Received: by 10.213.65.68 with SMTP id h4csp122821imn; Tue, 27 Mar 2018 23:40:46 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/XtKidseM7+kJ51swPBUWRHSySK4JNucYZl4NOwRhoco4Byx7z2LKuX8agy9eHlIaCPjCH X-Received: by 10.99.96.66 with SMTP id u63mr1706272pgb.22.1522219246560; Tue, 27 Mar 2018 23:40:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522219246; cv=none; d=google.com; s=arc-20160816; b=OhbRHyWeRqZwQcbYVqRkE+1VdV9U4zwUuGs0UQzX022WHkPQAVgNfZgjl9NANgbDa8 3Rno8u3/E5jr2sQElJcZSH6aO4UWCka2QYDwlCfawW4/IdpBwd1IxQzLePfPqwmYpzNt dApps/m1scjHdS6f1ayUzwT8sEvg2RvqyC7I2lE7peDnDEIIFdDz4S+EqlvORcm+1hHf PAqc4Fuv+JvNmmxE6UQK/XrRkFOiUDecSN87EsPQ7SyE2H1xzlvoIbuCXI9f0yCXQ8ik MhbvG6qLlh2ULBLnHXaV5yNaF5P/VtQDJ/rwMm7Sd9sEG0z1SZ303ANbDvh3eZP2gXvh jP8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=685BgLnpZ07vzOWvlevhuukMML/I9qd9ZJkpt96zNds=; b=H4XklVai46Uaro2hg5aE1u8TBXen1zq3Q3CFoOAPUvbjUDuCfvlVYlvFch9LX0R5xc OogzKomglwWSYLzO3UT5ZOq80ewiaWkFEoYjIPGn46WoUwlTmSalI87ZAGDVKAGtV8/C UqnrVlsHgJZ0cwlx6ISCtJ6KETY3eWtVNtYY3rV/F2u0ACMzMM2LPmKImdmyurNYFlfA C5YGOuCslujHUDLax3yta2qr5HmvDEdmuGwnnD9/c2NlN2HStheZ411IYNTfVxjD+eGE hNynelQ+FmeFZT762SBhNgg/u7oTpDPbWFIsQjzFiuibMOpEuAV2Q+urpyRZpM6dgQxB xRaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=g4vwZ7pB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r16si2006487pgq.324.2018.03.27.23.40.31; Tue, 27 Mar 2018 23:40:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=g4vwZ7pB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752292AbeC1Gi1 (ORCPT + 99 others); Wed, 28 Mar 2018 02:38:27 -0400 Received: from mail-it0-f65.google.com ([209.85.214.65]:54187 "EHLO mail-it0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751151AbeC1GiZ (ORCPT ); Wed, 28 Mar 2018 02:38:25 -0400 Received: by mail-it0-f65.google.com with SMTP id m134-v6so2328295itb.3 for ; Tue, 27 Mar 2018 23:38:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=685BgLnpZ07vzOWvlevhuukMML/I9qd9ZJkpt96zNds=; b=g4vwZ7pBXcJBXdFD4ZE+3vv1ILoZCnh1kU9PBTm8Yu3/BUpKFSbajh74DvCMjtzhaq fAtQwkBA5IWu+XKnWXTOEp6rUDiuHJpYly4ngWW/ZS9yJyBmcFYURlrSDVyDINIWgxSP IUDRQfnRXmMq8v+nlMsnAzVx/tBSRG37msGSw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=685BgLnpZ07vzOWvlevhuukMML/I9qd9ZJkpt96zNds=; b=gGbK+hQr28zMgMZ1CGAhDYC6Qs+6lK6K95Ppa9VB3Wh+bT9fh7kTshh7CPF9V7Qm/M XGF8hcifKR1cTLD4urQyPpZ5Vgs61QAHsHOQ02z4dVZK8ZaUvyRd30YcSrB+iBBU/N+F atSy5BZhFPXQByIrmg+b8/6wxiD3Mh7NwRwFr+ytrAxRQMu47SmUSoR9IBh0Iezj1MOA Er7u9MVv4wGrUO49O0ldRYPQayHPHDnHkr7qqXqJGV2ru3WNoFy9Pqwx0HA8eSuuMDQe b/AKBLZfcp+OEPxEBIUDwEszIyD5ykvLj9Y3ovM7C2kZSWu3k1TSteaCNlH00rXhRjEb R3nw== X-Gm-Message-State: AElRT7GYM1wonHFhtpvbu0m7sjoSTOz9e2Ky9aSmzc6ZRVSxIsa0RwKz pIiCeqwvJQ8JisyGAO2vhGii5AeDzC0ATxBeFETvIQ== X-Received: by 2002:a24:6344:: with SMTP id j65-v6mr2058372itc.59.1522219104666; Tue, 27 Mar 2018 23:38:24 -0700 (PDT) MIME-Version: 1.0 Received: by 10.2.93.138 with HTTP; Tue, 27 Mar 2018 23:38:24 -0700 (PDT) In-Reply-To: <20180324110242.9474-1-stefan@agner.ch> References: <20180324110242.9474-1-stefan@agner.ch> From: Raveendra Padasalagi Date: Wed, 28 Mar 2018 12:08:24 +0530 Message-ID: Subject: Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type To: Stefan Agner Cc: Herbert Xu , "David S. Miller" , clabbe.montjoie@gmail.com, Scott Branden , Steven Lin , garsilva@embeddedor.com, pravin.shedge4linux@gmail.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Stefan, The change looks to be fine. From the IP point of view its using the same values in case of AES cipher and hash types so explicit casting should be ok. -Raveendra On Sat, Mar 24, 2018 at 4:32 PM, Stefan Agner wrote: > In the AES cases enum spu_cipher_type and enum hash_type have > the same values, so the assignment is fine. Explicitly cast > the enum type conversion. > > This fixes two warnings when building with clang: > drivers/crypto/bcm/cipher.c:821:34: warning: implicit conversion from > enumeration type 'enum spu_cipher_type' to different enumeration > type 'enum hash_type' [-Wenum-conversion] > hash_parms.type = cipher_parms.type; > ~ ~~~~~~~~~~~~~^~~~ > drivers/crypto/bcm/cipher.c:1412:26: warning: implicit conversion from > enumeration type 'enum spu_cipher_type' to different enumeration > type 'enum hash_type' [-Wenum-conversion] > hash_parms.type = ctx->cipher_type; > ~ ~~~~~^~~~~~~~~~~ > > Signed-off-by: Stefan Agner > --- > I am not familar with the IP... I would be glad if somebody with > better insight could have a look whether that patch makes sense. > > drivers/crypto/bcm/cipher.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/drivers/crypto/bcm/cipher.c b/drivers/crypto/bcm/cipher.c > index 2b75f95bbe1b..309c67c7012f 100644 > --- a/drivers/crypto/bcm/cipher.c > +++ b/drivers/crypto/bcm/cipher.c > @@ -818,7 +818,7 @@ static int handle_ahash_req(struct iproc_reqctx_s *rctx) > > /* AES hashing keeps key size in type field, so need to copy it here */ > if (hash_parms.alg == HASH_ALG_AES) > - hash_parms.type = cipher_parms.type; > + hash_parms.type = (enum hash_type)cipher_parms.type; > else > hash_parms.type = spu->spu_hash_type(rctx->total_sent); > > @@ -1409,7 +1409,7 @@ static int handle_aead_req(struct iproc_reqctx_s *rctx) > rctx->iv_ctr_len); > > if (ctx->auth.alg == HASH_ALG_AES) > - hash_parms.type = ctx->cipher_type; > + hash_parms.type = (enum hash_type)ctx->cipher_type; > > /* General case AAD padding (CCM and RFC4543 special cases below) */ > aead_parms.aad_pad_len = spu->spu_gcm_ccm_pad_len(ctx->cipher.mode, > -- > 2.16.2 >