From: Eric Biggers <ebigg...@google.com>

Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.

Cc: Zaibo Xu <xuza...@huawei.com>
Signed-off-by: Eric Biggers <ebigg...@google.com>
---
 drivers/crypto/hisilicon/sec2/sec_crypto.c | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c 
b/drivers/crypto/hisilicon/sec2/sec_crypto.c
index 7f1c6a31b82f35..848ab492d26e3e 100644
--- a/drivers/crypto/hisilicon/sec2/sec_crypto.c
+++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c
@@ -832,7 +832,6 @@ static int sec_aead_auth_set_key(struct sec_auth_ctx *ctx,
                                 struct crypto_authenc_keys *keys)
 {
        struct crypto_shash *hash_tfm = ctx->hash_tfm;
-       SHASH_DESC_ON_STACK(shash, hash_tfm);
        int blocksize, ret;
 
        if (!keys->authkeylen) {
@@ -842,8 +841,8 @@ static int sec_aead_auth_set_key(struct sec_auth_ctx *ctx,
 
        blocksize = crypto_shash_blocksize(hash_tfm);
        if (keys->authkeylen > blocksize) {
-               ret = crypto_shash_digest(shash, keys->authkey,
-                                         keys->authkeylen, ctx->a_key);
+               ret = crypto_shash_tfm_digest(hash_tfm, keys->authkey,
+                                             keys->authkeylen, ctx->a_key);
                if (ret) {
                        pr_err("hisi_sec2: aead auth digest error!\n");
                        return -EINVAL;
-- 
2.26.2

Reply via email to