derive_output() test: fix code style
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function
index 6562d10..accd4b3 100644
--- a/tests/suites/test_suite_psa_crypto.function
+++ b/tests/suites/test_suite_psa_crypto.function
@@ -6956,7 +6956,7 @@
case 0:
break;
case PSA_KEY_DERIVATION_INPUT_SECRET:
- switch ( key_input_type )
+ switch( key_input_type )
{
case 0: // input bytes
PSA_ASSERT( psa_key_derivation_input_bytes(
@@ -6972,15 +6972,16 @@
inputs[i]->x, inputs[i]->len,
&keys[i] ) );
- if ( PSA_ALG_IS_TLS12_PSK_TO_MS( alg ) )
+ if( PSA_ALG_IS_TLS12_PSK_TO_MS( alg ) )
{
PSA_ASSERT( psa_get_key_attributes( keys[i], &attributes1 ) );
TEST_ASSERT( PSA_BITS_TO_BYTES( psa_get_key_bits( &attributes1 ) ) <=
PSA_TLS12_PSK_TO_MS_PSK_MAX_SIZE );
}
- PSA_ASSERT( psa_key_derivation_input_key(
- &operation, steps[i], keys[i] ) );
+ PSA_ASSERT( psa_key_derivation_input_key( &operation,
+ steps[i],
+ keys[i] ) );
break;
default:
TEST_ASSERT( ! "default case not supported" );
@@ -6988,12 +6989,14 @@
}
break;
case PSA_KEY_DERIVATION_INPUT_OTHER_SECRET:
- switch ( other_key_input_type )
+ switch( other_key_input_type )
{
case 0: // input bytes
- TEST_EQUAL( psa_key_derivation_input_bytes(
- &operation, steps[i],
- inputs[i]->x, inputs[i]->len ), statuses[i] );
+ TEST_EQUAL( psa_key_derivation_input_bytes( &operation,
+ steps[i],
+ inputs[i]->x,
+ inputs[i]->len ),
+ statuses[i] );
break;
case 1: // input key
psa_set_key_usage_flags( &attributes2, PSA_KEY_USAGE_DERIVE );
@@ -7001,15 +7004,17 @@
psa_set_key_type( &attributes2, PSA_KEY_TYPE_DERIVE );
// other secret of type RAW_DATA passed with input_key
- if ( statuses[i] == PSA_ERROR_INVALID_ARGUMENT )
+ if( statuses[i] == PSA_ERROR_INVALID_ARGUMENT )
psa_set_key_type( &attributes2, PSA_KEY_TYPE_RAW_DATA );
PSA_ASSERT( psa_import_key( &attributes2,
- inputs[i]->x, inputs[i]->len,
- &keys[i] ) );
+ inputs[i]->x, inputs[i]->len,
+ &keys[i] ) );
- TEST_EQUAL( psa_key_derivation_input_key(
- &operation, steps[i], keys[i] ), statuses[i] );
+ TEST_EQUAL( psa_key_derivation_input_key( &operation,
+ steps[i],
+ keys[i] ),
+ statuses[i] );
break;
case 2: // key agreement
psa_set_key_usage_flags( &attributes3, PSA_KEY_USAGE_DERIVE );
@@ -7017,8 +7022,8 @@
psa_set_key_type( &attributes3, PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1) );
PSA_ASSERT( psa_import_key( &attributes3,
- inputs[i]->x, inputs[i]->len,
- &keys[i] ) );
+ inputs[i]->x, inputs[i]->len,
+ &keys[i] ) );
TEST_EQUAL( psa_key_derivation_key_agreement(
&operation,
@@ -7035,8 +7040,8 @@
size_t key_agreement_output_length;
PSA_ASSERT( psa_import_key( &attributes3,
- inputs[i]->x, inputs[i]->len,
- &keys[i] ) );
+ inputs[i]->x, inputs[i]->len,
+ &keys[i] ) );
PSA_ASSERT( psa_raw_key_agreement(
PSA_ALG_ECDH,
@@ -7055,7 +7060,7 @@
break;
}
- if ( statuses[i] != PSA_SUCCESS )
+ if( statuses[i] != PSA_SUCCESS )
goto exit;
break;
default: