summaryrefslogtreecommitdiff
path: root/tests/vb20_common3_tests.c
diff options
context:
space:
mode:
authorRandall Spangler <rspangler@chromium.org>2016-09-09 10:49:37 -0700
committerchrome-bot <chrome-bot@chromium.org>2016-09-15 16:16:13 -0700
commitf87aa72d4b49ff5fa2760227a99d9a5d90e557c1 (patch)
tree03a537886887b7751a067baa22da3d0895f62764 /tests/vb20_common3_tests.c
parentb56b5f8e06b4cc4d4105a8141b3d2b8647eedff6 (diff)
downloadvboot-f87aa72d4b49ff5fa2760227a99d9a5d90e557c1.tar.gz
tests: Fix coverity warnings
Assorted minor code issues, which we should fix so any new errors stand out more. BUG=chromium:643769 BRANCH=none TEST=make runtests Change-Id: I927571f8a30794c70228506afe4da3eda86f765b Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/383953 Reviewed-by: Daisuke Nojiri <dnojiri@chromium.org>
Diffstat (limited to 'tests/vb20_common3_tests.c')
-rw-r--r--tests/vb20_common3_tests.c35
1 files changed, 24 insertions, 11 deletions
diff --git a/tests/vb20_common3_tests.c b/tests/vb20_common3_tests.c
index 62a36e45..fd15892a 100644
--- a/tests/vb20_common3_tests.c
+++ b/tests/vb20_common3_tests.c
@@ -327,6 +327,7 @@ static void test_verify_fw_preamble(struct vb2_packed_key *public_key,
free(h);
free(hdr);
+ free(body_sig);
}
static void resign_kernel_preamble(struct vb2_kernel_preamble *h,
@@ -501,6 +502,7 @@ static void test_verify_kernel_preamble(
free(h);
free(hdr);
+ free(body_sig);
}
int test_permutation(int signing_key_algorithm, int data_key_algorithm,
@@ -509,37 +511,45 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm,
char filename[1024];
int signing_rsa_len = siglen_map[signing_key_algorithm] * 8;
int data_rsa_len = siglen_map[data_key_algorithm] * 8;
+ int retval = 1;
+
+ struct vb2_private_key *signing_private_key = NULL;
+ struct vb2_packed_key *signing_public_key = NULL;
+ struct vb2_packed_key *data_public_key = NULL;
printf("***Testing signing algorithm: %s\n",
algo_strings[signing_key_algorithm]);
printf("***With data key algorithm: %s\n",
algo_strings[data_key_algorithm]);
- sprintf(filename, "%s/key_rsa%d.pem", keys_dir, signing_rsa_len);
- struct vb2_private_key *signing_private_key =
+ snprintf(filename, sizeof(filename),
+ "%s/key_rsa%d.pem", keys_dir, signing_rsa_len);
+ signing_private_key =
vb2_read_private_key_pem(filename, signing_key_algorithm);
if (!signing_private_key) {
fprintf(stderr, "Error reading signing_private_key: %s\n",
filename);
- return 1;
+ goto cleanup_permutation;
}
- sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, signing_rsa_len);
- struct vb2_packed_key *signing_public_key =
+ snprintf(filename, sizeof(filename),
+ "%s/key_rsa%d.keyb", keys_dir, signing_rsa_len);
+ signing_public_key =
vb2_read_packed_keyb(filename, signing_key_algorithm, 1);
if (!signing_public_key) {
fprintf(stderr, "Error reading signing_public_key: %s\n",
filename);
- return 1;
+ goto cleanup_permutation;
}
- sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, data_rsa_len);
- struct vb2_packed_key *data_public_key =
+ snprintf(filename, sizeof(filename),
+ "%s/key_rsa%d.keyb", keys_dir, data_rsa_len);
+ data_public_key =
vb2_read_packed_keyb(filename, data_key_algorithm, 1);
if (!data_public_key) {
fprintf(stderr, "Error reading data_public_key: %s\n",
filename);
- return 1;
+ goto cleanup_permutation;
}
/* Unpack public key */
@@ -551,7 +561,7 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm,
signing_public_key->key_size)) {
fprintf(stderr, "Error unpacking signing_public_key: %s\n",
filename);
- return 1;
+ goto cleanup_permutation;
}
test_check_keyblock(&signing_public_key2, signing_private_key,
@@ -562,6 +572,9 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm,
data_public_key);
test_verify_kernel_preamble(signing_public_key, signing_private_key);
+ retval = 0;
+
+cleanup_permutation:
if (signing_public_key)
free(signing_public_key);
if (signing_private_key)
@@ -569,7 +582,7 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm,
if (data_public_key)
free(data_public_key);
- return 0;
+ return retval;
}
struct test_perm