Loading drivers/crypto/n2_core.c +9 −4 Original line number Diff line number Diff line Loading @@ -788,13 +788,18 @@ static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); struct n2_cipher_context *ctx = crypto_tfm_ctx(tfm); struct n2_cipher_alg *n2alg = n2_cipher_alg(tfm); u32 flags; int err; flags = crypto_ablkcipher_get_flags(cipher); err = __des3_verify_key(&flags, key); if (unlikely(err)) { crypto_ablkcipher_set_flags(cipher, flags); return err; } ctx->enc_type = n2alg->enc_type; if (keylen != (3 * DES_KEY_SIZE)) { crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); return -EINVAL; } ctx->key_len = keylen; memcpy(ctx->key.des3, key, keylen); return 0; Loading Loading
drivers/crypto/n2_core.c +9 −4 Original line number Diff line number Diff line Loading @@ -788,13 +788,18 @@ static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); struct n2_cipher_context *ctx = crypto_tfm_ctx(tfm); struct n2_cipher_alg *n2alg = n2_cipher_alg(tfm); u32 flags; int err; flags = crypto_ablkcipher_get_flags(cipher); err = __des3_verify_key(&flags, key); if (unlikely(err)) { crypto_ablkcipher_set_flags(cipher, flags); return err; } ctx->enc_type = n2alg->enc_type; if (keylen != (3 * DES_KEY_SIZE)) { crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); return -EINVAL; } ctx->key_len = keylen; memcpy(ctx->key.des3, key, keylen); return 0; Loading