aboutsummaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorEvgeniy Polyakov <johnpol@2ka.mipt.ru>2007-10-11 07:58:16 -0400
committerHerbert Xu <herbert@gondor.apana.org.au>2008-01-10 16:16:03 -0500
commitc3041f9c93e31159f4e321abea7c1549d271e6a7 (patch)
tree12a4b27c2717f2935ccac0f1873c19e09492d4c7 /crypto
parent16d004a2eda7be2c6a2de63eca2ad3c6b57307b3 (diff)
[CRYPTO] hifn_795x: Detect weak keys
HIFN driver update to use DES weak key checks (exported in this patch). Signed-off-by: Evgeniy Polyakov <johnpol@2ka.mipt.ru> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/des_generic.c9
1 files changed, 5 insertions, 4 deletions
diff --git a/crypto/des_generic.c b/crypto/des_generic.c
index f75eafe1a875..355ecb71cb0d 100644
--- a/crypto/des_generic.c
+++ b/crypto/des_generic.c
@@ -628,7 +628,7 @@ static const u32 S8[64] = {
628 * Choice 1 has operated on the key. 628 * Choice 1 has operated on the key.
629 * 629 *
630 */ 630 */
631static unsigned long ekey(u32 *pe, const u8 *k) 631unsigned long des_ekey(u32 *pe, const u8 *k)
632{ 632{
633 /* K&R: long is at least 32 bits */ 633 /* K&R: long is at least 32 bits */
634 unsigned long a, b, c, d, w; 634 unsigned long a, b, c, d, w;
@@ -703,6 +703,7 @@ static unsigned long ekey(u32 *pe, const u8 *k)
703 /* Zero if weak key */ 703 /* Zero if weak key */
704 return w; 704 return w;
705} 705}
706EXPORT_SYMBOL_GPL(des_ekey);
706 707
707/* 708/*
708 * Decryption key expansion 709 * Decryption key expansion
@@ -786,7 +787,7 @@ static int des_setkey(struct crypto_tfm *tfm, const u8 *key,
786 int ret; 787 int ret;
787 788
788 /* Expand to tmp */ 789 /* Expand to tmp */
789 ret = ekey(tmp, key); 790 ret = des_ekey(tmp, key);
790 791
791 if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { 792 if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
792 *flags |= CRYPTO_TFM_RES_WEAK_KEY; 793 *flags |= CRYPTO_TFM_RES_WEAK_KEY;
@@ -873,9 +874,9 @@ static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key,
873 return -EINVAL; 874 return -EINVAL;
874 } 875 }
875 876
876 ekey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; 877 des_ekey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE;
877 dkey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; 878 dkey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE;
878 ekey(expkey, key); 879 des_ekey(expkey, key);
879 880
880 return 0; 881 return 0;
881} 882}