From patchwork Mon Dec 9 20:38:10 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Biggers X-Patchwork-Id: 11280389 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 3572E1575 for ; Mon, 9 Dec 2019 20:39:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1422620637 for ; Mon, 9 Dec 2019 20:39:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575923953; bh=U6WXEbZKl+mSOP6Y2A/4wGgK4mVmqZAPahRm88sn8OI=; h=From:To:Subject:Date:List-ID:From; b=0nFEkzOMXJnkNnuufencKtwEeXAdycIjKS1141Xe+9nFXslErMl3XipkUhmz4xS6v Bl0Uo8/S7+krRjPtj9OfVgh1Ipuhqpcar96rV8BCeVHGWsttjsSZAVHPndXmSULnha z4n+pZeNSZFp+2V68Savzi3wbQO9qBG5W1rykdiY= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726608AbfLIUjM (ORCPT ); Mon, 9 Dec 2019 15:39:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:42550 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726342AbfLIUjM (ORCPT ); Mon, 9 Dec 2019 15:39:12 -0500 Received: from ebiggers-linuxstation.mtv.corp.google.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 08BB120637 for ; Mon, 9 Dec 2019 20:39:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575923952; bh=U6WXEbZKl+mSOP6Y2A/4wGgK4mVmqZAPahRm88sn8OI=; h=From:To:Subject:Date:From; b=m3dPETZaLmoSXHRcUxbzCTHrZDEop98Aml25DBBuOkYdcvWcLMzTUEXQkOIxNdexk SOQcV9uLxwsh3Lp5VIDhrAkTXBW6PeqTgCAeK5aJ3VoSDsA0nePMy62TOYwUPlSdKp koAXMcYTP1Ds2BxAxbkYduwAVEcYi5jij3e3cszU= From: Eric Biggers To: linux-fscrypt@vger.kernel.org Subject: [PATCH] fscrypt: use crypto_skcipher_driver_name() Date: Mon, 9 Dec 2019 12:38:10 -0800 Message-Id: <20191209203810.225302-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.24.0.393.g34dc348eaf-goog MIME-Version: 1.0 Sender: linux-fscrypt-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-fscrypt@vger.kernel.org From: Eric Biggers Crypto API users shouldn't really be accessing struct skcipher_alg directly. already has a function crypto_skcipher_driver_name(), so use that instead. No change in behavior. Signed-off-by: Eric Biggers --- fs/crypto/keysetup.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/fs/crypto/keysetup.c b/fs/crypto/keysetup.c index f577bb6613f93..c9f4fe955971f 100644 --- a/fs/crypto/keysetup.c +++ b/fs/crypto/keysetup.c @@ -89,8 +89,7 @@ struct crypto_skcipher *fscrypt_allocate_skcipher(struct fscrypt_mode *mode, * first time a mode is used. */ pr_info("fscrypt: %s using implementation \"%s\"\n", - mode->friendly_name, - crypto_skcipher_alg(tfm)->base.cra_driver_name); + mode->friendly_name, crypto_skcipher_driver_name(tfm)); } crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize);