@@ -89,8 +89,6 @@ static int _get_more_prng_bytes(struct prng_context *ctx, int cont_test)
{
int i;
unsigned char tmp[DEFAULT_BLK_SZ];
- unsigned char *output = NULL;
-
dbgprint(KERN_CRIT "Calling _get_more_prng_bytes for context %p\n",
ctx);
@@ -104,9 +102,8 @@ static int _get_more_prng_bytes(struct prng_context *ctx, int cont_test)
* This gives us an intermediate value I
*/
memcpy(tmp, ctx->DT, DEFAULT_BLK_SZ);
- output = ctx->I;
hexdump("tmp stage 0: ", tmp, DEFAULT_BLK_SZ);
- crypto_cipher_encrypt_one(ctx->tfm, output, tmp);
+ crypto_cipher_encrypt_one(ctx->tfm, ctx->I, tmp);
/*
* Next xor I with our secret vector V
@@ -115,8 +112,7 @@ static int _get_more_prng_bytes(struct prng_context *ctx, int cont_test)
*/
xor_vectors(ctx->I, ctx->V, tmp, DEFAULT_BLK_SZ);
hexdump("tmp stage 1: ", tmp, DEFAULT_BLK_SZ);
- output = ctx->rand_data;
- crypto_cipher_encrypt_one(ctx->tfm, output, tmp);
+ crypto_cipher_encrypt_one(ctx->tfm, ctx->rand_data, tmp);
/*
* First check that we didn't produce the same
@@ -139,9 +135,8 @@ static int _get_more_prng_bytes(struct prng_context *ctx, int cont_test)
* and encrypt that to obtain a new secret vector V
*/
xor_vectors(ctx->rand_data, ctx->I, tmp, DEFAULT_BLK_SZ);
- output = ctx->V;
hexdump("tmp stage 2: ", tmp, DEFAULT_BLK_SZ);
- crypto_cipher_encrypt_one(ctx->tfm, output, tmp);
+ crypto_cipher_encrypt_one(ctx->tfm, ctx->V, tmp);
/*
* Now update our DT value
The local variable "output" is no longer required. Signed-off-by: George Spelvin <linux@horizon.com> --- crypto/ansi_cprng.c | 11 +++-------- 1 file changed, 3 insertions(+), 8 deletions(-)