diff options
| author | Richard Barnes <rlb@ipv.sx> | 2018-07-27 16:51:03 -0400 |
|---|---|---|
| committer | Richard Barnes <rlb@ipv.sx> | 2018-07-27 16:51:03 -0400 |
| commit | 2da31e44d63a52bda9ed225b65f50202815d1803 (patch) | |
| tree | e8742942d8c40acb3be8d5a62e41e88de688acf3 /crypto | |
| parent | 5c41ada120cbc5605cae9f24ad4f611a45a256a5 (diff) | |
| download | platform_external_libsrtp2-2da31e44d63a52bda9ed225b65f50202815d1803.tar.gz platform_external_libsrtp2-2da31e44d63a52bda9ed225b65f50202815d1803.tar.bz2 platform_external_libsrtp2-2da31e44d63a52bda9ed225b65f50202815d1803.zip | |
Yet more clang-format
Diffstat (limited to 'crypto')
| -rw-r--r-- | crypto/cipher/aes_gcm_nss.c | 2 | ||||
| -rw-r--r-- | crypto/cipher/aes_icm_nss.c | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/crypto/cipher/aes_gcm_nss.c b/crypto/cipher/aes_gcm_nss.c index 3577e8f..b48b9f4 100644 --- a/crypto/cipher/aes_gcm_nss.c +++ b/crypto/cipher/aes_gcm_nss.c @@ -193,7 +193,7 @@ static srtp_err_status_t srtp_aes_gcm_nss_context_init(void *cv, return (srtp_err_status_cipher_fail); } - SECItem key_item = { siBuffer, (unsigned char *) key, c->key_size }; + SECItem key_item = { siBuffer, (unsigned char *)key, c->key_size }; c->key = PK11_ImportSymKey(slot, CKM_AES_GCM, PK11_OriginUnwrap, CKA_ENCRYPT, &key_item, NULL); PK11_FreeSlot(slot); diff --git a/crypto/cipher/aes_icm_nss.c b/crypto/cipher/aes_icm_nss.c index e89cb10..d20eecc 100644 --- a/crypto/cipher/aes_icm_nss.c +++ b/crypto/cipher/aes_icm_nss.c @@ -281,7 +281,7 @@ static srtp_err_status_t srtp_aes_icm_nss_set_iv(void *cv, PK11_DestroyContext(c->ctx, PR_TRUE); } - SECItem paramItem = { siBuffer, (unsigned char*)¶m, + SECItem paramItem = { siBuffer, (unsigned char *)¶m, sizeof(CK_AES_CTR_PARAMS) }; c->ctx = PK11_CreateContextBySymKey(CKM_AES_CTR, CKA_ENCRYPT, c->key, ¶mItem); @@ -311,7 +311,7 @@ static srtp_err_status_t srtp_aes_icm_nss_encrypt(void *cv, } int rv = - PK11_CipherOp(c->ctx, buf, (int *) enc_len, *enc_len, buf, *enc_len); + PK11_CipherOp(c->ctx, buf, (int *)enc_len, *enc_len, buf, *enc_len); srtp_err_status_t status = (srtp_err_status_ok); if (rv != SECSuccess) { |
