Quellcode durchsuchen

use XMEM{CMP, CPY, SET} macros instead of standard versions

Steffen Jaeckel vor 10 Jahren
Ursprung
Commit
9782c09a3a

+ 1 - 1
src/encauth/ccm/ccm_init.c

@@ -33,7 +33,7 @@ int ccm_init(ccm_state *ccm, int cipher,
    LTC_ARGCHK(key    != NULL);
    LTC_ARGCHK(taglen != 0);
 
-   memset(ccm, 0, sizeof(ccm_state));
+   XMEMSET(ccm, 0, sizeof(ccm_state));
 
    /* check cipher input */
    if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {

+ 8 - 8
src/encauth/ccm/ccm_memory_ex.c

@@ -329,17 +329,17 @@ if (CTR == NULL) {
       }
    }
 
-// grab the CTR
-memcpy(ctrcopy, ctr, 16);
+   // grab the CTR
+   XMEMCPY(ctrcopy, ctr, 16);
 
    /* setup CTR for the TAG (zero the count) */
-if (CTR == NULL) {
-   for (y = 15; y > 15 - L; y--) {
-      ctr[y] = 0x00;
+   if (CTR == NULL) {
+      for (y = 15; y > 15 - L; y--) {
+         ctr[y] = 0x00;
+      }
+   } else {
+      XMEMCPY(ctr, CTR, 16);
    }
-} else {
-   XMEMCPY(ctr, CTR, 16);
-}
 
    if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) {
       goto error;

+ 1 - 1
src/headers/tomcrypt_hash.h

@@ -386,7 +386,7 @@ int func_name (hash_state * md, const unsigned char *in, unsigned long inlen)
            inlen          -= block_size;                                                    \
         } else {                                                                            \
            n = MIN(inlen, (block_size - md-> state_var .curlen));                           \
-           memcpy(md-> state_var .buf + md-> state_var.curlen, in, (size_t)n);              \
+           XMEMCPY(md-> state_var .buf + md-> state_var.curlen, in, (size_t)n);              \
            md-> state_var .curlen += n;                                                     \
            in             += n;                                                             \
            inlen          -= n;                                                             \

+ 2 - 2
src/misc/pk_get_oid.c

@@ -27,10 +27,10 @@ int pk_get_oid(int pk, oid_st *st)
 {
    switch (pk) {
       case PKA_RSA:
-         memcpy(st, &rsa_oid, sizeof(*st));
+         XMEMCPY(st, &rsa_oid, sizeof(*st));
          break;
       case PKA_DSA:
-         memcpy(st, &dsa_oid, sizeof(*st));
+         XMEMCPY(st, &dsa_oid, sizeof(*st));
          break;
       default:
          return CRYPT_INVALID_ARG;

+ 2 - 2
src/pk/asn1/der/sequence/der_decode_subject_public_key_info.c

@@ -76,7 +76,7 @@ int der_decode_subject_public_key_info(const unsigned char *in, unsigned long in
    }
 
    if ((alg_id[0].size != oid.OIDlen) ||
-       memcmp(oid.OID, alg_id[0].data, oid.OIDlen * sizeof(oid.OID[0]))) {
+        XMEMCMP(oid.OID, alg_id[0].data, oid.OIDlen * sizeof(oid.OID[0]))) {
         /* OID mismatch */
         err = CRYPT_PK_INVALID_TYPE;
         goto LBL_ERR;
@@ -84,7 +84,7 @@ int der_decode_subject_public_key_info(const unsigned char *in, unsigned long in
 
    len = subject_pubkey[1].size/8;
    if (*public_key_len > len) {
-       memcpy(public_key, subject_pubkey[1].data, len);
+       XMEMCPY(public_key, subject_pubkey[1].data, len);
        *public_key_len = len;
     } else {
         *public_key_len = len;