diff options
Diffstat (limited to 'tests/vb20_rsa_padding_tests.c')
-rw-r--r-- | tests/vb20_rsa_padding_tests.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/tests/vb20_rsa_padding_tests.c b/tests/vb20_rsa_padding_tests.c index 3bbebcf6..6fe2e970 100644 --- a/tests/vb20_rsa_padding_tests.c +++ b/tests/vb20_rsa_padding_tests.c @@ -52,14 +52,14 @@ static void test_signatures(const struct vb2_public_key *key) vb2_workbuf_init(&wb, workbuf, sizeof(workbuf)); /* The first test signature is valid. */ - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), "RSA Padding Test valid sig"); /* All other signatures should fail verification. */ unexpected_success = 0; for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) { - Memcpy(sig, signatures[i], sizeof(sig)); + memcpy(sig, signatures[i], sizeof(sig)); if (!vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb)) { fprintf(stderr, @@ -83,11 +83,11 @@ static void test_verify_digest(struct vb2_public_key *key) { vb2_workbuf_init(&wb, workbuf, sizeof(workbuf)); - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), "vb2_rsa_verify_digest() good"); - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); vb2_workbuf_init(&wb, workbuf, sizeof(sig) * 3 - 1); TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), VB2_ERROR_RSA_VERIFY_WORKBUF, @@ -95,26 +95,26 @@ static void test_verify_digest(struct vb2_public_key *key) { vb2_workbuf_init(&wb, workbuf, sizeof(workbuf)); key->sig_alg = VB2_SIG_INVALID; - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), VB2_ERROR_RSA_VERIFY_ALGORITHM, "vb2_rsa_verify_digest() bad key alg"); key->sig_alg = orig_key_alg; key->arrsize *= 2; - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), VB2_ERROR_RSA_VERIFY_SIG_LEN, "vb2_rsa_verify_digest() bad sig len"); key->arrsize /= 2; /* Corrupt the signature near start and end */ - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); sig[3] ^= 0x42; TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), VB2_ERROR_RSA_PADDING, "vb2_rsa_verify_digest() bad sig"); - Memcpy(sig, signatures[0], sizeof(sig)); + memcpy(sig, signatures[0], sizeof(sig)); sig[RSA1024NUMBYTES - 3] ^= 0x56; TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), VB2_ERROR_RSA_PADDING, "vb2_rsa_verify_digest() bad sig end"); |