diff --git a/library/psa_crypto.c b/library/psa_crypto.c index c2d8b16be8..84b773fa56 100644 --- a/library/psa_crypto.c +++ b/library/psa_crypto.c @@ -5306,11 +5306,11 @@ static psa_status_t psa_tls12_prf_psk_to_ms_set_key( * - RFC 5489 for the definition of ECDHE-PSK. */ - if ( prf->state == PSA_TLS12_PRF_STATE_OTHER_KEY_SET ) + if( prf->state == PSA_TLS12_PRF_STATE_OTHER_KEY_SET ) { *cur++ = MBEDTLS_BYTE_1( prf->other_secret_length ); *cur++ = MBEDTLS_BYTE_0( prf->other_secret_length ); - if ( prf->other_secret_length != 0 ) + if( prf->other_secret_length != 0 ) { memcpy( cur, prf->other_secret, prf->other_secret_length ); mbedtls_platform_zeroize( prf->other_secret, prf->other_secret_length ); diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function index 118b1c7eaa..ea0d5c4ee8 100644 --- a/tests/suites/test_suite_psa_crypto.function +++ b/tests/suites/test_suite_psa_crypto.function @@ -7060,7 +7060,7 @@ void derive_output( int alg_arg, /* For output key derivation secret must be provided using input key, otherwise operation is not permitted. */ - if ( key_input_type == 1 ) + if( key_input_type == 1 ) expected_status = PSA_SUCCESS; psa_set_key_usage_flags( &attributes4, PSA_KEY_USAGE_EXPORT );