apply dartfmt
diff --git a/lib/block/modes/ccm.dart b/lib/block/modes/ccm.dart
index 28931f2..6db70eb 100644
--- a/lib/block/modes/ccm.dart
+++ b/lib/block/modes/ccm.dart
@@ -87,7 +87,8 @@
   String get algorithmName => '${underlyingCipher.algorithmName}/CCM';
 
   @override
-  int processBytes(Uint8List inp, int inpOff, int len, Uint8List out, int outOff) {
+  int processBytes(
+      Uint8List inp, int inpOff, int len, Uint8List out, int outOff) {
     data.write(inp, inpOff, len);
     return 0;
   }
@@ -107,7 +108,8 @@
   }
 
   @override
-  int processBlock(Uint8List inp, int inpOff, Uint8List out, int outOff) => processBytes(inp, inpOff, inp.length, out, outOff);
+  int processBlock(Uint8List inp, int inpOff, Uint8List out, int outOff) =>
+      processBytes(inp, inpOff, inp.length, out, outOff);
 
   int _processPacket(
       Uint8List inp, int inpOff, int len, Uint8List out, int outOff) {
@@ -287,11 +289,13 @@
     return cMac.doFinal(macBlock, 0);
   }
 
-  int _getMacSize(bool forEncryption, int requestedMacBits)
-  {
-    if (forEncryption && (requestedMacBits < 32 || requestedMacBits > 128 || 0 != (requestedMacBits & 15)))
-    {
-      throw ArgumentError('tag length in octets must be one of {4,6,8,10,12,14,16}');
+  int _getMacSize(bool forEncryption, int requestedMacBits) {
+    if (forEncryption &&
+        (requestedMacBits < 32 ||
+            requestedMacBits > 128 ||
+            0 != (requestedMacBits & 15))) {
+      throw ArgumentError(
+          'tag length in octets must be one of {4,6,8,10,12,14,16}');
     }
 
     return cshiftr32(requestedMacBits, 3);
@@ -336,7 +340,7 @@
 }
 
 extension WriteLen on BytesBuilder {
-  void write (Uint8List b, int off, int len) {
+  void write(Uint8List b, int off, int len) {
     add(b.sublist(off, off + len));
   }
 }
diff --git a/lib/key_derivators/api.dart b/lib/key_derivators/api.dart
index ab74edf..15af5c5 100644
--- a/lib/key_derivators/api.dart
+++ b/lib/key_derivators/api.dart
@@ -82,21 +82,20 @@
 
   final int version;
 
-
   Argon2Parameters(
-      this.type,
-      this._salt, {
-        required this.desiredKeyLength,
-        Uint8List? secret,
-        Uint8List? additional,
-        this.iterations = DEFAULT_ITERATIONS,
-        int? memoryPowerOf2,
-        int? memory,
-        this.lanes = DEFAULT_LANES,
-        this.version = DEFAULT_VERSION,
-      })  : memory = memoryPowerOf2 != null
-      ? 1 << memoryPowerOf2
-      : (memory ?? (1 << DEFAULT_MEMORY_COST)),
+    this.type,
+    this._salt, {
+    required this.desiredKeyLength,
+    Uint8List? secret,
+    Uint8List? additional,
+    this.iterations = DEFAULT_ITERATIONS,
+    int? memoryPowerOf2,
+    int? memory,
+    this.lanes = DEFAULT_LANES,
+    this.version = DEFAULT_VERSION,
+  })  : memory = memoryPowerOf2 != null
+            ? 1 << memoryPowerOf2
+            : (memory ?? (1 << DEFAULT_MEMORY_COST)),
         _secret = secret,
         _additional = additional;
 
@@ -117,4 +116,3 @@
     return 'Argon2Parameters{ type: $type, iterations: $iterations, memory: $memory, lanes: $lanes, version: $version }';
   }
 }
-
diff --git a/lib/key_derivators/hkdf.dart b/lib/key_derivators/hkdf.dart
index cd707a8..e5da676 100644
--- a/lib/key_derivators/hkdf.dart
+++ b/lib/key_derivators/hkdf.dart
@@ -92,7 +92,7 @@
     return _generate(out, outOff, keySize);
   }
 
-  Uint8List combineLists (Uint8List a, Uint8List b) {
+  Uint8List combineLists(Uint8List a, Uint8List b) {
     var length = a.length + b.length;
     var holder = Uint8List(length);
     holder.setRange(0, a.length, a);
diff --git a/test/asn1/asn1_parser_test.dart b/test/asn1/asn1_parser_test.dart
index 3da0a79..c027de2 100644
--- a/test/asn1/asn1_parser_test.dart
+++ b/test/asn1/asn1_parser_test.dart
@@ -14,7 +14,6 @@
 import 'package:test/test.dart';
 
 void main() {
-
   ///
   /// Test simple structur
   ///
@@ -309,7 +308,7 @@
     var asn1Object = e1.elements!.elementAt(0);
 
     var integer1 =
-    ASN1Parser(asn1Object.valueBytes).nextObject() as ASN1Integer;
+        ASN1Parser(asn1Object.valueBytes).nextObject() as ASN1Integer;
 
     expect(integer1.totalEncodedByteLength, 3);
     expect(integer1.valueByteLength, 1);
diff --git a/test/asymmetric/oaep_test.dart b/test/asymmetric/oaep_test.dart
index f64d94e..336efa5 100644
--- a/test/asymmetric/oaep_test.dart
+++ b/test/asymmetric/oaep_test.dart
@@ -743,4 +743,3 @@
     _next = 0;
   }
 }
-
diff --git a/test/key_derivators/argon2_test.dart b/test/key_derivators/argon2_test.dart
index 3a0b625..b7b9aca 100644
--- a/test/key_derivators/argon2_test.dart
+++ b/test/key_derivators/argon2_test.dart
@@ -125,4 +125,4 @@
   // Should be able to re-use generator after successful use
   result = gen.process(passwordBytes);
   expect(result, createUint8ListFromHexString(passwordRef));
-}
\ No newline at end of file
+}
diff --git a/test/key_derivators/hkdf_test.dart b/test/key_derivators/hkdf_test.dart
index ac61120..2df2d77 100644
--- a/test/key_derivators/hkdf_test.dart
+++ b/test/key_derivators/hkdf_test.dart
@@ -54,23 +54,23 @@
 
       test('Test Case 2 - Test with SHA-256 and longer inputs/outputs', () {
         var ikm =
-        createUint8ListFromHexString('000102030405060708090a0b0c0d0e0f'
-            '101112131415161718191a1b1c1d1e1f'
-            '202122232425262728292a2b2c2d2e2f'
-            '303132333435363738393a3b3c3d3e3f'
-            '404142434445464748494a4b4c4d4e4f');
+            createUint8ListFromHexString('000102030405060708090a0b0c0d0e0f'
+                '101112131415161718191a1b1c1d1e1f'
+                '202122232425262728292a2b2c2d2e2f'
+                '303132333435363738393a3b3c3d3e3f'
+                '404142434445464748494a4b4c4d4e4f');
         var salt =
-        createUint8ListFromHexString('606162636465666768696a6b6c6d6e6f'
-            '707172737475767778797a7b7c7d7e7f'
-            '808182838485868788898a8b8c8d8e8f'
-            '909192939495969798999a9b9c9d9e9f'
-            'a0a1a2a3a4a5a6a7a8a9aaabacadaeaf');
+            createUint8ListFromHexString('606162636465666768696a6b6c6d6e6f'
+                '707172737475767778797a7b7c7d7e7f'
+                '808182838485868788898a8b8c8d8e8f'
+                '909192939495969798999a9b9c9d9e9f'
+                'a0a1a2a3a4a5a6a7a8a9aaabacadaeaf');
         var info =
-        createUint8ListFromHexString('b0b1b2b3b4b5b6b7b8b9babbbcbdbebf'
-            'c0c1c2c3c4c5c6c7c8c9cacbcccdcecf'
-            'd0d1d2d3d4d5d6d7d8d9dadbdcdddedf'
-            'e0e1e2e3e4e5e6e7e8e9eaebecedeeef'
-            'f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff');
+            createUint8ListFromHexString('b0b1b2b3b4b5b6b7b8b9babbbcbdbebf'
+                'c0c1c2c3c4c5c6c7c8c9cacbcccdcecf'
+                'd0d1d2d3d4d5d6d7d8d9dadbdcdddedf'
+                'e0e1e2e3e4e5e6e7e8e9eaebecedeeef'
+                'f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff');
         var l = 82;
         var okm = Uint8List(l);
 
@@ -178,47 +178,47 @@
 
       // this test is identical to test 6 in all ways bar the IKM value
       test('Test Case 7 - Test with SHA-1, salt not provided, zero-length info',
-              () {
-            var ikm = createUint8ListFromHexString(
-                '0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c');
-            var info = Uint8List(0);
-            var l = 42;
-            var okm = Uint8List(l);
+          () {
+        var ikm = createUint8ListFromHexString(
+            '0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c');
+        var info = Uint8List(0);
+        var l = 42;
+        var okm = Uint8List(l);
 
-            var params = HkdfParameters(ikm, l, null, info);
+        var params = HkdfParameters(ikm, l, null, info);
 
-            var hkdf = HKDFKeyDerivator(SHA1Digest());
-            hkdf.init(params);
-            hkdf.deriveKey(null, 0, okm, 0);
+        var hkdf = HKDFKeyDerivator(SHA1Digest());
+        hkdf.init(params);
+        hkdf.deriveKey(null, 0, okm, 0);
 
-            var actual = formatBytesAsHexString(okm);
-            var expected =
-                '2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48';
-            expect(actual, equals(expected));
-          });
+        var actual = formatBytesAsHexString(okm);
+        var expected =
+            '2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48';
+        expect(actual, equals(expected));
+      });
 
       // this test is identical to test 7 in all ways bar the IKM value
       // which is set to the PRK value
       test(
           'Additional Test Case - Test with SHA-1, skipping extract zero-length info',
-              () {
-            var ikm = createUint8ListFromHexString(
-                '2adccada18779e7c2077ad2eb19d3f3e731385dd');
-            var info = Uint8List(0);
-            var l = 42;
-            var okm = Uint8List(l);
+          () {
+        var ikm = createUint8ListFromHexString(
+            '2adccada18779e7c2077ad2eb19d3f3e731385dd');
+        var info = Uint8List(0);
+        var l = 42;
+        var okm = Uint8List(l);
 
-            var params = HkdfParameters(ikm, l, null, info, true);
+        var params = HkdfParameters(ikm, l, null, info, true);
 
-            var hkdf = HKDFKeyDerivator(SHA1Digest());
-            hkdf.init(params);
-            hkdf.deriveKey(null, 0, okm, 0);
+        var hkdf = HKDFKeyDerivator(SHA1Digest());
+        hkdf.init(params);
+        hkdf.deriveKey(null, 0, okm, 0);
 
-            var actual = formatBytesAsHexString(okm);
-            var expected =
-                '2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48';
-            expect(actual, equals(expected));
-          });
+        var actual = formatBytesAsHexString(okm);
+        var expected =
+            '2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48';
+        expect(actual, equals(expected));
+      });
 
       // this test is identical to test 7 in all ways bar the IKM value
       test('Additional Test Case - Test with SHA-1, maximum output', () {
@@ -248,4 +248,4 @@
       });
     });
   });
-}
\ No newline at end of file
+}
diff --git a/test/macs/hmac_test.dart b/test/macs/hmac_test.dart
index 424a802..ce12a6a 100644
--- a/test/macs/hmac_test.dart
+++ b/test/macs/hmac_test.dart
@@ -222,4 +222,3 @@
             '134676fb6de0446065c97440fa8c6a58')
   ]);
 }
-
diff --git a/test/modes/ccm_test.dart b/test/modes/ccm_test.dart
index 5ec4471..6a11b20 100644
--- a/test/modes/ccm_test.dart
+++ b/test/modes/ccm_test.dart
@@ -37,9 +37,11 @@
       'name': 'Test Case 3',
       'key': createUint8ListFromHexString('404142434445464748494a4b4c4d4e4f'),
       'iv': createUint8ListFromHexString('101112131415161718191a1b'),
-      'aad': createUint8ListFromHexString('000102030405060708090a0b0c0d0e0f10111213'),
+      'aad': createUint8ListFromHexString(
+          '000102030405060708090a0b0c0d0e0f10111213'),
       'input': '202122232425262728292a2b2c2d2e2f3031323334353637',
-      'output': 'e3b201a9f5b71a7a9b1ceaeccd97e70b6176aad9a4428aa5484392fbc1b09951',
+      'output':
+          'e3b201a9f5b71a7a9b1ceaeccd97e70b6176aad9a4428aa5484392fbc1b09951',
       'mac': createUint8ListFromHexString('67c99240c7d51048'),
       'tl': 64
     },
@@ -49,14 +51,20 @@
     for (var map in paramList) {
       test(map['name'], () {
         var encrypter = CCMBlockCipher(AESFastEngine());
-        var params = AEADParameters(KeyParameter((map['key'] as Uint8List)),
-            map['tl'] as int, (map['iv'] as Uint8List), (map['aad'] as Uint8List));
+        var params = AEADParameters(
+            KeyParameter((map['key'] as Uint8List)),
+            map['tl'] as int,
+            (map['iv'] as Uint8List),
+            (map['aad'] as Uint8List));
 
         encrypter.init(true, params);
         var result = encrypter
             .process(createUint8ListFromHexString(map['input'] as String));
 
-        expect(result, orderedEquals(createUint8ListFromHexString(map['output'] as String)));
+        expect(
+            result,
+            orderedEquals(
+                createUint8ListFromHexString(map['output'] as String)));
         expect(encrypter.mac, orderedEquals(map['mac'] as Uint8List));
 
         var decrypter = CCMBlockCipher(AESFastEngine())..init(false, params);
@@ -65,4 +73,4 @@
       });
     }
   });
-}
\ No newline at end of file
+}
diff --git a/test/modes/ige_test.dart b/test/modes/ige_test.dart
index c553b93..e552d8a 100644
--- a/test/modes/ige_test.dart
+++ b/test/modes/ige_test.dart
@@ -8,33 +8,31 @@
 import '../test/src/helpers.dart';
 
 void main() {
-  final key1 =
-      createUint8ListFromHexString('000102030405060708090A0B0C0D0E0F'.toLowerCase());
+  final key1 = createUint8ListFromHexString(
+      '000102030405060708090A0B0C0D0E0F'.toLowerCase());
   final iv1 = createUint8ListFromHexString(
-      '000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F'.toLowerCase());
+      '000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F'
+          .toLowerCase());
   final params1 = ParametersWithIV(KeyParameter(key1), iv1);
 
   final data1 = String.fromCharCodes(createUint8ListFromHexString(
       '0000000000000000000000000000000000000000000000000000000000000000'));
-  final ct1 = '1A8519A6557BE652E9DA8E43DA4EF4453CF456B4CA488AA383C79C98B34797CB'.toLowerCase();
+  final ct1 = '1A8519A6557BE652E9DA8E43DA4EF4453CF456B4CA488AA383C79C98B34797CB'
+      .toLowerCase();
 
-  runBlockCipherTests(BlockCipher('AES/IGE'), params1, [
-    data1,
-    ct1
-  ]);
+  runBlockCipherTests(BlockCipher('AES/IGE'), params1, [data1, ct1]);
 
-  final key2 =
-  createUint8ListFromHexString('5468697320697320616E20696D706C65'.toLowerCase());
+  final key2 = createUint8ListFromHexString(
+      '5468697320697320616E20696D706C65'.toLowerCase());
   final iv2 = createUint8ListFromHexString(
-      '6D656E746174696F6E206F6620494745206D6F646520666F72204F70656E5353'.toLowerCase());
+      '6D656E746174696F6E206F6620494745206D6F646520666F72204F70656E5353'
+          .toLowerCase());
   final params2 = ParametersWithIV(KeyParameter(key2), iv2);
 
   final data2 = String.fromCharCodes(createUint8ListFromHexString(
       '99706487A1CDE613BC6DE0B6F24B1C7AA448C8B9C3403E3467A8CAD89340F53B'));
-  final ct2 = '4C2E204C6574277320686F70652042656E20676F74206974207269676874210A'.toLowerCase();
+  final ct2 = '4C2E204C6574277320686F70652042656E20676F74206974207269676874210A'
+      .toLowerCase();
 
-  runBlockCipherTests(BlockCipher('AES/IGE'), params2, [
-    data2,
-    ct2
-  ]);
+  runBlockCipherTests(BlockCipher('AES/IGE'), params2, [data2, ct2]);
 }
diff --git a/test/test/runners/key_derivators.dart b/test/test/runners/key_derivators.dart
index 5c422c7..8d19b06 100644
--- a/test/test/runners/key_derivators.dart
+++ b/test/test/runners/key_derivators.dart
@@ -16,8 +16,10 @@
         var password = paramsPasswordKeyTuples[i + 1];
         var key = paramsPasswordKeyTuples[i + 2];
 
-        test('${formatAsTruncated(password as String)}',
-                () => _runKeyDerivatorTest(keyDerivator, params as CipherParameters, password, key as String));
+        test(
+            '${formatAsTruncated(password as String)}',
+            () => _runKeyDerivatorTest(keyDerivator, params as CipherParameters,
+                password, key as String));
       }
     });
   });
@@ -32,4 +34,4 @@
   var hexOut = formatBytesAsHexString(out);
 
   expect(hexOut, equals(expectedHexKey));
-}
\ No newline at end of file
+}