Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1405139ybz; Fri, 1 May 2020 22:34:27 -0700 (PDT) X-Google-Smtp-Source: APiQypJ1F2SNwK8gG27OV/BzmOpQLKfW2iNoAUDSfzAA7BpFv5Z65ElsXcxD2hQn8HLNZrqN5co4 X-Received: by 2002:a50:ed8f:: with SMTP id h15mr6538801edr.331.1588397667641; Fri, 01 May 2020 22:34:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588397667; cv=none; d=google.com; s=arc-20160816; b=VYOPq6GTnTyYzB7wCEyfl6pGIYak4xn9edKsk0c++JZDoMXjaojV4y52D04ogF13Ql 6zq2XQGyE2ZRzsoJ1UaBGZo91LjTcLcDtEotqj1d8q9o0YGAdHHz7geryso/6/pxgviO h9zcRVdzhb4AcUtP2SJcQFGxFkkqfI+qHxBCN/Nqr0tuROcuPHtfrWriQFCzQGkBHeYN pUMrW5J+tWjI/5a3KU7Ei4AdHrntRIaTCZ2L6mDZT8ISgokTc6wqrXOfnYr0dhhWw6Ru Ao6N5frVYeJH1b1lAi85P/JAAqZtzv6ecrVEE1Q5xTIi/hjaMmwRR5V/Bo0KZEVTU8VF HY1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=92rlfD5+kONA7ifeTYMU1b6hIaq3OVugMTAF4YlSZPM=; b=0GfE0GMja5Qqyrc34C6dcPuBZu3Bxxym8X3hHXzlHBKwIkp1ciD1fj1s/Vf2SS8wNF OH/+uC8+VMZ4JBkhBxSizpRxTWUbmnDeE0j5sqAMZsWvqZO4LLD0jtiuplkVZfpp5rQD uSye75UF09cVvbMh/ZiEMJBTf3y3wv8KM9znk3VEUTjg3LVTTwq5+N60Asj+HQWsUJ5w b0v/ua0R6+jnG6C+MjLQt1+HKvyF72HFg+yxH1mGfia1OCWW6+M/ZZ0m605y76PtzRJV 7FeUZvsa0OVNbwKzxm+yxEWTl3jeb6NV3CkiKXdAD/Jk1GUS96znaNePSKdZ3ygkfdgH wFMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=c3CXxZgb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s15si3085914edr.462.2020.05.01.22.33.52; Fri, 01 May 2020 22:34:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=c3CXxZgb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726058AbgEBFdn (ORCPT + 99 others); Sat, 2 May 2020 01:33:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:39214 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727114AbgEBFdn (ORCPT ); Sat, 2 May 2020 01:33:43 -0400 Received: from sol.hsd1.ca.comcast.net (c-107-3-166-239.hsd1.ca.comcast.net [107.3.166.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B86FC208DB; Sat, 2 May 2020 05:33:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588397622; bh=CT5T+FWIwZZ4k0IhAgE2/ARqIcMpCjboija1/f3cLtY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=c3CXxZgb/pHNFcliYxooaDt+5xIHcz6eqtG3BqthskKjGWgYZA5Kvsbd39/VlIVdg 4FaIQcbP8xoa7dZ3ODF9CIXEnHDgSSuBdw5FQqO5gj+5rupNxX5JaYmwC5ju/nuL1O FZoA84/IWINV5U4VnPpTZ1ahCxGZ69fEAo3tm4yw= From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: Tom Lendacky Subject: [PATCH 05/20] crypto: ccp - use crypto_shash_tfm_digest() Date: Fri, 1 May 2020 22:31:07 -0700 Message-Id: <20200502053122.995648-6-ebiggers@kernel.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200502053122.995648-1-ebiggers@kernel.org> References: <20200502053122.995648-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Eric Biggers Instead of manually allocating a 'struct shash_desc' on the stack and calling crypto_shash_digest(), switch to using the new helper function crypto_shash_tfm_digest() which does this for us. Cc: Tom Lendacky Signed-off-by: Eric Biggers --- drivers/crypto/ccp/ccp-crypto-sha.c | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/drivers/crypto/ccp/ccp-crypto-sha.c b/drivers/crypto/ccp/ccp-crypto-sha.c index 474e6f1a6a84ec..b0cc2bd73af804 100644 --- a/drivers/crypto/ccp/ccp-crypto-sha.c +++ b/drivers/crypto/ccp/ccp-crypto-sha.c @@ -272,9 +272,6 @@ static int ccp_sha_setkey(struct crypto_ahash *tfm, const u8 *key, { struct ccp_ctx *ctx = crypto_tfm_ctx(crypto_ahash_tfm(tfm)); struct crypto_shash *shash = ctx->u.sha.hmac_tfm; - - SHASH_DESC_ON_STACK(sdesc, shash); - unsigned int block_size = crypto_shash_blocksize(shash); unsigned int digest_size = crypto_shash_digestsize(shash); int i, ret; @@ -289,10 +286,8 @@ static int ccp_sha_setkey(struct crypto_ahash *tfm, const u8 *key, if (key_len > block_size) { /* Must hash the input key */ - sdesc->tfm = shash; - - ret = crypto_shash_digest(sdesc, key, key_len, - ctx->u.sha.key); + ret = crypto_shash_tfm_digest(shash, key, key_len, + ctx->u.sha.key); if (ret) return -EINVAL; -- 2.26.2