Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1199958ybp; Fri, 4 Oct 2019 10:57:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqwxnPUT7Y3HdfDbb+fAnB9UQaPLhZ0zDwtAN66uqGOYww5GHJYkbz97Wo0Ljwsf5kuOsUB9 X-Received: by 2002:a50:d718:: with SMTP id t24mr16457809edi.168.1570211845838; Fri, 04 Oct 2019 10:57:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570211845; cv=none; d=google.com; s=arc-20160816; b=qS01/Gj+udJY0DyZXzWIzfylA3s5b7HZw2jfQNJFa4dAXQl+6xIqtwqzvnaLtJaQyf HopRBchHfq2nal61O/AYa9WOE4HLElcwjrnbv8yTmtF9vRrFbCaEJWc1JEg18RO4xCA6 4U3YwCxY8D8dECwEoLE6ojhk5n18tkIEnkZ3zmnj2Loe6bIZjBrTK2CKQqbXiPVq1nA8 9M8OyTf1UVfFed0zNxC22dI/KPGLkdNRnSb0MzunzuqvWZKSISwuph1xyHKC/e8jFH3i hMX/WlvepLxuozIiLyQHWNleSHRcGXCsfyLK2splCz1D83XrOliT91g0SYKSNPpV6x8B C5Aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=VfSq6ypk5Q3swRe3ohOTdSeEwopOsLbn8hiZVn1X01g=; b=d7PQODnC0nRlue8QjbJJh+IIwLGzOPtBKCWbOgddovwTbHNZmnYNsEiJWSh1lXFqLf 6S59nvTQLxL18IsIuqAMfYTQEDAQXV3gYcYATdJgfAo78Y6gjbyxAYzfo+VDG1CjsQj2 Pej/1DqQU9reJsNUCO3D0V2cqpWW+n/cyk1+31DzkmsQ7XnlCgL9tBUAEmgODWH5d9bI TidRW75LCVr2ZWbI8PtgSdHM5bErTrSR/ttVR4m2xtTeDZUcqi6qbW0QPU6xup0cWbPM u2Ez7pfhMyf41I+vaU8fUdpUcel8qslj6309eCNFNXSFU2Oq3bBXMlivtPfLpwAMlCv1 SUFw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i40si4000416eda.225.2019.10.04.10.57.00; Fri, 04 Oct 2019 10:57:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389165AbfJDRxP (ORCPT + 99 others); Fri, 4 Oct 2019 13:53:15 -0400 Received: from stargate.chelsio.com ([12.32.117.8]:46060 "EHLO stargate.chelsio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388880AbfJDRxO (ORCPT ); Fri, 4 Oct 2019 13:53:14 -0400 Received: from beagle7.asicdesigners.com (beagle7.asicdesigners.com [10.192.192.157]) by stargate.chelsio.com (8.13.8/8.13.8) with ESMTP id x94Hqr0P005677; Fri, 4 Oct 2019 10:52:53 -0700 From: Ayush Sawal To: herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, smueller@chronox.de Cc: Atul Gupta Subject: [af_alg v2] crypto:af_alg cast ki_complete ternary op to int Date: Fri, 4 Oct 2019 10:50:58 -0700 Message-Id: <20191004175058.11850-1-ayush.sawal@chelsio.com> X-Mailer: git-send-email 2.20.0.rc2.7.g965798d MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org when libkcapi test is executed using HW accelerator, cipher operation return -74.Since af_alg_async_cb->ki_complete treat err as unsigned int, libkcapi receive 429467222 even though it expect -ve value. Hence its required to cast resultlen to int so that proper error is returned to libkcapi. AEAD one shot non-aligned test 2(libkcapi test) ./../bin/kcapi -x 10 -c "gcm(aes)" -i 7815d4b06ae50c9c56e87bd7 -k ea38ac0c9b9998c80e28fb496a2b88d9 -a "853f98a750098bec1aa7497e979e78098155c877879556bb51ddeb6374cbaefc" -t "c4ce58985b7203094be1d134c1b8ab0b" -q "b03692f86d1b8b39baf2abb255197c98" Signed-off-by: Ayush Sawal Signed-off-by: Atul Gupta Signed-off-by: Herbert Xu v1: cast err and resultlen to long Signed-off-by: Ayush Sawal --- crypto/af_alg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/af_alg.c b/crypto/af_alg.c index 879cf23..0dceaab 100644 --- a/crypto/af_alg.c +++ b/crypto/af_alg.c @@ -1043,7 +1043,7 @@ void af_alg_async_cb(struct crypto_async_request *_req, int err) af_alg_free_resources(areq); sock_put(sk); - iocb->ki_complete(iocb, err ? err : resultlen, 0); + iocb->ki_complete(iocb, err ? err : (int)resultlen, 0); } EXPORT_SYMBOL_GPL(af_alg_async_cb); -- 1.8.3.1