summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2015-01-16 18:09:21 +1100
committerHerbert Xu <herbert@gondor.apana.org.au>2015-01-20 14:44:15 +1100
commit0c5c8e646cd9832b5e307e541264e4ff7de85bd7 (patch)
treed0ffad2d49412ff96a91951c3d3377a798f0aad6 /crypto
parentb2c3f7cdad7673e00a449b879fb2b20d5c164797 (diff)
downloadlwn-0c5c8e646cd9832b5e307e541264e4ff7de85bd7.tar.gz
lwn-0c5c8e646cd9832b5e307e541264e4ff7de85bd7.zip
crypto: cts - Remove bogus use of seqiv
The seqiv generator is completely inappropriate for cts as it's designed for IPsec algorithms. Since cts users do not actually use the IV generator we can just fall back to the default. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Acked-by: Maciej ?enczykowski <zenczykowski@gmail.com>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/cts.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/crypto/cts.c b/crypto/cts.c
index bd9405820e8a..6a8089c4d4b4 100644
--- a/crypto/cts.c
+++ b/crypto/cts.c
@@ -307,8 +307,6 @@ static struct crypto_instance *crypto_cts_alloc(struct rtattr **tb)
inst->alg.cra_blkcipher.min_keysize = alg->cra_blkcipher.min_keysize;
inst->alg.cra_blkcipher.max_keysize = alg->cra_blkcipher.max_keysize;
- inst->alg.cra_blkcipher.geniv = "seqiv";
-
inst->alg.cra_ctxsize = sizeof(struct crypto_cts_ctx);
inst->alg.cra_init = crypto_cts_init_tfm;