A processor including general-purpose and cryptographic functionality, in
which cryptographic operations are visible to user-specified software.
According to one embodiment, a processor may include instruction
execution logic configured to execute instructions specified by a user of
the processor, where the instructions are compliant with a
general-purpose instruction set architecture. The processor may further
include a cryptographic functional unit configured to implement a
plurality of cryptographic operations, and further configured to process
the cryptographic operations independently of the instruction execution
logic. A subset of the instructions may be executable to cause individual
ones of the cryptographic operations to be processed by the cryptographic
functional unit.