The old version works because in every function in which
this macro is used ``l'' is the length and ``d'' is the
destination. This patch prevents future headaches when
those constraints no longer hold.
---
 evas/src/lib/include/evas_blend_ops.h |    8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/evas/src/lib/include/evas_blend_ops.h 
b/evas/src/lib/include/evas_blend_ops.h
index 1429596..8f78256 100644
--- a/evas/src/lib/include/evas_blend_ops.h
+++ b/evas/src/lib/include/evas_blend_ops.h
@@ -348,12 +348,12 @@ mul3_sym_sse3(__m128i x, __m128i y) {
    return  _mm_and_si128(res, RGB_MASK_SSE3);
 }
 
-#define LOOP_ALIGNED_U1_A48_SSE3(D, LENGTH, UOP,A4OP, A8OP) \
+#define LOOP_ALIGNED_U1_A48_SSE3(DEST, LENGTH, UOP, A4OP, A8OP) \
    { \
-      while((uintptr_t)d & 0xF && l) UOP \
+      while((uintptr_t)DEST & 0xF && LENGTH) UOP \
    \
-      while(l) { \
-         switch(l) { \
+      while(LENGTH) { \
+         switch(LENGTH) { \
             case 3: UOP \
             case 2: UOP \
             case 1: UOP \
-- 
1.7.3.4


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
enlightenment-devel mailing list
enlightenment-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to