mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 14:53:58 -04:00
crypto: Remove michael_mic from crypto_shash API
Remove the "michael_mic" crypto_shash algorithm, since it's no longer used. Its only users were wireless drivers, which have now been converted to use the michael_mic() function instead. It makes sense that no other users ever appeared: Michael MIC is an insecure algorithm that is specific to WPA TKIP, which itself was an interim security solution to replace the broken WEP standard. Acked-by: Geert Uytterhoeven <geert@linux-m68k.org> Signed-off-by: Eric Biggers <ebiggers@kernel.org> Acked-by: Herbert Xu <herbert@gondor.apana.org.au> Link: https://patch.msgid.link/20260408030651.80336-7-ebiggers@kernel.org Signed-off-by: Johannes Berg <johannes.berg@intel.com>
This commit is contained in:
committed by
Johannes Berg
parent
32a0e1c63c
commit
8c6d03b7a2
@@ -916,18 +916,6 @@ config CRYPTO_MD5
|
||||
help
|
||||
MD5 message digest algorithm (RFC1321), including HMAC support.
|
||||
|
||||
config CRYPTO_MICHAEL_MIC
|
||||
tristate "Michael MIC"
|
||||
select CRYPTO_HASH
|
||||
help
|
||||
Michael MIC (Message Integrity Code) (IEEE 802.11i)
|
||||
|
||||
Defined by the IEEE 802.11i TKIP (Temporal Key Integrity Protocol),
|
||||
known as WPA (Wif-Fi Protected Access).
|
||||
|
||||
This algorithm is required for TKIP, but it should not be used for
|
||||
other purposes because of the weakness of the algorithm.
|
||||
|
||||
config CRYPTO_RMD160
|
||||
tristate "RIPEMD-160"
|
||||
select CRYPTO_HASH
|
||||
|
||||
Reference in New Issue
Block a user