Switch to the new AES library that also provides an implementation of
the AES key expansion routine. This removes the dependency on the
generic AES cipher, allowing it to be omitted entirely in the future.

Signed-off-by: Ard Biesheuvel <ard.biesheu...@linaro.org>
---
 drivers/crypto/Kconfig                         | 2 +-
 drivers/crypto/inside-secure/safexcel_cipher.c | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig
index 539592e1d6f1..a6067bb5a6a2 100644
--- a/drivers/crypto/Kconfig
+++ b/drivers/crypto/Kconfig
@@ -701,7 +701,7 @@ config CRYPTO_DEV_SAFEXCEL
        tristate "Inside Secure's SafeXcel cryptographic engine driver"
        depends on OF
        depends on (ARM64 && ARCH_MVEBU) || (COMPILE_TEST && 64BIT)
-       select CRYPTO_AES
+       select CRYPTO_LIB_AES
        select CRYPTO_AUTHENC
        select CRYPTO_BLKCIPHER
        select CRYPTO_DES
diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c 
b/drivers/crypto/inside-secure/safexcel_cipher.c
index de4be10b172f..483632546260 100644
--- a/drivers/crypto/inside-secure/safexcel_cipher.c
+++ b/drivers/crypto/inside-secure/safexcel_cipher.c
@@ -158,7 +158,7 @@ static int safexcel_skcipher_aes_setkey(struct 
crypto_skcipher *ctfm,
        struct crypto_aes_ctx aes;
        int ret, i;
 
-       ret = crypto_aes_expand_key(&aes, key, len);
+       ret = aes_expandkey(&aes, key, len);
        if (ret) {
                crypto_skcipher_set_flags(ctfm, CRYPTO_TFM_RES_BAD_KEY_LEN);
                return ret;
-- 
2.20.1

Reply via email to