summaryrefslogtreecommitdiff
path: root/common
diff options
context:
space:
mode:
Diffstat (limited to 'common')
-rw-r--r--common/ap_ro_integrity_check.c4
-rw-r--r--common/cmsg.c2
-rw-r--r--common/keyboard_mkbp.c2
-rw-r--r--common/nvmem.c2
-rw-r--r--common/pinweaver.c2
-rw-r--r--common/printf.c4
-rw-r--r--common/rwsig.c2
-rw-r--r--common/thermal.c2
-rw-r--r--common/vboot/vb21_lib.c2
-rw-r--r--common/vboot_hash.c4
10 files changed, 13 insertions, 13 deletions
diff --git a/common/ap_ro_integrity_check.c b/common/ap_ro_integrity_check.c
index 759b3bb022..13e136f297 100644
--- a/common/ap_ro_integrity_check.c
+++ b/common/ap_ro_integrity_check.c
@@ -53,7 +53,7 @@
* why they would need more than 32 ranges.
*/
#define APRO_MAX_NUM_RANGES 32
-/* Values used for sanity check of the flash_range structure fields. */
+/* Values used for validity check of the flash_range structure fields. */
#define MAX_SUPPORTED_FLASH_SIZE (32 * 1024 * 1024)
#define MAX_SUPPORTED_RANGE_SIZE (4 * 1024 * 1024)
@@ -102,7 +102,7 @@ struct gvd_descriptor {
/*
* Header added for storing of the AP RO check information in the H1 flash
* page. The checksum is a 4 byte truncated sha256 of the saved payload, just
- * a sanity check.
+ * a validity check.
*/
struct ap_ro_check_header {
uint8_t version;
diff --git a/common/cmsg.c b/common/cmsg.c
index f14c13b262..af733e72ef 100644
--- a/common/cmsg.c
+++ b/common/cmsg.c
@@ -60,7 +60,7 @@ struct console_packet {
* params: 1-8 of objects matching the format of the string indexed by
* 'str_index' above.
*
- * CONSOLE_PACKET_END, as a sanity-check that we haven't dropped
+ * CONSOLE_PACKET_END, as a validity check that we haven't dropped
* anything. A checksum or CRC would be kinda expensive for debug
* data. Note that it is not present if data_len == 0.
*/
diff --git a/common/keyboard_mkbp.c b/common/keyboard_mkbp.c
index cf3d0dcf33..aa8a518809 100644
--- a/common/keyboard_mkbp.c
+++ b/common/keyboard_mkbp.c
@@ -649,7 +649,7 @@ static void keyscan_copy_config(const struct ec_mkbp_config *src,
uint8_t new_flags;
if (valid_mask & EC_MKBP_VALID_FIFO_MAX_DEPTH) {
- /* Sanity check for fifo depth */
+ /* validity check for fifo depth */
dst->fifo_max_depth = MIN(src->fifo_max_depth,
FIFO_DEPTH);
}
diff --git a/common/nvmem.c b/common/nvmem.c
index 92e097077a..af0ba3ad4c 100644
--- a/common/nvmem.c
+++ b/common/nvmem.c
@@ -270,7 +270,7 @@ static int nvmem_get_partition_off(int user, uint32_t offset, uint32_t len,
{
uint32_t start_offset;
- /* Sanity check for user */
+ /* Validity check for user */
if (user >= NVMEM_NUM_USERS)
return EC_ERROR_OVERFLOW;
diff --git a/common/pinweaver.c b/common/pinweaver.c
index 1443bebd7b..2c8c381d3b 100644
--- a/common/pinweaver.c
+++ b/common/pinweaver.c
@@ -18,7 +18,7 @@
#include <tpm_registers.h>
#include <util.h>
-/* Compile time sanity checks. */
+/* Compile time validity checks. */
/* Make sure the hash size is consistent with dcrypto. */
BUILD_ASSERT(PW_HASH_SIZE >= SHA256_DIGEST_SIZE);
diff --git a/common/printf.c b/common/printf.c
index baac4addf7..914d03b969 100644
--- a/common/printf.c
+++ b/common/printf.c
@@ -182,7 +182,7 @@ int vfnprintf(int (*addchar)(void *context, int c), void *context,
}
}
if (pad_width < 0 || pad_width > MAX_FORMAT) {
- /* Sanity check for precision failed */
+ /* Validity check for precision failed */
format = error_str;
continue;
}
@@ -202,7 +202,7 @@ int vfnprintf(int (*addchar)(void *context, int c), void *context,
}
}
if (precision < 0 || precision > MAX_FORMAT) {
- /* Sanity check for precision failed */
+ /* Validity check for precision failed */
format = error_str;
continue;
}
diff --git a/common/rwsig.c b/common/rwsig.c
index 5e57f4cab5..f6ad6d5ed2 100644
--- a/common/rwsig.c
+++ b/common/rwsig.c
@@ -161,7 +161,7 @@ int rwsig_check_signature(void)
vb21_sig->sig_size != RSANUMBYTES ||
vb21_key->sig_alg != vb21_sig->sig_alg ||
vb21_key->hash_alg != vb21_sig->hash_alg ||
- /* Sanity check signature offset and data size. */
+ /* Validity check signature offset and data size. */
vb21_sig->sig_offset < sizeof(vb21_sig) ||
(vb21_sig->sig_offset + RSANUMBYTES) > CONFIG_RW_SIG_SIZE ||
vb21_sig->data_size > (CONFIG_RW_SIZE - CONFIG_RW_SIG_SIZE)) {
diff --git a/common/thermal.c b/common/thermal.c
index f5988f7046..1ab47d743c 100644
--- a/common/thermal.c
+++ b/common/thermal.c
@@ -42,7 +42,7 @@ int thermal_fan_percent(int low, int high, int cur)
}
/* The logic below is hard-coded for only three thresholds: WARN, HIGH, HALT.
- * This is just a sanity check to be sure we catch any changes in thermal.h
+ * This is just a validity check to be sure we catch any changes in thermal.h
*/
BUILD_ASSERT(EC_TEMP_THRESH_COUNT == 3);
diff --git a/common/vboot/vb21_lib.c b/common/vboot/vb21_lib.c
index c85ecbbd75..5aac6e1f04 100644
--- a/common/vboot/vb21_lib.c
+++ b/common/vboot/vb21_lib.c
@@ -33,7 +33,7 @@ int vb21_is_signature_valid(const struct vb21_signature *sig,
return EC_ERROR_VBOOT_SIG_ALGORITHM;
if (key->hash_alg != sig->hash_alg)
return EC_ERROR_VBOOT_HASH_ALGORITHM;
- /* Sanity check signature offset and data size. */
+ /* Validity check signature offset and data size. */
if (sig->sig_offset < sizeof(*sig))
return EC_ERROR_VBOOT_SIG_OFFSET;
if (sig->sig_offset + RSANUMBYTES > CONFIG_RW_SIG_SIZE)
diff --git a/common/vboot_hash.c b/common/vboot_hash.c
index 7b0012ff8e..f44565f9f0 100644
--- a/common/vboot_hash.c
+++ b/common/vboot_hash.c
@@ -395,7 +395,7 @@ static void fill_response(struct ec_response_vboot_hash *r,
}
/**
- * Start computing a hash, with sanity checking on params.
+ * Start computing a hash, with validity checking on params.
*
* @return EC_RES_SUCCESS if success, or other result code on error.
*/
@@ -405,7 +405,7 @@ static int host_start_hash(const struct ec_params_vboot_hash *p)
int size = p->size;
int rv;
- /* Sanity-check input params */
+ /* Validity check input params */
if (p->hash_type != EC_VBOOT_HASH_TYPE_SHA256)
return EC_RES_INVALID_PARAM;
if (p->nonce_size > sizeof(p->nonce_data))