From 234228e5afc1d35bf03b6d6e4b87a9945620a4a1 Mon Sep 17 00:00:00 2001 From: John Safranek Date: Wed, 6 Jun 2018 17:50:55 -0700 Subject: [PATCH] FIPS Revalidation (acceptance fixes) 1. Fixed some whitespace in api.c. --- tests/api.c | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/tests/api.c b/tests/api.c index d512fb4b0..b3ea95b82 100644 --- a/tests/api.c +++ b/tests/api.c @@ -8621,23 +8621,23 @@ static int test_wc_AesGcmEncryptDecrypt (void) resultT, sizeof(resultT) - 5, a, sizeof(a)); } - if (gcmE == BAD_FUNC_ARG) { - gcmE = 0; - } else { - gcmE = WOLFSSL_FATAL_ERROR; - } - } + if (gcmE == BAD_FUNC_ARG) { + gcmE = 0; + } else { + gcmE = WOLFSSL_FATAL_ERROR; + } + } /* This case is now considered good. Long IVs are now allowed. * Except for the original FIPS release, it still has an upper * bound on the IV length. */ #if !defined(HAVE_FIPS) || \ (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2)) - if (gcmE == 0) { - gcmE = wc_AesGcmEncrypt(&aes, enc, vector, sizeof(vector), longIV, - sizeof(longIV)/sizeof(byte), resultT, sizeof(resultT), - a, sizeof(a)); - } + if (gcmE == 0) { + gcmE = wc_AesGcmEncrypt(&aes, enc, vector, sizeof(vector), longIV, + sizeof(longIV)/sizeof(byte), resultT, sizeof(resultT), + a, sizeof(a)); + } #else (void)longIV; #endif /* Old FIPS */