Whitespce normalization

No semantic change.
This commit is contained in:
Gilles Peskine 2018-06-06 15:18:02 +02:00 committed by itayzafrir
parent 2c5219a06d
commit 691dfb3e3a

View File

@ -529,8 +529,8 @@ exit:
/* BEGIN_CASE */ /* BEGIN_CASE */
void cipher_test_encrypt( int alg_arg, int key_type_arg, void cipher_test_encrypt( int alg_arg, int key_type_arg,
char *key_hex, char *key_hex,
char *input_hex, char *output_hex ) char *input_hex, char *output_hex )
{ {
int key_slot = 1; int key_slot = 1;
psa_key_type_t key_type = key_type_arg; psa_key_type_t key_type = key_type_arg;
@ -629,7 +629,7 @@ void cipher_test_encrypt_multipart( int alg_arg, int key_type_arg,
TEST_ASSERT( psa_encrypt_setup( &operation, key_slot, alg ) == PSA_SUCCESS ); TEST_ASSERT( psa_encrypt_setup( &operation, key_slot, alg ) == PSA_SUCCESS );
TEST_ASSERT( psa_encrypt_set_iv( &operation, iv, TEST_ASSERT( psa_encrypt_set_iv( &operation, iv,
sizeof( iv ) ) == PSA_SUCCESS ); sizeof( iv ) ) == PSA_SUCCESS );
output = mbedtls_calloc(0, output_size); output = mbedtls_calloc(0, output_size);
@ -637,7 +637,8 @@ void cipher_test_encrypt_multipart( int alg_arg, int key_type_arg,
TEST_ASSERT( psa_cipher_update( &operation, input, first_part_size, TEST_ASSERT( psa_cipher_update( &operation, input, first_part_size,
output, output_size, output, output_size,
&output_length) == PSA_SUCCESS ); &output_length) == PSA_SUCCESS );
TEST_ASSERT( psa_cipher_update( &operation, input + first_part_size, input_size - first_part_size, TEST_ASSERT( psa_cipher_update( &operation, input + first_part_size,
input_size - first_part_size,
output, output_size, output, output_size,
&output_length) == PSA_SUCCESS ); &output_length) == PSA_SUCCESS );
TEST_ASSERT( psa_cipher_finish( &operation, output + output_length, TEST_ASSERT( psa_cipher_finish( &operation, output + output_length,
@ -766,7 +767,7 @@ void cipher_test_verify_output( int alg_arg, int key_type_arg,
output1, output1_size, output1, output1_size,
&output1_length) == PSA_SUCCESS ); &output1_length) == PSA_SUCCESS );
TEST_ASSERT( psa_cipher_finish( &operation1, output1 + output1_length, TEST_ASSERT( psa_cipher_finish( &operation1, output1 + output1_length,
output1_size, &tmp_output_length) == PSA_SUCCESS ); output1_size, &tmp_output_length) == PSA_SUCCESS );
output1_length += tmp_output_length; output1_length += tmp_output_length;
@ -776,12 +777,12 @@ void cipher_test_verify_output( int alg_arg, int key_type_arg,
output2 = mbedtls_calloc(0, output2_size); output2 = mbedtls_calloc(0, output2_size);
TEST_ASSERT( psa_encrypt_set_iv( &operation2, iv, TEST_ASSERT( psa_encrypt_set_iv( &operation2, iv,
iv_length) == PSA_SUCCESS ); iv_length) == PSA_SUCCESS );
TEST_ASSERT( psa_cipher_update( &operation2, output1, output1_length, TEST_ASSERT( psa_cipher_update( &operation2, output1, output1_length,
output2, output2_size, &output2_length) == PSA_SUCCESS ); output2, output2_size, &output2_length) == PSA_SUCCESS );
tmp_output_length = 0; tmp_output_length = 0;
TEST_ASSERT( psa_cipher_finish( &operation2, output2 + output2_length, TEST_ASSERT( psa_cipher_finish( &operation2, output2 + output2_length,
output2_size, &tmp_output_length) == PSA_SUCCESS ); output2_size, &tmp_output_length) == PSA_SUCCESS );
output2_length += tmp_output_length; output2_length += tmp_output_length;