From nobody Tue Feb 10 07:43:00 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+111538+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+111538+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=arm.com ARC-Seal: i=1; a=rsa-sha256; t=1700556538; cv=none; d=zohomail.com; s=zohoarc; b=blDJgbyRorxTEFHnjvb9Ev18p/eU9OLJxiGRxwuTxx3bxKJYyxeAuJbuOYMs7alm8FwBc3yRtnhQh+sRMKcR+rQVqPSR1jSrl1UOiBMGhsa9023ZTFnY5QL3nWVi+myv8BzDdus8Mn+26c1vEtxrvClhpvSNShQHs1CP+hNQz70= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1700556538; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Reply-To:References:Sender:Subject:Subject:To:To:Message-Id; bh=h6FCxY48OXWjw5W1fZzxX3GKVlcYZ1y2JFKagyDhjpY=; b=PpN0lpl6gnfEHG9wKlS/3fGLMxlJfgvNfierzkoGPlZoqx6ItwK4UuavonCbdYPqmnDFBEdZMc9A65JygdiobeUdeNPrsEjJqyXD7Kna1XxzFagtZV9N9Z+7lrnl7j2QeN94zoIWogF3XfEu2Ueb0oTSzorPhrcNxIJ9WhuVdQY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+111538+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1700556538485844.2850993977163; Tue, 21 Nov 2023 00:48:58 -0800 (PST) Return-Path: DKIM-Signature: a=rsa-sha256; bh=YEaoGAkWm3o+vjVXvwem3F2ywNtGaNQBTLKOS6CASA0=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1700556538; v=1; b=dltcPAugUEaXF5AkMLotKeaCS/tAiNN5Ot9JSOU/5Lhm/nAxd/1nLeG90Cz9z+dYHTdkF+rE MlwhFuJhE1D9tiNAql28ElPdSPNpxjxJA5Z0Fs3IFPC+hglznVtajU4Rkox+TZLYFiZ85wFP0tP OF3ttEf8BOboI4grI8mRC/RA= X-Received: by 127.0.0.2 with SMTP id tARUYY1788612x3IoRzP3WGq; Tue, 21 Nov 2023 00:48:58 -0800 X-Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.34449.1700556537435951528 for ; Tue, 21 Nov 2023 00:48:57 -0800 X-Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 2C18E1684; Tue, 21 Nov 2023 00:49:43 -0800 (PST) X-Received: from cam-smtp0.cambridge.arm.com (e126645.nice.arm.com [10.34.100.114]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 322023F73F; Tue, 21 Nov 2023 00:48:55 -0800 (PST) From: "PierreGondois" To: devel@edk2.groups.io Cc: Jiewen Yao , Yi Li , Xiaoyu Lu , Guomin Jiang , Leif Lindholm , Ard Biesheuvel , Sami Mujawar , Gerd Hoffmann Subject: [edk2-devel] [PATCH v5 5/6] CryptoPkg/OpensslLib: Add AArch64Cap for arch specific hooks Date: Tue, 21 Nov 2023 09:47:14 +0100 Message-Id: <20231121084715.1393672-6-pierre.gondois@arm.com> In-Reply-To: <20231121084715.1393672-1-pierre.gondois@arm.com> References: <20231121084715.1393672-1-pierre.gondois@arm.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,pierre.gondois@arm.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: p7fMJ9S1mCgVXoQQxXzAy2j8x1787277AA= Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1700556540591100005 Content-Type: text/plain; charset="utf-8" Add AARCH64 specific implementations of: - OPENSSL_cpuid_setup(), probing hardware capabilitie (presence of FEAT_AES, etc.) - OPENSSL_rdtsc(), returning non-trusted entropy by accessing system counter. Acked-by: Gerd Hoffmann Acked-by: Leif Lindholm Signed-off-by: Pierre Gondois --- .../Library/OpensslLib/OpensslLibAccel.inf | 7 ++ .../OpensslLib/OpensslLibFullAccel.inf | 7 ++ .../OpensslLib/OpensslStub/AArch64Cap.c | 66 +++++++++++++++++++ 3 files changed, 80 insertions(+) create mode 100644 CryptoPkg/Library/OpensslLib/OpensslStub/AArch64Cap.c diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibAccel.inf b/CryptoPkg/L= ibrary/OpensslLib/OpensslLibAccel.inf index 3d1a9638b1c1..08e8be6ea9e1 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLibAccel.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLibAccel.inf @@ -1329,6 +1329,7 @@ [Sources.X64] # Autogenerated files list ends here =20 [Sources.AARCH64] + OpensslStub/AArch64Cap.c # Autogenerated files list starts here $(OPENSSL_PATH)/crypto/aes/aes_cbc.c $(OPENSSL_PATH)/crypto/aes/aes_cfb.c @@ -1955,11 +1956,17 @@ [Packages] MdePkg/MdePkg.dec CryptoPkg/CryptoPkg.dec =20 +[Packages.AARCH64] + ArmPkg/ArmPkg.dec + [LibraryClasses] BaseLib DebugLib RngLib =20 +[LibraryClasses.AARCH64] + ArmLib + [BuildOptions] # # Disables the following Visual Studio compiler warnings brought by open= ssl source, diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibFullAccel.inf b/CryptoP= kg/Library/OpensslLib/OpensslLibFullAccel.inf index e7e83d419f4b..2a01ffe06bd7 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLibFullAccel.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLibFullAccel.inf @@ -1432,6 +1432,7 @@ [Sources.X64] # Autogenerated files list ends here =20 [Sources.AARCH64] + OpensslStub/AArch64Cap.c # Autogenerated files list starts here $(OPENSSL_PATH)/crypto/aes/aes_cbc.c $(OPENSSL_PATH)/crypto/aes/aes_cfb.c @@ -2107,11 +2108,17 @@ [Packages] MdePkg/MdePkg.dec CryptoPkg/CryptoPkg.dec =20 +[Packages.AARCH64] + ArmPkg/ArmPkg.dec + [LibraryClasses] BaseLib DebugLib RngLib =20 +[LibraryClasses.AARCH64] + ArmLib + [BuildOptions] # # Disables the following Visual Studio compiler warnings brought by open= ssl source, diff --git a/CryptoPkg/Library/OpensslLib/OpensslStub/AArch64Cap.c b/Crypto= Pkg/Library/OpensslLib/OpensslStub/AArch64Cap.c new file mode 100644 index 000000000000..846b004a4dd3 --- /dev/null +++ b/CryptoPkg/Library/OpensslLib/OpensslStub/AArch64Cap.c @@ -0,0 +1,66 @@ +/** @file + Arm capabilities probing. + + Copyright (c) 2023, Arm Limited. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent +**/ + +#include +#include "crypto/arm_arch.h" + +#include + +UINT32 OPENSSL_armcap_P =3D 0; + +void +OPENSSL_cpuid_setup ( + void + ) +{ + OPENSSL_armcap_P =3D 0; + + /* Access to EL0 registers is possible from higher ELx. */ + OPENSSL_armcap_P |=3D ARMV8_CPUID; + /* Access to Physical timer is possible. */ + OPENSSL_armcap_P |=3D ARMV7_TICK; + + /* Neon support is not guaranteed, but it is assumed to be present. + Arm ARM for Armv8, sA1.5 Advanced SIMD and floating-point support + */ + OPENSSL_armcap_P |=3D ARMV7_NEON; + + if (ArmHasAes ()) { + OPENSSL_armcap_P |=3D ARMV8_AES; + } + + if (ArmHasSha1 ()) { + OPENSSL_armcap_P |=3D ARMV8_SHA1; + } + + if (ArmHasSha256 ()) { + OPENSSL_armcap_P |=3D ARMV8_SHA256; + } + + if (ArmHasPmull ()) { + OPENSSL_armcap_P |=3D ARMV8_PMULL; + } + + if (ArmHasSha512 ()) { + OPENSSL_armcap_P |=3D ARMV8_SHA512; + } +} + +/** Read system counter value. + + Used to get some non-trusted entropy. + + @return Lower bits of the physical counter. +**/ +uint32_t +OPENSSL_rdtsc ( + void + ) +{ + return (UINT32)ArmReadCntPct (); +} --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#111538): https://edk2.groups.io/g/devel/message/111538 Mute This Topic: https://groups.io/mt/102725181/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-