diff options
author | Evgeniy Polyakov <johnpol@2ka.mipt.ru> | 2007-10-11 07:58:16 -0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2008-01-10 16:16:03 -0500 |
commit | c3041f9c93e31159f4e321abea7c1549d271e6a7 (patch) | |
tree | 12a4b27c2717f2935ccac0f1873c19e09492d4c7 /crypto/des_generic.c | |
parent | 16d004a2eda7be2c6a2de63eca2ad3c6b57307b3 (diff) |
[CRYPTO] hifn_795x: Detect weak keys
HIFN driver update to use DES weak key checks (exported in this patch).
Signed-off-by: Evgeniy Polyakov <johnpol@2ka.mipt.ru>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/des_generic.c')
-rw-r--r-- | crypto/des_generic.c | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/crypto/des_generic.c b/crypto/des_generic.c index f75eafe1a875..355ecb71cb0d 100644 --- a/crypto/des_generic.c +++ b/crypto/des_generic.c | |||
@@ -628,7 +628,7 @@ static const u32 S8[64] = { | |||
628 | * Choice 1 has operated on the key. | 628 | * Choice 1 has operated on the key. |
629 | * | 629 | * |
630 | */ | 630 | */ |
631 | static unsigned long ekey(u32 *pe, const u8 *k) | 631 | unsigned long des_ekey(u32 *pe, const u8 *k) |
632 | { | 632 | { |
633 | /* K&R: long is at least 32 bits */ | 633 | /* K&R: long is at least 32 bits */ |
634 | unsigned long a, b, c, d, w; | 634 | unsigned long a, b, c, d, w; |
@@ -703,6 +703,7 @@ static unsigned long ekey(u32 *pe, const u8 *k) | |||
703 | /* Zero if weak key */ | 703 | /* Zero if weak key */ |
704 | return w; | 704 | return w; |
705 | } | 705 | } |
706 | EXPORT_SYMBOL_GPL(des_ekey); | ||
706 | 707 | ||
707 | /* | 708 | /* |
708 | * Decryption key expansion | 709 | * Decryption key expansion |
@@ -786,7 +787,7 @@ static int des_setkey(struct crypto_tfm *tfm, const u8 *key, | |||
786 | int ret; | 787 | int ret; |
787 | 788 | ||
788 | /* Expand to tmp */ | 789 | /* Expand to tmp */ |
789 | ret = ekey(tmp, key); | 790 | ret = des_ekey(tmp, key); |
790 | 791 | ||
791 | if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { | 792 | if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { |
792 | *flags |= CRYPTO_TFM_RES_WEAK_KEY; | 793 | *flags |= CRYPTO_TFM_RES_WEAK_KEY; |
@@ -873,9 +874,9 @@ static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, | |||
873 | return -EINVAL; | 874 | return -EINVAL; |
874 | } | 875 | } |
875 | 876 | ||
876 | ekey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; | 877 | des_ekey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; |
877 | dkey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; | 878 | dkey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; |
878 | ekey(expkey, key); | 879 | des_ekey(expkey, key); |
879 | 880 | ||
880 | return 0; | 881 | return 0; |
881 | } | 882 | } |