18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * Glue Code for AVX assembler versions of Serpent Cipher 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Copyright (C) 2012 Johannes Goetzfried 68c2ecf20Sopenharmony_ci * <Johannes.Goetzfried@informatik.stud.uni-erlangen.de> 78c2ecf20Sopenharmony_ci * 88c2ecf20Sopenharmony_ci * Copyright © 2011-2013 Jussi Kivilinna <jussi.kivilinna@iki.fi> 98c2ecf20Sopenharmony_ci */ 108c2ecf20Sopenharmony_ci 118c2ecf20Sopenharmony_ci#include <linux/module.h> 128c2ecf20Sopenharmony_ci#include <linux/types.h> 138c2ecf20Sopenharmony_ci#include <linux/crypto.h> 148c2ecf20Sopenharmony_ci#include <linux/err.h> 158c2ecf20Sopenharmony_ci#include <crypto/algapi.h> 168c2ecf20Sopenharmony_ci#include <crypto/internal/simd.h> 178c2ecf20Sopenharmony_ci#include <crypto/serpent.h> 188c2ecf20Sopenharmony_ci#include <crypto/xts.h> 198c2ecf20Sopenharmony_ci#include <asm/crypto/glue_helper.h> 208c2ecf20Sopenharmony_ci#include <asm/crypto/serpent-avx.h> 218c2ecf20Sopenharmony_ci 228c2ecf20Sopenharmony_ci/* 8-way parallel cipher functions */ 238c2ecf20Sopenharmony_ciasmlinkage void serpent_ecb_enc_8way_avx(const void *ctx, u8 *dst, 248c2ecf20Sopenharmony_ci const u8 *src); 258c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_ecb_enc_8way_avx); 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_ciasmlinkage void serpent_ecb_dec_8way_avx(const void *ctx, u8 *dst, 288c2ecf20Sopenharmony_ci const u8 *src); 298c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_ecb_dec_8way_avx); 308c2ecf20Sopenharmony_ci 318c2ecf20Sopenharmony_ciasmlinkage void serpent_cbc_dec_8way_avx(const void *ctx, u8 *dst, 328c2ecf20Sopenharmony_ci const u8 *src); 338c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_cbc_dec_8way_avx); 348c2ecf20Sopenharmony_ci 358c2ecf20Sopenharmony_ciasmlinkage void serpent_ctr_8way_avx(const void *ctx, u8 *dst, const u8 *src, 368c2ecf20Sopenharmony_ci le128 *iv); 378c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_ctr_8way_avx); 388c2ecf20Sopenharmony_ci 398c2ecf20Sopenharmony_ciasmlinkage void serpent_xts_enc_8way_avx(const void *ctx, u8 *dst, 408c2ecf20Sopenharmony_ci const u8 *src, le128 *iv); 418c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_xts_enc_8way_avx); 428c2ecf20Sopenharmony_ci 438c2ecf20Sopenharmony_ciasmlinkage void serpent_xts_dec_8way_avx(const void *ctx, u8 *dst, 448c2ecf20Sopenharmony_ci const u8 *src, le128 *iv); 458c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_xts_dec_8way_avx); 468c2ecf20Sopenharmony_ci 478c2ecf20Sopenharmony_civoid __serpent_crypt_ctr(const void *ctx, u8 *d, const u8 *s, le128 *iv) 488c2ecf20Sopenharmony_ci{ 498c2ecf20Sopenharmony_ci be128 ctrblk; 508c2ecf20Sopenharmony_ci u128 *dst = (u128 *)d; 518c2ecf20Sopenharmony_ci const u128 *src = (const u128 *)s; 528c2ecf20Sopenharmony_ci 538c2ecf20Sopenharmony_ci le128_to_be128(&ctrblk, iv); 548c2ecf20Sopenharmony_ci le128_inc(iv); 558c2ecf20Sopenharmony_ci 568c2ecf20Sopenharmony_ci __serpent_encrypt(ctx, (u8 *)&ctrblk, (u8 *)&ctrblk); 578c2ecf20Sopenharmony_ci u128_xor(dst, src, (u128 *)&ctrblk); 588c2ecf20Sopenharmony_ci} 598c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(__serpent_crypt_ctr); 608c2ecf20Sopenharmony_ci 618c2ecf20Sopenharmony_civoid serpent_xts_enc(const void *ctx, u8 *dst, const u8 *src, le128 *iv) 628c2ecf20Sopenharmony_ci{ 638c2ecf20Sopenharmony_ci glue_xts_crypt_128bit_one(ctx, dst, src, iv, __serpent_encrypt); 648c2ecf20Sopenharmony_ci} 658c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_xts_enc); 668c2ecf20Sopenharmony_ci 678c2ecf20Sopenharmony_civoid serpent_xts_dec(const void *ctx, u8 *dst, const u8 *src, le128 *iv) 688c2ecf20Sopenharmony_ci{ 698c2ecf20Sopenharmony_ci glue_xts_crypt_128bit_one(ctx, dst, src, iv, __serpent_decrypt); 708c2ecf20Sopenharmony_ci} 718c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(serpent_xts_dec); 728c2ecf20Sopenharmony_ci 738c2ecf20Sopenharmony_cistatic int serpent_setkey_skcipher(struct crypto_skcipher *tfm, 748c2ecf20Sopenharmony_ci const u8 *key, unsigned int keylen) 758c2ecf20Sopenharmony_ci{ 768c2ecf20Sopenharmony_ci return __serpent_setkey(crypto_skcipher_ctx(tfm), key, keylen); 778c2ecf20Sopenharmony_ci} 788c2ecf20Sopenharmony_ci 798c2ecf20Sopenharmony_ciint xts_serpent_setkey(struct crypto_skcipher *tfm, const u8 *key, 808c2ecf20Sopenharmony_ci unsigned int keylen) 818c2ecf20Sopenharmony_ci{ 828c2ecf20Sopenharmony_ci struct serpent_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 838c2ecf20Sopenharmony_ci int err; 848c2ecf20Sopenharmony_ci 858c2ecf20Sopenharmony_ci err = xts_verify_key(tfm, key, keylen); 868c2ecf20Sopenharmony_ci if (err) 878c2ecf20Sopenharmony_ci return err; 888c2ecf20Sopenharmony_ci 898c2ecf20Sopenharmony_ci /* first half of xts-key is for crypt */ 908c2ecf20Sopenharmony_ci err = __serpent_setkey(&ctx->crypt_ctx, key, keylen / 2); 918c2ecf20Sopenharmony_ci if (err) 928c2ecf20Sopenharmony_ci return err; 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_ci /* second half of xts-key is for tweak */ 958c2ecf20Sopenharmony_ci return __serpent_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2); 968c2ecf20Sopenharmony_ci} 978c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(xts_serpent_setkey); 988c2ecf20Sopenharmony_ci 998c2ecf20Sopenharmony_cistatic const struct common_glue_ctx serpent_enc = { 1008c2ecf20Sopenharmony_ci .num_funcs = 2, 1018c2ecf20Sopenharmony_ci .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS, 1028c2ecf20Sopenharmony_ci 1038c2ecf20Sopenharmony_ci .funcs = { { 1048c2ecf20Sopenharmony_ci .num_blocks = SERPENT_PARALLEL_BLOCKS, 1058c2ecf20Sopenharmony_ci .fn_u = { .ecb = serpent_ecb_enc_8way_avx } 1068c2ecf20Sopenharmony_ci }, { 1078c2ecf20Sopenharmony_ci .num_blocks = 1, 1088c2ecf20Sopenharmony_ci .fn_u = { .ecb = __serpent_encrypt } 1098c2ecf20Sopenharmony_ci } } 1108c2ecf20Sopenharmony_ci}; 1118c2ecf20Sopenharmony_ci 1128c2ecf20Sopenharmony_cistatic const struct common_glue_ctx serpent_ctr = { 1138c2ecf20Sopenharmony_ci .num_funcs = 2, 1148c2ecf20Sopenharmony_ci .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS, 1158c2ecf20Sopenharmony_ci 1168c2ecf20Sopenharmony_ci .funcs = { { 1178c2ecf20Sopenharmony_ci .num_blocks = SERPENT_PARALLEL_BLOCKS, 1188c2ecf20Sopenharmony_ci .fn_u = { .ctr = serpent_ctr_8way_avx } 1198c2ecf20Sopenharmony_ci }, { 1208c2ecf20Sopenharmony_ci .num_blocks = 1, 1218c2ecf20Sopenharmony_ci .fn_u = { .ctr = __serpent_crypt_ctr } 1228c2ecf20Sopenharmony_ci } } 1238c2ecf20Sopenharmony_ci}; 1248c2ecf20Sopenharmony_ci 1258c2ecf20Sopenharmony_cistatic const struct common_glue_ctx serpent_enc_xts = { 1268c2ecf20Sopenharmony_ci .num_funcs = 2, 1278c2ecf20Sopenharmony_ci .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS, 1288c2ecf20Sopenharmony_ci 1298c2ecf20Sopenharmony_ci .funcs = { { 1308c2ecf20Sopenharmony_ci .num_blocks = SERPENT_PARALLEL_BLOCKS, 1318c2ecf20Sopenharmony_ci .fn_u = { .xts = serpent_xts_enc_8way_avx } 1328c2ecf20Sopenharmony_ci }, { 1338c2ecf20Sopenharmony_ci .num_blocks = 1, 1348c2ecf20Sopenharmony_ci .fn_u = { .xts = serpent_xts_enc } 1358c2ecf20Sopenharmony_ci } } 1368c2ecf20Sopenharmony_ci}; 1378c2ecf20Sopenharmony_ci 1388c2ecf20Sopenharmony_cistatic const struct common_glue_ctx serpent_dec = { 1398c2ecf20Sopenharmony_ci .num_funcs = 2, 1408c2ecf20Sopenharmony_ci .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS, 1418c2ecf20Sopenharmony_ci 1428c2ecf20Sopenharmony_ci .funcs = { { 1438c2ecf20Sopenharmony_ci .num_blocks = SERPENT_PARALLEL_BLOCKS, 1448c2ecf20Sopenharmony_ci .fn_u = { .ecb = serpent_ecb_dec_8way_avx } 1458c2ecf20Sopenharmony_ci }, { 1468c2ecf20Sopenharmony_ci .num_blocks = 1, 1478c2ecf20Sopenharmony_ci .fn_u = { .ecb = __serpent_decrypt } 1488c2ecf20Sopenharmony_ci } } 1498c2ecf20Sopenharmony_ci}; 1508c2ecf20Sopenharmony_ci 1518c2ecf20Sopenharmony_cistatic const struct common_glue_ctx serpent_dec_cbc = { 1528c2ecf20Sopenharmony_ci .num_funcs = 2, 1538c2ecf20Sopenharmony_ci .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS, 1548c2ecf20Sopenharmony_ci 1558c2ecf20Sopenharmony_ci .funcs = { { 1568c2ecf20Sopenharmony_ci .num_blocks = SERPENT_PARALLEL_BLOCKS, 1578c2ecf20Sopenharmony_ci .fn_u = { .cbc = serpent_cbc_dec_8way_avx } 1588c2ecf20Sopenharmony_ci }, { 1598c2ecf20Sopenharmony_ci .num_blocks = 1, 1608c2ecf20Sopenharmony_ci .fn_u = { .cbc = __serpent_decrypt } 1618c2ecf20Sopenharmony_ci } } 1628c2ecf20Sopenharmony_ci}; 1638c2ecf20Sopenharmony_ci 1648c2ecf20Sopenharmony_cistatic const struct common_glue_ctx serpent_dec_xts = { 1658c2ecf20Sopenharmony_ci .num_funcs = 2, 1668c2ecf20Sopenharmony_ci .fpu_blocks_limit = SERPENT_PARALLEL_BLOCKS, 1678c2ecf20Sopenharmony_ci 1688c2ecf20Sopenharmony_ci .funcs = { { 1698c2ecf20Sopenharmony_ci .num_blocks = SERPENT_PARALLEL_BLOCKS, 1708c2ecf20Sopenharmony_ci .fn_u = { .xts = serpent_xts_dec_8way_avx } 1718c2ecf20Sopenharmony_ci }, { 1728c2ecf20Sopenharmony_ci .num_blocks = 1, 1738c2ecf20Sopenharmony_ci .fn_u = { .xts = serpent_xts_dec } 1748c2ecf20Sopenharmony_ci } } 1758c2ecf20Sopenharmony_ci}; 1768c2ecf20Sopenharmony_ci 1778c2ecf20Sopenharmony_cistatic int ecb_encrypt(struct skcipher_request *req) 1788c2ecf20Sopenharmony_ci{ 1798c2ecf20Sopenharmony_ci return glue_ecb_req_128bit(&serpent_enc, req); 1808c2ecf20Sopenharmony_ci} 1818c2ecf20Sopenharmony_ci 1828c2ecf20Sopenharmony_cistatic int ecb_decrypt(struct skcipher_request *req) 1838c2ecf20Sopenharmony_ci{ 1848c2ecf20Sopenharmony_ci return glue_ecb_req_128bit(&serpent_dec, req); 1858c2ecf20Sopenharmony_ci} 1868c2ecf20Sopenharmony_ci 1878c2ecf20Sopenharmony_cistatic int cbc_encrypt(struct skcipher_request *req) 1888c2ecf20Sopenharmony_ci{ 1898c2ecf20Sopenharmony_ci return glue_cbc_encrypt_req_128bit(__serpent_encrypt, req); 1908c2ecf20Sopenharmony_ci} 1918c2ecf20Sopenharmony_ci 1928c2ecf20Sopenharmony_cistatic int cbc_decrypt(struct skcipher_request *req) 1938c2ecf20Sopenharmony_ci{ 1948c2ecf20Sopenharmony_ci return glue_cbc_decrypt_req_128bit(&serpent_dec_cbc, req); 1958c2ecf20Sopenharmony_ci} 1968c2ecf20Sopenharmony_ci 1978c2ecf20Sopenharmony_cistatic int ctr_crypt(struct skcipher_request *req) 1988c2ecf20Sopenharmony_ci{ 1998c2ecf20Sopenharmony_ci return glue_ctr_req_128bit(&serpent_ctr, req); 2008c2ecf20Sopenharmony_ci} 2018c2ecf20Sopenharmony_ci 2028c2ecf20Sopenharmony_cistatic int xts_encrypt(struct skcipher_request *req) 2038c2ecf20Sopenharmony_ci{ 2048c2ecf20Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 2058c2ecf20Sopenharmony_ci struct serpent_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 2068c2ecf20Sopenharmony_ci 2078c2ecf20Sopenharmony_ci return glue_xts_req_128bit(&serpent_enc_xts, req, 2088c2ecf20Sopenharmony_ci __serpent_encrypt, &ctx->tweak_ctx, 2098c2ecf20Sopenharmony_ci &ctx->crypt_ctx, false); 2108c2ecf20Sopenharmony_ci} 2118c2ecf20Sopenharmony_ci 2128c2ecf20Sopenharmony_cistatic int xts_decrypt(struct skcipher_request *req) 2138c2ecf20Sopenharmony_ci{ 2148c2ecf20Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 2158c2ecf20Sopenharmony_ci struct serpent_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 2168c2ecf20Sopenharmony_ci 2178c2ecf20Sopenharmony_ci return glue_xts_req_128bit(&serpent_dec_xts, req, 2188c2ecf20Sopenharmony_ci __serpent_encrypt, &ctx->tweak_ctx, 2198c2ecf20Sopenharmony_ci &ctx->crypt_ctx, true); 2208c2ecf20Sopenharmony_ci} 2218c2ecf20Sopenharmony_ci 2228c2ecf20Sopenharmony_cistatic struct skcipher_alg serpent_algs[] = { 2238c2ecf20Sopenharmony_ci { 2248c2ecf20Sopenharmony_ci .base.cra_name = "__ecb(serpent)", 2258c2ecf20Sopenharmony_ci .base.cra_driver_name = "__ecb-serpent-avx", 2268c2ecf20Sopenharmony_ci .base.cra_priority = 500, 2278c2ecf20Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_INTERNAL, 2288c2ecf20Sopenharmony_ci .base.cra_blocksize = SERPENT_BLOCK_SIZE, 2298c2ecf20Sopenharmony_ci .base.cra_ctxsize = sizeof(struct serpent_ctx), 2308c2ecf20Sopenharmony_ci .base.cra_module = THIS_MODULE, 2318c2ecf20Sopenharmony_ci .min_keysize = SERPENT_MIN_KEY_SIZE, 2328c2ecf20Sopenharmony_ci .max_keysize = SERPENT_MAX_KEY_SIZE, 2338c2ecf20Sopenharmony_ci .setkey = serpent_setkey_skcipher, 2348c2ecf20Sopenharmony_ci .encrypt = ecb_encrypt, 2358c2ecf20Sopenharmony_ci .decrypt = ecb_decrypt, 2368c2ecf20Sopenharmony_ci }, { 2378c2ecf20Sopenharmony_ci .base.cra_name = "__cbc(serpent)", 2388c2ecf20Sopenharmony_ci .base.cra_driver_name = "__cbc-serpent-avx", 2398c2ecf20Sopenharmony_ci .base.cra_priority = 500, 2408c2ecf20Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_INTERNAL, 2418c2ecf20Sopenharmony_ci .base.cra_blocksize = SERPENT_BLOCK_SIZE, 2428c2ecf20Sopenharmony_ci .base.cra_ctxsize = sizeof(struct serpent_ctx), 2438c2ecf20Sopenharmony_ci .base.cra_module = THIS_MODULE, 2448c2ecf20Sopenharmony_ci .min_keysize = SERPENT_MIN_KEY_SIZE, 2458c2ecf20Sopenharmony_ci .max_keysize = SERPENT_MAX_KEY_SIZE, 2468c2ecf20Sopenharmony_ci .ivsize = SERPENT_BLOCK_SIZE, 2478c2ecf20Sopenharmony_ci .setkey = serpent_setkey_skcipher, 2488c2ecf20Sopenharmony_ci .encrypt = cbc_encrypt, 2498c2ecf20Sopenharmony_ci .decrypt = cbc_decrypt, 2508c2ecf20Sopenharmony_ci }, { 2518c2ecf20Sopenharmony_ci .base.cra_name = "__ctr(serpent)", 2528c2ecf20Sopenharmony_ci .base.cra_driver_name = "__ctr-serpent-avx", 2538c2ecf20Sopenharmony_ci .base.cra_priority = 500, 2548c2ecf20Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_INTERNAL, 2558c2ecf20Sopenharmony_ci .base.cra_blocksize = 1, 2568c2ecf20Sopenharmony_ci .base.cra_ctxsize = sizeof(struct serpent_ctx), 2578c2ecf20Sopenharmony_ci .base.cra_module = THIS_MODULE, 2588c2ecf20Sopenharmony_ci .min_keysize = SERPENT_MIN_KEY_SIZE, 2598c2ecf20Sopenharmony_ci .max_keysize = SERPENT_MAX_KEY_SIZE, 2608c2ecf20Sopenharmony_ci .ivsize = SERPENT_BLOCK_SIZE, 2618c2ecf20Sopenharmony_ci .chunksize = SERPENT_BLOCK_SIZE, 2628c2ecf20Sopenharmony_ci .setkey = serpent_setkey_skcipher, 2638c2ecf20Sopenharmony_ci .encrypt = ctr_crypt, 2648c2ecf20Sopenharmony_ci .decrypt = ctr_crypt, 2658c2ecf20Sopenharmony_ci }, { 2668c2ecf20Sopenharmony_ci .base.cra_name = "__xts(serpent)", 2678c2ecf20Sopenharmony_ci .base.cra_driver_name = "__xts-serpent-avx", 2688c2ecf20Sopenharmony_ci .base.cra_priority = 500, 2698c2ecf20Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_INTERNAL, 2708c2ecf20Sopenharmony_ci .base.cra_blocksize = SERPENT_BLOCK_SIZE, 2718c2ecf20Sopenharmony_ci .base.cra_ctxsize = sizeof(struct serpent_xts_ctx), 2728c2ecf20Sopenharmony_ci .base.cra_module = THIS_MODULE, 2738c2ecf20Sopenharmony_ci .min_keysize = 2 * SERPENT_MIN_KEY_SIZE, 2748c2ecf20Sopenharmony_ci .max_keysize = 2 * SERPENT_MAX_KEY_SIZE, 2758c2ecf20Sopenharmony_ci .ivsize = SERPENT_BLOCK_SIZE, 2768c2ecf20Sopenharmony_ci .setkey = xts_serpent_setkey, 2778c2ecf20Sopenharmony_ci .encrypt = xts_encrypt, 2788c2ecf20Sopenharmony_ci .decrypt = xts_decrypt, 2798c2ecf20Sopenharmony_ci }, 2808c2ecf20Sopenharmony_ci}; 2818c2ecf20Sopenharmony_ci 2828c2ecf20Sopenharmony_cistatic struct simd_skcipher_alg *serpent_simd_algs[ARRAY_SIZE(serpent_algs)]; 2838c2ecf20Sopenharmony_ci 2848c2ecf20Sopenharmony_cistatic int __init serpent_init(void) 2858c2ecf20Sopenharmony_ci{ 2868c2ecf20Sopenharmony_ci const char *feature_name; 2878c2ecf20Sopenharmony_ci 2888c2ecf20Sopenharmony_ci if (!cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM, 2898c2ecf20Sopenharmony_ci &feature_name)) { 2908c2ecf20Sopenharmony_ci pr_info("CPU feature '%s' is not supported.\n", feature_name); 2918c2ecf20Sopenharmony_ci return -ENODEV; 2928c2ecf20Sopenharmony_ci } 2938c2ecf20Sopenharmony_ci 2948c2ecf20Sopenharmony_ci return simd_register_skciphers_compat(serpent_algs, 2958c2ecf20Sopenharmony_ci ARRAY_SIZE(serpent_algs), 2968c2ecf20Sopenharmony_ci serpent_simd_algs); 2978c2ecf20Sopenharmony_ci} 2988c2ecf20Sopenharmony_ci 2998c2ecf20Sopenharmony_cistatic void __exit serpent_exit(void) 3008c2ecf20Sopenharmony_ci{ 3018c2ecf20Sopenharmony_ci simd_unregister_skciphers(serpent_algs, ARRAY_SIZE(serpent_algs), 3028c2ecf20Sopenharmony_ci serpent_simd_algs); 3038c2ecf20Sopenharmony_ci} 3048c2ecf20Sopenharmony_ci 3058c2ecf20Sopenharmony_cimodule_init(serpent_init); 3068c2ecf20Sopenharmony_cimodule_exit(serpent_exit); 3078c2ecf20Sopenharmony_ci 3088c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("Serpent Cipher Algorithm, AVX optimized"); 3098c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 3108c2ecf20Sopenharmony_ciMODULE_ALIAS_CRYPTO("serpent"); 311