summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBerne Hebark <berne.hebark@stericsson.com>2011-10-25 14:17:01 +0200
committerPhilippe Langlais <philippe.langlais@stericsson.com>2012-05-22 11:04:38 +0200
commit9180fb4c4907f1476bc8ee1459d2954a7a93371c (patch)
tree08b4d688f881d51b1d4cad88113bdf60a5c0cc89
parentea52e07a9554e72ac8a6ff26eb529f14b3e66248 (diff)
crypto: ux500: hash: Coverity correction
Coverity found invalid usage of device_data->dev. ST-Ericsson ID: 361610 ST-Ericsson Linux next: NA ST-Ericsson FOSS-OUT ID: Trivial Change-Id: I78e756eb36af833e6620d0b02eda25c36741c94a Signed-off-by: Berne Hebark <berne.hebark@stericsson.com> Reviewed-on: http://gerrit.lud.stericsson.com/gerrit/36480 Reviewed-by: QATOOLS Reviewed-by: QABUILD
-rw-r--r--drivers/crypto/ux500/hash/hash_core.c11
1 files changed, 5 insertions, 6 deletions
diff --git a/drivers/crypto/ux500/hash/hash_core.c b/drivers/crypto/ux500/hash/hash_core.c
index b2a58dccf76..04546ddbbd1 100644
--- a/drivers/crypto/ux500/hash/hash_core.c
+++ b/drivers/crypto/ux500/hash/hash_core.c
@@ -1173,11 +1173,10 @@ int hash_hw_update(struct ahash_request *req)
/* Check if ctx->state.length + msg_length
overflows */
- if (msg_length >
- (ctx->state.length.low_word + msg_length)
- && HASH_HIGH_WORD_MAX_VAL ==
- (ctx->state.length.high_word)) {
- dev_err(device_data->dev, "[%s] HASH_MSG_LENGTH_OVERFLOW!",
+ if (msg_length > (ctx->state.length.low_word + msg_length) &&
+ HASH_HIGH_WORD_MAX_VAL ==
+ ctx->state.length.high_word) {
+ pr_err(DEV_DBG_NAME " [%s] HASH_MSG_LENGTH_OVERFLOW!",
__func__);
return -EPERM;
}
@@ -1349,7 +1348,7 @@ int hash_check_hw(struct hash_device_data *device_data)
if (NULL == device_data) {
ret = -EPERM;
- dev_err(device_data->dev, "[%s] HASH_INVALID_PARAMETER!",
+ pr_err(DEV_DBG_NAME " [%s] HASH_INVALID_PARAMETER!",
__func__);
goto out;
}