summaryrefslogtreecommitdiff
path: root/tests/vb20_rsa_padding_tests.c
diff options
context:
space:
mode:
authorRandall Spangler <rspangler@chromium.org>2016-10-13 16:16:41 -0700
committerchrome-bot <chrome-bot@chromium.org>2016-10-23 13:33:38 -0700
commit664096bd1a7247b751bf4e564738d53a1e2795c2 (patch)
tree86d7135e77b942c7121885489c72c067005288a0 /tests/vb20_rsa_padding_tests.c
parent08d56aa7a7df69e80aa0a1fd6e847aa1adde5f9c (diff)
downloadvboot-664096bd1a7247b751bf4e564738d53a1e2795c2.tar.gz
vboot: use standard memcmp, memcpy, memset
Originally, we didn't trust the firmware to provide these functions from a standard library. Now, with coreboot, we do. BUG=chromium:611535 BRANCH=none TEST=make runtests; emerge-kevin coreboot depthcharge Change-Id: I4e624c40085f2b665275a38624340b2f6aabcf11 Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/399120 Reviewed-by: Daisuke Nojiri <dnojiri@chromium.org>
Diffstat (limited to 'tests/vb20_rsa_padding_tests.c')
-rw-r--r--tests/vb20_rsa_padding_tests.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/tests/vb20_rsa_padding_tests.c b/tests/vb20_rsa_padding_tests.c
index 3bbebcf6..6fe2e970 100644
--- a/tests/vb20_rsa_padding_tests.c
+++ b/tests/vb20_rsa_padding_tests.c
@@ -52,14 +52,14 @@ static void test_signatures(const struct vb2_public_key *key)
vb2_workbuf_init(&wb, workbuf, sizeof(workbuf));
/* The first test signature is valid. */
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
"RSA Padding Test valid sig");
/* All other signatures should fail verification. */
unexpected_success = 0;
for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) {
- Memcpy(sig, signatures[i], sizeof(sig));
+ memcpy(sig, signatures[i], sizeof(sig));
if (!vb2_rsa_verify_digest(key, sig,
test_message_sha1_hash, &wb)) {
fprintf(stderr,
@@ -83,11 +83,11 @@ static void test_verify_digest(struct vb2_public_key *key) {
vb2_workbuf_init(&wb, workbuf, sizeof(workbuf));
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
"vb2_rsa_verify_digest() good");
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
vb2_workbuf_init(&wb, workbuf, sizeof(sig) * 3 - 1);
TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
VB2_ERROR_RSA_VERIFY_WORKBUF,
@@ -95,26 +95,26 @@ static void test_verify_digest(struct vb2_public_key *key) {
vb2_workbuf_init(&wb, workbuf, sizeof(workbuf));
key->sig_alg = VB2_SIG_INVALID;
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
VB2_ERROR_RSA_VERIFY_ALGORITHM,
"vb2_rsa_verify_digest() bad key alg");
key->sig_alg = orig_key_alg;
key->arrsize *= 2;
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
VB2_ERROR_RSA_VERIFY_SIG_LEN,
"vb2_rsa_verify_digest() bad sig len");
key->arrsize /= 2;
/* Corrupt the signature near start and end */
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
sig[3] ^= 0x42;
TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
VB2_ERROR_RSA_PADDING, "vb2_rsa_verify_digest() bad sig");
- Memcpy(sig, signatures[0], sizeof(sig));
+ memcpy(sig, signatures[0], sizeof(sig));
sig[RSA1024NUMBYTES - 3] ^= 0x56;
TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
VB2_ERROR_RSA_PADDING, "vb2_rsa_verify_digest() bad sig end");