serpent_avx2_glue.c 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. * Glue Code for x86_64/AVX2 assembler optimized version of Serpent
  4. *
  5. * Copyright © 2012-2013 Jussi Kivilinna <[email protected]>
  6. */
  7. #include <linux/module.h>
  8. #include <linux/types.h>
  9. #include <linux/crypto.h>
  10. #include <linux/err.h>
  11. #include <crypto/algapi.h>
  12. #include <crypto/internal/simd.h>
  13. #include <crypto/serpent.h>
  14. #include "serpent-avx.h"
  15. #include "ecb_cbc_helpers.h"
  16. #define SERPENT_AVX2_PARALLEL_BLOCKS 16
  17. /* 16-way AVX2 parallel cipher functions */
  18. asmlinkage void serpent_ecb_enc_16way(const void *ctx, u8 *dst, const u8 *src);
  19. asmlinkage void serpent_ecb_dec_16way(const void *ctx, u8 *dst, const u8 *src);
  20. asmlinkage void serpent_cbc_dec_16way(const void *ctx, u8 *dst, const u8 *src);
  21. static int serpent_setkey_skcipher(struct crypto_skcipher *tfm,
  22. const u8 *key, unsigned int keylen)
  23. {
  24. return __serpent_setkey(crypto_skcipher_ctx(tfm), key, keylen);
  25. }
  26. static int ecb_encrypt(struct skcipher_request *req)
  27. {
  28. ECB_WALK_START(req, SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS);
  29. ECB_BLOCK(SERPENT_AVX2_PARALLEL_BLOCKS, serpent_ecb_enc_16way);
  30. ECB_BLOCK(SERPENT_PARALLEL_BLOCKS, serpent_ecb_enc_8way_avx);
  31. ECB_BLOCK(1, __serpent_encrypt);
  32. ECB_WALK_END();
  33. }
  34. static int ecb_decrypt(struct skcipher_request *req)
  35. {
  36. ECB_WALK_START(req, SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS);
  37. ECB_BLOCK(SERPENT_AVX2_PARALLEL_BLOCKS, serpent_ecb_dec_16way);
  38. ECB_BLOCK(SERPENT_PARALLEL_BLOCKS, serpent_ecb_dec_8way_avx);
  39. ECB_BLOCK(1, __serpent_decrypt);
  40. ECB_WALK_END();
  41. }
  42. static int cbc_encrypt(struct skcipher_request *req)
  43. {
  44. CBC_WALK_START(req, SERPENT_BLOCK_SIZE, -1);
  45. CBC_ENC_BLOCK(__serpent_encrypt);
  46. CBC_WALK_END();
  47. }
  48. static int cbc_decrypt(struct skcipher_request *req)
  49. {
  50. CBC_WALK_START(req, SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS);
  51. CBC_DEC_BLOCK(SERPENT_AVX2_PARALLEL_BLOCKS, serpent_cbc_dec_16way);
  52. CBC_DEC_BLOCK(SERPENT_PARALLEL_BLOCKS, serpent_cbc_dec_8way_avx);
  53. CBC_DEC_BLOCK(1, __serpent_decrypt);
  54. CBC_WALK_END();
  55. }
  56. static struct skcipher_alg serpent_algs[] = {
  57. {
  58. .base.cra_name = "__ecb(serpent)",
  59. .base.cra_driver_name = "__ecb-serpent-avx2",
  60. .base.cra_priority = 600,
  61. .base.cra_flags = CRYPTO_ALG_INTERNAL,
  62. .base.cra_blocksize = SERPENT_BLOCK_SIZE,
  63. .base.cra_ctxsize = sizeof(struct serpent_ctx),
  64. .base.cra_module = THIS_MODULE,
  65. .min_keysize = SERPENT_MIN_KEY_SIZE,
  66. .max_keysize = SERPENT_MAX_KEY_SIZE,
  67. .setkey = serpent_setkey_skcipher,
  68. .encrypt = ecb_encrypt,
  69. .decrypt = ecb_decrypt,
  70. }, {
  71. .base.cra_name = "__cbc(serpent)",
  72. .base.cra_driver_name = "__cbc-serpent-avx2",
  73. .base.cra_priority = 600,
  74. .base.cra_flags = CRYPTO_ALG_INTERNAL,
  75. .base.cra_blocksize = SERPENT_BLOCK_SIZE,
  76. .base.cra_ctxsize = sizeof(struct serpent_ctx),
  77. .base.cra_module = THIS_MODULE,
  78. .min_keysize = SERPENT_MIN_KEY_SIZE,
  79. .max_keysize = SERPENT_MAX_KEY_SIZE,
  80. .ivsize = SERPENT_BLOCK_SIZE,
  81. .setkey = serpent_setkey_skcipher,
  82. .encrypt = cbc_encrypt,
  83. .decrypt = cbc_decrypt,
  84. },
  85. };
  86. static struct simd_skcipher_alg *serpent_simd_algs[ARRAY_SIZE(serpent_algs)];
  87. static int __init serpent_avx2_init(void)
  88. {
  89. const char *feature_name;
  90. if (!boot_cpu_has(X86_FEATURE_AVX2) || !boot_cpu_has(X86_FEATURE_OSXSAVE)) {
  91. pr_info("AVX2 instructions are not detected.\n");
  92. return -ENODEV;
  93. }
  94. if (!cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM,
  95. &feature_name)) {
  96. pr_info("CPU feature '%s' is not supported.\n", feature_name);
  97. return -ENODEV;
  98. }
  99. return simd_register_skciphers_compat(serpent_algs,
  100. ARRAY_SIZE(serpent_algs),
  101. serpent_simd_algs);
  102. }
  103. static void __exit serpent_avx2_fini(void)
  104. {
  105. simd_unregister_skciphers(serpent_algs, ARRAY_SIZE(serpent_algs),
  106. serpent_simd_algs);
  107. }
  108. module_init(serpent_avx2_init);
  109. module_exit(serpent_avx2_fini);
  110. MODULE_LICENSE("GPL");
  111. MODULE_DESCRIPTION("Serpent Cipher Algorithm, AVX2 optimized");
  112. MODULE_ALIAS_CRYPTO("serpent");
  113. MODULE_ALIAS_CRYPTO("serpent-asm");