aboutsummaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorRichard Barnes <rlb@ipv.sx>2018-07-27 16:51:03 -0400
committerRichard Barnes <rlb@ipv.sx>2018-07-27 16:51:03 -0400
commit2da31e44d63a52bda9ed225b65f50202815d1803 (patch)
treee8742942d8c40acb3be8d5a62e41e88de688acf3 /crypto
parent5c41ada120cbc5605cae9f24ad4f611a45a256a5 (diff)
downloadplatform_external_libsrtp2-2da31e44d63a52bda9ed225b65f50202815d1803.tar.gz
platform_external_libsrtp2-2da31e44d63a52bda9ed225b65f50202815d1803.tar.bz2
platform_external_libsrtp2-2da31e44d63a52bda9ed225b65f50202815d1803.zip
Yet more clang-format
Diffstat (limited to 'crypto')
-rw-r--r--crypto/cipher/aes_gcm_nss.c2
-rw-r--r--crypto/cipher/aes_icm_nss.c4
2 files changed, 3 insertions, 3 deletions
diff --git a/crypto/cipher/aes_gcm_nss.c b/crypto/cipher/aes_gcm_nss.c
index 3577e8f..b48b9f4 100644
--- a/crypto/cipher/aes_gcm_nss.c
+++ b/crypto/cipher/aes_gcm_nss.c
@@ -193,7 +193,7 @@ static srtp_err_status_t srtp_aes_gcm_nss_context_init(void *cv,
return (srtp_err_status_cipher_fail);
}
- SECItem key_item = { siBuffer, (unsigned char *) key, c->key_size };
+ SECItem key_item = { siBuffer, (unsigned char *)key, c->key_size };
c->key = PK11_ImportSymKey(slot, CKM_AES_GCM, PK11_OriginUnwrap,
CKA_ENCRYPT, &key_item, NULL);
PK11_FreeSlot(slot);
diff --git a/crypto/cipher/aes_icm_nss.c b/crypto/cipher/aes_icm_nss.c
index e89cb10..d20eecc 100644
--- a/crypto/cipher/aes_icm_nss.c
+++ b/crypto/cipher/aes_icm_nss.c
@@ -281,7 +281,7 @@ static srtp_err_status_t srtp_aes_icm_nss_set_iv(void *cv,
PK11_DestroyContext(c->ctx, PR_TRUE);
}
- SECItem paramItem = { siBuffer, (unsigned char*)&param,
+ SECItem paramItem = { siBuffer, (unsigned char *)&param,
sizeof(CK_AES_CTR_PARAMS) };
c->ctx = PK11_CreateContextBySymKey(CKM_AES_CTR, CKA_ENCRYPT, c->key,
&paramItem);
@@ -311,7 +311,7 @@ static srtp_err_status_t srtp_aes_icm_nss_encrypt(void *cv,
}
int rv =
- PK11_CipherOp(c->ctx, buf, (int *) enc_len, *enc_len, buf, *enc_len);
+ PK11_CipherOp(c->ctx, buf, (int *)enc_len, *enc_len, buf, *enc_len);
srtp_err_status_t status = (srtp_err_status_ok);
if (rv != SECSuccess) {