forked from wolfSSL/wolfssl
Fix spaces and tabs
This commit is contained in:
@ -259,7 +259,7 @@ static int Renesas_cmn_CryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
|
|||||||
} else
|
} else
|
||||||
#endif
|
#endif
|
||||||
if (info->pk.type == WC_PK_TYPE_RSA &&
|
if (info->pk.type == WC_PK_TYPE_RSA &&
|
||||||
(info->pk.rsa.type == RSA_PRIVATE_DECRYPT ||
|
(info->pk.rsa.type == RSA_PRIVATE_DECRYPT ||
|
||||||
info->pk.rsa.type == RSA_PUBLIC_ENCRYPT)) {
|
info->pk.rsa.type == RSA_PUBLIC_ENCRYPT)) {
|
||||||
/* rsa public encrypt/private decrypt */
|
/* rsa public encrypt/private decrypt */
|
||||||
ret = wc_tsip_RsaFunction(info, cbInfo);
|
ret = wc_tsip_RsaFunction(info, cbInfo);
|
||||||
@ -275,7 +275,7 @@ static int Renesas_cmn_CryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
|
|||||||
#if defined(WOLFSSL_RENESAS_TSIP_CRYPTONLY)
|
#if defined(WOLFSSL_RENESAS_TSIP_CRYPTONLY)
|
||||||
/* RSA Verify */
|
/* RSA Verify */
|
||||||
else if (info->pk.type == WC_PK_TYPE_RSA &&
|
else if (info->pk.type == WC_PK_TYPE_RSA &&
|
||||||
info->pk.rsa.type == RSA_PUBLIC_DECRYPT) {
|
info->pk.rsa.type == RSA_PUBLIC_DECRYPT) {
|
||||||
ret = wc_tsip_RsaVerifyPkcs(info, cbInfo);
|
ret = wc_tsip_RsaVerifyPkcs(info, cbInfo);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
@ -235,7 +235,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
|
|||||||
plain.data_length = info->pk.rsa.inLen;
|
plain.data_length = info->pk.rsa.inLen;
|
||||||
cipher.pdata = (uint8_t*)info->pk.rsa.out;
|
cipher.pdata = (uint8_t*)info->pk.rsa.out;
|
||||||
cipher.data_length = info->pk.rsa.outLen;
|
cipher.data_length = info->pk.rsa.outLen;
|
||||||
|
|
||||||
if (keySize == TSIP_KEY_TYPE_RSA1024) {
|
if (keySize == TSIP_KEY_TYPE_RSA1024) {
|
||||||
ret = R_TSIP_RsaesPkcs1024Encrypt(&plain, &cipher,
|
ret = R_TSIP_RsaesPkcs1024Encrypt(&plain, &cipher,
|
||||||
tuc->rsa1024pub_keyIdx);
|
tuc->rsa1024pub_keyIdx);
|
||||||
@ -246,7 +246,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
|
|||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
|
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
|
||||||
"1024 or 2048 bits.");
|
"1024 or 2048 bits.");
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -255,7 +255,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
|
|||||||
plain.data_length = info->pk.rsa.outLen;
|
plain.data_length = info->pk.rsa.outLen;
|
||||||
cipher.pdata = (uint8_t*)info->pk.rsa.in;
|
cipher.pdata = (uint8_t*)info->pk.rsa.in;
|
||||||
cipher.data_length = info->pk.rsa.inLen;
|
cipher.data_length = info->pk.rsa.inLen;
|
||||||
|
|
||||||
if (keySize == TSIP_KEY_TYPE_RSA1024) {
|
if (keySize == TSIP_KEY_TYPE_RSA1024) {
|
||||||
ret = R_TSIP_RsaesPkcs1024Decrypt(&cipher, &plain,
|
ret = R_TSIP_RsaesPkcs1024Decrypt(&cipher, &plain,
|
||||||
tuc->rsa1024pri_keyIdx);
|
tuc->rsa1024pri_keyIdx);
|
||||||
@ -266,7 +266,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
|
|||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
|
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
|
||||||
"1024 or 2048 bits.");
|
"1024 or 2048 bits.");
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user