Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp5495093pxb; Wed, 26 Jan 2022 13:23:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJyCdZODgyN26dYk+HoxQU4H66c9XfjrKmSsmkfwVKWm5D4cw+WKh58VsaizLMWMdr57UKZh X-Received: by 2002:a63:141e:: with SMTP id u30mr606664pgl.30.1643232193852; Wed, 26 Jan 2022 13:23:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643232193; cv=none; d=google.com; s=arc-20160816; b=AhGlk3hilHA8MMliHoGP62hUIdQTNUKovRK2zHUEz6qtBB3Wj8EmM5xBw7IWr5Xjj1 Ubmd7AGLOYOoCwd5cPtQk30IoaV7Dn/4jeK68PA994B4Um+zu48XfN7Me/HRD2fcOKuu F9XyRr7fZPrQjhBwJaVe+wHsqhpaVauQ9M578cy88P9dVKC8OWgeU6Vy15ll4C615pFA qJnKQAOHU4ZKe8qgcYQNDszMC5YqthJbAzKQ+q6Ny19NOJbOhOJy0cF+kclEygQJa/VW R2idMoIYu3UlyjR2llkD9LjuByDzUqkwzzJdILjWr0yX/hGeAomx6Q6198MLOP6L2PC+ OKbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=z6Z0P//1Nb/0zii1oKCv3nKwK9MpRH6b2WFxRnLAlcg=; b=ARn9bOjcjM1cTMcvqEh9z1CU0VoQ7sdyOq4lc7NGxJt5bz2Nvde0mMizOmBcMLlBqH P0q64XQApo/KcuCjSZ3g91Rk62hA7DGsvi8Z5bf7Up1OezBsSnsXsM/NGOMxbH9V3YEc b4NMYbwPOrGry8JxyGRzjwv/8OYXFDnNjYVKs+vGXvtE78L6s83dFpck6/JoD15GNzz0 bWBOzoIJvgeB1aECPQIfp86R7SSGA9dchrVy9OQS2T1CX9LrYdCCq025QKsZMZ0aDWzd TZ87EC6tG3JARQ/IGQVipQ1dohdRadYKRj9pg87gH2HxcSlQNHhutEaOu5MGJILL46xU U5uA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=QIIUVSEa; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l10si243532plg.617.2022.01.26.13.22.58; Wed, 26 Jan 2022 13:23:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=QIIUVSEa; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235282AbiAZNoS (ORCPT + 99 others); Wed, 26 Jan 2022 08:44:18 -0500 Received: from mo4-p01-ob.smtp.rzone.de ([85.215.255.52]:37349 "EHLO mo4-p01-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240968AbiAZNoR (ORCPT ); Wed, 26 Jan 2022 08:44:17 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1643204649; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=z6Z0P//1Nb/0zii1oKCv3nKwK9MpRH6b2WFxRnLAlcg=; b=QIIUVSEaKZp60JLVB1dknIwI+i92LHRTndkIg+f94/VaQSGimmYk7Z74ZGg9/NK6lG kq4SvGqKn0FjrOBSDCCe0CpX5TolDhrNTiJlwgzy6qGwn5amaRQdql4GjScLUcgmpBPW lnYiyY9LFRRQNK8WGb5zPfMZ3eioPBtM7ZsFm18AsKV2gqz8wmhqKO3yj80Isq8FpDWI tIj8e200dg7DKZUGykYbuolwictEl99nlvPbSueOqnqZGwGyGlr3K8H2Mh7CFRL4EQ1y DtfsPZYvEMxUBBXK6T9gTF4xJTsPEiMIZpUBn6uw6LcJ2mV9ODo9fGXzOnUTqUGXjhZe Q9iQ== Authentication-Results: strato.com; dkim=none X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xmwdNnzGHXPaJvScdWrN" X-RZG-CLASS-ID: mo00 Received: from tauon.chronox.de by smtp.strato.de (RZmta 47.38.0 DYNA|AUTH) with ESMTPSA id v5f65ay0QDi8lSM (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Wed, 26 Jan 2022 14:44:08 +0100 (CET) From: Stephan Mueller To: herbert@gondor.apana.org.au, kernel test robot Cc: llvm@lists.linux.dev, kbuild-all@lists.01.org, linux-crypto@vger.kernel.org, simo@redhat.com, Nicolai Stange Subject: Re: [PATCH 1/7] crypto: DRBG - remove internal reseeding operation Date: Wed, 26 Jan 2022 14:44:08 +0100 Message-ID: <32397848.ByM7UNSnkf@tauon.chronox.de> In-Reply-To: <202201262050.xFgnR1Kx-lkp@intel.com> References: <2450379.h6RI2rZIcs@positron.chronox.de> <202201262050.xFgnR1Kx-lkp@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Am Mittwoch, 26. Januar 2022, 13:15:04 CET schrieb kernel test robot: Hi, > crypto/drbg.c:204:30: warning: unused function 'drbg_sec_strength' > [-Wunused-function] static inline unsigned short > drbg_sec_strength(drbg_flag_t flags) ^ It is interesting that Sparse did not complain about this. Anyhow, this function is not needed and will be removed. > > >> crypto/drbg.c:1742:2: error: call to __compiletime_assert_223 declared > >> with 'error' attribute: BUILD_BUG_ON failed: ARRAY_SIZE(drbg_cores) != > >> ARRAY_SIZE(drbg_algs) > BUILD_BUG_ON(ARRAY_SIZE(drbg_cores) != ARRAY_SIZE(drbg_algs)); Correct, it should be > instead of != :-) This will be fixed in the new code base Thanks! Ciao Stephan