func_name
stringclasses 19
values | opensource
stringclasses 1
value | content
stringclasses 19
values |
---|---|---|
-__assert_fail | openssl | // attributes: thunk
void __noreturn __assert_fail(const char *assertion, const char *file, unsigned int line, const char *function)
{
_assert_fail(assertion, file, line, function);
}
|
-__stack_chk_fail | openssl | // attributes: thunk
void __noreturn __stack_chk_fail()
{
_stack_chk_fail();
}
|
-init_proc | openssl | __int64 (**init_proc())(void)
{
__int64 (**result)(void); // rax
result = &_gmon_start__;
if ( &_gmon_start__ )
result = (__int64 (**)(void))_gmon_start__();
return result;
}
|
-term_proc | openssl | void term_proc()
{
;
}
|
AES_decrypt | openssl | unsigned __int64 __fastcall AES_decrypt(_DWORD *a1, int *a2, _DWORD *a3)
{
unsigned int v5; // [rsp+2Ch] [rbp-74h]
unsigned int v6; // [rsp+2Ch] [rbp-74h]
unsigned int v7; // [rsp+30h] [rbp-70h]
unsigned int v8; // [rsp+30h] [rbp-70h]
unsigned int v9; // [rsp+34h] [rbp-6Ch]
unsigned int v10; // [rsp+34h] [rbp-6Ch]
unsigned int v11; // [rsp+38h] [rbp-68h]
unsigned int v12; // [rsp+38h] [rbp-68h]
int j; // [rsp+3Ch] [rbp-64h]
int i; // [rsp+40h] [rbp-60h]
int v15; // [rsp+44h] [rbp-5Ch]
unsigned int v16; // [rsp+4Ch] [rbp-54h]
unsigned int v17; // [rsp+50h] [rbp-50h]
_DWORD *v18; // [rsp+68h] [rbp-38h]
int v19; // [rsp+70h] [rbp-30h]
int v20; // [rsp+74h] [rbp-2Ch]
int v21; // [rsp+78h] [rbp-28h]
int v22; // [rsp+7Ch] [rbp-24h]
unsigned __int64 v23; // [rsp+88h] [rbp-18h]
v23 = __readfsqword(0x28u);
if ( !a1 || !a2 || !a3 )
__assert_fail("in && out && key", "core.c", 0x371u, "AES_decrypt");
v5 = *a1 ^ *a3;
v7 = a1[1] ^ a3[1];
v9 = a1[2] ^ a3[2];
v11 = a1[3] ^ a3[3];
prefetch256((__int64)Td4);
v19 = (Td4[BYTE2(v9)] << 16) ^ (Td4[BYTE1(v11)] << 8) ^ Td4[(unsigned __int8)v5] ^ (Td4[HIBYTE(v7)] << 24);
v20 = (Td4[BYTE2(v11)] << 16) ^ (Td4[BYTE1(v5)] << 8) ^ Td4[(unsigned __int8)v7] ^ (Td4[HIBYTE(v9)] << 24);
v21 = (Td4[BYTE2(v5)] << 16) ^ (Td4[BYTE1(v7)] << 8) ^ Td4[(unsigned __int8)v9] ^ (Td4[HIBYTE(v11)] << 24);
v22 = (Td4[BYTE2(v7)] << 16) ^ (Td4[BYTE1(v9)] << 8) ^ Td4[(unsigned __int8)v11] ^ (Td4[HIBYTE(v5)] << 24);
for ( i = 0; i <= 3; ++i )
{
v15 = *(&v19 + i);
v16 = (2 * v15) & 0xFEFEFEFE ^ ((v15 & 0x80808080) - ((v15 & 0x80808080) >> 7)) & 0x1B1B1B1B;
v17 = (2 * v16) & 0xFEFEFEFE ^ ((v16 & 0x80808080) - ((v16 & 0x80808080) >> 7)) & 0x1B1B1B1B;
*(&v19 + i) = __ROL4__(
v16 ^ v15 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B,
24) ^ __ROL4__(
v15 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B,
8) ^ v16 ^ v17 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B ^ __ROL4__(v17 ^ v15 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B, 16);
*(&v19 + i) ^= a3[i + 4];
}
v6 = v19;
v8 = v20;
v10 = v21;
v12 = v22;
v18 = a3 + 8;
for ( j = a3[60] - 2; j > 0; --j )
{
v19 = *(_QWORD *)((char *)&Td[HIBYTE(v8)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v10)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v12)] + 3) ^ Td[(unsigned __int8)v6] ^ *v18;
v20 = *(_QWORD *)((char *)&Td[HIBYTE(v10)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v12)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v6)] + 3) ^ Td[(unsigned __int8)v8] ^ v18[1];
v21 = *(_QWORD *)((char *)&Td[HIBYTE(v12)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v6)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v8)] + 3) ^ Td[(unsigned __int8)v10] ^ v18[2];
v22 = *(_QWORD *)((char *)&Td[HIBYTE(v6)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v8)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v10)] + 3) ^ Td[(unsigned __int8)v12] ^ v18[3];
v6 = v19;
v8 = v20;
v10 = v21;
v12 = v22;
v18 += 4;
}
prefetch256((__int64)Td4);
*a2 = *v18 ^ (Td4[HIBYTE(v8)] << 24) ^ (Td4[BYTE2(v10)] << 16) ^ (Td4[BYTE1(v12)] << 8) ^ Td4[(unsigned __int8)v6];
a2[1] = (Td4[HIBYTE(v10)] << 24) ^ (Td4[BYTE2(v12)] << 16) ^ (Td4[BYTE1(v6)] << 8) ^ Td4[(unsigned __int8)v8] ^ v18[1];
a2[2] = (Td4[HIBYTE(v12)] << 24) ^ (Td4[BYTE2(v6)] << 16) ^ (Td4[BYTE1(v8)] << 8) ^ Td4[(unsigned __int8)v10] ^ v18[2];
a2[3] = (Td4[HIBYTE(v6)] << 24) ^ (Td4[BYTE2(v8)] << 16) ^ (Td4[BYTE1(v10)] << 8) ^ Td4[(unsigned __int8)v12] ^ v18[3];
return v23 - __readfsqword(0x28u);
}
|
AES_encrypt | openssl | unsigned __int64 __fastcall AES_encrypt(_DWORD *a1, int *a2, _DWORD *a3)
{
unsigned int v5; // [rsp+24h] [rbp-5Ch]
unsigned int v6; // [rsp+24h] [rbp-5Ch]
unsigned int v7; // [rsp+28h] [rbp-58h]
unsigned int v8; // [rsp+28h] [rbp-58h]
unsigned int v9; // [rsp+2Ch] [rbp-54h]
unsigned int v10; // [rsp+2Ch] [rbp-54h]
unsigned int v11; // [rsp+30h] [rbp-50h]
unsigned int v12; // [rsp+30h] [rbp-50h]
int j; // [rsp+34h] [rbp-4Ch]
int i; // [rsp+38h] [rbp-48h]
int v15; // [rsp+3Ch] [rbp-44h]
_DWORD *v16; // [rsp+48h] [rbp-38h]
int v17; // [rsp+50h] [rbp-30h]
int v18; // [rsp+54h] [rbp-2Ch]
int v19; // [rsp+58h] [rbp-28h]
int v20; // [rsp+5Ch] [rbp-24h]
unsigned __int64 v21; // [rsp+68h] [rbp-18h]
v21 = __readfsqword(0x28u);
if ( !a1 || !a2 || !a3 )
__assert_fail("in && out && key", "core.c", 0x29Bu, "AES_encrypt");
v5 = *a1 ^ *a3;
v7 = a1[1] ^ a3[1];
v9 = a1[2] ^ a3[2];
v11 = a1[3] ^ a3[3];
prefetch256((__int64)Te4);
v17 = (Te4[BYTE2(v9)] << 16) ^ (Te4[BYTE1(v7)] << 8) ^ Te4[(unsigned __int8)v5] ^ (Te4[HIBYTE(v11)] << 24);
v18 = (Te4[BYTE2(v11)] << 16) ^ (Te4[BYTE1(v9)] << 8) ^ Te4[(unsigned __int8)v7] ^ (Te4[HIBYTE(v5)] << 24);
v19 = (Te4[BYTE2(v5)] << 16) ^ (Te4[BYTE1(v11)] << 8) ^ Te4[(unsigned __int8)v9] ^ (Te4[HIBYTE(v7)] << 24);
v20 = (Te4[BYTE2(v7)] << 16) ^ (Te4[BYTE1(v5)] << 8) ^ Te4[(unsigned __int8)v11] ^ (Te4[HIBYTE(v9)] << 24);
for ( i = 0; i <= 3; ++i )
{
v15 = *(&v17 + i);
*(&v17 + i) = __ROL4__(v15, 8) ^ __ROL4__(v15, 16) ^ __ROL4__(v15, 24) ^ (2 * v15) & 0xFEFEFEFE ^ ((v15 & 0x80808080) - ((v15 & 0x80808080) >> 7)) & 0x1B1B1B1B ^ __ROL4__((2 * v15) & 0xFEFEFEFE ^ ((v15 & 0x80808080) - ((v15 & 0x80808080) >> 7)) & 0x1B1B1B1B, 24);
*(&v17 + i) ^= a3[i + 4];
}
v6 = v17;
v8 = v18;
v10 = v19;
v12 = v20;
v16 = a3 + 8;
for ( j = a3[60] - 2; j > 0; --j )
{
v17 = *(_QWORD *)((char *)&Te[HIBYTE(v12)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v10)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v8)] + 3) ^ Te[(unsigned __int8)v6] ^ *v16;
v18 = *(_QWORD *)((char *)&Te[HIBYTE(v6)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v12)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v10)] + 3) ^ Te[(unsigned __int8)v8] ^ v16[1];
v19 = *(_QWORD *)((char *)&Te[HIBYTE(v8)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v6)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v12)] + 3) ^ Te[(unsigned __int8)v10] ^ v16[2];
v20 = *(_QWORD *)((char *)&Te[HIBYTE(v10)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v8)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v6)] + 3) ^ Te[(unsigned __int8)v12] ^ v16[3];
v6 = v17;
v8 = v18;
v10 = v19;
v12 = v20;
v16 += 4;
}
prefetch256((__int64)Te4);
*a2 = *v16 ^ (Te4[HIBYTE(v12)] << 24) ^ (Te4[BYTE2(v10)] << 16) ^ (Te4[BYTE1(v8)] << 8) ^ Te4[(unsigned __int8)v6];
a2[1] = (Te4[HIBYTE(v6)] << 24) ^ (Te4[BYTE2(v12)] << 16) ^ (Te4[BYTE1(v10)] << 8) ^ Te4[(unsigned __int8)v8] ^ v16[1];
a2[2] = (Te4[HIBYTE(v8)] << 24) ^ (Te4[BYTE2(v6)] << 16) ^ (Te4[BYTE1(v12)] << 8) ^ Te4[(unsigned __int8)v10] ^ v16[2];
a2[3] = (Te4[HIBYTE(v10)] << 24) ^ (Te4[BYTE2(v8)] << 16) ^ (Te4[BYTE1(v6)] << 8) ^ Te4[(unsigned __int8)v12] ^ v16[3];
return v21 - __readfsqword(0x28u);
}
|
AES_set_decrypt_key | openssl | __int64 __fastcall AES_set_decrypt_key(_DWORD *a1, int a2, _DWORD *a3)
{
int v5; // [rsp+1Ch] [rbp-44h]
int j; // [rsp+1Ch] [rbp-44h]
int i; // [rsp+20h] [rbp-40h]
int k; // [rsp+20h] [rbp-40h]
int v9; // [rsp+24h] [rbp-3Ch]
int v10; // [rsp+28h] [rbp-38h]
unsigned int v11; // [rsp+30h] [rbp-30h]
unsigned int v12; // [rsp+34h] [rbp-2Ch]
int v13; // [rsp+4Ch] [rbp-14h]
int v14; // [rsp+4Ch] [rbp-14h]
int v15; // [rsp+4Ch] [rbp-14h]
int v16; // [rsp+4Ch] [rbp-14h]
_DWORD *v17; // [rsp+50h] [rbp-10h]
v9 = AES_set_encrypt_key(a1, a2, a3);
if ( v9 < 0 )
return (unsigned int)v9;
v17 = a3;
v5 = 0;
for ( i = 4 * a3[60]; v5 < i; i -= 4 )
{
v13 = a3[v5];
a3[v5] = a3[i];
a3[i] = v13;
v14 = a3[v5 + 1];
a3[v5 + 1] = a3[i + 1];
a3[i + 1] = v14;
v15 = a3[v5 + 2];
a3[v5 + 2] = a3[i + 2];
a3[i + 2] = v15;
v16 = a3[v5 + 3];
a3[v5 + 3] = a3[i + 3];
a3[i + 3] = v16;
v5 += 4;
}
for ( j = 1; j < a3[60]; ++j )
{
v17 += 4;
for ( k = 0; k <= 3; ++k )
{
v10 = v17[k];
v11 = (2 * v10) & 0xFEFEFEFE ^ ((v10 & 0x80808080) - ((v10 & 0x80808080) >> 7)) & 0x1B1B1B1B;
v12 = (2 * v11) & 0xFEFEFEFE ^ ((v11 & 0x80808080) - ((v11 & 0x80808080) >> 7)) & 0x1B1B1B1B;
v17[k] = __ROL4__(
v11 ^ v10 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B,
24) ^ __ROL4__(
v10 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B,
8) ^ v11 ^ v12 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B ^ __ROL4__(v12 ^ v10 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B, 16);
}
}
return 0LL;
}
|
AES_set_encrypt_key | openssl | __int64 __fastcall AES_set_encrypt_key(_DWORD *a1, int a2, _DWORD *a3)
{
__int64 result; // rax
int v4; // [rsp+18h] [rbp-10h]
unsigned int v5; // [rsp+1Ch] [rbp-Ch]
unsigned int v6; // [rsp+1Ch] [rbp-Ch]
unsigned int v7; // [rsp+1Ch] [rbp-Ch]
unsigned int v8; // [rsp+1Ch] [rbp-Ch]
_DWORD *v9; // [rsp+20h] [rbp-8h]
v4 = 0;
if ( !a1 || !a3 )
return 0xFFFFFFFFLL;
if ( a2 != 128 && a2 != 192 && a2 != 256 )
return 4294967294LL;
v9 = a3;
if ( a2 == 128 )
{
a3[60] = 10;
}
else if ( a2 == 192 )
{
a3[60] = 12;
}
else
{
a3[60] = 14;
}
*a3 = *a1;
a3[1] = a1[1];
a3[2] = a1[2];
a3[3] = a1[3];
if ( a2 == 128 )
{
while ( 1 )
{
v5 = v9[3];
v9[4] = (Te4[(unsigned __int8)v5] << 24) ^ (Te4[HIBYTE(v5)] << 16) ^ (Te4[BYTE2(v5)] << 8) ^ Te4[BYTE1(v5)] ^ *v9 ^ rcon[v4];
v9[5] = v9[1] ^ v9[4];
v9[6] = v9[2] ^ v9[5];
v9[7] = v9[3] ^ v9[6];
if ( ++v4 == 10 )
break;
v9 += 4;
}
result = 0LL;
}
else
{
a3[4] = a1[4];
a3[5] = a1[5];
if ( a2 == 192 )
{
while ( 1 )
{
v6 = v9[5];
v9[6] = (Te4[(unsigned __int8)v6] << 24) ^ (Te4[HIBYTE(v6)] << 16) ^ (Te4[BYTE2(v6)] << 8) ^ Te4[BYTE1(v6)] ^ *v9 ^ rcon[v4];
v9[7] = v9[1] ^ v9[6];
v9[8] = v9[2] ^ v9[7];
v9[9] = v9[3] ^ v9[8];
if ( ++v4 == 8 )
break;
v9[10] = v9[4] ^ v9[9];
v9[11] = v9[5] ^ v9[10];
v9 += 6;
}
result = 0LL;
}
else
{
a3[6] = a1[6];
a3[7] = a1[7];
while ( 1 )
{
v7 = v9[7];
v9[8] = (Te4[(unsigned __int8)v7] << 24) ^ (Te4[HIBYTE(v7)] << 16) ^ (Te4[BYTE2(v7)] << 8) ^ Te4[BYTE1(v7)] ^ *v9 ^ rcon[v4];
v9[9] = v9[1] ^ v9[8];
v9[10] = v9[2] ^ v9[9];
v9[11] = v9[3] ^ v9[10];
if ( ++v4 == 7 )
break;
v8 = v9[11];
v9[12] = (Te4[BYTE2(v8)] << 16) ^ (Te4[BYTE1(v8)] << 8) ^ Te4[(unsigned __int8)v8] ^ v9[4] ^ (Te4[HIBYTE(v8)] << 24);
v9[13] = v9[5] ^ v9[12];
v9[14] = v9[6] ^ v9[13];
v9[15] = v9[7] ^ v9[14];
v9 += 8;
}
result = 0LL;
}
}
return result;
}
|
__cxa_finalize | openssl | // attributes: thunk
int __fastcall _cxa_finalize(void *a1)
{
return __cxa_finalize(a1);
}
|
__do_global_dtors_aux | openssl | char *_do_global_dtors_aux()
{
char *result; // rax
if ( !_bss_start )
{
if ( &__cxa_finalize )
_cxa_finalize(_dso_handle);
result = deregister_tm_clones();
_bss_start = 1;
}
return result;
}
|
_start | openssl | // positive sp value has been detected, the output may be wrong!
void __fastcall __noreturn start(__int64 a1, __int64 a2, void (*a3)(void))
{
__int64 v3; // rax
int v4; // esi
__int64 v5; // [rsp-8h] [rbp-8h] BYREF
char *retaddr; // [rsp+0h] [rbp+0h] BYREF
v4 = v5;
v5 = v3;
_libc_start_main((int (__fastcall *)(int, char **, char **))main, v4, &retaddr, 0LL, 0LL, a3, &v5);
__halt();
}
|
deregister_tm_clones | openssl | char *deregister_tm_clones()
{
return &_bss_start;
}
|
frame_dummy | openssl | __int64 frame_dummy()
{
return register_tm_clones();
}
|
main | openssl | int __cdecl main(int argc, const char **argv, const char **envp)
{
int result; // eax
return result;
}
|
prefetch256 | openssl | __int64 __fastcall prefetch256(__int64 a1)
{
unsigned int i; // [rsp+Ch] [rbp-1Ch]
__int64 v3; // [rsp+18h] [rbp-10h]
v3 = 0LL;
for ( i = 0; i <= 0x1F; i += 4 )
v3 ^= *(_QWORD *)(8LL * (int)i + a1);
return v3;
}
|
register_tm_clones | openssl | __int64 register_tm_clones()
{
return 0LL;
}
|
sub_1020 | openssl | void sub_1020()
{
JUMPOUT(0LL);
}
|
sub_1030 | openssl | void sub_1030()
{
sub_1020();
}
|
sub_1040 | openssl | void sub_1040()
{
sub_1020();
}
|
README.md exists but content is empty.
Use the Edit dataset card button to edit it.
- Downloads last month
- 37