Received: by 10.213.65.68 with SMTP id h4csp1119351imn; Sat, 24 Mar 2018 04:03:53 -0700 (PDT) X-Google-Smtp-Source: AG47ELuy/wBuXjYWOAQhif7+3qLZGQY2nP5n9VbC0UZ4XIExVdtIhkQfAowaHTLJaJo/pQ/7uniF X-Received: by 10.99.101.193 with SMTP id z184mr24047091pgb.429.1521889433672; Sat, 24 Mar 2018 04:03:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521889433; cv=none; d=google.com; s=arc-20160816; b=N5HGtgcmdlSZSKYx9RlImQ/psi/cwN8P/fWFlOZeOyBF2dDjNkXskRb21Kl45CWoRm MVTX/jsP1bMJxQ18CFJBc8LJEzYsl5NKsMnWYAgha8LG7P7+kyCbqjMCR15TYg4EFRTz gb3UGQyTaSoClY0YBMuHrE0KXf8pIG/OtZrHEN5p+kFabNYpBYl08qpVc7eiW3mUQhA/ CgcWz3GSIBcSfgazKyyv3Gwxlt5JWTG2VMzUqvjfrmbdwyN4SagP50+fjx9LrC1OnI8i HuwMYtxouuyBD/GJ0WeD5WuBePchPdcyat/50FKCYDOJUqZXLOzh5qkF8NdrZTmok3J9 bRbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:message-id:date:subject:cc :to:from:arc-authentication-results; bh=oyi/E/gvmMRjIGff0a0w2CgXU8rbDJOzA4o3F7oznLU=; b=hotkeOrHebE/hSYaxRA+sKHzJRgaANad+/HnWWYY2jyZnJMLhKZqaiGhVOCvyIQlg6 mCf8+T0XDknXE0yIylMm7NJNRT+mG1hwYnk13VfJqTTxdKnyRFQIgYNddIQ/bzxT9kN3 d4aKW1U+CenXW1oR/TgrUEx8NAzdgfaVo6PGRpgNWnR+2IeWWL2OjuSCV2YXIG5Kzdnx 01fQT9kBolB/zVgmzOyFcEsBsRFBusdWoBCKdRqgceBZNQibH/JorSq6lEFHkm8Y3QU7 xHFY0ssjKS51nG140wGdQHyPy8jn71P95QnQe27Fir03bHj0izadwYJ1WBt8+v6R4uTT 37Uw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@agner.ch header.s=dkim header.b=y1BFaIyb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v5si8149219pfe.59.2018.03.24.04.03.38; Sat, 24 Mar 2018 04:03:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@agner.ch header.s=dkim header.b=y1BFaIyb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751948AbeCXLCr (ORCPT + 99 others); Sat, 24 Mar 2018 07:02:47 -0400 Received: from mail.kmu-office.ch ([178.209.48.109]:43052 "EHLO mail.kmu-office.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751843AbeCXLCq (ORCPT ); Sat, 24 Mar 2018 07:02:46 -0400 Received: from trochilidae.lan (unknown [IPv6:2001:1620:c6e::127]) by mail.kmu-office.ch (Postfix) with ESMTPSA id BA2915C040F; Sat, 24 Mar 2018 12:02:18 +0100 (CET) From: Stefan Agner To: herbert@gondor.apana.org.au, davem@davemloft.net, raveendra.padasalagi@broadcom.com, clabbe.montjoie@gmail.com Cc: scott.branden@broadcom.com, steven.lin1@broadcom.com, garsilva@embeddedor.com, pravin.shedge4linux@gmail.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Stefan Agner Subject: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type Date: Sat, 24 Mar 2018 12:02:42 +0100 Message-Id: <20180324110242.9474-1-stefan@agner.ch> X-Mailer: git-send-email 2.16.2 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=agner.ch; s=dkim; t=1521889338; bh=oyi/E/gvmMRjIGff0a0w2CgXU8rbDJOzA4o3F7oznLU=; h=From:To:Cc:Subject:Date:Message-Id; b=y1BFaIyb2G1R8ws+qpp19LUl1D1D5eD81iyMJr9ooDvf+q4OqQE9nnniO+YJxOwkojhjUL3pcrH+NKbaV2lAEZxzVkTtVo1oqCE/oEHcS3Um81Mw5gEmTQV9+NLTKbZnUF05/7fERW5ykqYQJEDK7Hof3D3LCTG4C+NJk/cFtAQ= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the AES cases enum spu_cipher_type and enum hash_type have the same values, so the assignment is fine. Explicitly cast the enum type conversion. This fixes two warnings when building with clang: drivers/crypto/bcm/cipher.c:821:34: warning: implicit conversion from enumeration type 'enum spu_cipher_type' to different enumeration type 'enum hash_type' [-Wenum-conversion] hash_parms.type = cipher_parms.type; ~ ~~~~~~~~~~~~~^~~~ drivers/crypto/bcm/cipher.c:1412:26: warning: implicit conversion from enumeration type 'enum spu_cipher_type' to different enumeration type 'enum hash_type' [-Wenum-conversion] hash_parms.type = ctx->cipher_type; ~ ~~~~~^~~~~~~~~~~ Signed-off-by: Stefan Agner --- I am not familar with the IP... I would be glad if somebody with better insight could have a look whether that patch makes sense. drivers/crypto/bcm/cipher.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/bcm/cipher.c b/drivers/crypto/bcm/cipher.c index 2b75f95bbe1b..309c67c7012f 100644 --- a/drivers/crypto/bcm/cipher.c +++ b/drivers/crypto/bcm/cipher.c @@ -818,7 +818,7 @@ static int handle_ahash_req(struct iproc_reqctx_s *rctx) /* AES hashing keeps key size in type field, so need to copy it here */ if (hash_parms.alg == HASH_ALG_AES) - hash_parms.type = cipher_parms.type; + hash_parms.type = (enum hash_type)cipher_parms.type; else hash_parms.type = spu->spu_hash_type(rctx->total_sent); @@ -1409,7 +1409,7 @@ static int handle_aead_req(struct iproc_reqctx_s *rctx) rctx->iv_ctr_len); if (ctx->auth.alg == HASH_ALG_AES) - hash_parms.type = ctx->cipher_type; + hash_parms.type = (enum hash_type)ctx->cipher_type; /* General case AAD padding (CCM and RFC4543 special cases below) */ aead_parms.aad_pad_len = spu->spu_gcm_ccm_pad_len(ctx->cipher.mode, -- 2.16.2