summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBenjamin Beurdouche <bbeurdouche@mozilla.com>2021-05-05 11:39:43 +0200
committerBenjamin Beurdouche <bbeurdouche@mozilla.com>2021-05-05 11:39:43 +0200
commite1529163e5579af872b6a3e08a8e010421017c4b (patch)
tree69888ff1bec19fc62de7437829c0d8a695abcea5
parent116219d2251b6b11b11ac1f16b64539e783aa047 (diff)
downloadnss-hg-e1529163e5579af872b6a3e08a8e010421017c4b.tar.gz
Bug 1566124 - Clang format run. r=beurdouche
-rw-r--r--lib/freebl/ppc-gcm-wrap.c68
-rw-r--r--lib/freebl/ppc-gcm.h64
2 files changed, 66 insertions, 66 deletions
diff --git a/lib/freebl/ppc-gcm-wrap.c b/lib/freebl/ppc-gcm-wrap.c
index 97020e88e..ca3d8ee69 100644
--- a/lib/freebl/ppc-gcm-wrap.c
+++ b/lib/freebl/ppc-gcm-wrap.c
@@ -38,14 +38,14 @@ struct ppc_AES_GCMContextStr {
};
SECStatus ppc_aes_gcmInitCounter(ppc_AES_GCMContext *gcm,
- const unsigned char *iv,
- unsigned long ivLen, unsigned long tagBits,
- const unsigned char *aad, unsigned long aadLen);
+ const unsigned char *iv,
+ unsigned long ivLen, unsigned long tagBits,
+ const unsigned char *aad, unsigned long aadLen);
ppc_AES_GCMContext *
ppc_AES_GCM_CreateContext(void *context,
- freeblCipherFunc cipher,
- const unsigned char *params)
+ freeblCipherFunc cipher,
+ const unsigned char *params)
{
ppc_AES_GCMContext *gcm = NULL;
AESContext *aes = (AESContext *)context;
@@ -79,8 +79,8 @@ ppc_AES_GCM_CreateContext(void *context,
}
rv = ppc_aes_gcmInitCounter(gcm, gcmParams->pIv,
- gcmParams->ulIvLen, gcmParams->ulTagBits,
- gcmParams->pAAD, gcmParams->ulAADLen);
+ gcmParams->ulIvLen, gcmParams->ulTagBits,
+ gcmParams->pAAD, gcmParams->ulAADLen);
if (rv != SECSuccess) {
PORT_Free(gcm);
return NULL;
@@ -92,9 +92,9 @@ ppc_AES_GCM_CreateContext(void *context,
SECStatus
ppc_aes_gcmInitCounter(ppc_AES_GCMContext *gcm,
- const unsigned char *iv, unsigned long ivLen,
- unsigned long tagBits,
- const unsigned char *aad, unsigned long aadLen)
+ const unsigned char *iv, unsigned long ivLen,
+ unsigned long tagBits,
+ const unsigned char *aad, unsigned long aadLen)
{
unsigned int j;
SECStatus rv;
@@ -177,10 +177,10 @@ ppc_AES_GCM_DestroyContext(ppc_AES_GCMContext *gcm, PRBool freeit)
SECStatus
ppc_AES_GCM_EncryptUpdate(ppc_AES_GCMContext *gcm,
- unsigned char *outbuf,
- unsigned int *outlen, unsigned int maxout,
- const unsigned char *inbuf, unsigned int inlen,
- unsigned int blocksize)
+ unsigned char *outbuf,
+ unsigned int *outlen, unsigned int maxout,
+ const unsigned char *inbuf, unsigned int inlen,
+ unsigned int blocksize)
{
unsigned int tagBytes;
unsigned char T[AES_BLOCK_SIZE];
@@ -243,10 +243,10 @@ ppc_AES_GCM_EncryptUpdate(ppc_AES_GCMContext *gcm,
SECStatus
ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm,
- unsigned char *outbuf,
- unsigned int *outlen, unsigned int maxout,
- const unsigned char *inbuf, unsigned int inlen,
- unsigned int blocksize)
+ unsigned char *outbuf,
+ unsigned int *outlen, unsigned int maxout,
+ const unsigned char *inbuf, unsigned int inlen,
+ unsigned int blocksize)
{
unsigned int tagBytes;
unsigned char T[AES_BLOCK_SIZE];
@@ -318,12 +318,12 @@ ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm,
SECStatus
ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm,
- unsigned char *outbuf,
- unsigned int *outlen, unsigned int maxout,
- const unsigned char *inbuf, unsigned int inlen,
- void *params, unsigned int paramLen,
- const unsigned char *aad, unsigned int aadLen,
- unsigned int blocksize)
+ unsigned char *outbuf,
+ unsigned int *outlen, unsigned int maxout,
+ const unsigned char *inbuf, unsigned int inlen,
+ void *params, unsigned int paramLen,
+ const unsigned char *aad, unsigned int aadLen,
+ unsigned int blocksize)
{
unsigned int tagBytes;
unsigned char T[AES_BLOCK_SIZE];
@@ -365,7 +365,7 @@ ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm,
}
rv = ppc_aes_gcmInitCounter(gcm, gcmParams->pIv, gcmParams->ulIvLen,
- gcmParams->ulTagBits, aad, aadLen);
+ gcmParams->ulTagBits, aad, aadLen);
if (rv != SECSuccess) {
return SECFailure;
}
@@ -373,7 +373,7 @@ ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm,
tagBytes = (gcm->tagBits + (PR_BITS_PER_BYTE - 1)) / PR_BITS_PER_BYTE;
ppc_aes_gcmCRYPT(inbuf, outbuf, inlen, gcm->CTR, gcm->aes_context->k.expandedKey,
- gcm->aes_context->Nr);
+ gcm->aes_context->Nr);
ppc_aes_gcmHASH(gcm->Htbl, outbuf, inlen, gcm->T);
gcm->Mlen += inlen;
@@ -387,12 +387,12 @@ ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm,
SECStatus
ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm,
- unsigned char *outbuf,
- unsigned int *outlen, unsigned int maxout,
- const unsigned char *inbuf, unsigned int inlen,
- void *params, unsigned int paramLen,
- const unsigned char *aad, unsigned int aadLen,
- unsigned int blocksize)
+ unsigned char *outbuf,
+ unsigned int *outlen, unsigned int maxout,
+ const unsigned char *inbuf, unsigned int inlen,
+ void *params, unsigned int paramLen,
+ const unsigned char *aad, unsigned int aadLen,
+ unsigned int blocksize)
{
unsigned int tagBytes;
unsigned char T[AES_BLOCK_SIZE];
@@ -429,7 +429,7 @@ ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm,
}
rv = ppc_aes_gcmInitCounter(gcm, gcmParams->pIv, gcmParams->ulIvLen,
- gcmParams->ulTagBits, aad, aadLen);
+ gcmParams->ulTagBits, aad, aadLen);
if (rv != SECSuccess) {
return SECFailure;
}
@@ -440,7 +440,7 @@ ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm,
ppc_aes_gcmHASH(gcm->Htbl, inbuf, inlen, gcm->T);
ppc_aes_gcmCRYPT(inbuf, outbuf, inlen, gcm->CTR, gcm->aes_context->k.expandedKey,
- gcm->aes_context->Nr);
+ gcm->aes_context->Nr);
gcm->Mlen += inlen;
ppc_aes_gcmTAG(gcm->Htbl, gcm->T, gcm->Mlen, gcm->Alen, gcm->X0, T);
diff --git a/lib/freebl/ppc-gcm.h b/lib/freebl/ppc-gcm.h
index 169cad0a5..1d94c0c33 100644
--- a/lib/freebl/ppc-gcm.h
+++ b/lib/freebl/ppc-gcm.h
@@ -13,64 +13,64 @@
typedef struct ppc_AES_GCMContextStr ppc_AES_GCMContext;
ppc_AES_GCMContext *ppc_AES_GCM_CreateContext(void *context, freeblCipherFunc cipher,
- const unsigned char *params);
+ const unsigned char *params);
void ppc_AES_GCM_DestroyContext(ppc_AES_GCMContext *gcm, PRBool freeit);
SECStatus ppc_AES_GCM_EncryptUpdate(ppc_AES_GCMContext *gcm, unsigned char *outbuf,
- unsigned int *outlen, unsigned int maxout,
- const unsigned char *inbuf, unsigned int inlen,
- unsigned int blocksize);
-
-SECStatus ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm, unsigned char *outbuf,
- unsigned int *outlen, unsigned int maxout,
- const unsigned char *inbuf, unsigned int inlen,
- unsigned int blocksize);
-SECStatus ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm,
- unsigned char *outbuf,
unsigned int *outlen, unsigned int maxout,
const unsigned char *inbuf, unsigned int inlen,
- void *params, unsigned int paramLen,
- const unsigned char *aad, unsigned int aadLen,
unsigned int blocksize);
-SECStatus ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm,
- unsigned char *outbuf,
+
+SECStatus ppc_AES_GCM_DecryptUpdate(ppc_AES_GCMContext *gcm, unsigned char *outbuf,
unsigned int *outlen, unsigned int maxout,
const unsigned char *inbuf, unsigned int inlen,
- void *params, unsigned int paramLen,
- const unsigned char *aad, unsigned int aadLen,
unsigned int blocksize);
+SECStatus ppc_AES_GCM_EncryptAEAD(ppc_AES_GCMContext *gcm,
+ unsigned char *outbuf,
+ unsigned int *outlen, unsigned int maxout,
+ const unsigned char *inbuf, unsigned int inlen,
+ void *params, unsigned int paramLen,
+ const unsigned char *aad, unsigned int aadLen,
+ unsigned int blocksize);
+SECStatus ppc_AES_GCM_DecryptAEAD(ppc_AES_GCMContext *gcm,
+ unsigned char *outbuf,
+ unsigned int *outlen, unsigned int maxout,
+ const unsigned char *inbuf, unsigned int inlen,
+ void *params, unsigned int paramLen,
+ const unsigned char *aad, unsigned int aadLen,
+ unsigned int blocksize);
/* Prototypes of the functions defined in the assembler file. */
/* Prepares the constants used in the aggregated reduction method */
void ppc_aes_gcmINIT(unsigned char Htbl[8 * 16],
- PRUint32 *KS,
- int NR);
+ PRUint32 *KS,
+ int NR);
/* Produces the final GHASH value */
void ppc_aes_gcmTAG(unsigned char Htbl[8 * 16],
- unsigned char *Tp,
- unsigned long Mlen,
- unsigned long Alen,
- unsigned char *X0,
- unsigned char *TAG);
+ unsigned char *Tp,
+ unsigned long Mlen,
+ unsigned long Alen,
+ unsigned char *X0,
+ unsigned char *TAG);
/* Hashes the Additional Authenticated Data, should be used before enc/dec.
Operates on any length of data. Partial block is padded internally. */
void ppc_aes_gcmHASH(unsigned char Htbl[8 * 16],
- const unsigned char *AAD,
- unsigned long Alen,
- unsigned char *Tp);
+ const unsigned char *AAD,
+ unsigned long Alen,
+ unsigned char *Tp);
/* Crypt only, used in combination with ppc_aes_gcmAAD().
Operates on any length of data, however partial block should only be encrypted
at the last call, otherwise the result will be incorrect. */
void ppc_aes_gcmCRYPT(const unsigned char *PT,
- unsigned char *CT,
- unsigned long len,
- unsigned char *CTRP,
- PRUint32 *KS,
- int NR);
+ unsigned char *CT,
+ unsigned long len,
+ unsigned char *CTRP,
+ PRUint32 *KS,
+ int NR);
#endif