Switch to the new AES library that also provides an implementation of
the AES key expansion routine. This removes the dependency on the
generic AES cipher, allowing it to be omitted entirely in the future.

Signed-off-by: Ard Biesheuvel <ard.biesheu...@linaro.org>
---
 drivers/crypto/Kconfig                         | 2 +-
 drivers/crypto/inside-secure/safexcel_cipher.c | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig
index fdccadc94819..b30b84089d11 100644
--- a/drivers/crypto/Kconfig
+++ b/drivers/crypto/Kconfig
@@ -718,7 +718,7 @@ config CRYPTO_DEV_SAFEXCEL
        tristate "Inside Secure's SafeXcel cryptographic engine driver"
        depends on OF
        depends on (ARM64 && ARCH_MVEBU) || (COMPILE_TEST && 64BIT)
-       select CRYPTO_AES
+       select CRYPTO_LIB_AES
        select CRYPTO_AUTHENC
        select CRYPTO_BLKCIPHER
        select CRYPTO_DES
diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c 
b/drivers/crypto/inside-secure/safexcel_cipher.c
index 8cdbdbe35681..19ec086dce4f 100644
--- a/drivers/crypto/inside-secure/safexcel_cipher.c
+++ b/drivers/crypto/inside-secure/safexcel_cipher.c
@@ -178,7 +178,7 @@ static int safexcel_skcipher_aes_setkey(struct 
crypto_skcipher *ctfm,
        struct crypto_aes_ctx aes;
        int ret, i;
 
-       ret = crypto_aes_expand_key(&aes, key, len);
+       ret = aes_expandkey(&aes, key, len);
        if (ret) {
                crypto_skcipher_set_flags(ctfm, CRYPTO_TFM_RES_BAD_KEY_LEN);
                return ret;
-- 
2.17.1

Reply via email to