Commit 05a7238d authored by Ard Biesheuvel's avatar Ard Biesheuvel Committed by Herbert Xu

crypto: bcm/des - switch to new verification routines

Signed-off-by: default avatarArd Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 92c203e2
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
#include <crypto/aead.h> #include <crypto/aead.h>
#include <crypto/internal/aead.h> #include <crypto/internal/aead.h>
#include <crypto/aes.h> #include <crypto/aes.h>
#include <crypto/des.h> #include <crypto/internal/des.h>
#include <crypto/hmac.h> #include <crypto/hmac.h>
#include <crypto/sha.h> #include <crypto/sha.h>
#include <crypto/md5.h> #include <crypto/md5.h>
...@@ -1802,24 +1802,13 @@ static int des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, ...@@ -1802,24 +1802,13 @@ static int des_setkey(struct crypto_ablkcipher *cipher, const u8 *key,
unsigned int keylen) unsigned int keylen)
{ {
struct iproc_ctx_s *ctx = crypto_ablkcipher_ctx(cipher); struct iproc_ctx_s *ctx = crypto_ablkcipher_ctx(cipher);
u32 tmp[DES_EXPKEY_WORDS]; int err;
if (keylen == DES_KEY_SIZE) {
if (des_ekey(tmp, key) == 0) {
if (crypto_ablkcipher_get_flags(cipher) &
CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
u32 flags = CRYPTO_TFM_RES_WEAK_KEY;
crypto_ablkcipher_set_flags(cipher, flags); err = verify_ablkcipher_des_key(cipher, key);
return -EINVAL; if (err)
} return err;
}
ctx->cipher_type = CIPHER_TYPE_DES; ctx->cipher_type = CIPHER_TYPE_DES;
} else {
crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN);
return -EINVAL;
}
return 0; return 0;
} }
...@@ -1827,23 +1816,13 @@ static int threedes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, ...@@ -1827,23 +1816,13 @@ static int threedes_setkey(struct crypto_ablkcipher *cipher, const u8 *key,
unsigned int keylen) unsigned int keylen)
{ {
struct iproc_ctx_s *ctx = crypto_ablkcipher_ctx(cipher); struct iproc_ctx_s *ctx = crypto_ablkcipher_ctx(cipher);
int err;
if (keylen == (DES_KEY_SIZE * 3)) { err = verify_ablkcipher_des3_key(cipher, key);
u32 flags; if (err)
int ret; return err;
flags = crypto_ablkcipher_get_flags(cipher);
ret = __des3_verify_key(&flags, key);
if (unlikely(ret)) {
crypto_ablkcipher_set_flags(cipher, flags);
return ret;
}
ctx->cipher_type = CIPHER_TYPE_3DES; ctx->cipher_type = CIPHER_TYPE_3DES;
} else {
crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN);
return -EINVAL;
}
return 0; return 0;
} }
...@@ -2868,40 +2847,16 @@ static int aead_authenc_setkey(struct crypto_aead *cipher, ...@@ -2868,40 +2847,16 @@ static int aead_authenc_setkey(struct crypto_aead *cipher,
switch (ctx->alg->cipher_info.alg) { switch (ctx->alg->cipher_info.alg) {
case CIPHER_ALG_DES: case CIPHER_ALG_DES:
if (ctx->enckeylen == DES_KEY_SIZE) { if (verify_aead_des_key(cipher, keys.enckey, keys.enckeylen))
u32 tmp[DES_EXPKEY_WORDS]; return -EINVAL;
u32 flags = CRYPTO_TFM_RES_WEAK_KEY;
if (des_ekey(tmp, keys.enckey) == 0) {
if (crypto_aead_get_flags(cipher) &
CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
crypto_aead_set_flags(cipher, flags);
return -EINVAL;
}
}
ctx->cipher_type = CIPHER_TYPE_DES; ctx->cipher_type = CIPHER_TYPE_DES;
} else {
goto badkey;
}
break; break;
case CIPHER_ALG_3DES: case CIPHER_ALG_3DES:
if (ctx->enckeylen == (DES_KEY_SIZE * 3)) { if (verify_aead_des3_key(cipher, keys.enckey, keys.enckeylen))
u32 flags;
flags = crypto_aead_get_flags(cipher);
ret = __des3_verify_key(&flags, keys.enckey);
if (unlikely(ret)) {
crypto_aead_set_flags(cipher, flags);
return ret;
}
ctx->cipher_type = CIPHER_TYPE_3DES;
} else {
crypto_aead_set_flags(cipher,
CRYPTO_TFM_RES_BAD_KEY_LEN);
return -EINVAL; return -EINVAL;
}
ctx->cipher_type = CIPHER_TYPE_3DES;
break; break;
case CIPHER_ALG_AES: case CIPHER_ALG_AES:
switch (ctx->enckeylen) { switch (ctx->enckeylen) {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment