aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/fs/crypto
diff options
context:
space:
mode:
authorEric Biggers <ebiggers@google.com>2019-12-09 12:38:10 -0800
committerEric Biggers <ebiggers@google.com>2019-12-31 10:33:50 -0600
commit6e1adb88d230b08ad9a223ecaea1e6b238a9078f (patch)
tree8ab0c4f06eec49a65109f7428647a96b1530783c /fs/crypto
parentfscrypt: support passing a keyring key to FS_IOC_ADD_ENCRYPTION_KEY (diff)
downloadwireguard-linux-6e1adb88d230b08ad9a223ecaea1e6b238a9078f.tar.xz
wireguard-linux-6e1adb88d230b08ad9a223ecaea1e6b238a9078f.zip
fscrypt: use crypto_skcipher_driver_name()
Crypto API users shouldn't really be accessing struct skcipher_alg directly. <crypto/skcipher.h> already has a function crypto_skcipher_driver_name(), so use that instead. No change in behavior. Link: https://lore.kernel.org/r/20191209203810.225302-1-ebiggers@kernel.org Signed-off-by: Eric Biggers <ebiggers@google.com>
Diffstat (limited to 'fs/crypto')
-rw-r--r--fs/crypto/keysetup.c3
1 files changed, 1 insertions, 2 deletions
diff --git a/fs/crypto/keysetup.c b/fs/crypto/keysetup.c
index f577bb6613f9..c9f4fe955971 100644
--- a/fs/crypto/keysetup.c
+++ b/fs/crypto/keysetup.c
@@ -89,8 +89,7 @@ struct crypto_skcipher *fscrypt_allocate_skcipher(struct fscrypt_mode *mode,
* first time a mode is used.
*/
pr_info("fscrypt: %s using implementation \"%s\"\n",
- mode->friendly_name,
- crypto_skcipher_alg(tfm)->base.cra_driver_name);
+ mode->friendly_name, crypto_skcipher_driver_name(tfm));
}
crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize);