diff options
author | shirishpargaonkar@gmail.com <shirishpargaonkar@gmail.com> | 2010-08-24 18:53:48 +0200 |
---|---|---|
committer | Steve French <sfrench@us.ibm.com> | 2010-08-24 20:12:52 +0200 |
commit | 2d20ca835867d93ead6ce61780d883a4b128106d (patch) | |
tree | 519a2bff48470a78406e55428a8410ed63c63c48 /kernel | |
parent | cifs: check for NULL session password (diff) | |
download | linux-2d20ca835867d93ead6ce61780d883a4b128106d.tar.xz linux-2d20ca835867d93ead6ce61780d883a4b128106d.zip |
Eliminate sparse warning - bad constant expression
Eliminiate sparse warning during usage of crypto_shash_* APIs
error: bad constant expression
Allocate memory for shash descriptors once, so that we do not kmalloc/kfree it
for every signature generation (shash descriptor for md5 hash).
From ed7538619817777decc44b5660b52268077b74f3 Mon Sep 17 00:00:00 2001
From: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Date: Tue, 24 Aug 2010 11:47:43 -0500
Subject: [PATCH] eliminate sparse warnings during crypto_shash_* APis usage
Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Signed-off-by: Steve French <sfrench@us.ibm.com>
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions