Re: [PATCH v2 00/30] crypto: DES/3DES cleanup

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 27 Jun 2019 at 16:44, Horia Geanta <horia.geanta@xxxxxxx> wrote:
>
> On 6/27/2019 3:03 PM, Ard Biesheuvel wrote:
> > n my effort to remove crypto_alloc_cipher() invocations from non-crypto
> > code, i ran into a DES call in the CIFS driver. This is addressed in
> > patch #30.
> >
> > The other patches are cleanups for the quirky DES interface, and lots
> > of duplication of the weak key checks etc.
> >
> > Changes since vpub/scm/linux/kernel/git/arm64/linux.git/log/?h=for-next/fixes1/RFC:
> > - fix build errors in various drivers that i failed to catch in my
> >   initial testing
> > - put all caam changes into the correct patch
> > - fix weak key handling error flagged by the self tests, as reported
> >   by Eric.
> I am seeing a similar (?) issue:
> alg: skcipher: ecb-des-caam setkey failed on test vector 4; expected_error=-22, actual_error=-126, flags=0x100101
>
> crypto_des_verify_key() in include/crypto/internal/des.h returns -ENOKEY,
> while testmgr expects -EINVAL (setkey_error = -EINVAL in the test vector).
>
> I assume crypto_des_verify_key() should return -EINVAL, not -ENOKEY.
>

Yes, but I tried to keep handling of the crypto_tfm flags out of the
library interface.

I will try to find a way to solve this cleanly.



[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux