Commit 46beeade authored by Herbert Xu's avatar Herbert Xu

crypto: ixp4xx - Fix sparse warnings

This fixes a number of trivial sparse warnings in ixp4xx.
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
Acked-by: default avatarCorentin Labbe <clabbe.montjoie@gmail.com>
Tested-by: default avatarCorentin Labbe <clabbe.montjoie@gmail.com>
Acked-by: default avatarLinus Walleij <linus.walleij@linaro.org>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent f07b3e87
...@@ -420,7 +420,7 @@ static void one_packet(dma_addr_t phys) ...@@ -420,7 +420,7 @@ static void one_packet(dma_addr_t phys)
break; break;
case CTL_FLAG_GEN_REVAES: case CTL_FLAG_GEN_REVAES:
ctx = crypto_tfm_ctx(crypt->data.tfm); ctx = crypto_tfm_ctx(crypt->data.tfm);
*(u32 *)ctx->decrypt.npe_ctx &= cpu_to_be32(~CIPH_ENCR); *(__be32 *)ctx->decrypt.npe_ctx &= cpu_to_be32(~CIPH_ENCR);
if (atomic_dec_and_test(&ctx->configuring)) if (atomic_dec_and_test(&ctx->configuring))
complete(&ctx->completion); complete(&ctx->completion);
break; break;
...@@ -720,7 +720,7 @@ static int register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target, ...@@ -720,7 +720,7 @@ static int register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target,
crypt->init_len = init_len; crypt->init_len = init_len;
crypt->ctl_flags |= CTL_FLAG_GEN_ICV; crypt->ctl_flags |= CTL_FLAG_GEN_ICV;
buf->next = 0; buf->next = NULL;
buf->buf_len = HMAC_PAD_BLOCKLEN; buf->buf_len = HMAC_PAD_BLOCKLEN;
buf->pkt_len = 0; buf->pkt_len = 0;
buf->phys_addr = pad_phys; buf->phys_addr = pad_phys;
...@@ -751,7 +751,7 @@ static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize ...@@ -751,7 +751,7 @@ static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize
#ifndef __ARMEB__ #ifndef __ARMEB__
cfgword ^= 0xAA000000; /* change the "byte swap" flags */ cfgword ^= 0xAA000000; /* change the "byte swap" flags */
#endif #endif
*(u32 *)cinfo = cpu_to_be32(cfgword); *(__be32 *)cinfo = cpu_to_be32(cfgword);
cinfo += sizeof(cfgword); cinfo += sizeof(cfgword);
/* write ICV to cryptinfo */ /* write ICV to cryptinfo */
...@@ -788,7 +788,7 @@ static int gen_rev_aes_key(struct crypto_tfm *tfm) ...@@ -788,7 +788,7 @@ static int gen_rev_aes_key(struct crypto_tfm *tfm)
if (!crypt) if (!crypt)
return -EAGAIN; return -EAGAIN;
*(u32 *)dir->npe_ctx |= cpu_to_be32(CIPH_ENCR); *(__be32 *)dir->npe_ctx |= cpu_to_be32(CIPH_ENCR);
crypt->data.tfm = tfm; crypt->data.tfm = tfm;
crypt->crypt_offs = 0; crypt->crypt_offs = 0;
...@@ -846,7 +846,7 @@ static int setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, ...@@ -846,7 +846,7 @@ static int setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key,
return err; return err;
} }
/* write cfg word to cryptinfo */ /* write cfg word to cryptinfo */
*(u32 *)cinfo = cpu_to_be32(cipher_cfg); *(__be32 *)cinfo = cpu_to_be32(cipher_cfg);
cinfo += sizeof(cipher_cfg); cinfo += sizeof(cipher_cfg);
/* write cipher key to cryptinfo */ /* write cipher key to cryptinfo */
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment