From: Eric Biggers <ebigg...@google.com>

Now that crypto_chacha20_setkey() and crypto_chacha20_init() use the
unaligned access macros and crypto_xor() also accepts unaligned buffers,
there is no need to have a cra_alignmask set for chacha20-generic.

Signed-off-by: Eric Biggers <ebigg...@google.com>
---
 crypto/chacha20_generic.c | 1 -
 1 file changed, 1 deletion(-)

diff --git a/crypto/chacha20_generic.c b/crypto/chacha20_generic.c
index b5a10ebf1b82..bb4affbd591c 100644
--- a/crypto/chacha20_generic.c
+++ b/crypto/chacha20_generic.c
@@ -105,7 +105,6 @@ static struct skcipher_alg alg = {
        .base.cra_priority      = 100,
        .base.cra_blocksize     = 1,
        .base.cra_ctxsize       = sizeof(struct chacha20_ctx),
-       .base.cra_alignmask     = sizeof(u32) - 1,
        .base.cra_module        = THIS_MODULE,
 
        .min_keysize            = CHACHA20_KEY_SIZE,
-- 
2.15.0.448.gf294e3d99a-goog

Reply via email to