Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1405573ybz; Fri, 1 May 2020 22:35:17 -0700 (PDT) X-Google-Smtp-Source: APiQypKNtUFWF+jKxLveXym1FqbfSETRLr8KZnCx9Qo+mPGTCHg8n6uZysupwdc6s5f1N2ZNWcsM X-Received: by 2002:a50:81c5:: with SMTP id 63mr6227799ede.115.1588397717346; Fri, 01 May 2020 22:35:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588397717; cv=none; d=google.com; s=arc-20160816; b=RUwUMdpOUrzw3KtLEiRh5+2bUzE5oB7F6RIzfioCtalNeo9SdPHFWtxdgn70cmC+Xe tzU1+z78XtGo8suVKzcf/eaonOpchkEd1vs8cTb2tPuE8vHQKXalP1lIjIwj+Npg1hJ/ WzpoB2ogVMjd5rY0DtQSBn1vkDDno+GdJFknPdpNHsmr/B6HLtibkKnrqMmjOzokdzsV DgqYe6bwYHfM3DhqNmGjEGb/ThmOid/E0vjXbQgbn/gatrbAvt3Is2jm7A11vhfniA+D zC/zBYlV5O4067cGxZmbWJPNxhVBlDUGIWgYdoDMuiLAATeNee1dLVFjyOZNWOZ/jN2t MoXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=PBFQ1lwAJMsLU/Y3PYkCLtVbKD+YUiRBiHCHVA7Ggy0=; b=TLDAie2A7WU8TEXdu+dCLysZPadxn5b8VSubrz87QRRx9eUEaAgz/9ZYIJo56pR1nK dM8sSdLu1uXlxv1H5gpL/6pxg6HarLVcX9P6RZ9/pozviK+U8kju3pIghZ4qDCv514HH mbnRVNXJ0CZrgHCOCR3YoqGHIBvBo9KdZrL/H+eSV5QRkfAHqgx8qR6Xn3cGZ4PhHT+A ndr+wfFNqggr2TAFWcL3BxxO8hMeODElCA9oqRgFjJgB2nID7tkBHh/dHOVmBRjgM6Yn rtXJWpAj+F7th+R6FGaF9k98NWn7Jj4YRzGiLI1o/E7hAHz5D8LIwhddk6SJUQSOu6y3 3OpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="t/Hrfgct"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b14si2780028edf.212.2020.05.01.22.34.54; Fri, 01 May 2020 22:35:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="t/Hrfgct"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727828AbgEBFdu (ORCPT + 99 others); Sat, 2 May 2020 01:33:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:39264 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727808AbgEBFdp (ORCPT ); Sat, 2 May 2020 01:33:45 -0400 Received: from sol.hsd1.ca.comcast.net (c-107-3-166-239.hsd1.ca.comcast.net [107.3.166.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AEFE32184D for ; Sat, 2 May 2020 05:33:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588397624; bh=BbS+GJU8E1cfxJI7vp3WOcStloDByRcBqGG0dMSFyjI=; h=From:To:Subject:Date:In-Reply-To:References:From; b=t/HrfgcttYLU/IPDBheLMNqHTTMfU5+5GDQ7/qv2XVPDxHiEOkd/oHhkwyNElD6ym JEYEYbYTyLu98/SPcRJwrSzLzoPP+i7Th9YBS7J6ZVVcoog9QIF5tQth+K17vs8roL brnI2suD2smYtxfYQiDmRBd7x6zFKiHYZGGXKAMM= From: Eric Biggers To: linux-crypto@vger.kernel.org Subject: [PATCH 13/20] fscrypt: use crypto_shash_tfm_digest() Date: Fri, 1 May 2020 22:31:15 -0700 Message-Id: <20200502053122.995648-14-ebiggers@kernel.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200502053122.995648-1-ebiggers@kernel.org> References: <20200502053122.995648-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Eric Biggers Instead of manually allocating a 'struct shash_desc' on the stack and calling crypto_shash_digest(), switch to using the new helper function crypto_shash_tfm_digest() which does this for us. Signed-off-by: Eric Biggers --- fs/crypto/fname.c | 7 +------ fs/crypto/hkdf.c | 6 +----- 2 files changed, 2 insertions(+), 11 deletions(-) diff --git a/fs/crypto/fname.c b/fs/crypto/fname.c index 4c212442a8f7f1..5c9fb013e3f757 100644 --- a/fs/crypto/fname.c +++ b/fs/crypto/fname.c @@ -83,13 +83,8 @@ static int fscrypt_do_sha256(const u8 *data, unsigned int data_len, u8 *result) tfm = prev_tfm; } } - { - SHASH_DESC_ON_STACK(desc, tfm); - desc->tfm = tfm; - - return crypto_shash_digest(desc, data, data_len, result); - } + return crypto_shash_tfm_digest(tfm, data, data_len, result); } static inline bool fscrypt_is_dot_dotdot(const struct qstr *str) diff --git a/fs/crypto/hkdf.c b/fs/crypto/hkdf.c index efb95bd19a8948..0cba7928446d34 100644 --- a/fs/crypto/hkdf.c +++ b/fs/crypto/hkdf.c @@ -44,17 +44,13 @@ static int hkdf_extract(struct crypto_shash *hmac_tfm, const u8 *ikm, unsigned int ikmlen, u8 prk[HKDF_HASHLEN]) { static const u8 default_salt[HKDF_HASHLEN]; - SHASH_DESC_ON_STACK(desc, hmac_tfm); int err; err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); if (err) return err; - desc->tfm = hmac_tfm; - err = crypto_shash_digest(desc, ikm, ikmlen, prk); - shash_desc_zero(desc); - return err; + return crypto_shash_tfm_digest(hmac_tfm, ikm, ikmlen, prk); } /* -- 2.26.2