serpent_avx_glue.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620
  1. /*
  2. * Glue Code for AVX assembler versions of Serpent Cipher
  3. *
  4. * Copyright (C) 2012 Johannes Goetzfried
  5. * <Johannes.Goetzfried@informatik.stud.uni-erlangen.de>
  6. *
  7. * Copyright © 2011-2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
  8. *
  9. * This program is free software; you can redistribute it and/or modify
  10. * it under the terms of the GNU General Public License as published by
  11. * the Free Software Foundation; either version 2 of the License, or
  12. * (at your option) any later version.
  13. *
  14. * This program is distributed in the hope that it will be useful,
  15. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. * GNU General Public License for more details.
  18. *
  19. * You should have received a copy of the GNU General Public License
  20. * along with this program; if not, write to the Free Software
  21. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
  22. * USA
  23. *
  24. */
  25. #include <linux/module.h>
  26. #include <linux/hardirq.h>
  27. #include <linux/types.h>
  28. #include <linux/crypto.h>
  29. #include <linux/err.h>
  30. #include <crypto/algapi.h>
  31. #include <crypto/serpent.h>
  32. #include <crypto/cryptd.h>
  33. #include <crypto/b128ops.h>
  34. #include <crypto/ctr.h>
  35. #include <crypto/lrw.h>
  36. #include <crypto/xts.h>
  37. #include <asm/xcr.h>
  38. #include <asm/xsave.h>
  39. #include <asm/crypto/serpent-avx.h>
  40. #include <asm/crypto/ablk_helper.h>
  41. #include <asm/crypto/glue_helper.h>
  42. /* 8-way parallel cipher functions */
  43. asmlinkage void serpent_ecb_enc_8way_avx(struct serpent_ctx *ctx, u8 *dst,
  44. const u8 *src);
  45. EXPORT_SYMBOL_GPL(serpent_ecb_enc_8way_avx);
  46. asmlinkage void serpent_ecb_dec_8way_avx(struct serpent_ctx *ctx, u8 *dst,
  47. const u8 *src);
  48. EXPORT_SYMBOL_GPL(serpent_ecb_dec_8way_avx);
  49. asmlinkage void serpent_cbc_dec_8way_avx(struct serpent_ctx *ctx, u8 *dst,
  50. const u8 *src);
  51. EXPORT_SYMBOL_GPL(serpent_cbc_dec_8way_avx);
  52. asmlinkage void serpent_ctr_8way_avx(struct serpent_ctx *ctx, u8 *dst,
  53. const u8 *src, le128 *iv);
  54. EXPORT_SYMBOL_GPL(serpent_ctr_8way_avx);
  55. asmlinkage void serpent_xts_enc_8way_avx(struct serpent_ctx *ctx, u8 *dst,
  56. const u8 *src, le128 *iv);
  57. EXPORT_SYMBOL_GPL(serpent_xts_enc_8way_avx);
  58. asmlinkage void serpent_xts_dec_8way_avx(struct serpent_ctx *ctx, u8 *dst,
  59. const u8 *src, le128 *iv);
  60. EXPORT_SYMBOL_GPL(serpent_xts_dec_8way_avx);
  61. void __serpent_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv)
  62. {
  63. be128 ctrblk;
  64. le128_to_be128(&ctrblk, iv);
  65. le128_inc(iv);
  66. __serpent_encrypt(ctx, (u8 *)&ctrblk, (u8 *)&ctrblk);
  67. u128_xor(dst, src, (u128 *)&ctrblk);
  68. }
  69. EXPORT_SYMBOL_GPL(__serpent_crypt_ctr);
  70. void serpent_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv)
  71. {
  72. glue_xts_crypt_128bit_one(ctx, dst, src, iv,
  73. GLUE_FUNC_CAST(__serpent_encrypt));
  74. }
  75. EXPORT_SYMBOL_GPL(serpent_xts_enc);
  76. void serpent_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv)
  77. {
  78. glue_xts_crypt_128bit_one(ctx, dst, src, iv,
  79. GLUE_FUNC_CAST(__serpent_decrypt));
  80. }
  81. EXPORT_SYMBOL_GPL(serpent_xts_dec);
  82. static const struct common_glue_ctx serpent_enc = {
  83. .num_funcs = 2,
  84. .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
  85. .funcs = { {
  86. .num_blocks = SERPENT_PARALLEL_BLOCKS,
  87. .fn_u = { .ecb = GLUE_FUNC_CAST(serpent_ecb_enc_8way_avx) }
  88. }, {
  89. .num_blocks = 1,
  90. .fn_u = { .ecb = GLUE_FUNC_CAST(__serpent_encrypt) }
  91. } }
  92. };
  93. static const struct common_glue_ctx serpent_ctr = {
  94. .num_funcs = 2,
  95. .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
  96. .funcs = { {
  97. .num_blocks = SERPENT_PARALLEL_BLOCKS,
  98. .fn_u = { .ctr = GLUE_CTR_FUNC_CAST(serpent_ctr_8way_avx) }
  99. }, {
  100. .num_blocks = 1,
  101. .fn_u = { .ctr = GLUE_CTR_FUNC_CAST(__serpent_crypt_ctr) }
  102. } }
  103. };
  104. static const struct common_glue_ctx serpent_enc_xts = {
  105. .num_funcs = 2,
  106. .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
  107. .funcs = { {
  108. .num_blocks = SERPENT_PARALLEL_BLOCKS,
  109. .fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_enc_8way_avx) }
  110. }, {
  111. .num_blocks = 1,
  112. .fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_enc) }
  113. } }
  114. };
  115. static const struct common_glue_ctx serpent_dec = {
  116. .num_funcs = 2,
  117. .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
  118. .funcs = { {
  119. .num_blocks = SERPENT_PARALLEL_BLOCKS,
  120. .fn_u = { .ecb = GLUE_FUNC_CAST(serpent_ecb_dec_8way_avx) }
  121. }, {
  122. .num_blocks = 1,
  123. .fn_u = { .ecb = GLUE_FUNC_CAST(__serpent_decrypt) }
  124. } }
  125. };
  126. static const struct common_glue_ctx serpent_dec_cbc = {
  127. .num_funcs = 2,
  128. .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
  129. .funcs = { {
  130. .num_blocks = SERPENT_PARALLEL_BLOCKS,
  131. .fn_u = { .cbc = GLUE_CBC_FUNC_CAST(serpent_cbc_dec_8way_avx) }
  132. }, {
  133. .num_blocks = 1,
  134. .fn_u = { .cbc = GLUE_CBC_FUNC_CAST(__serpent_decrypt) }
  135. } }
  136. };
  137. static const struct common_glue_ctx serpent_dec_xts = {
  138. .num_funcs = 2,
  139. .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
  140. .funcs = { {
  141. .num_blocks = SERPENT_PARALLEL_BLOCKS,
  142. .fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_dec_8way_avx) }
  143. }, {
  144. .num_blocks = 1,
  145. .fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_dec) }
  146. } }
  147. };
  148. static int ecb_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  149. struct scatterlist *src, unsigned int nbytes)
  150. {
  151. return glue_ecb_crypt_128bit(&serpent_enc, desc, dst, src, nbytes);
  152. }
  153. static int ecb_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  154. struct scatterlist *src, unsigned int nbytes)
  155. {
  156. return glue_ecb_crypt_128bit(&serpent_dec, desc, dst, src, nbytes);
  157. }
  158. static int cbc_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  159. struct scatterlist *src, unsigned int nbytes)
  160. {
  161. return glue_cbc_encrypt_128bit(GLUE_FUNC_CAST(__serpent_encrypt), desc,
  162. dst, src, nbytes);
  163. }
  164. static int cbc_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  165. struct scatterlist *src, unsigned int nbytes)
  166. {
  167. return glue_cbc_decrypt_128bit(&serpent_dec_cbc, desc, dst, src,
  168. nbytes);
  169. }
  170. static int ctr_crypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  171. struct scatterlist *src, unsigned int nbytes)
  172. {
  173. return glue_ctr_crypt_128bit(&serpent_ctr, desc, dst, src, nbytes);
  174. }
  175. static inline bool serpent_fpu_begin(bool fpu_enabled, unsigned int nbytes)
  176. {
  177. return glue_fpu_begin(SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS,
  178. NULL, fpu_enabled, nbytes);
  179. }
  180. static inline void serpent_fpu_end(bool fpu_enabled)
  181. {
  182. glue_fpu_end(fpu_enabled);
  183. }
  184. struct crypt_priv {
  185. struct serpent_ctx *ctx;
  186. bool fpu_enabled;
  187. };
  188. static void encrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes)
  189. {
  190. const unsigned int bsize = SERPENT_BLOCK_SIZE;
  191. struct crypt_priv *ctx = priv;
  192. int i;
  193. ctx->fpu_enabled = serpent_fpu_begin(ctx->fpu_enabled, nbytes);
  194. if (nbytes == bsize * SERPENT_PARALLEL_BLOCKS) {
  195. serpent_ecb_enc_8way_avx(ctx->ctx, srcdst, srcdst);
  196. return;
  197. }
  198. for (i = 0; i < nbytes / bsize; i++, srcdst += bsize)
  199. __serpent_encrypt(ctx->ctx, srcdst, srcdst);
  200. }
  201. static void decrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes)
  202. {
  203. const unsigned int bsize = SERPENT_BLOCK_SIZE;
  204. struct crypt_priv *ctx = priv;
  205. int i;
  206. ctx->fpu_enabled = serpent_fpu_begin(ctx->fpu_enabled, nbytes);
  207. if (nbytes == bsize * SERPENT_PARALLEL_BLOCKS) {
  208. serpent_ecb_dec_8way_avx(ctx->ctx, srcdst, srcdst);
  209. return;
  210. }
  211. for (i = 0; i < nbytes / bsize; i++, srcdst += bsize)
  212. __serpent_decrypt(ctx->ctx, srcdst, srcdst);
  213. }
  214. int lrw_serpent_setkey(struct crypto_tfm *tfm, const u8 *key,
  215. unsigned int keylen)
  216. {
  217. struct serpent_lrw_ctx *ctx = crypto_tfm_ctx(tfm);
  218. int err;
  219. err = __serpent_setkey(&ctx->serpent_ctx, key, keylen -
  220. SERPENT_BLOCK_SIZE);
  221. if (err)
  222. return err;
  223. return lrw_init_table(&ctx->lrw_table, key + keylen -
  224. SERPENT_BLOCK_SIZE);
  225. }
  226. EXPORT_SYMBOL_GPL(lrw_serpent_setkey);
  227. static int lrw_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  228. struct scatterlist *src, unsigned int nbytes)
  229. {
  230. struct serpent_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  231. be128 buf[SERPENT_PARALLEL_BLOCKS];
  232. struct crypt_priv crypt_ctx = {
  233. .ctx = &ctx->serpent_ctx,
  234. .fpu_enabled = false,
  235. };
  236. struct lrw_crypt_req req = {
  237. .tbuf = buf,
  238. .tbuflen = sizeof(buf),
  239. .table_ctx = &ctx->lrw_table,
  240. .crypt_ctx = &crypt_ctx,
  241. .crypt_fn = encrypt_callback,
  242. };
  243. int ret;
  244. desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
  245. ret = lrw_crypt(desc, dst, src, nbytes, &req);
  246. serpent_fpu_end(crypt_ctx.fpu_enabled);
  247. return ret;
  248. }
  249. static int lrw_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  250. struct scatterlist *src, unsigned int nbytes)
  251. {
  252. struct serpent_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  253. be128 buf[SERPENT_PARALLEL_BLOCKS];
  254. struct crypt_priv crypt_ctx = {
  255. .ctx = &ctx->serpent_ctx,
  256. .fpu_enabled = false,
  257. };
  258. struct lrw_crypt_req req = {
  259. .tbuf = buf,
  260. .tbuflen = sizeof(buf),
  261. .table_ctx = &ctx->lrw_table,
  262. .crypt_ctx = &crypt_ctx,
  263. .crypt_fn = decrypt_callback,
  264. };
  265. int ret;
  266. desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
  267. ret = lrw_crypt(desc, dst, src, nbytes, &req);
  268. serpent_fpu_end(crypt_ctx.fpu_enabled);
  269. return ret;
  270. }
  271. void lrw_serpent_exit_tfm(struct crypto_tfm *tfm)
  272. {
  273. struct serpent_lrw_ctx *ctx = crypto_tfm_ctx(tfm);
  274. lrw_free_table(&ctx->lrw_table);
  275. }
  276. EXPORT_SYMBOL_GPL(lrw_serpent_exit_tfm);
  277. int xts_serpent_setkey(struct crypto_tfm *tfm, const u8 *key,
  278. unsigned int keylen)
  279. {
  280. struct serpent_xts_ctx *ctx = crypto_tfm_ctx(tfm);
  281. u32 *flags = &tfm->crt_flags;
  282. int err;
  283. /* key consists of keys of equal size concatenated, therefore
  284. * the length must be even
  285. */
  286. if (keylen % 2) {
  287. *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
  288. return -EINVAL;
  289. }
  290. /* first half of xts-key is for crypt */
  291. err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2);
  292. if (err)
  293. return err;
  294. /* second half of xts-key is for tweak */
  295. return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2);
  296. }
  297. EXPORT_SYMBOL_GPL(xts_serpent_setkey);
  298. static int xts_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  299. struct scatterlist *src, unsigned int nbytes)
  300. {
  301. struct serpent_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  302. return glue_xts_crypt_128bit(&serpent_enc_xts, desc, dst, src, nbytes,
  303. XTS_TWEAK_CAST(__serpent_encrypt),
  304. &ctx->tweak_ctx, &ctx->crypt_ctx);
  305. }
  306. static int xts_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  307. struct scatterlist *src, unsigned int nbytes)
  308. {
  309. struct serpent_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  310. return glue_xts_crypt_128bit(&serpent_dec_xts, desc, dst, src, nbytes,
  311. XTS_TWEAK_CAST(__serpent_encrypt),
  312. &ctx->tweak_ctx, &ctx->crypt_ctx);
  313. }
  314. static struct crypto_alg serpent_algs[10] = { {
  315. .cra_name = "__ecb-serpent-avx",
  316. .cra_driver_name = "__driver-ecb-serpent-avx",
  317. .cra_priority = 0,
  318. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  319. .cra_blocksize = SERPENT_BLOCK_SIZE,
  320. .cra_ctxsize = sizeof(struct serpent_ctx),
  321. .cra_alignmask = 0,
  322. .cra_type = &crypto_blkcipher_type,
  323. .cra_module = THIS_MODULE,
  324. .cra_u = {
  325. .blkcipher = {
  326. .min_keysize = SERPENT_MIN_KEY_SIZE,
  327. .max_keysize = SERPENT_MAX_KEY_SIZE,
  328. .setkey = serpent_setkey,
  329. .encrypt = ecb_encrypt,
  330. .decrypt = ecb_decrypt,
  331. },
  332. },
  333. }, {
  334. .cra_name = "__cbc-serpent-avx",
  335. .cra_driver_name = "__driver-cbc-serpent-avx",
  336. .cra_priority = 0,
  337. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  338. .cra_blocksize = SERPENT_BLOCK_SIZE,
  339. .cra_ctxsize = sizeof(struct serpent_ctx),
  340. .cra_alignmask = 0,
  341. .cra_type = &crypto_blkcipher_type,
  342. .cra_module = THIS_MODULE,
  343. .cra_u = {
  344. .blkcipher = {
  345. .min_keysize = SERPENT_MIN_KEY_SIZE,
  346. .max_keysize = SERPENT_MAX_KEY_SIZE,
  347. .setkey = serpent_setkey,
  348. .encrypt = cbc_encrypt,
  349. .decrypt = cbc_decrypt,
  350. },
  351. },
  352. }, {
  353. .cra_name = "__ctr-serpent-avx",
  354. .cra_driver_name = "__driver-ctr-serpent-avx",
  355. .cra_priority = 0,
  356. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  357. .cra_blocksize = 1,
  358. .cra_ctxsize = sizeof(struct serpent_ctx),
  359. .cra_alignmask = 0,
  360. .cra_type = &crypto_blkcipher_type,
  361. .cra_module = THIS_MODULE,
  362. .cra_u = {
  363. .blkcipher = {
  364. .min_keysize = SERPENT_MIN_KEY_SIZE,
  365. .max_keysize = SERPENT_MAX_KEY_SIZE,
  366. .ivsize = SERPENT_BLOCK_SIZE,
  367. .setkey = serpent_setkey,
  368. .encrypt = ctr_crypt,
  369. .decrypt = ctr_crypt,
  370. },
  371. },
  372. }, {
  373. .cra_name = "__lrw-serpent-avx",
  374. .cra_driver_name = "__driver-lrw-serpent-avx",
  375. .cra_priority = 0,
  376. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  377. .cra_blocksize = SERPENT_BLOCK_SIZE,
  378. .cra_ctxsize = sizeof(struct serpent_lrw_ctx),
  379. .cra_alignmask = 0,
  380. .cra_type = &crypto_blkcipher_type,
  381. .cra_module = THIS_MODULE,
  382. .cra_exit = lrw_serpent_exit_tfm,
  383. .cra_u = {
  384. .blkcipher = {
  385. .min_keysize = SERPENT_MIN_KEY_SIZE +
  386. SERPENT_BLOCK_SIZE,
  387. .max_keysize = SERPENT_MAX_KEY_SIZE +
  388. SERPENT_BLOCK_SIZE,
  389. .ivsize = SERPENT_BLOCK_SIZE,
  390. .setkey = lrw_serpent_setkey,
  391. .encrypt = lrw_encrypt,
  392. .decrypt = lrw_decrypt,
  393. },
  394. },
  395. }, {
  396. .cra_name = "__xts-serpent-avx",
  397. .cra_driver_name = "__driver-xts-serpent-avx",
  398. .cra_priority = 0,
  399. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  400. .cra_blocksize = SERPENT_BLOCK_SIZE,
  401. .cra_ctxsize = sizeof(struct serpent_xts_ctx),
  402. .cra_alignmask = 0,
  403. .cra_type = &crypto_blkcipher_type,
  404. .cra_module = THIS_MODULE,
  405. .cra_u = {
  406. .blkcipher = {
  407. .min_keysize = SERPENT_MIN_KEY_SIZE * 2,
  408. .max_keysize = SERPENT_MAX_KEY_SIZE * 2,
  409. .ivsize = SERPENT_BLOCK_SIZE,
  410. .setkey = xts_serpent_setkey,
  411. .encrypt = xts_encrypt,
  412. .decrypt = xts_decrypt,
  413. },
  414. },
  415. }, {
  416. .cra_name = "ecb(serpent)",
  417. .cra_driver_name = "ecb-serpent-avx",
  418. .cra_priority = 500,
  419. .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
  420. .cra_blocksize = SERPENT_BLOCK_SIZE,
  421. .cra_ctxsize = sizeof(struct async_helper_ctx),
  422. .cra_alignmask = 0,
  423. .cra_type = &crypto_ablkcipher_type,
  424. .cra_module = THIS_MODULE,
  425. .cra_init = ablk_init,
  426. .cra_exit = ablk_exit,
  427. .cra_u = {
  428. .ablkcipher = {
  429. .min_keysize = SERPENT_MIN_KEY_SIZE,
  430. .max_keysize = SERPENT_MAX_KEY_SIZE,
  431. .setkey = ablk_set_key,
  432. .encrypt = ablk_encrypt,
  433. .decrypt = ablk_decrypt,
  434. },
  435. },
  436. }, {
  437. .cra_name = "cbc(serpent)",
  438. .cra_driver_name = "cbc-serpent-avx",
  439. .cra_priority = 500,
  440. .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
  441. .cra_blocksize = SERPENT_BLOCK_SIZE,
  442. .cra_ctxsize = sizeof(struct async_helper_ctx),
  443. .cra_alignmask = 0,
  444. .cra_type = &crypto_ablkcipher_type,
  445. .cra_module = THIS_MODULE,
  446. .cra_init = ablk_init,
  447. .cra_exit = ablk_exit,
  448. .cra_u = {
  449. .ablkcipher = {
  450. .min_keysize = SERPENT_MIN_KEY_SIZE,
  451. .max_keysize = SERPENT_MAX_KEY_SIZE,
  452. .ivsize = SERPENT_BLOCK_SIZE,
  453. .setkey = ablk_set_key,
  454. .encrypt = __ablk_encrypt,
  455. .decrypt = ablk_decrypt,
  456. },
  457. },
  458. }, {
  459. .cra_name = "ctr(serpent)",
  460. .cra_driver_name = "ctr-serpent-avx",
  461. .cra_priority = 500,
  462. .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
  463. .cra_blocksize = 1,
  464. .cra_ctxsize = sizeof(struct async_helper_ctx),
  465. .cra_alignmask = 0,
  466. .cra_type = &crypto_ablkcipher_type,
  467. .cra_module = THIS_MODULE,
  468. .cra_init = ablk_init,
  469. .cra_exit = ablk_exit,
  470. .cra_u = {
  471. .ablkcipher = {
  472. .min_keysize = SERPENT_MIN_KEY_SIZE,
  473. .max_keysize = SERPENT_MAX_KEY_SIZE,
  474. .ivsize = SERPENT_BLOCK_SIZE,
  475. .setkey = ablk_set_key,
  476. .encrypt = ablk_encrypt,
  477. .decrypt = ablk_encrypt,
  478. .geniv = "chainiv",
  479. },
  480. },
  481. }, {
  482. .cra_name = "lrw(serpent)",
  483. .cra_driver_name = "lrw-serpent-avx",
  484. .cra_priority = 500,
  485. .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
  486. .cra_blocksize = SERPENT_BLOCK_SIZE,
  487. .cra_ctxsize = sizeof(struct async_helper_ctx),
  488. .cra_alignmask = 0,
  489. .cra_type = &crypto_ablkcipher_type,
  490. .cra_module = THIS_MODULE,
  491. .cra_init = ablk_init,
  492. .cra_exit = ablk_exit,
  493. .cra_u = {
  494. .ablkcipher = {
  495. .min_keysize = SERPENT_MIN_KEY_SIZE +
  496. SERPENT_BLOCK_SIZE,
  497. .max_keysize = SERPENT_MAX_KEY_SIZE +
  498. SERPENT_BLOCK_SIZE,
  499. .ivsize = SERPENT_BLOCK_SIZE,
  500. .setkey = ablk_set_key,
  501. .encrypt = ablk_encrypt,
  502. .decrypt = ablk_decrypt,
  503. },
  504. },
  505. }, {
  506. .cra_name = "xts(serpent)",
  507. .cra_driver_name = "xts-serpent-avx",
  508. .cra_priority = 500,
  509. .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
  510. .cra_blocksize = SERPENT_BLOCK_SIZE,
  511. .cra_ctxsize = sizeof(struct async_helper_ctx),
  512. .cra_alignmask = 0,
  513. .cra_type = &crypto_ablkcipher_type,
  514. .cra_module = THIS_MODULE,
  515. .cra_init = ablk_init,
  516. .cra_exit = ablk_exit,
  517. .cra_u = {
  518. .ablkcipher = {
  519. .min_keysize = SERPENT_MIN_KEY_SIZE * 2,
  520. .max_keysize = SERPENT_MAX_KEY_SIZE * 2,
  521. .ivsize = SERPENT_BLOCK_SIZE,
  522. .setkey = ablk_set_key,
  523. .encrypt = ablk_encrypt,
  524. .decrypt = ablk_decrypt,
  525. },
  526. },
  527. } };
  528. static int __init serpent_init(void)
  529. {
  530. u64 xcr0;
  531. if (!cpu_has_avx || !cpu_has_osxsave) {
  532. printk(KERN_INFO "AVX instructions are not detected.\n");
  533. return -ENODEV;
  534. }
  535. xcr0 = xgetbv(XCR_XFEATURE_ENABLED_MASK);
  536. if ((xcr0 & (XSTATE_SSE | XSTATE_YMM)) != (XSTATE_SSE | XSTATE_YMM)) {
  537. printk(KERN_INFO "AVX detected but unusable.\n");
  538. return -ENODEV;
  539. }
  540. return crypto_register_algs(serpent_algs, ARRAY_SIZE(serpent_algs));
  541. }
  542. static void __exit serpent_exit(void)
  543. {
  544. crypto_unregister_algs(serpent_algs, ARRAY_SIZE(serpent_algs));
  545. }
  546. module_init(serpent_init);
  547. module_exit(serpent_exit);
  548. MODULE_DESCRIPTION("Serpent Cipher Algorithm, AVX optimized");
  549. MODULE_LICENSE("GPL");
  550. MODULE_ALIAS("serpent");