const u8 *src, unsigned int bytes)
{
u8 buf[64];
- int i;
if (dst != src)
memcpy(dst, src, bytes);
ctx->input[9] = PLUSONE(ctx->input[9]);
if (bytes <= 64) {
- for (i = 0; i < bytes/4; ++i)
- ((u32*)dst)[i] ^= ((u32*)buf)[i];
- for (i = bytes - bytes % 4; i < bytes; ++i)
- dst[i] ^= buf[i];
+ crypto_xor(dst, buf, bytes);
return;
}
- for (i = 0; i < 64/4; ++i)
- ((u32*)dst)[i] ^= ((u32*)buf)[i];
+ crypto_xor(dst, buf, 64);
bytes -= 64;
dst += 64;
}
int err;
blkcipher_walk_init(&walk, dst, src, nbytes);
- err = blkcipher_walk_virt(desc, &walk);
+ err = blkcipher_walk_virt_block(desc, &walk, 64);
salsa20_ivsetup(ctx, walk.iv);
- salsa20_encrypt_bytes(ctx, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes);
- err = blkcipher_walk_done(desc, &walk, 0);
+ if (likely(walk.nbytes == nbytes))
+ {
+ salsa20_encrypt_bytes(ctx, walk.dst.virt.addr,
+ walk.src.virt.addr, nbytes);
+ return blkcipher_walk_done(desc, &walk, 0);
+ }
+
+ while (walk.nbytes >= 64) {
+ salsa20_encrypt_bytes(ctx, walk.dst.virt.addr,
+ walk.src.virt.addr,
+ walk.nbytes - (walk.nbytes % 64));
+ err = blkcipher_walk_done(desc, &walk, walk.nbytes % 64);
+ }
+
+ if (walk.nbytes) {
+ salsa20_encrypt_bytes(ctx, walk.dst.virt.addr,
+ walk.src.virt.addr, walk.nbytes);
+ err = blkcipher_walk_done(desc, &walk, 0);
+ }
+
return err;
}
}
};
-static int __init init(void)
+static int __init salsa20_generic_mod_init(void)
{
return crypto_register_alg(&alg);
}
-static void __exit fini(void)
+static void __exit salsa20_generic_mod_fini(void)
{
crypto_unregister_alg(&alg);
}
-module_init(init);
-module_exit(fini);
+module_init(salsa20_generic_mod_init);
+module_exit(salsa20_generic_mod_fini);
MODULE_LICENSE("GPL");
MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm");