}
 
 static int sctp_setsockopt_auth_supported(struct sock *sk,
-                                         char __user *optval,
+                                         struct sctp_assoc_value *params,
                                          unsigned int optlen)
 {
-       struct sctp_assoc_value params;
        struct sctp_association *asoc;
        struct sctp_endpoint *ep;
        int retval = -EINVAL;
 
-       if (optlen != sizeof(params))
-               goto out;
-
-       if (copy_from_user(¶ms, optval, optlen)) {
-               retval = -EFAULT;
+       if (optlen != sizeof(*params))
                goto out;
-       }
 
-       asoc = sctp_id2assoc(sk, params.assoc_id);
-       if (!asoc && params.assoc_id != SCTP_FUTURE_ASSOC &&
+       asoc = sctp_id2assoc(sk, params->assoc_id);
+       if (!asoc && params->assoc_id != SCTP_FUTURE_ASSOC &&
            sctp_style(sk, UDP))
                goto out;
 
        ep = sctp_sk(sk)->ep;
-       if (params.assoc_value) {
+       if (params->assoc_value) {
                retval = sctp_auth_init(ep, GFP_KERNEL);
                if (retval)
                        goto out;
                }
        }
 
-       ep->auth_enable = !!params.assoc_value;
+       ep->auth_enable = !!params->assoc_value;
        retval = 0;
 
 out:
                retval = sctp_setsockopt_asconf_supported(sk, kopt, optlen);
                break;
        case SCTP_AUTH_SUPPORTED:
-               retval = sctp_setsockopt_auth_supported(sk, optval, optlen);
+               retval = sctp_setsockopt_auth_supported(sk, kopt, optlen);
                break;
        case SCTP_ECN_SUPPORTED:
                retval = sctp_setsockopt_ecn_supported(sk, optval, optlen);