use XMEM{CMP, CPY, SET} macros instead of standard versions
This commit is contained in:
parent
b8bf2f13b8
commit
9782c09a3a
@ -33,7 +33,7 @@ int ccm_init(ccm_state *ccm, int cipher,
|
||||
LTC_ARGCHK(key != NULL);
|
||||
LTC_ARGCHK(taglen != 0);
|
||||
|
||||
memset(ccm, 0, sizeof(ccm_state));
|
||||
XMEMSET(ccm, 0, sizeof(ccm_state));
|
||||
|
||||
/* check cipher input */
|
||||
if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
|
||||
|
@ -329,17 +329,17 @@ if (CTR == NULL) {
|
||||
}
|
||||
}
|
||||
|
||||
// grab the CTR
|
||||
memcpy(ctrcopy, ctr, 16);
|
||||
// grab the CTR
|
||||
XMEMCPY(ctrcopy, ctr, 16);
|
||||
|
||||
/* setup CTR for the TAG (zero the count) */
|
||||
if (CTR == NULL) {
|
||||
for (y = 15; y > 15 - L; y--) {
|
||||
ctr[y] = 0x00;
|
||||
if (CTR == NULL) {
|
||||
for (y = 15; y > 15 - L; y--) {
|
||||
ctr[y] = 0x00;
|
||||
}
|
||||
} else {
|
||||
XMEMCPY(ctr, CTR, 16);
|
||||
}
|
||||
} else {
|
||||
XMEMCPY(ctr, CTR, 16);
|
||||
}
|
||||
|
||||
if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) {
|
||||
goto error;
|
||||
|
@ -386,7 +386,7 @@ int func_name (hash_state * md, const unsigned char *in, unsigned long inlen)
|
||||
inlen -= block_size; \
|
||||
} else { \
|
||||
n = MIN(inlen, (block_size - md-> state_var .curlen)); \
|
||||
memcpy(md-> state_var .buf + md-> state_var.curlen, in, (size_t)n); \
|
||||
XMEMCPY(md-> state_var .buf + md-> state_var.curlen, in, (size_t)n); \
|
||||
md-> state_var .curlen += n; \
|
||||
in += n; \
|
||||
inlen -= n; \
|
||||
|
@ -27,10 +27,10 @@ int pk_get_oid(int pk, oid_st *st)
|
||||
{
|
||||
switch (pk) {
|
||||
case PKA_RSA:
|
||||
memcpy(st, &rsa_oid, sizeof(*st));
|
||||
XMEMCPY(st, &rsa_oid, sizeof(*st));
|
||||
break;
|
||||
case PKA_DSA:
|
||||
memcpy(st, &dsa_oid, sizeof(*st));
|
||||
XMEMCPY(st, &dsa_oid, sizeof(*st));
|
||||
break;
|
||||
default:
|
||||
return CRYPT_INVALID_ARG;
|
||||
|
@ -76,7 +76,7 @@ int der_decode_subject_public_key_info(const unsigned char *in, unsigned long in
|
||||
}
|
||||
|
||||
if ((alg_id[0].size != oid.OIDlen) ||
|
||||
memcmp(oid.OID, alg_id[0].data, oid.OIDlen * sizeof(oid.OID[0]))) {
|
||||
XMEMCMP(oid.OID, alg_id[0].data, oid.OIDlen * sizeof(oid.OID[0]))) {
|
||||
/* OID mismatch */
|
||||
err = CRYPT_PK_INVALID_TYPE;
|
||||
goto LBL_ERR;
|
||||
@ -84,7 +84,7 @@ int der_decode_subject_public_key_info(const unsigned char *in, unsigned long in
|
||||
|
||||
len = subject_pubkey[1].size/8;
|
||||
if (*public_key_len > len) {
|
||||
memcpy(public_key, subject_pubkey[1].data, len);
|
||||
XMEMCPY(public_key, subject_pubkey[1].data, len);
|
||||
*public_key_len = len;
|
||||
} else {
|
||||
*public_key_len = len;
|
||||
|
Loading…
Reference in New Issue
Block a user