From: Eric Biggers <ebigg...@google.com>

Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.

Signed-off-by: Eric Biggers <ebigg...@google.com>
---
 arch/arm64/crypto/aes-glue.c | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/arch/arm64/crypto/aes-glue.c b/arch/arm64/crypto/aes-glue.c
index ed5409c6abf4e9..395bbf64b2abb3 100644
--- a/arch/arm64/crypto/aes-glue.c
+++ b/arch/arm64/crypto/aes-glue.c
@@ -158,7 +158,6 @@ static int __maybe_unused essiv_cbc_set_key(struct 
crypto_skcipher *tfm,
                                            unsigned int key_len)
 {
        struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
-       SHASH_DESC_ON_STACK(desc, ctx->hash);
        u8 digest[SHA256_DIGEST_SIZE];
        int ret;
 
@@ -166,8 +165,7 @@ static int __maybe_unused essiv_cbc_set_key(struct 
crypto_skcipher *tfm,
        if (ret)
                return ret;
 
-       desc->tfm = ctx->hash;
-       crypto_shash_digest(desc, in_key, key_len, digest);
+       crypto_shash_tfm_digest(ctx->hash, in_key, key_len, digest);
 
        return aes_expandkey(&ctx->key2, digest, sizeof(digest));
 }
-- 
2.26.2

Reply via email to