@JannePeltonen
This is the promised OpenSSL CTX rework, bringing significant crypto speedup

----------------github------------------------
/** Email created from pull request 342 (lumag:openssl-ctx)
 ** https://github.com/Linaro/odp/pull/342
 ** Patch: https://github.com/Linaro/odp/pull/342.patch
 ** Base sha: 6b5cdc77eb9759a2349b10372a964648559bc92c
 ** Merge commit sha: 4efcbed0936263184a699b1bedcf9e0bf15c5f73
 **/
----------------/github------------------------

----------------checkpatch.pl------------------------
total: 0 errors, 0 warnings, 0 checks, 89 lines checked


to_send-p-000.patch has no obvious style problems and is ready for submission.
total: 0 errors, 0 warnings, 0 checks, 11 lines checked


to_send-p-001.patch has no obvious style problems and is ready for submission.
WARNING: Missing a blank line after declarations
#134: FILE: platform/linux-generic/odp_crypto.c:112:
+               uint32_t bytes;
+               const EVP_MD *evp_md;

total: 0 errors, 1 warnings, 0 checks, 117 lines checked


to_send-p-002.patch has style problems, please review.

If any of these errors are false positives, please report
them to the maintainer, see CHECKPATCH in MAINTAINERS.
ERROR: Macros with complex values should be enclosed in parentheses
#68: FILE: platform/linux-generic/odp_crypto.c:129:
+#define SET_VALID(session, type, id)   \
+       session->type ## _valid[id / CV_SIZE] |= (1 << (id % CV_SIZE))

CHECK: Avoid CamelCase: <HMAC_Init_ex>
#144: FILE: platform/linux-generic/odp_crypto.c:226:
+               HMAC_Init_ex(ctx,

CHECK: Avoid CamelCase: <EVP_EncryptInit_ex>
#214: FILE: platform/linux-generic/odp_crypto.c:429:
+               EVP_EncryptInit_ex(ctx, session->cipher.evp_cipher, NULL,

CHECK: Avoid CamelCase: <EVP_DecryptInit_ex>
#246: FILE: platform/linux-generic/odp_crypto.c:459:
+               EVP_DecryptInit_ex(ctx, session->cipher.evp_cipher, NULL,

total: 1 errors, 0 warnings, 3 checks, 355 lines checked


to_send-p-003.patch has style problems, please review.

If any of these errors are false positives, please report
them to the maintainer, see CHECKPATCH in MAINTAINERS.
----------------/checkpatch.pl------------------------

Reply via email to