summaryrefslogtreecommitdiffstats
path: root/crypto/seqiv.c
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2015-05-23 03:41:57 -0400
committerHerbert Xu <herbert@gondor.apana.org.au>2015-05-25 06:41:32 -0400
commit374d4ad18a0c4bc844dee42b3b43916e5f46608d (patch)
tree5ed06f31f36a694f9f8706a309f117735b2f1f00 /crypto/seqiv.c
parentdd04446e48e859c913a395497ba1a289e707269a (diff)
crypto: aead - Remove unused cryptoff parameter
This patch removes the cryptoff parameter now that all users set it to zero. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/seqiv.c')
-rw-r--r--crypto/seqiv.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/crypto/seqiv.c b/crypto/seqiv.c
index 16738c5f62bd..127970a69ecf 100644
--- a/crypto/seqiv.c
+++ b/crypto/seqiv.c
@@ -337,7 +337,7 @@ static int seqiv_aead_encrypt_compat(struct aead_request *req)
337 aead_request_set_callback(subreq, req->base.flags, compl, data); 337 aead_request_set_callback(subreq, req->base.flags, compl, data);
338 aead_request_set_crypt(subreq, dst, dst, 338 aead_request_set_crypt(subreq, dst, dst,
339 req->cryptlen - ivsize, req->iv); 339 req->cryptlen - ivsize, req->iv);
340 aead_request_set_ad(subreq, req->assoclen, 0); 340 aead_request_set_ad(subreq, req->assoclen);
341 341
342 memcpy(buf, req->iv, ivsize); 342 memcpy(buf, req->iv, ivsize);
343 crypto_xor(buf, ctx->salt, ivsize); 343 crypto_xor(buf, ctx->salt, ivsize);
@@ -406,7 +406,7 @@ static int seqiv_aead_encrypt(struct aead_request *req)
406 aead_request_set_callback(subreq, req->base.flags, compl, data); 406 aead_request_set_callback(subreq, req->base.flags, compl, data);
407 aead_request_set_crypt(subreq, req->dst, req->dst, 407 aead_request_set_crypt(subreq, req->dst, req->dst,
408 req->cryptlen - ivsize, info); 408 req->cryptlen - ivsize, info);
409 aead_request_set_ad(subreq, req->assoclen + ivsize, 0); 409 aead_request_set_ad(subreq, req->assoclen + ivsize);
410 410
411 crypto_xor(info, ctx->salt, ivsize); 411 crypto_xor(info, ctx->salt, ivsize);
412 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); 412 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1);
@@ -473,7 +473,7 @@ static int seqiv_aead_decrypt_compat(struct aead_request *req)
473 aead_request_set_callback(subreq, req->base.flags, compl, data); 473 aead_request_set_callback(subreq, req->base.flags, compl, data);
474 aead_request_set_crypt(subreq, dst, dst, 474 aead_request_set_crypt(subreq, dst, dst,
475 req->cryptlen - ivsize, req->iv); 475 req->cryptlen - ivsize, req->iv);
476 aead_request_set_ad(subreq, req->assoclen, 0); 476 aead_request_set_ad(subreq, req->assoclen);
477 477
478 err = crypto_aead_decrypt(subreq); 478 err = crypto_aead_decrypt(subreq);
479 if (req->assoclen > 8) 479 if (req->assoclen > 8)
@@ -501,7 +501,7 @@ static int seqiv_aead_decrypt(struct aead_request *req)
501 aead_request_set_callback(subreq, req->base.flags, compl, data); 501 aead_request_set_callback(subreq, req->base.flags, compl, data);
502 aead_request_set_crypt(subreq, req->src, req->dst, 502 aead_request_set_crypt(subreq, req->src, req->dst,
503 req->cryptlen - ivsize, req->iv); 503 req->cryptlen - ivsize, req->iv);
504 aead_request_set_ad(subreq, req->assoclen + ivsize, 0); 504 aead_request_set_ad(subreq, req->assoclen + ivsize);
505 505
506 scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); 506 scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0);
507 if (req->src != req->dst) 507 if (req->src != req->dst)