2016-05-18 02:51:26 +08:00
|
|
|
/*
|
2023-02-13 04:26:23 +08:00
|
|
|
* Copyright 2011-2023 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 02:51:26 +08:00
|
|
|
*
|
2018-12-06 21:03:01 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 02:51:26 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
2011-07-18 01:40:29 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2015-04-02 16:17:42 +08:00
|
|
|
#include <openssl/crypto.h>
|
2021-04-20 04:26:50 +08:00
|
|
|
#ifdef __APPLE__
|
|
|
|
#include <sys/sysctl.h>
|
2023-02-13 04:26:23 +08:00
|
|
|
#else
|
|
|
|
#include <setjmp.h>
|
|
|
|
#include <signal.h>
|
2021-04-20 04:26:50 +08:00
|
|
|
#endif
|
2017-11-20 00:40:56 +08:00
|
|
|
#include "internal/cryptlib.h"
|
2023-02-13 04:26:23 +08:00
|
|
|
#ifdef _WIN32
|
2022-10-28 02:07:48 +08:00
|
|
|
#include <windows.h>
|
2023-02-13 04:26:23 +08:00
|
|
|
#else
|
|
|
|
#include <unistd.h>
|
2022-10-28 02:07:48 +08:00
|
|
|
#endif
|
2011-07-18 01:40:29 +08:00
|
|
|
#include "arm_arch.h"
|
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
unsigned int OPENSSL_armcap_P = 0;
|
2020-04-28 10:33:50 +08:00
|
|
|
unsigned int OPENSSL_arm_midr = 0;
|
2021-03-19 14:45:57 +08:00
|
|
|
unsigned int OPENSSL_armv8_rsa_neonized = 0;
|
2011-07-18 01:40:29 +08:00
|
|
|
|
2022-10-28 02:07:48 +08:00
|
|
|
#ifdef _WIN32
|
|
|
|
void OPENSSL_cpuid_setup(void)
|
|
|
|
{
|
|
|
|
OPENSSL_armcap_P |= ARMV7_NEON;
|
|
|
|
OPENSSL_armv8_rsa_neonized = 1;
|
|
|
|
if (IsProcessorFeaturePresent(PF_ARM_V8_CRYPTO_INSTRUCTIONS_AVAILABLE)) {
|
|
|
|
// These are all covered by one call in Windows
|
|
|
|
OPENSSL_armcap_P |= ARMV8_AES;
|
|
|
|
OPENSSL_armcap_P |= ARMV8_PMULL;
|
|
|
|
OPENSSL_armcap_P |= ARMV8_SHA1;
|
|
|
|
OPENSSL_armcap_P |= ARMV8_SHA256;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t OPENSSL_rdtsc(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2023-02-13 04:26:23 +08:00
|
|
|
#elif __ARM_MAX_ARCH__ < 7
|
2015-01-22 11:40:55 +08:00
|
|
|
void OPENSSL_cpuid_setup(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2017-11-20 00:40:56 +08:00
|
|
|
uint32_t OPENSSL_rdtsc(void)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2023-02-13 04:26:23 +08:00
|
|
|
#else /* !_WIN32 && __ARM_MAX_ARCH__ >= 7 */
|
2021-05-20 02:54:20 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
/* 3 ways of handling things here: __APPLE__, getauxval() or SIGILL detect */
|
2021-05-20 02:54:20 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
/* First determine if getauxval() is available (OSSL_IMPLEMENT_GETAUXVAL) */
|
2011-07-18 01:40:29 +08:00
|
|
|
|
2015-01-05 18:25:10 +08:00
|
|
|
# if defined(__GNUC__) && __GNUC__>=2
|
|
|
|
void OPENSSL_cpuid_setup(void) __attribute__ ((constructor));
|
|
|
|
# endif
|
2019-01-16 13:31:15 +08:00
|
|
|
|
|
|
|
# if defined(__GLIBC__) && defined(__GLIBC_PREREQ)
|
|
|
|
# if __GLIBC_PREREQ(2, 16)
|
|
|
|
# include <sys/auxv.h>
|
|
|
|
# define OSSL_IMPLEMENT_GETAUXVAL
|
|
|
|
# endif
|
2021-06-23 09:46:42 +08:00
|
|
|
# elif defined(__ANDROID_API__)
|
|
|
|
/* see https://developer.android.google.cn/ndk/guides/cpu-features */
|
|
|
|
# if __ANDROID_API__ >= 18
|
|
|
|
# include <sys/auxv.h>
|
|
|
|
# define OSSL_IMPLEMENT_GETAUXVAL
|
|
|
|
# endif
|
2015-01-22 11:40:55 +08:00
|
|
|
# endif
|
2020-12-10 04:23:32 +08:00
|
|
|
# if defined(__FreeBSD__)
|
|
|
|
# include <sys/param.h>
|
|
|
|
# if __FreeBSD_version >= 1200000
|
|
|
|
# include <sys/auxv.h>
|
|
|
|
# define OSSL_IMPLEMENT_GETAUXVAL
|
|
|
|
|
|
|
|
static unsigned long getauxval(unsigned long key)
|
|
|
|
{
|
|
|
|
unsigned long val = 0ul;
|
|
|
|
|
|
|
|
if (elf_aux_info((int)key, &val, sizeof(val)) != 0)
|
|
|
|
return 0ul;
|
|
|
|
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
# endif
|
|
|
|
# endif
|
2014-06-01 23:21:06 +08:00
|
|
|
|
2020-03-05 18:26:06 +08:00
|
|
|
/*
|
|
|
|
* Android: according to https://developer.android.com/ndk/guides/cpu-features,
|
|
|
|
* getauxval is supported starting with API level 18
|
|
|
|
*/
|
2023-02-13 04:26:23 +08:00
|
|
|
# if defined(__ANDROID__) && defined(__ANDROID_API__) && __ANDROID_API__ >= 18
|
|
|
|
# include <sys/auxv.h>
|
|
|
|
# define OSSL_IMPLEMENT_GETAUXVAL
|
|
|
|
# endif
|
2020-03-05 18:26:06 +08:00
|
|
|
|
2014-06-01 23:21:06 +08:00
|
|
|
/*
|
2017-08-04 13:10:41 +08:00
|
|
|
* ARM puts the feature bits for Crypto Extensions in AT_HWCAP2, whereas
|
2014-06-01 23:21:06 +08:00
|
|
|
* AArch64 used AT_HWCAP.
|
|
|
|
*/
|
2021-11-19 23:14:30 +08:00
|
|
|
# ifndef AT_HWCAP
|
|
|
|
# define AT_HWCAP 16
|
|
|
|
# endif
|
|
|
|
# ifndef AT_HWCAP2
|
|
|
|
# define AT_HWCAP2 26
|
|
|
|
# endif
|
2015-01-22 11:40:55 +08:00
|
|
|
# if defined(__arm__) || defined (__arm)
|
2023-02-13 04:26:23 +08:00
|
|
|
# define OSSL_HWCAP AT_HWCAP
|
|
|
|
# define OSSL_HWCAP_NEON (1 << 12)
|
|
|
|
|
|
|
|
# define OSSL_HWCAP_CE AT_HWCAP2
|
|
|
|
# define OSSL_HWCAP_CE_AES (1 << 0)
|
|
|
|
# define OSSL_HWCAP_CE_PMULL (1 << 1)
|
|
|
|
# define OSSL_HWCAP_CE_SHA1 (1 << 2)
|
|
|
|
# define OSSL_HWCAP_CE_SHA256 (1 << 3)
|
2015-01-22 11:40:55 +08:00
|
|
|
# elif defined(__aarch64__)
|
2023-02-13 04:26:23 +08:00
|
|
|
# define OSSL_HWCAP AT_HWCAP
|
|
|
|
# define OSSL_HWCAP_NEON (1 << 1)
|
|
|
|
|
|
|
|
# define OSSL_HWCAP_CE AT_HWCAP
|
|
|
|
# define OSSL_HWCAP_CE_AES (1 << 3)
|
|
|
|
# define OSSL_HWCAP_CE_PMULL (1 << 4)
|
|
|
|
# define OSSL_HWCAP_CE_SHA1 (1 << 5)
|
|
|
|
# define OSSL_HWCAP_CE_SHA256 (1 << 6)
|
|
|
|
# define OSSL_HWCAP_CPUID (1 << 11)
|
|
|
|
# define OSSL_HWCAP_SHA3 (1 << 17)
|
|
|
|
# define OSSL_HWCAP_CE_SM3 (1 << 18)
|
|
|
|
# define OSSL_HWCAP_CE_SM4 (1 << 19)
|
|
|
|
# define OSSL_HWCAP_CE_SHA512 (1 << 21)
|
|
|
|
# define OSSL_HWCAP_SVE (1 << 22)
|
|
|
|
/* AT_HWCAP2 */
|
|
|
|
# define OSSL_HWCAP2 26
|
|
|
|
# define OSSL_HWCAP2_SVE2 (1 << 1)
|
|
|
|
# define OSSL_HWCAP2_RNG (1 << 16)
|
|
|
|
# endif
|
|
|
|
|
|
|
|
uint32_t _armv7_tick(void);
|
|
|
|
|
|
|
|
uint32_t OPENSSL_rdtsc(void)
|
|
|
|
{
|
|
|
|
if (OPENSSL_armcap_P & ARMV7_TICK)
|
|
|
|
return _armv7_tick();
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
# ifdef __aarch64__
|
|
|
|
size_t OPENSSL_rndr_asm(unsigned char *buf, size_t len);
|
|
|
|
size_t OPENSSL_rndrrs_asm(unsigned char *buf, size_t len);
|
|
|
|
|
|
|
|
size_t OPENSSL_rndr_bytes(unsigned char *buf, size_t len);
|
|
|
|
size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len);
|
|
|
|
|
|
|
|
static size_t OPENSSL_rndr_wrapper(size_t (*func)(unsigned char *, size_t), unsigned char *buf, size_t len)
|
|
|
|
{
|
|
|
|
size_t buffer_size = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < 8; i++) {
|
|
|
|
buffer_size = func(buf, len);
|
|
|
|
if (buffer_size == len)
|
|
|
|
break;
|
|
|
|
usleep(5000); /* 5000 microseconds (5 milliseconds) */
|
|
|
|
}
|
|
|
|
return buffer_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t OPENSSL_rndr_bytes(unsigned char *buf, size_t len)
|
|
|
|
{
|
|
|
|
return OPENSSL_rndr_wrapper(OPENSSL_rndr_asm, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len)
|
|
|
|
{
|
|
|
|
return OPENSSL_rndr_wrapper(OPENSSL_rndrrs_asm, buf, len);
|
|
|
|
}
|
|
|
|
# endif
|
|
|
|
|
|
|
|
# if !defined(__APPLE__) && !defined(OSSL_IMPLEMENT_GETAUXVAL)
|
|
|
|
static sigset_t all_masked;
|
|
|
|
|
|
|
|
static sigjmp_buf ill_jmp;
|
|
|
|
static void ill_handler(int sig)
|
|
|
|
{
|
|
|
|
siglongjmp(ill_jmp, sig);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Following subroutines could have been inlined, but not all
|
|
|
|
* ARM compilers support inline assembler, and we'd then have to
|
|
|
|
* worry about the compiler optimising out the detection code...
|
|
|
|
*/
|
|
|
|
void _armv7_neon_probe(void);
|
|
|
|
void _armv8_aes_probe(void);
|
|
|
|
void _armv8_sha1_probe(void);
|
|
|
|
void _armv8_sha256_probe(void);
|
|
|
|
void _armv8_pmull_probe(void);
|
|
|
|
# ifdef __aarch64__
|
|
|
|
void _armv8_sm3_probe(void);
|
|
|
|
void _armv8_sm4_probe(void);
|
|
|
|
void _armv8_sha512_probe(void);
|
|
|
|
void _armv8_eor3_probe(void);
|
|
|
|
void _armv8_sve_probe(void);
|
|
|
|
void _armv8_sve2_probe(void);
|
|
|
|
void _armv8_rng_probe(void);
|
|
|
|
# endif
|
|
|
|
# endif /* !__APPLE__ && !OSSL_IMPLEMENT_GETAUXVAL */
|
|
|
|
|
|
|
|
/* We only call _armv8_cpuid_probe() if (OPENSSL_armcap_P & ARMV8_CPUID) != 0 */
|
|
|
|
unsigned int _armv8_cpuid_probe(void);
|
|
|
|
|
|
|
|
# if defined(__APPLE__)
|
|
|
|
/*
|
|
|
|
* Checks the specified integer sysctl, returning `value` if it's 1, otherwise returning 0.
|
|
|
|
*/
|
|
|
|
static unsigned int sysctl_query(const char *name, unsigned int value)
|
|
|
|
{
|
|
|
|
unsigned int sys_value = 0;
|
|
|
|
size_t len = sizeof(sys_value);
|
|
|
|
|
|
|
|
return (sysctlbyname(name, &sys_value, &len, NULL, 0) == 0 && sys_value == 1) ? value : 0;
|
|
|
|
}
|
|
|
|
# elif !defined(OSSL_IMPLEMENT_GETAUXVAL)
|
|
|
|
/*
|
|
|
|
* Calls a provided probe function, which may SIGILL. If it doesn't, return `value`, otherwise return 0.
|
|
|
|
*/
|
|
|
|
static unsigned int arm_probe_for(void (*probe)(void), volatile unsigned int value)
|
|
|
|
{
|
|
|
|
if (sigsetjmp(ill_jmp, 1) == 0) {
|
|
|
|
probe();
|
|
|
|
return value;
|
|
|
|
} else {
|
|
|
|
/* The probe function gave us SIGILL */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2015-01-22 11:40:55 +08:00
|
|
|
# endif
|
2014-06-01 23:21:06 +08:00
|
|
|
|
2011-07-18 01:40:29 +08:00
|
|
|
void OPENSSL_cpuid_setup(void)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
2017-06-11 21:38:05 +08:00
|
|
|
const char *e;
|
2023-02-13 04:26:23 +08:00
|
|
|
# if !defined(__APPLE__) && !defined(OSSL_IMPLEMENT_GETAUXVAL)
|
2015-01-22 11:40:55 +08:00
|
|
|
struct sigaction ill_oact, ill_act;
|
|
|
|
sigset_t oset;
|
2023-02-13 04:26:23 +08:00
|
|
|
# endif
|
2015-01-22 11:40:55 +08:00
|
|
|
static int trigger = 0;
|
|
|
|
|
|
|
|
if (trigger)
|
|
|
|
return;
|
|
|
|
trigger = 1;
|
|
|
|
|
2021-05-26 23:46:00 +08:00
|
|
|
OPENSSL_armcap_P = 0;
|
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if ((e = getenv("OPENSSL_armcap"))) {
|
|
|
|
OPENSSL_armcap_P = (unsigned int)strtoul(e, NULL, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-04-20 04:26:50 +08:00
|
|
|
# if defined(__APPLE__)
|
2023-02-13 04:26:23 +08:00
|
|
|
# if !defined(__aarch64__)
|
2017-02-15 19:01:09 +08:00
|
|
|
/*
|
|
|
|
* Capability probing by catching SIGILL appears to be problematic
|
|
|
|
* on iOS. But since Apple universe is "monocultural", it's actually
|
|
|
|
* possible to simply set pre-defined processor capability mask.
|
|
|
|
*/
|
|
|
|
if (1) {
|
|
|
|
OPENSSL_armcap_P = ARMV7_NEON;
|
|
|
|
return;
|
|
|
|
}
|
2023-02-13 04:26:23 +08:00
|
|
|
# else
|
2021-04-20 04:26:50 +08:00
|
|
|
{
|
2023-02-13 04:26:23 +08:00
|
|
|
/*
|
|
|
|
* From
|
|
|
|
* https://github.com/llvm/llvm-project/blob/412237dcd07e5a2afbb1767858262a5f037149a3/llvm/lib/Target/AArch64/AArch64.td#L719
|
|
|
|
* all of these have been available on 64-bit Apple Silicon from the
|
|
|
|
* beginning (the A7).
|
|
|
|
*/
|
|
|
|
OPENSSL_armcap_P |= ARMV7_NEON | ARMV8_PMULL | ARMV8_AES | ARMV8_SHA1 | ARMV8_SHA256;
|
|
|
|
|
|
|
|
/* More recent extensions are indicated by sysctls */
|
|
|
|
OPENSSL_armcap_P |= sysctl_query("hw.optional.armv8_2_sha512", ARMV8_SHA512);
|
|
|
|
OPENSSL_armcap_P |= sysctl_query("hw.optional.armv8_2_sha3", ARMV8_SHA3);
|
|
|
|
|
|
|
|
if (OPENSSL_armcap_P & ARMV8_SHA3) {
|
|
|
|
char uarch[64];
|
|
|
|
|
|
|
|
size_t len = sizeof(uarch);
|
2021-06-09 14:35:46 +08:00
|
|
|
if ((sysctlbyname("machdep.cpu.brand_string", uarch, &len, NULL, 0) == 0) &&
|
2023-01-26 03:34:25 +08:00
|
|
|
((strncmp(uarch, "Apple M1", 8) == 0) ||
|
2023-02-13 04:26:23 +08:00
|
|
|
(strncmp(uarch, "Apple M2", 8) == 0))) {
|
2021-06-09 14:35:46 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_UNROLL8_EOR3;
|
2023-02-13 04:26:23 +08:00
|
|
|
}
|
2021-06-09 14:35:46 +08:00
|
|
|
}
|
2021-04-20 04:26:50 +08:00
|
|
|
}
|
2023-02-13 04:26:23 +08:00
|
|
|
# endif /* __aarch64__ */
|
|
|
|
|
|
|
|
# elif defined(OSSL_IMPLEMENT_GETAUXVAL)
|
2017-02-15 19:01:09 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (getauxval(OSSL_HWCAP) & OSSL_HWCAP_NEON) {
|
|
|
|
unsigned long hwcap = getauxval(OSSL_HWCAP_CE);
|
2019-01-16 13:31:15 +08:00
|
|
|
|
|
|
|
OPENSSL_armcap_P |= ARMV7_NEON;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_AES)
|
2019-01-16 13:31:15 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_AES;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_PMULL)
|
2019-01-16 13:31:15 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_PMULL;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_SHA1)
|
2019-01-16 13:31:15 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SHA1;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_SHA256)
|
2019-01-16 13:31:15 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SHA256;
|
|
|
|
|
|
|
|
# ifdef __aarch64__
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_SM4)
|
2021-10-20 05:49:05 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SM4;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_SHA512)
|
2019-01-16 13:31:15 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SHA512;
|
2020-04-28 10:33:50 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CPUID)
|
2020-04-28 10:33:50 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_CPUID;
|
2021-12-24 16:29:04 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_CE_SM3)
|
2021-12-24 16:29:04 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SM3;
|
2023-02-13 04:26:23 +08:00
|
|
|
if (hwcap & OSSL_HWCAP_SHA3)
|
2021-06-09 14:35:46 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SHA3;
|
2019-01-16 13:31:15 +08:00
|
|
|
# endif
|
|
|
|
}
|
2021-05-20 02:54:20 +08:00
|
|
|
# ifdef __aarch64__
|
2023-02-13 04:26:23 +08:00
|
|
|
if (getauxval(OSSL_HWCAP) & OSSL_HWCAP_SVE)
|
2022-02-07 18:17:06 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SVE;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (getauxval(OSSL_HWCAP2) & OSSL_HWCAP2_SVE2)
|
2022-02-07 18:17:06 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_SVE2;
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (getauxval(OSSL_HWCAP2) & OSSL_HWCAP2_RNG)
|
2021-05-20 02:54:20 +08:00
|
|
|
OPENSSL_armcap_P |= ARMV8_RNG;
|
|
|
|
# endif
|
2023-02-13 04:26:23 +08:00
|
|
|
|
|
|
|
# else /* !__APPLE__ && !OSSL_IMPLEMENT_GETAUXVAL */
|
|
|
|
|
|
|
|
/* If all else fails, do brute force SIGILL-based feature detection */
|
2019-01-16 13:31:15 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
sigfillset(&all_masked);
|
|
|
|
sigdelset(&all_masked, SIGILL);
|
|
|
|
sigdelset(&all_masked, SIGTRAP);
|
|
|
|
sigdelset(&all_masked, SIGFPE);
|
|
|
|
sigdelset(&all_masked, SIGBUS);
|
|
|
|
sigdelset(&all_masked, SIGSEGV);
|
|
|
|
|
|
|
|
memset(&ill_act, 0, sizeof(ill_act));
|
|
|
|
ill_act.sa_handler = ill_handler;
|
|
|
|
ill_act.sa_mask = all_masked;
|
|
|
|
|
|
|
|
sigprocmask(SIG_SETMASK, &ill_act.sa_mask, &oset);
|
|
|
|
sigaction(SIGILL, &ill_act, &ill_oact);
|
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv7_neon_probe, ARMV7_NEON);
|
2021-10-20 05:49:05 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
if (OPENSSL_armcap_P & ARMV7_NEON) {
|
2021-12-24 16:29:04 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_pmull_probe, ARMV8_PMULL | ARMV8_AES);
|
|
|
|
if (!(OPENSSL_armcap_P & ARMV8_AES)) {
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_aes_probe, ARMV8_AES);
|
2022-12-03 20:58:43 +08:00
|
|
|
}
|
2022-02-07 18:17:06 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sha1_probe, ARMV8_SHA1);
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sha256_probe, ARMV8_SHA256);
|
2022-02-07 18:17:06 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
# if defined(__aarch64__)
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sm3_probe, ARMV8_SM3);
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sm4_probe, ARMV8_SM4);
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sha512_probe, ARMV8_SHA512);
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_eor3_probe, ARMV8_SHA3);
|
|
|
|
# endif
|
2021-05-20 02:54:20 +08:00
|
|
|
}
|
2023-02-13 04:26:23 +08:00
|
|
|
# ifdef __aarch64__
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sve_probe, ARMV8_SVE);
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_sve2_probe, ARMV8_SVE2);
|
|
|
|
OPENSSL_armcap_P |= arm_probe_for(_armv8_rng_probe, ARMV8_RNG);
|
2021-05-20 02:54:20 +08:00
|
|
|
# endif
|
2019-01-16 13:31:15 +08:00
|
|
|
|
2022-07-23 10:04:46 +08:00
|
|
|
/*
|
|
|
|
* Probing for ARMV7_TICK is known to produce unreliable results,
|
2023-02-13 04:26:23 +08:00
|
|
|
* so we only use the feature when the user explicitly enables it
|
|
|
|
* with OPENSSL_armcap.
|
2022-07-23 10:04:46 +08:00
|
|
|
*/
|
2015-01-22 11:40:55 +08:00
|
|
|
|
|
|
|
sigaction(SIGILL, &ill_oact, NULL);
|
|
|
|
sigprocmask(SIG_SETMASK, &oset, NULL);
|
2020-04-28 10:33:50 +08:00
|
|
|
|
2023-02-13 04:26:23 +08:00
|
|
|
# endif /* __APPLE__, OSSL_IMPLEMENT_GETAUXVAL */
|
|
|
|
|
2020-04-28 10:33:50 +08:00
|
|
|
# ifdef __aarch64__
|
|
|
|
if (OPENSSL_armcap_P & ARMV8_CPUID)
|
|
|
|
OPENSSL_arm_midr = _armv8_cpuid_probe();
|
2021-03-19 14:45:57 +08:00
|
|
|
|
|
|
|
if ((MIDR_IS_CPU_MODEL(OPENSSL_arm_midr, ARM_CPU_IMP_ARM, ARM_CPU_PART_CORTEX_A72) ||
|
|
|
|
MIDR_IS_CPU_MODEL(OPENSSL_arm_midr, ARM_CPU_IMP_ARM, ARM_CPU_PART_N1)) &&
|
|
|
|
(OPENSSL_armcap_P & ARMV7_NEON)) {
|
|
|
|
OPENSSL_armv8_rsa_neonized = 1;
|
|
|
|
}
|
2022-05-18 10:27:55 +08:00
|
|
|
if ((MIDR_IS_CPU_MODEL(OPENSSL_arm_midr, ARM_CPU_IMP_ARM, ARM_CPU_PART_V1) ||
|
2023-01-29 14:22:43 +08:00
|
|
|
MIDR_IS_CPU_MODEL(OPENSSL_arm_midr, ARM_CPU_IMP_ARM, ARM_CPU_PART_N2) ||
|
|
|
|
MIDR_IS_CPU_MODEL(OPENSSL_arm_midr, ARM_CPU_IMP_ARM, ARM_CPU_PART_V2)) &&
|
2021-06-09 14:35:46 +08:00
|
|
|
(OPENSSL_armcap_P & ARMV8_SHA3))
|
|
|
|
OPENSSL_armcap_P |= ARMV8_UNROLL8_EOR3;
|
2020-04-28 10:33:50 +08:00
|
|
|
# endif
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
2023-02-13 04:26:23 +08:00
|
|
|
#endif /* _WIN32, __ARM_MAX_ARCH__ >= 7 */
|