From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-alma10-1.taild15c8.ts.net [100.103.45.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 91D6039EF1E; Fri, 22 May 2026 05:31:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=100.103.45.18 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779427868; cv=none; b=uvE/vgbJ1g6c4hc4y2dqV3+ZyxleXr6IzSHD7uC+uKx5lJ5a7SJUINNuHbzMQ5Inl/Pmkk7Kb1ZYLus/3vTLI+KAdJyUWPMMnn6v9BQBvrU1ERsgUKGRbX4V3a0RkMea4f6BigRcGJX4Pryqda549pcUL8tDuwhNkILSvtExYKA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779427868; c=relaxed/simple; bh=3AAEZjaRK507ex3BYJ5Fuxt8FZkNq3ASxA/sK1xrsH8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=i2MQfQ6QJlwk+at9sT1nB3rWSjJWuIvM3+Xta1b3FGUHFhedsegnPEln47Wm7tNGw1WxlspeAHs0LRvK8IWr1jemcbB5M7CpcWigbPVsmZZqjfBYGdpJ9UnCDflL0ffIfxXKhp0r41K4FAW31gRB+NHtr/l71Gk6Bji8RrED5tw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=csgCnv12; arc=none smtp.client-ip=100.103.45.18 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="csgCnv12" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 51C2C1F000E9; Fri, 22 May 2026 05:31:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel.org; s=k20260515; t=1779427865; bh=uWvNpb1256Gs/nAAgMw5xRh+0CIJM6zXjVMv2A02v+8=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=csgCnv121CG8Dji8w4I9UoXVsx1v/07a2KRvFBBooMerr4c1DUdIRkgYLgtqLnNGx DzfLXdYMRhYSlqne8i+E1phzz8JZjGoIYmpaOEdQ7/wr+85UcfUB2E6A4/Tptqb0da ze201qHRP3PptWFaZNNBpRW8aQ9Wzufpu5R6tVcRQmz6zcg0217jZj2TjAtT7msu47 VoCYErd0AeKa8K2WkQ9fIQ/kONRV1mdgM2dlLk9YNO3sMm+MKm9J0rbPRvy25m5iAR 93CZjHmM0vr+L5nP3e54ajnJEZ3tyql8VNG0FE5tWrZO7579smO50zjLqGWcb14HVx FePHenEY9Bmeg== From: Eric Biggers To: netdev@vger.kernel.org Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Eric Dumazet , Neal Cardwell , Kuniyuki Iwashima , "David S . Miller" , David Ahern , Jakub Kicinski , Paolo Abeni , Simon Horman , Ard Biesheuvel , "Jason A . Donenfeld" , Herbert Xu , Dmitry Safonov <0x7f454c46@gmail.com>, Eric Biggers Subject: [PATCH net-next 3/6] crypto: api - Remove crypto_clone_tfm() Date: Fri, 22 May 2026 00:30:25 -0500 Message-ID: <20260522053028.91165-4-ebiggers@kernel.org> X-Mailer: git-send-email 2.54.0 In-Reply-To: <20260522053028.91165-1-ebiggers@kernel.org> References: <20260522053028.91165-1-ebiggers@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Since all callers of crypto_clone_tfm() have been removed, remove it. Note that no tests need to be removed, as this function had no tests. Reviewed-by: Ard Biesheuvel Signed-off-by: Eric Biggers --- crypto/api.c | 26 -------------------------- crypto/internal.h | 2 -- 2 files changed, 28 deletions(-) diff --git a/crypto/api.c b/crypto/api.c index 74e17d5049c9..d019d1979857 100644 --- a/crypto/api.c +++ b/crypto/api.c @@ -558,36 +558,10 @@ void *crypto_create_tfm_node(struct crypto_alg *alg, out: return mem; } EXPORT_SYMBOL_GPL(crypto_create_tfm_node); -void *crypto_clone_tfm(const struct crypto_type *frontend, - struct crypto_tfm *otfm) -{ - struct crypto_alg *alg = otfm->__crt_alg; - struct crypto_tfm *tfm; - char *mem; - - mem = ERR_PTR(-ESTALE); - if (unlikely(!crypto_mod_get(alg))) - goto out; - - mem = crypto_alloc_tfmmem(alg, frontend, otfm->node, GFP_ATOMIC); - if (IS_ERR(mem)) { - crypto_mod_put(alg); - goto out; - } - - tfm = (struct crypto_tfm *)(mem + frontend->tfmsize); - tfm->crt_flags = otfm->crt_flags; - tfm->fb = tfm; - -out: - return mem; -} -EXPORT_SYMBOL_GPL(crypto_clone_tfm); - struct crypto_alg *crypto_find_alg(const char *alg_name, const struct crypto_type *frontend, u32 type, u32 mask) { if (frontend) { diff --git a/crypto/internal.h b/crypto/internal.h index 8fbe0226d48e..96f84abfac91 100644 --- a/crypto/internal.h +++ b/crypto/internal.h @@ -124,12 +124,10 @@ struct crypto_tfm *__crypto_alloc_tfmgfp(struct crypto_alg *alg, u32 type, u32 mask, gfp_t gfp); struct crypto_tfm *__crypto_alloc_tfm(struct crypto_alg *alg, u32 type, u32 mask); void *crypto_create_tfm_node(struct crypto_alg *alg, const struct crypto_type *frontend, int node); -void *crypto_clone_tfm(const struct crypto_type *frontend, - struct crypto_tfm *otfm); static inline void *crypto_create_tfm(struct crypto_alg *alg, const struct crypto_type *frontend) { return crypto_create_tfm_node(alg, frontend, NUMA_NO_NODE); -- 2.54.0