Received: by 10.213.65.68 with SMTP id h4csp597131imn; Wed, 28 Mar 2018 09:12:04 -0700 (PDT) X-Google-Smtp-Source: AIpwx49M1HsdYmFs0tD0e+M56M1JFFLXllIEJi+QAXJuIsBjx0HBzuMJhQhBjhKqy4+WSFgZzIl0 X-Received: by 2002:a17:902:4481:: with SMTP id l1-v6mr4475772pld.43.1522253524477; Wed, 28 Mar 2018 09:12:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522253524; cv=none; d=google.com; s=arc-20160816; b=BfkgGIePW+aaWROXyg04OrIShYcFm6bD4uexnouAD1R6a2s7HEa/0Eu/QKw3kDftFm nKZ1E5X9hzX0/65WiG9wKLsDllJJFXmseG3XsjBq1uQzQ3UV59HELAMwsBjuH5Rdj4Ql UuN8l4SGJNiTrkoIHxSsFUylSlAX8Ep7SvobYBRuTMGvTrN3o+TLHK9LbYrqoAn+8XOD MiOXjTG+OUaoLd/8TRTzu92FaKq3Cy2Tkgaix5xEmqL7ab3NYoQ9N88++ltdPvJ1o09g g8N8HWJ2Eaw1IQP9gaQvAxxCMiQzgGqtLN0uHfIWTPxWl4Ujln59OhQ2AodnmKb5JWSC nVQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:user-agent:message-id :references:in-reply-to:subject:cc:to:from:date :content-transfer-encoding:mime-version:arc-authentication-results; bh=pa6F5meoxSzim6wjXbk3woVzENqaygpS1542YwqIy+U=; b=M54Mh04qrudeFY1DkE+xAHncuByr/81tT5ZAdDaWIWUth5blkcv7bVW/Z7AH3M9ao8 Y39jyJT+zmnLF7cwHdQCegnCPMFGYwvmLpK936apZOJXPAVb+uTgbC0yJsbVyf3T8XQS cdm3qW8WWuss4t6UOkKxj8VTbQcBWLLwLRd+zsfGVVp5I0E4bf6dzDK2n3u5J5PaaKmC PuPfFYydz68FAs3CAkO4WJjMCXdXzijf9S5M5s3VfyxSkPf3+J+3qEIvoIk2RyDT723X bXefEjJnIGmNxzPSJjs6XoHTJeXN4ppW0TcVqA0SPDEacXanHPhDizi6ALYjPWfP/rH5 Rirg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@agner.ch header.s=dkim header.b=yITtqGSb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d14-v6si3936584plj.191.2018.03.28.09.11.39; Wed, 28 Mar 2018 09:12:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@agner.ch header.s=dkim header.b=yITtqGSb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754072AbeC1Pld (ORCPT + 99 others); Wed, 28 Mar 2018 11:41:33 -0400 Received: from mail.kmu-office.ch ([178.209.48.109]:55235 "EHLO mail.kmu-office.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753816AbeC1Plc (ORCPT ); Wed, 28 Mar 2018 11:41:32 -0400 Received: from webmail.kmu-office.ch (unknown [IPv6:2a02:418:6a02::a3]) by mail.kmu-office.ch (Postfix) with ESMTPSA id 7AF595C0504; Wed, 28 Mar 2018 17:40:59 +0200 (CEST) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Date: Wed, 28 Mar 2018 17:41:30 +0200 From: Stefan Agner To: Raveendra Padasalagi , Herbert Xu Cc: "David S. Miller" , clabbe.montjoie@gmail.com, Scott Branden , Steven Lin , garsilva@embeddedor.com, pravin.shedge4linux@gmail.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type In-Reply-To: References: <20180324110242.9474-1-stefan@agner.ch> Message-ID: X-Sender: stefan@agner.ch User-Agent: Roundcube Webmail/1.3.4 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=agner.ch; s=dkim; t=1522251659; bh=pa6F5meoxSzim6wjXbk3woVzENqaygpS1542YwqIy+U=; h=MIME-Version:Content-Type:Content-Transfer-Encoding:Date:From:To:Cc:Subject:In-Reply-To:References:Message-ID; b=yITtqGSbxHMDd1sA439GRLR5AbmBxA8M8ZL7UvXBKd95pz8aBLOIeegLMsKMxGRBKjTfrMZEuejxWnoz4BD1v2mfgxn/pR6Z9jqVTKWE1ubiSbfL4l+yPd7skv+eHlwMc46x3kmZKlIcCnbYYsv14McTD9S8cwocfrRlYA6yJzU= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28.03.2018 08:38, Raveendra Padasalagi wrote: > Hi Stefan, > > The change looks to be fine. From the IP point of view its using the > same values in case of AES cipher and hash types so explicit casting > should be ok. Can I take that as an Ack? Herbert, given that Raveendra agrees to the change, do you want me to send a non-RFC version or can you merge the patch as is? -- Stefan > > -Raveendra > > On Sat, Mar 24, 2018 at 4:32 PM, Stefan Agner wrote: >> In the AES cases enum spu_cipher_type and enum hash_type have >> the same values, so the assignment is fine. Explicitly cast >> the enum type conversion. >> >> This fixes two warnings when building with clang: >> drivers/crypto/bcm/cipher.c:821:34: warning: implicit conversion from >> enumeration type 'enum spu_cipher_type' to different enumeration >> type 'enum hash_type' [-Wenum-conversion] >> hash_parms.type = cipher_parms.type; >> ~ ~~~~~~~~~~~~~^~~~ >> drivers/crypto/bcm/cipher.c:1412:26: warning: implicit conversion from >> enumeration type 'enum spu_cipher_type' to different enumeration >> type 'enum hash_type' [-Wenum-conversion] >> hash_parms.type = ctx->cipher_type; >> ~ ~~~~~^~~~~~~~~~~ >> >> Signed-off-by: Stefan Agner >> --- >> I am not familar with the IP... I would be glad if somebody with >> better insight could have a look whether that patch makes sense. >> >> drivers/crypto/bcm/cipher.c | 4 ++-- >> 1 file changed, 2 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/crypto/bcm/cipher.c b/drivers/crypto/bcm/cipher.c >> index 2b75f95bbe1b..309c67c7012f 100644 >> --- a/drivers/crypto/bcm/cipher.c >> +++ b/drivers/crypto/bcm/cipher.c >> @@ -818,7 +818,7 @@ static int handle_ahash_req(struct iproc_reqctx_s *rctx) >> >> /* AES hashing keeps key size in type field, so need to copy it here */ >> if (hash_parms.alg == HASH_ALG_AES) >> - hash_parms.type = cipher_parms.type; >> + hash_parms.type = (enum hash_type)cipher_parms.type; >> else >> hash_parms.type = spu->spu_hash_type(rctx->total_sent); >> >> @@ -1409,7 +1409,7 @@ static int handle_aead_req(struct iproc_reqctx_s *rctx) >> rctx->iv_ctr_len); >> >> if (ctx->auth.alg == HASH_ALG_AES) >> - hash_parms.type = ctx->cipher_type; >> + hash_parms.type = (enum hash_type)ctx->cipher_type; >> >> /* General case AAD padding (CCM and RFC4543 special cases below) */ >> aead_parms.aad_pad_len = spu->spu_gcm_ccm_pad_len(ctx->cipher.mode, >> -- >> 2.16.2 >>