You've already forked lazarus-ccr
319 lines
8.9 KiB
PHP
319 lines
8.9 KiB
PHP
![]() |
(*************************************************************************
|
||
|
Include file for AES_ENCR.PAS - AES_Encrypt for BASM16/Full tables
|
||
|
|
||
|
Version Date Author Modification
|
||
|
------- -------- ------- ------------------------------------------
|
||
|
0.10 09.07.06 W.Ehrhardt Initial version from AES_ENCR.PAS
|
||
|
**************************************************************************)
|
||
|
|
||
|
(**** (C) Copyright 2002-2006 Wolfgang Ehrhardt -- see copying_we.txt ****)
|
||
|
|
||
|
|
||
|
{16 bit BASM used for TP6, BP7, Delphi1}
|
||
|
|
||
|
{---------------------------------------------------------------------------}
|
||
|
procedure AES_Encrypt(var ctx: TAESContext; {$ifdef CONST} const {$else} var {$endif} BI: TAESBlock; var BO: TAESBlock);
|
||
|
{-encrypt one block, not checked: key must be encryption key}
|
||
|
var
|
||
|
s,t: TAESBlock;
|
||
|
rnd: integer;
|
||
|
pK: pointer;
|
||
|
begin
|
||
|
rnd := ctx.rounds;
|
||
|
pK := @ctx.RK;
|
||
|
asm
|
||
|
|
||
|
db $66; pusha
|
||
|
|
||
|
{AES_XorBlock(BI, ctx.RK[0], s);}
|
||
|
les si,[BI]
|
||
|
db $66; mov ax,es:[si]
|
||
|
db $66; mov bx,es:[si+4]
|
||
|
db $66; mov cx,es:[si+8]
|
||
|
db $66; mov dx,es:[si+12]
|
||
|
|
||
|
les di,[pK]
|
||
|
db $66; xor ax,es:[di]
|
||
|
db $66; xor bx,es:[di+4]
|
||
|
db $66; xor cx,es:[di+8]
|
||
|
db $66; xor dx,es:[di+12]
|
||
|
|
||
|
db $66; mov word ptr [s],ax
|
||
|
db $66; mov word ptr [s+4],bx
|
||
|
db $66; mov word ptr [s+8],cx
|
||
|
db $66; mov word ptr [s+12],dx
|
||
|
|
||
|
add di,16 {di->ctx.RK[1]}
|
||
|
mov dx,[rnd]
|
||
|
mov cx,1
|
||
|
|
||
|
{ *Note* in the following round loop }
|
||
|
{ op eax, mem[4*bx] is calculated as }
|
||
|
{ lea esi, [ebx + 2*ebx] }
|
||
|
{ op eax, mem[ebx+esi] }
|
||
|
{ lea esi,[ebx+2*ebx] = db $66,$67,$8D,$34,$5B; }
|
||
|
|
||
|
db $66; sub bx,bx {clear ebx}
|
||
|
|
||
|
@@1:
|
||
|
|
||
|
{TWA4(t)[0] := Te0[s[0*4+0]] xor Te1[s[1*4+1]] xor Te2[s[2*4+2]] xor Te3[s[3*4+3]] xor TWA4(ctx.RK[r])[0];}
|
||
|
mov bl,byte ptr s[0*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[1*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[2*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[3*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di]
|
||
|
db $66; mov word ptr t[0],ax
|
||
|
|
||
|
{TWA4(t)[1] := Te0[s[1*4+0]] xor Te1[s[2*4+1]] xor Te2[s[3*4+2]] xor Te3[s[0*4+3]] xor TWA4(ctx.RK[r])[1];}
|
||
|
mov bl,byte ptr s[1*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[2*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[3*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[0*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+4]
|
||
|
db $66; mov word ptr t[4],ax
|
||
|
|
||
|
{TWA4(t)[2] := Te0[s[2*4+0]] xor Te1[s[3*4+1]] xor Te2[s[0*4+2]] xor Te3[s[1*4+3]] xor TWA4(ctx.RK[r])[2];}
|
||
|
mov bl,byte ptr s[2*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[3*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[0*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[1*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+8]
|
||
|
db $66; mov word ptr t[8],ax
|
||
|
|
||
|
{TWA4(t)[3] := Te0[s[3*4+0]] xor Te1[s[0*4+1]] xor Te2[s[1*4+2]] xor Te3[s[2*4+3]] xor TWA4(ctx.RK[r])[3];}
|
||
|
mov bl,byte ptr s[3*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[0*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[1*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr s[2*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+12]
|
||
|
db $66; mov word ptr t[12],ax
|
||
|
|
||
|
{if r>=ctx.rounds then break;}
|
||
|
inc cx
|
||
|
cmp cx,dx
|
||
|
jae @@2
|
||
|
|
||
|
{TWA4(s)[0] := Te0[t[0*4+0]] xor Te1[t[1*4+1]] xor Te2[t[2*4+2]] xor Te3[t[3*4+3]] xor TWA4(ctx.RK[r])[0];}
|
||
|
mov bl,byte ptr t[0*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[1*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[2*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[3*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+16]
|
||
|
db $66; mov word ptr s[0],ax
|
||
|
|
||
|
{TWA4(s)[1] := Te0[t[1*4+0]] xor Te1[t[2*4+1]] xor Te2[t[3*4+2]] xor Te3[t[0*4+3]] xor TWA4(ctx.RK[r])[1];}
|
||
|
mov bl,byte ptr t[1*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[2*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[3*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[0*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+20]
|
||
|
db $66; mov word ptr s[4],ax
|
||
|
|
||
|
{TWA4(s)[2] := Te0[t[2*4+0]] xor Te1[t[3*4+1]] xor Te2[t[0*4+2]] xor Te3[t[1*4+3]] xor TWA4(ctx.RK[r])[2];}
|
||
|
mov bl,byte ptr t[2*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[3*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[0*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[1*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+24]
|
||
|
db $66; mov word ptr s[8],ax
|
||
|
|
||
|
{TWA4(s)[3] := Te0[t[3*4+0]] xor Te1[t[0*4+1]] xor Te2[t[1*4+2]] xor Te3[t[2*4+3]] xor TWA4(ctx.RK[r])[3];}
|
||
|
mov bl,byte ptr t[3*4+0]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; mov ax,word ptr Te0[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[0*4+1]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te1[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[1*4+2]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te2[bx+si]
|
||
|
|
||
|
mov bl,byte ptr t[2*4+3]
|
||
|
db $66,$67,$8D,$34,$5B;
|
||
|
db $66; xor ax,word ptr Te3[bx+si]
|
||
|
|
||
|
db $66; xor ax,es:[di+28]
|
||
|
add di,32
|
||
|
db $66; mov word ptr s[12],ax
|
||
|
|
||
|
inc cx
|
||
|
jmp @@1
|
||
|
|
||
|
@@2: add di,16 {di -> ctx.RK[ctx.rounds]}
|
||
|
|
||
|
{Last round uses SBox}
|
||
|
|
||
|
sub bx,bx
|
||
|
|
||
|
mov bl, byte ptr t[0*4+0]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[0],al
|
||
|
|
||
|
mov bl, byte ptr t[1*4+1]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[1],al
|
||
|
|
||
|
mov bl, byte ptr t[2*4+2]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[2],al
|
||
|
|
||
|
mov bl, byte ptr t[3*4+3]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[3],al
|
||
|
|
||
|
mov bl, byte ptr t[1*4+0]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[4],al
|
||
|
|
||
|
mov bl, byte ptr t[2*4+1]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[5],al
|
||
|
|
||
|
mov bl, byte ptr t[3*4+2]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[6],al
|
||
|
|
||
|
mov bl, byte ptr t[0*4+3]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[7],al
|
||
|
|
||
|
mov bl, byte ptr t[2*4+0]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[8],al
|
||
|
|
||
|
mov bl, byte ptr t[3*4+1]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[9],al
|
||
|
|
||
|
mov bl, byte ptr t[0*4+2]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[10],al
|
||
|
|
||
|
mov bl, byte ptr t[1*4+3]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[11],al
|
||
|
|
||
|
mov bl, byte ptr t[3*4+0]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[12],al
|
||
|
|
||
|
mov bl, byte ptr t[0*4+1]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[13],al
|
||
|
|
||
|
mov bl, byte ptr t[1*4+2]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[14],al
|
||
|
|
||
|
mov bl, byte ptr t[2*4+3]
|
||
|
mov al, byte ptr SBox[bx]
|
||
|
mov byte ptr s[15],al
|
||
|
|
||
|
{AES_XorBlock(s, ctx.RK[rnd], BO)}
|
||
|
|
||
|
db $66; mov ax,word ptr [s]
|
||
|
db $66; mov bx,word ptr [s+4]
|
||
|
db $66; mov cx,word ptr [s+8]
|
||
|
db $66; mov dx,word ptr [s+12]
|
||
|
db $66; xor ax,es:[di]
|
||
|
db $66; xor bx,es:[di+4]
|
||
|
db $66; xor cx,es:[di+8]
|
||
|
db $66; xor dx,es:[di+12]
|
||
|
les si,[BO]
|
||
|
db $66; mov es:[si],ax
|
||
|
db $66; mov es:[si+4],bx
|
||
|
db $66; mov es:[si+8],cx
|
||
|
db $66; mov es:[si+12],dx
|
||
|
|
||
|
db $66; popa
|
||
|
|
||
|
end;
|
||
|
end;
|