diff options
| author | miod <> | 2015-02-15 09:23:23 +0000 |
|---|---|---|
| committer | miod <> | 2015-02-15 09:23:23 +0000 |
| commit | 11cdb6f84eaa53ac966164b78a543577b49f3f52 (patch) | |
| tree | 96dcf7d5471c6d7f2677edeca4efec9d3aae70fa | |
| parent | ba352554aeab0c19965926ffe63eb74db79be1ab (diff) | |
| download | openbsd-11cdb6f84eaa53ac966164b78a543577b49f3f52.tar.gz openbsd-11cdb6f84eaa53ac966164b78a543577b49f3f52.tar.bz2 openbsd-11cdb6f84eaa53ac966164b78a543577b49f3f52.zip | |
Remove ancient gcc workaround on mips.
| -rw-r--r-- | src/regress/lib/libcrypto/bf/bftest.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/src/regress/lib/libcrypto/bf/bftest.c b/src/regress/lib/libcrypto/bf/bftest.c index c3f04d801e..f4d8aa0ed3 100644 --- a/src/regress/lib/libcrypto/bf/bftest.c +++ b/src/regress/lib/libcrypto/bf/bftest.c | |||
| @@ -351,7 +351,7 @@ static int test(void) | |||
| 351 | data[0]=bf_plain[n][0]; | 351 | data[0]=bf_plain[n][0]; |
| 352 | data[1]=bf_plain[n][1]; | 352 | data[1]=bf_plain[n][1]; |
| 353 | BF_encrypt(data,&key); | 353 | BF_encrypt(data,&key); |
| 354 | if (memcmp(&(bf_cipher[n][0]),&(data[0]),8) != 0) | 354 | if (memcmp(&(bf_cipher[n][0]),&(data[0]), sizeof data) != 0) |
| 355 | { | 355 | { |
| 356 | printf("BF_encrypt error encrypting\n"); | 356 | printf("BF_encrypt error encrypting\n"); |
| 357 | printf("got :"); | 357 | printf("got :"); |
| @@ -423,8 +423,7 @@ static int test(void) | |||
| 423 | { | 423 | { |
| 424 | BF_set_key(&key,n,key_test); | 424 | BF_set_key(&key,n,key_test); |
| 425 | BF_ecb_encrypt(key_data,out,&key,BF_ENCRYPT); | 425 | BF_ecb_encrypt(key_data,out,&key,BF_ENCRYPT); |
| 426 | /* mips-sgi-irix6.5-gcc vv -mabi=64 bug workaround */ | 426 | if (memcmp(out,&(key_out[n-1][0]),8) != 0) |
| 427 | if (memcmp(out,&(key_out[i=n-1][0]),8) != 0) | ||
| 428 | { | 427 | { |
| 429 | printf("blowfish setkey error\n"); | 428 | printf("blowfish setkey error\n"); |
| 430 | err=1; | 429 | err=1; |
