* change.
                 */
 
-               peer_integrity_tfm = crypto_alloc_shash(integrity_alg, 0, CRYPTO_ALG_ASYNC);
+               peer_integrity_tfm = crypto_alloc_shash(integrity_alg, 0, 0);
                if (IS_ERR(peer_integrity_tfm)) {
                        peer_integrity_tfm = NULL;
                        drbd_err(connection, "peer data-integrity-alg %s not supported\n",
 
        int r;
 
        if (a->alg_string) {
-               *hash = crypto_alloc_shash(a->alg_string, 0, CRYPTO_ALG_ASYNC);
+               *hash = crypto_alloc_shash(a->alg_string, 0, 0);
                if (IS_ERR(*hash)) {
                        *error = error_alg;
                        r = PTR_ERR(*hash);
 
 /********************************************************************/
 int orinoco_mic_init(struct orinoco_private *priv)
 {
-       priv->tx_tfm_mic = crypto_alloc_shash("michael_mic", 0,
-                                             CRYPTO_ALG_ASYNC);
+       priv->tx_tfm_mic = crypto_alloc_shash("michael_mic", 0, 0);
        if (IS_ERR(priv->tx_tfm_mic)) {
                printk(KERN_DEBUG "orinoco_mic_init: could not allocate "
                       "crypto API michael_mic\n");
                return -ENOMEM;
        }
 
-       priv->rx_tfm_mic = crypto_alloc_shash("michael_mic", 0,
-                                             CRYPTO_ALG_ASYNC);
+       priv->rx_tfm_mic = crypto_alloc_shash("michael_mic", 0, 0);
        if (IS_ERR(priv->rx_tfm_mic)) {
                printk(KERN_DEBUG "orinoco_mic_init: could not allocate "
                       "crypto API michael_mic\n");
 
                goto out;
        }
 
-       c->hash_tfm = crypto_alloc_shash(c->auth_hash_name, 0,
-                                        CRYPTO_ALG_ASYNC);
+       c->hash_tfm = crypto_alloc_shash(c->auth_hash_name, 0, 0);
        if (IS_ERR(c->hash_tfm)) {
                err = PTR_ERR(c->hash_tfm);
                ubifs_err(c, "Can not allocate %s: %d",
                goto out_free_hash;
        }
 
-       c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, CRYPTO_ALG_ASYNC);
+       c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, 0);
        if (IS_ERR(c->hmac_tfm)) {
                err = PTR_ERR(c->hmac_tfm);
                ubifs_err(c, "Can not allocate %s: %d", hmac_name, err);
 
                return PTR_ERR(tfm_aes);
        }
 
-       tfm_cmac = crypto_alloc_shash("cmac(aes)", 0, CRYPTO_ALG_ASYNC);
+       tfm_cmac = crypto_alloc_shash("cmac(aes)", 0, 0);
        if (IS_ERR(tfm_cmac)) {
                BT_ERR("Unable to create CMAC crypto context");
                crypto_free_cipher(tfm_aes);
 
        if (!apparmor_initialized)
                return 0;
 
-       tfm = crypto_alloc_shash("sha1", 0, CRYPTO_ALG_ASYNC);
+       tfm = crypto_alloc_shash("sha1", 0, 0);
        if (IS_ERR(tfm)) {
                int error = PTR_ERR(tfm);
                AA_ERROR("failed to setup profile sha1 hashing: %d\n", error);
 
                mutex_lock(&mutex);
                if (*tfm)
                        goto out;
-               *tfm = crypto_alloc_shash(algo, 0,
-                                         CRYPTO_ALG_ASYNC | CRYPTO_NOLOAD);
+               *tfm = crypto_alloc_shash(algo, 0, CRYPTO_NOLOAD);
                if (IS_ERR(*tfm)) {
                        rc = PTR_ERR(*tfm);
                        pr_err("Can not allocate %s (reason: %ld)\n", algo, rc);
 
        struct crypto_shash *tfm;
        int err;
 
-       tfm = crypto_alloc_shash(hmac_alg, 0, CRYPTO_ALG_ASYNC);
+       tfm = crypto_alloc_shash(hmac_alg, 0, 0);
        if (IS_ERR(tfm)) {
                pr_err("encrypted_key: can't alloc %s transform: %ld\n",
                       hmac_alg, PTR_ERR(tfm));
 {
        int ret;
 
-       hash_tfm = crypto_alloc_shash(hash_alg, 0, CRYPTO_ALG_ASYNC);
+       hash_tfm = crypto_alloc_shash(hash_alg, 0, 0);
        if (IS_ERR(hash_tfm)) {
                pr_err("encrypted_key: can't allocate %s transform: %ld\n",
                       hash_alg, PTR_ERR(hash_tfm));
 
 {
        int ret;
 
-       hmacalg = crypto_alloc_shash(hmac_alg, 0, CRYPTO_ALG_ASYNC);
+       hmacalg = crypto_alloc_shash(hmac_alg, 0, 0);
        if (IS_ERR(hmacalg)) {
                pr_info("trusted_key: could not allocate crypto %s\n",
                        hmac_alg);
                return PTR_ERR(hmacalg);
        }
 
-       hashalg = crypto_alloc_shash(hash_alg, 0, CRYPTO_ALG_ASYNC);
+       hashalg = crypto_alloc_shash(hash_alg, 0, 0);
        if (IS_ERR(hashalg)) {
                pr_info("trusted_key: could not allocate crypto %s\n",
                        hash_alg);