summaryrefslogtreecommitdiff
path: root/simon.cpp
diff options
context:
space:
mode:
authorJeffrey Walton <noloader@gmail.com>2019-10-03 20:44:33 -0400
committerJeffrey Walton <noloader@gmail.com>2019-10-03 20:44:33 -0400
commit883dbce74a3d6d66fd0f57f383284aef378db47c (patch)
treeebb1b1599a1e2f147a0db4dd774b30f50f553014 /simon.cpp
parent589c25264a3b15fae101962f8a8a334a03c90075 (diff)
downloadcryptopp-git-883dbce74a3d6d66fd0f57f383284aef378db47c.tar.gz
Remove double semicolons after sed'ing defines
Also see https://github.com/weidai11/cryptopp/issues/889
Diffstat (limited to 'simon.cpp')
-rw-r--r--simon.cpp12
1 files changed, 6 insertions, 6 deletions
diff --git a/simon.cpp b/simon.cpp
index d508d974..91f8bf1d 100644
--- a/simon.cpp
+++ b/simon.cpp
@@ -294,7 +294,7 @@ void SIMON64::Base::UncheckedSetKey(const byte *userKey, unsigned int keyLength,
SIMON64_ExpandKey_4W(m_rkeys, m_wspace);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Altivec loads the current subkey as a 16-byte vector
@@ -319,7 +319,7 @@ void SIMON64::Enc::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock,
SIMON_Encrypt<word32, 44>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
@@ -342,7 +342,7 @@ void SIMON64::Dec::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock,
SIMON_Decrypt<word32, 44>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
@@ -403,7 +403,7 @@ void SIMON128::Base::UncheckedSetKey(const byte *userKey, unsigned int keyLength
SIMON128_ExpandKey_4W(m_rkeys, m_wspace);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
}
@@ -425,7 +425,7 @@ void SIMON128::Enc::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock
SIMON_Encrypt<word64, 72>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
@@ -451,7 +451,7 @@ void SIMON128::Dec::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock
SIMON_Decrypt<word64, 72>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers