Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp632729pxt; Thu, 12 Aug 2021 06:22:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwd6BezqOhQxzEWxkhqZvKe4qgPV8txB7y1k+j8zGtwSpaizBuGIzM1LQHZ1swOj45LSqBC X-Received: by 2002:a17:907:785a:: with SMTP id lb26mr3160504ejc.77.1628774573682; Thu, 12 Aug 2021 06:22:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628774573; cv=none; d=google.com; s=arc-20160816; b=AVKrUt5EZaECjCb7H738dmqDy8OjvnUvX8cyEuTXe9gTJVfco0Nzd8fT25cAWz0UCD dx9Vs1W73xSMZxgq/guOp9OPLS1+UWhBGkvV9WTTx2ho/VKjylr5tI8Fwgm9V02DIin1 krOcp5sQBLSWQGrPSjoZ94sCkn3WT6UAc3mYcRvPfw8yUVarQq7bPuln4BXwfNJF0nwq J51qLxUWCEDOB7JY7XHW0+2NqivVV8u0PX6zGwo3ZCD7vOeIwVqKEUVqWpbcyuHr7Z9s tAtSlP3T/fj8BvH4TAsQHICKZIT2d7I5PBN8jmPCelUXHLdaYC9XLvIBVTcrB3+RQnZ5 uVpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=2Sjbs0Kjv5ASIYPY6ym4MVx0jnWnSf+gV5Q/PGKfBhA=; b=OIgfjmB7x16GSoh6vxmpG0oRhNuEUNxYIAViZ9FBj+GYgWMPCrY1PCXH8/JaZgU2Yb 05T9nmwOXoB1XzABsgwwVtOo1HZ3Ig22GdLO6IYb5fOJIzZKnOZO/bstsyovCktnmwps 7NluslAX8Li34epQdVpdl1sU3Po70Y7NRJ/MZhwpqbfIh+02ZMMEJ8KMsKxcDnwkUiyc AuAY4bHpV9JGJgxQUp0XaK5jW0oO5BAHWgKqEbqyAXuvefUOeBPihfopcPhBGEi3YujM THbpG4+cr1s47vCkn/ilnlivfGOnJbiCt/30iVmAbjnKxfRRwIdqufxqLJCsxoAAxryP lLvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hr1si3366645ejc.424.2021.08.12.06.22.28; Thu, 12 Aug 2021 06:22:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237603AbhHLNWR (ORCPT + 99 others); Thu, 12 Aug 2021 09:22:17 -0400 Received: from out30-133.freemail.mail.aliyun.com ([115.124.30.133]:32927 "EHLO out30-133.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236552AbhHLNSQ (ORCPT ); Thu, 12 Aug 2021 09:18:16 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R121e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04426;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=11;SR=0;TI=SMTPD_---0UinuYNY_1628774268; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0UinuYNY_1628774268) by smtp.aliyun-inc.com(127.0.0.1); Thu, 12 Aug 2021 21:17:48 +0800 From: Tianjia Zhang To: Herbert Xu , "David S. Miller" , Eric Biggers , Eric Biggers , Gilad Ben-Yossef , Ard Biesheuvel , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Jia Zhang , "YiLin . Li" Cc: Tianjia Zhang Subject: [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement Date: Thu, 12 Aug 2021 21:17:46 +0800 Message-Id: <20210812131748.81620-2-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.19.1.3.ge56e4f7 In-Reply-To: <20210812131748.81620-1-tianjia.zhang@linux.alibaba.com> References: <20210812131748.81620-1-tianjia.zhang@linux.alibaba.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The position of the return value test statement of crypto_aead_setkey() is wrong, adjust to make it work properly. Signed-off-by: Tianjia Zhang --- crypto/tcrypt.c | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index d73a42fdaa9b..73c97e085baf 100644 --- a/crypto/tcrypt.c +++ b/crypto/tcrypt.c @@ -612,6 +612,12 @@ static void test_aead_speed(const char *algo, int enc, unsigned int secs, } } ret = crypto_aead_setkey(tfm, key, *keysize); + if (ret) { + pr_err("setkey() failed flags=%x\n", + crypto_aead_get_flags(tfm)); + goto out; + } + ret = crypto_aead_setauthsize(tfm, authsize); iv_len = crypto_aead_ivsize(tfm); @@ -622,15 +628,8 @@ static void test_aead_speed(const char *algo, int enc, unsigned int secs, printk(KERN_INFO "test %u (%d bit key, %d byte blocks): ", i, *keysize * 8, bs); - memset(tvmem[0], 0xff, PAGE_SIZE); - if (ret) { - pr_err("setkey() failed flags=%x\n", - crypto_aead_get_flags(tfm)); - goto out; - } - sg_init_aead(sg, xbuf, bs + (enc ? 0 : authsize), assoc, aad_size); -- 2.19.1.3.ge56e4f7