162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * algif_skcipher: User-space interface for skcipher algorithms
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * This file provides the user-space API for symmetric key ciphers.
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
862306a36Sopenharmony_ci *
962306a36Sopenharmony_ci * The following concept of the memory management is used:
1062306a36Sopenharmony_ci *
1162306a36Sopenharmony_ci * The kernel maintains two SGLs, the TX SGL and the RX SGL. The TX SGL is
1262306a36Sopenharmony_ci * filled by user space with the data submitted via sendmsg. Filling up the TX
1362306a36Sopenharmony_ci * SGL does not cause a crypto operation -- the data will only be tracked by
1462306a36Sopenharmony_ci * the kernel. Upon receipt of one recvmsg call, the caller must provide a
1562306a36Sopenharmony_ci * buffer which is tracked with the RX SGL.
1662306a36Sopenharmony_ci *
1762306a36Sopenharmony_ci * During the processing of the recvmsg operation, the cipher request is
1862306a36Sopenharmony_ci * allocated and prepared. As part of the recvmsg operation, the processed
1962306a36Sopenharmony_ci * TX buffers are extracted from the TX SGL into a separate SGL.
2062306a36Sopenharmony_ci *
2162306a36Sopenharmony_ci * After the completion of the crypto operation, the RX SGL and the cipher
2262306a36Sopenharmony_ci * request is released. The extracted TX SGL parts are released together with
2362306a36Sopenharmony_ci * the RX SGL release.
2462306a36Sopenharmony_ci */
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_ci#include <crypto/scatterwalk.h>
2762306a36Sopenharmony_ci#include <crypto/skcipher.h>
2862306a36Sopenharmony_ci#include <crypto/if_alg.h>
2962306a36Sopenharmony_ci#include <linux/init.h>
3062306a36Sopenharmony_ci#include <linux/list.h>
3162306a36Sopenharmony_ci#include <linux/kernel.h>
3262306a36Sopenharmony_ci#include <linux/mm.h>
3362306a36Sopenharmony_ci#include <linux/module.h>
3462306a36Sopenharmony_ci#include <linux/net.h>
3562306a36Sopenharmony_ci#include <net/sock.h>
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_cistatic int skcipher_sendmsg(struct socket *sock, struct msghdr *msg,
3862306a36Sopenharmony_ci			    size_t size)
3962306a36Sopenharmony_ci{
4062306a36Sopenharmony_ci	struct sock *sk = sock->sk;
4162306a36Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
4262306a36Sopenharmony_ci	struct sock *psk = ask->parent;
4362306a36Sopenharmony_ci	struct alg_sock *pask = alg_sk(psk);
4462306a36Sopenharmony_ci	struct crypto_skcipher *tfm = pask->private;
4562306a36Sopenharmony_ci	unsigned ivsize = crypto_skcipher_ivsize(tfm);
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci	return af_alg_sendmsg(sock, msg, size, ivsize);
4862306a36Sopenharmony_ci}
4962306a36Sopenharmony_ci
5062306a36Sopenharmony_cistatic int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg,
5162306a36Sopenharmony_ci			     size_t ignored, int flags)
5262306a36Sopenharmony_ci{
5362306a36Sopenharmony_ci	struct sock *sk = sock->sk;
5462306a36Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
5562306a36Sopenharmony_ci	struct sock *psk = ask->parent;
5662306a36Sopenharmony_ci	struct alg_sock *pask = alg_sk(psk);
5762306a36Sopenharmony_ci	struct af_alg_ctx *ctx = ask->private;
5862306a36Sopenharmony_ci	struct crypto_skcipher *tfm = pask->private;
5962306a36Sopenharmony_ci	unsigned int bs = crypto_skcipher_chunksize(tfm);
6062306a36Sopenharmony_ci	struct af_alg_async_req *areq;
6162306a36Sopenharmony_ci	int err = 0;
6262306a36Sopenharmony_ci	size_t len = 0;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	if (!ctx->init || (ctx->more && ctx->used < bs)) {
6562306a36Sopenharmony_ci		err = af_alg_wait_for_data(sk, flags, bs);
6662306a36Sopenharmony_ci		if (err)
6762306a36Sopenharmony_ci			return err;
6862306a36Sopenharmony_ci	}
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci	/* Allocate cipher request for current operation. */
7162306a36Sopenharmony_ci	areq = af_alg_alloc_areq(sk, sizeof(struct af_alg_async_req) +
7262306a36Sopenharmony_ci				     crypto_skcipher_reqsize(tfm));
7362306a36Sopenharmony_ci	if (IS_ERR(areq))
7462306a36Sopenharmony_ci		return PTR_ERR(areq);
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci	/* convert iovecs of output buffers into RX SGL */
7762306a36Sopenharmony_ci	err = af_alg_get_rsgl(sk, msg, flags, areq, ctx->used, &len);
7862306a36Sopenharmony_ci	if (err)
7962306a36Sopenharmony_ci		goto free;
8062306a36Sopenharmony_ci
8162306a36Sopenharmony_ci	/*
8262306a36Sopenharmony_ci	 * If more buffers are to be expected to be processed, process only
8362306a36Sopenharmony_ci	 * full block size buffers.
8462306a36Sopenharmony_ci	 */
8562306a36Sopenharmony_ci	if (ctx->more || len < ctx->used)
8662306a36Sopenharmony_ci		len -= len % bs;
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci	/*
8962306a36Sopenharmony_ci	 * Create a per request TX SGL for this request which tracks the
9062306a36Sopenharmony_ci	 * SG entries from the global TX SGL.
9162306a36Sopenharmony_ci	 */
9262306a36Sopenharmony_ci	areq->tsgl_entries = af_alg_count_tsgl(sk, len, 0);
9362306a36Sopenharmony_ci	if (!areq->tsgl_entries)
9462306a36Sopenharmony_ci		areq->tsgl_entries = 1;
9562306a36Sopenharmony_ci	areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
9662306a36Sopenharmony_ci						 areq->tsgl_entries),
9762306a36Sopenharmony_ci				  GFP_KERNEL);
9862306a36Sopenharmony_ci	if (!areq->tsgl) {
9962306a36Sopenharmony_ci		err = -ENOMEM;
10062306a36Sopenharmony_ci		goto free;
10162306a36Sopenharmony_ci	}
10262306a36Sopenharmony_ci	sg_init_table(areq->tsgl, areq->tsgl_entries);
10362306a36Sopenharmony_ci	af_alg_pull_tsgl(sk, len, areq->tsgl, 0);
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	/* Initialize the crypto operation */
10662306a36Sopenharmony_ci	skcipher_request_set_tfm(&areq->cra_u.skcipher_req, tfm);
10762306a36Sopenharmony_ci	skcipher_request_set_crypt(&areq->cra_u.skcipher_req, areq->tsgl,
10862306a36Sopenharmony_ci				   areq->first_rsgl.sgl.sgt.sgl, len, ctx->iv);
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_ci	if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) {
11162306a36Sopenharmony_ci		/* AIO operation */
11262306a36Sopenharmony_ci		sock_hold(sk);
11362306a36Sopenharmony_ci		areq->iocb = msg->msg_iocb;
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci		/* Remember output size that will be generated. */
11662306a36Sopenharmony_ci		areq->outlen = len;
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci		skcipher_request_set_callback(&areq->cra_u.skcipher_req,
11962306a36Sopenharmony_ci					      CRYPTO_TFM_REQ_MAY_SLEEP,
12062306a36Sopenharmony_ci					      af_alg_async_cb, areq);
12162306a36Sopenharmony_ci		err = ctx->enc ?
12262306a36Sopenharmony_ci			crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) :
12362306a36Sopenharmony_ci			crypto_skcipher_decrypt(&areq->cra_u.skcipher_req);
12462306a36Sopenharmony_ci
12562306a36Sopenharmony_ci		/* AIO operation in progress */
12662306a36Sopenharmony_ci		if (err == -EINPROGRESS)
12762306a36Sopenharmony_ci			return -EIOCBQUEUED;
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci		sock_put(sk);
13062306a36Sopenharmony_ci	} else {
13162306a36Sopenharmony_ci		/* Synchronous operation */
13262306a36Sopenharmony_ci		skcipher_request_set_callback(&areq->cra_u.skcipher_req,
13362306a36Sopenharmony_ci					      CRYPTO_TFM_REQ_MAY_SLEEP |
13462306a36Sopenharmony_ci					      CRYPTO_TFM_REQ_MAY_BACKLOG,
13562306a36Sopenharmony_ci					      crypto_req_done, &ctx->wait);
13662306a36Sopenharmony_ci		err = crypto_wait_req(ctx->enc ?
13762306a36Sopenharmony_ci			crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) :
13862306a36Sopenharmony_ci			crypto_skcipher_decrypt(&areq->cra_u.skcipher_req),
13962306a36Sopenharmony_ci						 &ctx->wait);
14062306a36Sopenharmony_ci	}
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci
14362306a36Sopenharmony_cifree:
14462306a36Sopenharmony_ci	af_alg_free_resources(areq);
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_ci	return err ? err : len;
14762306a36Sopenharmony_ci}
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_cistatic int skcipher_recvmsg(struct socket *sock, struct msghdr *msg,
15062306a36Sopenharmony_ci			    size_t ignored, int flags)
15162306a36Sopenharmony_ci{
15262306a36Sopenharmony_ci	struct sock *sk = sock->sk;
15362306a36Sopenharmony_ci	int ret = 0;
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	lock_sock(sk);
15662306a36Sopenharmony_ci	while (msg_data_left(msg)) {
15762306a36Sopenharmony_ci		int err = _skcipher_recvmsg(sock, msg, ignored, flags);
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_ci		/*
16062306a36Sopenharmony_ci		 * This error covers -EIOCBQUEUED which implies that we can
16162306a36Sopenharmony_ci		 * only handle one AIO request. If the caller wants to have
16262306a36Sopenharmony_ci		 * multiple AIO requests in parallel, he must make multiple
16362306a36Sopenharmony_ci		 * separate AIO calls.
16462306a36Sopenharmony_ci		 *
16562306a36Sopenharmony_ci		 * Also return the error if no data has been processed so far.
16662306a36Sopenharmony_ci		 */
16762306a36Sopenharmony_ci		if (err <= 0) {
16862306a36Sopenharmony_ci			if (err == -EIOCBQUEUED || !ret)
16962306a36Sopenharmony_ci				ret = err;
17062306a36Sopenharmony_ci			goto out;
17162306a36Sopenharmony_ci		}
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_ci		ret += err;
17462306a36Sopenharmony_ci	}
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_ciout:
17762306a36Sopenharmony_ci	af_alg_wmem_wakeup(sk);
17862306a36Sopenharmony_ci	release_sock(sk);
17962306a36Sopenharmony_ci	return ret;
18062306a36Sopenharmony_ci}
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_cistatic struct proto_ops algif_skcipher_ops = {
18362306a36Sopenharmony_ci	.family		=	PF_ALG,
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	.connect	=	sock_no_connect,
18662306a36Sopenharmony_ci	.socketpair	=	sock_no_socketpair,
18762306a36Sopenharmony_ci	.getname	=	sock_no_getname,
18862306a36Sopenharmony_ci	.ioctl		=	sock_no_ioctl,
18962306a36Sopenharmony_ci	.listen		=	sock_no_listen,
19062306a36Sopenharmony_ci	.shutdown	=	sock_no_shutdown,
19162306a36Sopenharmony_ci	.mmap		=	sock_no_mmap,
19262306a36Sopenharmony_ci	.bind		=	sock_no_bind,
19362306a36Sopenharmony_ci	.accept		=	sock_no_accept,
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	.release	=	af_alg_release,
19662306a36Sopenharmony_ci	.sendmsg	=	skcipher_sendmsg,
19762306a36Sopenharmony_ci	.recvmsg	=	skcipher_recvmsg,
19862306a36Sopenharmony_ci	.poll		=	af_alg_poll,
19962306a36Sopenharmony_ci};
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_cistatic int skcipher_check_key(struct socket *sock)
20262306a36Sopenharmony_ci{
20362306a36Sopenharmony_ci	int err = 0;
20462306a36Sopenharmony_ci	struct sock *psk;
20562306a36Sopenharmony_ci	struct alg_sock *pask;
20662306a36Sopenharmony_ci	struct crypto_skcipher *tfm;
20762306a36Sopenharmony_ci	struct sock *sk = sock->sk;
20862306a36Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci	lock_sock(sk);
21162306a36Sopenharmony_ci	if (!atomic_read(&ask->nokey_refcnt))
21262306a36Sopenharmony_ci		goto unlock_child;
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_ci	psk = ask->parent;
21562306a36Sopenharmony_ci	pask = alg_sk(ask->parent);
21662306a36Sopenharmony_ci	tfm = pask->private;
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	err = -ENOKEY;
21962306a36Sopenharmony_ci	lock_sock_nested(psk, SINGLE_DEPTH_NESTING);
22062306a36Sopenharmony_ci	if (crypto_skcipher_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
22162306a36Sopenharmony_ci		goto unlock;
22262306a36Sopenharmony_ci
22362306a36Sopenharmony_ci	atomic_dec(&pask->nokey_refcnt);
22462306a36Sopenharmony_ci	atomic_set(&ask->nokey_refcnt, 0);
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ci	err = 0;
22762306a36Sopenharmony_ci
22862306a36Sopenharmony_ciunlock:
22962306a36Sopenharmony_ci	release_sock(psk);
23062306a36Sopenharmony_ciunlock_child:
23162306a36Sopenharmony_ci	release_sock(sk);
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ci	return err;
23462306a36Sopenharmony_ci}
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_cistatic int skcipher_sendmsg_nokey(struct socket *sock, struct msghdr *msg,
23762306a36Sopenharmony_ci				  size_t size)
23862306a36Sopenharmony_ci{
23962306a36Sopenharmony_ci	int err;
24062306a36Sopenharmony_ci
24162306a36Sopenharmony_ci	err = skcipher_check_key(sock);
24262306a36Sopenharmony_ci	if (err)
24362306a36Sopenharmony_ci		return err;
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_ci	return skcipher_sendmsg(sock, msg, size);
24662306a36Sopenharmony_ci}
24762306a36Sopenharmony_ci
24862306a36Sopenharmony_cistatic int skcipher_recvmsg_nokey(struct socket *sock, struct msghdr *msg,
24962306a36Sopenharmony_ci				  size_t ignored, int flags)
25062306a36Sopenharmony_ci{
25162306a36Sopenharmony_ci	int err;
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci	err = skcipher_check_key(sock);
25462306a36Sopenharmony_ci	if (err)
25562306a36Sopenharmony_ci		return err;
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci	return skcipher_recvmsg(sock, msg, ignored, flags);
25862306a36Sopenharmony_ci}
25962306a36Sopenharmony_ci
26062306a36Sopenharmony_cistatic struct proto_ops algif_skcipher_ops_nokey = {
26162306a36Sopenharmony_ci	.family		=	PF_ALG,
26262306a36Sopenharmony_ci
26362306a36Sopenharmony_ci	.connect	=	sock_no_connect,
26462306a36Sopenharmony_ci	.socketpair	=	sock_no_socketpair,
26562306a36Sopenharmony_ci	.getname	=	sock_no_getname,
26662306a36Sopenharmony_ci	.ioctl		=	sock_no_ioctl,
26762306a36Sopenharmony_ci	.listen		=	sock_no_listen,
26862306a36Sopenharmony_ci	.shutdown	=	sock_no_shutdown,
26962306a36Sopenharmony_ci	.mmap		=	sock_no_mmap,
27062306a36Sopenharmony_ci	.bind		=	sock_no_bind,
27162306a36Sopenharmony_ci	.accept		=	sock_no_accept,
27262306a36Sopenharmony_ci
27362306a36Sopenharmony_ci	.release	=	af_alg_release,
27462306a36Sopenharmony_ci	.sendmsg	=	skcipher_sendmsg_nokey,
27562306a36Sopenharmony_ci	.recvmsg	=	skcipher_recvmsg_nokey,
27662306a36Sopenharmony_ci	.poll		=	af_alg_poll,
27762306a36Sopenharmony_ci};
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_cistatic void *skcipher_bind(const char *name, u32 type, u32 mask)
28062306a36Sopenharmony_ci{
28162306a36Sopenharmony_ci	return crypto_alloc_skcipher(name, type, mask);
28262306a36Sopenharmony_ci}
28362306a36Sopenharmony_ci
28462306a36Sopenharmony_cistatic void skcipher_release(void *private)
28562306a36Sopenharmony_ci{
28662306a36Sopenharmony_ci	crypto_free_skcipher(private);
28762306a36Sopenharmony_ci}
28862306a36Sopenharmony_ci
28962306a36Sopenharmony_cistatic int skcipher_setkey(void *private, const u8 *key, unsigned int keylen)
29062306a36Sopenharmony_ci{
29162306a36Sopenharmony_ci	return crypto_skcipher_setkey(private, key, keylen);
29262306a36Sopenharmony_ci}
29362306a36Sopenharmony_ci
29462306a36Sopenharmony_cistatic void skcipher_sock_destruct(struct sock *sk)
29562306a36Sopenharmony_ci{
29662306a36Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
29762306a36Sopenharmony_ci	struct af_alg_ctx *ctx = ask->private;
29862306a36Sopenharmony_ci	struct sock *psk = ask->parent;
29962306a36Sopenharmony_ci	struct alg_sock *pask = alg_sk(psk);
30062306a36Sopenharmony_ci	struct crypto_skcipher *tfm = pask->private;
30162306a36Sopenharmony_ci
30262306a36Sopenharmony_ci	af_alg_pull_tsgl(sk, ctx->used, NULL, 0);
30362306a36Sopenharmony_ci	sock_kzfree_s(sk, ctx->iv, crypto_skcipher_ivsize(tfm));
30462306a36Sopenharmony_ci	sock_kfree_s(sk, ctx, ctx->len);
30562306a36Sopenharmony_ci	af_alg_release_parent(sk);
30662306a36Sopenharmony_ci}
30762306a36Sopenharmony_ci
30862306a36Sopenharmony_cistatic int skcipher_accept_parent_nokey(void *private, struct sock *sk)
30962306a36Sopenharmony_ci{
31062306a36Sopenharmony_ci	struct af_alg_ctx *ctx;
31162306a36Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
31262306a36Sopenharmony_ci	struct crypto_skcipher *tfm = private;
31362306a36Sopenharmony_ci	unsigned int len = sizeof(*ctx);
31462306a36Sopenharmony_ci
31562306a36Sopenharmony_ci	ctx = sock_kmalloc(sk, len, GFP_KERNEL);
31662306a36Sopenharmony_ci	if (!ctx)
31762306a36Sopenharmony_ci		return -ENOMEM;
31862306a36Sopenharmony_ci	memset(ctx, 0, len);
31962306a36Sopenharmony_ci
32062306a36Sopenharmony_ci	ctx->iv = sock_kmalloc(sk, crypto_skcipher_ivsize(tfm),
32162306a36Sopenharmony_ci			       GFP_KERNEL);
32262306a36Sopenharmony_ci	if (!ctx->iv) {
32362306a36Sopenharmony_ci		sock_kfree_s(sk, ctx, len);
32462306a36Sopenharmony_ci		return -ENOMEM;
32562306a36Sopenharmony_ci	}
32662306a36Sopenharmony_ci	memset(ctx->iv, 0, crypto_skcipher_ivsize(tfm));
32762306a36Sopenharmony_ci
32862306a36Sopenharmony_ci	INIT_LIST_HEAD(&ctx->tsgl_list);
32962306a36Sopenharmony_ci	ctx->len = len;
33062306a36Sopenharmony_ci	crypto_init_wait(&ctx->wait);
33162306a36Sopenharmony_ci
33262306a36Sopenharmony_ci	ask->private = ctx;
33362306a36Sopenharmony_ci
33462306a36Sopenharmony_ci	sk->sk_destruct = skcipher_sock_destruct;
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci	return 0;
33762306a36Sopenharmony_ci}
33862306a36Sopenharmony_ci
33962306a36Sopenharmony_cistatic int skcipher_accept_parent(void *private, struct sock *sk)
34062306a36Sopenharmony_ci{
34162306a36Sopenharmony_ci	struct crypto_skcipher *tfm = private;
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci	if (crypto_skcipher_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
34462306a36Sopenharmony_ci		return -ENOKEY;
34562306a36Sopenharmony_ci
34662306a36Sopenharmony_ci	return skcipher_accept_parent_nokey(private, sk);
34762306a36Sopenharmony_ci}
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_cistatic const struct af_alg_type algif_type_skcipher = {
35062306a36Sopenharmony_ci	.bind		=	skcipher_bind,
35162306a36Sopenharmony_ci	.release	=	skcipher_release,
35262306a36Sopenharmony_ci	.setkey		=	skcipher_setkey,
35362306a36Sopenharmony_ci	.accept		=	skcipher_accept_parent,
35462306a36Sopenharmony_ci	.accept_nokey	=	skcipher_accept_parent_nokey,
35562306a36Sopenharmony_ci	.ops		=	&algif_skcipher_ops,
35662306a36Sopenharmony_ci	.ops_nokey	=	&algif_skcipher_ops_nokey,
35762306a36Sopenharmony_ci	.name		=	"skcipher",
35862306a36Sopenharmony_ci	.owner		=	THIS_MODULE
35962306a36Sopenharmony_ci};
36062306a36Sopenharmony_ci
36162306a36Sopenharmony_cistatic int __init algif_skcipher_init(void)
36262306a36Sopenharmony_ci{
36362306a36Sopenharmony_ci	return af_alg_register_type(&algif_type_skcipher);
36462306a36Sopenharmony_ci}
36562306a36Sopenharmony_ci
36662306a36Sopenharmony_cistatic void __exit algif_skcipher_exit(void)
36762306a36Sopenharmony_ci{
36862306a36Sopenharmony_ci	int err = af_alg_unregister_type(&algif_type_skcipher);
36962306a36Sopenharmony_ci	BUG_ON(err);
37062306a36Sopenharmony_ci}
37162306a36Sopenharmony_ci
37262306a36Sopenharmony_cimodule_init(algif_skcipher_init);
37362306a36Sopenharmony_cimodule_exit(algif_skcipher_exit);
37462306a36Sopenharmony_ciMODULE_LICENSE("GPL");
375