diff --git a/toxencryptsave/toxencryptsave.c b/toxencryptsave/toxencryptsave.c index 7492f06b..31d2be9b 100644 --- a/toxencryptsave/toxencryptsave.c +++ b/toxencryptsave/toxencryptsave.c @@ -40,9 +40,15 @@ #define TOX_PASS_KEY_LENGTH (crypto_box_KEYBYTES + crypto_pwhash_scryptsalsa208sha256_SALTBYTES) -int tox_pass_encryption_extra_length() {return TOX_PASS_ENCRYPTION_EXTRA_LENGTH;} +int tox_pass_encryption_extra_length() +{ + return TOX_PASS_ENCRYPTION_EXTRA_LENGTH; +} -int tox_pass_key_length() {return TOX_PASS_KEY_LENGTH;} +int tox_pass_key_length() +{ + return TOX_PASS_KEY_LENGTH; +} /* This "module" provides functions analogous to tox_load and tox_save in toxcore * Clients should consider alerting their users that, unlike plain data, if even one bit diff --git a/toxencryptsave/toxencryptsave.h b/toxencryptsave/toxencryptsave.h index d805cf97..b00570e0 100644 --- a/toxencryptsave/toxencryptsave.h +++ b/toxencryptsave/toxencryptsave.h @@ -101,7 +101,7 @@ int tox_encrypted_save(const Tox *tox, uint8_t *data, uint8_t *passphrase, uint3 * returns the length of the output data (== data_len - tox_pass_encryption_extra_length()) on success * returns -1 on failure */ -int tox_pass_key_decrypt(const uint8_t* data, uint32_t length, const uint8_t* key, uint8_t* out); +int tox_pass_key_decrypt(const uint8_t *data, uint32_t length, const uint8_t *key, uint8_t *out); /* Decrypts the given data with the given passphrase. The output array must be * at least data_len - tox_pass_encryption_extra_length() bytes long. This delegates