^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) * Salsa20: Salsa20 stream cipher algorithm
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) * Copyright (c) 2007 Tan Swee Heng <thesweeheng@gmail.com>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) * Derived from:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * - salsa20.c: Public domain C code by Daniel J. Bernstein <djb@cr.yp.to>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) * Salsa20 is a stream cipher candidate in eSTREAM, the ECRYPT Stream
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) * Cipher Project. It is designed by Daniel J. Bernstein <djb@cr.yp.to>.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) * More information about eSTREAM and Salsa20 can be found here:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) * https://www.ecrypt.eu.org/stream/
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) * https://cr.yp.to/snuffle.html
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) * This program is free software; you can redistribute it and/or modify it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) * under the terms of the GNU General Public License as published by the Free
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) * Software Foundation; either version 2 of the License, or (at your option)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) * any later version.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) #include <asm/unaligned.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #include <crypto/internal/skcipher.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) #define SALSA20_IV_SIZE 8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) #define SALSA20_MIN_KEY_SIZE 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) #define SALSA20_MAX_KEY_SIZE 32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) #define SALSA20_BLOCK_SIZE 64
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) struct salsa20_ctx {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) u32 initial_state[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) static void salsa20_block(u32 *state, __le32 *stream)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) u32 x[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) memcpy(x, state, sizeof(x));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) for (i = 0; i < 20; i += 2) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) x[ 4] ^= rol32((x[ 0] + x[12]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) x[ 8] ^= rol32((x[ 4] + x[ 0]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) x[12] ^= rol32((x[ 8] + x[ 4]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) x[ 0] ^= rol32((x[12] + x[ 8]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) x[ 9] ^= rol32((x[ 5] + x[ 1]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) x[13] ^= rol32((x[ 9] + x[ 5]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) x[ 1] ^= rol32((x[13] + x[ 9]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) x[ 5] ^= rol32((x[ 1] + x[13]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) x[14] ^= rol32((x[10] + x[ 6]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) x[ 2] ^= rol32((x[14] + x[10]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) x[ 6] ^= rol32((x[ 2] + x[14]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) x[10] ^= rol32((x[ 6] + x[ 2]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) x[ 3] ^= rol32((x[15] + x[11]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) x[ 7] ^= rol32((x[ 3] + x[15]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) x[11] ^= rol32((x[ 7] + x[ 3]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) x[15] ^= rol32((x[11] + x[ 7]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) x[ 1] ^= rol32((x[ 0] + x[ 3]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) x[ 2] ^= rol32((x[ 1] + x[ 0]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) x[ 3] ^= rol32((x[ 2] + x[ 1]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) x[ 0] ^= rol32((x[ 3] + x[ 2]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) x[ 6] ^= rol32((x[ 5] + x[ 4]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) x[ 7] ^= rol32((x[ 6] + x[ 5]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) x[ 4] ^= rol32((x[ 7] + x[ 6]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) x[ 5] ^= rol32((x[ 4] + x[ 7]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) x[11] ^= rol32((x[10] + x[ 9]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) x[ 8] ^= rol32((x[11] + x[10]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) x[ 9] ^= rol32((x[ 8] + x[11]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) x[10] ^= rol32((x[ 9] + x[ 8]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) x[12] ^= rol32((x[15] + x[14]), 7);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) x[13] ^= rol32((x[12] + x[15]), 9);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) x[14] ^= rol32((x[13] + x[12]), 13);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) x[15] ^= rol32((x[14] + x[13]), 18);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) for (i = 0; i < 16; i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) stream[i] = cpu_to_le32(x[i] + state[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) if (++state[8] == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) state[9]++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) static void salsa20_docrypt(u32 *state, u8 *dst, const u8 *src,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) unsigned int bytes)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) __le32 stream[SALSA20_BLOCK_SIZE / sizeof(__le32)];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) while (bytes >= SALSA20_BLOCK_SIZE) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) salsa20_block(state, stream);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) crypto_xor_cpy(dst, src, (const u8 *)stream,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) SALSA20_BLOCK_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) bytes -= SALSA20_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) dst += SALSA20_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) src += SALSA20_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) if (bytes) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) salsa20_block(state, stream);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) crypto_xor_cpy(dst, src, (const u8 *)stream, bytes);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) static void salsa20_init(u32 *state, const struct salsa20_ctx *ctx,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) const u8 *iv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) memcpy(state, ctx->initial_state, sizeof(ctx->initial_state));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) state[6] = get_unaligned_le32(iv + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) state[7] = get_unaligned_le32(iv + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) static int salsa20_setkey(struct crypto_skcipher *tfm, const u8 *key,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) unsigned int keysize)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) static const char sigma[16] = "expand 32-byte k";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) static const char tau[16] = "expand 16-byte k";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) struct salsa20_ctx *ctx = crypto_skcipher_ctx(tfm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) const char *constants;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) if (keysize != SALSA20_MIN_KEY_SIZE &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) keysize != SALSA20_MAX_KEY_SIZE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) ctx->initial_state[1] = get_unaligned_le32(key + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) ctx->initial_state[2] = get_unaligned_le32(key + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) ctx->initial_state[3] = get_unaligned_le32(key + 8);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) ctx->initial_state[4] = get_unaligned_le32(key + 12);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) if (keysize == 32) { /* recommended */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) key += 16;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) constants = sigma;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) } else { /* keysize == 16 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) constants = tau;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) ctx->initial_state[11] = get_unaligned_le32(key + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) ctx->initial_state[12] = get_unaligned_le32(key + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) ctx->initial_state[13] = get_unaligned_le32(key + 8);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) ctx->initial_state[14] = get_unaligned_le32(key + 12);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) ctx->initial_state[0] = get_unaligned_le32(constants + 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) ctx->initial_state[5] = get_unaligned_le32(constants + 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) ctx->initial_state[10] = get_unaligned_le32(constants + 8);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) ctx->initial_state[15] = get_unaligned_le32(constants + 12);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) /* space for the nonce; it will be overridden for each request */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) ctx->initial_state[6] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) ctx->initial_state[7] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) /* initial block number */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) ctx->initial_state[8] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) ctx->initial_state[9] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) static int salsa20_crypt(struct skcipher_request *req)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) const struct salsa20_ctx *ctx = crypto_skcipher_ctx(tfm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) struct skcipher_walk walk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) u32 state[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) err = skcipher_walk_virt(&walk, req, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) salsa20_init(state, ctx, req->iv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) while (walk.nbytes > 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) unsigned int nbytes = walk.nbytes;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) if (nbytes < walk.total)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) nbytes = round_down(nbytes, walk.stride);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) salsa20_docrypt(state, walk.dst.virt.addr, walk.src.virt.addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) nbytes);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) static struct skcipher_alg alg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) .base.cra_name = "salsa20",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) .base.cra_driver_name = "salsa20-generic",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) .base.cra_priority = 100,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) .base.cra_blocksize = 1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) .base.cra_ctxsize = sizeof(struct salsa20_ctx),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) .base.cra_module = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) .min_keysize = SALSA20_MIN_KEY_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) .max_keysize = SALSA20_MAX_KEY_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) .ivsize = SALSA20_IV_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) .chunksize = SALSA20_BLOCK_SIZE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) .setkey = salsa20_setkey,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) .encrypt = salsa20_crypt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) .decrypt = salsa20_crypt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) static int __init salsa20_generic_mod_init(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) return crypto_register_skcipher(&alg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) static void __exit salsa20_generic_mod_fini(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) crypto_unregister_skcipher(&alg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) subsys_initcall(salsa20_generic_mod_init);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) module_exit(salsa20_generic_mod_fini);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) MODULE_LICENSE("GPL");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) MODULE_ALIAS_CRYPTO("salsa20");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) MODULE_ALIAS_CRYPTO("salsa20-generic");