Commit 6eae29e7 authored by Eric Biggers's avatar Eric Biggers Committed by Herbert Xu

crypto: doc - document correct return value for request allocation

Signed-off-by: default avatarEric Biggers <ebiggers3@gmail.com>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 043809d8
...@@ -1936,9 +1936,9 @@ static int test_skcipher(void) ...@@ -1936,9 +1936,9 @@ static int test_skcipher(void)
} }
req = skcipher_request_alloc(skcipher, GFP_KERNEL); req = skcipher_request_alloc(skcipher, GFP_KERNEL);
if (IS_ERR(req)) { if (!req) {
pr_info("could not allocate request queue\n"); pr_info("could not allocate skcipher request\n");
ret = PTR_ERR(req); ret = -ENOMEM;
goto out; goto out;
} }
......
...@@ -405,8 +405,7 @@ static inline void aead_request_set_tfm(struct aead_request *req, ...@@ -405,8 +405,7 @@ static inline void aead_request_set_tfm(struct aead_request *req,
* encrypt and decrypt API calls. During the allocation, the provided aead * encrypt and decrypt API calls. During the allocation, the provided aead
* handle is registered in the request data structure. * handle is registered in the request data structure.
* *
* Return: allocated request handle in case of success; IS_ERR() is true in case * Return: allocated request handle in case of success, or NULL if out of memory
* of an error, PTR_ERR() returns the error code.
*/ */
static inline struct aead_request *aead_request_alloc(struct crypto_aead *tfm, static inline struct aead_request *aead_request_alloc(struct crypto_aead *tfm,
gfp_t gfp) gfp_t gfp)
......
...@@ -547,8 +547,7 @@ static inline void ahash_request_set_tfm(struct ahash_request *req, ...@@ -547,8 +547,7 @@ static inline void ahash_request_set_tfm(struct ahash_request *req,
* the allocation, the provided ahash handle * the allocation, the provided ahash handle
* is registered in the request data structure. * is registered in the request data structure.
* *
* Return: allocated request handle in case of success; IS_ERR() is true in case * Return: allocated request handle in case of success, or NULL if out of memory
* of an error, PTR_ERR() returns the error code.
*/ */
static inline struct ahash_request *ahash_request_alloc( static inline struct ahash_request *ahash_request_alloc(
struct crypto_ahash *tfm, gfp_t gfp) struct crypto_ahash *tfm, gfp_t gfp)
......
...@@ -425,8 +425,7 @@ static inline struct skcipher_request *skcipher_request_cast( ...@@ -425,8 +425,7 @@ static inline struct skcipher_request *skcipher_request_cast(
* encrypt and decrypt API calls. During the allocation, the provided skcipher * encrypt and decrypt API calls. During the allocation, the provided skcipher
* handle is registered in the request data structure. * handle is registered in the request data structure.
* *
* Return: allocated request handle in case of success; IS_ERR() is true in case * Return: allocated request handle in case of success, or NULL if out of memory
* of an error, PTR_ERR() returns the error code.
*/ */
static inline struct skcipher_request *skcipher_request_alloc( static inline struct skcipher_request *skcipher_request_alloc(
struct crypto_skcipher *tfm, gfp_t gfp) struct crypto_skcipher *tfm, gfp_t gfp)
......
...@@ -948,8 +948,7 @@ static inline struct ablkcipher_request *ablkcipher_request_cast( ...@@ -948,8 +948,7 @@ static inline struct ablkcipher_request *ablkcipher_request_cast(
* encrypt and decrypt API calls. During the allocation, the provided ablkcipher * encrypt and decrypt API calls. During the allocation, the provided ablkcipher
* handle is registered in the request data structure. * handle is registered in the request data structure.
* *
* Return: allocated request handle in case of success; IS_ERR() is true in case * Return: allocated request handle in case of success, or NULL if out of memory
* of an error, PTR_ERR() returns the error code.
*/ */
static inline struct ablkcipher_request *ablkcipher_request_alloc( static inline struct ablkcipher_request *ablkcipher_request_alloc(
struct crypto_ablkcipher *tfm, gfp_t gfp) struct crypto_ablkcipher *tfm, gfp_t gfp)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment