Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
ed28aef8
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
ed28aef8
编写于
9月 06, 2011
作者:
A
Andy Polyakov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Padlock engine: make it independent of inline assembler.
上级
0486cce6
变更
9
展开全部
显示空白变更内容
内联
并排
Showing
9 changed file
with
1173 addition
and
815 deletion
+1173
-815
Configure
Configure
+30
-24
Makefile.org
Makefile.org
+3
-1
TABLE
TABLE
+183
-0
crypto/perlasm/x86masm.pl
crypto/perlasm/x86masm.pl
+7
-0
crypto/perlasm/x86nasm.pl
crypto/perlasm/x86nasm.pl
+7
-0
engines/Makefile
engines/Makefile
+11
-2
engines/asm/e_padlock-x86.pl
engines/asm/e_padlock-x86.pl
+424
-0
engines/asm/e_padlock-x86_86.pl
engines/asm/e_padlock-x86_86.pl
+327
-0
engines/e_padlock.c
engines/e_padlock.c
+181
-788
未找到文件。
Configure
浏览文件 @
ed28aef8
...
...
@@ -123,24 +123,24 @@ my $tlib="-lnsl -lsocket";
my $bits1="THIRTY_TWO_BIT ";
my $bits2="SIXTY_FOUR_BIT ";
my $x86_asm="x86cpuid.o:bn-586.o co-586.o x86-mont.o x86-gf2m.o:des-586.o crypt586.o:aes-586.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o:cmll-x86.o:ghash-x86.o";
my $x86_asm="x86cpuid.o:bn-586.o co-586.o x86-mont.o x86-gf2m.o:des-586.o crypt586.o:aes-586.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o:cmll-x86.o:ghash-x86.o
:e_padlock-x86.o
";
my $x86_elf_asm="$x86_asm:elf";
my $x86_64_asm="x86_64cpuid.o:x86_64-gcc.o x86_64-mont.o x86_64-mont5.o x86_64-gf2m.o modexp512-x86_64.o::aes-x86_64.o aesni-x86_64.o aesni-sha1-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o rc4-md5-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:ghash-x86_64.o";
my $ia64_asm="ia64cpuid.o:bn-ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o::rc4-ia64.o rc4_skey.o:::::ghash-ia64.o:void";
my $sparcv9_asm="sparcv9cap.o sparccpuid.o:bn-sparcv9.o sparcv9-mont.o sparcv9a-mont.o:des_enc-sparc.o fcrypt_b.o:aes_core.o aes_cbc.o aes-sparcv9.o:::sha1-sparcv9.o sha256-sparcv9.o sha512-sparcv9.o:::::::ghash-sparcv9.o:void";
my $sparcv8_asm=":sparcv8.o:des_enc-sparc.o fcrypt_b.o::::::::::::void";
my $alpha_asm="alphacpuid.o:bn_asm.o alpha-mont.o:::::sha1-alpha.o:::::::ghash-alpha.o:void";
my $mips32_asm=":bn-mips.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o:::::::";
my $mips64_asm=":bn-mips.o mips-mont.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o sha512-mips.o:::::::";
my $s390x_asm="s390xcap.o s390xcpuid.o:bn-s390x.o s390x-mont.o s390x-gf2m.o::aes_ctr.o aes-s390x.o:::sha1-s390x.o sha256-s390x.o sha512-s390x.o::rc4-s390x.o:::::ghash-s390x.o";
my $armv4_asm="armcap.o armv4cpuid.o:bn_asm.o armv4-mont.o armv4-gf2m.o::aes_cbc.o aes-armv4.o:::sha1-armv4-large.o sha256-armv4.o sha512-armv4.o:::::::ghash-armv4.o:void";
my $parisc11_asm="pariscid.o:bn_asm.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o:32";
my $parisc20_asm="pariscid.o:pa-risc2W.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o:64";
my $ppc32_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o:::::::";
my $ppc64_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o sha512-ppc.o:::::::";
my $no_asm="::::::::::::::void";
my $x86_64_asm="x86_64cpuid.o:x86_64-gcc.o x86_64-mont.o x86_64-mont5.o x86_64-gf2m.o modexp512-x86_64.o::aes-x86_64.o aesni-x86_64.o aesni-sha1-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o rc4-md5-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:ghash-x86_64.o
:e_padlock-x86_64.o
";
my $ia64_asm="ia64cpuid.o:bn-ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o::rc4-ia64.o rc4_skey.o:::::ghash-ia64.o:
:
void";
my $sparcv9_asm="sparcv9cap.o sparccpuid.o:bn-sparcv9.o sparcv9-mont.o sparcv9a-mont.o:des_enc-sparc.o fcrypt_b.o:aes_core.o aes_cbc.o aes-sparcv9.o:::sha1-sparcv9.o sha256-sparcv9.o sha512-sparcv9.o:::::::ghash-sparcv9.o:
:
void";
my $sparcv8_asm=":sparcv8.o:des_enc-sparc.o fcrypt_b.o::::::::::::
:
void";
my $alpha_asm="alphacpuid.o:bn_asm.o alpha-mont.o:::::sha1-alpha.o:::::::ghash-alpha.o:
:
void";
my $mips32_asm=":bn-mips.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o:::::::
:
";
my $mips64_asm=":bn-mips.o mips-mont.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o sha512-mips.o:::::::
:
";
my $s390x_asm="s390xcap.o s390xcpuid.o:bn-s390x.o s390x-mont.o s390x-gf2m.o::aes_ctr.o aes-s390x.o:::sha1-s390x.o sha256-s390x.o sha512-s390x.o::rc4-s390x.o:::::ghash-s390x.o
:
";
my $armv4_asm="armcap.o armv4cpuid.o:bn_asm.o armv4-mont.o armv4-gf2m.o::aes_cbc.o aes-armv4.o:::sha1-armv4-large.o sha256-armv4.o sha512-armv4.o:::::::ghash-armv4.o:
:
void";
my $parisc11_asm="pariscid.o:bn_asm.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o:
:
32";
my $parisc20_asm="pariscid.o:pa-risc2W.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o:
:
64";
my $ppc32_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o:::::::
:
";
my $ppc64_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o sha512-ppc.o:::::::
:
";
my $no_asm="::::::::::::::
:
void";
# As for $BSDthreads. Idea is to maintain "collective" set of flags,
# which would cover all BSD flavors. -pthread applies to them all,
...
...
@@ -151,7 +151,7 @@ my $no_asm="::::::::::::::void";
# seems to be sufficient?
my $BSDthreads="-pthread -D_THREAD_SAFE -D_REENTRANT";
#config-string $cc : $cflags : $unistd : $thread_cflag : $sys_id : $lflags : $bn_ops : $cpuid_obj : $bn_obj : $des_obj : $aes_obj : $bf_obj : $md5_obj : $sha1_obj : $cast_obj : $rc4_obj : $rmd160_obj : $rc5_obj : $wp_obj : $cmll_obj : $modes_obj : $dso_scheme : $shared_target : $shared_cflag : $shared_ldflag : $shared_extension : $ranlib : $arflags : $multilib
#config-string $cc : $cflags : $unistd : $thread_cflag : $sys_id : $lflags : $bn_ops : $cpuid_obj : $bn_obj : $des_obj : $aes_obj : $bf_obj : $md5_obj : $sha1_obj : $cast_obj : $rc4_obj : $rmd160_obj : $rc5_obj : $wp_obj : $cmll_obj : $modes_obj : $
engines_obj : $
dso_scheme : $shared_target : $shared_cflag : $shared_ldflag : $shared_extension : $ranlib : $arflags : $multilib
my %table=(
# File 'TABLE' (created by 'make TABLE') contains the data from this list,
...
...
@@ -188,7 +188,7 @@ my %table=(
"debug-linux-ppro","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -mcpu=pentiumpro -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
"debug-linux-elf","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -march=i486 -Wall::-D_REENTRANT::-lefence -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"debug-linux-elf-noefence","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -march=i486 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"debug-linux-ia32-aes", "gcc:-DAES_EXPERIMENTAL -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes_x86core.o aes_cbc.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o::ghash-x86.o:elf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"debug-linux-ia32-aes", "gcc:-DAES_EXPERIMENTAL -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes_x86core.o aes_cbc.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o::ghash-x86.o:e
_padlock-x86.o:e
lf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"debug-linux-generic32","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"debug-linux-generic64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"debug-linux-x86_64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
...
...
@@ -294,8 +294,8 @@ my %table=(
"hpux-parisc-cc-o4","cc:-Ae +O4 +ESlit -z -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY::-D_REENTRANT::-ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux-parisc-gcc","gcc:-O3 -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-Wl,+s -ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${no_asm}:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux-parisc1_1-gcc","gcc:-O3 -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-Wl,+s -ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${parisc11_asm}:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux-parisc2-gcc","gcc:-march=2.0 -O3 -DB_ENDIAN -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL DES_RISC1::pa-risc2.o:::::::::::::void:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux64-parisc2-gcc","gcc:-O3 -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o:::::::::::::void:dlfcn:hpux-shared:-fpic:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
"hpux-parisc2-gcc","gcc:-march=2.0 -O3 -DB_ENDIAN -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL DES_RISC1::pa-risc2.o:::::::::::::
:
void:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux64-parisc2-gcc","gcc:-O3 -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o:::::::::::::
:
void:dlfcn:hpux-shared:-fpic:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
# More attempts at unified 10.X and 11.X targets for HP C compiler.
#
...
...
@@ -303,7 +303,7 @@ my %table=(
# Kevin Steves <ks@hp.se>
"hpux-parisc-cc","cc:+O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux-parisc1_1-cc","cc:+DA1.1 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${parisc11_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa1.1",
"hpux-parisc2-cc","cc:+DA2.0 +DS2.0 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2.o:::::::::::::void:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux-parisc2-cc","cc:+DA2.0 +DS2.0 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2.o:::::::::::::
:
void:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
"hpux64-parisc2-cc","cc:+DD64 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${parisc20_asm}:dlfcn:hpux-shared:+Z:+DD64 -b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
# HP/UX IA-64 targets
...
...
@@ -512,9 +512,9 @@ my %table=(
# Visual C targets
#
# Win64 targets, WIN64I denotes IA-64 and WIN64A - AMD64
"VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o:ias:win32",
"VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o:
:
ias:win32",
"VC-WIN64A","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o:ias:win32",
"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o:
:
ias:win32",
"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
# x86 Win32 target defaults to ANSI API, if you want UNICODE, complement
# 'perl Configure VC-WIN32' with '-DUNICODE -D_UNICODE'
...
...
@@ -637,6 +637,7 @@ my $idx_rc5_obj = $idx++;
my $idx_wp_obj = $idx++;
my $idx_cmll_obj = $idx++;
my $idx_modes_obj = $idx++;
my $idx_engines_obj = $idx++;
my $idx_perlasm_scheme = $idx++;
my $idx_dso_scheme = $idx++;
my $idx_shared_target = $idx++;
...
...
@@ -1212,6 +1213,7 @@ my $rc5_obj = $fields[$idx_rc5_obj];
my $wp_obj = $fields[$idx_wp_obj];
my $cmll_obj = $fields[$idx_cmll_obj];
my $modes_obj = $fields[$idx_modes_obj];
my $engines_obj = $fields[$idx_engines_obj];
my $perlasm_scheme = $fields[$idx_perlasm_scheme];
my $dso_scheme = $fields[$idx_dso_scheme];
my $shared_target = $fields[$idx_shared_target];
...
...
@@ -1372,7 +1374,7 @@ if ($no_asm)
{
$cpuid_obj=$bn_obj=
$des_obj=$aes_obj=$bf_obj=$cast_obj=$rc4_obj=$rc5_obj=$cmll_obj=
$modes_obj=$sha1_obj=$md5_obj=$rmd160_obj=$wp_obj="";
$modes_obj=$sha1_obj=$md5_obj=$rmd160_obj=$wp_obj=
$engines_obj=
"";
$cflags=~s/\-D[BL]_ENDIAN// if ($fips);
$thread_cflags=~s/\-D[BL]_ENDIAN// if ($fips);
}
...
...
@@ -1701,6 +1703,7 @@ while (<IN>)
s/^WP_ASM_OBJ=.*$/WP_ASM_OBJ= $wp_obj/;
s/^CMLL_ENC=.*$/CMLL_ENC= $cmll_obj/;
s/^MODES_ASM_OBJ.=*$/MODES_ASM_OBJ= $modes_obj/;
s/^ENGINES_ASM_OBJ.=*$/ENGINES_ASM_OBJ= $engines_obj/;
s/^PERLASM_SCHEME=.*$/PERLASM_SCHEME= $perlasm_scheme/;
s/^PROCESSOR=.*/PROCESSOR= $processor/;
s/^ARFLAGS=.*/ARFLAGS= $arflags/;
...
...
@@ -1773,6 +1776,7 @@ print "SHA1_OBJ_ASM =$sha1_obj\n";
print "RMD160_OBJ_ASM=$rmd160_obj\n";
print "CMLL_ENC =$cmll_obj\n";
print "MODES_OBJ =$modes_obj\n";
print "ENGINES_OBJ =$engines_obj\n";
print "PROCESSOR =$processor\n";
print "RANLIB =$ranlib\n";
print "ARFLAGS =$arflags\n";
...
...
@@ -2192,7 +2196,8 @@ sub print_table_entry
(my $cc,my $cflags,my $unistd,my $thread_cflag,my $sys_id,my $lflags,
my $bn_ops,my $cpuid_obj,my $bn_obj,my $des_obj,my $aes_obj, my $bf_obj,
my $md5_obj,my $sha1_obj,my $cast_obj,my $rc4_obj,my $rmd160_obj,
my $rc5_obj,my $wp_obj,my $cmll_obj,my $modes_obj,my $perlasm_scheme,my $dso_scheme,my $shared_target,my $shared_cflag,
my $rc5_obj,my $wp_obj,my $cmll_obj,my $modes_obj, my $engines_obj,
my $perlasm_scheme,my $dso_scheme,my $shared_target,my $shared_cflag,
my $shared_ldflag,my $shared_extension,my $ranlib,my $arflags,my $multilib)=
split(/\s*:\s*/,$table{$target} . ":" x 30 , -1);
...
...
@@ -2220,6 +2225,7 @@ sub print_table_entry
\$wp_obj = $wp_obj
\$cmll_obj = $cmll_obj
\$modes_obj = $modes_obj
\$engines_obj = $engines_obj
\$perlasm_scheme = $perlasm_scheme
\$dso_scheme = $dso_scheme
\$shared_target= $shared_target
...
...
Makefile.org
浏览文件 @
ed28aef8
...
...
@@ -100,6 +100,7 @@ RMD160_ASM_OBJ=
WP_ASM_OBJ
=
CMLL_ENC
=
MODES_ASM_OBJ
=
ENGINES_ASM_OBJ
=
PERLASM_SCHEME
=
# KRB5 stuff
...
...
@@ -232,6 +233,7 @@ BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
RMD160_ASM_OBJ
=
'
$(RMD160_ASM_OBJ)
'
\
WP_ASM_OBJ
=
'
$(WP_ASM_OBJ)
'
\
MODES_ASM_OBJ
=
'
$(MODES_ASM_OBJ)
'
\
ENGINES_ASM_OBJ
=
'
$(ENGINES_ASM_OBJ)
'
\
PERLASM_SCHEME
=
'
$(PERLASM_SCHEME)
'
\
FIPSLIBDIR
=
'
${FIPSLIBDIR}
'
\
FIPSCANLIB
=
"
$
${
FIPSCANLIB
:-
$(FIPSCANLIB)
}
"
\
...
...
@@ -375,7 +377,7 @@ build_crypto:
build_ssl
:
@
dir
=
ssl
;
target
=
all
;
$(BUILD_ONE_CMD)
build_engines
:
@
dir
=
engines
;
target
=
all
;
$(BUILD_ONE_CMD)
@
dir
=
engines
;
target
=
all
;
AS
=
'
$(CC)
-c'
;
export
AS
;
$(BUILD_ONE_CMD)
build_apps
:
@
dir
=
apps
;
target
=
all
;
$(BUILD_ONE_CMD)
build_tests
:
...
...
TABLE
浏览文件 @
ed28aef8
此差异已折叠。
点击以展开。
crypto/perlasm/x86masm.pl
浏览文件 @
ed28aef8
...
...
@@ -186,4 +186,11 @@ ___
sub
::
dataseg
{
push
(
@out
,"
$segment
\t
ENDS
\n
_DATA
\t
SEGMENT
\n
");
$segment
=
"
_DATA
";
}
sub
::
safeseh
{
my
$nm
=
shift
;
push
(
@out
,"
IF
\@
Version GE 710
\n
");
push
(
@out
,"
.SAFESEH
"
.&::
LABEL
(
$nm
,
$nmdecor
.
$nm
)
.
"
\n
");
push
(
@out
,"
ENDIF
\n
");
}
1
;
crypto/perlasm/x86nasm.pl
浏览文件 @
ed28aef8
...
...
@@ -167,4 +167,11 @@ sub ::dataseg
else
{
push
(
@out
,"
section
\t
.data align=4
\n
");
}
}
sub
::
safeseh
{
my
$nm
=
shift
;
push
(
@out
,"
%if __NASM_VERSION_ID__ >= 0x02030000
\n
");
push
(
@out
,"
safeseh
"
.&::
LABEL
(
$nm
,
$nmdecor
.
$nm
)
.
"
\n
");
push
(
@out
,"
%endif
\n
");
}
1
;
engines/Makefile
浏览文件 @
ed28aef8
...
...
@@ -16,10 +16,13 @@ RECURSIVE_MAKE= [ -z "$(ENGDIRS)" ] || for i in $(ENGDIRS) ; do \
$(MAKE)
-e
TOP
=
../..
DIR
=
$$
i
$$
target
)
||
exit
1
;
\
done
;
ENGINES_ASM_OBJ
=
PEX_LIBS
=
EX_LIBS
=
CFLAGS
=
$(INCLUDES)
$(CFLAG)
ASFLAGS
=
$(INCLUDES)
$(ASFLAG)
GENERAL
=
Makefile engines.com install.com engine_vector.mar
TEST
=
...
...
@@ -49,7 +52,8 @@ LIBOBJ= e_4758cca.o \
e_sureware.o
\
e_ubsec.o
\
e_padlock.o
\
e_capi.o
e_capi.o
\
$(ENGINES_ASM_OBJ)
SRC
=
$(LIBSRC)
...
...
@@ -77,7 +81,7 @@ lib: $(LIBOBJ)
set
-e
;
\
for
l
in
$(LIBNAMES)
;
do
\
$(MAKE)
-f
../Makefile.shared
-e
\
LIBNAME
=
$$
l
LIBEXTRAS
=
e_
$$
l.o
\
LIBNAME
=
$$
l
LIBEXTRAS
=
"e_
$$
l*.o"
\
LIBDEPS
=
'-L.. -lcrypto
$(EX_LIBS)
'
\
link_o.
$(SHLIB_TARGET)
;
\
done
;
\
...
...
@@ -87,6 +91,11 @@ lib: $(LIBOBJ)
fi
;
\
touch
lib
e_padlock-x86.s
:
asm/e_padlock-x86.pl
$(PERL)
asm/e_padlock-x86.pl
$(PERLASM_SCHEME)
$(CFLAGS)
$(PROCESSOR)
>
$@
e_padlock-x86_64.s
:
asm/e_padlock-x86_64.pl
$(PERL)
asm/e_padlock-x86_64.pl
$(PERLASM_SCHEME)
>
$@
subdirs
:
echo
$(EDIRS)
@
target
=
all
;
$(RECURSIVE_MAKE)
...
...
engines/asm/e_padlock-x86.pl
0 → 100644
浏览文件 @
ed28aef8
#!/usr/bin/env perl
# ====================================================================
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
# project. The module is, however, dual licensed under OpenSSL and
# CRYPTOGAMS licenses depending on where you obtain it. For further
# details see http://www.openssl.org/~appro/cryptogams/.
# ====================================================================
# September 2011
#
# Assembler helpers for Padlock engine. Compared to original engine
# version relying on inline assembler and compiled with gcc 3.4.6 it
# was measured to provide ~100% improvement on misaligned data in ECB
# mode and ~75% in CBC mode. For aligned data improvement can be
# observed for short inputs only, e.g. 45% for 64-byte messages in
# ECB mode, 20% in CBC. Difference in performance for aligned vs.
# misaligned data depends on misalignment and is either ~1.8x or
# ~2.9x. These are approximately same factors as for hardware support,
# so there is little reason to rely on the latter. It might actually
# hurt performance in mixture of aligned and misaligned buffers,
# because a) if you choose to flip 'align' flag on per-buffer basis,
# then you'd have to reload key context; b) if you choose to set
# 'align' flag permanently, it limits performance for aligned data
# to ~1/2. All results were collected on 1.5GHz C7.
$
0
=~
m/(.*[\/\\])[^\/\\]+$/
;
$dir
=
$
1
;
push
(
@INC
,"
${dir}
","
${dir}
../../crypto/perlasm
");
require
"
x86asm.pl
";
&asm_init
(
$ARGV
[
0
],
$
0
);
$PADLOCK_CHUNK
=
512
;
# Must be a power of 2 larger than 16
$ctx
=
"
edx
";
$out
=
"
edi
";
$inp
=
"
esi
";
$len
=
"
ecx
";
$chunk
=
"
ebx
";
&function_begin_B
("
padlock_capability
");
&push
("
ebx
");
&pushf
();
&pop
("
eax
");
&mov
("
ecx
","
eax
");
&xor
("
eax
",
1
<<
21
);
&push
("
eax
");
&popf
();
&pushf
();
&pop
("
eax
");
&xor
("
ecx
","
eax
");
&xor
("
eax
","
eax
");
&bt
("
ecx
",
21
);
&jnc
(
&label
("
noluck
"));
&cpuid
();
&xor
("
eax
","
eax
");
&cmp
("
ebx
","
0x
"
.
unpack
("
H*
",'
tneC
'));
&jne
(
&label
("
noluck
"));
&cmp
("
edx
","
0x
"
.
unpack
("
H*
",'
Hrua
'));
&jne
(
&label
("
noluck
"));
&cmp
("
ecx
","
0x
"
.
unpack
("
H*
",'
slua
'));
&jne
(
&label
("
noluck
"));
&mov
("
eax
",
0xC0000000
);
&cpuid
();
&mov
("
edx
","
eax
");
&xor
("
eax
","
eax
");
&cmp
("
edx
",
0xC0000001
);
&jb
(
&label
("
noluck
"));
&mov
("
eax
",
1
);
&cpuid
();
&or
("
eax
",
0x0f
);
&xor
("
ebx
","
ebx
");
&and
("
eax
",
0x0fff
);
&cmp
("
eax
",
0x06ff
);
# check for Nano
&sete
("
bl
");
&mov
("
eax
",
0xC0000001
);
&push
("
ebx
");
&cpuid
();
&pop
("
ebx
");
&mov
("
eax
","
edx
");
&shl
("
ebx
",
4
);
# bit#4 denotes Nano
&and
("
eax
",
0xffffffef
);
&or
("
eax
","
ebx
")
&set_label
("
noluck
");
&pop
("
ebx
");
&ret
();
&function_end_B
("
padlock_capability
")
&function_begin_B
("
padlock_key_bswap
");
&mov
("
edx
",
&wparam
(
0
));
&mov
("
ecx
",
&DWP
(
240
,"
edx
"));
&set_label
("
bswap_loop
");
&mov
("
eax
",
&DWP
(
0
,"
edx
"));
&bswap
("
eax
");
&mov
(
&DWP
(
0
,"
edx
"),"
eax
");
&lea
("
edx
",
&DWP
(
4
,"
edx
"));
&sub
("
ecx
",
1
);
&jnz
(
&label
("
bswap_loop
"));
&ret
();
&function_end_B
("
padlock_key_bswap
");
# This is heuristic key context tracing. At first one
# believes that one should use atomic swap instructions,
# but it's not actually necessary. Point is that if
# padlock_saved_context was changed by another thread
# after we've read it and before we compare it with ctx,
# our key *shall* be reloaded upon thread context switch
# and we are therefore set in either case...
&static_label
("
padlock_saved_context
");
&function_begin_B
("
padlock_verify_context
");
&mov
(
$ctx
,
&wparam
(
0
));
&lea
("
eax
",
&DWP
("
padlock_saved_context-
"
.
&label
("
verify_pic_point
")));
&pushf
();
&call
("
_padlock_verify_ctx
");
&set_label
("
verify_pic_point
");
&lea
("
esp
",
&DWP
(
4
,"
esp
"));
&ret
();
&function_end_B
("
padlock_verify_context
");
&function_begin_B
("
_padlock_verify_ctx
");
&add
("
eax
",
&DWP
(
0
,"
esp
"));
# &padlock_saved_context
&bt
(
&DWP
(
4
,"
esp
"),
30
);
# eflags
&jnc
(
&label
("
verified
"));
&cmp
(
$ctx
,
&DWP
(
0
,"
eax
"));
&je
(
&label
("
verified
"));
&pushf
();
&popf
();
&set_label
("
verified
");
&mov
(
&DWP
(
0
,"
eax
"),
$ctx
);
&ret
();
&function_end_B
("
_padlock_verify_ctx
");
&function_begin_B
("
padlock_reload_key
");
&pushf
();
&popf
();
&ret
();
&function_end_B
("
padlock_reload_key
");
&function_begin_B
("
padlock_aes_block
");
&push
("
edi
");
&push
("
esi
");
&push
("
ebx
");
&mov
(
$out
,
&wparam
(
0
));
# must be 16-byte aligned
&mov
(
$inp
,
&wparam
(
1
));
# must be 16-byte aligned
&mov
(
$ctx
,
&wparam
(
2
));
&mov
(
$len
,
1
);
&lea
("
ebx
",
&DWP
(
32
,
$ctx
));
# key
&lea
(
$ctx
,
&DWP
(
16
,
$ctx
));
# control word
&data_byte
(
0xf3
,
0x0f
,
0xa7
,
0xc8
);
# rep xcryptecb
&pop
("
ebx
");
&pop
("
esi
");
&pop
("
edi
");
&ret
();
&function_end_B
("
padlock_aes_block
");
sub
generate_mode
{
my
(
$mode
,
$opcode
)
=
@_
;
# int padlock_$mode_encrypt(void *out, const void *inp,
# struct padlock_cipher_data *ctx, size_t len);
&function_begin
("
padlock_
${mode}
_encrypt
");
&mov
(
$out
,
&wparam
(
0
));
&mov
(
$inp
,
&wparam
(
1
));
&mov
(
$ctx
,
&wparam
(
2
));
&mov
(
$len
,
&wparam
(
3
));
&test
(
$ctx
,
15
);
&jnz
(
&label
("
${mode}
_abort
"));
&test
(
$len
,
15
);
&jnz
(
&label
("
${mode}
_abort
"));
&lea
("
eax
",
&DWP
("
padlock_saved_context-
"
.
&label
("
${mode}
_pic_point
")));
&pushf
();
&cld
();
&call
("
_padlock_verify_ctx
");
&set_label
("
${mode}
_pic_point
");
&lea
(
$ctx
,
&DWP
(
16
,
$ctx
));
# control word
&xor
("
eax
","
eax
");
if
(
$mode
eq
"
ctr16
")
{
&movdqa
("
xmm0
",
&QWP
(
-
16
,
$ctx
));
# load iv
}
else
{
&xor
("
ebx
","
ebx
");
&test
(
&DWP
(
0
,
$ctx
),
1
<<
5
);
# align bit in control word
&jnz
(
&label
("
${mode}
_aligned
"));
&test
(
$out
,
0x0f
);
&setz
("
al
");
# !out_misaligned
&test
(
$inp
,
0x0f
);
&setz
("
bl
");
# !inp_misaligned
&test
("
eax
","
ebx
");
&jnz
(
&label
("
${mode}
_aligned
"));
&neg
("
eax
");
}
&mov
(
$chunk
,
$PADLOCK_CHUNK
);
¬
("
eax
");
# out_misaligned?-1:0
&lea
("
ebp
",
&DWP
(
-
24
,"
esp
"));
&cmp
(
$len
,
$chunk
);
&cmovc
(
$chunk
,
$len
);
# chunk=len>PADLOCK_CHUNK?PADLOCK_CHUNK:len
&and
("
eax
",
$chunk
);
# out_misaligned?chunk:0
&mov
(
$chunk
,
$len
);
&neg
("
eax
");
&and
(
$chunk
,
$PADLOCK_CHUNK
-
1
);
# chunk=len%PADLOCK_CHUNK
&lea
("
esp
",
&DWP
(
0
,"
eax
","
ebp
"));
# alloca
&and
("
esp
",
-
16
);
&jmp
(
&label
("
${mode}
_loop
"));
&set_label
("
${mode}
_loop
",
16
);
&mov
(
&DWP
(
0
,"
ebp
"),
$out
);
# save parameters
&mov
(
&DWP
(
4
,"
ebp
"),
$inp
);
&mov
(
&DWP
(
8
,"
ebp
"),
$len
);
&mov
(
$len
,
$chunk
);
&mov
(
&DWP
(
12
,"
ebp
"),
$chunk
);
# chunk
if
(
$mode
eq
"
ctr16
")
{
&pextrw
("
ecx
","
xmm0
",
7
);
# borrow $len
&mov
(
$inp
,
1
);
&xor
(
$out
,
$out
);
&xchg
("
ch
","
cl
");
&set_label
("
${mode}
_prepare
");
&movdqa
(
&QWP
(
0
,"
esp
",
$out
),"
xmm0
");
&lea
("
eax
",
&DWP
(
0
,"
ecx
",
$inp
));
&xchg
("
ah
","
al
");
&lea
(
$out
,
&DWP
(
16
,
$out
));
&pinsrw
("
xmm0
","
eax
",
7
);
&lea
(
$inp
,
&DWP
(
1
,
$inp
));
&cmp
(
$out
,
$chunk
);
&jb
(
&label
("
${mode}
_prepare
"));
&lea
(
$inp
,
&DWP
(
0
,"
esp
"));
&lea
(
$out
,
&DWP
(
0
,"
esp
"));
&mov
(
$len
,
$chunk
);
}
else
{
&test
(
$out
,
0x0f
);
# out_misaligned
&cmovnz
(
$out
,"
esp
");
&test
(
$inp
,
0x0f
);
# inp_misaligned
&jz
(
&label
("
${mode}
_inp_aligned
"));
&shr
(
$len
,
2
);
&data_byte
(
0xf3
,
0xa5
);
# rep movsl
&sub
(
$out
,
$chunk
);
&mov
(
$len
,
$chunk
);
&mov
(
$inp
,
$out
);
&set_label
("
${mode}
_inp_aligned
");
}
&lea
("
eax
",
&DWP
(
-
16
,
$ctx
));
# ivp
&lea
("
ebx
",
&DWP
(
16
,
$ctx
));
# key
&shr
(
$len
,
4
);
# len/=AES_BLOCK_SIZE
&data_byte
(
0xf3
,
0x0f
,
0xa7
,
$opcode
);
# rep xcrypt*
if
(
$mode
!~
/ecb|ctr/
)
{
&movdqa
("
xmm0
",
&QWP
(
0
,"
eax
"));
&movdqa
(
&DWP
(
-
16
,
$ctx
),"
xmm0
");
# copy [or refresh] iv
}
&mov
(
$out
,
&DWP
(
0
,"
ebp
"));
# restore parameters
&mov
(
$chunk
,
&DWP
(
12
,"
ebp
"));
if
(
$mode
eq
"
ctr16
")
{
&mov
(
$inp
,
&DWP
(
4
,"
ebp
"));
&xor
(
$len
,
$len
);
&set_label
("
${mode}
_xor
");
&movdqu
("
xmm1
",
&QWP
(
0
,
$inp
,
$len
));
&lea
(
$len
,
&DWP
(
16
,
$len
));
&pxor
("
xmm1
",
&QWP
(
-
16
,"
esp
",
$len
));
&movdqu
(
&QWP
(
-
16
,
$out
,
$len
),"
xmm1
");
&cmp
(
$len
,
$chunk
);
&jb
(
&label
("
${mode}
_xor
"));
}
else
{
&test
(
$out
,
0x0f
);
&jz
(
&label
("
${mode}
_out_aligned
"));
&mov
(
$len
,
$chunk
);
&shr
(
$len
,
2
);
&lea
(
$inp
,
&DWP
(
0
,"
esp
"));
&data_byte
(
0xf3
,
0xa5
);
# rep movsl
&sub
(
$out
,
$chunk
);
&set_label
("
${mode}
_out_aligned
");
&mov
(
$inp
,
&DWP
(
4
,"
ebp
"));
}
&mov
(
$len
,
&DWP
(
8
,"
ebp
"));
&add
(
$out
,
$chunk
);
&add
(
$inp
,
$chunk
);
&sub
(
$len
,
$chunk
);
&mov
(
$chunk
,
$PADLOCK_CHUNK
);
&jnz
(
&label
("
${mode}
_loop
"));
if
(
$mode
eq
"
ctr16
")
{
&movdqa
(
&QWP
(
-
16
,
$ctx
),"
xmm0
");
# write out iv
&pxor
("
xmm0
","
xmm0
");
&pxor
("
xmm1
","
xmm1
");
}
else
{
&test
(
$out
,
0x0f
);
# out_misaligned
&jz
(
&label
("
${mode}
_done
"));
}
&mov
(
$len
,"
ebp
");
&mov
(
$out
,"
esp
");
&sub
(
$len
,"
esp
");
&xor
("
eax
","
eax
");
&shr
(
$len
,
2
);
&data_byte
(
0xf3
,
0xab
);
# rep stosl
&set_label
("
${mode}
_done
");
&lea
("
esp
",
&DWP
(
24
,"
ebp
"));
if
(
$mode
ne
"
ctr16
")
{
&jmp
(
&label
("
${mode}
_exit
"));
&set_label
("
${mode}
_aligned
",
16
);
&lea
("
eax
",
&DWP
(
-
16
,
$ctx
));
# ivp
&lea
("
ebx
",
&DWP
(
16
,
$ctx
));
# key
&shr
(
$len
,
4
);
# len/=AES_BLOCK_SIZE
&data_byte
(
0xf3
,
0x0f
,
0xa7
,
$opcode
);
# rep xcrypt*
if
(
$mode
ne
"
ecb
")
{
&movdqa
("
xmm0
",
&QWP
(
0
,"
eax
"));
&movdqa
(
&DWP
(
-
16
,
$ctx
),"
xmm0
");
# copy [or refresh] iv
}
&set_label
("
${mode}
_exit
");
}
&mov
("
eax
",
1
);
&lea
("
esp
",
&DWP
(
4
,"
esp
"));
# popf
&set_label
("
${mode}
_abort
");
&function_end
("
padlock_
${mode}
_encrypt
");
}
&generate_mode
("
ecb
",
0xc8
);
&generate_mode
("
cbc
",
0xd0
);
&generate_mode
("
cfb
",
0xe0
);
&generate_mode
("
ofb
",
0xe8
);
&generate_mode
("
ctr16
",
0xc8
);
# yes, it implements own ctr with ecb opcode,
# because hardware ctr was introduced later
# and even has errata on certain CPU stepping.
# own implementation *always* works...
&function_begin_B
("
padlock_xstore
");
&push
("
edi
");
&mov
("
edi
",
&wparam
(
0
));
&mov
("
edx
",
&wparam
(
1
));
&data_byte
(
0x0f
,
0xa7
,
0xc0
);
# xstore
&pop
("
edi
");
&ret
();
&function_end_B
("
padlock_xstore
");
&function_begin_B
("
_win32_segv_handler
");
&mov
("
eax
",
1
);
# ExceptionContinueSearch
&mov
("
edx
",
&wparam
(
0
));
# *ExceptionRecord
&mov
("
ecx
",
&wparam
(
2
));
# *ContextRecord
&cmp
(
&DWP
(
0
,"
edx
"),
0xC0000005
)
# ExceptionRecord->ExceptionCode == STATUS_ACCESS_VIOLATION
&jne
(
&label
("
ret
"));
&add
(
&DWP
(
184
,"
ecx
"),
4
);
# skip over rep sha*
&mov
("
eax
",
0
);
# ExceptionContinueExecution
&set_label
("
ret
");
&ret
();
&function_end_B
("
_win32_segv_handler
");
&safeseh
("
_win32_segv_handler
")
if
(
$
::
win32
);
&function_begin_B
("
padlock_sha1_oneshot
");
&push
("
edi
");
&push
("
esi
");
&xor
("
eax
","
eax
");
if
(
$
::
win32
or
$
::
coff
)
{
&push
(
&::
islabel
("
_win32_segv_handler
"));
&data_byte
(
0x64
,
0xff
,
0x30
);
# push %fs:(%eax)
&data_byte
(
0x64
,
0x89
,
0x20
);
# mov %esp,%fs:(%eax)
}
&mov
("
edi
",
&wparam
(
0
));
&mov
("
esi
",
&wparam
(
1
));
&mov
("
ecx
",
&wparam
(
2
));
&data_byte
(
0xf3
,
0x0f
,
0xa6
,
0xc8
);
# rep xsha1
if
(
$
::
win32
or
$
::
coff
)
{
&data_byte
(
0x64
,
0x8f
,
0x05
,
0
,
0
,
0
,
0
);
# pop %fs:0
&lea
("
esp
",
&DWP
(
4
,"
esp
"));
}
&pop
("
esi
");
&pop
("
edi
");
&ret
();
&function_end_B
("
padlock_sha1_oneshot
");
&function_begin_B
("
padlock_sha1
");
&push
("
edi
");
&push
("
esi
");
&mov
("
eax
",
-
1
);
&mov
("
edi
",
&wparam
(
0
));
&mov
("
esi
",
&wparam
(
1
));
&mov
("
ecx
",
&wparam
(
2
));
&data_byte
(
0xf3
,
0x0f
,
0xa6
,
0xc8
);
# rep xsha1
&pop
("
esi
");
&pop
("
edi
");
&ret
();
&function_end_B
("
padlock_sha1
");
&function_begin_B
("
padlock_sha256_oneshot
");
&push
("
edi
");
&push
("
esi
");
&xor
("
eax
","
eax
");
if
(
$
::
win32
or
$
::
coff
)
{
&push
(
&::
islabel
("
_win32_segv_handler
"));
&data_byte
(
0x64
,
0xff
,
0x30
);
# push %fs:(%eax)
&data_byte
(
0x64
,
0x89
,
0x20
);
# mov %esp,%fs:(%eax)
}
&mov
("
edi
",
&wparam
(
0
));
&mov
("
esi
",
&wparam
(
1
));
&mov
("
ecx
",
&wparam
(
2
));
&data_byte
(
0xf3
,
0x0f
,
0xa6
,
0xd0
);
# rep xsha256
if
(
$
::
win32
or
$
::
coff
)
{
&data_byte
(
0x64
,
0x8f
,
0x05
,
0
,
0
,
0
,
0
);
# pop %fs:0
&lea
("
esp
",
&DWP
(
4
,"
esp
"));
}
&pop
("
esi
");
&pop
("
edi
");
&ret
();
&function_end_B
("
padlock_sha256_oneshot
");
&function_begin_B
("
padlock_sha256
");
&push
("
edi
");
&push
("
esi
");
&mov
("
eax
",
-
1
);
&mov
("
edi
",
&wparam
(
0
));
&mov
("
esi
",
&wparam
(
1
));
&mov
("
ecx
",
&wparam
(
2
));
&data_byte
(
0xf3
,
0x0f
,
0xa6
,
0xd0
);
# rep xsha256
&pop
("
esi
");
&pop
("
edi
");
&ret
();
&function_end_B
("
padlock_sha256
");
&asciz
("
VIA Padlock x86 module, CRYPTOGAMS by <appro
\@
openssl.org>
");
&align
(
16
);
&dataseg
();
# Essentially this variable belongs in thread local storage.
# Having this variable global on the other hand can only cause
# few bogus key reloads [if any at all on signle-CPU system],
# so we accept the panalty...
&set_label
("
padlock_saved_context
",
4
);
&data_word
(
0
);
&asm_finish
();
engines/asm/e_padlock-x86_86.pl
0 → 100644
浏览文件 @
ed28aef8
#!/usr/bin/env perl
# ====================================================================
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
# project. The module is, however, dual licensed under OpenSSL and
# CRYPTOGAMS licenses depending on where you obtain it. For further
# details see http://www.openssl.org/~appro/cryptogams/.
# ====================================================================
# September 2011
#
# Assembler helpers for Padlock engine.
$flavour
=
shift
;
$output
=
shift
;
if
(
$flavour
=~
/\./
)
{
$output
=
$flavour
;
undef
$flavour
;
}
$win64
=
0
;
$win64
=
1
if
(
$flavour
=~
/[nm]asm|mingw64/
||
$output
=~
/\.asm$/
);
$
0
=~
m/(.*[\/\\])[^\/\\]+$/
;
$dir
=
$
1
;
(
$xlate
=
"
${dir}
x86_64-xlate.pl
"
and
-
f
$xlate
)
or
(
$xlate
=
"
${dir}
../../crypto/perlasm/x86_64-xlate.pl
"
and
-
f
$xlate
)
or
die
"
can't locate x86_64-xlate.pl
";
open
STDOUT
,"
| $^X
$xlate
$flavour
$output
";
$code
=
"
.text
\n
";
$PADLOCK_CHUNK
=
512
;
# Must be a power of 2 larger than 16
$ctx
=
"
%rdx
";
$out
=
"
%rdi
";
$inp
=
"
%rsi
";
$len
=
"
%rcx
";
$chunk
=
"
%rbx
";
(
$arg1
,
$arg2
,
$arg3
,
$arg4
)
=
$win64
?("
%rcx
","
%rdx
","
%r8
",
"
%r9
")
:
# Win64 order
("
%rdi
","
%rsi
","
%rdx
","
%rcx
");
# Unix order
$code
.=
<<___;
.globl padlock_capability
.type padlock_capability,\@abi-omnipotent
.align 16
padlock_capability:
mov %rbx,%r8
xor %eax,%eax
cpuid
xor %eax,%eax
cmp \$`"0x".unpack("H*",'tneC')`,%ebx
jne .Lnoluck
cmp \$`"0x".unpack("H*",'Hrua')`,%edx
jne .Lnoluck
cmp \$`"0x".unpack("H*",'slua')`,%ecx
jne .Lnoluck
mov \$0xC0000000,%eax
cpuid
mov %eax,%edx
xor %eax,%eax
cmp \$0xC0000001,%edx
jb .Lnoluck
mov \$0xC0000001,%eax
cpuid
mov %edx,%eax
and \$0xffffffef,%eax
or \$0x10,%eax # set Nano bit#4
.Lnoluck:
mov %r8,%rbx
ret
.size padlock_capability,.-padlock_capability
.globl padlock_key_bswap
.type padlock_key_bswap,\@abi-omnipotent,0
.align 16
padlock_key_bswap:
mov 240($arg1),%edx
.Lbswap_loop:
mov ($arg1),%eax
bswap %eax
mov %eax,($arg1)
lea 4($arg1),$arg1
sub \$1,%edx
jnz .Lbswap_loop
ret
.size padlock_key_bswap,.-padlock_key_bswap
.globl padlock_verify_context
.type padlock_verify_context,\@abi-omnipotent
.align 16
padlock_verify_context:
mov $arg1,$ctx
pushf
lea .Lpadlock_saved_context(%rip),%rax
call _padlock_verify_ctx
lea 8(%rsp),%rsp
ret
.size padlock_verify_context,.-padlock_verify_context
.type _padlock_verify_ctx,\@abi-omnipotent
.align 16
_padlock_verify_ctx:
mov 8(%rsp),%r8
bt \$30,%r8
jnc .Lverified
cmp (%rax),$ctx
je .Lverified
pushf
popf
.Lverified:
mov $ctx,(%rax)
ret
.size _padlock_verify_ctx,.-_padlock_verify_ctx
.globl padlock_reload_key
.type padlock_reload_key,\@abi-omnipotent
.align 16
padlock_reload_key:
pushf
popf
ret
.size padlock_reload_key,.-padlock_reload_key
.globl padlock_aes_block
.type padlock_aes_block,\@function,3
.align 16
padlock_aes_block:
mov %rbx,%r8
mov \$1,$len
lea 32($ctx),%rbx # key
lea 16($ctx),$ctx # control word
.byte 0xf3,0x0f,0xa7,0xc8 # rep xcryptecb
mov %r8,%rbx
ret
.size padlock_aes_block,.-padlock_aes_block
.globl padlock_xstore
.type padlock_xstore,\@function,2
.align 16
padlock_xstore:
mov %esi,%edx
.byte 0x0f,0xa7,0xc0 # xstore
ret
.size padlock_xstore,.-padlock_xstore
.globl padlock_sha1_oneshot
.type padlock_sha1_oneshot,\@function,3
.align 16
padlock_sha1_oneshot:
xor %rax,%rax
mov %rdx,%rcx
.byte 0xf3,0x0f,0xa6,0xc8 # rep xsha1
ret
.size padlock_sha1_oneshot,.-padlock_sha1_oneshot
.globl padlock_sha1
.type padlock_sha1,\@function,3
.align 16
padlock_sha1:
mov \$-1,%rax
mov %rdx,%rcx
.byte 0xf3,0x0f,0xa6,0xc8 # rep xsha1
ret
.size padlock_sha1,.-padlock_sha1
.globl padlock_sha256_oneshot
.type padlock_sha256_oneshot,\@function,3
.align 16
padlock_sha256_oneshot:
xor %rax,%rax
mov %rdx,%rcx
.byte 0xf3,0x0f,0xa6,0xd0 # rep xsha256
ret
.size padlock_sha256_oneshot,.-padlock_sha256_oneshot
.globl padlock_sha256
.type padlock_sha256,\@function,3
.align 16
padlock_sha256:
mov \$-1,%rax
mov %rdx,%rcx
.byte 0xf3,0x0f,0xa6,0xd0 # rep xsha256
ret
.size padlock_sha256,.-padlock_sha256
___
sub
generate_mode
{
my
(
$mode
,
$opcode
)
=
@_
;
# int padlock_$mode_encrypt(void *out, const void *inp,
# struct padlock_cipher_data *ctx, size_t len);
$code
.=
<<___;
.globl padlock_${mode}_encrypt
.type padlock_${mode}_encrypt,\@function,4
.align 16
padlock_${mode}_encrypt:
push %rbp
push %rbx
xor %eax,%eax
test \$15,$ctx
jnz .L${mode}_abort
test \$15,$len
jnz .L${mode}_abort
lea .Lpadlock_saved_context(%rip),%rax
pushf
cld
call _padlock_verify_ctx
lea 16($ctx),$ctx # control word
xor %eax,%eax
xor %ebx,%ebx
test \$`1<<5`,($ctx) # align bit in control word
test \$0x0f,$out
setz %al # !out_misaligned
test \$0x0f,$inp
setz %bl # !inp_misaligned
test %ebx,%eax
jnz .L${mode}_aligned
neg %rax
mov \$$PADLOCK_CHUNK,$chunk
not %rax # out_misaligned?-1:0
lea (%rsp),%rbp
cmp $chunk,$len
cmovc $len,$chunk # chunk=len>PADLOCK_CHUNK?PADLOCK_CHUNK:len
and $chunk,%rax # out_misaligned?chunk:0
mov $len,$chunk
neg %rax
and \$$PADLOCK_CHUNK-1,$chunk # chunk%=PADLOCK_CHUNK
lea (%rax,%rbp),%rsp
jmp .L${mode}_loop
.align 16
.L${mode}_loop:
mov $out,%r8 # save parameters
mov $inp,%r9
mov $len,%r10
mov $chunk,$len
mov $chunk,%r11
test \$0x0f,$out # out_misaligned
cmovnz %rsp,$out
test \$0x0f,$inp # inp_misaligned
jz .L${mode}_inp_aligned
shr \$3,$len
.byte 0xf3,0x48,0xa5 # rep movsq
sub $chunk,$out
mov $chunk,$len
mov $out,$inp
.L${mode}_inp_aligned:
lea -16($ctx),%rax # ivp
lea 16($ctx),%rbx # key
shr \$4,$len
.byte 0xf3,0x0f,0xa7,$opcode # rep xcrypt*
___
$code
.=<<
___
if
(
$mode
!~
/ecb|ctr/
);
movdqa
(
%rax
),
%xmm0
movdqa
%xmm0
,
-
16
(
$ctx
)
# copy [or refresh] iv
___
$code
.=
<<___;
mov %r8,$out # restore paramters
mov %r11,$chunk
test \$0x0f,$out
jz .L${mode}_out_aligned
mov $chunk,$len
shr \$3,$len
lea (%rsp),$inp
.byte 0xf3,0x48,0xa5 # rep movsq
sub $chunk,$out
.L${mode}_out_aligned:
mov %r9,$inp
mov %r10,$len
add $chunk,$out
add $chunk,$inp
sub $chunk,$len
mov \$$PADLOCK_CHUNK,$chunk
jnz .L${mode}_loop
test \$0x0f,$out
jz .L${mode}_done
mov %rbp,$len
mov %rsp,$out
sub %rsp,$len
xor %rax,%rax
shr \$3,$len
.byte 0xf3,0x48,0xab # rep stosq
.L${mode}_done:
lea (%rbp),%rsp
jmp .L${mode}_exit
.align 16
.L${mode}_aligned:
lea -16($ctx),%rax # ivp
lea 16($ctx),%rbx # key
shr \$4,$len # len/=AES_BLOCK_SIZE
.byte 0xf3,0x0f,0xa7,$opcode # rep xcrypt*
___
$code
.=<<
___
if
(
$mode
!~
/ecb|ctr/
);
movdqa
(
%rax
),
%xmm0
movdqa
%xmm0
,
-
16
(
$ctx
)
# copy [or refresh] iv
___
$code
.=
<<___;
.L${mode}_exit:
mov \$1,%eax
lea 8(%rsp),%rsp
.L${mode}_abort:
pop %rbx
pop %rbp
ret
.size padlock_${mode}_encrypt,.-padlock_${mode}_encrypt
___
}
&generate_mode
("
ecb
",
0xc8
);
&generate_mode
("
cbc
",
0xd0
);
&generate_mode
("
cfb
",
0xe0
);
&generate_mode
("
ofb
",
0xe8
);
&generate_mode
("
ctr16
",
0xd8
);
$code
.=
<<___;
.asciz "VIA Padlock x86_64 module, CRYPTOGAMS by <appro\@openssl.org>"
.align 16
.data
.align 8
.Lpadlock_saved_context:
.quad 0
___
$code
=~
s/\`([^\`]*)\`/eval($1)/g
em
;
print
$code
;
close
STDOUT
;
engines/e_padlock.c
浏览文件 @
ed28aef8
此差异已折叠。
点击以展开。
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录