Fix spaces and tabs

This commit is contained in:
Hideki Miyazaki
2024-10-30 06:42:07 +09:00
parent 32c1f8bbd7
commit b07a372b52
2 changed files with 6 additions and 6 deletions

View File

@ -259,7 +259,7 @@ static int Renesas_cmn_CryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
} else } else
#endif #endif
if (info->pk.type == WC_PK_TYPE_RSA && if (info->pk.type == WC_PK_TYPE_RSA &&
(info->pk.rsa.type == RSA_PRIVATE_DECRYPT || (info->pk.rsa.type == RSA_PRIVATE_DECRYPT ||
info->pk.rsa.type == RSA_PUBLIC_ENCRYPT)) { info->pk.rsa.type == RSA_PUBLIC_ENCRYPT)) {
/* rsa public encrypt/private decrypt */ /* rsa public encrypt/private decrypt */
ret = wc_tsip_RsaFunction(info, cbInfo); ret = wc_tsip_RsaFunction(info, cbInfo);
@ -275,7 +275,7 @@ static int Renesas_cmn_CryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
#if defined(WOLFSSL_RENESAS_TSIP_CRYPTONLY) #if defined(WOLFSSL_RENESAS_TSIP_CRYPTONLY)
/* RSA Verify */ /* RSA Verify */
else if (info->pk.type == WC_PK_TYPE_RSA && else if (info->pk.type == WC_PK_TYPE_RSA &&
info->pk.rsa.type == RSA_PUBLIC_DECRYPT) { info->pk.rsa.type == RSA_PUBLIC_DECRYPT) {
ret = wc_tsip_RsaVerifyPkcs(info, cbInfo); ret = wc_tsip_RsaVerifyPkcs(info, cbInfo);
} }
#endif #endif

View File

@ -235,7 +235,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
plain.data_length = info->pk.rsa.inLen; plain.data_length = info->pk.rsa.inLen;
cipher.pdata = (uint8_t*)info->pk.rsa.out; cipher.pdata = (uint8_t*)info->pk.rsa.out;
cipher.data_length = info->pk.rsa.outLen; cipher.data_length = info->pk.rsa.outLen;
if (keySize == TSIP_KEY_TYPE_RSA1024) { if (keySize == TSIP_KEY_TYPE_RSA1024) {
ret = R_TSIP_RsaesPkcs1024Encrypt(&plain, &cipher, ret = R_TSIP_RsaesPkcs1024Encrypt(&plain, &cipher,
tuc->rsa1024pub_keyIdx); tuc->rsa1024pub_keyIdx);
@ -246,7 +246,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
} }
else { else {
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, " WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
"1024 or 2048 bits."); "1024 or 2048 bits.");
return BAD_FUNC_ARG; return BAD_FUNC_ARG;
} }
} }
@ -255,7 +255,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
plain.data_length = info->pk.rsa.outLen; plain.data_length = info->pk.rsa.outLen;
cipher.pdata = (uint8_t*)info->pk.rsa.in; cipher.pdata = (uint8_t*)info->pk.rsa.in;
cipher.data_length = info->pk.rsa.inLen; cipher.data_length = info->pk.rsa.inLen;
if (keySize == TSIP_KEY_TYPE_RSA1024) { if (keySize == TSIP_KEY_TYPE_RSA1024) {
ret = R_TSIP_RsaesPkcs1024Decrypt(&cipher, &plain, ret = R_TSIP_RsaesPkcs1024Decrypt(&cipher, &plain,
tuc->rsa1024pri_keyIdx); tuc->rsa1024pri_keyIdx);
@ -266,7 +266,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
} }
else { else {
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, " WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
"1024 or 2048 bits."); "1024 or 2048 bits.");
return BAD_FUNC_ARG; return BAD_FUNC_ARG;
} }
} }