aesni_gcm_mult() now returns void
diff --git a/include/polarssl/aesni.h b/include/polarssl/aesni.h
index 808ff4d..92b23cd 100644
--- a/include/polarssl/aesni.h
+++ b/include/polarssl/aesni.h
@@ -74,12 +74,10 @@
  *
  * \note           Both operands and result are bit strings interpreted as
  *                 elements of GF(2^128) as per the GCM spec.
- *
- * \return         0 on success (cannot fail)
  */
-int aesni_gcm_mult( unsigned char c[16],
-                    const unsigned char a[16],
-                    const unsigned char b[16] );
+void aesni_gcm_mult( unsigned char c[16],
+                     const unsigned char a[16],
+                     const unsigned char b[16] );
 
 /**
  * \brief           Compute decryption round keys from encryption round keys
diff --git a/library/aesni.c b/library/aesni.c
index aa1f4b1..b5858dc 100644
--- a/library/aesni.c
+++ b/library/aesni.c
@@ -107,9 +107,9 @@
  * GCM multiplication: c = a times b in GF(2^128)
  * Based on [CLMUL-WP] algorithms 1 (with equation 27) and 5.
  */
-int aesni_gcm_mult( unsigned char c[16],
-                    const unsigned char a[16],
-                    const unsigned char b[16] )
+void aesni_gcm_mult( unsigned char c[16],
+                     const unsigned char a[16],
+                     const unsigned char b[16] )
 {
     unsigned char aa[16], bb[16], cc[16];
     size_t i;
diff --git a/library/gcm.c b/library/gcm.c
index 894c5d3..8950360 100644
--- a/library/gcm.c
+++ b/library/gcm.c
@@ -198,7 +198,7 @@
         PUT_UINT32_BE( ctx->HL[8] >> 32, h,  8 );
         PUT_UINT32_BE( ctx->HL[8],       h, 12 );
 
-        (void) aesni_gcm_mult( output, x, h );
+        aesni_gcm_mult( output, x, h );
         return;
     }
 #endif