ÿØÿàJFIFÿÛ„ ( %"1"%)+...383,7(-.- 404 Not Found
Sh3ll
OdayForums


Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20
System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64
User : apache ( 48)
PHP Version : 7.4.20
Disable Function : NONE
Directory :  /proc/self/root/home/real/node-v13.0.1/deps/openssl/config/archs/VC-WIN32/asm/crypto/bf/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //proc/self/root/home/real/node-v13.0.1/deps/openssl/config/archs/VC-WIN32/asm/crypto/bf/bf-586.asm
%ifidn __OUTPUT_FORMAT__,obj
section	code	use32 class=code align=64
%elifidn __OUTPUT_FORMAT__,win32
$@feat.00 equ 1
section	.text	code align=64
%else
section	.text	code
%endif
global	_BF_encrypt
align	16
_BF_encrypt:
L$_BF_encrypt_begin:
	; 
	push	ebp
	push	ebx
	mov	ebx,DWORD [12+esp]
	mov	ebp,DWORD [16+esp]
	push	esi
	push	edi
	; Load the 2 words
	mov	edi,DWORD [ebx]
	mov	esi,DWORD [4+ebx]
	xor	eax,eax
	mov	ebx,DWORD [ebp]
	xor	ecx,ecx
	xor	edi,ebx
	; 
	; Round 0
	mov	edx,DWORD [4+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 1
	mov	edx,DWORD [8+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 2
	mov	edx,DWORD [12+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 3
	mov	edx,DWORD [16+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 4
	mov	edx,DWORD [20+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 5
	mov	edx,DWORD [24+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 6
	mov	edx,DWORD [28+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 7
	mov	edx,DWORD [32+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 8
	mov	edx,DWORD [36+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 9
	mov	edx,DWORD [40+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 10
	mov	edx,DWORD [44+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 11
	mov	edx,DWORD [48+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 12
	mov	edx,DWORD [52+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 13
	mov	edx,DWORD [56+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 14
	mov	edx,DWORD [60+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 15
	mov	edx,DWORD [64+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	; Load parameter 0 (16) enc=1
	mov	eax,DWORD [20+esp]
	xor	edi,ebx
	mov	edx,DWORD [68+ebp]
	xor	esi,edx
	mov	DWORD [4+eax],edi
	mov	DWORD [eax],esi
	pop	edi
	pop	esi
	pop	ebx
	pop	ebp
	ret
global	_BF_decrypt
align	16
_BF_decrypt:
L$_BF_decrypt_begin:
	; 
	push	ebp
	push	ebx
	mov	ebx,DWORD [12+esp]
	mov	ebp,DWORD [16+esp]
	push	esi
	push	edi
	; Load the 2 words
	mov	edi,DWORD [ebx]
	mov	esi,DWORD [4+ebx]
	xor	eax,eax
	mov	ebx,DWORD [68+ebp]
	xor	ecx,ecx
	xor	edi,ebx
	; 
	; Round 16
	mov	edx,DWORD [64+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 15
	mov	edx,DWORD [60+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 14
	mov	edx,DWORD [56+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 13
	mov	edx,DWORD [52+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 12
	mov	edx,DWORD [48+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 11
	mov	edx,DWORD [44+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 10
	mov	edx,DWORD [40+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 9
	mov	edx,DWORD [36+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 8
	mov	edx,DWORD [32+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 7
	mov	edx,DWORD [28+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 6
	mov	edx,DWORD [24+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 5
	mov	edx,DWORD [20+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 4
	mov	edx,DWORD [16+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 3
	mov	edx,DWORD [12+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	edi,ebx
	; 
	; Round 2
	mov	edx,DWORD [8+ebp]
	mov	ebx,edi
	xor	esi,edx
	shr	ebx,16
	mov	edx,edi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	xor	eax,eax
	xor	esi,ebx
	; 
	; Round 1
	mov	edx,DWORD [4+ebp]
	mov	ebx,esi
	xor	edi,edx
	shr	ebx,16
	mov	edx,esi
	mov	al,bh
	and	ebx,255
	mov	cl,dh
	and	edx,255
	mov	eax,DWORD [72+eax*4+ebp]
	mov	ebx,DWORD [1096+ebx*4+ebp]
	add	ebx,eax
	mov	eax,DWORD [2120+ecx*4+ebp]
	xor	ebx,eax
	mov	edx,DWORD [3144+edx*4+ebp]
	add	ebx,edx
	; Load parameter 0 (1) enc=0
	mov	eax,DWORD [20+esp]
	xor	edi,ebx
	mov	edx,DWORD [ebp]
	xor	esi,edx
	mov	DWORD [4+eax],edi
	mov	DWORD [eax],esi
	pop	edi
	pop	esi
	pop	ebx
	pop	ebp
	ret
global	_BF_cbc_encrypt
align	16
_BF_cbc_encrypt:
L$_BF_cbc_encrypt_begin:
	; 
	push	ebp
	push	ebx
	push	esi
	push	edi
	mov	ebp,DWORD [28+esp]
	; getting iv ptr from parameter 4
	mov	ebx,DWORD [36+esp]
	mov	esi,DWORD [ebx]
	mov	edi,DWORD [4+ebx]
	push	edi
	push	esi
	push	edi
	push	esi
	mov	ebx,esp
	mov	esi,DWORD [36+esp]
	mov	edi,DWORD [40+esp]
	; getting encrypt flag from parameter 5
	mov	ecx,DWORD [56+esp]
	; get and push parameter 3
	mov	eax,DWORD [48+esp]
	push	eax
	push	ebx
	cmp	ecx,0
	jz	NEAR L$000decrypt
	and	ebp,4294967288
	mov	eax,DWORD [8+esp]
	mov	ebx,DWORD [12+esp]
	jz	NEAR L$001encrypt_finish
L$002encrypt_loop:
	mov	ecx,DWORD [esi]
	mov	edx,DWORD [4+esi]
	xor	eax,ecx
	xor	ebx,edx
	bswap	eax
	bswap	ebx
	mov	DWORD [8+esp],eax
	mov	DWORD [12+esp],ebx
	call	L$_BF_encrypt_begin
	mov	eax,DWORD [8+esp]
	mov	ebx,DWORD [12+esp]
	bswap	eax
	bswap	ebx
	mov	DWORD [edi],eax
	mov	DWORD [4+edi],ebx
	add	esi,8
	add	edi,8
	sub	ebp,8
	jnz	NEAR L$002encrypt_loop
L$001encrypt_finish:
	mov	ebp,DWORD [52+esp]
	and	ebp,7
	jz	NEAR L$003finish
	call	L$004PIC_point
L$004PIC_point:
	pop	edx
	lea	ecx,[(L$005cbc_enc_jmp_table-L$004PIC_point)+edx]
	mov	ebp,DWORD [ebp*4+ecx]
	add	ebp,edx
	xor	ecx,ecx
	xor	edx,edx
	jmp	ebp
L$006ej7:
	mov	dh,BYTE [6+esi]
	shl	edx,8
L$007ej6:
	mov	dh,BYTE [5+esi]
L$008ej5:
	mov	dl,BYTE [4+esi]
L$009ej4:
	mov	ecx,DWORD [esi]
	jmp	NEAR L$010ejend
L$011ej3:
	mov	ch,BYTE [2+esi]
	shl	ecx,8
L$012ej2:
	mov	ch,BYTE [1+esi]
L$013ej1:
	mov	cl,BYTE [esi]
L$010ejend:
	xor	eax,ecx
	xor	ebx,edx
	bswap	eax
	bswap	ebx
	mov	DWORD [8+esp],eax
	mov	DWORD [12+esp],ebx
	call	L$_BF_encrypt_begin
	mov	eax,DWORD [8+esp]
	mov	ebx,DWORD [12+esp]
	bswap	eax
	bswap	ebx
	mov	DWORD [edi],eax
	mov	DWORD [4+edi],ebx
	jmp	NEAR L$003finish
L$000decrypt:
	and	ebp,4294967288
	mov	eax,DWORD [16+esp]
	mov	ebx,DWORD [20+esp]
	jz	NEAR L$014decrypt_finish
L$015decrypt_loop:
	mov	eax,DWORD [esi]
	mov	ebx,DWORD [4+esi]
	bswap	eax
	bswap	ebx
	mov	DWORD [8+esp],eax
	mov	DWORD [12+esp],ebx
	call	L$_BF_decrypt_begin
	mov	eax,DWORD [8+esp]
	mov	ebx,DWORD [12+esp]
	bswap	eax
	bswap	ebx
	mov	ecx,DWORD [16+esp]
	mov	edx,DWORD [20+esp]
	xor	ecx,eax
	xor	edx,ebx
	mov	eax,DWORD [esi]
	mov	ebx,DWORD [4+esi]
	mov	DWORD [edi],ecx
	mov	DWORD [4+edi],edx
	mov	DWORD [16+esp],eax
	mov	DWORD [20+esp],ebx
	add	esi,8
	add	edi,8
	sub	ebp,8
	jnz	NEAR L$015decrypt_loop
L$014decrypt_finish:
	mov	ebp,DWORD [52+esp]
	and	ebp,7
	jz	NEAR L$003finish
	mov	eax,DWORD [esi]
	mov	ebx,DWORD [4+esi]
	bswap	eax
	bswap	ebx
	mov	DWORD [8+esp],eax
	mov	DWORD [12+esp],ebx
	call	L$_BF_decrypt_begin
	mov	eax,DWORD [8+esp]
	mov	ebx,DWORD [12+esp]
	bswap	eax
	bswap	ebx
	mov	ecx,DWORD [16+esp]
	mov	edx,DWORD [20+esp]
	xor	ecx,eax
	xor	edx,ebx
	mov	eax,DWORD [esi]
	mov	ebx,DWORD [4+esi]
L$016dj7:
	ror	edx,16
	mov	BYTE [6+edi],dl
	shr	edx,16
L$017dj6:
	mov	BYTE [5+edi],dh
L$018dj5:
	mov	BYTE [4+edi],dl
L$019dj4:
	mov	DWORD [edi],ecx
	jmp	NEAR L$020djend
L$021dj3:
	ror	ecx,16
	mov	BYTE [2+edi],cl
	shl	ecx,16
L$022dj2:
	mov	BYTE [1+esi],ch
L$023dj1:
	mov	BYTE [esi],cl
L$020djend:
	jmp	NEAR L$003finish
L$003finish:
	mov	ecx,DWORD [60+esp]
	add	esp,24
	mov	DWORD [ecx],eax
	mov	DWORD [4+ecx],ebx
	pop	edi
	pop	esi
	pop	ebx
	pop	ebp
	ret
align	64
L$005cbc_enc_jmp_table:
dd	0
dd	L$013ej1-L$004PIC_point
dd	L$012ej2-L$004PIC_point
dd	L$011ej3-L$004PIC_point
dd	L$009ej4-L$004PIC_point
dd	L$008ej5-L$004PIC_point
dd	L$007ej6-L$004PIC_point
dd	L$006ej7-L$004PIC_point
align	64

ZeroDay Forums Mini