mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 05:43:48 -07:00
changing {} style to match majority of previous style
This commit is contained in:
parent
da6cdf014b
commit
961d929f4d
320 changed files with 5502 additions and 10485 deletions
|
@ -66,8 +66,7 @@
|
|||
#include <wincrypt.h>
|
||||
|
||||
int mbedtls_platform_entropy_poll(void *data, unsigned char *output, size_t len,
|
||||
size_t *olen)
|
||||
{
|
||||
size_t *olen) {
|
||||
HCRYPTPROV provider;
|
||||
((void) data);
|
||||
*olen = 0;
|
||||
|
@ -100,8 +99,7 @@ int mbedtls_platform_entropy_poll(void *data, unsigned char *output, size_t len,
|
|||
#if defined(SYS_getrandom)
|
||||
#define HAVE_GETRANDOM
|
||||
|
||||
static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags)
|
||||
{
|
||||
static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) {
|
||||
/* MemSan cannot understand that the syscall writes to the buffer */
|
||||
#if defined(__has_feature)
|
||||
#if __has_feature(memory_sanitizer)
|
||||
|
@ -114,8 +112,7 @@ static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags)
|
|||
|
||||
#include <sys/utsname.h>
|
||||
/* Check if version is at least 3.17.0 */
|
||||
static int check_version_3_17_plus(void)
|
||||
{
|
||||
static int check_version_3_17_plus(void) {
|
||||
int minor;
|
||||
struct utsname un;
|
||||
const char *ver;
|
||||
|
@ -155,8 +152,7 @@ static int has_getrandom = -1;
|
|||
#include <stdio.h>
|
||||
|
||||
int mbedtls_platform_entropy_poll(void *data,
|
||||
unsigned char *output, size_t len, size_t *olen)
|
||||
{
|
||||
unsigned char *output, size_t len, size_t *olen) {
|
||||
FILE *file;
|
||||
size_t read_len;
|
||||
((void) data);
|
||||
|
@ -198,8 +194,7 @@ int mbedtls_platform_entropy_poll(void *data,
|
|||
|
||||
#if defined(MBEDTLS_TEST_NULL_ENTROPY)
|
||||
int mbedtls_null_entropy_poll(void *data,
|
||||
unsigned char *output, size_t len, size_t *olen)
|
||||
{
|
||||
unsigned char *output, size_t len, size_t *olen) {
|
||||
((void) data);
|
||||
((void) output);
|
||||
*olen = 0;
|
||||
|
@ -215,8 +210,7 @@ int mbedtls_null_entropy_poll(void *data,
|
|||
|
||||
#if defined(MBEDTLS_TIMING_C)
|
||||
int mbedtls_hardclock_poll(void *data,
|
||||
unsigned char *output, size_t len, size_t *olen)
|
||||
{
|
||||
unsigned char *output, size_t len, size_t *olen) {
|
||||
unsigned long timer = mbedtls_timing_hardclock();
|
||||
((void) data);
|
||||
*olen = 0;
|
||||
|
@ -233,8 +227,7 @@ int mbedtls_hardclock_poll(void *data,
|
|||
|
||||
#if defined(MBEDTLS_HAVEGE_C)
|
||||
int mbedtls_havege_poll(void *data,
|
||||
unsigned char *output, size_t len, size_t *olen)
|
||||
{
|
||||
unsigned char *output, size_t len, size_t *olen) {
|
||||
mbedtls_havege_state *hs = (mbedtls_havege_state *) data;
|
||||
*olen = 0;
|
||||
|
||||
|
@ -249,8 +242,7 @@ int mbedtls_havege_poll(void *data,
|
|||
|
||||
#if defined(MBEDTLS_ENTROPY_NV_SEED)
|
||||
int mbedtls_nv_seed_poll(void *data,
|
||||
unsigned char *output, size_t len, size_t *olen)
|
||||
{
|
||||
unsigned char *output, size_t len, size_t *olen) {
|
||||
unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
|
||||
size_t use_len = MBEDTLS_ENTROPY_BLOCK_SIZE;
|
||||
((void) data);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue