@@ -239,7 +239,8 @@ int wc_CmacUpdate(Cmac* cmac, const byte* in, word32 inSz)
239239 if (cmac -> totalSz != 0 ) {
240240 xorbuf (cmac -> buffer , cmac -> digest , AES_BLOCK_SIZE );
241241 }
242- ret = wc_AesEncryptDirect (& cmac -> aes , cmac -> digest , cmac -> buffer );
242+ ret = wc_AesEncryptDirect (& cmac -> aes , cmac -> digest ,
243+ cmac -> buffer );
243244 if (ret == 0 ) {
244245 cmac -> totalSz += AES_BLOCK_SIZE ;
245246 cmac -> bufferSz = 0 ;
@@ -294,7 +295,8 @@ int wc_CmacFinalNoFree(Cmac* cmac, byte* out, word32* outSz)
294295 if (cmac -> devId != INVALID_DEVID )
295296 #endif
296297 {
297- ret = wc_CryptoCb_Cmac (cmac , NULL , 0 , NULL , 0 , out , outSz , cmac -> type , NULL );
298+ ret = wc_CryptoCb_Cmac (cmac , NULL , 0 , NULL , 0 , out , outSz , cmac -> type ,
299+ NULL );
298300 if (ret != WC_NO_ERR_TRACE (CRYPTOCB_UNAVAILABLE ))
299301 return ret ;
300302 /* Clear CRYPTOCB_UNAVAILABLE return code */
@@ -324,7 +326,8 @@ int wc_CmacFinalNoFree(Cmac* cmac, byte* out, word32* outSz)
324326 remainder = AES_BLOCK_SIZE ;
325327 }
326328 if (remainder > 1 ) {
327- XMEMSET (cmac -> buffer + AES_BLOCK_SIZE - remainder , 0 , remainder );
329+ XMEMSET (cmac -> buffer + AES_BLOCK_SIZE - remainder , 0 ,
330+ remainder );
328331 }
329332
330333 cmac -> buffer [AES_BLOCK_SIZE - remainder ] = 0x80 ;
@@ -472,7 +475,8 @@ int wc_AesCmacVerify_ex(Cmac* cmac,
472475 word32 aSz = sizeof (a );
473476 int compareRet ;
474477
475- if (cmac == NULL || check == NULL || checkSz == 0 || (in == NULL && inSz != 0 )) {
478+ if (cmac == NULL || check == NULL || checkSz == 0 ||
479+ (in == NULL && inSz != 0 )) {
476480 return BAD_FUNC_ARG ;
477481 }
478482
0 commit comments