Patch adds AVX2/x86-64 implementation of Serpent cipher, requiring 16 parallel blocks for input (256 bytes). Implementation is based on the AVX implementation and extends to use the 256-bit wide YMM registers. Since serpent does not use table look-ups, this implementation should be close to two times faster than the AVX implementation. Signed-off-by: Jussi Kivilinna <jussi.kivilinna@iki.fi> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>tirimbino
parent
cf1521a1a5
commit
56d76c96a9
@ -0,0 +1,800 @@ |
||||
/* |
||||
* x86_64/AVX2 assembler optimized version of Serpent |
||||
* |
||||
* Copyright © 2012-2013 Jussi Kivilinna <jussi.kivilinna@mbnet.fi>
|
||||
* |
||||
* Based on AVX assembler implementation of Serpent by: |
||||
* Copyright © 2012 Johannes Goetzfried |
||||
* <Johannes.Goetzfried@informatik.stud.uni-erlangen.de>
|
||||
* |
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by |
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version. |
||||
* |
||||
*/ |
||||
|
||||
#include <linux/linkage.h> |
||||
#include "glue_helper-asm-avx2.S" |
||||
|
||||
.file "serpent-avx2-asm_64.S" |
||||
|
||||
.data |
||||
.align 16
|
||||
|
||||
.Lbswap128_mask: |
||||
.byte 15, 14, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0 |
||||
.Lxts_gf128mul_and_shl1_mask_0: |
||||
.byte 0x87, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0 |
||||
.Lxts_gf128mul_and_shl1_mask_1: |
||||
.byte 0x0e, 1, 0, 0, 0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0 |
||||
|
||||
.text |
||||
|
||||
#define CTX %rdi |
||||
|
||||
#define RNOT %ymm0 |
||||
#define tp %ymm1 |
||||
|
||||
#define RA1 %ymm2 |
||||
#define RA2 %ymm3 |
||||
#define RB1 %ymm4 |
||||
#define RB2 %ymm5 |
||||
#define RC1 %ymm6 |
||||
#define RC2 %ymm7 |
||||
#define RD1 %ymm8 |
||||
#define RD2 %ymm9 |
||||
#define RE1 %ymm10 |
||||
#define RE2 %ymm11 |
||||
|
||||
#define RK0 %ymm12 |
||||
#define RK1 %ymm13 |
||||
#define RK2 %ymm14 |
||||
#define RK3 %ymm15 |
||||
|
||||
#define RK0x %xmm12 |
||||
#define RK1x %xmm13 |
||||
#define RK2x %xmm14 |
||||
#define RK3x %xmm15 |
||||
|
||||
#define S0_1(x0, x1, x2, x3, x4) \ |
||||
vpor x0, x3, tp; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpxor x2, x3, x4; \
|
||||
vpxor RNOT, x4, x4; \
|
||||
vpxor x1, tp, x3; \
|
||||
vpand x0, x1, x1; \
|
||||
vpxor x4, x1, x1; \
|
||||
vpxor x0, x2, x2;
|
||||
#define S0_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x3, x0, x0; \
|
||||
vpor x0, x4, x4; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpand x1, x2, x2; \
|
||||
vpxor x2, x3, x3; \
|
||||
vpxor RNOT, x1, x1; \
|
||||
vpxor x4, x2, x2; \
|
||||
vpxor x2, x1, x1;
|
||||
|
||||
#define S1_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x0, x1, tp; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpxor RNOT, x3, x3; \
|
||||
vpand tp, x1, x4; \
|
||||
vpor tp, x0, x0; \
|
||||
vpxor x2, x3, x3; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpxor x3, tp, x1;
|
||||
#define S1_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x4, x3, x3; \
|
||||
vpor x4, x1, x1; \
|
||||
vpxor x2, x4, x4; \
|
||||
vpand x0, x2, x2; \
|
||||
vpxor x1, x2, x2; \
|
||||
vpor x0, x1, x1; \
|
||||
vpxor RNOT, x0, x0; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpxor x1, x4, x4;
|
||||
|
||||
#define S2_1(x0, x1, x2, x3, x4) \ |
||||
vpxor RNOT, x3, x3; \
|
||||
vpxor x0, x1, x1; \
|
||||
vpand x2, x0, tp; \
|
||||
vpxor x3, tp, tp; \
|
||||
vpor x0, x3, x3; \
|
||||
vpxor x1, x2, x2; \
|
||||
vpxor x1, x3, x3; \
|
||||
vpand tp, x1, x1;
|
||||
#define S2_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x2, tp, tp; \
|
||||
vpand x3, x2, x2; \
|
||||
vpor x1, x3, x3; \
|
||||
vpxor RNOT, tp, tp; \
|
||||
vpxor tp, x3, x3; \
|
||||
vpxor tp, x0, x4; \
|
||||
vpxor x2, tp, x0; \
|
||||
vpor x2, x1, x1;
|
||||
|
||||
#define S3_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x3, x1, tp; \
|
||||
vpor x0, x3, x3; \
|
||||
vpand x0, x1, x4; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpxor tp, x2, x2; \
|
||||
vpand x3, tp, x1; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpor x4, x0, x0; \
|
||||
vpxor x3, x4, x4;
|
||||
#define S3_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x0, x1, x1; \
|
||||
vpand x3, x0, x0; \
|
||||
vpand x4, x3, x3; \
|
||||
vpxor x2, x3, x3; \
|
||||
vpor x1, x4, x4; \
|
||||
vpand x1, x2, x2; \
|
||||
vpxor x3, x4, x4; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpxor x2, x3, x3;
|
||||
|
||||
#define S4_1(x0, x1, x2, x3, x4) \ |
||||
vpand x0, x3, tp; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpxor x2, tp, tp; \
|
||||
vpor x3, x2, x2; \
|
||||
vpxor x1, x0, x0; \
|
||||
vpxor tp, x3, x4; \
|
||||
vpor x0, x2, x2; \
|
||||
vpxor x1, x2, x2;
|
||||
#define S4_2(x0, x1, x2, x3, x4) \ |
||||
vpand x0, x1, x1; \
|
||||
vpxor x4, x1, x1; \
|
||||
vpand x2, x4, x4; \
|
||||
vpxor tp, x2, x2; \
|
||||
vpxor x0, x4, x4; \
|
||||
vpor x1, tp, x3; \
|
||||
vpxor RNOT, x1, x1; \
|
||||
vpxor x0, x3, x3;
|
||||
|
||||
#define S5_1(x0, x1, x2, x3, x4) \ |
||||
vpor x0, x1, tp; \
|
||||
vpxor tp, x2, x2; \
|
||||
vpxor RNOT, x3, x3; \
|
||||
vpxor x0, x1, x4; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpand x4, tp, x1; \
|
||||
vpor x3, x4, x4; \
|
||||
vpxor x0, x4, x4;
|
||||
#define S5_2(x0, x1, x2, x3, x4) \ |
||||
vpand x3, x0, x0; \
|
||||
vpxor x3, x1, x1; \
|
||||
vpxor x2, x3, x3; \
|
||||
vpxor x1, x0, x0; \
|
||||
vpand x4, x2, x2; \
|
||||
vpxor x2, x1, x1; \
|
||||
vpand x0, x2, x2; \
|
||||
vpxor x2, x3, x3;
|
||||
|
||||
#define S6_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x0, x3, x3; \
|
||||
vpxor x2, x1, tp; \
|
||||
vpxor x0, x2, x2; \
|
||||
vpand x3, x0, x0; \
|
||||
vpor x3, tp, tp; \
|
||||
vpxor RNOT, x1, x4; \
|
||||
vpxor tp, x0, x0; \
|
||||
vpxor x2, tp, x1;
|
||||
#define S6_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x4, x3, x3; \
|
||||
vpxor x0, x4, x4; \
|
||||
vpand x0, x2, x2; \
|
||||
vpxor x1, x4, x4; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpand x1, x3, x3; \
|
||||
vpxor x0, x3, x3; \
|
||||
vpxor x2, x1, x1;
|
||||
|
||||
#define S7_1(x0, x1, x2, x3, x4) \ |
||||
vpxor RNOT, x1, tp; \
|
||||
vpxor RNOT, x0, x0; \
|
||||
vpand x2, tp, x1; \
|
||||
vpxor x3, x1, x1; \
|
||||
vpor tp, x3, x3; \
|
||||
vpxor x2, tp, x4; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x0, x3, x3; \
|
||||
vpor x1, x0, x0;
|
||||
#define S7_2(x0, x1, x2, x3, x4) \ |
||||
vpand x0, x2, x2; \
|
||||
vpxor x4, x0, x0; \
|
||||
vpxor x3, x4, x4; \
|
||||
vpand x0, x3, x3; \
|
||||
vpxor x1, x4, x4; \
|
||||
vpxor x4, x2, x2; \
|
||||
vpxor x1, x3, x3; \
|
||||
vpor x0, x4, x4; \
|
||||
vpxor x1, x4, x4;
|
||||
|
||||
#define SI0_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x0, x1, x1; \
|
||||
vpor x1, x3, tp; \
|
||||
vpxor x1, x3, x4; \
|
||||
vpxor RNOT, x0, x0; \
|
||||
vpxor tp, x2, x2; \
|
||||
vpxor x0, tp, x3; \
|
||||
vpand x1, x0, x0; \
|
||||
vpxor x2, x0, x0;
|
||||
#define SI0_2(x0, x1, x2, x3, x4) \ |
||||
vpand x3, x2, x2; \
|
||||
vpxor x4, x3, x3; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x3, x1, x1; \
|
||||
vpand x0, x3, x3; \
|
||||
vpxor x0, x1, x1; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpxor x3, x4, x4;
|
||||
|
||||
#define SI1_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x3, x1, x1; \
|
||||
vpxor x2, x0, tp; \
|
||||
vpxor RNOT, x2, x2; \
|
||||
vpor x1, x0, x4; \
|
||||
vpxor x3, x4, x4; \
|
||||
vpand x1, x3, x3; \
|
||||
vpxor x2, x1, x1; \
|
||||
vpand x4, x2, x2;
|
||||
#define SI1_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x1, x4, x4; \
|
||||
vpor x3, x1, x1; \
|
||||
vpxor tp, x3, x3; \
|
||||
vpxor tp, x2, x2; \
|
||||
vpor x4, tp, x0; \
|
||||
vpxor x4, x2, x2; \
|
||||
vpxor x0, x1, x1; \
|
||||
vpxor x1, x4, x4;
|
||||
|
||||
#define SI2_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x1, x2, x2; \
|
||||
vpxor RNOT, x3, tp; \
|
||||
vpor x2, tp, tp; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x0, x3, x4; \
|
||||
vpxor x1, tp, x3; \
|
||||
vpor x2, x1, x1; \
|
||||
vpxor x0, x2, x2;
|
||||
#define SI2_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x4, x1, x1; \
|
||||
vpor x3, x4, x4; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x2, x4, x4; \
|
||||
vpand x1, x2, x2; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x4, x3, x3; \
|
||||
vpxor x0, x4, x4;
|
||||
|
||||
#define SI3_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x1, x2, x2; \
|
||||
vpand x2, x1, tp; \
|
||||
vpxor x0, tp, tp; \
|
||||
vpor x1, x0, x0; \
|
||||
vpxor x3, x1, x4; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpor tp, x3, x3; \
|
||||
vpxor x2, tp, x1;
|
||||
#define SI3_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x3, x1, x1; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpand x1, x3, x3; \
|
||||
vpxor x0, x1, x1; \
|
||||
vpand x2, x0, x0; \
|
||||
vpxor x3, x4, x4; \
|
||||
vpxor x0, x3, x3; \
|
||||
vpxor x1, x0, x0;
|
||||
|
||||
#define SI4_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x3, x2, x2; \
|
||||
vpand x1, x0, tp; \
|
||||
vpxor x2, tp, tp; \
|
||||
vpor x3, x2, x2; \
|
||||
vpxor RNOT, x0, x4; \
|
||||
vpxor tp, x1, x1; \
|
||||
vpxor x2, tp, x0; \
|
||||
vpand x4, x2, x2;
|
||||
#define SI4_2(x0, x1, x2, x3, x4) \ |
||||
vpxor x0, x2, x2; \
|
||||
vpor x4, x0, x0; \
|
||||
vpxor x3, x0, x0; \
|
||||
vpand x2, x3, x3; \
|
||||
vpxor x3, x4, x4; \
|
||||
vpxor x1, x3, x3; \
|
||||
vpand x0, x1, x1; \
|
||||
vpxor x1, x4, x4; \
|
||||
vpxor x3, x0, x0;
|
||||
|
||||
#define SI5_1(x0, x1, x2, x3, x4) \ |
||||
vpor x2, x1, tp; \
|
||||
vpxor x1, x2, x2; \
|
||||
vpxor x3, tp, tp; \
|
||||
vpand x1, x3, x3; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpor x0, x3, x3; \
|
||||
vpxor RNOT, x0, x0; \
|
||||
vpxor x2, x3, x3; \
|
||||
vpor x0, x2, x2;
|
||||
#define SI5_2(x0, x1, x2, x3, x4) \ |
||||
vpxor tp, x1, x4; \
|
||||
vpxor x4, x2, x2; \
|
||||
vpand x0, x4, x4; \
|
||||
vpxor tp, x0, x0; \
|
||||
vpxor x3, tp, x1; \
|
||||
vpand x2, x0, x0; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpxor x4, x2, x2; \
|
||||
vpxor x3, x4, x4;
|
||||
|
||||
#define SI6_1(x0, x1, x2, x3, x4) \ |
||||
vpxor x2, x0, x0; \
|
||||
vpand x3, x0, tp; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpxor x2, tp, tp; \
|
||||
vpxor x1, x3, x3; \
|
||||
vpor x0, x2, x2; \
|
||||
vpxor x3, x2, x2; \
|
||||
vpand tp, x3, x3;
|
||||
#define SI6_2(x0, x1, x2, x3, x4) \ |
||||
vpxor RNOT, tp, tp; \
|
||||
vpxor x1, x3, x3; \
|
||||
vpand x2, x1, x1; \
|
||||
vpxor tp, x0, x4; \
|
||||
vpxor x4, x3, x3; \
|
||||
vpxor x2, x4, x4; \
|
||||
vpxor x1, tp, x0; \
|
||||
vpxor x0, x2, x2;
|
||||
|
||||
#define SI7_1(x0, x1, x2, x3, x4) \ |
||||
vpand x0, x3, tp; \
|
||||
vpxor x2, x0, x0; \
|
||||
vpor x3, x2, x2; \
|
||||
vpxor x1, x3, x4; \
|
||||
vpxor RNOT, x0, x0; \
|
||||
vpor tp, x1, x1; \
|
||||
vpxor x0, x4, x4; \
|
||||
vpand x2, x0, x0; \
|
||||
vpxor x1, x0, x0;
|
||||
#define SI7_2(x0, x1, x2, x3, x4) \ |
||||
vpand x2, x1, x1; \
|
||||
vpxor x2, tp, x3; \
|
||||
vpxor x3, x4, x4; \
|
||||
vpand x3, x2, x2; \
|
||||
vpor x0, x3, x3; \
|
||||
vpxor x4, x1, x1; \
|
||||
vpxor x4, x3, x3; \
|
||||
vpand x0, x4, x4; \
|
||||
vpxor x2, x4, x4;
|
||||
|
||||
#define get_key(i,j,t) \ |
||||
vpbroadcastd (4*(i)+(j))*4(CTX), t;
|
||||
|
||||
#define K2(x0, x1, x2, x3, x4, i) \ |
||||
get_key(i, 0, RK0); \
|
||||
get_key(i, 1, RK1); \
|
||||
get_key(i, 2, RK2); \
|
||||
get_key(i, 3, RK3); \
|
||||
vpxor RK0, x0 ## 1, x0 ## 1; \
|
||||
vpxor RK1, x1 ## 1, x1 ## 1; \
|
||||
vpxor RK2, x2 ## 1, x2 ## 1; \
|
||||
vpxor RK3, x3 ## 1, x3 ## 1; \
|
||||
vpxor RK0, x0 ## 2, x0 ## 2; \
|
||||
vpxor RK1, x1 ## 2, x1 ## 2; \
|
||||
vpxor RK2, x2 ## 2, x2 ## 2; \
|
||||
vpxor RK3, x3 ## 2, x3 ## 2;
|
||||
|
||||
#define LK2(x0, x1, x2, x3, x4, i) \ |
||||
vpslld $13, x0 ## 1, x4 ## 1; \
|
||||
vpsrld $(32 - 13), x0 ## 1, x0 ## 1; \
|
||||
vpor x4 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpxor x0 ## 1, x1 ## 1, x1 ## 1; \
|
||||
vpslld $3, x2 ## 1, x4 ## 1; \
|
||||
vpsrld $(32 - 3), x2 ## 1, x2 ## 1; \
|
||||
vpor x4 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpxor x2 ## 1, x1 ## 1, x1 ## 1; \
|
||||
vpslld $13, x0 ## 2, x4 ## 2; \
|
||||
vpsrld $(32 - 13), x0 ## 2, x0 ## 2; \
|
||||
vpor x4 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpxor x0 ## 2, x1 ## 2, x1 ## 2; \
|
||||
vpslld $3, x2 ## 2, x4 ## 2; \
|
||||
vpsrld $(32 - 3), x2 ## 2, x2 ## 2; \
|
||||
vpor x4 ## 2, x2 ## 2, x2 ## 2; \
|
||||
vpxor x2 ## 2, x1 ## 2, x1 ## 2; \
|
||||
vpslld $1, x1 ## 1, x4 ## 1; \
|
||||
vpsrld $(32 - 1), x1 ## 1, x1 ## 1; \
|
||||
vpor x4 ## 1, x1 ## 1, x1 ## 1; \
|
||||
vpslld $3, x0 ## 1, x4 ## 1; \
|
||||
vpxor x2 ## 1, x3 ## 1, x3 ## 1; \
|
||||
vpxor x4 ## 1, x3 ## 1, x3 ## 1; \
|
||||
get_key(i, 1, RK1); \
|
||||
vpslld $1, x1 ## 2, x4 ## 2; \
|
||||
vpsrld $(32 - 1), x1 ## 2, x1 ## 2; \
|
||||
vpor x4 ## 2, x1 ## 2, x1 ## 2; \
|
||||
vpslld $3, x0 ## 2, x4 ## 2; \
|
||||
vpxor x2 ## 2, x3 ## 2, x3 ## 2; \
|
||||
vpxor x4 ## 2, x3 ## 2, x3 ## 2; \
|
||||
get_key(i, 3, RK3); \
|
||||
vpslld $7, x3 ## 1, x4 ## 1; \
|
||||
vpsrld $(32 - 7), x3 ## 1, x3 ## 1; \
|
||||
vpor x4 ## 1, x3 ## 1, x3 ## 1; \
|
||||
vpslld $7, x1 ## 1, x4 ## 1; \
|
||||
vpxor x1 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpxor x3 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpxor x3 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpxor x4 ## 1, x2 ## 1, x2 ## 1; \
|
||||
get_key(i, 0, RK0); \
|
||||
vpslld $7, x3 ## 2, x4 ## 2; \
|
||||
vpsrld $(32 - 7), x3 ## 2, x3 ## 2; \
|
||||
vpor x4 ## 2, x3 ## 2, x3 ## 2; \
|
||||
vpslld $7, x1 ## 2, x4 ## 2; \
|
||||
vpxor x1 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpxor x3 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpxor x3 ## 2, x2 ## 2, x2 ## 2; \
|
||||
vpxor x4 ## 2, x2 ## 2, x2 ## 2; \
|
||||
get_key(i, 2, RK2); \
|
||||
vpxor RK1, x1 ## 1, x1 ## 1; \
|
||||
vpxor RK3, x3 ## 1, x3 ## 1; \
|
||||
vpslld $5, x0 ## 1, x4 ## 1; \
|
||||
vpsrld $(32 - 5), x0 ## 1, x0 ## 1; \
|
||||
vpor x4 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpslld $22, x2 ## 1, x4 ## 1; \
|
||||
vpsrld $(32 - 22), x2 ## 1, x2 ## 1; \
|
||||
vpor x4 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpxor RK0, x0 ## 1, x0 ## 1; \
|
||||
vpxor RK2, x2 ## 1, x2 ## 1; \
|
||||
vpxor RK1, x1 ## 2, x1 ## 2; \
|
||||
vpxor RK3, x3 ## 2, x3 ## 2; \
|
||||
vpslld $5, x0 ## 2, x4 ## 2; \
|
||||
vpsrld $(32 - 5), x0 ## 2, x0 ## 2; \
|
||||
vpor x4 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpslld $22, x2 ## 2, x4 ## 2; \
|
||||
vpsrld $(32 - 22), x2 ## 2, x2 ## 2; \
|
||||
vpor x4 ## 2, x2 ## 2, x2 ## 2; \
|
||||
vpxor RK0, x0 ## 2, x0 ## 2; \
|
||||
vpxor RK2, x2 ## 2, x2 ## 2;
|
||||
|
||||
#define KL2(x0, x1, x2, x3, x4, i) \ |
||||
vpxor RK0, x0 ## 1, x0 ## 1; \
|
||||
vpxor RK2, x2 ## 1, x2 ## 1; \
|
||||
vpsrld $5, x0 ## 1, x4 ## 1; \
|
||||
vpslld $(32 - 5), x0 ## 1, x0 ## 1; \
|
||||
vpor x4 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpxor RK3, x3 ## 1, x3 ## 1; \
|
||||
vpxor RK1, x1 ## 1, x1 ## 1; \
|
||||
vpsrld $22, x2 ## 1, x4 ## 1; \
|
||||
vpslld $(32 - 22), x2 ## 1, x2 ## 1; \
|
||||
vpor x4 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpxor x3 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpxor RK0, x0 ## 2, x0 ## 2; \
|
||||
vpxor RK2, x2 ## 2, x2 ## 2; \
|
||||
vpsrld $5, x0 ## 2, x4 ## 2; \
|
||||
vpslld $(32 - 5), x0 ## 2, x0 ## 2; \
|
||||
vpor x4 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpxor RK3, x3 ## 2, x3 ## 2; \
|
||||
vpxor RK1, x1 ## 2, x1 ## 2; \
|
||||
vpsrld $22, x2 ## 2, x4 ## 2; \
|
||||
vpslld $(32 - 22), x2 ## 2, x2 ## 2; \
|
||||
vpor x4 ## 2, x2 ## 2, x2 ## 2; \
|
||||
vpxor x3 ## 2, x2 ## 2, x2 ## 2; \
|
||||
vpxor x3 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpslld $7, x1 ## 1, x4 ## 1; \
|
||||
vpxor x1 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpxor x4 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpsrld $1, x1 ## 1, x4 ## 1; \
|
||||
vpslld $(32 - 1), x1 ## 1, x1 ## 1; \
|
||||
vpor x4 ## 1, x1 ## 1, x1 ## 1; \
|
||||
vpxor x3 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpslld $7, x1 ## 2, x4 ## 2; \
|
||||
vpxor x1 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpxor x4 ## 2, x2 ## 2, x2 ## 2; \
|
||||
vpsrld $1, x1 ## 2, x4 ## 2; \
|
||||
vpslld $(32 - 1), x1 ## 2, x1 ## 2; \
|
||||
vpor x4 ## 2, x1 ## 2, x1 ## 2; \
|
||||
vpsrld $7, x3 ## 1, x4 ## 1; \
|
||||
vpslld $(32 - 7), x3 ## 1, x3 ## 1; \
|
||||
vpor x4 ## 1, x3 ## 1, x3 ## 1; \
|
||||
vpxor x0 ## 1, x1 ## 1, x1 ## 1; \
|
||||
vpslld $3, x0 ## 1, x4 ## 1; \
|
||||
vpxor x4 ## 1, x3 ## 1, x3 ## 1; \
|
||||
vpsrld $7, x3 ## 2, x4 ## 2; \
|
||||
vpslld $(32 - 7), x3 ## 2, x3 ## 2; \
|
||||
vpor x4 ## 2, x3 ## 2, x3 ## 2; \
|
||||
vpxor x0 ## 2, x1 ## 2, x1 ## 2; \
|
||||
vpslld $3, x0 ## 2, x4 ## 2; \
|
||||
vpxor x4 ## 2, x3 ## 2, x3 ## 2; \
|
||||
vpsrld $13, x0 ## 1, x4 ## 1; \
|
||||
vpslld $(32 - 13), x0 ## 1, x0 ## 1; \
|
||||
vpor x4 ## 1, x0 ## 1, x0 ## 1; \
|
||||
vpxor x2 ## 1, x1 ## 1, x1 ## 1; \
|
||||
vpxor x2 ## 1, x3 ## 1, x3 ## 1; \
|
||||
vpsrld $3, x2 ## 1, x4 ## 1; \
|
||||
vpslld $(32 - 3), x2 ## 1, x2 ## 1; \
|
||||
vpor x4 ## 1, x2 ## 1, x2 ## 1; \
|
||||
vpsrld $13, x0 ## 2, x4 ## 2; \
|
||||
vpslld $(32 - 13), x0 ## 2, x0 ## 2; \
|
||||
vpor x4 ## 2, x0 ## 2, x0 ## 2; \
|
||||
vpxor x2 ## 2, x1 ## 2, x1 ## 2; \
|
||||
vpxor x2 ## 2, x3 ## 2, x3 ## 2; \
|
||||
vpsrld $3, x2 ## 2, x4 ## 2; \
|
||||
vpslld $(32 - 3), x2 ## 2, x2 ## 2; \
|
||||
vpor x4 ## 2, x2 ## 2, x2 ## 2;
|
||||
|
||||
#define S(SBOX, x0, x1, x2, x3, x4) \ |
||||
SBOX ## _1(x0 ## 1, x1 ## 1, x2 ## 1, x3 ## 1, x4 ## 1); \
|
||||
SBOX ## _2(x0 ## 1, x1 ## 1, x2 ## 1, x3 ## 1, x4 ## 1); \
|
||||
SBOX ## _1(x0 ## 2, x1 ## 2, x2 ## 2, x3 ## 2, x4 ## 2); \
|
||||
SBOX ## _2(x0 ## 2, x1 ## 2, x2 ## 2, x3 ## 2, x4 ## 2);
|
||||
|
||||
#define SP(SBOX, x0, x1, x2, x3, x4, i) \ |
||||
get_key(i, 0, RK0); \
|
||||
SBOX ## _1(x0 ## 1, x1 ## 1, x2 ## 1, x3 ## 1, x4 ## 1); \
|
||||
get_key(i, 2, RK2); \
|
||||
SBOX ## _2(x0 ## 1, x1 ## 1, x2 ## 1, x3 ## 1, x4 ## 1); \
|
||||
get_key(i, 3, RK3); \
|
||||
SBOX ## _1(x0 ## 2, x1 ## 2, x2 ## 2, x3 ## 2, x4 ## 2); \
|
||||
get_key(i, 1, RK1); \
|
||||
SBOX ## _2(x0 ## 2, x1 ## 2, x2 ## 2, x3 ## 2, x4 ## 2); \
|
||||
|
||||
#define transpose_4x4(x0, x1, x2, x3, t0, t1, t2) \ |
||||
vpunpckldq x1, x0, t0; \
|
||||
vpunpckhdq x1, x0, t2; \
|
||||
vpunpckldq x3, x2, t1; \
|
||||
vpunpckhdq x3, x2, x3; \
|
||||
\ |
||||
vpunpcklqdq t1, t0, x0; \
|
||||
vpunpckhqdq t1, t0, x1; \
|
||||
vpunpcklqdq x3, t2, x2; \
|
||||
vpunpckhqdq x3, t2, x3;
|
||||
|
||||
#define read_blocks(x0, x1, x2, x3, t0, t1, t2) \ |
||||
transpose_4x4(x0, x1, x2, x3, t0, t1, t2) |
||||
|
||||
#define write_blocks(x0, x1, x2, x3, t0, t1, t2) \ |
||||
transpose_4x4(x0, x1, x2, x3, t0, t1, t2) |
||||
|
||||
.align 8
|
||||
__serpent_enc_blk16: |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2: plaintext |
||||
* output: |
||||
* RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2: ciphertext |
||||
*/ |
||||
|
||||
vpcmpeqd RNOT, RNOT, RNOT;
|
||||
|
||||
read_blocks(RA1, RB1, RC1, RD1, RK0, RK1, RK2);
|
||||
read_blocks(RA2, RB2, RC2, RD2, RK0, RK1, RK2);
|
||||
|
||||
K2(RA, RB, RC, RD, RE, 0);
|
||||
S(S0, RA, RB, RC, RD, RE); LK2(RC, RB, RD, RA, RE, 1);
|
||||
S(S1, RC, RB, RD, RA, RE); LK2(RE, RD, RA, RC, RB, 2);
|
||||
S(S2, RE, RD, RA, RC, RB); LK2(RB, RD, RE, RC, RA, 3);
|
||||
S(S3, RB, RD, RE, RC, RA); LK2(RC, RA, RD, RB, RE, 4);
|
||||
S(S4, RC, RA, RD, RB, RE); LK2(RA, RD, RB, RE, RC, 5);
|
||||
S(S5, RA, RD, RB, RE, RC); LK2(RC, RA, RD, RE, RB, 6);
|
||||
S(S6, RC, RA, RD, RE, RB); LK2(RD, RB, RA, RE, RC, 7);
|
||||
S(S7, RD, RB, RA, RE, RC); LK2(RC, RA, RE, RD, RB, 8);
|
||||
S(S0, RC, RA, RE, RD, RB); LK2(RE, RA, RD, RC, RB, 9);
|
||||
S(S1, RE, RA, RD, RC, RB); LK2(RB, RD, RC, RE, RA, 10);
|
||||
S(S2, RB, RD, RC, RE, RA); LK2(RA, RD, RB, RE, RC, 11);
|
||||
S(S3, RA, RD, RB, RE, RC); LK2(RE, RC, RD, RA, RB, 12);
|
||||
S(S4, RE, RC, RD, RA, RB); LK2(RC, RD, RA, RB, RE, 13);
|
||||
S(S5, RC, RD, RA, RB, RE); LK2(RE, RC, RD, RB, RA, 14);
|
||||
S(S6, RE, RC, RD, RB, RA); LK2(RD, RA, RC, RB, RE, 15);
|
||||
S(S7, RD, RA, RC, RB, RE); LK2(RE, RC, RB, RD, RA, 16);
|
||||
S(S0, RE, RC, RB, RD, RA); LK2(RB, RC, RD, RE, RA, 17);
|
||||
S(S1, RB, RC, RD, RE, RA); LK2(RA, RD, RE, RB, RC, 18);
|
||||
S(S2, RA, RD, RE, RB, RC); LK2(RC, RD, RA, RB, RE, 19);
|
||||
S(S3, RC, RD, RA, RB, RE); LK2(RB, RE, RD, RC, RA, 20);
|
||||
S(S4, RB, RE, RD, RC, RA); LK2(RE, RD, RC, RA, RB, 21);
|
||||
S(S5, RE, RD, RC, RA, RB); LK2(RB, RE, RD, RA, RC, 22);
|
||||
S(S6, RB, RE, RD, RA, RC); LK2(RD, RC, RE, RA, RB, 23);
|
||||
S(S7, RD, RC, RE, RA, RB); LK2(RB, RE, RA, RD, RC, 24);
|
||||
S(S0, RB, RE, RA, RD, RC); LK2(RA, RE, RD, RB, RC, 25);
|
||||
S(S1, RA, RE, RD, RB, RC); LK2(RC, RD, RB, RA, RE, 26);
|
||||
S(S2, RC, RD, RB, RA, RE); LK2(RE, RD, RC, RA, RB, 27);
|
||||
S(S3, RE, RD, RC, RA, RB); LK2(RA, RB, RD, RE, RC, 28);
|
||||
S(S4, RA, RB, RD, RE, RC); LK2(RB, RD, RE, RC, RA, 29);
|
||||
S(S5, RB, RD, RE, RC, RA); LK2(RA, RB, RD, RC, RE, 30);
|
||||
S(S6, RA, RB, RD, RC, RE); LK2(RD, RE, RB, RC, RA, 31);
|
||||
S(S7, RD, RE, RB, RC, RA); K2(RA, RB, RC, RD, RE, 32);
|
||||
|
||||
write_blocks(RA1, RB1, RC1, RD1, RK0, RK1, RK2);
|
||||
write_blocks(RA2, RB2, RC2, RD2, RK0, RK1, RK2);
|
||||
|
||||
ret;
|
||||
ENDPROC(__serpent_enc_blk16) |
||||
|
||||
.align 8
|
||||
__serpent_dec_blk16: |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2: ciphertext |
||||
* output: |
||||
* RC1, RD1, RB1, RE1, RC2, RD2, RB2, RE2: plaintext |
||||
*/ |
||||
|
||||
vpcmpeqd RNOT, RNOT, RNOT;
|
||||
|
||||
read_blocks(RA1, RB1, RC1, RD1, RK0, RK1, RK2);
|
||||
read_blocks(RA2, RB2, RC2, RD2, RK0, RK1, RK2);
|
||||
|
||||
K2(RA, RB, RC, RD, RE, 32);
|
||||
SP(SI7, RA, RB, RC, RD, RE, 31); KL2(RB, RD, RA, RE, RC, 31);
|
||||
SP(SI6, RB, RD, RA, RE, RC, 30); KL2(RA, RC, RE, RB, RD, 30);
|
||||
SP(SI5, RA, RC, RE, RB, RD, 29); KL2(RC, RD, RA, RE, RB, 29);
|
||||
SP(SI4, RC, RD, RA, RE, RB, 28); KL2(RC, RA, RB, RE, RD, 28);
|
||||
SP(SI3, RC, RA, RB, RE, RD, 27); KL2(RB, RC, RD, RE, RA, 27);
|
||||
SP(SI2, RB, RC, RD, RE, RA, 26); KL2(RC, RA, RE, RD, RB, 26);
|
||||
SP(SI1, RC, RA, RE, RD, RB, 25); KL2(RB, RA, RE, RD, RC, 25);
|
||||
SP(SI0, RB, RA, RE, RD, RC, 24); KL2(RE, RC, RA, RB, RD, 24);
|
||||
SP(SI7, RE, RC, RA, RB, RD, 23); KL2(RC, RB, RE, RD, RA, 23);
|
||||
SP(SI6, RC, RB, RE, RD, RA, 22); KL2(RE, RA, RD, RC, RB, 22);
|
||||
SP(SI5, RE, RA, RD, RC, RB, 21); KL2(RA, RB, RE, RD, RC, 21);
|
||||
SP(SI4, RA, RB, RE, RD, RC, 20); KL2(RA, RE, RC, RD, RB, 20);
|
||||
SP(SI3, RA, RE, RC, RD, RB, 19); KL2(RC, RA, RB, RD, RE, 19);
|
||||
SP(SI2, RC, RA, RB, RD, RE, 18); KL2(RA, RE, RD, RB, RC, 18);
|
||||
SP(SI1, RA, RE, RD, RB, RC, 17); KL2(RC, RE, RD, RB, RA, 17);
|
||||
SP(SI0, RC, RE, RD, RB, RA, 16); KL2(RD, RA, RE, RC, RB, 16);
|
||||
SP(SI7, RD, RA, RE, RC, RB, 15); KL2(RA, RC, RD, RB, RE, 15);
|
||||
SP(SI6, RA, RC, RD, RB, RE, 14); KL2(RD, RE, RB, RA, RC, 14);
|
||||
SP(SI5, RD, RE, RB, RA, RC, 13); KL2(RE, RC, RD, RB, RA, 13);
|
||||
SP(SI4, RE, RC, RD, RB, RA, 12); KL2(RE, RD, RA, RB, RC, 12);
|
||||
SP(SI3, RE, RD, RA, RB, RC, 11); KL2(RA, RE, RC, RB, RD, 11);
|
||||
SP(SI2, RA, RE, RC, RB, RD, 10); KL2(RE, RD, RB, RC, RA, 10);
|
||||
SP(SI1, RE, RD, RB, RC, RA, 9); KL2(RA, RD, RB, RC, RE, 9);
|
||||
SP(SI0, RA, RD, RB, RC, RE, 8); KL2(RB, RE, RD, RA, RC, 8);
|
||||
SP(SI7, RB, RE, RD, RA, RC, 7); KL2(RE, RA, RB, RC, RD, 7);
|
||||
SP(SI6, RE, RA, RB, RC, RD, 6); KL2(RB, RD, RC, RE, RA, 6);
|
||||
SP(SI5, RB, RD, RC, RE, RA, 5); KL2(RD, RA, RB, RC, RE, 5);
|
||||
SP(SI4, RD, RA, RB, RC, RE, 4); KL2(RD, RB, RE, RC, RA, 4);
|
||||
SP(SI3, RD, RB, RE, RC, RA, 3); KL2(RE, RD, RA, RC, RB, 3);
|
||||
SP(SI2, RE, RD, RA, RC, RB, 2); KL2(RD, RB, RC, RA, RE, 2);
|
||||
SP(SI1, RD, RB, RC, RA, RE, 1); KL2(RE, RB, RC, RA, RD, 1);
|
||||
S(SI0, RE, RB, RC, RA, RD); K2(RC, RD, RB, RE, RA, 0);
|
||||
|
||||
write_blocks(RC1, RD1, RB1, RE1, RK0, RK1, RK2);
|
||||
write_blocks(RC2, RD2, RB2, RE2, RK0, RK1, RK2);
|
||||
|
||||
ret;
|
||||
ENDPROC(__serpent_dec_blk16) |
||||
|
||||
ENTRY(serpent_ecb_enc_16way) |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* %rsi: dst |
||||
* %rdx: src |
||||
*/ |
||||
|
||||
vzeroupper;
|
||||
|
||||
load_16way(%rdx, RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2);
|
||||
|
||||
call __serpent_enc_blk16;
|
||||
|
||||
store_16way(%rsi, RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2);
|
||||
|
||||
vzeroupper;
|
||||
|
||||
ret;
|
||||
ENDPROC(serpent_ecb_enc_16way) |
||||
|
||||
ENTRY(serpent_ecb_dec_16way) |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* %rsi: dst |
||||
* %rdx: src |
||||
*/ |
||||
|
||||
vzeroupper;
|
||||
|
||||
load_16way(%rdx, RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2);
|
||||
|
||||
call __serpent_dec_blk16;
|
||||
|
||||
store_16way(%rsi, RC1, RD1, RB1, RE1, RC2, RD2, RB2, RE2);
|
||||
|
||||
vzeroupper;
|
||||
|
||||
ret;
|
||||
ENDPROC(serpent_ecb_dec_16way) |
||||
|
||||
ENTRY(serpent_cbc_dec_16way) |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* %rsi: dst |
||||
* %rdx: src |
||||
*/ |
||||
|
||||
vzeroupper;
|
||||
|
||||
load_16way(%rdx, RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2);
|
||||
|
||||
call __serpent_dec_blk16;
|
||||
|
||||
store_cbc_16way(%rdx, %rsi, RC1, RD1, RB1, RE1, RC2, RD2, RB2, RE2, |
||||
RK0);
|
||||
|
||||
vzeroupper;
|
||||
|
||||
ret;
|
||||
ENDPROC(serpent_cbc_dec_16way) |
||||
|
||||
ENTRY(serpent_ctr_16way) |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* %rsi: dst (16 blocks) |
||||
* %rdx: src (16 blocks) |
||||
* %rcx: iv (little endian, 128bit) |
||||
*/ |
||||
|
||||
vzeroupper;
|
||||
|
||||
load_ctr_16way(%rcx, .Lbswap128_mask, RA1, RB1, RC1, RD1, RA2, RB2, RC2, |
||||
RD2, RK0, RK0x, RK1, RK1x, RK2, RK2x, RK3, RK3x, RNOT, |
||||
tp);
|
||||
|
||||
call __serpent_enc_blk16;
|
||||
|
||||
store_ctr_16way(%rdx, %rsi, RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2);
|
||||
|
||||
vzeroupper;
|
||||
|
||||
ret;
|
||||
ENDPROC(serpent_ctr_16way) |
||||
|
||||
ENTRY(serpent_xts_enc_16way) |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* %rsi: dst (16 blocks) |
||||
* %rdx: src (16 blocks) |
||||
* %rcx: iv (t ⊕ αⁿ ∈ GF(2¹²⁸)) |
||||
*/ |
||||
|
||||
vzeroupper;
|
||||
|
||||
load_xts_16way(%rcx, %rdx, %rsi, RA1, RB1, RC1, RD1, RA2, RB2, RC2, |
||||
RD2, RK0, RK0x, RK1, RK1x, RK2, RK2x, RK3, RK3x, RNOT, |
||||
.Lxts_gf128mul_and_shl1_mask_0, |
||||
.Lxts_gf128mul_and_shl1_mask_1);
|
||||
|
||||
call __serpent_enc_blk16;
|
||||
|
||||
store_xts_16way(%rsi, RA1, RB1, RC1, RD1, RA2, RB2, RC2, RD2);
|
||||
|
||||
vzeroupper;
|
||||
|
||||
ret;
|
||||
ENDPROC(serpent_xts_enc_16way) |
||||
|
||||
ENTRY(serpent_xts_dec_16way) |
||||
/* input: |
||||
* %rdi: ctx, CTX |
||||
* %rsi: dst (16 blocks) |
||||
* %rdx: src (16 blocks) |
||||
* %rcx: iv (t ⊕ αⁿ ∈ GF(2¹²⁸)) |
||||
*/ |
||||
|
||||
vzeroupper;
|
||||
|
||||
load_xts_16way(%rcx, %rdx, %rsi, RA1, RB1, RC1, RD1, RA2, RB2, RC2, |
||||
RD2, RK0, RK0x, RK1, RK1x, RK2, RK2x, RK3, RK3x, RNOT, |
||||
.Lxts_gf128mul_and_shl1_mask_0, |
||||
.Lxts_gf128mul_and_shl1_mask_1);
|
||||
|
||||
call __serpent_dec_blk16;
|
||||
|
||||
store_xts_16way(%rsi, RC1, RD1, RB1, RE1, RC2, RD2, RB2, RE2);
|
||||
|
||||
vzeroupper;
|
||||
|
||||
ret;
|
||||
ENDPROC(serpent_xts_dec_16way) |
@ -0,0 +1,562 @@ |
||||
/*
|
||||
* Glue Code for x86_64/AVX2 assembler optimized version of Serpent |
||||
* |
||||
* Copyright © 2012-2013 Jussi Kivilinna <jussi.kivilinna@mbnet.fi> |
||||
* |
||||
* This program is free software; you can redistribute it and/or modify |
||||
* it under the terms of the GNU General Public License as published by |
||||
* the Free Software Foundation; either version 2 of the License, or |
||||
* (at your option) any later version. |
||||
* |
||||
*/ |
||||
|
||||
#include <linux/module.h> |
||||
#include <linux/types.h> |
||||
#include <linux/crypto.h> |
||||
#include <linux/err.h> |
||||
#include <crypto/algapi.h> |
||||
#include <crypto/ctr.h> |
||||
#include <crypto/lrw.h> |
||||
#include <crypto/xts.h> |
||||
#include <crypto/serpent.h> |
||||
#include <asm/xcr.h> |
||||
#include <asm/xsave.h> |
||||
#include <asm/crypto/serpent-avx.h> |
||||
#include <asm/crypto/ablk_helper.h> |
||||
#include <asm/crypto/glue_helper.h> |
||||
|
||||
#define SERPENT_AVX2_PARALLEL_BLOCKS 16 |
||||
|
||||
/* 16-way AVX2 parallel cipher functions */ |
||||
asmlinkage void serpent_ecb_enc_16way(struct serpent_ctx *ctx, u8 *dst, |
||||
const u8 *src); |
||||
asmlinkage void serpent_ecb_dec_16way(struct serpent_ctx *ctx, u8 *dst, |
||||
const u8 *src); |
||||
asmlinkage void serpent_cbc_dec_16way(void *ctx, u128 *dst, const u128 *src); |
||||
|
||||
asmlinkage void serpent_ctr_16way(void *ctx, u128 *dst, const u128 *src, |
||||
le128 *iv); |
||||
asmlinkage void serpent_xts_enc_16way(struct serpent_ctx *ctx, u8 *dst, |
||||
const u8 *src, le128 *iv); |
||||
asmlinkage void serpent_xts_dec_16way(struct serpent_ctx *ctx, u8 *dst, |
||||
const u8 *src, le128 *iv); |
||||
|
||||
static const struct common_glue_ctx serpent_enc = { |
||||
.num_funcs = 3, |
||||
.fpu_blocks_limit = 8, |
||||
|
||||
.funcs = { { |
||||
.num_blocks = 16, |
||||
.fn_u = { .ecb = GLUE_FUNC_CAST(serpent_ecb_enc_16way) } |
||||
}, { |
||||
.num_blocks = 8, |
||||
.fn_u = { .ecb = GLUE_FUNC_CAST(serpent_ecb_enc_8way_avx) } |
||||
}, { |
||||
.num_blocks = 1, |
||||
.fn_u = { .ecb = GLUE_FUNC_CAST(__serpent_encrypt) } |
||||
} } |
||||
}; |
||||
|
||||
static const struct common_glue_ctx serpent_ctr = { |
||||
.num_funcs = 3, |
||||
.fpu_blocks_limit = 8, |
||||
|
||||
.funcs = { { |
||||
.num_blocks = 16, |
||||
.fn_u = { .ctr = GLUE_CTR_FUNC_CAST(serpent_ctr_16way) } |
||||
}, { |
||||
.num_blocks = 8, |
||||
.fn_u = { .ctr = GLUE_CTR_FUNC_CAST(serpent_ctr_8way_avx) } |
||||
}, { |
||||
.num_blocks = 1, |
||||
.fn_u = { .ctr = GLUE_CTR_FUNC_CAST(__serpent_crypt_ctr) } |
||||
} } |
||||
}; |
||||
|
||||
static const struct common_glue_ctx serpent_enc_xts = { |
||||
.num_funcs = 3, |
||||
.fpu_blocks_limit = 8, |
||||
|
||||
.funcs = { { |
||||
.num_blocks = 16, |
||||
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_enc_16way) } |
||||
}, { |
||||
.num_blocks = 8, |
||||
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_enc_8way_avx) } |
||||
}, { |
||||
.num_blocks = 1, |
||||
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_enc) } |
||||
} } |
||||
}; |
||||
|
||||
static const struct common_glue_ctx serpent_dec = { |
||||
.num_funcs = 3, |
||||
.fpu_blocks_limit = 8, |
||||
|
||||
.funcs = { { |
||||
.num_blocks = 16, |
||||
.fn_u = { .ecb = GLUE_FUNC_CAST(serpent_ecb_dec_16way) } |
||||
}, { |
||||
.num_blocks = 8, |
||||
.fn_u = { .ecb = GLUE_FUNC_CAST(serpent_ecb_dec_8way_avx) } |
||||
}, { |
||||
.num_blocks = 1, |
||||
.fn_u = { .ecb = GLUE_FUNC_CAST(__serpent_decrypt) } |
||||
} } |
||||
}; |
||||
|
||||
static const struct common_glue_ctx serpent_dec_cbc = { |
||||
.num_funcs = 3, |
||||
.fpu_blocks_limit = 8, |
||||
|
||||
.funcs = { { |
||||
.num_blocks = 16, |
||||
.fn_u = { .cbc = GLUE_CBC_FUNC_CAST(serpent_cbc_dec_16way) } |
||||
}, { |
||||
.num_blocks = 8, |
||||
.fn_u = { .cbc = GLUE_CBC_FUNC_CAST(serpent_cbc_dec_8way_avx) } |
||||
}, { |
||||
.num_blocks = 1, |
||||
.fn_u = { .cbc = GLUE_CBC_FUNC_CAST(__serpent_decrypt) } |
||||
} } |
||||
}; |
||||
|
||||
static const struct common_glue_ctx serpent_dec_xts = { |
||||
.num_funcs = 3, |
||||
.fpu_blocks_limit = 8, |
||||
|
||||
.funcs = { { |
||||
.num_blocks = 16, |
||||
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_dec_16way) } |
||||
}, { |
||||
.num_blocks = 8, |
||||
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_dec_8way_avx) } |
||||
}, { |
||||
.num_blocks = 1, |
||||
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(serpent_xts_dec) } |
||||
} } |
||||
}; |
||||
|
||||
static int ecb_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
return glue_ecb_crypt_128bit(&serpent_enc, desc, dst, src, nbytes); |
||||
} |
||||
|
||||
static int ecb_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
return glue_ecb_crypt_128bit(&serpent_dec, desc, dst, src, nbytes); |
||||
} |
||||
|
||||
static int cbc_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
return glue_cbc_encrypt_128bit(GLUE_FUNC_CAST(__serpent_encrypt), desc, |
||||
dst, src, nbytes); |
||||
} |
||||
|
||||
static int cbc_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
return glue_cbc_decrypt_128bit(&serpent_dec_cbc, desc, dst, src, |
||||
nbytes); |
||||
} |
||||
|
||||
static int ctr_crypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
return glue_ctr_crypt_128bit(&serpent_ctr, desc, dst, src, nbytes); |
||||
} |
||||
|
||||
static inline bool serpent_fpu_begin(bool fpu_enabled, unsigned int nbytes) |
||||
{ |
||||
/* since reusing AVX functions, starts using FPU at 8 parallel blocks */ |
||||
return glue_fpu_begin(SERPENT_BLOCK_SIZE, 8, NULL, fpu_enabled, nbytes); |
||||
} |
||||
|
||||
static inline void serpent_fpu_end(bool fpu_enabled) |
||||
{ |
||||
glue_fpu_end(fpu_enabled); |
||||
} |
||||
|
||||
struct crypt_priv { |
||||
struct serpent_ctx *ctx; |
||||
bool fpu_enabled; |
||||
}; |
||||
|
||||
static void encrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes) |
||||
{ |
||||
const unsigned int bsize = SERPENT_BLOCK_SIZE; |
||||
struct crypt_priv *ctx = priv; |
||||
int i; |
||||
|
||||
ctx->fpu_enabled = serpent_fpu_begin(ctx->fpu_enabled, nbytes); |
||||
|
||||
if (nbytes >= SERPENT_AVX2_PARALLEL_BLOCKS * bsize) { |
||||
serpent_ecb_enc_16way(ctx->ctx, srcdst, srcdst); |
||||
srcdst += bsize * SERPENT_AVX2_PARALLEL_BLOCKS; |
||||
nbytes -= bsize * SERPENT_AVX2_PARALLEL_BLOCKS; |
||||
} |
||||
|
||||
while (nbytes >= SERPENT_PARALLEL_BLOCKS * bsize) { |
||||
serpent_ecb_enc_8way_avx(ctx->ctx, srcdst, srcdst); |
||||
srcdst += bsize * SERPENT_PARALLEL_BLOCKS; |
||||
nbytes -= bsize * SERPENT_PARALLEL_BLOCKS; |
||||
} |
||||
|
||||
for (i = 0; i < nbytes / bsize; i++, srcdst += bsize) |
||||
__serpent_encrypt(ctx->ctx, srcdst, srcdst); |
||||
} |
||||
|
||||
static void decrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes) |
||||
{ |
||||
const unsigned int bsize = SERPENT_BLOCK_SIZE; |
||||
struct crypt_priv *ctx = priv; |
||||
int i; |
||||
|
||||
ctx->fpu_enabled = serpent_fpu_begin(ctx->fpu_enabled, nbytes); |
||||
|
||||
if (nbytes >= SERPENT_AVX2_PARALLEL_BLOCKS * bsize) { |
||||
serpent_ecb_dec_16way(ctx->ctx, srcdst, srcdst); |
||||
srcdst += bsize * SERPENT_AVX2_PARALLEL_BLOCKS; |
||||
nbytes -= bsize * SERPENT_AVX2_PARALLEL_BLOCKS; |
||||
} |
||||
|
||||
while (nbytes >= SERPENT_PARALLEL_BLOCKS * bsize) { |
||||
serpent_ecb_dec_8way_avx(ctx->ctx, srcdst, srcdst); |
||||
srcdst += bsize * SERPENT_PARALLEL_BLOCKS; |
||||
nbytes -= bsize * SERPENT_PARALLEL_BLOCKS; |
||||
} |
||||
|
||||
for (i = 0; i < nbytes / bsize; i++, srcdst += bsize) |
||||
__serpent_decrypt(ctx->ctx, srcdst, srcdst); |
||||
} |
||||
|
||||
static int lrw_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
struct serpent_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); |
||||
be128 buf[SERPENT_AVX2_PARALLEL_BLOCKS]; |
||||
struct crypt_priv crypt_ctx = { |
||||
.ctx = &ctx->serpent_ctx, |
||||
.fpu_enabled = false, |
||||
}; |
||||
struct lrw_crypt_req req = { |
||||
.tbuf = buf, |
||||
.tbuflen = sizeof(buf), |
||||
|
||||
.table_ctx = &ctx->lrw_table, |
||||
.crypt_ctx = &crypt_ctx, |
||||
.crypt_fn = encrypt_callback, |
||||
}; |
||||
int ret; |
||||
|
||||
desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP; |
||||
ret = lrw_crypt(desc, dst, src, nbytes, &req); |
||||
serpent_fpu_end(crypt_ctx.fpu_enabled); |
||||
|
||||
return ret; |
||||
} |
||||
|
||||
static int lrw_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
struct serpent_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); |
||||
be128 buf[SERPENT_AVX2_PARALLEL_BLOCKS]; |
||||
struct crypt_priv crypt_ctx = { |
||||
.ctx = &ctx->serpent_ctx, |
||||
.fpu_enabled = false, |
||||
}; |
||||
struct lrw_crypt_req req = { |
||||
.tbuf = buf, |
||||
.tbuflen = sizeof(buf), |
||||
|
||||
.table_ctx = &ctx->lrw_table, |
||||
.crypt_ctx = &crypt_ctx, |
||||
.crypt_fn = decrypt_callback, |
||||
}; |
||||
int ret; |
||||
|
||||
desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP; |
||||
ret = lrw_crypt(desc, dst, src, nbytes, &req); |
||||
serpent_fpu_end(crypt_ctx.fpu_enabled); |
||||
|
||||
return ret; |
||||
} |
||||
|
||||
static int xts_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
struct serpent_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); |
||||
|
||||
return glue_xts_crypt_128bit(&serpent_enc_xts, desc, dst, src, nbytes, |
||||
XTS_TWEAK_CAST(__serpent_encrypt), |
||||
&ctx->tweak_ctx, &ctx->crypt_ctx); |
||||
} |
||||
|
||||
static int xts_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, |
||||
struct scatterlist *src, unsigned int nbytes) |
||||
{ |
||||
struct serpent_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); |
||||
|
||||
return glue_xts_crypt_128bit(&serpent_dec_xts, desc, dst, src, nbytes, |
||||
XTS_TWEAK_CAST(__serpent_encrypt), |
||||
&ctx->tweak_ctx, &ctx->crypt_ctx); |
||||
} |
||||
|
||||
static struct crypto_alg srp_algs[10] = { { |
||||
.cra_name = "__ecb-serpent-avx2", |
||||
.cra_driver_name = "__driver-ecb-serpent-avx2", |
||||
.cra_priority = 0, |
||||
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct serpent_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_blkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[0].cra_list), |
||||
.cra_u = { |
||||
.blkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE, |
||||
.setkey = serpent_setkey, |
||||
.encrypt = ecb_encrypt, |
||||
.decrypt = ecb_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "__cbc-serpent-avx2", |
||||
.cra_driver_name = "__driver-cbc-serpent-avx2", |
||||
.cra_priority = 0, |
||||
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct serpent_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_blkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[1].cra_list), |
||||
.cra_u = { |
||||
.blkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE, |
||||
.setkey = serpent_setkey, |
||||
.encrypt = cbc_encrypt, |
||||
.decrypt = cbc_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "__ctr-serpent-avx2", |
||||
.cra_driver_name = "__driver-ctr-serpent-avx2", |
||||
.cra_priority = 0, |
||||
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, |
||||
.cra_blocksize = 1, |
||||
.cra_ctxsize = sizeof(struct serpent_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_blkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[2].cra_list), |
||||
.cra_u = { |
||||
.blkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = serpent_setkey, |
||||
.encrypt = ctr_crypt, |
||||
.decrypt = ctr_crypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "__lrw-serpent-avx2", |
||||
.cra_driver_name = "__driver-lrw-serpent-avx2", |
||||
.cra_priority = 0, |
||||
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct serpent_lrw_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_blkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[3].cra_list), |
||||
.cra_exit = lrw_serpent_exit_tfm, |
||||
.cra_u = { |
||||
.blkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE + |
||||
SERPENT_BLOCK_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE + |
||||
SERPENT_BLOCK_SIZE, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = lrw_serpent_setkey, |
||||
.encrypt = lrw_encrypt, |
||||
.decrypt = lrw_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "__xts-serpent-avx2", |
||||
.cra_driver_name = "__driver-xts-serpent-avx2", |
||||
.cra_priority = 0, |
||||
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct serpent_xts_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_blkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[4].cra_list), |
||||
.cra_u = { |
||||
.blkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE * 2, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE * 2, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = xts_serpent_setkey, |
||||
.encrypt = xts_encrypt, |
||||
.decrypt = xts_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "ecb(serpent)", |
||||
.cra_driver_name = "ecb-serpent-avx2", |
||||
.cra_priority = 600, |
||||
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct async_helper_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_ablkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[5].cra_list), |
||||
.cra_init = ablk_init, |
||||
.cra_exit = ablk_exit, |
||||
.cra_u = { |
||||
.ablkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE, |
||||
.setkey = ablk_set_key, |
||||
.encrypt = ablk_encrypt, |
||||
.decrypt = ablk_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "cbc(serpent)", |
||||
.cra_driver_name = "cbc-serpent-avx2", |
||||
.cra_priority = 600, |
||||
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct async_helper_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_ablkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[6].cra_list), |
||||
.cra_init = ablk_init, |
||||
.cra_exit = ablk_exit, |
||||
.cra_u = { |
||||
.ablkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = ablk_set_key, |
||||
.encrypt = __ablk_encrypt, |
||||
.decrypt = ablk_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "ctr(serpent)", |
||||
.cra_driver_name = "ctr-serpent-avx2", |
||||
.cra_priority = 600, |
||||
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, |
||||
.cra_blocksize = 1, |
||||
.cra_ctxsize = sizeof(struct async_helper_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_ablkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[7].cra_list), |
||||
.cra_init = ablk_init, |
||||
.cra_exit = ablk_exit, |
||||
.cra_u = { |
||||
.ablkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = ablk_set_key, |
||||
.encrypt = ablk_encrypt, |
||||
.decrypt = ablk_encrypt, |
||||
.geniv = "chainiv", |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "lrw(serpent)", |
||||
.cra_driver_name = "lrw-serpent-avx2", |
||||
.cra_priority = 600, |
||||
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct async_helper_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_ablkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[8].cra_list), |
||||
.cra_init = ablk_init, |
||||
.cra_exit = ablk_exit, |
||||
.cra_u = { |
||||
.ablkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE + |
||||
SERPENT_BLOCK_SIZE, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE + |
||||
SERPENT_BLOCK_SIZE, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = ablk_set_key, |
||||
.encrypt = ablk_encrypt, |
||||
.decrypt = ablk_decrypt, |
||||
}, |
||||
}, |
||||
}, { |
||||
.cra_name = "xts(serpent)", |
||||
.cra_driver_name = "xts-serpent-avx2", |
||||
.cra_priority = 600, |
||||
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, |
||||
.cra_blocksize = SERPENT_BLOCK_SIZE, |
||||
.cra_ctxsize = sizeof(struct async_helper_ctx), |
||||
.cra_alignmask = 0, |
||||
.cra_type = &crypto_ablkcipher_type, |
||||
.cra_module = THIS_MODULE, |
||||
.cra_list = LIST_HEAD_INIT(srp_algs[9].cra_list), |
||||
.cra_init = ablk_init, |
||||
.cra_exit = ablk_exit, |
||||
.cra_u = { |
||||
.ablkcipher = { |
||||
.min_keysize = SERPENT_MIN_KEY_SIZE * 2, |
||||
.max_keysize = SERPENT_MAX_KEY_SIZE * 2, |
||||
.ivsize = SERPENT_BLOCK_SIZE, |
||||
.setkey = ablk_set_key, |
||||
.encrypt = ablk_encrypt, |
||||
.decrypt = ablk_decrypt, |
||||
}, |
||||
}, |
||||
} }; |
||||
|
||||
static int __init init(void) |
||||
{ |
||||
u64 xcr0; |
||||
|
||||
if (!cpu_has_avx2 || !cpu_has_osxsave) { |
||||
pr_info("AVX2 instructions are not detected.\n"); |
||||
return -ENODEV; |
||||
} |
||||
|
||||
xcr0 = xgetbv(XCR_XFEATURE_ENABLED_MASK); |
||||
if ((xcr0 & (XSTATE_SSE | XSTATE_YMM)) != (XSTATE_SSE | XSTATE_YMM)) { |
||||
pr_info("AVX detected but unusable.\n"); |
||||
return -ENODEV; |
||||
} |
||||
|
||||
return crypto_register_algs(srp_algs, ARRAY_SIZE(srp_algs)); |
||||
} |
||||
|
||||
static void __exit fini(void) |
||||
{ |
||||
crypto_unregister_algs(srp_algs, ARRAY_SIZE(srp_algs)); |
||||
} |
||||
|
||||
module_init(init); |
||||
module_exit(fini); |
||||
|
||||
MODULE_LICENSE("GPL"); |
||||
MODULE_DESCRIPTION("Serpent Cipher Algorithm, AVX2 optimized"); |
||||
MODULE_ALIAS("serpent"); |
||||
MODULE_ALIAS("serpent-asm"); |
Loading…
Reference in new issue