mirror of
https://github.com/minetest/irrlicht.git
synced 2024-12-25 23:47:30 +01:00
Prevent some fallthrough warnings we got since gcc7 in aes
Interestingly those can be suppressed with simple comments. Note that I didn't suppress those in zlib code yet as I'll check for updates for those libs before releasing (while we are pretty much stuck with this AES version unless we put in a lot more work). git-svn-id: svn://svn.code.sf.net/p/irrlicht/code/trunk@6040 dfc29bdd-3216-0410-991c-e03cc46cb475
This commit is contained in:
parent
5d0b042a65
commit
229c827870
@ -125,10 +125,12 @@ aes_rval aes_encrypt(const void *in_blk, void *out_blk, const aes_encrypt_ctx cx
|
|||||||
round(fwd_rnd, b1, b0, kp + 1 * N_COLS);
|
round(fwd_rnd, b1, b0, kp + 1 * N_COLS);
|
||||||
round(fwd_rnd, b0, b1, kp + 2 * N_COLS);
|
round(fwd_rnd, b0, b1, kp + 2 * N_COLS);
|
||||||
kp += 2 * N_COLS;
|
kp += 2 * N_COLS;
|
||||||
|
/* Falls through. */
|
||||||
case 12:
|
case 12:
|
||||||
round(fwd_rnd, b1, b0, kp + 1 * N_COLS);
|
round(fwd_rnd, b1, b0, kp + 1 * N_COLS);
|
||||||
round(fwd_rnd, b0, b1, kp + 2 * N_COLS);
|
round(fwd_rnd, b0, b1, kp + 2 * N_COLS);
|
||||||
kp += 2 * N_COLS;
|
kp += 2 * N_COLS;
|
||||||
|
/* Falls through. */
|
||||||
case 10:
|
case 10:
|
||||||
round(fwd_rnd, b1, b0, kp + 1 * N_COLS);
|
round(fwd_rnd, b1, b0, kp + 1 * N_COLS);
|
||||||
round(fwd_rnd, b0, b1, kp + 2 * N_COLS);
|
round(fwd_rnd, b0, b1, kp + 2 * N_COLS);
|
||||||
@ -249,10 +251,12 @@ aes_rval aes_decrypt(const void *in_blk, void *out_blk, const aes_decrypt_ctx cx
|
|||||||
round(inv_rnd, b1, b0, kp - 1 * N_COLS);
|
round(inv_rnd, b1, b0, kp - 1 * N_COLS);
|
||||||
round(inv_rnd, b0, b1, kp - 2 * N_COLS);
|
round(inv_rnd, b0, b1, kp - 2 * N_COLS);
|
||||||
kp -= 2 * N_COLS;
|
kp -= 2 * N_COLS;
|
||||||
|
/* Falls through. */
|
||||||
case 12:
|
case 12:
|
||||||
round(inv_rnd, b1, b0, kp - 1 * N_COLS);
|
round(inv_rnd, b1, b0, kp - 1 * N_COLS);
|
||||||
round(inv_rnd, b0, b1, kp - 2 * N_COLS);
|
round(inv_rnd, b0, b1, kp - 2 * N_COLS);
|
||||||
kp -= 2 * N_COLS;
|
kp -= 2 * N_COLS;
|
||||||
|
/* Falls through. */
|
||||||
case 10:
|
case 10:
|
||||||
round(inv_rnd, b1, b0, kp - 1 * N_COLS);
|
round(inv_rnd, b1, b0, kp - 1 * N_COLS);
|
||||||
round(inv_rnd, b0, b1, kp - 2 * N_COLS);
|
round(inv_rnd, b0, b1, kp - 2 * N_COLS);
|
||||||
|
@ -576,12 +576,15 @@ sha2_int sha2_begin(unsigned long len, sha2_ctx ctx[1])
|
|||||||
switch(len)
|
switch(len)
|
||||||
{
|
{
|
||||||
case 256: l = len >> 3;
|
case 256: l = len >> 3;
|
||||||
|
/* Falls through. */
|
||||||
case 32: CTX_256(ctx)->count[0] = CTX_256(ctx)->count[1] = 0;
|
case 32: CTX_256(ctx)->count[0] = CTX_256(ctx)->count[1] = 0;
|
||||||
memcpy(CTX_256(ctx)->hash, i256, 32); break;
|
memcpy(CTX_256(ctx)->hash, i256, 32); break;
|
||||||
case 384: l = len >> 3;
|
case 384: l = len >> 3;
|
||||||
|
/* Falls through. */
|
||||||
case 48: CTX_384(ctx)->count[0] = CTX_384(ctx)->count[1] = 0;
|
case 48: CTX_384(ctx)->count[0] = CTX_384(ctx)->count[1] = 0;
|
||||||
memcpy(CTX_384(ctx)->hash, i384, 64); break;
|
memcpy(CTX_384(ctx)->hash, i384, 64); break;
|
||||||
case 512: l = len >> 3;
|
case 512: l = len >> 3;
|
||||||
|
/* Falls through. */
|
||||||
case 64: CTX_512(ctx)->count[0] = CTX_512(ctx)->count[1] = 0;
|
case 64: CTX_512(ctx)->count[0] = CTX_512(ctx)->count[1] = 0;
|
||||||
memcpy(CTX_512(ctx)->hash, i512, 64); break;
|
memcpy(CTX_512(ctx)->hash, i512, 64); break;
|
||||||
default: return SHA2_BAD;
|
default: return SHA2_BAD;
|
||||||
|
Loading…
Reference in New Issue
Block a user