0 | |
//+build !noasm,!appengine
|
1 | |
|
2 | |
// SHA256 implementation for AVX2
|
3 | |
|
4 | |
//
|
5 | |
// Minio Cloud Storage, (C) 2016 Minio, Inc.
|
6 | |
//
|
7 | |
// Licensed under the Apache License, Version 2.0 (the "License");
|
8 | |
// you may not use this file except in compliance with the License.
|
9 | |
// You may obtain a copy of the License at
|
10 | |
//
|
11 | |
// http://www.apache.org/licenses/LICENSE-2.0
|
12 | |
//
|
13 | |
// Unless required by applicable law or agreed to in writing, software
|
14 | |
// distributed under the License is distributed on an "AS IS" BASIS,
|
15 | |
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
16 | |
// See the License for the specific language governing permissions and
|
17 | |
// limitations under the License.
|
18 | |
//
|
19 | |
|
20 | |
//
|
21 | |
// This code is based on an Intel White-Paper:
|
22 | |
// "Fast SHA-256 Implementations on Intel Architecture Processors"
|
23 | |
//
|
24 | |
// together with the reference implementation from the following authors:
|
25 | |
// James Guilford <james.guilford@intel.com>
|
26 | |
// Kirk Yap <kirk.s.yap@intel.com>
|
27 | |
// Tim Chen <tim.c.chen@linux.intel.com>
|
28 | |
//
|
29 | |
// For Golang it has been converted to Plan 9 assembly with the help of
|
30 | |
// github.com/minio/asm2plan9s to assemble Intel instructions to their Plan9
|
31 | |
// equivalents
|
32 | |
//
|
33 | |
|
34 | |
DATA K256<>+0x000(SB)/8, $0x71374491428a2f98
|
35 | |
DATA K256<>+0x008(SB)/8, $0xe9b5dba5b5c0fbcf
|
36 | |
DATA K256<>+0x010(SB)/8, $0x71374491428a2f98
|
37 | |
DATA K256<>+0x018(SB)/8, $0xe9b5dba5b5c0fbcf
|
38 | |
DATA K256<>+0x020(SB)/8, $0x59f111f13956c25b
|
39 | |
DATA K256<>+0x028(SB)/8, $0xab1c5ed5923f82a4
|
40 | |
DATA K256<>+0x030(SB)/8, $0x59f111f13956c25b
|
41 | |
DATA K256<>+0x038(SB)/8, $0xab1c5ed5923f82a4
|
42 | |
DATA K256<>+0x040(SB)/8, $0x12835b01d807aa98
|
43 | |
DATA K256<>+0x048(SB)/8, $0x550c7dc3243185be
|
44 | |
DATA K256<>+0x050(SB)/8, $0x12835b01d807aa98
|
45 | |
DATA K256<>+0x058(SB)/8, $0x550c7dc3243185be
|
46 | |
DATA K256<>+0x060(SB)/8, $0x80deb1fe72be5d74
|
47 | |
DATA K256<>+0x068(SB)/8, $0xc19bf1749bdc06a7
|
48 | |
DATA K256<>+0x070(SB)/8, $0x80deb1fe72be5d74
|
49 | |
DATA K256<>+0x078(SB)/8, $0xc19bf1749bdc06a7
|
50 | |
DATA K256<>+0x080(SB)/8, $0xefbe4786e49b69c1
|
51 | |
DATA K256<>+0x088(SB)/8, $0x240ca1cc0fc19dc6
|
52 | |
DATA K256<>+0x090(SB)/8, $0xefbe4786e49b69c1
|
53 | |
DATA K256<>+0x098(SB)/8, $0x240ca1cc0fc19dc6
|
54 | |
DATA K256<>+0x0a0(SB)/8, $0x4a7484aa2de92c6f
|
55 | |
DATA K256<>+0x0a8(SB)/8, $0x76f988da5cb0a9dc
|
56 | |
DATA K256<>+0x0b0(SB)/8, $0x4a7484aa2de92c6f
|
57 | |
DATA K256<>+0x0b8(SB)/8, $0x76f988da5cb0a9dc
|
58 | |
DATA K256<>+0x0c0(SB)/8, $0xa831c66d983e5152
|
59 | |
DATA K256<>+0x0c8(SB)/8, $0xbf597fc7b00327c8
|
60 | |
DATA K256<>+0x0d0(SB)/8, $0xa831c66d983e5152
|
61 | |
DATA K256<>+0x0d8(SB)/8, $0xbf597fc7b00327c8
|
62 | |
DATA K256<>+0x0e0(SB)/8, $0xd5a79147c6e00bf3
|
63 | |
DATA K256<>+0x0e8(SB)/8, $0x1429296706ca6351
|
64 | |
DATA K256<>+0x0f0(SB)/8, $0xd5a79147c6e00bf3
|
65 | |
DATA K256<>+0x0f8(SB)/8, $0x1429296706ca6351
|
66 | |
DATA K256<>+0x100(SB)/8, $0x2e1b213827b70a85
|
67 | |
DATA K256<>+0x108(SB)/8, $0x53380d134d2c6dfc
|
68 | |
DATA K256<>+0x110(SB)/8, $0x2e1b213827b70a85
|
69 | |
DATA K256<>+0x118(SB)/8, $0x53380d134d2c6dfc
|
70 | |
DATA K256<>+0x120(SB)/8, $0x766a0abb650a7354
|
71 | |
DATA K256<>+0x128(SB)/8, $0x92722c8581c2c92e
|
72 | |
DATA K256<>+0x130(SB)/8, $0x766a0abb650a7354
|
73 | |
DATA K256<>+0x138(SB)/8, $0x92722c8581c2c92e
|
74 | |
DATA K256<>+0x140(SB)/8, $0xa81a664ba2bfe8a1
|
75 | |
DATA K256<>+0x148(SB)/8, $0xc76c51a3c24b8b70
|
76 | |
DATA K256<>+0x150(SB)/8, $0xa81a664ba2bfe8a1
|
77 | |
DATA K256<>+0x158(SB)/8, $0xc76c51a3c24b8b70
|
78 | |
DATA K256<>+0x160(SB)/8, $0xd6990624d192e819
|
79 | |
DATA K256<>+0x168(SB)/8, $0x106aa070f40e3585
|
80 | |
DATA K256<>+0x170(SB)/8, $0xd6990624d192e819
|
81 | |
DATA K256<>+0x178(SB)/8, $0x106aa070f40e3585
|
82 | |
DATA K256<>+0x180(SB)/8, $0x1e376c0819a4c116
|
83 | |
DATA K256<>+0x188(SB)/8, $0x34b0bcb52748774c
|
84 | |
DATA K256<>+0x190(SB)/8, $0x1e376c0819a4c116
|
85 | |
DATA K256<>+0x198(SB)/8, $0x34b0bcb52748774c
|
86 | |
DATA K256<>+0x1a0(SB)/8, $0x4ed8aa4a391c0cb3
|
87 | |
DATA K256<>+0x1a8(SB)/8, $0x682e6ff35b9cca4f
|
88 | |
DATA K256<>+0x1b0(SB)/8, $0x4ed8aa4a391c0cb3
|
89 | |
DATA K256<>+0x1b8(SB)/8, $0x682e6ff35b9cca4f
|
90 | |
DATA K256<>+0x1c0(SB)/8, $0x78a5636f748f82ee
|
91 | |
DATA K256<>+0x1c8(SB)/8, $0x8cc7020884c87814
|
92 | |
DATA K256<>+0x1d0(SB)/8, $0x78a5636f748f82ee
|
93 | |
DATA K256<>+0x1d8(SB)/8, $0x8cc7020884c87814
|
94 | |
DATA K256<>+0x1e0(SB)/8, $0xa4506ceb90befffa
|
95 | |
DATA K256<>+0x1e8(SB)/8, $0xc67178f2bef9a3f7
|
96 | |
DATA K256<>+0x1f0(SB)/8, $0xa4506ceb90befffa
|
97 | |
DATA K256<>+0x1f8(SB)/8, $0xc67178f2bef9a3f7
|
98 | |
|
99 | |
DATA K256<>+0x200(SB)/8, $0x0405060700010203
|
100 | |
DATA K256<>+0x208(SB)/8, $0x0c0d0e0f08090a0b
|
101 | |
DATA K256<>+0x210(SB)/8, $0x0405060700010203
|
102 | |
DATA K256<>+0x218(SB)/8, $0x0c0d0e0f08090a0b
|
103 | |
DATA K256<>+0x220(SB)/8, $0x0b0a090803020100
|
104 | |
DATA K256<>+0x228(SB)/8, $0xffffffffffffffff
|
105 | |
DATA K256<>+0x230(SB)/8, $0x0b0a090803020100
|
106 | |
DATA K256<>+0x238(SB)/8, $0xffffffffffffffff
|
107 | |
DATA K256<>+0x240(SB)/8, $0xffffffffffffffff
|
108 | |
DATA K256<>+0x248(SB)/8, $0x0b0a090803020100
|
109 | |
DATA K256<>+0x250(SB)/8, $0xffffffffffffffff
|
110 | |
DATA K256<>+0x258(SB)/8, $0x0b0a090803020100
|
111 | |
|
112 | |
GLOBL K256<>(SB), 8, $608
|
113 | |
|
114 | |
// We need 0x220 stack space aligned on a 512 boundary, so for the
|
115 | |
// worstcase-aligned SP we need twice this amount, being 1088 (=0x440)
|
116 | |
//
|
117 | |
// SP aligned end-aligned stacksize
|
118 | |
// 100013d0 10001400 10001620 592
|
119 | |
// 100013d8 10001400 10001620 584
|
120 | |
// 100013e0 10001600 10001820 1088
|
121 | |
// 100013e8 10001600 10001820 1080
|
122 | |
|
123 | |
// func blockAvx2(h []uint32, message []uint8)
|
124 | |
TEXT ·blockAvx2(SB),$1088-48
|
125 | |
|
126 | |
MOVQ h+0(FP), DI // DI: &h
|
127 | |
MOVQ message_base+24(FP), SI // SI: &message
|
128 | |
MOVQ message_len+32(FP), DX // len(message)
|
129 | |
ADDQ SI, DX // end pointer of input
|
130 | |
MOVQ SP, R11 // copy stack pointer
|
131 | |
ADDQ $0x220, SP // sp += 0x220
|
132 | |
ANDQ $0xfffffffffffffe00, SP // align stack frame
|
133 | |
ADDQ $0x1c0, SP
|
134 | |
MOVQ DI, 0x40(SP) // save ctx
|
135 | |
MOVQ SI, 0x48(SP) // save input
|
136 | |
MOVQ DX, 0x50(SP) // save end pointer
|
137 | |
MOVQ R11, 0x58(SP) // save copy of stack pointer
|
138 | |
|
139 | |
WORD $0xf8c5; BYTE $0x77 // vzeroupper
|
140 | |
ADDQ $0x40, SI // input++
|
141 | |
MOVL (DI), AX
|
142 | |
MOVQ SI, R12 // borrow $T1
|
143 | |
MOVL 4(DI), BX
|
144 | |
CMPQ SI, DX // $_end
|
145 | |
MOVL 8(DI), CX
|
146 | |
LONG $0xe4440f4c // cmove r12,rsp /* next block or random data */
|
147 | |
MOVL 12(DI), DX
|
148 | |
MOVL 16(DI), R8
|
149 | |
MOVL 20(DI), R9
|
150 | |
MOVL 24(DI), R10
|
151 | |
MOVL 28(DI), R11
|
152 | |
|
153 | |
LEAQ K256<>(SB), BP
|
154 | |
LONG $0x856f7dc5; LONG $0x00000220 // VMOVDQA YMM8, 0x220[rbp] /* vmovdqa ymm8,YMMWORD PTR [rip+0x220] */
|
155 | |
LONG $0x8d6f7dc5; LONG $0x00000240 // VMOVDQA YMM9, 0x240[rbp] /* vmovdqa ymm9,YMMWORD PTR [rip+0x240] */
|
156 | |
LONG $0x956f7dc5; LONG $0x00000200 // VMOVDQA YMM10, 0x200[rbp] /* vmovdqa ymm7,YMMWORD PTR [rip+0x200] */
|
157 | |
|
158 | |
loop0:
|
159 | |
LONG $0x6f7dc1c4; BYTE $0xfa // VMOVDQA YMM7, YMM10
|
160 | |
|
161 | |
// Load first 16 dwords from two blocks
|
162 | |
MOVOU -64(SI), X0 // vmovdqu xmm0,XMMWORD PTR [rsi-0x40]
|
163 | |
MOVOU -48(SI), X1 // vmovdqu xmm1,XMMWORD PTR [rsi-0x30]
|
164 | |
MOVOU -32(SI), X2 // vmovdqu xmm2,XMMWORD PTR [rsi-0x20]
|
165 | |
MOVOU -16(SI), X3 // vmovdqu xmm3,XMMWORD PTR [rsi-0x10]
|
166 | |
|
167 | |
// Byte swap data and transpose data into high/low
|
168 | |
LONG $0x387dc3c4; WORD $0x2404; BYTE $0x01 // vinserti128 ymm0,ymm0,[r12],0x1
|
169 | |
LONG $0x3875c3c4; LONG $0x0110244c // vinserti128 ymm1,ymm1,0x10[r12],0x1
|
170 | |
LONG $0x007de2c4; BYTE $0xc7 // vpshufb ymm0,ymm0,ymm7
|
171 | |
LONG $0x386dc3c4; LONG $0x01202454 // vinserti128 ymm2,ymm2,0x20[r12],0x1
|
172 | |
LONG $0x0075e2c4; BYTE $0xcf // vpshufb ymm1,ymm1,ymm7
|
173 | |
LONG $0x3865c3c4; LONG $0x0130245c // vinserti128 ymm3,ymm3,0x30[r12],0x1
|
174 | |
|
175 | |
LEAQ K256<>(SB), BP
|
176 | |
LONG $0x006de2c4; BYTE $0xd7 // vpshufb ymm2,ymm2,ymm7
|
177 | |
LONG $0x65fefdc5; BYTE $0x00 // vpaddd ymm4,ymm0,[rbp]
|
178 | |
LONG $0x0065e2c4; BYTE $0xdf // vpshufb ymm3,ymm3,ymm7
|
179 | |
LONG $0x6dfef5c5; BYTE $0x20 // vpaddd ymm5,ymm1,0x20[rbp]
|
180 | |
LONG $0x75feedc5; BYTE $0x40 // vpaddd ymm6,ymm2,0x40[rbp]
|
181 | |
LONG $0x7dfee5c5; BYTE $0x60 // vpaddd ymm7,ymm3,0x60[rbp]
|
182 | |
|
183 | |
LONG $0x247ffdc5; BYTE $0x24 // vmovdqa [rsp],ymm4
|
184 | |
XORQ R14, R14
|
185 | |
LONG $0x6c7ffdc5; WORD $0x2024 // vmovdqa [rsp+0x20],ymm5
|
186 | |
|
187 | |
ADDQ $-0x40, SP
|
188 | |
MOVQ BX, DI
|
189 | |
LONG $0x347ffdc5; BYTE $0x24 // vmovdqa [rsp],ymm6
|
190 | |
XORQ CX, DI // magic
|
191 | |
LONG $0x7c7ffdc5; WORD $0x2024 // vmovdqa [rsp+0x20],ymm7
|
192 | |
MOVQ R9, R12
|
193 | |
ADDQ $0x80, BP
|
194 | |
|
195 | |
loop1:
|
196 | |
// Schedule 48 input dwords, by doing 3 rounds of 12 each
|
197 | |
// Note: SIMD instructions are interleaved with the SHA calculations
|
198 | |
ADDQ $-0x40, SP
|
199 | |
LONG $0x0f75e3c4; WORD $0x04e0 // vpalignr ymm4,ymm1,ymm0,0x4
|
200 | |
|
201 | |
// ROUND(AX, BX, CX, DX, R8, R9, R10, R11, R12, R13, R14, R15, DI, SP, 0x80)
|
202 | |
LONG $0x249c0344; LONG $0x00000080 // add r11d,[rsp+0x80]
|
203 | |
WORD $0x2145; BYTE $0xc4 // and r12d,r8d
|
204 | |
LONG $0xf07b43c4; WORD $0x19e8 // rorx r13d,r8d,0x19
|
205 | |
LONG $0x0f65e3c4; WORD $0x04fa // vpalignr ymm7,ymm3,ymm2,0x4
|
206 | |
LONG $0xf07b43c4; WORD $0x0bf8 // rorx r15d,r8d,0xb
|
207 | |
LONG $0x30048d42 // lea eax,[rax+r14*1]
|
208 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
209 | |
LONG $0xd472cdc5; BYTE $0x07 // vpsrld ymm6,ymm4,0x7
|
210 | |
LONG $0xf23842c4; BYTE $0xe2 // andn r12d,r8d,r10d
|
211 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
212 | |
LONG $0xf07b43c4; WORD $0x06f0 // rorx r14d,r8d,0x6
|
213 | |
LONG $0xc7fefdc5 // vpaddd ymm0,ymm0,ymm7
|
214 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
215 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
216 | |
WORD $0x8941; BYTE $0xc7 // mov r15d,eax
|
217 | |
LONG $0xd472c5c5; BYTE $0x03 // vpsrld ymm7,ymm4,0x3
|
218 | |
LONG $0xf07b63c4; WORD $0x16e0 // rorx r12d,eax,0x16
|
219 | |
LONG $0x2b1c8d47 // lea r11d,[r11+r13*1]
|
220 | |
WORD $0x3141; BYTE $0xdf // xor r15d,ebx
|
221 | |
LONG $0xf472d5c5; BYTE $0x0e // vpslld ymm5,ymm4,0xe
|
222 | |
LONG $0xf07b63c4; WORD $0x0df0 // rorx r14d,eax,0xd
|
223 | |
LONG $0xf07b63c4; WORD $0x02e8 // rorx r13d,eax,0x2
|
224 | |
LONG $0x1a148d42 // lea edx,[rdx+r11*1]
|
225 | |
LONG $0xe6efc5c5 // vpxor ymm4,ymm7,ymm6
|
226 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
227 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
228 | |
WORD $0xdf31 // xor edi,ebx
|
229 | |
LONG $0xfb70fdc5; BYTE $0xfa // vpshufd ymm7,ymm3,0xfa
|
230 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
231 | |
LONG $0x3b1c8d45 // lea r11d,[r11+rdi*1]
|
232 | |
WORD $0x8945; BYTE $0xc4 // mov r12d,r8d
|
233 | |
LONG $0xd672cdc5; BYTE $0x0b // vpsrld ymm6,ymm6,0xb
|
234 | |
|
235 | |
// ROUND(R11, AX, BX, CX, DX, R8, R9, R10, R12, R13, R14, DI, R15, SP, 0x84)
|
236 | |
LONG $0x24940344; LONG $0x00000084 // add r10d,[rsp+0x84]
|
237 | |
WORD $0x2141; BYTE $0xd4 // and r12d,edx
|
238 | |
LONG $0xf07b63c4; WORD $0x19ea // rorx r13d,edx,0x19
|
239 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
240 | |
LONG $0xf07be3c4; WORD $0x0bfa // rorx edi,edx,0xb
|
241 | |
LONG $0x331c8d47 // lea r11d,[r11+r14*1]
|
242 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
243 | |
LONG $0xf572d5c5; BYTE $0x0b // vpslld ymm5,ymm5,0xb
|
244 | |
LONG $0xf26842c4; BYTE $0xe1 // andn r12d,edx,r9d
|
245 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
246 | |
LONG $0xf07b63c4; WORD $0x06f2 // rorx r14d,edx,0x6
|
247 | |
LONG $0xe6efddc5 // vpxor ymm4,ymm4,ymm6
|
248 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
249 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
250 | |
WORD $0x8944; BYTE $0xdf // mov edi,r11d
|
251 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
252 | |
LONG $0xf07b43c4; WORD $0x16e3 // rorx r12d,r11d,0x16
|
253 | |
LONG $0x2a148d47 // lea r10d,[r10+r13*1]
|
254 | |
WORD $0xc731 // xor edi,eax
|
255 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
256 | |
LONG $0xf07b43c4; WORD $0x0df3 // rorx r14d,r11d,0xd
|
257 | |
LONG $0xf07b43c4; WORD $0x02eb // rorx r13d,r11d,0x2
|
258 | |
LONG $0x110c8d42 // lea ecx,[rcx+r10*1]
|
259 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
260 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
261 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
262 | |
WORD $0x3141; BYTE $0xc7 // xor r15d,eax
|
263 | |
LONG $0xc4fefdc5 // vpaddd ymm0,ymm0,ymm4
|
264 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
265 | |
LONG $0x3a148d47 // lea r10d,[r10+r15*1]
|
266 | |
WORD $0x8941; BYTE $0xd4 // mov r12d,edx
|
267 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
268 | |
|
269 | |
// ROUND(R10, R11, AX, BX, CX, DX, R8, R9, R12, R13, R14, R15, DI, SP, 0x88)
|
270 | |
LONG $0x248c0344; LONG $0x00000088 // add r9d,[rsp+0x88]
|
271 | |
WORD $0x2141; BYTE $0xcc // and r12d,ecx
|
272 | |
LONG $0xf07b63c4; WORD $0x19e9 // rorx r13d,ecx,0x19
|
273 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
274 | |
LONG $0xf07b63c4; WORD $0x0bf9 // rorx r15d,ecx,0xb
|
275 | |
LONG $0x32148d47 // lea r10d,[r10+r14*1]
|
276 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
277 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
278 | |
LONG $0xf27042c4; BYTE $0xe0 // andn r12d,ecx,r8d
|
279 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
280 | |
LONG $0xf07b63c4; WORD $0x06f1 // rorx r14d,ecx,0x6
|
281 | |
LONG $0x004dc2c4; BYTE $0xf0 // vpshufb ymm6,ymm6,ymm8
|
282 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
283 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
284 | |
WORD $0x8945; BYTE $0xd7 // mov r15d,r10d
|
285 | |
LONG $0xc6fefdc5 // vpaddd ymm0,ymm0,ymm6
|
286 | |
LONG $0xf07b43c4; WORD $0x16e2 // rorx r12d,r10d,0x16
|
287 | |
LONG $0x290c8d47 // lea r9d,[r9+r13*1]
|
288 | |
WORD $0x3145; BYTE $0xdf // xor r15d,r11d
|
289 | |
LONG $0xf870fdc5; BYTE $0x50 // vpshufd ymm7,ymm0,0x50
|
290 | |
LONG $0xf07b43c4; WORD $0x0df2 // rorx r14d,r10d,0xd
|
291 | |
LONG $0xf07b43c4; WORD $0x02ea // rorx r13d,r10d,0x2
|
292 | |
LONG $0x0b1c8d42 // lea ebx,[rbx+r9*1]
|
293 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
294 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
295 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
296 | |
WORD $0x3144; BYTE $0xdf // xor edi,r11d
|
297 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
298 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
299 | |
LONG $0x390c8d45 // lea r9d,[r9+rdi*1]
|
300 | |
WORD $0x8941; BYTE $0xcc // mov r12d,ecx
|
301 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
302 | |
|
303 | |
// ROUND(R9, R10, R11, AX, BX, CX, DX, R8, R12, R13, R14, DI, R15, SP, 0x8c)
|
304 | |
LONG $0x24840344; LONG $0x0000008c // add r8d,[rsp+0x8c]
|
305 | |
WORD $0x2141; BYTE $0xdc // and r12d,ebx
|
306 | |
LONG $0xf07b63c4; WORD $0x19eb // rorx r13d,ebx,0x19
|
307 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
308 | |
LONG $0xf07be3c4; WORD $0x0bfb // rorx edi,ebx,0xb
|
309 | |
LONG $0x310c8d47 // lea r9d,[r9+r14*1]
|
310 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
311 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
312 | |
LONG $0xf26062c4; BYTE $0xe2 // andn r12d,ebx,edx
|
313 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
314 | |
LONG $0xf07b63c4; WORD $0x06f3 // rorx r14d,ebx,0x6
|
315 | |
LONG $0x004dc2c4; BYTE $0xf1 // vpshufb ymm6,ymm6,ymm9
|
316 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
317 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
318 | |
WORD $0x8944; BYTE $0xcf // mov edi,r9d
|
319 | |
LONG $0xc6fefdc5 // vpaddd ymm0,ymm0,ymm6
|
320 | |
LONG $0xf07b43c4; WORD $0x16e1 // rorx r12d,r9d,0x16
|
321 | |
LONG $0x28048d47 // lea r8d,[r8+r13*1]
|
322 | |
WORD $0x3144; BYTE $0xd7 // xor edi,r10d
|
323 | |
LONG $0x75fefdc5; BYTE $0x00 // vpaddd ymm6,ymm0,[rbp+0x0]
|
324 | |
LONG $0xf07b43c4; WORD $0x0df1 // rorx r14d,r9d,0xd
|
325 | |
LONG $0xf07b43c4; WORD $0x02e9 // rorx r13d,r9d,0x2
|
326 | |
LONG $0x00048d42 // lea eax,[rax+r8*1]
|
327 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
328 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
329 | |
WORD $0x3145; BYTE $0xd7 // xor r15d,r10d
|
330 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
331 | |
LONG $0x38048d47 // lea r8d,[r8+r15*1]
|
332 | |
WORD $0x8941; BYTE $0xdc // mov r12d,ebx
|
333 | |
|
334 | |
LONG $0x347ffdc5; BYTE $0x24 // vmovdqa [rsp],ymm6
|
335 | |
LONG $0x0f6de3c4; WORD $0x04e1 // vpalignr ymm4,ymm2,ymm1,0x4
|
336 | |
|
337 | |
// ROUND(R8, R9, R10, R11, AX, BX, CX, DX, R12, R13, R14, R15, DI, SP, 0xa0)
|
338 | |
LONG $0xa0249403; WORD $0x0000; BYTE $0x00 // add edx,[rsp+0xa0]
|
339 | |
WORD $0x2141; BYTE $0xc4 // and r12d,eax
|
340 | |
LONG $0xf07b63c4; WORD $0x19e8 // rorx r13d,eax,0x19
|
341 | |
LONG $0x0f7de3c4; WORD $0x04fb // vpalignr ymm7,ymm0,ymm3,0x4
|
342 | |
LONG $0xf07b63c4; WORD $0x0bf8 // rorx r15d,eax,0xb
|
343 | |
LONG $0x30048d47 // lea r8d,[r8+r14*1]
|
344 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
345 | |
LONG $0xd472cdc5; BYTE $0x07 // vpsrld ymm6,ymm4,0x7
|
346 | |
LONG $0xf27862c4; BYTE $0xe1 // andn r12d,eax,ecx
|
347 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
348 | |
LONG $0xf07b63c4; WORD $0x06f0 // rorx r14d,eax,0x6
|
349 | |
LONG $0xcffef5c5 // vpaddd ymm1,ymm1,ymm7
|
350 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
351 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
352 | |
WORD $0x8945; BYTE $0xc7 // mov r15d,r8d
|
353 | |
LONG $0xd472c5c5; BYTE $0x03 // vpsrld ymm7,ymm4,0x3
|
354 | |
LONG $0xf07b43c4; WORD $0x16e0 // rorx r12d,r8d,0x16
|
355 | |
LONG $0x2a148d42 // lea edx,[rdx+r13*1]
|
356 | |
WORD $0x3145; BYTE $0xcf // xor r15d,r9d
|
357 | |
LONG $0xf472d5c5; BYTE $0x0e // vpslld ymm5,ymm4,0xe
|
358 | |
LONG $0xf07b43c4; WORD $0x0df0 // rorx r14d,r8d,0xd
|
359 | |
LONG $0xf07b43c4; WORD $0x02e8 // rorx r13d,r8d,0x2
|
360 | |
LONG $0x131c8d45 // lea r11d,[r11+rdx*1]
|
361 | |
LONG $0xe6efc5c5 // vpxor ymm4,ymm7,ymm6
|
362 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
363 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
364 | |
WORD $0x3144; BYTE $0xcf // xor edi,r9d
|
365 | |
LONG $0xf870fdc5; BYTE $0xfa // vpshufd ymm7,ymm0,0xfa
|
366 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
367 | |
WORD $0x148d; BYTE $0x3a // lea edx,[rdx+rdi*1]
|
368 | |
WORD $0x8941; BYTE $0xc4 // mov r12d,eax
|
369 | |
LONG $0xd672cdc5; BYTE $0x0b // vpsrld ymm6,ymm6,0xb
|
370 | |
|
371 | |
// ROUND(DX, R8, R9, R10, R11, AX, BX, CX, R12, R13, R14, DI, R15, SP, 0xa4)
|
372 | |
LONG $0xa4248c03; WORD $0x0000; BYTE $0x00 // add ecx,[rsp+0xa4]
|
373 | |
WORD $0x2145; BYTE $0xdc // and r12d,r11d
|
374 | |
LONG $0xf07b43c4; WORD $0x19eb // rorx r13d,r11d,0x19
|
375 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
376 | |
LONG $0xf07bc3c4; WORD $0x0bfb // rorx edi,r11d,0xb
|
377 | |
LONG $0x32148d42 // lea edx,[rdx+r14*1]
|
378 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
379 | |
LONG $0xf572d5c5; BYTE $0x0b // vpslld ymm5,ymm5,0xb
|
380 | |
LONG $0xf22062c4; BYTE $0xe3 // andn r12d,r11d,ebx
|
381 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
382 | |
LONG $0xf07b43c4; WORD $0x06f3 // rorx r14d,r11d,0x6
|
383 | |
LONG $0xe6efddc5 // vpxor ymm4,ymm4,ymm6
|
384 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
385 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
386 | |
WORD $0xd789 // mov edi,edx
|
387 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
388 | |
LONG $0xf07b63c4; WORD $0x16e2 // rorx r12d,edx,0x16
|
389 | |
LONG $0x290c8d42 // lea ecx,[rcx+r13*1]
|
390 | |
WORD $0x3144; BYTE $0xc7 // xor edi,r8d
|
391 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
392 | |
LONG $0xf07b63c4; WORD $0x0df2 // rorx r14d,edx,0xd
|
393 | |
LONG $0xf07b63c4; WORD $0x02ea // rorx r13d,edx,0x2
|
394 | |
LONG $0x0a148d45 // lea r10d,[r10+rcx*1]
|
395 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
396 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
397 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
398 | |
WORD $0x3145; BYTE $0xc7 // xor r15d,r8d
|
399 | |
LONG $0xccfef5c5 // vpaddd ymm1,ymm1,ymm4
|
400 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
401 | |
LONG $0x390c8d42 // lea ecx,[rcx+r15*1]
|
402 | |
WORD $0x8945; BYTE $0xdc // mov r12d,r11d
|
403 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
404 | |
|
405 | |
// ROUND(CX, DX, R8, R9, R10, R11, AX, BX, R12, R13, R14, R15, DI, SP, 0xa8)
|
406 | |
LONG $0xa8249c03; WORD $0x0000; BYTE $0x00 // add ebx,[rsp+0xa8]
|
407 | |
WORD $0x2145; BYTE $0xd4 // and r12d,r10d
|
408 | |
LONG $0xf07b43c4; WORD $0x19ea // rorx r13d,r10d,0x19
|
409 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
410 | |
LONG $0xf07b43c4; WORD $0x0bfa // rorx r15d,r10d,0xb
|
411 | |
LONG $0x310c8d42 // lea ecx,[rcx+r14*1]
|
412 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
413 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
414 | |
LONG $0xf22862c4; BYTE $0xe0 // andn r12d,r10d,eax
|
415 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
416 | |
LONG $0xf07b43c4; WORD $0x06f2 // rorx r14d,r10d,0x6
|
417 | |
LONG $0x004dc2c4; BYTE $0xf0 // vpshufb ymm6,ymm6,ymm8
|
418 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
419 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
420 | |
WORD $0x8941; BYTE $0xcf // mov r15d,ecx
|
421 | |
LONG $0xcefef5c5 // vpaddd ymm1,ymm1,ymm6
|
422 | |
LONG $0xf07b63c4; WORD $0x16e1 // rorx r12d,ecx,0x16
|
423 | |
LONG $0x2b1c8d42 // lea ebx,[rbx+r13*1]
|
424 | |
WORD $0x3141; BYTE $0xd7 // xor r15d,edx
|
425 | |
LONG $0xf970fdc5; BYTE $0x50 // vpshufd ymm7,ymm1,0x50
|
426 | |
LONG $0xf07b63c4; WORD $0x0df1 // rorx r14d,ecx,0xd
|
427 | |
LONG $0xf07b63c4; WORD $0x02e9 // rorx r13d,ecx,0x2
|
428 | |
LONG $0x190c8d45 // lea r9d,[r9+rbx*1]
|
429 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
430 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
431 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
432 | |
WORD $0xd731 // xor edi,edx
|
433 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
434 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
435 | |
WORD $0x1c8d; BYTE $0x3b // lea ebx,[rbx+rdi*1]
|
436 | |
WORD $0x8945; BYTE $0xd4 // mov r12d,r10d
|
437 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
438 | |
|
439 | |
// ROUND(BX, CX, DX, R8, R9, R10, R11, AX, R12, R13, R14, DI, R15, SP, 0xac)
|
440 | |
LONG $0xac248403; WORD $0x0000; BYTE $0x00 // add eax,[rsp+0xac]
|
441 | |
WORD $0x2145; BYTE $0xcc // and r12d,r9d
|
442 | |
LONG $0xf07b43c4; WORD $0x19e9 // rorx r13d,r9d,0x19
|
443 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
444 | |
LONG $0xf07bc3c4; WORD $0x0bf9 // rorx edi,r9d,0xb
|
445 | |
LONG $0x331c8d42 // lea ebx,[rbx+r14*1]
|
446 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
447 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
448 | |
LONG $0xf23042c4; BYTE $0xe3 // andn r12d,r9d,r11d
|
449 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
450 | |
LONG $0xf07b43c4; WORD $0x06f1 // rorx r14d,r9d,0x6
|
451 | |
LONG $0x004dc2c4; BYTE $0xf1 // vpshufb ymm6,ymm6,ymm9
|
452 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
453 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
454 | |
WORD $0xdf89 // mov edi,ebx
|
455 | |
LONG $0xcefef5c5 // vpaddd ymm1,ymm1,ymm6
|
456 | |
LONG $0xf07b63c4; WORD $0x16e3 // rorx r12d,ebx,0x16
|
457 | |
LONG $0x28048d42 // lea eax,[rax+r13*1]
|
458 | |
WORD $0xcf31 // xor edi,ecx
|
459 | |
LONG $0x75fef5c5; BYTE $0x20 // vpaddd ymm6,ymm1,[rbp+0x20]
|
460 | |
LONG $0xf07b63c4; WORD $0x0df3 // rorx r14d,ebx,0xd
|
461 | |
LONG $0xf07b63c4; WORD $0x02eb // rorx r13d,ebx,0x2
|
462 | |
LONG $0x00048d45 // lea r8d,[r8+rax*1]
|
463 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
464 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
465 | |
WORD $0x3141; BYTE $0xcf // xor r15d,ecx
|
466 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
467 | |
LONG $0x38048d42 // lea eax,[rax+r15*1]
|
468 | |
WORD $0x8945; BYTE $0xcc // mov r12d,r9d
|
469 | |
|
470 | |
LONG $0x747ffdc5; WORD $0x2024 // vmovdqa [rsp+0x20],ymm6
|
471 | |
|
472 | |
LONG $0x24648d48; BYTE $0xc0 // lea rsp,[rsp-0x40]
|
473 | |
LONG $0x0f65e3c4; WORD $0x04e2 // vpalignr ymm4,ymm3,ymm2,0x4
|
474 | |
|
475 | |
// ROUND(AX, BX, CX, DX, R8, R9, R10, R11, R12, R13, R14, R15, DI, SP, 0x80)
|
476 | |
LONG $0x249c0344; LONG $0x00000080 // add r11d,[rsp+0x80]
|
477 | |
WORD $0x2145; BYTE $0xc4 // and r12d,r8d
|
478 | |
LONG $0xf07b43c4; WORD $0x19e8 // rorx r13d,r8d,0x19
|
479 | |
LONG $0x0f75e3c4; WORD $0x04f8 // vpalignr ymm7,ymm1,ymm0,0x4
|
480 | |
LONG $0xf07b43c4; WORD $0x0bf8 // rorx r15d,r8d,0xb
|
481 | |
LONG $0x30048d42 // lea eax,[rax+r14*1]
|
482 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
483 | |
LONG $0xd472cdc5; BYTE $0x07 // vpsrld ymm6,ymm4,0x7
|
484 | |
LONG $0xf23842c4; BYTE $0xe2 // andn r12d,r8d,r10d
|
485 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
486 | |
LONG $0xf07b43c4; WORD $0x06f0 // rorx r14d,r8d,0x6
|
487 | |
LONG $0xd7feedc5 // vpaddd ymm2,ymm2,ymm7
|
488 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
489 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
490 | |
WORD $0x8941; BYTE $0xc7 // mov r15d,eax
|
491 | |
LONG $0xd472c5c5; BYTE $0x03 // vpsrld ymm7,ymm4,0x3
|
492 | |
LONG $0xf07b63c4; WORD $0x16e0 // rorx r12d,eax,0x16
|
493 | |
LONG $0x2b1c8d47 // lea r11d,[r11+r13*1]
|
494 | |
WORD $0x3141; BYTE $0xdf // xor r15d,ebx
|
495 | |
LONG $0xf472d5c5; BYTE $0x0e // vpslld ymm5,ymm4,0xe
|
496 | |
LONG $0xf07b63c4; WORD $0x0df0 // rorx r14d,eax,0xd
|
497 | |
LONG $0xf07b63c4; WORD $0x02e8 // rorx r13d,eax,0x2
|
498 | |
LONG $0x1a148d42 // lea edx,[rdx+r11*1]
|
499 | |
LONG $0xe6efc5c5 // vpxor ymm4,ymm7,ymm6
|
500 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
501 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
502 | |
WORD $0xdf31 // xor edi,ebx
|
503 | |
LONG $0xf970fdc5; BYTE $0xfa // vpshufd ymm7,ymm1,0xfa
|
504 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
505 | |
LONG $0x3b1c8d45 // lea r11d,[r11+rdi*1]
|
506 | |
WORD $0x8945; BYTE $0xc4 // mov r12d,r8d
|
507 | |
LONG $0xd672cdc5; BYTE $0x0b // vpsrld ymm6,ymm6,0xb
|
508 | |
|
509 | |
// ROUND(R11, AX, BX, CX, DX, R8, R9, R10, R12, R13, R14, DI, R15, SP, 0x84)
|
510 | |
LONG $0x24940344; LONG $0x00000084 // add r10d,[rsp+0x84]
|
511 | |
WORD $0x2141; BYTE $0xd4 // and r12d,edx
|
512 | |
LONG $0xf07b63c4; WORD $0x19ea // rorx r13d,edx,0x19
|
513 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
514 | |
LONG $0xf07be3c4; WORD $0x0bfa // rorx edi,edx,0xb
|
515 | |
LONG $0x331c8d47 // lea r11d,[r11+r14*1]
|
516 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
517 | |
LONG $0xf572d5c5; BYTE $0x0b // vpslld ymm5,ymm5,0xb
|
518 | |
LONG $0xf26842c4; BYTE $0xe1 // andn r12d,edx,r9d
|
519 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
520 | |
LONG $0xf07b63c4; WORD $0x06f2 // rorx r14d,edx,0x6
|
521 | |
LONG $0xe6efddc5 // vpxor ymm4,ymm4,ymm6
|
522 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
523 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
524 | |
WORD $0x8944; BYTE $0xdf // mov edi,r11d
|
525 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
526 | |
LONG $0xf07b43c4; WORD $0x16e3 // rorx r12d,r11d,0x16
|
527 | |
LONG $0x2a148d47 // lea r10d,[r10+r13*1]
|
528 | |
WORD $0xc731 // xor edi,eax
|
529 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
530 | |
LONG $0xf07b43c4; WORD $0x0df3 // rorx r14d,r11d,0xd
|
531 | |
LONG $0xf07b43c4; WORD $0x02eb // rorx r13d,r11d,0x2
|
532 | |
LONG $0x110c8d42 // lea ecx,[rcx+r10*1]
|
533 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
534 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
535 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
536 | |
WORD $0x3141; BYTE $0xc7 // xor r15d,eax
|
537 | |
LONG $0xd4feedc5 // vpaddd ymm2,ymm2,ymm4
|
538 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
539 | |
LONG $0x3a148d47 // lea r10d,[r10+r15*1]
|
540 | |
WORD $0x8941; BYTE $0xd4 // mov r12d,edx
|
541 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
542 | |
|
543 | |
// ROUND(R10, R11, AX, BX, CX, DX, R8, R9, R12, R13, R14, R15, DI, SP, 0x88)
|
544 | |
LONG $0x248c0344; LONG $0x00000088 // add r9d,[rsp+0x88]
|
545 | |
WORD $0x2141; BYTE $0xcc // and r12d,ecx
|
546 | |
LONG $0xf07b63c4; WORD $0x19e9 // rorx r13d,ecx,0x19
|
547 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
548 | |
LONG $0xf07b63c4; WORD $0x0bf9 // rorx r15d,ecx,0xb
|
549 | |
LONG $0x32148d47 // lea r10d,[r10+r14*1]
|
550 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
551 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
552 | |
LONG $0xf27042c4; BYTE $0xe0 // andn r12d,ecx,r8d
|
553 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
554 | |
LONG $0xf07b63c4; WORD $0x06f1 // rorx r14d,ecx,0x6
|
555 | |
LONG $0x004dc2c4; BYTE $0xf0 // vpshufb ymm6,ymm6,ymm8
|
556 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
557 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
558 | |
WORD $0x8945; BYTE $0xd7 // mov r15d,r10d
|
559 | |
LONG $0xd6feedc5 // vpaddd ymm2,ymm2,ymm6
|
560 | |
LONG $0xf07b43c4; WORD $0x16e2 // rorx r12d,r10d,0x16
|
561 | |
LONG $0x290c8d47 // lea r9d,[r9+r13*1]
|
562 | |
WORD $0x3145; BYTE $0xdf // xor r15d,r11d
|
563 | |
LONG $0xfa70fdc5; BYTE $0x50 // vpshufd ymm7,ymm2,0x50
|
564 | |
LONG $0xf07b43c4; WORD $0x0df2 // rorx r14d,r10d,0xd
|
565 | |
LONG $0xf07b43c4; WORD $0x02ea // rorx r13d,r10d,0x2
|
566 | |
LONG $0x0b1c8d42 // lea ebx,[rbx+r9*1]
|
567 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
568 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
569 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
570 | |
WORD $0x3144; BYTE $0xdf // xor edi,r11d
|
571 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
572 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
573 | |
LONG $0x390c8d45 // lea r9d,[r9+rdi*1]
|
574 | |
WORD $0x8941; BYTE $0xcc // mov r12d,ecx
|
575 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
576 | |
|
577 | |
// ROUND(R9, R10, R11, AX, BX, CX, DX, R8, R12, R13, R14, DI, R15, SP, 0x8c)
|
578 | |
LONG $0x24840344; LONG $0x0000008c // add r8d,[rsp+0x8c]
|
579 | |
WORD $0x2141; BYTE $0xdc // and r12d,ebx
|
580 | |
LONG $0xf07b63c4; WORD $0x19eb // rorx r13d,ebx,0x19
|
581 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
582 | |
LONG $0xf07be3c4; WORD $0x0bfb // rorx edi,ebx,0xb
|
583 | |
LONG $0x310c8d47 // lea r9d,[r9+r14*1]
|
584 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
585 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
586 | |
LONG $0xf26062c4; BYTE $0xe2 // andn r12d,ebx,edx
|
587 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
588 | |
LONG $0xf07b63c4; WORD $0x06f3 // rorx r14d,ebx,0x6
|
589 | |
LONG $0x004dc2c4; BYTE $0xf1 // vpshufb ymm6,ymm6,ymm9
|
590 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
591 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
592 | |
WORD $0x8944; BYTE $0xcf // mov edi,r9d
|
593 | |
LONG $0xd6feedc5 // vpaddd ymm2,ymm2,ymm6
|
594 | |
LONG $0xf07b43c4; WORD $0x16e1 // rorx r12d,r9d,0x16
|
595 | |
LONG $0x28048d47 // lea r8d,[r8+r13*1]
|
596 | |
WORD $0x3144; BYTE $0xd7 // xor edi,r10d
|
597 | |
LONG $0x75feedc5; BYTE $0x40 // vpaddd ymm6,ymm2,[rbp+0x40]
|
598 | |
LONG $0xf07b43c4; WORD $0x0df1 // rorx r14d,r9d,0xd
|
599 | |
LONG $0xf07b43c4; WORD $0x02e9 // rorx r13d,r9d,0x2
|
600 | |
LONG $0x00048d42 // lea eax,[rax+r8*1]
|
601 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
602 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
603 | |
WORD $0x3145; BYTE $0xd7 // xor r15d,r10d
|
604 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
605 | |
LONG $0x38048d47 // lea r8d,[r8+r15*1]
|
606 | |
WORD $0x8941; BYTE $0xdc // mov r12d,ebx
|
607 | |
|
608 | |
LONG $0x347ffdc5; BYTE $0x24 // vmovdqa [rsp],ymm6
|
609 | |
LONG $0x0f7de3c4; WORD $0x04e3 // vpalignr ymm4,ymm0,ymm3,0x4
|
610 | |
|
611 | |
// ROUND(R8, R9, R10, R11, AX, BX, CX, DX, R12, R13, R14, R15, DI, SP, 0xa0)
|
612 | |
LONG $0xa0249403; WORD $0x0000; BYTE $0x00 // add edx,[rsp+0xa0]
|
613 | |
WORD $0x2141; BYTE $0xc4 // and r12d,eax
|
614 | |
LONG $0xf07b63c4; WORD $0x19e8 // rorx r13d,eax,0x19
|
615 | |
LONG $0x0f6de3c4; WORD $0x04f9 // vpalignr ymm7,ymm2,ymm1,0x4
|
616 | |
LONG $0xf07b63c4; WORD $0x0bf8 // rorx r15d,eax,0xb
|
617 | |
LONG $0x30048d47 // lea r8d,[r8+r14*1]
|
618 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
619 | |
LONG $0xd472cdc5; BYTE $0x07 // vpsrld ymm6,ymm4,0x7
|
620 | |
LONG $0xf27862c4; BYTE $0xe1 // andn r12d,eax,ecx
|
621 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
622 | |
LONG $0xf07b63c4; WORD $0x06f0 // rorx r14d,eax,0x6
|
623 | |
LONG $0xdffee5c5 // vpaddd ymm3,ymm3,ymm7
|
624 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
625 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
626 | |
WORD $0x8945; BYTE $0xc7 // mov r15d,r8d
|
627 | |
LONG $0xd472c5c5; BYTE $0x03 // vpsrld ymm7,ymm4,0x3
|
628 | |
LONG $0xf07b43c4; WORD $0x16e0 // rorx r12d,r8d,0x16
|
629 | |
LONG $0x2a148d42 // lea edx,[rdx+r13*1]
|
630 | |
WORD $0x3145; BYTE $0xcf // xor r15d,r9d
|
631 | |
LONG $0xf472d5c5; BYTE $0x0e // vpslld ymm5,ymm4,0xe
|
632 | |
LONG $0xf07b43c4; WORD $0x0df0 // rorx r14d,r8d,0xd
|
633 | |
LONG $0xf07b43c4; WORD $0x02e8 // rorx r13d,r8d,0x2
|
634 | |
LONG $0x131c8d45 // lea r11d,[r11+rdx*1]
|
635 | |
LONG $0xe6efc5c5 // vpxor ymm4,ymm7,ymm6
|
636 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
637 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
638 | |
WORD $0x3144; BYTE $0xcf // xor edi,r9d
|
639 | |
LONG $0xfa70fdc5; BYTE $0xfa // vpshufd ymm7,ymm2,0xfa
|
640 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
641 | |
WORD $0x148d; BYTE $0x3a // lea edx,[rdx+rdi*1]
|
642 | |
WORD $0x8941; BYTE $0xc4 // mov r12d,eax
|
643 | |
LONG $0xd672cdc5; BYTE $0x0b // vpsrld ymm6,ymm6,0xb
|
644 | |
|
645 | |
// ROUND(DX, R8, R9, R10, R11, AX, BX, CX, R12, R13, R14, DI, R15, SP, 0xa4)
|
646 | |
LONG $0xa4248c03; WORD $0x0000; BYTE $0x00 // add ecx,[rsp+0xa4]
|
647 | |
WORD $0x2145; BYTE $0xdc // and r12d,r11d
|
648 | |
LONG $0xf07b43c4; WORD $0x19eb // rorx r13d,r11d,0x19
|
649 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
650 | |
LONG $0xf07bc3c4; WORD $0x0bfb // rorx edi,r11d,0xb
|
651 | |
LONG $0x32148d42 // lea edx,[rdx+r14*1]
|
652 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
653 | |
LONG $0xf572d5c5; BYTE $0x0b // vpslld ymm5,ymm5,0xb
|
654 | |
LONG $0xf22062c4; BYTE $0xe3 // andn r12d,r11d,ebx
|
655 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
656 | |
LONG $0xf07b43c4; WORD $0x06f3 // rorx r14d,r11d,0x6
|
657 | |
LONG $0xe6efddc5 // vpxor ymm4,ymm4,ymm6
|
658 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
659 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
660 | |
WORD $0xd789 // mov edi,edx
|
661 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
662 | |
LONG $0xf07b63c4; WORD $0x16e2 // rorx r12d,edx,0x16
|
663 | |
LONG $0x290c8d42 // lea ecx,[rcx+r13*1]
|
664 | |
WORD $0x3144; BYTE $0xc7 // xor edi,r8d
|
665 | |
LONG $0xe5efddc5 // vpxor ymm4,ymm4,ymm5
|
666 | |
LONG $0xf07b63c4; WORD $0x0df2 // rorx r14d,edx,0xd
|
667 | |
LONG $0xf07b63c4; WORD $0x02ea // rorx r13d,edx,0x2
|
668 | |
LONG $0x0a148d45 // lea r10d,[r10+rcx*1]
|
669 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
670 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
671 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
672 | |
WORD $0x3145; BYTE $0xc7 // xor r15d,r8d
|
673 | |
LONG $0xdcfee5c5 // vpaddd ymm3,ymm3,ymm4
|
674 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
675 | |
LONG $0x390c8d42 // lea ecx,[rcx+r15*1]
|
676 | |
WORD $0x8945; BYTE $0xdc // mov r12d,r11d
|
677 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
678 | |
|
679 | |
// ROUND(CX, DX, R8, R9, R10, R11, AX, BX, R12, R13, R14, R15, DI, SP, 0xa8)
|
680 | |
LONG $0xa8249c03; WORD $0x0000; BYTE $0x00 // add ebx,[rsp+0xa8]
|
681 | |
WORD $0x2145; BYTE $0xd4 // and r12d,r10d
|
682 | |
LONG $0xf07b43c4; WORD $0x19ea // rorx r13d,r10d,0x19
|
683 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
684 | |
LONG $0xf07b43c4; WORD $0x0bfa // rorx r15d,r10d,0xb
|
685 | |
LONG $0x310c8d42 // lea ecx,[rcx+r14*1]
|
686 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
687 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
688 | |
LONG $0xf22862c4; BYTE $0xe0 // andn r12d,r10d,eax
|
689 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
690 | |
LONG $0xf07b43c4; WORD $0x06f2 // rorx r14d,r10d,0x6
|
691 | |
LONG $0x004dc2c4; BYTE $0xf0 // vpshufb ymm6,ymm6,ymm8
|
692 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
693 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
694 | |
WORD $0x8941; BYTE $0xcf // mov r15d,ecx
|
695 | |
LONG $0xdefee5c5 // vpaddd ymm3,ymm3,ymm6
|
696 | |
LONG $0xf07b63c4; WORD $0x16e1 // rorx r12d,ecx,0x16
|
697 | |
LONG $0x2b1c8d42 // lea ebx,[rbx+r13*1]
|
698 | |
WORD $0x3141; BYTE $0xd7 // xor r15d,edx
|
699 | |
LONG $0xfb70fdc5; BYTE $0x50 // vpshufd ymm7,ymm3,0x50
|
700 | |
LONG $0xf07b63c4; WORD $0x0df1 // rorx r14d,ecx,0xd
|
701 | |
LONG $0xf07b63c4; WORD $0x02e9 // rorx r13d,ecx,0x2
|
702 | |
LONG $0x190c8d45 // lea r9d,[r9+rbx*1]
|
703 | |
LONG $0xd772cdc5; BYTE $0x0a // vpsrld ymm6,ymm7,0xa
|
704 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
705 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
706 | |
WORD $0xd731 // xor edi,edx
|
707 | |
LONG $0xd773c5c5; BYTE $0x11 // vpsrlq ymm7,ymm7,0x11
|
708 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
709 | |
WORD $0x1c8d; BYTE $0x3b // lea ebx,[rbx+rdi*1]
|
710 | |
WORD $0x8945; BYTE $0xd4 // mov r12d,r10d
|
711 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
712 | |
|
713 | |
// ROUND(BX, CX, DX, R8, R9, R10, R11, AX, R12, R13, R14, DI, R15, SP, 0xac)
|
714 | |
LONG $0xac248403; WORD $0x0000; BYTE $0x00 // add eax,[rsp+0xac]
|
715 | |
WORD $0x2145; BYTE $0xcc // and r12d,r9d
|
716 | |
LONG $0xf07b43c4; WORD $0x19e9 // rorx r13d,r9d,0x19
|
717 | |
LONG $0xd773c5c5; BYTE $0x02 // vpsrlq ymm7,ymm7,0x2
|
718 | |
LONG $0xf07bc3c4; WORD $0x0bf9 // rorx edi,r9d,0xb
|
719 | |
LONG $0x331c8d42 // lea ebx,[rbx+r14*1]
|
720 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
721 | |
LONG $0xf7efcdc5 // vpxor ymm6,ymm6,ymm7
|
722 | |
LONG $0xf23042c4; BYTE $0xe3 // andn r12d,r9d,r11d
|
723 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
724 | |
LONG $0xf07b43c4; WORD $0x06f1 // rorx r14d,r9d,0x6
|
725 | |
LONG $0x004dc2c4; BYTE $0xf1 // vpshufb ymm6,ymm6,ymm9
|
726 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
727 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
728 | |
WORD $0xdf89 // mov edi,ebx
|
729 | |
LONG $0xdefee5c5 // vpaddd ymm3,ymm3,ymm6
|
730 | |
LONG $0xf07b63c4; WORD $0x16e3 // rorx r12d,ebx,0x16
|
731 | |
LONG $0x28048d42 // lea eax,[rax+r13*1]
|
732 | |
WORD $0xcf31 // xor edi,ecx
|
733 | |
LONG $0x75fee5c5; BYTE $0x60 // vpaddd ymm6,ymm3,[rbp+0x60]
|
734 | |
LONG $0xf07b63c4; WORD $0x0df3 // rorx r14d,ebx,0xd
|
735 | |
LONG $0xf07b63c4; WORD $0x02eb // rorx r13d,ebx,0x2
|
736 | |
LONG $0x00048d45 // lea r8d,[r8+rax*1]
|
737 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
738 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
739 | |
WORD $0x3141; BYTE $0xcf // xor r15d,ecx
|
740 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
741 | |
LONG $0x38048d42 // lea eax,[rax+r15*1]
|
742 | |
WORD $0x8945; BYTE $0xcc // mov r12d,r9d
|
743 | |
|
744 | |
LONG $0x747ffdc5; WORD $0x2024 // vmovdqa [rsp+0x20],ymm6
|
745 | |
ADDQ $0x80, BP
|
746 | |
|
747 | |
CMPB 0x3(BP), $0x0
|
748 | |
JNE loop1
|
749 | |
|
750 | |
// ROUND(AX, BX, CX, DX, R8, R9, R10, R11, R12, R13, R14, R15, DI, SP, 0x40)
|
751 | |
LONG $0x245c0344; BYTE $0x40 // add r11d,[rsp+0x40]
|
752 | |
WORD $0x2145; BYTE $0xc4 // and r12d,r8d
|
753 | |
LONG $0xf07b43c4; WORD $0x19e8 // rorx r13d,r8d,0x19
|
754 | |
LONG $0xf07b43c4; WORD $0x0bf8 // rorx r15d,r8d,0xb
|
755 | |
LONG $0x30048d42 // lea eax,[rax+r14*1]
|
756 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
757 | |
LONG $0xf23842c4; BYTE $0xe2 // andn r12d,r8d,r10d
|
758 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
759 | |
LONG $0xf07b43c4; WORD $0x06f0 // rorx r14d,r8d,0x6
|
760 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
761 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
762 | |
WORD $0x8941; BYTE $0xc7 // mov r15d,eax
|
763 | |
LONG $0xf07b63c4; WORD $0x16e0 // rorx r12d,eax,0x16
|
764 | |
LONG $0x2b1c8d47 // lea r11d,[r11+r13*1]
|
765 | |
WORD $0x3141; BYTE $0xdf // xor r15d,ebx
|
766 | |
LONG $0xf07b63c4; WORD $0x0df0 // rorx r14d,eax,0xd
|
767 | |
LONG $0xf07b63c4; WORD $0x02e8 // rorx r13d,eax,0x2
|
768 | |
LONG $0x1a148d42 // lea edx,[rdx+r11*1]
|
769 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
770 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
771 | |
WORD $0xdf31 // xor edi,ebx
|
772 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
773 | |
LONG $0x3b1c8d45 // lea r11d,[r11+rdi*1]
|
774 | |
WORD $0x8945; BYTE $0xc4 // mov r12d,r8d
|
775 | |
|
776 | |
// ROUND(R11, AX, BX, CX, DX, R8, R9, R10, R12, R13, R14, DI, R15, SP, 0x44)
|
777 | |
LONG $0x24540344; BYTE $0x44 // add r10d,[rsp+0x44]
|
778 | |
WORD $0x2141; BYTE $0xd4 // and r12d,edx
|
779 | |
LONG $0xf07b63c4; WORD $0x19ea // rorx r13d,edx,0x19
|
780 | |
LONG $0xf07be3c4; WORD $0x0bfa // rorx edi,edx,0xb
|
781 | |
LONG $0x331c8d47 // lea r11d,[r11+r14*1]
|
782 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
783 | |
LONG $0xf26842c4; BYTE $0xe1 // andn r12d,edx,r9d
|
784 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
785 | |
LONG $0xf07b63c4; WORD $0x06f2 // rorx r14d,edx,0x6
|
786 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
787 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
788 | |
WORD $0x8944; BYTE $0xdf // mov edi,r11d
|
789 | |
LONG $0xf07b43c4; WORD $0x16e3 // rorx r12d,r11d,0x16
|
790 | |
LONG $0x2a148d47 // lea r10d,[r10+r13*1]
|
791 | |
WORD $0xc731 // xor edi,eax
|
792 | |
LONG $0xf07b43c4; WORD $0x0df3 // rorx r14d,r11d,0xd
|
793 | |
LONG $0xf07b43c4; WORD $0x02eb // rorx r13d,r11d,0x2
|
794 | |
LONG $0x110c8d42 // lea ecx,[rcx+r10*1]
|
795 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
796 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
797 | |
WORD $0x3141; BYTE $0xc7 // xor r15d,eax
|
798 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
799 | |
LONG $0x3a148d47 // lea r10d,[r10+r15*1]
|
800 | |
WORD $0x8941; BYTE $0xd4 // mov r12d,edx
|
801 | |
|
802 | |
// ROUND(R10, R11, AX, BX, CX, DX, R8, R9, R12, R13, R14, R15, DI, SP, 0x48)
|
803 | |
LONG $0x244c0344; BYTE $0x48 // add r9d,[rsp+0x48]
|
804 | |
WORD $0x2141; BYTE $0xcc // and r12d,ecx
|
805 | |
LONG $0xf07b63c4; WORD $0x19e9 // rorx r13d,ecx,0x19
|
806 | |
LONG $0xf07b63c4; WORD $0x0bf9 // rorx r15d,ecx,0xb
|
807 | |
LONG $0x32148d47 // lea r10d,[r10+r14*1]
|
808 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
809 | |
LONG $0xf27042c4; BYTE $0xe0 // andn r12d,ecx,r8d
|
810 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
811 | |
LONG $0xf07b63c4; WORD $0x06f1 // rorx r14d,ecx,0x6
|
812 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
813 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
814 | |
WORD $0x8945; BYTE $0xd7 // mov r15d,r10d
|
815 | |
LONG $0xf07b43c4; WORD $0x16e2 // rorx r12d,r10d,0x16
|
816 | |
LONG $0x290c8d47 // lea r9d,[r9+r13*1]
|
817 | |
WORD $0x3145; BYTE $0xdf // xor r15d,r11d
|
818 | |
LONG $0xf07b43c4; WORD $0x0df2 // rorx r14d,r10d,0xd
|
819 | |
LONG $0xf07b43c4; WORD $0x02ea // rorx r13d,r10d,0x2
|
820 | |
LONG $0x0b1c8d42 // lea ebx,[rbx+r9*1]
|
821 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
822 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
823 | |
WORD $0x3144; BYTE $0xdf // xor edi,r11d
|
824 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
825 | |
LONG $0x390c8d45 // lea r9d,[r9+rdi*1]
|
826 | |
WORD $0x8941; BYTE $0xcc // mov r12d,ecx
|
827 | |
|
828 | |
// ROUND(R9, R10, R11, AX, BX, CX, DX, R8, R12, R13, R14, DI, R15, SP, 0x4c)
|
829 | |
LONG $0x24440344; BYTE $0x4c // add r8d,[rsp+0x4c]
|
830 | |
WORD $0x2141; BYTE $0xdc // and r12d,ebx
|
831 | |
LONG $0xf07b63c4; WORD $0x19eb // rorx r13d,ebx,0x19
|
832 | |
LONG $0xf07be3c4; WORD $0x0bfb // rorx edi,ebx,0xb
|
833 | |
LONG $0x310c8d47 // lea r9d,[r9+r14*1]
|
834 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
835 | |
LONG $0xf26062c4; BYTE $0xe2 // andn r12d,ebx,edx
|
836 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
837 | |
LONG $0xf07b63c4; WORD $0x06f3 // rorx r14d,ebx,0x6
|
838 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
839 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
840 | |
WORD $0x8944; BYTE $0xcf // mov edi,r9d
|
841 | |
LONG $0xf07b43c4; WORD $0x16e1 // rorx r12d,r9d,0x16
|
842 | |
LONG $0x28048d47 // lea r8d,[r8+r13*1]
|
843 | |
WORD $0x3144; BYTE $0xd7 // xor edi,r10d
|
844 | |
LONG $0xf07b43c4; WORD $0x0df1 // rorx r14d,r9d,0xd
|
845 | |
LONG $0xf07b43c4; WORD $0x02e9 // rorx r13d,r9d,0x2
|
846 | |
LONG $0x00048d42 // lea eax,[rax+r8*1]
|
847 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
848 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
849 | |
WORD $0x3145; BYTE $0xd7 // xor r15d,r10d
|
850 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
851 | |
LONG $0x38048d47 // lea r8d,[r8+r15*1]
|
852 | |
WORD $0x8941; BYTE $0xdc // mov r12d,ebx
|
853 | |
|
854 | |
// ROUND(R8, R9, R10, R11, AX, BX, CX, DX, R12, R13, R14, R15, DI, SP, 0x60)
|
855 | |
LONG $0x60245403 // add edx,[rsp+0x60]
|
856 | |
WORD $0x2141; BYTE $0xc4 // and r12d,eax
|
857 | |
LONG $0xf07b63c4; WORD $0x19e8 // rorx r13d,eax,0x19
|
858 | |
LONG $0xf07b63c4; WORD $0x0bf8 // rorx r15d,eax,0xb
|
859 | |
LONG $0x30048d47 // lea r8d,[r8+r14*1]
|
860 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
861 | |
LONG $0xf27862c4; BYTE $0xe1 // andn r12d,eax,ecx
|
862 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
863 | |
LONG $0xf07b63c4; WORD $0x06f0 // rorx r14d,eax,0x6
|
864 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
865 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
866 | |
WORD $0x8945; BYTE $0xc7 // mov r15d,r8d
|
867 | |
LONG $0xf07b43c4; WORD $0x16e0 // rorx r12d,r8d,0x16
|
868 | |
LONG $0x2a148d42 // lea edx,[rdx+r13*1]
|
869 | |
WORD $0x3145; BYTE $0xcf // xor r15d,r9d
|
870 | |
LONG $0xf07b43c4; WORD $0x0df0 // rorx r14d,r8d,0xd
|
871 | |
LONG $0xf07b43c4; WORD $0x02e8 // rorx r13d,r8d,0x2
|
872 | |
LONG $0x131c8d45 // lea r11d,[r11+rdx*1]
|
873 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
874 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
875 | |
WORD $0x3144; BYTE $0xcf // xor edi,r9d
|
876 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
877 | |
WORD $0x148d; BYTE $0x3a // lea edx,[rdx+rdi*1]
|
878 | |
WORD $0x8941; BYTE $0xc4 // mov r12d,eax
|
879 | |
|
880 | |
// ROUND(DX, R8, R9, R10, R11, AX, BX, CX, R12, R13, R14, DI, R15, SP, 0x64)
|
881 | |
LONG $0x64244c03 // add ecx,[rsp+0x64]
|
882 | |
WORD $0x2145; BYTE $0xdc // and r12d,r11d
|
883 | |
LONG $0xf07b43c4; WORD $0x19eb // rorx r13d,r11d,0x19
|
884 | |
LONG $0xf07bc3c4; WORD $0x0bfb // rorx edi,r11d,0xb
|
885 | |
LONG $0x32148d42 // lea edx,[rdx+r14*1]
|
886 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
887 | |
LONG $0xf22062c4; BYTE $0xe3 // andn r12d,r11d,ebx
|
888 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
889 | |
LONG $0xf07b43c4; WORD $0x06f3 // rorx r14d,r11d,0x6
|
890 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
891 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
892 | |
WORD $0xd789 // mov edi,edx
|
893 | |
LONG $0xf07b63c4; WORD $0x16e2 // rorx r12d,edx,0x16
|
894 | |
LONG $0x290c8d42 // lea ecx,[rcx+r13*1]
|
895 | |
WORD $0x3144; BYTE $0xc7 // xor edi,r8d
|
896 | |
LONG $0xf07b63c4; WORD $0x0df2 // rorx r14d,edx,0xd
|
897 | |
LONG $0xf07b63c4; WORD $0x02ea // rorx r13d,edx,0x2
|
898 | |
LONG $0x0a148d45 // lea r10d,[r10+rcx*1]
|
899 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
900 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
901 | |
WORD $0x3145; BYTE $0xc7 // xor r15d,r8d
|
902 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
903 | |
LONG $0x390c8d42 // lea ecx,[rcx+r15*1]
|
904 | |
WORD $0x8945; BYTE $0xdc // mov r12d,r11d
|
905 | |
|
906 | |
// ROUND(CX, DX, R8, R9, R10, R11, AX, BX, R12, R13, R14, R15, DI, SP, 0x68)
|
907 | |
LONG $0x68245c03 // add ebx,[rsp+0x68]
|
908 | |
WORD $0x2145; BYTE $0xd4 // and r12d,r10d
|
909 | |
LONG $0xf07b43c4; WORD $0x19ea // rorx r13d,r10d,0x19
|
910 | |
LONG $0xf07b43c4; WORD $0x0bfa // rorx r15d,r10d,0xb
|
911 | |
LONG $0x310c8d42 // lea ecx,[rcx+r14*1]
|
912 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
913 | |
LONG $0xf22862c4; BYTE $0xe0 // andn r12d,r10d,eax
|
914 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
915 | |
LONG $0xf07b43c4; WORD $0x06f2 // rorx r14d,r10d,0x6
|
916 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
917 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
918 | |
WORD $0x8941; BYTE $0xcf // mov r15d,ecx
|
919 | |
LONG $0xf07b63c4; WORD $0x16e1 // rorx r12d,ecx,0x16
|
920 | |
LONG $0x2b1c8d42 // lea ebx,[rbx+r13*1]
|
921 | |
WORD $0x3141; BYTE $0xd7 // xor r15d,edx
|
922 | |
LONG $0xf07b63c4; WORD $0x0df1 // rorx r14d,ecx,0xd
|
923 | |
LONG $0xf07b63c4; WORD $0x02e9 // rorx r13d,ecx,0x2
|
924 | |
LONG $0x190c8d45 // lea r9d,[r9+rbx*1]
|
925 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
926 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
927 | |
WORD $0xd731 // xor edi,edx
|
928 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
929 | |
WORD $0x1c8d; BYTE $0x3b // lea ebx,[rbx+rdi*1]
|
930 | |
WORD $0x8945; BYTE $0xd4 // mov r12d,r10d
|
931 | |
|
932 | |
// ROUND(BX, CX, DX, R8, R9, R10, R11, AX, R12, R13, R14, DI, R15, SP, 0x6c)
|
933 | |
LONG $0x6c244403 // add eax,[rsp+0x6c]
|
934 | |
WORD $0x2145; BYTE $0xcc // and r12d,r9d
|
935 | |
LONG $0xf07b43c4; WORD $0x19e9 // rorx r13d,r9d,0x19
|
936 | |
LONG $0xf07bc3c4; WORD $0x0bf9 // rorx edi,r9d,0xb
|
937 | |
LONG $0x331c8d42 // lea ebx,[rbx+r14*1]
|
938 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
939 | |
LONG $0xf23042c4; BYTE $0xe3 // andn r12d,r9d,r11d
|
940 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
941 | |
LONG $0xf07b43c4; WORD $0x06f1 // rorx r14d,r9d,0x6
|
942 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
943 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
944 | |
WORD $0xdf89 // mov edi,ebx
|
945 | |
LONG $0xf07b63c4; WORD $0x16e3 // rorx r12d,ebx,0x16
|
946 | |
LONG $0x28048d42 // lea eax,[rax+r13*1]
|
947 | |
WORD $0xcf31 // xor edi,ecx
|
948 | |
LONG $0xf07b63c4; WORD $0x0df3 // rorx r14d,ebx,0xd
|
949 | |
LONG $0xf07b63c4; WORD $0x02eb // rorx r13d,ebx,0x2
|
950 | |
LONG $0x00048d45 // lea r8d,[r8+rax*1]
|
951 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
952 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
953 | |
WORD $0x3141; BYTE $0xcf // xor r15d,ecx
|
954 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
955 | |
LONG $0x38048d42 // lea eax,[rax+r15*1]
|
956 | |
WORD $0x8945; BYTE $0xcc // mov r12d,r9d
|
957 | |
|
958 | |
// ROUND(AX, BX, CX, DX, R8, R9, R10, R11, R12, R13, R14, R15, DI, SP, 0x00)
|
959 | |
LONG $0x241c0344 // add r11d,[rsp]
|
960 | |
WORD $0x2145; BYTE $0xc4 // and r12d,r8d
|
961 | |
LONG $0xf07b43c4; WORD $0x19e8 // rorx r13d,r8d,0x19
|
962 | |
LONG $0xf07b43c4; WORD $0x0bf8 // rorx r15d,r8d,0xb
|
963 | |
LONG $0x30048d42 // lea eax,[rax+r14*1]
|
964 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
965 | |
LONG $0xf23842c4; BYTE $0xe2 // andn r12d,r8d,r10d
|
966 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
967 | |
LONG $0xf07b43c4; WORD $0x06f0 // rorx r14d,r8d,0x6
|
968 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
969 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
970 | |
WORD $0x8941; BYTE $0xc7 // mov r15d,eax
|
971 | |
LONG $0xf07b63c4; WORD $0x16e0 // rorx r12d,eax,0x16
|
972 | |
LONG $0x2b1c8d47 // lea r11d,[r11+r13*1]
|
973 | |
WORD $0x3141; BYTE $0xdf // xor r15d,ebx
|
974 | |
LONG $0xf07b63c4; WORD $0x0df0 // rorx r14d,eax,0xd
|
975 | |
LONG $0xf07b63c4; WORD $0x02e8 // rorx r13d,eax,0x2
|
976 | |
LONG $0x1a148d42 // lea edx,[rdx+r11*1]
|
977 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
978 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
979 | |
WORD $0xdf31 // xor edi,ebx
|
980 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
981 | |
LONG $0x3b1c8d45 // lea r11d,[r11+rdi*1]
|
982 | |
WORD $0x8945; BYTE $0xc4 // mov r12d,r8d
|
983 | |
|
984 | |
// ROUND(R11, AX, BX, CX, DX, R8, R9, R10, R12, R13, R14, DI, R15, SP, 0x04)
|
985 | |
LONG $0x24540344; BYTE $0x04 // add r10d,[rsp+0x4]
|
986 | |
WORD $0x2141; BYTE $0xd4 // and r12d,edx
|
987 | |
LONG $0xf07b63c4; WORD $0x19ea // rorx r13d,edx,0x19
|
988 | |
LONG $0xf07be3c4; WORD $0x0bfa // rorx edi,edx,0xb
|
989 | |
LONG $0x331c8d47 // lea r11d,[r11+r14*1]
|
990 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
991 | |
LONG $0xf26842c4; BYTE $0xe1 // andn r12d,edx,r9d
|
992 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
993 | |
LONG $0xf07b63c4; WORD $0x06f2 // rorx r14d,edx,0x6
|
994 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
995 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
996 | |
WORD $0x8944; BYTE $0xdf // mov edi,r11d
|
997 | |
LONG $0xf07b43c4; WORD $0x16e3 // rorx r12d,r11d,0x16
|
998 | |
LONG $0x2a148d47 // lea r10d,[r10+r13*1]
|
999 | |
WORD $0xc731 // xor edi,eax
|
1000 | |
LONG $0xf07b43c4; WORD $0x0df3 // rorx r14d,r11d,0xd
|
1001 | |
LONG $0xf07b43c4; WORD $0x02eb // rorx r13d,r11d,0x2
|
1002 | |
LONG $0x110c8d42 // lea ecx,[rcx+r10*1]
|
1003 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1004 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1005 | |
WORD $0x3141; BYTE $0xc7 // xor r15d,eax
|
1006 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1007 | |
LONG $0x3a148d47 // lea r10d,[r10+r15*1]
|
1008 | |
WORD $0x8941; BYTE $0xd4 // mov r12d,edx
|
1009 | |
|
1010 | |
// ROUND(R10, R11, AX, BX, CX, DX, R8, R9, R12, R13, R14, R15, DI, SP, 0x08)
|
1011 | |
LONG $0x244c0344; BYTE $0x08 // add r9d,[rsp+0x8]
|
1012 | |
WORD $0x2141; BYTE $0xcc // and r12d,ecx
|
1013 | |
LONG $0xf07b63c4; WORD $0x19e9 // rorx r13d,ecx,0x19
|
1014 | |
LONG $0xf07b63c4; WORD $0x0bf9 // rorx r15d,ecx,0xb
|
1015 | |
LONG $0x32148d47 // lea r10d,[r10+r14*1]
|
1016 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
1017 | |
LONG $0xf27042c4; BYTE $0xe0 // andn r12d,ecx,r8d
|
1018 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1019 | |
LONG $0xf07b63c4; WORD $0x06f1 // rorx r14d,ecx,0x6
|
1020 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
1021 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1022 | |
WORD $0x8945; BYTE $0xd7 // mov r15d,r10d
|
1023 | |
LONG $0xf07b43c4; WORD $0x16e2 // rorx r12d,r10d,0x16
|
1024 | |
LONG $0x290c8d47 // lea r9d,[r9+r13*1]
|
1025 | |
WORD $0x3145; BYTE $0xdf // xor r15d,r11d
|
1026 | |
LONG $0xf07b43c4; WORD $0x0df2 // rorx r14d,r10d,0xd
|
1027 | |
LONG $0xf07b43c4; WORD $0x02ea // rorx r13d,r10d,0x2
|
1028 | |
LONG $0x0b1c8d42 // lea ebx,[rbx+r9*1]
|
1029 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1030 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1031 | |
WORD $0x3144; BYTE $0xdf // xor edi,r11d
|
1032 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1033 | |
LONG $0x390c8d45 // lea r9d,[r9+rdi*1]
|
1034 | |
WORD $0x8941; BYTE $0xcc // mov r12d,ecx
|
1035 | |
|
1036 | |
// ROUND(R9, R10, R11, AX, BX, CX, DX, R8, R12, R13, R14, DI, R15, SP, 0x0c)
|
1037 | |
LONG $0x24440344; BYTE $0x0c // add r8d,[rsp+0xc]
|
1038 | |
WORD $0x2141; BYTE $0xdc // and r12d,ebx
|
1039 | |
LONG $0xf07b63c4; WORD $0x19eb // rorx r13d,ebx,0x19
|
1040 | |
LONG $0xf07be3c4; WORD $0x0bfb // rorx edi,ebx,0xb
|
1041 | |
LONG $0x310c8d47 // lea r9d,[r9+r14*1]
|
1042 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
1043 | |
LONG $0xf26062c4; BYTE $0xe2 // andn r12d,ebx,edx
|
1044 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1045 | |
LONG $0xf07b63c4; WORD $0x06f3 // rorx r14d,ebx,0x6
|
1046 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
1047 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1048 | |
WORD $0x8944; BYTE $0xcf // mov edi,r9d
|
1049 | |
LONG $0xf07b43c4; WORD $0x16e1 // rorx r12d,r9d,0x16
|
1050 | |
LONG $0x28048d47 // lea r8d,[r8+r13*1]
|
1051 | |
WORD $0x3144; BYTE $0xd7 // xor edi,r10d
|
1052 | |
LONG $0xf07b43c4; WORD $0x0df1 // rorx r14d,r9d,0xd
|
1053 | |
LONG $0xf07b43c4; WORD $0x02e9 // rorx r13d,r9d,0x2
|
1054 | |
LONG $0x00048d42 // lea eax,[rax+r8*1]
|
1055 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1056 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1057 | |
WORD $0x3145; BYTE $0xd7 // xor r15d,r10d
|
1058 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1059 | |
LONG $0x38048d47 // lea r8d,[r8+r15*1]
|
1060 | |
WORD $0x8941; BYTE $0xdc // mov r12d,ebx
|
1061 | |
|
1062 | |
// ROUND(R8, R9, R10, R11, AX, BX, CX, DX, R12, R13, R14, R15, DI, SP, 0x20)
|
1063 | |
LONG $0x20245403 // add edx,[rsp+0x20]
|
1064 | |
WORD $0x2141; BYTE $0xc4 // and r12d,eax
|
1065 | |
LONG $0xf07b63c4; WORD $0x19e8 // rorx r13d,eax,0x19
|
1066 | |
LONG $0xf07b63c4; WORD $0x0bf8 // rorx r15d,eax,0xb
|
1067 | |
LONG $0x30048d47 // lea r8d,[r8+r14*1]
|
1068 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
1069 | |
LONG $0xf27862c4; BYTE $0xe1 // andn r12d,eax,ecx
|
1070 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1071 | |
LONG $0xf07b63c4; WORD $0x06f0 // rorx r14d,eax,0x6
|
1072 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
1073 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1074 | |
WORD $0x8945; BYTE $0xc7 // mov r15d,r8d
|
1075 | |
LONG $0xf07b43c4; WORD $0x16e0 // rorx r12d,r8d,0x16
|
1076 | |
LONG $0x2a148d42 // lea edx,[rdx+r13*1]
|
1077 | |
WORD $0x3145; BYTE $0xcf // xor r15d,r9d
|
1078 | |
LONG $0xf07b43c4; WORD $0x0df0 // rorx r14d,r8d,0xd
|
1079 | |
LONG $0xf07b43c4; WORD $0x02e8 // rorx r13d,r8d,0x2
|
1080 | |
LONG $0x131c8d45 // lea r11d,[r11+rdx*1]
|
1081 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1082 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1083 | |
WORD $0x3144; BYTE $0xcf // xor edi,r9d
|
1084 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1085 | |
WORD $0x148d; BYTE $0x3a // lea edx,[rdx+rdi*1]
|
1086 | |
WORD $0x8941; BYTE $0xc4 // mov r12d,eax
|
1087 | |
|
1088 | |
// ROUND(DX, R8, R9, R10, R11, AX, BX, CX, R12, R13, R14, DI, R15, SP, 0x24)
|
1089 | |
LONG $0x24244c03 // add ecx,[rsp+0x24]
|
1090 | |
WORD $0x2145; BYTE $0xdc // and r12d,r11d
|
1091 | |
LONG $0xf07b43c4; WORD $0x19eb // rorx r13d,r11d,0x19
|
1092 | |
LONG $0xf07bc3c4; WORD $0x0bfb // rorx edi,r11d,0xb
|
1093 | |
LONG $0x32148d42 // lea edx,[rdx+r14*1]
|
1094 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
1095 | |
LONG $0xf22062c4; BYTE $0xe3 // andn r12d,r11d,ebx
|
1096 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1097 | |
LONG $0xf07b43c4; WORD $0x06f3 // rorx r14d,r11d,0x6
|
1098 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
1099 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1100 | |
WORD $0xd789 // mov edi,edx
|
1101 | |
LONG $0xf07b63c4; WORD $0x16e2 // rorx r12d,edx,0x16
|
1102 | |
LONG $0x290c8d42 // lea ecx,[rcx+r13*1]
|
1103 | |
WORD $0x3144; BYTE $0xc7 // xor edi,r8d
|
1104 | |
LONG $0xf07b63c4; WORD $0x0df2 // rorx r14d,edx,0xd
|
1105 | |
LONG $0xf07b63c4; WORD $0x02ea // rorx r13d,edx,0x2
|
1106 | |
LONG $0x0a148d45 // lea r10d,[r10+rcx*1]
|
1107 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1108 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1109 | |
WORD $0x3145; BYTE $0xc7 // xor r15d,r8d
|
1110 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1111 | |
LONG $0x390c8d42 // lea ecx,[rcx+r15*1]
|
1112 | |
WORD $0x8945; BYTE $0xdc // mov r12d,r11d
|
1113 | |
|
1114 | |
// ROUND(CX, DX, R8, R9, R10, R11, AX, BX, R12, R13, R14, R15, DI, SP, 0x28)
|
1115 | |
LONG $0x28245c03 // add ebx,[rsp+0x28]
|
1116 | |
WORD $0x2145; BYTE $0xd4 // and r12d,r10d
|
1117 | |
LONG $0xf07b43c4; WORD $0x19ea // rorx r13d,r10d,0x19
|
1118 | |
LONG $0xf07b43c4; WORD $0x0bfa // rorx r15d,r10d,0xb
|
1119 | |
LONG $0x310c8d42 // lea ecx,[rcx+r14*1]
|
1120 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
1121 | |
LONG $0xf22862c4; BYTE $0xe0 // andn r12d,r10d,eax
|
1122 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1123 | |
LONG $0xf07b43c4; WORD $0x06f2 // rorx r14d,r10d,0x6
|
1124 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
1125 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1126 | |
WORD $0x8941; BYTE $0xcf // mov r15d,ecx
|
1127 | |
LONG $0xf07b63c4; WORD $0x16e1 // rorx r12d,ecx,0x16
|
1128 | |
LONG $0x2b1c8d42 // lea ebx,[rbx+r13*1]
|
1129 | |
WORD $0x3141; BYTE $0xd7 // xor r15d,edx
|
1130 | |
LONG $0xf07b63c4; WORD $0x0df1 // rorx r14d,ecx,0xd
|
1131 | |
LONG $0xf07b63c4; WORD $0x02e9 // rorx r13d,ecx,0x2
|
1132 | |
LONG $0x190c8d45 // lea r9d,[r9+rbx*1]
|
1133 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1134 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1135 | |
WORD $0xd731 // xor edi,edx
|
1136 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1137 | |
WORD $0x1c8d; BYTE $0x3b // lea ebx,[rbx+rdi*1]
|
1138 | |
WORD $0x8945; BYTE $0xd4 // mov r12d,r10d
|
1139 | |
|
1140 | |
// ROUND(BX, CX, DX, R8, R9, R10, R11, AX, R12, R13, R14, DI, R15, SP, 0x2c)
|
1141 | |
LONG $0x2c244403 // add eax,[rsp+0x2c]
|
1142 | |
WORD $0x2145; BYTE $0xcc // and r12d,r9d
|
1143 | |
LONG $0xf07b43c4; WORD $0x19e9 // rorx r13d,r9d,0x19
|
1144 | |
LONG $0xf07bc3c4; WORD $0x0bf9 // rorx edi,r9d,0xb
|
1145 | |
LONG $0x331c8d42 // lea ebx,[rbx+r14*1]
|
1146 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
1147 | |
LONG $0xf23042c4; BYTE $0xe3 // andn r12d,r9d,r11d
|
1148 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1149 | |
LONG $0xf07b43c4; WORD $0x06f1 // rorx r14d,r9d,0x6
|
1150 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
1151 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1152 | |
WORD $0xdf89 // mov edi,ebx
|
1153 | |
LONG $0xf07b63c4; WORD $0x16e3 // rorx r12d,ebx,0x16
|
1154 | |
LONG $0x28048d42 // lea eax,[rax+r13*1]
|
1155 | |
WORD $0xcf31 // xor edi,ecx
|
1156 | |
LONG $0xf07b63c4; WORD $0x0df3 // rorx r14d,ebx,0xd
|
1157 | |
LONG $0xf07b63c4; WORD $0x02eb // rorx r13d,ebx,0x2
|
1158 | |
LONG $0x00048d45 // lea r8d,[r8+rax*1]
|
1159 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1160 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1161 | |
WORD $0x3141; BYTE $0xcf // xor r15d,ecx
|
1162 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1163 | |
LONG $0x38048d42 // lea eax,[rax+r15*1]
|
1164 | |
WORD $0x8945; BYTE $0xcc // mov r12d,r9d
|
1165 | |
|
1166 | |
MOVQ 0x200(SP), DI // $_ctx
|
1167 | |
ADDQ R14, AX
|
1168 | |
|
1169 | |
LEAQ 0x1c0(SP), BP
|
1170 | |
|
1171 | |
ADDL (DI), AX
|
1172 | |
ADDL 4(DI), BX
|
1173 | |
ADDL 8(DI), CX
|
1174 | |
ADDL 12(DI), DX
|
1175 | |
ADDL 16(DI), R8
|
1176 | |
ADDL 20(DI), R9
|
1177 | |
ADDL 24(DI), R10
|
1178 | |
ADDL 28(DI), R11
|
1179 | |
|
1180 | |
MOVL AX, (DI)
|
1181 | |
MOVL BX, 4(DI)
|
1182 | |
MOVL CX, 8(DI)
|
1183 | |
MOVL DX, 12(DI)
|
1184 | |
MOVL R8, 16(DI)
|
1185 | |
MOVL R9, 20(DI)
|
1186 | |
MOVL R10, 24(DI)
|
1187 | |
MOVL R11, 28(DI)
|
1188 | |
|
1189 | |
CMPQ SI, 0x50(BP) // $_end
|
1190 | |
JE done
|
1191 | |
|
1192 | |
XORQ R14, R14
|
1193 | |
MOVQ BX, DI
|
1194 | |
XORQ CX, DI // magic
|
1195 | |
MOVQ R9, R12
|
1196 | |
|
1197 | |
loop2:
|
1198 | |
// ROUND(AX, BX, CX, DX, R8, R9, R10, R11, R12, R13, R14, R15, DI, BP, 0x10)
|
1199 | |
LONG $0x105d0344 // add r11d,[rbp+0x10]
|
1200 | |
WORD $0x2145; BYTE $0xc4 // and r12d,r8d
|
1201 | |
LONG $0xf07b43c4; WORD $0x19e8 // rorx r13d,r8d,0x19
|
1202 | |
LONG $0xf07b43c4; WORD $0x0bf8 // rorx r15d,r8d,0xb
|
1203 | |
LONG $0x30048d42 // lea eax,[rax+r14*1]
|
1204 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
1205 | |
LONG $0xf23842c4; BYTE $0xe2 // andn r12d,r8d,r10d
|
1206 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1207 | |
LONG $0xf07b43c4; WORD $0x06f0 // rorx r14d,r8d,0x6
|
1208 | |
LONG $0x231c8d47 // lea r11d,[r11+r12*1]
|
1209 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1210 | |
WORD $0x8941; BYTE $0xc7 // mov r15d,eax
|
1211 | |
LONG $0xf07b63c4; WORD $0x16e0 // rorx r12d,eax,0x16
|
1212 | |
LONG $0x2b1c8d47 // lea r11d,[r11+r13*1]
|
1213 | |
WORD $0x3141; BYTE $0xdf // xor r15d,ebx
|
1214 | |
LONG $0xf07b63c4; WORD $0x0df0 // rorx r14d,eax,0xd
|
1215 | |
LONG $0xf07b63c4; WORD $0x02e8 // rorx r13d,eax,0x2
|
1216 | |
LONG $0x1a148d42 // lea edx,[rdx+r11*1]
|
1217 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1218 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1219 | |
WORD $0xdf31 // xor edi,ebx
|
1220 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1221 | |
LONG $0x3b1c8d45 // lea r11d,[r11+rdi*1]
|
1222 | |
WORD $0x8945; BYTE $0xc4 // mov r12d,r8d
|
1223 | |
|
1224 | |
// ROUND(R11, AX, BX, CX, DX, R8, R9, R10, R12, R13, R14, DI, R15, BP, 0x14)
|
1225 | |
LONG $0x14550344 // add r10d,[rbp+0x14]
|
1226 | |
WORD $0x2141; BYTE $0xd4 // and r12d,edx
|
1227 | |
LONG $0xf07b63c4; WORD $0x19ea // rorx r13d,edx,0x19
|
1228 | |
LONG $0xf07be3c4; WORD $0x0bfa // rorx edi,edx,0xb
|
1229 | |
LONG $0x331c8d47 // lea r11d,[r11+r14*1]
|
1230 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
1231 | |
LONG $0xf26842c4; BYTE $0xe1 // andn r12d,edx,r9d
|
1232 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1233 | |
LONG $0xf07b63c4; WORD $0x06f2 // rorx r14d,edx,0x6
|
1234 | |
LONG $0x22148d47 // lea r10d,[r10+r12*1]
|
1235 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1236 | |
WORD $0x8944; BYTE $0xdf // mov edi,r11d
|
1237 | |
LONG $0xf07b43c4; WORD $0x16e3 // rorx r12d,r11d,0x16
|
1238 | |
LONG $0x2a148d47 // lea r10d,[r10+r13*1]
|
1239 | |
WORD $0xc731 // xor edi,eax
|
1240 | |
LONG $0xf07b43c4; WORD $0x0df3 // rorx r14d,r11d,0xd
|
1241 | |
LONG $0xf07b43c4; WORD $0x02eb // rorx r13d,r11d,0x2
|
1242 | |
LONG $0x110c8d42 // lea ecx,[rcx+r10*1]
|
1243 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1244 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1245 | |
WORD $0x3141; BYTE $0xc7 // xor r15d,eax
|
1246 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1247 | |
LONG $0x3a148d47 // lea r10d,[r10+r15*1]
|
1248 | |
WORD $0x8941; BYTE $0xd4 // mov r12d,edx
|
1249 | |
|
1250 | |
// ROUND(R10, R11, AX, BX, CX, DX, R8, R9, R12, R13, R14, R15, DI, BP, 0x18)
|
1251 | |
LONG $0x184d0344 // add r9d,[rbp+0x18]
|
1252 | |
WORD $0x2141; BYTE $0xcc // and r12d,ecx
|
1253 | |
LONG $0xf07b63c4; WORD $0x19e9 // rorx r13d,ecx,0x19
|
1254 | |
LONG $0xf07b63c4; WORD $0x0bf9 // rorx r15d,ecx,0xb
|
1255 | |
LONG $0x32148d47 // lea r10d,[r10+r14*1]
|
1256 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
1257 | |
LONG $0xf27042c4; BYTE $0xe0 // andn r12d,ecx,r8d
|
1258 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1259 | |
LONG $0xf07b63c4; WORD $0x06f1 // rorx r14d,ecx,0x6
|
1260 | |
LONG $0x210c8d47 // lea r9d,[r9+r12*1]
|
1261 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1262 | |
WORD $0x8945; BYTE $0xd7 // mov r15d,r10d
|
1263 | |
LONG $0xf07b43c4; WORD $0x16e2 // rorx r12d,r10d,0x16
|
1264 | |
LONG $0x290c8d47 // lea r9d,[r9+r13*1]
|
1265 | |
WORD $0x3145; BYTE $0xdf // xor r15d,r11d
|
1266 | |
LONG $0xf07b43c4; WORD $0x0df2 // rorx r14d,r10d,0xd
|
1267 | |
LONG $0xf07b43c4; WORD $0x02ea // rorx r13d,r10d,0x2
|
1268 | |
LONG $0x0b1c8d42 // lea ebx,[rbx+r9*1]
|
1269 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1270 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1271 | |
WORD $0x3144; BYTE $0xdf // xor edi,r11d
|
1272 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1273 | |
LONG $0x390c8d45 // lea r9d,[r9+rdi*1]
|
1274 | |
WORD $0x8941; BYTE $0xcc // mov r12d,ecx
|
1275 | |
|
1276 | |
// ROUND(R9, R10, R11, AX, BX, CX, DX, R8, R12, R13, R14, DI, R15, BP, 0x1c)
|
1277 | |
LONG $0x1c450344 // add r8d,[rbp+0x1c]
|
1278 | |
WORD $0x2141; BYTE $0xdc // and r12d,ebx
|
1279 | |
LONG $0xf07b63c4; WORD $0x19eb // rorx r13d,ebx,0x19
|
1280 | |
LONG $0xf07be3c4; WORD $0x0bfb // rorx edi,ebx,0xb
|
1281 | |
LONG $0x310c8d47 // lea r9d,[r9+r14*1]
|
1282 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
1283 | |
LONG $0xf26062c4; BYTE $0xe2 // andn r12d,ebx,edx
|
1284 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1285 | |
LONG $0xf07b63c4; WORD $0x06f3 // rorx r14d,ebx,0x6
|
1286 | |
LONG $0x20048d47 // lea r8d,[r8+r12*1]
|
1287 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1288 | |
WORD $0x8944; BYTE $0xcf // mov edi,r9d
|
1289 | |
LONG $0xf07b43c4; WORD $0x16e1 // rorx r12d,r9d,0x16
|
1290 | |
LONG $0x28048d47 // lea r8d,[r8+r13*1]
|
1291 | |
WORD $0x3144; BYTE $0xd7 // xor edi,r10d
|
1292 | |
LONG $0xf07b43c4; WORD $0x0df1 // rorx r14d,r9d,0xd
|
1293 | |
LONG $0xf07b43c4; WORD $0x02e9 // rorx r13d,r9d,0x2
|
1294 | |
LONG $0x00048d42 // lea eax,[rax+r8*1]
|
1295 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1296 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1297 | |
WORD $0x3145; BYTE $0xd7 // xor r15d,r10d
|
1298 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1299 | |
LONG $0x38048d47 // lea r8d,[r8+r15*1]
|
1300 | |
WORD $0x8941; BYTE $0xdc // mov r12d,ebx
|
1301 | |
|
1302 | |
// ROUND(R8, R9, R10, R11, AX, BX, CX, DX, R12, R13, R14, R15, DI, BP, 0x30)
|
1303 | |
WORD $0x5503; BYTE $0x30 // add edx,[rbp+0x30]
|
1304 | |
WORD $0x2141; BYTE $0xc4 // and r12d,eax
|
1305 | |
LONG $0xf07b63c4; WORD $0x19e8 // rorx r13d,eax,0x19
|
1306 | |
LONG $0xf07b63c4; WORD $0x0bf8 // rorx r15d,eax,0xb
|
1307 | |
LONG $0x30048d47 // lea r8d,[r8+r14*1]
|
1308 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
1309 | |
LONG $0xf27862c4; BYTE $0xe1 // andn r12d,eax,ecx
|
1310 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1311 | |
LONG $0xf07b63c4; WORD $0x06f0 // rorx r14d,eax,0x6
|
1312 | |
LONG $0x22148d42 // lea edx,[rdx+r12*1]
|
1313 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1314 | |
WORD $0x8945; BYTE $0xc7 // mov r15d,r8d
|
1315 | |
LONG $0xf07b43c4; WORD $0x16e0 // rorx r12d,r8d,0x16
|
1316 | |
LONG $0x2a148d42 // lea edx,[rdx+r13*1]
|
1317 | |
WORD $0x3145; BYTE $0xcf // xor r15d,r9d
|
1318 | |
LONG $0xf07b43c4; WORD $0x0df0 // rorx r14d,r8d,0xd
|
1319 | |
LONG $0xf07b43c4; WORD $0x02e8 // rorx r13d,r8d,0x2
|
1320 | |
LONG $0x131c8d45 // lea r11d,[r11+rdx*1]
|
1321 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1322 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1323 | |
WORD $0x3144; BYTE $0xcf // xor edi,r9d
|
1324 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1325 | |
WORD $0x148d; BYTE $0x3a // lea edx,[rdx+rdi*1]
|
1326 | |
WORD $0x8941; BYTE $0xc4 // mov r12d,eax
|
1327 | |
|
1328 | |
// ROUND(DX, R8, R9, R10, R11, AX, BX, CX, R12, R13, R14, DI, R15, BP, 0x34)
|
1329 | |
WORD $0x4d03; BYTE $0x34 // add ecx,[rbp+0x34]
|
1330 | |
WORD $0x2145; BYTE $0xdc // and r12d,r11d
|
1331 | |
LONG $0xf07b43c4; WORD $0x19eb // rorx r13d,r11d,0x19
|
1332 | |
LONG $0xf07bc3c4; WORD $0x0bfb // rorx edi,r11d,0xb
|
1333 | |
LONG $0x32148d42 // lea edx,[rdx+r14*1]
|
1334 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
1335 | |
LONG $0xf22062c4; BYTE $0xe3 // andn r12d,r11d,ebx
|
1336 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1337 | |
LONG $0xf07b43c4; WORD $0x06f3 // rorx r14d,r11d,0x6
|
1338 | |
LONG $0x210c8d42 // lea ecx,[rcx+r12*1]
|
1339 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1340 | |
WORD $0xd789 // mov edi,edx
|
1341 | |
LONG $0xf07b63c4; WORD $0x16e2 // rorx r12d,edx,0x16
|
1342 | |
LONG $0x290c8d42 // lea ecx,[rcx+r13*1]
|
1343 | |
WORD $0x3144; BYTE $0xc7 // xor edi,r8d
|
1344 | |
LONG $0xf07b63c4; WORD $0x0df2 // rorx r14d,edx,0xd
|
1345 | |
LONG $0xf07b63c4; WORD $0x02ea // rorx r13d,edx,0x2
|
1346 | |
LONG $0x0a148d45 // lea r10d,[r10+rcx*1]
|
1347 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1348 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1349 | |
WORD $0x3145; BYTE $0xc7 // xor r15d,r8d
|
1350 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1351 | |
LONG $0x390c8d42 // lea ecx,[rcx+r15*1]
|
1352 | |
WORD $0x8945; BYTE $0xdc // mov r12d,r11d
|
1353 | |
|
1354 | |
// ROUND(CX, DX, R8, R9, R10, R11, AX, BX, R12, R13, R14, R15, DI, BP, 0x38)
|
1355 | |
WORD $0x5d03; BYTE $0x38 // add ebx,[rbp+0x38]
|
1356 | |
WORD $0x2145; BYTE $0xd4 // and r12d,r10d
|
1357 | |
LONG $0xf07b43c4; WORD $0x19ea // rorx r13d,r10d,0x19
|
1358 | |
LONG $0xf07b43c4; WORD $0x0bfa // rorx r15d,r10d,0xb
|
1359 | |
LONG $0x310c8d42 // lea ecx,[rcx+r14*1]
|
1360 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
1361 | |
LONG $0xf22862c4; BYTE $0xe0 // andn r12d,r10d,eax
|
1362 | |
WORD $0x3145; BYTE $0xfd // xor r13d,r15d
|
1363 | |
LONG $0xf07b43c4; WORD $0x06f2 // rorx r14d,r10d,0x6
|
1364 | |
LONG $0x231c8d42 // lea ebx,[rbx+r12*1]
|
1365 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1366 | |
WORD $0x8941; BYTE $0xcf // mov r15d,ecx
|
1367 | |
LONG $0xf07b63c4; WORD $0x16e1 // rorx r12d,ecx,0x16
|
1368 | |
LONG $0x2b1c8d42 // lea ebx,[rbx+r13*1]
|
1369 | |
WORD $0x3141; BYTE $0xd7 // xor r15d,edx
|
1370 | |
LONG $0xf07b63c4; WORD $0x0df1 // rorx r14d,ecx,0xd
|
1371 | |
LONG $0xf07b63c4; WORD $0x02e9 // rorx r13d,ecx,0x2
|
1372 | |
LONG $0x190c8d45 // lea r9d,[r9+rbx*1]
|
1373 | |
WORD $0x2144; BYTE $0xff // and edi,r15d
|
1374 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1375 | |
WORD $0xd731 // xor edi,edx
|
1376 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1377 | |
WORD $0x1c8d; BYTE $0x3b // lea ebx,[rbx+rdi*1]
|
1378 | |
WORD $0x8945; BYTE $0xd4 // mov r12d,r10d
|
1379 | |
|
1380 | |
// ROUND(BX, CX, DX, R8, R9, R10, R11, AX, R12, R13, R14, DI, R15, BP, 0x3c)
|
1381 | |
WORD $0x4503; BYTE $0x3c // add eax,[rbp+0x3c]
|
1382 | |
WORD $0x2145; BYTE $0xcc // and r12d,r9d
|
1383 | |
LONG $0xf07b43c4; WORD $0x19e9 // rorx r13d,r9d,0x19
|
1384 | |
LONG $0xf07bc3c4; WORD $0x0bf9 // rorx edi,r9d,0xb
|
1385 | |
LONG $0x331c8d42 // lea ebx,[rbx+r14*1]
|
1386 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
1387 | |
LONG $0xf23042c4; BYTE $0xe3 // andn r12d,r9d,r11d
|
1388 | |
WORD $0x3141; BYTE $0xfd // xor r13d,edi
|
1389 | |
LONG $0xf07b43c4; WORD $0x06f1 // rorx r14d,r9d,0x6
|
1390 | |
LONG $0x20048d42 // lea eax,[rax+r12*1]
|
1391 | |
WORD $0x3145; BYTE $0xf5 // xor r13d,r14d
|
1392 | |
WORD $0xdf89 // mov edi,ebx
|
1393 | |
LONG $0xf07b63c4; WORD $0x16e3 // rorx r12d,ebx,0x16
|
1394 | |
LONG $0x28048d42 // lea eax,[rax+r13*1]
|
1395 | |
WORD $0xcf31 // xor edi,ecx
|
1396 | |
LONG $0xf07b63c4; WORD $0x0df3 // rorx r14d,ebx,0xd
|
1397 | |
LONG $0xf07b63c4; WORD $0x02eb // rorx r13d,ebx,0x2
|
1398 | |
LONG $0x00048d45 // lea r8d,[r8+rax*1]
|
1399 | |
WORD $0x2141; BYTE $0xff // and r15d,edi
|
1400 | |
WORD $0x3145; BYTE $0xe6 // xor r14d,r12d
|
1401 | |
WORD $0x3141; BYTE $0xcf // xor r15d,ecx
|
1402 | |
WORD $0x3145; BYTE $0xee // xor r14d,r13d
|
1403 | |
LONG $0x38048d42 // lea eax,[rax+r15*1]
|
1404 | |
WORD $0x8945; BYTE $0xcc // mov r12d,r9d
|
1405 | |
|
1406 | |
ADDQ $-0x40, BP
|
1407 | |
CMPQ BP, SP
|
1408 | |
JAE loop2
|
1409 | |
|
1410 | |
MOVQ 0x200(SP), DI // $_ctx
|
1411 | |
ADDQ R14, AX
|
1412 | |
|
1413 | |
ADDQ $0x1c0, SP
|
1414 | |
|
1415 | |
ADDL (DI), AX
|
1416 | |
ADDL 4(DI), BX
|
1417 | |
ADDL 8(DI), CX
|
1418 | |
ADDL 12(DI), DX
|
1419 | |
ADDL 16(DI), R8
|
1420 | |
ADDL 20(DI), R9
|
1421 | |
|
1422 | |
ADDQ $0x80, SI // input += 2
|
1423 | |
ADDL 24(DI), R10
|
1424 | |
MOVQ SI, R12
|
1425 | |
ADDL 28(DI), R11
|
1426 | |
CMPQ SI, 0x50(SP) // input == _end
|
1427 | |
|
1428 | |
MOVL AX, (DI)
|
1429 | |
LONG $0xe4440f4c // cmove r12,rsp /* next block or stale data */
|
1430 | |
MOVL AX, (DI)
|
1431 | |
MOVL BX, 4(DI)
|
1432 | |
MOVL CX, 8(DI)
|
1433 | |
MOVL DX, 12(DI)
|
1434 | |
MOVL R8, 16(DI)
|
1435 | |
MOVL R9, 20(DI)
|
1436 | |
MOVL R10, 24(DI)
|
1437 | |
MOVL R11, 28(DI)
|
1438 | |
|
1439 | |
JBE loop0
|
1440 | |
LEAQ (SP), BP
|
1441 | |
|
1442 | |
done:
|
1443 | |
MOVQ BP, SP
|
1444 | |
MOVQ 0x58(SP), SP // restore saved stack pointer
|
1445 | |
WORD $0xf8c5; BYTE $0x77 // vzeroupper
|
1446 | |
|
1447 | |
RET
|
1448 | |
|