Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp554358pxx; Thu, 29 Oct 2020 08:49:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxk1QW29ga6k2KnEdfnZpuuCWDpJTqioL0DOhgS+H2xuRI44VQxw9iRKkUJc93SwIM6jJcM X-Received: by 2002:a17:906:d8ce:: with SMTP id re14mr4571588ejb.275.1603986559238; Thu, 29 Oct 2020 08:49:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603986559; cv=none; d=google.com; s=arc-20160816; b=UvesvOQCHS5tIylEoB2LJpIgkQGJ/JCL12JdoAiuC0qlEFHJsa8zs/W4EQJzs8Mcvs nkLnFP48WSyB5Kv9UwDsNmfIOXBisG49WdU3y7yWA3iZKGEaUMMx+2ie4MfOy3ZRt7Wi jwYE3wN17hwxj0+uM5cPrfl8Cn02rJYPOmrv9UAftkpYWu4jQ94uf0PmT63gsmaWwctO 5sJ/BePuOfddBYWpQ2hov0qIkcY9ceaM9fHkkRezPuPWGnLwyIe1Ij6f/3dkCSlMoV8w PSQ1V+JwTnT0IuxBo8vBgrBTKtrh5bSNUgF68/eOCvYUznhwInj94n2e2ld9unSLSRAf tzwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=XYOenU+DPDSXVHB0xZVno90Xlrne70SxcRufD7R/LG4=; b=wG7l6yw9n7vWZD3gZ7lYCjq0Gz7ptj4aGhVfI2HjAcVpSVs6HV1rbssmEYQxMJxJ9g KA1t375aFkRJHThMVaRYhwE6HVTAYgN3aGIeUyhCD811B//wV5/hZO9DiEIH+ncnLmPF YZ08DKhgyyuGsrd2AUmixPfGL0Ii9okmkgbQk2Hwe2h3LNoH0NO2w9n8UnqCiw7r5G9Z LR7/ONMngZy2eDIeEuqE5Xe/bcA91DgRW4t3Ofq/6M3jEz5TTAdU81vkUCCVZ0lMd6eS xl/Hg95/gFCIQGm0u6WnTIwUdZDWv92o5WFipTIM1tnj32SoyF5APtAt+XjMUUkwvFjs oUUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lCc5ALxa; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o7si2063787ejr.747.2020.10.29.08.48.49; Thu, 29 Oct 2020 08:49:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lCc5ALxa; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727832AbgJ2Psi (ORCPT + 99 others); Thu, 29 Oct 2020 11:48:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:54274 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728112AbgJ2Psi (ORCPT ); Thu, 29 Oct 2020 11:48:38 -0400 Received: from localhost.localdomain (adsl-84-226-167-205.adslplus.ch [84.226.167.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B1E5B2076B; Thu, 29 Oct 2020 15:48:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603986517; bh=IvQP1dDAbNODidswNW7by3Hqoc8OdOVCEcn2toqRwHA=; h=From:To:Cc:Subject:Date:From; b=lCc5ALxazQH5Yvn1QsYl4aM9AsWW1OS/NX0icDf7qFCmXCu5acBDNaI1KJq7RUL15 VnTUUFeFOFxaraYxAqiEfC7V9ApLlQNSuAJYyUZ0kctp25MYqpsJ3NCIY0nPw6f6rV Oa+0JTPKKOKvK4v2yRpleb6pWvHUUO3jfaUBwci0= From: Krzysztof Kozlowski To: David Howells , Herbert Xu , "David S. Miller" , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Krzysztof Kozlowski , Randy Dunlap Subject: [RESEND PATCH] KEYS: asymmetric: Fix kerneldoc Date: Thu, 29 Oct 2020 16:48:30 +0100 Message-Id: <20201029154830.26997-1-krzk@kernel.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Fix W=1 compile warnings (invalid kerneldoc): crypto/asymmetric_keys/asymmetric_type.c:160: warning: Function parameter or member 'kid1' not described in 'asymmetric_key_id_same' crypto/asymmetric_keys/asymmetric_type.c:160: warning: Function parameter or member 'kid2' not described in 'asymmetric_key_id_same' crypto/asymmetric_keys/asymmetric_type.c:160: warning: Excess function parameter 'kid_1' description in 'asymmetric_key_id_same' crypto/asymmetric_keys/asymmetric_type.c:160: warning: Excess function parameter 'kid_2' description in 'asymmetric_key_id_same' Signed-off-by: Krzysztof Kozlowski Acked-by: Randy Dunlap --- crypto/asymmetric_keys/asymmetric_type.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/crypto/asymmetric_keys/asymmetric_type.c b/crypto/asymmetric_keys/asymmetric_type.c index 33e77d846caa..ad8af3d70ac0 100644 --- a/crypto/asymmetric_keys/asymmetric_type.c +++ b/crypto/asymmetric_keys/asymmetric_type.c @@ -152,7 +152,8 @@ EXPORT_SYMBOL_GPL(asymmetric_key_generate_id); /** * asymmetric_key_id_same - Return true if two asymmetric keys IDs are the same. - * @kid_1, @kid_2: The key IDs to compare + * @kid1: The key ID to compare + * @kid2: The key ID to compare */ bool asymmetric_key_id_same(const struct asymmetric_key_id *kid1, const struct asymmetric_key_id *kid2) @@ -168,7 +169,8 @@ EXPORT_SYMBOL_GPL(asymmetric_key_id_same); /** * asymmetric_key_id_partial - Return true if two asymmetric keys IDs * partially match - * @kid_1, @kid_2: The key IDs to compare + * @kid1: The key ID to compare + * @kid2: The key ID to compare */ bool asymmetric_key_id_partial(const struct asymmetric_key_id *kid1, const struct asymmetric_key_id *kid2) -- 2.25.1