diff options
author | Idan Horowitz <idan.horowitz@gmail.com> | 2022-04-01 20:58:27 +0300 |
---|---|---|
committer | Linus Groh <mail@linusgroh.de> | 2022-04-01 21:24:45 +0100 |
commit | 086969277e74d8ba065bf8145d3aeb0dec0bfee5 (patch) | |
tree | 02b3699a66735ef806d9b46353491f18f8e4e7b4 /Userland/Libraries/LibCrypto/Cipher/AES.cpp | |
parent | 0376c127f6e98e03607700d0b3f5154b7014b2f8 (diff) | |
download | serenity-086969277e74d8ba065bf8145d3aeb0dec0bfee5.zip |
Everywhere: Run clang-format
Diffstat (limited to 'Userland/Libraries/LibCrypto/Cipher/AES.cpp')
-rw-r--r-- | Userland/Libraries/LibCrypto/Cipher/AES.cpp | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/Userland/Libraries/LibCrypto/Cipher/AES.cpp b/Userland/Libraries/LibCrypto/Cipher/AES.cpp index 989134d456..b853599f88 100644 --- a/Userland/Libraries/LibCrypto/Cipher/AES.cpp +++ b/Userland/Libraries/LibCrypto/Cipher/AES.cpp @@ -197,13 +197,13 @@ void AESCipherKey::expand_decrypt_key(ReadonlyBytes user_key, size_t bits) } } -void AESCipher::encrypt_block(const AESCipherBlock& in, AESCipherBlock& out) +void AESCipher::encrypt_block(AESCipherBlock const& in, AESCipherBlock& out) { u32 s0, s1, s2, s3, t0, t1, t2, t3; size_t r { 0 }; - const auto& dec_key = key(); - const auto* round_keys = dec_key.round_keys(); + auto const& dec_key = key(); + auto const* round_keys = dec_key.round_keys(); s0 = get_key(in.bytes().offset_pointer(0)) ^ round_keys[0]; s1 = get_key(in.bytes().offset_pointer(4)) ^ round_keys[1]; @@ -289,13 +289,13 @@ void AESCipher::encrypt_block(const AESCipherBlock& in, AESCipherBlock& out) // clang-format on } -void AESCipher::decrypt_block(const AESCipherBlock& in, AESCipherBlock& out) +void AESCipher::decrypt_block(AESCipherBlock const& in, AESCipherBlock& out) { u32 s0, s1, s2, s3, t0, t1, t2, t3; size_t r { 0 }; - const auto& dec_key = key(); - const auto* round_keys = dec_key.round_keys(); + auto const& dec_key = key(); + auto const* round_keys = dec_key.round_keys(); s0 = get_key(in.bytes().offset_pointer(0)) ^ round_keys[0]; s1 = get_key(in.bytes().offset_pointer(4)) ^ round_keys[1]; |