diff options
author | Benjamin Beurdouche <bbeurdouche@mozilla.com> | 2021-05-05 11:39:43 +0200 |
---|---|---|
committer | Benjamin Beurdouche <bbeurdouche@mozilla.com> | 2021-05-05 11:39:43 +0200 |
commit | e1529163e5579af872b6a3e08a8e010421017c4b (patch) | |
tree | 69888ff1bec19fc62de7437829c0d8a695abcea5 | |
parent | 116219d2251b6b11b11ac1f16b64539e783aa047 (diff) | |
download | nss-hg-e1529163e5579af872b6a3e08a8e010421017c4b.tar.gz |
Bug 1566124 - Clang format run. r=beurdouche
-rw-r--r-- | lib/freebl/ppc-gcm-wrap.c | 68 | ||||
-rw-r--r-- | lib/freebl/ppc-gcm.h | 64 |
2 files changed, 66 insertions, 66 deletions
diff --git a/lib/freebl/ppc-gcm-wrap.c b/lib/freebl/ppc-gcm-wrap.c index 97020e88e..ca3d8ee69 100644 --- a/lib/freebl/ppc-gcm-wrap.c +++ b/lib/freebl/ppc-gcm-wrap.c @@ -38,14 +38,14 @@ struct ppc_AES_GCMContextStr { }; SECStatus ppc_aes_gcmInitCounter(ppc_AES_GCMContext *gcm, - const unsigned char *iv, - unsigned long ivLen, unsigned long tagBits, - const unsigned char *aad, unsigned long aadLen); + const unsigned char *iv, + unsigned long ivLen, unsigned long tagBits, + const unsigned char *aad, unsigned long aadLen); ppc_AES_GCMContext * ppc_AES_GCM_CreateContext(void *context, - freeblCipherFunc cipher, - const unsigned char *params) + freeblCipherFunc cipher, + const unsigned char *params) { ppc_AES_GCMContext *gcm = NULL; AESContext *aes = (AESContext *)context; @@ -79,8 +79,8 @@ ppc_AES_GCM_CreateContext(void *context, } rv = ppc_aes_gcmInitCounter(gcm, gcmParams->pIv, - gcmParams->ulIvLen, gcmParams->ulTagBits, - gcmParams->pAAD, gcmParams->ulAADLen); + gcmParams->ulIvLen, gcmParams->ulTagBits, + gcmParams->pAAD, gcmParams->ulAADLen); if (rv != SECSuccess) { PORT_Free(gcm); return NULL; @@ -92,9 +92,9 @@ ppc_AES_GCM_CreateContext(void *context, SECStatus ppc_aes_gcmInitCounter(ppc_AES_GCMContext *gcm, - const unsigned char *iv, unsigned long ivLen, - unsigned long tagBits, - const unsigned char *aad, unsigned long aadLen) + const unsigned char *iv, unsigned long ivLen, + unsigned long tagBits, + const unsigned char *aad, unsigned long aadLen) { unsigned int j; SECStatus rv; @@ -177,10 +177,10 @@ ppc_AES_GCM_DestroyContext(ppc_AES_GCMContext *gcm, PRBool freeit) SECStatus ppc_AES_GCM_EncryptUpdate(ppc_AES_GCMContext *gcm, - unsigned char *outbuf, - unsigned int *outlen, unsigned int maxout, - const unsigned char *inbuf, unsigned int inlen, - unsigned int blocksize) + unsigned char *outbuf, + unsigned int *outlen, unsigned int maxout, + const unsigned char *inbuf, unsigned int inlen, + unsigned int blocksize) { unsigned int tagBytes; unsigned char T[AES_BLOCK_SIZE]; @@ -243,10 +243,10 @@ ppc_AES_GCM_EncryptUpdate(ppc_AES_GCMContext *gcm, SECStatus ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm, - unsigned char *outbuf, - unsigned int *outlen, unsigned int maxout, - const unsigned char *inbuf, unsigned int inlen, - unsigned int blocksize) + unsigned char *outbuf, + unsigned int *outlen, unsigned int maxout, + const unsigned char *inbuf, unsigned int inlen, + unsigned int blocksize) { unsigned int tagBytes; unsigned char T[AES_BLOCK_SIZE]; @@ -318,12 +318,12 @@ ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm, SECStatus ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm, - unsigned char *outbuf, - unsigned int *outlen, unsigned int maxout, - const unsigned char *inbuf, unsigned int inlen, - void *params, unsigned int paramLen, - const unsigned char *aad, unsigned int aadLen, - unsigned int blocksize) + unsigned char *outbuf, + unsigned int *outlen, unsigned int maxout, + const unsigned char *inbuf, unsigned int inlen, + void *params, unsigned int paramLen, + const unsigned char *aad, unsigned int aadLen, + unsigned int blocksize) { unsigned int tagBytes; unsigned char T[AES_BLOCK_SIZE]; @@ -365,7 +365,7 @@ ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm, } rv = ppc_aes_gcmInitCounter(gcm, gcmParams->pIv, gcmParams->ulIvLen, - gcmParams->ulTagBits, aad, aadLen); + gcmParams->ulTagBits, aad, aadLen); if (rv != SECSuccess) { return SECFailure; } @@ -373,7 +373,7 @@ ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm, tagBytes = (gcm->tagBits + (PR_BITS_PER_BYTE - 1)) / PR_BITS_PER_BYTE; ppc_aes_gcmCRYPT(inbuf, outbuf, inlen, gcm->CTR, gcm->aes_context->k.expandedKey, - gcm->aes_context->Nr); + gcm->aes_context->Nr); ppc_aes_gcmHASH(gcm->Htbl, outbuf, inlen, gcm->T); gcm->Mlen += inlen; @@ -387,12 +387,12 @@ ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm, SECStatus ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm, - unsigned char *outbuf, - unsigned int *outlen, unsigned int maxout, - const unsigned char *inbuf, unsigned int inlen, - void *params, unsigned int paramLen, - const unsigned char *aad, unsigned int aadLen, - unsigned int blocksize) + unsigned char *outbuf, + unsigned int *outlen, unsigned int maxout, + const unsigned char *inbuf, unsigned int inlen, + void *params, unsigned int paramLen, + const unsigned char *aad, unsigned int aadLen, + unsigned int blocksize) { unsigned int tagBytes; unsigned char T[AES_BLOCK_SIZE]; @@ -429,7 +429,7 @@ ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm, } rv = ppc_aes_gcmInitCounter(gcm, gcmParams->pIv, gcmParams->ulIvLen, - gcmParams->ulTagBits, aad, aadLen); + gcmParams->ulTagBits, aad, aadLen); if (rv != SECSuccess) { return SECFailure; } @@ -440,7 +440,7 @@ ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm, ppc_aes_gcmHASH(gcm->Htbl, inbuf, inlen, gcm->T); ppc_aes_gcmCRYPT(inbuf, outbuf, inlen, gcm->CTR, gcm->aes_context->k.expandedKey, - gcm->aes_context->Nr); + gcm->aes_context->Nr); gcm->Mlen += inlen; ppc_aes_gcmTAG(gcm->Htbl, gcm->T, gcm->Mlen, gcm->Alen, gcm->X0, T); diff --git a/lib/freebl/ppc-gcm.h b/lib/freebl/ppc-gcm.h index 169cad0a5..1d94c0c33 100644 --- a/lib/freebl/ppc-gcm.h +++ b/lib/freebl/ppc-gcm.h @@ -13,64 +13,64 @@ typedef struct ppc_AES_GCMContextStr ppc_AES_GCMContext; ppc_AES_GCMContext *ppc_AES_GCM_CreateContext(void *context, freeblCipherFunc cipher, - const unsigned char *params); + const unsigned char *params); void ppc_AES_GCM_DestroyContext(ppc_AES_GCMContext *gcm, PRBool freeit); SECStatus ppc_AES_GCM_EncryptUpdate(ppc_AES_GCMContext *gcm, unsigned char *outbuf, - unsigned int *outlen, unsigned int maxout, - const unsigned char *inbuf, unsigned int inlen, - unsigned int blocksize); - -SECStatus ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm, unsigned char *outbuf, - unsigned int *outlen, unsigned int maxout, - const unsigned char *inbuf, unsigned int inlen, - unsigned int blocksize); -SECStatus ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm, - unsigned char *outbuf, unsigned int *outlen, unsigned int maxout, const unsigned char *inbuf, unsigned int inlen, - void *params, unsigned int paramLen, - const unsigned char *aad, unsigned int aadLen, unsigned int blocksize); -SECStatus ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm, - unsigned char *outbuf, + +SECStatus ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm, unsigned char *outbuf, unsigned int *outlen, unsigned int maxout, const unsigned char *inbuf, unsigned int inlen, - void *params, unsigned int paramLen, - const unsigned char *aad, unsigned int aadLen, unsigned int blocksize); +SECStatus ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm, + unsigned char *outbuf, + unsigned int *outlen, unsigned int maxout, + const unsigned char *inbuf, unsigned int inlen, + void *params, unsigned int paramLen, + const unsigned char *aad, unsigned int aadLen, + unsigned int blocksize); +SECStatus ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm, + unsigned char *outbuf, + unsigned int *outlen, unsigned int maxout, + const unsigned char *inbuf, unsigned int inlen, + void *params, unsigned int paramLen, + const unsigned char *aad, unsigned int aadLen, + unsigned int blocksize); /* Prototypes of the functions defined in the assembler file. */ /* Prepares the constants used in the aggregated reduction method */ void ppc_aes_gcmINIT(unsigned char Htbl[8 * 16], - PRUint32 *KS, - int NR); + PRUint32 *KS, + int NR); /* Produces the final GHASH value */ void ppc_aes_gcmTAG(unsigned char Htbl[8 * 16], - unsigned char *Tp, - unsigned long Mlen, - unsigned long Alen, - unsigned char *X0, - unsigned char *TAG); + unsigned char *Tp, + unsigned long Mlen, + unsigned long Alen, + unsigned char *X0, + unsigned char *TAG); /* Hashes the Additional Authenticated Data, should be used before enc/dec. Operates on any length of data. Partial block is padded internally. */ void ppc_aes_gcmHASH(unsigned char Htbl[8 * 16], - const unsigned char *AAD, - unsigned long Alen, - unsigned char *Tp); + const unsigned char *AAD, + unsigned long Alen, + unsigned char *Tp); /* Crypt only, used in combination with ppc_aes_gcmAAD(). Operates on any length of data, however partial block should only be encrypted at the last call, otherwise the result will be incorrect. */ void ppc_aes_gcmCRYPT(const unsigned char *PT, - unsigned char *CT, - unsigned long len, - unsigned char *CTRP, - PRUint32 *KS, - int NR); + unsigned char *CT, + unsigned long len, + unsigned char *CTRP, + PRUint32 *KS, + int NR); #endif |