2 * Glue Code for SSE2 assembler versions of Serpent Cipher
4 * Copyright (c) 2011 Jussi Kivilinna <jussi.kivilinna@mbnet.fi>
6 * Glue code based on aesni-intel_glue.c by:
7 * Copyright (C) 2008, Intel Corp.
8 * Author: Huang Ying <ying.huang@intel.com>
10 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
11 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
12 * CTR part based on code (crypto/ctr.c) by:
13 * (C) Copyright IBM Corp. 2007 - Joy Latten <latten@us.ibm.com>
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 2 of the License, or
18 * (at your option) any later version.
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
25 * You should have received a copy of the GNU General Public License
26 * along with this program; if not, write to the Free Software
27 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
32 #include <linux/module.h>
33 #include <linux/hardirq.h>
34 #include <linux/types.h>
35 #include <linux/crypto.h>
36 #include <linux/err.h>
37 #include <crypto/ablk_helper.h>
38 #include <crypto/algapi.h>
39 #include <crypto/serpent.h>
40 #include <crypto/cryptd.h>
41 #include <crypto/b128ops.h>
42 #include <crypto/ctr.h>
43 #include <crypto/lrw.h>
44 #include <crypto/xts.h>
45 #include <asm/crypto/serpent-sse2.h>
46 #include <asm/crypto/glue_helper.h>
48 static void serpent_decrypt_cbc_xway(void *ctx, u128 *dst, const u128 *src)
50 u128 ivs[SERPENT_PARALLEL_BLOCKS - 1];
53 for (j = 0; j < SERPENT_PARALLEL_BLOCKS - 1; j++)
56 serpent_dec_blk_xway(ctx, (u8 *)dst, (u8 *)src);
58 for (j = 0; j < SERPENT_PARALLEL_BLOCKS - 1; j++)
59 u128_xor(dst + (j + 1), dst + (j + 1), ivs + j);
62 static void serpent_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv)
66 le128_to_be128(&ctrblk, iv);
69 __serpent_encrypt(ctx, (u8 *)&ctrblk, (u8 *)&ctrblk);
70 u128_xor(dst, src, (u128 *)&ctrblk);
73 static void serpent_crypt_ctr_xway(void *ctx, u128 *dst, const u128 *src,
76 be128 ctrblks[SERPENT_PARALLEL_BLOCKS];
79 for (i = 0; i < SERPENT_PARALLEL_BLOCKS; i++) {
83 le128_to_be128(&ctrblks[i], iv);
87 serpent_enc_blk_xway_xor(ctx, (u8 *)dst, (u8 *)ctrblks);
90 static const struct common_glue_ctx serpent_enc = {
92 .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
95 .num_blocks = SERPENT_PARALLEL_BLOCKS,
96 .fn_u = { .ecb = GLUE_FUNC_CAST(serpent_enc_blk_xway) }
99 .fn_u = { .ecb = GLUE_FUNC_CAST(__serpent_encrypt) }
103 static const struct common_glue_ctx serpent_ctr = {
105 .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
108 .num_blocks = SERPENT_PARALLEL_BLOCKS,
109 .fn_u = { .ctr = GLUE_CTR_FUNC_CAST(serpent_crypt_ctr_xway) }
112 .fn_u = { .ctr = GLUE_CTR_FUNC_CAST(serpent_crypt_ctr) }
116 static const struct common_glue_ctx serpent_dec = {
118 .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
121 .num_blocks = SERPENT_PARALLEL_BLOCKS,
122 .fn_u = { .ecb = GLUE_FUNC_CAST(serpent_dec_blk_xway) }
125 .fn_u = { .ecb = GLUE_FUNC_CAST(__serpent_decrypt) }
129 static const struct common_glue_ctx serpent_dec_cbc = {
131 .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS,
134 .num_blocks = SERPENT_PARALLEL_BLOCKS,
135 .fn_u = { .cbc = GLUE_CBC_FUNC_CAST(serpent_decrypt_cbc_xway) }
138 .fn_u = { .cbc = GLUE_CBC_FUNC_CAST(__serpent_decrypt) }
142 static int ecb_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
143 struct scatterlist *src, unsigned int nbytes)
145 return glue_ecb_crypt_128bit(&serpent_enc, desc, dst, src, nbytes);
148 static int ecb_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
149 struct scatterlist *src, unsigned int nbytes)
151 return glue_ecb_crypt_128bit(&serpent_dec, desc, dst, src, nbytes);
154 static int cbc_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
155 struct scatterlist *src, unsigned int nbytes)
157 return glue_cbc_encrypt_128bit(GLUE_FUNC_CAST(__serpent_encrypt), desc,
161 static int cbc_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
162 struct scatterlist *src, unsigned int nbytes)
164 return glue_cbc_decrypt_128bit(&serpent_dec_cbc, desc, dst, src,
168 static int ctr_crypt(struct blkcipher_desc *desc, struct scatterlist *dst,
169 struct scatterlist *src, unsigned int nbytes)
171 return glue_ctr_crypt_128bit(&serpent_ctr, desc, dst, src, nbytes);
174 static inline bool serpent_fpu_begin(bool fpu_enabled, unsigned int nbytes)
176 return glue_fpu_begin(SERPENT_BLOCK_SIZE, SERPENT_PARALLEL_BLOCKS,
177 NULL, fpu_enabled, nbytes);
180 static inline void serpent_fpu_end(bool fpu_enabled)
182 glue_fpu_end(fpu_enabled);
186 struct serpent_ctx *ctx;
190 static void encrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes)
192 const unsigned int bsize = SERPENT_BLOCK_SIZE;
193 struct crypt_priv *ctx = priv;
196 ctx->fpu_enabled = serpent_fpu_begin(ctx->fpu_enabled, nbytes);
198 if (nbytes == bsize * SERPENT_PARALLEL_BLOCKS) {
199 serpent_enc_blk_xway(ctx->ctx, srcdst, srcdst);
203 for (i = 0; i < nbytes / bsize; i++, srcdst += bsize)
204 __serpent_encrypt(ctx->ctx, srcdst, srcdst);
207 static void decrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes)
209 const unsigned int bsize = SERPENT_BLOCK_SIZE;
210 struct crypt_priv *ctx = priv;
213 ctx->fpu_enabled = serpent_fpu_begin(ctx->fpu_enabled, nbytes);
215 if (nbytes == bsize * SERPENT_PARALLEL_BLOCKS) {
216 serpent_dec_blk_xway(ctx->ctx, srcdst, srcdst);
220 for (i = 0; i < nbytes / bsize; i++, srcdst += bsize)
221 __serpent_decrypt(ctx->ctx, srcdst, srcdst);
224 struct serpent_lrw_ctx {
225 struct lrw_table_ctx lrw_table;
226 struct serpent_ctx serpent_ctx;
229 static int lrw_serpent_setkey(struct crypto_tfm *tfm, const u8 *key,
232 struct serpent_lrw_ctx *ctx = crypto_tfm_ctx(tfm);
235 err = __serpent_setkey(&ctx->serpent_ctx, key, keylen -
240 return lrw_init_table(&ctx->lrw_table, key + keylen -
244 static int lrw_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
245 struct scatterlist *src, unsigned int nbytes)
247 struct serpent_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
248 be128 buf[SERPENT_PARALLEL_BLOCKS];
249 struct crypt_priv crypt_ctx = {
250 .ctx = &ctx->serpent_ctx,
251 .fpu_enabled = false,
253 struct lrw_crypt_req req = {
255 .tbuflen = sizeof(buf),
257 .table_ctx = &ctx->lrw_table,
258 .crypt_ctx = &crypt_ctx,
259 .crypt_fn = encrypt_callback,
263 desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
264 ret = lrw_crypt(desc, dst, src, nbytes, &req);
265 serpent_fpu_end(crypt_ctx.fpu_enabled);
270 static int lrw_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
271 struct scatterlist *src, unsigned int nbytes)
273 struct serpent_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
274 be128 buf[SERPENT_PARALLEL_BLOCKS];
275 struct crypt_priv crypt_ctx = {
276 .ctx = &ctx->serpent_ctx,
277 .fpu_enabled = false,
279 struct lrw_crypt_req req = {
281 .tbuflen = sizeof(buf),
283 .table_ctx = &ctx->lrw_table,
284 .crypt_ctx = &crypt_ctx,
285 .crypt_fn = decrypt_callback,
289 desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
290 ret = lrw_crypt(desc, dst, src, nbytes, &req);
291 serpent_fpu_end(crypt_ctx.fpu_enabled);
296 static void lrw_exit_tfm(struct crypto_tfm *tfm)
298 struct serpent_lrw_ctx *ctx = crypto_tfm_ctx(tfm);
300 lrw_free_table(&ctx->lrw_table);
303 struct serpent_xts_ctx {
304 struct serpent_ctx tweak_ctx;
305 struct serpent_ctx crypt_ctx;
308 static int xts_serpent_setkey(struct crypto_tfm *tfm, const u8 *key,
311 struct serpent_xts_ctx *ctx = crypto_tfm_ctx(tfm);
312 u32 *flags = &tfm->crt_flags;
315 /* key consists of keys of equal size concatenated, therefore
316 * the length must be even
319 *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
323 /* first half of xts-key is for crypt */
324 err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2);
328 /* second half of xts-key is for tweak */
329 return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2);
332 static int xts_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
333 struct scatterlist *src, unsigned int nbytes)
335 struct serpent_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
336 be128 buf[SERPENT_PARALLEL_BLOCKS];
337 struct crypt_priv crypt_ctx = {
338 .ctx = &ctx->crypt_ctx,
339 .fpu_enabled = false,
341 struct xts_crypt_req req = {
343 .tbuflen = sizeof(buf),
345 .tweak_ctx = &ctx->tweak_ctx,
346 .tweak_fn = XTS_TWEAK_CAST(__serpent_encrypt),
347 .crypt_ctx = &crypt_ctx,
348 .crypt_fn = encrypt_callback,
352 desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
353 ret = xts_crypt(desc, dst, src, nbytes, &req);
354 serpent_fpu_end(crypt_ctx.fpu_enabled);
359 static int xts_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
360 struct scatterlist *src, unsigned int nbytes)
362 struct serpent_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
363 be128 buf[SERPENT_PARALLEL_BLOCKS];
364 struct crypt_priv crypt_ctx = {
365 .ctx = &ctx->crypt_ctx,
366 .fpu_enabled = false,
368 struct xts_crypt_req req = {
370 .tbuflen = sizeof(buf),
372 .tweak_ctx = &ctx->tweak_ctx,
373 .tweak_fn = XTS_TWEAK_CAST(__serpent_encrypt),
374 .crypt_ctx = &crypt_ctx,
375 .crypt_fn = decrypt_callback,
379 desc->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
380 ret = xts_crypt(desc, dst, src, nbytes, &req);
381 serpent_fpu_end(crypt_ctx.fpu_enabled);
386 static struct crypto_alg serpent_algs[10] = { {
387 .cra_name = "__ecb-serpent-sse2",
388 .cra_driver_name = "__driver-ecb-serpent-sse2",
390 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
392 .cra_blocksize = SERPENT_BLOCK_SIZE,
393 .cra_ctxsize = sizeof(struct serpent_ctx),
395 .cra_type = &crypto_blkcipher_type,
396 .cra_module = THIS_MODULE,
399 .min_keysize = SERPENT_MIN_KEY_SIZE,
400 .max_keysize = SERPENT_MAX_KEY_SIZE,
401 .setkey = serpent_setkey,
402 .encrypt = ecb_encrypt,
403 .decrypt = ecb_decrypt,
407 .cra_name = "__cbc-serpent-sse2",
408 .cra_driver_name = "__driver-cbc-serpent-sse2",
410 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
412 .cra_blocksize = SERPENT_BLOCK_SIZE,
413 .cra_ctxsize = sizeof(struct serpent_ctx),
415 .cra_type = &crypto_blkcipher_type,
416 .cra_module = THIS_MODULE,
419 .min_keysize = SERPENT_MIN_KEY_SIZE,
420 .max_keysize = SERPENT_MAX_KEY_SIZE,
421 .setkey = serpent_setkey,
422 .encrypt = cbc_encrypt,
423 .decrypt = cbc_decrypt,
427 .cra_name = "__ctr-serpent-sse2",
428 .cra_driver_name = "__driver-ctr-serpent-sse2",
430 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
433 .cra_ctxsize = sizeof(struct serpent_ctx),
435 .cra_type = &crypto_blkcipher_type,
436 .cra_module = THIS_MODULE,
439 .min_keysize = SERPENT_MIN_KEY_SIZE,
440 .max_keysize = SERPENT_MAX_KEY_SIZE,
441 .ivsize = SERPENT_BLOCK_SIZE,
442 .setkey = serpent_setkey,
443 .encrypt = ctr_crypt,
444 .decrypt = ctr_crypt,
448 .cra_name = "__lrw-serpent-sse2",
449 .cra_driver_name = "__driver-lrw-serpent-sse2",
451 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
453 .cra_blocksize = SERPENT_BLOCK_SIZE,
454 .cra_ctxsize = sizeof(struct serpent_lrw_ctx),
456 .cra_type = &crypto_blkcipher_type,
457 .cra_module = THIS_MODULE,
458 .cra_exit = lrw_exit_tfm,
461 .min_keysize = SERPENT_MIN_KEY_SIZE +
463 .max_keysize = SERPENT_MAX_KEY_SIZE +
465 .ivsize = SERPENT_BLOCK_SIZE,
466 .setkey = lrw_serpent_setkey,
467 .encrypt = lrw_encrypt,
468 .decrypt = lrw_decrypt,
472 .cra_name = "__xts-serpent-sse2",
473 .cra_driver_name = "__driver-xts-serpent-sse2",
475 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
477 .cra_blocksize = SERPENT_BLOCK_SIZE,
478 .cra_ctxsize = sizeof(struct serpent_xts_ctx),
480 .cra_type = &crypto_blkcipher_type,
481 .cra_module = THIS_MODULE,
484 .min_keysize = SERPENT_MIN_KEY_SIZE * 2,
485 .max_keysize = SERPENT_MAX_KEY_SIZE * 2,
486 .ivsize = SERPENT_BLOCK_SIZE,
487 .setkey = xts_serpent_setkey,
488 .encrypt = xts_encrypt,
489 .decrypt = xts_decrypt,
493 .cra_name = "ecb(serpent)",
494 .cra_driver_name = "ecb-serpent-sse2",
496 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
497 .cra_blocksize = SERPENT_BLOCK_SIZE,
498 .cra_ctxsize = sizeof(struct async_helper_ctx),
500 .cra_type = &crypto_ablkcipher_type,
501 .cra_module = THIS_MODULE,
502 .cra_init = ablk_init,
503 .cra_exit = ablk_exit,
506 .min_keysize = SERPENT_MIN_KEY_SIZE,
507 .max_keysize = SERPENT_MAX_KEY_SIZE,
508 .setkey = ablk_set_key,
509 .encrypt = ablk_encrypt,
510 .decrypt = ablk_decrypt,
514 .cra_name = "cbc(serpent)",
515 .cra_driver_name = "cbc-serpent-sse2",
517 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
518 .cra_blocksize = SERPENT_BLOCK_SIZE,
519 .cra_ctxsize = sizeof(struct async_helper_ctx),
521 .cra_type = &crypto_ablkcipher_type,
522 .cra_module = THIS_MODULE,
523 .cra_init = ablk_init,
524 .cra_exit = ablk_exit,
527 .min_keysize = SERPENT_MIN_KEY_SIZE,
528 .max_keysize = SERPENT_MAX_KEY_SIZE,
529 .ivsize = SERPENT_BLOCK_SIZE,
530 .setkey = ablk_set_key,
531 .encrypt = __ablk_encrypt,
532 .decrypt = ablk_decrypt,
536 .cra_name = "ctr(serpent)",
537 .cra_driver_name = "ctr-serpent-sse2",
539 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
541 .cra_ctxsize = sizeof(struct async_helper_ctx),
543 .cra_type = &crypto_ablkcipher_type,
544 .cra_module = THIS_MODULE,
545 .cra_init = ablk_init,
546 .cra_exit = ablk_exit,
549 .min_keysize = SERPENT_MIN_KEY_SIZE,
550 .max_keysize = SERPENT_MAX_KEY_SIZE,
551 .ivsize = SERPENT_BLOCK_SIZE,
552 .setkey = ablk_set_key,
553 .encrypt = ablk_encrypt,
554 .decrypt = ablk_encrypt,
559 .cra_name = "lrw(serpent)",
560 .cra_driver_name = "lrw-serpent-sse2",
562 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
563 .cra_blocksize = SERPENT_BLOCK_SIZE,
564 .cra_ctxsize = sizeof(struct async_helper_ctx),
566 .cra_type = &crypto_ablkcipher_type,
567 .cra_module = THIS_MODULE,
568 .cra_init = ablk_init,
569 .cra_exit = ablk_exit,
572 .min_keysize = SERPENT_MIN_KEY_SIZE +
574 .max_keysize = SERPENT_MAX_KEY_SIZE +
576 .ivsize = SERPENT_BLOCK_SIZE,
577 .setkey = ablk_set_key,
578 .encrypt = ablk_encrypt,
579 .decrypt = ablk_decrypt,
583 .cra_name = "xts(serpent)",
584 .cra_driver_name = "xts-serpent-sse2",
586 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
587 .cra_blocksize = SERPENT_BLOCK_SIZE,
588 .cra_ctxsize = sizeof(struct async_helper_ctx),
590 .cra_type = &crypto_ablkcipher_type,
591 .cra_module = THIS_MODULE,
592 .cra_init = ablk_init,
593 .cra_exit = ablk_exit,
596 .min_keysize = SERPENT_MIN_KEY_SIZE * 2,
597 .max_keysize = SERPENT_MAX_KEY_SIZE * 2,
598 .ivsize = SERPENT_BLOCK_SIZE,
599 .setkey = ablk_set_key,
600 .encrypt = ablk_encrypt,
601 .decrypt = ablk_decrypt,
606 static int __init serpent_sse2_init(void)
609 printk(KERN_INFO "SSE2 instructions are not detected.\n");
613 return crypto_register_algs(serpent_algs, ARRAY_SIZE(serpent_algs));
616 static void __exit serpent_sse2_exit(void)
618 crypto_unregister_algs(serpent_algs, ARRAY_SIZE(serpent_algs));
621 module_init(serpent_sse2_init);
622 module_exit(serpent_sse2_exit);
624 MODULE_DESCRIPTION("Serpent Cipher Algorithm, SSE2 optimized");
625 MODULE_LICENSE("GPL");
626 MODULE_ALIAS_CRYPTO("serpent");