From patchwork Tue Sep 12 10:12:16 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 112286 Delivered-To: patch@linaro.org Received: by 10.80.202.13 with SMTP id d13csp5682316edi; Tue, 12 Sep 2017 03:13:01 -0700 (PDT) X-Google-Smtp-Source: ADKCNb45QRVrKK8tWtuudiEwdO75+zgn0P7y2uKK6xDOsZbCL2e5J+oQuoXsHN/o02M46qB7a3Pg X-Received: by 10.84.133.66 with SMTP id 60mr9851466plf.386.1505211181623; Tue, 12 Sep 2017 03:13:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1505211181; cv=none; d=google.com; s=arc-20160816; b=Hk1EIOpiIdr/Ywp3eAUw0i8rs6P4ElZ8G8o86J0TFBqAfr+jBXm5esEfwJWJGuYcza qPc1rBexOK7g1uK/z+4f05zWOE/B16Bz7F0ZwpnnbFFe8ga64eKhJRV1+wv+lzcBYOlA vQ6KRQ5xOJlTNDDkN5p6CpO+4t7zsJrHW50P+y4m01+egvEI01l8OtjcRYwO+F+Z2dk+ 7BrQscTMX9LK/lHfSzgAilTMXclKjMX3IVeE2g25Pb+qO16gDofqQ073zPNH2HWL/PJ2 tgZFZKO1M9TehKwe0mfMFfz4V7b5tM9sXDXCxFXfdG5vgcP6MJZf1RzI+n5eK9OV17E/ l5qA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:arc-authentication-results; bh=2NxbGqLxMkQRIsoebWDWMO9gk8kxb5yWPd2AtsFYiVU=; b=D3jv3jDPfq48cUvnnYx0d/SrqAlTox3S+JrMYtu6RmTdBXMJSqi2P7/O/bpN3fc0B7 doKxE1wzjd7EsVzVLU0eVB1ReHhElGXFveu9fIDek1pnCrBke+i7HIrUXFSTuj75XMRE 2C4bJFcrk5loviLY5i9u909g4Xm2xjnSHeZPIJNlJOa6Uwmue+a8L1MTQBfyMWlE2wRp tMqhR9sRgFPqM0BJB6/apjawyIJFYb7esKqHCqJFHs+Ge9W8plmM+/Ct6rRUBJNFCeUo 7EtSKTbcPjJtUn7ZAYxdtA8q4Cy47fN/1Di778Vz+MDhzKtKyenwHO2BKYK+Udl+9Jk/ jKxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j6si8624123pll.26.2017.09.12.03.13.01; Tue, 12 Sep 2017 03:13:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751395AbdILKNA (ORCPT + 1 other); Tue, 12 Sep 2017 06:13:00 -0400 Received: from mout.kundenserver.de ([212.227.126.131]:64496 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751366AbdILKM7 (ORCPT ); Tue, 12 Sep 2017 06:12:59 -0400 Received: from wuerfel.lan ([95.208.190.237]) by mrelayeu.kundenserver.de (mreue003 [212.227.15.129]) with ESMTPA (Nemesis) id 0LjwWD-1dKJF10kaP-00bpMC; Tue, 12 Sep 2017 12:12:38 +0200 From: Arnd Bergmann To: Antoine Tenart , Herbert Xu , "David S. Miller" Cc: Arnd Bergmann , Ofer Heifetz , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: inside-secure - fix gcc-4.9 warnings Date: Tue, 12 Sep 2017 12:12:16 +0200 Message-Id: <20170912101232.3688217-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 MIME-Version: 1.0 X-Provags-ID: V03:K0:W6wgKbrDFB2CGX/8585KUPYoQdbbE1oIsMVCxDXyApue6W+Osgj UBBj6+NdLNbaeAcnztTwGHr6iqQcQY+UMOiOQPYdab6kB/RoQ4ZTUd1Kp9een+NRunqm6bh UltINH6R8LDIXQHED3dcWdAEYktfDKZaL9Z95DYO+JUP90fQ2yZYtlvVLKtzRLtgm2mI3nc 4xPVrnN1xLZB1386SH7Qw== X-UI-Out-Filterresults: notjunk:1; V01:K0:2GE6rVeiuQ8=:6Ox+maIB1PuKR/xaIfAzi3 VlA5/C66rTO33J7FUmkyxfoqHj1ewWL0UgxFqvDXTKkSo1uA4/hOAxC2WTv3aumQVt6tQs3nJ 4nR6SpCiYSpvO5+ve6Z3wK02+bj5DSRdTeLUSSwKKAZ6Z7DWtGtEI5jKKWBFMbzzhjamscU5U siPHkmPvZXU9M4ZMGy6DiK8r1wF3EPbxV22LLcOPhdK64gEZlwyY1DmaiRFIXqlojYzG2orfJ hCzS6o8V4pF+Y/KPaTu9AVPrlAUeAF4RYROl2EZeXwVQhTZ3WuzY8L5zQ7QDi6LVOXzy9UKJJ SIpzIsZvrrVAEshtayme3+FTfbAVmdiMm/XhCj+LzPx0Q3CSK2d3t/mS8B3pCoYTJw4HByWD2 QauSOoCXAChENnCCJxDHw3sJyN1J1F+AHiJXcDygLSHBlsNxm3GVDmC/72sZbTcTu6IdfS9Mv H22jsejSoQu1QnvX1Xsj1MxXjsygE+2fNaU5q83Zscv93bkYjAL3RFMRxwCosNOm7KVsq7LV9 SLJYxY67OfqwblTCTxaM5WZ6InfXTvgMJkRaUFC8ueDCGJcfeJcknDIh9DoW4ZYL2t76Kp9Ip b1wCYqr1nFF0ToaLbeL8w8zoNebBj8qt4ldmgwDfiFc5+J7QTuwX6vNQVidpgC17SyTwaPsth /WJA7Mg6fTJgk4m/bKSOFTQIn1i8Z+OtZAmU0D4mbovig8rKe+TMS/jTIxGy/ems2Owo5/Yb2 nrKWS9NZptNZ/mH++bUVbgm/Q/bwgyhHzQbMyiADGqWJsIPXDFgsOenhMXo= Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org All older compiler versions up to gcc-4.9 produce these harmless warnings: drivers/crypto/inside-secure/safexcel_cipher.c:389:9: warning: missing braces around initializer [-Wmissing-braces] drivers/crypto/inside-secure/safexcel_cipher.c:389:9: warning: (near initialization for ‘result.completion’) [-Wmissing-braces] drivers/crypto/inside-secure/safexcel_hash.c:422:9: warning: missing braces around initializer [-Wmissing-braces] drivers/crypto/inside-secure/safexcel_hash.c:422:9: warning: (near initialization for ‘result.completion’) [-Wmissing-braces] This changes the syntax to something that works on all versions without warnings. Fixes: 1b44c5a60c13 ("crypto: inside-secure - add SafeXcel EIP197 crypto engine driver") Signed-off-by: Arnd Bergmann --- drivers/crypto/inside-secure/safexcel_cipher.c | 2 +- drivers/crypto/inside-secure/safexcel_hash.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) -- 2.9.0 Acked-by: Antoine Tenart diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c b/drivers/crypto/inside-secure/safexcel_cipher.c index d2207ac5ba19..5438552bc6d7 100644 --- a/drivers/crypto/inside-secure/safexcel_cipher.c +++ b/drivers/crypto/inside-secure/safexcel_cipher.c @@ -386,7 +386,7 @@ static int safexcel_cipher_exit_inv(struct crypto_tfm *tfm) struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm); struct safexcel_crypto_priv *priv = ctx->priv; struct skcipher_request req; - struct safexcel_inv_result result = { 0 }; + struct safexcel_inv_result result = {}; int ring = ctx->base.ring; memset(&req, 0, sizeof(struct skcipher_request)); diff --git a/drivers/crypto/inside-secure/safexcel_hash.c b/drivers/crypto/inside-secure/safexcel_hash.c index 3f819399cd95..3980f946874f 100644 --- a/drivers/crypto/inside-secure/safexcel_hash.c +++ b/drivers/crypto/inside-secure/safexcel_hash.c @@ -419,7 +419,7 @@ static int safexcel_ahash_exit_inv(struct crypto_tfm *tfm) struct safexcel_ahash_ctx *ctx = crypto_tfm_ctx(tfm); struct safexcel_crypto_priv *priv = ctx->priv; struct ahash_request req; - struct safexcel_inv_result result = { 0 }; + struct safexcel_inv_result result = {}; int ring = ctx->base.ring; memset(&req, 0, sizeof(struct ahash_request));