diff options
author | Jeffrey Walton <noloader@gmail.com> | 2019-10-03 20:44:33 -0400 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2019-10-03 20:44:33 -0400 |
commit | 883dbce74a3d6d66fd0f57f383284aef378db47c (patch) | |
tree | ebb1b1599a1e2f147a0db4dd774b30f50f553014 /simon.cpp | |
parent | 589c25264a3b15fae101962f8a8a334a03c90075 (diff) | |
download | cryptopp-git-883dbce74a3d6d66fd0f57f383284aef378db47c.tar.gz |
Remove double semicolons after sed'ing defines
Also see https://github.com/weidai11/cryptopp/issues/889
Diffstat (limited to 'simon.cpp')
-rw-r--r-- | simon.cpp | 12 |
1 files changed, 6 insertions, 6 deletions
@@ -294,7 +294,7 @@ void SIMON64::Base::UncheckedSetKey(const byte *userKey, unsigned int keyLength, SIMON64_ExpandKey_4W(m_rkeys, m_wspace);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Altivec loads the current subkey as a 16-byte vector
@@ -319,7 +319,7 @@ void SIMON64::Enc::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock, SIMON_Encrypt<word32, 44>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
@@ -342,7 +342,7 @@ void SIMON64::Dec::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock, SIMON_Decrypt<word32, 44>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
@@ -403,7 +403,7 @@ void SIMON128::Base::UncheckedSetKey(const byte *userKey, unsigned int keyLength SIMON128_ExpandKey_4W(m_rkeys, m_wspace);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
}
@@ -425,7 +425,7 @@ void SIMON128::Enc::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock SIMON_Encrypt<word64, 72>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
@@ -451,7 +451,7 @@ void SIMON128::Dec::ProcessAndXorBlock(const byte *inBlock, const byte *xorBlock SIMON_Decrypt<word64, 72>(m_wspace+2, m_wspace+0, m_rkeys);
break;
default:
- CRYPTOPP_ASSERT(0);;
+ CRYPTOPP_ASSERT(0);
}
// Do the endian gyrations from the paper and align pointers
|