From 69825c3b1d57dd1c46723c8f69a80e24d70136e6 Mon Sep 17 00:00:00 2001 From: Mary Ruthven Date: Wed, 17 Nov 2021 12:32:47 -0600 Subject: coil: replace non-inclusive terms with "validity" BUG=b:173227629 TEST=make buildall -j Change-Id: Iaf8028984cc58cc4108907fdba4ea4b38c43cf70 Signed-off-by: Mary Ruthven Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/ec/+/3293250 Reviewed-by: Vadim Sukhomlinov --- board/cr50/dcrypto/hmac_drbg.c | 2 +- board/cr50/tpm2/aes.c | 2 +- board/cr50/tpm2/endorsement.c | 4 ++-- board/cr50/tpm2/virtual_nvmem.c | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) (limited to 'board') diff --git a/board/cr50/dcrypto/hmac_drbg.c b/board/cr50/dcrypto/hmac_drbg.c index d5f4960013..1ef468e08b 100644 --- a/board/cr50/dcrypto/hmac_drbg.c +++ b/board/cr50/dcrypto/hmac_drbg.c @@ -359,7 +359,7 @@ static int cmd_hmac_drbg(int argc, char **argv) DECLARE_SAFE_CONSOLE_COMMAND(hmac_drbg, cmd_hmac_drbg, NULL, NULL); /* - * Sanity check to exercise random initialization. + * Validity check to exercise random initialization. */ static int cmd_hmac_drbg_rand(int argc, char **argv) { diff --git a/board/cr50/tpm2/aes.c b/board/cr50/tpm2/aes.c index 56e3cbbb3b..8aa80d1d6a 100644 --- a/board/cr50/tpm2/aes.c +++ b/board/cr50/tpm2/aes.c @@ -307,7 +307,7 @@ static void aes_command_handler(void *cmd_body, * We know that the receive buffer is at least this big, i.e. all the * preceding fields are guaranteed to fit. * - * Now is a good time to verify overall sanity of the received + * Now is a good time to verify overall validity of the received * payload: does the actual size match the added up sizes of the * pieces. */ diff --git a/board/cr50/tpm2/endorsement.c b/board/cr50/tpm2/endorsement.c index fe4434bbec..8d0ad2fdaa 100644 --- a/board/cr50/tpm2/endorsement.c +++ b/board/cr50/tpm2/endorsement.c @@ -563,7 +563,7 @@ enum manufacturing_status tpm_endorse(void) /* Unpack rsa cert struct. */ rsa_cert = (const struct ro_cert *) p; - /* Sanity check cert region contents. */ + /* Validity check cert region contents. */ if ((2 * sizeof(struct ro_cert)) + rsa_cert->cert_response.cert_len > RO_CERTS_REGION_SIZE) return mnf_bad_rsa_size; @@ -571,7 +571,7 @@ enum manufacturing_status tpm_endorse(void) /* Unpack ecc cert struct. */ ecc_cert = (const struct ro_cert *) (p + sizeof(struct ro_cert) + rsa_cert->cert_response.cert_len); - /* Sanity check cert region contents. */ + /* Validity check cert region contents. */ if ((2 * sizeof(struct ro_cert)) + rsa_cert->cert_response.cert_len + ecc_cert->cert_response.cert_len > RO_CERTS_REGION_SIZE) diff --git a/board/cr50/tpm2/virtual_nvmem.c b/board/cr50/tpm2/virtual_nvmem.c index 16a4028be9..196f4c0416 100644 --- a/board/cr50/tpm2/virtual_nvmem.c +++ b/board/cr50/tpm2/virtual_nvmem.c @@ -343,7 +343,7 @@ static const struct virtual_nv_index_cfg index_config[] = { GetRSUDevID) }; -/* Check sanity of above config. */ +/* Check validity check of above config. */ BUILD_ASSERT(VIRTUAL_NV_INDEX_END <= (VIRTUAL_NV_INDEX_MAX + 1)); BUILD_ASSERT((VIRTUAL_NV_INDEX_END - VIRTUAL_NV_INDEX_START) == ARRAY_SIZE(index_config)); -- cgit v1.2.1