summaryrefslogtreecommitdiffstats
path: root/contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c
diff options
context:
space:
mode:
authorzaycevm <[email protected]>2025-08-12 18:23:32 +0300
committerzaycevm <[email protected]>2025-08-12 18:58:10 +0300
commit7ce1229be33024092eb56910264510447d21116f (patch)
tree6697d934399db06c36ebd516ebe6f0a76245a3ba /contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c
parent27af3f7dfd34fe3cdd1c1329f3d205ac5ac136a3 (diff)
BoringSSL as optional cryptobackend for ngtcp2
PR добавляет возможность использовать BoringSSL в ngtcp2 в качестве криптобиблиотеки. Для проектов в Аркадии, уже зависящих от ngtcp2, добавлена явная зависимость от слоя абстракции quictls (сейчас в транке ngtcp2 собирается с quictls). commit_hash:3d6607abecfcff2157859acbdd18f9d0345ac485
Diffstat (limited to 'contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c')
-rw-r--r--contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c148
1 files changed, 148 insertions, 0 deletions
diff --git a/contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c b/contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c
new file mode 100644
index 00000000000..627d04d837f
--- /dev/null
+++ b/contrib/restricted/google/boringssl/crypto/cpu_arm_linux.c
@@ -0,0 +1,148 @@
+/* Copyright (c) 2016, Google Inc.
+ *
+ * Permission to use, copy, modify, and/or distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+ * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
+ * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
+ * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
+
+#include "internal.h"
+
+#if defined(OPENSSL_ARM) && defined(OPENSSL_LINUX) && \
+ !defined(OPENSSL_STATIC_ARMCAP)
+#include <errno.h>
+#include <fcntl.h>
+#include <sys/auxv.h>
+#include <sys/types.h>
+#include <unistd.h>
+
+#include <contrib/restricted/google/boringssl/include/openssl/arm_arch.h>
+#include <contrib/restricted/google/boringssl/include/openssl/mem.h>
+
+#include "cpu_arm_linux.h"
+
+static int open_eintr(const char *path, int flags) {
+ int ret;
+ do {
+ ret = open(path, flags);
+ } while (ret < 0 && errno == EINTR);
+ return ret;
+}
+
+static ssize_t read_eintr(int fd, void *out, size_t len) {
+ ssize_t ret;
+ do {
+ ret = read(fd, out, len);
+ } while (ret < 0 && errno == EINTR);
+ return ret;
+}
+
+// read_file opens |path| and reads until end-of-file. On success, it returns
+// one and sets |*out_ptr| and |*out_len| to a newly-allocated buffer with the
+// contents. Otherwise, it returns zero.
+static int read_file(char **out_ptr, size_t *out_len, const char *path) {
+ int fd = open_eintr(path, O_RDONLY);
+ if (fd < 0) {
+ return 0;
+ }
+
+ static const size_t kReadSize = 1024;
+ int ret = 0;
+ size_t cap = kReadSize, len = 0;
+ char *buf = OPENSSL_malloc(cap);
+ if (buf == NULL) {
+ goto err;
+ }
+
+ for (;;) {
+ if (cap - len < kReadSize) {
+ size_t new_cap = cap * 2;
+ if (new_cap < cap) {
+ goto err;
+ }
+ char *new_buf = OPENSSL_realloc(buf, new_cap);
+ if (new_buf == NULL) {
+ goto err;
+ }
+ buf = new_buf;
+ cap = new_cap;
+ }
+
+ ssize_t bytes_read = read_eintr(fd, buf + len, kReadSize);
+ if (bytes_read < 0) {
+ goto err;
+ }
+ if (bytes_read == 0) {
+ break;
+ }
+ len += bytes_read;
+ }
+
+ *out_ptr = buf;
+ *out_len = len;
+ ret = 1;
+ buf = NULL;
+
+err:
+ OPENSSL_free(buf);
+ close(fd);
+ return ret;
+}
+
+static int g_needs_hwcap2_workaround;
+
+void OPENSSL_cpuid_setup(void) {
+ // We ignore the return value of |read_file| and proceed with an empty
+ // /proc/cpuinfo on error. If |getauxval| works, we will still detect
+ // capabilities.
+ char *cpuinfo_data = NULL;
+ size_t cpuinfo_len = 0;
+ read_file(&cpuinfo_data, &cpuinfo_len, "/proc/cpuinfo");
+ STRING_PIECE cpuinfo;
+ cpuinfo.data = cpuinfo_data;
+ cpuinfo.len = cpuinfo_len;
+
+ // Matching OpenSSL, only report other features if NEON is present.
+ unsigned long hwcap = getauxval(AT_HWCAP);
+ if (hwcap & HWCAP_NEON) {
+ BSSL_armcap_P |= ARMV7_NEON;
+
+ // Some ARMv8 Android devices don't expose AT_HWCAP2. Fall back to
+ // /proc/cpuinfo. See https://crbug.com/boringssl/46. As of February 2021,
+ // this is now rare (see Chrome's Net.NeedsHWCAP2Workaround metric), but AES
+ // and PMULL extensions are very useful, so we still carry the workaround
+ // for now.
+ unsigned long hwcap2 = getauxval(AT_HWCAP2);
+ if (hwcap2 == 0) {
+ hwcap2 = crypto_get_arm_hwcap2_from_cpuinfo(&cpuinfo);
+ g_needs_hwcap2_workaround = hwcap2 != 0;
+ }
+
+ if (hwcap2 & HWCAP2_AES) {
+ BSSL_armcap_P |= ARMV8_AES;
+ }
+ if (hwcap2 & HWCAP2_PMULL) {
+ BSSL_armcap_P |= ARMV8_PMULL;
+ }
+ if (hwcap2 & HWCAP2_SHA1) {
+ BSSL_armcap_P |= ARMV8_SHA1;
+ }
+ if (hwcap2 & HWCAP2_SHA2) {
+ BSSL_armcap_P |= ARMV8_SHA256;
+ }
+ }
+
+ OPENSSL_free(cpuinfo_data);
+}
+
+int CRYPTO_has_broken_NEON(void) { return 0; }
+
+int CRYPTO_needs_hwcap2_workaround(void) { return g_needs_hwcap2_workaround; }
+
+#endif // OPENSSL_ARM && OPENSSL_LINUX && !OPENSSL_STATIC_ARMCAP