forked from wolfSSL/wolfssl
fix whitespace/linelength/indentation.
This commit is contained in:
@ -259,7 +259,7 @@ static int Dtls13GetRnMask(WOLFSSL* ssl, const byte* ciphertext, byte* mask,
|
||||
#ifdef HAVE_CHACHA
|
||||
if (ssl->specs.bulk_cipher_algorithm == wolfssl_chacha) {
|
||||
word32 counter;
|
||||
int ret;
|
||||
int ret;
|
||||
|
||||
if (c->chacha == NULL)
|
||||
return BAD_STATE_E;
|
||||
|
13
src/tls13.c
13
src/tls13.c
@ -518,7 +518,7 @@ static int DeriveClientHandshakeSecret(WOLFSSL* ssl, byte* key)
|
||||
if (ssl == NULL || ssl->arrays == NULL) {
|
||||
return BAD_FUNC_ARG;
|
||||
}
|
||||
|
||||
|
||||
ret = Tls13DeriveKey(ssl, key, -1, ssl->arrays->preMasterSecret,
|
||||
clientHandshakeLabel, CLIENT_HANDSHAKE_LABEL_SZ,
|
||||
ssl->specs.mac_algorithm, 1);
|
||||
@ -6169,9 +6169,10 @@ int SendTls13ServerHello(WOLFSSL* ssl, byte extMsgType)
|
||||
{
|
||||
#ifdef WOLFSSL_DTLS13
|
||||
if (ssl->options.dtls) {
|
||||
ret = Dtls13HashHandshake(ssl,
|
||||
output + Dtls13GetRlHeaderLength(ssl, 0) ,
|
||||
(word16)sendSz - Dtls13GetRlHeaderLength(ssl, 0));
|
||||
ret = Dtls13HashHandshake(
|
||||
ssl,
|
||||
output + Dtls13GetRlHeaderLength(ssl, 0) ,
|
||||
(word16)sendSz - Dtls13GetRlHeaderLength(ssl, 0));
|
||||
}
|
||||
else
|
||||
#endif /* WOLFSSL_DTLS13 */
|
||||
@ -6452,7 +6453,7 @@ static int SendTls13CertificateRequest(WOLFSSL* ssl, byte* reqCtx,
|
||||
ssl->options.buildingMsg = 0;
|
||||
ret =
|
||||
Dtls13HandshakeSend(ssl, output, (word16)sendSz, (word16)i,
|
||||
certificate_request, 1);
|
||||
certificate_request, 1);
|
||||
|
||||
WOLFSSL_LEAVE("SendTls13CertificateRequest", ret);
|
||||
WOLFSSL_END(WC_FUNC_CERTIFICATE_REQUEST_SEND);
|
||||
@ -7263,7 +7264,7 @@ static int SendTls13Certificate(WOLFSSL* ssl)
|
||||
ssl->options.buildingMsg = 0;
|
||||
ssl->fragOffset = 0;
|
||||
ret = Dtls13HandshakeSend(ssl, output, (word16)sendSz, (word16)i,
|
||||
certificate, 1);
|
||||
certificate, 1);
|
||||
}
|
||||
else
|
||||
#endif /* WOLFSSL_DTLS13 */
|
||||
|
@ -240,7 +240,7 @@ int wc_KyberKey_CipherTextSize(KyberKey* key, word32* len)
|
||||
}
|
||||
|
||||
#ifdef HAVE_LIBOQS
|
||||
/* NOTE: SHAKE and AES variants have the same length ciphertext. */
|
||||
/* NOTE: SHAKE and AES variants have the same length ciphertext. */
|
||||
if (ret == 0) {
|
||||
switch (key->type) {
|
||||
case KYBER_LEVEL1:
|
||||
@ -534,7 +534,7 @@ int wc_KyberKey_Decapsulate(KyberKey* key, unsigned char* ss,
|
||||
|
||||
/**
|
||||
* Decode the private key.
|
||||
*
|
||||
*
|
||||
* We store the whole thing in the private key buffer. Note this means we cannot
|
||||
* do the encapsulation operation with the private key. But generally speaking
|
||||
* this is never done.
|
||||
@ -614,7 +614,7 @@ int wc_KyberKey_DecodePublicKey(KyberKey* key, unsigned char* in, word32 len)
|
||||
|
||||
/**
|
||||
* Encode the private key.
|
||||
*
|
||||
*
|
||||
* We stored it as a blob so we can just copy it over.
|
||||
*
|
||||
* @param [in] key Kyber key object.
|
||||
@ -664,7 +664,7 @@ int wc_KyberKey_EncodePrivateKey(KyberKey* key, unsigned char* out, word32 len)
|
||||
*/
|
||||
int wc_KyberKey_EncodePublicKey(KyberKey* key, unsigned char* out, word32 len)
|
||||
{
|
||||
int ret = 0;
|
||||
int ret = 0;
|
||||
unsigned int pubLen = 0;
|
||||
|
||||
if ((key == NULL) || (out == NULL)) {
|
||||
|
Reference in New Issue
Block a user