Skip to content

Commit

Permalink
crypto: talitos - don't bad_key in ablkcipher setkey
Browse files Browse the repository at this point in the history
crypto/ablkcipher.c's setkey() has already checked against the min, max
key sizes before it calls here, and all max_keysize assignments in the
algorithm template array do not exceed TALITOS_MAX_KEY_SIZE.

Signed-off-by: Kim Phillips <[email protected]>
Signed-off-by: Herbert Xu <[email protected]>
  • Loading branch information
kimphill authored and herbertx committed Jul 15, 2011
1 parent febec54 commit 1c2b4ab
Showing 1 changed file with 0 additions and 11 deletions.
11 changes: 0 additions & 11 deletions drivers/crypto/talitos.c
Original file line number Diff line number Diff line change
Expand Up @@ -1378,22 +1378,11 @@ static int ablkcipher_setkey(struct crypto_ablkcipher *cipher,
const u8 *key, unsigned int keylen)
{
struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher);
struct ablkcipher_alg *alg = crypto_ablkcipher_alg(cipher);

if (keylen > TALITOS_MAX_KEY_SIZE)
goto badkey;

if (keylen < alg->min_keysize || keylen > alg->max_keysize)
goto badkey;

memcpy(&ctx->key, key, keylen);
ctx->keylen = keylen;

return 0;

badkey:
crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN);
return -EINVAL;
}

static void common_nonsnoop_unmap(struct device *dev,
Expand Down

0 comments on commit 1c2b4ab

Please sign in to comment.