Fix formatting in bignum test functions
Signed-off-by: Werner Lewis <werner.lewis@arm.com>
diff --git a/tests/suites/test_suite_rsa.function b/tests/suites/test_suite_rsa.function
index ed657dc..4be2358 100644
--- a/tests/suites/test_suite_rsa.function
+++ b/tests/suites/test_suite_rsa.function
@@ -74,8 +74,7 @@
/* BEGIN_CASE */
void mbedtls_rsa_pkcs1_sign( data_t * message_str, int padding_mode,
int digest, int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
+ char * input_Q, char * input_N, char * input_E,
data_t * result_str, int result )
{
unsigned char output[256];
@@ -153,8 +152,8 @@
void rsa_pkcs1_sign_raw( data_t * hash_result,
int padding_mode, int mod,
char * input_P, char * input_Q,
- char * input_N,
- char * input_E, data_t * result_str )
+ char * input_N, char * input_E,
+ data_t * result_str )
{
unsigned char output[256];
mbedtls_rsa_context ctx;
@@ -234,8 +233,7 @@
/* BEGIN_CASE */
void mbedtls_rsa_pkcs1_encrypt( data_t * message_str, int padding_mode,
- int mod, char * input_N,
- char * input_E,
+ int mod, char * input_N, char * input_E,
data_t * result_str, int result )
{
unsigned char output[256];
@@ -280,8 +278,7 @@
/* BEGIN_CASE */
void rsa_pkcs1_encrypt_bad_rng( data_t * message_str, int padding_mode,
- int mod, char * input_N,
- char * input_E,
+ int mod, char * input_N, char * input_E,
data_t * result_str, int result )
{
unsigned char output[256];
@@ -323,10 +320,9 @@
/* BEGIN_CASE */
void mbedtls_rsa_pkcs1_decrypt( data_t * message_str, int padding_mode,
int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
- int max_output, data_t * result_str,
- int result )
+ char * input_Q, char * input_N,
+ char * input_E, int max_output,
+ data_t * result_str, int result )
{
unsigned char output[32];
mbedtls_rsa_context ctx;
@@ -435,9 +431,8 @@
/* BEGIN_CASE */
void mbedtls_rsa_private( data_t * message_str, int mod,
char * input_P, char * input_Q,
- char * input_N,
- char * input_E, data_t * result_str,
- int result )
+ char * input_N, char * input_E,
+ data_t * result_str, int result )
{
unsigned char output[256];
mbedtls_rsa_context ctx, ctx2; /* Also test mbedtls_rsa_copy() while at it */
@@ -519,8 +514,7 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_rsa_check_pubkey( char * input_N,
- char * input_E, int result )
+void mbedtls_rsa_check_pubkey( char * input_N, char * input_E, int result )
{
mbedtls_rsa_context ctx;
mbedtls_mpi N, E;
@@ -547,13 +541,10 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_rsa_check_privkey( int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
- char * input_D,
- char * input_DP,
- char * input_DQ,
- char * input_QP, int result )
+void mbedtls_rsa_check_privkey( int mod, char * input_P, char * input_Q,
+ char * input_N, char * input_E, char * input_D,
+ char * input_DP, char * input_DQ, char * input_QP,
+ int result )
{
mbedtls_rsa_context ctx;
@@ -607,14 +598,10 @@
/* END_CASE */
/* BEGIN_CASE */
-void rsa_check_pubpriv( int mod, char * input_Npub,
- char * input_Epub,
- char * input_P, char * input_Q,
- char * input_N,
- char * input_E, char * input_D,
- char * input_DP,
- char * input_DQ, char * input_QP,
- int result )
+void rsa_check_pubpriv( int mod, char * input_Npub, char * input_Epub,
+ char * input_P, char * input_Q, char * input_N,
+ char * input_E, char * input_D, char * input_DP,
+ char * input_DQ, char * input_QP, int result )
{
mbedtls_rsa_context pub, prv;