mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-07 06:34:42 +02:00
fix long line and trailing whitespaces
This commit is contained in:
@@ -244,7 +244,8 @@ WOLFSSL_LOCAL int wc_fspsm_AesGcmEncrypt(struct Aes* aes, byte* out,
|
|||||||
(void) key_server_aes;
|
(void) key_server_aes;
|
||||||
|
|
||||||
/* sanity check */
|
/* sanity check */
|
||||||
if (aes == NULL || authTagSz > WC_AES_BLOCK_SIZE || ivSz == 0 || info == NULL) {
|
if (aes == NULL || authTagSz > WC_AES_BLOCK_SIZE || ivSz == 0 ||
|
||||||
|
info == NULL) {
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -453,7 +454,8 @@ WOLFSSL_LOCAL int wc_fspsm_AesGcmDecrypt(struct Aes* aes, byte* out,
|
|||||||
FSPSM_AES_PWKEY key_server_aes = NULL;
|
FSPSM_AES_PWKEY key_server_aes = NULL;
|
||||||
(void) key_client_aes;
|
(void) key_client_aes;
|
||||||
/* sanity check */
|
/* sanity check */
|
||||||
if (aes == NULL || authTagSz > WC_AES_BLOCK_SIZE || ivSz == 0 || info == NULL) {
|
if (aes == NULL || authTagSz > WC_AES_BLOCK_SIZE || ivSz == 0 ||
|
||||||
|
info == NULL) {
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -812,7 +814,8 @@ int wc_AesSetKey(Aes* aes, const byte* userKey, word32 keylen,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
WOLFSSL_LOCAL int wc_fspsm_AesCipher(int devIdArg, wc_CryptoInfo* info, void* ctx)
|
WOLFSSL_LOCAL int wc_fspsm_AesCipher(int devIdArg, wc_CryptoInfo* info,
|
||||||
|
void* ctx)
|
||||||
{
|
{
|
||||||
int ret = WC_NO_ERR_TRACE(NOT_COMPILED_IN);
|
int ret = WC_NO_ERR_TRACE(NOT_COMPILED_IN);
|
||||||
FSPSM_ST* cbInfo = (FSPSM_ST*)ctx;
|
FSPSM_ST* cbInfo = (FSPSM_ST*)ctx;
|
||||||
|
@@ -67,10 +67,6 @@ static fspsm_key_data g_user_key_info;
|
|||||||
|
|
||||||
static uint32_t g_encrypted_publicCA_key[HW_SCE_SINST_WORD_SIZE];
|
static uint32_t g_encrypted_publicCA_key[HW_SCE_SINST_WORD_SIZE];
|
||||||
extern uint32_t g_CAscm_Idx; /* index of CM table */
|
extern uint32_t g_CAscm_Idx; /* index of CM table */
|
||||||
//#define USE_GLOBAL_INTERNAL
|
|
||||||
#if !defined(USE_GLOBAL_INTERNAL)
|
|
||||||
FSPSM_ST_Internal g_internal;
|
|
||||||
#endif
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif /* WOLFSSL_RENESAS_FSPSM*/
|
#endif /* WOLFSSL_RENESAS_FSPSM*/
|
||||||
@@ -1246,12 +1242,8 @@ void wc_fspsm_TlsCleanup(WOLFSSL* ssl)
|
|||||||
return;
|
return;
|
||||||
/* free internal structure */
|
/* free internal structure */
|
||||||
if (tuc->internal) {
|
if (tuc->internal) {
|
||||||
#if !defined(USE_GLOBAL_INTERNAL)
|
|
||||||
XFREE(tuc->internal, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(tuc->internal, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
tuc->internal = NULL;
|
tuc->internal = NULL;
|
||||||
#else
|
|
||||||
ForceZero(tuc->internal, sizeof(FSPSM_ST_Internal));
|
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* zero clear */
|
/* zero clear */
|
||||||
@@ -1272,14 +1264,9 @@ WOLFSSL_API int wc_fspsm_set_callback_ctx(WOLFSSL* ssl, void* user_ctx)
|
|||||||
}
|
}
|
||||||
|
|
||||||
ForceZero(uCtx, sizeof(FSPSM_ST));
|
ForceZero(uCtx, sizeof(FSPSM_ST));
|
||||||
#if !defined(USE_GLOBAL_INTERNAL)
|
|
||||||
uCtx->internal = (FSPSM_ST_Internal*)XMALLOC(sizeof(FSPSM_ST_Internal),
|
uCtx->internal = (FSPSM_ST_Internal*)XMALLOC(sizeof(FSPSM_ST_Internal),
|
||||||
ssl->heap,
|
ssl->heap,
|
||||||
DYNAMIC_TYPE_TMP_BUFFER);
|
DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
#else
|
|
||||||
printf("sizeof (FSPSM_ST_Internal) = %d\n", sizeof(FSPSM_ST_Internal));
|
|
||||||
uCtx->internal = &g_internal;
|
|
||||||
#endif
|
|
||||||
if (!uCtx->internal) {
|
if (!uCtx->internal) {
|
||||||
WOLFSSL_MSG("Failed to allocate memory for user ctx internal");
|
WOLFSSL_MSG("Failed to allocate memory for user ctx internal");
|
||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
|
Reference in New Issue
Block a user