From ec46b7c60ee22fdb836a4b2bcf97153c632173d2 Mon Sep 17 00:00:00 2001 From: Andrew Yourtchenko Date: Wed, 18 Oct 2017 12:21:34 +0200 Subject: [PATCH] ipsec: use boolean or vs. bitwise or to avoid compiler error MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Ubuntu 17.04, gcc version 6.3.0 20170406 (Ubuntu 6.3.0-12ubuntu2), "make build" fails with the few of the errors below: error: suggest parentheses around comparison in operand of ‘|’ [-Werror=parentheses] is_aead = (sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 | Solution: use the logical rather than the bitwise or. Change-Id: Iffcc1ed2e68b14b248159cb117593d32c623c553 Signed-off-by: Andrew Yourtchenko --- src/plugins/dpdk/ipsec/esp_decrypt.c | 8 ++++---- src/plugins/dpdk/ipsec/ipsec.c | 4 ++-- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/src/plugins/dpdk/ipsec/esp_decrypt.c b/src/plugins/dpdk/ipsec/esp_decrypt.c index 9405f18ee76..6de1f004347 100644 --- a/src/plugins/dpdk/ipsec/esp_decrypt.c +++ b/src/plugins/dpdk/ipsec/esp_decrypt.c @@ -171,8 +171,8 @@ dpdk_esp_decrypt_node_fn (vlib_main_t * vm, auth_alg = vec_elt_at_index (dcm->auth_algs, sa0->integ_alg); #if DPDK_NO_AEAD - is_aead = (sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 | - sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_192 | + is_aead = (sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 || + sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_192 || sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_256); #else is_aead = (cipher_alg->type == RTE_CRYPTO_SYM_XFORM_AEAD); @@ -470,8 +470,8 @@ dpdk_esp_decrypt_post_node_fn (vlib_main_t * vm, cipher_alg = vec_elt_at_index (dcm->cipher_algs, sa0->crypto_alg); auth_alg = vec_elt_at_index (dcm->auth_algs, sa0->integ_alg); #if DPDK_NO_AEAD - is_aead = (sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 | - sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_192 | + is_aead = (sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 || + sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_192 || sa0->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_256); #else is_aead = cipher_alg->type == RTE_CRYPTO_SYM_XFORM_AEAD; diff --git a/src/plugins/dpdk/ipsec/ipsec.c b/src/plugins/dpdk/ipsec/ipsec.c index 2fd331c1ccd..4bae8c1b0f4 100644 --- a/src/plugins/dpdk/ipsec/ipsec.c +++ b/src/plugins/dpdk/ipsec/ipsec.c @@ -317,8 +317,8 @@ crypto_set_auth_xform (struct rte_crypto_sym_xform *xform, xform->auth.key.length = a->key_len; xform->auth.digest_length = a->trunc_size; #if DPDK_NO_AEAD - if (sa->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 | - sa->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_192 | + if (sa->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_128 || + sa->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_192 || sa->crypto_alg == IPSEC_CRYPTO_ALG_AES_GCM_256) xform->auth.algo = RTE_CRYPTO_AUTH_AES_GCM; xform->auth.add_auth_data_length = sa->use_esn ? 12 : 8; -- 2.16.6