From: Eric Biggers Date: Thu, 10 Jan 2019 20:17:52 +0000 (-0800) Subject: crypto: gcm - use correct endianness type in gcm_hash_len() X-Git-Url: http://git.maquefel.me/?a=commitdiff_plain;h=18666550f4c51e331551682d358dcfe3aca76a37;p=linux.git crypto: gcm - use correct endianness type in gcm_hash_len() In gcm_hash_len(), use be128 rather than u128. This fixes the following sparse warnings: crypto/gcm.c:252:19: warning: incorrect type in assignment (different base types) crypto/gcm.c:252:19: expected unsigned long long [usertype] a crypto/gcm.c:252:19: got restricted __be64 [usertype] crypto/gcm.c:253:19: warning: incorrect type in assignment (different base types) crypto/gcm.c:253:19: expected unsigned long long [usertype] b crypto/gcm.c:253:19: got restricted __be64 [usertype] No actual change in behavior. Signed-off-by: Eric Biggers Signed-off-by: Herbert Xu --- diff --git a/crypto/gcm.c b/crypto/gcm.c index e438492db2ca2..bbce31f6199ba 100644 --- a/crypto/gcm.c +++ b/crypto/gcm.c @@ -247,7 +247,7 @@ static int gcm_hash_len(struct aead_request *req, u32 flags) struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req); struct ahash_request *ahreq = &pctx->u.ahreq; struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx; - u128 lengths; + be128 lengths; lengths.a = cpu_to_be64(req->assoclen * 8); lengths.b = cpu_to_be64(gctx->cryptlen * 8);