diff options
author | Eric Biggers <ebiggers@google.com> | 2017-11-22 20:51:37 +0100 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-11-29 07:33:32 +0100 |
commit | a1c73383c032ea467c4e766d4471edf91cf384cb (patch) | |
tree | 03773215ea6b72cc2fbdf5cb0b0b512c5ac11fb6 /crypto/chacha20_generic.c | |
parent | crypto: chacha20 - Use unaligned access macros when loading key and IV (diff) | |
download | linux-a1c73383c032ea467c4e766d4471edf91cf384cb.tar.xz linux-a1c73383c032ea467c4e766d4471edf91cf384cb.zip |
crypto: chacha20 - Remove cra_alignmask
Now that crypto_chacha20_setkey() and crypto_chacha20_init() use the
unaligned access macros and crypto_xor() also accepts unaligned buffers,
there is no need to have a cra_alignmask set for chacha20-generic.
Signed-off-by: Eric Biggers <ebiggers@google.com>
Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/chacha20_generic.c')
-rw-r--r-- | crypto/chacha20_generic.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/crypto/chacha20_generic.c b/crypto/chacha20_generic.c index b5a10ebf1b82..bb4affbd591c 100644 --- a/crypto/chacha20_generic.c +++ b/crypto/chacha20_generic.c @@ -105,7 +105,6 @@ static struct skcipher_alg alg = { .base.cra_priority = 100, .base.cra_blocksize = 1, .base.cra_ctxsize = sizeof(struct chacha20_ctx), - .base.cra_alignmask = sizeof(u32) - 1, .base.cra_module = THIS_MODULE, .min_keysize = CHACHA20_KEY_SIZE, |