diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2006-08-13 00:16:39 -0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2006-09-20 21:41:02 -0400 |
commit | 560c06ae1ab7c677002ea3b6ac83521bf12ee07d (patch) | |
tree | 374ed69a7e23ba9d07458d20672aac6ae552ae51 /crypto/twofish_common.c | |
parent | 25cdbcd9e5d20e431f829cafce48a418830011f4 (diff) |
[CRYPTO] api: Get rid of flags argument to setkey
Now that the tfm is passed directly to setkey instead of the ctx, we no
longer need to pass the &tfm->crt_flags pointer.
This patch also gets rid of a few unnecessary checks on the key length
for ciphers as the cipher layer guarantees that the key length is within
the bounds specified by the algorithm.
Rather than testing dia_setkey every time, this patch does it only once
during crypto_alloc_tfm. The redundant check from crypto_digest_setkey
is also removed.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/twofish_common.c')
-rw-r--r-- | crypto/twofish_common.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/crypto/twofish_common.c b/crypto/twofish_common.c index 1ae0280c2513..b4b9c0c3f4ae 100644 --- a/crypto/twofish_common.c +++ b/crypto/twofish_common.c | |||
@@ -580,11 +580,11 @@ static const u8 calc_sb_tbl[512] = { | |||
580 | ctx->a[(j) + 1] = rol32(y, 9) | 580 | ctx->a[(j) + 1] = rol32(y, 9) |
581 | 581 | ||
582 | /* Perform the key setup. */ | 582 | /* Perform the key setup. */ |
583 | int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, | 583 | int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) |
584 | unsigned int key_len, u32 *flags) | ||
585 | { | 584 | { |
586 | 585 | ||
587 | struct twofish_ctx *ctx = crypto_tfm_ctx(tfm); | 586 | struct twofish_ctx *ctx = crypto_tfm_ctx(tfm); |
587 | u32 *flags = &tfm->crt_flags; | ||
588 | 588 | ||
589 | int i, j, k; | 589 | int i, j, k; |
590 | 590 | ||
@@ -600,7 +600,7 @@ int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, | |||
600 | u8 tmp; | 600 | u8 tmp; |
601 | 601 | ||
602 | /* Check key length. */ | 602 | /* Check key length. */ |
603 | if (key_len != 16 && key_len != 24 && key_len != 32) | 603 | if (key_len % 8) |
604 | { | 604 | { |
605 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | 605 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; |
606 | return -EINVAL; /* unsupported key length */ | 606 | return -EINVAL; /* unsupported key length */ |