File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -7474,18 +7474,18 @@ bool LibraryCallKit::inline_counterMode_AESCrypt(vmIntrinsics::ID id) {
74747474}
74757475
74767476// ------------------------------get_key_start_from_aescrypt_object-----------------------
7477- Node * LibraryCallKit::get_key_start_from_aescrypt_object (Node * aescrypt_object) {
7477+ Node* LibraryCallKit::get_key_start_from_aescrypt_object (Node* aescrypt_object) {
74787478 // MixColumns for decryption can be reduced by preprocessing MixColumns with round keys.
74797479 // Intel's extension is based on this optimization and AESCrypt generates round keys by preprocessing MixColumns.
74807480 // However, ppc64 vncipher processes MixColumns and requires the same round keys with encryption.
7481- // The ppc64, s390 and riscv64 stubs of encryption and decryption use the same round keys.
7481+ // The following platform specific stubs of encryption and decryption use the same round keys.
74827482#if defined(PPC64) || defined(S390) || defined(RISCV64)
74837483 const char * key_name = " sessionKe" ;
74847484#else
74857485 const char * key_name = " K" ;
7486- #endif // PPC64
7486+ #endif
74877487 Node* objAESCryptKey = load_field_from_object (aescrypt_object, key_name, " [I" );
7488- assert (objAESCryptKey != nullptr , " wrong version of com.sun.crypto.provider.AES_Crypt" );
7488+ assert (objAESCryptKey != nullptr , " wrong version of com.sun.crypto.provider.AES_Crypt" );
74897489 if (objAESCryptKey == nullptr ) return (Node *) nullptr ;
74907490
74917491 // now have the array, need to get the start address of the K array
You can’t perform that action at this time.
0 commit comments