mirror of
				https://github.com/yuzu-emu/mbedtls.git
				synced 2025-11-04 15:54:51 +00:00 
			
		
		
		
	Whitespce normalization
No semantic change.
This commit is contained in:
		
							parent
							
								
									2c5219a06d
								
							
						
					
					
						commit
						691dfb3e3a
					
				| 
						 | 
				
			
			@ -529,8 +529,8 @@ exit:
 | 
			
		|||
 | 
			
		||||
/* BEGIN_CASE */
 | 
			
		||||
void cipher_test_encrypt( int alg_arg, int key_type_arg,
 | 
			
		||||
                           char *key_hex,
 | 
			
		||||
                           char *input_hex, char *output_hex )
 | 
			
		||||
                          char *key_hex,
 | 
			
		||||
                          char *input_hex, char *output_hex )
 | 
			
		||||
{
 | 
			
		||||
    int key_slot = 1;
 | 
			
		||||
    psa_key_type_t key_type = key_type_arg;
 | 
			
		||||
| 
						 | 
				
			
			@ -629,7 +629,7 @@ void cipher_test_encrypt_multipart( int alg_arg, int key_type_arg,
 | 
			
		|||
    TEST_ASSERT( psa_encrypt_setup( &operation, key_slot, alg ) == PSA_SUCCESS );
 | 
			
		||||
 | 
			
		||||
    TEST_ASSERT( psa_encrypt_set_iv( &operation, iv,
 | 
			
		||||
                                        sizeof( iv ) ) == PSA_SUCCESS );
 | 
			
		||||
                                     sizeof( iv ) ) == PSA_SUCCESS );
 | 
			
		||||
 | 
			
		||||
    output = mbedtls_calloc(0, output_size);
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -637,7 +637,8 @@ void cipher_test_encrypt_multipart( int alg_arg, int key_type_arg,
 | 
			
		|||
    TEST_ASSERT( psa_cipher_update( &operation, input, first_part_size,
 | 
			
		||||
                                    output, output_size,
 | 
			
		||||
                                    &output_length) == PSA_SUCCESS );
 | 
			
		||||
    TEST_ASSERT( psa_cipher_update( &operation, input + first_part_size, input_size - first_part_size,
 | 
			
		||||
    TEST_ASSERT( psa_cipher_update( &operation, input + first_part_size,
 | 
			
		||||
                                    input_size - first_part_size,
 | 
			
		||||
                                    output, output_size,
 | 
			
		||||
                                    &output_length) == PSA_SUCCESS );
 | 
			
		||||
    TEST_ASSERT( psa_cipher_finish( &operation, output + output_length,
 | 
			
		||||
| 
						 | 
				
			
			@ -766,7 +767,7 @@ void cipher_test_verify_output( int alg_arg, int key_type_arg,
 | 
			
		|||
                                    output1, output1_size,
 | 
			
		||||
                                    &output1_length) == PSA_SUCCESS );
 | 
			
		||||
    TEST_ASSERT( psa_cipher_finish( &operation1, output1 + output1_length,
 | 
			
		||||
			            output1_size, &tmp_output_length) == PSA_SUCCESS );
 | 
			
		||||
                                    output1_size, &tmp_output_length) == PSA_SUCCESS );
 | 
			
		||||
 | 
			
		||||
    output1_length += tmp_output_length;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -776,12 +777,12 @@ void cipher_test_verify_output( int alg_arg, int key_type_arg,
 | 
			
		|||
    output2 = mbedtls_calloc(0, output2_size);
 | 
			
		||||
 | 
			
		||||
    TEST_ASSERT( psa_encrypt_set_iv( &operation2, iv,
 | 
			
		||||
			             iv_length) == PSA_SUCCESS );
 | 
			
		||||
                                     iv_length) == PSA_SUCCESS );
 | 
			
		||||
    TEST_ASSERT( psa_cipher_update( &operation2, output1, output1_length,
 | 
			
		||||
                                    output2, output2_size, &output2_length) == PSA_SUCCESS );
 | 
			
		||||
    tmp_output_length = 0;
 | 
			
		||||
    TEST_ASSERT( psa_cipher_finish( &operation2, output2 + output2_length,
 | 
			
		||||
			            output2_size, &tmp_output_length) == PSA_SUCCESS );  
 | 
			
		||||
                                    output2_size, &tmp_output_length) == PSA_SUCCESS );
 | 
			
		||||
 | 
			
		||||
    output2_length += tmp_output_length;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in a new issue