diff options
Diffstat (limited to 'crypto/des_generic.c')
-rw-r--r-- | crypto/des_generic.c | 13 |
1 files changed, 0 insertions, 13 deletions
diff --git a/crypto/des_generic.c b/crypto/des_generic.c index dc085514408a..c4d8ecda4ddf 100644 --- a/crypto/des_generic.c +++ b/crypto/des_generic.c | |||
@@ -841,19 +841,6 @@ static void des_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) | |||
841 | d[1] = cpu_to_le32(L); | 841 | d[1] = cpu_to_le32(L); |
842 | } | 842 | } |
843 | 843 | ||
844 | /* | ||
845 | * RFC2451: | ||
846 | * | ||
847 | * For DES-EDE3, there is no known need to reject weak or | ||
848 | * complementation keys. Any weakness is obviated by the use of | ||
849 | * multiple keys. | ||
850 | * | ||
851 | * However, if the first two or last two independent 64-bit keys are | ||
852 | * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the | ||
853 | * same as DES. Implementers MUST reject keys that exhibit this | ||
854 | * property. | ||
855 | * | ||
856 | */ | ||
857 | int __des3_ede_setkey(u32 *expkey, u32 *flags, const u8 *key, | 844 | int __des3_ede_setkey(u32 *expkey, u32 *flags, const u8 *key, |
858 | unsigned int keylen) | 845 | unsigned int keylen) |
859 | { | 846 | { |