Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp988958pxa; Thu, 27 Aug 2020 23:58:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxoQuerPMqmYxJGgOthn+JcITzcaMtpw3rt9uBPnDNW6Xis5ZMjsyl7fdFnNWHZJID1MIKr X-Received: by 2002:a05:6402:2359:: with SMTP id r25mr418201eda.65.1598597890104; Thu, 27 Aug 2020 23:58:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598597890; cv=none; d=google.com; s=arc-20160816; b=cbeIHP0wklD33ZDySSi7wdgjWSECBLPa1eNm6Ic47jHQVMXpSiwtvueF5km8oMO8rW cvRebJg/+TYfH6VxrX7WRAA9I9FiNtIm1q1RP0DeG4QgrNbojzGVxzeqWWN0PTMhjFaS ncocfPbPiz3u9yEdIXiVpAgc/olK6ktVXs/I8m+pqb1iwS27Ja3/6Fxw1iqry9RAfWQu VYLDPUCmS+Aaw7kEj5VzCyFua9m6mQ2BpRb55PITjXPgcBjfQZcXafpJZgLnv1UIBmry TGoVJ9vN/4PUHf7u0uYPow0srOGVIQgCIJC8faWWs2u9gd7H5wFNdUKXPWgZ32Mq8cV5 lzZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:message-id:subject:cc:to:from:date; bh=TQ0MG5BpYotleY1SMEJe1TjKxerAgOemaIqwzCTuxmQ=; b=l8TA3j7IFRHxNUKfqqzj86lzRRmVeeCDTPks0OLn7SubjeI8I0zXdA1gRlv1jFXIC/ GIEuJjcVILjpxJs/PGb4em+FYmQ5PDn/6j6ZuvaD3Cknb3mXkyI+FD9y/aulLtF35cHe 0u/7jzwChkhYLN6/cNledezpKby2v0eddxPs+wgSQM7+s2LSoKMI83FU5SwbT2jdqbZU bkwS+UBgskYU0FaCYPkHqqTAgCT0NEmXoqETeyA1hYx5t6fxv4z6+Bk4uokdZD5gAe+W mb+g4gDQiKtitW/k7mnMxlXFZ9ivneAd1fbzDW9M37u6HVx8wDsw5icKSHFSQRV7wKXv sbTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w20si13686edi.555.2020.08.27.23.57.44; Thu, 27 Aug 2020 23:58:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726330AbgH1G5l (ORCPT + 99 others); Fri, 28 Aug 2020 02:57:41 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:35254 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725858AbgH1G5l (ORCPT ); Fri, 28 Aug 2020 02:57:41 -0400 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.0.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1kBYKP-0003Me-Uj; Fri, 28 Aug 2020 16:57:39 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 28 Aug 2020 16:57:37 +1000 Date: Fri, 28 Aug 2020 16:57:37 +1000 From: Herbert Xu To: Xu Wang Cc: davem@davemloft.net, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, vulab@iscas.ac.cn Subject: Re: [PATCH] Remove unneeded variable t1 Message-ID: <20200828065737.GA14575@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200818080553.12064-1-vulab@iscas.ac.cn> X-Newsgroups: apana.lists.os.linux.cryptoapi,apana.lists.os.linux.kernel User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Xu Wang wrote: > Remove unneeded variable t1 seed_encrypt() and > seed_decrypt(). > > Signed-off-by: Xu Wang > --- > crypto/seed.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/crypto/seed.c b/crypto/seed.c > index 5e3bef3a617d..69b3058d6a32 100644 > --- a/crypto/seed.c > +++ b/crypto/seed.c > @@ -366,7 +366,7 @@ static void seed_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) > const struct seed_ctx *ctx = crypto_tfm_ctx(tfm); > const __be32 *src = (const __be32 *)in; > __be32 *dst = (__be32 *)out; > - u32 x1, x2, x3, x4, t0, t1; > + u32 x1, x2, x3, x4, t0; > const u32 *ks = ctx->keysched; > > x1 = be32_to_cpu(src[0]); > @@ -404,7 +404,7 @@ static void seed_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) > const struct seed_ctx *ctx = crypto_tfm_ctx(tfm); > const __be32 *src = (const __be32 *)in; > __be32 *dst = (__be32 *)out; > - u32 x1, x2, x3, x4, t0, t1; > + u32 x1, x2, x3, x4, t0; > const u32 *ks = ctx->keysched; > > x1 = be32_to_cpu(src[0]); This doesn't even compile! -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt