diff options
author | Evgeniy Polyakov <johnpol@2ka.mipt.ru> | 2007-10-11 19:58:16 +0800 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2008-01-11 08:16:03 +1100 |
commit | c3041f9c93e31159f4e321abea7c1549d271e6a7 (patch) | |
tree | 12a4b27c2717f2935ccac0f1873c19e09492d4c7 /crypto | |
parent | 16d004a2eda7be2c6a2de63eca2ad3c6b57307b3 (diff) | |
download | kernel_samsung_smdk4412-c3041f9c93e31159f4e321abea7c1549d271e6a7.zip kernel_samsung_smdk4412-c3041f9c93e31159f4e321abea7c1549d271e6a7.tar.gz kernel_samsung_smdk4412-c3041f9c93e31159f4e321abea7c1549d271e6a7.tar.bz2 |
[CRYPTO] hifn_795x: Detect weak keys
HIFN driver update to use DES weak key checks (exported in this patch).
Signed-off-by: Evgeniy Polyakov <johnpol@2ka.mipt.ru>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/des_generic.c | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/crypto/des_generic.c b/crypto/des_generic.c index f75eafe..355ecb7 100644 --- a/crypto/des_generic.c +++ b/crypto/des_generic.c @@ -628,7 +628,7 @@ static const u32 S8[64] = { * Choice 1 has operated on the key. * */ -static unsigned long ekey(u32 *pe, const u8 *k) +unsigned long des_ekey(u32 *pe, const u8 *k) { /* K&R: long is at least 32 bits */ unsigned long a, b, c, d, w; @@ -703,6 +703,7 @@ static unsigned long ekey(u32 *pe, const u8 *k) /* Zero if weak key */ return w; } +EXPORT_SYMBOL_GPL(des_ekey); /* * Decryption key expansion @@ -786,7 +787,7 @@ static int des_setkey(struct crypto_tfm *tfm, const u8 *key, int ret; /* Expand to tmp */ - ret = ekey(tmp, key); + ret = des_ekey(tmp, key); if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { *flags |= CRYPTO_TFM_RES_WEAK_KEY; @@ -873,9 +874,9 @@ static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, return -EINVAL; } - ekey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; + des_ekey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; dkey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE; - ekey(expkey, key); + des_ekey(expkey, key); return 0; } |