summaryrefslogtreecommitdiffstats
path: root/secure/lib/libcrypto/i386/cast-586.s
diff options
context:
space:
mode:
Diffstat (limited to 'secure/lib/libcrypto/i386/cast-586.s')
-rw-r--r--secure/lib/libcrypto/i386/cast-586.s207
1 files changed, 101 insertions, 106 deletions
diff --git a/secure/lib/libcrypto/i386/cast-586.s b/secure/lib/libcrypto/i386/cast-586.s
index b6da53b..bb31376 100644
--- a/secure/lib/libcrypto/i386/cast-586.s
+++ b/secure/lib/libcrypto/i386/cast-586.s
@@ -1,9 +1,9 @@
# $FreeBSD$
- # Dont even think of reading this code
- # It was automatically generated by cast-586.pl
- # Which is a perl program used to generate the x86 assember for
- # any of elf, a.out, BSDI, Win32, gaswin (for GNU as on Win32) or Solaris
- # eric <eay@cryptsoft.com>
+
+
+
+
+
.file "cast-586.s"
.version "01.01"
@@ -20,14 +20,14 @@ CAST_encrypt:
movl 16(%esp), %ebp
pushl %esi
pushl %edi
- # Load the 2 words
+
movl (%ebx), %edi
movl 4(%ebx), %esi
- # Get short key flag
+
movl 128(%ebp), %eax
pushl %eax
xorl %eax, %eax
- # round 0
+
movl (%ebp), %edx
movl 4(%ebp), %ecx
addl %esi, %edx
@@ -48,7 +48,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %edi
- # round 1
+
movl 8(%ebp), %edx
movl 12(%ebp), %ecx
xorl %edi, %edx
@@ -69,7 +69,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %esi
- # round 2
+
movl 16(%ebp), %edx
movl 20(%ebp), %ecx
subl %esi, %edx
@@ -90,7 +90,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %edi
- # round 3
+
movl 24(%ebp), %edx
movl 28(%ebp), %ecx
addl %edi, %edx
@@ -111,7 +111,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %esi
- # round 4
+
movl 32(%ebp), %edx
movl 36(%ebp), %ecx
xorl %esi, %edx
@@ -132,7 +132,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %edi
- # round 5
+
movl 40(%ebp), %edx
movl 44(%ebp), %ecx
subl %edi, %edx
@@ -153,7 +153,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %esi
- # round 6
+
movl 48(%ebp), %edx
movl 52(%ebp), %ecx
addl %esi, %edx
@@ -174,7 +174,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %edi
- # round 7
+
movl 56(%ebp), %edx
movl 60(%ebp), %ecx
xorl %edi, %edx
@@ -195,7 +195,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %esi
- # round 8
+
movl 64(%ebp), %edx
movl 68(%ebp), %ecx
subl %esi, %edx
@@ -216,7 +216,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %edi
- # round 9
+
movl 72(%ebp), %edx
movl 76(%ebp), %ecx
addl %edi, %edx
@@ -237,7 +237,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %esi
- # round 10
+
movl 80(%ebp), %edx
movl 84(%ebp), %ecx
xorl %esi, %edx
@@ -258,7 +258,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %edi
- # round 11
+
movl 88(%ebp), %edx
movl 92(%ebp), %ecx
subl %edi, %edx
@@ -279,11 +279,11 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %esi
- # test short key flag
+
popl %edx
orl %edx, %edx
jnz .L000cast_enc_done
- # round 12
+
movl 96(%ebp), %edx
movl 100(%ebp), %ecx
addl %esi, %edx
@@ -304,7 +304,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %edi
- # round 13
+
movl 104(%ebp), %edx
movl 108(%ebp), %ecx
xorl %edi, %edx
@@ -325,7 +325,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %esi
- # round 14
+
movl 112(%ebp), %edx
movl 116(%ebp), %ecx
subl %esi, %edx
@@ -346,7 +346,7 @@ CAST_encrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %edi
- # round 15
+
movl 120(%ebp), %edx
movl 124(%ebp), %ecx
addl %edi, %edx
@@ -377,8 +377,8 @@ CAST_encrypt:
popl %ebx
popl %ebp
ret
-.CAST_encrypt_end:
- .size CAST_encrypt,.CAST_encrypt_end-CAST_encrypt
+.L_CAST_encrypt_end:
+ .size CAST_encrypt,.L_CAST_encrypt_end-CAST_encrypt
.ident "CAST_encrypt"
.text
.align 16
@@ -392,15 +392,15 @@ CAST_decrypt:
movl 16(%esp), %ebp
pushl %esi
pushl %edi
- # Load the 2 words
+
movl (%ebx), %edi
movl 4(%ebx), %esi
- # Get short key flag
+
movl 128(%ebp), %eax
orl %eax, %eax
jnz .L001cast_dec_skip
xorl %eax, %eax
- # round 15
+
movl 120(%ebp), %edx
movl 124(%ebp), %ecx
addl %esi, %edx
@@ -421,7 +421,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %edi
- # round 14
+
movl 112(%ebp), %edx
movl 116(%ebp), %ecx
subl %edi, %edx
@@ -442,7 +442,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %esi
- # round 13
+
movl 104(%ebp), %edx
movl 108(%ebp), %ecx
xorl %esi, %edx
@@ -463,7 +463,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %edi
- # round 12
+
movl 96(%ebp), %edx
movl 100(%ebp), %ecx
addl %edi, %edx
@@ -485,7 +485,7 @@ CAST_decrypt:
addl %ebx, %ecx
xorl %ecx, %esi
.L001cast_dec_skip:
- # round 11
+
movl 88(%ebp), %edx
movl 92(%ebp), %ecx
subl %esi, %edx
@@ -506,7 +506,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %edi
- # round 10
+
movl 80(%ebp), %edx
movl 84(%ebp), %ecx
xorl %edi, %edx
@@ -527,7 +527,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %esi
- # round 9
+
movl 72(%ebp), %edx
movl 76(%ebp), %ecx
addl %esi, %edx
@@ -548,7 +548,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %edi
- # round 8
+
movl 64(%ebp), %edx
movl 68(%ebp), %ecx
subl %edi, %edx
@@ -569,7 +569,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %esi
- # round 7
+
movl 56(%ebp), %edx
movl 60(%ebp), %ecx
xorl %esi, %edx
@@ -590,7 +590,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %edi
- # round 6
+
movl 48(%ebp), %edx
movl 52(%ebp), %ecx
addl %edi, %edx
@@ -611,7 +611,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %esi
- # round 5
+
movl 40(%ebp), %edx
movl 44(%ebp), %ecx
subl %esi, %edx
@@ -632,7 +632,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %edi
- # round 4
+
movl 32(%ebp), %edx
movl 36(%ebp), %ecx
xorl %edi, %edx
@@ -653,7 +653,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %esi
- # round 3
+
movl 24(%ebp), %edx
movl 28(%ebp), %ecx
addl %esi, %edx
@@ -674,7 +674,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
addl %ebx, %ecx
xorl %ecx, %edi
- # round 2
+
movl 16(%ebp), %edx
movl 20(%ebp), %ecx
subl %edi, %edx
@@ -695,7 +695,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
subl %ebx, %ecx
xorl %ecx, %esi
- # round 1
+
movl 8(%ebp), %edx
movl 12(%ebp), %ecx
xorl %esi, %edx
@@ -716,7 +716,7 @@ CAST_decrypt:
movl CAST_S_table3(,%edx,4),%ebx
xorl %ebx, %ecx
xorl %ecx, %edi
- # round 0
+
movl (%ebp), %edx
movl 4(%ebp), %ecx
addl %edi, %edx
@@ -746,8 +746,8 @@ CAST_decrypt:
popl %ebx
popl %ebp
ret
-.CAST_decrypt_end:
- .size CAST_decrypt,.CAST_decrypt_end-CAST_decrypt
+.L_CAST_decrypt_end:
+ .size CAST_decrypt,.L_CAST_decrypt_end-CAST_decrypt
.ident "CAST_decrypt"
.text
.align 16
@@ -760,7 +760,7 @@ CAST_cbc_encrypt:
pushl %esi
pushl %edi
movl 28(%esp), %ebp
- # getting iv ptr from parameter 4
+
movl 36(%esp), %ebx
movl (%ebx), %esi
movl 4(%ebx), %edi
@@ -771,9 +771,9 @@ CAST_cbc_encrypt:
movl %esp, %ebx
movl 36(%esp), %esi
movl 40(%esp), %edi
- # getting encrypt flag from parameter 5
+
movl 56(%esp), %ecx
- # get and push parameter 3
+
movl 48(%esp), %eax
pushl %eax
pushl %ebx
@@ -789,18 +789,18 @@ CAST_cbc_encrypt:
xorl %ecx, %eax
xorl %edx, %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl %eax, 8(%esp)
movl %ebx, 12(%esp)
call CAST_encrypt
movl 8(%esp), %eax
movl 12(%esp), %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl %eax, (%edi)
movl %ebx, 4(%edi)
addl $8, %esi
@@ -811,45 +811,50 @@ CAST_cbc_encrypt:
movl 52(%esp), %ebp
andl $7, %ebp
jz .L005finish
+ call .L006PIC_point
+.L006PIC_point:
+ popl %edx
+ leal .L007cbc_enc_jmp_table-.L006PIC_point(%edx),%ecx
+ movl (%ecx,%ebp,4), %ebp
+ addl %edx, %ebp
xorl %ecx, %ecx
xorl %edx, %edx
- movl .L006cbc_enc_jmp_table(,%ebp,4),%ebp
jmp *%ebp
-.L007ej7:
+.L008ej7:
xorl %edx, %edx
movb 6(%esi), %dh
sall $8, %edx
-.L008ej6:
+.L009ej6:
movb 5(%esi), %dh
-.L009ej5:
+.L010ej5:
movb 4(%esi), %dl
-.L010ej4:
+.L011ej4:
movl (%esi), %ecx
- jmp .L011ejend
-.L012ej3:
+ jmp .L012ejend
+.L013ej3:
movb 2(%esi), %ch
xorl %ecx, %ecx
sall $8, %ecx
-.L013ej2:
+.L014ej2:
movb 1(%esi), %ch
-.L014ej1:
+.L015ej1:
movb (%esi), %cl
-.L011ejend:
+.L012ejend:
xorl %ecx, %eax
xorl %edx, %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl %eax, 8(%esp)
movl %ebx, 12(%esp)
call CAST_encrypt
movl 8(%esp), %eax
movl 12(%esp), %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl %eax, (%edi)
movl %ebx, 4(%edi)
jmp .L005finish
@@ -858,23 +863,23 @@ CAST_cbc_encrypt:
andl $4294967288, %ebp
movl 16(%esp), %eax
movl 20(%esp), %ebx
- jz .L015decrypt_finish
-.L016decrypt_loop:
+ jz .L016decrypt_finish
+.L017decrypt_loop:
movl (%esi), %eax
movl 4(%esi), %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl %eax, 8(%esp)
movl %ebx, 12(%esp)
call CAST_decrypt
movl 8(%esp), %eax
movl 12(%esp), %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl 16(%esp), %ecx
movl 20(%esp), %edx
xorl %eax, %ecx
@@ -888,52 +893,52 @@ CAST_cbc_encrypt:
addl $8, %esi
addl $8, %edi
subl $8, %ebp
- jnz .L016decrypt_loop
-.L015decrypt_finish:
+ jnz .L017decrypt_loop
+.L016decrypt_finish:
movl 52(%esp), %ebp
andl $7, %ebp
jz .L005finish
movl (%esi), %eax
movl 4(%esi), %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl %eax, 8(%esp)
movl %ebx, 12(%esp)
call CAST_decrypt
movl 8(%esp), %eax
movl 12(%esp), %ebx
.byte 15
-.byte 200 # bswapl %eax
+.byte 200
.byte 15
-.byte 203 # bswapl %ebx
+.byte 203
movl 16(%esp), %ecx
movl 20(%esp), %edx
xorl %eax, %ecx
xorl %ebx, %edx
movl (%esi), %eax
movl 4(%esi), %ebx
-.L017dj7:
+.L018dj7:
rorl $16, %edx
movb %dl, 6(%edi)
shrl $16, %edx
-.L018dj6:
+.L019dj6:
movb %dh, 5(%edi)
-.L019dj5:
+.L020dj5:
movb %dl, 4(%edi)
-.L020dj4:
+.L021dj4:
movl %ecx, (%edi)
- jmp .L021djend
-.L022dj3:
+ jmp .L022djend
+.L023dj3:
rorl $16, %ecx
movb %cl, 2(%edi)
sall $16, %ecx
-.L023dj2:
+.L024dj2:
movb %ch, 1(%esi)
-.L024dj1:
+.L025dj1:
movb %cl, (%esi)
-.L021djend:
+.L022djend:
jmp .L005finish
.align 16
.L005finish:
@@ -947,25 +952,15 @@ CAST_cbc_encrypt:
popl %ebp
ret
.align 16
-.L006cbc_enc_jmp_table:
- .long 0
- .long .L014ej1
- .long .L013ej2
- .long .L012ej3
- .long .L010ej4
- .long .L009ej5
- .long .L008ej6
- .long .L007ej7
-.align 16
-.L025cbc_dec_jmp_table:
+.L007cbc_enc_jmp_table:
.long 0
- .long .L024dj1
- .long .L023dj2
- .long .L022dj3
- .long .L020dj4
- .long .L019dj5
- .long .L018dj6
- .long .L017dj7
+ .long .L015ej1-.L006PIC_point
+ .long .L014ej2-.L006PIC_point
+ .long .L013ej3-.L006PIC_point
+ .long .L011ej4-.L006PIC_point
+ .long .L010ej5-.L006PIC_point
+ .long .L009ej6-.L006PIC_point
+ .long .L008ej7-.L006PIC_point
.L_CAST_cbc_encrypt_end:
.size CAST_cbc_encrypt,.L_CAST_cbc_encrypt_end-CAST_cbc_encrypt
.ident "desasm.pl"
OpenPOWER on IntegriCloud