Index: net/quic/crypto/chacha20_poly1305_encrypter_nss.cc |
diff --git a/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc b/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc |
index fd6f76ca52f147a292abfce3e7127caebbbb732e..1628bff4de876e57e7fecf24e574a5e6c5905d67 100644 |
--- a/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc |
+++ b/net/quic/crypto/chacha20_poly1305_encrypter_nss.cc |
@@ -24,12 +24,16 @@ const size_t kNoncePrefixSize = 0; |
// System NSS doesn't support ChaCha20+Poly1305 yet. |
ChaCha20Poly1305Encrypter::ChaCha20Poly1305Encrypter() |
- : AeadBaseEncrypter(CKM_INVALID_MECHANISM, NULL, kKeySize, |
- kAuthTagSize, kNoncePrefixSize) { |
+ : AeadBaseEncrypter(CKM_INVALID_MECHANISM, |
+ NULL, |
+ kKeySize, |
+ kAuthTagSize, |
+ kNoncePrefixSize) { |
NOTIMPLEMENTED(); |
} |
-ChaCha20Poly1305Encrypter::~ChaCha20Poly1305Encrypter() {} |
+ChaCha20Poly1305Encrypter::~ChaCha20Poly1305Encrypter() { |
+} |
// static |
bool ChaCha20Poly1305Encrypter::IsSupported() { |
@@ -46,14 +50,18 @@ void ChaCha20Poly1305Encrypter::FillAeadParams(StringPiece nonce, |
#else // defined(USE_NSS) |
ChaCha20Poly1305Encrypter::ChaCha20Poly1305Encrypter() |
- : AeadBaseEncrypter(CKM_NSS_CHACHA20_POLY1305, PK11_Encrypt, kKeySize, |
- kAuthTagSize, kNoncePrefixSize) { |
+ : AeadBaseEncrypter(CKM_NSS_CHACHA20_POLY1305, |
+ PK11_Encrypt, |
+ kKeySize, |
+ kAuthTagSize, |
+ kNoncePrefixSize) { |
COMPILE_ASSERT(kKeySize <= kMaxKeySize, key_size_too_big); |
COMPILE_ASSERT(kNoncePrefixSize <= kMaxNoncePrefixSize, |
nonce_prefix_size_too_big); |
} |
-ChaCha20Poly1305Encrypter::~ChaCha20Poly1305Encrypter() {} |
+ChaCha20Poly1305Encrypter::~ChaCha20Poly1305Encrypter() { |
+} |
// static |
bool ChaCha20Poly1305Encrypter::IsSupported() { |