No no no... if the NSA creates specific algorithms used in components and modules in Linux, and the source algorithm/hash isn’t revealed, it’s contrary to GPLv2. That’s what I meant.
That’s kinda my point. If it’s under the GPLv2, then the source/algorithm must be available.