Skip to content

Commit f410a5c

Browse files
committed
Fix indentation of documentation
1 parent e1a8187 commit f410a5c

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

library/cipher.c

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -317,17 +317,17 @@ int mbedtls_cipher_setkey( mbedtls_cipher_context_t *ctx,
317317
cipher_psa->slot_state = MBEDTLS_CIPHER_PSA_KEY_OWNED;
318318

319319
/* From that point on, the responsibility for destroying the
320-
* key slot is on mbedtls_cipher_free(). This includes the case
321-
* where the policy setup or key import below fail, as
322-
* mbedtls_cipher_free() needs to be called in any case. */
320+
* key slot is on mbedtls_cipher_free(). This includes the case
321+
* where the policy setup or key import below fail, as
322+
* mbedtls_cipher_free() needs to be called in any case. */
323323

324324
/* Setup policy for the new key slot. */
325325
psa_key_policy_init( &key_policy );
326326

327327
/* Mbed TLS' cipher layer doesn't enforce the mode of operation
328-
* (encrypt vs. decrypt): it is possible to setup a key for encryption
329-
* and use it for AEAD decryption. Until tests relying on this
330-
* are changed, allow any usage in PSA. */
328+
* (encrypt vs. decrypt): it is possible to setup a key for encryption
329+
* and use it for AEAD decryption. Until tests relying on this
330+
* are changed, allow any usage in PSA. */
331331
/* key_usage = mbedtls_psa_translate_cipher_operation( operation ); */
332332
key_usage = PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT;
333333
psa_key_policy_set_usage( &key_policy, key_usage, cipher_psa->alg );

0 commit comments

Comments
 (0)