162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * algif_skcipher: User-space interface for skcipher algorithms 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * This file provides the user-space API for symmetric key ciphers. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> 862306a36Sopenharmony_ci * 962306a36Sopenharmony_ci * The following concept of the memory management is used: 1062306a36Sopenharmony_ci * 1162306a36Sopenharmony_ci * The kernel maintains two SGLs, the TX SGL and the RX SGL. The TX SGL is 1262306a36Sopenharmony_ci * filled by user space with the data submitted via sendmsg. Filling up the TX 1362306a36Sopenharmony_ci * SGL does not cause a crypto operation -- the data will only be tracked by 1462306a36Sopenharmony_ci * the kernel. Upon receipt of one recvmsg call, the caller must provide a 1562306a36Sopenharmony_ci * buffer which is tracked with the RX SGL. 1662306a36Sopenharmony_ci * 1762306a36Sopenharmony_ci * During the processing of the recvmsg operation, the cipher request is 1862306a36Sopenharmony_ci * allocated and prepared. As part of the recvmsg operation, the processed 1962306a36Sopenharmony_ci * TX buffers are extracted from the TX SGL into a separate SGL. 2062306a36Sopenharmony_ci * 2162306a36Sopenharmony_ci * After the completion of the crypto operation, the RX SGL and the cipher 2262306a36Sopenharmony_ci * request is released. The extracted TX SGL parts are released together with 2362306a36Sopenharmony_ci * the RX SGL release. 2462306a36Sopenharmony_ci */ 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 2762306a36Sopenharmony_ci#include <crypto/skcipher.h> 2862306a36Sopenharmony_ci#include <crypto/if_alg.h> 2962306a36Sopenharmony_ci#include <linux/init.h> 3062306a36Sopenharmony_ci#include <linux/list.h> 3162306a36Sopenharmony_ci#include <linux/kernel.h> 3262306a36Sopenharmony_ci#include <linux/mm.h> 3362306a36Sopenharmony_ci#include <linux/module.h> 3462306a36Sopenharmony_ci#include <linux/net.h> 3562306a36Sopenharmony_ci#include <net/sock.h> 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cistatic int skcipher_sendmsg(struct socket *sock, struct msghdr *msg, 3862306a36Sopenharmony_ci size_t size) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci struct sock *sk = sock->sk; 4162306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 4262306a36Sopenharmony_ci struct sock *psk = ask->parent; 4362306a36Sopenharmony_ci struct alg_sock *pask = alg_sk(psk); 4462306a36Sopenharmony_ci struct crypto_skcipher *tfm = pask->private; 4562306a36Sopenharmony_ci unsigned ivsize = crypto_skcipher_ivsize(tfm); 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci return af_alg_sendmsg(sock, msg, size, ivsize); 4862306a36Sopenharmony_ci} 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_cistatic int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, 5162306a36Sopenharmony_ci size_t ignored, int flags) 5262306a36Sopenharmony_ci{ 5362306a36Sopenharmony_ci struct sock *sk = sock->sk; 5462306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 5562306a36Sopenharmony_ci struct sock *psk = ask->parent; 5662306a36Sopenharmony_ci struct alg_sock *pask = alg_sk(psk); 5762306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 5862306a36Sopenharmony_ci struct crypto_skcipher *tfm = pask->private; 5962306a36Sopenharmony_ci unsigned int bs = crypto_skcipher_chunksize(tfm); 6062306a36Sopenharmony_ci struct af_alg_async_req *areq; 6162306a36Sopenharmony_ci int err = 0; 6262306a36Sopenharmony_ci size_t len = 0; 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci if (!ctx->init || (ctx->more && ctx->used < bs)) { 6562306a36Sopenharmony_ci err = af_alg_wait_for_data(sk, flags, bs); 6662306a36Sopenharmony_ci if (err) 6762306a36Sopenharmony_ci return err; 6862306a36Sopenharmony_ci } 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci /* Allocate cipher request for current operation. */ 7162306a36Sopenharmony_ci areq = af_alg_alloc_areq(sk, sizeof(struct af_alg_async_req) + 7262306a36Sopenharmony_ci crypto_skcipher_reqsize(tfm)); 7362306a36Sopenharmony_ci if (IS_ERR(areq)) 7462306a36Sopenharmony_ci return PTR_ERR(areq); 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci /* convert iovecs of output buffers into RX SGL */ 7762306a36Sopenharmony_ci err = af_alg_get_rsgl(sk, msg, flags, areq, ctx->used, &len); 7862306a36Sopenharmony_ci if (err) 7962306a36Sopenharmony_ci goto free; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci /* 8262306a36Sopenharmony_ci * If more buffers are to be expected to be processed, process only 8362306a36Sopenharmony_ci * full block size buffers. 8462306a36Sopenharmony_ci */ 8562306a36Sopenharmony_ci if (ctx->more || len < ctx->used) 8662306a36Sopenharmony_ci len -= len % bs; 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci /* 8962306a36Sopenharmony_ci * Create a per request TX SGL for this request which tracks the 9062306a36Sopenharmony_ci * SG entries from the global TX SGL. 9162306a36Sopenharmony_ci */ 9262306a36Sopenharmony_ci areq->tsgl_entries = af_alg_count_tsgl(sk, len, 0); 9362306a36Sopenharmony_ci if (!areq->tsgl_entries) 9462306a36Sopenharmony_ci areq->tsgl_entries = 1; 9562306a36Sopenharmony_ci areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl), 9662306a36Sopenharmony_ci areq->tsgl_entries), 9762306a36Sopenharmony_ci GFP_KERNEL); 9862306a36Sopenharmony_ci if (!areq->tsgl) { 9962306a36Sopenharmony_ci err = -ENOMEM; 10062306a36Sopenharmony_ci goto free; 10162306a36Sopenharmony_ci } 10262306a36Sopenharmony_ci sg_init_table(areq->tsgl, areq->tsgl_entries); 10362306a36Sopenharmony_ci af_alg_pull_tsgl(sk, len, areq->tsgl, 0); 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci /* Initialize the crypto operation */ 10662306a36Sopenharmony_ci skcipher_request_set_tfm(&areq->cra_u.skcipher_req, tfm); 10762306a36Sopenharmony_ci skcipher_request_set_crypt(&areq->cra_u.skcipher_req, areq->tsgl, 10862306a36Sopenharmony_ci areq->first_rsgl.sgl.sgt.sgl, len, ctx->iv); 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { 11162306a36Sopenharmony_ci /* AIO operation */ 11262306a36Sopenharmony_ci sock_hold(sk); 11362306a36Sopenharmony_ci areq->iocb = msg->msg_iocb; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci /* Remember output size that will be generated. */ 11662306a36Sopenharmony_ci areq->outlen = len; 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci skcipher_request_set_callback(&areq->cra_u.skcipher_req, 11962306a36Sopenharmony_ci CRYPTO_TFM_REQ_MAY_SLEEP, 12062306a36Sopenharmony_ci af_alg_async_cb, areq); 12162306a36Sopenharmony_ci err = ctx->enc ? 12262306a36Sopenharmony_ci crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) : 12362306a36Sopenharmony_ci crypto_skcipher_decrypt(&areq->cra_u.skcipher_req); 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_ci /* AIO operation in progress */ 12662306a36Sopenharmony_ci if (err == -EINPROGRESS) 12762306a36Sopenharmony_ci return -EIOCBQUEUED; 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci sock_put(sk); 13062306a36Sopenharmony_ci } else { 13162306a36Sopenharmony_ci /* Synchronous operation */ 13262306a36Sopenharmony_ci skcipher_request_set_callback(&areq->cra_u.skcipher_req, 13362306a36Sopenharmony_ci CRYPTO_TFM_REQ_MAY_SLEEP | 13462306a36Sopenharmony_ci CRYPTO_TFM_REQ_MAY_BACKLOG, 13562306a36Sopenharmony_ci crypto_req_done, &ctx->wait); 13662306a36Sopenharmony_ci err = crypto_wait_req(ctx->enc ? 13762306a36Sopenharmony_ci crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) : 13862306a36Sopenharmony_ci crypto_skcipher_decrypt(&areq->cra_u.skcipher_req), 13962306a36Sopenharmony_ci &ctx->wait); 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_cifree: 14462306a36Sopenharmony_ci af_alg_free_resources(areq); 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci return err ? err : len; 14762306a36Sopenharmony_ci} 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_cistatic int skcipher_recvmsg(struct socket *sock, struct msghdr *msg, 15062306a36Sopenharmony_ci size_t ignored, int flags) 15162306a36Sopenharmony_ci{ 15262306a36Sopenharmony_ci struct sock *sk = sock->sk; 15362306a36Sopenharmony_ci int ret = 0; 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci lock_sock(sk); 15662306a36Sopenharmony_ci while (msg_data_left(msg)) { 15762306a36Sopenharmony_ci int err = _skcipher_recvmsg(sock, msg, ignored, flags); 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci /* 16062306a36Sopenharmony_ci * This error covers -EIOCBQUEUED which implies that we can 16162306a36Sopenharmony_ci * only handle one AIO request. If the caller wants to have 16262306a36Sopenharmony_ci * multiple AIO requests in parallel, he must make multiple 16362306a36Sopenharmony_ci * separate AIO calls. 16462306a36Sopenharmony_ci * 16562306a36Sopenharmony_ci * Also return the error if no data has been processed so far. 16662306a36Sopenharmony_ci */ 16762306a36Sopenharmony_ci if (err <= 0) { 16862306a36Sopenharmony_ci if (err == -EIOCBQUEUED || !ret) 16962306a36Sopenharmony_ci ret = err; 17062306a36Sopenharmony_ci goto out; 17162306a36Sopenharmony_ci } 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_ci ret += err; 17462306a36Sopenharmony_ci } 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ciout: 17762306a36Sopenharmony_ci af_alg_wmem_wakeup(sk); 17862306a36Sopenharmony_ci release_sock(sk); 17962306a36Sopenharmony_ci return ret; 18062306a36Sopenharmony_ci} 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_cistatic struct proto_ops algif_skcipher_ops = { 18362306a36Sopenharmony_ci .family = PF_ALG, 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci .connect = sock_no_connect, 18662306a36Sopenharmony_ci .socketpair = sock_no_socketpair, 18762306a36Sopenharmony_ci .getname = sock_no_getname, 18862306a36Sopenharmony_ci .ioctl = sock_no_ioctl, 18962306a36Sopenharmony_ci .listen = sock_no_listen, 19062306a36Sopenharmony_ci .shutdown = sock_no_shutdown, 19162306a36Sopenharmony_ci .mmap = sock_no_mmap, 19262306a36Sopenharmony_ci .bind = sock_no_bind, 19362306a36Sopenharmony_ci .accept = sock_no_accept, 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci .release = af_alg_release, 19662306a36Sopenharmony_ci .sendmsg = skcipher_sendmsg, 19762306a36Sopenharmony_ci .recvmsg = skcipher_recvmsg, 19862306a36Sopenharmony_ci .poll = af_alg_poll, 19962306a36Sopenharmony_ci}; 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_cistatic int skcipher_check_key(struct socket *sock) 20262306a36Sopenharmony_ci{ 20362306a36Sopenharmony_ci int err = 0; 20462306a36Sopenharmony_ci struct sock *psk; 20562306a36Sopenharmony_ci struct alg_sock *pask; 20662306a36Sopenharmony_ci struct crypto_skcipher *tfm; 20762306a36Sopenharmony_ci struct sock *sk = sock->sk; 20862306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci lock_sock(sk); 21162306a36Sopenharmony_ci if (!atomic_read(&ask->nokey_refcnt)) 21262306a36Sopenharmony_ci goto unlock_child; 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci psk = ask->parent; 21562306a36Sopenharmony_ci pask = alg_sk(ask->parent); 21662306a36Sopenharmony_ci tfm = pask->private; 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci err = -ENOKEY; 21962306a36Sopenharmony_ci lock_sock_nested(psk, SINGLE_DEPTH_NESTING); 22062306a36Sopenharmony_ci if (crypto_skcipher_get_flags(tfm) & CRYPTO_TFM_NEED_KEY) 22162306a36Sopenharmony_ci goto unlock; 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci atomic_dec(&pask->nokey_refcnt); 22462306a36Sopenharmony_ci atomic_set(&ask->nokey_refcnt, 0); 22562306a36Sopenharmony_ci 22662306a36Sopenharmony_ci err = 0; 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_ciunlock: 22962306a36Sopenharmony_ci release_sock(psk); 23062306a36Sopenharmony_ciunlock_child: 23162306a36Sopenharmony_ci release_sock(sk); 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ci return err; 23462306a36Sopenharmony_ci} 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_cistatic int skcipher_sendmsg_nokey(struct socket *sock, struct msghdr *msg, 23762306a36Sopenharmony_ci size_t size) 23862306a36Sopenharmony_ci{ 23962306a36Sopenharmony_ci int err; 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci err = skcipher_check_key(sock); 24262306a36Sopenharmony_ci if (err) 24362306a36Sopenharmony_ci return err; 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci return skcipher_sendmsg(sock, msg, size); 24662306a36Sopenharmony_ci} 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_cistatic int skcipher_recvmsg_nokey(struct socket *sock, struct msghdr *msg, 24962306a36Sopenharmony_ci size_t ignored, int flags) 25062306a36Sopenharmony_ci{ 25162306a36Sopenharmony_ci int err; 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci err = skcipher_check_key(sock); 25462306a36Sopenharmony_ci if (err) 25562306a36Sopenharmony_ci return err; 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_ci return skcipher_recvmsg(sock, msg, ignored, flags); 25862306a36Sopenharmony_ci} 25962306a36Sopenharmony_ci 26062306a36Sopenharmony_cistatic struct proto_ops algif_skcipher_ops_nokey = { 26162306a36Sopenharmony_ci .family = PF_ALG, 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_ci .connect = sock_no_connect, 26462306a36Sopenharmony_ci .socketpair = sock_no_socketpair, 26562306a36Sopenharmony_ci .getname = sock_no_getname, 26662306a36Sopenharmony_ci .ioctl = sock_no_ioctl, 26762306a36Sopenharmony_ci .listen = sock_no_listen, 26862306a36Sopenharmony_ci .shutdown = sock_no_shutdown, 26962306a36Sopenharmony_ci .mmap = sock_no_mmap, 27062306a36Sopenharmony_ci .bind = sock_no_bind, 27162306a36Sopenharmony_ci .accept = sock_no_accept, 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_ci .release = af_alg_release, 27462306a36Sopenharmony_ci .sendmsg = skcipher_sendmsg_nokey, 27562306a36Sopenharmony_ci .recvmsg = skcipher_recvmsg_nokey, 27662306a36Sopenharmony_ci .poll = af_alg_poll, 27762306a36Sopenharmony_ci}; 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_cistatic void *skcipher_bind(const char *name, u32 type, u32 mask) 28062306a36Sopenharmony_ci{ 28162306a36Sopenharmony_ci return crypto_alloc_skcipher(name, type, mask); 28262306a36Sopenharmony_ci} 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_cistatic void skcipher_release(void *private) 28562306a36Sopenharmony_ci{ 28662306a36Sopenharmony_ci crypto_free_skcipher(private); 28762306a36Sopenharmony_ci} 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_cistatic int skcipher_setkey(void *private, const u8 *key, unsigned int keylen) 29062306a36Sopenharmony_ci{ 29162306a36Sopenharmony_ci return crypto_skcipher_setkey(private, key, keylen); 29262306a36Sopenharmony_ci} 29362306a36Sopenharmony_ci 29462306a36Sopenharmony_cistatic void skcipher_sock_destruct(struct sock *sk) 29562306a36Sopenharmony_ci{ 29662306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 29762306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 29862306a36Sopenharmony_ci struct sock *psk = ask->parent; 29962306a36Sopenharmony_ci struct alg_sock *pask = alg_sk(psk); 30062306a36Sopenharmony_ci struct crypto_skcipher *tfm = pask->private; 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_ci af_alg_pull_tsgl(sk, ctx->used, NULL, 0); 30362306a36Sopenharmony_ci sock_kzfree_s(sk, ctx->iv, crypto_skcipher_ivsize(tfm)); 30462306a36Sopenharmony_ci sock_kfree_s(sk, ctx, ctx->len); 30562306a36Sopenharmony_ci af_alg_release_parent(sk); 30662306a36Sopenharmony_ci} 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_cistatic int skcipher_accept_parent_nokey(void *private, struct sock *sk) 30962306a36Sopenharmony_ci{ 31062306a36Sopenharmony_ci struct af_alg_ctx *ctx; 31162306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 31262306a36Sopenharmony_ci struct crypto_skcipher *tfm = private; 31362306a36Sopenharmony_ci unsigned int len = sizeof(*ctx); 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_ci ctx = sock_kmalloc(sk, len, GFP_KERNEL); 31662306a36Sopenharmony_ci if (!ctx) 31762306a36Sopenharmony_ci return -ENOMEM; 31862306a36Sopenharmony_ci memset(ctx, 0, len); 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci ctx->iv = sock_kmalloc(sk, crypto_skcipher_ivsize(tfm), 32162306a36Sopenharmony_ci GFP_KERNEL); 32262306a36Sopenharmony_ci if (!ctx->iv) { 32362306a36Sopenharmony_ci sock_kfree_s(sk, ctx, len); 32462306a36Sopenharmony_ci return -ENOMEM; 32562306a36Sopenharmony_ci } 32662306a36Sopenharmony_ci memset(ctx->iv, 0, crypto_skcipher_ivsize(tfm)); 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci INIT_LIST_HEAD(&ctx->tsgl_list); 32962306a36Sopenharmony_ci ctx->len = len; 33062306a36Sopenharmony_ci crypto_init_wait(&ctx->wait); 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_ci ask->private = ctx; 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_ci sk->sk_destruct = skcipher_sock_destruct; 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_ci return 0; 33762306a36Sopenharmony_ci} 33862306a36Sopenharmony_ci 33962306a36Sopenharmony_cistatic int skcipher_accept_parent(void *private, struct sock *sk) 34062306a36Sopenharmony_ci{ 34162306a36Sopenharmony_ci struct crypto_skcipher *tfm = private; 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_ci if (crypto_skcipher_get_flags(tfm) & CRYPTO_TFM_NEED_KEY) 34462306a36Sopenharmony_ci return -ENOKEY; 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci return skcipher_accept_parent_nokey(private, sk); 34762306a36Sopenharmony_ci} 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_cistatic const struct af_alg_type algif_type_skcipher = { 35062306a36Sopenharmony_ci .bind = skcipher_bind, 35162306a36Sopenharmony_ci .release = skcipher_release, 35262306a36Sopenharmony_ci .setkey = skcipher_setkey, 35362306a36Sopenharmony_ci .accept = skcipher_accept_parent, 35462306a36Sopenharmony_ci .accept_nokey = skcipher_accept_parent_nokey, 35562306a36Sopenharmony_ci .ops = &algif_skcipher_ops, 35662306a36Sopenharmony_ci .ops_nokey = &algif_skcipher_ops_nokey, 35762306a36Sopenharmony_ci .name = "skcipher", 35862306a36Sopenharmony_ci .owner = THIS_MODULE 35962306a36Sopenharmony_ci}; 36062306a36Sopenharmony_ci 36162306a36Sopenharmony_cistatic int __init algif_skcipher_init(void) 36262306a36Sopenharmony_ci{ 36362306a36Sopenharmony_ci return af_alg_register_type(&algif_type_skcipher); 36462306a36Sopenharmony_ci} 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_cistatic void __exit algif_skcipher_exit(void) 36762306a36Sopenharmony_ci{ 36862306a36Sopenharmony_ci int err = af_alg_unregister_type(&algif_type_skcipher); 36962306a36Sopenharmony_ci BUG_ON(err); 37062306a36Sopenharmony_ci} 37162306a36Sopenharmony_ci 37262306a36Sopenharmony_cimodule_init(algif_skcipher_init); 37362306a36Sopenharmony_cimodule_exit(algif_skcipher_exit); 37462306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 375