aboutsummaryrefslogtreecommitdiff
path: root/sys/dev/cesa
diff options
context:
space:
mode:
authorJohn Baldwin <jhb@FreeBSD.org>2020-05-11 20:40:30 +0000
committerJohn Baldwin <jhb@FreeBSD.org>2020-05-11 20:40:30 +0000
commit9b5631807ebc64e1fdfd2b23e402d79aec6b47c5 (patch)
tree13b176ac6a14f3f2132925aebaa41e87f60e2a71 /sys/dev/cesa
parent4bde63536c9817a41cc555805532d02ecf7afc92 (diff)
downloadsrc-9b5631807ebc64e1fdfd2b23e402d79aec6b47c5.tar.gz
src-9b5631807ebc64e1fdfd2b23e402d79aec6b47c5.zip
Remove incomplete support for plain MD5 from OCF.
Although a few drivers supported this algorithm, there were never any in-kernel consumers. cryptosoft and cryptodev never supported it, and there was not a software xform auth_hash for it. Reviewed by: cem Relnotes: yes Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D24767
Notes
Notes: svn path=/head/; revision=360920
Diffstat (limited to 'sys/dev/cesa')
-rw-r--r--sys/dev/cesa/cesa.c7
1 files changed, 0 insertions, 7 deletions
diff --git a/sys/dev/cesa/cesa.c b/sys/dev/cesa/cesa.c
index 44cf77a8acc0..eb7ef532ab76 100644
--- a/sys/dev/cesa/cesa.c
+++ b/sys/dev/cesa/cesa.c
@@ -1607,7 +1607,6 @@ cesa_auth_supported(struct cesa_softc *sc,
sc->sc_soc_id == MV_DEV_88F6810))
return (false);
/* FALLTHROUGH */
- case CRYPTO_MD5:
case CRYPTO_MD5_HMAC:
case CRYPTO_SHA1:
case CRYPTO_SHA1_HMAC:
@@ -1686,12 +1685,6 @@ cesa_newsession(device_t dev, crypto_session_t cses,
}
switch (csp->csp_auth_alg) {
- case CRYPTO_MD5:
- cs->cs_mblen = 1;
- cs->cs_hlen = (csp->csp_auth_mlen == 0) ? MD5_HASH_LEN :
- csp->csp_auth_mlen;
- cs->cs_config |= CESA_CSHD_MD5;
- break;
case CRYPTO_MD5_HMAC:
cs->cs_mblen = MD5_BLOCK_LEN;
cs->cs_hlen = (csp->csp_auth_mlen == 0) ? MD5_HASH_LEN :