diff options
Diffstat (limited to 'common')
-rw-r--r-- | common/ap_ro_integrity_check.c | 4 | ||||
-rw-r--r-- | common/cmsg.c | 2 | ||||
-rw-r--r-- | common/keyboard_mkbp.c | 2 | ||||
-rw-r--r-- | common/nvmem.c | 2 | ||||
-rw-r--r-- | common/pinweaver.c | 2 | ||||
-rw-r--r-- | common/printf.c | 4 | ||||
-rw-r--r-- | common/rwsig.c | 2 | ||||
-rw-r--r-- | common/thermal.c | 2 | ||||
-rw-r--r-- | common/vboot/vb21_lib.c | 2 | ||||
-rw-r--r-- | common/vboot_hash.c | 4 |
10 files changed, 13 insertions, 13 deletions
diff --git a/common/ap_ro_integrity_check.c b/common/ap_ro_integrity_check.c index 759b3bb022..13e136f297 100644 --- a/common/ap_ro_integrity_check.c +++ b/common/ap_ro_integrity_check.c @@ -53,7 +53,7 @@ * why they would need more than 32 ranges. */ #define APRO_MAX_NUM_RANGES 32 -/* Values used for sanity check of the flash_range structure fields. */ +/* Values used for validity check of the flash_range structure fields. */ #define MAX_SUPPORTED_FLASH_SIZE (32 * 1024 * 1024) #define MAX_SUPPORTED_RANGE_SIZE (4 * 1024 * 1024) @@ -102,7 +102,7 @@ struct gvd_descriptor { /* * Header added for storing of the AP RO check information in the H1 flash * page. The checksum is a 4 byte truncated sha256 of the saved payload, just - * a sanity check. + * a validity check. */ struct ap_ro_check_header { uint8_t version; diff --git a/common/cmsg.c b/common/cmsg.c index f14c13b262..af733e72ef 100644 --- a/common/cmsg.c +++ b/common/cmsg.c @@ -60,7 +60,7 @@ struct console_packet { * params: 1-8 of objects matching the format of the string indexed by * 'str_index' above. * - * CONSOLE_PACKET_END, as a sanity-check that we haven't dropped + * CONSOLE_PACKET_END, as a validity check that we haven't dropped * anything. A checksum or CRC would be kinda expensive for debug * data. Note that it is not present if data_len == 0. */ diff --git a/common/keyboard_mkbp.c b/common/keyboard_mkbp.c index cf3d0dcf33..aa8a518809 100644 --- a/common/keyboard_mkbp.c +++ b/common/keyboard_mkbp.c @@ -649,7 +649,7 @@ static void keyscan_copy_config(const struct ec_mkbp_config *src, uint8_t new_flags; if (valid_mask & EC_MKBP_VALID_FIFO_MAX_DEPTH) { - /* Sanity check for fifo depth */ + /* validity check for fifo depth */ dst->fifo_max_depth = MIN(src->fifo_max_depth, FIFO_DEPTH); } diff --git a/common/nvmem.c b/common/nvmem.c index 92e097077a..af0ba3ad4c 100644 --- a/common/nvmem.c +++ b/common/nvmem.c @@ -270,7 +270,7 @@ static int nvmem_get_partition_off(int user, uint32_t offset, uint32_t len, { uint32_t start_offset; - /* Sanity check for user */ + /* Validity check for user */ if (user >= NVMEM_NUM_USERS) return EC_ERROR_OVERFLOW; diff --git a/common/pinweaver.c b/common/pinweaver.c index 1443bebd7b..2c8c381d3b 100644 --- a/common/pinweaver.c +++ b/common/pinweaver.c @@ -18,7 +18,7 @@ #include <tpm_registers.h> #include <util.h> -/* Compile time sanity checks. */ +/* Compile time validity checks. */ /* Make sure the hash size is consistent with dcrypto. */ BUILD_ASSERT(PW_HASH_SIZE >= SHA256_DIGEST_SIZE); diff --git a/common/printf.c b/common/printf.c index baac4addf7..914d03b969 100644 --- a/common/printf.c +++ b/common/printf.c @@ -182,7 +182,7 @@ int vfnprintf(int (*addchar)(void *context, int c), void *context, } } if (pad_width < 0 || pad_width > MAX_FORMAT) { - /* Sanity check for precision failed */ + /* Validity check for precision failed */ format = error_str; continue; } @@ -202,7 +202,7 @@ int vfnprintf(int (*addchar)(void *context, int c), void *context, } } if (precision < 0 || precision > MAX_FORMAT) { - /* Sanity check for precision failed */ + /* Validity check for precision failed */ format = error_str; continue; } diff --git a/common/rwsig.c b/common/rwsig.c index 5e57f4cab5..f6ad6d5ed2 100644 --- a/common/rwsig.c +++ b/common/rwsig.c @@ -161,7 +161,7 @@ int rwsig_check_signature(void) vb21_sig->sig_size != RSANUMBYTES || vb21_key->sig_alg != vb21_sig->sig_alg || vb21_key->hash_alg != vb21_sig->hash_alg || - /* Sanity check signature offset and data size. */ + /* Validity check signature offset and data size. */ vb21_sig->sig_offset < sizeof(vb21_sig) || (vb21_sig->sig_offset + RSANUMBYTES) > CONFIG_RW_SIG_SIZE || vb21_sig->data_size > (CONFIG_RW_SIZE - CONFIG_RW_SIG_SIZE)) { diff --git a/common/thermal.c b/common/thermal.c index f5988f7046..1ab47d743c 100644 --- a/common/thermal.c +++ b/common/thermal.c @@ -42,7 +42,7 @@ int thermal_fan_percent(int low, int high, int cur) } /* The logic below is hard-coded for only three thresholds: WARN, HIGH, HALT. - * This is just a sanity check to be sure we catch any changes in thermal.h + * This is just a validity check to be sure we catch any changes in thermal.h */ BUILD_ASSERT(EC_TEMP_THRESH_COUNT == 3); diff --git a/common/vboot/vb21_lib.c b/common/vboot/vb21_lib.c index c85ecbbd75..5aac6e1f04 100644 --- a/common/vboot/vb21_lib.c +++ b/common/vboot/vb21_lib.c @@ -33,7 +33,7 @@ int vb21_is_signature_valid(const struct vb21_signature *sig, return EC_ERROR_VBOOT_SIG_ALGORITHM; if (key->hash_alg != sig->hash_alg) return EC_ERROR_VBOOT_HASH_ALGORITHM; - /* Sanity check signature offset and data size. */ + /* Validity check signature offset and data size. */ if (sig->sig_offset < sizeof(*sig)) return EC_ERROR_VBOOT_SIG_OFFSET; if (sig->sig_offset + RSANUMBYTES > CONFIG_RW_SIG_SIZE) diff --git a/common/vboot_hash.c b/common/vboot_hash.c index 7b0012ff8e..f44565f9f0 100644 --- a/common/vboot_hash.c +++ b/common/vboot_hash.c @@ -395,7 +395,7 @@ static void fill_response(struct ec_response_vboot_hash *r, } /** - * Start computing a hash, with sanity checking on params. + * Start computing a hash, with validity checking on params. * * @return EC_RES_SUCCESS if success, or other result code on error. */ @@ -405,7 +405,7 @@ static int host_start_hash(const struct ec_params_vboot_hash *p) int size = p->size; int rv; - /* Sanity-check input params */ + /* Validity check input params */ if (p->hash_type != EC_VBOOT_HASH_TYPE_SHA256) return EC_RES_INVALID_PARAM; if (p->nonce_size > sizeof(p->nonce_data)) |