Module Name:    src
Committed By:   mlelstv
Date:           Wed Mar  7 06:55:01 UTC 2018

Modified Files:
        src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k: aes-m68k.S

Log Message:
Use local ELF labels and avoid an unsupported 16bit relocation.


To generate a diff of this commit:
cvs rdiff -u -r1.2 -r1.3 \
    src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/aes-m68k.S

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/aes-m68k.S
diff -u src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/aes-m68k.S:1.2 src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/aes-m68k.S:1.3
--- src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/aes-m68k.S:1.2	Mon Mar  5 00:59:43 2018
+++ src/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/aes-m68k.S	Wed Mar  7 06:55:01 2018
@@ -1,4 +1,4 @@
-|	$NetBSD: aes-m68k.S,v 1.2 2018/03/05 00:59:43 christos Exp $
+|	$NetBSD: aes-m68k.S,v 1.3 2018/03/07 06:55:01 mlelstv Exp $
 
 | Copyright (C) 2016 Tetsuya Isaki. All rights reserved.
 | Copyright (C) 2016 Y.Sugahara (moveccr). All rights reserved.
@@ -34,19 +34,20 @@
 	.global	AES_set_encrypt_key
 	.type	AES_set_encrypt_key, @function
 AES_set_encrypt_key:
+.Laes_set_encrypt_key:
 	moveml	%d2-%d7/%a2-%a6,%sp@-
 	moveal	%sp@(44+4),%a0		| userKey
 	moveal	%sp@(44+8),%a1		| bits
 	moveal	%sp@(44+12),%a3		| key
 
 	tstl	%a0
-	beq	pek_return1		| return -1 if userKey == NULL
+	beq	.Lpek_return1		| return -1 if userKey == NULL
 	tstl	%a3
-	beq	pek_return1		| return -1 if key == NULL
+	beq	.Lpek_return1		| return -1 if key == NULL
 
 	cmpaw	#128,%a1
-	bne	pek192_check		| unless bits == 128
-pek128:
+	bne	.Lpek192_check		| unless bits == 128
+.Lpek128:
 	| %d0-%d7 rk[0..7]
 	| %a0 userKey, Te0
 	| %a1          Te1
@@ -80,7 +81,7 @@ pek128:
 	lea	%pc@(rcon_byte),%a4
 	lea	%a4@(10),%a6
 
-pek128_loop:
+.Lpek128_loop:
 					| d6 consists of four Te index bytes
 	movel	%d3,%d5			| d5=rk[3] as {1,2,3,0}
 	moveb	%d5,%d7			| d7=temp
@@ -111,21 +112,21 @@ pek128_loop:
 	movel	%d3,%a5@+
 
 	cmpal	%a4,%a6
-	bne	pek128_loop		|if (++i == 10) return 0;
+	bne	.Lpek128_loop		|if (++i == 10) return 0;
 
-pek_return0:
+.Lpek_return0:
 	moveql	#0,%d0
-pek_return:
+.Lpek_return:
 	moveml	%sp@+,%d2-%d7/%a2-%a6
 	rts
 
-pek192_check:
+.Lpek192_check:
 	| %a0 userKey
 	| %a1 bits
 	| %a3 key
 	cmpaw	#192,%a1
-	bne	pek256_check		| unless bits == 192
-pek192:
+	bne	.Lpek256_check		| unless bits == 192
+.Lpek192:
 	| %a0 Te0
 	| %a1 Te1
 	| %a2 Te2
@@ -160,15 +161,15 @@ pek192:
 	moveq	#0,%d7
 	lea	%pc@(rcon_byte),%a4
 	lea	%a4@(8),%a6
-	bra	pek192_loop_start
+	bra	.Lpek192_loop_start
 
-pek192_loop:
+.Lpek192_loop:
 	eorl	%d3,%d4			| rk[10] = rk[4] ^ rk[9]
 	movel	%d4,%a5@+		| %d4 is rk[10]
 	eorl	%d4,%d5			| rk[11] = rk[5] ^ rk[10]
 	movel	%d5,%a5@		| %d5 is rk[11]
 
-pek192_loop_start:
+.Lpek192_loop_start:
 	| %d0..%d5 = rk[0..5]
 	|
 	| temp = rk[5];
@@ -206,17 +207,17 @@ pek192_loop_start:
 	movel	%d3,%a5@+		| %d3 is rk[9]
 
 	cmpal	%a4,%a6
-	bne	pek192_loop
-	bra	pek_return0
+	bne	.Lpek192_loop
+	bra	.Lpek_return0
 
 
-pek256_check:
+.Lpek256_check:
 	| %a0 userKey
 	| %a1 bits
 	| %a3 key
 	cmpaw	#256,%a1
-	bne	pek_return2		| otherwise return -2
-pek256:
+	bne	.Lpek_return2		| otherwise return -2
+.Lpek256:
 	| %a0 Te0
 	| %a1 Te1
 	| %a2 Te2
@@ -254,9 +255,9 @@ pek256:
 
 	lea	%pc@(rcon_byte),%a4
 	lea	%a4@(7),%a6
-	bra	pek256_loop_start
+	bra	.Lpek256_loop_start
 
-pek256_loop:
+.Lpek256_loop:
 	| %d0: rk[8]  -> work
 	| %d1: rk[9]  -> work
 	| %d2: rk[10]
@@ -314,7 +315,7 @@ pek256_loop:
 	moveml	%a5@(-8*4),%d0-%d1	| %d0..%d1 = rk[8..9]
 	movel	%a5@(-5*4),%d3		| %d3 = rk[11]
 
-pek256_loop_start:
+.Lpek256_loop_start:
 	| %d0: rk[0]
 	| %d1: rk[1]
 	| %d2: rk[2]
@@ -369,15 +370,15 @@ pek256_loop_start:
 	| %d7: work
 
 	cmpal	%a4,%a6
-	bne	pek256_loop
-	bra	pek_return0
+	bne	.Lpek256_loop
+	bra	.Lpek_return0
 
-pek_return1:
+.Lpek_return1:
 	moveql	#-1,%d0
-	bra	pek_return
-pek_return2:
+	bra	.Lpek_return
+.Lpek_return2:
 	moveql	#-2,%d0
-	bra	pek_return
+	bra	.Lpek_return
 	.size	AES_set_encrypt_key, .-AES_set_encrypt_key
 
 
@@ -397,9 +398,9 @@ AES_set_decrypt_key:
 	movel	%a3,%sp@-
 	movel	%a1,%sp@-
 	movel	%a0,%sp@-
-	bsr	AES_set_encrypt_key
+	bsr	.Laes_set_encrypt_key
 	lea	%sp@(12),%sp
-	bmi	pdk_return
+	bmi	.Lpdk_return
 
 	/* invert the order of the round keys: */
 	lea	%a3@(rd_key),%a5	| %a5 := &rk[0]
@@ -407,7 +408,7 @@ AES_set_decrypt_key:
 	lslw	#4,%d4
 	lea	%a5@(%d4),%a4		| %a4 := &rk[j]
 	moveal	%a4,%a6			| %a6 for the next loop
-pdk_invert_loop:
+.Lpdk_invert_loop:
 	movel	%a5@,%d0
 	movel	%a4@,%a5@+
 	movel	%d0,%a4@+
@@ -427,7 +428,7 @@ pdk_invert_loop:
 	lea	%a4@(-28),%a4
 
 	cmpal	%a4,%a5
-	bcs	pdk_invert_loop
+	bcs	.Lpdk_invert_loop
 
 	/*
 	 * apply the inverse MixColumn transform to all round keys but
@@ -442,7 +443,7 @@ pdk_invert_loop:
 
 	| for (i = 1; i < key->rounds; i++)
 	moveq	#0,%d1
-pdk_apply_loop:
+.Lpdk_apply_loop:
 	| rk[0] =
 	|     Td3[Te1[(rk[0]      ) & 0xff] & 0xff] ^
 	|     Td2[Te1[(rk[0] >>  8) & 0xff] & 0xff] ^
@@ -469,10 +470,10 @@ pdk_apply_loop:
 	movel	%d2,%a5@+		| -> rk[0]
 
 	cmpal	%a6,%a5
-	bcs	pdk_apply_loop
+	bcs	.Lpdk_apply_loop
 
 	moveql	#0,%d0
-pdk_return:
+.Lpdk_return:
 	moveml	%sp@+,%d2-%d7/%a2-%a6
 	rts
 	.size	AES_set_decrypt_key, .-AES_set_decrypt_key
@@ -522,9 +523,9 @@ AES_encrypt:
 	lea	%a1@(256*4),%a2		| %a2 = Te2
 	lea	%a2@(256*4),%a3		| %a3 = Te3
 
-	bra	enc_loop_start
+	bra	.Lenc_loop_start
 
-enc_loop:
+.Lenc_loop:
 	| s1  = Te3[(t0      ) & 0xff];
 	| s2  = Te2[(t0 >>  8) & 0xff];
 	| s3  = Te1[(t0 >> 16) & 0xff];
@@ -621,7 +622,7 @@ enc_loop:
 	movel	%a5@+,%d4
 	eorl	%d4,%d3
 
-enc_loop_start:
+.Lenc_loop_start:
 	| t1  = Te3[(s0      ) & 0xff];
 	| t2  = Te2[(s0 >>  8) & 0xff];
 	| t3  = Te1[(s0 >> 16) & 0xff];
@@ -719,8 +720,8 @@ enc_loop_start:
 	eorl	%d0,%d7
 
 	cmpal	%a5,%a4
-	bne	enc_loop		| if (--r == 0) break;
-enc_last:
+	bne	.Lenc_loop		| if (--r == 0) break;
+.Lenc_last:
 	/*
 	 * apply last round and
 	 * map cipher state to byte array block:
@@ -873,9 +874,9 @@ AES_decrypt:
 	lea	%a1@(256*4),%a2		| %a2 = Td2
 	lea	%a2@(256*4),%a3		| %a3 = Td3
 
-	bra	dec_loop_start
+	bra	.Ldec_loop_start
 
-dec_loop:
+.Ldec_loop:
 	| s3  = Td3[(t0      ) & 0xff];
 	| s2  = Td2[(t0 >>  8) & 0xff];
 	| s1  = Td1[(t0 >> 16) & 0xff];
@@ -972,7 +973,7 @@ dec_loop:
 	movel	%a5@+,%d4
 	eorl	%d4,%d3
 
-dec_loop_start:
+.Ldec_loop_start:
 	| t3  = Td3[(s0      ) & 0xff];
 	| t2  = Td2[(s0 >>  8) & 0xff];
 	| t1  = Td1[(s0 >> 16) & 0xff];
@@ -1070,7 +1071,7 @@ dec_loop_start:
 	eorl	%d0,%d7
 
 	cmpal	%a5,%a4
-	bne	dec_loop		| if (--r == 0) break;
+	bne	.Ldec_loop		| if (--r == 0) break;
 
 	/*
 	 * apply last round and

Reply via email to