mint0x33/arch/powerpc/crypto
Eric Biggers 8d906d183b crypto: hash - annotate algorithms taking optional key
commit a208fa8f33031b9e0aba44c7d1b7e68eb0cbd29e upstream.

We need to consistently enforce that keyed hashes cannot be used without
setting the key.  To do this we need a reliable way to determine whether
a given hash algorithm is keyed or not.  AF_ALG currently does this by
checking for the presence of a ->setkey() method.  However, this is
actually slightly broken because the CRC-32 algorithms implement
->setkey() but can also be used without a key.  (The CRC-32 "key" is not
actually a cryptographic key but rather represents the initial state.
If not overridden, then a default initial state is used.)

Prepare to fix this by introducing a flag CRYPTO_ALG_OPTIONAL_KEY which
indicates that the algorithm has a ->setkey() method, but it is not
required to be called.  Then set it on all the CRC-32 algorithms.

The same also applies to the Adler-32 implementation in Lustre.

Also, the cryptd and mcryptd templates have to pass through the flag
from their underlying algorithm.

Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-02-16 20:23:00 +01:00
..
aes-spe-core.S
aes-spe-glue.c
aes-spe-keys.S
aes-spe-modes.S
aes-spe-regs.h
aes-tab-4k.S
crc-vpmsum_test.c
crc32-vpmsum_core.S
crc32c-vpmsum_asm.S
crc32c-vpmsum_glue.c
crct10dif-vpmsum_asm.S
crct10dif-vpmsum_glue.c
Makefile
md5-asm.S
md5-glue.c
sha1-powerpc-asm.S
sha1-spe-asm.S
sha1-spe-glue.c
sha1.c
sha256-spe-asm.S
sha256-spe-glue.c