Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2)  * Salsa20: Salsa20 stream cipher algorithm
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4)  * Copyright (c) 2007 Tan Swee Heng <thesweeheng@gmail.com>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6)  * Derived from:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7)  * - salsa20.c: Public domain C code by Daniel J. Bernstein <djb@cr.yp.to>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9)  * Salsa20 is a stream cipher candidate in eSTREAM, the ECRYPT Stream
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10)  * Cipher Project. It is designed by Daniel J. Bernstein <djb@cr.yp.to>.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11)  * More information about eSTREAM and Salsa20 can be found here:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12)  *   https://www.ecrypt.eu.org/stream/
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13)  *   https://cr.yp.to/snuffle.html
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15)  * This program is free software; you can redistribute it and/or modify it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16)  * under the terms of the GNU General Public License as published by the Free
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17)  * Software Foundation; either version 2 of the License, or (at your option)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18)  * any later version.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) #include <asm/unaligned.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23) #include <crypto/internal/skcipher.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26) #define SALSA20_IV_SIZE        8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) #define SALSA20_MIN_KEY_SIZE  16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) #define SALSA20_MAX_KEY_SIZE  32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) #define SALSA20_BLOCK_SIZE    64
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) struct salsa20_ctx {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) 	u32 initial_state[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) static void salsa20_block(u32 *state, __le32 *stream)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) 	u32 x[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 	memcpy(x, state, sizeof(x));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) 	for (i = 0; i < 20; i += 2) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) 		x[ 4] ^= rol32((x[ 0] + x[12]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 		x[ 8] ^= rol32((x[ 4] + x[ 0]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) 		x[12] ^= rol32((x[ 8] + x[ 4]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) 		x[ 0] ^= rol32((x[12] + x[ 8]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) 		x[ 9] ^= rol32((x[ 5] + x[ 1]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 		x[13] ^= rol32((x[ 9] + x[ 5]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) 		x[ 1] ^= rol32((x[13] + x[ 9]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) 		x[ 5] ^= rol32((x[ 1] + x[13]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) 		x[14] ^= rol32((x[10] + x[ 6]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) 		x[ 2] ^= rol32((x[14] + x[10]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) 		x[ 6] ^= rol32((x[ 2] + x[14]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) 		x[10] ^= rol32((x[ 6] + x[ 2]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) 		x[ 3] ^= rol32((x[15] + x[11]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) 		x[ 7] ^= rol32((x[ 3] + x[15]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) 		x[11] ^= rol32((x[ 7] + x[ 3]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) 		x[15] ^= rol32((x[11] + x[ 7]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59) 		x[ 1] ^= rol32((x[ 0] + x[ 3]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60) 		x[ 2] ^= rol32((x[ 1] + x[ 0]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) 		x[ 3] ^= rol32((x[ 2] + x[ 1]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) 		x[ 0] ^= rol32((x[ 3] + x[ 2]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 		x[ 6] ^= rol32((x[ 5] + x[ 4]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) 		x[ 7] ^= rol32((x[ 6] + x[ 5]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) 		x[ 4] ^= rol32((x[ 7] + x[ 6]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) 		x[ 5] ^= rol32((x[ 4] + x[ 7]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) 		x[11] ^= rol32((x[10] + x[ 9]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) 		x[ 8] ^= rol32((x[11] + x[10]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69) 		x[ 9] ^= rol32((x[ 8] + x[11]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70) 		x[10] ^= rol32((x[ 9] + x[ 8]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71) 		x[12] ^= rol32((x[15] + x[14]),  7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72) 		x[13] ^= rol32((x[12] + x[15]),  9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) 		x[14] ^= rol32((x[13] + x[12]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) 		x[15] ^= rol32((x[14] + x[13]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 	for (i = 0; i < 16; i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) 		stream[i] = cpu_to_le32(x[i] + state[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80) 	if (++state[8] == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) 		state[9]++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) static void salsa20_docrypt(u32 *state, u8 *dst, const u8 *src,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) 			    unsigned int bytes)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 	__le32 stream[SALSA20_BLOCK_SIZE / sizeof(__le32)];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) 	while (bytes >= SALSA20_BLOCK_SIZE) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) 		salsa20_block(state, stream);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) 		crypto_xor_cpy(dst, src, (const u8 *)stream,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) 			       SALSA20_BLOCK_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) 		bytes -= SALSA20_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) 		dst += SALSA20_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) 		src += SALSA20_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) 	if (bytes) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) 		salsa20_block(state, stream);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) 		crypto_xor_cpy(dst, src, (const u8 *)stream, bytes);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) static void salsa20_init(u32 *state, const struct salsa20_ctx *ctx,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) 			 const u8 *iv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) 	memcpy(state, ctx->initial_state, sizeof(ctx->initial_state));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) 	state[6] = get_unaligned_le32(iv + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) 	state[7] = get_unaligned_le32(iv + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) static int salsa20_setkey(struct crypto_skcipher *tfm, const u8 *key,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 			  unsigned int keysize)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) 	static const char sigma[16] = "expand 32-byte k";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) 	static const char tau[16] = "expand 16-byte k";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) 	struct salsa20_ctx *ctx = crypto_skcipher_ctx(tfm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) 	const char *constants;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) 	if (keysize != SALSA20_MIN_KEY_SIZE &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) 	    keysize != SALSA20_MAX_KEY_SIZE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) 	ctx->initial_state[1] = get_unaligned_le32(key + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) 	ctx->initial_state[2] = get_unaligned_le32(key + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) 	ctx->initial_state[3] = get_unaligned_le32(key + 8);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) 	ctx->initial_state[4] = get_unaligned_le32(key + 12);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) 	if (keysize == 32) { /* recommended */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) 		key += 16;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) 		constants = sigma;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) 	} else { /* keysize == 16 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) 		constants = tau;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) 	ctx->initial_state[11] = get_unaligned_le32(key + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) 	ctx->initial_state[12] = get_unaligned_le32(key + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) 	ctx->initial_state[13] = get_unaligned_le32(key + 8);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) 	ctx->initial_state[14] = get_unaligned_le32(key + 12);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) 	ctx->initial_state[0]  = get_unaligned_le32(constants + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) 	ctx->initial_state[5]  = get_unaligned_le32(constants + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) 	ctx->initial_state[10] = get_unaligned_le32(constants + 8);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) 	ctx->initial_state[15] = get_unaligned_le32(constants + 12);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) 	/* space for the nonce; it will be overridden for each request */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) 	ctx->initial_state[6] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) 	ctx->initial_state[7] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) 	/* initial block number */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) 	ctx->initial_state[8] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) 	ctx->initial_state[9] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) static int salsa20_crypt(struct skcipher_request *req)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) 	const struct salsa20_ctx *ctx = crypto_skcipher_ctx(tfm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) 	struct skcipher_walk walk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) 	u32 state[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) 	int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) 	err = skcipher_walk_virt(&walk, req, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) 	salsa20_init(state, ctx, req->iv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) 	while (walk.nbytes > 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) 		unsigned int nbytes = walk.nbytes;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) 		if (nbytes < walk.total)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) 			nbytes = round_down(nbytes, walk.stride);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) 		salsa20_docrypt(state, walk.dst.virt.addr, walk.src.virt.addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) 				nbytes);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) 	return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) static struct skcipher_alg alg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) 	.base.cra_name		= "salsa20",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) 	.base.cra_driver_name	= "salsa20-generic",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) 	.base.cra_priority	= 100,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) 	.base.cra_blocksize	= 1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) 	.base.cra_ctxsize	= sizeof(struct salsa20_ctx),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) 	.base.cra_module	= THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) 	.min_keysize		= SALSA20_MIN_KEY_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) 	.max_keysize		= SALSA20_MAX_KEY_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) 	.ivsize			= SALSA20_IV_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) 	.chunksize		= SALSA20_BLOCK_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) 	.setkey			= salsa20_setkey,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) 	.encrypt		= salsa20_crypt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) 	.decrypt		= salsa20_crypt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) static int __init salsa20_generic_mod_init(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) 	return crypto_register_skcipher(&alg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) static void __exit salsa20_generic_mod_fini(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) 	crypto_unregister_skcipher(&alg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) subsys_initcall(salsa20_generic_mod_init);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) module_exit(salsa20_generic_mod_fini);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) MODULE_LICENSE("GPL");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) MODULE_ALIAS_CRYPTO("salsa20");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) MODULE_ALIAS_CRYPTO("salsa20-generic");