Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp894507rwp; Thu, 13 Jul 2023 02:55:07 -0700 (PDT) X-Google-Smtp-Source: APBJJlF5acEjKJ+CcutMJnAHNuMowZFfL5L3eYBYW/KGQsh5mMMEfn+Zy/N+T3Xa7TuEuk7U58gI X-Received: by 2002:a17:902:f7cf:b0:1b8:a88c:4dc6 with SMTP id h15-20020a170902f7cf00b001b8a88c4dc6mr995272plw.45.1689242107489; Thu, 13 Jul 2023 02:55:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689242107; cv=none; d=google.com; s=arc-20160816; b=Sslhc+zP+B2wami9hdj6bfmhxNnYLQVYcJLyBSmSTVxfUee2TFf7v60LUvcZAXUVX9 A7K+OHjY2oE6QNNqES+kHPf8DAPJuUryWwJ6s7VjbnpFBCPHThE1hEwtqjedhI11bHHG bAyJA3/f3e3TcTcTIpAlh65+EjUqF4l8zVKLCBA+/0+/nR8un0E6LVAIVxNPCa4MwMjr hz+qP6K/OTbs9uwXHaqBRa3Mn3Kw14UDJlyWWSLeyFNesdx3Er+4Dhn821eLC+ugJIcX hZLH0T5AABEcvPUUBjK8mz0hK9ggPyv6LnSfpX7cnh9jfKJrb5T47rfTrUtSuV9VlgAJ lKjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Ihk7EviYRZQRUb0YtRrt3i6dx+rNMfa6VF3Zeyw/u1U=; fh=hISjHmbA5iroYrAUIe+irf10TeepNkM8WHE3E8Dh/lw=; b=JWuqRnGwkcrY7yQjgM8x5B2UO75vmVtHs/WiYop/i/vav4wgVxDqwp2ZdRJ7SdFiQ4 9XqSZwl5QXNV2iXQtfZWPDhpIeeMDswEGHBboXSP9umhXYAFsKOAcnGwFZ/lTQgMp9Rg 5tsKyk74YMJhEENXaJkhRo8qvSB78DOj+wKOiCTAKedV1JmcF6a74WzGQbw1054FI89i eI3jZexEvPm4nthx56F1pUudU8hqErET3l2WoabovZH62SVwjzYwp/2Y6qaC7G6eVIQ8 fLsaViBWjv5D8WIywzmbpEuAflXYWt3IDq2/eF/61nmZVAq3UHDSZa77drYwdLy8OYw+ KZhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jAG4H0o3; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ky15-20020a170902f98f00b001b8b386ae30si4877653plb.335.2023.07.13.02.54.47; Thu, 13 Jul 2023 02:55:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jAG4H0o3; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234532AbjGMJoq (ORCPT + 99 others); Thu, 13 Jul 2023 05:44:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60210 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233256AbjGMJo3 (ORCPT ); Thu, 13 Jul 2023 05:44:29 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF9FC4214; Thu, 13 Jul 2023 02:42:54 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3030B61AD8; Thu, 13 Jul 2023 09:42:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8FACAC433CA; Thu, 13 Jul 2023 09:42:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689241370; bh=ORLqydtVMM+8rB9hFmMafDUI3s1uL+5DcG+3sInL+9Y=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=jAG4H0o3rgs8CaGEFPo3CY2gdh+2RpQpyZwKMcK7xRHYpzn9UklAVZRZhsxtUusOm 2d94ZUobSdlc+h6ESf/qLgNqdZrXiXiLT9u4o19qZ2A3EU2sa9KiYkJ3NJBXsUlJyW 9jfM82t+wO4egp7Kjf9LvFkeqRrzr9nRt6oreO2A4bJX9tVEIqUDCcNemcikrNS/Hi bmKtjwHC+anUUB6zzurOqIWmCC4ghjiaMM0T8mm8Ny5IA0VueObyYUJ1vs8zZ41bR1 h5VT2E3gnEOsV11AIy4YTIM6qcci3dJij5ujDleWqQXXRxGha9afz3URCwV/KHm4df FQUZYwiph7uyw== Received: by mail-lj1-f179.google.com with SMTP id 38308e7fff4ca-2b703cbfaf5so6710461fa.1; Thu, 13 Jul 2023 02:42:50 -0700 (PDT) X-Gm-Message-State: ABy/qLYsMeLspvI3MfnHjcULN0IzLT6jis/iG8DLWyUreM+7Z2+CIFyN x1aBhf7VCGsrYH6gwqv2I/XqzzlRSpD2akz8jOw= X-Received: by 2002:a2e:878b:0:b0:2b6:dc50:19ac with SMTP id n11-20020a2e878b000000b002b6dc5019acmr1071789lji.31.1689241368585; Thu, 13 Jul 2023 02:42:48 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Ard Biesheuvel Date: Thu, 13 Jul 2023 11:42:37 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] crypto:space required before the open brace '{' To: chenqingyun001@208suo.com Cc: herbert@gondor.apana.org.au, davem@davemloft.net, catalin.marinas@arm.com, will@kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, 13 Jul 2023 at 10:59, wrote: > > Maintain code readability and style consistency > > Signed-off-by: Qingyun Chen NAK This is a cast operation, which doesn't require a trailing space. If the tool you are using misidentifies this, please fix the tool instead. > --- > arch/arm64/crypto/ghash-ce-glue.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/arm64/crypto/ghash-ce-glue.c > b/arch/arm64/crypto/ghash-ce-glue.c > index 97331b454ea8..cb1cd161c022 100644 > --- a/arch/arm64/crypto/ghash-ce-glue.c > +++ b/arch/arm64/crypto/ghash-ce-glue.c > @@ -241,7 +241,7 @@ static int gcm_aes_setkey(struct crypto_aead *tfm, > const u8 *inkey, > if (ret) > return -EINVAL; > > - aes_encrypt(&ctx->aes_key, key, (u8[AES_BLOCK_SIZE]){}); > + aes_encrypt(&ctx->aes_key, key, (u8[AES_BLOCK_SIZE]) {}); > > /* needed for the fallback */ > memcpy(&ctx->ghash_key.k, key, GHASH_BLOCK_SIZE);