/* check for weak keys */
        if (!des_ekey(tmp, key) &&
-           (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+           (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
        if (!(crypto_memneq(key, &key[DES_KEY_SIZE], DES_KEY_SIZE) &&
            crypto_memneq(&key[DES_KEY_SIZE], &key[DES_KEY_SIZE * 2],
                          DES_KEY_SIZE)) &&
-           (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+           (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
         * weak key detection code.
         */
        ret = des_ekey(tmp, key);
-       if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
        if (unlikely(!((K[0] ^ K[2]) | (K[1] ^ K[3])) ||
                     !((K[2] ^ K[4]) | (K[3] ^ K[5]))) &&
-                    (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+                    (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
        /* Expand to tmp */
        ret = des_ekey(tmp, key);
 
-       if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
        if (unlikely(!((K[0] ^ K[2]) | (K[1] ^ K[3])) ||
                     !((K[2] ^ K[4]) | (K[3] ^ K[5]))) &&
-                    (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+                    (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
 
                crypto_aead_clear_flags(tfm, ~0);
                if (template[i].wk)
-                       crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+                       crypto_aead_set_flags(tfm,
+                                             CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
 
                if (template[i].klen > MAX_KEYLEN) {
                        pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
 
                crypto_aead_clear_flags(tfm, ~0);
                if (template[i].wk)
-                       crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+                       crypto_aead_set_flags(tfm,
+                                             CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
                if (template[i].klen > MAX_KEYLEN) {
                        pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
                               d, j, algo, template[i].klen, MAX_KEYLEN);
 
                crypto_cipher_clear_flags(tfm, ~0);
                if (template[i].wk)
-                       crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+                       crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
 
                ret = crypto_cipher_setkey(tfm, template[i].key,
                                           template[i].klen);
 
                crypto_skcipher_clear_flags(tfm, ~0);
                if (template[i].wk)
-                       crypto_skcipher_set_flags(tfm,
-                                                 CRYPTO_TFM_REQ_WEAK_KEY);
+                       crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
 
                ret = crypto_skcipher_setkey(tfm, template[i].key,
                                             template[i].klen);
                j++;
                crypto_skcipher_clear_flags(tfm, ~0);
                if (template[i].wk)
-                       crypto_skcipher_set_flags(tfm,
-                                                 CRYPTO_TFM_REQ_WEAK_KEY);
+                       crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
 
                ret = crypto_skcipher_setkey(tfm, template[i].key,
                                             template[i].klen);
 
  * @ctext:     Pointer to ciphertext
  * @len:       Length of @ptext and @ctext in bytes
  * @fail:      If set to one, the test need to fail
- * @wk:                Does the test need CRYPTO_TFM_REQ_WEAK_KEY
+ * @wk:                Does the test need CRYPTO_TFM_REQ_FORBID_WEAK_KEYS?
  *             ( e.g. test needs to fail due to a weak key )
  * @np:        numbers of SG to distribute data in (from 1 to MAX_TAP)
  * @tap:       How to distribute data in @np SGs
  * @anp:       Numbers of SG to distribute assoc data in
  * @fail:      setkey() failure expected?
  * @novrfy:    Decryption verification failure expected?
- * @wk:                Does the test need CRYPTO_TFM_REQ_WEAK_KEY?
+ * @wk:                Does the test need CRYPTO_TFM_REQ_FORBID_WEAK_KEYS?
  *             (e.g. setkey() needs to fail due to a weak key)
  * @klen:      Length of @key in bytes
  * @plen:      Length of @ptext in bytes
 
        }
 
        err = des_ekey(tmp, key);
-       if (err == 0 && (ctfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (err == 0 && (ctfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                ctfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
        if (keylen == DES_KEY_SIZE) {
                if (des_ekey(tmp, key) == 0) {
                        if (crypto_ablkcipher_get_flags(cipher) &
-                           CRYPTO_TFM_REQ_WEAK_KEY) {
+                           CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
                                u32 flags = CRYPTO_TFM_RES_WEAK_KEY;
 
                                crypto_ablkcipher_set_flags(cipher, flags);
 
                        if (des_ekey(tmp, keys.enckey) == 0) {
                                if (crypto_aead_get_flags(cipher) &
-                                   CRYPTO_TFM_REQ_WEAK_KEY) {
+                                   CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
                                        crypto_aead_set_flags(cipher, flags);
                                        return -EINVAL;
                                }
 
 
        if (unlikely(!((K[0] ^ K[2]) | (K[1] ^ K[3])) ||
                     !((K[2] ^ K[4]) | (K[3] ^ K[5]))) &&
-                    (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+                    (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
                        dev_dbg(dev, "weak 3DES key");
                        return -EINVAL;
                } else if (!des_ekey(tmp, key) &&
-                   (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_WEAK_KEY)) {
+                          (crypto_tfm_get_flags(tfm) &
+                           CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                        tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                        dev_dbg(dev, "weak DES key");
                        return -EINVAL;
 
                u32 tmp[DES_EXPKEY_WORDS];
                int ret = des_ekey(tmp, key);
 
-               if (unlikely(ret == 0) && (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+               if (unlikely(ret == 0) &&
+                   (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                        tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                        return -EINVAL;
                }
 
        }
 
        ret = des_ekey(tmp, key);
-       if (!ret && (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (!ret && (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
                goto out;
 
        if (*flags & CRYPTO_TFM_RES_WEAK_KEY) {
-               if (*flags & CRYPTO_TFM_REQ_WEAK_KEY) {
+               if (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
                        ret = -EINVAL;
                } else {
                        *flags &= ~CRYPTO_TFM_RES_WEAK_KEY;
                goto out;
 
        if (*flags & CRYPTO_TFM_RES_WEAK_KEY) {
-               if (*flags & CRYPTO_TFM_REQ_WEAK_KEY) {
+               if (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
                        ret = -EINVAL;
                        goto out;
                } else {
 
        }
 
        ret = des_ekey(tmp, key);
-       if (!ret && (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (!ret && (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
        }
 
        err = des_ekey(tmp, key);
-       if (err == 0 && (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (err == 0 && (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
        pr_debug("enter, keylen: %d\n", keylen);
 
        /* Do we need to test against weak key? */
-       if (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY) {
+       if (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) {
                u32 tmp[DES_EXPKEY_WORDS];
                int ret = des_ekey(tmp, key);
 
 
        }
 
        if (unlikely(!des_ekey(tmp, key)) &&
-           (crypto_ablkcipher_get_flags(cipher) & CRYPTO_TFM_REQ_WEAK_KEY)) {
+           (crypto_ablkcipher_get_flags(cipher) &
+            CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                return -EINVAL;
        }
 
                u32 tmp[DES_EXPKEY_WORDS];
 
                ret = des_ekey(tmp, key);
-               if (!ret && crypto_ablkcipher_get_flags(ablk) &
-                   CRYPTO_TFM_REQ_WEAK_KEY)
+               if (!ret && (crypto_ablkcipher_get_flags(ablk) &
+                            CRYPTO_TFM_REQ_FORBID_WEAK_KEYS))
                        goto weakkey;
        }
 
 
 
        if (keylen == DES_KEY_SIZE) {
                if (!des_ekey(tmp, key) &&
-                   (tfm->crt_flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+                   (tfm->crt_flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                        tfm->crt_flags |= CRYPTO_TFM_RES_WEAK_KEY;
                        return -EINVAL;
                }
 
        flags = crypto_skcipher_get_flags(tfm);
 
        ret = des_ekey(tmp, key);
-       if (unlikely(!ret) && (flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (unlikely(!ret) && (flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                crypto_skcipher_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY);
                dev_dbg(ss->dev, "Weak key %u\n", keylen);
                return -EINVAL;
 
        }
 
        if (unlikely(crypto_ablkcipher_get_flags(cipher) &
-                    CRYPTO_TFM_REQ_WEAK_KEY) &&
+                    CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) &&
            !des_ekey(tmp, key)) {
                crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_WEAK_KEY);
                return -EINVAL;
 
        }
 
        ret = des_ekey(tmp, key);
-       if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+       if (unlikely(ret == 0) &&
+           (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
-               pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_REQ_WEAK_KEY",
-                               __func__);
+               pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_RES_WEAK_KEY",
+                        __func__);
                return -EINVAL;
        }
 
        /* Checking key interdependency for weak key detection. */
        if (unlikely(!((K[0] ^ K[2]) | (K[1] ^ K[3])) ||
                                !((K[2] ^ K[4]) | (K[3] ^ K[5]))) &&
-                       (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+                       (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                *flags |= CRYPTO_TFM_RES_WEAK_KEY;
-               pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_REQ_WEAK_KEY",
-                               __func__);
+               pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_RES_WEAK_KEY",
+                        __func__);
                return -EINVAL;
        }
        for (i = 0; i < 3; i++) {
                ret = des_ekey(tmp, key + i*DES_KEY_SIZE);
-               if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
+               if (unlikely(ret == 0) &&
+                   (*flags & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) {
                        *flags |= CRYPTO_TFM_RES_WEAK_KEY;
-                       pr_debug(DEV_DBG_NAME " [%s]: "
-                                       "CRYPTO_TFM_REQ_WEAK_KEY", __func__);
+                       pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_RES_WEAK_KEY",
+                                __func__);
                        return -EINVAL;
                }
        }
 
                tfm = NULL;
                goto out;
        }
-       crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+       crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
        req = skcipher_request_alloc(tfm, GFP_NOFS);
        if (!req) {
                res = -ENOMEM;
                        mode->friendly_name,
                        crypto_skcipher_alg(tfm)->base.cra_driver_name);
        }
-       crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+       crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
        err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize);
        if (err)
                goto err_free_tfm;
 
                                full_alg_name);
                goto out_free;
        }
-       crypto_skcipher_set_flags(crypt_stat->tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+       crypto_skcipher_set_flags(crypt_stat->tfm,
+                                 CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
        rc = 0;
 out_free:
        kfree(full_alg_name);
                       "[%s]; rc = [%d]\n", full_alg_name, rc);
                goto out;
        }
-       crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_WEAK_KEY);
+       crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
        if (*key_size == 0)
                *key_size = crypto_skcipher_default_keysize(*key_tfm);
        get_random_bytes(dummy_key, *key_size);
 
        }
 
        /* ensure that the AES and tweak key are not identical */
-       if ((fips_enabled || crypto_skcipher_get_flags(tfm) &
-                            CRYPTO_TFM_REQ_WEAK_KEY) &&
+       if ((fips_enabled || (crypto_skcipher_get_flags(tfm) &
+                             CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) &&
            !crypto_memneq(key, key + (keylen / 2), keylen / 2)) {
                crypto_skcipher_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY);
                return -EINVAL;
 
 #define CRYPTO_TFM_REQ_MASK            0x000fff00
 #define CRYPTO_TFM_RES_MASK            0xfff00000
 
-#define CRYPTO_TFM_REQ_WEAK_KEY                0x00000100
+#define CRYPTO_TFM_REQ_FORBID_WEAK_KEYS        0x00000100
 #define CRYPTO_TFM_REQ_MAY_SLEEP       0x00000200
 #define CRYPTO_TFM_REQ_MAY_BACKLOG     0x00000400
 #define CRYPTO_TFM_RES_WEAK_KEY                0x00100000