From patchwork Wed Apr 25 12:20:45 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 134265 Delivered-To: patch@linaro.org Received: by 10.46.151.6 with SMTP id r6csp791096lji; Wed, 25 Apr 2018 05:21:05 -0700 (PDT) X-Google-Smtp-Source: AB8JxZo+Z8wnjOTUcCGK4umg8w+rkesLDZAjuyQbJNp+oEleOJPNJK+uG/5yCLaMtUoedI1Zdak3 X-Received: by 2002:a17:902:bc49:: with SMTP id t9-v6mr2249896plz.109.1524658865134; Wed, 25 Apr 2018 05:21:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524658865; cv=none; d=google.com; s=arc-20160816; b=nG76r6cLmldpuF66K3uF2HLeauAjLH6FK2a5hzSVtlnjH14j8EWom/0JcJh3oodWiq rfA1ShBiPCklexsPfyTjoskgje61j426jwXUjxeaZdC4GxG833nYvv72CXsfOIrldPKG oCWE6GXeT2GWNoa0XH/XAaM0jh2/ZsC42D0tFJMqn4kApsXoBDwauVcHzHNSQaq793HG qQO8/PmA1XRWqnTe97iqwoWKtBs45Q8FI1Ubs6tGg75wZ/vif9svZo1BWUNfBDBgS1Yc GlqyY7nL15VVXgWTJntkthb/d0gy2dNvab2pW/yZNWPNGEOYnYmbFH7O563XBmf2QOys RTZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=Xc7NY9Uc9eo541OfTsGH6pWtJ9Yq4jeY7rNGh8wSzzA=; b=U+GUjceeQV8h6Z8LagC/DazqNL18eyJDqO0JbSral9aO5d98nag3Kgxqk8UrKxtRJR cyTJiQ7jnzTeqjGH1c3gHjVk5SPacuroSF96qPdGazT66QujX2evGwo2UN41VkbrbRPE AfxyBd/QJMjNw9orUr7CWrRJmvDtGOt245/NebBtVPhVdnvhk8Eonku7VnqWeJLskcjv 1uSh2MOYsjr13KWZll2CX4m/nkUcnP3B65TPiPWaYWqW3xvfaw6L9hwN4DzXH4rAo3jc zZ1Q3Xdw7cURHWvV34A4NP19+lCwA+z2FT0MW4HuZgQZtDt0MVbtmkvua6MKCQBAB8s7 SNzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=aaC64Nj9; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g15si13254377pgf.541.2018.04.25.05.21.04; Wed, 25 Apr 2018 05:21:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=aaC64Nj9; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752700AbeDYMVD (ORCPT + 1 other); Wed, 25 Apr 2018 08:21:03 -0400 Received: from mail-wm0-f65.google.com ([74.125.82.65]:52703 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753098AbeDYMU7 (ORCPT ); Wed, 25 Apr 2018 08:20:59 -0400 Received: by mail-wm0-f65.google.com with SMTP id w195so6812508wmw.2 for ; Wed, 25 Apr 2018 05:20:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=Xc7NY9Uc9eo541OfTsGH6pWtJ9Yq4jeY7rNGh8wSzzA=; b=aaC64Nj9NXKRvH/L2xwr4B0g9jI9jMt03y9XuwXm5UmBdAhKMFZjapALC012PUq5vt nCXW4qnsXcEFLAOX4ELuuwhRA2KK8IjO1CG3z1qC20QZm1+cXOhwKPh+P8/ANMYqOCfY GqamPhtFFS0Fn7yybGZSLLvZ9O5Zm2UbE+2Hk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=Xc7NY9Uc9eo541OfTsGH6pWtJ9Yq4jeY7rNGh8wSzzA=; b=nCG2lcjjzSXJ29URA0qCehGN8L4PNAKY8SU/W8u8KD3J601xDDHRZgsAXdlmucNsof dKLN+RPe2xeTa5HAYJeY0YO+fSq/J5qhBPRq5Q4SCsUEoZRBbzsXSlCaQc8PyuBiUO17 RS2hrbBmKxqP5kjngsFR3II8GlFa6XKcAcgqEjMUsqmvjbxYO7dzKopXORrDm8Vdwh3W i/ItghvD+ziRQLTzKq4inDIX2fMFmBTb6loFX8rkr9W8jQpCSCLld7Tt46Atx3yO0m7Z ylpYZokQjHMSCiuOMNjhvLcoahBiKqUsIxieL0KZHkyxXd3CkKxYCDrVPWt0aADLX+yZ AWVw== X-Gm-Message-State: ALQs6tDEaVkN6UnckSiWQ/AN2P/mUMcMkpqgcf97H1iONS2E3DvaBBAi /Zz2awBAIcnso9CMWBSwaf/KIJMyWpQ= X-Received: by 10.28.141.138 with SMTP id p132mr1517021wmd.49.1524658858064; Wed, 25 Apr 2018 05:20:58 -0700 (PDT) Received: from localhost.localdomain ([2a01:e35:3995:5470:200:1aff:fe1b:b328]) by smtp.gmail.com with ESMTPSA id s14sm13073572wmb.5.2018.04.25.05.20.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Apr 2018 05:20:57 -0700 (PDT) From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, herbert@gondor.apana.org.au, gilad@benyossef.com, Ard Biesheuvel Subject: [PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers Date: Wed, 25 Apr 2018 14:20:45 +0200 Message-Id: <20180425122046.12695-2-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180425122046.12695-1-ard.biesheuvel@linaro.org> References: <20180425122046.12695-1-ard.biesheuvel@linaro.org> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org In preparation of adding support for the SIMD based arm64 implementation of arm64, which requires a fallback to non-SIMD code when invoked in certain contexts, expose the generic SM4 encrypt and decrypt routines to other drivers. Signed-off-by: Ard Biesheuvel --- crypto/sm4_generic.c | 10 ++++++---- include/crypto/sm4.h | 3 +++ 2 files changed, 9 insertions(+), 4 deletions(-) -- 2.17.0 Acked-by: Gilad Ben-Yossef diff --git a/crypto/sm4_generic.c b/crypto/sm4_generic.c index f537a2766c55..c18eebfd5edd 100644 --- a/crypto/sm4_generic.c +++ b/crypto/sm4_generic.c @@ -190,21 +190,23 @@ static void sm4_do_crypt(const u32 *rk, u32 *out, const u32 *in) /* encrypt a block of text */ -static void sm4_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) +void crypto_sm4_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) { const struct crypto_sm4_ctx *ctx = crypto_tfm_ctx(tfm); sm4_do_crypt(ctx->rkey_enc, (u32 *)out, (u32 *)in); } +EXPORT_SYMBOL_GPL(crypto_sm4_encrypt); /* decrypt a block of text */ -static void sm4_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) +void crypto_sm4_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) { const struct crypto_sm4_ctx *ctx = crypto_tfm_ctx(tfm); sm4_do_crypt(ctx->rkey_dec, (u32 *)out, (u32 *)in); } +EXPORT_SYMBOL_GPL(crypto_sm4_decrypt); static struct crypto_alg sm4_alg = { .cra_name = "sm4", @@ -219,8 +221,8 @@ static struct crypto_alg sm4_alg = { .cia_min_keysize = SM4_KEY_SIZE, .cia_max_keysize = SM4_KEY_SIZE, .cia_setkey = crypto_sm4_set_key, - .cia_encrypt = sm4_encrypt, - .cia_decrypt = sm4_decrypt + .cia_encrypt = crypto_sm4_encrypt, + .cia_decrypt = crypto_sm4_decrypt } } }; diff --git a/include/crypto/sm4.h b/include/crypto/sm4.h index b64e64d20b28..7afd730d16ff 100644 --- a/include/crypto/sm4.h +++ b/include/crypto/sm4.h @@ -25,4 +25,7 @@ int crypto_sm4_set_key(struct crypto_tfm *tfm, const u8 *in_key, int crypto_sm4_expand_key(struct crypto_sm4_ctx *ctx, const u8 *in_key, unsigned int key_len); +void crypto_sm4_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in); +void crypto_sm4_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in); + #endif From patchwork Wed Apr 25 12:20:46 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 134267 Delivered-To: patch@linaro.org Received: by 10.46.151.6 with SMTP id r6csp791196lji; Wed, 25 Apr 2018 05:21:10 -0700 (PDT) X-Google-Smtp-Source: AIpwx48ZTlIEDvfuwFqyU7adcClxpI7DTShQx6/ZCASAiUF+UDd1cq/o/sk57JtDnBHMx94QVVE5 X-Received: by 10.98.138.210 with SMTP id o79mr24536130pfk.89.1524658870588; Wed, 25 Apr 2018 05:21:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524658870; cv=none; d=google.com; s=arc-20160816; b=MF4fTJrHgQa7n0K+x2HcPfXvZYTDmhWuNDIdfyN7l+1/rQcYVrPeLd4DS61ctv0oHY gYsML66ZRt8OSjD6sBVVj9ZkbjU+XzpLhId0mMJ4BAmI2yD6IkyiLPDp1giPhqjp31sD CzV1SGODC7N0pGJqfJYlui/tGN0VO/ZT+0I7DlBS+tIPn7CvVn3vuKmGv5FXip5/w/24 25t6JRuPOLygVv/nKWbfDFFqkFisdlH/z/rglQpGEX+1nYKr1RjFYcqPk799b7GhU25/ 0bMlrtf2f4EjXaPivMpjsdKxqSTQSr4k7prWauQbEZ4jsV4oChbOoXOdpBgGhOOsg/5t mjtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=9RE/uvXvcerLd9sxEPNOb3OfCjz1ATjAIcohc0iVVNQ=; b=THXnTBK55Cn67PbHEHmIaPGnBnVYNV0xq0xRL/XQeVE73YAjGyHL9Of4kwnIm7QkzW tp7dFm/hyAR/CbhTBKWUst8gTwfrvZYk5BsUTl+9SKE08gKOnZC8uDg3h4mVxyAuxKzM NColup7P2DSrgerV9NuNjhhxEwtNuMZPB4KLGyaAesFIhhvPzleO98aEZfpjkRV7yOkw Rb3Qk972NbhdxwtIoRy51kcScWFAbdqfLa5NltRBwxufCI9Tom+nObUyBs9vhQNhtzjq jh60IQnNWbViNuI1crEg+P99gner6B3dktNj8ow9bjboxXZaWpJG04WPN9z9JOV+jcZU BfVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=HqMCvHI/; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g15si13254377pgf.541.2018.04.25.05.21.10; Wed, 25 Apr 2018 05:21:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=HqMCvHI/; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753041AbeDYMVI (ORCPT + 1 other); Wed, 25 Apr 2018 08:21:08 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:34113 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753253AbeDYMVB (ORCPT ); Wed, 25 Apr 2018 08:21:01 -0400 Received: by mail-wm0-f66.google.com with SMTP id w2so4361055wmw.1 for ; Wed, 25 Apr 2018 05:21:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=9RE/uvXvcerLd9sxEPNOb3OfCjz1ATjAIcohc0iVVNQ=; b=HqMCvHI/ngswWXAqPmfSPPNtJd287P24qbUXHDWGN2/PbvQlUmirofDhlUKLXcIYZ/ K9sWy1ZjkTKl9U6sny5Jm1zWbcgL/apCBltMORIklnU0nQDx9fc+WtXaQB03r28ywzbS 6OXyYsoKBZ0+TTQj8/lO2X6Poxp0Z9oBFyszc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=9RE/uvXvcerLd9sxEPNOb3OfCjz1ATjAIcohc0iVVNQ=; b=W08vWqH1z+OrbtrM9c7Q9a2zvORLE2LRdFS6Yt52YquvGeWC0+zNhdXgDvQgqFTVz0 E3GusjYHsHE8IuPXPd55mg0LECKmFsT74iam6ubcdWlPryZWkZUotY+A2Ak+vN2Kn9am zrvylPYikc2dWbZQwoEqs3zzeyP5pGSAXpHaAT8f/siVMsEqskZRiVaDjCJsV/YN7qk7 tT4NFTV6/w3r5uV65KMSPMQ4wj9nSzUBGPpl2eboy7u0YoD4u7NEso/sGzXAg+3UXjQ7 7L62vJ8MOcDktpHTYQomr2mjEqDGd1XGFw8Q0FXwDH/O1CXfxTepPbkzlBmIUiKtpU2m rrug== X-Gm-Message-State: ALQs6tBPQKx1gO+h6Y0hMPe3P94K6uhtC33yKG6yUgzeZZkWfAyVJRs5 mBPZIYcJXXviusf7AOru2hmgfqDK+iQ= X-Received: by 10.28.71.13 with SMTP id u13mr3938272wma.56.1524658860160; Wed, 25 Apr 2018 05:21:00 -0700 (PDT) Received: from localhost.localdomain ([2a01:e35:3995:5470:200:1aff:fe1b:b328]) by smtp.gmail.com with ESMTPSA id s14sm13073572wmb.5.2018.04.25.05.20.58 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Apr 2018 05:20:59 -0700 (PDT) From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, herbert@gondor.apana.org.au, gilad@benyossef.com, Ard Biesheuvel Subject: [PATCH 2/2] crypto: arm64 - add support for SM4 encryption using special instructions Date: Wed, 25 Apr 2018 14:20:46 +0200 Message-Id: <20180425122046.12695-3-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180425122046.12695-1-ard.biesheuvel@linaro.org> References: <20180425122046.12695-1-ard.biesheuvel@linaro.org> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add support for the SM4 symmetric cipher implemented using the special SM4 instructions introduced in ARM architecture revision 8.2. Signed-off-by: Ard Biesheuvel --- arch/arm64/crypto/Kconfig | 6 ++ arch/arm64/crypto/Makefile | 3 + arch/arm64/crypto/sm4-ce-core.S | 36 ++++++++++ arch/arm64/crypto/sm4-ce-glue.c | 73 ++++++++++++++++++++ 4 files changed, 118 insertions(+) -- 2.17.0 diff --git a/arch/arm64/crypto/Kconfig b/arch/arm64/crypto/Kconfig index cb5a243110c4..e3fdb0fd6f70 100644 --- a/arch/arm64/crypto/Kconfig +++ b/arch/arm64/crypto/Kconfig @@ -47,6 +47,12 @@ config CRYPTO_SM3_ARM64_CE select CRYPTO_HASH select CRYPTO_SM3 +config CRYPTO_SM4_ARM64_CE + tristate "SM4 symmetric cipher (ARMv8.2 Crypto Extensions)" + depends on KERNEL_MODE_NEON + select CRYPTO_ALGAPI + select CRYPTO_SM4 + config CRYPTO_GHASH_ARM64_CE tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions" depends on KERNEL_MODE_NEON diff --git a/arch/arm64/crypto/Makefile b/arch/arm64/crypto/Makefile index f35ac684b1c0..bcafd016618e 100644 --- a/arch/arm64/crypto/Makefile +++ b/arch/arm64/crypto/Makefile @@ -23,6 +23,9 @@ sha3-ce-y := sha3-ce-glue.o sha3-ce-core.o obj-$(CONFIG_CRYPTO_SM3_ARM64_CE) += sm3-ce.o sm3-ce-y := sm3-ce-glue.o sm3-ce-core.o +obj-$(CONFIG_CRYPTO_SM4_ARM64_CE) += sm4-ce.o +sm4-ce-y := sm4-ce-glue.o sm4-ce-core.o + obj-$(CONFIG_CRYPTO_GHASH_ARM64_CE) += ghash-ce.o ghash-ce-y := ghash-ce-glue.o ghash-ce-core.o diff --git a/arch/arm64/crypto/sm4-ce-core.S b/arch/arm64/crypto/sm4-ce-core.S new file mode 100644 index 000000000000..af3bfbc3f4d4 --- /dev/null +++ b/arch/arm64/crypto/sm4-ce-core.S @@ -0,0 +1,36 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include + + .irp b, 0, 1, 2, 3, 4, 5, 6, 7, 8 + .set .Lv\b\().4s, \b + .endr + + .macro sm4e, rd, rn + .inst 0xcec08400 | .L\rd | (.L\rn << 5) + .endm + + /* + * void sm4_ce_do_crypt(const u32 *rk, u32 *out, const u32 *in); + */ + .text +ENTRY(sm4_ce_do_crypt) + ld1 {v8.4s}, [x2] + ld1 {v0.4s-v3.4s}, [x0], #64 +CPU_LE( rev32 v8.16b, v8.16b ) + ld1 {v4.4s-v7.4s}, [x0] + sm4e v8.4s, v0.4s + sm4e v8.4s, v1.4s + sm4e v8.4s, v2.4s + sm4e v8.4s, v3.4s + sm4e v8.4s, v4.4s + sm4e v8.4s, v5.4s + sm4e v8.4s, v6.4s + sm4e v8.4s, v7.4s + rev64 v8.4s, v8.4s + ext v8.16b, v8.16b, v8.16b, #8 +CPU_LE( rev32 v8.16b, v8.16b ) + st1 {v8.4s}, [x1] + ret +ENDPROC(sm4_ce_do_crypt) diff --git a/arch/arm64/crypto/sm4-ce-glue.c b/arch/arm64/crypto/sm4-ce-glue.c new file mode 100644 index 000000000000..b7fb5274b250 --- /dev/null +++ b/arch/arm64/crypto/sm4-ce-glue.c @@ -0,0 +1,73 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include +#include +#include +#include +#include +#include + +MODULE_ALIAS_CRYPTO("sm4"); +MODULE_ALIAS_CRYPTO("sm4-ce"); +MODULE_DESCRIPTION("SM4 symmetric cipher using ARMv8 Crypto Extensions"); +MODULE_AUTHOR("Ard Biesheuvel "); +MODULE_LICENSE("GPL v2"); + +asmlinkage void sm4_ce_do_crypt(const u32 *rk, void *out, const void *in); + +static void sm4_ce_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) +{ + const struct crypto_sm4_ctx *ctx = crypto_tfm_ctx(tfm); + + if (!may_use_simd()) { + crypto_sm4_encrypt(tfm, out, in); + } else { + kernel_neon_begin(); + sm4_ce_do_crypt(ctx->rkey_enc, out, in); + kernel_neon_end(); + } +} + +static void sm4_ce_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) +{ + const struct crypto_sm4_ctx *ctx = crypto_tfm_ctx(tfm); + + if (!may_use_simd()) { + crypto_sm4_decrypt(tfm, out, in); + } else { + kernel_neon_begin(); + sm4_ce_do_crypt(ctx->rkey_dec, out, in); + kernel_neon_end(); + } +} + +static struct crypto_alg sm4_ce_alg = { + .cra_name = "sm4", + .cra_driver_name = "sm4-ce", + .cra_priority = 200, + .cra_flags = CRYPTO_ALG_TYPE_CIPHER, + .cra_blocksize = SM4_BLOCK_SIZE, + .cra_ctxsize = sizeof(struct crypto_sm4_ctx), + .cra_module = THIS_MODULE, + .cra_u.cipher = { + .cia_min_keysize = SM4_KEY_SIZE, + .cia_max_keysize = SM4_KEY_SIZE, + .cia_setkey = crypto_sm4_set_key, + .cia_encrypt = sm4_ce_encrypt, + .cia_decrypt = sm4_ce_decrypt + } +}; + +static int __init sm4_ce_mod_init(void) +{ + return crypto_register_alg(&sm4_ce_alg); +} + +static void __exit sm4_ce_mod_fini(void) +{ + crypto_unregister_alg(&sm4_ce_alg); +} + +module_cpu_feature_match(SM3, sm4_ce_mod_init); +module_exit(sm4_ce_mod_fini);