-
由 Dmitry Kasatkin 提交于
Using shash is more efficient, because the algorithm is allocated only once. Only the descriptor to store the hash state needs to be allocated for every operation. Changelog v6: - check for crypto_shash_setkey failure Signed-off-by: NDmitry Kasatkin <dmitry.kasatkin@nokia.com> Signed-off-by: NMimi Zohar <zohar@linux.vnet.ibm.com>
d46eb369