blob: 86772329bc7bd5a2492e59fdddb25e7901b0f6c2 [file] [log] [blame]
Andy Polyakov14e21f82004-07-26 20:18:55 +00001#!/usr/bin/env perl
2
Dr. Stephen Henson4d1f3f72008-01-05 22:28:38 +00003$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
4push(@INC, "${dir}perlasm", "perlasm");
Andy Polyakov14e21f82004-07-26 20:18:55 +00005require "x86asm.pl";
6
7&asm_init($ARGV[0],"x86cpuid");
8
Andy Polyakovc5022652005-05-18 08:42:08 +00009for (@ARGV) { $sse2=1 if (/-DOPENSSL_IA32_SSE2/); }
10
Andy Polyakov14e21f82004-07-26 20:18:55 +000011&function_begin("OPENSSL_ia32_cpuid");
12 &xor ("edx","edx");
13 &pushf ();
14 &pop ("eax");
15 &mov ("ecx","eax");
16 &xor ("eax",1<<21);
17 &push ("eax");
18 &popf ();
19 &pushf ();
20 &pop ("eax");
21 &xor ("ecx","eax");
Andy Polyakov162f6772007-04-01 17:28:08 +000022 &xor ("eax","eax");
Andy Polyakov0f2ece82012-02-28 14:20:21 +000023 &bt ("ecx",21);
24 &jnc (&label("nocpuid"));
Andy Polyakovc5cd28b2012-11-17 19:04:15 +000025 &mov ("esi",&wparam(0));
26 &mov (&DWP(8,"esi"),"eax"); # clear 3rd word
Andy Polyakov162f6772007-04-01 17:28:08 +000027 &cpuid ();
Andy Polyakov761393b2009-05-14 18:17:26 +000028 &mov ("edi","eax"); # max value for standard query level
29
Andy Polyakov162f6772007-04-01 17:28:08 +000030 &xor ("eax","eax");
31 &cmp ("ebx",0x756e6547); # "Genu"
32 &setne (&LB("eax"));
33 &mov ("ebp","eax");
34 &cmp ("edx",0x49656e69); # "ineI"
35 &setne (&LB("eax"));
36 &or ("ebp","eax");
37 &cmp ("ecx",0x6c65746e); # "ntel"
38 &setne (&LB("eax"));
Andy Polyakov58672312009-05-12 21:19:41 +000039 &or ("ebp","eax"); # 0 indicates Intel CPU
Andy Polyakov58672312009-05-12 21:19:41 +000040 &jz (&label("intel"));
41
42 &cmp ("ebx",0x68747541); # "Auth"
43 &setne (&LB("eax"));
44 &mov ("esi","eax");
45 &cmp ("edx",0x69746E65); # "enti"
46 &setne (&LB("eax"));
47 &or ("esi","eax");
48 &cmp ("ecx",0x444D4163); # "cAMD"
49 &setne (&LB("eax"));
50 &or ("esi","eax"); # 0 indicates AMD CPU
51 &jnz (&label("intel"));
52
Andy Polyakov761393b2009-05-14 18:17:26 +000053 # AMD specific
Andy Polyakov58672312009-05-12 21:19:41 +000054 &mov ("eax",0x80000000);
55 &cpuid ();
Andy Polyakovb9064222011-05-16 20:35:11 +000056 &cmp ("eax",0x80000001);
57 &jb (&label("intel"));
58 &mov ("esi","eax");
59 &mov ("eax",0x80000001);
60 &cpuid ();
61 &or ("ebp","ecx");
62 &and ("ebp",1<<11|1); # isolate XOP bit
63 &cmp ("esi",0x80000008);
Andy Polyakov58672312009-05-12 21:19:41 +000064 &jb (&label("intel"));
65
66 &mov ("eax",0x80000008);
67 &cpuid ();
68 &movz ("esi",&LB("ecx")); # number of cores - 1
69 &inc ("esi"); # number of cores
70
Andy Polyakov761393b2009-05-14 18:17:26 +000071 &mov ("eax",1);
Andy Polyakov5702e962013-03-04 20:05:04 +010072 &xor ("ecx","ecx");
Andy Polyakov761393b2009-05-14 18:17:26 +000073 &cpuid ();
74 &bt ("edx",28);
Andy Polyakovb9064222011-05-16 20:35:11 +000075 &jnc (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +000076 &shr ("ebx",16);
77 &and ("ebx",0xff);
78 &cmp ("ebx","esi");
Andy Polyakovb9064222011-05-16 20:35:11 +000079 &ja (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +000080 &and ("edx",0xefffffff); # clear hyper-threading bit
Andy Polyakovb9064222011-05-16 20:35:11 +000081 &jmp (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +000082
Andy Polyakov58672312009-05-12 21:19:41 +000083&set_label("intel");
Andy Polyakov1bc0b682013-06-10 22:20:46 +020084 &cmp ("edi",7);
85 &jb (&label("cacheinfo"));
86
87 &mov ("esi",&wparam(0));
88 &mov ("eax",7);
89 &xor ("ecx","ecx");
90 &cpuid ();
91 &mov (&DWP(8,"esi"),"ebx");
92
93&set_label("cacheinfo");
Andy Polyakov761393b2009-05-14 18:17:26 +000094 &cmp ("edi",4);
95 &mov ("edi",-1);
96 &jb (&label("nocacheinfo"));
97
98 &mov ("eax",4);
99 &mov ("ecx",0); # query L1D
100 &cpuid ();
101 &mov ("edi","eax");
102 &shr ("edi",14);
103 &and ("edi",0xfff); # number of cores -1 per L1D
104
105&set_label("nocacheinfo");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000106 &mov ("eax",1);
Andy Polyakov5702e962013-03-04 20:05:04 +0100107 &xor ("ecx","ecx");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000108 &cpuid ();
Andy Polyakov18f56032011-05-29 12:50:02 +0000109 &and ("edx",0xbfefffff); # force reserved bits #20, #30 to 0
Andy Polyakov162f6772007-04-01 17:28:08 +0000110 &cmp ("ebp",0);
Andy Polyakov4bb90082011-05-27 15:32:43 +0000111 &jne (&label("notintel"));
112 &or ("edx",1<<30); # set reserved bit#30 on Intel CPUs
Andy Polyakov3df2eff2007-07-21 14:46:27 +0000113 &and (&HB("eax"),15); # familiy ID
114 &cmp (&HB("eax"),15); # P4?
Andy Polyakov4bb90082011-05-27 15:32:43 +0000115 &jne (&label("notintel"));
116 &or ("edx",1<<20); # set reserved bit#20 to engage RC4_CHAR
117&set_label("notintel");
Andy Polyakov3df2eff2007-07-21 14:46:27 +0000118 &bt ("edx",28); # test hyper-threading bit
Andy Polyakovb9064222011-05-16 20:35:11 +0000119 &jnc (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +0000120 &and ("edx",0xefffffff);
121 &cmp ("edi",0);
Andy Polyakovb9064222011-05-16 20:35:11 +0000122 &je (&label("generic"));
Andy Polyakov761393b2009-05-14 18:17:26 +0000123
124 &or ("edx",0x10000000);
Andy Polyakov162f6772007-04-01 17:28:08 +0000125 &shr ("ebx",16);
Andy Polyakov761393b2009-05-14 18:17:26 +0000126 &cmp (&LB("ebx"),1);
Andy Polyakovb9064222011-05-16 20:35:11 +0000127 &ja (&label("generic"));
Andy Polyakovb1e8b4e2007-05-19 17:52:51 +0000128 &and ("edx",0xefffffff); # clear hyper-threading bit if not
Andy Polyakovb9064222011-05-16 20:35:11 +0000129
130&set_label("generic");
131 &and ("ebp",1<<11); # isolate AMD XOP flag
Andy Polyakov18f56032011-05-29 12:50:02 +0000132 &and ("ecx",0xfffff7ff); # force 11th bit to 0
Andy Polyakovb9064222011-05-16 20:35:11 +0000133 &mov ("esi","edx");
134 &or ("ebp","ecx"); # merge AMD XOP flag
135
Andy Polyakovb9064222011-05-16 20:35:11 +0000136 &bt ("ecx",27); # check OSXSAVE bit
Andy Polyakove879dd42011-11-05 10:44:12 +0000137 &jnc (&label("clear_avx"));
Andy Polyakovb9064222011-05-16 20:35:11 +0000138 &xor ("ecx","ecx");
139 &data_byte(0x0f,0x01,0xd0); # xgetbv
140 &and ("eax",6);
141 &cmp ("eax",6);
142 &je (&label("done"));
143 &cmp ("eax",2);
144 &je (&label("clear_avx"));
145&set_label("clear_xmm");
Andy Polyakov18f56032011-05-29 12:50:02 +0000146 &and ("ebp",0xfdfffffd); # clear AESNI and PCLMULQDQ bits
147 &and ("esi",0xfeffffff); # clear FXSR
Andy Polyakovb9064222011-05-16 20:35:11 +0000148&set_label("clear_avx");
Andy Polyakov18f56032011-05-29 12:50:02 +0000149 &and ("ebp",0xefffe7ff); # clear AVX, FMA and AMD XOP bits
Andy Polyakovc5cd28b2012-11-17 19:04:15 +0000150 &mov ("edi",&wparam(0));
151 &and (&DWP(8,"edi"),0xffffffdf); # clear AVX2
Andy Polyakov3df2eff2007-07-21 14:46:27 +0000152&set_label("done");
Andy Polyakovb9064222011-05-16 20:35:11 +0000153 &mov ("eax","esi");
154 &mov ("edx","ebp");
Andy Polyakov0f2ece82012-02-28 14:20:21 +0000155&set_label("nocpuid");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000156&function_end("OPENSSL_ia32_cpuid");
157
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000158&external_label("OPENSSL_ia32cap_P");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000159
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000160&function_begin_B("OPENSSL_rdtsc","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000161 &xor ("eax","eax");
162 &xor ("edx","edx");
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000163 &picmeup("ecx","OPENSSL_ia32cap_P");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000164 &bt (&DWP(0,"ecx"),4);
165 &jnc (&label("notsc"));
166 &rdtsc ();
167&set_label("notsc");
168 &ret ();
169&function_end_B("OPENSSL_rdtsc");
170
Rich Salzf642ebc2014-08-09 08:02:20 -0400171# This works in Ring 0 only [read DJGPP+MS-DOS+privileged DPMI host],
Andy Polyakovc85c5c42004-09-09 14:50:32 +0000172# but it's safe to call it on any [supported] 32-bit platform...
173# Just check for [non-]zero return value...
174&function_begin_B("OPENSSL_instrument_halt","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
175 &picmeup("ecx","OPENSSL_ia32cap_P");
176 &bt (&DWP(0,"ecx"),4);
177 &jnc (&label("nohalt")); # no TSC
178
179 &data_word(0x9058900e); # push %cs; pop %eax
180 &and ("eax",3);
181 &jnz (&label("nohalt")); # not enough privileges
182
183 &pushf ();
Andy Polyakovf9c5e5d2012-04-28 10:36:58 +0000184 &pop ("eax");
Andy Polyakovc85c5c42004-09-09 14:50:32 +0000185 &bt ("eax",9);
186 &jnc (&label("nohalt")); # interrupts are disabled
187
188 &rdtsc ();
189 &push ("edx");
190 &push ("eax");
191 &halt ();
192 &rdtsc ();
193
194 &sub ("eax",&DWP(0,"esp"));
195 &sbb ("edx",&DWP(4,"esp"));
196 &add ("esp",8);
197 &ret ();
198
199&set_label("nohalt");
200 &xor ("eax","eax");
201 &xor ("edx","edx");
202 &ret ();
203&function_end_B("OPENSSL_instrument_halt");
204
Rich Salzf642ebc2014-08-09 08:02:20 -0400205# Essentially there is only one use for this function. Under DJGPP:
206#
207# #include <go32.h>
208# ...
209# i=OPENSSL_far_spin(_dos_ds,0x46c);
210# ...
211# to obtain the number of spins till closest timer interrupt.
212
213&function_begin_B("OPENSSL_far_spin");
214 &pushf ();
215 &pop ("eax");
216 &bt ("eax",9);
217 &jnc (&label("nospin")); # interrupts are disabled
218
219 &mov ("eax",&DWP(4,"esp"));
220 &mov ("ecx",&DWP(8,"esp"));
221 &data_word (0x90d88e1e); # push %ds, mov %eax,%ds
222 &xor ("eax","eax");
223 &mov ("edx",&DWP(0,"ecx"));
224 &jmp (&label("spin"));
225
226 &align (16);
227&set_label("spin");
228 &inc ("eax");
229 &cmp ("edx",&DWP(0,"ecx"));
230 &je (&label("spin"));
231
232 &data_word (0x1f909090); # pop %ds
233 &ret ();
234
235&set_label("nospin");
236 &xor ("eax","eax");
237 &xor ("edx","edx");
238 &ret ();
239&function_end_B("OPENSSL_far_spin");
Andy Polyakovcee73df2005-05-03 21:05:06 +0000240
241&function_begin_B("OPENSSL_wipe_cpu","EXTRN\t_OPENSSL_ia32cap_P:DWORD");
242 &xor ("eax","eax");
243 &xor ("edx","edx");
244 &picmeup("ecx","OPENSSL_ia32cap_P");
245 &mov ("ecx",&DWP(0,"ecx"));
246 &bt (&DWP(0,"ecx"),1);
247 &jnc (&label("no_x87"));
Andy Polyakovc5022652005-05-18 08:42:08 +0000248 if ($sse2) {
Andy Polyakovb9064222011-05-16 20:35:11 +0000249 &and ("ecx",1<<26|1<<24); # check SSE2 and FXSR bits
250 &cmp ("ecx",1<<26|1<<24);
251 &jne (&label("no_sse2"));
Andy Polyakovc5022652005-05-18 08:42:08 +0000252 &pxor ("xmm0","xmm0");
253 &pxor ("xmm1","xmm1");
254 &pxor ("xmm2","xmm2");
255 &pxor ("xmm3","xmm3");
256 &pxor ("xmm4","xmm4");
257 &pxor ("xmm5","xmm5");
258 &pxor ("xmm6","xmm6");
259 &pxor ("xmm7","xmm7");
260 &set_label("no_sse2");
261 }
Andy Polyakovc49a0aa2005-06-24 16:32:10 +0000262 # just a bunch of fldz to zap the fp/mm bank followed by finit...
263 &data_word(0xeed9eed9,0xeed9eed9,0xeed9eed9,0xeed9eed9,0x90e3db9b);
Andy Polyakovcee73df2005-05-03 21:05:06 +0000264&set_label("no_x87");
265 &lea ("eax",&DWP(4,"esp"));
266 &ret ();
267&function_end_B("OPENSSL_wipe_cpu");
268
269&function_begin_B("OPENSSL_atomic_add");
270 &mov ("edx",&DWP(4,"esp")); # fetch the pointer, 1st arg
271 &mov ("ecx",&DWP(8,"esp")); # fetch the increment, 2nd arg
272 &push ("ebx");
273 &nop ();
274 &mov ("eax",&DWP(0,"edx"));
275&set_label("spin");
276 &lea ("ebx",&DWP(0,"eax","ecx"));
277 &nop ();
278 &data_word(0x1ab10ff0); # lock; cmpxchg %ebx,(%edx) # %eax is envolved and is always reloaded
279 &jne (&label("spin"));
280 &mov ("eax","ebx"); # OpenSSL expects the new value
281 &pop ("ebx");
282 &ret ();
283&function_end_B("OPENSSL_atomic_add");
284
Andy Polyakov061bebc2005-12-03 11:56:55 +0000285# This function can become handy under Win32 in situations when
286# we don't know which calling convention, __stdcall or __cdecl(*),
287# indirect callee is using. In C it can be deployed as
288#
289#ifdef OPENSSL_CPUID_OBJ
290# type OPENSSL_indirect_call(void *f,...);
291# ...
292# OPENSSL_indirect_call(func,[up to $max arguments]);
293#endif
294#
295# (*) it's designed to work even for __fastcall if number of
296# arguments is 1 or 2!
297&function_begin_B("OPENSSL_indirect_call");
298 {
Andy Polyakovf9c5e5d2012-04-28 10:36:58 +0000299 my ($max,$i)=(7,); # $max has to be chosen as 4*n-1
Andy Polyakov061bebc2005-12-03 11:56:55 +0000300 # in order to preserve eventual
301 # stack alignment
302 &push ("ebp");
303 &mov ("ebp","esp");
304 &sub ("esp",$max*4);
305 &mov ("ecx",&DWP(12,"ebp"));
306 &mov (&DWP(0,"esp"),"ecx");
307 &mov ("edx",&DWP(16,"ebp"));
308 &mov (&DWP(4,"esp"),"edx");
309 for($i=2;$i<$max;$i++)
310 {
311 # Some copies will be redundant/bogus...
312 &mov ("eax",&DWP(12+$i*4,"ebp"));
313 &mov (&DWP(0+$i*4,"esp"),"eax");
314 }
Andy Polyakov3ebf8982005-12-06 18:43:59 +0000315 &call_ptr (&DWP(8,"ebp"));# make the call...
Andy Polyakov061bebc2005-12-03 11:56:55 +0000316 &mov ("esp","ebp"); # ... and just restore the stack pointer
317 # without paying attention to what we called,
318 # (__cdecl *func) or (__stdcall *one).
319 &pop ("ebp");
320 &ret ();
321 }
322&function_end_B("OPENSSL_indirect_call");
323
Andy Polyakovb2dba9b2007-05-14 21:35:25 +0000324&function_begin_B("OPENSSL_cleanse");
325 &mov ("edx",&wparam(0));
326 &mov ("ecx",&wparam(1));
327 &xor ("eax","eax");
328 &cmp ("ecx",7);
329 &jae (&label("lot"));
Andy Polyakov7676eeb2010-01-24 14:54:24 +0000330 &cmp ("ecx",0);
331 &je (&label("ret"));
Andy Polyakovb2dba9b2007-05-14 21:35:25 +0000332&set_label("little");
333 &mov (&BP(0,"edx"),"al");
334 &sub ("ecx",1);
335 &lea ("edx",&DWP(1,"edx"));
336 &jnz (&label("little"));
Andy Polyakov7676eeb2010-01-24 14:54:24 +0000337&set_label("ret");
Andy Polyakovb2dba9b2007-05-14 21:35:25 +0000338 &ret ();
339
340&set_label("lot",16);
341 &test ("edx",3);
342 &jz (&label("aligned"));
343 &mov (&BP(0,"edx"),"al");
344 &lea ("ecx",&DWP(-1,"ecx"));
345 &lea ("edx",&DWP(1,"edx"));
346 &jmp (&label("lot"));
347&set_label("aligned");
348 &mov (&DWP(0,"edx"),"eax");
349 &lea ("ecx",&DWP(-4,"ecx"));
350 &test ("ecx",-4);
351 &lea ("edx",&DWP(4,"edx"));
352 &jnz (&label("aligned"));
353 &cmp ("ecx",0);
354 &jne (&label("little"));
355 &ret ();
356&function_end_B("OPENSSL_cleanse");
357
Andy Polyakov5fabb882011-04-17 12:46:00 +0000358{
359my $lasttick = "esi";
360my $lastdiff = "ebx";
361my $out = "edi";
362my $cnt = "ecx";
363my $max = "ebp";
364
365&function_begin("OPENSSL_instrument_bus");
366 &mov ("eax",0);
367 if ($sse2) {
368 &picmeup("edx","OPENSSL_ia32cap_P");
369 &bt (&DWP(0,"edx"),4);
370 &jnc (&label("nogo")); # no TSC
371 &bt (&DWP(0,"edx"),19);
372 &jnc (&label("nogo")); # no CLFLUSH
373
374 &mov ($out,&wparam(0)); # load arguments
375 &mov ($cnt,&wparam(1));
376
377 # collect 1st tick
378 &rdtsc ();
379 &mov ($lasttick,"eax"); # lasttick = tick
380 &mov ($lastdiff,0); # lastdiff = 0
381 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000382 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000383 &add (&DWP(0,$out),$lastdiff);
384 &jmp (&label("loop"));
385
386&set_label("loop",16);
387 &rdtsc ();
388 &mov ("edx","eax"); # put aside tick (yes, I neglect edx)
389 &sub ("eax",$lasttick); # diff
390 &mov ($lasttick,"edx"); # lasttick = tick
391 &mov ($lastdiff,"eax"); # lastdiff = diff
392 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000393 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000394 &add (&DWP(0,$out),"eax"); # accumulate diff
395 &lea ($out,&DWP(4,$out)); # ++$out
396 &sub ($cnt,1); # --$cnt
397 &jnz (&label("loop"));
398
399 &mov ("eax",&wparam(1));
400&set_label("nogo");
401 }
402&function_end("OPENSSL_instrument_bus");
403
404&function_begin("OPENSSL_instrument_bus2");
405 &mov ("eax",0);
406 if ($sse2) {
407 &picmeup("edx","OPENSSL_ia32cap_P");
408 &bt (&DWP(0,"edx"),4);
409 &jnc (&label("nogo")); # no TSC
410 &bt (&DWP(0,"edx"),19);
411 &jnc (&label("nogo")); # no CLFLUSH
412
413 &mov ($out,&wparam(0)); # load arguments
414 &mov ($cnt,&wparam(1));
415 &mov ($max,&wparam(2));
416
417 &rdtsc (); # collect 1st tick
418 &mov ($lasttick,"eax"); # lasttick = tick
419 &mov ($lastdiff,0); # lastdiff = 0
420
421 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000422 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000423 &add (&DWP(0,$out),$lastdiff);
424
425 &rdtsc (); # collect 1st diff
426 &mov ("edx","eax"); # put aside tick (yes, I neglect edx)
427 &sub ("eax",$lasttick); # diff
428 &mov ($lasttick,"edx"); # lasttick = tick
429 &mov ($lastdiff,"eax"); # lastdiff = diff
430 &jmp (&label("loop2"));
431
432&set_label("loop2",16);
433 &clflush(&DWP(0,$out));
Andy Polyakovb9064222011-05-16 20:35:11 +0000434 &data_byte(0xf0); # lock
Andy Polyakov5fabb882011-04-17 12:46:00 +0000435 &add (&DWP(0,$out),"eax"); # accumulate diff
436
437 &sub ($max,1);
438 &jz (&label("done2"));
439
440 &rdtsc ();
441 &mov ("edx","eax"); # put aside tick (yes, I neglect edx)
442 &sub ("eax",$lasttick); # diff
443 &mov ($lasttick,"edx"); # lasttick = tick
444 &cmp ("eax",$lastdiff);
445 &mov ($lastdiff,"eax"); # lastdiff = diff
446 &mov ("edx",0);
447 &setne ("dl");
448 &sub ($cnt,"edx"); # conditional --$cnt
449 &lea ($out,&DWP(0,$out,"edx",4)); # conditional ++$out
450 &jnz (&label("loop2"));
451
452&set_label("done2");
453 &mov ("eax",&wparam(1));
454 &sub ("eax",$cnt);
455&set_label("nogo");
456 }
457&function_end("OPENSSL_instrument_bus2");
458}
459
Andy Polyakov301799b2011-06-04 12:20:45 +0000460&function_begin_B("OPENSSL_ia32_rdrand");
461 &mov ("ecx",8);
462&set_label("loop");
463 &rdrand ("eax");
464 &jc (&label("break"));
465 &loop (&label("loop"));
466&set_label("break");
467 &cmp ("eax",0);
468 &cmove ("eax","ecx");
469 &ret ();
470&function_end_B("OPENSSL_ia32_rdrand");
471
Andy Polyakovf4d45642014-02-14 17:24:12 +0100472&function_begin_B("OPENSSL_ia32_rdseed");
473 &mov ("ecx",8);
474&set_label("loop");
475 &rdseed ("eax");
476 &jc (&label("break"));
477 &loop (&label("loop"));
478&set_label("break");
479 &cmp ("eax",0);
480 &cmove ("eax","ecx");
481 &ret ();
482&function_end_B("OPENSSL_ia32_rdseed");
483
Andy Polyakov2b247cf2004-08-29 16:36:05 +0000484&initseg("OPENSSL_cpuid_setup");
Andy Polyakov14e21f82004-07-26 20:18:55 +0000485
Andy Polyakov62066822012-08-29 14:19:59 +0000486&hidden("OPENSSL_cpuid_setup");
487&hidden("OPENSSL_ia32cap_P");
488
Andy Polyakov14e21f82004-07-26 20:18:55 +0000489&asm_finish();