summaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorYicheng Li <yichengli@chromium.org>2019-07-24 17:38:23 -0700
committerCommit Bot <commit-bot@chromium.org>2019-07-26 20:49:01 +0000
commit30ab5997d7aed6c71943c9779544792695f4608f (patch)
tree9c3ce75fbde3e4f8f83a752f159a9553971614a5 /test
parent9ff89625dc098838a60ace547b2db4ebb27dee41 (diff)
downloadchrome-ec-30ab5997d7aed6c71943c9779544792695f4608f.tar.gz
fpsensor: Change crypto functions to return error code instead of result code
EC_RES_SUCCESS and EC_RES_ERROR are meant to be returned in EC command handler to represent command result, so change crypto functions to return EC_SUCCESS and EC error codes instead. BRANCH=nocturne BUG=none TEST=make -j buildall TEST=tested enrollment, matching, deletion and multifinger on nocturne DUT Change-Id: Ia98fa7469ab4e5dba00ede19dd34c5007d17b054 Signed-off-by: Yicheng Li <yichengli@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/ec/+/1715512 Reviewed-by: Nicolas Norvez <norvez@chromium.org>
Diffstat (limited to 'test')
-rw-r--r--test/fpsensor.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/test/fpsensor.c b/test/fpsensor.c
index c06a08d69b..33998b6b00 100644
--- a/test/fpsensor.c
+++ b/test/fpsensor.c
@@ -89,7 +89,7 @@ test_static int test_derive_encryption_key_failure_seed_not_set(void)
/* THEN derivation will fail. */
TEST_ASSERT(derive_encryption_key(unused_key, unused_salt) ==
- EC_RES_ERROR);
+ EC_ERROR_ACCESS_DENIED);
return EC_SUCCESS;
}
@@ -108,7 +108,7 @@ static int test_derive_encryption_key_raw(const uint32_t *user_id_,
memcpy(user_id, user_id_, sizeof(user_id));
rv = derive_encryption_key(key, salt);
- TEST_ASSERT(rv == EC_RES_SUCCESS);
+ TEST_ASSERT(rv == EC_SUCCESS);
TEST_ASSERT_ARRAY_EQ(key, expected_key, sizeof(key));
return EC_SUCCESS;
@@ -178,7 +178,7 @@ test_static int test_derive_encryption_key_failure_rollback_fail(void)
rollback_should_fail = 1;
/* THEN the derivation will fail. */
TEST_ASSERT(derive_encryption_key(unused_key, unused_salt) ==
- EC_RES_ERROR);
+ EC_ERROR_HW_INTERNAL);
/* GIVEN that reading the rollback secret will succeed. */
rollback_should_fail = 0;
@@ -186,7 +186,7 @@ test_static int test_derive_encryption_key_failure_rollback_fail(void)
TEST_ASSERT(fp_tpm_seed_is_set());
/* THEN the derivation will succeed. */
TEST_ASSERT(derive_encryption_key(unused_key, unused_salt) ==
- EC_RES_SUCCESS);
+ EC_SUCCESS);
return EC_SUCCESS;
}