xref: /linux/arch/x86/crypto/serpent_avx_glue.c (revision fb7399cf2d0b33825b8039f95c45395c7deba25c)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Glue Code for AVX assembler versions of Serpent Cipher
4  *
5  * Copyright (C) 2012 Johannes Goetzfried
6  *     <Johannes.Goetzfried@informatik.stud.uni-erlangen.de>
7  *
8  * Copyright © 2011-2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
9  */
10 
11 #include <linux/module.h>
12 #include <linux/types.h>
13 #include <linux/crypto.h>
14 #include <linux/err.h>
15 #include <crypto/algapi.h>
16 #include <crypto/serpent.h>
17 
18 #include "serpent-avx.h"
19 #include "ecb_cbc_helpers.h"
20 
21 /* 8-way parallel cipher functions */
22 asmlinkage void serpent_ecb_enc_8way_avx(const void *ctx, u8 *dst,
23 					 const u8 *src);
24 EXPORT_SYMBOL_GPL(serpent_ecb_enc_8way_avx);
25 
26 asmlinkage void serpent_ecb_dec_8way_avx(const void *ctx, u8 *dst,
27 					 const u8 *src);
28 EXPORT_SYMBOL_GPL(serpent_ecb_dec_8way_avx);
29 
30 asmlinkage void serpent_cbc_dec_8way_avx(const void *ctx, u8 *dst,
31 					 const u8 *src);
32 EXPORT_SYMBOL_GPL(serpent_cbc_dec_8way_avx);
33 
34 static int serpent_setkey_skcipher(struct crypto_skcipher *tfm,
35 				   const u8 *key, unsigned int keylen)
36 {
37 	return __serpent_setkey(crypto_skcipher_ctx(tfm), key, keylen);
38 }
39 
40 static int ecb_encrypt(struct skcipher_request *req)
41 {
42 	ECB_WALK_START(req, SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS);
43 	ECB_BLOCK(SERPENT_PARALLEL_BLOCKS, serpent_ecb_enc_8way_avx);
44 	ECB_BLOCK(1, __serpent_encrypt);
45 	ECB_WALK_END();
46 }
47 
48 static int ecb_decrypt(struct skcipher_request *req)
49 {
50 	ECB_WALK_START(req, SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS);
51 	ECB_BLOCK(SERPENT_PARALLEL_BLOCKS, serpent_ecb_dec_8way_avx);
52 	ECB_BLOCK(1, __serpent_decrypt);
53 	ECB_WALK_END();
54 }
55 
56 static int cbc_encrypt(struct skcipher_request *req)
57 {
58 	CBC_WALK_START(req, SERPENT_BLOCK_SIZE, -1);
59 	CBC_ENC_BLOCK(__serpent_encrypt);
60 	CBC_WALK_END();
61 }
62 
63 static int cbc_decrypt(struct skcipher_request *req)
64 {
65 	CBC_WALK_START(req, SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS);
66 	CBC_DEC_BLOCK(SERPENT_PARALLEL_BLOCKS, serpent_cbc_dec_8way_avx);
67 	CBC_DEC_BLOCK(1, __serpent_decrypt);
68 	CBC_WALK_END();
69 }
70 
71 static struct skcipher_alg serpent_algs[] = {
72 	{
73 		.base.cra_name		= "ecb(serpent)",
74 		.base.cra_driver_name	= "ecb-serpent-avx",
75 		.base.cra_priority	= 500,
76 		.base.cra_blocksize	= SERPENT_BLOCK_SIZE,
77 		.base.cra_ctxsize	= sizeof(struct serpent_ctx),
78 		.base.cra_module	= THIS_MODULE,
79 		.min_keysize		= SERPENT_MIN_KEY_SIZE,
80 		.max_keysize		= SERPENT_MAX_KEY_SIZE,
81 		.setkey			= serpent_setkey_skcipher,
82 		.encrypt		= ecb_encrypt,
83 		.decrypt		= ecb_decrypt,
84 	}, {
85 		.base.cra_name		= "cbc(serpent)",
86 		.base.cra_driver_name	= "cbc-serpent-avx",
87 		.base.cra_priority	= 500,
88 		.base.cra_blocksize	= SERPENT_BLOCK_SIZE,
89 		.base.cra_ctxsize	= sizeof(struct serpent_ctx),
90 		.base.cra_module	= THIS_MODULE,
91 		.min_keysize		= SERPENT_MIN_KEY_SIZE,
92 		.max_keysize		= SERPENT_MAX_KEY_SIZE,
93 		.ivsize			= SERPENT_BLOCK_SIZE,
94 		.setkey			= serpent_setkey_skcipher,
95 		.encrypt		= cbc_encrypt,
96 		.decrypt		= cbc_decrypt,
97 	},
98 };
99 
100 static int __init serpent_init(void)
101 {
102 	const char *feature_name;
103 
104 	if (!cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM,
105 				&feature_name)) {
106 		pr_info("CPU feature '%s' is not supported.\n", feature_name);
107 		return -ENODEV;
108 	}
109 
110 	return crypto_register_skciphers(serpent_algs,
111 					 ARRAY_SIZE(serpent_algs));
112 }
113 
114 static void __exit serpent_exit(void)
115 {
116 	crypto_unregister_skciphers(serpent_algs, ARRAY_SIZE(serpent_algs));
117 }
118 
119 module_init(serpent_init);
120 module_exit(serpent_exit);
121 
122 MODULE_DESCRIPTION("Serpent Cipher Algorithm, AVX optimized");
123 MODULE_LICENSE("GPL");
124 MODULE_ALIAS_CRYPTO("serpent");
125