From 8e403a79b0e679c8df41a9686006c5fe052d79bd Mon Sep 17 00:00:00 2001 From: Todd Short Date: Tue, 9 Jan 2018 10:46:44 -0500 Subject: [PATCH] Fix --strict-warnings with C90 Found with gcc 4.8.4 Reviewed-by: Ben Kaduk Reviewed-by: Richard Levitte (Merged from https://github.com/openssl/openssl/pull/5045) --- crypto/ec/ecp_nistz256.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/crypto/ec/ecp_nistz256.c b/crypto/ec/ecp_nistz256.c index 04e374ebc5..4580f70b24 100644 --- a/crypto/ec/ecp_nistz256.c +++ b/crypto/ec/ecp_nistz256.c @@ -1530,6 +1530,10 @@ static int ecp_nistz256_inv_mod_ord(const EC_GROUP *group, BIGNUM *r, BN_ULONG table[15][P256_LIMBS]; BN_ULONG out[P256_LIMBS], t[P256_LIMBS]; int i, ret = 0; + enum { + i_1 = 0, i_10, i_11, i_101, i_111, i_1010, i_1111, + i_10101, i_101010, i_101111, i_x6, i_x8, i_x16, i_x32 + }; /* * Catch allocation failure early. @@ -1607,10 +1611,6 @@ static int ecp_nistz256_inv_mod_ord(const EC_GROUP *group, BIGNUM *r, * multiplications, 25%, on grand scale sign operation is not that * much faster, not more that 2%... */ - enum { - i_1 = 0, i_10, i_11, i_101, i_111, i_1010, i_1111, - i_10101, i_101010, i_101111, i_x6, i_x8, i_x16, i_x32 - }; /* pre-calculate powers */ ecp_nistz256_ord_sqr_mont(table[i_10], table[i_1], 1); -- 2.39.5