summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorHerbert Xu2015-05-21 09:11:07 +0200
committerHerbert Xu2015-05-22 05:25:54 +0200
commit56fcf73a29007aa7bec2e3fc5da2962f3f72d610 (patch)
tree23800ff545358358aac1e9ae47c78f4c10373e0d
parentcrypto: ixp4xx - Use crypto_aead_maxauthsize (diff)
downloadkernel-qcow2-linux-56fcf73a29007aa7bec2e3fc5da2962f3f72d610.tar.gz
kernel-qcow2-linux-56fcf73a29007aa7bec2e3fc5da2962f3f72d610.tar.xz
kernel-qcow2-linux-56fcf73a29007aa7bec2e3fc5da2962f3f72d610.zip
crypto: nx - Remove unnecessary maxauthsize check
The crypto layer already checks maxauthsize when setauthsize is called. So there is no need to check it again within setauthsize. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--drivers/crypto/nx/nx-aes-gcm.c3
1 files changed, 0 insertions, 3 deletions
diff --git a/drivers/crypto/nx/nx-aes-gcm.c b/drivers/crypto/nx/nx-aes-gcm.c
index 88c562434bc0..e4e64f688158 100644
--- a/drivers/crypto/nx/nx-aes-gcm.c
+++ b/drivers/crypto/nx/nx-aes-gcm.c
@@ -96,9 +96,6 @@ out:
static int gcm_aes_nx_setauthsize(struct crypto_aead *tfm,
unsigned int authsize)
{
- if (authsize > crypto_aead_alg(tfm)->maxauthsize)
- return -EINVAL;
-
crypto_aead_crt(tfm)->authsize = authsize;
return 0;