diff --git a/src/transport/SessionManager.cpp b/src/transport/SessionManager.cpp index 6ada97a587e859..5431dc52f60d05 100644 --- a/src/transport/SessionManager.cpp +++ b/src/transport/SessionManager.cpp @@ -201,8 +201,8 @@ CHIP_ERROR SessionManager::PrepareMessage(const SessionHandle & sessionHandle, P packetHeader.SetSessionId(keyContext->GetKeyHash()); CryptoContext::NonceStorage nonce; CryptoContext::BuildNonce(nonce, packetHeader.GetSecurityFlags(), packetHeader.GetMessageCounter(), sourceNodeId); - CHIP_ERROR err = SecureMessageCodec::Encrypt(CryptoContext(keyContext), nonce, payloadHeader, packetHeader, message, - kMaxAppMessageLen); + CHIP_ERROR err = + SecureMessageCodec::Encrypt(CryptoContext(keyContext), nonce, payloadHeader, packetHeader, message, kMaxAppMessageLen); keyContext->Release(); ReturnErrorOnFailure(err); @@ -241,13 +241,13 @@ CHIP_ERROR SessionManager::PrepareMessage(const SessionHandle & sessionHandle, P if (session->GetPeerAddress().GetTransportType() == Transport::Type::kTcp) { // support large payloads - ReturnErrorOnFailure(SecureMessageCodec::Encrypt(session->GetCryptoContext(), nonce, payloadHeader, packetHeader, message, - kLargePayloadMaxMessageSizeBytes)); + ReturnErrorOnFailure(SecureMessageCodec::Encrypt(session->GetCryptoContext(), nonce, payloadHeader, packetHeader, + message, kLargePayloadMaxMessageSizeBytes)); } else { - ReturnErrorOnFailure(SecureMessageCodec::Encrypt(session->GetCryptoContext(), nonce, payloadHeader, packetHeader, message, - kMaxAppMessageLen)); + ReturnErrorOnFailure(SecureMessageCodec::Encrypt(session->GetCryptoContext(), nonce, payloadHeader, packetHeader, + message, kMaxAppMessageLen)); } #if CHIP_PROGRESS_LOGGING