162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * ARM NEON accelerated ChaCha and XChaCha stream ciphers, 462306a36Sopenharmony_ci * including ChaCha20 (RFC7539) 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Copyright (C) 2016-2019 Linaro, Ltd. <ard.biesheuvel@linaro.org> 762306a36Sopenharmony_ci * Copyright (C) 2015 Martin Willi 862306a36Sopenharmony_ci */ 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include <crypto/algapi.h> 1162306a36Sopenharmony_ci#include <crypto/internal/chacha.h> 1262306a36Sopenharmony_ci#include <crypto/internal/simd.h> 1362306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 1462306a36Sopenharmony_ci#include <linux/jump_label.h> 1562306a36Sopenharmony_ci#include <linux/kernel.h> 1662306a36Sopenharmony_ci#include <linux/module.h> 1762306a36Sopenharmony_ci 1862306a36Sopenharmony_ci#include <asm/cputype.h> 1962306a36Sopenharmony_ci#include <asm/hwcap.h> 2062306a36Sopenharmony_ci#include <asm/neon.h> 2162306a36Sopenharmony_ci#include <asm/simd.h> 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ciasmlinkage void chacha_block_xor_neon(const u32 *state, u8 *dst, const u8 *src, 2462306a36Sopenharmony_ci int nrounds); 2562306a36Sopenharmony_ciasmlinkage void chacha_4block_xor_neon(const u32 *state, u8 *dst, const u8 *src, 2662306a36Sopenharmony_ci int nrounds, unsigned int nbytes); 2762306a36Sopenharmony_ciasmlinkage void hchacha_block_arm(const u32 *state, u32 *out, int nrounds); 2862306a36Sopenharmony_ciasmlinkage void hchacha_block_neon(const u32 *state, u32 *out, int nrounds); 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ciasmlinkage void chacha_doarm(u8 *dst, const u8 *src, unsigned int bytes, 3162306a36Sopenharmony_ci const u32 *state, int nrounds); 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_cistatic __ro_after_init DEFINE_STATIC_KEY_FALSE(use_neon); 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_cistatic inline bool neon_usable(void) 3662306a36Sopenharmony_ci{ 3762306a36Sopenharmony_ci return static_branch_likely(&use_neon) && crypto_simd_usable(); 3862306a36Sopenharmony_ci} 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_cistatic void chacha_doneon(u32 *state, u8 *dst, const u8 *src, 4162306a36Sopenharmony_ci unsigned int bytes, int nrounds) 4262306a36Sopenharmony_ci{ 4362306a36Sopenharmony_ci u8 buf[CHACHA_BLOCK_SIZE]; 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci while (bytes > CHACHA_BLOCK_SIZE) { 4662306a36Sopenharmony_ci unsigned int l = min(bytes, CHACHA_BLOCK_SIZE * 4U); 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci chacha_4block_xor_neon(state, dst, src, nrounds, l); 4962306a36Sopenharmony_ci bytes -= l; 5062306a36Sopenharmony_ci src += l; 5162306a36Sopenharmony_ci dst += l; 5262306a36Sopenharmony_ci state[12] += DIV_ROUND_UP(l, CHACHA_BLOCK_SIZE); 5362306a36Sopenharmony_ci } 5462306a36Sopenharmony_ci if (bytes) { 5562306a36Sopenharmony_ci const u8 *s = src; 5662306a36Sopenharmony_ci u8 *d = dst; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci if (bytes != CHACHA_BLOCK_SIZE) 5962306a36Sopenharmony_ci s = d = memcpy(buf, src, bytes); 6062306a36Sopenharmony_ci chacha_block_xor_neon(state, d, s, nrounds); 6162306a36Sopenharmony_ci if (d != dst) 6262306a36Sopenharmony_ci memcpy(dst, buf, bytes); 6362306a36Sopenharmony_ci state[12]++; 6462306a36Sopenharmony_ci } 6562306a36Sopenharmony_ci} 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_civoid hchacha_block_arch(const u32 *state, u32 *stream, int nrounds) 6862306a36Sopenharmony_ci{ 6962306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_KERNEL_MODE_NEON) || !neon_usable()) { 7062306a36Sopenharmony_ci hchacha_block_arm(state, stream, nrounds); 7162306a36Sopenharmony_ci } else { 7262306a36Sopenharmony_ci kernel_neon_begin(); 7362306a36Sopenharmony_ci hchacha_block_neon(state, stream, nrounds); 7462306a36Sopenharmony_ci kernel_neon_end(); 7562306a36Sopenharmony_ci } 7662306a36Sopenharmony_ci} 7762306a36Sopenharmony_ciEXPORT_SYMBOL(hchacha_block_arch); 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_civoid chacha_init_arch(u32 *state, const u32 *key, const u8 *iv) 8062306a36Sopenharmony_ci{ 8162306a36Sopenharmony_ci chacha_init_generic(state, key, iv); 8262306a36Sopenharmony_ci} 8362306a36Sopenharmony_ciEXPORT_SYMBOL(chacha_init_arch); 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_civoid chacha_crypt_arch(u32 *state, u8 *dst, const u8 *src, unsigned int bytes, 8662306a36Sopenharmony_ci int nrounds) 8762306a36Sopenharmony_ci{ 8862306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_KERNEL_MODE_NEON) || !neon_usable() || 8962306a36Sopenharmony_ci bytes <= CHACHA_BLOCK_SIZE) { 9062306a36Sopenharmony_ci chacha_doarm(dst, src, bytes, state, nrounds); 9162306a36Sopenharmony_ci state[12] += DIV_ROUND_UP(bytes, CHACHA_BLOCK_SIZE); 9262306a36Sopenharmony_ci return; 9362306a36Sopenharmony_ci } 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_ci do { 9662306a36Sopenharmony_ci unsigned int todo = min_t(unsigned int, bytes, SZ_4K); 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci kernel_neon_begin(); 9962306a36Sopenharmony_ci chacha_doneon(state, dst, src, todo, nrounds); 10062306a36Sopenharmony_ci kernel_neon_end(); 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_ci bytes -= todo; 10362306a36Sopenharmony_ci src += todo; 10462306a36Sopenharmony_ci dst += todo; 10562306a36Sopenharmony_ci } while (bytes); 10662306a36Sopenharmony_ci} 10762306a36Sopenharmony_ciEXPORT_SYMBOL(chacha_crypt_arch); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_cistatic int chacha_stream_xor(struct skcipher_request *req, 11062306a36Sopenharmony_ci const struct chacha_ctx *ctx, const u8 *iv, 11162306a36Sopenharmony_ci bool neon) 11262306a36Sopenharmony_ci{ 11362306a36Sopenharmony_ci struct skcipher_walk walk; 11462306a36Sopenharmony_ci u32 state[16]; 11562306a36Sopenharmony_ci int err; 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_ci err = skcipher_walk_virt(&walk, req, false); 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci chacha_init_generic(state, ctx->key, iv); 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci while (walk.nbytes > 0) { 12262306a36Sopenharmony_ci unsigned int nbytes = walk.nbytes; 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci if (nbytes < walk.total) 12562306a36Sopenharmony_ci nbytes = round_down(nbytes, walk.stride); 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_KERNEL_MODE_NEON) || !neon) { 12862306a36Sopenharmony_ci chacha_doarm(walk.dst.virt.addr, walk.src.virt.addr, 12962306a36Sopenharmony_ci nbytes, state, ctx->nrounds); 13062306a36Sopenharmony_ci state[12] += DIV_ROUND_UP(nbytes, CHACHA_BLOCK_SIZE); 13162306a36Sopenharmony_ci } else { 13262306a36Sopenharmony_ci kernel_neon_begin(); 13362306a36Sopenharmony_ci chacha_doneon(state, walk.dst.virt.addr, 13462306a36Sopenharmony_ci walk.src.virt.addr, nbytes, ctx->nrounds); 13562306a36Sopenharmony_ci kernel_neon_end(); 13662306a36Sopenharmony_ci } 13762306a36Sopenharmony_ci err = skcipher_walk_done(&walk, walk.nbytes - nbytes); 13862306a36Sopenharmony_ci } 13962306a36Sopenharmony_ci 14062306a36Sopenharmony_ci return err; 14162306a36Sopenharmony_ci} 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_cistatic int do_chacha(struct skcipher_request *req, bool neon) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 14662306a36Sopenharmony_ci struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm); 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci return chacha_stream_xor(req, ctx, req->iv, neon); 14962306a36Sopenharmony_ci} 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_cistatic int chacha_arm(struct skcipher_request *req) 15262306a36Sopenharmony_ci{ 15362306a36Sopenharmony_ci return do_chacha(req, false); 15462306a36Sopenharmony_ci} 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_cistatic int chacha_neon(struct skcipher_request *req) 15762306a36Sopenharmony_ci{ 15862306a36Sopenharmony_ci return do_chacha(req, neon_usable()); 15962306a36Sopenharmony_ci} 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_cistatic int do_xchacha(struct skcipher_request *req, bool neon) 16262306a36Sopenharmony_ci{ 16362306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 16462306a36Sopenharmony_ci struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm); 16562306a36Sopenharmony_ci struct chacha_ctx subctx; 16662306a36Sopenharmony_ci u32 state[16]; 16762306a36Sopenharmony_ci u8 real_iv[16]; 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci chacha_init_generic(state, ctx->key, req->iv); 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_KERNEL_MODE_NEON) || !neon) { 17262306a36Sopenharmony_ci hchacha_block_arm(state, subctx.key, ctx->nrounds); 17362306a36Sopenharmony_ci } else { 17462306a36Sopenharmony_ci kernel_neon_begin(); 17562306a36Sopenharmony_ci hchacha_block_neon(state, subctx.key, ctx->nrounds); 17662306a36Sopenharmony_ci kernel_neon_end(); 17762306a36Sopenharmony_ci } 17862306a36Sopenharmony_ci subctx.nrounds = ctx->nrounds; 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci memcpy(&real_iv[0], req->iv + 24, 8); 18162306a36Sopenharmony_ci memcpy(&real_iv[8], req->iv + 16, 8); 18262306a36Sopenharmony_ci return chacha_stream_xor(req, &subctx, real_iv, neon); 18362306a36Sopenharmony_ci} 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_cistatic int xchacha_arm(struct skcipher_request *req) 18662306a36Sopenharmony_ci{ 18762306a36Sopenharmony_ci return do_xchacha(req, false); 18862306a36Sopenharmony_ci} 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_cistatic int xchacha_neon(struct skcipher_request *req) 19162306a36Sopenharmony_ci{ 19262306a36Sopenharmony_ci return do_xchacha(req, neon_usable()); 19362306a36Sopenharmony_ci} 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_cistatic struct skcipher_alg arm_algs[] = { 19662306a36Sopenharmony_ci { 19762306a36Sopenharmony_ci .base.cra_name = "chacha20", 19862306a36Sopenharmony_ci .base.cra_driver_name = "chacha20-arm", 19962306a36Sopenharmony_ci .base.cra_priority = 200, 20062306a36Sopenharmony_ci .base.cra_blocksize = 1, 20162306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 20262306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 20562306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 20662306a36Sopenharmony_ci .ivsize = CHACHA_IV_SIZE, 20762306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 20862306a36Sopenharmony_ci .setkey = chacha20_setkey, 20962306a36Sopenharmony_ci .encrypt = chacha_arm, 21062306a36Sopenharmony_ci .decrypt = chacha_arm, 21162306a36Sopenharmony_ci }, { 21262306a36Sopenharmony_ci .base.cra_name = "xchacha20", 21362306a36Sopenharmony_ci .base.cra_driver_name = "xchacha20-arm", 21462306a36Sopenharmony_ci .base.cra_priority = 200, 21562306a36Sopenharmony_ci .base.cra_blocksize = 1, 21662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 21762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 22062306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 22162306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 22262306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 22362306a36Sopenharmony_ci .setkey = chacha20_setkey, 22462306a36Sopenharmony_ci .encrypt = xchacha_arm, 22562306a36Sopenharmony_ci .decrypt = xchacha_arm, 22662306a36Sopenharmony_ci }, { 22762306a36Sopenharmony_ci .base.cra_name = "xchacha12", 22862306a36Sopenharmony_ci .base.cra_driver_name = "xchacha12-arm", 22962306a36Sopenharmony_ci .base.cra_priority = 200, 23062306a36Sopenharmony_ci .base.cra_blocksize = 1, 23162306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 23262306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 23562306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 23662306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 23762306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 23862306a36Sopenharmony_ci .setkey = chacha12_setkey, 23962306a36Sopenharmony_ci .encrypt = xchacha_arm, 24062306a36Sopenharmony_ci .decrypt = xchacha_arm, 24162306a36Sopenharmony_ci }, 24262306a36Sopenharmony_ci}; 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_cistatic struct skcipher_alg neon_algs[] = { 24562306a36Sopenharmony_ci { 24662306a36Sopenharmony_ci .base.cra_name = "chacha20", 24762306a36Sopenharmony_ci .base.cra_driver_name = "chacha20-neon", 24862306a36Sopenharmony_ci .base.cra_priority = 300, 24962306a36Sopenharmony_ci .base.cra_blocksize = 1, 25062306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 25162306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 25462306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 25562306a36Sopenharmony_ci .ivsize = CHACHA_IV_SIZE, 25662306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 25762306a36Sopenharmony_ci .walksize = 4 * CHACHA_BLOCK_SIZE, 25862306a36Sopenharmony_ci .setkey = chacha20_setkey, 25962306a36Sopenharmony_ci .encrypt = chacha_neon, 26062306a36Sopenharmony_ci .decrypt = chacha_neon, 26162306a36Sopenharmony_ci }, { 26262306a36Sopenharmony_ci .base.cra_name = "xchacha20", 26362306a36Sopenharmony_ci .base.cra_driver_name = "xchacha20-neon", 26462306a36Sopenharmony_ci .base.cra_priority = 300, 26562306a36Sopenharmony_ci .base.cra_blocksize = 1, 26662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 26762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 26862306a36Sopenharmony_ci 26962306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 27062306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 27162306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 27262306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 27362306a36Sopenharmony_ci .walksize = 4 * CHACHA_BLOCK_SIZE, 27462306a36Sopenharmony_ci .setkey = chacha20_setkey, 27562306a36Sopenharmony_ci .encrypt = xchacha_neon, 27662306a36Sopenharmony_ci .decrypt = xchacha_neon, 27762306a36Sopenharmony_ci }, { 27862306a36Sopenharmony_ci .base.cra_name = "xchacha12", 27962306a36Sopenharmony_ci .base.cra_driver_name = "xchacha12-neon", 28062306a36Sopenharmony_ci .base.cra_priority = 300, 28162306a36Sopenharmony_ci .base.cra_blocksize = 1, 28262306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 28362306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 28662306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 28762306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 28862306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 28962306a36Sopenharmony_ci .walksize = 4 * CHACHA_BLOCK_SIZE, 29062306a36Sopenharmony_ci .setkey = chacha12_setkey, 29162306a36Sopenharmony_ci .encrypt = xchacha_neon, 29262306a36Sopenharmony_ci .decrypt = xchacha_neon, 29362306a36Sopenharmony_ci } 29462306a36Sopenharmony_ci}; 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_cistatic int __init chacha_simd_mod_init(void) 29762306a36Sopenharmony_ci{ 29862306a36Sopenharmony_ci int err = 0; 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_ci if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER)) { 30162306a36Sopenharmony_ci err = crypto_register_skciphers(arm_algs, ARRAY_SIZE(arm_algs)); 30262306a36Sopenharmony_ci if (err) 30362306a36Sopenharmony_ci return err; 30462306a36Sopenharmony_ci } 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_KERNEL_MODE_NEON) && (elf_hwcap & HWCAP_NEON)) { 30762306a36Sopenharmony_ci int i; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci switch (read_cpuid_part()) { 31062306a36Sopenharmony_ci case ARM_CPU_PART_CORTEX_A7: 31162306a36Sopenharmony_ci case ARM_CPU_PART_CORTEX_A5: 31262306a36Sopenharmony_ci /* 31362306a36Sopenharmony_ci * The Cortex-A7 and Cortex-A5 do not perform well with 31462306a36Sopenharmony_ci * the NEON implementation but do incredibly with the 31562306a36Sopenharmony_ci * scalar one and use less power. 31662306a36Sopenharmony_ci */ 31762306a36Sopenharmony_ci for (i = 0; i < ARRAY_SIZE(neon_algs); i++) 31862306a36Sopenharmony_ci neon_algs[i].base.cra_priority = 0; 31962306a36Sopenharmony_ci break; 32062306a36Sopenharmony_ci default: 32162306a36Sopenharmony_ci static_branch_enable(&use_neon); 32262306a36Sopenharmony_ci } 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_ci if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER)) { 32562306a36Sopenharmony_ci err = crypto_register_skciphers(neon_algs, ARRAY_SIZE(neon_algs)); 32662306a36Sopenharmony_ci if (err) 32762306a36Sopenharmony_ci crypto_unregister_skciphers(arm_algs, ARRAY_SIZE(arm_algs)); 32862306a36Sopenharmony_ci } 32962306a36Sopenharmony_ci } 33062306a36Sopenharmony_ci return err; 33162306a36Sopenharmony_ci} 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_cistatic void __exit chacha_simd_mod_fini(void) 33462306a36Sopenharmony_ci{ 33562306a36Sopenharmony_ci if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER)) { 33662306a36Sopenharmony_ci crypto_unregister_skciphers(arm_algs, ARRAY_SIZE(arm_algs)); 33762306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_KERNEL_MODE_NEON) && (elf_hwcap & HWCAP_NEON)) 33862306a36Sopenharmony_ci crypto_unregister_skciphers(neon_algs, ARRAY_SIZE(neon_algs)); 33962306a36Sopenharmony_ci } 34062306a36Sopenharmony_ci} 34162306a36Sopenharmony_ci 34262306a36Sopenharmony_cimodule_init(chacha_simd_mod_init); 34362306a36Sopenharmony_cimodule_exit(chacha_simd_mod_fini); 34462306a36Sopenharmony_ci 34562306a36Sopenharmony_ciMODULE_DESCRIPTION("ChaCha and XChaCha stream ciphers (scalar and NEON accelerated)"); 34662306a36Sopenharmony_ciMODULE_AUTHOR("Ard Biesheuvel <ard.biesheuvel@linaro.org>"); 34762306a36Sopenharmony_ciMODULE_LICENSE("GPL v2"); 34862306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20"); 34962306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20-arm"); 35062306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20"); 35162306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20-arm"); 35262306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12"); 35362306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12-arm"); 35462306a36Sopenharmony_ci#ifdef CONFIG_KERNEL_MODE_NEON 35562306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20-neon"); 35662306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20-neon"); 35762306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12-neon"); 35862306a36Sopenharmony_ci#endif 359