crypto/mbedtls: Fix gcm_mynewt coding style
This adjusts codings style for the latest clang-format requirements
diff --git a/crypto/mbedtls/include/mbedtls/gcm_mynewt.h b/crypto/mbedtls/include/mbedtls/gcm_mynewt.h
index 40945bd..b1b02ba 100644
--- a/crypto/mbedtls/include/mbedtls/gcm_mynewt.h
+++ b/crypto/mbedtls/include/mbedtls/gcm_mynewt.h
@@ -26,11 +26,9 @@
/**
* Same as mbedtls_gcm_setkey, but with preallocated memory for cipher algorithm context
*/
-int mbedtls_gcm_setkey_noalloc( mbedtls_gcm_context *ctx,
- const mbedtls_cipher_info_t *cipher_info,
- const unsigned char *key,
- unsigned int keybits,
- void *cipher_ctx);
-
+int mbedtls_gcm_setkey_noalloc(mbedtls_gcm_context *ctx,
+ const mbedtls_cipher_info_t *cipher_info,
+ const unsigned char *key, unsigned int keybits,
+ void *cipher_ctx);
#endif /* _GCM_MYNEWT_H_ */
diff --git a/crypto/mbedtls/selftest/src/testcases/gcm_mynewt_test.c b/crypto/mbedtls/selftest/src/testcases/gcm_mynewt_test.c
index f062f2b..46c69af 100644
--- a/crypto/mbedtls/selftest/src/testcases/gcm_mynewt_test.c
+++ b/crypto/mbedtls/selftest/src/testcases/gcm_mynewt_test.c
@@ -24,32 +24,33 @@
/* This contains both ADD and plaintext for encryption */
static const uint8_t initial_data[110] = {
- 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A,
- 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1A,
- 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2A,
- 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A,
- 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4A,
- 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5A,
- 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6A,
- 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7A,
- 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8A,
- 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, 0x99, 0x9A,
- 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6, 0xA7, 0xA8, 0xA9, 0xAA
+ 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x11,
+ 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1A, 0x21, 0x22,
+ 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2A, 0x31, 0x32, 0x33,
+ 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A, 0x41, 0x42, 0x43, 0x44,
+ 0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x51, 0x52, 0x53, 0x54, 0x55,
+ 0x56, 0x57, 0x58, 0x59, 0x5A, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
+ 0x67, 0x68, 0x69, 0x6A, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77,
+ 0x78, 0x79, 0x7A, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88,
+ 0x89, 0x8A, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, 0x99,
+ 0x9A, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6, 0xA7, 0xA8, 0xA9, 0xAA
};
-static const uint8_t key[32] = {
- 0xC0, 0xCA, 0xC0, 0x1A, 0xC0, 0xCA, 0xC0, 0x1A,
- 0xC0, 0xCA, 0xC0, 0x1A, 0xC0, 0xCA, 0xC0, 0x1A,
- 0xC0, 0xCA, 0xC0, 0x1A, 0xC0, 0xCA, 0xC0, 0x1A,
- 0xC0, 0xCA, 0xC0, 0x1A, 0xC0, 0xCA, 0xC0, 0x1A
-};
-static const uint8_t iv[12] = { 0x0, 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xA, 0xB };
-static const uint8_t expected_tag[16] = { 0x05, 0x5D, 0x8E, 0xD4, 0xF9, 0x2A, 0x87, 0x87,
- 0x6F, 0x23, 0xF2, 0xE6, 0xF0, 0x1D, 0x6D, 0x5C };
+static const uint8_t key[32] = { 0xC0, 0xCA, 0xC0, 0x1A, 0xC0, 0xCA, 0xC0,
+ 0x1A, 0xC0, 0xCA, 0xC0, 0x1A, 0xC0, 0xCA,
+ 0xC0, 0x1A, 0xC0, 0xCA, 0xC0, 0x1A, 0xC0,
+ 0xCA, 0xC0, 0x1A, 0xC0, 0xCA, 0xC0, 0x1A,
+ 0xC0, 0xCA, 0xC0, 0x1A };
+static const uint8_t iv[12] = { 0x0, 0x1, 0x2, 0x3, 0x4, 0x5,
+ 0x6, 0x7, 0x8, 0x9, 0xA, 0xB };
+static const uint8_t expected_tag[16] = { 0x05, 0x5D, 0x8E, 0xD4, 0xF9, 0x2A,
+ 0x87, 0x87, 0x6F, 0x23, 0xF2, 0xE6,
+ 0xF0, 0x1D, 0x6D, 0x5C };
static uint8_t test_tag[16];
static uint8_t test_buf[110];
-static int mbedtls_gcm_mynewt_test_crypt(uint8_t enc)
+static int
+mbedtls_gcm_mynewt_test_crypt(uint8_t enc)
{
int add_len = 40;
mbedtls_gcm_context ctx;
@@ -63,9 +64,8 @@
int rc;
if (rsm_ucast_cipher == NULL) {
- rsm_ucast_cipher =
- mbedtls_cipher_info_from_values(MBEDTLS_CIPHER_ID_AES, 256,
- MBEDTLS_MODE_ECB);
+ rsm_ucast_cipher = mbedtls_cipher_info_from_values(MBEDTLS_CIPHER_ID_AES,
+ 256, MBEDTLS_MODE_ECB);
}
memset(&ctx, 0, sizeof(ctx));
@@ -75,8 +75,7 @@
goto out;
}
- rc = mbedtls_gcm_starts(&ctx,
- enc == 1 ? MBEDTLS_GCM_ENCRYPT : MBEDTLS_GCM_DECRYPT,
+ rc = mbedtls_gcm_starts(&ctx, enc == 1 ? MBEDTLS_GCM_ENCRYPT : MBEDTLS_GCM_DECRYPT,
iv, sizeof(iv));
if (rc) {
goto out;
diff --git a/crypto/mbedtls/src/gcm_mynewt.c b/crypto/mbedtls/src/gcm_mynewt.c
index f846124..fbb4800 100644
--- a/crypto/mbedtls/src/gcm_mynewt.c
+++ b/crypto/mbedtls/src/gcm_mynewt.c
@@ -69,12 +69,13 @@
#if !defined(MBEDTLS_GCM_ALT)
/* Used to select the acceleration mechanism */
-#define MBEDTLS_GCM_ACC_SMALLTABLE 0
-#define MBEDTLS_GCM_ACC_LARGETABLE 1
-#define MBEDTLS_GCM_ACC_AESNI 2
-#define MBEDTLS_GCM_ACC_AESCE 3
+#define MBEDTLS_GCM_ACC_SMALLTABLE 0
+#define MBEDTLS_GCM_ACC_LARGETABLE 1
+#define MBEDTLS_GCM_ACC_AESNI 2
+#define MBEDTLS_GCM_ACC_AESCE 3
-static inline void gcm_set_acceleration(mbedtls_gcm_context *ctx)
+static inline void
+gcm_set_acceleration(mbedtls_gcm_context *ctx)
{
#if defined(MBEDTLS_GCM_LARGE_TABLE)
ctx->acceleration = MBEDTLS_GCM_ACC_LARGETABLE;
@@ -96,10 +97,11 @@
#endif
}
-static inline void gcm_gen_table_rightshift(uint64_t dst[2], const uint64_t src[2])
+static inline void
+gcm_gen_table_rightshift(uint64_t dst[2], const uint64_t src[2])
{
- uint8_t *u8Dst = (uint8_t *) dst;
- uint8_t *u8Src = (uint8_t *) src;
+ uint8_t *u8Dst = (uint8_t *)dst;
+ uint8_t *u8Src = (uint8_t *)src;
MBEDTLS_PUT_UINT64_BE(MBEDTLS_GET_UINT64_BE(&src[1], 0) >> 1, &dst[1], 0);
u8Dst[8] |= (u8Src[7] & 0x01) << 7;
@@ -115,11 +117,12 @@
* is the high-order bit of HH corresponds to P^0 and the low-order bit of HL
* corresponds to P^127.
*/
-static int gcm_gen_table(mbedtls_gcm_context *ctx)
+static int
+gcm_gen_table(mbedtls_gcm_context *ctx)
{
int ret, i, j;
uint64_t u64h[2] = { 0 };
- uint8_t *h = (uint8_t *) u64h;
+ uint8_t *h = (uint8_t *)u64h;
#if defined(MBEDTLS_BLOCK_CIPHER_C)
ret = mbedtls_block_cipher_encrypt(&ctx->block_cipher_ctx, h, h);
@@ -134,18 +137,18 @@
gcm_set_acceleration(ctx);
/* MBEDTLS_GCM_HTABLE_SIZE/2 = 1000 corresponds to 1 in GF(2^128) */
- ctx->H[MBEDTLS_GCM_HTABLE_SIZE/2][0] = u64h[0];
- ctx->H[MBEDTLS_GCM_HTABLE_SIZE/2][1] = u64h[1];
+ ctx->H[MBEDTLS_GCM_HTABLE_SIZE / 2][0] = u64h[0];
+ ctx->H[MBEDTLS_GCM_HTABLE_SIZE / 2][1] = u64h[1];
switch (ctx->acceleration) {
#if defined(MBEDTLS_AESNI_HAVE_CODE)
- case MBEDTLS_GCM_ACC_AESNI:
- return 0;
+ case MBEDTLS_GCM_ACC_AESNI:
+ return 0;
#endif
#if defined(MBEDTLS_AESCE_HAVE_CODE)
- case MBEDTLS_GCM_ACC_AESCE:
- return 0;
+ case MBEDTLS_GCM_ACC_AESCE:
+ return 0;
#endif
default:
@@ -153,13 +156,13 @@
ctx->H[0][0] = 0;
ctx->H[0][1] = 0;
- for (i = MBEDTLS_GCM_HTABLE_SIZE/4; i > 0; i >>= 1) {
- gcm_gen_table_rightshift(ctx->H[i], ctx->H[i*2]);
+ for (i = MBEDTLS_GCM_HTABLE_SIZE / 4; i > 0; i >>= 1) {
+ gcm_gen_table_rightshift(ctx->H[i], ctx->H[i * 2]);
}
#if !defined(MBEDTLS_GCM_LARGE_TABLE)
/* pack elements of H as 64-bits ints, big-endian */
- for (i = MBEDTLS_GCM_HTABLE_SIZE/2; i > 0; i >>= 1) {
+ for (i = MBEDTLS_GCM_HTABLE_SIZE / 2; i > 0; i >>= 1) {
MBEDTLS_PUT_UINT64_BE(ctx->H[i][0], &ctx->H[i][0], 0);
MBEDTLS_PUT_UINT64_BE(ctx->H[i][1], &ctx->H[i][1], 0);
}
@@ -167,10 +170,9 @@
for (i = 2; i < MBEDTLS_GCM_HTABLE_SIZE; i <<= 1) {
for (j = 1; j < i; j++) {
- mbedtls_xor_no_simd((unsigned char *) ctx->H[i+j],
- (unsigned char *) ctx->H[i],
- (unsigned char *) ctx->H[j],
- 16);
+ mbedtls_xor_no_simd((unsigned char *)ctx->H[i + j],
+ (unsigned char *)ctx->H[i],
+ (unsigned char *)ctx->H[j], 16);
}
}
}
@@ -178,11 +180,11 @@
return 0;
}
-int mbedtls_gcm_setkey_noalloc( mbedtls_gcm_context *ctx,
- const mbedtls_cipher_info_t *cipher_info,
- const unsigned char *key,
- unsigned int keybits,
- void *cipher_ctx)
+int
+mbedtls_gcm_setkey_noalloc(mbedtls_gcm_context *ctx,
+ const mbedtls_cipher_info_t *cipher_info,
+ const unsigned char *key, unsigned int keybits,
+ void *cipher_ctx)
{
int ret;
@@ -205,17 +207,16 @@
#endif
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
- if( ( ret = mbedtls_cipher_setkey( &ctx->cipher_ctx, key,
- keybits,
- MBEDTLS_ENCRYPT ) ) != 0 )
- {
- return( ret );
+ if ((ret = mbedtls_cipher_setkey(&ctx->cipher_ctx, key, keybits,
+ MBEDTLS_ENCRYPT)) != 0) {
+ return ret;
}
- if( ( ret = gcm_gen_table( ctx ) ) != 0 )
- return( ret );
+ if ((ret = gcm_gen_table(ctx)) != 0) {
+ return ret;
+ }
- return( 0 );
+ return 0;
}
#endif /* !MBEDTLS_GCM_ALT */