diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2015-05-23 03:41:57 -0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2015-05-25 06:41:32 -0400 |
commit | 374d4ad18a0c4bc844dee42b3b43916e5f46608d (patch) | |
tree | 5ed06f31f36a694f9f8706a309f117735b2f1f00 /crypto/seqiv.c | |
parent | dd04446e48e859c913a395497ba1a289e707269a (diff) |
crypto: aead - Remove unused cryptoff parameter
This patch removes the cryptoff parameter now that all users
set it to zero.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/seqiv.c')
-rw-r--r-- | crypto/seqiv.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/crypto/seqiv.c b/crypto/seqiv.c index 16738c5f62bd..127970a69ecf 100644 --- a/crypto/seqiv.c +++ b/crypto/seqiv.c | |||
@@ -337,7 +337,7 @@ static int seqiv_aead_encrypt_compat(struct aead_request *req) | |||
337 | aead_request_set_callback(subreq, req->base.flags, compl, data); | 337 | aead_request_set_callback(subreq, req->base.flags, compl, data); |
338 | aead_request_set_crypt(subreq, dst, dst, | 338 | aead_request_set_crypt(subreq, dst, dst, |
339 | req->cryptlen - ivsize, req->iv); | 339 | req->cryptlen - ivsize, req->iv); |
340 | aead_request_set_ad(subreq, req->assoclen, 0); | 340 | aead_request_set_ad(subreq, req->assoclen); |
341 | 341 | ||
342 | memcpy(buf, req->iv, ivsize); | 342 | memcpy(buf, req->iv, ivsize); |
343 | crypto_xor(buf, ctx->salt, ivsize); | 343 | crypto_xor(buf, ctx->salt, ivsize); |
@@ -406,7 +406,7 @@ static int seqiv_aead_encrypt(struct aead_request *req) | |||
406 | aead_request_set_callback(subreq, req->base.flags, compl, data); | 406 | aead_request_set_callback(subreq, req->base.flags, compl, data); |
407 | aead_request_set_crypt(subreq, req->dst, req->dst, | 407 | aead_request_set_crypt(subreq, req->dst, req->dst, |
408 | req->cryptlen - ivsize, info); | 408 | req->cryptlen - ivsize, info); |
409 | aead_request_set_ad(subreq, req->assoclen + ivsize, 0); | 409 | aead_request_set_ad(subreq, req->assoclen + ivsize); |
410 | 410 | ||
411 | crypto_xor(info, ctx->salt, ivsize); | 411 | crypto_xor(info, ctx->salt, ivsize); |
412 | scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); | 412 | scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); |
@@ -473,7 +473,7 @@ static int seqiv_aead_decrypt_compat(struct aead_request *req) | |||
473 | aead_request_set_callback(subreq, req->base.flags, compl, data); | 473 | aead_request_set_callback(subreq, req->base.flags, compl, data); |
474 | aead_request_set_crypt(subreq, dst, dst, | 474 | aead_request_set_crypt(subreq, dst, dst, |
475 | req->cryptlen - ivsize, req->iv); | 475 | req->cryptlen - ivsize, req->iv); |
476 | aead_request_set_ad(subreq, req->assoclen, 0); | 476 | aead_request_set_ad(subreq, req->assoclen); |
477 | 477 | ||
478 | err = crypto_aead_decrypt(subreq); | 478 | err = crypto_aead_decrypt(subreq); |
479 | if (req->assoclen > 8) | 479 | if (req->assoclen > 8) |
@@ -501,7 +501,7 @@ static int seqiv_aead_decrypt(struct aead_request *req) | |||
501 | aead_request_set_callback(subreq, req->base.flags, compl, data); | 501 | aead_request_set_callback(subreq, req->base.flags, compl, data); |
502 | aead_request_set_crypt(subreq, req->src, req->dst, | 502 | aead_request_set_crypt(subreq, req->src, req->dst, |
503 | req->cryptlen - ivsize, req->iv); | 503 | req->cryptlen - ivsize, req->iv); |
504 | aead_request_set_ad(subreq, req->assoclen + ivsize, 0); | 504 | aead_request_set_ad(subreq, req->assoclen + ivsize); |
505 | 505 | ||
506 | scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); | 506 | scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); |
507 | if (req->src != req->dst) | 507 | if (req->src != req->dst) |