Index: net/quic/test_tools/crypto_test_utils_openssl.cc |
diff --git a/net/quic/test_tools/crypto_test_utils_openssl.cc b/net/quic/test_tools/crypto_test_utils_openssl.cc |
index bb08a044aa45f082d986c18172b508282a5b2727..4d206945e1b35cb8e7fc03831f3d5cf7e903d464 100644 |
--- a/net/quic/test_tools/crypto_test_utils_openssl.cc |
+++ b/net/quic/test_tools/crypto_test_utils_openssl.cc |
@@ -24,7 +24,7 @@ void EvpMdCtxCleanUp(EVP_MD_CTX* ctx) { |
(void)EVP_MD_CTX_cleanup(ctx); |
} |
-} // namespace anonymous |
+} // namespace anonymous |
namespace net { |
@@ -32,7 +32,7 @@ namespace test { |
class TestChannelIDSigner : public ChannelIDSigner { |
public: |
- virtual ~TestChannelIDSigner() { } |
+ virtual ~TestChannelIDSigner() {} |
// ChannelIDSigner implementation. |
@@ -50,17 +50,18 @@ class TestChannelIDSigner : public ChannelIDSigner { |
EVP_MD_CTX md_ctx; |
EVP_MD_CTX_init(&md_ctx); |
- crypto::ScopedOpenSSL<EVP_MD_CTX, EvpMdCtxCleanUp> |
- md_ctx_cleanup(&md_ctx); |
+ crypto::ScopedOpenSSL<EVP_MD_CTX, EvpMdCtxCleanUp> md_ctx_cleanup(&md_ctx); |
- if (EVP_DigestSignInit(&md_ctx, NULL, EVP_sha256(), NULL, |
- ecdsa_key.get()) != 1) { |
+ if (EVP_DigestSignInit( |
+ &md_ctx, NULL, EVP_sha256(), NULL, ecdsa_key.get()) != 1) { |
return false; |
} |
- EVP_DigestUpdate(&md_ctx, ChannelIDVerifier::kContextStr, |
+ EVP_DigestUpdate(&md_ctx, |
+ ChannelIDVerifier::kContextStr, |
strlen(ChannelIDVerifier::kContextStr) + 1); |
- EVP_DigestUpdate(&md_ctx, ChannelIDVerifier::kClientToServerStr, |
+ EVP_DigestUpdate(&md_ctx, |
+ ChannelIDVerifier::kClientToServerStr, |
strlen(ChannelIDVerifier::kClientToServerStr) + 1); |
EVP_DigestUpdate(&md_ctx, signed_data.data(), signed_data.size()); |
@@ -88,8 +89,8 @@ class TestChannelIDSigner : public ChannelIDSigner { |
BN_bn2bin(sig.get()->r, signature.get() + 32 - BN_num_bytes(sig.get()->r)); |
BN_bn2bin(sig.get()->s, signature.get() + 64 - BN_num_bytes(sig.get()->s)); |
- *out_signature = string(reinterpret_cast<char*>(signature.get()), |
- kSignatureLength); |
+ *out_signature = |
+ string(reinterpret_cast<char*>(signature.get()), kSignatureLength); |
return true; |
} |