diff options
author | Eric Biggers <ebiggers@google.com> | 2023-10-19 08:53:40 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2023-10-27 13:04:25 +0300 |
commit | 2125c11efd83a5aeb9bf04bcbc83b49e8d7e2afb (patch) | |
tree | 5ecea2ac18f8a6b7a1f38d9fbd50ecf0f06b12ad | |
parent | eed577b9a9220dc9f3968b54d055a3884d219897 (diff) | |
download | linux-2125c11efd83a5aeb9bf04bcbc83b49e8d7e2afb.tar.xz |
crypto: testmgr - stop checking crypto_shash_alignmask
Now that the shash algorithm type does not support nonzero alignmasks,
crypto_shash_alignmask() always returns 0 and will be removed. In
preparation for this, stop checking crypto_shash_alignmask() in testmgr.
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r-- | crypto/testmgr.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 54135c7610f0..48a0929c7a15 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -1275,7 +1275,6 @@ static int test_shash_vec_cfg(const struct hash_testvec *vec, u8 *hashstate) { struct crypto_shash *tfm = desc->tfm; - const unsigned int alignmask = crypto_shash_alignmask(tfm); const unsigned int digestsize = crypto_shash_digestsize(tfm); const unsigned int statesize = crypto_shash_statesize(tfm); const char *driver = crypto_shash_driver_name(tfm); @@ -1287,7 +1286,7 @@ static int test_shash_vec_cfg(const struct hash_testvec *vec, /* Set the key, if specified */ if (vec->ksize) { err = do_setkey(crypto_shash_setkey, tfm, vec->key, vec->ksize, - cfg, alignmask); + cfg, 0); if (err) { if (err == vec->setkey_error) return 0; @@ -1304,7 +1303,7 @@ static int test_shash_vec_cfg(const struct hash_testvec *vec, } /* Build the scatterlist for the source data */ - err = build_hash_sglist(tsgl, vec, cfg, alignmask, divs); + err = build_hash_sglist(tsgl, vec, cfg, 0, divs); if (err) { pr_err("alg: shash: %s: error preparing scatterlist for test vector %s, cfg=\"%s\"\n", driver, vec_name, cfg->name); |