mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
198 lines
4.8 KiB
Raku
198 lines
4.8 KiB
Raku
#!/usr/bin/env perl
|
|
|
|
push(@INC,"perlasm");
|
|
require "x86asm.pl";
|
|
|
|
&asm_init($ARGV[0],"x86cpuid");
|
|
|
|
for (@ARGV) { $sse2=1 if (/-DOPENSSL_IA32_SSE2/); }
|
|
|
|
&function_begin("OPENSSL_ia32_cpuid");
|
|
&xor ("edx","edx");
|
|
&pushf ();
|
|
&pop ("eax");
|
|
&mov ("ecx","eax");
|
|
&xor ("eax",1<<21);
|
|
&push ("eax");
|
|
&popf ();
|
|
&pushf ();
|
|
&pop ("eax");
|
|
&xor ("ecx","eax");
|
|
&bt ("ecx",21);
|
|
&jnc (&label("nocpuid"));
|
|
&mov ("eax",1);
|
|
&cpuid ();
|
|
&set_label("nocpuid");
|
|
&mov ("eax","edx");
|
|
&mov ("edx","ecx");
|
|
&function_end("OPENSSL_ia32_cpuid");
|
|
|
|
&external_label("OPENSSL_ia32cap_P");
|
|
|
|
&function_begin_B("OPENSSL_rdtsc","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
|
|
&xor ("eax","eax");
|
|
&xor ("edx","edx");
|
|
&picmeup("ecx","OPENSSL_ia32cap_P");
|
|
&bt (&DWP(0,"ecx"),4);
|
|
&jnc (&label("notsc"));
|
|
&rdtsc ();
|
|
&set_label("notsc");
|
|
&ret ();
|
|
&function_end_B("OPENSSL_rdtsc");
|
|
|
|
# This works in Ring 0 only [read DJGPP+MS-DOS+privileged DPMI host],
|
|
# but it's safe to call it on any [supported] 32-bit platform...
|
|
# Just check for [non-]zero return value...
|
|
&function_begin_B("OPENSSL_instrument_halt","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
|
|
&picmeup("ecx","OPENSSL_ia32cap_P");
|
|
&bt (&DWP(0,"ecx"),4);
|
|
&jnc (&label("nohalt")); # no TSC
|
|
|
|
&data_word(0x9058900e); # push %cs; pop %eax
|
|
&and ("eax",3);
|
|
&jnz (&label("nohalt")); # not enough privileges
|
|
|
|
&pushf ();
|
|
&pop ("eax")
|
|
&bt ("eax",9);
|
|
&jnc (&label("nohalt")); # interrupts are disabled
|
|
|
|
&rdtsc ();
|
|
&push ("edx");
|
|
&push ("eax");
|
|
&halt ();
|
|
&rdtsc ();
|
|
|
|
&sub ("eax",&DWP(0,"esp"));
|
|
&sbb ("edx",&DWP(4,"esp"));
|
|
&add ("esp",8);
|
|
&ret ();
|
|
|
|
&set_label("nohalt");
|
|
&xor ("eax","eax");
|
|
&xor ("edx","edx");
|
|
&ret ();
|
|
&function_end_B("OPENSSL_instrument_halt");
|
|
|
|
# Essentially there is only one use for this function. Under DJGPP:
|
|
#
|
|
# #include <go32.h>
|
|
# ...
|
|
# i=OPENSSL_far_spin(_dos_ds,0x46c);
|
|
# ...
|
|
# to obtain the number of spins till closest timer interrupt.
|
|
|
|
&function_begin_B("OPENSSL_far_spin");
|
|
&pushf ();
|
|
&pop ("eax")
|
|
&bt ("eax",9);
|
|
&jnc (&label("nospin")); # interrupts are disabled
|
|
|
|
&mov ("eax",&DWP(4,"esp"));
|
|
&mov ("ecx",&DWP(8,"esp"));
|
|
&data_word (0x90d88e1e); # push %ds, mov %eax,%ds
|
|
&xor ("eax","eax");
|
|
&mov ("edx",&DWP(0,"ecx"));
|
|
&jmp (&label("spin"));
|
|
|
|
&align (16);
|
|
&set_label("spin");
|
|
&inc ("eax");
|
|
&cmp ("edx",&DWP(0,"ecx"));
|
|
&je (&label("spin"));
|
|
|
|
&data_word (0x1f909090); # pop %ds
|
|
&ret ();
|
|
|
|
&set_label("nospin");
|
|
&xor ("eax","eax");
|
|
&xor ("edx","edx");
|
|
&ret ();
|
|
&function_end_B("OPENSSL_far_spin");
|
|
|
|
&function_begin_B("OPENSSL_wipe_cpu","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
|
|
&xor ("eax","eax");
|
|
&xor ("edx","edx");
|
|
&picmeup("ecx","OPENSSL_ia32cap_P");
|
|
&mov ("ecx",&DWP(0,"ecx"));
|
|
&bt (&DWP(0,"ecx"),1);
|
|
&jnc (&label("no_x87"));
|
|
if ($sse2) {
|
|
&bt (&DWP(0,"ecx"),26);
|
|
&jnc (&label("no_sse2"));
|
|
&pxor ("xmm0","xmm0");
|
|
&pxor ("xmm1","xmm1");
|
|
&pxor ("xmm2","xmm2");
|
|
&pxor ("xmm3","xmm3");
|
|
&pxor ("xmm4","xmm4");
|
|
&pxor ("xmm5","xmm5");
|
|
&pxor ("xmm6","xmm6");
|
|
&pxor ("xmm7","xmm7");
|
|
&set_label("no_sse2");
|
|
}
|
|
# just a bunch of fldz to zap the fp/mm bank followed by finit...
|
|
&data_word(0xeed9eed9,0xeed9eed9,0xeed9eed9,0xeed9eed9,0x90e3db9b);
|
|
&set_label("no_x87");
|
|
&lea ("eax",&DWP(4,"esp"));
|
|
&ret ();
|
|
&function_end_B("OPENSSL_wipe_cpu");
|
|
|
|
&function_begin_B("OPENSSL_atomic_add");
|
|
&mov ("edx",&DWP(4,"esp")); # fetch the pointer, 1st arg
|
|
&mov ("ecx",&DWP(8,"esp")); # fetch the increment, 2nd arg
|
|
&push ("ebx");
|
|
&nop ();
|
|
&mov ("eax",&DWP(0,"edx"));
|
|
&set_label("spin");
|
|
&lea ("ebx",&DWP(0,"eax","ecx"));
|
|
&nop ();
|
|
&data_word(0x1ab10ff0); # lock; cmpxchg %ebx,(%edx) # %eax is envolved and is always reloaded
|
|
&jne (&label("spin"));
|
|
&mov ("eax","ebx"); # OpenSSL expects the new value
|
|
&pop ("ebx");
|
|
&ret ();
|
|
&function_end_B("OPENSSL_atomic_add");
|
|
|
|
# This function can become handy under Win32 in situations when
|
|
# we don't know which calling convention, __stdcall or __cdecl(*),
|
|
# indirect callee is using. In C it can be deployed as
|
|
#
|
|
#ifdef OPENSSL_CPUID_OBJ
|
|
# type OPENSSL_indirect_call(void *f,...);
|
|
# ...
|
|
# OPENSSL_indirect_call(func,[up to $max arguments]);
|
|
#endif
|
|
#
|
|
# (*) it's designed to work even for __fastcall if number of
|
|
# arguments is 1 or 2!
|
|
&function_begin_B("OPENSSL_indirect_call");
|
|
{
|
|
my $i,$max=7; # $max has to be chosen as 4*n-1
|
|
# in order to preserve eventual
|
|
# stack alignment
|
|
&push ("ebp");
|
|
&mov ("ebp","esp");
|
|
&sub ("esp",$max*4);
|
|
&mov ("ecx",&DWP(12,"ebp"));
|
|
&mov (&DWP(0,"esp"),"ecx");
|
|
&mov ("edx",&DWP(16,"ebp"));
|
|
&mov (&DWP(4,"esp"),"edx");
|
|
for($i=2;$i<$max;$i++)
|
|
{
|
|
# Some copies will be redundant/bogus...
|
|
&mov ("eax",&DWP(12+$i*4,"ebp"));
|
|
&mov (&DWP(0+$i*4,"esp"),"eax");
|
|
}
|
|
&call_ptr (&DWP(8,"ebp"));# make the call...
|
|
&mov ("esp","ebp"); # ... and just restore the stack pointer
|
|
# without paying attention to what we called,
|
|
# (__cdecl *func) or (__stdcall *one).
|
|
&pop ("ebp");
|
|
&ret ();
|
|
}
|
|
&function_end_B("OPENSSL_indirect_call");
|
|
|
|
&initseg("OPENSSL_cpuid_setup");
|
|
|
|
&asm_finish();
|