aboutsummaryrefslogtreecommitdiff
path: root/src/lib/crypto/krb/enc_dk_cmac.c
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2011-09-04 22:13:30 +0000
committerGreg Hudson <ghudson@mit.edu>2011-09-04 22:13:30 +0000
commit52739723d8f3f11eb1fd04d03a0c82b34fb1bc79 (patch)
tree14b5ec4a305fbb4d47ffd293b9dab46ee55101b7 /src/lib/crypto/krb/enc_dk_cmac.c
parentaec99a684778ede490dde3a8d5a837400896f82b (diff)
downloadkrb5-52739723d8f3f11eb1fd04d03a0c82b34fb1bc79.zip
krb5-52739723d8f3f11eb1fd04d03a0c82b34fb1bc79.tar.gz
krb5-52739723d8f3f11eb1fd04d03a0c82b34fb1bc79.tar.bz2
Untabify some files mistakenly created with tabs
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25140 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto/krb/enc_dk_cmac.c')
-rw-r--r--src/lib/crypto/krb/enc_dk_cmac.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/crypto/krb/enc_dk_cmac.c b/src/lib/crypto/krb/enc_dk_cmac.c
index 2ec80bd..6593d17 100644
--- a/src/lib/crypto/krb/enc_dk_cmac.c
+++ b/src/lib/crypto/krb/enc_dk_cmac.c
@@ -35,7 +35,7 @@
unsigned int
krb5int_camellia_crypto_length(const struct krb5_keytypes *ktp,
- krb5_cryptotype type)
+ krb5_cryptotype type)
{
switch (type) {
case KRB5_CRYPTO_TYPE_HEADER:
@@ -54,7 +54,7 @@ krb5int_camellia_crypto_length(const struct krb5_keytypes *ktp,
/* Derive encryption and integrity keys for CMAC-using enctypes. */
static krb5_error_code
derive_keys(const struct krb5_enc_provider *enc, krb5_key key,
- krb5_keyusage usage, krb5_key *ke_out, krb5_key *ki_out)
+ krb5_keyusage usage, krb5_key *ke_out, krb5_key *ki_out)
{
krb5_error_code ret;
unsigned char buf[K5CLENGTH];
@@ -68,14 +68,14 @@ derive_keys(const struct krb5_enc_provider *enc, krb5_key key,
buf[4] = 0xAA;
ret = krb5int_derive_key(enc, key, &ke, &constant, DERIVE_SP800_108_CMAC);
if (ret != 0)
- return ret;
+ return ret;
/* Derive the integrity key. */
buf[4] = 0x55;
ret = krb5int_derive_key(enc, key, &ki, &constant, DERIVE_SP800_108_CMAC);
if (ret != 0) {
- krb5_k_free_key(NULL, ke);
- return ret;
+ krb5_k_free_key(NULL, ke);
+ return ret;
}
*ke_out = ke;
@@ -85,8 +85,8 @@ derive_keys(const struct krb5_enc_provider *enc, krb5_key key,
krb5_error_code
krb5int_dk_cmac_encrypt(const struct krb5_keytypes *ktp, krb5_key key,
- krb5_keyusage usage, const krb5_data *ivec,
- krb5_crypto_iov *data, size_t num_data)
+ krb5_keyusage usage, const krb5_data *ivec,
+ krb5_crypto_iov *data, size_t num_data)
{
const struct krb5_enc_provider *enc = ktp->enc;
krb5_error_code ret;
@@ -105,7 +105,7 @@ krb5int_dk_cmac_encrypt(const struct krb5_keytypes *ktp, krb5_key key,
return KRB5_BAD_MSIZE;
padding = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_PADDING);
if (padding != NULL)
- padding->data.length = 0;
+ padding->data.length = 0;
/* Derive the encryption and integrity keys. */
ret = derive_keys(enc, key, usage, &ke, &ki);