mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-01 04:20:45 +00:00
Whitespce normalization
No semantic change.
This commit is contained in:
parent
2c5219a06d
commit
691dfb3e3a
@ -529,8 +529,8 @@ exit:
|
|||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void cipher_test_encrypt( int alg_arg, int key_type_arg,
|
void cipher_test_encrypt( int alg_arg, int key_type_arg,
|
||||||
char *key_hex,
|
char *key_hex,
|
||||||
char *input_hex, char *output_hex )
|
char *input_hex, char *output_hex )
|
||||||
{
|
{
|
||||||
int key_slot = 1;
|
int key_slot = 1;
|
||||||
psa_key_type_t key_type = key_type_arg;
|
psa_key_type_t key_type = key_type_arg;
|
||||||
@ -629,7 +629,7 @@ void cipher_test_encrypt_multipart( int alg_arg, int key_type_arg,
|
|||||||
TEST_ASSERT( psa_encrypt_setup( &operation, key_slot, alg ) == PSA_SUCCESS );
|
TEST_ASSERT( psa_encrypt_setup( &operation, key_slot, alg ) == PSA_SUCCESS );
|
||||||
|
|
||||||
TEST_ASSERT( psa_encrypt_set_iv( &operation, iv,
|
TEST_ASSERT( psa_encrypt_set_iv( &operation, iv,
|
||||||
sizeof( iv ) ) == PSA_SUCCESS );
|
sizeof( iv ) ) == PSA_SUCCESS );
|
||||||
|
|
||||||
output = mbedtls_calloc(0, output_size);
|
output = mbedtls_calloc(0, output_size);
|
||||||
|
|
||||||
@ -637,7 +637,8 @@ void cipher_test_encrypt_multipart( int alg_arg, int key_type_arg,
|
|||||||
TEST_ASSERT( psa_cipher_update( &operation, input, first_part_size,
|
TEST_ASSERT( psa_cipher_update( &operation, input, first_part_size,
|
||||||
output, output_size,
|
output, output_size,
|
||||||
&output_length) == PSA_SUCCESS );
|
&output_length) == PSA_SUCCESS );
|
||||||
TEST_ASSERT( psa_cipher_update( &operation, input + first_part_size, input_size - first_part_size,
|
TEST_ASSERT( psa_cipher_update( &operation, input + first_part_size,
|
||||||
|
input_size - first_part_size,
|
||||||
output, output_size,
|
output, output_size,
|
||||||
&output_length) == PSA_SUCCESS );
|
&output_length) == PSA_SUCCESS );
|
||||||
TEST_ASSERT( psa_cipher_finish( &operation, output + output_length,
|
TEST_ASSERT( psa_cipher_finish( &operation, output + output_length,
|
||||||
@ -766,7 +767,7 @@ void cipher_test_verify_output( int alg_arg, int key_type_arg,
|
|||||||
output1, output1_size,
|
output1, output1_size,
|
||||||
&output1_length) == PSA_SUCCESS );
|
&output1_length) == PSA_SUCCESS );
|
||||||
TEST_ASSERT( psa_cipher_finish( &operation1, output1 + output1_length,
|
TEST_ASSERT( psa_cipher_finish( &operation1, output1 + output1_length,
|
||||||
output1_size, &tmp_output_length) == PSA_SUCCESS );
|
output1_size, &tmp_output_length) == PSA_SUCCESS );
|
||||||
|
|
||||||
output1_length += tmp_output_length;
|
output1_length += tmp_output_length;
|
||||||
|
|
||||||
@ -776,12 +777,12 @@ void cipher_test_verify_output( int alg_arg, int key_type_arg,
|
|||||||
output2 = mbedtls_calloc(0, output2_size);
|
output2 = mbedtls_calloc(0, output2_size);
|
||||||
|
|
||||||
TEST_ASSERT( psa_encrypt_set_iv( &operation2, iv,
|
TEST_ASSERT( psa_encrypt_set_iv( &operation2, iv,
|
||||||
iv_length) == PSA_SUCCESS );
|
iv_length) == PSA_SUCCESS );
|
||||||
TEST_ASSERT( psa_cipher_update( &operation2, output1, output1_length,
|
TEST_ASSERT( psa_cipher_update( &operation2, output1, output1_length,
|
||||||
output2, output2_size, &output2_length) == PSA_SUCCESS );
|
output2, output2_size, &output2_length) == PSA_SUCCESS );
|
||||||
tmp_output_length = 0;
|
tmp_output_length = 0;
|
||||||
TEST_ASSERT( psa_cipher_finish( &operation2, output2 + output2_length,
|
TEST_ASSERT( psa_cipher_finish( &operation2, output2 + output2_length,
|
||||||
output2_size, &tmp_output_length) == PSA_SUCCESS );
|
output2_size, &tmp_output_length) == PSA_SUCCESS );
|
||||||
|
|
||||||
output2_length += tmp_output_length;
|
output2_length += tmp_output_length;
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user