Fix formatting in bignum test functions
Signed-off-by: Werner Lewis <werner.lewis@arm.com>
diff --git a/tests/suites/test_suite_mpi.function b/tests/suites/test_suite_mpi.function
index 87c1b7a..fba19c7 100644
--- a/tests/suites/test_suite_mpi.function
+++ b/tests/suites/test_suite_mpi.function
@@ -432,9 +432,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_write_binary( char * input_X,
- data_t * input_A, int output_size,
- int result )
+void mbedtls_mpi_write_binary( char * input_X, data_t * input_A,
+ int output_size, int result )
{
mbedtls_mpi X;
unsigned char buf[1000];
@@ -464,9 +463,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_write_binary_le( char * input_X,
- data_t * input_A, int output_size,
- int result )
+void mbedtls_mpi_write_binary_le( char * input_X, data_t * input_A,
+ int output_size, int result )
{
mbedtls_mpi X;
unsigned char buf[1000];
@@ -496,8 +494,7 @@
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_FS_IO */
-void mbedtls_mpi_read_file( char * input_file,
- data_t * input_A, int result )
+void mbedtls_mpi_read_file( char * input_file, data_t * input_A, int result )
{
mbedtls_mpi X;
unsigned char buf[1000];
@@ -532,8 +529,7 @@
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_FS_IO */
-void mbedtls_mpi_write_file( char * input_X,
- char * output_file )
+void mbedtls_mpi_write_file( char * input_X, char * output_file )
{
mbedtls_mpi X, Y;
FILE *file_out, *file_in;
@@ -626,8 +622,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_gcd( char * input_X,
- char * input_Y, char * input_A )
+void mbedtls_mpi_gcd( char * input_X, char * input_Y,
+ char * input_A )
{
mbedtls_mpi A, X, Y, Z;
mbedtls_mpi_init( &A ); mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z );
@@ -659,8 +655,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_cmp_mpi( char * input_X,
- char * input_Y, int input_A )
+void mbedtls_mpi_cmp_mpi( char * input_X, char * input_Y,
+ int input_A )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
@@ -700,8 +696,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_cmp_abs( char * input_X,
- char * input_Y, int input_A )
+void mbedtls_mpi_cmp_abs( char * input_X, char * input_Y,
+ int input_A )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
@@ -860,8 +856,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_add_mpi( char * input_X,
- char * input_Y, char * input_A )
+void mbedtls_mpi_add_mpi( char * input_X, char * input_Y,
+ char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
@@ -890,8 +886,7 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_add_mpi_inplace( char * input_X,
- char * input_A )
+void mbedtls_mpi_add_mpi_inplace( char * input_X, char * input_A )
{
mbedtls_mpi X, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &A );
@@ -920,8 +915,8 @@
/* BEGIN_CASE */
-void mbedtls_mpi_add_abs( char * input_X,
- char * input_Y, char * input_A )
+void mbedtls_mpi_add_abs( char * input_X, char * input_Y,
+ char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
@@ -968,8 +963,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_sub_mpi( char * input_X,
- char * input_Y, char * input_A )
+void mbedtls_mpi_sub_mpi( char * input_X, char * input_Y,
+ char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
@@ -998,9 +993,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_sub_abs( char * input_X,
- char * input_Y, char * input_A,
- int sub_result )
+void mbedtls_mpi_sub_abs( char * input_X, char * input_Y,
+ char * input_A, int sub_result )
{
mbedtls_mpi X, Y, Z, A;
int res;
@@ -1053,8 +1047,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_mul_mpi( char * input_X,
- char * input_Y, char * input_A )
+void mbedtls_mpi_mul_mpi( char * input_X, char * input_Y,
+ char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
@@ -1073,8 +1067,7 @@
/* BEGIN_CASE */
void mbedtls_mpi_mul_int( char * input_X, int input_Y,
- char * input_A,
- char * result_comparison )
+ char * input_A, char * result_comparison )
{
mbedtls_mpi X, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
@@ -1096,9 +1089,9 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_div_mpi( char * input_X,
- char * input_Y, char * input_A,
- char * input_B, int div_result )
+void mbedtls_mpi_div_mpi( char * input_X, char * input_Y,
+ char * input_A, char * input_B,
+ int div_result )
{
mbedtls_mpi X, Y, Q, R, A, B;
int res;
@@ -1127,8 +1120,8 @@
/* BEGIN_CASE */
void mbedtls_mpi_div_int( char * input_X, int input_Y,
- char * input_A,
- char * input_B, int div_result )
+ char * input_A, char * input_B,
+ int div_result )
{
mbedtls_mpi X, Q, R, A, B;
int res;
@@ -1155,9 +1148,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_mod_mpi( char * input_X,
- char * input_Y, char * input_A,
- int div_result )
+void mbedtls_mpi_mod_mpi( char * input_X, char * input_Y,
+ char * input_A, int div_result )
{
mbedtls_mpi X, Y, A;
int res;
@@ -1202,9 +1194,9 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_exp_mod( char * input_A,
- char * input_E, char * input_N,
- char * input_X, int exp_result )
+void mbedtls_mpi_exp_mod( char * input_A, char * input_E,
+ char * input_N, char * input_X,
+ int exp_result )
{
mbedtls_mpi A, E, N, RR, Z, X;
int res;
@@ -1283,9 +1275,8 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_mpi_inv_mod( char * input_X,
- char * input_Y, char * input_A,
- int div_result )
+void mbedtls_mpi_inv_mod( char * input_X, char * input_Y,
+ char * input_A, int div_result )
{
mbedtls_mpi X, Y, Z, A;
int res;
diff --git a/tests/suites/test_suite_pk.function b/tests/suites/test_suite_pk.function
index 16adba2..9cb90aa 100644
--- a/tests/suites/test_suite_pk.function
+++ b/tests/suites/test_suite_pk.function
@@ -645,9 +645,8 @@
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
void pk_rsa_verify_test_vec( data_t * message_str, int digest, int mod,
- char * input_N,
- char * input_E, data_t * result_str,
- int result )
+ char * input_N, char * input_E,
+ data_t * result_str, int result )
{
unsigned char hash_result[MBEDTLS_MD_MAX_SIZE];
mbedtls_rsa_context *rsa;
@@ -694,9 +693,9 @@
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
void pk_rsa_verify_ext_test_vec( data_t * message_str, int digest,
int mod, char * input_N,
- char * input_E,
- data_t * result_str, int pk_type,
- int mgf1_hash_id, int salt_len, int result )
+ char * input_E, data_t * result_str,
+ int pk_type, int mgf1_hash_id,
+ int salt_len, int result )
{
unsigned char hash_result[MBEDTLS_MD_MAX_SIZE];
mbedtls_rsa_context *rsa;
@@ -1007,8 +1006,8 @@
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
void pk_rsa_decrypt_test_vec( data_t * cipher, int mod,
char * input_P, char * input_Q,
- char * input_N,
- char * input_E, data_t * clear, int ret )
+ char * input_N, char * input_E,
+ data_t * clear, int ret )
{
unsigned char output[256];
mbedtls_test_rnd_pseudo_info rnd_info;
diff --git a/tests/suites/test_suite_pkcs1_v15.function b/tests/suites/test_suite_pkcs1_v15.function
index 132237e..9fc4faa 100644
--- a/tests/suites/test_suite_pkcs1_v15.function
+++ b/tests/suites/test_suite_pkcs1_v15.function
@@ -55,12 +55,10 @@
/* END_CASE */
/* BEGIN_CASE */
-void pkcs1_rsaes_v15_decrypt( int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
- int hash, data_t * result_str,
- char * seed, data_t * message_str,
- int result )
+void pkcs1_rsaes_v15_decrypt( int mod, char * input_P, char * input_Q,
+ char * input_N, char * input_E, int hash,
+ data_t * result_str, char * seed,
+ data_t * message_str, int result )
{
unsigned char output[128];
mbedtls_rsa_context ctx;
@@ -321,10 +319,9 @@
/* END_CASE */
/* BEGIN_CASE */
-void pkcs1_rsassa_v15_verify( int mod, char * input_N,
- char * input_E, int digest,
- int hash, data_t * message_str, char * salt,
- data_t * result_str, int result )
+void pkcs1_rsassa_v15_verify( int mod, char * input_N, char * input_E,
+ int digest, int hash, data_t * message_str,
+ char * salt, data_t * result_str, int result )
{
unsigned char hash_result[MBEDTLS_MD_MAX_SIZE];
mbedtls_rsa_context ctx;
diff --git a/tests/suites/test_suite_rsa.function b/tests/suites/test_suite_rsa.function
index 505d094..3c0e35f 100644
--- a/tests/suites/test_suite_rsa.function
+++ b/tests/suites/test_suite_rsa.function
@@ -514,8 +514,7 @@
/* BEGIN_CASE */
void mbedtls_rsa_pkcs1_sign( data_t * message_str, int padding_mode,
int digest, int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
+ char * input_Q, char * input_N, char * input_E,
data_t * result_str, int result )
{
unsigned char hash_result[MBEDTLS_MD_MAX_SIZE];
@@ -601,8 +600,8 @@
void rsa_pkcs1_sign_raw( data_t * hash_result,
int padding_mode, int mod,
char * input_P, char * input_Q,
- char * input_N,
- char * input_E, data_t * result_str )
+ char * input_N, char * input_E,
+ data_t * result_str )
{
unsigned char output[256];
mbedtls_rsa_context ctx;
@@ -735,8 +734,7 @@
/* BEGIN_CASE */
void mbedtls_rsa_pkcs1_encrypt( data_t * message_str, int padding_mode,
- int mod, char * input_N,
- char * input_E,
+ int mod, char * input_N, char * input_E,
data_t * result_str, int result )
{
unsigned char output[256];
@@ -779,8 +777,7 @@
/* BEGIN_CASE */
void rsa_pkcs1_encrypt_bad_rng( data_t * message_str, int padding_mode,
- int mod, char * input_N,
- char * input_E,
+ int mod, char * input_N, char * input_E,
data_t * result_str, int result )
{
unsigned char output[256];
@@ -820,10 +817,9 @@
/* BEGIN_CASE */
void mbedtls_rsa_pkcs1_decrypt( data_t * message_str, int padding_mode,
int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
- int max_output, data_t * result_str,
- int result )
+ char * input_Q, char * input_N,
+ char * input_E, int max_output,
+ data_t * result_str, int result )
{
unsigned char output[32];
mbedtls_rsa_context ctx;
@@ -930,9 +926,8 @@
/* BEGIN_CASE */
void mbedtls_rsa_private( data_t * message_str, int mod,
char * input_P, char * input_Q,
- char * input_N,
- char * input_E, data_t * result_str,
- int result )
+ char * input_N, char * input_E,
+ data_t * result_str, int result )
{
unsigned char output[256];
mbedtls_rsa_context ctx, ctx2; /* Also test mbedtls_rsa_copy() while at it */
@@ -1014,8 +1009,7 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_rsa_check_pubkey( char * input_N,
- char * input_E, int result )
+void mbedtls_rsa_check_pubkey( char * input_N, char * input_E, int result )
{
mbedtls_rsa_context ctx;
mbedtls_mpi N, E;
@@ -1042,13 +1036,10 @@
/* END_CASE */
/* BEGIN_CASE */
-void mbedtls_rsa_check_privkey( int mod, char * input_P,
- char * input_Q,
- char * input_N, char * input_E,
- char * input_D,
- char * input_DP,
- char * input_DQ,
- char * input_QP, int result )
+void mbedtls_rsa_check_privkey( int mod, char * input_P, char * input_Q,
+ char * input_N, char * input_E, char * input_D,
+ char * input_DP, char * input_DQ, char * input_QP,
+ int result )
{
mbedtls_rsa_context ctx;
@@ -1102,14 +1093,10 @@
/* END_CASE */
/* BEGIN_CASE */
-void rsa_check_pubpriv( int mod, char * input_Npub,
- char * input_Epub,
- char * input_P, char * input_Q,
- char * input_N,
- char * input_E, char * input_D,
- char * input_DP,
- char * input_DQ, char * input_QP,
- int result )
+void rsa_check_pubpriv( int mod, char * input_Npub, char * input_Epub,
+ char * input_P, char * input_Q, char * input_N,
+ char * input_E, char * input_D, char * input_DP,
+ char * input_DQ, char * input_QP, int result )
{
mbedtls_rsa_context pub, prv;