Index: net/quic/crypto/chacha20_poly1305_decrypter_nss.cc |
diff --git a/net/quic/crypto/chacha20_poly1305_decrypter_nss.cc b/net/quic/crypto/chacha20_poly1305_decrypter_nss.cc |
index e8100af49f667a065f75434a82cc8fd9c2fab89e..5a8514938d62fa6119aa4252aecd302ee0cd8ec4 100644 |
--- a/net/quic/crypto/chacha20_poly1305_decrypter_nss.cc |
+++ b/net/quic/crypto/chacha20_poly1305_decrypter_nss.cc |
@@ -24,12 +24,16 @@ const size_t kNoncePrefixSize = 0; |
// System NSS doesn't support ChaCha20+Poly1305 yet. |
ChaCha20Poly1305Decrypter::ChaCha20Poly1305Decrypter() |
- : AeadBaseDecrypter(CKM_INVALID_MECHANISM, NULL, kKeySize, |
- kAuthTagSize, kNoncePrefixSize) { |
+ : AeadBaseDecrypter(CKM_INVALID_MECHANISM, |
+ NULL, |
+ kKeySize, |
+ kAuthTagSize, |
+ kNoncePrefixSize) { |
NOTIMPLEMENTED(); |
} |
-ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() {} |
+ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() { |
+} |
// static |
bool ChaCha20Poly1305Decrypter::IsSupported() { |
@@ -46,14 +50,18 @@ void ChaCha20Poly1305Decrypter::FillAeadParams(StringPiece nonce, |
#else // defined(USE_NSS) |
ChaCha20Poly1305Decrypter::ChaCha20Poly1305Decrypter() |
- : AeadBaseDecrypter(CKM_NSS_CHACHA20_POLY1305, PK11_Decrypt, kKeySize, |
- kAuthTagSize, kNoncePrefixSize) { |
+ : AeadBaseDecrypter(CKM_NSS_CHACHA20_POLY1305, |
+ PK11_Decrypt, |
+ kKeySize, |
+ kAuthTagSize, |
+ kNoncePrefixSize) { |
COMPILE_ASSERT(kKeySize <= kMaxKeySize, key_size_too_big); |
COMPILE_ASSERT(kNoncePrefixSize <= kMaxNoncePrefixSize, |
nonce_prefix_size_too_big); |
} |
-ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() {} |
+ChaCha20Poly1305Decrypter::~ChaCha20Poly1305Decrypter() { |
+} |
// static |
bool ChaCha20Poly1305Decrypter::IsSupported() { |