|
@@ -2,6 +2,9 @@
|
|
|
#define _CRYPTO_XTS_H
|
|
|
|
|
|
#include <crypto/b128ops.h>
|
|
|
+#include <linux/crypto.h>
|
|
|
+#include <crypto/algapi.h>
|
|
|
+#include <linux/fips.h>
|
|
|
|
|
|
struct scatterlist;
|
|
|
struct blkcipher_desc;
|
|
@@ -24,4 +27,28 @@ int xts_crypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
|
struct scatterlist *src, unsigned int nbytes,
|
|
|
struct xts_crypt_req *req);
|
|
|
|
|
|
+static inline int xts_check_key(struct crypto_tfm *tfm,
|
|
|
+ const u8 *key, unsigned int keylen)
|
|
|
+{
|
|
|
+ u32 *flags = &tfm->crt_flags;
|
|
|
+
|
|
|
+ /*
|
|
|
+ * key consists of keys of equal size concatenated, therefore
|
|
|
+ * the length must be even.
|
|
|
+ */
|
|
|
+ if (keylen % 2) {
|
|
|
+ *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
|
|
|
+ return -EINVAL;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* ensure that the AES and tweak key are not identical */
|
|
|
+ if (fips_enabled &&
|
|
|
+ !crypto_memneq(key, key + (keylen / 2), keylen / 2)) {
|
|
|
+ *flags |= CRYPTO_TFM_RES_WEAK_KEY;
|
|
|
+ return -EINVAL;
|
|
|
+ }
|
|
|
+
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
#endif /* _CRYPTO_XTS_H */
|