summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2015-01-16 08:09:21 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2015-01-20 04:44:15 +0100
commit0c5c8e646cd9832b5e307e541264e4ff7de85bd7 (patch)
treed0ffad2d49412ff96a91951c3d3377a798f0aad6 /crypto
parentcrypto: qat - don't need qat_auth_state struct (diff)
downloadlinux-0c5c8e646cd9832b5e307e541264e4ff7de85bd7.tar.xz
linux-0c5c8e646cd9832b5e307e541264e4ff7de85bd7.zip
crypto: cts - Remove bogus use of seqiv
The seqiv generator is completely inappropriate for cts as it's designed for IPsec algorithms. Since cts users do not actually use the IV generator we can just fall back to the default. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Acked-by: Maciej ?enczykowski <zenczykowski@gmail.com>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/cts.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/crypto/cts.c b/crypto/cts.c
index bd9405820e8a..6a8089c4d4b4 100644
--- a/crypto/cts.c
+++ b/crypto/cts.c
@@ -307,8 +307,6 @@ static struct crypto_instance *crypto_cts_alloc(struct rtattr **tb)
inst->alg.cra_blkcipher.min_keysize = alg->cra_blkcipher.min_keysize;
inst->alg.cra_blkcipher.max_keysize = alg->cra_blkcipher.max_keysize;
- inst->alg.cra_blkcipher.geniv = "seqiv";
-
inst->alg.cra_ctxsize = sizeof(struct crypto_cts_ctx);
inst->alg.cra_init = crypto_cts_init_tfm;