You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

907 lines
15 KiB

TITLE bf-686.asm
IF @Version LT 800
ECHO MASM version 8.00 or later is strongly recommended.
ENDIF
.686
.MODEL FLAT
OPTION DOTNAME
IF @Version LT 800
.text$ SEGMENT PAGE 'CODE'
ELSE
.text$ SEGMENT ALIGN(64) 'CODE'
ENDIF
ALIGN 16
_BF_encrypt PROC PUBLIC
$L_BF_encrypt_begin::
push ebp
push ebx
push esi
push edi
;
; Load the 2 words
mov eax,DWORD PTR 20[esp]
mov ecx,DWORD PTR [eax]
mov edx,DWORD PTR 4[eax]
;
; P pointer, s and enc flag
mov edi,DWORD PTR 24[esp]
xor eax,eax
xor ebx,ebx
xor ecx,DWORD PTR [edi]
;
; Round 0
ror ecx,16
mov esi,DWORD PTR 4[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 1
ror edx,16
mov esi,DWORD PTR 8[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 2
ror ecx,16
mov esi,DWORD PTR 12[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 3
ror edx,16
mov esi,DWORD PTR 16[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 4
ror ecx,16
mov esi,DWORD PTR 20[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 5
ror edx,16
mov esi,DWORD PTR 24[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 6
ror ecx,16
mov esi,DWORD PTR 28[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 7
ror edx,16
mov esi,DWORD PTR 32[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 8
ror ecx,16
mov esi,DWORD PTR 36[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 9
ror edx,16
mov esi,DWORD PTR 40[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 10
ror ecx,16
mov esi,DWORD PTR 44[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 11
ror edx,16
mov esi,DWORD PTR 48[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 12
ror ecx,16
mov esi,DWORD PTR 52[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 13
ror edx,16
mov esi,DWORD PTR 56[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 14
ror ecx,16
mov esi,DWORD PTR 60[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 15
ror edx,16
mov esi,DWORD PTR 64[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
xor edx,DWORD PTR 68[edi]
mov eax,DWORD PTR 20[esp]
mov DWORD PTR [eax],edx
mov DWORD PTR 4[eax],ecx
pop edi
pop esi
pop ebx
pop ebp
ret
_BF_encrypt ENDP
ALIGN 16
_BF_decrypt PROC PUBLIC
$L_BF_decrypt_begin::
push ebp
push ebx
push esi
push edi
;
; Load the 2 words
mov eax,DWORD PTR 20[esp]
mov ecx,DWORD PTR [eax]
mov edx,DWORD PTR 4[eax]
;
; P pointer, s and enc flag
mov edi,DWORD PTR 24[esp]
xor eax,eax
xor ebx,ebx
xor ecx,DWORD PTR 68[edi]
;
; Round 16
ror ecx,16
mov esi,DWORD PTR 64[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 15
ror edx,16
mov esi,DWORD PTR 60[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 14
ror ecx,16
mov esi,DWORD PTR 56[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 13
ror edx,16
mov esi,DWORD PTR 52[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 12
ror ecx,16
mov esi,DWORD PTR 48[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 11
ror edx,16
mov esi,DWORD PTR 44[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 10
ror ecx,16
mov esi,DWORD PTR 40[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 9
ror edx,16
mov esi,DWORD PTR 36[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 8
ror ecx,16
mov esi,DWORD PTR 32[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 7
ror edx,16
mov esi,DWORD PTR 28[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 6
ror ecx,16
mov esi,DWORD PTR 24[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 5
ror edx,16
mov esi,DWORD PTR 20[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 4
ror ecx,16
mov esi,DWORD PTR 16[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 3
ror edx,16
mov esi,DWORD PTR 12[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
;
; Round 2
ror ecx,16
mov esi,DWORD PTR 8[edi]
mov al,ch
mov bl,cl
ror ecx,16
xor edx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,ch
mov bl,cl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor edx,esi
;
; Round 1
ror edx,16
mov esi,DWORD PTR 4[edi]
mov al,dh
mov bl,dl
ror edx,16
xor ecx,esi
mov esi,DWORD PTR 72[eax*4+edi]
mov ebp,DWORD PTR 1096[ebx*4+edi]
mov al,dh
mov bl,dl
add esi,ebp
mov eax,DWORD PTR 2120[eax*4+edi]
xor esi,eax
mov ebp,DWORD PTR 3144[ebx*4+edi]
add esi,ebp
xor eax,eax
xor ecx,esi
xor edx,DWORD PTR [edi]
mov eax,DWORD PTR 20[esp]
mov DWORD PTR [eax],edx
mov DWORD PTR 4[eax],ecx
pop edi
pop esi
pop ebx
pop ebp
ret
_BF_decrypt ENDP
ALIGN 16
_BF_cbc_encrypt PROC PUBLIC
$L_BF_cbc_encrypt_begin::
;
push ebp
push ebx
push esi
push edi
mov ebp,DWORD PTR 28[esp]
; getting iv ptr from parameter 4
mov ebx,DWORD PTR 36[esp]
mov esi,DWORD PTR [ebx]
mov edi,DWORD PTR 4[ebx]
push edi
push esi
push edi
push esi
mov ebx,esp
mov esi,DWORD PTR 36[esp]
mov edi,DWORD PTR 40[esp]
; getting encrypt flag from parameter 5
mov ecx,DWORD PTR 56[esp]
; get and push parameter 3
mov eax,DWORD PTR 48[esp]
push eax
push ebx
cmp ecx,0
jz $L000decrypt
and ebp,4294967288
mov eax,DWORD PTR 8[esp]
mov ebx,DWORD PTR 12[esp]
jz $L001encrypt_finish
$L002encrypt_loop:
mov ecx,DWORD PTR [esi]
mov edx,DWORD PTR 4[esi]
xor eax,ecx
xor ebx,edx
bswap eax
bswap ebx
mov DWORD PTR 8[esp],eax
mov DWORD PTR 12[esp],ebx
call $L_BF_encrypt_begin
mov eax,DWORD PTR 8[esp]
mov ebx,DWORD PTR 12[esp]
bswap eax
bswap ebx
mov DWORD PTR [edi],eax
mov DWORD PTR 4[edi],ebx
add esi,8
add edi,8
sub ebp,8
jnz $L002encrypt_loop
$L001encrypt_finish:
mov ebp,DWORD PTR 52[esp]
and ebp,7
jz $L003finish
call $L004PIC_point
$L004PIC_point:
pop edx
lea ecx,DWORD PTR ($L005cbc_enc_jmp_table-$L004PIC_point)[edx]
mov ebp,DWORD PTR [ebp*4+ecx]
add ebp,edx
xor ecx,ecx
xor edx,edx
jmp ebp
$L006ej7:
mov dh,BYTE PTR 6[esi]
shl edx,8
$L007ej6:
mov dh,BYTE PTR 5[esi]
$L008ej5:
mov dl,BYTE PTR 4[esi]
$L009ej4:
mov ecx,DWORD PTR [esi]
jmp $L010ejend
$L011ej3:
mov ch,BYTE PTR 2[esi]
shl ecx,8
$L012ej2:
mov ch,BYTE PTR 1[esi]
$L013ej1:
mov cl,BYTE PTR [esi]
$L010ejend:
xor eax,ecx
xor ebx,edx
bswap eax
bswap ebx
mov DWORD PTR 8[esp],eax
mov DWORD PTR 12[esp],ebx
call $L_BF_encrypt_begin
mov eax,DWORD PTR 8[esp]
mov ebx,DWORD PTR 12[esp]
bswap eax
bswap ebx
mov DWORD PTR [edi],eax
mov DWORD PTR 4[edi],ebx
jmp $L003finish
$L000decrypt:
and ebp,4294967288
mov eax,DWORD PTR 16[esp]
mov ebx,DWORD PTR 20[esp]
jz $L014decrypt_finish
$L015decrypt_loop:
mov eax,DWORD PTR [esi]
mov ebx,DWORD PTR 4[esi]
bswap eax
bswap ebx
mov DWORD PTR 8[esp],eax
mov DWORD PTR 12[esp],ebx
call $L_BF_decrypt_begin
mov eax,DWORD PTR 8[esp]
mov ebx,DWORD PTR 12[esp]
bswap eax
bswap ebx
mov ecx,DWORD PTR 16[esp]
mov edx,DWORD PTR 20[esp]
xor ecx,eax
xor edx,ebx
mov eax,DWORD PTR [esi]
mov ebx,DWORD PTR 4[esi]
mov DWORD PTR [edi],ecx
mov DWORD PTR 4[edi],edx
mov DWORD PTR 16[esp],eax
mov DWORD PTR 20[esp],ebx
add esi,8
add edi,8
sub ebp,8
jnz $L015decrypt_loop
$L014decrypt_finish:
mov ebp,DWORD PTR 52[esp]
and ebp,7
jz $L003finish
mov eax,DWORD PTR [esi]
mov ebx,DWORD PTR 4[esi]
bswap eax
bswap ebx
mov DWORD PTR 8[esp],eax
mov DWORD PTR 12[esp],ebx
call $L_BF_decrypt_begin
mov eax,DWORD PTR 8[esp]
mov ebx,DWORD PTR 12[esp]
bswap eax
bswap ebx
mov ecx,DWORD PTR 16[esp]
mov edx,DWORD PTR 20[esp]
xor ecx,eax
xor edx,ebx
mov eax,DWORD PTR [esi]
mov ebx,DWORD PTR 4[esi]
$L016dj7:
ror edx,16
mov BYTE PTR 6[edi],dl
shr edx,16
$L017dj6:
mov BYTE PTR 5[edi],dh
$L018dj5:
mov BYTE PTR 4[edi],dl
$L019dj4:
mov DWORD PTR [edi],ecx
jmp $L020djend
$L021dj3:
ror ecx,16
mov BYTE PTR 2[edi],cl
shl ecx,16
$L022dj2:
mov BYTE PTR 1[esi],ch
$L023dj1:
mov BYTE PTR [esi],cl
$L020djend:
jmp $L003finish
$L003finish:
mov ecx,DWORD PTR 60[esp]
add esp,24
mov DWORD PTR [ecx],eax
mov DWORD PTR 4[ecx],ebx
pop edi
pop esi
pop ebx
pop ebp
ret
ALIGN 64
$L005cbc_enc_jmp_table:
DD 0
DD $L013ej1-$L004PIC_point
DD $L012ej2-$L004PIC_point
DD $L011ej3-$L004PIC_point
DD $L009ej4-$L004PIC_point
DD $L008ej5-$L004PIC_point
DD $L007ej6-$L004PIC_point
DD $L006ej7-$L004PIC_point
ALIGN 64
_BF_cbc_encrypt ENDP
.text$ ENDS
END