adjust indentation per Mbed TLS standards
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index 3cf63a9..4f02bb2 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -989,10 +989,10 @@
return( status );
slot = &global_data.key_slots[key];
- if ( ( slot->policy.usage & PSA_KEY_USAGE_SIGN ) != 0 )
+ \ ( slot->policy.usage & PSA_KEY_USAGE_SIGN ) != 0 )
operation->key_usage_sign = 1;
- if ( ( slot->policy.usage & PSA_KEY_USAGE_VERIFY ) != 0 )
+ if( ( slot->policy.usage & PSA_KEY_USAGE_VERIFY ) != 0 )
operation->key_usage_verify = 1;
if( ! PSA_ALG_IS_HMAC( alg ) )
@@ -1347,7 +1347,7 @@
{
padding_mode = alg & PSA_ALG_BLOCK_CIPHER_PADDING_MASK;
- switch (padding_mode)
+ switch ( padding_mode )
{
case PSA_ALG_BLOCK_CIPHER_PAD_PKCS7:
mode = MBEDTLS_PADDING_PKCS7;
@@ -1359,7 +1359,7 @@
return ( PSA_ERROR_INVALID_ARGUMENT );
}
ret = mbedtls_cipher_set_padding_mode( &operation->ctx.cipher, mode );
- if (ret != 0)
+ if( ret != 0 )
{
psa_cipher_abort( operation );
return( mbedtls_to_psa_error( ret ) );
@@ -1382,14 +1382,14 @@
psa_key_slot_t key,
psa_algorithm_t alg)
{
- return psa_cipher_setup(operation, key, alg, MBEDTLS_ENCRYPT);
+ return psa_cipher_setup( operation, key, alg, MBEDTLS_ENCRYPT );
}
psa_status_t psa_decrypt_setup(psa_cipher_operation_t *operation,
psa_key_slot_t key,
psa_algorithm_t alg)
{
- return psa_cipher_setup(operation, key, alg, MBEDTLS_DECRYPT);
+ return psa_cipher_setup( operation, key, alg, MBEDTLS_DECRYPT );
}
psa_status_t psa_encrypt_generate_iv(psa_cipher_operation_t *operation,
@@ -1428,12 +1428,12 @@
int ret = PSA_SUCCESS;
if( operation->iv_set || !( operation->iv_required ) )
return( PSA_ERROR_BAD_STATE );
- if (iv_length != operation->iv_size)
+ if( iv_length != operation->iv_size )
{
- if (((operation->alg) & PSA_ALG_ARC4) == PSA_ALG_ARC4)
- return(PSA_ERROR_BAD_STATE);
+ if( ( ( operation->alg ) & PSA_ALG_ARC4 ) == PSA_ALG_ARC4 )
+ return( PSA_ERROR_BAD_STATE );
else
- return (PSA_ERROR_INVALID_ARGUMENT);
+ return( PSA_ERROR_INVALID_ARGUMENT );
}
ret = mbedtls_cipher_set_iv( &operation->ctx.cipher, iv, iv_length );
if( ret != 0 )
@@ -1482,10 +1482,10 @@
if( ! operation->key_set )
return( PSA_ERROR_BAD_STATE );
- if ( operation->iv_required && ! operation->iv_set )
+ if( operation->iv_required && ! operation->iv_set )
return( PSA_ERROR_BAD_STATE );
- if ( operation->ctx.cipher.operation == MBEDTLS_ENCRYPT )
+ if( operation->ctx.cipher.operation == MBEDTLS_ENCRYPT )
{
if( operation->ctx.cipher.unprocessed_len > operation->block_size )
return( PSA_ERROR_INVALID_ARGUMENT );
@@ -1632,7 +1632,7 @@
if( slot->type != PSA_KEY_TYPE_NONE )
return( PSA_ERROR_OCCUPIED_SLOT );
- if ( lifetime != PSA_KEY_LIFETIME_VOLATILE )
+ if( lifetime != PSA_KEY_LIFETIME_VOLATILE )
return( PSA_ERROR_NOT_SUPPORTED );
slot->lifetime = lifetime;