
movzx %1,dtab_x(%4)
%if %3 != 0
shl %1,8*%3
%endif
%endmacro
%ifdef REDUCE_CODE_SIZE
dec_round:
sub sp, 2
%ifdef AES_REV_DKS
add ebp,16
%else
sub ebp,16
%endif
save 1,ebp
mov esi,[ebp+8]
mov edi,[ebp+12]
irn_fun ni_xor, ni_mov
mov ebx,ebp
mov ecx,esi
mov edx,edi
restore ebp,1
xor eax,[ebp]
xor ebx,[ebp+4]
add sp, 2
ret
%else
%macro dec_round 0
%ifdef AES_REV_DKS
add ebp,16
%else
sub ebp,16
%endif
save 0,ebp
mov esi,[ebp+8]
mov edi,[ebp+12]
irn_fun ni_xor, ni_mov
mov ebx,ebp
mov ecx,esi
mov edx,edi
restore ebp,0
xor eax,[ebp]
xor ebx,[ebp+4]
%endmacro
%endif
%macro dec_last_round 0
%ifdef AES_REV_DKS
add ebp,16
%else
sub ebp,16
%endif
save 0,ebp
mov esi,[ebp+8]
mov edi,[ebp+12]
irn_fun li_xor, li_mov
mov ebx,ebp
restore ebp,0
xor eax,[ebp]
xor ebx,[ebp+4]
%endmacro
section _TEXT
; AES Decryption Subroutine
do_name _aes_decrypt,12
mov ax, sp
movzx esp, ax
sub esp,stk_spc
mov [esp+16],ebp
mov [esp+12],ebx
mov [esp+ 8],esi
mov [esp+ 4],edi
; input four columns and xor in first round key
movzx esi,word [esp+in_blk+stk_spc] ; input pointer
mov eax,[esi ]
mov ebx,[esi+ 4]
mov ecx,[esi+ 8]
mov edx,[esi+12]
lea esi,[esi+16]
movzx ebp, word [esp+ctx+stk_spc] ; key pointer
movzx edi,byte[ebp+4*KS_LENGTH]
%ifndef AES_REV_DKS ; if decryption key schedule is not reversed
lea ebp,[ebp+edi] ; we have to access it from the top down
%endif
xor eax,[ebp ] ; key schedule
xor ebx,[ebp+ 4]
xor ecx,[ebp+ 8]
xor edx,[ebp+12]
; determine the number of rounds
%ifndef AES_256
cmp edi,10*16
je .3
cmp edi,12*16
je .2
cmp edi,14*16
je .1
mov eax,-1
jmp .5
%endif
.1: mf_call dec_round
mf_call dec_round
.2: mf_call dec_round
mf_call dec_round
.3: mf_call dec_round
mf_call dec_round
mf_call dec_round
mf_call dec_round
mf_call dec_round
mf_call dec_round
mf_call dec_round
mf_call dec_round
mf_call dec_round
dec_last_round
; move final values to the output array.
movzx ebp,word [esp+out_blk+stk_spc]
mov [ebp],eax
mov [ebp+4],ebx
mov [ebp+8],esi
mov [ebp+12],edi
xor eax,eax
.5: mov ebp,[esp+16]
mov ebx,[esp+12]
mov esi,[esp+ 8]
mov edi,[esp+ 4]
add esp,stk_spc
do_exit 12
%endif
%ifdef REDUCE_CODE_SIZE
inv_mix_col:
movzx ecx,dl ; input eax, edx
movzx ecx,etab_b(ecx) ; output eax
mov eax,dtab_0(ecx) ; used ecx
movzx ecx,dh
shr edx,16
movzx ecx,etab_b(ecx)
xor eax,dtab_1(ecx)
movzx ecx,dl
movzx ecx,etab_b(ecx)
xor eax,dtab_2(ecx)
movzx ecx,dh
movzx ecx,etab_b(ecx)
xor eax,dtab_3(ecx)
ret
%else
%macro inv_mix_col 0
movzx ecx,dl ; input eax, edx
movzx ecx,etab_b(ecx) ; output eax
mov eax,dtab_0(ecx) ; used ecx
movzx ecx,dh
shr edx,16
movzx ecx,etab_b(ecx)
xor eax,dtab_1(ecx)
movzx ecx,dl
movzx ecx,etab_b(ecx)
xor eax,dtab_2(ecx)
movzx ecx,dh
movzx ecx,etab_b(ecx)
xor eax,dtab_3(ecx)
%endmacro
%endif
%ifdef DECRYPTION_KEY_SCHEDULE
%ifdef AES_128
%ifndef DECRYPTION_TABLE
; %define DECRYPTION_TABLE
%endif
do_name _aes_decrypt_key128,8
push ebp
push ebx
push esi
push edi
mov eax,[esp+24] ; context
mov edx,[esp+20] ; key
push eax
push edx
do_call _aes_encrypt_key128,8 ; generate expanded encryption key
mov eax,10*16
mov esi,[esp+24] ; pointer to first round key
lea edi,[esi+eax] ; pointer to last round key
add esi,32
; the inverse mix column transformation
mov edx,[esi-16] ; needs to be applied to all round keys
mf_call inv_mix_col ; except first and last. Hence start by
mov [esi-16],eax ; transforming the four sub-keys in the
mov edx,[esi-12] ; second round key
mf_call inv_mix_col
mov [esi-12],eax ; transformations for subsequent rounds
mov edx,[esi-8] ; can then be made more efficient by
mf_call inv_mix_col ; noting that for three of the four sub-keys
mov [esi-8],eax ; in the encryption round key ek[r]:
mov edx,[esi-4] ;
mf_call inv_mix_col ; ek[r][n] = ek[r][n-1] ^ ek[r-1][n]
mov [esi-4],eax ;
; where n is 1..3. Hence the corresponding
.0: mov edx,[esi] ; subkeys in the decryption round key dk[r]
mf_call inv_mix_col ; also obey since inv_mix_col is linear in
mov [esi],eax ; GF(256):
xor eax,[esi-12] ;
mov [esi+4],eax ; dk[r][n] = dk[r][n-1] ^ dk[r-1][n]
xor eax,[esi-8] ;
mov [esi+8],eax ; So we only need one inverse mix column
xor eax,[esi-4] ; operation (n = 0) for each four word cycle
mov [esi+12],eax ; in the expanded key.
add esi,16
cmp edi,esi
jg .0
jmp dec_end
%endif
%ifdef AES_192
%ifndef DECRYPTION_TABLE
; %define DECRYPTION_TABLE
%endif
do_name _aes_decrypt_key192,8
push ebp
push ebx
push esi
push edi
mov eax,[esp+24] ; context
mov edx,[esp+20] ; key
push eax
push edx
do_call _aes_encrypt_key192,8 ; generate expanded encryption key
mov eax,12*16
mov esi,[esp+24] ; first round key
lea edi,[esi+eax] ; last round key
add esi,48 ; the first 6 words are the key, of
; which the top 2 words are part of
mov edx,[esi-32] ; the second round key and hence
mf_call inv_mix_col ; need to be modified. After this we
mov [esi-32],eax ; need to do a further six values prior
mov edx,[esi-28] ; to using a more efficient technique
mf_call inv_mix_col ; based on:
mov [esi-28],eax ;
; dk[r][n] = dk[r][n-1] ^ dk[r-1][n]
mov edx,[esi-24] ;
mf_call inv_mix_col ; for n = 1 .. 5 where the key expansion
mov [esi-24],eax ; cycle is now 6 words long
mov edx,[esi-20]
mf_call inv_mix_col
mov [esi-20],eax
mov edx,[esi-16]
mf_call inv_mix_col
mov [esi-16],eax
mov edx,[esi-12]
mf_call inv_mix_col
mov [esi-12],eax
mov edx,[esi-8]
mf_call inv_mix_col
mov [esi-8],eax
mov edx,[esi-4]
mf_call inv_mix_col
mov [esi-4],eax
.0: mov edx,[esi] ; the expanded key is 13 * 4 = 44 32-bit words
mf_call inv_mix_col ; of which 11 * 4 = 44 have to be modified
mov [esi],eax ; using inv_mix_col. We have already done 8
xor eax,[esi-20] ; of these so 36 are left - hence we need
mov [esi+4],eax ; exactly 6 loops of six here
xor eax,[esi-16]
mov [esi+8],eax
xor eax,[esi-12]
mov [esi+12],eax
xor eax,[esi-8]
mov [esi+16],eax
xor eax,[esi-4]
mov [esi+20],eax
add esi,24
cmp edi,esi
jg .0
jmp dec_end
%endif
%ifdef AES_256
%ifndef DECRYPTION_TABLE
; %define DECRYPTION_TABLE
%endif
do_name _aes_decrypt_key256,8
mov ax, sp
movzx esp, ax
push ebp
push ebx
push esi
push edi
movzx eax, word [esp+20] ; ks
movzx edx, word [esp+18] ; key
push ax
push dx
do_call _aes_encrypt_key256,4 ; generate expanded encryption key
mov eax,14*16
movzx esi, word [esp+20] ; ks
lea edi,[esi+eax]
add esi,64
mov edx,[esi-48] ; the primary key is 8 words, of which
mf_call inv_mix_col ; the top four require modification
mov [esi-48],eax
mov edx,[esi-44]
mf_call inv_mix_col
mov [esi-44],eax
mov edx,[esi-40]
mf_call inv_mix_col
mov [esi-40],eax
mov edx,[esi-36]
mf_call inv_mix_col
mov [esi-36],eax
mov edx,[esi-32] ; the encryption key expansion cycle is
mf_call inv_mix_col ; now eight words long so we need to
mov [esi-32],eax ; start by doing one complete block
mov edx,[esi-28]
mf_call inv_mix_col
mov [esi-28],eax
mov edx,[esi-24]
mf_call inv_mix_col
mov [esi-24],eax
mov edx,[esi-20]
mf_call inv_mix_col
mov [esi-20],eax
mov edx,[esi-16]
mf_call inv_mix_col
mov [esi-16],eax
mov edx,[esi-12]
mf_call inv_mix_col
mov [esi-12],eax
mov edx,[esi-8]
mf_call inv_mix_col
mov [esi-8],eax
mov edx,[esi-4]
mf_call inv_mix_col
mov [esi-4],eax
.0: mov edx,[esi] ; we can now speed up the remaining
mf_call inv_mix_col ; rounds by using the technique
mov [esi],eax ; outlined earlier. But note that
xor eax,[esi-28] ; there is one extra inverse mix
mov [esi+4],eax ; column operation as the 256 bit
xor eax,[esi-24] ; key has an extra non-linear step
mov [esi+8],eax ; for the midway element.
xor eax,[esi-20]
mov [esi+12],eax ; the expanded key is 15 * 4 = 60
mov edx,[esi+16] ; 32-bit words of which 52 need to
mf_call inv_mix_col ; be modified. We have already done
mov [esi+16],eax ; 12 so 40 are left - which means
xor eax,[esi-12] ; that we need exactly 5 loops of 8
mov [esi+20],eax
xor eax,[esi-8]
mov [esi+24],eax
xor eax,[esi-4]
mov [esi+28],eax
add esi,32
cmp edi,esi
jg .0
%endif
dec_end:
%ifdef AES_REV_DKS
movzx esi,word [esp+20] ; this reverses the order of the
.1: mov eax,[esi] ; round keys if required
mov ebx,[esi+4]
mov ebp,[edi]
mov edx,[edi+4]
mov [esi],ebp
mov [esi+4],edx
mov [edi],eax
mov [edi+4],ebx
mov eax,[esi+8]
mov ebx,[esi+12]
mov ebp,[edi+8]
mov edx,[edi+12]
mov [esi+8],ebp
mov [esi+12],edx
mov [edi+8],eax
mov [edi+12],ebx
add esi,16
sub edi,16
cmp edi,esi
jg .1
%endif
pop edi
pop esi
pop ebx
pop ebp
xor eax,eax
do_exit 8
%ifdef AES_VAR
do_name _aes_decrypt_key,12
mov ecx,[esp+4]
mov eax,[esp+8]
mov edx,[esp+12]
push edx
push ecx
cmp eax,16
je .1
cmp eax,128
je .1
cmp eax,24
je .2
cmp eax,192
je .2
cmp eax,32
je .3
cmp eax,256
je .3
mov eax,-1
add esp,8
do_exit 12
.1: do_call _aes_decrypt_key128,8
do_exit 12
.2: do_call _aes_decrypt_key192,8
do_exit 12
.3: do_call _aes_decrypt_key256,8
do_exit 12
%endif
%endif
%ifdef DECRYPTION_TABLE
; Inverse S-box data - 256 entries
section _DATA
%define v8(x) fe(x), f9(x), fd(x), fb(x), fe(x), f9(x), fd(x), x
_aes_dec_tab:
db v8(0x52),v8(0x09),v8(0x6a),v8(0xd5),v8(0x30),v8(0x36),v8(0xa5),v8(0x38)
db v8(0xbf),v8(0x40),v8(0xa3),v8(0x9e),v8(0x81),v8(0xf3),v8(0xd7),v8(0xfb)
db v8(0x7c),v8(0xe3),v8(0x39),v8(0x82),v8(0x9b),v8(0x2f),v8(0xff),v8(0x87)
db v8(0x34),v8(0x8e),v8(0x43),v8(0x44),v8(0xc4),v8(0xde),v8(0xe9),v8(0xcb)
db v8(0x54),v8(0x7b),v8(0x94),v8(0x32),v8(0xa6),v8(0xc2),v8(0x23),v8(0x3d)
db v8(0xee),v8(0x4c),v8(0x95),v8(0x0b),v8(0x42),v8(0xfa),v8(0xc3),v8(0x4e)
db v8(0x08),v8(0x2e),v8(0xa1),v8(0x66),v8(0x28),v8(0xd9),v8(0x24),v8(0xb2)
db v8(0x76),v8(0x5b),v8(0xa2),v8(0x49),v8(0x6d),v8(0x8b),v8(0xd1),v8(0x25)
db v8(0x72),v8(0xf8),v8(0xf6),v8(0x64),v8(0x86),v8(0x68),v8(0x98),v8(0x16)
db v8(0xd4),v8(0xa4),v8(0x5c),v8(0xcc),v8(0x5d),v8(0x65),v8(0xb6),v8(0x92)
db v8(0x6c),v8(0x70),v8(0x48),v8(0x50),v8(0xfd),v8(0xed),v8(0xb9),v8(0xda)
db v8(0x5e),v8(0x15),v8(0x46),v8(0x57),v8(0xa7),v8(0x8d),v8(0x9d),v8(0x84)
db v8(0x90),v8(0xd8),v8(0xab),v8(0x00),v8(0x8c),v8(0xbc),v8(0xd3),v8(0x0a)
db v8(0xf7),v8(0xe4),v8(0x58),v8(0x05),v8(0xb8),v8(0xb3),v8(0x45),v8(0x06)
db v8(0xd0),v8(0x2c),v8(0x1e),v8(0x8f),v8(0xca),v8(0x3f),v8(0x0f),v8(0x02)
db v8(0xc1),v8(0xaf),v8(0xbd),v8(0x03),v8(0x01),v8(0x13),v8(0x8a),v8(0x6b)
db v8(0x3a),v8(0x91),v8(0x11),v8(0x41),v8(0x4f),v8(0x67),v8(0xdc),v8(0xea)
db v8(0x97),v8(0xf2),v8(0xcf),v8(0xce),v8(0xf0),v8(0xb4),v8(0xe6),v8(0x73)
db v8(0x96),v8(0xac),v8(0x74),v8(0x22),v8(0xe7),v8(0xad),v8(0x35),v8(0x85)
db v8(0xe2),v8(0xf9),v8(0x37),v8(0xe8),v8(0x1c),v8(0x75),v8(0xdf),v8(0x6e)
db v8(0x47),v8(0xf1),v8(0x1a),v8(0x71),v8(0x1d),v8(0x29),v8(0xc5),v8(0x89)
db v8(0x6f),v8(0xb7),v8(0x62),v8(0x0e),v8(0xaa),v8(0x18),v8(0xbe),v8(0x1b)
db v8(0xfc),v8(0x56),v8(0x3e),v8(0x4b),v8(0xc6),v8(0xd2),v8(0x79),v8(0x20)
db v8(0x9a),v8(0xdb),v8(0xc0),v8(0xfe),v8(0x78),v8(0xcd),v8(0x5a),v8(0xf4)
db v8(0x1f),v8(0xdd),v8(0xa8),v8(0x33),v8(0x88),v8(0x07),v8(0xc7),v8(0x31)
db v8(0xb1),v8(0x12),v8(0x10),v8(0x59),v8(0x27),v8(0x80),v8(0xec),v8(0x5f)
db v8(0x60),v8(0x51),v8(0x7f),v8(0xa9),v8(0x19),v8(0xb5),v8(0x4a),v8(0x0d)
db v8(0x2d),v8(0xe5),v8(0x7a),v8(0x9f),v8(0x93),v8(0xc9),v8(0x9c),v8(0xef)
db v8(0xa0),v8(0xe0),v8(0x3b),v8(0x4d),v8(0xae),v8(0x2a),v8(0xf5),v8(0xb0)
db v8(0xc8),v8(0xeb),v8(0xbb),v8(0x3c),v8(0x83),v8(0x53),v8(0x99),v8(0x61)
db v8(0x17),v8(0x2b),v8(0x04),v8(0x7e),v8(0xba),v8(0x77),v8(0xd6),v8(0x26)
db v8(0xe1),v8(0x69),v8(0x14),v8(0x63),v8(0x55),v8(0x21),v8(0x0c),v8(0x7d)
%endif