]> git.karo-electronics.de Git - karo-tx-linux.git/commitdiff
crypto: drivers - remove cra_list initialization
authorJussi Kivilinna <jussi.kivilinna@mbnet.fi>
Wed, 11 Jul 2012 11:20:56 +0000 (14:20 +0300)
committerHerbert Xu <herbert@gondor.apana.org.au>
Wed, 1 Aug 2012 09:47:28 +0000 (17:47 +0800)
Initialization of cra_list is currently mixed, most ciphers initialize this
field and most shashes do not. Initialization however is not needed at all
since cra_list is initialized/overwritten in __crypto_register_alg() with
list_add(). Therefore perform cleanup to remove all unneeded initializations
of this field in 'crypto/drivers/'.

Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: linux-geode@lists.infradead.org
Cc: Michal Ludvig <michal@logix.cz>
Cc: Dmitry Kasatkin <dmitry.kasatkin@nokia.com>
Cc: Varun Wadekar <vwadekar@nvidia.com>
Cc: Eric BĂ©nard <eric@eukrea.com>
Signed-off-by: Jussi Kivilinna <jussi.kivilinna@mbnet.fi>
Acked-by: Kent Yoder <key@linux.vnet.ibm.com>
Acked-by: Vladimir Zapolskiy <vladimir_zapolskiy@mentor.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
12 files changed:
drivers/crypto/atmel-aes.c
drivers/crypto/atmel-tdes.c
drivers/crypto/geode-aes.c
drivers/crypto/nx/nx-aes-cbc.c
drivers/crypto/nx/nx-aes-ccm.c
drivers/crypto/nx/nx-aes-ctr.c
drivers/crypto/nx/nx-aes-ecb.c
drivers/crypto/nx/nx-aes-gcm.c
drivers/crypto/omap-aes.c
drivers/crypto/padlock-aes.c
drivers/crypto/s5p-sss.c
drivers/crypto/tegra-aes.c

index 6bb20fffbf496e85fdccf2139f2fbe786032ba79..872ca8c8d83b08b398c9947549cf409487b95aec 100644 (file)
@@ -1017,7 +1017,6 @@ static int atmel_aes_register_algs(struct atmel_aes_dev *dd)
        int err, i, j;
 
        for (i = 0; i < ARRAY_SIZE(aes_algs); i++) {
-               INIT_LIST_HEAD(&aes_algs[i].cra_list);
                err = crypto_register_alg(&aes_algs[i]);
                if (err)
                        goto err_aes_algs;
@@ -1026,7 +1025,6 @@ static int atmel_aes_register_algs(struct atmel_aes_dev *dd)
        atmel_aes_hw_version_init(dd);
 
        if (dd->hw_version >= 0x130) {
-               INIT_LIST_HEAD(&aes_cfb64_alg[0].cra_list);
                err = crypto_register_alg(&aes_cfb64_alg[0]);
                if (err)
                        goto err_aes_cfb64_alg;
index eb2b61e57e2de394ad211dd661f405aac8be2ef3..53c1680b551316b8a201df8179d8591a62f4a085 100644 (file)
@@ -1044,7 +1044,6 @@ static int atmel_tdes_register_algs(struct atmel_tdes_dev *dd)
        int err, i, j;
 
        for (i = 0; i < ARRAY_SIZE(tdes_algs); i++) {
-               INIT_LIST_HEAD(&tdes_algs[i].cra_list);
                err = crypto_register_alg(&tdes_algs[i]);
                if (err)
                        goto err_tdes_algs;
index f3e36c86b6c32f76995e9a28f152e1386c6f0dbd..933fb4b4a4c720d5e1316a6a5fb113a9d676804e 100644 (file)
@@ -289,7 +289,6 @@ static struct crypto_alg geode_alg = {
        .cra_blocksize          =       AES_MIN_BLOCK_SIZE,
        .cra_ctxsize            =       sizeof(struct geode_aes_op),
        .cra_module                     =       THIS_MODULE,
-       .cra_list                       =       LIST_HEAD_INIT(geode_alg.cra_list),
        .cra_u                          =       {
                .cipher =       {
                        .cia_min_keysize        =       AES_MIN_KEY_SIZE,
@@ -402,7 +401,6 @@ static struct crypto_alg geode_cbc_alg = {
        .cra_alignmask          =       15,
        .cra_type                       =       &crypto_blkcipher_type,
        .cra_module                     =       THIS_MODULE,
-       .cra_list                       =       LIST_HEAD_INIT(geode_cbc_alg.cra_list),
        .cra_u                          =       {
                .blkcipher      =       {
                        .min_keysize    =       AES_MIN_KEY_SIZE,
@@ -489,7 +487,6 @@ static struct crypto_alg geode_ecb_alg = {
        .cra_alignmask          =       15,
        .cra_type                       =       &crypto_blkcipher_type,
        .cra_module                     =       THIS_MODULE,
-       .cra_list                       =       LIST_HEAD_INIT(geode_ecb_alg.cra_list),
        .cra_u                          =       {
                .blkcipher      =       {
                        .min_keysize    =       AES_MIN_KEY_SIZE,
index 69ed796ee327294f5ae1fdbbc1ae858cb1f33b42..a76d4c4f29f50798ed3ecafaa871d98a7d02c7e3 100644 (file)
@@ -127,7 +127,6 @@ struct crypto_alg nx_cbc_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_blkcipher_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_cbc_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_cbc_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_blkcipher = {
index 7aeac678b9c08e7660d825f48f394f17bc54dde0..ef5eae6d1400382a8830bca980752b123e12bf52 100644 (file)
@@ -430,7 +430,6 @@ struct crypto_alg nx_ccm_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_aead_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_ccm_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_ccm_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_aead = {
@@ -453,7 +452,6 @@ struct crypto_alg nx_ccm4309_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_nivaead_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_ccm4309_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_ccm_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_aead = {
index 52d4eb05e8f79a6a24a5e39bc2911e31f60d6c66..b6286f14680ba82fcb7a32136dddea9b2a24ce29 100644 (file)
@@ -141,7 +141,6 @@ struct crypto_alg nx_ctr_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_blkcipher_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_ctr_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_ctr_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_blkcipher = {
@@ -163,7 +162,6 @@ struct crypto_alg nx_ctr3686_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_blkcipher_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_ctr3686_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_ctr_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_blkcipher = {
index 7b77bc2d1df451724975e63e4b279b47f90469cd..ba5f1611336fe9fa5165cfa680e7acc2b7e38637 100644 (file)
@@ -126,7 +126,6 @@ struct crypto_alg nx_ecb_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_blkcipher_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_ecb_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_ecb_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_blkcipher = {
index 9ab1c7341dac3bbd7e0dcf50f71d35691d07b44a..c8109edc5cfb02063c1bd6c5914985846bccac2a 100644 (file)
@@ -316,7 +316,6 @@ struct crypto_alg nx_gcm_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_aead_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_gcm_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_gcm_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_aead = {
@@ -338,7 +337,6 @@ struct crypto_alg nx_gcm4106_aes_alg = {
        .cra_ctxsize     = sizeof(struct nx_crypto_ctx),
        .cra_type        = &crypto_nivaead_type,
        .cra_module      = THIS_MODULE,
-       .cra_list        = LIST_HEAD_INIT(nx_gcm4106_aes_alg.cra_list),
        .cra_init        = nx_crypto_ctx_aes_gcm_init,
        .cra_exit        = nx_crypto_ctx_exit,
        .cra_aead = {
index 63e57b57a12cb259ea27443070f543bcc1842956..093a8af59cbe46711fd0e750552598eb26f04d85 100644 (file)
@@ -876,7 +876,6 @@ static int omap_aes_probe(struct platform_device *pdev)
 
        for (i = 0; i < ARRAY_SIZE(algs); i++) {
                pr_debug("i: %d\n", i);
-               INIT_LIST_HEAD(&algs[i].cra_list);
                err = crypto_register_alg(&algs[i]);
                if (err)
                        goto err_algs;
index 37b2e9406af6d218785e77fada9aa6458b08e3a9..633ba945e153da2a61f88f4580afab6caaff2c73 100644 (file)
@@ -328,7 +328,6 @@ static struct crypto_alg aes_alg = {
        .cra_ctxsize            =       sizeof(struct aes_ctx),
        .cra_alignmask          =       PADLOCK_ALIGNMENT - 1,
        .cra_module             =       THIS_MODULE,
-       .cra_list               =       LIST_HEAD_INIT(aes_alg.cra_list),
        .cra_u                  =       {
                .cipher = {
                        .cia_min_keysize        =       AES_MIN_KEY_SIZE,
@@ -408,7 +407,6 @@ static struct crypto_alg ecb_aes_alg = {
        .cra_alignmask          =       PADLOCK_ALIGNMENT - 1,
        .cra_type               =       &crypto_blkcipher_type,
        .cra_module             =       THIS_MODULE,
-       .cra_list               =       LIST_HEAD_INIT(ecb_aes_alg.cra_list),
        .cra_u                  =       {
                .blkcipher = {
                        .min_keysize            =       AES_MIN_KEY_SIZE,
@@ -491,7 +489,6 @@ static struct crypto_alg cbc_aes_alg = {
        .cra_alignmask          =       PADLOCK_ALIGNMENT - 1,
        .cra_type               =       &crypto_blkcipher_type,
        .cra_module             =       THIS_MODULE,
-       .cra_list               =       LIST_HEAD_INIT(cbc_aes_alg.cra_list),
        .cra_u                  =       {
                .blkcipher = {
                        .min_keysize            =       AES_MIN_KEY_SIZE,
index bc986f806086dc0fab33f4ff5822811dba5a2f87..a22714412cda2061c26ccd5a26fe50a4e5891348 100644 (file)
@@ -626,7 +626,6 @@ static int s5p_aes_probe(struct platform_device *pdev)
        crypto_init_queue(&pdata->queue, CRYPTO_QUEUE_LEN);
 
        for (i = 0; i < ARRAY_SIZE(algs); i++) {
-               INIT_LIST_HEAD(&algs[i].cra_list);
                err = crypto_register_alg(&algs[i]);
                if (err)
                        goto err_algs;
index ac236f6724f4bf11d1130b1258af8eff0b731044..631149e50ef1ccf175aace390c8c9084c1c5af88 100644 (file)
@@ -1004,8 +1004,6 @@ static int tegra_aes_probe(struct platform_device *pdev)
 
        aes_dev = dd;
        for (i = 0; i < ARRAY_SIZE(algs); i++) {
-               INIT_LIST_HEAD(&algs[i].cra_list);
-
                algs[i].cra_priority = 300;
                algs[i].cra_ctxsize = sizeof(struct tegra_aes_ctx);
                algs[i].cra_module = THIS_MODULE;