blob: 1d57f360e1a135683b9cfc4793789f26ca006c4f [file] [log] [blame]
Rich Salze0a65192016-04-19 22:10:43 -04001#! /usr/bin/env perl
2# Copyright 2004-2016 The OpenSSL Project Authors. All Rights Reserved.
3#
4# Licensed under the OpenSSL license (the "License"). You may not use
5# this file except in compliance with the License. You can obtain a copy
6# in the file LICENSE in the source distribution or at
7# https://www.openssl.org/source/license.html
Andy Polyakov14e21f82004-07-26 20:18:55 +00008
Dr. Stephen Henson4d1f3f72008-01-05 22:28:38 +00009$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
10push(@INC, "${dir}perlasm", "perlasm");
Andy Polyakov14e21f82004-07-26 20:18:55 +000011require "x86asm.pl";
12
Richard Levitte0a4edb92016-03-07 15:00:45 +010013$output = pop;
14open OUT,">$output";
15*STDOUT=*OUT;
16
Andy Polyakov14e21f82004-07-26 20:18:55 +000017&asm_init($ARGV[0],"x86cpuid");
18
Andy Polyakovc5022652005-05-18 08:42:08 +000019for (@ARGV) { $sse2=1 if (/-DOPENSSL_IA32_SSE2/); }
20
Andy Polyakov14e21f82004-07-26 20:18:55 +000021&function_begin("OPENSSL_ia32_cpuid");
22 &xor ("edx","edx");
23 &pushf ();
24 &pop ("eax");
25 &mov ("ecx","eax");
26 &xor ("eax",1<<21);
27 &push ("eax");
28 &popf ();
29 &pushf ();
30 &pop ("eax");
31 &xor ("ecx","eax");
Andy Polyakov162f6772007-04-01 17:28:08 +000032 &xor ("eax","eax");
Andy Polyakov1aed5e12017-03-12 14:45:06 +010033 &mov ("esi",&wparam(0));
34 &mov (&DWP(8,"esi"),"eax"); # clear extended feature flags
Andy Polyakov0f2ece82012-02-28 14:20:21 +000035 &bt ("ecx",21);
36 &jnc (&label("nocpuid"));
Andy Polyakov162f6772007-04-01 17:28:08 +000037 &cpuid ();
Andy Polyakov761393b2009-05-14 18:17:26 +000038 &mov ("edi","eax"); # max value for standard query level
39
Andy Polyakov162f6772007-04-01 17:28:08 +000040 &xor ("eax","eax");
41 &cmp ("ebx",0x756e6547); # "Genu"
42 &setne (&LB("eax"));
43 &mov ("ebp","eax");
44 &cmp ("edx",0x49656e69); # "ineI"
45 &setne (&LB("eax"));
46 &or ("ebp","eax");
47 &cmp ("ecx",0x6c65746e); # "ntel"
48 &setne (&LB("eax"));
Andy Polyakov58672312009-05-12 21:19:41 +000049 &or ("ebp","eax"); # 0 indicates Intel CPU
Andy Polyakov58672312009-05-12 21:19:41 +000050 &jz (&label("intel"));
51
52 &cmp ("ebx",0x68747541); # "Auth"
53 &setne (&LB("eax"));
54 &mov ("esi","eax");
55 &cmp ("edx",0x69746E65); # "enti"
56 &setne (&LB("eax"));
57 &or ("esi","eax");
58 &cmp ("ecx",0x444D4163); # "cAMD"
59 &setne (&LB("eax"));
60 &or ("esi","eax"); # 0 indicates AMD CPU
61 &jnz (&label("intel"));
62
Andy Polyakov761393b2009-05-14 18:17:26 +000063 # AMD specific
Andy Polyakov58672312009-05-12 21:19:41 +000064 &mov ("eax",0x80000000);
65 &cpuid ();
Andy Polyakovb9064222011-05-16 20:35:11 +000066 &cmp ("eax",0x80000001);
67 &jb (&label("intel"));
68 &mov ("esi","eax");
69 &mov ("eax",0x80000001);
70 &cpuid ();
71 &or ("ebp","ecx");
72 &and ("ebp",1<<11|1); # isolate XOP bit
73 &cmp ("esi",0x80000008);
Andy Polyakov58672312009-05-12 21:19:41 +000074 &jb (&label("intel"));
75
76 &mov ("eax",0x80000008);
77 &cpuid ();
78 &movz ("esi",&LB("ecx")); # number of cores - 1
79 &inc ("esi"); # number of cores
80
Andy Polyakov761393b2009-05-14 18:17:26 +000081 &mov ("eax",1);
Andy Polyakov5702e962013-03-04 20:05:04 +010082 &xor ("ecx","ecx");
Andy Polyakov761393b2009-05-14 18:17:26 +000083 &cpuid ();
84 &bt ("edx",28);
Andy Polyakovb9064222011-05-16 20:35:11 +000085 &jnc (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +000086 &shr ("ebx",16);
87 &and ("ebx",0xff);
88 &cmp ("ebx","esi");
Andy Polyakovb9064222011-05-16 20:35:11 +000089 &ja (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +000090 &and ("edx",0xefffffff); # clear hyper-threading bit
Andy Polyakovb9064222011-05-16 20:35:11 +000091 &jmp (&label("generic"));
David Benjamin609b0852016-10-10 12:01:24 -040092
Andy Polyakov58672312009-05-12 21:19:41 +000093&set_label("intel");
Andy Polyakov761393b2009-05-14 18:17:26 +000094 &cmp ("edi",4);
Andy Polyakov1aed5e12017-03-12 14:45:06 +010095 &mov ("esi",-1);
Andy Polyakov761393b2009-05-14 18:17:26 +000096 &jb (&label("nocacheinfo"));
97
98 &mov ("eax",4);
99 &mov ("ecx",0); # query L1D
100 &cpuid ();
Andy Polyakov1aed5e12017-03-12 14:45:06 +0100101 &mov ("esi","eax");
102 &shr ("esi",14);
103 &and ("esi",0xfff); # number of cores -1 per L1D
Andy Polyakov761393b2009-05-14 18:17:26 +0000104
105&set_label("nocacheinfo");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000106 &mov ("eax",1);
Andy Polyakov5702e962013-03-04 20:05:04 +0100107 &xor ("ecx","ecx");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000108 &cpuid ();
Andy Polyakov18f56032011-05-29 12:50:02 +0000109 &and ("edx",0xbfefffff); # force reserved bits #20, #30 to 0
Andy Polyakov162f6772007-04-01 17:28:08 +0000110 &cmp ("ebp",0);
Andy Polyakov4bb90082011-05-27 15:32:43 +0000111 &jne (&label("notintel"));
112 &or ("edx",1<<30); # set reserved bit#30 on Intel CPUs
Andy Polyakov3df2eff2007-07-21 14:46:27 +0000113 &and (&HB("eax"),15); # familiy ID
114 &cmp (&HB("eax"),15); # P4?
Andy Polyakov4bb90082011-05-27 15:32:43 +0000115 &jne (&label("notintel"));
116 &or ("edx",1<<20); # set reserved bit#20 to engage RC4_CHAR
117&set_label("notintel");
Andy Polyakov3df2eff2007-07-21 14:46:27 +0000118 &bt ("edx",28); # test hyper-threading bit
Andy Polyakovb9064222011-05-16 20:35:11 +0000119 &jnc (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +0000120 &and ("edx",0xefffffff);
Andy Polyakov1aed5e12017-03-12 14:45:06 +0100121 &cmp ("esi",0);
Andy Polyakovb9064222011-05-16 20:35:11 +0000122 &je (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +0000123
124 &or ("edx",0x10000000);
Andy Polyakov162f6772007-04-01 17:28:08 +0000125 &shr ("ebx",16);
Andy Polyakov761393b2009-05-14 18:17:26 +0000126 &cmp (&LB("ebx"),1);
Andy Polyakovb9064222011-05-16 20:35:11 +0000127 &ja (&label("generic"));
Andy Polyakovb1e8b4e2007-05-19 17:52:51 +0000128 &and ("edx",0xefffffff); # clear hyper-threading bit if not
Andy Polyakovb9064222011-05-16 20:35:11 +0000129
130&set_label("generic");
131 &and ("ebp",1<<11); # isolate AMD XOP flag
Andy Polyakov18f56032011-05-29 12:50:02 +0000132 &and ("ecx",0xfffff7ff); # force 11th bit to 0
Andy Polyakov1aed5e12017-03-12 14:45:06 +0100133 &mov ("esi","edx"); # %ebp:%esi is copy of %ecx:%edx
Andy Polyakovb9064222011-05-16 20:35:11 +0000134 &or ("ebp","ecx"); # merge AMD XOP flag
135
Andy Polyakov1aed5e12017-03-12 14:45:06 +0100136 &cmp ("edi",7);
137 &mov ("edi",&wparam(0));
138 &jb (&label("no_extended_info"));
139 &mov ("eax",7);
140 &xor ("ecx","ecx");
141 &cpuid ();
142 &mov (&DWP(8,"edi"),"ebx"); # save extended feature flag
143&set_label("no_extended_info");
144
145 &bt ("ebp",27); # check OSXSAVE bit
Andy Polyakove879dd42011-11-05 10:44:12 +0000146 &jnc (&label("clear_avx"));
Andy Polyakovb9064222011-05-16 20:35:11 +0000147 &xor ("ecx","ecx");
148 &data_byte(0x0f,0x01,0xd0); # xgetbv
149 &and ("eax",6);
150 &cmp ("eax",6);
151 &je (&label("done"));
152 &cmp ("eax",2);
153 &je (&label("clear_avx"));
154&set_label("clear_xmm");
Andy Polyakov18f56032011-05-29 12:50:02 +0000155 &and ("ebp",0xfdfffffd); # clear AESNI and PCLMULQDQ bits
156 &and ("esi",0xfeffffff); # clear FXSR
Andy Polyakovb9064222011-05-16 20:35:11 +0000157&set_label("clear_avx");
Andy Polyakov18f56032011-05-29 12:50:02 +0000158 &and ("ebp",0xefffe7ff); # clear AVX, FMA and AMD XOP bits
Andy Polyakovc5cd28b2012-11-17 19:04:15 +0000159 &and (&DWP(8,"edi"),0xffffffdf); # clear AVX2
Andy Polyakov3df2eff2007-07-21 14:46:27 +0000160&set_label("done");
Andy Polyakovb9064222011-05-16 20:35:11 +0000161 &mov ("eax","esi");
162 &mov ("edx","ebp");
Andy Polyakov0f2ece82012-02-28 14:20:21 +0000163&set_label("nocpuid");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000164&function_end("OPENSSL_ia32_cpuid");
165
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000166&external_label("OPENSSL_ia32cap_P");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000167
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000168&function_begin_B("OPENSSL_rdtsc","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000169 &xor ("eax","eax");
170 &xor ("edx","edx");
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000171 &picmeup("ecx","OPENSSL_ia32cap_P");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000172 &bt (&DWP(0,"ecx"),4);
173 &jnc (&label("notsc"));
174 &rdtsc ();
175&set_label("notsc");
176 &ret ();
177&function_end_B("OPENSSL_rdtsc");
178
Rich Salzf642ebc2014-08-09 08:02:20 -0400179# This works in Ring 0 only [read DJGPP+MS-DOS+privileged DPMI host],
Andy Polyakovc85c5c42004-09-09 14:50:32 +0000180# but it's safe to call it on any [supported] 32-bit platform...
181# Just check for [non-]zero return value...
182&function_begin_B("OPENSSL_instrument_halt","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
183 &picmeup("ecx","OPENSSL_ia32cap_P");
184 &bt (&DWP(0,"ecx"),4);
185 &jnc (&label("nohalt")); # no TSC
186
187 &data_word(0x9058900e); # push %cs; pop %eax
188 &and ("eax",3);
189 &jnz (&label("nohalt")); # not enough privileges
190
191 &pushf ();
Andy Polyakovf9c5e5d2012-04-28 10:36:58 +0000192 &pop ("eax");
Andy Polyakovc85c5c42004-09-09 14:50:32 +0000193 &bt ("eax",9);
194 &jnc (&label("nohalt")); # interrupts are disabled
195
196 &rdtsc ();
197 &push ("edx");
198 &push ("eax");
199 &halt ();
200 &rdtsc ();
201
202 &sub ("eax",&DWP(0,"esp"));
203 &sbb ("edx",&DWP(4,"esp"));
204 &add ("esp",8);
205 &ret ();
206
207&set_label("nohalt");
208 &xor ("eax","eax");
209 &xor ("edx","edx");
210 &ret ();
211&function_end_B("OPENSSL_instrument_halt");
212
Rich Salzf642ebc2014-08-09 08:02:20 -0400213# Essentially there is only one use for this function. Under DJGPP:
214#
215# #include <go32.h>
216# ...
217# i=OPENSSL_far_spin(_dos_ds,0x46c);
218# ...
219# to obtain the number of spins till closest timer interrupt.
220
221&function_begin_B("OPENSSL_far_spin");
222 &pushf ();
223 &pop ("eax");
224 &bt ("eax",9);
225 &jnc (&label("nospin")); # interrupts are disabled
226
227 &mov ("eax",&DWP(4,"esp"));
228 &mov ("ecx",&DWP(8,"esp"));
229 &data_word (0x90d88e1e); # push %ds, mov %eax,%ds
230 &xor ("eax","eax");
231 &mov ("edx",&DWP(0,"ecx"));
232 &jmp (&label("spin"));
233
234 &align (16);
235&set_label("spin");
236 &inc ("eax");
237 &cmp ("edx",&DWP(0,"ecx"));
238 &je (&label("spin"));
239
240 &data_word (0x1f909090); # pop %ds
241 &ret ();
242
243&set_label("nospin");
244 &xor ("eax","eax");
245 &xor ("edx","edx");
246 &ret ();
247&function_end_B("OPENSSL_far_spin");
Andy Polyakovcee73df2005-05-03 21:05:06 +0000248
249&function_begin_B("OPENSSL_wipe_cpu","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
250 &xor ("eax","eax");
251 &xor ("edx","edx");
252 &picmeup("ecx","OPENSSL_ia32cap_P");
253 &mov ("ecx",&DWP(0,"ecx"));
254 &bt (&DWP(0,"ecx"),1);
255 &jnc (&label("no_x87"));
Andy Polyakovc5022652005-05-18 08:42:08 +0000256 if ($sse2) {
Andy Polyakovb9064222011-05-16 20:35:11 +0000257 &and ("ecx",1<<26|1<<24); # check SSE2 and FXSR bits
258 &cmp ("ecx",1<<26|1<<24);
259 &jne (&label("no_sse2"));
Andy Polyakovc5022652005-05-18 08:42:08 +0000260 &pxor ("xmm0","xmm0");
261 &pxor ("xmm1","xmm1");
262 &pxor ("xmm2","xmm2");
263 &pxor ("xmm3","xmm3");
264 &pxor ("xmm4","xmm4");
265 &pxor ("xmm5","xmm5");
266 &pxor ("xmm6","xmm6");
267 &pxor ("xmm7","xmm7");
268 &set_label("no_sse2");
269 }
Andy Polyakovc49a0aa2005-06-24 16:32:10 +0000270 # just a bunch of fldz to zap the fp/mm bank followed by finit...
271 &data_word(0xeed9eed9,0xeed9eed9,0xeed9eed9,0xeed9eed9,0x90e3db9b);
Andy Polyakovcee73df2005-05-03 21:05:06 +0000272&set_label("no_x87");
273 &lea ("eax",&DWP(4,"esp"));
274 &ret ();
275&function_end_B("OPENSSL_wipe_cpu");
276
277&function_begin_B("OPENSSL_atomic_add");
278 &mov ("edx",&DWP(4,"esp")); # fetch the pointer, 1st arg
279 &mov ("ecx",&DWP(8,"esp")); # fetch the increment, 2nd arg
280 &push ("ebx");
281 &nop ();
282 &mov ("eax",&DWP(0,"edx"));
283&set_label("spin");
284 &lea ("ebx",&DWP(0,"eax","ecx"));
285 &nop ();
286 &data_word(0x1ab10ff0); # lock; cmpxchg %ebx,(%edx) # %eax is envolved and is always reloaded
287 &jne (&label("spin"));
288 &mov ("eax","ebx"); # OpenSSL expects the new value
289 &pop ("ebx");
290 &ret ();
291&function_end_B("OPENSSL_atomic_add");
292
Andy Polyakovb2dba9b2007-05-14 21:35:25 +0000293&function_begin_B("OPENSSL_cleanse");
294 &mov ("edx",&wparam(0));
295 &mov ("ecx",&wparam(1));
296 &xor ("eax","eax");
297 &cmp ("ecx",7);
298 &jae (&label("lot"));
Andy Polyakov7676eeb2010-01-24 14:54:24 +0000299 &cmp ("ecx",0);
300 &je (&label("ret"));
Andy Polyakovb2dba9b2007-05-14 21:35:25 +0000301&set_label("little");
302 &mov (&BP(0,"edx"),"al");
303 &sub ("ecx",1);
304 &lea ("edx",&DWP(1,"edx"));
305 &jnz (&label("little"));
Andy Polyakov7676eeb2010-01-24 14:54:24 +0000306&set_label("ret");
Andy Polyakovb2dba9b2007-05-14 21:35:25 +0000307 &ret ();
308
309&set_label("lot",16);
310 &test ("edx",3);
311 &jz (&label("aligned"));
312 &mov (&BP(0,"edx"),"al");
313 &lea ("ecx",&DWP(-1,"ecx"));
314 &lea ("edx",&DWP(1,"edx"));
315 &jmp (&label("lot"));
316&set_label("aligned");
317 &mov (&DWP(0,"edx"),"eax");
318 &lea ("ecx",&DWP(-4,"ecx"));
319 &test ("ecx",-4);
320 &lea ("edx",&DWP(4,"edx"));
321 &jnz (&label("aligned"));
322 &cmp ("ecx",0);
323 &jne (&label("little"));
324 &ret ();
325&function_end_B("OPENSSL_cleanse");
326
Andy Polyakove33826f2016-05-15 17:01:15 +0200327&function_begin_B("CRYPTO_memcmp");
328 &push ("esi");
329 &push ("edi");
330 &mov ("esi",&wparam(0));
331 &mov ("edi",&wparam(1));
332 &mov ("ecx",&wparam(2));
333 &xor ("eax","eax");
334 &xor ("edx","edx");
335 &cmp ("ecx",0);
336 &je (&label("no_data"));
337&set_label("loop");
338 &mov ("dl",&BP(0,"esi"));
339 &lea ("esi",&DWP(1,"esi"));
340 &xor ("dl",&BP(0,"edi"));
341 &lea ("edi",&DWP(1,"edi"));
342 &or ("al","dl");
343 &dec ("ecx");
344 &jnz (&label("loop"));
345 &neg ("eax");
346 &shr ("eax",31);
347&set_label("no_data");
348 &pop ("edi");
349 &pop ("esi");
350 &ret ();
351&function_end_B("CRYPTO_memcmp");
Andy Polyakov5fabb882011-04-17 12:46:00 +0000352{
353my $lasttick = "esi";
354my $lastdiff = "ebx";
355my $out = "edi";
356my $cnt = "ecx";
357my $max = "ebp";
358
359&function_begin("OPENSSL_instrument_bus");
360 &mov ("eax",0);
361 if ($sse2) {
362 &picmeup("edx","OPENSSL_ia32cap_P");
363 &bt (&DWP(0,"edx"),4);
364 &jnc (&label("nogo")); # no TSC
365 &bt (&DWP(0,"edx"),19);
366 &jnc (&label("nogo")); # no CLFLUSH
367
368 &mov ($out,&wparam(0)); # load arguments
369 &mov ($cnt,&wparam(1));
370
371 # collect 1st tick
372 &rdtsc ();
373 &mov ($lasttick,"eax"); # lasttick = tick
374 &mov ($lastdiff,0); # lastdiff = 0
375 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000376 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000377 &add (&DWP(0,$out),$lastdiff);
378 &jmp (&label("loop"));
379
380&set_label("loop",16);
381 &rdtsc ();
382 &mov ("edx","eax"); # put aside tick (yes, I neglect edx)
383 &sub ("eax",$lasttick); # diff
384 &mov ($lasttick,"edx"); # lasttick = tick
385 &mov ($lastdiff,"eax"); # lastdiff = diff
386 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000387 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000388 &add (&DWP(0,$out),"eax"); # accumulate diff
389 &lea ($out,&DWP(4,$out)); # ++$out
390 &sub ($cnt,1); # --$cnt
391 &jnz (&label("loop"));
392
393 &mov ("eax",&wparam(1));
394&set_label("nogo");
395 }
396&function_end("OPENSSL_instrument_bus");
397
398&function_begin("OPENSSL_instrument_bus2");
399 &mov ("eax",0);
400 if ($sse2) {
401 &picmeup("edx","OPENSSL_ia32cap_P");
402 &bt (&DWP(0,"edx"),4);
403 &jnc (&label("nogo")); # no TSC
404 &bt (&DWP(0,"edx"),19);
405 &jnc (&label("nogo")); # no CLFLUSH
406
407 &mov ($out,&wparam(0)); # load arguments
408 &mov ($cnt,&wparam(1));
409 &mov ($max,&wparam(2));
410
411 &rdtsc (); # collect 1st tick
412 &mov ($lasttick,"eax"); # lasttick = tick
413 &mov ($lastdiff,0); # lastdiff = 0
414
415 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000416 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000417 &add (&DWP(0,$out),$lastdiff);
418
419 &rdtsc (); # collect 1st diff
420 &mov ("edx","eax"); # put aside tick (yes, I neglect edx)
421 &sub ("eax",$lasttick); # diff
422 &mov ($lasttick,"edx"); # lasttick = tick
423 &mov ($lastdiff,"eax"); # lastdiff = diff
424 &jmp (&label("loop2"));
425
426&set_label("loop2",16);
427 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000428 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000429 &add (&DWP(0,$out),"eax"); # accumulate diff
430
431 &sub ($max,1);
432 &jz (&label("done2"));
433
434 &rdtsc ();
435 &mov ("edx","eax"); # put aside tick (yes, I neglect edx)
436 &sub ("eax",$lasttick); # diff
437 &mov ($lasttick,"edx"); # lasttick = tick
438 &cmp ("eax",$lastdiff);
439 &mov ($lastdiff,"eax"); # lastdiff = diff
440 &mov ("edx",0);
441 &setne ("dl");
442 &sub ($cnt,"edx"); # conditional --$cnt
443 &lea ($out,&DWP(0,$out,"edx",4)); # conditional ++$out
444 &jnz (&label("loop2"));
445
446&set_label("done2");
447 &mov ("eax",&wparam(1));
448 &sub ("eax",$cnt);
449&set_label("nogo");
450 }
451&function_end("OPENSSL_instrument_bus2");
452}
453
Andy Polyakov9c940442016-07-10 12:05:43 +0200454sub gen_random {
455my $rdop = shift;
456&function_begin_B("OPENSSL_ia32_${rdop}");
Andy Polyakov301799b2011-06-04 12:20:45 +0000457 &mov ("ecx",8);
458&set_label("loop");
Andy Polyakov9c940442016-07-10 12:05:43 +0200459 &${rdop}("eax");
Andy Polyakov301799b2011-06-04 12:20:45 +0000460 &jc (&label("break"));
461 &loop (&label("loop"));
462&set_label("break");
463 &cmp ("eax",0);
464 &cmove ("eax","ecx");
465 &ret ();
Andy Polyakov9c940442016-07-10 12:05:43 +0200466&function_end_B("OPENSSL_ia32_${rdop}");
Andy Polyakov301799b2011-06-04 12:20:45 +0000467
Andy Polyakov9c940442016-07-10 12:05:43 +0200468&function_begin_B("OPENSSL_ia32_${rdop}_bytes");
469 &push ("edi");
470 &push ("ebx");
471 &xor ("eax","eax"); # return value
472 &mov ("edi",&wparam(0));
473 &mov ("ebx",&wparam(1));
474
475 &cmp ("ebx",0);
476 &je (&label("done"));
477
Andy Polyakovf4d45642014-02-14 17:24:12 +0100478 &mov ("ecx",8);
479&set_label("loop");
Andy Polyakov9c940442016-07-10 12:05:43 +0200480 &${rdop}("edx");
Andy Polyakovf4d45642014-02-14 17:24:12 +0100481 &jc (&label("break"));
482 &loop (&label("loop"));
Andy Polyakov9c940442016-07-10 12:05:43 +0200483 &jmp (&label("done"));
484
485&set_label("break",16);
486 &cmp ("ebx",4);
487 &jb (&label("tail"));
488 &mov (&DWP(0,"edi"),"edx");
489 &lea ("edi",&DWP(4,"edi"));
490 &add ("eax",4);
491 &sub ("ebx",4);
492 &jz (&label("done"));
493 &mov ("ecx",8);
494 &jmp (&label("loop"));
495
496&set_label("tail",16);
497 &mov (&BP(0,"edi"),"dl");
498 &lea ("edi",&DWP(1,"edi"));
499 &inc ("eax");
500 &shr ("edx",8);
501 &dec ("ebx");
502 &jnz (&label("tail"));
503
504&set_label("done");
505 &pop ("ebx");
506 &pop ("edi");
Andy Polyakovf4d45642014-02-14 17:24:12 +0100507 &ret ();
Andy Polyakov9c940442016-07-10 12:05:43 +0200508&function_end_B("OPENSSL_ia32_${rdop}_bytes");
509}
510&gen_random("rdrand");
511&gen_random("rdseed");
Andy Polyakovf4d45642014-02-14 17:24:12 +0100512
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000513&initseg("OPENSSL_cpuid_setup");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000514
Andy Polyakov62066822012-08-29 14:19:59 +0000515&hidden("OPENSSL_cpuid_setup");
516&hidden("OPENSSL_ia32cap_P");
517
Andy Polyakov14e21f82004-07-26 20:18:55 +0000518&asm_finish();
Richard Levitte0a4edb92016-03-07 15:00:45 +0100519
520close STDOUT;