func_name
stringclasses
19 values
opensource
stringclasses
1 value
content
stringclasses
19 values
-__assert_fail
openssl
// attributes: thunk void __noreturn __assert_fail(const char *assertion, const char *file, unsigned int line, const char *function) { _assert_fail(assertion, file, line, function); }
-__stack_chk_fail
openssl
// attributes: thunk void __noreturn __stack_chk_fail() { _stack_chk_fail(); }
-init_proc
openssl
__int64 (**init_proc())(void) { __int64 (**result)(void); // rax result = &_gmon_start__; if ( &_gmon_start__ ) result = (__int64 (**)(void))_gmon_start__(); return result; }
-term_proc
openssl
void term_proc() { ; }
AES_decrypt
openssl
unsigned __int64 __fastcall AES_decrypt(_DWORD *a1, int *a2, _DWORD *a3) { unsigned int v5; // [rsp+2Ch] [rbp-74h] unsigned int v6; // [rsp+2Ch] [rbp-74h] unsigned int v7; // [rsp+30h] [rbp-70h] unsigned int v8; // [rsp+30h] [rbp-70h] unsigned int v9; // [rsp+34h] [rbp-6Ch] unsigned int v10; // [rsp+34h] [rbp-6Ch] unsigned int v11; // [rsp+38h] [rbp-68h] unsigned int v12; // [rsp+38h] [rbp-68h] int j; // [rsp+3Ch] [rbp-64h] int i; // [rsp+40h] [rbp-60h] int v15; // [rsp+44h] [rbp-5Ch] unsigned int v16; // [rsp+4Ch] [rbp-54h] unsigned int v17; // [rsp+50h] [rbp-50h] _DWORD *v18; // [rsp+68h] [rbp-38h] int v19; // [rsp+70h] [rbp-30h] int v20; // [rsp+74h] [rbp-2Ch] int v21; // [rsp+78h] [rbp-28h] int v22; // [rsp+7Ch] [rbp-24h] unsigned __int64 v23; // [rsp+88h] [rbp-18h] v23 = __readfsqword(0x28u); if ( !a1 || !a2 || !a3 ) __assert_fail("in && out && key", "core.c", 0x371u, "AES_decrypt"); v5 = *a1 ^ *a3; v7 = a1[1] ^ a3[1]; v9 = a1[2] ^ a3[2]; v11 = a1[3] ^ a3[3]; prefetch256((__int64)Td4); v19 = (Td4[BYTE2(v9)] << 16) ^ (Td4[BYTE1(v11)] << 8) ^ Td4[(unsigned __int8)v5] ^ (Td4[HIBYTE(v7)] << 24); v20 = (Td4[BYTE2(v11)] << 16) ^ (Td4[BYTE1(v5)] << 8) ^ Td4[(unsigned __int8)v7] ^ (Td4[HIBYTE(v9)] << 24); v21 = (Td4[BYTE2(v5)] << 16) ^ (Td4[BYTE1(v7)] << 8) ^ Td4[(unsigned __int8)v9] ^ (Td4[HIBYTE(v11)] << 24); v22 = (Td4[BYTE2(v7)] << 16) ^ (Td4[BYTE1(v9)] << 8) ^ Td4[(unsigned __int8)v11] ^ (Td4[HIBYTE(v5)] << 24); for ( i = 0; i <= 3; ++i ) { v15 = *(&v19 + i); v16 = (2 * v15) & 0xFEFEFEFE ^ ((v15 & 0x80808080) - ((v15 & 0x80808080) >> 7)) & 0x1B1B1B1B; v17 = (2 * v16) & 0xFEFEFEFE ^ ((v16 & 0x80808080) - ((v16 & 0x80808080) >> 7)) & 0x1B1B1B1B; *(&v19 + i) = __ROL4__( v16 ^ v15 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B, 24) ^ __ROL4__( v15 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B, 8) ^ v16 ^ v17 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B ^ __ROL4__(v17 ^ v15 ^ (2 * v17) & 0xFEFEFEFE ^ ((v17 & 0x80808080) - ((v17 & 0x80808080) >> 7)) & 0x1B1B1B1B, 16); *(&v19 + i) ^= a3[i + 4]; } v6 = v19; v8 = v20; v10 = v21; v12 = v22; v18 = a3 + 8; for ( j = a3[60] - 2; j > 0; --j ) { v19 = *(_QWORD *)((char *)&Td[HIBYTE(v8)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v10)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v12)] + 3) ^ Td[(unsigned __int8)v6] ^ *v18; v20 = *(_QWORD *)((char *)&Td[HIBYTE(v10)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v12)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v6)] + 3) ^ Td[(unsigned __int8)v8] ^ v18[1]; v21 = *(_QWORD *)((char *)&Td[HIBYTE(v12)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v6)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v8)] + 3) ^ Td[(unsigned __int8)v10] ^ v18[2]; v22 = *(_QWORD *)((char *)&Td[HIBYTE(v6)] + 1) ^ *(_QWORD *)((char *)&Td[BYTE2(v8)] + 2) ^ *(_QWORD *)((char *)&Td[BYTE1(v10)] + 3) ^ Td[(unsigned __int8)v12] ^ v18[3]; v6 = v19; v8 = v20; v10 = v21; v12 = v22; v18 += 4; } prefetch256((__int64)Td4); *a2 = *v18 ^ (Td4[HIBYTE(v8)] << 24) ^ (Td4[BYTE2(v10)] << 16) ^ (Td4[BYTE1(v12)] << 8) ^ Td4[(unsigned __int8)v6]; a2[1] = (Td4[HIBYTE(v10)] << 24) ^ (Td4[BYTE2(v12)] << 16) ^ (Td4[BYTE1(v6)] << 8) ^ Td4[(unsigned __int8)v8] ^ v18[1]; a2[2] = (Td4[HIBYTE(v12)] << 24) ^ (Td4[BYTE2(v6)] << 16) ^ (Td4[BYTE1(v8)] << 8) ^ Td4[(unsigned __int8)v10] ^ v18[2]; a2[3] = (Td4[HIBYTE(v6)] << 24) ^ (Td4[BYTE2(v8)] << 16) ^ (Td4[BYTE1(v10)] << 8) ^ Td4[(unsigned __int8)v12] ^ v18[3]; return v23 - __readfsqword(0x28u); }
AES_encrypt
openssl
unsigned __int64 __fastcall AES_encrypt(_DWORD *a1, int *a2, _DWORD *a3) { unsigned int v5; // [rsp+24h] [rbp-5Ch] unsigned int v6; // [rsp+24h] [rbp-5Ch] unsigned int v7; // [rsp+28h] [rbp-58h] unsigned int v8; // [rsp+28h] [rbp-58h] unsigned int v9; // [rsp+2Ch] [rbp-54h] unsigned int v10; // [rsp+2Ch] [rbp-54h] unsigned int v11; // [rsp+30h] [rbp-50h] unsigned int v12; // [rsp+30h] [rbp-50h] int j; // [rsp+34h] [rbp-4Ch] int i; // [rsp+38h] [rbp-48h] int v15; // [rsp+3Ch] [rbp-44h] _DWORD *v16; // [rsp+48h] [rbp-38h] int v17; // [rsp+50h] [rbp-30h] int v18; // [rsp+54h] [rbp-2Ch] int v19; // [rsp+58h] [rbp-28h] int v20; // [rsp+5Ch] [rbp-24h] unsigned __int64 v21; // [rsp+68h] [rbp-18h] v21 = __readfsqword(0x28u); if ( !a1 || !a2 || !a3 ) __assert_fail("in && out && key", "core.c", 0x29Bu, "AES_encrypt"); v5 = *a1 ^ *a3; v7 = a1[1] ^ a3[1]; v9 = a1[2] ^ a3[2]; v11 = a1[3] ^ a3[3]; prefetch256((__int64)Te4); v17 = (Te4[BYTE2(v9)] << 16) ^ (Te4[BYTE1(v7)] << 8) ^ Te4[(unsigned __int8)v5] ^ (Te4[HIBYTE(v11)] << 24); v18 = (Te4[BYTE2(v11)] << 16) ^ (Te4[BYTE1(v9)] << 8) ^ Te4[(unsigned __int8)v7] ^ (Te4[HIBYTE(v5)] << 24); v19 = (Te4[BYTE2(v5)] << 16) ^ (Te4[BYTE1(v11)] << 8) ^ Te4[(unsigned __int8)v9] ^ (Te4[HIBYTE(v7)] << 24); v20 = (Te4[BYTE2(v7)] << 16) ^ (Te4[BYTE1(v5)] << 8) ^ Te4[(unsigned __int8)v11] ^ (Te4[HIBYTE(v9)] << 24); for ( i = 0; i <= 3; ++i ) { v15 = *(&v17 + i); *(&v17 + i) = __ROL4__(v15, 8) ^ __ROL4__(v15, 16) ^ __ROL4__(v15, 24) ^ (2 * v15) & 0xFEFEFEFE ^ ((v15 & 0x80808080) - ((v15 & 0x80808080) >> 7)) & 0x1B1B1B1B ^ __ROL4__((2 * v15) & 0xFEFEFEFE ^ ((v15 & 0x80808080) - ((v15 & 0x80808080) >> 7)) & 0x1B1B1B1B, 24); *(&v17 + i) ^= a3[i + 4]; } v6 = v17; v8 = v18; v10 = v19; v12 = v20; v16 = a3 + 8; for ( j = a3[60] - 2; j > 0; --j ) { v17 = *(_QWORD *)((char *)&Te[HIBYTE(v12)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v10)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v8)] + 3) ^ Te[(unsigned __int8)v6] ^ *v16; v18 = *(_QWORD *)((char *)&Te[HIBYTE(v6)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v12)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v10)] + 3) ^ Te[(unsigned __int8)v8] ^ v16[1]; v19 = *(_QWORD *)((char *)&Te[HIBYTE(v8)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v6)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v12)] + 3) ^ Te[(unsigned __int8)v10] ^ v16[2]; v20 = *(_QWORD *)((char *)&Te[HIBYTE(v10)] + 1) ^ *(_QWORD *)((char *)&Te[BYTE2(v8)] + 2) ^ *(_QWORD *)((char *)&Te[BYTE1(v6)] + 3) ^ Te[(unsigned __int8)v12] ^ v16[3]; v6 = v17; v8 = v18; v10 = v19; v12 = v20; v16 += 4; } prefetch256((__int64)Te4); *a2 = *v16 ^ (Te4[HIBYTE(v12)] << 24) ^ (Te4[BYTE2(v10)] << 16) ^ (Te4[BYTE1(v8)] << 8) ^ Te4[(unsigned __int8)v6]; a2[1] = (Te4[HIBYTE(v6)] << 24) ^ (Te4[BYTE2(v12)] << 16) ^ (Te4[BYTE1(v10)] << 8) ^ Te4[(unsigned __int8)v8] ^ v16[1]; a2[2] = (Te4[HIBYTE(v8)] << 24) ^ (Te4[BYTE2(v6)] << 16) ^ (Te4[BYTE1(v12)] << 8) ^ Te4[(unsigned __int8)v10] ^ v16[2]; a2[3] = (Te4[HIBYTE(v10)] << 24) ^ (Te4[BYTE2(v8)] << 16) ^ (Te4[BYTE1(v6)] << 8) ^ Te4[(unsigned __int8)v12] ^ v16[3]; return v21 - __readfsqword(0x28u); }
AES_set_decrypt_key
openssl
__int64 __fastcall AES_set_decrypt_key(_DWORD *a1, int a2, _DWORD *a3) { int v5; // [rsp+1Ch] [rbp-44h] int j; // [rsp+1Ch] [rbp-44h] int i; // [rsp+20h] [rbp-40h] int k; // [rsp+20h] [rbp-40h] int v9; // [rsp+24h] [rbp-3Ch] int v10; // [rsp+28h] [rbp-38h] unsigned int v11; // [rsp+30h] [rbp-30h] unsigned int v12; // [rsp+34h] [rbp-2Ch] int v13; // [rsp+4Ch] [rbp-14h] int v14; // [rsp+4Ch] [rbp-14h] int v15; // [rsp+4Ch] [rbp-14h] int v16; // [rsp+4Ch] [rbp-14h] _DWORD *v17; // [rsp+50h] [rbp-10h] v9 = AES_set_encrypt_key(a1, a2, a3); if ( v9 < 0 ) return (unsigned int)v9; v17 = a3; v5 = 0; for ( i = 4 * a3[60]; v5 < i; i -= 4 ) { v13 = a3[v5]; a3[v5] = a3[i]; a3[i] = v13; v14 = a3[v5 + 1]; a3[v5 + 1] = a3[i + 1]; a3[i + 1] = v14; v15 = a3[v5 + 2]; a3[v5 + 2] = a3[i + 2]; a3[i + 2] = v15; v16 = a3[v5 + 3]; a3[v5 + 3] = a3[i + 3]; a3[i + 3] = v16; v5 += 4; } for ( j = 1; j < a3[60]; ++j ) { v17 += 4; for ( k = 0; k <= 3; ++k ) { v10 = v17[k]; v11 = (2 * v10) & 0xFEFEFEFE ^ ((v10 & 0x80808080) - ((v10 & 0x80808080) >> 7)) & 0x1B1B1B1B; v12 = (2 * v11) & 0xFEFEFEFE ^ ((v11 & 0x80808080) - ((v11 & 0x80808080) >> 7)) & 0x1B1B1B1B; v17[k] = __ROL4__( v11 ^ v10 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B, 24) ^ __ROL4__( v10 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B, 8) ^ v11 ^ v12 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B ^ __ROL4__(v12 ^ v10 ^ (2 * v12) & 0xFEFEFEFE ^ ((v12 & 0x80808080) - ((v12 & 0x80808080) >> 7)) & 0x1B1B1B1B, 16); } } return 0LL; }
AES_set_encrypt_key
openssl
__int64 __fastcall AES_set_encrypt_key(_DWORD *a1, int a2, _DWORD *a3) { __int64 result; // rax int v4; // [rsp+18h] [rbp-10h] unsigned int v5; // [rsp+1Ch] [rbp-Ch] unsigned int v6; // [rsp+1Ch] [rbp-Ch] unsigned int v7; // [rsp+1Ch] [rbp-Ch] unsigned int v8; // [rsp+1Ch] [rbp-Ch] _DWORD *v9; // [rsp+20h] [rbp-8h] v4 = 0; if ( !a1 || !a3 ) return 0xFFFFFFFFLL; if ( a2 != 128 && a2 != 192 && a2 != 256 ) return 4294967294LL; v9 = a3; if ( a2 == 128 ) { a3[60] = 10; } else if ( a2 == 192 ) { a3[60] = 12; } else { a3[60] = 14; } *a3 = *a1; a3[1] = a1[1]; a3[2] = a1[2]; a3[3] = a1[3]; if ( a2 == 128 ) { while ( 1 ) { v5 = v9[3]; v9[4] = (Te4[(unsigned __int8)v5] << 24) ^ (Te4[HIBYTE(v5)] << 16) ^ (Te4[BYTE2(v5)] << 8) ^ Te4[BYTE1(v5)] ^ *v9 ^ rcon[v4]; v9[5] = v9[1] ^ v9[4]; v9[6] = v9[2] ^ v9[5]; v9[7] = v9[3] ^ v9[6]; if ( ++v4 == 10 ) break; v9 += 4; } result = 0LL; } else { a3[4] = a1[4]; a3[5] = a1[5]; if ( a2 == 192 ) { while ( 1 ) { v6 = v9[5]; v9[6] = (Te4[(unsigned __int8)v6] << 24) ^ (Te4[HIBYTE(v6)] << 16) ^ (Te4[BYTE2(v6)] << 8) ^ Te4[BYTE1(v6)] ^ *v9 ^ rcon[v4]; v9[7] = v9[1] ^ v9[6]; v9[8] = v9[2] ^ v9[7]; v9[9] = v9[3] ^ v9[8]; if ( ++v4 == 8 ) break; v9[10] = v9[4] ^ v9[9]; v9[11] = v9[5] ^ v9[10]; v9 += 6; } result = 0LL; } else { a3[6] = a1[6]; a3[7] = a1[7]; while ( 1 ) { v7 = v9[7]; v9[8] = (Te4[(unsigned __int8)v7] << 24) ^ (Te4[HIBYTE(v7)] << 16) ^ (Te4[BYTE2(v7)] << 8) ^ Te4[BYTE1(v7)] ^ *v9 ^ rcon[v4]; v9[9] = v9[1] ^ v9[8]; v9[10] = v9[2] ^ v9[9]; v9[11] = v9[3] ^ v9[10]; if ( ++v4 == 7 ) break; v8 = v9[11]; v9[12] = (Te4[BYTE2(v8)] << 16) ^ (Te4[BYTE1(v8)] << 8) ^ Te4[(unsigned __int8)v8] ^ v9[4] ^ (Te4[HIBYTE(v8)] << 24); v9[13] = v9[5] ^ v9[12]; v9[14] = v9[6] ^ v9[13]; v9[15] = v9[7] ^ v9[14]; v9 += 8; } result = 0LL; } } return result; }
__cxa_finalize
openssl
// attributes: thunk int __fastcall _cxa_finalize(void *a1) { return __cxa_finalize(a1); }
__do_global_dtors_aux
openssl
char *_do_global_dtors_aux() { char *result; // rax if ( !_bss_start ) { if ( &__cxa_finalize ) _cxa_finalize(_dso_handle); result = deregister_tm_clones(); _bss_start = 1; } return result; }
_start
openssl
// positive sp value has been detected, the output may be wrong! void __fastcall __noreturn start(__int64 a1, __int64 a2, void (*a3)(void)) { __int64 v3; // rax int v4; // esi __int64 v5; // [rsp-8h] [rbp-8h] BYREF char *retaddr; // [rsp+0h] [rbp+0h] BYREF v4 = v5; v5 = v3; _libc_start_main((int (__fastcall *)(int, char **, char **))main, v4, &retaddr, 0LL, 0LL, a3, &v5); __halt(); }
deregister_tm_clones
openssl
char *deregister_tm_clones() { return &_bss_start; }
frame_dummy
openssl
__int64 frame_dummy() { return register_tm_clones(); }
main
openssl
int __cdecl main(int argc, const char **argv, const char **envp) { int result; // eax return result; }
prefetch256
openssl
__int64 __fastcall prefetch256(__int64 a1) { unsigned int i; // [rsp+Ch] [rbp-1Ch] __int64 v3; // [rsp+18h] [rbp-10h] v3 = 0LL; for ( i = 0; i <= 0x1F; i += 4 ) v3 ^= *(_QWORD *)(8LL * (int)i + a1); return v3; }
register_tm_clones
openssl
__int64 register_tm_clones() { return 0LL; }
sub_1020
openssl
void sub_1020() { JUMPOUT(0LL); }
sub_1030
openssl
void sub_1030() { sub_1020(); }
sub_1040
openssl
void sub_1040() { sub_1020(); }
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
37
Edit dataset card