Skip to content

Commit b07a372

Browse files
committed
Fix spaces and tabs
1 parent 32c1f8b commit b07a372

2 files changed

Lines changed: 6 additions & 6 deletions

File tree

wolfcrypt/src/port/Renesas/renesas_common.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ static int Renesas_cmn_CryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
259259
} else
260260
#endif
261261
if (info->pk.type == WC_PK_TYPE_RSA &&
262-
(info->pk.rsa.type == RSA_PRIVATE_DECRYPT ||
262+
(info->pk.rsa.type == RSA_PRIVATE_DECRYPT ||
263263
info->pk.rsa.type == RSA_PUBLIC_ENCRYPT)) {
264264
/* rsa public encrypt/private decrypt */
265265
ret = wc_tsip_RsaFunction(info, cbInfo);
@@ -275,7 +275,7 @@ static int Renesas_cmn_CryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
275275
#if defined(WOLFSSL_RENESAS_TSIP_CRYPTONLY)
276276
/* RSA Verify */
277277
else if (info->pk.type == WC_PK_TYPE_RSA &&
278-
info->pk.rsa.type == RSA_PUBLIC_DECRYPT) {
278+
info->pk.rsa.type == RSA_PUBLIC_DECRYPT) {
279279
ret = wc_tsip_RsaVerifyPkcs(info, cbInfo);
280280
}
281281
#endif

wolfcrypt/src/port/Renesas/renesas_tsip_rsa.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
235235
plain.data_length = info->pk.rsa.inLen;
236236
cipher.pdata = (uint8_t*)info->pk.rsa.out;
237237
cipher.data_length = info->pk.rsa.outLen;
238-
238+
239239
if (keySize == TSIP_KEY_TYPE_RSA1024) {
240240
ret = R_TSIP_RsaesPkcs1024Encrypt(&plain, &cipher,
241241
tuc->rsa1024pub_keyIdx);
@@ -246,7 +246,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
246246
}
247247
else {
248248
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
249-
"1024 or 2048 bits.");
249+
"1024 or 2048 bits.");
250250
return BAD_FUNC_ARG;
251251
}
252252
}
@@ -255,7 +255,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
255255
plain.data_length = info->pk.rsa.outLen;
256256
cipher.pdata = (uint8_t*)info->pk.rsa.in;
257257
cipher.data_length = info->pk.rsa.inLen;
258-
258+
259259
if (keySize == TSIP_KEY_TYPE_RSA1024) {
260260
ret = R_TSIP_RsaesPkcs1024Decrypt(&cipher, &plain,
261261
tuc->rsa1024pri_keyIdx);
@@ -266,7 +266,7 @@ WOLFSSL_LOCAL int wc_tsip_RsaFunction(wc_CryptoInfo* info, TsipUserCtx* tuc)
266266
}
267267
else {
268268
WOLFSSL_MSG("keySize is invalid, neither 128 or 256 bytes, "
269-
"1024 or 2048 bits.");
269+
"1024 or 2048 bits.");
270270
return BAD_FUNC_ARG;
271271
}
272272
}

0 commit comments

Comments
 (0)